<?xml version="1.0" encoding="UTF-8"?>
	<oval_definitions
		xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd"
		xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5"
		xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
		xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5"
		xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5">
	  <generator>
	      <oval:product_name>Marcus Updateinfo to OVAL Converter</oval:product_name>
	      <oval:schema_version>5.5</oval:schema_version>
	      <oval:timestamp>2019-09-27T08:38:51</oval:timestamp>
	  </generator>
<definitions>
<definition id="oval:org.opensuse.security:def:20011267" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2001-1267</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2001-1267" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1267" source="CVE"/>
    <description>
    Directory traversal vulnerability in GNU tar 1.13.19 and earlier allows local users to overwrite arbitrary files during archive extraction via a tar file whose filenames contain a .. (dot dot).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2001-1267.html">CVE-2001-1267</cve>
<bugzilla href="https://bugzilla.suse.com/299738">SUSE bug 299738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/299745">SUSE bug 299745</bugzilla>
<bugzilla href="https://bugzilla.suse.com/299747">SUSE bug 299747</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199231" comment="tar-1.26-1.2.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20020399" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2002-0399</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2002-0399" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0399" source="CVE"/>
    <description>
    Directory traversal vulnerability in GNU tar 1.13.19 through 1.13.25, and possibly later versions, allows attackers to overwrite arbitrary files during archive extraction via a (1) "/.." or (2) "./.." string, which removes the leading slash but leaves the "..", a variant of CVE-2001-1267.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2002-0399.html">CVE-2002-0399</cve>
<bugzilla href="https://bugzilla.suse.com/145081">SUSE bug 145081</bugzilla>
<bugzilla href="https://bugzilla.suse.com/299738">SUSE bug 299738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/299745">SUSE bug 299745</bugzilla>
<bugzilla href="https://bugzilla.suse.com/299747">SUSE bug 299747</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199231" comment="tar-1.26-1.2.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20022443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2002-2443</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2002-2443" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2443" source="CVE"/>
    <description>
    schpw.c in the kpasswd service in kadmind in MIT Kerberos 5 (aka krb5) before 1.11.3 does not properly validate UDP packets before sending responses, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged packet that triggers a communication loop, as demonstrated by krb_pingpong.nasl, a related issue to CVE-1999-0103.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2002-2443.html">CVE-2002-2443</cve>
<bugzilla href="https://bugzilla.suse.com/825985">SUSE bug 825985</bugzilla>
<bugzilla href="https://bugzilla.suse.com/871411">SUSE bug 871411</bugzilla>
<bugzilla href="https://bugzilla.suse.com/887734">SUSE bug 887734</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210999" comment="krb5-1.6.3-133.49.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204565" comment="krb5-32bit-1.6.3-133.49.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009211002" comment="krb5-apps-clients-1.6.3-133.49.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009211003" comment="krb5-apps-servers-1.6.3-133.49.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009211001" comment="krb5-client-1.6.3-133.49.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208701" comment="krb5-doc-1.6.3-133.49.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208702" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208703" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009211004" comment="krb5-server-1.6.3-133.49.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208704" comment="krb5-x86-1.6.3-133.49.62 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210999" comment="krb5-1.6.3-133.49.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009211000" comment="krb5-32bit-1.6.3-133.49.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009211002" comment="krb5-apps-clients-1.6.3-133.49.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009211003" comment="krb5-apps-servers-1.6.3-133.49.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009211001" comment="krb5-client-1.6.3-133.49.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009211004" comment="krb5-server-1.6.3-133.49.56 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20031418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2003-1418</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2003-1418" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1418" source="CVE"/>
    <description>
    Apache HTTP Server 1.3.22 through 1.3.27 on OpenBSD allows remote attackers to obtain sensitive information via (1) the ETag header, which reveals the inode number, or (2) multipart MIME boundary, which reveals child process IDs (PID).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2003-1418.html">CVE-2003-1418</cve>
<bugzilla href="https://bugzilla.suse.com/713970">SUSE bug 713970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/907477">SUSE bug 907477</bugzilla>
<bugzilla href="https://bugzilla.suse.com/917402">SUSE bug 917402</bugzilla>
<bugzilla href="https://bugzilla.suse.com/970126">SUSE bug 970126</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199855" comment="apache2-2.2.12-1.51.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199856" comment="apache2-doc-2.2.12-1.51.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199857" comment="apache2-example-pages-2.2.12-1.51.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199858" comment="apache2-prefork-2.2.12-1.51.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199859" comment="apache2-utils-2.2.12-1.51.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199860" comment="apache2-worker-2.2.12-1.51.52 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0230</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2004-0230" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0230" source="CVE"/>
    <description>
    TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2004-0230.html">CVE-2004-0230</cve>
<bugzilla href="https://bugzilla.suse.com/1119974">SUSE bug 1119974</bugzilla>
<bugzilla href="https://bugzilla.suse.com/969340">SUSE bug 969340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/989152">SUSE bug 989152</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208770" comment="kernel-default-man-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205650" comment="kernel-pae-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205651" comment="kernel-pae-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205652" comment="kernel-pae-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0801</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2004-0801" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0801" source="CVE"/>
    <description>
    Unknown vulnerability in foomatic-rip in Foomatic before 3.0.2 allows local users or remote attackers with access to CUPS to execute arbitrary commands.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2004-0801.html">CVE-2004-0801</cve>
<bugzilla href="https://bugzilla.suse.com/59233">SUSE bug 59233</bugzilla>
<bugzilla href="https://bugzilla.suse.com/698451">SUSE bug 698451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/704608">SUSE bug 704608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/852368">SUSE bug 852368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/957531">SUSE bug 957531</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198898" comment="hplip-3.11.10-0.6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198899" comment="hplip-hpijs-3.11.10-0.6.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20042771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-2771</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2004-2771" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2771" source="CVE"/>
    <description>
    The expand function in fio.c in Heirloom mailx 12.5 and earlier and BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in an email address.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2004-2771.html">CVE-2004-2771</cve>
<bugzilla href="https://bugzilla.suse.com/909208">SUSE bug 909208</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204672" comment="mailx-12.5-1.7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0094</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2005-0094" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0094" source="CVE"/>
    <description>
    Buffer overflow in the gopherToHTML function in the Gopher reply parser for Squid 2.5.STABLE7 and earlier allows remote malicious Gopher servers to cause a denial of service (crash) via crafted responses.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2005-0094.html">CVE-2005-0094</cve>
<bugzilla href="https://bugzilla.suse.com/65023">SUSE bug 65023</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199784" comment="squid3-3.1.12-8.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1349</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2005-1349" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1349" source="CVE"/>
    <description>
    Buffer overflow in Convert-UUlib (Convert::UUlib) before 1.051 allows remote attackers to execute arbitrary code via a malformed parameter to a read operation.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2005-1349.html">CVE-2005-1349</cve>
<bugzilla href="https://bugzilla.suse.com/81068">SUSE bug 81068</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198668" comment="amavisd-new-2.7.0-18.7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2475</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2005-2475" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2475" source="CVE"/>
    <description>
    Race condition in Unzip 5.52 allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by Unzip after the decompression is complete.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2005-2475.html">CVE-2005-2475</cve>
<bugzilla href="https://bugzilla.suse.com/274156">SUSE bug 274156</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199242" comment="unzip-6.00-11.7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0225</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-0225" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0225" source="CVE"/>
    <description>
    scp in OpenSSH 4.2p1 allows attackers to execute arbitrary commands via filenames that contain shell metacharacters or spaces, which are expanded twice.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-0225.html">CVE-2006-0225</cve>
<bugzilla href="https://bugzilla.suse.com/143435">SUSE bug 143435</bugzilla>
<bugzilla href="https://bugzilla.suse.com/206456">SUSE bug 206456</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199733" comment="openssh-6.2p2-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199734" comment="openssh-askpass-6.2p2-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0743</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-0743" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0743" source="CVE"/>
    <description>
    Format string vulnerability in LocalSyslogAppender in Apache log4net 1.2.9 might allow remote attackers to cause a denial of service (memory corruption and termination) via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-0743.html">CVE-2006-0743</cve>
<bugzilla href="https://bugzilla.suse.com/148685">SUSE bug 148685</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198547" comment="log4net-1.2.10-1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0855</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-0855" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0855" source="CVE"/>
    <description>
    Stack-based buffer overflow in the fullpath function in misc.c for zoo 2.10 and earlier, as used in products such as Barracuda Spam Firewall, allows user-assisted attackers to execute arbitrary code via a crafted ZOO file that causes the combine function to return a longer string than expected.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-0855.html">CVE-2006-0855</cve>
<bugzilla href="https://bugzilla.suse.com/153057">SUSE bug 153057</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251871" comment="zoo-2.10-911 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0903</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-0903" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0903" source="CVE"/>
    <description>
    MySQL 5.0.18 and earlier allows local users to bypass logging mechanisms via SQL queries that contain the NULL character, which are not properly handled by the mysql_real_query function.  NOTE: this issue was originally reported for the mysql_query function, but the vendor states that since mysql_query expects a null character, this is not an issue for mysql_query.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-0903.html">CVE-2006-0903</cve>
<bugzilla href="https://bugzilla.suse.com/163157">SUSE bug 163157</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199635" comment="mysql-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199636" comment="mysql-client-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199637" comment="mysql-tools-5.5.31-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1932</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-1932" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1932" source="CVE"/>
    <description>
    Off-by-one error in the OID printing routine in Ethereal 0.10.x up to 0.10.14 has unknown impact and remote attack vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-1932.html">CVE-2006-1932</cve>
<bugzilla href="https://bugzilla.suse.com/167928">SUSE bug 167928</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2191</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-2191" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2191" source="CVE"/>
    <description>
    ** DISPUTED **  Format string vulnerability in Mailman before 2.1.9 allows attackers to execute arbitrary code via unspecified vectors. NOTE: the vendor has disputed this vulnerability, stating that it is "unexploitable."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-2191.html">CVE-2006-2191</cve>
<bugzilla href="https://bugzilla.suse.com/191548">SUSE bug 191548</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199711" comment="mailman-2.1.14-9.6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2223</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-2223" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2223" source="CVE"/>
    <description>
    RIPd in Quagga 0.98 and 0.99 before 20060503 does not properly implement configurations that (1) disable RIPv1 or (2) require plaintext or MD5 authentication, which allows remote attackers to obtain sensitive information (routing state) via REQUEST packets such as SEND UPDATE.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-2223.html">CVE-2006-2223</cve>
<bugzilla href="https://bugzilla.suse.com/173828">SUSE bug 173828</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199766" comment="quagga-0.99.15-0.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2450</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-2450" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2450" source="CVE"/>
    <description>
    auth.c in LibVNCServer 0.7.1 allows remote attackers to bypass authentication via a request in which the client specifies an insecure security type such as "Type 1 - None", which is accepted even if it is not offered by the server, a different issue than CVE-2006-2369.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-2450.html">CVE-2006-2450</cve>
<bugzilla href="https://bugzilla.suse.com/184418">SUSE bug 184418</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198088" comment="LibVNCServer-0.9.1-154 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2607</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-2607" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2607" source="CVE"/>
    <description>
    do_command.c in Vixie cron (vixie-cron) 4.1 does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits, as originally demonstrated by a program that exceeds the process limits as defined in /etc/security/limits.conf.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-2607.html">CVE-2006-2607</cve>
<bugzilla href="https://bugzilla.suse.com/178863">SUSE bug 178863</bugzilla>
<bugzilla href="https://bugzilla.suse.com/537178">SUSE bug 537178</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199385" comment="cron-4.1-194.207 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2937</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-2937" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2937" source="CVE"/>
    <description>
    OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a denial of service (infinite loop and memory consumption) via malformed ASN.1 structures that trigger an improperly handled error condition.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-2937.html">CVE-2006-2937</cve>
<bugzilla href="https://bugzilla.suse.com/202366">SUSE bug 202366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/207635">SUSE bug 207635</bugzilla>
<bugzilla href="https://bugzilla.suse.com/215623">SUSE bug 215623</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199638" comment="libopenssl0_9_8-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199639" comment="libopenssl0_9_8-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199640" comment="libopenssl0_9_8-hmac-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199641" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199642" comment="libopenssl0_9_8-x86-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199643" comment="openssl-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199644" comment="openssl-doc-0.9.8j-0.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2940</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-2940" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2940" source="CVE"/>
    <description>
    OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) "public exponent" or (2) "public modulus" values in X.509 certificates that require extra time to process when using RSA signature verification.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-2940.html">CVE-2006-2940</cve>
<bugzilla href="https://bugzilla.suse.com/202366">SUSE bug 202366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/207635">SUSE bug 207635</bugzilla>
<bugzilla href="https://bugzilla.suse.com/208971">SUSE bug 208971</bugzilla>
<bugzilla href="https://bugzilla.suse.com/215623">SUSE bug 215623</bugzilla>
<bugzilla href="https://bugzilla.suse.com/223040">SUSE bug 223040</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199638" comment="libopenssl0_9_8-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199639" comment="libopenssl0_9_8-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199640" comment="libopenssl0_9_8-hmac-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199641" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199642" comment="libopenssl0_9_8-x86-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199643" comment="openssl-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199644" comment="openssl-doc-0.9.8j-0.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2941</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-2941" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2941" source="CVE"/>
    <description>
    Mailman before 2.1.9rc1 allows remote attackers to cause a denial of service via unspecified vectors involving "standards-breaking RFC 2231 formatted headers".
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-2941.html">CVE-2006-2941</cve>
<bugzilla href="https://bugzilla.suse.com/191548">SUSE bug 191548</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199711" comment="mailman-2.1.14-9.6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3403</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-3403" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3403" source="CVE"/>
    <description>
    The smdb daemon (smbd/service.c) in Samba 3.0.1 through 3.0.22 allows remote attackers to cause a denial of service (memory consumption) via a large number of share connection requests.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-3403.html">CVE-2006-3403</cve>
<bugzilla href="https://bugzilla.suse.com/190468">SUSE bug 190468</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199376" comment="cifs-utils-5.1-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199555" comment="ldapsmb-1.34b-12.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199556" comment="libldb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199557" comment="libsmbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199558" comment="libsmbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199559" comment="libsmbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199560" comment="libtalloc2-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199561" comment="libtalloc2-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199562" comment="libtalloc2-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199563" comment="libtdb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199564" comment="libtdb1-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199565" comment="libtdb1-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199566" comment="libtevent0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199567" comment="libwbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199568" comment="libwbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199569" comment="libwbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199570" comment="samba-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199571" comment="samba-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199572" comment="samba-client-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199573" comment="samba-client-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199574" comment="samba-client-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199575" comment="samba-krb-printing-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199576" comment="samba-winbind-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199577" comment="samba-winbind-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199578" comment="samba-winbind-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199579" comment="samba-x86-3.6.3-0.39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-3636" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3636" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in Mailman before 2.1.9rc1 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-3636.html">CVE-2006-3636</cve>
<bugzilla href="https://bugzilla.suse.com/191548">SUSE bug 191548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/359182">SUSE bug 359182</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199711" comment="mailman-2.1.14-9.6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3694</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-3694" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3694" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Ruby before 1.8.5 allow remote attackers to bypass "safe level" checks via unspecified vectors involving (1) the alias function and (2) "directory operations".
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-3694.html">CVE-2006-3694</cve>
<bugzilla href="https://bugzilla.suse.com/193661">SUSE bug 193661</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199778" comment="ruby-1.8.7.p357-0.9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199779" comment="ruby-doc-html-1.8.7.p357-0.9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199780" comment="ruby-tk-1.8.7.p357-0.9.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3738</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-3738" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3738" source="CVE"/>
    <description>
    Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-3738.html">CVE-2006-3738</cve>
<bugzilla href="https://bugzilla.suse.com/202366">SUSE bug 202366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/207635">SUSE bug 207635</bugzilla>
<bugzilla href="https://bugzilla.suse.com/215623">SUSE bug 215623</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199638" comment="libopenssl0_9_8-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199639" comment="libopenssl0_9_8-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199640" comment="libopenssl0_9_8-hmac-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199641" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199642" comment="libopenssl0_9_8-x86-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199643" comment="openssl-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199644" comment="openssl-doc-0.9.8j-0.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3746</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-3746" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3746" source="CVE"/>
    <description>
    Integer overflow in parse_comment in GnuPG (gpg) 1.4.4 allows remote attackers to cause a denial of service (segmentation fault) via a crafted message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-3746.html">CVE-2006-3746</cve>
<bugzilla href="https://bugzilla.suse.com/195569">SUSE bug 195569</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199483" comment="gpg2-2.0.9-25.33.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199484" comment="gpg2-lang-2.0.9-25.33.31 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3747</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-3747" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3747" source="CVE"/>
    <description>
    Off-by-one error in the ldap scheme handling in the Rewrite module (mod_rewrite) in Apache 1.3 from 1.3.28, 2.0.46 and other versions before 2.0.59, and 2.2, when RewriteEngine is enabled, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted URLs that are not properly handled using certain rewrite rules.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-3747.html">CVE-2006-3747</cve>
<bugzilla href="https://bugzilla.suse.com/194675">SUSE bug 194675</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199288" comment="apache2-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199289" comment="apache2-doc-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199290" comment="apache2-example-pages-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199291" comment="apache2-prefork-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199292" comment="apache2-utils-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199293" comment="apache2-worker-2.2.12-1.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-4182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4182" source="CVE"/>
    <description>
    Integer overflow in ClamAV 0.88.1 and 0.88.4, and other versions before 0.88.5, allows remote attackers to cause a denial of service (scanning service crash) and execute arbitrary code via a crafted Portable Executable (PE) file that leads to a heap-based buffer overflow when less memory is allocated than expected.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-4182.html">CVE-2006-4182</cve>
<bugzilla href="https://bugzilla.suse.com/212898">SUSE bug 212898</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199377" comment="clamav-0.97.7-0.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4197</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-4197" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4197" source="CVE"/>
    <description>
    Multiple buffer overflows in libmusicbrainz (aka mb_client or MusicBrainz Client Library) 2.1.2 and earlier, and SVN 8406 and earlier, allow remote attackers to cause a denial of service (crash) or execute arbitrary code via (1) a long Location header by the HTTP server, which triggers an overflow in the MBHttp::Download function in lib/http.cpp; and (2) a long URL in RDF data, as demonstrated by a URL in an rdf:resource field in an RDF XML document, which triggers overflows in many functions in lib/rdfparse.c.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-4197.html">CVE-2006-4197</cve>
<bugzilla href="https://bugzilla.suse.com/199134">SUSE bug 199134</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198458" comment="libmusicbrainz4-2.1.5-5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4226</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-4226" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4226" source="CVE"/>
    <description>
    MySQL before 4.1.21, 5.0 before 5.0.25, and 5.1 before 5.1.12, when run on case-sensitive filesystems, allows remote authenticated users to create or access a database when the database name differs only in case from a database for which they have permissions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-4226.html">CVE-2006-4226</cve>
<bugzilla href="https://bugzilla.suse.com/201711">SUSE bug 201711</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199635" comment="mysql-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199636" comment="mysql-client-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199637" comment="mysql-tools-5.5.31-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4227</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-4227" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4227" source="CVE"/>
    <description>
    MySQL before 5.0.25 and 5.1 before 5.1.12 evaluates arguments of suid routines in the security context of the routine's definer instead of the routine's caller, which allows remote authenticated users to gain privileges through a routine that has been made available using GRANT EXECUTE.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-4227.html">CVE-2006-4227</cve>
<bugzilla href="https://bugzilla.suse.com/201711">SUSE bug 201711</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199635" comment="mysql-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199636" comment="mysql-client-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199637" comment="mysql-tools-5.5.31-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4250</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-4250" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4250" source="CVE"/>
    <description>
    Buffer overflow in man and mandb (man-db) 2.4.3 and earlier allows local users to execute arbitrary code via crafted arguments to the -H flag.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-4250.html">CVE-2006-4250</cve>
<bugzilla href="https://bugzilla.suse.com/262747">SUSE bug 262747</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198549" comment="man-2.5.2-17 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4339</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-4339" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339" source="CVE"/>
    <description>
    OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-4339.html">CVE-2006-4339</cve>
<bugzilla href="https://bugzilla.suse.com/202366">SUSE bug 202366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/203595">SUSE bug 203595</bugzilla>
<bugzilla href="https://bugzilla.suse.com/206636">SUSE bug 206636</bugzilla>
<bugzilla href="https://bugzilla.suse.com/207635">SUSE bug 207635</bugzilla>
<bugzilla href="https://bugzilla.suse.com/215623">SUSE bug 215623</bugzilla>
<bugzilla href="https://bugzilla.suse.com/218303">SUSE bug 218303</bugzilla>
<bugzilla href="https://bugzilla.suse.com/233584">SUSE bug 233584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/564512">SUSE bug 564512</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199364" comment="bind-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199365" comment="bind-chrootenv-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199366" comment="bind-doc-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199367" comment="bind-libs-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199368" comment="bind-libs-32bit-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199369" comment="bind-libs-x86-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199370" comment="bind-utils-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199638" comment="libopenssl0_9_8-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199639" comment="libopenssl0_9_8-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199640" comment="libopenssl0_9_8-hmac-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199641" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199642" comment="libopenssl0_9_8-x86-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199643" comment="openssl-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199644" comment="openssl-doc-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199735" comment="openvpn-2.0.9-143.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199736" comment="openvpn-auth-pam-plugin-2.0.9-143.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4343</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-4343" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4343" source="CVE"/>
    <description>
    The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-4343.html">CVE-2006-4343</cve>
<bugzilla href="https://bugzilla.suse.com/202366">SUSE bug 202366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/207635">SUSE bug 207635</bugzilla>
<bugzilla href="https://bugzilla.suse.com/215623">SUSE bug 215623</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199638" comment="libopenssl0_9_8-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199639" comment="libopenssl0_9_8-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199640" comment="libopenssl0_9_8-hmac-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199641" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199642" comment="libopenssl0_9_8-x86-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199643" comment="openssl-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199644" comment="openssl-doc-0.9.8j-0.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-4484" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4484" source="CVE"/>
    <description>
    Buffer overflow in the LWZReadByte_ function in ext/gd/libgd/gd_gif_in.c in the GD extension in PHP before 5.1.5 allows remote attackers to have an unknown impact via a GIF file with input_code_size greater than MAX_LWZ_BITS, which triggers an overflow when initializing the table array.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-4484.html">CVE-2006-4484</cve>
<bugzilla href="https://bugzilla.suse.com/200181">SUSE bug 200181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/355864">SUSE bug 355864</bugzilla>
<bugzilla href="https://bugzilla.suse.com/356187">SUSE bug 356187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/357978">SUSE bug 357978</bugzilla>
<bugzilla href="https://bugzilla.suse.com/372642">SUSE bug 372642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/374257">SUSE bug 374257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/386009">SUSE bug 386009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/709852">SUSE bug 709852</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198596" comment="perl-Tk-804.028-50 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4574</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-4574" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4574" source="CVE"/>
    <description>
    Off-by-one error in the MIME Multipart dissector in Wireshark (formerly Ethereal) 0.10.1 through 0.99.3 allows remote attackers to cause a denial of service (crash) via certain vectors that trigger an assertion error related to unexpected length values.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-4574.html">CVE-2006-4574</cve>
<bugzilla href="https://bugzilla.suse.com/213226">SUSE bug 213226</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4790</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-4790" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4790" source="CVE"/>
    <description>
    verify.c in GnuTLS before 1.4.4, when using an RSA key with exponent 3, does not properly handle excess data in the digestAlgorithm.parameters field when generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents GnuTLS from correctly verifying X.509 and other certificates that use PKCS, a variant of CVE-2006-4339.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-4790.html">CVE-2006-4790</cve>
<bugzilla href="https://bugzilla.suse.com/1107874">SUSE bug 1107874</bugzilla>
<bugzilla href="https://bugzilla.suse.com/206636">SUSE bug 206636</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199478" comment="gnutls-2.4.1-24.39.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199479" comment="libgnutls-extra26-2.4.1-24.39.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199480" comment="libgnutls26-2.4.1-24.39.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199481" comment="libgnutls26-32bit-2.4.1-24.39.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199482" comment="libgnutls26-x86-2.4.1-24.39.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-4805" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4805" source="CVE"/>
    <description>
    epan/dissectors/packet-xot.c in the XOT dissector (dissect_xot_pdu) in Wireshark (formerly Ethereal) 0.9.8 through 0.99.3 allows remote attackers to cause a denial of service (memory consumption and crash) via an encoded XOT packet that produces a zero length value when it is decoded.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-4805.html">CVE-2006-4805</cve>
<bugzilla href="https://bugzilla.suse.com/213226">SUSE bug 213226</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4811</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-4811" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4811" source="CVE"/>
    <description>
    Integer overflow in Qt 3.3 before 3.3.7, 4.1 before 4.1.5, and 4.2 before 4.2.1, as used in the KDE khtml library, kdelibs 3.1.3, and possibly other packages, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted pixmap image.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-4811.html">CVE-2006-4811</cve>
<bugzilla href="https://bugzilla.suse.com/212544">SUSE bug 212544</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199582" comment="libQtWebKit4-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199583" comment="libQtWebKit4-32bit-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199584" comment="libQtWebKit4-x86-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199585" comment="libqt4-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199586" comment="libqt4-32bit-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199587" comment="libqt4-qt3support-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199588" comment="libqt4-qt3support-32bit-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199589" comment="libqt4-qt3support-x86-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199590" comment="libqt4-sql-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199591" comment="libqt4-sql-32bit-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199592" comment="libqt4-sql-mysql-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199593" comment="libqt4-sql-sqlite-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199594" comment="libqt4-sql-x86-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199595" comment="libqt4-x11-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199596" comment="libqt4-x11-32bit-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199597" comment="libqt4-x11-x86-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199598" comment="libqt4-x86-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198610" comment="qt3-3.3.8b-88 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198611" comment="qt3-32bit-3.3.8b-88 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198612" comment="qt3-x86-3.3.8b-88 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199599" comment="qt4-x11-tools-4.6.3-5.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5170</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-5170" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5170" source="CVE"/>
    <description>
    pam_ldap in nss_ldap on Red Hat Enterprise Linux 4, Fedora Core 3 and earlier, and possibly other distributions does not return an error condition when an LDAP directory server responds with a PasswordPolicyResponse control response, which causes the pam_authenticate function to return a success code even if authentication has failed, as originally reported for xscreensaver.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-5170.html">CVE-2006-5170</cve>
<bugzilla href="https://bugzilla.suse.com/210158">SUSE bug 210158</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198584" comment="pam_ldap-184-147 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198585" comment="pam_ldap-32bit-184-147 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198586" comment="pam_ldap-x86-184-147 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5295</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-5295" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5295" source="CVE"/>
    <description>
    Unspecified vulnerability in ClamAV before 0.88.5 allows remote attackers to cause a denial of service (scanning service crash) via a crafted Compressed HTML Help (CHM) file that causes ClamAV to "read an invalid memory location."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-5295.html">CVE-2006-5295</cve>
<bugzilla href="https://bugzilla.suse.com/212898">SUSE bug 212898</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199377" comment="clamav-0.97.7-0.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5456</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-5456" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5456" source="CVE"/>
    <description>
    Multiple buffer overflows in GraphicsMagick before 1.1.7 and ImageMagick 6.0.7 allow user-assisted attackers to cause a denial of service and possibly execute arbitrary code via (1) a DCM image that is not properly handled by the ReadDCMImage function in coders/dcm.c, or (2) a PALM image that is not properly handled by the ReadPALMImage function in coders/palm.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-5456.html">CVE-2006-5456</cve>
<bugzilla href="https://bugzilla.suse.com/215685">SUSE bug 215685</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199580" comment="libMagickCore1-6.4.3.6-7.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199581" comment="libMagickCore1-32bit-6.4.3.6-7.26 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5461</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-5461" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5461" source="CVE"/>
    <description>
    Avahi before 0.6.15 does not verify the sender identity of netlink messages to ensure that they come from the kernel instead of another process, which allows local users to spoof network changes to Avahi.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-5461.html">CVE-2006-5461</cve>
<bugzilla href="https://bugzilla.suse.com/216219">SUSE bug 216219</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199351" comment="avahi-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199352" comment="avahi-lang-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199353" comment="avahi-utils-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199354" comment="libavahi-client3-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199355" comment="libavahi-client3-32bit-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199356" comment="libavahi-client3-x86-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199357" comment="libavahi-common3-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199358" comment="libavahi-common3-32bit-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199359" comment="libavahi-common3-x86-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199360" comment="libavahi-core5-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199361" comment="libdns_sd-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199362" comment="libdns_sd-32bit-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199363" comment="libdns_sd-x86-0.6.23-11.30 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5467</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-5467" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5467" source="CVE"/>
    <description>
    The cgi.rb CGI library for Ruby 1.8 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via an HTTP request with a multipart MIME body that contains an invalid boundary specifier, as demonstrated using a specifier that begins with a "-" instead of "--" and contains an inconsistent ID.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-5467.html">CVE-2006-5467</cve>
<bugzilla href="https://bugzilla.suse.com/214916">SUSE bug 214916</bugzilla>
<bugzilla href="https://bugzilla.suse.com/225983">SUSE bug 225983</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199778" comment="ruby-1.8.7.p357-0.9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199779" comment="ruby-doc-html-1.8.7.p357-0.9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199780" comment="ruby-tk-1.8.7.p357-0.9.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5468</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-5468" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5468" source="CVE"/>
    <description>
    Unspecified vulnerability in the HTTP dissector in Wireshark (formerly Ethereal) 0.99.3 allows remote attackers to cause a denial of service (crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-5468.html">CVE-2006-5468</cve>
<bugzilla href="https://bugzilla.suse.com/213226">SUSE bug 213226</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5469</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-5469" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5469" source="CVE"/>
    <description>
    Unspecified vulnerability in the WBXML dissector in Wireshark (formerly Ethereal) 0.10.11 through 0.99.3 allows remote attackers to cause a denial of service (crash) via certain vectors that trigger a null dereference.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-5469.html">CVE-2006-5469</cve>
<bugzilla href="https://bugzilla.suse.com/213226">SUSE bug 213226</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5680</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-5680" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5680" source="CVE"/>
    <description>
    The libarchive library in FreeBSD 6-STABLE after 2006-09-05 and before 2006-11-08 allows context-dependent attackers to cause a denial of service (CPU consumption) via a malformed archive that causes libarchive to skip a region past the actual end of the archive, which triggers an infinite loop that attempts to read more data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-5680.html">CVE-2006-5680</cve>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198436" comment="libarchive2-2.5.5-5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5740</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-5740" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5740" source="CVE"/>
    <description>
    Unspecified vulnerability in the LDAP dissector in Wireshark (formerly Ethereal) 0.99.3 allows remote attackers to cause a denial of service (crash) via a crafted LDAP packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-5740.html">CVE-2006-5740</cve>
<bugzilla href="https://bugzilla.suse.com/213226">SUSE bug 213226</bugzilla>
<bugzilla href="https://bugzilla.suse.com/374694">SUSE bug 374694</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5752</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-5752" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5752" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in mod_status.c in the mod_status module in Apache HTTP Server (httpd), when ExtendedStatus is enabled and a public server-status page is used, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving charsets with browsers that perform "charset detection" when the content-type is not specified.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-5752.html">CVE-2006-5752</cve>
<bugzilla href="https://bugzilla.suse.com/289996">SUSE bug 289996</bugzilla>
<bugzilla href="https://bugzilla.suse.com/308637">SUSE bug 308637</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199288" comment="apache2-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199289" comment="apache2-doc-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199290" comment="apache2-example-pages-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199291" comment="apache2-prefork-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199292" comment="apache2-utils-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199293" comment="apache2-worker-2.2.12-1.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5793</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-5793" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5793" source="CVE"/>
    <description>
    The sPLT chunk handling code (png_set_sPLT function in pngset.c) in libpng 1.0.6 through 1.2.12 uses a sizeof operator on the wrong data type, which allows context-dependent attackers to cause a denial of service (crash) via malformed sPLT chunks that trigger an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-5793.html">CVE-2006-5793</cve>
<bugzilla href="https://bugzilla.suse.com/219007">SUSE bug 219007</bugzilla>
<bugzilla href="https://bugzilla.suse.com/222859">SUSE bug 222859</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199646" comment="libpng12-0-1.2.31-5.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199647" comment="libpng12-0-32bit-1.2.31-5.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199648" comment="libpng12-0-x86-1.2.31-5.31 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5864</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-5864" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5864" source="CVE"/>
    <description>
    Stack-based buffer overflow in the ps_gettext function in ps.c for GNU gv 3.6.2, and possibly earlier versions, allows user-assisted attackers to execute arbitrary code via a PostScript (PS) file with certain headers that contain long comments, as demonstrated using the (1) DocumentMedia, (2) DocumentPaperSizes, and possibly (3) PageMedia and (4) PaperSize headers.  NOTE: this issue can be exploited through other products that use gv such as evince.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-5864.html">CVE-2006-5864</cve>
<bugzilla href="https://bugzilla.suse.com/219454">SUSE bug 219454</bugzilla>
<bugzilla href="https://bugzilla.suse.com/225201">SUSE bug 225201</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198821" comment="evince-2.28.2-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198822" comment="evince-doc-2.28.2-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198823" comment="evince-lang-2.28.2-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5867</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-5867" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5867" source="CVE"/>
    <description>
    fetchmail before 6.3.6-rc4 does not properly enforce TLS and may transmit cleartext passwords over unsecured links if certain circumstances occur, which allows remote attackers to obtain sensitive information via man-in-the-middle (MITM) attacks.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-5867.html">CVE-2006-5867</cve>
<bugzilla href="https://bugzilla.suse.com/223507">SUSE bug 223507</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198828" comment="fetchmail-6.3.8.90-13.20.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198829" comment="fetchmailconf-6.3.8.90-13.20.19 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5874</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-5874" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5874" source="CVE"/>
    <description>
    Clam AntiVirus (ClamAV) 0.88 and earlier allows remote attackers to cause a denial of service (crash) via a malformed base64-encoded MIME attachment that triggers a null pointer dereference.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-5874.html">CVE-2006-5874</cve>
<bugzilla href="https://bugzilla.suse.com/227827">SUSE bug 227827</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199377" comment="clamav-0.97.7-0.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5876</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-5876" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5876" source="CVE"/>
    <description>
    The soup_headers_parse function in soup-headers.c for libsoup HTTP library before 2.2.99 allows remote attackers to cause a denial of service (crash) via malformed HTTP headers, probably involving missing fields or values.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-5876.html">CVE-2006-5876</cve>
<bugzilla href="https://bugzilla.suse.com/235084">SUSE bug 235084</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199672" comment="libsoup-2_4-1-2.32.2-4.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199673" comment="libsoup-2_4-1-32bit-2.32.2-4.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199674" comment="libsoup-2_4-1-x86-2.32.2-4.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5969</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-5969" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5969" source="CVE"/>
    <description>
    CRLF injection vulnerability in the evalFolderLine function in fvwm 2.5.18 and earlier allows local users to execute arbitrary commands via carriage returns in a directory name, which is not properly handled by fvwm-menu-directory, a variant of CVE-2003-1308.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-5969.html">CVE-2006-5969</cve>
<bugzilla href="https://bugzilla.suse.com/220708">SUSE bug 220708</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198277" comment="fvwm2-2.5.26-1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5974</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-5974" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5974" source="CVE"/>
    <description>
    fetchmail 6.3.5 and 6.3.6 before 6.3.6-rc4, when refusing a message delivered via the mda option, allows remote attackers to cause a denial of service (crash) via unknown vectors that trigger a NULL pointer dereference when calling the (1) ferror or (2) fflush functions.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-5974.html">CVE-2006-5974</cve>
<bugzilla href="https://bugzilla.suse.com/223507">SUSE bug 223507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/239002">SUSE bug 239002</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198828" comment="fetchmail-6.3.8.90-13.20.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198829" comment="fetchmailconf-6.3.8.90-13.20.19 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6077</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-6077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6077" source="CVE"/>
    <description>
    The (1) Password Manager in Mozilla Firefox 2.0, and 1.5.0.8 and earlier; and the (2) Passcard Manager in Netscape 8.1.2 and possibly other versions, do not properly verify that an ACTION URL in a FORM element containing a password INPUT element matches the web site for which the user stored a password, which allows remote attackers to obtain passwords via a password INPUT element on a different web page located on the web site intended for this password.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-6077.html">CVE-2006-6077</cve>
<bugzilla href="https://bugzilla.suse.com/244923">SUSE bug 244923</bugzilla>
<bugzilla href="https://bugzilla.suse.com/550618">SUSE bug 550618</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6097</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-6097" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6097" source="CVE"/>
    <description>
    GNU tar 1.16 and 1.15.1, and possibly other versions, allows user-assisted attackers to overwrite arbitrary files via a tar file that contains a GNUTYPE_NAMES record with a symbolic link, which is not properly handled by the extract_archive function in extract.c and extract_mangle function in mangle.c, a variant of CVE-2002-1216.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-6097.html">CVE-2006-6097</cve>
<bugzilla href="https://bugzilla.suse.com/223185">SUSE bug 223185</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199231" comment="tar-1.26-1.2.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6101</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-6101" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6101" source="CVE"/>
    <description>
    Integer overflow in the ProcRenderAddGlyphs function in the Render extension for X.Org 6.8.2, 6.9.0, 7.0, and 7.1, and XFree86 X server, allows local users to execute arbitrary code via a crafted X protocol request that triggers memory corruption during processing of glyph management data structures.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-6101.html">CVE-2006-6101</cve>
<bugzilla href="https://bugzilla.suse.com/225972">SUSE bug 225972</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199825" comment="xorg-x11-Xvnc-7.4-27.81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199826" comment="xorg-x11-server-7.4-27.81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199827" comment="xorg-x11-server-extra-7.4-27.81 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6102</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-6102" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6102" source="CVE"/>
    <description>
    Integer overflow in the ProcDbeGetVisualInfo function in the DBE extension for X.Org 6.8.2, 6.9.0, 7.0, and 7.1, and XFree86 X server, allows local users to execute arbitrary code via a crafted X protocol request that triggers memory corruption during processing of unspecified data structures.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-6102.html">CVE-2006-6102</cve>
<bugzilla href="https://bugzilla.suse.com/225974">SUSE bug 225974</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199825" comment="xorg-x11-Xvnc-7.4-27.81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199826" comment="xorg-x11-server-7.4-27.81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199827" comment="xorg-x11-server-extra-7.4-27.81 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6103</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-6103" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6103" source="CVE"/>
    <description>
    Integer overflow in the ProcDbeSwapBuffers function in the DBE extension for X.Org 6.8.2, 6.9.0, 7.0, and 7.1, and XFree86 X server, allows local users to execute arbitrary code via a crafted X protocol request that triggers memory corruption during processing of unspecified data structures.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-6103.html">CVE-2006-6103</cve>
<bugzilla href="https://bugzilla.suse.com/225975">SUSE bug 225975</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199825" comment="xorg-x11-Xvnc-7.4-27.81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199826" comment="xorg-x11-server-7.4-27.81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199827" comment="xorg-x11-server-extra-7.4-27.81 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6107</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-6107" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6107" source="CVE"/>
    <description>
    Unspecified vulnerability in the match_rule_equal function in bus/signals.c in D-Bus before 1.0.2 allows local applications to remove match rules for other applications and cause a denial of service (lost process messages).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-6107.html">CVE-2006-6107</cve>
<bugzilla href="https://bugzilla.suse.com/224811">SUSE bug 224811</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199397" comment="dbus-1-1.2.10-3.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199398" comment="dbus-1-32bit-1.2.10-3.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199399" comment="dbus-1-x11-1.2.10-3.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199400" comment="dbus-1-x86-1.2.10-3.27 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-6143" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6143" source="CVE"/>
    <description>
    The RPC library in Kerberos 5 1.4 through 1.4.4, and 1.5 through 1.5.1, as used in Kerberos administration daemon (kadmind) and other products that use this library, calls an uninitialized function pointer in freed memory, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-6143.html">CVE-2006-6143</cve>
<bugzilla href="https://bugzilla.suse.com/225990">SUSE bug 225990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/225992">SUSE bug 225992</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199544" comment="krb5-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199545" comment="krb5-32bit-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199546" comment="krb5-apps-clients-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199547" comment="krb5-apps-servers-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199548" comment="krb5-client-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199549" comment="krb5-server-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199550" comment="krb5-x86-1.6.3-133.49.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6144</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-6144" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6144" source="CVE"/>
    <description>
    The "mechglue" abstraction interface of the GSS-API library for Kerberos 5 1.5 through 1.5.1, as used in Kerberos administration daemon (kadmind) and other products that use this library, allows remote attackers to cause a denial of service (crash) via unspecified vectors that cause mechglue to free uninitialized pointers.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-6144.html">CVE-2006-6144</cve>
<bugzilla href="https://bugzilla.suse.com/225990">SUSE bug 225990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/225992">SUSE bug 225992</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199544" comment="krb5-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199545" comment="krb5-32bit-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199546" comment="krb5-apps-clients-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199547" comment="krb5-apps-servers-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199548" comment="krb5-client-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199549" comment="krb5-server-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199550" comment="krb5-x86-1.6.3-133.49.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6169</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-6169" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6169" source="CVE"/>
    <description>
    Heap-based buffer overflow in the ask_outfile_name function in openfile.c for GnuPG (gpg) 1.4 and 2.0, when running interactively, might allow attackers to execute arbitrary code via messages with "C-escape" expansions, which cause the make_printable_string function to return a longer string than expected while constructing a prompt.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-6169.html">CVE-2006-6169</cve>
<bugzilla href="https://bugzilla.suse.com/224108">SUSE bug 224108</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199483" comment="gpg2-2.0.9-25.33.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199484" comment="gpg2-lang-2.0.9-25.33.31 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6303</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-6303" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6303" source="CVE"/>
    <description>
    The read_multipart function in cgi.rb in Ruby before 1.8.5-p2 does not properly detect boundaries in MIME multipart content, which allows remote attackers to cause a denial of service (infinite loop) via crafted HTTP requests, a different issue than CVE-2006-5467.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-6303.html">CVE-2006-6303</cve>
<bugzilla href="https://bugzilla.suse.com/225983">SUSE bug 225983</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199778" comment="ruby-1.8.7.p357-0.9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199779" comment="ruby-doc-html-1.8.7.p357-0.9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199780" comment="ruby-tk-1.8.7.p357-0.9.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6719</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-6719" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6719" source="CVE"/>
    <description>
    The ftp_syst function in ftp-basic.c in Free Software Foundation (FSF) GNU wget 1.10.2 allows remote attackers to cause a denial of service (application crash) via a malicious FTP server with a large number of blank 220 responses to the SYST command.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-6719.html">CVE-2006-6719</cve>
<bugzilla href="https://bugzilla.suse.com/231063">SUSE bug 231063</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198631" comment="wget-1.11.4-1.15 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6772</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-6772" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6772" source="CVE"/>
    <description>
    Format string vulnerability in the inputAnswer function in file.c in w3m before 0.5.2, when run with the dump or backend option, allows remote attackers to execute arbitrary code via format string specifiers in the Common Name (CN) field of an SSL certificate associated with an https URL.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-6772.html">CVE-2006-6772</cve>
<bugzilla href="https://bugzilla.suse.com/230775">SUSE bug 230775</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199246" comment="w3m-0.5.2-132.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6870</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-6870" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6870" source="CVE"/>
    <description>
    The consume_labels function in avahi-core/dns.c in Avahi before 0.6.16 allows remote attackers to cause a denial of service (infinite loop) via a crafted compressed DNS response with a label that points to itself.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-6870.html">CVE-2006-6870</cve>
<bugzilla href="https://bugzilla.suse.com/232050">SUSE bug 232050</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199351" comment="avahi-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199352" comment="avahi-lang-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199353" comment="avahi-utils-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199354" comment="libavahi-client3-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199355" comment="libavahi-client3-32bit-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199356" comment="libavahi-client3-x86-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199357" comment="libavahi-common3-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199358" comment="libavahi-common3-32bit-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199359" comment="libavahi-common3-x86-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199360" comment="libavahi-core5-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199361" comment="libdns_sd-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199362" comment="libdns_sd-32bit-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199363" comment="libdns_sd-x86-0.6.23-11.30 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20067243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-7243</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-7243" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7243" source="CVE"/>
    <description>
    PHP before 5.3.4 accepts the \0 character in a pathname, which might allow context-dependent attackers to bypass intended access restrictions by placing a safe file extension after this character, as demonstrated by .php\0.jpg at the end of the argument to the file_exists function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-7243.html">CVE-2006-7243</cve>
<bugzilla href="https://bugzilla.suse.com/1067090">SUSE bug 1067090</bugzilla>
<bugzilla href="https://bugzilla.suse.com/654853">SUSE bug 654853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/893855">SUSE bug 893855</bugzilla>
<bugzilla href="https://bugzilla.suse.com/924970">SUSE bug 924970</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199294" comment="apache2-mod_php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199295" comment="php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199296" comment="php53-bcmath-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199297" comment="php53-bz2-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199298" comment="php53-calendar-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199299" comment="php53-ctype-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199300" comment="php53-curl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199301" comment="php53-dba-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199302" comment="php53-dom-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199303" comment="php53-exif-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199304" comment="php53-fastcgi-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199305" comment="php53-fileinfo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199306" comment="php53-ftp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199307" comment="php53-gd-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199308" comment="php53-gettext-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199309" comment="php53-gmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199310" comment="php53-iconv-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199311" comment="php53-intl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199312" comment="php53-json-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199313" comment="php53-ldap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199314" comment="php53-mbstring-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199315" comment="php53-mcrypt-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199316" comment="php53-mysql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199317" comment="php53-odbc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199318" comment="php53-openssl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199319" comment="php53-pcntl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199320" comment="php53-pdo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199321" comment="php53-pear-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199322" comment="php53-pgsql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199323" comment="php53-pspell-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199324" comment="php53-shmop-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199325" comment="php53-snmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199326" comment="php53-soap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199327" comment="php53-suhosin-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199328" comment="php53-sysvmsg-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199329" comment="php53-sysvsem-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199330" comment="php53-sysvshm-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199331" comment="php53-tokenizer-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199332" comment="php53-wddx-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199333" comment="php53-xmlreader-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199334" comment="php53-xmlrpc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199335" comment="php53-xmlwriter-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199336" comment="php53-xsl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199337" comment="php53-zip-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199338" comment="php53-zlib-5.3.17-0.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20067250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-7250</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2006-7250" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7250" source="CVE"/>
    <description>
    The mime_hdr_cmp function in crypto/asn1/asn_mime.c in OpenSSL 0.9.8t and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted S/MIME message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-7250.html">CVE-2006-7250</cve>
<bugzilla href="https://bugzilla.suse.com/748738">SUSE bug 748738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/883307">SUSE bug 883307</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199638" comment="libopenssl0_9_8-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199639" comment="libopenssl0_9_8-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199640" comment="libopenssl0_9_8-hmac-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199641" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199642" comment="libopenssl0_9_8-x86-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199643" comment="openssl-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199644" comment="openssl-doc-0.9.8j-0.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0008</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-0008" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0008" source="CVE"/>
    <description>
    Integer underflow in the SSLv2 support in Mozilla Network Security Services (NSS) before 3.11.5, as used by Firefox before 1.5.0.10 and 2.x before 2.0.0.2, SeaMonkey before 1.0.8, Thunderbird before 1.5.0.10, and certain Sun Java System server products before 20070611, allows remote attackers to execute arbitrary code via a crafted SSLv2 server message containing a public key that is too short to encrypt the "Master Secret", which results in a heap-based overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-0008.html">CVE-2007-0008</cve>
<bugzilla href="https://bugzilla.suse.com/244923">SUSE bug 244923</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0009</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-0009" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0009" source="CVE"/>
    <description>
    Stack-based buffer overflow in the SSLv2 support in Mozilla Network Security Services (NSS) before 3.11.5, as used by Firefox before 1.5.0.10 and 2.x before 2.0.0.2, Thunderbird before 1.5.0.10, SeaMonkey before 1.0.8, and certain Sun Java System server products before 20070611, allows remote attackers to execute arbitrary code via invalid "Client Master Key" length values.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-0009.html">CVE-2007-0009</cve>
<bugzilla href="https://bugzilla.suse.com/244923">SUSE bug 244923</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0010</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-0010" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0010" source="CVE"/>
    <description>
    The GdkPixbufLoader function in GIMP ToolKit (GTK+) in GTK 2 (gtk2) before 2.4.13 allows context-dependent attackers to cause a denial of service (crash) via a malformed image file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-0010.html">CVE-2007-0010</cve>
<bugzilla href="https://bugzilla.suse.com/226710">SUSE bug 226710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/233116">SUSE bug 233116</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199485" comment="gtk2-2.18.9-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199486" comment="gtk2-32bit-2.18.9-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199487" comment="gtk2-doc-2.18.9-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199488" comment="gtk2-lang-2.18.9-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199489" comment="gtk2-x86-2.18.9-0.23 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0078</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-0078" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0078" source="CVE"/>
    <description>
    BattleBlog stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database via a direct request for database/blankmaster.mdb.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-0078.html">CVE-2007-0078</cve>
<bugzilla href="https://bugzilla.suse.com/244923">SUSE bug 244923</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0079</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-0079" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0079" source="CVE"/>
    <description>
    rblog stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database via a direct request for (1) data/admin.mdb or (2) data/rblog.mdb.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-0079.html">CVE-2007-0079</cve>
<bugzilla href="https://bugzilla.suse.com/244923">SUSE bug 244923</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0104</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-0104" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0104" source="CVE"/>
    <description>
    The Adobe PDF specification 1.3, as implemented by (a) xpdf 3.0.1 patch 2, (b) kpdf in KDE before 3.5.5, (c) poppler before 0.5.4, and other products, allows remote attackers to have an unknown impact, possibly including denial of service (infinite loop), arbitrary code execution, or memory corruption, via a PDF file with a (1) crafted catalog dictionary or (2) a crafted Pages attribute that references an invalid page tree node.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-0104.html">CVE-2007-0104</cve>
<bugzilla href="https://bugzilla.suse.com/233113">SUSE bug 233113</bugzilla>
<bugzilla href="https://bugzilla.suse.com/234492">SUSE bug 234492</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199386" comment="cups-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199387" comment="cups-client-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199388" comment="cups-libs-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199389" comment="cups-libs-32bit-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199390" comment="cups-libs-x86-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199649" comment="libpoppler-glib4-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199650" comment="libpoppler-qt4-3-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199651" comment="libpoppler5-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199652" comment="poppler-tools-0.12.3-1.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0157</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-0157" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0157" source="CVE"/>
    <description>
    Array index error in the uri_lookup function in the URI parser for neon 0.26.0 to 0.26.2, possibly only on 64-bit platforms, allows remote malicious servers to cause a denial of service (crash) via a URI with non-ASCII characters, which triggers a buffer under-read due to a type conversion error that generates a negative index.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-0157.html">CVE-2007-0157</cve>
<bugzilla href="https://bugzilla.suse.com/235083">SUSE bug 235083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199031" comment="libneon27-0.29.6-6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199032" comment="libneon27-32bit-0.29.6-6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199033" comment="libneon27-x86-0.29.6-6.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0235</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-0235" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0235" source="CVE"/>
    <description>
    Stack-based buffer overflow in the glibtop_get_proc_map_s function in libgtop before 2.14.6 (libgtop2) allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a process with a long filename that is mapped in its address space, which triggers the overflow in gnome-system-monitor.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-0235.html">CVE-2007-0235</cve>
<bugzilla href="https://bugzilla.suse.com/235086">SUSE bug 235086</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199626" comment="libgtop-2.28.0-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199627" comment="libgtop-2_0-7-2.28.0-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199628" comment="libgtop-doc-2.28.0-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199629" comment="libgtop-lang-2.28.0-1.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0242</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-0242" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0242" source="CVE"/>
    <description>
    The UTF-8 decoder in codecs/qutfcodec.cpp in Qt 3.3.8 and 4.2.3 does not reject long UTF-8 sequences as required by the standard, which allows remote attackers to conduct cross-site scripting (XSS) and directory traversal attacks via long sequences that decode to dangerous metacharacters.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-0242.html">CVE-2007-0242</cve>
<bugzilla href="https://bugzilla.suse.com/259187">SUSE bug 259187</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198610" comment="qt3-3.3.8b-88 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198611" comment="qt3-32bit-3.3.8b-88 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198612" comment="qt3-x86-3.3.8b-88 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0451</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-0451" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0451" source="CVE"/>
    <description>
    Apache SpamAssassin before 3.1.8 allows remote attackers to cause a denial of service via long URLs in malformed HTML, which triggers "massive memory usage."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-0451.html">CVE-2007-0451</cve>
<bugzilla href="https://bugzilla.suse.com/246254">SUSE bug 246254</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199176" comment="perl-spamassassin-3.3.1-10.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199177" comment="spamassassin-3.3.1-10.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0452</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-0452" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0452" source="CVE"/>
    <description>
    smbd in Samba 3.0.6 through 3.0.23d allows remote authenticated users to cause a denial of service (memory and CPU exhaustion) by renaming a file in a way that prevents a request from being removed from the deferred open queue, which triggers an infinite loop.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-0452.html">CVE-2007-0452</cve>
<bugzilla href="https://bugzilla.suse.com/240265">SUSE bug 240265</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199376" comment="cifs-utils-5.1-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199555" comment="ldapsmb-1.34b-12.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199556" comment="libldb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199557" comment="libsmbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199558" comment="libsmbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199559" comment="libsmbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199560" comment="libtalloc2-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199561" comment="libtalloc2-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199562" comment="libtalloc2-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199563" comment="libtdb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199564" comment="libtdb1-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199565" comment="libtdb1-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199566" comment="libtevent0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199567" comment="libwbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199568" comment="libwbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199569" comment="libwbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199570" comment="samba-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199571" comment="samba-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199572" comment="samba-client-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199573" comment="samba-client-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199574" comment="samba-client-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199575" comment="samba-krb-printing-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199576" comment="samba-winbind-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199577" comment="samba-winbind-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199578" comment="samba-winbind-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199579" comment="samba-x86-3.6.3-0.39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0456</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-0456" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0456" source="CVE"/>
    <description>
    Unspecified vulnerability in the LLT dissector in Wireshark (formerly Ethereal) 0.99.3 and 0.99.4 allows remote attackers to cause a denial of service (application crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-0456.html">CVE-2007-0456</cve>
<bugzilla href="https://bugzilla.suse.com/237246">SUSE bug 237246</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0457</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-0457" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0457" source="CVE"/>
    <description>
    Unspecified vulnerability in the IEEE 802.11 dissector in Wireshark (formerly Ethereal) 0.10.14 through 0.99.4 allows remote attackers to cause a denial of service (application crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-0457.html">CVE-2007-0457</cve>
<bugzilla href="https://bugzilla.suse.com/237246">SUSE bug 237246</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0458</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-0458" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0458" source="CVE"/>
    <description>
    Unspecified vulnerability in the HTTP dissector in Wireshark (formerly Ethereal) 0.99.3 and 0.99.4 allows remote attackers to cause a denial of service (application crash) via unspecified vectors, a different issue than CVE-2006-5468.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-0458.html">CVE-2007-0458</cve>
<bugzilla href="https://bugzilla.suse.com/237246">SUSE bug 237246</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0459</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-0459" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0459" source="CVE"/>
    <description>
    packet-tcp.c in the TCP dissector in Wireshark (formerly Ethereal) 0.99.2 through 0.99.4 allows remote attackers to cause a denial of service (application crash or hang) via fragmented HTTP packets.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-0459.html">CVE-2007-0459</cve>
<bugzilla href="https://bugzilla.suse.com/237246">SUSE bug 237246</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0774</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-0774" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0774" source="CVE"/>
    <description>
    Stack-based buffer overflow in the map_uri_to_worker function (native/common/jk_uri_worker_map.c) in mod_jk.so for Apache Tomcat JK Web Server Connector 1.2.19 and 1.2.20, as used in Tomcat 4.1.34 and 5.5.20, allows remote attackers to execute arbitrary code via a long URL that triggers the overflow in a URI worker map routine.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-0774.html">CVE-2007-0774</cve>
<bugzilla href="https://bugzilla.suse.com/248157">SUSE bug 248157</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198675" comment="apache2-mod_jk-1.2.26-1.30 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0775</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-0775" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0775" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the layout engine in Mozilla Firefox before 1.5.0.10 and 2.x before 2.0.0.2, Thunderbird before 1.5.0.10, and SeaMonkey before 1.0.8 allow remote attackers to cause a denial of service (crash) and potentially execute arbitrary code via certain vectors.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-0775.html">CVE-2007-0775</cve>
<bugzilla href="https://bugzilla.suse.com/244923">SUSE bug 244923</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0776</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-0776" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0776" source="CVE"/>
    <description>
    Heap-based buffer overflow in the _cairo_pen_init function in Mozilla Firefox 2.x before 2.0.0.2, Thunderbird before 1.5.0.10, and SeaMonkey before 1.0.8 allows remote attackers to execute arbitrary code via a large stroke-width attribute in the clipPath element in an SVG file.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-0776.html">CVE-2007-0776</cve>
<bugzilla href="https://bugzilla.suse.com/244923">SUSE bug 244923</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0777</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-0777" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0777" source="CVE"/>
    <description>
    The JavaScript engine in Mozilla Firefox before 1.5.0.10 and 2.x before 2.0.0.2, Thunderbird before 1.5.0.10, and SeaMonkey before 1.0.8 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via certain vectors that trigger memory corruption.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-0777.html">CVE-2007-0777</cve>
<bugzilla href="https://bugzilla.suse.com/244923">SUSE bug 244923</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0780</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-0780" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0780" source="CVE"/>
    <description>
    browser.js in Mozilla Firefox 1.5.x before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8 uses the requesting URI to identify child windows, which allows remote attackers to conduct cross-site scripting (XSS) attacks by opening a blocked popup originating from a javascript: URI in combination with multiple frames having the same data: URI.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-0780.html">CVE-2007-0780</cve>
<bugzilla href="https://bugzilla.suse.com/244923">SUSE bug 244923</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-0800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0800" source="CVE"/>
    <description>
    Cross-zone vulnerability in Mozilla Firefox 1.5.0.9 considers blocked popups to have an internal zone origin, which allows user-assisted remote attackers to cross zone restrictions and read arbitrary file:// URIs by convincing a user to show a blocked popup.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-0800.html">CVE-2007-0800</cve>
<bugzilla href="https://bugzilla.suse.com/244923">SUSE bug 244923</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0897</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-0897" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0897" source="CVE"/>
    <description>
    Clam AntiVirus ClamAV before 0.90 does not close open file descriptors under certain conditions, which allows remote attackers to cause a denial of service (file descriptor consumption and failed scans) via CAB archives with a cabinet header record length of zero, which causes a function to return without closing a file descriptor.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-0897.html">CVE-2007-0897</cve>
<bugzilla href="https://bugzilla.suse.com/246214">SUSE bug 246214</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199377" comment="clamav-0.97.7-0.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0898</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-0898" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0898" source="CVE"/>
    <description>
    Directory traversal vulnerability in clamd in Clam AntiVirus ClamAV before 0.90 allows remote attackers to overwrite arbitrary files via a .. (dot dot) in the id MIME header parameter in a multi-part message.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-0898.html">CVE-2007-0898</cve>
<bugzilla href="https://bugzilla.suse.com/246214">SUSE bug 246214</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199377" comment="clamav-0.97.7-0.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0956</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-0956" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0956" source="CVE"/>
    <description>
    The telnet daemon (telnetd) in MIT krb5 before 1.6.1 allows remote attackers to bypass authentication and gain system access via a username beginning with a '-' character, a similar issue to CVE-2007-0882.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-0956.html">CVE-2007-0956</cve>
<bugzilla href="https://bugzilla.suse.com/247765">SUSE bug 247765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/256319">SUSE bug 256319</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199544" comment="krb5-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199545" comment="krb5-32bit-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199546" comment="krb5-apps-clients-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199547" comment="krb5-apps-servers-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199548" comment="krb5-client-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199552" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199553" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199549" comment="krb5-server-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199550" comment="krb5-x86-1.6.3-133.49.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0957</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-0957" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0957" source="CVE"/>
    <description>
    Stack-based buffer overflow in the krb5_klog_syslog function in the kadm5 library, as used by the Kerberos administration daemon (kadmind) and Key Distribution Center (KDC), in MIT krb5 before 1.6.1 allows remote authenticated users to execute arbitrary code and modify the Kerberos key database via crafted arguments, possibly involving certain format string specifiers.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-0957.html">CVE-2007-0957</cve>
<bugzilla href="https://bugzilla.suse.com/253548">SUSE bug 253548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/256319">SUSE bug 256319</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199544" comment="krb5-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199545" comment="krb5-32bit-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199546" comment="krb5-apps-clients-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199547" comment="krb5-apps-servers-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199548" comment="krb5-client-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199552" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199553" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199549" comment="krb5-server-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199550" comment="krb5-x86-1.6.3-133.49.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0981</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-0981" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0981" source="CVE"/>
    <description>
    Mozilla based browsers, including Firefox before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8, allow remote attackers to bypass the same origin policy, steal cookies, and conduct other attacks by writing a URI with a null byte to the hostname (location.hostname) DOM property, due to interactions with DNS resolver code.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-0981.html">CVE-2007-0981</cve>
<bugzilla href="https://bugzilla.suse.com/244923">SUSE bug 244923</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0995</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-0995" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0995" source="CVE"/>
    <description>
    Mozilla Firefox before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8 ignores trailing invalid HTML characters in attribute names, which allows remote attackers to bypass content filters that use regular expressions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-0995.html">CVE-2007-0995</cve>
<bugzilla href="https://bugzilla.suse.com/244923">SUSE bug 244923</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0996</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-0996" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0996" source="CVE"/>
    <description>
    The child frames in Mozilla Firefox before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8 inherit the default charset from the parent window, which allows remote attackers to conduct cross-site scripting (XSS) attacks, as demonstrated using the UTF-7 character set.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-0996.html">CVE-2007-0996</cve>
<bugzilla href="https://bugzilla.suse.com/244923">SUSE bug 244923</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1003</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-1003" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1003" source="CVE"/>
    <description>
    Integer overflow in ALLOCATE_LOCAL in the ProcXCMiscGetXIDList function in the XC-MISC extension in the X.Org X11 server (xserver) 7.1-1.1.0, and other versions before 20070403, allows remote authenticated users to execute arbitrary code via a large expression, which results in memory corruption.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-1003.html">CVE-2007-1003</cve>
<bugzilla href="https://bugzilla.suse.com/243978">SUSE bug 243978</bugzilla>
<bugzilla href="https://bugzilla.suse.com/261141">SUSE bug 261141</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199825" comment="xorg-x11-Xvnc-7.4-27.81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199826" comment="xorg-x11-server-7.4-27.81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199827" comment="xorg-x11-server-extra-7.4-27.81 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1216</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-1216" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1216" source="CVE"/>
    <description>
    Double free vulnerability in the GSS-API library (lib/gssapi/krb5/k5unseal.c), as used by the Kerberos administration daemon (kadmind) in MIT krb5 before 1.6.1, when used with the authentication method provided by the RPCSEC_GSS RPC library, allows remote authenticated users to execute arbitrary code and modify the Kerberos key database via a message with an "an invalid direction encoding".
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-1216.html">CVE-2007-1216</cve>
<bugzilla href="https://bugzilla.suse.com/252487">SUSE bug 252487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/256319">SUSE bug 256319</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199544" comment="krb5-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199545" comment="krb5-32bit-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199546" comment="krb5-apps-clients-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199547" comment="krb5-apps-servers-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199548" comment="krb5-client-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199552" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199553" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199549" comment="krb5-server-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199550" comment="krb5-x86-1.6.3-133.49.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071320" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1320</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-1320" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1320" source="CVE"/>
    <description>
    Multiple heap-based buffer overflows in the cirrus_invalidate_region function in the Cirrus VGA extension in QEMU 0.8.2, as used in Xen and possibly other products, might allow local users to execute arbitrary code via unspecified vectors related to "attempting to mark non-existent regions as dirty," aka the "bitblt" heap overflow.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-1320.html">CVE-2007-1320</cve>
<bugzilla href="https://bugzilla.suse.com/252519">SUSE bug 252519</bugzilla>
<bugzilla href="https://bugzilla.suse.com/270621">SUSE bug 270621</bugzilla>
<bugzilla href="https://bugzilla.suse.com/435135">SUSE bug 435135</bugzilla>
<bugzilla href="https://bugzilla.suse.com/448551">SUSE bug 448551</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199814" comment="xen-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199815" comment="xen-doc-html-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199816" comment="xen-doc-pdf-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199817" comment="xen-kmp-default-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199818" comment="xen-kmp-pae-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199819" comment="xen-libs-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199820" comment="xen-libs-32bit-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199821" comment="xen-tools-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199822" comment="xen-tools-domU-4.2.2_04-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1321</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-1321" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1321" source="CVE"/>
    <description>
    Integer signedness error in the NE2000 emulator in QEMU 0.8.2, as used in Xen and possibly other products, allows local users to trigger a heap-based buffer overflow via certain register values that bypass sanity checks, aka QEMU NE2000 "receive" integer signedness error. NOTE: this identifier was inadvertently used by some sources to cover multiple issues that were labeled "NE2000 network driver and the socket code," but separate identifiers have been created for the individual vulnerabilities since there are sometimes different fixes; see CVE-2007-5729 and CVE-2007-5730.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-1321.html">CVE-2007-1321</cve>
<bugzilla href="https://bugzilla.suse.com/252519">SUSE bug 252519</bugzilla>
<bugzilla href="https://bugzilla.suse.com/270621">SUSE bug 270621</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199814" comment="xen-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199815" comment="xen-doc-html-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199816" comment="xen-doc-pdf-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199817" comment="xen-kmp-default-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199818" comment="xen-kmp-pae-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199819" comment="xen-libs-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199820" comment="xen-libs-32bit-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199821" comment="xen-tools-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199822" comment="xen-tools-domU-4.2.2_04-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1322</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-1322" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1322" source="CVE"/>
    <description>
    QEMU 0.8.2 allows local users to halt a virtual machine by executing the icebp instruction.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-1322.html">CVE-2007-1322</cve>
<bugzilla href="https://bugzilla.suse.com/252519">SUSE bug 252519</bugzilla>
<bugzilla href="https://bugzilla.suse.com/270621">SUSE bug 270621</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199814" comment="xen-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199815" comment="xen-doc-html-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199816" comment="xen-doc-pdf-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199817" comment="xen-kmp-default-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199818" comment="xen-kmp-pae-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199819" comment="xen-libs-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199820" comment="xen-libs-32bit-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199821" comment="xen-tools-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199822" comment="xen-tools-domU-4.2.2_04-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1323</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-1323" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1323" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2007-2893.  Reason: this candidate was intended for one issue, but some sources used this identifier for a separate issue, and a duplicate identifier had also been created by the time dual use was detected.  Notes: All CVE users should consult CVE-2007-2893 to determine if it is appropriate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-1323.html">CVE-2007-1323</cve>
<bugzilla href="https://bugzilla.suse.com/252519">SUSE bug 252519</bugzilla>
<bugzilla href="https://bugzilla.suse.com/270621">SUSE bug 270621</bugzilla>
<bugzilla href="https://bugzilla.suse.com/280893">SUSE bug 280893</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199814" comment="xen-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199815" comment="xen-doc-html-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199816" comment="xen-doc-pdf-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199817" comment="xen-kmp-default-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199818" comment="xen-kmp-pae-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199819" comment="xen-libs-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199820" comment="xen-libs-32bit-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199821" comment="xen-tools-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199822" comment="xen-tools-domU-4.2.2_04-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1349</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-1349" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1349" source="CVE"/>
    <description>
    PerlRun.pm in Apache mod_perl before 1.30, and RegistryCooker.pm in mod_perl 2.x, does not properly escape PATH_INFO before use in a regular expression, which allows remote attackers to cause a denial of service (resource consumption) via a crafted URI.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-1349.html">CVE-2007-1349</cve>
<bugzilla href="https://bugzilla.suse.com/263785">SUSE bug 263785</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198115" comment="apache2-mod_perl-2.0.4-40 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1351</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-1351" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1351" source="CVE"/>
    <description>
    Integer overflow in the bdfReadCharacters function in bdfread.c in (1) X.Org libXfont before 20070403 and (2) freetype 2.3.2 and earlier allows remote authenticated users to execute arbitrary code via crafted BDF fonts, which result in a heap overflow.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-1351.html">CVE-2007-1351</cve>
<bugzilla href="https://bugzilla.suse.com/247732">SUSE bug 247732</bugzilla>
<bugzilla href="https://bugzilla.suse.com/258335">SUSE bug 258335</bugzilla>
<bugzilla href="https://bugzilla.suse.com/261141">SUSE bug 261141</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199430" comment="freetype2-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199431" comment="freetype2-32bit-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199432" comment="freetype2-x86-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199433" comment="ft2demos-2.3.7-25.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071366" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1366</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-1366" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1366" source="CVE"/>
    <description>
    QEMU 0.8.2 allows local users to crash a virtual machine via the divisor operand to the aam instruction, as demonstrated by "aam 0x0," which triggers a divide-by-zero error.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-1366.html">CVE-2007-1366</cve>
<bugzilla href="https://bugzilla.suse.com/252519">SUSE bug 252519</bugzilla>
<bugzilla href="https://bugzilla.suse.com/270621">SUSE bug 270621</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199814" comment="xen-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199815" comment="xen-doc-html-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199816" comment="xen-doc-pdf-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199817" comment="xen-kmp-default-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199818" comment="xen-kmp-pae-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199819" comment="xen-libs-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199820" comment="xen-libs-32bit-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199821" comment="xen-tools-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199822" comment="xen-tools-domU-4.2.2_04-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1536</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-1536" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1536" source="CVE"/>
    <description>
    Integer underflow in the file_printf function in the "file" program before 4.20 allows user-assisted attackers to execute arbitrary code via a file that triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-1536.html">CVE-2007-1536</cve>
<bugzilla href="https://bugzilla.suse.com/256290">SUSE bug 256290</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199422" comment="file-4.24-43.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199423" comment="file-32bit-4.24-43.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199424" comment="file-x86-4.24-43.23 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1558</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-1558" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1558" source="CVE"/>
    <description>
    The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions.  NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-1558.html">CVE-2007-1558</cve>
<bugzilla href="https://bugzilla.suse.com/262450">SUSE bug 262450</bugzilla>
<bugzilla href="https://bugzilla.suse.com/271197">SUSE bug 271197</bugzilla>
<bugzilla href="https://bugzilla.suse.com/279843">SUSE bug 279843</bugzilla>
<bugzilla href="https://bugzilla.suse.com/281321">SUSE bug 281321</bugzilla>
<bugzilla href="https://bugzilla.suse.com/281323">SUSE bug 281323</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198828" comment="fetchmail-6.3.8.90-13.20.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198829" comment="fetchmailconf-6.3.8.90-13.20.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198564" comment="mutt-1.5.17-42.33 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1667</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-1667" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1667" source="CVE"/>
    <description>
    Multiple integer overflows in (1) the XGetPixel function in ImUtil.c in X.Org libx11 before 1.0.3, and (2) XInitImage function in xwd.c for ImageMagick, allow user-assisted remote attackers to cause a denial of service (crash) or obtain sensitive information via crafted images with large or negative values that trigger a buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-1667.html">CVE-2007-1667</cve>
<bugzilla href="https://bugzilla.suse.com/252958">SUSE bug 252958</bugzilla>
<bugzilla href="https://bugzilla.suse.com/258253">SUSE bug 258253</bugzilla>
<bugzilla href="https://bugzilla.suse.com/264218">SUSE bug 264218</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199580" comment="libMagickCore1-6.4.3.6-7.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199581" comment="libMagickCore1-32bit-6.4.3.6-7.26 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1669</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-1669" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1669" source="CVE"/>
    <description>
    zoo decoder 2.10 (zoo-2.10), as used in multiple products including (1) Barracuda Spam Firewall 3.4 and later with virusdef before 2.0.6399, (2) Spam Firewall before 3.4 20070319 with virusdef before 2.0.6399o, and (3) AMaViS 2.4.1 and earlier, allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-1669.html">CVE-2007-1669</cve>
<bugzilla href="https://bugzilla.suse.com/271781">SUSE bug 271781</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251871" comment="zoo-2.10-911 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-1745" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1745" source="CVE"/>
    <description>
    The chm_decompress_stream function in libclamav/chmunpack.c in Clam AntiVirus (ClamAV) before 0.90.2 leaks file descriptors, which has unknown impact and attack vectors involving a crafted CHM file, a different vulnerability than CVE-2007-0897.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-1745.html">CVE-2007-1745</cve>
<bugzilla href="https://bugzilla.suse.com/264189">SUSE bug 264189</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199377" comment="clamav-0.97.7-0.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1797</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-1797" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1797" source="CVE"/>
    <description>
    Multiple integer overflows in ImageMagick before 6.3.3-5 allow remote attackers to execute arbitrary code via (1) a crafted DCM image, which results in a heap-based overflow in the ReadDCMImage function, or (2) the (a) colors or (b) comments field in a crafted XWD image, which results in a heap-based overflow in the ReadXWDImage function, different issues than CVE-2007-1667.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-1797.html">CVE-2007-1797</cve>
<bugzilla href="https://bugzilla.suse.com/258253">SUSE bug 258253</bugzilla>
<bugzilla href="https://bugzilla.suse.com/279866">SUSE bug 279866</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199580" comment="libMagickCore1-6.4.3.6-7.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199581" comment="libMagickCore1-32bit-6.4.3.6-7.26 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1841</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-1841" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1841" source="CVE"/>
    <description>
    The isakmp_info_recv function in src/racoon/isakmp_inf.c in racoon in Ipsec-tools before 0.6.7 allows remote attackers to cause a denial of service (tunnel crash) via crafted (1) DELETE (ISAKMP_NPTYPE_D) and (2) NOTIFY (ISAKMP_NPTYPE_N) messages.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-1841.html">CVE-2007-1841</cve>
<bugzilla href="https://bugzilla.suse.com/260791">SUSE bug 260791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/334907">SUSE bug 334907</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198345" comment="ipsec-tools-0.7.3-1.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1862</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-1862" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1862" source="CVE"/>
    <description>
    The recall_headers function in mod_mem_cache in Apache 2.2.4 does not properly copy all levels of header data, which can cause Apache to return HTTP headers containing previously used data, which could be used by remote attackers to obtain potentially sensitive information.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-1862.html">CVE-2007-1862</cve>
<bugzilla href="https://bugzilla.suse.com/280414">SUSE bug 280414</bugzilla>
<bugzilla href="https://bugzilla.suse.com/308637">SUSE bug 308637</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199288" comment="apache2-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199289" comment="apache2-doc-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199290" comment="apache2-example-pages-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199291" comment="apache2-prefork-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199292" comment="apache2-utils-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199293" comment="apache2-worker-2.2.12-1.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1863</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-1863" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1863" source="CVE"/>
    <description>
    cache_util.c in the mod_cache module in Apache HTTP Server (httpd), when caching is enabled and a threaded Multi-Processing Module (MPM) is used, allows remote attackers to cause a denial of service (child processing handler crash) via a request with the (1) s-maxage, (2) max-age, (3) min-fresh, or (4) max-stale Cache-Control headers without a value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-1863.html">CVE-2007-1863</cve>
<bugzilla href="https://bugzilla.suse.com/289997">SUSE bug 289997</bugzilla>
<bugzilla href="https://bugzilla.suse.com/308637">SUSE bug 308637</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199288" comment="apache2-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199289" comment="apache2-doc-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199290" comment="apache2-example-pages-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199291" comment="apache2-prefork-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199292" comment="apache2-utils-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199293" comment="apache2-worker-2.2.12-1.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1995</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-1995" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1995" source="CVE"/>
    <description>
    bgpd/bgp_attr.c in Quagga 0.98.6 and earlier, and 0.99.6 and earlier 0.99 versions, does not validate length values in the MP_REACH_NLRI and MP_UNREACH_NLRI attributes, which allows remote attackers to cause a denial of service (daemon crash or exit) via crafted UPDATE messages that trigger an assertion error or out of bounds read.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-1995.html">CVE-2007-1995</cve>
<bugzilla href="https://bugzilla.suse.com/266100">SUSE bug 266100</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199766" comment="quagga-0.99.15-0.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1997</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-1997" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1997" source="CVE"/>
    <description>
    Integer signedness error in the (1) cab_unstore and (2) cab_extract functions in libclamav/cab.c in Clam AntiVirus (ClamAV) before 0.90.2 allow remote attackers to execute arbitrary code via a crafted CHM file that contains a negative integer, which passes a signed comparison and leads to a stack-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-1997.html">CVE-2007-1997</cve>
<bugzilla href="https://bugzilla.suse.com/264189">SUSE bug 264189</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199377" comment="clamav-0.97.7-0.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2052</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-2052" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2052" source="CVE"/>
    <description>
    Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-2052.html">CVE-2007-2052</cve>
<bugzilla href="https://bugzilla.suse.com/276889">SUSE bug 276889</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199757" comment="python-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199758" comment="python-32bit-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199759" comment="python-curses-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199760" comment="python-demo-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199761" comment="python-gdbm-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199762" comment="python-idle-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199763" comment="python-tk-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199764" comment="python-x86-2.6.8-0.15 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2438</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-2438" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2438" source="CVE"/>
    <description>
    The sandbox for vim allows dangerous functions such as (1) writefile, (2) feedkeys, and (3) system, which might allow user-assisted attackers to execute shell commands and write files via modelines.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-2438.html">CVE-2007-2438</cve>
<bugzilla href="https://bugzilla.suse.com/270496">SUSE bug 270496</bugzilla>
<bugzilla href="https://bugzilla.suse.com/304172">SUSE bug 304172</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198894" comment="gvim-7.2-8.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198895" comment="vim-7.2-8.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198896" comment="vim-base-7.2-8.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198897" comment="vim-data-7.2-8.15 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2442</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-2442" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2442" source="CVE"/>
    <description>
    The gssrpc__svcauth_gssapi function in the RPC library in MIT Kerberos 5 (krb5) 1.6.1 and earlier might allow remote attackers to execute arbitrary code via a zero-length RPC credential, which causes kadmind to free an uninitialized pointer during cleanup.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-2442.html">CVE-2007-2442</cve>
<bugzilla href="https://bugzilla.suse.com/271191">SUSE bug 271191</bugzilla>
<bugzilla href="https://bugzilla.suse.com/283681">SUSE bug 283681</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199544" comment="krb5-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199545" comment="krb5-32bit-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199546" comment="krb5-apps-clients-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199547" comment="krb5-apps-servers-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199548" comment="krb5-client-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199552" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199553" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199549" comment="krb5-server-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199550" comment="krb5-x86-1.6.3-133.49.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2443</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-2443" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2443" source="CVE"/>
    <description>
    Integer signedness error in the gssrpc__svcauth_unix function in svc_auth_unix.c in the RPC library in MIT Kerberos 5 (krb5) 1.6.1 and earlier might allow remote attackers to execute arbitrary code via a negative length value.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-2443.html">CVE-2007-2443</cve>
<bugzilla href="https://bugzilla.suse.com/271191">SUSE bug 271191</bugzilla>
<bugzilla href="https://bugzilla.suse.com/283681">SUSE bug 283681</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199544" comment="krb5-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199545" comment="krb5-32bit-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199546" comment="krb5-apps-clients-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199547" comment="krb5-apps-servers-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199548" comment="krb5-client-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199552" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199553" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199549" comment="krb5-server-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199550" comment="krb5-x86-1.6.3-133.49.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2444</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-2444" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2444" source="CVE"/>
    <description>
    Logic error in the SID/Name translation functionality in smbd in Samba 3.0.23d through 3.0.25pre2 allows local users to gain temporary privileges and execute SMB/CIFS protocol operations via unspecified vectors that cause the daemon to transition to the root user.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-2444.html">CVE-2007-2444</cve>
<bugzilla href="https://bugzilla.suse.com/262090">SUSE bug 262090</bugzilla>
<bugzilla href="https://bugzilla.suse.com/273613">SUSE bug 273613</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199376" comment="cifs-utils-5.1-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199555" comment="ldapsmb-1.34b-12.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199556" comment="libldb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199557" comment="libsmbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199558" comment="libsmbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199559" comment="libsmbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199560" comment="libtalloc2-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199561" comment="libtalloc2-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199562" comment="libtalloc2-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199563" comment="libtdb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199564" comment="libtdb1-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199565" comment="libtdb1-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199566" comment="libtevent0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199567" comment="libwbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199568" comment="libwbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199569" comment="libwbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199570" comment="samba-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199571" comment="samba-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199572" comment="samba-client-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199573" comment="samba-client-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199574" comment="samba-client-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199575" comment="samba-krb-printing-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199576" comment="samba-winbind-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199577" comment="samba-winbind-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199578" comment="samba-winbind-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199579" comment="samba-x86-3.6.3-0.39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2446</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-2446" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2446" source="CVE"/>
    <description>
    Multiple heap-based buffer overflows in the NDR parsing in smbd in Samba 3.0.0 through 3.0.25rc3 allow remote attackers to execute arbitrary code via crafted MS-RPC requests involving (1) DFSEnum (netdfs_io_dfs_EnumInfo_d), (2) RFNPCNEX (smb_io_notify_option_type_data), (3) LsarAddPrivilegesToAccount (lsa_io_privilege_set), (4) NetSetFileSecurity (sec_io_acl), or (5) LsarLookupSids/LsarLookupSids2 (lsa_io_trans_names).
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-2446.html">CVE-2007-2446</cve>
<bugzilla href="https://bugzilla.suse.com/273613">SUSE bug 273613</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199376" comment="cifs-utils-5.1-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199555" comment="ldapsmb-1.34b-12.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199556" comment="libldb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199557" comment="libsmbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199558" comment="libsmbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199559" comment="libsmbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199560" comment="libtalloc2-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199561" comment="libtalloc2-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199562" comment="libtalloc2-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199563" comment="libtdb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199564" comment="libtdb1-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199565" comment="libtdb1-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199566" comment="libtevent0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199567" comment="libwbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199568" comment="libwbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199569" comment="libwbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199570" comment="samba-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199571" comment="samba-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199572" comment="samba-client-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199573" comment="samba-client-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199574" comment="samba-client-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199575" comment="samba-krb-printing-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199576" comment="samba-winbind-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199577" comment="samba-winbind-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199578" comment="samba-winbind-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199579" comment="samba-x86-3.6.3-0.39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2447</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-2447" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2447" source="CVE"/>
    <description>
    The MS-RPC functionality in smbd in Samba 3.0.0 through 3.0.25rc3 allows remote attackers to execute arbitrary commands via shell metacharacters involving the (1) SamrChangePassword function, when the "username map script" smb.conf option is enabled, and allows remote authenticated users to execute commands via shell metacharacters involving other MS-RPC functions in the (2) remote printer and (3) file share management.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-2447.html">CVE-2007-2447</cve>
<bugzilla href="https://bugzilla.suse.com/273611">SUSE bug 273611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/273613">SUSE bug 273613</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199376" comment="cifs-utils-5.1-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199555" comment="ldapsmb-1.34b-12.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199556" comment="libldb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199557" comment="libsmbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199558" comment="libsmbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199559" comment="libsmbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199560" comment="libtalloc2-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199561" comment="libtalloc2-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199562" comment="libtalloc2-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199563" comment="libtdb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199564" comment="libtdb1-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199565" comment="libtdb1-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199566" comment="libtevent0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199567" comment="libwbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199568" comment="libwbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199569" comment="libwbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199570" comment="samba-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199571" comment="samba-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199572" comment="samba-client-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199573" comment="samba-client-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199574" comment="samba-client-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199575" comment="samba-krb-printing-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199576" comment="samba-winbind-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199577" comment="samba-winbind-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199578" comment="samba-winbind-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199579" comment="samba-x86-3.6.3-0.39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2452</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-2452" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2452" source="CVE"/>
    <description>
    Heap-based buffer overflow in the visit_old_format function in locate/locate.c in locate in GNU findutils before 4.2.31 might allow context-dependent attackers to execute arbitrary code via a long pathname in a locate database that has the old format, a different vulnerability than CVE-2001-1036.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-2452.html">CVE-2007-2452</cve>
<bugzilla href="https://bugzilla.suse.com/278694">SUSE bug 278694</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198833" comment="findutils-4.4.0-38.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198834" comment="findutils-locate-4.4.0-38.26 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2756</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-2756" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2756" source="CVE"/>
    <description>
    The gdPngReadData function in libgd 2.0.34 allows user-assisted attackers to cause a denial of service (CPU consumption) via a crafted PNG image with truncated data, which causes an infinite loop in the png_read_info function in libpng.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-2756.html">CVE-2007-2756</cve>
<bugzilla href="https://bugzilla.suse.com/276525">SUSE bug 276525</bugzilla>
<bugzilla href="https://bugzilla.suse.com/282730">SUSE bug 282730</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198280" comment="gd-2.0.36.RC1-52 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2798</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-2798" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2798" source="CVE"/>
    <description>
    Stack-based buffer overflow in the rename_principal_2_svc function in kadmind for MIT Kerberos 1.5.3, 1.6.1, and other versions allows remote authenticated users to execute arbitrary code via a crafted request to rename a principal.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-2798.html">CVE-2007-2798</cve>
<bugzilla href="https://bugzilla.suse.com/278689">SUSE bug 278689</bugzilla>
<bugzilla href="https://bugzilla.suse.com/283681">SUSE bug 283681</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199544" comment="krb5-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199545" comment="krb5-32bit-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199546" comment="krb5-apps-clients-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199547" comment="krb5-apps-servers-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199548" comment="krb5-client-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199552" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199553" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199549" comment="krb5-server-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199550" comment="krb5-x86-1.6.3-133.49.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2799</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-2799" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2799" source="CVE"/>
    <description>
    Integer overflow in the "file" program 4.20, when running on 32-bit systems, as used in products including The Sleuth Kit, might allow user-assisted attackers to execute arbitrary code via a large file that triggers an overflow that bypasses an assert() statement.  NOTE: this issue is due to an incorrect patch for CVE-2007-1536.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-2799.html">CVE-2007-2799</cve>
<bugzilla href="https://bugzilla.suse.com/256290">SUSE bug 256290</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199422" comment="file-4.24-43.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199423" comment="file-32bit-4.24-43.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199424" comment="file-x86-4.24-43.23 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2873</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-2873" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2873" source="CVE"/>
    <description>
    SpamAssassin 3.1.x, 3.2.0, and 3.2.1 before 20070611, when running as root in unusual configurations using vpopmail or virtual users, allows local users to cause a denial of service (corrupt arbitrary files) via a symlink attack on a file that is used by spamd.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-2873.html">CVE-2007-2873</cve>
<bugzilla href="https://bugzilla.suse.com/284488">SUSE bug 284488</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199176" comment="perl-spamassassin-3.3.1-10.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199177" comment="spamassassin-3.3.1-10.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2925</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-2925" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2925" source="CVE"/>
    <description>
    The default access control lists (ACL) in ISC BIND 9.4.0, 9.4.1, and 9.5.0a1 through 9.5.0a5 do not set the allow-recursion and allow-query-cache ACLs, which allows remote attackers to make recursive queries and query the cache.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-2925.html">CVE-2007-2925</cve>
<bugzilla href="https://bugzilla.suse.com/294403">SUSE bug 294403</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199364" comment="bind-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199365" comment="bind-chrootenv-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199366" comment="bind-doc-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199367" comment="bind-libs-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199368" comment="bind-libs-32bit-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199369" comment="bind-libs-x86-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199370" comment="bind-utils-9.6ESVR7P4-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2926</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-2926" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2926" source="CVE"/>
    <description>
    ISC BIND 9 through 9.5.0a5 uses a weak random number generator during generation of DNS query ids when answering resolver questions or sending NOTIFY messages to slave name servers, which makes it easier for remote attackers to guess the next query id and perform DNS cache poisoning.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-2926.html">CVE-2007-2926</cve>
<bugzilla href="https://bugzilla.suse.com/294403">SUSE bug 294403</bugzilla>
<bugzilla href="https://bugzilla.suse.com/295040">SUSE bug 295040</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199364" comment="bind-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199365" comment="bind-chrootenv-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199366" comment="bind-doc-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199367" comment="bind-libs-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199368" comment="bind-libs-32bit-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199369" comment="bind-libs-x86-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199370" comment="bind-utils-9.6ESVR7P4-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2953</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-2953" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2953" source="CVE"/>
    <description>
    Format string vulnerability in the helptags_one function in src/ex_cmds.c in Vim 6.4 and earlier, and 7.x up to 7.1, allows user-assisted remote attackers to execute arbitrary code via format string specifiers in a help-tags tag in a help file, related to the helptags command.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-2953.html">CVE-2007-2953</cve>
<bugzilla href="https://bugzilla.suse.com/292433">SUSE bug 292433</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198894" comment="gvim-7.2-8.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198895" comment="vim-7.2-8.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198896" comment="vim-base-7.2-8.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198897" comment="vim-data-7.2-8.15 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3089</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-3089" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3089" source="CVE"/>
    <description>
    Mozilla Firefox before 2.0.0.5 does not prevent use of document.write to replace an IFRAME (1) during the load stage or (2) in the case of an about:blank frame, which allows remote attackers to display arbitrary HTML or execute certain JavaScript code, as demonstrated by code that intercepts keystroke values from window.event, aka the "promiscuous IFRAME access bug," a related issue to CVE-2006-4568.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-3089.html">CVE-2007-3089</cve>
<bugzilla href="https://bugzilla.suse.com/288115">SUSE bug 288115</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3106</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-3106" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3106" source="CVE"/>
    <description>
    lib/info.c in libvorbis 1.1.2, and possibly other versions before 1.2.0, allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via invalid (1) blocksize_0 and (2) blocksize_1 values, which trigger a "heap overwrite" in the _01inverse function in res0.c.  NOTE: this issue has been RECAST so that CVE-2007-4029 handles additional vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-3106.html">CVE-2007-3106</cve>
<bugzilla href="https://bugzilla.suse.com/287124">SUSE bug 287124</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199698" comment="libvorbis-1.2.0-79.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199699" comment="libvorbis-32bit-1.2.0-79.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199700" comment="libvorbis-doc-1.2.0-79.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199701" comment="libvorbis-x86-1.2.0-79.20 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3108</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-3108" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3108" source="CVE"/>
    <description>
    The BN_from_montgomery function in crypto/bn/bn_mont.c in OpenSSL 0.9.8e and earlier does not properly perform Montgomery multiplication, which might allow local users to conduct a side-channel attack and retrieve RSA private keys.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-3108.html">CVE-2007-3108</cve>
<bugzilla href="https://bugzilla.suse.com/296511">SUSE bug 296511</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199638" comment="libopenssl0_9_8-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199639" comment="libopenssl0_9_8-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199640" comment="libopenssl0_9_8-hmac-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199641" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199642" comment="libopenssl0_9_8-x86-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199643" comment="openssl-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199644" comment="openssl-doc-0.9.8j-0.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073257" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3257</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-3257" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3257" source="CVE"/>
    <description>
    Camel (camel-imap-folder.c) in the mailer component for Evolution Data Server 1.11 allows remote IMAP servers to execute arbitrary code via a negative SEQUENCE value in GData, which is used as an array index.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-3257.html">CVE-2007-3257</cve>
<bugzilla href="https://bugzilla.suse.com/284828">SUSE bug 284828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/290827">SUSE bug 290827</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199414" comment="evolution-data-server-2.28.2-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199415" comment="evolution-data-server-32bit-2.28.2-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199416" comment="evolution-data-server-lang-2.28.2-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199417" comment="evolution-data-server-x86-2.28.2-0.29 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3285</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-3285" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3285" source="CVE"/>
    <description>
    Mozilla Firefox before 2.0.0.5, when run on Windows, allows remote attackers to bypass file type checks and possibly execute programs via a (1) file:/// or (2) resource: URI with a dangerous extension, followed by a NULL byte (%00) and a safer extension, which causes Firefox to treat the requested file differently than Windows would.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-3285.html">CVE-2007-3285</cve>
<bugzilla href="https://bugzilla.suse.com/288115">SUSE bug 288115</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3304</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-3304" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3304" source="CVE"/>
    <description>
    Apache httpd 1.3.37, 2.0.59, and 2.2.4 with the Prefork MPM module, allows local users to cause a denial of service by modifying the worker_score and process_score arrays to reference an arbitrary process ID, which is sent a SIGUSR1 signal from the master process, aka "SIGUSR1 killer."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-3304.html">CVE-2007-3304</cve>
<bugzilla href="https://bugzilla.suse.com/286685">SUSE bug 286685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/308637">SUSE bug 308637</bugzilla>
<bugzilla href="https://bugzilla.suse.com/422464">SUSE bug 422464</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199288" comment="apache2-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199289" comment="apache2-doc-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199290" comment="apache2-example-pages-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199291" comment="apache2-prefork-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199292" comment="apache2-utils-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199293" comment="apache2-worker-2.2.12-1.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3372</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-3372" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3372" source="CVE"/>
    <description>
    The Avahi daemon in Avahi before 0.6.20 allows attackers to cause a denial of service (exit) via empty TXT data over D-Bus, which triggers an assert error.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-3372.html">CVE-2007-3372</cve>
<bugzilla href="https://bugzilla.suse.com/287123">SUSE bug 287123</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199351" comment="avahi-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199352" comment="avahi-lang-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199353" comment="avahi-utils-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199354" comment="libavahi-client3-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199355" comment="libavahi-client3-32bit-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199356" comment="libavahi-client3-x86-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199357" comment="libavahi-common3-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199358" comment="libavahi-common3-32bit-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199359" comment="libavahi-common3-x86-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199360" comment="libavahi-core5-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199361" comment="libdns_sd-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199362" comment="libdns_sd-32bit-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199363" comment="libdns_sd-x86-0.6.23-11.30 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3387</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-3387" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387" source="CVE"/>
    <description>
    Integer overflow in the StreamPredictor::StreamPredictor function in xpdf 3.02, as used in (1) poppler before 0.5.91, (2) gpdf before 2.8.2, (3) kpdf, (4) kdegraphics, (5) CUPS, (6) PDFedit, and other products, might allow remote attackers to execute arbitrary code via a crafted PDF file that triggers a stack-based buffer overflow in the StreamPredictor::getNextLine function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-3387.html">CVE-2007-3387</cve>
<bugzilla href="https://bugzilla.suse.com/291690">SUSE bug 291690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/335637">SUSE bug 335637</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199386" comment="cups-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199387" comment="cups-client-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199388" comment="cups-libs-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199389" comment="cups-libs-32bit-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199390" comment="cups-libs-x86-1.3.9-8.46.46 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3388</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-3388" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3388" source="CVE"/>
    <description>
    Multiple format string vulnerabilities in (1) qtextedit.cpp, (2) qdatatable.cpp, (3) qsqldatabase.cpp, (4) qsqlindex.cpp, (5) qsqlrecord.cpp, (6) qglobal.cpp, and (7) qsvgdevice.cpp in QTextEdit in Trolltech Qt 3 before 3.3.8 20070727 allow remote attackers to execute arbitrary code via format string specifiers in text used to compose an error message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-3388.html">CVE-2007-3388</cve>
<bugzilla href="https://bugzilla.suse.com/291754">SUSE bug 291754</bugzilla>
<bugzilla href="https://bugzilla.suse.com/550618">SUSE bug 550618</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198610" comment="qt3-3.3.8b-88 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198611" comment="qt3-32bit-3.3.8b-88 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198612" comment="qt3-x86-3.3.8b-88 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3641</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-3641" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3641" source="CVE"/>
    <description>
    archive_read_support_format_tar.c in libarchive before 2.2.4 does not properly compute the length of a certain buffer when processing a malformed pax extension header, which allows user-assisted remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted (1) PAX or (2) TAR archive that triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-3641.html">CVE-2007-3641</cve>
<bugzilla href="https://bugzilla.suse.com/291358">SUSE bug 291358</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198436" comment="libarchive2-2.5.5-5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3644</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-3644" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3644" source="CVE"/>
    <description>
    archive_read_support_format_tar.c in libarchive before 2.2.4 allows user-assisted remote attackers to cause a denial of service (infinite loop) via (1) an end-of-file condition within a pax extension header or (2) a malformed pax extension header in an (a) PAX or a (b) TAR archive.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-3644.html">CVE-2007-3644</cve>
<bugzilla href="https://bugzilla.suse.com/291358">SUSE bug 291358</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198436" comment="libarchive2-2.5.5-5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3645</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-3645" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3645" source="CVE"/>
    <description>
    archive_read_support_format_tar.c in libarchive before 2.2.4 allows user-assisted remote attackers to cause a denial of service (crash) via (1) an end-of-file condition within a tar header that follows a pax extension header or (2) a malformed pax extension header in an (a) PAX or a (b) TAR archive, which results in a NULL pointer dereference, a different issue than CVE-2007-3644.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-3645.html">CVE-2007-3645</cve>
<bugzilla href="https://bugzilla.suse.com/291358">SUSE bug 291358</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198436" comment="libarchive2-2.5.5-5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3656</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-3656" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3656" source="CVE"/>
    <description>
    Mozilla Firefox before 1.8.0.13 and 1.8.1.x before 1.8.1.5 does not perform a security zone check when processing a wyciwyg URI, which allows remote attackers to obtain sensitive information, poison the browser cache, and possibly enable further attack vectors via (1) HTTP 302 redirect controls, (2) XMLHttpRequest, or (3) view-source URIs.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-3656.html">CVE-2007-3656</cve>
<bugzilla href="https://bugzilla.suse.com/288115">SUSE bug 288115</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3670</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-3670" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3670" source="CVE"/>
    <description>
    Argument injection vulnerability in Microsoft Internet Explorer, when running on systems with Firefox installed and certain URIs registered, allows remote attackers to conduct cross-browser scripting attacks and execute arbitrary commands via shell metacharacters in a (1) FirefoxURL or (2) FirefoxHTML URI, which are inserted into the command line that is created when invoking firefox.exe.  NOTE: it has been debated as to whether the issue is in Internet Explorer or Firefox. As of 20070711, it is CVE's opinion that IE appears to be failing to properly delimit the URL argument when invoking Firefox, and this issue could arise with other protocol handlers in IE as well. However, Mozilla has stated that it will address the issue with a "defense in depth" fix that will "prevent IE from sending Firefox malicious data."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-3670.html">CVE-2007-3670</cve>
<bugzilla href="https://bugzilla.suse.com/288115">SUSE bug 288115</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3726</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-3726" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3726" source="CVE"/>
    <description>
    Integer signedness error in the SET_VALUE function in rarvm.cpp in unrar 3.70 beta 3, as used in products including WinRAR and RAR for OS X, allows user-assisted remote attackers to cause a denial of service (crash) via a crafted RAR archive that causes a negative signed number to be cast to a large unsigned number.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-3726.html">CVE-2007-3726</cve>
<bugzilla href="https://bugzilla.suse.com/291702">SUSE bug 291702</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198628" comment="unrar-3.80.2-2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3734</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-3734" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3734" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 2.0.0.5 and Thunderbird before 2.0.0.5 allow remote attackers to cause a denial of service (crash) via unspecified vectors that trigger memory corruption.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-3734.html">CVE-2007-3734</cve>
<bugzilla href="https://bugzilla.suse.com/288115">SUSE bug 288115</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3735</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-3735" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3735" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox before 2.0.0.5 and Thunderbird before 2.0.0.5 allow remote attackers to cause a denial of service (crash) via unspecified vectors that trigger memory corruption.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-3735.html">CVE-2007-3735</cve>
<bugzilla href="https://bugzilla.suse.com/288115">SUSE bug 288115</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3736</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-3736" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3736" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 2.0.0.5 allows remote attackers to inject arbitrary web script "into another site's context" via a "timing issue" involving the (1) addEventListener or (2) setTimeout function, probably by setting events that activate after the context has changed.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-3736.html">CVE-2007-3736</cve>
<bugzilla href="https://bugzilla.suse.com/288115">SUSE bug 288115</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3737</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-3737" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3737" source="CVE"/>
    <description>
    Mozilla Firefox before 2.0.0.5 allows remote attackers to execute arbitrary code with chrome privileges by calling an event handler from an unspecified "element outside of a document."
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-3737.html">CVE-2007-3737</cve>
<bugzilla href="https://bugzilla.suse.com/288115">SUSE bug 288115</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3738</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-3738" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3738" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.5 allow remote attackers to execute arbitrary code via a crafted XPCNativeWrapper.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-3738.html">CVE-2007-3738</cve>
<bugzilla href="https://bugzilla.suse.com/288115">SUSE bug 288115</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3820</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-3820" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3820" source="CVE"/>
    <description>
    konqueror/konq_combo.cc in Konqueror 3.5.7 allows remote attackers to spoof the data: URI scheme in the address bar via a long URI with trailing whitespace, which prevents the beginning of the URI from being displayed.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-3820.html">CVE-2007-3820</cve>
<bugzilla href="https://bugzilla.suse.com/292047">SUSE bug 292047</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198363" comment="kdelibs3-3.5.10-23.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198364" comment="kdelibs3-32bit-3.5.10-23.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198365" comment="kdelibs3-default-style-3.5.10-23.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198366" comment="kdelibs3-default-style-32bit-3.5.10-23.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198367" comment="kdelibs3-default-style-x86-3.5.10-23.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198368" comment="kdelibs3-x86-3.5.10-23.27 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3847</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-3847" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3847" source="CVE"/>
    <description>
    The date handling code in modules/proxy/proxy_util.c (mod_proxy) in Apache 2.3.0, when using a threaded MPM, allows remote origin servers to cause a denial of service (caching forward proxy process crash) via crafted date headers that trigger a buffer over-read.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-3847.html">CVE-2007-3847</cve>
<bugzilla href="https://bugzilla.suse.com/308637">SUSE bug 308637</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199288" comment="apache2-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199289" comment="apache2-doc-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199290" comment="apache2-example-pages-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199291" comment="apache2-prefork-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199292" comment="apache2-utils-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199293" comment="apache2-worker-2.2.12-1.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3852</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-3852" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3852" source="CVE"/>
    <description>
    The init script (sysstat.in) in sysstat 5.1.2 up to 7.1.6 creates /tmp/sysstat.run insecurely, which allows local users to execute arbitrary code.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-3852.html">CVE-2007-3852</cve>
<bugzilla href="https://bugzilla.suse.com/298308">SUSE bug 298308</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199790" comment="sysstat-8.1.5-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199791" comment="sysstat-isag-8.1.5-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3919</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-3919" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3919" source="CVE"/>
    <description>
    (1) xenbaked and (2) xenmon.py in Xen 3.1 and earlier allow local users to truncate arbitrary files via a symlink attack on /tmp/xenq-shm.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-3919.html">CVE-2007-3919</cve>
<bugzilla href="https://bugzilla.suse.com/334445">SUSE bug 334445</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199814" comment="xen-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199815" comment="xen-doc-html-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199816" comment="xen-doc-pdf-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199817" comment="xen-kmp-default-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199818" comment="xen-kmp-pae-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199819" comment="xen-libs-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199820" comment="xen-libs-32bit-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199821" comment="xen-tools-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199822" comment="xen-tools-domU-4.2.2_04-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3999</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-3999" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3999" source="CVE"/>
    <description>
    Stack-based buffer overflow in the svcauth_gss_validate function in lib/rpc/svc_auth_gss.c in the RPCSEC_GSS RPC library (librpcsecgss) in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by the Kerberos administration daemon (kadmind) and some third-party applications that use krb5, allows remote attackers to cause a denial of service (daemon crash) and probably execute arbitrary code via a long string in an RPC message.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-3999.html">CVE-2007-3999</cve>
<bugzilla href="https://bugzilla.suse.com/302377">SUSE bug 302377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/305261">SUSE bug 305261</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199544" comment="krb5-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199545" comment="krb5-32bit-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199546" comment="krb5-apps-clients-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199547" comment="krb5-apps-servers-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199548" comment="krb5-client-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199551" comment="krb5-doc-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199552" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199553" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199549" comment="krb5-server-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199550" comment="krb5-x86-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198512" comment="librpcsecgss-0.18-1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199076" comment="libtirpc1-0.2.1-1.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4000</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-4000" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4000" source="CVE"/>
    <description>
    The kadm5_modify_policy_internal function in lib/kadm5/srv/svr_policy.c in the Kerberos administration daemon (kadmind) in MIT Kerberos 5 (krb5) 1.5 through 1.6.2 does not properly check return values when the policy does not exist, which might allow remote authenticated users with the "modify policy" privilege to execute arbitrary code via unspecified vectors that trigger a write to an uninitialized pointer.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-4000.html">CVE-2007-4000</cve>
<bugzilla href="https://bugzilla.suse.com/302377">SUSE bug 302377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/305261">SUSE bug 305261</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199544" comment="krb5-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199545" comment="krb5-32bit-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199546" comment="krb5-apps-clients-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199547" comment="krb5-apps-servers-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199548" comment="krb5-client-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199551" comment="krb5-doc-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199552" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199553" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199549" comment="krb5-server-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199550" comment="krb5-x86-1.6.3-133.49.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4091</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-4091" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4091" source="CVE"/>
    <description>
    Multiple off-by-one errors in the sender.c in rsync 2.6.9 might allow remote attackers to execute arbitrary code via directory names that are not properly handled when calling the f_name function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-4091.html">CVE-2007-4091</cve>
<bugzilla href="https://bugzilla.suse.com/279866">SUSE bug 279866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/294073">SUSE bug 294073</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199767" comment="rsync-3.0.4-2.47 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4129</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-4129" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4129" source="CVE"/>
    <description>
    CoolKey 1.1.0 allows local users to overwrite arbitrary files via a symlink attack on temporary files in the /tmp/.pk11ipc1/ directory.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-4129.html">CVE-2007-4129</cve>
<bugzilla href="https://bugzilla.suse.com/304180">SUSE bug 304180</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198215" comment="coolkey-1.1.0-22 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4134</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-4134" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4134" source="CVE"/>
    <description>
    Directory traversal vulnerability in extract.c in star before 1.5a84 allows user-assisted remote attackers to overwrite arbitrary files via certain //.. (slash slash dot dot) sequences in directory symlinks in a TAR archive.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-4134.html">CVE-2007-4134</cve>
<bugzilla href="https://bugzilla.suse.com/302489">SUSE bug 302489</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199785" comment="star-1.5final-28.23.23 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4137</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-4137" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4137" source="CVE"/>
    <description>
    Off-by-one error in the QUtf8Decoder::toUnicode function in Trolltech Qt 3 allows context-dependent attackers to cause a denial of service (crash) via a crafted Unicode string that triggers a heap-based buffer overflow.  NOTE: Qt 4 has the same error in the QUtf8Codec::convertToUnicode function, but it is not exploitable.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-4137.html">CVE-2007-4137</cve>
<bugzilla href="https://bugzilla.suse.com/304249">SUSE bug 304249</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198610" comment="qt3-3.3.8b-88 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198611" comment="qt3-32bit-3.3.8b-88 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198612" comment="qt3-x86-3.3.8b-88 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4138</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-4138" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4138" source="CVE"/>
    <description>
    The Winbind nss_info extension (nsswitch/idmap_ad.c) in idmap_ad.so in Samba 3.0.25 through 3.0.25c, when the "winbind nss info" option is set to rfc2307 or sfu, grants all local users the privileges of gid 0 when the (1) RFC2307 or (2) Services for UNIX (SFU) primary group attribute is not defined.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-4138.html">CVE-2007-4138</cve>
<bugzilla href="https://bugzilla.suse.com/307623">SUSE bug 307623</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199376" comment="cifs-utils-5.1-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199555" comment="ldapsmb-1.34b-12.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199556" comment="libldb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199557" comment="libsmbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199558" comment="libsmbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199559" comment="libsmbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199560" comment="libtalloc2-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199561" comment="libtalloc2-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199562" comment="libtalloc2-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199563" comment="libtdb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199564" comment="libtdb1-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199565" comment="libtdb1-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199566" comment="libtevent0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199567" comment="libwbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199568" comment="libwbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199569" comment="libwbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199570" comment="samba-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199571" comment="samba-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199572" comment="samba-client-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199573" comment="samba-client-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199574" comment="samba-client-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199575" comment="samba-krb-printing-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199576" comment="samba-winbind-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199577" comment="samba-winbind-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199578" comment="samba-winbind-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199579" comment="samba-x86-3.6.3-0.39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4224</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-4224" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4224" source="CVE"/>
    <description>
    KDE Konqueror 3.5.7 allows remote attackers to spoof the URL address bar by calling setInterval with a small interval and changing the window.location property.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-4224.html">CVE-2007-4224</cve>
<bugzilla href="https://bugzilla.suse.com/298736">SUSE bug 298736</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198363" comment="kdelibs3-3.5.10-23.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198364" comment="kdelibs3-32bit-3.5.10-23.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198365" comment="kdelibs3-default-style-3.5.10-23.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198366" comment="kdelibs3-default-style-32bit-3.5.10-23.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198367" comment="kdelibs3-default-style-x86-3.5.10-23.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198368" comment="kdelibs3-x86-3.5.10-23.27 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4225</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-4225" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4225" source="CVE"/>
    <description>
    Visual truncation vulnerability in KDE Konqueror 3.5.7 allows remote attackers to spoof the URL address bar via an http URI with a large amount of whitespace in the user/password portion.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-4225.html">CVE-2007-4225</cve>
<bugzilla href="https://bugzilla.suse.com/298707">SUSE bug 298707</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198363" comment="kdelibs3-3.5.10-23.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198364" comment="kdelibs3-32bit-3.5.10-23.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198365" comment="kdelibs3-default-style-3.5.10-23.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198366" comment="kdelibs3-default-style-32bit-3.5.10-23.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198367" comment="kdelibs3-default-style-x86-3.5.10-23.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198368" comment="kdelibs3-x86-3.5.10-23.27 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4351</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-4351" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4351" source="CVE"/>
    <description>
    Off-by-one error in the ippReadIO function in cups/ipp.c in CUPS 1.3.3 allows remote attackers to cause a denial of service (crash) via a crafted (1) textWithLanguage or (2) nameWithLanguage Internet Printing Protocol (IPP) tag, leading to a stack-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-4351.html">CVE-2007-4351</cve>
<bugzilla href="https://bugzilla.suse.com/335635">SUSE bug 335635</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199386" comment="cups-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199387" comment="cups-client-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199388" comment="cups-libs-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199389" comment="cups-libs-32bit-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199390" comment="cups-libs-x86-1.3.9-8.46.46 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4352</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-4352" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4352" source="CVE"/>
    <description>
    Array index error in the DCTStream::readProgressiveDataUnit method in xpdf/Stream.cc in Xpdf 3.02pl1, as used in poppler, teTeX, KDE, KOffice, CUPS, and other products, allows remote attackers to trigger memory corruption and execute arbitrary code via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-4352.html">CVE-2007-4352</cve>
<bugzilla href="https://bugzilla.suse.com/335637">SUSE bug 335637</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199386" comment="cups-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199387" comment="cups-client-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199388" comment="cups-libs-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199389" comment="cups-libs-32bit-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199390" comment="cups-libs-x86-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199649" comment="libpoppler-glib4-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199650" comment="libpoppler-qt4-3-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199651" comment="libpoppler5-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199652" comment="poppler-tools-0.12.3-1.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4465</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-4465" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4465" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in mod_autoindex.c in the Apache HTTP Server before 2.2.6, when the charset on a server-generated page is not defined, allows remote attackers to inject arbitrary web script or HTML via the P parameter using the UTF-7 charset.  NOTE: it could be argued that this issue is due to a design limitation of browsers that attempt to perform automatic content type detection.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-4465.html">CVE-2007-4465</cve>
<bugzilla href="https://bugzilla.suse.com/308637">SUSE bug 308637</bugzilla>
<bugzilla href="https://bugzilla.suse.com/310161">SUSE bug 310161</bugzilla>
<bugzilla href="https://bugzilla.suse.com/325655">SUSE bug 325655</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199288" comment="apache2-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199289" comment="apache2-doc-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199290" comment="apache2-example-pages-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199291" comment="apache2-prefork-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199292" comment="apache2-utils-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199293" comment="apache2-worker-2.2.12-1.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4565</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-4565" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4565" source="CVE"/>
    <description>
    sink.c in fetchmail before 6.3.9 allows context-dependent attackers to cause a denial of service (NULL dereference and application crash) by refusing certain warning messages that are sent over SMTP.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-4565.html">CVE-2007-4565</cve>
<bugzilla href="https://bugzilla.suse.com/308271">SUSE bug 308271</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198828" comment="fetchmail-6.3.8.90-13.20.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198829" comment="fetchmailconf-6.3.8.90-13.20.19 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-4568" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4568" source="CVE"/>
    <description>
    Integer overflow in the build_range function in X.Org X Font Server (xfs) before 1.0.5 allows context-dependent attackers to execute arbitrary code via (1) QueryXBitmaps and (2) QueryXExtents protocol requests with crafted size values, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-4568.html">CVE-2007-4568</cve>
<bugzilla href="https://bugzilla.suse.com/308064">SUSE bug 308064</bugzilla>
<bugzilla href="https://bugzilla.suse.com/308066">SUSE bug 308066</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199823" comment="xorg-x11-7.4-9.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199824" comment="xorg-x11-xauth-7.4-9.62 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4569</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-4569" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4569" source="CVE"/>
    <description>
    backend/session.c in KDM in KDE 3.3.0 through 3.5.7, when autologin is configured and "shutdown with password" is enabled, allows remote attackers to bypass the password requirement and login to arbitrary accounts via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-4569.html">CVE-2007-4569</cve>
<bugzilla href="https://bugzilla.suse.com/307372">SUSE bug 307372</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198360" comment="kdebase3-runtime-3.5.10-20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198361" comment="kdebase3-runtime-32bit-3.5.10-20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198362" comment="kdebase3-runtime-x86-3.5.10-20 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4572</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-4572" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4572" source="CVE"/>
    <description>
    Stack-based buffer overflow in nmbd in Samba 3.0.0 through 3.0.26a, when configured as a Primary or Backup Domain controller, allows remote attackers to have an unknown impact via crafted GETDC mailslot requests, related to handling of GETDC logon server requests.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-4572.html">CVE-2007-4572</cve>
<bugzilla href="https://bugzilla.suse.com/326261">SUSE bug 326261</bugzilla>
<bugzilla href="https://bugzilla.suse.com/337823">SUSE bug 337823</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199376" comment="cifs-utils-5.1-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199555" comment="ldapsmb-1.34b-12.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199556" comment="libldb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199557" comment="libsmbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199558" comment="libsmbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199559" comment="libsmbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199560" comment="libtalloc2-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199561" comment="libtalloc2-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199562" comment="libtalloc2-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199563" comment="libtdb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199564" comment="libtdb1-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199565" comment="libtdb1-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199566" comment="libtevent0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199567" comment="libwbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199568" comment="libwbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199569" comment="libwbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199570" comment="samba-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199571" comment="samba-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199572" comment="samba-client-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199573" comment="samba-client-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199574" comment="samba-client-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199575" comment="samba-krb-printing-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199576" comment="samba-winbind-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199577" comment="samba-winbind-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199578" comment="samba-winbind-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199579" comment="samba-x86-3.6.3-0.39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4743</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-4743" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4743" source="CVE"/>
    <description>
    The original patch for CVE-2007-3999 in svc_auth_gss.c in the RPCSEC_GSS RPC library in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by the Kerberos administration daemon (kadmind) and other applications that use krb5, does not correctly check the buffer length in some environments and architectures, which might allow remote attackers to conduct a buffer overflow attack.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-4743.html">CVE-2007-4743</cve>
<bugzilla href="https://bugzilla.suse.com/302377">SUSE bug 302377</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199544" comment="krb5-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199545" comment="krb5-32bit-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199546" comment="krb5-apps-clients-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199547" comment="krb5-apps-servers-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199548" comment="krb5-client-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199551" comment="krb5-doc-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199552" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199553" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199549" comment="krb5-server-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199550" comment="krb5-x86-1.6.3-133.49.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4752</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-4752" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4752" source="CVE"/>
    <description>
    ssh in OpenSSH before 4.7 does not properly handle when an untrusted cookie cannot be created and uses a trusted X11 cookie instead, which allows attackers to violate intended policy and gain privileges by causing an X client to be treated as trusted.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-4752.html">CVE-2007-4752</cve>
<bugzilla href="https://bugzilla.suse.com/308521">SUSE bug 308521</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199733" comment="openssh-6.2p2-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199734" comment="openssh-askpass-6.2p2-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4769</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-4769" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4769" source="CVE"/>
    <description>
    The regular expression parser in TCL before 8.4.17, as used in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, and 7.4 before 7.4.19, allows remote authenticated users to cause a denial of service (backend crash) via an out-of-bounds backref number.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-4769.html">CVE-2007-4769</cve>
<bugzilla href="https://bugzilla.suse.com/329282">SUSE bug 329282</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199606" comment="libecpg6-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199607" comment="libpq5-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199608" comment="libpq5-32bit-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199750" comment="postgresql-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199751" comment="postgresql-contrib-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199752" comment="postgresql-docs-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199753" comment="postgresql-server-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199609" comment="postgresql91-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199610" comment="postgresql91-contrib-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199611" comment="postgresql91-docs-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199612" comment="postgresql91-server-9.1.9-0.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4770</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-4770" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4770" source="CVE"/>
    <description>
    libicu in International Components for Unicode (ICU) 3.8.1 and earlier attempts to process backreferences to the nonexistent capture group zero (aka \0), which might allow context-dependent attackers to read from, or write to, out-of-bounds memory locations, related to corruption of REStackFrames.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-4770.html">CVE-2007-4770</cve>
<bugzilla href="https://bugzilla.suse.com/354372">SUSE bug 354372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/363252">SUSE bug 363252</bugzilla>
<bugzilla href="https://bugzilla.suse.com/417817">SUSE bug 417817</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199020" comment="libicu-4.0-7.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199021" comment="libicu-32bit-4.0-7.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199022" comment="libicu-doc-4.0-7.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199630" comment="libicu-x86-4.0-7.26 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4771</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-4771" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4771" source="CVE"/>
    <description>
    Heap-based buffer overflow in the doInterval function in regexcmp.cpp in libicu in International Components for Unicode (ICU) 3.8.1 and earlier allows context-dependent attackers to cause a denial of service (memory consumption) and possibly have unspecified other impact via a regular expression that writes a large amount of data to the backtracking stack.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-4771.html">CVE-2007-4771</cve>
<bugzilla href="https://bugzilla.suse.com/354372">SUSE bug 354372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/363252">SUSE bug 363252</bugzilla>
<bugzilla href="https://bugzilla.suse.com/417817">SUSE bug 417817</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199020" comment="libicu-4.0-7.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199021" comment="libicu-32bit-4.0-7.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199022" comment="libicu-doc-4.0-7.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199630" comment="libicu-x86-4.0-7.26 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4772</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2007-4772" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4772" source="CVE"/>
    <description>
    The regular expression parser in TCL before 8.4.17, as used in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, and 7.4 before 7.4.19, allows context-dependent attackers to cause a denial of service (infinite loop) via a crafted regular expression.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-4772.html">CVE-2007-4772</cve>
<bugzilla href="https://bugzilla.suse.com/329282">SUSE bug 329282</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199606" comment="libecpg6-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199607" comment="libpq5-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199608" comment="libpq5-32bit-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199750" comment="postgresql-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199751" comment="postgresql-contrib-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199752" comment="postgresql-docs-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199753" comment="postgresql-server-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199609" comment="postgresql91-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199610" comment="postgresql91-contrib-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199611" comment="postgresql91-docs-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199612" comment="postgresql91-server-9.1.9-0.3 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205077" comment="libecpg6-9.4.6-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205078" comment="libpq5-9.4.6-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205079" comment="libpq5-32bit-9.4.6-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205080" comment="postgresql94-9.4.6-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210626" comment="postgresql94-contrib-9.4.6-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205081" comment="postgresql94-docs-9.4.6-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203383" comment="postgresql94-libs-9.4.6-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210627" comment="postgresql94-server-9.4.6-0.14 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4783</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-4783" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4783" source="CVE"/>
    <description>
    The iconv_substr function in PHP 5.2.4 and earlier allows context-dependent attackers to cause (1) a denial of service (application crash) via a long string in the charset parameter, probably also requiring a long string in the str parameter; or (2) a denial of service (temporary application hang) via a long string in the str parameter.  NOTE: this might not be a vulnerability in most web server environments that support multiple threads, unless these issues can be demonstrated for code execution.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-4783.html">CVE-2007-4783</cve>
<bugzilla href="https://bugzilla.suse.com/308069">SUSE bug 308069</bugzilla>
<bugzilla href="https://bugzilla.suse.com/325827">SUSE bug 325827</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199294" comment="apache2-mod_php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199295" comment="php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199296" comment="php53-bcmath-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199297" comment="php53-bz2-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199298" comment="php53-calendar-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199299" comment="php53-ctype-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199300" comment="php53-curl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199301" comment="php53-dba-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199302" comment="php53-dom-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199303" comment="php53-exif-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199304" comment="php53-fastcgi-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199305" comment="php53-fileinfo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199306" comment="php53-ftp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199307" comment="php53-gd-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199308" comment="php53-gettext-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199309" comment="php53-gmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199310" comment="php53-iconv-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199311" comment="php53-intl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199312" comment="php53-json-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199313" comment="php53-ldap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199314" comment="php53-mbstring-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199315" comment="php53-mcrypt-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199316" comment="php53-mysql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199317" comment="php53-odbc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199318" comment="php53-openssl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199319" comment="php53-pcntl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199320" comment="php53-pdo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199321" comment="php53-pear-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199322" comment="php53-pgsql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199323" comment="php53-pspell-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199324" comment="php53-shmop-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199325" comment="php53-snmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199326" comment="php53-soap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199327" comment="php53-suhosin-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199328" comment="php53-sysvmsg-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199329" comment="php53-sysvsem-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199330" comment="php53-sysvshm-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199331" comment="php53-tokenizer-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199332" comment="php53-wddx-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199333" comment="php53-xmlreader-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199334" comment="php53-xmlrpc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199335" comment="php53-xmlwriter-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199336" comment="php53-xsl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199337" comment="php53-zip-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199338" comment="php53-zlib-5.3.17-0.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-4840" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4840" source="CVE"/>
    <description>
    PHP 5.2.4 and earlier allows context-dependent attackers to cause a denial of service (application crash) via (1) a long string in the out_charset parameter to the iconv function; or a long string in the charset parameter to the (2) iconv_mime_decode_headers, (3) iconv_mime_decode, or (4) iconv_strlen function.  NOTE: this might not be a vulnerability in most web server environments that support multiple threads, unless these issues can be demonstrated for code execution.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-4840.html">CVE-2007-4840</cve>
<bugzilla href="https://bugzilla.suse.com/308498">SUSE bug 308498</bugzilla>
<bugzilla href="https://bugzilla.suse.com/325827">SUSE bug 325827</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199294" comment="apache2-mod_php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199295" comment="php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199296" comment="php53-bcmath-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199297" comment="php53-bz2-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199298" comment="php53-calendar-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199299" comment="php53-ctype-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199300" comment="php53-curl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199301" comment="php53-dba-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199302" comment="php53-dom-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199303" comment="php53-exif-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199304" comment="php53-fastcgi-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199305" comment="php53-fileinfo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199306" comment="php53-ftp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199307" comment="php53-gd-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199308" comment="php53-gettext-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199309" comment="php53-gmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199310" comment="php53-iconv-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199311" comment="php53-intl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199312" comment="php53-json-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199313" comment="php53-ldap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199314" comment="php53-mbstring-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199315" comment="php53-mcrypt-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199316" comment="php53-mysql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199317" comment="php53-odbc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199318" comment="php53-openssl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199319" comment="php53-pcntl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199320" comment="php53-pdo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199321" comment="php53-pear-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199322" comment="php53-pgsql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199323" comment="php53-pspell-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199324" comment="php53-shmop-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199325" comment="php53-snmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199326" comment="php53-soap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199327" comment="php53-suhosin-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199328" comment="php53-sysvmsg-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199329" comment="php53-sysvsem-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199330" comment="php53-sysvshm-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199331" comment="php53-tokenizer-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199332" comment="php53-wddx-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199333" comment="php53-xmlreader-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199334" comment="php53-xmlrpc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199335" comment="php53-xmlwriter-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199336" comment="php53-xsl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199337" comment="php53-zip-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199338" comment="php53-zlib-5.3.17-0.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4887</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-4887" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4887" source="CVE"/>
    <description>
    The dl function in PHP 5.2.4 and earlier allows context-dependent attackers to cause a denial of service (application crash) via a long string in the library parameter.  NOTE: there are limited usage scenarios under which this would be a vulnerability.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-4887.html">CVE-2007-4887</cve>
<bugzilla href="https://bugzilla.suse.com/325657">SUSE bug 325657</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199294" comment="apache2-mod_php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199295" comment="php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199296" comment="php53-bcmath-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199297" comment="php53-bz2-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199298" comment="php53-calendar-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199299" comment="php53-ctype-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199300" comment="php53-curl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199301" comment="php53-dba-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199302" comment="php53-dom-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199303" comment="php53-exif-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199304" comment="php53-fastcgi-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199305" comment="php53-fileinfo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199306" comment="php53-ftp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199307" comment="php53-gd-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199308" comment="php53-gettext-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199309" comment="php53-gmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199310" comment="php53-iconv-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199311" comment="php53-intl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199312" comment="php53-json-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199313" comment="php53-ldap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199314" comment="php53-mbstring-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199315" comment="php53-mcrypt-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199316" comment="php53-mysql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199317" comment="php53-odbc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199318" comment="php53-openssl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199319" comment="php53-pcntl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199320" comment="php53-pdo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199321" comment="php53-pear-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199322" comment="php53-pgsql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199323" comment="php53-pspell-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199324" comment="php53-shmop-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199325" comment="php53-snmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199326" comment="php53-soap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199327" comment="php53-suhosin-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199328" comment="php53-sysvmsg-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199329" comment="php53-sysvsem-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199330" comment="php53-sysvshm-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199331" comment="php53-tokenizer-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199332" comment="php53-wddx-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199333" comment="php53-xmlreader-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199334" comment="php53-xmlrpc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199335" comment="php53-xmlwriter-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199336" comment="php53-xsl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199337" comment="php53-zip-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199338" comment="php53-zlib-5.3.17-0.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4974</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-4974" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4974" source="CVE"/>
    <description>
    Heap-based buffer overflow in the flac_buffer_copy function in libsndfile 1.0.17 and earlier might allow remote attackers to execute arbitrary code via a FLAC file with crafted PCM data containing a block with a size that exceeds the previous block size.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-4974.html">CVE-2007-4974</cve>
<bugzilla href="https://bugzilla.suse.com/326070">SUSE bug 326070</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199081" comment="libsndfile-1.0.20-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199082" comment="libsndfile-32bit-1.0.20-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199083" comment="libsndfile-x86-1.0.20-2.4 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4985</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-4985" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4985" source="CVE"/>
    <description>
    ImageMagick before 6.3.5-9 allows context-dependent attackers to cause a denial of service via a crafted image file that triggers (1) an infinite loop in the ReadDCMImage function, related to ReadBlobByte function calls; or (2) an infinite loop in the ReadXCFImage function, related to ReadBlobMSBLong function calls.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-4985.html">CVE-2007-4985</cve>
<bugzilla href="https://bugzilla.suse.com/327021">SUSE bug 327021</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199580" comment="libMagickCore1-6.4.3.6-7.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199581" comment="libMagickCore1-32bit-6.4.3.6-7.26 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4986</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-4986" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4986" source="CVE"/>
    <description>
    Multiple integer overflows in ImageMagick before 6.3.5-9 allow context-dependent attackers to execute arbitrary code via a crafted (1) .dcm, (2) .dib, (3) .xbm, (4) .xcf, or (5) .xwd image file, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-4986.html">CVE-2007-4986</cve>
<bugzilla href="https://bugzilla.suse.com/327021">SUSE bug 327021</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199580" comment="libMagickCore1-6.4.3.6-7.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199581" comment="libMagickCore1-32bit-6.4.3.6-7.26 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4987</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-4987" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4987" source="CVE"/>
    <description>
    Off-by-one error in the ReadBlobString function in blob.c in ImageMagick before 6.3.5-9 allows context-dependent attackers to execute arbitrary code via a crafted image file, which triggers the writing of a '\0' character to an out-of-bounds address.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-4987.html">CVE-2007-4987</cve>
<bugzilla href="https://bugzilla.suse.com/327021">SUSE bug 327021</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199580" comment="libMagickCore1-6.4.3.6-7.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199581" comment="libMagickCore1-32bit-6.4.3.6-7.26 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4988</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-4988" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4988" source="CVE"/>
    <description>
    Sign extension error in the ReadDIBImage function in ImageMagick before 6.3.5-9 allows context-dependent attackers to execute arbitrary code via a crafted width value in an image file, which triggers an integer overflow and a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-4988.html">CVE-2007-4988</cve>
<bugzilla href="https://bugzilla.suse.com/327021">SUSE bug 327021</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199580" comment="libMagickCore1-6.4.3.6-7.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199581" comment="libMagickCore1-32bit-6.4.3.6-7.26 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4995</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-4995" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4995" source="CVE"/>
    <description>
    Off-by-one error in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8f allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-4995.html">CVE-2007-4995</cve>
<bugzilla href="https://bugzilla.suse.com/331726">SUSE bug 331726</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199638" comment="libopenssl0_9_8-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199639" comment="libopenssl0_9_8-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199640" comment="libopenssl0_9_8-hmac-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199641" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199642" comment="libopenssl0_9_8-x86-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199643" comment="openssl-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199644" comment="openssl-doc-0.9.8j-0.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5000</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-5000" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5000" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the (1) mod_imap module in the Apache HTTP Server 1.3.0 through 1.3.39 and 2.0.35 through 2.0.61 and the (2) mod_imagemap module in the Apache HTTP Server 2.2.0 through 2.2.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-5000.html">CVE-2007-5000</cve>
<bugzilla href="https://bugzilla.suse.com/353859">SUSE bug 353859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/355888">SUSE bug 355888</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199288" comment="apache2-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199289" comment="apache2-doc-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199290" comment="apache2-example-pages-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199291" comment="apache2-prefork-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199292" comment="apache2-utils-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199293" comment="apache2-worker-2.2.12-1.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5116</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-5116" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5116" source="CVE"/>
    <description>
    Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent attackers to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-5116.html">CVE-2007-5116</cve>
<bugzilla href="https://bugzilla.suse.com/332199">SUSE bug 332199</bugzilla>
<bugzilla href="https://bugzilla.suse.com/372331">SUSE bug 372331</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915514">SUSE bug 915514</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199743" comment="perl-5.10.0-64.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199744" comment="perl-32bit-5.10.0-64.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199745" comment="perl-Module-Build-0.2808.01-0.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199746" comment="perl-Test-Simple-0.72-0.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199747" comment="perl-base-5.10.0-64.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199748" comment="perl-doc-5.10.0-64.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199749" comment="perl-x86-5.10.0-64.67 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5135</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-5135" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5135" source="CVE"/>
    <description>
    Off-by-one error in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 up to 0.9.7l, and 0.9.8 up to 0.9.8f, might allow remote attackers to execute arbitrary code via a crafted packet that triggers a one-byte buffer underflow.  NOTE: this issue was introduced as a result of a fix for CVE-2006-3738.  As of 20071012, it is unknown whether code execution is possible.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-5135.html">CVE-2007-5135</cve>
<bugzilla href="https://bugzilla.suse.com/329208">SUSE bug 329208</bugzilla>
<bugzilla href="https://bugzilla.suse.com/331726">SUSE bug 331726</bugzilla>
<bugzilla href="https://bugzilla.suse.com/363663">SUSE bug 363663</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199638" comment="libopenssl0_9_8-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199639" comment="libopenssl0_9_8-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199640" comment="libopenssl0_9_8-hmac-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199641" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199642" comment="libopenssl0_9_8-x86-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199643" comment="openssl-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199644" comment="openssl-doc-0.9.8j-0.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5162</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-5162" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5162" source="CVE"/>
    <description>
    The connect method in lib/net/http.rb in the (1) Net::HTTP and (2) Net::HTTPS libraries in Ruby 1.8.5 and 1.8.6 does not verify that the commonName (CN) field in a server certificate matches the domain name in an HTTPS request, which makes it easier for remote attackers to intercept SSL transmissions via a man-in-the-middle attack or spoofed web site.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-5162.html">CVE-2007-5162</cve>
<bugzilla href="https://bugzilla.suse.com/329706">SUSE bug 329706</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199778" comment="ruby-1.8.7.p357-0.9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199779" comment="ruby-doc-html-1.8.7.p357-0.9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199780" comment="ruby-tk-1.8.7.p357-0.9.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5208</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-5208" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5208" source="CVE"/>
    <description>
    hpssd in Hewlett-Packard Linux Imaging and Printing Project (hplip) 1.x and 2.x before 2.7.10 allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a from address, which is not properly handled when invoking sendmail.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-5208.html">CVE-2007-5208</cve>
<bugzilla href="https://bugzilla.suse.com/331015">SUSE bug 331015</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198898" comment="hplip-3.11.10-0.6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198899" comment="hplip-hpijs-3.11.10-0.6.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5392</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-5392" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5392" source="CVE"/>
    <description>
    Integer overflow in the DCTStream::reset method in xpdf/Stream.cc in Xpdf 3.02p11 allows remote attackers to execute arbitrary code via a crafted PDF file, resulting in a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-5392.html">CVE-2007-5392</cve>
<bugzilla href="https://bugzilla.suse.com/335637">SUSE bug 335637</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199386" comment="cups-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199387" comment="cups-client-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199388" comment="cups-libs-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199389" comment="cups-libs-32bit-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199390" comment="cups-libs-x86-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199649" comment="libpoppler-glib4-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199650" comment="libpoppler-qt4-3-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199651" comment="libpoppler5-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199652" comment="poppler-tools-0.12.3-1.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5393</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-5393" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5393" source="CVE"/>
    <description>
    Heap-based buffer overflow in the CCITTFaxStream::lookChar method in xpdf/Stream.cc in Xpdf 3.02p11 allows remote attackers to execute arbitrary code via a PDF file that contains a crafted CCITTFaxDecode filter.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-5393.html">CVE-2007-5393</cve>
<bugzilla href="https://bugzilla.suse.com/335637">SUSE bug 335637</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199386" comment="cups-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199387" comment="cups-client-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199388" comment="cups-libs-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199389" comment="cups-libs-32bit-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199390" comment="cups-libs-x86-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199649" comment="libpoppler-glib4-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199650" comment="libpoppler-qt4-3-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199651" comment="libpoppler5-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199652" comment="poppler-tools-0.12.3-1.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5398</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-5398" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5398" source="CVE"/>
    <description>
    Stack-based buffer overflow in the reply_netbios_packet function in nmbd/nmbd_packets.c in nmbd in Samba 3.0.0 through 3.0.26a, when operating as a WINS server, allows remote attackers to execute arbitrary code via crafted WINS Name Registration requests followed by a WINS Name Query request.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-5398.html">CVE-2007-5398</cve>
<bugzilla href="https://bugzilla.suse.com/337823">SUSE bug 337823</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199376" comment="cifs-utils-5.1-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199555" comment="ldapsmb-1.34b-12.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199556" comment="libldb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199557" comment="libsmbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199558" comment="libsmbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199559" comment="libsmbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199560" comment="libtalloc2-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199561" comment="libtalloc2-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199562" comment="libtalloc2-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199563" comment="libtdb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199564" comment="libtdb1-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199565" comment="libtdb1-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199566" comment="libtevent0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199567" comment="libwbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199568" comment="libwbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199569" comment="libwbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199570" comment="samba-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199571" comment="samba-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199572" comment="samba-client-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199573" comment="samba-client-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199574" comment="samba-client-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199575" comment="samba-krb-printing-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199576" comment="samba-winbind-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199577" comment="samba-winbind-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199578" comment="samba-winbind-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199579" comment="samba-x86-3.6.3-0.39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5497</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-5497" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5497" source="CVE"/>
    <description>
    Multiple integer overflows in libext2fs in e2fsprogs before 1.40.3 allow user-assisted remote attackers to execute arbitrary code via a crafted filesystem image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-5497.html">CVE-2007-5497</cve>
<bugzilla href="https://bugzilla.suse.com/340473">SUSE bug 340473</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199406" comment="e2fsprogs-1.41.9-2.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199407" comment="libcom_err2-1.41.9-2.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199408" comment="libcom_err2-32bit-1.41.9-2.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199409" comment="libcom_err2-x86-1.41.9-2.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199410" comment="libext2fs2-1.41.9-2.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5623</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-5623" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5623" source="CVE"/>
    <description>
    Buffer overflow in the check_snmp function in Nagios Plugins (nagios-plugins) 1.4.10 allows remote attackers to cause a denial of service (crash) via crafted snmpget replies.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-5623.html">CVE-2007-5623</cve>
<bugzilla href="https://bugzilla.suse.com/336002">SUSE bug 336002</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199719" comment="nagios-plugins-1.4.16-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199720" comment="nagios-plugins-extras-1.4.16-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5760</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-5760" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5760" source="CVE"/>
    <description>
    Array index error in the XFree86-Misc extension in X.Org Xserver before 1.4.1 allows context-dependent attackers to execute arbitrary code via a PassMessage request containing a large array index.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-5760.html">CVE-2007-5760</cve>
<bugzilla href="https://bugzilla.suse.com/345496">SUSE bug 345496</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199825" comment="xorg-x11-Xvnc-7.4-27.81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199826" comment="xorg-x11-server-7.4-27.81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199827" comment="xorg-x11-server-extra-7.4-27.81 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5770</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-5770" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5770" source="CVE"/>
    <description>
    The (1) Net::ftptls, (2) Net::telnets, (3) Net::imap, (4) Net::pop, and (5) Net::smtp libraries in Ruby 1.8.5 and 1.8.6 do not verify that the commonName (CN) field in a server certificate matches the domain name in a request sent over SSL, which makes it easier for remote attackers to intercept SSL transmissions via a man-in-the-middle attack or spoofed web site, different components than CVE-2007-5162.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-5770.html">CVE-2007-5770</cve>
<bugzilla href="https://bugzilla.suse.com/329706">SUSE bug 329706</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199778" comment="ruby-1.8.7.p357-0.9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199779" comment="ruby-doc-html-1.8.7.p357-0.9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199780" comment="ruby-tk-1.8.7.p357-0.9.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5795</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-5795" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5795" source="CVE"/>
    <description>
    The hack-local-variables function in Emacs before 22.2, when enable-local-variables is set to :safe, does not properly search lists of unsafe or risky variables, which might allow user-assisted attackers to bypass intended restrictions and modify critical program variables via a file containing a Local variables declaration.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-5795.html">CVE-2007-5795</cve>
<bugzilla href="https://bugzilla.suse.com/339033">SUSE bug 339033</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198815" comment="emacs-22.3-4.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198816" comment="emacs-el-22.3-4.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198817" comment="emacs-info-22.3-4.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198818" comment="emacs-nox-22.3-4.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198819" comment="emacs-x11-22.3-4.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5803</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-5803" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5803" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in CGI programs in Nagios before 2.12 might allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different issue than CVE-2007-5624 and CVE-2008-1360.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-5803.html">CVE-2007-5803</cve>
<bugzilla href="https://bugzilla.suse.com/339447">SUSE bug 339447</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199717" comment="nagios-3.0.6-1.25.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199718" comment="nagios-www-3.0.6-1.25.28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5894</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-5894" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5894" source="CVE"/>
    <description>
    ** DISPUTED **  The reply function in ftpd.c in the gssftp ftpd in MIT Kerberos 5 (krb5) does not initialize the length variable when auth_type has a certain value, which has unknown impact and remote authenticated attack vectors.  NOTE: the original disclosure misidentifies the conditions under which the uninitialized variable is used.  NOTE: the vendor disputes this issue, stating " The 'length' variable is only uninitialized if 'auth_type' is neither the 'KERBEROS_V4' nor 'GSSAPI'; this condition cannot occur in the unmodified source code."
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-5894.html">CVE-2007-5894</cve>
<bugzilla href="https://bugzilla.suse.com/346745">SUSE bug 346745</bugzilla>
<bugzilla href="https://bugzilla.suse.com/346749">SUSE bug 346749</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199544" comment="krb5-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199545" comment="krb5-32bit-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199546" comment="krb5-apps-clients-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199547" comment="krb5-apps-servers-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199548" comment="krb5-client-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199549" comment="krb5-server-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199550" comment="krb5-x86-1.6.3-133.49.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5902</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-5902" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5902" source="CVE"/>
    <description>
    Integer overflow in the svcauth_gss_get_principal function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (krb5) allows remote attackers to have an unknown impact via a large length value for a GSS client name in an RPC request.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-5902.html">CVE-2007-5902</cve>
<bugzilla href="https://bugzilla.suse.com/346747">SUSE bug 346747</bugzilla>
<bugzilla href="https://bugzilla.suse.com/346749">SUSE bug 346749</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199544" comment="krb5-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199545" comment="krb5-32bit-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199546" comment="krb5-apps-clients-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199547" comment="krb5-apps-servers-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199548" comment="krb5-client-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199549" comment="krb5-server-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199550" comment="krb5-x86-1.6.3-133.49.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5969</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-5969" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5969" source="CVE"/>
    <description>
    MySQL Community Server 5.0.x before 5.0.51, Enterprise Server 5.0.x before 5.0.52, Server 5.1.x before 5.1.23, and Server 6.0.x before 6.0.4, when a table relies on symlinks created through explicit DATA DIRECTORY and INDEX DIRECTORY options, allows remote authenticated users to overwrite system table information and gain privileges via a RENAME TABLE statement that changes the symlink to point to an existing file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-5969.html">CVE-2007-5969</cve>
<bugzilla href="https://bugzilla.suse.com/347223">SUSE bug 347223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/348003">SUSE bug 348003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/348307">SUSE bug 348307</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199635" comment="mysql-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199636" comment="mysql-client-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199637" comment="mysql-tools-5.5.31-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5971</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-5971" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5971" source="CVE"/>
    <description>
    Double free vulnerability in the gss_krb5int_make_seal_token_v3 function in lib/gssapi/krb5/k5sealv3.c in MIT Kerberos 5 (krb5) has unknown impact and attack vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-5971.html">CVE-2007-5971</cve>
<bugzilla href="https://bugzilla.suse.com/346748">SUSE bug 346748</bugzilla>
<bugzilla href="https://bugzilla.suse.com/346749">SUSE bug 346749</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199544" comment="krb5-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199545" comment="krb5-32bit-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199546" comment="krb5-apps-clients-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199547" comment="krb5-apps-servers-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199548" comment="krb5-client-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199549" comment="krb5-server-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199550" comment="krb5-x86-1.6.3-133.49.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5972</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-5972" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5972" source="CVE"/>
    <description>
    Double free vulnerability in the krb5_def_store_mkey function in lib/kdb/kdb_default.c in MIT Kerberos 5 (krb5) 1.5 has unknown impact and remote authenticated attack vectors.  NOTE: the free operations occur in code that stores the krb5kdc master key, and so the attacker must have privileges to store this key.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-5972.html">CVE-2007-5972</cve>
<bugzilla href="https://bugzilla.suse.com/346749">SUSE bug 346749</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199544" comment="krb5-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199545" comment="krb5-32bit-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199546" comment="krb5-apps-clients-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199547" comment="krb5-apps-servers-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199548" comment="krb5-client-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199549" comment="krb5-server-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199550" comment="krb5-x86-1.6.3-133.49.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6015</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-6015" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6015" source="CVE"/>
    <description>
    Stack-based buffer overflow in the send_mailslot function in nmbd in Samba 3.0.0 through 3.0.27a, when the "domain logons" option is enabled, allows remote attackers to execute arbitrary code via a GETDC mailslot request composed of a long GETDC string following an offset username in a SAMLOGON logon request.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-6015.html">CVE-2007-6015</cve>
<bugzilla href="https://bugzilla.suse.com/343702">SUSE bug 343702</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199376" comment="cifs-utils-5.1-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199555" comment="ldapsmb-1.34b-12.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199556" comment="libldb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199557" comment="libsmbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199558" comment="libsmbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199559" comment="libsmbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199560" comment="libtalloc2-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199561" comment="libtalloc2-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199562" comment="libtalloc2-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199563" comment="libtdb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199564" comment="libtdb1-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199565" comment="libtdb1-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199566" comment="libtevent0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199567" comment="libwbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199568" comment="libwbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199569" comment="libwbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199570" comment="samba-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199571" comment="samba-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199572" comment="samba-client-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199573" comment="samba-client-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199574" comment="samba-client-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199575" comment="samba-krb-printing-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199576" comment="samba-winbind-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199577" comment="samba-winbind-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199578" comment="samba-winbind-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199579" comment="samba-x86-3.6.3-0.39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6067</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-6067" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6067" source="CVE"/>
    <description>
    Algorithmic complexity vulnerability in the regular expression parser in TCL before 8.4.17, as used in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, and 7.4 before 7.4.19, allows remote authenticated users to cause a denial of service (memory consumption) via a crafted "complex" regular expression with doubly-nested states.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-6067.html">CVE-2007-6067</cve>
<bugzilla href="https://bugzilla.suse.com/329282">SUSE bug 329282</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199606" comment="libecpg6-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199607" comment="libpq5-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199608" comment="libpq5-32bit-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199750" comment="postgresql-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199751" comment="postgresql-contrib-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199752" comment="postgresql-docs-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199753" comment="postgresql-server-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199609" comment="postgresql91-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199610" comment="postgresql91-contrib-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199611" comment="postgresql91-docs-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199612" comment="postgresql91-server-9.1.9-0.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6199</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-6199" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6199" source="CVE"/>
    <description>
    rsync before 3.0.0pre6, when running a writable rsync daemon that is not using chroot, allows remote attackers to access restricted files via unknown vectors that cause rsync to create a symlink that points outside of the module's hierarchy.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-6199.html">CVE-2007-6199</cve>
<bugzilla href="https://bugzilla.suse.com/345507">SUSE bug 345507</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199767" comment="rsync-3.0.4-2.47 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6284</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-6284" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6284" source="CVE"/>
    <description>
    The xmlCurrentChar function in libxml2 before 2.6.31 allows context-dependent attackers to cause a denial of service (infinite loop) via XML containing invalid UTF-8 sequences.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-6284.html">CVE-2007-6284</cve>
<bugzilla href="https://bugzilla.suse.com/349151">SUSE bug 349151</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199702" comment="libxml2-2.7.6-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199703" comment="libxml2-32bit-2.7.6-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199704" comment="libxml2-doc-2.7.6-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199705" comment="libxml2-x86-2.7.6-0.23 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6303</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-6303" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6303" source="CVE"/>
    <description>
    MySQL 5.0.x before 5.0.51a, 5.1.x before 5.1.23, and 6.0.x before 6.0.4 does not update the DEFINER value of a view when the view is altered, which allows remote authenticated users to gain privileges via a sequence of statements including a CREATE SQL SECURITY DEFINER VIEW statement and an ALTER VIEW statement.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-6303.html">CVE-2007-6303</cve>
<bugzilla href="https://bugzilla.suse.com/348003">SUSE bug 348003</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199635" comment="mysql-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199636" comment="mysql-client-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199637" comment="mysql-tools-5.5.31-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6304</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-6304" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6304" source="CVE"/>
    <description>
    The federated engine in MySQL 5.0.x before 5.0.51a, 5.1.x before 5.1.23, and 6.0.x before 6.0.4, when performing a certain SHOW TABLE STATUS query, allows remote MySQL servers to cause a denial of service (federated handler crash and daemon crash) via a response that lacks the minimum required number of columns.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-6304.html">CVE-2007-6304</cve>
<bugzilla href="https://bugzilla.suse.com/348003">SUSE bug 348003</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199635" comment="mysql-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199636" comment="mysql-client-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199637" comment="mysql-tools-5.5.31-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6335</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-6335" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6335" source="CVE"/>
    <description>
    Integer overflow in libclamav in ClamAV before 0.92 allows remote attackers to execute arbitrary code via a crafted MEW packed PE file, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-6335.html">CVE-2007-6335</cve>
<bugzilla href="https://bugzilla.suse.com/343277">SUSE bug 343277</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199377" comment="clamav-0.97.7-0.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6336</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-6336" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6336" source="CVE"/>
    <description>
    Off-by-one error in ClamAV before 0.92 allows remote attackers to execute arbitrary code via a crafted MS-ZIP compressed CAB file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-6336.html">CVE-2007-6336</cve>
<bugzilla href="https://bugzilla.suse.com/343277">SUSE bug 343277</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199377" comment="clamav-0.97.7-0.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6337</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-6337" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6337" source="CVE"/>
    <description>
    Unspecified vulnerability in the bzip2 decompression algorithm in nsis/bzlib_private.h in ClamAV before 0.92 has unknown impact and remote attack vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-6337.html">CVE-2007-6337</cve>
<bugzilla href="https://bugzilla.suse.com/343277">SUSE bug 343277</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199377" comment="clamav-0.97.7-0.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6351</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-6351" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6351" source="CVE"/>
    <description>
    libexif 0.6.16 and earlier allows context-dependent attackers to cause a denial of service (infinite recursion) via an image file with crafted EXIF tags, possibly involving the exif_loader_write function in exif_loader.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-6351.html">CVE-2007-6351</cve>
<bugzilla href="https://bugzilla.suse.com/348748">SUSE bug 348748</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199613" comment="libexif-0.6.17-2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199614" comment="libexif-32bit-0.6.17-2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199615" comment="libexif-x86-0.6.17-2.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6352</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-6352" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6352" source="CVE"/>
    <description>
    Integer overflow in libexif 0.6.16 and earlier allows context-dependent attackers to execute arbitrary code via an image with crafted EXIF tags, possibly involving the exif_data_load_data_thumbnail function in exif-data.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-6352.html">CVE-2007-6352</cve>
<bugzilla href="https://bugzilla.suse.com/348748">SUSE bug 348748</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199613" comment="libexif-0.6.17-2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199614" comment="libexif-32bit-0.6.17-2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199615" comment="libexif-x86-0.6.17-2.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6353</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-6353" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6353" source="CVE"/>
    <description>
    Integer overflow in exif.cpp in exiv2 library allows context-dependent attackers to execute arbitrary code via a crafted EXIF file that triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-6353.html">CVE-2007-6353</cve>
<bugzilla href="https://bugzilla.suse.com/348748">SUSE bug 348748</bugzilla>
<bugzilla href="https://bugzilla.suse.com/435509">SUSE bug 435509</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198443" comment="libexiv2-4-0.17.1-31 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6388</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-6388" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6388" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in mod_status in the Apache HTTP Server 2.2.0 through 2.2.6, 2.0.35 through 2.0.61, and 1.3.2 through 1.3.39, when the server-status page is enabled, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-6388.html">CVE-2007-6388</cve>
<bugzilla href="https://bugzilla.suse.com/352235">SUSE bug 352235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/355888">SUSE bug 355888</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199288" comment="apache2-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199289" comment="apache2-doc-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199290" comment="apache2-example-pages-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199291" comment="apache2-prefork-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199292" comment="apache2-utils-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199293" comment="apache2-worker-2.2.12-1.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6420</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-6420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6420" source="CVE"/>
    <description>
    Cross-site request forgery (CSRF) vulnerability in the balancer-manager in mod_proxy_balancer for Apache HTTP Server 2.2.x allows remote attackers to gain privileges via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-6420.html">CVE-2007-6420</cve>
<bugzilla href="https://bugzilla.suse.com/353261">SUSE bug 353261</bugzilla>
<bugzilla href="https://bugzilla.suse.com/373903">SUSE bug 373903</bugzilla>
<bugzilla href="https://bugzilla.suse.com/422464">SUSE bug 422464</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199288" comment="apache2-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199289" comment="apache2-doc-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199290" comment="apache2-example-pages-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199291" comment="apache2-prefork-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199292" comment="apache2-utils-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199293" comment="apache2-worker-2.2.12-1.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6421</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-6421" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6421" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in balancer-manager in mod_proxy_balancer in the Apache HTTP Server 2.2.0 through 2.2.6 allows remote attackers to inject arbitrary web script or HTML via the (1) ss, (2) wr, or (3) rr parameters, or (4) the URL.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-6421.html">CVE-2007-6421</cve>
<bugzilla href="https://bugzilla.suse.com/353261">SUSE bug 353261</bugzilla>
<bugzilla href="https://bugzilla.suse.com/355888">SUSE bug 355888</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199288" comment="apache2-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199289" comment="apache2-doc-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199290" comment="apache2-example-pages-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199291" comment="apache2-prefork-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199292" comment="apache2-utils-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199293" comment="apache2-worker-2.2.12-1.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-6422" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6422" source="CVE"/>
    <description>
    The balancer_handler function in mod_proxy_balancer in the Apache HTTP Server 2.2.0 through 2.2.6, when a threaded Multi-Processing Module is used, allows remote authenticated users to cause a denial of service (child process crash) via an invalid bb variable.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-6422.html">CVE-2007-6422</cve>
<bugzilla href="https://bugzilla.suse.com/353261">SUSE bug 353261</bugzilla>
<bugzilla href="https://bugzilla.suse.com/355888">SUSE bug 355888</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199288" comment="apache2-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199289" comment="apache2-doc-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199290" comment="apache2-example-pages-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199291" comment="apache2-prefork-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199292" comment="apache2-utils-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199293" comment="apache2-worker-2.2.12-1.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6427</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-6427" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6427" source="CVE"/>
    <description>
    The XInput extension in X.Org Xserver before 1.4.1 allows context-dependent attackers to execute arbitrary code via requests related to byte swapping and heap corruption within multiple functions, a different vulnerability than CVE-2007-4990.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-6427.html">CVE-2007-6427</cve>
<bugzilla href="https://bugzilla.suse.com/345127">SUSE bug 345127</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199825" comment="xorg-x11-Xvnc-7.4-27.81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199826" comment="xorg-x11-server-7.4-27.81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199827" comment="xorg-x11-server-extra-7.4-27.81 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6428</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-6428" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6428" source="CVE"/>
    <description>
    The ProcGetReservedColormapEntries function in the TOG-CUP extension in X.Org Xserver before 1.4.1 allows context-dependent attackers to read the contents of arbitrary memory locations via a request containing a 32-bit value that is improperly used as an array index.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-6428.html">CVE-2007-6428</cve>
<bugzilla href="https://bugzilla.suse.com/345128">SUSE bug 345128</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199825" comment="xorg-x11-Xvnc-7.4-27.81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199826" comment="xorg-x11-server-7.4-27.81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199827" comment="xorg-x11-server-extra-7.4-27.81 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6429</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-6429" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6429" source="CVE"/>
    <description>
    Multiple integer overflows in X.Org Xserver before 1.4.1 allow context-dependent attackers to execute arbitrary code via (1) a GetVisualInfo request containing a 32-bit value that is improperly used to calculate an amount of memory for allocation by the EVI extension, or (2) a request containing values related to pixmap size that are improperly used in management of shared memory by the MIT-SHM extension.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-6429.html">CVE-2007-6429</cve>
<bugzilla href="https://bugzilla.suse.com/345130">SUSE bug 345130</bugzilla>
<bugzilla href="https://bugzilla.suse.com/345131">SUSE bug 345131</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199825" comment="xorg-x11-Xvnc-7.4-27.81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199826" comment="xorg-x11-server-7.4-27.81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199827" comment="xorg-x11-server-extra-7.4-27.81 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6595</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-6595" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6595" source="CVE"/>
    <description>
    ClamAV 0.92 allows local users to overwrite arbitrary files via a symlink attack on (1) temporary files used by the cli_gentempfd function in libclamav/others.c or on (2) .ascii files used by sigtool, when utf16-decode is enabled.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-6595.html">CVE-2007-6595</cve>
<bugzilla href="https://bugzilla.suse.com/350987">SUSE bug 350987</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199377" comment="clamav-0.97.7-0.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6596</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-6596" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6596" source="CVE"/>
    <description>
    ClamAV 0.92 does not recognize Base64 UUEncoded archives, which allows remote attackers to bypass the scanner via a Base64-UUEncoded file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-6596.html">CVE-2007-6596</cve>
<bugzilla href="https://bugzilla.suse.com/350987">SUSE bug 350987</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199377" comment="clamav-0.97.7-0.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6600</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-6600" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6600" source="CVE"/>
    <description>
    PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, 7.4 before 7.4.19, and 7.3 before 7.3.21 uses superuser privileges instead of table owner privileges for (1) VACUUM and (2) ANALYZE operations within index functions, and supports (3) SET ROLE and (4) SET SESSION AUTHORIZATION within index functions, which allows remote authenticated users to gain privileges.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-6600.html">CVE-2007-6600</cve>
<bugzilla href="https://bugzilla.suse.com/329282">SUSE bug 329282</bugzilla>
<bugzilla href="https://bugzilla.suse.com/537706">SUSE bug 537706</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199606" comment="libecpg6-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199607" comment="libpq5-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199608" comment="libpq5-32bit-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199750" comment="postgresql-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199751" comment="postgresql-contrib-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199752" comment="postgresql-docs-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199753" comment="postgresql-server-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199609" comment="postgresql91-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199610" comment="postgresql91-contrib-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199611" comment="postgresql91-docs-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199612" comment="postgresql91-server-9.1.9-0.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6601</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-6601" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6601" source="CVE"/>
    <description>
    The DBLink module in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, 7.4 before 7.4.19, and 7.3 before 7.3.21, when local trust or ident authentication is used, allows remote attackers to gain privileges via unspecified vectors.  NOTE: this issue exists because of an incomplete fix for CVE-2007-3278.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-6601.html">CVE-2007-6601</cve>
<bugzilla href="https://bugzilla.suse.com/328403">SUSE bug 328403</bugzilla>
<bugzilla href="https://bugzilla.suse.com/329282">SUSE bug 329282</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199606" comment="libecpg6-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199607" comment="libpq5-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199608" comment="libpq5-32bit-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199750" comment="postgresql-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199751" comment="postgresql-contrib-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199752" comment="postgresql-docs-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199753" comment="postgresql-server-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199609" comment="postgresql91-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199610" comment="postgresql91-contrib-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199611" comment="postgresql91-docs-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199612" comment="postgresql91-server-9.1.9-0.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6750</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2007-6750" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6750" source="CVE"/>
    <description>
    The Apache HTTP Server 1.x and 2.x allows remote attackers to cause a denial of service (daemon outage) via partial HTTP requests, as demonstrated by Slowloris, related to the lack of the mod_reqtimeout module in versions before 2.2.15.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-6750.html">CVE-2007-6750</cve>
<bugzilla href="https://bugzilla.suse.com/738855">SUSE bug 738855</bugzilla>
<bugzilla href="https://bugzilla.suse.com/741840">SUSE bug 741840</bugzilla>
<bugzilla href="https://bugzilla.suse.com/997229">SUSE bug 997229</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199288" comment="apache2-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199289" comment="apache2-doc-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199290" comment="apache2-example-pages-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199291" comment="apache2-prefork-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199292" comment="apache2-utils-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199293" comment="apache2-worker-2.2.12-1.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0005</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-0005" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0005" source="CVE"/>
    <description>
    mod_proxy_ftp in Apache 2.2.x before 2.2.7-dev, 2.0.x before 2.0.62-dev, and 1.3.x before 1.3.40-dev does not define a charset, which allows remote attackers to conduct cross-site scripting (XSS) attacks using UTF-7 encoding.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-0005.html">CVE-2008-0005</cve>
<bugzilla href="https://bugzilla.suse.com/353262">SUSE bug 353262</bugzilla>
<bugzilla href="https://bugzilla.suse.com/355888">SUSE bug 355888</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199288" comment="apache2-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199289" comment="apache2-doc-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199290" comment="apache2-example-pages-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199291" comment="apache2-prefork-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199292" comment="apache2-utils-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199293" comment="apache2-worker-2.2.12-1.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0006</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-0006" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0006" source="CVE"/>
    <description>
    Buffer overflow in (1) X.Org Xserver before 1.4.1, and (2) the libfont and libXfont libraries on some platforms including Sun Solaris, allows context-dependent attackers to execute arbitrary code via a PCF font with a large difference between the last col and first col values in the PCF_BDF_ENCODINGS table.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-0006.html">CVE-2008-0006</cve>
<bugzilla href="https://bugzilla.suse.com/348296">SUSE bug 348296</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199825" comment="xorg-x11-Xvnc-7.4-27.81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199826" comment="xorg-x11-server-7.4-27.81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199827" comment="xorg-x11-server-extra-7.4-27.81 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0007</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-0007" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0007" source="CVE"/>
    <description>
    Linux kernel before 2.6.22.17, when using certain drivers that register a fault handler that does not perform range checks, allows local users to access kernel memory via an out-of-range offset.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-0007.html">CVE-2008-0007</cve>
<bugzilla href="https://bugzilla.suse.com/353207">SUSE bug 353207</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0008</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-0008" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0008" source="CVE"/>
    <description>
    The pa_drop_root function in PulseAudio 0.9.8, and a certain 0.9.9 build, does not check return values from (1) setresuid, (2) setreuid, (3) setuid, and (4) seteuid calls when attempting to drop privileges, which might allow local users to gain privileges by causing those calls to fail via attacks such as resource exhaustion.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-0008.html">CVE-2008-0008</cve>
<bugzilla href="https://bugzilla.suse.com/347822">SUSE bug 347822</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199055" comment="libpulse-browse0-0.9.23-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199056" comment="libpulse-mainloop-glib0-0.9.23-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199057" comment="libpulse0-0.9.23-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199058" comment="libpulse0-32bit-0.9.23-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199059" comment="libpulse0-x86-0.9.23-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199060" comment="pulseaudio-0.9.23-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199061" comment="pulseaudio-esound-compat-0.9.23-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199062" comment="pulseaudio-gdm-hooks-0.9.23-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199063" comment="pulseaudio-lang-0.9.23-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199064" comment="pulseaudio-module-x11-0.9.23-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199065" comment="pulseaudio-module-zeroconf-0.9.23-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199066" comment="pulseaudio-utils-0.9.23-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0009</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-0009" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0009" source="CVE"/>
    <description>
    The vmsplice_to_user function in fs/splice.c in the Linux kernel 2.6.22 through 2.6.24 does not validate a certain userspace pointer before dereference, which might allow local users to access arbitrary kernel memory locations.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-0009.html">CVE-2008-0009</cve>
<bugzilla href="https://bugzilla.suse.com/358006">SUSE bug 358006</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0010</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-0010" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0010" source="CVE"/>
    <description>
    The copy_from_user_mmap_sem function in fs/splice.c in the Linux kernel 2.6.22 through 2.6.24 does not validate a certain userspace pointer before dereference, which allow local users to read from arbitrary kernel memory locations.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-0010.html">CVE-2008-0010</cve>
<bugzilla href="https://bugzilla.suse.com/358006">SUSE bug 358006</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0047</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-0047" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0047" source="CVE"/>
    <description>
    Heap-based buffer overflow in the cgiCompileSearch function in CUPS 1.3.5, and other versions including the version bundled with Apple Mac OS X 10.5.2, when printer sharing is enabled, allows remote attackers to execute arbitrary code via crafted search expressions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-0047.html">CVE-2008-0047</cve>
<bugzilla href="https://bugzilla.suse.com/367225">SUSE bug 367225</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199386" comment="cups-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199387" comment="cups-client-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199388" comment="cups-libs-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199389" comment="cups-libs-32bit-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199390" comment="cups-libs-x86-1.3.9-8.46.46 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0062</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-0062" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0062" source="CVE"/>
    <description>
    KDC in MIT Kerberos 5 (krb5kdc) does not set a global variable for some krb4 message types, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted messages that trigger a NULL pointer dereference or double-free.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-0062.html">CVE-2008-0062</cve>
<bugzilla href="https://bugzilla.suse.com/361373">SUSE bug 361373</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199544" comment="krb5-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199545" comment="krb5-32bit-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199546" comment="krb5-apps-clients-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199547" comment="krb5-apps-servers-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199548" comment="krb5-client-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199549" comment="krb5-server-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199550" comment="krb5-x86-1.6.3-133.49.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0063</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-0063" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0063" source="CVE"/>
    <description>
    The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not properly clear the unused portion of a buffer when generating an error message, which might allow remote attackers to obtain sensitive information, aka "Uninitialized stack values."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-0063.html">CVE-2008-0063</cve>
<bugzilla href="https://bugzilla.suse.com/361373">SUSE bug 361373</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199544" comment="krb5-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199545" comment="krb5-32bit-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199546" comment="krb5-apps-clients-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199547" comment="krb5-apps-servers-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199548" comment="krb5-client-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199549" comment="krb5-server-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199550" comment="krb5-x86-1.6.3-133.49.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0171</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-0171" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0171" source="CVE"/>
    <description>
    regex/v4/perl_matcher_non_recursive.hpp in the Boost regex library (aka Boost.Regex) in Boost 1.33 and 1.34 allows context-dependent attackers to cause a denial of service (failed assertion and crash) via an invalid regular expression.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-0171.html">CVE-2008-0171</cve>
<bugzilla href="https://bugzilla.suse.com/353180">SUSE bug 353180</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199371" comment="boost-license-1.36.0-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199372" comment="libboost_program_options1_36_0-1.36.0-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199373" comment="libboost_regex1_36_0-1.36.0-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199374" comment="libboost_signals1_36_0-1.36.0-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199375" comment="libboost_thread1_36_0-1.36.0-12.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0318</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-0318" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0318" source="CVE"/>
    <description>
    Integer overflow in the cli_scanpe function in libclamav in ClamAV before 0.92.1, as used in clamd, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted Petite packed PE file, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-0318.html">CVE-2008-0318</cve>
<bugzilla href="https://bugzilla.suse.com/361374">SUSE bug 361374</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199377" comment="clamav-0.97.7-0.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0386</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-0386" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0386" source="CVE"/>
    <description>
    Xdg-utils 1.0.2 and earlier allows user-assisted remote attackers to execute arbitrary commands via shell metacharacters in a URL argument to (1) xdg-open or (2) xdg-email.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-0386.html">CVE-2008-0386</cve>
<bugzilla href="https://bugzilla.suse.com/355061">SUSE bug 355061</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198633" comment="xdg-utils-1.0.2-36 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0412</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-0412" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0412" source="CVE"/>
    <description>
    The browser engine in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8 allows remote attackers to cause a denial of service (crash) and possibly trigger memory corruption via vectors related to the (1) nsTableFrame::GetFrameAtOrBefore, (2) nsAccessibilityService::GetAccessible, (3) nsBindingManager::GetNestedInsertionPoint, (4) nsXBLPrototypeBinding::AttributeChanged, (5) nsColumnSetFrame::GetContentInsertionFrame, and (6) nsLineLayout::TrimTrailingWhiteSpaceIn methods, and other vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-0412.html">CVE-2008-0412</cve>
<bugzilla href="https://bugzilla.suse.com/354469">SUSE bug 354469</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0414</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-0414" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0414" source="CVE"/>
    <description>
    Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8 allows user-assisted remote attackers to trick the user into uploading arbitrary files via label tags that shift focus to a file input field, aka "focus spoofing."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-0414.html">CVE-2008-0414</cve>
<bugzilla href="https://bugzilla.suse.com/354469">SUSE bug 354469</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0415</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-0415" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0415" source="CVE"/>
    <description>
    Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8 allows remote attackers to execute script outside of the sandbox and conduct cross-site scripting (XSS) attacks via multiple vectors including the XMLDocument.load function, aka "JavaScript privilege escalation bugs."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-0415.html">CVE-2008-0415</cve>
<bugzilla href="https://bugzilla.suse.com/354469">SUSE bug 354469</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0417</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-0417" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0417" source="CVE"/>
    <description>
    CRLF injection vulnerability in Mozilla Firefox before 2.0.0.12 allows remote user-assisted web sites to corrupt the user's password store via newlines that are not properly handled when the user saves a password.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-0417.html">CVE-2008-0417</cve>
<bugzilla href="https://bugzilla.suse.com/354469">SUSE bug 354469</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0418</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-0418" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0418" source="CVE"/>
    <description>
    Directory traversal vulnerability in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8, when using "flat" addons, allows remote attackers to read arbitrary Javascript, image, and stylesheet files via the chrome: URI scheme, as demonstrated by stealing session information from sessionstore.js.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-0418.html">CVE-2008-0418</cve>
<bugzilla href="https://bugzilla.suse.com/354469">SUSE bug 354469</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0419</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-0419" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0419" source="CVE"/>
    <description>
    Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8 allows remote attackers to steal navigation history and cause a denial of service (crash) via images in a page that uses designMode frames, which triggers memory corruption related to resize handles.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-0419.html">CVE-2008-0419</cve>
<bugzilla href="https://bugzilla.suse.com/354469">SUSE bug 354469</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0591</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-0591" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0591" source="CVE"/>
    <description>
    Mozilla Firefox before 2.0.0.12 and Thunderbird before 2.0.0.12 does not properly manage a delay timer used in confirmation dialogs, which might allow remote attackers to trick users into confirming an unsafe action, such as remote file execution, by using a timer to change the window focus, aka the "dialog refocus bug" or "ffclick2".
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-0591.html">CVE-2008-0591</cve>
<bugzilla href="https://bugzilla.suse.com/354469">SUSE bug 354469</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0592</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-0592" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0592" source="CVE"/>
    <description>
    Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8 allows user-assisted remote attackers to cause a denial of service via a plain .txt file with a "Content-Disposition: attachment" and an invalid "Content-Type: plain/text," which prevents Firefox from rendering future plain text files within the browser.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-0592.html">CVE-2008-0592</cve>
<bugzilla href="https://bugzilla.suse.com/354469">SUSE bug 354469</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0593</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-0593" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0593" source="CVE"/>
    <description>
    Gecko-based browsers, including Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8, modify the .href property of stylesheet DOM nodes to the final URI of a 302 redirect, which might allow remote attackers to bypass the Same Origin Policy and read sensitive information from the original URL, such as with Single-Signon systems.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-0593.html">CVE-2008-0593</cve>
<bugzilla href="https://bugzilla.suse.com/354469">SUSE bug 354469</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0594</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-0594" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0594" source="CVE"/>
    <description>
    Mozilla Firefox before 2.0.0.12 does not always display a web forgery warning dialog if the entire contents of a web page are in a DIV tag that uses absolute positioning, which makes it easier for remote attackers to conduct phishing attacks.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-0594.html">CVE-2008-0594</cve>
<bugzilla href="https://bugzilla.suse.com/354469">SUSE bug 354469</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0595</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-0595" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0595" source="CVE"/>
    <description>
    dbus-daemon in D-Bus before 1.0.3, and 1.1.x before 1.1.20, recognizes send_interface attributes in allow directives in the security policy only for fully qualified method calls, which allows local users to bypass intended access restrictions via a method call with a NULL interface.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-0595.html">CVE-2008-0595</cve>
<bugzilla href="https://bugzilla.suse.com/364532">SUSE bug 364532</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199397" comment="dbus-1-1.2.10-3.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199398" comment="dbus-1-32bit-1.2.10-3.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199399" comment="dbus-1-x11-1.2.10-3.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199400" comment="dbus-1-x86-1.2.10-3.27 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0599</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-0599" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0599" source="CVE"/>
    <description>
    The init_request_info function in sapi/cgi/cgi_main.c in PHP before 5.2.6 does not properly consider operator precedence when calculating the length of PATH_TRANSLATED, which might allow remote attackers to execute arbitrary code via a crafted URI.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-0599.html">CVE-2008-0599</cve>
<bugzilla href="https://bugzilla.suse.com/387745">SUSE bug 387745</bugzilla>
<bugzilla href="https://bugzilla.suse.com/393279">SUSE bug 393279</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199294" comment="apache2-mod_php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199295" comment="php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199296" comment="php53-bcmath-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199297" comment="php53-bz2-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199298" comment="php53-calendar-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199299" comment="php53-ctype-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199300" comment="php53-curl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199301" comment="php53-dba-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199302" comment="php53-dom-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199303" comment="php53-exif-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199304" comment="php53-fastcgi-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199305" comment="php53-fileinfo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199306" comment="php53-ftp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199307" comment="php53-gd-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199308" comment="php53-gettext-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199309" comment="php53-gmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199310" comment="php53-iconv-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199311" comment="php53-intl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199312" comment="php53-json-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199313" comment="php53-ldap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199314" comment="php53-mbstring-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199315" comment="php53-mcrypt-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199316" comment="php53-mysql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199317" comment="php53-odbc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199318" comment="php53-openssl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199319" comment="php53-pcntl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199320" comment="php53-pdo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199321" comment="php53-pear-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199322" comment="php53-pgsql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199323" comment="php53-pspell-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199324" comment="php53-shmop-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199325" comment="php53-snmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199326" comment="php53-soap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199327" comment="php53-suhosin-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199328" comment="php53-sysvmsg-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199329" comment="php53-sysvsem-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199330" comment="php53-sysvshm-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199331" comment="php53-tokenizer-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199332" comment="php53-wddx-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199333" comment="php53-xmlreader-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199334" comment="php53-xmlrpc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199335" comment="php53-xmlwriter-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199336" comment="php53-xsl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199337" comment="php53-zip-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199338" comment="php53-zlib-5.3.17-0.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0728</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-0728" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0728" source="CVE"/>
    <description>
    The unmew11 function in libclamav/mew.c in libclamav in ClamAV before 0.92.1 has unknown impact and attack vectors that trigger "heap corruption."
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-0728.html">CVE-2008-0728</cve>
<bugzilla href="https://bugzilla.suse.com/361403">SUSE bug 361403</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199377" comment="clamav-0.97.7-0.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0887</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-0887" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0887" source="CVE"/>
    <description>
    gnome-screensaver before 2.22.1, when a remote authentication server is enabled, crashes upon an unlock attempt during a network outage, which allows physically proximate attackers to gain access to the locked session, a related issue to CVE-2007-1859.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-0887.html">CVE-2008-0887</cve>
<bugzilla href="https://bugzilla.suse.com/372609">SUSE bug 372609</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199476" comment="gnome-screensaver-2.28.3-0.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199477" comment="gnome-screensaver-lang-2.28.3-0.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0891</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-0891" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0891" source="CVE"/>
    <description>
    Double free vulnerability in OpenSSL 0.9.8f and 0.9.8g, when the TLS server name extensions are enabled, allows remote attackers to cause a denial of service (crash) via a malformed Client Hello packet.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-0891.html">CVE-2008-0891</cve>
<bugzilla href="https://bugzilla.suse.com/394317">SUSE bug 394317</bugzilla>
<bugzilla href="https://bugzilla.suse.com/404511">SUSE bug 404511</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199638" comment="libopenssl0_9_8-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199639" comment="libopenssl0_9_8-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199640" comment="libopenssl0_9_8-hmac-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199641" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199642" comment="libopenssl0_9_8-x86-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199643" comment="openssl-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199644" comment="openssl-doc-0.9.8j-0.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0947</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-0947" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0947" source="CVE"/>
    <description>
    Buffer overflow in the RPC library used by libgssrpc and kadmind in MIT Kerberos 5 (krb5) 1.4 through 1.6.3 allows remote attackers to execute arbitrary code by triggering a large number of open file descriptors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-0947.html">CVE-2008-0947</cve>
<bugzilla href="https://bugzilla.suse.com/363151">SUSE bug 363151</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199544" comment="krb5-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199545" comment="krb5-32bit-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199546" comment="krb5-apps-clients-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199547" comment="krb5-apps-servers-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199548" comment="krb5-client-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199549" comment="krb5-server-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199550" comment="krb5-x86-1.6.3-133.49.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0948</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-0948" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0948" source="CVE"/>
    <description>
    Buffer overflow in the RPC library (lib/rpc/rpc_dtablesize.c) used by libgssrpc and kadmind in MIT Kerberos 5 (krb5) 1.2.2, and probably other versions before 1.3, when running on systems whose unistd.h does not define the FD_SETSIZE macro, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by triggering a large number of open file descriptors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-0948.html">CVE-2008-0948</cve>
<bugzilla href="https://bugzilla.suse.com/363151">SUSE bug 363151</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199544" comment="krb5-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199545" comment="krb5-32bit-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199546" comment="krb5-apps-clients-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199547" comment="krb5-apps-servers-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199548" comment="krb5-client-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199549" comment="krb5-server-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199550" comment="krb5-x86-1.6.3-133.49.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081036" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1036</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-1036" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1036" source="CVE"/>
    <description>
    The International Components for Unicode (ICU) library in Apple Mac OS X before 10.5.3, Red Hat Enterprise Linux 5, and other operating systems omits some invalid character sequences during conversion of some character encodings, which might allow remote attackers to conduct cross-site scripting (XSS) attacks.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-1036.html">CVE-2008-1036</cve>
<bugzilla href="https://bugzilla.suse.com/489649">SUSE bug 489649</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199020" comment="libicu-4.0-7.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199021" comment="libicu-32bit-4.0-7.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199022" comment="libicu-doc-4.0-7.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199630" comment="libicu-x86-4.0-7.26 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1100</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-1100" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1100" source="CVE"/>
    <description>
    Buffer overflow in the cli_scanpe function in libclamav (libclamav/pe.c) for ClamAV 0.92 and 0.92.1 allows remote attackers to execute arbitrary code via a crafted Upack PE file.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-1100.html">CVE-2008-1100</cve>
<bugzilla href="https://bugzilla.suse.com/368963">SUSE bug 368963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/379695">SUSE bug 379695</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199377" comment="clamav-0.97.7-0.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1105</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-1105" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1105" source="CVE"/>
    <description>
    Heap-based buffer overflow in the receive_smb_raw function in util/sock.c in Samba 3.0.0 through 3.0.29 allows remote attackers to execute arbitrary code via a crafted SMB response.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-1105.html">CVE-2008-1105</cve>
<bugzilla href="https://bugzilla.suse.com/391168">SUSE bug 391168</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199376" comment="cifs-utils-5.1-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199555" comment="ldapsmb-1.34b-12.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199556" comment="libldb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199557" comment="libsmbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199558" comment="libsmbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199559" comment="libsmbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199560" comment="libtalloc2-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199561" comment="libtalloc2-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199562" comment="libtalloc2-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199563" comment="libtdb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199564" comment="libtdb1-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199565" comment="libtdb1-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199566" comment="libtevent0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199567" comment="libwbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199568" comment="libwbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199569" comment="libwbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199570" comment="samba-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199571" comment="samba-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199572" comment="samba-client-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199573" comment="samba-client-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199574" comment="samba-client-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199575" comment="samba-krb-printing-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199576" comment="samba-winbind-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199577" comment="samba-winbind-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199578" comment="samba-winbind-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199579" comment="samba-x86-3.6.3-0.39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1145</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-1145" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1145" source="CVE"/>
    <description>
    Directory traversal vulnerability in WEBrick in Ruby 1.8 before 1.8.5-p115 and 1.8.6-p114, and 1.9 through 1.9.0-1, when running on systems that support backslash (\) path separators or case-insensitive file names, allows remote attackers to access arbitrary files via (1) "..%5c" (encoded backslash) sequences or (2) filenames that match patterns in the :NondisclosureName option.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-1145.html">CVE-2008-1145</cve>
<bugzilla href="https://bugzilla.suse.com/368618">SUSE bug 368618</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199778" comment="ruby-1.8.7.p357-0.9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199779" comment="ruby-doc-html-1.8.7.p357-0.9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199780" comment="ruby-tk-1.8.7.p357-0.9.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1187</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-1187" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1187" source="CVE"/>
    <description>
    Unspecified vulnerability in Sun Java Runtime Environment (JRE) and JDK 6 Update 4 and earlier, 5.0 Update 14 and earlier, and SDK/JRE 1.4.2_16 and earlier allows remote attackers to cause a denial of service (JRE crash) and possibly execute arbitrary code via unknown vectors related to XSLT transforms.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-1187.html">CVE-2008-1187</cve>
<bugzilla href="https://bugzilla.suse.com/368134">SUSE bug 368134</bugzilla>
<bugzilla href="https://bugzilla.suse.com/379038">SUSE bug 379038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/404983">SUSE bug 404983</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1188</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-1188" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1188" source="CVE"/>
    <description>
    Multiple buffer overflows in the useEncodingDecl function in Java Web Start in Sun JDK and JRE 6 Update 4 and earlier, and 5.0 Update 14 and earlier, allow remote attackers to execute arbitrary code via a JNLP file with (1) a long key name in the xml header or (2) a long charset value, different issues than CVE-2008-1189, aka "The first two issues."
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-1188.html">CVE-2008-1188</cve>
<bugzilla href="https://bugzilla.suse.com/368134">SUSE bug 368134</bugzilla>
<bugzilla href="https://bugzilla.suse.com/379038">SUSE bug 379038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/404983">SUSE bug 404983</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1189</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-1189" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1189" source="CVE"/>
    <description>
    Buffer overflow in Java Web Start in Sun JDK and JRE 6 Update 4 and earlier, 5.0 Update 14 and earlier, and SDK/JRE 1.4.2_16 and earlier allows remote attackers to execute arbitrary code via unknown vectors, a different issue than CVE-2008-1188, aka the "third" issue.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-1189.html">CVE-2008-1189</cve>
<bugzilla href="https://bugzilla.suse.com/368134">SUSE bug 368134</bugzilla>
<bugzilla href="https://bugzilla.suse.com/379038">SUSE bug 379038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/404983">SUSE bug 404983</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1190</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-1190" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1190" source="CVE"/>
    <description>
    Unspecified vulnerability in Java Web Start in Sun JDK and JRE 6 Update 4 and earlier, 5.0 Update 14 and earlier, and SDK/JRE 1.4.2_16 and earlier allows remote attackers to gain privileges via an untrusted application, a different issue than CVE-2008-1191, aka the "fourth" issue.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-1190.html">CVE-2008-1190</cve>
<bugzilla href="https://bugzilla.suse.com/368134">SUSE bug 368134</bugzilla>
<bugzilla href="https://bugzilla.suse.com/379038">SUSE bug 379038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/404983">SUSE bug 404983</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1191</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-1191" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1191" source="CVE"/>
    <description>
    Unspecified vulnerability in Java Web Start in Sun JDK and JRE 6 Update 4 and earlier allows remote attackers to create arbitrary files via an untrusted application, a different issue than CVE-2008-1190, aka "The fifth issue."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-1191.html">CVE-2008-1191</cve>
<bugzilla href="https://bugzilla.suse.com/368134">SUSE bug 368134</bugzilla>
<bugzilla href="https://bugzilla.suse.com/379038">SUSE bug 379038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/404983">SUSE bug 404983</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1192</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-1192" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1192" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Plug-in for Sun JDK and JRE 6 Update 4 and earlier, and 5.0 Update 14 and earlier; and SDK and JRE 1.4.2_16 and earlier, and 1.3.1_21 and earlier; allows remote attackers to bypass the same origin policy and "execute local applications" via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-1192.html">CVE-2008-1192</cve>
<bugzilla href="https://bugzilla.suse.com/368134">SUSE bug 368134</bugzilla>
<bugzilla href="https://bugzilla.suse.com/379038">SUSE bug 379038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/404983">SUSE bug 404983</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1193</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-1193" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1193" source="CVE"/>
    <description>
    Unspecified vulnerability in Java Runtime Environment Image Parsing Library in Sun JDK and JRE 6 Update 4 and earlier, and 5.0 Update 14 and earlier, allows remote attackers to gain privileges via an untrusted application.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-1193.html">CVE-2008-1193</cve>
<bugzilla href="https://bugzilla.suse.com/368134">SUSE bug 368134</bugzilla>
<bugzilla href="https://bugzilla.suse.com/379038">SUSE bug 379038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/404983">SUSE bug 404983</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1194</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-1194" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1194" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the color management library in Sun JDK and JRE 6 Update 4 and earlier, and 5.0 Update 14 and earlier, allows remote attackers to cause a denial of service (crash) via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-1194.html">CVE-2008-1194</cve>
<bugzilla href="https://bugzilla.suse.com/368134">SUSE bug 368134</bugzilla>
<bugzilla href="https://bugzilla.suse.com/379038">SUSE bug 379038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/404983">SUSE bug 404983</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1195</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-1195" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1195" source="CVE"/>
    <description>
    Unspecified vulnerability in Sun JDK and Java Runtime Environment (JRE) 6 Update 4 and earlier and 5.0 Update 14 and earlier; and SDK and JRE 1.4.2_16 and earlier; allows remote attackers to access arbitrary network services on the local host via unspecified vectors related to JavaScript and Java APIs.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-1195.html">CVE-2008-1195</cve>
<bugzilla href="https://bugzilla.suse.com/368134">SUSE bug 368134</bugzilla>
<bugzilla href="https://bugzilla.suse.com/370353">SUSE bug 370353</bugzilla>
<bugzilla href="https://bugzilla.suse.com/379038">SUSE bug 379038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/404983">SUSE bug 404983</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1196</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-1196" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1196" source="CVE"/>
    <description>
    Stack-based buffer overflow in Java Web Start (javaws.exe) in Sun JDK and JRE 6 Update 4 and earlier and 5.0 Update 14 and earlier; and SDK and JRE 1.4.2_16 and earlier; allows remote attackers to execute arbitrary code via a crafted JNLP file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-1196.html">CVE-2008-1196</cve>
<bugzilla href="https://bugzilla.suse.com/368134">SUSE bug 368134</bugzilla>
<bugzilla href="https://bugzilla.suse.com/379038">SUSE bug 379038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/404983">SUSE bug 404983</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1232</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-1232" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1232" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16 allows remote attackers to inject arbitrary web script or HTML via a crafted string that is used in the message argument to the HttpServletResponse.sendError method.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-1232.html">CVE-2008-1232</cve>
<bugzilla href="https://bugzilla.suse.com/414657">SUSE bug 414657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/415736">SUSE bug 415736</bugzilla>
<bugzilla href="https://bugzilla.suse.com/417217">SUSE bug 417217</bugzilla>
<bugzilla href="https://bugzilla.suse.com/427726">SUSE bug 427726</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199802" comment="tomcat6-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199803" comment="tomcat6-admin-webapps-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199804" comment="tomcat6-docs-webapp-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199805" comment="tomcat6-javadoc-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199806" comment="tomcat6-jsp-2_1-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199807" comment="tomcat6-lib-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199808" comment="tomcat6-servlet-2_5-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199809" comment="tomcat6-webapps-6.0.18-20.35.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1372</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-1372" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1372" source="CVE"/>
    <description>
    bzlib.c in bzip2 before 1.0.5 allows user-assisted remote attackers to cause a denial of service (crash) via a crafted file that triggers a buffer over-read, as demonstrated by the PROTOS GENOME test suite for Archive Formats.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-1372.html">CVE-2008-1372</cve>
<bugzilla href="https://bugzilla.suse.com/372047">SUSE bug 372047</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198773" comment="bzip2-1.0.5-34.253 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198774" comment="bzip2-doc-1.0.5-34.253 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198775" comment="libbz2-1-1.0.5-34.253 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198776" comment="libbz2-1-32bit-1.0.5-34.253 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198777" comment="libbz2-1-x86-1.0.5-34.253 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1373</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-1373" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1373" source="CVE"/>
    <description>
    Buffer overflow in the gif_read_lzw function in CUPS 1.3.6 allows remote attackers to have an unknown impact via a GIF file with a large code_size value, a similar issue to CVE-2006-4484.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-1373.html">CVE-2008-1373</cve>
<bugzilla href="https://bugzilla.suse.com/372642">SUSE bug 372642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/709852">SUSE bug 709852</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199386" comment="cups-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199387" comment="cups-client-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199388" comment="cups-libs-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199389" comment="cups-libs-32bit-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199390" comment="cups-libs-x86-1.3.9-8.46.46 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1375</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-1375" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1375" source="CVE"/>
    <description>
    Race condition in the directory notification subsystem (dnotify) in Linux kernel 2.6.x before 2.6.24.6, and 2.6.25 before 2.6.25.1, allows local users to cause a denial of service (OOPS) and possibly gain privileges via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-1375.html">CVE-2008-1375</cve>
<bugzilla href="https://bugzilla.suse.com/377145">SUSE bug 377145</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1377</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-1377" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1377" source="CVE"/>
    <description>
    The (1) SProcRecordCreateContext and (2) SProcRecordRegisterClients functions in the Record extension and the (3) SProcSecurityGenerateAuthorization function in the Security extension in the X server 1.4 in X.Org X11R7.3 allow context-dependent attackers to execute arbitrary code via requests with crafted length values that specify an arbitrary number of bytes to be swapped on the heap, which triggers heap corruption.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-1377.html">CVE-2008-1377</cve>
<bugzilla href="https://bugzilla.suse.com/374318">SUSE bug 374318</bugzilla>
<bugzilla href="https://bugzilla.suse.com/374323">SUSE bug 374323</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199825" comment="xorg-x11-Xvnc-7.4-27.81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199826" comment="xorg-x11-server-7.4-27.81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199827" comment="xorg-x11-server-extra-7.4-27.81 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1379</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-1379" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1379" source="CVE"/>
    <description>
    Integer overflow in the fbShmPutImage function in the MIT-SHM extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to read arbitrary process memory via crafted values for a Pixmap width and height.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-1379.html">CVE-2008-1379</cve>
<bugzilla href="https://bugzilla.suse.com/374318">SUSE bug 374318</bugzilla>
<bugzilla href="https://bugzilla.suse.com/374320">SUSE bug 374320</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199825" comment="xorg-x11-Xvnc-7.4-27.81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199826" comment="xorg-x11-server-7.4-27.81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199827" comment="xorg-x11-server-extra-7.4-27.81 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1419</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-1419" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1419" source="CVE"/>
    <description>
    Xiph.org libvorbis 1.2.0 and earlier does not properly handle a zero value for codebook.dim, which allows remote attackers to cause a denial of service (crash or infinite loop) or trigger an integer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-1419.html">CVE-2008-1419</cve>
<bugzilla href="https://bugzilla.suse.com/372246">SUSE bug 372246</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199698" comment="libvorbis-1.2.0-79.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199699" comment="libvorbis-32bit-1.2.0-79.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199700" comment="libvorbis-doc-1.2.0-79.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199701" comment="libvorbis-x86-1.2.0-79.20 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1420</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-1420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1420" source="CVE"/>
    <description>
    Integer overflow in residue partition value (aka partvals) evaluation in Xiph.org libvorbis 1.2.0 and earlier allows remote attackers to execute arbitrary code via a crafted OGG file, which triggers a heap overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-1420.html">CVE-2008-1420</cve>
<bugzilla href="https://bugzilla.suse.com/372246">SUSE bug 372246</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199698" comment="libvorbis-1.2.0-79.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199699" comment="libvorbis-32bit-1.2.0-79.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199700" comment="libvorbis-doc-1.2.0-79.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199701" comment="libvorbis-x86-1.2.0-79.20 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-1423" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1423" source="CVE"/>
    <description>
    Integer overflow in a certain quantvals and quantlist calculation in Xiph.org libvorbis 1.2.0 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted OGG file with a large virtual space for its codebook, which triggers a heap overflow.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-1423.html">CVE-2008-1423</cve>
<bugzilla href="https://bugzilla.suse.com/372246">SUSE bug 372246</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199698" comment="libvorbis-1.2.0-79.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199699" comment="libvorbis-32bit-1.2.0-79.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199700" comment="libvorbis-doc-1.2.0-79.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199701" comment="libvorbis-x86-1.2.0-79.20 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1447</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-1447" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447" source="CVE"/>
    <description>
    The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-1447.html">CVE-2008-1447</cve>
<bugzilla href="https://bugzilla.suse.com/396963">SUSE bug 396963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/411761">SUSE bug 411761</bugzilla>
<bugzilla href="https://bugzilla.suse.com/415678">SUSE bug 415678</bugzilla>
<bugzilla href="https://bugzilla.suse.com/423234">SUSE bug 423234</bugzilla>
<bugzilla href="https://bugzilla.suse.com/426515">SUSE bug 426515</bugzilla>
<bugzilla href="https://bugzilla.suse.com/465294">SUSE bug 465294</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198431" comment="libadns1-1.4-73 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1483</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2008-1483" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1483" source="CVE"/>
    <description>
    OpenSSH 4.3p2, and probably other versions, allows local users to hijack forwarded X connections by causing ssh to set DISPLAY to :10, even when another process is listening on the associated port, as demonstrated by opening TCP port 6010 (IPv4) and sniffing a cookie sent by Emacs.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-1483.html">CVE-2008-1483</cve>
<bugzilla href="https://bugzilla.suse.com/1069509">SUSE bug 1069509</bugzilla>
<bugzilla href="https://bugzilla.suse.com/373527">SUSE bug 373527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/647633">SUSE bug 647633</bugzilla>
<bugzilla href="https://bugzilla.suse.com/706386">SUSE bug 706386</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199733" comment="openssh-6.2p2-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199734" comment="openssh-askpass-6.2p2-0.9 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009234528" comment="openssh-openssl1-6.6p1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234529" comment="openssh-openssl1-helpers-6.6p1-19.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1530</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-1530" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1530" source="CVE"/>
    <description>
    GnuPG (gpg) 1.4.8 and 2.0.8 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted duplicate keys that are imported from key servers, which triggers "memory corruption around deduplication of user IDs."
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-1530.html">CVE-2008-1530</cve>
<bugzilla href="https://bugzilla.suse.com/374254">SUSE bug 374254</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199483" comment="gpg2-2.0.9-25.33.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199484" comment="gpg2-lang-2.0.9-25.33.31 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1586</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-1586" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1586" source="CVE"/>
    <description>
    ImageIO in Apple iPhone OS 1.0 through 2.1 and iPhone OS for iPod touch 1.1 through 2.1 allow remote attackers to cause a denial of service (memory consumption and device reset) via a crafted TIFF image.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-1586.html">CVE-2008-1586</cve>
<bugzilla href="https://bugzilla.suse.com/444079">SUSE bug 444079</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199680" comment="libtiff3-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199681" comment="libtiff3-32bit-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199682" comment="libtiff3-x86-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199683" comment="tiff-3.8.2-141.152 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1658</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-1658" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1658" source="CVE"/>
    <description>
    Format string vulnerability in the grant helper (polkit-grant-helper.c) in PolicyKit 0.7 and earlier allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via format strings in a password.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-1658.html">CVE-2008-1658</cve>
<bugzilla href="https://bugzilla.suse.com/375832">SUSE bug 375832</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199281" comment="PolicyKit-0.9-14.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199282" comment="PolicyKit-32bit-0.9-14.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198664" comment="PolicyKit-doc-0.9-14.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199283" comment="PolicyKit-x86-0.9-14.41 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1669</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-1669" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1669" source="CVE"/>
    <description>
    Linux kernel before 2.6.25.2 does not apply a certain protection mechanism for fcntl functionality, which allows local users to (1) execute code in parallel or (2) exploit a race condition to obtain "re-ordered access to the descriptor table."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-1669.html">CVE-2008-1669</cve>
<bugzilla href="https://bugzilla.suse.com/387055">SUSE bug 387055</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1671</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-1671" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1671" source="CVE"/>
    <description>
    start_kdeinit in KDE 3.5.5 through 3.5.9, when installed setuid root, allows local users to cause a denial of service and possibly execute arbitrary code via "user-influenceable input" (probably command-line arguments) that cause start_kdeinit to send SIGUSR1 signals to other processes.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-1671.html">CVE-2008-1671</cve>
<bugzilla href="https://bugzilla.suse.com/382618">SUSE bug 382618</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198363" comment="kdelibs3-3.5.10-23.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198364" comment="kdelibs3-32bit-3.5.10-23.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198365" comment="kdelibs3-default-style-3.5.10-23.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198366" comment="kdelibs3-default-style-32bit-3.5.10-23.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198367" comment="kdelibs3-default-style-x86-3.5.10-23.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198368" comment="kdelibs3-x86-3.5.10-23.27 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1672</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-1672" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1672" source="CVE"/>
    <description>
    OpenSSL 0.9.8f and 0.9.8g allows remote attackers to cause a denial of service (crash) via a TLS handshake that omits the Server Key Exchange message and uses "particular cipher suites," which triggers a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-1672.html">CVE-2008-1672</cve>
<bugzilla href="https://bugzilla.suse.com/394317">SUSE bug 394317</bugzilla>
<bugzilla href="https://bugzilla.suse.com/404511">SUSE bug 404511</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199638" comment="libopenssl0_9_8-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199639" comment="libopenssl0_9_8-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199640" comment="libopenssl0_9_8-hmac-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199641" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199642" comment="libopenssl0_9_8-x86-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199643" comment="openssl-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199644" comment="openssl-doc-0.9.8j-0.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1673</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-1673" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1673" source="CVE"/>
    <description>
    The asn1 implementation in (a) the Linux kernel 2.4 before 2.4.36.6 and 2.6 before 2.6.25.5, as used in the cifs and ip_nat_snmp_basic modules; and (b) the gxsnmp package; does not properly validate length values during decoding of ASN.1 BER data, which allows remote attackers to cause a denial of service (crash) or execute arbitrary code via (1) a length greater than the working buffer, which can lead to an unspecified overflow; (2) an oid length of zero, which can lead to an off-by-one error; or (3) an indefinite length for a primitive encoding.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-1673.html">CVE-2008-1673</cve>
<bugzilla href="https://bugzilla.suse.com/397347">SUSE bug 397347</bugzilla>
<bugzilla href="https://bugzilla.suse.com/415690">SUSE bug 415690</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1675</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-1675" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1675" source="CVE"/>
    <description>
    The bdx_ioctl_priv function in the tehuti driver (tehuti.c) in Linux kernel 2.6.x before 2.6.25.1 does not properly check certain information related to register size, which has unspecified impact and local attack vectors, probably related to reading or writing kernel memory.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-1675.html">CVE-2008-1675</cve>
<bugzilla href="https://bugzilla.suse.com/381887">SUSE bug 381887</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1678</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-1678" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1678" source="CVE"/>
    <description>
    Memory leak in the zlib_stateful_init function in crypto/comp/c_zlib.c in libssl in OpenSSL 0.9.8f through 0.9.8h allows remote attackers to cause a denial of service (memory consumption) via multiple calls, as demonstrated by initial SSL client handshakes to the Apache HTTP Server mod_ssl that specify a compression algorithm.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-1678.html">CVE-2008-1678</cve>
<bugzilla href="https://bugzilla.suse.com/392096">SUSE bug 392096</bugzilla>
<bugzilla href="https://bugzilla.suse.com/422464">SUSE bug 422464</bugzilla>
<bugzilla href="https://bugzilla.suse.com/566238">SUSE bug 566238</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199288" comment="apache2-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199289" comment="apache2-doc-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199290" comment="apache2-example-pages-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199291" comment="apache2-prefork-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199292" comment="apache2-utils-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199293" comment="apache2-worker-2.2.12-1.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1686</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-1686" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1686" source="CVE"/>
    <description>
    Array index vulnerability in Speex 1.1.12 and earlier, as used in libfishsound 0.9.0 and earlier, including Illiminable DirectShow Filters and Annodex Plugins for Firefox, xine-lib before 1.1.12, and many other products, allows remote attackers to execute arbitrary code via a header structure containing a negative offset, which is used to dereference a function pointer.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-1686.html">CVE-2008-1686</cve>
<bugzilla href="https://bugzilla.suse.com/377602">SUSE bug 377602</bugzilla>
<bugzilla href="https://bugzilla.suse.com/379098">SUSE bug 379098</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198886" comment="gstreamer-0_10-plugins-good-0.10.30-5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198887" comment="gstreamer-0_10-plugins-good-doc-0.10.30-5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198888" comment="gstreamer-0_10-plugins-good-lang-0.10.30-5.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1693</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-1693" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1693" source="CVE"/>
    <description>
    The CairoFont::create function in CairoFontEngine.cc in Poppler, possibly before 0.8.0, as used in Xpdf, Evince, ePDFview, KWord, and other applications, does not properly handle embedded fonts in PDF files, which allows remote attackers to execute arbitrary code via a crafted font object, related to dereferencing a function pointer associated with the type of this font object.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-1693.html">CVE-2008-1693</cve>
<bugzilla href="https://bugzilla.suse.com/377838">SUSE bug 377838</bugzilla>
<bugzilla href="https://bugzilla.suse.com/377872">SUSE bug 377872</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199386" comment="cups-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199387" comment="cups-client-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199388" comment="cups-libs-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199389" comment="cups-libs-32bit-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199390" comment="cups-libs-x86-1.3.9-8.46.46 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1721</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-1721" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1721" source="CVE"/>
    <description>
    Integer signedness error in the zlib extension module in Python 2.5.2 and earlier allows remote attackers to execute arbitrary code via a negative signed integer, which triggers insufficient memory allocation and a buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-1721.html">CVE-2008-1721</cve>
<bugzilla href="https://bugzilla.suse.com/379044">SUSE bug 379044</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199757" comment="python-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199758" comment="python-32bit-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199759" comment="python-curses-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199760" comment="python-demo-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199761" comment="python-gdbm-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199762" comment="python-idle-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199763" comment="python-tk-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199764" comment="python-x86-2.6.8-0.15 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1722</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-1722" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1722" source="CVE"/>
    <description>
    Multiple integer overflows in (1) filter/image-png.c and (2) filter/image-zoom.c in CUPS 1.3 allow attackers to cause a denial of service (crash) and trigger memory corruption, as demonstrated via a crafted PNG image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-1722.html">CVE-2008-1722</cve>
<bugzilla href="https://bugzilla.suse.com/378335">SUSE bug 378335</bugzilla>
<bugzilla href="https://bugzilla.suse.com/448631">SUSE bug 448631</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199386" comment="cups-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199387" comment="cups-client-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199388" comment="cups-libs-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199389" comment="cups-libs-32bit-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199390" comment="cups-libs-x86-1.3.9-8.46.46 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1767</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-1767" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1767" source="CVE"/>
    <description>
    Buffer overflow in pattern.c in libxslt before 1.1.24 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XSL style sheet file with a long XSLT "transformation match" condition that triggers a large number of steps.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-1767.html">CVE-2008-1767</cve>
<bugzilla href="https://bugzilla.suse.com/391920">SUSE bug 391920</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199706" comment="libxslt-1.1.24-19.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199707" comment="libxslt-32bit-1.1.24-19.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199708" comment="libxslt-x86-1.1.24-19.21 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1947</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-1947" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1947" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Apache Tomcat 5.5.9 through 5.5.26 and 6.0.0 through 6.0.16 allows remote attackers to inject arbitrary web script or HTML via the name parameter (aka the hostname attribute) to host-manager/html/add.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-1947.html">CVE-2008-1947</cve>
<bugzilla href="https://bugzilla.suse.com/396962">SUSE bug 396962</bugzilla>
<bugzilla href="https://bugzilla.suse.com/427726">SUSE bug 427726</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199802" comment="tomcat6-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199803" comment="tomcat6-admin-webapps-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199804" comment="tomcat6-docs-webapp-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199805" comment="tomcat6-javadoc-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199806" comment="tomcat6-jsp-2_1-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199807" comment="tomcat6-lib-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199808" comment="tomcat6-servlet-2_5-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199809" comment="tomcat6-webapps-6.0.18-20.35.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1948</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-1948" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1948" source="CVE"/>
    <description>
    The _gnutls_server_name_recv_params function in lib/ext_server_name.c in libgnutls in gnutls-serv in GnuTLS before 2.2.4 does not properly calculate the number of Server Names in a TLS 1.0 Client Hello message during extension handling, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a zero value for the length of Server Names, which leads to a buffer overflow in session resumption data in the pack_security_parameters function, aka GNUTLS-SA-2008-1-1.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-1948.html">CVE-2008-1948</cve>
<bugzilla href="https://bugzilla.suse.com/392947">SUSE bug 392947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/670152">SUSE bug 670152</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199478" comment="gnutls-2.4.1-24.39.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199479" comment="libgnutls-extra26-2.4.1-24.39.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199480" comment="libgnutls26-2.4.1-24.39.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199481" comment="libgnutls26-32bit-2.4.1-24.39.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199482" comment="libgnutls26-x86-2.4.1-24.39.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1949</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-1949" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1949" source="CVE"/>
    <description>
    The _gnutls_recv_client_kx_message function in lib/gnutls_kx.c in libgnutls in gnutls-serv in GnuTLS before 2.2.4 continues to process Client Hello messages within a TLS message after one has already been processed, which allows remote attackers to cause a denial of service (NULL dereference and crash) via a TLS message containing multiple Client Hello messages, aka GNUTLS-SA-2008-1-2.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-1949.html">CVE-2008-1949</cve>
<bugzilla href="https://bugzilla.suse.com/392947">SUSE bug 392947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/670152">SUSE bug 670152</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199478" comment="gnutls-2.4.1-24.39.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199479" comment="libgnutls-extra26-2.4.1-24.39.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199480" comment="libgnutls26-2.4.1-24.39.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199481" comment="libgnutls26-32bit-2.4.1-24.39.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199482" comment="libgnutls26-x86-2.4.1-24.39.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1950</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-1950" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1950" source="CVE"/>
    <description>
    Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record with an invalid Record Length, which leads to an invalid cipher padding length, aka GNUTLS-SA-2008-1-3.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-1950.html">CVE-2008-1950</cve>
<bugzilla href="https://bugzilla.suse.com/392947">SUSE bug 392947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/670152">SUSE bug 670152</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199478" comment="gnutls-2.4.1-24.39.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199479" comment="libgnutls-extra26-2.4.1-24.39.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199480" comment="libgnutls26-2.4.1-24.39.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199481" comment="libgnutls26-32bit-2.4.1-24.39.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199482" comment="libgnutls26-x86-2.4.1-24.39.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2079</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-2079" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2079" source="CVE"/>
    <description>
    MySQL 4.1.x before 4.1.24, 5.0.x before 5.0.60, 5.1.x before 5.1.24, and 6.0.x before 6.0.5 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are within the MySQL home data directory, which can point to tables that are created in the future.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-2079.html">CVE-2008-2079</cve>
<bugzilla href="https://bugzilla.suse.com/387746">SUSE bug 387746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/425079">SUSE bug 425079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/497546">SUSE bug 497546</bugzilla>
<bugzilla href="https://bugzilla.suse.com/557669">SUSE bug 557669</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199635" comment="mysql-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199636" comment="mysql-client-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199637" comment="mysql-tools-5.5.31-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2235</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-2235" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2235" source="CVE"/>
    <description>
    OpenSC before 0.11.5 uses weak permissions (ADMIN file control information of 00) for the 5015 directory on smart cards and USB crypto tokens running Siemens CardOS M4, which allows physically proximate attackers to change the PIN.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-2235.html">CVE-2008-2235</cve>
<bugzilla href="https://bugzilla.suse.com/413496">SUSE bug 413496</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199037" comment="libopensc2-0.11.6-5.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199038" comment="libopensc2-32bit-0.11.6-5.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199039" comment="libopensc2-x86-0.11.6-5.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199040" comment="opensc-0.11.6-5.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199041" comment="opensc-32bit-0.11.6-5.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199042" comment="opensc-x86-0.11.6-5.27 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082315" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2315</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-2315" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2315" source="CVE"/>
    <description>
    Multiple integer overflows in Python 2.5.2 and earlier allow context-dependent attackers to have an unknown impact via vectors related to the (1) stringobject, (2) unicodeobject, (3) bufferobject, (4) longobject, (5) tupleobject, (6) stropmodule, (7) gcmodule, and (8) mmapmodule modules.  NOTE: The expandtabs integer overflows in stringobject and unicodeobject in 2.5.2 are covered by CVE-2008-5031.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-2315.html">CVE-2008-2315</cve>
<bugzilla href="https://bugzilla.suse.com/406051">SUSE bug 406051</bugzilla>
<bugzilla href="https://bugzilla.suse.com/443653">SUSE bug 443653</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199757" comment="python-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199758" comment="python-32bit-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199759" comment="python-curses-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199760" comment="python-demo-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199761" comment="python-gdbm-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199762" comment="python-idle-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199763" comment="python-tk-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199764" comment="python-x86-2.6.8-0.15 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2316</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-2316" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2316" source="CVE"/>
    <description>
    Integer overflow in _hashopenssl.c in the hashlib module in Python 2.5.2 and earlier might allow context-dependent attackers to defeat cryptographic digests, related to "partial hashlib hashing of data exceeding 4GB."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-2316.html">CVE-2008-2316</cve>
<bugzilla href="https://bugzilla.suse.com/406051">SUSE bug 406051</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199757" comment="python-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199758" comment="python-32bit-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199759" comment="python-curses-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199760" comment="python-demo-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199761" comment="python-gdbm-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199762" comment="python-idle-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199763" comment="python-tk-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199764" comment="python-x86-2.6.8-0.15 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2327</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-2327" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2327" source="CVE"/>
    <description>
    Multiple buffer underflows in the (1) LZWDecode, (2) LZWDecodeCompat, and (3) LZWDecodeVector functions in tif_lzw.c in the LZW decoder in LibTIFF 3.8.2 and earlier allow context-dependent attackers to execute arbitrary code via a crafted TIFF file, related to improper handling of the CODE_CLEAR code.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-2327.html">CVE-2008-2327</cve>
<bugzilla href="https://bugzilla.suse.com/414946">SUSE bug 414946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/518698">SUSE bug 518698</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199680" comment="libtiff3-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199681" comment="libtiff3-32bit-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199682" comment="libtiff3-x86-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199683" comment="tiff-3.8.2-141.152 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2360</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-2360" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2360" source="CVE"/>
    <description>
    Integer overflow in the AllocateGlyph function in the Render extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to execute arbitrary code via unspecified request fields that are used to calculate a heap buffer size, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-2360.html">CVE-2008-2360</cve>
<bugzilla href="https://bugzilla.suse.com/374321">SUSE bug 374321</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199825" comment="xorg-x11-Xvnc-7.4-27.81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199826" comment="xorg-x11-server-7.4-27.81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199827" comment="xorg-x11-server-extra-7.4-27.81 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2361</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-2361" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2361" source="CVE"/>
    <description>
    Integer overflow in the ProcRenderCreateCursor function in the Render extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to cause a denial of service (daemon crash) via unspecified request fields that are used to calculate a glyph buffer size, which triggers a dereference of unmapped memory.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-2361.html">CVE-2008-2361</cve>
<bugzilla href="https://bugzilla.suse.com/374321">SUSE bug 374321</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199825" comment="xorg-x11-Xvnc-7.4-27.81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199826" comment="xorg-x11-server-7.4-27.81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199827" comment="xorg-x11-server-extra-7.4-27.81 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2362</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-2362" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2362" source="CVE"/>
    <description>
    Multiple integer overflows in the Render extension in the X server 1.4 in X.Org X11R7.3 allow context-dependent attackers to execute arbitrary code via a (1) SProcRenderCreateLinearGradient, (2) SProcRenderCreateRadialGradient, or (3) SProcRenderCreateConicalGradient request with an invalid field specifying the number of bytes to swap in the request data, which triggers heap memory corruption.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-2362.html">CVE-2008-2362</cve>
<bugzilla href="https://bugzilla.suse.com/374321">SUSE bug 374321</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199825" comment="xorg-x11-Xvnc-7.4-27.81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199826" comment="xorg-x11-server-7.4-27.81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199827" comment="xorg-x11-server-extra-7.4-27.81 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2364</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-2364" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2364" source="CVE"/>
    <description>
    The ap_proxy_http_process_response function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server 2.0.63 and 2.2.8 does not limit the number of forwarded interim responses, which allows remote HTTP servers to cause a denial of service (memory consumption) via a large number of interim responses.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-2364.html">CVE-2008-2364</cve>
<bugzilla href="https://bugzilla.suse.com/408832">SUSE bug 408832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/422464">SUSE bug 422464</bugzilla>
<bugzilla href="https://bugzilla.suse.com/443824">SUSE bug 443824</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199288" comment="apache2-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199289" comment="apache2-doc-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199290" comment="apache2-example-pages-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199291" comment="apache2-prefork-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199292" comment="apache2-utils-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199293" comment="apache2-worker-2.2.12-1.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2370</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-2370" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2370" source="CVE"/>
    <description>
    Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when a RequestDispatcher is used, performs path normalization before removing the query string from the URI, which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a .. (dot dot) in a request parameter.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-2370.html">CVE-2008-2370</cve>
<bugzilla href="https://bugzilla.suse.com/414657">SUSE bug 414657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/415697">SUSE bug 415697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/417217">SUSE bug 417217</bugzilla>
<bugzilla href="https://bugzilla.suse.com/427726">SUSE bug 427726</bugzilla>
<bugzilla href="https://bugzilla.suse.com/509839">SUSE bug 509839</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199802" comment="tomcat6-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199803" comment="tomcat6-admin-webapps-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199804" comment="tomcat6-docs-webapp-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199805" comment="tomcat6-javadoc-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199806" comment="tomcat6-jsp-2_1-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199807" comment="tomcat6-lib-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199808" comment="tomcat6-servlet-2_5-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199809" comment="tomcat6-webapps-6.0.18-20.35.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2371</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-2371" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2371" source="CVE"/>
    <description>
    Heap-based buffer overflow in pcre_compile.c in the Perl-Compatible Regular Expression (PCRE) library 7.7 allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a regular expression that begins with an option and contains multiple branches.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-2371.html">CVE-2008-2371</cve>
<bugzilla href="https://bugzilla.suse.com/400013">SUSE bug 400013</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199443" comment="glib2-2.22.5-0.8.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199444" comment="glib2-doc-2.22.5-0.8.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199445" comment="glib2-lang-2.22.5-0.8.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199446" comment="libgio-2_0-0-2.22.5-0.8.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199447" comment="libgio-2_0-0-32bit-2.22.5-0.8.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199448" comment="libgio-2_0-0-x86-2.22.5-0.8.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199449" comment="libglib-2_0-0-2.22.5-0.8.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199450" comment="libglib-2_0-0-32bit-2.22.5-0.8.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199451" comment="libglib-2_0-0-x86-2.22.5-0.8.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199452" comment="libgmodule-2_0-0-2.22.5-0.8.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199453" comment="libgmodule-2_0-0-32bit-2.22.5-0.8.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199454" comment="libgmodule-2_0-0-x86-2.22.5-0.8.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199455" comment="libgobject-2_0-0-2.22.5-0.8.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199456" comment="libgobject-2_0-0-32bit-2.22.5-0.8.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199457" comment="libgobject-2_0-0-x86-2.22.5-0.8.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199458" comment="libgthread-2_0-0-2.22.5-0.8.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199459" comment="libgthread-2_0-0-32bit-2.22.5-0.8.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199460" comment="libgthread-2_0-0-x86-2.22.5-0.8.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2382</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-2382" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2382" source="CVE"/>
    <description>
    The protocol_client_msg function in vnc.c in the VNC server in (1) Qemu 0.9.1 and earlier and (2) KVM kvm-79 and earlier allows remote attackers to cause a denial of service (infinite loop) via a certain message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-2382.html">CVE-2008-2382</cve>
<bugzilla href="https://bugzilla.suse.com/461565">SUSE bug 461565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/464142">SUSE bug 464142</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199554" comment="kvm-1.4.1-0.11 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2383</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-2383" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2383" source="CVE"/>
    <description>
    CRLF injection vulnerability in xterm allows user-assisted attackers to execute arbitrary commands via LF (aka \n) characters surrounding a command name within a Device Control Request Status String (DECRQSS) escape sequence in a text file, a related issue to CVE-2003-0063 and CVE-2003-0071.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-2383.html">CVE-2008-2383</cve>
<bugzilla href="https://bugzilla.suse.com/462917">SUSE bug 462917</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198648" comment="xterm-238-1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2713</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-2713" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2713" source="CVE"/>
    <description>
    libclamav/petite.c in ClamAV before 0.93.1 allows remote attackers to cause a denial of service via a crafted Petite file that triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-2713.html">CVE-2008-2713</cve>
<bugzilla href="https://bugzilla.suse.com/399302">SUSE bug 399302</bugzilla>
<bugzilla href="https://bugzilla.suse.com/406994">SUSE bug 406994</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199377" comment="clamav-0.97.7-0.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2938</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-2938" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2938" source="CVE"/>
    <description>
    Directory traversal vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when allowLinking and UTF-8 are enabled, allows remote attackers to read arbitrary files via encoded directory traversal sequences in the URI, a different vulnerability than CVE-2008-2370.  NOTE: versions earlier than 6.0.18 were reported affected, but the vendor advisory lists 6.0.16 as the last affected version.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-2938.html">CVE-2008-2938</cve>
<bugzilla href="https://bugzilla.suse.com/417217">SUSE bug 417217</bugzilla>
<bugzilla href="https://bugzilla.suse.com/427726">SUSE bug 427726</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199802" comment="tomcat6-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199803" comment="tomcat6-admin-webapps-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199804" comment="tomcat6-docs-webapp-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199805" comment="tomcat6-javadoc-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199806" comment="tomcat6-jsp-2_1-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199807" comment="tomcat6-lib-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199808" comment="tomcat6-servlet-2_5-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199809" comment="tomcat6-webapps-6.0.18-20.35.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2939</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-2939" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2939" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in proxy_ftp.c in the mod_proxy_ftp module in Apache 2.0.63 and earlier, and mod_proxy_ftp.c in the mod_proxy_ftp module in Apache 2.2.9 and earlier 2.2 versions, allows remote attackers to inject arbitrary web script or HTML via a wildcard in the last directory component in the pathname in an FTP URI.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-2939.html">CVE-2008-2939</cve>
<bugzilla href="https://bugzilla.suse.com/210904">SUSE bug 210904</bugzilla>
<bugzilla href="https://bugzilla.suse.com/415061">SUSE bug 415061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/422464">SUSE bug 422464</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199288" comment="apache2-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199289" comment="apache2-doc-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199290" comment="apache2-example-pages-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199291" comment="apache2-prefork-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199292" comment="apache2-utils-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199293" comment="apache2-worker-2.2.12-1.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2950</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-2950" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2950" source="CVE"/>
    <description>
    The Page destructor in Page.cc in libpoppler in Poppler 0.8.4 and earlier deletes a pageWidgets object even if it is not initialized by a Page constructor, which allows remote attackers to execute arbitrary code via a crafted PDF document.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-2950.html">CVE-2008-2950</cve>
<bugzilla href="https://bugzilla.suse.com/404955">SUSE bug 404955</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199649" comment="libpoppler-glib4-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199650" comment="libpoppler-qt4-3-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199651" comment="libpoppler5-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199652" comment="poppler-tools-0.12.3-1.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3142</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-3142" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3142" source="CVE"/>
    <description>
    Multiple buffer overflows in Python 2.5.2 and earlier on 32bit platforms allow context-dependent attackers to cause a denial of service (crash) or have unspecified other impact via a long string that leads to incorrect memory allocation during Unicode string processing, related to the unicode_resize function and the PyMem_RESIZE macro.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-3142.html">CVE-2008-3142</cve>
<bugzilla href="https://bugzilla.suse.com/406051">SUSE bug 406051</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199757" comment="python-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199758" comment="python-32bit-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199759" comment="python-curses-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199760" comment="python-demo-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199761" comment="python-gdbm-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199762" comment="python-idle-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199763" comment="python-tk-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199764" comment="python-x86-2.6.8-0.15 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-3143" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3143" source="CVE"/>
    <description>
    Multiple integer overflows in Python before 2.5.2 might allow context-dependent attackers to have an unknown impact via vectors related to (1) Include/pymem.h; (2) _csv.c, (3) _struct.c, (4) arraymodule.c, (5) audioop.c, (6) binascii.c, (7) cPickle.c, (8) cStringIO.c, (9) cjkcodecs/multibytecodec.c, (10) datetimemodule.c, (11) md5.c, (12) rgbimgmodule.c, and (13) stropmodule.c in Modules/; (14) bufferobject.c, (15) listobject.c, and (16) obmalloc.c in Objects/; (17) Parser/node.c; and (18) asdl.c, (19) ast.c, (20) bltinmodule.c, and (21) compile.c in Python/, as addressed by "checks for integer overflows, contributed by Google."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-3143.html">CVE-2008-3143</cve>
<bugzilla href="https://bugzilla.suse.com/406051">SUSE bug 406051</bugzilla>
<bugzilla href="https://bugzilla.suse.com/444989">SUSE bug 444989</bugzilla>
<bugzilla href="https://bugzilla.suse.com/609759">SUSE bug 609759</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199757" comment="python-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199758" comment="python-32bit-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199759" comment="python-curses-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199760" comment="python-demo-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199761" comment="python-gdbm-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199762" comment="python-idle-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199763" comment="python-tk-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199764" comment="python-x86-2.6.8-0.15 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3144</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-3144" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3144" source="CVE"/>
    <description>
    Multiple integer overflows in the PyOS_vsnprintf function in Python/mysnprintf.c in Python 2.5.2 and earlier allow context-dependent attackers to cause a denial of service (memory corruption) or have unspecified other impact via crafted input to string formatting operations.  NOTE: the handling of certain integer values is also affected by related integer underflows and an off-by-one error.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-3144.html">CVE-2008-3144</cve>
<bugzilla href="https://bugzilla.suse.com/406051">SUSE bug 406051</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199757" comment="python-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199758" comment="python-32bit-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199759" comment="python-curses-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199760" comment="python-demo-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199761" comment="python-gdbm-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199762" comment="python-idle-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199763" comment="python-tk-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199764" comment="python-x86-2.6.8-0.15 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3277</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-3277" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3277" source="CVE"/>
    <description>
    Untrusted search path vulnerability in a certain Red Hat build script for the ibmssh executable in ibutils packages before ibutils-1.5.7-2.el6 in Red Hat Enterprise Linux (RHEL) 6 and ibutils-1.2-11.2.el5 in Red Hat Enterprise Linux (RHEL) 5 allows local users to gain privileges via a Trojan Horse program in refix/lib/, related to an incorrect RPATH setting in the ELF header.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-3277.html">CVE-2008-3277</cve>
<bugzilla href="https://bugzilla.suse.com/747981">SUSE bug 747981</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199496" comment="ibutils-1.5.7-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199497" comment="ibutils-32bit-1.5.7-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3522</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2008-3522" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3522" source="CVE"/>
    <description>
    Buffer overflow in the jas_stream_printf function in libjasper/base/jas_stream.c in JasPer 1.900.1 might allow context-dependent attackers to have an unknown impact via vectors related to the mif_hdr_put function and use of vsprintf.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-3522.html">CVE-2008-3522</cve>
<bugzilla href="https://bugzilla.suse.com/392410">SUSE bug 392410</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202748" comment="jasper-1.900.14-134.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209367" comment="libjasper-1.900.14-134.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209368" comment="libjasper-32bit-1.900.14-134.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3528</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-3528" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3528" source="CVE"/>
    <description>
    The error-reporting functionality in (1) fs/ext2/dir.c, (2) fs/ext3/dir.c, and possibly (3) fs/ext4/dir.c in the Linux kernel 2.6.26.5 does not limit the number of printk console messages that report directory corruption, which allows physically proximate attackers to cause a denial of service (temporary system hang) by mounting a filesystem that has corrupted dir-&gt;i_size and dir-&gt;i_blocks values and performing (a) read or (b) write operations.  NOTE: there are limited scenarios in which this crosses privilege boundaries.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-3528.html">CVE-2008-3528</cve>
<bugzilla href="https://bugzilla.suse.com/427244">SUSE bug 427244</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3641</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-3641" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3641" source="CVE"/>
    <description>
    The Hewlett-Packard Graphics Language (HPGL) filter in CUPS before 1.3.9 allows remote attackers to execute arbitrary code via crafted pen width and pen color opcodes that overwrite arbitrary memory.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-3641.html">CVE-2008-3641</cve>
<bugzilla href="https://bugzilla.suse.com/430543">SUSE bug 430543</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199386" comment="cups-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199387" comment="cups-client-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199388" comment="cups-libs-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199389" comment="cups-libs-32bit-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199390" comment="cups-libs-x86-1.3.9-8.46.46 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3652</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-3652" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3652" source="CVE"/>
    <description>
    src/racoon/handler.c in racoon in ipsec-tools does not remove an "orphaned ph1" (phase 1) handle when it has been initiated remotely, which allows remote attackers to cause a denial of service (resource consumption).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-3652.html">CVE-2008-3652</cve>
<bugzilla href="https://bugzilla.suse.com/416906">SUSE bug 416906</bugzilla>
<bugzilla href="https://bugzilla.suse.com/434748">SUSE bug 434748</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198345" comment="ipsec-tools-0.7.3-1.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3746</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-3746" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3746" source="CVE"/>
    <description>
    neon 0.28.0 through 0.28.2 allows remote servers to cause a denial of service (NULL pointer dereference and crash) via vectors related to Digest authentication, Digest domain parameter support, and the parse_domain function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-3746.html">CVE-2008-3746</cve>
<bugzilla href="https://bugzilla.suse.com/419075">SUSE bug 419075</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199031" comment="libneon27-0.29.6-6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199032" comment="libneon27-32bit-0.29.6-6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199033" comment="libneon27-x86-0.29.6-6.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3789</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-3789" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3789" source="CVE"/>
    <description>
    Samba 3.2.0 uses weak permissions (0666) for the (1) group_mapping.tdb and (2) group_mapping.ldb files, which allows local users to modify the membership of Unix groups.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-3789.html">CVE-2008-3789</cve>
<bugzilla href="https://bugzilla.suse.com/420634">SUSE bug 420634</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199376" comment="cifs-utils-5.1-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199555" comment="ldapsmb-1.34b-12.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199556" comment="libldb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199557" comment="libsmbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199558" comment="libsmbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199559" comment="libsmbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199560" comment="libtalloc2-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199561" comment="libtalloc2-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199562" comment="libtalloc2-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199563" comment="libtdb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199564" comment="libtdb1-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199565" comment="libtdb1-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199566" comment="libtevent0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199567" comment="libwbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199568" comment="libwbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199569" comment="libwbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199570" comment="samba-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199571" comment="samba-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199572" comment="samba-client-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199573" comment="samba-client-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199574" comment="samba-client-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199575" comment="samba-krb-printing-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199576" comment="samba-winbind-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199577" comment="samba-winbind-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199578" comment="samba-winbind-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199579" comment="samba-x86-3.6.3-0.39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3790</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-3790" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3790" source="CVE"/>
    <description>
    The REXML module in Ruby 1.8.6 through 1.8.6-p287, 1.8.7 through 1.8.7-p72, and 1.9 allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML document with recursively nested entities, aka an "XML entity explosion."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-3790.html">CVE-2008-3790</cve>
<bugzilla href="https://bugzilla.suse.com/420084">SUSE bug 420084</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199778" comment="ruby-1.8.7.p357-0.9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199779" comment="ruby-doc-html-1.8.7.p357-0.9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199780" comment="ruby-tk-1.8.7.p357-0.9.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3825</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-3825" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3825" source="CVE"/>
    <description>
    pam_krb5 2.2.14 in Red Hat Enterprise Linux (RHEL) 5 and earlier, when the existing_ticket option is enabled, uses incorrect privileges when reading a Kerberos credential cache, which allows local users to gain privileges by setting the KRB5CCNAME environment variable to an arbitrary cache filename and running the (1) su or (2) sudo program. NOTE: there may be a related vector involving sshd that has limited relevance.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-3825.html">CVE-2008-3825</cve>
<bugzilla href="https://bugzilla.suse.com/425861">SUSE bug 425861</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199737" comment="pam_krb5-2.3.1-47.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199738" comment="pam_krb5-32bit-2.3.1-47.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199739" comment="pam_krb5-x86-2.3.1-47.12 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3831</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-3831" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3831" source="CVE"/>
    <description>
    The i915 driver in (1) drivers/char/drm/i915_dma.c in the Linux kernel 2.6.24 on Debian GNU/Linux and (2) sys/dev/pci/drm/i915_drv.c in OpenBSD does not restrict the DRM_I915_HWS_ADDR ioctl to the Direct Rendering Manager (DRM) master, which allows local users to cause a denial of service (memory corruption) via a crafted ioctl call, related to absence of the DRM_MASTER and DRM_ROOT_ONLY flags in the ioctl's configuration.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-3831.html">CVE-2008-3831</cve>
<bugzilla href="https://bugzilla.suse.com/429919">SUSE bug 429919</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199603" comment="libdrm-2.4.41-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199604" comment="libdrm-32bit-2.4.41-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199605" comment="libdrm-x86-2.4.41-0.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3834</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-3834" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3834" source="CVE"/>
    <description>
    The dbus_signature_validate function in the D-bus library (libdbus) before 1.2.4 allows remote attackers to cause a denial of service (application abort) via a message containing a malformed signature, which triggers a failed assertion error.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-3834.html">CVE-2008-3834</cve>
<bugzilla href="https://bugzilla.suse.com/432901">SUSE bug 432901</bugzilla>
<bugzilla href="https://bugzilla.suse.com/495804">SUSE bug 495804</bugzilla>
<bugzilla href="https://bugzilla.suse.com/659934">SUSE bug 659934</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199397" comment="dbus-1-1.2.10-3.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199398" comment="dbus-1-32bit-1.2.10-3.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199399" comment="dbus-1-x11-1.2.10-3.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199400" comment="dbus-1-x86-1.2.10-3.27 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-3836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3836" source="CVE"/>
    <description>
    feedWriter in Mozilla Firefox before 2.0.0.17 allows remote attackers to execute scripts with chrome privileges via vectors related to feed preview and the (1) elem.doCommand, (2) elem.dispatchEvent, (3) _setTitleText, (4) _setTitleImage, and (5) _initSubscriptionUI functions.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-3836.html">CVE-2008-3836</cve>
<bugzilla href="https://bugzilla.suse.com/429179">SUSE bug 429179</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3863</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-3863" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3863" source="CVE"/>
    <description>
    Stack-based buffer overflow in the read_special_escape function in src/psgen.c in GNU Enscript 1.6.1 and 1.6.4 beta, when the -e (aka special escapes processing) option is enabled, allows user-assisted remote attackers to execute arbitrary code via a crafted ASCII file, related to the setfilename command.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-3863.html">CVE-2008-3863</cve>
<bugzilla href="https://bugzilla.suse.com/433756">SUSE bug 433756</bugzilla>
<bugzilla href="https://bugzilla.suse.com/462353">SUSE bug 462353</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198820" comment="enscript-1.6.4-152.22 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3916</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-3916" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3916" source="CVE"/>
    <description>
    Heap-based buffer overflow in the strip_escapes function in signal.c in GNU ed before 1.0 allows context-dependent or user-assisted attackers to execute arbitrary code via a long filename.  NOTE: since ed itself does not typically run with special privileges, this issue only crosses privilege boundaries when ed is invoked as a third-party component.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-3916.html">CVE-2008-3916</cve>
<bugzilla href="https://bugzilla.suse.com/421849">SUSE bug 421849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/474587">SUSE bug 474587</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198814" comment="ed-0.2-1001.30 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3964</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-3964" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3964" source="CVE"/>
    <description>
    Multiple off-by-one errors in libpng before 1.2.32beta01, and 1.4 before 1.4.0beta34, allow context-dependent attackers to cause a denial of service (crash) or have unspecified other impact via a PNG image with crafted zTXt chunks, related to (1) the png_push_read_zTXt function in pngread.c, and possibly related to (2) pngtest.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-3964.html">CVE-2008-3964</cve>
<bugzilla href="https://bugzilla.suse.com/424739">SUSE bug 424739</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199646" comment="libpng12-0-1.2.31-5.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199647" comment="libpng12-0-32bit-1.2.31-5.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199648" comment="libpng12-0-x86-1.2.31-5.31 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4063</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-4063" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4063" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Mozilla Firefox 3.x before 3.0.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the layout engine and (1) a zero value of the "this" variable in the nsContentList::Item function; (2) interaction of the indic IME extension, a Hindi language selection, and the "g" character; and (3) interaction of the nsFrameList::SortByContentOrder function with a certain insufficient protection of inline frames.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-4063.html">CVE-2008-4063</cve>
<bugzilla href="https://bugzilla.suse.com/429179">SUSE bug 429179</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4064</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-4064" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4064" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Mozilla Firefox 3.x before 3.0.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to graphics rendering and (1) handling of a long alert messagebox in the cairo_surface_set_device_offset function, (2) integer overflows when handling animated PNG data in the info_callback function in nsPNGDecoder.cpp, and (3) an integer overflow when handling SVG data in the nsSVGFEGaussianBlurElement::SetupPredivide function in nsSVGFilters.cpp.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-4064.html">CVE-2008-4064</cve>
<bugzilla href="https://bugzilla.suse.com/429179">SUSE bug 429179</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4070</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-4070" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4070" source="CVE"/>
    <description>
    Heap-based buffer overflow in Mozilla Thunderbird before 2.0.0.17 and SeaMonkey before 1.1.12 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long header in a news article, related to "canceling [a] newsgroup message" and "cancelled newsgroup messages."
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-4070.html">CVE-2008-4070</cve>
<bugzilla href="https://bugzilla.suse.com/429179">SUSE bug 429179</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4100</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-4100" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4100" source="CVE"/>
    <description>
    GNU adns 1.4 and earlier uses a fixed source port and sequential transaction IDs for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.  NOTE: the vendor reports that this is intended behavior and is compatible with the product's intended role in a trusted environment.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-4100.html">CVE-2008-4100</cve>
<bugzilla href="https://bugzilla.suse.com/426515">SUSE bug 426515</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198431" comment="libadns1-1.4-73 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4225</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-4225" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4225" source="CVE"/>
    <description>
    Integer overflow in the xmlBufferResize function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (infinite loop) via a large XML document.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-4225.html">CVE-2008-4225</cve>
<bugzilla href="https://bugzilla.suse.com/445677">SUSE bug 445677</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199702" comment="libxml2-2.7.6-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199703" comment="libxml2-32bit-2.7.6-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199704" comment="libxml2-doc-2.7.6-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199705" comment="libxml2-x86-2.7.6-0.23 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4226</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-4226" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4226" source="CVE"/>
    <description>
    Integer overflow in the xmlSAX2Characters function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a large XML document.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-4226.html">CVE-2008-4226</cve>
<bugzilla href="https://bugzilla.suse.com/441368">SUSE bug 441368</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199702" comment="libxml2-2.7.6-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199703" comment="libxml2-32bit-2.7.6-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199704" comment="libxml2-doc-2.7.6-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199705" comment="libxml2-x86-2.7.6-0.23 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4306</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-4306" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4306" source="CVE"/>
    <description>
    Buffer overflow in enscript before 1.6.4 has unknown impact and attack vectors, possibly related to the font escape sequence.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-4306.html">CVE-2008-4306</cve>
<bugzilla href="https://bugzilla.suse.com/433756">SUSE bug 433756</bugzilla>
<bugzilla href="https://bugzilla.suse.com/462353">SUSE bug 462353</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198820" comment="enscript-1.6.4-152.22 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4309</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-4309" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4309" source="CVE"/>
    <description>
    Integer overflow in the netsnmp_create_subtree_cache function in agent/snmp_agent.c in net-snmp 5.4 before 5.4.2.1, 5.3 before 5.3.2.3, and 5.2 before 5.2.5.1 allows remote attackers to cause a denial of service (crash) via a crafted SNMP GETBULK request, which triggers a heap-based buffer overflow,  related to the number of responses or repeats.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-4309.html">CVE-2008-4309</cve>
<bugzilla href="https://bugzilla.suse.com/440950">SUSE bug 440950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/514709">SUSE bug 514709</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199666" comment="libsnmp15-5.4.2.1-8.12.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199667" comment="libsnmp15-32bit-5.4.2.1-8.12.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199668" comment="libsnmp15-x86-5.4.2.1-8.12.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199669" comment="net-snmp-5.4.2.1-8.12.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199670" comment="perl-SNMP-5.4.2.1-8.12.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199671" comment="snmp-mibs-5.4.2.1-8.12.16 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4311</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-4311" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4311" source="CVE"/>
    <description>
    The default configuration of system.conf in D-Bus (aka DBus) before 1.2.6 omits the send_type attribute in certain rules, which allows local users to bypass intended access restrictions by (1) sending messages, related to send_requested_reply; and possibly (2) receiving messages, related to receive_requested_reply.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-4311.html">CVE-2008-4311</cve>
<bugzilla href="https://bugzilla.suse.com/443307">SUSE bug 443307</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199274" comment="PackageKit-0.3.14-2.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199275" comment="PackageKit-lang-0.3.14-2.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199397" comment="dbus-1-1.2.10-3.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199398" comment="dbus-1-32bit-1.2.10-3.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199399" comment="dbus-1-x11-1.2.10-3.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199400" comment="dbus-1-x86-1.2.10-3.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199276" comment="hal-0.5.12-23.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199277" comment="hal-32bit-0.5.12-23.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199278" comment="hal-doc-0.5.12-23.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199279" comment="hal-x86-0.5.12-23.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199280" comment="libpackagekit-glib10-0.3.14-2.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199834" comment="yast2-core-2.17.45-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4314</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-4314" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4314" source="CVE"/>
    <description>
    smbd in Samba 3.0.29 through 3.2.4 might allow remote attackers to read arbitrary memory and cause a denial of service via crafted (1) trans, (2) trans2, and (3) nttrans requests, related to a "cut&amp;paste error" that causes an improper bounds check to be performed.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-4314.html">CVE-2008-4314</cve>
<bugzilla href="https://bugzilla.suse.com/446971">SUSE bug 446971</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199376" comment="cifs-utils-5.1-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199555" comment="ldapsmb-1.34b-12.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199556" comment="libldb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199557" comment="libsmbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199558" comment="libsmbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199559" comment="libsmbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199560" comment="libtalloc2-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199561" comment="libtalloc2-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199562" comment="libtalloc2-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199563" comment="libtdb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199564" comment="libtdb1-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199565" comment="libtdb1-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199566" comment="libtevent0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199567" comment="libwbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199568" comment="libwbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199569" comment="libwbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199570" comment="samba-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199571" comment="samba-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199572" comment="samba-client-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199573" comment="samba-client-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199574" comment="samba-client-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199575" comment="samba-krb-printing-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199576" comment="samba-winbind-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199577" comment="samba-winbind-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199578" comment="samba-winbind-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199579" comment="samba-x86-3.6.3-0.39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4316</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-4316" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4316" source="CVE"/>
    <description>
    Multiple integer overflows in glib/gbase64.c in GLib before 2.20 allow context-dependent attackers to execute arbitrary code via a long string that is converted either (1) from or (2) to a base64 representation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-4316.html">CVE-2008-4316</cve>
<bugzilla href="https://bugzilla.suse.com/382708">SUSE bug 382708</bugzilla>
<bugzilla href="https://bugzilla.suse.com/449927">SUSE bug 449927</bugzilla>
<bugzilla href="https://bugzilla.suse.com/475541">SUSE bug 475541</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199443" comment="glib2-2.22.5-0.8.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199444" comment="glib2-doc-2.22.5-0.8.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199445" comment="glib2-lang-2.22.5-0.8.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199446" comment="libgio-2_0-0-2.22.5-0.8.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199447" comment="libgio-2_0-0-32bit-2.22.5-0.8.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199448" comment="libgio-2_0-0-x86-2.22.5-0.8.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199449" comment="libglib-2_0-0-2.22.5-0.8.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199450" comment="libglib-2_0-0-32bit-2.22.5-0.8.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199451" comment="libglib-2_0-0-x86-2.22.5-0.8.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199452" comment="libgmodule-2_0-0-2.22.5-0.8.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199453" comment="libgmodule-2_0-0-32bit-2.22.5-0.8.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199454" comment="libgmodule-2_0-0-x86-2.22.5-0.8.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199455" comment="libgobject-2_0-0-2.22.5-0.8.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199456" comment="libgobject-2_0-0-32bit-2.22.5-0.8.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199457" comment="libgobject-2_0-0-x86-2.22.5-0.8.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199458" comment="libgthread-2_0-0-2.22.5-0.8.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199459" comment="libgthread-2_0-0-32bit-2.22.5-0.8.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199460" comment="libgthread-2_0-0-x86-2.22.5-0.8.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4409</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-4409" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4409" source="CVE"/>
    <description>
    libxml2 2.7.0 and 2.7.1 does not properly handle "predefined entities definitions" in entities, which allows context-dependent attackers to cause a denial of service (memory consumption and application crash), as demonstrated by use of xmllint on a certain XML document, a different vulnerability than CVE-2003-1564 and CVE-2008-3281.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-4409.html">CVE-2008-4409</cve>
<bugzilla href="https://bugzilla.suse.com/432486">SUSE bug 432486</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199702" comment="libxml2-2.7.6-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199703" comment="libxml2-32bit-2.7.6-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199704" comment="libxml2-doc-2.7.6-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199705" comment="libxml2-x86-2.7.6-0.23 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4456</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-4456" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4456" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the command-line client in MySQL 5.0.26 through 5.0.45, and other versions including versions later than 5.0.45, when the --html option is enabled, allows attackers to inject arbitrary web script or HTML by placing it in a database cell, which might be accessed by this client when composing an HTML document.  NOTE: as of 20081031, the issue has not been fixed in MySQL 5.0.67.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-4456.html">CVE-2008-4456</cve>
<bugzilla href="https://bugzilla.suse.com/497546">SUSE bug 497546</bugzilla>
<bugzilla href="https://bugzilla.suse.com/604528">SUSE bug 604528</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199635" comment="mysql-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199636" comment="mysql-client-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199637" comment="mysql-tools-5.5.31-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4474</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-4474" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4474" source="CVE"/>
    <description>
    freeradius-dialupadmin in freeradius 2.0.4 allows local users to overwrite arbitrary files via a symlink attack on temporary files in (1) backup_radacct, (2) clean_radacct, (3) monthly_tot_stats, (4) tot_stats, and (5) truncate_radacct.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-4474.html">CVE-2008-4474</cve>
<bugzilla href="https://bugzilla.suse.com/433762">SUSE bug 433762</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199425" comment="freeradius-server-2.1.1-7.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199426" comment="freeradius-server-dialupadmin-2.1.1-7.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199427" comment="freeradius-server-doc-2.1.1-7.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199428" comment="freeradius-server-libs-2.1.1-7.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199429" comment="freeradius-server-utils-2.1.1-7.16 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4936</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-4936" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4936" source="CVE"/>
    <description>
    faxspool in mgetty 1.1.36 allows local users to overwrite arbitrary files via a symlink attack on a /tmp/faxsp.##### temporary file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-4936.html">CVE-2008-4936</cve>
<bugzilla href="https://bugzilla.suse.com/442596">SUSE bug 442596</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198278" comment="g3utils-1.1.36-26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198279" comment="mgetty-1.1.36-26 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4989</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-4989" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4989" source="CVE"/>
    <description>
    The _gnutls_x509_verify_certificate function in lib/x509/verify.c in libgnutls in GnuTLS before 2.6.1 trusts certificate chains in which the last certificate is an arbitrary trusted, self-signed certificate, which allows man-in-the-middle attackers to insert a spoofed certificate for any Distinguished Name (DN).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-4989.html">CVE-2008-4989</cve>
<bugzilla href="https://bugzilla.suse.com/392947">SUSE bug 392947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/441856">SUSE bug 441856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/467911">SUSE bug 467911</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199478" comment="gnutls-2.4.1-24.39.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199479" comment="libgnutls-extra26-2.4.1-24.39.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199480" comment="libgnutls26-2.4.1-24.39.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199481" comment="libgnutls26-32bit-2.4.1-24.39.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199482" comment="libgnutls26-x86-2.4.1-24.39.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5008</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-5008" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5008" source="CVE"/>
    <description>
    Buffer overflow in src/src_sinc.c in Secret Rabbit Code (aka SRC or libsamplerate) before 0.1.4, when "extreme low conversion ratios" are used, allows user-assisted attackers to have an unknown impact via a crafted audio file.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-5008.html">CVE-2008-5008</cve>
<bugzilla href="https://bugzilla.suse.com/443794">SUSE bug 443794</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198514" comment="libsamplerate-0.1.4-1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198515" comment="libsamplerate-32bit-0.1.4-1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198516" comment="libsamplerate-x86-0.1.4-1 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5077</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-5077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5077" source="CVE"/>
    <description>
    OpenSSL 0.9.8i and earlier does not properly check the return value from the EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-5077.html">CVE-2008-5077</cve>
<bugzilla href="https://bugzilla.suse.com/459468">SUSE bug 459468</bugzilla>
<bugzilla href="https://bugzilla.suse.com/465675">SUSE bug 465675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/465676">SUSE bug 465676</bugzilla>
<bugzilla href="https://bugzilla.suse.com/468866">SUSE bug 468866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/470968">SUSE bug 470968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/475108">SUSE bug 475108</bugzilla>
<bugzilla href="https://bugzilla.suse.com/552497">SUSE bug 552497</bugzilla>
<bugzilla href="https://bugzilla.suse.com/629905">SUSE bug 629905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/708266">SUSE bug 708266</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199638" comment="libopenssl0_9_8-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199639" comment="libopenssl0_9_8-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199640" comment="libopenssl0_9_8-hmac-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199641" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199642" comment="libopenssl0_9_8-x86-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199643" comment="openssl-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199644" comment="openssl-doc-0.9.8j-0.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5079</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-5079" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5079" source="CVE"/>
    <description>
    net/atm/svc.c in the ATM subsystem in the Linux kernel 2.6.27.8 and earlier allows local users to cause a denial of service (kernel infinite loop) by making two calls to svc_listen for the same socket, and then reading a /proc/net/atm/*vc file, related to corruption of the vcc table.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-5079.html">CVE-2008-5079</cve>
<bugzilla href="https://bugzilla.suse.com/450417">SUSE bug 450417</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5081</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-5081" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5081" source="CVE"/>
    <description>
    The originates_from_local_legacy_unicast_socket function (avahi-core/server.c) in avahi-daemon in Avahi before 0.6.24 allows remote attackers to cause a denial of service (crash) via a crafted mDNS packet with a source port of 0, which triggers an assertion failure.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-5081.html">CVE-2008-5081</cve>
<bugzilla href="https://bugzilla.suse.com/459007">SUSE bug 459007</bugzilla>
<bugzilla href="https://bugzilla.suse.com/646961">SUSE bug 646961</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199351" comment="avahi-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199352" comment="avahi-lang-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199353" comment="avahi-utils-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199354" comment="libavahi-client3-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199355" comment="libavahi-client3-32bit-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199356" comment="libavahi-client3-x86-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199357" comment="libavahi-common3-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199358" comment="libavahi-common3-32bit-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199359" comment="libavahi-common3-x86-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199360" comment="libavahi-core5-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199361" comment="libdns_sd-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199362" comment="libdns_sd-32bit-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199363" comment="libdns_sd-x86-0.6.23-11.30 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5086</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-5086" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5086" source="CVE"/>
    <description>
    Multiple methods in libvirt 0.3.2 through 0.5.1 do not check if a connection is read-only, which allows local users to bypass intended access restrictions and perform administrative actions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-5086.html">CVE-2008-5086</cve>
<bugzilla href="https://bugzilla.suse.com/459009">SUSE bug 459009</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199692" comment="libvirt-1.0.5.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199693" comment="libvirt-client-1.0.5.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199694" comment="libvirt-client-32bit-1.0.5.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199695" comment="libvirt-doc-1.0.5.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199696" comment="libvirt-lock-sanlock-1.0.5.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199697" comment="libvirt-python-1.0.5.1-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5110</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-5110" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5110" source="CVE"/>
    <description>
    syslog-ng does not call chdir when it calls chroot, which might allow attackers to escape the intended jail.  NOTE: this is only a vulnerability when a separate vulnerability is present.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-5110.html">CVE-2008-5110</cve>
<bugzilla href="https://bugzilla.suse.com/445912">SUSE bug 445912</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199789" comment="syslog-ng-2.0.9-27.34.36 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5138</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-5138" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5138" source="CVE"/>
    <description>
    passwdehd in libpam-mount 0.43 allows local users to overwrite arbitrary files via a symlink attack on a /tmp/passwdehd.##### temporary file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-5138.html">CVE-2008-5138</cve>
<bugzilla href="https://bugzilla.suse.com/465303">SUSE bug 465303</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199740" comment="pam_mount-0.47-13.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199741" comment="pam_mount-32bit-0.47-13.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199742" comment="pam_mount-x86-0.47-13.16 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-5182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5182" source="CVE"/>
    <description>
    The inotify functionality in Linux kernel 2.6 before 2.6.28-rc5 might allow local users to gain privileges via unknown vectors related to race conditions in inotify watch removal and umount.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-5182.html">CVE-2008-5182</cve>
<bugzilla href="https://bugzilla.suse.com/446973">SUSE bug 446973</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5300</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-5300" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5300" source="CVE"/>
    <description>
    Linux kernel 2.6.28 allows local users to cause a denial of service ("soft lockup" and process loss) via a large number of sendmsg function calls, which does not block during AF_UNIX garbage collection and triggers an OOM condition, a different vulnerability than CVE-2008-5029.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-5300.html">CVE-2008-5300</cve>
<bugzilla href="https://bugzilla.suse.com/449739">SUSE bug 449739</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5351</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-5351" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5351" source="CVE"/>
    <description>
    Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier accepts UTF-8 encodings that are not the "shortest" form, which makes it easier for attackers to bypass protection mechanisms for other applications that rely on shortest-form UTF-8 encodings.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-5351.html">CVE-2008-5351</cve>
<bugzilla href="https://bugzilla.suse.com/456770">SUSE bug 456770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/465624">SUSE bug 465624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/471829">SUSE bug 471829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/496004">SUSE bug 496004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/603283">SUSE bug 603283</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5515</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-5515" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5515" source="CVE"/>
    <description>
    Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-5515.html">CVE-2008-5515</cve>
<bugzilla href="https://bugzilla.suse.com/509839">SUSE bug 509839</bugzilla>
<bugzilla href="https://bugzilla.suse.com/575083">SUSE bug 575083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199802" comment="tomcat6-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199803" comment="tomcat6-admin-webapps-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199804" comment="tomcat6-docs-webapp-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199805" comment="tomcat6-javadoc-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199806" comment="tomcat6-jsp-2_1-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199807" comment="tomcat6-lib-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199808" comment="tomcat6-servlet-2_5-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199809" comment="tomcat6-webapps-6.0.18-20.35.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5519</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-5519" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5519" source="CVE"/>
    <description>
    The JK Connector (aka mod_jk) 1.2.0 through 1.2.26 in Apache Tomcat allows remote attackers to obtain sensitive information via an arbitrary request from an HTTP client, in opportunistic circumstances involving (1) a request from a different client that included a Content-Length header but no POST data or (2) a rapid series of requests, related to noncompliance with the AJP protocol's requirements for requests containing Content-Length headers.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-5519.html">CVE-2008-5519</cve>
<bugzilla href="https://bugzilla.suse.com/493575">SUSE bug 493575</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198675" comment="apache2-mod_jk-1.2.26-1.30 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5714</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-5714" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5714" source="CVE"/>
    <description>
    Off-by-one error in monitor.c in Qemu 0.9.1 might make it easier for remote attackers to guess the VNC password, which is limited to seven characters where eight was intended.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-5714.html">CVE-2008-5714</cve>
<bugzilla href="https://bugzilla.suse.com/462502">SUSE bug 462502</bugzilla>
<bugzilla href="https://bugzilla.suse.com/464141">SUSE bug 464141</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199554" comment="kvm-1.4.1-0.11 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5907</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-5907" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5907" source="CVE"/>
    <description>
    The png_check_keyword function in pngwutil.c in libpng before 1.0.42, and 1.2.x before 1.2.34, might allow context-dependent attackers to set the value of an arbitrary memory location to zero via vectors involving creation of crafted PNG files with keywords, related to an implicit cast of the '\0' character constant to a NULL pointer.  NOTE: some sources incorrectly report this as a double free vulnerability.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-5907.html">CVE-2008-5907</cve>
<bugzilla href="https://bugzilla.suse.com/467308">SUSE bug 467308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/608040">SUSE bug 608040</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199646" comment="libpng12-0-1.2.31-5.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199647" comment="libpng12-0-32bit-1.2.31-5.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199648" comment="libpng12-0-x86-1.2.31-5.31 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5913</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-5913" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5913" source="CVE"/>
    <description>
    The Math.random function in the JavaScript implementation in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, uses a random number generator that is seeded only once per browser session, which makes it easier for remote attackers to track a user, or trick a user into acting upon a spoofed pop-up message, by calculating the seed value, related to a "temporary footprint" and an "in-session phishing attack."
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-5913.html">CVE-2008-5913</cve>
<bugzilla href="https://bugzilla.suse.com/468762">SUSE bug 468762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/603356">SUSE bug 603356</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20086123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-6123</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-6123" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6123" source="CVE"/>
    <description>
    The netsnmp_udp_fmtaddr function (snmplib/snmpUDPDomain.c) in net-snmp 5.0.9 through 5.4.2.1, when using TCP wrappers for client authorization, does not properly parse hosts.allow rules, which allows remote attackers to bypass intended access restrictions and execute SNMP queries, related to "source/destination IP address confusion."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-6123.html">CVE-2008-6123</cve>
<bugzilla href="https://bugzilla.suse.com/475532">SUSE bug 475532</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199666" comment="libsnmp15-5.4.2.1-8.12.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199667" comment="libsnmp15-32bit-5.4.2.1-8.12.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199668" comment="libsnmp15-x86-5.4.2.1-8.12.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199669" comment="net-snmp-5.4.2.1-8.12.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199670" comment="perl-SNMP-5.4.2.1-8.12.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199671" comment="snmp-mibs-5.4.2.1-8.12.16 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20086218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-6218</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-6218" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6218" source="CVE"/>
    <description>
    Memory leak in the png_handle_tEXt function in pngrutil.c in libpng before 1.2.33 rc02 and 1.4.0 beta36 allows context-dependent attackers to cause a denial of service (memory exhaustion) via a crafted PNG file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-6218.html">CVE-2008-6218</cve>
<bugzilla href="https://bugzilla.suse.com/475533">SUSE bug 475533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/854395">SUSE bug 854395</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199646" comment="libpng12-0-1.2.31-5.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199647" comment="libpng12-0-32bit-1.2.31-5.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199648" comment="libpng12-0-x86-1.2.31-5.31 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20087247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-7247</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2008-7247" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7247" source="CVE"/>
    <description>
    sql/sql_table.cc in MySQL 5.0.x through 5.0.88, 5.1.x through 5.1.41, and 6.0 before 6.0.9-alpha, when the data home directory contains a symlink to a different filesystem, allows remote authenticated users to bypass intended access restrictions by calling CREATE TABLE with a (1) DATA DIRECTORY or (2) INDEX DIRECTORY argument referring to a subdirectory that requires following this symlink.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-7247.html">CVE-2008-7247</cve>
<bugzilla href="https://bugzilla.suse.com/557669">SUSE bug 557669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/604528">SUSE bug 604528</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199635" comment="mysql-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199636" comment="mysql-client-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199637" comment="mysql-tools-5.5.31-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0022</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0022" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0022" source="CVE"/>
    <description>
    Samba 3.2.0 through 3.2.6, when registry shares are enabled, allows remote authenticated users to access the root filesystem via a crafted connection request that specifies a blank share name.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0022.html">CVE-2009-0022</cve>
<bugzilla href="https://bugzilla.suse.com/460764">SUSE bug 460764</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199376" comment="cifs-utils-5.1-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199555" comment="ldapsmb-1.34b-12.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199556" comment="libldb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199557" comment="libsmbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199558" comment="libsmbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199559" comment="libsmbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199560" comment="libtalloc2-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199561" comment="libtalloc2-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199562" comment="libtalloc2-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199563" comment="libtdb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199564" comment="libtdb1-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199565" comment="libtdb1-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199566" comment="libtevent0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199567" comment="libwbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199568" comment="libwbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199569" comment="libwbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199570" comment="samba-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199571" comment="samba-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199572" comment="samba-client-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199573" comment="samba-client-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199574" comment="samba-client-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199575" comment="samba-krb-printing-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199576" comment="samba-winbind-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199577" comment="samba-winbind-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199578" comment="samba-winbind-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199579" comment="samba-x86-3.6.3-0.39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0029</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0029" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0029" source="CVE"/>
    <description>
    The ABI in the Linux kernel 2.6.28 and earlier on s390, powerpc, sparc64, and mips 64-bit platforms requires that a 32-bit argument in a 64-bit register was properly sign extended when sent from a user-mode application, but cannot verify this, which allows local users to cause a denial of service (crash) or possibly gain privileges via a crafted system call.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0029.html">CVE-2009-0029</cve>
<bugzilla href="https://bugzilla.suse.com/466015">SUSE bug 466015</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090033" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0033</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0033" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0033" source="CVE"/>
    <description>
    Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0033.html">CVE-2009-0033</cve>
<bugzilla href="https://bugzilla.suse.com/509839">SUSE bug 509839</bugzilla>
<bugzilla href="https://bugzilla.suse.com/509840">SUSE bug 509840</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199802" comment="tomcat6-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199803" comment="tomcat6-admin-webapps-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199804" comment="tomcat6-docs-webapp-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199805" comment="tomcat6-javadoc-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199806" comment="tomcat6-jsp-2_1-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199807" comment="tomcat6-lib-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199808" comment="tomcat6-servlet-2_5-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199809" comment="tomcat6-webapps-6.0.18-20.35.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0037</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0037" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0037" source="CVE"/>
    <description>
    The redirect implementation in curl and libcurl 5.11 through 7.19.3, when CURLOPT_FOLLOWLOCATION is enabled, accepts arbitrary Location values, which might allow remote HTTP servers to (1) trigger arbitrary requests to intranet servers, (2) read or overwrite arbitrary files via a redirect to a file: URL, or (3) execute arbitrary commands via a redirect to an scp: URL.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0037.html">CVE-2009-0037</cve>
<bugzilla href="https://bugzilla.suse.com/475103">SUSE bug 475103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/527990">SUSE bug 527990</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199391" comment="curl-7.19.7-1.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199392" comment="libcurl4-7.19.7-1.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199393" comment="libcurl4-32bit-7.19.7-1.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199394" comment="libcurl4-x86-7.19.7-1.26 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0040</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0040" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0040" source="CVE"/>
    <description>
    The PNG reference library (aka libpng) before 1.0.43, and 1.2.x before 1.2.35, as used in pngcrush and other applications, allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file that triggers a free of an uninitialized pointer in (1) the png_read_png function, (2) pCAL chunk handling, or (3) setup of 16-bit gamma tables.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0040.html">CVE-2009-0040</cve>
<bugzilla href="https://bugzilla.suse.com/472745">SUSE bug 472745</bugzilla>
<bugzilla href="https://bugzilla.suse.com/478625">SUSE bug 478625</bugzilla>
<bugzilla href="https://bugzilla.suse.com/608040">SUSE bug 608040</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199646" comment="libpng12-0-1.2.31-5.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199647" comment="libpng12-0-32bit-1.2.31-5.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199648" comment="libpng12-0-x86-1.2.31-5.31 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0153</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0153" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0153" source="CVE"/>
    <description>
    International Components for Unicode (ICU) 4.0, 3.6, and other 3.x versions, as used in Apple Mac OS X 10.5 before 10.5.7, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Fedora 9 and 10, and possibly other operating systems, does not properly handle invalid byte sequences during Unicode conversion, which might allow remote attackers to conduct cross-site scripting (XSS) attacks.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0153.html">CVE-2009-0153</cve>
<bugzilla href="https://bugzilla.suse.com/508070">SUSE bug 508070</bugzilla>
<bugzilla href="https://bugzilla.suse.com/539839">SUSE bug 539839</bugzilla>
<bugzilla href="https://bugzilla.suse.com/585717">SUSE bug 585717</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199020" comment="libicu-4.0-7.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199021" comment="libicu-32bit-4.0-7.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199022" comment="libicu-doc-4.0-7.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199630" comment="libicu-x86-4.0-7.26 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0159</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0159" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0159" source="CVE"/>
    <description>
    Stack-based buffer overflow in the cookedprint function in ntpq/ntpq.c in ntpq in NTP before 4.2.4p7-RC2 allows remote NTP servers to execute arbitrary code via a crafted response.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0159.html">CVE-2009-0159</cve>
<bugzilla href="https://bugzilla.suse.com/484653">SUSE bug 484653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/501632">SUSE bug 501632</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199722" comment="ntp-4.2.4p8-1.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199723" comment="ntp-doc-4.2.4p8-1.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0163</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0163" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0163" source="CVE"/>
    <description>
    Integer overflow in the TIFF image decoding routines in CUPS 1.3.9 and earlier allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via a crafted TIFF image, which is not properly handled by the (1) _cupsImageReadTIFF function in the imagetops filter and (2) imagetoraster filter, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0163.html">CVE-2009-0163</cve>
<bugzilla href="https://bugzilla.suse.com/485895">SUSE bug 485895</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199386" comment="cups-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199387" comment="cups-client-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199388" comment="cups-libs-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199389" comment="cups-libs-32bit-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199390" comment="cups-libs-x86-1.3.9-8.46.46 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0186</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0186" source="CVE"/>
    <description>
    Integer overflow in libsndfile 1.0.18, as used in Winamp and other products, allows context-dependent attackers to execute arbitrary code via crafted description chunks in a CAF audio file, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0186.html">CVE-2009-0186</cve>
<bugzilla href="https://bugzilla.suse.com/481769">SUSE bug 481769</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199081" comment="libsndfile-1.0.20-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199082" comment="libsndfile-32bit-1.0.20-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199083" comment="libsndfile-x86-1.0.20-2.4 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0196</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0196" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0196" source="CVE"/>
    <description>
    Heap-based buffer overflow in the big2_decode_symbol_dict function (jbig2_symbol_dict.c) in the JBIG2 decoding library (jbig2dec) in Ghostscript 8.64, and probably earlier versions, allows remote attackers to execute arbitrary code via a PDF file with a JBIG2 symbol dictionary segment with a large run length value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0196.html">CVE-2009-0196</cve>
<bugzilla href="https://bugzilla.suse.com/489622">SUSE bug 489622</bugzilla>
<bugzilla href="https://bugzilla.suse.com/491897">SUSE bug 491897</bugzilla>
<bugzilla href="https://bugzilla.suse.com/492765">SUSE bug 492765</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199436" comment="ghostscript-fonts-other-8.62-32.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199437" comment="ghostscript-fonts-rus-8.62-32.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199438" comment="ghostscript-fonts-std-8.62-32.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199439" comment="ghostscript-library-8.62-32.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199440" comment="ghostscript-omni-8.62-32.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199441" comment="ghostscript-x11-8.62-32.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199442" comment="libgimpprint-4.2.7-32.34 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0217</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0217" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0217" source="CVE"/>
    <description>
    The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0217.html">CVE-2009-0217</cve>
<bugzilla href="https://bugzilla.suse.com/514421">SUSE bug 514421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/521184">SUSE bug 521184</bugzilla>
<bugzilla href="https://bugzilla.suse.com/521564">SUSE bug 521564</bugzilla>
<bugzilla href="https://bugzilla.suse.com/530661">SUSE bug 530661</bugzilla>
<bugzilla href="https://bugzilla.suse.com/530708">SUSE bug 530708</bugzilla>
<bugzilla href="https://bugzilla.suse.com/530717">SUSE bug 530717</bugzilla>
<bugzilla href="https://bugzilla.suse.com/548655">SUSE bug 548655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/561859">SUSE bug 561859</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199124" comment="mono-core-2.6.7-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199125" comment="mono-data-2.6.7-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199126" comment="mono-data-postgresql-2.6.7-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199127" comment="mono-data-sqlite-2.6.7-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199128" comment="mono-locale-extras-2.6.7-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199129" comment="mono-nunit-2.6.7-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199130" comment="mono-web-2.6.7-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199131" comment="mono-winforms-2.6.7-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0352</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0352" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0352" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Mozilla Firefox 3.x before 3.0.6, Thunderbird before 2.0.0.21, and SeaMonkey before 1.1.15 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the layout engine and destruction of arbitrary layout objects by the nsViewManager::Composite function.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0352.html">CVE-2009-0352</cve>
<bugzilla href="https://bugzilla.suse.com/470074">SUSE bug 470074</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0353</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0353" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0353" source="CVE"/>
    <description>
    Unspecified vulnerability in Mozilla Firefox 3.x before 3.0.6, Thunderbird before 2.0.0.21, and SeaMonkey before 1.1.15 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the JavaScript engine.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0353.html">CVE-2009-0353</cve>
<bugzilla href="https://bugzilla.suse.com/470074">SUSE bug 470074</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0354</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0354" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0354" source="CVE"/>
    <description>
    Cross-domain vulnerability in js/src/jsobj.cpp in Mozilla Firefox 3.x before 3.0.6 allows remote attackers to bypass the Same Origin Policy, and access the properties of an arbitrary window and conduct cross-site scripting (XSS) attacks, via vectors involving a chrome XBL method and the window.eval function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0354.html">CVE-2009-0354</cve>
<bugzilla href="https://bugzilla.suse.com/470074">SUSE bug 470074</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0355</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0355" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0355" source="CVE"/>
    <description>
    components/sessionstore/src/nsSessionStore.js in Mozilla Firefox before 3.0.6 does not block changes of INPUT elements to type="file" during tab restoration, which allows user-assisted remote attackers to read arbitrary files on a client machine via a crafted INPUT element.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0355.html">CVE-2009-0355</cve>
<bugzilla href="https://bugzilla.suse.com/470074">SUSE bug 470074</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0356</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0356" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0356" source="CVE"/>
    <description>
    Mozilla Firefox before 3.0.6 and SeaMonkey do not block links to the (1) about:plugins and (2) about:config URIs from .desktop files, which allows user-assisted remote attackers to bypass the Same Origin Policy and execute arbitrary code with chrome privileges via vectors involving the URL field in a Desktop Entry section of a .desktop file, related to representation of about: URIs as jar:file:// URIs.  NOTE: this issue exists because of an incomplete fix for CVE-2008-4582.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0356.html">CVE-2009-0356</cve>
<bugzilla href="https://bugzilla.suse.com/470074">SUSE bug 470074</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0357</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0357" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0357" source="CVE"/>
    <description>
    Mozilla Firefox before 3.0.6 and SeaMonkey before 1.1.15 do not properly restrict access from web pages to the (1) Set-Cookie and (2) Set-Cookie2 HTTP response headers, which allows remote attackers to obtain sensitive information from cookies via XMLHttpRequest calls, related to the HTTPOnly protection mechanism.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0357.html">CVE-2009-0357</cve>
<bugzilla href="https://bugzilla.suse.com/470074">SUSE bug 470074</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0358</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0358" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0358" source="CVE"/>
    <description>
    Mozilla Firefox 3.x before 3.0.6 does not properly implement the (1) no-store and (2) no-cache Cache-Control directives, which allows local users to obtain sensitive information by using the (a) back button or (b) history list of the victim's browser, as demonstrated by reading the response page of an https POST request.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0358.html">CVE-2009-0358</cve>
<bugzilla href="https://bugzilla.suse.com/470074">SUSE bug 470074</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0365</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0365" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0365" source="CVE"/>
    <description>
    nm-applet.conf in GNOME NetworkManager before 0.7.0.99 contains an incorrect deny setting, which allows local users to discover (1) network connection passwords and (2) pre-shared keys via calls to the GetSecrets method in the dbus request handler.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0365.html">CVE-2009-0365</cve>
<bugzilla href="https://bugzilla.suse.com/478080">SUSE bug 478080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/479566">SUSE bug 479566</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199272" comment="NetworkManager-0.7.1_git20090811-3.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199273" comment="NetworkManager-glib-0.7.1_git20090811-3.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198654" comment="NetworkManager-gnome-0.7.1-5.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0368</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0368" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0368" source="CVE"/>
    <description>
    OpenSC before 0.11.7 allows physically proximate attackers to bypass intended PIN requirements and read private data objects via a (1) low level APDU command or (2) debugging tool, as demonstrated by reading the 4601 or 4701 file with the opensc-explorer or opensc-tool program.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0368.html">CVE-2009-0368</cve>
<bugzilla href="https://bugzilla.suse.com/480262">SUSE bug 480262</bugzilla>
<bugzilla href="https://bugzilla.suse.com/548555">SUSE bug 548555</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199037" comment="libopensc2-0.11.6-5.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199038" comment="libopensc2-32bit-0.11.6-5.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199039" comment="libopensc2-x86-0.11.6-5.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199040" comment="opensc-0.11.6-5.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199041" comment="opensc-32bit-0.11.6-5.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199042" comment="opensc-x86-0.11.6-5.27 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0386</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0386" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0386" source="CVE"/>
    <description>
    Heap-based buffer overflow in the qtdemux_parse_samples function in gst/qtdemux/qtdemux.c in GStreamer Good Plug-ins (aka gst-plugins-good) 0.10.9 through 0.10.11 might allow remote attackers to execute arbitrary code via crafted Composition Time To Sample (ctts) atom data in a malformed QuickTime media .mov file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0386.html">CVE-2009-0386</cve>
<bugzilla href="https://bugzilla.suse.com/469336">SUSE bug 469336</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198886" comment="gstreamer-0_10-plugins-good-0.10.30-5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198887" comment="gstreamer-0_10-plugins-good-doc-0.10.30-5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198888" comment="gstreamer-0_10-plugins-good-lang-0.10.30-5.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0387</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0387" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0387" source="CVE"/>
    <description>
    Array index error in the qtdemux_parse_samples function in gst/qtdemux/qtdemux.c in GStreamer Good Plug-ins (aka gst-plugins-good) 0.10.9 through 0.10.11 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted Sync Sample (aka stss) atom data in a malformed QuickTime media .mov file, related to "mark keyframes."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0387.html">CVE-2009-0387</cve>
<bugzilla href="https://bugzilla.suse.com/469336">SUSE bug 469336</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198886" comment="gstreamer-0_10-plugins-good-0.10.30-5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198887" comment="gstreamer-0_10-plugins-good-doc-0.10.30-5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198888" comment="gstreamer-0_10-plugins-good-lang-0.10.30-5.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0397</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0397" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0397" source="CVE"/>
    <description>
    Heap-based buffer overflow in the qtdemux_parse_samples function in gst/qtdemux/qtdemux.c in GStreamer Good Plug-ins (aka gst-plugins-good) 0.10.9 through 0.10.11, and GStreamer Plug-ins (aka gstreamer-plugins) 0.8.5, might allow remote attackers to execute arbitrary code via crafted Time-to-sample (aka stts) atom data in a malformed QuickTime media .mov file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0397.html">CVE-2009-0397</cve>
<bugzilla href="https://bugzilla.suse.com/469336">SUSE bug 469336</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198886" comment="gstreamer-0_10-plugins-good-0.10.30-5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198887" comment="gstreamer-0_10-plugins-good-doc-0.10.30-5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198888" comment="gstreamer-0_10-plugins-good-lang-0.10.30-5.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0478</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0478" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0478" source="CVE"/>
    <description>
    Squid 2.7 to 2.7.STABLE5, 3.0 to 3.0.STABLE12, and 3.1 to 3.1.0.4 allows remote attackers to cause a denial of service via an HTTP request with an invalid version number, which triggers a reachable assertion in (1) HttpMsg.c and (2) HttpStatusLine.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0478.html">CVE-2009-0478</cve>
<bugzilla href="https://bugzilla.suse.com/472834">SUSE bug 472834</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199783" comment="squid-2.7.STABLE5-2.12.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0578</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0578" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0578" source="CVE"/>
    <description>
    GNOME NetworkManager before 0.7.0.99 does not properly verify privileges for dbus (1) modify and (2) delete requests, which allows local users to change or remove the network connections of arbitrary users via unspecified vectors related to org.freedesktop.NetworkManagerUserSettings and at_console.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0578.html">CVE-2009-0578</cve>
<bugzilla href="https://bugzilla.suse.com/478080">SUSE bug 478080</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199272" comment="NetworkManager-0.7.1_git20090811-3.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199273" comment="NetworkManager-glib-0.7.1_git20090811-3.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198654" comment="NetworkManager-gnome-0.7.1-5.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0579</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0579" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0579" source="CVE"/>
    <description>
    Linux-PAM before 1.0.4 does not enforce the minimum password age (MINDAYS) as specified in /etc/shadow, which allows local users to bypass intended security policy and change their passwords sooner than specified.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0579.html">CVE-2009-0579</cve>
<bugzilla href="https://bugzilla.suse.com/481814">SUSE bug 481814</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199158" comment="pam-1.1.5-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199159" comment="pam-32bit-1.1.5-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199160" comment="pam-doc-1.1.5-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199161" comment="pam-x86-1.1.5-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0580</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0580" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0580" source="CVE"/>
    <description>
    Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0580.html">CVE-2009-0580</cve>
<bugzilla href="https://bugzilla.suse.com/509839">SUSE bug 509839</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199802" comment="tomcat6-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199803" comment="tomcat6-admin-webapps-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199804" comment="tomcat6-docs-webapp-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199805" comment="tomcat6-javadoc-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199806" comment="tomcat6-jsp-2_1-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199807" comment="tomcat6-lib-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199808" comment="tomcat6-servlet-2_5-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199809" comment="tomcat6-webapps-6.0.18-20.35.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0581</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0581" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0581" source="CVE"/>
    <description>
    Memory leak in LittleCMS (aka lcms or liblcms) before 1.18beta2, as used in Firefox 3.1beta, OpenJDK, and GIMP, allows context-dependent attackers to cause a denial of service (memory consumption and application crash) via a crafted image file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0581.html">CVE-2009-0581</cve>
<bugzilla href="https://bugzilla.suse.com/479606">SUSE bug 479606</bugzilla>
<bugzilla href="https://bugzilla.suse.com/490610">SUSE bug 490610</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198407" comment="lcms-1.17-77.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198408" comment="liblcms1-1.17-77.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198409" comment="liblcms1-32bit-1.17-77.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198410" comment="liblcms1-x86-1.17-77.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0583</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0583" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0583" source="CVE"/>
    <description>
    Multiple integer overflows in icc.c in the International Color Consortium (ICC) Format library (aka icclib), as used in Ghostscript 8.64 and earlier and Argyll Color Management System (CMS) 1.0.3 and earlier, allow context-dependent attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly execute arbitrary code by using a device file for a translation request that operates on a crafted image file and targets a certain "native color space," related to an ICC profile in a (1) PostScript or (2) PDF file with embedded images.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0583.html">CVE-2009-0583</cve>
<bugzilla href="https://bugzilla.suse.com/483303">SUSE bug 483303</bugzilla>
<bugzilla href="https://bugzilla.suse.com/491897">SUSE bug 491897</bugzilla>
<bugzilla href="https://bugzilla.suse.com/492765">SUSE bug 492765</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199436" comment="ghostscript-fonts-other-8.62-32.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199437" comment="ghostscript-fonts-rus-8.62-32.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199438" comment="ghostscript-fonts-std-8.62-32.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199439" comment="ghostscript-library-8.62-32.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199440" comment="ghostscript-omni-8.62-32.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199441" comment="ghostscript-x11-8.62-32.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199442" comment="libgimpprint-4.2.7-32.34 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0584</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0584" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0584" source="CVE"/>
    <description>
    icc.c in the International Color Consortium (ICC) Format library (aka icclib), as used in Ghostscript 8.64 and earlier and Argyll Color Management System (CMS) 1.0.3 and earlier, allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code by using a device file for processing a crafted image file associated with large integer values for certain sizes, related to an ICC profile in a (1) PostScript or (2) PDF file with embedded images.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0584.html">CVE-2009-0584</cve>
<bugzilla href="https://bugzilla.suse.com/483303">SUSE bug 483303</bugzilla>
<bugzilla href="https://bugzilla.suse.com/491897">SUSE bug 491897</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199436" comment="ghostscript-fonts-other-8.62-32.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199437" comment="ghostscript-fonts-rus-8.62-32.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199438" comment="ghostscript-fonts-std-8.62-32.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199439" comment="ghostscript-library-8.62-32.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199440" comment="ghostscript-omni-8.62-32.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199441" comment="ghostscript-x11-8.62-32.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199442" comment="libgimpprint-4.2.7-32.34 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0586</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0586" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0586" source="CVE"/>
    <description>
    Integer overflow in the gst_vorbis_tag_add_coverart function (gst-libs/gst/tag/gstvorbistag.c) in vorbistag in gst-plugins-base (aka gstreamer-plugins-base) before 0.10.23 in GStreamer allows context-dependent attackers to execute arbitrary code via a crafted COVERART tag that is converted from a base64 representation, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0586.html">CVE-2009-0586</cve>
<bugzilla href="https://bugzilla.suse.com/481479">SUSE bug 481479</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198875" comment="gstreamer-0_10-plugins-base-0.10.35-5.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198876" comment="gstreamer-0_10-plugins-base-32bit-0.10.35-5.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198877" comment="gstreamer-0_10-plugins-base-doc-0.10.35-5.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198878" comment="gstreamer-0_10-plugins-base-lang-0.10.35-5.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198879" comment="gstreamer-0_10-plugins-base-x86-0.10.35-5.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198880" comment="libgstapp-0_10-0-0.10.35-5.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198881" comment="libgstapp-0_10-0-32bit-0.10.35-5.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198882" comment="libgstapp-0_10-0-x86-0.10.35-5.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198883" comment="libgstinterfaces-0_10-0-0.10.35-5.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198884" comment="libgstinterfaces-0_10-0-32bit-0.10.35-5.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198885" comment="libgstinterfaces-0_10-0-x86-0.10.35-5.15 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0590</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0590" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0590" source="CVE"/>
    <description>
    The ASN1_STRING_print_ex function in OpenSSL before 0.9.8k allows remote attackers to cause a denial of service (invalid memory access and application crash) via vectors that trigger printing of a (1) BMPString or (2) UniversalString with an invalid encoded length.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0590.html">CVE-2009-0590</cve>
<bugzilla href="https://bugzilla.suse.com/459468">SUSE bug 459468</bugzilla>
<bugzilla href="https://bugzilla.suse.com/489641">SUSE bug 489641</bugzilla>
<bugzilla href="https://bugzilla.suse.com/629905">SUSE bug 629905</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199638" comment="libopenssl0_9_8-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199639" comment="libopenssl0_9_8-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199640" comment="libopenssl0_9_8-hmac-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199641" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199642" comment="libopenssl0_9_8-x86-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199643" comment="openssl-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199644" comment="openssl-doc-0.9.8j-0.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0591</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0591" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0591" source="CVE"/>
    <description>
    The CMS_verify function in OpenSSL 0.9.8h through 0.9.8j, when CMS is enabled, does not properly handle errors associated with malformed signed attributes, which allows remote attackers to repudiate a signature that originally appeared to be valid but was actually invalid.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0591.html">CVE-2009-0591</cve>
<bugzilla href="https://bugzilla.suse.com/489641">SUSE bug 489641</bugzilla>
<bugzilla href="https://bugzilla.suse.com/629905">SUSE bug 629905</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199638" comment="libopenssl0_9_8-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199639" comment="libopenssl0_9_8-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199640" comment="libopenssl0_9_8-hmac-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199641" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199642" comment="libopenssl0_9_8-x86-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199643" comment="openssl-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199644" comment="openssl-doc-0.9.8j-0.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0642</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0642" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0642" source="CVE"/>
    <description>
    ext/openssl/ossl_ocsp.c in Ruby 1.8 and 1.9 does not properly check the return value from the OCSP_basic_verify function, which might allow remote attackers to successfully present an invalid X.509 certificate, possibly involving a revoked certificate.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0642.html">CVE-2009-0642</cve>
<bugzilla href="https://bugzilla.suse.com/478019">SUSE bug 478019</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199778" comment="ruby-1.8.7.p357-0.9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199779" comment="ruby-doc-html-1.8.7.p357-0.9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199780" comment="ruby-tk-1.8.7.p357-0.9.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0652</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0652" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0652" source="CVE"/>
    <description>
    The Internationalized Domain Names (IDN) blacklist in Mozilla Firefox 3.0.6 and other versions before 3.0.9; Thunderbird before 2.0.0.21; and SeaMonkey before 1.1.15 does not include box-drawing characters, which allows remote attackers to spoof URLs and conduct phishing attacks, as demonstrated by homoglyphs of the / (slash) and ? (question mark) characters in a subdomain of a .cn domain name, a different vulnerability than CVE-2005-0233.  NOTE: some third parties claim that 3.0.6 is not affected, but much older versions perhaps are affected.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0652.html">CVE-2009-0652</cve>
<bugzilla href="https://bugzilla.suse.com/495473">SUSE bug 495473</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0689</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2009-0689" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0689" source="CVE"/>
    <description>
    Array index error in the (1) dtoa implementation in dtoa.c (aka pdtoa.c) and the (2) gdtoa (aka new dtoa) implementation in gdtoa/misc.c in libc, as used in multiple operating systems and products including in FreeBSD 6.4 and 7.2, NetBSD 5.0, OpenBSD 4.5, Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4, K-Meleon 1.5.3, SeaMonkey 1.1.8, and other products, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large precision value in the format argument to a printf function, which triggers incorrect memory allocation and a heap-based buffer overflow during conversion to a floating-point number.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0689.html">CVE-2009-0689</cve>
<bugzilla href="https://bugzilla.suse.com/522109">SUSE bug 522109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/545277">SUSE bug 545277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/546371">SUSE bug 546371</bugzilla>
<bugzilla href="https://bugzilla.suse.com/557126">SUSE bug 557126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/557127">SUSE bug 557127</bugzilla>
<bugzilla href="https://bugzilla.suse.com/557128">SUSE bug 557128</bugzilla>
<bugzilla href="https://bugzilla.suse.com/557671">SUSE bug 557671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/590499">SUSE bug 590499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/607935">SUSE bug 607935</bugzilla>
<bugzilla href="https://bugzilla.suse.com/851803">SUSE bug 851803</bugzilla>
<bugzilla href="https://bugzilla.suse.com/958097">SUSE bug 958097</bugzilla>
<bugzilla href="https://bugzilla.suse.com/963818">SUSE bug 963818</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198363" comment="kdelibs3-3.5.10-23.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198364" comment="kdelibs3-32bit-3.5.10-23.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198365" comment="kdelibs3-default-style-3.5.10-23.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198366" comment="kdelibs3-default-style-32bit-3.5.10-23.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198367" comment="kdelibs3-default-style-x86-3.5.10-23.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198368" comment="kdelibs3-x86-3.5.10-23.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199517" comment="kdelibs4-4.3.5-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199518" comment="kdelibs4-core-4.3.5-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199519" comment="kdelibs4-doc-4.3.5-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199520" comment="libkde4-4.3.5-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199521" comment="libkde4-32bit-4.3.5-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199522" comment="libkde4-x86-4.3.5-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199523" comment="libkdecore4-4.3.5-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199524" comment="libkdecore4-32bit-4.3.5-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199525" comment="libkdecore4-x86-4.3.5-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201916" comment="mono-core-2.6.7-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201917" comment="mono-data-2.6.7-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201920" comment="mono-data-postgresql-2.6.7-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201921" comment="mono-data-sqlite-2.6.7-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201926" comment="mono-locale-extras-2.6.7-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201927" comment="mono-nunit-2.6.7-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201929" comment="mono-web-2.6.7-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201930" comment="mono-winforms-2.6.7-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204079" comment="ruby-1.8.7.p357-0.9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201498" comment="ruby-doc-html-1.8.7.p357-0.9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201502" comment="ruby-tk-1.8.7.p357-0.9.13 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203140" comment="mono-core-2.6.7-0.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203141" comment="mono-data-2.6.7-0.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203144" comment="mono-data-postgresql-2.6.7-0.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203145" comment="mono-data-sqlite-2.6.7-0.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203150" comment="mono-locale-extras-2.6.7-0.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203151" comment="mono-nunit-2.6.7-0.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203153" comment="mono-web-2.6.7-0.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203154" comment="mono-winforms-2.6.7-0.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204079" comment="ruby-1.8.7.p357-0.9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201498" comment="ruby-doc-html-1.8.7.p357-0.9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201502" comment="ruby-tk-1.8.7.p357-0.9.13 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203140" comment="mono-core-2.6.7-0.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203141" comment="mono-data-2.6.7-0.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203144" comment="mono-data-postgresql-2.6.7-0.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203145" comment="mono-data-sqlite-2.6.7-0.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203150" comment="mono-locale-extras-2.6.7-0.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203151" comment="mono-nunit-2.6.7-0.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203153" comment="mono-web-2.6.7-0.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203154" comment="mono-winforms-2.6.7-0.18 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0692</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0692" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0692" source="CVE"/>
    <description>
    Stack-based buffer overflow in the script_write_params method in client/dhclient.c in ISC DHCP dhclient 4.1 before 4.1.0p1, 4.0 before 4.0.1p1, 3.1 before 3.1.2p1, 3.0, and 2.0 allows remote DHCP servers to execute arbitrary code via a crafted subnet-mask option.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0692.html">CVE-2009-0692</cve>
<bugzilla href="https://bugzilla.suse.com/515599">SUSE bug 515599</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199401" comment="dhcp-4.2.4.P2-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199402" comment="dhcp-client-4.2.4.P2-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199403" comment="dhcp-relay-4.2.4.P2-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199404" comment="dhcp-server-4.2.4.P2-0.16 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0696</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0696" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0696" source="CVE"/>
    <description>
    The dns_db_findrdataset function in db.c in named in ISC BIND 9.4 before 9.4.3-P3, 9.5 before 9.5.1-P3, and 9.6 before 9.6.1-P1, when configured as a master server, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via an ANY record in the prerequisite section of a crafted dynamic update message, as exploited in the wild in July 2009.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0696.html">CVE-2009-0696</cve>
<bugzilla href="https://bugzilla.suse.com/526185">SUSE bug 526185</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199364" comment="bind-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199365" comment="bind-chrootenv-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199366" comment="bind-doc-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199367" comment="bind-libs-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199368" comment="bind-libs-32bit-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199369" comment="bind-libs-x86-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199370" comment="bind-utils-9.6ESVR7P4-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0723</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0723" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0723" source="CVE"/>
    <description>
    Multiple integer overflows in LittleCMS (aka lcms or liblcms) before 1.18beta2, as used in Firefox 3.1beta, OpenJDK, and GIMP, allow context-dependent attackers to execute arbitrary code via a crafted image file that triggers a heap-based buffer overflow.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0723.html">CVE-2009-0723</cve>
<bugzilla href="https://bugzilla.suse.com/479606">SUSE bug 479606</bugzilla>
<bugzilla href="https://bugzilla.suse.com/490610">SUSE bug 490610</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198407" comment="lcms-1.17-77.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198408" comment="liblcms1-1.17-77.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198409" comment="liblcms1-32bit-1.17-77.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198410" comment="liblcms1-x86-1.17-77.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0733</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0733" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0733" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in the ReadSetOfCurves function in LittleCMS (aka lcms or liblcms) before 1.18beta2, as used in Firefox 3.1beta, OpenJDK, and GIMP, allow context-dependent attackers to execute arbitrary code via a crafted image file associated with a large integer value for the (1) input or (2) output channel, related to the ReadLUT_A2B and ReadLUT_B2A functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0733.html">CVE-2009-0733</cve>
<bugzilla href="https://bugzilla.suse.com/479606">SUSE bug 479606</bugzilla>
<bugzilla href="https://bugzilla.suse.com/490610">SUSE bug 490610</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198407" comment="lcms-1.17-77.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198408" comment="liblcms1-1.17-77.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198409" comment="liblcms1-32bit-1.17-77.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198410" comment="liblcms1-x86-1.17-77.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0755</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0755" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0755" source="CVE"/>
    <description>
    The FormWidgetChoice::loadDefaults function in Poppler before 0.10.4 allows remote attackers to cause a denial of service (crash) via a PDF file with an invalid Form Opt entry.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0755.html">CVE-2009-0755</cve>
<bugzilla href="https://bugzilla.suse.com/475556">SUSE bug 475556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/481795">SUSE bug 481795</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199649" comment="libpoppler-glib4-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199650" comment="libpoppler-qt4-3-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199651" comment="libpoppler5-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199652" comment="poppler-tools-0.12.3-1.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0756</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0756" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0756" source="CVE"/>
    <description>
    The JBIG2Stream::readSymbolDictSeg function in Poppler before 0.10.4 allows remote attackers to cause a denial of service (crash) via a PDF file that triggers a parsing error, which is not properly handled by JBIG2SymbolDict::~JBIG2SymbolDict and triggers an invalid memory dereference.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0756.html">CVE-2009-0756</cve>
<bugzilla href="https://bugzilla.suse.com/475556">SUSE bug 475556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/481795">SUSE bug 481795</bugzilla>
<bugzilla href="https://bugzilla.suse.com/487100">SUSE bug 487100</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199649" comment="libpoppler-glib4-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199650" comment="libpoppler-qt4-3-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199651" comment="libpoppler5-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199652" comment="poppler-tools-0.12.3-1.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0758</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0758" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0758" source="CVE"/>
    <description>
    The originates_from_local_legacy_unicast_socket function in avahi-core/server.c in avahi-daemon 0.6.23 does not account for the network byte order of a port number when processing incoming multicast packets, which allows remote attackers to cause a denial of service (network bandwidth and CPU consumption) via a crafted legacy unicast mDNS query packet that triggers a multicast packet storm.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0758.html">CVE-2009-0758</cve>
<bugzilla href="https://bugzilla.suse.com/480865">SUSE bug 480865</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199351" comment="avahi-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199352" comment="avahi-lang-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199353" comment="avahi-utils-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199354" comment="libavahi-client3-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199355" comment="libavahi-client3-32bit-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199356" comment="libavahi-client3-x86-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199357" comment="libavahi-common3-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199358" comment="libavahi-common3-32bit-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199359" comment="libavahi-common3-x86-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199360" comment="libavahi-core5-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199361" comment="libdns_sd-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199362" comment="libdns_sd-32bit-0.6.23-11.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199363" comment="libdns_sd-x86-0.6.23-11.30 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0771</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0771" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0771" source="CVE"/>
    <description>
    The layout engine in Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via certain vectors that trigger memory corruption and assertion failures.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0771.html">CVE-2009-0771</cve>
<bugzilla href="https://bugzilla.suse.com/478625">SUSE bug 478625</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0772</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0772" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0772" source="CVE"/>
    <description>
    The layout engine in Mozilla Firefox 2 and 3 before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to nsCSSStyleSheet::GetOwnerNode, events, and garbage collection, which triggers memory corruption.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0772.html">CVE-2009-0772</cve>
<bugzilla href="https://bugzilla.suse.com/478625">SUSE bug 478625</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0773</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0773" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0773" source="CVE"/>
    <description>
    The JavaScript engine in Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) a splice of an array that contains "some non-set elements," which causes jsarray.cpp to pass an incorrect argument to the ResizeSlots function, which triggers memory corruption; (2) vectors related to js_DecompileValueGenerator, jsopcode.cpp, __defineSetter__, and watch, which triggers an assertion failure or a segmentation fault; and (3) vectors related to gczeal, __defineSetter__, and watch, which triggers a hang.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0773.html">CVE-2009-0773</cve>
<bugzilla href="https://bugzilla.suse.com/478625">SUSE bug 478625</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0774</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0774" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0774" source="CVE"/>
    <description>
    The layout engine in Mozilla Firefox 2 and 3 before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to gczeal, a different vulnerability than CVE-2009-0773.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0774.html">CVE-2009-0774</cve>
<bugzilla href="https://bugzilla.suse.com/478625">SUSE bug 478625</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0775</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0775" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0775" source="CVE"/>
    <description>
    Double free vulnerability in Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey before 1.1.15 allows remote attackers to execute arbitrary code via "cloned XUL DOM elements which were linked as a parent and child," which are not properly handled during garbage collection.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0775.html">CVE-2009-0775</cve>
<bugzilla href="https://bugzilla.suse.com/478625">SUSE bug 478625</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0776</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0776" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0776" source="CVE"/>
    <description>
    nsIRDFService in Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey before 1.1.15 allows remote attackers to bypass the same-origin policy and read XML data from another domain via a cross-domain redirect.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0776.html">CVE-2009-0776</cve>
<bugzilla href="https://bugzilla.suse.com/465291">SUSE bug 465291</bugzilla>
<bugzilla href="https://bugzilla.suse.com/478625">SUSE bug 478625</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0777</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0777" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0777" source="CVE"/>
    <description>
    Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey before 1.1.15 decode invisible characters when they are displayed in the location bar, which causes an incorrect address to be displayed and makes it easier for remote attackers to spoof URLs and conduct phishing attacks.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0777.html">CVE-2009-0777</cve>
<bugzilla href="https://bugzilla.suse.com/478625">SUSE bug 478625</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0781</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0781" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0781" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in jsp/cal/cal2.jsp in the calendar application in the examples web application in Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 allows remote attackers to inject arbitrary web script or HTML via the time parameter, related to "invalid HTML."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0781.html">CVE-2009-0781</cve>
<bugzilla href="https://bugzilla.suse.com/507806">SUSE bug 507806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/509839">SUSE bug 509839</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199802" comment="tomcat6-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199803" comment="tomcat6-admin-webapps-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199804" comment="tomcat6-docs-webapp-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199805" comment="tomcat6-javadoc-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199806" comment="tomcat6-jsp-2_1-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199807" comment="tomcat6-lib-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199808" comment="tomcat6-servlet-2_5-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199809" comment="tomcat6-webapps-6.0.18-20.35.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0783</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0783" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0783" source="CVE"/>
    <description>
    Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0783.html">CVE-2009-0783</cve>
<bugzilla href="https://bugzilla.suse.com/509839">SUSE bug 509839</bugzilla>
<bugzilla href="https://bugzilla.suse.com/509840">SUSE bug 509840</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199802" comment="tomcat6-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199803" comment="tomcat6-admin-webapps-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199804" comment="tomcat6-docs-webapp-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199805" comment="tomcat6-javadoc-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199806" comment="tomcat6-jsp-2_1-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199807" comment="tomcat6-lib-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199808" comment="tomcat6-servlet-2_5-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199809" comment="tomcat6-webapps-6.0.18-20.35.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0789</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0789" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0789" source="CVE"/>
    <description>
    OpenSSL before 0.9.8k on WIN64 and certain other platforms does not properly handle a malformed ASN.1 structure, which allows remote attackers to cause a denial of service (invalid memory access and application crash) by placing this structure in the public key of a certificate, as demonstrated by an RSA public key.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0789.html">CVE-2009-0789</cve>
<bugzilla href="https://bugzilla.suse.com/459468">SUSE bug 459468</bugzilla>
<bugzilla href="https://bugzilla.suse.com/489641">SUSE bug 489641</bugzilla>
<bugzilla href="https://bugzilla.suse.com/629905">SUSE bug 629905</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199638" comment="libopenssl0_9_8-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199639" comment="libopenssl0_9_8-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199640" comment="libopenssl0_9_8-hmac-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199641" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199642" comment="libopenssl0_9_8-x86-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199643" comment="openssl-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199644" comment="openssl-doc-0.9.8j-0.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0791</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0791" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0791" source="CVE"/>
    <description>
    Multiple integer overflows in Xpdf 2.x and 3.x and Poppler 0.x, as used in the pdftops filter in CUPS 1.1.17, 1.1.22, and 1.3.7, GPdf, and kdegraphics KPDF, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file that triggers a heap-based buffer overflow, possibly related to (1) Decrypt.cxx, (2) FoFiTrueType.cxx, (3) gmem.c, (4) JBIG2Stream.cxx, and (5) PSOutputDev.cxx in pdftops/. NOTE: the JBIG2Stream.cxx vector may overlap CVE-2009-1179.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0791.html">CVE-2009-0791</cve>
<bugzilla href="https://bugzilla.suse.com/502061">SUSE bug 502061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/502974">SUSE bug 502974</bugzilla>
<bugzilla href="https://bugzilla.suse.com/507102">SUSE bug 507102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/539875">SUSE bug 539875</bugzilla>
<bugzilla href="https://bugzilla.suse.com/556049">SUSE bug 556049</bugzilla>
<bugzilla href="https://bugzilla.suse.com/566697">SUSE bug 566697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/570183">SUSE bug 570183</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199649" comment="libpoppler-glib4-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199650" comment="libpoppler-qt4-3-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199651" comment="libpoppler5-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199652" comment="poppler-tools-0.12.3-1.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0792</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0792" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0792" source="CVE"/>
    <description>
    Multiple integer overflows in icc.c in the International Color Consortium (ICC) Format library (aka icclib), as used in Ghostscript 8.64 and earlier and Argyll Color Management System (CMS) 1.0.3 and earlier, allow context-dependent attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly execute arbitrary code by using a device file for a translation request that operates on a crafted image file and targets a certain "native color space," related to an ICC profile in a (1) PostScript or (2) PDF file with embedded images.  NOTE: this issue exists because of an incomplete fix for CVE-2009-0583.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0792.html">CVE-2009-0792</cve>
<bugzilla href="https://bugzilla.suse.com/491897">SUSE bug 491897</bugzilla>
<bugzilla href="https://bugzilla.suse.com/492765">SUSE bug 492765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/649207">SUSE bug 649207</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199436" comment="ghostscript-fonts-other-8.62-32.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199437" comment="ghostscript-fonts-rus-8.62-32.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199438" comment="ghostscript-fonts-std-8.62-32.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199439" comment="ghostscript-library-8.62-32.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199440" comment="ghostscript-omni-8.62-32.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199441" comment="ghostscript-x11-8.62-32.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199442" comment="libgimpprint-4.2.7-32.34 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0793</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0793" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0793" source="CVE"/>
    <description>
    cmsxform.c in LittleCMS (aka lcms or liblcms) 1.18, as used in OpenJDK and other products, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted image that triggers execution of incorrect code for "transformations of monochrome profiles."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0793.html">CVE-2009-0793</cve>
<bugzilla href="https://bugzilla.suse.com/490610">SUSE bug 490610</bugzilla>
<bugzilla href="https://bugzilla.suse.com/521512">SUSE bug 521512</bugzilla>
<bugzilla href="https://bugzilla.suse.com/521513">SUSE bug 521513</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198407" comment="lcms-1.17-77.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198408" comment="liblcms1-1.17-77.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198409" comment="liblcms1-32bit-1.17-77.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198410" comment="liblcms1-x86-1.17-77.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0798</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0798" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0798" source="CVE"/>
    <description>
    ACPI Event Daemon (acpid) before 1.0.10 allows remote attackers to cause a denial of service (CPU consumption and connectivity loss) by opening a large number of UNIX sockets without closing them, which triggers an infinite loop.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0798.html">CVE-2009-0798</cve>
<bugzilla href="https://bugzilla.suse.com/491455">SUSE bug 491455</bugzilla>
<bugzilla href="https://bugzilla.suse.com/588368">SUSE bug 588368</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199285" comment="acpid-1.0.6-91.25 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0799</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0799" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0799" source="CVE"/>
    <description>
    The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to cause a denial of service (crash) via a crafted PDF file that triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0799.html">CVE-2009-0799</cve>
<bugzilla href="https://bugzilla.suse.com/487100">SUSE bug 487100</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199649" comment="libpoppler-glib4-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199650" comment="libpoppler-qt4-3-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199651" comment="libpoppler5-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199652" comment="poppler-tools-0.12.3-1.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0800" source="CVE"/>
    <description>
    Multiple "input validation flaws" in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allow remote attackers to execute arbitrary code via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0800.html">CVE-2009-0800</cve>
<bugzilla href="https://bugzilla.suse.com/487100">SUSE bug 487100</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199649" comment="libpoppler-glib4-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199650" comment="libpoppler-qt4-3-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199651" comment="libpoppler5-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199652" comment="poppler-tools-0.12.3-1.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0844</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0844" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0844" source="CVE"/>
    <description>
    The get_input_token function in the SPNEGO implementation in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote attackers to cause a denial of service (daemon crash) and possibly obtain sensitive information via a crafted length value that triggers a buffer over-read.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0844.html">CVE-2009-0844</cve>
<bugzilla href="https://bugzilla.suse.com/486722">SUSE bug 486722</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199544" comment="krb5-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199545" comment="krb5-32bit-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199546" comment="krb5-apps-clients-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199547" comment="krb5-apps-servers-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199548" comment="krb5-client-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199549" comment="krb5-server-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199550" comment="krb5-x86-1.6.3-133.49.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0845</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0845" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0845" source="CVE"/>
    <description>
    The spnego_gss_accept_sec_context function in lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3, when SPNEGO is used, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via invalid ContextFlags data in the reqFlags field in a negTokenInit token.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0845.html">CVE-2009-0845</cve>
<bugzilla href="https://bugzilla.suse.com/485894">SUSE bug 485894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/486722">SUSE bug 486722</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199544" comment="krb5-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199545" comment="krb5-32bit-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199546" comment="krb5-apps-clients-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199547" comment="krb5-apps-servers-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199548" comment="krb5-client-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199549" comment="krb5-server-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199550" comment="krb5-x86-1.6.3-133.49.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0846</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0846" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0846" source="CVE"/>
    <description>
    The asn1_decode_generaltime function in lib/krb5/asn.1/asn1_decode.c in the ASN.1 GeneralizedTime decoder in MIT Kerberos 5 (aka krb5) before 1.6.4 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via vectors involving an invalid DER encoding that triggers a free of an uninitialized pointer.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0846.html">CVE-2009-0846</cve>
<bugzilla href="https://bugzilla.suse.com/486723">SUSE bug 486723</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199544" comment="krb5-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199545" comment="krb5-32bit-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199546" comment="krb5-apps-clients-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199547" comment="krb5-apps-servers-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199548" comment="krb5-client-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199549" comment="krb5-server-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199550" comment="krb5-x86-1.6.3-133.49.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0847</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0847" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0847" source="CVE"/>
    <description>
    The asn1buf_imbed function in the ASN.1 decoder in MIT Kerberos 5 (aka krb5) 1.6.3, when PK-INIT is used, allows remote attackers to cause a denial of service (application crash) via a crafted length value that triggers an erroneous malloc call, related to incorrect calculations with pointer arithmetic.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0847.html">CVE-2009-0847</cve>
<bugzilla href="https://bugzilla.suse.com/486722">SUSE bug 486722</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199544" comment="krb5-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199545" comment="krb5-32bit-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199546" comment="krb5-apps-clients-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199547" comment="krb5-apps-servers-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199548" comment="krb5-client-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199549" comment="krb5-server-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199550" comment="krb5-x86-1.6.3-133.49.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0887</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0887" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0887" source="CVE"/>
    <description>
    Integer signedness error in the _pam_StrTok function in libpam/pam_misc.c in Linux-PAM (aka pam) 1.0.3 and earlier, when a configuration file contains non-ASCII usernames, might allow remote attackers to cause a denial of service, and might allow remote authenticated users to obtain login access with a different user's non-ASCII username, via a login attempt.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0887.html">CVE-2009-0887</cve>
<bugzilla href="https://bugzilla.suse.com/482713">SUSE bug 482713</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199158" comment="pam-1.1.5-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199159" comment="pam-32bit-1.1.5-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199160" comment="pam-doc-1.1.5-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199161" comment="pam-x86-1.1.5-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0945</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0945" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0945" source="CVE"/>
    <description>
    Array index error in the insertItemBefore method in WebKit, as used in Apple Safari before 3.2.3 and 4 Public Beta, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Google Chrome Stable before 1.0.154.65, and possibly other products allows remote attackers to execute arbitrary code via a document with a SVGPathList data structure containing a negative index in the (1) SVGTransformList, (2) SVGStringList, (3) SVGNumberList, (4) SVGPathSegList, (5) SVGPointList, or (6) SVGLengthList SVGList object, which triggers memory corruption.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0945.html">CVE-2009-0945</cve>
<bugzilla href="https://bugzilla.suse.com/512559">SUSE bug 512559</bugzilla>
<bugzilla href="https://bugzilla.suse.com/515124">SUSE bug 515124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/541632">SUSE bug 541632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/601349">SUSE bug 601349</bugzilla>
<bugzilla href="https://bugzilla.suse.com/644114">SUSE bug 644114</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199582" comment="libQtWebKit4-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199583" comment="libQtWebKit4-32bit-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199584" comment="libQtWebKit4-x86-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199585" comment="libqt4-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199586" comment="libqt4-32bit-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199587" comment="libqt4-qt3support-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199588" comment="libqt4-qt3support-32bit-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199589" comment="libqt4-qt3support-x86-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199590" comment="libqt4-sql-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199591" comment="libqt4-sql-32bit-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199592" comment="libqt4-sql-mysql-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199593" comment="libqt4-sql-sqlite-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199594" comment="libqt4-sql-x86-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199595" comment="libqt4-x11-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199596" comment="libqt4-x11-32bit-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199597" comment="libqt4-x11-x86-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199598" comment="libqt4-x86-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199599" comment="qt4-x11-tools-4.6.3-5.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0946</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0946" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0946" source="CVE"/>
    <description>
    Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0946.html">CVE-2009-0946</cve>
<bugzilla href="https://bugzilla.suse.com/485889">SUSE bug 485889</bugzilla>
<bugzilla href="https://bugzilla.suse.com/496289">SUSE bug 496289</bugzilla>
<bugzilla href="https://bugzilla.suse.com/541626">SUSE bug 541626</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199430" comment="freetype2-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199431" comment="freetype2-32bit-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199432" comment="freetype2-x86-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199433" comment="ft2demos-2.3.7-25.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0949</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-0949" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0949" source="CVE"/>
    <description>
    The ippReadIO function in cups/ipp.c in cupsd in CUPS before 1.3.10 does not properly initialize memory for IPP request packets, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a scheduler request with two consecutive IPP_TAG_UNSUPPORTED tags.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0949.html">CVE-2009-0949</cve>
<bugzilla href="https://bugzilla.suse.com/503759">SUSE bug 503759</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199386" comment="cups-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199387" comment="cups-client-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199388" comment="cups-libs-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199389" comment="cups-libs-32bit-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199390" comment="cups-libs-x86-1.3.9-8.46.46 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1044</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-1044" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1044" source="CVE"/>
    <description>
    Mozilla Firefox 3.0.7 on Windows 7 allows remote attackers to execute arbitrary code via unknown vectors related to the _moveToEdgeShift XUL tree method, which triggers garbage collection on objects that are still in use, as demonstrated by Nils during a PWN2OWN competition at CanSecWest 2009.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1044.html">CVE-2009-1044</cve>
<bugzilla href="https://bugzilla.suse.com/465291">SUSE bug 465291</bugzilla>
<bugzilla href="https://bugzilla.suse.com/488955">SUSE bug 488955</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1169</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-1169" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1169" source="CVE"/>
    <description>
    The txMozillaXSLTProcessor::TransformToDoc function in Mozilla Firefox before 3.0.8 and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XML file with a crafted XSLT transform.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1169.html">CVE-2009-1169</cve>
<bugzilla href="https://bugzilla.suse.com/488955">SUSE bug 488955</bugzilla>
<bugzilla href="https://bugzilla.suse.com/509766">SUSE bug 509766</bugzilla>
<bugzilla href="https://bugzilla.suse.com/510964">SUSE bug 510964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/515951">SUSE bug 515951</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1179</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-1179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1179" source="CVE"/>
    <description>
    Integer overflow in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to execute arbitrary code via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1179.html">CVE-2009-1179</cve>
<bugzilla href="https://bugzilla.suse.com/487100">SUSE bug 487100</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199649" comment="libpoppler-glib4-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199650" comment="libpoppler-qt4-3-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199651" comment="libpoppler5-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199652" comment="poppler-tools-0.12.3-1.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1180</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-1180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1180" source="CVE"/>
    <description>
    The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to execute arbitrary code via a crafted PDF file that triggers a free of invalid data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1180.html">CVE-2009-1180</cve>
<bugzilla href="https://bugzilla.suse.com/487100">SUSE bug 487100</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199649" comment="libpoppler-glib4-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199650" comment="libpoppler-qt4-3-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199651" comment="libpoppler5-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199652" comment="poppler-tools-0.12.3-1.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1181</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-1181" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1181" source="CVE"/>
    <description>
    The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to cause a denial of service (crash) via a crafted PDF file that triggers a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1181.html">CVE-2009-1181</cve>
<bugzilla href="https://bugzilla.suse.com/487100">SUSE bug 487100</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199649" comment="libpoppler-glib4-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199650" comment="libpoppler-qt4-3-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199651" comment="libpoppler5-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199652" comment="poppler-tools-0.12.3-1.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-1182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1182" source="CVE"/>
    <description>
    Multiple buffer overflows in the JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allow remote attackers to execute arbitrary code via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1182.html">CVE-2009-1182</cve>
<bugzilla href="https://bugzilla.suse.com/487100">SUSE bug 487100</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199649" comment="libpoppler-glib4-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199650" comment="libpoppler-qt4-3-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199651" comment="libpoppler5-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199652" comment="poppler-tools-0.12.3-1.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1183</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-1183" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1183" source="CVE"/>
    <description>
    The JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to cause a denial of service (infinite loop and hang) via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1183.html">CVE-2009-1183</cve>
<bugzilla href="https://bugzilla.suse.com/487100">SUSE bug 487100</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199649" comment="libpoppler-glib4-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199650" comment="libpoppler-qt4-3-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199651" comment="libpoppler5-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199652" comment="poppler-tools-0.12.3-1.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1187</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-1187" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1187" source="CVE"/>
    <description>
    Integer overflow in the JBIG2 decoding feature in Poppler before 0.10.6 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to CairoOutputDev (CairoOutputDev.cc).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1187.html">CVE-2009-1187</cve>
<bugzilla href="https://bugzilla.suse.com/487100">SUSE bug 487100</bugzilla>
<bugzilla href="https://bugzilla.suse.com/508153">SUSE bug 508153</bugzilla>
<bugzilla href="https://bugzilla.suse.com/508154">SUSE bug 508154</bugzilla>
<bugzilla href="https://bugzilla.suse.com/539875">SUSE bug 539875</bugzilla>
<bugzilla href="https://bugzilla.suse.com/566697">SUSE bug 566697</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199649" comment="libpoppler-glib4-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199650" comment="libpoppler-qt4-3-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199651" comment="libpoppler5-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199652" comment="poppler-tools-0.12.3-1.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1188</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-1188" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1188" source="CVE"/>
    <description>
    Integer overflow in the JBIG2 decoding feature in the SplashBitmap::SplashBitmap function in SplashBitmap.cc in Xpdf 3.x before 3.02pl4 and Poppler before 0.10.6, as used in GPdf and kdegraphics KPDF, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted PDF document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1188.html">CVE-2009-1188</cve>
<bugzilla href="https://bugzilla.suse.com/487100">SUSE bug 487100</bugzilla>
<bugzilla href="https://bugzilla.suse.com/508153">SUSE bug 508153</bugzilla>
<bugzilla href="https://bugzilla.suse.com/508154">SUSE bug 508154</bugzilla>
<bugzilla href="https://bugzilla.suse.com/539875">SUSE bug 539875</bugzilla>
<bugzilla href="https://bugzilla.suse.com/546400">SUSE bug 546400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/566697">SUSE bug 566697</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199649" comment="libpoppler-glib4-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199650" comment="libpoppler-qt4-3-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199651" comment="libpoppler5-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199652" comment="poppler-tools-0.12.3-1.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1189</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-1189" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1189" source="CVE"/>
    <description>
    The _dbus_validate_signature_with_reason function (dbus-marshal-validate.c) in D-Bus (aka DBus) before 1.2.14 uses incorrect logic to validate a basic type, which allows remote attackers to spoof a signature via a crafted key.  NOTE: this is due to an incorrect fix for CVE-2008-3834.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1189.html">CVE-2009-1189</cve>
<bugzilla href="https://bugzilla.suse.com/495804">SUSE bug 495804</bugzilla>
<bugzilla href="https://bugzilla.suse.com/659934">SUSE bug 659934</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199397" comment="dbus-1-1.2.10-3.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199398" comment="dbus-1-32bit-1.2.10-3.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199399" comment="dbus-1-x11-1.2.10-3.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199400" comment="dbus-1-x86-1.2.10-3.27 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1191</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-1191" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1191" source="CVE"/>
    <description>
    mod_proxy_ajp.c in the mod_proxy_ajp module in the Apache HTTP Server 2.2.11 allows remote attackers to obtain sensitive response data, intended for a client that sent an earlier POST request with no request body, via an HTTP request.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1191.html">CVE-2009-1191</cve>
<bugzilla href="https://bugzilla.suse.com/521943">SUSE bug 521943</bugzilla>
<bugzilla href="https://bugzilla.suse.com/539571">SUSE bug 539571</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199288" comment="apache2-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199289" comment="apache2-doc-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199290" comment="apache2-example-pages-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199291" comment="apache2-prefork-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199292" comment="apache2-utils-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199293" comment="apache2-worker-2.2.12-1.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1195</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-1195" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1195" source="CVE"/>
    <description>
    The Apache HTTP Server 2.2.11 and earlier 2.2 versions does not properly handle Options=IncludesNOEXEC in the AllowOverride directive, which allows local users to gain privileges by configuring (1) Options Includes, (2) Options +Includes, or (3) Options +IncludesNOEXEC in a .htaccess file, and then inserting an exec element in a .shtml file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1195.html">CVE-2009-1195</cve>
<bugzilla href="https://bugzilla.suse.com/512583">SUSE bug 512583</bugzilla>
<bugzilla href="https://bugzilla.suse.com/513080">SUSE bug 513080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/539571">SUSE bug 539571</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199288" comment="apache2-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199289" comment="apache2-doc-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199290" comment="apache2-example-pages-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199291" comment="apache2-prefork-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199292" comment="apache2-utils-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199293" comment="apache2-worker-2.2.12-1.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1210</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-1210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1210" source="CVE"/>
    <description>
    Format string vulnerability in the PROFINET/DCP (PN-DCP) dissector in Wireshark 1.0.6 and earlier allows remote attackers to execute arbitrary code via a PN-DCP packet with format string specifiers in the station name.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1210.html">CVE-2009-1210</cve>
<bugzilla href="https://bugzilla.suse.com/491449">SUSE bug 491449</bugzilla>
<bugzilla href="https://bugzilla.suse.com/493584">SUSE bug 493584</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1252</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-1252" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1252" source="CVE"/>
    <description>
    Stack-based buffer overflow in the crypto_recv function in ntp_crypto.c in ntpd in NTP before 4.2.4p7 and 4.2.5 before 4.2.5p74, when OpenSSL and autokey are enabled, allows remote attackers to execute arbitrary code via a crafted packet containing an extension field.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1252.html">CVE-2009-1252</cve>
<bugzilla href="https://bugzilla.suse.com/501632">SUSE bug 501632</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199722" comment="ntp-4.2.4p8-1.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199723" comment="ntp-doc-4.2.4p8-1.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091267" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1267</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-1267" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1267" source="CVE"/>
    <description>
    Unspecified vulnerability in the LDAP dissector in Wireshark 0.99.2 through 1.0.6, when running on Windows, allows remote attackers to cause a denial of service (crash) via unknown attack vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1267.html">CVE-2009-1267</cve>
<bugzilla href="https://bugzilla.suse.com/493584">SUSE bug 493584</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1268</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-1268" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1268" source="CVE"/>
    <description>
    The Check Point High-Availability Protocol (CPHAP) dissector in Wireshark 0.9.6 through 1.0.6 allows remote attackers to cause a denial of service (crash) via a crafted FWHA_MY_STATE packet.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1268.html">CVE-2009-1268</cve>
<bugzilla href="https://bugzilla.suse.com/493584">SUSE bug 493584</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1269</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-1269" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1269" source="CVE"/>
    <description>
    Unspecified vulnerability in Wireshark 0.99.6 through 1.0.6 allows remote attackers to cause a denial of service (crash) via a crafted Tektronix .rf5 file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1269.html">CVE-2009-1269</cve>
<bugzilla href="https://bugzilla.suse.com/493584">SUSE bug 493584</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1302</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-1302" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1302" source="CVE"/>
    <description>
    The browser engine in Mozilla Firefox 3.x before 3.0.9, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (application crash) and possibly trigger memory corruption via vectors related to (1) nsAsyncInstantiateEvent::Run, (2) nsStyleContext::Destroy, (3) nsComputedDOMStyle::GetWidth, (4) the xslt_attributeset_ImportSameName.html test case for the XSLT stylesheet compiler, (5) nsXULDocument::SynchronizeBroadcastListener, (6) IsBindingAncestor, (7) PL_DHashTableOperate and nsEditor::EndUpdateViewBatch, and (8) gfxSkipCharsIterator::SetOffsets, and other vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1302.html">CVE-2009-1302</cve>
<bugzilla href="https://bugzilla.suse.com/495473">SUSE bug 495473</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1303</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-1303" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1303" source="CVE"/>
    <description>
    The browser engine in Mozilla Firefox before 3.0.9, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (application crash) and possibly trigger memory corruption via vectors related to nsSVGElement::BindToTree.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1303.html">CVE-2009-1303</cve>
<bugzilla href="https://bugzilla.suse.com/495473">SUSE bug 495473</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1304</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-1304" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1304" source="CVE"/>
    <description>
    The JavaScript engine in Mozilla Firefox 3.x before 3.0.9, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (application crash) and possibly trigger memory corruption via vectors involving (1) js_FindPropertyHelper, related to the definitions of Math and Date; and (2) js_CheckRedeclaration.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1304.html">CVE-2009-1304</cve>
<bugzilla href="https://bugzilla.suse.com/495473">SUSE bug 495473</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1305</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-1305" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1305" source="CVE"/>
    <description>
    The JavaScript engine in Mozilla Firefox before 3.0.9, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (application crash) and possibly trigger memory corruption via vectors involving JSOP_DEFVAR and properties that lack the JSPROP_PERMANENT attribute.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1305.html">CVE-2009-1305</cve>
<bugzilla href="https://bugzilla.suse.com/495473">SUSE bug 495473</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1306</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-1306" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1306" source="CVE"/>
    <description>
    The jar: URI implementation in Mozilla Firefox before 3.0.9, Thunderbird, and SeaMonkey does not follow the Content-Disposition header of the inner URI, which allows remote attackers to conduct cross-site scripting (XSS) attacks and possibly other attacks via an uploaded .jar file with a "Content-Disposition: attachment" designation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1306.html">CVE-2009-1306</cve>
<bugzilla href="https://bugzilla.suse.com/495473">SUSE bug 495473</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091307" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1307</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-1307" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1307" source="CVE"/>
    <description>
    The view-source: URI implementation in Mozilla Firefox before 3.0.9, Thunderbird, and SeaMonkey does not properly implement the Same Origin Policy, which allows remote attackers to (1) bypass crossdomain.xml restrictions and connect to arbitrary web sites via a Flash file; (2) read, create, or modify Local Shared Objects via a Flash file; or (3) bypass unspecified restrictions and render content via vectors involving a jar: URI.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1307.html">CVE-2009-1307</cve>
<bugzilla href="https://bugzilla.suse.com/495473">SUSE bug 495473</bugzilla>
<bugzilla href="https://bugzilla.suse.com/515951">SUSE bug 515951</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1308</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-1308" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1308" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 3.0.9, Thunderbird, and SeaMonkey allows remote attackers to inject arbitrary web script or HTML via vectors involving XBL JavaScript bindings and remote stylesheets, as exploited in the wild by a March 2009 eBay listing.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1308.html">CVE-2009-1308</cve>
<bugzilla href="https://bugzilla.suse.com/495473">SUSE bug 495473</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1309</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-1309" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1309" source="CVE"/>
    <description>
    Mozilla Firefox before 3.0.9, Thunderbird, and SeaMonkey do not properly implement the Same Origin Policy for (1) XMLHttpRequest, involving a mismatch for a document's principal, and (2) XPCNativeWrapper.toString, involving an incorrect __proto__ scope, which allows remote attackers to conduct cross-site scripting (XSS) attacks and possibly other attacks via a crafted document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1309.html">CVE-2009-1309</cve>
<bugzilla href="https://bugzilla.suse.com/495473">SUSE bug 495473</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1310</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-1310" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1310" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the MozSearch plugin implementation in Mozilla Firefox before 3.0.9 allows user-assisted remote attackers to inject arbitrary web script or HTML via a javascript: URI in the SearchForm element.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1310.html">CVE-2009-1310</cve>
<bugzilla href="https://bugzilla.suse.com/495473">SUSE bug 495473</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1311</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-1311" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1311" source="CVE"/>
    <description>
    Mozilla Firefox before 3.0.9 and SeaMonkey before 1.1.17 allow user-assisted remote attackers to obtain sensitive information via a web page with an embedded frame, which causes POST data from an outer page to be sent to the inner frame's URL during a SAVEMODE_FILEONLY save of the inner frame.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1311.html">CVE-2009-1311</cve>
<bugzilla href="https://bugzilla.suse.com/465291">SUSE bug 465291</bugzilla>
<bugzilla href="https://bugzilla.suse.com/495473">SUSE bug 495473</bugzilla>
<bugzilla href="https://bugzilla.suse.com/515951">SUSE bug 515951</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1312</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-1312" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1312" source="CVE"/>
    <description>
    Mozilla Firefox before 3.0.9 and SeaMonkey 1.1.17 do not block javascript: URIs in Refresh headers in HTTP responses, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (1) injecting a Refresh header or (2) specifying the content of a Refresh header. NOTE: it was later reported that Firefox 3.6 a1 pre and Mozilla 1.7.x and earlier are also affected.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1312.html">CVE-2009-1312</cve>
<bugzilla href="https://bugzilla.suse.com/495473">SUSE bug 495473</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1313</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-1313" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1313" source="CVE"/>
    <description>
    The nsTextFrame::ClearTextRun function in layout/generic/nsTextFrameThebes.cpp in Mozilla Firefox 3.0.9 allows remote attackers to cause a denial of service (memory corruption) and probably execute arbitrary code via unspecified vectors.  NOTE: this vulnerability reportedly exists because of an incorrect fix for CVE-2009-1302.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1313.html">CVE-2009-1313</cve>
<bugzilla href="https://bugzilla.suse.com/500909">SUSE bug 500909</bugzilla>
<bugzilla href="https://bugzilla.suse.com/502062">SUSE bug 502062</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1377</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-1377" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1377" source="CVE"/>
    <description>
    The dtls1_buffer_record function in ssl/d1_pkt.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allows remote attackers to cause a denial of service (memory consumption) via a large series of "future epoch" DTLS records that are buffered in a queue, aka "DTLS record buffer limitation bug."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1377.html">CVE-2009-1377</cve>
<bugzilla href="https://bugzilla.suse.com/459468">SUSE bug 459468</bugzilla>
<bugzilla href="https://bugzilla.suse.com/504687">SUSE bug 504687</bugzilla>
<bugzilla href="https://bugzilla.suse.com/629905">SUSE bug 629905</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199638" comment="libopenssl0_9_8-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199639" comment="libopenssl0_9_8-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199640" comment="libopenssl0_9_8-hmac-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199641" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199642" comment="libopenssl0_9_8-x86-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199643" comment="openssl-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199644" comment="openssl-doc-0.9.8j-0.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1378</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-1378" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1378" source="CVE"/>
    <description>
    Multiple memory leaks in the dtls1_process_out_of_seq_message function in ssl/d1_both.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allow remote attackers to cause a denial of service (memory consumption) via DTLS records that (1) are duplicates or (2) have sequence numbers much greater than current sequence numbers, aka "DTLS fragment handling memory leak."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1378.html">CVE-2009-1378</cve>
<bugzilla href="https://bugzilla.suse.com/459468">SUSE bug 459468</bugzilla>
<bugzilla href="https://bugzilla.suse.com/504687">SUSE bug 504687</bugzilla>
<bugzilla href="https://bugzilla.suse.com/629905">SUSE bug 629905</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199638" comment="libopenssl0_9_8-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199639" comment="libopenssl0_9_8-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199640" comment="libopenssl0_9_8-hmac-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199641" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199642" comment="libopenssl0_9_8-x86-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199643" comment="openssl-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199644" comment="openssl-doc-0.9.8j-0.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1379</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-1379" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1379" source="CVE"/>
    <description>
    Use-after-free vulnerability in the dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL 1.0.0 Beta 2 allows remote attackers to cause a denial of service (openssl s_client crash) and possibly have unspecified other impact via a DTLS packet, as demonstrated by a packet from a server that uses a crafted server certificate.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1379.html">CVE-2009-1379</cve>
<bugzilla href="https://bugzilla.suse.com/459468">SUSE bug 459468</bugzilla>
<bugzilla href="https://bugzilla.suse.com/504687">SUSE bug 504687</bugzilla>
<bugzilla href="https://bugzilla.suse.com/629905">SUSE bug 629905</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199638" comment="libopenssl0_9_8-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199639" comment="libopenssl0_9_8-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199640" comment="libopenssl0_9_8-hmac-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199641" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199642" comment="libopenssl0_9_8-x86-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199643" comment="openssl-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199644" comment="openssl-doc-0.9.8j-0.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1386</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-1386" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1386" source="CVE"/>
    <description>
    ssl/s3_pkt.c in OpenSSL before 0.9.8i allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a DTLS ChangeCipherSpec packet that occurs before ClientHello.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1386.html">CVE-2009-1386</cve>
<bugzilla href="https://bugzilla.suse.com/459468">SUSE bug 459468</bugzilla>
<bugzilla href="https://bugzilla.suse.com/509031">SUSE bug 509031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/515659">SUSE bug 515659</bugzilla>
<bugzilla href="https://bugzilla.suse.com/629905">SUSE bug 629905</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199638" comment="libopenssl0_9_8-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199639" comment="libopenssl0_9_8-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199640" comment="libopenssl0_9_8-hmac-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199641" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199642" comment="libopenssl0_9_8-x86-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199643" comment="openssl-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199644" comment="openssl-doc-0.9.8j-0.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1387</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-1387" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1387" source="CVE"/>
    <description>
    The dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL before 1.0.0 Beta 2 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence DTLS handshake message, related to a "fragment bug."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1387.html">CVE-2009-1387</cve>
<bugzilla href="https://bugzilla.suse.com/459468">SUSE bug 459468</bugzilla>
<bugzilla href="https://bugzilla.suse.com/509031">SUSE bug 509031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/515659">SUSE bug 515659</bugzilla>
<bugzilla href="https://bugzilla.suse.com/629905">SUSE bug 629905</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199638" comment="libopenssl0_9_8-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199639" comment="libopenssl0_9_8-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199640" comment="libopenssl0_9_8-hmac-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199641" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199642" comment="libopenssl0_9_8-x86-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199643" comment="openssl-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199644" comment="openssl-doc-0.9.8j-0.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1563</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-1563" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1563" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2009-0689.  Reason: This candidate is a duplicate of CVE-2009-0689.  Certain codebase relationships were not originally clear.  Notes: All CVE users should reference CVE-2009-0689 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1563.html">CVE-2009-1563</cve>
<bugzilla href="https://bugzilla.suse.com/522109">SUSE bug 522109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/545277">SUSE bug 545277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/546371">SUSE bug 546371</bugzilla>
<bugzilla href="https://bugzilla.suse.com/557126">SUSE bug 557126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/557127">SUSE bug 557127</bugzilla>
<bugzilla href="https://bugzilla.suse.com/557128">SUSE bug 557128</bugzilla>
<bugzilla href="https://bugzilla.suse.com/557671">SUSE bug 557671</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1571</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-1571" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1571" source="CVE"/>
    <description>
    Use-after-free vulnerability in the HTML parser in Mozilla Firefox 3.0.x before 3.0.18 and 3.5.x before 3.5.8, Thunderbird before 3.0.2, and SeaMonkey before 2.0.3 allows remote attackers to execute arbitrary code via unspecified method calls that attempt to access freed objects in low-memory situations.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1571.html">CVE-2009-1571</cve>
<bugzilla href="https://bugzilla.suse.com/576969">SUSE bug 576969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/581160">SUSE bug 581160</bugzilla>
<bugzilla href="https://bugzilla.suse.com/584499">SUSE bug 584499</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1720</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-1720" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1720" source="CVE"/>
    <description>
    Multiple integer overflows in OpenEXR 1.2.2 and 1.6.1 allow context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unspecified vectors that trigger heap-based buffer overflows, related to (1) the Imf::PreviewImage::PreviewImage function and (2) compressor constructors.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1720.html">CVE-2009-1720</cve>
<bugzilla href="https://bugzilla.suse.com/527538">SUSE bug 527538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/527539">SUSE bug 527539</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198093" comment="OpenEXR-1.6.1-83.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198094" comment="OpenEXR-32bit-1.6.1-83.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198095" comment="OpenEXR-x86-1.6.1-83.17 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1721</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-1721" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1721" source="CVE"/>
    <description>
    The decompression implementation in the Imf::hufUncompress function in OpenEXR 1.2.2 and 1.6.1 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger a free of an uninitialized pointer.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1721.html">CVE-2009-1721</cve>
<bugzilla href="https://bugzilla.suse.com/527538">SUSE bug 527538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/527539">SUSE bug 527539</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198093" comment="OpenEXR-1.6.1-83.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198094" comment="OpenEXR-32bit-1.6.1-83.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198095" comment="OpenEXR-x86-1.6.1-83.17 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1788</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-1788" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1788" source="CVE"/>
    <description>
    Heap-based buffer overflow in voc_read_header in libsndfile 1.0.15 through 1.0.19, as used in Winamp 5.552 and possibly other media programs, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a VOC file with an invalid header value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1788.html">CVE-2009-1788</cve>
<bugzilla href="https://bugzilla.suse.com/504434">SUSE bug 504434</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199081" comment="libsndfile-1.0.20-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199082" comment="libsndfile-32bit-1.0.20-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199083" comment="libsndfile-x86-1.0.20-2.4 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1791</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-1791" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1791" source="CVE"/>
    <description>
    Heap-based buffer overflow in aiff_read_header in libsndfile 1.0.15 through 1.0.19, as used in Winamp 5.552 and possibly other media programs, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an AIFF file with an invalid header value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1791.html">CVE-2009-1791</cve>
<bugzilla href="https://bugzilla.suse.com/504434">SUSE bug 504434</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199081" comment="libsndfile-1.0.20-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199082" comment="libsndfile-32bit-1.0.20-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199083" comment="libsndfile-x86-1.0.20-2.4 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1886</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-1886" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1886" source="CVE"/>
    <description>
    Multiple format string vulnerabilities in client/client.c in smbclient in Samba 3.2.0 through 3.2.12 might allow context-dependent attackers to execute arbitrary code via format string specifiers in a filename.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1886.html">CVE-2009-1886</cve>
<bugzilla href="https://bugzilla.suse.com/513360">SUSE bug 513360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/515479">SUSE bug 515479</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199376" comment="cifs-utils-5.1-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199555" comment="ldapsmb-1.34b-12.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199556" comment="libldb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199557" comment="libsmbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199558" comment="libsmbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199559" comment="libsmbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199560" comment="libtalloc2-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199561" comment="libtalloc2-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199562" comment="libtalloc2-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199563" comment="libtdb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199564" comment="libtdb1-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199565" comment="libtdb1-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199566" comment="libtevent0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199567" comment="libwbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199568" comment="libwbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199569" comment="libwbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199570" comment="samba-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199571" comment="samba-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199572" comment="samba-client-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199573" comment="samba-client-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199574" comment="samba-client-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199575" comment="samba-krb-printing-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199576" comment="samba-winbind-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199577" comment="samba-winbind-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199578" comment="samba-winbind-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199579" comment="samba-x86-3.6.3-0.39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1888</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-1888" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1888" source="CVE"/>
    <description>
    The acl_group_override function in smbd/posix_acls.c in smbd in Samba 3.0.x before 3.0.35, 3.1.x and 3.2.x before 3.2.13, and 3.3.x before 3.3.6, when dos filemode is enabled, allows remote attackers to modify access control lists for files via vectors related to read access to uninitialized memory.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1888.html">CVE-2009-1888</cve>
<bugzilla href="https://bugzilla.suse.com/513360">SUSE bug 513360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/515479">SUSE bug 515479</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199376" comment="cifs-utils-5.1-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199555" comment="ldapsmb-1.34b-12.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199556" comment="libldb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199557" comment="libsmbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199558" comment="libsmbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199559" comment="libsmbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199560" comment="libtalloc2-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199561" comment="libtalloc2-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199562" comment="libtalloc2-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199563" comment="libtdb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199564" comment="libtdb1-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199565" comment="libtdb1-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199566" comment="libtevent0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199567" comment="libwbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199568" comment="libwbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199569" comment="libwbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199570" comment="samba-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199571" comment="samba-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199572" comment="samba-client-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199573" comment="samba-client-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199574" comment="samba-client-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199575" comment="samba-krb-printing-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199576" comment="samba-winbind-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199577" comment="samba-winbind-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199578" comment="samba-winbind-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199579" comment="samba-x86-3.6.3-0.39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1890</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-1890" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1890" source="CVE"/>
    <description>
    The stream_reqbody_cl function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server before 2.3.3, when a reverse proxy is configured, does not properly handle an amount of streamed data that exceeds the Content-Length value, which allows remote attackers to cause a denial of service (CPU consumption) via crafted requests.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1890.html">CVE-2009-1890</cve>
<bugzilla href="https://bugzilla.suse.com/519194">SUSE bug 519194</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199288" comment="apache2-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199289" comment="apache2-doc-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199290" comment="apache2-example-pages-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199291" comment="apache2-prefork-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199292" comment="apache2-utils-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199293" comment="apache2-worker-2.2.12-1.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1891</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-1891" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1891" source="CVE"/>
    <description>
    The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1891.html">CVE-2009-1891</cve>
<bugzilla href="https://bugzilla.suse.com/521906">SUSE bug 521906</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199288" comment="apache2-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199289" comment="apache2-doc-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199290" comment="apache2-example-pages-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199291" comment="apache2-prefork-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199292" comment="apache2-utils-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199293" comment="apache2-worker-2.2.12-1.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091892" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1892</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-1892" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1892" source="CVE"/>
    <description>
    dhcpd in ISC DHCP 3.0.4 and 3.1.1, when the dhcp-client-identifier and hardware ethernet configuration settings are both used, allows remote attackers to cause a denial of service (daemon crash) via unspecified requests.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1892.html">CVE-2009-1892</cve>
<bugzilla href="https://bugzilla.suse.com/519413">SUSE bug 519413</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199401" comment="dhcp-4.2.4.P2-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199402" comment="dhcp-client-4.2.4.P2-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199403" comment="dhcp-relay-4.2.4.P2-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199404" comment="dhcp-server-4.2.4.P2-0.16 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1904</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-1904" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1904" source="CVE"/>
    <description>
    The BigDecimal library in Ruby 1.8.6 before p369 and 1.8.7 before p173 allows context-dependent attackers to cause a denial of service (application crash) via a string argument that represents a large number, as demonstrated by an attempted conversion to the Float data type.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1904.html">CVE-2009-1904</cve>
<bugzilla href="https://bugzilla.suse.com/511568">SUSE bug 511568</bugzilla>
<bugzilla href="https://bugzilla.suse.com/580482">SUSE bug 580482</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199778" comment="ruby-1.8.7.p357-0.9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199779" comment="ruby-doc-html-1.8.7.p357-0.9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199780" comment="ruby-tk-1.8.7.p357-0.9.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1932</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-1932" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1932" source="CVE"/>
    <description>
    Multiple integer overflows in the (1) user_info_callback, (2) user_endrow_callback, and (3) gst_pngdec_task functions (ext/libpng/gstpngdec.c) in GStreamer Good Plug-ins (aka gst-plugins-good or gstreamer-plugins-good) 0.10.15 allow remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted PNG file, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1932.html">CVE-2009-1932</cve>
<bugzilla href="https://bugzilla.suse.com/510292">SUSE bug 510292</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198886" comment="gstreamer-0_10-plugins-good-0.10.30-5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198887" comment="gstreamer-0_10-plugins-good-doc-0.10.30-5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198888" comment="gstreamer-0_10-plugins-good-lang-0.10.30-5.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2042</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-2042" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2042" source="CVE"/>
    <description>
    libpng before 1.2.37 does not properly parse 1-bit interlaced images with width values that are not divisible by 8, which causes libpng to include uninitialized bits in certain rows of a PNG file and might allow remote attackers to read portions of sensitive memory via "out-of-bounds pixels" in the file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-2042.html">CVE-2009-2042</cve>
<bugzilla href="https://bugzilla.suse.com/514727">SUSE bug 514727</bugzilla>
<bugzilla href="https://bugzilla.suse.com/608040">SUSE bug 608040</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199646" comment="libpng12-0-1.2.31-5.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199647" comment="libpng12-0-32bit-1.2.31-5.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199648" comment="libpng12-0-x86-1.2.31-5.31 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2285</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-2285" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2285" source="CVE"/>
    <description>
    Buffer underflow in the LZWDecodeCompat function in libtiff 3.8.2 allows context-dependent attackers to cause a denial of service (crash) via a crafted TIFF image, a different vulnerability than CVE-2008-2327.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-2285.html">CVE-2009-2285</cve>
<bugzilla href="https://bugzilla.suse.com/518698">SUSE bug 518698</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199680" comment="libtiff3-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199681" comment="libtiff3-32bit-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199682" comment="libtiff3-x86-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199683" comment="tiff-3.8.2-141.152 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2347</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-2347" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2347" source="CVE"/>
    <description>
    Multiple integer overflows in inter-color spaces conversion tools in libtiff 3.8 through 3.8.2, 3.9, and 4.0 allow context-dependent attackers to execute arbitrary code via a TIFF image with large (1) width and (2) height values, which triggers a heap-based buffer overflow in the (a) cvt_whole_image function in tiff2rgba and (b) tiffcvt function in rgb2ycbcr.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-2347.html">CVE-2009-2347</cve>
<bugzilla href="https://bugzilla.suse.com/519796">SUSE bug 519796</bugzilla>
<bugzilla href="https://bugzilla.suse.com/616827">SUSE bug 616827</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199680" comment="libtiff3-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199681" comment="libtiff3-32bit-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199682" comment="libtiff3-x86-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199683" comment="tiff-3.8.2-141.152 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2412</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-2412" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2412" source="CVE"/>
    <description>
    Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc function in memory/unix/apr_pools.c in APR; or crafted calls to the (3) apr_rmm_malloc, (4) apr_rmm_calloc, or (5) apr_rmm_realloc function in misc/apr_rmm.c in APR-util; leading to buffer overflows.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-2412.html">CVE-2009-2412</cve>
<bugzilla href="https://bugzilla.suse.com/528714">SUSE bug 528714</bugzilla>
<bugzilla href="https://bugzilla.suse.com/529591">SUSE bug 529591</bugzilla>
<bugzilla href="https://bugzilla.suse.com/802057">SUSE bug 802057</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198997" comment="libapr-util1-1.3.4-12.22.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198998" comment="libapr-util1-32bit-1.3.4-12.22.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199600" comment="libapr1-1.3.3-11.18.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199601" comment="libapr1-32bit-1.3.3-11.18.19 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2414</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-2414" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2414" source="CVE"/>
    <description>
    Stack consumption vulnerability in libxml2 2.5.10, 2.6.16, 2.6.26, 2.6.27, and 2.6.32, and libxml 1.8.17, allows context-dependent attackers to cause a denial of service (application crash) via a large depth of element declarations in a DTD, related to a function recursion, as demonstrated by the Codenomicon XML fuzzing framework.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-2414.html">CVE-2009-2414</cve>
<bugzilla href="https://bugzilla.suse.com/528007">SUSE bug 528007</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199702" comment="libxml2-2.7.6-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199703" comment="libxml2-32bit-2.7.6-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199704" comment="libxml2-doc-2.7.6-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199705" comment="libxml2-x86-2.7.6-0.23 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2416</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-2416" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2416" source="CVE"/>
    <description>
    Multiple use-after-free vulnerabilities in libxml2 2.5.10, 2.6.16, 2.6.26, 2.6.27, and 2.6.32, and libxml 1.8.17, allow context-dependent attackers to cause a denial of service (application crash) via crafted (1) Notation or (2) Enumeration attribute types in an XML file, as demonstrated by the Codenomicon XML fuzzing framework.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-2416.html">CVE-2009-2416</cve>
<bugzilla href="https://bugzilla.suse.com/528007">SUSE bug 528007</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199702" comment="libxml2-2.7.6-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199703" comment="libxml2-32bit-2.7.6-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199704" comment="libxml2-doc-2.7.6-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199705" comment="libxml2-x86-2.7.6-0.23 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2417</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-2417" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2417" source="CVE"/>
    <description>
    lib/ssluse.c in cURL and libcurl 7.4 through 7.19.5, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-2417.html">CVE-2009-2417</cve>
<bugzilla href="https://bugzilla.suse.com/527990">SUSE bug 527990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/528372">SUSE bug 528372</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199391" comment="curl-7.19.7-1.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199392" comment="libcurl4-7.19.7-1.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199393" comment="libcurl4-32bit-7.19.7-1.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199394" comment="libcurl4-x86-7.19.7-1.26 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2446</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-2446" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2446" source="CVE"/>
    <description>
    Multiple format string vulnerabilities in the dispatch_command function in libmysqld/sql_parse.cc in mysqld in MySQL 4.0.0 through 5.0.83 allow remote authenticated users to cause a denial of service (daemon crash) and possibly have unspecified other impact via format string specifiers in a database name in a (1) COM_CREATE_DB or (2) COM_DROP_DB request.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-2446.html">CVE-2009-2446</cve>
<bugzilla href="https://bugzilla.suse.com/520608">SUSE bug 520608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/604528">SUSE bug 604528</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199635" comment="mysql-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199636" comment="mysql-client-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199637" comment="mysql-tools-5.5.31-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2470</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-2470" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2470" source="CVE"/>
    <description>
    Mozilla Firefox before 3.0.12, and 3.5.x before 3.5.2, allows remote SOCKS5 proxy servers to cause a denial of service (data stream corruption) via a long domain name in a reply.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-2470.html">CVE-2009-2470</cve>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2473</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-2473" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2473" source="CVE"/>
    <description>
    neon before 0.28.6, when expat is used, does not properly detect recursion during entity expansion, which allows context-dependent attackers to cause a denial of service (memory and CPU consumption) via a crafted XML document containing a large number of nested entity references, a similar issue to CVE-2003-1564.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-2473.html">CVE-2009-2473</cve>
<bugzilla href="https://bugzilla.suse.com/528370">SUSE bug 528370</bugzilla>
<bugzilla href="https://bugzilla.suse.com/532345">SUSE bug 532345</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199031" comment="libneon27-0.29.6-6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199032" comment="libneon27-32bit-0.29.6-6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199033" comment="libneon27-x86-0.29.6-6.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2474</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-2474" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2474" source="CVE"/>
    <description>
    neon before 0.28.6, when OpenSSL or GnuTLS is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-2474.html">CVE-2009-2474</cve>
<bugzilla href="https://bugzilla.suse.com/528370">SUSE bug 528370</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199031" comment="libneon27-0.29.6-6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199032" comment="libneon27-32bit-0.29.6-6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199033" comment="libneon27-x86-0.29.6-6.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2560</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-2560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2560" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Wireshark 1.2.0 allow remote attackers to cause a denial of service (application crash) via a file that records a malformed packet trace and is processed by the (1) Bluetooth L2CAP, (2) RADIUS, or (3) MIOP dissector. NOTE: it was later reported that the RADIUS issue also affects 0.10.13 through 1.0.9.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-2560.html">CVE-2009-2560</cve>
<bugzilla href="https://bugzilla.suse.com/523718">SUSE bug 523718</bugzilla>
<bugzilla href="https://bugzilla.suse.com/550320">SUSE bug 550320</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2562</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-2562" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2562" source="CVE"/>
    <description>
    Unspecified vulnerability in the AFS dissector in Wireshark 0.9.2 through 1.2.0 allows remote attackers to cause a denial of service (crash) via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-2562.html">CVE-2009-2562</cve>
<bugzilla href="https://bugzilla.suse.com/523718">SUSE bug 523718</bugzilla>
<bugzilla href="https://bugzilla.suse.com/540174">SUSE bug 540174</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2624</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-2624" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2624" source="CVE"/>
    <description>
    The huft_build function in inflate.c in gzip before 1.3.13 creates a hufts (aka huffman) table that is too small, which allows remote attackers to cause a denial of service (application crash or infinite loop) or possibly execute arbitrary code via a crafted archive.  NOTE: this issue is caused by a CVE-2006-4334 regression.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-2624.html">CVE-2009-2624</cve>
<bugzilla href="https://bugzilla.suse.com/570331">SUSE bug 570331</bugzilla>
<bugzilla href="https://bugzilla.suse.com/588113">SUSE bug 588113</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199494" comment="gzip-1.3.12-69.23 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2625</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-2625" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2625" source="CVE"/>
    <description>
    XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-2625.html">CVE-2009-2625</cve>
<bugzilla href="https://bugzilla.suse.com/525562">SUSE bug 525562</bugzilla>
<bugzilla href="https://bugzilla.suse.com/530717">SUSE bug 530717</bugzilla>
<bugzilla href="https://bugzilla.suse.com/534025">SUSE bug 534025</bugzilla>
<bugzilla href="https://bugzilla.suse.com/534721">SUSE bug 534721</bugzilla>
<bugzilla href="https://bugzilla.suse.com/537969">SUSE bug 537969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/540945">SUSE bug 540945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/548655">SUSE bug 548655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/550664">SUSE bug 550664</bugzilla>
<bugzilla href="https://bugzilla.suse.com/553220">SUSE bug 553220</bugzilla>
<bugzilla href="https://bugzilla.suse.com/558892">SUSE bug 558892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/581162">SUSE bug 581162</bugzilla>
<bugzilla href="https://bugzilla.suse.com/581765">SUSE bug 581765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/610080">SUSE bug 610080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/611931">SUSE bug 611931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/611932">SUSE bug 611932</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199418" comment="expat-2.0.1-88.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199419" comment="libexpat1-2.0.1-88.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199420" comment="libexpat1-32bit-2.0.1-88.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199421" comment="libexpat1-x86-2.0.1-88.34 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2654</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-2654" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2654" source="CVE"/>
    <description>
    Mozilla Firefox before 3.0.13, and 3.5.x before 3.5.2, allows remote attackers to spoof the address bar, and possibly conduct phishing attacks, via a crafted web page that calls window.open with an invalid character in the URL, makes document.write calls to the resulting object, and then calls the stop method during the loading of the error page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-2654.html">CVE-2009-2654</cve>
<bugzilla href="https://bugzilla.suse.com/527489">SUSE bug 527489</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2663</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-2663" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2663" source="CVE"/>
    <description>
    libvorbis before r16182, as used in Mozilla Firefox 3.5.x before 3.5.2 and other products, allows context-dependent attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted .ogg file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-2663.html">CVE-2009-2663</cve>
<bugzilla href="https://bugzilla.suse.com/527489">SUSE bug 527489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/608192">SUSE bug 608192</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199698" comment="libvorbis-1.2.0-79.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199699" comment="libvorbis-32bit-1.2.0-79.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199700" comment="libvorbis-doc-1.2.0-79.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199701" comment="libvorbis-x86-1.2.0-79.20 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2666</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-2666" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2666" source="CVE"/>
    <description>
    socket.c in fetchmail before 6.3.11 does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-2666.html">CVE-2009-2666</cve>
<bugzilla href="https://bugzilla.suse.com/528746">SUSE bug 528746</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198828" comment="fetchmail-6.3.8.90-13.20.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198829" comment="fetchmailconf-6.3.8.90-13.20.19 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2693</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-2693" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2693" source="CVE"/>
    <description>
    Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to create or overwrite arbitrary files via a .. (dot dot) in an entry in a WAR file, as demonstrated by a ../../bin/catalina.bat entry.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-2693.html">CVE-2009-2693</cve>
<bugzilla href="https://bugzilla.suse.com/575083">SUSE bug 575083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199802" comment="tomcat6-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199803" comment="tomcat6-admin-webapps-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199804" comment="tomcat6-docs-webapp-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199805" comment="tomcat6-javadoc-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199806" comment="tomcat6-jsp-2_1-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199807" comment="tomcat6-lib-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199808" comment="tomcat6-servlet-2_5-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199809" comment="tomcat6-webapps-6.0.18-20.35.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2699</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2009-2699" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2699" source="CVE"/>
    <description>
    The Solaris pollset feature in the Event Port backend in poll/unix/port.c in the Apache Portable Runtime (APR) library before 1.3.9, as used in the Apache HTTP Server before 2.2.14 and other products, does not properly handle errors, which allows remote attackers to cause a denial of service (daemon hang) via unspecified HTTP requests, related to the prefork and event MPMs.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-2699.html">CVE-2009-2699</cve>
<bugzilla href="https://bugzilla.suse.com/1078450">SUSE bug 1078450</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1095150">SUSE bug 1095150</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202407" comment="apache2-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202408" comment="apache2-devel-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202409" comment="apache2-doc-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202410" comment="apache2-example-pages-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202411" comment="apache2-prefork-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202412" comment="apache2-utils-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202413" comment="apache2-worker-2.2.34-70.12 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202407" comment="apache2-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202409" comment="apache2-doc-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202410" comment="apache2-example-pages-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202411" comment="apache2-prefork-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202412" comment="apache2-utils-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202413" comment="apache2-worker-2.2.34-70.12 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2730</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-2730" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2730" source="CVE"/>
    <description>
    libgnutls in GnuTLS before 2.8.2 does not properly handle a '\0' character in a domain name in the subject's (1) Common Name (CN) or (2) Subject Alternative Name (SAN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-2730.html">CVE-2009-2730</cve>
<bugzilla href="https://bugzilla.suse.com/392947">SUSE bug 392947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/528372">SUSE bug 528372</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199478" comment="gnutls-2.4.1-24.39.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199479" comment="libgnutls-extra26-2.4.1-24.39.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199480" comment="libgnutls26-2.4.1-24.39.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199481" comment="libgnutls26-32bit-2.4.1-24.39.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199482" comment="libgnutls26-x86-2.4.1-24.39.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2813</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-2813" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2813" source="CVE"/>
    <description>
    Samba 3.4 before 3.4.2, 3.3 before 3.3.8, 3.2 before 3.2.15, and 3.0.12 through 3.0.36, as used in the SMB subsystem in Apple Mac OS X 10.5.8 when Windows File Sharing is enabled, Fedora 11, and other operating systems, does not properly handle errors in resolving pathnames, which allows remote authenticated users to bypass intended sharing restrictions, and read, create, or modify files, in certain circumstances involving user accounts that lack home directories.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-2813.html">CVE-2009-2813</cve>
<bugzilla href="https://bugzilla.suse.com/515479">SUSE bug 515479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/539517">SUSE bug 539517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/543115">SUSE bug 543115</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199376" comment="cifs-utils-5.1-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199555" comment="ldapsmb-1.34b-12.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199556" comment="libldb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199557" comment="libsmbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199558" comment="libsmbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199559" comment="libsmbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199560" comment="libtalloc2-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199561" comment="libtalloc2-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199562" comment="libtalloc2-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199563" comment="libtdb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199564" comment="libtdb1-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199565" comment="libtdb1-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199566" comment="libtevent0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199567" comment="libwbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199568" comment="libwbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199569" comment="libwbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199570" comment="samba-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199571" comment="samba-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199572" comment="samba-client-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199573" comment="samba-client-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199574" comment="samba-client-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199575" comment="samba-krb-printing-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199576" comment="samba-winbind-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199577" comment="samba-winbind-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199578" comment="samba-winbind-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199579" comment="samba-x86-3.6.3-0.39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2820</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-2820" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2820" source="CVE"/>
    <description>
    The web interface in CUPS before 1.4.2, as used on Apple Mac OS X before 10.6.2 and other platforms, does not properly handle (1) HTTP headers and (2) HTML templates, which allows remote attackers to conduct cross-site scripting (XSS) attacks and HTTP response splitting attacks via vectors related to (a) the product's web interface, (b) the configuration of the print system, and (c) the titles of printed jobs, as demonstrated by an XSS attack that uses the kerberos parameter to the admin program, and leverages attribute injection and HTTP Parameter Pollution (HPP) issues.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-2820.html">CVE-2009-2820</cve>
<bugzilla href="https://bugzilla.suse.com/548317">SUSE bug 548317</bugzilla>
<bugzilla href="https://bugzilla.suse.com/551563">SUSE bug 551563</bugzilla>
<bugzilla href="https://bugzilla.suse.com/574336">SUSE bug 574336</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199386" comment="cups-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199387" comment="cups-client-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199388" comment="cups-libs-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199389" comment="cups-libs-32bit-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199390" comment="cups-libs-x86-1.3.9-8.46.46 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2855</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-2855" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2855" source="CVE"/>
    <description>
    The strListGetItem function in src/HttpHeaderTools.c in Squid 2.7 allows remote attackers to cause a denial of service via a crafted auth header with certain comma delimiters that trigger an infinite loop of calls to the strcspn function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-2855.html">CVE-2009-2855</cve>
<bugzilla href="https://bugzilla.suse.com/525774">SUSE bug 525774</bugzilla>
<bugzilla href="https://bugzilla.suse.com/577347">SUSE bug 577347</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199783" comment="squid-2.7.STABLE5-2.12.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2901</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-2901" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2901" source="CVE"/>
    <description>
    The autodeployment process in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20, when autoDeploy is enabled, deploys appBase files that remain from a failed undeploy, which might allow remote attackers to bypass intended authentication requirements via HTTP requests.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-2901.html">CVE-2009-2901</cve>
<bugzilla href="https://bugzilla.suse.com/575083">SUSE bug 575083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199802" comment="tomcat6-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199803" comment="tomcat6-admin-webapps-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199804" comment="tomcat6-docs-webapp-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199805" comment="tomcat6-javadoc-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199806" comment="tomcat6-jsp-2_1-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199807" comment="tomcat6-lib-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199808" comment="tomcat6-servlet-2_5-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199809" comment="tomcat6-webapps-6.0.18-20.35.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2902</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-2902" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2902" source="CVE"/>
    <description>
    Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to delete work-directory files via directory traversal sequences in a WAR filename, as demonstrated by the ...war filename.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-2902.html">CVE-2009-2902</cve>
<bugzilla href="https://bugzilla.suse.com/575083">SUSE bug 575083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199802" comment="tomcat6-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199803" comment="tomcat6-admin-webapps-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199804" comment="tomcat6-docs-webapp-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199805" comment="tomcat6-javadoc-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199806" comment="tomcat6-jsp-2_1-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199807" comment="tomcat6-lib-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199808" comment="tomcat6-servlet-2_5-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199809" comment="tomcat6-webapps-6.0.18-20.35.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2905</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-2905" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2905" source="CVE"/>
    <description>
    Heap-based buffer overflow in textbox.c in newt 0.51.5, 0.51.6, and 0.52.2 allows local users to cause a denial of service (application crash) or possibly execute arbitrary code via a request to display a crafted text dialog box.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-2905.html">CVE-2009-2905</cve>
<bugzilla href="https://bugzilla.suse.com/540930">SUSE bug 540930</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199034" comment="libnewt0_52-0.52.10-1.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199035" comment="newt-0.52.10-1.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199036" comment="python-newt-0.52.10-1.35 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2906</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-2906" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2906" source="CVE"/>
    <description>
    smbd in Samba 3.0 before 3.0.37, 3.2 before 3.2.15, 3.3 before 3.3.8, and 3.4 before 3.4.2 allows remote authenticated users to cause a denial of service (infinite loop) via an unanticipated oplock break notification reply packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-2906.html">CVE-2009-2906</cve>
<bugzilla href="https://bugzilla.suse.com/515479">SUSE bug 515479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/543115">SUSE bug 543115</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199376" comment="cifs-utils-5.1-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199555" comment="ldapsmb-1.34b-12.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199556" comment="libldb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199557" comment="libsmbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199558" comment="libsmbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199559" comment="libsmbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199560" comment="libtalloc2-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199561" comment="libtalloc2-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199562" comment="libtalloc2-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199563" comment="libtdb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199564" comment="libtdb1-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199565" comment="libtdb1-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199566" comment="libtevent0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199567" comment="libwbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199568" comment="libwbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199569" comment="libwbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199570" comment="samba-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199571" comment="samba-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199572" comment="samba-client-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199573" comment="samba-client-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199574" comment="samba-client-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199575" comment="samba-krb-printing-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199576" comment="samba-winbind-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199577" comment="samba-winbind-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199578" comment="samba-winbind-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199579" comment="samba-x86-3.6.3-0.39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2911</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-2911" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2911" source="CVE"/>
    <description>
    SystemTap 1.0, when the --unprivileged option is used, does not properly restrict certain data sizes, which allows local users to (1) cause a denial of service or gain privileges via a print operation with a large number of arguments that trigger a kernel stack overflow, (2) cause a denial of service via crafted DWARF expressions that trigger a kernel stack frame overflow, or (3) cause a denial of service (infinite loop) via vectors that trigger creation of large unwind tables, related to Common Information Entry (CIE) and Call Frame Instruction (CFI) records.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-2911.html">CVE-2009-2911</cve>
<bugzilla href="https://bugzilla.suse.com/548361">SUSE bug 548361</bugzilla>
<bugzilla href="https://bugzilla.suse.com/574243">SUSE bug 574243</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199794" comment="systemtap-1.5-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199795" comment="systemtap-server-1.5-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2948</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-2948" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2948" source="CVE"/>
    <description>
    mount.cifs in Samba 3.0 before 3.0.37, 3.2 before 3.2.15, 3.3 before 3.3.8 and 3.4 before 3.4.2, when mount.cifs is installed suid root, does not properly enforce permissions, which allows local users to read part of the credentials file and obtain the password by specifying the path to the credentials file and using the --verbose or -v option.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-2948.html">CVE-2009-2948</cve>
<bugzilla href="https://bugzilla.suse.com/515479">SUSE bug 515479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/542150">SUSE bug 542150</bugzilla>
<bugzilla href="https://bugzilla.suse.com/543115">SUSE bug 543115</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199376" comment="cifs-utils-5.1-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199555" comment="ldapsmb-1.34b-12.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199556" comment="libldb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199557" comment="libsmbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199558" comment="libsmbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199559" comment="libsmbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199560" comment="libtalloc2-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199561" comment="libtalloc2-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199562" comment="libtalloc2-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199563" comment="libtdb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199564" comment="libtdb1-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199565" comment="libtdb1-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199566" comment="libtevent0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199567" comment="libwbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199568" comment="libwbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199569" comment="libwbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199570" comment="samba-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199571" comment="samba-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199572" comment="samba-client-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199573" comment="samba-client-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199574" comment="samba-client-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199575" comment="samba-krb-printing-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199576" comment="samba-winbind-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199577" comment="samba-winbind-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199578" comment="samba-winbind-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199579" comment="samba-x86-3.6.3-0.39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3069</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3069" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3069" source="CVE"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.3 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3069.html">CVE-2009-3069</cve>
<bugzilla href="https://bugzilla.suse.com/534458">SUSE bug 534458</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3070</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3070" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3070" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3070.html">CVE-2009-3070</cve>
<bugzilla href="https://bugzilla.suse.com/534458">SUSE bug 534458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/538290">SUSE bug 538290</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3071</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3071" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3071" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.14, and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3071.html">CVE-2009-3071</cve>
<bugzilla href="https://bugzilla.suse.com/534458">SUSE bug 534458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/538290">SUSE bug 538290</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3072</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3072" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3072" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.14 and 3.5.x before 3.5.3, Thunderbird before 2.0.0.24, and SeaMonkey before 1.1.19 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the BinHex decoder in netwerk/streamconv/converters/nsBinHexDecoder.cpp, and unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3072.html">CVE-2009-3072</cve>
<bugzilla href="https://bugzilla.suse.com/534458">SUSE bug 534458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/538290">SUSE bug 538290</bugzilla>
<bugzilla href="https://bugzilla.suse.com/590499">SUSE bug 590499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/607935">SUSE bug 607935</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3073</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3073" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3073" source="CVE"/>
    <description>
    Unspecified vulnerability in the JavaScript engine in Mozilla Firefox 3.5.x before 3.5.3 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3073.html">CVE-2009-3073</cve>
<bugzilla href="https://bugzilla.suse.com/534458">SUSE bug 534458</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3074</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3074" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3074" source="CVE"/>
    <description>
    Unspecified vulnerability in the JavaScript engine in Mozilla Firefox before 3.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3074.html">CVE-2009-3074</cve>
<bugzilla href="https://bugzilla.suse.com/538290">SUSE bug 538290</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3075</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3075" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3075" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox before 3.0.14 and 3.5.x before 3.5.2, Thunderbird before 2.0.0.24, and SeaMonkey before 1.1.19 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to use of mutable strings in the js_StringReplaceHelper function in js/src/jsstr.cpp, and unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3075.html">CVE-2009-3075</cve>
<bugzilla href="https://bugzilla.suse.com/534458">SUSE bug 534458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/538290">SUSE bug 538290</bugzilla>
<bugzilla href="https://bugzilla.suse.com/590499">SUSE bug 590499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/607935">SUSE bug 607935</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3077</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3077" source="CVE"/>
    <description>
    Mozilla Firefox before 3.0.14, and 3.5.x before 3.5.3, does not properly manage pointers for the columns (aka TreeColumns) of a XUL tree element, which allows remote attackers to execute arbitrary code via a crafted HTML document, related to a "dangling pointer vulnerability."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3077.html">CVE-2009-3077</cve>
<bugzilla href="https://bugzilla.suse.com/534458">SUSE bug 534458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/538290">SUSE bug 538290</bugzilla>
<bugzilla href="https://bugzilla.suse.com/590499">SUSE bug 590499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/607935">SUSE bug 607935</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3078</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3078" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3078" source="CVE"/>
    <description>
    Visual truncation vulnerability in Mozilla Firefox before 3.0.14, and 3.5.x before 3.5.3, allows remote attackers to trigger a vertical scroll and spoof URLs via unspecified Unicode characters with a tall line-height property.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3078.html">CVE-2009-3078</cve>
<bugzilla href="https://bugzilla.suse.com/534458">SUSE bug 534458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/538290">SUSE bug 538290</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3079</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3079" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3079" source="CVE"/>
    <description>
    Unspecified vulnerability in Mozilla Firefox before 3.0.14, and 3.5.x before 3.5.3, allows remote attackers to execute arbitrary JavaScript with chrome privileges via vectors involving an object, the FeedWriter, and the BrowserFeedWriter.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3079.html">CVE-2009-3079</cve>
<bugzilla href="https://bugzilla.suse.com/534458">SUSE bug 534458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/538290">SUSE bug 538290</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3094</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3094" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3094" source="CVE"/>
    <description>
    The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3094.html">CVE-2009-3094</cve>
<bugzilla href="https://bugzilla.suse.com/538322">SUSE bug 538322</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199288" comment="apache2-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199289" comment="apache2-doc-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199290" comment="apache2-example-pages-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199291" comment="apache2-prefork-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199292" comment="apache2-utils-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199293" comment="apache2-worker-2.2.12-1.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3095</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3095" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3095" source="CVE"/>
    <description>
    The mod_proxy_ftp module in the Apache HTTP Server allows remote attackers to bypass intended access restrictions and send arbitrary commands to an FTP server via vectors related to the embedding of these commands in the Authorization HTTP header, as demonstrated by a certain module in VulnDisco Pack Professional 8.11.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3095.html">CVE-2009-3095</cve>
<bugzilla href="https://bugzilla.suse.com/538322">SUSE bug 538322</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199288" comment="apache2-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199289" comment="apache2-doc-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199290" comment="apache2-example-pages-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199291" comment="apache2-prefork-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199292" comment="apache2-utils-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199293" comment="apache2-worker-2.2.12-1.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3235</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3235" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3235" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in the Sieve plugin in Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, as derived from Cyrus libsieve, allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted SIEVE script, as demonstrated by forwarding an e-mail message to a large number of recipients, a different vulnerability than CVE-2009-2632.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3235.html">CVE-2009-3235</cve>
<bugzilla href="https://bugzilla.suse.com/539876">SUSE bug 539876</bugzilla>
<bugzilla href="https://bugzilla.suse.com/539877">SUSE bug 539877</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198790" comment="cyrus-imapd-2.3.11-60.65.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198791" comment="perl-Cyrus-IMAP-2.3.11-60.65.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198792" comment="perl-Cyrus-SIEVE-managesieve-2.3.11-60.65.64 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3245</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3245" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3245" source="CVE"/>
    <description>
    OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which has unspecified impact and context-dependent attack vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3245.html">CVE-2009-3245</cve>
<bugzilla href="https://bugzilla.suse.com/587379">SUSE bug 587379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/590833">SUSE bug 590833</bugzilla>
<bugzilla href="https://bugzilla.suse.com/593560">SUSE bug 593560</bugzilla>
<bugzilla href="https://bugzilla.suse.com/629905">SUSE bug 629905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/641950">SUSE bug 641950</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199638" comment="libopenssl0_9_8-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199639" comment="libopenssl0_9_8-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199640" comment="libopenssl0_9_8-hmac-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199641" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199642" comment="libopenssl0_9_8-x86-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199643" comment="openssl-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199644" comment="openssl-doc-0.9.8j-0.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3274</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3274" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3274" source="CVE"/>
    <description>
    Mozilla Firefox 3.6a1, 3.5.3, 3.5.2, and earlier 3.5.x versions, and 3.0.14 and earlier 2.x and 3.x versions, on Linux uses a predictable /tmp pathname for files selected from the Downloads window, which allows local users to replace an arbitrary downloaded file by placing a file in a /tmp location before the download occurs, related to the Download Manager component. NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3274.html">CVE-2009-3274</cve>
<bugzilla href="https://bugzilla.suse.com/522109">SUSE bug 522109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/534458">SUSE bug 534458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/545277">SUSE bug 545277</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3297</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3297" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3297" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2010-0787, CVE-2010-0788, CVE-2010-0789.  Reason: this candidate was intended for one issue in Samba, but it was used for multiple distinct issues, including one in FUSE and one in ncpfs.  Notes: All CVE users should consult CVE-2010-0787 (Samba), CVE-2010-0788 (ncpfs), and CVE-2010-0789 (FUSE) to determine which ID is appropriate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3297.html">CVE-2009-3297</cve>
<bugzilla href="https://bugzilla.suse.com/550002">SUSE bug 550002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/550003">SUSE bug 550003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/550004">SUSE bug 550004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/577925">SUSE bug 577925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/583535">SUSE bug 583535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/583536">SUSE bug 583536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/594263">SUSE bug 594263</bugzilla>
<bugzilla href="https://bugzilla.suse.com/620680">SUSE bug 620680</bugzilla>
<bugzilla href="https://bugzilla.suse.com/651598">SUSE bug 651598</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199434" comment="fuse-2.8.7-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199435" comment="libfuse2-2.8.7-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3370</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3370" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3370" source="CVE"/>
    <description>
    Mozilla Firefox before 3.0.15, and 3.5.x before 3.5.4, allows remote attackers to read form history by forging mouse and keyboard events that leverage the auto-fill feature to populate form fields, in an attacker-readable form, with history entries.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3370.html">CVE-2009-3370</cve>
<bugzilla href="https://bugzilla.suse.com/522109">SUSE bug 522109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/545277">SUSE bug 545277</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3371</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3371" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3371" source="CVE"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox 3.5.x before 3.5.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code by creating JavaScript web-workers recursively.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3371.html">CVE-2009-3371</cve>
<bugzilla href="https://bugzilla.suse.com/522109">SUSE bug 522109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/545277">SUSE bug 545277</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3372</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3372" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3372" source="CVE"/>
    <description>
    Mozilla Firefox before 3.0.15 and 3.5.x before 3.5.4, and SeaMonkey before 2.0, allows remote attackers to execute arbitrary code via a crafted regular expression in a Proxy Auto-configuration (PAC) file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3372.html">CVE-2009-3372</cve>
<bugzilla href="https://bugzilla.suse.com/522109">SUSE bug 522109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/545277">SUSE bug 545277</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3373</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3373" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3373" source="CVE"/>
    <description>
    Heap-based buffer overflow in the GIF image parser in Mozilla Firefox before 3.0.15 and 3.5.x before 3.5.4, and SeaMonkey before 2.0, allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3373.html">CVE-2009-3373</cve>
<bugzilla href="https://bugzilla.suse.com/522109">SUSE bug 522109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/545277">SUSE bug 545277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/557686">SUSE bug 557686</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3374</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3374" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3374" source="CVE"/>
    <description>
    The XPCVariant::VariantDataToJS function in the XPCOM implementation in Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4 does not enforce intended restrictions on interaction between chrome privileged code and objects obtained from remote web sites, which allows remote attackers to execute arbitrary JavaScript with chrome privileges via unspecified method calls, related to "doubly-wrapped objects."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3374.html">CVE-2009-3374</cve>
<bugzilla href="https://bugzilla.suse.com/522109">SUSE bug 522109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/545277">SUSE bug 545277</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3375</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3375" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3375" source="CVE"/>
    <description>
    content/html/document/src/nsHTMLDocument.cpp in Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4 allows user-assisted remote attackers to bypass the Same Origin Policy and read an arbitrary content selection via the document.getSelection function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3375.html">CVE-2009-3375</cve>
<bugzilla href="https://bugzilla.suse.com/522109">SUSE bug 522109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/545277">SUSE bug 545277</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3376</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3376" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3376" source="CVE"/>
    <description>
    Mozilla Firefox before 3.0.15 and 3.5.x before 3.5.4, and SeaMonkey before 2.0, does not properly handle a right-to-left override (aka RLO or U+202E) Unicode character in a download filename, which allows remote attackers to spoof file extensions via a crafted filename, as demonstrated by displaying a non-executable extension for an executable file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3376.html">CVE-2009-3376</cve>
<bugzilla href="https://bugzilla.suse.com/522109">SUSE bug 522109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/545277">SUSE bug 545277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/590499">SUSE bug 590499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/607935">SUSE bug 607935</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3377</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3377" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3377" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in liboggz before cf5feeaab69b05e24, as used in Mozilla Firefox 3.5.x before 3.5.4, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3377.html">CVE-2009-3377</cve>
<bugzilla href="https://bugzilla.suse.com/522109">SUSE bug 522109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/545277">SUSE bug 545277</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3378</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3378" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3378" source="CVE"/>
    <description>
    The oggplay_data_handle_theora_frame function in media/liboggplay/src/liboggplay/oggplay_data.c in liboggplay, as used in Mozilla Firefox 3.5.x before 3.5.4, attempts to reuse an earlier frame data structure upon encountering a decoding error for the first frame, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly execute arbitrary code via a crafted .ogg video file.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3378.html">CVE-2009-3378</cve>
<bugzilla href="https://bugzilla.suse.com/522109">SUSE bug 522109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/545277">SUSE bug 545277</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3379</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3379" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3379" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in libvorbis, as used in Mozilla Firefox 3.5.x before 3.5.4, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors.  NOTE: this might overlap CVE-2009-2663.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3379.html">CVE-2009-3379</cve>
<bugzilla href="https://bugzilla.suse.com/522109">SUSE bug 522109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/545277">SUSE bug 545277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/608192">SUSE bug 608192</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199698" comment="libvorbis-1.2.0-79.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199699" comment="libvorbis-32bit-1.2.0-79.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199700" comment="libvorbis-doc-1.2.0-79.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199701" comment="libvorbis-x86-1.2.0-79.20 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3380</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3380" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3380" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3380.html">CVE-2009-3380</cve>
<bugzilla href="https://bugzilla.suse.com/522109">SUSE bug 522109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/545277">SUSE bug 545277</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3381</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3381" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3381" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3381.html">CVE-2009-3381</cve>
<bugzilla href="https://bugzilla.suse.com/522109">SUSE bug 522109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/545277">SUSE bug 545277</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3383</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3383" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3383" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox 3.5.x before 3.5.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3383.html">CVE-2009-3383</cve>
<bugzilla href="https://bugzilla.suse.com/522109">SUSE bug 522109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/545277">SUSE bug 545277</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3388</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3388" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3388" source="CVE"/>
    <description>
    liboggplay in Mozilla Firefox 3.5.x before 3.5.6 and SeaMonkey before 2.0.1 might allow context-dependent attackers to cause a denial of service (application crash) or execute arbitrary code via unspecified vectors, related to "memory safety issues."
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3388.html">CVE-2009-3388</cve>
<bugzilla href="https://bugzilla.suse.com/559807">SUSE bug 559807</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3389</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3389" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3389" source="CVE"/>
    <description>
    Integer overflow in libtheora in Xiph.Org Theora before 1.1, as used in Mozilla Firefox 3.5 before 3.5.6 and SeaMonkey before 2.0.1, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a video with large dimensions.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3389.html">CVE-2009-3389</cve>
<bugzilla href="https://bugzilla.suse.com/559807">SUSE bug 559807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/581722">SUSE bug 581722</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3549</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3549" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3549" source="CVE"/>
    <description>
    packet-paltalk.c in the Paltalk dissector in Wireshark 1.2.0 through 1.2.2, on SPARC and certain other platforms, allows remote attackers to cause a denial of service (application crash) via a file that records a malformed packet trace.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3549.html">CVE-2009-3549</cve>
<bugzilla href="https://bugzilla.suse.com/550320">SUSE bug 550320</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3550</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3550" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3550" source="CVE"/>
    <description>
    The DCERPC/NT dissector in Wireshark 0.10.10 through 1.0.9 and 1.2.0 through 1.2.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a file that records a malformed packet trace.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3550.html">CVE-2009-3550</cve>
<bugzilla href="https://bugzilla.suse.com/550320">SUSE bug 550320</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3553</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3553" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3553" source="CVE"/>
    <description>
    Use-after-free vulnerability in the abstract file-descriptor handling interface in the cupsdDoSelect function in scheduler/select.c in the scheduler in cupsd in CUPS 1.3.7 and 1.3.10 allows remote attackers to cause a denial of service (daemon crash or hang) via a client disconnection during listing of a large number of print jobs, related to improperly maintaining a reference count.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3553.html">CVE-2009-3553</cve>
<bugzilla href="https://bugzilla.suse.com/554861">SUSE bug 554861</bugzilla>
<bugzilla href="https://bugzilla.suse.com/574336">SUSE bug 574336</bugzilla>
<bugzilla href="https://bugzilla.suse.com/578215">SUSE bug 578215</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199386" comment="cups-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199387" comment="cups-client-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199388" comment="cups-libs-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199389" comment="cups-libs-32bit-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199390" comment="cups-libs-x86-1.3.9-8.46.46 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3555</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555" source="CVE"/>
    <description>
    The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3555.html">CVE-2009-3555</cve>
<bugzilla href="https://bugzilla.suse.com/1077582">SUSE bug 1077582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/459468">SUSE bug 459468</bugzilla>
<bugzilla href="https://bugzilla.suse.com/552497">SUSE bug 552497</bugzilla>
<bugzilla href="https://bugzilla.suse.com/553641">SUSE bug 553641</bugzilla>
<bugzilla href="https://bugzilla.suse.com/554069">SUSE bug 554069</bugzilla>
<bugzilla href="https://bugzilla.suse.com/554084">SUSE bug 554084</bugzilla>
<bugzilla href="https://bugzilla.suse.com/554085">SUSE bug 554085</bugzilla>
<bugzilla href="https://bugzilla.suse.com/555177">SUSE bug 555177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/557168">SUSE bug 557168</bugzilla>
<bugzilla href="https://bugzilla.suse.com/564507">SUSE bug 564507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/566041">SUSE bug 566041</bugzilla>
<bugzilla href="https://bugzilla.suse.com/584292">SUSE bug 584292</bugzilla>
<bugzilla href="https://bugzilla.suse.com/586567">SUSE bug 586567</bugzilla>
<bugzilla href="https://bugzilla.suse.com/586809">SUSE bug 586809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/588996">SUSE bug 588996</bugzilla>
<bugzilla href="https://bugzilla.suse.com/590826">SUSE bug 590826</bugzilla>
<bugzilla href="https://bugzilla.suse.com/592589">SUSE bug 592589</bugzilla>
<bugzilla href="https://bugzilla.suse.com/594415">SUSE bug 594415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/604782">SUSE bug 604782</bugzilla>
<bugzilla href="https://bugzilla.suse.com/614753">SUSE bug 614753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/622073">SUSE bug 622073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/623905">SUSE bug 623905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/629905">SUSE bug 629905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/642531">SUSE bug 642531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/646073">SUSE bug 646073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/646906">SUSE bug 646906</bugzilla>
<bugzilla href="https://bugzilla.suse.com/648140">SUSE bug 648140</bugzilla>
<bugzilla href="https://bugzilla.suse.com/648950">SUSE bug 648950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/659926">SUSE bug 659926</bugzilla>
<bugzilla href="https://bugzilla.suse.com/670152">SUSE bug 670152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/704832">SUSE bug 704832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/728876">SUSE bug 728876</bugzilla>
<bugzilla href="https://bugzilla.suse.com/729181">SUSE bug 729181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/753357">SUSE bug 753357</bugzilla>
<bugzilla href="https://bugzilla.suse.com/791794">SUSE bug 791794</bugzilla>
<bugzilla href="https://bugzilla.suse.com/799454">SUSE bug 799454</bugzilla>
<bugzilla href="https://bugzilla.suse.com/815621">SUSE bug 815621</bugzilla>
<bugzilla href="https://bugzilla.suse.com/979060">SUSE bug 979060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/986238">SUSE bug 986238</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199288" comment="apache2-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199289" comment="apache2-doc-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199290" comment="apache2-example-pages-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199291" comment="apache2-prefork-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199292" comment="apache2-utils-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199293" comment="apache2-worker-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199478" comment="gnutls-2.4.1-24.39.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199479" comment="libgnutls-extra26-2.4.1-24.39.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199480" comment="libgnutls26-2.4.1-24.39.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199481" comment="libgnutls26-32bit-2.4.1-24.39.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199482" comment="libgnutls26-x86-2.4.1-24.39.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199638" comment="libopenssl0_9_8-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199639" comment="libopenssl0_9_8-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199640" comment="libopenssl0_9_8-hmac-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199641" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199642" comment="libopenssl0_9_8-x86-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199643" comment="openssl-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199644" comment="openssl-doc-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199750" comment="postgresql-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199751" comment="postgresql-contrib-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199752" comment="postgresql-docs-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199753" comment="postgresql-server-8.3.23-0.4 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3560</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3560" source="CVE"/>
    <description>
    The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3560.html">CVE-2009-3560</cve>
<bugzilla href="https://bugzilla.suse.com/550666">SUSE bug 550666</bugzilla>
<bugzilla href="https://bugzilla.suse.com/558892">SUSE bug 558892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/561561">SUSE bug 561561</bugzilla>
<bugzilla href="https://bugzilla.suse.com/581162">SUSE bug 581162</bugzilla>
<bugzilla href="https://bugzilla.suse.com/581765">SUSE bug 581765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/611931">SUSE bug 611931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/694595">SUSE bug 694595</bugzilla>
<bugzilla href="https://bugzilla.suse.com/725950">SUSE bug 725950</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199418" comment="expat-2.0.1-88.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199419" comment="libexpat1-2.0.1-88.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199420" comment="libexpat1-32bit-2.0.1-88.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199421" comment="libexpat1-x86-2.0.1-88.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199659" comment="libpython2_6-1_0-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199660" comment="libpython2_6-1_0-32bit-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199661" comment="libpython2_6-1_0-x86-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199662" comment="python-base-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199663" comment="python-base-32bit-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199664" comment="python-base-x86-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199665" comment="python-xml-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198511" comment="pyxml-0.8.4-194.23 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3607</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3607" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3607" source="CVE"/>
    <description>
    Integer overflow in the create_surface_from_thumbnail_data function in glib/poppler-page.cc in Poppler 0.x allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3607.html">CVE-2009-3607</cve>
<bugzilla href="https://bugzilla.suse.com/546393">SUSE bug 546393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/566697">SUSE bug 566697</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199649" comment="libpoppler-glib4-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199650" comment="libpoppler-qt4-3-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199651" comment="libpoppler5-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199652" comment="poppler-tools-0.12.3-1.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3608</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3608" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3608" source="CVE"/>
    <description>
    Integer overflow in the ObjectStream::ObjectStream function in XRef.cc in Xpdf 3.x before 3.02pl4 and Poppler before 0.12.1, as used in GPdf, kdegraphics KPDF, CUPS pdftops, and teTeX, might allow remote attackers to execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3608.html">CVE-2009-3608</cve>
<bugzilla href="https://bugzilla.suse.com/543090">SUSE bug 543090</bugzilla>
<bugzilla href="https://bugzilla.suse.com/543410">SUSE bug 543410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/546400">SUSE bug 546400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/546404">SUSE bug 546404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/556049">SUSE bug 556049</bugzilla>
<bugzilla href="https://bugzilla.suse.com/566697">SUSE bug 566697</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199649" comment="libpoppler-glib4-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199650" comment="libpoppler-qt4-3-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199651" comment="libpoppler5-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199652" comment="poppler-tools-0.12.3-1.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3627</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3627" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3627" source="CVE"/>
    <description>
    The decode_entities function in util.c in HTML-Parser before 3.63 allows context-dependent attackers to cause a denial of service (infinite loop) via an incomplete SGML numeric character reference, which triggers generation of an invalid UTF-8 character.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3627.html">CVE-2009-3627</cve>
<bugzilla href="https://bugzilla.suse.com/550076">SUSE bug 550076</bugzilla>
<bugzilla href="https://bugzilla.suse.com/585716">SUSE bug 585716</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198595" comment="perl-HTML-Parser-3.56-1.18 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3700</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3700" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3700" source="CVE"/>
    <description>
    Buffer overflow in sgLog.c in squidGuard 1.3 and 1.4 allows remote attackers to cause a denial of service (application hang or loss of blocking functionality) via a long URL with many / (slash) characters, related to "emergency mode."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3700.html">CVE-2009-3700</cve>
<bugzilla href="https://bugzilla.suse.com/550930">SUSE bug 550930</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199218" comment="squidGuard-1.4-13.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199219" comment="squidGuard-doc-1.4-13.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3720</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3720" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3720" source="CVE"/>
    <description>
    The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3720.html">CVE-2009-3720</cve>
<bugzilla href="https://bugzilla.suse.com/534721">SUSE bug 534721</bugzilla>
<bugzilla href="https://bugzilla.suse.com/550664">SUSE bug 550664</bugzilla>
<bugzilla href="https://bugzilla.suse.com/550666">SUSE bug 550666</bugzilla>
<bugzilla href="https://bugzilla.suse.com/558892">SUSE bug 558892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/561561">SUSE bug 561561</bugzilla>
<bugzilla href="https://bugzilla.suse.com/581162">SUSE bug 581162</bugzilla>
<bugzilla href="https://bugzilla.suse.com/581765">SUSE bug 581765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/611931">SUSE bug 611931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/725950">SUSE bug 725950</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199659" comment="libpython2_6-1_0-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199660" comment="libpython2_6-1_0-32bit-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199661" comment="libpython2_6-1_0-x86-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199662" comment="python-base-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199663" comment="python-base-32bit-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199664" comment="python-base-x86-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199665" comment="python-xml-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198511" comment="pyxml-0.8.4-194.23 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3736</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3736" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3736" source="CVE"/>
    <description>
    ltdl.c in libltdl in GNU Libtool 1.5.x, and 2.2.6 before 2.2.6b, as used in Ham Radio Control Libraries, Q, and possibly other products, attempts to open a .la file in the current working directory, which allows local users to gain privileges via a Trojan horse file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3736.html">CVE-2009-3736</cve>
<bugzilla href="https://bugzilla.suse.com/556122">SUSE bug 556122</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198452" comment="libltdl7-2.2.6-2.131 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198453" comment="libltdl7-32bit-2.2.6-2.131 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198454" comment="libltdl7-x86-2.2.6-2.131 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198455" comment="libtool-2.2.6-2.131 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198456" comment="libtool-32bit-2.2.6-2.131 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198457" comment="libtool-x86-2.2.6-2.131 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3743</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3743" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3743" source="CVE"/>
    <description>
    Off-by-one error in the Ins_MINDEX function in the TrueType bytecode interpreter in Ghostscript before 8.71 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a malformed TrueType font in a document that trigger an integer overflow and a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3743.html">CVE-2009-3743</cve>
<bugzilla href="https://bugzilla.suse.com/635004">SUSE bug 635004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/774185">SUSE bug 774185</bugzilla>
<bugzilla href="https://bugzilla.suse.com/939342">SUSE bug 939342</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199436" comment="ghostscript-fonts-other-8.62-32.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199437" comment="ghostscript-fonts-rus-8.62-32.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199438" comment="ghostscript-fonts-std-8.62-32.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199439" comment="ghostscript-library-8.62-32.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199440" comment="ghostscript-omni-8.62-32.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199441" comment="ghostscript-x11-8.62-32.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199442" comment="libgimpprint-4.2.7-32.34 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3826</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3826" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3826" source="CVE"/>
    <description>
    Multiple buffer overflows in squidGuard 1.4 allow remote attackers to bypass intended URL blocking via a long URL, related to (1) the relationship between a certain buffer size in squidGuard and a certain buffer size in Squid and (2) a redirect URL that contains information about the originally requested URL.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3826.html">CVE-2009-3826</cve>
<bugzilla href="https://bugzilla.suse.com/550930">SUSE bug 550930</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199218" comment="squidGuard-1.4-13.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199219" comment="squidGuard-doc-1.4-13.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3829</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3829" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3829" source="CVE"/>
    <description>
    Integer overflow in wiretap/erf.c in Wireshark before 1.2.2 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted erf file, related to an "unsigned integer wrap vulnerability."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3829.html">CVE-2009-3829</cve>
<bugzilla href="https://bugzilla.suse.com/553215">SUSE bug 553215</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3939</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3939" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3939" source="CVE"/>
    <description>
    The poll_mode_io file for the megaraid_sas driver in the Linux kernel 2.6.31.6 and earlier has world-writable permissions, which allows local users to change the I/O mode of the driver by modifying this file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3939.html">CVE-2009-3939</cve>
<bugzilla href="https://bugzilla.suse.com/555173">SUSE bug 555173</bugzilla>
<bugzilla href="https://bugzilla.suse.com/557180">SUSE bug 557180</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3979</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3979" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3979" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, SeaMonkey before 2.0.1, and Thunderbird allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3979.html">CVE-2009-3979</cve>
<bugzilla href="https://bugzilla.suse.com/559807">SUSE bug 559807</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3980</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3980" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3980" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.6, SeaMonkey before 2.0.1, and Thunderbird allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3980.html">CVE-2009-3980</cve>
<bugzilla href="https://bugzilla.suse.com/559807">SUSE bug 559807</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3982</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3982" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3982" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox 3.5.x before 3.5.6, SeaMonkey before 2.0.1, and Thunderbird allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3982.html">CVE-2009-3982</cve>
<bugzilla href="https://bugzilla.suse.com/559807">SUSE bug 559807</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3983</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3983" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3983" source="CVE"/>
    <description>
    Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to send authenticated requests to arbitrary applications by replaying the NTLM credentials of a browser user.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3983.html">CVE-2009-3983</cve>
<bugzilla href="https://bugzilla.suse.com/559807">SUSE bug 559807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/590499">SUSE bug 590499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/607935">SUSE bug 607935</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3984</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3984" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3984" source="CVE"/>
    <description>
    Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to spoof an SSL indicator for an http URL or a file URL by setting document.location to an https URL corresponding to a site that responds with a No Content (aka 204) status code and an empty body.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3984.html">CVE-2009-3984</cve>
<bugzilla href="https://bugzilla.suse.com/559807">SUSE bug 559807</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3985</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3985" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3985" source="CVE"/>
    <description>
    Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to associate spoofed content with an invalid URL by setting document.location to this URL, and then writing arbitrary web script or HTML to the associated blank document, a related issue to CVE-2009-2654.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3985.html">CVE-2009-3985</cve>
<bugzilla href="https://bugzilla.suse.com/559807">SUSE bug 559807</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3988</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-3988" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3988" source="CVE"/>
    <description>
    Mozilla Firefox 3.0.x before 3.0.18 and 3.5.x before 3.5.8, and SeaMonkey before 2.0.3, does not properly restrict read access to object properties in showModalDialog, which allows remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via crafted dialogArguments values.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3988.html">CVE-2009-3988</cve>
<bugzilla href="https://bugzilla.suse.com/576969">SUSE bug 576969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/581160">SUSE bug 581160</bugzilla>
<bugzilla href="https://bugzilla.suse.com/584499">SUSE bug 584499</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4019</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-4019" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4019" source="CVE"/>
    <description>
    mysqld in MySQL 5.0.x before 5.0.88 and 5.1.x before 5.1.41 does not (1) properly handle errors during execution of certain SELECT statements with subqueries, and does not (2) preserve certain null_value flags during execution of statements that use the GeomFromWKB function, which allows remote authenticated users to cause a denial of service (daemon crash) via a crafted statement.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-4019.html">CVE-2009-4019</cve>
<bugzilla href="https://bugzilla.suse.com/557669">SUSE bug 557669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/604528">SUSE bug 604528</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199635" comment="mysql-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199636" comment="mysql-client-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199637" comment="mysql-tools-5.5.31-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4022</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-4022" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4022" source="CVE"/>
    <description>
    Unspecified vulnerability in ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P4, 9.5 before 9.5.2-P1, 9.6 before 9.6.1-P2, and 9.7 beta before 9.7.0b3, with DNSSEC validation enabled and checking disabled (CD), allows remote attackers to conduct DNS cache poisoning attacks by receiving a recursive client query and sending a response that contains an Additional section with crafted data, which is not properly handled when the response is processed "at the same time as requesting DNSSEC records (DO)," aka Bug 20438.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-4022.html">CVE-2009-4022</cve>
<bugzilla href="https://bugzilla.suse.com/558260">SUSE bug 558260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/570912">SUSE bug 570912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/644911">SUSE bug 644911</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199364" comment="bind-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199365" comment="bind-chrootenv-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199366" comment="bind-doc-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199367" comment="bind-libs-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199368" comment="bind-libs-32bit-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199369" comment="bind-libs-x86-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199370" comment="bind-utils-9.6ESVR7P4-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4026</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-4026" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4026" source="CVE"/>
    <description>
    The mac80211 subsystem in the Linux kernel before 2.6.32-rc8-next-20091201 allows remote attackers to cause a denial of service (panic) via a crafted Delete Block ACK (aka DELBA) packet, related to an erroneous "code shuffling patch."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-4026.html">CVE-2009-4026</cve>
<bugzilla href="https://bugzilla.suse.com/558267">SUSE bug 558267</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4027</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-4027" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4027" source="CVE"/>
    <description>
    Race condition in the mac80211 subsystem in the Linux kernel before 2.6.32-rc8-next-20091201 allows remote attackers to cause a denial of service (system crash) via a Delete Block ACK (aka DELBA) packet that triggers a certain state change in the absence of an aggregation session.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-4027.html">CVE-2009-4027</cve>
<bugzilla href="https://bugzilla.suse.com/558267">SUSE bug 558267</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4028</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-4028" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4028" source="CVE"/>
    <description>
    The vio_verify_callback function in viosslfactories.c in MySQL 5.0.x before 5.0.88 and 5.1.x before 5.1.41, when OpenSSL is used, accepts a value of zero for the depth of X.509 certificates, which allows man-in-the-middle attackers to spoof arbitrary SSL-based MySQL servers via a crafted certificate, as demonstrated by a certificate presented by a server linked against the yaSSL library.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-4028.html">CVE-2009-4028</cve>
<bugzilla href="https://bugzilla.suse.com/557669">SUSE bug 557669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/604528">SUSE bug 604528</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199635" comment="mysql-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199636" comment="mysql-client-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199637" comment="mysql-tools-5.5.31-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4030</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-4030" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4030" source="CVE"/>
    <description>
    MySQL 5.1.x before 5.1.41 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are originally associated with pathnames without symlinks, and that can point to tables created at a future time at which a pathname is modified to contain a symlink to a subdirectory of the MySQL data home directory, related to incorrect calculation of the mysql_unpacked_real_data_home value.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4098 and CVE-2008-2079.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-4030.html">CVE-2009-4030</cve>
<bugzilla href="https://bugzilla.suse.com/557669">SUSE bug 557669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/604528">SUSE bug 604528</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199635" comment="mysql-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199636" comment="mysql-client-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199637" comment="mysql-tools-5.5.31-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4034</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-4034" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4034" source="CVE"/>
    <description>
    PostgreSQL 7.4.x before 7.4.27, 8.0.x before 8.0.23, 8.1.x before 8.1.19, 8.2.x before 8.2.15, 8.3.x before 8.3.9, and 8.4.x before 8.4.2 does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which (1) allows man-in-the-middle attackers to spoof arbitrary SSL-based PostgreSQL servers via a crafted server certificate issued by a legitimate Certification Authority, and (2) allows remote attackers to bypass intended client-hostname restrictions via a crafted client certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-4034.html">CVE-2009-4034</cve>
<bugzilla href="https://bugzilla.suse.com/564710">SUSE bug 564710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/603968">SUSE bug 603968</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199606" comment="libecpg6-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199607" comment="libpq5-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199608" comment="libpq5-32bit-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199750" comment="postgresql-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199751" comment="postgresql-contrib-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199752" comment="postgresql-docs-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199753" comment="postgresql-server-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199609" comment="postgresql91-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199610" comment="postgresql91-contrib-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199611" comment="postgresql91-docs-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199612" comment="postgresql91-server-9.1.9-0.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4131</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-4131" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4131" source="CVE"/>
    <description>
    The EXT4_IOC_MOVE_EXT (aka move extents) ioctl implementation in the ext4 filesystem in the Linux kernel before 2.6.32-git6 allows local users to overwrite arbitrary files via a crafted request, related to insufficient checks for file permissions.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-4131.html">CVE-2009-4131</cve>
<bugzilla href="https://bugzilla.suse.com/561018">SUSE bug 561018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/564380">SUSE bug 564380</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4136</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-4136" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4136" source="CVE"/>
    <description>
    PostgreSQL 7.4.x before 7.4.27, 8.0.x before 8.0.23, 8.1.x before 8.1.19, 8.2.x before 8.2.15, 8.3.x before 8.3.9, and 8.4.x before 8.4.2 does not properly manage session-local state during execution of an index function by a database superuser, which allows remote authenticated users to gain privileges via a table with crafted index functions, as demonstrated by functions that modify (1) search_path or (2) a prepared statement, a related issue to CVE-2007-6600 and CVE-2009-3230.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-4136.html">CVE-2009-4136</cve>
<bugzilla href="https://bugzilla.suse.com/564360">SUSE bug 564360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/603969">SUSE bug 603969</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199606" comment="libecpg6-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199607" comment="libpq5-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199608" comment="libpq5-32bit-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199750" comment="postgresql-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199751" comment="postgresql-contrib-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199752" comment="postgresql-docs-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199753" comment="postgresql-server-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199609" comment="postgresql91-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199610" comment="postgresql91-contrib-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199611" comment="postgresql91-docs-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199612" comment="postgresql91-server-9.1.9-0.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4138</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-4138" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4138" source="CVE"/>
    <description>
    drivers/firewire/ohci.c in the Linux kernel before 2.6.32-git9, when packet-per-buffer mode is used, allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unknown other impact via an unspecified ioctl associated with receiving an ISO packet that contains zero in the payload-length field.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-4138.html">CVE-2009-4138</cve>
<bugzilla href="https://bugzilla.suse.com/564712">SUSE bug 564712</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4144</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-4144" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4144" source="CVE"/>
    <description>
    NetworkManager (NM) 0.7.2 does not ensure that the configured Certification Authority (CA) certificate file for a (1) WPA Enterprise or (2) 802.1x network remains present upon a connection attempt, which might allow remote attackers to obtain sensitive information or cause a denial of service (connectivity disruption) by spoofing the identity of a wireless network.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-4144.html">CVE-2009-4144</cve>
<bugzilla href="https://bugzilla.suse.com/565549">SUSE bug 565549</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198654" comment="NetworkManager-gnome-0.7.1-5.22 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4145</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-4145" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4145" source="CVE"/>
    <description>
    nm-connection-editor in NetworkManager (NM) 0.7.x exports connection objects over D-Bus upon actions in the connection editor GUI, which allows local users to obtain sensitive information by reading D-Bus signals, as demonstrated by using dbus-monitor to discover the password for the WiFi network.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-4145.html">CVE-2009-4145</cve>
<bugzilla href="https://bugzilla.suse.com/565549">SUSE bug 565549</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198654" comment="NetworkManager-gnome-0.7.1-5.22 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4212</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-4212" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4212" source="CVE"/>
    <description>
    Multiple integer underflows in the (1) AES and (2) RC4 decryption functionality in the crypto library in MIT Kerberos 5 (aka krb5) 1.3 through 1.6.3, and 1.7 before 1.7.1, allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code by providing ciphertext with a length that is too short to be valid.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-4212.html">CVE-2009-4212</cve>
<bugzilla href="https://bugzilla.suse.com/561351">SUSE bug 561351</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199544" comment="krb5-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199545" comment="krb5-32bit-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199546" comment="krb5-apps-clients-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199547" comment="krb5-apps-servers-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199548" comment="krb5-client-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199549" comment="krb5-server-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199550" comment="krb5-x86-1.6.3-133.49.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4273</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-4273" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4273" source="CVE"/>
    <description>
    stap-server in SystemTap before 1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in stap command-line arguments in a request.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-4273.html">CVE-2009-4273</cve>
<bugzilla href="https://bugzilla.suse.com/574243">SUSE bug 574243</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199794" comment="systemtap-1.5-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199795" comment="systemtap-server-1.5-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4274</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-4274" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4274" source="CVE"/>
    <description>
    Stack-based buffer overflow in converter/ppm/xpmtoppm.c in netpbm before 10.47.07 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an XPM image file that contains a crafted header field associated with a large color index value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-4274.html">CVE-2009-4274</cve>
<bugzilla href="https://bugzilla.suse.com/579903">SUSE bug 579903</bugzilla>
<bugzilla href="https://bugzilla.suse.com/588439">SUSE bug 588439</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198470" comment="libnetpbm10-10.26.44-101.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198471" comment="libnetpbm10-32bit-10.26.44-101.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198472" comment="libnetpbm10-x86-10.26.44-101.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198473" comment="netpbm-10.26.44-101.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4355</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-4355" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4355" source="CVE"/>
    <description>
    Memory leak in the zlib_stateful_finish function in crypto/comp/c_zlib.c in OpenSSL 0.9.8l and earlier and 1.0.0 Beta through Beta 4 allows remote attackers to cause a denial of service (memory consumption) via vectors that trigger incorrect calls to the CRYPTO_cleanup_all_ex_data function, as demonstrated by use of SSLv3 and PHP with the Apache HTTP Server, a related issue to CVE-2008-1678.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-4355.html">CVE-2009-4355</cve>
<bugzilla href="https://bugzilla.suse.com/459468">SUSE bug 459468</bugzilla>
<bugzilla href="https://bugzilla.suse.com/552497">SUSE bug 552497</bugzilla>
<bugzilla href="https://bugzilla.suse.com/566238">SUSE bug 566238</bugzilla>
<bugzilla href="https://bugzilla.suse.com/629905">SUSE bug 629905</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199638" comment="libopenssl0_9_8-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199639" comment="libopenssl0_9_8-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199640" comment="libopenssl0_9_8-hmac-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199641" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199642" comment="libopenssl0_9_8-x86-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199643" comment="openssl-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199644" comment="openssl-doc-0.9.8j-0.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4377</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-4377" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4377" source="CVE"/>
    <description>
    The (1) SMB and (2) SMB2 dissectors in Wireshark 0.9.0 through 1.2.4 allow remote attackers to cause a denial of service (crash) via a crafted packet that triggers a NULL pointer dereference, as demonstrated by fuzz-2009-12-07-11141.pcap.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-4377.html">CVE-2009-4377</cve>
<bugzilla href="https://bugzilla.suse.com/565902">SUSE bug 565902</bugzilla>
<bugzilla href="https://bugzilla.suse.com/590352">SUSE bug 590352</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-4484" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4484" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in the CertDecoder::GetName function in src/asn.cpp in TaoCrypt in yaSSL before 1.9.9, as used in mysqld in MySQL 5.0.x before 5.0.90, MySQL 5.1.x before 5.1.43, MySQL 5.5.x through 5.5.0-m2, and other products, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption and daemon crash) by establishing an SSL connection and sending an X.509 client certificate with a crafted name field, as demonstrated by mysql_overflow1.py and the vd_mysql5 module in VulnDisco Pack Professional 8.11. NOTE: this was originally reported for MySQL 5.0.51a.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-4484.html">CVE-2009-4484</cve>
<bugzilla href="https://bugzilla.suse.com/567977">SUSE bug 567977</bugzilla>
<bugzilla href="https://bugzilla.suse.com/604528">SUSE bug 604528</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199635" comment="mysql-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199636" comment="mysql-client-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199637" comment="mysql-tools-5.5.31-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4492</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-4492" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4492" source="CVE"/>
    <description>
    WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-4492.html">CVE-2009-4492</cve>
<bugzilla href="https://bugzilla.suse.com/570616">SUSE bug 570616</bugzilla>
<bugzilla href="https://bugzilla.suse.com/580482">SUSE bug 580482</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199778" comment="ruby-1.8.7.p357-0.9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199779" comment="ruby-doc-html-1.8.7.p357-0.9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199780" comment="ruby-tk-1.8.7.p357-0.9.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4536</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-4536" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4536" source="CVE"/>
    <description>
    drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-4536.html">CVE-2009-4536</cve>
<bugzilla href="https://bugzilla.suse.com/567376">SUSE bug 567376</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4537</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-4537" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4537" source="CVE"/>
    <description>
    drivers/net/r8169.c in the r8169 driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to (1) cause a denial of service (temporary network outage) via a packet with a crafted size, in conjunction with certain packets containing A characters and certain packets containing E characters; or (2) cause a denial of service (system crash) via a packet with a crafted size, in conjunction with certain packets containing '\0' characters, related to the value of the status register and erroneous behavior associated with the RxMaxSize register.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1389.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-4537.html">CVE-2009-4537</cve>
<bugzilla href="https://bugzilla.suse.com/567376">SUSE bug 567376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4538</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-4538" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4538" source="CVE"/>
    <description>
    drivers/net/e1000e/netdev.c in the e1000e driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to have an unspecified impact via crafted packets, a related issue to CVE-2009-4537.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-4538.html">CVE-2009-4538</cve>
<bugzilla href="https://bugzilla.suse.com/567376">SUSE bug 567376</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-4835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4835" source="CVE"/>
    <description>
    The (1) htk_read_header, (2) alaw_init, (3) ulaw_init, (4) pcm_init, (5) float32_init, and (6) sds_read_header functions in libsndfile 1.0.20 allow context-dependent attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted audio file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-4835.html">CVE-2009-4835</cve>
<bugzilla href="https://bugzilla.suse.com/631379">SUSE bug 631379</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199081" comment="libsndfile-1.0.20-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199082" comment="libsndfile-32bit-1.0.20-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199083" comment="libsndfile-x86-1.0.20-2.4 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20095026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-5026</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-5026" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5026" source="CVE"/>
    <description>
    The executable comment feature in MySQL 5.0.x before 5.0.93 and 5.1.x before 5.1.50, when running in certain slave configurations in which the slave is running a newer version than the master, allows remote attackers to execute arbitrary SQL commands via custom comments.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-5026.html">CVE-2009-5026</cve>
<bugzilla href="https://bugzilla.suse.com/726602">SUSE bug 726602</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199635" comment="mysql-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199636" comment="mysql-client-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199637" comment="mysql-tools-5.5.31-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20095029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-5029</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-5029" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5029" source="CVE"/>
    <description>
    Integer overflow in the __tzfile_read function in glibc before 2.15 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted timezone (TZ) file, as demonstrated using vsftpd.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-5029.html">CVE-2009-5029</cve>
<bugzilla href="https://bugzilla.suse.com/735850">SUSE bug 735850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/736174">SUSE bug 736174</bugzilla>
<bugzilla href="https://bugzilla.suse.com/759836">SUSE bug 759836</bugzilla>
<bugzilla href="https://bugzilla.suse.com/826666">SUSE bug 826666</bugzilla>
<bugzilla href="https://bugzilla.suse.com/920055">SUSE bug 920055</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199461" comment="glibc-2.11.3-17.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199462" comment="glibc-32bit-2.11.3-17.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199463" comment="glibc-devel-2.11.3-17.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199464" comment="glibc-devel-32bit-2.11.3-17.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199465" comment="glibc-html-2.11.3-17.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199466" comment="glibc-i18ndata-2.11.3-17.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199467" comment="glibc-info-2.11.3-17.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199468" comment="glibc-locale-2.11.3-17.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199469" comment="glibc-locale-32bit-2.11.3-17.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199470" comment="glibc-locale-x86-2.11.3-17.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199471" comment="glibc-profile-2.11.3-17.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199472" comment="glibc-profile-32bit-2.11.3-17.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199473" comment="glibc-profile-x86-2.11.3-17.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199474" comment="glibc-x86-2.11.3-17.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199475" comment="nscd-2.11.3-17.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20095031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-5031</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-5031" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5031" source="CVE"/>
    <description>
    ModSecurity before 2.5.11 treats request parameter values containing single quotes as files, which allows remote attackers to bypass filtering rules and perform other attacks such as cross-site scripting (XSS) attacks via a single quote in a request parameter in the Content-Disposition field of a request with a multipart/form-data Content-Type header.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-5031.html">CVE-2009-5031</cve>
<bugzilla href="https://bugzilla.suse.com/768293">SUSE bug 768293</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199339" comment="apache2-mod_security2-2.7.1-0.2.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20095063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-5063</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2009-5063" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5063" source="CVE"/>
    <description>
    Memory leak in the embedded_profile_len function in pngwutil.c in libpng before 1.2.39beta5 allows context-dependent attackers to cause a denial of service (memory leak or segmentation fault) via a JPEG image containing an iCCP chunk with a negative embedded profile length.  NOTE: this is due to an incomplete fix for CVE-2006-7244.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-5063.html">CVE-2009-5063</cve>
<bugzilla href="https://bugzilla.suse.com/680146">SUSE bug 680146</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199646" comment="libpng12-0-1.2.31-5.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199647" comment="libpng12-0-32bit-1.2.31-5.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199648" comment="libpng12-0-x86-1.2.31-5.31 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20095138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-5138</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2009-5138" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5138" source="CVE"/>
    <description>
    GnuTLS before 2.7.6, when the GNUTLS_VERIFY_ALLOW_X509_V1_CA_CRT flag is not enabled, treats version 1 X.509 certificates as intermediate CAs, which allows remote attackers to bypass intended restrictions by leveraging a X.509 V1 certificate from a trusted CA to issue new certificates, a different vulnerability than CVE-2014-1959.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-5138.html">CVE-2009-5138</cve>
<bugzilla href="https://bugzilla.suse.com/865993">SUSE bug 865993</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009211379" comment="gnutls-2.4.1-24.39.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009211382" comment="libgnutls-extra26-2.4.1-24.39.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009211380" comment="libgnutls26-2.4.1-24.39.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204425" comment="libgnutls26-32bit-2.4.1-24.39.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208526" comment="libgnutls26-x86-2.4.1-24.39.51 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009211379" comment="gnutls-2.4.1-24.39.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009211382" comment="libgnutls-extra26-2.4.1-24.39.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009211380" comment="libgnutls26-2.4.1-24.39.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009211381" comment="libgnutls26-32bit-2.4.1-24.39.49 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20095146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-5146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2009-5146" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5146" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<cve href="https://www.suse.com/security/cve/CVE-2009-5146.html">CVE-2009-5146</cve>
<bugzilla href="https://bugzilla.suse.com/915976">SUSE bug 915976</bugzilla>
<bugzilla href="https://bugzilla.suse.com/919648">SUSE bug 919648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/922647">SUSE bug 922647</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200261" comment="libopenssl0_9_8-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200262" comment="libopenssl0_9_8-32bit-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200263" comment="libopenssl0_9_8-hmac-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200264" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200265" comment="libopenssl0_9_8-x86-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200266" comment="openssl-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200267" comment="openssl-doc-0.9.8j-0.70 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200261" comment="libopenssl0_9_8-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200262" comment="libopenssl0_9_8-32bit-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200263" comment="libopenssl0_9_8-hmac-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200264" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200266" comment="openssl-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200267" comment="openssl-doc-0.9.8j-0.70 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20095155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-5155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2009-5155" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155" source="CVE"/>
    <description>
    In the GNU C Library (aka glibc or libc6) before 2.28, parse_reg_exp in posix/regcomp.c misparses alternatives, which allows attackers to cause a denial of service (assertion failure and application exit) or trigger an incorrect result by attempting a regular-expression match.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-5155.html">CVE-2009-5155</cve>
<bugzilla href="https://bugzilla.suse.com/1127223">SUSE bug 1127223</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009253520" comment="glibc-2.11.3-17.110.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253521" comment="glibc-32bit-2.11.3-17.110.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253522" comment="glibc-devel-2.11.3-17.110.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253523" comment="glibc-devel-32bit-2.11.3-17.110.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253524" comment="glibc-html-2.11.3-17.110.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253525" comment="glibc-i18ndata-2.11.3-17.110.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253526" comment="glibc-info-2.11.3-17.110.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253527" comment="glibc-locale-2.11.3-17.110.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253528" comment="glibc-locale-32bit-2.11.3-17.110.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253529" comment="glibc-profile-2.11.3-17.110.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253530" comment="glibc-profile-32bit-2.11.3-17.110.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253531" comment="nscd-2.11.3-17.110.30 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0001</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0001" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0001" source="CVE"/>
    <description>
    Integer underflow in the unlzw function in unlzw.c in gzip before 1.4 on 64-bit platforms, as used in ncompress and probably others, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted archive that uses LZW compression, leading to an array index error.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0001.html">CVE-2010-0001</cve>
<bugzilla href="https://bugzilla.suse.com/570331">SUSE bug 570331</bugzilla>
<bugzilla href="https://bugzilla.suse.com/588113">SUSE bug 588113</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199494" comment="gzip-1.3.12-69.23 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0156</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0156" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0156" source="CVE"/>
    <description>
    Puppet 0.24.x before 0.24.9 and 0.25.x before 0.25.2 allows local users to overwrite arbitrary files via a symlink attack on the (1) /tmp/daemonout, (2) /tmp/puppetdoc.txt, (3) /tmp/puppetdoc.tex, or (4) /tmp/puppetdoc.aux temporary file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0156.html">CVE-2010-0156</cve>
<bugzilla href="https://bugzilla.suse.com/585402">SUSE bug 585402</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199754" comment="puppet-2.6.18-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199755" comment="puppet-server-2.6.18-0.4 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0159</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0159" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0159" source="CVE"/>
    <description>
    The browser engine in Mozilla Firefox 3.0.x before 3.0.18 and 3.5.x before 3.5.8, Thunderbird before 3.0.2, and SeaMonkey before 2.0.3 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the nsBlockFrame::StealFrame function in layout/generic/nsBlockFrame.cpp, and unspecified other vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0159.html">CVE-2010-0159</cve>
<bugzilla href="https://bugzilla.suse.com/576969">SUSE bug 576969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/581160">SUSE bug 581160</bugzilla>
<bugzilla href="https://bugzilla.suse.com/584499">SUSE bug 584499</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0160</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0160" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0160" source="CVE"/>
    <description>
    The Web Worker functionality in Mozilla Firefox 3.0.x before 3.0.18 and 3.5.x before 3.5.8, and SeaMonkey before 2.0.3, does not properly handle array data types for posted messages, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0160.html">CVE-2010-0160</cve>
<bugzilla href="https://bugzilla.suse.com/576969">SUSE bug 576969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/581160">SUSE bug 581160</bugzilla>
<bugzilla href="https://bugzilla.suse.com/584499">SUSE bug 584499</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0162</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0162" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0162" source="CVE"/>
    <description>
    Mozilla Firefox 3.0.x before 3.0.18 and 3.5.x before 3.5.8, and SeaMonkey before 2.0.3, does not properly support the application/octet-stream content type as a protection mechanism against execution of web script in certain circumstances involving SVG and the EMBED element, which allows remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via an embedded SVG document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0162.html">CVE-2010-0162</cve>
<bugzilla href="https://bugzilla.suse.com/576969">SUSE bug 576969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/581160">SUSE bug 581160</bugzilla>
<bugzilla href="https://bugzilla.suse.com/584499">SUSE bug 584499</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0164</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0164" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0164" source="CVE"/>
    <description>
    Use-after-free vulnerability in the imgContainer::InternalAddFrameHelper function in src/imgContainer.cpp in libpr0n in Mozilla Firefox 3.6 before 3.6.2 allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly execute arbitrary code via a multipart/x-mixed-replace animation in which the frames have different bits-per-pixel (bpp) values.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0164.html">CVE-2010-0164</cve>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0165</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0165" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0165" source="CVE"/>
    <description>
    The TraceRecorder::traverseScopeChain function in js/src/jstracer.cpp in the browser engine in Mozilla Firefox 3.6 before 3.6.2 allows remote attackers to cause a denial of service (memory corruption and application crash) and possibly execute arbitrary code via vectors involving certain indirect calls to the JavaScript eval function.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0165.html">CVE-2010-0165</cve>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0166</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0166" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0166" source="CVE"/>
    <description>
    The gfxTextRun::SanitizeGlyphRuns function in gfx/thebes/src/gfxFont.cpp in the browser engine in Mozilla Firefox 3.6 before 3.6.2 on Mac OS X, when the Core Text API is used, does not properly perform certain deletions, which allows remote attackers to cause a denial of service (memory corruption and application crash) and possibly execute arbitrary code via an HTML document containing invisible Unicode characters, as demonstrated by the U+FEFF, U+FFF9, U+FFFA, and U+FFFB characters.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0166.html">CVE-2010-0166</cve>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0167</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0167" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0167" source="CVE"/>
    <description>
    The browser engine in Mozilla Firefox 3.0.x before 3.0.18, 3.5.x before 3.5.8, and 3.6.x before 3.6.2; Thunderbird before 3.0.2; and SeaMonkey before 2.0.3 allows remote attackers to cause a denial of service (memory corruption and application crash) and possibly execute arbitrary code via vectors related to (1) layout/generic/nsBlockFrame.cpp and (2) the _evaluate function in modules/plugin/base/src/nsNPAPIPlugin.cpp.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0167.html">CVE-2010-0167</cve>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0168</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0168" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0168" source="CVE"/>
    <description>
    The nsDocument::MaybePreLoadImage function in content/base/src/nsDocument.cpp in the image-preloading implementation in Mozilla Firefox 3.6 before 3.6.2 does not apply scheme restrictions and policy restrictions to the image's URL, which might allow remote attackers to cause a denial of service (application crash or hang) or hijack the functionality of the browser's add-ons via a crafted SRC attribute of an IMG element, as demonstrated by remote command execution through an ssh: URL in a configuration that supports gnome-vfs with a nonstandard network.gnomevfs.supported-protocols setting.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0168.html">CVE-2010-0168</cve>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0169</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0169" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0169" source="CVE"/>
    <description>
    The CSSLoaderImpl::DoSheetComplete function in layout/style/nsCSSLoader.cpp in Mozilla Firefox 3.0.x before 3.0.18, 3.5.x before 3.5.8, and 3.6.x before 3.6.2; Thunderbird before 3.0.2; and SeaMonkey before 2.0.3 changes the case of certain strings in a stylesheet before adding this stylesheet to the XUL cache, which might allow remote attackers to modify the browser's font and other CSS attributes, and potentially disrupt rendering of a web page, by forcing the browser to perform this erroneous stylesheet caching.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0169.html">CVE-2010-0169</cve>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0170</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0170" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0170" source="CVE"/>
    <description>
    Mozilla Firefox 3.6 before 3.6.2 does not offer plugins the expected window.location protection mechanism, which might allow remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via vectors that are specific to each affected plugin.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0170.html">CVE-2010-0170</cve>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0171</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0171" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0171" source="CVE"/>
    <description>
    Mozilla Firefox 3.0.x before 3.0.18, 3.5.x before 3.5.8, and 3.6.x before 3.6.2; Thunderbird before 3.0.2; and SeaMonkey before 2.0.3 allow remote attackers to perform cross-origin keystroke capture, and possibly conduct cross-site scripting (XSS) attacks, by using the addEventListener and setTimeout functions in conjunction with a wrapped object.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2007-3736.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0171.html">CVE-2010-0171</cve>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0172</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0172" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0172" source="CVE"/>
    <description>
    toolkit/components/passwordmgr/src/nsLoginManagerPrompter.js in the asynchronous Authorization Prompt implementation in Mozilla Firefox 3.6 before 3.6.2 does not properly handle concurrent authorization requests from multiple web sites, which might allow remote web servers to spoof an authorization dialog and capture credentials by demanding HTTP authentication in opportunistic circumstances.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0172.html">CVE-2010-0172</cve>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0173</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0173" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0173" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.5.9 and 3.6.x before 3.6.2, Thunderbird before 3.0.4, and SeaMonkey before 2.0.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0173.html">CVE-2010-0173</cve>
<bugzilla href="https://bugzilla.suse.com/586567">SUSE bug 586567</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0174</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0174" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0174" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.19, 3.5.x before 3.5.9, and 3.6.x before 3.6.2; Thunderbird before 3.0.4; and SeaMonkey before 2.0.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0174.html">CVE-2010-0174</cve>
<bugzilla href="https://bugzilla.suse.com/586567">SUSE bug 586567</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0175</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0175" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0175" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsTreeSelection implementation in Mozilla Firefox before 3.0.19 and 3.5.x before 3.5.9, Thunderbird before 3.0.4, and SeaMonkey before 2.0.4 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors that trigger a call to the handler for the select event for XUL tree items.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0175.html">CVE-2010-0175</cve>
<bugzilla href="https://bugzilla.suse.com/586567">SUSE bug 586567</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0176</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0176" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0176" source="CVE"/>
    <description>
    Mozilla Firefox before 3.0.19, 3.5.x before 3.5.9, and 3.6.x before 3.6.2; Thunderbird before 3.0.4; and SeaMonkey before 2.0.4 do not properly manage reference counts for option elements in a XUL tree optgroup, which might allow remote attackers to execute arbitrary code via unspecified vectors that trigger access to deleted elements, related to a "dangling pointer vulnerability."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0176.html">CVE-2010-0176</cve>
<bugzilla href="https://bugzilla.suse.com/586567">SUSE bug 586567</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0177</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0177" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0177" source="CVE"/>
    <description>
    Mozilla Firefox before 3.0.19, 3.5.x before 3.5.9, and 3.6.x before 3.6.2, and SeaMonkey before 2.0.4, frees the contents of the window.navigator.plugins array while a reference to an array element is still active, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors, related to a "dangling pointer vulnerability."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0177.html">CVE-2010-0177</cve>
<bugzilla href="https://bugzilla.suse.com/586567">SUSE bug 586567</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0178</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0178" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0178" source="CVE"/>
    <description>
    Mozilla Firefox before 3.0.19, 3.5.x before 3.5.9, and 3.6.x before 3.6.2, and SeaMonkey before 2.0.4, does not prevent applets from interpreting mouse clicks as drag-and-drop actions, which allows remote attackers to execute arbitrary JavaScript with Chrome privileges by loading a chrome: URL and then loading a javascript: URL.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0178.html">CVE-2010-0178</cve>
<bugzilla href="https://bugzilla.suse.com/586567">SUSE bug 586567</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0179</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0179" source="CVE"/>
    <description>
    Mozilla Firefox before 3.0.19 and 3.5.x before 3.5.8, and SeaMonkey before 2.0.3, when the XMLHttpRequestSpy module in the Firebug add-on is used, does not properly handle interaction between the XMLHttpRequestSpy object and chrome privileged objects, which allows remote attackers to execute arbitrary JavaScript via a crafted HTTP response.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0179.html">CVE-2010-0179</cve>
<bugzilla href="https://bugzilla.suse.com/586567">SUSE bug 586567</bugzilla>
<bugzilla href="https://bugzilla.suse.com/657016">SUSE bug 657016</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0181</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0181" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0181" source="CVE"/>
    <description>
    Mozilla Firefox before 3.5.9 and 3.6.x before 3.6.2, and SeaMonkey before 2.0.4, executes a mail application in situations where an IMG element has a SRC attribute that is a redirect to a mailto: URL, which allows remote attackers to cause a denial of service (excessive application launches) via an HTML document with many images.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0181.html">CVE-2010-0181</cve>
<bugzilla href="https://bugzilla.suse.com/586567">SUSE bug 586567</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0182" source="CVE"/>
    <description>
    The XMLDocument::load function in Mozilla Firefox before 3.5.9 and 3.6.x before 3.6.2, Thunderbird before 3.0.4, and SeaMonkey before 2.0.4 does not perform the expected nsIContentPolicy checks during loading of content by XML documents, which allows attackers to bypass intended access restrictions via crafted content.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0182.html">CVE-2010-0182</cve>
<bugzilla href="https://bugzilla.suse.com/586567">SUSE bug 586567</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0183</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0183" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0183" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsCycleCollector::MarkRoots function in Mozilla Firefox 3.5.x before 3.5.10 and SeaMonkey before 2.0.5 allows remote attackers to execute arbitrary code via a crafted HTML document, related to an improper frame construction process for menus.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0183.html">CVE-2010-0183</cve>
<bugzilla href="https://bugzilla.suse.com/603356">SUSE bug 603356</bugzilla>
<bugzilla href="https://bugzilla.suse.com/617399">SUSE bug 617399</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0205</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0205" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0205" source="CVE"/>
    <description>
    The png_decompress_chunk function in pngrutil.c in libpng 1.0.x before 1.0.53, 1.2.x before 1.2.43, and 1.4.x before 1.4.1 does not properly handle compressed ancillary-chunk data that has a disproportionately large uncompressed representation, which allows remote attackers to cause a denial of service (memory and CPU consumption, and application hang) via a crafted PNG file, as demonstrated by use of the deflate compression method on data composed of many occurrences of the same character, related to a "decompression bomb" attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0205.html">CVE-2010-0205</cve>
<bugzilla href="https://bugzilla.suse.com/580484">SUSE bug 580484</bugzilla>
<bugzilla href="https://bugzilla.suse.com/585403">SUSE bug 585403</bugzilla>
<bugzilla href="https://bugzilla.suse.com/608040">SUSE bug 608040</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199646" comment="libpng12-0-1.2.31-5.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199647" comment="libpng12-0-32bit-1.2.31-5.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199648" comment="libpng12-0-x86-1.2.31-5.31 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0302</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0302" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0302" source="CVE"/>
    <description>
    Use-after-free vulnerability in the abstract file-descriptor handling interface in the cupsdDoSelect function in scheduler/select.c in the scheduler in cupsd in CUPS before 1.4.4, when kqueue or epoll is used, allows remote attackers to cause a denial of service (daemon crash or hang) via a client disconnection during listing of a large number of print jobs, related to improperly maintaining a reference count. NOTE: some of these details are obtained from third party information. NOTE: this vulnerability exists because of an incomplete fix for CVE-2009-3553.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0302.html">CVE-2010-0302</cve>
<bugzilla href="https://bugzilla.suse.com/574336">SUSE bug 574336</bugzilla>
<bugzilla href="https://bugzilla.suse.com/578215">SUSE bug 578215</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199386" comment="cups-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199387" comment="cups-client-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199388" comment="cups-libs-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199389" comment="cups-libs-32bit-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199390" comment="cups-libs-x86-1.3.9-8.46.46 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0304</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0304" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0304" source="CVE"/>
    <description>
    Multiple buffer overflows in the LWRES dissector in Wireshark 0.9.15 through 1.0.10 and 1.2.0 through 1.2.5 allow remote attackers to cause a denial of service (crash) via a malformed packet, as demonstrated using a stack-based buffer overflow to the dissect_getaddrsbyname_request function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0304.html">CVE-2010-0304</cve>
<bugzilla href="https://bugzilla.suse.com/565902">SUSE bug 565902</bugzilla>
<bugzilla href="https://bugzilla.suse.com/590352">SUSE bug 590352</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0308</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0308" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0308" source="CVE"/>
    <description>
    lib/rfc1035.c in Squid 2.x, 3.0 through 3.0.STABLE22, and 3.1 through 3.1.0.15 allows remote attackers to cause a denial of service (assertion failure) via a crafted DNS packet that only contains a header.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0308.html">CVE-2010-0308</cve>
<bugzilla href="https://bugzilla.suse.com/576087">SUSE bug 576087</bugzilla>
<bugzilla href="https://bugzilla.suse.com/577347">SUSE bug 577347</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199783" comment="squid-2.7.STABLE5-2.12.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0393</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0393" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0393" source="CVE"/>
    <description>
    The _cupsGetlang function, as used by lppasswd.c in lppasswd in CUPS 1.2.2, 1.3.7, 1.3.9, and 1.4.1, relies on an environment variable to determine the file that provides localized message strings, which allows local users to gain privileges via a file that contains crafted localization data with format string specifiers.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0393.html">CVE-2010-0393</cve>
<bugzilla href="https://bugzilla.suse.com/574336">SUSE bug 574336</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199386" comment="cups-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199387" comment="cups-client-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199388" comment="cups-libs-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199389" comment="cups-libs-32bit-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199390" comment="cups-libs-x86-1.3.9-8.46.46 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0405</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0405" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0405" source="CVE"/>
    <description>
    Integer overflow in the BZ2_decompress function in decompress.c in bzip2 and libbzip2 before 1.0.6 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted compressed file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0405.html">CVE-2010-0405</cve>
<bugzilla href="https://bugzilla.suse.com/636978">SUSE bug 636978</bugzilla>
<bugzilla href="https://bugzilla.suse.com/646682">SUSE bug 646682</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198773" comment="bzip2-1.0.5-34.253 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198774" comment="bzip2-doc-1.0.5-34.253 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199377" comment="clamav-0.97.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198775" comment="libbz2-1-1.0.5-34.253 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198776" comment="libbz2-1-32bit-1.0.5-34.253 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198777" comment="libbz2-1-x86-1.0.5-34.253 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0407</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0407" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0407" source="CVE"/>
    <description>
    Multiple buffer overflows in the MSGFunctionDemarshall function in winscard_svc.c in the PC/SC Smart Card daemon (aka PCSCD) in MUSCLE PCSC-Lite before 1.5.4 allow local users to gain privileges via crafted message data, which is improperly demarshalled.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0407.html">CVE-2010-0407</cve>
<bugzilla href="https://bugzilla.suse.com/609317">SUSE bug 609317</bugzilla>
<bugzilla href="https://bugzilla.suse.com/641823">SUSE bug 641823</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199167" comment="pcsc-lite-1.4.102-1.37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199168" comment="pcsc-lite-32bit-1.4.102-1.37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199169" comment="pcsc-lite-x86-1.4.102-1.37 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0408</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0408" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0408" source="CVE"/>
    <description>
    The ap_proxy_ajp_request function in mod_proxy_ajp.c in mod_proxy_ajp in the Apache HTTP Server 2.2.x before 2.2.15 does not properly handle certain situations in which a client sends no request body, which allows remote attackers to cause a denial of service (backend server outage) via a crafted request, related to use of a 500 error code instead of the appropriate 400 error code.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0408.html">CVE-2010-0408</cve>
<bugzilla href="https://bugzilla.suse.com/586572">SUSE bug 586572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/601151">SUSE bug 601151</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199288" comment="apache2-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199289" comment="apache2-doc-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199290" comment="apache2-example-pages-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199291" comment="apache2-prefork-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199292" comment="apache2-utils-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199293" comment="apache2-worker-2.2.12-1.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0409</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0409" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0409" source="CVE"/>
    <description>
    Buffer overflow in the GMIME_UUENCODE_LEN macro in gmime/gmime-encodings.h in GMime before 2.4.15 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via input data for a uuencode operation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0409.html">CVE-2010-0409</cve>
<bugzilla href="https://bugzilla.suse.com/576923">SUSE bug 576923</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198864" comment="gmime-2.2.23-1.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198307" comment="gmime-2_4-2.4.8-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198865" comment="gmime-doc-2.2.23-1.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198866" comment="libgmime-2_0-3-2.2.23-1.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198310" comment="libgmime-2_4-2-2.4.8-1.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0414</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0414" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0414" source="CVE"/>
    <description>
    gnome-screensaver before 2.28.2 allows physically proximate attackers to bypass screen locking and access an unattended workstation by moving the mouse position to an external monitor and then disconnecting that monitor.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0414.html">CVE-2010-0414</cve>
<bugzilla href="https://bugzilla.suse.com/577951">SUSE bug 577951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/579250">SUSE bug 579250</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199476" comment="gnome-screensaver-2.28.3-0.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199477" comment="gnome-screensaver-lang-2.28.3-0.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0415</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0415" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0415" source="CVE"/>
    <description>
    The do_pages_move function in mm/migrate.c in the Linux kernel before 2.6.33-rc7 does not validate node values, which allows local users to read arbitrary kernel memory locations, cause a denial of service (OOPS), and possibly have unspecified other impact by specifying a node that is not part of the kernel's node set.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0415.html">CVE-2010-0415</cve>
<bugzilla href="https://bugzilla.suse.com/577753">SUSE bug 577753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0422" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0422" source="CVE"/>
    <description>
    gnome-screensaver 2.28.x before 2.28.3 does not properly synchronize the state of screen locking and the unlock dialog in situations involving a change to the number of monitors, which allows physically proximate attackers to bypass screen locking and access an unattended workstation by connecting and disconnecting monitors multiple times, a related issue to CVE-2010-0414.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0422.html">CVE-2010-0422</cve>
<bugzilla href="https://bugzilla.suse.com/577951">SUSE bug 577951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/579881">SUSE bug 579881</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199476" comment="gnome-screensaver-2.28.3-0.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199477" comment="gnome-screensaver-lang-2.28.3-0.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0424</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0424" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0424" source="CVE"/>
    <description>
    The edit_cmd function in crontab.c in (1) cronie before 1.4.4 and (2) Vixie cron (vixie-cron) allows local users to change the modification times of arbitrary files, and consequently cause a denial of service, via a symlink attack on a temporary file in the /tmp directory.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0424.html">CVE-2010-0424</cve>
<bugzilla href="https://bugzilla.suse.com/579447">SUSE bug 579447</bugzilla>
<bugzilla href="https://bugzilla.suse.com/580800">SUSE bug 580800</bugzilla>
<bugzilla href="https://bugzilla.suse.com/589640">SUSE bug 589640</bugzilla>
<bugzilla href="https://bugzilla.suse.com/590353">SUSE bug 590353</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199385" comment="cron-4.1-194.207 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0425</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2010-0425" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0425" source="CVE"/>
    <description>
    modules/arch/win32/mod_isapi.c in mod_isapi in the Apache HTTP Server 2.0.37 through 2.0.63, 2.2.0 through 2.2.14, and 2.3.x before 2.3.7, when running on Windows, does not ensure that request processing is complete before calling isapi_unload for an ISAPI .dll module, which allows remote attackers to execute arbitrary code via unspecified vectors related to a crafted request, a reset packet, and "orphaned callback pointers."
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0425.html">CVE-2010-0425</cve>
<bugzilla href="https://bugzilla.suse.com/1078450">SUSE bug 1078450</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1095150">SUSE bug 1095150</bugzilla>
<bugzilla href="https://bugzilla.suse.com/586572">SUSE bug 586572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/601151">SUSE bug 601151</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202407" comment="apache2-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202408" comment="apache2-devel-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202409" comment="apache2-doc-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202410" comment="apache2-example-pages-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202411" comment="apache2-prefork-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202412" comment="apache2-utils-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202413" comment="apache2-worker-2.2.34-70.12 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202407" comment="apache2-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202409" comment="apache2-doc-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202410" comment="apache2-example-pages-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202411" comment="apache2-prefork-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202412" comment="apache2-utils-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202413" comment="apache2-worker-2.2.34-70.12 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0426</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0426" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0426" source="CVE"/>
    <description>
    sudo 1.6.x before 1.6.9p21 and 1.7.x before 1.7.2p4, when a pseudo-command is enabled, permits a match between the name of the pseudo-command and the name of an executable file in an arbitrary directory, which allows local users to gain privileges via a crafted executable file, as demonstrated by a file named sudoedit in a user's home directory.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0426.html">CVE-2010-0426</cve>
<bugzilla href="https://bugzilla.suse.com/582555">SUSE bug 582555</bugzilla>
<bugzilla href="https://bugzilla.suse.com/582556">SUSE bug 582556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/588501">SUSE bug 588501</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199787" comment="sudo-1.7.6p2-0.17 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0427</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0427" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0427" source="CVE"/>
    <description>
    sudo 1.6.x before 1.6.9p21, when the runas_default option is used, does not properly set group memberships, which allows local users to gain privileges via a sudo command.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0427.html">CVE-2010-0427</cve>
<bugzilla href="https://bugzilla.suse.com/582555">SUSE bug 582555</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199787" comment="sudo-1.7.6p2-0.17 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0434</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0434" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0434" source="CVE"/>
    <description>
    The ap_read_request function in server/protocol.c in the Apache HTTP Server 2.2.x before 2.2.15, when a multithreaded MPM is used, does not properly handle headers in subrequests in certain circumstances involving a parent request that has a body, which might allow remote attackers to obtain sensitive information via a crafted request that triggers access to memory locations associated with an earlier request.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0434.html">CVE-2010-0434</cve>
<bugzilla href="https://bugzilla.suse.com/586572">SUSE bug 586572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/601151">SUSE bug 601151</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199288" comment="apache2-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199289" comment="apache2-doc-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199290" comment="apache2-example-pages-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199291" comment="apache2-prefork-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199292" comment="apache2-utils-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199293" comment="apache2-worker-2.2.12-1.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0436</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0436" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0436" source="CVE"/>
    <description>
    Race condition in backend/ctrl.c in KDM in KDE Software Compilation (SC) 2.2.0 through 4.4.2 allows local users to change the permissions of arbitrary files, and consequently gain privileges, by blocking the removal of a certain directory that contains a control socket, related to improper interaction with ksm.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0436.html">CVE-2010-0436</cve>
<bugzilla href="https://bugzilla.suse.com/584223">SUSE bug 584223</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199512" comment="kde4-kgreeter-plugins-4.3.5-0.12.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198355" comment="kdebase4-wallpapers-4.3.5-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199513" comment="kdebase4-workspace-4.3.5-0.12.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199514" comment="kdebase4-workspace-ksysguardd-4.3.5-0.12.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199515" comment="kdm-4.3.5-0.12.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199516" comment="kwin-4.3.5-0.12.12 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0442</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0442" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0442" source="CVE"/>
    <description>
    The bitsubstr function in backend/utils/adt/varbit.c in PostgreSQL 8.0.23, 8.1.11, and 8.3.8 allows remote authenticated users to cause a denial of service (daemon crash) or have unspecified other impact via vectors involving a negative integer in the third argument, as demonstrated by a SELECT statement that contains a call to the substring function for a bit string, related to an "overflow."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0442.html">CVE-2010-0442</cve>
<bugzilla href="https://bugzilla.suse.com/574667">SUSE bug 574667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/588996">SUSE bug 588996</bugzilla>
<bugzilla href="https://bugzilla.suse.com/648140">SUSE bug 648140</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199750" comment="postgresql-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199751" comment="postgresql-contrib-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199752" comment="postgresql-docs-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199753" comment="postgresql-server-8.3.23-0.4 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0540</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0540" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0540" source="CVE"/>
    <description>
    Cross-site request forgery (CSRF) vulnerability in the web interface in CUPS before 1.4.4, as used on Apple Mac OS X 10.5.8, Mac OS X 10.6 before 10.6.4, and other platforms, allows remote attackers to hijack the authentication of administrators for requests that change settings.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0540.html">CVE-2010-0540</cve>
<bugzilla href="https://bugzilla.suse.com/601830">SUSE bug 601830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/671735">SUSE bug 671735</bugzilla>
<bugzilla href="https://bugzilla.suse.com/680210">SUSE bug 680210</bugzilla>
<bugzilla href="https://bugzilla.suse.com/680212">SUSE bug 680212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/700987">SUSE bug 700987</bugzilla>
<bugzilla href="https://bugzilla.suse.com/711490">SUSE bug 711490</bugzilla>
<bugzilla href="https://bugzilla.suse.com/715643">SUSE bug 715643</bugzilla>
<bugzilla href="https://bugzilla.suse.com/748422">SUSE bug 748422</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199386" comment="cups-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199387" comment="cups-client-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199388" comment="cups-libs-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199389" comment="cups-libs-32bit-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199390" comment="cups-libs-x86-1.3.9-8.46.46 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0541</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0541" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0541" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the WEBrick HTTP server in Ruby in Apple Mac OS X 10.5.8, and 10.6 before 10.6.4, allows remote attackers to inject arbitrary web script or HTML via a crafted URI that triggers a UTF-7 error page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0541.html">CVE-2010-0541</cve>
<bugzilla href="https://bugzilla.suse.com/600752">SUSE bug 600752</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199778" comment="ruby-1.8.7.p357-0.9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199779" comment="ruby-doc-html-1.8.7.p357-0.9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199780" comment="ruby-tk-1.8.7.p357-0.9.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0542</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0542" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0542" source="CVE"/>
    <description>
    The _WriteProlog function in texttops.c in texttops in the Text Filter subsystem in CUPS before 1.4.4 does not check the return values of certain calloc calls, which allows remote attackers to cause a denial of service (NULL pointer dereference or heap memory corruption) or possibly execute arbitrary code via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0542.html">CVE-2010-0542</cve>
<bugzilla href="https://bugzilla.suse.com/601352">SUSE bug 601352</bugzilla>
<bugzilla href="https://bugzilla.suse.com/644521">SUSE bug 644521</bugzilla>
<bugzilla href="https://bugzilla.suse.com/657780">SUSE bug 657780</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199386" comment="cups-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199387" comment="cups-client-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199388" comment="cups-libs-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199389" comment="cups-libs-32bit-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199390" comment="cups-libs-x86-1.3.9-8.46.46 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0547" source="CVE"/>
    <description>
    client/mount.cifs.c in mount.cifs in smbfs in Samba 3.4.5 and earlier does not verify that the (1) device name and (2) mountpoint strings are composed of valid characters, which allows local users to cause a denial of service (mtab corruption) via a crafted string.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0547.html">CVE-2010-0547</cve>
<bugzilla href="https://bugzilla.suse.com/577868">SUSE bug 577868</bugzilla>
<bugzilla href="https://bugzilla.suse.com/577925">SUSE bug 577925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/583535">SUSE bug 583535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/583536">SUSE bug 583536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/594263">SUSE bug 594263</bugzilla>
<bugzilla href="https://bugzilla.suse.com/597421">SUSE bug 597421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/602694">SUSE bug 602694</bugzilla>
<bugzilla href="https://bugzilla.suse.com/709819">SUSE bug 709819</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199376" comment="cifs-utils-5.1-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199555" comment="ldapsmb-1.34b-12.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199556" comment="libldb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199557" comment="libsmbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199558" comment="libsmbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199559" comment="libsmbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199560" comment="libtalloc2-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199561" comment="libtalloc2-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199562" comment="libtalloc2-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199563" comment="libtdb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199564" comment="libtdb1-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199565" comment="libtdb1-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199566" comment="libtevent0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199567" comment="libwbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199568" comment="libwbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199569" comment="libwbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199570" comment="samba-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199571" comment="samba-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199572" comment="samba-client-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199573" comment="samba-client-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199574" comment="samba-client-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199575" comment="samba-krb-printing-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199576" comment="samba-winbind-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199577" comment="samba-winbind-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199578" comment="samba-winbind-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199579" comment="samba-x86-3.6.3-0.39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0622</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0622" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0622" source="CVE"/>
    <description>
    The wake_futex_pi function in kernel/futex.c in the Linux kernel before 2.6.33-rc7 does not properly handle certain unlock operations for a Priority Inheritance (PI) futex, which allows local users to cause a denial of service (OOPS) and possibly have unspecified other impact via vectors involving modification of the futex value from user space.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0622.html">CVE-2010-0622</cve>
<bugzilla href="https://bugzilla.suse.com/579439">SUSE bug 579439</bugzilla>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0623</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0623" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0623" source="CVE"/>
    <description>
    The futex_lock_pi function in kernel/futex.c in the Linux kernel before 2.6.33-rc7 does not properly manage a certain reference count, which allows local users to cause a denial of service (OOPS) via vectors involving an unmount of an ext3 filesystem.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0623.html">CVE-2010-0623</cve>
<bugzilla href="https://bugzilla.suse.com/579439">SUSE bug 579439</bugzilla>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0624</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0624" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0624" source="CVE"/>
    <description>
    Heap-based buffer overflow in the rmt_read__ function in lib/rtapelib.c in the rmt client functionality in GNU tar before 1.23 and GNU cpio before 2.11 allows remote rmt servers to cause a denial of service (memory corruption) or possibly execute arbitrary code by sending more data than was requested, related to archive filenames that contain a : (colon) character.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0624.html">CVE-2010-0624</cve>
<bugzilla href="https://bugzilla.suse.com/579475">SUSE bug 579475</bugzilla>
<bugzilla href="https://bugzilla.suse.com/608034">SUSE bug 608034</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199231" comment="tar-1.26-1.2.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0629</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0629" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0629" source="CVE"/>
    <description>
    Use-after-free vulnerability in kadmin/server/server_stubs.c in kadmind in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote authenticated users to cause a denial of service (daemon crash) via a request from a kadmin client that sends an invalid API version number.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0629.html">CVE-2010-0629</cve>
<bugzilla href="https://bugzilla.suse.com/591049">SUSE bug 591049</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199544" comment="krb5-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199545" comment="krb5-32bit-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199546" comment="krb5-apps-clients-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199547" comment="krb5-apps-servers-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199548" comment="krb5-client-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199552" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199553" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199549" comment="krb5-server-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199550" comment="krb5-x86-1.6.3-133.49.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0639</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0639" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0639" source="CVE"/>
    <description>
    The htcpHandleTstRequest function in htcp.c in Squid 2.x before 2.6.STABLE24 and 2.7 before 2.7.STABLE8, and htcp.cc in 3.0 before 3.0.STABLE24, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via crafted packets to the HTCP port.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0639.html">CVE-2010-0639</cve>
<bugzilla href="https://bugzilla.suse.com/587375">SUSE bug 587375</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199783" comment="squid-2.7.STABLE5-2.12.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0654</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0654" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0654" source="CVE"/>
    <description>
    Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 permit cross-origin loading of CSS stylesheets even when the stylesheet download has an incorrect MIME type and the stylesheet document is malformed, which allows remote attackers to obtain sensitive information via a crafted document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0654.html">CVE-2010-0654</cve>
<bugzilla href="https://bugzilla.suse.com/583603">SUSE bug 583603</bugzilla>
<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0728</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0728" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0728" source="CVE"/>
    <description>
    smbd in Samba 3.3.11, 3.4.6, and 3.5.0, when libcap support is enabled, runs with the CAP_DAC_OVERRIDE capability, which allows remote authenticated users to bypass intended file permissions via standard filesystem operations with any client.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0728.html">CVE-2010-0728</cve>
<bugzilla href="https://bugzilla.suse.com/586683">SUSE bug 586683</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199376" comment="cifs-utils-5.1-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199555" comment="ldapsmb-1.34b-12.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199556" comment="libldb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199557" comment="libsmbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199558" comment="libsmbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199559" comment="libsmbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199560" comment="libtalloc2-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199561" comment="libtalloc2-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199562" comment="libtalloc2-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199563" comment="libtdb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199564" comment="libtdb1-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199565" comment="libtdb1-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199566" comment="libtevent0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199567" comment="libwbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199568" comment="libwbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199569" comment="libwbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199570" comment="samba-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199571" comment="samba-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199572" comment="samba-client-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199573" comment="samba-client-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199574" comment="samba-client-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199575" comment="samba-krb-printing-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199576" comment="samba-winbind-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199577" comment="samba-winbind-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199578" comment="samba-winbind-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199579" comment="samba-x86-3.6.3-0.39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0740</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0740" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0740" source="CVE"/>
    <description>
    The ssl3_get_record function in ssl/s3_pkt.c in OpenSSL 0.9.8f through 0.9.8m allows remote attackers to cause a denial of service (crash) via a malformed record in a TLS connection that triggers a NULL pointer dereference, related to the minor version number.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0740.html">CVE-2010-0740</cve>
<bugzilla href="https://bugzilla.suse.com/590833">SUSE bug 590833</bugzilla>
<bugzilla href="https://bugzilla.suse.com/629905">SUSE bug 629905</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199638" comment="libopenssl0_9_8-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199639" comment="libopenssl0_9_8-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199640" comment="libopenssl0_9_8-hmac-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199641" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199642" comment="libopenssl0_9_8-x86-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199643" comment="openssl-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199644" comment="openssl-doc-0.9.8j-0.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0771</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0771" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0771" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2010-3552.  Reason: This candidate is a reservation duplicate of CVE-2010-3552.  Notes: All CVE users should reference CVE-2010-3552 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0771.html">CVE-2010-0771</cve>
<bugzilla href="https://bugzilla.suse.com/659926">SUSE bug 659926</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0787</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0787" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0787" source="CVE"/>
    <description>
    client/mount.cifs.c in mount.cifs in smbfs in Samba 3.0.22, 3.0.28a, 3.2.3, 3.3.2, 3.4.0, and 3.4.5 allows local users to mount a CIFS share on an arbitrary mountpoint, and gain privileges, via a symlink attack on the mountpoint directory file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0787.html">CVE-2010-0787</cve>
<bugzilla href="https://bugzilla.suse.com/550002">SUSE bug 550002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/602694">SUSE bug 602694</bugzilla>
<bugzilla href="https://bugzilla.suse.com/620680">SUSE bug 620680</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199376" comment="cifs-utils-5.1-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199555" comment="ldapsmb-1.34b-12.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199556" comment="libldb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199557" comment="libsmbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199558" comment="libsmbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199559" comment="libsmbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199560" comment="libtalloc2-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199561" comment="libtalloc2-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199562" comment="libtalloc2-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199563" comment="libtdb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199564" comment="libtdb1-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199565" comment="libtdb1-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199566" comment="libtevent0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199567" comment="libwbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199568" comment="libwbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199569" comment="libwbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199570" comment="samba-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199571" comment="samba-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199572" comment="samba-client-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199573" comment="samba-client-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199574" comment="samba-client-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199575" comment="samba-krb-printing-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199576" comment="samba-winbind-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199577" comment="samba-winbind-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199578" comment="samba-winbind-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199579" comment="samba-x86-3.6.3-0.39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0831</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2010-0831" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0831" source="CVE"/>
    <description>
    Directory traversal vulnerability in the extract_jar function in jartool.c in FastJar 0.98 allows remote attackers to create or overwrite arbitrary files via a .. (dot dot) in a non-initial pathname component in a filename within a .jar archive, a related issue to CVE-2005-1080.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-3619.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0831.html">CVE-2010-0831</cve>
<bugzilla href="https://bugzilla.suse.com/607043">SUSE bug 607043</bugzilla>
<bugzilla href="https://bugzilla.suse.com/607762">SUSE bug 607762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/818591">SUSE bug 818591</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200010" comment="fastjar-0.95-1.24 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0926</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-0926" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0926" source="CVE"/>
    <description>
    The default configuration of smbd in Samba before 3.3.11, 3.4.x before 3.4.6, and 3.5.x before 3.5.0rc3, when a writable share exists, allows remote authenticated users to leverage a directory traversal vulnerability, and access arbitrary files, by using the symlink command in smbclient to create a symlink containing .. (dot dot) sequences, related to the combination of the unix extensions and wide links options.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0926.html">CVE-2010-0926</cve>
<bugzilla href="https://bugzilla.suse.com/1027147">SUSE bug 1027147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/577868">SUSE bug 577868</bugzilla>
<bugzilla href="https://bugzilla.suse.com/597421">SUSE bug 597421</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199555" comment="ldapsmb-1.34b-12.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199556" comment="libldb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199557" comment="libsmbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199558" comment="libsmbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199559" comment="libsmbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199560" comment="libtalloc2-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199561" comment="libtalloc2-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199562" comment="libtalloc2-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199563" comment="libtdb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199564" comment="libtdb1-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199565" comment="libtdb1-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199566" comment="libtevent0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199567" comment="libwbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199568" comment="libwbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199569" comment="libwbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199570" comment="samba-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199571" comment="samba-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199572" comment="samba-client-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199573" comment="samba-client-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199574" comment="samba-client-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199575" comment="samba-krb-printing-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199576" comment="samba-winbind-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199577" comment="samba-winbind-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199578" comment="samba-winbind-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199579" comment="samba-x86-3.6.3-0.39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1000</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1000" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1000" source="CVE"/>
    <description>
    Directory traversal vulnerability in KGet in KDE SC 4.0.0 through 4.4.3 allows remote attackers to create arbitrary files via directory traversal sequences in the name attribute of a file element in a metalink file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1000.html">CVE-2010-1000</cve>
<bugzilla href="https://bugzilla.suse.com/604709">SUSE bug 604709</bugzilla>
<bugzilla href="https://bugzilla.suse.com/687873">SUSE bug 687873</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198923" comment="kdenetwork4-filesharing-4.3.5-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198924" comment="kget-4.3.5-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198925" comment="kopete-4.3.5-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198926" comment="krdc-4.3.5-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198927" comment="krfb-4.3.5-0.4 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1028</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1028" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1028" source="CVE"/>
    <description>
    Integer overflow in the decompression functionality in the Web Open Fonts Format (WOFF) decoder in Mozilla Firefox 3.6 before 3.6.2 and 3.7 before 3.7 alpha 3 allows remote attackers to execute arbitrary code via a crafted WOFF file that triggers a buffer overflow, as demonstrated by the vd_ff module in VulnDisco 9.0.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1028.html">CVE-2010-1028</cve>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1121</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1121" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1121" source="CVE"/>
    <description>
    Mozilla Firefox 3.6.x before 3.6.3 does not properly manage the scopes of DOM nodes that are moved from one document to another, which allows remote attackers to conduct use-after-free attacks and execute arbitrary code via unspecified vectors involving improper interaction with garbage collection, as demonstrated by Nils during a Pwn2Own competition at CanSecWest 2010.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1121.html">CVE-2010-1121</cve>
<bugzilla href="https://bugzilla.suse.com/603356">SUSE bug 603356</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1125</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1125" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1125" source="CVE"/>
    <description>
    The JavaScript implementation in Mozilla Firefox 3.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, allows remote attackers to send selected keystrokes to a form field in a hidden frame, instead of the intended form field in a visible frame, via certain calls to the focus method.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1125.html">CVE-2010-1125</cve>
<bugzilla href="https://bugzilla.suse.com/603356">SUSE bug 603356</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1146" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1146" source="CVE"/>
    <description>
    The Linux kernel 2.6.33.2 and earlier, when a ReiserFS filesystem exists, does not restrict read or write access to the .reiserfs_priv directory, which allows local users to gain privileges by modifying (1) extended attributes or (2) ACLs, as demonstrated by deleting a file under .reiserfs_priv/xattrs/.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1146.html">CVE-2010-1146</cve>
<bugzilla href="https://bugzilla.suse.com/593906">SUSE bug 593906</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1157</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1157" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1157" source="CVE"/>
    <description>
    Apache Tomcat 5.5.0 through 5.5.29 and 6.0.0 through 6.0.26 might allow remote attackers to discover the server's hostname or IP address by sending a request for a resource that requires (1) BASIC or (2) DIGEST authentication, and then reading the realm field in the WWW-Authenticate header in the reply.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1157.html">CVE-2010-1157</cve>
<bugzilla href="https://bugzilla.suse.com/599554">SUSE bug 599554</bugzilla>
<bugzilla href="https://bugzilla.suse.com/622188">SUSE bug 622188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/655440">SUSE bug 655440</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199802" comment="tomcat6-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199803" comment="tomcat6-admin-webapps-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199804" comment="tomcat6-docs-webapp-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199805" comment="tomcat6-javadoc-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199806" comment="tomcat6-jsp-2_1-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199807" comment="tomcat6-lib-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199808" comment="tomcat6-servlet-2_5-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199809" comment="tomcat6-webapps-6.0.18-20.35.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1168</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1168" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1168" source="CVE"/>
    <description>
    The Safe (aka Safe.pm) module before 2.25 for Perl allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving implicitly called methods and implicitly blessed objects, as demonstrated by the (a) DESTROY and (b) AUTOLOAD methods, related to "automagic methods."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1168.html">CVE-2010-1168</cve>
<bugzilla href="https://bugzilla.suse.com/605845">SUSE bug 605845</bugzilla>
<bugzilla href="https://bugzilla.suse.com/605918">SUSE bug 605918</bugzilla>
<bugzilla href="https://bugzilla.suse.com/605926">SUSE bug 605926</bugzilla>
<bugzilla href="https://bugzilla.suse.com/605928">SUSE bug 605928</bugzilla>
<bugzilla href="https://bugzilla.suse.com/634562">SUSE bug 634562</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199743" comment="perl-5.10.0-64.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199744" comment="perl-32bit-5.10.0-64.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199745" comment="perl-Module-Build-0.2808.01-0.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199746" comment="perl-Test-Simple-0.72-0.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199747" comment="perl-base-5.10.0-64.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199748" comment="perl-doc-5.10.0-64.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199749" comment="perl-x86-5.10.0-64.67 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1169</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1169" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1169" source="CVE"/>
    <description>
    PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2 does not properly restrict PL/perl procedures, which allows remote authenticated users, with database-creation privileges, to execute arbitrary Perl code via a crafted script, related to the Safe module (aka Safe.pm) for Perl. NOTE: some sources report that this issue is the same as CVE-2010-1447.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1169.html">CVE-2010-1169</cve>
<bugzilla href="https://bugzilla.suse.com/605926">SUSE bug 605926</bugzilla>
<bugzilla href="https://bugzilla.suse.com/648140">SUSE bug 648140</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199606" comment="libecpg6-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199607" comment="libpq5-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199608" comment="libpq5-32bit-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199750" comment="postgresql-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199751" comment="postgresql-contrib-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199752" comment="postgresql-docs-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199753" comment="postgresql-server-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199609" comment="postgresql91-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199610" comment="postgresql91-contrib-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199611" comment="postgresql91-docs-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199612" comment="postgresql91-server-9.1.9-0.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1170</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1170" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1170" source="CVE"/>
    <description>
    The PL/Tcl implementation in PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2 loads Tcl code from the pltcl_modules table regardless of the table's ownership and permissions, which allows remote authenticated users, with database-creation privileges, to execute arbitrary Tcl code by creating this table and inserting a crafted Tcl script.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1170.html">CVE-2010-1170</cve>
<bugzilla href="https://bugzilla.suse.com/605845">SUSE bug 605845</bugzilla>
<bugzilla href="https://bugzilla.suse.com/605926">SUSE bug 605926</bugzilla>
<bugzilla href="https://bugzilla.suse.com/634562">SUSE bug 634562</bugzilla>
<bugzilla href="https://bugzilla.suse.com/648140">SUSE bug 648140</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199606" comment="libecpg6-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199607" comment="libpq5-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199608" comment="libpq5-32bit-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199750" comment="postgresql-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199751" comment="postgresql-contrib-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199752" comment="postgresql-docs-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199753" comment="postgresql-server-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199609" comment="postgresql91-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199610" comment="postgresql91-contrib-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199611" comment="postgresql91-docs-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199612" comment="postgresql91-server-9.1.9-0.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1172</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1172" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1172" source="CVE"/>
    <description>
    DBus-GLib 0.73 disregards the access flag of exported GObject properties, which allows local users to bypass intended access restrictions and possibly cause a denial of service by modifying properties, as demonstrated by properties of the (1) DeviceKit-Power, (2) NetworkManager, and (3) ModemManager services.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1172.html">CVE-2010-1172</cve>
<bugzilla href="https://bugzilla.suse.com/628607">SUSE bug 628607</bugzilla>
<bugzilla href="https://bugzilla.suse.com/633621">SUSE bug 633621</bugzilla>
<bugzilla href="https://bugzilla.suse.com/633622">SUSE bug 633622</bugzilla>
<bugzilla href="https://bugzilla.suse.com/633623">SUSE bug 633623</bugzilla>
<bugzilla href="https://bugzilla.suse.com/633629">SUSE bug 633629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/633637">SUSE bug 633637</bugzilla>
<bugzilla href="https://bugzilla.suse.com/633639">SUSE bug 633639</bugzilla>
<bugzilla href="https://bugzilla.suse.com/633648">SUSE bug 633648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/633652">SUSE bug 633652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/633653">SUSE bug 633653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/633654">SUSE bug 633654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/633658">SUSE bug 633658</bugzilla>
<bugzilla href="https://bugzilla.suse.com/633660">SUSE bug 633660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/633678">SUSE bug 633678</bugzilla>
<bugzilla href="https://bugzilla.suse.com/633679">SUSE bug 633679</bugzilla>
<bugzilla href="https://bugzilla.suse.com/633681">SUSE bug 633681</bugzilla>
<bugzilla href="https://bugzilla.suse.com/633682">SUSE bug 633682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/633685">SUSE bug 633685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/633686">SUSE bug 633686</bugzilla>
<bugzilla href="https://bugzilla.suse.com/633700">SUSE bug 633700</bugzilla>
<bugzilla href="https://bugzilla.suse.com/633701">SUSE bug 633701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/633702">SUSE bug 633702</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198797" comment="dbus-1-glib-0.76-34.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198798" comment="dbus-1-glib-32bit-0.76-34.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198799" comment="dbus-1-glib-x86-0.76-34.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1173</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1173" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1173" source="CVE"/>
    <description>
    The sctp_process_unk_param function in net/sctp/sm_make_chunk.c in the Linux kernel 2.6.33.3 and earlier, when SCTP is enabled, allows remote attackers to cause a denial of service (system crash) via an SCTPChunkInit packet containing multiple invalid parameters that require a large amount of error data.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1173.html">CVE-2010-1173</cve>
<bugzilla href="https://bugzilla.suse.com/600375">SUSE bug 600375</bugzilla>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/702025">SUSE bug 702025</bugzilla>
<bugzilla href="https://bugzilla.suse.com/941110">SUSE bug 941110</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1196</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1196" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1196" source="CVE"/>
    <description>
    Integer overflow in the nsGenericDOMDataNode::SetTextInternal function in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allows remote attackers to execute arbitrary code via a DOM node with a long text value that triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1196.html">CVE-2010-1196</cve>
<bugzilla href="https://bugzilla.suse.com/603356">SUSE bug 603356</bugzilla>
<bugzilla href="https://bugzilla.suse.com/617399">SUSE bug 617399</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1197</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1197" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1197" source="CVE"/>
    <description>
    Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, does not properly handle situations in which both "Content-Disposition: attachment" and "Content-Type: multipart" are present in HTTP headers, which allows remote attackers to conduct cross-site scripting (XSS) attacks via an uploaded HTML document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1197.html">CVE-2010-1197</cve>
<bugzilla href="https://bugzilla.suse.com/603356">SUSE bug 603356</bugzilla>
<bugzilla href="https://bugzilla.suse.com/617399">SUSE bug 617399</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1198</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1198" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1198" source="CVE"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, allows remote attackers to execute arbitrary code via vectors involving multiple plugin instances.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1198.html">CVE-2010-1198</cve>
<bugzilla href="https://bugzilla.suse.com/603356">SUSE bug 603356</bugzilla>
<bugzilla href="https://bugzilla.suse.com/617399">SUSE bug 617399</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1199</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1199" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1199" source="CVE"/>
    <description>
    Integer overflow in the XSLT node sorting implementation in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allows remote attackers to execute arbitrary code via a large text value for a node.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1199.html">CVE-2010-1199</cve>
<bugzilla href="https://bugzilla.suse.com/603356">SUSE bug 603356</bugzilla>
<bugzilla href="https://bugzilla.suse.com/617399">SUSE bug 617399</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1200</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1200" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1200" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1200.html">CVE-2010-1200</cve>
<bugzilla href="https://bugzilla.suse.com/603356">SUSE bug 603356</bugzilla>
<bugzilla href="https://bugzilla.suse.com/617399">SUSE bug 617399</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1201</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1201" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1201" source="CVE"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.10, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1201.html">CVE-2010-1201</cve>
<bugzilla href="https://bugzilla.suse.com/603356">SUSE bug 603356</bugzilla>
<bugzilla href="https://bugzilla.suse.com/617399">SUSE bug 617399</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1202</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1202" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1202" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1202.html">CVE-2010-1202</cve>
<bugzilla href="https://bugzilla.suse.com/603356">SUSE bug 603356</bugzilla>
<bugzilla href="https://bugzilla.suse.com/617399">SUSE bug 617399</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1203</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1203" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1203" source="CVE"/>
    <description>
    The JavaScript engine in Mozilla Firefox 3.6.x before 3.6.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors that trigger an assertion failure in jstracer.cpp.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1203.html">CVE-2010-1203</cve>
<bugzilla href="https://bugzilla.suse.com/603356">SUSE bug 603356</bugzilla>
<bugzilla href="https://bugzilla.suse.com/617399">SUSE bug 617399</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1205</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1205" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1205" source="CVE"/>
    <description>
    Buffer overflow in pngpread.c in libpng before 1.2.44 and 1.4.x before 1.4.3, as used in progressive applications, might allow remote attackers to execute arbitrary code via a PNG image that triggers an additional data row.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1205.html">CVE-2010-1205</cve>
<bugzilla href="https://bugzilla.suse.com/617866">SUSE bug 617866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
<bugzilla href="https://bugzilla.suse.com/639941">SUSE bug 639941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/854395">SUSE bug 854395</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199646" comment="libpng12-0-1.2.31-5.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199647" comment="libpng12-0-32bit-1.2.31-5.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199648" comment="libpng12-0-x86-1.2.31-5.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1206</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1206" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1206" source="CVE"/>
    <description>
    The startDocumentLoad function in browser/base/content/browser.js in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, does not properly implement the Same Origin Policy in certain circumstances related to the about:blank document and a document that is currently loading, which allows (1) remote web servers to conduct spoofing attacks via vectors involving a 204 (aka No Content) status code, and allows (2) remote attackers to conduct spoofing attacks via vectors involving a window.stop call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1206.html">CVE-2010-1206</cve>
<bugzilla href="https://bugzilla.suse.com/618183">SUSE bug 618183</bugzilla>
<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1207</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1207" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1207" source="CVE"/>
    <description>
    Mozilla Firefox before 3.6.7 and Thunderbird before 3.1.1 do not properly implement read restrictions for CANVAS elements, which allows remote attackers to obtain sensitive cross-origin information via vectors involving reference retention and node deletion.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1207.html">CVE-2010-1207</cve>
<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1208</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1208" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1208" source="CVE"/>
    <description>
    Use-after-free vulnerability in the attribute-cloning functionality in the DOM implementation in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to execute arbitrary code via vectors related to deletion of an event attribute node with a nonzero reference count.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1208.html">CVE-2010-1208</cve>
<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1209" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1209" source="CVE"/>
    <description>
    Use-after-free vulnerability in the NodeIterator implementation in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to execute arbitrary code via a crafted NodeFilter that detaches DOM nodes, related to the NodeIterator interface and a javascript callback.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1209.html">CVE-2010-1209</cve>
<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1210</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1210" source="CVE"/>
    <description>
    intl/uconv/util/nsUnicodeDecodeHelper.cpp in Mozilla Firefox before 3.6.7 and Thunderbird before 3.1.1 inserts a U+FFFD sequence into text in certain circumstances involving undefined positions, which might make it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted 8-bit text.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1210.html">CVE-2010-1210</cve>
<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1211</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1211" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1211" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1211.html">CVE-2010-1211</cve>
<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1212</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1212" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1212" source="CVE"/>
    <description>
    js/src/jstracer.cpp in the browser engine in Mozilla Firefox 3.6.x before 3.6.7 and Thunderbird 3.1.x before 3.1.1 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to (1) propagation of deep aborts in the TraceRecorder::record_JSOP_BINDNAME function, (2) depth handling in the TraceRecorder::record_JSOP_GETELEM function, and (3) tracing of out-of-range arguments in the TraceRecorder::record_JSOP_ARGSUB function.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1212.html">CVE-2010-1212</cve>
<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1213</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1213" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1213" source="CVE"/>
    <description>
    The importScripts Web Worker method in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 does not verify that content is valid JavaScript code, which allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted HTML document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1213.html">CVE-2010-1213</cve>
<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1214</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1214" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1214" source="CVE"/>
    <description>
    Integer overflow in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to execute arbitrary code via plugin content with many parameter elements.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1214.html">CVE-2010-1214</cve>
<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1215</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1215" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1215" source="CVE"/>
    <description>
    Mozilla Firefox 3.6.x before 3.6.7 and Thunderbird 3.1.x before 3.1.1 do not properly implement access to a content object through a SafeJSObjectWrapper (aka SJOW) wrapper, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges by leveraging "access to an object from the chrome scope."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1215.html">CVE-2010-1215</cve>
<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1321</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1321" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1321" source="CVE"/>
    <description>
    The kg_accept_krb5 function in krb5/accept_sec_context.c in the GSS-API library in MIT Kerberos 5 (aka krb5) through 1.7.1 and 1.8 before 1.8.2, as used in kadmind and other applications, does not properly check for invalid GSS-API tokens, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an AP-REQ message in which the authenticator's checksum field is missing.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1321.html">CVE-2010-1321</cve>
<bugzilla href="https://bugzilla.suse.com/596826">SUSE bug 596826</bugzilla>
<bugzilla href="https://bugzilla.suse.com/611090">SUSE bug 611090</bugzilla>
<bugzilla href="https://bugzilla.suse.com/646073">SUSE bug 646073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/648950">SUSE bug 648950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/658525">SUSE bug 658525</bugzilla>
<bugzilla href="https://bugzilla.suse.com/659926">SUSE bug 659926</bugzilla>
<bugzilla href="https://bugzilla.suse.com/663953">SUSE bug 663953</bugzilla>
<bugzilla href="https://bugzilla.suse.com/679560">SUSE bug 679560</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199544" comment="krb5-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199545" comment="krb5-32bit-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199546" comment="krb5-apps-clients-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199547" comment="krb5-apps-servers-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199548" comment="krb5-client-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199552" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199553" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199549" comment="krb5-server-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199550" comment="krb5-x86-1.6.3-133.49.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1323</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1323" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1323" source="CVE"/>
    <description>
    MIT Kerberos 5 (aka krb5) 1.3.x, 1.4.x, 1.5.x, 1.6.x, 1.7.x, and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to modify user-visible prompt text, modify a response to a Key Distribution Center (KDC), or forge a KRB-SAFE message via certain checksums that (1) are unkeyed or (2) use RC4 keys.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1323.html">CVE-2010-1323</cve>
<bugzilla href="https://bugzilla.suse.com/650650">SUSE bug 650650</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199544" comment="krb5-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199545" comment="krb5-32bit-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199546" comment="krb5-apps-clients-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199547" comment="krb5-apps-servers-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199548" comment="krb5-client-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199552" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199553" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199549" comment="krb5-server-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199550" comment="krb5-x86-1.6.3-133.49.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1411</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1411" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1411" source="CVE"/>
    <description>
    Multiple integer overflows in the Fax3SetupState function in tif_fax3.c in the FAX3 decoder in LibTIFF before 3.9.3, as used in ImageIO in Apple Mac OS X 10.5.8 and Mac OS X 10.6 before 10.6.4, allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted TIFF file that triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1411.html">CVE-2010-1411</cve>
<bugzilla href="https://bugzilla.suse.com/605837">SUSE bug 605837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/612879">SUSE bug 612879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/616827">SUSE bug 616827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199680" comment="libtiff3-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199681" comment="libtiff3-32bit-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199682" comment="libtiff3-x86-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199683" comment="tiff-3.8.2-141.152 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1437</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1437" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1437" source="CVE"/>
    <description>
    Race condition in the find_keyring_by_name function in security/keys/keyring.c in the Linux kernel 2.6.34-rc5 and earlier allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via keyctl session commands that trigger access to a dead keyring that is undergoing deletion by the key_cleanup function.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1437.html">CVE-2010-1437</cve>
<bugzilla href="https://bugzilla.suse.com/599955">SUSE bug 599955</bugzilla>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1447</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1447" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1447" source="CVE"/>
    <description>
    The Safe (aka Safe.pm) module 2.26, and certain earlier versions, for Perl, as used in PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2, allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving subroutine references and delayed execution.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1447.html">CVE-2010-1447</cve>
<bugzilla href="https://bugzilla.suse.com/605845">SUSE bug 605845</bugzilla>
<bugzilla href="https://bugzilla.suse.com/605926">SUSE bug 605926</bugzilla>
<bugzilla href="https://bugzilla.suse.com/605928">SUSE bug 605928</bugzilla>
<bugzilla href="https://bugzilla.suse.com/634562">SUSE bug 634562</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199743" comment="perl-5.10.0-64.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199744" comment="perl-32bit-5.10.0-64.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199745" comment="perl-Module-Build-0.2808.01-0.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199746" comment="perl-Test-Simple-0.72-0.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199747" comment="perl-base-5.10.0-64.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199748" comment="perl-doc-5.10.0-64.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199749" comment="perl-x86-5.10.0-64.67 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1452</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1452" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1452" source="CVE"/>
    <description>
    The (1) mod_cache and (2) mod_dav modules in the Apache HTTP Server 2.2.x before 2.2.16 allow remote attackers to cause a denial of service (process crash) via a request that lacks a path.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1452.html">CVE-2010-1452</cve>
<bugzilla href="https://bugzilla.suse.com/627030">SUSE bug 627030</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199288" comment="apache2-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199289" comment="apache2-doc-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199290" comment="apache2-example-pages-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199291" comment="apache2-prefork-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199292" comment="apache2-utils-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199293" comment="apache2-worker-2.2.12-1.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1455</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1455" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1455" source="CVE"/>
    <description>
    The DOCSIS dissector in Wireshark 0.9.6 through 1.0.12 and 1.2.0 through 1.2.7 allows user-assisted remote attackers to cause a denial of service (application crash) via a malformed packet trace file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1455.html">CVE-2010-1455</cve>
<bugzilla href="https://bugzilla.suse.com/603251">SUSE bug 603251</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1459</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1459" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1459" source="CVE"/>
    <description>
    The default configuration of ASP.NET in Mono before 2.6.4 has a value of FALSE for the EnableViewStateMac property, which allows remote attackers to conduct cross-site scripting (XSS) attacks, as demonstrated by the __VIEWSTATE parameter to 2.0/menu/menu1.aspx in the XSP sample project.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1459.html">CVE-2010-1459</cve>
<bugzilla href="https://bugzilla.suse.com/592428">SUSE bug 592428</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199124" comment="mono-core-2.6.7-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199125" comment="mono-data-2.6.7-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199126" comment="mono-data-postgresql-2.6.7-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199127" comment="mono-data-sqlite-2.6.7-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199128" comment="mono-locale-extras-2.6.7-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199129" comment="mono-nunit-2.6.7-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199130" comment="mono-web-2.6.7-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199131" comment="mono-winforms-2.6.7-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1526</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1526" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1526" source="CVE"/>
    <description>
    Multiple integer overflows in libgdiplus 2.6.7, as used in Mono, allow attackers to execute arbitrary code via (1) a crafted TIFF file, related to the gdip_load_tiff_image function in tiffcodec.c; (2) a crafted JPEG file, related to the gdip_load_jpeg_image_internal function in jpegcodec.c; or (3) a crafted BMP file, related to the gdip_read_bmp_image function in bmpcodec.c, leading to heap-based buffer overflows.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1526.html">CVE-2010-1526</cve>
<bugzilla href="https://bugzilla.suse.com/630756">SUSE bug 630756</bugzilla>
<bugzilla href="https://bugzilla.suse.com/643999">SUSE bug 643999</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199016" comment="libgdiplus0-2.6.7-0.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1585</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1585" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1585" source="CVE"/>
    <description>
    The nsIScriptableUnescapeHTML.parseFragment method in the ParanoidFragmentSink protection mechanism in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, Thunderbird before 3.1.8, and SeaMonkey before 2.0.12 does not properly sanitize HTML in a chrome document, which makes it easier for remote attackers to execute arbitrary JavaScript with chrome privileges via a javascript: URI in input to an extension, as demonstrated by a javascript:alert sequence in (1) the HREF attribute of an A element or (2) the ACTION attribute of a FORM element.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1585.html">CVE-2010-1585</cve>
<bugzilla href="https://bugzilla.suse.com/667155">SUSE bug 667155</bugzilla>
<bugzilla href="https://bugzilla.suse.com/679570">SUSE bug 679570</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1623</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1623" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1623" source="CVE"/>
    <description>
    Memory leak in the apr_brigade_split_line function in buckets/apr_brigade.c in the Apache Portable Runtime Utility library (aka APR-util) before 1.3.10, as used in the mod_reqtimeout module in the Apache HTTP Server and other software, allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors related to the destruction of an APR bucket.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1623.html">CVE-2010-1623</cve>
<bugzilla href="https://bugzilla.suse.com/650435">SUSE bug 650435</bugzilla>
<bugzilla href="https://bugzilla.suse.com/693778">SUSE bug 693778</bugzilla>
<bugzilla href="https://bugzilla.suse.com/725950">SUSE bug 725950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/997229">SUSE bug 997229</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198997" comment="libapr-util1-1.3.4-12.22.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198998" comment="libapr-util1-32bit-1.3.4-12.22.21 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1626</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1626" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1626" source="CVE"/>
    <description>
    MySQL before 5.1.46 allows local users to delete the data and index files of another user's MyISAM table via a symlink attack in conjunction with the DROP TABLE command, a different vulnerability than CVE-2008-4098 and CVE-2008-7247.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1626.html">CVE-2010-1626</cve>
<bugzilla href="https://bugzilla.suse.com/604528">SUSE bug 604528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/607466">SUSE bug 607466</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199635" comment="mysql-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199636" comment="mysql-client-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199637" comment="mysql-tools-5.5.31-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1635</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1635" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1635" source="CVE"/>
    <description>
    The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 field value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1635.html">CVE-2010-1635</cve>
<bugzilla href="https://bugzilla.suse.com/605935">SUSE bug 605935</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199555" comment="ldapsmb-1.34b-12.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199556" comment="libldb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199557" comment="libsmbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199558" comment="libsmbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199559" comment="libsmbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199560" comment="libtalloc2-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199561" comment="libtalloc2-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199562" comment="libtalloc2-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199563" comment="libtdb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199564" comment="libtdb1-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199565" comment="libtdb1-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199566" comment="libtevent0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199567" comment="libwbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199568" comment="libwbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199569" comment="libwbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199570" comment="samba-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199571" comment="samba-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199572" comment="samba-client-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199573" comment="samba-client-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199574" comment="samba-client-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199575" comment="samba-krb-printing-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199576" comment="samba-winbind-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199577" comment="samba-winbind-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199578" comment="samba-winbind-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199579" comment="samba-x86-3.6.3-0.39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1641</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1641" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1641" source="CVE"/>
    <description>
    The do_gfs2_set_flags function in fs/gfs2/file.c in the Linux kernel before 2.6.34-git10 does not verify the ownership of a file, which allows local users to bypass intended access restrictions via a SETFLAGS ioctl request.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1641.html">CVE-2010-1641</cve>
<bugzilla href="https://bugzilla.suse.com/608576">SUSE bug 608576</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1642</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1642" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1642" source="CVE"/>
    <description>
    The reply_sesssetup_and_X_spnego function in sesssetup.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to trigger an out-of-bounds read, and cause a denial of service (process crash), via a \xff\xff security blob length in a Session Setup AndX request.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1642.html">CVE-2010-1642</cve>
<bugzilla href="https://bugzilla.suse.com/605935">SUSE bug 605935</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199555" comment="ldapsmb-1.34b-12.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199556" comment="libldb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199557" comment="libsmbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199558" comment="libsmbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199559" comment="libsmbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199560" comment="libtalloc2-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199561" comment="libtalloc2-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199562" comment="libtalloc2-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199563" comment="libtdb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199564" comment="libtdb1-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199565" comment="libtdb1-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199566" comment="libtevent0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199567" comment="libwbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199568" comment="libwbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199569" comment="libwbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199570" comment="samba-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199571" comment="samba-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199572" comment="samba-client-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199573" comment="samba-client-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199574" comment="samba-client-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199575" comment="samba-krb-printing-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199576" comment="samba-winbind-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199577" comment="samba-winbind-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199578" comment="samba-winbind-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199579" comment="samba-x86-3.6.3-0.39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1674</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1674" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1674" source="CVE"/>
    <description>
    The extended-community parser in bgpd in Quagga before 0.99.18 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed Extended Communities attribute.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1674.html">CVE-2010-1674</cve>
<bugzilla href="https://bugzilla.suse.com/654270">SUSE bug 654270</bugzilla>
<bugzilla href="https://bugzilla.suse.com/685558">SUSE bug 685558</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199766" comment="quagga-0.99.15-0.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1675</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1675" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1675" source="CVE"/>
    <description>
    bgpd in Quagga before 0.99.18 allows remote attackers to cause a denial of service (session reset) via a malformed AS_PATHLIMIT path attribute.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1675.html">CVE-2010-1675</cve>
<bugzilla href="https://bugzilla.suse.com/654270">SUSE bug 654270</bugzilla>
<bugzilla href="https://bugzilla.suse.com/685558">SUSE bug 685558</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199766" comment="quagga-0.99.15-0.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1693</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1693" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1693" source="CVE"/>
    <description>
    openibd in OpenFabrics Enterprise Distribution (OFED) 1.5.2 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/ib_set_node_desc.sh temporary file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1693.html">CVE-2010-1693</cve>
<bugzilla href="https://bugzilla.suse.com/648551">SUSE bug 648551</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199724" comment="ofed-1.5.4.1-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199725" comment="ofed-doc-1.5.4.1-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199726" comment="ofed-kmp-default-1.5.4.1_3.0.76_0.11-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199727" comment="ofed-kmp-pae-1.5.4.1_3.0.76_0.11-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199728" comment="ofed-kmp-ppc64-1.5.4.1_3.0.76_0.11-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199729" comment="ofed-kmp-trace-1.5.4.1_3.0.76_0.11-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1748</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1748" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1748" source="CVE"/>
    <description>
    The cgi_initialize_string function in cgi-bin/var.c in the web interface in CUPS before 1.4.4, as used on Apple Mac OS X 10.5.8, Mac OS X 10.6 before 10.6.4, and other platforms, does not properly handle parameter values containing a % (percent) character without two subsequent hex characters, which allows context-dependent attackers to obtain sensitive information from cupsd process memory via a crafted request, as demonstrated by the (1) /admin?OP=redirect&amp;URL=% and (2) /admin?URL=/admin/&amp;OP=% URIs.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1748.html">CVE-2010-1748</cve>
<bugzilla href="https://bugzilla.suse.com/601352">SUSE bug 601352</bugzilla>
<bugzilla href="https://bugzilla.suse.com/604271">SUSE bug 604271</bugzilla>
<bugzilla href="https://bugzilla.suse.com/644521">SUSE bug 644521</bugzilla>
<bugzilla href="https://bugzilla.suse.com/649256">SUSE bug 649256</bugzilla>
<bugzilla href="https://bugzilla.suse.com/657780">SUSE bug 657780</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199386" comment="cups-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199387" comment="cups-client-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199388" comment="cups-libs-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199389" comment="cups-libs-32bit-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199390" comment="cups-libs-x86-1.3.9-8.46.46 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1848</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1848" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1848" source="CVE"/>
    <description>
    Directory traversal vulnerability in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote authenticated users to bypass intended table grants to read field definitions of arbitrary tables, and on 5.1 to read or delete content of arbitrary tables, via a .. (dot dot) in a table name.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1848.html">CVE-2010-1848</cve>
<bugzilla href="https://bugzilla.suse.com/604528">SUSE bug 604528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/609551">SUSE bug 609551</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199635" comment="mysql-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199636" comment="mysql-client-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199637" comment="mysql-tools-5.5.31-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1849</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1849" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1849" source="CVE"/>
    <description>
    The my_net_skip_rest function in sql/net_serv.cc in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by sending a large number of packets that exceed the maximum length.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1849.html">CVE-2010-1849</cve>
<bugzilla href="https://bugzilla.suse.com/604528">SUSE bug 604528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/609551">SUSE bug 609551</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199635" comment="mysql-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199636" comment="mysql-client-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199637" comment="mysql-tools-5.5.31-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1850</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1850" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1850" source="CVE"/>
    <description>
    Buffer overflow in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote authenticated users to execute arbitrary code via a COM_FIELD_LIST command with a long table name.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1850.html">CVE-2010-1850</cve>
<bugzilla href="https://bugzilla.suse.com/604528">SUSE bug 604528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/609551">SUSE bug 609551</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199635" comment="mysql-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199636" comment="mysql-client-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199637" comment="mysql-tools-5.5.31-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1869</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-1869" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1869" source="CVE"/>
    <description>
    Stack-based buffer overflow in the parser function in GhostScript 8.70 and 8.64 allows context-dependent attackers to execute arbitrary code via a crafted PostScript file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1869.html">CVE-2010-1869</cve>
<bugzilla href="https://bugzilla.suse.com/605043">SUSE bug 605043</bugzilla>
<bugzilla href="https://bugzilla.suse.com/739737">SUSE bug 739737</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199436" comment="ghostscript-fonts-other-8.62-32.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199437" comment="ghostscript-fonts-rus-8.62-32.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199438" comment="ghostscript-fonts-std-8.62-32.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199439" comment="ghostscript-library-8.62-32.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199440" comment="ghostscript-omni-8.62-32.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199441" comment="ghostscript-x11-8.62-32.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199442" comment="libgimpprint-4.2.7-32.34 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2063</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2063" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2063" source="CVE"/>
    <description>
    Buffer overflow in the SMB1 packet chaining implementation in the chain_reply function in process.c in smbd in Samba 3.0.x before 3.3.13 allows remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted field in a packet.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2063.html">CVE-2010-2063</cve>
<bugzilla href="https://bugzilla.suse.com/611927">SUSE bug 611927</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199555" comment="ldapsmb-1.34b-12.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199556" comment="libldb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199557" comment="libsmbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199558" comment="libsmbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199559" comment="libsmbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199560" comment="libtalloc2-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199561" comment="libtalloc2-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199562" comment="libtalloc2-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199563" comment="libtdb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199564" comment="libtdb1-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199565" comment="libtdb1-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199566" comment="libtevent0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199567" comment="libwbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199568" comment="libwbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199569" comment="libwbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199570" comment="samba-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199571" comment="samba-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199572" comment="samba-client-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199573" comment="samba-client-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199574" comment="samba-client-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199575" comment="samba-krb-printing-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199576" comment="samba-winbind-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199577" comment="samba-winbind-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199578" comment="samba-winbind-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199579" comment="samba-x86-3.6.3-0.39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2066</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2066" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2066" source="CVE"/>
    <description>
    The mext_check_arguments function in fs/ext4/move_extent.c in the Linux kernel before 2.6.35 allows local users to overwrite an append-only file via a MOVE_EXT ioctl call that specifies this file as a donor.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2066.html">CVE-2010-2066</cve>
<bugzilla href="https://bugzilla.suse.com/612457">SUSE bug 612457</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2068</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2068" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2068" source="CVE"/>
    <description>
    mod_proxy_http.c in mod_proxy_http in the Apache HTTP Server 2.2.9 through 2.2.15, 2.3.4-alpha, and 2.3.5-alpha on Windows, NetWare, and OS/2, in certain configurations involving proxy worker pools, does not properly detect timeouts, which allows remote attackers to obtain a potentially sensitive response intended for a different client in opportunistic circumstances via a normal HTTP request.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2068.html">CVE-2010-2068</cve>
<bugzilla href="https://bugzilla.suse.com/627030">SUSE bug 627030</bugzilla>
<bugzilla href="https://bugzilla.suse.com/627387">SUSE bug 627387</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199288" comment="apache2-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199289" comment="apache2-doc-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199290" comment="apache2-example-pages-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199291" comment="apache2-prefork-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199292" comment="apache2-utils-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199293" comment="apache2-worker-2.2.12-1.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2074</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2010-2074" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2074" source="CVE"/>
    <description>
    istream.c in w3m 0.5.2 and possibly other versions, when ssl_verify_server is enabled, does not properly handle a '\0' character in a domain name in the (1) subject's Common Name or (2) Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2074.html">CVE-2010-2074</cve>
<bugzilla href="https://bugzilla.suse.com/609451">SUSE bug 609451</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199246" comment="w3m-0.5.2-132.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210870" comment="w3m-0.5.3.git20161120-4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2225</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2225" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2225" source="CVE"/>
    <description>
    Use-after-free vulnerability in the SplObjectStorage unserializer in PHP 5.2.x and 5.3.x through 5.3.2 allows remote attackers to execute arbitrary code or obtain sensitive information via serialized data, related to the PHP unserialize function.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2225.html">CVE-2010-2225</cve>
<bugzilla href="https://bugzilla.suse.com/616232">SUSE bug 616232</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199294" comment="apache2-mod_php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199295" comment="php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199296" comment="php53-bcmath-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199297" comment="php53-bz2-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199298" comment="php53-calendar-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199299" comment="php53-ctype-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199300" comment="php53-curl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199301" comment="php53-dba-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199302" comment="php53-dom-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199303" comment="php53-exif-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199304" comment="php53-fastcgi-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199305" comment="php53-fileinfo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199306" comment="php53-ftp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199307" comment="php53-gd-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199308" comment="php53-gettext-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199309" comment="php53-gmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199310" comment="php53-iconv-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199311" comment="php53-intl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199312" comment="php53-json-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199313" comment="php53-ldap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199314" comment="php53-mbstring-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199315" comment="php53-mcrypt-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199316" comment="php53-mysql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199317" comment="php53-odbc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199318" comment="php53-openssl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199319" comment="php53-pcntl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199320" comment="php53-pdo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199321" comment="php53-pear-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199322" comment="php53-pgsql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199323" comment="php53-pspell-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199324" comment="php53-shmop-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199325" comment="php53-snmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199326" comment="php53-soap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199327" comment="php53-suhosin-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199328" comment="php53-sysvmsg-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199329" comment="php53-sysvsem-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199330" comment="php53-sysvshm-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199331" comment="php53-tokenizer-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199332" comment="php53-wddx-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199333" comment="php53-xmlreader-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199334" comment="php53-xmlrpc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199335" comment="php53-xmlwriter-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199336" comment="php53-xsl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199337" comment="php53-zip-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199338" comment="php53-zlib-5.3.17-0.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2227</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2227" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2227" source="CVE"/>
    <description>
    Apache Tomcat 5.5.0 through 5.5.29, 6.0.0 through 6.0.27, and 7.0.0 beta does not properly handle an invalid Transfer-Encoding header, which allows remote attackers to cause a denial of service (application outage) or obtain sensitive information via a crafted header that interferes with "recycling of a buffer."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2227.html">CVE-2010-2227</cve>
<bugzilla href="https://bugzilla.suse.com/622188">SUSE bug 622188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/655440">SUSE bug 655440</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199802" comment="tomcat6-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199803" comment="tomcat6-admin-webapps-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199804" comment="tomcat6-docs-webapp-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199805" comment="tomcat6-javadoc-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199806" comment="tomcat6-jsp-2_1-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199807" comment="tomcat6-lib-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199808" comment="tomcat6-servlet-2_5-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199809" comment="tomcat6-webapps-6.0.18-20.35.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2240</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2240" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2240" source="CVE"/>
    <description>
    The do_anonymous_page function in mm/memory.c in the Linux kernel before 2.6.27.52, 2.6.32.x before 2.6.32.19, 2.6.34.x before 2.6.34.4, and 2.6.35.x before 2.6.35.2 does not properly separate the stack and the heap, which allows context-dependent attackers to execute arbitrary code by writing to the bottom page of a shared memory segment, as demonstrated by a memory-exhaustion attack against the X.Org X server.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2240.html">CVE-2010-2240</cve>
<bugzilla href="https://bugzilla.suse.com/1039348">SUSE bug 1039348</bugzilla>
<bugzilla href="https://bugzilla.suse.com/211997">SUSE bug 211997</bugzilla>
<bugzilla href="https://bugzilla.suse.com/546062">SUSE bug 546062</bugzilla>
<bugzilla href="https://bugzilla.suse.com/59807">SUSE bug 59807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/615929">SUSE bug 615929</bugzilla>
<bugzilla href="https://bugzilla.suse.com/618152">SUSE bug 618152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/632737">SUSE bug 632737</bugzilla>
<bugzilla href="https://bugzilla.suse.com/643986">SUSE bug 643986</bugzilla>
<bugzilla href="https://bugzilla.suse.com/746947">SUSE bug 746947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/746949">SUSE bug 746949</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199825" comment="xorg-x11-Xvnc-7.4-27.81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199826" comment="xorg-x11-server-7.4-27.81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199831" comment="xorg-x11-server-dmx-7.3.99-17.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199827" comment="xorg-x11-server-extra-7.4-27.81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199832" comment="xorg-x11-server-rdp-7.3.99-3.20 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2242</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2242" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2242" source="CVE"/>
    <description>
    Red Hat libvirt 0.2.0 through 0.8.2 creates iptables rules with improper mappings of privileged source ports, which allows guest OS users to bypass intended access restrictions by leveraging IP address and source-port values, as demonstrated by copying and deleting an NFS directory tree.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2242.html">CVE-2010-2242</cve>
<bugzilla href="https://bugzilla.suse.com/618155">SUSE bug 618155</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199692" comment="libvirt-1.0.5.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199693" comment="libvirt-client-1.0.5.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199694" comment="libvirt-client-32bit-1.0.5.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199695" comment="libvirt-doc-1.0.5.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199696" comment="libvirt-lock-sanlock-1.0.5.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199697" comment="libvirt-python-1.0.5.1-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2249</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2249" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2249" source="CVE"/>
    <description>
    Memory leak in pngrutil.c in libpng before 1.2.44, and 1.4.x before 1.4.3, allows remote attackers to cause a denial of service (memory consumption and application crash) via a PNG image containing malformed Physical Scale (aka sCAL) chunks.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2249.html">CVE-2010-2249</cve>
<bugzilla href="https://bugzilla.suse.com/617866">SUSE bug 617866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/639941">SUSE bug 639941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/854395">SUSE bug 854395</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199646" comment="libpng12-0-1.2.31-5.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199647" comment="libpng12-0-32bit-1.2.31-5.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199648" comment="libpng12-0-x86-1.2.31-5.31 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2431</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2431" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2431" source="CVE"/>
    <description>
    The cupsFileOpen function in CUPS before 1.4.4 allows local users, with lp group membership, to overwrite arbitrary files via a symlink attack on the (1) /var/cache/cups/remote.cache or (2) /var/cache/cups/job.cache file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2431.html">CVE-2010-2431</cve>
<bugzilla href="https://bugzilla.suse.com/601830">SUSE bug 601830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/671735">SUSE bug 671735</bugzilla>
<bugzilla href="https://bugzilla.suse.com/680210">SUSE bug 680210</bugzilla>
<bugzilla href="https://bugzilla.suse.com/680212">SUSE bug 680212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/700987">SUSE bug 700987</bugzilla>
<bugzilla href="https://bugzilla.suse.com/711490">SUSE bug 711490</bugzilla>
<bugzilla href="https://bugzilla.suse.com/715643">SUSE bug 715643</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199386" comment="cups-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199387" comment="cups-client-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199388" comment="cups-libs-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199389" comment="cups-libs-32bit-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199390" comment="cups-libs-x86-1.3.9-8.46.46 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2432</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2432" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2432" source="CVE"/>
    <description>
    The cupsDoAuthentication function in auth.c in the client in CUPS before 1.4.4, when HAVE_GSSAPI is omitted, does not properly handle a demand for authorization, which allows remote CUPS servers to cause a denial of service (infinite loop) via HTTP_UNAUTHORIZED responses.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2432.html">CVE-2010-2432</cve>
<bugzilla href="https://bugzilla.suse.com/601830">SUSE bug 601830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/680210">SUSE bug 680210</bugzilla>
<bugzilla href="https://bugzilla.suse.com/680212">SUSE bug 680212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/700987">SUSE bug 700987</bugzilla>
<bugzilla href="https://bugzilla.suse.com/711490">SUSE bug 711490</bugzilla>
<bugzilla href="https://bugzilla.suse.com/715643">SUSE bug 715643</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199386" comment="cups-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199387" comment="cups-client-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199388" comment="cups-libs-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199389" comment="cups-libs-32bit-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199390" comment="cups-libs-x86-1.3.9-8.46.46 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2497</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2497" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2497" source="CVE"/>
    <description>
    Integer underflow in glyph handling in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2497.html">CVE-2010-2497</cve>
<bugzilla href="https://bugzilla.suse.com/619562">SUSE bug 619562</bugzilla>
<bugzilla href="https://bugzilla.suse.com/635692">SUSE bug 635692</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199430" comment="freetype2-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199431" comment="freetype2-32bit-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199432" comment="freetype2-x86-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199433" comment="ft2demos-2.3.7-25.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2522</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2522" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2522" source="CVE"/>
    <description>
    The mipv6 daemon in UMIP 0.4 does not verify that netlink messages originated in the kernel, which allows local users to spoof netlink socket communication via a crafted unicast message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2522.html">CVE-2010-2522</cve>
<bugzilla href="https://bugzilla.suse.com/424311">SUSE bug 424311</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199123" comment="mipv6d-2.0.2.umip.0.4-8.7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2523</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2523" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2523" source="CVE"/>
    <description>
    Multiple buffer overflows in ha.c in the mipv6 daemon in UMIP 0.4 allow remote attackers to have an unspecified impact via a crafted (1) ND_OPT_PREFIX_INFORMATION or (2) ND_OPT_HOME_AGENT_INFO packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2523.html">CVE-2010-2523</cve>
<bugzilla href="https://bugzilla.suse.com/424311">SUSE bug 424311</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199123" comment="mipv6d-2.0.2.umip.0.4-8.7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2526</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2526" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2526" source="CVE"/>
    <description>
    The cluster logical volume manager daemon (clvmd) in lvm2-cluster in LVM2 before 2.02.72, as used in Red Hat Global File System (GFS) and other products, does not verify client credentials upon a socket connection, which allows local users to cause a denial of service (daemon exit or logical-volume change) or possibly have unspecified other impact via crafted control commands.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2526.html">CVE-2010-2526</cve>
<bugzilla href="https://bugzilla.suse.com/622537">SUSE bug 622537</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199710" comment="lvm2-2.02.98-0.25 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2547" source="CVE"/>
    <description>
    Use-after-free vulnerability in kbx/keybox-blob.c in GPGSM in GnuPG 2.x through 2.0.16 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a certificate with a large number of Subject Alternate Names, which is not properly handled in a realloc operation when importing the certificate or verifying its signature.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2547.html">CVE-2010-2547</cve>
<bugzilla href="https://bugzilla.suse.com/625947">SUSE bug 625947</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199483" comment="gpg2-2.0.9-25.33.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199484" comment="gpg2-lang-2.0.9-25.33.31 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2640</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2640" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2640" source="CVE"/>
    <description>
    Array index error in the PK font parser in the dvi-backend component in Evince 2.32 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font in conjunction with a DVI file that is processed by the thumbnailer.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2640.html">CVE-2010-2640</cve>
<bugzilla href="https://bugzilla.suse.com/660555">SUSE bug 660555</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198821" comment="evince-2.28.2-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198822" comment="evince-doc-2.28.2-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198823" comment="evince-lang-2.28.2-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2641</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2641" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2641" source="CVE"/>
    <description>
    Array index error in the VF font parser in the dvi-backend component in Evince 2.32 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font in conjunction with a DVI file that is processed by the thumbnailer.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2641.html">CVE-2010-2641</cve>
<bugzilla href="https://bugzilla.suse.com/660555">SUSE bug 660555</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198821" comment="evince-2.28.2-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198822" comment="evince-doc-2.28.2-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198823" comment="evince-lang-2.28.2-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2642</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2642" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2642" source="CVE"/>
    <description>
    Heap-based buffer overflow in the AFM font parser in the dvi-backend component in Evince 2.32 and earlier, teTeX 3.0, t1lib 5.1.2, and possibly other products allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font in conjunction with a DVI file that is processed by the thumbnailer.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2642.html">CVE-2010-2642</cve>
<bugzilla href="https://bugzilla.suse.com/660555">SUSE bug 660555</bugzilla>
<bugzilla href="https://bugzilla.suse.com/661018">SUSE bug 661018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/662411">SUSE bug 662411</bugzilla>
<bugzilla href="https://bugzilla.suse.com/664484">SUSE bug 664484</bugzilla>
<bugzilla href="https://bugzilla.suse.com/790421">SUSE bug 790421</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198821" comment="evince-2.28.2-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198822" comment="evince-doc-2.28.2-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198823" comment="evince-lang-2.28.2-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199796" comment="t1lib-5.1.1-100.21 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2643</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2643" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2643" source="CVE"/>
    <description>
    Integer overflow in the TFM font parser in the dvi-backend component in Evince 2.32 and earlier allows remote attackers to execute arbitrary code via a crafted font in conjunction with a DVI file that is processed by the thumbnailer.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2643.html">CVE-2010-2643</cve>
<bugzilla href="https://bugzilla.suse.com/660555">SUSE bug 660555</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198821" comment="evince-2.28.2-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198822" comment="evince-doc-2.28.2-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198823" comment="evince-lang-2.28.2-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2713</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2713" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2713" source="CVE"/>
    <description>
    The vte_sequence_handler_window_manipulation function in vteseq.c in libvte (aka libvte9) in VTE 0.25.1 and earlier, as used in gnome-terminal, does not properly handle escape sequences, which allows remote attackers to execute arbitrary commands or obtain potentially sensitive information via a (1) window title or (2) icon title sequence.  NOTE: this issue exists because of a CVE-2003-0070 regression.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2713.html">CVE-2010-2713</cve>
<bugzilla href="https://bugzilla.suse.com/621097">SUSE bug 621097</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199243" comment="vte-0.22.5-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199244" comment="vte-doc-0.22.5-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199245" comment="vte-lang-0.22.5-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2751</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2751" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2751" source="CVE"/>
    <description>
    The nsDocShell::OnRedirectStateChange function in docshell/base/nsDocShell.cpp in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to spoof the SSL security status of a document via vectors involving multiple requests, a redirect, and the history.back and history.forward JavaScript functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2751.html">CVE-2010-2751</cve>
<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2752</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2752" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2752" source="CVE"/>
    <description>
    Integer overflow in an array class in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 allows remote attackers to execute arbitrary code by placing many Cascading Style Sheets (CSS) values in an array, related to references to external font resources and an inconsistency between 16-bit and 32-bit integers.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2752.html">CVE-2010-2752</cve>
<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2753</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2753" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2753" source="CVE"/>
    <description>
    Integer overflow in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 allows remote attackers to execute arbitrary code via a large selection attribute in a XUL tree element, which triggers a use-after-free.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2753.html">CVE-2010-2753</cve>
<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
<bugzilla href="https://bugzilla.suse.com/637303">SUSE bug 637303</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2754</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2754" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2754" source="CVE"/>
    <description>
    dom/base/nsJSEnvironment.cpp in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 does not properly suppress a script's URL in certain circumstances involving a redirect and an error message, which allows remote attackers to obtain sensitive information about script parameters via a crafted HTML document, related to the window.onerror handler.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2754.html">CVE-2010-2754</cve>
<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2755</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2755" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2755" source="CVE"/>
    <description>
    layout/generic/nsObjectFrame.cpp in Mozilla Firefox 3.6.7 does not properly free memory in the parameter array of a plugin instance, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted HTML document, related to the DATA and SRC attributes of an OBJECT element. NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-1214.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2755.html">CVE-2010-2755</cve>
<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2760</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2760" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2760" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsTreeSelection function in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 might allow remote attackers to execute arbitrary code via vectors involving a XUL tree selection, related to a "dangling pointer vulnerability." NOTE: this issue exists because of an incomplete fix for CVE-2010-2753.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2760.html">CVE-2010-2760</cve>
<bugzilla href="https://bugzilla.suse.com/637303">SUSE bug 637303</bugzilla>
<bugzilla href="https://bugzilla.suse.com/638109">SUSE bug 638109</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2761</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2761" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2761" source="CVE"/>
    <description>
    The multipart_init function in (1) CGI.pm before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier uses a hardcoded value of the MIME boundary string in multipart/x-mixed-replace content, which allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted input that contains this value, a different vulnerability than CVE-2010-3172.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2761.html">CVE-2010-2761</cve>
<bugzilla href="https://bugzilla.suse.com/657343">SUSE bug 657343</bugzilla>
<bugzilla href="https://bugzilla.suse.com/657731">SUSE bug 657731</bugzilla>
<bugzilla href="https://bugzilla.suse.com/663396">SUSE bug 663396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/669245">SUSE bug 669245</bugzilla>
<bugzilla href="https://bugzilla.suse.com/670476">SUSE bug 670476</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199743" comment="perl-5.10.0-64.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199744" comment="perl-32bit-5.10.0-64.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199745" comment="perl-Module-Build-0.2808.01-0.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199746" comment="perl-Test-Simple-0.72-0.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199747" comment="perl-base-5.10.0-64.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199748" comment="perl-doc-5.10.0-64.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199749" comment="perl-x86-5.10.0-64.67 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2762</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2762" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2762" source="CVE"/>
    <description>
    The XPCSafeJSObjectWrapper class in the SafeJSObjectWrapper (aka SJOW) implementation in Mozilla Firefox 3.6.x before 3.6.9 and Thunderbird 3.1.x before 3.1.3 does not properly restrict objects at the end of scope chains, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via vectors related to a chrome privileged object and a chain ending in an outer object.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2762.html">CVE-2010-2762</cve>
<bugzilla href="https://bugzilla.suse.com/637303">SUSE bug 637303</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2764</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2764" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2764" source="CVE"/>
    <description>
    Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 do not properly restrict read access to the statusText property of XMLHttpRequest objects, which allows remote attackers to discover the existence of intranet web servers via cross-origin requests.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2764.html">CVE-2010-2764</cve>
<bugzilla href="https://bugzilla.suse.com/637303">SUSE bug 637303</bugzilla>
<bugzilla href="https://bugzilla.suse.com/638109">SUSE bug 638109</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2765</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2765" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2765" source="CVE"/>
    <description>
    Integer overflow in the FRAMESET element implementation in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 might allow remote attackers to execute arbitrary code via a large number of values in the cols (aka columns) attribute, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2765.html">CVE-2010-2765</cve>
<bugzilla href="https://bugzilla.suse.com/637303">SUSE bug 637303</bugzilla>
<bugzilla href="https://bugzilla.suse.com/638109">SUSE bug 638109</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2766</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2766" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2766" source="CVE"/>
    <description>
    The normalizeDocument function in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 does not properly handle the removal of DOM nodes during normalization, which might allow remote attackers to execute arbitrary code via vectors involving access to a deleted object.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2766.html">CVE-2010-2766</cve>
<bugzilla href="https://bugzilla.suse.com/637303">SUSE bug 637303</bugzilla>
<bugzilla href="https://bugzilla.suse.com/638109">SUSE bug 638109</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2767</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2767" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2767" source="CVE"/>
    <description>
    The navigator.plugins implementation in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 does not properly handle destruction of the DOM plugin array, which might allow remote attackers to cause a denial of service (application crash) or execute arbitrary code via crafted access to the navigator object, related to a "dangling pointer vulnerability."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2767.html">CVE-2010-2767</cve>
<bugzilla href="https://bugzilla.suse.com/637303">SUSE bug 637303</bugzilla>
<bugzilla href="https://bugzilla.suse.com/638109">SUSE bug 638109</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2768</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2768" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2768" source="CVE"/>
    <description>
    Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 do not properly restrict use of the type attribute of an OBJECT element to set a document's charset, which allows remote attackers to bypass cross-site scripting (XSS) protection mechanisms via UTF-7 encoding.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2768.html">CVE-2010-2768</cve>
<bugzilla href="https://bugzilla.suse.com/637303">SUSE bug 637303</bugzilla>
<bugzilla href="https://bugzilla.suse.com/638109">SUSE bug 638109</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2769</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2769" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2769" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 allows user-assisted remote attackers to inject arbitrary web script or HTML via a selection that is added to a document in which the designMode property is enabled.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2769.html">CVE-2010-2769</cve>
<bugzilla href="https://bugzilla.suse.com/637303">SUSE bug 637303</bugzilla>
<bugzilla href="https://bugzilla.suse.com/638109">SUSE bug 638109</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2798</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2798" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2798" source="CVE"/>
    <description>
    The gfs2_dirent_find_space function in fs/gfs2/dir.c in the Linux kernel before 2.6.35 uses an incorrect size value in calculations associated with sentinel directory entries, which allows local users to cause a denial of service (NULL pointer dereference and panic) and possibly have unspecified other impact by renaming a file in a GFS2 filesystem, related to the gfs2_rename function in fs/gfs2/ops_inode.c.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2798.html">CVE-2010-2798</cve>
<bugzilla href="https://bugzilla.suse.com/627386">SUSE bug 627386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2799</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2799" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2799" source="CVE"/>
    <description>
    Stack-based buffer overflow in the nestlex function in nestlex.c in Socat 1.5.0.0 through 1.7.1.2 and 2.0.0-b1 through 2.0.0-b3, when bidirectional data relay is enabled, allows context-dependent attackers to execute arbitrary code via long command-line arguments.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2799.html">CVE-2010-2799</cve>
<bugzilla href="https://bugzilla.suse.com/627475">SUSE bug 627475</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199782" comment="socat-1.7.0.0-1.16 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2803</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2803" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2803" source="CVE"/>
    <description>
    The drm_ioctl function in drivers/gpu/drm/drm_drv.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 2.6.27.53, 2.6.32.x before 2.6.32.21, 2.6.34.x before 2.6.34.6, and 2.6.35.x before 2.6.35.4 allows local users to obtain potentially sensitive information from kernel memory by requesting a large memory-allocation amount.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2803.html">CVE-2010-2803</cve>
<bugzilla href="https://bugzilla.suse.com/628604">SUSE bug 628604</bugzilla>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2805" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2805" source="CVE"/>
    <description>
    The FT_Stream_EnterFrame function in base/ftstream.c in FreeType before 2.4.2 does not properly validate certain position values, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2805.html">CVE-2010-2805</cve>
<bugzilla href="https://bugzilla.suse.com/629447">SUSE bug 629447</bugzilla>
<bugzilla href="https://bugzilla.suse.com/635692">SUSE bug 635692</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199430" comment="freetype2-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199431" comment="freetype2-32bit-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199432" comment="freetype2-x86-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199433" comment="ft2demos-2.3.7-25.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2939</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2939" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2939" source="CVE"/>
    <description>
    Double free vulnerability in the ssl3_get_key_exchange function in the OpenSSL client (ssl/s3_clnt.c) in OpenSSL 1.0.0a, 0.9.8, 0.9.7, and possibly other versions, when using ECDH, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted private key with an invalid prime.  NOTE: some sources refer to this as a use-after-free issue.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2939.html">CVE-2010-2939</cve>
<bugzilla href="https://bugzilla.suse.com/489641">SUSE bug 489641</bugzilla>
<bugzilla href="https://bugzilla.suse.com/629905">SUSE bug 629905</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199638" comment="libopenssl0_9_8-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199639" comment="libopenssl0_9_8-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199640" comment="libopenssl0_9_8-hmac-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199641" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199642" comment="libopenssl0_9_8-x86-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199643" comment="openssl-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199644" comment="openssl-doc-0.9.8j-0.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2941</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2941" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2941" source="CVE"/>
    <description>
    ipp.c in cupsd in CUPS 1.4.4 and earlier does not properly allocate memory for attribute values with invalid string data types, which allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly execute arbitrary code via a crafted IPP request.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2941.html">CVE-2010-2941</cve>
<bugzilla href="https://bugzilla.suse.com/649256">SUSE bug 649256</bugzilla>
<bugzilla href="https://bugzilla.suse.com/654627">SUSE bug 654627</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199386" comment="cups-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199387" comment="cups-client-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199388" comment="cups-libs-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199389" comment="cups-libs-32bit-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199390" comment="cups-libs-x86-1.3.9-8.46.46 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2942</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2942" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2942" source="CVE"/>
    <description>
    The actions implementation in the network queueing functionality in the Linux kernel before 2.6.36-rc2 does not properly initialize certain structure members when performing dump operations, which allows local users to obtain potentially sensitive information from kernel memory via vectors related to (1) the tcf_gact_dump function in net/sched/act_gact.c, (2) the tcf_mirred_dump function in net/sched/act_mirred.c, (3) the tcf_nat_dump function in net/sched/act_nat.c, (4) the tcf_simp_dump function in net/sched/act_simple.c, and (5) the tcf_skbedit_dump function in net/sched/act_skbedit.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2942.html">CVE-2010-2942</cve>
<bugzilla href="https://bugzilla.suse.com/632309">SUSE bug 632309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/642324">SUSE bug 642324</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102943" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2943</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2943" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2943" source="CVE"/>
    <description>
    The xfs implementation in the Linux kernel before 2.6.35 does not look up inode allocation btrees before reading inode buffers, which allows remote authenticated users to read unlinked files, or read or overwrite disk blocks that are currently assigned to an active file but were previously assigned to an unlinked file, by accessing a stale NFS filehandle.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2943.html">CVE-2010-2943</cve>
<bugzilla href="https://bugzilla.suse.com/632317">SUSE bug 632317</bugzilla>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2946</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2946" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2946" source="CVE"/>
    <description>
    fs/jfs/xattr.c in the Linux kernel before 2.6.35.2 does not properly handle a certain legacy format for storage of extended attributes, which might allow local users by bypass intended xattr namespace restrictions via an "os2." substring at the beginning of a name.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2946.html">CVE-2010-2946</cve>
<bugzilla href="https://bugzilla.suse.com/633585">SUSE bug 633585</bugzilla>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2948</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2948" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2948" source="CVE"/>
    <description>
    Stack-based buffer overflow in the bgp_route_refresh_receive function in bgp_packet.c in bgpd in Quagga before 0.99.17 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a malformed Outbound Route Filtering (ORF) record in a BGP ROUTE-REFRESH (RR) message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2948.html">CVE-2010-2948</cve>
<bugzilla href="https://bugzilla.suse.com/634300">SUSE bug 634300</bugzilla>
<bugzilla href="https://bugzilla.suse.com/654270">SUSE bug 654270</bugzilla>
<bugzilla href="https://bugzilla.suse.com/685558">SUSE bug 685558</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199766" comment="quagga-0.99.15-0.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2949</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2949" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2949" source="CVE"/>
    <description>
    bgpd in Quagga before 0.99.17 does not properly parse AS paths, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an unknown AS type in an AS path attribute in a BGP UPDATE message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2949.html">CVE-2010-2949</cve>
<bugzilla href="https://bugzilla.suse.com/634300">SUSE bug 634300</bugzilla>
<bugzilla href="https://bugzilla.suse.com/654270">SUSE bug 654270</bugzilla>
<bugzilla href="https://bugzilla.suse.com/685558">SUSE bug 685558</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199766" comment="quagga-0.99.15-0.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2950</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2950" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2950" source="CVE"/>
    <description>
    Format string vulnerability in stream.c in the phar extension in PHP 5.3.x through 5.3.3 allows context-dependent attackers to obtain sensitive information (memory contents) and possibly execute arbitrary code via a crafted phar:// URI that is not properly handled by the phar_stream_flush function, leading to errors in the php_stream_wrapper_log_error function.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-2094.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2950.html">CVE-2010-2950</cve>
<bugzilla href="https://bugzilla.suse.com/633934">SUSE bug 633934</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199294" comment="apache2-mod_php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199295" comment="php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199296" comment="php53-bcmath-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199297" comment="php53-bz2-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199298" comment="php53-calendar-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199299" comment="php53-ctype-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199300" comment="php53-curl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199301" comment="php53-dba-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199302" comment="php53-dom-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199303" comment="php53-exif-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199304" comment="php53-fastcgi-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199305" comment="php53-fileinfo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199306" comment="php53-ftp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199307" comment="php53-gd-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199308" comment="php53-gettext-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199309" comment="php53-gmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199310" comment="php53-iconv-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199311" comment="php53-intl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199312" comment="php53-json-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199313" comment="php53-ldap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199314" comment="php53-mbstring-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199315" comment="php53-mcrypt-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199316" comment="php53-mysql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199317" comment="php53-odbc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199318" comment="php53-openssl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199319" comment="php53-pcntl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199320" comment="php53-pdo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199321" comment="php53-pear-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199322" comment="php53-pgsql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199323" comment="php53-pspell-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199324" comment="php53-shmop-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199325" comment="php53-snmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199326" comment="php53-soap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199327" comment="php53-suhosin-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199328" comment="php53-sysvmsg-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199329" comment="php53-sysvsem-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199330" comment="php53-sysvshm-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199331" comment="php53-tokenizer-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199332" comment="php53-wddx-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199333" comment="php53-xmlreader-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199334" comment="php53-xmlrpc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199335" comment="php53-xmlwriter-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199336" comment="php53-xsl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199337" comment="php53-zip-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199338" comment="php53-zlib-5.3.17-0.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2954</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2954" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2954" source="CVE"/>
    <description>
    The irda_bind function in net/irda/af_irda.c in the Linux kernel before 2.6.36-rc3-next-20100901 does not properly handle failure of the irda_open_tsap function, which allows local users to cause a denial of service (NULL pointer dereference and panic) and possibly have unspecified other impact via multiple unsuccessful calls to bind on an AF_IRDA (aka PF_IRDA) socket.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2954.html">CVE-2010-2954</cve>
<bugzilla href="https://bugzilla.suse.com/636112">SUSE bug 636112</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2955</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2955" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2955" source="CVE"/>
    <description>
    The cfg80211_wext_giwessid function in net/wireless/wext-compat.c in the Linux kernel before 2.6.36-rc3-next-20100831 does not properly initialize certain structure members, which allows local users to leverage an off-by-one error in the ioctl_standard_iw_point function in net/wireless/wext-core.c, and obtain potentially sensitive information from kernel heap memory, via vectors involving an SIOCGIWESSID ioctl call that specifies a large buffer size.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2955.html">CVE-2010-2955</cve>
<bugzilla href="https://bugzilla.suse.com/635413">SUSE bug 635413</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2959</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2959" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2959" source="CVE"/>
    <description>
    Integer overflow in net/can/bcm.c in the Controller Area Network (CAN) implementation in the Linux kernel before 2.6.27.53, 2.6.32.x before 2.6.32.21, 2.6.34.x before 2.6.34.6, and 2.6.35.x before 2.6.35.4 allows attackers to execute arbitrary code or cause a denial of service (system crash) via crafted CAN traffic.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2959.html">CVE-2010-2959</cve>
<bugzilla href="https://bugzilla.suse.com/633581">SUSE bug 633581</bugzilla>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2960</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2960" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2960" source="CVE"/>
    <description>
    The keyctl_session_to_parent function in security/keys/keyctl.c in the Linux kernel 2.6.35.4 and earlier expects that a certain parent session keyring exists, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a KEYCTL_SESSION_TO_PARENT argument to the keyctl function.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2960.html">CVE-2010-2960</cve>
<bugzilla href="https://bugzilla.suse.com/634637">SUSE bug 634637</bugzilla>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2962</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2962" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2962" source="CVE"/>
    <description>
    drivers/gpu/drm/i915/i915_gem.c in the Graphics Execution Manager (GEM) in the Intel i915 driver in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 2.6.36 does not properly validate pointers to blocks of memory, which allows local users to write to arbitrary kernel memory locations, and consequently gain privileges, via crafted use of the ioctl interface, related to (1) pwrite and (2) pread operations.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2962.html">CVE-2010-2962</cve>
<bugzilla href="https://bugzilla.suse.com/642009">SUSE bug 642009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/653588">SUSE bug 653588</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2963</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2963" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2963" source="CVE"/>
    <description>
    drivers/media/video/v4l2-compat-ioctl32.c in the Video4Linux (V4L) implementation in the Linux kernel before 2.6.36 on 64-bit platforms does not validate the destination of a memory copy operation, which allows local users to write to arbitrary kernel memory locations, and consequently gain privileges, via a VIDIOCSTUNER ioctl call on a /dev/video device, followed by a VIDIOCSMICROCODE ioctl call on this device.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2963.html">CVE-2010-2963</cve>
<bugzilla href="https://bugzilla.suse.com/646045">SUSE bug 646045</bugzilla>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2992</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2992" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2992" source="CVE"/>
    <description>
    packet-gsm_a_rr.c in the GSM A RR dissector in Wireshark 1.2.2 through 1.2.9 allows remote attackers to cause a denial of service (crash) via unknown vectors that trigger a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2992.html">CVE-2010-2992</cve>
<bugzilla href="https://bugzilla.suse.com/630599">SUSE bug 630599</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2993</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2993" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2993" source="CVE"/>
    <description>
    The IPMI dissector in Wireshark 1.2.0 through 1.2.9 allows remote attackers to cause a denial of service (infinite loop) via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2993.html">CVE-2010-2993</cve>
<bugzilla href="https://bugzilla.suse.com/630599">SUSE bug 630599</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2994</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2994" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2994" source="CVE"/>
    <description>
    Stack-based buffer overflow in the ASN.1 BER dissector in Wireshark 0.10.13 through 1.0.14 and 1.2.0 through 1.2.9 has unknown impact and remote attack vectors.  NOTE: this issue exists because of a CVE-2010-2284 regression.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2994.html">CVE-2010-2994</cve>
<bugzilla href="https://bugzilla.suse.com/630599">SUSE bug 630599</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2995</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-2995" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2995" source="CVE"/>
    <description>
    The SigComp Universal Decompressor Virtual Machine (UDVM) in Wireshark 0.10.8 through 1.0.14 and 1.2.0 through 1.2.9 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to sigcomp-udvm.c and an off-by-one error, which triggers a buffer overflow, different vulnerabilities than CVE-2010-2287.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2995.html">CVE-2010-2995</cve>
<bugzilla href="https://bugzilla.suse.com/630599">SUSE bug 630599</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3015</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3015" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3015" source="CVE"/>
    <description>
    Integer overflow in the ext4_ext_get_blocks function in fs/ext4/extents.c in the Linux kernel before 2.6.34 allows local users to cause a denial of service (BUG and system crash) via a write operation on the last block of a large file, followed by a sync operation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3015.html">CVE-2010-3015</cve>
<bugzilla href="https://bugzilla.suse.com/631801">SUSE bug 631801</bugzilla>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3053</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3053" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3053" source="CVE"/>
    <description>
    bdf/bdflib.c in FreeType before 2.4.2 allows remote attackers to cause a denial of service (application crash) via a crafted BDF font file, related to an attempted modification of a value in a static string.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3053.html">CVE-2010-3053</cve>
<bugzilla href="https://bugzilla.suse.com/633938">SUSE bug 633938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/635692">SUSE bug 635692</bugzilla>
<bugzilla href="https://bugzilla.suse.com/645982">SUSE bug 645982</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199430" comment="freetype2-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199431" comment="freetype2-32bit-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199432" comment="freetype2-x86-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199433" comment="ft2demos-2.3.7-25.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3054</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3054" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3054" source="CVE"/>
    <description>
    Unspecified vulnerability in FreeType 2.3.9, and other versions before 2.4.2, allows remote attackers to cause a denial of service via vectors involving nested Standard Encoding Accented Character (aka seac) calls, related to psaux.h, cffgload.c, cffgload.h, and t1decode.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3054.html">CVE-2010-3054</cve>
<bugzilla href="https://bugzilla.suse.com/633943">SUSE bug 633943</bugzilla>
<bugzilla href="https://bugzilla.suse.com/635692">SUSE bug 635692</bugzilla>
<bugzilla href="https://bugzilla.suse.com/645982">SUSE bug 645982</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199430" comment="freetype2-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199431" comment="freetype2-32bit-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199432" comment="freetype2-x86-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199433" comment="ft2demos-2.3.7-25.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3069</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3069" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3069" source="CVE"/>
    <description>
    Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3069.html">CVE-2010-3069</cve>
<bugzilla href="https://bugzilla.suse.com/637218">SUSE bug 637218</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199555" comment="ldapsmb-1.34b-12.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199556" comment="libldb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199557" comment="libsmbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199558" comment="libsmbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199559" comment="libsmbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199560" comment="libtalloc2-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199561" comment="libtalloc2-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199562" comment="libtalloc2-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199563" comment="libtdb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199564" comment="libtdb1-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199565" comment="libtdb1-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199566" comment="libtevent0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199567" comment="libwbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199568" comment="libwbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199569" comment="libwbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199570" comment="samba-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199571" comment="samba-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199572" comment="samba-client-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199573" comment="samba-client-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199574" comment="samba-client-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199575" comment="samba-krb-printing-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199576" comment="samba-winbind-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199577" comment="samba-winbind-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199578" comment="samba-winbind-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199579" comment="samba-x86-3.6.3-0.39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3078</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3078" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3078" source="CVE"/>
    <description>
    The xfs_ioc_fsgetxattr function in fs/xfs/linux-2.6/xfs_ioctl.c in the Linux kernel before 2.6.36-rc4 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an ioctl call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3078.html">CVE-2010-3078</cve>
<bugzilla href="https://bugzilla.suse.com/637436">SUSE bug 637436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3079</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3079" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3079" source="CVE"/>
    <description>
    kernel/trace/ftrace.c in the Linux kernel before 2.6.35.5, when debugfs is enabled, does not properly handle interaction between mutex possession and llseek operations, which allows local users to cause a denial of service (NULL pointer dereference and outage of all function tracing files) via an lseek call on a file descriptor associated with the set_ftrace_filter file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3079.html">CVE-2010-3079</cve>
<bugzilla href="https://bugzilla.suse.com/637502">SUSE bug 637502</bugzilla>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3080</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3080" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3080" source="CVE"/>
    <description>
    Double free vulnerability in the snd_seq_oss_open function in sound/core/seq/oss/seq_oss_init.c in the Linux kernel before 2.6.36-rc4 might allow local users to cause a denial of service or possibly have unspecified other impact via an unsuccessful attempt to open the /dev/sequencer device.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3080.html">CVE-2010-3080</cve>
<bugzilla href="https://bugzilla.suse.com/638277">SUSE bug 638277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3081</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3081" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3081" source="CVE"/>
    <description>
    The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a "stack pointer underflow" issue, as exploited in the wild in September 2010.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3081.html">CVE-2010-3081</cve>
<bugzilla href="https://bugzilla.suse.com/639709">SUSE bug 639709</bugzilla>
<bugzilla href="https://bugzilla.suse.com/641575">SUSE bug 641575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3084</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3084" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3084" source="CVE"/>
    <description>
    Buffer overflow in the niu_get_ethtool_tcam_all function in drivers/net/niu.c in the Linux kernel before 2.6.36-rc4 allows local users to cause a denial of service or possibly have unspecified other impact via the ETHTOOL_GRXCLSRLALL ethtool command.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3084.html">CVE-2010-3084</cve>
<bugzilla href="https://bugzilla.suse.com/638274">SUSE bug 638274</bugzilla>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3089</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3089" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3089" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in GNU Mailman before 2.1.14rc1 allow remote authenticated users to inject arbitrary web script or HTML via vectors involving (1) the list information field or (2) the list description field.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3089.html">CVE-2010-3089</cve>
<bugzilla href="https://bugzilla.suse.com/637295">SUSE bug 637295</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199711" comment="mailman-2.1.14-9.6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3090</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3090" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3090" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2010-3089. Reason: This issue was MERGED into CVE-2010-3089 in accordance with CVE content decisions, because it is the same type of vulnerability and affects the same versions.  Notes: All CVE users should reference CVE-2010-3089 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3090.html">CVE-2010-3090</cve>
<bugzilla href="https://bugzilla.suse.com/637295">SUSE bug 637295</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199711" comment="mailman-2.1.14-9.6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3166</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3166" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3166" source="CVE"/>
    <description>
    Heap-based buffer overflow in the nsTextFrameUtils::TransformText function in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 might allow remote attackers to execute arbitrary code via a bidirectional text run.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3166.html">CVE-2010-3166</cve>
<bugzilla href="https://bugzilla.suse.com/637303">SUSE bug 637303</bugzilla>
<bugzilla href="https://bugzilla.suse.com/638109">SUSE bug 638109</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3167</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3167" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3167" source="CVE"/>
    <description>
    The nsTreeContentView function in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 does not properly handle node removal in XUL trees, which allows remote attackers to execute arbitrary code via vectors involving access to deleted memory, related to a "dangling pointer vulnerability."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3167.html">CVE-2010-3167</cve>
<bugzilla href="https://bugzilla.suse.com/637303">SUSE bug 637303</bugzilla>
<bugzilla href="https://bugzilla.suse.com/638109">SUSE bug 638109</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3168</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3168" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3168" source="CVE"/>
    <description>
    Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 do not properly restrict the role of property changes in triggering XUL tree removal, which allows remote attackers to cause a denial of service (deleted memory access and application crash) or possibly execute arbitrary code by setting unspecified properties.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3168.html">CVE-2010-3168</cve>
<bugzilla href="https://bugzilla.suse.com/637303">SUSE bug 637303</bugzilla>
<bugzilla href="https://bugzilla.suse.com/638109">SUSE bug 638109</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3169</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3169" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3169" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3169.html">CVE-2010-3169</cve>
<bugzilla href="https://bugzilla.suse.com/637303">SUSE bug 637303</bugzilla>
<bugzilla href="https://bugzilla.suse.com/638109">SUSE bug 638109</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3170</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3170" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3170" source="CVE"/>
    <description>
    Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 recognize a wildcard IP address in the subject's Common Name field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3170.html">CVE-2010-3170</cve>
<bugzilla href="https://bugzilla.suse.com/637290">SUSE bug 637290</bugzilla>
<bugzilla href="https://bugzilla.suse.com/645315">SUSE bug 645315</bugzilla>
<bugzilla href="https://bugzilla.suse.com/652858">SUSE bug 652858</bugzilla>
<bugzilla href="https://bugzilla.suse.com/868629">SUSE bug 868629</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199616" comment="libfreebl3-3.14.3-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199617" comment="libfreebl3-32bit-3.14.3-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199618" comment="libfreebl3-x86-3.14.3-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199619" comment="libsoftokn3-3.14.3-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199620" comment="libsoftokn3-32bit-3.14.3-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199621" comment="libsoftokn3-x86-3.14.3-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199622" comment="mozilla-nss-3.14.3-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199623" comment="mozilla-nss-32bit-3.14.3-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199624" comment="mozilla-nss-tools-3.14.3-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199625" comment="mozilla-nss-x86-3.14.3-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3173</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3173" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3173" source="CVE"/>
    <description>
    The SSL implementation in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 does not properly set the minimum key length for Diffie-Hellman Ephemeral (DHE) mode, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via a brute-force attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3173.html">CVE-2010-3173</cve>
<bugzilla href="https://bugzilla.suse.com/645315">SUSE bug 645315</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3174</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3174" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3174" source="CVE"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.14, Thunderbird before 3.0.9, and SeaMonkey before 2.0.9 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3174.html">CVE-2010-3174</cve>
<bugzilla href="https://bugzilla.suse.com/645315">SUSE bug 645315</bugzilla>
<bugzilla href="https://bugzilla.suse.com/652858">SUSE bug 652858</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3175</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3175" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3175" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.6.x before 3.6.11 and Thunderbird 3.1.x before 3.1.5 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3175.html">CVE-2010-3175</cve>
<bugzilla href="https://bugzilla.suse.com/645315">SUSE bug 645315</bugzilla>
<bugzilla href="https://bugzilla.suse.com/652858">SUSE bug 652858</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3176</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3176" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3176" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3176.html">CVE-2010-3176</cve>
<bugzilla href="https://bugzilla.suse.com/645315">SUSE bug 645315</bugzilla>
<bugzilla href="https://bugzilla.suse.com/652858">SUSE bug 652858</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3177</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3177" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3177" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in the Gopher parser in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, and SeaMonkey before 2.0.9, allow remote attackers to inject arbitrary web script or HTML via a crafted name of a (1) file or (2) directory on a Gopher server.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3177.html">CVE-2010-3177</cve>
<bugzilla href="https://bugzilla.suse.com/645315">SUSE bug 645315</bugzilla>
<bugzilla href="https://bugzilla.suse.com/652858">SUSE bug 652858</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3178</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3178" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3178" source="CVE"/>
    <description>
    Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 do not properly handle certain modal calls made by javascript: URLs in circumstances related to opening a new window and performing cross-domain navigation, which allows remote attackers to bypass the Same Origin Policy via a crafted HTML document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3178.html">CVE-2010-3178</cve>
<bugzilla href="https://bugzilla.suse.com/645315">SUSE bug 645315</bugzilla>
<bugzilla href="https://bugzilla.suse.com/652858">SUSE bug 652858</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3179</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3179" source="CVE"/>
    <description>
    Stack-based buffer overflow in the text-rendering functionality in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a long argument to the document.write method.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3179.html">CVE-2010-3179</cve>
<bugzilla href="https://bugzilla.suse.com/645315">SUSE bug 645315</bugzilla>
<bugzilla href="https://bugzilla.suse.com/652858">SUSE bug 652858</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3180</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3180" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsBarProp function in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 allows remote attackers to execute arbitrary code by accessing the locationbar property of a closed window.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3180.html">CVE-2010-3180</cve>
<bugzilla href="https://bugzilla.suse.com/645315">SUSE bug 645315</bugzilla>
<bugzilla href="https://bugzilla.suse.com/652858">SUSE bug 652858</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3182" source="CVE"/>
    <description>
    A certain application-launch script in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 on Linux places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3182.html">CVE-2010-3182</cve>
<bugzilla href="https://bugzilla.suse.com/642502">SUSE bug 642502</bugzilla>
<bugzilla href="https://bugzilla.suse.com/645315">SUSE bug 645315</bugzilla>
<bugzilla href="https://bugzilla.suse.com/652858">SUSE bug 652858</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3183</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3183" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3183" source="CVE"/>
    <description>
    The LookupGetterOrSetter function in js3250.dll in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 does not properly support window.__lookupGetter__ function calls that lack arguments, which allows remote attackers to execute arbitrary code or cause a denial of service (incorrect pointer dereference and application crash) via vectors involving a "dangling pointer" and the JS_ValueToId function.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3183.html">CVE-2010-3183</cve>
<bugzilla href="https://bugzilla.suse.com/645315">SUSE bug 645315</bugzilla>
<bugzilla href="https://bugzilla.suse.com/652858">SUSE bug 652858</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3296</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3296" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3296" source="CVE"/>
    <description>
    The cxgb_extension_ioctl function in drivers/net/cxgb3/cxgb3_main.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a CHELSIO_GET_QSET_NUM ioctl call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3296.html">CVE-2010-3296</cve>
<bugzilla href="https://bugzilla.suse.com/639481">SUSE bug 639481</bugzilla>
<bugzilla href="https://bugzilla.suse.com/649187">SUSE bug 649187</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3297</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3297" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3297" source="CVE"/>
    <description>
    The eql_g_master_cfg function in drivers/net/eql.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an EQL_GETMASTRCFG ioctl call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3297.html">CVE-2010-3297</cve>
<bugzilla href="https://bugzilla.suse.com/639482">SUSE bug 639482</bugzilla>
<bugzilla href="https://bugzilla.suse.com/649187">SUSE bug 649187</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3298</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3298" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3298" source="CVE"/>
    <description>
    The hso_get_count function in drivers/net/usb/hso.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3298.html">CVE-2010-3298</cve>
<bugzilla href="https://bugzilla.suse.com/639483">SUSE bug 639483</bugzilla>
<bugzilla href="https://bugzilla.suse.com/649187">SUSE bug 649187</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3301</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3301" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3301" source="CVE"/>
    <description>
    The IA32 system call emulation functionality in arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.36-rc4-git2 on the x86_64 platform does not zero extend the %eax register after the 32-bit entry path to ptrace is used, which allows local users to gain privileges by triggering an out-of-bounds access to the system call table using the %rax register.  NOTE: this vulnerability exists because of a CVE-2007-4573 regression.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3301.html">CVE-2010-3301</cve>
<bugzilla href="https://bugzilla.suse.com/639708">SUSE bug 639708</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3310</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3310" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3310" source="CVE"/>
    <description>
    Multiple integer signedness errors in net/rose/af_rose.c in the Linux kernel before 2.6.36-rc5-next-20100923 allow local users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a rose_getname function call, related to the rose_bind and rose_connect functions.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3310.html">CVE-2010-3310</cve>
<bugzilla href="https://bugzilla.suse.com/640721">SUSE bug 640721</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3311</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3311" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3311" source="CVE"/>
    <description>
    Integer overflow in base/ftstream.c in libXft (aka the X FreeType library) in FreeType before 2.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted Compact Font Format (CFF) font file that triggers a heap-based buffer overflow, related to an "input stream position error" issue, a different vulnerability than CVE-2010-1797.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3311.html">CVE-2010-3311</cve>
<bugzilla href="https://bugzilla.suse.com/635692">SUSE bug 635692</bugzilla>
<bugzilla href="https://bugzilla.suse.com/641580">SUSE bug 641580</bugzilla>
<bugzilla href="https://bugzilla.suse.com/645982">SUSE bug 645982</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199430" comment="freetype2-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199431" comment="freetype2-32bit-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199432" comment="freetype2-x86-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199433" comment="ft2demos-2.3.7-25.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3332</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3332" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3332" source="CVE"/>
    <description>
    Microsoft .NET Framework 1.1 SP1, 2.0 SP1 and SP2, 3.5, 3.5 SP1, 3.5.1, and 4.0, as used for ASP.NET in Microsoft Internet Information Services (IIS), provides detailed error codes during decryption attempts, which allows remote attackers to decrypt and modify encrypted View State (aka __VIEWSTATE) form data, and possibly forge cookies or read application files, via a padding oracle attack, aka "ASP.NET Padding Oracle Vulnerability."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3332.html">CVE-2010-3332</cve>
<bugzilla href="https://bugzilla.suse.com/648080">SUSE bug 648080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/648086">SUSE bug 648086</bugzilla>
<bugzilla href="https://bugzilla.suse.com/702774">SUSE bug 702774</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199124" comment="mono-core-2.6.7-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199125" comment="mono-data-2.6.7-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199126" comment="mono-data-postgresql-2.6.7-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199127" comment="mono-data-sqlite-2.6.7-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199128" comment="mono-locale-extras-2.6.7-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199129" comment="mono-nunit-2.6.7-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199130" comment="mono-web-2.6.7-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199131" comment="mono-winforms-2.6.7-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3433</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3433" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3433" source="CVE"/>
    <description>
    The PL/perl and PL/Tcl implementations in PostgreSQL 7.4 before 7.4.30, 8.0 before 8.0.26, 8.1 before 8.1.22, 8.2 before 8.2.18, 8.3 before 8.3.12, 8.4 before 8.4.5, and 9.0 before 9.0.1 do not properly protect script execution by a different SQL user identity within the same session, which allows remote authenticated users to gain privileges via crafted script code in a SECURITY DEFINER function, as demonstrated by (1) redefining standard functions or (2) redefining operators, a different vulnerability than CVE-2010-1168, CVE-2010-1169, CVE-2010-1170, and CVE-2010-1447.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3433.html">CVE-2010-3433</cve>
<bugzilla href="https://bugzilla.suse.com/643771">SUSE bug 643771</bugzilla>
<bugzilla href="https://bugzilla.suse.com/648140">SUSE bug 648140</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199606" comment="libecpg6-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199607" comment="libpq5-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199608" comment="libpq5-32bit-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199750" comment="postgresql-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199751" comment="postgresql-contrib-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199752" comment="postgresql-docs-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199753" comment="postgresql-server-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199609" comment="postgresql91-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199610" comment="postgresql91-contrib-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199611" comment="postgresql91-docs-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199612" comment="postgresql91-server-9.1.9-0.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3436</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3436" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3436" source="CVE"/>
    <description>
    fopen_wrappers.c in PHP 5.3.x through 5.3.3 might allow remote attackers to bypass open_basedir restrictions via vectors related to the length of a filename.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3436.html">CVE-2010-3436</cve>
<bugzilla href="https://bugzilla.suse.com/642733">SUSE bug 642733</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199294" comment="apache2-mod_php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199295" comment="php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199296" comment="php53-bcmath-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199297" comment="php53-bz2-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199298" comment="php53-calendar-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199299" comment="php53-ctype-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199300" comment="php53-curl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199301" comment="php53-dba-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199302" comment="php53-dom-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199303" comment="php53-exif-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199304" comment="php53-fastcgi-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199305" comment="php53-fileinfo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199306" comment="php53-ftp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199307" comment="php53-gd-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199308" comment="php53-gettext-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199309" comment="php53-gmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199310" comment="php53-iconv-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199311" comment="php53-intl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199312" comment="php53-json-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199313" comment="php53-ldap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199314" comment="php53-mbstring-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199315" comment="php53-mcrypt-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199316" comment="php53-mysql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199317" comment="php53-odbc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199318" comment="php53-openssl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199319" comment="php53-pcntl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199320" comment="php53-pdo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199321" comment="php53-pear-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199322" comment="php53-pgsql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199323" comment="php53-pspell-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199324" comment="php53-shmop-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199325" comment="php53-snmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199326" comment="php53-soap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199327" comment="php53-suhosin-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199328" comment="php53-sysvmsg-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199329" comment="php53-sysvsem-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199330" comment="php53-sysvshm-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199331" comment="php53-tokenizer-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199332" comment="php53-wddx-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199333" comment="php53-xmlreader-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199334" comment="php53-xmlrpc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199335" comment="php53-xmlwriter-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199336" comment="php53-xsl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199337" comment="php53-zip-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199338" comment="php53-zlib-5.3.17-0.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3437</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3437" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3437" source="CVE"/>
    <description>
    Integer signedness error in the pkt_find_dev_from_minor function in drivers/block/pktcdvd.c in the Linux kernel before 2.6.36-rc6 allows local users to obtain sensitive information from kernel memory or cause a denial of service (invalid pointer dereference and system crash) via a crafted index value in a PKT_CTRL_CMD_STATUS ioctl call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3437.html">CVE-2010-3437</cve>
<bugzilla href="https://bugzilla.suse.com/642486">SUSE bug 642486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3445</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3445" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3445" source="CVE"/>
    <description>
    Stack consumption vulnerability in the dissect_ber_unknown function in epan/dissectors/packet-ber.c in the BER dissector in Wireshark 1.4.x before 1.4.1 and 1.2.x before 1.2.12 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a long string in an unknown ASN.1/BER encoded packet, as demonstrated using SNMP.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3445.html">CVE-2010-3445</cve>
<bugzilla href="https://bugzilla.suse.com/643078">SUSE bug 643078</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3493</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3493" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3493" source="CVE"/>
    <description>
    Multiple race conditions in smtpd.py in the smtpd module in Python 2.6, 2.7, 3.1, and 3.2 alpha allow remote attackers to cause a denial of service (daemon outage) by establishing and then immediately closing a TCP connection, leading to the accept function having an unexpected return value of None, an unexpected value of None for the address, or an ECONNABORTED, EAGAIN, or EWOULDBLOCK error, or the getpeername function having an ENOTCONN error, a related issue to CVE-2010-3492.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3493.html">CVE-2010-3493</cve>
<bugzilla href="https://bugzilla.suse.com/638233">SUSE bug 638233</bugzilla>
<bugzilla href="https://bugzilla.suse.com/666027">SUSE bug 666027</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199659" comment="libpython2_6-1_0-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199660" comment="libpython2_6-1_0-32bit-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199661" comment="libpython2_6-1_0-x86-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199662" comment="python-base-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199663" comment="python-base-32bit-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199664" comment="python-base-x86-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199665" comment="python-xml-2.6.8-0.15 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3541</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3541" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3541" source="CVE"/>
    <description>
    Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is related to missing validation of request headers in the HttpURLConnection class when they are set by applets, which allows remote attackers to bypass the intended security policy.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3541.html">CVE-2010-3541</cve>
<bugzilla href="https://bugzilla.suse.com/646073">SUSE bug 646073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/646906">SUSE bug 646906</bugzilla>
<bugzilla href="https://bugzilla.suse.com/648950">SUSE bug 648950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/659926">SUSE bug 659926</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3548</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3548" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3548" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Naming and Directory Interface (JNDI) component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this allows remote attackers to determine internal IP addresses or "otherwise-protected internal network names."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3548.html">CVE-2010-3548</cve>
<bugzilla href="https://bugzilla.suse.com/646073">SUSE bug 646073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/646906">SUSE bug 646906</bugzilla>
<bugzilla href="https://bugzilla.suse.com/648950">SUSE bug 648950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/659926">SUSE bug 659926</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3549</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3549" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3549" source="CVE"/>
    <description>
    Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is an HTTP request splitting vulnerability involving the handling of the chunked transfer encoding method by the HttpURLConnection class.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3549.html">CVE-2010-3549</cve>
<bugzilla href="https://bugzilla.suse.com/646073">SUSE bug 646073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/646906">SUSE bug 646906</bugzilla>
<bugzilla href="https://bugzilla.suse.com/648950">SUSE bug 648950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/659926">SUSE bug 659926</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3550</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3550" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3550" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Web Start component in Oracle Java SE and Java for Business 6 Update 21 and 5.0 Update 25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3550.html">CVE-2010-3550</cve>
<bugzilla href="https://bugzilla.suse.com/646073">SUSE bug 646073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/648950">SUSE bug 648950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/659926">SUSE bug 659926</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3551</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3551" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3551" source="CVE"/>
    <description>
    Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3551.html">CVE-2010-3551</cve>
<bugzilla href="https://bugzilla.suse.com/646073">SUSE bug 646073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/646906">SUSE bug 646906</bugzilla>
<bugzilla href="https://bugzilla.suse.com/648950">SUSE bug 648950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/659926">SUSE bug 659926</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3553</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3553" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3553" source="CVE"/>
    <description>
    Unspecified vulnerability in the Swing component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is related to unsafe reflection involving the UIDefault.ProxyLazyValue class.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3553.html">CVE-2010-3553</cve>
<bugzilla href="https://bugzilla.suse.com/646073">SUSE bug 646073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/646906">SUSE bug 646906</bugzilla>
<bugzilla href="https://bugzilla.suse.com/659926">SUSE bug 659926</bugzilla>
<bugzilla href="https://bugzilla.suse.com/663679">SUSE bug 663679</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3555</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3555" source="CVE"/>
    <description>
    Unspecified vulnerability in the Deployment component in Oracle Java SE and Java for Business 6 Update 21 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the January 2011 CPU. Oracle has not commented on claims from a reliable third party coordinator that the ActiveX Plugin does not properly initialize an object field that is used as a window handle, which allows attackers to execute arbitrary code.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3555.html">CVE-2010-3555</cve>
<bugzilla href="https://bugzilla.suse.com/646073">SUSE bug 646073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/659926">SUSE bug 659926</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3556</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3556" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3556" source="CVE"/>
    <description>
    Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3556.html">CVE-2010-3556</cve>
<bugzilla href="https://bugzilla.suse.com/646073">SUSE bug 646073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/646906">SUSE bug 646906</bugzilla>
<bugzilla href="https://bugzilla.suse.com/648950">SUSE bug 648950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/659926">SUSE bug 659926</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3557</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3557" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3557" source="CVE"/>
    <description>
    Unspecified vulnerability in the Swing component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is related to the modification of "behavior and state of certain JDK classes" and "mutable static."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3557.html">CVE-2010-3557</cve>
<bugzilla href="https://bugzilla.suse.com/646073">SUSE bug 646073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/646906">SUSE bug 646906</bugzilla>
<bugzilla href="https://bugzilla.suse.com/659926">SUSE bug 659926</bugzilla>
<bugzilla href="https://bugzilla.suse.com/663679">SUSE bug 663679</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3558</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3558" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3558" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Web Start component in Oracle Java SE and Java for Business 6 Update 21 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3558.html">CVE-2010-3558</cve>
<bugzilla href="https://bugzilla.suse.com/646073">SUSE bug 646073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/659926">SUSE bug 659926</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3559</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3559" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3559" source="CVE"/>
    <description>
    Unspecified vulnerability in the Sound component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this involves an incorrect sign extension in the HeadspaceSoundbank.nGetName function, which allows attackers to execute arbitrary code via a crafted BANK record that leads to a buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3559.html">CVE-2010-3559</cve>
<bugzilla href="https://bugzilla.suse.com/646073">SUSE bug 646073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/648950">SUSE bug 648950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/659926">SUSE bug 659926</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3560</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3560" source="CVE"/>
    <description>
    Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21 allows remote attackers to affect confidentiality via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3560.html">CVE-2010-3560</cve>
<bugzilla href="https://bugzilla.suse.com/646073">SUSE bug 646073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/659926">SUSE bug 659926</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3562</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3562" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3562" source="CVE"/>
    <description>
    Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is a double free vulnerability in IndexColorModel that allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3562.html">CVE-2010-3562</cve>
<bugzilla href="https://bugzilla.suse.com/646073">SUSE bug 646073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/646906">SUSE bug 646906</bugzilla>
<bugzilla href="https://bugzilla.suse.com/648950">SUSE bug 648950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/659926">SUSE bug 659926</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3563</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3563" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3563" source="CVE"/>
    <description>
    Unspecified vulnerability in the Deployment component in Oracle Java SE and Java for Business 6 Update 21 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is related to "how Web Start retrieves security policies," BasicServiceImpl, and forged policies that bypass sandbox restrictions.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3563.html">CVE-2010-3563</cve>
<bugzilla href="https://bugzilla.suse.com/646073">SUSE bug 646073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/659926">SUSE bug 659926</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3565</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3565" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3565" source="CVE"/>
    <description>
    Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this is an integer overflow that triggers memory corruption via large values in a subsample of a JPEG image, related to JPEGImageWriter.writeImage in the imageio API.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3565.html">CVE-2010-3565</cve>
<bugzilla href="https://bugzilla.suse.com/646073">SUSE bug 646073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/646906">SUSE bug 646906</bugzilla>
<bugzilla href="https://bugzilla.suse.com/648950">SUSE bug 648950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/659926">SUSE bug 659926</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3566</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3566" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3566" source="CVE"/>
    <description>
    Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update and 25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this is an integer overflow that leads to a buffer overflow via a crafted devs (device information) tag structure in a color profile.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3566.html">CVE-2010-3566</cve>
<bugzilla href="https://bugzilla.suse.com/646073">SUSE bug 646073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/648950">SUSE bug 648950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/659926">SUSE bug 659926</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3567</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3567" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3567" source="CVE"/>
    <description>
    Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, and 5.0 Update 25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is related to a calculation error in right-to-left text character counts for the ICU OpenType font rendering implementation, which triggers an out-of-bounds memory access.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3567.html">CVE-2010-3567</cve>
<bugzilla href="https://bugzilla.suse.com/646073">SUSE bug 646073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/659926">SUSE bug 659926</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3568" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3568" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is a race condition related to deserialization.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3568.html">CVE-2010-3568</cve>
<bugzilla href="https://bugzilla.suse.com/646073">SUSE bug 646073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/646906">SUSE bug 646906</bugzilla>
<bugzilla href="https://bugzilla.suse.com/648950">SUSE bug 648950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/659926">SUSE bug 659926</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3569</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3569" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3569" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this allows remote attackers to execute arbitrary code by causing the defaultReadObject method in the Serialization API to set a volatile field multiple times.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3569.html">CVE-2010-3569</cve>
<bugzilla href="https://bugzilla.suse.com/646073">SUSE bug 646073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/646906">SUSE bug 646906</bugzilla>
<bugzilla href="https://bugzilla.suse.com/648950">SUSE bug 648950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/659926">SUSE bug 659926</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3571</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3571" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3571" source="CVE"/>
    <description>
    Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this is an integer overflow in the color profile parser that allows remote attackers to execute arbitrary code via a crafted Tag structure in a color profile.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3571.html">CVE-2010-3571</cve>
<bugzilla href="https://bugzilla.suse.com/646073">SUSE bug 646073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/646906">SUSE bug 646906</bugzilla>
<bugzilla href="https://bugzilla.suse.com/659926">SUSE bug 659926</bugzilla>
<bugzilla href="https://bugzilla.suse.com/663679">SUSE bug 663679</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3572</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3572" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3572" source="CVE"/>
    <description>
    Unspecified vulnerability in the Sound component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3572.html">CVE-2010-3572</cve>
<bugzilla href="https://bugzilla.suse.com/646073">SUSE bug 646073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/646906">SUSE bug 646906</bugzilla>
<bugzilla href="https://bugzilla.suse.com/648950">SUSE bug 648950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/659926">SUSE bug 659926</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3573</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3573" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3573" source="CVE"/>
    <description>
    Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21 and 5.0 Update 25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is related to missing validation of request headers in the HttpURLConnection class when they are set by applets, which allows remote attackers to bypass the intended security policy.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3573.html">CVE-2010-3573</cve>
<bugzilla href="https://bugzilla.suse.com/646073">SUSE bug 646073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/648950">SUSE bug 648950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/659926">SUSE bug 659926</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3574</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3574" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3574" source="CVE"/>
    <description>
    Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that HttpURLConnection does not properly check for the allowHttpTrace permission, which allows untrusted code to perform HTTP TRACE requests.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3574.html">CVE-2010-3574</cve>
<bugzilla href="https://bugzilla.suse.com/646073">SUSE bug 646073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/648950">SUSE bug 648950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/658525">SUSE bug 658525</bugzilla>
<bugzilla href="https://bugzilla.suse.com/659926">SUSE bug 659926</bugzilla>
<bugzilla href="https://bugzilla.suse.com/663953">SUSE bug 663953</bugzilla>
<bugzilla href="https://bugzilla.suse.com/679560">SUSE bug 679560</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3609</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3609" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3609" source="CVE"/>
    <description>
    The extension parser in slp_v2message.c in OpenSLP 1.2.1, and other versions before SVN revision 1647, as used in Service Location Protocol daemon (SLPD) in VMware ESX 4.0 and 4.1 and ESXi 4.0 and 4.1, allows remote attackers to cause a denial of service (infinite loop) via a packet with a "next extension offset" that references this extension or a previous extension.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3609.html">CVE-2010-3609</cve>
<bugzilla href="https://bugzilla.suse.com/642571">SUSE bug 642571</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199147" comment="openslp-1.2.0-172.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199148" comment="openslp-32bit-1.2.0-172.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199149" comment="openslp-server-1.2.0-172.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199150" comment="openslp-x86-1.2.0-172.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3699</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3699" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3699" source="CVE"/>
    <description>
    The backend driver in Xen 3.x allows guest OS users to cause a denial of service via a kernel thread leak, which prevents the device and guest OS from being shut down or create a zombie domain, causes a hang in zenwatch, or prevents unspecified xm commands from working properly, related to (1) netback, (2) blkback, or (3) blktap.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3699.html">CVE-2010-3699</cve>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/655964">SUSE bug 655964</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3702</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3702" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3702" source="CVE"/>
    <description>
    The Gfx::getPos function in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, CUPS, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) via unknown vectors that trigger an uninitialized pointer dereference.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3702.html">CVE-2010-3702</cve>
<bugzilla href="https://bugzilla.suse.com/642785">SUSE bug 642785</bugzilla>
<bugzilla href="https://bugzilla.suse.com/644112">SUSE bug 644112</bugzilla>
<bugzilla href="https://bugzilla.suse.com/644114">SUSE bug 644114</bugzilla>
<bugzilla href="https://bugzilla.suse.com/644521">SUSE bug 644521</bugzilla>
<bugzilla href="https://bugzilla.suse.com/646460">SUSE bug 646460</bugzilla>
<bugzilla href="https://bugzilla.suse.com/657780">SUSE bug 657780</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199649" comment="libpoppler-glib4-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199650" comment="libpoppler-qt4-3-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199651" comment="libpoppler5-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199652" comment="poppler-tools-0.12.3-1.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3703</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3703" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3703" source="CVE"/>
    <description>
    The PostScriptFunction::PostScriptFunction function in poppler/Function.cc in the PDF parser in poppler 0.8.7 and possibly other versions up to 0.15.1, and possibly other products, allows context-dependent attackers to cause a denial of service (crash) via a PDF file that triggers an uninitialized pointer dereference.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3703.html">CVE-2010-3703</cve>
<bugzilla href="https://bugzilla.suse.com/642785">SUSE bug 642785</bugzilla>
<bugzilla href="https://bugzilla.suse.com/644112">SUSE bug 644112</bugzilla>
<bugzilla href="https://bugzilla.suse.com/644521">SUSE bug 644521</bugzilla>
<bugzilla href="https://bugzilla.suse.com/657780">SUSE bug 657780</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199649" comment="libpoppler-glib4-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199650" comment="libpoppler-qt4-3-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199651" comment="libpoppler5-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199652" comment="poppler-tools-0.12.3-1.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3704</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3704" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3704" source="CVE"/>
    <description>
    The FoFiType1::parse function in fofi/FoFiType1.cc in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PDF file with a crafted PostScript Type1 font that contains a negative array index, which bypasses input validation and triggers memory corruption.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3704.html">CVE-2010-3704</cve>
<bugzilla href="https://bugzilla.suse.com/642785">SUSE bug 642785</bugzilla>
<bugzilla href="https://bugzilla.suse.com/644112">SUSE bug 644112</bugzilla>
<bugzilla href="https://bugzilla.suse.com/644521">SUSE bug 644521</bugzilla>
<bugzilla href="https://bugzilla.suse.com/646460">SUSE bug 646460</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199649" comment="libpoppler-glib4-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199650" comment="libpoppler-qt4-3-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199651" comment="libpoppler5-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199652" comment="poppler-tools-0.12.3-1.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3705</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3705" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3705" source="CVE"/>
    <description>
    The sctp_auth_asoc_get_hmac function in net/sctp/auth.c in the Linux kernel before 2.6.36 does not properly validate the hmac_ids array of an SCTP peer, which allows remote attackers to cause a denial of service (memory corruption and panic) via a crafted value in the last element of this array.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3705.html">CVE-2010-3705</cve>
<bugzilla href="https://bugzilla.suse.com/643513">SUSE bug 643513</bugzilla>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3709</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3709" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3709" source="CVE"/>
    <description>
    The ZipArchive::getArchiveComment function in PHP 5.2.x through 5.2.14 and 5.3.x through 5.3.3 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted ZIP archive.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3709.html">CVE-2010-3709</cve>
<bugzilla href="https://bugzilla.suse.com/660102">SUSE bug 660102</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199294" comment="apache2-mod_php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199295" comment="php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199296" comment="php53-bcmath-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199297" comment="php53-bz2-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199298" comment="php53-calendar-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199299" comment="php53-ctype-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199300" comment="php53-curl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199301" comment="php53-dba-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199302" comment="php53-dom-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199303" comment="php53-exif-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199304" comment="php53-fastcgi-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199305" comment="php53-fileinfo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199306" comment="php53-ftp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199307" comment="php53-gd-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199308" comment="php53-gettext-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199309" comment="php53-gmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199310" comment="php53-iconv-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199311" comment="php53-intl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199312" comment="php53-json-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199313" comment="php53-ldap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199314" comment="php53-mbstring-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199315" comment="php53-mcrypt-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199316" comment="php53-mysql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199317" comment="php53-odbc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199318" comment="php53-openssl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199319" comment="php53-pcntl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199320" comment="php53-pdo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199321" comment="php53-pear-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199322" comment="php53-pgsql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199323" comment="php53-pspell-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199324" comment="php53-shmop-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199325" comment="php53-snmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199326" comment="php53-soap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199327" comment="php53-suhosin-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199328" comment="php53-sysvmsg-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199329" comment="php53-sysvsem-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199330" comment="php53-sysvshm-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199331" comment="php53-tokenizer-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199332" comment="php53-wddx-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199333" comment="php53-xmlreader-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199334" comment="php53-xmlrpc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199335" comment="php53-xmlwriter-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199336" comment="php53-xsl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199337" comment="php53-zip-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199338" comment="php53-zlib-5.3.17-0.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3710</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3710" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3710" source="CVE"/>
    <description>
    Stack consumption vulnerability in the filter_var function in PHP 5.2.x through 5.2.14 and 5.3.x through 5.3.3, when FILTER_VALIDATE_EMAIL mode is used, allows remote attackers to cause a denial of service (memory consumption and application crash) via a long e-mail address string.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3710.html">CVE-2010-3710</cve>
<bugzilla href="https://bugzilla.suse.com/649210">SUSE bug 649210</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199294" comment="apache2-mod_php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199295" comment="php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199296" comment="php53-bcmath-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199297" comment="php53-bz2-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199298" comment="php53-calendar-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199299" comment="php53-ctype-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199300" comment="php53-curl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199301" comment="php53-dba-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199302" comment="php53-dom-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199303" comment="php53-exif-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199304" comment="php53-fastcgi-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199305" comment="php53-fileinfo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199306" comment="php53-ftp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199307" comment="php53-gd-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199308" comment="php53-gettext-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199309" comment="php53-gmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199310" comment="php53-iconv-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199311" comment="php53-intl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199312" comment="php53-json-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199313" comment="php53-ldap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199314" comment="php53-mbstring-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199315" comment="php53-mcrypt-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199316" comment="php53-mysql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199317" comment="php53-odbc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199318" comment="php53-openssl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199319" comment="php53-pcntl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199320" comment="php53-pdo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199321" comment="php53-pear-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199322" comment="php53-pgsql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199323" comment="php53-pspell-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199324" comment="php53-shmop-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199325" comment="php53-snmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199326" comment="php53-soap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199327" comment="php53-suhosin-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199328" comment="php53-sysvmsg-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199329" comment="php53-sysvsem-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199330" comment="php53-sysvshm-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199331" comment="php53-tokenizer-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199332" comment="php53-wddx-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199333" comment="php53-xmlreader-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199334" comment="php53-xmlrpc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199335" comment="php53-xmlwriter-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199336" comment="php53-xsl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199337" comment="php53-zip-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199338" comment="php53-zlib-5.3.17-0.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3718</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3718" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3718" source="CVE"/>
    <description>
    Apache Tomcat 7.0.0 through 7.0.3, 6.0.x, and 5.5.x, when running within a SecurityManager, does not make the ServletContext attribute read-only, which allows local web applications to read or write files outside of the intended working directory, as demonstrated using a directory traversal attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3718.html">CVE-2010-3718</cve>
<bugzilla href="https://bugzilla.suse.com/669897">SUSE bug 669897</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199802" comment="tomcat6-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199803" comment="tomcat6-admin-webapps-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199804" comment="tomcat6-docs-webapp-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199805" comment="tomcat6-javadoc-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199806" comment="tomcat6-jsp-2_1-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199807" comment="tomcat6-lib-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199808" comment="tomcat6-servlet-2_5-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199809" comment="tomcat6-webapps-6.0.18-20.35.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3765</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3765" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3765" source="CVE"/>
    <description>
    Mozilla Firefox 3.5.x through 3.5.14 and 3.6.x through 3.6.11, Thunderbird 3.1.6 before 3.1.6 and 3.0.x before 3.0.10, and SeaMonkey 2.x before 2.0.10, when JavaScript is enabled, allows remote attackers to execute arbitrary code via vectors related to nsCSSFrameConstructor::ContentAppended, the appendChild method, incorrect index tracking, and the creation of multiple frames, which triggers memory corruption, as exploited in the wild in October 2010 by the Belmoo malware.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3765.html">CVE-2010-3765</cve>
<bugzilla href="https://bugzilla.suse.com/649492">SUSE bug 649492</bugzilla>
<bugzilla href="https://bugzilla.suse.com/652858">SUSE bug 652858</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3766</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3766" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3766" source="CVE"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, and SeaMonkey before 2.0.11, allows remote attackers to execute arbitrary code via vectors involving a change to an nsDOMAttribute node.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3766.html">CVE-2010-3766</cve>
<bugzilla href="https://bugzilla.suse.com/657016">SUSE bug 657016</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3767</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3767" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3767" source="CVE"/>
    <description>
    Integer overflow in the NewIdArray function in Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, and SeaMonkey before 2.0.11, allows remote attackers to execute arbitrary code via a JavaScript array with many elements.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3767.html">CVE-2010-3767</cve>
<bugzilla href="https://bugzilla.suse.com/657016">SUSE bug 657016</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3768</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3768" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3768" source="CVE"/>
    <description>
    Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, Thunderbird before 3.0.11 and 3.1.x before 3.1.7, and SeaMonkey before 2.0.11 do not properly validate downloadable fonts before use within an operating system's font implementation, which allows remote attackers to execute arbitrary code via vectors related to @font-face Cascading Style Sheets (CSS) rules.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3768.html">CVE-2010-3768</cve>
<bugzilla href="https://bugzilla.suse.com/657016">SUSE bug 657016</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3769</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3769" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3769" source="CVE"/>
    <description>
    The line-breaking implementation in Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, Thunderbird before 3.0.11 and 3.1.x before 3.1.7, and SeaMonkey before 2.0.11 on Windows does not properly handle long strings, which allows remote attackers to execute arbitrary code via a crafted document.write call that triggers a buffer over-read.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3769.html">CVE-2010-3769</cve>
<bugzilla href="https://bugzilla.suse.com/657016">SUSE bug 657016</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3770</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3770" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3770" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in the rendering engine in Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, and SeaMonkey before 2.0.11, allow remote attackers to inject arbitrary web script or HTML via (1) x-mac-arabic, (2) x-mac-farsi, or (3) x-mac-hebrew characters that may be converted to angle brackets during rendering.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3770.html">CVE-2010-3770</cve>
<bugzilla href="https://bugzilla.suse.com/657016">SUSE bug 657016</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3771</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3771" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3771" source="CVE"/>
    <description>
    Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, and SeaMonkey before 2.0.11, does not properly handle injection of an ISINDEX element into an about:blank page, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via vectors related to redirection to a chrome: URI.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3771.html">CVE-2010-3771</cve>
<bugzilla href="https://bugzilla.suse.com/657016">SUSE bug 657016</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3772</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3772" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3772" source="CVE"/>
    <description>
    Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, and SeaMonkey before 2.0.11, does not properly calculate index values for certain child content in a XUL tree, which allows remote attackers to execute arbitrary code via vectors involving a DIV element within a treechildren element.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3772.html">CVE-2010-3772</cve>
<bugzilla href="https://bugzilla.suse.com/657016">SUSE bug 657016</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3773</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3773" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3773" source="CVE"/>
    <description>
    Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, and SeaMonkey before 2.0.11, when the XMLHttpRequestSpy module in the Firebug add-on is used, does not properly handle interaction between the XMLHttpRequestSpy object and chrome privileged objects, which allows remote attackers to execute arbitrary JavaScript via a crafted HTTP response.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-0179.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3773.html">CVE-2010-3773</cve>
<bugzilla href="https://bugzilla.suse.com/657016">SUSE bug 657016</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3775</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3775" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3775" source="CVE"/>
    <description>
    Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, and SeaMonkey before 2.0.11, does not properly handle certain redirections involving data: URLs and Java LiveConnect scripts, which allows remote attackers to start processes, read arbitrary local files, and establish network connections via vectors involving a refresh value in the http-equiv attribute of a META element, which causes the wrong security principal to be used.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3775.html">CVE-2010-3775</cve>
<bugzilla href="https://bugzilla.suse.com/657016">SUSE bug 657016</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3776</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3776" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3776" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, Thunderbird before 3.0.11 and 3.1.x before 3.1.7, and SeaMonkey before 2.0.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3776.html">CVE-2010-3776</cve>
<bugzilla href="https://bugzilla.suse.com/657016">SUSE bug 657016</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3777</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3777" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3777" source="CVE"/>
    <description>
    Unspecified vulnerability in Mozilla Firefox 3.6.x before 3.6.13 and Thunderbird 3.1.x before 3.1.7 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3777.html">CVE-2010-3777</cve>
<bugzilla href="https://bugzilla.suse.com/657016">SUSE bug 657016</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3778</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3778" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3778" source="CVE"/>
    <description>
    Unspecified vulnerability in Mozilla Firefox 3.5.x before 3.5.16, Thunderbird before 3.0.11, and SeaMonkey before 2.0.11 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3778.html">CVE-2010-3778</cve>
<bugzilla href="https://bugzilla.suse.com/657016">SUSE bug 657016</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3814" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3814" source="CVE"/>
    <description>
    Heap-based buffer overflow in the Ins_SHZ function in ttinterp.c in FreeType 2.4.3 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted SHZ bytecode instruction, related to TrueType opcodes, as demonstrated by a PDF document with a crafted embedded font.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3814.html">CVE-2010-3814</cve>
<bugzilla href="https://bugzilla.suse.com/647375">SUSE bug 647375</bugzilla>
<bugzilla href="https://bugzilla.suse.com/689174">SUSE bug 689174</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199430" comment="freetype2-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199431" comment="freetype2-32bit-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199432" comment="freetype2-x86-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199433" comment="ft2demos-2.3.7-25.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3833</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3833" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3833" source="CVE"/>
    <description>
    MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 does not properly propagate type errors, which allows remote attackers to cause a denial of service (server crash) via crafted arguments to extreme-value functions such as (1) LEAST and (2) GREATEST, related to KILL_BAD_DATA and a "CREATE TABLE ... SELECT."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3833.html">CVE-2010-3833</cve>
<bugzilla href="https://bugzilla.suse.com/644864">SUSE bug 644864</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199635" comment="mysql-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199636" comment="mysql-client-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199637" comment="mysql-tools-5.5.31-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3834</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3834" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3834" source="CVE"/>
    <description>
    Unspecified vulnerability in MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via vectors related to "materializing a derived table that required a temporary table for grouping" and "user variable assignments."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3834.html">CVE-2010-3834</cve>
<bugzilla href="https://bugzilla.suse.com/644864">SUSE bug 644864</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199635" comment="mysql-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199636" comment="mysql-client-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199637" comment="mysql-tools-5.5.31-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3835" source="CVE"/>
    <description>
    MySQL 5.1 before 5.1.51 and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (mysqld server crash) by performing a user-variable assignment in a logical expression that is calculated and stored in a temporary table for GROUP BY, then causing the expression value to be used after the table is created, which causes the expression to be re-evaluated instead of accessing its value from the table.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3835.html">CVE-2010-3835</cve>
<bugzilla href="https://bugzilla.suse.com/644864">SUSE bug 644864</bugzilla>
<bugzilla href="https://bugzilla.suse.com/694232">SUSE bug 694232</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199635" comment="mysql-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199636" comment="mysql-client-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199637" comment="mysql-tools-5.5.31-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3836" source="CVE"/>
    <description>
    MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (assertion failure and server crash) via vectors related to view preparation, pre-evaluation of LIKE predicates, and IN Optimizers.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3836.html">CVE-2010-3836</cve>
<bugzilla href="https://bugzilla.suse.com/644864">SUSE bug 644864</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199635" comment="mysql-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199636" comment="mysql-client-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199637" comment="mysql-tools-5.5.31-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3837</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3837" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3837" source="CVE"/>
    <description>
    MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via a prepared statement that uses GROUP_CONCAT with the WITH ROLLUP modifier, probably triggering a use-after-free error when a copied object is modified in a way that also affects the original object.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3837.html">CVE-2010-3837</cve>
<bugzilla href="https://bugzilla.suse.com/644864">SUSE bug 644864</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199635" comment="mysql-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199636" comment="mysql-client-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199637" comment="mysql-tools-5.5.31-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3838</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3838" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3838" source="CVE"/>
    <description>
    MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via a query that uses the (1) GREATEST or (2) LEAST function with a mixed list of numeric and LONGBLOB arguments, which is not properly handled when the function's result is "processed using an intermediate temporary table."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3838.html">CVE-2010-3838</cve>
<bugzilla href="https://bugzilla.suse.com/644864">SUSE bug 644864</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199635" comment="mysql-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199636" comment="mysql-client-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199637" comment="mysql-tools-5.5.31-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3839</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3839" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3839" source="CVE"/>
    <description>
    MySQL 5.1 before 5.1.51 and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (infinite loop) via multiple invocations of a (1) prepared statement or (2) stored procedure that creates a query with nested JOIN statements.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3839.html">CVE-2010-3839</cve>
<bugzilla href="https://bugzilla.suse.com/644864">SUSE bug 644864</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199635" comment="mysql-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199636" comment="mysql-client-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199637" comment="mysql-tools-5.5.31-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3840" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3840" source="CVE"/>
    <description>
    The Gis_line_string::init_from_wkb function in sql/spatial.cc in MySQL 5.1 before 5.1.51 allows remote authenticated users to cause a denial of service (server crash) by calling the PolyFromWKB function with Well-Known Binary (WKB) data containing a crafted number of (1) line strings or (2) line points.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3840.html">CVE-2010-3840</cve>
<bugzilla href="https://bugzilla.suse.com/644864">SUSE bug 644864</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199635" comment="mysql-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199636" comment="mysql-client-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199637" comment="mysql-tools-5.5.31-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3855</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3855" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3855" source="CVE"/>
    <description>
    Buffer overflow in the ft_var_readpackedpoints function in truetype/ttgxvar.c in FreeType 2.4.3 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted TrueType GX font.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3855.html">CVE-2010-3855</cve>
<bugzilla href="https://bugzilla.suse.com/647375">SUSE bug 647375</bugzilla>
<bugzilla href="https://bugzilla.suse.com/689174">SUSE bug 689174</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199430" comment="freetype2-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199431" comment="freetype2-32bit-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199432" comment="freetype2-x86-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199433" comment="ft2demos-2.3.7-25.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3861</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3861" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3861" source="CVE"/>
    <description>
    The ethtool_get_rxnfc function in net/core/ethtool.c in the Linux kernel before 2.6.36 does not initialize a certain block of heap memory, which allows local users to obtain potentially sensitive information via an ETHTOOL_GRXCLSRLALL ethtool command with a large info.rule_cnt value, a different vulnerability than CVE-2010-2478.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3861.html">CVE-2010-3861</cve>
<bugzilla href="https://bugzilla.suse.com/649187">SUSE bug 649187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3864</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3864" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3864" source="CVE"/>
    <description>
    Multiple race conditions in ssl/t1_lib.c in OpenSSL 0.9.8f through 0.9.8o, 1.0.0, and 1.0.0a, when multi-threading and internal caching are enabled on a TLS server, might allow remote attackers to execute arbitrary code via client data that triggers a heap-based buffer overflow, related to (1) the TLS server name extension and (2) elliptic curve cryptography.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3864.html">CVE-2010-3864</cve>
<bugzilla href="https://bugzilla.suse.com/629905">SUSE bug 629905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/651003">SUSE bug 651003</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199638" comment="libopenssl0_9_8-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199639" comment="libopenssl0_9_8-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199640" comment="libopenssl0_9_8-hmac-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199641" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199642" comment="libopenssl0_9_8-x86-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199643" comment="openssl-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199644" comment="openssl-doc-0.9.8j-0.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3873</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3873" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3873" source="CVE"/>
    <description>
    The X.25 implementation in the Linux kernel before 2.6.36.2 does not properly parse facilities, which allows remote attackers to cause a denial of service (heap memory corruption and panic) or possibly have unspecified other impact via malformed (1) X25_FAC_CALLING_AE or (2) X25_FAC_CALLED_AE data, related to net/x25/x25_facilities.c and net/x25/x25_in.c, a different vulnerability than CVE-2010-4164.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3873.html">CVE-2010-3873</cve>
<bugzilla href="https://bugzilla.suse.com/651219">SUSE bug 651219</bugzilla>
<bugzilla href="https://bugzilla.suse.com/653260">SUSE bug 653260</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3874</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3874" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3874" source="CVE"/>
    <description>
    Heap-based buffer overflow in the bcm_connect function in net/can/bcm.c (aka the Broadcast Manager) in the Controller Area Network (CAN) implementation in the Linux kernel before 2.6.36.2 on 64-bit platforms might allow local users to cause a denial of service (memory corruption) via a connect operation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3874.html">CVE-2010-3874</cve>
<bugzilla href="https://bugzilla.suse.com/651218">SUSE bug 651218</bugzilla>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3875</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3875" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3875" source="CVE"/>
    <description>
    The ax25_getname function in net/ax25/af_ax25.c in the Linux kernel before 2.6.37-rc2 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory by reading a copy of this structure.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3875.html">CVE-2010-3875</cve>
<bugzilla href="https://bugzilla.suse.com/650897">SUSE bug 650897</bugzilla>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3876</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3876" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3876" source="CVE"/>
    <description>
    net/packet/af_packet.c in the Linux kernel before 2.6.37-rc2 does not properly initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_RAW capability to read copies of the applicable structures.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3876.html">CVE-2010-3876</cve>
<bugzilla href="https://bugzilla.suse.com/650897">SUSE bug 650897</bugzilla>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3877</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3877" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3877" source="CVE"/>
    <description>
    The get_name function in net/tipc/socket.c in the Linux kernel before 2.6.37-rc2 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory by reading a copy of this structure.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3877.html">CVE-2010-3877</cve>
<bugzilla href="https://bugzilla.suse.com/650897">SUSE bug 650897</bugzilla>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3880</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3880" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3880" source="CVE"/>
    <description>
    net/ipv4/inet_diag.c in the Linux kernel before 2.6.37-rc2 does not properly audit INET_DIAG bytecode, which allows local users to cause a denial of service (kernel infinite loop) via crafted INET_DIAG_REQ_BYTECODE instructions in a netlink message that contains multiple attribute elements, as demonstrated by INET_DIAG_BC_JMP instructions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3880.html">CVE-2010-3880</cve>
<bugzilla href="https://bugzilla.suse.com/651599">SUSE bug 651599</bugzilla>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3881</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3881" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3881" source="CVE"/>
    <description>
    arch/x86/kvm/x86.c in the Linux kernel before 2.6.36.2 does not initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel stack memory via read operations on the /dev/kvm device.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3881.html">CVE-2010-3881</cve>
<bugzilla href="https://bugzilla.suse.com/651596">SUSE bug 651596</bugzilla>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/662663">SUSE bug 662663</bugzilla>
<bugzilla href="https://bugzilla.suse.com/706696">SUSE bug 706696</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3904</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-3904" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3904" source="CVE"/>
    <description>
    The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel before 2.6.36 does not properly validate addresses obtained from user space, which allows local users to gain privileges via crafted use of the sendmsg and recvmsg system calls.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3904.html">CVE-2010-3904</cve>
<bugzilla href="https://bugzilla.suse.com/647392">SUSE bug 647392</bugzilla>
<bugzilla href="https://bugzilla.suse.com/676707">SUSE bug 676707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/703752">SUSE bug 703752</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199724" comment="ofed-1.5.4.1-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199725" comment="ofed-doc-1.5.4.1-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199726" comment="ofed-kmp-default-1.5.4.1_3.0.76_0.11-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199727" comment="ofed-kmp-pae-1.5.4.1_3.0.76_0.11-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199728" comment="ofed-kmp-ppc64-1.5.4.1_3.0.76_0.11-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199729" comment="ofed-kmp-trace-1.5.4.1_3.0.76_0.11-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4014</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-4014" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4014" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4014.html">CVE-2010-4014</cve>
<bugzilla href="https://bugzilla.suse.com/660478">SUSE bug 660478</bugzilla>
<bugzilla href="https://bugzilla.suse.com/660479">SUSE bug 660479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/684292">SUSE bug 684292</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199750" comment="postgresql-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199751" comment="postgresql-contrib-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199752" comment="postgresql-docs-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199753" comment="postgresql-server-8.3.23-0.4 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4015</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-4015" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4015" source="CVE"/>
    <description>
    Buffer overflow in the gettoken function in contrib/intarray/_int_bool.c in the intarray array module in PostgreSQL 9.0.x before 9.0.3, 8.4.x before 8.4.7, 8.3.x before 8.3.14, and 8.2.x before 8.2.20 allows remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via integers with a large number of digits to unspecified functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4015.html">CVE-2010-4015</cve>
<bugzilla href="https://bugzilla.suse.com/660478">SUSE bug 660478</bugzilla>
<bugzilla href="https://bugzilla.suse.com/684292">SUSE bug 684292</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199750" comment="postgresql-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199751" comment="postgresql-contrib-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199752" comment="postgresql-docs-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199753" comment="postgresql-server-8.3.23-0.4 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4054</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-4054" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4054" source="CVE"/>
    <description>
    The gs_type2_interpret function in Ghostscript allows remote attackers to cause a denial of service (incorrect pointer dereference and application crash) via crafted font data in a compressed data stream, aka bug 691043.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4054.html">CVE-2010-4054</cve>
<bugzilla href="https://bugzilla.suse.com/649207">SUSE bug 649207</bugzilla>
<bugzilla href="https://bugzilla.suse.com/939342">SUSE bug 939342</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199436" comment="ghostscript-fonts-other-8.62-32.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199437" comment="ghostscript-fonts-rus-8.62-32.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199438" comment="ghostscript-fonts-std-8.62-32.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199439" comment="ghostscript-library-8.62-32.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199440" comment="ghostscript-omni-8.62-32.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199441" comment="ghostscript-x11-8.62-32.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199442" comment="libgimpprint-4.2.7-32.34 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4072</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-4072" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4072" source="CVE"/>
    <description>
    The copy_shmid_to_user function in ipc/shm.c in the Linux kernel before 2.6.37-rc1 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the shmctl system call and the "old shm interface."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4072.html">CVE-2010-4072</cve>
<bugzilla href="https://bugzilla.suse.com/642314">SUSE bug 642314</bugzilla>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4073</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-4073" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4073" source="CVE"/>
    <description>
    The ipc subsystem in the Linux kernel before 2.6.37-rc1 does not initialize certain structures, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the (1) compat_sys_semctl, (2) compat_sys_msgctl, and (3) compat_sys_shmctl functions in ipc/compat.c; and the (4) compat_sys_mq_open and (5) compat_sys_mq_getsetattr functions in ipc/compat_mq.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4073.html">CVE-2010-4073</cve>
<bugzilla href="https://bugzilla.suse.com/642314">SUSE bug 642314</bugzilla>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4075</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-4075" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4075" source="CVE"/>
    <description>
    The uart_get_count function in drivers/serial/serial_core.c in the Linux kernel before 2.6.37-rc1 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4075.html">CVE-2010-4075</cve>
<bugzilla href="https://bugzilla.suse.com/642309">SUSE bug 642309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4076</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-4076" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4076" source="CVE"/>
    <description>
    The rs_ioctl function in drivers/char/amiserial.c in the Linux kernel 2.6.36.1 and earlier does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4076.html">CVE-2010-4076</cve>
<bugzilla href="https://bugzilla.suse.com/642309">SUSE bug 642309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4077</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-4077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4077" source="CVE"/>
    <description>
    The ntty_ioctl_tiocgicount function in drivers/char/nozomi.c in the Linux kernel 2.6.36.1 and earlier does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4077.html">CVE-2010-4077</cve>
<bugzilla href="https://bugzilla.suse.com/642309">SUSE bug 642309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4082</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-4082" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4082" source="CVE"/>
    <description>
    The viafb_ioctl_get_viafb_info function in drivers/video/via/ioctl.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a VIAFB_GET_INFO ioctl call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4082.html">CVE-2010-4082</cve>
<bugzilla href="https://bugzilla.suse.com/642313">SUSE bug 642313</bugzilla>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4083</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-4083" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4083" source="CVE"/>
    <description>
    The copy_semid_to_user function in ipc/sem.c in the Linux kernel before 2.6.36 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via a (1) IPC_INFO, (2) SEM_INFO, (3) IPC_STAT, or (4) SEM_STAT command in a semctl system call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4083.html">CVE-2010-4083</cve>
<bugzilla href="https://bugzilla.suse.com/642314">SUSE bug 642314</bugzilla>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4150</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-4150" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4150" source="CVE"/>
    <description>
    Double free vulnerability in the imap_do_open function in the IMAP extension (ext/imap/php_imap.c) in PHP 5.2 before 5.2.15 and 5.3 before 5.3.4 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4150.html">CVE-2010-4150</cve>
<bugzilla href="https://bugzilla.suse.com/655968">SUSE bug 655968</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199294" comment="apache2-mod_php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199295" comment="php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199296" comment="php53-bcmath-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199297" comment="php53-bz2-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199298" comment="php53-calendar-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199299" comment="php53-ctype-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199300" comment="php53-curl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199301" comment="php53-dba-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199302" comment="php53-dom-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199303" comment="php53-exif-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199304" comment="php53-fastcgi-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199305" comment="php53-fileinfo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199306" comment="php53-ftp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199307" comment="php53-gd-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199308" comment="php53-gettext-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199309" comment="php53-gmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199310" comment="php53-iconv-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199311" comment="php53-intl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199312" comment="php53-json-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199313" comment="php53-ldap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199314" comment="php53-mbstring-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199315" comment="php53-mcrypt-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199316" comment="php53-mysql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199317" comment="php53-odbc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199318" comment="php53-openssl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199319" comment="php53-pcntl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199320" comment="php53-pdo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199321" comment="php53-pear-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199322" comment="php53-pgsql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199323" comment="php53-pspell-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199324" comment="php53-shmop-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199325" comment="php53-snmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199326" comment="php53-soap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199327" comment="php53-suhosin-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199328" comment="php53-sysvmsg-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199329" comment="php53-sysvsem-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199330" comment="php53-sysvshm-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199331" comment="php53-tokenizer-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199332" comment="php53-wddx-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199333" comment="php53-xmlreader-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199334" comment="php53-xmlrpc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199335" comment="php53-xmlwriter-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199336" comment="php53-xsl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199337" comment="php53-zip-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199338" comment="php53-zlib-5.3.17-0.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4157</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-4157" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4157" source="CVE"/>
    <description>
    Integer overflow in the ioc_general function in drivers/scsi/gdth.c in the Linux kernel before 2.6.36.1 on 64-bit platforms allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a large argument in an ioctl call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4157.html">CVE-2010-4157</cve>
<bugzilla href="https://bugzilla.suse.com/652940">SUSE bug 652940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4158</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-4158" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4158" source="CVE"/>
    <description>
    The sk_run_filter function in net/core/filter.c in the Linux kernel before 2.6.36.2 does not check whether a certain memory location has been initialized before executing a (1) BPF_S_LD_MEM or (2) BPF_S_LDX_MEM instruction, which allows local users to obtain potentially sensitive information from kernel stack memory via a crafted socket filter.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4158.html">CVE-2010-4158</cve>
<bugzilla href="https://bugzilla.suse.com/652563">SUSE bug 652563</bugzilla>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4159</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-4159" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4159" source="CVE"/>
    <description>
    Untrusted search path vulnerability in metadata/loader.c in Mono 2.8 and earlier allows local users to gain privileges via a Trojan horse shared library in the current working directory.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4159.html">CVE-2010-4159</cve>
<bugzilla href="https://bugzilla.suse.com/648086">SUSE bug 648086</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199124" comment="mono-core-2.6.7-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199125" comment="mono-data-2.6.7-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199126" comment="mono-data-postgresql-2.6.7-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199127" comment="mono-data-sqlite-2.6.7-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199128" comment="mono-locale-extras-2.6.7-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199129" comment="mono-nunit-2.6.7-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199130" comment="mono-web-2.6.7-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199131" comment="mono-winforms-2.6.7-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4160</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-4160" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4160" source="CVE"/>
    <description>
    Multiple integer overflows in the (1) pppol2tp_sendmsg function in net/l2tp/l2tp_ppp.c, and the (2) l2tp_ip_sendmsg function in net/l2tp/l2tp_ip.c, in the PPPoL2TP and IPoL2TP implementations in the Linux kernel before 2.6.36.2 allow local users to cause a denial of service (heap memory corruption and panic) or possibly gain privileges via a crafted sendto call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4160.html">CVE-2010-4160</cve>
<bugzilla href="https://bugzilla.suse.com/652939">SUSE bug 652939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4162</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-4162" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4162" source="CVE"/>
    <description>
    Multiple integer overflows in fs/bio.c in the Linux kernel before 2.6.36.2 allow local users to cause a denial of service (system crash) via a crafted device ioctl to a SCSI device.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4162.html">CVE-2010-4162</cve>
<bugzilla href="https://bugzilla.suse.com/652945">SUSE bug 652945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4163</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-4163" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4163" source="CVE"/>
    <description>
    The blk_rq_map_user_iov function in block/blk-map.c in the Linux kernel before 2.6.36.2 allows local users to cause a denial of service (panic) via a zero-length I/O request in a device ioctl to a SCSI device.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4163.html">CVE-2010-4163</cve>
<bugzilla href="https://bugzilla.suse.com/652945">SUSE bug 652945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/662202">SUSE bug 662202</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4164</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-4164" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4164" source="CVE"/>
    <description>
    Multiple integer underflows in the x25_parse_facilities function in net/x25/x25_facilities.c in the Linux kernel before 2.6.36.2 allow remote attackers to cause a denial of service (system crash) via malformed X.25 (1) X25_FAC_CLASS_A, (2) X25_FAC_CLASS_B, (3) X25_FAC_CLASS_C, or (4) X25_FAC_CLASS_D facility data, a different vulnerability than CVE-2010-3873.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4164.html">CVE-2010-4164</cve>
<bugzilla href="https://bugzilla.suse.com/653260">SUSE bug 653260</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4165</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-4165" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4165" source="CVE"/>
    <description>
    The do_tcp_setsockopt function in net/ipv4/tcp.c in the Linux kernel before 2.6.37-rc2 does not properly restrict TCP_MAXSEG (aka MSS) values, which allows local users to cause a denial of service (OOPS) via a setsockopt call that specifies a small value, leading to a divide-by-zero error or incorrect use of a signed integer.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4165.html">CVE-2010-4165</cve>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/653258">SUSE bug 653258</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4169</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-4169" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4169" source="CVE"/>
    <description>
    Use-after-free vulnerability in mm/mprotect.c in the Linux kernel before 2.6.37-rc2 allows local users to cause a denial of service via vectors involving an mprotect system call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4169.html">CVE-2010-4169</cve>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/653930">SUSE bug 653930</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4172</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-4172" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4172" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in the Manager application in Apache Tomcat 6.0.12 through 6.0.29 and 7.0.0 through 7.0.4 allow remote attackers to inject arbitrary web script or HTML via the (1) orderBy or (2) sort parameter to sessionsList.jsp, or unspecified input to (3) sessionDetail.jsp or (4) java/org/apache/catalina/manager/JspHelper.java, related to use of untrusted web applications.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4172.html">CVE-2010-4172</cve>
<bugzilla href="https://bugzilla.suse.com/655440">SUSE bug 655440</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199802" comment="tomcat6-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199803" comment="tomcat6-admin-webapps-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199804" comment="tomcat6-docs-webapp-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199805" comment="tomcat6-javadoc-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199806" comment="tomcat6-jsp-2_1-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199807" comment="tomcat6-lib-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199808" comment="tomcat6-servlet-2_5-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199809" comment="tomcat6-webapps-6.0.18-20.35.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4175</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-4175" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4175" source="CVE"/>
    <description>
    Integer overflow in the rds_cmsg_rdma_args function (net/rds/rdma.c) in Linux kernel 2.6.35 allows local users to cause a denial of service (crash) and possibly trigger memory corruption via a crafted Reliable Datagram Sockets (RDS) request, a different vulnerability than CVE-2010-3865.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4175.html">CVE-2010-4175</cve>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/654581">SUSE bug 654581</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4180</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-4180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4180" source="CVE"/>
    <description>
    OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not properly prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the downgrade to an unintended cipher via vectors involving sniffing network traffic to discover a session identifier.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4180.html">CVE-2010-4180</cve>
<bugzilla href="https://bugzilla.suse.com/657663">SUSE bug 657663</bugzilla>
<bugzilla href="https://bugzilla.suse.com/674017">SUSE bug 674017</bugzilla>
<bugzilla href="https://bugzilla.suse.com/711693">SUSE bug 711693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/724729">SUSE bug 724729</bugzilla>
<bugzilla href="https://bugzilla.suse.com/799454">SUSE bug 799454</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199391" comment="curl-7.19.7-1.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199392" comment="libcurl4-7.19.7-1.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199393" comment="libcurl4-32bit-7.19.7-1.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199394" comment="libcurl4-x86-7.19.7-1.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199638" comment="libopenssl0_9_8-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199639" comment="libopenssl0_9_8-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199640" comment="libopenssl0_9_8-hmac-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199641" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199642" comment="libopenssl0_9_8-x86-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199643" comment="openssl-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199644" comment="openssl-doc-0.9.8j-0.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4243</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-4243" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4243" source="CVE"/>
    <description>
    fs/exec.c in the Linux kernel before 2.6.37 does not enable the OOM Killer to assess use of stack memory by arrays representing the (1) arguments and (2) environment, which allows local users to cause a denial of service (memory consumption) via a crafted exec system call, aka an "OOM dodging issue," a related issue to CVE-2010-3858.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4243.html">CVE-2010-4243</cve>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/655220">SUSE bug 655220</bugzilla>
<bugzilla href="https://bugzilla.suse.com/746947">SUSE bug 746947</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4251</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-4251" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4251" source="CVE"/>
    <description>
    The socket implementation in net/core/sock.c in the Linux kernel before 2.6.34 does not properly manage a backlog of received packets, which allows remote attackers to cause a denial of service (memory consumption) by sending a large amount of network traffic, as demonstrated by netperf UDP tests.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4251.html">CVE-2010-4251</cve>
<bugzilla href="https://bugzilla.suse.com/643138">SUSE bug 643138</bugzilla>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/655973">SUSE bug 655973</bugzilla>
<bugzilla href="https://bugzilla.suse.com/826455">SUSE bug 826455</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4252</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-4252" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4252" source="CVE"/>
    <description>
    OpenSSL before 1.0.0c, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4252.html">CVE-2010-4252</cve>
<bugzilla href="https://bugzilla.suse.com/657663">SUSE bug 657663</bugzilla>
<bugzilla href="https://bugzilla.suse.com/711693">SUSE bug 711693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/724729">SUSE bug 724729</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199638" comment="libopenssl0_9_8-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199639" comment="libopenssl0_9_8-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199640" comment="libopenssl0_9_8-hmac-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199641" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199642" comment="libopenssl0_9_8-x86-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199643" comment="openssl-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199644" comment="openssl-doc-0.9.8j-0.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4258</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-4258" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4258" source="CVE"/>
    <description>
    The do_exit function in kernel/exit.c in the Linux kernel before 2.6.36.2 does not properly handle a KERNEL_DS get_fs value, which allows local users to bypass intended access_ok restrictions, overwrite arbitrary kernel memory locations, and gain privileges by leveraging a (1) BUG, (2) NULL pointer dereference, or (3) page fault, as demonstrated by vectors involving the clear_child_tid feature and the splice system call.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4258.html">CVE-2010-4258</cve>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/657350">SUSE bug 657350</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104267" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4267</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-4267" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4267" source="CVE"/>
    <description>
    Stack-based buffer overflow in the hpmud_get_pml function in io/hpmud/pml.c in Hewlett-Packard Linux Imaging and Printing (HPLIP) 1.6.7, 3.9.8, 3.10.9, and probably other versions allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted SNMP response with a large length value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4267.html">CVE-2010-4267</cve>
<bugzilla href="https://bugzilla.suse.com/336658">SUSE bug 336658</bugzilla>
<bugzilla href="https://bugzilla.suse.com/808355">SUSE bug 808355</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198898" comment="hplip-3.11.10-0.6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198899" comment="hplip-hpijs-3.11.10-0.6.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4300</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-4300" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4300" source="CVE"/>
    <description>
    Heap-based buffer overflow in the dissect_ldss_transfer function (epan/dissectors/packet-ldss.c) in the LDSS dissector in Wireshark 1.2.0 through 1.2.12 and 1.4.0 through 1.4.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an LDSS packet with a long digest line that triggers memory corruption.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4300.html">CVE-2010-4300</cve>
<bugzilla href="https://bugzilla.suse.com/655448">SUSE bug 655448</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4301</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-4301" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4301" source="CVE"/>
    <description>
    epan/dissectors/packet-zbee-zcl.c in the ZigBee ZCL dissector in Wireshark 1.4.0 through 1.4.1 allows remote attackers to cause a denial of service (infinite loop) via a crafted ZCL packet, related to Discover Attributes.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4301.html">CVE-2010-4301</cve>
<bugzilla href="https://bugzilla.suse.com/655448">SUSE bug 655448</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4341</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-4341" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4341" source="CVE"/>
    <description>
    The pam_parse_in_data_v2 function in src/responder/pam/pamsrv_cmd.c in the PAM responder in SSSD 1.5.0, 1.4.x, and 1.3 allows local users to cause a denial of service (infinite loop, crash, and login prevention) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4341.html">CVE-2010-4341</cve>
<bugzilla href="https://bugzilla.suse.com/660481">SUSE bug 660481</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199675" comment="libsss_idmap0-1.9.4-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199676" comment="python-sssd-config-1.9.4-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199677" comment="sssd-1.9.4-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199678" comment="sssd-32bit-1.9.4-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199679" comment="sssd-tools-1.9.4-0.12 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4342</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-4342" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4342" source="CVE"/>
    <description>
    The aun_incoming function in net/econet/af_econet.c in the Linux kernel before 2.6.37-rc6, when Econet is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by sending an Acorn Universal Networking (AUN) packet over UDP.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4342.html">CVE-2010-4342</cve>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/658461">SUSE bug 658461</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4352</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-4352" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4352" source="CVE"/>
    <description>
    Stack consumption vulnerability in D-Bus (aka DBus) before 1.4.1 allows local users to cause a denial of service (daemon crash) via a message containing many nested variants.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4352.html">CVE-2010-4352</cve>
<bugzilla href="https://bugzilla.suse.com/659934">SUSE bug 659934</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199397" comment="dbus-1-1.2.10-3.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199398" comment="dbus-1-32bit-1.2.10-3.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199399" comment="dbus-1-x11-1.2.10-3.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199400" comment="dbus-1-x86-1.2.10-3.27 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4409</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-4409" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4409" source="CVE"/>
    <description>
    Integer overflow in the NumberFormatter::getSymbol (aka numfmt_get_symbol) function in PHP 5.3.3 and earlier allows context-dependent attackers to cause a denial of service (application crash) via an invalid argument.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4409.html">CVE-2010-4409</cve>
<bugzilla href="https://bugzilla.suse.com/657910">SUSE bug 657910</bugzilla>
<bugzilla href="https://bugzilla.suse.com/681195">SUSE bug 681195</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199020" comment="libicu-4.0-7.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199021" comment="libicu-32bit-4.0-7.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199022" comment="libicu-doc-4.0-7.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199630" comment="libicu-x86-4.0-7.26 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4410</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-4410" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4410" source="CVE"/>
    <description>
    CRLF injection vulnerability in the header function in (1) CGI.pm before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via vectors related to non-whitespace characters preceded by newline characters, a different vulnerability than CVE-2010-2761 and CVE-2010-3172.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4410.html">CVE-2010-4410</cve>
<bugzilla href="https://bugzilla.suse.com/657343">SUSE bug 657343</bugzilla>
<bugzilla href="https://bugzilla.suse.com/660127">SUSE bug 660127</bugzilla>
<bugzilla href="https://bugzilla.suse.com/663396">SUSE bug 663396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/670476">SUSE bug 670476</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199743" comment="perl-5.10.0-64.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199744" comment="perl-32bit-5.10.0-64.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199745" comment="perl-Module-Build-0.2808.01-0.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199746" comment="perl-Test-Simple-0.72-0.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199747" comment="perl-base-5.10.0-64.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199748" comment="perl-doc-5.10.0-64.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199749" comment="perl-x86-5.10.0-64.67 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4411</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-4411" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4411" source="CVE"/>
    <description>
    Unspecified vulnerability in CGI.pm 3.50 and earlier allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unknown vectors.  NOTE: this issue exists because of an incomplete fix for CVE-2010-2761.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4411.html">CVE-2010-4411</cve>
<bugzilla href="https://bugzilla.suse.com/657343">SUSE bug 657343</bugzilla>
<bugzilla href="https://bugzilla.suse.com/657731">SUSE bug 657731</bugzilla>
<bugzilla href="https://bugzilla.suse.com/663396">SUSE bug 663396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/669245">SUSE bug 669245</bugzilla>
<bugzilla href="https://bugzilla.suse.com/670476">SUSE bug 670476</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199743" comment="perl-5.10.0-64.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199744" comment="perl-32bit-5.10.0-64.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199745" comment="perl-Module-Build-0.2808.01-0.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199746" comment="perl-Test-Simple-0.72-0.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199747" comment="perl-base-5.10.0-64.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199748" comment="perl-doc-5.10.0-64.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199749" comment="perl-x86-5.10.0-64.67 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4476</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-4476" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4476" source="CVE"/>
    <description>
    The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4476.html">CVE-2010-4476</cve>
<bugzilla href="https://bugzilla.suse.com/663679">SUSE bug 663679</bugzilla>
<bugzilla href="https://bugzilla.suse.com/663953">SUSE bug 663953</bugzilla>
<bugzilla href="https://bugzilla.suse.com/669926">SUSE bug 669926</bugzilla>
<bugzilla href="https://bugzilla.suse.com/670304">SUSE bug 670304</bugzilla>
<bugzilla href="https://bugzilla.suse.com/671714">SUSE bug 671714</bugzilla>
<bugzilla href="https://bugzilla.suse.com/672449">SUSE bug 672449</bugzilla>
<bugzilla href="https://bugzilla.suse.com/673738">SUSE bug 673738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/673798">SUSE bug 673798</bugzilla>
<bugzilla href="https://bugzilla.suse.com/679560">SUSE bug 679560</bugzilla>
<bugzilla href="https://bugzilla.suse.com/683761">SUSE bug 683761</bugzilla>
<bugzilla href="https://bugzilla.suse.com/683762">SUSE bug 683762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/683763">SUSE bug 683763</bugzilla>
<bugzilla href="https://bugzilla.suse.com/690583">SUSE bug 690583</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4494</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-4494" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4494" source="CVE"/>
    <description>
    Double free vulnerability in libxml2 2.7.8 and other versions, as used in Google Chrome before 8.0.552.215 and other products, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to XPath handling.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4494.html">CVE-2010-4494</cve>
<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/661471">SUSE bug 661471</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199702" comment="libxml2-2.7.6-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199703" comment="libxml2-32bit-2.7.6-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199704" comment="libxml2-doc-2.7.6-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199705" comment="libxml2-x86-2.7.6-0.23 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4529</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-4529" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4529" source="CVE"/>
    <description>
    Integer underflow in the irda_getsockopt function in net/irda/af_irda.c in the Linux kernel before 2.6.37 on platforms other than x86 allows local users to obtain potentially sensitive information from kernel heap memory via an IRLMP_ENUMDEVICES getsockopt call.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4529.html">CVE-2010-4529</cve>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/662031">SUSE bug 662031</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4530</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-4530" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4530" source="CVE"/>
    <description>
    Signedness error in ccid_serial.c in libccid in the USB Chip/Smart Card Interface Devices (CCID) driver, as used in pcscd in PCSC-Lite 1.5.3 and possibly other products, allows physically proximate attackers to execute arbitrary code via a smart card with a crafted serial number that causes a negative value to be used in a memcpy operation, which triggers a buffer overflow.  NOTE: some sources refer to this issue as an integer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4530.html">CVE-2010-4530</cve>
<bugzilla href="https://bugzilla.suse.com/661000">SUSE bug 661000</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199166" comment="pcsc-ccid-1.3.8-3.15 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4531</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-4531" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4531" source="CVE"/>
    <description>
    Stack-based buffer overflow in the ATRDecodeAtr function in the Answer-to-Reset (ATR) Handler (atrhandler.c) for pcscd in PCSC-Lite 1.5.3, and possibly other 1.5.x and 1.6.x versions, allows physically proximate attackers to cause a denial of service (crash) and possibly execute arbitrary code via a smart card with an ATR message containing a long attribute value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4531.html">CVE-2010-4531</cve>
<bugzilla href="https://bugzilla.suse.com/661000">SUSE bug 661000</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199167" comment="pcsc-lite-1.4.102-1.37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199168" comment="pcsc-lite-32bit-1.4.102-1.37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199169" comment="pcsc-lite-x86-1.4.102-1.37 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4538</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-4538" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4538" source="CVE"/>
    <description>
    Buffer overflow in the sect_enttec_dmx_da function in epan/dissectors/packet-enttec.c in Wireshark 1.4.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted ENTTEC DMX packet with Run Length Encoding (RLE) compression.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4538.html">CVE-2010-4538</cve>
<bugzilla href="https://bugzilla.suse.com/662029">SUSE bug 662029</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4645</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-4645" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4645" source="CVE"/>
    <description>
    strtod.c, as used in the zend_strtod function in PHP 5.2 before 5.2.17 and 5.3 before 5.3.5, and other products, allows context-dependent attackers to cause a denial of service (infinite loop) via a certain floating-point value in scientific notation, which is not properly handled in x87 FPU registers, as demonstrated using 2.2250738585072011e-308.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4645.html">CVE-2010-4645</cve>
<bugzilla href="https://bugzilla.suse.com/662932">SUSE bug 662932</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199294" comment="apache2-mod_php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199295" comment="php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199296" comment="php53-bcmath-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199297" comment="php53-bz2-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199298" comment="php53-calendar-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199299" comment="php53-ctype-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199300" comment="php53-curl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199301" comment="php53-dba-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199302" comment="php53-dom-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199303" comment="php53-exif-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199304" comment="php53-fastcgi-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199305" comment="php53-fileinfo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199306" comment="php53-ftp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199307" comment="php53-gd-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199308" comment="php53-gettext-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199309" comment="php53-gmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199310" comment="php53-iconv-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199311" comment="php53-intl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199312" comment="php53-json-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199313" comment="php53-ldap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199314" comment="php53-mbstring-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199315" comment="php53-mcrypt-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199316" comment="php53-mysql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199317" comment="php53-odbc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199318" comment="php53-openssl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199319" comment="php53-pcntl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199320" comment="php53-pdo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199321" comment="php53-pear-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199322" comment="php53-pgsql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199323" comment="php53-pspell-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199324" comment="php53-shmop-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199325" comment="php53-snmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199326" comment="php53-soap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199327" comment="php53-suhosin-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199328" comment="php53-sysvmsg-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199329" comment="php53-sysvsem-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199330" comment="php53-sysvshm-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199331" comment="php53-tokenizer-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199332" comment="php53-wddx-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199333" comment="php53-xmlreader-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199334" comment="php53-xmlrpc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199335" comment="php53-xmlwriter-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199336" comment="php53-xsl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199337" comment="php53-zip-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199338" comment="php53-zlib-5.3.17-0.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4649</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-4649" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4649" source="CVE"/>
    <description>
    Integer overflow in the ib_uverbs_poll_cq function in drivers/infiniband/core/uverbs_cmd.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a large value of a certain structure member.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4649.html">CVE-2010-4649</cve>
<bugzilla href="https://bugzilla.suse.com/662953">SUSE bug 662953</bugzilla>
<bugzilla href="https://bugzilla.suse.com/690537">SUSE bug 690537</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199724" comment="ofed-1.5.4.1-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199725" comment="ofed-doc-1.5.4.1-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199726" comment="ofed-kmp-default-1.5.4.1_3.0.76_0.11-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199727" comment="ofed-kmp-pae-1.5.4.1_3.0.76_0.11-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199728" comment="ofed-kmp-ppc64-1.5.4.1_3.0.76_0.11-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199729" comment="ofed-kmp-trace-1.5.4.1_3.0.76_0.11-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4651</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2010-4651" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4651" source="CVE"/>
    <description>
    Directory traversal vulnerability in util.c in GNU patch 2.6.1 and earlier allows user-assisted remote attackers to create or overwrite arbitrary files via a filename that is specified with a .. (dot dot) or full pathname, a related issue to CVE-2010-1679.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4651.html">CVE-2010-4651</cve>
<bugzilla href="https://bugzilla.suse.com/1093615">SUSE bug 1093615</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1101128">SUSE bug 1101128</bugzilla>
<bugzilla href="https://bugzilla.suse.com/662957">SUSE bug 662957</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205697" comment="patch-2.5.9-252.22.7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4656</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-4656" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4656" source="CVE"/>
    <description>
    The iowarrior_write function in drivers/usb/misc/iowarrior.c in the Linux kernel before 2.6.37 does not properly allocate memory, which might allow local users to trigger a heap-based buffer overflow, and consequently cause a denial of service or gain privileges, via a long report.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4656.html">CVE-2010-4656</cve>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/666842">SUSE bug 666842</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4665</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-4665" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4665" source="CVE"/>
    <description>
    Integer overflow in the ReadDirectory function in tiffdump.c in tiffdump in LibTIFF before 3.9.5 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF file containing a directory data structure with many directory entries.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4665.html">CVE-2010-4665</cve>
<bugzilla href="https://bugzilla.suse.com/687442">SUSE bug 687442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199680" comment="libtiff3-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199681" comment="libtiff3-32bit-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199682" comment="libtiff3-x86-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199683" comment="tiff-3.8.2-141.152 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4668</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-4668" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4668" source="CVE"/>
    <description>
    The blk_rq_map_user_iov function in block/blk-map.c in the Linux kernel before 2.6.37-rc7 allows local users to cause a denial of service (panic) via a zero-length I/O request in a device ioctl to a SCSI device, related to an unaligned map.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-4163.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4668.html">CVE-2010-4668</cve>
<bugzilla href="https://bugzilla.suse.com/652945">SUSE bug 652945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/662202">SUSE bug 662202</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4777</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-4777" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4777" source="CVE"/>
    <description>
    The Perl_reg_numbered_buff_fetch function in Perl 5.10.0, 5.12.0, 5.14.0, and other versions, when running with debugging enabled, allows context-dependent attackers to cause a denial of service (assertion failure and application exit) via crafted input that is not properly handled when using certain regular expressions, as demonstrated by causing SpamAssassin and OCSInventory to crash.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4777.html">CVE-2010-4777</cve>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199743" comment="perl-5.10.0-64.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199744" comment="perl-32bit-5.10.0-64.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199745" comment="perl-Module-Build-0.2808.01-0.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199746" comment="perl-Test-Simple-0.72-0.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199747" comment="perl-base-5.10.0-64.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199748" comment="perl-doc-5.10.0-64.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199749" comment="perl-x86-5.10.0-64.67 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4818</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-4818" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4818" source="CVE"/>
    <description>
    The GLX extension in X.Org xserver 1.7.7 allows remote authenticated users to cause a denial of service (server crash) and possibly execute arbitrary code via (1) a crafted request that triggers a client swap in glx/glxcmdsswap.c; or (2) a crafted length or (3) a negative value in the screen field in a request to glx/glxcmds.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4818.html">CVE-2010-4818</cve>
<bugzilla href="https://bugzilla.suse.com/648287">SUSE bug 648287</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199825" comment="xorg-x11-Xvnc-7.4-27.81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199826" comment="xorg-x11-server-7.4-27.81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199827" comment="xorg-x11-server-extra-7.4-27.81 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4819</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-4819" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4819" source="CVE"/>
    <description>
    The ProcRenderAddGlyphs function in the Render extension (render/render.c) in X.Org xserver 1.7.7 and earlier allows local users to read arbitrary memory and possibly cause a denial of service (server crash) via unspecified vectors related to an "input sanitization flaw."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4819.html">CVE-2010-4819</cve>
<bugzilla href="https://bugzilla.suse.com/648290">SUSE bug 648290</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199825" comment="xorg-x11-Xvnc-7.4-27.81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199826" comment="xorg-x11-server-7.4-27.81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199827" comment="xorg-x11-server-extra-7.4-27.81 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20105107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-5107</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2010-5107" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5107" source="CVE"/>
    <description>
    The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-5107.html">CVE-2010-5107</cve>
<bugzilla href="https://bugzilla.suse.com/1074631">SUSE bug 1074631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/802639">SUSE bug 802639</bugzilla>
<bugzilla href="https://bugzilla.suse.com/841638">SUSE bug 841638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/858359">SUSE bug 858359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/880259">SUSE bug 880259</bugzilla>
<bugzilla href="https://bugzilla.suse.com/881234">SUSE bug 881234</bugzilla>
<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199733" comment="openssh-6.2p2-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199734" comment="openssh-askpass-6.2p2-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20105110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-5110</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2010-5110" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5110" source="CVE"/>
    <description>
    DCTStream.cc in Poppler before 0.13.3 allows remote attackers to cause a denial of service (crash) via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-5110.html">CVE-2010-5110</cve>
<bugzilla href="https://bugzilla.suse.com/845765">SUSE bug 845765</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200274" comment="libpoppler-glib4-0.12.3-1.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200275" comment="libpoppler-qt4-3-0.12.3-1.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200276" comment="libpoppler5-0.12.3-1.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200277" comment="poppler-tools-0.12.3-1.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0001</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0001" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0001" source="CVE"/>
    <description>
    Double free vulnerability in the iscsi_rx_handler function (usr/iscsi/iscsid.c) in the tgt daemon (tgtd) in Linux SCSI target framework (tgt) before 1.0.14, aka scsi-target-utils, allows remote attackers to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via unknown vectors related to a buffer overflow during iscsi login.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0001.html">CVE-2011-0001</cve>
<bugzilla href="https://bugzilla.suse.com/665415">SUSE bug 665415</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199801" comment="tgt-0.9.10-0.17 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0013</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0013" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0013" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in the HTML Manager Interface in Apache Tomcat 5.5 before 5.5.32, 6.0 before 6.0.30, and 7.0 before 7.0.6 allow remote attackers to inject arbitrary web script or HTML, as demonstrated via the display-name tag.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0013.html">CVE-2011-0013</cve>
<bugzilla href="https://bugzilla.suse.com/669929">SUSE bug 669929</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199802" comment="tomcat6-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199803" comment="tomcat6-admin-webapps-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199804" comment="tomcat6-docs-webapp-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199805" comment="tomcat6-javadoc-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199806" comment="tomcat6-jsp-2_1-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199807" comment="tomcat6-lib-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199808" comment="tomcat6-servlet-2_5-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199809" comment="tomcat6-webapps-6.0.18-20.35.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0014</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0014" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0014" source="CVE"/>
    <description>
    ssl/t1_lib.c in OpenSSL 0.9.8h through 0.9.8q and 1.0.0 through 1.0.0c allows remote attackers to cause a denial of service (crash), and possibly obtain sensitive information in applications that use OpenSSL, via a malformed ClientHello handshake message that triggers an out-of-bounds memory access, aka "OCSP stapling vulnerability."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0014.html">CVE-2011-0014</cve>
<bugzilla href="https://bugzilla.suse.com/670526">SUSE bug 670526</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199638" comment="libopenssl0_9_8-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199639" comment="libopenssl0_9_8-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199640" comment="libopenssl0_9_8-hmac-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199641" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199642" comment="libopenssl0_9_8-x86-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199643" comment="openssl-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199644" comment="openssl-doc-0.9.8j-0.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0020</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0020" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0020" source="CVE"/>
    <description>
    Heap-based buffer overflow in the pango_ft2_font_render_box_glyph function in pango/pangoft2-render.c in libpango in Pango 1.28.3 and earlier, when the FreeType2 backend is enabled, allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file, related to the glyph box for an FT_Bitmap object.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0020.html">CVE-2011-0020</cve>
<bugzilla href="https://bugzilla.suse.com/666101">SUSE bug 666101</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199162" comment="pango-1.26.2-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199163" comment="pango-32bit-1.26.2-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199164" comment="pango-doc-1.26.2-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199165" comment="pango-x86-1.26.2-1.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0024</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0024" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0024" source="CVE"/>
    <description>
    Heap-based buffer overflow in wiretap/pcapng.c in Wireshark before 1.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted capture file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0024.html">CVE-2011-0024</cve>
<bugzilla href="https://bugzilla.suse.com/683335">SUSE bug 683335</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0051</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0051" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0051" source="CVE"/>
    <description>
    Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, and SeaMonkey before 2.0.12, does not properly handle certain recursive eval calls, which makes it easier for remote attackers to force a user to respond positively to a dialog question, as demonstrated by a question about granting privileges.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0051.html">CVE-2011-0051</cve>
<bugzilla href="https://bugzilla.suse.com/667155">SUSE bug 667155</bugzilla>
<bugzilla href="https://bugzilla.suse.com/679570">SUSE bug 679570</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0053</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0053" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0053" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, Thunderbird before 3.1.8, and SeaMonkey before 2.0.12 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0053.html">CVE-2011-0053</cve>
<bugzilla href="https://bugzilla.suse.com/667155">SUSE bug 667155</bugzilla>
<bugzilla href="https://bugzilla.suse.com/679570">SUSE bug 679570</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0054</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0054" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0054" source="CVE"/>
    <description>
    Buffer overflow in the JavaScript engine in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, and SeaMonkey before 2.0.12, might allow remote attackers to execute arbitrary code via vectors involving non-local JavaScript variables, aka an "upvarMap" issue.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0054.html">CVE-2011-0054</cve>
<bugzilla href="https://bugzilla.suse.com/667155">SUSE bug 667155</bugzilla>
<bugzilla href="https://bugzilla.suse.com/679570">SUSE bug 679570</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0055</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0055" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0055" source="CVE"/>
    <description>
    Use-after-free vulnerability in the JSON.stringify method in js3250.dll in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, and SeaMonkey before 2.0.12, might allow remote attackers to execute arbitrary code via unspecified vectors related to the js_HasOwnProperty function and garbage collection.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0055.html">CVE-2011-0055</cve>
<bugzilla href="https://bugzilla.suse.com/667155">SUSE bug 667155</bugzilla>
<bugzilla href="https://bugzilla.suse.com/679570">SUSE bug 679570</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0056</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0056" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0056" source="CVE"/>
    <description>
    Buffer overflow in the JavaScript engine in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, and SeaMonkey before 2.0.12, might allow remote attackers to execute arbitrary code via vectors involving exception timing and a large number of string values, aka an "atom map" issue.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0056.html">CVE-2011-0056</cve>
<bugzilla href="https://bugzilla.suse.com/667155">SUSE bug 667155</bugzilla>
<bugzilla href="https://bugzilla.suse.com/679570">SUSE bug 679570</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0057</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0057" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0057" source="CVE"/>
    <description>
    Use-after-free vulnerability in the Web Workers implementation in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, and SeaMonkey before 2.0.12, allows remote attackers to execute arbitrary code via vectors related to a JavaScript Worker and garbage collection.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0057.html">CVE-2011-0057</cve>
<bugzilla href="https://bugzilla.suse.com/667155">SUSE bug 667155</bugzilla>
<bugzilla href="https://bugzilla.suse.com/679570">SUSE bug 679570</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0059</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0059" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0059" source="CVE"/>
    <description>
    Cross-site request forgery (CSRF) vulnerability in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, and SeaMonkey before 2.0.12, allows remote attackers to hijack the authentication of arbitrary users for requests that were initiated by a plugin and received a 307 redirect to a page on a different web site.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0059.html">CVE-2011-0059</cve>
<bugzilla href="https://bugzilla.suse.com/667155">SUSE bug 667155</bugzilla>
<bugzilla href="https://bugzilla.suse.com/679570">SUSE bug 679570</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0061</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0061" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0061" source="CVE"/>
    <description>
    Buffer overflow in Mozilla Firefox 3.6.x before 3.6.14, Thunderbird before 3.1.8, and SeaMonkey before 2.0.12 might allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted JPEG image.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0061.html">CVE-2011-0061</cve>
<bugzilla href="https://bugzilla.suse.com/667155">SUSE bug 667155</bugzilla>
<bugzilla href="https://bugzilla.suse.com/679570">SUSE bug 679570</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0062</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0062" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0062" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.6.x before 3.6.14 and Thunderbird 3.1.x before 3.1.8 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0062.html">CVE-2011-0062</cve>
<bugzilla href="https://bugzilla.suse.com/667155">SUSE bug 667155</bugzilla>
<bugzilla href="https://bugzilla.suse.com/679570">SUSE bug 679570</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0064</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0064" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0064" source="CVE"/>
    <description>
    The hb_buffer_ensure function in hb-buffer.c in HarfBuzz, as used in Pango 1.28.3, Firefox, and other products, does not verify that memory reallocations succeed, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly execute arbitrary code via crafted OpenType font data that triggers use of an incorrect index.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0064.html">CVE-2011-0064</cve>
<bugzilla href="https://bugzilla.suse.com/666101">SUSE bug 666101</bugzilla>
<bugzilla href="https://bugzilla.suse.com/672502">SUSE bug 672502</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199162" comment="pango-1.26.2-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199163" comment="pango-32bit-1.26.2-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199164" comment="pango-doc-1.26.2-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199165" comment="pango-x86-1.26.2-1.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0065</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0065" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0065" source="CVE"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 3.5.19 and 3.6.x before 3.6.17, and SeaMonkey before 2.0.14, allows remote attackers to execute arbitrary code via vectors related to OBJECT's mChannel.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0065.html">CVE-2011-0065</cve>
<bugzilla href="https://bugzilla.suse.com/689281">SUSE bug 689281</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0066</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0066" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0066" source="CVE"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 3.5.19 and 3.6.x before 3.6.17, and SeaMonkey before 2.0.14, allows remote attackers to execute arbitrary code via vectors related to OBJECT's mObserverList.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0066.html">CVE-2011-0066</cve>
<bugzilla href="https://bugzilla.suse.com/689281">SUSE bug 689281</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0067</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0067" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0067" source="CVE"/>
    <description>
    Mozilla Firefox before 3.5.19 and 3.6.x before 3.6.17, and SeaMonkey before 2.0.14, does not properly implement autocompletion for forms, which allows remote attackers to read form history entries via a Java applet that spoofs interaction with the autocomplete controls.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0067.html">CVE-2011-0067</cve>
<bugzilla href="https://bugzilla.suse.com/689281">SUSE bug 689281</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0069</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0069" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0069" source="CVE"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.19, 3.6.x before 3.6.17, and 4.x before 4.0.1; Thunderbird before 3.1.10; and SeaMonkey before 2.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0070.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0069.html">CVE-2011-0069</cve>
<bugzilla href="https://bugzilla.suse.com/689281">SUSE bug 689281</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0070</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0070" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0070" source="CVE"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.19, 3.6.x before 3.6.17, and 4.x before 4.0.1; Thunderbird before 3.1.10; and SeaMonkey before 2.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0069.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0070.html">CVE-2011-0070</cve>
<bugzilla href="https://bugzilla.suse.com/689281">SUSE bug 689281</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0072</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0072" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0072" source="CVE"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.19 and 3.6.x before 3.6.17, Thunderbird before 3.1.10, and SeaMonkey before 2.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0074, CVE-2011-0075, CVE-2011-0077, and CVE-2011-0078.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0072.html">CVE-2011-0072</cve>
<bugzilla href="https://bugzilla.suse.com/689281">SUSE bug 689281</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0073</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0073" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0073" source="CVE"/>
    <description>
    Mozilla Firefox before 3.5.19 and 3.6.x before 3.6.17, and SeaMonkey before 2.0.14, does not properly use nsTreeRange data structures, which allows remote attackers to execute arbitrary code via unspecified vectors that lead to a "dangling pointer."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0073.html">CVE-2011-0073</cve>
<bugzilla href="https://bugzilla.suse.com/689281">SUSE bug 689281</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0074</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0074" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0074" source="CVE"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.19 and 3.6.x before 3.6.17, Thunderbird before 3.1.10, and SeaMonkey before 2.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0072, CVE-2011-0075, CVE-2011-0077, and CVE-2011-0078.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0074.html">CVE-2011-0074</cve>
<bugzilla href="https://bugzilla.suse.com/689281">SUSE bug 689281</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0075</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0075" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0075" source="CVE"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.19 and 3.6.x before 3.6.17, Thunderbird before 3.1.10, and SeaMonkey before 2.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0072, CVE-2011-0074, CVE-2011-0077, and CVE-2011-0078.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0075.html">CVE-2011-0075</cve>
<bugzilla href="https://bugzilla.suse.com/689281">SUSE bug 689281</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0077</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0077" source="CVE"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.19 and 3.6.x before 3.6.17, Thunderbird before 3.1.10, and SeaMonkey before 2.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0072, CVE-2011-0074, CVE-2011-0075, and CVE-2011-0078.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0077.html">CVE-2011-0077</cve>
<bugzilla href="https://bugzilla.suse.com/689281">SUSE bug 689281</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0078</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0078" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0078" source="CVE"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.19 and 3.6.x before 3.6.17, Thunderbird before 3.1.10, and SeaMonkey before 2.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0072, CVE-2011-0074, CVE-2011-0075, and CVE-2011-0077.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0078.html">CVE-2011-0078</cve>
<bugzilla href="https://bugzilla.suse.com/689281">SUSE bug 689281</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0080</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0080" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0080" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.19 and 3.6.x before 3.6.17, Thunderbird before 3.1.10, and SeaMonkey before 2.0.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0080.html">CVE-2011-0080</cve>
<bugzilla href="https://bugzilla.suse.com/689281">SUSE bug 689281</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0081</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0081" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0081" source="CVE"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox 3.6.x before 3.6.17 and 4.x before 4.0.1, and Thunderbird 3.1.x before 3.1.10, allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0081.html">CVE-2011-0081</cve>
<bugzilla href="https://bugzilla.suse.com/689281">SUSE bug 689281</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0083</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0083" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0083" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsSVGPathSegList::ReplaceItem function in the implementation of SVG element lists in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving a user-supplied callback.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0083.html">CVE-2011-0083</cve>
<bugzilla href="https://bugzilla.suse.com/701296">SUSE bug 701296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/704750">SUSE bug 704750</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0084</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0084" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0084" source="CVE"/>
    <description>
    The SVGTextElement.getCharNumAtPosition function in Mozilla Firefox before 3.6.20, and 4.x through 5; Thunderbird 3.x before 3.1.12 and other versions before 6; SeaMonkey 2.x before 2.3; and possibly other products does not properly handle SVG text, which allows remote attackers to execute arbitrary code via unspecified vectors that lead to a "dangling pointer."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0084.html">CVE-2011-0084</cve>
<bugzilla href="https://bugzilla.suse.com/712224">SUSE bug 712224</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0085</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0085" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0085" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsXULCommandDispatcher function in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to execute arbitrary code via a crafted XUL document that dequeues the current command updater.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0085.html">CVE-2011-0085</cve>
<bugzilla href="https://bugzilla.suse.com/701296">SUSE bug 701296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/701995">SUSE bug 701995</bugzilla>
<bugzilla href="https://bugzilla.suse.com/704750">SUSE bug 704750</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0188</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0188" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0188" source="CVE"/>
    <description>
    The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving creation of a large BigDecimal value within a 64-bit process, related to an "integer truncation issue."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0188.html">CVE-2011-0188</cve>
<bugzilla href="https://bugzilla.suse.com/682287">SUSE bug 682287</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199778" comment="ruby-1.8.7.p357-0.9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199779" comment="ruby-doc-html-1.8.7.p357-0.9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199780" comment="ruby-tk-1.8.7.p357-0.9.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0191</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0191" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0191" source="CVE"/>
    <description>
    Buffer overflow in LibTIFF 3.9.4 and possibly other versions, as used in ImageIO in Apple iTunes before 10.2 on Windows and other products, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted TIFF image with JPEG encoding.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0191.html">CVE-2011-0191</cve>
<bugzilla href="https://bugzilla.suse.com/672505">SUSE bug 672505</bugzilla>
<bugzilla href="https://bugzilla.suse.com/672510">SUSE bug 672510</bugzilla>
<bugzilla href="https://bugzilla.suse.com/682053">SUSE bug 682053</bugzilla>
<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199680" comment="libtiff3-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199681" comment="libtiff3-32bit-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199682" comment="libtiff3-x86-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199683" comment="tiff-3.8.2-141.152 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0192</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0192" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0192" source="CVE"/>
    <description>
    Buffer overflow in Fax4Decode in LibTIFF 3.9.4 and possibly other versions, as used in ImageIO in Apple iTunes before 10.2 on Windows and other products, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted TIFF Internet Fax image file that has been compressed using CCITT Group 4 encoding, related to the EXPAND2D macro in libtiff/tif_fax3.h.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0192.html">CVE-2011-0192</cve>
<bugzilla href="https://bugzilla.suse.com/672510">SUSE bug 672510</bugzilla>
<bugzilla href="https://bugzilla.suse.com/682053">SUSE bug 682053</bugzilla>
<bugzilla href="https://bugzilla.suse.com/682871">SUSE bug 682871</bugzilla>
<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199680" comment="libtiff3-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199681" comment="libtiff3-32bit-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199682" comment="libtiff3-x86-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199683" comment="tiff-3.8.2-141.152 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0226</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0226" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0226" source="CVE"/>
    <description>
    Integer signedness error in psaux/t1decode.c in FreeType before 2.4.6, as used in CoreGraphics in Apple iOS before 4.2.9 and 4.3.x before 4.3.4 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Type 1 font in a PDF document, as exploited in the wild in July 2011.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0226.html">CVE-2011-0226</cve>
<bugzilla href="https://bugzilla.suse.com/704612">SUSE bug 704612</bugzilla>
<bugzilla href="https://bugzilla.suse.com/728044">SUSE bug 728044</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199430" comment="freetype2-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199431" comment="freetype2-32bit-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199432" comment="freetype2-x86-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199433" comment="ft2demos-2.3.7-25.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0281</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0281" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0281" source="CVE"/>
    <description>
    The unparse implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.6.x through 1.9, when an LDAP backend is used, allows remote attackers to cause a denial of service (file descriptor exhaustion and daemon hang) via a principal name that triggers use of a backslash escape sequence, as demonstrated by a \n sequence.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0281.html">CVE-2011-0281</cve>
<bugzilla href="https://bugzilla.suse.com/663619">SUSE bug 663619</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199544" comment="krb5-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199545" comment="krb5-32bit-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199546" comment="krb5-apps-clients-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199547" comment="krb5-apps-servers-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199548" comment="krb5-client-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199552" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199553" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199549" comment="krb5-server-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199550" comment="krb5-x86-1.6.3-133.49.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0282</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0282" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0282" source="CVE"/>
    <description>
    The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.6.x through 1.9, when an LDAP backend is used, allows remote attackers to cause a denial of service (NULL pointer dereference or buffer over-read, and daemon crash) via a crafted principal name.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0282.html">CVE-2011-0282</cve>
<bugzilla href="https://bugzilla.suse.com/663619">SUSE bug 663619</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199544" comment="krb5-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199545" comment="krb5-32bit-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199546" comment="krb5-apps-clients-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199547" comment="krb5-apps-servers-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199548" comment="krb5-client-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199552" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199553" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199549" comment="krb5-server-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199550" comment="krb5-x86-1.6.3-133.49.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0411</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0411" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0411" source="CVE"/>
    <description>
    The STARTTLS implementation in Postfix 2.4.x before 2.4.16, 2.5.x before 2.5.12, 2.6.x before 2.6.9, and 2.7.x before 2.7.3 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0411.html">CVE-2011-0411</cve>
<bugzilla href="https://bugzilla.suse.com/677792">SUSE bug 677792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/686590">SUSE bug 686590</bugzilla>
<bugzilla href="https://bugzilla.suse.com/689178">SUSE bug 689178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/776967">SUSE bug 776967</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199756" comment="pure-ftpd-1.0.22-3.19 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0419</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0419" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0419" source="CVE"/>
    <description>
    Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0419.html">CVE-2011-0419</cve>
<bugzilla href="https://bugzilla.suse.com/693778">SUSE bug 693778</bugzilla>
<bugzilla href="https://bugzilla.suse.com/700212">SUSE bug 700212</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199600" comment="libapr1-1.3.3-11.18.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199601" comment="libapr1-32bit-1.3.3-11.18.19 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0420</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0420" source="CVE"/>
    <description>
    The grapheme_extract function in the Internationalization extension (Intl) for ICU for PHP 5.3.5 allows context-dependent attackers to cause a denial of service (crash) via an invalid size argument, which triggers a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0420.html">CVE-2011-0420</cve>
<bugzilla href="https://bugzilla.suse.com/672933">SUSE bug 672933</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199294" comment="apache2-mod_php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199295" comment="php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199296" comment="php53-bcmath-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199297" comment="php53-bz2-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199298" comment="php53-calendar-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199299" comment="php53-ctype-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199300" comment="php53-curl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199301" comment="php53-dba-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199302" comment="php53-dom-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199303" comment="php53-exif-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199304" comment="php53-fastcgi-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199305" comment="php53-fileinfo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199306" comment="php53-ftp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199307" comment="php53-gd-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199308" comment="php53-gettext-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199309" comment="php53-gmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199310" comment="php53-iconv-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199311" comment="php53-intl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199312" comment="php53-json-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199313" comment="php53-ldap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199314" comment="php53-mbstring-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199315" comment="php53-mcrypt-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199316" comment="php53-mysql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199317" comment="php53-odbc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199318" comment="php53-openssl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199319" comment="php53-pcntl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199320" comment="php53-pdo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199321" comment="php53-pear-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199322" comment="php53-pgsql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199323" comment="php53-pspell-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199324" comment="php53-shmop-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199325" comment="php53-snmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199326" comment="php53-soap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199327" comment="php53-suhosin-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199328" comment="php53-sysvmsg-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199329" comment="php53-sysvsem-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199330" comment="php53-sysvshm-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199331" comment="php53-tokenizer-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199332" comment="php53-wddx-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199333" comment="php53-xmlreader-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199334" comment="php53-xmlrpc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199335" comment="php53-xmlwriter-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199336" comment="php53-xsl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199337" comment="php53-zip-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199338" comment="php53-zlib-5.3.17-0.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0421</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0421" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0421" source="CVE"/>
    <description>
    The _zip_name_locate function in zip_name_locate.c in the Zip extension in PHP before 5.3.6 does not properly handle a ZIPARCHIVE::FL_UNCHANGED argument, which might allow context-dependent attackers to cause a denial of service (NULL pointer dereference) via an empty ZIP archive that is processed with a (1) locateName or (2) statName operation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0421.html">CVE-2011-0421</cve>
<bugzilla href="https://bugzilla.suse.com/681193">SUSE bug 681193</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199294" comment="apache2-mod_php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199118" comment="libzip1-0.9-1.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199295" comment="php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199296" comment="php53-bcmath-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199297" comment="php53-bz2-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199298" comment="php53-calendar-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199299" comment="php53-ctype-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199300" comment="php53-curl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199301" comment="php53-dba-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199302" comment="php53-dom-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199303" comment="php53-exif-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199304" comment="php53-fastcgi-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199305" comment="php53-fileinfo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199306" comment="php53-ftp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199307" comment="php53-gd-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199308" comment="php53-gettext-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199309" comment="php53-gmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199310" comment="php53-iconv-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199311" comment="php53-intl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199312" comment="php53-json-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199313" comment="php53-ldap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199314" comment="php53-mbstring-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199315" comment="php53-mcrypt-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199316" comment="php53-mysql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199317" comment="php53-odbc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199318" comment="php53-openssl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199319" comment="php53-pcntl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199320" comment="php53-pdo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199321" comment="php53-pear-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199322" comment="php53-pgsql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199323" comment="php53-pspell-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199324" comment="php53-shmop-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199325" comment="php53-snmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199326" comment="php53-soap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199327" comment="php53-suhosin-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199328" comment="php53-sysvmsg-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199329" comment="php53-sysvsem-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199330" comment="php53-sysvshm-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199331" comment="php53-tokenizer-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199332" comment="php53-wddx-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199333" comment="php53-xmlreader-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199334" comment="php53-xmlrpc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199335" comment="php53-xmlwriter-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199336" comment="php53-xsl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199337" comment="php53-zip-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199338" comment="php53-zlib-5.3.17-0.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0433</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0433" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0433" source="CVE"/>
    <description>
    Heap-based buffer overflow in the linetoken function in afmparse.c in t1lib, as used in teTeX 3.0.x, GNOME evince, and possibly other products, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a DVI file containing a crafted Adobe Font Metrics (AFM) file, a different vulnerability than CVE-2010-2642.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0433.html">CVE-2011-0433</cve>
<bugzilla href="https://bugzilla.suse.com/671064">SUSE bug 671064</bugzilla>
<bugzilla href="https://bugzilla.suse.com/790421">SUSE bug 790421</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199796" comment="t1lib-5.1.1-100.21 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0460</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0460" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0460" source="CVE"/>
    <description>
    The init script in kbd, possibly 1.14.1 and earlier, allows local users to overwrite arbitrary files via a symlink attack on /dev/shm/defkeymap.map.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0460.html">CVE-2011-0460</cve>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198908" comment="kbd-1.14.1-16.31 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0461</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0461" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0461" source="CVE"/>
    <description>
    /etc/init.d/boot.localfs in the aaa_base package before 11.2-43.48.1 in SUSE openSUSE 11.2, and before 11.3-8.7.1 in openSUSE 11.3, allows local users to overwrite arbitrary files via a symlink attack on /dev/shm/mtab.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0461.html">CVE-2011-0461</cve>
<bugzilla href="https://bugzilla.suse.com/665479">SUSE bug 665479</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199284" comment="aaa_base-11-6.90 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0465</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0465" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0465" source="CVE"/>
    <description>
    xrdb.c in xrdb before 1.0.9 in X.Org X11R7.6 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a (1) DHCP or (2) XDMCP message.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0465.html">CVE-2011-0465</cve>
<bugzilla href="https://bugzilla.suse.com/674733">SUSE bug 674733</bugzilla>
<bugzilla href="https://bugzilla.suse.com/688931">SUSE bug 688931</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199823" comment="xorg-x11-7.4-9.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199824" comment="xorg-x11-xauth-7.4-9.62 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0521</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0521" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0521" source="CVE"/>
    <description>
    The dvb_ca_ioctl function in drivers/media/dvb/ttpci/av7110_ca.c in the Linux kernel before 2.6.38-rc2 does not check the sign of a certain integer field, which allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a negative value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0521.html">CVE-2011-0521</cve>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/666836">SUSE bug 666836</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0534</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0534" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0534" source="CVE"/>
    <description>
    Apache Tomcat 7.0.0 through 7.0.6 and 6.0.0 through 6.0.30 does not enforce the maxHttpHeaderSize limit for requests involving the NIO HTTP connector, which allows remote attackers to cause a denial of service (OutOfMemoryError) via a crafted request.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0534.html">CVE-2011-0534</cve>
<bugzilla href="https://bugzilla.suse.com/669930">SUSE bug 669930</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199802" comment="tomcat6-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199803" comment="tomcat6-admin-webapps-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199804" comment="tomcat6-docs-webapp-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199805" comment="tomcat6-javadoc-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199806" comment="tomcat6-jsp-2_1-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199807" comment="tomcat6-lib-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199808" comment="tomcat6-servlet-2_5-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199809" comment="tomcat6-webapps-6.0.18-20.35.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0538</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0538" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0538" source="CVE"/>
    <description>
    Wireshark 1.2.0 through 1.2.14, 1.4.0 through 1.4.3, and 1.5.0 frees an uninitialized pointer during processing of a .pcap file in the pcap-ng format, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a malformed file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0538.html">CVE-2011-0538</cve>
<bugzilla href="https://bugzilla.suse.com/669908">SUSE bug 669908</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0541</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0541" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0541" source="CVE"/>
    <description>
    fuse 2.8.5 and earlier does not properly handle when /etc/mtab cannot be updated, which allows local users to unmount arbitrary directories via a symlink attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0541.html">CVE-2011-0541</cve>
<bugzilla href="https://bugzilla.suse.com/668820">SUSE bug 668820</bugzilla>
<bugzilla href="https://bugzilla.suse.com/685055">SUSE bug 685055</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199434" comment="fuse-2.8.7-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199435" comment="libfuse2-2.8.7-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0633</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0633" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0633" source="CVE"/>
    <description>
    The Net::HTTPS module in libwww-perl (LWP) before 6.00, as used in WWW::Mechanize, LWP::UserAgent, and other products, when running in environments that do not set the If-SSL-Cert-Subject header, does not enable full validation of SSL certificates by default, which allows remote attackers to spoof servers via man-in-the-middle (MITM) attacks involving hostnames that are not properly validated.  NOTE: it could be argued that this is a design limitation of the Net::HTTPS API, and separate implementations should be independently assigned CVE identifiers for not working around this limitation. However, because this API was modified within LWP, a single CVE identifier has been assigned.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0633.html">CVE-2011-0633</cve>
<bugzilla href="https://bugzilla.suse.com/693999">SUSE bug 693999</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199175" comment="perl-libwww-perl-5.816-2.23 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0707</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0707" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0707" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in Cgi/confirm.py in GNU Mailman 2.1.14 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) full name or (2) username field in a confirmation message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0707.html">CVE-2011-0707</cve>
<bugzilla href="https://bugzilla.suse.com/671745">SUSE bug 671745</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199711" comment="mailman-2.1.14-9.6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0708</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0708" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0708" source="CVE"/>
    <description>
    exif.c in the Exif extension in PHP before 5.3.6 on 64-bit platforms performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) via an image with a crafted Image File Directory (IFD) that triggers a buffer over-read.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0708.html">CVE-2011-0708</cve>
<bugzilla href="https://bugzilla.suse.com/671710">SUSE bug 671710</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199294" comment="apache2-mod_php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199295" comment="php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199296" comment="php53-bcmath-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199297" comment="php53-bz2-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199298" comment="php53-calendar-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199299" comment="php53-ctype-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199300" comment="php53-curl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199301" comment="php53-dba-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199302" comment="php53-dom-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199303" comment="php53-exif-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199304" comment="php53-fastcgi-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199305" comment="php53-fileinfo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199306" comment="php53-ftp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199307" comment="php53-gd-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199308" comment="php53-gettext-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199309" comment="php53-gmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199310" comment="php53-iconv-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199311" comment="php53-intl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199312" comment="php53-json-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199313" comment="php53-ldap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199314" comment="php53-mbstring-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199315" comment="php53-mcrypt-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199316" comment="php53-mysql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199317" comment="php53-odbc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199318" comment="php53-openssl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199319" comment="php53-pcntl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199320" comment="php53-pdo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199321" comment="php53-pear-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199322" comment="php53-pgsql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199323" comment="php53-pspell-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199324" comment="php53-shmop-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199325" comment="php53-snmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199326" comment="php53-soap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199327" comment="php53-suhosin-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199328" comment="php53-sysvmsg-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199329" comment="php53-sysvsem-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199330" comment="php53-sysvshm-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199331" comment="php53-tokenizer-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199332" comment="php53-wddx-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199333" comment="php53-xmlreader-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199334" comment="php53-xmlrpc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199335" comment="php53-xmlwriter-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199336" comment="php53-xsl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199337" comment="php53-zip-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199338" comment="php53-zlib-5.3.17-0.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0710</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0710" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0710" source="CVE"/>
    <description>
    The task_show_regs function in arch/s390/kernel/traps.c in the Linux kernel before 2.6.38-rc4-next-20110216 on the s390 platform allows local users to obtain the values of the registers of an arbitrary process by reading a status file under /proc/.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0710.html">CVE-2011-0710</cve>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/672492">SUSE bug 672492</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0711</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0711" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0711" source="CVE"/>
    <description>
    The xfs_fs_geometry function in fs/xfs/xfs_fsops.c in the Linux kernel before 2.6.38-rc6-git3 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an FSGEOMETRY_V1 ioctl call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0711.html">CVE-2011-0711</cve>
<bugzilla href="https://bugzilla.suse.com/672505">SUSE bug 672505</bugzilla>
<bugzilla href="https://bugzilla.suse.com/672524">SUSE bug 672524</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0712</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0712" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0712" source="CVE"/>
    <description>
    Multiple buffer overflows in the caiaq Native Instruments USB audio functionality in the Linux kernel before 2.6.38-rc4-next-20110215 might allow attackers to cause a denial of service or possibly have unspecified other impact via a long USB device name, related to (1) the snd_usb_caiaq_audio_init function in sound/usb/caiaq/audio.c and (2) the snd_usb_caiaq_midi_init function in sound/usb/caiaq/midi.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0712.html">CVE-2011-0712</cve>
<bugzilla href="https://bugzilla.suse.com/672499">SUSE bug 672499</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0713</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0713" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0713" source="CVE"/>
    <description>
    Heap-based buffer overflow in wiretap/dct3trace.c in Wireshark 1.2.0 through 1.2.14 and 1.4.0 through 1.4.3 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a long record in a Nokia DCT3 trace file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0713.html">CVE-2011-0713</cve>
<bugzilla href="https://bugzilla.suse.com/672916">SUSE bug 672916</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0719</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0719" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0719" source="CVE"/>
    <description>
    Samba 3.x before 3.3.15, 3.4.x before 3.4.12, and 3.5.x before 3.5.7 does not perform range checks for file descriptors before use of the FD_SET macro, which allows remote attackers to cause a denial of service (stack memory corruption, and infinite loop or daemon crash) by opening a large number of files, related to (1) Winbind or (2) smbd.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0719.html">CVE-2011-0719</cve>
<bugzilla href="https://bugzilla.suse.com/670431">SUSE bug 670431</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199555" comment="ldapsmb-1.34b-12.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199556" comment="libldb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199557" comment="libsmbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199558" comment="libsmbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199559" comment="libsmbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199560" comment="libtalloc2-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199561" comment="libtalloc2-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199562" comment="libtalloc2-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199563" comment="libtdb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199564" comment="libtdb1-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199565" comment="libtdb1-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199566" comment="libtevent0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199567" comment="libwbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199568" comment="libwbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199569" comment="libwbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199570" comment="samba-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199571" comment="samba-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199572" comment="samba-client-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199573" comment="samba-client-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199574" comment="samba-client-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199575" comment="samba-krb-printing-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199576" comment="samba-winbind-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199577" comment="samba-winbind-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199578" comment="samba-winbind-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199579" comment="samba-x86-3.6.3-0.39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0764</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0764" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0764" source="CVE"/>
    <description>
    t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6, teTeX, and other products, uses an invalid pointer in conjunction with a dereference operation, which allows remote attackers to execute arbitrary code via a crafted Type 1 font in a PDF document, as demonstrated by testz.2184122398.pdf.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0764.html">CVE-2011-0764</cve>
<bugzilla href="https://bugzilla.suse.com/662411">SUSE bug 662411</bugzilla>
<bugzilla href="https://bugzilla.suse.com/684802">SUSE bug 684802</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199796" comment="t1lib-5.1.1-100.21 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0997</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-0997" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0997" source="CVE"/>
    <description>
    dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and 4.1-ESV before 4.1-ESV-R2 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message, as demonstrated by a hostname that is provided to dhclient-script.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0997.html">CVE-2011-0997</cve>
<bugzilla href="https://bugzilla.suse.com/675052">SUSE bug 675052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/689182">SUSE bug 689182</bugzilla>
<bugzilla href="https://bugzilla.suse.com/708527">SUSE bug 708527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/715172">SUSE bug 715172</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199401" comment="dhcp-4.2.4.P2-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199402" comment="dhcp-client-4.2.4.P2-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199403" comment="dhcp-relay-4.2.4.P2-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199404" comment="dhcp-server-4.2.4.P2-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199405" comment="dhcpcd-3.2.3-44.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198805" comment="dhcpv6-1.0.22-3.21 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1004</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1004" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1004" source="CVE"/>
    <description>
    The FileUtils.remove_entry_secure method in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, 1.8.8dev, 1.9.1 through 1.9.1-430, 1.9.2 through 1.9.2-136, and 1.9.3dev allows local users to delete arbitrary files via a symlink attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1004.html">CVE-2011-1004</cve>
<bugzilla href="https://bugzilla.suse.com/673740">SUSE bug 673740</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199778" comment="ruby-1.8.7.p357-0.9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199779" comment="ruby-doc-html-1.8.7.p357-0.9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199780" comment="ruby-tk-1.8.7.p357-0.9.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1005</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1005" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1005" source="CVE"/>
    <description>
    The safe-level feature in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, and 1.8.8dev allows context-dependent attackers to modify strings via the Exception#to_s method, as demonstrated by changing an intended pathname.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1005.html">CVE-2011-1005</cve>
<bugzilla href="https://bugzilla.suse.com/673750">SUSE bug 673750</bugzilla>
<bugzilla href="https://bugzilla.suse.com/783511">SUSE bug 783511</bugzilla>
<bugzilla href="https://bugzilla.suse.com/783525">SUSE bug 783525</bugzilla>
<bugzilla href="https://bugzilla.suse.com/880899">SUSE bug 880899</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199778" comment="ruby-1.8.7.p357-0.9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199779" comment="ruby-doc-html-1.8.7.p357-0.9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199780" comment="ruby-tk-1.8.7.p357-0.9.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1006</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1006" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1006" source="CVE"/>
    <description>
    Heap-based buffer overflow in the parse_cgroup_spec function in tools/tools-common.c in the Control Group Configuration Library (aka libcgroup or libcg) before 0.37.1 allows local users to gain privileges via a crafted controller list on the command line of an application.  NOTE: it is not clear whether this issue crosses privilege boundaries.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1006.html">CVE-2011-1006</cve>
<bugzilla href="https://bugzilla.suse.com/675506">SUSE bug 675506</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199602" comment="libcgroup1-0.37.1-5.16 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1015</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1015" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1015" source="CVE"/>
    <description>
    The is_cgi method in CGIHTTPServer.py in the CGIHTTPServer module in Python 2.5, 2.6, and 3.0 allows remote attackers to read script source code via an HTTP GET request that lacks a / (slash) character at the beginning of the URI.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1015.html">CVE-2011-1015</cve>
<bugzilla href="https://bugzilla.suse.com/674646">SUSE bug 674646</bugzilla>
<bugzilla href="https://bugzilla.suse.com/826682">SUSE bug 826682</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199659" comment="libpython2_6-1_0-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199660" comment="libpython2_6-1_0-32bit-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199661" comment="libpython2_6-1_0-x86-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199662" comment="python-base-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199663" comment="python-base-32bit-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199664" comment="python-base-x86-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199665" comment="python-xml-2.6.8-0.15 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1016</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1016" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1016" source="CVE"/>
    <description>
    The Radeon GPU drivers in the Linux kernel before 2.6.38-rc5 do not properly validate data related to the AA resolve registers, which allows local users to write to arbitrary memory locations associated with (1) Video RAM (aka VRAM) or (2) the Graphics Translation Table (GTT) via crafted values.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1016.html">CVE-2011-1016</cve>
<bugzilla href="https://bugzilla.suse.com/674691">SUSE bug 674691</bugzilla>
<bugzilla href="https://bugzilla.suse.com/674693">SUSE bug 674693</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1017</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1017" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1017" source="CVE"/>
    <description>
    Heap-based buffer overflow in the ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel 2.6.37.2 and earlier might allow local users to gain privileges or obtain sensitive information via a crafted LDM partition table.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1017.html">CVE-2011-1017</cve>
<bugzilla href="https://bugzilla.suse.com/674648">SUSE bug 674648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/698221">SUSE bug 698221</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1018</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1018" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1018" source="CVE"/>
    <description>
    logwatch.pl in Logwatch 7.3.6 allows remote attackers to execute arbitrary commands via shell metacharacters in a log file name, as demonstrated via a crafted username to a Samba server.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1018.html">CVE-2011-1018</cve>
<bugzilla href="https://bugzilla.suse.com/674984">SUSE bug 674984</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199120" comment="logwatch-7.3.6-65.72 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1020</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1020" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1020" source="CVE"/>
    <description>
    The proc filesystem implementation in the Linux kernel 2.6.37 and earlier does not restrict access to the /proc directory tree of a process after this process performs an exec of a setuid program, which allows local users to obtain sensitive information or cause a denial of service via open, lseek, read, and write system calls.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1020.html">CVE-2011-1020</cve>
<bugzilla href="https://bugzilla.suse.com/674982">SUSE bug 674982</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1022</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1022" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1022" source="CVE"/>
    <description>
    The cgre_receive_netlink_msg function in daemon/cgrulesengd.c in cgrulesengd in the Control Group Configuration Library (aka libcgroup or libcg) before 0.37.1 does not verify that netlink messages originated in the kernel, which allows local users to bypass intended resource restrictions via a crafted message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1022.html">CVE-2011-1022</cve>
<bugzilla href="https://bugzilla.suse.com/675048">SUSE bug 675048</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199602" comment="libcgroup1-0.37.1-5.16 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1083</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1083" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1083" source="CVE"/>
    <description>
    The epoll implementation in the Linux kernel 2.6.37.2 and earlier does not properly traverse a tree of epoll file descriptors, which allows local users to cause a denial of service (CPU consumption) via a crafted application that makes epoll_create and epoll_ctl system calls.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1083.html">CVE-2011-1083</cve>
<bugzilla href="https://bugzilla.suse.com/676204">SUSE bug 676204</bugzilla>
<bugzilla href="https://bugzilla.suse.com/690537">SUSE bug 690537</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1092</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1092" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1092" source="CVE"/>
    <description>
    Integer overflow in ext/shmop/shmop.c in PHP before 5.3.6 allows context-dependent attackers to cause a denial of service (crash) and possibly read sensitive memory via a large third argument to the shmop_read function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1092.html">CVE-2011-1092</cve>
<bugzilla href="https://bugzilla.suse.com/677782">SUSE bug 677782</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199294" comment="apache2-mod_php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199295" comment="php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199296" comment="php53-bcmath-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199297" comment="php53-bz2-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199298" comment="php53-calendar-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199299" comment="php53-ctype-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199300" comment="php53-curl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199301" comment="php53-dba-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199302" comment="php53-dom-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199303" comment="php53-exif-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199304" comment="php53-fastcgi-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199305" comment="php53-fileinfo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199306" comment="php53-ftp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199307" comment="php53-gd-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199308" comment="php53-gettext-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199309" comment="php53-gmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199310" comment="php53-iconv-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199311" comment="php53-intl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199312" comment="php53-json-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199313" comment="php53-ldap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199314" comment="php53-mbstring-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199315" comment="php53-mcrypt-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199316" comment="php53-mysql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199317" comment="php53-odbc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199318" comment="php53-openssl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199319" comment="php53-pcntl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199320" comment="php53-pdo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199321" comment="php53-pear-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199322" comment="php53-pgsql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199323" comment="php53-pspell-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199324" comment="php53-shmop-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199325" comment="php53-snmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199326" comment="php53-soap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199327" comment="php53-suhosin-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199328" comment="php53-sysvmsg-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199329" comment="php53-sysvsem-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199330" comment="php53-sysvshm-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199331" comment="php53-tokenizer-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199332" comment="php53-wddx-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199333" comment="php53-xmlreader-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199334" comment="php53-xmlrpc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199335" comment="php53-xmlwriter-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199336" comment="php53-xsl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199337" comment="php53-zip-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199338" comment="php53-zlib-5.3.17-0.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1097</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1097" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1097" source="CVE"/>
    <description>
    rsync 3.x before 3.0.8, when certain recursion, deletion, and ownership options are used, allows remote rsync servers to cause a denial of service (heap memory corruption and application crash) or possibly execute arbitrary code via malformed data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1097.html">CVE-2011-1097</cve>
<bugzilla href="https://bugzilla.suse.com/684387">SUSE bug 684387</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199767" comment="rsync-3.0.4-2.47 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1098</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1098" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1098" source="CVE"/>
    <description>
    Race condition in the createOutputFile function in logrotate.c in logrotate 3.7.9 and earlier allows local users to read log data by opening a file before the intended permissions are in place.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1098.html">CVE-2011-1098</cve>
<bugzilla href="https://bugzilla.suse.com/1007000">SUSE bug 1007000</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1136195">SUSE bug 1136195</bugzilla>
<bugzilla href="https://bugzilla.suse.com/677335">SUSE bug 677335</bugzilla>
<bugzilla href="https://bugzilla.suse.com/677336">SUSE bug 677336</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199709" comment="logrotate-3.7.7-10.26 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1138</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1138" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1138" source="CVE"/>
    <description>
    Off-by-one error in the dissect_6lowpan_iphc function in packet-6lowpan.c in Wireshark 1.4.0 through 1.4.3 on 32-bit platforms allows remote attackers to cause a denial of service (application crash) via a malformed 6LoWPAN IPv6 packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1138.html">CVE-2011-1138</cve>
<bugzilla href="https://bugzilla.suse.com/678567">SUSE bug 678567</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1139" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1139" source="CVE"/>
    <description>
    wiretap/pcapng.c in Wireshark 1.2.0 through 1.2.14 and 1.4.0 through 1.4.3 allows remote attackers to cause a denial of service (application crash) via a pcap-ng file that contains a large packet-length field.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1139.html">CVE-2011-1139</cve>
<bugzilla href="https://bugzilla.suse.com/678568">SUSE bug 678568</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1140</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1140" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1140" source="CVE"/>
    <description>
    Multiple stack consumption vulnerabilities in the dissect_ms_compressed_string and dissect_mscldap_string functions in Wireshark 1.0.x, 1.2.0 through 1.2.14, and 1.4.0 through 1.4.3 allow remote attackers to cause a denial of service (infinite recursion) via a crafted (1) SMB or (2) Connection-less LDAP (CLDAP) packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1140.html">CVE-2011-1140</cve>
<bugzilla href="https://bugzilla.suse.com/678569">SUSE bug 678569</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1143" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1143" source="CVE"/>
    <description>
    epan/dissectors/packet-ntlmssp.c in the NTLMSSP dissector in Wireshark before 1.4.4 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted .pcap file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1143.html">CVE-2011-1143</cve>
<bugzilla href="https://bugzilla.suse.com/678571">SUSE bug 678571</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1145</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1145" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1145" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1145.html">CVE-2011-1145</cve>
<bugzilla href="https://bugzilla.suse.com/678796">SUSE bug 678796</bugzilla>
<bugzilla href="https://bugzilla.suse.com/764737">SUSE bug 764737</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199810" comment="unixODBC_23-2.3.1-0.9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1146" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1146" source="CVE"/>
    <description>
    libvirt.c in the API in Red Hat libvirt 0.8.8 does not properly restrict operations in a read-only connection, which allows remote attackers to cause a denial of service (host OS crash) or possibly execute arbitrary code via a (1) virNodeDeviceDettach, (2) virNodeDeviceReset, (3) virDomainRevertToSnapshot, (4) virDomainSnapshotDelete, (5) virNodeDeviceReAttach, or (6) virConnectDomainXMLToNative call, a different vulnerability than CVE-2008-5086.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1146.html">CVE-2011-1146</cve>
<bugzilla href="https://bugzilla.suse.com/678406">SUSE bug 678406</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199692" comment="libvirt-1.0.5.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199693" comment="libvirt-client-1.0.5.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199694" comment="libvirt-client-32bit-1.0.5.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199695" comment="libvirt-doc-1.0.5.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199696" comment="libvirt-lock-sanlock-1.0.5.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199697" comment="libvirt-python-1.0.5.1-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1153</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1153" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1153" source="CVE"/>
    <description>
    Multiple format string vulnerabilities in phar_object.c in the phar extension in PHP 5.3.5 and earlier allow context-dependent attackers to obtain sensitive information from process memory, cause a denial of service (memory corruption), or possibly execute arbitrary code via format string specifiers in an argument to a class method, leading to an incorrect zend_throw_exception_ex call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1153.html">CVE-2011-1153</cve>
<bugzilla href="https://bugzilla.suse.com/778941">SUSE bug 778941</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199294" comment="apache2-mod_php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199295" comment="php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199296" comment="php53-bcmath-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199297" comment="php53-bz2-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199298" comment="php53-calendar-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199299" comment="php53-ctype-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199300" comment="php53-curl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199301" comment="php53-dba-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199302" comment="php53-dom-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199303" comment="php53-exif-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199304" comment="php53-fastcgi-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199305" comment="php53-fileinfo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199306" comment="php53-ftp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199307" comment="php53-gd-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199308" comment="php53-gettext-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199309" comment="php53-gmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199310" comment="php53-iconv-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199311" comment="php53-intl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199312" comment="php53-json-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199313" comment="php53-ldap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199314" comment="php53-mbstring-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199315" comment="php53-mcrypt-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199316" comment="php53-mysql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199317" comment="php53-odbc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199318" comment="php53-openssl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199319" comment="php53-pcntl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199320" comment="php53-pdo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199321" comment="php53-pear-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199322" comment="php53-pgsql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199323" comment="php53-pspell-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199324" comment="php53-shmop-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199325" comment="php53-snmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199326" comment="php53-soap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199327" comment="php53-suhosin-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199328" comment="php53-sysvmsg-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199329" comment="php53-sysvsem-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199330" comment="php53-sysvshm-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199331" comment="php53-tokenizer-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199332" comment="php53-wddx-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199333" comment="php53-xmlreader-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199334" comment="php53-xmlrpc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199335" comment="php53-xmlwriter-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199336" comment="php53-xsl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199337" comment="php53-zip-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199338" comment="php53-zlib-5.3.17-0.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1154</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1154" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1154" source="CVE"/>
    <description>
    The shred_file function in logrotate.c in logrotate 3.7.9 and earlier might allow context-dependent attackers to execute arbitrary commands via shell metacharacters in a log filename, as demonstrated by a filename that is automatically constructed on the basis of a hostname or virtual machine name.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1154.html">CVE-2011-1154</cve>
<bugzilla href="https://bugzilla.suse.com/677335">SUSE bug 677335</bugzilla>
<bugzilla href="https://bugzilla.suse.com/679661">SUSE bug 679661</bugzilla>
<bugzilla href="https://bugzilla.suse.com/681984">SUSE bug 681984</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199709" comment="logrotate-3.7.7-10.26 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1155" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1155" source="CVE"/>
    <description>
    The writeState function in logrotate.c in logrotate 3.7.9 and earlier might allow context-dependent attackers to cause a denial of service (rotation outage) via a (1) \n (newline) or (2) \ (backslash) character in a log filename, as demonstrated by a filename that is automatically constructed on the basis of a hostname or virtual machine name.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1155.html">CVE-2011-1155</cve>
<bugzilla href="https://bugzilla.suse.com/677335">SUSE bug 677335</bugzilla>
<bugzilla href="https://bugzilla.suse.com/679662">SUSE bug 679662</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199709" comment="logrotate-3.7.7-10.26 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1160</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1160" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1160" source="CVE"/>
    <description>
    The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1160.html">CVE-2011-1160</cve>
<bugzilla href="https://bugzilla.suse.com/680040">SUSE bug 680040</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1167</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1167" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1167" source="CVE"/>
    <description>
    Heap-based buffer overflow in the thunder (aka ThunderScan) decoder in tif_thunder.c in LibTIFF 3.9.4 and earlier allows remote attackers to execute arbitrary code via crafted THUNDER_2BITDELTAS data in a .tiff file that has an unexpected BitsPerSample value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1167.html">CVE-2011-1167</cve>
<bugzilla href="https://bugzilla.suse.com/683337">SUSE bug 683337</bugzilla>
<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199680" comment="libtiff3-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199681" comment="libtiff3-32bit-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199682" comment="libtiff3-x86-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199683" comment="tiff-3.8.2-141.152 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1168</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1168" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1168" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the KHTMLPart::htmlError function in khtml/khtml_part.cpp in Konqueror in KDE SC 4.4.0 through 4.6.1 allows remote attackers to inject arbitrary web script or HTML via the URI in a URL corresponding to an unavailable web site.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1168.html">CVE-2011-1168</cve>
<bugzilla href="https://bugzilla.suse.com/686652">SUSE bug 686652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/686814">SUSE bug 686814</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199517" comment="kdelibs4-4.3.5-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199518" comment="kdelibs4-core-4.3.5-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199519" comment="kdelibs4-doc-4.3.5-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199520" comment="libkde4-4.3.5-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199521" comment="libkde4-32bit-4.3.5-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199522" comment="libkde4-x86-4.3.5-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199523" comment="libkdecore4-4.3.5-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199524" comment="libkdecore4-32bit-4.3.5-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199525" comment="libkdecore4-x86-4.3.5-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1180</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1180" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in the iriap_getvaluebyclass_indication function in net/irda/iriap.c in the Linux kernel before 2.6.39 allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging connectivity to an IrDA infrared network and sending a large integer value for a (1) name length or (2) attribute length.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1180.html">CVE-2011-1180</cve>
<bugzilla href="https://bugzilla.suse.com/681497">SUSE bug 681497</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1182" source="CVE"/>
    <description>
    kernel/signal.c in the Linux kernel before 2.6.39 allows local users to spoof the uid and pid of a signal sender via a sigqueueinfo system call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1182.html">CVE-2011-1182</cve>
<bugzilla href="https://bugzilla.suse.com/681826">SUSE bug 681826</bugzilla>
<bugzilla href="https://bugzilla.suse.com/690537">SUSE bug 690537</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1184</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1184" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1184" source="CVE"/>
    <description>
    The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 does not have the expected countermeasures against replay attacks, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests, related to lack of checking of nonce (aka server nonce) and nc (aka nonce-count or client nonce count) values.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1184.html">CVE-2011-1184</cve>
<bugzilla href="https://bugzilla.suse.com/735343">SUSE bug 735343</bugzilla>
<bugzilla href="https://bugzilla.suse.com/741530">SUSE bug 741530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/791423">SUSE bug 791423</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199802" comment="tomcat6-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199803" comment="tomcat6-admin-webapps-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199804" comment="tomcat6-docs-webapp-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199805" comment="tomcat6-javadoc-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199806" comment="tomcat6-jsp-2_1-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199807" comment="tomcat6-lib-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199808" comment="tomcat6-servlet-2_5-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199809" comment="tomcat6-webapps-6.0.18-20.35.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1202</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1202" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1202" source="CVE"/>
    <description>
    The xsltGenerateIdFunction function in functions.c in libxslt 1.1.26 and earlier, as used in Google Chrome before 10.0.648.127 and other products, allows remote attackers to obtain potentially sensitive information about heap memory addresses via an XML document containing a call to the XSLT generate-id XPath function.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1202.html">CVE-2011-1202</cve>
<bugzilla href="https://bugzilla.suse.com/689281">SUSE bug 689281</bugzilla>
<bugzilla href="https://bugzilla.suse.com/692619">SUSE bug 692619</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1398</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1398" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1398" source="CVE"/>
    <description>
    The sapi_header_op function in main/SAPI.c in PHP before 5.3.11 and 5.4.x before 5.4.0RC2 does not check for %0D sequences (aka carriage return characters), which allows remote attackers to bypass an HTTP response-splitting protection mechanism via a crafted URL, related to improper interaction between the PHP header function and certain browsers, as demonstrated by Internet Explorer and Google Chrome.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1398.html">CVE-2011-1398</cve>
<bugzilla href="https://bugzilla.suse.com/778003">SUSE bug 778003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829207">SUSE bug 829207</bugzilla>
<bugzilla href="https://bugzilla.suse.com/986004">SUSE bug 986004</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199294" comment="apache2-mod_php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199295" comment="php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199296" comment="php53-bcmath-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199297" comment="php53-bz2-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199298" comment="php53-calendar-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199299" comment="php53-ctype-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199300" comment="php53-curl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199301" comment="php53-dba-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199302" comment="php53-dom-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199303" comment="php53-exif-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199304" comment="php53-fastcgi-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199305" comment="php53-fileinfo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199306" comment="php53-ftp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199307" comment="php53-gd-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199308" comment="php53-gettext-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199309" comment="php53-gmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199310" comment="php53-iconv-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199311" comment="php53-intl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199312" comment="php53-json-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199313" comment="php53-ldap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199314" comment="php53-mbstring-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199315" comment="php53-mcrypt-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199316" comment="php53-mysql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199317" comment="php53-odbc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199318" comment="php53-openssl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199319" comment="php53-pcntl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199320" comment="php53-pdo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199321" comment="php53-pear-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199322" comment="php53-pgsql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199323" comment="php53-pspell-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199324" comment="php53-shmop-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199325" comment="php53-snmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199326" comment="php53-soap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199327" comment="php53-suhosin-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199328" comment="php53-sysvmsg-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199329" comment="php53-sysvsem-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199330" comment="php53-sysvshm-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199331" comment="php53-tokenizer-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199332" comment="php53-wddx-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199333" comment="php53-xmlreader-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199334" comment="php53-xmlrpc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199335" comment="php53-xmlwriter-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199336" comment="php53-xsl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199337" comment="php53-zip-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199338" comment="php53-zlib-5.3.17-0.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1466</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1466" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1466" source="CVE"/>
    <description>
    Integer overflow in the SdnToJulian function in the Calendar extension in PHP before 5.3.6 allows context-dependent attackers to cause a denial of service (application crash) via a large integer in the first argument to the cal_from_jd function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1466.html">CVE-2011-1466</cve>
<bugzilla href="https://bugzilla.suse.com/733590">SUSE bug 733590</bugzilla>
<bugzilla href="https://bugzilla.suse.com/736169">SUSE bug 736169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/738221">SUSE bug 738221</bugzilla>
<bugzilla href="https://bugzilla.suse.com/741520">SUSE bug 741520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/741859">SUSE bug 741859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/742273">SUSE bug 742273</bugzilla>
<bugzilla href="https://bugzilla.suse.com/742806">SUSE bug 742806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/743308">SUSE bug 743308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/744966">SUSE bug 744966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/746661">SUSE bug 746661</bugzilla>
<bugzilla href="https://bugzilla.suse.com/749111">SUSE bug 749111</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199294" comment="apache2-mod_php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199295" comment="php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199296" comment="php53-bcmath-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199297" comment="php53-bz2-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199298" comment="php53-calendar-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199299" comment="php53-ctype-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199300" comment="php53-curl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199301" comment="php53-dba-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199302" comment="php53-dom-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199303" comment="php53-exif-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199304" comment="php53-fastcgi-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199305" comment="php53-fileinfo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199306" comment="php53-ftp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199307" comment="php53-gd-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199308" comment="php53-gettext-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199309" comment="php53-gmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199310" comment="php53-iconv-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199311" comment="php53-intl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199312" comment="php53-json-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199313" comment="php53-ldap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199314" comment="php53-mbstring-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199315" comment="php53-mcrypt-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199316" comment="php53-mysql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199317" comment="php53-odbc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199318" comment="php53-openssl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199319" comment="php53-pcntl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199320" comment="php53-pdo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199321" comment="php53-pear-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199322" comment="php53-pgsql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199323" comment="php53-pspell-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199324" comment="php53-shmop-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199325" comment="php53-snmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199326" comment="php53-soap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199327" comment="php53-suhosin-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199328" comment="php53-sysvmsg-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199329" comment="php53-sysvsem-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199330" comment="php53-sysvshm-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199331" comment="php53-tokenizer-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199332" comment="php53-wddx-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199333" comment="php53-xmlreader-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199334" comment="php53-xmlrpc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199335" comment="php53-xmlwriter-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199336" comment="php53-xsl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199337" comment="php53-zip-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199338" comment="php53-zlib-5.3.17-0.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1478</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1478" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1478" source="CVE"/>
    <description>
    The napi_reuse_skb function in net/core/dev.c in the Generic Receive Offload (GRO) implementation in the Linux kernel before 2.6.38 does not reset the values of certain structure members, which might allow remote attackers to cause a denial of service (NULL pointer dereference) via a malformed VLAN frame.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1478.html">CVE-2011-1478</cve>
<bugzilla href="https://bugzilla.suse.com/682965">SUSE bug 682965</bugzilla>
<bugzilla href="https://bugzilla.suse.com/698450">SUSE bug 698450</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1486</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1486" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1486" source="CVE"/>
    <description>
    libvirtd in libvirt before 0.9.0 does not use thread-safe error reporting, which allows remote attackers to cause a denial of service (crash) by causing multiple threads to report errors at the same time.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1486.html">CVE-2011-1486</cve>
<bugzilla href="https://bugzilla.suse.com/684877">SUSE bug 684877</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199692" comment="libvirt-1.0.5.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199693" comment="libvirt-client-1.0.5.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199694" comment="libvirt-client-32bit-1.0.5.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199695" comment="libvirt-doc-1.0.5.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199696" comment="libvirt-lock-sanlock-1.0.5.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199697" comment="libvirt-python-1.0.5.1-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1487</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1487" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1487" source="CVE"/>
    <description>
    The (1) lc, (2) lcfirst, (3) uc, and (4) ucfirst functions in Perl 5.10.x, 5.11.x, and 5.12.x through 5.12.3, and 5.13.x through 5.13.11, do not apply the taint attribute to the return value upon processing tainted input, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted string.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1487.html">CVE-2011-1487</cve>
<bugzilla href="https://bugzilla.suse.com/684799">SUSE bug 684799</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199743" comment="perl-5.10.0-64.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199744" comment="perl-32bit-5.10.0-64.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199745" comment="perl-Module-Build-0.2808.01-0.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199746" comment="perl-Test-Simple-0.72-0.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199747" comment="perl-base-5.10.0-64.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199748" comment="perl-doc-5.10.0-64.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199749" comment="perl-x86-5.10.0-64.67 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1521</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1521" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1521" source="CVE"/>
    <description>
    The urllib and urllib2 modules in Python 2.x before 2.7.2 and 3.x before 3.2.1 process Location headers that specify redirection to file: URLs, which makes it easier for remote attackers to obtain sensitive information or cause a denial of service (resource consumption) via a crafted URL, as demonstrated by the file:///etc/passwd and file:///dev/zero URLs.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1521.html">CVE-2011-1521</cve>
<bugzilla href="https://bugzilla.suse.com/682554">SUSE bug 682554</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199659" comment="libpython2_6-1_0-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199660" comment="libpython2_6-1_0-32bit-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199661" comment="libpython2_6-1_0-x86-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199662" comment="python-base-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199663" comment="python-base-32bit-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199664" comment="python-base-x86-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199665" comment="python-xml-2.6.8-0.15 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1523</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1523" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1523" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in statusmap.c in statusmap.cgi in Nagios 3.2.3 and earlier allows remote attackers to inject arbitrary web script or HTML via the layer parameter.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1523.html">CVE-2011-1523</cve>
<bugzilla href="https://bugzilla.suse.com/682966">SUSE bug 682966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/697895">SUSE bug 697895</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199717" comment="nagios-3.0.6-1.25.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199718" comment="nagios-www-3.0.6-1.25.28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1526</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1526" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1526" source="CVE"/>
    <description>
    ftpd.c in the GSS-API FTP daemon in MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.1 and earlier does not check the krb5_setegid return value, which allows remote authenticated users to bypass intended group access restrictions, and create, overwrite, delete, or read files, via standard FTP commands, related to missing autoconf tests in a configure script.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1526.html">CVE-2011-1526</cve>
<bugzilla href="https://bugzilla.suse.com/698471">SUSE bug 698471</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199544" comment="krb5-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199545" comment="krb5-32bit-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199546" comment="krb5-apps-clients-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199547" comment="krb5-apps-servers-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199548" comment="krb5-client-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199552" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199553" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199549" comment="krb5-server-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199550" comment="krb5-x86-1.6.3-133.49.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1552</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1552" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1552" source="CVE"/>
    <description>
    t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6, teTeX, and other products, reads from invalid memory locations, which allows remote attackers to cause a denial of service (application crash) via a crafted Type 1 font in a PDF document, a different vulnerability than CVE-2011-0764.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1552.html">CVE-2011-1552</cve>
<bugzilla href="https://bugzilla.suse.com/684802">SUSE bug 684802</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199796" comment="t1lib-5.1.1-100.21 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1553</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1553" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1553" source="CVE"/>
    <description>
    Use-after-free vulnerability in t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6, teTeX, and other products, allows remote attackers to cause a denial of service (application crash) via a PDF document containing a crafted Type 1 font that triggers an invalid memory write, a different vulnerability than CVE-2011-0764.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1553.html">CVE-2011-1553</cve>
<bugzilla href="https://bugzilla.suse.com/684802">SUSE bug 684802</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199796" comment="t1lib-5.1.1-100.21 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1554</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1554" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1554" source="CVE"/>
    <description>
    Off-by-one error in t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6, teTeX, and other products, allows remote attackers to cause a denial of service (application crash) via a PDF document containing a crafted Type 1 font that triggers an invalid memory read, integer overflow, and invalid pointer dereference, a different vulnerability than CVE-2011-0764.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1554.html">CVE-2011-1554</cve>
<bugzilla href="https://bugzilla.suse.com/684802">SUSE bug 684802</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199796" comment="t1lib-5.1.1-100.21 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1573</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1573" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1573" source="CVE"/>
    <description>
    net/sctp/sm_make_chunk.c in the Linux kernel before 2.6.34, when addip_enable and auth_enable are used, does not consider the amount of zero padding during calculation of chunk lengths for (1) INIT and (2) INIT ACK chunks, which allows remote attackers to cause a denial of service (OOPS) via crafted packet data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1573.html">CVE-2011-1573</cve>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/686813">SUSE bug 686813</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1577</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1577" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1577" source="CVE"/>
    <description>
    Heap-based buffer overflow in the is_gpt_valid function in fs/partitions/efi.c in the Linux kernel 2.6.38 and earlier allows physically proximate attackers to cause a denial of service (OOPS) or possibly have unspecified other impact via a crafted size of the EFI GUID partition-table header on removable media.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1577.html">CVE-2011-1577</cve>
<bugzilla href="https://bugzilla.suse.com/687113">SUSE bug 687113</bugzilla>
<bugzilla href="https://bugzilla.suse.com/692784">SUSE bug 692784</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1590</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1590" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1590" source="CVE"/>
    <description>
    The X.509if dissector in Wireshark 1.2.x before 1.2.16 and 1.4.x before 1.4.5 does not properly initialize certain global variables, which allows remote attackers to cause a denial of service (application crash) via a crafted .pcap file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1590.html">CVE-2011-1590</cve>
<bugzilla href="https://bugzilla.suse.com/688109">SUSE bug 688109</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1591</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1591" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1591" source="CVE"/>
    <description>
    Stack-based buffer overflow in the DECT dissector in epan/dissectors/packet-dect.c in Wireshark 1.4.x before 1.4.5 allows remote attackers to execute arbitrary code via a crafted .pcap file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1591.html">CVE-2011-1591</cve>
<bugzilla href="https://bugzilla.suse.com/688109">SUSE bug 688109</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1592</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1592" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1592" source="CVE"/>
    <description>
    The NFS dissector in epan/dissectors/packet-nfs.c in Wireshark 1.4.x before 1.4.5 on Windows uses an incorrect integer data type during decoding of SETCLIENTID calls, which allows remote attackers to cause a denial of service (application crash) via a crafted .pcap file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1592.html">CVE-2011-1592</cve>
<bugzilla href="https://bugzilla.suse.com/688109">SUSE bug 688109</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1593</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1593" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1593" source="CVE"/>
    <description>
    Multiple integer overflows in the next_pidmap function in kernel/pid.c in the Linux kernel before 2.6.38.4 allow local users to cause a denial of service (system crash) via a crafted (1) getdents or (2) readdir system call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1593.html">CVE-2011-1593</cve>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/688432">SUSE bug 688432</bugzilla>
<bugzilla href="https://bugzilla.suse.com/690537">SUSE bug 690537</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1678</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1678" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1678" source="CVE"/>
    <description>
    smbfs in Samba 3.5.8 and earlier attempts to use (1) mount.cifs to append to the /etc/mtab file and (2) umount.cifs to append to the /etc/mtab.tmp file without first checking whether resource limits would interfere, which allows local users to trigger corruption of the /etc/mtab file via a process with a small RLIMIT_FSIZE value, a related issue to CVE-2011-1089.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1678.html">CVE-2011-1678</cve>
<bugzilla href="https://bugzilla.suse.com/686552">SUSE bug 686552</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199376" comment="cifs-utils-5.1-0.11 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1758</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1758" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1758" source="CVE"/>
    <description>
    The krb5_save_ccname_done function in providers/krb5/krb5_auth.c in System Security Services Daemon (SSSD) 1.5.x before 1.5.7, when automatic ticket renewal and offline authentication are configured, uses a pathname string as a password, which allows local users to bypass Kerberos authentication by listing the /tmp directory to obtain the pathname.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1758.html">CVE-2011-1758</cve>
<bugzilla href="https://bugzilla.suse.com/691135">SUSE bug 691135</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199675" comment="libsss_idmap0-1.9.4-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199676" comment="python-sssd-config-1.9.4-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199677" comment="sssd-1.9.4-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199678" comment="sssd-32bit-1.9.4-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199679" comment="sssd-tools-1.9.4-0.12 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1831</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1831" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1831" source="CVE"/>
    <description>
    utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 does not properly check mountpoint permissions, which allows local users to effectively replace any directory with a new filesystem, and consequently gain privileges, via a mount system call.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1831.html">CVE-2011-1831</cve>
<bugzilla href="https://bugzilla.suse.com/709771">SUSE bug 709771</bugzilla>
<bugzilla href="https://bugzilla.suse.com/711539">SUSE bug 711539</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199411" comment="ecryptfs-utils-61-1.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199412" comment="ecryptfs-utils-32bit-61-1.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199413" comment="ecryptfs-utils-x86-61-1.33 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111832" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1832</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1832" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1832" source="CVE"/>
    <description>
    utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 does not properly check mountpoint permissions, which allows local users to remove directories via a umount system call.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1832.html">CVE-2011-1832</cve>
<bugzilla href="https://bugzilla.suse.com/709771">SUSE bug 709771</bugzilla>
<bugzilla href="https://bugzilla.suse.com/711539">SUSE bug 711539</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199411" comment="ecryptfs-utils-61-1.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199412" comment="ecryptfs-utils-32bit-61-1.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199413" comment="ecryptfs-utils-x86-61-1.33 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1833</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1833" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1833" source="CVE"/>
    <description>
    Race condition in the ecryptfs_mount function in fs/ecryptfs/main.c in the eCryptfs subsystem in the Linux kernel before 3.1 allows local users to bypass intended file permissions via a mount.ecryptfs_private mount with a mismatched uid.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1833.html">CVE-2011-1833</cve>
<bugzilla href="https://bugzilla.suse.com/709771">SUSE bug 709771</bugzilla>
<bugzilla href="https://bugzilla.suse.com/711539">SUSE bug 711539</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199411" comment="ecryptfs-utils-61-1.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199412" comment="ecryptfs-utils-32bit-61-1.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199413" comment="ecryptfs-utils-x86-61-1.33 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1834</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1834" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1834" source="CVE"/>
    <description>
    utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 does not properly maintain the mtab file during error conditions, which allows local users to cause a denial of service (table corruption) or bypass intended unmounting restrictions via a umount system call.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1834.html">CVE-2011-1834</cve>
<bugzilla href="https://bugzilla.suse.com/709771">SUSE bug 709771</bugzilla>
<bugzilla href="https://bugzilla.suse.com/711539">SUSE bug 711539</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199411" comment="ecryptfs-utils-61-1.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199412" comment="ecryptfs-utils-32bit-61-1.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199413" comment="ecryptfs-utils-x86-61-1.33 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1898</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1898" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1898" source="CVE"/>
    <description>
    Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by "using DMA to generate MSI interrupts by writing to the interrupt injection registers."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1898.html">CVE-2011-1898</cve>
<bugzilla href="https://bugzilla.suse.com/702025">SUSE bug 702025</bugzilla>
<bugzilla href="https://bugzilla.suse.com/724906">SUSE bug 724906</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199814" comment="xen-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199815" comment="xen-doc-html-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199816" comment="xen-doc-pdf-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199817" comment="xen-kmp-default-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199818" comment="xen-kmp-pae-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199819" comment="xen-libs-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199820" comment="xen-libs-32bit-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199821" comment="xen-tools-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199822" comment="xen-tools-domU-4.2.2_04-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1910</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1910" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1910" source="CVE"/>
    <description>
    Off-by-one error in named in ISC BIND 9.x before 9.7.3-P1, 9.8.x before 9.8.0-P2, 9.4-ESV before 9.4-ESV-R4-P1, and 9.6-ESV before 9.6-ESV-R4-P1 allows remote DNS servers to cause a denial of service (assertion failure and daemon exit) via a negative response containing large RRSIG RRsets.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1910.html">CVE-2011-1910</cve>
<bugzilla href="https://bugzilla.suse.com/696585">SUSE bug 696585</bugzilla>
<bugzilla href="https://bugzilla.suse.com/698286">SUSE bug 698286</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199364" comment="bind-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199365" comment="bind-chrootenv-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199366" comment="bind-doc-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199367" comment="bind-libs-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199368" comment="bind-libs-32bit-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199369" comment="bind-libs-x86-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199370" comment="bind-utils-9.6ESVR7P4-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1928</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1928" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1928" source="CVE"/>
    <description>
    The fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library 1.4.3 and 1.4.4, and the Apache HTTP Server 2.2.18, allows remote attackers to cause a denial of service (infinite loop) via a URI that does not match unspecified types of wildcard patterns, as demonstrated by attacks against mod_autoindex in httpd when a /*/WEB-INF/ configuration pattern is used.  NOTE: this issue exists because of an incorrect fix for CVE-2011-0419.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1928.html">CVE-2011-1928</cve>
<bugzilla href="https://bugzilla.suse.com/693778">SUSE bug 693778</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199600" comment="libapr1-1.3.3-11.18.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199601" comment="libapr1-32bit-1.3.3-11.18.19 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1944</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1944" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1944" source="CVE"/>
    <description>
    Integer overflow in xpath.c in libxml2 2.6.x through 2.6.32 and 2.7.x through 2.7.8, and libxml 1.8.16 and earlier, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted XML file that triggers a heap-based buffer overflow when adding a new namespace node, related to handling of XPath expressions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1944.html">CVE-2011-1944</cve>
<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/697372">SUSE bug 697372</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199702" comment="libxml2-2.7.6-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199703" comment="libxml2-32bit-2.7.6-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199704" comment="libxml2-doc-2.7.6-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199705" comment="libxml2-x86-2.7.6-0.23 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1946</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1946" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1946" source="CVE"/>
    <description>
    gnomesu-pam-backend in libgnomesu 1.0.0 prints an error message but proceeds with the non-error code path upon failure of the setgid or setuid function, which allows local users to gain privileges by leveraging access to two unprivileged user accounts, and running many processes under one of these accounts.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1946.html">CVE-2011-1946</cve>
<bugzilla href="https://bugzilla.suse.com/695627">SUSE bug 695627</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199017" comment="libgnomesu-1.0.0-307.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199018" comment="libgnomesu-lang-1.0.0-307.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199019" comment="libgnomesu0-1.0.0-307.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1947</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1947" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1947" source="CVE"/>
    <description>
    fetchmail 5.9.9 through 6.3.19 does not properly limit the wait time after issuing a (1) STARTTLS or (2) STLS request, which allows remote servers to cause a denial of service (application hang) by acknowledging the request but not sending additional packets.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1947.html">CVE-2011-1947</cve>
<bugzilla href="https://bugzilla.suse.com/697368">SUSE bug 697368</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198828" comment="fetchmail-6.3.8.90-13.20.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198829" comment="fetchmailconf-6.3.8.90-13.20.19 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1957</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1957" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1957" source="CVE"/>
    <description>
    The dissect_dcm_main function in epan/dissectors/packet-dcm.c in the DICOM dissector in Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 allows remote attackers to cause a denial of service (infinite loop) via an invalid PDU length.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1957.html">CVE-2011-1957</cve>
<bugzilla href="https://bugzilla.suse.com/697516">SUSE bug 697516</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1958</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1958" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1958" source="CVE"/>
    <description>
    Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 allows user-assisted remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Diameter dictionary file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1958.html">CVE-2011-1958</cve>
<bugzilla href="https://bugzilla.suse.com/697516">SUSE bug 697516</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1959</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1959" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1959" source="CVE"/>
    <description>
    The snoop_read function in wiretap/snoop.c in Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 does not properly handle certain virtualizable buffers, which allows remote attackers to cause a denial of service (application crash) via a large length value in a snoop file that triggers a stack-based buffer over-read.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1959.html">CVE-2011-1959</cve>
<bugzilla href="https://bugzilla.suse.com/697516">SUSE bug 697516</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1986</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-1986" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1986" source="CVE"/>
    <description>
    Use-after-free vulnerability in Microsoft Excel 2003 SP3 allows remote attackers to execute arbitrary code via a crafted spreadsheet, aka "Excel Use after Free WriteAV Vulnerability."
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1986.html">CVE-2011-1986</cve>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199754" comment="puppet-2.6.18-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199755" comment="puppet-server-2.6.18-0.4 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2174</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2174" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2174" source="CVE"/>
    <description>
    Double free vulnerability in the tvb_uncompress function in epan/tvbuff.c in Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 allows remote attackers to cause a denial of service (application crash) via a packet with malformed data that uses zlib compression.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2174.html">CVE-2011-2174</cve>
<bugzilla href="https://bugzilla.suse.com/697516">SUSE bug 697516</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2175</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2175" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2175" source="CVE"/>
    <description>
    Integer underflow in the visual_read function in wiretap/visual.c in Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 allows remote attackers to cause a denial of service (application crash) via a malformed Visual Networks file that triggers a heap-based buffer over-read.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2175.html">CVE-2011-2175</cve>
<bugzilla href="https://bugzilla.suse.com/697516">SUSE bug 697516</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2182" source="CVE"/>
    <description>
    The ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel before 2.6.39.1 does not properly handle memory allocation for non-initial fragments, which might allow local users to conduct buffer overflow attacks, and gain privileges or obtain sensitive information, via a crafted LDM partition table.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-1017.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2182.html">CVE-2011-2182</cve>
<bugzilla href="https://bugzilla.suse.com/674648">SUSE bug 674648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/698221">SUSE bug 698221</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2183</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2183" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2183" source="CVE"/>
    <description>
    Race condition in the scan_get_next_rmap_item function in mm/ksm.c in the Linux kernel before 2.6.39.3, when Kernel SamePage Merging (KSM) is enabled, allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted application.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2183.html">CVE-2011-2183</cve>
<bugzilla href="https://bugzilla.suse.com/697901">SUSE bug 697901</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2192</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2192" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2192" source="CVE"/>
    <description>
    The Curl_input_negotiate function in http_negotiate.c in libcurl 7.10.6 through 7.21.6, as used in curl and other products, always performs credential delegation during GSSAPI authentication, which allows remote servers to impersonate clients via GSSAPI requests.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2192.html">CVE-2011-2192</cve>
<bugzilla href="https://bugzilla.suse.com/698796">SUSE bug 698796</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199391" comment="curl-7.19.7-1.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199392" comment="libcurl4-7.19.7-1.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199393" comment="libcurl4-32bit-7.19.7-1.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199394" comment="libcurl4-x86-7.19.7-1.26 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2199</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2199" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2199" source="CVE"/>
    <description>
    Buffer overflow in tftp-hpa before 5.1 allows remote attackers to cause a denial of service and possibly execute arbitrary code via the utimeout option.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2199.html">CVE-2011-2199</cve>
<bugzilla href="https://bugzilla.suse.com/699714">SUSE bug 699714</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199800" comment="tftp-0.48-101.31 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2202</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2202" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2202" source="CVE"/>
    <description>
    The rfc1867_post_handler function in main/rfc1867.c in PHP before 5.3.7 does not properly restrict filenames in multipart/form-data POST requests, which allows remote attackers to conduct absolute path traversal attacks, and possibly create or overwrite arbitrary files, via a crafted upload request, related to a "file path injection vulnerability."
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2202.html">CVE-2011-2202</cve>
<bugzilla href="https://bugzilla.suse.com/699711">SUSE bug 699711</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199294" comment="apache2-mod_php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199295" comment="php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199296" comment="php53-bcmath-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199297" comment="php53-bz2-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199298" comment="php53-calendar-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199299" comment="php53-ctype-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199300" comment="php53-curl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199301" comment="php53-dba-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199302" comment="php53-dom-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199303" comment="php53-exif-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199304" comment="php53-fastcgi-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199305" comment="php53-fileinfo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199306" comment="php53-ftp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199307" comment="php53-gd-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199308" comment="php53-gettext-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199309" comment="php53-gmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199310" comment="php53-iconv-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199311" comment="php53-intl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199312" comment="php53-json-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199313" comment="php53-ldap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199314" comment="php53-mbstring-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199315" comment="php53-mcrypt-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199316" comment="php53-mysql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199317" comment="php53-odbc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199318" comment="php53-openssl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199319" comment="php53-pcntl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199320" comment="php53-pdo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199321" comment="php53-pear-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199322" comment="php53-pgsql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199323" comment="php53-pspell-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199324" comment="php53-shmop-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199325" comment="php53-snmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199326" comment="php53-soap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199327" comment="php53-suhosin-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199328" comment="php53-sysvmsg-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199329" comment="php53-sysvsem-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199330" comment="php53-sysvshm-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199331" comment="php53-tokenizer-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199332" comment="php53-wddx-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199333" comment="php53-xmlreader-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199334" comment="php53-xmlrpc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199335" comment="php53-xmlwriter-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199336" comment="php53-xsl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199337" comment="php53-zip-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199338" comment="php53-zlib-5.3.17-0.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2203</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2203" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2203" source="CVE"/>
    <description>
    The hfs_find_init function in the Linux kernel 2.6 allows local users to cause a denial of service (NULL pointer dereference and Oops) by mounting an HFS file system with a malformed MDB extent record.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2203.html">CVE-2011-2203</cve>
<bugzilla href="https://bugzilla.suse.com/699709">SUSE bug 699709</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2204</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2204" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2204" source="CVE"/>
    <description>
    Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.17, when the MemoryUserDatabase is used, creates log entries containing passwords upon encountering errors in JMX user creation, which allows local users to obtain sensitive information by reading a log file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2204.html">CVE-2011-2204</cve>
<bugzilla href="https://bugzilla.suse.com/702289">SUSE bug 702289</bugzilla>
<bugzilla href="https://bugzilla.suse.com/706404">SUSE bug 706404</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199802" comment="tomcat6-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199803" comment="tomcat6-admin-webapps-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199804" comment="tomcat6-docs-webapp-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199805" comment="tomcat6-javadoc-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199806" comment="tomcat6-jsp-2_1-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199807" comment="tomcat6-lib-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199808" comment="tomcat6-servlet-2_5-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199809" comment="tomcat6-webapps-6.0.18-20.35.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2362</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2362" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2362" source="CVE"/>
    <description>
    Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 do not distinguish between cookies for two domain names that differ only in a trailing dot, which allows remote web servers to bypass the Same Origin Policy via Set-Cookie headers.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2362.html">CVE-2011-2362</cve>
<bugzilla href="https://bugzilla.suse.com/701296">SUSE bug 701296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/704750">SUSE bug 704750</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2363</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2363" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2363" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsSVGPointList::AppendElement function in the implementation of SVG element lists in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving a user-supplied callback.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2363.html">CVE-2011-2363</cve>
<bugzilla href="https://bugzilla.suse.com/701296">SUSE bug 701296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/702020">SUSE bug 702020</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2364</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2364" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2364" source="CVE"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox 3.6.x before 3.6.18 and Thunderbird before 3.1.11 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-2365.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2364.html">CVE-2011-2364</cve>
<bugzilla href="https://bugzilla.suse.com/701296">SUSE bug 701296</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2365</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2365" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2365" source="CVE"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox 3.6.x before 3.6.18 and Thunderbird before 3.1.11 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-2364.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2365.html">CVE-2011-2365</cve>
<bugzilla href="https://bugzilla.suse.com/701296">SUSE bug 701296</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2371</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2371" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2371" source="CVE"/>
    <description>
    Integer overflow in the Array.reduceRight method in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to execute arbitrary code via vectors involving a long JavaScript Array object.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2371.html">CVE-2011-2371</cve>
<bugzilla href="https://bugzilla.suse.com/701296">SUSE bug 701296</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2372</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2372" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2372" source="CVE"/>
    <description>
    Mozilla Firefox before 3.6.23 and 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 do not prevent the starting of a download in response to the holding of the Enter key, which allows user-assisted remote attackers to bypass intended access restrictions via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2372.html">CVE-2011-2372</cve>
<bugzilla href="https://bugzilla.suse.com/720264">SUSE bug 720264</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2373</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2373" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2373" source="CVE"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14, when JavaScript is disabled, allows remote attackers to execute arbitrary code via a crafted XUL document.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2373.html">CVE-2011-2373</cve>
<bugzilla href="https://bugzilla.suse.com/701296">SUSE bug 701296</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2374</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2374" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2374" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2374.html">CVE-2011-2374</cve>
<bugzilla href="https://bugzilla.suse.com/701296">SUSE bug 701296</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2376</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2376" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2376" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.18 and Thunderbird before 3.1.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2376.html">CVE-2011-2376</cve>
<bugzilla href="https://bugzilla.suse.com/701296">SUSE bug 701296</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2377</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2377" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2377" source="CVE"/>
    <description>
    Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a multipart/x-mixed-replace image.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2377.html">CVE-2011-2377</cve>
<bugzilla href="https://bugzilla.suse.com/701296">SUSE bug 701296</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2378</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2378" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2378" source="CVE"/>
    <description>
    The appendChild function in Mozilla Firefox before 3.6.20, Thunderbird 3.x before 3.1.12, SeaMonkey 2.x, and possibly other products does not properly handle DOM objects, which allows remote attackers to execute arbitrary code via unspecified vectors that lead to dereferencing of a "dangling pointer."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2378.html">CVE-2011-2378</cve>
<bugzilla href="https://bugzilla.suse.com/712224">SUSE bug 712224</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2464</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2464" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2464" source="CVE"/>
    <description>
    Unspecified vulnerability in ISC BIND 9 9.6.x before 9.6-ESV-R4-P3, 9.7.x before 9.7.3-P3, and 9.8.x before 9.8.0-P4 allows remote attackers to cause a denial of service (named daemon crash) via a crafted UPDATE request.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2464.html">CVE-2011-2464</cve>
<bugzilla href="https://bugzilla.suse.com/703907">SUSE bug 703907</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199364" comment="bind-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199365" comment="bind-chrootenv-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199366" comment="bind-doc-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199367" comment="bind-libs-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199368" comment="bind-libs-32bit-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199369" comment="bind-libs-x86-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199370" comment="bind-utils-9.6ESVR7P4-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2479</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2479" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2479" source="CVE"/>
    <description>
    The Linux kernel before 2.6.39 does not properly create transparent huge pages in response to a MAP_PRIVATE mmap system call on /dev/zero, which allows local users to cause a denial of service (system crash) via a crafted application.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2479.html">CVE-2011-2479</cve>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/701163">SUSE bug 701163</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2483</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2483" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2483" source="CVE"/>
    <description>
    crypt_blowfish before 1.1, as used in PHP before 5.3.7 on certain platforms, PostgreSQL before 8.4.9, and other products, does not properly handle 8-bit characters, which makes it easier for context-dependent attackers to determine a cleartext password by leveraging knowledge of a password hash.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2483.html">CVE-2011-2483</cve>
<bugzilla href="https://bugzilla.suse.com/700876">SUSE bug 700876</bugzilla>
<bugzilla href="https://bugzilla.suse.com/701489">SUSE bug 701489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/701491">SUSE bug 701491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/713727">SUSE bug 713727</bugzilla>
<bugzilla href="https://bugzilla.suse.com/738221">SUSE bug 738221</bugzilla>
<bugzilla href="https://bugzilla.suse.com/749299">SUSE bug 749299</bugzilla>
<bugzilla href="https://bugzilla.suse.com/749301">SUSE bug 749301</bugzilla>
<bugzilla href="https://bugzilla.suse.com/749303">SUSE bug 749303</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199461" comment="glibc-2.11.3-17.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199462" comment="glibc-32bit-2.11.3-17.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199463" comment="glibc-devel-2.11.3-17.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199464" comment="glibc-devel-32bit-2.11.3-17.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199465" comment="glibc-html-2.11.3-17.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199466" comment="glibc-i18ndata-2.11.3-17.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199467" comment="glibc-info-2.11.3-17.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199468" comment="glibc-locale-2.11.3-17.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199469" comment="glibc-locale-32bit-2.11.3-17.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199470" comment="glibc-locale-x86-2.11.3-17.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199471" comment="glibc-profile-2.11.3-17.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199472" comment="glibc-profile-32bit-2.11.3-17.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199473" comment="glibc-profile-x86-2.11.3-17.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199474" comment="glibc-x86-2.11.3-17.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199106" comment="libxcrypt-3.0.3-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199107" comment="libxcrypt-32bit-3.0.3-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199108" comment="libxcrypt-x86-3.0.3-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199475" comment="nscd-2.11.3-17.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199109" comment="pam-modules-11-1.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199110" comment="pam-modules-32bit-11-1.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199111" comment="pam-modules-x86-11-1.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199112" comment="pwdutils-3.2.15-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199113" comment="pwdutils-plugin-audit-3.2.15-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199834" comment="yast2-core-2.17.45-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2485" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2485" source="CVE"/>
    <description>
    The gdk_pixbuf__gif_image_load function in gdk-pixbuf/io-gif.c in gdk-pixbuf before 2.23.5 does not properly handle certain return values, which allows remote attackers to cause a denial of service (memory consumption) via a crafted GIF image file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2485.html">CVE-2011-2485</cve>
<bugzilla href="https://bugzilla.suse.com/702028">SUSE bug 702028</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199485" comment="gtk2-2.18.9-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199486" comment="gtk2-32bit-2.18.9-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199487" comment="gtk2-doc-2.18.9-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199488" comment="gtk2-lang-2.18.9-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199489" comment="gtk2-x86-2.18.9-0.23 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2489</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2489" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2489" source="CVE"/>
    <description>
    Multiple off-by-one errors in opiesu.c in opiesu in OPIE 2.4.1-test1 and earlier might allow local users to gain privileges via a crafted command line.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2489.html">CVE-2011-2489</cve>
<bugzilla href="https://bugzilla.suse.com/698772">SUSE bug 698772</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199155" comment="opie-2.4-662.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199156" comment="opie-32bit-2.4-662.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199157" comment="opie-x86-2.4-662.18 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2490</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2490" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2490" source="CVE"/>
    <description>
    opielogin.c in opielogin in OPIE 2.4.1-test1 and earlier does not check the return value of the setuid system call, which allows local users to gain privileges by arranging for an account to already be running its maximum number of processes.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2490.html">CVE-2011-2490</cve>
<bugzilla href="https://bugzilla.suse.com/698772">SUSE bug 698772</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199155" comment="opie-2.4-662.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199156" comment="opie-32bit-2.4-662.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199157" comment="opie-x86-2.4-662.18 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2491</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2491" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2491" source="CVE"/>
    <description>
    The Network Lock Manager (NLM) protocol implementation in the NFS client functionality in the Linux kernel before 3.0 allows local users to cause a denial of service (system hang) via a LOCK_UN flock system call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2491.html">CVE-2011-2491</cve>
<bugzilla href="https://bugzilla.suse.com/702013">SUSE bug 702013</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2494</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2494" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2494" source="CVE"/>
    <description>
    kernel/taskstats.c in the Linux kernel before 3.1 allows local users to obtain sensitive I/O statistics by sending taskstats commands to a netlink socket, as demonstrated by discovering the length of another user's password.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2494.html">CVE-2011-2494</cve>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/703156">SUSE bug 703156</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2495</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2495" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2495" source="CVE"/>
    <description>
    fs/proc/base.c in the Linux kernel before 2.6.39.4 does not properly restrict access to /proc/#####/io files, which allows local users to obtain sensitive I/O statistics by polling a file, as demonstrated by discovering the length of another user's password.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2495.html">CVE-2011-2495</cve>
<bugzilla href="https://bugzilla.suse.com/703155">SUSE bug 703155</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2496</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2496" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2496" source="CVE"/>
    <description>
    Integer overflow in the vma_to_resize function in mm/mremap.c in the Linux kernel before 2.6.39 allows local users to cause a denial of service (BUG_ON and system crash) via a crafted mremap system call that expands a memory mapping.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2496.html">CVE-2011-2496</cve>
<bugzilla href="https://bugzilla.suse.com/702285">SUSE bug 702285</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2501</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2501" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2501" source="CVE"/>
    <description>
    The png_format_buffer function in pngerror.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 allows remote attackers to cause a denial of service (application crash) via a crafted PNG image that triggers an out-of-bounds read during the copying of error-message data.  NOTE: this vulnerability exists because of a CVE-2004-0421 regression. NOTE: this is called an off-by-one error by some sources.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2501.html">CVE-2011-2501</cve>
<bugzilla href="https://bugzilla.suse.com/702578">SUSE bug 702578</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199646" comment="libpng12-0-1.2.31-5.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199647" comment="libpng12-0-32bit-1.2.31-5.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199648" comment="libpng12-0-x86-1.2.31-5.31 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2511" source="CVE"/>
    <description>
    Integer overflow in libvirt before 0.9.3 allows remote authenticated users to cause a denial of service (libvirtd crash) and possibly execute arbitrary code via a crafted VirDomainGetVcpus RPC call that triggers memory corruption.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2511.html">CVE-2011-2511</cve>
<bugzilla href="https://bugzilla.suse.com/703084">SUSE bug 703084</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199692" comment="libvirt-1.0.5.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199693" comment="libvirt-client-1.0.5.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199694" comment="libvirt-client-32bit-1.0.5.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199695" comment="libvirt-doc-1.0.5.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199696" comment="libvirt-lock-sanlock-1.0.5.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199697" comment="libvirt-python-1.0.5.1-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2522</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2522" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2522" source="CVE"/>
    <description>
    Multiple cross-site request forgery (CSRF) vulnerabilities in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.10 allow remote attackers to hijack the authentication of administrators for requests that (1) shut down daemons, (2) start daemons, (3) add shares, (4) remove shares, (5) add printers, (6) remove printers, (7) add user accounts, or (8) remove user accounts, as demonstrated by certain start, stop, and restart parameters to the status program.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2522.html">CVE-2011-2522</cve>
<bugzilla href="https://bugzilla.suse.com/705241">SUSE bug 705241</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199555" comment="ldapsmb-1.34b-12.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199556" comment="libldb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199557" comment="libsmbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199558" comment="libsmbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199559" comment="libsmbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199560" comment="libtalloc2-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199561" comment="libtalloc2-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199562" comment="libtalloc2-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199563" comment="libtdb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199564" comment="libtdb1-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199565" comment="libtdb1-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199566" comment="libtevent0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199567" comment="libwbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199568" comment="libwbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199569" comment="libwbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199570" comment="samba-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199571" comment="samba-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199572" comment="samba-client-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199573" comment="samba-client-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199574" comment="samba-client-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199575" comment="samba-krb-printing-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199576" comment="samba-winbind-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199577" comment="samba-winbind-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199578" comment="samba-winbind-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199579" comment="samba-x86-3.6.3-0.39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2524</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2524" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2524" source="CVE"/>
    <description>
    Directory traversal vulnerability in soup-uri.c in SoupServer in libsoup before 2.35.4 allows remote attackers to read arbitrary files via a %2e%2e (encoded dot dot) in a URI.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2524.html">CVE-2011-2524</cve>
<bugzilla href="https://bugzilla.suse.com/706630">SUSE bug 706630</bugzilla>
<bugzilla href="https://bugzilla.suse.com/709167">SUSE bug 709167</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199672" comment="libsoup-2_4-1-2.32.2-4.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199673" comment="libsoup-2_4-1-32bit-2.32.2-4.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199674" comment="libsoup-2_4-1-x86-2.32.2-4.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2526</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2526" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2526" source="CVE"/>
    <description>
    Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.19, when sendfile is enabled for the HTTP APR or HTTP NIO connector, does not validate certain request attributes, which allows local users to bypass intended file access restrictions or cause a denial of service (infinite loop or JVM crash) by leveraging an untrusted web application.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2526.html">CVE-2011-2526</cve>
<bugzilla href="https://bugzilla.suse.com/706382">SUSE bug 706382</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199802" comment="tomcat6-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199803" comment="tomcat6-admin-webapps-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199804" comment="tomcat6-docs-webapp-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199805" comment="tomcat6-javadoc-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199806" comment="tomcat6-jsp-2_1-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199807" comment="tomcat6-lib-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199808" comment="tomcat6-servlet-2_5-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199809" comment="tomcat6-webapps-6.0.18-20.35.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2597</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2597" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2597" source="CVE"/>
    <description>
    The Lucent/Ascend file parser in Wireshark 1.2.x before 1.2.18, 1.4.x through 1.4.7, and 1.6.0 allows remote attackers to cause a denial of service (infinite loop) via malformed packets.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2597.html">CVE-2011-2597</cve>
<bugzilla href="https://bugzilla.suse.com/706728">SUSE bug 706728</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2686</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2686" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2686" source="CVE"/>
    <description>
    Ruby before 1.8.7-p352 does not reset the random seed upon forking, which makes it easier for context-dependent attackers to predict the values of random numbers by leveraging knowledge of the number sequence obtained in a different child process, a related issue to CVE-2003-0900.  NOTE: this issue exists because of a regression during Ruby 1.8.6 development.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2686.html">CVE-2011-2686</cve>
<bugzilla href="https://bugzilla.suse.com/704409">SUSE bug 704409</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199778" comment="ruby-1.8.7.p357-0.9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199779" comment="ruby-doc-html-1.8.7.p357-0.9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199780" comment="ruby-tk-1.8.7.p357-0.9.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2690</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2690" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2690" source="CVE"/>
    <description>
    Buffer overflow in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4, when used by an application that calls the png_rgb_to_gray function but not the png_set_expand function, allows remote attackers to overwrite memory with an arbitrary amount of data, and possibly have unspecified other impact, via a crafted PNG image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2690.html">CVE-2011-2690</cve>
<bugzilla href="https://bugzilla.suse.com/706387">SUSE bug 706387</bugzilla>
<bugzilla href="https://bugzilla.suse.com/706388">SUSE bug 706388</bugzilla>
<bugzilla href="https://bugzilla.suse.com/854395">SUSE bug 854395</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199646" comment="libpng12-0-1.2.31-5.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199647" comment="libpng12-0-32bit-1.2.31-5.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199648" comment="libpng12-0-x86-1.2.31-5.31 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2691</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2691" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2691" source="CVE"/>
    <description>
    The png_err function in pngerror.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 makes a function call using a NULL pointer argument instead of an empty-string argument, which allows remote attackers to cause a denial of service (application crash) via a crafted PNG image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2691.html">CVE-2011-2691</cve>
<bugzilla href="https://bugzilla.suse.com/706388">SUSE bug 706388</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199646" comment="libpng12-0-1.2.31-5.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199647" comment="libpng12-0-32bit-1.2.31-5.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199648" comment="libpng12-0-x86-1.2.31-5.31 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2692</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2692" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2692" source="CVE"/>
    <description>
    The png_handle_sCAL function in pngrutil.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 does not properly handle invalid sCAL chunks, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a crafted PNG image that triggers the reading of uninitialized memory.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2692.html">CVE-2011-2692</cve>
<bugzilla href="https://bugzilla.suse.com/706389">SUSE bug 706389</bugzilla>
<bugzilla href="https://bugzilla.suse.com/854395">SUSE bug 854395</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199646" comment="libpng12-0-1.2.31-5.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199647" comment="libpng12-0-32bit-1.2.31-5.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199648" comment="libpng12-0-x86-1.2.31-5.31 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2694</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2694" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2694" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the chg_passwd function in web/swat.c in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.10 allows remote authenticated administrators to inject arbitrary web script or HTML via the username parameter to the passwd program (aka the user field to the Change Password page).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2694.html">CVE-2011-2694</cve>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199555" comment="ldapsmb-1.34b-12.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199556" comment="libldb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199557" comment="libsmbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199558" comment="libsmbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199559" comment="libsmbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199560" comment="libtalloc2-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199561" comment="libtalloc2-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199562" comment="libtalloc2-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199563" comment="libtdb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199564" comment="libtdb1-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199565" comment="libtdb1-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199566" comment="libtevent0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199567" comment="libwbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199568" comment="libwbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199569" comment="libwbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199570" comment="samba-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199571" comment="samba-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199572" comment="samba-client-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199573" comment="samba-client-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199574" comment="samba-client-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199575" comment="samba-krb-printing-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199576" comment="samba-winbind-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199577" comment="samba-winbind-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199578" comment="samba-winbind-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199579" comment="samba-x86-3.6.3-0.39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2696</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2696" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2696" source="CVE"/>
    <description>
    Integer overflow in libsndfile before 1.0.25 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PARIS Audio Format (PAF) file that triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2696.html">CVE-2011-2696</cve>
<bugzilla href="https://bugzilla.suse.com/705681">SUSE bug 705681</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199081" comment="libsndfile-1.0.20-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199082" comment="libsndfile-32bit-1.0.20-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199083" comment="libsndfile-x86-1.0.20-2.4 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2697</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2697" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2697" source="CVE"/>
    <description>
    foomatic-rip-hplip in HP Linux Imaging and Printing (HPLIP) 3.11.5 allows remote attackers to execute arbitrary code via a crafted *FoomaticRIPCommandLine field in a .ppd file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2697.html">CVE-2011-2697</cve>
<bugzilla href="https://bugzilla.suse.com/59233">SUSE bug 59233</bugzilla>
<bugzilla href="https://bugzilla.suse.com/698451">SUSE bug 698451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/704608">SUSE bug 704608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/852368">SUSE bug 852368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/957531">SUSE bug 957531</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198835" comment="foomatic-filters-3.0.2-269.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198898" comment="hplip-3.11.10-0.6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198899" comment="hplip-hpijs-3.11.10-0.6.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2698</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2698" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2698" source="CVE"/>
    <description>
    Off-by-one error in the elem_cell_id_aux function in epan/dissectors/packet-ansi_a.c in the ANSI MAP dissector in Wireshark 1.4.x before 1.4.8 and 1.6.x before 1.6.1 allows remote attackers to cause a denial of service (infinite loop) via an invalid packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2698.html">CVE-2011-2698</cve>
<bugzilla href="https://bugzilla.suse.com/706728">SUSE bug 706728</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2705</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2705" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2705" source="CVE"/>
    <description>
    The SecureRandom.random_bytes function in lib/securerandom.rb in Ruby before 1.8.7-p352 and 1.9.x before 1.9.2-p290 relies on PID values for initialization, which makes it easier for context-dependent attackers to predict the result string by leveraging knowledge of random strings obtained in an earlier process with the same PID.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2705.html">CVE-2011-2705</cve>
<bugzilla href="https://bugzilla.suse.com/704409">SUSE bug 704409</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199778" comment="ruby-1.8.7.p357-0.9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199779" comment="ruby-doc-html-1.8.7.p357-0.9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199780" comment="ruby-tk-1.8.7.p357-0.9.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2721</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2721" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2721" source="CVE"/>
    <description>
    Off-by-one error in the cli_hm_scan function in matcher-hash.c in libclamav in ClamAV before 0.97.2 allows remote attackers to cause a denial of service (daemon crash) via an e-mail message that is not properly handled during certain hash calculations.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2721.html">CVE-2011-2721</cve>
<bugzilla href="https://bugzilla.suse.com/708263">SUSE bug 708263</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199377" comment="clamav-0.97.7-0.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2722</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2722" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2722" source="CVE"/>
    <description>
    The send_data_to_stdout function in prnt/hpijs/hpcupsfax.cpp in HP Linux Imaging and Printing (HPLIP) 3.x before 3.11.10 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/hpcupsfax.out temporary file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2722.html">CVE-2011-2722</cve>
<bugzilla href="https://bugzilla.suse.com/59233">SUSE bug 59233</bugzilla>
<bugzilla href="https://bugzilla.suse.com/698451">SUSE bug 698451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/704608">SUSE bug 704608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/713717">SUSE bug 713717</bugzilla>
<bugzilla href="https://bugzilla.suse.com/808355">SUSE bug 808355</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198898" comment="hplip-3.11.10-0.6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198899" comment="hplip-hpijs-3.11.10-0.6.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2725</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2725" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2725" source="CVE"/>
    <description>
    Directory traversal vulnerability in Ark 4.7.x and earlier allows remote attackers to delete and force the display of arbitrary files via .. (dot dot) sequences in a zip file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2725.html">CVE-2011-2725</cve>
<bugzilla href="https://bugzilla.suse.com/708268">SUSE bug 708268</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199340" comment="ark-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199341" comment="kcalc-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199342" comment="kcharselect-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199343" comment="kdessh-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199344" comment="kdf-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199345" comment="kfloppy-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199346" comment="kgpg-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199347" comment="ktimer-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199348" comment="kwalletmanager-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199349" comment="kwikdisk-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199350" comment="okteta-4.3.5-0.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2728</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2728" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2728" source="CVE"/>
    <description>
    The bsd_glob function in the File::Glob module for Perl before 5.14.2 allows context-dependent attackers to cause a denial of service (crash) via a glob expression with the GLOB_ALTDIRFUNC flag, which triggers an uninitialized pointer dereference.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2728.html">CVE-2011-2728</cve>
<bugzilla href="https://bugzilla.suse.com/796014">SUSE bug 796014</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199743" comment="perl-5.10.0-64.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199744" comment="perl-32bit-5.10.0-64.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199745" comment="perl-Module-Build-0.2808.01-0.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199746" comment="perl-Test-Simple-0.72-0.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199747" comment="perl-base-5.10.0-64.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199748" comment="perl-doc-5.10.0-64.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199749" comment="perl-x86-5.10.0-64.67 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2748</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2748" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2748" source="CVE"/>
    <description>
    The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted DHCP packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2748.html">CVE-2011-2748</cve>
<bugzilla href="https://bugzilla.suse.com/712653">SUSE bug 712653</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199401" comment="dhcp-4.2.4.P2-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199402" comment="dhcp-client-4.2.4.P2-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199403" comment="dhcp-relay-4.2.4.P2-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199404" comment="dhcp-server-4.2.4.P2-0.16 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2749</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2749" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2749" source="CVE"/>
    <description>
    The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted BOOTP packet.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2749.html">CVE-2011-2749</cve>
<bugzilla href="https://bugzilla.suse.com/712653">SUSE bug 712653</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199401" comment="dhcp-4.2.4.P2-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199402" comment="dhcp-client-4.2.4.P2-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199403" comment="dhcp-relay-4.2.4.P2-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199404" comment="dhcp-server-4.2.4.P2-0.16 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2821</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2821" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2821" source="CVE"/>
    <description>
    Double free vulnerability in libxml2, as used in Google Chrome before 13.0.782.215, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted XPath expression.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2821.html">CVE-2011-2821</cve>
<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/732787">SUSE bug 732787</bugzilla>
<bugzilla href="https://bugzilla.suse.com/739894">SUSE bug 739894</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199702" comment="libxml2-2.7.6-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199703" comment="libxml2-32bit-2.7.6-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199704" comment="libxml2-doc-2.7.6-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199705" comment="libxml2-x86-2.7.6-0.23 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2895</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2895" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2895" source="CVE"/>
    <description>
    The LZW decompressor in (1) the BufCompressedFill function in fontfile/decompress.c in X.Org libXfont before 1.4.4 and (2) compress/compress.c in 4.3BSD, as used in zopen.c in OpenBSD before 3.8, FreeBSD, NetBSD 4.0.x and 5.0.x before 5.0.3 and 5.1.x before 5.1.1, FreeType 2.1.9, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows context-dependent attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2896.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2895.html">CVE-2011-2895</cve>
<bugzilla href="https://bugzilla.suse.com/709851">SUSE bug 709851</bugzilla>
<bugzilla href="https://bugzilla.suse.com/711487">SUSE bug 711487</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199430" comment="freetype2-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199431" comment="freetype2-32bit-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199432" comment="freetype2-x86-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199433" comment="ft2demos-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199262" comment="xorg-x11-libs-7.4-8.26.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199263" comment="xorg-x11-libs-32bit-7.4-8.26.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199264" comment="xorg-x11-libs-x86-7.4-8.26.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2896</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2896" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2896" source="CVE"/>
    <description>
    The LZW decompressor in the LWZReadByte function in giftoppm.c in the David Koblas GIF decoder in PBMPLUS, as used in the gif_read_lzw function in filter/image-gif.c in CUPS before 1.4.7, the LZWReadByte function in plug-ins/common/file-gif-load.c in GIMP 2.6.11 and earlier, the LZWReadByte function in img/gifread.c in XPCE in SWI-Prolog 5.10.4 and earlier, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows remote attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2895.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2896.html">CVE-2011-2896</cve>
<bugzilla href="https://bugzilla.suse.com/601830">SUSE bug 601830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/671735">SUSE bug 671735</bugzilla>
<bugzilla href="https://bugzilla.suse.com/680210">SUSE bug 680210</bugzilla>
<bugzilla href="https://bugzilla.suse.com/680212">SUSE bug 680212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/700987">SUSE bug 700987</bugzilla>
<bugzilla href="https://bugzilla.suse.com/711490">SUSE bug 711490</bugzilla>
<bugzilla href="https://bugzilla.suse.com/711491">SUSE bug 711491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/715643">SUSE bug 715643</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199386" comment="cups-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199387" comment="cups-client-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199388" comment="cups-libs-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199389" comment="cups-libs-32bit-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199390" comment="cups-libs-x86-1.3.9-8.46.46 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2980</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2980" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2980" source="CVE"/>
    <description>
    Untrusted search path vulnerability in the ThinkPadSensor::Startup function in Mozilla Firefox before 3.6.20, Thunderbird 3.x before 3.1.12, allows local users to gain privileges by leveraging write access in an unspecified directory to place a Trojan horse DLL that is loaded into the running Firefox process.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2980.html">CVE-2011-2980</cve>
<bugzilla href="https://bugzilla.suse.com/712224">SUSE bug 712224</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2981</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2981" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2981" source="CVE"/>
    <description>
    The event-management implementation in Mozilla Firefox before 3.6.20, SeaMonkey 2.x, Thunderbird 3.x before 3.1.12, and possibly other products does not properly select the context for script to run in, which allows remote attackers to bypass the Same Origin Policy or execute arbitrary JavaScript code with chrome privileges via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2981.html">CVE-2011-2981</cve>
<bugzilla href="https://bugzilla.suse.com/712224">SUSE bug 712224</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2982</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2982" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2982" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.20, Thunderbird 2.x and 3.x before 3.1.12, SeaMonkey 1.x and 2.x, and possibly other products allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2982.html">CVE-2011-2982</cve>
<bugzilla href="https://bugzilla.suse.com/712224">SUSE bug 712224</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2983</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2983" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2983" source="CVE"/>
    <description>
    Mozilla Firefox before 3.6.20, Thunderbird 2.x and 3.x before 3.1.12, SeaMonkey 1.x and 2.x, and possibly other products does not properly handle the RegExp.input property, which allows remote attackers to bypass the Same Origin Policy and read data from a different domain via a crafted web site, possibly related to a use-after-free.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2983.html">CVE-2011-2983</cve>
<bugzilla href="https://bugzilla.suse.com/712224">SUSE bug 712224</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2995</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2995" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2995" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.23 and 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2995.html">CVE-2011-2995</cve>
<bugzilla href="https://bugzilla.suse.com/720264">SUSE bug 720264</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2996</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2996" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2996" source="CVE"/>
    <description>
    Unspecified vulnerability in the plugin API in Mozilla Firefox 3.6.x before 3.6.23 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2996.html">CVE-2011-2996</cve>
<bugzilla href="https://bugzilla.suse.com/720264">SUSE bug 720264</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2997</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2997" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2997" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 6, Thunderbird before 7.0, and SeaMonkey before 2.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2997.html">CVE-2011-2997</cve>
<bugzilla href="https://bugzilla.suse.com/720264">SUSE bug 720264</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2999</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-2999" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2999" source="CVE"/>
    <description>
    Mozilla Firefox before 3.6.23 and 4.x through 5, Thunderbird before 6.0, and SeaMonkey before 2.3 do not properly handle "location" as the name of a frame, which allows remote attackers to bypass the Same Origin Policy via a crafted web site, a different vulnerability than CVE-2010-0170.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2999.html">CVE-2011-2999</cve>
<bugzilla href="https://bugzilla.suse.com/720264">SUSE bug 720264</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3000</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3000" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3000" source="CVE"/>
    <description>
    Mozilla Firefox before 3.6.23 and 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 do not properly handle HTTP responses that contain multiple Location, Content-Length, or Content-Disposition headers, which makes it easier for remote attackers to conduct HTTP response splitting attacks via crafted header values.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3000.html">CVE-2011-3000</cve>
<bugzilla href="https://bugzilla.suse.com/720264">SUSE bug 720264</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3001</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3001" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3001" source="CVE"/>
    <description>
    Mozilla Firefox 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 do not prevent manual add-on installation in response to the holding of the Enter key, which allows user-assisted remote attackers to bypass intended access restrictions via a crafted web site that triggers an unspecified internal error.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3001.html">CVE-2011-3001</cve>
<bugzilla href="https://bugzilla.suse.com/720264">SUSE bug 720264</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3002</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3002" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3002" source="CVE"/>
    <description>
    Almost Native Graphics Layer Engine (ANGLE), as used in Mozilla Firefox before 7.0 and SeaMonkey before 2.4, does not validate the return value of a GrowAtomTable function call, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger a memory-allocation error and a resulting buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3002.html">CVE-2011-3002</cve>
<bugzilla href="https://bugzilla.suse.com/720264">SUSE bug 720264</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3003</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3003" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3003" source="CVE"/>
    <description>
    Mozilla Firefox before 7.0 and SeaMonkey before 2.4 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unspecified WebGL test case that triggers a memory-allocation error and a resulting out-of-bounds write operation.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3003.html">CVE-2011-3003</cve>
<bugzilla href="https://bugzilla.suse.com/720264">SUSE bug 720264</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3004</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3004" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3004" source="CVE"/>
    <description>
    The JSSubScriptLoader in Mozilla Firefox 4.x through 6 and SeaMonkey before 2.4 does not properly handle XPCNativeWrappers during calls to the loadSubScript method in an add-on, which makes it easier for remote attackers to gain privileges via a crafted web site that leverages certain unwrapping behavior.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3004.html">CVE-2011-3004</cve>
<bugzilla href="https://bugzilla.suse.com/720264">SUSE bug 720264</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3005</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3005" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3005" source="CVE"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OGG headers in a .ogg file.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3005.html">CVE-2011-3005</cve>
<bugzilla href="https://bugzilla.suse.com/720264">SUSE bug 720264</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3009</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3009" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3009" source="CVE"/>
    <description>
    Ruby before 1.8.6-p114 does not reset the random seed upon forking, which makes it easier for context-dependent attackers to predict the values of random numbers by leveraging knowledge of the number sequence obtained in a different child process, a related issue to CVE-2003-0900.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3009.html">CVE-2011-3009</cve>
<bugzilla href="https://bugzilla.suse.com/704409">SUSE bug 704409</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199778" comment="ruby-1.8.7.p357-0.9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199779" comment="ruby-doc-html-1.8.7.p357-0.9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199780" comment="ruby-tk-1.8.7.p357-0.9.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3026</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3026" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3026" source="CVE"/>
    <description>
    Integer overflow in libpng, as used in Google Chrome before 17.0.963.56, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that trigger an integer truncation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3026.html">CVE-2011-3026</cve>
<bugzilla href="https://bugzilla.suse.com/747311">SUSE bug 747311</bugzilla>
<bugzilla href="https://bugzilla.suse.com/747327">SUSE bug 747327</bugzilla>
<bugzilla href="https://bugzilla.suse.com/747328">SUSE bug 747328</bugzilla>
<bugzilla href="https://bugzilla.suse.com/773612">SUSE bug 773612</bugzilla>
<bugzilla href="https://bugzilla.suse.com/854395">SUSE bug 854395</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199646" comment="libpng12-0-1.2.31-5.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199647" comment="libpng12-0-32bit-1.2.31-5.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199648" comment="libpng12-0-x86-1.2.31-5.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3048</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3048" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3048" source="CVE"/>
    <description>
    The png_set_text_2 function in pngset.c in libpng 1.0.x before 1.0.59, 1.2.x before 1.2.49, 1.4.x before 1.4.11, and 1.5.x before 1.5.10 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted text chunk in a PNG image file, which triggers a memory allocation failure that is not properly handled, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3048.html">CVE-2011-3048</cve>
<bugzilla href="https://bugzilla.suse.com/754745">SUSE bug 754745</bugzilla>
<bugzilla href="https://bugzilla.suse.com/854395">SUSE bug 854395</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199646" comment="libpng12-0-1.2.31-5.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199647" comment="libpng12-0-32bit-1.2.31-5.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199648" comment="libpng12-0-x86-1.2.31-5.31 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3062</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3062" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3062" source="CVE"/>
    <description>
    Off-by-one error in the OpenType Sanitizer in Google Chrome before 18.0.1025.142 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted OpenType file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3062.html">CVE-2011-3062</cve>
<bugzilla href="https://bugzilla.suse.com/754458">SUSE bug 754458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/758408">SUSE bug 758408</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3101</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3101" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3101" source="CVE"/>
    <description>
    Google Chrome before 19.0.1084.46 on Linux does not properly mitigate an unspecified flaw in an NVIDIA driver, which has unknown impact and attack vectors.  NOTE: see CVE-2012-3105 for the related MFSA 2012-34 issue in Mozilla products.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3101.html">CVE-2011-3101</cve>
<bugzilla href="https://bugzilla.suse.com/762481">SUSE bug 762481</bugzilla>
<bugzilla href="https://bugzilla.suse.com/765204">SUSE bug 765204</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3102</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3102" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3102" source="CVE"/>
    <description>
    Off-by-one error in libxml2, as used in Google Chrome before 19.0.1084.46 and other products, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3102.html">CVE-2011-3102</cve>
<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/762481">SUSE bug 762481</bugzilla>
<bugzilla href="https://bugzilla.suse.com/764538">SUSE bug 764538</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199702" comment="libxml2-2.7.6-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199703" comment="libxml2-32bit-2.7.6-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199704" comment="libxml2-doc-2.7.6-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199705" comment="libxml2-x86-2.7.6-0.23 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3145</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3145" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3145" source="CVE"/>
    <description>
    When mount.ecrpytfs_private before version 87-0ubuntu1.2 calls setreuid() it doesn't also set the effective group id. So when it creates the new version, mtab.tmp, it's created with the group id of the user running mount.ecryptfs_private.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3145.html">CVE-2011-3145</cve>
<bugzilla href="https://bugzilla.suse.com/735342">SUSE bug 735342</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199411" comment="ecryptfs-utils-61-1.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199412" comment="ecryptfs-utils-32bit-61-1.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199413" comment="ecryptfs-utils-x86-61-1.33 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3146" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3146" source="CVE"/>
    <description>
    librsvg before 2.34.1 uses the node name to identify the type of node, which allows context-dependent attackers to cause a denial of service (NULL pointer dereference) and possibly execute arbitrary code via a SVG file with a node with the element name starting with "fe," which is misidentified as a RsvgFilterPrimitive.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3146.html">CVE-2011-3146</cve>
<bugzilla href="https://bugzilla.suse.com/714980">SUSE bug 714980</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199077" comment="librsvg-2.26.0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199078" comment="librsvg-32bit-2.26.0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199079" comment="librsvg-x86-2.26.0-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199080" comment="rsvg-view-2.26.0-2.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3148</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3148" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3148" source="CVE"/>
    <description>
    Stack-based buffer overflow in the _assemble_line function in modules/pam_env/pam_env.c in Linux-PAM (aka pam) before 1.1.5 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long string of white spaces at the beginning of the ~/.pam_environment file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3148.html">CVE-2011-3148</cve>
<bugzilla href="https://bugzilla.suse.com/724480">SUSE bug 724480</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199158" comment="pam-1.1.5-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199159" comment="pam-32bit-1.1.5-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199160" comment="pam-doc-1.1.5-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199161" comment="pam-x86-1.1.5-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3149</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3149" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3149" source="CVE"/>
    <description>
    The _expand_arg function in the pam_env module (modules/pam_env/pam_env.c) in Linux-PAM (aka pam) before 1.1.5 does not properly handle when environment variable expansion can overflow, which allows local users to cause a denial of service (CPU consumption).
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3149.html">CVE-2011-3149</cve>
<bugzilla href="https://bugzilla.suse.com/724480">SUSE bug 724480</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199158" comment="pam-1.1.5-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199159" comment="pam-32bit-1.1.5-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199160" comment="pam-doc-1.1.5-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199161" comment="pam-x86-1.1.5-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3170</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3170" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3170" source="CVE"/>
    <description>
    The gif_read_lzw function in filter/image-gif.c in CUPS 1.4.8 and earlier does not properly handle the first code word in an LZW stream, which allows remote attackers to trigger a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted stream, a different vulnerability than CVE-2011-2896.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3170.html">CVE-2011-3170</cve>
<bugzilla href="https://bugzilla.suse.com/601830">SUSE bug 601830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/671735">SUSE bug 671735</bugzilla>
<bugzilla href="https://bugzilla.suse.com/680210">SUSE bug 680210</bugzilla>
<bugzilla href="https://bugzilla.suse.com/680212">SUSE bug 680212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/700987">SUSE bug 700987</bugzilla>
<bugzilla href="https://bugzilla.suse.com/711490">SUSE bug 711490</bugzilla>
<bugzilla href="https://bugzilla.suse.com/715643">SUSE bug 715643</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199386" comment="cups-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199387" comment="cups-client-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199388" comment="cups-libs-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199389" comment="cups-libs-32bit-1.3.9-8.46.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199390" comment="cups-libs-x86-1.3.9-8.46.46 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3171</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3171" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3171" source="CVE"/>
    <description>
    Directory traversal vulnerability in pure-FTPd 1.0.22 and possibly other versions, when running on SUSE Linux Enterprise Server and possibly other operating systems, when the Netware OES remote server feature is enabled, allows local users to overwrite arbitrary files via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3171.html">CVE-2011-3171</cve>
<bugzilla href="https://bugzilla.suse.com/703035">SUSE bug 703035</bugzilla>
<bugzilla href="https://bugzilla.suse.com/716585">SUSE bug 716585</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199756" comment="pure-ftpd-1.0.22-3.19 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3172</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2011-3172" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3172" source="CVE"/>
    <description>
    A vulnerability in pam_modules of SUSE SUSE Linux Enterprise allows attackers to log into accounts that should have been disabled. Affected releases are SUSE SUSE Linux Enterprise: versions prior to 12.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3172.html">CVE-2011-3172</cve>
<bugzilla href="https://bugzilla.suse.com/1149683">SUSE bug 1149683</bugzilla>
<bugzilla href="https://bugzilla.suse.com/707645">SUSE bug 707645</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009248713" comment="pam-modules-11-1.22.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248714" comment="pam-modules-32bit-11-1.22.4 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3177</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3177" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3177" source="CVE"/>
    <description>
    The YaST2 network created files with world readable permissions which could have allowed local users to read sensitive material out of network configuration files, like passwords for wireless networks.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3177.html">CVE-2011-3177</cve>
<bugzilla href="https://bugzilla.suse.com/713661">SUSE bug 713661</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199833" comment="yast2-2.17.129-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199834" comment="yast2-core-2.17.45-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3190</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3190" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3190" source="CVE"/>
    <description>
    Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3190.html">CVE-2011-3190</cve>
<bugzilla href="https://bugzilla.suse.com/715991">SUSE bug 715991</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199802" comment="tomcat6-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199803" comment="tomcat6-admin-webapps-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199804" comment="tomcat6-docs-webapp-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199805" comment="tomcat6-javadoc-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199806" comment="tomcat6-jsp-2_1-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199807" comment="tomcat6-lib-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199808" comment="tomcat6-servlet-2_5-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199809" comment="tomcat6-webapps-6.0.18-20.35.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3191</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3191" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3191" source="CVE"/>
    <description>
    Integer signedness error in the CIFSFindNext function in fs/cifs/cifssmb.c in the Linux kernel before 3.1 allows remote CIFS servers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a large length value in a response to a read request for a directory.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3191.html">CVE-2011-3191</cve>
<bugzilla href="https://bugzilla.suse.com/714001">SUSE bug 714001</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3192</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3192" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3192" source="CVE"/>
    <description>
    The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3192.html">CVE-2011-3192</cve>
<bugzilla href="https://bugzilla.suse.com/713966">SUSE bug 713966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/714306">SUSE bug 714306</bugzilla>
<bugzilla href="https://bugzilla.suse.com/716634">SUSE bug 716634</bugzilla>
<bugzilla href="https://bugzilla.suse.com/718106">SUSE bug 718106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/722545">SUSE bug 722545</bugzilla>
<bugzilla href="https://bugzilla.suse.com/726139">SUSE bug 726139</bugzilla>
<bugzilla href="https://bugzilla.suse.com/732051">SUSE bug 732051</bugzilla>
<bugzilla href="https://bugzilla.suse.com/983778">SUSE bug 983778</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199288" comment="apache2-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199289" comment="apache2-doc-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199290" comment="apache2-example-pages-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199291" comment="apache2-prefork-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199292" comment="apache2-utils-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199293" comment="apache2-worker-2.2.12-1.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3193</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3193" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3193" source="CVE"/>
    <description>
    Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3193.html">CVE-2011-3193</cve>
<bugzilla href="https://bugzilla.suse.com/714984">SUSE bug 714984</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199582" comment="libQtWebKit4-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199583" comment="libQtWebKit4-32bit-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199584" comment="libQtWebKit4-x86-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199585" comment="libqt4-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199586" comment="libqt4-32bit-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199587" comment="libqt4-qt3support-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199588" comment="libqt4-qt3support-32bit-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199589" comment="libqt4-qt3support-x86-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199590" comment="libqt4-sql-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199591" comment="libqt4-sql-32bit-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199592" comment="libqt4-sql-mysql-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199593" comment="libqt4-sql-sqlite-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199594" comment="libqt4-sql-x86-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199595" comment="libqt4-x11-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199596" comment="libqt4-x11-32bit-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199597" comment="libqt4-x11-x86-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199598" comment="libqt4-x86-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199599" comment="qt4-x11-tools-4.6.3-5.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3200</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3200" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3200" source="CVE"/>
    <description>
    Stack-based buffer overflow in the parseLegacySyslogMsg function in tools/syslogd.c in rsyslogd in rsyslog 4.6.x before 4.6.8 and 5.2.0 through 5.8.4 might allow remote attackers to cause a denial of service (application exit) via a long TAG in a legacy syslog message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3200.html">CVE-2011-3200</cve>
<bugzilla href="https://bugzilla.suse.com/714658">SUSE bug 714658</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199768" comment="rsyslog-5.10.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199769" comment="rsyslog-diag-tools-5.10.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199770" comment="rsyslog-doc-5.10.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199771" comment="rsyslog-module-gssapi-5.10.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199772" comment="rsyslog-module-gtls-5.10.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199773" comment="rsyslog-module-mysql-5.10.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199774" comment="rsyslog-module-pgsql-5.10.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199775" comment="rsyslog-module-relp-5.10.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199776" comment="rsyslog-module-snmp-5.10.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199777" comment="rsyslog-module-udpspoof-5.10.1-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3205</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2011-3205" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3205" source="CVE"/>
    <description>
    Buffer overflow in the gopherToHTML function in gopher.cc in the Gopher reply parser in Squid 3.0 before 3.0.STABLE26, 3.1 before 3.1.15, and 3.2 before 3.2.0.11 allows remote Gopher servers to cause a denial of service (memory corruption and daemon restart) or possibly have unspecified other impact via a long line in a response.  NOTE: This issue exists because of a CVE-2005-0094 regression.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3205.html">CVE-2011-3205</cve>
<bugzilla href="https://bugzilla.suse.com/715171">SUSE bug 715171</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199784" comment="squid3-3.1.12-8.12 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210806" comment="squid3-3.1.23-8.16.30 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3210</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3210" source="CVE"/>
    <description>
    The ephemeral ECDH ciphersuite functionality in OpenSSL 0.9.8 through 0.9.8r and 1.0.x before 1.0.0e does not ensure thread safety during processing of handshake messages from clients, which allows remote attackers to cause a denial of service (daemon crash) via out-of-order messages that violate the TLS protocol.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3210.html">CVE-2011-3210</cve>
<bugzilla href="https://bugzilla.suse.com/716144">SUSE bug 716144</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199638" comment="libopenssl0_9_8-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199639" comment="libopenssl0_9_8-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199640" comment="libopenssl0_9_8-hmac-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199641" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199642" comment="libopenssl0_9_8-x86-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199643" comment="openssl-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199644" comment="openssl-doc-0.9.8j-0.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3232</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3232" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3232" source="CVE"/>
    <description>
    YARR, as used in Mozilla Firefox before 7.0, Thunderbird before 7.0, and SeaMonkey before 2.4, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted JavaScript.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3232.html">CVE-2011-3232</cve>
<bugzilla href="https://bugzilla.suse.com/720264">SUSE bug 720264</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113256" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3256</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3256" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3256" source="CVE"/>
    <description>
    FreeType 2 before 2.4.7, as used in CoreGraphics in Apple iOS before 5, Mandriva Enterprise Server 5, and possibly other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font, a different vulnerability than CVE-2011-0226.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3256.html">CVE-2011-3256</cve>
<bugzilla href="https://bugzilla.suse.com/728044">SUSE bug 728044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/730124">SUSE bug 730124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/748083">SUSE bug 748083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199430" comment="freetype2-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199431" comment="freetype2-32bit-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199432" comment="freetype2-x86-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199433" comment="ft2demos-2.3.7-25.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3266</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3266" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3266" source="CVE"/>
    <description>
    The proto_tree_add_item function in Wireshark 1.6.0 through 1.6.1 and 1.4.0 through 1.4.8, when the IKEv1 protocol dissector is used, allows user-assisted remote attackers to cause a denial of service (infinite loop) via vectors involving a malformed IKE packet and many items in a tree.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3266.html">CVE-2011-3266</cve>
<bugzilla href="https://bugzilla.suse.com/718032">SUSE bug 718032</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3345</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3345" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3345" source="CVE"/>
    <description>
    ulp/sdp/sdp_proc.c in the ib_sdp module (aka ib_sdp.ko) in the ofa_kernel package in the InfiniBand driver implementation in OpenFabrics Enterprise Distribution (OFED) before 1.5.3 does not properly handle certain non-array variables, which allows local users to cause a denial of service (stack memory corruption and system crash) by reading the /proc/net/sdpstats file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3345.html">CVE-2011-3345</cve>
<bugzilla href="https://bugzilla.suse.com/706175">SUSE bug 706175</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199724" comment="ofed-1.5.4.1-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199725" comment="ofed-doc-1.5.4.1-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199726" comment="ofed-kmp-default-1.5.4.1_3.0.76_0.11-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199727" comment="ofed-kmp-pae-1.5.4.1_3.0.76_0.11-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199728" comment="ofed-kmp-ppc64-1.5.4.1_3.0.76_0.11-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199729" comment="ofed-kmp-trace-1.5.4.1_3.0.76_0.11-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3348</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3348" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3348" source="CVE"/>
    <description>
    The mod_proxy_ajp module in the Apache HTTP Server before 2.2.21, when used with mod_proxy_balancer in certain configurations, allows remote attackers to cause a denial of service (temporary "error state" in the backend server) via a malformed HTTP request.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3348.html">CVE-2011-3348</cve>
<bugzilla href="https://bugzilla.suse.com/719236">SUSE bug 719236</bugzilla>
<bugzilla href="https://bugzilla.suse.com/722545">SUSE bug 722545</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199288" comment="apache2-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199289" comment="apache2-doc-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199290" comment="apache2-example-pages-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199291" comment="apache2-prefork-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199292" comment="apache2-utils-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199293" comment="apache2-worker-2.2.12-1.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3360</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3360" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3360" source="CVE"/>
    <description>
    Untrusted search path vulnerability in Wireshark 1.4.x before 1.4.9 and 1.6.x before 1.6.2 allows local users to gain privileges via a Trojan horse Lua script in an unspecified directory.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3360.html">CVE-2011-3360</cve>
<bugzilla href="https://bugzilla.suse.com/718032">SUSE bug 718032</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3368</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3368" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3368" source="CVE"/>
    <description>
    The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3368.html">CVE-2011-3368</cve>
<bugzilla href="https://bugzilla.suse.com/722545">SUSE bug 722545</bugzilla>
<bugzilla href="https://bugzilla.suse.com/728876">SUSE bug 728876</bugzilla>
<bugzilla href="https://bugzilla.suse.com/729181">SUSE bug 729181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/791794">SUSE bug 791794</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199288" comment="apache2-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199289" comment="apache2-doc-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199290" comment="apache2-example-pages-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199291" comment="apache2-prefork-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199292" comment="apache2-utils-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199293" comment="apache2-worker-2.2.12-1.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3372</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3372" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3372" source="CVE"/>
    <description>
    imap/nntpd.c in the NNTP server (nntpd) for Cyrus IMAPd 2.4.x before 2.4.12 allows remote attackers to bypass authentication by sending an AUTHINFO USER command without sending an additional AUTHINFO PASS command.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3372.html">CVE-2011-3372</cve>
<bugzilla href="https://bugzilla.suse.com/719998">SUSE bug 719998</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009198790" comment="cyrus-imapd-2.3.11-60.65.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198791" comment="perl-Cyrus-IMAP-2.3.11-60.65.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009198792" comment="perl-Cyrus-SIEVE-managesieve-2.3.11-60.65.64 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3379</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3379" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3379" source="CVE"/>
    <description>
    The is_a function in PHP 5.3.7 and 5.3.8 triggers a call to the __autoload function, which makes it easier for remote attackers to execute arbitrary code by providing a crafted URL and leveraging potentially unsafe behavior in certain PEAR packages and custom autoloaders.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3379.html">CVE-2011-3379</cve>
<bugzilla href="https://bugzilla.suse.com/728350">SUSE bug 728350</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199294" comment="apache2-mod_php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199295" comment="php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199296" comment="php53-bcmath-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199297" comment="php53-bz2-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199298" comment="php53-calendar-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199299" comment="php53-ctype-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199300" comment="php53-curl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199301" comment="php53-dba-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199302" comment="php53-dom-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199303" comment="php53-exif-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199304" comment="php53-fastcgi-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199305" comment="php53-fileinfo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199306" comment="php53-ftp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199307" comment="php53-gd-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199308" comment="php53-gettext-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199309" comment="php53-gmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199310" comment="php53-iconv-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199311" comment="php53-intl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199312" comment="php53-json-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199313" comment="php53-ldap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199314" comment="php53-mbstring-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199315" comment="php53-mcrypt-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199316" comment="php53-mysql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199317" comment="php53-odbc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199318" comment="php53-openssl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199319" comment="php53-pcntl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199320" comment="php53-pdo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199321" comment="php53-pear-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199322" comment="php53-pgsql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199323" comment="php53-pspell-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199324" comment="php53-shmop-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199325" comment="php53-snmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199326" comment="php53-soap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199327" comment="php53-suhosin-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199328" comment="php53-sysvmsg-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199329" comment="php53-sysvsem-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199330" comment="php53-sysvshm-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199331" comment="php53-tokenizer-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199332" comment="php53-wddx-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199333" comment="php53-xmlreader-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199334" comment="php53-xmlrpc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199335" comment="php53-xmlwriter-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199336" comment="php53-xsl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199337" comment="php53-zip-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199338" comment="php53-zlib-5.3.17-0.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3389</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3389" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389" source="CVE"/>
    <description>
    The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3389.html">CVE-2011-3389</cve>
<bugzilla href="https://bugzilla.suse.com/716002">SUSE bug 716002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/719047">SUSE bug 719047</bugzilla>
<bugzilla href="https://bugzilla.suse.com/725167">SUSE bug 725167</bugzilla>
<bugzilla href="https://bugzilla.suse.com/726096">SUSE bug 726096</bugzilla>
<bugzilla href="https://bugzilla.suse.com/739248">SUSE bug 739248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/739256">SUSE bug 739256</bugzilla>
<bugzilla href="https://bugzilla.suse.com/742306">SUSE bug 742306</bugzilla>
<bugzilla href="https://bugzilla.suse.com/751718">SUSE bug 751718</bugzilla>
<bugzilla href="https://bugzilla.suse.com/759666">SUSE bug 759666</bugzilla>
<bugzilla href="https://bugzilla.suse.com/814655">SUSE bug 814655</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199391" comment="curl-7.19.7-1.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199392" comment="libcurl4-7.19.7-1.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199393" comment="libcurl4-32bit-7.19.7-1.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199394" comment="libcurl4-x86-7.19.7-1.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199616" comment="libfreebl3-3.14.3-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199617" comment="libfreebl3-32bit-3.14.3-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199618" comment="libfreebl3-x86-3.14.3-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199619" comment="libsoftokn3-3.14.3-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199620" comment="libsoftokn3-32bit-3.14.3-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199621" comment="libsoftokn3-x86-3.14.3-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199622" comment="mozilla-nss-3.14.3-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199623" comment="mozilla-nss-32bit-3.14.3-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199624" comment="mozilla-nss-tools-3.14.3-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199625" comment="mozilla-nss-x86-3.14.3-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3439</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3439" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3439" source="CVE"/>
    <description>
    FreeType in CoreGraphics in Apple iOS before 5.0.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font in a document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3439.html">CVE-2011-3439</cve>
<bugzilla href="https://bugzilla.suse.com/730124">SUSE bug 730124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/748083">SUSE bug 748083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199430" comment="freetype2-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199431" comment="freetype2-32bit-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199432" comment="freetype2-x86-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199433" comment="ft2demos-2.3.7-25.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3483</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3483" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3483" source="CVE"/>
    <description>
    Wireshark 1.6.x before 1.6.2 allows remote attackers to cause a denial of service (application crash) via a malformed capture file that leads to an invalid root tvbuff, related to a "buffer exception handling vulnerability."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3483.html">CVE-2011-3483</cve>
<bugzilla href="https://bugzilla.suse.com/718032">SUSE bug 718032</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3602</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3602" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3602" source="CVE"/>
    <description>
    Directory traversal vulnerability in device-linux.c in the router advertisement daemon (radvd) before 1.8.2 allows local users to overwrite arbitrary files, and remote attackers to overwrite certain files, via a .. (dot dot) in an interface name.  NOTE: this can be leveraged with a symlink to overwrite arbitrary files.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3602.html">CVE-2011-3602</cve>
<bugzilla href="https://bugzilla.suse.com/721968">SUSE bug 721968</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199201" comment="radvd-1.1-1.24.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3603</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3603" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3603" source="CVE"/>
    <description>
    The router advertisement daemon (radvd) before 1.8.2 does not properly handle errors in the privsep_init function, which causes the radvd daemon to run as root and has an unspecified impact.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3603.html">CVE-2011-3603</cve>
<bugzilla href="https://bugzilla.suse.com/721968">SUSE bug 721968</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199201" comment="radvd-1.1-1.24.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3604</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3604" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3604" source="CVE"/>
    <description>
    The process_ra function in the router advertisement daemon (radvd) before 1.8.2 allows remote attackers to cause a denial of service (stack-based buffer over-read and crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3604.html">CVE-2011-3604</cve>
<bugzilla href="https://bugzilla.suse.com/721968">SUSE bug 721968</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199201" comment="radvd-1.1-1.24.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3605</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3605" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3605" source="CVE"/>
    <description>
    The process_rs function in the router advertisement daemon (radvd) before 1.8.2, when UnicastOnly is enabled, allows remote attackers to cause a denial of service (temporary service hang) via a large number of ND_ROUTER_SOLICIT requests.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3605.html">CVE-2011-3605</cve>
<bugzilla href="https://bugzilla.suse.com/721968">SUSE bug 721968</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199201" comment="radvd-1.1-1.24.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3607</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3607" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3607" source="CVE"/>
    <description>
    Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3607.html">CVE-2011-3607</cve>
<bugzilla href="https://bugzilla.suse.com/728876">SUSE bug 728876</bugzilla>
<bugzilla href="https://bugzilla.suse.com/729181">SUSE bug 729181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/729183">SUSE bug 729183</bugzilla>
<bugzilla href="https://bugzilla.suse.com/806721">SUSE bug 806721</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199288" comment="apache2-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199289" comment="apache2-doc-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199290" comment="apache2-example-pages-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199291" comment="apache2-prefork-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199292" comment="apache2-utils-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199293" comment="apache2-worker-2.2.12-1.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3627</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3627" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3627" source="CVE"/>
    <description>
    The bytecode engine in ClamAV before 0.97.3 allows remote attackers to cause a denial of service (crash) via vectors related to "recursion level" and (1) libclamav/bytecode.c and (2) libclamav/bytecode_api.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3627.html">CVE-2011-3627</cve>
<bugzilla href="https://bugzilla.suse.com/724856">SUSE bug 724856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/809945">SUSE bug 809945</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199377" comment="clamav-0.97.7-0.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3639</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3639" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3639" source="CVE"/>
    <description>
    The mod_proxy module in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x before 2.2.18, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers by using the HTTP/0.9 protocol with a malformed URI containing an initial @ (at sign) character.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3639.html">CVE-2011-3639</cve>
<bugzilla href="https://bugzilla.suse.com/722545">SUSE bug 722545</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199288" comment="apache2-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199289" comment="apache2-doc-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199290" comment="apache2-example-pages-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199291" comment="apache2-prefork-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199292" comment="apache2-utils-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199293" comment="apache2-worker-2.2.12-1.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3647</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3647" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3647" source="CVE"/>
    <description>
    The JSSubScriptLoader in Mozilla Firefox before 3.6.24 and Thunderbird before 3.1.6 does not properly handle XPCNativeWrappers during calls to the loadSubScript method in an add-on, which makes it easier for remote attackers to gain privileges via a crafted web site that leverages certain unwrapping behavior, a related issue to CVE-2011-3004.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3647.html">CVE-2011-3647</cve>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3648</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3648" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3648" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 3.6.24 and 4.x through 7.0 and Thunderbird before 3.1.6 and 5.0 through 7.0 allows remote attackers to inject arbitrary web script or HTML via crafted text with Shift JIS encoding.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3648.html">CVE-2011-3648</cve>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3650</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3650" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3650" source="CVE"/>
    <description>
    Mozilla Firefox before 3.6.24 and 4.x through 7.0 and Thunderbird before 3.1.6 and 5.0 through 7.0 do not properly handle JavaScript files that contain many functions, which allows user-assisted remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a crafted file that is accessed by debugging APIs, as demonstrated by Firebug.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3650.html">CVE-2011-3650</cve>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3658</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3658" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3658" source="CVE"/>
    <description>
    The SVG implementation in Mozilla Firefox 8.0, Thunderbird 8.0, and SeaMonkey 2.5 does not properly interact with DOMAttrModified event handlers, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via vectors involving removal of SVG elements.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3658.html">CVE-2011-3658</cve>
<bugzilla href="https://bugzilla.suse.com/737533">SUSE bug 737533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/746591">SUSE bug 746591</bugzilla>
<bugzilla href="https://bugzilla.suse.com/747320">SUSE bug 747320</bugzilla>
<bugzilla href="https://bugzilla.suse.com/750044">SUSE bug 750044</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3659</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3659" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3659" source="CVE"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 3.6.26 and 4.x through 9.0, Thunderbird before 3.1.18 and 5.0 through 9.0, and SeaMonkey before 2.7 might allow remote attackers to execute arbitrary code via vectors related to incorrect AttributeChildRemoved notifications that affect access to removed nsDOMAttribute child nodes.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3659.html">CVE-2011-3659</cve>
<bugzilla href="https://bugzilla.suse.com/744275">SUSE bug 744275</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3660</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3660" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3660" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 8.0, Thunderbird 5.0 through 8.0, and SeaMonkey before 2.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors that trigger a compartment mismatch associated with the nsDOMMessageEvent::GetData function, and unknown other vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3660.html">CVE-2011-3660</cve>
<bugzilla href="https://bugzilla.suse.com/737533">SUSE bug 737533</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3661</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3661" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3661" source="CVE"/>
    <description>
    YARR, as used in Mozilla Firefox 4.x through 8.0, Thunderbird 5.0 through 8.0, and SeaMonkey before 2.6, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted JavaScript.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3661.html">CVE-2011-3661</cve>
<bugzilla href="https://bugzilla.suse.com/737533">SUSE bug 737533</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3663</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3663" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3663" source="CVE"/>
    <description>
    Mozilla Firefox 4.x through 8.0, Thunderbird 5.0 through 8.0, and SeaMonkey before 2.6 allow remote attackers to capture keystrokes entered on a web page, even when JavaScript is disabled, by using SVG animation accessKey events within that web page.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3663.html">CVE-2011-3663</cve>
<bugzilla href="https://bugzilla.suse.com/737533">SUSE bug 737533</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3665</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3665" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3665" source="CVE"/>
    <description>
    Mozilla Firefox 4.x through 8.0, Thunderbird 5.0 through 8.0, and SeaMonkey before 2.6 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an Ogg VIDEO element that is not properly handled after scaling.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3665.html">CVE-2011-3665</cve>
<bugzilla href="https://bugzilla.suse.com/737533">SUSE bug 737533</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3666</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3666" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3666" source="CVE"/>
    <description>
    Mozilla Firefox before 3.6.25 and Thunderbird before 3.1.17 on Mac OS X do not consider .jar files to be executable files, which allows user-assisted remote attackers to bypass intended access restrictions via a crafted file.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-2372 on Mac OS X.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3666.html">CVE-2011-3666</cve>
<bugzilla href="https://bugzilla.suse.com/737533">SUSE bug 737533</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3670</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3670" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3670" source="CVE"/>
    <description>
    Mozilla Firefox before 3.6.26 and 4.x through 6.0, Thunderbird before 3.1.18 and 5.0 through 6.0, and SeaMonkey before 2.4 do not properly enforce the IPv6 literal address syntax, which allows remote attackers to obtain sensitive information by making XMLHttpRequest calls through a proxy and reading the error messages.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3670.html">CVE-2011-3670</cve>
<bugzilla href="https://bugzilla.suse.com/744275">SUSE bug 744275</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3848</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3848" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3848" source="CVE"/>
    <description>
    Directory traversal vulnerability in Puppet 2.6.x before 2.6.10 and 2.7.x before 2.7.4 allows remote attackers to write X.509 Certificate Signing Request (CSR) to arbitrary locations via (1) a double-encoded key parameter in the URI in 2.7.x, (2) the CN in the Subject of a CSR in 2.6 and 0.25.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3848.html">CVE-2011-3848</cve>
<bugzilla href="https://bugzilla.suse.com/721139">SUSE bug 721139</bugzilla>
<bugzilla href="https://bugzilla.suse.com/726372">SUSE bug 726372</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199754" comment="puppet-2.6.18-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199755" comment="puppet-server-2.6.18-0.4 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3869</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3869" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3869" source="CVE"/>
    <description>
    Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x allows local users to overwrite arbitrary files via a symlink attack on the .k5login file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3869.html">CVE-2011-3869</cve>
<bugzilla href="https://bugzilla.suse.com/726372">SUSE bug 726372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/727024">SUSE bug 727024</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199754" comment="puppet-2.6.18-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199755" comment="puppet-server-2.6.18-0.4 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3870</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3870" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3870" source="CVE"/>
    <description>
    Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x allows local users to modify the permissions of arbitrary files via a symlink attack on the SSH authorized_keys file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3870.html">CVE-2011-3870</cve>
<bugzilla href="https://bugzilla.suse.com/726372">SUSE bug 726372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/727025">SUSE bug 727025</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199754" comment="puppet-2.6.18-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199755" comment="puppet-server-2.6.18-0.4 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3871</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3871" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3871" source="CVE"/>
    <description>
    Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x, when running in --edit mode, uses a predictable file name, which allows local users to run arbitrary Puppet code or trick a user into editing arbitrary files.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3871.html">CVE-2011-3871</cve>
<bugzilla href="https://bugzilla.suse.com/726372">SUSE bug 726372</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199754" comment="puppet-2.6.18-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199755" comment="puppet-server-2.6.18-0.4 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3872</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3872" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3872" source="CVE"/>
    <description>
    Puppet 2.6.x before 2.6.12 and 2.7.x before 2.7.6, and Puppet Enterprise (PE) Users 1.0, 1.1, and 1.2 before 1.2.4, when signing an agent certificate, adds the Puppet master's certdnsnames values to the X.509 Subject Alternative Name field of the certificate, which allows remote attackers to spoof a Puppet master via a man-in-the-middle (MITM) attack against an agent that uses an alternate DNS name for the master, aka "AltNames Vulnerability."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3872.html">CVE-2011-3872</cve>
<bugzilla href="https://bugzilla.suse.com/726372">SUSE bug 726372</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199754" comment="puppet-2.6.18-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199755" comment="puppet-server-2.6.18-0.4 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3919</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3919" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3919" source="CVE"/>
    <description>
    Heap-based buffer overflow in libxml2, as used in Google Chrome before 16.0.912.75, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3919.html">CVE-2011-3919</cve>
<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/739894">SUSE bug 739894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/740493">SUSE bug 740493</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199702" comment="libxml2-2.7.6-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199703" comment="libxml2-32bit-2.7.6-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199704" comment="libxml2-doc-2.7.6-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199705" comment="libxml2-x86-2.7.6-0.23 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3922</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-3922" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3922" source="CVE"/>
    <description>
    Stack-based buffer overflow in Google Chrome before 16.0.912.75 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to glyph handling.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3922.html">CVE-2011-3922</cve>
<bugzilla href="https://bugzilla.suse.com/739904">SUSE bug 739904</bugzilla>
<bugzilla href="https://bugzilla.suse.com/740493">SUSE bug 740493</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199582" comment="libQtWebKit4-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199583" comment="libQtWebKit4-32bit-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199584" comment="libQtWebKit4-x86-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199585" comment="libqt4-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199586" comment="libqt4-32bit-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199587" comment="libqt4-qt3support-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199588" comment="libqt4-qt3support-32bit-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199589" comment="libqt4-qt3support-x86-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199590" comment="libqt4-sql-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199591" comment="libqt4-sql-32bit-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199592" comment="libqt4-sql-mysql-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199593" comment="libqt4-sql-sqlite-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199594" comment="libqt4-sql-x86-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199595" comment="libqt4-x11-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199596" comment="libqt4-x11-32bit-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199597" comment="libqt4-x11-x86-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199598" comment="libqt4-x86-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199599" comment="qt4-x11-tools-4.6.3-5.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3970</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2011-3970" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3970" source="CVE"/>
    <description>
    libxslt, as used in Google Chrome before 17.0.963.46, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3970.html">CVE-2011-3970</cve>
<bugzilla href="https://bugzilla.suse.com/746039">SUSE bug 746039</bugzilla>
<bugzilla href="https://bugzilla.suse.com/747327">SUSE bug 747327</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200346" comment="libxslt-1.1.24-19.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200347" comment="libxslt-32bit-1.1.24-19.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200348" comment="libxslt-x86-1.1.24-19.23 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200346" comment="libxslt-1.1.24-19.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200347" comment="libxslt-32bit-1.1.24-19.23 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4028</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-4028" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4028" source="CVE"/>
    <description>
    The LockServer function in os/utils.c in X.Org xserver before 1.11.2 allows local users to determine the existence of arbitrary files via a symlink attack on a temporary lock file, which is handled differently if the file exists.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4028.html">CVE-2011-4028</cve>
<bugzilla href="https://bugzilla.suse.com/722944">SUSE bug 722944</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199825" comment="xorg-x11-Xvnc-7.4-27.81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199826" comment="xorg-x11-server-7.4-27.81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199831" comment="xorg-x11-server-dmx-7.3.99-17.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199827" comment="xorg-x11-server-extra-7.4-27.81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199832" comment="xorg-x11-server-rdp-7.3.99-3.20 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4029</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-4029" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4029" source="CVE"/>
    <description>
    The LockServer function in os/utils.c in X.Org xserver before 1.11.2 allows local users to change the permissions of arbitrary files to 444, read those files, and possibly cause a denial of service (removed execution permission) via a symlink attack on a temporary lock file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4029.html">CVE-2011-4029</cve>
<bugzilla href="https://bugzilla.suse.com/722944">SUSE bug 722944</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199825" comment="xorg-x11-Xvnc-7.4-27.81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199826" comment="xorg-x11-server-7.4-27.81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199831" comment="xorg-x11-server-dmx-7.3.99-17.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199827" comment="xorg-x11-server-extra-7.4-27.81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199832" comment="xorg-x11-server-rdp-7.3.99-3.20 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4086</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-4086" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4086" source="CVE"/>
    <description>
    The journal_unmap_buffer function in fs/jbd2/transaction.c in the Linux kernel before 3.3.1 does not properly handle the _Delay and _Unwritten buffer head states, which allows local users to cause a denial of service (system crash) by leveraging the presence of an ext4 filesystem that was mounted with a journal.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4086.html">CVE-2011-4086</cve>
<bugzilla href="https://bugzilla.suse.com/745832">SUSE bug 745832</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4096</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2011-4096" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4096" source="CVE"/>
    <description>
    The idnsGrokReply function in Squid before 3.1.16 does not properly free memory, which allows remote attackers to cause a denial of service (daemon abort) via a DNS reply containing a CNAME record that references another CNAME record that contains an empty A record.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4096.html">CVE-2011-4096</cve>
<bugzilla href="https://bugzilla.suse.com/727492">SUSE bug 727492</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199784" comment="squid3-3.1.12-8.12 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210806" comment="squid3-3.1.23-8.16.30 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4097</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-4097" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4097" source="CVE"/>
    <description>
    Integer overflow in the oom_badness function in mm/oom_kill.c in the Linux kernel before 3.1.8 on 64-bit platforms allows local users to cause a denial of service (memory consumption or process termination) by using a certain large amount of memory.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4097.html">CVE-2011-4097</cve>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/727493">SUSE bug 727493</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4099</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-4099" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4099" source="CVE"/>
    <description>
    The capsh program in libcap before 2.22 does not change the current working directory when the --chroot option is specified, which allows local users to bypass the chroot restrictions via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4099.html">CVE-2011-4099</cve>
<bugzilla href="https://bugzilla.suse.com/727713">SUSE bug 727713</bugzilla>
<bugzilla href="https://bugzilla.suse.com/727715">SUSE bug 727715</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199001" comment="libcap-progs-2.11-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199002" comment="libcap2-2.11-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199003" comment="libcap2-32bit-2.11-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199004" comment="libcap2-x86-2.11-2.17 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4108</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-4108" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4108" source="CVE"/>
    <description>
    The DTLS implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f performs a MAC check only if certain padding is valid, which makes it easier for remote attackers to recover plaintext via a padding oracle attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4108.html">CVE-2011-4108</cve>
<bugzilla href="https://bugzilla.suse.com/739719">SUSE bug 739719</bugzilla>
<bugzilla href="https://bugzilla.suse.com/742821">SUSE bug 742821</bugzilla>
<bugzilla href="https://bugzilla.suse.com/758060">SUSE bug 758060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/778825">SUSE bug 778825</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199638" comment="libopenssl0_9_8-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199639" comment="libopenssl0_9_8-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199640" comment="libopenssl0_9_8-hmac-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199641" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199642" comment="libopenssl0_9_8-x86-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199643" comment="openssl-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199644" comment="openssl-doc-0.9.8j-0.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4109</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-4109" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4109" source="CVE"/>
    <description>
    Double free vulnerability in OpenSSL 0.9.8 before 0.9.8s, when X509_V_FLAG_POLICY_CHECK is enabled, allows remote attackers to have an unspecified impact by triggering failure of a policy check.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4109.html">CVE-2011-4109</cve>
<bugzilla href="https://bugzilla.suse.com/739719">SUSE bug 739719</bugzilla>
<bugzilla href="https://bugzilla.suse.com/758060">SUSE bug 758060</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199638" comment="libopenssl0_9_8-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199639" comment="libopenssl0_9_8-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199640" comment="libopenssl0_9_8-hmac-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199641" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199642" comment="libopenssl0_9_8-x86-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199643" comment="openssl-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199644" comment="openssl-doc-0.9.8j-0.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4127</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-4127" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4127" source="CVE"/>
    <description>
    The Linux kernel before 3.2.2 does not properly restrict SG_IO ioctl calls, which allows local users to bypass intended restrictions on disk read and write operations by sending a SCSI command to (1) a partition block device or (2) an LVM volume.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4127.html">CVE-2011-4127</cve>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/738400">SUSE bug 738400</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4128</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-4128" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4128" source="CVE"/>
    <description>
    Buffer overflow in the gnutls_session_get_data function in lib/gnutls_session.c in GnuTLS 2.12.x before 2.12.14 and 3.x before 3.0.7, when used on a client that performs nonstandard session resumption, allows remote TLS servers to cause a denial of service (application crash) via a large SessionTicket.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4128.html">CVE-2011-4128</cve>
<bugzilla href="https://bugzilla.suse.com/729486">SUSE bug 729486</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199478" comment="gnutls-2.4.1-24.39.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199479" comment="libgnutls-extra26-2.4.1-24.39.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199480" comment="libgnutls26-2.4.1-24.39.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199481" comment="libgnutls26-32bit-2.4.1-24.39.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199482" comment="libgnutls26-x86-2.4.1-24.39.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4131</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-4131" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4131" source="CVE"/>
    <description>
    The NFSv4 implementation in the Linux kernel before 3.2.2 does not properly handle bitmap sizes in GETACL replies, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4131.html">CVE-2011-4131</cve>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/730117">SUSE bug 730117</bugzilla>
<bugzilla href="https://bugzilla.suse.com/762992">SUSE bug 762992</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4153</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-4153" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4153" source="CVE"/>
    <description>
    PHP 5.3.8 does not always check the return value of the zend_strndup function, which might allow remote attackers to cause a denial of service (NULL pointer dereference and application crash) via crafted input to an application that performs strndup operations on untrusted string data, as demonstrated by the define function in zend_builtin_functions.c, and unspecified functions in ext/soap/php_sdl.c, ext/standard/syslog.c, ext/standard/browscap.c, ext/oci8/oci8.c, ext/com_dotnet/com_typeinfo.c, and main/php_open_temporary_file.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4153.html">CVE-2011-4153</cve>
<bugzilla href="https://bugzilla.suse.com/733590">SUSE bug 733590</bugzilla>
<bugzilla href="https://bugzilla.suse.com/736169">SUSE bug 736169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/738221">SUSE bug 738221</bugzilla>
<bugzilla href="https://bugzilla.suse.com/741520">SUSE bug 741520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/741859">SUSE bug 741859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/742273">SUSE bug 742273</bugzilla>
<bugzilla href="https://bugzilla.suse.com/742806">SUSE bug 742806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/743308">SUSE bug 743308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/744966">SUSE bug 744966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/746661">SUSE bug 746661</bugzilla>
<bugzilla href="https://bugzilla.suse.com/749111">SUSE bug 749111</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199294" comment="apache2-mod_php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199295" comment="php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199296" comment="php53-bcmath-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199297" comment="php53-bz2-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199298" comment="php53-calendar-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199299" comment="php53-ctype-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199300" comment="php53-curl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199301" comment="php53-dba-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199302" comment="php53-dom-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199303" comment="php53-exif-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199304" comment="php53-fastcgi-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199305" comment="php53-fileinfo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199306" comment="php53-ftp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199307" comment="php53-gd-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199308" comment="php53-gettext-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199309" comment="php53-gmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199310" comment="php53-iconv-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199311" comment="php53-intl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199312" comment="php53-json-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199313" comment="php53-ldap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199314" comment="php53-mbstring-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199315" comment="php53-mcrypt-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199316" comment="php53-mysql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199317" comment="php53-odbc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199318" comment="php53-openssl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199319" comment="php53-pcntl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199320" comment="php53-pdo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199321" comment="php53-pear-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199322" comment="php53-pgsql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199323" comment="php53-pspell-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199324" comment="php53-shmop-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199325" comment="php53-snmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199326" comment="php53-soap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199327" comment="php53-suhosin-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199328" comment="php53-sysvmsg-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199329" comment="php53-sysvsem-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199330" comment="php53-sysvshm-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199331" comment="php53-tokenizer-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199332" comment="php53-wddx-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199333" comment="php53-xmlreader-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199334" comment="php53-xmlrpc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199335" comment="php53-xmlwriter-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199336" comment="php53-xsl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199337" comment="php53-zip-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199338" comment="php53-zlib-5.3.17-0.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-4182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4182" source="CVE"/>
    <description>
    Missing escaping of ESSID values in sysconfig of SUSE Linux Enterprise allows attackers controlling an access point to cause execute arbitrary code. Affected releases are sysconfig prior to 0.83.7-2.1.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4182.html">CVE-2011-4182</cve>
<bugzilla href="https://bugzilla.suse.com/735394">SUSE bug 735394</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199788" comment="sysconfig-0.71.61-0.11 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4313</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-4313" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4313" source="CVE"/>
    <description>
    query.c in ISC BIND 9.0.x through 9.6.x, 9.4-ESV through 9.4-ESV-R5, 9.6-ESV through 9.6-ESV-R5, 9.7.0 through 9.7.4, 9.8.0 through 9.8.1, and 9.9.0a1 through 9.9.0b1 allows remote attackers to cause a denial of service (assertion failure and named exit) via unknown vectors related to recursive DNS queries, error logging, and the caching of an invalid record by the resolver.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4313.html">CVE-2011-4313</cve>
<bugzilla href="https://bugzilla.suse.com/730995">SUSE bug 730995</bugzilla>
<bugzilla href="https://bugzilla.suse.com/738156">SUSE bug 738156</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199364" comment="bind-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199365" comment="bind-chrootenv-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199366" comment="bind-doc-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199367" comment="bind-libs-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199368" comment="bind-libs-32bit-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199369" comment="bind-libs-x86-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199370" comment="bind-utils-9.6ESVR7P4-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4317</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-4317" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4317" source="CVE"/>
    <description>
    The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an @ (at sign) character and a : (colon) character in invalid positions.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4317.html">CVE-2011-4317</cve>
<bugzilla href="https://bugzilla.suse.com/722545">SUSE bug 722545</bugzilla>
<bugzilla href="https://bugzilla.suse.com/728876">SUSE bug 728876</bugzilla>
<bugzilla href="https://bugzilla.suse.com/729181">SUSE bug 729181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/791794">SUSE bug 791794</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199288" comment="apache2-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199289" comment="apache2-doc-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199290" comment="apache2-example-pages-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199291" comment="apache2-prefork-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199292" comment="apache2-utils-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199293" comment="apache2-worker-2.2.12-1.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4354</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-4354" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4354" source="CVE"/>
    <description>
    crypto/bn/bn_nist.c in OpenSSL before 0.9.8h on 32-bit platforms, as used in stunnel and other products, in certain circumstances involving ECDH or ECDHE cipher suites, uses an incorrect modular reduction algorithm in its implementation of the P-256 and P-384 NIST elliptic curves, which allows remote attackers to obtain the private key of a TLS server via multiple handshake attempts.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4354.html">CVE-2011-4354</cve>
<bugzilla href="https://bugzilla.suse.com/733252">SUSE bug 733252</bugzilla>
<bugzilla href="https://bugzilla.suse.com/808942">SUSE bug 808942</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199638" comment="libopenssl0_9_8-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199639" comment="libopenssl0_9_8-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199640" comment="libopenssl0_9_8-hmac-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199641" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199642" comment="libopenssl0_9_8-x86-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199643" comment="openssl-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199644" comment="openssl-doc-0.9.8j-0.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4388</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-4388" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4388" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2011.  Notes: none.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4388.html">CVE-2011-4388</cve>
<bugzilla href="https://bugzilla.suse.com/778003">SUSE bug 778003</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199294" comment="apache2-mod_php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199295" comment="php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199296" comment="php53-bcmath-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199297" comment="php53-bz2-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199298" comment="php53-calendar-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199299" comment="php53-ctype-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199300" comment="php53-curl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199301" comment="php53-dba-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199302" comment="php53-dom-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199303" comment="php53-exif-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199304" comment="php53-fastcgi-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199305" comment="php53-fileinfo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199306" comment="php53-ftp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199307" comment="php53-gd-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199308" comment="php53-gettext-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199309" comment="php53-gmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199310" comment="php53-iconv-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199311" comment="php53-intl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199312" comment="php53-json-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199313" comment="php53-ldap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199314" comment="php53-mbstring-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199315" comment="php53-mcrypt-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199316" comment="php53-mysql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199317" comment="php53-odbc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199318" comment="php53-openssl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199319" comment="php53-pcntl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199320" comment="php53-pdo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199321" comment="php53-pear-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199322" comment="php53-pgsql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199323" comment="php53-pspell-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199324" comment="php53-shmop-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199325" comment="php53-snmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199326" comment="php53-soap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199327" comment="php53-suhosin-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199328" comment="php53-sysvmsg-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199329" comment="php53-sysvsem-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199330" comment="php53-sysvshm-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199331" comment="php53-tokenizer-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199332" comment="php53-wddx-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199333" comment="php53-xmlreader-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199334" comment="php53-xmlrpc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199335" comment="php53-xmlwriter-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199336" comment="php53-xsl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199337" comment="php53-zip-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199338" comment="php53-zlib-5.3.17-0.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4405</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-4405" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4405" source="CVE"/>
    <description>
    The cupshelpers scripts in system-config-printer in Ubuntu 11.04 and 11.10, as used by the automatic printer driver download service, uses an "insecure connection" for queries to the OpenPrinting database, which allows remote attackers to execute arbitrary code via a man-in-the-middle (MITM) attack that modifies packages or repositories.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4405.html">CVE-2011-4405</cve>
<bugzilla href="https://bugzilla.suse.com/733542">SUSE bug 733542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/735322">SUSE bug 735322</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199792" comment="system-config-printer-1.0.8-9.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199793" comment="system-config-printer-lang-1.0.8-9.23 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4539</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-4539" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4539" source="CVE"/>
    <description>
    dhcpd in ISC DHCP 4.x before 4.2.3-P1 and 4.1-ESV before 4.1-ESV-R4 does not properly handle regular expressions in dhcpd.conf, which allows remote attackers to cause a denial of service (daemon crash) via a crafted request packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4539.html">CVE-2011-4539</cve>
<bugzilla href="https://bugzilla.suse.com/735610">SUSE bug 735610</bugzilla>
<bugzilla href="https://bugzilla.suse.com/741239">SUSE bug 741239</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199401" comment="dhcp-4.2.4.P2-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199402" comment="dhcp-client-4.2.4.P2-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199403" comment="dhcp-relay-4.2.4.P2-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199404" comment="dhcp-server-4.2.4.P2-0.16 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4566</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-4566" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4566" source="CVE"/>
    <description>
    Integer overflow in the exif_process_IFD_TAG function in exif.c in the exif extension in PHP 5.4.0beta2 on 32-bit platforms allows remote attackers to read the contents of arbitrary memory locations or cause a denial of service via a crafted offset_val value in an EXIF header in a JPEG file, a different vulnerability than CVE-2011-0708.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4566.html">CVE-2011-4566</cve>
<bugzilla href="https://bugzilla.suse.com/733590">SUSE bug 733590</bugzilla>
<bugzilla href="https://bugzilla.suse.com/736169">SUSE bug 736169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/738221">SUSE bug 738221</bugzilla>
<bugzilla href="https://bugzilla.suse.com/741520">SUSE bug 741520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/741859">SUSE bug 741859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/742273">SUSE bug 742273</bugzilla>
<bugzilla href="https://bugzilla.suse.com/742806">SUSE bug 742806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/743308">SUSE bug 743308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/744966">SUSE bug 744966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/746661">SUSE bug 746661</bugzilla>
<bugzilla href="https://bugzilla.suse.com/749111">SUSE bug 749111</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199294" comment="apache2-mod_php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199295" comment="php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199296" comment="php53-bcmath-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199297" comment="php53-bz2-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199298" comment="php53-calendar-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199299" comment="php53-ctype-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199300" comment="php53-curl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199301" comment="php53-dba-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199302" comment="php53-dom-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199303" comment="php53-exif-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199304" comment="php53-fastcgi-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199305" comment="php53-fileinfo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199306" comment="php53-ftp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199307" comment="php53-gd-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199308" comment="php53-gettext-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199309" comment="php53-gmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199310" comment="php53-iconv-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199311" comment="php53-intl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199312" comment="php53-json-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199313" comment="php53-ldap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199314" comment="php53-mbstring-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199315" comment="php53-mcrypt-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199316" comment="php53-mysql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199317" comment="php53-odbc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199318" comment="php53-openssl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199319" comment="php53-pcntl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199320" comment="php53-pdo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199321" comment="php53-pear-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199322" comment="php53-pgsql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199323" comment="php53-pspell-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199324" comment="php53-shmop-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199325" comment="php53-snmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199326" comment="php53-soap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199327" comment="php53-suhosin-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199328" comment="php53-sysvmsg-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199329" comment="php53-sysvsem-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199330" comment="php53-sysvshm-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199331" comment="php53-tokenizer-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199332" comment="php53-wddx-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199333" comment="php53-xmlreader-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199334" comment="php53-xmlrpc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199335" comment="php53-xmlwriter-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199336" comment="php53-xsl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199337" comment="php53-zip-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199338" comment="php53-zlib-5.3.17-0.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4576</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-4576" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4576" source="CVE"/>
    <description>
    The SSL 3.0 implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly initialize data structures for block cipher padding, which might allow remote attackers to obtain sensitive information by decrypting the padding data sent by an SSL peer.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4576.html">CVE-2011-4576</cve>
<bugzilla href="https://bugzilla.suse.com/739719">SUSE bug 739719</bugzilla>
<bugzilla href="https://bugzilla.suse.com/758060">SUSE bug 758060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/778825">SUSE bug 778825</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199638" comment="libopenssl0_9_8-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199639" comment="libopenssl0_9_8-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199640" comment="libopenssl0_9_8-hmac-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199641" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199642" comment="libopenssl0_9_8-x86-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199643" comment="openssl-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199644" comment="openssl-doc-0.9.8j-0.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4577</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-4577" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4577" source="CVE"/>
    <description>
    OpenSSL before 0.9.8s and 1.x before 1.0.0f, when RFC 3779 support is enabled, allows remote attackers to cause a denial of service (assertion failure) via an X.509 certificate containing certificate-extension data associated with (1) IP address blocks or (2) Autonomous System (AS) identifiers.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4577.html">CVE-2011-4577</cve>
<bugzilla href="https://bugzilla.suse.com/739719">SUSE bug 739719</bugzilla>
<bugzilla href="https://bugzilla.suse.com/758060">SUSE bug 758060</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199638" comment="libopenssl0_9_8-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199639" comment="libopenssl0_9_8-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199640" comment="libopenssl0_9_8-hmac-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199641" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199642" comment="libopenssl0_9_8-x86-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199643" comment="openssl-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199644" comment="openssl-doc-0.9.8j-0.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4578</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-4578" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4578" source="CVE"/>
    <description>
    event.c in acpid (aka acpid2) before 2.0.11 does not have an appropriate umask setting during execution of event-handler scripts, which might allow local users to (1) perform write operations within directories created by a script, or (2) read files created by a script, via standard filesystem system calls.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4578.html">CVE-2011-4578</cve>
<bugzilla href="https://bugzilla.suse.com/735282">SUSE bug 735282</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199285" comment="acpid-1.0.6-91.25 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4600</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-4600" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4600" source="CVE"/>
    <description>
    The networkReloadIptablesRules function in network/bridge_driver.c in libvirt before 0.9.9 does not properly handle firewall rules on bridge networks when libvirtd is restarted, which might allow remote attackers to bypass intended access restrictions via a (1) DNS or (2) DHCP query.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4600.html">CVE-2011-4600</cve>
<bugzilla href="https://bugzilla.suse.com/736082">SUSE bug 736082</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199692" comment="libvirt-1.0.5.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199693" comment="libvirt-client-1.0.5.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199694" comment="libvirt-client-32bit-1.0.5.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199695" comment="libvirt-doc-1.0.5.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199696" comment="libvirt-lock-sanlock-1.0.5.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199697" comment="libvirt-python-1.0.5.1-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4604</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-4604" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4604" source="CVE"/>
    <description>
    The bat_socket_read function in net/batman-adv/icmp_socket.c in the Linux kernel before 3.3 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted batman-adv ICMP packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4604.html">CVE-2011-4604</cve>
<bugzilla href="https://bugzilla.suse.com/736149">SUSE bug 736149</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4619</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-4619" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4619" source="CVE"/>
    <description>
    The Server Gated Cryptography (SGC) implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly handle handshake restarts, which allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4619.html">CVE-2011-4619</cve>
<bugzilla href="https://bugzilla.suse.com/739719">SUSE bug 739719</bugzilla>
<bugzilla href="https://bugzilla.suse.com/758060">SUSE bug 758060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/799454">SUSE bug 799454</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199638" comment="libopenssl0_9_8-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199639" comment="libopenssl0_9_8-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199640" comment="libopenssl0_9_8-hmac-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199641" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199642" comment="libopenssl0_9_8-x86-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199643" comment="openssl-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199644" comment="openssl-doc-0.9.8j-0.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4622</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-4622" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4622" source="CVE"/>
    <description>
    The create_pit_timer function in arch/x86/kvm/i8254.c in KVM 83, and possibly other versions, does not properly handle when Programmable Interval Timer (PIT) interrupt requests (IRQs) when a virtual interrupt controller (irqchip) is not available, which allows local users to cause a denial of service (NULL pointer dereference) by starting a timer.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4622.html">CVE-2011-4622</cve>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/738210">SUSE bug 738210</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-4815" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4815" source="CVE"/>
    <description>
    Ruby (aka CRuby) before 1.8.7-p357 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4815.html">CVE-2011-4815</cve>
<bugzilla href="https://bugzilla.suse.com/739122">SUSE bug 739122</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199778" comment="ruby-1.8.7.p357-0.9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199779" comment="ruby-doc-html-1.8.7.p357-0.9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199780" comment="ruby-tk-1.8.7.p357-0.9.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4862</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-4862" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4862" source="CVE"/>
    <description>
    Buffer overflow in libtelnet/encrypt.c in telnetd in FreeBSD 7.3 through 9.0, MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.2 and earlier, Heimdal 1.5.1 and earlier, GNU inetutils, and possibly other products allows remote attackers to execute arbitrary code via a long encryption key, as exploited in the wild in December 2011.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4862.html">CVE-2011-4862</cve>
<bugzilla href="https://bugzilla.suse.com/738632">SUSE bug 738632</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199544" comment="krb5-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199545" comment="krb5-32bit-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199546" comment="krb5-apps-clients-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199547" comment="krb5-apps-servers-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199548" comment="krb5-client-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199552" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199553" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199549" comment="krb5-server-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199550" comment="krb5-x86-1.6.3-133.49.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4868</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-4868" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4868" source="CVE"/>
    <description>
    The logging functionality in dhcpd in ISC DHCP before 4.2.3-P2, when using Dynamic DNS (DDNS) and issuing IPv6 addresses, does not properly handle the DHCPv6 lease structure, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via crafted packets related to a lease-status update.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4868.html">CVE-2011-4868</cve>
<bugzilla href="https://bugzilla.suse.com/741239">SUSE bug 741239</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199401" comment="dhcp-4.2.4.P2-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199402" comment="dhcp-client-4.2.4.P2-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199403" comment="dhcp-relay-4.2.4.P2-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199404" comment="dhcp-server-4.2.4.P2-0.16 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4885</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-4885" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4885" source="CVE"/>
    <description>
    PHP before 5.3.9 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4885.html">CVE-2011-4885</cve>
<bugzilla href="https://bugzilla.suse.com/733590">SUSE bug 733590</bugzilla>
<bugzilla href="https://bugzilla.suse.com/736169">SUSE bug 736169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/738221">SUSE bug 738221</bugzilla>
<bugzilla href="https://bugzilla.suse.com/741520">SUSE bug 741520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/741859">SUSE bug 741859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/742273">SUSE bug 742273</bugzilla>
<bugzilla href="https://bugzilla.suse.com/742806">SUSE bug 742806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/743308">SUSE bug 743308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/744966">SUSE bug 744966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/746661">SUSE bug 746661</bugzilla>
<bugzilla href="https://bugzilla.suse.com/749111">SUSE bug 749111</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199294" comment="apache2-mod_php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199295" comment="php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199296" comment="php53-bcmath-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199297" comment="php53-bz2-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199298" comment="php53-calendar-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199299" comment="php53-ctype-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199300" comment="php53-curl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199301" comment="php53-dba-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199302" comment="php53-dom-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199303" comment="php53-exif-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199304" comment="php53-fastcgi-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199305" comment="php53-fileinfo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199306" comment="php53-ftp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199307" comment="php53-gd-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199308" comment="php53-gettext-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199309" comment="php53-gmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199310" comment="php53-iconv-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199311" comment="php53-intl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199312" comment="php53-json-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199313" comment="php53-ldap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199314" comment="php53-mbstring-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199315" comment="php53-mcrypt-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199316" comment="php53-mysql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199317" comment="php53-odbc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199318" comment="php53-openssl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199319" comment="php53-pcntl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199320" comment="php53-pdo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199321" comment="php53-pear-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199322" comment="php53-pgsql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199323" comment="php53-pspell-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199324" comment="php53-shmop-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199325" comment="php53-snmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199326" comment="php53-soap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199327" comment="php53-suhosin-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199328" comment="php53-sysvmsg-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199329" comment="php53-sysvsem-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199330" comment="php53-sysvshm-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199331" comment="php53-tokenizer-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199332" comment="php53-wddx-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199333" comment="php53-xmlreader-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199334" comment="php53-xmlrpc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199335" comment="php53-xmlwriter-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199336" comment="php53-xsl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199337" comment="php53-zip-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199338" comment="php53-zlib-5.3.17-0.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4944</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-4944" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4944" source="CVE"/>
    <description>
    Python 2.6 through 3.2 creates ~/.pypirc with world-readable permissions before changing them after data has been written, which introduces a race condition that allows local users to obtain a username and password by reading this file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4944.html">CVE-2011-4944</cve>
<bugzilla href="https://bugzilla.suse.com/754447">SUSE bug 754447</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199659" comment="libpython2_6-1_0-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199660" comment="libpython2_6-1_0-32bit-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199661" comment="libpython2_6-1_0-x86-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199662" comment="python-base-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199663" comment="python-base-32bit-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199664" comment="python-base-x86-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199665" comment="python-xml-2.6.8-0.15 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4966</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-4966" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4966" source="CVE"/>
    <description>
    modules/rlm_unix/rlm_unix.c in FreeRADIUS before 2.2.0, when unix mode is enabled for user authentication, does not properly check the password expiration in /etc/shadow, which allows remote authenticated users to authenticate using an expired password.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4966.html">CVE-2011-4966</cve>
<bugzilla href="https://bugzilla.suse.com/797313">SUSE bug 797313</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199425" comment="freeradius-server-2.1.1-7.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199426" comment="freeradius-server-dialupadmin-2.1.1-7.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199427" comment="freeradius-server-doc-2.1.1-7.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199428" comment="freeradius-server-libs-2.1.1-7.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199429" comment="freeradius-server-utils-2.1.1-7.16 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20115000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-5000</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-5000" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5000" source="CVE"/>
    <description>
    The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain length field.  NOTE: there may be limited scenarios in which this issue is relevant.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-5000.html">CVE-2011-5000</cve>
<bugzilla href="https://bugzilla.suse.com/755505">SUSE bug 755505</bugzilla>
<bugzilla href="https://bugzilla.suse.com/756370">SUSE bug 756370</bugzilla>
<bugzilla href="https://bugzilla.suse.com/826672">SUSE bug 826672</bugzilla>
<bugzilla href="https://bugzilla.suse.com/881234">SUSE bug 881234</bugzilla>
<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199733" comment="openssh-6.2p2-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199734" comment="openssh-askpass-6.2p2-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20115062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-5062</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-5062" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5062" source="CVE"/>
    <description>
    The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 does not check qop values, which might allow remote attackers to bypass intended integrity-protection requirements via a qop=auth value, a different vulnerability than CVE-2011-1184.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-5062.html">CVE-2011-5062</cve>
<bugzilla href="https://bugzilla.suse.com/735343">SUSE bug 735343</bugzilla>
<bugzilla href="https://bugzilla.suse.com/741533">SUSE bug 741533</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199802" comment="tomcat6-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199803" comment="tomcat6-admin-webapps-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199804" comment="tomcat6-docs-webapp-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199805" comment="tomcat6-javadoc-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199806" comment="tomcat6-jsp-2_1-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199807" comment="tomcat6-lib-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199808" comment="tomcat6-servlet-2_5-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199809" comment="tomcat6-webapps-6.0.18-20.35.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20115063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-5063</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-5063" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5063" source="CVE"/>
    <description>
    The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 does not check realm values, which might allow remote attackers to bypass intended access restrictions by leveraging the availability of a protection space with weaker authentication or authorization requirements, a different vulnerability than CVE-2011-1184.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-5063.html">CVE-2011-5063</cve>
<bugzilla href="https://bugzilla.suse.com/735343">SUSE bug 735343</bugzilla>
<bugzilla href="https://bugzilla.suse.com/741530">SUSE bug 741530</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199802" comment="tomcat6-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199803" comment="tomcat6-admin-webapps-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199804" comment="tomcat6-docs-webapp-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199805" comment="tomcat6-javadoc-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199806" comment="tomcat6-jsp-2_1-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199807" comment="tomcat6-lib-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199808" comment="tomcat6-servlet-2_5-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199809" comment="tomcat6-webapps-6.0.18-20.35.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20115064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-5064</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-5064" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5064" source="CVE"/>
    <description>
    DigestAuthenticator.java in the HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 uses Catalina as the hard-coded server secret (aka private key), which makes it easier for remote attackers to bypass cryptographic protection mechanisms by leveraging knowledge of this string, a different vulnerability than CVE-2011-1184.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-5064.html">CVE-2011-5064</cve>
<bugzilla href="https://bugzilla.suse.com/735343">SUSE bug 735343</bugzilla>
<bugzilla href="https://bugzilla.suse.com/741531">SUSE bug 741531</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199802" comment="tomcat6-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199803" comment="tomcat6-admin-webapps-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199804" comment="tomcat6-docs-webapp-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199805" comment="tomcat6-javadoc-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199806" comment="tomcat6-jsp-2_1-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199807" comment="tomcat6-lib-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199808" comment="tomcat6-servlet-2_5-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199809" comment="tomcat6-webapps-6.0.18-20.35.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20115095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-5095</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2011-5095" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5095" source="CVE"/>
    <description>
    The Diffie-Hellman key-exchange implementation in OpenSSL 0.9.8, when FIPS mode is enabled, does not properly validate a public parameter, which makes it easier for man-in-the-middle attackers to obtain the shared secret key by modifying network traffic, a related issue to CVE-2011-1923.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-5095.html">CVE-2011-5095</cve>
<bugzilla href="https://bugzilla.suse.com/768097">SUSE bug 768097</bugzilla>
<bugzilla href="https://bugzilla.suse.com/773908">SUSE bug 773908</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199638" comment="libopenssl0_9_8-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199639" comment="libopenssl0_9_8-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199640" comment="libopenssl0_9_8-hmac-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199641" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199642" comment="libopenssl0_9_8-x86-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199643" comment="openssl-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199644" comment="openssl-doc-0.9.8j-0.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20115174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-5174</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2011-5174" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5174" source="CVE"/>
    <description>
    Buffer overflow in Intel Trusted Execution Technology (TXT) SINIT Authenticated Code Modules (ACM) in Intel Q67 Express, C202, C204, C206 Chipsets, and Mobile Intel QM67, and QS67 Chipset before 2nd_gen_i5_i7_SINIT_51.BIN Express; Intel Q57, 3450 Chipsets and Mobile Intel QM57 and QS57 Express Chipset before i5_i7_DUAL_SINIT_51.BIN and i7_QUAD_SINIT_51.BIN; Mobile Intel GM45, GS45, and PM45 Express Chipset before GM45_GS45_PM45_SINIT_51.BIN; Intel Q35 Express Chipsets before Q35_SINIT_51.BIN; and Intel 5520, 5500, X58, and 7500 Chipsets before SINIT ACM 1.1 allows local users to bypass the Trusted Execution Technology protection mechanism and perform other unspecified SINIT ACM functions via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-5174.html">CVE-2011-5174</cve>
<bugzilla href="https://bugzilla.suse.com/1069754">SUSE bug 1069754</bugzilla>
<bugzilla href="https://bugzilla.suse.com/736671">SUSE bug 736671</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209363" comment="intel-SINIT-1-0.81.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0021</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2012-0021" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0021" source="CVE"/>
    <description>
    The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server 2.2.17 through 2.2.21, when a threaded MPM is used, does not properly handle a %{}C format string, which allows remote attackers to cause a denial of service (daemon crash) via a cookie that lacks both a name and a value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0021.html">CVE-2012-0021</cve>
<bugzilla href="https://bugzilla.suse.com/1078450">SUSE bug 1078450</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1095150">SUSE bug 1095150</bugzilla>
<bugzilla href="https://bugzilla.suse.com/743744">SUSE bug 743744</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202407" comment="apache2-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202408" comment="apache2-devel-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202409" comment="apache2-doc-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202410" comment="apache2-example-pages-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202411" comment="apache2-prefork-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202412" comment="apache2-utils-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202413" comment="apache2-worker-2.2.34-70.12 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202407" comment="apache2-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202409" comment="apache2-doc-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202410" comment="apache2-example-pages-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202411" comment="apache2-prefork-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202412" comment="apache2-utils-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202413" comment="apache2-worker-2.2.34-70.12 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0022</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2012-0022" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0022" source="CVE"/>
    <description>
    Apache Tomcat 5.5.x before 5.5.35, 6.x before 6.0.34, and 7.x before 7.0.23 uses an inefficient approach for handling parameters, which allows remote attackers to cause a denial of service (CPU consumption) via a request that contains many parameters and parameter values, a different vulnerability than CVE-2011-4858.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0022.html">CVE-2012-0022</cve>
<bugzilla href="https://bugzilla.suse.com/742477">SUSE bug 742477</bugzilla>
<bugzilla href="https://bugzilla.suse.com/745056">SUSE bug 745056</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208245" comment="tomcat6-6.0.18-20.35.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208246" comment="tomcat6-admin-webapps-6.0.18-20.35.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208247" comment="tomcat6-docs-webapp-6.0.18-20.35.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208248" comment="tomcat6-javadoc-6.0.18-20.35.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208249" comment="tomcat6-jsp-2_1-api-6.0.18-20.35.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208250" comment="tomcat6-lib-6.0.18-20.35.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208251" comment="tomcat6-servlet-2_5-api-6.0.18-20.35.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208252" comment="tomcat6-webapps-6.0.18-20.35.42 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0029</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0029" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0029" source="CVE"/>
    <description>
    Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0029.html">CVE-2012-0029</cve>
<bugzilla href="https://bugzilla.suse.com/740165">SUSE bug 740165</bugzilla>
<bugzilla href="https://bugzilla.suse.com/747331">SUSE bug 747331</bugzilla>
<bugzilla href="https://bugzilla.suse.com/757537">SUSE bug 757537</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199814" comment="xen-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199815" comment="xen-doc-html-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199816" comment="xen-doc-pdf-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199817" comment="xen-kmp-default-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199818" comment="xen-kmp-pae-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199819" comment="xen-libs-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199820" comment="xen-libs-32bit-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199821" comment="xen-tools-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199822" comment="xen-tools-domU-4.2.2_04-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0031</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0031" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0031" source="CVE"/>
    <description>
    scoreboard.c in the Apache HTTP Server 2.2.21 and earlier might allow local users to cause a denial of service (daemon crash during shutdown) or possibly have unspecified other impact by modifying a certain type field within a scoreboard shared memory segment, leading to an invalid call to the free function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0031.html">CVE-2012-0031</cve>
<bugzilla href="https://bugzilla.suse.com/741243">SUSE bug 741243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/806721">SUSE bug 806721</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199288" comment="apache2-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199289" comment="apache2-doc-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199290" comment="apache2-example-pages-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199291" comment="apache2-prefork-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199292" comment="apache2-utils-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199293" comment="apache2-worker-2.2.12-1.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0038</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0038" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0038" source="CVE"/>
    <description>
    Integer overflow in the xfs_acl_from_disk function in fs/xfs/xfs_acl.c in the Linux kernel before 3.1.9 allows local users to cause a denial of service (panic) via a filesystem with a malformed ACL, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0038.html">CVE-2012-0038</cve>
<bugzilla href="https://bugzilla.suse.com/740703">SUSE bug 740703</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0045</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0045" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0045" source="CVE"/>
    <description>
    The em_syscall function in arch/x86/kvm/emulate.c in the KVM implementation in the Linux kernel before 3.2.14 does not properly handle the 0f05 (aka syscall) opcode, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application, as demonstrated by an NASM file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0045.html">CVE-2012-0045</cve>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/740969">SUSE bug 740969</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0050</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0050" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0050" source="CVE"/>
    <description>
    OpenSSL 0.9.8s and 1.0.0f does not properly support DTLS applications, which allows remote attackers to cause a denial of service (crash) via unspecified vectors related to an out-of-bounds read.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-4108.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0050.html">CVE-2012-0050</cve>
<bugzilla href="https://bugzilla.suse.com/739719">SUSE bug 739719</bugzilla>
<bugzilla href="https://bugzilla.suse.com/742821">SUSE bug 742821</bugzilla>
<bugzilla href="https://bugzilla.suse.com/758060">SUSE bug 758060</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199638" comment="libopenssl0_9_8-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199639" comment="libopenssl0_9_8-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199640" comment="libopenssl0_9_8-hmac-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199641" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199642" comment="libopenssl0_9_8-x86-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199643" comment="openssl-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199644" comment="openssl-doc-0.9.8j-0.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0053</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0053" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0053" source="CVE"/>
    <description>
    protocol.c in the Apache HTTP Server 2.2.x through 2.2.21 does not properly restrict header information during construction of Bad Request (aka 400) error documents, which allows remote attackers to obtain the values of HTTPOnly cookies via vectors involving a (1) long or (2) malformed header in conjunction with crafted web script.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0053.html">CVE-2012-0053</cve>
<bugzilla href="https://bugzilla.suse.com/743743">SUSE bug 743743</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199288" comment="apache2-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199289" comment="apache2-doc-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199290" comment="apache2-example-pages-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199291" comment="apache2-prefork-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199292" comment="apache2-utils-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199293" comment="apache2-worker-2.2.12-1.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0056</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0056" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0056" source="CVE"/>
    <description>
    The mem_write function in the Linux kernel before 3.2.2, when ASLR is disabled, does not properly check permissions when writing to /proc/&lt;pid&gt;/mem, which allows local users to gain privileges by modifying process memory, as demonstrated by Mempodipper.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0056.html">CVE-2012-0056</cve>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/742028">SUSE bug 742028</bugzilla>
<bugzilla href="https://bugzilla.suse.com/742279">SUSE bug 742279</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0057</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0057" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0057" source="CVE"/>
    <description>
    PHP before 5.3.9 has improper libxslt security settings, which allows remote attackers to create arbitrary files via a crafted XSLT stylesheet that uses the libxslt output extension.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0057.html">CVE-2012-0057</cve>
<bugzilla href="https://bugzilla.suse.com/733590">SUSE bug 733590</bugzilla>
<bugzilla href="https://bugzilla.suse.com/736169">SUSE bug 736169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/738221">SUSE bug 738221</bugzilla>
<bugzilla href="https://bugzilla.suse.com/741520">SUSE bug 741520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/741859">SUSE bug 741859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/742273">SUSE bug 742273</bugzilla>
<bugzilla href="https://bugzilla.suse.com/742806">SUSE bug 742806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/743308">SUSE bug 743308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/744966">SUSE bug 744966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/746661">SUSE bug 746661</bugzilla>
<bugzilla href="https://bugzilla.suse.com/749111">SUSE bug 749111</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199294" comment="apache2-mod_php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199295" comment="php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199296" comment="php53-bcmath-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199297" comment="php53-bz2-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199298" comment="php53-calendar-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199299" comment="php53-ctype-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199300" comment="php53-curl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199301" comment="php53-dba-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199302" comment="php53-dom-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199303" comment="php53-exif-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199304" comment="php53-fastcgi-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199305" comment="php53-fileinfo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199306" comment="php53-ftp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199307" comment="php53-gd-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199308" comment="php53-gettext-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199309" comment="php53-gmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199310" comment="php53-iconv-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199311" comment="php53-intl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199312" comment="php53-json-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199313" comment="php53-ldap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199314" comment="php53-mbstring-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199315" comment="php53-mcrypt-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199316" comment="php53-mysql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199317" comment="php53-odbc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199318" comment="php53-openssl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199319" comment="php53-pcntl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199320" comment="php53-pdo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199321" comment="php53-pear-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199322" comment="php53-pgsql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199323" comment="php53-pspell-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199324" comment="php53-shmop-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199325" comment="php53-snmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199326" comment="php53-soap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199327" comment="php53-suhosin-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199328" comment="php53-sysvmsg-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199329" comment="php53-sysvsem-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199330" comment="php53-sysvshm-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199331" comment="php53-tokenizer-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199332" comment="php53-wddx-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199333" comment="php53-xmlreader-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199334" comment="php53-xmlrpc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199335" comment="php53-xmlwriter-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199336" comment="php53-xsl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199337" comment="php53-zip-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199338" comment="php53-zlib-5.3.17-0.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0207</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0207" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0207" source="CVE"/>
    <description>
    The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0207.html">CVE-2012-0207</cve>
<bugzilla href="https://bugzilla.suse.com/740448">SUSE bug 740448</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0217</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0217" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0217" source="CVE"/>
    <description>
    The x86-64 kernel system-call functionality in Xen 4.1.2 and earlier, as used in Citrix XenServer 6.0.2 and earlier and other products; Oracle Solaris 11 and earlier; illumos before r13724; Joyent SmartOS before 20120614T184600Z; FreeBSD before 9.0-RELEASE-p3; NetBSD 6.0 Beta and earlier; Microsoft Windows Server 2008 R2 and R2 SP1 and Windows 7 Gold and SP1; and possibly other operating systems, when running on an Intel processor, incorrectly uses the sysret path in cases where a certain address is not a canonical address, which allows local users to gain privileges via a crafted application.  NOTE: because this issue is due to incorrect use of the Intel specification, it should have been split into separate identifiers; however, there was some value in preserving the original mapping of the multi-codebase coordinated-disclosure effort to a single identifier.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0217.html">CVE-2012-0217</cve>
<bugzilla href="https://bugzilla.suse.com/757537">SUSE bug 757537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/764077">SUSE bug 764077</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199814" comment="xen-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199815" comment="xen-doc-html-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199816" comment="xen-doc-pdf-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199817" comment="xen-kmp-default-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199818" comment="xen-kmp-pae-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199819" comment="xen-libs-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199820" comment="xen-libs-32bit-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199821" comment="xen-tools-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199822" comment="xen-tools-domU-4.2.2_04-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0219</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0219" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0219" source="CVE"/>
    <description>
    Heap-based buffer overflow in the xioscan_readline function in xio-readline.c in socat 1.4.0.0 through 1.7.2.0 and 2.0.0-b1 through 2.0.0-b4 allows local users to execute arbitrary code via the READLINE address.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0219.html">CVE-2012-0219</cve>
<bugzilla href="https://bugzilla.suse.com/759859">SUSE bug 759859</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199782" comment="socat-1.7.0.0-1.16 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0247</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0247" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0247" source="CVE"/>
    <description>
    ImageMagick 6.7.5-7 and earlier allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via crafted offset and count values in the ResolutionUnit tag in the EXIF IFD0 of an image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0247.html">CVE-2012-0247</cve>
<bugzilla href="https://bugzilla.suse.com/746880">SUSE bug 746880</bugzilla>
<bugzilla href="https://bugzilla.suse.com/752879">SUSE bug 752879</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199580" comment="libMagickCore1-6.4.3.6-7.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199581" comment="libMagickCore1-32bit-6.4.3.6-7.26 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0248</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0248" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0248" source="CVE"/>
    <description>
    ImageMagick 6.7.5-7 and earlier allows remote attackers to cause a denial of service (infinite loop and hang) via a crafted image whose IFD contains IOP tags that all reference the beginning of the IDF.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0248.html">CVE-2012-0248</cve>
<bugzilla href="https://bugzilla.suse.com/746880">SUSE bug 746880</bugzilla>
<bugzilla href="https://bugzilla.suse.com/752879">SUSE bug 752879</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199580" comment="libMagickCore1-6.4.3.6-7.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199581" comment="libMagickCore1-32bit-6.4.3.6-7.26 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120259" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0259</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0259" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0259" source="CVE"/>
    <description>
    The GetEXIFProperty function in magick/property.c in ImageMagick before 6.7.6-3 allows remote attackers to cause a denial of service (crash) via a zero value in the component count of an EXIF XResolution tag in a JPEG file, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0259.html">CVE-2012-0259</cve>
<bugzilla href="https://bugzilla.suse.com/754749">SUSE bug 754749</bugzilla>
<bugzilla href="https://bugzilla.suse.com/758512">SUSE bug 758512</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199580" comment="libMagickCore1-6.4.3.6-7.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199581" comment="libMagickCore1-32bit-6.4.3.6-7.26 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120260" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0260</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0260" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0260" source="CVE"/>
    <description>
    The JPEGWarningHandler function in coders/jpeg.c in ImageMagick before 6.7.6-3 allows remote attackers to cause a denial of service (memory consumption) via a JPEG image with a crafted sequence of restart markers.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0260.html">CVE-2012-0260</cve>
<bugzilla href="https://bugzilla.suse.com/754749">SUSE bug 754749</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199580" comment="libMagickCore1-6.4.3.6-7.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199581" comment="libMagickCore1-32bit-6.4.3.6-7.26 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0390</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0390" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0390" source="CVE"/>
    <description>
    The DTLS implementation in GnuTLS 3.0.10 and earlier executes certain error-handling code only if there is a specific relationship between a padding length and the ciphertext size, which makes it easier for remote attackers to recover partial plaintext via a timing side-channel attack, a related issue to CVE-2011-4108.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0390.html">CVE-2012-0390</cve>
<bugzilla href="https://bugzilla.suse.com/739898">SUSE bug 739898</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199478" comment="gnutls-2.4.1-24.39.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199479" comment="libgnutls-extra26-2.4.1-24.39.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199480" comment="libgnutls26-2.4.1-24.39.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199481" comment="libgnutls26-32bit-2.4.1-24.39.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199482" comment="libgnutls26-x86-2.4.1-24.39.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0441</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0441" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0441" source="CVE"/>
    <description>
    The ASN.1 decoder in the QuickDER decoder in Mozilla Network Security Services (NSS) before 3.13.4, as used in Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10, allows remote attackers to cause a denial of service (application crash) via a zero-length item, as demonstrated by (1) a zero-length basic constraint or (2) a zero-length field in an OCSP response.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0441.html">CVE-2012-0441</cve>
<bugzilla href="https://bugzilla.suse.com/765204">SUSE bug 765204</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0442</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0442" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0442" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.26 and 4.x through 9.0, Thunderbird before 3.1.18 and 5.0 through 9.0, and SeaMonkey before 2.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0442.html">CVE-2012-0442</cve>
<bugzilla href="https://bugzilla.suse.com/744275">SUSE bug 744275</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0443</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0443" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0443" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 9.0, Thunderbird 5.0 through 9.0, and SeaMonkey before 2.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0443.html">CVE-2012-0443</cve>
<bugzilla href="https://bugzilla.suse.com/744275">SUSE bug 744275</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0444</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0444" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0444" source="CVE"/>
    <description>
    Mozilla Firefox before 3.6.26 and 4.x through 9.0, Thunderbird before 3.1.18 and 5.0 through 9.0, and SeaMonkey before 2.7 do not properly initialize nsChildView data structures, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted Ogg Vorbis file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0444.html">CVE-2012-0444</cve>
<bugzilla href="https://bugzilla.suse.com/744275">SUSE bug 744275</bugzilla>
<bugzilla href="https://bugzilla.suse.com/747912">SUSE bug 747912</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199698" comment="libvorbis-1.2.0-79.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199699" comment="libvorbis-32bit-1.2.0-79.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199700" comment="libvorbis-doc-1.2.0-79.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199701" comment="libvorbis-x86-1.2.0-79.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0449</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0449" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0449" source="CVE"/>
    <description>
    Mozilla Firefox before 3.6.26 and 4.x through 9.0, Thunderbird before 3.1.18 and 5.0 through 9.0, and SeaMonkey before 2.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a malformed XSLT stylesheet that is embedded in a document.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0449.html">CVE-2012-0449</cve>
<bugzilla href="https://bugzilla.suse.com/744275">SUSE bug 744275</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199712" comment="mozilla-xulrunner192-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199713" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199714" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199715" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199716" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0452</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0452" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0452" source="CVE"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox 10.x before 10.0.1, Thunderbird 10.x before 10.0.1, and SeaMonkey 2.7 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger failure of an nsXBLDocumentInfo::ReadPrototypeBindings function call, related to the cycle collector's access to a hash table containing a stale XBL binding.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0452.html">CVE-2012-0452</cve>
<bugzilla href="https://bugzilla.suse.com/746616">SUSE bug 746616</bugzilla>
<bugzilla href="https://bugzilla.suse.com/746663">SUSE bug 746663</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0467</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0467" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0467" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0467.html">CVE-2012-0467</cve>
<bugzilla href="https://bugzilla.suse.com/758408">SUSE bug 758408</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0468</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0468" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0468" source="CVE"/>
    <description>
    The browser engine in Mozilla Firefox 4.x through 11.0, Thunderbird 5.0 through 11.0, and SeaMonkey before 2.9 allows remote attackers to cause a denial of service (assertion failure and memory corruption) or possibly execute arbitrary code via vectors related to jsval.h and the js::array_shift function.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0468.html">CVE-2012-0468</cve>
<bugzilla href="https://bugzilla.suse.com/758408">SUSE bug 758408</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0469</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0469" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0469" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozilla::dom::indexedDB::IDBKeyRange::cycleCollection::Trace function in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allows remote attackers to execute arbitrary code via vectors related to crafted IndexedDB data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0469.html">CVE-2012-0469</cve>
<bugzilla href="https://bugzilla.suse.com/758408">SUSE bug 758408</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0470</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0470" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0470" source="CVE"/>
    <description>
    Heap-based buffer overflow in the nsSVGFEDiffuseLightingElement::LightPixel function in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allows remote attackers to cause a denial of service (invalid gfxImageSurface free operation) or possibly execute arbitrary code by leveraging the use of "different number systems."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0470.html">CVE-2012-0470</cve>
<bugzilla href="https://bugzilla.suse.com/758408">SUSE bug 758408</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0471</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0471" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0471" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allows remote attackers to inject arbitrary web script or HTML via a multibyte character set.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0471.html">CVE-2012-0471</cve>
<bugzilla href="https://bugzilla.suse.com/758408">SUSE bug 758408</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0472</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0472" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0472" source="CVE"/>
    <description>
    The cairo-dwrite implementation in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9, when certain Windows Vista and Windows 7 configurations are used, does not properly restrict font-rendering attempts, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0472.html">CVE-2012-0472</cve>
<bugzilla href="https://bugzilla.suse.com/758408">SUSE bug 758408</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0473</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0473" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0473" source="CVE"/>
    <description>
    The WebGLBuffer::FindMaxUshortElement function in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 calls the FindMaxElementInSubArray function with incorrect template arguments, which allows remote attackers to obtain sensitive information from video memory via a crafted WebGL.drawElements call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0473.html">CVE-2012-0473</cve>
<bugzilla href="https://bugzilla.suse.com/758408">SUSE bug 758408</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0474</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0474" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0474" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the docshell implementation in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allows remote attackers to inject arbitrary web script or HTML via vectors related to short-circuited page loads, aka "Universal XSS (UXSS)."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0474.html">CVE-2012-0474</cve>
<bugzilla href="https://bugzilla.suse.com/758408">SUSE bug 758408</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0477</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0477" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0477" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allow remote attackers to inject arbitrary web script or HTML via the (1) ISO-2022-KR or (2) ISO-2022-CN character set.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0477.html">CVE-2012-0477</cve>
<bugzilla href="https://bugzilla.suse.com/758408">SUSE bug 758408</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0478</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0478" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0478" source="CVE"/>
    <description>
    The texImage2D implementation in the WebGL subsystem in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 does not properly restrict JSVAL_TO_OBJECT casts, which might allow remote attackers to execute arbitrary code via a crafted web page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0478.html">CVE-2012-0478</cve>
<bugzilla href="https://bugzilla.suse.com/758408">SUSE bug 758408</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0479</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0479" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0479" source="CVE"/>
    <description>
    Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allow remote attackers to spoof the address bar via an https URL for invalid (1) RSS or (2) Atom XML content.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0479.html">CVE-2012-0479</cve>
<bugzilla href="https://bugzilla.suse.com/758408">SUSE bug 758408</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0547" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier, and 6 Update 34 and earlier, has no impact and remote attack vectors involving AWT and "a security-in-depth issue that is not directly exploitable but which can be used to aggravate security vulnerabilities that can be directly exploited." NOTE: this identifier was assigned by the Oracle CNA, but CVE is not intended to cover defense-in-depth issues that are only exposed by the presence of other vulnerabilities.  NOTE: Oracle has not commented on claims from a downstream vendor that this issue is related to "toolkit internals references."
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0547.html">CVE-2012-0547</cve>
<bugzilla href="https://bugzilla.suse.com/777499">SUSE bug 777499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/780897">SUSE bug 780897</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0551</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0551" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0551" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE 7 update 4 and earlier and 6 update 32 and earlier, and the GlassFish Enterprise Server component in Oracle Sun Products Suite GlassFish Enterprise Server 3.1.1, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Web Container or Deployment.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0551.html">CVE-2012-0551</cve>
<bugzilla href="https://bugzilla.suse.com/778629">SUSE bug 778629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/780897">SUSE bug 780897</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0698</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0698" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0698" source="CVE"/>
    <description>
    tcsd in TrouSerS before 0.3.10 allows remote attackers to cause a denial of service (daemon crash) via a crafted type_offset value in a TCP packet to port 30003.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0698.html">CVE-2012-0698</cve>
<bugzilla href="https://bugzilla.suse.com/791029">SUSE bug 791029</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199684" comment="libtspi1-0.3.10-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199685" comment="libtspi1-32bit-0.3.10-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199686" comment="libtspi1-x86-0.3.10-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199687" comment="trousers-0.3.10-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0759</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0759" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0759" source="CVE"/>
    <description>
    Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0771.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0759.html">CVE-2012-0759</cve>
<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0781</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0781" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0781" source="CVE"/>
    <description>
    The tidy_diagnose function in PHP 5.3.8 might allow remote attackers to cause a denial of service (NULL pointer dereference and application crash) via crafted input to an application that attempts to perform Tidy::diagnose operations on invalid objects, a different vulnerability than CVE-2011-4153.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0781.html">CVE-2012-0781</cve>
<bugzilla href="https://bugzilla.suse.com/733590">SUSE bug 733590</bugzilla>
<bugzilla href="https://bugzilla.suse.com/736169">SUSE bug 736169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/738221">SUSE bug 738221</bugzilla>
<bugzilla href="https://bugzilla.suse.com/741520">SUSE bug 741520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/741859">SUSE bug 741859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/742273">SUSE bug 742273</bugzilla>
<bugzilla href="https://bugzilla.suse.com/742806">SUSE bug 742806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/743308">SUSE bug 743308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/744966">SUSE bug 744966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/746661">SUSE bug 746661</bugzilla>
<bugzilla href="https://bugzilla.suse.com/749111">SUSE bug 749111</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199294" comment="apache2-mod_php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199295" comment="php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199296" comment="php53-bcmath-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199297" comment="php53-bz2-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199298" comment="php53-calendar-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199299" comment="php53-ctype-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199300" comment="php53-curl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199301" comment="php53-dba-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199302" comment="php53-dom-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199303" comment="php53-exif-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199304" comment="php53-fastcgi-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199305" comment="php53-fileinfo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199306" comment="php53-ftp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199307" comment="php53-gd-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199308" comment="php53-gettext-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199309" comment="php53-gmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199310" comment="php53-iconv-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199311" comment="php53-intl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199312" comment="php53-json-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199313" comment="php53-ldap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199314" comment="php53-mbstring-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199315" comment="php53-mcrypt-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199316" comment="php53-mysql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199317" comment="php53-odbc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199318" comment="php53-openssl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199319" comment="php53-pcntl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199320" comment="php53-pdo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199321" comment="php53-pear-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199322" comment="php53-pgsql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199323" comment="php53-pspell-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199324" comment="php53-shmop-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199325" comment="php53-snmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199326" comment="php53-soap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199327" comment="php53-suhosin-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199328" comment="php53-sysvmsg-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199329" comment="php53-sysvsem-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199330" comment="php53-sysvshm-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199331" comment="php53-tokenizer-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199332" comment="php53-wddx-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199333" comment="php53-xmlreader-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199334" comment="php53-xmlrpc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199335" comment="php53-xmlwriter-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199336" comment="php53-xsl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199337" comment="php53-zip-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199338" comment="php53-zlib-5.3.17-0.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0786</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2012-0786" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0786" source="CVE"/>
    <description>
    The transform_save function in transform.c in Augeas before 1.0.0 allows local users to overwrite arbitrary files and obtain sensitive information via a symlink attack on a .augnew file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0786.html">CVE-2012-0786</cve>
<bugzilla href="https://bugzilla.suse.com/853044">SUSE bug 853044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/885003">SUSE bug 885003</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199910" comment="augeas-0.9.0-3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199911" comment="augeas-lenses-0.9.0-3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199912" comment="libaugeas0-0.9.0-3.15 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0788</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0788" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0788" source="CVE"/>
    <description>
    The PDORow implementation in PHP before 5.3.9 does not properly interact with the session feature, which allows remote attackers to cause a denial of service (application crash) via a crafted application that uses a PDO driver for a fetch and then calls the session_start function, as demonstrated by a crash of the Apache HTTP Server.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0788.html">CVE-2012-0788</cve>
<bugzilla href="https://bugzilla.suse.com/733590">SUSE bug 733590</bugzilla>
<bugzilla href="https://bugzilla.suse.com/736169">SUSE bug 736169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/738221">SUSE bug 738221</bugzilla>
<bugzilla href="https://bugzilla.suse.com/741520">SUSE bug 741520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/741859">SUSE bug 741859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/742273">SUSE bug 742273</bugzilla>
<bugzilla href="https://bugzilla.suse.com/742806">SUSE bug 742806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/743308">SUSE bug 743308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/744966">SUSE bug 744966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/746661">SUSE bug 746661</bugzilla>
<bugzilla href="https://bugzilla.suse.com/749111">SUSE bug 749111</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199294" comment="apache2-mod_php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199295" comment="php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199296" comment="php53-bcmath-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199297" comment="php53-bz2-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199298" comment="php53-calendar-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199299" comment="php53-ctype-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199300" comment="php53-curl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199301" comment="php53-dba-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199302" comment="php53-dom-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199303" comment="php53-exif-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199304" comment="php53-fastcgi-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199305" comment="php53-fileinfo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199306" comment="php53-ftp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199307" comment="php53-gd-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199308" comment="php53-gettext-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199309" comment="php53-gmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199310" comment="php53-iconv-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199311" comment="php53-intl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199312" comment="php53-json-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199313" comment="php53-ldap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199314" comment="php53-mbstring-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199315" comment="php53-mcrypt-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199316" comment="php53-mysql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199317" comment="php53-odbc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199318" comment="php53-openssl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199319" comment="php53-pcntl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199320" comment="php53-pdo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199321" comment="php53-pear-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199322" comment="php53-pgsql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199323" comment="php53-pspell-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199324" comment="php53-shmop-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199325" comment="php53-snmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199326" comment="php53-soap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199327" comment="php53-suhosin-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199328" comment="php53-sysvmsg-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199329" comment="php53-sysvsem-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199330" comment="php53-sysvshm-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199331" comment="php53-tokenizer-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199332" comment="php53-wddx-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199333" comment="php53-xmlreader-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199334" comment="php53-xmlrpc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199335" comment="php53-xmlwriter-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199336" comment="php53-xsl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199337" comment="php53-zip-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199338" comment="php53-zlib-5.3.17-0.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0789</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0789" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0789" source="CVE"/>
    <description>
    Memory leak in the timezone functionality in PHP before 5.3.9 allows remote attackers to cause a denial of service (memory consumption) by triggering many strtotime function calls, which are not properly handled by the php_date_parse_tzfile cache.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0789.html">CVE-2012-0789</cve>
<bugzilla href="https://bugzilla.suse.com/733590">SUSE bug 733590</bugzilla>
<bugzilla href="https://bugzilla.suse.com/736169">SUSE bug 736169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/738221">SUSE bug 738221</bugzilla>
<bugzilla href="https://bugzilla.suse.com/741520">SUSE bug 741520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/741859">SUSE bug 741859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/742273">SUSE bug 742273</bugzilla>
<bugzilla href="https://bugzilla.suse.com/742806">SUSE bug 742806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/743308">SUSE bug 743308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/744966">SUSE bug 744966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/746661">SUSE bug 746661</bugzilla>
<bugzilla href="https://bugzilla.suse.com/749111">SUSE bug 749111</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199294" comment="apache2-mod_php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199295" comment="php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199296" comment="php53-bcmath-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199297" comment="php53-bz2-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199298" comment="php53-calendar-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199299" comment="php53-ctype-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199300" comment="php53-curl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199301" comment="php53-dba-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199302" comment="php53-dom-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199303" comment="php53-exif-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199304" comment="php53-fastcgi-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199305" comment="php53-fileinfo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199306" comment="php53-ftp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199307" comment="php53-gd-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199308" comment="php53-gettext-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199309" comment="php53-gmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199310" comment="php53-iconv-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199311" comment="php53-intl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199312" comment="php53-json-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199313" comment="php53-ldap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199314" comment="php53-mbstring-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199315" comment="php53-mcrypt-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199316" comment="php53-mysql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199317" comment="php53-odbc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199318" comment="php53-openssl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199319" comment="php53-pcntl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199320" comment="php53-pdo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199321" comment="php53-pear-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199322" comment="php53-pgsql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199323" comment="php53-pspell-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199324" comment="php53-shmop-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199325" comment="php53-snmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199326" comment="php53-soap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199327" comment="php53-suhosin-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199328" comment="php53-sysvmsg-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199329" comment="php53-sysvsem-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199330" comment="php53-sysvshm-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199331" comment="php53-tokenizer-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199332" comment="php53-wddx-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199333" comment="php53-xmlreader-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199334" comment="php53-xmlrpc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199335" comment="php53-xmlwriter-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199336" comment="php53-xsl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199337" comment="php53-zip-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199338" comment="php53-zlib-5.3.17-0.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0804</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0804" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0804" source="CVE"/>
    <description>
    Heap-based buffer overflow in the proxy_connect function in src/client.c in CVS 1.11 and 1.12 allows remote HTTP proxy servers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted HTTP response.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0804.html">CVE-2012-0804</cve>
<bugzilla href="https://bugzilla.suse.com/744059">SUSE bug 744059</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199395" comment="cvs-1.12.12-144.23.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199396" comment="cvs-doc-1.12.12-144.23.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0807</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0807" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0807" source="CVE"/>
    <description>
    Stack-based buffer overflow in the suhosin_encrypt_single_cookie function in the transparent cookie-encryption feature in the Suhosin extension before 0.9.33 for PHP, when suhosin.cookie.encrypt and suhosin.multiheader are enabled, might allow remote attackers to execute arbitrary code via a long string that is used in a Set-Cookie HTTP header.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0807.html">CVE-2012-0807</cve>
<bugzilla href="https://bugzilla.suse.com/733590">SUSE bug 733590</bugzilla>
<bugzilla href="https://bugzilla.suse.com/736169">SUSE bug 736169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/738221">SUSE bug 738221</bugzilla>
<bugzilla href="https://bugzilla.suse.com/741520">SUSE bug 741520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/741859">SUSE bug 741859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/742273">SUSE bug 742273</bugzilla>
<bugzilla href="https://bugzilla.suse.com/742806">SUSE bug 742806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/743308">SUSE bug 743308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/744966">SUSE bug 744966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/746661">SUSE bug 746661</bugzilla>
<bugzilla href="https://bugzilla.suse.com/749111">SUSE bug 749111</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199294" comment="apache2-mod_php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199295" comment="php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199296" comment="php53-bcmath-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199297" comment="php53-bz2-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199298" comment="php53-calendar-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199299" comment="php53-ctype-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199300" comment="php53-curl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199301" comment="php53-dba-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199302" comment="php53-dom-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199303" comment="php53-exif-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199304" comment="php53-fastcgi-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199305" comment="php53-fileinfo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199306" comment="php53-ftp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199307" comment="php53-gd-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199308" comment="php53-gettext-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199309" comment="php53-gmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199310" comment="php53-iconv-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199311" comment="php53-intl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199312" comment="php53-json-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199313" comment="php53-ldap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199314" comment="php53-mbstring-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199315" comment="php53-mcrypt-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199316" comment="php53-mysql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199317" comment="php53-odbc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199318" comment="php53-openssl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199319" comment="php53-pcntl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199320" comment="php53-pdo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199321" comment="php53-pear-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199322" comment="php53-pgsql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199323" comment="php53-pspell-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199324" comment="php53-shmop-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199325" comment="php53-snmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199326" comment="php53-soap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199327" comment="php53-suhosin-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199328" comment="php53-sysvmsg-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199329" comment="php53-sysvsem-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199330" comment="php53-sysvshm-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199331" comment="php53-tokenizer-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199332" comment="php53-wddx-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199333" comment="php53-xmlreader-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199334" comment="php53-xmlrpc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199335" comment="php53-xmlwriter-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199336" comment="php53-xsl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199337" comment="php53-zip-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199338" comment="php53-zlib-5.3.17-0.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0814" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0814" source="CVE"/>
    <description>
    The auth_parse_options function in auth-options.c in sshd in OpenSSH before 5.7 provides debug messages containing authorized_keys command options, which allows remote authenticated users to obtain potentially sensitive information by reading these messages, as demonstrated by the shared user account required by Gitolite.  NOTE: this can cross privilege boundaries because a user account may intentionally have no shell or filesystem access, and therefore may have no supported way to read an authorized_keys file in its own home directory.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0814.html">CVE-2012-0814</cve>
<bugzilla href="https://bugzilla.suse.com/744643">SUSE bug 744643</bugzilla>
<bugzilla href="https://bugzilla.suse.com/755505">SUSE bug 755505</bugzilla>
<bugzilla href="https://bugzilla.suse.com/770728">SUSE bug 770728</bugzilla>
<bugzilla href="https://bugzilla.suse.com/826672">SUSE bug 826672</bugzilla>
<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199733" comment="openssh-6.2p2-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199734" comment="openssh-askpass-6.2p2-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0817</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0817" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0817" source="CVE"/>
    <description>
    Memory leak in smbd in Samba 3.6.x before 3.6.3 allows remote attackers to cause a denial of service (memory and CPU consumption) by making many connection requests.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0817.html">CVE-2012-0817</cve>
<bugzilla href="https://bugzilla.suse.com/743986">SUSE bug 743986</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199555" comment="ldapsmb-1.34b-12.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199556" comment="libldb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199557" comment="libsmbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199558" comment="libsmbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199559" comment="libsmbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199560" comment="libtalloc2-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199561" comment="libtalloc2-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199562" comment="libtalloc2-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199563" comment="libtdb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199564" comment="libtdb1-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199565" comment="libtdb1-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199566" comment="libtevent0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199567" comment="libwbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199568" comment="libwbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199569" comment="libwbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199570" comment="samba-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199571" comment="samba-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199572" comment="samba-client-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199573" comment="samba-client-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199574" comment="samba-client-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199575" comment="samba-krb-printing-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199576" comment="samba-winbind-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199577" comment="samba-winbind-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199578" comment="samba-winbind-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199579" comment="samba-x86-3.6.3-0.39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0830" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0830" source="CVE"/>
    <description>
    The php_register_variable_ex function in php_variables.c in PHP 5.3.9 allows remote attackers to execute arbitrary code via a request containing a large number of variables, related to improper handling of array variables.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-4885.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0830.html">CVE-2012-0830</cve>
<bugzilla href="https://bugzilla.suse.com/733590">SUSE bug 733590</bugzilla>
<bugzilla href="https://bugzilla.suse.com/736169">SUSE bug 736169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/738221">SUSE bug 738221</bugzilla>
<bugzilla href="https://bugzilla.suse.com/741520">SUSE bug 741520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/741859">SUSE bug 741859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/742273">SUSE bug 742273</bugzilla>
<bugzilla href="https://bugzilla.suse.com/742806">SUSE bug 742806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/743308">SUSE bug 743308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/744966">SUSE bug 744966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/746661">SUSE bug 746661</bugzilla>
<bugzilla href="https://bugzilla.suse.com/749111">SUSE bug 749111</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199294" comment="apache2-mod_php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199295" comment="php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199296" comment="php53-bcmath-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199297" comment="php53-bz2-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199298" comment="php53-calendar-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199299" comment="php53-ctype-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199300" comment="php53-curl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199301" comment="php53-dba-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199302" comment="php53-dom-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199303" comment="php53-exif-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199304" comment="php53-fastcgi-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199305" comment="php53-fileinfo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199306" comment="php53-ftp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199307" comment="php53-gd-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199308" comment="php53-gettext-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199309" comment="php53-gmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199310" comment="php53-iconv-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199311" comment="php53-intl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199312" comment="php53-json-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199313" comment="php53-ldap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199314" comment="php53-mbstring-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199315" comment="php53-mcrypt-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199316" comment="php53-mysql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199317" comment="php53-odbc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199318" comment="php53-openssl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199319" comment="php53-pcntl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199320" comment="php53-pdo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199321" comment="php53-pear-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199322" comment="php53-pgsql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199323" comment="php53-pspell-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199324" comment="php53-shmop-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199325" comment="php53-snmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199326" comment="php53-soap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199327" comment="php53-suhosin-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199328" comment="php53-sysvmsg-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199329" comment="php53-sysvsem-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199330" comment="php53-sysvshm-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199331" comment="php53-tokenizer-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199332" comment="php53-wddx-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199333" comment="php53-xmlreader-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199334" comment="php53-xmlrpc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199335" comment="php53-xmlwriter-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199336" comment="php53-xsl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199337" comment="php53-zip-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199338" comment="php53-zlib-5.3.17-0.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0831</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0831" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0831" source="CVE"/>
    <description>
    PHP before 5.3.10 does not properly perform a temporary change to the magic_quotes_gpc directive during the importing of environment variables, which makes it easier for remote attackers to conduct SQL injection attacks via a crafted request, related to main/php_variables.c, sapi/cgi/cgi_main.c, and sapi/fpm/fpm/fpm_main.c.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0831.html">CVE-2012-0831</cve>
<bugzilla href="https://bugzilla.suse.com/733590">SUSE bug 733590</bugzilla>
<bugzilla href="https://bugzilla.suse.com/736169">SUSE bug 736169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/738221">SUSE bug 738221</bugzilla>
<bugzilla href="https://bugzilla.suse.com/741520">SUSE bug 741520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/741859">SUSE bug 741859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/742273">SUSE bug 742273</bugzilla>
<bugzilla href="https://bugzilla.suse.com/742806">SUSE bug 742806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/743308">SUSE bug 743308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/744966">SUSE bug 744966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/746661">SUSE bug 746661</bugzilla>
<bugzilla href="https://bugzilla.suse.com/749111">SUSE bug 749111</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199294" comment="apache2-mod_php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199295" comment="php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199296" comment="php53-bcmath-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199297" comment="php53-bz2-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199298" comment="php53-calendar-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199299" comment="php53-ctype-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199300" comment="php53-curl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199301" comment="php53-dba-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199302" comment="php53-dom-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199303" comment="php53-exif-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199304" comment="php53-fastcgi-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199305" comment="php53-fileinfo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199306" comment="php53-ftp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199307" comment="php53-gd-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199308" comment="php53-gettext-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199309" comment="php53-gmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199310" comment="php53-iconv-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199311" comment="php53-intl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199312" comment="php53-json-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199313" comment="php53-ldap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199314" comment="php53-mbstring-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199315" comment="php53-mcrypt-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199316" comment="php53-mysql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199317" comment="php53-odbc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199318" comment="php53-openssl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199319" comment="php53-pcntl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199320" comment="php53-pdo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199321" comment="php53-pear-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199322" comment="php53-pgsql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199323" comment="php53-pspell-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199324" comment="php53-shmop-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199325" comment="php53-snmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199326" comment="php53-soap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199327" comment="php53-suhosin-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199328" comment="php53-sysvmsg-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199329" comment="php53-sysvsem-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199330" comment="php53-sysvshm-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199331" comment="php53-tokenizer-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199332" comment="php53-wddx-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199333" comment="php53-xmlreader-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199334" comment="php53-xmlrpc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199335" comment="php53-xmlwriter-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199336" comment="php53-xsl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199337" comment="php53-zip-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199338" comment="php53-zlib-5.3.17-0.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0841</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0841" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0841" source="CVE"/>
    <description>
    libxml2 before 2.8.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted XML data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0841.html">CVE-2012-0841</cve>
<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/748561">SUSE bug 748561</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199702" comment="libxml2-2.7.6-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199703" comment="libxml2-32bit-2.7.6-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199704" comment="libxml2-doc-2.7.6-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199705" comment="libxml2-x86-2.7.6-0.23 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0845</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0845" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0845" source="CVE"/>
    <description>
    SimpleXMLRPCServer.py in SimpleXMLRPCServer in Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via an XML-RPC POST request that contains a smaller amount of data than specified by the Content-Length header.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0845.html">CVE-2012-0845</cve>
<bugzilla href="https://bugzilla.suse.com/747125">SUSE bug 747125</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199659" comment="libpython2_6-1_0-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199660" comment="libpython2_6-1_0-32bit-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199661" comment="libpython2_6-1_0-x86-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199662" comment="python-base-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199663" comment="python-base-32bit-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199664" comment="python-base-x86-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199665" comment="python-xml-2.6.8-0.15 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0862</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2012-0862" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0862" source="CVE"/>
    <description>
    builtins.c in Xinetd before 2.3.15 does not check the service type when the tcpmux-server service is enabled, which exposes all enabled services and allows remote attackers to bypass intended access restrictions via a request to tcpmux port 1.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0862.html">CVE-2012-0862</cve>
<bugzilla href="https://bugzilla.suse.com/762294">SUSE bug 762294</bugzilla>
<bugzilla href="https://bugzilla.suse.com/844230">SUSE bug 844230</bugzilla>
<bugzilla href="https://bugzilla.suse.com/855685">SUSE bug 855685</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200482" comment="xinetd-2.3.14-130.133 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0866</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0866" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0866" source="CVE"/>
    <description>
    CREATE TRIGGER in PostgreSQL 8.3.x before 8.3.18, 8.4.x before 8.4.11, 9.0.x before 9.0.7, and 9.1.x before 9.1.3 does not properly check the execute permission for trigger functions marked SECURITY DEFINER, which allows remote authenticated users to execute otherwise restricted triggers on arbitrary data by installing the trigger on an attacker-owned table.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0866.html">CVE-2012-0866</cve>
<bugzilla href="https://bugzilla.suse.com/701489">SUSE bug 701489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/749299">SUSE bug 749299</bugzilla>
<bugzilla href="https://bugzilla.suse.com/749301">SUSE bug 749301</bugzilla>
<bugzilla href="https://bugzilla.suse.com/749303">SUSE bug 749303</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199750" comment="postgresql-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199751" comment="postgresql-contrib-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199752" comment="postgresql-docs-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199753" comment="postgresql-server-8.3.23-0.4 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0868</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0868" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0868" source="CVE"/>
    <description>
    CRLF injection vulnerability in pg_dump in PostgreSQL 8.3.x before 8.3.18, 8.4.x before 8.4.11, 9.0.x before 9.0.7, and 9.1.x before 9.1.3 allows user-assisted remote attackers to execute arbitrary SQL commands via a crafted file containing object names with newlines, which are inserted into an SQL script that is used when the database is restored.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0868.html">CVE-2012-0868</cve>
<bugzilla href="https://bugzilla.suse.com/701489">SUSE bug 701489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/749299">SUSE bug 749299</bugzilla>
<bugzilla href="https://bugzilla.suse.com/749301">SUSE bug 749301</bugzilla>
<bugzilla href="https://bugzilla.suse.com/749303">SUSE bug 749303</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199750" comment="postgresql-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199751" comment="postgresql-contrib-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199752" comment="postgresql-docs-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199753" comment="postgresql-server-8.3.23-0.4 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0870</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0870" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0870" source="CVE"/>
    <description>
    Heap-based buffer overflow in process.c in smbd in Samba 3.0, as used in the file-sharing service on the BlackBerry PlayBook tablet before 2.0.0.7971 and other products, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a Batched (aka AndX) request that triggers infinite recursion.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0870.html">CVE-2012-0870</cve>
<bugzilla href="https://bugzilla.suse.com/747934">SUSE bug 747934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/752797">SUSE bug 752797</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199555" comment="ldapsmb-1.34b-12.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199556" comment="libldb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199557" comment="libsmbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199558" comment="libsmbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199559" comment="libsmbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199560" comment="libtalloc2-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199561" comment="libtalloc2-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199562" comment="libtalloc2-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199563" comment="libtdb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199564" comment="libtdb1-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199565" comment="libtdb1-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199566" comment="libtevent0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199567" comment="libwbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199568" comment="libwbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199569" comment="libwbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199570" comment="samba-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199571" comment="samba-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199572" comment="samba-client-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199573" comment="samba-client-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199574" comment="samba-client-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199575" comment="samba-krb-printing-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199576" comment="samba-winbind-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199577" comment="samba-winbind-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199578" comment="samba-winbind-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199579" comment="samba-x86-3.6.3-0.39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0875</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0875" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0875" source="CVE"/>
    <description>
    SystemTap 1.7, 1.6.7, and probably other versions, when unprivileged mode is enabled, allows local users to obtain sensitive information from kernel memory or cause a denial of service (kernel panic and crash) via vectors related to crafted DWARF data, which triggers a read of an invalid pointer.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0875.html">CVE-2012-0875</cve>
<bugzilla href="https://bugzilla.suse.com/748564">SUSE bug 748564</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199794" comment="systemtap-1.5-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199795" comment="systemtap-server-1.5-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0876</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0876" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0876" source="CVE"/>
    <description>
    The XML parser (xmlparse.c) in expat before 2.1.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML file with many identifiers with the same value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0876.html">CVE-2012-0876</cve>
<bugzilla href="https://bugzilla.suse.com/750914">SUSE bug 750914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/751464">SUSE bug 751464</bugzilla>
<bugzilla href="https://bugzilla.suse.com/751465">SUSE bug 751465</bugzilla>
<bugzilla href="https://bugzilla.suse.com/983215">SUSE bug 983215</bugzilla>
<bugzilla href="https://bugzilla.suse.com/983216">SUSE bug 983216</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199418" comment="expat-2.0.1-88.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199419" comment="libexpat1-2.0.1-88.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199420" comment="libexpat1-32bit-2.0.1-88.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199421" comment="libexpat1-x86-2.0.1-88.34 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0883</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0883" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0883" source="CVE"/>
    <description>
    envvars (aka envvars-std) in the Apache HTTP Server before 2.4.2 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse DSO in the current working directory during execution of apachectl.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0883.html">CVE-2012-0883</cve>
<bugzilla href="https://bugzilla.suse.com/757710">SUSE bug 757710</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199288" comment="apache2-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199289" comment="apache2-doc-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199290" comment="apache2-example-pages-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199291" comment="apache2-prefork-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199292" comment="apache2-utils-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199293" comment="apache2-worker-2.2.12-1.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0884</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-0884" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0884" source="CVE"/>
    <description>
    The implementation of Cryptographic Message Syntax (CMS) and PKCS #7 in OpenSSL before 0.9.8u and 1.x before 1.0.0h does not properly restrict certain oracle behavior, which makes it easier for context-dependent attackers to decrypt data via a Million Message Attack (MMA) adaptive chosen ciphertext attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0884.html">CVE-2012-0884</cve>
<bugzilla href="https://bugzilla.suse.com/749210">SUSE bug 749210</bugzilla>
<bugzilla href="https://bugzilla.suse.com/749735">SUSE bug 749735</bugzilla>
<bugzilla href="https://bugzilla.suse.com/751977">SUSE bug 751977</bugzilla>
<bugzilla href="https://bugzilla.suse.com/754640">SUSE bug 754640</bugzilla>
<bugzilla href="https://bugzilla.suse.com/761819">SUSE bug 761819</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199638" comment="libopenssl0_9_8-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199639" comment="libopenssl0_9_8-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199640" comment="libopenssl0_9_8-hmac-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199641" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199642" comment="libopenssl0_9_8-x86-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199643" comment="openssl-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199644" comment="openssl-doc-0.9.8j-0.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1015</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2012-1015" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1015" source="CVE"/>
    <description>
    The kdc_handle_protected_negotiation function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x before 1.9.5, and 1.10.x before 1.10.3 attempts to calculate a checksum before verifying that the key type is appropriate for a checksum, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized pointer free, heap memory corruption, and daemon crash) via a crafted AS-REQ request.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1015.html">CVE-2012-1015</cve>
<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009248574" comment="krb5-1.8.6-133.49.121 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248575" comment="krb5-32bit-1.8.6-133.49.121 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248576" comment="krb5-apps-clients-1.8.6-133.49.121 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248577" comment="krb5-apps-servers-1.8.6-133.49.121 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248578" comment="krb5-client-1.8.6-133.49.121 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248579" comment="krb5-devel-1.8.6-133.49.121 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248580" comment="krb5-devel-32bit-1.8.6-133.49.121 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248581" comment="krb5-doc-1.8.6-133.49.121 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248582" comment="krb5-plugin-kdb-ldap-1.8.6-133.49.121 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248583" comment="krb5-plugin-preauth-pkinit-1.8.6-133.49.121 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248584" comment="krb5-server-1.8.6-133.49.121 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1090</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1090" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1090" source="CVE"/>
    <description>
    The cifs_lookup function in fs/cifs/dir.c in the Linux kernel before 3.2.10 allows local users to cause a denial of service (OOPS) via attempted access to a special file, as demonstrated by a FIFO.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1090.html">CVE-2012-1090</cve>
<bugzilla href="https://bugzilla.suse.com/749569">SUSE bug 749569</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1097</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1097" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1097" source="CVE"/>
    <description>
    The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1097.html">CVE-2012-1097</cve>
<bugzilla href="https://bugzilla.suse.com/750079">SUSE bug 750079</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1108</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1108" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1108" source="CVE"/>
    <description>
    The parse function in ogg/xiphcomment.cpp in TagLib 1.7 and earlier allows remote attackers to cause a denial of service (crash) via a crafted vendorLength field in an ogg file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1108.html">CVE-2012-1108</cve>
<bugzilla href="https://bugzilla.suse.com/750689">SUSE bug 750689</bugzilla>
<bugzilla href="https://bugzilla.suse.com/750690">SUSE bug 750690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/750691">SUSE bug 750691</bugzilla>
<bugzilla href="https://bugzilla.suse.com/750693">SUSE bug 750693</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199797" comment="taglib-1.5-19.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199798" comment="taglib-32bit-1.5-19.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199799" comment="taglib-x86-1.5-19.23 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1126" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1126" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via crafted property data in a BDF font.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1126.html">CVE-2012-1126</cve>
<bugzilla href="https://bugzilla.suse.com/750937">SUSE bug 750937</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199430" comment="freetype2-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199431" comment="freetype2-32bit-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199432" comment="freetype2-x86-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199433" comment="ft2demos-2.3.7-25.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1127</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1127" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1127" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via crafted glyph or bitmap data in a BDF font.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1127.html">CVE-2012-1127</cve>
<bugzilla href="https://bugzilla.suse.com/750947">SUSE bug 750947</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199430" comment="freetype2-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199431" comment="freetype2-32bit-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199432" comment="freetype2-x86-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199433" comment="ft2demos-2.3.7-25.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1128</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1128" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1128" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (NULL pointer dereference and memory corruption) or possibly execute arbitrary code via a crafted TrueType font.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1128.html">CVE-2012-1128</cve>
<bugzilla href="https://bugzilla.suse.com/750942">SUSE bug 750942</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199430" comment="freetype2-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199431" comment="freetype2-32bit-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199432" comment="freetype2-x86-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199433" comment="ft2demos-2.3.7-25.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1129</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1129" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1129" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via a crafted SFNT string in a Type 42 font.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1129.html">CVE-2012-1129</cve>
<bugzilla href="https://bugzilla.suse.com/750952">SUSE bug 750952</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199430" comment="freetype2-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199431" comment="freetype2-32bit-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199432" comment="freetype2-x86-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199433" comment="ft2demos-2.3.7-25.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1130</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1130" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1130" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via crafted property data in a PCF font.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1130.html">CVE-2012-1130</cve>
<bugzilla href="https://bugzilla.suse.com/750951">SUSE bug 750951</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199430" comment="freetype2-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199431" comment="freetype2-32bit-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199432" comment="freetype2-x86-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199433" comment="ft2demos-2.3.7-25.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1131</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1131" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1131" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, on 64-bit platforms allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via vectors related to the cell table of a font.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1131.html">CVE-2012-1131</cve>
<bugzilla href="https://bugzilla.suse.com/750953">SUSE bug 750953</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199430" comment="freetype2-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199431" comment="freetype2-32bit-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199432" comment="freetype2-x86-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199433" comment="ft2demos-2.3.7-25.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1132</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1132" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1132" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via crafted dictionary data in a Type 1 font.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1132.html">CVE-2012-1132</cve>
<bugzilla href="https://bugzilla.suse.com/750950">SUSE bug 750950</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199430" comment="freetype2-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199431" comment="freetype2-32bit-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199432" comment="freetype2-x86-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199433" comment="ft2demos-2.3.7-25.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1133</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1133" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1133" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via crafted glyph or bitmap data in a BDF font.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1133.html">CVE-2012-1133</cve>
<bugzilla href="https://bugzilla.suse.com/750940">SUSE bug 750940</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199430" comment="freetype2-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199431" comment="freetype2-32bit-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199432" comment="freetype2-x86-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199433" comment="ft2demos-2.3.7-25.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1134</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1134" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1134" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via crafted private-dictionary data in a Type 1 font.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1134.html">CVE-2012-1134</cve>
<bugzilla href="https://bugzilla.suse.com/750945">SUSE bug 750945</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199430" comment="freetype2-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199431" comment="freetype2-32bit-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199432" comment="freetype2-x86-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199433" comment="ft2demos-2.3.7-25.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1135</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1135" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1135" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via vectors involving the NPUSHB and NPUSHW instructions in a TrueType font.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1135.html">CVE-2012-1135</cve>
<bugzilla href="https://bugzilla.suse.com/750946">SUSE bug 750946</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199430" comment="freetype2-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199431" comment="freetype2-32bit-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199432" comment="freetype2-x86-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199433" comment="ft2demos-2.3.7-25.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1136</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1136" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1136" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via crafted glyph or bitmap data in a BDF font that lacks an ENCODING field.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1136.html">CVE-2012-1136</cve>
<bugzilla href="https://bugzilla.suse.com/750939">SUSE bug 750939</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199430" comment="freetype2-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199431" comment="freetype2-32bit-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199432" comment="freetype2-x86-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199433" comment="ft2demos-2.3.7-25.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1137</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1137" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1137" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via a crafted header in a BDF font.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1137.html">CVE-2012-1137</cve>
<bugzilla href="https://bugzilla.suse.com/750943">SUSE bug 750943</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199430" comment="freetype2-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199431" comment="freetype2-32bit-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199432" comment="freetype2-x86-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199433" comment="ft2demos-2.3.7-25.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1138</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1138" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1138" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via vectors involving the MIRP instruction in a TrueType font.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1138.html">CVE-2012-1138</cve>
<bugzilla href="https://bugzilla.suse.com/750941">SUSE bug 750941</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199430" comment="freetype2-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199431" comment="freetype2-32bit-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199432" comment="freetype2-x86-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199433" comment="ft2demos-2.3.7-25.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1139" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1139" source="CVE"/>
    <description>
    Array index error in FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid stack read operation and memory corruption) or possibly execute arbitrary code via crafted glyph data in a BDF font.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1139.html">CVE-2012-1139</cve>
<bugzilla href="https://bugzilla.suse.com/750938">SUSE bug 750938</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199430" comment="freetype2-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199431" comment="freetype2-32bit-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199432" comment="freetype2-x86-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199433" comment="ft2demos-2.3.7-25.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1140</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1140" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1140" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via a crafted PostScript font object.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1140.html">CVE-2012-1140</cve>
<bugzilla href="https://bugzilla.suse.com/750954">SUSE bug 750954</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199430" comment="freetype2-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199431" comment="freetype2-32bit-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199432" comment="freetype2-x86-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199433" comment="ft2demos-2.3.7-25.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1141</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1141" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1141" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via a crafted ASCII string in a BDF font.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1141.html">CVE-2012-1141</cve>
<bugzilla href="https://bugzilla.suse.com/750955">SUSE bug 750955</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199430" comment="freetype2-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199431" comment="freetype2-32bit-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199432" comment="freetype2-x86-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199433" comment="ft2demos-2.3.7-25.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1142</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1142" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1142" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via crafted glyph-outline data in a font.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1142.html">CVE-2012-1142</cve>
<bugzilla href="https://bugzilla.suse.com/750948">SUSE bug 750948</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199430" comment="freetype2-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199431" comment="freetype2-32bit-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199432" comment="freetype2-x86-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199433" comment="ft2demos-2.3.7-25.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1143" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1143" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted font.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1143.html">CVE-2012-1143</cve>
<bugzilla href="https://bugzilla.suse.com/750949">SUSE bug 750949</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199430" comment="freetype2-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199431" comment="freetype2-32bit-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199432" comment="freetype2-x86-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199433" comment="ft2demos-2.3.7-25.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1144</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1144" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1144" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via a crafted TrueType font.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1144.html">CVE-2012-1144</cve>
<bugzilla href="https://bugzilla.suse.com/750944">SUSE bug 750944</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199430" comment="freetype2-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199431" comment="freetype2-32bit-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199432" comment="freetype2-x86-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199433" comment="ft2demos-2.3.7-25.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1146" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1146" source="CVE"/>
    <description>
    The mem_cgroup_usage_unregister_event function in mm/memcontrol.c in the Linux kernel before 3.2.10 does not properly handle multiple events that are attached to the same eventfd, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by registering memory threshold events.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1146.html">CVE-2012-1146</cve>
<bugzilla href="https://bugzilla.suse.com/750959">SUSE bug 750959</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1147</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1147" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1147" source="CVE"/>
    <description>
    readfilemap.c in expat before 2.1.0 allows context-dependent attackers to cause a denial of service (file descriptor consumption) via a large number of crafted XML files.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1147.html">CVE-2012-1147</cve>
<bugzilla href="https://bugzilla.suse.com/750914">SUSE bug 750914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/751464">SUSE bug 751464</bugzilla>
<bugzilla href="https://bugzilla.suse.com/751465">SUSE bug 751465</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199418" comment="expat-2.0.1-88.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199419" comment="libexpat1-2.0.1-88.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199420" comment="libexpat1-32bit-2.0.1-88.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199421" comment="libexpat1-x86-2.0.1-88.34 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1148</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1148" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1148" source="CVE"/>
    <description>
    Memory leak in the poolGrow function in expat/lib/xmlparse.c in expat before 2.1.0 allows context-dependent attackers to cause a denial of service (memory consumption) via a large number of crafted XML files that cause improperly-handled reallocation failures when expanding entities.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1148.html">CVE-2012-1148</cve>
<bugzilla href="https://bugzilla.suse.com/750914">SUSE bug 750914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/751464">SUSE bug 751464</bugzilla>
<bugzilla href="https://bugzilla.suse.com/751465">SUSE bug 751465</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199418" comment="expat-2.0.1-88.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199419" comment="libexpat1-2.0.1-88.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199420" comment="libexpat1-32bit-2.0.1-88.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199421" comment="libexpat1-x86-2.0.1-88.34 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1150</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1150" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1150" source="CVE"/>
    <description>
    Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1150.html">CVE-2012-1150</cve>
<bugzilla href="https://bugzilla.suse.com/751718">SUSE bug 751718</bugzilla>
<bugzilla href="https://bugzilla.suse.com/755383">SUSE bug 755383</bugzilla>
<bugzilla href="https://bugzilla.suse.com/826682">SUSE bug 826682</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199659" comment="libpython2_6-1_0-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199660" comment="libpython2_6-1_0-32bit-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199661" comment="libpython2_6-1_0-x86-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199662" comment="python-base-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199663" comment="python-base-32bit-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199664" comment="python-base-x86-2.6.8-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199665" comment="python-xml-2.6.8-0.15 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1164</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1164" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1164" source="CVE"/>
    <description>
    slapd in OpenLDAP before 2.4.30 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via an LDAP search query with attrsOnly set to true, which causes empty attributes to be returned.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1164.html">CVE-2012-1164</cve>
<bugzilla href="https://bugzilla.suse.com/751945">SUSE bug 751945</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199378" comment="compat-libldap-2_3-0-2.3.37-2.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199379" comment="libldap-2_4-2-2.4.26-0.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199380" comment="libldap-2_4-2-32bit-2.4.26-0.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199381" comment="libldap-2_4-2-x86-2.4.26-0.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199382" comment="openldap2-2.4.26-0.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199383" comment="openldap2-back-meta-2.4.26-0.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199384" comment="openldap2-client-2.4.26-0.24 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1165</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1165" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1165" source="CVE"/>
    <description>
    The mime_param_cmp function in crypto/asn1/asn_mime.c in OpenSSL before 0.9.8u and 1.x before 1.0.0h allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted S/MIME message, a different vulnerability than CVE-2006-7250.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1165.html">CVE-2012-1165</cve>
<bugzilla href="https://bugzilla.suse.com/749210">SUSE bug 749210</bugzilla>
<bugzilla href="https://bugzilla.suse.com/749213">SUSE bug 749213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/751946">SUSE bug 751946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/754640">SUSE bug 754640</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199638" comment="libopenssl0_9_8-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199639" comment="libopenssl0_9_8-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199640" comment="libopenssl0_9_8-hmac-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199641" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199642" comment="libopenssl0_9_8-x86-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199643" comment="openssl-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199644" comment="openssl-doc-0.9.8j-0.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1172</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1172" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1172" source="CVE"/>
    <description>
    The file-upload implementation in rfc1867.c in PHP before 5.4.0 does not properly handle invalid [ (open square bracket) characters in name values, which makes it easier for remote attackers to cause a denial of service (malformed $_FILES indexes) or conduct directory traversal attacks during multi-file uploads by leveraging a script that lacks its own filename restrictions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1172.html">CVE-2012-1172</cve>
<bugzilla href="https://bugzilla.suse.com/752030">SUSE bug 752030</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199294" comment="apache2-mod_php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199295" comment="php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199296" comment="php53-bcmath-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199297" comment="php53-bz2-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199298" comment="php53-calendar-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199299" comment="php53-ctype-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199300" comment="php53-curl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199301" comment="php53-dba-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199302" comment="php53-dom-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199303" comment="php53-exif-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199304" comment="php53-fastcgi-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199305" comment="php53-fileinfo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199306" comment="php53-ftp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199307" comment="php53-gd-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199308" comment="php53-gettext-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199309" comment="php53-gmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199310" comment="php53-iconv-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199311" comment="php53-intl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199312" comment="php53-json-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199313" comment="php53-ldap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199314" comment="php53-mbstring-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199315" comment="php53-mcrypt-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199316" comment="php53-mysql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199317" comment="php53-odbc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199318" comment="php53-openssl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199319" comment="php53-pcntl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199320" comment="php53-pdo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199321" comment="php53-pear-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199322" comment="php53-pgsql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199323" comment="php53-pspell-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199324" comment="php53-shmop-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199325" comment="php53-snmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199326" comment="php53-soap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199327" comment="php53-suhosin-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199328" comment="php53-sysvmsg-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199329" comment="php53-sysvsem-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199330" comment="php53-sysvshm-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199331" comment="php53-tokenizer-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199332" comment="php53-wddx-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199333" comment="php53-xmlreader-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199334" comment="php53-xmlrpc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199335" comment="php53-xmlwriter-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199336" comment="php53-xsl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199337" comment="php53-zip-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199338" comment="php53-zlib-5.3.17-0.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1173</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1173" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1173" source="CVE"/>
    <description>
    Multiple integer overflows in tiff_getimage.c in LibTIFF 3.9.4 allow remote attackers to execute arbitrary code via a crafted tile size in a TIFF file, which is not properly handled by the (1) gtTileSeparate or (2) gtStripSeparate function, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1173.html">CVE-2012-1173</cve>
<bugzilla href="https://bugzilla.suse.com/753362">SUSE bug 753362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/767852">SUSE bug 767852</bugzilla>
<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199680" comment="libtiff3-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199681" comment="libtiff3-32bit-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199682" comment="libtiff3-x86-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199683" comment="tiff-3.8.2-141.152 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1179</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1179" source="CVE"/>
    <description>
    The Linux kernel before 3.3.1, when KVM is used, allows guest OS users to cause a denial of service (host OS crash) by leveraging administrative access to the guest OS, related to the pmd_none_or_clear_bad function and page faults for huge pages.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1179.html">CVE-2012-1179</cve>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/752599">SUSE bug 752599</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1182" source="CVE"/>
    <description>
    The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1182.html">CVE-2012-1182</cve>
<bugzilla href="https://bugzilla.suse.com/747934">SUSE bug 747934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/752797">SUSE bug 752797</bugzilla>
<bugzilla href="https://bugzilla.suse.com/754443">SUSE bug 754443</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199555" comment="ldapsmb-1.34b-12.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199556" comment="libldb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199557" comment="libsmbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199558" comment="libsmbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199559" comment="libsmbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199560" comment="libtalloc2-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199561" comment="libtalloc2-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199562" comment="libtalloc2-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199563" comment="libtdb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199564" comment="libtdb1-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199565" comment="libtdb1-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199566" comment="libtevent0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199567" comment="libwbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199568" comment="libwbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199569" comment="libwbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199570" comment="samba-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199571" comment="samba-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199572" comment="samba-client-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199573" comment="samba-client-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199574" comment="samba-client-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199575" comment="samba-krb-printing-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199576" comment="samba-winbind-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199577" comment="samba-winbind-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199578" comment="samba-winbind-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199579" comment="samba-x86-3.6.3-0.39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1185</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1185" source="CVE"/>
    <description>
    Multiple integer overflows in (1) magick/profile.c or (2) magick/property.c in ImageMagick 6.7.5 and earlier allow remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via crafted offset value in the ResolutionUnit tag in the EXIF IFD0 of an image.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0247.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1185.html">CVE-2012-1185</cve>
<bugzilla href="https://bugzilla.suse.com/752879">SUSE bug 752879</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199580" comment="libMagickCore1-6.4.3.6-7.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199581" comment="libMagickCore1-32bit-6.4.3.6-7.26 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1186</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1186" source="CVE"/>
    <description>
    Integer overflow in the SyncImageProfiles function in profile.c in ImageMagick 6.7.5-8 and earlier allows remote attackers to cause a denial of service (infinite loop) via crafted IOP tag offsets in the IFD in an image.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0248.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1186.html">CVE-2012-1186</cve>
<bugzilla href="https://bugzilla.suse.com/752879">SUSE bug 752879</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199580" comment="libMagickCore1-6.4.3.6-7.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199581" comment="libMagickCore1-32bit-6.4.3.6-7.26 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1457</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1457" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1457" source="CVE"/>
    <description>
    The TAR file parser in Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field that exceeds the total TAR file size.  NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1457.html">CVE-2012-1457</cve>
<bugzilla href="https://bugzilla.suse.com/753611">SUSE bug 753611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/767574">SUSE bug 767574</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199377" comment="clamav-0.97.7-0.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1458</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1458" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1458" source="CVE"/>
    <description>
    The Microsoft CHM file parser in ClamAV 0.96.4 and Sophos Anti-Virus 4.61.0 allows remote attackers to bypass malware detection via a crafted reset interval in the LZXC header of a CHM file.  NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different CHM parser implementations.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1458.html">CVE-2012-1458</cve>
<bugzilla href="https://bugzilla.suse.com/753613">SUSE bug 753613</bugzilla>
<bugzilla href="https://bugzilla.suse.com/767574">SUSE bug 767574</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199377" comment="clamav-0.97.7-0.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1459</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1459" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1459" source="CVE"/>
    <description>
    The TAR file parser in AhnLab V3 Internet Security 2011.01.18.00, Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, Fortinet Antivirus 4.2.254.0, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, nProtect Anti-Virus 2011-01-17.01, Panda Antivirus 10.0.2.7, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field corresponding to that entire entry, plus part of the header of the next entry.  NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1459.html">CVE-2012-1459</cve>
<bugzilla href="https://bugzilla.suse.com/753610">SUSE bug 753610</bugzilla>
<bugzilla href="https://bugzilla.suse.com/767574">SUSE bug 767574</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199377" comment="clamav-0.97.7-0.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1502</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1502" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1502" source="CVE"/>
    <description>
    Double free vulnerability in the PyPAM_conv in PAMmodule.c in PyPam 0.5.0 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a NULL byte in a password string.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1502.html">CVE-2012-1502</cve>
<bugzilla href="https://bugzilla.suse.com/751005">SUSE bug 751005</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199765" comment="python-pam-0.5.0-3.20 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1531</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1531" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1531" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier; and JavaFX 2.2 and earlier; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1531.html">CVE-2012-1531</cve>
<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1532</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1532" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1532" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier and 6 Update 35 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1532.html">CVE-2012-1532</cve>
<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1533</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1533" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1533" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2012-3159.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1533.html">CVE-2012-1533</cve>
<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1541</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1541" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1541" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from a third party that the issue is due to an interaction error in between the JRE plug-in for WebKit-based browsers and the Javascript engine, which allows remote attackers to execute arbitrary code by modifying DOM nodes that contain applet elements in a way that triggers an incorrect reference count and a use after free.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1541.html">CVE-2012-1541</cve>
<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
<bugzilla href="https://bugzilla.suse.com/818972">SUSE bug 818972</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1569</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1569" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1569" source="CVE"/>
    <description>
    The asn1_get_length_der function in decoding.c in GNU Libtasn1 before 2.12, as used in GnuTLS before 3.0.16 and other products, does not properly handle certain large length values, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly have unspecified other impact via a crafted ASN.1 structure.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1569.html">CVE-2012-1569</cve>
<bugzilla href="https://bugzilla.suse.com/752193">SUSE bug 752193</bugzilla>
<bugzilla href="https://bugzilla.suse.com/753301">SUSE bug 753301</bugzilla>
<bugzilla href="https://bugzilla.suse.com/924966">SUSE bug 924966</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199478" comment="gnutls-2.4.1-24.39.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199479" comment="libgnutls-extra26-2.4.1-24.39.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199480" comment="libgnutls26-2.4.1-24.39.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199481" comment="libgnutls26-32bit-2.4.1-24.39.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199482" comment="libgnutls26-x86-2.4.1-24.39.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1573</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1573" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1573" source="CVE"/>
    <description>
    gnutls_cipher.c in libgnutls in GnuTLS before 2.12.17 and 3.x before 3.0.15 does not properly handle data encrypted with a block cipher, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) via a crafted record, as demonstrated by a crafted GenericBlockCipher structure.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1573.html">CVE-2012-1573</cve>
<bugzilla href="https://bugzilla.suse.com/752193">SUSE bug 752193</bugzilla>
<bugzilla href="https://bugzilla.suse.com/754223">SUSE bug 754223</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199478" comment="gnutls-2.4.1-24.39.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199479" comment="libgnutls-extra26-2.4.1-24.39.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199480" comment="libgnutls26-2.4.1-24.39.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199481" comment="libgnutls26-32bit-2.4.1-24.39.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199482" comment="libgnutls26-x86-2.4.1-24.39.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1584</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1584" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1584" source="CVE"/>
    <description>
    Integer overflow in the mid function in toolkit/tbytevector.cpp in TagLib 1.7 and earlier allows context-dependent attackers to cause a denial of service (application crash) via a crafted file header field in a media file, which triggers a large memory allocation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1584.html">CVE-2012-1584</cve>
<bugzilla href="https://bugzilla.suse.com/750689">SUSE bug 750689</bugzilla>
<bugzilla href="https://bugzilla.suse.com/750690">SUSE bug 750690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/750691">SUSE bug 750691</bugzilla>
<bugzilla href="https://bugzilla.suse.com/750693">SUSE bug 750693</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199797" comment="taglib-1.5-19.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199798" comment="taglib-32bit-1.5-19.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199799" comment="taglib-x86-1.5-19.23 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1586</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1586" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1586" source="CVE"/>
    <description>
    mount.cifs in cifs-utils 2.6 allows local users to determine the existence of arbitrary files or directories via the file path in the second argument, which reveals their existence in an error message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1586.html">CVE-2012-1586</cve>
<bugzilla href="https://bugzilla.suse.com/754443">SUSE bug 754443</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199376" comment="cifs-utils-5.1-0.11 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1593</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1593" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1593" source="CVE"/>
    <description>
    epan/dissectors/packet-ansi_a.c in the ANSI A dissector in Wireshark 1.4.x before 1.4.12 and 1.6.x before 1.6.6 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1593.html">CVE-2012-1593</cve>
<bugzilla href="https://bugzilla.suse.com/754477">SUSE bug 754477</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1595</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1595" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1595" source="CVE"/>
    <description>
    The pcap_process_pseudo_header function in wiretap/pcap-common.c in Wireshark 1.4.x before 1.4.12 and 1.6.x before 1.6.6 allows remote attackers to cause a denial of service (application crash) via a WTAP_ENCAP_ERF file containing an Extension or Multi-Channel header with an invalid pseudoheader size, related to the pcap and pcap-ng file parsers.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1595.html">CVE-2012-1595</cve>
<bugzilla href="https://bugzilla.suse.com/754476">SUSE bug 754476</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1596</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1596" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1596" source="CVE"/>
    <description>
    The mp2t_process_fragmented_payload function in epan/dissectors/packet-mp2t.c in the MP2T dissector in Wireshark 1.4.x before 1.4.12 and 1.6.x before 1.6.6 allows remote attackers to cause a denial of service (application crash) via a packet containing an invalid pointer value that triggers an incorrect memory-allocation attempt.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1596.html">CVE-2012-1596</cve>
<bugzilla href="https://bugzilla.suse.com/754474">SUSE bug 754474</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1601</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1601" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1601" source="CVE"/>
    <description>
    The KVM implementation in the Linux kernel before 3.3.6 allows host OS users to cause a denial of service (NULL pointer dereference and host OS crash) by making a KVM_CREATE_IRQCHIP ioctl call after a virtual CPU already exists.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1601.html">CVE-2012-1601</cve>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/754898">SUSE bug 754898</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1610</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1610" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1610" source="CVE"/>
    <description>
    Integer overflow in the GetEXIFProperty function in magick/property.c in ImageMagick before 6.7.6-4 allows remote attackers to cause a denial of service (out-of-bounds read) via a large component count for certain EXIF tags in a JPEG image.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0259.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1610.html">CVE-2012-1610</cve>
<bugzilla href="https://bugzilla.suse.com/754749">SUSE bug 754749</bugzilla>
<bugzilla href="https://bugzilla.suse.com/758512">SUSE bug 758512</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199580" comment="libMagickCore1-6.4.3.6-7.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199581" comment="libMagickCore1-32bit-6.4.3.6-7.26 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1667</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1667" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1667" source="CVE"/>
    <description>
    ISC BIND 9.x before 9.7.6-P1, 9.8.x before 9.8.3-P1, 9.9.x before 9.9.1-P1, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P1 does not properly handle resource records with a zero-length RDATA section, which allows remote DNS servers to cause a denial of service (daemon crash or data corruption) or obtain sensitive information from process memory via a crafted record.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1667.html">CVE-2012-1667</cve>
<bugzilla href="https://bugzilla.suse.com/765315">SUSE bug 765315</bugzilla>
<bugzilla href="https://bugzilla.suse.com/792926">SUSE bug 792926</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199364" comment="bind-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199365" comment="bind-chrootenv-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199366" comment="bind-doc-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199367" comment="bind-libs-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199368" comment="bind-libs-32bit-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199369" comment="bind-libs-x86-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199370" comment="bind-utils-9.6ESVR7P4-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1682</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1682" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1682" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Beans, a different vulnerability than CVE-2012-3136.  NOTE: Oracle has not commented on claims from a downstream vendor that this issue is related to "XMLDecoder security issue via ClassFinder."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1682.html">CVE-2012-1682</cve>
<bugzilla href="https://bugzilla.suse.com/777499">SUSE bug 777499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/780897">SUSE bug 780897</bugzilla>
<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1713</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1713" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1713" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, 1.4.2_37 and earlier, and JavaFX 2.1 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1713.html">CVE-2012-1713</cve>
<bugzilla href="https://bugzilla.suse.com/766802">SUSE bug 766802</bugzilla>
<bugzilla href="https://bugzilla.suse.com/778629">SUSE bug 778629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/780897">SUSE bug 780897</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1716</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1716" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1716" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, and 5 update 35 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Swing.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1716.html">CVE-2012-1716</cve>
<bugzilla href="https://bugzilla.suse.com/766802">SUSE bug 766802</bugzilla>
<bugzilla href="https://bugzilla.suse.com/778629">SUSE bug 778629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/780897">SUSE bug 780897</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1717</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1717" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1717" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows local users to affect confidentiality via unknown vectors related to printing on Solaris or Linux.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1717.html">CVE-2012-1717</cve>
<bugzilla href="https://bugzilla.suse.com/766802">SUSE bug 766802</bugzilla>
<bugzilla href="https://bugzilla.suse.com/778629">SUSE bug 778629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/780897">SUSE bug 780897</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1718</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1718" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1718" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect availability via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1718.html">CVE-2012-1718</cve>
<bugzilla href="https://bugzilla.suse.com/778629">SUSE bug 778629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/780897">SUSE bug 780897</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1719</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1719" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1719" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect integrity, related to CORBA.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1719.html">CVE-2012-1719</cve>
<bugzilla href="https://bugzilla.suse.com/766802">SUSE bug 766802</bugzilla>
<bugzilla href="https://bugzilla.suse.com/778629">SUSE bug 778629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/780897">SUSE bug 780897</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1721</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1721" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1721" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, and 6 update 32 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2012-1722.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1721.html">CVE-2012-1721</cve>
<bugzilla href="https://bugzilla.suse.com/778629">SUSE bug 778629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/780897">SUSE bug 780897</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1722</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1722" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1722" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, and 6 update 32 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2012-1721.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1722.html">CVE-2012-1722</cve>
<bugzilla href="https://bugzilla.suse.com/778629">SUSE bug 778629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/780897">SUSE bug 780897</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1725</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1725" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1725" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, and 5 update 35 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1725.html">CVE-2012-1725</cve>
<bugzilla href="https://bugzilla.suse.com/766802">SUSE bug 766802</bugzilla>
<bugzilla href="https://bugzilla.suse.com/778629">SUSE bug 778629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/780897">SUSE bug 780897</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1726</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1726" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1726" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier allows remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1726.html">CVE-2012-1726</cve>
<bugzilla href="https://bugzilla.suse.com/780897">SUSE bug 780897</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1798</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1798" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1798" source="CVE"/>
    <description>
    The TIFFGetEXIFProperties function in coders/tiff.c in ImageMagick before 6.7.6-3 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted EXIF IFD in a TIFF image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1798.html">CVE-2012-1798</cve>
<bugzilla href="https://bugzilla.suse.com/754749">SUSE bug 754749</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199580" comment="libMagickCore1-6.4.3.6-7.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199581" comment="libMagickCore1-32bit-6.4.3.6-7.26 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1823</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1823" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1823" source="CVE"/>
    <description>
    sapi/cgi/cgi_main.c in PHP before 5.3.12 and 5.4.x before 5.4.2, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'd' case.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1823.html">CVE-2012-1823</cve>
<bugzilla href="https://bugzilla.suse.com/760536">SUSE bug 760536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/761631">SUSE bug 761631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/850694">SUSE bug 850694</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199294" comment="apache2-mod_php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199295" comment="php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199296" comment="php53-bcmath-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199297" comment="php53-bz2-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199298" comment="php53-calendar-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199299" comment="php53-ctype-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199300" comment="php53-curl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199301" comment="php53-dba-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199302" comment="php53-dom-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199303" comment="php53-exif-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199304" comment="php53-fastcgi-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199305" comment="php53-fileinfo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199306" comment="php53-ftp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199307" comment="php53-gd-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199308" comment="php53-gettext-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199309" comment="php53-gmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199310" comment="php53-iconv-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199311" comment="php53-intl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199312" comment="php53-json-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199313" comment="php53-ldap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199314" comment="php53-mbstring-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199315" comment="php53-mcrypt-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199316" comment="php53-mysql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199317" comment="php53-odbc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199318" comment="php53-openssl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199319" comment="php53-pcntl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199320" comment="php53-pdo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199321" comment="php53-pear-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199322" comment="php53-pgsql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199323" comment="php53-pspell-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199324" comment="php53-shmop-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199325" comment="php53-snmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199326" comment="php53-soap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199327" comment="php53-suhosin-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199328" comment="php53-sysvmsg-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199329" comment="php53-sysvsem-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199330" comment="php53-sysvshm-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199331" comment="php53-tokenizer-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199332" comment="php53-wddx-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199333" comment="php53-xmlreader-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199334" comment="php53-xmlrpc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199335" comment="php53-xmlwriter-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199336" comment="php53-xsl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199337" comment="php53-zip-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199338" comment="php53-zlib-5.3.17-0.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1937</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1937" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1937" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1937.html">CVE-2012-1937</cve>
<bugzilla href="https://bugzilla.suse.com/765204">SUSE bug 765204</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1939</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1939" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1939" source="CVE"/>
    <description>
    jsinfer.cpp in Mozilla Firefox ESR 10.x before 10.0.5 and Thunderbird ESR 10.x before 10.0.5 does not properly determine data types, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via crafted JavaScript code.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1939.html">CVE-2012-1939</cve>
<bugzilla href="https://bugzilla.suse.com/765204">SUSE bug 765204</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1940</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1940" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1940" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsFrameList::FirstChild function in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption and application crash) by changing the size of a container of absolutely positioned elements in a column.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1940.html">CVE-2012-1940</cve>
<bugzilla href="https://bugzilla.suse.com/765204">SUSE bug 765204</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1941</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1941" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1941" source="CVE"/>
    <description>
    Heap-based buffer overflow in the nsHTMLReflowState::CalculateHypotheticalBox function in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allows remote attackers to execute arbitrary code by resizing a window displaying absolutely positioned and relatively positioned elements in nested columns.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1941.html">CVE-2012-1941</cve>
<bugzilla href="https://bugzilla.suse.com/765204">SUSE bug 765204</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1944</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1944" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1944" source="CVE"/>
    <description>
    The Content Security Policy (CSP) implementation in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 does not block inline event handlers, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted HTML document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1944.html">CVE-2012-1944</cve>
<bugzilla href="https://bugzilla.suse.com/765204">SUSE bug 765204</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1945</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1945" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1945" source="CVE"/>
    <description>
    Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allow local users to obtain sensitive information via an HTML document that loads a shortcut (aka .lnk) file for display within an IFRAME element, as demonstrated by a network share implemented by (1) Microsoft Windows or (2) Samba.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1945.html">CVE-2012-1945</cve>
<bugzilla href="https://bugzilla.suse.com/765204">SUSE bug 765204</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1946</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1946" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1946" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsINode::ReplaceOrInsertBefore function in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 might allow remote attackers to execute arbitrary code via document changes involving replacement or insertion of a node.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1946.html">CVE-2012-1946</cve>
<bugzilla href="https://bugzilla.suse.com/765204">SUSE bug 765204</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1947</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1947" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1947" source="CVE"/>
    <description>
    Heap-based buffer overflow in the utf16_to_isolatin1 function in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allows remote attackers to execute arbitrary code via vectors that trigger a character-set conversion failure.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1947.html">CVE-2012-1947</cve>
<bugzilla href="https://bugzilla.suse.com/765204">SUSE bug 765204</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1948</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1948" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1948" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1948.html">CVE-2012-1948</cve>
<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1949</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1949" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1949" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 13.0, Thunderbird 5.0 through 13.0, and SeaMonkey before 2.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1949.html">CVE-2012-1949</cve>
<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1950</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1950" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1950" source="CVE"/>
    <description>
    The drag-and-drop implementation in Mozilla Firefox 4.x through 13.0 and Firefox ESR 10.x before 10.0.6 allows remote attackers to spoof the address bar by canceling a page load.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1950.html">CVE-2012-1950</cve>
<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1951</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1951" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1951" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsSMILTimeValueSpec::IsEventBased function in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 allows remote attackers to cause a denial of service (heap memory corruption) or possibly execute arbitrary code by interacting with objects used for SMIL Timing.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1951.html">CVE-2012-1951</cve>
<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1952</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1952" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1952" source="CVE"/>
    <description>
    The nsTableFrame::InsertFrames function in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 does not properly perform a cast of a frame variable during processing of mixed row-group and column-group frames, which might allow remote attackers to execute arbitrary code via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1952.html">CVE-2012-1952</cve>
<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1953</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1953" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1953" source="CVE"/>
    <description>
    The ElementAnimations::EnsureStyleRuleFor function in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 allows remote attackers to cause a denial of service (buffer over-read, incorrect pointer dereference, and heap-based buffer overflow) or possibly execute arbitrary code via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1953.html">CVE-2012-1953</cve>
<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1954</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1954" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1954" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsDocument::AdoptNode function in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 allows remote attackers to cause a denial of service (heap memory corruption) or possibly execute arbitrary code via vectors involving multiple adoptions and empty documents.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1954.html">CVE-2012-1954</cve>
<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1955</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1955" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1955" source="CVE"/>
    <description>
    Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 allow remote attackers to spoof the address bar via vectors involving history.forward and history.back calls.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1955.html">CVE-2012-1955</cve>
<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1956</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1956" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1956" source="CVE"/>
    <description>
    Mozilla Firefox before 15.0, Thunderbird before 15.0, and SeaMonkey before 2.12 do not prevent use of the Object.defineProperty method to shadow the location object (aka window.location), which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via vectors involving a plugin.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1956.html">CVE-2012-1956</cve>
<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1957</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1957" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1957" source="CVE"/>
    <description>
    An unspecified parser-utility class in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 does not properly handle EMBED elements within description elements in RSS feeds, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a feed.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1957.html">CVE-2012-1957</cve>
<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1958</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1958" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1958" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsGlobalWindow::PageHidden function in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 might allow remote attackers to execute arbitrary code via vectors related to focused content.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1958.html">CVE-2012-1958</cve>
<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1959</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1959" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1959" source="CVE"/>
    <description>
    Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 do not consider the presence of same-compartment security wrappers (SCSW) during the cross-compartment wrapping of objects, which allows remote attackers to bypass intended XBL access restrictions via crafted content.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1959.html">CVE-2012-1959</cve>
<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1960</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1960" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1960" source="CVE"/>
    <description>
    The qcms_transform_data_rgb_out_lut_sse2 function in the QCMS implementation in Mozilla Firefox 4.x through 13.0, Thunderbird 5.0 through 13.0, and SeaMonkey before 2.11 might allow remote attackers to obtain sensitive information from process memory via a crafted color profile that triggers an out-of-bounds read operation.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1960.html">CVE-2012-1960</cve>
<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1961</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1961" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1961" source="CVE"/>
    <description>
    Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 do not properly handle duplicate values in X-Frame-Options headers, which makes it easier for remote attackers to conduct clickjacking attacks via a FRAME element referencing a web site that produces these duplicate values.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1961.html">CVE-2012-1961</cve>
<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1962</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1962" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1962" source="CVE"/>
    <description>
    Use-after-free vulnerability in the JSDependentString::undepend function in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via vectors involving strings with multiple dependencies.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1962.html">CVE-2012-1962</cve>
<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1963</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1963" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1963" source="CVE"/>
    <description>
    The Content Security Policy (CSP) functionality in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 does not properly restrict the strings placed into the blocked-uri parameter of a violation report, which allows remote web servers to capture OpenID credentials and OAuth 2.0 access tokens by triggering a violation.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1963.html">CVE-2012-1963</cve>
<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1964</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1964" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1964" source="CVE"/>
    <description>
    The certificate-warning functionality in browser/components/certerror/content/aboutCertError.xhtml in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.10 does not properly handle attempted clickjacking of the about:certerror page, which allows man-in-the-middle attackers to trick users into adding an unintended exception via an IFRAME element.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1964.html">CVE-2012-1964</cve>
<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1965</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1965" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1965" source="CVE"/>
    <description>
    Mozilla Firefox 4.x through 13.0 and Firefox ESR 10.x before 10.0.6 do not properly establish the security context of a feed: URL, which allows remote attackers to bypass unspecified cross-site scripting (XSS) protection mechanisms via a feed:javascript: URL.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1965.html">CVE-2012-1965</cve>
<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1966</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1966" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1966" source="CVE"/>
    <description>
    Mozilla Firefox 4.x through 13.0 and Firefox ESR 10.x before 10.0.6 do not have the same context-menu restrictions for data: URLs as for javascript: URLs, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1966.html">CVE-2012-1966</cve>
<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1967</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1967" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1967" source="CVE"/>
    <description>
    Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 do not properly implement the JavaScript sandbox utility, which allows remote attackers to execute arbitrary JavaScript code with improper privileges via a javascript: URL.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1967.html">CVE-2012-1967</cve>
<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1970</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1970" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1970" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1970.html">CVE-2012-1970</cve>
<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1972</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1972" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1972" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsHTMLEditor::CollapseAdjacentTextNodes function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1972.html">CVE-2012-1972</cve>
<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1973</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1973" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1973" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsObjectLoadingContent::LoadObject function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1973.html">CVE-2012-1973</cve>
<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1974</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1974" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1974" source="CVE"/>
    <description>
    Use-after-free vulnerability in the gfxTextRun::CanBreakLineBefore function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1974.html">CVE-2012-1974</cve>
<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1975</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1975" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1975" source="CVE"/>
    <description>
    Use-after-free vulnerability in the PresShell::CompleteMove function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1975.html">CVE-2012-1975</cve>
<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1976</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1976" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1976" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsHTMLSelectElement::SubmitNamesValues function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1976.html">CVE-2012-1976</cve>
<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1987</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1987" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1987" source="CVE"/>
    <description>
    Unspecified vulnerability in Puppet 2.6.x before 2.6.15 and 2.7.x before 2.7.13, and Puppet Enterprise (PE) Users 1.0, 1.1, 1.2.x, 2.0.x, and 2.5.x before 2.5.1 allows remote authenticated users with agent SSL keys to (1) cause a denial of service (memory consumption) via a REST request to a stream that triggers a thread block, as demonstrated using CVE-2012-1986 and /dev/random; or (2) cause a denial of service (filesystem consumption) via crafted REST requests that use "a marshaled form of a Puppet::FileBucket::File object" to write to arbitrary file locations.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1987.html">CVE-2012-1987</cve>
<bugzilla href="https://bugzilla.suse.com/755870">SUSE bug 755870</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199754" comment="puppet-2.6.18-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199755" comment="puppet-server-2.6.18-0.4 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1988</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1988" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1988" source="CVE"/>
    <description>
    Puppet 2.6.x before 2.6.15 and 2.7.x before 2.7.13, and Puppet Enterprise (PE) Users 1.0, 1.1, 1.2.x, 2.0.x, and 2.5.x before 2.5.1 allows remote authenticated users with agent SSL keys and file-creation permissions on the puppet master to execute arbitrary commands by creating a file whose full pathname contains shell metacharacters, then performing a filebucket request.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1988.html">CVE-2012-1988</cve>
<bugzilla href="https://bugzilla.suse.com/755869">SUSE bug 755869</bugzilla>
<bugzilla href="https://bugzilla.suse.com/757047">SUSE bug 757047</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199754" comment="puppet-2.6.18-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199755" comment="puppet-server-2.6.18-0.4 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1989</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-1989" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1989" source="CVE"/>
    <description>
    telnet.rb in Puppet 2.7.x before 2.7.13 and Puppet Enterprise (PE) 1.2.x, 2.0.x, and 2.5.x before 2.5.1 allows local users to overwrite arbitrary files via a symlink attack on the NET::Telnet connection log (/tmp/out.log).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1989.html">CVE-2012-1989</cve>
<bugzilla href="https://bugzilla.suse.com/755871">SUSE bug 755871</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199754" comment="puppet-2.6.18-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199755" comment="puppet-server-2.6.18-0.4 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2088</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-2088" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2088" source="CVE"/>
    <description>
    Integer signedness error in the TIFFReadDirectory function in tif_dirread.c in libtiff 3.9.4 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a negative tile depth in a tiff image, which triggers an improper conversion between signed and unsigned types, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2088.html">CVE-2012-2088</cve>
<bugzilla href="https://bugzilla.suse.com/767854">SUSE bug 767854</bugzilla>
<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199680" comment="libtiff3-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199681" comment="libtiff3-32bit-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199682" comment="libtiff3-x86-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199683" comment="tiff-3.8.2-141.152 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2098</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-2098" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2098" source="CVE"/>
    <description>
    Algorithmic complexity vulnerability in the sorting algorithms in bzip2 compressing stream (BZip2CompressorOutputStream) in Apache Commons Compress before 1.4.1 allows remote attackers to cause a denial of service (CPU consumption) via a file with many repeating inputs.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2098.html">CVE-2012-2098</cve>
<bugzilla href="https://bugzilla.suse.com/763820">SUSE bug 763820</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199286" comment="ant-1.7.1-20.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199287" comment="ant-trax-1.7.1-16.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2110</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-2110" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2110" source="CVE"/>
    <description>
    The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in OpenSSL before 0.9.8v, 1.0.0 before 1.0.0i, and 1.0.1 before 1.0.1a does not properly interpret integer data, which allows remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2110.html">CVE-2012-2110</cve>
<bugzilla href="https://bugzilla.suse.com/758060">SUSE bug 758060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/778825">SUSE bug 778825</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199638" comment="libopenssl0_9_8-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199639" comment="libopenssl0_9_8-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199640" comment="libopenssl0_9_8-hmac-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199641" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199642" comment="libopenssl0_9_8-x86-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199643" comment="openssl-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199644" comment="openssl-doc-0.9.8j-0.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2111</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-2111" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2111" source="CVE"/>
    <description>
    The (1) CreateAccount, (2) OpenAccount, (3) AddAccountRights, and (4) RemoveAccountRights LSA RPC procedures in smbd in Samba 3.4.x before 3.4.17, 3.5.x before 3.5.15, and 3.6.x before 3.6.5 do not properly restrict modifications to the privileges database, which allows remote authenticated users to obtain the "take ownership" privilege via an LSA connection.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2111.html">CVE-2012-2111</cve>
<bugzilla href="https://bugzilla.suse.com/754443">SUSE bug 754443</bugzilla>
<bugzilla href="https://bugzilla.suse.com/757576">SUSE bug 757576</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199555" comment="ldapsmb-1.34b-12.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199556" comment="libldb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199557" comment="libsmbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199558" comment="libsmbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199559" comment="libsmbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199560" comment="libtalloc2-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199561" comment="libtalloc2-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199562" comment="libtalloc2-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199563" comment="libtdb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199564" comment="libtdb1-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199565" comment="libtdb1-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199566" comment="libtevent0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199567" comment="libwbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199568" comment="libwbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199569" comment="libwbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199570" comment="samba-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199571" comment="samba-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199572" comment="samba-client-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199573" comment="samba-client-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199574" comment="samba-client-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199575" comment="samba-krb-printing-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199576" comment="samba-winbind-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199577" comment="samba-winbind-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199578" comment="samba-winbind-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199579" comment="samba-x86-3.6.3-0.39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2113</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-2113" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2113" source="CVE"/>
    <description>
    Multiple integer overflows in tiff2pdf in libtiff before 4.0.2 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted tiff image, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2113.html">CVE-2012-2113</cve>
<bugzilla href="https://bugzilla.suse.com/767852">SUSE bug 767852</bugzilla>
<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199680" comment="libtiff3-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199681" comment="libtiff3-32bit-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199682" comment="libtiff3-x86-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199683" comment="tiff-3.8.2-141.152 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2119</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-2119" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2119" source="CVE"/>
    <description>
    Buffer overflow in the macvtap device driver in the Linux kernel before 3.4.5, when running in certain configurations, allows privileged KVM guest users to cause a denial of service (crash) via a long descriptor with a long vector length.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2119.html">CVE-2012-2119</cve>
<bugzilla href="https://bugzilla.suse.com/758243">SUSE bug 758243</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2122</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-2122" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2122" source="CVE"/>
    <description>
    sql/password.c in Oracle MySQL 5.1.x before 5.1.63, 5.5.x before 5.5.24, and 5.6.x before 5.6.6, and MariaDB 5.1.x before 5.1.62, 5.2.x before 5.2.12, 5.3.x before 5.3.6, and 5.5.x before 5.5.23, when running in certain environments with certain implementations of the memcmp function, allows remote attackers to bypass authentication by repeatedly authenticating with the same incorrect password, which eventually causes a token comparison to succeed due to an improperly-checked return value.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2122.html">CVE-2012-2122</cve>
<bugzilla href="https://bugzilla.suse.com/765092">SUSE bug 765092</bugzilla>
<bugzilla href="https://bugzilla.suse.com/766428">SUSE bug 766428</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199635" comment="mysql-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199636" comment="mysql-client-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199637" comment="mysql-tools-5.5.31-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2131</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-2131" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2131" source="CVE"/>
    <description>
    Multiple integer signedness errors in crypto/buffer/buffer.c in OpenSSL 0.9.8v allow remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-2110.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2131.html">CVE-2012-2131</cve>
<bugzilla href="https://bugzilla.suse.com/758060">SUSE bug 758060</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199638" comment="libopenssl0_9_8-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199639" comment="libopenssl0_9_8-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199640" comment="libopenssl0_9_8-hmac-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199641" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199642" comment="libopenssl0_9_8-x86-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199643" comment="openssl-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199644" comment="openssl-doc-0.9.8j-0.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2132</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-2132" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2132" source="CVE"/>
    <description>
    libsoup 2.32.2 and earlier does not validate certificates or clear the trust flag when the ssl-ca-file does not exist, which allows remote attackers to bypass authentication by connecting with a SSL connection.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2132.html">CVE-2012-2132</cve>
<bugzilla href="https://bugzilla.suse.com/758431">SUSE bug 758431</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199672" comment="libsoup-2_4-1-2.32.2-4.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199673" comment="libsoup-2_4-1-32bit-2.32.2-4.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199674" comment="libsoup-2_4-1-x86-2.32.2-4.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2133</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-2133" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2133" source="CVE"/>
    <description>
    Use-after-free vulnerability in the Linux kernel before 3.3.6, when huge pages are enabled, allows local users to cause a denial of service (system crash) or possibly gain privileges by interacting with a hugetlbfs filesystem, as demonstrated by a umount operation that triggers improper handling of quota data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2133.html">CVE-2012-2133</cve>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/758532">SUSE bug 758532</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2136</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-2136" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2136" source="CVE"/>
    <description>
    The sock_alloc_send_pskb function in net/core/sock.c in the Linux kernel before 3.4.5 does not properly validate a certain length value, which allows local users to cause a denial of service (heap-based buffer overflow and system crash) or possibly gain privileges by leveraging access to a TUN/TAP device.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2136.html">CVE-2012-2136</cve>
<bugzilla href="https://bugzilla.suse.com/765320">SUSE bug 765320</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2137</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-2137" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2137" source="CVE"/>
    <description>
    Buffer overflow in virt/kvm/irq_comm.c in the KVM subsystem in the Linux kernel before 3.2.24 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to Message Signaled Interrupts (MSI), irq routing entries, and an incorrect check by the setup_routing_entry function before invoking the kvm_set_irq function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2137.html">CVE-2012-2137</cve>
<bugzilla href="https://bugzilla.suse.com/767612">SUSE bug 767612</bugzilla>
<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2141</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-2141" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2141" source="CVE"/>
    <description>
    Array index error in the handle_nsExtendOutput2Table function in agent/mibgroup/agent/extend.c in Net-SNMP 5.7.1 allows remote authenticated users to cause a denial of service (out-of-bounds read and snmpd crash) via an SNMP GET request for an entry not in the extension table.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2141.html">CVE-2012-2141</cve>
<bugzilla href="https://bugzilla.suse.com/759352">SUSE bug 759352</bugzilla>
<bugzilla href="https://bugzilla.suse.com/826684">SUSE bug 826684</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199666" comment="libsnmp15-5.4.2.1-8.12.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199667" comment="libsnmp15-32bit-5.4.2.1-8.12.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199668" comment="libsnmp15-x86-5.4.2.1-8.12.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199669" comment="net-snmp-5.4.2.1-8.12.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199670" comment="perl-SNMP-5.4.2.1-8.12.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199671" comment="snmp-mibs-5.4.2.1-8.12.16 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-2143" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2143" source="CVE"/>
    <description>
    The crypt_des (aka DES-based crypt) function in FreeBSD before 9.0-RELEASE-p2, as used in PHP, PostgreSQL, and other products, does not process the complete cleartext password if this password contains a 0x80 character, which makes it easier for context-dependent attackers to obtain access via an authentication attempt with an initial substring of the intended password, as demonstrated by a Unicode password.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2143.html">CVE-2012-2143</cve>
<bugzilla href="https://bugzilla.suse.com/766797">SUSE bug 766797</bugzilla>
<bugzilla href="https://bugzilla.suse.com/766798">SUSE bug 766798</bugzilla>
<bugzilla href="https://bugzilla.suse.com/766799">SUSE bug 766799</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199294" comment="apache2-mod_php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199295" comment="php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199296" comment="php53-bcmath-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199297" comment="php53-bz2-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199298" comment="php53-calendar-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199299" comment="php53-ctype-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199300" comment="php53-curl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199301" comment="php53-dba-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199302" comment="php53-dom-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199303" comment="php53-exif-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199304" comment="php53-fastcgi-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199305" comment="php53-fileinfo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199306" comment="php53-ftp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199307" comment="php53-gd-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199308" comment="php53-gettext-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199309" comment="php53-gmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199310" comment="php53-iconv-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199311" comment="php53-intl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199312" comment="php53-json-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199313" comment="php53-ldap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199314" comment="php53-mbstring-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199315" comment="php53-mcrypt-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199316" comment="php53-mysql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199317" comment="php53-odbc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199318" comment="php53-openssl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199319" comment="php53-pcntl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199320" comment="php53-pdo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199321" comment="php53-pear-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199322" comment="php53-pgsql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199323" comment="php53-pspell-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199324" comment="php53-shmop-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199325" comment="php53-snmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199326" comment="php53-soap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199327" comment="php53-suhosin-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199328" comment="php53-sysvmsg-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199329" comment="php53-sysvsem-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199330" comment="php53-sysvshm-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199331" comment="php53-tokenizer-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199332" comment="php53-wddx-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199333" comment="php53-xmlreader-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199334" comment="php53-xmlrpc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199335" comment="php53-xmlwriter-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199336" comment="php53-xsl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199337" comment="php53-zip-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199338" comment="php53-zlib-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199750" comment="postgresql-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199751" comment="postgresql-contrib-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199752" comment="postgresql-docs-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199753" comment="postgresql-server-8.3.23-0.4 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2150</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2012-2150" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2150" source="CVE"/>
    <description>
    xfs_metadump in xfsprogs before 3.2.4 does not properly obfuscate file data, which allows remote attackers to obtain sensitive information by reading a generated image.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2150.html">CVE-2012-2150</cve>
<bugzilla href="https://bugzilla.suse.com/939367">SUSE bug 939367</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202122" comment="xfsprogs-3.1.8-0.7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2311</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-2311" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2311" source="CVE"/>
    <description>
    sapi/cgi/cgi_main.c in PHP before 5.3.13 and 5.4.x before 5.4.3, when configured as a CGI script (aka php-cgi), does not properly handle query strings that contain a %3D sequence but no = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'd' case.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1823.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2311.html">CVE-2012-2311</cve>
<bugzilla href="https://bugzilla.suse.com/760536">SUSE bug 760536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/761631">SUSE bug 761631</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199294" comment="apache2-mod_php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199295" comment="php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199296" comment="php53-bcmath-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199297" comment="php53-bz2-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199298" comment="php53-calendar-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199299" comment="php53-ctype-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199300" comment="php53-curl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199301" comment="php53-dba-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199302" comment="php53-dom-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199303" comment="php53-exif-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199304" comment="php53-fastcgi-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199305" comment="php53-fileinfo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199306" comment="php53-ftp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199307" comment="php53-gd-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199308" comment="php53-gettext-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199309" comment="php53-gmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199310" comment="php53-iconv-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199311" comment="php53-intl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199312" comment="php53-json-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199313" comment="php53-ldap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199314" comment="php53-mbstring-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199315" comment="php53-mcrypt-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199316" comment="php53-mysql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199317" comment="php53-odbc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199318" comment="php53-openssl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199319" comment="php53-pcntl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199320" comment="php53-pdo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199321" comment="php53-pear-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199322" comment="php53-pgsql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199323" comment="php53-pspell-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199324" comment="php53-shmop-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199325" comment="php53-snmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199326" comment="php53-soap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199327" comment="php53-suhosin-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199328" comment="php53-sysvmsg-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199329" comment="php53-sysvsem-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199330" comment="php53-sysvshm-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199331" comment="php53-tokenizer-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199332" comment="php53-wddx-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199333" comment="php53-xmlreader-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199334" comment="php53-xmlrpc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199335" comment="php53-xmlwriter-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199336" comment="php53-xsl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199337" comment="php53-zip-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199338" comment="php53-zlib-5.3.17-0.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122333" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2333</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-2333" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2333" source="CVE"/>
    <description>
    Integer underflow in OpenSSL before 0.9.8x, 1.0.0 before 1.0.0j, and 1.0.1 before 1.0.1c, when TLS 1.1, TLS 1.2, or DTLS is used with CBC encryption, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted TLS packet that is not properly handled during a certain explicit IV calculation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2333.html">CVE-2012-2333</cve>
<bugzilla href="https://bugzilla.suse.com/761838">SUSE bug 761838</bugzilla>
<bugzilla href="https://bugzilla.suse.com/763341">SUSE bug 763341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199638" comment="libopenssl0_9_8-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199639" comment="libopenssl0_9_8-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199640" comment="libopenssl0_9_8-hmac-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199641" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199642" comment="libopenssl0_9_8-x86-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199643" comment="openssl-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199644" comment="openssl-doc-0.9.8j-0.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2335</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-2335" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2335" source="CVE"/>
    <description>
    php-wrapper.fcgi does not properly handle command-line arguments, which allows remote attackers to bypass a protection mechanism in PHP 5.3.12 and 5.4.2 and execute arbitrary code by leveraging improper interaction between the PHP sapi/cgi/cgi_main.c component and a query string beginning with a +- sequence.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2335.html">CVE-2012-2335</cve>
<bugzilla href="https://bugzilla.suse.com/761631">SUSE bug 761631</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199294" comment="apache2-mod_php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199295" comment="php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199296" comment="php53-bcmath-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199297" comment="php53-bz2-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199298" comment="php53-calendar-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199299" comment="php53-ctype-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199300" comment="php53-curl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199301" comment="php53-dba-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199302" comment="php53-dom-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199303" comment="php53-exif-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199304" comment="php53-fastcgi-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199305" comment="php53-fileinfo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199306" comment="php53-ftp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199307" comment="php53-gd-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199308" comment="php53-gettext-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199309" comment="php53-gmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199310" comment="php53-iconv-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199311" comment="php53-intl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199312" comment="php53-json-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199313" comment="php53-ldap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199314" comment="php53-mbstring-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199315" comment="php53-mcrypt-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199316" comment="php53-mysql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199317" comment="php53-odbc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199318" comment="php53-openssl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199319" comment="php53-pcntl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199320" comment="php53-pdo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199321" comment="php53-pear-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199322" comment="php53-pgsql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199323" comment="php53-pspell-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199324" comment="php53-shmop-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199325" comment="php53-snmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199326" comment="php53-soap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199327" comment="php53-suhosin-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199328" comment="php53-sysvmsg-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199329" comment="php53-sysvsem-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199330" comment="php53-sysvshm-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199331" comment="php53-tokenizer-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199332" comment="php53-wddx-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199333" comment="php53-xmlreader-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199334" comment="php53-xmlrpc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199335" comment="php53-xmlwriter-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199336" comment="php53-xsl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199337" comment="php53-zip-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199338" comment="php53-zlib-5.3.17-0.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2336</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-2336" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2336" source="CVE"/>
    <description>
    sapi/cgi/cgi_main.c in PHP before 5.3.13 and 5.4.x before 5.4.3, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to cause a denial of service (resource consumption) by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'T' case.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1823.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2336.html">CVE-2012-2336</cve>
<bugzilla href="https://bugzilla.suse.com/761631">SUSE bug 761631</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199294" comment="apache2-mod_php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199295" comment="php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199296" comment="php53-bcmath-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199297" comment="php53-bz2-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199298" comment="php53-calendar-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199299" comment="php53-ctype-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199300" comment="php53-curl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199301" comment="php53-dba-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199302" comment="php53-dom-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199303" comment="php53-exif-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199304" comment="php53-fastcgi-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199305" comment="php53-fileinfo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199306" comment="php53-ftp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199307" comment="php53-gd-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199308" comment="php53-gettext-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199309" comment="php53-gmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199310" comment="php53-iconv-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199311" comment="php53-intl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199312" comment="php53-json-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199313" comment="php53-ldap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199314" comment="php53-mbstring-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199315" comment="php53-mcrypt-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199316" comment="php53-mysql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199317" comment="php53-odbc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199318" comment="php53-openssl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199319" comment="php53-pcntl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199320" comment="php53-pdo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199321" comment="php53-pear-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199322" comment="php53-pgsql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199323" comment="php53-pspell-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199324" comment="php53-shmop-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199325" comment="php53-snmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199326" comment="php53-soap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199327" comment="php53-suhosin-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199328" comment="php53-sysvmsg-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199329" comment="php53-sysvsem-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199330" comment="php53-sysvshm-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199331" comment="php53-tokenizer-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199332" comment="php53-wddx-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199333" comment="php53-xmlreader-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199334" comment="php53-xmlrpc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199335" comment="php53-xmlwriter-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199336" comment="php53-xsl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199337" comment="php53-zip-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199338" comment="php53-zlib-5.3.17-0.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2337</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-2337" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2337" source="CVE"/>
    <description>
    sudo 1.6.x and 1.7.x before 1.7.9p1, and 1.8.x before 1.8.4p5, does not properly support configurations that use a netmask syntax, which allows local users to bypass intended command restrictions in opportunistic circumstances by executing a command on a host that has an IPv4 address.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2337.html">CVE-2012-2337</cve>
<bugzilla href="https://bugzilla.suse.com/762327">SUSE bug 762327</bugzilla>
<bugzilla href="https://bugzilla.suse.com/826687">SUSE bug 826687</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199787" comment="sudo-1.7.6p2-0.17 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2370</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-2370" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2370" source="CVE"/>
    <description>
    Multiple integer overflows in the read_bitmap_file_data function in io-xbm.c in gdk-pixbuf before 2.26.1 allow remote attackers to cause a denial of service (application crash) via a negative (1) height or (2) width in an XBM file, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2370.html">CVE-2012-2370</cve>
<bugzilla href="https://bugzilla.suse.com/762735">SUSE bug 762735</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199485" comment="gtk2-2.18.9-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199486" comment="gtk2-32bit-2.18.9-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199487" comment="gtk2-doc-2.18.9-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199488" comment="gtk2-lang-2.18.9-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199489" comment="gtk2-x86-2.18.9-0.23 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2372</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2012-2372" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2372" source="CVE"/>
    <description>
    The rds_ib_xmit function in net/rds/ib_send.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel 3.7.4 and earlier allows local users to cause a denial of service (BUG_ON and kernel panic) by establishing an RDS connection with the source IP address equal to the IPoIB interface's own IP address, as demonstrated by rds-ping.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2372.html">CVE-2012-2372</cve>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/767610">SUSE bug 767610</bugzilla>
<bugzilla href="https://bugzilla.suse.com/795039">SUSE bug 795039</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213024" comment="kernel-default-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213025" comment="kernel-default-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213026" comment="kernel-default-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213028" comment="kernel-source-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213029" comment="kernel-syms-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213088" comment="kernel-trace-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213089" comment="kernel-trace-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213030" comment="kernel-trace-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213031" comment="kernel-xen-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213032" comment="kernel-xen-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213033" comment="kernel-xen-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2373</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-2373" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2373" source="CVE"/>
    <description>
    The Linux kernel before 3.4.5 on the x86 platform, when Physical Address Extension (PAE) is enabled, does not properly use the Page Middle Directory (PMD), which allows local users to cause a denial of service (panic) via a crafted application that triggers a race condition.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2373.html">CVE-2012-2373</cve>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/762991">SUSE bug 762991</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2386</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-2386" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2386" source="CVE"/>
    <description>
    Integer overflow in the phar_parse_tarfile function in tar.c in the phar extension in PHP before 5.3.14 and 5.4.x before 5.4.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted tar file that triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2386.html">CVE-2012-2386</cve>
<bugzilla href="https://bugzilla.suse.com/763814">SUSE bug 763814</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199294" comment="apache2-mod_php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199295" comment="php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199296" comment="php53-bcmath-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199297" comment="php53-bz2-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199298" comment="php53-calendar-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199299" comment="php53-ctype-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199300" comment="php53-curl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199301" comment="php53-dba-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199302" comment="php53-dom-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199303" comment="php53-exif-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199304" comment="php53-fastcgi-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199305" comment="php53-fileinfo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199306" comment="php53-ftp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199307" comment="php53-gd-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199308" comment="php53-gettext-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199309" comment="php53-gmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199310" comment="php53-iconv-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199311" comment="php53-intl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199312" comment="php53-json-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199313" comment="php53-ldap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199314" comment="php53-mbstring-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199315" comment="php53-mcrypt-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199316" comment="php53-mysql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199317" comment="php53-odbc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199318" comment="php53-openssl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199319" comment="php53-pcntl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199320" comment="php53-pdo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199321" comment="php53-pear-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199322" comment="php53-pgsql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199323" comment="php53-pspell-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199324" comment="php53-shmop-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199325" comment="php53-snmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199326" comment="php53-soap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199327" comment="php53-suhosin-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199328" comment="php53-sysvmsg-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199329" comment="php53-sysvsem-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199330" comment="php53-sysvshm-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199331" comment="php53-tokenizer-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199332" comment="php53-wddx-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199333" comment="php53-xmlreader-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199334" comment="php53-xmlrpc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199335" comment="php53-xmlwriter-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199336" comment="php53-xsl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199337" comment="php53-zip-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199338" comment="php53-zlib-5.3.17-0.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2390</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-2390" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2390" source="CVE"/>
    <description>
    Memory leak in mm/hugetlb.c in the Linux kernel before 3.4.2 allows local users to cause a denial of service (memory consumption or system crash) via invalid MAP_HUGETLB mmap operations.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2390.html">CVE-2012-2390</cve>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/764150">SUSE bug 764150</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2392</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-2392" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2392" source="CVE"/>
    <description>
    Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 allows remote attackers to cause a denial of service (infinite loop) via vectors related to the (1) ANSI MAP, (2) ASF, (3) IEEE 802.11, (4) IEEE 802.3, and (5) LTP dissectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2392.html">CVE-2012-2392</cve>
<bugzilla href="https://bugzilla.suse.com/763634">SUSE bug 763634</bugzilla>
<bugzilla href="https://bugzilla.suse.com/763855">SUSE bug 763855</bugzilla>
<bugzilla href="https://bugzilla.suse.com/769578">SUSE bug 769578</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2393</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-2393" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2393" source="CVE"/>
    <description>
    epan/dissectors/packet-diameter.c in the DIAMETER dissector in Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 does not properly construct certain array data structures, which allows remote attackers to cause a denial of service (application crash) via a crafted packet that triggers incorrect memory allocation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2393.html">CVE-2012-2393</cve>
<bugzilla href="https://bugzilla.suse.com/763634">SUSE bug 763634</bugzilla>
<bugzilla href="https://bugzilla.suse.com/763855">SUSE bug 763855</bugzilla>
<bugzilla href="https://bugzilla.suse.com/763857">SUSE bug 763857</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122394" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2394</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-2394" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2394" source="CVE"/>
    <description>
    Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 on the SPARC and Itanium platforms does not properly perform data alignment for a certain structure member, which allows remote attackers to cause a denial of service (application crash) via a (1) ICMP or (2) ICMPv6 Echo Request packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2394.html">CVE-2012-2394</cve>
<bugzilla href="https://bugzilla.suse.com/763634">SUSE bug 763634</bugzilla>
<bugzilla href="https://bugzilla.suse.com/763859">SUSE bug 763859</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2625</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-2625" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2625" source="CVE"/>
    <description>
    The PyGrub boot loader in Xen unstable before changeset 25589:60f09d1ab1fe, 4.2.x, and 4.1.x allows local para-virtualized guest users to cause a denial of service (memory consumption) via a large (1) bzip2 or (2) lzma compressed kernel image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2625.html">CVE-2012-2625</cve>
<bugzilla href="https://bugzilla.suse.com/762484">SUSE bug 762484</bugzilla>
<bugzilla href="https://bugzilla.suse.com/773393">SUSE bug 773393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/773401">SUSE bug 773401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/787163">SUSE bug 787163</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199814" comment="xen-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199815" comment="xen-doc-html-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199816" comment="xen-doc-pdf-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199817" comment="xen-kmp-default-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199818" comment="xen-kmp-pae-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199819" comment="xen-libs-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199820" comment="xen-libs-32bit-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199821" comment="xen-tools-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199822" comment="xen-tools-domU-4.2.2_04-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2652</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-2652" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2652" source="CVE"/>
    <description>
    The bdrv_open function in Qemu 1.0 does not properly handle the failure of the mkstemp function, when in snapshot node, which allows local users to overwrite or read arbitrary files via a symlink attack on an unspecified temporary file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2652.html">CVE-2012-2652</cve>
<bugzilla href="https://bugzilla.suse.com/764526">SUSE bug 764526</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199554" comment="kvm-1.4.1-0.11 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2655</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-2655" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2655" source="CVE"/>
    <description>
    PostgreSQL 8.3.x before 8.3.19, 8.4.x before 8.4.12, 9.0.x before 9.0.8, and 9.1.x before 9.1.4 allows remote authenticated users to cause a denial of service (server crash) by adding the (1) SECURITY DEFINER or (2) SET attributes to a procedural language's call handler.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2655.html">CVE-2012-2655</cve>
<bugzilla href="https://bugzilla.suse.com/765069">SUSE bug 765069</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199750" comment="postgresql-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199751" comment="postgresql-contrib-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199752" comment="postgresql-docs-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199753" comment="postgresql-server-8.3.23-0.4 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2663</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-2663" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2663" source="CVE"/>
    <description>
    extensions/libxt_tcp.c in iptables through 1.4.21 does not match TCP SYN+FIN packets in --syn rules, which might allow remote attackers to bypass intended firewall restrictions via crafted packets.  NOTE: the CVE-2012-6638 fix makes this issue less relevant.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2663.html">CVE-2012-2663</cve>
<bugzilla href="https://bugzilla.suse.com/765102">SUSE bug 765102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/765488">SUSE bug 765488</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2669</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-2669" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2669" source="CVE"/>
    <description>
    The main function in tools/hv/hv_kvp_daemon.c in hypervkvpd, as distributed in the Linux kernel before 3.4.5, does not validate the origin of Netlink messages, which allows local users to spoof Netlink communication via a crafted connector message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2669.html">CVE-2012-2669</cve>
<bugzilla href="https://bugzilla.suse.com/761200">SUSE bug 761200</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199495" comment="hyper-v-5-0.7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2687</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-2687" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2687" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in the make_variant_list function in mod_negotiation.c in the mod_negotiation module in the Apache HTTP Server 2.4.x before 2.4.3, when the MultiViews option is enabled, allow remote attackers to inject arbitrary web script or HTML via a crafted filename that is not properly handled during construction of a variant list.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2687.html">CVE-2012-2687</cve>
<bugzilla href="https://bugzilla.suse.com/777260">SUSE bug 777260</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199288" comment="apache2-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199289" comment="apache2-doc-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199290" comment="apache2-example-pages-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199291" comment="apache2-prefork-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199292" comment="apache2-utils-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199293" comment="apache2-worker-2.2.12-1.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2688</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-2688" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2688" source="CVE"/>
    <description>
    Unspecified vulnerability in the _php_stream_scandir function in the stream implementation in PHP before 5.3.15 and 5.4.x before 5.4.5 has unknown impact and remote attack vectors, related to an "overflow."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2688.html">CVE-2012-2688</cve>
<bugzilla href="https://bugzilla.suse.com/772582">SUSE bug 772582</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199294" comment="apache2-mod_php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199295" comment="php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199296" comment="php53-bcmath-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199297" comment="php53-bz2-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199298" comment="php53-calendar-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199299" comment="php53-ctype-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199300" comment="php53-curl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199301" comment="php53-dba-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199302" comment="php53-dom-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199303" comment="php53-exif-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199304" comment="php53-fastcgi-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199305" comment="php53-fileinfo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199306" comment="php53-ftp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199307" comment="php53-gd-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199308" comment="php53-gettext-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199309" comment="php53-gmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199310" comment="php53-iconv-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199311" comment="php53-intl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199312" comment="php53-json-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199313" comment="php53-ldap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199314" comment="php53-mbstring-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199315" comment="php53-mcrypt-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199316" comment="php53-mysql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199317" comment="php53-odbc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199318" comment="php53-openssl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199319" comment="php53-pcntl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199320" comment="php53-pdo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199321" comment="php53-pear-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199322" comment="php53-pgsql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199323" comment="php53-pspell-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199324" comment="php53-shmop-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199325" comment="php53-snmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199326" comment="php53-soap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199327" comment="php53-suhosin-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199328" comment="php53-sysvmsg-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199329" comment="php53-sysvsem-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199330" comment="php53-sysvshm-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199331" comment="php53-tokenizer-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199332" comment="php53-wddx-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199333" comment="php53-xmlreader-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199334" comment="php53-xmlrpc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199335" comment="php53-xmlwriter-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199336" comment="php53-xsl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199337" comment="php53-zip-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199338" comment="php53-zlib-5.3.17-0.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2733</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-2733" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2733" source="CVE"/>
    <description>
    java/org/apache/coyote/http11/InternalNioInputBuffer.java in the HTTP NIO connector in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.28 does not properly restrict the request-header size, which allows remote attackers to cause a denial of service (memory consumption) via a large amount of header data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2733.html">CVE-2012-2733</cve>
<bugzilla href="https://bugzilla.suse.com/789406">SUSE bug 789406</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199802" comment="tomcat6-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199803" comment="tomcat6-admin-webapps-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199804" comment="tomcat6-docs-webapp-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199805" comment="tomcat6-javadoc-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199806" comment="tomcat6-jsp-2_1-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199807" comment="tomcat6-lib-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199808" comment="tomcat6-servlet-2_5-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199809" comment="tomcat6-webapps-6.0.18-20.35.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-2745" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2745" source="CVE"/>
    <description>
    The copy_creds function in kernel/cred.c in the Linux kernel before 3.3.2 provides an invalid replacement session keyring to a child process, which allows local users to cause a denial of service (panic) via a crafted application that uses the fork system call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2745.html">CVE-2012-2745</cve>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/770695">SUSE bug 770695</bugzilla>
<bugzilla href="https://bugzilla.suse.com/795039">SUSE bug 795039</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2751</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-2751" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2751" source="CVE"/>
    <description>
    ModSecurity before 2.6.6, when used with PHP, does not properly handle single quotes not at the beginning of a request parameter value in the Content-Disposition field of a request with a multipart/form-data Content-Type header, which allows remote attackers to bypass filtering rules and perform other attacks such as cross-site scripting (XSS) attacks.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2009-5031.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2751.html">CVE-2012-2751</cve>
<bugzilla href="https://bugzilla.suse.com/768293">SUSE bug 768293</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199339" comment="apache2-mod_security2-2.7.1-0.2.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-2806" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2806" source="CVE"/>
    <description>
    Heap-based buffer overflow in the get_sos function in jdmarker.c in libjpeg-turbo 1.2.0 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large component count in the header of a JPEG image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2806.html">CVE-2012-2806</cve>
<bugzilla href="https://bugzilla.suse.com/771791">SUSE bug 771791</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199508" comment="jpeg-6b-879.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199509" comment="libjpeg-6.2.0-879.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199510" comment="libjpeg-32bit-6.2.0-879.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199511" comment="libjpeg-x86-6.2.0-879.12 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2807</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-2807" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2807" source="CVE"/>
    <description>
    Multiple integer overflows in libxml2, as used in Google Chrome before 20.0.1132.43 and other products, on 64-bit Linux platforms allow remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2807.html">CVE-2012-2807</cve>
<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/769181">SUSE bug 769181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/769184">SUSE bug 769184</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199702" comment="libxml2-2.7.6-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199703" comment="libxml2-32bit-2.7.6-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199704" comment="libxml2-doc-2.7.6-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199705" comment="libxml2-x86-2.7.6-0.23 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2812</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-2812" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2812" source="CVE"/>
    <description>
    The exif_entry_get_value function in exif-entry.c in the EXIF Tag Parsing Library (aka libexif) before 0.6.21 allows remote attackers to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from process memory via crafted EXIF tags in an image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2812.html">CVE-2012-2812</cve>
<bugzilla href="https://bugzilla.suse.com/771229">SUSE bug 771229</bugzilla>
<bugzilla href="https://bugzilla.suse.com/831515">SUSE bug 831515</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199613" comment="libexif-0.6.17-2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199614" comment="libexif-32bit-0.6.17-2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199615" comment="libexif-x86-0.6.17-2.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2813</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-2813" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2813" source="CVE"/>
    <description>
    The exif_convert_utf16_to_utf8 function in exif-entry.c in the EXIF Tag Parsing Library (aka libexif) before 0.6.21 allows remote attackers to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from process memory via crafted EXIF tags in an image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2813.html">CVE-2012-2813</cve>
<bugzilla href="https://bugzilla.suse.com/771229">SUSE bug 771229</bugzilla>
<bugzilla href="https://bugzilla.suse.com/831515">SUSE bug 831515</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199613" comment="libexif-0.6.17-2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199614" comment="libexif-32bit-0.6.17-2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199615" comment="libexif-x86-0.6.17-2.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-2814" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2814" source="CVE"/>
    <description>
    Buffer overflow in the exif_entry_format_value function in exif-entry.c in the EXIF Tag Parsing Library (aka libexif) 0.6.20 allows remote attackers to cause a denial of service or possibly execute arbitrary code via crafted EXIF tags in an image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2814.html">CVE-2012-2814</cve>
<bugzilla href="https://bugzilla.suse.com/771229">SUSE bug 771229</bugzilla>
<bugzilla href="https://bugzilla.suse.com/831515">SUSE bug 831515</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199613" comment="libexif-0.6.17-2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199614" comment="libexif-32bit-0.6.17-2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199615" comment="libexif-x86-0.6.17-2.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2825</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2012-2825" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2825" source="CVE"/>
    <description>
    The XSL implementation in Google Chrome before 20.0.1132.43 allows remote attackers to cause a denial of service (incorrect read operation) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2825.html">CVE-2012-2825</cve>
<bugzilla href="https://bugzilla.suse.com/769181">SUSE bug 769181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/769182">SUSE bug 769182</bugzilla>
<bugzilla href="https://bugzilla.suse.com/849019">SUSE bug 849019</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200346" comment="libxslt-1.1.24-19.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200347" comment="libxslt-32bit-1.1.24-19.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200348" comment="libxslt-x86-1.1.24-19.23 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200346" comment="libxslt-1.1.24-19.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200347" comment="libxslt-32bit-1.1.24-19.23 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-2836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2836" source="CVE"/>
    <description>
    The exif_data_load_data function in exif-data.c in the EXIF Tag Parsing Library (aka libexif) before 0.6.21 allows remote attackers to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from process memory via crafted EXIF tags in an image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2836.html">CVE-2012-2836</cve>
<bugzilla href="https://bugzilla.suse.com/771229">SUSE bug 771229</bugzilla>
<bugzilla href="https://bugzilla.suse.com/831515">SUSE bug 831515</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199613" comment="libexif-0.6.17-2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199614" comment="libexif-32bit-0.6.17-2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199615" comment="libexif-x86-0.6.17-2.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2837</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-2837" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2837" source="CVE"/>
    <description>
    The mnote_olympus_entry_get_value function in olympus/mnote-olympus-entry.c in the EXIF Tag Parsing Library (aka libexif) before 0.6.21 allows remote attackers to cause a denial of service (divide-by-zero error) via an image with crafted EXIF tags that are not properly handled during the formatting of EXIF maker note tags.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2837.html">CVE-2012-2837</cve>
<bugzilla href="https://bugzilla.suse.com/771229">SUSE bug 771229</bugzilla>
<bugzilla href="https://bugzilla.suse.com/831515">SUSE bug 831515</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199613" comment="libexif-0.6.17-2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199614" comment="libexif-32bit-0.6.17-2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199615" comment="libexif-x86-0.6.17-2.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-2840" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2840" source="CVE"/>
    <description>
    Off-by-one error in the exif_convert_utf16_to_utf8 function in exif-entry.c in the EXIF Tag Parsing Library (aka libexif) before 0.6.21 allows remote attackers to cause a denial of service or possibly execute arbitrary code via crafted EXIF tags in an image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2840.html">CVE-2012-2840</cve>
<bugzilla href="https://bugzilla.suse.com/771229">SUSE bug 771229</bugzilla>
<bugzilla href="https://bugzilla.suse.com/831515">SUSE bug 831515</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199613" comment="libexif-0.6.17-2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199614" comment="libexif-32bit-0.6.17-2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199615" comment="libexif-x86-0.6.17-2.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2841</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-2841" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2841" source="CVE"/>
    <description>
    Integer underflow in the exif_entry_get_value function in exif-entry.c in the EXIF Tag Parsing Library (aka libexif) 0.6.20 might allow remote attackers to execute arbitrary code via vectors involving a crafted buffer-size parameter during the formatting of an EXIF tag, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2841.html">CVE-2012-2841</cve>
<bugzilla href="https://bugzilla.suse.com/771229">SUSE bug 771229</bugzilla>
<bugzilla href="https://bugzilla.suse.com/831515">SUSE bug 831515</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199613" comment="libexif-0.6.17-2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199614" comment="libexif-32bit-0.6.17-2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199615" comment="libexif-x86-0.6.17-2.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2944</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-2944" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2944" source="CVE"/>
    <description>
    Buffer overflow in the addchar function in common/parseconf.c in upsd in Network UPS Tools (NUT) before 2.6.4 allows remote attackers to execute arbitrary code or cause a denial of service (electric-power outage) via a long string containing non-printable characters.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2944.html">CVE-2012-2944</cve>
<bugzilla href="https://bugzilla.suse.com/764699">SUSE bug 764699</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199688" comment="libupsclient1-2.6.2-0.2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199689" comment="nut-2.6.2-0.2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199690" comment="nut-classic-2.6.2-0.2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199691" comment="nut-drivers-net-2.6.2-0.2.4 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3136</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3136" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3136" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Beans, a different vulnerability than CVE-2012-1682.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3136.html">CVE-2012-3136</cve>
<bugzilla href="https://bugzilla.suse.com/777499">SUSE bug 777499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/780897">SUSE bug 780897</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3143" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3143" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to JMX, a different vulnerability than CVE-2012-5089.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3143.html">CVE-2012-3143</cve>
<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3159</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3159" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3159" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2012-1533.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3159.html">CVE-2012-3159</cve>
<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3174</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3174" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3174" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java 7 before Update 11 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2013-0422.  NOTE: some parties have mapped CVE-2012-3174 to an issue involving recursive use of the Reflection API, but that issue is already covered as part of CVE-2013-0422.  This identifier is for a different vulnerability whose details are not public as of 20130114.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3174.html">CVE-2012-3174</cve>
<bugzilla href="https://bugzilla.suse.com/798324">SUSE bug 798324</bugzilla>
<bugzilla href="https://bugzilla.suse.com/798521">SUSE bug 798521</bugzilla>
<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3213</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3213" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3213" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Scripting.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3213.html">CVE-2012-3213</cve>
<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3216</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3216" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3216" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect confidentiality via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3216.html">CVE-2012-3216</cve>
<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3342</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3342" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3342" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3342.html">CVE-2012-3342</cve>
<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3365</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3365" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3365" source="CVE"/>
    <description>
    The SQLite functionality in PHP before 5.3.15 allows remote attackers to bypass the open_basedir protection mechanism via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3365.html">CVE-2012-3365</cve>
<bugzilla href="https://bugzilla.suse.com/772580">SUSE bug 772580</bugzilla>
<bugzilla href="https://bugzilla.suse.com/772582">SUSE bug 772582</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199294" comment="apache2-mod_php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199295" comment="php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199296" comment="php53-bcmath-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199297" comment="php53-bz2-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199298" comment="php53-calendar-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199299" comment="php53-ctype-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199300" comment="php53-curl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199301" comment="php53-dba-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199302" comment="php53-dom-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199303" comment="php53-exif-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199304" comment="php53-fastcgi-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199305" comment="php53-fileinfo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199306" comment="php53-ftp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199307" comment="php53-gd-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199308" comment="php53-gettext-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199309" comment="php53-gmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199310" comment="php53-iconv-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199311" comment="php53-intl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199312" comment="php53-json-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199313" comment="php53-ldap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199314" comment="php53-mbstring-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199315" comment="php53-mcrypt-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199316" comment="php53-mysql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199317" comment="php53-odbc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199318" comment="php53-openssl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199319" comment="php53-pcntl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199320" comment="php53-pdo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199321" comment="php53-pear-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199322" comment="php53-pgsql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199323" comment="php53-pspell-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199324" comment="php53-shmop-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199325" comment="php53-snmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199326" comment="php53-soap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199327" comment="php53-suhosin-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199328" comment="php53-sysvmsg-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199329" comment="php53-sysvsem-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199330" comment="php53-sysvshm-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199331" comment="php53-tokenizer-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199332" comment="php53-wddx-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199333" comment="php53-xmlreader-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199334" comment="php53-xmlrpc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199335" comment="php53-xmlwriter-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199336" comment="php53-xsl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199337" comment="php53-zip-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199338" comment="php53-zlib-5.3.17-0.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3381</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3381" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3381" source="CVE"/>
    <description>
    sfcb in sblim-sfcb places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3381.html">CVE-2012-3381</cve>
<bugzilla href="https://bugzilla.suse.com/770234">SUSE bug 770234</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199781" comment="sblim-sfcb-1.3.11-0.19 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3382</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3382" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3382" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the ProcessRequest function in mcs/class/System.Web/System.Web/HttpForbiddenHandler.cs in Mono 2.10.8 and earlier allows remote attackers to inject arbitrary web script or HTML via a file with a crafted name and a forbidden extension, which is not properly handled in an error message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3382.html">CVE-2012-3382</cve>
<bugzilla href="https://bugzilla.suse.com/769799">SUSE bug 769799</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201239" comment="mono-core-2.6.7-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201240" comment="mono-data-2.6.7-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201243" comment="mono-data-postgresql-2.6.7-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201244" comment="mono-data-sqlite-2.6.7-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201249" comment="mono-locale-extras-2.6.7-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201250" comment="mono-nunit-2.6.7-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201252" comment="mono-web-2.6.7-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201253" comment="mono-winforms-2.6.7-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3386</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2012-3386" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3386" source="CVE"/>
    <description>
    The "make distcheck" rule in GNU Automake before 1.11.6 and 1.12.x before 1.12.2 grants world-writable permissions to the extraction directory, which introduces a race condition that allows local users to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3386.html">CVE-2012-3386</cve>
<bugzilla href="https://bugzilla.suse.com/770618">SUSE bug 770618</bugzilla>
<bugzilla href="https://bugzilla.suse.com/786745">SUSE bug 786745</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199913" comment="automake-1.10.1-4.131.9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3401</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3401" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3401" source="CVE"/>
    <description>
    The t2p_read_tiff_init function in tiff2pdf (tools/tiff2pdf.c) in LibTIFF 4.0.2 and earlier does not properly initialize the T2P context struct pointer in certain error conditions, which allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF image that triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3401.html">CVE-2012-3401</cve>
<bugzilla href="https://bugzilla.suse.com/770816">SUSE bug 770816</bugzilla>
<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199680" comment="libtiff3-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199681" comment="libtiff3-32bit-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199682" comment="libtiff3-x86-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199683" comment="tiff-3.8.2-141.152 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3412</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2012-3412" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3412" source="CVE"/>
    <description>
    The sfc (aka Solarflare Solarstorm) driver in the Linux kernel before 3.2.30 allows remote attackers to cause a denial of service (DMA descriptor consumption and network-controller outage) via crafted TCP packets that trigger a small MSS value.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3412.html">CVE-2012-3412</cve>
<bugzilla href="https://bugzilla.suse.com/774523">SUSE bug 774523</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3425</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3425" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3425" source="CVE"/>
    <description>
    The png_push_read_zTXt function in pngpread.c in libpng 1.0.x before 1.0.58, 1.2.x before 1.2.48, 1.4.x before 1.4.10, and 1.5.x before 1.5.10 allows remote attackers to cause a denial of service (out-of-bounds read) via a large avail_in field value in a PNG image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3425.html">CVE-2012-3425</cve>
<bugzilla href="https://bugzilla.suse.com/772760">SUSE bug 772760</bugzilla>
<bugzilla href="https://bugzilla.suse.com/854395">SUSE bug 854395</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199646" comment="libpng12-0-1.2.31-5.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199647" comment="libpng12-0-32bit-1.2.31-5.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199648" comment="libpng12-0-x86-1.2.31-5.31 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3430</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2012-3430" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3430" source="CVE"/>
    <description>
    The rds_recvmsg function in net/rds/recv.c in the Linux kernel before 3.0.44 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a (1) recvfrom or (2) recvmsg system call on an RDS socket.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3430.html">CVE-2012-3430</cve>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/773383">SUSE bug 773383</bugzilla>
<bugzilla href="https://bugzilla.suse.com/795039">SUSE bug 795039</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3432</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3432" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3432" source="CVE"/>
    <description>
    The handle_mmio function in arch/x86/hvm/io.c in the MMIO operations emulator for Xen 3.3 and 4.x, when running an HVM guest, does not properly reset certain state information between emulation cycles, which allows local guest OS users to cause a denial of service (guest OS crash) via unspecified operations on MMIO regions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3432.html">CVE-2012-3432</cve>
<bugzilla href="https://bugzilla.suse.com/773393">SUSE bug 773393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/773401">SUSE bug 773401</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199814" comment="xen-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199815" comment="xen-doc-html-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199816" comment="xen-doc-pdf-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199817" comment="xen-kmp-default-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199818" comment="xen-kmp-pae-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199819" comment="xen-libs-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199820" comment="xen-libs-32bit-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199821" comment="xen-tools-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199822" comment="xen-tools-domU-4.2.2_04-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3433</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3433" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3433" source="CVE"/>
    <description>
    Xen 4.0 and 4.1 allows local HVM guest OS kernels to cause a denial of service (domain 0 VCPU hang and kernel panic) by modifying the physical address space in a way that triggers excessive shared page search time during the p2m teardown.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3433.html">CVE-2012-3433</cve>
<bugzilla href="https://bugzilla.suse.com/773393">SUSE bug 773393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/773401">SUSE bug 773401</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199814" comment="xen-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199815" comment="xen-doc-html-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199816" comment="xen-doc-pdf-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199817" comment="xen-kmp-default-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199818" comment="xen-kmp-pae-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199819" comment="xen-libs-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199820" comment="xen-libs-32bit-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199821" comment="xen-tools-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199822" comment="xen-tools-domU-4.2.2_04-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3437</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3437" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3437" source="CVE"/>
    <description>
    The Magick_png_malloc function in coders/png.c in ImageMagick 6.7.8 and earlier does not use the proper variable type for the allocation size, which might allow remote attackers to cause a denial of service (crash) via a crafted PNG file that triggers incorrect memory allocation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3437.html">CVE-2012-3437</cve>
<bugzilla href="https://bugzilla.suse.com/773612">SUSE bug 773612</bugzilla>
<bugzilla href="https://bugzilla.suse.com/785093">SUSE bug 785093</bugzilla>
<bugzilla href="https://bugzilla.suse.com/905260">SUSE bug 905260</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199580" comment="libMagickCore1-6.4.3.6-7.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199581" comment="libMagickCore1-32bit-6.4.3.6-7.26 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3445</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3445" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3445" source="CVE"/>
    <description>
    The virTypedParameterArrayClear function in libvirt 0.9.13 does not properly handle virDomain* API calls with typed parameters, which might allow remote authenticated users to cause a denial of service (libvirtd crash) via an RPC command with nparams set to zero, which triggers an out-of-bounds read or a free of an invalid pointer.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3445.html">CVE-2012-3445</cve>
<bugzilla href="https://bugzilla.suse.com/773955">SUSE bug 773955</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199692" comment="libvirt-1.0.5.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199693" comment="libvirt-client-1.0.5.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199694" comment="libvirt-client-32bit-1.0.5.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199695" comment="libvirt-doc-1.0.5.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199696" comment="libvirt-lock-sanlock-1.0.5.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199697" comment="libvirt-python-1.0.5.1-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3461</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3461" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3461" source="CVE"/>
    <description>
    The (1) otrl_base64_otr_decode function in src/b64.c; (2) otrl_proto_data_read_flags and (3) otrl_proto_accept_data functions in src/proto.c; and (4) decode function in toolkit/parse.c in libotr before 3.2.1 allocates a zero-length buffer when decoding a base64 string, which allows remote attackers to cause a denial of service (application crash) via a message with the value "?OTR:===.", which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3461.html">CVE-2012-3461</cve>
<bugzilla href="https://bugzilla.suse.com/777468">SUSE bug 777468</bugzilla>
<bugzilla href="https://bugzilla.suse.com/789190">SUSE bug 789190</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199645" comment="libotr2-3.2.0-10.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3482</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2012-3482" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3482" source="CVE"/>
    <description>
    Fetchmail 5.0.8 through 6.3.21, when using NTLM authentication in debug mode, allows remote NTLM servers to (1) cause a denial of service (crash and delayed delivery of inbound mail) via a crafted NTLM response that triggers an out-of-bounds read in the base64 decoder, or (2) obtain sensitive information from memory via an NTLM Type 2 message with a crafted Target Name structure, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3482.html">CVE-2012-3482</cve>
<bugzilla href="https://bugzilla.suse.com/775988">SUSE bug 775988</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204986" comment="fetchmail-6.3.8.90-13.20.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209236" comment="fetchmailconf-6.3.8.90-13.20.21 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3488</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3488" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3488" source="CVE"/>
    <description>
    The libxslt support in contrib/xml2 in PostgreSQL 8.3 before 8.3.20, 8.4 before 8.4.13, 9.0 before 9.0.9, and 9.1 before 9.1.5 does not properly restrict access to files and URLs, which allows remote authenticated users to modify data, obtain sensitive information, or trigger outbound traffic to arbitrary external hosts by leveraging (1) stylesheet commands that are permitted by the libxslt security options or (2) an xslt_process feature, related to an XML External Entity (aka XXE) issue.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3488.html">CVE-2012-3488</cve>
<bugzilla href="https://bugzilla.suse.com/776523">SUSE bug 776523</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199606" comment="libecpg6-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199607" comment="libpq5-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199608" comment="libpq5-32bit-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199750" comment="postgresql-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199751" comment="postgresql-contrib-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199752" comment="postgresql-docs-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199753" comment="postgresql-server-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199609" comment="postgresql91-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199610" comment="postgresql91-contrib-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199611" comment="postgresql91-docs-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199612" comment="postgresql91-server-9.1.9-0.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3489</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3489" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3489" source="CVE"/>
    <description>
    The xml_parse function in the libxml2 support in the core server component in PostgreSQL 8.3 before 8.3.20, 8.4 before 8.4.13, 9.0 before 9.0.9, and 9.1 before 9.1.5 allows remote authenticated users to determine the existence of arbitrary files or URLs, and possibly obtain file or URL content that triggers a parsing error, via an XML value that refers to (1) a DTD or (2) an entity, related to an XML External Entity (aka XXE) issue.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3489.html">CVE-2012-3489</cve>
<bugzilla href="https://bugzilla.suse.com/776524">SUSE bug 776524</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199606" comment="libecpg6-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199607" comment="libpq5-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199608" comment="libpq5-32bit-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199750" comment="postgresql-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199751" comment="postgresql-contrib-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199752" comment="postgresql-docs-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199753" comment="postgresql-server-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199609" comment="postgresql91-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199610" comment="postgresql91-contrib-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199611" comment="postgresql91-docs-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199612" comment="postgresql91-server-9.1.9-0.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3494</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3494" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3494" source="CVE"/>
    <description>
    The set_debugreg hypercall in include/asm-x86/debugreg.h in Xen 4.0, 4.1, and 4.2, and Citrix XenServer 6.0.2 and earlier, when running on x86-64 systems, allows local OS guest users to cause a denial of service (host crash) by writing to the reserved bits of the DR7 debug control register.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3494.html">CVE-2012-3494</cve>
<bugzilla href="https://bugzilla.suse.com/777090">SUSE bug 777090</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199814" comment="xen-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199815" comment="xen-doc-html-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199816" comment="xen-doc-pdf-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199817" comment="xen-kmp-default-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199818" comment="xen-kmp-pae-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199819" comment="xen-libs-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199820" comment="xen-libs-32bit-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199821" comment="xen-tools-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199822" comment="xen-tools-domU-4.2.2_04-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3495</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3495" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3495" source="CVE"/>
    <description>
    The physdev_get_free_pirq hypercall in arch/x86/physdev.c in Xen 4.1.x and Citrix XenServer 6.0.2 and earlier uses the return value of the get_free_pirq function as an array index without checking that the return value indicates an error, which allows guest OS users to cause a denial of service (invalid memory write and host crash) and possibly gain privileges via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3495.html">CVE-2012-3495</cve>
<bugzilla href="https://bugzilla.suse.com/777088">SUSE bug 777088</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199814" comment="xen-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199815" comment="xen-doc-html-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199816" comment="xen-doc-pdf-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199817" comment="xen-kmp-default-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199818" comment="xen-kmp-pae-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199819" comment="xen-libs-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199820" comment="xen-libs-32bit-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199821" comment="xen-tools-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199822" comment="xen-tools-domU-4.2.2_04-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3496</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3496" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3496" source="CVE"/>
    <description>
    XENMEM_populate_physmap in Xen 4.0, 4.1, and 4.2, and Citrix XenServer 6.0.2 and earlier, when translating paging mode is not used, allows local PV OS guest kernels to cause a denial of service (BUG triggered and host crash) via invalid flags such as MEMF_populate_on_demand.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3496.html">CVE-2012-3496</cve>
<bugzilla href="https://bugzilla.suse.com/777091">SUSE bug 777091</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199814" comment="xen-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199815" comment="xen-doc-html-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199816" comment="xen-doc-pdf-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199817" comment="xen-kmp-default-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199818" comment="xen-kmp-pae-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199819" comment="xen-libs-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199820" comment="xen-libs-32bit-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199821" comment="xen-tools-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199822" comment="xen-tools-domU-4.2.2_04-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3497</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3497" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3497" source="CVE"/>
    <description>
    (1) TMEMC_SAVE_GET_CLIENT_WEIGHT, (2) TMEMC_SAVE_GET_CLIENT_CAP, (3) TMEMC_SAVE_GET_CLIENT_FLAGS and (4) TMEMC_SAVE_END in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 allow local guest OS users to cause a denial of service (NULL pointer dereference or memory corruption and host crash) or possibly have other unspecified impacts via a NULL client id.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3497.html">CVE-2012-3497</cve>
<bugzilla href="https://bugzilla.suse.com/777890">SUSE bug 777890</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199814" comment="xen-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199815" comment="xen-doc-html-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199816" comment="xen-doc-pdf-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199817" comment="xen-kmp-default-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199818" comment="xen-kmp-pae-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199819" comment="xen-libs-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199820" comment="xen-libs-32bit-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199821" comment="xen-tools-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199822" comment="xen-tools-domU-4.2.2_04-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3498</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3498" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3498" source="CVE"/>
    <description>
    PHYSDEVOP_map_pirq in Xen 4.1 and 4.2 and Citrix XenServer 6.0.2 and earlier allows local HVM guest OS kernels to cause a denial of service (host crash) and possibly read hypervisor or guest memory via vectors related to a missing range check of map-&gt;index.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3498.html">CVE-2012-3498</cve>
<bugzilla href="https://bugzilla.suse.com/777086">SUSE bug 777086</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199814" comment="xen-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199815" comment="xen-doc-html-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199816" comment="xen-doc-pdf-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199817" comment="xen-kmp-default-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199818" comment="xen-kmp-pae-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199819" comment="xen-libs-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199820" comment="xen-libs-32bit-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199821" comment="xen-tools-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199822" comment="xen-tools-domU-4.2.2_04-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3499</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3499" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3499" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via vectors involving hostnames and URIs in the (1) mod_imagemap, (2) mod_info, (3) mod_ldap, (4) mod_proxy_ftp, and (5) mod_status modules.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3499.html">CVE-2012-3499</cve>
<bugzilla href="https://bugzilla.suse.com/806458">SUSE bug 806458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/807511">SUSE bug 807511</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199288" comment="apache2-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199289" comment="apache2-doc-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199290" comment="apache2-example-pages-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199291" comment="apache2-prefork-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199292" comment="apache2-utils-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199293" comment="apache2-worker-2.2.12-1.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3515</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3515" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3515" source="CVE"/>
    <description>
    Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3515.html">CVE-2012-3515</cve>
<bugzilla href="https://bugzilla.suse.com/777084">SUSE bug 777084</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199554" comment="kvm-1.4.1-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199814" comment="xen-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199815" comment="xen-doc-html-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199816" comment="xen-doc-pdf-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199817" comment="xen-kmp-default-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199818" comment="xen-kmp-pae-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199819" comment="xen-libs-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199820" comment="xen-libs-32bit-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199821" comment="xen-tools-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199822" comment="xen-tools-domU-4.2.2_04-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3524</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3524" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3524" source="CVE"/>
    <description>
    libdbus 1.5.x and earlier, when used in setuid or other privileged programs in X.org and possibly other products, allows local users to gain privileges and execute arbitrary code via the DBUS_SYSTEM_BUS_ADDRESS environment variable.  NOTE: libdbus maintainers state that this is a vulnerability in the applications that do not cleanse environment variables, not in libdbus itself: "we do not support use of libdbus in setuid binaries that do not sanitize their environment before their first call into libdbus."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3524.html">CVE-2012-3524</cve>
<bugzilla href="https://bugzilla.suse.com/697105">SUSE bug 697105</bugzilla>
<bugzilla href="https://bugzilla.suse.com/852781">SUSE bug 852781</bugzilla>
<bugzilla href="https://bugzilla.suse.com/912016">SUSE bug 912016</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199397" comment="dbus-1-1.2.10-3.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199398" comment="dbus-1-32bit-1.2.10-3.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199399" comment="dbus-1-x11-1.2.10-3.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199400" comment="dbus-1-x86-1.2.10-3.27 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3543</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2012-3543" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3543" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3543.html">CVE-2012-3543</cve>
<bugzilla href="https://bugzilla.suse.com/739119">SUSE bug 739119</bugzilla>
<bugzilla href="https://bugzilla.suse.com/963818">SUSE bug 963818</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201916" comment="mono-core-2.6.7-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201917" comment="mono-data-2.6.7-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201920" comment="mono-data-postgresql-2.6.7-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201921" comment="mono-data-sqlite-2.6.7-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201926" comment="mono-locale-extras-2.6.7-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201927" comment="mono-nunit-2.6.7-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201929" comment="mono-web-2.6.7-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201930" comment="mono-winforms-2.6.7-0.16 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203140" comment="mono-core-2.6.7-0.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203141" comment="mono-data-2.6.7-0.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203144" comment="mono-data-postgresql-2.6.7-0.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203145" comment="mono-data-sqlite-2.6.7-0.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203150" comment="mono-locale-extras-2.6.7-0.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203151" comment="mono-nunit-2.6.7-0.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203153" comment="mono-web-2.6.7-0.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203154" comment="mono-winforms-2.6.7-0.18 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3544</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2012-3544" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3544" source="CVE"/>
    <description>
    Apache Tomcat 6.x before 6.0.37 and 7.x before 7.0.30 does not properly handle chunk extensions in chunked transfer coding, which allows remote attackers to cause a denial of service by streaming data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3544.html">CVE-2012-3544</cve>
<bugzilla href="https://bugzilla.suse.com/822177">SUSE bug 822177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/831119">SUSE bug 831119</bugzilla>
<bugzilla href="https://bugzilla.suse.com/865746">SUSE bug 865746</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209043" comment="libtcnative-1-0-1.3.3-12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200457" comment="tomcat6-6.0.41-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200458" comment="tomcat6-admin-webapps-6.0.41-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200459" comment="tomcat6-docs-webapp-6.0.41-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200460" comment="tomcat6-javadoc-6.0.41-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200461" comment="tomcat6-jsp-2_1-api-6.0.41-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200462" comment="tomcat6-lib-6.0.41-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200463" comment="tomcat6-servlet-2_5-api-6.0.41-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200464" comment="tomcat6-webapps-6.0.41-0.43 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3546</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3546" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3546" source="CVE"/>
    <description>
    org/apache/catalina/realm/RealmBase.java in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.30, when FORM authentication is used, allows remote attackers to bypass security-constraint checks by leveraging a previous setUserPrincipal call and then placing /j_security_check at the end of a URI.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3546.html">CVE-2012-3546</cve>
<bugzilla href="https://bugzilla.suse.com/793394">SUSE bug 793394</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199802" comment="tomcat6-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199803" comment="tomcat6-admin-webapps-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199804" comment="tomcat6-docs-webapp-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199805" comment="tomcat6-javadoc-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199806" comment="tomcat6-jsp-2_1-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199807" comment="tomcat6-lib-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199808" comment="tomcat6-servlet-2_5-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199809" comment="tomcat6-webapps-6.0.18-20.35.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3570</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3570" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3570" source="CVE"/>
    <description>
    Buffer overflow in ISC DHCP 4.2.x before 4.2.4-P1, when DHCPv6 mode is enabled, allows remote attackers to cause a denial of service (segmentation fault and daemon exit) via a crafted client identifier parameter.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3570.html">CVE-2012-3570</cve>
<bugzilla href="https://bugzilla.suse.com/772924">SUSE bug 772924</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199401" comment="dhcp-4.2.4.P2-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199402" comment="dhcp-client-4.2.4.P2-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199403" comment="dhcp-relay-4.2.4.P2-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199404" comment="dhcp-server-4.2.4.P2-0.16 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3571</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3571" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3571" source="CVE"/>
    <description>
    ISC DHCP 4.1.2 through 4.2.4 and 4.1-ESV before 4.1-ESV-R6 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a malformed client identifier.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3571.html">CVE-2012-3571</cve>
<bugzilla href="https://bugzilla.suse.com/772924">SUSE bug 772924</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199401" comment="dhcp-4.2.4.P2-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199402" comment="dhcp-client-4.2.4.P2-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199403" comment="dhcp-relay-4.2.4.P2-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199404" comment="dhcp-server-4.2.4.P2-0.16 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3817</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3817" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3817" source="CVE"/>
    <description>
    ISC BIND 9.4.x, 9.5.x, 9.6.x, and 9.7.x before 9.7.6-P2; 9.8.x before 9.8.3-P2; 9.9.x before 9.9.1-P2; and 9.6-ESV before 9.6-ESV-R7-P2, when DNSSEC validation is enabled, does not properly initialize the failing-query cache, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) by sending many queries.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3817.html">CVE-2012-3817</cve>
<bugzilla href="https://bugzilla.suse.com/772945">SUSE bug 772945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/792926">SUSE bug 792926</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199364" comment="bind-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199365" comment="bind-chrootenv-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199366" comment="bind-doc-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199367" comment="bind-libs-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199368" comment="bind-libs-32bit-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199369" comment="bind-libs-x86-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199370" comment="bind-utils-9.6ESVR7P4-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3864</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3864" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3864" source="CVE"/>
    <description>
    Puppet before 2.6.17 and 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, allows remote authenticated users to read arbitrary files on the puppet master server by leveraging an arbitrary user's certificate and private key in a GET request.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3864.html">CVE-2012-3864</cve>
<bugzilla href="https://bugzilla.suse.com/770828">SUSE bug 770828</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199754" comment="puppet-2.6.18-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199755" comment="puppet-server-2.6.18-0.4 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3865</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3865" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3865" source="CVE"/>
    <description>
    Directory traversal vulnerability in lib/puppet/reports/store.rb in Puppet before 2.6.17 and 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, when Delete is enabled in auth.conf, allows remote authenticated users to delete arbitrary files on the puppet master server via a .. (dot dot) in a node name.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3865.html">CVE-2012-3865</cve>
<bugzilla href="https://bugzilla.suse.com/770829">SUSE bug 770829</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199754" comment="puppet-2.6.18-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199755" comment="puppet-server-2.6.18-0.4 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3867</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3867" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3867" source="CVE"/>
    <description>
    lib/puppet/ssl/certificate_authority.rb in Puppet before 2.6.17 and 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, does not properly restrict the characters in the Common Name field of a Certificate Signing Request (CSR), which makes it easier for user-assisted remote attackers to trick administrators into signing a crafted agent certificate via ANSI control sequences.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3867.html">CVE-2012-3867</cve>
<bugzilla href="https://bugzilla.suse.com/770833">SUSE bug 770833</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199754" comment="puppet-2.6.18-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199755" comment="puppet-server-2.6.18-0.4 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3954</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3954" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3954" source="CVE"/>
    <description>
    Multiple memory leaks in ISC DHCP 4.1.x and 4.2.x before 4.2.4-P1 and 4.1-ESV before 4.1-ESV-R6 allow remote attackers to cause a denial of service (memory consumption) by sending many requests.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3954.html">CVE-2012-3954</cve>
<bugzilla href="https://bugzilla.suse.com/772924">SUSE bug 772924</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199401" comment="dhcp-4.2.4.P2-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199402" comment="dhcp-client-4.2.4.P2-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199403" comment="dhcp-relay-4.2.4.P2-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199404" comment="dhcp-server-4.2.4.P2-0.16 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3955</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3955" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3955" source="CVE"/>
    <description>
    ISC DHCP 4.1.x before 4.1-ESV-R7 and 4.2.x before 4.2.4-P2 allows remote attackers to cause a denial of service (daemon crash) in opportunistic circumstances by establishing an IPv6 lease in an environment where the lease expiration time is later reduced.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3955.html">CVE-2012-3955</cve>
<bugzilla href="https://bugzilla.suse.com/780167">SUSE bug 780167</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199401" comment="dhcp-4.2.4.P2-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199402" comment="dhcp-client-4.2.4.P2-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199403" comment="dhcp-relay-4.2.4.P2-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199404" comment="dhcp-server-4.2.4.P2-0.16 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3956</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3956" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3956" source="CVE"/>
    <description>
    Use-after-free vulnerability in the MediaStreamGraphThreadRunnable::Run function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3956.html">CVE-2012-3956</cve>
<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3957</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3957" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3957" source="CVE"/>
    <description>
    Heap-based buffer overflow in the nsBlockFrame::MarkLineDirty function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3957.html">CVE-2012-3957</cve>
<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3958</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3958" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3958" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsHTMLEditRules::DeleteNonTableElements function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3958.html">CVE-2012-3958</cve>
<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3959</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3959" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3959" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsRangeUpdater::SelAdjDeleteNode function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3959.html">CVE-2012-3959</cve>
<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3960</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3960" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3960" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozSpellChecker::SetCurrentDictionary function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3960.html">CVE-2012-3960</cve>
<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3961</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3961" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3961" source="CVE"/>
    <description>
    Use-after-free vulnerability in the RangeData implementation in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3961.html">CVE-2012-3961</cve>
<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3962</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3962" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3962" source="CVE"/>
    <description>
    Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 do not properly iterate through the characters in a text run, which allows remote attackers to execute arbitrary code via a crafted document.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3962.html">CVE-2012-3962</cve>
<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3963</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3963" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3963" source="CVE"/>
    <description>
    Use-after-free vulnerability in the js::gc::MapAllocToTraceKind function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3963.html">CVE-2012-3963</cve>
<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3964</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3964" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3964" source="CVE"/>
    <description>
    Use-after-free vulnerability in the gfxTextRun::GetUserData function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3964.html">CVE-2012-3964</cve>
<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3966</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3966" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3966" source="CVE"/>
    <description>
    Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a negative height value in a BMP image within a .ICO file, related to (1) improper handling of the transparency bitmask by the nsICODecoder component and (2) improper processing of the alpha channel by the nsBMPDecoder component.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3966.html">CVE-2012-3966</cve>
<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3967</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3967" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3967" source="CVE"/>
    <description>
    The WebGL implementation in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 on Linux, when a large number of sampler uniforms are used, does not properly interact with Mesa drivers, which allows remote attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3967.html">CVE-2012-3967</cve>
<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3968</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3968" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3968" source="CVE"/>
    <description>
    Use-after-free vulnerability in the WebGL implementation in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code via vectors related to deletion of a fragment shader by its accessor.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3968.html">CVE-2012-3968</cve>
<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3969</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3969" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3969" source="CVE"/>
    <description>
    Integer overflow in the nsSVGFEMorphologyElement::Filter function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code via a crafted SVG filter that triggers an incorrect sum calculation, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3969.html">CVE-2012-3969</cve>
<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3970</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3970" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3970" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsTArray_base::Length function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving movement of a requiredFeatures attribute from one SVG document to another.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3970.html">CVE-2012-3970</cve>
<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3972</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3972" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3972" source="CVE"/>
    <description>
    The format-number functionality in the XSLT implementation in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to obtain sensitive information via unspecified vectors that trigger a heap-based buffer over-read.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3972.html">CVE-2012-3972</cve>
<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3976</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3976" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3976" source="CVE"/>
    <description>
    Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, and SeaMonkey before 2.12 do not properly handle onLocationChange events during navigation between different https sites, which allows remote attackers to spoof the X.509 certificate information in the address bar via a crafted web page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3976.html">CVE-2012-3976</cve>
<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3978</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3978" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3978" source="CVE"/>
    <description>
    The nsLocation::CheckURL function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 does not properly follow the security model of the location object, which allows remote attackers to bypass intended content-loading restrictions or possibly have unspecified other impact via vectors involving chrome code.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3978.html">CVE-2012-3978</cve>
<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3980</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3980" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3980" source="CVE"/>
    <description>
    The web console in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, and Thunderbird ESR 10.x before 10.0.7 allows user-assisted remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site that injects this code and triggers an eval operation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3980.html">CVE-2012-3980</cve>
<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3982</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3982" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3982" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3982.html">CVE-2012-3982</cve>
<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3986</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3986" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3986" source="CVE"/>
    <description>
    Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 do not properly restrict calls to DOMWindowUtils (aka nsDOMWindowUtils) methods, which allows remote attackers to bypass intended access restrictions via crafted JavaScript code.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3986.html">CVE-2012-3986</cve>
<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3988</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3988" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3988" source="CVE"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 might allow user-assisted remote attackers to execute arbitrary code via vectors involving use of mozRequestFullScreen to enter full-screen mode, and use of the history.back method for backwards history navigation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3988.html">CVE-2012-3988</cve>
<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3990</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3990" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3990" source="CVE"/>
    <description>
    Use-after-free vulnerability in the IME State Manager implementation in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code via unspecified vectors, related to the nsIContent::GetNameSpaceID function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3990.html">CVE-2012-3990</cve>
<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3991</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3991" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3991" source="CVE"/>
    <description>
    Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 do not properly restrict JSAPI access to the GetProperty function, which allows remote attackers to bypass the Same Origin Policy and possibly have unspecified other impact via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3991.html">CVE-2012-3991</cve>
<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3992</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3992" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3992" source="CVE"/>
    <description>
    Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 do not properly manage history data, which allows remote attackers to conduct cross-site scripting (XSS) attacks or obtain sensitive POST content via vectors involving a location.hash write operation and history navigation that triggers the loading of a URL into the history object.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3992.html">CVE-2012-3992</cve>
<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3993</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3993" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3993" source="CVE"/>
    <description>
    The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 does not properly interact with failures of InstallTrigger methods, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site, related to an "XrayWrapper pollution" issue.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3993.html">CVE-2012-3993</cve>
<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3994</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3994" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3994" source="CVE"/>
    <description>
    Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allow remote attackers to conduct cross-site scripting (XSS) attacks via a binary plugin that uses Object.defineProperty to shadow the top object, and leverages the relationship between top.location and the location property.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3994.html">CVE-2012-3994</cve>
<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3995</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-3995" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3995" source="CVE"/>
    <description>
    The IsCSSWordSpacingSpace function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3995.html">CVE-2012-3995</cve>
<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4048</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4048" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4048" source="CVE"/>
    <description>
    The PPP dissector in Wireshark 1.4.x before 1.4.14, 1.6.x before 1.6.9, and 1.8.x before 1.8.1 allows remote attackers to cause a denial of service (invalid pointer dereference and application crash) via a crafted packet, as demonstrated by a usbmon dump.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4048.html">CVE-2012-4048</cve>
<bugzilla href="https://bugzilla.suse.com/772738">SUSE bug 772738</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4049</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4049" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4049" source="CVE"/>
    <description>
    epan/dissectors/packet-nfs.c in the NFS dissector in Wireshark 1.4.x before 1.4.14, 1.6.x before 1.6.9, and 1.8.x before 1.8.1 allows remote attackers to cause a denial of service (loop and CPU consumption) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4049.html">CVE-2012-4049</cve>
<bugzilla href="https://bugzilla.suse.com/772738">SUSE bug 772738</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4179</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4179" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsHTMLCSSUtils::CreateCSSPropertyTxn function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4179.html">CVE-2012-4179</cve>
<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4180</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4180" source="CVE"/>
    <description>
    Heap-based buffer overflow in the nsHTMLEditor::IsPrevCharInNodeWhitespace function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4180.html">CVE-2012-4180</cve>
<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4181</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4181" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4181" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsSMILAnimationController::DoSample function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4181.html">CVE-2012-4181</cve>
<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4182" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsTextEditRules::WillInsert function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4182.html">CVE-2012-4182</cve>
<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4183</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4183" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4183" source="CVE"/>
    <description>
    Use-after-free vulnerability in the DOMSVGTests::GetRequiredFeatures function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4183.html">CVE-2012-4183</cve>
<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4184</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4184" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4184" source="CVE"/>
    <description>
    The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 does not prevent access to properties of a prototype for a standard class, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4184.html">CVE-2012-4184</cve>
<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4185</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4185" source="CVE"/>
    <description>
    Buffer overflow in the nsCharTraits::length function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4185.html">CVE-2012-4185</cve>
<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4186</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4186" source="CVE"/>
    <description>
    Heap-based buffer overflow in the nsWaveReader::DecodeAudioData function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4186.html">CVE-2012-4186</cve>
<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4187</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4187" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4187" source="CVE"/>
    <description>
    Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 do not properly manage a certain insPos variable, which allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption and assertion failure) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4187.html">CVE-2012-4187</cve>
<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4188</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4188" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4188" source="CVE"/>
    <description>
    Heap-based buffer overflow in the Convolve3x3 function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4188.html">CVE-2012-4188</cve>
<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4192</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4192" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4192" source="CVE"/>
    <description>
    Mozilla Firefox 16.0, Thunderbird 16.0, and SeaMonkey 2.13 allow remote attackers to bypass the Same Origin Policy and read the properties of a Location object via a crafted web site, a related issue to CVE-2012-4193.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4192.html">CVE-2012-4192</cve>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4193</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4193" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4193" source="CVE"/>
    <description>
    Mozilla Firefox before 16.0.1, Firefox ESR 10.x before 10.0.9, Thunderbird before 16.0.1, Thunderbird ESR 10.x before 10.0.9, and SeaMonkey before 2.13.1 omit a security check in the defaultValue function during the unwrapping of security wrappers, which allows remote attackers to bypass the Same Origin Policy and read the properties of a Location object, or execute arbitrary JavaScript code, via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4193.html">CVE-2012-4193</cve>
<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4194</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4194" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4194" source="CVE"/>
    <description>
    Mozilla Firefox before 16.0.2, Firefox ESR 10.x before 10.0.10, Thunderbird before 16.0.2, Thunderbird ESR 10.x before 10.0.10, and SeaMonkey before 2.13.2 do not prevent use of the valueOf method to shadow the location object (aka window.location), which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via vectors involving a plugin.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4194.html">CVE-2012-4194</cve>
<bugzilla href="https://bugzilla.suse.com/786522">SUSE bug 786522</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4195</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4195" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4195" source="CVE"/>
    <description>
    The nsLocation::CheckURL function in Mozilla Firefox before 16.0.2, Firefox ESR 10.x before 10.0.10, Thunderbird before 16.0.2, Thunderbird ESR 10.x before 10.0.10, and SeaMonkey before 2.13.2 does not properly determine the calling document and principal in its return value, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web site, and makes it easier for remote attackers to execute arbitrary JavaScript code by leveraging certain add-on behavior.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4195.html">CVE-2012-4195</cve>
<bugzilla href="https://bugzilla.suse.com/786522">SUSE bug 786522</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4196</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4196" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4196" source="CVE"/>
    <description>
    Mozilla Firefox before 16.0.2, Firefox ESR 10.x before 10.0.10, Thunderbird before 16.0.2, Thunderbird ESR 10.x before 10.0.10, and SeaMonkey before 2.13.2 allow remote attackers to bypass the Same Origin Policy and read the Location object via a prototype property-injection attack that defeats certain protection mechanisms for this object.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4196.html">CVE-2012-4196</cve>
<bugzilla href="https://bugzilla.suse.com/786522">SUSE bug 786522</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4201</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4201" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4201" source="CVE"/>
    <description>
    The evalInSandbox implementation in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 uses an incorrect context during the handling of JavaScript code that sets the location.href property, which allows remote attackers to conduct cross-site scripting (XSS) attacks or read arbitrary files by leveraging a sandboxed add-on.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4201.html">CVE-2012-4201</cve>
<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4202</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4202" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4202" source="CVE"/>
    <description>
    Heap-based buffer overflow in the image::RasterImage::DrawFrameTo function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code via a crafted GIF image.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4202.html">CVE-2012-4202</cve>
<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4207</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4207" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4207" source="CVE"/>
    <description>
    The HZ-GB-2312 character-set implementation in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 does not properly handle a ~ (tilde) character in proximity to a chunk delimiter, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4207.html">CVE-2012-4207</cve>
<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4209" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4209" source="CVE"/>
    <description>
    Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 do not prevent use of a "top" frame name-attribute value to access the location property, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via vectors involving a binary plugin.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4209.html">CVE-2012-4209</cve>
<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4210</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4210" source="CVE"/>
    <description>
    The Style Inspector in Mozilla Firefox before 17.0 and Firefox ESR 10.x before 10.0.11 does not properly restrict the context of HTML markup and Cascading Style Sheets (CSS) token sequences, which allows user-assisted remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted stylesheet.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4210.html">CVE-2012-4210</cve>
<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4212</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4212" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4212" source="CVE"/>
    <description>
    Use-after-free vulnerability in the XPCWrappedNative::Mark function in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4212.html">CVE-2012-4212</cve>
<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4213</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4213" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4213" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsEditor::FindNextLeafNode function in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4213.html">CVE-2012-4213</cve>
<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4214</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4214" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4214" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsTextEditorState::PrepareEditor function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-5840.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4214.html">CVE-2012-4214</cve>
<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4215</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4215" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4215" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsPlaintextEditor::FireClipboardEvent function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4215.html">CVE-2012-4215</cve>
<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4216</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4216" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4216" source="CVE"/>
    <description>
    Use-after-free vulnerability in the gfxFont::GetFontEntry function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4216.html">CVE-2012-4216</cve>
<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4217</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4217" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4217" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsViewManager::ProcessPendingUpdates function in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4217.html">CVE-2012-4217</cve>
<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4218</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4218" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4218" source="CVE"/>
    <description>
    Use-after-free vulnerability in the BuildTextRunsScanner::BreakSink::SetBreaks function in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4218.html">CVE-2012-4218</cve>
<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4244</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4244" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4244" source="CVE"/>
    <description>
    ISC BIND 9.x before 9.7.6-P3, 9.8.x before 9.8.3-P3, 9.9.x before 9.9.1-P3, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P3 allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query for a long resource record.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4244.html">CVE-2012-4244</cve>
<bugzilla href="https://bugzilla.suse.com/780157">SUSE bug 780157</bugzilla>
<bugzilla href="https://bugzilla.suse.com/792926">SUSE bug 792926</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199364" comment="bind-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199365" comment="bind-chrootenv-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199366" comment="bind-doc-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199367" comment="bind-libs-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199368" comment="bind-libs-32bit-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199369" comment="bind-libs-x86-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199370" comment="bind-utils-9.6ESVR7P4-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4285</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4285" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4285" source="CVE"/>
    <description>
    The dissect_pft function in epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a zero-length message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4285.html">CVE-2012-4285</cve>
<bugzilla href="https://bugzilla.suse.com/776083">SUSE bug 776083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4288</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4288" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4288" source="CVE"/>
    <description>
    Integer overflow in the dissect_xtp_ecntl function in epan/dissectors/packet-xtp.c in the XTP dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (loop or application crash) via a large value for a span length.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4288.html">CVE-2012-4288</cve>
<bugzilla href="https://bugzilla.suse.com/776083">SUSE bug 776083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4289</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4289" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4289" source="CVE"/>
    <description>
    epan/dissectors/packet-afp.c in the AFP dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (loop and CPU consumption) via a large number of ACL entries.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4289.html">CVE-2012-4289</cve>
<bugzilla href="https://bugzilla.suse.com/776083">SUSE bug 776083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4290</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4290" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4290" source="CVE"/>
    <description>
    The CTDB dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (loop and CPU consumption) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4290.html">CVE-2012-4290</cve>
<bugzilla href="https://bugzilla.suse.com/776083">SUSE bug 776083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4291</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4291" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4291" source="CVE"/>
    <description>
    The CIP dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (memory consumption) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4291.html">CVE-2012-4291</cve>
<bugzilla href="https://bugzilla.suse.com/776083">SUSE bug 776083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4292</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4292" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4292" source="CVE"/>
    <description>
    The dissect_stun_message function in epan/dissectors/packet-stun.c in the STUN dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 does not properly interact with key-destruction behavior in a certain tree library, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4292.html">CVE-2012-4292</cve>
<bugzilla href="https://bugzilla.suse.com/776083">SUSE bug 776083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4293</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4293" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4293" source="CVE"/>
    <description>
    plugins/ethercat/packet-ecatmb.c in the EtherCAT Mailbox dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 does not properly handle certain integer fields, which allows remote attackers to cause a denial of service (application exit) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4293.html">CVE-2012-4293</cve>
<bugzilla href="https://bugzilla.suse.com/776083">SUSE bug 776083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4296</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4296" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4296" source="CVE"/>
    <description>
    Buffer overflow in epan/dissectors/packet-rtps2.c in the RTPS2 dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (CPU consumption) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4296.html">CVE-2012-4296</cve>
<bugzilla href="https://bugzilla.suse.com/776083">SUSE bug 776083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4398</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2012-4398" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4398" source="CVE"/>
    <description>
    The __request_module function in kernel/kmod.c in the Linux kernel before 3.4 does not set a certain killable attribute, which allows local users to cause a denial of service (memory consumption) via a crafted application.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4398.html">CVE-2012-4398</cve>
<bugzilla href="https://bugzilla.suse.com/778463">SUSE bug 778463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/779488">SUSE bug 779488</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213307" comment="kernel-bigsmp-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213308" comment="kernel-bigsmp-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213244" comment="kernel-bigsmp-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213245" comment="kernel-default-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213246" comment="kernel-default-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213247" comment="kernel-default-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264361" comment="kernel-default-man-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213309" comment="kernel-ec2-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213310" comment="kernel-ec2-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213311" comment="kernel-ec2-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264348" comment="kernel-pae-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264349" comment="kernel-pae-base-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264350" comment="kernel-pae-devel-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264362" comment="kernel-ppc64-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264363" comment="kernel-ppc64-base-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264364" comment="kernel-ppc64-devel-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213249" comment="kernel-source-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213250" comment="kernel-syms-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213312" comment="kernel-trace-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213313" comment="kernel-trace-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213251" comment="kernel-trace-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213252" comment="kernel-xen-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213253" comment="kernel-xen-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213254" comment="kernel-xen-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213256" comment="xen-kmp-default-4.2.5_02_3.0.101_0.46-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264352" comment="xen-kmp-pae-4.2.5_02_3.0.101_0.42-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4405</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4405" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4405" source="CVE"/>
    <description>
    Multiple integer underflows in the icmLut_allocate function in International Color Consortium (ICC) Format library (icclib), as used in Ghostscript 9.06 and Argyll Color Management System, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted (1) PostScript or (2) PDF file with embedded images, which triggers a heap-based buffer overflow.  NOTE: this issue is also described as an array index error.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4405.html">CVE-2012-4405</cve>
<bugzilla href="https://bugzilla.suse.com/726092">SUSE bug 726092</bugzilla>
<bugzilla href="https://bugzilla.suse.com/774185">SUSE bug 774185</bugzilla>
<bugzilla href="https://bugzilla.suse.com/779700">SUSE bug 779700</bugzilla>
<bugzilla href="https://bugzilla.suse.com/939342">SUSE bug 939342</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199436" comment="ghostscript-fonts-other-8.62-32.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199437" comment="ghostscript-fonts-rus-8.62-32.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199438" comment="ghostscript-fonts-std-8.62-32.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199439" comment="ghostscript-library-8.62-32.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199440" comment="ghostscript-omni-8.62-32.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199441" comment="ghostscript-x11-8.62-32.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199442" comment="libgimpprint-4.2.7-32.34 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4411</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4411" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4411" source="CVE"/>
    <description>
    The graphical console in Xen 4.0, 4.1 and 4.2 allows local OS guest administrators to obtain sensitive host resource information via the qemu monitor.  NOTE: this might be a duplicate of CVE-2007-0998.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4411.html">CVE-2012-4411</cve>
<bugzilla href="https://bugzilla.suse.com/779212">SUSE bug 779212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/786516">SUSE bug 786516</bugzilla>
<bugzilla href="https://bugzilla.suse.com/786518">SUSE bug 786518</bugzilla>
<bugzilla href="https://bugzilla.suse.com/786519">SUSE bug 786519</bugzilla>
<bugzilla href="https://bugzilla.suse.com/786520">SUSE bug 786520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/787163">SUSE bug 787163</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199814" comment="xen-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199815" comment="xen-doc-html-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199816" comment="xen-doc-pdf-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199817" comment="xen-kmp-default-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199818" comment="xen-kmp-pae-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199819" comment="xen-libs-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199820" comment="xen-libs-32bit-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199821" comment="xen-tools-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199822" comment="xen-tools-domU-4.2.2_04-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4412</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2012-4412" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4412" source="CVE"/>
    <description>
    Integer overflow in string/strcoll_l.c in the GNU C Library (aka glibc or libc6) 2.17 and earlier allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4412.html">CVE-2012-4412</cve>
<bugzilla href="https://bugzilla.suse.com/779320">SUSE bug 779320</bugzilla>
<bugzilla href="https://bugzilla.suse.com/848783">SUSE bug 848783</bugzilla>
<bugzilla href="https://bugzilla.suse.com/882910">SUSE bug 882910</bugzilla>
<bugzilla href="https://bugzilla.suse.com/920055">SUSE bug 920055</bugzilla>
<bugzilla href="https://bugzilla.suse.com/920169">SUSE bug 920169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/920338">SUSE bug 920338</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213314" comment="glibc-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204402" comment="glibc-32bit-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213316" comment="glibc-devel-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204404" comment="glibc-devel-32bit-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213334" comment="glibc-html-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213318" comment="glibc-i18ndata-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213335" comment="glibc-info-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213319" comment="glibc-locale-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204407" comment="glibc-locale-32bit-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208499" comment="glibc-locale-x86-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213336" comment="glibc-profile-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208501" comment="glibc-profile-32bit-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208502" comment="glibc-profile-x86-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208503" comment="glibc-x86-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213321" comment="nscd-2.11.3-17.56 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213314" comment="glibc-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213315" comment="glibc-32bit-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213316" comment="glibc-devel-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213317" comment="glibc-devel-32bit-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213334" comment="glibc-html-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213318" comment="glibc-i18ndata-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213335" comment="glibc-info-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213319" comment="glibc-locale-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213320" comment="glibc-locale-32bit-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213336" comment="glibc-profile-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213337" comment="glibc-profile-32bit-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213321" comment="nscd-2.11.3-17.56 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4423" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4423" source="CVE"/>
    <description>
    The virNetServerProgramDispatchCall function in libvirt before 0.10.2 allows remote attackers to cause a denial of service (NULL pointer dereference and segmentation fault) via an RPC call with (1) an event as the RPC number or (2) an RPC number whose value is in a "gap" in the RPC dispatch table.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4423.html">CVE-2012-4423</cve>
<bugzilla href="https://bugzilla.suse.com/779212">SUSE bug 779212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/780432">SUSE bug 780432</bugzilla>
<bugzilla href="https://bugzilla.suse.com/786516">SUSE bug 786516</bugzilla>
<bugzilla href="https://bugzilla.suse.com/786518">SUSE bug 786518</bugzilla>
<bugzilla href="https://bugzilla.suse.com/786519">SUSE bug 786519</bugzilla>
<bugzilla href="https://bugzilla.suse.com/786520">SUSE bug 786520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/787163">SUSE bug 787163</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199692" comment="libvirt-1.0.5.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199693" comment="libvirt-client-1.0.5.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199694" comment="libvirt-client-32bit-1.0.5.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199695" comment="libvirt-doc-1.0.5.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199696" comment="libvirt-lock-sanlock-1.0.5.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199697" comment="libvirt-python-1.0.5.1-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4428</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2012-4428" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4428" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4428.html">CVE-2012-4428</cve>
<bugzilla href="https://bugzilla.suse.com/778508">SUSE bug 778508</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200387" comment="openslp-1.2.0-172.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200388" comment="openslp-32bit-1.2.0-172.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200389" comment="openslp-server-1.2.0-172.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200390" comment="openslp-x86-1.2.0-172.24 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200387" comment="openslp-1.2.0-172.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200388" comment="openslp-32bit-1.2.0-172.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200389" comment="openslp-server-1.2.0-172.24 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4431</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4431" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4431" source="CVE"/>
    <description>
    org/apache/catalina/filters/CsrfPreventionFilter.java in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.32 allows remote attackers to bypass the cross-site request forgery (CSRF) protection mechanism via a request that lacks a session identifier.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4431.html">CVE-2012-4431</cve>
<bugzilla href="https://bugzilla.suse.com/793391">SUSE bug 793391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/794548">SUSE bug 794548</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199802" comment="tomcat6-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199803" comment="tomcat6-admin-webapps-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199804" comment="tomcat6-docs-webapp-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199805" comment="tomcat6-javadoc-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199806" comment="tomcat6-jsp-2_1-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199807" comment="tomcat6-lib-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199808" comment="tomcat6-servlet-2_5-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199809" comment="tomcat6-webapps-6.0.18-20.35.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4447</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4447" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4447" source="CVE"/>
    <description>
    Heap-based buffer overflow in tif_pixarlog.c in LibTIFF before 4.0.3 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted TIFF image using the PixarLog Compression format.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4447.html">CVE-2012-4447</cve>
<bugzilla href="https://bugzilla.suse.com/781995">SUSE bug 781995</bugzilla>
<bugzilla href="https://bugzilla.suse.com/791607">SUSE bug 791607</bugzilla>
<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199680" comment="libtiff3-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199681" comment="libtiff3-32bit-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199682" comment="libtiff3-x86-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199683" comment="tiff-3.8.2-141.152 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4454</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4454" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4454" source="CVE"/>
    <description>
    openCryptoki before 2.4.1, when using spinlocks, allows local users to create or set world-writable permissions on arbitrary files via a symlink attack on the (1) .pkapi_xpk or (2) .pkcs11spinloc file in /tmp.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4454.html">CVE-2012-4454</cve>
<bugzilla href="https://bugzilla.suse.com/779211">SUSE bug 779211</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199730" comment="openCryptoki-2.4.2-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199731" comment="openCryptoki-32bit-2.4.2-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199732" comment="openCryptoki-64bit-2.4.2-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4455</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4455" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4455" source="CVE"/>
    <description>
    openCryptoki 2.4.1 allows local users to create or set world-writable permissions on arbitrary files via a symlink attack on the (1) LCK..opencryptoki or (2) LCK..opencryptoki_stdll file in /var/lock/.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4455.html">CVE-2012-4455</cve>
<bugzilla href="https://bugzilla.suse.com/779211">SUSE bug 779211</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199730" comment="openCryptoki-2.4.2-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199731" comment="openCryptoki-32bit-2.4.2-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199732" comment="openCryptoki-64bit-2.4.2-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4461</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4461" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4461" source="CVE"/>
    <description>
    The KVM subsystem in the Linux kernel before 3.6.9, when running on hosts that use qemu userspace without XSAVE, allows local users to cause a denial of service (kernel OOPS) by using the KVM_SET_SREGS ioctl to set the X86_CR4_OSXSAVE bit in the guest cr4 register, then calling the KVM_RUN ioctl.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4461.html">CVE-2012-4461</cve>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/787821">SUSE bug 787821</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4466</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4466" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4466" source="CVE"/>
    <description>
    Ruby 1.8.7 before patchlevel 371, 1.9.3 before patchlevel 286, and 2.0 before revision r37068 allows context-dependent attackers to bypass safe-level restrictions and modify untainted strings via the name_err_mesg_to_str API function, which marks the string as tainted, a different vulnerability than CVE-2011-1005.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4466.html">CVE-2012-4466</cve>
<bugzilla href="https://bugzilla.suse.com/783525">SUSE bug 783525</bugzilla>
<bugzilla href="https://bugzilla.suse.com/876588">SUSE bug 876588</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199778" comment="ruby-1.8.7.p357-0.9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199779" comment="ruby-doc-html-1.8.7.p357-0.9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199780" comment="ruby-tk-1.8.7.p357-0.9.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4505" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4505" source="CVE"/>
    <description>
    Heap-based buffer overflow in the px_pac_reload function in lib/pac.c in libproxy 0.2.x and 0.3.x allows remote servers to have an unspecified impact via a crafted Content-Length size in an HTTP response header for a proxy.pac file request, a different vulnerability than CVE-2012-4504.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4505.html">CVE-2012-4505</cve>
<bugzilla href="https://bugzilla.suse.com/784523">SUSE bug 784523</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199653" comment="libproxy0-0.3.1-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199654" comment="libproxy0-32bit-0.3.1-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199655" comment="libproxy0-config-gnome-0.3.1-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199656" comment="libproxy0-config-kde4-0.3.1-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199657" comment="libproxy0-networkmanager-0.3.1-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199658" comment="libproxy0-x86-0.3.1-2.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4510</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4510" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4510" source="CVE"/>
    <description>
    cups-pk-helper before 0.2.3 does not properly wrap the (1) cupsGetFile and (2) cupsPutFile function calls, which allows user-assisted remote attackers to read or overwrite sensitive files using CUPS resources.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4510.html">CVE-2012-4510</cve>
<bugzilla href="https://bugzilla.suse.com/783488">SUSE bug 783488</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199792" comment="system-config-printer-1.0.8-9.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199793" comment="system-config-printer-lang-1.0.8-9.23 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4512</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2012-4512" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4512" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4512.html">CVE-2012-4512</cve>
<bugzilla href="https://bugzilla.suse.com/787520">SUSE bug 787520</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203956" comment="kdelibs4-4.3.5-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203957" comment="kdelibs4-core-4.3.5-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201329" comment="kdelibs4-doc-4.3.5-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203958" comment="libkde4-4.3.5-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200101" comment="libkde4-32bit-4.3.5-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200102" comment="libkde4-x86-4.3.5-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203959" comment="libkdecore4-4.3.5-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200104" comment="libkdecore4-32bit-4.3.5-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200105" comment="libkdecore4-x86-4.3.5-0.14 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203956" comment="kdelibs4-4.3.5-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203957" comment="kdelibs4-core-4.3.5-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201329" comment="kdelibs4-doc-4.3.5-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203958" comment="libkde4-4.3.5-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201330" comment="libkde4-32bit-4.3.5-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203959" comment="libkdecore4-4.3.5-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201332" comment="libkdecore4-32bit-4.3.5-0.12 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4513</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2012-4513" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4513" source="CVE"/>
    <description>
    khtml/imload/scaledimageplane.h in Konqueror in KDE 4.7.3 allows remote attackers to cause a denial of service (crash) and possibly read memory via large canvas dimensions, which leads to an unexpected sign extension and a heap-based buffer over-read.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4513.html">CVE-2012-4513</cve>
<bugzilla href="https://bugzilla.suse.com/787520">SUSE bug 787520</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203956" comment="kdelibs4-4.3.5-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203957" comment="kdelibs4-core-4.3.5-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201329" comment="kdelibs4-doc-4.3.5-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203958" comment="libkde4-4.3.5-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200101" comment="libkde4-32bit-4.3.5-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200102" comment="libkde4-x86-4.3.5-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203959" comment="libkdecore4-4.3.5-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200104" comment="libkdecore4-32bit-4.3.5-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200105" comment="libkdecore4-x86-4.3.5-0.14 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203956" comment="kdelibs4-4.3.5-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203957" comment="kdelibs4-core-4.3.5-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201329" comment="kdelibs4-doc-4.3.5-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203958" comment="libkde4-4.3.5-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201330" comment="libkde4-32bit-4.3.5-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203959" comment="libkdecore4-4.3.5-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201332" comment="libkdecore4-32bit-4.3.5-0.12 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4515</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2012-4515" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4515" source="CVE"/>
    <description>
    Use-after-free vulnerability in khtml/rendering/render_replaced.cpp in Konqueror in KDE 4.7.3, when the context menu is shown, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by accessing an iframe when it is being updated.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4515.html">CVE-2012-4515</cve>
<bugzilla href="https://bugzilla.suse.com/787520">SUSE bug 787520</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203956" comment="kdelibs4-4.3.5-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203957" comment="kdelibs4-core-4.3.5-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201329" comment="kdelibs4-doc-4.3.5-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203958" comment="libkde4-4.3.5-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200101" comment="libkde4-32bit-4.3.5-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200102" comment="libkde4-x86-4.3.5-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203959" comment="libkdecore4-4.3.5-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200104" comment="libkdecore4-32bit-4.3.5-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200105" comment="libkdecore4-x86-4.3.5-0.14 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203956" comment="kdelibs4-4.3.5-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203957" comment="kdelibs4-core-4.3.5-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201329" comment="kdelibs4-doc-4.3.5-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203958" comment="libkde4-4.3.5-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201330" comment="libkde4-32bit-4.3.5-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203959" comment="libkdecore4-4.3.5-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201332" comment="libkdecore4-32bit-4.3.5-0.12 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4528</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4528" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4528" source="CVE"/>
    <description>
    The mod_security2 module before 2.7.0 for the Apache HTTP Server allows remote attackers to bypass rules, and deliver arbitrary POST data to a PHP application, via a multipart request in which an invalid part precedes the crafted data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4528.html">CVE-2012-4528</cve>
<bugzilla href="https://bugzilla.suse.com/789393">SUSE bug 789393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/813190">SUSE bug 813190</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199339" comment="apache2-mod_security2-2.7.1-0.2.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4534</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4534" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4534" source="CVE"/>
    <description>
    org/apache/tomcat/util/net/NioEndpoint.java in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.28, when the NIO connector is used in conjunction with sendfile and HTTPS, allows remote attackers to cause a denial of service (infinite loop) by terminating the connection during the reading of a response.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4534.html">CVE-2012-4534</cve>
<bugzilla href="https://bugzilla.suse.com/794548">SUSE bug 794548</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199802" comment="tomcat6-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199803" comment="tomcat6-admin-webapps-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199804" comment="tomcat6-docs-webapp-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199805" comment="tomcat6-javadoc-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199806" comment="tomcat6-jsp-2_1-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199807" comment="tomcat6-lib-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199808" comment="tomcat6-servlet-2_5-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199809" comment="tomcat6-webapps-6.0.18-20.35.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4535</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4535" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4535" source="CVE"/>
    <description>
    Xen 3.4 through 4.2, and possibly earlier versions, allows local guest OS administrators to cause a denial of service (Xen infinite loop and physical CPU consumption) by setting a VCPU with an "inappropriate deadline."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4535.html">CVE-2012-4535</cve>
<bugzilla href="https://bugzilla.suse.com/779212">SUSE bug 779212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/786516">SUSE bug 786516</bugzilla>
<bugzilla href="https://bugzilla.suse.com/786518">SUSE bug 786518</bugzilla>
<bugzilla href="https://bugzilla.suse.com/786519">SUSE bug 786519</bugzilla>
<bugzilla href="https://bugzilla.suse.com/786520">SUSE bug 786520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/787163">SUSE bug 787163</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199814" comment="xen-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199815" comment="xen-doc-html-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199816" comment="xen-doc-pdf-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199817" comment="xen-kmp-default-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199818" comment="xen-kmp-pae-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199819" comment="xen-libs-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199820" comment="xen-libs-32bit-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199821" comment="xen-tools-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199822" comment="xen-tools-domU-4.2.2_04-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4536</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4536" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4536" source="CVE"/>
    <description>
    The (1) domain_pirq_to_emuirq and (2) physdev_unmap_pirq functions in Xen 2.2 allows local guest OS administrators to cause a denial of service (Xen crash) via a crafted pirq value that triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4536.html">CVE-2012-4536</cve>
<bugzilla href="https://bugzilla.suse.com/779212">SUSE bug 779212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/786516">SUSE bug 786516</bugzilla>
<bugzilla href="https://bugzilla.suse.com/786518">SUSE bug 786518</bugzilla>
<bugzilla href="https://bugzilla.suse.com/786519">SUSE bug 786519</bugzilla>
<bugzilla href="https://bugzilla.suse.com/786520">SUSE bug 786520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/787163">SUSE bug 787163</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199814" comment="xen-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199815" comment="xen-doc-html-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199816" comment="xen-doc-pdf-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199817" comment="xen-kmp-default-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199818" comment="xen-kmp-pae-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199819" comment="xen-libs-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199820" comment="xen-libs-32bit-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199821" comment="xen-tools-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199822" comment="xen-tools-domU-4.2.2_04-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4537</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4537" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4537" source="CVE"/>
    <description>
    Xen 3.4 through 4.2, and possibly earlier versions, does not properly synchronize the p2m and m2p tables when the set_p2m_entry function fails, which allows local HVM guest OS administrators to cause a denial of service (memory consumption and assertion failure), aka "Memory mapping failure DoS vulnerability."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4537.html">CVE-2012-4537</cve>
<bugzilla href="https://bugzilla.suse.com/779212">SUSE bug 779212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/786516">SUSE bug 786516</bugzilla>
<bugzilla href="https://bugzilla.suse.com/786517">SUSE bug 786517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/786518">SUSE bug 786518</bugzilla>
<bugzilla href="https://bugzilla.suse.com/786519">SUSE bug 786519</bugzilla>
<bugzilla href="https://bugzilla.suse.com/786520">SUSE bug 786520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/787163">SUSE bug 787163</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199814" comment="xen-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199815" comment="xen-doc-html-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199816" comment="xen-doc-pdf-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199817" comment="xen-kmp-default-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199818" comment="xen-kmp-pae-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199819" comment="xen-libs-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199820" comment="xen-libs-32bit-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199821" comment="xen-tools-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199822" comment="xen-tools-domU-4.2.2_04-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4538</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4538" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4538" source="CVE"/>
    <description>
    The HVMOP_pagetable_dying hypercall in Xen 4.0, 4.1, and 4.2 does not properly check the pagetable state when running on shadow pagetables, which allows a local HVM guest OS to cause a denial of service (hypervisor crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4538.html">CVE-2012-4538</cve>
<bugzilla href="https://bugzilla.suse.com/779212">SUSE bug 779212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/786516">SUSE bug 786516</bugzilla>
<bugzilla href="https://bugzilla.suse.com/786518">SUSE bug 786518</bugzilla>
<bugzilla href="https://bugzilla.suse.com/786519">SUSE bug 786519</bugzilla>
<bugzilla href="https://bugzilla.suse.com/786520">SUSE bug 786520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/787163">SUSE bug 787163</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199814" comment="xen-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199815" comment="xen-doc-html-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199816" comment="xen-doc-pdf-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199817" comment="xen-kmp-default-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199818" comment="xen-kmp-pae-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199819" comment="xen-libs-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199820" comment="xen-libs-32bit-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199821" comment="xen-tools-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199822" comment="xen-tools-domU-4.2.2_04-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4539</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4539" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4539" source="CVE"/>
    <description>
    Xen 4.0 through 4.2, when running 32-bit x86 PV guests on 64-bit hypervisors, allows local guest OS administrators to cause a denial of service (infinite loop and hang or crash) via invalid arguments to GNTTABOP_get_status_frames, aka "Grant table hypercall infinite loop DoS vulnerability."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4539.html">CVE-2012-4539</cve>
<bugzilla href="https://bugzilla.suse.com/779212">SUSE bug 779212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/786516">SUSE bug 786516</bugzilla>
<bugzilla href="https://bugzilla.suse.com/786518">SUSE bug 786518</bugzilla>
<bugzilla href="https://bugzilla.suse.com/786519">SUSE bug 786519</bugzilla>
<bugzilla href="https://bugzilla.suse.com/786520">SUSE bug 786520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/787163">SUSE bug 787163</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199814" comment="xen-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199815" comment="xen-doc-html-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199816" comment="xen-doc-pdf-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199817" comment="xen-kmp-default-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199818" comment="xen-kmp-pae-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199819" comment="xen-libs-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199820" comment="xen-libs-32bit-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199821" comment="xen-tools-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199822" comment="xen-tools-domU-4.2.2_04-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4544</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4544" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4544" source="CVE"/>
    <description>
    The PV domain builder in Xen 4.2 and earlier does not validate the size of the kernel or ramdisk (1) before or (2) after decompression, which allows local guest administrators to cause a denial of service (domain 0 memory consumption) via a crafted (a) kernel or (b) ramdisk.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4544.html">CVE-2012-4544</cve>
<bugzilla href="https://bugzilla.suse.com/779212">SUSE bug 779212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/786516">SUSE bug 786516</bugzilla>
<bugzilla href="https://bugzilla.suse.com/786518">SUSE bug 786518</bugzilla>
<bugzilla href="https://bugzilla.suse.com/786519">SUSE bug 786519</bugzilla>
<bugzilla href="https://bugzilla.suse.com/786520">SUSE bug 786520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/787163">SUSE bug 787163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199814" comment="xen-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199815" comment="xen-doc-html-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199816" comment="xen-doc-pdf-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199817" comment="xen-kmp-default-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199818" comment="xen-kmp-pae-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199819" comment="xen-libs-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199820" comment="xen-libs-32bit-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199821" comment="xen-tools-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199822" comment="xen-tools-domU-4.2.2_04-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4557</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4557" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4557" source="CVE"/>
    <description>
    The mod_proxy_ajp module in the Apache HTTP Server 2.2.12 through 2.2.21 places a worker node into an error state upon detection of a long request-processing time, which allows remote attackers to cause a denial of service (worker consumption) via an expensive request.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4557.html">CVE-2012-4557</cve>
<bugzilla href="https://bugzilla.suse.com/788121">SUSE bug 788121</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199288" comment="apache2-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199289" comment="apache2-doc-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199290" comment="apache2-example-pages-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199291" comment="apache2-prefork-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199292" comment="apache2-utils-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199293" comment="apache2-worker-2.2.12-1.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4558</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4558" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4558" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in the balancer_handler function in the manager interface in mod_proxy_balancer.c in the mod_proxy_balancer module in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via a crafted string.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4558.html">CVE-2012-4558</cve>
<bugzilla href="https://bugzilla.suse.com/806458">SUSE bug 806458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/807152">SUSE bug 807152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/807511">SUSE bug 807511</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199288" comment="apache2-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199289" comment="apache2-doc-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199290" comment="apache2-example-pages-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199291" comment="apache2-prefork-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199292" comment="apache2-utils-2.2.12-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199293" comment="apache2-worker-2.2.12-1.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4564</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4564" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4564" source="CVE"/>
    <description>
    ppm2tiff does not check the return value of the TIFFScanlineSize function, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PPM image that triggers an integer overflow, a zero-memory allocation, and a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4564.html">CVE-2012-4564</cve>
<bugzilla href="https://bugzilla.suse.com/781995">SUSE bug 781995</bugzilla>
<bugzilla href="https://bugzilla.suse.com/787892">SUSE bug 787892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/791607">SUSE bug 791607</bugzilla>
<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199680" comment="libtiff3-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199681" comment="libtiff3-32bit-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199682" comment="libtiff3-x86-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199683" comment="tiff-3.8.2-141.152 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4681</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4681" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4681" source="CVE"/>
    <description>
    Multiple vulnerabilities in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier allow remote attackers to execute arbitrary code via a crafted applet that bypasses SecurityManager restrictions by (1) using com.sun.beans.finder.ClassFinder.findClass and leveraging an exception with the forName method to access restricted classes from arbitrary packages such as sun.awt.SunToolkit, then (2) using "reflection with a trusted immediate caller" to leverage the getField method to access and modify private fields, as exploited in the wild in August 2012 using Gondzz.class and Gondvv.class.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4681.html">CVE-2012-4681</cve>
<bugzilla href="https://bugzilla.suse.com/777499">SUSE bug 777499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/778629">SUSE bug 778629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/780897">SUSE bug 780897</bugzilla>
<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
<bugzilla href="https://bugzilla.suse.com/798324">SUSE bug 798324</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4929</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-4929" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4929" source="CVE"/>
    <description>
    The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4929.html">CVE-2012-4929</cve>
<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/779952">SUSE bug 779952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/793420">SUSE bug 793420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/803004">SUSE bug 803004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/847895">SUSE bug 847895</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199582" comment="libQtWebKit4-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199583" comment="libQtWebKit4-32bit-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199584" comment="libQtWebKit4-x86-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199638" comment="libopenssl0_9_8-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199639" comment="libopenssl0_9_8-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199640" comment="libopenssl0_9_8-hmac-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199641" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199642" comment="libopenssl0_9_8-x86-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199585" comment="libqt4-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199586" comment="libqt4-32bit-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199587" comment="libqt4-qt3support-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199588" comment="libqt4-qt3support-32bit-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199589" comment="libqt4-qt3support-x86-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199590" comment="libqt4-sql-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199591" comment="libqt4-sql-32bit-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199592" comment="libqt4-sql-mysql-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199593" comment="libqt4-sql-sqlite-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199594" comment="libqt4-sql-x86-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199595" comment="libqt4-x11-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199596" comment="libqt4-x11-32bit-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199597" comment="libqt4-x11-x86-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199598" comment="libqt4-x86-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199643" comment="openssl-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199644" comment="openssl-doc-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199599" comment="qt4-x11-tools-4.6.3-5.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5067</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5067" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5067" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier allows remote attackers to affect confidentiality via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5067.html">CVE-2012-5067</cve>
<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5068</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5068" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5068" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5068.html">CVE-2012-5068</cve>
<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5069</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5069" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5069" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality and integrity via unknown vectors related to Concurrency.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5069.html">CVE-2012-5069</cve>
<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5070</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5070" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5070" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier allows remote attackers to affect confidentiality, related to JMX.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5070.html">CVE-2012-5070</cve>
<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5071</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5071" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5071" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality and integrity, related to JMX.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5071.html">CVE-2012-5071</cve>
<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5072</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5072" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5072" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5072.html">CVE-2012-5072</cve>
<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5073</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5073" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5073" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect integrity via unknown vectors related to Libraries, a different vulnerability than CVE-2012-5079.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5073.html">CVE-2012-5073</cve>
<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5074</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5074" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5074" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier allows remote attackers to affect confidentiality and integrity, related to JAX-WS.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5074.html">CVE-2012-5074</cve>
<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5075</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5075" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5075" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality, related to JMX.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5075.html">CVE-2012-5075</cve>
<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5076</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5076" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5076" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to JAX-WS.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5076.html">CVE-2012-5076</cve>
<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5077</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5077" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect confidentiality via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5077.html">CVE-2012-5077</cve>
<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5079</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5079" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5079" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect integrity via unknown vectors related to Libraries, a different vulnerability than CVE-2012-5073.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5079.html">CVE-2012-5079</cve>
<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5081</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5081" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5081" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect availability, related to JSSE.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5081.html">CVE-2012-5081</cve>
<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5083</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5083" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5083" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, 1.4.2_38 and earlier, and JavaFX 2.2 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5083.html">CVE-2012-5083</cve>
<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5084</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5084" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5084" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Swing.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5084.html">CVE-2012-5084</cve>
<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5086</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5086" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5086" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Beans.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5086.html">CVE-2012-5086</cve>
<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5087</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5087" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5087" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Beans.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5087.html">CVE-2012-5087</cve>
<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5088</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5088" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5088" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5088.html">CVE-2012-5088</cve>
<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5089</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5089" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5089" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to JMX, a different vulnerability than CVE-2012-3143.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5089.html">CVE-2012-5089</cve>
<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5134</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5134" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5134" source="CVE"/>
    <description>
    Heap-based buffer underflow in the xmlParseAttValueComplex function in parser.c in libxml2 2.9.0 and earlier, as used in Google Chrome before 23.0.1271.91 and other products, allows remote attackers to cause a denial of service or possibly execute arbitrary code via crafted entities in an XML document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5134.html">CVE-2012-5134</cve>
<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/791234">SUSE bug 791234</bugzilla>
<bugzilla href="https://bugzilla.suse.com/793334">SUSE bug 793334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/795039">SUSE bug 795039</bugzilla>
<bugzilla href="https://bugzilla.suse.com/804033">SUSE bug 804033</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199702" comment="libxml2-2.7.6-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199703" comment="libxml2-32bit-2.7.6-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199704" comment="libxml2-doc-2.7.6-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199705" comment="libxml2-x86-2.7.6-0.23 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5166</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5166" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5166" source="CVE"/>
    <description>
    ISC BIND 9.x before 9.7.6-P4, 9.8.x before 9.8.3-P4, 9.9.x before 9.9.1-P4, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P4 allows remote attackers to cause a denial of service (named daemon hang) via unspecified combinations of resource records.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5166.html">CVE-2012-5166</cve>
<bugzilla href="https://bugzilla.suse.com/784602">SUSE bug 784602</bugzilla>
<bugzilla href="https://bugzilla.suse.com/792926">SUSE bug 792926</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199364" comment="bind-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199365" comment="bind-chrootenv-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199366" comment="bind-doc-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199367" comment="bind-libs-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199368" comment="bind-libs-32bit-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199369" comment="bind-libs-x86-9.6ESVR7P4-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199370" comment="bind-utils-9.6ESVR7P4-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5510</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5510" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5510" source="CVE"/>
    <description>
    Xen 4.x, when downgrading the grant table version, does not properly remove the status page from the tracking list when freeing the page, which allows local guest OS administrators to cause a denial of service (hypervisor crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5510.html">CVE-2012-5510</cve>
<bugzilla href="https://bugzilla.suse.com/789945">SUSE bug 789945</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199814" comment="xen-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199815" comment="xen-doc-html-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199816" comment="xen-doc-pdf-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199817" comment="xen-kmp-default-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199818" comment="xen-kmp-pae-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199819" comment="xen-libs-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199820" comment="xen-libs-32bit-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199821" comment="xen-tools-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199822" comment="xen-tools-domU-4.2.2_04-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5511" source="CVE"/>
    <description>
    Stack-based buffer overflow in the dirty video RAM tracking functionality in Xen 3.4 through 4.1 allows local HVM guest OS administrators to cause a denial of service (crash) via a large bitmap image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5511.html">CVE-2012-5511</cve>
<bugzilla href="https://bugzilla.suse.com/789944">SUSE bug 789944</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199814" comment="xen-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199815" comment="xen-doc-html-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199816" comment="xen-doc-pdf-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199817" comment="xen-kmp-default-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199818" comment="xen-kmp-pae-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199819" comment="xen-libs-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199820" comment="xen-libs-32bit-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199821" comment="xen-tools-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199822" comment="xen-tools-domU-4.2.2_04-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5513</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5513" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5513" source="CVE"/>
    <description>
    The XENMEM_exchange handler in Xen 4.2 and earlier does not properly check the memory address, which allows local PV guest OS administrators to cause a denial of service (crash) or possibly gain privileges via unspecified vectors that overwrite memory in the hypervisor reserved range.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5513.html">CVE-2012-5513</cve>
<bugzilla href="https://bugzilla.suse.com/789951">SUSE bug 789951</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199814" comment="xen-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199815" comment="xen-doc-html-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199816" comment="xen-doc-pdf-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199817" comment="xen-kmp-default-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199818" comment="xen-kmp-pae-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199819" comment="xen-libs-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199820" comment="xen-libs-32bit-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199821" comment="xen-tools-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199822" comment="xen-tools-domU-4.2.2_04-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5514</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5514" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5514" source="CVE"/>
    <description>
    The guest_physmap_mark_populate_on_demand function in Xen 4.2 and earlier does not properly unlock the subject GFNs when checking if they are in use, which allows local guest HVM administrators to cause a denial of service (hang) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5514.html">CVE-2012-5514</cve>
<bugzilla href="https://bugzilla.suse.com/789948">SUSE bug 789948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/789988">SUSE bug 789988</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199814" comment="xen-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199815" comment="xen-doc-html-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199816" comment="xen-doc-pdf-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199817" comment="xen-kmp-default-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199818" comment="xen-kmp-pae-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199819" comment="xen-libs-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199820" comment="xen-libs-32bit-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199821" comment="xen-tools-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199822" comment="xen-tools-domU-4.2.2_04-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5515</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5515" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5515" source="CVE"/>
    <description>
    The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and (3) XENMEM_exchange hypercalls in Xen 4.2 and earlier allow local guest administrators to cause a denial of service (long loop and hang) via a crafted extent_order value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5515.html">CVE-2012-5515</cve>
<bugzilla href="https://bugzilla.suse.com/789950">SUSE bug 789950</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199814" comment="xen-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199815" comment="xen-doc-html-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199816" comment="xen-doc-pdf-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199817" comment="xen-kmp-default-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199818" comment="xen-kmp-pae-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199819" comment="xen-libs-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199820" comment="xen-libs-32bit-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199821" comment="xen-tools-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199822" comment="xen-tools-domU-4.2.2_04-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5517</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5517" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5517" source="CVE"/>
    <description>
    The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5517.html">CVE-2012-5517</cve>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/789235">SUSE bug 789235</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5519</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2012-5519" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5519" source="CVE"/>
    <description>
    CUPS 1.4.4, when running in certain Linux distributions such as Debian GNU/Linux, stores the web interface administrator key in /var/run/cups/certs/0 using certain permissions, which allows local users in the lpadmin group to read or write arbitrary files as root by leveraging the web interface.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5519.html">CVE-2012-5519</cve>
<bugzilla href="https://bugzilla.suse.com/789566">SUSE bug 789566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/882905">SUSE bug 882905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/924208">SUSE bug 924208</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203860" comment="cups-1.3.9-8.46.48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203861" comment="cups-client-1.3.9-8.46.48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203862" comment="cups-libs-1.3.9-8.46.48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203863" comment="cups-libs-32bit-1.3.9-8.46.48 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203860" comment="cups-1.3.9-8.46.48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203861" comment="cups-client-1.3.9-8.46.48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203862" comment="cups-libs-1.3.9-8.46.48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204263" comment="cups-libs-32bit-1.3.9-8.46.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208451" comment="cups-libs-x86-1.3.9-8.46.52 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5525</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5525" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5525" source="CVE"/>
    <description>
    The get_page_from_gfn hypercall function in Xen 4.2 allows local PV guest OS administrators to cause a denial of service (crash) via a crafted GFN that triggers a buffer over-read.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5525.html">CVE-2012-5525</cve>
<bugzilla href="https://bugzilla.suse.com/789952">SUSE bug 789952</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199814" comment="xen-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199815" comment="xen-doc-html-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199816" comment="xen-doc-pdf-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199817" comment="xen-kmp-default-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199818" comment="xen-kmp-pae-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199819" comment="xen-libs-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199820" comment="xen-libs-32bit-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199821" comment="xen-tools-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199822" comment="xen-tools-domU-4.2.2_04-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5526</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5526" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5526" source="CVE"/>
    <description>
    CGI.pm module before 3.63 for Perl does not properly escape newlines in (1) Set-Cookie or (2) P3P headers, which might allow remote attackers to inject arbitrary headers into responses from applications that use CGI.pm.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5526.html">CVE-2012-5526</cve>
<bugzilla href="https://bugzilla.suse.com/789994">SUSE bug 789994</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199743" comment="perl-5.10.0-64.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199744" comment="perl-32bit-5.10.0-64.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199745" comment="perl-Module-Build-0.2808.01-0.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199746" comment="perl-Test-Simple-0.72-0.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199747" comment="perl-base-5.10.0-64.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199748" comment="perl-doc-5.10.0-64.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199749" comment="perl-x86-5.10.0-64.67 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5532</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5532" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5532" source="CVE"/>
    <description>
    The main function in tools/hv/hv_kvp_daemon.c in hypervkvpd, as distributed in the Linux kernel before 3.8-rc1, allows local users to cause a denial of service (daemon exit) via a crafted application that sends a Netlink message.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2012-2669.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5532.html">CVE-2012-5532</cve>
<bugzilla href="https://bugzilla.suse.com/791605">SUSE bug 791605</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199495" comment="hyper-v-5-0.7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5568" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5568" source="CVE"/>
    <description>
    Apache Tomcat through 7.0.x allows remote attackers to cause a denial of service (daemon outage) via partial HTTP requests, as demonstrated by Slowloris.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5568.html">CVE-2012-5568</cve>
<bugzilla href="https://bugzilla.suse.com/791426">SUSE bug 791426</bugzilla>
<bugzilla href="https://bugzilla.suse.com/791679">SUSE bug 791679</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199802" comment="tomcat6-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199803" comment="tomcat6-admin-webapps-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199804" comment="tomcat6-docs-webapp-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199805" comment="tomcat6-javadoc-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199806" comment="tomcat6-jsp-2_1-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199807" comment="tomcat6-lib-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199808" comment="tomcat6-servlet-2_5-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199809" comment="tomcat6-webapps-6.0.18-20.35.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5581</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5581" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5581" source="CVE"/>
    <description>
    Stack-based buffer overflow in tif_dir.c in LibTIFF before 4.0.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted DOTRANGE tag in a TIFF image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5581.html">CVE-2012-5581</cve>
<bugzilla href="https://bugzilla.suse.com/791607">SUSE bug 791607</bugzilla>
<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199680" comment="libtiff3-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199681" comment="libtiff3-32bit-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199682" comment="libtiff3-x86-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199683" comment="tiff-3.8.2-141.152 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5592</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5592" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5592" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6052.  Reason: This candidate is a reservation duplicate of CVE-2012-6052.  Notes: All CVE users should reference CVE-2012-6052 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5592.html">CVE-2012-5592</cve>
<bugzilla href="https://bugzilla.suse.com/792005">SUSE bug 792005</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5593</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5593" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5593" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6053.  Reason: This candidate is a reservation duplicate of CVE-2012-6053.  Notes: All CVE users should reference CVE-2012-6053 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5593.html">CVE-2012-5593</cve>
<bugzilla href="https://bugzilla.suse.com/792005">SUSE bug 792005</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5594</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5594" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5594" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6054.  Reason: This candidate is a reservation duplicate of CVE-2012-6054.  Notes: All CVE users should reference CVE-2012-6054 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5594.html">CVE-2012-5594</cve>
<bugzilla href="https://bugzilla.suse.com/792005">SUSE bug 792005</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5595</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5595" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5595" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6056.  Reason: This candidate is a reservation duplicate of CVE-2012-6056.  Notes: All CVE users should reference CVE-2012-6056 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5595.html">CVE-2012-5595</cve>
<bugzilla href="https://bugzilla.suse.com/792005">SUSE bug 792005</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5596</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5596" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5596" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6057.  Reason: This candidate is a reservation duplicate of CVE-2012-6057.  Notes: All CVE users should reference CVE-2012-6057 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5596.html">CVE-2012-5596</cve>
<bugzilla href="https://bugzilla.suse.com/792005">SUSE bug 792005</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5597</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5597" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5597" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6059.  Reason: This candidate is a reservation duplicate of CVE-2012-6059.  Notes: All CVE users should reference CVE-2012-6059 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5597.html">CVE-2012-5597</cve>
<bugzilla href="https://bugzilla.suse.com/792005">SUSE bug 792005</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5598</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5598" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5598" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6060.  Reason: This candidate is a reservation duplicate of CVE-2012-6060.  Notes: All CVE users should reference CVE-2012-6060 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5598.html">CVE-2012-5598</cve>
<bugzilla href="https://bugzilla.suse.com/792005">SUSE bug 792005</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5599</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5599" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5599" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6061.  Reason: This candidate is a reservation duplicate of CVE-2012-6061.  Notes: All CVE users should reference CVE-2012-6061 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5599.html">CVE-2012-5599</cve>
<bugzilla href="https://bugzilla.suse.com/792005">SUSE bug 792005</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5600</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5600" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5600" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6062.  Reason: This candidate is a reservation duplicate of CVE-2012-6062.  Notes: All CVE users should reference CVE-2012-6062 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5600.html">CVE-2012-5600</cve>
<bugzilla href="https://bugzilla.suse.com/792005">SUSE bug 792005</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5601</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5601" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5601" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6055.  Reason: This candidate is a reservation duplicate of CVE-2012-6055.  Notes: All CVE users should reference CVE-2012-6055 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5601.html">CVE-2012-5601</cve>
<bugzilla href="https://bugzilla.suse.com/792005">SUSE bug 792005</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5602</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5602" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5602" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6058.  Reason: This candidate is a reservation duplicate of CVE-2012-6058.  Notes: All CVE users should reference CVE-2012-6058 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5602.html">CVE-2012-5602</cve>
<bugzilla href="https://bugzilla.suse.com/792005">SUSE bug 792005</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5611</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5611" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5611" source="CVE"/>
    <description>
    Stack-based buffer overflow in the acl_get function in Oracle MySQL 5.5.19 and other versions through 5.5.28, and 5.1.53 and other versions through 5.1.66, and MariaDB 5.5.2.x before 5.5.28a, 5.3.x before 5.3.11, 5.2.x before 5.2.13 and 5.1.x before 5.1.66, allows remote authenticated users to execute arbitrary code via a long argument to the GRANT FILE command.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5611.html">CVE-2012-5611</cve>
<bugzilla href="https://bugzilla.suse.com/792362">SUSE bug 792362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/792444">SUSE bug 792444</bugzilla>
<bugzilla href="https://bugzilla.suse.com/798753">SUSE bug 798753</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199635" comment="mysql-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199636" comment="mysql-client-5.5.31-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199637" comment="mysql-tools-5.5.31-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5615</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2012-5615" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5615" source="CVE"/>
    <description>
    Oracle MySQL 5.5.38 and earlier, 5.6.19 and earlier, and MariaDB 5.5.28a, 5.3.11, 5.2.13, 5.1.66, and possibly other versions, generates different error messages with different time delays depending on whether a user name exists, which allows remote attackers to enumerate valid usernames.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5615.html">CVE-2012-5615</cve>
<bugzilla href="https://bugzilla.suse.com/792440">SUSE bug 792440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264365" comment="libmysql55client18-x86-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5634</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5634" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5634" source="CVE"/>
    <description>
    Xen 4.2.x, 4.1.x, and 4.0, when using Intel VT-d for PCI passthrough, does not properly configure VT-d when supporting a device that is behind a legacy PCI Bridge, which allows local guests to cause a denial of service to other guests by injecting an interrupt.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5634.html">CVE-2012-5634</cve>
<bugzilla href="https://bugzilla.suse.com/794316">SUSE bug 794316</bugzilla>
<bugzilla href="https://bugzilla.suse.com/800275">SUSE bug 800275</bugzilla>
<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199814" comment="xen-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199815" comment="xen-doc-html-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199816" comment="xen-doc-pdf-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199817" comment="xen-kmp-default-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199818" comment="xen-kmp-pae-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199819" comment="xen-libs-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199820" comment="xen-libs-32bit-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199821" comment="xen-tools-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199822" comment="xen-tools-domU-4.2.2_04-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5643</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2012-5643" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5643" source="CVE"/>
    <description>
    Multiple memory leaks in tools/cachemgr.cc in cachemgr.cgi in Squid 2.x and 3.x before 3.1.22, 3.2.x before 3.2.4, and 3.3.x before 3.3.0.2 allow remote attackers to cause a denial of service (memory consumption) via (1) invalid Content-Length headers, (2) long POST requests, or (3) crafted authentication credentials.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5643.html">CVE-2012-5643</cve>
<bugzilla href="https://bugzilla.suse.com/794954">SUSE bug 794954</bugzilla>
<bugzilla href="https://bugzilla.suse.com/796999">SUSE bug 796999</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210806" comment="squid3-3.1.23-8.16.30 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199783" comment="squid-2.7.STABLE5-2.12.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199784" comment="squid3-3.1.12-8.12 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5662</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5662" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5662" source="CVE"/>
    <description>
    x3270 before 3.3.12ga12 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5662.html">CVE-2012-5662</cve>
<bugzilla href="https://bugzilla.suse.com/807424">SUSE bug 807424</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199813" comment="x3270-3.3.12-517.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5668</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5668" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5668" source="CVE"/>
    <description>
    FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to BDF fonts and the improper handling of an "allocation error" in the bdf_free_font function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5668.html">CVE-2012-5668</cve>
<bugzilla href="https://bugzilla.suse.com/795826">SUSE bug 795826</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199430" comment="freetype2-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199431" comment="freetype2-32bit-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199432" comment="freetype2-x86-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199433" comment="ft2demos-2.3.7-25.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5669</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5669" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5669" source="CVE"/>
    <description>
    The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to BDF fonts and an incorrect calculation that triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5669.html">CVE-2012-5669</cve>
<bugzilla href="https://bugzilla.suse.com/795826">SUSE bug 795826</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199430" comment="freetype2-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199431" comment="freetype2-32bit-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199432" comment="freetype2-x86-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199433" comment="ft2demos-2.3.7-25.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5670</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5670" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5670" source="CVE"/>
    <description>
    The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) via vectors related to BDF fonts and an ENCODING field with a negative value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5670.html">CVE-2012-5670</cve>
<bugzilla href="https://bugzilla.suse.com/795826">SUSE bug 795826</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199430" comment="freetype2-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199431" comment="freetype2-32bit-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199432" comment="freetype2-x86-2.3.7-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199433" comment="ft2demos-2.3.7-25.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5783</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5783" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5783" source="CVE"/>
    <description>
    Apache Commons HttpClient 3.x, as used in Amazon Flexible Payments Service (FPS) merchant Java SDK and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5783.html">CVE-2012-5783</cve>
<bugzilla href="https://bugzilla.suse.com/1132354">SUSE bug 1132354</bugzilla>
<bugzilla href="https://bugzilla.suse.com/803332">SUSE bug 803332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/803333">SUSE bug 803333</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199498" comment="jakarta-commons-httpclient3-3.0.1-253.36 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5784</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2012-5784" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5784" source="CVE"/>
    <description>
    Apache Axis 1.4 and earlier, as used in PayPal Payments Pro, PayPal Mass Pay, PayPal Transactional Information SOAP, the Java Message Service implementation in Apache ActiveMQ, and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5784.html">CVE-2012-5784</cve>
<bugzilla href="https://bugzilla.suse.com/1134598">SUSE bug 1134598</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254573" comment="axis-1.4-236.236.44.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5829</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5829" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5829" source="CVE"/>
    <description>
    Heap-based buffer overflow in the nsWindow::OnExposeEvent function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5829.html">CVE-2012-5829</cve>
<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5830" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5830" source="CVE"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 on Mac OS X allows remote attackers to execute arbitrary code via an HTML document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5830.html">CVE-2012-5830</cve>
<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5833</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5833" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5833" source="CVE"/>
    <description>
    The texImage2D implementation in the WebGL subsystem in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 does not properly interact with Mesa drivers, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via function calls involving certain values of the level parameter.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5833.html">CVE-2012-5833</cve>
<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5835" source="CVE"/>
    <description>
    Integer overflow in the WebGL subsystem in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (invalid write operation) via crafted data.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5835.html">CVE-2012-5835</cve>
<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5838</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5838" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5838" source="CVE"/>
    <description>
    The copyTexImage2D implementation in the WebGL subsystem in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via large image dimensions.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5838.html">CVE-2012-5838</cve>
<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5839</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5839" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5839" source="CVE"/>
    <description>
    Heap-based buffer overflow in the gfxShapedWord::CompressedGlyph::IsClusterStart function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5839.html">CVE-2012-5839</cve>
<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5840" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5840" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsTextEditorState::PrepareEditor function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-4214.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5840.html">CVE-2012-5840</cve>
<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5841</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5841" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5841" source="CVE"/>
    <description>
    Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 implement cross-origin wrappers with a filtering behavior that does not properly restrict write actions, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5841.html">CVE-2012-5841</cve>
<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5842</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5842" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5842" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5842.html">CVE-2012-5842</cve>
<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5843</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5843" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5843" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5843.html">CVE-2012-5843</cve>
<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5885</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5885" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5885" source="CVE"/>
    <description>
    The replay-countermeasure functionality in the HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 tracks cnonce (aka client nonce) values instead of nonce (aka server nonce) and nc (aka nonce-count) values, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests, a different vulnerability than CVE-2011-1184.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5885.html">CVE-2012-5885</cve>
<bugzilla href="https://bugzilla.suse.com/791423">SUSE bug 791423</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199802" comment="tomcat6-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199803" comment="tomcat6-admin-webapps-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199804" comment="tomcat6-docs-webapp-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199805" comment="tomcat6-javadoc-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199806" comment="tomcat6-jsp-2_1-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199807" comment="tomcat6-lib-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199808" comment="tomcat6-servlet-2_5-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199809" comment="tomcat6-webapps-6.0.18-20.35.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5886</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5886" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5886" source="CVE"/>
    <description>
    The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 caches information about the authenticated user within the session state, which makes it easier for remote attackers to bypass authentication via vectors related to the session ID.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5886.html">CVE-2012-5886</cve>
<bugzilla href="https://bugzilla.suse.com/791424">SUSE bug 791424</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199802" comment="tomcat6-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199803" comment="tomcat6-admin-webapps-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199804" comment="tomcat6-docs-webapp-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199805" comment="tomcat6-javadoc-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199806" comment="tomcat6-jsp-2_1-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199807" comment="tomcat6-lib-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199808" comment="tomcat6-servlet-2_5-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199809" comment="tomcat6-webapps-6.0.18-20.35.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5887</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-5887" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5887" source="CVE"/>
    <description>
    The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 does not properly check for stale nonce values in conjunction with enforcement of proper credentials, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5887.html">CVE-2012-5887</cve>
<bugzilla href="https://bugzilla.suse.com/791426">SUSE bug 791426</bugzilla>
<bugzilla href="https://bugzilla.suse.com/822177">SUSE bug 822177</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199802" comment="tomcat6-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199803" comment="tomcat6-admin-webapps-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199804" comment="tomcat6-docs-webapp-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199805" comment="tomcat6-javadoc-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199806" comment="tomcat6-jsp-2_1-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199807" comment="tomcat6-lib-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199808" comment="tomcat6-servlet-2_5-api-6.0.18-20.35.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199809" comment="tomcat6-webapps-6.0.18-20.35.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6075</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-6075" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6075" source="CVE"/>
    <description>
    Buffer overflow in the e1000_receive function in the e1000 device driver (hw/e1000.c) in QEMU 1.3.0-rc2 and other versions, when the SBP and LPE flags are disabled, allows remote attackers to cause a denial of service (guest OS crash) and possibly execute arbitrary guest code via a large packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-6075.html">CVE-2012-6075</cve>
<bugzilla href="https://bugzilla.suse.com/797523">SUSE bug 797523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/800275">SUSE bug 800275</bugzilla>
<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199814" comment="xen-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199815" comment="xen-doc-html-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199816" comment="xen-doc-pdf-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199817" comment="xen-kmp-default-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199818" comment="xen-kmp-pae-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199819" comment="xen-libs-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199820" comment="xen-libs-32bit-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199821" comment="xen-tools-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199822" comment="xen-tools-domU-4.2.2_04-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6085</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2012-6085" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6085" source="CVE"/>
    <description>
    The read_block function in g10/import.c in GnuPG 1.4.x before 1.4.13 and 2.0.x through 2.0.19, when importing a key, allows remote attackers to corrupt the public keyring database or cause a denial of service (application crash) via a crafted length field of an OpenPGP packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-6085.html">CVE-2012-6085</cve>
<bugzilla href="https://bugzilla.suse.com/798465">SUSE bug 798465</bugzilla>
<bugzilla href="https://bugzilla.suse.com/880249">SUSE bug 880249</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213410" comment="gpg2-2.0.9-25.33.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213411" comment="gpg2-lang-2.0.9-25.33.33 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6093</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-6093" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6093" source="CVE"/>
    <description>
    The QSslSocket::sslErrors function in Qt before 4.6.5, 4.7.x before 4.7.6, 4.8.x before 4.8.5, when using certain versions of openSSL, uses an "incompatible structure layout" that can read memory from the wrong location, which causes Qt to report an incorrect error when certificate validation fails and might cause users to make unsafe security decisions to accept a certificate.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-6093.html">CVE-2012-6093</cve>
<bugzilla href="https://bugzilla.suse.com/797006">SUSE bug 797006</bugzilla>
<bugzilla href="https://bugzilla.suse.com/802634">SUSE bug 802634</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199582" comment="libQtWebKit4-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199583" comment="libQtWebKit4-32bit-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199584" comment="libQtWebKit4-x86-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199585" comment="libqt4-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199586" comment="libqt4-32bit-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199587" comment="libqt4-qt3support-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199588" comment="libqt4-qt3support-32bit-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199589" comment="libqt4-qt3support-x86-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199590" comment="libqt4-sql-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199591" comment="libqt4-sql-32bit-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199592" comment="libqt4-sql-mysql-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199593" comment="libqt4-sql-sqlite-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199594" comment="libqt4-sql-x86-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199595" comment="libqt4-x11-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199596" comment="libqt4-x11-32bit-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199597" comment="libqt4-x11-x86-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199598" comment="libqt4-x86-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199599" comment="qt4-x11-tools-4.6.3-5.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6096</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-6096" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6096" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in the get_history function in history.cgi in Nagios Core before 3.4.4, and Icinga 1.6.x before 1.6.2, 1.7.x before 1.7.4, and 1.8.x before 1.8.4, might allow remote attackers to execute arbitrary code via a long (1) host_name variable (host parameter) or (2) svc_description variable.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-6096.html">CVE-2012-6096</cve>
<bugzilla href="https://bugzilla.suse.com/797237">SUSE bug 797237</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199717" comment="nagios-3.0.6-1.25.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199718" comment="nagios-www-3.0.6-1.25.28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2012-6139" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6139" source="CVE"/>
    <description>
    libxslt before 1.1.28 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an (1) empty match attribute in a XSL key to the xsltAddKey function in keys.c or (2) uninitialized variable to the xsltDocumentFunction function in functions.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-6139.html">CVE-2012-6139</cve>
<bugzilla href="https://bugzilla.suse.com/811686">SUSE bug 811686</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200346" comment="libxslt-1.1.24-19.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200347" comment="libxslt-32bit-1.1.24-19.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200348" comment="libxslt-x86-1.1.24-19.23 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200346" comment="libxslt-1.1.24-19.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200347" comment="libxslt-32bit-1.1.24-19.23 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6150</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2012-6150" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6150" source="CVE"/>
    <description>
    The winbind_name_list_to_sid_string_list function in nsswitch/pam_winbind.c in Samba through 4.1.2 handles invalid require_membership_of group names by accepting authentication by any user, which allows remote authenticated users to bypass intended access restrictions in opportunistic circumstances by leveraging an administrator's pam_winbind configuration-file mistake.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-6150.html">CVE-2012-6150</cve>
<bugzilla href="https://bugzilla.suse.com/844720">SUSE bug 844720</bugzilla>
<bugzilla href="https://bugzilla.suse.com/853347">SUSE bug 853347</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213451" comment="ldapsmb-1.34b-12.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213413" comment="libldb1-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213415" comment="libsmbclient0-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204235" comment="libsmbclient0-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208444" comment="libsmbclient0-x86-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213417" comment="libtalloc2-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204237" comment="libtalloc2-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208445" comment="libtalloc2-x86-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213419" comment="libtdb1-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204239" comment="libtdb1-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208446" comment="libtdb1-x86-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213421" comment="libtevent0-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204241" comment="libtevent0-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213423" comment="libwbclient0-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204243" comment="libwbclient0-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208447" comment="libwbclient0-x86-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213425" comment="samba-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204245" comment="samba-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213427" comment="samba-client-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204247" comment="samba-client-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208448" comment="samba-client-x86-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213429" comment="samba-doc-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213430" comment="samba-krb-printing-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213431" comment="samba-winbind-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204251" comment="samba-winbind-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208449" comment="samba-winbind-x86-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208450" comment="samba-x86-3.6.3-0.52 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213451" comment="ldapsmb-1.34b-12.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213413" comment="libldb1-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213415" comment="libsmbclient0-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213416" comment="libsmbclient0-32bit-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213417" comment="libtalloc2-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213418" comment="libtalloc2-32bit-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213419" comment="libtdb1-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213420" comment="libtdb1-32bit-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213421" comment="libtevent0-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213422" comment="libtevent0-32bit-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213423" comment="libwbclient0-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213424" comment="libwbclient0-32bit-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213425" comment="samba-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213426" comment="samba-32bit-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213427" comment="samba-client-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213428" comment="samba-client-32bit-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213429" comment="samba-doc-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213430" comment="samba-krb-printing-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213431" comment="samba-winbind-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213432" comment="samba-winbind-32bit-3.6.3-0.46 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126329" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6329</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2012-6329" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6329" source="CVE"/>
    <description>
    The _compile function in Maketext.pm in the Locale::Maketext implementation in Perl before 5.17.7 does not properly handle backslashes and fully qualified method names during compilation of bracket notation, which allows context-dependent attackers to execute arbitrary commands via crafted input to an application that accepts translation strings from users, as demonstrated by the TWiki application before 5.1.3, and the Foswiki application 1.0.x through 1.0.10 and 1.1.x through 1.1.6.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-6329.html">CVE-2012-6329</cve>
<bugzilla href="https://bugzilla.suse.com/797060">SUSE bug 797060</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199743" comment="perl-5.10.0-64.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199744" comment="perl-32bit-5.10.0-64.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199745" comment="perl-Module-Build-0.2808.01-0.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199746" comment="perl-Test-Simple-0.72-0.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199747" comment="perl-base-5.10.0-64.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199748" comment="perl-doc-5.10.0-64.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199749" comment="perl-x86-5.10.0-64.67 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6656</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2012-6656" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656" source="CVE"/>
    <description>
    iconvdata/ibm930.c in GNU C Library (aka glibc) before 2.16 allows context-dependent attackers to cause a denial of service (out-of-bounds read) via a multibyte character value of "0xffff" to the iconv function when converting IBM930 encoded data to UTF-8.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-6656.html">CVE-2012-6656</cve>
<bugzilla href="https://bugzilla.suse.com/894556">SUSE bug 894556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/903057">SUSE bug 903057</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213477" comment="glibc-2.11.3-17.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213478" comment="glibc-32bit-2.11.3-17.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213479" comment="glibc-devel-2.11.3-17.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213480" comment="glibc-devel-32bit-2.11.3-17.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213509" comment="glibc-html-2.11.3-17.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213481" comment="glibc-i18ndata-2.11.3-17.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213510" comment="glibc-info-2.11.3-17.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213482" comment="glibc-locale-2.11.3-17.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213483" comment="glibc-locale-32bit-2.11.3-17.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213511" comment="glibc-profile-2.11.3-17.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213512" comment="glibc-profile-32bit-2.11.3-17.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213484" comment="nscd-2.11.3-17.80 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213477" comment="glibc-2.11.3-17.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213478" comment="glibc-32bit-2.11.3-17.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213479" comment="glibc-devel-2.11.3-17.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213480" comment="glibc-devel-32bit-2.11.3-17.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213509" comment="glibc-html-2.11.3-17.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213481" comment="glibc-i18ndata-2.11.3-17.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213510" comment="glibc-info-2.11.3-17.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213482" comment="glibc-locale-2.11.3-17.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213483" comment="glibc-locale-32bit-2.11.3-17.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264379" comment="glibc-locale-x86-2.11.3-17.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213511" comment="glibc-profile-2.11.3-17.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213512" comment="glibc-profile-32bit-2.11.3-17.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264380" comment="glibc-profile-x86-2.11.3-17.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264381" comment="glibc-x86-2.11.3-17.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213484" comment="nscd-2.11.3-17.80 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6698</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2012-6698" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6698" source="CVE"/>
    <description>
    The decode_search function in dhcp.c in dhcpcd 3.x allows remote DHCP servers to cause a denial of service (out-of-bounds write) via a crafted response.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-6698.html">CVE-2012-6698</cve>
<bugzilla href="https://bugzilla.suse.com/955762">SUSE bug 955762</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204273" comment="dhcpcd-3.2.3-45.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6699</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2012-6699" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6699" source="CVE"/>
    <description>
    The decode_search function in dhcp.c in dhcpcd 3.x allows remote DHCP servers to cause a denial of service (out-of-bounds read) via a crafted response.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-6699.html">CVE-2012-6699</cve>
<bugzilla href="https://bugzilla.suse.com/955762">SUSE bug 955762</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204273" comment="dhcpcd-3.2.3-45.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6700</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2012-6700" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6700" source="CVE"/>
    <description>
    The decode_search function in dhcp.c in dhcpcd 3.x does not properly free allocated memory, which allows remote DHCP servers to cause a denial of service via a crafted response.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-6700.html">CVE-2012-6700</cve>
<bugzilla href="https://bugzilla.suse.com/955762">SUSE bug 955762</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204273" comment="dhcpcd-3.2.3-45.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6702</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2012-6702" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6702" source="CVE"/>
    <description>
    Expat, when used in a parser that has not called XML_SetHashSalt or passed it a seed of 0, makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via vectors involving use of the srand function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-6702.html">CVE-2012-6702</cve>
<bugzilla href="https://bugzilla.suse.com/983215">SUSE bug 983215</bugzilla>
<bugzilla href="https://bugzilla.suse.com/983216">SUSE bug 983216</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202511" comment="expat-2.0.1-88.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209230" comment="libexpat1-2.0.1-88.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209231" comment="libexpat1-32bit-2.0.1-88.41 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6704</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2012-6704" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6704" source="CVE"/>
    <description>
    The sock_setsockopt function in net/core/sock.c in the Linux kernel before 3.5 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUF or (2) SO_RCVBUF option.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-6704.html">CVE-2012-6704</cve>
<bugzilla href="https://bugzilla.suse.com/1013531">SUSE bug 1013531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1013542">SUSE bug 1013542</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208770" comment="kernel-default-man-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205650" comment="kernel-pae-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205651" comment="kernel-pae-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205652" comment="kernel-pae-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6706</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2012-6706" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6706" source="CVE"/>
    <description>
    A VMSF_DELTA memory corruption was discovered in unrar before 5.5.5, as used in Sophos Anti-Virus Threat Detection Engine before 3.37.2 and other products, that can lead to arbitrary code execution. An integer overflow can be caused in DataSize+CurChannel. The result is a negative value of the "DestPos" variable, which allows the attacker to write out of bounds when setting Mem[DestPos].
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-6706.html">CVE-2012-6706</cve>
<bugzilla href="https://bugzilla.suse.com/1045315">SUSE bug 1045315</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1045490">SUSE bug 1045490</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1051712">SUSE bug 1051712</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1083915">SUSE bug 1083915</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205314" comment="clamav-0.99.4-0.20.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205944" comment="unrar-3.80.2-4 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205314" comment="clamav-0.99.4-0.20.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210859" comment="unrar-5.6.1-5.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0149</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-0149" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0149" source="CVE"/>
    <description>
    The OSPF implementation in Cisco IOS 12.0 through 12.4 and 15.0 through 15.3, IOS-XE 2.x through 3.9.xS, ASA and PIX 7.x through 9.1, FWSM, NX-OS, and StarOS before 14.0.50488 does not properly validate Link State Advertisement (LSA) type 1 packets before performing operations on the LSA database, which allows remote attackers to cause a denial of service (routing disruption) or obtain sensitive packet information via a (1) unicast or (2) multicast packet, aka Bug IDs CSCug34485, CSCug34469, CSCug39762, CSCug63304, and CSCug39795.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0149.html">CVE-2013-0149</cve>
<bugzilla href="https://bugzilla.suse.com/822572">SUSE bug 822572</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200428" comment="quagga-0.99.15-0.14 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0151</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0151" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0151" source="CVE"/>
    <description>
    The do_hvm_op function in xen/arch/x86/hvm/hvm.c in Xen 4.2.x on the x86_32 platform does not prevent HVM_PARAM_NESTEDHVM (aka nested virtualization) operations, which allows guest OS users to cause a denial of service (long-duration page mappings and host OS crash) by leveraging administrative access to an HVM guest in a domain with a large number of VCPUs.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0151.html">CVE-2013-0151</cve>
<bugzilla href="https://bugzilla.suse.com/797285">SUSE bug 797285</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199814" comment="xen-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199815" comment="xen-doc-html-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199816" comment="xen-doc-pdf-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199817" comment="xen-kmp-default-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199818" comment="xen-kmp-pae-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199819" comment="xen-libs-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199820" comment="xen-libs-32bit-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199821" comment="xen-tools-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199822" comment="xen-tools-domU-4.2.2_04-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0152</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0152" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0152" source="CVE"/>
    <description>
    Memory leak in Xen 4.2 and unstable allows local HVM guests to cause a denial of service (host memory consumption) by performing nested virtualization in a way that triggers errors that are not properly handled.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0152.html">CVE-2013-0152</cve>
<bugzilla href="https://bugzilla.suse.com/797287">SUSE bug 797287</bugzilla>
<bugzilla href="https://bugzilla.suse.com/800798">SUSE bug 800798</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199814" comment="xen-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199815" comment="xen-doc-html-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199816" comment="xen-doc-pdf-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199817" comment="xen-kmp-default-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199818" comment="xen-kmp-pae-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199819" comment="xen-libs-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199820" comment="xen-libs-32bit-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199821" comment="xen-tools-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199822" comment="xen-tools-domU-4.2.2_04-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0153</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0153" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0153" source="CVE"/>
    <description>
    The AMD IOMMU support in Xen 4.2.x, 4.1.x, 3.3, and other versions, when using AMD-Vi for PCI passthrough, uses the same interrupt remapping table for the host and all guests, which allows guests to cause a denial of service by injecting an interrupt into other guests.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0153.html">CVE-2013-0153</cve>
<bugzilla href="https://bugzilla.suse.com/800275">SUSE bug 800275</bugzilla>
<bugzilla href="https://bugzilla.suse.com/800802">SUSE bug 800802</bugzilla>
<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199814" comment="xen-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199815" comment="xen-doc-html-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199816" comment="xen-doc-pdf-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199817" comment="xen-kmp-default-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199818" comment="xen-kmp-pae-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199819" comment="xen-libs-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199820" comment="xen-libs-32bit-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199821" comment="xen-tools-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199822" comment="xen-tools-domU-4.2.2_04-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0160</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-0160" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0160" source="CVE"/>
    <description>
    The Linux kernel through 3.7.9 allows local users to obtain sensitive information about keystroke timing by using the inotify API on the /dev/ptmx device.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0160.html">CVE-2013-0160</cve>
<bugzilla href="https://bugzilla.suse.com/797175">SUSE bug 797175</bugzilla>
<bugzilla href="https://bugzilla.suse.com/841063">SUSE bug 841063</bugzilla>
<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213529" comment="kernel-default-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213530" comment="kernel-default-base-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213531" comment="kernel-default-devel-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213533" comment="kernel-source-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213534" comment="kernel-syms-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213585" comment="kernel-trace-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213586" comment="kernel-trace-base-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213535" comment="kernel-trace-devel-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213536" comment="kernel-xen-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213537" comment="kernel-xen-base-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213538" comment="kernel-xen-devel-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215421" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264390" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0166</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0166" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0166" source="CVE"/>
    <description>
    OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0166.html">CVE-2013-0166</cve>
<bugzilla href="https://bugzilla.suse.com/802648">SUSE bug 802648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/802746">SUSE bug 802746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/813366">SUSE bug 813366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/821818">SUSE bug 821818</bugzilla>
<bugzilla href="https://bugzilla.suse.com/833408">SUSE bug 833408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/911906">SUSE bug 911906</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199638" comment="libopenssl0_9_8-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199639" comment="libopenssl0_9_8-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199640" comment="libopenssl0_9_8-hmac-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199641" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199642" comment="libopenssl0_9_8-x86-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199643" comment="openssl-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199644" comment="openssl-doc-0.9.8j-0.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0169</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0169" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0169" source="CVE"/>
    <description>
    The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0169.html">CVE-2013-0169</cve>
<bugzilla href="https://bugzilla.suse.com/1070148">SUSE bug 1070148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1103036">SUSE bug 1103036</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1103597">SUSE bug 1103597</bugzilla>
<bugzilla href="https://bugzilla.suse.com/802184">SUSE bug 802184</bugzilla>
<bugzilla href="https://bugzilla.suse.com/802648">SUSE bug 802648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/802746">SUSE bug 802746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/804654">SUSE bug 804654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/809839">SUSE bug 809839</bugzilla>
<bugzilla href="https://bugzilla.suse.com/813366">SUSE bug 813366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/813939">SUSE bug 813939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/821818">SUSE bug 821818</bugzilla>
<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/977584">SUSE bug 977584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/977616">SUSE bug 977616</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199638" comment="libopenssl0_9_8-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199639" comment="libopenssl0_9_8-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199640" comment="libopenssl0_9_8-hmac-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199641" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199642" comment="libopenssl0_9_8-x86-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199643" comment="openssl-0.9.8j-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199644" comment="openssl-doc-0.9.8j-0.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0188</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-0188" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0188" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2013-0189, CVE-2013-0191.  Reason: this identifier was intended for one issue, but it was inadvertently associated with multiple issues.  Notes: All CVE users should consult CVE-2013-0189 and CVE-2013-0191 to determine which ID is appropriate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0188.html">CVE-2013-0188</cve>
<bugzilla href="https://bugzilla.suse.com/794954">SUSE bug 794954</bugzilla>
<bugzilla href="https://bugzilla.suse.com/796999">SUSE bug 796999</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210806" comment="squid3-3.1.23-8.16.30 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199783" comment="squid-2.7.STABLE5-2.12.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199784" comment="squid3-3.1.12-8.12 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0189</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0189" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0189" source="CVE"/>
    <description>
    cachemgr.cgi in Squid 3.1.x and 3.2.x, possibly 3.1.22, 3.2.4, and other versions, allows remote attackers to cause a denial of service (resource consumption) via a crafted request.  NOTE: this issue is due to an incorrect fix for CVE-2012-5643, possibly involving an incorrect order of arguments or incorrect comparison.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0189.html">CVE-2013-0189</cve>
<bugzilla href="https://bugzilla.suse.com/794954">SUSE bug 794954</bugzilla>
<bugzilla href="https://bugzilla.suse.com/796999">SUSE bug 796999</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199783" comment="squid-2.7.STABLE5-2.12.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199784" comment="squid3-3.1.12-8.12 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0200</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-0200" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0200" source="CVE"/>
    <description>
    HP Linux Imaging and Printing (HPLIP) through 3.12.4 allows local users to overwrite arbitrary files via a symlink attack on the (1) /tmp/hpcupsfilterc_#.bmp, (2) /tmp/hpcupsfilterk_#.bmp, (3) /tmp/hpcups_job#.out, (4) /tmp/hpijs_#####.out, or (5) /tmp/hpps_job#.out temporary file, a different vulnerability than CVE-2011-2722.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0200.html">CVE-2013-0200</cve>
<bugzilla href="https://bugzilla.suse.com/808355">SUSE bug 808355</bugzilla>
<bugzilla href="https://bugzilla.suse.com/836937">SUSE bug 836937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/852368">SUSE bug 852368</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200077" comment="hplip-3.11.10-0.6.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200078" comment="hplip-hpijs-3.11.10-0.6.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0213</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0213" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0213" source="CVE"/>
    <description>
    The Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.21, 3.6.x before 3.6.12, and 4.x before 4.0.2 allows remote attackers to conduct clickjacking attacks via a (1) FRAME or (2) IFRAME element.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0213.html">CVE-2013-0213</cve>
<bugzilla href="https://bugzilla.suse.com/799641">SUSE bug 799641</bugzilla>
<bugzilla href="https://bugzilla.suse.com/800982">SUSE bug 800982</bugzilla>
<bugzilla href="https://bugzilla.suse.com/880220">SUSE bug 880220</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199555" comment="ldapsmb-1.34b-12.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199556" comment="libldb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199557" comment="libsmbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199558" comment="libsmbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199559" comment="libsmbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199560" comment="libtalloc2-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199561" comment="libtalloc2-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199562" comment="libtalloc2-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199563" comment="libtdb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199564" comment="libtdb1-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199565" comment="libtdb1-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199566" comment="libtevent0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199567" comment="libwbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199568" comment="libwbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199569" comment="libwbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199570" comment="samba-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199571" comment="samba-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199572" comment="samba-client-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199573" comment="samba-client-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199574" comment="samba-client-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199575" comment="samba-krb-printing-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199576" comment="samba-winbind-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199577" comment="samba-winbind-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199578" comment="samba-winbind-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199579" comment="samba-x86-3.6.3-0.39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0214</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0214" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0214" source="CVE"/>
    <description>
    Cross-site request forgery (CSRF) vulnerability in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.21, 3.6.x before 3.6.12, and 4.x before 4.0.2 allows remote attackers to hijack the authentication of arbitrary users by leveraging knowledge of a password and composing requests that perform SWAT actions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0214.html">CVE-2013-0214</cve>
<bugzilla href="https://bugzilla.suse.com/799641">SUSE bug 799641</bugzilla>
<bugzilla href="https://bugzilla.suse.com/880220">SUSE bug 880220</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199555" comment="ldapsmb-1.34b-12.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199556" comment="libldb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199557" comment="libsmbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199558" comment="libsmbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199559" comment="libsmbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199560" comment="libtalloc2-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199561" comment="libtalloc2-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199562" comment="libtalloc2-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199563" comment="libtdb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199564" comment="libtdb1-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199565" comment="libtdb1-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199566" comment="libtevent0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199567" comment="libwbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199568" comment="libwbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199569" comment="libwbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199570" comment="samba-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199571" comment="samba-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199572" comment="samba-client-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199573" comment="samba-client-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199574" comment="samba-client-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199575" comment="samba-krb-printing-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199576" comment="samba-winbind-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199577" comment="samba-winbind-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199578" comment="samba-winbind-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199579" comment="samba-x86-3.6.3-0.39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0216</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-0216" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0216" source="CVE"/>
    <description>
    The Xen netback functionality in the Linux kernel before 3.7.8 allows guest OS users to cause a denial of service (loop) by triggering ring pointer corruption.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0216.html">CVE-2013-0216</cve>
<bugzilla href="https://bugzilla.suse.com/800280">SUSE bug 800280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/800801">SUSE bug 800801</bugzilla>
<bugzilla href="https://bugzilla.suse.com/801178">SUSE bug 801178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/841063">SUSE bug 841063</bugzilla>
<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0219</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0219" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0219" source="CVE"/>
    <description>
    System Security Services Daemon (SSSD) before 1.9.4, when (1) creating, (2) copying, or (3) removing a user home directory tree, allows local users to create, modify, or delete arbitrary files via a symlink attack on another user's files.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0219.html">CVE-2013-0219</cve>
<bugzilla href="https://bugzilla.suse.com/801036">SUSE bug 801036</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199675" comment="libsss_idmap0-1.9.4-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199676" comment="python-sssd-config-1.9.4-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199677" comment="sssd-1.9.4-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199678" comment="sssd-32bit-1.9.4-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199679" comment="sssd-tools-1.9.4-0.12 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0220</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0220" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0220" source="CVE"/>
    <description>
    The (1) sss_autofs_cmd_getautomntent and (2) sss_autofs_cmd_getautomntbyname function in responder/autofs/autofssrv_cmd.c and the (3) ssh_cmd_parse_request function in responder/ssh/sshsrv_cmd.c in System Security Services Daemon (SSSD) before 1.9.4 allow remote attackers to cause a denial of service (out-of-bounds read, crash, and restart) via a crafted SSSD packet.
    </description>
<advisory from="security@suse.de">
<cve href="https://www.suse.com/security/cve/CVE-2013-0220.html">CVE-2013-0220</cve>
<bugzilla href="https://bugzilla.suse.com/801036">SUSE bug 801036</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199675" comment="libsss_idmap0-1.9.4-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199676" comment="python-sssd-config-1.9.4-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199677" comment="sssd-1.9.4-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199678" comment="sssd-32bit-1.9.4-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199679" comment="sssd-tools-1.9.4-0.12 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0221</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-0221" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0221" source="CVE"/>
    <description>
    The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the sort command, when using the (1) -d or (2) -M switch, which triggers a stack-based buffer overflow in the alloca function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0221.html">CVE-2013-0221</cve>
<bugzilla href="https://bugzilla.suse.com/798538">SUSE bug 798538</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203858" comment="coreutils-8.12-6.25.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203859" comment="coreutils-lang-8.12-6.25.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207628" comment="coreutils-x86-8.12-6.25.29 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203858" comment="coreutils-8.12-6.25.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203859" comment="coreutils-lang-8.12-6.25.29 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0222</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-0222" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0222" source="CVE"/>
    <description>
    The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the uniq command, which triggers a stack-based buffer overflow in the alloca function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0222.html">CVE-2013-0222</cve>
<bugzilla href="https://bugzilla.suse.com/796243">SUSE bug 796243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/798538">SUSE bug 798538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/798541">SUSE bug 798541</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203858" comment="coreutils-8.12-6.25.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203859" comment="coreutils-lang-8.12-6.25.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207628" comment="coreutils-x86-8.12-6.25.29 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203858" comment="coreutils-8.12-6.25.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203859" comment="coreutils-lang-8.12-6.25.29 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0223</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-0223" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0223" source="CVE"/>
    <description>
    The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the join command, when using the -i switch, which triggers a stack-based buffer overflow in the alloca function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0223.html">CVE-2013-0223</cve>
<bugzilla href="https://bugzilla.suse.com/798538">SUSE bug 798538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/798541">SUSE bug 798541</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203858" comment="coreutils-8.12-6.25.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203859" comment="coreutils-lang-8.12-6.25.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207628" comment="coreutils-x86-8.12-6.25.29 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203858" comment="coreutils-8.12-6.25.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203859" comment="coreutils-lang-8.12-6.25.29 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0231</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-0231" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0231" source="CVE"/>
    <description>
    The pciback_enable_msi function in the PCI backend driver (drivers/xen/pciback/conf_space_capability_msi.c) in Xen for the Linux kernel 2.6.18 and 3.8 allows guest OS users with PCI device access to cause a denial of service via a large number of kernel log messages. NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0231.html">CVE-2013-0231</cve>
<bugzilla href="https://bugzilla.suse.com/801178">SUSE bug 801178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/841063">SUSE bug 841063</bugzilla>
<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0242</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-0242" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0242" source="CVE"/>
    <description>
    Buffer overflow in the extend_buffers function in the regular expression matcher (posix/regexec.c) in glibc, possibly 2.17 and earlier, allows context-dependent attackers to cause a denial of service (memory corruption and crash) via crafted multibyte characters.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0242.html">CVE-2013-0242</cve>
<bugzilla href="https://bugzilla.suse.com/801246">SUSE bug 801246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/848783">SUSE bug 848783</bugzilla>
<bugzilla href="https://bugzilla.suse.com/882910">SUSE bug 882910</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213314" comment="glibc-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204402" comment="glibc-32bit-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213316" comment="glibc-devel-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204404" comment="glibc-devel-32bit-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213334" comment="glibc-html-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213318" comment="glibc-i18ndata-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213335" comment="glibc-info-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213319" comment="glibc-locale-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204407" comment="glibc-locale-32bit-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208499" comment="glibc-locale-x86-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213336" comment="glibc-profile-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208501" comment="glibc-profile-32bit-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208502" comment="glibc-profile-x86-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208503" comment="glibc-x86-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213321" comment="nscd-2.11.3-17.56 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213314" comment="glibc-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213315" comment="glibc-32bit-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213316" comment="glibc-devel-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213317" comment="glibc-devel-32bit-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213334" comment="glibc-html-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213318" comment="glibc-i18ndata-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213335" comment="glibc-info-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213319" comment="glibc-locale-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213320" comment="glibc-locale-32bit-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213336" comment="glibc-profile-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213337" comment="glibc-profile-32bit-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213321" comment="nscd-2.11.3-17.56 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0254</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0254" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0254" source="CVE"/>
    <description>
    The QSharedMemory class in Qt 5.0.0, 4.8.x before 4.8.5, 4.7.x before 4.7.6, and other versions including 4.4.0 uses weak permissions (world-readable and world-writable) for shared memory segments, which allows local users to read sensitive information or modify critical program data, as demonstrated by reading a pixmap being sent to an X server.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0254.html">CVE-2013-0254</cve>
<bugzilla href="https://bugzilla.suse.com/802634">SUSE bug 802634</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199582" comment="libQtWebKit4-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199583" comment="libQtWebKit4-32bit-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199584" comment="libQtWebKit4-x86-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199585" comment="libqt4-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199586" comment="libqt4-32bit-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199587" comment="libqt4-qt3support-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199588" comment="libqt4-qt3support-32bit-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199589" comment="libqt4-qt3support-x86-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199590" comment="libqt4-sql-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199591" comment="libqt4-sql-32bit-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199592" comment="libqt4-sql-mysql-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199593" comment="libqt4-sql-sqlite-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199594" comment="libqt4-sql-x86-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199595" comment="libqt4-x11-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199596" comment="libqt4-x11-32bit-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199597" comment="libqt4-x11-x86-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199598" comment="libqt4-x86-4.6.3-5.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199599" comment="qt4-x11-tools-4.6.3-5.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0255</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0255" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0255" source="CVE"/>
    <description>
    PostgreSQL 9.2.x before 9.2.3, 9.1.x before 9.1.8, 9.0.x before 9.0.12, 8.4.x before 8.4.16, and 8.3.x before 8.3.23 does not properly declare the enum_recv function in backend/utils/adt/enum.c, which causes it to be invoked with incorrect arguments and allows remote authenticated users to cause a denial of service (server crash) or read sensitive process memory via a crafted SQL command, which triggers an array index error and an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0255.html">CVE-2013-0255</cve>
<bugzilla href="https://bugzilla.suse.com/802679">SUSE bug 802679</bugzilla>
<bugzilla href="https://bugzilla.suse.com/803057">SUSE bug 803057</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199606" comment="libecpg6-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199607" comment="libpq5-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199608" comment="libpq5-32bit-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199750" comment="postgresql-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199751" comment="postgresql-contrib-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199752" comment="postgresql-docs-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199753" comment="postgresql-server-8.3.23-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199609" comment="postgresql91-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199610" comment="postgresql91-contrib-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199611" comment="postgresql91-docs-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199612" comment="postgresql91-server-9.1.9-0.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0287</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0287" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0287" source="CVE"/>
    <description>
    The Simple Access Provider in System Security Services Daemon (SSSD) 1.9.0 through 1.9.4, when the Active Directory provider is used, does not properly enforce the simple_deny_groups option, which allows remote authenticated users to bypass intended access restrictions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0287.html">CVE-2013-0287</cve>
<bugzilla href="https://bugzilla.suse.com/809153">SUSE bug 809153</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199675" comment="libsss_idmap0-1.9.4-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199676" comment="python-sssd-config-1.9.4-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199677" comment="sssd-1.9.4-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199678" comment="sssd-32bit-1.9.4-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199679" comment="sssd-tools-1.9.4-0.12 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0338</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0338" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0338" source="CVE"/>
    <description>
    libxml2 2.9.0 and earlier allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via an XML file containing an entity declaration with long replacement text and many references to this entity, aka "internal entity expansion" with linear complexity.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0338.html">CVE-2013-0338</cve>
<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/805233">SUSE bug 805233</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199702" comment="libxml2-2.7.6-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199703" comment="libxml2-32bit-2.7.6-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199704" comment="libxml2-doc-2.7.6-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199705" comment="libxml2-x86-2.7.6-0.23 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0351</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0351" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0351" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0351.html">CVE-2013-0351</cve>
<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0401</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-0401" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0401" source="CVE"/>
    <description>
    The Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to execute arbitrary code via vectors related to AWT, as demonstrated by Ben Murphy during a Pwn2Own competition at CanSecWest 2013.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to invocation of the system class loader by the sun.awt.datatransfer.ClassLoaderObjectInputStream class, which allows remote attackers to bypass Java sandbox restrictions.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0401.html">CVE-2013-0401</cve>
<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213651" comment="java-1_6_0-ibm-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213652" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213653" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213655" comment="java-1_7_0-ibm-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213657" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213651" comment="java-1_6_0-ibm-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213652" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213653" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213654" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213655" comment="java-1_7_0-ibm-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213656" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213657" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213658" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.2-0.6 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0409</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0409" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0409" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38 allows remote attackers to affect confidentiality via vectors related to JMX.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0409.html">CVE-2013-0409</cve>
<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0419</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0419" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0419" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0419.html">CVE-2013-0419</cve>
<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0422" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0422" source="CVE"/>
    <description>
    Multiple vulnerabilities in Oracle Java 7 before Update 11 allow remote attackers to execute arbitrary code by (1) using the public getMBeanInstantiator method in the JmxMBeanServer class to obtain a reference to a private MBeanInstantiator object, then retrieving arbitrary Class references using the findClass method, and (2) using the Reflection API with recursion in a way that bypasses a security check by the java.lang.invoke.MethodHandles.Lookup.checkSecurityManager method due to the inability of the sun.reflect.Reflection.getCallerClass method to skip frames related to the new reflection API, as exploited in the wild in January 2013, as demonstrated by Blackhole and Nuclear Pack, and a different vulnerability than CVE-2012-4681 and CVE-2012-3174. NOTE: some parties have mapped the recursive Reflection API issue to CVE-2012-3174, but CVE-2012-3174 is for a different vulnerability whose details are not public as of 20130114.  CVE-2013-0422 covers both the JMX/MBean and Reflection API issues.  NOTE: it was originally reported that Java 6 was also vulnerable, but the reporter has retracted this claim, stating that Java 6 is not exploitable because the relevant code is called in a way that does not bypass security checks.  NOTE: as of 20130114, a reliable third party has claimed that the findClass/MBeanInstantiator vector was not fixed in Oracle Java 7 Update 11.  If there is still a vulnerable condition, then a separate CVE identifier might be created for the unfixed issue.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0422.html">CVE-2013-0422</cve>
<bugzilla href="https://bugzilla.suse.com/798324">SUSE bug 798324</bugzilla>
<bugzilla href="https://bugzilla.suse.com/798521">SUSE bug 798521</bugzilla>
<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0423" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0423" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0423.html">CVE-2013-0423</cve>
<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0424</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0424" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0424" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via vectors related to RMI. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to cross-site scripting (XSS) in the sun.rmi.transport.proxy CGIHandler class that does not properly handle error messages in a (1) command or (2) port number.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0424.html">CVE-2013-0424</cve>
<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0425</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0425" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0425" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0428 and CVE-2013-0426.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect "access control checks" in the logging API that allow remote attackers to bypass Java sandbox restrictions.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0425.html">CVE-2013-0425</cve>
<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0426</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0426" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0426" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0425 and CVE-2013-0428.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect "access control checks" in the logging API that allow remote attackers to bypass Java sandbox restrictions.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0426.html">CVE-2013-0426</cve>
<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0427</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0427" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0427" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect integrity via unknown vectors related to Libraries.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to interrupt certain threads that should not be interrupted.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0427.html">CVE-2013-0427</cve>
<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0428</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0428" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0428" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0425 and CVE-2013-0426.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "incorrect checks for proxy classes" in the Reflection API.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0428.html">CVE-2013-0428</cve>
<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0431</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0431" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0431" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, and OpenJDK 7, allows user-assisted remote attackers to bypass the Java security sandbox via unspecified vectors related to JMX, aka "Issue 52," a different vulnerability than CVE-2013-1490.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0431.html">CVE-2013-0431</cve>
<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0432</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0432" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0432" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality and integrity via vectors related to AWT.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "insufficient clipboard access premission checks."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0432.html">CVE-2013-0432</cve>
<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0433</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0433" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0433" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect integrity via unknown vectors related to Networking.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to avoid triggering an exception during the deserialization of invalid InetSocketAddress data.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0433.html">CVE-2013-0433</cve>
<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0434</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0434" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0434" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAXP.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to the public declaration of the loadPropertyFile method in the JAXP FuncSystemProperty class, which allows remote attackers to obtain sensitive information.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0434.html">CVE-2013-0434</cve>
<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0435</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0435" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0435" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAX-WS.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper restriction of com.sun.xml.internal packages and "Better handling of UI elements."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0435.html">CVE-2013-0435</cve>
<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0437</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0437" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0437" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and JavaFX 2.2.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0437.html">CVE-2013-0437</cve>
<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0438</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0438" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0438" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0438.html">CVE-2013-0438</cve>
<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0440</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0440" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0440" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 7, allows remote attackers to affect availability via vectors related to JSSE.  NOTE: the previous information is from the February 2013 CPU.  Oracle has not commented on claims from another vendor that this issue is related to CPU consumption in the SSL/TLS implementation via a large number of ClientHello packets that are not properly handled by (1) ClientHandshaker.java and (2) ServerHandshaker.java.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0440.html">CVE-2013-0440</cve>
<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0441</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0441" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0441" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2013-1476 and CVE-2013-1475.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass Java sandbox restrictions via certain methods that should not be serialized, aka "missing serialization restriction."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0441.html">CVE-2013-0441</cve>
<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0442</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0442" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0442" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an improper check of "privileges of the code" that bypasses the sandbox.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0442.html">CVE-2013-0442</cve>
<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0443</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0443" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0443" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality and integrity via vectors related to JSSE.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect validation of Diffie-Hellman keys, which allows remote attackers to conduct a "small subgroup attack" to force the use of weak session keys or obtain sensitive information about the private key.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0443.html">CVE-2013-0443</cve>
<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0444</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0444" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0444" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Beans.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "insufficient checks for cached results" by the Java Beans MethodFinder, which might allow attackers to access methods that should only be accessible to privileged code.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0444.html">CVE-2013-0444</cve>
<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0445</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0445" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0445" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an improper check of "privileges of the code" that bypasses the sandbox.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0445.html">CVE-2013-0445</cve>
<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0446</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0446" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0446" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0446.html">CVE-2013-0446</cve>
<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0449</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0449" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0449" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 allows remote attackers to affect confidentiality via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0449.html">CVE-2013-0449</cve>
<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0450</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0450" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0450" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper checks of "access control context" in the JMX RequiredModelMBean class.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0450.html">CVE-2013-0450</cve>
<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0454</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0454" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0454" source="CVE"/>
    <description>
    The SMB2 implementation in Samba 3.6.x before 3.6.6, as used on the IBM Storwize V7000 Unified 1.3 before 1.3.2.3 and 1.4 before 1.4.0.1 and possibly other products, does not properly enforce CIFS share attributes, which allows remote authenticated users to (1) write to a read-only share; (2) trigger data-integrity problems related to the oplock, locking, coherency, or leases attribute; or (3) have an unspecified impact by leveraging incorrect handling of the browseable or "hide unreadable" parameter.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0454.html">CVE-2013-0454</cve>
<bugzilla href="https://bugzilla.suse.com/811975">SUSE bug 811975</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199555" comment="ldapsmb-1.34b-12.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199556" comment="libldb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199557" comment="libsmbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199558" comment="libsmbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199559" comment="libsmbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199560" comment="libtalloc2-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199561" comment="libtalloc2-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199562" comment="libtalloc2-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199563" comment="libtdb1-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199564" comment="libtdb1-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199565" comment="libtdb1-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199566" comment="libtevent0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199567" comment="libwbclient0-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199568" comment="libwbclient0-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199569" comment="libwbclient0-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199570" comment="samba-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199571" comment="samba-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199572" comment="samba-client-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199573" comment="samba-client-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199574" comment="samba-client-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199575" comment="samba-krb-printing-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199576" comment="samba-winbind-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199577" comment="samba-winbind-32bit-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199578" comment="samba-winbind-x86-3.6.3-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199579" comment="samba-x86-3.6.3-0.39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0485" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0485" source="CVE"/>
    <description>
    Unspecified vulnerability in IBM Java SDK 7 before SR4-FP1, 6 before SR13-FP1, 5.0 before SR16-FP1, and 1.4.2 before SR13-FP16 has unknown impact and attack vectors related to Class Libraries.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0485.html">CVE-2013-0485</cve>
<bugzilla href="https://bugzilla.suse.com/813939">SUSE bug 813939</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0743</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0743" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0743" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its CNA at the suggestion of the CVE project team.  The candidate had been associated with a correct report of a security problem, but not a problem that is categorized as a vulnerability within CVE.  Compromised or unauthorized SSL certificates are not within CVE's scope.  Notes: none.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0743.html">CVE-2013-0743</cve>
<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199616" comment="libfreebl3-3.14.3-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199617" comment="libfreebl3-32bit-3.14.3-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199618" comment="libfreebl3-x86-3.14.3-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199619" comment="libsoftokn3-3.14.3-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199620" comment="libsoftokn3-32bit-3.14.3-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199621" comment="libsoftokn3-x86-3.14.3-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199622" comment="mozilla-nss-3.14.3-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199623" comment="mozilla-nss-32bit-3.14.3-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199624" comment="mozilla-nss-tools-3.14.3-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199625" comment="mozilla-nss-x86-3.14.3-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0744</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0744" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0744" source="CVE"/>
    <description>
    Use-after-free vulnerability in the TableBackgroundPainter::TableBackgroundData::Destroy function in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via an HTML document with a table containing many columns and column groups.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0744.html">CVE-2013-0744</cve>
<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0745" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0745" source="CVE"/>
    <description>
    The AutoWrapperChanger class in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 does not properly interact with garbage collection, which allows remote attackers to execute arbitrary code via a crafted HTML document referencing JavaScript objects.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0745.html">CVE-2013-0745</cve>
<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0746</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0746" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0746" source="CVE"/>
    <description>
    Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 do not properly implement quickstubs that use the jsval data type for their return values, which allows remote attackers to execute arbitrary code or cause a denial of service (compartment mismatch and application crash) via crafted JavaScript code that is not properly handled during garbage collection.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0746.html">CVE-2013-0746</cve>
<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0747</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0747" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0747" source="CVE"/>
    <description>
    The gPluginHandler.handleEvent function in the plugin handler in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 does not properly enforce the Same Origin Policy, which allows remote attackers to conduct clickjacking attacks via crafted JavaScript code that listens for a mutation event.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0747.html">CVE-2013-0747</cve>
<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0748</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0748" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0748" source="CVE"/>
    <description>
    The XBL.__proto__.toString implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 makes it easier for remote attackers to bypass the ASLR protection mechanism by calling the toString function of an XBL object.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0748.html">CVE-2013-0748</cve>
<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0749</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0749" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0749" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.1, and SeaMonkey before 2.15 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0749.html">CVE-2013-0749</cve>
<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0750</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0750" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0750" source="CVE"/>
    <description>
    Integer overflow in the JavaScript implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via a crafted string concatenation, leading to improper memory allocation and a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0750.html">CVE-2013-0750</cve>
<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0752</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0752" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0752" source="CVE"/>
    <description>
    Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XBL file with multiple bindings that have SVG content.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0752.html">CVE-2013-0752</cve>
<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0753</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0753" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0753" source="CVE"/>
    <description>
    Use-after-free vulnerability in the serializeToStream implementation in the XMLSerializer component in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via crafted web content.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0753.html">CVE-2013-0753</cve>
<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0754</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0754" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0754" source="CVE"/>
    <description>
    Use-after-free vulnerability in the ListenerManager implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via vectors involving the triggering of garbage collection after memory allocation for listener objects.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0754.html">CVE-2013-0754</cve>
<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0755</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0755" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0755" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozVibrate implementation in the Vibrate library in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via vectors related to the domDoc pointer.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0755.html">CVE-2013-0755</cve>
<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0756</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0756" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0756" source="CVE"/>
    <description>
    Use-after-free vulnerability in the obj_toSource function in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via a crafted web page referencing JavaScript Proxy objects that are not properly handled during garbage collection.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0756.html">CVE-2013-0756</cve>
<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0757</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0757" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0757" source="CVE"/>
    <description>
    The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 does not prevent modifications to the prototype of an object, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges by referencing Object.prototype.__proto__ in a crafted HTML document.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0757.html">CVE-2013-0757</cve>
<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0758</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0758" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0758" source="CVE"/>
    <description>
    Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allow remote attackers to execute arbitrary JavaScript code with chrome privileges by leveraging improper interaction between plugin objects and SVG elements.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0758.html">CVE-2013-0758</cve>
<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0760</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0760" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0760" source="CVE"/>
    <description>
    Buffer overflow in the CharDistributionAnalysis::HandleOneChar function in Mozilla Firefox before 18.0, Thunderbird before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via a crafted document.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0760.html">CVE-2013-0760</cve>
<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0761</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0761" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0761" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozilla::TrackUnionStream::EndTrack implementation in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0761.html">CVE-2013-0761</cve>
<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0762</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0762" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0762" source="CVE"/>
    <description>
    Use-after-free vulnerability in the imgRequest::OnStopFrame function in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0762.html">CVE-2013-0762</cve>
<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0763</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0763" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0763" source="CVE"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors related to Mesa drivers and a resized WebGL canvas.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0763.html">CVE-2013-0763</cve>
<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0764</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0764" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0764" source="CVE"/>
    <description>
    The nsSOCKSSocketInfo::ConnectToProxy function in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 does not ensure thread safety for SSL sessions, which allows remote attackers to execute arbitrary code via crafted data, as demonstrated by e-mail message data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0764.html">CVE-2013-0764</cve>
<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0766</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0766" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0766" source="CVE"/>
    <description>
    Use-after-free vulnerability in the ~nsHTMLEditRules implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0766.html">CVE-2013-0766</cve>
<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0767</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0767" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0767" source="CVE"/>
    <description>
    The nsSVGPathElement::GetPathLengthScale function in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0767.html">CVE-2013-0767</cve>
<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0768</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0768" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0768" source="CVE"/>
    <description>
    Stack-based buffer overflow in the Canvas implementation in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via an HTML document that specifies invalid width and height values.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0768.html">CVE-2013-0768</cve>
<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0769</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0769" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0769" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.1, and SeaMonkey before 2.15 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0769.html">CVE-2013-0769</cve>
<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0770</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0770" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0770" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 18.0, Thunderbird before 17.0.2, and SeaMonkey before 2.15 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0770.html">CVE-2013-0770</cve>
<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0771</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0771" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0771" source="CVE"/>
    <description>
    Heap-based buffer overflow in the gfxTextRun::ShrinkToLigatureBoundaries function in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via a crafted document.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0771.html">CVE-2013-0771</cve>
<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0773</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0773" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0773" source="CVE"/>
    <description>
    The Chrome Object Wrapper (COW) and System Only Wrapper (SOW) implementations in Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 do not prevent modifications to a prototype, which allows remote attackers to obtain sensitive information from chrome objects or possibly execute arbitrary JavaScript code with chrome privileges via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0773.html">CVE-2013-0773</cve>
<bugzilla href="https://bugzilla.suse.com/804248">SUSE bug 804248</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0774</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0774" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0774" source="CVE"/>
    <description>
    Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 do not prevent JavaScript workers from reading the browser-profile directory name, which has unspecified impact and remote attack vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0774.html">CVE-2013-0774</cve>
<bugzilla href="https://bugzilla.suse.com/804248">SUSE bug 804248</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0775</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0775" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0775" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsImageLoadingContent::OnStopContainer function in Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code via crafted web script.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0775.html">CVE-2013-0775</cve>
<bugzilla href="https://bugzilla.suse.com/804248">SUSE bug 804248</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0776</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0776" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0776" source="CVE"/>
    <description>
    Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allow man-in-the-middle attackers to spoof the address bar by operating a proxy server that provides a 407 HTTP status code accompanied by web script, as demonstrated by a phishing attack on an HTTPS site.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0776.html">CVE-2013-0776</cve>
<bugzilla href="https://bugzilla.suse.com/804248">SUSE bug 804248</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0780</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0780" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0780" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsOverflowContinuationTracker::Finish function in Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted document that uses Cascading Style Sheets (CSS) -moz-column-* properties.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0780.html">CVE-2013-0780</cve>
<bugzilla href="https://bugzilla.suse.com/804248">SUSE bug 804248</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0782</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0782" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0782" source="CVE"/>
    <description>
    Heap-based buffer overflow in the nsSaveAsCharset::DoCharsetConversion function in Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0782.html">CVE-2013-0782</cve>
<bugzilla href="https://bugzilla.suse.com/804248">SUSE bug 804248</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0783</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0783" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0783" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0783.html">CVE-2013-0783</cve>
<bugzilla href="https://bugzilla.suse.com/804248">SUSE bug 804248</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0787</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0787" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0787" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsEditor::IsPreformatted function in editor/libeditor/base/nsEditor.cpp in Mozilla Firefox before 19.0.2, Firefox ESR 17.x before 17.0.4, Thunderbird before 17.0.4, Thunderbird ESR 17.x before 17.0.4, and SeaMonkey before 2.16.1 allows remote attackers to execute arbitrary code via vectors involving an execCommand call.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0787.html">CVE-2013-0787</cve>
<bugzilla href="https://bugzilla.suse.com/808243">SUSE bug 808243</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199270" comment="MozillaFirefox-17.0.4esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199271" comment="MozillaFirefox-translations-17.0.4esr-0.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0809</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0809" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0809" source="CVE"/>
    <description>
    Unspecified vulnerability in the 2D component in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code via unknown vectors, a different vulnerability than CVE-2013-1493.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0809.html">CVE-2013-0809</cve>
<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
<bugzilla href="https://bugzilla.suse.com/807487">SUSE bug 807487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/809386">SUSE bug 809386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/813939">SUSE bug 813939</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0871</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0871" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0871" source="CVE"/>
    <description>
    Race condition in the ptrace functionality in the Linux kernel before 3.7.5 allows local users to gain privileges via a PTRACE_SETREGS ptrace system call in a crafted application, as demonstrated by ptrace_death.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0871.html">CVE-2013-0871</cve>
<bugzilla href="https://bugzilla.suse.com/653148">SUSE bug 653148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/804154">SUSE bug 804154</bugzilla>
<bugzilla href="https://bugzilla.suse.com/804227">SUSE bug 804227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/841063">SUSE bug 841063</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0913</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-0913" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0913" source="CVE"/>
    <description>
    Integer overflow in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the i915 driver in the Direct Rendering Manager (DRM) subsystem in the Linux kernel through 3.8.3, as used in Google Chrome OS before 25.0.1364.173 and other products, allows local users to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted application that triggers many relocation copies, and potentially leads to a race condition.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0913.html">CVE-2013-0913</cve>
<bugzilla href="https://bugzilla.suse.com/808829">SUSE bug 808829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1059</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1059" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1059" source="CVE"/>
    <description>
    net/ceph/auth_none.c in the Linux kernel through 3.10 allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via an auth_reply message that triggers an attempted build_request operation.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1059.html">CVE-2013-1059</cve>
<bugzilla href="https://bugzilla.suse.com/826350">SUSE bug 826350</bugzilla>
<bugzilla href="https://bugzilla.suse.com/882913">SUSE bug 882913</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213736" comment="kernel-default-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213737" comment="kernel-default-base-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213738" comment="kernel-default-devel-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213740" comment="kernel-source-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213741" comment="kernel-syms-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213812" comment="kernel-trace-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213813" comment="kernel-trace-base-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213742" comment="kernel-trace-devel-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1362</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1362" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1362" source="CVE"/>
    <description>
    Incomplete blacklist vulnerability in nrpc.c in Nagios Remote Plug-In Executor (NRPE) before 2.14 might allow remote attackers to execute arbitrary shell commands via "$()" shell metacharacters, which are processed by bash.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1362.html">CVE-2013-1362</cve>
<bugzilla href="https://bugzilla.suse.com/807241">SUSE bug 807241</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207896" comment="nagios-nrpe-2.12-24.4.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207897" comment="nagios-nrpe-doc-2.12-24.4.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207898" comment="nagios-plugins-nrpe-2.12-24.4.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1415</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1415" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1415" source="CVE"/>
    <description>
    The pkinit_check_kdc_pkid function in plugins/preauth/pkinit/pkinit_crypto_openssl.c in the PKINIT implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.4 and 1.11.x before 1.11.1 does not properly handle errors during extraction of fields from an X.509 certificate, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a malformed KRB5_PADATA_PK_AS_REQ AS-REQ request.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1415.html">CVE-2013-1415</cve>
<bugzilla href="https://bugzilla.suse.com/806715">SUSE bug 806715</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199544" comment="krb5-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199545" comment="krb5-32bit-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199546" comment="krb5-apps-clients-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199547" comment="krb5-apps-servers-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199548" comment="krb5-client-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199552" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199553" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199549" comment="krb5-server-1.6.3-133.49.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199550" comment="krb5-x86-1.6.3-133.49.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1416</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1416" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1416" source="CVE"/>
    <description>
    The prep_reprocess_req function in do_tgs_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.5 does not properly perform service-principal realm referral, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted TGS-REQ request.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1416.html">CVE-2013-1416</cve>
<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
<bugzilla href="https://bugzilla.suse.com/816413">SUSE bug 816413</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009248574" comment="krb5-1.8.6-133.49.121 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248575" comment="krb5-32bit-1.8.6-133.49.121 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248576" comment="krb5-apps-clients-1.8.6-133.49.121 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248577" comment="krb5-apps-servers-1.8.6-133.49.121 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248578" comment="krb5-client-1.8.6-133.49.121 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248579" comment="krb5-devel-1.8.6-133.49.121 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248580" comment="krb5-devel-32bit-1.8.6-133.49.121 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248581" comment="krb5-doc-1.8.6-133.49.121 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248582" comment="krb5-plugin-kdb-ldap-1.8.6-133.49.121 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248583" comment="krb5-plugin-preauth-pkinit-1.8.6-133.49.121 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248584" comment="krb5-server-1.8.6-133.49.121 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1418</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1418" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1418" source="CVE"/>
    <description>
    The setup_server_realm function in main.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.7, when multiple realms are configured, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted request.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1418.html">CVE-2013-1418</cve>
<bugzilla href="https://bugzilla.suse.com/849240">SUSE bug 849240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/866059">SUSE bug 866059</bugzilla>
<bugzilla href="https://bugzilla.suse.com/879587">SUSE bug 879587</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203981" comment="krb5-1.6.3-133.49.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203982" comment="krb5-32bit-1.6.3-133.49.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207839" comment="krb5-apps-clients-1.6.3-133.49.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207840" comment="krb5-apps-servers-1.6.3-133.49.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203983" comment="krb5-client-1.6.3-133.49.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207841" comment="krb5-doc-1.6.3-133.49.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207842" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207843" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201336" comment="krb5-server-1.6.3-133.49.58 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203981" comment="krb5-1.6.3-133.49.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204565" comment="krb5-32bit-1.6.3-133.49.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207839" comment="krb5-apps-clients-1.6.3-133.49.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207840" comment="krb5-apps-servers-1.6.3-133.49.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203983" comment="krb5-client-1.6.3-133.49.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207841" comment="krb5-doc-1.6.3-133.49.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207842" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207843" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201336" comment="krb5-server-1.6.3-133.49.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208704" comment="krb5-x86-1.6.3-133.49.62 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1432</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1432" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432" source="CVE"/>
    <description>
    Xen 4.1.x and 4.2.x, when the XSA-45 patch is in place, does not properly maintain references on pages stored for deferred cleanup, which allows local PV guest kernels to cause a denial of service (premature page free and hypervisor crash) or possibly gain privileges via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1432.html">CVE-2013-1432</cve>
<bugzilla href="https://bugzilla.suse.com/823011">SUSE bug 823011</bugzilla>
<bugzilla href="https://bugzilla.suse.com/826882">SUSE bug 826882</bugzilla>
<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204896" comment="xen-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204897" comment="xen-doc-html-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204898" comment="xen-doc-pdf-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204899" comment="xen-kmp-default-4.2.3_02_3.0.93_0.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204900" comment="xen-kmp-pae-4.2.3_02_3.0.93_0.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204901" comment="xen-libs-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204902" comment="xen-libs-32bit-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204903" comment="xen-tools-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204904" comment="xen-tools-domU-4.2.3_02-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204896" comment="xen-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204897" comment="xen-doc-html-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204898" comment="xen-doc-pdf-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204899" comment="xen-kmp-default-4.2.3_02_3.0.93_0.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204901" comment="xen-libs-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204902" comment="xen-libs-32bit-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204903" comment="xen-tools-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204904" comment="xen-tools-domU-4.2.3_02-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1442</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1442" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442" source="CVE"/>
    <description>
    Xen 4.0 through 4.3.x, when using AVX or LWP capable CPUs, does not properly clear previous data from registers when using an XSAVE or XRSTOR to extend the state components of a saved or restored vCPU after touching other restored extended registers, which allows local guest OSes to obtain sensitive information by reading the registers.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1442.html">CVE-2013-1442</cve>
<bugzilla href="https://bugzilla.suse.com/839596">SUSE bug 839596</bugzilla>
<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204896" comment="xen-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204897" comment="xen-doc-html-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204898" comment="xen-doc-pdf-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204899" comment="xen-kmp-default-4.2.3_02_3.0.93_0.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204900" comment="xen-kmp-pae-4.2.3_02_3.0.93_0.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204901" comment="xen-libs-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204902" comment="xen-libs-32bit-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204903" comment="xen-tools-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204904" comment="xen-tools-domU-4.2.3_02-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204896" comment="xen-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204897" comment="xen-doc-html-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204898" comment="xen-doc-pdf-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204899" comment="xen-kmp-default-4.2.3_02_3.0.93_0.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204901" comment="xen-libs-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204902" comment="xen-libs-32bit-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204903" comment="xen-tools-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204904" comment="xen-tools-domU-4.2.3_02-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1473</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1473" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1473" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect integrity via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1473.html">CVE-2013-1473</cve>
<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1476</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1476" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1476" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2013-0441 and CVE-2013-1475.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass Java sandbox restrictions via "certain value handler constructors."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1476.html">CVE-2013-1476</cve>
<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1478</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1478" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1478" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "insufficient validation of raster parameters" that can trigger an integer overflow and memory corruption.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1478.html">CVE-2013-1478</cve>
<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1480</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1480" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1480" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "insufficient validation of raster parameters" in awt_parseImage.c, which triggers memory corruption.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1480.html">CVE-2013-1480</cve>
<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1481</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1481" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1481" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1481.html">CVE-2013-1481</cve>
<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1484" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1484" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 13 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1484.html">CVE-2013-1484</cve>
<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1485" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1485" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 13 and earlier allows remote attackers to affect integrity via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1485.html">CVE-2013-1485</cve>
<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1486</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1486" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1486" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 13 and earlier, 6 Update 39 and earlier, and 5.0 Update 39 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1486.html">CVE-2013-1486</cve>
<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/804654">SUSE bug 804654</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1487</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1487" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1487" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE 7 Update 13 and earlier and 6 Update 39 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1487.html">CVE-2013-1487</cve>
<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1491</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1491" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1491" source="CVE"/>
    <description>
    The Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, 5.0 Update 41 and earlier, and JavaFX 2.2.7 and earlier allows remote attackers to execute arbitrary code via vectors related to 2D, as demonstrated by Joshua Drake during a Pwn2Own competition at CanSecWest 2013.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1491.html">CVE-2013-1491</cve>
<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213651" comment="java-1_6_0-ibm-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213652" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213653" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213655" comment="java-1_7_0-ibm-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213657" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213651" comment="java-1_6_0-ibm-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213652" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213653" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213654" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213655" comment="java-1_7_0-ibm-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213656" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213657" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213658" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.2-0.6 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1493</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1493" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1493" source="CVE"/>
    <description>
    The color management (CMM) functionality in the 2D component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (crash) via an image with crafted raster parameters, which triggers (1) an out-of-bounds read or (2) memory corruption in the JVM, as exploited in the wild in February 2013.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1493.html">CVE-2013-1493</cve>
<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
<bugzilla href="https://bugzilla.suse.com/807487">SUSE bug 807487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/809386">SUSE bug 809386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/813939">SUSE bug 813939</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199499" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199500" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199501" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199502" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199503" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199504" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199505" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199506" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199507" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1500</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1500" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1500" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows local users to affect confidentiality and integrity via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to weak permissions for shared memory.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1500.html">CVE-2013-1500</cve>
<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213830" comment="java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1537</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1537" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1537" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to the default java.rmi.server.useCodebaseOnly setting of false, which allows remote attackers to perform "dynamic class downloading" and execute arbitrary code.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1537.html">CVE-2013-1537</cve>
<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213651" comment="java-1_6_0-ibm-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213652" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213653" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213655" comment="java-1_7_0-ibm-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213657" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213651" comment="java-1_6_0-ibm-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213652" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213653" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213654" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213655" comment="java-1_7_0-ibm-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213656" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213657" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213658" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.2-0.6 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1540</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1540" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1540" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier allows remote attackers to affect integrity via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2433.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1540.html">CVE-2013-1540</cve>
<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213651" comment="java-1_6_0-ibm-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213652" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213653" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213655" comment="java-1_7_0-ibm-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213657" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213651" comment="java-1_6_0-ibm-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213652" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213653" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213654" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213655" comment="java-1_7_0-ibm-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213656" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213657" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213658" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.2-0.6 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1557</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1557" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1557" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "missing security restrictions" in the LogStream.setDefaultStream method.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1557.html">CVE-2013-1557</cve>
<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213651" comment="java-1_6_0-ibm-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213652" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213653" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213655" comment="java-1_7_0-ibm-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213657" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213651" comment="java-1_6_0-ibm-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213652" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213653" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213654" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213655" comment="java-1_7_0-ibm-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213656" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213657" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213658" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.2-0.6 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1563</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1563" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1563" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and JavaFX 2.2.7 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Install.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1563.html">CVE-2013-1563</cve>
<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213651" comment="java-1_6_0-ibm-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213652" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213653" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213655" comment="java-1_7_0-ibm-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213657" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213651" comment="java-1_6_0-ibm-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213652" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213653" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213654" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213655" comment="java-1_7_0-ibm-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213656" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213657" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213658" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.2-0.6 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1569</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1569" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1569" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "checking of [a] glyph table" in the International Components for Unicode (ICU) Layout Engine before 51.2.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1569.html">CVE-2013-1569</cve>
<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
<bugzilla href="https://bugzilla.suse.com/932310">SUSE bug 932310</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213651" comment="java-1_6_0-ibm-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213652" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213653" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213655" comment="java-1_7_0-ibm-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213657" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213651" comment="java-1_6_0-ibm-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213652" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213653" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213654" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213655" comment="java-1_7_0-ibm-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213656" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213657" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213658" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.2-0.6 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1571</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1571" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1571" source="CVE"/>
    <description>
    Unspecified vulnerability in the Javadoc component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier; JavaFX 2.2.21 and earlier; and OpenJDK 7 allows remote attackers to affect integrity via unknown vectors related to Javadoc. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to frame injection in HTML that is generated by Javadoc.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1571.html">CVE-2013-1571</cve>
<bugzilla href="https://bugzilla.suse.com/824397">SUSE bug 824397</bugzilla>
<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213830" comment="java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1572</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1572" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1572" source="CVE"/>
    <description>
    The dissect_oampdu_event_notification function in epan/dissectors/packet-slowprotocols.c in the IEEE 802.3 Slow Protocols dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle certain short lengths, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1572.html">CVE-2013-1572</cve>
<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1573</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1573" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1573" source="CVE"/>
    <description>
    The csnStreamDissector function in epan/dissectors/packet-csn1.c in the CSN.1 dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle a large number of padding bits, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1573.html">CVE-2013-1573</cve>
<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1574</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1574" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1574" source="CVE"/>
    <description>
    The dissect_bthci_eir_ad_data function in epan/dissectors/packet-bthci_cmd.c in the Bluetooth HCI dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 uses an incorrect data type for a counter variable, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1574.html">CVE-2013-1574</cve>
<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1575</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1575" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1575" source="CVE"/>
    <description>
    The dissect_r3_cmd_alarmconfigure function in epan/dissectors/packet-assa_r3.c in the R3 dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle a certain alarm length, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1575.html">CVE-2013-1575</cve>
<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1576</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1576" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1576" source="CVE"/>
    <description>
    The dissect_sdp_media_attribute function in epan/dissectors/packet-sdp.c in the SDP dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly process crypto-suite parameters, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1576.html">CVE-2013-1576</cve>
<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1577</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1577" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1577" source="CVE"/>
    <description>
    The dissect_sip_p_charging_func_addresses function in epan/dissectors/packet-sip.c in the SIP dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle offset data associated with a quoted string, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1577.html">CVE-2013-1577</cve>
<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1578</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1578" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1578" source="CVE"/>
    <description>
    The dissect_pw_eth_heuristic function in epan/dissectors/packet-pw-eth.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle apparent Ethernet address values at the beginning of MPLS data, which allows remote attackers to cause a denial of service (loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1578.html">CVE-2013-1578</cve>
<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1579</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1579" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1579" source="CVE"/>
    <description>
    The rtps_util_add_bitmap function in epan/dissectors/packet-rtps.c in the RTPS dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly implement certain nested loops for processing bitmap data, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1579.html">CVE-2013-1579</cve>
<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1580</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1580" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1580" source="CVE"/>
    <description>
    The dissect_cmstatus_tlv function in plugins/docsis/packet-cmstatus.c in the DOCSIS CM-STATUS dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 uses an incorrect data type for a position variable, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1580.html">CVE-2013-1580</cve>
<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1581</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1581" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1581" source="CVE"/>
    <description>
    The dissect_pft_fec_detailed function in epan/dissectors/packet-dcp-etsi.c in the DCP-ETSI dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle fragment gaps, which allows remote attackers to cause a denial of service (loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1581.html">CVE-2013-1581</cve>
<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1582</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1582" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1582" source="CVE"/>
    <description>
    The dissect_clnp function in epan/dissectors/packet-clnp.c in the CLNP dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly manage an offset variable, which allows remote attackers to cause a denial of service (infinite loop or application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1582.html">CVE-2013-1582</cve>
<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1583</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1583" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1583" source="CVE"/>
    <description>
    The dissect_version_4_primary_header function in epan/dissectors/packet-dtn.c in the DTN dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 accesses an inappropriate pointer, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1583.html">CVE-2013-1583</cve>
<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1584</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1584" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1584" source="CVE"/>
    <description>
    The dissect_version_5_and_6_primary_header function in epan/dissectors/packet-dtn.c in the DTN dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 accesses an inappropriate pointer, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1584.html">CVE-2013-1584</cve>
<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1585</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1585" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1585" source="CVE"/>
    <description>
    epan/tvbuff.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly validate certain length values for the MS-MMC dissector, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1585.html">CVE-2013-1585</cve>
<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1586</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1586" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1586" source="CVE"/>
    <description>
    The fragment_set_tot_len function in epan/reassemble.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly determine the length of a reassembled packet for the DTLS dissector, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1586.html">CVE-2013-1586</cve>
<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1587</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1587" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1587" source="CVE"/>
    <description>
    The dissect_rohc_ir_packet function in epan/dissectors/packet-rohc.c in the ROHC dissector in Wireshark 1.8.x before 1.8.5 does not properly handle unknown profiles, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1587.html">CVE-2013-1587</cve>
<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1588</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1588" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1588" source="CVE"/>
    <description>
    Multiple buffer overflows in the dissect_pft_fec_detailed function in the DCP-ETSI dissector in epan/dissectors/packet-dcp-etsi.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 allow remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1588.html">CVE-2013-1588</cve>
<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1589</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1589" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1589" source="CVE"/>
    <description>
    Double free vulnerability in epan/proto.c in the dissection engine in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1589.html">CVE-2013-1589</cve>
<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1590</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1590" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1590" source="CVE"/>
    <description>
    Buffer overflow in the NTLMSSP dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1590.html">CVE-2013-1590</cve>
<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1591</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1591" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1591" source="CVE"/>
    <description>
    Stack-based buffer overflow in libpixman, as used in Pale Moon before 15.4 and possibly other products, has unspecified impact and context-dependent attack vectors.  NOTE: this issue might be resultant from an integer overflow in the fast_composite_scaled_bilinear function in pixman-inlines.h, which triggers an infinite loop.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1591.html">CVE-2013-1591</cve>
<bugzilla href="https://bugzilla.suse.com/815064">SUSE bug 815064</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213839" comment="libpixman-1-0-0.24.4-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200269" comment="libpixman-1-0-32bit-0.24.4-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200270" comment="libpixman-1-0-x86-0.24.4-0.15 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213839" comment="libpixman-1-0-0.24.4-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213840" comment="libpixman-1-0-32bit-0.24.4-0.13 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1619</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1619" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1619" source="CVE"/>
    <description>
    The TLS implementation in GnuTLS before 2.12.23, 3.0.x before 3.0.28, and 3.1.x before 3.1.7 does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1619.html">CVE-2013-1619</cve>
<bugzilla href="https://bugzilla.suse.com/802184">SUSE bug 802184</bugzilla>
<bugzilla href="https://bugzilla.suse.com/802651">SUSE bug 802651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/957568">SUSE bug 957568</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199478" comment="gnutls-2.4.1-24.39.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199479" comment="libgnutls-extra26-2.4.1-24.39.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199480" comment="libgnutls26-2.4.1-24.39.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199481" comment="libgnutls26-32bit-2.4.1-24.39.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199482" comment="libgnutls26-x86-2.4.1-24.39.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1635</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1635" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1635" source="CVE"/>
    <description>
    ext/soap/soap.c in PHP before 5.3.22 and 5.4.x before 5.4.13 does not validate the relationship between the soap.wsdl_cache_dir directive and the open_basedir directive, which allows remote attackers to bypass intended access restrictions by triggering the creation of cached SOAP WSDL files in an arbitrary directory.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1635.html">CVE-2013-1635</cve>
<bugzilla href="https://bugzilla.suse.com/807707">SUSE bug 807707</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199294" comment="apache2-mod_php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199295" comment="php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199296" comment="php53-bcmath-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199297" comment="php53-bz2-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199298" comment="php53-calendar-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199299" comment="php53-ctype-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199300" comment="php53-curl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199301" comment="php53-dba-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199302" comment="php53-dom-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199303" comment="php53-exif-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199304" comment="php53-fastcgi-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199305" comment="php53-fileinfo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199306" comment="php53-ftp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199307" comment="php53-gd-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199308" comment="php53-gettext-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199309" comment="php53-gmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199310" comment="php53-iconv-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199311" comment="php53-intl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199312" comment="php53-json-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199313" comment="php53-ldap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199314" comment="php53-mbstring-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199315" comment="php53-mcrypt-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199316" comment="php53-mysql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199317" comment="php53-odbc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199318" comment="php53-openssl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199319" comment="php53-pcntl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199320" comment="php53-pdo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199321" comment="php53-pear-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199322" comment="php53-pgsql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199323" comment="php53-pspell-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199324" comment="php53-shmop-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199325" comment="php53-snmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199326" comment="php53-soap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199327" comment="php53-suhosin-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199328" comment="php53-sysvmsg-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199329" comment="php53-sysvsem-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199330" comment="php53-sysvshm-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199331" comment="php53-tokenizer-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199332" comment="php53-wddx-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199333" comment="php53-xmlreader-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199334" comment="php53-xmlrpc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199335" comment="php53-xmlwriter-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199336" comment="php53-xsl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199337" comment="php53-zip-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199338" comment="php53-zlib-5.3.17-0.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1643</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1643" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1643" source="CVE"/>
    <description>
    The SOAP parser in PHP before 5.3.23 and 5.4.x before 5.4.13 allows remote attackers to read arbitrary files via a SOAP WSDL file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue in the soap_xmlParseFile and soap_xmlParseMemory functions.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-1824.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1643.html">CVE-2013-1643</cve>
<bugzilla href="https://bugzilla.suse.com/807707">SUSE bug 807707</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199294" comment="apache2-mod_php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199295" comment="php53-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199296" comment="php53-bcmath-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199297" comment="php53-bz2-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199298" comment="php53-calendar-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199299" comment="php53-ctype-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199300" comment="php53-curl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199301" comment="php53-dba-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199302" comment="php53-dom-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199303" comment="php53-exif-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199304" comment="php53-fastcgi-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199305" comment="php53-fileinfo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199306" comment="php53-ftp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199307" comment="php53-gd-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199308" comment="php53-gettext-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199309" comment="php53-gmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199310" comment="php53-iconv-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199311" comment="php53-intl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199312" comment="php53-json-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199313" comment="php53-ldap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199314" comment="php53-mbstring-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199315" comment="php53-mcrypt-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199316" comment="php53-mysql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199317" comment="php53-odbc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199318" comment="php53-openssl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199319" comment="php53-pcntl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199320" comment="php53-pdo-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199321" comment="php53-pear-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199322" comment="php53-pgsql-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199323" comment="php53-pspell-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199324" comment="php53-shmop-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199325" comment="php53-snmp-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199326" comment="php53-soap-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199327" comment="php53-suhosin-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199328" comment="php53-sysvmsg-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199329" comment="php53-sysvsem-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199330" comment="php53-sysvshm-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199331" comment="php53-tokenizer-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199332" comment="php53-wddx-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199333" comment="php53-xmlreader-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199334" comment="php53-xmlrpc-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199335" comment="php53-xmlwriter-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199336" comment="php53-xsl-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199337" comment="php53-zip-5.3.17-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199338" comment="php53-zlib-5.3.17-0.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1667</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1667" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1667" source="CVE"/>
    <description>
    The rehash mechanism in Perl 5.8.2 through 5.16.x allows context-dependent attackers to cause a denial of service (memory consumption and crash) via a crafted hash key.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1667.html">CVE-2013-1667</cve>
<bugzilla href="https://bugzilla.suse.com/804415">SUSE bug 804415</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199743" comment="perl-5.10.0-64.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199744" comment="perl-32bit-5.10.0-64.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199745" comment="perl-Module-Build-0.2808.01-0.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199746" comment="perl-Test-Simple-0.72-0.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199747" comment="perl-base-5.10.0-64.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199748" comment="perl-doc-5.10.0-64.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199749" comment="perl-x86-5.10.0-64.67 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1682</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1682" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1682" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1682.html">CVE-2013-1682</cve>
<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204288" comment="MozillaFirefox-17.0.7esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204289" comment="MozillaFirefox-branding-SLED-7-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204290" comment="MozillaFirefox-translations-17.0.7esr-0.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1684</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1684" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1684" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozilla::dom::HTMLMediaElement::LookupMediaElementURITable function in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1684.html">CVE-2013-1684</cve>
<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204288" comment="MozillaFirefox-17.0.7esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204289" comment="MozillaFirefox-branding-SLED-7-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204290" comment="MozillaFirefox-translations-17.0.7esr-0.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1685</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1685" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1685" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsIDocument::GetRootElement function in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1685.html">CVE-2013-1685</cve>
<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204288" comment="MozillaFirefox-17.0.7esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204289" comment="MozillaFirefox-branding-SLED-7-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204290" comment="MozillaFirefox-translations-17.0.7esr-0.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1686</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1686" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1686" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozilla::ResetDir function in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1686.html">CVE-2013-1686</cve>
<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204288" comment="MozillaFirefox-17.0.7esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204289" comment="MozillaFirefox-branding-SLED-7-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204290" comment="MozillaFirefox-translations-17.0.7esr-0.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1687</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1687" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1687" source="CVE"/>
    <description>
    The System Only Wrapper (SOW) and Chrome Object Wrapper (COW) implementations in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 do not properly restrict XBL user-defined functions, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges, or conduct cross-site scripting (XSS) attacks, via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1687.html">CVE-2013-1687</cve>
<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204288" comment="MozillaFirefox-17.0.7esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204289" comment="MozillaFirefox-branding-SLED-7-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204290" comment="MozillaFirefox-translations-17.0.7esr-0.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1690</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1690" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1690" source="CVE"/>
    <description>
    Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 do not properly handle onreadystatechange events in conjunction with page reloading, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted web site that triggers an attempt to execute data at an unmapped memory location.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1690.html">CVE-2013-1690</cve>
<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204288" comment="MozillaFirefox-17.0.7esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204289" comment="MozillaFirefox-branding-SLED-7-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204290" comment="MozillaFirefox-translations-17.0.7esr-0.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1692</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1692" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1692" source="CVE"/>
    <description>
    Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 do not prevent the inclusion of body data in an XMLHttpRequest HEAD request, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1692.html">CVE-2013-1692</cve>
<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204288" comment="MozillaFirefox-17.0.7esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204289" comment="MozillaFirefox-branding-SLED-7-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204290" comment="MozillaFirefox-translations-17.0.7esr-0.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1693</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1693" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1693" source="CVE"/>
    <description>
    The SVG filter implementation in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allows remote attackers to read pixel values, and possibly bypass the Same Origin Policy and read text from a different domain, by observing timing differences in execution of filter code.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1693.html">CVE-2013-1693</cve>
<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204288" comment="MozillaFirefox-17.0.7esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204289" comment="MozillaFirefox-branding-SLED-7-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204290" comment="MozillaFirefox-translations-17.0.7esr-0.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1697</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1697" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1697" source="CVE"/>
    <description>
    The XrayWrapper implementation in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 does not properly restrict use of DefaultValue for method calls, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site that triggers use of a user-defined (1) toString or (2) valueOf method.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1697.html">CVE-2013-1697</cve>
<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204288" comment="MozillaFirefox-17.0.7esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204289" comment="MozillaFirefox-branding-SLED-7-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204290" comment="MozillaFirefox-translations-17.0.7esr-0.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1701</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1701" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1701" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1701.html">CVE-2013-1701</cve>
<bugzilla href="https://bugzilla.suse.com/833389">SUSE bug 833389</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213951" comment="MozillaFirefox-17.0.8esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213952" comment="MozillaFirefox-translations-17.0.8esr-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1702</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1702" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1702" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 23.0 and SeaMonkey before 2.20 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1702.html">CVE-2013-1702</cve>
<bugzilla href="https://bugzilla.suse.com/833389">SUSE bug 833389</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213951" comment="MozillaFirefox-17.0.8esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213952" comment="MozillaFirefox-translations-17.0.8esr-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1705</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1705" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1705" source="CVE"/>
    <description>
    Heap-based buffer underflow in the cryptojs_interpret_key_gen_type function in Mozilla Firefox before 23.0 and SeaMonkey before 2.20 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted Certificate Request Message Format (CRMF) request.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1705.html">CVE-2013-1705</cve>
<bugzilla href="https://bugzilla.suse.com/833389">SUSE bug 833389</bugzilla>
<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204186" comment="MozillaFirefox-17.0.9esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204187" comment="MozillaFirefox-translations-17.0.9esr-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1706</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1706" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1706" source="CVE"/>
    <description>
    Stack-based buffer overflow in maintenanceservice.exe in the Mozilla Maintenance Service in Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, and Thunderbird ESR 17.x before 17.0.8 allows local users to gain privileges via a long pathname on the command line.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1706.html">CVE-2013-1706</cve>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213951" comment="MozillaFirefox-17.0.8esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213952" comment="MozillaFirefox-translations-17.0.8esr-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1707</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1707" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1707" source="CVE"/>
    <description>
    Stack-based buffer overflow in Mozilla Updater in Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, and Thunderbird ESR 17.x before 17.0.8 allows local users to gain privileges via a long pathname on the command line to the Mozilla Maintenance Service.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1707.html">CVE-2013-1707</cve>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213951" comment="MozillaFirefox-17.0.8esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213952" comment="MozillaFirefox-translations-17.0.8esr-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1709</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1709" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1709" source="CVE"/>
    <description>
    Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 do not properly handle the interaction between FRAME elements and history, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors involving spoofing a relative location in a previously visited document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1709.html">CVE-2013-1709</cve>
<bugzilla href="https://bugzilla.suse.com/833389">SUSE bug 833389</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213951" comment="MozillaFirefox-17.0.8esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213952" comment="MozillaFirefox-translations-17.0.8esr-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1710</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1710" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1710" source="CVE"/>
    <description>
    The crypto.generateCRMFRequest function in Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 allows remote attackers to execute arbitrary JavaScript code or conduct cross-site scripting (XSS) attacks via vectors related to Certificate Request Message Format (CRMF) request generation.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1710.html">CVE-2013-1710</cve>
<bugzilla href="https://bugzilla.suse.com/833389">SUSE bug 833389</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213951" comment="MozillaFirefox-17.0.8esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213952" comment="MozillaFirefox-translations-17.0.8esr-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1712</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1712" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1712" source="CVE"/>
    <description>
    Multiple untrusted search path vulnerabilities in updater.exe in Mozilla Updater in Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, and Thunderbird ESR 17.x before 17.0.8 on Windows 7, Windows Server 2008 R2, Windows 8, and Windows Server 2012 allow local users to gain privileges via a Trojan horse DLL in (1) the update directory or (2) the current working directory.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1712.html">CVE-2013-1712</cve>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213951" comment="MozillaFirefox-17.0.8esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213952" comment="MozillaFirefox-translations-17.0.8esr-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1713</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1713" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1713" source="CVE"/>
    <description>
    Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 use an incorrect URI within unspecified comparisons during enforcement of the Same Origin Policy, which allows remote attackers to conduct cross-site scripting (XSS) attacks or install arbitrary add-ons via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1713.html">CVE-2013-1713</cve>
<bugzilla href="https://bugzilla.suse.com/833389">SUSE bug 833389</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213951" comment="MozillaFirefox-17.0.8esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213952" comment="MozillaFirefox-translations-17.0.8esr-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1714</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1714" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1714" source="CVE"/>
    <description>
    The Web Workers implementation in Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 does not properly restrict XMLHttpRequest calls, which allows remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1714.html">CVE-2013-1714</cve>
<bugzilla href="https://bugzilla.suse.com/833389">SUSE bug 833389</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213951" comment="MozillaFirefox-17.0.8esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213952" comment="MozillaFirefox-translations-17.0.8esr-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1717</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1717" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1717" source="CVE"/>
    <description>
    Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 do not properly restrict local-filesystem access by Java applets, which allows user-assisted remote attackers to read arbitrary files by leveraging a download to a fixed pathname or other predictable pathname.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1717.html">CVE-2013-1717</cve>
<bugzilla href="https://bugzilla.suse.com/833389">SUSE bug 833389</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213951" comment="MozillaFirefox-17.0.8esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213952" comment="MozillaFirefox-translations-17.0.8esr-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1718</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1718" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1718.html">CVE-2013-1718</cve>
<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204186" comment="MozillaFirefox-17.0.9esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204187" comment="MozillaFirefox-translations-17.0.9esr-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1722</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1722" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsAnimationManager::BuildAnimations function in the Animation Manager in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving stylesheet cloning.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1722.html">CVE-2013-1722</cve>
<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204186" comment="MozillaFirefox-17.0.9esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204187" comment="MozillaFirefox-translations-17.0.9esr-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1725</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1725" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725" source="CVE"/>
    <description>
    Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 do not ensure that initialization occurs for JavaScript objects with compartments, which allows remote attackers to execute arbitrary code by leveraging incorrect scope handling.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1725.html">CVE-2013-1725</cve>
<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204186" comment="MozillaFirefox-17.0.9esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204187" comment="MozillaFirefox-translations-17.0.9esr-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1726</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1726" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1726" source="CVE"/>
    <description>
    Mozilla Updater in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 does not ensure exclusive access to a MAR file, which allows local users to gain privileges by creating a Trojan horse file after MAR signature verification but before MAR use.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1726.html">CVE-2013-1726</cve>
<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204186" comment="MozillaFirefox-17.0.9esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204187" comment="MozillaFirefox-translations-17.0.9esr-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1730</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1730" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730" source="CVE"/>
    <description>
    Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 do not properly handle movement of XBL-backed nodes between documents, which allows remote attackers to execute arbitrary code or cause a denial of service (JavaScript compartment mismatch, or assertion failure and application exit) via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1730.html">CVE-2013-1730</cve>
<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204186" comment="MozillaFirefox-17.0.9esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204187" comment="MozillaFirefox-translations-17.0.9esr-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1732</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1732" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732" source="CVE"/>
    <description>
    Buffer overflow in the nsFloatManager::GetFlowArea function in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code via crafted use of lists and floats within a multi-column layout.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1732.html">CVE-2013-1732</cve>
<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204186" comment="MozillaFirefox-17.0.9esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204187" comment="MozillaFirefox-translations-17.0.9esr-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1735</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1735" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozilla::layout::ScrollbarActivity function in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code via vectors related to image-document scrolling.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1735.html">CVE-2013-1735</cve>
<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204186" comment="MozillaFirefox-17.0.9esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204187" comment="MozillaFirefox-translations-17.0.9esr-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1736</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1736" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736" source="CVE"/>
    <description>
    The nsGfxScrollFrameInner::IsLTR function in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to improperly establishing parent-child relationships of range-request nodes.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1736.html">CVE-2013-1736</cve>
<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204186" comment="MozillaFirefox-17.0.9esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204187" comment="MozillaFirefox-translations-17.0.9esr-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1737</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1737" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737" source="CVE"/>
    <description>
    Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 do not properly identify the "this" object during use of user-defined getter methods on DOM proxies, which might allow remote attackers to bypass intended access restrictions via vectors involving an expando object.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1737.html">CVE-2013-1737</cve>
<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204186" comment="MozillaFirefox-17.0.9esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204187" comment="MozillaFirefox-translations-17.0.9esr-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1739</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1739" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1739" source="CVE"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.15.2 does not ensure that data structures are initialized before read operations, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a decryption failure.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1739.html">CVE-2013-1739</cve>
<bugzilla href="https://bugzilla.suse.com/842979">SUSE bug 842979</bugzilla>
<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204291" comment="MozillaFirefox-17.0.10esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204289" comment="MozillaFirefox-branding-SLED-7-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204292" comment="MozillaFirefox-translations-17.0.10esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204688" comment="libfreebl3-3.15.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204689" comment="libfreebl3-32bit-3.15.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204690" comment="libsoftokn3-3.15.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204691" comment="libsoftokn3-32bit-3.15.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204042" comment="mozilla-nspr-4.10.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204043" comment="mozilla-nspr-32bit-4.10.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204692" comment="mozilla-nss-3.15.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204693" comment="mozilla-nss-32bit-3.15.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204694" comment="mozilla-nss-tools-3.15.2-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204291" comment="MozillaFirefox-17.0.10esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204289" comment="MozillaFirefox-branding-SLED-7-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204292" comment="MozillaFirefox-translations-17.0.10esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204688" comment="libfreebl3-3.15.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204689" comment="libfreebl3-32bit-3.15.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208781" comment="libfreebl3-x86-3.15.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204690" comment="libsoftokn3-3.15.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204691" comment="libsoftokn3-32bit-3.15.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208782" comment="libsoftokn3-x86-3.15.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204042" comment="mozilla-nspr-4.10.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204043" comment="mozilla-nspr-32bit-4.10.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207894" comment="mozilla-nspr-x86-4.10.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204692" comment="mozilla-nss-3.15.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204693" comment="mozilla-nss-32bit-3.15.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204694" comment="mozilla-nss-tools-3.15.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208783" comment="mozilla-nss-x86-3.15.2-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1741</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1741" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741" source="CVE"/>
    <description>
    Integer overflow in Mozilla Network Security Services (NSS) 3.15 before 3.15.3 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a large size value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1741.html">CVE-2013-1741</cve>
<bugzilla href="https://bugzilla.suse.com/850148">SUSE bug 850148</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204714" comment="libfreebl3-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204715" comment="libfreebl3-32bit-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204716" comment="libsoftokn3-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204717" comment="libsoftokn3-32bit-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204049" comment="mozilla-nspr-4.10.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204050" comment="mozilla-nspr-32bit-4.10.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204718" comment="mozilla-nss-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204719" comment="mozilla-nss-32bit-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204720" comment="mozilla-nss-tools-3.15.3-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204714" comment="libfreebl3-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204715" comment="libfreebl3-32bit-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208794" comment="libfreebl3-x86-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204716" comment="libsoftokn3-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204717" comment="libsoftokn3-32bit-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208795" comment="libsoftokn3-x86-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204049" comment="mozilla-nspr-4.10.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204050" comment="mozilla-nspr-32bit-4.10.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207900" comment="mozilla-nspr-x86-4.10.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204718" comment="mozilla-nss-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204719" comment="mozilla-nss-32bit-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204720" comment="mozilla-nss-tools-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208796" comment="mozilla-nss-x86-3.15.3-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1762</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1762" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1762" source="CVE"/>
    <description>
    stunnel 4.21 through 4.54, when CONNECT protocol negotiation and NTLM authentication are enabled, does not correctly perform integer conversion, which allows remote proxy servers to execute arbitrary code via a crafted request that triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1762.html">CVE-2013-1762</cve>
<bugzilla href="https://bugzilla.suse.com/807440">SUSE bug 807440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/807450">SUSE bug 807450</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199786" comment="stunnel-4.54-0.9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1767</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1767" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1767" source="CVE"/>
    <description>
    Use-after-free vulnerability in the shmem_remount_fs function in mm/shmem.c in the Linux kernel before 3.7.10 allows local users to gain privileges or cause a denial of service (system crash) by remounting a tmpfs filesystem without specifying a required mpol (aka mempolicy) mount option.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1767.html">CVE-2013-1767</cve>
<bugzilla href="https://bugzilla.suse.com/806138">SUSE bug 806138</bugzilla>
<bugzilla href="https://bugzilla.suse.com/807436">SUSE bug 807436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1774</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1774" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1774" source="CVE"/>
    <description>
    The chase_port function in drivers/usb/serial/io_ti.c in the Linux kernel before 3.7.4 allows local users to cause a denial of service (NULL pointer dereference and system crash) via an attempted /dev/ttyUSB read or write operation on a disconnected Edgeport USB serial converter.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1774.html">CVE-2013-1774</cve>
<bugzilla href="https://bugzilla.suse.com/806976">SUSE bug 806976</bugzilla>
<bugzilla href="https://bugzilla.suse.com/807455">SUSE bug 807455</bugzilla>
<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213529" comment="kernel-default-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213530" comment="kernel-default-base-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213531" comment="kernel-default-devel-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213533" comment="kernel-source-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213534" comment="kernel-syms-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213585" comment="kernel-trace-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213586" comment="kernel-trace-base-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213535" comment="kernel-trace-devel-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213536" comment="kernel-xen-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213537" comment="kernel-xen-base-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213538" comment="kernel-xen-devel-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215421" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264390" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1775</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1775" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1775" source="CVE"/>
    <description>
    sudo 1.6.0 through 1.7.10p6 and sudo 1.8.0 through 1.8.6p6 allows local users or physically proximate attackers to bypass intended time restrictions and retain privileges without re-authenticating by setting the system clock and sudo user timestamp to the epoch.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1775.html">CVE-2013-1775</cve>
<bugzilla href="https://bugzilla.suse.com/806919">SUSE bug 806919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/806921">SUSE bug 806921</bugzilla>
<bugzilla href="https://bugzilla.suse.com/815325">SUSE bug 815325</bugzilla>
<bugzilla href="https://bugzilla.suse.com/845568">SUSE bug 845568</bugzilla>
<bugzilla href="https://bugzilla.suse.com/854381">SUSE bug 854381</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199787" comment="sudo-1.7.6p2-0.17 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1776</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1776" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1776" source="CVE"/>
    <description>
    sudo 1.3.5 through 1.7.10 and 1.8.0 through 1.8.5, when the tty_tickets option is enabled, does not properly validate the controlling terminal device, which allows local users with sudo permissions to hijack the authorization of another terminal via vectors related to connecting to the standard input, output, and error file descriptors of another terminal.  NOTE: this is one of three closely-related vulnerabilities that were originally assigned CVE-2013-1776, but they have been SPLIT because of different affected versions.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1776.html">CVE-2013-1776</cve>
<bugzilla href="https://bugzilla.suse.com/806921">SUSE bug 806921</bugzilla>
<bugzilla href="https://bugzilla.suse.com/817349">SUSE bug 817349</bugzilla>
<bugzilla href="https://bugzilla.suse.com/817350">SUSE bug 817350</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199787" comment="sudo-1.7.6p2-0.17 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1790</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1790" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1790" source="CVE"/>
    <description>
    poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1790.html">CVE-2013-1790</cve>
<bugzilla href="https://bugzilla.suse.com/806793">SUSE bug 806793</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199649" comment="libpoppler-glib4-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199650" comment="libpoppler-qt4-3-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199651" comment="libpoppler5-0.12.3-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199652" comment="poppler-tools-0.12.3-1.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1796</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1796" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1796" source="CVE"/>
    <description>
    The kvm_set_msr_common function in arch/x86/kvm/x86.c in the Linux kernel through 3.8.4 does not ensure a required time_page alignment during an MSR_KVM_SYSTEM_TIME operation, which allows guest OS users to cause a denial of service (buffer overflow and host OS memory corruption) or possibly have unspecified other impact via a crafted application.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1796.html">CVE-2013-1796</cve>
<bugzilla href="https://bugzilla.suse.com/0">SUSE bug 0</bugzilla>
<bugzilla href="https://bugzilla.suse.com/806980">SUSE bug 806980</bugzilla>
<bugzilla href="https://bugzilla.suse.com/819789">SUSE bug 819789</bugzilla>
<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1797</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1797" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1797" source="CVE"/>
    <description>
    Use-after-free vulnerability in arch/x86/kvm/x86.c in the Linux kernel through 3.8.4 allows guest OS users to cause a denial of service (host OS memory corruption) or possibly have unspecified other impact via a crafted application that triggers use of a guest physical address (GPA) in (1) movable or (2) removable memory during an MSR_KVM_SYSTEM_TIME kvm_set_msr_common operation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1797.html">CVE-2013-1797</cve>
<bugzilla href="https://bugzilla.suse.com/0">SUSE bug 0</bugzilla>
<bugzilla href="https://bugzilla.suse.com/806980">SUSE bug 806980</bugzilla>
<bugzilla href="https://bugzilla.suse.com/819789">SUSE bug 819789</bugzilla>
<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1798</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1798" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1798" source="CVE"/>
    <description>
    The ioapic_read_indirect function in virt/kvm/ioapic.c in the Linux kernel through 3.8.4 does not properly handle a certain combination of invalid IOAPIC_REG_SELECT and IOAPIC_REG_WINDOW operations, which allows guest OS users to obtain sensitive information from host OS memory or cause a denial of service (host OS OOPS) via a crafted application.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1798.html">CVE-2013-1798</cve>
<bugzilla href="https://bugzilla.suse.com/0">SUSE bug 0</bugzilla>
<bugzilla href="https://bugzilla.suse.com/806980">SUSE bug 806980</bugzilla>
<bugzilla href="https://bugzilla.suse.com/819789">SUSE bug 819789</bugzilla>
<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1819</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1819" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1819" source="CVE"/>
    <description>
    The _xfs_buf_find function in fs/xfs/xfs_buf.c in the Linux kernel before 3.7.6 does not validate block numbers, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by leveraging the ability to mount an XFS filesystem containing a metadata inode with an invalid extent map.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1819.html">CVE-2013-1819</cve>
<bugzilla href="https://bugzilla.suse.com/807471">SUSE bug 807471</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213736" comment="kernel-default-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213737" comment="kernel-default-base-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213738" comment="kernel-default-devel-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213740" comment="kernel-source-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213741" comment="kernel-syms-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213812" comment="kernel-trace-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213813" comment="kernel-trace-base-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213742" comment="kernel-trace-devel-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1821</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1821" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1821" source="CVE"/>
    <description>
    lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1821.html">CVE-2013-1821</cve>
<bugzilla href="https://bugzilla.suse.com/808137">SUSE bug 808137</bugzilla>
<bugzilla href="https://bugzilla.suse.com/876588">SUSE bug 876588</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204803" comment="ruby-1.8.7.p357-0.9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202037" comment="ruby-doc-html-1.8.7.p357-0.9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202041" comment="ruby-tk-1.8.7.p357-0.9.15 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1848</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1848" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1848" source="CVE"/>
    <description>
    fs/ext3/super.c in the Linux kernel before 3.8.4 uses incorrect arguments to functions in certain circumstances related to printk input, which allows local users to conduct format-string attacks and possibly gain privileges via a crafted application.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1848.html">CVE-2013-1848</cve>
<bugzilla href="https://bugzilla.suse.com/809155">SUSE bug 809155</bugzilla>
<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1861</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1861" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1861" source="CVE"/>
    <description>
    MariaDB 5.5.x before 5.5.30, 5.3.x before 5.3.13, 5.2.x before 5.2.15, and 5.1.x before 5.1.68, and Oracle MySQL 5.1.69 and earlier, 5.5.31 and earlier, and 5.6.11 and earlier allows remote attackers to cause a denial of service (crash) via a crafted geometry feature that specifies a large number of points, which is not properly handled when processing the binary representation of this feature, related to a numeric calculation error.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1861.html">CVE-2013-1861</cve>
<bugzilla href="https://bugzilla.suse.com/809544">SUSE bug 809544</bugzilla>
<bugzilla href="https://bugzilla.suse.com/830086">SUSE bug 830086</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213974" comment="libmysql55client18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213976" comment="libmysql55client_r18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213978" comment="mysql-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213979" comment="mysql-client-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213980" comment="mysql-tools-5.5.33-0.11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213974" comment="libmysql55client18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213975" comment="libmysql55client18-32bit-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213976" comment="libmysql55client_r18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213978" comment="mysql-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213979" comment="mysql-client-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213980" comment="mysql-tools-5.5.33-0.11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1862</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1862" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1862" source="CVE"/>
    <description>
    mod_rewrite.c in the mod_rewrite module in the Apache HTTP Server 2.2.x before 2.2.25 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to execute arbitrary commands via an HTTP request containing an escape sequence for a terminal emulator.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1862.html">CVE-2013-1862</cve>
<bugzilla href="https://bugzilla.suse.com/829056">SUSE bug 829056</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829057">SUSE bug 829057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/834475">SUSE bug 834475</bugzilla>
<bugzilla href="https://bugzilla.suse.com/844212">SUSE bug 844212</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201168" comment="apache2-2.2.12-1.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201170" comment="apache2-doc-2.2.12-1.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201171" comment="apache2-example-pages-2.2.12-1.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201172" comment="apache2-prefork-2.2.12-1.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201173" comment="apache2-utils-2.2.12-1.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201174" comment="apache2-worker-2.2.12-1.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1872</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1872" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1872" source="CVE"/>
    <description>
    The Intel drivers in Mesa 8.0.x and 9.0.x allow context-dependent attackers to cause a denial of service (reachable assertion and crash) and possibly execute arbitrary code via vectors involving 3d graphics that trigger an out-of-bounds array access, related to the fs_visitor::remove_dead_constants function.  NOTE: this issue might be related to CVE-2013-0796.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1872.html">CVE-2013-1872</cve>
<bugzilla href="https://bugzilla.suse.com/828007">SUSE bug 828007</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204184" comment="Mesa-9.0.3-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204185" comment="Mesa-32bit-9.0.3-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208359" comment="Mesa-x86-9.0.3-0.19 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204184" comment="Mesa-9.0.3-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204185" comment="Mesa-32bit-9.0.3-0.19 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1881</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1881" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1881" source="CVE"/>
    <description>
    GNOME libsvg before 2.39.0 allows remote attackers to read arbitrary files via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1881.html">CVE-2013-1881</cve>
<bugzilla href="https://bugzilla.suse.com/840753">SUSE bug 840753</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201889" comment="librsvg-2.26.0-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204653" comment="librsvg-32bit-2.26.0-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204654" comment="rsvg-view-2.26.0-2.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201889" comment="librsvg-2.26.0-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204653" comment="librsvg-32bit-2.26.0-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208756" comment="librsvg-x86-2.26.0-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204654" comment="rsvg-view-2.26.0-2.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1894</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1894" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1894" source="CVE"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2013-2561. Reason: This candidate is a duplicate of CVE-2013-2561. Notes: All CVE users should reference CVE-2013-2561 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1894.html">CVE-2013-1894</cve>
<bugzilla href="https://bugzilla.suse.com/811660">SUSE bug 811660</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201714" comment="ibutils-1.5.7-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201715" comment="ibutils-32bit-1.5.7-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1896</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1896" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1896" source="CVE"/>
    <description>
    mod_dav.c in the Apache HTTP Server before 2.2.25 does not properly determine whether DAV is enabled for a URI, which allows remote attackers to cause a denial of service (segmentation fault) via a MERGE request in which the URI is configured for handling by the mod_dav_svn module, but a certain href attribute in XML data refers to a non-DAV URI.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1896.html">CVE-2013-1896</cve>
<bugzilla href="https://bugzilla.suse.com/829056">SUSE bug 829056</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829057">SUSE bug 829057</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201168" comment="apache2-2.2.12-1.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201170" comment="apache2-doc-2.2.12-1.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201171" comment="apache2-example-pages-2.2.12-1.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201172" comment="apache2-prefork-2.2.12-1.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201173" comment="apache2-utils-2.2.12-1.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201174" comment="apache2-worker-2.2.12-1.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1899</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1899" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1899" source="CVE"/>
    <description>
    Argument injection vulnerability in PostgreSQL 9.2.x before 9.2.4, 9.1.x before 9.1.9, and 9.0.x before 9.0.13 allows remote attackers to cause a denial of service (file corruption), and allows remote authenticated users to modify configuration settings and execute arbitrary code, via a connection request using a database name that begins with a "-" (hyphen).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1899.html">CVE-2013-1899</cve>
<bugzilla href="https://bugzilla.suse.com/812525">SUSE bug 812525</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199606" comment="libecpg6-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199607" comment="libpq5-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199608" comment="libpq5-32bit-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199609" comment="postgresql91-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199610" comment="postgresql91-contrib-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199611" comment="postgresql91-docs-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199612" comment="postgresql91-server-9.1.9-0.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1900</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1900" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1900" source="CVE"/>
    <description>
    PostgreSQL 9.2.x before 9.2.4, 9.1.x before 9.1.9, 9.0.x before 9.0.13, and 8.4.x before 8.4.17, when using OpenSSL, generates insufficiently random numbers, which might allow remote authenticated users to have an unspecified impact via vectors related to the "contrib/pgcrypto functions."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1900.html">CVE-2013-1900</cve>
<bugzilla href="https://bugzilla.suse.com/812525">SUSE bug 812525</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199606" comment="libecpg6-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199607" comment="libpq5-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199608" comment="libpq5-32bit-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199609" comment="postgresql91-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199610" comment="postgresql91-contrib-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199611" comment="postgresql91-docs-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199612" comment="postgresql91-server-9.1.9-0.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1901</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1901" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1901" source="CVE"/>
    <description>
    PostgreSQL 9.2.x before 9.2.4 and 9.1.x before 9.1.9 does not properly check REPLICATION privileges, which allows remote authenticated users to bypass intended backup restrictions by calling the (1) pg_start_backup or (2) pg_stop_backup functions.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1901.html">CVE-2013-1901</cve>
<bugzilla href="https://bugzilla.suse.com/812525">SUSE bug 812525</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199606" comment="libecpg6-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199607" comment="libpq5-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199608" comment="libpq5-32bit-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199609" comment="postgresql91-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199610" comment="postgresql91-contrib-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199611" comment="postgresql91-docs-9.1.9-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199612" comment="postgresql91-server-9.1.9-0.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1914</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1914" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1914" source="CVE"/>
    <description>
    Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.17 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of domain conversion results.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1914.html">CVE-2013-1914</cve>
<bugzilla href="https://bugzilla.suse.com/813121">SUSE bug 813121</bugzilla>
<bugzilla href="https://bugzilla.suse.com/826666">SUSE bug 826666</bugzilla>
<bugzilla href="https://bugzilla.suse.com/882910">SUSE bug 882910</bugzilla>
<bugzilla href="https://bugzilla.suse.com/920055">SUSE bug 920055</bugzilla>
<bugzilla href="https://bugzilla.suse.com/937231">SUSE bug 937231</bugzilla>
<bugzilla href="https://bugzilla.suse.com/941444">SUSE bug 941444</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213314" comment="glibc-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204402" comment="glibc-32bit-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213316" comment="glibc-devel-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204404" comment="glibc-devel-32bit-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213334" comment="glibc-html-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213318" comment="glibc-i18ndata-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213335" comment="glibc-info-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213319" comment="glibc-locale-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204407" comment="glibc-locale-32bit-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208499" comment="glibc-locale-x86-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213336" comment="glibc-profile-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208501" comment="glibc-profile-32bit-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208502" comment="glibc-profile-x86-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208503" comment="glibc-x86-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213321" comment="nscd-2.11.3-17.56 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213314" comment="glibc-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213315" comment="glibc-32bit-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213316" comment="glibc-devel-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213317" comment="glibc-devel-32bit-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213334" comment="glibc-html-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213318" comment="glibc-i18ndata-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213335" comment="glibc-info-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213319" comment="glibc-locale-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213320" comment="glibc-locale-32bit-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213336" comment="glibc-profile-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213337" comment="glibc-profile-32bit-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213321" comment="nscd-2.11.3-17.56 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1915</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1915" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1915" source="CVE"/>
    <description>
    ModSecurity before 2.7.3 allows remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via an XML external entity declaration in conjunction with an entity reference, aka an XML External Entity (XXE) vulnerability.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1915.html">CVE-2013-1915</cve>
<bugzilla href="https://bugzilla.suse.com/813190">SUSE bug 813190</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199339" comment="apache2-mod_security2-2.7.1-0.2.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1917</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1917" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1917" source="CVE"/>
    <description>
    Xen 3.1 through 4.x, when running 64-bit hosts on Intel CPUs, does not clear the NT flag when using an IRET after a SYSENTER instruction, which allows PV guest users to cause a denial of service (hypervisor crash) by triggering a #GP fault, which is not properly handled by another IRET instruction.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1917.html">CVE-2013-1917</cve>
<bugzilla href="https://bugzilla.suse.com/813673">SUSE bug 813673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199814" comment="xen-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199815" comment="xen-doc-html-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199816" comment="xen-doc-pdf-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199817" comment="xen-kmp-default-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199818" comment="xen-kmp-pae-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199819" comment="xen-libs-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199820" comment="xen-libs-32bit-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199821" comment="xen-tools-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199822" comment="xen-tools-domU-4.2.2_04-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1918</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1918" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1918" source="CVE"/>
    <description>
    Certain page table manipulation operations in Xen 4.1.x, 4.2.x, and earlier are not preemptible, which allows local PV kernels to cause a denial of service via vectors related to "deep page table traversal."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1918.html">CVE-2013-1918</cve>
<bugzilla href="https://bugzilla.suse.com/813673">SUSE bug 813673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/816159">SUSE bug 816159</bugzilla>
<bugzilla href="https://bugzilla.suse.com/823011">SUSE bug 823011</bugzilla>
<bugzilla href="https://bugzilla.suse.com/826882">SUSE bug 826882</bugzilla>
<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204896" comment="xen-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204897" comment="xen-doc-html-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204898" comment="xen-doc-pdf-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204899" comment="xen-kmp-default-4.2.3_02_3.0.93_0.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204900" comment="xen-kmp-pae-4.2.3_02_3.0.93_0.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204901" comment="xen-libs-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204902" comment="xen-libs-32bit-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204903" comment="xen-tools-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204904" comment="xen-tools-domU-4.2.3_02-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204896" comment="xen-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204897" comment="xen-doc-html-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204898" comment="xen-doc-pdf-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204899" comment="xen-kmp-default-4.2.3_02_3.0.93_0.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204901" comment="xen-libs-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204902" comment="xen-libs-32bit-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204903" comment="xen-tools-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204904" comment="xen-tools-domU-4.2.3_02-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1919</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1919" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1919" source="CVE"/>
    <description>
    Xen 4.2.x and 4.1.x does not properly restrict access to IRQs, which allows local stub domain clients to gain access to IRQs and cause a denial of service via vectors related to "passed-through IRQs or PCI devices."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1919.html">CVE-2013-1919</cve>
<bugzilla href="https://bugzilla.suse.com/813673">SUSE bug 813673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/813675">SUSE bug 813675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199814" comment="xen-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199815" comment="xen-doc-html-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199816" comment="xen-doc-pdf-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199817" comment="xen-kmp-default-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199818" comment="xen-kmp-pae-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199819" comment="xen-libs-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199820" comment="xen-libs-32bit-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199821" comment="xen-tools-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199822" comment="xen-tools-domU-4.2.2_04-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1920</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1920" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1920" source="CVE"/>
    <description>
    Xen 4.2.x, 4.1.x, and earlier, when the hypervisor is running "under memory pressure" and the Xen Security Module (XSM) is enabled, uses the wrong ordering of operations when extending the per-domain event channel tracking table, which causes a use-after-free and allows local guest kernels to inject arbitrary events and gain privileges via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1920.html">CVE-2013-1920</cve>
<bugzilla href="https://bugzilla.suse.com/813673">SUSE bug 813673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/813677">SUSE bug 813677</bugzilla>
<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199814" comment="xen-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199815" comment="xen-doc-html-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199816" comment="xen-doc-pdf-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199817" comment="xen-kmp-default-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199818" comment="xen-kmp-pae-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199819" comment="xen-libs-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199820" comment="xen-libs-32bit-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199821" comment="xen-tools-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199822" comment="xen-tools-domU-4.2.2_04-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1922</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1922" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1922" source="CVE"/>
    <description>
    qemu-nbd in QEMU, as used in Xen 4.2.x, determines the format of a raw disk image based on the header, which allows local guest OS administrators to read arbitrary files on the host by modifying the header to identify a different format, which is used when the guest is restarted, a different vulnerability than CVE-2008-2004.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1922.html">CVE-2013-1922</cve>
<bugzilla href="https://bugzilla.suse.com/814059">SUSE bug 814059</bugzilla>
<bugzilla href="https://bugzilla.suse.com/934753">SUSE bug 934753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/934768">SUSE bug 934768</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199811" comment="virt-utils-1.2.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204905" comment="xen-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204906" comment="xen-doc-html-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204907" comment="xen-doc-pdf-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204908" comment="xen-kmp-default-4.2.3_08_3.0.101_0.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204909" comment="xen-kmp-pae-4.2.3_08_3.0.101_0.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204910" comment="xen-libs-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204911" comment="xen-libs-32bit-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204912" comment="xen-tools-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204913" comment="xen-tools-domU-4.2.3_08-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204905" comment="xen-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204906" comment="xen-doc-html-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204907" comment="xen-doc-pdf-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204908" comment="xen-kmp-default-4.2.3_08_3.0.101_0.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204910" comment="xen-libs-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204911" comment="xen-libs-32bit-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204912" comment="xen-tools-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204913" comment="xen-tools-domU-4.2.3_08-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1923</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1923" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1923" source="CVE"/>
    <description>
    rpc-gssd in nfs-utils before 1.2.8 performs reverse DNS resolution for server names during GSSAPI authentication, which might allow remote attackers to read otherwise-restricted files via DNS spoofing attacks.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1923.html">CVE-2013-1923</cve>
<bugzilla href="https://bugzilla.suse.com/813464">SUSE bug 813464</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199721" comment="nfs-client-1.2.3-18.31 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1929</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1929" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1929" source="CVE"/>
    <description>
    Heap-based buffer overflow in the tg3_read_vpd function in drivers/net/ethernet/broadcom/tg3.c in the Linux kernel before 3.8.6 allows physically proximate attackers to cause a denial of service (system crash) or possibly execute arbitrary code via crafted firmware that specifies a long string in the Vital Product Data (VPD) data structure.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1929.html">CVE-2013-1929</cve>
<bugzilla href="https://bugzilla.suse.com/813733">SUSE bug 813733</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213736" comment="kernel-default-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213737" comment="kernel-default-base-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213738" comment="kernel-default-devel-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213740" comment="kernel-source-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213741" comment="kernel-syms-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213812" comment="kernel-trace-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213813" comment="kernel-trace-base-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213742" comment="kernel-trace-devel-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1940</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1940" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1940" source="CVE"/>
    <description>
    X.Org X server before 1.13.4 and 1.4.x before 1.14.1 does not properly restrict access to input events when adding a new hot-plug device, which might allow physically proximate attackers to obtain sensitive information, as demonstrated by reading passwords from a tty.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1940.html">CVE-2013-1940</cve>
<bugzilla href="https://bugzilla.suse.com/814653">SUSE bug 814653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/815870">SUSE bug 815870</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199825" comment="xorg-x11-Xvnc-7.4-27.81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199826" comment="xorg-x11-server-7.4-27.81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199827" comment="xorg-x11-server-extra-7.4-27.81 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1944</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1944" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1944" source="CVE"/>
    <description>
    The tailMatch function in cookie.c in cURL and libcurl before 7.30.0 does not properly match the path domain when sending cookies, which allows remote attackers to steal cookies via a matching suffix in the domain of a URL.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1944.html">CVE-2013-1944</cve>
<bugzilla href="https://bugzilla.suse.com/814655">SUSE bug 814655</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199391" comment="curl-7.19.7-1.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199392" comment="libcurl4-7.19.7-1.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199393" comment="libcurl4-32bit-7.19.7-1.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199394" comment="libcurl4-x86-7.19.7-1.26 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1952</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1952" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1952" source="CVE"/>
    <description>
    Xen 4.x, when using Intel VT-d for a bus mastering capable PCI device, does not properly check the source when accessing a bridge device's interrupt remapping table entries for MSI interrupts, which allows local guest domains to cause a denial of service (interrupt injection) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1952.html">CVE-2013-1952</cve>
<bugzilla href="https://bugzilla.suse.com/813673">SUSE bug 813673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/816163">SUSE bug 816163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199814" comment="xen-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199815" comment="xen-doc-html-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199816" comment="xen-doc-pdf-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199817" comment="xen-kmp-default-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199818" comment="xen-kmp-pae-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199819" comment="xen-libs-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199820" comment="xen-libs-32bit-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199821" comment="xen-tools-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199822" comment="xen-tools-domU-4.2.2_04-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1960</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1960" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1960" source="CVE"/>
    <description>
    Heap-based buffer overflow in the t2p_process_jpeg_strip function in tiff2pdf in libtiff 4.0.3 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF image file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1960.html">CVE-2013-1960</cve>
<bugzilla href="https://bugzilla.suse.com/817573">SUSE bug 817573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199680" comment="libtiff3-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199681" comment="libtiff3-32bit-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199682" comment="libtiff3-x86-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199683" comment="tiff-3.8.2-141.152 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1961</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1961" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1961" source="CVE"/>
    <description>
    Stack-based buffer overflow in the t2p_write_pdf_page function in tiff2pdf in libtiff before 4.0.3 allows remote attackers to cause a denial of service (application crash) via a crafted image length and resolution in a TIFF image file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1961.html">CVE-2013-1961</cve>
<bugzilla href="https://bugzilla.suse.com/817573">SUSE bug 817573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/818117">SUSE bug 818117</bugzilla>
<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199680" comment="libtiff3-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199681" comment="libtiff3-32bit-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199682" comment="libtiff3-x86-3.8.2-141.152 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199683" comment="tiff-3.8.2-141.152 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1962</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1962" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1962" source="CVE"/>
    <description>
    The remoteDispatchStoragePoolListAllVolumes function in the storage pool manager in libvirt 1.0.5 allows remote attackers to cause a denial of service (file descriptor consumption) via a large number of requests "to list all volumes for the particular pool."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1962.html">CVE-2013-1962</cve>
<bugzilla href="https://bugzilla.suse.com/820397">SUSE bug 820397</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199692" comment="libvirt-1.0.5.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199693" comment="libvirt-client-1.0.5.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199694" comment="libvirt-client-32bit-1.0.5.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199695" comment="libvirt-doc-1.0.5.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199696" comment="libvirt-lock-sanlock-1.0.5.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199697" comment="libvirt-python-1.0.5.1-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1976</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1976" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1976" source="CVE"/>
    <description>
    The (1) tomcat5, (2) tomcat6, and (3) tomcat7 init scripts, as used in the RPM distribution of Tomcat for JBoss Enterprise Web Server 1.0.2 and 2.0.0, and Red Hat Enterprise Linux 5 and 6, allow local users to change the ownership of arbitrary files via a symlink attack on (a) tomcat5-initd.log, (b) tomcat6-initd.log, (c) catalina.out, or (d) tomcat7-initd.log.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1976.html">CVE-2013-1976</cve>
<bugzilla href="https://bugzilla.suse.com/822177">SUSE bug 822177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/824284">SUSE bug 824284</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208245" comment="tomcat6-6.0.18-20.35.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208246" comment="tomcat6-admin-webapps-6.0.18-20.35.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208247" comment="tomcat6-docs-webapp-6.0.18-20.35.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208248" comment="tomcat6-javadoc-6.0.18-20.35.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208249" comment="tomcat6-jsp-2_1-api-6.0.18-20.35.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208250" comment="tomcat6-lib-6.0.18-20.35.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208251" comment="tomcat6-servlet-2_5-api-6.0.18-20.35.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208252" comment="tomcat6-webapps-6.0.18-20.35.42 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1979</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1979" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979" source="CVE"/>
    <description>
    The scm_set_cred function in include/net/scm.h in the Linux kernel before 3.8.11 uses incorrect uid and gid values during credentials passing, which allows local users to gain privileges via a crafted application.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1979.html">CVE-2013-1979</cve>
<bugzilla href="https://bugzilla.suse.com/816708">SUSE bug 816708</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208673" comment="iscsitarget-kmp-bigsmp-1.4.20_3.0.101_0.40-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204510" comment="kernel-default-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204511" comment="kernel-default-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204512" comment="kernel-default-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204518" comment="kernel-source-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204519" comment="kernel-syms-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208596" comment="kernel-trace-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208597" comment="kernel-trace-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204520" comment="kernel-trace-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208676" comment="ofed-kmp-bigsmp-1.5.4.1_3.0.101_0.40-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208677" comment="oracleasm-kmp-bigsmp-2.0.5_3.0.101_0.40-7.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215421" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264390" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1981</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1981" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libX11 1.5.99.901 (1.6 RC1) and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XQueryFont, (2) _XF86BigfontQueryFont, (3) XListFontsWithInfo, (4) XGetMotionEvents, (5) XListHosts, (6) XGetModifierMapping, (7) XGetPointerMapping, (8) XGetKeyboardMapping, (9) XGetWindowProperty, (10) XGetImage, (11) LoadColornameDB, (12) XrmGetFileDatabase, (13) _XimParseStringFile, or (14) TransFileName functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1981.html">CVE-2013-1981</cve>
<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/821664">SUSE bug 821664</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200488" comment="xorg-x11-libX11-7.4-5.11.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200489" comment="xorg-x11-libX11-32bit-7.4-5.11.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200490" comment="xorg-x11-libX11-x86-7.4-5.11.11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200488" comment="xorg-x11-libX11-7.4-5.11.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200489" comment="xorg-x11-libX11-32bit-7.4-5.11.11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1982</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1982" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1982" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXext 1.3.1 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XcupGetReservedColormapEntries, (2) XcupStoreColors, (3) XdbeGetVisualInfo, (4) XeviGetVisualInfo, (5) XShapeGetRectangles, and (6) XSyncListSystemCounters functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1982.html">CVE-2013-1982</cve>
<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/821665">SUSE bug 821665</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200491" comment="xorg-x11-libXext-7.4-1.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200492" comment="xorg-x11-libXext-32bit-7.4-1.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200493" comment="xorg-x11-libXext-x86-7.4-1.18 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200491" comment="xorg-x11-libXext-7.4-1.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200492" comment="xorg-x11-libXext-32bit-7.4-1.18 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1983</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1983" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1983" source="CVE"/>
    <description>
    Integer overflow in X.org libXfixes 5.0 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the XFixesGetCursorImage function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1983.html">CVE-2013-1983</cve>
<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/821667">SUSE bug 821667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/880221">SUSE bug 880221</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200494" comment="xorg-x11-libXfixes-7.4-1.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200495" comment="xorg-x11-libXfixes-32bit-7.4-1.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200496" comment="xorg-x11-libXfixes-x86-7.4-1.16 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200494" comment="xorg-x11-libXfixes-7.4-1.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200495" comment="xorg-x11-libXfixes-32bit-7.4-1.16 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1984</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1984" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1984" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXi 1.7.1 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XGetDeviceControl, (2) XGetFeedbackControl, (3) XGetDeviceDontPropagateList, (4) XGetDeviceMotionEvents, (5) XIGetProperty, (6) XIGetSelectedEvents, (7) XGetDeviceProperties, and (8) XListInputDevices functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1984.html">CVE-2013-1984</cve>
<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214003" comment="xorg-x11-libs-7.4-8.26.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204962" comment="xorg-x11-libs-32bit-7.4-8.26.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209102" comment="xorg-x11-libs-x86-7.4-8.26.42 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214003" comment="xorg-x11-libs-7.4-8.26.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214004" comment="xorg-x11-libs-32bit-7.4-8.26.38 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1985</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1985" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1985" source="CVE"/>
    <description>
    Integer overflow in X.org libXinerama 1.1.2 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the XineramaQueryScreens function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1985.html">CVE-2013-1985</cve>
<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214003" comment="xorg-x11-libs-7.4-8.26.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204962" comment="xorg-x11-libs-32bit-7.4-8.26.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209102" comment="xorg-x11-libs-x86-7.4-8.26.42 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214003" comment="xorg-x11-libs-7.4-8.26.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214004" comment="xorg-x11-libs-32bit-7.4-8.26.38 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1986</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1986" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1986" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXrandr 1.4.0 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XRRQueryOutputProperty and (2) XRRQueryProviderProperty functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1986.html">CVE-2013-1986</cve>
<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214003" comment="xorg-x11-libs-7.4-8.26.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204962" comment="xorg-x11-libs-32bit-7.4-8.26.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209102" comment="xorg-x11-libs-x86-7.4-8.26.42 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214003" comment="xorg-x11-libs-7.4-8.26.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214004" comment="xorg-x11-libs-32bit-7.4-8.26.38 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1987</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1987" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1987" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXrender 0.9.7 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XRenderQueryFilters, (2) XRenderQueryFormats, and (3) XRenderQueryPictIndexValues functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1987.html">CVE-2013-1987</cve>
<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/821669">SUSE bug 821669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/880221">SUSE bug 880221</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200500" comment="xorg-x11-libXrender-7.4-1.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200501" comment="xorg-x11-libXrender-32bit-7.4-1.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200502" comment="xorg-x11-libXrender-x86-7.4-1.16 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200500" comment="xorg-x11-libXrender-7.4-1.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200501" comment="xorg-x11-libXrender-32bit-7.4-1.16 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1988</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1988" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1988" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXRes 1.0.6 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XResQueryClients and (2) XResQueryClientResources functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1988.html">CVE-2013-1988</cve>
<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214003" comment="xorg-x11-libs-7.4-8.26.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204962" comment="xorg-x11-libs-32bit-7.4-8.26.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209102" comment="xorg-x11-libs-x86-7.4-8.26.42 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214003" comment="xorg-x11-libs-7.4-8.26.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214004" comment="xorg-x11-libs-32bit-7.4-8.26.38 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1989</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1989" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1989" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXv 1.0.7 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XvQueryPortAttributes, (2) XvListImageFormats, and (3) XvCreateImage function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1989.html">CVE-2013-1989</cve>
<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/821671">SUSE bug 821671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/880221">SUSE bug 880221</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200506" comment="xorg-x11-libXv-7.4-1.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200507" comment="xorg-x11-libXv-32bit-7.4-1.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200508" comment="xorg-x11-libXv-x86-7.4-1.16 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200506" comment="xorg-x11-libXv-7.4-1.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200507" comment="xorg-x11-libXv-32bit-7.4-1.16 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1990</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1990" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1990" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXvMC 1.0.7 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XvMCListSurfaceTypes and (2) XvMCListSubpictureTypes functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1990.html">CVE-2013-1990</cve>
<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214003" comment="xorg-x11-libs-7.4-8.26.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204962" comment="xorg-x11-libs-32bit-7.4-8.26.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209102" comment="xorg-x11-libs-x86-7.4-8.26.42 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214003" comment="xorg-x11-libs-7.4-8.26.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214004" comment="xorg-x11-libs-32bit-7.4-8.26.38 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1991</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1991" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1991" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXxf86dga 1.1.3 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XDGAQueryModes and (2) XDGASetMode functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1991.html">CVE-2013-1991</cve>
<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214003" comment="xorg-x11-libs-7.4-8.26.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204962" comment="xorg-x11-libs-32bit-7.4-8.26.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209102" comment="xorg-x11-libs-x86-7.4-8.26.42 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214003" comment="xorg-x11-libs-7.4-8.26.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214004" comment="xorg-x11-libs-32bit-7.4-8.26.38 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1992</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1992" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1992" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libdmx 1.1.2 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) DMXGetScreenAttributes, (2) DMXGetWindowAttributes, and (3) DMXGetInputAttributes functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1992.html">CVE-2013-1992</cve>
<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214003" comment="xorg-x11-libs-7.4-8.26.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204962" comment="xorg-x11-libs-32bit-7.4-8.26.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209102" comment="xorg-x11-libs-x86-7.4-8.26.42 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214003" comment="xorg-x11-libs-7.4-8.26.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214004" comment="xorg-x11-libs-32bit-7.4-8.26.38 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1993</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-1993" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1993" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libGLX in Mesa 9.1.1 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XF86DRIOpenConnection and (2) XF86DRIGetClientDriverName functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1993.html">CVE-2013-1993</cve>
<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/821855">SUSE bug 821855</bugzilla>
<bugzilla href="https://bugzilla.suse.com/880221">SUSE bug 880221</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199267" comment="Mesa-9.0.3-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199268" comment="Mesa-32bit-9.0.3-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199269" comment="Mesa-x86-9.0.3-0.17 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1995</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1995" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1995" source="CVE"/>
    <description>
    X.org libXi 1.7.1 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to an unexpected sign extension in the XListInputDevices function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1995.html">CVE-2013-1995</cve>
<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214003" comment="xorg-x11-libs-7.4-8.26.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204962" comment="xorg-x11-libs-32bit-7.4-8.26.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209102" comment="xorg-x11-libs-x86-7.4-8.26.42 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214003" comment="xorg-x11-libs-7.4-8.26.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214004" comment="xorg-x11-libs-32bit-7.4-8.26.38 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1996</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1996" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1996" source="CVE"/>
    <description>
    X.org libFS 1.0.4 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to an unexpected sign extension in the FSOpenServer function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1996.html">CVE-2013-1996</cve>
<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214003" comment="xorg-x11-libs-7.4-8.26.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204962" comment="xorg-x11-libs-32bit-7.4-8.26.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209102" comment="xorg-x11-libs-x86-7.4-8.26.42 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214003" comment="xorg-x11-libs-7.4-8.26.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214004" comment="xorg-x11-libs-32bit-7.4-8.26.38 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1997</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1997" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997" source="CVE"/>
    <description>
    Multiple buffer overflows in X.org libX11 1.5.99.901 (1.6 RC1) and earlier allow X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the (1) XAllocColorCells, (2) _XkbReadGetDeviceInfoReply, (3) _XkbReadGeomShapes, (4) _XkbReadGetGeometryReply, (5) _XkbReadKeySyms, (6) _XkbReadKeyActions, (7) _XkbReadKeyBehaviors, (8) _XkbReadModifierMap, (9) _XkbReadExplicitComponents, (10) _XkbReadVirtualModMap, (11) _XkbReadGetNamesReply, (12) _XkbReadGetMapReply, (13) _XimXGetReadData, (14) XListFonts, (15) XListExtensions, and (16) XGetFontPath functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1997.html">CVE-2013-1997</cve>
<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/821664">SUSE bug 821664</bugzilla>
<bugzilla href="https://bugzilla.suse.com/824294">SUSE bug 824294</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200488" comment="xorg-x11-libX11-7.4-5.11.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200489" comment="xorg-x11-libX11-32bit-7.4-5.11.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200490" comment="xorg-x11-libX11-x86-7.4-5.11.11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203673" comment="xorg-x11-libX11-7.4-5.11.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210976" comment="xorg-x11-libX11-32bit-7.4-5.11.68 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1998</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1998" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1998" source="CVE"/>
    <description>
    Multiple buffer overflows in X.org libXi 1.7.1 and earlier allow X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the (1) XGetDeviceButtonMapping, (2) XIPassiveGrabDevice, and (3) XQueryDeviceState functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1998.html">CVE-2013-1998</cve>
<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214003" comment="xorg-x11-libs-7.4-8.26.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204962" comment="xorg-x11-libs-32bit-7.4-8.26.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209102" comment="xorg-x11-libs-x86-7.4-8.26.42 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214003" comment="xorg-x11-libs-7.4-8.26.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214004" comment="xorg-x11-libs-32bit-7.4-8.26.38 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1999</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-1999" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1999" source="CVE"/>
    <description>
    Buffer overflow in X.org libXvMC 1.0.7 and earlier allows X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the XvMCGetDRInfo function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1999.html">CVE-2013-1999</cve>
<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214003" comment="xorg-x11-libs-7.4-8.26.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204962" comment="xorg-x11-libs-32bit-7.4-8.26.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209102" comment="xorg-x11-libs-x86-7.4-8.26.42 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214003" comment="xorg-x11-libs-7.4-8.26.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214004" comment="xorg-x11-libs-32bit-7.4-8.26.38 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2000</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2000" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2000" source="CVE"/>
    <description>
    Multiple buffer overflows in X.org libXxf86dga 1.1.3 and earlier allow X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the (1) XDGAQueryModes and (2) XDGASetMode functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2000.html">CVE-2013-2000</cve>
<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214003" comment="xorg-x11-libs-7.4-8.26.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204962" comment="xorg-x11-libs-32bit-7.4-8.26.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209102" comment="xorg-x11-libs-x86-7.4-8.26.42 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214003" comment="xorg-x11-libs-7.4-8.26.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214004" comment="xorg-x11-libs-32bit-7.4-8.26.38 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2001</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2001" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2001" source="CVE"/>
    <description>
    Buffer overflow in X.org libXxf86vm 1.1.2 and earlier allows X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the XF86VidModeGetGammaRamp function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2001.html">CVE-2013-2001</cve>
<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214003" comment="xorg-x11-libs-7.4-8.26.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204962" comment="xorg-x11-libs-32bit-7.4-8.26.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209102" comment="xorg-x11-libs-x86-7.4-8.26.42 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214003" comment="xorg-x11-libs-7.4-8.26.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214004" comment="xorg-x11-libs-32bit-7.4-8.26.38 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2002</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2002" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2002" source="CVE"/>
    <description>
    Buffer overflow in X.org libXt 1.1.3 and earlier allows X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the _XtResourceConfigurationEH function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2002.html">CVE-2013-2002</cve>
<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/821670">SUSE bug 821670</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200503" comment="xorg-x11-libXt-7.4-1.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200504" comment="xorg-x11-libXt-32bit-7.4-1.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200505" comment="xorg-x11-libXt-x86-7.4-1.19 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200503" comment="xorg-x11-libXt-7.4-1.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200504" comment="xorg-x11-libXt-32bit-7.4-1.19 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2003</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2003" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2003" source="CVE"/>
    <description>
    Integer overflow in X.org libXcursor 1.1.13 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the _XcursorFileHeaderCreate function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2003.html">CVE-2013-2003</cve>
<bugzilla href="https://bugzilla.suse.com/1065386">SUSE bug 1065386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214003" comment="xorg-x11-libs-7.4-8.26.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204962" comment="xorg-x11-libs-32bit-7.4-8.26.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209102" comment="xorg-x11-libs-x86-7.4-8.26.42 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214003" comment="xorg-x11-libs-7.4-8.26.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214004" comment="xorg-x11-libs-32bit-7.4-8.26.38 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2004</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2004" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004" source="CVE"/>
    <description>
    The (1) GetDatabase and (2) _XimParseStringFile functions in X.org libX11 1.5.99.901 (1.6 RC1) and earlier do not restrict the recursion depth when processing directives to include files, which allows X servers to cause a denial of service (stack consumption) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2004.html">CVE-2013-2004</cve>
<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/821664">SUSE bug 821664</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200488" comment="xorg-x11-libX11-7.4-5.11.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200489" comment="xorg-x11-libX11-32bit-7.4-5.11.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200490" comment="xorg-x11-libX11-x86-7.4-5.11.11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200488" comment="xorg-x11-libX11-7.4-5.11.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200489" comment="xorg-x11-libX11-32bit-7.4-5.11.11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2005</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2005" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2005" source="CVE"/>
    <description>
    X.org libXt 1.1.3 and earlier does not check the return value of the XGetWindowProperty function, which allows X servers to trigger use of an uninitialized pointer and memory corruption via vectors related to the (1) ReqCleanup, (2) HandleSelectionEvents, (3) ReqTimedOut, (4) HandleNormal, and (5) HandleSelectionReplies functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2005.html">CVE-2013-2005</cve>
<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/821670">SUSE bug 821670</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200503" comment="xorg-x11-libXt-7.4-1.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200504" comment="xorg-x11-libXt-32bit-7.4-1.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200505" comment="xorg-x11-libXt-x86-7.4-1.19 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200503" comment="xorg-x11-libXt-7.4-1.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200504" comment="xorg-x11-libXt-32bit-7.4-1.19 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2007</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2007" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2007" source="CVE"/>
    <description>
    The qemu guest agent in Qemu 1.4.1 and earlier, as used by Xen, when started in daemon mode, uses weak permissions for certain files, which allows local users to read and write to these files.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2007.html">CVE-2013-2007</cve>
<bugzilla href="https://bugzilla.suse.com/818181">SUSE bug 818181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/818182">SUSE bug 818182</bugzilla>
<bugzilla href="https://bugzilla.suse.com/818183">SUSE bug 818183</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199554" comment="kvm-1.4.1-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204905" comment="xen-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204906" comment="xen-doc-html-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204907" comment="xen-doc-pdf-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204908" comment="xen-kmp-default-4.2.3_08_3.0.101_0.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204909" comment="xen-kmp-pae-4.2.3_08_3.0.101_0.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204910" comment="xen-libs-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204911" comment="xen-libs-32bit-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204912" comment="xen-tools-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204913" comment="xen-tools-domU-4.2.3_08-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204905" comment="xen-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204906" comment="xen-doc-html-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204907" comment="xen-doc-pdf-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204908" comment="xen-kmp-default-4.2.3_08_3.0.101_0.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204910" comment="xen-libs-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204911" comment="xen-libs-32bit-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204912" comment="xen-tools-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204913" comment="xen-tools-domU-4.2.3_08-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2016</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2016" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2016" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2016.html">CVE-2013-2016</cve>
<bugzilla href="https://bugzilla.suse.com/817593">SUSE bug 817593</bugzilla>
<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214008" comment="kvm-1.4.2-0.11 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2020</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2020" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2020" source="CVE"/>
    <description>
    Integer underflow in the cli_scanpe function in pe.c in ClamAV before 0.97.8 allows remote attackers to cause a denial of service (crash) via a skewed offset larger than the size of the PE section in a UPX packed executable, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2020.html">CVE-2013-2020</cve>
<bugzilla href="https://bugzilla.suse.com/816865">SUSE bug 816865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/899395">SUSE bug 899395</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203855" comment="clamav-0.97.8-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2021</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2021" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2021" source="CVE"/>
    <description>
    pdf.c in ClamAV 0.97.1 through 0.97.7 allows remote attackers to cause a denial of service (out-of-bounds-read) via a crafted length value in an encrypted PDF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2021.html">CVE-2013-2021</cve>
<bugzilla href="https://bugzilla.suse.com/816865">SUSE bug 816865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/899395">SUSE bug 899395</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203855" comment="clamav-0.97.8-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2061</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2061" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2061" source="CVE"/>
    <description>
    The openvpn_decrypt function in crypto.c in OpenVPN 2.3.0 and earlier, when running in UDP mode, allows remote attackers to obtain sensitive information via a timing attack involving an HMAC comparison function that does not run in constant time and a padding oracle attack on the CBC mode cipher.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2061.html">CVE-2013-2061</cve>
<bugzilla href="https://bugzilla.suse.com/843509">SUSE bug 843509</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204739" comment="openvpn-2.0.9-143.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208806" comment="openvpn-auth-pam-plugin-2.0.9-143.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2062</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2062" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2062" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXp 1.0.1 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XpGetAttributes, (2) XpGetOneAttribute, (3) XpGetPrinterList, and (4) XpQueryScreens functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2062.html">CVE-2013-2062</cve>
<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/821668">SUSE bug 821668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/880221">SUSE bug 880221</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200497" comment="xorg-x11-libXp-7.4-1.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200498" comment="xorg-x11-libXp-32bit-7.4-1.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200499" comment="xorg-x11-libXp-x86-7.4-1.18 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200497" comment="xorg-x11-libXp-7.4-1.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200498" comment="xorg-x11-libXp-32bit-7.4-1.18 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2063</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2063" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2063" source="CVE"/>
    <description>
    Integer overflow in X.org libXtst 1.2.1 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the XRecordGetContext function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2063.html">CVE-2013-2063</cve>
<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214003" comment="xorg-x11-libs-7.4-8.26.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204962" comment="xorg-x11-libs-32bit-7.4-8.26.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209102" comment="xorg-x11-libs-x86-7.4-8.26.42 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214003" comment="xorg-x11-libs-7.4-8.26.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214004" comment="xorg-x11-libs-32bit-7.4-8.26.38 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2064</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-2064" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2064" source="CVE"/>
    <description>
    Integer overflow in X.org libxcb 1.9 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the read_packet function.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2064.html">CVE-2013-2064</cve>
<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/821584">SUSE bug 821584</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199828" comment="xorg-x11-libxcb-7.4-1.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199829" comment="xorg-x11-libxcb-32bit-7.4-1.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199830" comment="xorg-x11-libxcb-x86-7.4-1.29 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2066</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2066" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2066" source="CVE"/>
    <description>
    Buffer overflow in X.org libXv 1.0.7 and earlier allows X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the XvQueryPortAttributes function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2066.html">CVE-2013-2066</cve>
<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/821671">SUSE bug 821671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/880221">SUSE bug 880221</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200506" comment="xorg-x11-libXv-7.4-1.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200507" comment="xorg-x11-libXv-32bit-7.4-1.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200508" comment="xorg-x11-libXv-x86-7.4-1.16 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200506" comment="xorg-x11-libXv-7.4-1.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200507" comment="xorg-x11-libXv-32bit-7.4-1.16 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2072</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-2072" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2072" source="CVE"/>
    <description>
    Buffer overflow in the Python bindings for the xc_vcpu_setaffinity call in Xen 4.0.x, 4.1.x, and 4.2.x allows local administrators with permissions to configure VCPU affinity to cause a denial of service (memory corruption and xend toolstack crash) and possibly gain privileges via a crafted cpumap.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2072.html">CVE-2013-2072</cve>
<bugzilla href="https://bugzilla.suse.com/813673">SUSE bug 813673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/819416">SUSE bug 819416</bugzilla>
<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199814" comment="xen-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199815" comment="xen-doc-html-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199816" comment="xen-doc-pdf-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199817" comment="xen-kmp-default-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199818" comment="xen-kmp-pae-4.2.2_04_3.0.76_0.11-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199819" comment="xen-libs-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199820" comment="xen-libs-32bit-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199821" comment="xen-tools-4.2.2_04-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199822" comment="xen-tools-domU-4.2.2_04-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2094</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-2094" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2094" source="CVE"/>
    <description>
    The perf_swevent_init function in kernel/events/core.c in the Linux kernel before 3.8.9 uses an incorrect integer data type, which allows local users to gain privileges via a crafted perf_event_open system call.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2094.html">CVE-2013-2094</cve>
<bugzilla href="https://bugzilla.suse.com/819789">SUSE bug 819789</bugzilla>
<bugzilla href="https://bugzilla.suse.com/820202">SUSE bug 820202</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2116</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2116" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2116" source="CVE"/>
    <description>
    The _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in GnuTLS 2.12.23 allows remote attackers to cause a denial of service (buffer over-read and crash) via a crafted padding length.  NOTE: this might be due to an incorrect fix for CVE-2013-0169.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2116.html">CVE-2013-2116</cve>
<bugzilla href="https://bugzilla.suse.com/821818">SUSE bug 821818</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203947" comment="gnutls-2.4.1-24.39.47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201309" comment="libgnutls-extra26-2.4.1-24.39.47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203948" comment="libgnutls26-2.4.1-24.39.47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203949" comment="libgnutls26-32bit-2.4.1-24.39.47 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203947" comment="gnutls-2.4.1-24.39.47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201309" comment="libgnutls-extra26-2.4.1-24.39.47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203948" comment="libgnutls26-2.4.1-24.39.47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204425" comment="libgnutls26-32bit-2.4.1-24.39.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208526" comment="libgnutls26-x86-2.4.1-24.39.51 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2124</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-2124" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2124" source="CVE"/>
    <description>
    Double free vulnerability in inspect-fs.c in LibguestFS 1.20.x before 1.20.7, 1.21.x, 1.22.0, and 1.23.0 allows remote attackers to cause a denial of service (crash) via empty guest files.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2124.html">CVE-2013-2124</cve>
<bugzilla href="https://bugzilla.suse.com/828006">SUSE bug 828006</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199490" comment="guestfs-data-1.20.4-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199491" comment="guestfs-tools-1.20.4-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199492" comment="guestfsd-1.20.4-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199493" comment="libguestfs0-1.20.4-0.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2146" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2146" source="CVE"/>
    <description>
    arch/x86/kernel/cpu/perf_event_intel.c in the Linux kernel before 3.8.9, when the Performance Events Subsystem is enabled, specifies an incorrect bitmask, which allows local users to cause a denial of service (general protection fault and system crash) by attempting to set a reserved bit.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2146.html">CVE-2013-2146</cve>
<bugzilla href="https://bugzilla.suse.com/825006">SUSE bug 825006</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214059" comment="kernel-default-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214060" comment="kernel-default-base-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214061" comment="kernel-default-devel-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214063" comment="kernel-source-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214064" comment="kernel-syms-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214103" comment="kernel-trace-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214104" comment="kernel-trace-base-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214065" comment="kernel-trace-devel-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2148</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2148" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2148" source="CVE"/>
    <description>
    The fill_event_metadata function in fs/notify/fanotify/fanotify_user.c in the Linux kernel through 3.9.4 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a read operation on the fanotify descriptor.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2148.html">CVE-2013-2148</cve>
<bugzilla href="https://bugzilla.suse.com/823517">SUSE bug 823517</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213736" comment="kernel-default-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213737" comment="kernel-default-base-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213738" comment="kernel-default-devel-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213740" comment="kernel-source-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213741" comment="kernel-syms-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213812" comment="kernel-trace-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213813" comment="kernel-trace-base-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213742" comment="kernel-trace-devel-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2164</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2164" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2164" source="CVE"/>
    <description>
    The mmc_ioctl_cdrom_read_data function in drivers/cdrom/cdrom.c in the Linux kernel through 3.10 allows local users to obtain sensitive information from kernel memory via a read operation on a malfunctioning CD-ROM drive.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2164.html">CVE-2013-2164</cve>
<bugzilla href="https://bugzilla.suse.com/824295">SUSE bug 824295</bugzilla>
<bugzilla href="https://bugzilla.suse.com/889071">SUSE bug 889071</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213736" comment="kernel-default-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213737" comment="kernel-default-base-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213738" comment="kernel-default-devel-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213740" comment="kernel-source-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213741" comment="kernel-syms-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213812" comment="kernel-trace-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213813" comment="kernel-trace-base-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213742" comment="kernel-trace-devel-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2174</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2174" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2174" source="CVE"/>
    <description>
    Heap-based buffer overflow in the curl_easy_unescape function in lib/escape.c in cURL and libcurl 7.7 through 7.30.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted string ending in a "%" (percent) character.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2174.html">CVE-2013-2174</cve>
<bugzilla href="https://bugzilla.suse.com/824517">SUSE bug 824517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/917692">SUSE bug 917692</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214105" comment="curl-7.19.7-1.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214106" comment="libcurl4-7.19.7-1.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204266" comment="libcurl4-32bit-7.19.7-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208452" comment="libcurl4-x86-7.19.7-1.38 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214105" comment="curl-7.19.7-1.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214106" comment="libcurl4-7.19.7-1.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214107" comment="libcurl4-32bit-7.19.7-1.28 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2186</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2186" source="CVE"/>
    <description>
    The DiskFileItem class in Apache Commons FileUpload, as used in Red Hat JBoss BRMS 5.3.1; JBoss Portal 4.3 CP07, 5.2.2, and 6.0.0; and Red Hat JBoss Web Server 1.0.2 allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2186.html">CVE-2013-2186</cve>
<bugzilla href="https://bugzilla.suse.com/846174">SUSE bug 846174</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207696" comment="jakarta-commons-fileupload-1.1.1-1.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207697" comment="jakarta-commons-fileupload-javadoc-1.1.1-1.35 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2194</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2194" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194" source="CVE"/>
    <description>
    Multiple integer overflows in the Elf parser (libelf) in Xen 4.2.x and earlier allow local guest administrators with certain permissions to have an unspecified impact via a crafted kernel.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2194.html">CVE-2013-2194</cve>
<bugzilla href="https://bugzilla.suse.com/823011">SUSE bug 823011</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204887" comment="xen-4.2.2_06-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204888" comment="xen-doc-html-4.2.2_06-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204889" comment="xen-doc-pdf-4.2.2_06-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204890" comment="xen-kmp-default-4.2.2_06_3.0.82_0.7-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204891" comment="xen-kmp-pae-4.2.2_06_3.0.82_0.7-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204892" comment="xen-libs-4.2.2_06-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204893" comment="xen-libs-32bit-4.2.2_06-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204894" comment="xen-tools-4.2.2_06-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204895" comment="xen-tools-domU-4.2.2_06-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204887" comment="xen-4.2.2_06-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204888" comment="xen-doc-html-4.2.2_06-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204889" comment="xen-doc-pdf-4.2.2_06-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204890" comment="xen-kmp-default-4.2.2_06_3.0.82_0.7-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204892" comment="xen-libs-4.2.2_06-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204893" comment="xen-libs-32bit-4.2.2_06-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204894" comment="xen-tools-4.2.2_06-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204895" comment="xen-tools-domU-4.2.2_06-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2195</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2195" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195" source="CVE"/>
    <description>
    The Elf parser (libelf) in Xen 4.2.x and earlier allow local guest administrators with certain permissions to have an unspecified impact via a crafted kernel, related to "pointer dereferences" involving unexpected calculations.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2195.html">CVE-2013-2195</cve>
<bugzilla href="https://bugzilla.suse.com/823011">SUSE bug 823011</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204887" comment="xen-4.2.2_06-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204888" comment="xen-doc-html-4.2.2_06-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204889" comment="xen-doc-pdf-4.2.2_06-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204890" comment="xen-kmp-default-4.2.2_06_3.0.82_0.7-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204891" comment="xen-kmp-pae-4.2.2_06_3.0.82_0.7-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204892" comment="xen-libs-4.2.2_06-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204893" comment="xen-libs-32bit-4.2.2_06-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204894" comment="xen-tools-4.2.2_06-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204895" comment="xen-tools-domU-4.2.2_06-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204887" comment="xen-4.2.2_06-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204888" comment="xen-doc-html-4.2.2_06-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204889" comment="xen-doc-pdf-4.2.2_06-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204890" comment="xen-kmp-default-4.2.2_06_3.0.82_0.7-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204892" comment="xen-libs-4.2.2_06-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204893" comment="xen-libs-32bit-4.2.2_06-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204894" comment="xen-tools-4.2.2_06-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204895" comment="xen-tools-domU-4.2.2_06-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2196</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2196" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the Elf parser (libelf) in Xen 4.2.x and earlier allow local guest administrators with certain permissions to have an unspecified impact via a crafted kernel, related to "other problems" that are not CVE-2013-2194 or CVE-2013-2195.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2196.html">CVE-2013-2196</cve>
<bugzilla href="https://bugzilla.suse.com/823011">SUSE bug 823011</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204887" comment="xen-4.2.2_06-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204888" comment="xen-doc-html-4.2.2_06-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204889" comment="xen-doc-pdf-4.2.2_06-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204890" comment="xen-kmp-default-4.2.2_06_3.0.82_0.7-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204891" comment="xen-kmp-pae-4.2.2_06_3.0.82_0.7-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204892" comment="xen-libs-4.2.2_06-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204893" comment="xen-libs-32bit-4.2.2_06-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204894" comment="xen-tools-4.2.2_06-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204895" comment="xen-tools-domU-4.2.2_06-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204887" comment="xen-4.2.2_06-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204888" comment="xen-doc-html-4.2.2_06-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204889" comment="xen-doc-pdf-4.2.2_06-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204890" comment="xen-kmp-default-4.2.2_06_3.0.82_0.7-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204892" comment="xen-libs-4.2.2_06-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204893" comment="xen-libs-32bit-4.2.2_06-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204894" comment="xen-tools-4.2.2_06-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204895" comment="xen-tools-domU-4.2.2_06-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2206</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2206" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2206" source="CVE"/>
    <description>
    The sctp_sf_do_5_2_4_dupcook function in net/sctp/sm_statefuns.c in the SCTP implementation in the Linux kernel before 3.8.5 does not properly handle associations during the processing of a duplicate COOKIE ECHO chunk, which allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via crafted SCTP traffic.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2206.html">CVE-2013-2206</cve>
<bugzilla href="https://bugzilla.suse.com/781018">SUSE bug 781018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/826102">SUSE bug 826102</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214126" comment="kernel-default-3.0.101-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214127" comment="kernel-default-base-3.0.101-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214128" comment="kernel-default-devel-3.0.101-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214130" comment="kernel-source-3.0.101-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214131" comment="kernel-syms-3.0.101-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214202" comment="kernel-trace-3.0.101-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214203" comment="kernel-trace-base-3.0.101-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214132" comment="kernel-trace-devel-3.0.101-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2207</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2207" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2207" source="CVE"/>
    <description>
    pt_chown in GNU C Library (aka glibc or libc6) before 2.18 does not properly check permissions for tty files, which allows local users to change the permission on the files and obtain access to arbitrary pseudo-terminals by leveraging a FUSE file system.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2207.html">CVE-2013-2207</cve>
<bugzilla href="https://bugzilla.suse.com/830257">SUSE bug 830257</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201690" comment="glibc-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204409" comment="glibc-32bit-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204410" comment="glibc-devel-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204411" comment="glibc-devel-32bit-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201691" comment="glibc-html-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204412" comment="glibc-i18ndata-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201692" comment="glibc-info-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204413" comment="glibc-locale-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204414" comment="glibc-locale-32bit-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208504" comment="glibc-locale-x86-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208505" comment="glibc-profile-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208506" comment="glibc-profile-32bit-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208507" comment="glibc-profile-x86-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208508" comment="glibc-x86-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204415" comment="nscd-2.11.3-17.87 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201690" comment="glibc-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204409" comment="glibc-32bit-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204410" comment="glibc-devel-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204411" comment="glibc-devel-32bit-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201691" comment="glibc-html-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204412" comment="glibc-i18ndata-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201692" comment="glibc-info-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204413" comment="glibc-locale-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204414" comment="glibc-locale-32bit-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208505" comment="glibc-profile-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208506" comment="glibc-profile-32bit-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204415" comment="nscd-2.11.3-17.87 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2212</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2212" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2212" source="CVE"/>
    <description>
    The vmx_set_uc_mode function in Xen 3.3 through 4.3, when disabling caches, allows local HVM guests with access to memory mapped I/O regions to cause a denial of service (CPU consumption and possibly hypervisor or guest kernel panic) via a crafted GFN range.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2212.html">CVE-2013-2212</cve>
<bugzilla href="https://bugzilla.suse.com/826718">SUSE bug 826718</bugzilla>
<bugzilla href="https://bugzilla.suse.com/831120">SUSE bug 831120</bugzilla>
<bugzilla href="https://bugzilla.suse.com/846849">SUSE bug 846849</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204914" comment="xen-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204915" comment="xen-doc-html-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204916" comment="xen-doc-pdf-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204917" comment="xen-kmp-default-4.2.4_02_3.0.101_0.15-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204918" comment="xen-kmp-pae-4.2.4_02_3.0.101_0.15-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204919" comment="xen-libs-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204920" comment="xen-libs-32bit-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204921" comment="xen-tools-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204922" comment="xen-tools-domU-4.2.4_02-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204914" comment="xen-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204915" comment="xen-doc-html-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204916" comment="xen-doc-pdf-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204917" comment="xen-kmp-default-4.2.4_02_3.0.101_0.15-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204919" comment="xen-libs-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204920" comment="xen-libs-32bit-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204921" comment="xen-tools-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204922" comment="xen-tools-domU-4.2.4_02-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2232</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2232" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2232" source="CVE"/>
    <description>
    The ip6_sk_dst_check function in net/ipv6/ip6_output.c in the Linux kernel before 3.10 allows local users to cause a denial of service (system crash) by using an AF_INET6 socket for a connection to an IPv4 interface.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2232.html">CVE-2013-2232</cve>
<bugzilla href="https://bugzilla.suse.com/827750">SUSE bug 827750</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213736" comment="kernel-default-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213737" comment="kernel-default-base-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213738" comment="kernel-default-devel-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213740" comment="kernel-source-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213741" comment="kernel-syms-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213812" comment="kernel-trace-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213813" comment="kernel-trace-base-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213742" comment="kernel-trace-devel-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2234</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2234" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2234" source="CVE"/>
    <description>
    The (1) key_notify_sa_flush and (2) key_notify_policy_flush functions in net/key/af_key.c in the Linux kernel before 3.10 do not initialize certain structure members, which allows local users to obtain sensitive information from kernel heap memory by reading a broadcast message from the notify interface of an IPSec key_socket.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2234.html">CVE-2013-2234</cve>
<bugzilla href="https://bugzilla.suse.com/827749">SUSE bug 827749</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213736" comment="kernel-default-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213737" comment="kernel-default-base-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213738" comment="kernel-default-devel-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213740" comment="kernel-source-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213741" comment="kernel-syms-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213812" comment="kernel-trace-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213813" comment="kernel-trace-base-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213742" comment="kernel-trace-devel-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2236</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2236" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2236" source="CVE"/>
    <description>
    Stack-based buffer overflow in the new_msg_lsa_change_notify function in the OSPFD API (ospf_api.c) in Quagga before 0.99.22.2, when --enable-opaque-lsa and the -a command line option are used, allows remote attackers to cause a denial of service (crash) via a large LSA.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2236.html">CVE-2013-2236</cve>
<bugzilla href="https://bugzilla.suse.com/828117">SUSE bug 828117</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200428" comment="quagga-0.99.15-0.14 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2237</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2237" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2237" source="CVE"/>
    <description>
    The key_notify_policy_flush function in net/key/af_key.c in the Linux kernel before 3.9 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel heap memory by reading a broadcast message from the notify_policy interface of an IPSec key_socket.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2237.html">CVE-2013-2237</cve>
<bugzilla href="https://bugzilla.suse.com/828119">SUSE bug 828119</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213736" comment="kernel-default-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213737" comment="kernel-default-base-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213738" comment="kernel-default-devel-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213740" comment="kernel-source-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213741" comment="kernel-syms-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213812" comment="kernel-trace-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213813" comment="kernel-trace-base-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213742" comment="kernel-trace-devel-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2266</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-2266" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2266" source="CVE"/>
    <description>
    libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2266.html">CVE-2013-2266</cve>
<bugzilla href="https://bugzilla.suse.com/811876">SUSE bug 811876</bugzilla>
<bugzilla href="https://bugzilla.suse.com/811934">SUSE bug 811934</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199401" comment="dhcp-4.2.4.P2-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199402" comment="dhcp-client-4.2.4.P2-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199403" comment="dhcp-relay-4.2.4.P2-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199404" comment="dhcp-server-4.2.4.P2-0.16 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2383</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2383" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2383" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-1569, CVE-2013-2384, and CVE-2013-2420. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "handling of [a] glyph table" in the International Components for Unicode (ICU) Layout Engine before 51.2.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2383.html">CVE-2013-2383</cve>
<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
<bugzilla href="https://bugzilla.suse.com/932310">SUSE bug 932310</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213651" comment="java-1_6_0-ibm-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213652" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213653" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213655" comment="java-1_7_0-ibm-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213657" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213651" comment="java-1_6_0-ibm-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213652" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213653" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213654" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213655" comment="java-1_7_0-ibm-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213656" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213657" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213658" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.2-0.6 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2384</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2384" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2384" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-1569, CVE-2013-2383, and CVE-2013-2420. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "font layout" in the International Components for Unicode (ICU) Layout Engine before 51.2.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2384.html">CVE-2013-2384</cve>
<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
<bugzilla href="https://bugzilla.suse.com/932310">SUSE bug 932310</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213651" comment="java-1_6_0-ibm-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213652" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213653" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213655" comment="java-1_7_0-ibm-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213657" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213651" comment="java-1_6_0-ibm-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213652" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213653" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213654" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213655" comment="java-1_7_0-ibm-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213656" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213657" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213658" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.2-0.6 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132394" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2394</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2394" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2394" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, 5.0 Update 41 and earlier, and JavaFX 2.2.7 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-2432 and CVE-2013-1491.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2394.html">CVE-2013-2394</cve>
<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213651" comment="java-1_6_0-ibm-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213652" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213653" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213655" comment="java-1_7_0-ibm-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213657" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213651" comment="java-1_6_0-ibm-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213652" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213653" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213654" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213655" comment="java-1_7_0-ibm-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213656" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213657" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213658" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.2-0.6 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2400</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2400" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2400" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier allows remote attackers to affect integrity via unknown vectors related to Deployment, a different vulnerability than CVE-2013-3744.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2400.html">CVE-2013-2400</cve>
<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213832" comment="java-1_7_0-ibm-alsa-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213834" comment="java-1_7_0-ibm-plugin-1.7.0_sr5.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2407</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2407" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2407" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality and availability via unknown vectors related to Libraries.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "XML security and the class loader."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2407.html">CVE-2013-2407</cve>
<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213830" comment="java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213832" comment="java-1_7_0-ibm-alsa-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213834" comment="java-1_7_0-ibm-plugin-1.7.0_sr5.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2412</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2412" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2412" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Serviceability.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to insufficient indication of an SSL connection failure by JConsole, related to RMI connection dialog box.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2412.html">CVE-2013-2412</cve>
<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213830" comment="java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2417</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2417" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2417" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect availability via unknown vectors related to Networking.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an information leak involving InetAddress serialization. CVE has not investigated the apparent discrepancy between vendor reports regarding the impact of this issue.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2417.html">CVE-2013-2417</cve>
<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213651" comment="java-1_6_0-ibm-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213652" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213653" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213655" comment="java-1_7_0-ibm-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213657" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213651" comment="java-1_6_0-ibm-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213652" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213653" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213654" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213655" comment="java-1_7_0-ibm-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213656" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213657" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213658" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.2-0.6 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2418</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2418" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2418" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2418.html">CVE-2013-2418</cve>
<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213651" comment="java-1_6_0-ibm-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213652" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213653" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213655" comment="java-1_7_0-ibm-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213657" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213651" comment="java-1_6_0-ibm-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213652" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213653" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213654" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213655" comment="java-1_7_0-ibm-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213656" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213657" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213658" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.2-0.6 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2419</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2419" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2419" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect availability via unknown vectors related to 2D.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "font processing errors" in the International Components for Unicode (ICU) Layout Engine before 51.2.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2419.html">CVE-2013-2419</cve>
<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213651" comment="java-1_6_0-ibm-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213652" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213653" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213655" comment="java-1_7_0-ibm-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213657" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213651" comment="java-1_6_0-ibm-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213652" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213653" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213654" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213655" comment="java-1_7_0-ibm-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213656" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213657" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213658" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.2-0.6 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2420</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2420" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to insufficient "validation of images" in share/native/sun/awt/image/awt_ImageRep.c, possibly involving offsets.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2420.html">CVE-2013-2420</cve>
<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213651" comment="java-1_6_0-ibm-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213652" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213653" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213655" comment="java-1_7_0-ibm-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213657" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213651" comment="java-1_6_0-ibm-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213652" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213653" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213654" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213655" comment="java-1_7_0-ibm-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213656" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213657" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213658" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.2-0.6 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2422" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2422" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper method-invocation restrictions by the MethodUtil trampoline class, which allows remote attackers to bypass the Java sandbox.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2422.html">CVE-2013-2422</cve>
<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213651" comment="java-1_6_0-ibm-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213652" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213653" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213655" comment="java-1_7_0-ibm-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213657" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213651" comment="java-1_6_0-ibm-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213652" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213653" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213654" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213655" comment="java-1_7_0-ibm-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213656" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213657" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213658" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.2-0.6 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2424</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2424" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2424" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality via vectors related to JMX. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "insufficient class access checks" when "creating new instances" using MBeanInstantiator.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2424.html">CVE-2013-2424</cve>
<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213651" comment="java-1_6_0-ibm-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213652" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213653" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213655" comment="java-1_7_0-ibm-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213657" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213651" comment="java-1_6_0-ibm-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213652" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213653" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213654" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213655" comment="java-1_7_0-ibm-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213656" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213657" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213658" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.2-0.6 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2429</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2429" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2429" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to ImageIO.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "JPEGImageWriter state corruption" when using native code, which triggers memory corruption.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2429.html">CVE-2013-2429</cve>
<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213651" comment="java-1_6_0-ibm-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213652" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213653" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213655" comment="java-1_7_0-ibm-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213657" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213651" comment="java-1_6_0-ibm-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213652" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213653" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213654" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213655" comment="java-1_7_0-ibm-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213656" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213657" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213658" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.2-0.6 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2430</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2430" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2430" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; JavaFX 2.2.7 and earlier; and OpenJDK 6 and 7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to ImageIO. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "JPEGImageReader state corruption" when using native code.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2430.html">CVE-2013-2430</cve>
<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213651" comment="java-1_6_0-ibm-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213652" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213653" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213655" comment="java-1_7_0-ibm-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213657" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213651" comment="java-1_6_0-ibm-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213652" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213653" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213654" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213655" comment="java-1_7_0-ibm-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213656" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213657" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213658" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.2-0.6 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2432</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2432" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2432" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, 5.0 Update 41 and earlier, and JavaFX 2.2.7 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-2394 and CVE-2013-1491.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2432.html">CVE-2013-2432</cve>
<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213651" comment="java-1_6_0-ibm-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213652" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213653" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213655" comment="java-1_7_0-ibm-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213657" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213651" comment="java-1_6_0-ibm-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213652" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213653" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213654" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213655" comment="java-1_7_0-ibm-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213656" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213657" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213658" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.2-0.6 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2433</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2433" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2433" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier allows remote attackers to affect integrity via unknown vectors related to Deployment, a different vulnerability than CVE-2013-1540.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2433.html">CVE-2013-2433</cve>
<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213651" comment="java-1_6_0-ibm-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213652" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213653" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213655" comment="java-1_7_0-ibm-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213657" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213651" comment="java-1_6_0-ibm-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213652" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213653" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213654" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213655" comment="java-1_7_0-ibm-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213656" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213657" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213658" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.2-0.6 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2435</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2435" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2435" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2440.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2435.html">CVE-2013-2435</cve>
<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213651" comment="java-1_6_0-ibm-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213652" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213653" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213655" comment="java-1_7_0-ibm-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213657" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213651" comment="java-1_6_0-ibm-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213652" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213653" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213654" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213655" comment="java-1_7_0-ibm-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213656" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213657" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213658" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.2-0.6 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2437</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2437" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2437" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect confidentiality via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2437.html">CVE-2013-2437</cve>
<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213830" comment="java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2440</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2440" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2440" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2435.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2440.html">CVE-2013-2440</cve>
<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213651" comment="java-1_6_0-ibm-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213652" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213653" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213655" comment="java-1_7_0-ibm-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213657" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213651" comment="java-1_6_0-ibm-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213652" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213653" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213654" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213655" comment="java-1_7_0-ibm-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213656" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213657" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213658" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.2-0.6 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2442</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2442" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2442" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2466 and CVE-2013-2468.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2442.html">CVE-2013-2442</cve>
<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213830" comment="java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213832" comment="java-1_7_0-ibm-alsa-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213834" comment="java-1_7_0-ibm-plugin-1.7.0_sr5.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2443</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2443" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2443" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Libraries, a different vulnerability than CVE-2013-2452 and CVE-2013-2455.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is due to an incorrect "checking order" within the AccessControlContext class.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2443.html">CVE-2013-2443</cve>
<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213830" comment="java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2444</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2444" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2444" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier; JavaFX 2.2.21 and earlier; and OpenJDK 7 allows remote attackers to affect availability via vectors related to AWT.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue does not "properly manage and restrict certain resources related to the processing of fonts," possibly involving temporary files.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2444.html">CVE-2013-2444</cve>
<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213830" comment="java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2446</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2446" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2446" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via vectors related to CORBA. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue does not properly enforce access restrictions for CORBA output streams.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2446.html">CVE-2013-2446</cve>
<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213830" comment="java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2447</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2447" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2447" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Networking.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to obtain a socket's local address via vectors involving inconsistencies between Socket.getLocalAddress and InetAddress.getLocalHost.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2447.html">CVE-2013-2447</cve>
<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213830" comment="java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2448</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2448" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2448" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to insufficient "access restrictions" and "robustness of sound classes."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2448.html">CVE-2013-2448</cve>
<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213830" comment="java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213832" comment="java-1_7_0-ibm-alsa-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213834" comment="java-1_7_0-ibm-plugin-1.7.0_sr5.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2450</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2450" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2450" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect availability via unknown vectors related to Serialization.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper handling of circular references in ObjectStreamClass.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2450.html">CVE-2013-2450</cve>
<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213830" comment="java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2451</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2451" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2451" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier, and OpenJDK 7, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Networking.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper enforcement of exclusive port binds when running on Windows, which allows attackers to bind to ports that are already in use.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2451.html">CVE-2013-2451</cve>
<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213830" comment="java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2452</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2452" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2452" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Libraries, a different vulnerability than CVE-2013-2443 and CVE-2013-2455.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "network address handling in virtual machine identifiers" and the lack of "unique and unpredictable IDs" in the java.rmi.dgc.VMID class.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2452.html">CVE-2013-2452</cve>
<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213830" comment="java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2453</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2453" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2453" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect integrity via vectors related to JMX.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is due to a missing check for "package access" by the MBeanServer Introspector.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2453.html">CVE-2013-2453</cve>
<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213830" comment="java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213832" comment="java-1_7_0-ibm-alsa-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213834" comment="java-1_7_0-ibm-plugin-1.7.0_sr5.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2454</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2454" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2454" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality and integrity via vectors related to JDBC.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue does not properly restrict access to certain class packages in the SerialJavaObject class, which allows remote attackers to bypass the Java sandbox.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2454.html">CVE-2013-2454</cve>
<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213830" comment="java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213832" comment="java-1_7_0-ibm-alsa-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213834" comment="java-1_7_0-ibm-plugin-1.7.0_sr5.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2455</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2455" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2455" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Libraries, a different vulnerability than CVE-2013-2443 and CVE-2013-2452.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect access checks by the (1) getEnclosingClass, (2) getEnclosingMethod, and (3) getEnclosingConstructor methods.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2455.html">CVE-2013-2455</cve>
<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213830" comment="java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2456</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2456" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2456" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Serialization.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper access checks for subclasses in the ObjectOutputStream class.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2456.html">CVE-2013-2456</cve>
<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213830" comment="java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213832" comment="java-1_7_0-ibm-alsa-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213834" comment="java-1_7_0-ibm-plugin-1.7.0_sr5.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2457</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2457" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2457" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via vectors related to JMX.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is due to an incorrect implementation of "certain class checks" that allows remote attackers to bypass intended class restrictions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2457.html">CVE-2013-2457</cve>
<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213830" comment="java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213832" comment="java-1_7_0-ibm-alsa-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213834" comment="java-1_7_0-ibm-plugin-1.7.0_sr5.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2458</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2458" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2458" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via "an error related to method handles."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2458.html">CVE-2013-2458</cve>
<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213832" comment="java-1_7_0-ibm-alsa-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213834" comment="java-1_7_0-ibm-plugin-1.7.0_sr5.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2459</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2459" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2459" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "integer overflow checks."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2459.html">CVE-2013-2459</cve>
<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213830" comment="java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213832" comment="java-1_7_0-ibm-alsa-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213834" comment="java-1_7_0-ibm-plugin-1.7.0_sr5.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2460</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2460" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2460" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Serviceability.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "insufficient access checks" in the tracing component.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2460.html">CVE-2013-2460</cve>
<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213832" comment="java-1_7_0-ibm-alsa-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213834" comment="java-1_7_0-ibm-plugin-1.7.0_sr5.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2462</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2462" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2462" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2462.html">CVE-2013-2462</cve>
<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213832" comment="java-1_7_0-ibm-alsa-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213834" comment="java-1_7_0-ibm-plugin-1.7.0_sr5.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2463</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2463" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2463" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect image attribute verification" in 2D.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2463.html">CVE-2013-2463</cve>
<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213830" comment="java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213832" comment="java-1_7_0-ibm-alsa-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213834" comment="java-1_7_0-ibm-plugin-1.7.0_sr5.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2464</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2464" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2464" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-2463, CVE-2013-2465, CVE-2013-2469, CVE-2013-2470, CVE-2013-2471, CVE-2013-2472, and CVE-2013-2473.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2464.html">CVE-2013-2464</cve>
<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213830" comment="java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213832" comment="java-1_7_0-ibm-alsa-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213834" comment="java-1_7_0-ibm-plugin-1.7.0_sr5.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2465</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2465" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2465" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect image channel verification" in 2D.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2465.html">CVE-2013-2465</cve>
<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213830" comment="java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213832" comment="java-1_7_0-ibm-alsa-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213834" comment="java-1_7_0-ibm-plugin-1.7.0_sr5.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2466</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2466" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2466" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2442 and CVE-2013-2468.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2466.html">CVE-2013-2466</cve>
<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213830" comment="java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213832" comment="java-1_7_0-ibm-alsa-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213834" comment="java-1_7_0-ibm-plugin-1.7.0_sr5.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2468</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2468" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2468" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2442 and CVE-2013-2466.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2468.html">CVE-2013-2468</cve>
<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213830" comment="java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213832" comment="java-1_7_0-ibm-alsa-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213834" comment="java-1_7_0-ibm-plugin-1.7.0_sr5.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2469</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2469" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2469" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect image layout verification" in 2D.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2469.html">CVE-2013-2469</cve>
<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213830" comment="java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213832" comment="java-1_7_0-ibm-alsa-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213834" comment="java-1_7_0-ibm-plugin-1.7.0_sr5.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2470</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2470" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2470" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "ImagingLib byte lookup processing."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2470.html">CVE-2013-2470</cve>
<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213830" comment="java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213832" comment="java-1_7_0-ibm-alsa-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213834" comment="java-1_7_0-ibm-plugin-1.7.0_sr5.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2471</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2471" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2471" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect IntegerComponentRaster size checks."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2471.html">CVE-2013-2471</cve>
<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213830" comment="java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213832" comment="java-1_7_0-ibm-alsa-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213834" comment="java-1_7_0-ibm-plugin-1.7.0_sr5.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2472</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2472" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2472" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect ShortBandedRaster size checks" in 2D.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2472.html">CVE-2013-2472</cve>
<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213830" comment="java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213832" comment="java-1_7_0-ibm-alsa-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213834" comment="java-1_7_0-ibm-plugin-1.7.0_sr5.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2473</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2473" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2473" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect ByteBandedRaster size checks" in 2D.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2473.html">CVE-2013-2473</cve>
<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213830" comment="java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213832" comment="java-1_7_0-ibm-alsa-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213834" comment="java-1_7_0-ibm-plugin-1.7.0_sr5.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2475</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-2475" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2475" source="CVE"/>
    <description>
    The TCP dissector in Wireshark 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2475.html">CVE-2013-2475</cve>
<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2476</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-2476" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2476" source="CVE"/>
    <description>
    The dissect_hartip function in epan/dissectors/packet-hartip.c in the HART/IP dissector in Wireshark 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (infinite loop) via a packet with a header that is too short.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2476.html">CVE-2013-2476</cve>
<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2477</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-2477" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2477" source="CVE"/>
    <description>
    The CSN.1 dissector in Wireshark 1.8.x before 1.8.6 does not properly manage function pointers, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2477.html">CVE-2013-2477</cve>
<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2478</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-2478" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2478" source="CVE"/>
    <description>
    The dissect_server_info function in epan/dissectors/packet-ms-mms.c in the MS-MMS dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 does not properly manage string lengths, which allows remote attackers to cause a denial of service (application crash) via a malformed packet that (1) triggers an integer overflow or (2) has embedded '\0' characters in a string.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2478.html">CVE-2013-2478</cve>
<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2479</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-2479" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2479" source="CVE"/>
    <description>
    The dissect_mpls_echo_tlv_dd_map function in epan/dissectors/packet-mpls-echo.c in the MPLS Echo dissector in Wireshark 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (infinite loop) via invalid Sub-tlv data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2479.html">CVE-2013-2479</cve>
<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2480</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-2480" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2480" source="CVE"/>
    <description>
    The RTPS and RTPS2 dissectors in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allow remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2480.html">CVE-2013-2480</cve>
<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2481</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-2481" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2481" source="CVE"/>
    <description>
    Integer signedness error in the dissect_mount_dirpath_call function in epan/dissectors/packet-mount.c in the Mount dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6, when nfs_file_name_snooping is enabled, allows remote attackers to cause a denial of service (application crash) via a negative length value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2481.html">CVE-2013-2481</cve>
<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2482</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-2482" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2482" source="CVE"/>
    <description>
    The AMPQ dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2482.html">CVE-2013-2482</cve>
<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2483</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-2483" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2483" source="CVE"/>
    <description>
    The acn_add_dmp_data function in epan/dissectors/packet-acn.c in the ACN dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via an invalid count value in ACN_DMP_ADT_D_RE DMP data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2483.html">CVE-2013-2483</cve>
<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-2484" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2484" source="CVE"/>
    <description>
    The CIMD dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2484.html">CVE-2013-2484</cve>
<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-2485" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2485" source="CVE"/>
    <description>
    The FCSP dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2485.html">CVE-2013-2485</cve>
<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2486</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2486" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2486" source="CVE"/>
    <description>
    The dissect_diagnosticrequest function in epan/dissectors/packet-reload.c in the REsource LOcation And Discovery (aka RELOAD) dissector in Wireshark 1.8.x before 1.8.6 uses an incorrect integer data type, which allows remote attackers to cause a denial of service (infinite loop) via crafted integer values in a packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2486.html">CVE-2013-2486</cve>
<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/820566">SUSE bug 820566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/820973">SUSE bug 820973</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214205" comment="wireshark-1.8.8-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2487</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2487" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2487" source="CVE"/>
    <description>
    epan/dissectors/packet-reload.c in the REsource LOcation And Discovery (aka RELOAD) dissector in Wireshark 1.8.x before 1.8.6 uses incorrect integer data types, which allows remote attackers to cause a denial of service (infinite loop) via crafted integer values in a packet, related to the (1) dissect_icecandidates, (2) dissect_kinddata, (3) dissect_nodeid_list, (4) dissect_storeans, (5) dissect_storereq, (6) dissect_storeddataspecifier, (7) dissect_fetchreq, (8) dissect_findans, (9) dissect_diagnosticinfo, (10) dissect_diagnosticresponse, (11) dissect_reload_messagecontents, and (12) dissect_reload_message functions, a different vulnerability than CVE-2013-2486.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2487.html">CVE-2013-2487</cve>
<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/820566">SUSE bug 820566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/820973">SUSE bug 820973</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214205" comment="wireshark-1.8.8-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2488</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-2488" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2488" source="CVE"/>
    <description>
    The DTLS dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 does not validate the fragment offset before invoking the reassembly state machine, which allows remote attackers to cause a denial of service (application crash) via a large offset value that triggers write access to an invalid memory location.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2488.html">CVE-2013-2488</cve>
<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199812" comment="wireshark-1.8.6-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2765</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2765" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2765" source="CVE"/>
    <description>
    The ModSecurity module before 2.7.4 for the Apache HTTP Server allows remote attackers to cause a denial of service (NULL pointer dereference, process crash, and disk consumption) via a POST request with a large body and a crafted Content-Type header.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2765.html">CVE-2013-2765</cve>
<bugzilla href="https://bugzilla.suse.com/822664">SUSE bug 822664</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201235" comment="apache2-mod_security2-2.7.1-0.2.14 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2776</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-2776" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2776" source="CVE"/>
    <description>
    sudo 1.3.5 through 1.7.10p5 and 1.8.0 through 1.8.6p6, when running on systems without /proc or the sysctl function with the tty_tickets option enabled, does not properly validate the controlling terminal device, which allows local users with sudo permissions to hijack the authorization of another terminal via vectors related to connecting to the standard input, output, and error file descriptors of another terminal.  NOTE: this is one of three closely-related vulnerabilities that were originally assigned CVE-2013-1776, but they have been SPLIT because of different affected versions.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2776.html">CVE-2013-2776</cve>
<bugzilla href="https://bugzilla.suse.com/806921">SUSE bug 806921</bugzilla>
<bugzilla href="https://bugzilla.suse.com/817349">SUSE bug 817349</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199787" comment="sudo-1.7.6p2-0.17 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2777</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-2777" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2777" source="CVE"/>
    <description>
    sudo before 1.7.10p5 and 1.8.x before 1.8.6p6, when the tty_tickets option is enabled, does not properly validate the controlling terminal device, which allows local users with sudo permissions to hijack the authorization of another terminal via vectors related to a session without a controlling terminal device and connecting to the standard input, output, and error file descriptors of another terminal.  NOTE: this is one of three closely-related vulnerabilities that were originally assigned CVE-2013-1776, but they have been SPLIT because of different affected versions.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2777.html">CVE-2013-2777</cve>
<bugzilla href="https://bugzilla.suse.com/806921">SUSE bug 806921</bugzilla>
<bugzilla href="https://bugzilla.suse.com/817349">SUSE bug 817349</bugzilla>
<bugzilla href="https://bugzilla.suse.com/817350">SUSE bug 817350</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199787" comment="sudo-1.7.6p2-0.17 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2850</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2013-2850" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2850" source="CVE"/>
    <description>
    Heap-based buffer overflow in the iscsi_add_notunderstood_response function in drivers/target/iscsi/iscsi_target_parameters.c in the iSCSI target subsystem in the Linux kernel through 3.9.4 allows remote attackers to cause a denial of service (memory corruption and OOPS) or possibly execute arbitrary code via a long key that is not properly handled during construction of an error-response packet.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2850.html">CVE-2013-2850</cve>
<bugzilla href="https://bugzilla.suse.com/821560">SUSE bug 821560</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199526" comment="kernel-default-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199527" comment="kernel-default-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199528" comment="kernel-default-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199529" comment="kernel-default-man-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199530" comment="kernel-pae-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199531" comment="kernel-pae-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199532" comment="kernel-pae-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199533" comment="kernel-ppc64-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199534" comment="kernel-ppc64-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199535" comment="kernel-ppc64-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199536" comment="kernel-source-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199537" comment="kernel-syms-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199538" comment="kernel-trace-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199539" comment="kernel-trace-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199540" comment="kernel-trace-devel-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199541" comment="kernel-xen-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199542" comment="kernel-xen-base-3.0.76-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199543" comment="kernel-xen-devel-3.0.76-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2851</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2851" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2851" source="CVE"/>
    <description>
    Format string vulnerability in the register_disk function in block/genhd.c in the Linux kernel through 3.9.4 allows local users to gain privileges by leveraging root access and writing format string specifiers to /sys/module/md_mod/parameters/new_array in order to create a crafted /dev/md device name.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2851.html">CVE-2013-2851</cve>
<bugzilla href="https://bugzilla.suse.com/822575">SUSE bug 822575</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213736" comment="kernel-default-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213737" comment="kernel-default-base-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213738" comment="kernel-default-devel-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213740" comment="kernel-source-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213741" comment="kernel-syms-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213812" comment="kernel-trace-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213813" comment="kernel-trace-base-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213742" comment="kernel-trace-devel-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2852</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2852" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2852" source="CVE"/>
    <description>
    Format string vulnerability in the b43_request_firmware function in drivers/net/wireless/b43/main.c in the Broadcom B43 wireless driver in the Linux kernel through 3.9.4 allows local users to gain privileges by leveraging root access and including format string specifiers in an fwpostfix modprobe parameter, leading to improper construction of an error message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2852.html">CVE-2013-2852</cve>
<bugzilla href="https://bugzilla.suse.com/822579">SUSE bug 822579</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213736" comment="kernel-default-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213737" comment="kernel-default-base-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213738" comment="kernel-default-devel-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213740" comment="kernel-source-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213741" comment="kernel-syms-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213812" comment="kernel-trace-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213813" comment="kernel-trace-base-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213742" comment="kernel-trace-devel-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2877</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2877" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2877" source="CVE"/>
    <description>
    parser.c in libxml2 before 2.9.0, as used in Google Chrome before 28.0.1500.71 and other products, allows remote attackers to cause a denial of service (out-of-bounds read) via a document that ends abruptly, related to the lack of certain checks for the XML_PARSER_EOF state.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2877.html">CVE-2013-2877</cve>
<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/828893">SUSE bug 828893</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829077">SUSE bug 829077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/854869">SUSE bug 854869</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877506">SUSE bug 877506</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204037" comment="libxml2-2.7.6-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200343" comment="libxml2-32bit-2.7.6-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207872" comment="libxml2-doc-2.7.6-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204039" comment="libxml2-python-2.7.6-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200345" comment="libxml2-x86-2.7.6-0.31 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204037" comment="libxml2-2.7.6-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204038" comment="libxml2-32bit-2.7.6-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207872" comment="libxml2-doc-2.7.6-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204039" comment="libxml2-python-2.7.6-0.25 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2889</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2889" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2889" source="CVE"/>
    <description>
    drivers/hid/hid-zpff.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_ZEROPLUS is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2889.html">CVE-2013-2889</cve>
<bugzilla href="https://bugzilla.suse.com/835839">SUSE bug 835839</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213307" comment="kernel-bigsmp-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213308" comment="kernel-bigsmp-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213244" comment="kernel-bigsmp-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213245" comment="kernel-default-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213246" comment="kernel-default-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213247" comment="kernel-default-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264361" comment="kernel-default-man-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213309" comment="kernel-ec2-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213310" comment="kernel-ec2-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213311" comment="kernel-ec2-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264348" comment="kernel-pae-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264349" comment="kernel-pae-base-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264350" comment="kernel-pae-devel-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264362" comment="kernel-ppc64-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264363" comment="kernel-ppc64-base-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264364" comment="kernel-ppc64-devel-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213249" comment="kernel-source-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213250" comment="kernel-syms-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213312" comment="kernel-trace-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213313" comment="kernel-trace-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213251" comment="kernel-trace-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213252" comment="kernel-xen-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213253" comment="kernel-xen-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213254" comment="kernel-xen-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213256" comment="xen-kmp-default-4.2.5_02_3.0.101_0.46-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264352" comment="xen-kmp-pae-4.2.5_02_3.0.101_0.42-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2893</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2893" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2893" source="CVE"/>
    <description>
    The Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_LOGITECH_FF, CONFIG_LOGIG940_FF, or CONFIG_LOGIWHEELS_FF is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device, related to (1) drivers/hid/hid-lgff.c, (2) drivers/hid/hid-lg3ff.c, and (3) drivers/hid/hid-lg4ff.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2893.html">CVE-2013-2893</cve>
<bugzilla href="https://bugzilla.suse.com/835839">SUSE bug 835839</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213307" comment="kernel-bigsmp-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213308" comment="kernel-bigsmp-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213244" comment="kernel-bigsmp-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213245" comment="kernel-default-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213246" comment="kernel-default-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213247" comment="kernel-default-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264361" comment="kernel-default-man-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213309" comment="kernel-ec2-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213310" comment="kernel-ec2-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213311" comment="kernel-ec2-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264348" comment="kernel-pae-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264349" comment="kernel-pae-base-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264350" comment="kernel-pae-devel-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264362" comment="kernel-ppc64-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264363" comment="kernel-ppc64-base-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264364" comment="kernel-ppc64-devel-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213249" comment="kernel-source-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213250" comment="kernel-syms-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213312" comment="kernel-trace-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213313" comment="kernel-trace-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213251" comment="kernel-trace-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213252" comment="kernel-xen-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213253" comment="kernel-xen-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213254" comment="kernel-xen-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213256" comment="xen-kmp-default-4.2.5_02_3.0.101_0.46-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264352" comment="xen-kmp-pae-4.2.5_02_3.0.101_0.42-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2897</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2897" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2897" source="CVE"/>
    <description>
    Multiple array index errors in drivers/hid/hid-multitouch.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_MULTITOUCH is enabled, allow physically proximate attackers to cause a denial of service (heap memory corruption, or NULL pointer dereference and OOPS) via a crafted device.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2897.html">CVE-2013-2897</cve>
<bugzilla href="https://bugzilla.suse.com/835839">SUSE bug 835839</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213307" comment="kernel-bigsmp-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213308" comment="kernel-bigsmp-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213244" comment="kernel-bigsmp-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213245" comment="kernel-default-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213246" comment="kernel-default-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213247" comment="kernel-default-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264361" comment="kernel-default-man-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213309" comment="kernel-ec2-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213310" comment="kernel-ec2-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213311" comment="kernel-ec2-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264348" comment="kernel-pae-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264349" comment="kernel-pae-base-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264350" comment="kernel-pae-devel-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264362" comment="kernel-ppc64-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264363" comment="kernel-ppc64-base-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264364" comment="kernel-ppc64-devel-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213249" comment="kernel-source-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213250" comment="kernel-syms-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213312" comment="kernel-trace-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213313" comment="kernel-trace-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213251" comment="kernel-trace-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213252" comment="kernel-xen-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213253" comment="kernel-xen-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213254" comment="kernel-xen-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213256" comment="xen-kmp-default-4.2.5_02_3.0.101_0.46-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264352" comment="xen-kmp-pae-4.2.5_02_3.0.101_0.42-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2899</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2899" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2899" source="CVE"/>
    <description>
    drivers/hid/hid-picolcd_core.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_PICOLCD is enabled, allows physically proximate attackers to cause a denial of service (NULL pointer dereference and OOPS) via a crafted device.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2899.html">CVE-2013-2899</cve>
<bugzilla href="https://bugzilla.suse.com/835839">SUSE bug 835839</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213307" comment="kernel-bigsmp-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213308" comment="kernel-bigsmp-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213244" comment="kernel-bigsmp-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213245" comment="kernel-default-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213246" comment="kernel-default-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213247" comment="kernel-default-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264361" comment="kernel-default-man-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213309" comment="kernel-ec2-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213310" comment="kernel-ec2-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213311" comment="kernel-ec2-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264348" comment="kernel-pae-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264349" comment="kernel-pae-base-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264350" comment="kernel-pae-devel-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264362" comment="kernel-ppc64-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264363" comment="kernel-ppc64-base-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264364" comment="kernel-ppc64-devel-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213249" comment="kernel-source-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213250" comment="kernel-syms-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213312" comment="kernel-trace-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213313" comment="kernel-trace-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213251" comment="kernel-trace-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213252" comment="kernel-xen-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213253" comment="kernel-xen-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213254" comment="kernel-xen-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213256" comment="xen-kmp-default-4.2.5_02_3.0.101_0.46-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264352" comment="xen-kmp-pae-4.2.5_02_3.0.101_0.42-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2929</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2929" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2929" source="CVE"/>
    <description>
    The Linux kernel before 3.12.2 does not properly use the get_dumpable function, which allows local users to bypass intended ptrace restrictions or obtain sensitive information from IA64 scratch registers via a crafted application, related to kernel/ptrace.c and arch/ia64/include/asm/processor.h.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2929.html">CVE-2013-2929</cve>
<bugzilla href="https://bugzilla.suse.com/824295">SUSE bug 824295</bugzilla>
<bugzilla href="https://bugzilla.suse.com/847652">SUSE bug 847652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/889071">SUSE bug 889071</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213024" comment="kernel-default-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213025" comment="kernel-default-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213026" comment="kernel-default-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213028" comment="kernel-source-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213029" comment="kernel-syms-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213088" comment="kernel-trace-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213089" comment="kernel-trace-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213030" comment="kernel-trace-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2930</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2930" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2930" source="CVE"/>
    <description>
    The perf_trace_event_perm function in kernel/trace/trace_event_perf.c in the Linux kernel before 3.12.2 does not properly restrict access to the perf subsystem, which allows local users to enable function tracing via a crafted application.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2930.html">CVE-2013-2930</cve>
<bugzilla href="https://bugzilla.suse.com/849362">SUSE bug 849362</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214059" comment="kernel-default-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214060" comment="kernel-default-base-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214061" comment="kernel-default-devel-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214063" comment="kernel-source-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214064" comment="kernel-syms-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214103" comment="kernel-trace-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214104" comment="kernel-trace-base-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214065" comment="kernel-trace-devel-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2944</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-2944" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2944" source="CVE"/>
    <description>
    strongSwan 4.3.5 through 5.0.3, when using the OpenSSL plugin for ECDSA signature verification, allows remote attackers to authenticate as other users via an invalid signature.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2944.html">CVE-2013-2944</cve>
<bugzilla href="https://bugzilla.suse.com/815236">SUSE bug 815236</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214259" comment="strongswan-4.4.0-6.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214260" comment="strongswan-doc-4.4.0-6.17 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3006</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-3006" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3006" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) in IBM Java 7 before 7 SR5 allows remote attackers to affect confidentiality, availability, and integrity via unknown vectors, a different vulnerability than CVE-2013-3008.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3006.html">CVE-2013-3006</cve>
<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213832" comment="java-1_7_0-ibm-alsa-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213834" comment="java-1_7_0-ibm-plugin-1.7.0_sr5.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3007</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-3007" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3007" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) in IBM Java 6.0.1 before 6.0.1 SR6 and 7 before 7 SR5 allows remote attackers to affect confidentiality, availability, and integrity via unknown vectors, a different vulnerability than CVE-2013-3006.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3007.html">CVE-2013-3007</cve>
<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213832" comment="java-1_7_0-ibm-alsa-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213834" comment="java-1_7_0-ibm-plugin-1.7.0_sr5.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3008</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-3008" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3008" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) in IBM Java 7 before 7 SR5 allows remote attackers to affect confidentiality, availability, and integrity via unknown vectors, a different vulnerability than CVE-2013-3006.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3008.html">CVE-2013-3008</cve>
<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213832" comment="java-1_7_0-ibm-alsa-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213834" comment="java-1_7_0-ibm-plugin-1.7.0_sr5.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3009</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-3009" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3009" source="CVE"/>
    <description>
    The com.ibm.CORBA.iiop.ClientDelegate class in IBM Java 1.4.2 before 1.4.2 SR13-FP18, 5.0 before 5.0 SR16-FP3, 6 before 6 SR14, 6.0.1 before 6.0.1 SR6, and 7 before 7 SR5 improperly exposes the invoke method of the java.lang.reflect.Method class, which allows remote attackers to call setSecurityManager and bypass a sandbox protection mechanism via vectors related to the AccessController doPrivileged block.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3009.html">CVE-2013-3009</cve>
<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/977650">SUSE bug 977650</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213830" comment="java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213832" comment="java-1_7_0-ibm-alsa-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213834" comment="java-1_7_0-ibm-plugin-1.7.0_sr5.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3010</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-3010" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3010" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) in IBM Java 6.0.1 before 6.0.1 SR6 and 7 before 7 SR5 allows remote attackers to affect confidentiality, availability, and integrity via unknown vectors, a different vulnerability than CVE-2013-3007.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3010.html">CVE-2013-3010</cve>
<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213832" comment="java-1_7_0-ibm-alsa-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213834" comment="java-1_7_0-ibm-plugin-1.7.0_sr5.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3011</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-3011" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3011" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) in IBM Java 1.4.2 before 1.4.2 SR13-FP18, 5.0 before 5.0 SR16-FP3, 6 before 6 SR14, 6.0.1 before 6.0.1 SR6, and 7 before 7 SR5 allows remote attackers to affect confidentiality, availability, and integrity via unknown vectors, a different vulnerability than CVE-2013-3009 and CVE-2013-3012.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3011.html">CVE-2013-3011</cve>
<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213830" comment="java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213832" comment="java-1_7_0-ibm-alsa-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213834" comment="java-1_7_0-ibm-plugin-1.7.0_sr5.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3012</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-3012" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3012" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) in IBM Java 1.4.2 before 1.4.2 SR13-FP18, 5.0 before 5.0 SR16-FP3, 6 before 6 SR14, 6.0.1 before 6.0.1 SR6, and 7 before 7 SR5 allows remote attackers to affect confidentiality, availability, and integrity via unknown vectors, a different vulnerability than CVE-2013-3009 and CVE-2013-3011.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3012.html">CVE-2013-3012</cve>
<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213830" comment="java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213832" comment="java-1_7_0-ibm-alsa-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213834" comment="java-1_7_0-ibm-plugin-1.7.0_sr5.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3076</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-3076" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3076" source="CVE"/>
    <description>
    The crypto API in the Linux kernel through 3.9-rc8 does not initialize certain length variables, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call, related to the hash_recvmsg function in crypto/algif_hash.c and the skcipher_recvmsg function in crypto/algif_skcipher.c.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3076.html">CVE-2013-3076</cve>
<bugzilla href="https://bugzilla.suse.com/816668">SUSE bug 816668</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213529" comment="kernel-default-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213530" comment="kernel-default-base-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213531" comment="kernel-default-devel-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213533" comment="kernel-source-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213534" comment="kernel-syms-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213585" comment="kernel-trace-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213586" comment="kernel-trace-base-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213535" comment="kernel-trace-devel-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215421" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264390" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3222</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-3222" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3222" source="CVE"/>
    <description>
    The vcc_recvmsg function in net/atm/common.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3222.html">CVE-2013-3222</cve>
<bugzilla href="https://bugzilla.suse.com/816668">SUSE bug 816668</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213529" comment="kernel-default-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213530" comment="kernel-default-base-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213531" comment="kernel-default-devel-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213533" comment="kernel-source-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213534" comment="kernel-syms-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213585" comment="kernel-trace-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213586" comment="kernel-trace-base-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213535" comment="kernel-trace-devel-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215421" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264390" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3223</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-3223" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3223" source="CVE"/>
    <description>
    The ax25_recvmsg function in net/ax25/af_ax25.c in the Linux kernel before 3.9-rc7 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3223.html">CVE-2013-3223</cve>
<bugzilla href="https://bugzilla.suse.com/816668">SUSE bug 816668</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213529" comment="kernel-default-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213530" comment="kernel-default-base-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213531" comment="kernel-default-devel-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213533" comment="kernel-source-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213534" comment="kernel-syms-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213585" comment="kernel-trace-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213586" comment="kernel-trace-base-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213535" comment="kernel-trace-devel-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215421" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264390" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3224</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-3224" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3224" source="CVE"/>
    <description>
    The bt_sock_recvmsg function in net/bluetooth/af_bluetooth.c in the Linux kernel before 3.9-rc7 does not properly initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3224.html">CVE-2013-3224</cve>
<bugzilla href="https://bugzilla.suse.com/816668">SUSE bug 816668</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213529" comment="kernel-default-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213530" comment="kernel-default-base-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213531" comment="kernel-default-devel-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213533" comment="kernel-source-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213534" comment="kernel-syms-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213585" comment="kernel-trace-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213586" comment="kernel-trace-base-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213535" comment="kernel-trace-devel-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215421" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264390" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3225</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-3225" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3225" source="CVE"/>
    <description>
    The rfcomm_sock_recvmsg function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3225.html">CVE-2013-3225</cve>
<bugzilla href="https://bugzilla.suse.com/816668">SUSE bug 816668</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213529" comment="kernel-default-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213530" comment="kernel-default-base-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213531" comment="kernel-default-devel-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213533" comment="kernel-source-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213534" comment="kernel-syms-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213585" comment="kernel-trace-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213586" comment="kernel-trace-base-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213535" comment="kernel-trace-devel-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215421" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264390" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3227</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-3227" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3227" source="CVE"/>
    <description>
    The caif_seqpkt_recvmsg function in net/caif/caif_socket.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3227.html">CVE-2013-3227</cve>
<bugzilla href="https://bugzilla.suse.com/816668">SUSE bug 816668</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213529" comment="kernel-default-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213530" comment="kernel-default-base-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213531" comment="kernel-default-devel-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213533" comment="kernel-source-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213534" comment="kernel-syms-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213585" comment="kernel-trace-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213586" comment="kernel-trace-base-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213535" comment="kernel-trace-devel-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215421" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264390" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3228</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-3228" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3228" source="CVE"/>
    <description>
    The irda_recvmsg_dgram function in net/irda/af_irda.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3228.html">CVE-2013-3228</cve>
<bugzilla href="https://bugzilla.suse.com/816668">SUSE bug 816668</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213529" comment="kernel-default-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213530" comment="kernel-default-base-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213531" comment="kernel-default-devel-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213533" comment="kernel-source-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213534" comment="kernel-syms-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213585" comment="kernel-trace-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213586" comment="kernel-trace-base-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213535" comment="kernel-trace-devel-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215421" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264390" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3229</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-3229" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3229" source="CVE"/>
    <description>
    The iucv_sock_recvmsg function in net/iucv/af_iucv.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3229.html">CVE-2013-3229</cve>
<bugzilla href="https://bugzilla.suse.com/816668">SUSE bug 816668</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213529" comment="kernel-default-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213530" comment="kernel-default-base-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213531" comment="kernel-default-devel-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213533" comment="kernel-source-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213534" comment="kernel-syms-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213585" comment="kernel-trace-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213586" comment="kernel-trace-base-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213535" comment="kernel-trace-devel-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215421" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264390" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3231</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-3231" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3231" source="CVE"/>
    <description>
    The llc_ui_recvmsg function in net/llc/af_llc.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3231.html">CVE-2013-3231</cve>
<bugzilla href="https://bugzilla.suse.com/816668">SUSE bug 816668</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213529" comment="kernel-default-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213530" comment="kernel-default-base-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213531" comment="kernel-default-devel-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213533" comment="kernel-source-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213534" comment="kernel-syms-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213585" comment="kernel-trace-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213586" comment="kernel-trace-base-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213535" comment="kernel-trace-devel-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215421" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264390" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3232</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-3232" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3232" source="CVE"/>
    <description>
    The nr_recvmsg function in net/netrom/af_netrom.c in the Linux kernel before 3.9-rc7 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3232.html">CVE-2013-3232</cve>
<bugzilla href="https://bugzilla.suse.com/816668">SUSE bug 816668</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213529" comment="kernel-default-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213530" comment="kernel-default-base-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213531" comment="kernel-default-devel-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213533" comment="kernel-source-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213534" comment="kernel-syms-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213585" comment="kernel-trace-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213586" comment="kernel-trace-base-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213535" comment="kernel-trace-devel-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215421" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264390" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3234</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-3234" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3234" source="CVE"/>
    <description>
    The rose_recvmsg function in net/rose/af_rose.c in the Linux kernel before 3.9-rc7 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3234.html">CVE-2013-3234</cve>
<bugzilla href="https://bugzilla.suse.com/816668">SUSE bug 816668</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213529" comment="kernel-default-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213530" comment="kernel-default-base-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213531" comment="kernel-default-devel-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213533" comment="kernel-source-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213534" comment="kernel-syms-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213585" comment="kernel-trace-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213586" comment="kernel-trace-base-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213535" comment="kernel-trace-devel-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215421" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264390" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3235</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-3235" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3235" source="CVE"/>
    <description>
    net/tipc/socket.c in the Linux kernel before 3.9-rc7 does not initialize a certain data structure and a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3235.html">CVE-2013-3235</cve>
<bugzilla href="https://bugzilla.suse.com/816668">SUSE bug 816668</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213529" comment="kernel-default-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213530" comment="kernel-default-base-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213531" comment="kernel-default-devel-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213533" comment="kernel-source-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213534" comment="kernel-syms-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213585" comment="kernel-trace-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213586" comment="kernel-trace-base-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213535" comment="kernel-trace-devel-3.0.82-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215421" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264390" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3301</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-3301" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3301" source="CVE"/>
    <description>
    The ftrace implementation in the Linux kernel before 3.8.8 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by leveraging the CAP_SYS_ADMIN capability for write access to the (1) set_ftrace_pid or (2) set_graph_function file, and then making an lseek system call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3301.html">CVE-2013-3301</cve>
<bugzilla href="https://bugzilla.suse.com/815256">SUSE bug 815256</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213736" comment="kernel-default-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213737" comment="kernel-default-base-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213738" comment="kernel-default-devel-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213740" comment="kernel-source-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213741" comment="kernel-syms-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213812" comment="kernel-trace-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213813" comment="kernel-trace-base-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213742" comment="kernel-trace-devel-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3555</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-3555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3555" source="CVE"/>
    <description>
    epan/dissectors/packet-gtpv2.c in the GTPv2 dissector in Wireshark 1.8.x before 1.8.7 calls incorrect functions in certain contexts related to ciphers, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3555.html">CVE-2013-3555</cve>
<bugzilla href="https://bugzilla.suse.com/820566">SUSE bug 820566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/820973">SUSE bug 820973</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214205" comment="wireshark-1.8.8-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3556</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-3556" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3556" source="CVE"/>
    <description>
    The fragment_add_seq_common function in epan/reassemble.c in the ASN.1 BER dissector in Wireshark before r48943 has an incorrect pointer dereference during a comparison, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3556.html">CVE-2013-3556</cve>
<bugzilla href="https://bugzilla.suse.com/820566">SUSE bug 820566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/820973">SUSE bug 820973</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214205" comment="wireshark-1.8.8-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3557</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-3557" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3557" source="CVE"/>
    <description>
    The dissect_ber_choice function in epan/dissectors/packet-ber.c in the ASN.1 BER dissector in Wireshark 1.6.x before 1.6.15 and 1.8.x before 1.8.7 does not properly initialize a certain variable, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3557.html">CVE-2013-3557</cve>
<bugzilla href="https://bugzilla.suse.com/820566">SUSE bug 820566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/820973">SUSE bug 820973</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214205" comment="wireshark-1.8.8-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3558</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-3558" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3558" source="CVE"/>
    <description>
    The dissect_ccp_bsdcomp_opt function in epan/dissectors/packet-ppp.c in the PPP CCP dissector in Wireshark 1.8.x before 1.8.7 does not terminate a bit-field list, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3558.html">CVE-2013-3558</cve>
<bugzilla href="https://bugzilla.suse.com/820566">SUSE bug 820566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/820973">SUSE bug 820973</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214205" comment="wireshark-1.8.8-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3559</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-3559" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3559" source="CVE"/>
    <description>
    epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.8.x before 1.8.7 uses incorrect integer data types, which allows remote attackers to cause a denial of service (integer overflow, and heap memory corruption or NULL pointer dereference, and application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3559.html">CVE-2013-3559</cve>
<bugzilla href="https://bugzilla.suse.com/820566">SUSE bug 820566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/820973">SUSE bug 820973</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214205" comment="wireshark-1.8.8-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3560</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-3560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3560" source="CVE"/>
    <description>
    The dissect_dsmcc_un_download function in epan/dissectors/packet-mpeg-dsmcc.c in the MPEG DSM-CC dissector in Wireshark 1.8.x before 1.8.7 uses an incorrect format string, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3560.html">CVE-2013-3560</cve>
<bugzilla href="https://bugzilla.suse.com/820566">SUSE bug 820566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/820973">SUSE bug 820973</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214205" comment="wireshark-1.8.8-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3561</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-3561" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3561" source="CVE"/>
    <description>
    Multiple integer overflows in Wireshark 1.8.x before 1.8.7 allow remote attackers to cause a denial of service (loop or application crash) via a malformed packet, related to a crash of the Websocket dissector, an infinite loop in the MySQL dissector, and a large loop in the ETCH dissector.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3561.html">CVE-2013-3561</cve>
<bugzilla href="https://bugzilla.suse.com/820566">SUSE bug 820566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/820973">SUSE bug 820973</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214205" comment="wireshark-1.8.8-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3562</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-3562" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3562" source="CVE"/>
    <description>
    Multiple integer signedness errors in the tvb_unmasked function in epan/dissectors/packet-websocket.c in the Websocket dissector in Wireshark 1.8.x before 1.8.7 allow remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3562.html">CVE-2013-3562</cve>
<bugzilla href="https://bugzilla.suse.com/820566">SUSE bug 820566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/820973">SUSE bug 820973</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214205" comment="wireshark-1.8.8-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3567</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-3567" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3567" source="CVE"/>
    <description>
    Puppet 2.7.x before 2.7.22 and 3.2.x before 3.2.2, and Puppet Enterprise before 2.8.2, deserializes untrusted YAML, which allows remote attackers to instantiate arbitrary Ruby classes and execute arbitrary code via a crafted REST API call.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3567.html">CVE-2013-3567</cve>
<bugzilla href="https://bugzilla.suse.com/1040151">SUSE bug 1040151</bugzilla>
<bugzilla href="https://bugzilla.suse.com/825878">SUSE bug 825878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/880224">SUSE bug 880224</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214278" comment="puppet-2.6.18-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214279" comment="puppet-server-2.6.18-0.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3571</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-3571" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3571" source="CVE"/>
    <description>
    socat 1.2.0.0 before 1.7.2.2 and 2.0.0-b1 before 2.0.0-b6, when used for a listen type address and the fork option is enabled, allows remote attackers to cause a denial of service (file descriptor consumption) via multiple request that are refused based on the (1) sourceport, (2) lowport, (3) range, or (4) tcpwrap restrictions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3571.html">CVE-2013-3571</cve>
<bugzilla href="https://bugzilla.suse.com/821985">SUSE bug 821985</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205101" comment="socat-1.7.0.0-1.18 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3743</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-3743" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3743" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 45 and earlier and 5.0 Update 45 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3743.html">CVE-2013-3743</cve>
<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213830" comment="java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213832" comment="java-1_7_0-ibm-alsa-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213834" comment="java-1_7_0-ibm-plugin-1.7.0_sr5.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3744</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-3744" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3744" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier allows remote attackers to affect integrity via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2400.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3744.html">CVE-2013-3744</cve>
<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213832" comment="java-1_7_0-ibm-alsa-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213834" comment="java-1_7_0-ibm-plugin-1.7.0_sr5.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3783</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-3783" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3783" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.31 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Parser.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3783.html">CVE-2013-3783</cve>
<bugzilla href="https://bugzilla.suse.com/830086">SUSE bug 830086</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213974" comment="libmysql55client18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213976" comment="libmysql55client_r18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213978" comment="mysql-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213979" comment="mysql-client-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213980" comment="mysql-tools-5.5.33-0.11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213974" comment="libmysql55client18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213975" comment="libmysql55client18-32bit-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213976" comment="libmysql55client_r18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213978" comment="mysql-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213979" comment="mysql-client-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213980" comment="mysql-tools-5.5.33-0.11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3793</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-3793" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3793" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Data Manipulation Language.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3793.html">CVE-2013-3793</cve>
<bugzilla href="https://bugzilla.suse.com/830086">SUSE bug 830086</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213974" comment="libmysql55client18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213976" comment="libmysql55client_r18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213978" comment="mysql-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213979" comment="mysql-client-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213980" comment="mysql-tools-5.5.33-0.11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213974" comment="libmysql55client18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213975" comment="libmysql55client18-32bit-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213976" comment="libmysql55client_r18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213978" comment="mysql-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213979" comment="mysql-client-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213980" comment="mysql-tools-5.5.33-0.11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3794</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-3794" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3794" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.30 and earlier and 5.6.10 allows remote authenticated users to affect availability via unknown vectors related to Server Partition.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3794.html">CVE-2013-3794</cve>
<bugzilla href="https://bugzilla.suse.com/830086">SUSE bug 830086</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213974" comment="libmysql55client18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213976" comment="libmysql55client_r18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213978" comment="mysql-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213979" comment="mysql-client-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213980" comment="mysql-tools-5.5.33-0.11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213974" comment="libmysql55client18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213975" comment="libmysql55client18-32bit-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213976" comment="libmysql55client_r18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213978" comment="mysql-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213979" comment="mysql-client-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213980" comment="mysql-tools-5.5.33-0.11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3795</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-3795" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3795" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Data Manipulation Language.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3795.html">CVE-2013-3795</cve>
<bugzilla href="https://bugzilla.suse.com/830086">SUSE bug 830086</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213974" comment="libmysql55client18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213976" comment="libmysql55client_r18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213978" comment="mysql-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213979" comment="mysql-client-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213980" comment="mysql-tools-5.5.33-0.11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213974" comment="libmysql55client18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213975" comment="libmysql55client18-32bit-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213976" comment="libmysql55client_r18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213978" comment="mysql-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213979" comment="mysql-client-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213980" comment="mysql-tools-5.5.33-0.11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3796</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-3796" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3796" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3796.html">CVE-2013-3796</cve>
<bugzilla href="https://bugzilla.suse.com/830086">SUSE bug 830086</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213974" comment="libmysql55client18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213976" comment="libmysql55client_r18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213978" comment="mysql-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213979" comment="mysql-client-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213980" comment="mysql-tools-5.5.33-0.11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213974" comment="libmysql55client18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213975" comment="libmysql55client18-32bit-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213976" comment="libmysql55client_r18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213978" comment="mysql-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213979" comment="mysql-client-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213980" comment="mysql-tools-5.5.33-0.11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3798</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-3798" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3798" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.11 and earlier allows remote attackers to affect integrity and availability via unknown vectors related to MemCached.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3798.html">CVE-2013-3798</cve>
<bugzilla href="https://bugzilla.suse.com/830086">SUSE bug 830086</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213974" comment="libmysql55client18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213976" comment="libmysql55client_r18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213978" comment="mysql-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213979" comment="mysql-client-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213980" comment="mysql-tools-5.5.33-0.11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213974" comment="libmysql55client18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213975" comment="libmysql55client18-32bit-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213976" comment="libmysql55client_r18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213978" comment="mysql-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213979" comment="mysql-client-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213980" comment="mysql-tools-5.5.33-0.11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3801</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-3801" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3801" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.30 and earlier and 5.6.10 allows remote authenticated users to affect availability via unknown vectors related to Server Options.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3801.html">CVE-2013-3801</cve>
<bugzilla href="https://bugzilla.suse.com/830086">SUSE bug 830086</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213974" comment="libmysql55client18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213976" comment="libmysql55client_r18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213978" comment="mysql-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213979" comment="mysql-client-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213980" comment="mysql-tools-5.5.33-0.11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213974" comment="libmysql55client18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213975" comment="libmysql55client18-32bit-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213976" comment="libmysql55client_r18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213978" comment="mysql-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213979" comment="mysql-client-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213980" comment="mysql-tools-5.5.33-0.11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3802</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-3802" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3802" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.69 and earlier, 5.5.31 and earlier, and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Full Text Search.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3802.html">CVE-2013-3802</cve>
<bugzilla href="https://bugzilla.suse.com/830086">SUSE bug 830086</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213974" comment="libmysql55client18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213976" comment="libmysql55client_r18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213978" comment="mysql-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213979" comment="mysql-client-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213980" comment="mysql-tools-5.5.33-0.11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213974" comment="libmysql55client18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213975" comment="libmysql55client18-32bit-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213976" comment="libmysql55client_r18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213978" comment="mysql-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213979" comment="mysql-client-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213980" comment="mysql-tools-5.5.33-0.11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3804</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-3804" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3804" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.69 and earlier, 5.5.31 and earlier, and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3804.html">CVE-2013-3804</cve>
<bugzilla href="https://bugzilla.suse.com/830086">SUSE bug 830086</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213974" comment="libmysql55client18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213976" comment="libmysql55client_r18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213978" comment="mysql-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213979" comment="mysql-client-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213980" comment="mysql-tools-5.5.33-0.11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213974" comment="libmysql55client18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213975" comment="libmysql55client18-32bit-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213976" comment="libmysql55client_r18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213978" comment="mysql-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213979" comment="mysql-client-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213980" comment="mysql-tools-5.5.33-0.11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-3805" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3805" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.30 and earlier and 5.6.10 allows remote authenticated users to affect availability via unknown vectors related to Prepared Statements.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3805.html">CVE-2013-3805</cve>
<bugzilla href="https://bugzilla.suse.com/830086">SUSE bug 830086</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213974" comment="libmysql55client18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213976" comment="libmysql55client_r18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213978" comment="mysql-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213979" comment="mysql-client-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213980" comment="mysql-tools-5.5.33-0.11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213974" comment="libmysql55client18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213975" comment="libmysql55client18-32bit-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213976" comment="libmysql55client_r18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213978" comment="mysql-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213979" comment="mysql-client-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213980" comment="mysql-tools-5.5.33-0.11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-3806" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3806" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB, a different vulnerability than CVE-2013-3811.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3806.html">CVE-2013-3806</cve>
<bugzilla href="https://bugzilla.suse.com/830086">SUSE bug 830086</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213974" comment="libmysql55client18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213976" comment="libmysql55client_r18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213978" comment="mysql-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213979" comment="mysql-client-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213980" comment="mysql-tools-5.5.33-0.11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213974" comment="libmysql55client18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213975" comment="libmysql55client18-32bit-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213976" comment="libmysql55client_r18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213978" comment="mysql-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213979" comment="mysql-client-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213980" comment="mysql-tools-5.5.33-0.11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3807</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-3807" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3807" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.11 and earlier allows remote attackers to affect confidentiality and integrity via unknown vectors related to Server Privileges.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3807.html">CVE-2013-3807</cve>
<bugzilla href="https://bugzilla.suse.com/830086">SUSE bug 830086</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213974" comment="libmysql55client18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213976" comment="libmysql55client_r18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213978" comment="mysql-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213979" comment="mysql-client-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213980" comment="mysql-tools-5.5.33-0.11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213974" comment="libmysql55client18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213975" comment="libmysql55client18-32bit-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213976" comment="libmysql55client_r18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213978" comment="mysql-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213979" comment="mysql-client-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213980" comment="mysql-tools-5.5.33-0.11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3808</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-3808" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3808" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 allows remote authenticated users to affect availability via unknown vectors related to Server Options.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3808.html">CVE-2013-3808</cve>
<bugzilla href="https://bugzilla.suse.com/830086">SUSE bug 830086</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213974" comment="libmysql55client18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213976" comment="libmysql55client_r18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213978" comment="mysql-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213979" comment="mysql-client-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213980" comment="mysql-tools-5.5.33-0.11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213974" comment="libmysql55client18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213975" comment="libmysql55client18-32bit-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213976" comment="libmysql55client_r18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213978" comment="mysql-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213979" comment="mysql-client-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213980" comment="mysql-tools-5.5.33-0.11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3809</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-3809" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3809" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Audit Log.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3809.html">CVE-2013-3809</cve>
<bugzilla href="https://bugzilla.suse.com/830086">SUSE bug 830086</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213974" comment="libmysql55client18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213976" comment="libmysql55client_r18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213978" comment="mysql-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213979" comment="mysql-client-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213980" comment="mysql-tools-5.5.33-0.11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213974" comment="libmysql55client18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213975" comment="libmysql55client18-32bit-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213976" comment="libmysql55client_r18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213978" comment="mysql-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213979" comment="mysql-client-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213980" comment="mysql-tools-5.5.33-0.11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3810</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-3810" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3810" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to XA Transactions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3810.html">CVE-2013-3810</cve>
<bugzilla href="https://bugzilla.suse.com/830086">SUSE bug 830086</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213974" comment="libmysql55client18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213976" comment="libmysql55client_r18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213978" comment="mysql-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213979" comment="mysql-client-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213980" comment="mysql-tools-5.5.33-0.11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213974" comment="libmysql55client18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213975" comment="libmysql55client18-32bit-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213976" comment="libmysql55client_r18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213978" comment="mysql-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213979" comment="mysql-client-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213980" comment="mysql-tools-5.5.33-0.11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3811</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-3811" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3811" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB, a different vulnerability than CVE-2013-3806.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3811.html">CVE-2013-3811</cve>
<bugzilla href="https://bugzilla.suse.com/830086">SUSE bug 830086</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213974" comment="libmysql55client18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213976" comment="libmysql55client_r18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213978" comment="mysql-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213979" comment="mysql-client-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213980" comment="mysql-tools-5.5.33-0.11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213974" comment="libmysql55client18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213975" comment="libmysql55client18-32bit-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213976" comment="libmysql55client_r18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213978" comment="mysql-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213979" comment="mysql-client-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213980" comment="mysql-tools-5.5.33-0.11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3812</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-3812" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3812" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Replication.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3812.html">CVE-2013-3812</cve>
<bugzilla href="https://bugzilla.suse.com/830086">SUSE bug 830086</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213974" comment="libmysql55client18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213976" comment="libmysql55client_r18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213978" comment="mysql-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213979" comment="mysql-client-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213980" comment="mysql-tools-5.5.33-0.11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213974" comment="libmysql55client18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213975" comment="libmysql55client18-32bit-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213976" comment="libmysql55client_r18-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213978" comment="mysql-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213979" comment="mysql-client-5.5.33-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213980" comment="mysql-tools-5.5.33-0.11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3829</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-3829" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3829" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java SE, Java SE Embedded component in Oracle Java SE Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3829.html">CVE-2013-3829</cve>
<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207703" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207720" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207723" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4002</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4002" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4002" source="CVE"/>
    <description>
    XMLscanner.java in Apache Xerces2 Java Parser before 2.12.0, as used in the Java Runtime Environment (JRE) in IBM Java 5.0 before 5.0 SR16-FP3, 6 before 6 SR14, 6.0.1 before 6.0.1 SR6, and 7 before 7 SR5 as well as Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, Java SE Embedded 7u40 and earlier, and possibly other products allows remote attackers to cause a denial of service via vectors related to XML attribute names.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4002.html">CVE-2013-4002</cve>
<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213827" comment="java-1_6_0-ibm-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213828" comment="java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213829" comment="java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213830" comment="java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213831" comment="java-1_7_0-ibm-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213832" comment="java-1_7_0-ibm-alsa-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213833" comment="java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213834" comment="java-1_7_0-ibm-plugin-1.7.0_sr5.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4041</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4041" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4041" source="CVE"/>
    <description>
    Unspecified vulnerability in IBM Java SDK 5.0.0 before SR16 FP4, 7.0.0 before SR6, 6.0.1 before SR7, and 6.0.0 before SR15 allows remote attackers to access restricted classes via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4041.html">CVE-2013-4041</cve>
<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207703" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207720" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207723" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4073</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4073" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4073" source="CVE"/>
    <description>
    The OpenSSL::SSL.verify_certificate_identity function in lib/openssl/ssl.rb in Ruby 1.8 before 1.8.7-p374, 1.9 before 1.9.3-p448, and 2.0 before 2.0.0-p247 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4073.html">CVE-2013-4073</cve>
<bugzilla href="https://bugzilla.suse.com/827265">SUSE bug 827265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/834601">SUSE bug 834601</bugzilla>
<bugzilla href="https://bugzilla.suse.com/839107">SUSE bug 839107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/876588">SUSE bug 876588</bugzilla>
<bugzilla href="https://bugzilla.suse.com/880222">SUSE bug 880222</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204779" comment="libpython2_6-1_0-2.6.9-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204780" comment="libpython2_6-1_0-32bit-2.6.9-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204781" comment="python-2.6.9-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202008" comment="python-32bit-2.6.9-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204782" comment="python-base-2.6.9-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204783" comment="python-base-32bit-2.6.9-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204784" comment="python-curses-2.6.9-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202009" comment="python-demo-2.6.9-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202011" comment="python-doc-2.6-8.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202012" comment="python-doc-pdf-2.6-8.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202013" comment="python-gdbm-2.6.9-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202014" comment="python-idle-2.6.9-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202015" comment="python-tk-2.6.9-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204785" comment="python-xml-2.6.9-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214283" comment="ruby-1.8.7.p357-0.9.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214284" comment="ruby-doc-html-1.8.7.p357-0.9.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214285" comment="ruby-tk-1.8.7.p357-0.9.11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204779" comment="libpython2_6-1_0-2.6.9-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204780" comment="libpython2_6-1_0-32bit-2.6.9-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208957" comment="libpython2_6-1_0-x86-2.6.9-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204781" comment="python-2.6.9-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202008" comment="python-32bit-2.6.9-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204782" comment="python-base-2.6.9-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204783" comment="python-base-32bit-2.6.9-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208958" comment="python-base-x86-2.6.9-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204784" comment="python-curses-2.6.9-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202009" comment="python-demo-2.6.9-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202011" comment="python-doc-2.6-8.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202012" comment="python-doc-pdf-2.6-8.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202013" comment="python-gdbm-2.6.9-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202014" comment="python-idle-2.6.9-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202015" comment="python-tk-2.6.9-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208959" comment="python-x86-2.6.9-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204785" comment="python-xml-2.6.9-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214283" comment="ruby-1.8.7.p357-0.9.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214284" comment="ruby-doc-html-1.8.7.p357-0.9.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214285" comment="ruby-tk-1.8.7.p357-0.9.11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4074</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4074" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4074" source="CVE"/>
    <description>
    The dissect_capwap_data function in epan/dissectors/packet-capwap.c in the CAPWAP dissector in Wireshark 1.6.x before 1.6.16 and 1.8.x before 1.8.8 incorrectly uses a -1 data value to represent an error condition, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4074.html">CVE-2013-4074</cve>
<bugzilla href="https://bugzilla.suse.com/824900">SUSE bug 824900</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214205" comment="wireshark-1.8.8-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4075</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4075" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4075" source="CVE"/>
    <description>
    epan/dissectors/packet-gmr1_bcch.c in the GMR-1 BCCH dissector in Wireshark 1.8.x before 1.8.8 does not properly initialize memory, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4075.html">CVE-2013-4075</cve>
<bugzilla href="https://bugzilla.suse.com/824900">SUSE bug 824900</bugzilla>
<bugzilla href="https://bugzilla.suse.com/836146">SUSE bug 836146</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214205" comment="wireshark-1.8.8-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4076</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4076" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4076" source="CVE"/>
    <description>
    Buffer overflow in the dissect_iphc_crtp_fh function in epan/dissectors/packet-ppp.c in the PPP dissector in Wireshark 1.8.x before 1.8.8 allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4076.html">CVE-2013-4076</cve>
<bugzilla href="https://bugzilla.suse.com/824900">SUSE bug 824900</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214205" comment="wireshark-1.8.8-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4077</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4077" source="CVE"/>
    <description>
    Array index error in the NBAP dissector in Wireshark 1.8.x before 1.8.8 allows remote attackers to cause a denial of service (application crash) via a crafted packet, related to nbap.cnf and packet-nbap.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4077.html">CVE-2013-4077</cve>
<bugzilla href="https://bugzilla.suse.com/824900">SUSE bug 824900</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214205" comment="wireshark-1.8.8-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4078</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4078" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4078" source="CVE"/>
    <description>
    epan/dissectors/packet-rdp.c in the RDP dissector in Wireshark 1.8.x before 1.8.8 does not validate return values during checks for data availability, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4078.html">CVE-2013-4078</cve>
<bugzilla href="https://bugzilla.suse.com/824900">SUSE bug 824900</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214205" comment="wireshark-1.8.8-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4079</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4079" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4079" source="CVE"/>
    <description>
    The dissect_schedule_message function in epan/dissectors/packet-gsm_cbch.c in the GSM CBCH dissector in Wireshark 1.8.x before 1.8.8 allows remote attackers to cause a denial of service (infinite loop and application hang) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4079.html">CVE-2013-4079</cve>
<bugzilla href="https://bugzilla.suse.com/824900">SUSE bug 824900</bugzilla>
<bugzilla href="https://bugzilla.suse.com/836146">SUSE bug 836146</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214205" comment="wireshark-1.8.8-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4080</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4080" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4080" source="CVE"/>
    <description>
    The dissect_r3_upstreamcommand_queryconfig function in epan/dissectors/packet-assa_r3.c in the Assa Abloy R3 dissector in Wireshark 1.8.x before 1.8.8 does not properly handle a zero-length item, which allows remote attackers to cause a denial of service (infinite loop, and CPU and memory consumption) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4080.html">CVE-2013-4080</cve>
<bugzilla href="https://bugzilla.suse.com/824900">SUSE bug 824900</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214205" comment="wireshark-1.8.8-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4081</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4081" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4081" source="CVE"/>
    <description>
    The http_payload_subdissector function in epan/dissectors/packet-http.c in the HTTP dissector in Wireshark 1.6.x before 1.6.16 and 1.8.x before 1.8.8 does not properly determine when to use a recursive approach, which allows remote attackers to cause a denial of service (stack consumption) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4081.html">CVE-2013-4081</cve>
<bugzilla href="https://bugzilla.suse.com/824900">SUSE bug 824900</bugzilla>
<bugzilla href="https://bugzilla.suse.com/836116">SUSE bug 836116</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214205" comment="wireshark-1.8.8-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4082</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4082" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4082" source="CVE"/>
    <description>
    The vwr_read function in wiretap/vwr.c in the Ixia IxVeriWave file parser in Wireshark 1.8.x before 1.8.8 does not validate the relationship between a record length and a trailer length, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4082.html">CVE-2013-4082</cve>
<bugzilla href="https://bugzilla.suse.com/824900">SUSE bug 824900</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214205" comment="wireshark-1.8.8-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4083</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4083" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4083" source="CVE"/>
    <description>
    The dissect_pft function in epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.6.x before 1.6.16, 1.8.x before 1.8.8, and 1.10.0 does not validate a certain fragment length value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4083.html">CVE-2013-4083</cve>
<bugzilla href="https://bugzilla.suse.com/824900">SUSE bug 824900</bugzilla>
<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214205" comment="wireshark-1.8.8-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4113</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4113" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4113" source="CVE"/>
    <description>
    ext/xml/xml.c in PHP before 5.3.27 does not properly consider parsing depth, which allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted document that is processed by the xml_parse_into_struct function.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4113.html">CVE-2013-4113</cve>
<bugzilla href="https://bugzilla.suse.com/829207">SUSE bug 829207</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214290" comment="apache2-mod_php53-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214291" comment="php53-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214292" comment="php53-bcmath-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214293" comment="php53-bz2-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214294" comment="php53-calendar-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214295" comment="php53-ctype-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214296" comment="php53-curl-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214297" comment="php53-dba-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214298" comment="php53-dom-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214299" comment="php53-exif-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214300" comment="php53-fastcgi-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214301" comment="php53-fileinfo-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214302" comment="php53-ftp-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214303" comment="php53-gd-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214304" comment="php53-gettext-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214305" comment="php53-gmp-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214306" comment="php53-iconv-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214307" comment="php53-intl-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214308" comment="php53-json-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214309" comment="php53-ldap-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214310" comment="php53-mbstring-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214311" comment="php53-mcrypt-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214312" comment="php53-mysql-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214313" comment="php53-odbc-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214314" comment="php53-openssl-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214315" comment="php53-pcntl-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214316" comment="php53-pdo-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214317" comment="php53-pear-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214318" comment="php53-pgsql-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214319" comment="php53-pspell-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214320" comment="php53-shmop-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214321" comment="php53-snmp-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214322" comment="php53-soap-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214323" comment="php53-suhosin-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214324" comment="php53-sysvmsg-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214325" comment="php53-sysvsem-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214326" comment="php53-sysvshm-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214327" comment="php53-tokenizer-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214328" comment="php53-wddx-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214329" comment="php53-xmlreader-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214330" comment="php53-xmlrpc-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214331" comment="php53-xmlwriter-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214332" comment="php53-xsl-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214333" comment="php53-zip-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214334" comment="php53-zlib-5.3.17-0.15 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4115</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4115" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4115" source="CVE"/>
    <description>
    Buffer overflow in the idnsALookup function in dns_internal.cc in Squid 3.2 through 3.2.11 and 3.3 through 3.3.6 allows remote attackers to cause a denial of service (memory corruption and server termination) via a long name in a DNS lookup request.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4115.html">CVE-2013-4115</cve>
<bugzilla href="https://bugzilla.suse.com/829084">SUSE bug 829084</bugzilla>
<bugzilla href="https://bugzilla.suse.com/880233">SUSE bug 880233</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200446" comment="squid-2.7.STABLE5-2.12.16 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200446" comment="squid-2.7.STABLE5-2.12.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210806" comment="squid3-3.1.23-8.16.30 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4124</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4124" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4124" source="CVE"/>
    <description>
    Integer overflow in the read_nttrans_ea_list function in nttrans.c in smbd in Samba 3.x before 3.5.22, 3.6.x before 3.6.17, and 4.x before 4.0.8 allows remote attackers to cause a denial of service (memory consumption) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4124.html">CVE-2013-4124</cve>
<bugzilla href="https://bugzilla.suse.com/829969">SUSE bug 829969</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214385" comment="ldapsmb-1.34b-12.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214364" comment="libldb1-3.6.3-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214366" comment="libsmbclient0-3.6.3-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204235" comment="libsmbclient0-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208444" comment="libsmbclient0-x86-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214368" comment="libtalloc2-3.6.3-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204237" comment="libtalloc2-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208445" comment="libtalloc2-x86-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214370" comment="libtdb1-3.6.3-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204239" comment="libtdb1-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208446" comment="libtdb1-x86-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214372" comment="libtevent0-3.6.3-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204241" comment="libtevent0-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214374" comment="libwbclient0-3.6.3-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204243" comment="libwbclient0-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208447" comment="libwbclient0-x86-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214376" comment="samba-3.6.3-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204245" comment="samba-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214378" comment="samba-client-3.6.3-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204247" comment="samba-client-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208448" comment="samba-client-x86-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214380" comment="samba-doc-3.6.3-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214381" comment="samba-krb-printing-3.6.3-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214382" comment="samba-winbind-3.6.3-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204251" comment="samba-winbind-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208449" comment="samba-winbind-x86-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208450" comment="samba-x86-3.6.3-0.52 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214385" comment="ldapsmb-1.34b-12.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214364" comment="libldb1-3.6.3-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214366" comment="libsmbclient0-3.6.3-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214367" comment="libsmbclient0-32bit-3.6.3-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214368" comment="libtalloc2-3.6.3-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214369" comment="libtalloc2-32bit-3.6.3-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214370" comment="libtdb1-3.6.3-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214371" comment="libtdb1-32bit-3.6.3-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214372" comment="libtevent0-3.6.3-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214373" comment="libtevent0-32bit-3.6.3-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214374" comment="libwbclient0-3.6.3-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214375" comment="libwbclient0-32bit-3.6.3-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214376" comment="samba-3.6.3-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214377" comment="samba-32bit-3.6.3-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214378" comment="samba-client-3.6.3-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214379" comment="samba-client-32bit-3.6.3-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214380" comment="samba-doc-3.6.3-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214381" comment="samba-krb-printing-3.6.3-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214382" comment="samba-winbind-3.6.3-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214383" comment="samba-winbind-32bit-3.6.3-0.42 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4132</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4132" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4132" source="CVE"/>
    <description>
    KDE-Workspace 4.10.5 and earlier does not properly handle the return value of the glibc 2.17 crypt and pw_encrypt functions, which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via (1) an invalid salt or a (2) DES or (3) MD5 encrypted password, when FIPS-140 is enable, to KDM or an (4) invalid password to KCheckPass.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4132.html">CVE-2013-4132</cve>
<bugzilla href="https://bugzilla.suse.com/829857">SUSE bug 829857</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200090" comment="kde4-kgreeter-plugins-4.3.5-0.12.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200091" comment="kdebase4-wallpapers-4.3.5-0.11.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200092" comment="kdebase4-workspace-4.3.5-0.12.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200093" comment="kdebase4-workspace-ksysguardd-4.3.5-0.12.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200094" comment="kdm-4.3.5-0.12.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200095" comment="kwin-4.3.5-0.12.18 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4133</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4133" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4133" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4133.html">CVE-2013-4133</cve>
<bugzilla href="https://bugzilla.suse.com/829857">SUSE bug 829857</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200090" comment="kde4-kgreeter-plugins-4.3.5-0.12.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200091" comment="kdebase4-wallpapers-4.3.5-0.11.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200092" comment="kdebase4-workspace-4.3.5-0.12.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200093" comment="kdebase4-workspace-ksysguardd-4.3.5-0.12.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200094" comment="kdm-4.3.5-0.12.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200095" comment="kwin-4.3.5-0.12.18 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4162</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4162" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4162" source="CVE"/>
    <description>
    The udp_v6_push_pending_frames function in net/ipv6/udp.c in the IPv6 implementation in the Linux kernel through 3.10.3 makes an incorrect function call for pending data, which allows local users to cause a denial of service (BUG and system crash) via a crafted application that uses the UDP_CORK option in a setsockopt system call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4162.html">CVE-2013-4162</cve>
<bugzilla href="https://bugzilla.suse.com/831058">SUSE bug 831058</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213736" comment="kernel-default-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213737" comment="kernel-default-base-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213738" comment="kernel-default-devel-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213740" comment="kernel-source-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213741" comment="kernel-syms-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213812" comment="kernel-trace-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213813" comment="kernel-trace-base-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213742" comment="kernel-trace-devel-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4163</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4163" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4163" source="CVE"/>
    <description>
    The ip6_append_data_mtu function in net/ipv6/ip6_output.c in the IPv6 implementation in the Linux kernel through 3.10.3 does not properly maintain information about whether the IPV6_MTU setsockopt option had been specified, which allows local users to cause a denial of service (BUG and system crash) via a crafted application that uses the UDP_CORK option in a setsockopt system call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4163.html">CVE-2013-4163</cve>
<bugzilla href="https://bugzilla.suse.com/831055">SUSE bug 831055</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213736" comment="kernel-default-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213737" comment="kernel-default-base-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213738" comment="kernel-default-devel-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213740" comment="kernel-source-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213741" comment="kernel-syms-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213812" comment="kernel-trace-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213813" comment="kernel-trace-base-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213742" comment="kernel-trace-devel-3.0.93-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4164</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4164" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4164" source="CVE"/>
    <description>
    Heap-based buffer overflow in Ruby 1.8, 1.9 before 1.9.3-p484, 2.0 before 2.0.0-p353, 2.1 before 2.1.0 preview2, and trunk before revision 43780 allows context-dependent attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a string that is converted to a floating point value, as demonstrated using (1) the to_f method or (2) JSON.parse.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4164.html">CVE-2013-4164</cve>
<bugzilla href="https://bugzilla.suse.com/851803">SUSE bug 851803</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204079" comment="ruby-1.8.7.p357-0.9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201498" comment="ruby-doc-html-1.8.7.p357-0.9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201502" comment="ruby-tk-1.8.7.p357-0.9.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4231</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4231" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4231" source="CVE"/>
    <description>
    Multiple buffer overflows in libtiff before 4.0.3 allow remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) extension block in a GIF image or (2) GIF raster image to tools/gif2tiff.c or (3) a long filename for a TIFF image to tools/rgb2ycbcr.c.  NOTE: vectors 1 and 3 are disputed by Red Hat, which states that the input cannot exceed the allocated buffer size.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4231.html">CVE-2013-4231</cve>
<bugzilla href="https://bugzilla.suse.com/834477">SUSE bug 834477</bugzilla>
<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200320" comment="libtiff3-3.8.2-141.154 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200321" comment="libtiff3-32bit-3.8.2-141.154 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200322" comment="libtiff3-x86-3.8.2-141.154 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200323" comment="tiff-3.8.2-141.154 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200320" comment="libtiff3-3.8.2-141.154 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200321" comment="libtiff3-32bit-3.8.2-141.154 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200323" comment="tiff-3.8.2-141.154 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4232</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4232" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4232" source="CVE"/>
    <description>
    Use-after-free vulnerability in the t2p_readwrite_pdf_image function in tools/tiff2pdf.c in libtiff 4.0.3 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted TIFF image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4232.html">CVE-2013-4232</cve>
<bugzilla href="https://bugzilla.suse.com/834477">SUSE bug 834477</bugzilla>
<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200320" comment="libtiff3-3.8.2-141.154 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200321" comment="libtiff3-32bit-3.8.2-141.154 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200322" comment="libtiff3-x86-3.8.2-141.154 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200323" comment="tiff-3.8.2-141.154 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200320" comment="libtiff3-3.8.2-141.154 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200321" comment="libtiff3-32bit-3.8.2-141.154 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200323" comment="tiff-3.8.2-141.154 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4237</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4237" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4237" source="CVE"/>
    <description>
    sysdeps/posix/readdir_r.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted (1) NTFS or (2) CIFS image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4237.html">CVE-2013-4237</cve>
<bugzilla href="https://bugzilla.suse.com/834594">SUSE bug 834594</bugzilla>
<bugzilla href="https://bugzilla.suse.com/882910">SUSE bug 882910</bugzilla>
<bugzilla href="https://bugzilla.suse.com/920055">SUSE bug 920055</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213314" comment="glibc-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204402" comment="glibc-32bit-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213316" comment="glibc-devel-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204404" comment="glibc-devel-32bit-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213334" comment="glibc-html-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213318" comment="glibc-i18ndata-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213335" comment="glibc-info-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213319" comment="glibc-locale-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204407" comment="glibc-locale-32bit-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208499" comment="glibc-locale-x86-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213336" comment="glibc-profile-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208501" comment="glibc-profile-32bit-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208502" comment="glibc-profile-x86-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208503" comment="glibc-x86-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213321" comment="nscd-2.11.3-17.56 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213314" comment="glibc-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213315" comment="glibc-32bit-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213316" comment="glibc-devel-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213317" comment="glibc-devel-32bit-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213334" comment="glibc-html-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213318" comment="glibc-i18ndata-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213335" comment="glibc-info-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213319" comment="glibc-locale-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213320" comment="glibc-locale-32bit-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213336" comment="glibc-profile-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213337" comment="glibc-profile-32bit-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213321" comment="nscd-2.11.3-17.56 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4238</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4238" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4238" source="CVE"/>
    <description>
    The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4238.html">CVE-2013-4238</cve>
<bugzilla href="https://bugzilla.suse.com/834601">SUSE bug 834601</bugzilla>
<bugzilla href="https://bugzilla.suse.com/839107">SUSE bug 839107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/882915">SUSE bug 882915</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204779" comment="libpython2_6-1_0-2.6.9-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204780" comment="libpython2_6-1_0-32bit-2.6.9-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204781" comment="python-2.6.9-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202008" comment="python-32bit-2.6.9-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204782" comment="python-base-2.6.9-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204783" comment="python-base-32bit-2.6.9-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204784" comment="python-curses-2.6.9-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202009" comment="python-demo-2.6.9-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202011" comment="python-doc-2.6-8.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202012" comment="python-doc-pdf-2.6-8.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202013" comment="python-gdbm-2.6.9-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202014" comment="python-idle-2.6.9-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202015" comment="python-tk-2.6.9-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204785" comment="python-xml-2.6.9-0.25 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204779" comment="libpython2_6-1_0-2.6.9-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204780" comment="libpython2_6-1_0-32bit-2.6.9-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208957" comment="libpython2_6-1_0-x86-2.6.9-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204781" comment="python-2.6.9-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202008" comment="python-32bit-2.6.9-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204782" comment="python-base-2.6.9-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204783" comment="python-base-32bit-2.6.9-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208958" comment="python-base-x86-2.6.9-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204784" comment="python-curses-2.6.9-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202009" comment="python-demo-2.6.9-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202011" comment="python-doc-2.6-8.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202012" comment="python-doc-pdf-2.6-8.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202013" comment="python-gdbm-2.6.9-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202014" comment="python-idle-2.6.9-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202015" comment="python-tk-2.6.9-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208959" comment="python-x86-2.6.9-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204785" comment="python-xml-2.6.9-0.25 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4242</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4242" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4242" source="CVE"/>
    <description>
    GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4242.html">CVE-2013-4242</cve>
<bugzilla href="https://bugzilla.suse.com/831359">SUSE bug 831359</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204016" comment="libgcrypt11-1.5.0-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204017" comment="libgcrypt11-32bit-1.5.0-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207866" comment="libgcrypt11-x86-1.5.0-0.15 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204016" comment="libgcrypt11-1.5.0-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204017" comment="libgcrypt11-32bit-1.5.0-0.15 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4243</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4243" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4243" source="CVE"/>
    <description>
    Heap-based buffer overflow in the readgifimage function in the gif2tiff tool in libtiff 4.0.3 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted height and width values in a GIF image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4243.html">CVE-2013-4243</cve>
<bugzilla href="https://bugzilla.suse.com/834779">SUSE bug 834779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200320" comment="libtiff3-3.8.2-141.154 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200321" comment="libtiff3-32bit-3.8.2-141.154 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200322" comment="libtiff3-x86-3.8.2-141.154 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200323" comment="tiff-3.8.2-141.154 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200320" comment="libtiff3-3.8.2-141.154 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200321" comment="libtiff3-32bit-3.8.2-141.154 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200323" comment="tiff-3.8.2-141.154 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4244</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4244" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4244" source="CVE"/>
    <description>
    The LZW decompressor in the gif2tiff tool in libtiff 4.0.3 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted GIF image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4244.html">CVE-2013-4244</cve>
<bugzilla href="https://bugzilla.suse.com/834788">SUSE bug 834788</bugzilla>
<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200320" comment="libtiff3-3.8.2-141.154 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200321" comment="libtiff3-32bit-3.8.2-141.154 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200322" comment="libtiff3-x86-3.8.2-141.154 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200323" comment="tiff-3.8.2-141.154 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200320" comment="libtiff3-3.8.2-141.154 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200321" comment="libtiff3-32bit-3.8.2-141.154 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200323" comment="tiff-3.8.2-141.154 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4245</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4245" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4245" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4245.html">CVE-2013-4245</cve>
<bugzilla href="https://bugzilla.suse.com/916835">SUSE bug 916835</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204740" comment="orca-2.28.3-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204741" comment="orca-lang-2.28.3-0.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4248</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4248" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4248" source="CVE"/>
    <description>
    The openssl_x509_parse function in openssl.c in the OpenSSL module in PHP before 5.4.18 and 5.5.x before 5.5.2 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4248.html">CVE-2013-4248</cve>
<bugzilla href="https://bugzilla.suse.com/837746">SUSE bug 837746</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214453" comment="apache2-mod_php53-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214454" comment="php53-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214455" comment="php53-bcmath-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214456" comment="php53-bz2-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214457" comment="php53-calendar-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214458" comment="php53-ctype-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214459" comment="php53-curl-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214460" comment="php53-dba-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214461" comment="php53-dom-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214462" comment="php53-exif-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214463" comment="php53-fastcgi-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214464" comment="php53-fileinfo-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214465" comment="php53-ftp-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214466" comment="php53-gd-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214467" comment="php53-gettext-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214468" comment="php53-gmp-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214469" comment="php53-iconv-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214470" comment="php53-intl-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214471" comment="php53-json-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214472" comment="php53-ldap-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214473" comment="php53-mbstring-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214474" comment="php53-mcrypt-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214475" comment="php53-mysql-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214476" comment="php53-odbc-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214477" comment="php53-openssl-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214478" comment="php53-pcntl-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214479" comment="php53-pdo-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214480" comment="php53-pear-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214481" comment="php53-pgsql-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214482" comment="php53-pspell-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214483" comment="php53-shmop-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214484" comment="php53-snmp-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214485" comment="php53-soap-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214486" comment="php53-suhosin-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214487" comment="php53-sysvmsg-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214488" comment="php53-sysvsem-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214489" comment="php53-sysvshm-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214490" comment="php53-tokenizer-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214491" comment="php53-wddx-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214492" comment="php53-xmlreader-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214493" comment="php53-xmlrpc-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214494" comment="php53-xmlwriter-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214495" comment="php53-xsl-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214496" comment="php53-zip-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214497" comment="php53-zlib-5.3.17-0.17 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134276" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4276</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4276" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4276" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in LittleCMS (aka lcms or liblcms) 1.19 and earlier allow remote attackers to cause a denial of service (crash) via a crafted (1) ICC color profile to the icctrans utility or (2) TIFF image to the tiffdiff utility.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4276.html">CVE-2013-4276</cve>
<bugzilla href="https://bugzilla.suse.com/843716">SUSE bug 843716</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200136" comment="lcms-1.17-77.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200137" comment="liblcms1-1.17-77.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200138" comment="liblcms1-32bit-1.17-77.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200139" comment="liblcms1-x86-1.17-77.16 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200136" comment="lcms-1.17-77.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200137" comment="liblcms1-1.17-77.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200138" comment="liblcms1-32bit-1.17-77.16 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4296</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4296" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4296" source="CVE"/>
    <description>
    The remoteDispatchDomainMemoryStats function in daemon/remote.c in libvirt 0.9.1 through 0.10.1.x, 0.10.2.x before 0.10.2.8, 1.0.x before 1.0.5.6, and 1.1.x before 1.1.2 allows remote authenticated users to cause a denial of service (uninitialized pointer dereference and crash) via a crafted RPC call.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4296.html">CVE-2013-4296</cve>
<bugzilla href="https://bugzilla.suse.com/836931">SUSE bug 836931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/838638">SUSE bug 838638</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214511" comment="libvirt-1.0.5.6-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214512" comment="libvirt-client-1.0.5.6-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204664" comment="libvirt-client-32bit-1.0.5.9-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214514" comment="libvirt-doc-1.0.5.6-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214516" comment="libvirt-lock-sanlock-1.0.5.6-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214515" comment="libvirt-python-1.0.5.6-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214511" comment="libvirt-1.0.5.6-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214512" comment="libvirt-client-1.0.5.6-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214513" comment="libvirt-client-32bit-1.0.5.6-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214514" comment="libvirt-doc-1.0.5.6-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214516" comment="libvirt-lock-sanlock-1.0.5.6-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214515" comment="libvirt-python-1.0.5.6-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134299" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4299</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4299" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4299" source="CVE"/>
    <description>
    Interpretation conflict in drivers/md/dm-snap-persistent.c in the Linux kernel through 3.11.6 allows remote authenticated users to obtain sensitive information or modify data via a crafted mapping to a snapshot block device.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4299.html">CVE-2013-4299</cve>
<bugzilla href="https://bugzilla.suse.com/846404">SUSE bug 846404</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213024" comment="kernel-default-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213025" comment="kernel-default-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213026" comment="kernel-default-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213028" comment="kernel-source-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213029" comment="kernel-syms-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213088" comment="kernel-trace-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213089" comment="kernel-trace-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213030" comment="kernel-trace-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4312</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2013-4312" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4312" source="CVE"/>
    <description>
    The Linux kernel before 4.4.1 allows local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket before closing it, related to net/unix/af_unix.c and net/unix/garbage.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4312.html">CVE-2013-4312</cve>
<bugzilla href="https://bugzilla.suse.com/839104">SUSE bug 839104</bugzilla>
<bugzilla href="https://bugzilla.suse.com/922947">SUSE bug 922947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/968014">SUSE bug 968014</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208598" comment="kernel-bigsmp-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208599" comment="kernel-bigsmp-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208600" comment="kernel-bigsmp-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205422" comment="kernel-default-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205423" comment="kernel-default-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205424" comment="kernel-default-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205425" comment="kernel-ec2-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205426" comment="kernel-ec2-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205427" comment="kernel-ec2-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205431" comment="kernel-source-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205432" comment="kernel-syms-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205433" comment="kernel-trace-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205434" comment="kernel-trace-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205435" comment="kernel-trace-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205436" comment="kernel-xen-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205437" comment="kernel-xen-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205438" comment="kernel-xen-devel-3.0.101-0.47.86 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208598" comment="kernel-bigsmp-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208599" comment="kernel-bigsmp-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208600" comment="kernel-bigsmp-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205422" comment="kernel-default-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205423" comment="kernel-default-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205424" comment="kernel-default-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208601" comment="kernel-default-man-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205425" comment="kernel-ec2-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205426" comment="kernel-ec2-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205427" comment="kernel-ec2-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205428" comment="kernel-pae-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205429" comment="kernel-pae-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205430" comment="kernel-pae-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205431" comment="kernel-source-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205432" comment="kernel-syms-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205433" comment="kernel-trace-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205434" comment="kernel-trace-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205435" comment="kernel-trace-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205436" comment="kernel-xen-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205437" comment="kernel-xen-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205438" comment="kernel-xen-devel-3.0.101-0.47.86 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4316</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4316" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4316" source="CVE"/>
    <description>
    Apache Struts 2.0.0 through 2.3.15.1 enables Dynamic Method Invocation by default, which has unknown impact and attack vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4316.html">CVE-2013-4316</cve>
<bugzilla href="https://bugzilla.suse.com/858823">SUSE bug 858823</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214536" comment="libmysql55client18-32bit-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4322</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4322" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4322" source="CVE"/>
    <description>
    Apache Tomcat before 6.0.39, 7.x before 7.0.50, and 8.x before 8.0.0-RC10 processes chunked transfer coding without properly handling (1) a large total amount of chunked data or (2) whitespace characters in an HTTP header value within a trailer field, which allows remote attackers to cause a denial of service by streaming data.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-3544.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4322.html">CVE-2013-4322</cve>
<bugzilla href="https://bugzilla.suse.com/865746">SUSE bug 865746</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209043" comment="libtcnative-1-0-1.3.3-12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200457" comment="tomcat6-6.0.41-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200458" comment="tomcat6-admin-webapps-6.0.41-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200459" comment="tomcat6-docs-webapp-6.0.41-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200460" comment="tomcat6-javadoc-6.0.41-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200461" comment="tomcat6-jsp-2_1-api-6.0.41-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200462" comment="tomcat6-lib-6.0.41-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200463" comment="tomcat6-servlet-2_5-api-6.0.41-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200464" comment="tomcat6-webapps-6.0.41-0.43 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4325</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4325" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4325" source="CVE"/>
    <description>
    The check_permission_v1 function in base/pkit.py in HP Linux Imaging and Printing (HPLIP) through 3.13.9 does not properly use D-Bus for communication with a polkit authority, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4325.html">CVE-2013-4325</cve>
<bugzilla href="https://bugzilla.suse.com/808355">SUSE bug 808355</bugzilla>
<bugzilla href="https://bugzilla.suse.com/836931">SUSE bug 836931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/836932">SUSE bug 836932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/836937">SUSE bug 836937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/852368">SUSE bug 852368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/864716">SUSE bug 864716</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200077" comment="hplip-3.11.10-0.6.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200078" comment="hplip-hpijs-3.11.10-0.6.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4332</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4332" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4332" source="CVE"/>
    <description>
    Multiple integer overflows in malloc/malloc.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allow context-dependent attackers to cause a denial of service (heap corruption) via a large value to the (1) pvalloc, (2) valloc, (3) posix_memalign, (4) memalign, or (5) aligned_alloc functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4332.html">CVE-2013-4332</cve>
<bugzilla href="https://bugzilla.suse.com/839870">SUSE bug 839870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/882910">SUSE bug 882910</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213314" comment="glibc-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204402" comment="glibc-32bit-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213316" comment="glibc-devel-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204404" comment="glibc-devel-32bit-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213334" comment="glibc-html-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213318" comment="glibc-i18ndata-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213335" comment="glibc-info-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213319" comment="glibc-locale-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204407" comment="glibc-locale-32bit-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208499" comment="glibc-locale-x86-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213336" comment="glibc-profile-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208501" comment="glibc-profile-32bit-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208502" comment="glibc-profile-x86-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208503" comment="glibc-x86-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213321" comment="nscd-2.11.3-17.56 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213314" comment="glibc-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213315" comment="glibc-32bit-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213316" comment="glibc-devel-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213317" comment="glibc-devel-32bit-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213334" comment="glibc-html-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213318" comment="glibc-i18ndata-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213335" comment="glibc-info-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213319" comment="glibc-locale-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213320" comment="glibc-locale-32bit-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213336" comment="glibc-profile-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213337" comment="glibc-profile-32bit-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213321" comment="nscd-2.11.3-17.56 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4342</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4342" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4342" source="CVE"/>
    <description>
    xinetd does not enforce the user and group configuration directives for TCPMUX services, which causes these services to be run as root and makes it easier for remote attackers to gain privileges by leveraging another vulnerability in a service.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4342.html">CVE-2013-4342</cve>
<bugzilla href="https://bugzilla.suse.com/844230">SUSE bug 844230</bugzilla>
<bugzilla href="https://bugzilla.suse.com/855685">SUSE bug 855685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/882917">SUSE bug 882917</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200482" comment="xinetd-2.3.14-130.133 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4344</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4344" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4344" source="CVE"/>
    <description>
    Buffer overflow in the SCSI implementation in QEMU, as used in Xen, when a SCSI controller has more than 256 attached devices, allows local users to gain privileges via a small transfer buffer in a REPORT LUNS command.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4344.html">CVE-2013-4344</cve>
<bugzilla href="https://bugzilla.suse.com/842006">SUSE bug 842006</bugzilla>
<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/880751">SUSE bug 880751</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214008" comment="kvm-1.4.2-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204923" comment="xen-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204924" comment="xen-doc-html-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204925" comment="xen-doc-pdf-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204926" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204927" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204928" comment="xen-libs-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204929" comment="xen-libs-32bit-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204930" comment="xen-tools-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204931" comment="xen-tools-domU-4.2.4_04-0.9 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214008" comment="kvm-1.4.2-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204923" comment="xen-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204924" comment="xen-doc-html-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204925" comment="xen-doc-pdf-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204926" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204928" comment="xen-libs-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204929" comment="xen-libs-32bit-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204930" comment="xen-tools-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204931" comment="xen-tools-domU-4.2.4_04-0.9 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4345</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4345" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4345" source="CVE"/>
    <description>
    Off-by-one error in the get_prng_bytes function in crypto/ansi_cprng.c in the Linux kernel through 3.11.4 makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via multiple requests for small amounts of data, leading to improper management of the state of the consumed data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4345.html">CVE-2013-4345</cve>
<bugzilla href="https://bugzilla.suse.com/840226">SUSE bug 840226</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214059" comment="kernel-default-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214060" comment="kernel-default-base-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214061" comment="kernel-default-devel-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214063" comment="kernel-source-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214064" comment="kernel-syms-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214103" comment="kernel-trace-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214104" comment="kernel-trace-base-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214065" comment="kernel-trace-devel-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4351</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4351" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4351" source="CVE"/>
    <description>
    GnuPG 1.4.x, 2.0.x, and 2.1.x treats a key flags subpacket with all bits cleared (no usage permitted) as if it has all bits set (all usage permitted), which might allow remote attackers to bypass intended cryptographic protection mechanisms by leveraging the subkey.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4351.html">CVE-2013-4351</cve>
<bugzilla href="https://bugzilla.suse.com/840510">SUSE bug 840510</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203950" comment="gpg2-2.0.9-25.33.37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203951" comment="gpg2-lang-2.0.9-25.33.37 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4355</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4355" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355" source="CVE"/>
    <description>
    Xen 4.3.x and earlier does not properly handle certain errors, which allows local HVM guests to obtain hypervisor stack memory via a (1) port or (2) memory mapped I/O write or (3) other unspecified operations related to addresses without associated memory.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4355.html">CVE-2013-4355</cve>
<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204896" comment="xen-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204897" comment="xen-doc-html-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204898" comment="xen-doc-pdf-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204899" comment="xen-kmp-default-4.2.3_02_3.0.93_0.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204900" comment="xen-kmp-pae-4.2.3_02_3.0.93_0.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204901" comment="xen-libs-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204902" comment="xen-libs-32bit-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204903" comment="xen-tools-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204904" comment="xen-tools-domU-4.2.3_02-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204896" comment="xen-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204897" comment="xen-doc-html-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204898" comment="xen-doc-pdf-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204899" comment="xen-kmp-default-4.2.3_02_3.0.93_0.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204901" comment="xen-libs-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204902" comment="xen-libs-32bit-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204903" comment="xen-tools-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204904" comment="xen-tools-domU-4.2.3_02-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4357</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4357" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4357" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4357.html">CVE-2013-4357</cve>
<bugzilla href="https://bugzilla.suse.com/844309">SUSE bug 844309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/883217">SUSE bug 883217</bugzilla>
<bugzilla href="https://bugzilla.suse.com/903057">SUSE bug 903057</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214570" comment="glibc-2.11.3-17.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204402" comment="glibc-32bit-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214572" comment="glibc-devel-2.11.3-17.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204404" comment="glibc-devel-32bit-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214578" comment="glibc-html-2.11.3-17.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214574" comment="glibc-i18ndata-2.11.3-17.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214579" comment="glibc-info-2.11.3-17.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214575" comment="glibc-locale-2.11.3-17.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204407" comment="glibc-locale-32bit-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208499" comment="glibc-locale-x86-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214580" comment="glibc-profile-2.11.3-17.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208501" comment="glibc-profile-32bit-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208502" comment="glibc-profile-x86-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208503" comment="glibc-x86-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214577" comment="nscd-2.11.3-17.62 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214570" comment="glibc-2.11.3-17.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214571" comment="glibc-32bit-2.11.3-17.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214572" comment="glibc-devel-2.11.3-17.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214573" comment="glibc-devel-32bit-2.11.3-17.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214578" comment="glibc-html-2.11.3-17.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214574" comment="glibc-i18ndata-2.11.3-17.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214579" comment="glibc-info-2.11.3-17.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214575" comment="glibc-locale-2.11.3-17.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214576" comment="glibc-locale-32bit-2.11.3-17.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214580" comment="glibc-profile-2.11.3-17.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214581" comment="glibc-profile-32bit-2.11.3-17.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214577" comment="nscd-2.11.3-17.62 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4361</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4361" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361" source="CVE"/>
    <description>
    The fbld instruction emulation in Xen 3.3.x through 4.3.x does not use the correct variable for the source effective address, which allows local HVM guests to obtain hypervisor stack information by reading the values used by the instruction.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4361.html">CVE-2013-4361</cve>
<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
<bugzilla href="https://bugzilla.suse.com/841766">SUSE bug 841766</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204896" comment="xen-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204897" comment="xen-doc-html-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204898" comment="xen-doc-pdf-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204899" comment="xen-kmp-default-4.2.3_02_3.0.93_0.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204900" comment="xen-kmp-pae-4.2.3_02_3.0.93_0.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204901" comment="xen-libs-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204902" comment="xen-libs-32bit-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204903" comment="xen-tools-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204904" comment="xen-tools-domU-4.2.3_02-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204896" comment="xen-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204897" comment="xen-doc-html-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204898" comment="xen-doc-pdf-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204899" comment="xen-kmp-default-4.2.3_02_3.0.93_0.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204901" comment="xen-libs-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204902" comment="xen-libs-32bit-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204903" comment="xen-tools-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204904" comment="xen-tools-domU-4.2.3_02-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4368</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4368" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368" source="CVE"/>
    <description>
    The outs instruction emulation in Xen 3.1.x, 4.2.x, 4.3.x, and earlier, when using FS: or GS: segment override, uses an uninitialized variable as a segment base, which allows local 64-bit PV guests to obtain sensitive information (hypervisor stack content) via unspecified vectors related to stale data in a segment register.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4368.html">CVE-2013-4368</cve>
<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
<bugzilla href="https://bugzilla.suse.com/842511">SUSE bug 842511</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204896" comment="xen-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204897" comment="xen-doc-html-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204898" comment="xen-doc-pdf-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204899" comment="xen-kmp-default-4.2.3_02_3.0.93_0.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204900" comment="xen-kmp-pae-4.2.3_02_3.0.93_0.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204901" comment="xen-libs-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204902" comment="xen-libs-32bit-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204903" comment="xen-tools-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204904" comment="xen-tools-domU-4.2.3_02-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204896" comment="xen-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204897" comment="xen-doc-html-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204898" comment="xen-doc-pdf-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204899" comment="xen-kmp-default-4.2.3_02_3.0.93_0.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204901" comment="xen-libs-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204902" comment="xen-libs-32bit-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204903" comment="xen-tools-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204904" comment="xen-tools-domU-4.2.3_02-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4369</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4369" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4369" source="CVE"/>
    <description>
    The xlu_vif_parse_rate function in the libxlu library in Xen 4.2.x and 4.3.x allows local users to cause a denial of service (NULL pointer dereference) by using the "@" character as the VIF rate configuration.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4369.html">CVE-2013-4369</cve>
<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
<bugzilla href="https://bugzilla.suse.com/842512">SUSE bug 842512</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204896" comment="xen-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204897" comment="xen-doc-html-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204898" comment="xen-doc-pdf-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204899" comment="xen-kmp-default-4.2.3_02_3.0.93_0.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204900" comment="xen-kmp-pae-4.2.3_02_3.0.93_0.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204901" comment="xen-libs-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204902" comment="xen-libs-32bit-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204903" comment="xen-tools-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204904" comment="xen-tools-domU-4.2.3_02-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204896" comment="xen-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204897" comment="xen-doc-html-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204898" comment="xen-doc-pdf-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204899" comment="xen-kmp-default-4.2.3_02_3.0.93_0.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204901" comment="xen-libs-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204902" comment="xen-libs-32bit-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204903" comment="xen-tools-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204904" comment="xen-tools-domU-4.2.3_02-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4370</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4370" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4370" source="CVE"/>
    <description>
    The ocaml binding for the xc_vcpu_getaffinity function in Xen 4.2.x and 4.3.x frees certain memory that may still be intended for use, which allows local users to cause a denial of service (heap corruption and crash) and possibly execute arbitrary code via unspecified vectors that trigger a (1) use-after-free or (2) double free.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4370.html">CVE-2013-4370</cve>
<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
<bugzilla href="https://bugzilla.suse.com/842513">SUSE bug 842513</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204896" comment="xen-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204897" comment="xen-doc-html-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204898" comment="xen-doc-pdf-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204899" comment="xen-kmp-default-4.2.3_02_3.0.93_0.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204900" comment="xen-kmp-pae-4.2.3_02_3.0.93_0.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204901" comment="xen-libs-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204902" comment="xen-libs-32bit-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204903" comment="xen-tools-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204904" comment="xen-tools-domU-4.2.3_02-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204896" comment="xen-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204897" comment="xen-doc-html-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204898" comment="xen-doc-pdf-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204899" comment="xen-kmp-default-4.2.3_02_3.0.93_0.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204901" comment="xen-libs-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204902" comment="xen-libs-32bit-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204903" comment="xen-tools-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204904" comment="xen-tools-domU-4.2.3_02-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4371</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4371" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4371" source="CVE"/>
    <description>
    Use-after-free vulnerability in the libxl_list_cpupool function in the libxl toolstack library in Xen 4.2.x and 4.3.x, when running "under memory pressure," returns the original pointer when the realloc function fails, which allows local users to cause a denial of service (heap corruption and crash) and possibly execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4371.html">CVE-2013-4371</cve>
<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
<bugzilla href="https://bugzilla.suse.com/842514">SUSE bug 842514</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204896" comment="xen-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204897" comment="xen-doc-html-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204898" comment="xen-doc-pdf-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204899" comment="xen-kmp-default-4.2.3_02_3.0.93_0.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204900" comment="xen-kmp-pae-4.2.3_02_3.0.93_0.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204901" comment="xen-libs-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204902" comment="xen-libs-32bit-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204903" comment="xen-tools-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204904" comment="xen-tools-domU-4.2.3_02-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204896" comment="xen-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204897" comment="xen-doc-html-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204898" comment="xen-doc-pdf-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204899" comment="xen-kmp-default-4.2.3_02_3.0.93_0.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204901" comment="xen-libs-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204902" comment="xen-libs-32bit-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204903" comment="xen-tools-4.2.3_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204904" comment="xen-tools-domU-4.2.3_02-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4375</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4375" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4375" source="CVE"/>
    <description>
    The qdisk PV disk backend in qemu-xen in Xen 4.2.x and 4.3.x before 4.3.1, and qemu 1.1 and other versions, allows local HVM guests to cause a denial of service (domain grant reference consumption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4375.html">CVE-2013-4375</cve>
<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
<bugzilla href="https://bugzilla.suse.com/842515">SUSE bug 842515</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204905" comment="xen-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204906" comment="xen-doc-html-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204907" comment="xen-doc-pdf-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204908" comment="xen-kmp-default-4.2.3_08_3.0.101_0.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204909" comment="xen-kmp-pae-4.2.3_08_3.0.101_0.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204910" comment="xen-libs-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204911" comment="xen-libs-32bit-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204912" comment="xen-tools-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204913" comment="xen-tools-domU-4.2.3_08-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204905" comment="xen-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204906" comment="xen-doc-html-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204907" comment="xen-doc-pdf-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204908" comment="xen-kmp-default-4.2.3_08_3.0.101_0.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204910" comment="xen-libs-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204911" comment="xen-libs-32bit-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204912" comment="xen-tools-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204913" comment="xen-tools-domU-4.2.3_08-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4396</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4396" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4396" source="CVE"/>
    <description>
    Use-after-free vulnerability in the doImageText function in dix/dixfonts.c in the xorg-server module before 1.14.4 in X.Org X11 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted ImageText request that triggers memory-allocation failure.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4396.html">CVE-2013-4396</cve>
<bugzilla href="https://bugzilla.suse.com/843652">SUSE bug 843652</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214585" comment="xorg-x11-Xvnc-7.4-27.83 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214586" comment="xorg-x11-server-7.4-27.83 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214587" comment="xorg-x11-server-extra-7.4-27.83 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4402</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4402" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4402" source="CVE"/>
    <description>
    The compressed packet parser in GnuPG 1.4.x before 1.4.15 and 2.0.x before 2.0.22 allows remote attackers to cause a denial of service (infinite recursion) via a crafted OpenPGP message.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4402.html">CVE-2013-4402</cve>
<bugzilla href="https://bugzilla.suse.com/844175">SUSE bug 844175</bugzilla>
<bugzilla href="https://bugzilla.suse.com/941439">SUSE bug 941439</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203950" comment="gpg2-2.0.9-25.33.37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203951" comment="gpg2-lang-2.0.9-25.33.37 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4408</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4408" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4408" source="CVE"/>
    <description>
    Heap-based buffer overflow in the dcerpc_read_ncacn_packet_done function in librpc/rpc/dcerpc_util.c in winbindd in Samba 3.x before 3.6.22, 4.0.x before 4.0.13, and 4.1.x before 4.1.3 allows remote AD domain controllers to execute arbitrary code via an invalid fragment length in a DCE-RPC packet.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4408.html">CVE-2013-4408</cve>
<bugzilla href="https://bugzilla.suse.com/844720">SUSE bug 844720</bugzilla>
<bugzilla href="https://bugzilla.suse.com/848101">SUSE bug 848101</bugzilla>
<bugzilla href="https://bugzilla.suse.com/882906">SUSE bug 882906</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213451" comment="ldapsmb-1.34b-12.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213413" comment="libldb1-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213415" comment="libsmbclient0-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204235" comment="libsmbclient0-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208444" comment="libsmbclient0-x86-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213417" comment="libtalloc2-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204237" comment="libtalloc2-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208445" comment="libtalloc2-x86-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213419" comment="libtdb1-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204239" comment="libtdb1-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208446" comment="libtdb1-x86-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213421" comment="libtevent0-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204241" comment="libtevent0-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213423" comment="libwbclient0-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204243" comment="libwbclient0-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208447" comment="libwbclient0-x86-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213425" comment="samba-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204245" comment="samba-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213427" comment="samba-client-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204247" comment="samba-client-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208448" comment="samba-client-x86-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213429" comment="samba-doc-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213430" comment="samba-krb-printing-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213431" comment="samba-winbind-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204251" comment="samba-winbind-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208449" comment="samba-winbind-x86-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208450" comment="samba-x86-3.6.3-0.52 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213451" comment="ldapsmb-1.34b-12.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213413" comment="libldb1-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213415" comment="libsmbclient0-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213416" comment="libsmbclient0-32bit-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213417" comment="libtalloc2-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213418" comment="libtalloc2-32bit-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213419" comment="libtdb1-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213420" comment="libtdb1-32bit-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213421" comment="libtevent0-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213422" comment="libtevent0-32bit-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213423" comment="libwbclient0-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213424" comment="libwbclient0-32bit-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213425" comment="samba-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213426" comment="samba-32bit-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213427" comment="samba-client-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213428" comment="samba-client-32bit-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213429" comment="samba-doc-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213430" comment="samba-krb-printing-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213431" comment="samba-winbind-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213432" comment="samba-winbind-32bit-3.6.3-0.46 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4416</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4416" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4416" source="CVE"/>
    <description>
    The Ocaml xenstored implementation (oxenstored) in Xen 4.1.x, 4.2.x, and 4.3.x allows local guest domains to cause a denial of service (domain shutdown) via a large message reply.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4416.html">CVE-2013-4416</cve>
<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
<bugzilla href="https://bugzilla.suse.com/845520">SUSE bug 845520</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204905" comment="xen-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204906" comment="xen-doc-html-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204907" comment="xen-doc-pdf-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204908" comment="xen-kmp-default-4.2.3_08_3.0.101_0.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204909" comment="xen-kmp-pae-4.2.3_08_3.0.101_0.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204910" comment="xen-libs-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204911" comment="xen-libs-32bit-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204912" comment="xen-tools-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204913" comment="xen-tools-domU-4.2.3_08-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204905" comment="xen-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204906" comment="xen-doc-html-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204907" comment="xen-doc-pdf-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204908" comment="xen-kmp-default-4.2.3_08_3.0.101_0.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204910" comment="xen-libs-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204911" comment="xen-libs-32bit-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204912" comment="xen-tools-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204913" comment="xen-tools-domU-4.2.3_08-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4419</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4419" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4419" source="CVE"/>
    <description>
    The guestfish command in libguestfs 1.20.12, 1.22.7, and earlier, when using the --remote or --listen option, does not properly check the ownership of /tmp/.guestfish-$UID/ when creating a temporary socket file in this directory, which allows local users to write to the socket and execute arbitrary commands by creating /tmp/.guestfish-$UID/ in advance.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4419.html">CVE-2013-4419</cve>
<bugzilla href="https://bugzilla.suse.com/845720">SUSE bug 845720</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208533" comment="guestfs-data-1.20.4-0.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208534" comment="guestfs-tools-1.20.4-0.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208535" comment="guestfsd-1.20.4-0.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208536" comment="libguestfs0-1.20.4-0.18 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4449</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4449" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4449" source="CVE"/>
    <description>
    The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not properly count references, which allows remote attackers to cause a denial of service (slapd crash) by unbinding immediately after a search request, which triggers rwm_conn_destroy to free the session context while it is being used by rwm_op_search.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4449.html">CVE-2013-4449</cve>
<bugzilla href="https://bugzilla.suse.com/846389">SUSE bug 846389</bugzilla>
<bugzilla href="https://bugzilla.suse.com/905959">SUSE bug 905959</bugzilla>
<bugzilla href="https://bugzilla.suse.com/916897">SUSE bug 916897</bugzilla>
<bugzilla href="https://bugzilla.suse.com/916914">SUSE bug 916914</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199952" comment="compat-libldap-2_3-0-2.3.37-2.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199953" comment="libldap-2_4-2-2.4.26-0.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199954" comment="libldap-2_4-2-32bit-2.4.26-0.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199955" comment="libldap-2_4-2-x86-2.4.26-0.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199956" comment="openldap2-2.4.26-0.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199957" comment="openldap2-back-meta-2.4.26-0.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199958" comment="openldap2-client-2.4.26-0.30 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199952" comment="compat-libldap-2_3-0-2.3.37-2.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199953" comment="libldap-2_4-2-2.4.26-0.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199954" comment="libldap-2_4-2-32bit-2.4.26-0.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199956" comment="openldap2-2.4.26-0.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199957" comment="openldap2-back-meta-2.4.26-0.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199958" comment="openldap2-client-2.4.26-0.30 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4458</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4458" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4458" source="CVE"/>
    <description>
    Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.18 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of AF_INET6 address results.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1914.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4458.html">CVE-2013-4458</cve>
<bugzilla href="https://bugzilla.suse.com/847227">SUSE bug 847227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/883217">SUSE bug 883217</bugzilla>
<bugzilla href="https://bugzilla.suse.com/941444">SUSE bug 941444</bugzilla>
<bugzilla href="https://bugzilla.suse.com/955181">SUSE bug 955181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/967023">SUSE bug 967023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980483">SUSE bug 980483</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214570" comment="glibc-2.11.3-17.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204402" comment="glibc-32bit-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214572" comment="glibc-devel-2.11.3-17.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204404" comment="glibc-devel-32bit-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214578" comment="glibc-html-2.11.3-17.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214574" comment="glibc-i18ndata-2.11.3-17.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214579" comment="glibc-info-2.11.3-17.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214575" comment="glibc-locale-2.11.3-17.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204407" comment="glibc-locale-32bit-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208499" comment="glibc-locale-x86-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214580" comment="glibc-profile-2.11.3-17.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208501" comment="glibc-profile-32bit-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208502" comment="glibc-profile-x86-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208503" comment="glibc-x86-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214577" comment="nscd-2.11.3-17.62 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214570" comment="glibc-2.11.3-17.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214571" comment="glibc-32bit-2.11.3-17.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214572" comment="glibc-devel-2.11.3-17.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214573" comment="glibc-devel-32bit-2.11.3-17.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214578" comment="glibc-html-2.11.3-17.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214574" comment="glibc-i18ndata-2.11.3-17.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214579" comment="glibc-info-2.11.3-17.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214575" comment="glibc-locale-2.11.3-17.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214576" comment="glibc-locale-32bit-2.11.3-17.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214580" comment="glibc-profile-2.11.3-17.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214581" comment="glibc-profile-32bit-2.11.3-17.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214577" comment="nscd-2.11.3-17.62 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4470</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4470" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4470" source="CVE"/>
    <description>
    The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsockopt system call and sends both short and long packets, related to the ip_ufo_append_data function in net/ipv4/ip_output.c and the ip6_ufo_append_data function in net/ipv6/ip6_output.c.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4470.html">CVE-2013-4470</cve>
<bugzilla href="https://bugzilla.suse.com/847672">SUSE bug 847672</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214590" comment="kernel-default-3.0.101-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214591" comment="kernel-default-base-3.0.101-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214592" comment="kernel-default-devel-3.0.101-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214594" comment="kernel-source-3.0.101-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214595" comment="kernel-syms-3.0.101-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214648" comment="kernel-trace-3.0.101-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214649" comment="kernel-trace-base-3.0.101-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214596" comment="kernel-trace-devel-3.0.101-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4475</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4475" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4475" source="CVE"/>
    <description>
    Samba 3.2.x through 3.6.x before 3.6.20, 4.0.x before 4.0.11, and 4.1.x before 4.1.1, when vfs_streams_depot or vfs_streams_xattr is enabled, allows remote attackers to bypass intended file restrictions by leveraging ACL differences between a file and an associated alternate data stream (ADS).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4475.html">CVE-2013-4475</cve>
<bugzilla href="https://bugzilla.suse.com/848101">SUSE bug 848101</bugzilla>
<bugzilla href="https://bugzilla.suse.com/880220">SUSE bug 880220</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213451" comment="ldapsmb-1.34b-12.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213413" comment="libldb1-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213415" comment="libsmbclient0-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204235" comment="libsmbclient0-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208444" comment="libsmbclient0-x86-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213417" comment="libtalloc2-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204237" comment="libtalloc2-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208445" comment="libtalloc2-x86-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213419" comment="libtdb1-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204239" comment="libtdb1-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208446" comment="libtdb1-x86-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213421" comment="libtevent0-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204241" comment="libtevent0-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213423" comment="libwbclient0-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204243" comment="libwbclient0-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208447" comment="libwbclient0-x86-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213425" comment="samba-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204245" comment="samba-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213427" comment="samba-client-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204247" comment="samba-client-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208448" comment="samba-client-x86-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213429" comment="samba-doc-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213430" comment="samba-krb-printing-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213431" comment="samba-winbind-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204251" comment="samba-winbind-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208449" comment="samba-winbind-x86-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208450" comment="samba-x86-3.6.3-0.52 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213451" comment="ldapsmb-1.34b-12.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213413" comment="libldb1-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213415" comment="libsmbclient0-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213416" comment="libsmbclient0-32bit-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213417" comment="libtalloc2-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213418" comment="libtalloc2-32bit-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213419" comment="libtdb1-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213420" comment="libtdb1-32bit-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213421" comment="libtevent0-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213422" comment="libtevent0-32bit-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213423" comment="libwbclient0-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213424" comment="libwbclient0-32bit-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213425" comment="samba-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213426" comment="samba-32bit-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213427" comment="samba-client-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213428" comment="samba-client-32bit-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213429" comment="samba-doc-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213430" comment="samba-krb-printing-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213431" comment="samba-winbind-3.6.3-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213432" comment="samba-winbind-32bit-3.6.3-0.46 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4483</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4483" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4483" source="CVE"/>
    <description>
    The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4483.html">CVE-2013-4483</cve>
<bugzilla href="https://bugzilla.suse.com/848321">SUSE bug 848321</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214059" comment="kernel-default-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214060" comment="kernel-default-base-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214061" comment="kernel-default-devel-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214063" comment="kernel-source-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214064" comment="kernel-syms-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214103" comment="kernel-trace-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214104" comment="kernel-trace-base-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214065" comment="kernel-trace-devel-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4494</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4494" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494" source="CVE"/>
    <description>
    Xen before 4.1.x, 4.2.x, and 4.3.x does not take the page_alloc_lock and grant_table.lock in the same order, which allows local guest administrators with access to multiple vcpus to cause a denial of service (host deadlock) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4494.html">CVE-2013-4494</cve>
<bugzilla href="https://bugzilla.suse.com/848657">SUSE bug 848657</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204905" comment="xen-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204906" comment="xen-doc-html-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204907" comment="xen-doc-pdf-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204908" comment="xen-kmp-default-4.2.3_08_3.0.101_0.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204909" comment="xen-kmp-pae-4.2.3_08_3.0.101_0.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204910" comment="xen-libs-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204911" comment="xen-libs-32bit-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204912" comment="xen-tools-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204913" comment="xen-tools-domU-4.2.3_08-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204905" comment="xen-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204906" comment="xen-doc-html-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204907" comment="xen-doc-pdf-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204908" comment="xen-kmp-default-4.2.3_08_3.0.101_0.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204910" comment="xen-libs-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204911" comment="xen-libs-32bit-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204912" comment="xen-tools-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204913" comment="xen-tools-domU-4.2.3_08-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4496</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4496" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4496" source="CVE"/>
    <description>
    Samba 3.x before 3.6.23, 4.0.x before 4.0.16, and 4.1.x before 4.1.6 does not enforce the password-guessing protection mechanism for all interfaces, which makes it easier for remote attackers to obtain access via brute-force ChangePasswordUser2 (1) SAMR or (2) RAP attempts.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4496.html">CVE-2013-4496</cve>
<bugzilla href="https://bugzilla.suse.com/849224">SUSE bug 849224</bugzilla>
<bugzilla href="https://bugzilla.suse.com/866844">SUSE bug 866844</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214708" comment="ldapsmb-1.34b-12.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214668" comment="libldb1-3.6.3-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214670" comment="libsmbclient0-3.6.3-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204235" comment="libsmbclient0-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208444" comment="libsmbclient0-x86-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214672" comment="libtalloc2-3.6.3-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204237" comment="libtalloc2-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208445" comment="libtalloc2-x86-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214674" comment="libtdb1-3.6.3-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204239" comment="libtdb1-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208446" comment="libtdb1-x86-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214676" comment="libtevent0-3.6.3-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204241" comment="libtevent0-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214678" comment="libwbclient0-3.6.3-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204243" comment="libwbclient0-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208447" comment="libwbclient0-x86-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214680" comment="samba-3.6.3-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204245" comment="samba-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214682" comment="samba-client-3.6.3-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204247" comment="samba-client-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208448" comment="samba-client-x86-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214684" comment="samba-doc-3.6.3-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214685" comment="samba-krb-printing-3.6.3-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214686" comment="samba-winbind-3.6.3-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204251" comment="samba-winbind-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208449" comment="samba-winbind-x86-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208450" comment="samba-x86-3.6.3-0.52 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214708" comment="ldapsmb-1.34b-12.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214668" comment="libldb1-3.6.3-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214670" comment="libsmbclient0-3.6.3-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214671" comment="libsmbclient0-32bit-3.6.3-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214672" comment="libtalloc2-3.6.3-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214673" comment="libtalloc2-32bit-3.6.3-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214674" comment="libtdb1-3.6.3-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214675" comment="libtdb1-32bit-3.6.3-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214676" comment="libtevent0-3.6.3-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214677" comment="libtevent0-32bit-3.6.3-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214678" comment="libwbclient0-3.6.3-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214679" comment="libwbclient0-32bit-3.6.3-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214680" comment="samba-3.6.3-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214681" comment="samba-32bit-3.6.3-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214682" comment="samba-client-3.6.3-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214683" comment="samba-client-32bit-3.6.3-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214684" comment="samba-doc-3.6.3-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214685" comment="samba-krb-printing-3.6.3-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214686" comment="samba-winbind-3.6.3-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214687" comment="samba-winbind-32bit-3.6.3-0.50 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4511" source="CVE"/>
    <description>
    Multiple integer overflows in Alchemy LCD frame-buffer drivers in the Linux kernel before 3.12 allow local users to create a read-write memory mapping for the entirety of kernel memory, and consequently gain privileges, via crafted mmap operations, related to the (1) au1100fb_fb_mmap function in drivers/video/au1100fb.c and the (2) au1200fb_fb_mmap function in drivers/video/au1200fb.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4511.html">CVE-2013-4511</cve>
<bugzilla href="https://bugzilla.suse.com/849021">SUSE bug 849021</bugzilla>
<bugzilla href="https://bugzilla.suse.com/850263">SUSE bug 850263</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214059" comment="kernel-default-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214060" comment="kernel-default-base-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214061" comment="kernel-default-devel-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214063" comment="kernel-source-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214064" comment="kernel-syms-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214103" comment="kernel-trace-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214104" comment="kernel-trace-base-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214065" comment="kernel-trace-devel-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4514</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4514" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4514" source="CVE"/>
    <description>
    Multiple buffer overflows in drivers/staging/wlags49_h2/wl_priv.c in the Linux kernel before 3.12 allow local users to cause a denial of service or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability and providing a long station-name string, related to the (1) wvlan_uil_put_info and (2) wvlan_set_station_nickname functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4514.html">CVE-2013-4514</cve>
<bugzilla href="https://bugzilla.suse.com/849029">SUSE bug 849029</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214059" comment="kernel-default-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214060" comment="kernel-default-base-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214061" comment="kernel-default-devel-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214063" comment="kernel-source-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214064" comment="kernel-syms-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214103" comment="kernel-trace-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214104" comment="kernel-trace-base-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214065" comment="kernel-trace-devel-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4515</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4515" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4515" source="CVE"/>
    <description>
    The bcm_char_ioctl function in drivers/staging/bcm/Bcmchar.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory via an IOCTL_BCM_GET_DEVICE_DRIVER_INFO ioctl call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4515.html">CVE-2013-4515</cve>
<bugzilla href="https://bugzilla.suse.com/849034">SUSE bug 849034</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214059" comment="kernel-default-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214060" comment="kernel-default-base-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214061" comment="kernel-default-devel-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214063" comment="kernel-source-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214064" comment="kernel-syms-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214103" comment="kernel-trace-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214104" comment="kernel-trace-base-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214065" comment="kernel-trace-devel-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4527</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4527" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4527" source="CVE"/>
    <description>
    Buffer overflow in hw/timer/hpet.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via vectors related to the number of timers.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4527.html">CVE-2013-4527</cve>
<bugzilla href="https://bugzilla.suse.com/864673">SUSE bug 864673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/964746">SUSE bug 964746</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209045" comment="xen-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209046" comment="xen-doc-html-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209047" comment="xen-doc-pdf-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209048" comment="xen-kmp-default-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209049" comment="xen-kmp-pae-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209050" comment="xen-libs-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209051" comment="xen-libs-32bit-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209052" comment="xen-tools-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209053" comment="xen-tools-domU-4.2.5_20-24 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4529</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4529" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4529" source="CVE"/>
    <description>
    Buffer overflow in hw/pci/pcie_aer.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a large log_num value in a savevm image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4529.html">CVE-2013-4529</cve>
<bugzilla href="https://bugzilla.suse.com/864678">SUSE bug 864678</bugzilla>
<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/964929">SUSE bug 964929</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209045" comment="xen-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209046" comment="xen-doc-html-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209047" comment="xen-doc-pdf-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209048" comment="xen-kmp-default-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209049" comment="xen-kmp-pae-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209050" comment="xen-libs-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209051" comment="xen-libs-32bit-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209052" comment="xen-tools-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209053" comment="xen-tools-domU-4.2.5_20-24 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4530</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4530" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4530" source="CVE"/>
    <description>
    Buffer overflow in hw/ssi/pl022.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service or possibly execute arbitrary code via crafted tx_fifo_head and rx_fifo_head values in a savevm image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4530.html">CVE-2013-4530</cve>
<bugzilla href="https://bugzilla.suse.com/864682">SUSE bug 864682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/964950">SUSE bug 964950</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209045" comment="xen-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209046" comment="xen-doc-html-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209047" comment="xen-doc-pdf-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209048" comment="xen-kmp-default-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209049" comment="xen-kmp-pae-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209050" comment="xen-libs-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209051" comment="xen-libs-32bit-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209052" comment="xen-tools-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209053" comment="xen-tools-domU-4.2.5_20-24 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4533</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4533" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4533" source="CVE"/>
    <description>
    Buffer overflow in the pxa2xx_ssp_load function in hw/arm/pxa2xx.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted s-&gt;rx_level value in a savevm image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4533.html">CVE-2013-4533</cve>
<bugzilla href="https://bugzilla.suse.com/864655">SUSE bug 864655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/964644">SUSE bug 964644</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209045" comment="xen-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209046" comment="xen-doc-html-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209047" comment="xen-doc-pdf-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209048" comment="xen-kmp-default-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209049" comment="xen-kmp-pae-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209050" comment="xen-libs-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209051" comment="xen-libs-32bit-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209052" comment="xen-tools-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209053" comment="xen-tools-domU-4.2.5_20-24 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4534</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4534" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4534" source="CVE"/>
    <description>
    Buffer overflow in hw/intc/openpic.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service or possibly execute arbitrary code via vectors related to IRQDest elements.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4534.html">CVE-2013-4534</cve>
<bugzilla href="https://bugzilla.suse.com/864811">SUSE bug 864811</bugzilla>
<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/964452">SUSE bug 964452</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209045" comment="xen-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209046" comment="xen-doc-html-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209047" comment="xen-doc-pdf-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209048" comment="xen-kmp-default-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209049" comment="xen-kmp-pae-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209050" comment="xen-libs-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209051" comment="xen-libs-32bit-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209052" comment="xen-tools-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209053" comment="xen-tools-domU-4.2.5_20-24 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4537</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4537" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4537" source="CVE"/>
    <description>
    The ssi_sd_transfer function in hw/sd/ssi-sd.c in QEMU before 1.7.2 allows remote attackers to execute arbitrary code via a crafted arglen value in a savevm image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4537.html">CVE-2013-4537</cve>
<bugzilla href="https://bugzilla.suse.com/864391">SUSE bug 864391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962642">SUSE bug 962642</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209045" comment="xen-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209046" comment="xen-doc-html-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209047" comment="xen-doc-pdf-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209048" comment="xen-kmp-default-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209049" comment="xen-kmp-pae-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209050" comment="xen-libs-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209051" comment="xen-libs-32bit-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209052" comment="xen-tools-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209053" comment="xen-tools-domU-4.2.5_20-24 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4538</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4538" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4538" source="CVE"/>
    <description>
    Multiple buffer overflows in the ssd0323_load function in hw/display/ssd0323.c in QEMU before 1.7.2 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via crafted (1) cmd_len, (2) row, or (3) col values; (4) row_start and row_end values; or (5) col_star and col_end values in a savevm image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4538.html">CVE-2013-4538</cve>
<bugzilla href="https://bugzilla.suse.com/864769">SUSE bug 864769</bugzilla>
<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962335">SUSE bug 962335</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209045" comment="xen-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209046" comment="xen-doc-html-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209047" comment="xen-doc-pdf-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209048" comment="xen-kmp-default-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209049" comment="xen-kmp-pae-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209050" comment="xen-libs-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209051" comment="xen-libs-32bit-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209052" comment="xen-tools-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209053" comment="xen-tools-domU-4.2.5_20-24 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4539</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4539" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4539" source="CVE"/>
    <description>
    Multiple buffer overflows in the tsc210x_load function in hw/input/tsc210x.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted (1) precision, (2) nextprecision, (3) function, or (4) nextfunction value in a savevm image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4539.html">CVE-2013-4539</cve>
<bugzilla href="https://bugzilla.suse.com/864805">SUSE bug 864805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962758">SUSE bug 962758</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209045" comment="xen-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209046" comment="xen-doc-html-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209047" comment="xen-doc-pdf-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209048" comment="xen-kmp-default-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209049" comment="xen-kmp-pae-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209050" comment="xen-libs-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209051" comment="xen-libs-32bit-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209052" comment="xen-tools-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209053" comment="xen-tools-domU-4.2.5_20-24 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4540</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4540" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4540" source="CVE"/>
    <description>
    Buffer overflow in scoop_gpio_handler_update in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a large (1) prev_level, (2) gpio_level, or (3) gpio_dir value in a savevm image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4540.html">CVE-2013-4540</cve>
<bugzilla href="https://bugzilla.suse.com/864801">SUSE bug 864801</bugzilla>
<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/880751">SUSE bug 880751</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204923" comment="xen-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204924" comment="xen-doc-html-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204925" comment="xen-doc-pdf-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204926" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204927" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204928" comment="xen-libs-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204929" comment="xen-libs-32bit-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204930" comment="xen-tools-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204931" comment="xen-tools-domU-4.2.4_04-0.9 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204923" comment="xen-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204924" comment="xen-doc-html-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204925" comment="xen-doc-pdf-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204926" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204928" comment="xen-libs-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204929" comment="xen-libs-32bit-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204930" comment="xen-tools-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204931" comment="xen-tools-domU-4.2.4_04-0.9 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4541</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4541" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4541" source="CVE"/>
    <description>
    The usb_device_post_load function in hw/usb/bus.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted savevm image, related to a negative setup_len or setup_index value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4541.html">CVE-2013-4541</cve>
<bugzilla href="https://bugzilla.suse.com/864802">SUSE bug 864802</bugzilla>
<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214008" comment="kvm-1.4.2-0.11 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4545</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4545" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4545" source="CVE"/>
    <description>
    cURL and libcurl 7.18.0 through 7.32.0, when built with OpenSSL, disables the certificate CN and SAN name field verification (CURLOPT_SSL_VERIFYHOST) when the digital signature verification (CURLOPT_SSL_VERIFYPEER) is disabled, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4545.html">CVE-2013-4545</cve>
<bugzilla href="https://bugzilla.suse.com/849596">SUSE bug 849596</bugzilla>
<bugzilla href="https://bugzilla.suse.com/870444">SUSE bug 870444</bugzilla>
<bugzilla href="https://bugzilla.suse.com/880252">SUSE bug 880252</bugzilla>
<bugzilla href="https://bugzilla.suse.com/882520">SUSE bug 882520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/924250">SUSE bug 924250</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214723" comment="curl-7.19.7-1.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214724" comment="libcurl4-7.19.7-1.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204266" comment="libcurl4-32bit-7.19.7-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208452" comment="libcurl4-x86-7.19.7-1.38 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214723" comment="curl-7.19.7-1.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214724" comment="libcurl4-7.19.7-1.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214725" comment="libcurl4-32bit-7.19.7-1.30 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4549</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4549" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4549" source="CVE"/>
    <description>
    QXmlSimpleReader in Qt before 5.2 allows context-dependent attackers to cause a denial of service (memory consumption) via an XML Entity Expansion (XEE) attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4549.html">CVE-2013-4549</cve>
<bugzilla href="https://bugzilla.suse.com/1039291">SUSE bug 1039291</bugzilla>
<bugzilla href="https://bugzilla.suse.com/856832">SUSE bug 856832</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204587" comment="libQtWebKit4-4.6.3-5.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201763" comment="libQtWebKit4-32bit-4.6.3-5.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201764" comment="libQtWebKit4-x86-4.6.3-5.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204588" comment="libqt4-4.6.3-5.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204589" comment="libqt4-32bit-4.6.3-5.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204590" comment="libqt4-qt3support-4.6.3-5.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204591" comment="libqt4-qt3support-32bit-4.6.3-5.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208730" comment="libqt4-qt3support-x86-4.6.3-5.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204592" comment="libqt4-sql-4.6.3-5.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204593" comment="libqt4-sql-32bit-4.6.3-5.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204594" comment="libqt4-sql-mysql-4.6.3-5.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204595" comment="libqt4-sql-sqlite-4.6.3-5.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208731" comment="libqt4-sql-x86-4.6.3-5.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204596" comment="libqt4-x11-4.6.3-5.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204597" comment="libqt4-x11-32bit-4.6.3-5.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208732" comment="libqt4-x11-x86-4.6.3-5.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208733" comment="libqt4-x86-4.6.3-5.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208734" comment="qt4-x11-tools-4.6.3-5.29 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204587" comment="libQtWebKit4-4.6.3-5.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201763" comment="libQtWebKit4-32bit-4.6.3-5.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204588" comment="libqt4-4.6.3-5.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204589" comment="libqt4-32bit-4.6.3-5.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204590" comment="libqt4-qt3support-4.6.3-5.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204591" comment="libqt4-qt3support-32bit-4.6.3-5.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204592" comment="libqt4-sql-4.6.3-5.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204593" comment="libqt4-sql-32bit-4.6.3-5.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204594" comment="libqt4-sql-mysql-4.6.3-5.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204595" comment="libqt4-sql-sqlite-4.6.3-5.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204596" comment="libqt4-x11-4.6.3-5.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204597" comment="libqt4-x11-32bit-4.6.3-5.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208734" comment="qt4-x11-tools-4.6.3-5.29 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4551</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4551" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4551" source="CVE"/>
    <description>
    Xen 4.2.x and 4.3.x, when nested virtualization is disabled, does not properly check the emulation paths for (1) VMLAUNCH and (2) VMRESUME, which allows local HVM guest users to cause a denial of service (host crash) via unspecified vectors related to "guest VMX instruction execution."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4551.html">CVE-2013-4551</cve>
<bugzilla href="https://bugzilla.suse.com/848657">SUSE bug 848657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/849665">SUSE bug 849665</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204905" comment="xen-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204906" comment="xen-doc-html-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204907" comment="xen-doc-pdf-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204908" comment="xen-kmp-default-4.2.3_08_3.0.101_0.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204909" comment="xen-kmp-pae-4.2.3_08_3.0.101_0.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204910" comment="xen-libs-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204911" comment="xen-libs-32bit-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204912" comment="xen-tools-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204913" comment="xen-tools-domU-4.2.3_08-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204905" comment="xen-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204906" comment="xen-doc-html-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204907" comment="xen-doc-pdf-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204908" comment="xen-kmp-default-4.2.3_08_3.0.101_0.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204910" comment="xen-libs-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204911" comment="xen-libs-32bit-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204912" comment="xen-tools-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204913" comment="xen-tools-domU-4.2.3_08-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4553</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4553" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553" source="CVE"/>
    <description>
    The XEN_DOMCTL_getmemlist hypercall in Xen 3.4.x through 4.3.x (possibly 4.3.1) does not always obtain the page_alloc_lock and mm_rwlock in the same order, which allows local guest administrators to cause a denial of service (host deadlock).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4553.html">CVE-2013-4553</cve>
<bugzilla href="https://bugzilla.suse.com/848657">SUSE bug 848657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/849667">SUSE bug 849667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/849668">SUSE bug 849668</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204905" comment="xen-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204906" comment="xen-doc-html-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204907" comment="xen-doc-pdf-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204908" comment="xen-kmp-default-4.2.3_08_3.0.101_0.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204909" comment="xen-kmp-pae-4.2.3_08_3.0.101_0.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204910" comment="xen-libs-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204911" comment="xen-libs-32bit-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204912" comment="xen-tools-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204913" comment="xen-tools-domU-4.2.3_08-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204905" comment="xen-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204906" comment="xen-doc-html-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204907" comment="xen-doc-pdf-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204908" comment="xen-kmp-default-4.2.3_08_3.0.101_0.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204910" comment="xen-libs-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204911" comment="xen-libs-32bit-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204912" comment="xen-tools-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204913" comment="xen-tools-domU-4.2.3_08-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4554</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4554" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4554" source="CVE"/>
    <description>
    Xen 3.0.3 through 4.1.x (possibly 4.1.6.1), 4.2.x (possibly 4.2.3), and 4.3.x (possibly 4.3.1) does not properly prevent access to hypercalls, which allows local guest users to gain privileges via a crafted application running in ring 1 or 2.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4554.html">CVE-2013-4554</cve>
<bugzilla href="https://bugzilla.suse.com/848657">SUSE bug 848657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/849668">SUSE bug 849668</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204905" comment="xen-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204906" comment="xen-doc-html-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204907" comment="xen-doc-pdf-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204908" comment="xen-kmp-default-4.2.3_08_3.0.101_0.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204909" comment="xen-kmp-pae-4.2.3_08_3.0.101_0.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204910" comment="xen-libs-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204911" comment="xen-libs-32bit-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204912" comment="xen-tools-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204913" comment="xen-tools-domU-4.2.3_08-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204905" comment="xen-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204906" comment="xen-doc-html-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204907" comment="xen-doc-pdf-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204908" comment="xen-kmp-default-4.2.3_08_3.0.101_0.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204910" comment="xen-libs-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204911" comment="xen-libs-32bit-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204912" comment="xen-tools-4.2.3_08-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204913" comment="xen-tools-domU-4.2.3_08-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4566</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2013-4566" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4566" source="CVE"/>
    <description>
    mod_nss 1.0.8 and earlier, when NSSVerifyClient is set to none for the server/vhost context, does not enforce the NSSVerifyClient setting in the directory context, which allows remote attackers to bypass intended access restrictions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4566.html">CVE-2013-4566</cve>
<bugzilla href="https://bugzilla.suse.com/853039">SUSE bug 853039</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205278" comment="apache2-mod_nss-1.0.14-0.4.25 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207551" comment="apache2-mod_nss-1.0.8-0.4.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4579</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4579" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4579" source="CVE"/>
    <description>
    The ath9k_htc_set_bssid_mask function in drivers/net/wireless/ath/ath9k/htc_drv_main.c in the Linux kernel through 3.12 uses a BSSID masking approach to determine the set of MAC addresses on which a Wi-Fi device is listening, which allows remote attackers to discover the original MAC address after spoofing by sending a series of packets to MAC addresses with certain bit manipulations.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4579.html">CVE-2013-4579</cve>
<bugzilla href="https://bugzilla.suse.com/851426">SUSE bug 851426</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213024" comment="kernel-default-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213025" comment="kernel-default-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213026" comment="kernel-default-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213028" comment="kernel-source-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213029" comment="kernel-syms-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213088" comment="kernel-trace-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213089" comment="kernel-trace-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213030" comment="kernel-trace-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4587</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4587" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4587" source="CVE"/>
    <description>
    Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4587.html">CVE-2013-4587</cve>
<bugzilla href="https://bugzilla.suse.com/853050">SUSE bug 853050</bugzilla>
<bugzilla href="https://bugzilla.suse.com/882914">SUSE bug 882914</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214059" comment="kernel-default-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214060" comment="kernel-default-base-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214061" comment="kernel-default-devel-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214063" comment="kernel-source-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214064" comment="kernel-syms-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214103" comment="kernel-trace-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214104" comment="kernel-trace-base-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214065" comment="kernel-trace-devel-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4592</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4592" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4592" source="CVE"/>
    <description>
    Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4592.html">CVE-2013-4592</cve>
<bugzilla href="https://bugzilla.suse.com/851101">SUSE bug 851101</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214059" comment="kernel-default-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214060" comment="kernel-default-base-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214061" comment="kernel-default-devel-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214063" comment="kernel-source-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214064" comment="kernel-syms-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214103" comment="kernel-trace-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214104" comment="kernel-trace-base-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214065" comment="kernel-trace-devel-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4635</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4635" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4635" source="CVE"/>
    <description>
    Integer overflow in the SdnToJewish function in jewish.c in the Calendar component in PHP before 5.3.26 and 5.4.x before 5.4.16 allows context-dependent attackers to cause a denial of service (application hang) via a large argument to the jdtojewish function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4635.html">CVE-2013-4635</cve>
<bugzilla href="https://bugzilla.suse.com/828020">SUSE bug 828020</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214290" comment="apache2-mod_php53-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214291" comment="php53-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214292" comment="php53-bcmath-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214293" comment="php53-bz2-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214294" comment="php53-calendar-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214295" comment="php53-ctype-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214296" comment="php53-curl-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214297" comment="php53-dba-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214298" comment="php53-dom-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214299" comment="php53-exif-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214300" comment="php53-fastcgi-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214301" comment="php53-fileinfo-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214302" comment="php53-ftp-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214303" comment="php53-gd-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214304" comment="php53-gettext-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214305" comment="php53-gmp-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214306" comment="php53-iconv-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214307" comment="php53-intl-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214308" comment="php53-json-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214309" comment="php53-ldap-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214310" comment="php53-mbstring-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214311" comment="php53-mcrypt-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214312" comment="php53-mysql-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214313" comment="php53-odbc-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214314" comment="php53-openssl-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214315" comment="php53-pcntl-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214316" comment="php53-pdo-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214317" comment="php53-pear-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214318" comment="php53-pgsql-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214319" comment="php53-pspell-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214320" comment="php53-shmop-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214321" comment="php53-snmp-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214322" comment="php53-soap-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214323" comment="php53-suhosin-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214324" comment="php53-sysvmsg-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214325" comment="php53-sysvsem-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214326" comment="php53-sysvshm-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214327" comment="php53-tokenizer-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214328" comment="php53-wddx-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214329" comment="php53-xmlreader-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214330" comment="php53-xmlrpc-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214331" comment="php53-xmlwriter-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214332" comment="php53-xsl-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214333" comment="php53-zip-5.3.17-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214334" comment="php53-zlib-5.3.17-0.15 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4761</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4761" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4761" source="CVE"/>
    <description>
    Unspecified vulnerability in Puppet 2.7.x before 2.7.23 and 3.2.x before 3.2.4, and Puppet Enterprise 2.8.x before 2.8.3 and 3.0.x before 3.0.1, allows remote attackers to execute arbitrary Ruby programs from the master via the resource_type service.  NOTE: this vulnerability can only be exploited utilizing unspecified "local file system access" to the Puppet Master.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4761.html">CVE-2013-4761</cve>
<bugzilla href="https://bugzilla.suse.com/835122">SUSE bug 835122</bugzilla>
<bugzilla href="https://bugzilla.suse.com/836962">SUSE bug 836962</bugzilla>
<bugzilla href="https://bugzilla.suse.com/880224">SUSE bug 880224</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214728" comment="puppet-2.6.18-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214729" comment="puppet-server-2.6.18-0.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4788</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4788" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4788" source="CVE"/>
    <description>
    The PTR_MANGLE implementation in the GNU C Library (aka glibc or libc6) 2.4, 2.17, and earlier, and Embedded GLIBC (EGLIBC) does not initialize the random value for the pointer guard, which makes it easier for context-dependent attackers to control execution flow by leveraging a buffer-overflow vulnerability in an application and using the known zero value pointer guard to calculate a pointer address.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4788.html">CVE-2013-4788</cve>
<bugzilla href="https://bugzilla.suse.com/830268">SUSE bug 830268</bugzilla>
<bugzilla href="https://bugzilla.suse.com/882910">SUSE bug 882910</bugzilla>
<bugzilla href="https://bugzilla.suse.com/950944">SUSE bug 950944</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213314" comment="glibc-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204402" comment="glibc-32bit-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213316" comment="glibc-devel-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204404" comment="glibc-devel-32bit-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213334" comment="glibc-html-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213318" comment="glibc-i18ndata-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213335" comment="glibc-info-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213319" comment="glibc-locale-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204407" comment="glibc-locale-32bit-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208499" comment="glibc-locale-x86-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213336" comment="glibc-profile-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208501" comment="glibc-profile-32bit-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208502" comment="glibc-profile-x86-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208503" comment="glibc-x86-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213321" comment="nscd-2.11.3-17.56 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213314" comment="glibc-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213315" comment="glibc-32bit-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213316" comment="glibc-devel-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213317" comment="glibc-devel-32bit-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213334" comment="glibc-html-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213318" comment="glibc-i18ndata-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213335" comment="glibc-info-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213319" comment="glibc-locale-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213320" comment="glibc-locale-32bit-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213336" comment="glibc-profile-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213337" comment="glibc-profile-32bit-2.11.3-17.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213321" comment="nscd-2.11.3-17.56 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4854</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4854" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4854" source="CVE"/>
    <description>
    The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2, 9.8.6b1, 9.9.x before 9.9.3-P2, and 9.9.4b1, and DNSco BIND 9.9.3-S1 before 9.9.3-S1-P1 and 9.9.4-S1b1, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query with a malformed RDATA section that is not properly handled during construction of a log message, as exploited in the wild in July 2013.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4854.html">CVE-2013-4854</cve>
<bugzilla href="https://bugzilla.suse.com/831899">SUSE bug 831899</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214733" comment="bind-9.9.3P2-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214734" comment="bind-chrootenv-9.9.3P2-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214735" comment="bind-doc-9.9.3P2-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214730" comment="bind-libs-9.9.3P2-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203828" comment="bind-libs-32bit-9.9.4P2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207605" comment="bind-libs-x86-9.9.4P2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214732" comment="bind-utils-9.9.3P2-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214733" comment="bind-9.9.3P2-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214734" comment="bind-chrootenv-9.9.3P2-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214735" comment="bind-doc-9.9.3P2-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214730" comment="bind-libs-9.9.3P2-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214731" comment="bind-libs-32bit-9.9.3P2-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214732" comment="bind-utils-9.9.3P2-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4929</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4929" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4929" source="CVE"/>
    <description>
    The parseFields function in epan/dissectors/packet-dis-pdus.c in the DIS dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not terminate packet-data processing after finding zero remaining bytes, which allows remote attackers to cause a denial of service (loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4929.html">CVE-2013-4929</cve>
<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214737" comment="wireshark-1.8.9-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4930</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4930" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4930" source="CVE"/>
    <description>
    The dissect_dvbci_tpdu_hdr function in epan/dissectors/packet-dvbci.c in the DVB-CI dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not validate a certain length value before decrementing it, which allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4930.html">CVE-2013-4930</cve>
<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214737" comment="wireshark-1.8.9-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4931</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4931" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4931" source="CVE"/>
    <description>
    epan/proto.c in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (loop) via a crafted packet that is not properly handled by the GSM RR dissector.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4931.html">CVE-2013-4931</cve>
<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214737" comment="wireshark-1.8.9-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4932</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4932" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4932" source="CVE"/>
    <description>
    Multiple array index errors in epan/dissectors/packet-gsm_a_common.c in the GSM A Common dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allow remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4932.html">CVE-2013-4932</cve>
<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214737" comment="wireshark-1.8.9-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4933</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4933" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4933" source="CVE"/>
    <description>
    The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4933.html">CVE-2013-4933</cve>
<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214737" comment="wireshark-1.8.9-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4934</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4934" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4934" source="CVE"/>
    <description>
    The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not initialize certain structure members, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4934.html">CVE-2013-4934</cve>
<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214737" comment="wireshark-1.8.9-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4935</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4935" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4935" source="CVE"/>
    <description>
    The dissect_per_length_determinant function in epan/dissectors/packet-per.c in the ASN.1 PER dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not initialize a length field in certain abnormal situations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4935.html">CVE-2013-4935</cve>
<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214737" comment="wireshark-1.8.9-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4969</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-4969" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4969" source="CVE"/>
    <description>
    Puppet before 3.3.3 and 3.4 before 3.4.1 and Puppet Enterprise (PE) before 2.8.4 and 3.1 before 3.1.1 allows local users to overwrite arbitrary files via a symlink attack on unspecified files.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4969.html">CVE-2013-4969</cve>
<bugzilla href="https://bugzilla.suse.com/856843">SUSE bug 856843</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204768" comment="puppet-2.6.18-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208953" comment="puppet-server-2.6.18-0.16 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5018</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5018" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5018" source="CVE"/>
    <description>
    The is_asn1 function in strongSwan 4.1.11 through 5.0.4 does not properly validate the return value of the asn1_length function, which allows remote attackers to cause a denial of service (segmentation fault) via a (1) XAuth username, (2) EAP identity, or (3) PEM encoded file that starts with a 0x04, 0x30, or 0x31 character followed by an ASN.1 length value that triggers an integer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5018.html">CVE-2013-5018</cve>
<bugzilla href="https://bugzilla.suse.com/833278">SUSE bug 833278</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204080" comment="strongswan-4.4.0-6.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204081" comment="strongswan-doc-4.4.0-6.21 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5211</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5211" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5211" source="CVE"/>
    <description>
    The monlist feature in ntp_request.c in ntpd in NTP before 4.2.7p26 allows remote attackers to cause a denial of service (traffic amplification) via forged (1) REQ_MON_GETLIST or (2) REQ_MON_GETLIST_1 requests, as exploited in the wild in December 2013.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5211.html">CVE-2013-5211</cve>
<bugzilla href="https://bugzilla.suse.com/857195">SUSE bug 857195</bugzilla>
<bugzilla href="https://bugzilla.suse.com/889447">SUSE bug 889447</bugzilla>
<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204721" comment="ntp-4.2.4p8-1.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204722" comment="ntp-doc-4.2.4p8-1.24 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5372</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5372" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5372" source="CVE"/>
    <description>
    The XML4J parser in IBM WebSphere Message Broker 6.1 before 6.1.0.12, 7.0 before 7.0.0.7, and 8.0 before 8.0.0.4 and IBM Integration Bus 9.0 before 9.0.0.1 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document that triggers expansion for many entities.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5372.html">CVE-2013-5372</cve>
<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207703" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207720" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207723" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5375</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5375" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5375" source="CVE"/>
    <description>
    Unspecified vulnerability in IBM Java SDK 7.0.0 before SR6, 6.0.1 before SR7, 6.0.0 before SR15, and 5.0.0 before SR16 FP4 allows remote attackers to access restricted classes via unspecified vectors related to XML and XSL.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5375.html">CVE-2013-5375</cve>
<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207703" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207720" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207723" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5456</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5456" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5456" source="CVE"/>
    <description>
    The com.ibm.rmi.io.SunSerializableFactory class in IBM Java SDK 7.0.0 before SR6 allows remote attackers to bypass a sandbox protection mechanism and execute arbitrary code via vectors related to deserialization inside the AccessController doPrivileged block.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5456.html">CVE-2013-5456</cve>
<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/977646">SUSE bug 977646</bugzilla>
<bugzilla href="https://bugzilla.suse.com/981057">SUSE bug 981057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/981060">SUSE bug 981060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/981087">SUSE bug 981087</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207703" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207720" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207723" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5457</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5457" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5457" source="CVE"/>
    <description>
    Unspecified vulnerability in IBM Java SDK 7.0.0 before SR6, 6.0.1 before SR7, and 6.0.0 before SR15 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5457.html">CVE-2013-5457</cve>
<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207703" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207720" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207723" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5458</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5458" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5458" source="CVE"/>
    <description>
    Unspecified vulnerability in IBM Java SDK 7.0.0 before SR6 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5458.html">CVE-2013-5458</cve>
<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207703" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207720" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207723" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5605</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5605" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5605" source="CVE"/>
    <description>
    Mozilla Network Security Services (NSS) 3.14 before 3.14.5 and 3.15 before 3.15.3 allows remote attackers to cause a denial of service or possibly have unspecified other impact via invalid handshake packets.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5605.html">CVE-2013-5605</cve>
<bugzilla href="https://bugzilla.suse.com/850148">SUSE bug 850148</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204714" comment="libfreebl3-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204715" comment="libfreebl3-32bit-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204716" comment="libsoftokn3-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204717" comment="libsoftokn3-32bit-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204049" comment="mozilla-nspr-4.10.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204050" comment="mozilla-nspr-32bit-4.10.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204718" comment="mozilla-nss-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204719" comment="mozilla-nss-32bit-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204720" comment="mozilla-nss-tools-3.15.3-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204714" comment="libfreebl3-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204715" comment="libfreebl3-32bit-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208794" comment="libfreebl3-x86-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204716" comment="libsoftokn3-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204717" comment="libsoftokn3-32bit-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208795" comment="libsoftokn3-x86-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204049" comment="mozilla-nspr-4.10.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204050" comment="mozilla-nspr-32bit-4.10.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207900" comment="mozilla-nspr-x86-4.10.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204718" comment="mozilla-nss-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204719" comment="mozilla-nss-32bit-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204720" comment="mozilla-nss-tools-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208796" comment="mozilla-nss-x86-3.15.3-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5606</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5606" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606" source="CVE"/>
    <description>
    The CERT_VerifyCert function in lib/certhigh/certvfy.c in Mozilla Network Security Services (NSS) 3.15 before 3.15.3 provides an unexpected return value for an incompatible key-usage certificate when the CERTVerifyLog argument is valid, which might allow remote attackers to bypass intended access restrictions via a crafted certificate.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5606.html">CVE-2013-5606</cve>
<bugzilla href="https://bugzilla.suse.com/850148">SUSE bug 850148</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204714" comment="libfreebl3-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204715" comment="libfreebl3-32bit-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204716" comment="libsoftokn3-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204717" comment="libsoftokn3-32bit-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204049" comment="mozilla-nspr-4.10.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204050" comment="mozilla-nspr-32bit-4.10.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204718" comment="mozilla-nss-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204719" comment="mozilla-nss-32bit-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204720" comment="mozilla-nss-tools-3.15.3-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204714" comment="libfreebl3-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204715" comment="libfreebl3-32bit-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208794" comment="libfreebl3-x86-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204716" comment="libsoftokn3-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204717" comment="libsoftokn3-32bit-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208795" comment="libsoftokn3-x86-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204049" comment="mozilla-nspr-4.10.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204050" comment="mozilla-nspr-32bit-4.10.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207900" comment="mozilla-nspr-x86-4.10.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204718" comment="mozilla-nss-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204719" comment="mozilla-nss-32bit-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204720" comment="mozilla-nss-tools-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208796" comment="mozilla-nss-x86-3.15.3-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5607</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5607" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5607" source="CVE"/>
    <description>
    Integer overflow in the PL_ArenaAllocate function in Mozilla Netscape Portable Runtime (NSPR) before 4.10.2, as used in Firefox before 25.0.1, Firefox ESR 17.x before 17.0.11 and 24.x before 24.1.1, and SeaMonkey before 2.22.1, allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted X.509 certificate, a related issue to CVE-2013-1741.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5607.html">CVE-2013-5607</cve>
<bugzilla href="https://bugzilla.suse.com/850148">SUSE bug 850148</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204714" comment="libfreebl3-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204715" comment="libfreebl3-32bit-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204716" comment="libsoftokn3-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204717" comment="libsoftokn3-32bit-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204049" comment="mozilla-nspr-4.10.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204050" comment="mozilla-nspr-32bit-4.10.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204718" comment="mozilla-nss-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204719" comment="mozilla-nss-32bit-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204720" comment="mozilla-nss-tools-3.15.3-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204714" comment="libfreebl3-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204715" comment="libfreebl3-32bit-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208794" comment="libfreebl3-x86-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204716" comment="libsoftokn3-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204717" comment="libsoftokn3-32bit-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208795" comment="libsoftokn3-x86-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204049" comment="mozilla-nspr-4.10.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204050" comment="mozilla-nspr-32bit-4.10.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207900" comment="mozilla-nspr-x86-4.10.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204718" comment="mozilla-nss-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204719" comment="mozilla-nss-32bit-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204720" comment="mozilla-nss-tools-3.15.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208796" comment="mozilla-nss-x86-3.15.3-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5609</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5609" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5609" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5609.html">CVE-2013-5609</cve>
<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204339" comment="MozillaFirefox-24.2.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204340" comment="MozillaFirefox-translations-24.2.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204341" comment="libfreebl3-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204342" comment="libfreebl3-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204343" comment="libsoftokn3-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204344" comment="libsoftokn3-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204345" comment="mozilla-nss-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204346" comment="mozilla-nss-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204347" comment="mozilla-nss-tools-3.15.3.1-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204339" comment="MozillaFirefox-24.2.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204340" comment="MozillaFirefox-translations-24.2.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204341" comment="libfreebl3-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204342" comment="libfreebl3-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208481" comment="libfreebl3-x86-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204343" comment="libsoftokn3-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204344" comment="libsoftokn3-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208482" comment="libsoftokn3-x86-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204345" comment="mozilla-nss-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204346" comment="mozilla-nss-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204347" comment="mozilla-nss-tools-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208483" comment="mozilla-nss-x86-3.15.3.1-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5610</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5610" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5610" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 26.0 and SeaMonkey before 2.23 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5610.html">CVE-2013-5610</cve>
<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204339" comment="MozillaFirefox-24.2.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204340" comment="MozillaFirefox-translations-24.2.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204341" comment="libfreebl3-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204342" comment="libfreebl3-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204343" comment="libsoftokn3-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204344" comment="libsoftokn3-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204345" comment="mozilla-nss-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204346" comment="mozilla-nss-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204347" comment="mozilla-nss-tools-3.15.3.1-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204339" comment="MozillaFirefox-24.2.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204340" comment="MozillaFirefox-translations-24.2.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204341" comment="libfreebl3-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204342" comment="libfreebl3-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208481" comment="libfreebl3-x86-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204343" comment="libsoftokn3-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204344" comment="libsoftokn3-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208482" comment="libsoftokn3-x86-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204345" comment="mozilla-nss-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204346" comment="mozilla-nss-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204347" comment="mozilla-nss-tools-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208483" comment="mozilla-nss-x86-3.15.3.1-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5611</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5611" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5611" source="CVE"/>
    <description>
    Mozilla Firefox before 26.0 does not properly remove the Application Installation doorhanger, which makes it easier for remote attackers to spoof a Web App installation site by controlling the timing of page navigation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5611.html">CVE-2013-5611</cve>
<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204339" comment="MozillaFirefox-24.2.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204340" comment="MozillaFirefox-translations-24.2.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204341" comment="libfreebl3-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204342" comment="libfreebl3-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204343" comment="libsoftokn3-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204344" comment="libsoftokn3-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204345" comment="mozilla-nss-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204346" comment="mozilla-nss-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204347" comment="mozilla-nss-tools-3.15.3.1-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204339" comment="MozillaFirefox-24.2.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204340" comment="MozillaFirefox-translations-24.2.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204341" comment="libfreebl3-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204342" comment="libfreebl3-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208481" comment="libfreebl3-x86-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204343" comment="libsoftokn3-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204344" comment="libsoftokn3-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208482" comment="libsoftokn3-x86-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204345" comment="mozilla-nss-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204346" comment="mozilla-nss-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204347" comment="mozilla-nss-tools-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208483" comment="mozilla-nss-x86-3.15.3.1-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5612</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5612" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5612" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 26.0 and SeaMonkey before 2.23 makes it easier for remote attackers to inject arbitrary web script or HTML by leveraging a Same Origin Policy violation triggered by lack of a charset parameter in a Content-Type HTTP header.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5612.html">CVE-2013-5612</cve>
<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204339" comment="MozillaFirefox-24.2.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204340" comment="MozillaFirefox-translations-24.2.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204341" comment="libfreebl3-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204342" comment="libfreebl3-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204343" comment="libsoftokn3-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204344" comment="libsoftokn3-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204345" comment="mozilla-nss-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204346" comment="mozilla-nss-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204347" comment="mozilla-nss-tools-3.15.3.1-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204339" comment="MozillaFirefox-24.2.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204340" comment="MozillaFirefox-translations-24.2.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204341" comment="libfreebl3-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204342" comment="libfreebl3-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208481" comment="libfreebl3-x86-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204343" comment="libsoftokn3-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204344" comment="libsoftokn3-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208482" comment="libsoftokn3-x86-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204345" comment="mozilla-nss-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204346" comment="mozilla-nss-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204347" comment="mozilla-nss-tools-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208483" comment="mozilla-nss-x86-3.15.3.1-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5613</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5613" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5613" source="CVE"/>
    <description>
    Use-after-free vulnerability in the PresShell::DispatchSynthMouseMove function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving synthetic mouse movement, related to the RestyleManager::GetHoverGeneration function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5613.html">CVE-2013-5613</cve>
<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204339" comment="MozillaFirefox-24.2.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204340" comment="MozillaFirefox-translations-24.2.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204341" comment="libfreebl3-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204342" comment="libfreebl3-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204343" comment="libsoftokn3-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204344" comment="libsoftokn3-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204345" comment="mozilla-nss-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204346" comment="mozilla-nss-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204347" comment="mozilla-nss-tools-3.15.3.1-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204339" comment="MozillaFirefox-24.2.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204340" comment="MozillaFirefox-translations-24.2.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204341" comment="libfreebl3-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204342" comment="libfreebl3-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208481" comment="libfreebl3-x86-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204343" comment="libsoftokn3-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204344" comment="libsoftokn3-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208482" comment="libsoftokn3-x86-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204345" comment="mozilla-nss-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204346" comment="mozilla-nss-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204347" comment="mozilla-nss-tools-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208483" comment="mozilla-nss-x86-3.15.3.1-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5614</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5614" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5614" source="CVE"/>
    <description>
    Mozilla Firefox before 26.0 and SeaMonkey before 2.23 do not properly consider the sandbox attribute of an IFRAME element during processing of a contained OBJECT element, which allows remote attackers to bypass intended sandbox restrictions via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5614.html">CVE-2013-5614</cve>
<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204339" comment="MozillaFirefox-24.2.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204340" comment="MozillaFirefox-translations-24.2.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204341" comment="libfreebl3-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204342" comment="libfreebl3-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204343" comment="libsoftokn3-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204344" comment="libsoftokn3-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204345" comment="mozilla-nss-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204346" comment="mozilla-nss-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204347" comment="mozilla-nss-tools-3.15.3.1-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204339" comment="MozillaFirefox-24.2.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204340" comment="MozillaFirefox-translations-24.2.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204341" comment="libfreebl3-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204342" comment="libfreebl3-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208481" comment="libfreebl3-x86-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204343" comment="libsoftokn3-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204344" comment="libsoftokn3-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208482" comment="libsoftokn3-x86-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204345" comment="mozilla-nss-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204346" comment="mozilla-nss-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204347" comment="mozilla-nss-tools-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208483" comment="mozilla-nss-x86-3.15.3.1-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5615</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5615" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5615" source="CVE"/>
    <description>
    The JavaScript implementation in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 does not properly enforce certain typeset restrictions on the generation of GetElementIC typed array stubs, which has unspecified impact and remote attack vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5615.html">CVE-2013-5615</cve>
<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204339" comment="MozillaFirefox-24.2.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204340" comment="MozillaFirefox-translations-24.2.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204341" comment="libfreebl3-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204342" comment="libfreebl3-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204343" comment="libsoftokn3-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204344" comment="libsoftokn3-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204345" comment="mozilla-nss-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204346" comment="mozilla-nss-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204347" comment="mozilla-nss-tools-3.15.3.1-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204339" comment="MozillaFirefox-24.2.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204340" comment="MozillaFirefox-translations-24.2.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204341" comment="libfreebl3-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204342" comment="libfreebl3-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208481" comment="libfreebl3-x86-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204343" comment="libsoftokn3-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204344" comment="libsoftokn3-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208482" comment="libsoftokn3-x86-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204345" comment="mozilla-nss-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204346" comment="mozilla-nss-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204347" comment="mozilla-nss-tools-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208483" comment="mozilla-nss-x86-3.15.3.1-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5616</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5616" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5616" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsEventListenerManager::HandleEventSubType function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors related to mListeners event listeners.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5616.html">CVE-2013-5616</cve>
<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204339" comment="MozillaFirefox-24.2.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204340" comment="MozillaFirefox-translations-24.2.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204341" comment="libfreebl3-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204342" comment="libfreebl3-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204343" comment="libsoftokn3-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204344" comment="libsoftokn3-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204345" comment="mozilla-nss-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204346" comment="mozilla-nss-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204347" comment="mozilla-nss-tools-3.15.3.1-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204339" comment="MozillaFirefox-24.2.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204340" comment="MozillaFirefox-translations-24.2.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204341" comment="libfreebl3-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204342" comment="libfreebl3-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208481" comment="libfreebl3-x86-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204343" comment="libsoftokn3-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204344" comment="libsoftokn3-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208482" comment="libsoftokn3-x86-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204345" comment="mozilla-nss-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204346" comment="mozilla-nss-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204347" comment="mozilla-nss-tools-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208483" comment="mozilla-nss-x86-3.15.3.1-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5618</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5618" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5618" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsNodeUtils::LastRelease function in the table-editing user interface in the editor component in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code by triggering improper garbage collection.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5618.html">CVE-2013-5618</cve>
<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204339" comment="MozillaFirefox-24.2.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204340" comment="MozillaFirefox-translations-24.2.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204341" comment="libfreebl3-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204342" comment="libfreebl3-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204343" comment="libsoftokn3-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204344" comment="libsoftokn3-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204345" comment="mozilla-nss-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204346" comment="mozilla-nss-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204347" comment="mozilla-nss-tools-3.15.3.1-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204339" comment="MozillaFirefox-24.2.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204340" comment="MozillaFirefox-translations-24.2.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204341" comment="libfreebl3-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204342" comment="libfreebl3-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208481" comment="libfreebl3-x86-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204343" comment="libsoftokn3-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204344" comment="libsoftokn3-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208482" comment="libsoftokn3-x86-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204345" comment="mozilla-nss-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204346" comment="mozilla-nss-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204347" comment="mozilla-nss-tools-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208483" comment="mozilla-nss-x86-3.15.3.1-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5619</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5619" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5619" source="CVE"/>
    <description>
    Multiple integer overflows in the binary-search implementation in SpiderMonkey in Mozilla Firefox before 26.0 and SeaMonkey before 2.23 might allow remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted JavaScript code.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5619.html">CVE-2013-5619</cve>
<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204339" comment="MozillaFirefox-24.2.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204340" comment="MozillaFirefox-translations-24.2.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204341" comment="libfreebl3-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204342" comment="libfreebl3-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204343" comment="libsoftokn3-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204344" comment="libsoftokn3-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204345" comment="mozilla-nss-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204346" comment="mozilla-nss-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204347" comment="mozilla-nss-tools-3.15.3.1-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204339" comment="MozillaFirefox-24.2.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204340" comment="MozillaFirefox-translations-24.2.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204341" comment="libfreebl3-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204342" comment="libfreebl3-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208481" comment="libfreebl3-x86-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204343" comment="libsoftokn3-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204344" comment="libsoftokn3-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208482" comment="libsoftokn3-x86-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204345" comment="mozilla-nss-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204346" comment="mozilla-nss-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204347" comment="mozilla-nss-tools-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208483" comment="mozilla-nss-x86-3.15.3.1-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5651</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5651" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5651" source="CVE"/>
    <description>
    The virBitmapParse function in util/virbitmap.c in libvirt before 1.1.2 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via a crafted bitmap, as demonstrated by a large nodeset value to numatune.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5651.html">CVE-2013-5651</cve>
<bugzilla href="https://bugzilla.suse.com/837999">SUSE bug 837999</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214511" comment="libvirt-1.0.5.6-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214512" comment="libvirt-client-1.0.5.6-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204664" comment="libvirt-client-32bit-1.0.5.9-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214514" comment="libvirt-doc-1.0.5.6-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214516" comment="libvirt-lock-sanlock-1.0.5.6-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214515" comment="libvirt-python-1.0.5.6-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214511" comment="libvirt-1.0.5.6-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214512" comment="libvirt-client-1.0.5.6-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214513" comment="libvirt-client-32bit-1.0.5.6-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214514" comment="libvirt-doc-1.0.5.6-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214516" comment="libvirt-lock-sanlock-1.0.5.6-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214515" comment="libvirt-python-1.0.5.6-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5653</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2013-5653" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5653" source="CVE"/>
    <description>
    The getenv and filenameforall functions in Ghostscript 9.10 ignore the "-dSAFER" argument, which allows remote attackers to read data via a crafted postscript file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5653.html">CVE-2013-5653</cve>
<bugzilla href="https://bugzilla.suse.com/1001951">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1004237">SUSE bug 1004237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1036453">SUSE bug 1036453</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205336" comment="ghostscript-fonts-other-8.62-32.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205337" comment="ghostscript-fonts-rus-8.62-32.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205338" comment="ghostscript-fonts-std-8.62-32.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202626" comment="ghostscript-library-8.62-32.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205339" comment="ghostscript-omni-8.62-32.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205340" comment="ghostscript-x11-8.62-32.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205341" comment="libgimpprint-4.2.7-32.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5704</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5704" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5704" source="CVE"/>
    <description>
    The mod_headers module in the Apache HTTP Server 2.2.22 allows remote attackers to bypass "RequestHeader unset" directives by placing a header in the trailer portion of data sent with chunked transfer coding.  NOTE: the vendor states "this is not a security issue in httpd as such."
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5704.html">CVE-2013-5704</cve>
<bugzilla href="https://bugzilla.suse.com/871310">SUSE bug 871310</bugzilla>
<bugzilla href="https://bugzilla.suse.com/914535">SUSE bug 914535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915666">SUSE bug 915666</bugzilla>
<bugzilla href="https://bugzilla.suse.com/930944">SUSE bug 930944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938728">SUSE bug 938728</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199855" comment="apache2-2.2.12-1.51.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199856" comment="apache2-doc-2.2.12-1.51.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199857" comment="apache2-example-pages-2.2.12-1.51.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199858" comment="apache2-prefork-2.2.12-1.51.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199859" comment="apache2-utils-2.2.12-1.51.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199860" comment="apache2-worker-2.2.12-1.51.52 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5705</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5705" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5705" source="CVE"/>
    <description>
    apache2/modsecurity.c in ModSecurity before 2.7.6 allows remote attackers to bypass rules by using chunked transfer coding with a capitalized Chunked value in the Transfer-Encoding HTTP header.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5705.html">CVE-2013-5705</cve>
<bugzilla href="https://bugzilla.suse.com/871309">SUSE bug 871309</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199909" comment="apache2-mod_security2-2.7.1-0.2.18 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5745" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5745" source="CVE"/>
    <description>
    The vino_server_client_data_pending function in vino-server.c in GNOME Vino 2.26.1, 2.32.1, 3.7.3, and earlier, and 3.8 when encryption is disabled, does not properly clear client data when an error causes the connection to close during authentication, which allows remote attackers to cause a denial of service (infinite loop, CPU and disk consumption) via multiple crafted requests during authentication.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5745.html">CVE-2013-5745</cve>
<bugzilla href="https://bugzilla.suse.com/843174">SUSE bug 843174</bugzilla>
<bugzilla href="https://bugzilla.suse.com/880231">SUSE bug 880231</bugzilla>
<bugzilla href="https://bugzilla.suse.com/880271">SUSE bug 880271</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200466" comment="vino-2.28.1-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200467" comment="vino-lang-2.28.1-2.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5772</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5772" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5772" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java SE component in Oracle Java SE Java SE 7u40 and earlier and Java SE 6u60 and earlier allows remote attackers to affect integrity via unknown vectors related to jhat.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5772.html">CVE-2013-5772</cve>
<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207703" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207720" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207723" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5774</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5774" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5774" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, 6u60 and earlier, 5.0u51 and earlier, and Embedded 7u40 and earlier allows remote attackers to affect integrity via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5774.html">CVE-2013-5774</cve>
<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207703" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207720" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207723" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5776</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5776" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5776" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java SE and Java SE Embedded components in Oracle Java SE Java SE 7u40 and earlier, Java SE 6u60 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect integrity via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5776.html">CVE-2013-5776</cve>
<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207703" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207720" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207723" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5778</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5778" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5778" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, 6u60 and earlier, 5.0u51 and earlier, and Embedded 7u40 and earlier allows remote attackers to affect confidentiality via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5778.html">CVE-2013-5778</cve>
<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207703" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207720" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207723" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5780</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5780" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5780" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5780.html">CVE-2013-5780</cve>
<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207703" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207720" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207723" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5782</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5782" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5782" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5782.html">CVE-2013-5782</cve>
<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207703" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207720" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207723" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5783</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5783" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5783" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality and integrity via unknown vectors related to Swing.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5783.html">CVE-2013-5783</cve>
<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207703" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207720" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207723" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5784</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5784" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5784" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect integrity via vectors related to SCRIPTING.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5784.html">CVE-2013-5784</cve>
<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207703" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207720" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207723" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5787</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5787" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5787" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-5789, CVE-2013-5824, CVE-2013-5832, and CVE-2013-5852.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5787.html">CVE-2013-5787</cve>
<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207703" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207720" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207723" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5788</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5788" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5788" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5788.html">CVE-2013-5788</cve>
<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207703" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207720" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207723" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5789</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5789" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5789" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-5787, CVE-2013-5824, CVE-2013-5832, and CVE-2013-5852.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5789.html">CVE-2013-5789</cve>
<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207703" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207720" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207723" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5790</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5790" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5790" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via vectors related to BEANS.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5790.html">CVE-2013-5790</cve>
<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207703" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207720" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207723" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5797</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5797" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5797" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and JavaFX 2.2.40 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Javadoc.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5797.html">CVE-2013-5797</cve>
<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207703" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207720" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207723" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5800" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via vectors related to JGSS.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5800.html">CVE-2013-5800</cve>
<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207703" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207720" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207723" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5801</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5801" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5801" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5801.html">CVE-2013-5801</cve>
<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207703" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207720" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207723" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5802</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5802" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5802" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAXP.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5802.html">CVE-2013-5802</cve>
<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207703" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207720" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207723" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5803</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5803" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5803" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect availability via vectors related to JGSS.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5803.html">CVE-2013-5803</cve>
<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207703" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207720" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207723" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5804</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5804" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5804" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, and JRockit R27.7.6 and earlier allows remote attackers to affect confidentiality and integrity via unknown vectors related to Javadoc.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5804.html">CVE-2013-5804</cve>
<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207703" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207720" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207723" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5809</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5809" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5809" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-5829.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5809.html">CVE-2013-5809</cve>
<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207703" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207720" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207723" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5812</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5812" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5812" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality and availability via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5812.html">CVE-2013-5812</cve>
<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207703" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207720" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207723" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5814" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5814" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5814.html">CVE-2013-5814</cve>
<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207703" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207720" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207723" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5817</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5817" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5817" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JNDI.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5817.html">CVE-2013-5817</cve>
<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207703" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207720" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207723" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5818</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5818" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5818" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect integrity via unknown vectors related to Deployment, a different vulnerability than CVE-2013-5819 and CVE-2013-5831.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5818.html">CVE-2013-5818</cve>
<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207703" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207720" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207723" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5819</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5819" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5819" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect integrity via unknown vectors related to Deployment, a different vulnerability than CVE-2013-5818 and CVE-2013-5831.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5819.html">CVE-2013-5819</cve>
<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207703" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207720" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207723" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5820</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5820" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5820" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect integrity via vectors related to JAX-WS.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5820.html">CVE-2013-5820</cve>
<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207703" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207720" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207723" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5823</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5823" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5823" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect availability via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5823.html">CVE-2013-5823</cve>
<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207703" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207720" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207723" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5824</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5824" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5824" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-5787, CVE-2013-5789, CVE-2013-5832, and CVE-2013-5852.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5824.html">CVE-2013-5824</cve>
<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207703" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207720" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207723" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5825</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5825" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5825" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect availability via vectors related to JAXP.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5825.html">CVE-2013-5825</cve>
<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207703" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207720" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207723" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5829</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5829" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5829" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-5809.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5829.html">CVE-2013-5829</cve>
<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207703" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207720" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207723" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5830" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5830" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5830.html">CVE-2013-5830</cve>
<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207703" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207720" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207723" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5831</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5831" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5831" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect integrity via unknown vectors related to Deployment, a different vulnerability than CVE-2013-5818 and CVE-2013-5819.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5831.html">CVE-2013-5831</cve>
<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207703" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207720" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207723" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135832" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5832</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5832" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5832" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-5787, CVE-2013-5789, CVE-2013-5824, and CVE-2013-5852.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5832.html">CVE-2013-5832</cve>
<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207703" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207720" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207723" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5838</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5838" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5838" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u25 and earlier, and Java SE Embedded 7u25 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5838.html">CVE-2013-5838</cve>
<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/972468">SUSE bug 972468</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207703" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207720" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207723" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5840" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5840" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5840.html">CVE-2013-5840</cve>
<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207703" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207720" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207723" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5842</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5842" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5842" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-5850.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5842.html">CVE-2013-5842</cve>
<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207703" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207720" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207723" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5843</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5843" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5843" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JavaFX 2.2.40 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5843.html">CVE-2013-5843</cve>
<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207703" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207720" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207723" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5848</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5848" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5848" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, and JavaFX 2.2.40 and earlier allows remote attackers to affect integrity via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5848.html">CVE-2013-5848</cve>
<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207703" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207720" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207723" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5849</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5849" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5849" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via vectors related to AWT.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5849.html">CVE-2013-5849</cve>
<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207703" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207720" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207723" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5850</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5850" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5850" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-5842.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5850.html">CVE-2013-5850</cve>
<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207703" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207720" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207723" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5851</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5851" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5851" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via vectors related to JAXP.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5851.html">CVE-2013-5851</cve>
<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207703" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207720" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207723" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201325" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201327" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207702" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207719" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207722" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5860</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5860" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5860" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.14 and earlier allows remote authenticated users to affect availability via vectors related to GIS.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5860.html">CVE-2013-5860</cve>
<bugzilla href="https://bugzilla.suse.com/858823">SUSE bug 858823</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214536" comment="libmysql55client18-32bit-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5878</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5878" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5878" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u65 and 7u45, Java SE Embedded 7u45, and OpenJDK 7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Security.  NOTE: the previous information is from the January 2014 CPU.  Oracle has not commented on third-party claims that the Security component does not properly handle null XML namespace (xmlns) attributes during XML document canonicalization, which allows attackers to escape the sandbox.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5878.html">CVE-2013-5878</cve>
<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214748" comment="java-1_6_0-ibm-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214749" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214750" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214753" comment="java-1_7_0-ibm-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214756" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214748" comment="java-1_6_0-ibm-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214749" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214750" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214751" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214753" comment="java-1_7_0-ibm-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214754" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214756" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214757" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.1-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5881</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5881" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5881" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.14 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB, a different vulnerability than CVE-2014-0431.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5881.html">CVE-2013-5881</cve>
<bugzilla href="https://bugzilla.suse.com/858823">SUSE bug 858823</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214536" comment="libmysql55client18-32bit-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5882</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5882" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5882" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.13 and earlier allows remote authenticated users to affect availability via unknown vectors related to Stored Procedures.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5882.html">CVE-2013-5882</cve>
<bugzilla href="https://bugzilla.suse.com/858823">SUSE bug 858823</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214536" comment="libmysql55client18-32bit-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5884</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5884" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5884" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect confidentiality via vectors related to CORBA.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to an incorrect check for code permissions by CORBA stub factories.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5884.html">CVE-2013-5884</cve>
<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214748" comment="java-1_6_0-ibm-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214749" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214750" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214753" comment="java-1_7_0-ibm-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214756" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214748" comment="java-1_6_0-ibm-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214749" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214750" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214751" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214753" comment="java-1_7_0-ibm-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214754" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214756" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214757" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.1-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5887</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5887" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5887" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u65 and 7u45 allows remote attackers to affect availability via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5887.html">CVE-2013-5887</cve>
<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214748" comment="java-1_6_0-ibm-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214749" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214750" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214753" comment="java-1_7_0-ibm-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214756" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214748" comment="java-1_6_0-ibm-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214749" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214750" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214751" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214753" comment="java-1_7_0-ibm-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214754" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214756" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214757" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.1-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5888</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5888" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5888" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u65 and 7u45, when running with GNOME, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5888.html">CVE-2013-5888</cve>
<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214748" comment="java-1_6_0-ibm-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214749" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214750" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214753" comment="java-1_7_0-ibm-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214756" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214748" comment="java-1_6_0-ibm-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214749" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214750" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214751" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214753" comment="java-1_7_0-ibm-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214754" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214756" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214757" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.1-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5889</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5889" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5889" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u65 and 7u45 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-5902, CVE-2014-0410, CVE-2014-0415, CVE-2014-0418, and CVE-2014-0424.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5889.html">CVE-2013-5889</cve>
<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214748" comment="java-1_6_0-ibm-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214749" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214750" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214753" comment="java-1_7_0-ibm-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214756" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214748" comment="java-1_6_0-ibm-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214749" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214750" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214751" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214753" comment="java-1_7_0-ibm-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214754" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214756" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214757" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.1-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5891</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5891" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5891" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.33 and earlier and 5.6.13 and earlier allows remote authenticated users to affect availability via unknown vectors related to Partition.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5891.html">CVE-2013-5891</cve>
<bugzilla href="https://bugzilla.suse.com/858823">SUSE bug 858823</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214536" comment="libmysql55client18-32bit-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5894</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5894" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5894" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.13 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5894.html">CVE-2013-5894</cve>
<bugzilla href="https://bugzilla.suse.com/858823">SUSE bug 858823</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214536" comment="libmysql55client18-32bit-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5896</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5896" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5896" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect availability via vectors related to CORBA.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that com.sun.corba.se and its sub-packages are not included on the restricted package list.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5896.html">CVE-2013-5896</cve>
<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214748" comment="java-1_6_0-ibm-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214749" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214750" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214753" comment="java-1_7_0-ibm-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214756" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214748" comment="java-1_6_0-ibm-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214749" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214750" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214751" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214753" comment="java-1_7_0-ibm-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214754" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214756" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214757" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.1-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5898</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5898" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5898" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u65 and 7u45 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Deployment, a different vulnerability than CVE-2014-0375 and CVE-2014-0403.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5898.html">CVE-2013-5898</cve>
<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214748" comment="java-1_6_0-ibm-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214749" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214750" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214753" comment="java-1_7_0-ibm-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214756" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214748" comment="java-1_6_0-ibm-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214749" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214750" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214751" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214753" comment="java-1_7_0-ibm-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214754" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214756" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214757" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.1-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5899</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5899" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5899" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u65 and 7u45 allows remote attackers to affect confidentiality via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5899.html">CVE-2013-5899</cve>
<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214748" comment="java-1_6_0-ibm-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214749" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214750" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214753" comment="java-1_7_0-ibm-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214756" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214748" comment="java-1_6_0-ibm-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214749" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214750" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214751" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214753" comment="java-1_7_0-ibm-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214754" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214756" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214757" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.1-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5907</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5907" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5907" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; JRockit R27.7.7 and R28.2.9; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is due to incorrect input validation in LookupProcessor.cpp in the ICU Layout Engine, which allows attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted font file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5907.html">CVE-2013-5907</cve>
<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214748" comment="java-1_6_0-ibm-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214749" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214750" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214753" comment="java-1_7_0-ibm-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214756" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214748" comment="java-1_6_0-ibm-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214749" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214750" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214751" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214753" comment="java-1_7_0-ibm-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214754" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214756" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214757" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.1-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5908</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5908" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5908" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.72 and earlier, 5.5.34 and earlier, and 5.6.14 and earlier allows remote attackers to affect availability via unknown vectors related to Error Handling.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5908.html">CVE-2013-5908</cve>
<bugzilla href="https://bugzilla.suse.com/858823">SUSE bug 858823</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214536" comment="libmysql55client18-32bit-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5910</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-5910" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5910" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u65 and 7u45, Java SE Embedded 7u45, and OpenJDK 7 allows remote attackers to affect integrity via unknown vectors related to Security.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that CanonicalizerBase.java in the XML canonicalizer allows untrusted code to access mutable byte arrays.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5910.html">CVE-2013-5910</cve>
<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214748" comment="java-1_6_0-ibm-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214749" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214750" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214753" comment="java-1_7_0-ibm-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214756" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214748" comment="java-1_6_0-ibm-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214749" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214750" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214751" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214753" comment="java-1_7_0-ibm-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214754" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214756" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214757" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.1-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6336</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-6336" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6336" source="CVE"/>
    <description>
    The ieee802154_map_rec function in epan/dissectors/packet-ieee802154.c in the IEEE 802.15.4 dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 uses an incorrect pointer chain, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6336.html">CVE-2013-6336</cve>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214759" comment="wireshark-1.8.11-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6337</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-6337" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6337" source="CVE"/>
    <description>
    Unspecified vulnerability in the NBAP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6337.html">CVE-2013-6337</cve>
<bugzilla href="https://bugzilla.suse.com/848738">SUSE bug 848738</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214759" comment="wireshark-1.8.11-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6338</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-6338" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6338" source="CVE"/>
    <description>
    The dissect_sip_common function in epan/dissectors/packet-sip.c in the SIP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6338.html">CVE-2013-6338</cve>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214759" comment="wireshark-1.8.11-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6339</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-6339" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6339" source="CVE"/>
    <description>
    The dissect_openwire_type function in epan/dissectors/packet-openwire.c in the OpenWire dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 allows remote attackers to cause a denial of service (loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6339.html">CVE-2013-6339</cve>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214759" comment="wireshark-1.8.11-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6340</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-6340" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6340" source="CVE"/>
    <description>
    epan/dissectors/packet-tcp.c in the TCP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 does not properly determine the amount of remaining data, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6340.html">CVE-2013-6340</cve>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214759" comment="wireshark-1.8.11-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136367" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6367</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-6367" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6367" source="CVE"/>
    <description>
    The apic_get_tmcct function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via crafted modifications of the TMICT value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6367.html">CVE-2013-6367</cve>
<bugzilla href="https://bugzilla.suse.com/853051">SUSE bug 853051</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214059" comment="kernel-default-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214060" comment="kernel-default-base-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214061" comment="kernel-default-devel-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214063" comment="kernel-source-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214064" comment="kernel-syms-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214103" comment="kernel-trace-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214104" comment="kernel-trace-base-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214065" comment="kernel-trace-devel-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6368</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-6368" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6368" source="CVE"/>
    <description>
    The KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges or cause a denial of service (system crash) via a VAPIC synchronization operation involving a page-end address.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6368.html">CVE-2013-6368</cve>
<bugzilla href="https://bugzilla.suse.com/853052">SUSE bug 853052</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214059" comment="kernel-default-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214060" comment="kernel-default-base-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214061" comment="kernel-default-devel-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214063" comment="kernel-source-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214064" comment="kernel-syms-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214103" comment="kernel-trace-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214104" comment="kernel-trace-base-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214065" comment="kernel-trace-devel-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6376</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-6376" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6376" source="CVE"/>
    <description>
    The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6376.html">CVE-2013-6376</cve>
<bugzilla href="https://bugzilla.suse.com/853053">SUSE bug 853053</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214059" comment="kernel-default-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214060" comment="kernel-default-base-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214061" comment="kernel-default-devel-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214063" comment="kernel-source-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214064" comment="kernel-syms-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214103" comment="kernel-trace-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214104" comment="kernel-trace-base-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214065" comment="kernel-trace-devel-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6378</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-6378" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6378" source="CVE"/>
    <description>
    The lbs_debugfs_write function in drivers/net/wireless/libertas/debugfs.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service (OOPS) by leveraging root privileges for a zero-length write operation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6378.html">CVE-2013-6378</cve>
<bugzilla href="https://bugzilla.suse.com/852559">SUSE bug 852559</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214059" comment="kernel-default-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214060" comment="kernel-default-base-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214061" comment="kernel-default-devel-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214063" comment="kernel-source-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214064" comment="kernel-syms-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214103" comment="kernel-trace-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214104" comment="kernel-trace-base-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214065" comment="kernel-trace-devel-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6380</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-6380" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6380" source="CVE"/>
    <description>
    The aac_send_raw_srb function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 3.12.1 does not properly validate a certain size value, which allows local users to cause a denial of service (invalid pointer dereference) or possibly have unspecified other impact via an FSACTL_SEND_RAW_SRB ioctl call that triggers a crafted SRB command.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6380.html">CVE-2013-6380</cve>
<bugzilla href="https://bugzilla.suse.com/852373">SUSE bug 852373</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214059" comment="kernel-default-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214060" comment="kernel-default-base-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214061" comment="kernel-default-devel-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214063" comment="kernel-source-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214064" comment="kernel-syms-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214103" comment="kernel-trace-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214104" comment="kernel-trace-base-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214065" comment="kernel-trace-devel-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6382</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-6382" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6382" source="CVE"/>
    <description>
    Multiple buffer underflows in the XFS implementation in the Linux kernel through 3.12.1 allow local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging the CAP_SYS_ADMIN capability for a (1) XFS_IOC_ATTRLIST_BY_HANDLE or (2) XFS_IOC_ATTRLIST_BY_HANDLE_32 ioctl call with a crafted length value, related to the xfs_attrlist_by_handle function in fs/xfs/xfs_ioctl.c and the xfs_compat_attrlist_by_handle function in fs/xfs/xfs_ioctl32.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6382.html">CVE-2013-6382</cve>
<bugzilla href="https://bugzilla.suse.com/852553">SUSE bug 852553</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213024" comment="kernel-default-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213025" comment="kernel-default-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213026" comment="kernel-default-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213028" comment="kernel-source-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213029" comment="kernel-syms-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213088" comment="kernel-trace-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213089" comment="kernel-trace-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213030" comment="kernel-trace-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6383</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-6383" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6383" source="CVE"/>
    <description>
    The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6383.html">CVE-2013-6383</cve>
<bugzilla href="https://bugzilla.suse.com/852558">SUSE bug 852558</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214059" comment="kernel-default-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214060" comment="kernel-default-base-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214061" comment="kernel-default-devel-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214063" comment="kernel-source-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214064" comment="kernel-syms-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214103" comment="kernel-trace-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214104" comment="kernel-trace-base-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214065" comment="kernel-trace-devel-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6400</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-6400" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6400" source="CVE"/>
    <description>
    Xen 4.2.x and 4.3.x, when using Intel VT-d and a PCI device has been assigned, does not clear the flag that suppresses IOMMU TLB flushes when unspecified errors occur, which causes the TLB entries to not be flushed and allows local guest administrators to cause a denial of service (host crash) or gain privileges via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6400.html">CVE-2013-6400</cve>
<bugzilla href="https://bugzilla.suse.com/853048">SUSE bug 853048</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204914" comment="xen-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204915" comment="xen-doc-html-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204916" comment="xen-doc-pdf-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204917" comment="xen-kmp-default-4.2.4_02_3.0.101_0.15-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204918" comment="xen-kmp-pae-4.2.4_02_3.0.101_0.15-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204919" comment="xen-libs-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204920" comment="xen-libs-32bit-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204921" comment="xen-tools-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204922" comment="xen-tools-domU-4.2.4_02-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204914" comment="xen-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204915" comment="xen-doc-html-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204916" comment="xen-doc-pdf-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204917" comment="xen-kmp-default-4.2.4_02_3.0.101_0.15-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204919" comment="xen-libs-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204920" comment="xen-libs-32bit-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204921" comment="xen-tools-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204922" comment="xen-tools-domU-4.2.4_02-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6402</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-6402" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6402" source="CVE"/>
    <description>
    base/pkit.py in HP Linux Imaging and Printing (HPLIP) through 3.13.11 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/hp-pkservice.log temporary file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6402.html">CVE-2013-6402</cve>
<bugzilla href="https://bugzilla.suse.com/852368">SUSE bug 852368</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200077" comment="hplip-3.11.10-0.6.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200078" comment="hplip-hpijs-3.11.10-0.6.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6412</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-6412" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6412" source="CVE"/>
    <description>
    The transform_save function in transform.c in Augeas 1.0.0 through 1.1.0 does not properly calculate the permission values when the umask contains a "7," which causes world-writable permissions to be used for new files and allows local users to modify the files via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6412.html">CVE-2013-6412</cve>
<bugzilla href="https://bugzilla.suse.com/853044">SUSE bug 853044</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199910" comment="augeas-0.9.0-3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199911" comment="augeas-lenses-0.9.0-3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199912" comment="libaugeas0-0.9.0-3.15 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6418</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-6418" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6418" source="CVE"/>
    <description>
    PyWBEM 0.7 and earlier uses a separate connection to validate X.509 certificates, which allows man-in-the-middle attackers to spoof a peer via an arbitrary certificate.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6418.html">CVE-2013-6418</cve>
<bugzilla href="https://bugzilla.suse.com/856323">SUSE bug 856323</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204800" comment="python-pywbem-0.7-6.20 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6420</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-6420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6420" source="CVE"/>
    <description>
    The asn1_time_to_time_t function in ext/openssl/openssl.c in PHP before 5.3.28, 5.4.x before 5.4.23, and 5.5.x before 5.5.7 does not properly parse (1) notBefore and (2) notAfter timestamps in X.509 certificates, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted certificate that is not properly handled by the openssl_x509_parse function.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6420.html">CVE-2013-6420</cve>
<bugzilla href="https://bugzilla.suse.com/854880">SUSE bug 854880</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214453" comment="apache2-mod_php53-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214454" comment="php53-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214455" comment="php53-bcmath-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214456" comment="php53-bz2-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214457" comment="php53-calendar-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214458" comment="php53-ctype-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214459" comment="php53-curl-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214460" comment="php53-dba-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214461" comment="php53-dom-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214462" comment="php53-exif-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214463" comment="php53-fastcgi-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214464" comment="php53-fileinfo-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214465" comment="php53-ftp-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214466" comment="php53-gd-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214467" comment="php53-gettext-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214468" comment="php53-gmp-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214469" comment="php53-iconv-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214470" comment="php53-intl-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214471" comment="php53-json-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214472" comment="php53-ldap-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214473" comment="php53-mbstring-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214474" comment="php53-mcrypt-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214475" comment="php53-mysql-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214476" comment="php53-odbc-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214477" comment="php53-openssl-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214478" comment="php53-pcntl-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214479" comment="php53-pdo-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214480" comment="php53-pear-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214481" comment="php53-pgsql-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214482" comment="php53-pspell-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214483" comment="php53-shmop-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214484" comment="php53-snmp-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214485" comment="php53-soap-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214486" comment="php53-suhosin-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214487" comment="php53-sysvmsg-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214488" comment="php53-sysvsem-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214489" comment="php53-sysvshm-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214490" comment="php53-tokenizer-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214491" comment="php53-wddx-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214492" comment="php53-xmlreader-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214493" comment="php53-xmlrpc-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214494" comment="php53-xmlwriter-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214495" comment="php53-xsl-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214496" comment="php53-zip-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214497" comment="php53-zlib-5.3.17-0.17 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6424</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-6424" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6424" source="CVE"/>
    <description>
    Integer underflow in the xTrapezoidValid macro in render/picture.h in X.Org allows context-dependent attackers to cause a denial of service (crash) via a negative bottom value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6424.html">CVE-2013-6424</cve>
<bugzilla href="https://bugzilla.suse.com/853846">SUSE bug 853846</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204958" comment="xorg-x11-Xvnc-7.4-27.85 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204959" comment="xorg-x11-server-7.4-27.85 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204960" comment="xorg-x11-server-extra-7.4-27.85 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6425</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-6425" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6425" source="CVE"/>
    <description>
    Integer underflow in the pixman_trapezoid_valid macro in pixman.h in Pixman before 0.32.0, as used in X.Org server and cairo, allows context-dependent attackers to cause a denial of service (crash) via a negative bottom value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6425.html">CVE-2013-6425</cve>
<bugzilla href="https://bugzilla.suse.com/853824">SUSE bug 853824</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200268" comment="libpixman-1-0-0.24.4-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200269" comment="libpixman-1-0-32bit-0.24.4-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200270" comment="libpixman-1-0-x86-0.24.4-0.15 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200268" comment="libpixman-1-0-0.24.4-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200269" comment="libpixman-1-0-32bit-0.24.4-0.15 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6435</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-6435" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6435" source="CVE"/>
    <description>
    Race condition in RPM 4.11.1 and earlier allows remote attackers to execute arbitrary code via a crafted RPM file whose installation extracts the contents to temporary files before validating the signature, as demonstrated by installing a file in the /etc/cron.d directory.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6435.html">CVE-2013-6435</cve>
<bugzilla href="https://bugzilla.suse.com/1101137">SUSE bug 1101137</bugzilla>
<bugzilla href="https://bugzilla.suse.com/906803">SUSE bug 906803</bugzilla>
<bugzilla href="https://bugzilla.suse.com/908128">SUSE bug 908128</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204751" comment="popt-1.7-37.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204752" comment="popt-32bit-1.7-37.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204753" comment="rpm-4.4.2.3-37.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201990" comment="rpm-32bit-4.4.2.3-37.60 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204751" comment="popt-1.7-37.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204752" comment="popt-32bit-1.7-37.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208941" comment="popt-x86-1.7-37.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204753" comment="rpm-4.4.2.3-37.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201990" comment="rpm-32bit-4.4.2.3-37.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201993" comment="rpm-x86-4.4.2.3-37.60 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6436</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-6436" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6436" source="CVE"/>
    <description>
    The lxcDomainGetMemoryParameters method in lxc/lxc_driver.c in libvirt 1.0.5 through 1.2.0 does not properly check the status of LXC guests when reading memory tunables, which allows local users to cause a denial of service (NULL pointer dereference and libvirtd crash) via a guest in the shutdown status, as demonstrated by the "virsh memtune" command.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6436.html">CVE-2013-6436</cve>
<bugzilla href="https://bugzilla.suse.com/854486">SUSE bug 854486</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214761" comment="libvirt-1.0.5.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214762" comment="libvirt-client-1.0.5.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204664" comment="libvirt-client-32bit-1.0.5.9-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214764" comment="libvirt-doc-1.0.5.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214766" comment="libvirt-lock-sanlock-1.0.5.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214765" comment="libvirt-python-1.0.5.8-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214761" comment="libvirt-1.0.5.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214762" comment="libvirt-client-1.0.5.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214763" comment="libvirt-client-32bit-1.0.5.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214764" comment="libvirt-doc-1.0.5.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214766" comment="libvirt-lock-sanlock-1.0.5.8-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214765" comment="libvirt-python-1.0.5.8-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6438</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-6438" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6438" source="CVE"/>
    <description>
    The dav_xml_get_cdata function in main/util.c in the mod_dav module in the Apache HTTP Server before 2.4.8 does not properly remove whitespace characters from CDATA sections, which allows remote attackers to cause a denial of service (daemon crash) via a crafted DAV WRITE request.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6438.html">CVE-2013-6438</cve>
<bugzilla href="https://bugzilla.suse.com/869105">SUSE bug 869105</bugzilla>
<bugzilla href="https://bugzilla.suse.com/869106">SUSE bug 869106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/887765">SUSE bug 887765</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201563" comment="apache2-2.2.12-1.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201565" comment="apache2-doc-2.2.12-1.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201566" comment="apache2-example-pages-2.2.12-1.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201567" comment="apache2-prefork-2.2.12-1.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201568" comment="apache2-utils-2.2.12-1.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201569" comment="apache2-worker-2.2.12-1.46 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6441</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-6441" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6441" source="CVE"/>
    <description>
    The lxc-sshd template (templates/lxc-sshd.in) in LXC before 1.0.0.beta2 uses read-write permissions when mounting /sbin/init, which allows local users to gain privileges by modifying the init file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6441.html">CVE-2013-6441</cve>
<bugzilla href="https://bugzilla.suse.com/855809">SUSE bug 855809</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201911" comment="lxc-0.8.0-0.21 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6456</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-6456" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6456" source="CVE"/>
    <description>
    The LXC driver (lxc/lxc_driver.c) in libvirt 1.0.1 through 1.2.1 allows local users to (1) delete arbitrary host devices via the virDomainDeviceDettach API and a symlink attack on /dev in the container; (2) create arbitrary nodes (mknod) via the virDomainDeviceAttach API and a symlink attack on /dev in the container; and cause a denial of service (shutdown or reboot host OS) via the (3) virDomainShutdown or (4) virDomainReboot API and a symlink attack on /dev/initctl in the container, related to "paths under /proc/$PID/root" and the virInitctlSetRunLevel function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6456.html">CVE-2013-6456</cve>
<bugzilla href="https://bugzilla.suse.com/857490">SUSE bug 857490</bugzilla>
<bugzilla href="https://bugzilla.suse.com/868943">SUSE bug 868943</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204662" comment="libvirt-1.0.5.9-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204663" comment="libvirt-client-1.0.5.9-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204664" comment="libvirt-client-32bit-1.0.5.9-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204665" comment="libvirt-doc-1.0.5.9-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208759" comment="libvirt-lock-sanlock-1.0.5.9-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204666" comment="libvirt-python-1.0.5.9-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6458</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-6458" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6458" source="CVE"/>
    <description>
    Multiple race conditions in the (1) virDomainBlockStats, (2) virDomainGetBlockInf, (3) qemuDomainBlockJobImpl, and (4) virDomainGetBlockIoTune functions in libvirt before 1.2.1 do not properly verify that the disk is attached, which allows remote read-only attackers to cause a denial of service (libvirtd crash) via the virDomainDetachDeviceFlags command.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6458.html">CVE-2013-6458</cve>
<bugzilla href="https://bugzilla.suse.com/857492">SUSE bug 857492</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214775" comment="libvirt-1.0.5.9-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214776" comment="libvirt-client-1.0.5.9-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204664" comment="libvirt-client-32bit-1.0.5.9-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214778" comment="libvirt-doc-1.0.5.9-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214780" comment="libvirt-lock-sanlock-1.0.5.9-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214779" comment="libvirt-python-1.0.5.9-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214775" comment="libvirt-1.0.5.9-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214776" comment="libvirt-client-1.0.5.9-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214777" comment="libvirt-client-32bit-1.0.5.9-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214778" comment="libvirt-doc-1.0.5.9-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214780" comment="libvirt-lock-sanlock-1.0.5.9-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214779" comment="libvirt-python-1.0.5.9-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6462</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-6462" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6462" source="CVE"/>
    <description>
    Stack-based buffer overflow in the bdfReadCharacters function in bitmap/bdfread.c in X.Org libXfont 1.1 through 1.4.6 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string in a character name in a BDF font file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6462.html">CVE-2013-6462</cve>
<bugzilla href="https://bugzilla.suse.com/854915">SUSE bug 854915</bugzilla>
<bugzilla href="https://bugzilla.suse.com/882908">SUSE bug 882908</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204164" comment="xorg-x11-libs-7.4-8.26.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204165" comment="xorg-x11-libs-32bit-7.4-8.26.40 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204164" comment="xorg-x11-libs-7.4-8.26.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204962" comment="xorg-x11-libs-32bit-7.4-8.26.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209102" comment="xorg-x11-libs-x86-7.4-8.26.42 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6463</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-6463" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6463" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2013-7266, CVE-2013-7267, CVE-2013-7268, CVE-2013-7269, CVE-2013-7270, CVE-2013-7271.  Reason: This candidate is a duplicate of CVE-2013-7266, CVE-2013-7267, CVE-2013-7268, CVE-2013-7269, CVE-2013-7270, and CVE-2013-7271.  Notes: All CVE users should reference CVE-2013-7266, CVE-2013-7267, CVE-2013-7268, CVE-2013-7269, CVE-2013-7270, and/or CVE-2013-7271 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6463.html">CVE-2013-6463</cve>
<bugzilla href="https://bugzilla.suse.com/854722">SUSE bug 854722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/857643">SUSE bug 857643</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214059" comment="kernel-default-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214060" comment="kernel-default-base-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214061" comment="kernel-default-devel-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214063" comment="kernel-source-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214064" comment="kernel-syms-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214103" comment="kernel-trace-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214104" comment="kernel-trace-base-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214065" comment="kernel-trace-devel-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6497</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-6497" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6497" source="CVE"/>
    <description>
    clamscan in ClamAV before 0.98.5, when using -a option, allows remote attackers to cause a denial of service (crash) as demonstrated by the jwplayer.js file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6497.html">CVE-2013-6497</cve>
<bugzilla href="https://bugzilla.suse.com/1040662">SUSE bug 1040662</bugzilla>
<bugzilla href="https://bugzilla.suse.com/906077">SUSE bug 906077</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214783" comment="clamav-0.98.5-0.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6501</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-6501" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6501" source="CVE"/>
    <description>
    The default soap.wsdl_cache_dir setting in (1) php.ini-production and (2) php.ini-development in PHP through 5.6.7 specifies the /tmp directory, which makes it easier for local users to conduct WSDL injection attacks by creating a file under /tmp with a predictable filename that is used by the get_sdl function in ext/soap/php_sdl.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6501.html">CVE-2013-6501</cve>
<bugzilla href="https://bugzilla.suse.com/917302">SUSE bug 917302</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214784" comment="apache2-mod_php53-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214785" comment="php53-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214786" comment="php53-bcmath-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214787" comment="php53-bz2-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214788" comment="php53-calendar-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214789" comment="php53-ctype-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214790" comment="php53-curl-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214791" comment="php53-dba-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214792" comment="php53-dom-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214793" comment="php53-exif-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214794" comment="php53-fastcgi-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214795" comment="php53-fileinfo-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214796" comment="php53-ftp-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214797" comment="php53-gd-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214798" comment="php53-gettext-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214799" comment="php53-gmp-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214800" comment="php53-iconv-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214801" comment="php53-intl-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214802" comment="php53-json-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214803" comment="php53-ldap-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214804" comment="php53-mbstring-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214805" comment="php53-mcrypt-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214806" comment="php53-mysql-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214807" comment="php53-odbc-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214808" comment="php53-openssl-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214809" comment="php53-pcntl-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214810" comment="php53-pdo-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214811" comment="php53-pear-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214812" comment="php53-pgsql-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214813" comment="php53-pspell-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214814" comment="php53-shmop-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214815" comment="php53-snmp-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214816" comment="php53-soap-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214817" comment="php53-suhosin-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214818" comment="php53-sysvmsg-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214819" comment="php53-sysvsem-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214820" comment="php53-sysvshm-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214821" comment="php53-tokenizer-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214822" comment="php53-wddx-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214823" comment="php53-xmlreader-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214824" comment="php53-xmlrpc-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214825" comment="php53-xmlwriter-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214826" comment="php53-xsl-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214827" comment="php53-zip-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214828" comment="php53-zlib-5.3.17-0.35 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6629</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-6629" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6629" source="CVE"/>
    <description>
    The get_sos function in jdmarker.c in (1) libjpeg 6b and (2) libjpeg-turbo through 1.3.0, as used in Google Chrome before 31.0.1650.48, Ghostscript, and other products, does not check for certain duplications of component data during the reading of segments that follow Start Of Scan (SOS) JPEG markers, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6629.html">CVE-2013-6629</cve>
<bugzilla href="https://bugzilla.suse.com/850430">SUSE bug 850430</bugzilla>
<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214839" comment="java-1_6_0-ibm-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214840" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214841" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214839" comment="java-1_6_0-ibm-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214840" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214841" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214842" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214844" comment="java-1_7_0-ibm-alsa-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214846" comment="java-1_7_0-ibm-plugin-1.7.0_sr7.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6671</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-6671" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6671" source="CVE"/>
    <description>
    The nsGfxScrollFrameInner::IsLTR function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code via crafted use of JavaScript code for ordered list elements.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6671.html">CVE-2013-6671</cve>
<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204339" comment="MozillaFirefox-24.2.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204340" comment="MozillaFirefox-translations-24.2.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204341" comment="libfreebl3-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204342" comment="libfreebl3-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204343" comment="libsoftokn3-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204344" comment="libsoftokn3-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204345" comment="mozilla-nss-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204346" comment="mozilla-nss-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204347" comment="mozilla-nss-tools-3.15.3.1-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204339" comment="MozillaFirefox-24.2.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204340" comment="MozillaFirefox-translations-24.2.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204341" comment="libfreebl3-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204342" comment="libfreebl3-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208481" comment="libfreebl3-x86-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204343" comment="libsoftokn3-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204344" comment="libsoftokn3-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208482" comment="libsoftokn3-x86-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204345" comment="mozilla-nss-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204346" comment="mozilla-nss-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204347" comment="mozilla-nss-tools-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208483" comment="mozilla-nss-x86-3.15.3.1-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6672</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-6672" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6672" source="CVE"/>
    <description>
    Mozilla Firefox before 26.0 and SeaMonkey before 2.23 on Linux allow user-assisted remote attackers to read clipboard data by leveraging certain middle-click paste operations.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6672.html">CVE-2013-6672</cve>
<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204339" comment="MozillaFirefox-24.2.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204340" comment="MozillaFirefox-translations-24.2.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204341" comment="libfreebl3-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204342" comment="libfreebl3-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204343" comment="libsoftokn3-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204344" comment="libsoftokn3-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204345" comment="mozilla-nss-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204346" comment="mozilla-nss-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204347" comment="mozilla-nss-tools-3.15.3.1-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204339" comment="MozillaFirefox-24.2.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204340" comment="MozillaFirefox-translations-24.2.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204341" comment="libfreebl3-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204342" comment="libfreebl3-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208481" comment="libfreebl3-x86-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204343" comment="libsoftokn3-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204344" comment="libsoftokn3-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208482" comment="libsoftokn3-x86-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204345" comment="mozilla-nss-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204346" comment="mozilla-nss-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204347" comment="mozilla-nss-tools-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208483" comment="mozilla-nss-x86-3.15.3.1-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6673</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-6673" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6673" source="CVE"/>
    <description>
    Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 do not recognize a user's removal of trust from an EV X.509 certificate, which makes it easier for man-in-the-middle attackers to spoof SSL servers in opportunistic circumstances via a valid certificate that is unacceptable to the user.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6673.html">CVE-2013-6673</cve>
<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204339" comment="MozillaFirefox-24.2.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204340" comment="MozillaFirefox-translations-24.2.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204341" comment="libfreebl3-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204342" comment="libfreebl3-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204343" comment="libsoftokn3-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204344" comment="libsoftokn3-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204345" comment="mozilla-nss-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204346" comment="mozilla-nss-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204347" comment="mozilla-nss-tools-3.15.3.1-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204339" comment="MozillaFirefox-24.2.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204340" comment="MozillaFirefox-translations-24.2.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204341" comment="libfreebl3-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204342" comment="libfreebl3-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208481" comment="libfreebl3-x86-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204343" comment="libsoftokn3-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204344" comment="libsoftokn3-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208482" comment="libsoftokn3-x86-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204345" comment="mozilla-nss-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204346" comment="mozilla-nss-32bit-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204347" comment="mozilla-nss-tools-3.15.3.1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208483" comment="mozilla-nss-x86-3.15.3.1-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6712</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-6712" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6712" source="CVE"/>
    <description>
    The scan function in ext/date/lib/parse_iso_intervals.c in PHP through 5.5.6 does not properly restrict creation of DateInterval objects, which might allow remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted interval specification.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6712.html">CVE-2013-6712</cve>
<bugzilla href="https://bugzilla.suse.com/853045">SUSE bug 853045</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214453" comment="apache2-mod_php53-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214454" comment="php53-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214455" comment="php53-bcmath-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214456" comment="php53-bz2-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214457" comment="php53-calendar-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214458" comment="php53-ctype-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214459" comment="php53-curl-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214460" comment="php53-dba-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214461" comment="php53-dom-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214462" comment="php53-exif-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214463" comment="php53-fastcgi-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214464" comment="php53-fileinfo-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214465" comment="php53-ftp-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214466" comment="php53-gd-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214467" comment="php53-gettext-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214468" comment="php53-gmp-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214469" comment="php53-iconv-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214470" comment="php53-intl-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214471" comment="php53-json-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214472" comment="php53-ldap-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214473" comment="php53-mbstring-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214474" comment="php53-mcrypt-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214475" comment="php53-mysql-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214476" comment="php53-odbc-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214477" comment="php53-openssl-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214478" comment="php53-pcntl-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214479" comment="php53-pdo-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214480" comment="php53-pear-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214481" comment="php53-pgsql-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214482" comment="php53-pspell-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214483" comment="php53-shmop-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214484" comment="php53-snmp-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214485" comment="php53-soap-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214486" comment="php53-suhosin-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214487" comment="php53-sysvmsg-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214488" comment="php53-sysvsem-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214489" comment="php53-sysvshm-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214490" comment="php53-tokenizer-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214491" comment="php53-wddx-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214492" comment="php53-xmlreader-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214493" comment="php53-xmlrpc-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214494" comment="php53-xmlwriter-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214495" comment="php53-xsl-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214496" comment="php53-zip-5.3.17-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214497" comment="php53-zlib-5.3.17-0.17 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6885</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-6885" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6885" source="CVE"/>
    <description>
    The microcode on AMD 16h 00h through 0Fh processors does not properly handle the interaction between locked instructions and write-combined memory types, which allows local users to cause a denial of service (system hang) via a crafted application, aka the errata 793 issue.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6885.html">CVE-2013-6885</cve>
<bugzilla href="https://bugzilla.suse.com/849668">SUSE bug 849668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/852967">SUSE bug 852967</bugzilla>
<bugzilla href="https://bugzilla.suse.com/853049">SUSE bug 853049</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214590" comment="kernel-default-3.0.101-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214591" comment="kernel-default-base-3.0.101-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214592" comment="kernel-default-devel-3.0.101-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214594" comment="kernel-source-3.0.101-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214595" comment="kernel-syms-3.0.101-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214648" comment="kernel-trace-3.0.101-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214649" comment="kernel-trace-base-3.0.101-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214596" comment="kernel-trace-devel-3.0.101-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204914" comment="xen-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204915" comment="xen-doc-html-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204916" comment="xen-doc-pdf-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204919" comment="xen-libs-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204920" comment="xen-libs-32bit-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204921" comment="xen-tools-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204922" comment="xen-tools-domU-4.2.4_02-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6954</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-6954" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6954" source="CVE"/>
    <description>
    The png_do_expand_palette function in libpng before 1.6.8 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via (1) a PLTE chunk of zero bytes or (2) a NULL palette, related to pngrtran.c and pngset.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6954.html">CVE-2013-6954</cve>
<bugzilla href="https://bugzilla.suse.com/856522">SUSE bug 856522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214839" comment="java-1_6_0-ibm-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214840" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214841" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214839" comment="java-1_6_0-ibm-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214840" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214841" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214842" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214844" comment="java-1_7_0-ibm-alsa-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214846" comment="java-1_7_0-ibm-plugin-1.7.0_sr7.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7027</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-7027" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7027" source="CVE"/>
    <description>
    The ieee80211_radiotap_iterator_init function in net/wireless/radiotap.c in the Linux kernel before 3.11.7 does not check whether a frame contains any data outside of the header, which might allow attackers to cause a denial of service (buffer over-read) via a crafted header.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-7027.html">CVE-2013-7027</cve>
<bugzilla href="https://bugzilla.suse.com/854634">SUSE bug 854634</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214059" comment="kernel-default-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214060" comment="kernel-default-base-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214061" comment="kernel-default-devel-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214063" comment="kernel-source-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214064" comment="kernel-syms-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214103" comment="kernel-trace-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214104" comment="kernel-trace-base-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214065" comment="kernel-trace-devel-3.0.101-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7041</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-7041" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7041" source="CVE"/>
    <description>
    The pam_userdb module for Pam uses a case-insensitive method to compare hashed passwords, which makes it easier for attackers to guess the password via a brute force attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-7041.html">CVE-2013-7041</cve>
<bugzilla href="https://bugzilla.suse.com/1123794">SUSE bug 1123794</bugzilla>
<bugzilla href="https://bugzilla.suse.com/854480">SUSE bug 854480</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009253961" comment="pam-1.1.5-0.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253962" comment="pam-32bit-1.1.5-0.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253963" comment="pam-doc-1.1.5-0.12.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7108</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-7108" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7108" source="CVE"/>
    <description>
    Multiple off-by-one errors in Nagios Core 3.5.1, 4.0.2, and earlier, and Icinga before 1.8.5, 1.9 before 1.9.4, and 1.10 before 1.10.2 allow remote authenticated users to obtain sensitive information from process memory or cause a denial of service (crash) via a long string in the last key value in the variable list to the process_cgivars function in (1) avail.c, (2) cmd.c, (3) config.c, (4) extinfo.c, (5) histogram.c, (6) notifications.c, (7) outages.c, (8) status.c, (9) statusmap.c, (10) summary.c, and (11) trends.c in cgi/, which triggers a heap-based buffer over-read.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-7108.html">CVE-2013-7108</cve>
<bugzilla href="https://bugzilla.suse.com/856837">SUSE bug 856837</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201472" comment="nagios-3.0.6-1.25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201474" comment="nagios-www-3.0.6-1.25.34 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7112</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-7112" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7112" source="CVE"/>
    <description>
    The dissect_sip_common function in epan/dissectors/packet-sip.c in the SIP dissector in Wireshark 1.8.x before 1.8.12 and 1.10.x before 1.10.4 does not check for empty lines, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-7112.html">CVE-2013-7112</cve>
<bugzilla href="https://bugzilla.suse.com/856498">SUSE bug 856498</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201527" comment="wireshark-1.8.12-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7113</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-7113" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7113" source="CVE"/>
    <description>
    epan/dissectors/packet-bssgp.c in the BSSGP dissector in Wireshark 1.10.x before 1.10.4 incorrectly relies on a global variable, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-7113.html">CVE-2013-7113</cve>
<bugzilla href="https://bugzilla.suse.com/856495">SUSE bug 856495</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214847" comment="wireshark-1.8.12-0.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7114</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-7114" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7114" source="CVE"/>
    <description>
    Multiple buffer overflows in the create_ntlmssp_v2_key function in epan/dissectors/packet-ntlmssp.c in the NTLMSSP v2 dissector in Wireshark 1.8.x before 1.8.12 and 1.10.x before 1.10.4 allow remote attackers to cause a denial of service (application crash) via a long domain name in a packet.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-7114.html">CVE-2013-7114</cve>
<bugzilla href="https://bugzilla.suse.com/856496">SUSE bug 856496</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201527" comment="wireshark-1.8.12-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7252</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-7252" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7252" source="CVE"/>
    <description>
    kwalletd in KWallet before KDE Applications 14.12.0 uses Blowfish with ECB mode instead of CBC mode when encrypting the password store, which makes it easier for attackers to guess passwords via a codebook attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-7252.html">CVE-2013-7252</cve>
<bugzilla href="https://bugzilla.suse.com/857200">SUSE bug 857200</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204465" comment="kde4-l10n-ar-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208560" comment="kde4-l10n-bg-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208561" comment="kde4-l10n-ca-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204466" comment="kde4-l10n-cs-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208562" comment="kde4-l10n-csb-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204467" comment="kde4-l10n-da-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204470" comment="kde4-l10n-de-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208563" comment="kde4-l10n-el-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204471" comment="kde4-l10n-en_GB-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204472" comment="kde4-l10n-es-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208564" comment="kde4-l10n-et-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208565" comment="kde4-l10n-eu-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208566" comment="kde4-l10n-fi-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204475" comment="kde4-l10n-fr-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208567" comment="kde4-l10n-ga-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208568" comment="kde4-l10n-gl-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208569" comment="kde4-l10n-hi-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204478" comment="kde4-l10n-hu-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208570" comment="kde4-l10n-is-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204479" comment="kde4-l10n-it-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204482" comment="kde4-l10n-ja-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208571" comment="kde4-l10n-kk-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208572" comment="kde4-l10n-km-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204483" comment="kde4-l10n-ko-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208573" comment="kde4-l10n-ku-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208574" comment="kde4-l10n-lt-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208575" comment="kde4-l10n-lv-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208576" comment="kde4-l10n-mk-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208577" comment="kde4-l10n-ml-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204484" comment="kde4-l10n-nb-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208578" comment="kde4-l10n-nds-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204485" comment="kde4-l10n-nl-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208579" comment="kde4-l10n-nn-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208580" comment="kde4-l10n-pa-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204488" comment="kde4-l10n-pl-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204491" comment="kde4-l10n-pt-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204492" comment="kde4-l10n-pt_BR-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208581" comment="kde4-l10n-ro-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204495" comment="kde4-l10n-ru-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208582" comment="kde4-l10n-sl-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204498" comment="kde4-l10n-sv-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208583" comment="kde4-l10n-th-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208584" comment="kde4-l10n-tr-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208585" comment="kde4-l10n-uk-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208586" comment="kde4-l10n-wa-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204501" comment="kde4-l10n-zh_CN-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204502" comment="kde4-l10n-zh_TW-4.3.5-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200096" comment="kdebase4-runtime-4.3.5-0.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7263</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-7263" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7263" source="CVE"/>
    <description>
    The Linux kernel before 3.12.4 updates certain length values before ensuring that associated data structures have been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call, related to net/ipv4/ping.c, net/ipv4/raw.c, net/ipv4/udp.c, net/ipv6/raw.c, and net/ipv6/udp.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-7263.html">CVE-2013-7263</cve>
<bugzilla href="https://bugzilla.suse.com/853040">SUSE bug 853040</bugzilla>
<bugzilla href="https://bugzilla.suse.com/857643">SUSE bug 857643</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214911" comment="kernel-default-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214912" comment="kernel-default-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214913" comment="kernel-default-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264496" comment="kernel-default-man-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214954" comment="kernel-ec2-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214955" comment="kernel-ec2-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214956" comment="kernel-ec2-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264488" comment="kernel-pae-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264489" comment="kernel-pae-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264490" comment="kernel-pae-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264497" comment="kernel-ppc64-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264498" comment="kernel-ppc64-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264499" comment="kernel-ppc64-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214915" comment="kernel-source-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214916" comment="kernel-syms-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214957" comment="kernel-trace-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214958" comment="kernel-trace-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214917" comment="kernel-trace-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214918" comment="kernel-xen-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214919" comment="kernel-xen-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214920" comment="kernel-xen-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214922" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.50-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264492" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.50-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7264</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-7264" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7264" source="CVE"/>
    <description>
    The l2tp_ip_recvmsg function in net/l2tp/l2tp_ip.c in the Linux kernel before 3.12.4 updates a certain length value before ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-7264.html">CVE-2013-7264</cve>
<bugzilla href="https://bugzilla.suse.com/853040">SUSE bug 853040</bugzilla>
<bugzilla href="https://bugzilla.suse.com/857643">SUSE bug 857643</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214590" comment="kernel-default-3.0.101-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214591" comment="kernel-default-base-3.0.101-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214592" comment="kernel-default-devel-3.0.101-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214594" comment="kernel-source-3.0.101-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214595" comment="kernel-syms-3.0.101-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214648" comment="kernel-trace-3.0.101-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214649" comment="kernel-trace-base-3.0.101-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214596" comment="kernel-trace-devel-3.0.101-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7265</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-7265" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7265" source="CVE"/>
    <description>
    The pn_recvmsg function in net/phonet/datagram.c in the Linux kernel before 3.12.4 updates a certain length value before ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-7265.html">CVE-2013-7265</cve>
<bugzilla href="https://bugzilla.suse.com/853040">SUSE bug 853040</bugzilla>
<bugzilla href="https://bugzilla.suse.com/857643">SUSE bug 857643</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214590" comment="kernel-default-3.0.101-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214591" comment="kernel-default-base-3.0.101-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214592" comment="kernel-default-devel-3.0.101-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214594" comment="kernel-source-3.0.101-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214595" comment="kernel-syms-3.0.101-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214648" comment="kernel-trace-3.0.101-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214649" comment="kernel-trace-base-3.0.101-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214596" comment="kernel-trace-devel-3.0.101-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7339</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-7339" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7339" source="CVE"/>
    <description>
    The rds_ib_laddr_check function in net/rds/ib.c in the Linux kernel before 3.12.8 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a bind system call for an RDS socket on a system that lacks RDS transports.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-7339.html">CVE-2013-7339</cve>
<bugzilla href="https://bugzilla.suse.com/869563">SUSE bug 869563</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213024" comment="kernel-default-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213025" comment="kernel-default-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213026" comment="kernel-default-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213028" comment="kernel-source-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213029" comment="kernel-syms-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213088" comment="kernel-trace-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213089" comment="kernel-trace-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213030" comment="kernel-trace-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7353</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-7353" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7353" source="CVE"/>
    <description>
    Integer overflow in the png_set_unknown_chunks function in libpng/pngset.c in libpng before 1.5.14beta08 allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a crafted image, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-7353.html">CVE-2013-7353</cve>
<bugzilla href="https://bugzilla.suse.com/873124">SUSE bug 873124</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200271" comment="libpng12-0-1.2.31-5.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200272" comment="libpng12-0-32bit-1.2.31-5.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200273" comment="libpng12-0-x86-1.2.31-5.33 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200271" comment="libpng12-0-1.2.31-5.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200272" comment="libpng12-0-32bit-1.2.31-5.33 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7354</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-7354" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7354" source="CVE"/>
    <description>
    Multiple integer overflows in libpng before 1.5.14rc03 allow remote attackers to cause a denial of service (crash) via a crafted image to the (1) png_set_sPLT or (2) png_set_text_2 function, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-7354.html">CVE-2013-7354</cve>
<bugzilla href="https://bugzilla.suse.com/873123">SUSE bug 873123</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200271" comment="libpng12-0-1.2.31-5.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200272" comment="libpng12-0-32bit-1.2.31-5.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200273" comment="libpng12-0-x86-1.2.31-5.33 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200271" comment="libpng12-0-1.2.31-5.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200272" comment="libpng12-0-32bit-1.2.31-5.33 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-7423" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7423" source="CVE"/>
    <description>
    The send_dg function in resolv/res_send.c in GNU C Library (aka glibc or libc6) before 2.20 does not properly reuse file descriptors, which allows remote attackers to send DNS queries to unintended locations via a large number of requests that trigger a call to the getaddrinfo function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-7423.html">CVE-2013-7423</cve>
<bugzilla href="https://bugzilla.suse.com/915526">SUSE bug 915526</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214849" comment="glibc-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214850" comment="glibc-32bit-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214851" comment="glibc-devel-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214852" comment="glibc-devel-32bit-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214881" comment="glibc-html-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214853" comment="glibc-i18ndata-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214882" comment="glibc-info-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214854" comment="glibc-locale-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214855" comment="glibc-locale-32bit-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214883" comment="glibc-profile-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214884" comment="glibc-profile-32bit-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214856" comment="nscd-2.11.3-17.82 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214849" comment="glibc-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214850" comment="glibc-32bit-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214851" comment="glibc-devel-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214852" comment="glibc-devel-32bit-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214881" comment="glibc-html-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214853" comment="glibc-i18ndata-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214882" comment="glibc-info-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214854" comment="glibc-locale-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214855" comment="glibc-locale-32bit-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264500" comment="glibc-locale-x86-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214883" comment="glibc-profile-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214884" comment="glibc-profile-32bit-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264501" comment="glibc-profile-x86-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264502" comment="glibc-x86-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214856" comment="nscd-2.11.3-17.82 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7436</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2013-7436" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7436" source="CVE"/>
    <description>
    noVNC before 0.5 does not set the secure flag for a cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-7436.html">CVE-2013-7436</cve>
<bugzilla href="https://bugzilla.suse.com/922233">SUSE bug 922233</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215814" comment="novnc-0.4-0.13 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7439</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-7439" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7439" source="CVE"/>
    <description>
    Multiple off-by-one errors in the (1) MakeBigReq and (2) SetReqLen macros in include/X11/Xlibint.h in X11R6.x and libX11 before 1.6.0 allow remote attackers to have unspecified impact via a crafted request, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-7439.html">CVE-2013-7439</cve>
<bugzilla href="https://bugzilla.suse.com/927220">SUSE bug 927220</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202127" comment="xorg-x11-libX11-7.4-5.11.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204963" comment="xorg-x11-libX11-32bit-7.4-5.11.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209103" comment="xorg-x11-libX11-x86-7.4-5.11.15 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202127" comment="xorg-x11-libX11-7.4-5.11.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204963" comment="xorg-x11-libX11-32bit-7.4-5.11.15 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7446</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2013-7446" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7446" source="CVE"/>
    <description>
    Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel before 4.3.3 allows local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-7446.html">CVE-2013-7446</cve>
<bugzilla href="https://bugzilla.suse.com/955654">SUSE bug 955654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/955837">SUSE bug 955837</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208637" comment="kernel-default-man-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208641" comment="kernel-pae-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208642" comment="kernel-pae-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208643" comment="kernel-pae-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7447</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-7447" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7447" source="CVE"/>
    <description>
    Integer overflow in the gdk_cairo_set_source_pixbuf function in gdk/gdkcairo.c in GTK+ before 3.9.8, as used in eom, gnome-photos, eog, gambas3, thunar, pinpoint, and possibly other applications, allows remote attackers to cause a denial of service (crash) via a large image file, which triggers a large memory allocation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-7447.html">CVE-2013-7447</cve>
<bugzilla href="https://bugzilla.suse.com/966682">SUSE bug 966682</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202716" comment="gtk2-2.18.9-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209341" comment="gtk2-32bit-2.18.9-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209342" comment="gtk2-doc-2.18.9-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209343" comment="gtk2-lang-2.18.9-0.44 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7459</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2013-7459" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7459" source="CVE"/>
    <description>
    Heap-based buffer overflow in the ALGnew function in block_templace.c in Python Cryptography Toolkit (aka pycrypto) allows remote attackers to execute arbitrary code as demonstrated by a crafted iv parameter to cryptmsg.py.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-7459.html">CVE-2013-7459</cve>
<bugzilla href="https://bugzilla.suse.com/1017420">SUSE bug 1017420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1047666">SUSE bug 1047666</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1087140">SUSE bug 1087140</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206232" comment="python-pycrypto-2.6.1-5 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250404" comment="python-pycrypto-2.6-0.3.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0001</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0001" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0001" source="CVE"/>
    <description>
    Buffer overflow in client/mysql.cc in Oracle MySQL and MariaDB before 5.5.35 allows remote database servers to cause a denial of service (crash) and possibly execute arbitrary code via a long server version string.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0001.html">CVE-2014-0001</cve>
<bugzilla href="https://bugzilla.suse.com/861493">SUSE bug 861493</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214536" comment="libmysql55client18-32bit-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0015</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0015" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0015" source="CVE"/>
    <description>
    cURL and libcurl 7.10.6 through 7.34.0, when more than one authentication method is enabled, re-uses NTLM connections, which might allow context-dependent attackers to authenticate as other users via a request.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0015.html">CVE-2014-0015</cve>
<bugzilla href="https://bugzilla.suse.com/858673">SUSE bug 858673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/868627">SUSE bug 868627</bugzilla>
<bugzilla href="https://bugzilla.suse.com/880252">SUSE bug 880252</bugzilla>
<bugzilla href="https://bugzilla.suse.com/882520">SUSE bug 882520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/927556">SUSE bug 927556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962983">SUSE bug 962983</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214885" comment="curl-7.19.7-1.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214886" comment="libcurl4-7.19.7-1.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204266" comment="libcurl4-32bit-7.19.7-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208452" comment="libcurl4-x86-7.19.7-1.38 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214885" comment="curl-7.19.7-1.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214886" comment="libcurl4-7.19.7-1.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214887" comment="libcurl4-32bit-7.19.7-1.32 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0019</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0019" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0019" source="CVE"/>
    <description>
    Stack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and 2.0.0-b1 through 2.0.0-b6 allows local users to cause a denial of service (segmentation fault) via a long server name in the PROXY-CONNECT address in the command line.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0019.html">CVE-2014-0019</cve>
<bugzilla href="https://bugzilla.suse.com/860991">SUSE bug 860991</bugzilla>
<bugzilla href="https://bugzilla.suse.com/927161">SUSE bug 927161</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205101" comment="socat-1.7.0.0-1.18 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0050</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0050" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0050" source="CVE"/>
    <description>
    MultipartStream.java in Apache Commons FileUpload before 1.3.1, as used in Apache Tomcat, JBoss Web, and other products, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted Content-Type header that bypasses a loop's intended exit conditions.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0050.html">CVE-2014-0050</cve>
<bugzilla href="https://bugzilla.suse.com/862781">SUSE bug 862781</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200083" comment="jakarta-commons-fileupload-1.1.1-1.37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200084" comment="jakarta-commons-fileupload-javadoc-1.1.1-1.37 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0055</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0055" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0055" source="CVE"/>
    <description>
    The get_rx_bufs function in drivers/vhost/net.c in the vhost-net subsystem in the Linux kernel package before 2.6.32-431.11.2 on Red Hat Enterprise Linux (RHEL) 6 does not properly handle vhost_get_vq_desc errors, which allows guest OS users to cause a denial of service (host OS crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0055.html">CVE-2014-0055</cve>
<bugzilla href="https://bugzilla.suse.com/870173">SUSE bug 870173</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213024" comment="kernel-default-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213025" comment="kernel-default-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213026" comment="kernel-default-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213028" comment="kernel-source-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213029" comment="kernel-syms-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213088" comment="kernel-trace-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213089" comment="kernel-trace-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213030" comment="kernel-trace-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0060</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0060" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0060" source="CVE"/>
    <description>
    PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 does not properly enforce the ADMIN OPTION restriction, which allows remote authenticated members of a role to add or remove arbitrary users to that role by calling the SET ROLE command before the associated GRANT command.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0060.html">CVE-2014-0060</cve>
<bugzilla href="https://bugzilla.suse.com/864845">SUSE bug 864845</bugzilla>
<bugzilla href="https://bugzilla.suse.com/864856">SUSE bug 864856</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204600" comment="libecpg6-9.1.12-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204601" comment="libpq5-9.1.12-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204602" comment="libpq5-32bit-9.1.12-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204603" comment="postgresql91-9.1.12-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208735" comment="postgresql91-contrib-9.1.12-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204604" comment="postgresql91-docs-9.1.12-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208736" comment="postgresql91-server-9.1.12-0.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0061</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0061" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0061" source="CVE"/>
    <description>
    The validator functions for the procedural languages (PLs) in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to gain privileges via a function that is (1) defined in another language or (2) not allowed to be directly called by the user due to permissions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0061.html">CVE-2014-0061</cve>
<bugzilla href="https://bugzilla.suse.com/864846">SUSE bug 864846</bugzilla>
<bugzilla href="https://bugzilla.suse.com/864856">SUSE bug 864856</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204600" comment="libecpg6-9.1.12-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204601" comment="libpq5-9.1.12-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204602" comment="libpq5-32bit-9.1.12-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204603" comment="postgresql91-9.1.12-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208735" comment="postgresql91-contrib-9.1.12-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204604" comment="postgresql91-docs-9.1.12-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208736" comment="postgresql91-server-9.1.12-0.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0062</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0062" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0062" source="CVE"/>
    <description>
    Race condition in the (1) CREATE INDEX and (2) unspecified ALTER TABLE commands in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allows remote authenticated users to create an unauthorized index or read portions of unauthorized tables by creating or deleting a table with the same name during the timing window.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0062.html">CVE-2014-0062</cve>
<bugzilla href="https://bugzilla.suse.com/864847">SUSE bug 864847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/864856">SUSE bug 864856</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204600" comment="libecpg6-9.1.12-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204601" comment="libpq5-9.1.12-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204602" comment="libpq5-32bit-9.1.12-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204603" comment="postgresql91-9.1.12-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208735" comment="postgresql91-contrib-9.1.12-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204604" comment="postgresql91-docs-9.1.12-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208736" comment="postgresql91-server-9.1.12-0.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0063</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0063" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0063" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via vectors related to an incorrect MAXDATELEN constant and datetime values involving (1) intervals, (2) timestamps, or (3) timezones, a different vulnerability than CVE-2014-0065.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0063.html">CVE-2014-0063</cve>
<bugzilla href="https://bugzilla.suse.com/864850">SUSE bug 864850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/864856">SUSE bug 864856</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204600" comment="libecpg6-9.1.12-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204601" comment="libpq5-9.1.12-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204602" comment="libpq5-32bit-9.1.12-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204603" comment="postgresql91-9.1.12-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208735" comment="postgresql91-contrib-9.1.12-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204604" comment="postgresql91-docs-9.1.12-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208736" comment="postgresql91-server-9.1.12-0.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0064</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0064" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0064" source="CVE"/>
    <description>
    Multiple integer overflows in the path_in and other unspecified functions in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to have unspecified impact and attack vectors, which trigger a buffer overflow.  NOTE: this identifier has been SPLIT due to different affected versions; use CVE-2014-2669 for the hstore vector.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0064.html">CVE-2014-0064</cve>
<bugzilla href="https://bugzilla.suse.com/864851">SUSE bug 864851</bugzilla>
<bugzilla href="https://bugzilla.suse.com/864856">SUSE bug 864856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/871307">SUSE bug 871307</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204600" comment="libecpg6-9.1.12-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204601" comment="libpq5-9.1.12-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204602" comment="libpq5-32bit-9.1.12-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204603" comment="postgresql91-9.1.12-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208735" comment="postgresql91-contrib-9.1.12-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204604" comment="postgresql91-docs-9.1.12-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208736" comment="postgresql91-server-9.1.12-0.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0065</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0065" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0065" source="CVE"/>
    <description>
    Multiple buffer overflows in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to have unspecified impact and attack vectors, a different vulnerability than CVE-2014-0063.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0065.html">CVE-2014-0065</cve>
<bugzilla href="https://bugzilla.suse.com/864852">SUSE bug 864852</bugzilla>
<bugzilla href="https://bugzilla.suse.com/864856">SUSE bug 864856</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204600" comment="libecpg6-9.1.12-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204601" comment="libpq5-9.1.12-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204602" comment="libpq5-32bit-9.1.12-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204603" comment="postgresql91-9.1.12-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208735" comment="postgresql91-contrib-9.1.12-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204604" comment="postgresql91-docs-9.1.12-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208736" comment="postgresql91-server-9.1.12-0.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0066</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0066" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0066" source="CVE"/>
    <description>
    The chkpass extension in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 does not properly check the return value of the crypt library function, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0066.html">CVE-2014-0066</cve>
<bugzilla href="https://bugzilla.suse.com/864853">SUSE bug 864853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/864856">SUSE bug 864856</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204600" comment="libecpg6-9.1.12-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204601" comment="libpq5-9.1.12-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204602" comment="libpq5-32bit-9.1.12-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204603" comment="postgresql91-9.1.12-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208735" comment="postgresql91-contrib-9.1.12-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204604" comment="postgresql91-docs-9.1.12-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208736" comment="postgresql91-server-9.1.12-0.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0069</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0069" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0069" source="CVE"/>
    <description>
    The cifs_iovec_write function in fs/cifs/file.c in the Linux kernel through 3.13.5 does not properly handle uncached write operations that copy fewer than the requested number of bytes, which allows local users to obtain sensitive information from kernel memory, cause a denial of service (memory corruption and system crash), or possibly gain privileges via a writev system call with a crafted pointer.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0069.html">CVE-2014-0069</cve>
<bugzilla href="https://bugzilla.suse.com/864025">SUSE bug 864025</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214590" comment="kernel-default-3.0.101-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214591" comment="kernel-default-base-3.0.101-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214592" comment="kernel-default-devel-3.0.101-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214594" comment="kernel-source-3.0.101-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214595" comment="kernel-syms-3.0.101-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214648" comment="kernel-trace-3.0.101-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214649" comment="kernel-trace-base-3.0.101-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214596" comment="kernel-trace-devel-3.0.101-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0076</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0076" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0076" source="CVE"/>
    <description>
    The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cache side-channel attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0076.html">CVE-2014-0076</cve>
<bugzilla href="https://bugzilla.suse.com/869945">SUSE bug 869945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/880891">SUSE bug 880891</bugzilla>
<bugzilla href="https://bugzilla.suse.com/883126">SUSE bug 883126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214895" comment="libopenssl0_9_8-0.9.8j-0.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204623" comment="libopenssl0_9_8-32bit-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214904" comment="libopenssl0_9_8-hmac-0.9.8j-0.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208745" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208746" comment="libopenssl0_9_8-x86-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214897" comment="openssl-0.9.8j-0.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214906" comment="openssl-doc-0.9.8j-0.54 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214895" comment="libopenssl0_9_8-0.9.8j-0.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214896" comment="libopenssl0_9_8-32bit-0.9.8j-0.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214904" comment="libopenssl0_9_8-hmac-0.9.8j-0.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214905" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214897" comment="openssl-0.9.8j-0.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214906" comment="openssl-doc-0.9.8j-0.54 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0077</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0077" source="CVE"/>
    <description>
    drivers/vhost/net.c in the Linux kernel before 3.13.10, when mergeable buffers are disabled, does not properly validate packet lengths, which allows guest OS users to cause a denial of service (memory corruption and host OS crash) or possibly gain privileges on the host OS via crafted packets, related to the handle_rx and get_rx_bufs functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0077.html">CVE-2014-0077</cve>
<bugzilla href="https://bugzilla.suse.com/870173">SUSE bug 870173</bugzilla>
<bugzilla href="https://bugzilla.suse.com/870576">SUSE bug 870576</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213024" comment="kernel-default-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213025" comment="kernel-default-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213026" comment="kernel-default-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213028" comment="kernel-source-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213029" comment="kernel-syms-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213088" comment="kernel-trace-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213089" comment="kernel-trace-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213030" comment="kernel-trace-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0092</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0092" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0092" source="CVE"/>
    <description>
    lib/x509/verify.c in GnuTLS before 3.1.22 and 3.2.x before 3.2.12 does not properly handle unspecified errors when verifying X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0092.html">CVE-2014-0092</cve>
<bugzilla href="https://bugzilla.suse.com/865804">SUSE bug 865804</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915878">SUSE bug 915878</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009211379" comment="gnutls-2.4.1-24.39.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009211382" comment="libgnutls-extra26-2.4.1-24.39.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009211380" comment="libgnutls26-2.4.1-24.39.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204425" comment="libgnutls26-32bit-2.4.1-24.39.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208526" comment="libgnutls26-x86-2.4.1-24.39.51 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009211379" comment="gnutls-2.4.1-24.39.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009211382" comment="libgnutls-extra26-2.4.1-24.39.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009211380" comment="libgnutls26-2.4.1-24.39.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009211381" comment="libgnutls26-32bit-2.4.1-24.39.49 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0096</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0096" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0096" source="CVE"/>
    <description>
    java/org/apache/catalina/servlets/DefaultServlet.java in the default servlet in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 does not properly restrict XSLT stylesheets, which allows remote attackers to bypass security-manager restrictions and read arbitrary files via a crafted web application that provides an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0096.html">CVE-2014-0096</cve>
<bugzilla href="https://bugzilla.suse.com/865746">SUSE bug 865746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/880346">SUSE bug 880346</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209043" comment="libtcnative-1-0-1.3.3-12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200457" comment="tomcat6-6.0.41-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200458" comment="tomcat6-admin-webapps-6.0.41-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200459" comment="tomcat6-docs-webapp-6.0.41-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200460" comment="tomcat6-javadoc-6.0.41-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200461" comment="tomcat6-jsp-2_1-api-6.0.41-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200462" comment="tomcat6-lib-6.0.41-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200463" comment="tomcat6-servlet-2_5-api-6.0.41-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200464" comment="tomcat6-webapps-6.0.41-0.43 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0098</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0098" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0098" source="CVE"/>
    <description>
    The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server before 2.4.8 allows remote attackers to cause a denial of service (segmentation fault and daemon crash) via a crafted cookie that is not properly handled during truncation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0098.html">CVE-2014-0098</cve>
<bugzilla href="https://bugzilla.suse.com/869106">SUSE bug 869106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/887765">SUSE bug 887765</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201563" comment="apache2-2.2.12-1.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201565" comment="apache2-doc-2.2.12-1.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201566" comment="apache2-example-pages-2.2.12-1.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201567" comment="apache2-prefork-2.2.12-1.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201568" comment="apache2-utils-2.2.12-1.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201569" comment="apache2-worker-2.2.12-1.46 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0099</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0099" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0099" source="CVE"/>
    <description>
    Integer overflow in java/org/apache/tomcat/util/buf/Ascii.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4, when operated behind a reverse proxy, allows remote attackers to conduct HTTP request smuggling attacks via a crafted Content-Length HTTP header.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0099.html">CVE-2014-0099</cve>
<bugzilla href="https://bugzilla.suse.com/865746">SUSE bug 865746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/880347">SUSE bug 880347</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209043" comment="libtcnative-1-0-1.3.3-12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200457" comment="tomcat6-6.0.41-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200458" comment="tomcat6-admin-webapps-6.0.41-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200459" comment="tomcat6-docs-webapp-6.0.41-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200460" comment="tomcat6-javadoc-6.0.41-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200461" comment="tomcat6-jsp-2_1-api-6.0.41-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200462" comment="tomcat6-lib-6.0.41-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200463" comment="tomcat6-servlet-2_5-api-6.0.41-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200464" comment="tomcat6-webapps-6.0.41-0.43 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0101</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0101" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0101" source="CVE"/>
    <description>
    The sctp_sf_do_5_1D_ce function in net/sctp/sm_statefuns.c in the Linux kernel through 3.13.6 does not validate certain auth_enable and auth_capable fields before making an sctp_sf_authenticate call, which allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via an SCTP handshake with a modified INIT chunk and a crafted AUTH chunk before a COOKIE_ECHO chunk.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0101.html">CVE-2014-0101</cve>
<bugzilla href="https://bugzilla.suse.com/866102">SUSE bug 866102</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213024" comment="kernel-default-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213025" comment="kernel-default-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213026" comment="kernel-default-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213028" comment="kernel-source-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213029" comment="kernel-syms-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213088" comment="kernel-trace-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213089" comment="kernel-trace-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213030" comment="kernel-trace-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0106</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0106" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0106" source="CVE"/>
    <description>
    Sudo 1.6.9 before 1.8.5, when env_reset is disabled, does not properly check environment variables for the env_delete restriction, which allows local users with sudo permissions to bypass intended command restrictions via a crafted environment variable.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0106.html">CVE-2014-0106</cve>
<bugzilla href="https://bugzilla.suse.com/866503">SUSE bug 866503</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204846" comment="sudo-1.7.6p2-0.21 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0107</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0107" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0107" source="CVE"/>
    <description>
    The TransformerFactory in Apache Xalan-Java before 2.7.2 does not properly restrict access to certain properties when FEATURE_SECURE_PROCESSING is enabled, which allows remote attackers to bypass expected restrictions and load arbitrary classes or access external resources via a crafted (1) xalan:content-header, (2) xalan:entities, (3) xslt:content-header, or (4) xslt:entities property, or a Java property that is bound to the XSLT 1.0 system-property function.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0107.html">CVE-2014-0107</cve>
<bugzilla href="https://bugzilla.suse.com/870082">SUSE bug 870082</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200473" comment="xalan-j2-2.7.0-217.26 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0118</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0118" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0118" source="CVE"/>
    <description>
    The deflate_in_filter function in mod_deflate.c in the mod_deflate module in the Apache HTTP Server before 2.4.10, when request body decompression is enabled, allows remote attackers to cause a denial of service (resource consumption) via crafted request data that decompresses to a much larger size.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0118.html">CVE-2014-0118</cve>
<bugzilla href="https://bugzilla.suse.com/1078450">SUSE bug 1078450</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1095150">SUSE bug 1095150</bugzilla>
<bugzilla href="https://bugzilla.suse.com/887769">SUSE bug 887769</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202407" comment="apache2-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202408" comment="apache2-devel-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202409" comment="apache2-doc-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202410" comment="apache2-example-pages-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202411" comment="apache2-prefork-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202412" comment="apache2-utils-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202413" comment="apache2-worker-2.2.34-70.12 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202407" comment="apache2-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202409" comment="apache2-doc-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202410" comment="apache2-example-pages-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202411" comment="apache2-prefork-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202412" comment="apache2-utils-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202413" comment="apache2-worker-2.2.34-70.12 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0119</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0119" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0119" source="CVE"/>
    <description>
    Apache Tomcat before 6.0.40, 7.x before 7.0.54, and 8.x before 8.0.6 does not properly constrain the class loader that accesses the XML parser used with an XSLT stylesheet, which allows remote attackers to (1) read arbitrary files via a crafted web application that provides an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue, or (2) read files associated with different web applications on a single Tomcat instance via a crafted web application.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0119.html">CVE-2014-0119</cve>
<bugzilla href="https://bugzilla.suse.com/865746">SUSE bug 865746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/880348">SUSE bug 880348</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209043" comment="libtcnative-1-0-1.3.3-12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200457" comment="tomcat6-6.0.41-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200458" comment="tomcat6-admin-webapps-6.0.41-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200459" comment="tomcat6-docs-webapp-6.0.41-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200460" comment="tomcat6-javadoc-6.0.41-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200461" comment="tomcat6-jsp-2_1-api-6.0.41-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200462" comment="tomcat6-lib-6.0.41-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200463" comment="tomcat6-servlet-2_5-api-6.0.41-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200464" comment="tomcat6-webapps-6.0.41-0.43 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0128</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0128" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0128" source="CVE"/>
    <description>
    Squid 3.1 before 3.3.12 and 3.4 before 3.4.4, when SSL-Bump is enabled, allows remote attackers to cause a denial of service (assertion failure) via a crafted range request, related to state management.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0128.html">CVE-2014-0128</cve>
<bugzilla href="https://bugzilla.suse.com/867533">SUSE bug 867533</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210806" comment="squid3-3.1.23-8.16.30 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214908" comment="squid3-3.1.12-8.16.18 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0131</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0131" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0131" source="CVE"/>
    <description>
    Use-after-free vulnerability in the skb_segment function in net/core/skbuff.c in the Linux kernel through 3.13.6 allows attackers to obtain sensitive information from kernel memory by leveraging the absence of a certain orphaning operation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0131.html">CVE-2014-0131</cve>
<bugzilla href="https://bugzilla.suse.com/824295">SUSE bug 824295</bugzilla>
<bugzilla href="https://bugzilla.suse.com/867723">SUSE bug 867723</bugzilla>
<bugzilla href="https://bugzilla.suse.com/869564">SUSE bug 869564</bugzilla>
<bugzilla href="https://bugzilla.suse.com/889071">SUSE bug 889071</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213024" comment="kernel-default-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213025" comment="kernel-default-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213026" comment="kernel-default-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213028" comment="kernel-source-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213029" comment="kernel-syms-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213088" comment="kernel-trace-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213089" comment="kernel-trace-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213030" comment="kernel-trace-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0138</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0138" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0138" source="CVE"/>
    <description>
    The default configuration in cURL and libcurl 7.10.6 before 7.36.0 re-uses (1) SCP, (2) SFTP, (3) POP3, (4) POP3S, (5) IMAP, (6) IMAPS, (7) SMTP, (8) SMTPS, (9) LDAP, and (10) LDAPS connections, which might allow context-dependent attackers to connect as other users via a request, a similar issue to CVE-2014-0015.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0138.html">CVE-2014-0138</cve>
<bugzilla href="https://bugzilla.suse.com/868627">SUSE bug 868627</bugzilla>
<bugzilla href="https://bugzilla.suse.com/880252">SUSE bug 880252</bugzilla>
<bugzilla href="https://bugzilla.suse.com/882520">SUSE bug 882520</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204264" comment="curl-7.19.7-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204265" comment="libcurl4-7.19.7-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204266" comment="libcurl4-32bit-7.19.7-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208452" comment="libcurl4-x86-7.19.7-1.38 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204264" comment="curl-7.19.7-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204265" comment="libcurl4-7.19.7-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204266" comment="libcurl4-32bit-7.19.7-1.38 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0139" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0139" source="CVE"/>
    <description>
    cURL and libcurl 7.1 before 7.36.0, when using the OpenSSL, axtls, qsossl or gskit libraries for TLS, recognize a wildcard IP address in the subject's Common Name (CN) field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0139.html">CVE-2014-0139</cve>
<bugzilla href="https://bugzilla.suse.com/868629">SUSE bug 868629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/880252">SUSE bug 880252</bugzilla>
<bugzilla href="https://bugzilla.suse.com/882520">SUSE bug 882520</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204264" comment="curl-7.19.7-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204265" comment="libcurl4-7.19.7-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204266" comment="libcurl4-32bit-7.19.7-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208452" comment="libcurl4-x86-7.19.7-1.38 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204264" comment="curl-7.19.7-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204265" comment="libcurl4-7.19.7-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204266" comment="libcurl4-32bit-7.19.7-1.38 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0142</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0142" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0142" source="CVE"/>
    <description>
    QEMU, possibly before 2.0.0, allows local users to cause a denial of service (divide-by-zero error and crash) via a zero value in the (1) tracks field to the seek_to_sector function in block/parallels.c or (2) extent_size field in the bochs function in block/bochs.c.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0142.html">CVE-2014-0142</cve>
<bugzilla href="https://bugzilla.suse.com/870439">SUSE bug 870439</bugzilla>
<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214008" comment="kvm-1.4.2-0.11 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0143" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0143" source="CVE"/>
    <description>
    Multiple integer overflows in the block drivers in QEMU, possibly before 2.0.0, allow local users to cause a denial of service (crash) via a crafted catalog size in (1) the parallels_open function in block/parallels.c or (2) bochs_open function in bochs.c, a large L1 table in the (3) qcow2_snapshot_load_tmp in qcow2-snapshot.c or (4) qcow2_grow_l1_table function in qcow2-cluster.c, (5) a large request in the bdrv_check_byte_request function in block.c and other block drivers, (6) crafted cluster indexes in the get_refcount function in qcow2-refcount.c, or (7) a large number of blocks in the cloop_open function in cloop.c, which trigger buffer overflows, memory corruption, large memory allocations and out-of-bounds read and writes.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0143.html">CVE-2014-0143</cve>
<bugzilla href="https://bugzilla.suse.com/870439">SUSE bug 870439</bugzilla>
<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214008" comment="kvm-1.4.2-0.11 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0144</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0144" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0144" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0144.html">CVE-2014-0144</cve>
<bugzilla href="https://bugzilla.suse.com/870439">SUSE bug 870439</bugzilla>
<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214008" comment="kvm-1.4.2-0.11 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0145</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0145" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0145" source="CVE"/>
    <description>
    Multiple buffer overflows in QEMU before 1.7.2 and 2.x before 2.0.0, allow local users to cause a denial of service (crash) or possibly execute arbitrary code via a large (1) L1 table in the qcow2_snapshot_load_tmp in the QCOW 2 block driver (block/qcow2-snapshot.c) or (2) uncompressed chunk, (3) chunk length, or (4) number of sectors in the DMG block driver (block/dmg.c).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0145.html">CVE-2014-0145</cve>
<bugzilla href="https://bugzilla.suse.com/870439">SUSE bug 870439</bugzilla>
<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214008" comment="kvm-1.4.2-0.11 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0146" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0146" source="CVE"/>
    <description>
    The qcow2_open function in the (block/qcow2.c) in QEMU before 1.7.2 and 2.x before 2.0.0 allows local users to cause a denial of service (NULL pointer dereference) via a crafted image which causes an error, related to the initialization of the snapshot_offset and nb_snapshots fields.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0146.html">CVE-2014-0146</cve>
<bugzilla href="https://bugzilla.suse.com/870439">SUSE bug 870439</bugzilla>
<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214008" comment="kvm-1.4.2-0.11 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0147</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0147" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0147" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0147.html">CVE-2014-0147</cve>
<bugzilla href="https://bugzilla.suse.com/870439">SUSE bug 870439</bugzilla>
<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214008" comment="kvm-1.4.2-0.11 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0150</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0150" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0150" source="CVE"/>
    <description>
    Integer overflow in the virtio_net_handle_mac function in hw/net/virtio-net.c in QEMU 2.0 and earlier allows local guest users to execute arbitrary code via a MAC addresses table update request, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0150.html">CVE-2014-0150</cve>
<bugzilla href="https://bugzilla.suse.com/873235">SUSE bug 873235</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214909" comment="kvm-1.4.2-0.15 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0155" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0155" source="CVE"/>
    <description>
    The ioapic_deliver function in virt/kvm/ioapic.c in the Linux kernel through 3.14.1 does not properly validate the kvm_irq_delivery_to_apic return value, which allows guest OS users to cause a denial of service (host OS crash) via a crafted entry in the redirection table of an I/O APIC.  NOTE: the affected code was moved to the ioapic_service function before the vulnerability was announced.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0155.html">CVE-2014-0155</cve>
<bugzilla href="https://bugzilla.suse.com/824295">SUSE bug 824295</bugzilla>
<bugzilla href="https://bugzilla.suse.com/872540">SUSE bug 872540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/889071">SUSE bug 889071</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213024" comment="kernel-default-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213025" comment="kernel-default-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213026" comment="kernel-default-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213028" comment="kernel-source-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213029" comment="kernel-syms-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213088" comment="kernel-trace-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213089" comment="kernel-trace-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213030" comment="kernel-trace-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0178</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0178" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0178" source="CVE"/>
    <description>
    Samba 3.6.6 through 3.6.23, 4.0.x before 4.0.18, and 4.1.x before 4.1.8, when a certain vfs shadow copy configuration is enabled, does not properly initialize the SRV_SNAPSHOT_ARRAY response field, which allows remote authenticated users to obtain potentially sensitive information from process memory via a (1) FSCTL_GET_SHADOW_COPY_DATA or (2) FSCTL_SRV_ENUMERATE_SNAPSHOTS request.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0178.html">CVE-2014-0178</cve>
<bugzilla href="https://bugzilla.suse.com/872396">SUSE bug 872396</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208443" comment="ldapsmb-1.34b-12.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204232" comment="libldb1-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204234" comment="libsmbclient0-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204235" comment="libsmbclient0-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204236" comment="libtalloc2-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204237" comment="libtalloc2-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204238" comment="libtdb1-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204239" comment="libtdb1-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204240" comment="libtevent0-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204241" comment="libtevent0-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204242" comment="libwbclient0-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204243" comment="libwbclient0-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204244" comment="samba-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204245" comment="samba-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204246" comment="samba-client-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204247" comment="samba-client-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204248" comment="samba-doc-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204249" comment="samba-krb-printing-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204250" comment="samba-winbind-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204251" comment="samba-winbind-32bit-3.6.3-0.52 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208443" comment="ldapsmb-1.34b-12.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204232" comment="libldb1-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204234" comment="libsmbclient0-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204235" comment="libsmbclient0-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208444" comment="libsmbclient0-x86-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204236" comment="libtalloc2-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204237" comment="libtalloc2-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208445" comment="libtalloc2-x86-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204238" comment="libtdb1-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204239" comment="libtdb1-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208446" comment="libtdb1-x86-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204240" comment="libtevent0-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204241" comment="libtevent0-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204242" comment="libwbclient0-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204243" comment="libwbclient0-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208447" comment="libwbclient0-x86-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204244" comment="samba-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204245" comment="samba-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204246" comment="samba-client-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204247" comment="samba-client-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208448" comment="samba-client-x86-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204248" comment="samba-doc-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204249" comment="samba-krb-printing-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204250" comment="samba-winbind-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204251" comment="samba-winbind-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208449" comment="samba-winbind-x86-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208450" comment="samba-x86-3.6.3-0.52 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0179</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0179" source="CVE"/>
    <description>
    libvirt 0.7.5 through 1.2.x before 1.2.5 allows local users to cause a denial of service (read block and hang) via a crafted XML document containing an XML external entity declaration in conjunction with an entity reference to the (1) virConnectCompareCPU or (2) virConnectBaselineCPU API method, related to an XML External Entity (XXE) issue.  NOTE: this issue was SPLIT per ADT3 due to different affected versions of some vectors. CVE-2014-5177 is used for other API methods.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0179.html">CVE-2014-0179</cve>
<bugzilla href="https://bugzilla.suse.com/873705">SUSE bug 873705</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204662" comment="libvirt-1.0.5.9-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204663" comment="libvirt-client-1.0.5.9-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204664" comment="libvirt-client-32bit-1.0.5.9-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204665" comment="libvirt-doc-1.0.5.9-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208759" comment="libvirt-lock-sanlock-1.0.5.9-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204666" comment="libvirt-python-1.0.5.9-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0181</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2014-0181" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0181" source="CVE"/>
    <description>
    The Netlink implementation in the Linux kernel through 3.14.1 does not provide a mechanism for authorizing socket operations based on the opener of a socket, which allows local users to bypass intended access restrictions and modify network configurations by using a Netlink socket for the (1) stdout or (2) stderr of a setuid program.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0181.html">CVE-2014-0181</cve>
<bugzilla href="https://bugzilla.suse.com/875051">SUSE bug 875051</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214952" comment="kernel-bigsmp-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214953" comment="kernel-bigsmp-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214910" comment="kernel-bigsmp-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214911" comment="kernel-default-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214912" comment="kernel-default-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214913" comment="kernel-default-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264496" comment="kernel-default-man-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214954" comment="kernel-ec2-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214955" comment="kernel-ec2-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214956" comment="kernel-ec2-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264488" comment="kernel-pae-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264489" comment="kernel-pae-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264490" comment="kernel-pae-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264497" comment="kernel-ppc64-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264498" comment="kernel-ppc64-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264499" comment="kernel-ppc64-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214915" comment="kernel-source-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214916" comment="kernel-syms-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214957" comment="kernel-trace-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214958" comment="kernel-trace-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214917" comment="kernel-trace-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214918" comment="kernel-xen-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214919" comment="kernel-xen-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214920" comment="kernel-xen-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214922" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.50-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264492" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.50-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0196</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0196" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0196" source="CVE"/>
    <description>
    The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO &amp; !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0196.html">CVE-2014-0196</cve>
<bugzilla href="https://bugzilla.suse.com/871252">SUSE bug 871252</bugzilla>
<bugzilla href="https://bugzilla.suse.com/875690">SUSE bug 875690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/876463">SUSE bug 876463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877345">SUSE bug 877345</bugzilla>
<bugzilla href="https://bugzilla.suse.com/879878">SUSE bug 879878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/933423">SUSE bug 933423</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214964" comment="kernel-default-3.0.101-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214965" comment="kernel-default-base-3.0.101-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214966" comment="kernel-default-devel-3.0.101-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214968" comment="kernel-source-3.0.101-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214969" comment="kernel-syms-3.0.101-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215008" comment="kernel-trace-3.0.101-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215009" comment="kernel-trace-base-3.0.101-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214970" comment="kernel-trace-devel-3.0.101-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0207</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0207" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0207" source="CVE"/>
    <description>
    The cdf_read_short_sector function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted CDF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0207.html">CVE-2014-0207</cve>
<bugzilla href="https://bugzilla.suse.com/884986">SUSE bug 884986</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215010" comment="apache2-mod_php53-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215011" comment="php53-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215012" comment="php53-bcmath-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215013" comment="php53-bz2-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215014" comment="php53-calendar-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215015" comment="php53-ctype-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215016" comment="php53-curl-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215017" comment="php53-dba-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215018" comment="php53-dom-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215019" comment="php53-exif-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215020" comment="php53-fastcgi-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215021" comment="php53-fileinfo-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215022" comment="php53-ftp-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215023" comment="php53-gd-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215024" comment="php53-gettext-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215025" comment="php53-gmp-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215026" comment="php53-iconv-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215027" comment="php53-intl-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215028" comment="php53-json-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215029" comment="php53-ldap-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215030" comment="php53-mbstring-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215031" comment="php53-mcrypt-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215032" comment="php53-mysql-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215033" comment="php53-odbc-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215034" comment="php53-openssl-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215035" comment="php53-pcntl-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215036" comment="php53-pdo-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215037" comment="php53-pear-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215038" comment="php53-pgsql-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215039" comment="php53-pspell-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215040" comment="php53-shmop-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215041" comment="php53-snmp-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215042" comment="php53-soap-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215043" comment="php53-suhosin-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215044" comment="php53-sysvmsg-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215045" comment="php53-sysvsem-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215046" comment="php53-sysvshm-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215047" comment="php53-tokenizer-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215048" comment="php53-wddx-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215049" comment="php53-xmlreader-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215050" comment="php53-xmlrpc-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215051" comment="php53-xmlwriter-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215052" comment="php53-xsl-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215053" comment="php53-zip-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215054" comment="php53-zlib-5.3.17-0.27 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0209" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0209" source="CVE"/>
    <description>
    Multiple integer overflows in the (1) FontFileAddEntry and (2) lexAlias functions in X.Org libXfont before 1.4.8 and 1.4.9x before 1.4.99.901 might allow local users to gain privileges by adding a directory with a large fonts.dir or fonts.alias file to the font path, which triggers a heap-based buffer overflow, related to metadata.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0209.html">CVE-2014-0209</cve>
<bugzilla href="https://bugzilla.suse.com/857544">SUSE bug 857544</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204961" comment="xorg-x11-libs-7.4-8.26.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204962" comment="xorg-x11-libs-32bit-7.4-8.26.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209102" comment="xorg-x11-libs-x86-7.4-8.26.42 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204961" comment="xorg-x11-libs-7.4-8.26.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204962" comment="xorg-x11-libs-32bit-7.4-8.26.42 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0210</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0210" source="CVE"/>
    <description>
    Multiple buffer overflows in X.Org libXfont before 1.4.8 and 1.4.9x before 1.4.99.901 allow remote font servers to execute arbitrary code via a crafted xfs protocol reply to the (1) _fs_recv_conn_setup, (2) fs_read_open_font, (3) fs_read_query_info, (4) fs_read_extent_info, (5) fs_read_glyphs, (6) fs_read_list, or (7) fs_read_list_info function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0210.html">CVE-2014-0210</cve>
<bugzilla href="https://bugzilla.suse.com/857544">SUSE bug 857544</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204961" comment="xorg-x11-libs-7.4-8.26.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204962" comment="xorg-x11-libs-32bit-7.4-8.26.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209102" comment="xorg-x11-libs-x86-7.4-8.26.42 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204961" comment="xorg-x11-libs-7.4-8.26.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204962" comment="xorg-x11-libs-32bit-7.4-8.26.42 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0211</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0211" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0211" source="CVE"/>
    <description>
    Multiple integer overflows in the (1) fs_get_reply, (2) fs_alloc_glyphs, and (3) fs_read_extent_info functions in X.Org libXfont before 1.4.8 and 1.4.9x before 1.4.99.901 allow remote font servers to execute arbitrary code via a crafted xfs reply, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0211.html">CVE-2014-0211</cve>
<bugzilla href="https://bugzilla.suse.com/857544">SUSE bug 857544</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204961" comment="xorg-x11-libs-7.4-8.26.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204962" comment="xorg-x11-libs-32bit-7.4-8.26.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209102" comment="xorg-x11-libs-x86-7.4-8.26.42 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204961" comment="xorg-x11-libs-7.4-8.26.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204962" comment="xorg-x11-libs-32bit-7.4-8.26.42 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0221</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0221" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0221" source="CVE"/>
    <description>
    The dtls1_get_message_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (recursion and client crash) via a DTLS hello message in an invalid DTLS handshake.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0221.html">CVE-2014-0221</cve>
<bugzilla href="https://bugzilla.suse.com/880891">SUSE bug 880891</bugzilla>
<bugzilla href="https://bugzilla.suse.com/883126">SUSE bug 883126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214898" comment="libopenssl0_9_8-0.9.8j-0.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204623" comment="libopenssl0_9_8-32bit-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214900" comment="libopenssl0_9_8-hmac-0.9.8j-0.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208745" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208746" comment="libopenssl0_9_8-x86-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214902" comment="openssl-0.9.8j-0.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214903" comment="openssl-doc-0.9.8j-0.58 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214898" comment="libopenssl0_9_8-0.9.8j-0.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214899" comment="libopenssl0_9_8-32bit-0.9.8j-0.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214900" comment="libopenssl0_9_8-hmac-0.9.8j-0.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214901" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214902" comment="openssl-0.9.8j-0.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214903" comment="openssl-doc-0.9.8j-0.58 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0222</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0222" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222" source="CVE"/>
    <description>
    Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0222.html">CVE-2014-0222</cve>
<bugzilla href="https://bugzilla.suse.com/877642">SUSE bug 877642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/964925">SUSE bug 964925</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204576" comment="kvm-1.4.2-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202111" comment="xen-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204879" comment="xen-doc-html-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204880" comment="xen-doc-pdf-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204881" comment="xen-kmp-default-4.2.5_14_3.0.101_0.47.67-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204882" comment="xen-kmp-pae-4.2.5_14_3.0.101_0.47.67-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204883" comment="xen-libs-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204884" comment="xen-libs-32bit-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204885" comment="xen-tools-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204886" comment="xen-tools-domU-4.2.5_14-18 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204576" comment="kvm-1.4.2-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204884" comment="xen-libs-32bit-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209045" comment="xen-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209046" comment="xen-doc-html-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209047" comment="xen-doc-pdf-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209048" comment="xen-kmp-default-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209049" comment="xen-kmp-pae-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209050" comment="xen-libs-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209051" comment="xen-libs-32bit-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209052" comment="xen-tools-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209053" comment="xen-tools-domU-4.2.5_20-24 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0223</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0223" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0223" source="CVE"/>
    <description>
    Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0223.html">CVE-2014-0223</cve>
<bugzilla href="https://bugzilla.suse.com/877645">SUSE bug 877645</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204576" comment="kvm-1.4.2-0.17 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0224</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0224" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224" source="CVE"/>
    <description>
    OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the "CCS Injection" vulnerability.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0224.html">CVE-2014-0224</cve>
<bugzilla href="https://bugzilla.suse.com/1146657">SUSE bug 1146657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/880891">SUSE bug 880891</bugzilla>
<bugzilla href="https://bugzilla.suse.com/883126">SUSE bug 883126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/885777">SUSE bug 885777</bugzilla>
<bugzilla href="https://bugzilla.suse.com/892403">SUSE bug 892403</bugzilla>
<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/905018">SUSE bug 905018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/914447">SUSE bug 914447</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
<bugzilla href="https://bugzilla.suse.com/916239">SUSE bug 916239</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214898" comment="libopenssl0_9_8-0.9.8j-0.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214899" comment="libopenssl0_9_8-32bit-0.9.8j-0.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214900" comment="libopenssl0_9_8-hmac-0.9.8j-0.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214901" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214902" comment="openssl-0.9.8j-0.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214903" comment="openssl-doc-0.9.8j-0.58 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264365" comment="libmysql55client18-x86-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214898" comment="libopenssl0_9_8-0.9.8j-0.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204623" comment="libopenssl0_9_8-32bit-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214900" comment="libopenssl0_9_8-hmac-0.9.8j-0.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208745" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208746" comment="libopenssl0_9_8-x86-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214902" comment="openssl-0.9.8j-0.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214903" comment="openssl-doc-0.9.8j-0.58 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0226</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0226" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0226" source="CVE"/>
    <description>
    Race condition in the mod_status module in the Apache HTTP Server before 2.4.10 allows remote attackers to cause a denial of service (heap-based buffer overflow), or possibly obtain sensitive credential information or execute arbitrary code, via a crafted request that triggers improper scoreboard handling within the status_handler function in modules/generators/mod_status.c and the lua_ap_scoreboard_worker function in modules/lua/lua_request.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0226.html">CVE-2014-0226</cve>
<bugzilla href="https://bugzilla.suse.com/887765">SUSE bug 887765</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201563" comment="apache2-2.2.12-1.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201565" comment="apache2-doc-2.2.12-1.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201566" comment="apache2-example-pages-2.2.12-1.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201567" comment="apache2-prefork-2.2.12-1.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201568" comment="apache2-utils-2.2.12-1.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201569" comment="apache2-worker-2.2.12-1.46 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0227</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0227" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0227" source="CVE"/>
    <description>
    java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat 6.x before 6.0.42, 7.x before 7.0.55, and 8.x before 8.0.9 does not properly handle attempts to continue reading data after an error has occurred, which allows remote attackers to conduct HTTP request smuggling attacks or cause a denial of service (resource consumption) by streaming data with malformed chunked transfer coding.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0227.html">CVE-2014-0227</cve>
<bugzilla href="https://bugzilla.suse.com/917127">SUSE bug 917127</bugzilla>
<bugzilla href="https://bugzilla.suse.com/926762">SUSE bug 926762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/988489">SUSE bug 988489</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215064" comment="tomcat6-6.0.41-0.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215065" comment="tomcat6-admin-webapps-6.0.41-0.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215066" comment="tomcat6-docs-webapp-6.0.41-0.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215067" comment="tomcat6-javadoc-6.0.41-0.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215068" comment="tomcat6-jsp-2_1-api-6.0.41-0.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215069" comment="tomcat6-lib-6.0.41-0.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215070" comment="tomcat6-servlet-2_5-api-6.0.41-0.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215071" comment="tomcat6-webapps-6.0.41-0.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0230</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0230" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0230" source="CVE"/>
    <description>
    Apache Tomcat 6.x before 6.0.44, 7.x before 7.0.55, and 8.x before 8.0.9 does not properly handle cases where an HTTP response occurs before finishing the reading of an entire request body, which allows remote attackers to cause a denial of service (thread consumption) via a series of aborted upload attempts.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0230.html">CVE-2014-0230</cve>
<bugzilla href="https://bugzilla.suse.com/926762">SUSE bug 926762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/988489">SUSE bug 988489</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215064" comment="tomcat6-6.0.41-0.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215065" comment="tomcat6-admin-webapps-6.0.41-0.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215066" comment="tomcat6-docs-webapp-6.0.41-0.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215067" comment="tomcat6-javadoc-6.0.41-0.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215068" comment="tomcat6-jsp-2_1-api-6.0.41-0.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215069" comment="tomcat6-lib-6.0.41-0.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215070" comment="tomcat6-servlet-2_5-api-6.0.41-0.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215071" comment="tomcat6-webapps-6.0.41-0.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0231</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0231" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0231" source="CVE"/>
    <description>
    The mod_cgid module in the Apache HTTP Server before 2.4.10 does not have a timeout mechanism, which allows remote attackers to cause a denial of service (process hang) via a request to a CGI script that does not read from its stdin file descriptor.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0231.html">CVE-2014-0231</cve>
<bugzilla href="https://bugzilla.suse.com/887768">SUSE bug 887768</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201563" comment="apache2-2.2.12-1.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201565" comment="apache2-doc-2.2.12-1.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201566" comment="apache2-example-pages-2.2.12-1.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201567" comment="apache2-prefork-2.2.12-1.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201568" comment="apache2-utils-2.2.12-1.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201569" comment="apache2-worker-2.2.12-1.46 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0237</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0237" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0237" source="CVE"/>
    <description>
    The cdf_unpack_summary_info function in cdf.c in the Fileinfo component in PHP before 5.4.29 and 5.5.x before 5.5.13 allows remote attackers to cause a denial of service (performance degradation) by triggering many file_printf calls.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0237.html">CVE-2014-0237</cve>
<bugzilla href="https://bugzilla.suse.com/880905">SUSE bug 880905</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215117" comment="apache2-mod_php53-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215118" comment="php53-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215119" comment="php53-bcmath-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215120" comment="php53-bz2-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215121" comment="php53-calendar-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215122" comment="php53-ctype-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215123" comment="php53-curl-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215124" comment="php53-dba-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215125" comment="php53-dom-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215126" comment="php53-exif-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215127" comment="php53-fastcgi-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215128" comment="php53-fileinfo-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215129" comment="php53-ftp-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215130" comment="php53-gd-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215131" comment="php53-gettext-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215132" comment="php53-gmp-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215133" comment="php53-iconv-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215134" comment="php53-intl-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215135" comment="php53-json-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215136" comment="php53-ldap-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215137" comment="php53-mbstring-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215138" comment="php53-mcrypt-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215139" comment="php53-mysql-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215140" comment="php53-odbc-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215141" comment="php53-openssl-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215142" comment="php53-pcntl-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215143" comment="php53-pdo-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215144" comment="php53-pear-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215145" comment="php53-pgsql-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215146" comment="php53-pspell-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215147" comment="php53-shmop-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215148" comment="php53-snmp-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215149" comment="php53-soap-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215150" comment="php53-suhosin-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215151" comment="php53-sysvmsg-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215152" comment="php53-sysvsem-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215153" comment="php53-sysvshm-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215154" comment="php53-tokenizer-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215155" comment="php53-wddx-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215156" comment="php53-xmlreader-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215157" comment="php53-xmlrpc-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215158" comment="php53-xmlwriter-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215159" comment="php53-xsl-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215160" comment="php53-zip-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215161" comment="php53-zlib-5.3.17-0.23 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0238</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0238" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0238" source="CVE"/>
    <description>
    The cdf_read_property_info function in cdf.c in the Fileinfo component in PHP before 5.4.29 and 5.5.x before 5.5.13 allows remote attackers to cause a denial of service (infinite loop or out-of-bounds memory access) via a vector that (1) has zero length or (2) is too long.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0238.html">CVE-2014-0238</cve>
<bugzilla href="https://bugzilla.suse.com/880904">SUSE bug 880904</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215117" comment="apache2-mod_php53-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215118" comment="php53-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215119" comment="php53-bcmath-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215120" comment="php53-bz2-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215121" comment="php53-calendar-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215122" comment="php53-ctype-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215123" comment="php53-curl-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215124" comment="php53-dba-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215125" comment="php53-dom-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215126" comment="php53-exif-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215127" comment="php53-fastcgi-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215128" comment="php53-fileinfo-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215129" comment="php53-ftp-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215130" comment="php53-gd-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215131" comment="php53-gettext-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215132" comment="php53-gmp-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215133" comment="php53-iconv-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215134" comment="php53-intl-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215135" comment="php53-json-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215136" comment="php53-ldap-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215137" comment="php53-mbstring-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215138" comment="php53-mcrypt-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215139" comment="php53-mysql-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215140" comment="php53-odbc-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215141" comment="php53-openssl-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215142" comment="php53-pcntl-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215143" comment="php53-pdo-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215144" comment="php53-pear-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215145" comment="php53-pgsql-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215146" comment="php53-pspell-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215147" comment="php53-shmop-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215148" comment="php53-snmp-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215149" comment="php53-soap-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215150" comment="php53-suhosin-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215151" comment="php53-sysvmsg-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215152" comment="php53-sysvsem-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215153" comment="php53-sysvshm-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215154" comment="php53-tokenizer-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215155" comment="php53-wddx-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215156" comment="php53-xmlreader-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215157" comment="php53-xmlrpc-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215158" comment="php53-xmlwriter-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215159" comment="php53-xsl-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215160" comment="php53-zip-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215161" comment="php53-zlib-5.3.17-0.23 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0244</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0244" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0244" source="CVE"/>
    <description>
    The sys_recvfrom function in nmbd in Samba 3.6.x before 3.6.24, 4.0.x before 4.0.19, and 4.1.x before 4.1.9 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a malformed UDP packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0244.html">CVE-2014-0244</cve>
<bugzilla href="https://bugzilla.suse.com/880962">SUSE bug 880962</bugzilla>
<bugzilla href="https://bugzilla.suse.com/883758">SUSE bug 883758</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208443" comment="ldapsmb-1.34b-12.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204232" comment="libldb1-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204234" comment="libsmbclient0-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204235" comment="libsmbclient0-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204236" comment="libtalloc2-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204237" comment="libtalloc2-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204238" comment="libtdb1-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204239" comment="libtdb1-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204240" comment="libtevent0-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204241" comment="libtevent0-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204242" comment="libwbclient0-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204243" comment="libwbclient0-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204244" comment="samba-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204245" comment="samba-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204246" comment="samba-client-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204247" comment="samba-client-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204248" comment="samba-doc-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204249" comment="samba-krb-printing-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204250" comment="samba-winbind-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204251" comment="samba-winbind-32bit-3.6.3-0.52 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208443" comment="ldapsmb-1.34b-12.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204232" comment="libldb1-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204234" comment="libsmbclient0-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204235" comment="libsmbclient0-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208444" comment="libsmbclient0-x86-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204236" comment="libtalloc2-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204237" comment="libtalloc2-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208445" comment="libtalloc2-x86-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204238" comment="libtdb1-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204239" comment="libtdb1-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208446" comment="libtdb1-x86-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204240" comment="libtevent0-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204241" comment="libtevent0-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204242" comment="libwbclient0-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204243" comment="libwbclient0-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208447" comment="libwbclient0-x86-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204244" comment="samba-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204245" comment="samba-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204246" comment="samba-client-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204247" comment="samba-client-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208448" comment="samba-client-x86-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204248" comment="samba-doc-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204249" comment="samba-krb-printing-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204250" comment="samba-winbind-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204251" comment="samba-winbind-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208449" comment="samba-winbind-x86-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208450" comment="samba-x86-3.6.3-0.52 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0368</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0368" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0368" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45, and Java SE Embedded 7u45, allows remote attackers to affect confidentiality via unknown vectors related to Networking.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to incorrect permission checks when listening on a socket, which allows attackers to escape the sandbox.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0368.html">CVE-2014-0368</cve>
<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214748" comment="java-1_6_0-ibm-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214749" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214750" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214753" comment="java-1_7_0-ibm-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214756" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214748" comment="java-1_6_0-ibm-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214749" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214750" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214751" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214753" comment="java-1_7_0-ibm-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214754" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214756" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214757" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.1-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0373</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0373" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0373" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Serviceability.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to throwing of an incorrect exception when SnmpStatusException should have been used in the SNMP implementation, which allows attackers to escape the sandbox.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0373.html">CVE-2014-0373</cve>
<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214748" comment="java-1_6_0-ibm-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214749" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214750" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214753" comment="java-1_7_0-ibm-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214756" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214748" comment="java-1_6_0-ibm-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214749" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214750" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214751" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214753" comment="java-1_7_0-ibm-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214754" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214756" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214757" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.1-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0375</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0375" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0375" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u65 and 7u45 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Deployment, a different vulnerability than CVE-2013-5898 and CVE-2014-0403.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0375.html">CVE-2014-0375</cve>
<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214748" comment="java-1_6_0-ibm-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214749" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214750" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214753" comment="java-1_7_0-ibm-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214756" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214748" comment="java-1_6_0-ibm-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214749" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214750" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214751" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214753" comment="java-1_7_0-ibm-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214754" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214756" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214757" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.1-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0376</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0376" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0376" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect integrity via vectors related to JAXP.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to an improper check for "code permissions when creating document builder factories."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0376.html">CVE-2014-0376</cve>
<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214748" comment="java-1_6_0-ibm-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214749" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214750" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214753" comment="java-1_7_0-ibm-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214756" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214748" comment="java-1_6_0-ibm-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214749" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214750" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214751" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214753" comment="java-1_7_0-ibm-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214754" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214756" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214757" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.1-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0384</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0384" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0384" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.35 and earlier and 5.6.15 and earlier allows remote authenticated users to affect availability via vectors related to XML.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0384.html">CVE-2014-0384</cve>
<bugzilla href="https://bugzilla.suse.com/873896">SUSE bug 873896</bugzilla>
<bugzilla href="https://bugzilla.suse.com/999706">SUSE bug 999706</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214536" comment="libmysql55client18-32bit-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0386</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0386" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0386" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.71 and earlier, 5.5.33 and earlier, and 5.6.13 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0386.html">CVE-2014-0386</cve>
<bugzilla href="https://bugzilla.suse.com/858823">SUSE bug 858823</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214536" comment="libmysql55client18-32bit-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0387</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0387" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0387" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u65 and Java SE 7u45, when running on Firefox, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0387.html">CVE-2014-0387</cve>
<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214748" comment="java-1_6_0-ibm-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214749" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214750" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214753" comment="java-1_7_0-ibm-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214756" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214748" comment="java-1_6_0-ibm-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214749" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214750" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214751" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214753" comment="java-1_7_0-ibm-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214754" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214756" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214757" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.1-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0393</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0393" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0393" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.71 and earlier, 5.5.33 and earlier, and 5.6.13 and earlier allows remote authenticated users to affect integrity via unknown vectors related to InnoDB.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0393.html">CVE-2014-0393</cve>
<bugzilla href="https://bugzilla.suse.com/858823">SUSE bug 858823</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214536" comment="libmysql55client18-32bit-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0401</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0401" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0401" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.72 and earlier, 5.5.34 and earlier, and 5.6.14 and earlier allows remote authenticated users to affect availability via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0401.html">CVE-2014-0401</cve>
<bugzilla href="https://bugzilla.suse.com/858823">SUSE bug 858823</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214536" comment="libmysql55client18-32bit-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0402</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0402" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0402" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.71 and earlier, 5.5.33 and earlier, and 5.6.13 and earlier allows remote authenticated users to affect availability via unknown vectors related to Locking.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0402.html">CVE-2014-0402</cve>
<bugzilla href="https://bugzilla.suse.com/858823">SUSE bug 858823</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214536" comment="libmysql55client18-32bit-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0403</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0403" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0403" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u65 and 7u45 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Deployment, a different vulnerability than CVE-2013-5898 and CVE-2014-0375.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0403.html">CVE-2014-0403</cve>
<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214748" comment="java-1_6_0-ibm-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214749" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214750" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214753" comment="java-1_7_0-ibm-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214756" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214748" comment="java-1_6_0-ibm-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214749" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214750" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214751" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214753" comment="java-1_7_0-ibm-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214754" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214756" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214757" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.1-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0410</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0410" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0410" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u65 and 7u45 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-5889, CVE-2013-5902, CVE-2014-0415, CVE-2014-0418, and CVE-2014-0424.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0410.html">CVE-2014-0410</cve>
<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214748" comment="java-1_6_0-ibm-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214749" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214750" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214753" comment="java-1_7_0-ibm-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214756" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214748" comment="java-1_6_0-ibm-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214749" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214750" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214751" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214753" comment="java-1_7_0-ibm-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214754" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214756" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214757" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.1-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0411</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0411" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0411" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; JRockit R27.7.7 and R28.2.9; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect confidentiality and integrity via vectors related to JSSE.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that this issue allows remote attackers to obtain sensitive information about encryption keys via a timing discrepancy during the TLS/SSL handshake.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0411.html">CVE-2014-0411</cve>
<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214748" comment="java-1_6_0-ibm-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214749" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214750" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214753" comment="java-1_7_0-ibm-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214756" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214748" comment="java-1_6_0-ibm-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214749" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214750" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214751" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214753" comment="java-1_7_0-ibm-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214754" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214756" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214757" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.1-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0412</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0412" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0412" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.72 and earlier, 5.5.34 and earlier, and 5.6.14 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0412.html">CVE-2014-0412</cve>
<bugzilla href="https://bugzilla.suse.com/858823">SUSE bug 858823</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214536" comment="libmysql55client18-32bit-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0415</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0415" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0415" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u65 and 7u45 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-5889, CVE-2013-5902, CVE-2014-0410, CVE-2014-0418, and CVE-2014-0424.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0415.html">CVE-2014-0415</cve>
<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214748" comment="java-1_6_0-ibm-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214749" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214750" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214753" comment="java-1_7_0-ibm-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214756" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214748" comment="java-1_6_0-ibm-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214749" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214750" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214751" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214753" comment="java-1_7_0-ibm-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214754" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214756" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214757" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.1-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0416</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0416" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0416" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect integrity via vectors related to JAAS.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to how principals are set for the Subject class, which allows attackers to escape the sandbox using deserialization of a crafted Subject instance.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0416.html">CVE-2014-0416</cve>
<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214748" comment="java-1_6_0-ibm-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214749" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214750" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214753" comment="java-1_7_0-ibm-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214756" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214748" comment="java-1_6_0-ibm-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214749" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214750" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214751" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214753" comment="java-1_7_0-ibm-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214754" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214756" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214757" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.1-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0417</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0417" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0417" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; JavaFX 2.2.45; and Java SE Embedded 7u45 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0417.html">CVE-2014-0417</cve>
<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214748" comment="java-1_6_0-ibm-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214749" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214750" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214753" comment="java-1_7_0-ibm-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214756" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214748" comment="java-1_6_0-ibm-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214749" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214750" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214751" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214753" comment="java-1_7_0-ibm-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214754" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214756" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214757" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.1-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0420</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0420" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.34 and earlier, and 5.6.14 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Replication.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0420.html">CVE-2014-0420</cve>
<bugzilla href="https://bugzilla.suse.com/858823">SUSE bug 858823</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214536" comment="libmysql55client18-32bit-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0422" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0422" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JNDI.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to missing package access checks in the Naming / JNDI component, which allows attackers to escape the sandbox.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0422.html">CVE-2014-0422</cve>
<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214748" comment="java-1_6_0-ibm-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214749" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214750" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214753" comment="java-1_7_0-ibm-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214756" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214748" comment="java-1_6_0-ibm-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214749" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214750" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214751" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214753" comment="java-1_7_0-ibm-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214754" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214756" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214757" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.1-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0423" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0423" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; JRockit R27.7.7 and R28.2.9; Java SE Embedded 7u45; and OpenJDK 7 allows remote authenticated users to affect confidentiality and availability via unknown vectors related to Beans.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that this issue is an XML External Entity (XXE) vulnerability in DocumentHandler.java, related to Beans decoding.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0423.html">CVE-2014-0423</cve>
<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214748" comment="java-1_6_0-ibm-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214749" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214750" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214753" comment="java-1_7_0-ibm-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214756" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214748" comment="java-1_6_0-ibm-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214749" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214750" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214751" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214753" comment="java-1_7_0-ibm-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214754" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214756" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214757" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.1-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0424</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0424" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0424" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u65 and 7u45 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-5889, CVE-2013-5902, CVE-2014-0410, CVE-2014-0415, and CVE-2014-0418.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0424.html">CVE-2014-0424</cve>
<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214748" comment="java-1_6_0-ibm-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214749" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214750" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214753" comment="java-1_7_0-ibm-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214756" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214748" comment="java-1_6_0-ibm-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214749" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214750" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214751" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.1-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214753" comment="java-1_7_0-ibm-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214754" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214756" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214757" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.1-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0427</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0427" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0427" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.13 and earlier allows remote authenticated users to affect availability via vectors related to FTS.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0427.html">CVE-2014-0427</cve>
<bugzilla href="https://bugzilla.suse.com/858823">SUSE bug 858823</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214536" comment="libmysql55client18-32bit-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0428</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0428" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0428" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to "insufficient security checks in IIOP streams," which allows attackers to escape the sandbox.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0428.html">CVE-2014-0428</cve>
<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214839" comment="java-1_6_0-ibm-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214840" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214841" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214839" comment="java-1_6_0-ibm-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214840" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214841" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214842" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214844" comment="java-1_7_0-ibm-alsa-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214846" comment="java-1_7_0-ibm-plugin-1.7.0_sr7.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0429</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0429" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0429" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0429.html">CVE-2014-0429</cve>
<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214839" comment="java-1_6_0-ibm-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214840" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214841" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214839" comment="java-1_6_0-ibm-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214840" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214841" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214842" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214844" comment="java-1_7_0-ibm-alsa-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214846" comment="java-1_7_0-ibm-plugin-1.7.0_sr7.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0430</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0430" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0430" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.13 and earlier allows remote authenticated users to affect availability via unknown vectors related to Performance Schema.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0430.html">CVE-2014-0430</cve>
<bugzilla href="https://bugzilla.suse.com/858823">SUSE bug 858823</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214536" comment="libmysql55client18-32bit-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0431</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0431" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0431" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.14 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB, a different vulnerability than CVE-2013-5881.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0431.html">CVE-2014-0431</cve>
<bugzilla href="https://bugzilla.suse.com/858823">SUSE bug 858823</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214536" comment="libmysql55client18-32bit-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0433</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0433" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0433" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.13 and earlier allows remote attackers to affect availability via unknown vectors related to Thread Pooling.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0433.html">CVE-2014-0433</cve>
<bugzilla href="https://bugzilla.suse.com/858823">SUSE bug 858823</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214536" comment="libmysql55client18-32bit-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0437</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0437" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0437" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.72 and earlier, 5.5.34 and earlier, and 5.6.14 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0437.html">CVE-2014-0437</cve>
<bugzilla href="https://bugzilla.suse.com/858823">SUSE bug 858823</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214536" comment="libmysql55client18-32bit-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0446</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0446" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0446" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0446.html">CVE-2014-0446</cve>
<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214839" comment="java-1_6_0-ibm-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214840" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214841" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214839" comment="java-1_6_0-ibm-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214840" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214841" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214842" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214844" comment="java-1_7_0-ibm-alsa-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214846" comment="java-1_7_0-ibm-plugin-1.7.0_sr7.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0448</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0448" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0448" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u51 and 8 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0448.html">CVE-2014-0448</cve>
<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214844" comment="java-1_7_0-ibm-alsa-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214846" comment="java-1_7_0-ibm-plugin-1.7.0_sr7.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0449</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0449" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0449" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0449.html">CVE-2014-0449</cve>
<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214839" comment="java-1_6_0-ibm-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214840" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214841" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214839" comment="java-1_6_0-ibm-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214840" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214841" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214842" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214844" comment="java-1_7_0-ibm-alsa-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214846" comment="java-1_7_0-ibm-plugin-1.7.0_sr7.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0451</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0451" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0451" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT, a different vulnerability than CVE-2014-2412.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0451.html">CVE-2014-0451</cve>
<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214839" comment="java-1_6_0-ibm-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214840" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214841" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214839" comment="java-1_6_0-ibm-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214840" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214841" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214842" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214844" comment="java-1_7_0-ibm-alsa-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214846" comment="java-1_7_0-ibm-plugin-1.7.0_sr7.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0452</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0452" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0452" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAX-WS, a different vulnerability than CVE-2014-0458 and CVE-2014-2423.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0452.html">CVE-2014-0452</cve>
<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214839" comment="java-1_6_0-ibm-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214840" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214841" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214839" comment="java-1_6_0-ibm-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214840" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214841" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214842" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214844" comment="java-1_7_0-ibm-alsa-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214846" comment="java-1_7_0-ibm-plugin-1.7.0_sr7.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0453</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0453" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0453" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0453.html">CVE-2014-0453</cve>
<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214839" comment="java-1_6_0-ibm-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214840" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214841" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214839" comment="java-1_6_0-ibm-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214840" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214841" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214842" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214844" comment="java-1_7_0-ibm-alsa-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214846" comment="java-1_7_0-ibm-plugin-1.7.0_sr7.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0454</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0454" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0454" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u51 and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0454.html">CVE-2014-0454</cve>
<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214844" comment="java-1_7_0-ibm-alsa-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214846" comment="java-1_7_0-ibm-plugin-1.7.0_sr7.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0455</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0455" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0455" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u51 and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2014-0432 and CVE-2014-2402.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0455.html">CVE-2014-0455</cve>
<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214844" comment="java-1_7_0-ibm-alsa-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214846" comment="java-1_7_0-ibm-plugin-1.7.0_sr7.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0457</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0457" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0457" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, SE 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0457.html">CVE-2014-0457</cve>
<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214839" comment="java-1_6_0-ibm-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214840" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214841" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214839" comment="java-1_6_0-ibm-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214840" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214841" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214842" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214844" comment="java-1_7_0-ibm-alsa-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214846" comment="java-1_7_0-ibm-plugin-1.7.0_sr7.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0458</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0458" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0458" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAX-WS, a different vulnerability than CVE-2014-0452 and CVE-2014-2423.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0458.html">CVE-2014-0458</cve>
<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214839" comment="java-1_6_0-ibm-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214840" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214841" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214839" comment="java-1_6_0-ibm-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214840" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214841" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214842" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214844" comment="java-1_7_0-ibm-alsa-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214846" comment="java-1_7_0-ibm-plugin-1.7.0_sr7.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0459</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0459" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0459" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u51 and 8, and Java SE Embedded 7u51, allows remote attackers to affect availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0459.html">CVE-2014-0459</cve>
<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214839" comment="java-1_6_0-ibm-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214840" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214841" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214839" comment="java-1_6_0-ibm-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214840" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214841" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214842" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214844" comment="java-1_7_0-ibm-alsa-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214846" comment="java-1_7_0-ibm-plugin-1.7.0_sr7.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0460</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0460" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0460" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality and integrity via vectors related to JNDI.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0460.html">CVE-2014-0460</cve>
<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214839" comment="java-1_6_0-ibm-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214840" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214841" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214839" comment="java-1_6_0-ibm-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214840" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214841" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214842" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214844" comment="java-1_7_0-ibm-alsa-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214846" comment="java-1_7_0-ibm-plugin-1.7.0_sr7.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0461</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0461" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0461" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0461.html">CVE-2014-0461</cve>
<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214839" comment="java-1_6_0-ibm-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214840" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214841" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214839" comment="java-1_6_0-ibm-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214840" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214841" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214842" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214844" comment="java-1_7_0-ibm-alsa-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214846" comment="java-1_7_0-ibm-plugin-1.7.0_sr7.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0466</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0466" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0466" source="CVE"/>
    <description>
    The fixps script in a2ps 4.14 does not use the -dSAFER option when executing gs, which allows context-dependent attackers to delete arbitrary files or execute arbitrary commands via a crafted PostScript file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0466.html">CVE-2014-0466</cve>
<bugzilla href="https://bugzilla.suse.com/871097">SUSE bug 871097</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199851" comment="a2ps-4.13-1326.37 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0467</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0467" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0467" source="CVE"/>
    <description>
    Buffer overflow in copy.c in Mutt before 1.5.23 allows remote attackers to cause a denial of service (crash) via a crafted RFC2047 header line, related to address expansion.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0467.html">CVE-2014-0467</cve>
<bugzilla href="https://bugzilla.suse.com/868115">SUSE bug 868115</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204695" comment="mutt-1.5.17-42.37 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0475</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0475" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0475" source="CVE"/>
    <description>
    Multiple directory traversal vulnerabilities in GNU C Library (aka glibc or libc6) before 2.20 allow context-dependent attackers to bypass ForceCommand restrictions and possibly have other unspecified impact via a .. (dot dot) in a (1) LC_*, (2) LANG, or other locale environment variable.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0475.html">CVE-2014-0475</cve>
<bugzilla href="https://bugzilla.suse.com/887022">SUSE bug 887022</bugzilla>
<bugzilla href="https://bugzilla.suse.com/896776">SUSE bug 896776</bugzilla>
<bugzilla href="https://bugzilla.suse.com/916222">SUSE bug 916222</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215169" comment="glibc-2.11.3-17.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204402" comment="glibc-32bit-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215171" comment="glibc-devel-2.11.3-17.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204404" comment="glibc-devel-32bit-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215177" comment="glibc-html-2.11.3-17.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215173" comment="glibc-i18ndata-2.11.3-17.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215178" comment="glibc-info-2.11.3-17.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215174" comment="glibc-locale-2.11.3-17.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204407" comment="glibc-locale-32bit-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208499" comment="glibc-locale-x86-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215179" comment="glibc-profile-2.11.3-17.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208501" comment="glibc-profile-32bit-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208502" comment="glibc-profile-x86-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208503" comment="glibc-x86-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215176" comment="nscd-2.11.3-17.68 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215169" comment="glibc-2.11.3-17.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215170" comment="glibc-32bit-2.11.3-17.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215171" comment="glibc-devel-2.11.3-17.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215172" comment="glibc-devel-32bit-2.11.3-17.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215177" comment="glibc-html-2.11.3-17.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215173" comment="glibc-i18ndata-2.11.3-17.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215178" comment="glibc-info-2.11.3-17.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215174" comment="glibc-locale-2.11.3-17.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215175" comment="glibc-locale-32bit-2.11.3-17.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215179" comment="glibc-profile-2.11.3-17.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215180" comment="glibc-profile-32bit-2.11.3-17.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215176" comment="nscd-2.11.3-17.68 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0591</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0591" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0591" source="CVE"/>
    <description>
    The query_findclosestnsec3 function in query.c in named in ISC BIND 9.6, 9.7, and 9.8 before 9.8.6-P2 and 9.9 before 9.9.4-P2, and 9.6-ESV before 9.6-ESV-R10-P2, allows remote attackers to cause a denial of service (INSIST assertion failure and daemon exit) via a crafted DNS query to an authoritative nameserver that uses the NSEC3 signing feature.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0591.html">CVE-2014-0591</cve>
<bugzilla href="https://bugzilla.suse.com/858639">SUSE bug 858639</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207602" comment="bind-9.9.4P2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207603" comment="bind-chrootenv-9.9.4P2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207604" comment="bind-doc-9.9.4P2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203827" comment="bind-libs-9.9.4P2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203828" comment="bind-libs-32bit-9.9.4P2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203829" comment="bind-utils-9.9.4P2-0.6 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207602" comment="bind-9.9.4P2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207603" comment="bind-chrootenv-9.9.4P2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207604" comment="bind-doc-9.9.4P2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203827" comment="bind-libs-9.9.4P2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203828" comment="bind-libs-32bit-9.9.4P2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207605" comment="bind-libs-x86-9.9.4P2-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203829" comment="bind-utils-9.9.4P2-0.6 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0878</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-0878" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0878" source="CVE"/>
    <description>
    The IBMSecureRandom component in the IBMJCE and IBMSecureRandom cryptographic providers in IBM SDK Java Technology Edition 5.0 before Service Refresh 16 FP6, 6 before Service Refresh 16, 6.0.1 before Service Refresh 8, 7 before Service Refresh 7, and 7R1 before Service Refresh 1 makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms by predicting the random number generator's output.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0878.html">CVE-2014-0878</cve>
<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214839" comment="java-1_6_0-ibm-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214840" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214841" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214839" comment="java-1_6_0-ibm-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214840" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214841" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214842" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214844" comment="java-1_7_0-ibm-alsa-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214846" comment="java-1_7_0-ibm-plugin-1.7.0_sr7.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1444</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1444" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1444" source="CVE"/>
    <description>
    The fst_get_iface function in drivers/net/wan/farsync.c in the Linux kernel before 3.11.7 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability for an SIOCWANDEV ioctl call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1444.html">CVE-2014-1444</cve>
<bugzilla href="https://bugzilla.suse.com/858869">SUSE bug 858869</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213024" comment="kernel-default-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213025" comment="kernel-default-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213026" comment="kernel-default-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213028" comment="kernel-source-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213029" comment="kernel-syms-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213088" comment="kernel-trace-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213089" comment="kernel-trace-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213030" comment="kernel-trace-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1445</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1445" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1445" source="CVE"/>
    <description>
    The wanxl_ioctl function in drivers/net/wan/wanxl.c in the Linux kernel before 3.11.7 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory via an ioctl call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1445.html">CVE-2014-1445</cve>
<bugzilla href="https://bugzilla.suse.com/858870">SUSE bug 858870</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213024" comment="kernel-default-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213025" comment="kernel-default-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213026" comment="kernel-default-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213028" comment="kernel-source-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213029" comment="kernel-syms-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213088" comment="kernel-trace-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213089" comment="kernel-trace-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213030" comment="kernel-trace-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1446</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1446" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1446" source="CVE"/>
    <description>
    The yam_ioctl function in drivers/net/hamradio/yam.c in the Linux kernel before 3.12.8 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability for an SIOCYAMGCFG ioctl call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1446.html">CVE-2014-1446</cve>
<bugzilla href="https://bugzilla.suse.com/858872">SUSE bug 858872</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213024" comment="kernel-default-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213025" comment="kernel-default-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213026" comment="kernel-default-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213028" comment="kernel-source-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213029" comment="kernel-syms-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213088" comment="kernel-trace-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213089" comment="kernel-trace-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213030" comment="kernel-trace-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1447</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1447" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1447" source="CVE"/>
    <description>
    Race condition in the virNetServerClientStartKeepAlive function in libvirt before 1.2.1 allows remote attackers to cause a denial of service (libvirtd crash) by closing a connection before a keepalive response is sent.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1447.html">CVE-2014-1447</cve>
<bugzilla href="https://bugzilla.suse.com/858817">SUSE bug 858817</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214775" comment="libvirt-1.0.5.9-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214776" comment="libvirt-client-1.0.5.9-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204664" comment="libvirt-client-32bit-1.0.5.9-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214778" comment="libvirt-doc-1.0.5.9-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214780" comment="libvirt-lock-sanlock-1.0.5.9-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214779" comment="libvirt-python-1.0.5.9-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214775" comment="libvirt-1.0.5.9-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214776" comment="libvirt-client-1.0.5.9-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214777" comment="libvirt-client-32bit-1.0.5.9-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214778" comment="libvirt-doc-1.0.5.9-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214780" comment="libvirt-lock-sanlock-1.0.5.9-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214779" comment="libvirt-python-1.0.5.9-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1477</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1477" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1477.html">CVE-2014-1477</cve>
<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/862345">SUSE bug 862345</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204293" comment="MozillaFirefox-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204294" comment="MozillaFirefox-translations-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204295" comment="libfreebl3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204296" comment="libfreebl3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204297" comment="libsoftokn3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204298" comment="libsoftokn3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204299" comment="mozilla-nss-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204300" comment="mozilla-nss-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204301" comment="mozilla-nss-tools-3.15.4-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204293" comment="MozillaFirefox-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204294" comment="MozillaFirefox-translations-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204295" comment="libfreebl3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204296" comment="libfreebl3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208463" comment="libfreebl3-x86-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204297" comment="libsoftokn3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204298" comment="libsoftokn3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208464" comment="libsoftokn3-x86-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204299" comment="mozilla-nss-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204300" comment="mozilla-nss-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204301" comment="mozilla-nss-tools-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208465" comment="mozilla-nss-x86-3.15.4-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1479</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1479" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479" source="CVE"/>
    <description>
    The System Only Wrapper (SOW) implementation in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 does not prevent certain cloning operations, which allows remote attackers to bypass intended restrictions on XUL content via vectors involving XBL content scopes.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1479.html">CVE-2014-1479</cve>
<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/862348">SUSE bug 862348</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204293" comment="MozillaFirefox-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204294" comment="MozillaFirefox-translations-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204295" comment="libfreebl3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204296" comment="libfreebl3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204297" comment="libsoftokn3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204298" comment="libsoftokn3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204299" comment="mozilla-nss-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204300" comment="mozilla-nss-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204301" comment="mozilla-nss-tools-3.15.4-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204293" comment="MozillaFirefox-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204294" comment="MozillaFirefox-translations-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204295" comment="libfreebl3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204296" comment="libfreebl3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208463" comment="libfreebl3-x86-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204297" comment="libsoftokn3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204298" comment="libsoftokn3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208464" comment="libsoftokn3-x86-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204299" comment="mozilla-nss-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204300" comment="mozilla-nss-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204301" comment="mozilla-nss-tools-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208465" comment="mozilla-nss-x86-3.15.4-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1480</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1480" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1480" source="CVE"/>
    <description>
    The file-download implementation in Mozilla Firefox before 27.0 and SeaMonkey before 2.24 does not properly restrict the timing of button selections, which allows remote attackers to conduct clickjacking attacks, and trigger unintended launching of a downloaded file, via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1480.html">CVE-2014-1480</cve>
<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204293" comment="MozillaFirefox-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204294" comment="MozillaFirefox-translations-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204295" comment="libfreebl3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204296" comment="libfreebl3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204297" comment="libsoftokn3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204298" comment="libsoftokn3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204299" comment="mozilla-nss-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204300" comment="mozilla-nss-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204301" comment="mozilla-nss-tools-3.15.4-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204293" comment="MozillaFirefox-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204294" comment="MozillaFirefox-translations-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204295" comment="libfreebl3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204296" comment="libfreebl3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208463" comment="libfreebl3-x86-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204297" comment="libsoftokn3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204298" comment="libsoftokn3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208464" comment="libsoftokn3-x86-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204299" comment="mozilla-nss-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204300" comment="mozilla-nss-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204301" comment="mozilla-nss-tools-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208465" comment="mozilla-nss-x86-3.15.4-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1481</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1481" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481" source="CVE"/>
    <description>
    Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allow remote attackers to bypass intended restrictions on window objects by leveraging inconsistency in native getter methods across different JavaScript engines.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1481.html">CVE-2014-1481</cve>
<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/862309">SUSE bug 862309</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204293" comment="MozillaFirefox-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204294" comment="MozillaFirefox-translations-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204295" comment="libfreebl3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204296" comment="libfreebl3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204297" comment="libsoftokn3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204298" comment="libsoftokn3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204299" comment="mozilla-nss-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204300" comment="mozilla-nss-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204301" comment="mozilla-nss-tools-3.15.4-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204293" comment="MozillaFirefox-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204294" comment="MozillaFirefox-translations-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204295" comment="libfreebl3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204296" comment="libfreebl3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208463" comment="libfreebl3-x86-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204297" comment="libsoftokn3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204298" comment="libsoftokn3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208464" comment="libsoftokn3-x86-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204299" comment="mozilla-nss-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204300" comment="mozilla-nss-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204301" comment="mozilla-nss-tools-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208465" comment="mozilla-nss-x86-3.15.4-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1482</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1482" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482" source="CVE"/>
    <description>
    RasterImage.cpp in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 does not prevent access to discarded data, which allows remote attackers to execute arbitrary code or cause a denial of service (incorrect write operations) via crafted image data, as demonstrated by Goo Create.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1482.html">CVE-2014-1482</cve>
<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/862356">SUSE bug 862356</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204293" comment="MozillaFirefox-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204294" comment="MozillaFirefox-translations-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204295" comment="libfreebl3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204296" comment="libfreebl3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204297" comment="libsoftokn3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204298" comment="libsoftokn3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204299" comment="mozilla-nss-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204300" comment="mozilla-nss-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204301" comment="mozilla-nss-tools-3.15.4-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204293" comment="MozillaFirefox-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204294" comment="MozillaFirefox-translations-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204295" comment="libfreebl3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204296" comment="libfreebl3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208463" comment="libfreebl3-x86-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204297" comment="libsoftokn3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204298" comment="libsoftokn3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208464" comment="libsoftokn3-x86-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204299" comment="mozilla-nss-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204300" comment="mozilla-nss-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204301" comment="mozilla-nss-tools-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208465" comment="mozilla-nss-x86-3.15.4-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1483</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1483" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1483" source="CVE"/>
    <description>
    Mozilla Firefox before 27.0 and SeaMonkey before 2.24 allow remote attackers to bypass the Same Origin Policy and obtain sensitive information by using an IFRAME element in conjunction with certain timing measurements involving the document.caretPositionFromPoint and document.elementFromPoint functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1483.html">CVE-2014-1483</cve>
<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/862360">SUSE bug 862360</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204293" comment="MozillaFirefox-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204294" comment="MozillaFirefox-translations-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204295" comment="libfreebl3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204296" comment="libfreebl3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204297" comment="libsoftokn3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204298" comment="libsoftokn3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204299" comment="mozilla-nss-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204300" comment="mozilla-nss-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204301" comment="mozilla-nss-tools-3.15.4-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204293" comment="MozillaFirefox-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204294" comment="MozillaFirefox-translations-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204295" comment="libfreebl3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204296" comment="libfreebl3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208463" comment="libfreebl3-x86-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204297" comment="libsoftokn3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204298" comment="libsoftokn3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208464" comment="libsoftokn3-x86-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204299" comment="mozilla-nss-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204300" comment="mozilla-nss-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204301" comment="mozilla-nss-tools-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208465" comment="mozilla-nss-x86-3.15.4-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1484" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1484" source="CVE"/>
    <description>
    Mozilla Firefox before 27.0 on Android 4.2 and earlier creates system-log entries containing profile paths, which allows attackers to obtain sensitive information via a crafted application.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1484.html">CVE-2014-1484</cve>
<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204293" comment="MozillaFirefox-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204294" comment="MozillaFirefox-translations-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204295" comment="libfreebl3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204296" comment="libfreebl3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204297" comment="libsoftokn3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204298" comment="libsoftokn3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204299" comment="mozilla-nss-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204300" comment="mozilla-nss-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204301" comment="mozilla-nss-tools-3.15.4-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204293" comment="MozillaFirefox-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204294" comment="MozillaFirefox-translations-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204295" comment="libfreebl3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204296" comment="libfreebl3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208463" comment="libfreebl3-x86-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204297" comment="libsoftokn3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204298" comment="libsoftokn3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208464" comment="libsoftokn3-x86-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204299" comment="mozilla-nss-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204300" comment="mozilla-nss-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204301" comment="mozilla-nss-tools-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208465" comment="mozilla-nss-x86-3.15.4-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1485" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1485" source="CVE"/>
    <description>
    The Content Security Policy (CSP) implementation in Mozilla Firefox before 27.0 and SeaMonkey before 2.24 operates on XSLT stylesheets according to style-src directives instead of script-src directives, which might allow remote attackers to execute arbitrary XSLT code by leveraging insufficient style-src restrictions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1485.html">CVE-2014-1485</cve>
<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204293" comment="MozillaFirefox-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204294" comment="MozillaFirefox-translations-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204295" comment="libfreebl3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204296" comment="libfreebl3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204297" comment="libsoftokn3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204298" comment="libsoftokn3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204299" comment="mozilla-nss-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204300" comment="mozilla-nss-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204301" comment="mozilla-nss-tools-3.15.4-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204293" comment="MozillaFirefox-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204294" comment="MozillaFirefox-translations-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204295" comment="libfreebl3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204296" comment="libfreebl3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208463" comment="libfreebl3-x86-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204297" comment="libsoftokn3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204298" comment="libsoftokn3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208464" comment="libsoftokn3-x86-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204299" comment="mozilla-nss-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204300" comment="mozilla-nss-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204301" comment="mozilla-nss-tools-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208465" comment="mozilla-nss-x86-3.15.4-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1486</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1486" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486" source="CVE"/>
    <description>
    Use-after-free vulnerability in the imgRequestProxy function in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allows remote attackers to execute arbitrary code via vectors involving unspecified Content-Type values for image data.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1486.html">CVE-2014-1486</cve>
<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204293" comment="MozillaFirefox-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204294" comment="MozillaFirefox-translations-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204295" comment="libfreebl3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204296" comment="libfreebl3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204297" comment="libsoftokn3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204298" comment="libsoftokn3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204299" comment="mozilla-nss-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204300" comment="mozilla-nss-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204301" comment="mozilla-nss-tools-3.15.4-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204293" comment="MozillaFirefox-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204294" comment="MozillaFirefox-translations-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204295" comment="libfreebl3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204296" comment="libfreebl3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208463" comment="libfreebl3-x86-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204297" comment="libsoftokn3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204298" comment="libsoftokn3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208464" comment="libsoftokn3-x86-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204299" comment="mozilla-nss-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204300" comment="mozilla-nss-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204301" comment="mozilla-nss-tools-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208465" comment="mozilla-nss-x86-3.15.4-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1487</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1487" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487" source="CVE"/>
    <description>
    The Web workers implementation in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allows remote attackers to bypass the Same Origin Policy and obtain sensitive authentication information via vectors involving error messages.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1487.html">CVE-2014-1487</cve>
<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204293" comment="MozillaFirefox-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204294" comment="MozillaFirefox-translations-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204295" comment="libfreebl3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204296" comment="libfreebl3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204297" comment="libsoftokn3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204298" comment="libsoftokn3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204299" comment="mozilla-nss-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204300" comment="mozilla-nss-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204301" comment="mozilla-nss-tools-3.15.4-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204293" comment="MozillaFirefox-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204294" comment="MozillaFirefox-translations-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204295" comment="libfreebl3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204296" comment="libfreebl3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208463" comment="libfreebl3-x86-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204297" comment="libsoftokn3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204298" comment="libsoftokn3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208464" comment="libsoftokn3-x86-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204299" comment="mozilla-nss-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204300" comment="mozilla-nss-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204301" comment="mozilla-nss-tools-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208465" comment="mozilla-nss-x86-3.15.4-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1488</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1488" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1488" source="CVE"/>
    <description>
    The Web workers implementation in Mozilla Firefox before 27.0 and SeaMonkey before 2.24 allows remote attackers to execute arbitrary code via vectors involving termination of a worker process that has performed a cross-thread object-passing operation in conjunction with use of asm.js.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1488.html">CVE-2014-1488</cve>
<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204293" comment="MozillaFirefox-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204294" comment="MozillaFirefox-translations-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204295" comment="libfreebl3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204296" comment="libfreebl3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204297" comment="libsoftokn3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204298" comment="libsoftokn3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204299" comment="mozilla-nss-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204300" comment="mozilla-nss-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204301" comment="mozilla-nss-tools-3.15.4-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204293" comment="MozillaFirefox-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204294" comment="MozillaFirefox-translations-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204295" comment="libfreebl3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204296" comment="libfreebl3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208463" comment="libfreebl3-x86-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204297" comment="libsoftokn3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204298" comment="libsoftokn3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208464" comment="libsoftokn3-x86-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204299" comment="mozilla-nss-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204300" comment="mozilla-nss-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204301" comment="mozilla-nss-tools-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208465" comment="mozilla-nss-x86-3.15.4-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1489</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1489" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1489" source="CVE"/>
    <description>
    Mozilla Firefox before 27.0 does not properly restrict access to about:home buttons by script on other pages, which allows user-assisted remote attackers to cause a denial of service (session restore) via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1489.html">CVE-2014-1489</cve>
<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204293" comment="MozillaFirefox-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204294" comment="MozillaFirefox-translations-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204295" comment="libfreebl3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204296" comment="libfreebl3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204297" comment="libsoftokn3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204298" comment="libsoftokn3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204299" comment="mozilla-nss-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204300" comment="mozilla-nss-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204301" comment="mozilla-nss-tools-3.15.4-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204293" comment="MozillaFirefox-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204294" comment="MozillaFirefox-translations-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204295" comment="libfreebl3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204296" comment="libfreebl3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208463" comment="libfreebl3-x86-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204297" comment="libsoftokn3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204298" comment="libsoftokn3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208464" comment="libsoftokn3-x86-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204299" comment="mozilla-nss-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204300" comment="mozilla-nss-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204301" comment="mozilla-nss-tools-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208465" comment="mozilla-nss-x86-3.15.4-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1490</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1490" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490" source="CVE"/>
    <description>
    Race condition in libssl in Mozilla Network Security Services (NSS) before 3.15.4, as used in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, SeaMonkey before 2.24, and other products, allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via vectors involving a resumption handshake that triggers incorrect replacement of a session ticket.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1490.html">CVE-2014-1490</cve>
<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/862300">SUSE bug 862300</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204293" comment="MozillaFirefox-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204294" comment="MozillaFirefox-translations-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204295" comment="libfreebl3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204296" comment="libfreebl3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204297" comment="libsoftokn3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204298" comment="libsoftokn3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204299" comment="mozilla-nss-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204300" comment="mozilla-nss-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204301" comment="mozilla-nss-tools-3.15.4-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204293" comment="MozillaFirefox-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204294" comment="MozillaFirefox-translations-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204295" comment="libfreebl3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204296" comment="libfreebl3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208463" comment="libfreebl3-x86-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204297" comment="libsoftokn3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204298" comment="libsoftokn3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208464" comment="libsoftokn3-x86-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204299" comment="mozilla-nss-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204300" comment="mozilla-nss-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204301" comment="mozilla-nss-tools-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208465" comment="mozilla-nss-x86-3.15.4-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1491</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1491" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491" source="CVE"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.15.4, as used in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, SeaMonkey before 2.24, and other products, does not properly restrict public values in Diffie-Hellman key exchanges, which makes it easier for remote attackers to bypass cryptographic protection mechanisms in ticket handling by leveraging use of a certain value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1491.html">CVE-2014-1491</cve>
<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/862289">SUSE bug 862289</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204293" comment="MozillaFirefox-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204294" comment="MozillaFirefox-translations-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204295" comment="libfreebl3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204296" comment="libfreebl3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204297" comment="libsoftokn3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204298" comment="libsoftokn3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204299" comment="mozilla-nss-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204300" comment="mozilla-nss-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204301" comment="mozilla-nss-tools-3.15.4-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204293" comment="MozillaFirefox-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204294" comment="MozillaFirefox-translations-24.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204295" comment="libfreebl3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204296" comment="libfreebl3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208463" comment="libfreebl3-x86-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204297" comment="libsoftokn3-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204298" comment="libsoftokn3-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208464" comment="libsoftokn3-x86-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204299" comment="mozilla-nss-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204300" comment="mozilla-nss-32bit-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204301" comment="mozilla-nss-tools-3.15.4-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208465" comment="mozilla-nss-x86-3.15.4-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1493</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1493" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1493.html">CVE-2014-1493</cve>
<bugzilla href="https://bugzilla.suse.com/868603">SUSE bug 868603</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204302" comment="MozillaFirefox-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204303" comment="MozillaFirefox-translations-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204196" comment="mozilla-nspr-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204197" comment="mozilla-nspr-32bit-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208380" comment="mozilla-nspr-x86-4.10.4-0.3 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204302" comment="MozillaFirefox-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204303" comment="MozillaFirefox-translations-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204196" comment="mozilla-nspr-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204197" comment="mozilla-nspr-32bit-4.10.4-0.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1494</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1494" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1494" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 28.0 and SeaMonkey before 2.25 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1494.html">CVE-2014-1494</cve>
<bugzilla href="https://bugzilla.suse.com/868603">SUSE bug 868603</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204302" comment="MozillaFirefox-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204303" comment="MozillaFirefox-translations-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204196" comment="mozilla-nspr-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204197" comment="mozilla-nspr-32bit-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208380" comment="mozilla-nspr-x86-4.10.4-0.3 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204302" comment="MozillaFirefox-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204303" comment="MozillaFirefox-translations-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204196" comment="mozilla-nspr-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204197" comment="mozilla-nspr-32bit-4.10.4-0.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1496</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1496" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1496" source="CVE"/>
    <description>
    Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 might allow local users to gain privileges by modifying the extracted Mar contents during an update.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1496.html">CVE-2014-1496</cve>
<bugzilla href="https://bugzilla.suse.com/868603">SUSE bug 868603</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204302" comment="MozillaFirefox-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204303" comment="MozillaFirefox-translations-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204196" comment="mozilla-nspr-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204197" comment="mozilla-nspr-32bit-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208380" comment="mozilla-nspr-x86-4.10.4-0.3 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204302" comment="MozillaFirefox-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204303" comment="MozillaFirefox-translations-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204196" comment="mozilla-nspr-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204197" comment="mozilla-nspr-32bit-4.10.4-0.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1497</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1497" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497" source="CVE"/>
    <description>
    The mozilla::WaveReader::DecodeAudioData function in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to obtain sensitive information from process heap memory, cause a denial of service (out-of-bounds read and application crash), or possibly have unspecified other impact via a crafted WAV file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1497.html">CVE-2014-1497</cve>
<bugzilla href="https://bugzilla.suse.com/868603">SUSE bug 868603</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204302" comment="MozillaFirefox-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204303" comment="MozillaFirefox-translations-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204196" comment="mozilla-nspr-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204197" comment="mozilla-nspr-32bit-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208380" comment="mozilla-nspr-x86-4.10.4-0.3 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204302" comment="MozillaFirefox-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204303" comment="MozillaFirefox-translations-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204196" comment="mozilla-nspr-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204197" comment="mozilla-nspr-32bit-4.10.4-0.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1498</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1498" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1498" source="CVE"/>
    <description>
    The crypto.generateCRMFRequest method in Mozilla Firefox before 28.0 and SeaMonkey before 2.25 does not properly validate a certain key type, which allows remote attackers to cause a denial of service (application crash) via vectors that trigger generation of a key that supports the Elliptic Curve ec-dual-use algorithm.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1498.html">CVE-2014-1498</cve>
<bugzilla href="https://bugzilla.suse.com/868603">SUSE bug 868603</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204302" comment="MozillaFirefox-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204303" comment="MozillaFirefox-translations-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204196" comment="mozilla-nspr-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204197" comment="mozilla-nspr-32bit-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208380" comment="mozilla-nspr-x86-4.10.4-0.3 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204302" comment="MozillaFirefox-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204303" comment="MozillaFirefox-translations-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204196" comment="mozilla-nspr-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204197" comment="mozilla-nspr-32bit-4.10.4-0.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1499</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1499" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1499" source="CVE"/>
    <description>
    Mozilla Firefox before 28.0 and SeaMonkey before 2.25 allow remote attackers to spoof the domain name in the WebRTC (1) camera or (2) microphone permission prompt by triggering navigation at a certain time during generation of this prompt.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1499.html">CVE-2014-1499</cve>
<bugzilla href="https://bugzilla.suse.com/868603">SUSE bug 868603</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204302" comment="MozillaFirefox-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204303" comment="MozillaFirefox-translations-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204196" comment="mozilla-nspr-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204197" comment="mozilla-nspr-32bit-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208380" comment="mozilla-nspr-x86-4.10.4-0.3 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204302" comment="MozillaFirefox-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204303" comment="MozillaFirefox-translations-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204196" comment="mozilla-nspr-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204197" comment="mozilla-nspr-32bit-4.10.4-0.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1500</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1500" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1500" source="CVE"/>
    <description>
    Mozilla Firefox before 28.0 and SeaMonkey before 2.25 allow remote attackers to cause a denial of service (resource consumption and application hang) via onbeforeunload events that trigger background JavaScript execution.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1500.html">CVE-2014-1500</cve>
<bugzilla href="https://bugzilla.suse.com/868603">SUSE bug 868603</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204302" comment="MozillaFirefox-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204303" comment="MozillaFirefox-translations-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204196" comment="mozilla-nspr-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204197" comment="mozilla-nspr-32bit-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208380" comment="mozilla-nspr-x86-4.10.4-0.3 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204302" comment="MozillaFirefox-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204303" comment="MozillaFirefox-translations-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204196" comment="mozilla-nspr-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204197" comment="mozilla-nspr-32bit-4.10.4-0.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1501</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1501" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1501" source="CVE"/>
    <description>
    Mozilla Firefox before 28.0 on Android allows remote attackers to bypass the Same Origin Policy and access arbitrary file: URLs via vectors involving the "Open Link in New Tab" menu selection.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1501.html">CVE-2014-1501</cve>
<bugzilla href="https://bugzilla.suse.com/868603">SUSE bug 868603</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204302" comment="MozillaFirefox-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204303" comment="MozillaFirefox-translations-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204196" comment="mozilla-nspr-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204197" comment="mozilla-nspr-32bit-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208380" comment="mozilla-nspr-x86-4.10.4-0.3 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204302" comment="MozillaFirefox-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204303" comment="MozillaFirefox-translations-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204196" comment="mozilla-nspr-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204197" comment="mozilla-nspr-32bit-4.10.4-0.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1502</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1502" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1502" source="CVE"/>
    <description>
    The (1) WebGL.compressedTexImage2D and (2) WebGL.compressedTexSubImage2D functions in Mozilla Firefox before 28.0 and SeaMonkey before 2.25 allow remote attackers to bypass the Same Origin Policy and render content in a different domain via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1502.html">CVE-2014-1502</cve>
<bugzilla href="https://bugzilla.suse.com/868603">SUSE bug 868603</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204302" comment="MozillaFirefox-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204303" comment="MozillaFirefox-translations-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204196" comment="mozilla-nspr-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204197" comment="mozilla-nspr-32bit-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208380" comment="mozilla-nspr-x86-4.10.4-0.3 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204302" comment="MozillaFirefox-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204303" comment="MozillaFirefox-translations-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204196" comment="mozilla-nspr-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204197" comment="mozilla-nspr-32bit-4.10.4-0.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1504</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1504" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1504" source="CVE"/>
    <description>
    The session-restore feature in Mozilla Firefox before 28.0 and SeaMonkey before 2.25 does not consider the Content Security Policy of a data: URL, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted document that is accessed after a browser restart.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1504.html">CVE-2014-1504</cve>
<bugzilla href="https://bugzilla.suse.com/868603">SUSE bug 868603</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204302" comment="MozillaFirefox-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204303" comment="MozillaFirefox-translations-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204196" comment="mozilla-nspr-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204197" comment="mozilla-nspr-32bit-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208380" comment="mozilla-nspr-x86-4.10.4-0.3 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204302" comment="MozillaFirefox-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204303" comment="MozillaFirefox-translations-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204196" comment="mozilla-nspr-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204197" comment="mozilla-nspr-32bit-4.10.4-0.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1505" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505" source="CVE"/>
    <description>
    The SVG filter implementation in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to obtain sensitive displacement-correlation information, and possibly bypass the Same Origin Policy and read text from a different domain, via a timing attack involving feDisplacementMap elements, a related issue to CVE-2013-1693.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1505.html">CVE-2014-1505</cve>
<bugzilla href="https://bugzilla.suse.com/868603">SUSE bug 868603</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204302" comment="MozillaFirefox-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204303" comment="MozillaFirefox-translations-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204196" comment="mozilla-nspr-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204197" comment="mozilla-nspr-32bit-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208380" comment="mozilla-nspr-x86-4.10.4-0.3 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204302" comment="MozillaFirefox-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204303" comment="MozillaFirefox-translations-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204196" comment="mozilla-nspr-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204197" comment="mozilla-nspr-32bit-4.10.4-0.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1508</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1508" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508" source="CVE"/>
    <description>
    The libxul.so!gfxContext::Polygon function in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to obtain sensitive information from process memory, cause a denial of service (out-of-bounds read and application crash), or possibly bypass the Same Origin Policy via vectors involving MathML polygon rendering.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1508.html">CVE-2014-1508</cve>
<bugzilla href="https://bugzilla.suse.com/868603">SUSE bug 868603</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204302" comment="MozillaFirefox-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204303" comment="MozillaFirefox-translations-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204196" comment="mozilla-nspr-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204197" comment="mozilla-nspr-32bit-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208380" comment="mozilla-nspr-x86-4.10.4-0.3 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204302" comment="MozillaFirefox-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204303" comment="MozillaFirefox-translations-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204196" comment="mozilla-nspr-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204197" comment="mozilla-nspr-32bit-4.10.4-0.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1509</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1509" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509" source="CVE"/>
    <description>
    Buffer overflow in the _cairo_truetype_index_to_ucs4 function in cairo, as used in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25, allows remote attackers to execute arbitrary code via a crafted extension that renders fonts in a PDF document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1509.html">CVE-2014-1509</cve>
<bugzilla href="https://bugzilla.suse.com/868603">SUSE bug 868603</bugzilla>
<bugzilla href="https://bugzilla.suse.com/869339">SUSE bug 869339</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204302" comment="MozillaFirefox-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204303" comment="MozillaFirefox-translations-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204196" comment="mozilla-nspr-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204197" comment="mozilla-nspr-32bit-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208380" comment="mozilla-nspr-x86-4.10.4-0.3 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204302" comment="MozillaFirefox-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204303" comment="MozillaFirefox-translations-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204196" comment="mozilla-nspr-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204197" comment="mozilla-nspr-32bit-4.10.4-0.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1510</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1510" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510" source="CVE"/>
    <description>
    The Web IDL implementation in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to execute arbitrary JavaScript code with chrome privileges by using an IDL fragment to trigger a window.open call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1510.html">CVE-2014-1510</cve>
<bugzilla href="https://bugzilla.suse.com/868603">SUSE bug 868603</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204302" comment="MozillaFirefox-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204303" comment="MozillaFirefox-translations-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204196" comment="mozilla-nspr-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204197" comment="mozilla-nspr-32bit-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208380" comment="mozilla-nspr-x86-4.10.4-0.3 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204302" comment="MozillaFirefox-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204303" comment="MozillaFirefox-translations-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204196" comment="mozilla-nspr-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204197" comment="mozilla-nspr-32bit-4.10.4-0.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511" source="CVE"/>
    <description>
    Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allow remote attackers to bypass the popup blocker via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1511.html">CVE-2014-1511</cve>
<bugzilla href="https://bugzilla.suse.com/868603">SUSE bug 868603</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204302" comment="MozillaFirefox-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204303" comment="MozillaFirefox-translations-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204196" comment="mozilla-nspr-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204197" comment="mozilla-nspr-32bit-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208380" comment="mozilla-nspr-x86-4.10.4-0.3 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204302" comment="MozillaFirefox-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204303" comment="MozillaFirefox-translations-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204196" comment="mozilla-nspr-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204197" comment="mozilla-nspr-32bit-4.10.4-0.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1512</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1512" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512" source="CVE"/>
    <description>
    Use-after-free vulnerability in the TypeObject class in the JavaScript engine in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to execute arbitrary code by triggering extensive memory consumption while garbage collection is occurring, as demonstrated by improper handling of BumpChunk objects.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1512.html">CVE-2014-1512</cve>
<bugzilla href="https://bugzilla.suse.com/868603">SUSE bug 868603</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204302" comment="MozillaFirefox-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204303" comment="MozillaFirefox-translations-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204196" comment="mozilla-nspr-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204197" comment="mozilla-nspr-32bit-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208380" comment="mozilla-nspr-x86-4.10.4-0.3 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204302" comment="MozillaFirefox-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204303" comment="MozillaFirefox-translations-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204196" comment="mozilla-nspr-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204197" comment="mozilla-nspr-32bit-4.10.4-0.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1513</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1513" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513" source="CVE"/>
    <description>
    TypedArrayObject.cpp in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 does not prevent a zero-length transition during use of an ArrayBuffer object, which allows remote attackers to execute arbitrary code or cause a denial of service (heap-based out-of-bounds write or read) via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1513.html">CVE-2014-1513</cve>
<bugzilla href="https://bugzilla.suse.com/868603">SUSE bug 868603</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204302" comment="MozillaFirefox-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204303" comment="MozillaFirefox-translations-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204196" comment="mozilla-nspr-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204197" comment="mozilla-nspr-32bit-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208380" comment="mozilla-nspr-x86-4.10.4-0.3 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204302" comment="MozillaFirefox-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204303" comment="MozillaFirefox-translations-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204196" comment="mozilla-nspr-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204197" comment="mozilla-nspr-32bit-4.10.4-0.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1514</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1514" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514" source="CVE"/>
    <description>
    vmtypedarrayobject.cpp in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 does not validate the length of the destination array before a copy operation, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write and application crash) by triggering incorrect use of the TypedArrayObject class.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1514.html">CVE-2014-1514</cve>
<bugzilla href="https://bugzilla.suse.com/868603">SUSE bug 868603</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204302" comment="MozillaFirefox-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204303" comment="MozillaFirefox-translations-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204196" comment="mozilla-nspr-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204197" comment="mozilla-nspr-32bit-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208380" comment="mozilla-nspr-x86-4.10.4-0.3 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204302" comment="MozillaFirefox-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204303" comment="MozillaFirefox-translations-24.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204196" comment="mozilla-nspr-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204197" comment="mozilla-nspr-32bit-4.10.4-0.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1518</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1518" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1518.html">CVE-2014-1518</cve>
<bugzilla href="https://bugzilla.suse.com/875803">SUSE bug 875803</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204190" comment="MozillaFirefox-24.5.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204191" comment="MozillaFirefox-translations-24.5.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204192" comment="libfreebl3-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204193" comment="libfreebl3-32bit-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204194" comment="libsoftokn3-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204195" comment="libsoftokn3-32bit-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204196" comment="mozilla-nspr-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204197" comment="mozilla-nspr-32bit-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204198" comment="mozilla-nss-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204199" comment="mozilla-nss-32bit-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204200" comment="mozilla-nss-tools-3.16-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204190" comment="MozillaFirefox-24.5.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204191" comment="MozillaFirefox-translations-24.5.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204192" comment="libfreebl3-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204193" comment="libfreebl3-32bit-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208378" comment="libfreebl3-x86-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204194" comment="libsoftokn3-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204195" comment="libsoftokn3-32bit-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208379" comment="libsoftokn3-x86-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204196" comment="mozilla-nspr-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204197" comment="mozilla-nspr-32bit-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208380" comment="mozilla-nspr-x86-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204198" comment="mozilla-nss-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204199" comment="mozilla-nss-32bit-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204200" comment="mozilla-nss-tools-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208381" comment="mozilla-nss-x86-3.16-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1520</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1520" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1520" source="CVE"/>
    <description>
    maintenservice_installer.exe in the Maintenance Service Installer in Mozilla Firefox before 29.0 and Firefox ESR 24.x before 24.5 on Windows allows local users to gain privileges by placing a Trojan horse DLL file into a temporary directory at an unspecified point in the update process.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1520.html">CVE-2014-1520</cve>
<bugzilla href="https://bugzilla.suse.com/875803">SUSE bug 875803</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204190" comment="MozillaFirefox-24.5.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204191" comment="MozillaFirefox-translations-24.5.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204192" comment="libfreebl3-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204193" comment="libfreebl3-32bit-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204194" comment="libsoftokn3-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204195" comment="libsoftokn3-32bit-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204196" comment="mozilla-nspr-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204197" comment="mozilla-nspr-32bit-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204198" comment="mozilla-nss-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204199" comment="mozilla-nss-32bit-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204200" comment="mozilla-nss-tools-3.16-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204190" comment="MozillaFirefox-24.5.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204191" comment="MozillaFirefox-translations-24.5.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204192" comment="libfreebl3-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204193" comment="libfreebl3-32bit-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208378" comment="libfreebl3-x86-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204194" comment="libsoftokn3-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204195" comment="libsoftokn3-32bit-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208379" comment="libsoftokn3-x86-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204196" comment="mozilla-nspr-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204197" comment="mozilla-nspr-32bit-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208380" comment="mozilla-nspr-x86-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204198" comment="mozilla-nss-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204199" comment="mozilla-nss-32bit-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204200" comment="mozilla-nss-tools-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208381" comment="mozilla-nss-x86-3.16-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1523</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1523" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523" source="CVE"/>
    <description>
    Heap-based buffer overflow in the read_u32 function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1523.html">CVE-2014-1523</cve>
<bugzilla href="https://bugzilla.suse.com/875803">SUSE bug 875803</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204190" comment="MozillaFirefox-24.5.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204191" comment="MozillaFirefox-translations-24.5.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204192" comment="libfreebl3-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204193" comment="libfreebl3-32bit-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204194" comment="libsoftokn3-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204195" comment="libsoftokn3-32bit-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204196" comment="mozilla-nspr-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204197" comment="mozilla-nspr-32bit-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204198" comment="mozilla-nss-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204199" comment="mozilla-nss-32bit-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204200" comment="mozilla-nss-tools-3.16-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204190" comment="MozillaFirefox-24.5.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204191" comment="MozillaFirefox-translations-24.5.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204192" comment="libfreebl3-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204193" comment="libfreebl3-32bit-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208378" comment="libfreebl3-x86-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204194" comment="libsoftokn3-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204195" comment="libsoftokn3-32bit-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208379" comment="libsoftokn3-x86-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204196" comment="mozilla-nspr-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204197" comment="mozilla-nspr-32bit-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208380" comment="mozilla-nspr-x86-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204198" comment="mozilla-nss-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204199" comment="mozilla-nss-32bit-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204200" comment="mozilla-nss-tools-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208381" comment="mozilla-nss-x86-3.16-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1524</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1524" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524" source="CVE"/>
    <description>
    The nsXBLProtoImpl::InstallImplementation function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 does not properly check whether objects are XBL objects, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow) via crafted JavaScript code that accesses a non-XBL object as if it were an XBL object.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1524.html">CVE-2014-1524</cve>
<bugzilla href="https://bugzilla.suse.com/875803">SUSE bug 875803</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204190" comment="MozillaFirefox-24.5.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204191" comment="MozillaFirefox-translations-24.5.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204192" comment="libfreebl3-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204193" comment="libfreebl3-32bit-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204194" comment="libsoftokn3-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204195" comment="libsoftokn3-32bit-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204196" comment="mozilla-nspr-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204197" comment="mozilla-nspr-32bit-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204198" comment="mozilla-nss-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204199" comment="mozilla-nss-32bit-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204200" comment="mozilla-nss-tools-3.16-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204190" comment="MozillaFirefox-24.5.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204191" comment="MozillaFirefox-translations-24.5.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204192" comment="libfreebl3-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204193" comment="libfreebl3-32bit-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208378" comment="libfreebl3-x86-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204194" comment="libsoftokn3-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204195" comment="libsoftokn3-32bit-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208379" comment="libsoftokn3-x86-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204196" comment="mozilla-nspr-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204197" comment="mozilla-nspr-32bit-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208380" comment="mozilla-nspr-x86-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204198" comment="mozilla-nss-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204199" comment="mozilla-nss-32bit-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204200" comment="mozilla-nss-tools-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208381" comment="mozilla-nss-x86-3.16-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1529</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1529" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529" source="CVE"/>
    <description>
    The Web Notification API in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to bypass intended source-component restrictions and execute arbitrary JavaScript code in a privileged context via a crafted web page for which Notification.permission is granted.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1529.html">CVE-2014-1529</cve>
<bugzilla href="https://bugzilla.suse.com/875803">SUSE bug 875803</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204190" comment="MozillaFirefox-24.5.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204191" comment="MozillaFirefox-translations-24.5.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204192" comment="libfreebl3-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204193" comment="libfreebl3-32bit-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204194" comment="libsoftokn3-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204195" comment="libsoftokn3-32bit-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204196" comment="mozilla-nspr-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204197" comment="mozilla-nspr-32bit-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204198" comment="mozilla-nss-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204199" comment="mozilla-nss-32bit-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204200" comment="mozilla-nss-tools-3.16-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204190" comment="MozillaFirefox-24.5.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204191" comment="MozillaFirefox-translations-24.5.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204192" comment="libfreebl3-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204193" comment="libfreebl3-32bit-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208378" comment="libfreebl3-x86-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204194" comment="libsoftokn3-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204195" comment="libsoftokn3-32bit-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208379" comment="libsoftokn3-x86-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204196" comment="mozilla-nspr-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204197" comment="mozilla-nspr-32bit-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208380" comment="mozilla-nspr-x86-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204198" comment="mozilla-nss-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204199" comment="mozilla-nss-32bit-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204200" comment="mozilla-nss-tools-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208381" comment="mozilla-nss-x86-3.16-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1530</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1530" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530" source="CVE"/>
    <description>
    The docshell implementation in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to trigger the loading of a URL with a spoofed baseURI property, and conduct cross-site scripting (XSS) attacks, via a crafted web site that performs history navigation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1530.html">CVE-2014-1530</cve>
<bugzilla href="https://bugzilla.suse.com/875378">SUSE bug 875378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/875803">SUSE bug 875803</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204190" comment="MozillaFirefox-24.5.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204191" comment="MozillaFirefox-translations-24.5.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204192" comment="libfreebl3-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204193" comment="libfreebl3-32bit-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204194" comment="libsoftokn3-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204195" comment="libsoftokn3-32bit-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204196" comment="mozilla-nspr-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204197" comment="mozilla-nspr-32bit-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204198" comment="mozilla-nss-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204199" comment="mozilla-nss-32bit-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204200" comment="mozilla-nss-tools-3.16-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204190" comment="MozillaFirefox-24.5.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204191" comment="MozillaFirefox-translations-24.5.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204192" comment="libfreebl3-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204193" comment="libfreebl3-32bit-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208378" comment="libfreebl3-x86-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204194" comment="libsoftokn3-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204195" comment="libsoftokn3-32bit-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208379" comment="libsoftokn3-x86-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204196" comment="mozilla-nspr-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204197" comment="mozilla-nspr-32bit-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208380" comment="mozilla-nspr-x86-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204198" comment="mozilla-nss-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204199" comment="mozilla-nss-32bit-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204200" comment="mozilla-nss-tools-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208381" comment="mozilla-nss-x86-3.16-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1531</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1531" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsGenericHTMLElement::GetWidthHeightForImage function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving an imgLoader object that is not properly handled during an image-resize operation.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1531.html">CVE-2014-1531</cve>
<bugzilla href="https://bugzilla.suse.com/875803">SUSE bug 875803</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204190" comment="MozillaFirefox-24.5.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204191" comment="MozillaFirefox-translations-24.5.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204192" comment="libfreebl3-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204193" comment="libfreebl3-32bit-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204194" comment="libsoftokn3-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204195" comment="libsoftokn3-32bit-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204196" comment="mozilla-nspr-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204197" comment="mozilla-nspr-32bit-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204198" comment="mozilla-nss-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204199" comment="mozilla-nss-32bit-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204200" comment="mozilla-nss-tools-3.16-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204190" comment="MozillaFirefox-24.5.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204191" comment="MozillaFirefox-translations-24.5.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204192" comment="libfreebl3-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204193" comment="libfreebl3-32bit-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208378" comment="libfreebl3-x86-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204194" comment="libsoftokn3-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204195" comment="libsoftokn3-32bit-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208379" comment="libsoftokn3-x86-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204196" comment="mozilla-nspr-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204197" comment="mozilla-nspr-32bit-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208380" comment="mozilla-nspr-x86-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204198" comment="mozilla-nss-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204199" comment="mozilla-nss-32bit-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204200" comment="mozilla-nss-tools-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208381" comment="mozilla-nss-x86-3.16-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1532</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1532" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsHostResolver::ConditionallyRefreshRecord function in libxul.so in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors related to host resolution.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1532.html">CVE-2014-1532</cve>
<bugzilla href="https://bugzilla.suse.com/875803">SUSE bug 875803</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204190" comment="MozillaFirefox-24.5.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204191" comment="MozillaFirefox-translations-24.5.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204192" comment="libfreebl3-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204193" comment="libfreebl3-32bit-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204194" comment="libsoftokn3-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204195" comment="libsoftokn3-32bit-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204196" comment="mozilla-nspr-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204197" comment="mozilla-nspr-32bit-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204198" comment="mozilla-nss-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204199" comment="mozilla-nss-32bit-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204200" comment="mozilla-nss-tools-3.16-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204190" comment="MozillaFirefox-24.5.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204191" comment="MozillaFirefox-translations-24.5.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204192" comment="libfreebl3-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204193" comment="libfreebl3-32bit-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208378" comment="libfreebl3-x86-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204194" comment="libsoftokn3-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204195" comment="libsoftokn3-32bit-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208379" comment="libsoftokn3-x86-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204196" comment="mozilla-nspr-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204197" comment="mozilla-nspr-32bit-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208380" comment="mozilla-nspr-x86-4.10.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204198" comment="mozilla-nss-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204199" comment="mozilla-nss-32bit-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204200" comment="mozilla-nss-tools-3.16-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208381" comment="mozilla-nss-x86-3.16-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1533</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1533" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1533" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 30.0, Firefox ESR 24.x before 24.6, and Thunderbird before 24.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1533.html">CVE-2014-1533</cve>
<bugzilla href="https://bugzilla.suse.com/881874">SUSE bug 881874</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204172" comment="MozillaFirefox-24.6.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204174" comment="MozillaFirefox-translations-24.6.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204175" comment="libfreebl3-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204176" comment="libfreebl3-32bit-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204177" comment="libsoftokn3-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204178" comment="libsoftokn3-32bit-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204179" comment="mozilla-nspr-4.10.6-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204180" comment="mozilla-nspr-32bit-4.10.6-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204181" comment="mozilla-nss-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204182" comment="mozilla-nss-32bit-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204183" comment="mozilla-nss-tools-3.16.1-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204172" comment="MozillaFirefox-24.6.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204174" comment="MozillaFirefox-translations-24.6.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204175" comment="libfreebl3-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204176" comment="libfreebl3-32bit-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208355" comment="libfreebl3-x86-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204177" comment="libsoftokn3-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204178" comment="libsoftokn3-32bit-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208356" comment="libsoftokn3-x86-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204179" comment="mozilla-nspr-4.10.6-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204180" comment="mozilla-nspr-32bit-4.10.6-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208357" comment="mozilla-nspr-x86-4.10.6-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204181" comment="mozilla-nss-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204182" comment="mozilla-nss-32bit-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204183" comment="mozilla-nss-tools-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208358" comment="mozilla-nss-x86-3.16.1-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1534</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1534" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1534" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 30.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1534.html">CVE-2014-1534</cve>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204172" comment="MozillaFirefox-24.6.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204174" comment="MozillaFirefox-translations-24.6.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204175" comment="libfreebl3-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204176" comment="libfreebl3-32bit-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204177" comment="libsoftokn3-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204178" comment="libsoftokn3-32bit-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204179" comment="mozilla-nspr-4.10.6-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204180" comment="mozilla-nspr-32bit-4.10.6-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204181" comment="mozilla-nss-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204182" comment="mozilla-nss-32bit-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204183" comment="mozilla-nss-tools-3.16.1-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204172" comment="MozillaFirefox-24.6.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204174" comment="MozillaFirefox-translations-24.6.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204175" comment="libfreebl3-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204176" comment="libfreebl3-32bit-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208355" comment="libfreebl3-x86-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204177" comment="libsoftokn3-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204178" comment="libsoftokn3-32bit-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208356" comment="libsoftokn3-x86-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204179" comment="mozilla-nspr-4.10.6-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204180" comment="mozilla-nspr-32bit-4.10.6-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208357" comment="mozilla-nspr-x86-4.10.6-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204181" comment="mozilla-nss-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204182" comment="mozilla-nss-32bit-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204183" comment="mozilla-nss-tools-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208358" comment="mozilla-nss-x86-3.16.1-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1536</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1536" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1536" source="CVE"/>
    <description>
    The PropertyProvider::FindJustificationRange function in Mozilla Firefox before 30.0 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1536.html">CVE-2014-1536</cve>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204172" comment="MozillaFirefox-24.6.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204174" comment="MozillaFirefox-translations-24.6.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204175" comment="libfreebl3-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204176" comment="libfreebl3-32bit-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204177" comment="libsoftokn3-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204178" comment="libsoftokn3-32bit-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204179" comment="mozilla-nspr-4.10.6-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204180" comment="mozilla-nspr-32bit-4.10.6-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204181" comment="mozilla-nss-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204182" comment="mozilla-nss-32bit-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204183" comment="mozilla-nss-tools-3.16.1-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204172" comment="MozillaFirefox-24.6.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204174" comment="MozillaFirefox-translations-24.6.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204175" comment="libfreebl3-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204176" comment="libfreebl3-32bit-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208355" comment="libfreebl3-x86-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204177" comment="libsoftokn3-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204178" comment="libsoftokn3-32bit-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208356" comment="libsoftokn3-x86-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204179" comment="mozilla-nspr-4.10.6-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204180" comment="mozilla-nspr-32bit-4.10.6-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208357" comment="mozilla-nspr-x86-4.10.6-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204181" comment="mozilla-nss-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204182" comment="mozilla-nss-32bit-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204183" comment="mozilla-nss-tools-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208358" comment="mozilla-nss-x86-3.16.1-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1537</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1537" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1537" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozilla::dom::workers::WorkerPrivateParent function in Mozilla Firefox before 30.0 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1537.html">CVE-2014-1537</cve>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204172" comment="MozillaFirefox-24.6.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204174" comment="MozillaFirefox-translations-24.6.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204175" comment="libfreebl3-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204176" comment="libfreebl3-32bit-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204177" comment="libsoftokn3-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204178" comment="libsoftokn3-32bit-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204179" comment="mozilla-nspr-4.10.6-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204180" comment="mozilla-nspr-32bit-4.10.6-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204181" comment="mozilla-nss-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204182" comment="mozilla-nss-32bit-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204183" comment="mozilla-nss-tools-3.16.1-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204172" comment="MozillaFirefox-24.6.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204174" comment="MozillaFirefox-translations-24.6.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204175" comment="libfreebl3-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204176" comment="libfreebl3-32bit-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208355" comment="libfreebl3-x86-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204177" comment="libsoftokn3-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204178" comment="libsoftokn3-32bit-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208356" comment="libsoftokn3-x86-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204179" comment="mozilla-nspr-4.10.6-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204180" comment="mozilla-nspr-32bit-4.10.6-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208357" comment="mozilla-nspr-x86-4.10.6-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204181" comment="mozilla-nss-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204182" comment="mozilla-nss-32bit-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204183" comment="mozilla-nss-tools-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208358" comment="mozilla-nss-x86-3.16.1-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1538</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1538" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1538" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsTextEditRules::CreateMozBR function in Mozilla Firefox before 30.0, Firefox ESR 24.x before 24.6, and Thunderbird before 24.6 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1538.html">CVE-2014-1538</cve>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204172" comment="MozillaFirefox-24.6.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204174" comment="MozillaFirefox-translations-24.6.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204175" comment="libfreebl3-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204176" comment="libfreebl3-32bit-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204177" comment="libsoftokn3-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204178" comment="libsoftokn3-32bit-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204179" comment="mozilla-nspr-4.10.6-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204180" comment="mozilla-nspr-32bit-4.10.6-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204181" comment="mozilla-nss-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204182" comment="mozilla-nss-32bit-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204183" comment="mozilla-nss-tools-3.16.1-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204172" comment="MozillaFirefox-24.6.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204174" comment="MozillaFirefox-translations-24.6.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204175" comment="libfreebl3-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204176" comment="libfreebl3-32bit-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208355" comment="libfreebl3-x86-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204177" comment="libsoftokn3-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204178" comment="libsoftokn3-32bit-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208356" comment="libsoftokn3-x86-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204179" comment="mozilla-nspr-4.10.6-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204180" comment="mozilla-nspr-32bit-4.10.6-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208357" comment="mozilla-nspr-x86-4.10.6-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204181" comment="mozilla-nss-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204182" comment="mozilla-nss-32bit-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204183" comment="mozilla-nss-tools-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208358" comment="mozilla-nss-x86-3.16.1-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1541</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1541" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1541" source="CVE"/>
    <description>
    Use-after-free vulnerability in the RefreshDriverTimer::TickDriver function in the SMIL Animation Controller in Mozilla Firefox before 30.0, Firefox ESR 24.x before 24.6, and Thunderbird before 24.6 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via crafted web content.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1541.html">CVE-2014-1541</cve>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204172" comment="MozillaFirefox-24.6.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204174" comment="MozillaFirefox-translations-24.6.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204175" comment="libfreebl3-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204176" comment="libfreebl3-32bit-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204177" comment="libsoftokn3-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204178" comment="libsoftokn3-32bit-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204179" comment="mozilla-nspr-4.10.6-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204180" comment="mozilla-nspr-32bit-4.10.6-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204181" comment="mozilla-nss-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204182" comment="mozilla-nss-32bit-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204183" comment="mozilla-nss-tools-3.16.1-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204172" comment="MozillaFirefox-24.6.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204174" comment="MozillaFirefox-translations-24.6.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204175" comment="libfreebl3-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204176" comment="libfreebl3-32bit-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208355" comment="libfreebl3-x86-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204177" comment="libsoftokn3-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204178" comment="libsoftokn3-32bit-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208356" comment="libsoftokn3-x86-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204179" comment="mozilla-nspr-4.10.6-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204180" comment="mozilla-nspr-32bit-4.10.6-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208357" comment="mozilla-nspr-x86-4.10.6-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204181" comment="mozilla-nss-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204182" comment="mozilla-nss-32bit-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204183" comment="mozilla-nss-tools-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208358" comment="mozilla-nss-x86-3.16.1-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1544</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1544" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544" source="CVE"/>
    <description>
    Use-after-free vulnerability in the CERT_DestroyCertificate function in libnss3.so in Mozilla Network Security Services (NSS) 3.x, as used in Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7, allows remote attackers to execute arbitrary code via vectors that trigger certain improper removal of an NSSCertificate structure from a trust domain.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1544.html">CVE-2014-1544</cve>
<bugzilla href="https://bugzilla.suse.com/887746">SUSE bug 887746</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204304" comment="MozillaFirefox-24.7.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204305" comment="MozillaFirefox-translations-24.7.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204306" comment="libfreebl3-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204307" comment="libfreebl3-32bit-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204308" comment="libsoftokn3-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204309" comment="libsoftokn3-32bit-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204310" comment="mozilla-nss-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204311" comment="mozilla-nss-32bit-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204312" comment="mozilla-nss-tools-3.16.2-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204304" comment="MozillaFirefox-24.7.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204305" comment="MozillaFirefox-translations-24.7.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204306" comment="libfreebl3-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204307" comment="libfreebl3-32bit-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208466" comment="libfreebl3-x86-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204308" comment="libsoftokn3-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204309" comment="libsoftokn3-32bit-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208467" comment="libsoftokn3-x86-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204310" comment="mozilla-nss-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204311" comment="mozilla-nss-32bit-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204312" comment="mozilla-nss-tools-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208468" comment="mozilla-nss-x86-3.16.2-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1545</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1545" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1545" source="CVE"/>
    <description>
    Mozilla Netscape Portable Runtime (NSPR) before 4.10.6 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write) via vectors involving the sprintf and console functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1545.html">CVE-2014-1545</cve>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204172" comment="MozillaFirefox-24.6.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204174" comment="MozillaFirefox-translations-24.6.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204175" comment="libfreebl3-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204176" comment="libfreebl3-32bit-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204177" comment="libsoftokn3-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204178" comment="libsoftokn3-32bit-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204179" comment="mozilla-nspr-4.10.6-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204180" comment="mozilla-nspr-32bit-4.10.6-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204181" comment="mozilla-nss-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204182" comment="mozilla-nss-32bit-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204183" comment="mozilla-nss-tools-3.16.1-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204172" comment="MozillaFirefox-24.6.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204173" comment="MozillaFirefox-branding-SLED-24-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204174" comment="MozillaFirefox-translations-24.6.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204175" comment="libfreebl3-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204176" comment="libfreebl3-32bit-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208355" comment="libfreebl3-x86-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204177" comment="libsoftokn3-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204178" comment="libsoftokn3-32bit-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208356" comment="libsoftokn3-x86-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204179" comment="mozilla-nspr-4.10.6-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204180" comment="mozilla-nspr-32bit-4.10.6-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208357" comment="mozilla-nspr-x86-4.10.6-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204181" comment="mozilla-nss-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204182" comment="mozilla-nss-32bit-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204183" comment="mozilla-nss-tools-3.16.1-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208358" comment="mozilla-nss-x86-3.16.1-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1547.html">CVE-2014-1547</cve>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204304" comment="MozillaFirefox-24.7.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204305" comment="MozillaFirefox-translations-24.7.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204306" comment="libfreebl3-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204307" comment="libfreebl3-32bit-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204308" comment="libsoftokn3-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204309" comment="libsoftokn3-32bit-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204310" comment="mozilla-nss-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204311" comment="mozilla-nss-32bit-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204312" comment="mozilla-nss-tools-3.16.2-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204304" comment="MozillaFirefox-24.7.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204305" comment="MozillaFirefox-translations-24.7.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204306" comment="libfreebl3-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204307" comment="libfreebl3-32bit-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208466" comment="libfreebl3-x86-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204308" comment="libsoftokn3-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204309" comment="libsoftokn3-32bit-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208467" comment="libsoftokn3-x86-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204310" comment="mozilla-nss-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204311" comment="mozilla-nss-32bit-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204312" comment="mozilla-nss-tools-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208468" comment="mozilla-nss-x86-3.16.2-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1548</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1548" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1548" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 31.0 and Thunderbird before 31.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1548.html">CVE-2014-1548</cve>
<bugzilla href="https://bugzilla.suse.com/887746">SUSE bug 887746</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204304" comment="MozillaFirefox-24.7.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204305" comment="MozillaFirefox-translations-24.7.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204306" comment="libfreebl3-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204307" comment="libfreebl3-32bit-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204308" comment="libsoftokn3-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204309" comment="libsoftokn3-32bit-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204310" comment="mozilla-nss-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204311" comment="mozilla-nss-32bit-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204312" comment="mozilla-nss-tools-3.16.2-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204304" comment="MozillaFirefox-24.7.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204305" comment="MozillaFirefox-translations-24.7.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204306" comment="libfreebl3-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204307" comment="libfreebl3-32bit-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208466" comment="libfreebl3-x86-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204308" comment="libsoftokn3-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204309" comment="libsoftokn3-32bit-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208467" comment="libsoftokn3-x86-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204310" comment="mozilla-nss-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204311" comment="mozilla-nss-32bit-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204312" comment="mozilla-nss-tools-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208468" comment="mozilla-nss-x86-3.16.2-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1555</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsDocLoader::OnProgress function in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 allows remote attackers to execute arbitrary code via vectors that trigger a FireOnStateChange event.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1555.html">CVE-2014-1555</cve>
<bugzilla href="https://bugzilla.suse.com/887746">SUSE bug 887746</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204304" comment="MozillaFirefox-24.7.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204305" comment="MozillaFirefox-translations-24.7.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204306" comment="libfreebl3-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204307" comment="libfreebl3-32bit-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204308" comment="libsoftokn3-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204309" comment="libsoftokn3-32bit-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204310" comment="mozilla-nss-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204311" comment="mozilla-nss-32bit-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204312" comment="mozilla-nss-tools-3.16.2-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204304" comment="MozillaFirefox-24.7.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204305" comment="MozillaFirefox-translations-24.7.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204306" comment="libfreebl3-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204307" comment="libfreebl3-32bit-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208466" comment="libfreebl3-x86-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204308" comment="libsoftokn3-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204309" comment="libsoftokn3-32bit-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208467" comment="libsoftokn3-x86-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204310" comment="mozilla-nss-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204311" comment="mozilla-nss-32bit-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204312" comment="mozilla-nss-tools-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208468" comment="mozilla-nss-x86-3.16.2-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1556</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1556" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556" source="CVE"/>
    <description>
    Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 allow remote attackers to execute arbitrary code via crafted WebGL content constructed with the Cesium JavaScript library.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1556.html">CVE-2014-1556</cve>
<bugzilla href="https://bugzilla.suse.com/887746">SUSE bug 887746</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204304" comment="MozillaFirefox-24.7.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204305" comment="MozillaFirefox-translations-24.7.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204306" comment="libfreebl3-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204307" comment="libfreebl3-32bit-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204308" comment="libsoftokn3-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204309" comment="libsoftokn3-32bit-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204310" comment="mozilla-nss-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204311" comment="mozilla-nss-32bit-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204312" comment="mozilla-nss-tools-3.16.2-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204304" comment="MozillaFirefox-24.7.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204305" comment="MozillaFirefox-translations-24.7.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204306" comment="libfreebl3-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204307" comment="libfreebl3-32bit-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208466" comment="libfreebl3-x86-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204308" comment="libsoftokn3-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204309" comment="libsoftokn3-32bit-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208467" comment="libsoftokn3-x86-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204310" comment="mozilla-nss-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204311" comment="mozilla-nss-32bit-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204312" comment="mozilla-nss-tools-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208468" comment="mozilla-nss-x86-3.16.2-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1557</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1557" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557" source="CVE"/>
    <description>
    The ConvolveHorizontally function in Skia, as used in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7, does not properly handle the discarding of image data during function execution, which allows remote attackers to execute arbitrary code by triggering prolonged image scaling, as demonstrated by scaling of a high-quality image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1557.html">CVE-2014-1557</cve>
<bugzilla href="https://bugzilla.suse.com/887746">SUSE bug 887746</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204304" comment="MozillaFirefox-24.7.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204305" comment="MozillaFirefox-translations-24.7.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204306" comment="libfreebl3-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204307" comment="libfreebl3-32bit-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204308" comment="libsoftokn3-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204309" comment="libsoftokn3-32bit-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204310" comment="mozilla-nss-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204311" comment="mozilla-nss-32bit-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204312" comment="mozilla-nss-tools-3.16.2-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204304" comment="MozillaFirefox-24.7.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204305" comment="MozillaFirefox-translations-24.7.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204306" comment="libfreebl3-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204307" comment="libfreebl3-32bit-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208466" comment="libfreebl3-x86-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204308" comment="libsoftokn3-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204309" comment="libsoftokn3-32bit-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208467" comment="libsoftokn3-x86-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204310" comment="mozilla-nss-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204311" comment="mozilla-nss-32bit-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204312" comment="mozilla-nss-tools-3.16.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208468" comment="mozilla-nss-x86-3.16.2-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1562</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1562" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1562" source="CVE"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox before 32.0, Firefox ESR 24.x before 24.8 and 31.x before 31.1, and Thunderbird 24.x before 24.8 and 31.x before 31.1 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1562.html">CVE-2014-1562</cve>
<bugzilla href="https://bugzilla.suse.com/894370">SUSE bug 894370</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204313" comment="MozillaFirefox-24.8.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204314" comment="MozillaFirefox-translations-24.8.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204315" comment="libfreebl3-3.16.4-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204316" comment="libfreebl3-32bit-3.16.4-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204317" comment="libsoftokn3-3.16.4-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204318" comment="libsoftokn3-32bit-3.16.4-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200362" comment="mozilla-nspr-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200363" comment="mozilla-nspr-32bit-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204319" comment="mozilla-nss-3.16.4-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204320" comment="mozilla-nss-32bit-3.16.4-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204321" comment="mozilla-nss-tools-3.16.4-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204313" comment="MozillaFirefox-24.8.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204314" comment="MozillaFirefox-translations-24.8.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204315" comment="libfreebl3-3.16.4-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204316" comment="libfreebl3-32bit-3.16.4-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208469" comment="libfreebl3-x86-3.16.4-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204317" comment="libsoftokn3-3.16.4-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204318" comment="libsoftokn3-32bit-3.16.4-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208470" comment="libsoftokn3-x86-3.16.4-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200362" comment="mozilla-nspr-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200363" comment="mozilla-nspr-32bit-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200364" comment="mozilla-nspr-x86-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204319" comment="mozilla-nss-3.16.4-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204320" comment="mozilla-nss-32bit-3.16.4-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204321" comment="mozilla-nss-tools-3.16.4-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208471" comment="mozilla-nss-x86-3.16.4-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1567</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1567" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1567" source="CVE"/>
    <description>
    Use-after-free vulnerability in DirectionalityUtils.cpp in Mozilla Firefox before 32.0, Firefox ESR 24.x before 24.8 and 31.x before 31.1, and Thunderbird 24.x before 24.8 and 31.x before 31.1 allows remote attackers to execute arbitrary code via text that is improperly handled during the interaction between directionality resolution and layout.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1567.html">CVE-2014-1567</cve>
<bugzilla href="https://bugzilla.suse.com/894370">SUSE bug 894370</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204313" comment="MozillaFirefox-24.8.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204314" comment="MozillaFirefox-translations-24.8.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204315" comment="libfreebl3-3.16.4-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204316" comment="libfreebl3-32bit-3.16.4-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204317" comment="libsoftokn3-3.16.4-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204318" comment="libsoftokn3-32bit-3.16.4-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200362" comment="mozilla-nspr-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200363" comment="mozilla-nspr-32bit-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204319" comment="mozilla-nss-3.16.4-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204320" comment="mozilla-nss-32bit-3.16.4-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204321" comment="mozilla-nss-tools-3.16.4-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204313" comment="MozillaFirefox-24.8.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204314" comment="MozillaFirefox-translations-24.8.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204315" comment="libfreebl3-3.16.4-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204316" comment="libfreebl3-32bit-3.16.4-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208469" comment="libfreebl3-x86-3.16.4-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204317" comment="libsoftokn3-3.16.4-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204318" comment="libsoftokn3-32bit-3.16.4-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208470" comment="libsoftokn3-x86-3.16.4-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200362" comment="mozilla-nspr-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200363" comment="mozilla-nspr-32bit-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200364" comment="mozilla-nspr-x86-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204319" comment="mozilla-nss-3.16.4-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204320" comment="mozilla-nss-32bit-3.16.4-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204321" comment="mozilla-nss-tools-3.16.4-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208471" comment="mozilla-nss-x86-3.16.4-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1568" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1568" source="CVE"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.16.2.1, 3.16.x before 3.16.5, and 3.17.x before 3.17.1, as used in Mozilla Firefox before 32.0.3, Mozilla Firefox ESR 24.x before 24.8.1 and 31.x before 31.1.1, Mozilla Thunderbird before 24.8.1 and 31.x before 31.1.2, Mozilla SeaMonkey before 2.29.1, Google Chrome before 37.0.2062.124 on Windows and OS X, and Google Chrome OS before 37.0.2062.120, does not properly parse ASN.1 values in X.509 certificates, which makes it easier for remote attackers to spoof RSA signatures via a crafted certificate, aka a "signature malleability" issue.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1568.html">CVE-2014-1568</cve>
<bugzilla href="https://bugzilla.suse.com/1107874">SUSE bug 1107874</bugzilla>
<bugzilla href="https://bugzilla.suse.com/897890">SUSE bug 897890</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204605" comment="libfreebl3-3.16.5-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204606" comment="libfreebl3-32bit-3.16.5-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204607" comment="libsoftokn3-3.16.5-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204608" comment="libsoftokn3-32bit-3.16.5-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204609" comment="mozilla-nss-3.16.5-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204610" comment="mozilla-nss-32bit-3.16.5-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204611" comment="mozilla-nss-tools-3.16.5-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204605" comment="libfreebl3-3.16.5-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204606" comment="libfreebl3-32bit-3.16.5-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208737" comment="libfreebl3-x86-3.16.5-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204607" comment="libsoftokn3-3.16.5-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204608" comment="libsoftokn3-32bit-3.16.5-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208738" comment="libsoftokn3-x86-3.16.5-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204609" comment="mozilla-nss-3.16.5-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204610" comment="mozilla-nss-32bit-3.16.5-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204611" comment="mozilla-nss-tools-3.16.5-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208739" comment="mozilla-nss-x86-3.16.5-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1569</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1569" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1569" source="CVE"/>
    <description>
    The definite_length_decoder function in lib/util/quickder.c in Mozilla Network Security Services (NSS) before 3.16.2.4 and 3.17.x before 3.17.3 does not ensure that the DER encoding of an ASN.1 length is properly formed, which allows remote attackers to conduct data-smuggling attacks by using a long byte sequence for an encoding, as demonstrated by the SEC_QuickDERDecodeItem function's improper handling of an arbitrary-length encoding of 0x00.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1569.html">CVE-2014-1569</cve>
<bugzilla href="https://bugzilla.suse.com/910647">SUSE bug 910647</bugzilla>
<bugzilla href="https://bugzilla.suse.com/913096">SUSE bug 913096</bugzilla>
<bugzilla href="https://bugzilla.suse.com/917597">SUSE bug 917597</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204324" comment="MozillaFirefox-31.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204325" comment="MozillaFirefox-translations-31.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200214" comment="libfreebl3-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200215" comment="libfreebl3-32bit-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200216" comment="libfreebl3-x86-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200217" comment="libsoftokn3-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200218" comment="libsoftokn3-32bit-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200219" comment="libsoftokn3-x86-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200220" comment="mozilla-nss-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200221" comment="mozilla-nss-32bit-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200222" comment="mozilla-nss-tools-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200223" comment="mozilla-nss-x86-3.17.3-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204324" comment="MozillaFirefox-31.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204325" comment="MozillaFirefox-translations-31.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200214" comment="libfreebl3-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200215" comment="libfreebl3-32bit-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200217" comment="libsoftokn3-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200218" comment="libsoftokn3-32bit-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200220" comment="mozilla-nss-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200221" comment="mozilla-nss-32bit-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200222" comment="mozilla-nss-tools-3.17.3-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1574</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1574" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1574.html">CVE-2014-1574</cve>
<bugzilla href="https://bugzilla.suse.com/900941">SUSE bug 900941</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204348" comment="MozillaFirefox-31.2.0esr-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204349" comment="MozillaFirefox-branding-SLED-31.0-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204350" comment="MozillaFirefox-translations-31.2.0esr-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204351" comment="libfreebl3-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204352" comment="libfreebl3-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204353" comment="libsoftokn3-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204354" comment="libsoftokn3-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200362" comment="mozilla-nspr-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200363" comment="mozilla-nspr-32bit-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204355" comment="mozilla-nss-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204356" comment="mozilla-nss-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204357" comment="mozilla-nss-tools-3.17.2-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204348" comment="MozillaFirefox-31.2.0esr-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204349" comment="MozillaFirefox-branding-SLED-31.0-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204350" comment="MozillaFirefox-translations-31.2.0esr-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204351" comment="libfreebl3-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204352" comment="libfreebl3-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208485" comment="libfreebl3-x86-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204353" comment="libsoftokn3-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204354" comment="libsoftokn3-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208486" comment="libsoftokn3-x86-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200362" comment="mozilla-nspr-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200363" comment="mozilla-nspr-32bit-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200364" comment="mozilla-nspr-x86-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204355" comment="mozilla-nss-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204356" comment="mozilla-nss-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204357" comment="mozilla-nss-tools-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208487" comment="mozilla-nss-x86-3.17.2-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1575</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1575" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1575" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 33.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to improper interaction between threading and garbage collection in the GCRuntime::triggerGC function in js/src/jsgc.cpp, and unknown other vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1575.html">CVE-2014-1575</cve>
<bugzilla href="https://bugzilla.suse.com/900941">SUSE bug 900941</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204348" comment="MozillaFirefox-31.2.0esr-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204349" comment="MozillaFirefox-branding-SLED-31.0-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204350" comment="MozillaFirefox-translations-31.2.0esr-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204351" comment="libfreebl3-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204352" comment="libfreebl3-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204353" comment="libsoftokn3-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204354" comment="libsoftokn3-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200362" comment="mozilla-nspr-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200363" comment="mozilla-nspr-32bit-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204355" comment="mozilla-nss-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204356" comment="mozilla-nss-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204357" comment="mozilla-nss-tools-3.17.2-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204348" comment="MozillaFirefox-31.2.0esr-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204349" comment="MozillaFirefox-branding-SLED-31.0-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204350" comment="MozillaFirefox-translations-31.2.0esr-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204351" comment="libfreebl3-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204352" comment="libfreebl3-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208485" comment="libfreebl3-x86-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204353" comment="libsoftokn3-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204354" comment="libsoftokn3-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208486" comment="libsoftokn3-x86-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200362" comment="mozilla-nspr-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200363" comment="mozilla-nspr-32bit-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200364" comment="mozilla-nspr-x86-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204355" comment="mozilla-nss-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204356" comment="mozilla-nss-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204357" comment="mozilla-nss-tools-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208487" comment="mozilla-nss-x86-3.17.2-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1576</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1576" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576" source="CVE"/>
    <description>
    Heap-based buffer overflow in the nsTransformedTextRun function in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to execute arbitrary code via Cascading Style Sheets (CSS) token sequences that trigger changes to capitalization style.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1576.html">CVE-2014-1576</cve>
<bugzilla href="https://bugzilla.suse.com/900941">SUSE bug 900941</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204348" comment="MozillaFirefox-31.2.0esr-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204349" comment="MozillaFirefox-branding-SLED-31.0-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204350" comment="MozillaFirefox-translations-31.2.0esr-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204351" comment="libfreebl3-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204352" comment="libfreebl3-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204353" comment="libsoftokn3-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204354" comment="libsoftokn3-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200362" comment="mozilla-nspr-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200363" comment="mozilla-nspr-32bit-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204355" comment="mozilla-nss-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204356" comment="mozilla-nss-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204357" comment="mozilla-nss-tools-3.17.2-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204348" comment="MozillaFirefox-31.2.0esr-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204349" comment="MozillaFirefox-branding-SLED-31.0-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204350" comment="MozillaFirefox-translations-31.2.0esr-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204351" comment="libfreebl3-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204352" comment="libfreebl3-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208485" comment="libfreebl3-x86-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204353" comment="libsoftokn3-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204354" comment="libsoftokn3-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208486" comment="libsoftokn3-x86-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200362" comment="mozilla-nspr-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200363" comment="mozilla-nspr-32bit-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200364" comment="mozilla-nspr-x86-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204355" comment="mozilla-nss-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204356" comment="mozilla-nss-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204357" comment="mozilla-nss-tools-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208487" comment="mozilla-nss-x86-3.17.2-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1577</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1577" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577" source="CVE"/>
    <description>
    The mozilla::dom::OscillatorNodeEngine::ComputeCustom function in the Web Audio subsystem in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read, memory corruption, and application crash) via an invalid custom waveform that triggers a calculation of a negative frequency value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1577.html">CVE-2014-1577</cve>
<bugzilla href="https://bugzilla.suse.com/900941">SUSE bug 900941</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204348" comment="MozillaFirefox-31.2.0esr-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204349" comment="MozillaFirefox-branding-SLED-31.0-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204350" comment="MozillaFirefox-translations-31.2.0esr-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204351" comment="libfreebl3-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204352" comment="libfreebl3-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204353" comment="libsoftokn3-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204354" comment="libsoftokn3-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200362" comment="mozilla-nspr-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200363" comment="mozilla-nspr-32bit-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204355" comment="mozilla-nss-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204356" comment="mozilla-nss-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204357" comment="mozilla-nss-tools-3.17.2-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204348" comment="MozillaFirefox-31.2.0esr-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204349" comment="MozillaFirefox-branding-SLED-31.0-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204350" comment="MozillaFirefox-translations-31.2.0esr-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204351" comment="libfreebl3-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204352" comment="libfreebl3-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208485" comment="libfreebl3-x86-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204353" comment="libsoftokn3-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204354" comment="libsoftokn3-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208486" comment="libsoftokn3-x86-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200362" comment="mozilla-nspr-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200363" comment="mozilla-nspr-32bit-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200364" comment="mozilla-nspr-x86-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204355" comment="mozilla-nss-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204356" comment="mozilla-nss-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204357" comment="mozilla-nss-tools-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208487" comment="mozilla-nss-x86-3.17.2-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1578</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1578" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578" source="CVE"/>
    <description>
    The get_tile function in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly execute arbitrary code via WebM frames with invalid tile sizes that are improperly handled in buffering operations during video playback.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1578.html">CVE-2014-1578</cve>
<bugzilla href="https://bugzilla.suse.com/900941">SUSE bug 900941</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204348" comment="MozillaFirefox-31.2.0esr-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204349" comment="MozillaFirefox-branding-SLED-31.0-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204350" comment="MozillaFirefox-translations-31.2.0esr-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204351" comment="libfreebl3-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204352" comment="libfreebl3-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204353" comment="libsoftokn3-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204354" comment="libsoftokn3-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200362" comment="mozilla-nspr-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200363" comment="mozilla-nspr-32bit-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204355" comment="mozilla-nss-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204356" comment="mozilla-nss-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204357" comment="mozilla-nss-tools-3.17.2-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204348" comment="MozillaFirefox-31.2.0esr-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204349" comment="MozillaFirefox-branding-SLED-31.0-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204350" comment="MozillaFirefox-translations-31.2.0esr-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204351" comment="libfreebl3-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204352" comment="libfreebl3-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208485" comment="libfreebl3-x86-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204353" comment="libsoftokn3-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204354" comment="libsoftokn3-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208486" comment="libsoftokn3-x86-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200362" comment="mozilla-nspr-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200363" comment="mozilla-nspr-32bit-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200364" comment="mozilla-nspr-x86-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204355" comment="mozilla-nss-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204356" comment="mozilla-nss-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204357" comment="mozilla-nss-tools-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208487" comment="mozilla-nss-x86-3.17.2-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1581</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1581" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581" source="CVE"/>
    <description>
    Use-after-free vulnerability in DirectionalityUtils.cpp in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to execute arbitrary code via text that is improperly handled during the interaction between directionality resolution and layout.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1581.html">CVE-2014-1581</cve>
<bugzilla href="https://bugzilla.suse.com/900941">SUSE bug 900941</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204348" comment="MozillaFirefox-31.2.0esr-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204349" comment="MozillaFirefox-branding-SLED-31.0-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204350" comment="MozillaFirefox-translations-31.2.0esr-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204351" comment="libfreebl3-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204352" comment="libfreebl3-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204353" comment="libsoftokn3-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204354" comment="libsoftokn3-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200362" comment="mozilla-nspr-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200363" comment="mozilla-nspr-32bit-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204355" comment="mozilla-nss-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204356" comment="mozilla-nss-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204357" comment="mozilla-nss-tools-3.17.2-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204348" comment="MozillaFirefox-31.2.0esr-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204349" comment="MozillaFirefox-branding-SLED-31.0-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204350" comment="MozillaFirefox-translations-31.2.0esr-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204351" comment="libfreebl3-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204352" comment="libfreebl3-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208485" comment="libfreebl3-x86-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204353" comment="libsoftokn3-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204354" comment="libsoftokn3-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208486" comment="libsoftokn3-x86-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200362" comment="mozilla-nspr-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200363" comment="mozilla-nspr-32bit-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200364" comment="mozilla-nspr-x86-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204355" comment="mozilla-nss-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204356" comment="mozilla-nss-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204357" comment="mozilla-nss-tools-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208487" comment="mozilla-nss-x86-3.17.2-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1583</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1583" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583" source="CVE"/>
    <description>
    The Alarm API in Mozilla Firefox before 33.0 and Firefox ESR 31.x before 31.2 does not properly restrict toJSON calls, which allows remote attackers to bypass the Same Origin Policy via crafted API calls that access sensitive information within the JSON data of an alarm.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1583.html">CVE-2014-1583</cve>
<bugzilla href="https://bugzilla.suse.com/900941">SUSE bug 900941</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204348" comment="MozillaFirefox-31.2.0esr-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204349" comment="MozillaFirefox-branding-SLED-31.0-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204350" comment="MozillaFirefox-translations-31.2.0esr-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204351" comment="libfreebl3-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204352" comment="libfreebl3-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204353" comment="libsoftokn3-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204354" comment="libsoftokn3-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200362" comment="mozilla-nspr-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200363" comment="mozilla-nspr-32bit-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204355" comment="mozilla-nss-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204356" comment="mozilla-nss-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204357" comment="mozilla-nss-tools-3.17.2-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204348" comment="MozillaFirefox-31.2.0esr-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204349" comment="MozillaFirefox-branding-SLED-31.0-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204350" comment="MozillaFirefox-translations-31.2.0esr-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204351" comment="libfreebl3-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204352" comment="libfreebl3-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208485" comment="libfreebl3-x86-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204353" comment="libsoftokn3-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204354" comment="libsoftokn3-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208486" comment="libsoftokn3-x86-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200362" comment="mozilla-nspr-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200363" comment="mozilla-nspr-32bit-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200364" comment="mozilla-nspr-x86-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204355" comment="mozilla-nss-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204356" comment="mozilla-nss-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204357" comment="mozilla-nss-tools-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208487" comment="mozilla-nss-x86-3.17.2-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1585</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1585" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585" source="CVE"/>
    <description>
    The WebRTC video-sharing feature in dom/media/MediaManager.cpp in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 does not properly recognize Stop Sharing actions for videos in IFRAME elements, which allows remote attackers to obtain sensitive information from the local camera by maintaining a session after the user tries to discontinue streaming.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1585.html">CVE-2014-1585</cve>
<bugzilla href="https://bugzilla.suse.com/900941">SUSE bug 900941</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204348" comment="MozillaFirefox-31.2.0esr-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204349" comment="MozillaFirefox-branding-SLED-31.0-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204350" comment="MozillaFirefox-translations-31.2.0esr-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204351" comment="libfreebl3-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204352" comment="libfreebl3-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204353" comment="libsoftokn3-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204354" comment="libsoftokn3-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200362" comment="mozilla-nspr-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200363" comment="mozilla-nspr-32bit-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204355" comment="mozilla-nss-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204356" comment="mozilla-nss-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204357" comment="mozilla-nss-tools-3.17.2-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204348" comment="MozillaFirefox-31.2.0esr-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204349" comment="MozillaFirefox-branding-SLED-31.0-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204350" comment="MozillaFirefox-translations-31.2.0esr-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204351" comment="libfreebl3-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204352" comment="libfreebl3-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208485" comment="libfreebl3-x86-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204353" comment="libsoftokn3-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204354" comment="libsoftokn3-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208486" comment="libsoftokn3-x86-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200362" comment="mozilla-nspr-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200363" comment="mozilla-nspr-32bit-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200364" comment="mozilla-nspr-x86-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204355" comment="mozilla-nss-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204356" comment="mozilla-nss-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204357" comment="mozilla-nss-tools-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208487" comment="mozilla-nss-x86-3.17.2-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1586</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1586" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586" source="CVE"/>
    <description>
    content/base/src/nsDocument.cpp in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 does not consider whether WebRTC video sharing is occurring, which allows remote attackers to obtain sensitive information from the local camera in certain IFRAME situations by maintaining a session after the user temporarily navigates away.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1586.html">CVE-2014-1586</cve>
<bugzilla href="https://bugzilla.suse.com/900941">SUSE bug 900941</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204348" comment="MozillaFirefox-31.2.0esr-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204349" comment="MozillaFirefox-branding-SLED-31.0-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204350" comment="MozillaFirefox-translations-31.2.0esr-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204351" comment="libfreebl3-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204352" comment="libfreebl3-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204353" comment="libsoftokn3-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204354" comment="libsoftokn3-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200362" comment="mozilla-nspr-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200363" comment="mozilla-nspr-32bit-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204355" comment="mozilla-nss-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204356" comment="mozilla-nss-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204357" comment="mozilla-nss-tools-3.17.2-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204348" comment="MozillaFirefox-31.2.0esr-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204349" comment="MozillaFirefox-branding-SLED-31.0-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204350" comment="MozillaFirefox-translations-31.2.0esr-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204351" comment="libfreebl3-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204352" comment="libfreebl3-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208485" comment="libfreebl3-x86-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204353" comment="libsoftokn3-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204354" comment="libsoftokn3-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208486" comment="libsoftokn3-x86-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200362" comment="mozilla-nspr-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200363" comment="mozilla-nspr-32bit-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200364" comment="mozilla-nspr-x86-4.10.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204355" comment="mozilla-nss-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204356" comment="mozilla-nss-32bit-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204357" comment="mozilla-nss-tools-3.17.2-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208487" comment="mozilla-nss-x86-3.17.2-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1587</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1587" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1587.html">CVE-2014-1587</cve>
<bugzilla href="https://bugzilla.suse.com/908009">SUSE bug 908009</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204322" comment="MozillaFirefox-31.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204323" comment="MozillaFirefox-translations-31.3.0esr-0.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1588</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1588" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1588" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 34.0 and SeaMonkey before 2.31 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1588.html">CVE-2014-1588</cve>
<bugzilla href="https://bugzilla.suse.com/908009">SUSE bug 908009</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204322" comment="MozillaFirefox-31.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204323" comment="MozillaFirefox-translations-31.3.0esr-0.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1589</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1589" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1589" source="CVE"/>
    <description>
    Mozilla Firefox before 34.0 and SeaMonkey before 2.31 provide stylesheets with an incorrect primary namespace, which allows remote attackers to bypass intended access restrictions via an XBL binding.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1589.html">CVE-2014-1589</cve>
<bugzilla href="https://bugzilla.suse.com/908009">SUSE bug 908009</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204322" comment="MozillaFirefox-31.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204323" comment="MozillaFirefox-translations-31.3.0esr-0.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1590</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1590" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590" source="CVE"/>
    <description>
    The XMLHttpRequest.prototype.send method in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to cause a denial of service (application crash) via a crafted JavaScript object.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1590.html">CVE-2014-1590</cve>
<bugzilla href="https://bugzilla.suse.com/908009">SUSE bug 908009</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204322" comment="MozillaFirefox-31.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204323" comment="MozillaFirefox-translations-31.3.0esr-0.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1591</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1591" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1591" source="CVE"/>
    <description>
    Mozilla Firefox 33.0 and SeaMonkey before 2.31 include path strings in CSP violation reports, which allows remote attackers to obtain sensitive information via a web site that receives a report after a redirect.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1591.html">CVE-2014-1591</cve>
<bugzilla href="https://bugzilla.suse.com/908009">SUSE bug 908009</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204322" comment="MozillaFirefox-31.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204323" comment="MozillaFirefox-translations-31.3.0esr-0.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1592</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1592" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsHtml5TreeOperation function in xul.dll in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to execute arbitrary code by adding a second root element to an HTML5 document during parsing.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1592.html">CVE-2014-1592</cve>
<bugzilla href="https://bugzilla.suse.com/908009">SUSE bug 908009</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204322" comment="MozillaFirefox-31.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204323" comment="MozillaFirefox-translations-31.3.0esr-0.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1593</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1593" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593" source="CVE"/>
    <description>
    Stack-based buffer overflow in the mozilla::FileBlockCache::Read function in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to execute arbitrary code via crafted media content.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1593.html">CVE-2014-1593</cve>
<bugzilla href="https://bugzilla.suse.com/908009">SUSE bug 908009</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204322" comment="MozillaFirefox-31.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204323" comment="MozillaFirefox-translations-31.3.0esr-0.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1594</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1594" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594" source="CVE"/>
    <description>
    Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 might allow remote attackers to execute arbitrary code by leveraging an incorrect cast from the BasicThebesLayer data type to the BasicContainerLayer data type.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1594.html">CVE-2014-1594</cve>
<bugzilla href="https://bugzilla.suse.com/908009">SUSE bug 908009</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204322" comment="MozillaFirefox-31.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204323" comment="MozillaFirefox-translations-31.3.0esr-0.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1595</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1595" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1595" source="CVE"/>
    <description>
    Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, and Thunderbird before 31.3 on Apple OS X 10.10 omit a CoreGraphics disable-logging action that is needed by jemalloc-based applications, which allows local users to obtain sensitive information by reading /tmp files, as demonstrated by credential information.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1595.html">CVE-2014-1595</cve>
<bugzilla href="https://bugzilla.suse.com/908009">SUSE bug 908009</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204322" comment="MozillaFirefox-31.3.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204323" comment="MozillaFirefox-translations-31.3.0esr-0.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1642</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1642" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1642" source="CVE"/>
    <description>
    The IRQ setup in Xen 4.2.x and 4.3.x, when using device passthrough and configured to support a large number of CPUs, frees certain memory that may still be intended for use, which allows local guest administrators to cause a denial of service (memory corruption and hypervisor crash) and possibly execute arbitrary code via vectors related to an out-of-memory error that triggers a (1) use-after-free or (2) double free.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1642.html">CVE-2014-1642</cve>
<bugzilla href="https://bugzilla.suse.com/858496">SUSE bug 858496</bugzilla>
<bugzilla href="https://bugzilla.suse.com/860092">SUSE bug 860092</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204914" comment="xen-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204915" comment="xen-doc-html-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204916" comment="xen-doc-pdf-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204917" comment="xen-kmp-default-4.2.4_02_3.0.101_0.15-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204918" comment="xen-kmp-pae-4.2.4_02_3.0.101_0.15-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204919" comment="xen-libs-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204920" comment="xen-libs-32bit-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204921" comment="xen-tools-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204922" comment="xen-tools-domU-4.2.4_02-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204914" comment="xen-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204915" comment="xen-doc-html-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204916" comment="xen-doc-pdf-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204917" comment="xen-kmp-default-4.2.4_02_3.0.101_0.15-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204919" comment="xen-libs-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204920" comment="xen-libs-32bit-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204921" comment="xen-tools-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204922" comment="xen-tools-domU-4.2.4_02-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1666</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1666" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1666" source="CVE"/>
    <description>
    The do_physdev_op function in Xen 4.1.5, 4.1.6.1, 4.2.2 through 4.2.3, and 4.3.x does not properly restrict access to the (1) PHYSDEVOP_prepare_msix and (2) PHYSDEVOP_release_msix operations, which allows local PV guests to cause a denial of service (host or guest malfunction) or possibly gain privileges via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1666.html">CVE-2014-1666</cve>
<bugzilla href="https://bugzilla.suse.com/860302">SUSE bug 860302</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204914" comment="xen-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204915" comment="xen-doc-html-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204916" comment="xen-doc-pdf-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204917" comment="xen-kmp-default-4.2.4_02_3.0.101_0.15-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204918" comment="xen-kmp-pae-4.2.4_02_3.0.101_0.15-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204919" comment="xen-libs-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204920" comment="xen-libs-32bit-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204921" comment="xen-tools-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204922" comment="xen-tools-domU-4.2.4_02-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204914" comment="xen-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204915" comment="xen-doc-html-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204916" comment="xen-doc-pdf-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204917" comment="xen-kmp-default-4.2.4_02_3.0.101_0.15-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204919" comment="xen-libs-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204920" comment="xen-libs-32bit-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204921" comment="xen-tools-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204922" comment="xen-tools-domU-4.2.4_02-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1737</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1737" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1737" source="CVE"/>
    <description>
    The raw_cmd_copyin function in drivers/block/floppy.c in the Linux kernel through 3.14.3 does not properly handle error conditions during processing of an FDRAWCMD ioctl call, which allows local users to trigger kfree operations and gain privileges by leveraging write access to a /dev/fd device.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1737.html">CVE-2014-1737</cve>
<bugzilla href="https://bugzilla.suse.com/875798">SUSE bug 875798</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877345">SUSE bug 877345</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214964" comment="kernel-default-3.0.101-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214965" comment="kernel-default-base-3.0.101-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214966" comment="kernel-default-devel-3.0.101-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214968" comment="kernel-source-3.0.101-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214969" comment="kernel-syms-3.0.101-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215008" comment="kernel-trace-3.0.101-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215009" comment="kernel-trace-base-3.0.101-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214970" comment="kernel-trace-devel-3.0.101-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1738</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1738" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1738" source="CVE"/>
    <description>
    The raw_cmd_copyout function in drivers/block/floppy.c in the Linux kernel through 3.14.3 does not properly restrict access to certain pointers during processing of an FDRAWCMD ioctl call, which allows local users to obtain sensitive information from kernel heap memory by leveraging write access to a /dev/fd device.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1738.html">CVE-2014-1738</cve>
<bugzilla href="https://bugzilla.suse.com/875798">SUSE bug 875798</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877345">SUSE bug 877345</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214964" comment="kernel-default-3.0.101-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214965" comment="kernel-default-base-3.0.101-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214966" comment="kernel-default-devel-3.0.101-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214968" comment="kernel-source-3.0.101-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214969" comment="kernel-syms-3.0.101-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215008" comment="kernel-trace-3.0.101-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215009" comment="kernel-trace-base-3.0.101-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214970" comment="kernel-trace-devel-3.0.101-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1739</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1739" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739" source="CVE"/>
    <description>
    The media_device_enum_entities function in drivers/media/media-device.c in the Linux kernel before 3.14.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory by leveraging /dev/media0 read access for a MEDIA_IOC_ENUM_ENTITIES ioctl call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1739.html">CVE-2014-1739</cve>
<bugzilla href="https://bugzilla.suse.com/882804">SUSE bug 882804</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208673" comment="iscsitarget-kmp-bigsmp-1.4.20_3.0.101_0.40-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204510" comment="kernel-default-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204511" comment="kernel-default-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204512" comment="kernel-default-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204518" comment="kernel-source-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204519" comment="kernel-syms-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208596" comment="kernel-trace-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208597" comment="kernel-trace-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204520" comment="kernel-trace-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208676" comment="ofed-kmp-bigsmp-1.5.4.1_3.0.101_0.40-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208677" comment="oracleasm-kmp-bigsmp-2.0.5_3.0.101_0.40-7.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1874</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1874" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1874" source="CVE"/>
    <description>
    The security_context_to_sid_core function in security/selinux/ss/services.c in the Linux kernel before 3.13.4 allows local users to cause a denial of service (system crash) by leveraging the CAP_MAC_ADMIN capability to set a zero-length security context.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1874.html">CVE-2014-1874</cve>
<bugzilla href="https://bugzilla.suse.com/863335">SUSE bug 863335</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213024" comment="kernel-default-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213025" comment="kernel-default-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213026" comment="kernel-default-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213028" comment="kernel-source-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213029" comment="kernel-syms-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213088" comment="kernel-trace-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213089" comment="kernel-trace-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213030" comment="kernel-trace-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1876</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1876" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1876" source="CVE"/>
    <description>
    The unpacker::redirect_stdio function in unpack.cpp in unpack200 in OpenJDK 6, 7, and 8; Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 does not securely create temporary files when a log file cannot be opened, which allows local users to overwrite arbitrary files via a symlink attack on /tmp/unpack.log.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1876.html">CVE-2014-1876</cve>
<bugzilla href="https://bugzilla.suse.com/863305">SUSE bug 863305</bugzilla>
<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214839" comment="java-1_6_0-ibm-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214840" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214841" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214839" comment="java-1_6_0-ibm-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214840" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214841" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214842" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214844" comment="java-1_7_0-ibm-alsa-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214846" comment="java-1_7_0-ibm-plugin-1.7.0_sr7.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1878</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1878" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1878" source="CVE"/>
    <description>
    Stack-based buffer overflow in the cmd_submitf function in cgi/cmd.c in Nagios Core, possibly 4.0.3rc1 and earlier, and Icinga before 1.8.6, 1.9 before 1.9.5, and 1.10 before 1.10.3 allows remote attackers to cause a denial of service (segmentation fault) via a long message to cmd.cgi.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1878.html">CVE-2014-1878</cve>
<bugzilla href="https://bugzilla.suse.com/864843">SUSE bug 864843</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200366" comment="nagios-3.0.6-1.25.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200367" comment="nagios-www-3.0.6-1.25.36 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1891</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1891" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1891" source="CVE"/>
    <description>
    Multiple integer overflows in the (1) FLASK_GETBOOL, (2) FLASK_SETBOOL, (3) FLASK_USER, and (4) FLASK_CONTEXT_TO_SID suboperations in the flask hypercall in Xen 4.3.x, 4.2.x, 4.1.x, 3.2.x, and earlier, when XSM is enabled, allow local users to cause a denial of service (processor fault) via unspecified vectors, a different vulnerability than CVE-2014-1892, CVE-2014-1893, and CVE-2014-1894.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1891.html">CVE-2014-1891</cve>
<bugzilla href="https://bugzilla.suse.com/860163">SUSE bug 860163</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204914" comment="xen-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204915" comment="xen-doc-html-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204916" comment="xen-doc-pdf-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204917" comment="xen-kmp-default-4.2.4_02_3.0.101_0.15-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204918" comment="xen-kmp-pae-4.2.4_02_3.0.101_0.15-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204919" comment="xen-libs-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204920" comment="xen-libs-32bit-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204921" comment="xen-tools-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204922" comment="xen-tools-domU-4.2.4_02-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204914" comment="xen-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204915" comment="xen-doc-html-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204916" comment="xen-doc-pdf-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204917" comment="xen-kmp-default-4.2.4_02_3.0.101_0.15-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204919" comment="xen-libs-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204920" comment="xen-libs-32bit-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204921" comment="xen-tools-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204922" comment="xen-tools-domU-4.2.4_02-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141892" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1892</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1892" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1892" source="CVE"/>
    <description>
    Xen 3.3 through 4.1, when XSM is enabled, allows local users to cause a denial of service via vectors related to a "large memory allocation," a different vulnerability than CVE-2014-1891, CVE-2014-1893, and CVE-2014-1894.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1892.html">CVE-2014-1892</cve>
<bugzilla href="https://bugzilla.suse.com/860163">SUSE bug 860163</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204914" comment="xen-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204915" comment="xen-doc-html-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204916" comment="xen-doc-pdf-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204917" comment="xen-kmp-default-4.2.4_02_3.0.101_0.15-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204918" comment="xen-kmp-pae-4.2.4_02_3.0.101_0.15-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204919" comment="xen-libs-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204920" comment="xen-libs-32bit-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204921" comment="xen-tools-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204922" comment="xen-tools-domU-4.2.4_02-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204914" comment="xen-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204915" comment="xen-doc-html-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204916" comment="xen-doc-pdf-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204917" comment="xen-kmp-default-4.2.4_02_3.0.101_0.15-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204919" comment="xen-libs-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204920" comment="xen-libs-32bit-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204921" comment="xen-tools-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204922" comment="xen-tools-domU-4.2.4_02-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1893</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1893" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1893" source="CVE"/>
    <description>
    Multiple integer overflows in the (1) FLASK_GETBOOL and (2) FLASK_SETBOOL suboperations in the flask hypercall in Xen 4.1.x, 3.3.x, 3.2.x, and earlier, when XSM is enabled, allow local users to cause a denial of service (processor fault) via unspecified vectors, a different vulnerability than CVE-2014-1891, CVE-2014-1892, and CVE-2014-1894.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1893.html">CVE-2014-1893</cve>
<bugzilla href="https://bugzilla.suse.com/860163">SUSE bug 860163</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204914" comment="xen-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204915" comment="xen-doc-html-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204916" comment="xen-doc-pdf-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204917" comment="xen-kmp-default-4.2.4_02_3.0.101_0.15-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204918" comment="xen-kmp-pae-4.2.4_02_3.0.101_0.15-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204919" comment="xen-libs-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204920" comment="xen-libs-32bit-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204921" comment="xen-tools-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204922" comment="xen-tools-domU-4.2.4_02-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204914" comment="xen-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204915" comment="xen-doc-html-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204916" comment="xen-doc-pdf-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204917" comment="xen-kmp-default-4.2.4_02_3.0.101_0.15-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204919" comment="xen-libs-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204920" comment="xen-libs-32bit-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204921" comment="xen-tools-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204922" comment="xen-tools-domU-4.2.4_02-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1894</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1894" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1894" source="CVE"/>
    <description>
    Multiple integer overflows in unspecified suboperations in the flask hypercall in Xen 3.2.x and earlier, when XSM is enabled, allow local users to cause a denial of service (processor fault) via unspecified vectors, a different vulnerability than CVE-2014-1891, CVE-2014-1892, and CVE-2014-1893.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1894.html">CVE-2014-1894</cve>
<bugzilla href="https://bugzilla.suse.com/860163">SUSE bug 860163</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204914" comment="xen-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204915" comment="xen-doc-html-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204916" comment="xen-doc-pdf-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204917" comment="xen-kmp-default-4.2.4_02_3.0.101_0.15-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204918" comment="xen-kmp-pae-4.2.4_02_3.0.101_0.15-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204919" comment="xen-libs-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204920" comment="xen-libs-32bit-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204921" comment="xen-tools-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204922" comment="xen-tools-domU-4.2.4_02-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204914" comment="xen-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204915" comment="xen-doc-html-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204916" comment="xen-doc-pdf-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204917" comment="xen-kmp-default-4.2.4_02_3.0.101_0.15-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204919" comment="xen-libs-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204920" comment="xen-libs-32bit-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204921" comment="xen-tools-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204922" comment="xen-tools-domU-4.2.4_02-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1895</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1895" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1895" source="CVE"/>
    <description>
    Off-by-one error in the flask_security_avc_cachestats function in xsm/flask/flask_op.c in Xen 4.2.x and 4.3.x, when the maximum number of physical CPUs are in use, allows local users to cause a denial of service (host crash) or obtain sensitive information from hypervisor memory by leveraging a FLASK_AVC_CACHESTAT hypercall, which triggers a buffer over-read.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1895.html">CVE-2014-1895</cve>
<bugzilla href="https://bugzilla.suse.com/860165">SUSE bug 860165</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204914" comment="xen-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204915" comment="xen-doc-html-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204916" comment="xen-doc-pdf-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204917" comment="xen-kmp-default-4.2.4_02_3.0.101_0.15-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204918" comment="xen-kmp-pae-4.2.4_02_3.0.101_0.15-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204919" comment="xen-libs-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204920" comment="xen-libs-32bit-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204921" comment="xen-tools-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204922" comment="xen-tools-domU-4.2.4_02-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204914" comment="xen-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204915" comment="xen-doc-html-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204916" comment="xen-doc-pdf-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204917" comment="xen-kmp-default-4.2.4_02_3.0.101_0.15-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204919" comment="xen-libs-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204920" comment="xen-libs-32bit-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204921" comment="xen-tools-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204922" comment="xen-tools-domU-4.2.4_02-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1896</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1896" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1896" source="CVE"/>
    <description>
    The (1) do_send and (2) do_recv functions in io.c in libvchan in Xen 4.2.x, 4.3.x, and 4.4-RC series allows local guests to cause a denial of service or possibly gain privileges via crafted xenstore ring indexes, which triggers a "read or write past the end of the ring."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1896.html">CVE-2014-1896</cve>
<bugzilla href="https://bugzilla.suse.com/860300">SUSE bug 860300</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204914" comment="xen-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204915" comment="xen-doc-html-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204916" comment="xen-doc-pdf-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204917" comment="xen-kmp-default-4.2.4_02_3.0.101_0.15-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204918" comment="xen-kmp-pae-4.2.4_02_3.0.101_0.15-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204919" comment="xen-libs-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204920" comment="xen-libs-32bit-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204921" comment="xen-tools-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204922" comment="xen-tools-domU-4.2.4_02-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204914" comment="xen-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204915" comment="xen-doc-html-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204916" comment="xen-doc-pdf-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204917" comment="xen-kmp-default-4.2.4_02_3.0.101_0.15-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204919" comment="xen-libs-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204920" comment="xen-libs-32bit-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204921" comment="xen-tools-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204922" comment="xen-tools-domU-4.2.4_02-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1912</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1912" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1912" source="CVE"/>
    <description>
    Buffer overflow in the socket.recvfrom_into function in Modules/socketmodule.c in Python 2.5 before 2.7.7, 3.x before 3.3.4, and 3.4.x before 3.4rc1 allows remote attackers to execute arbitrary code via a crafted string.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1912.html">CVE-2014-1912</cve>
<bugzilla href="https://bugzilla.suse.com/1049392">SUSE bug 1049392</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049422">SUSE bug 1049422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/863741">SUSE bug 863741</bugzilla>
<bugzilla href="https://bugzilla.suse.com/882915">SUSE bug 882915</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204786" comment="libpython2_6-1_0-2.6.9-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204787" comment="libpython2_6-1_0-32bit-2.6.9-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204788" comment="python-2.6.9-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202016" comment="python-32bit-2.6.9-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204789" comment="python-base-2.6.9-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204790" comment="python-base-32bit-2.6.9-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204791" comment="python-curses-2.6.9-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202017" comment="python-demo-2.6.9-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202019" comment="python-doc-2.6-8.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202020" comment="python-doc-pdf-2.6-8.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202021" comment="python-gdbm-2.6.9-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202022" comment="python-idle-2.6.9-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202023" comment="python-tk-2.6.9-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204792" comment="python-xml-2.6.9-0.27 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204786" comment="libpython2_6-1_0-2.6.9-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204787" comment="libpython2_6-1_0-32bit-2.6.9-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208960" comment="libpython2_6-1_0-x86-2.6.9-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204788" comment="python-2.6.9-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202016" comment="python-32bit-2.6.9-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204789" comment="python-base-2.6.9-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204790" comment="python-base-32bit-2.6.9-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208961" comment="python-base-x86-2.6.9-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204791" comment="python-curses-2.6.9-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202017" comment="python-demo-2.6.9-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202019" comment="python-doc-2.6-8.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202020" comment="python-doc-pdf-2.6-8.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202021" comment="python-gdbm-2.6.9-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202022" comment="python-idle-2.6.9-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202023" comment="python-tk-2.6.9-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208962" comment="python-x86-2.6.9-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204792" comment="python-xml-2.6.9-0.27 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1932</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2014-1932" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1932" source="CVE"/>
    <description>
    The (1) load_djpeg function in JpegImagePlugin.py, (2) Ghostscript function in EpsImagePlugin.py, (3) load function in IptcImagePlugin.py, and (4) _copy function in Image.py in Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 do not properly create temporary files, which allow local users to overwrite arbitrary files and obtain sensitive information via a symlink attack on the temporary file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1932.html">CVE-2014-1932</cve>
<bugzilla href="https://bugzilla.suse.com/863541">SUSE bug 863541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/921566">SUSE bug 921566</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200425" comment="python-imaging-1.1.6-168.34 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215928" comment="python-Pillow-2.7.0-0.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1933</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2014-1933" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1933" source="CVE"/>
    <description>
    The (1) JpegImagePlugin.py and (2) EpsImagePlugin.py scripts in Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 uses the names of temporary files on the command line, which makes it easier for local users to conduct symlink attacks by listing the processes.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1933.html">CVE-2014-1933</cve>
<bugzilla href="https://bugzilla.suse.com/863541">SUSE bug 863541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/921566">SUSE bug 921566</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200425" comment="python-imaging-1.1.6-168.34 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215928" comment="python-Pillow-2.7.0-0.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1947</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1947" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1947" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1947.html">CVE-2014-1947</cve>
<bugzilla href="https://bugzilla.suse.com/863838">SUSE bug 863838</bugzilla>
<bugzilla href="https://bugzilla.suse.com/905260">SUSE bug 905260</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215225" comment="libMagickCore1-6.4.3.6-7.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200171" comment="libMagickCore1-32bit-6.4.3.6-7.30 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215225" comment="libMagickCore1-6.4.3.6-7.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215226" comment="libMagickCore1-32bit-6.4.3.6-7.28 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1950</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-1950" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950" source="CVE"/>
    <description>
    Use-after-free vulnerability in the xc_cpupool_getinfo function in Xen 4.1.x through 4.3.x, when using a multithreaded toolstack, does not properly handle a failure by the xc_cpumap_alloc function, which allows local users with access to management functions to cause a denial of service (heap corruption) and possibly gain privileges via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1950.html">CVE-2014-1950</cve>
<bugzilla href="https://bugzilla.suse.com/861256">SUSE bug 861256</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204914" comment="xen-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204915" comment="xen-doc-html-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204916" comment="xen-doc-pdf-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204917" comment="xen-kmp-default-4.2.4_02_3.0.101_0.15-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204918" comment="xen-kmp-pae-4.2.4_02_3.0.101_0.15-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204919" comment="xen-libs-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204920" comment="xen-libs-32bit-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204921" comment="xen-tools-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204922" comment="xen-tools-domU-4.2.4_02-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204914" comment="xen-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204915" comment="xen-doc-html-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204916" comment="xen-doc-pdf-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204917" comment="xen-kmp-default-4.2.4_02_3.0.101_0.15-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204919" comment="xen-libs-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204920" comment="xen-libs-32bit-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204921" comment="xen-tools-4.2.4_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204922" comment="xen-tools-domU-4.2.4_02-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2015</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-2015" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2015" source="CVE"/>
    <description>
    Stack-based buffer overflow in the normify function in the rlm_pap module (modules/rlm_pap/rlm_pap.c) in FreeRADIUS 2.x, possibly 2.2.3 and earlier, and 3.x, possibly 3.0.1 and earlier, might allow attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long password hash, as demonstrated by an SSHA hash.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2015.html">CVE-2014-2015</cve>
<bugzilla href="https://bugzilla.suse.com/864576">SUSE bug 864576</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200014" comment="freeradius-server-2.1.1-7.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200015" comment="freeradius-server-dialupadmin-2.1.1-7.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200016" comment="freeradius-server-doc-2.1.1-7.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200017" comment="freeradius-server-libs-2.1.1-7.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200018" comment="freeradius-server-utils-2.1.1-7.18 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2270</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-2270" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2270" source="CVE"/>
    <description>
    softmagic.c in file before 5.17 and libmagic allows context-dependent attackers to cause a denial of service (out-of-bounds memory access and crash) via crafted offsets in the softmagic of a PE executable.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2270.html">CVE-2014-2270</cve>
<bugzilla href="https://bugzilla.suse.com/866750">SUSE bug 866750</bugzilla>
<bugzilla href="https://bugzilla.suse.com/883306">SUSE bug 883306</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215232" comment="file-4.24-43.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200012" comment="file-32bit-4.24-43.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200013" comment="file-x86-4.24-43.27 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215232" comment="file-4.24-43.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215233" comment="file-32bit-4.24-43.25 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2281</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-2281" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2281" source="CVE"/>
    <description>
    The nfs_name_snoop_add_name function in epan/dissectors/packet-nfs.c in the NFS dissector in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 does not validate a certain length value, which allows remote attackers to cause a denial of service (memory corruption and application crash) via a crafted NFS packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2281.html">CVE-2014-2281</cve>
<bugzilla href="https://bugzilla.suse.com/867485">SUSE bug 867485</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215236" comment="wireshark-1.8.13-0.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2282</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-2282" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2282" source="CVE"/>
    <description>
    The dissect_protocol_data_parameter function in epan/dissectors/packet-m3ua.c in the M3UA dissector in Wireshark 1.10.x before 1.10.6 does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) via a crafted SS7 MTP3 packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2282.html">CVE-2014-2282</cve>
<bugzilla href="https://bugzilla.suse.com/867485">SUSE bug 867485</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215236" comment="wireshark-1.8.13-0.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2283</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-2283" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2283" source="CVE"/>
    <description>
    epan/dissectors/packet-rlc in the RLC dissector in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 uses inconsistent memory-management approaches, which allows remote attackers to cause a denial of service (use-after-free error and application crash) via a crafted UMTS Radio Link Control packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2283.html">CVE-2014-2283</cve>
<bugzilla href="https://bugzilla.suse.com/867485">SUSE bug 867485</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215236" comment="wireshark-1.8.13-0.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2284</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-2284" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2284" source="CVE"/>
    <description>
    The Linux implementation of the ICMP-MIB in Net-SNMP 5.5 before 5.5.2.1, 5.6.x before 5.6.2.1, and 5.7.x before 5.7.2.1 does not properly validate input, which allows remote attackers to cause a denial of service via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2284.html">CVE-2014-2284</cve>
<bugzilla href="https://bugzilla.suse.com/866942">SUSE bug 866942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/875217">SUSE bug 875217</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215238" comment="libsnmp15-5.4.2.1-8.12.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200304" comment="libsnmp15-32bit-5.4.2.1-8.12.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200305" comment="libsnmp15-x86-5.4.2.1-8.12.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215240" comment="net-snmp-5.4.2.1-8.12.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215241" comment="perl-SNMP-5.4.2.1-8.12.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215242" comment="snmp-mibs-5.4.2.1-8.12.20 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215238" comment="libsnmp15-5.4.2.1-8.12.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215239" comment="libsnmp15-32bit-5.4.2.1-8.12.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215240" comment="net-snmp-5.4.2.1-8.12.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215241" comment="perl-SNMP-5.4.2.1-8.12.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215242" comment="snmp-mibs-5.4.2.1-8.12.20 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142299" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2299</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-2299" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2299" source="CVE"/>
    <description>
    Buffer overflow in the mpeg_read function in wiretap/mpeg.c in the MPEG parser in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a large record in MPEG data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2299.html">CVE-2014-2299</cve>
<bugzilla href="https://bugzilla.suse.com/867485">SUSE bug 867485</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215236" comment="wireshark-1.8.13-0.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2309</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-2309" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2309" source="CVE"/>
    <description>
    The ip6_route_add function in net/ipv6/route.c in the Linux kernel through 3.13.6 does not properly count the addition of routes, which allows remote attackers to cause a denial of service (memory consumption) via a flood of ICMPv6 Router Advertisement packets.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2309.html">CVE-2014-2309</cve>
<bugzilla href="https://bugzilla.suse.com/824295">SUSE bug 824295</bugzilla>
<bugzilla href="https://bugzilla.suse.com/867531">SUSE bug 867531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/889071">SUSE bug 889071</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213024" comment="kernel-default-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213025" comment="kernel-default-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213026" comment="kernel-default-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213028" comment="kernel-source-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213029" comment="kernel-syms-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213088" comment="kernel-trace-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213089" comment="kernel-trace-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213030" comment="kernel-trace-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2310</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-2310" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2310" source="CVE"/>
    <description>
    The AgentX subagent in Net-SNMP before 5.4.4 allows remote attackers to cause a denial of service (hang) by sending a multi-object request with an Object ID (OID) containing more subids than previous requests, a different vulnerability than CVE-2012-6151.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2310.html">CVE-2014-2310</cve>
<bugzilla href="https://bugzilla.suse.com/867349">SUSE bug 867349</bugzilla>
<bugzilla href="https://bugzilla.suse.com/875217">SUSE bug 875217</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215238" comment="libsnmp15-5.4.2.1-8.12.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200304" comment="libsnmp15-32bit-5.4.2.1-8.12.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200305" comment="libsnmp15-x86-5.4.2.1-8.12.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215240" comment="net-snmp-5.4.2.1-8.12.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215241" comment="perl-SNMP-5.4.2.1-8.12.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215242" comment="snmp-mibs-5.4.2.1-8.12.20 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215238" comment="libsnmp15-5.4.2.1-8.12.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215239" comment="libsnmp15-32bit-5.4.2.1-8.12.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215240" comment="net-snmp-5.4.2.1-8.12.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215241" comment="perl-SNMP-5.4.2.1-8.12.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215242" comment="snmp-mibs-5.4.2.1-8.12.20 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2338</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-2338" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2338" source="CVE"/>
    <description>
    IKEv2 in strongSwan 4.0.7 before 5.1.3 allows remote attackers to bypass authentication by rekeying an IKE_SA during (1) initiation or (2) re-authentication, which triggers the IKE_SA state to be set to established.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2338.html">CVE-2014-2338</cve>
<bugzilla href="https://bugzilla.suse.com/870572">SUSE bug 870572</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215244" comment="strongswan-4.4.0-6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215245" comment="strongswan-doc-4.4.0-6.23 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2398</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-2398" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2398" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JavaFX 2.2.51; and JRockit R27.8.1 and R28.3.1 allows remote authenticated users to affect integrity via unknown vectors related to Javadoc.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2398.html">CVE-2014-2398</cve>
<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214839" comment="java-1_6_0-ibm-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214840" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214841" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214839" comment="java-1_6_0-ibm-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214840" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214841" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214842" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214844" comment="java-1_7_0-ibm-alsa-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214846" comment="java-1_7_0-ibm-plugin-1.7.0_sr7.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2401</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-2401" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2401" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JavaFX 2.2.51; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2401.html">CVE-2014-2401</cve>
<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214839" comment="java-1_6_0-ibm-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214840" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214841" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214839" comment="java-1_6_0-ibm-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214840" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214841" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214842" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214844" comment="java-1_7_0-ibm-alsa-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214846" comment="java-1_7_0-ibm-plugin-1.7.0_sr7.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2402</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-2402" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2402" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u51 and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2014-0432 and CVE-2014-0455.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2402.html">CVE-2014-2402</cve>
<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214844" comment="java-1_7_0-ibm-alsa-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214846" comment="java-1_7_0-ibm-plugin-1.7.0_sr7.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2409</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-2409" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2409" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2409.html">CVE-2014-2409</cve>
<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214839" comment="java-1_6_0-ibm-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214840" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214841" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214839" comment="java-1_6_0-ibm-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214840" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214841" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214842" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214844" comment="java-1_7_0-ibm-alsa-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214846" comment="java-1_7_0-ibm-plugin-1.7.0_sr7.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2412</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-2412" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2412" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, SE 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT, a different vulnerability than CVE-2014-0451.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2412.html">CVE-2014-2412</cve>
<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214839" comment="java-1_6_0-ibm-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214840" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214841" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214839" comment="java-1_6_0-ibm-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214840" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214841" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214842" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214844" comment="java-1_7_0-ibm-alsa-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214846" comment="java-1_7_0-ibm-plugin-1.7.0_sr7.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2414</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-2414" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2414" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAXB.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2414.html">CVE-2014-2414</cve>
<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214839" comment="java-1_6_0-ibm-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214840" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214841" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214839" comment="java-1_6_0-ibm-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214840" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214841" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214842" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214844" comment="java-1_7_0-ibm-alsa-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214846" comment="java-1_7_0-ibm-plugin-1.7.0_sr7.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2419</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-2419" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2419" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.35 and earlier and 5.6.15 and earlier allows remote authenticated users to affect availability via unknown vectors related to Partition.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2419.html">CVE-2014-2419</cve>
<bugzilla href="https://bugzilla.suse.com/873896">SUSE bug 873896</bugzilla>
<bugzilla href="https://bugzilla.suse.com/999706">SUSE bug 999706</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214536" comment="libmysql55client18-32bit-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2420</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-2420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2420" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect integrity via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2420.html">CVE-2014-2420</cve>
<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214839" comment="java-1_6_0-ibm-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214840" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214841" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214839" comment="java-1_6_0-ibm-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214840" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214841" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214842" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214844" comment="java-1_7_0-ibm-alsa-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214846" comment="java-1_7_0-ibm-plugin-1.7.0_sr7.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2421</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-2421" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2421" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JavaFX 2.2.51; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2421.html">CVE-2014-2421</cve>
<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214839" comment="java-1_6_0-ibm-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214840" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214841" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214839" comment="java-1_6_0-ibm-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214840" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214841" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214842" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214844" comment="java-1_7_0-ibm-alsa-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214846" comment="java-1_7_0-ibm-plugin-1.7.0_sr7.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-2423" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2423" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAX-WS, a different vulnerability than CVE-2014-0452 and CVE-2014-0458.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2423.html">CVE-2014-2423</cve>
<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214839" comment="java-1_6_0-ibm-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214840" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214841" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214839" comment="java-1_6_0-ibm-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214840" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214841" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214842" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214844" comment="java-1_7_0-ibm-alsa-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214846" comment="java-1_7_0-ibm-plugin-1.7.0_sr7.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2427</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-2427" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2427" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2427.html">CVE-2014-2427</cve>
<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214839" comment="java-1_6_0-ibm-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214840" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214841" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214839" comment="java-1_6_0-ibm-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214840" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214841" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214842" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214844" comment="java-1_7_0-ibm-alsa-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214846" comment="java-1_7_0-ibm-plugin-1.7.0_sr7.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2428</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-2428" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2428" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2428.html">CVE-2014-2428</cve>
<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214839" comment="java-1_6_0-ibm-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214840" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214841" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214839" comment="java-1_6_0-ibm-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214840" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214841" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214842" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.0-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214843" comment="java-1_7_0-ibm-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214844" comment="java-1_7_0-ibm-alsa-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214845" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214846" comment="java-1_7_0-ibm-plugin-1.7.0_sr7.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2430</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-2430" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2430" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.36 and earlier and 5.6.16 and earlier allows remote authenticated users to affect availability via unknown vectors related to Performance Schema.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2430.html">CVE-2014-2430</cve>
<bugzilla href="https://bugzilla.suse.com/873896">SUSE bug 873896</bugzilla>
<bugzilla href="https://bugzilla.suse.com/999706">SUSE bug 999706</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214536" comment="libmysql55client18-32bit-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2431</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-2431" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2431" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.36 and earlier and 5.6.16 and earlier allows remote attackers to affect availability via unknown vectors related to Options.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2431.html">CVE-2014-2431</cve>
<bugzilla href="https://bugzilla.suse.com/873896">SUSE bug 873896</bugzilla>
<bugzilla href="https://bugzilla.suse.com/999706">SUSE bug 999706</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214536" comment="libmysql55client18-32bit-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2432</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-2432" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2432" source="CVE"/>
    <description>
    Unspecified vulnerability Oracle the MySQL Server component 5.5.35 and earlier and 5.6.15 and earlier allows remote authenticated users to affect availability via unknown vectors related to Federated.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2432.html">CVE-2014-2432</cve>
<bugzilla href="https://bugzilla.suse.com/873896">SUSE bug 873896</bugzilla>
<bugzilla href="https://bugzilla.suse.com/999706">SUSE bug 999706</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214536" comment="libmysql55client18-32bit-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2434</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-2434" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2434" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.15 and earlier allows remote authenticated users to affect availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2434.html">CVE-2014-2434</cve>
<bugzilla href="https://bugzilla.suse.com/873896">SUSE bug 873896</bugzilla>
<bugzilla href="https://bugzilla.suse.com/999706">SUSE bug 999706</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214536" comment="libmysql55client18-32bit-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2435</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-2435" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2435" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.16 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2435.html">CVE-2014-2435</cve>
<bugzilla href="https://bugzilla.suse.com/1021755">SUSE bug 1021755</bugzilla>
<bugzilla href="https://bugzilla.suse.com/873896">SUSE bug 873896</bugzilla>
<bugzilla href="https://bugzilla.suse.com/999706">SUSE bug 999706</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214536" comment="libmysql55client18-32bit-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2436</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-2436" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2436" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.36 and earlier and 5.6.16 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to RBR.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2436.html">CVE-2014-2436</cve>
<bugzilla href="https://bugzilla.suse.com/873896">SUSE bug 873896</bugzilla>
<bugzilla href="https://bugzilla.suse.com/999706">SUSE bug 999706</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214536" comment="libmysql55client18-32bit-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2438</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-2438" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2438" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.35 and earlier and 5.6.15 and earlier allows remote authenticated users to affect availability via unknown vectors related to Replication.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2438.html">CVE-2014-2438</cve>
<bugzilla href="https://bugzilla.suse.com/873896">SUSE bug 873896</bugzilla>
<bugzilla href="https://bugzilla.suse.com/999706">SUSE bug 999706</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214536" comment="libmysql55client18-32bit-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2440</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-2440" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2440" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Client component in Oracle MySQL 5.5.36 and earlier and 5.6.16 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2440.html">CVE-2014-2440</cve>
<bugzilla href="https://bugzilla.suse.com/873896">SUSE bug 873896</bugzilla>
<bugzilla href="https://bugzilla.suse.com/999706">SUSE bug 999706</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214536" comment="libmysql55client18-32bit-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2442</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-2442" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2442" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.15 and earlier allows remote authenticated users to affect availability via vectors related to MyISAM.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2442.html">CVE-2014-2442</cve>
<bugzilla href="https://bugzilla.suse.com/873896">SUSE bug 873896</bugzilla>
<bugzilla href="https://bugzilla.suse.com/999706">SUSE bug 999706</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214536" comment="libmysql55client18-32bit-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2444</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-2444" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2444" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.15 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to InnoDB.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2444.html">CVE-2014-2444</cve>
<bugzilla href="https://bugzilla.suse.com/873896">SUSE bug 873896</bugzilla>
<bugzilla href="https://bugzilla.suse.com/999706">SUSE bug 999706</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214536" comment="libmysql55client18-32bit-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2450</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-2450" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2450" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.15 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2450.html">CVE-2014-2450</cve>
<bugzilla href="https://bugzilla.suse.com/873896">SUSE bug 873896</bugzilla>
<bugzilla href="https://bugzilla.suse.com/999706">SUSE bug 999706</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214536" comment="libmysql55client18-32bit-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2451</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-2451" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2451" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.15 and earlier allows remote authenticated users to affect availability via unknown vectors related to Privileges.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2451.html">CVE-2014-2451</cve>
<bugzilla href="https://bugzilla.suse.com/873896">SUSE bug 873896</bugzilla>
<bugzilla href="https://bugzilla.suse.com/999706">SUSE bug 999706</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214535" comment="libmysql55client18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214536" comment="libmysql55client18-32bit-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214537" comment="libmysql55client_r18-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214539" comment="mysql-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214540" comment="mysql-client-5.5.37-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214541" comment="mysql-tools-5.5.37-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-2484" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2484" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.17 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SRFTS.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2484.html">CVE-2014-2484</cve>
<bugzilla href="https://bugzilla.suse.com/887580">SUSE bug 887580</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204617" comment="libmysql55client18-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204619" comment="libmysql55client_r18-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204620" comment="mysql-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204621" comment="mysql-client-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208743" comment="mysql-tools-5.5.39-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204617" comment="libmysql55client18-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204619" comment="libmysql55client_r18-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204620" comment="mysql-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204621" comment="mysql-client-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208743" comment="mysql-tools-5.5.39-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2494</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-2494" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2494" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier allows remote authenticated users to affect availability via vectors related to ENARC.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2494.html">CVE-2014-2494</cve>
<bugzilla href="https://bugzilla.suse.com/887580">SUSE bug 887580</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915914">SUSE bug 915914</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204617" comment="libmysql55client18-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204619" comment="libmysql55client_r18-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204620" comment="mysql-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204621" comment="mysql-client-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208743" comment="mysql-tools-5.5.39-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204617" comment="libmysql55client18-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204619" comment="libmysql55client_r18-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204620" comment="mysql-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204621" comment="mysql-client-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208743" comment="mysql-tools-5.5.39-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2497</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-2497" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2497" source="CVE"/>
    <description>
    The gdImageCreateFromXpm function in gdxpm.c in libgd, as used in PHP 5.4.26 and earlier, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted color table in an XPM file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2497.html">CVE-2014-2497</cve>
<bugzilla href="https://bugzilla.suse.com/868624">SUSE bug 868624</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215117" comment="apache2-mod_php53-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215118" comment="php53-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215119" comment="php53-bcmath-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215120" comment="php53-bz2-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215121" comment="php53-calendar-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215122" comment="php53-ctype-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215123" comment="php53-curl-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215124" comment="php53-dba-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215125" comment="php53-dom-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215126" comment="php53-exif-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215127" comment="php53-fastcgi-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215128" comment="php53-fileinfo-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215129" comment="php53-ftp-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215130" comment="php53-gd-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215131" comment="php53-gettext-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215132" comment="php53-gmp-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215133" comment="php53-iconv-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215134" comment="php53-intl-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215135" comment="php53-json-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215136" comment="php53-ldap-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215137" comment="php53-mbstring-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215138" comment="php53-mcrypt-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215139" comment="php53-mysql-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215140" comment="php53-odbc-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215141" comment="php53-openssl-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215142" comment="php53-pcntl-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215143" comment="php53-pdo-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215144" comment="php53-pear-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215145" comment="php53-pgsql-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215146" comment="php53-pspell-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215147" comment="php53-shmop-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215148" comment="php53-snmp-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215149" comment="php53-soap-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215150" comment="php53-suhosin-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215151" comment="php53-sysvmsg-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215152" comment="php53-sysvsem-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215153" comment="php53-sysvshm-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215154" comment="php53-tokenizer-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215155" comment="php53-wddx-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215156" comment="php53-xmlreader-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215157" comment="php53-xmlrpc-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215158" comment="php53-xmlwriter-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215159" comment="php53-xsl-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215160" comment="php53-zip-5.3.17-0.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215161" comment="php53-zlib-5.3.17-0.23 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2523</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-2523" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2523" source="CVE"/>
    <description>
    net/netfilter/nf_conntrack_proto_dccp.c in the Linux kernel through 3.13.6 uses a DCCP header pointer incorrectly, which allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a DCCP packet that triggers a call to the (1) dccp_new, (2) dccp_packet, or (3) dccp_error function.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2523.html">CVE-2014-2523</cve>
<bugzilla href="https://bugzilla.suse.com/868653">SUSE bug 868653</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213024" comment="kernel-default-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213025" comment="kernel-default-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213026" comment="kernel-default-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213028" comment="kernel-source-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213029" comment="kernel-syms-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213088" comment="kernel-trace-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213089" comment="kernel-trace-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213030" comment="kernel-trace-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2527</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-2527" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2527" source="CVE"/>
    <description>
    kcleanup.cpp in KDirStat 2.7.0 does not properly quote strings when deleting a directory, which allows remote attackers to execute arbitrary commands via a " (double quote) character in the directory name, a different vulnerability than CVE-2014-2528.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2527.html">CVE-2014-2527</cve>
<bugzilla href="https://bugzilla.suse.com/868682">SUSE bug 868682</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200106" comment="kdirstat-2.4.4-255.28 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2528</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-2528" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2528" source="CVE"/>
    <description>
    kcleanup.cpp in KDirStat 2.7.3 does not properly quote strings when deleting a directory, which allows remote attackers to execute arbitrary commands via a ' (single quote) character in the directory name, a different vulnerability than CVE-2014-2527.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2528.html">CVE-2014-2528</cve>
<bugzilla href="https://bugzilla.suse.com/868682">SUSE bug 868682</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200106" comment="kdirstat-2.4.4-255.28 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2532</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-2532" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2532" source="CVE"/>
    <description>
    sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2532.html">CVE-2014-2532</cve>
<bugzilla href="https://bugzilla.suse.com/1074631">SUSE bug 1074631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/869101">SUSE bug 869101</bugzilla>
<bugzilla href="https://bugzilla.suse.com/890850">SUSE bug 890850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915834">SUSE bug 915834</bugzilla>
<bugzilla href="https://bugzilla.suse.com/916239">SUSE bug 916239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204727" comment="openssh-6.2p2-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204728" comment="openssh-askpass-6.2p2-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204729" comment="openssh-askpass-gnome-6.2p2-0.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2583</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-2583" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2583" source="CVE"/>
    <description>
    Multiple directory traversal vulnerabilities in pam_timestamp.c in the pam_timestamp module for Linux-PAM (aka pam) 1.1.8 allow local users to create arbitrary files or possibly bypass authentication via a .. (dot dot) in the (1) PAM_RUSER value to the get_ruser function or (2) PAM_TTY value to the check_tty function, which is used by the format_timestamp_name function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2583.html">CVE-2014-2583</cve>
<bugzilla href="https://bugzilla.suse.com/870433">SUSE bug 870433</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204742" comment="pam-1.1.5-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204743" comment="pam-32bit-1.1.5-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204744" comment="pam-doc-1.1.5-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208807" comment="pam-x86-1.1.5-0.12 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204742" comment="pam-1.1.5-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204743" comment="pam-32bit-1.1.5-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204744" comment="pam-doc-1.1.5-0.12 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2599</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-2599" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599" source="CVE"/>
    <description>
    The HVMOP_set_mem_access HVM control operations in Xen 4.1.x for 32-bit and 4.1.x through 4.4.x for 64-bit allow local guest administrators to cause a denial of service (CPU consumption) by leveraging access to certain service domains for HVM guests and a large input.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2599.html">CVE-2014-2599</cve>
<bugzilla href="https://bugzilla.suse.com/867910">SUSE bug 867910</bugzilla>
<bugzilla href="https://bugzilla.suse.com/880751">SUSE bug 880751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/903970">SUSE bug 903970</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204923" comment="xen-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204924" comment="xen-doc-html-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204925" comment="xen-doc-pdf-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204926" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204927" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204928" comment="xen-libs-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204929" comment="xen-libs-32bit-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204930" comment="xen-tools-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204931" comment="xen-tools-domU-4.2.4_04-0.9 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204923" comment="xen-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204924" comment="xen-doc-html-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204925" comment="xen-doc-pdf-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204926" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204928" comment="xen-libs-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204929" comment="xen-libs-32bit-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204930" comment="xen-tools-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204931" comment="xen-tools-domU-4.2.4_04-0.9 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2678</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-2678" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2678" source="CVE"/>
    <description>
    The rds_iw_laddr_check function in net/rds/iw.c in the Linux kernel through 3.14 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a bind system call for an RDS socket on a system that lacks RDS transports.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2678.html">CVE-2014-2678</cve>
<bugzilla href="https://bugzilla.suse.com/871561">SUSE bug 871561</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213024" comment="kernel-default-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213025" comment="kernel-default-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213026" comment="kernel-default-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213028" comment="kernel-source-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213029" comment="kernel-syms-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213088" comment="kernel-trace-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213089" comment="kernel-trace-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213030" comment="kernel-trace-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2706</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-2706" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706" source="CVE"/>
    <description>
    Race condition in the mac80211 subsystem in the Linux kernel before 3.13.7 allows remote attackers to cause a denial of service (system crash) via network traffic that improperly interacts with the WLAN_STA_PS_STA state (aka power-save mode), related to sta_info.c and tx.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2706.html">CVE-2014-2706</cve>
<bugzilla href="https://bugzilla.suse.com/871797">SUSE bug 871797</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208673" comment="iscsitarget-kmp-bigsmp-1.4.20_3.0.101_0.40-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204510" comment="kernel-default-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204511" comment="kernel-default-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204512" comment="kernel-default-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204518" comment="kernel-source-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204519" comment="kernel-syms-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208596" comment="kernel-trace-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208597" comment="kernel-trace-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204520" comment="kernel-trace-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208676" comment="ofed-kmp-bigsmp-1.5.4.1_3.0.101_0.40-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208677" comment="oracleasm-kmp-bigsmp-2.0.5_3.0.101_0.40-7.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-2830" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2830" source="CVE"/>
    <description>
    Stack-based buffer overflow in cifskey.c or cifscreds.c in cifs-utils before 6.4, as used in pam_cifscreds, allows remote attackers to have unspecified impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2830.html">CVE-2014-2830</cve>
<bugzilla href="https://bugzilla.suse.com/870168">SUSE bug 870168</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249920" comment="cifs-utils-5.1-0.13 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2851</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-2851" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2851" source="CVE"/>
    <description>
    Integer overflow in the ping_init_sock function in net/ipv4/ping.c in the Linux kernel through 3.14.1 allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that leverages an improperly managed reference counter.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2851.html">CVE-2014-2851</cve>
<bugzilla href="https://bugzilla.suse.com/824295">SUSE bug 824295</bugzilla>
<bugzilla href="https://bugzilla.suse.com/873374">SUSE bug 873374</bugzilla>
<bugzilla href="https://bugzilla.suse.com/889071">SUSE bug 889071</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213024" comment="kernel-default-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213025" comment="kernel-default-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213026" comment="kernel-default-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213028" comment="kernel-source-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213029" comment="kernel-syms-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213088" comment="kernel-trace-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213089" comment="kernel-trace-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213030" comment="kernel-trace-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2891</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-2891" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2891" source="CVE"/>
    <description>
    strongSwan before 5.1.2 allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon crash) via a crafted ID_DER_ASN1_DN ID payload.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2891.html">CVE-2014-2891</cve>
<bugzilla href="https://bugzilla.suse.com/876449">SUSE bug 876449</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200449" comment="strongswan-4.4.0-6.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200450" comment="strongswan-doc-4.4.0-6.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2894</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-2894" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2894" source="CVE"/>
    <description>
    Off-by-one error in the cmd_smart function in the smart self test in hw/ide/core.c in QEMU before 2.0 allows local users to have unspecified impact via a SMART EXECUTE OFFLINE command that triggers a buffer underflow and memory corruption.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2894.html">CVE-2014-2894</cve>
<bugzilla href="https://bugzilla.suse.com/874749">SUSE bug 874749</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214909" comment="kvm-1.4.2-0.15 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2913</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-2913" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2913" source="CVE"/>
    <description>
    ** DISPUTED ** Incomplete blacklist vulnerability in nrpe.c in Nagios Remote Plugin Executor (NRPE) 2.15 and earlier allows remote attackers to execute arbitrary commands via a newline character in the -a option to libexec/check_nrpe.  NOTE: this issue is disputed by multiple parties. It has been reported that the vendor allows newlines as "expected behavior." Also, this issue can only occur when the administrator enables the "dont_blame_nrpe" option in nrpe.conf despite the "HIGH security risk" warning within the comments.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2913.html">CVE-2014-2913</cve>
<bugzilla href="https://bugzilla.suse.com/874743">SUSE bug 874743</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200368" comment="nagios-nrpe-2.12-24.4.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200369" comment="nagios-nrpe-doc-2.12-24.4.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200370" comment="nagios-plugins-nrpe-2.12-24.4.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3065</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3065" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3065" source="CVE"/>
    <description>
    Unspecified vulnerability in IBM Java Runtime Environment (JRE) 7 R1 before SR2 (7.1.2.0), 7 before SR8 (7.0.8.0), 6 R1 before SR8 FP2 (6.1.8.2), 6 before SR16 FP2 (6.0.16.2), and before SR16 FP8 (5.0.16.8) allows local users to execute arbitrary code via vectors related to the shared classes cache.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3065.html">CVE-2014-3065</cve>
<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
<bugzilla href="https://bugzilla.suse.com/930365">SUSE bug 930365</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201722" comment="java-1_6_0-ibm-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201724" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208544" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208552" comment="java-1_7_0-ibm-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208554" comment="java-1_7_0-ibm-jdbc-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201722" comment="java-1_6_0-ibm-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201724" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208544" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208552" comment="java-1_7_0-ibm-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208554" comment="java-1_7_0-ibm-jdbc-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3122</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3122" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3122" source="CVE"/>
    <description>
    The try_to_unmap_cluster function in mm/rmap.c in the Linux kernel before 3.14.3 does not properly consider which pages must be locked, which allows local users to cause a denial of service (system crash) by triggering a memory-usage pattern that requires removal of page-table mappings.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3122.html">CVE-2014-3122</cve>
<bugzilla href="https://bugzilla.suse.com/824295">SUSE bug 824295</bugzilla>
<bugzilla href="https://bugzilla.suse.com/876102">SUSE bug 876102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/889071">SUSE bug 889071</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213024" comment="kernel-default-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213025" comment="kernel-default-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213026" comment="kernel-default-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213028" comment="kernel-source-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213029" comment="kernel-syms-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213088" comment="kernel-trace-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213089" comment="kernel-trace-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213030" comment="kernel-trace-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3144</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3144" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3144" source="CVE"/>
    <description>
    The (1) BPF_S_ANC_NLATTR and (2) BPF_S_ANC_NLATTR_NEST extension implementations in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 do not check whether a certain length value is sufficiently large, which allows local users to cause a denial of service (integer underflow and system crash) via crafted BPF instructions.  NOTE: the affected code was moved to the __skb_get_nlattr and __skb_get_nlattr_nest functions before the vulnerability was announced.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3144.html">CVE-2014-3144</cve>
<bugzilla href="https://bugzilla.suse.com/824295">SUSE bug 824295</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877257">SUSE bug 877257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/889071">SUSE bug 889071</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213024" comment="kernel-default-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213025" comment="kernel-default-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213026" comment="kernel-default-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213028" comment="kernel-source-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213029" comment="kernel-syms-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213088" comment="kernel-trace-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213089" comment="kernel-trace-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213030" comment="kernel-trace-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3145</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3145" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3145" source="CVE"/>
    <description>
    The BPF_S_ANC_NLATTR_NEST extension implementation in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 uses the reverse order in a certain subtraction, which allows local users to cause a denial of service (over-read and system crash) via crafted BPF instructions.  NOTE: the affected code was moved to the __skb_get_nlattr_nest function before the vulnerability was announced.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3145.html">CVE-2014-3145</cve>
<bugzilla href="https://bugzilla.suse.com/824295">SUSE bug 824295</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877257">SUSE bug 877257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/889071">SUSE bug 889071</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213024" comment="kernel-default-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213025" comment="kernel-default-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213026" comment="kernel-default-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213028" comment="kernel-source-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213029" comment="kernel-syms-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213088" comment="kernel-trace-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213089" comment="kernel-trace-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213030" comment="kernel-trace-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3146" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3146" source="CVE"/>
    <description>
    Incomplete blacklist vulnerability in the lxml.html.clean module in lxml before 3.3.5 allows remote attackers to conduct cross-site scripting (XSS) attacks via control characters in the link scheme to the clean_html function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3146.html">CVE-2014-3146</cve>
<bugzilla href="https://bugzilla.suse.com/1118088">SUSE bug 1118088</bugzilla>
<bugzilla href="https://bugzilla.suse.com/877258">SUSE bug 877258</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200426" comment="python-lxml-2.3.6-0.13 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3153</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3153" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153" source="CVE"/>
    <description>
    The futex_requeue function in kernel/futex.c in the Linux kernel through 3.14.5 does not ensure that calls have two different futex addresses, which allows local users to gain privileges via a crafted FUTEX_REQUEUE command that facilitates unsafe waiter modification.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3153.html">CVE-2014-3153</cve>
<bugzilla href="https://bugzilla.suse.com/877775">SUSE bug 877775</bugzilla>
<bugzilla href="https://bugzilla.suse.com/880892">SUSE bug 880892</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204510" comment="kernel-default-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204511" comment="kernel-default-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204512" comment="kernel-default-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204518" comment="kernel-source-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204519" comment="kernel-syms-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208596" comment="kernel-trace-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208597" comment="kernel-trace-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204520" comment="kernel-trace-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3158</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3158" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3158" source="CVE"/>
    <description>
    Integer overflow in the getword function in options.c in pppd in Paul's PPP Package (ppp) before 2.4.7 allows attackers to "access privileged options" via a long word in an options file, which triggers a heap-based buffer overflow that "[corrupts] security-relevant variables."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3158.html">CVE-2014-3158</cve>
<bugzilla href="https://bugzilla.suse.com/891489">SUSE bug 891489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/969773">SUSE bug 969773</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200412" comment="ppp-2.4.5.git-2.29 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3181</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3181" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3181" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in the magicmouse_raw_event function in drivers/hid/hid-magicmouse.c in the Magic Mouse HID driver in the Linux kernel through 3.16.3 allow physically proximate attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a crafted device that provides a large amount of (1) EHCI or (2) XHCI data associated with an event.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3181.html">CVE-2014-3181</cve>
<bugzilla href="https://bugzilla.suse.com/896382">SUSE bug 896382</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213307" comment="kernel-bigsmp-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213308" comment="kernel-bigsmp-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213244" comment="kernel-bigsmp-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213245" comment="kernel-default-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213246" comment="kernel-default-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213247" comment="kernel-default-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264361" comment="kernel-default-man-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213309" comment="kernel-ec2-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213310" comment="kernel-ec2-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213311" comment="kernel-ec2-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264348" comment="kernel-pae-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264349" comment="kernel-pae-base-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264350" comment="kernel-pae-devel-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264362" comment="kernel-ppc64-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264363" comment="kernel-ppc64-base-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264364" comment="kernel-ppc64-devel-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213249" comment="kernel-source-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213250" comment="kernel-syms-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213312" comment="kernel-trace-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213313" comment="kernel-trace-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213251" comment="kernel-trace-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213252" comment="kernel-xen-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213253" comment="kernel-xen-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213254" comment="kernel-xen-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213256" comment="xen-kmp-default-4.2.5_02_3.0.101_0.46-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264352" comment="xen-kmp-pae-4.2.5_02_3.0.101_0.42-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3184</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3184" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3184" source="CVE"/>
    <description>
    The report_fixup functions in the HID subsystem in the Linux kernel before 3.16.2 might allow physically proximate attackers to cause a denial of service (out-of-bounds write) via a crafted device that provides a small report descriptor, related to (1) drivers/hid/hid-cherry.c, (2) drivers/hid/hid-kye.c, (3) drivers/hid/hid-lg.c, (4) drivers/hid/hid-monterey.c, (5) drivers/hid/hid-petalynx.c, and (6) drivers/hid/hid-sunplus.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3184.html">CVE-2014-3184</cve>
<bugzilla href="https://bugzilla.suse.com/896390">SUSE bug 896390</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213307" comment="kernel-bigsmp-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213308" comment="kernel-bigsmp-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213244" comment="kernel-bigsmp-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213245" comment="kernel-default-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213246" comment="kernel-default-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213247" comment="kernel-default-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264361" comment="kernel-default-man-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213309" comment="kernel-ec2-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213310" comment="kernel-ec2-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213311" comment="kernel-ec2-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264348" comment="kernel-pae-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264349" comment="kernel-pae-base-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264350" comment="kernel-pae-devel-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264362" comment="kernel-ppc64-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264363" comment="kernel-ppc64-base-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264364" comment="kernel-ppc64-devel-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213249" comment="kernel-source-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213250" comment="kernel-syms-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213312" comment="kernel-trace-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213313" comment="kernel-trace-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213251" comment="kernel-trace-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213252" comment="kernel-xen-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213253" comment="kernel-xen-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213254" comment="kernel-xen-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213256" comment="xen-kmp-default-4.2.5_02_3.0.101_0.46-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264352" comment="xen-kmp-pae-4.2.5_02_3.0.101_0.42-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3185</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3185" source="CVE"/>
    <description>
    Multiple buffer overflows in the command_port_read_callback function in drivers/usb/serial/whiteheat.c in the Whiteheat USB Serial Driver in the Linux kernel before 3.16.2 allow physically proximate attackers to execute arbitrary code or cause a denial of service (memory corruption and system crash) via a crafted device that provides a large amount of (1) EHCI or (2) XHCI data associated with a bulk response.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3185.html">CVE-2014-3185</cve>
<bugzilla href="https://bugzilla.suse.com/896391">SUSE bug 896391</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213307" comment="kernel-bigsmp-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213308" comment="kernel-bigsmp-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213244" comment="kernel-bigsmp-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213245" comment="kernel-default-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213246" comment="kernel-default-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213247" comment="kernel-default-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264361" comment="kernel-default-man-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213309" comment="kernel-ec2-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213310" comment="kernel-ec2-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213311" comment="kernel-ec2-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264348" comment="kernel-pae-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264349" comment="kernel-pae-base-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264350" comment="kernel-pae-devel-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264362" comment="kernel-ppc64-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264363" comment="kernel-ppc64-base-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264364" comment="kernel-ppc64-devel-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213249" comment="kernel-source-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213250" comment="kernel-syms-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213312" comment="kernel-trace-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213313" comment="kernel-trace-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213251" comment="kernel-trace-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213252" comment="kernel-xen-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213253" comment="kernel-xen-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213254" comment="kernel-xen-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213256" comment="xen-kmp-default-4.2.5_02_3.0.101_0.46-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264352" comment="xen-kmp-pae-4.2.5_02_3.0.101_0.42-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3186</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3186" source="CVE"/>
    <description>
    Buffer overflow in the picolcd_raw_event function in devices/hid/hid-picolcd_core.c in the PicoLCD HID device driver in the Linux kernel through 3.16.3, as used in Android on Nexus 7 devices, allows physically proximate attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a crafted device that sends a large report.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3186.html">CVE-2014-3186</cve>
<bugzilla href="https://bugzilla.suse.com/896392">SUSE bug 896392</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213307" comment="kernel-bigsmp-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213308" comment="kernel-bigsmp-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213244" comment="kernel-bigsmp-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213245" comment="kernel-default-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213246" comment="kernel-default-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213247" comment="kernel-default-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264361" comment="kernel-default-man-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213309" comment="kernel-ec2-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213310" comment="kernel-ec2-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213311" comment="kernel-ec2-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264348" comment="kernel-pae-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264349" comment="kernel-pae-base-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264350" comment="kernel-pae-devel-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264362" comment="kernel-ppc64-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264363" comment="kernel-ppc64-base-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264364" comment="kernel-ppc64-devel-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213249" comment="kernel-source-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213250" comment="kernel-syms-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213312" comment="kernel-trace-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213313" comment="kernel-trace-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213251" comment="kernel-trace-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213252" comment="kernel-xen-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213253" comment="kernel-xen-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213254" comment="kernel-xen-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213256" comment="xen-kmp-default-4.2.5_02_3.0.101_0.46-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264352" comment="xen-kmp-pae-4.2.5_02_3.0.101_0.42-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3215</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3215" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3215" source="CVE"/>
    <description>
    seunshare in policycoreutils 2.2.5 is owned by root with 4755 permissions, and executes programs in a way that changes the relationship between the setuid system call and the getresuid saved set-user-ID value, which makes it easier for local users to gain privileges by leveraging a program that mistakenly expected that it could permanently drop privileges.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3215.html">CVE-2014-3215</cve>
<bugzilla href="https://bugzilla.suse.com/876832">SUSE bug 876832</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202818" comment="libcap-ng-0.6.3-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209894" comment="libcap-ng-utils-0.6.3-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209895" comment="libcap-ng0-0.6.3-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209896" comment="libcap-ng0-32bit-0.6.3-1.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3248</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3248" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3248" source="CVE"/>
    <description>
    Untrusted search path vulnerability in Puppet Enterprise 2.8 before 2.8.7, Puppet before 2.7.26 and 3.x before 3.6.2, Facter 1.6.x and 2.x before 2.0.2, Hiera before 1.3.4, and Mcollective before 2.5.2, when running with Ruby 1.9.1 or earlier, allows local users to gain privileges via a Trojan horse file in the current working directory, as demonstrated using (1) rubygems/defaults/operating_system.rb, (2) Win32API.rb, (3) Win32API.so, (4) safe_yaml.rb, (5) safe_yaml/deep.rb, or (6) safe_yaml/deep.so; or (7) operatingsystem.rb, (8) operatingsystem.so, (9) osfamily.rb, or (10) osfamily.so in puppet/confine.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3248.html">CVE-2014-3248</cve>
<bugzilla href="https://bugzilla.suse.com/879913">SUSE bug 879913</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204768" comment="puppet-2.6.18-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208953" comment="puppet-server-2.6.18-0.16 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3250</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3250" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3250" source="CVE"/>
    <description>
    The default vhost configuration file in Puppet before 3.6.2 does not include the SSLCARevocationCheck directive, which might allow remote attackers to obtain sensitive information via a revoked certificate when a Puppet master runs with Apache 2.4.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3250.html">CVE-2014-3250</cve>
<bugzilla href="https://bugzilla.suse.com/879913">SUSE bug 879913</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204768" comment="puppet-2.6.18-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208953" comment="puppet-server-2.6.18-0.16 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3421</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3421" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3421" source="CVE"/>
    <description>
    lisp/gnus/gnus-fun.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on the /tmp/gnus.face.ppm temporary file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3421.html">CVE-2014-3421</cve>
<bugzilla href="https://bugzilla.suse.com/876847">SUSE bug 876847</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200001" comment="emacs-22.3-4.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200002" comment="emacs-el-22.3-4.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200003" comment="emacs-info-22.3-4.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200004" comment="emacs-nox-22.3-4.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200005" comment="emacs-x11-22.3-4.42 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3422" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3422" source="CVE"/>
    <description>
    lisp/emacs-lisp/find-gc.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on a temporary file under /tmp/esrc/.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3422.html">CVE-2014-3422</cve>
<bugzilla href="https://bugzilla.suse.com/876847">SUSE bug 876847</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200001" comment="emacs-22.3-4.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200002" comment="emacs-el-22.3-4.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200003" comment="emacs-info-22.3-4.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200004" comment="emacs-nox-22.3-4.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200005" comment="emacs-x11-22.3-4.42 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3423" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3423" source="CVE"/>
    <description>
    lisp/net/browse-url.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on a /tmp/Mosaic.##### temporary file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3423.html">CVE-2014-3423</cve>
<bugzilla href="https://bugzilla.suse.com/876847">SUSE bug 876847</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200001" comment="emacs-22.3-4.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200002" comment="emacs-el-22.3-4.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200003" comment="emacs-info-22.3-4.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200004" comment="emacs-nox-22.3-4.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200005" comment="emacs-x11-22.3-4.42 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3424</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3424" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3424" source="CVE"/>
    <description>
    lisp/net/tramp-sh.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on a /tmp/tramp.##### temporary file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3424.html">CVE-2014-3424</cve>
<bugzilla href="https://bugzilla.suse.com/876847">SUSE bug 876847</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200001" comment="emacs-22.3-4.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200002" comment="emacs-el-22.3-4.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200003" comment="emacs-info-22.3-4.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200004" comment="emacs-nox-22.3-4.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200005" comment="emacs-x11-22.3-4.42 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3461</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3461" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3461" source="CVE"/>
    <description>
    hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to "USB post load checks."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3461.html">CVE-2014-3461</cve>
<bugzilla href="https://bugzilla.suse.com/878541">SUSE bug 878541</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204576" comment="kvm-1.4.2-0.17 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3466</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3466" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3466" source="CVE"/>
    <description>
    Buffer overflow in the read_server_hello function in lib/gnutls_handshake.c in GnuTLS before 3.1.25, 3.2.x before 3.2.15, and 3.3.x before 3.3.4 allows remote servers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a long session id in a ServerHello message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3466.html">CVE-2014-3466</cve>
<bugzilla href="https://bugzilla.suse.com/880730">SUSE bug 880730</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204423" comment="gnutls-2.4.1-24.39.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201698" comment="libgnutls-extra26-2.4.1-24.39.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204424" comment="libgnutls26-2.4.1-24.39.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204425" comment="libgnutls26-32bit-2.4.1-24.39.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208526" comment="libgnutls26-x86-2.4.1-24.39.51 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204423" comment="gnutls-2.4.1-24.39.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201698" comment="libgnutls-extra26-2.4.1-24.39.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204424" comment="libgnutls26-2.4.1-24.39.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204425" comment="libgnutls26-32bit-2.4.1-24.39.51 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3467</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3467" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the DER decoder in GNU Libtasn1 before 3.6, as used in GnuTLS, allow remote attackers to cause a denial of service (out-of-bounds read) via crafted ASN.1 data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3467.html">CVE-2014-3467</cve>
<bugzilla href="https://bugzilla.suse.com/880737">SUSE bug 880737</bugzilla>
<bugzilla href="https://bugzilla.suse.com/880910">SUSE bug 880910</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204656" comment="libtasn1-1.5-1.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204657" comment="libtasn1-3-1.5-1.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204658" comment="libtasn1-3-32bit-1.5-1.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208758" comment="libtasn1-3-x86-1.5-1.28 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204656" comment="libtasn1-1.5-1.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204657" comment="libtasn1-3-1.5-1.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204658" comment="libtasn1-3-32bit-1.5-1.28 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3468</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3468" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468" source="CVE"/>
    <description>
    The asn1_get_bit_der function in GNU Libtasn1 before 3.6 does not properly report an error when a negative bit length is identified, which allows context-dependent attackers to cause out-of-bounds access via crafted ASN.1 data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3468.html">CVE-2014-3468</cve>
<bugzilla href="https://bugzilla.suse.com/880735">SUSE bug 880735</bugzilla>
<bugzilla href="https://bugzilla.suse.com/880910">SUSE bug 880910</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204656" comment="libtasn1-1.5-1.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204657" comment="libtasn1-3-1.5-1.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204658" comment="libtasn1-3-32bit-1.5-1.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208758" comment="libtasn1-3-x86-1.5-1.28 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204656" comment="libtasn1-1.5-1.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204657" comment="libtasn1-3-1.5-1.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204658" comment="libtasn1-3-32bit-1.5-1.28 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3469</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3469" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469" source="CVE"/>
    <description>
    The (1) asn1_read_value_type and (2) asn1_read_value functions in GNU Libtasn1 before 3.6 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via a NULL value in an ivalue argument.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3469.html">CVE-2014-3469</cve>
<bugzilla href="https://bugzilla.suse.com/880738">SUSE bug 880738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/880910">SUSE bug 880910</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204656" comment="libtasn1-1.5-1.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204657" comment="libtasn1-3-1.5-1.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204658" comment="libtasn1-3-32bit-1.5-1.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208758" comment="libtasn1-3-x86-1.5-1.28 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204656" comment="libtasn1-1.5-1.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204657" comment="libtasn1-3-1.5-1.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204658" comment="libtasn1-3-32bit-1.5-1.28 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3470</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3470" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3470" source="CVE"/>
    <description>
    The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h, when an anonymous ECDH cipher suite is used, allows remote attackers to cause a denial of service (NULL pointer dereference and client crash) by triggering a NULL certificate value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3470.html">CVE-2014-3470</cve>
<bugzilla href="https://bugzilla.suse.com/880891">SUSE bug 880891</bugzilla>
<bugzilla href="https://bugzilla.suse.com/883126">SUSE bug 883126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/885777">SUSE bug 885777</bugzilla>
<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214898" comment="libopenssl0_9_8-0.9.8j-0.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204623" comment="libopenssl0_9_8-32bit-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214900" comment="libopenssl0_9_8-hmac-0.9.8j-0.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208745" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208746" comment="libopenssl0_9_8-x86-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214902" comment="openssl-0.9.8j-0.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214903" comment="openssl-doc-0.9.8j-0.58 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214898" comment="libopenssl0_9_8-0.9.8j-0.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214899" comment="libopenssl0_9_8-32bit-0.9.8j-0.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214900" comment="libopenssl0_9_8-hmac-0.9.8j-0.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214901" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214902" comment="openssl-0.9.8j-0.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214903" comment="openssl-doc-0.9.8j-0.58 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3477</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3477" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3477" source="CVE"/>
    <description>
    The dbus-daemon in D-Bus 1.2.x through 1.4.x, 1.6.x before 1.6.20, and 1.8.x before 1.8.4, sends an AccessDenied error to the service instead of a client when the client is prohibited from accessing the service, which allows local users to cause a denial of service (initialization failure and exit) or possibly conduct a side-channel attack via a D-Bus message to an inactive service.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3477.html">CVE-2014-3477</cve>
<bugzilla href="https://bugzilla.suse.com/1010769">SUSE bug 1010769</bugzilla>
<bugzilla href="https://bugzilla.suse.com/881137">SUSE bug 881137</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215269" comment="dbus-1-1.2.10-3.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199976" comment="dbus-1-32bit-1.2.10-3.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215271" comment="dbus-1-x11-1.2.10-3.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199978" comment="dbus-1-x86-1.2.10-3.31 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215269" comment="dbus-1-1.2.10-3.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215270" comment="dbus-1-32bit-1.2.10-3.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215271" comment="dbus-1-x11-1.2.10-3.29 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3478</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3478" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3478" source="CVE"/>
    <description>
    Buffer overflow in the mconvert function in softmagic.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, allows remote attackers to cause a denial of service (application crash) via a crafted Pascal string in a FILE_PSTRING conversion.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3478.html">CVE-2014-3478</cve>
<bugzilla href="https://bugzilla.suse.com/884987">SUSE bug 884987</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215010" comment="apache2-mod_php53-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215011" comment="php53-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215012" comment="php53-bcmath-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215013" comment="php53-bz2-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215014" comment="php53-calendar-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215015" comment="php53-ctype-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215016" comment="php53-curl-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215017" comment="php53-dba-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215018" comment="php53-dom-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215019" comment="php53-exif-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215020" comment="php53-fastcgi-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215021" comment="php53-fileinfo-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215022" comment="php53-ftp-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215023" comment="php53-gd-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215024" comment="php53-gettext-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215025" comment="php53-gmp-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215026" comment="php53-iconv-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215027" comment="php53-intl-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215028" comment="php53-json-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215029" comment="php53-ldap-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215030" comment="php53-mbstring-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215031" comment="php53-mcrypt-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215032" comment="php53-mysql-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215033" comment="php53-odbc-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215034" comment="php53-openssl-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215035" comment="php53-pcntl-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215036" comment="php53-pdo-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215037" comment="php53-pear-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215038" comment="php53-pgsql-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215039" comment="php53-pspell-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215040" comment="php53-shmop-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215041" comment="php53-snmp-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215042" comment="php53-soap-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215043" comment="php53-suhosin-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215044" comment="php53-sysvmsg-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215045" comment="php53-sysvsem-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215046" comment="php53-sysvshm-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215047" comment="php53-tokenizer-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215048" comment="php53-wddx-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215049" comment="php53-xmlreader-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215050" comment="php53-xmlrpc-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215051" comment="php53-xmlwriter-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215052" comment="php53-xsl-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215053" comment="php53-zip-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215054" comment="php53-zlib-5.3.17-0.27 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3479</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3479" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3479" source="CVE"/>
    <description>
    The cdf_check_stream_offset function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, relies on incorrect sector-size data, which allows remote attackers to cause a denial of service (application crash) via a crafted stream offset in a CDF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3479.html">CVE-2014-3479</cve>
<bugzilla href="https://bugzilla.suse.com/884989">SUSE bug 884989</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215010" comment="apache2-mod_php53-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215011" comment="php53-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215012" comment="php53-bcmath-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215013" comment="php53-bz2-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215014" comment="php53-calendar-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215015" comment="php53-ctype-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215016" comment="php53-curl-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215017" comment="php53-dba-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215018" comment="php53-dom-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215019" comment="php53-exif-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215020" comment="php53-fastcgi-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215021" comment="php53-fileinfo-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215022" comment="php53-ftp-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215023" comment="php53-gd-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215024" comment="php53-gettext-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215025" comment="php53-gmp-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215026" comment="php53-iconv-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215027" comment="php53-intl-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215028" comment="php53-json-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215029" comment="php53-ldap-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215030" comment="php53-mbstring-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215031" comment="php53-mcrypt-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215032" comment="php53-mysql-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215033" comment="php53-odbc-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215034" comment="php53-openssl-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215035" comment="php53-pcntl-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215036" comment="php53-pdo-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215037" comment="php53-pear-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215038" comment="php53-pgsql-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215039" comment="php53-pspell-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215040" comment="php53-shmop-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215041" comment="php53-snmp-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215042" comment="php53-soap-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215043" comment="php53-suhosin-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215044" comment="php53-sysvmsg-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215045" comment="php53-sysvsem-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215046" comment="php53-sysvshm-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215047" comment="php53-tokenizer-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215048" comment="php53-wddx-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215049" comment="php53-xmlreader-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215050" comment="php53-xmlrpc-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215051" comment="php53-xmlwriter-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215052" comment="php53-xsl-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215053" comment="php53-zip-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215054" comment="php53-zlib-5.3.17-0.27 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3480</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3480" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3480" source="CVE"/>
    <description>
    The cdf_count_chain function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, does not properly validate sector-count data, which allows remote attackers to cause a denial of service (application crash) via a crafted CDF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3480.html">CVE-2014-3480</cve>
<bugzilla href="https://bugzilla.suse.com/884990">SUSE bug 884990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215010" comment="apache2-mod_php53-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215011" comment="php53-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215012" comment="php53-bcmath-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215013" comment="php53-bz2-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215014" comment="php53-calendar-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215015" comment="php53-ctype-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215016" comment="php53-curl-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215017" comment="php53-dba-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215018" comment="php53-dom-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215019" comment="php53-exif-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215020" comment="php53-fastcgi-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215021" comment="php53-fileinfo-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215022" comment="php53-ftp-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215023" comment="php53-gd-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215024" comment="php53-gettext-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215025" comment="php53-gmp-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215026" comment="php53-iconv-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215027" comment="php53-intl-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215028" comment="php53-json-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215029" comment="php53-ldap-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215030" comment="php53-mbstring-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215031" comment="php53-mcrypt-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215032" comment="php53-mysql-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215033" comment="php53-odbc-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215034" comment="php53-openssl-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215035" comment="php53-pcntl-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215036" comment="php53-pdo-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215037" comment="php53-pear-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215038" comment="php53-pgsql-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215039" comment="php53-pspell-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215040" comment="php53-shmop-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215041" comment="php53-snmp-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215042" comment="php53-soap-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215043" comment="php53-suhosin-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215044" comment="php53-sysvmsg-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215045" comment="php53-sysvsem-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215046" comment="php53-sysvshm-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215047" comment="php53-tokenizer-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215048" comment="php53-wddx-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215049" comment="php53-xmlreader-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215050" comment="php53-xmlrpc-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215051" comment="php53-xmlwriter-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215052" comment="php53-xsl-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215053" comment="php53-zip-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215054" comment="php53-zlib-5.3.17-0.27 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3487</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3487" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3487" source="CVE"/>
    <description>
    The cdf_read_property_info function in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, does not properly validate a stream offset, which allows remote attackers to cause a denial of service (application crash) via a crafted CDF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3487.html">CVE-2014-3487</cve>
<bugzilla href="https://bugzilla.suse.com/884991">SUSE bug 884991</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215010" comment="apache2-mod_php53-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215011" comment="php53-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215012" comment="php53-bcmath-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215013" comment="php53-bz2-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215014" comment="php53-calendar-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215015" comment="php53-ctype-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215016" comment="php53-curl-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215017" comment="php53-dba-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215018" comment="php53-dom-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215019" comment="php53-exif-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215020" comment="php53-fastcgi-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215021" comment="php53-fileinfo-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215022" comment="php53-ftp-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215023" comment="php53-gd-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215024" comment="php53-gettext-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215025" comment="php53-gmp-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215026" comment="php53-iconv-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215027" comment="php53-intl-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215028" comment="php53-json-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215029" comment="php53-ldap-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215030" comment="php53-mbstring-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215031" comment="php53-mcrypt-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215032" comment="php53-mysql-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215033" comment="php53-odbc-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215034" comment="php53-openssl-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215035" comment="php53-pcntl-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215036" comment="php53-pdo-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215037" comment="php53-pear-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215038" comment="php53-pgsql-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215039" comment="php53-pspell-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215040" comment="php53-shmop-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215041" comment="php53-snmp-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215042" comment="php53-soap-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215043" comment="php53-suhosin-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215044" comment="php53-sysvmsg-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215045" comment="php53-sysvsem-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215046" comment="php53-sysvshm-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215047" comment="php53-tokenizer-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215048" comment="php53-wddx-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215049" comment="php53-xmlreader-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215050" comment="php53-xmlrpc-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215051" comment="php53-xmlwriter-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215052" comment="php53-xsl-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215053" comment="php53-zip-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215054" comment="php53-zlib-5.3.17-0.27 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3493</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3493" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3493" source="CVE"/>
    <description>
    The push_ascii function in smbd in Samba 3.6.x before 3.6.24, 4.0.x before 4.0.19, and 4.1.x before 4.1.9 allows remote authenticated users to cause a denial of service (memory corruption and daemon crash) via an attempt to read a Unicode pathname without specifying use of Unicode, leading to a character-set conversion failure that triggers an invalid pointer dereference.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3493.html">CVE-2014-3493</cve>
<bugzilla href="https://bugzilla.suse.com/878642">SUSE bug 878642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/880962">SUSE bug 880962</bugzilla>
<bugzilla href="https://bugzilla.suse.com/883758">SUSE bug 883758</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208443" comment="ldapsmb-1.34b-12.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204232" comment="libldb1-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204234" comment="libsmbclient0-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204235" comment="libsmbclient0-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204236" comment="libtalloc2-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204237" comment="libtalloc2-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204238" comment="libtdb1-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204239" comment="libtdb1-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204240" comment="libtevent0-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204241" comment="libtevent0-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204242" comment="libwbclient0-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204243" comment="libwbclient0-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204244" comment="samba-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204245" comment="samba-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204246" comment="samba-client-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204247" comment="samba-client-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204248" comment="samba-doc-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204249" comment="samba-krb-printing-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204250" comment="samba-winbind-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204251" comment="samba-winbind-32bit-3.6.3-0.52 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208443" comment="ldapsmb-1.34b-12.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204232" comment="libldb1-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204234" comment="libsmbclient0-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204235" comment="libsmbclient0-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208444" comment="libsmbclient0-x86-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204236" comment="libtalloc2-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204237" comment="libtalloc2-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208445" comment="libtalloc2-x86-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204238" comment="libtdb1-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204239" comment="libtdb1-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208446" comment="libtdb1-x86-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204240" comment="libtevent0-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204241" comment="libtevent0-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204242" comment="libwbclient0-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204243" comment="libwbclient0-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208447" comment="libwbclient0-x86-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204244" comment="samba-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204245" comment="samba-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204246" comment="samba-client-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204247" comment="samba-client-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208448" comment="samba-client-x86-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204248" comment="samba-doc-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204249" comment="samba-krb-printing-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204250" comment="samba-winbind-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204251" comment="samba-winbind-32bit-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208449" comment="samba-winbind-x86-3.6.3-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208450" comment="samba-x86-3.6.3-0.52 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3505" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3505" source="CVE"/>
    <description>
    Double free vulnerability in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (application crash) via crafted DTLS packets that trigger an error condition.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3505.html">CVE-2014-3505</cve>
<bugzilla href="https://bugzilla.suse.com/890759">SUSE bug 890759</bugzilla>
<bugzilla href="https://bugzilla.suse.com/890764">SUSE bug 890764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/890767">SUSE bug 890767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215274" comment="libopenssl0_9_8-0.9.8j-0.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204623" comment="libopenssl0_9_8-32bit-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215277" comment="libopenssl0_9_8-hmac-0.9.8j-0.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208745" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208746" comment="libopenssl0_9_8-x86-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215276" comment="openssl-0.9.8j-0.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215279" comment="openssl-doc-0.9.8j-0.62 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215274" comment="libopenssl0_9_8-0.9.8j-0.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215275" comment="libopenssl0_9_8-32bit-0.9.8j-0.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215277" comment="libopenssl0_9_8-hmac-0.9.8j-0.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215278" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215276" comment="openssl-0.9.8j-0.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215279" comment="openssl-doc-0.9.8j-0.62 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3506</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3506" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3506" source="CVE"/>
    <description>
    d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via crafted DTLS handshake messages that trigger memory allocations corresponding to large length values.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3506.html">CVE-2014-3506</cve>
<bugzilla href="https://bugzilla.suse.com/890759">SUSE bug 890759</bugzilla>
<bugzilla href="https://bugzilla.suse.com/890764">SUSE bug 890764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/890768">SUSE bug 890768</bugzilla>
<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215274" comment="libopenssl0_9_8-0.9.8j-0.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204623" comment="libopenssl0_9_8-32bit-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215277" comment="libopenssl0_9_8-hmac-0.9.8j-0.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208745" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208746" comment="libopenssl0_9_8-x86-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215276" comment="openssl-0.9.8j-0.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215279" comment="openssl-doc-0.9.8j-0.62 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215274" comment="libopenssl0_9_8-0.9.8j-0.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215275" comment="libopenssl0_9_8-32bit-0.9.8j-0.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215277" comment="libopenssl0_9_8-hmac-0.9.8j-0.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215278" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215276" comment="openssl-0.9.8j-0.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215279" comment="openssl-doc-0.9.8j-0.62 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3507</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3507" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3507" source="CVE"/>
    <description>
    Memory leak in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via zero-length DTLS fragments that trigger improper handling of the return value of a certain insert function.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3507.html">CVE-2014-3507</cve>
<bugzilla href="https://bugzilla.suse.com/890759">SUSE bug 890759</bugzilla>
<bugzilla href="https://bugzilla.suse.com/890764">SUSE bug 890764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/890769">SUSE bug 890769</bugzilla>
<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215274" comment="libopenssl0_9_8-0.9.8j-0.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204623" comment="libopenssl0_9_8-32bit-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215277" comment="libopenssl0_9_8-hmac-0.9.8j-0.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208745" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208746" comment="libopenssl0_9_8-x86-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215276" comment="openssl-0.9.8j-0.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215279" comment="openssl-doc-0.9.8j-0.62 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215274" comment="libopenssl0_9_8-0.9.8j-0.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215275" comment="libopenssl0_9_8-32bit-0.9.8j-0.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215277" comment="libopenssl0_9_8-hmac-0.9.8j-0.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215278" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215276" comment="openssl-0.9.8j-0.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215279" comment="openssl-doc-0.9.8j-0.62 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3508</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3508" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3508" source="CVE"/>
    <description>
    The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, when pretty printing is used, does not ensure the presence of '\0' characters, which allows context-dependent attackers to obtain sensitive information from process stack memory by reading output from X509_name_oneline, X509_name_print_ex, and unspecified other functions.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3508.html">CVE-2014-3508</cve>
<bugzilla href="https://bugzilla.suse.com/890759">SUSE bug 890759</bugzilla>
<bugzilla href="https://bugzilla.suse.com/890764">SUSE bug 890764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/950708">SUSE bug 950708</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215274" comment="libopenssl0_9_8-0.9.8j-0.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204623" comment="libopenssl0_9_8-32bit-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215277" comment="libopenssl0_9_8-hmac-0.9.8j-0.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208745" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208746" comment="libopenssl0_9_8-x86-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215276" comment="openssl-0.9.8j-0.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215279" comment="openssl-doc-0.9.8j-0.62 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215274" comment="libopenssl0_9_8-0.9.8j-0.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215275" comment="libopenssl0_9_8-32bit-0.9.8j-0.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215277" comment="libopenssl0_9_8-hmac-0.9.8j-0.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215278" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215276" comment="openssl-0.9.8j-0.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215279" comment="openssl-doc-0.9.8j-0.62 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3510</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3510" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3510" source="CVE"/>
    <description>
    The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote DTLS servers to cause a denial of service (NULL pointer dereference and client application crash) via a crafted handshake message in conjunction with a (1) anonymous DH or (2) anonymous ECDH ciphersuite.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3510.html">CVE-2014-3510</cve>
<bugzilla href="https://bugzilla.suse.com/890759">SUSE bug 890759</bugzilla>
<bugzilla href="https://bugzilla.suse.com/890764">SUSE bug 890764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/890770">SUSE bug 890770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215274" comment="libopenssl0_9_8-0.9.8j-0.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204623" comment="libopenssl0_9_8-32bit-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215277" comment="libopenssl0_9_8-hmac-0.9.8j-0.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208745" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208746" comment="libopenssl0_9_8-x86-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215276" comment="openssl-0.9.8j-0.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215279" comment="openssl-doc-0.9.8j-0.62 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215274" comment="libopenssl0_9_8-0.9.8j-0.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215275" comment="libopenssl0_9_8-32bit-0.9.8j-0.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215277" comment="libopenssl0_9_8-hmac-0.9.8j-0.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215278" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215276" comment="openssl-0.9.8j-0.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215279" comment="openssl-doc-0.9.8j-0.62 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3515</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3515" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3515" source="CVE"/>
    <description>
    The SPL component in PHP before 5.4.30 and 5.5.x before 5.5.14 incorrectly anticipates that certain data structures will have the array data type after unserialization, which allows remote attackers to execute arbitrary code via a crafted string that triggers use of a Hashtable destructor, related to "type confusion" issues in (1) ArrayObject and (2) SPLObjectStorage.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3515.html">CVE-2014-3515</cve>
<bugzilla href="https://bugzilla.suse.com/884992">SUSE bug 884992</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215010" comment="apache2-mod_php53-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215011" comment="php53-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215012" comment="php53-bcmath-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215013" comment="php53-bz2-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215014" comment="php53-calendar-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215015" comment="php53-ctype-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215016" comment="php53-curl-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215017" comment="php53-dba-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215018" comment="php53-dom-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215019" comment="php53-exif-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215020" comment="php53-fastcgi-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215021" comment="php53-fileinfo-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215022" comment="php53-ftp-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215023" comment="php53-gd-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215024" comment="php53-gettext-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215025" comment="php53-gmp-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215026" comment="php53-iconv-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215027" comment="php53-intl-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215028" comment="php53-json-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215029" comment="php53-ldap-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215030" comment="php53-mbstring-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215031" comment="php53-mcrypt-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215032" comment="php53-mysql-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215033" comment="php53-odbc-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215034" comment="php53-openssl-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215035" comment="php53-pcntl-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215036" comment="php53-pdo-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215037" comment="php53-pear-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215038" comment="php53-pgsql-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215039" comment="php53-pspell-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215040" comment="php53-shmop-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215041" comment="php53-snmp-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215042" comment="php53-soap-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215043" comment="php53-suhosin-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215044" comment="php53-sysvmsg-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215045" comment="php53-sysvsem-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215046" comment="php53-sysvshm-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215047" comment="php53-tokenizer-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215048" comment="php53-wddx-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215049" comment="php53-xmlreader-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215050" comment="php53-xmlrpc-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215051" comment="php53-xmlwriter-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215052" comment="php53-xsl-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215053" comment="php53-zip-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215054" comment="php53-zlib-5.3.17-0.27 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3537</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3537" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537" source="CVE"/>
    <description>
    The web interface in CUPS before 1.7.4 allows local users in the lp group to read arbitrary files via a symlink attack on a file in /var/cache/cups/rss/.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3537.html">CVE-2014-3537</cve>
<bugzilla href="https://bugzilla.suse.com/887240">SUSE bug 887240</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204260" comment="cups-1.3.9-8.46.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204261" comment="cups-client-1.3.9-8.46.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204262" comment="cups-libs-1.3.9-8.46.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204263" comment="cups-libs-32bit-1.3.9-8.46.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208451" comment="cups-libs-x86-1.3.9-8.46.52 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204260" comment="cups-1.3.9-8.46.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204261" comment="cups-client-1.3.9-8.46.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204262" comment="cups-libs-1.3.9-8.46.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204263" comment="cups-libs-32bit-1.3.9-8.46.52 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3564</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3564" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3564" source="CVE"/>
    <description>
    Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3564.html">CVE-2014-3564</cve>
<bugzilla href="https://bugzilla.suse.com/890123">SUSE bug 890123</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200068" comment="gpgme-1.1.6-25.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200069" comment="libgpgme11-1.1.6-25.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3565</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3565" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3565" source="CVE"/>
    <description>
    snmplib/mib.c in net-snmp 5.7.0 and earlier, when the -OQ option is used, allows remote attackers to cause a denial of service (snmptrapd crash) via a crafted SNMP trap message, which triggers a conversion to the variable type designated in the MIB file, as demonstrated by a NULL type in an ifMtu trap message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3565.html">CVE-2014-3565</cve>
<bugzilla href="https://bugzilla.suse.com/894361">SUSE bug 894361</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200303" comment="libsnmp15-5.4.2.1-8.12.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200304" comment="libsnmp15-32bit-5.4.2.1-8.12.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200305" comment="libsnmp15-x86-5.4.2.1-8.12.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200306" comment="net-snmp-5.4.2.1-8.12.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200307" comment="perl-SNMP-5.4.2.1-8.12.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200308" comment="snmp-mibs-5.4.2.1-8.12.22 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200303" comment="libsnmp15-5.4.2.1-8.12.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200304" comment="libsnmp15-32bit-5.4.2.1-8.12.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200306" comment="net-snmp-5.4.2.1-8.12.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200307" comment="perl-SNMP-5.4.2.1-8.12.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200308" comment="snmp-mibs-5.4.2.1-8.12.22 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3566</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2014-3566" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566" source="CVE"/>
    <description>
    The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the "POODLE" issue.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3566.html">CVE-2014-3566</cve>
<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1031023">SUSE bug 1031023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/901223">SUSE bug 901223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/901254">SUSE bug 901254</bugzilla>
<bugzilla href="https://bugzilla.suse.com/901277">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/901748">SUSE bug 901748</bugzilla>
<bugzilla href="https://bugzilla.suse.com/901757">SUSE bug 901757</bugzilla>
<bugzilla href="https://bugzilla.suse.com/901759">SUSE bug 901759</bugzilla>
<bugzilla href="https://bugzilla.suse.com/901889">SUSE bug 901889</bugzilla>
<bugzilla href="https://bugzilla.suse.com/901968">SUSE bug 901968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/902229">SUSE bug 902229</bugzilla>
<bugzilla href="https://bugzilla.suse.com/902476">SUSE bug 902476</bugzilla>
<bugzilla href="https://bugzilla.suse.com/902912">SUSE bug 902912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/903405">SUSE bug 903405</bugzilla>
<bugzilla href="https://bugzilla.suse.com/903684">SUSE bug 903684</bugzilla>
<bugzilla href="https://bugzilla.suse.com/903690">SUSE bug 903690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/903692">SUSE bug 903692</bugzilla>
<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205278" comment="apache2-mod_nss-1.0.14-0.4.25 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200006" comment="evolution-data-server-2.28.2-0.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200007" comment="evolution-data-server-32bit-2.28.2-0.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200008" comment="evolution-data-server-lang-2.28.2-0.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200009" comment="evolution-data-server-x86-2.28.2-0.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201722" comment="java-1_6_0-ibm-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201724" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208544" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208552" comment="java-1_7_0-ibm-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208554" comment="java-1_7_0-ibm-jdbc-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204622" comment="libopenssl0_9_8-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204623" comment="libopenssl0_9_8-32bit-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208744" comment="libopenssl0_9_8-hmac-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208745" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208746" comment="libopenssl0_9_8-x86-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200333" comment="libwsman1-2.2.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204624" comment="openssl-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208747" comment="openssl-doc-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200334" comment="openwsman-client-2.2.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200335" comment="openwsman-server-2.2.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200416" comment="pure-ftpd-1.0.22-3.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204847" comment="suseRegister-1.4-1.35 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205278" comment="apache2-mod_nss-1.0.14-0.4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202495" comment="cyrus-imapd-2.3.11-60.65.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200006" comment="evolution-data-server-2.28.2-0.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200007" comment="evolution-data-server-32bit-2.28.2-0.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200008" comment="evolution-data-server-lang-2.28.2-0.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201722" comment="java-1_6_0-ibm-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201724" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208544" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208552" comment="java-1_7_0-ibm-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208554" comment="java-1_7_0-ibm-jdbc-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204622" comment="libopenssl0_9_8-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204623" comment="libopenssl0_9_8-32bit-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208744" comment="libopenssl0_9_8-hmac-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208745" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200333" comment="libwsman1-2.2.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204624" comment="openssl-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208747" comment="openssl-doc-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200334" comment="openwsman-client-2.2.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200335" comment="openwsman-server-2.2.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202497" comment="perl-Cyrus-IMAP-2.3.11-60.65.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202498" comment="perl-Cyrus-SIEVE-managesieve-2.3.11-60.65.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200416" comment="pure-ftpd-1.0.22-3.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204847" comment="suseRegister-1.4-1.35 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3567</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3567" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567" source="CVE"/>
    <description>
    Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3567.html">CVE-2014-3567</cve>
<bugzilla href="https://bugzilla.suse.com/877506">SUSE bug 877506</bugzilla>
<bugzilla href="https://bugzilla.suse.com/901277">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/902912">SUSE bug 902912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/903690">SUSE bug 903690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/903692">SUSE bug 903692</bugzilla>
<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204622" comment="libopenssl0_9_8-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204623" comment="libopenssl0_9_8-32bit-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208744" comment="libopenssl0_9_8-hmac-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208745" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204624" comment="openssl-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208747" comment="openssl-doc-0.9.8j-0.66 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204622" comment="libopenssl0_9_8-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204623" comment="libopenssl0_9_8-32bit-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208744" comment="libopenssl0_9_8-hmac-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208745" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208746" comment="libopenssl0_9_8-x86-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204624" comment="openssl-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208747" comment="openssl-doc-0.9.8j-0.66 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3568" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568" source="CVE"/>
    <description>
    OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j does not properly enforce the no-ssl3 build option, which allows remote attackers to bypass intended access restrictions via an SSL 3.0 handshake, related to s23_clnt.c and s23_srvr.c.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3568.html">CVE-2014-3568</cve>
<bugzilla href="https://bugzilla.suse.com/901277">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/902912">SUSE bug 902912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/911399">SUSE bug 911399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/986238">SUSE bug 986238</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204622" comment="libopenssl0_9_8-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204623" comment="libopenssl0_9_8-32bit-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208744" comment="libopenssl0_9_8-hmac-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208745" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204624" comment="openssl-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208747" comment="openssl-doc-0.9.8j-0.66 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204622" comment="libopenssl0_9_8-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204623" comment="libopenssl0_9_8-32bit-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208744" comment="libopenssl0_9_8-hmac-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208745" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208746" comment="libopenssl0_9_8-x86-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204624" comment="openssl-0.9.8j-0.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208747" comment="openssl-doc-0.9.8j-0.66 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3569</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3569" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3569" source="CVE"/>
    <description>
    The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 0.9.8zc, 1.0.0o, and 1.0.1j does not properly handle attempts to use unsupported protocols, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an unexpected handshake, as demonstrated by an SSLv3 handshake to a no-ssl3 application with certain error handling.  NOTE: this issue became relevant after the CVE-2014-3568 fix.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3569.html">CVE-2014-3569</cve>
<bugzilla href="https://bugzilla.suse.com/911399">SUSE bug 911399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/920339">SUSE bug 920339</bugzilla>
<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
<bugzilla href="https://bugzilla.suse.com/986238">SUSE bug 986238</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200254" comment="libmysql55client18-x86-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3570</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3570" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3570" source="CVE"/>
    <description>
    The BN_sqr implementation in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not properly calculate the square of a BIGNUM value, which might make it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors, related to crypto/bn/asm/mips.pl, crypto/bn/asm/x86_64-gcc.c, and crypto/bn/bn_asm.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3570.html">CVE-2014-3570</cve>
<bugzilla href="https://bugzilla.suse.com/912296">SUSE bug 912296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/920339">SUSE bug 920339</bugzilla>
<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
<bugzilla href="https://bugzilla.suse.com/944456">SUSE bug 944456</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200254" comment="libmysql55client18-x86-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215291" comment="libopenssl0_9_8-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215292" comment="libopenssl0_9_8-32bit-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215295" comment="libopenssl0_9_8-hmac-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215296" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264506" comment="libopenssl0_9_8-x86-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215293" comment="openssl-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215297" comment="openssl-doc-0.9.8j-0.68 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215291" comment="libopenssl0_9_8-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215292" comment="libopenssl0_9_8-32bit-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215295" comment="libopenssl0_9_8-hmac-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215296" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215293" comment="openssl-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215297" comment="openssl-doc-0.9.8j-0.68 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3571</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3571" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3571" source="CVE"/>
    <description>
    OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted DTLS message that is processed with a different read operation for the handshake header than for the handshake body, related to the dtls1_get_record function in d1_pkt.c and the ssl3_read_n function in s3_pkt.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3571.html">CVE-2014-3571</cve>
<bugzilla href="https://bugzilla.suse.com/912294">SUSE bug 912294</bugzilla>
<bugzilla href="https://bugzilla.suse.com/920339">SUSE bug 920339</bugzilla>
<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200254" comment="libmysql55client18-x86-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215291" comment="libopenssl0_9_8-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215292" comment="libopenssl0_9_8-32bit-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215295" comment="libopenssl0_9_8-hmac-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215296" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264506" comment="libopenssl0_9_8-x86-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215293" comment="openssl-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215297" comment="openssl-doc-0.9.8j-0.68 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215291" comment="libopenssl0_9_8-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215292" comment="libopenssl0_9_8-32bit-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215295" comment="libopenssl0_9_8-hmac-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215296" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215293" comment="openssl-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215297" comment="openssl-doc-0.9.8j-0.68 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3572</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3572" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3572" source="CVE"/>
    <description>
    The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct ECDHE-to-ECDH downgrade attacks and trigger a loss of forward secrecy by omitting the ServerKeyExchange message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3572.html">CVE-2014-3572</cve>
<bugzilla href="https://bugzilla.suse.com/912015">SUSE bug 912015</bugzilla>
<bugzilla href="https://bugzilla.suse.com/920339">SUSE bug 920339</bugzilla>
<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200254" comment="libmysql55client18-x86-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215291" comment="libopenssl0_9_8-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215292" comment="libopenssl0_9_8-32bit-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215295" comment="libopenssl0_9_8-hmac-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215296" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264506" comment="libopenssl0_9_8-x86-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215293" comment="openssl-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215297" comment="openssl-doc-0.9.8j-0.68 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215291" comment="libopenssl0_9_8-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215292" comment="libopenssl0_9_8-32bit-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215295" comment="libopenssl0_9_8-hmac-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215296" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215293" comment="openssl-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215297" comment="openssl-doc-0.9.8j-0.68 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3581</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3581" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3581" source="CVE"/>
    <description>
    The cache_merge_headers_out function in modules/cache/cache_util.c in the mod_cache module in the Apache HTTP Server before 2.4.11 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty HTTP Content-Type header.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3581.html">CVE-2014-3581</cve>
<bugzilla href="https://bugzilla.suse.com/899836">SUSE bug 899836</bugzilla>
<bugzilla href="https://bugzilla.suse.com/914956">SUSE bug 914956</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199855" comment="apache2-2.2.12-1.51.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199856" comment="apache2-doc-2.2.12-1.51.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199857" comment="apache2-example-pages-2.2.12-1.51.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199858" comment="apache2-prefork-2.2.12-1.51.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199859" comment="apache2-utils-2.2.12-1.51.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199860" comment="apache2-worker-2.2.12-1.51.52 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3587</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3587" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3587" source="CVE"/>
    <description>
    Integer overflow in the cdf_read_property_info function in cdf.c in file through 5.19, as used in the Fileinfo component in PHP before 5.4.32 and 5.5.x before 5.5.16, allows remote attackers to cause a denial of service (application crash) via a crafted CDF file.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1571.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3587.html">CVE-2014-3587</cve>
<bugzilla href="https://bugzilla.suse.com/987530">SUSE bug 987530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/998845">SUSE bug 998845</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210312" comment="apache2-mod_php53-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203280" comment="php53-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210313" comment="php53-bcmath-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210314" comment="php53-bz2-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210315" comment="php53-calendar-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210316" comment="php53-ctype-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210317" comment="php53-curl-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210318" comment="php53-dba-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210319" comment="php53-dom-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210320" comment="php53-exif-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210321" comment="php53-fastcgi-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210322" comment="php53-fileinfo-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210323" comment="php53-ftp-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210324" comment="php53-gd-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210325" comment="php53-gettext-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210326" comment="php53-gmp-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210327" comment="php53-iconv-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210328" comment="php53-intl-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210329" comment="php53-json-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210330" comment="php53-ldap-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210331" comment="php53-mbstring-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210332" comment="php53-mcrypt-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210333" comment="php53-mysql-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210334" comment="php53-odbc-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210335" comment="php53-openssl-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210336" comment="php53-pcntl-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210337" comment="php53-pdo-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210338" comment="php53-pear-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210339" comment="php53-pgsql-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210340" comment="php53-pspell-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210341" comment="php53-shmop-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210342" comment="php53-snmp-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210343" comment="php53-soap-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210344" comment="php53-suhosin-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210345" comment="php53-sysvmsg-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210346" comment="php53-sysvsem-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210347" comment="php53-sysvshm-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210348" comment="php53-tokenizer-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210349" comment="php53-wddx-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210350" comment="php53-xmlreader-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210351" comment="php53-xmlrpc-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210352" comment="php53-xmlwriter-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210353" comment="php53-xsl-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210354" comment="php53-zip-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210355" comment="php53-zlib-5.3.17-79 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3589</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2014-3589" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3589" source="CVE"/>
    <description>
    PIL/IcnsImagePlugin.py in Python Imaging Library (PIL) and Pillow before 2.3.2 and 2.5.x before 2.5.2 allows remote attackers to cause a denial of service via a crafted block size.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3589.html">CVE-2014-3589</cve>
<bugzilla href="https://bugzilla.suse.com/921566">SUSE bug 921566</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215928" comment="python-Pillow-2.7.0-0.7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3591</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3591" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3591" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3591.html">CVE-2014-3591</cve>
<bugzilla href="https://bugzilla.suse.com/920057">SUSE bug 920057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/949135">SUSE bug 949135</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201780" comment="libgcrypt-1.5.0-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204612" comment="libgcrypt11-1.5.0-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204613" comment="libgcrypt11-32bit-1.5.0-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208740" comment="libgcrypt11-x86-1.5.0-0.19 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201780" comment="libgcrypt-1.5.0-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204612" comment="libgcrypt11-1.5.0-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204613" comment="libgcrypt11-32bit-1.5.0-0.19 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3596</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3596" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3596" source="CVE"/>
    <description>
    The getCN function in Apache Axis 1.4 and earlier does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field.  NOTE: this issue exists because of an incomplete fix for CVE-2012-5784.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3596.html">CVE-2014-3596</cve>
<bugzilla href="https://bugzilla.suse.com/1134598">SUSE bug 1134598</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254573" comment="axis-1.4-236.236.44.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3598</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2014-3598" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3598" source="CVE"/>
    <description>
    The Jpeg2KImagePlugin plugin in Pillow before 2.5.3 allows remote attackers to cause a denial of service via a crafted image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3598.html">CVE-2014-3598</cve>
<bugzilla href="https://bugzilla.suse.com/921566">SUSE bug 921566</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215928" comment="python-Pillow-2.7.0-0.7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3601</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3601" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3601" source="CVE"/>
    <description>
    The kvm_iommu_map_pages function in virt/kvm/iommu.c in the Linux kernel through 3.16.1 miscalculates the number of pages during the handling of a mapping failure, which allows guest OS users to (1) cause a denial of service (host OS memory corruption) or possibly have unspecified other impact by triggering a large gfn value or (2) cause a denial of service (host OS memory consumption) by triggering a small gfn value that leads to permanently pinned pages.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3601.html">CVE-2014-3601</cve>
<bugzilla href="https://bugzilla.suse.com/892782">SUSE bug 892782</bugzilla>
<bugzilla href="https://bugzilla.suse.com/902675">SUSE bug 902675</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213307" comment="kernel-bigsmp-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213308" comment="kernel-bigsmp-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213244" comment="kernel-bigsmp-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213245" comment="kernel-default-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213246" comment="kernel-default-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213247" comment="kernel-default-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264361" comment="kernel-default-man-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213309" comment="kernel-ec2-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213310" comment="kernel-ec2-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213311" comment="kernel-ec2-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264348" comment="kernel-pae-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264349" comment="kernel-pae-base-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264350" comment="kernel-pae-devel-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264362" comment="kernel-ppc64-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264363" comment="kernel-ppc64-base-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264364" comment="kernel-ppc64-devel-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213249" comment="kernel-source-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213250" comment="kernel-syms-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213312" comment="kernel-trace-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213313" comment="kernel-trace-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213251" comment="kernel-trace-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213252" comment="kernel-xen-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213253" comment="kernel-xen-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213254" comment="kernel-xen-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213256" comment="xen-kmp-default-4.2.5_02_3.0.101_0.46-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264352" comment="xen-kmp-pae-4.2.5_02_3.0.101_0.42-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3609</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3609" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3609" source="CVE"/>
    <description>
    HttpHdrRange.cc in Squid 3.x before 3.3.12 and 3.4.x before 3.4.6 allows remote attackers to cause a denial of service (crash) via a request with crafted "Range headers with unidentifiable byte-range values."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3609.html">CVE-2014-3609</cve>
<bugzilla href="https://bugzilla.suse.com/893649">SUSE bug 893649</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200447" comment="squid3-3.1.12-8.16.20 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3610</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3610" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3610" source="CVE"/>
    <description>
    The WRMSR processing functionality in the KVM subsystem in the Linux kernel through 3.17.2 does not properly handle the writing of a non-canonical address to a model-specific register, which allows guest OS users to cause a denial of service (host OS crash) by leveraging guest OS privileges, related to the wrmsr_interception function in arch/x86/kvm/svm.c and the handle_wrmsr function in arch/x86/kvm/vmx.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3610.html">CVE-2014-3610</cve>
<bugzilla href="https://bugzilla.suse.com/899192">SUSE bug 899192</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213307" comment="kernel-bigsmp-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213308" comment="kernel-bigsmp-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213244" comment="kernel-bigsmp-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213245" comment="kernel-default-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213246" comment="kernel-default-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213247" comment="kernel-default-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264361" comment="kernel-default-man-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213309" comment="kernel-ec2-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213310" comment="kernel-ec2-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213311" comment="kernel-ec2-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264348" comment="kernel-pae-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264349" comment="kernel-pae-base-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264350" comment="kernel-pae-devel-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264362" comment="kernel-ppc64-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264363" comment="kernel-ppc64-base-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264364" comment="kernel-ppc64-devel-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213249" comment="kernel-source-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213250" comment="kernel-syms-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213312" comment="kernel-trace-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213313" comment="kernel-trace-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213251" comment="kernel-trace-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213252" comment="kernel-xen-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213253" comment="kernel-xen-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213254" comment="kernel-xen-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213256" comment="xen-kmp-default-4.2.5_02_3.0.101_0.46-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264352" comment="xen-kmp-pae-4.2.5_02_3.0.101_0.42-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3611</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3611" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3611" source="CVE"/>
    <description>
    Race condition in the __kvm_migrate_pit_timer function in arch/x86/kvm/i8254.c in the KVM subsystem in the Linux kernel through 3.17.2 allows guest OS users to cause a denial of service (host OS crash) by leveraging incorrect PIT emulation.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3611.html">CVE-2014-3611</cve>
<bugzilla href="https://bugzilla.suse.com/899192">SUSE bug 899192</bugzilla>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:20143613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3613</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3613" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3613" source="CVE"/>
    <description>
    cURL and libcurl before 7.38.0 does not properly handle IP addresses in cookie domain names, which allows remote attackers to set cookies for or send arbitrary cookies to certain sites, as demonstrated by a site at 192.168.0.1 setting cookies for a site at 127.168.0.1.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3613.html">CVE-2014-3613</cve>
<bugzilla href="https://bugzilla.suse.com/894575">SUSE bug 894575</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204269" comment="curl-7.19.7-1.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204270" comment="libcurl4-7.19.7-1.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204271" comment="libcurl4-32bit-7.19.7-1.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208456" comment="libcurl4-x86-7.19.7-1.40 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204269" comment="curl-7.19.7-1.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204270" comment="libcurl4-7.19.7-1.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204271" comment="libcurl4-32bit-7.19.7-1.40 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3615</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2014-3615" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3615" source="CVE"/>
    <description>
    The VGA emulator in QEMU allows local guest users to read host memory by setting the display to a high resolution.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3615.html">CVE-2014-3615</cve>
<bugzilla href="https://bugzilla.suse.com/895528">SUSE bug 895528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/918998">SUSE bug 918998</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205947" comment="xen-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209054" comment="xen-doc-html-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209055" comment="xen-doc-pdf-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205948" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205950" comment="xen-libs-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209056" comment="xen-libs-32bit-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209057" comment="xen-tools-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205951" comment="xen-tools-domU-4.2.5_21-27 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205947" comment="xen-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209054" comment="xen-doc-html-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209055" comment="xen-doc-pdf-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205948" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205949" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205950" comment="xen-libs-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209056" comment="xen-libs-32bit-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209057" comment="xen-tools-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205951" comment="xen-tools-domU-4.2.5_21-27 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3618</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3618" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3618" source="CVE"/>
    <description>
    Heap-based buffer overflow in formisc.c in formail in procmail 3.22 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted email header, related to "unbalanced quotes."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3618.html">CVE-2014-3618</cve>
<bugzilla href="https://bugzilla.suse.com/1068648">SUSE bug 1068648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/894999">SUSE bug 894999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/898303">SUSE bug 898303</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200413" comment="procmail-3.22-240.8 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3633</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3633" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3633" source="CVE"/>
    <description>
    The qemuDomainGetBlockIoTune function in qemu/qemu_driver.c in libvirt before 1.2.9, when a disk has been hot-plugged or removed from the live image, allows remote attackers to cause a denial of service (crash) or read sensitive heap information via a crafted blkiotune query, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3633.html">CVE-2014-3633</cve>
<bugzilla href="https://bugzilla.suse.com/897783">SUSE bug 897783</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204579" comment="kvm-1.4.2-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204580" comment="libvirt-1.0.5.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204581" comment="libvirt-client-1.0.5.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204582" comment="libvirt-client-32bit-1.0.5.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204583" comment="libvirt-doc-1.0.5.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208729" comment="libvirt-lock-sanlock-1.0.5.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204584" comment="libvirt-python-1.0.5.9-0.19 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3634</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3634" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3634" source="CVE"/>
    <description>
    rsyslog before 7.6.6 and 8.x before 8.4.1 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash), possibly execute arbitrary code, or have other unspecified impact via a crafted priority (PRI) value that triggers an out-of-bounds array access.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3634.html">CVE-2014-3634</cve>
<bugzilla href="https://bugzilla.suse.com/897262">SUSE bug 897262</bugzilla>
<bugzilla href="https://bugzilla.suse.com/899756">SUSE bug 899756</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200430" comment="rsyslog-5.10.1-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200431" comment="rsyslog-diag-tools-5.10.1-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200432" comment="rsyslog-doc-5.10.1-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200433" comment="rsyslog-module-gssapi-5.10.1-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200434" comment="rsyslog-module-gtls-5.10.1-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200435" comment="rsyslog-module-mysql-5.10.1-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200436" comment="rsyslog-module-pgsql-5.10.1-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200437" comment="rsyslog-module-relp-5.10.1-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200438" comment="rsyslog-module-snmp-5.10.1-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200439" comment="rsyslog-module-udpspoof-5.10.1-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3638</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3638" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3638" source="CVE"/>
    <description>
    The bus_connections_check_reply function in config-parser.c in D-Bus before 1.6.24 and 1.8.x before 1.8.8 allows local users to cause a denial of service (CPU consumption) via a large number of method calls.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3638.html">CVE-2014-3638</cve>
<bugzilla href="https://bugzilla.suse.com/896453">SUSE bug 896453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/902912">SUSE bug 902912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/903055">SUSE bug 903055</bugzilla>
<bugzilla href="https://bugzilla.suse.com/903057">SUSE bug 903057</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199975" comment="dbus-1-1.2.10-3.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199976" comment="dbus-1-32bit-1.2.10-3.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199977" comment="dbus-1-x11-1.2.10-3.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199978" comment="dbus-1-x86-1.2.10-3.31 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199975" comment="dbus-1-1.2.10-3.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199976" comment="dbus-1-32bit-1.2.10-3.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199977" comment="dbus-1-x11-1.2.10-3.31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3640</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3640" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3640" source="CVE"/>
    <description>
    The sosendto function in slirp/udp.c in QEMU before 2.1.2 allows local users to cause a denial of service (NULL pointer dereference) by sending a udp packet with a value of 0 in the source port and address, which triggers access of an uninitialized socket.
    </description>
<advisory from="security@suse.de">
<cve href="https://www.suse.com/security/cve/CVE-2014-3640.html">CVE-2014-3640</cve>
<bugzilla href="https://bugzilla.suse.com/897654">SUSE bug 897654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/965112">SUSE bug 965112</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204579" comment="kvm-1.4.2-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204580" comment="libvirt-1.0.5.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204581" comment="libvirt-client-1.0.5.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204582" comment="libvirt-client-32bit-1.0.5.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204583" comment="libvirt-doc-1.0.5.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208729" comment="libvirt-lock-sanlock-1.0.5.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204584" comment="libvirt-python-1.0.5.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204579" comment="kvm-1.4.2-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204580" comment="libvirt-1.0.5.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204581" comment="libvirt-client-1.0.5.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204582" comment="libvirt-client-32bit-1.0.5.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204583" comment="libvirt-doc-1.0.5.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208729" comment="libvirt-lock-sanlock-1.0.5.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204584" comment="libvirt-python-1.0.5.9-0.19 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209045" comment="xen-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209046" comment="xen-doc-html-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209047" comment="xen-doc-pdf-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209048" comment="xen-kmp-default-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209049" comment="xen-kmp-pae-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209050" comment="xen-libs-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209051" comment="xen-libs-32bit-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209052" comment="xen-tools-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209053" comment="xen-tools-domU-4.2.5_20-24 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3646</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3646" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3646" source="CVE"/>
    <description>
    arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel through 3.17.2 does not have an exit handler for the INVVPID instruction, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3646.html">CVE-2014-3646</cve>
<bugzilla href="https://bugzilla.suse.com/899192">SUSE bug 899192</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213307" comment="kernel-bigsmp-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213308" comment="kernel-bigsmp-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213244" comment="kernel-bigsmp-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213245" comment="kernel-default-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213246" comment="kernel-default-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213247" comment="kernel-default-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264361" comment="kernel-default-man-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213309" comment="kernel-ec2-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213310" comment="kernel-ec2-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213311" comment="kernel-ec2-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264348" comment="kernel-pae-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264349" comment="kernel-pae-base-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264350" comment="kernel-pae-devel-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264362" comment="kernel-ppc64-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264363" comment="kernel-ppc64-base-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264364" comment="kernel-ppc64-devel-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213249" comment="kernel-source-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213250" comment="kernel-syms-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213312" comment="kernel-trace-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213313" comment="kernel-trace-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213251" comment="kernel-trace-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213252" comment="kernel-xen-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213253" comment="kernel-xen-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213254" comment="kernel-xen-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213256" comment="xen-kmp-default-4.2.5_02_3.0.101_0.46-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264352" comment="xen-kmp-pae-4.2.5_02_3.0.101_0.42-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3647</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3647" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3647" source="CVE"/>
    <description>
    arch/x86/kvm/emulate.c in the KVM subsystem in the Linux kernel through 3.17.2 does not properly perform RIP changes, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3647.html">CVE-2014-3647</cve>
<bugzilla href="https://bugzilla.suse.com/1013038">SUSE bug 1013038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1134834">SUSE bug 1134834</bugzilla>
<bugzilla href="https://bugzilla.suse.com/899192">SUSE bug 899192</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213307" comment="kernel-bigsmp-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213308" comment="kernel-bigsmp-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213244" comment="kernel-bigsmp-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213245" comment="kernel-default-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213246" comment="kernel-default-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213247" comment="kernel-default-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264361" comment="kernel-default-man-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213309" comment="kernel-ec2-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213310" comment="kernel-ec2-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213311" comment="kernel-ec2-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264348" comment="kernel-pae-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264349" comment="kernel-pae-base-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264350" comment="kernel-pae-devel-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264362" comment="kernel-ppc64-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264363" comment="kernel-ppc64-base-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264364" comment="kernel-ppc64-devel-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213249" comment="kernel-source-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213250" comment="kernel-syms-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213312" comment="kernel-trace-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213313" comment="kernel-trace-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213251" comment="kernel-trace-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213252" comment="kernel-xen-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213253" comment="kernel-xen-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213254" comment="kernel-xen-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213256" comment="xen-kmp-default-4.2.5_02_3.0.101_0.46-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264352" comment="xen-kmp-pae-4.2.5_02_3.0.101_0.42-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3657</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3657" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3657" source="CVE"/>
    <description>
    The virDomainListPopulate function in conf/domain_conf.c in libvirt before 1.2.9 does not clean up the lock on the list of domains, which allows remote attackers to cause a denial of service (deadlock) via a NULL value in the second parameter in the virConnectListAllDomains API command.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3657.html">CVE-2014-3657</cve>
<bugzilla href="https://bugzilla.suse.com/897783">SUSE bug 897783</bugzilla>
<bugzilla href="https://bugzilla.suse.com/899484">SUSE bug 899484</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204579" comment="kvm-1.4.2-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204580" comment="libvirt-1.0.5.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204581" comment="libvirt-client-1.0.5.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204582" comment="libvirt-client-32bit-1.0.5.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204583" comment="libvirt-doc-1.0.5.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208729" comment="libvirt-lock-sanlock-1.0.5.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204584" comment="libvirt-python-1.0.5.9-0.19 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3660</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3660" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3660" source="CVE"/>
    <description>
    parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing a large number of nested entity references, a variant of the "billion laughs" attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3660.html">CVE-2014-3660</cve>
<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/901546">SUSE bug 901546</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200342" comment="libxml2-2.7.6-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200343" comment="libxml2-32bit-2.7.6-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200344" comment="libxml2-doc-2.7.6-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204667" comment="libxml2-python-2.7.6-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200345" comment="libxml2-x86-2.7.6-0.31 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200342" comment="libxml2-2.7.6-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200343" comment="libxml2-32bit-2.7.6-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200344" comment="libxml2-doc-2.7.6-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204667" comment="libxml2-python-2.7.6-0.31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3668</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3668" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3668" source="CVE"/>
    <description>
    Buffer overflow in the date_from_ISO8601 function in the mkgmtime implementation in libxmlrpc/xmlrpc.c in the XMLRPC extension in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 allows remote attackers to cause a denial of service (application crash) via (1) a crafted first argument to the xmlrpc_set_type function or (2) a crafted argument to the xmlrpc_decode function, related to an out-of-bounds read operation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3668.html">CVE-2014-3668</cve>
<bugzilla href="https://bugzilla.suse.com/902368">SUSE bug 902368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208386" comment="apache2-mod_php53-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208387" comment="php53-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208388" comment="php53-bcmath-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208389" comment="php53-bz2-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208390" comment="php53-calendar-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208391" comment="php53-ctype-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208392" comment="php53-curl-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208393" comment="php53-dba-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208394" comment="php53-dom-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208395" comment="php53-exif-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208396" comment="php53-fastcgi-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208397" comment="php53-fileinfo-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208398" comment="php53-ftp-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208399" comment="php53-gd-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208400" comment="php53-gettext-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208401" comment="php53-gmp-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208402" comment="php53-iconv-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208403" comment="php53-intl-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208404" comment="php53-json-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208405" comment="php53-ldap-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208406" comment="php53-mbstring-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208407" comment="php53-mcrypt-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208408" comment="php53-mysql-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208409" comment="php53-odbc-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208410" comment="php53-openssl-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208411" comment="php53-pcntl-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208412" comment="php53-pdo-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208413" comment="php53-pear-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208414" comment="php53-pgsql-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208415" comment="php53-pspell-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208416" comment="php53-shmop-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208417" comment="php53-snmp-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208418" comment="php53-soap-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208419" comment="php53-suhosin-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208420" comment="php53-sysvmsg-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208421" comment="php53-sysvsem-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208422" comment="php53-sysvshm-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208423" comment="php53-tokenizer-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208424" comment="php53-wddx-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208425" comment="php53-xmlreader-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208426" comment="php53-xmlrpc-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208427" comment="php53-xmlwriter-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208428" comment="php53-xsl-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208429" comment="php53-zip-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208430" comment="php53-zlib-5.3.17-0.31 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3669</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3669" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3669" source="CVE"/>
    <description>
    Integer overflow in the object_custom function in ext/standard/var_unserializer.c in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an argument to the unserialize function that triggers calculation of a large length value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3669.html">CVE-2014-3669</cve>
<bugzilla href="https://bugzilla.suse.com/902360">SUSE bug 902360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208386" comment="apache2-mod_php53-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208387" comment="php53-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208388" comment="php53-bcmath-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208389" comment="php53-bz2-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208390" comment="php53-calendar-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208391" comment="php53-ctype-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208392" comment="php53-curl-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208393" comment="php53-dba-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208394" comment="php53-dom-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208395" comment="php53-exif-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208396" comment="php53-fastcgi-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208397" comment="php53-fileinfo-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208398" comment="php53-ftp-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208399" comment="php53-gd-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208400" comment="php53-gettext-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208401" comment="php53-gmp-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208402" comment="php53-iconv-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208403" comment="php53-intl-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208404" comment="php53-json-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208405" comment="php53-ldap-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208406" comment="php53-mbstring-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208407" comment="php53-mcrypt-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208408" comment="php53-mysql-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208409" comment="php53-odbc-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208410" comment="php53-openssl-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208411" comment="php53-pcntl-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208412" comment="php53-pdo-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208413" comment="php53-pear-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208414" comment="php53-pgsql-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208415" comment="php53-pspell-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208416" comment="php53-shmop-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208417" comment="php53-snmp-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208418" comment="php53-soap-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208419" comment="php53-suhosin-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208420" comment="php53-sysvmsg-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208421" comment="php53-sysvsem-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208422" comment="php53-sysvshm-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208423" comment="php53-tokenizer-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208424" comment="php53-wddx-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208425" comment="php53-xmlreader-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208426" comment="php53-xmlrpc-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208427" comment="php53-xmlwriter-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208428" comment="php53-xsl-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208429" comment="php53-zip-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208430" comment="php53-zlib-5.3.17-0.31 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3670</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3670" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3670" source="CVE"/>
    <description>
    The exif_ifd_make_value function in exif.c in the EXIF extension in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 operates on floating-point arrays incorrectly, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly execute arbitrary code via a crafted JPEG image with TIFF thumbnail data that is improperly handled by the exif_thumbnail function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3670.html">CVE-2014-3670</cve>
<bugzilla href="https://bugzilla.suse.com/902357">SUSE bug 902357</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208386" comment="apache2-mod_php53-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208387" comment="php53-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208388" comment="php53-bcmath-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208389" comment="php53-bz2-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208390" comment="php53-calendar-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208391" comment="php53-ctype-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208392" comment="php53-curl-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208393" comment="php53-dba-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208394" comment="php53-dom-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208395" comment="php53-exif-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208396" comment="php53-fastcgi-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208397" comment="php53-fileinfo-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208398" comment="php53-ftp-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208399" comment="php53-gd-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208400" comment="php53-gettext-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208401" comment="php53-gmp-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208402" comment="php53-iconv-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208403" comment="php53-intl-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208404" comment="php53-json-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208405" comment="php53-ldap-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208406" comment="php53-mbstring-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208407" comment="php53-mcrypt-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208408" comment="php53-mysql-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208409" comment="php53-odbc-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208410" comment="php53-openssl-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208411" comment="php53-pcntl-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208412" comment="php53-pdo-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208413" comment="php53-pear-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208414" comment="php53-pgsql-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208415" comment="php53-pspell-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208416" comment="php53-shmop-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208417" comment="php53-snmp-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208418" comment="php53-soap-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208419" comment="php53-suhosin-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208420" comment="php53-sysvmsg-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208421" comment="php53-sysvsem-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208422" comment="php53-sysvshm-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208423" comment="php53-tokenizer-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208424" comment="php53-wddx-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208425" comment="php53-xmlreader-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208426" comment="php53-xmlrpc-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208427" comment="php53-xmlwriter-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208428" comment="php53-xsl-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208429" comment="php53-zip-5.3.17-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208430" comment="php53-zlib-5.3.17-0.31 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3672</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2014-3672" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3672" source="CVE"/>
    <description>
    The qemu implementation in libvirt before 1.3.0 and Xen allows local guest OS users to cause a denial of service (host disk consumption) by writing to stdout or stderr.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3672.html">CVE-2014-3672</cve>
<bugzilla href="https://bugzilla.suse.com/981264">SUSE bug 981264</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205947" comment="xen-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209054" comment="xen-doc-html-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209055" comment="xen-doc-pdf-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205948" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205949" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205950" comment="xen-libs-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209056" comment="xen-libs-32bit-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209057" comment="xen-tools-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205951" comment="xen-tools-domU-4.2.5_21-27 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205947" comment="xen-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209054" comment="xen-doc-html-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209055" comment="xen-doc-pdf-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205948" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205950" comment="xen-libs-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209056" comment="xen-libs-32bit-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209057" comment="xen-tools-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205951" comment="xen-tools-domU-4.2.5_21-27 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3673</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3673" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3673" source="CVE"/>
    <description>
    The SCTP implementation in the Linux kernel through 3.17.2 allows remote attackers to cause a denial of service (system crash) via a malformed ASCONF chunk, related to net/sctp/sm_make_chunk.c and net/sctp/sm_statefuns.c.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3673.html">CVE-2014-3673</cve>
<bugzilla href="https://bugzilla.suse.com/902346">SUSE bug 902346</bugzilla>
<bugzilla href="https://bugzilla.suse.com/902349">SUSE bug 902349</bugzilla>
<bugzilla href="https://bugzilla.suse.com/904899">SUSE bug 904899</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213307" comment="kernel-bigsmp-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213308" comment="kernel-bigsmp-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213244" comment="kernel-bigsmp-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213245" comment="kernel-default-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213246" comment="kernel-default-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213247" comment="kernel-default-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264361" comment="kernel-default-man-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213309" comment="kernel-ec2-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213310" comment="kernel-ec2-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213311" comment="kernel-ec2-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264348" comment="kernel-pae-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264349" comment="kernel-pae-base-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264350" comment="kernel-pae-devel-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264362" comment="kernel-ppc64-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264363" comment="kernel-ppc64-base-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264364" comment="kernel-ppc64-devel-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213249" comment="kernel-source-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213250" comment="kernel-syms-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213312" comment="kernel-trace-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213313" comment="kernel-trace-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213251" comment="kernel-trace-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213252" comment="kernel-xen-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213253" comment="kernel-xen-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213254" comment="kernel-xen-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213256" comment="xen-kmp-default-4.2.5_02_3.0.101_0.46-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264352" comment="xen-kmp-pae-4.2.5_02_3.0.101_0.42-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3675</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3675" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3675" source="CVE"/>
    <description>
    Shim allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted DHCPv6 packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3675.html">CVE-2014-3675</cve>
<bugzilla href="https://bugzilla.suse.com/889332">SUSE bug 889332</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202085" comment="gnu-efi-3.0u-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200445" comment="shim-0.7.318.81ee561d-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3676</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3676" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3676" source="CVE"/>
    <description>
    Heap-based buffer overflow in Shim allows remote attackers to execute arbitrary code via a crafted IPv6 address, related to the "tftp:// DHCPv6 boot option."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3676.html">CVE-2014-3676</cve>
<bugzilla href="https://bugzilla.suse.com/889332">SUSE bug 889332</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202085" comment="gnu-efi-3.0u-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200445" comment="shim-0.7.318.81ee561d-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3677</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3677" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3677" source="CVE"/>
    <description>
    Unspecified vulnerability in Shim might allow attackers to execute arbitrary code via a crafted MOK list, which triggers memory corruption.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3677.html">CVE-2014-3677</cve>
<bugzilla href="https://bugzilla.suse.com/889332">SUSE bug 889332</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202085" comment="gnu-efi-3.0u-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200445" comment="shim-0.7.318.81ee561d-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3683</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3683" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3683" source="CVE"/>
    <description>
    Integer overflow in rsyslog before 7.6.7 and 8.x before 8.4.2 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash) via a large priority (PRI) value.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3634.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3683.html">CVE-2014-3683</cve>
<bugzilla href="https://bugzilla.suse.com/897262">SUSE bug 897262</bugzilla>
<bugzilla href="https://bugzilla.suse.com/899756">SUSE bug 899756</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200430" comment="rsyslog-5.10.1-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200431" comment="rsyslog-diag-tools-5.10.1-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200432" comment="rsyslog-doc-5.10.1-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200433" comment="rsyslog-module-gssapi-5.10.1-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200434" comment="rsyslog-module-gtls-5.10.1-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200435" comment="rsyslog-module-mysql-5.10.1-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200436" comment="rsyslog-module-pgsql-5.10.1-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200437" comment="rsyslog-module-relp-5.10.1-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200438" comment="rsyslog-module-snmp-5.10.1-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200439" comment="rsyslog-module-udpspoof-5.10.1-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3686</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3686" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3686" source="CVE"/>
    <description>
    wpa_supplicant and hostapd 0.7.2 through 2.2, when running with certain configurations and using wpa_cli or hostapd_cli with action scripts, allows remote attackers to execute arbitrary commands via a crafted frame.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3686.html">CVE-2014-3686</cve>
<bugzilla href="https://bugzilla.suse.com/1063667">SUSE bug 1063667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/900611">SUSE bug 900611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915323">SUSE bug 915323</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200472" comment="wpa_supplicant-0.7.1-6.15 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3687</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2014-3687" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3687" source="CVE"/>
    <description>
    The sctp_assoc_lookup_asconf_ack function in net/sctp/associola.c in the SCTP implementation in the Linux kernel through 3.17.2 allows remote attackers to cause a denial of service (panic) via duplicate ASCONF chunks that trigger an incorrect uncork within the side-effect interpreter.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3687.html">CVE-2014-3687</cve>
<bugzilla href="https://bugzilla.suse.com/902349">SUSE bug 902349</bugzilla>
<bugzilla href="https://bugzilla.suse.com/904899">SUSE bug 904899</bugzilla>
<bugzilla href="https://bugzilla.suse.com/909208">SUSE bug 909208</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214952" comment="kernel-bigsmp-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214953" comment="kernel-bigsmp-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214910" comment="kernel-bigsmp-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214911" comment="kernel-default-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214912" comment="kernel-default-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214913" comment="kernel-default-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264496" comment="kernel-default-man-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214954" comment="kernel-ec2-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214955" comment="kernel-ec2-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214956" comment="kernel-ec2-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264488" comment="kernel-pae-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264489" comment="kernel-pae-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264490" comment="kernel-pae-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264497" comment="kernel-ppc64-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264498" comment="kernel-ppc64-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264499" comment="kernel-ppc64-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214915" comment="kernel-source-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214916" comment="kernel-syms-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214957" comment="kernel-trace-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214958" comment="kernel-trace-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214917" comment="kernel-trace-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214918" comment="kernel-xen-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214919" comment="kernel-xen-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214920" comment="kernel-xen-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214922" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.50-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264492" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.50-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3688</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2014-3688" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3688" source="CVE"/>
    <description>
    The SCTP implementation in the Linux kernel before 3.17.4 allows remote attackers to cause a denial of service (memory consumption) by triggering a large number of chunks in an association's output queue, as demonstrated by ASCONF probes, related to net/sctp/inqueue.c and net/sctp/sm_statefuns.c.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3688.html">CVE-2014-3688</cve>
<bugzilla href="https://bugzilla.suse.com/902351">SUSE bug 902351</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214952" comment="kernel-bigsmp-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214953" comment="kernel-bigsmp-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214910" comment="kernel-bigsmp-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214911" comment="kernel-default-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214912" comment="kernel-default-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214913" comment="kernel-default-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264496" comment="kernel-default-man-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214954" comment="kernel-ec2-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214955" comment="kernel-ec2-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214956" comment="kernel-ec2-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264488" comment="kernel-pae-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264489" comment="kernel-pae-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264490" comment="kernel-pae-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264497" comment="kernel-ppc64-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264498" comment="kernel-ppc64-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264499" comment="kernel-ppc64-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214915" comment="kernel-source-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214916" comment="kernel-syms-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214957" comment="kernel-trace-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214958" comment="kernel-trace-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214917" comment="kernel-trace-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214918" comment="kernel-xen-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214919" comment="kernel-xen-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214920" comment="kernel-xen-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214922" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.50-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264492" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.50-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3689</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3689" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3689" source="CVE"/>
    <description>
    The vmware-vga driver (hw/display/vmware_vga.c) in QEMU allows local guest users to write to qemu memory locations and gain privileges via unspecified parameters related to rectangle handling.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3689.html">CVE-2014-3689</cve>
<bugzilla href="https://bugzilla.suse.com/901508">SUSE bug 901508</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962611">SUSE bug 962611</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209045" comment="xen-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209046" comment="xen-doc-html-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209047" comment="xen-doc-pdf-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209048" comment="xen-kmp-default-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209049" comment="xen-kmp-pae-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209050" comment="xen-libs-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209051" comment="xen-libs-32bit-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209052" comment="xen-tools-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209053" comment="xen-tools-domU-4.2.5_20-24 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3690</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2014-3690" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3690" source="CVE"/>
    <description>
    arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before 3.17.2 on Intel processors does not ensure that the value in the CR4 control register remains the same after a VM entry, which allows host OS users to kill arbitrary processes or cause a denial of service (system disruption) by leveraging /dev/kvm access, as demonstrated by PR_SET_TSC prctl calls within a modified copy of QEMU.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3690.html">CVE-2014-3690</cve>
<bugzilla href="https://bugzilla.suse.com/902232">SUSE bug 902232</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214952" comment="kernel-bigsmp-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214953" comment="kernel-bigsmp-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214910" comment="kernel-bigsmp-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214911" comment="kernel-default-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214912" comment="kernel-default-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214913" comment="kernel-default-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264496" comment="kernel-default-man-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214954" comment="kernel-ec2-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214955" comment="kernel-ec2-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214956" comment="kernel-ec2-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264488" comment="kernel-pae-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264489" comment="kernel-pae-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264490" comment="kernel-pae-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264497" comment="kernel-ppc64-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264498" comment="kernel-ppc64-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264499" comment="kernel-ppc64-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214915" comment="kernel-source-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214916" comment="kernel-syms-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214957" comment="kernel-trace-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214958" comment="kernel-trace-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214917" comment="kernel-trace-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214918" comment="kernel-xen-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214919" comment="kernel-xen-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214920" comment="kernel-xen-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214922" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.50-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264492" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.50-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3707</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3707" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3707" source="CVE"/>
    <description>
    The curl_easy_duphandle function in libcurl 7.17.1 through 7.38.0, when running with the CURLOPT_COPYPOSTFIELDS option, does not properly copy HTTP POST data for an easy handle, which triggers an out-of-bounds read that allows remote web servers to read sensitive memory information.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3707.html">CVE-2014-3707</cve>
<bugzilla href="https://bugzilla.suse.com/901924">SUSE bug 901924</bugzilla>
<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204269" comment="curl-7.19.7-1.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204270" comment="libcurl4-7.19.7-1.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204271" comment="libcurl4-32bit-7.19.7-1.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208456" comment="libcurl4-x86-7.19.7-1.40 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204269" comment="curl-7.19.7-1.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204270" comment="libcurl4-7.19.7-1.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204271" comment="libcurl4-32bit-7.19.7-1.40 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3710</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3710" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3710" source="CVE"/>
    <description>
    The donote function in readelf.c in file through 5.20, as used in the Fileinfo component in PHP 5.4.34, does not ensure that sufficient note headers are present, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3710.html">CVE-2014-3710</cve>
<bugzilla href="https://bugzilla.suse.com/902367">SUSE bug 902367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/910252">SUSE bug 910252</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200011" comment="file-4.24-43.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200012" comment="file-32bit-4.24-43.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200013" comment="file-x86-4.24-43.27 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200011" comment="file-4.24-43.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200012" comment="file-32bit-4.24-43.27 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3917</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3917" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3917" source="CVE"/>
    <description>
    kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a large value of a syscall number.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3917.html">CVE-2014-3917</cve>
<bugzilla href="https://bugzilla.suse.com/880484">SUSE bug 880484</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213024" comment="kernel-default-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213025" comment="kernel-default-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213026" comment="kernel-default-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213028" comment="kernel-source-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213029" comment="kernel-syms-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213088" comment="kernel-trace-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213089" comment="kernel-trace-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213030" comment="kernel-trace-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3956</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3956" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3956" source="CVE"/>
    <description>
    The sm_close_on_exec function in conf.c in sendmail before 8.14.9 has arguments in the wrong order, and consequently skips setting expected FD_CLOEXEC flags, which allows local users to access unintended high-numbered file descriptors via a custom mail-delivery program.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3956.html">CVE-2014-3956</cve>
<bugzilla href="https://bugzilla.suse.com/881284">SUSE bug 881284</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200444" comment="sendmail-8.14.3-50.24 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3967</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3967" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3967" source="CVE"/>
    <description>
    The HVMOP_inject_msi function in Xen 4.2.x, 4.3.x, and 4.4.x does not properly check the return value from the IRQ setup check, which allows local HVM guest administrators to cause a denial of service (NULL pointer dereference and crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3967.html">CVE-2014-3967</cve>
<bugzilla href="https://bugzilla.suse.com/878841">SUSE bug 878841</bugzilla>
<bugzilla href="https://bugzilla.suse.com/880751">SUSE bug 880751</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204923" comment="xen-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204924" comment="xen-doc-html-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204925" comment="xen-doc-pdf-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204926" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204927" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204928" comment="xen-libs-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204929" comment="xen-libs-32bit-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204930" comment="xen-tools-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204931" comment="xen-tools-domU-4.2.4_04-0.9 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204923" comment="xen-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204924" comment="xen-doc-html-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204925" comment="xen-doc-pdf-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204926" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204928" comment="xen-libs-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204929" comment="xen-libs-32bit-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204930" comment="xen-tools-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204931" comment="xen-tools-domU-4.2.4_04-0.9 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3968</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3968" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3968" source="CVE"/>
    <description>
    The HVMOP_inject_msi function in Xen 4.2.x, 4.3.x, and 4.4.x allows local guest HVM administrators to cause a denial of service (host crash) via a large number of crafted requests, which trigger an error messages to be logged.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3968.html">CVE-2014-3968</cve>
<bugzilla href="https://bugzilla.suse.com/878841">SUSE bug 878841</bugzilla>
<bugzilla href="https://bugzilla.suse.com/880751">SUSE bug 880751</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204923" comment="xen-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204924" comment="xen-doc-html-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204925" comment="xen-doc-pdf-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204926" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204927" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204928" comment="xen-libs-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204929" comment="xen-libs-32bit-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204930" comment="xen-tools-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204931" comment="xen-tools-domU-4.2.4_04-0.9 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204923" comment="xen-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204924" comment="xen-doc-html-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204925" comment="xen-doc-pdf-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204926" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204928" comment="xen-libs-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204929" comment="xen-libs-32bit-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204930" comment="xen-tools-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204931" comment="xen-tools-domU-4.2.4_04-0.9 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3970</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-3970" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3970" source="CVE"/>
    <description>
    The pa_rtp_recv function in modules/rtp/rtp.c in the module-rtp-recv module in PulseAudio 5.0 and earlier allows remote attackers to cause a denial of service (assertion failure and abort) via an empty UDP packet.
    </description>
<advisory from="security@suse.de">
<cve href="https://www.suse.com/security/cve/CVE-2014-3970.html">CVE-2014-3970</cve>
<bugzilla href="https://bugzilla.suse.com/881524">SUSE bug 881524</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204627" comment="libpulse-browse0-0.9.23-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204628" comment="libpulse-mainloop-glib0-0.9.23-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204629" comment="libpulse0-0.9.23-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204630" comment="libpulse0-32bit-0.9.23-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204631" comment="pulseaudio-0.9.23-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204632" comment="pulseaudio-esound-compat-0.9.23-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204633" comment="pulseaudio-gdm-hooks-0.9.23-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204634" comment="pulseaudio-lang-0.9.23-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204639" comment="pulseaudio-module-x11-0.9.23-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204640" comment="pulseaudio-module-zeroconf-0.9.23-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204641" comment="pulseaudio-utils-0.9.23-0.15 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204627" comment="libpulse-browse0-0.9.23-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204628" comment="libpulse-mainloop-glib0-0.9.23-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204629" comment="libpulse0-0.9.23-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204630" comment="libpulse0-32bit-0.9.23-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208750" comment="libpulse0-x86-0.9.23-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204631" comment="pulseaudio-0.9.23-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204632" comment="pulseaudio-esound-compat-0.9.23-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204633" comment="pulseaudio-gdm-hooks-0.9.23-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204634" comment="pulseaudio-lang-0.9.23-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204639" comment="pulseaudio-module-x11-0.9.23-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204640" comment="pulseaudio-module-zeroconf-0.9.23-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204641" comment="pulseaudio-utils-0.9.23-0.15 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4021</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4021" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021" source="CVE"/>
    <description>
    Xen 3.2.x through 4.4.x does not properly clean memory pages recovered from guests, which allows local guest OS users to obtain sensitive information via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4021.html">CVE-2014-4021</cve>
<bugzilla href="https://bugzilla.suse.com/880751">SUSE bug 880751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/903970">SUSE bug 903970</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204923" comment="xen-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204924" comment="xen-doc-html-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204925" comment="xen-doc-pdf-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204926" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204927" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204928" comment="xen-libs-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204929" comment="xen-libs-32bit-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204930" comment="xen-tools-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204931" comment="xen-tools-domU-4.2.4_04-0.9 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204923" comment="xen-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204924" comment="xen-doc-html-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204925" comment="xen-doc-pdf-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204926" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204928" comment="xen-libs-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204929" comment="xen-libs-32bit-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204930" comment="xen-tools-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204931" comment="xen-tools-domU-4.2.4_04-0.9 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4027</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4027" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027" source="CVE"/>
    <description>
    The rd_build_device_space function in drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from ramdisk_mcp memory by leveraging access to a SCSI initiator.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4027.html">CVE-2014-4027</cve>
<bugzilla href="https://bugzilla.suse.com/882639">SUSE bug 882639</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208673" comment="iscsitarget-kmp-bigsmp-1.4.20_3.0.101_0.40-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204510" comment="kernel-default-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204511" comment="kernel-default-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204512" comment="kernel-default-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204518" comment="kernel-source-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204519" comment="kernel-syms-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208596" comment="kernel-trace-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208597" comment="kernel-trace-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204520" comment="kernel-trace-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208676" comment="ofed-kmp-bigsmp-1.5.4.1_3.0.101_0.40-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208677" comment="oracleasm-kmp-bigsmp-2.0.5_3.0.101_0.40-7.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4038</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2014-4038" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4038" source="CVE"/>
    <description>
    ppc64-diag 2.6.1 allows local users to overwrite arbitrary files via a symlink attack related to (1) rtas_errd/diag_support.c and /tmp/get_dt_files, (2) scripts/ppc64_diag_mkrsrc and /tmp/diagSEsnap/snapH.tar.gz, or (3) lpd/test/lpd_ela_test.sh and /var/tmp/ras.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4038.html">CVE-2014-4038</cve>
<bugzilla href="https://bugzilla.suse.com/882667">SUSE bug 882667</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208952" comment="ppc64-diag-2.6.1-0.14 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4039</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2014-4039" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4039" source="CVE"/>
    <description>
    ppc64-diag 2.6.1 uses 0775 permissions for /tmp/diagSEsnap and does not properly restrict permissions for /tmp/diagSEsnap/snapH.tar.gz, which allows local users to obtain sensitive information by reading files in this archive, as demonstrated by /var/log/messages and /etc/yaboot.conf.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4039.html">CVE-2014-4039</cve>
<bugzilla href="https://bugzilla.suse.com/882667">SUSE bug 882667</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208952" comment="ppc64-diag-2.6.1-0.14 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4040</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2014-4040" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4040" source="CVE"/>
    <description>
    snap in powerpc-utils 1.2.20 produces an archive with fstab and yaboot.conf files potentially containing cleartext passwords, and lacks a warning about reviewing this archive to detect included passwords, which might allow remote attackers to obtain sensitive information by leveraging access to a technical-support data stream.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4040.html">CVE-2014-4040</cve>
<bugzilla href="https://bugzilla.suse.com/883174">SUSE bug 883174</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208951" comment="powerpc-utils-1.2.16-0.13 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4043</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4043" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043" source="CVE"/>
    <description>
    The posix_spawn_file_actions_addopen function in glibc before 2.20 does not copy its path argument in accordance with the POSIX specification, which allows context-dependent attackers to trigger use-after-free vulnerabilities.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4043.html">CVE-2014-4043</cve>
<bugzilla href="https://bugzilla.suse.com/882600">SUSE bug 882600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/939797">SUSE bug 939797</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215311" comment="glibc-2.11.3-17.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204402" comment="glibc-32bit-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215313" comment="glibc-devel-2.11.3-17.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204404" comment="glibc-devel-32bit-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215319" comment="glibc-html-2.11.3-17.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215315" comment="glibc-i18ndata-2.11.3-17.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215320" comment="glibc-info-2.11.3-17.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215316" comment="glibc-locale-2.11.3-17.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204407" comment="glibc-locale-32bit-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208499" comment="glibc-locale-x86-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215321" comment="glibc-profile-2.11.3-17.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208501" comment="glibc-profile-32bit-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208502" comment="glibc-profile-x86-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208503" comment="glibc-x86-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215318" comment="nscd-2.11.3-17.66 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215311" comment="glibc-2.11.3-17.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215312" comment="glibc-32bit-2.11.3-17.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215313" comment="glibc-devel-2.11.3-17.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215314" comment="glibc-devel-32bit-2.11.3-17.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215319" comment="glibc-html-2.11.3-17.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215315" comment="glibc-i18ndata-2.11.3-17.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215320" comment="glibc-info-2.11.3-17.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215316" comment="glibc-locale-2.11.3-17.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215317" comment="glibc-locale-32bit-2.11.3-17.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215321" comment="glibc-profile-2.11.3-17.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215322" comment="glibc-profile-32bit-2.11.3-17.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215318" comment="nscd-2.11.3-17.66 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4049</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4049" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4049" source="CVE"/>
    <description>
    Heap-based buffer overflow in the php_parserr function in ext/standard/dns.c in PHP 5.6.0beta4 and earlier allows remote servers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted DNS TXT record, related to the dns_get_record function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4049.html">CVE-2014-4049</cve>
<bugzilla href="https://bugzilla.suse.com/882992">SUSE bug 882992</bugzilla>
<bugzilla href="https://bugzilla.suse.com/893853">SUSE bug 893853</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215323" comment="apache2-mod_php53-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215324" comment="php53-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215325" comment="php53-bcmath-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215326" comment="php53-bz2-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215327" comment="php53-calendar-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215328" comment="php53-ctype-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215329" comment="php53-curl-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215330" comment="php53-dba-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215331" comment="php53-dom-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215332" comment="php53-exif-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215333" comment="php53-fastcgi-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215334" comment="php53-fileinfo-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215335" comment="php53-ftp-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215336" comment="php53-gd-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215337" comment="php53-gettext-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215338" comment="php53-gmp-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215339" comment="php53-iconv-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215340" comment="php53-intl-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215341" comment="php53-json-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215342" comment="php53-ldap-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215343" comment="php53-mbstring-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215344" comment="php53-mcrypt-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215345" comment="php53-mysql-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215346" comment="php53-odbc-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215347" comment="php53-openssl-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215348" comment="php53-pcntl-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215349" comment="php53-pdo-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215350" comment="php53-pear-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215351" comment="php53-pgsql-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215352" comment="php53-pspell-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215353" comment="php53-shmop-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215354" comment="php53-snmp-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215355" comment="php53-soap-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215356" comment="php53-suhosin-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215357" comment="php53-sysvmsg-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215358" comment="php53-sysvsem-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215359" comment="php53-sysvshm-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215360" comment="php53-tokenizer-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215361" comment="php53-wddx-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215362" comment="php53-xmlreader-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215363" comment="php53-xmlrpc-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215364" comment="php53-xmlwriter-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215365" comment="php53-xsl-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215366" comment="php53-zip-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215367" comment="php53-zlib-5.3.17-0.29 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4171</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4171" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171" source="CVE"/>
    <description>
    mm/shmem.c in the Linux kernel through 3.15.1 does not properly implement the interaction between range notification and hole punching, which allows local users to cause a denial of service (i_mutex hold) by using the mmap system call to access a hole, as demonstrated by interfering with intended shmem activity by blocking completion of (1) an MADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4171.html">CVE-2014-4171</cve>
<bugzilla href="https://bugzilla.suse.com/883518">SUSE bug 883518</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208673" comment="iscsitarget-kmp-bigsmp-1.4.20_3.0.101_0.40-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204510" comment="kernel-default-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204511" comment="kernel-default-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204512" comment="kernel-default-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204518" comment="kernel-source-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204519" comment="kernel-syms-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208596" comment="kernel-trace-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208597" comment="kernel-trace-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204520" comment="kernel-trace-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208676" comment="ofed-kmp-bigsmp-1.5.4.1_3.0.101_0.40-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208677" comment="oracleasm-kmp-bigsmp-2.0.5_3.0.101_0.40-7.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4207</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4207" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4207" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier allows remote authenticated users to affect availability via vectors related to SROPTZR.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4207.html">CVE-2014-4207</cve>
<bugzilla href="https://bugzilla.suse.com/887580">SUSE bug 887580</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915914">SUSE bug 915914</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204617" comment="libmysql55client18-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204619" comment="libmysql55client_r18-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204620" comment="mysql-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204621" comment="mysql-client-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208743" comment="mysql-tools-5.5.39-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204617" comment="libmysql55client18-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204619" comment="libmysql55client_r18-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204620" comment="mysql-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204621" comment="mysql-client-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208743" comment="mysql-tools-5.5.39-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4208</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4208" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4208" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java SE component in Oracle Java SE 7u60 and 8u5 allows remote attackers to affect integrity via unknown vectors related to Deployment, a different vulnerability than CVE-2014-4220.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4208.html">CVE-2014-4208</cve>
<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/891701">SUSE bug 891701</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215375" comment="java-1_7_0-ibm-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215377" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215375" comment="java-1_7_0-ibm-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215376" comment="java-1_7_0-ibm-alsa-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215377" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215378" comment="java-1_7_0-ibm-plugin-1.7.0_sr7.1-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4209" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4209" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5 allows remote attackers to affect confidentiality and integrity via vectors related to JMX.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4209.html">CVE-2014-4209</cve>
<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/891699">SUSE bug 891699</bugzilla>
<bugzilla href="https://bugzilla.suse.com/891700">SUSE bug 891700</bugzilla>
<bugzilla href="https://bugzilla.suse.com/891701">SUSE bug 891701</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215380" comment="java-1_6_0-ibm-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215381" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215382" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215375" comment="java-1_7_0-ibm-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215377" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215380" comment="java-1_6_0-ibm-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215381" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215382" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215383" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215375" comment="java-1_7_0-ibm-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215376" comment="java-1_7_0-ibm-alsa-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215377" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215378" comment="java-1_7_0-ibm-plugin-1.7.0_sr7.1-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4214</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4214" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4214" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.17 and earlier allows remote authenticated users to affect availability via vectors related to SRSP.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4214.html">CVE-2014-4214</cve>
<bugzilla href="https://bugzilla.suse.com/887580">SUSE bug 887580</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204617" comment="libmysql55client18-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204619" comment="libmysql55client_r18-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204620" comment="mysql-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204621" comment="mysql-client-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208743" comment="mysql-tools-5.5.39-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204617" comment="libmysql55client18-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204619" comment="libmysql55client_r18-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204620" comment="mysql-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204621" comment="mysql-client-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208743" comment="mysql-tools-5.5.39-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4218</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4218" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4218" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5 allows remote attackers to affect integrity via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4218.html">CVE-2014-4218</cve>
<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/891699">SUSE bug 891699</bugzilla>
<bugzilla href="https://bugzilla.suse.com/891700">SUSE bug 891700</bugzilla>
<bugzilla href="https://bugzilla.suse.com/891701">SUSE bug 891701</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215380" comment="java-1_6_0-ibm-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215381" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215382" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215375" comment="java-1_7_0-ibm-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215377" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215380" comment="java-1_6_0-ibm-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215381" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215382" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215383" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215375" comment="java-1_7_0-ibm-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215376" comment="java-1_7_0-ibm-alsa-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215377" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215378" comment="java-1_7_0-ibm-plugin-1.7.0_sr7.1-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4219</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4219" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4219" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u75, 7u60, and 8u5 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4219.html">CVE-2014-4219</cve>
<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/891699">SUSE bug 891699</bugzilla>
<bugzilla href="https://bugzilla.suse.com/891700">SUSE bug 891700</bugzilla>
<bugzilla href="https://bugzilla.suse.com/891701">SUSE bug 891701</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215380" comment="java-1_6_0-ibm-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215381" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215382" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215375" comment="java-1_7_0-ibm-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215377" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215380" comment="java-1_6_0-ibm-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215381" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215382" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215383" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215375" comment="java-1_7_0-ibm-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215376" comment="java-1_7_0-ibm-alsa-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215377" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215378" comment="java-1_7_0-ibm-plugin-1.7.0_sr7.1-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4220</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4220" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4220" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u60 and 8u5 allows remote attackers to affect integrity via unknown vectors related to Deployment, a different vulnerability than CVE-2014-4208.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4220.html">CVE-2014-4220</cve>
<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/891701">SUSE bug 891701</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215375" comment="java-1_7_0-ibm-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215377" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215375" comment="java-1_7_0-ibm-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215376" comment="java-1_7_0-ibm-alsa-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215377" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215378" comment="java-1_7_0-ibm-plugin-1.7.0_sr7.1-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4221</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4221" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4221" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u60 and 8u5 allows remote attackers to affect confidentiality via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4221.html">CVE-2014-4221</cve>
<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/891701">SUSE bug 891701</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215375" comment="java-1_7_0-ibm-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215377" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215375" comment="java-1_7_0-ibm-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215376" comment="java-1_7_0-ibm-alsa-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215377" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215378" comment="java-1_7_0-ibm-plugin-1.7.0_sr7.1-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4227</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4227" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4227" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u75, 7u60, and 8u5 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4227.html">CVE-2014-4227</cve>
<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/891700">SUSE bug 891700</bugzilla>
<bugzilla href="https://bugzilla.suse.com/891701">SUSE bug 891701</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215380" comment="java-1_6_0-ibm-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215381" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215382" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215375" comment="java-1_7_0-ibm-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215377" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215380" comment="java-1_6_0-ibm-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215381" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215382" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215383" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215375" comment="java-1_7_0-ibm-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215376" comment="java-1_7_0-ibm-alsa-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215377" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215378" comment="java-1_7_0-ibm-plugin-1.7.0_sr7.1-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4233</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4233" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4233" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.17 and earlier allows remote authenticated users to affect availability via vectors related to SRREP.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4233.html">CVE-2014-4233</cve>
<bugzilla href="https://bugzilla.suse.com/887580">SUSE bug 887580</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204617" comment="libmysql55client18-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204619" comment="libmysql55client_r18-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204620" comment="mysql-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204621" comment="mysql-client-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208743" comment="mysql-tools-5.5.39-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204617" comment="libmysql55client18-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204619" comment="libmysql55client_r18-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204620" comment="mysql-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204621" comment="mysql-client-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208743" comment="mysql-tools-5.5.39-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4238</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4238" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4238" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.17 and earlier allows remote authenticated users to affect availability via vectors related to SROPTZR.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4238.html">CVE-2014-4238</cve>
<bugzilla href="https://bugzilla.suse.com/887580">SUSE bug 887580</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204617" comment="libmysql55client18-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204619" comment="libmysql55client_r18-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204620" comment="mysql-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204621" comment="mysql-client-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208743" comment="mysql-tools-5.5.39-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204617" comment="libmysql55client18-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204619" comment="libmysql55client_r18-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204620" comment="mysql-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204621" comment="mysql-client-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208743" comment="mysql-tools-5.5.39-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4240</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4240" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4240" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.17 and earlier allows local users to affect confidentiality and integrity via vectors related to SRREP.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4240.html">CVE-2014-4240</cve>
<bugzilla href="https://bugzilla.suse.com/887580">SUSE bug 887580</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204617" comment="libmysql55client18-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204619" comment="libmysql55client_r18-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204620" comment="mysql-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204621" comment="mysql-client-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208743" comment="mysql-tools-5.5.39-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204617" comment="libmysql55client18-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204619" comment="libmysql55client_r18-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204620" comment="mysql-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204621" comment="mysql-client-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208743" comment="mysql-tools-5.5.39-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4243</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4243" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4243" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.35 and earlier and 5.6.15 and earlier allows remote authenticated users to affect availability via vectors related to ENFED.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4243.html">CVE-2014-4243</cve>
<bugzilla href="https://bugzilla.suse.com/887580">SUSE bug 887580</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204617" comment="libmysql55client18-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204619" comment="libmysql55client_r18-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204620" comment="mysql-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204621" comment="mysql-client-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208743" comment="mysql-tools-5.5.39-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204617" comment="libmysql55client18-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204619" comment="libmysql55client_r18-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204620" comment="mysql-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204621" comment="mysql-client-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208743" comment="mysql-tools-5.5.39-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4244</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4244" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4244" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5, and JRockit R27.8.2 and JRockit R28.3.2, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4244.html">CVE-2014-4244</cve>
<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/891699">SUSE bug 891699</bugzilla>
<bugzilla href="https://bugzilla.suse.com/891700">SUSE bug 891700</bugzilla>
<bugzilla href="https://bugzilla.suse.com/891701">SUSE bug 891701</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215380" comment="java-1_6_0-ibm-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215381" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215382" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215375" comment="java-1_7_0-ibm-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215377" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215380" comment="java-1_6_0-ibm-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215381" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215382" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215383" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215375" comment="java-1_7_0-ibm-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215376" comment="java-1_7_0-ibm-alsa-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215377" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215378" comment="java-1_7_0-ibm-plugin-1.7.0_sr7.1-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4252</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4252" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4252" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5 allows remote attackers to affect confidentiality via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4252.html">CVE-2014-4252</cve>
<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/891699">SUSE bug 891699</bugzilla>
<bugzilla href="https://bugzilla.suse.com/891700">SUSE bug 891700</bugzilla>
<bugzilla href="https://bugzilla.suse.com/891701">SUSE bug 891701</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215380" comment="java-1_6_0-ibm-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215381" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215382" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215375" comment="java-1_7_0-ibm-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215377" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215380" comment="java-1_6_0-ibm-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215381" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215382" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215383" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215375" comment="java-1_7_0-ibm-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215376" comment="java-1_7_0-ibm-alsa-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215377" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215378" comment="java-1_7_0-ibm-plugin-1.7.0_sr7.1-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4258</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4258" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4258" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier and 5.6.17 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SRINFOSC.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4258.html">CVE-2014-4258</cve>
<bugzilla href="https://bugzilla.suse.com/887580">SUSE bug 887580</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915914">SUSE bug 915914</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204617" comment="libmysql55client18-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204619" comment="libmysql55client_r18-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204620" comment="mysql-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204621" comment="mysql-client-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208743" comment="mysql-tools-5.5.39-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204617" comment="libmysql55client18-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204619" comment="libmysql55client_r18-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204620" comment="mysql-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204621" comment="mysql-client-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208743" comment="mysql-tools-5.5.39-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144260" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4260</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4260" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4260" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier, and 5.6.17 and earlier, allows remote authenticated users to affect integrity and availability via vectors related to SRCHAR.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4260.html">CVE-2014-4260</cve>
<bugzilla href="https://bugzilla.suse.com/887580">SUSE bug 887580</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915914">SUSE bug 915914</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204617" comment="libmysql55client18-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204619" comment="libmysql55client_r18-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204620" comment="mysql-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204621" comment="mysql-client-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208743" comment="mysql-tools-5.5.39-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204617" comment="libmysql55client18-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204618" comment="libmysql55client18-32bit-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208742" comment="libmysql55client18-x86-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204619" comment="libmysql55client_r18-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204620" comment="mysql-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204621" comment="mysql-client-5.5.39-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208743" comment="mysql-tools-5.5.39-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4262</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4262" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4262" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4262.html">CVE-2014-4262</cve>
<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/891699">SUSE bug 891699</bugzilla>
<bugzilla href="https://bugzilla.suse.com/891700">SUSE bug 891700</bugzilla>
<bugzilla href="https://bugzilla.suse.com/891701">SUSE bug 891701</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215380" comment="java-1_6_0-ibm-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215381" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215382" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215375" comment="java-1_7_0-ibm-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215377" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215380" comment="java-1_6_0-ibm-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215381" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215382" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215383" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215375" comment="java-1_7_0-ibm-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215376" comment="java-1_7_0-ibm-alsa-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215377" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215378" comment="java-1_7_0-ibm-plugin-1.7.0_sr7.1-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4263</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4263" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4263" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5, and JRockit R27.8.2 and R28.3.2, allows remote attackers to affect confidentiality and integrity via unknown vectors related to "Diffie-Hellman key agreement."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4263.html">CVE-2014-4263</cve>
<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/891699">SUSE bug 891699</bugzilla>
<bugzilla href="https://bugzilla.suse.com/891700">SUSE bug 891700</bugzilla>
<bugzilla href="https://bugzilla.suse.com/891701">SUSE bug 891701</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215380" comment="java-1_6_0-ibm-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215381" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215382" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215375" comment="java-1_7_0-ibm-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215377" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215380" comment="java-1_6_0-ibm-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215381" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215382" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215383" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215375" comment="java-1_7_0-ibm-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215376" comment="java-1_7_0-ibm-alsa-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215377" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215378" comment="java-1_7_0-ibm-plugin-1.7.0_sr7.1-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4265</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4265" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4265" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u75, 7u60, and 8u5 allows remote attackers to affect integrity via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4265.html">CVE-2014-4265</cve>
<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/891700">SUSE bug 891700</bugzilla>
<bugzilla href="https://bugzilla.suse.com/891701">SUSE bug 891701</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215380" comment="java-1_6_0-ibm-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215381" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215382" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215375" comment="java-1_7_0-ibm-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215377" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215380" comment="java-1_6_0-ibm-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215381" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215382" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215383" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215375" comment="java-1_7_0-ibm-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215376" comment="java-1_7_0-ibm-alsa-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215377" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215378" comment="java-1_7_0-ibm-plugin-1.7.0_sr7.1-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4266</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4266" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4266" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u60 and 8u5 allows remote attackers to affect integrity via unknown vectors related to Serviceability.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4266.html">CVE-2014-4266</cve>
<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/891701">SUSE bug 891701</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215375" comment="java-1_7_0-ibm-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215377" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215375" comment="java-1_7_0-ibm-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215376" comment="java-1_7_0-ibm-alsa-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215377" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215378" comment="java-1_7_0-ibm-plugin-1.7.0_sr7.1-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4268</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4268" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4268" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5 allows remote attackers to affect confidentiality via unknown vectors related to Swing.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4268.html">CVE-2014-4268</cve>
<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/891699">SUSE bug 891699</bugzilla>
<bugzilla href="https://bugzilla.suse.com/891700">SUSE bug 891700</bugzilla>
<bugzilla href="https://bugzilla.suse.com/891701">SUSE bug 891701</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215380" comment="java-1_6_0-ibm-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215381" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215382" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215375" comment="java-1_7_0-ibm-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215377" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215380" comment="java-1_6_0-ibm-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215381" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215382" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215383" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.1-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215375" comment="java-1_7_0-ibm-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215376" comment="java-1_7_0-ibm-alsa-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215377" comment="java-1_7_0-ibm-jdbc-1.7.0_sr7.1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215378" comment="java-1_7_0-ibm-plugin-1.7.0_sr7.1-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4274</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4274" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4274" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to SERVER:MyISAM.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4274.html">CVE-2014-4274</cve>
<bugzilla href="https://bugzilla.suse.com/857678">SUSE bug 857678</bugzilla>
<bugzilla href="https://bugzilla.suse.com/896400">SUSE bug 896400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264365" comment="libmysql55client18-x86-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4287</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4287" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4287" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:CHARACTER SETS.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4287.html">CVE-2014-4287</cve>
<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264365" comment="libmysql55client18-x86-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4288</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4288" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4288" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2014-6493, CVE-2014-6503, and CVE-2014-6532.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4288.html">CVE-2014-4288</cve>
<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201722" comment="java-1_6_0-ibm-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201724" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208544" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208552" comment="java-1_7_0-ibm-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208554" comment="java-1_7_0-ibm-jdbc-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201722" comment="java-1_6_0-ibm-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201724" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208544" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208552" comment="java-1_7_0-ibm-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208554" comment="java-1_7_0-ibm-jdbc-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4330</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4330" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4330" source="CVE"/>
    <description>
    The Dumper method in Data::Dumper before 2.154, as used in Perl 5.20.1 and earlier, allows context-dependent attackers to cause a denial of service (stack consumption and crash) via an Array-Reference with many nested Array-References, which triggers a large number of recursive calls to the DD_dump function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4330.html">CVE-2014-4330</cve>
<bugzilla href="https://bugzilla.suse.com/896715">SUSE bug 896715</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204745" comment="perl-5.10.0-64.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204746" comment="perl-32bit-5.10.0-64.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204747" comment="perl-Module-Build-0.2808.01-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204748" comment="perl-Test-Simple-0.72-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204749" comment="perl-base-5.10.0-64.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204750" comment="perl-doc-5.10.0-64.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208808" comment="perl-x86-5.10.0-64.70 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204745" comment="perl-5.10.0-64.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204746" comment="perl-32bit-5.10.0-64.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204747" comment="perl-Module-Build-0.2808.01-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204748" comment="perl-Test-Simple-0.72-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204749" comment="perl-base-5.10.0-64.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204750" comment="perl-doc-5.10.0-64.70 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4341</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4341" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4341" source="CVE"/>
    <description>
    MIT Kerberos 5 (aka krb5) before 1.12.2 allows remote attackers to cause a denial of service (buffer over-read and application crash) by injecting invalid tokens into a GSSAPI application session.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4341.html">CVE-2014-4341</cve>
<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
<bugzilla href="https://bugzilla.suse.com/886016">SUSE bug 886016</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215385" comment="krb5-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204565" comment="krb5-32bit-1.6.3-133.49.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215388" comment="krb5-apps-clients-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215389" comment="krb5-apps-servers-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215387" comment="krb5-client-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215390" comment="krb5-doc-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215391" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215392" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215393" comment="krb5-server-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208704" comment="krb5-x86-1.6.3-133.49.62 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215385" comment="krb5-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215386" comment="krb5-32bit-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215388" comment="krb5-apps-clients-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215389" comment="krb5-apps-servers-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215387" comment="krb5-client-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215390" comment="krb5-doc-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215391" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215392" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215393" comment="krb5-server-1.6.3-133.49.60 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4342</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4342" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4342" source="CVE"/>
    <description>
    MIT Kerberos 5 (aka krb5) 1.7.x through 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (buffer over-read or NULL pointer dereference, and application crash) by injecting invalid tokens into a GSSAPI application session.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4342.html">CVE-2014-4342</cve>
<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
<bugzilla href="https://bugzilla.suse.com/886016">SUSE bug 886016</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215385" comment="krb5-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204565" comment="krb5-32bit-1.6.3-133.49.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215388" comment="krb5-apps-clients-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215389" comment="krb5-apps-servers-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215387" comment="krb5-client-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215390" comment="krb5-doc-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215391" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215392" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215393" comment="krb5-server-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208704" comment="krb5-x86-1.6.3-133.49.62 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215385" comment="krb5-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215386" comment="krb5-32bit-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215388" comment="krb5-apps-clients-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215389" comment="krb5-apps-servers-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215387" comment="krb5-client-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215390" comment="krb5-doc-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215391" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215392" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215393" comment="krb5-server-1.6.3-133.49.60 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4343</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4343" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4343" source="CVE"/>
    <description>
    Double free vulnerability in the init_ctx_reselect function in the SPNEGO initiator in lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) 1.10.x through 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via network traffic that appears to come from an intended acceptor, but specifies a security mechanism different from the one proposed by the initiator.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4343.html">CVE-2014-4343</cve>
<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
<bugzilla href="https://bugzilla.suse.com/888697">SUSE bug 888697</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215385" comment="krb5-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204565" comment="krb5-32bit-1.6.3-133.49.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215388" comment="krb5-apps-clients-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215389" comment="krb5-apps-servers-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215387" comment="krb5-client-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215390" comment="krb5-doc-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215391" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215392" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215393" comment="krb5-server-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208704" comment="krb5-x86-1.6.3-133.49.62 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215385" comment="krb5-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215386" comment="krb5-32bit-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215388" comment="krb5-apps-clients-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215389" comment="krb5-apps-servers-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215387" comment="krb5-client-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215390" comment="krb5-doc-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215391" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215392" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215393" comment="krb5-server-1.6.3-133.49.60 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4344</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4344" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4344" source="CVE"/>
    <description>
    The acc_ctx_cont function in the SPNEGO acceptor in lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) 1.5.x through 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty continuation token at a certain point during a SPNEGO negotiation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4344.html">CVE-2014-4344</cve>
<bugzilla href="https://bugzilla.suse.com/888697">SUSE bug 888697</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215385" comment="krb5-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204565" comment="krb5-32bit-1.6.3-133.49.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215388" comment="krb5-apps-clients-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215389" comment="krb5-apps-servers-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215387" comment="krb5-client-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215390" comment="krb5-doc-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215391" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215392" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215393" comment="krb5-server-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208704" comment="krb5-x86-1.6.3-133.49.62 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215385" comment="krb5-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215386" comment="krb5-32bit-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215388" comment="krb5-apps-clients-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215389" comment="krb5-apps-servers-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215387" comment="krb5-client-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215390" comment="krb5-doc-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215391" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215392" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215393" comment="krb5-server-1.6.3-133.49.60 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4345</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4345" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345" source="CVE"/>
    <description>
    Off-by-one error in the krb5_encode_krbsecretkey function in plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in the LDAP KDB module in kadmind in MIT Kerberos 5 (aka krb5) 1.6.x through 1.11.x before 1.11.6 and 1.12.x before 1.12.2 allows remote authenticated users to cause a denial of service (buffer overflow) or possibly execute arbitrary code via a series of "cpw -keepold" commands.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4345.html">CVE-2014-4345</cve>
<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
<bugzilla href="https://bugzilla.suse.com/891082">SUSE bug 891082</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204564" comment="krb5-1.6.3-133.49.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204565" comment="krb5-32bit-1.6.3-133.49.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208699" comment="krb5-apps-clients-1.6.3-133.49.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208700" comment="krb5-apps-servers-1.6.3-133.49.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204566" comment="krb5-client-1.6.3-133.49.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208701" comment="krb5-doc-1.6.3-133.49.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208702" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208703" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201743" comment="krb5-server-1.6.3-133.49.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208704" comment="krb5-x86-1.6.3-133.49.62 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204564" comment="krb5-1.6.3-133.49.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204565" comment="krb5-32bit-1.6.3-133.49.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208699" comment="krb5-apps-clients-1.6.3-133.49.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208700" comment="krb5-apps-servers-1.6.3-133.49.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204566" comment="krb5-client-1.6.3-133.49.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208701" comment="krb5-doc-1.6.3-133.49.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208702" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208703" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201743" comment="krb5-server-1.6.3-133.49.62 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4508</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4508" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508" source="CVE"/>
    <description>
    arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the sep CPU feature flag is set, allows local users to cause a denial of service (OOPS and system crash) via an invalid syscall number, as demonstrated by number 1000.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4508.html">CVE-2014-4508</cve>
<bugzilla href="https://bugzilla.suse.com/883724">SUSE bug 883724</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208673" comment="iscsitarget-kmp-bigsmp-1.4.20_3.0.101_0.40-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213245" comment="kernel-default-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213246" comment="kernel-default-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213247" comment="kernel-default-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264361" comment="kernel-default-man-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213309" comment="kernel-ec2-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213310" comment="kernel-ec2-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213311" comment="kernel-ec2-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264348" comment="kernel-pae-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264349" comment="kernel-pae-base-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264350" comment="kernel-pae-devel-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264362" comment="kernel-ppc64-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264363" comment="kernel-ppc64-base-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264364" comment="kernel-ppc64-devel-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213249" comment="kernel-source-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213250" comment="kernel-syms-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213312" comment="kernel-trace-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213313" comment="kernel-trace-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213251" comment="kernel-trace-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213252" comment="kernel-xen-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213253" comment="kernel-xen-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213254" comment="kernel-xen-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208676" comment="ofed-kmp-bigsmp-1.5.4.1_3.0.101_0.40-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208677" comment="oracleasm-kmp-bigsmp-2.0.5_3.0.101_0.40-7.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213256" comment="xen-kmp-default-4.2.5_02_3.0.101_0.46-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264352" comment="xen-kmp-pae-4.2.5_02_3.0.101_0.42-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4607</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4607" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4607" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4607.html">CVE-2014-4607</cve>
<bugzilla href="https://bugzilla.suse.com/883947">SUSE bug 883947</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200245" comment="liblzo2-2-2.03-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200246" comment="liblzo2-2-32bit-2.03-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200247" comment="liblzo2-2-x86-2.03-12.3 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200245" comment="liblzo2-2-2.03-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200246" comment="liblzo2-2-32bit-2.03-12.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4608</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4608" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4608" source="CVE"/>
    <description>
    ** DISPUTED ** Multiple integer overflows in the lzo1x_decompress_safe function in lib/lzo/lzo1x_decompress_safe.c in the LZO decompressor in the Linux kernel before 3.15.2 allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Literal Run.  NOTE: the author of the LZO algorithms says "the Linux kernel is *not* affected; media hype."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4608.html">CVE-2014-4608</cve>
<bugzilla href="https://bugzilla.suse.com/883948">SUSE bug 883948</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214952" comment="kernel-bigsmp-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214953" comment="kernel-bigsmp-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214910" comment="kernel-bigsmp-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214911" comment="kernel-default-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214912" comment="kernel-default-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214913" comment="kernel-default-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264496" comment="kernel-default-man-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214954" comment="kernel-ec2-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214955" comment="kernel-ec2-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214956" comment="kernel-ec2-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264488" comment="kernel-pae-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264489" comment="kernel-pae-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264490" comment="kernel-pae-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264497" comment="kernel-ppc64-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264498" comment="kernel-ppc64-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264499" comment="kernel-ppc64-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214915" comment="kernel-source-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214916" comment="kernel-syms-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214957" comment="kernel-trace-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214958" comment="kernel-trace-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214917" comment="kernel-trace-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214918" comment="kernel-xen-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214919" comment="kernel-xen-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214920" comment="kernel-xen-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214922" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.50-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264492" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.50-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4617</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4617" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4617" source="CVE"/>
    <description>
    The do_uncompress function in g10/compress.c in GnuPG 1.x before 1.4.17 and 2.x before 2.0.24 allows context-dependent attackers to cause a denial of service (infinite loop) via malformed compressed packets, as demonstrated by an a3 01 5b ff byte sequence.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4617.html">CVE-2014-4617</cve>
<bugzilla href="https://bugzilla.suse.com/884130">SUSE bug 884130</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200066" comment="gpg2-2.0.9-25.33.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200067" comment="gpg2-lang-2.0.9-25.33.39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4650</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4650" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4650" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4650.html">CVE-2014-4650</cve>
<bugzilla href="https://bugzilla.suse.com/885882">SUSE bug 885882</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204793" comment="libpython2_6-1_0-2.6.9-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204794" comment="libpython2_6-1_0-32bit-2.6.9-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204795" comment="python-2.6.9-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202024" comment="python-32bit-2.6.9-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204796" comment="python-base-2.6.9-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204797" comment="python-base-32bit-2.6.9-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204798" comment="python-curses-2.6.9-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202025" comment="python-demo-2.6.9-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202027" comment="python-doc-2.6-8.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202028" comment="python-doc-pdf-2.6-8.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202029" comment="python-gdbm-2.6.9-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202030" comment="python-idle-2.6.9-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202031" comment="python-tk-2.6.9-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204799" comment="python-xml-2.6.9-0.31 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204793" comment="libpython2_6-1_0-2.6.9-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204794" comment="libpython2_6-1_0-32bit-2.6.9-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208963" comment="libpython2_6-1_0-x86-2.6.9-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204795" comment="python-2.6.9-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202024" comment="python-32bit-2.6.9-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204796" comment="python-base-2.6.9-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204797" comment="python-base-32bit-2.6.9-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208964" comment="python-base-x86-2.6.9-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204798" comment="python-curses-2.6.9-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202025" comment="python-demo-2.6.9-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202027" comment="python-doc-2.6-8.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202028" comment="python-doc-pdf-2.6-8.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202029" comment="python-gdbm-2.6.9-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202030" comment="python-idle-2.6.9-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202031" comment="python-tk-2.6.9-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208965" comment="python-x86-2.6.9-0.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204799" comment="python-xml-2.6.9-0.31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4652</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4652" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4652" source="CVE"/>
    <description>
    Race condition in the tlv handler functionality in the snd_ctl_elem_user_tlv function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 allows local users to obtain sensitive information from kernel memory by leveraging /dev/snd/controlCX access.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4652.html">CVE-2014-4652</cve>
<bugzilla href="https://bugzilla.suse.com/883795">SUSE bug 883795</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213024" comment="kernel-default-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213025" comment="kernel-default-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213026" comment="kernel-default-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213028" comment="kernel-source-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213029" comment="kernel-syms-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213088" comment="kernel-trace-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213089" comment="kernel-trace-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213030" comment="kernel-trace-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4653</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4653" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4653" source="CVE"/>
    <description>
    sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not ensure possession of a read/write lock, which allows local users to cause a denial of service (use-after-free) and obtain sensitive information from kernel memory by leveraging /dev/snd/controlCX access.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4653.html">CVE-2014-4653</cve>
<bugzilla href="https://bugzilla.suse.com/883795">SUSE bug 883795</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213024" comment="kernel-default-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213025" comment="kernel-default-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213026" comment="kernel-default-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213028" comment="kernel-source-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213029" comment="kernel-syms-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213088" comment="kernel-trace-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213089" comment="kernel-trace-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213030" comment="kernel-trace-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4654</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4654" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4654" source="CVE"/>
    <description>
    The snd_ctl_elem_add function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not check authorization for SNDRV_CTL_IOCTL_ELEM_REPLACE commands, which allows local users to remove kernel controls and cause a denial of service (use-after-free and system crash) by leveraging /dev/snd/controlCX access for an ioctl call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4654.html">CVE-2014-4654</cve>
<bugzilla href="https://bugzilla.suse.com/883795">SUSE bug 883795</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213024" comment="kernel-default-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213025" comment="kernel-default-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213026" comment="kernel-default-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213028" comment="kernel-source-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213029" comment="kernel-syms-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213088" comment="kernel-trace-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213089" comment="kernel-trace-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213030" comment="kernel-trace-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4655</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4655" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4655" source="CVE"/>
    <description>
    The snd_ctl_elem_add function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not properly maintain the user_ctl_count value, which allows local users to cause a denial of service (integer overflow and limit bypass) by leveraging /dev/snd/controlCX access for a large number of SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl calls.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4655.html">CVE-2014-4655</cve>
<bugzilla href="https://bugzilla.suse.com/883795">SUSE bug 883795</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213024" comment="kernel-default-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213025" comment="kernel-default-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213026" comment="kernel-default-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213028" comment="kernel-source-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213029" comment="kernel-syms-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213088" comment="kernel-trace-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213089" comment="kernel-trace-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213030" comment="kernel-trace-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4656</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4656" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4656" source="CVE"/>
    <description>
    Multiple integer overflows in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 allow local users to cause a denial of service by leveraging /dev/snd/controlCX access, related to (1) index values in the snd_ctl_add function and (2) numid values in the snd_ctl_remove_numid_conflict function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4656.html">CVE-2014-4656</cve>
<bugzilla href="https://bugzilla.suse.com/883795">SUSE bug 883795</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213024" comment="kernel-default-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213025" comment="kernel-default-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213026" comment="kernel-default-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213028" comment="kernel-source-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213029" comment="kernel-syms-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213088" comment="kernel-trace-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213089" comment="kernel-trace-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213030" comment="kernel-trace-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4667</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4667" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667" source="CVE"/>
    <description>
    The sctp_association_free function in net/sctp/associola.c in the Linux kernel before 3.15.2 does not properly manage a certain backlog value, which allows remote attackers to cause a denial of service (socket outage) via a crafted SCTP packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4667.html">CVE-2014-4667</cve>
<bugzilla href="https://bugzilla.suse.com/885422">SUSE bug 885422</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208673" comment="iscsitarget-kmp-bigsmp-1.4.20_3.0.101_0.40-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204510" comment="kernel-default-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204511" comment="kernel-default-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204512" comment="kernel-default-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204518" comment="kernel-source-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204519" comment="kernel-syms-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208596" comment="kernel-trace-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208597" comment="kernel-trace-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204520" comment="kernel-trace-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208676" comment="ofed-kmp-bigsmp-1.5.4.1_3.0.101_0.40-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208677" comment="oracleasm-kmp-bigsmp-2.0.5_3.0.101_0.40-7.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4670</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4670" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4670" source="CVE"/>
    <description>
    Use-after-free vulnerability in ext/spl/spl_dllist.c in the SPL component in PHP through 5.5.14 allows context-dependent attackers to cause a denial of service or possibly have unspecified other impact via crafted iterator usage within applications in certain web-hosting environments.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4670.html">CVE-2014-4670</cve>
<bugzilla href="https://bugzilla.suse.com/886059">SUSE bug 886059</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215010" comment="apache2-mod_php53-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215011" comment="php53-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215012" comment="php53-bcmath-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215013" comment="php53-bz2-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215014" comment="php53-calendar-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215015" comment="php53-ctype-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215016" comment="php53-curl-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215017" comment="php53-dba-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215018" comment="php53-dom-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215019" comment="php53-exif-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215020" comment="php53-fastcgi-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215021" comment="php53-fileinfo-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215022" comment="php53-ftp-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215023" comment="php53-gd-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215024" comment="php53-gettext-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215025" comment="php53-gmp-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215026" comment="php53-iconv-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215027" comment="php53-intl-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215028" comment="php53-json-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215029" comment="php53-ldap-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215030" comment="php53-mbstring-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215031" comment="php53-mcrypt-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215032" comment="php53-mysql-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215033" comment="php53-odbc-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215034" comment="php53-openssl-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215035" comment="php53-pcntl-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215036" comment="php53-pdo-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215037" comment="php53-pear-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215038" comment="php53-pgsql-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215039" comment="php53-pspell-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215040" comment="php53-shmop-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215041" comment="php53-snmp-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215042" comment="php53-soap-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215043" comment="php53-suhosin-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215044" comment="php53-sysvmsg-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215045" comment="php53-sysvsem-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215046" comment="php53-sysvshm-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215047" comment="php53-tokenizer-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215048" comment="php53-wddx-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215049" comment="php53-xmlreader-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215050" comment="php53-xmlrpc-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215051" comment="php53-xmlwriter-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215052" comment="php53-xsl-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215053" comment="php53-zip-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215054" comment="php53-zlib-5.3.17-0.27 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4698</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4698" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4698" source="CVE"/>
    <description>
    Use-after-free vulnerability in ext/spl/spl_array.c in the SPL component in PHP through 5.5.14 allows context-dependent attackers to cause a denial of service or possibly have unspecified other impact via crafted ArrayIterator usage within applications in certain web-hosting environments.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4698.html">CVE-2014-4698</cve>
<bugzilla href="https://bugzilla.suse.com/886060">SUSE bug 886060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215010" comment="apache2-mod_php53-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215011" comment="php53-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215012" comment="php53-bcmath-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215013" comment="php53-bz2-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215014" comment="php53-calendar-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215015" comment="php53-ctype-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215016" comment="php53-curl-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215017" comment="php53-dba-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215018" comment="php53-dom-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215019" comment="php53-exif-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215020" comment="php53-fastcgi-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215021" comment="php53-fileinfo-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215022" comment="php53-ftp-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215023" comment="php53-gd-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215024" comment="php53-gettext-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215025" comment="php53-gmp-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215026" comment="php53-iconv-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215027" comment="php53-intl-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215028" comment="php53-json-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215029" comment="php53-ldap-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215030" comment="php53-mbstring-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215031" comment="php53-mcrypt-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215032" comment="php53-mysql-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215033" comment="php53-odbc-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215034" comment="php53-openssl-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215035" comment="php53-pcntl-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215036" comment="php53-pdo-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215037" comment="php53-pear-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215038" comment="php53-pgsql-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215039" comment="php53-pspell-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215040" comment="php53-shmop-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215041" comment="php53-snmp-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215042" comment="php53-soap-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215043" comment="php53-suhosin-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215044" comment="php53-sysvmsg-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215045" comment="php53-sysvsem-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215046" comment="php53-sysvshm-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215047" comment="php53-tokenizer-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215048" comment="php53-wddx-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215049" comment="php53-xmlreader-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215050" comment="php53-xmlrpc-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215051" comment="php53-xmlwriter-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215052" comment="php53-xsl-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215053" comment="php53-zip-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215054" comment="php53-zlib-5.3.17-0.27 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4699</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4699" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4699" source="CVE"/>
    <description>
    The Linux kernel before 3.15.4 on Intel processors does not properly restrict use of a non-canonical value for the saved RIP address in the case of a system call that does not use IRET, which allows local users to leverage a race condition and gain privileges, or cause a denial of service (double fault), via a crafted application that makes ptrace and fork system calls.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4699.html">CVE-2014-4699</cve>
<bugzilla href="https://bugzilla.suse.com/885725">SUSE bug 885725</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213024" comment="kernel-default-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213025" comment="kernel-default-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213026" comment="kernel-default-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213028" comment="kernel-source-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213029" comment="kernel-syms-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213088" comment="kernel-trace-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213089" comment="kernel-trace-base-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213030" comment="kernel-trace-devel-3.0.101-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4701</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4701" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4701" source="CVE"/>
    <description>
    The check_dhcp plugin in Nagios Plugins before 2.0.2 allows local users to obtain sensitive information from INI configuration files via the extra-opts flag, a different vulnerability than CVE-2014-4702.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4701.html">CVE-2014-4701</cve>
<bugzilla href="https://bugzilla.suse.com/885205">SUSE bug 885205</bugzilla>
<bugzilla href="https://bugzilla.suse.com/885207">SUSE bug 885207</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200371" comment="nagios-plugins-1.4.16-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200372" comment="nagios-plugins-extras-1.4.16-0.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4702</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4702" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4702" source="CVE"/>
    <description>
    The check_icmp plugin in Nagios Plugins before 2.0.2 allows local users to obtain sensitive information from INI configuration files via the extra-opts flag, a different vulnerability than CVE-2014-4701.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4702.html">CVE-2014-4702</cve>
<bugzilla href="https://bugzilla.suse.com/885207">SUSE bug 885207</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200371" comment="nagios-plugins-1.4.16-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200372" comment="nagios-plugins-extras-1.4.16-0.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4721</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4721" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4721" source="CVE"/>
    <description>
    The phpinfo implementation in ext/standard/info.c in PHP before 5.4.30 and 5.5.x before 5.5.14 does not ensure use of the string data type for the PHP_AUTH_PW, PHP_AUTH_TYPE, PHP_AUTH_USER, and PHP_SELF variables, which might allow context-dependent attackers to obtain sensitive information from process memory by using the integer data type with crafted values, related to a "type confusion" vulnerability, as demonstrated by reading a private SSL key in an Apache HTTP Server web-hosting environment with mod_ssl and a PHP 5.3.x mod_php.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4721.html">CVE-2014-4721</cve>
<bugzilla href="https://bugzilla.suse.com/885961">SUSE bug 885961</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215010" comment="apache2-mod_php53-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215011" comment="php53-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215012" comment="php53-bcmath-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215013" comment="php53-bz2-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215014" comment="php53-calendar-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215015" comment="php53-ctype-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215016" comment="php53-curl-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215017" comment="php53-dba-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215018" comment="php53-dom-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215019" comment="php53-exif-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215020" comment="php53-fastcgi-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215021" comment="php53-fileinfo-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215022" comment="php53-ftp-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215023" comment="php53-gd-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215024" comment="php53-gettext-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215025" comment="php53-gmp-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215026" comment="php53-iconv-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215027" comment="php53-intl-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215028" comment="php53-json-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215029" comment="php53-ldap-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215030" comment="php53-mbstring-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215031" comment="php53-mcrypt-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215032" comment="php53-mysql-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215033" comment="php53-odbc-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215034" comment="php53-openssl-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215035" comment="php53-pcntl-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215036" comment="php53-pdo-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215037" comment="php53-pear-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215038" comment="php53-pgsql-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215039" comment="php53-pspell-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215040" comment="php53-shmop-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215041" comment="php53-snmp-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215042" comment="php53-soap-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215043" comment="php53-suhosin-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215044" comment="php53-sysvmsg-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215045" comment="php53-sysvsem-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215046" comment="php53-sysvshm-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215047" comment="php53-tokenizer-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215048" comment="php53-wddx-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215049" comment="php53-xmlreader-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215050" comment="php53-xmlrpc-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215051" comment="php53-xmlwriter-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215052" comment="php53-xsl-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215053" comment="php53-zip-5.3.17-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215054" comment="php53-zlib-5.3.17-0.27 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4877</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4877" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4877" source="CVE"/>
    <description>
    Absolute path traversal vulnerability in GNU Wget before 1.16, when recursion is enabled, allows remote FTP servers to write to arbitrary files, and consequently execute arbitrary code, via a LIST response that references the same filename within two entries, one of which indicates that the filename is for a symlink.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4877.html">CVE-2014-4877</cve>
<bugzilla href="https://bugzilla.suse.com/902709">SUSE bug 902709</bugzilla>
<bugzilla href="https://bugzilla.suse.com/910180">SUSE bug 910180</bugzilla>
<bugzilla href="https://bugzilla.suse.com/911056">SUSE bug 911056</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915835">SUSE bug 915835</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200470" comment="wget-1.11.4-1.19 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144943" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4943</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-4943" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943" source="CVE"/>
    <description>
    The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux kernel through 3.15.6 allows local users to gain privileges by leveraging data-structure differences between an l2tp socket and an inet socket.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4943.html">CVE-2014-4943</cve>
<bugzilla href="https://bugzilla.suse.com/887082">SUSE bug 887082</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208673" comment="iscsitarget-kmp-bigsmp-1.4.20_3.0.101_0.40-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204510" comment="kernel-default-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204511" comment="kernel-default-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204512" comment="kernel-default-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204518" comment="kernel-source-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204519" comment="kernel-syms-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208596" comment="kernel-trace-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208597" comment="kernel-trace-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204520" comment="kernel-trace-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208676" comment="ofed-kmp-bigsmp-1.5.4.1_3.0.101_0.40-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208677" comment="oracleasm-kmp-bigsmp-2.0.5_3.0.101_0.40-7.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5029</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-5029" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029" source="CVE"/>
    <description>
    The web interface in CUPS 1.7.4 allows local users in the lp group to read arbitrary files via a symlink attack on a file in /var/cache/cups/rss/ and language[0] set to null.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3537.
    </description>
<advisory from="security@suse.de">
<cve href="https://www.suse.com/security/cve/CVE-2014-5029.html">CVE-2014-5029</cve>
<bugzilla href="https://bugzilla.suse.com/887240">SUSE bug 887240</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204260" comment="cups-1.3.9-8.46.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204261" comment="cups-client-1.3.9-8.46.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204262" comment="cups-libs-1.3.9-8.46.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204263" comment="cups-libs-32bit-1.3.9-8.46.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208451" comment="cups-libs-x86-1.3.9-8.46.52 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204260" comment="cups-1.3.9-8.46.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204261" comment="cups-client-1.3.9-8.46.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204262" comment="cups-libs-1.3.9-8.46.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204263" comment="cups-libs-32bit-1.3.9-8.46.52 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5030</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-5030" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030" source="CVE"/>
    <description>
    CUPS before 2.0 allows local users to read arbitrary files via a symlink attack on (1) index.html, (2) index.class, (3) index.pl, (4) index.php, (5) index.pyc, or (6) index.py.
    </description>
<advisory from="security@suse.de">
<cve href="https://www.suse.com/security/cve/CVE-2014-5030.html">CVE-2014-5030</cve>
<bugzilla href="https://bugzilla.suse.com/887240">SUSE bug 887240</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204260" comment="cups-1.3.9-8.46.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204261" comment="cups-client-1.3.9-8.46.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204262" comment="cups-libs-1.3.9-8.46.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204263" comment="cups-libs-32bit-1.3.9-8.46.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208451" comment="cups-libs-x86-1.3.9-8.46.52 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204260" comment="cups-1.3.9-8.46.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204261" comment="cups-client-1.3.9-8.46.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204262" comment="cups-libs-1.3.9-8.46.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204263" comment="cups-libs-32bit-1.3.9-8.46.52 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5031</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-5031" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031" source="CVE"/>
    <description>
    The web interface in CUPS before 2.0 does not check that files have world-readable permissions, which allows remote attackers to obtains sensitive information via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<cve href="https://www.suse.com/security/cve/CVE-2014-5031.html">CVE-2014-5031</cve>
<bugzilla href="https://bugzilla.suse.com/887240">SUSE bug 887240</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204260" comment="cups-1.3.9-8.46.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204261" comment="cups-client-1.3.9-8.46.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204262" comment="cups-libs-1.3.9-8.46.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204263" comment="cups-libs-32bit-1.3.9-8.46.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208451" comment="cups-libs-x86-1.3.9-8.46.52 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204260" comment="cups-1.3.9-8.46.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204261" comment="cups-client-1.3.9-8.46.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204262" comment="cups-libs-1.3.9-8.46.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204263" comment="cups-libs-32bit-1.3.9-8.46.52 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5044</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-5044" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5044" source="CVE"/>
    <description>
    Multiple integer overflows in libgfortran might allow remote attackers to execute arbitrary code or cause a denial of service (Fortran application crash) via vectors related to array allocation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-5044.html">CVE-2014-5044</cve>
<bugzilla href="https://bugzilla.suse.com/888791">SUSE bug 888791</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202571" comment="cpp48-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202572" comment="gcc48-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202573" comment="gcc48-32bit-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202574" comment="gcc48-c++-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202575" comment="gcc48-fortran-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202576" comment="gcc48-fortran-32bit-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202577" comment="gcc48-info-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202578" comment="gcc48-locale-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202579" comment="libasan0-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202580" comment="libasan0-32bit-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247925" comment="libatomic1-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247926" comment="libatomic1-32bit-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247927" comment="libgcc_s1-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247928" comment="libgcc_s1-32bit-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247929" comment="libgfortran3-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247930" comment="libgfortran3-32bit-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247931" comment="libgomp1-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247932" comment="libgomp1-32bit-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247933" comment="libitm1-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247934" comment="libitm1-32bit-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247935" comment="libmpfr4-3.1.2-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247936" comment="libquadmath0-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247937" comment="libquadmath0-32bit-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202581" comment="libstdc++48-devel-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202582" comment="libstdc++48-devel-32bit-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247938" comment="libstdc++6-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247939" comment="libstdc++6-32bit-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247940" comment="libtsan0-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247941" comment="mpfr-3.1.2-3.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5077</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-5077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077" source="CVE"/>
    <description>
    The sctp_assoc_update function in net/sctp/associola.c in the Linux kernel through 3.15.8, when SCTP authentication is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by starting to establish an association between two endpoints immediately after an exchange of INIT and INIT ACK chunks to establish an earlier association between these endpoints in the opposite direction.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-5077.html">CVE-2014-5077</cve>
<bugzilla href="https://bugzilla.suse.com/889173">SUSE bug 889173</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208673" comment="iscsitarget-kmp-bigsmp-1.4.20_3.0.101_0.40-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204510" comment="kernel-default-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204511" comment="kernel-default-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204512" comment="kernel-default-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204518" comment="kernel-source-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204519" comment="kernel-syms-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208596" comment="kernel-trace-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208597" comment="kernel-trace-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204520" comment="kernel-trace-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208676" comment="ofed-kmp-bigsmp-1.5.4.1_3.0.101_0.40-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208677" comment="oracleasm-kmp-bigsmp-2.0.5_3.0.101_0.40-7.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5118</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-5118" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5118" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-5118.html">CVE-2014-5118</cve>
<bugzilla href="https://bugzilla.suse.com/1068390">SUSE bug 1068390</bugzilla>
<bugzilla href="https://bugzilla.suse.com/889339">SUSE bug 889339</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210821" comment="tboot-20120115_1.7.0-0.5.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5119</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-5119" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5119" source="CVE"/>
    <description>
    Off-by-one error in the __gconv_translit_find function in gconv_trans.c in GNU C Library (aka glibc) allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via vectors related to the CHARSET environment variable and gconv transliteration modules.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-5119.html">CVE-2014-5119</cve>
<bugzilla href="https://bugzilla.suse.com/892073">SUSE bug 892073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/903057">SUSE bug 903057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/916222">SUSE bug 916222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/920055">SUSE bug 920055</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204401" comment="glibc-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204402" comment="glibc-32bit-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204403" comment="glibc-devel-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204404" comment="glibc-devel-32bit-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201688" comment="glibc-html-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204405" comment="glibc-i18ndata-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201689" comment="glibc-info-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204406" comment="glibc-locale-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204407" comment="glibc-locale-32bit-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208499" comment="glibc-locale-x86-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208500" comment="glibc-profile-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208501" comment="glibc-profile-32bit-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208502" comment="glibc-profile-x86-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208503" comment="glibc-x86-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204408" comment="nscd-2.11.3-17.72 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204401" comment="glibc-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204402" comment="glibc-32bit-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204403" comment="glibc-devel-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204404" comment="glibc-devel-32bit-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201688" comment="glibc-html-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204405" comment="glibc-i18ndata-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201689" comment="glibc-info-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204406" comment="glibc-locale-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204407" comment="glibc-locale-32bit-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208500" comment="glibc-profile-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208501" comment="glibc-profile-32bit-2.11.3-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204408" comment="nscd-2.11.3-17.72 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5270</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-5270" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5270" source="CVE"/>
    <description>
    Libgcrypt before 1.5.4, as used in GnuPG and other products, does not properly perform ciphertext normalization and ciphertext randomization, which makes it easier for physically proximate attackers to conduct key-extraction attacks by leveraging the ability to collect voltage data from exposed metal, a different vector than CVE-2013-4576.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-5270.html">CVE-2014-5270</cve>
<bugzilla href="https://bugzilla.suse.com/892464">SUSE bug 892464</bugzilla>
<bugzilla href="https://bugzilla.suse.com/920057">SUSE bug 920057</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200234" comment="libgcrypt11-1.5.0-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200235" comment="libgcrypt11-32bit-1.5.0-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200236" comment="libgcrypt11-x86-1.5.0-0.17 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200234" comment="libgcrypt11-1.5.0-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200235" comment="libgcrypt11-32bit-1.5.0-0.17 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5351</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-5351" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5351" source="CVE"/>
    <description>
    The kadm5_randkey_principal_3 function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) before 1.13 sends old keys in a response to a -randkey -keepold request, which allows remote authenticated users to forge tickets by leveraging administrative access.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-5351.html">CVE-2014-5351</cve>
<bugzilla href="https://bugzilla.suse.com/897874">SUSE bug 897874</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204571" comment="krb5-1.6.3-133.49.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204572" comment="krb5-32bit-1.6.3-133.49.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208715" comment="krb5-apps-clients-1.6.3-133.49.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208716" comment="krb5-apps-servers-1.6.3-133.49.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204573" comment="krb5-client-1.6.3-133.49.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208717" comment="krb5-doc-1.6.3-133.49.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208718" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208719" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201754" comment="krb5-server-1.6.3-133.49.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208720" comment="krb5-x86-1.6.3-133.49.64 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204571" comment="krb5-1.6.3-133.49.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204572" comment="krb5-32bit-1.6.3-133.49.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208715" comment="krb5-apps-clients-1.6.3-133.49.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208716" comment="krb5-apps-servers-1.6.3-133.49.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204573" comment="krb5-client-1.6.3-133.49.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208717" comment="krb5-doc-1.6.3-133.49.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208718" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208719" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201754" comment="krb5-server-1.6.3-133.49.64 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5352</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-5352" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5352" source="CVE"/>
    <description>
    The krb5_gss_process_context_token function in lib/gssapi/krb5/process_context_token.c in the libgssapi_krb5 library in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 does not properly maintain security-context handles, which allows remote authenticated users to cause a denial of service (use-after-free and double free, and daemon crash) or possibly execute arbitrary code via crafted GSSAPI traffic, as demonstrated by traffic to kadmind.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-5352.html">CVE-2014-5352</cve>
<bugzilla href="https://bugzilla.suse.com/1005509">SUSE bug 1005509</bugzilla>
<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
<bugzilla href="https://bugzilla.suse.com/912002">SUSE bug 912002</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200125" comment="krb5-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200126" comment="krb5-32bit-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200127" comment="krb5-apps-clients-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200128" comment="krb5-apps-servers-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200129" comment="krb5-client-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200132" comment="krb5-doc-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200133" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200134" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200130" comment="krb5-server-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200131" comment="krb5-x86-1.6.3-133.49.66 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200125" comment="krb5-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200126" comment="krb5-32bit-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200127" comment="krb5-apps-clients-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200128" comment="krb5-apps-servers-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200129" comment="krb5-client-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200132" comment="krb5-doc-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200133" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200134" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200130" comment="krb5-server-1.6.3-133.49.66 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5353</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-5353" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5353" source="CVE"/>
    <description>
    The krb5_ldap_get_password_policy_from_dn function in plugins/kdb/ldap/libkdb_ldap/ldap_pwd_policy.c in MIT Kerberos 5 (aka krb5) before 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (daemon crash) via a successful LDAP query with no results, as demonstrated by using an incorrect object type for a password policy.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-5353.html">CVE-2014-5353</cve>
<bugzilla href="https://bugzilla.suse.com/910457">SUSE bug 910457</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201755" comment="krb5-1.6.3-133.49.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204574" comment="krb5-32bit-1.6.3-133.49.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208721" comment="krb5-apps-clients-1.6.3-133.49.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208722" comment="krb5-apps-servers-1.6.3-133.49.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204575" comment="krb5-client-1.6.3-133.49.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208723" comment="krb5-doc-1.6.3-133.49.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208724" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208725" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208726" comment="krb5-plugins-1.6.3-133.49.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201758" comment="krb5-server-1.6.3-133.49.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208727" comment="krb5-x86-1.6.3-133.49.68 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201755" comment="krb5-1.6.3-133.49.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204574" comment="krb5-32bit-1.6.3-133.49.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208721" comment="krb5-apps-clients-1.6.3-133.49.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208722" comment="krb5-apps-servers-1.6.3-133.49.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204575" comment="krb5-client-1.6.3-133.49.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208723" comment="krb5-doc-1.6.3-133.49.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208724" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208725" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208726" comment="krb5-plugins-1.6.3-133.49.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201758" comment="krb5-server-1.6.3-133.49.68 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5354</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-5354" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5354" source="CVE"/>
    <description>
    plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by creating a database entry for a keyless principal, as demonstrated by a kadmin "add_principal -nokey" or "purgekeys -all" command.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-5354.html">CVE-2014-5354</cve>
<bugzilla href="https://bugzilla.suse.com/910458">SUSE bug 910458</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201755" comment="krb5-1.6.3-133.49.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204574" comment="krb5-32bit-1.6.3-133.49.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208721" comment="krb5-apps-clients-1.6.3-133.49.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208722" comment="krb5-apps-servers-1.6.3-133.49.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204575" comment="krb5-client-1.6.3-133.49.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208723" comment="krb5-doc-1.6.3-133.49.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208724" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208725" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208726" comment="krb5-plugins-1.6.3-133.49.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201758" comment="krb5-server-1.6.3-133.49.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208727" comment="krb5-x86-1.6.3-133.49.68 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201755" comment="krb5-1.6.3-133.49.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204574" comment="krb5-32bit-1.6.3-133.49.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208721" comment="krb5-apps-clients-1.6.3-133.49.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208722" comment="krb5-apps-servers-1.6.3-133.49.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204575" comment="krb5-client-1.6.3-133.49.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208723" comment="krb5-doc-1.6.3-133.49.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208724" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208725" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208726" comment="krb5-plugins-1.6.3-133.49.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201758" comment="krb5-server-1.6.3-133.49.68 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5355</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-5355" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5355" source="CVE"/>
    <description>
    MIT Kerberos 5 (aka krb5) through 1.13.1 incorrectly expects that a krb5_read_message data field is represented as a string ending with a '\0' character, which allows remote attackers to (1) cause a denial of service (NULL pointer dereference) via a zero-byte version string or (2) cause a denial of service (out-of-bounds read) by omitting the '\0' character, related to appl/user_user/server.c and lib/krb5/krb/recvauth.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-5355.html">CVE-2014-5355</cve>
<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
<bugzilla href="https://bugzilla.suse.com/918595">SUSE bug 918595</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201755" comment="krb5-1.6.3-133.49.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204574" comment="krb5-32bit-1.6.3-133.49.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208721" comment="krb5-apps-clients-1.6.3-133.49.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208722" comment="krb5-apps-servers-1.6.3-133.49.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204575" comment="krb5-client-1.6.3-133.49.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208723" comment="krb5-doc-1.6.3-133.49.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208724" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208725" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208726" comment="krb5-plugins-1.6.3-133.49.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201758" comment="krb5-server-1.6.3-133.49.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208727" comment="krb5-x86-1.6.3-133.49.68 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009248574" comment="krb5-1.8.6-133.49.121 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248575" comment="krb5-32bit-1.8.6-133.49.121 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248576" comment="krb5-apps-clients-1.8.6-133.49.121 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248577" comment="krb5-apps-servers-1.8.6-133.49.121 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248578" comment="krb5-client-1.8.6-133.49.121 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248579" comment="krb5-devel-1.8.6-133.49.121 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248580" comment="krb5-devel-32bit-1.8.6-133.49.121 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248581" comment="krb5-doc-1.8.6-133.49.121 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248582" comment="krb5-plugin-kdb-ldap-1.8.6-133.49.121 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248583" comment="krb5-plugin-preauth-pkinit-1.8.6-133.49.121 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208726" comment="krb5-plugins-1.6.3-133.49.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248584" comment="krb5-server-1.8.6-133.49.121 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5459</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-5459" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5459" source="CVE"/>
    <description>
    The PEAR_REST class in REST.php in PEAR in PHP through 5.6.0 allows local users to write to arbitrary files via a symlink attack on a (1) rest.cachefile or (2) rest.cacheid file in /tmp/pear/cache/, related to the retrieveCacheFirst and useLocalCache functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-5459.html">CVE-2014-5459</cve>
<bugzilla href="https://bugzilla.suse.com/893849">SUSE bug 893849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215323" comment="apache2-mod_php53-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215324" comment="php53-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215325" comment="php53-bcmath-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215326" comment="php53-bz2-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215327" comment="php53-calendar-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215328" comment="php53-ctype-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215329" comment="php53-curl-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215330" comment="php53-dba-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215331" comment="php53-dom-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215332" comment="php53-exif-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215333" comment="php53-fastcgi-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215334" comment="php53-fileinfo-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215335" comment="php53-ftp-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215336" comment="php53-gd-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215337" comment="php53-gettext-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215338" comment="php53-gmp-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215339" comment="php53-iconv-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215340" comment="php53-intl-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215341" comment="php53-json-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215342" comment="php53-ldap-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215343" comment="php53-mbstring-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215344" comment="php53-mcrypt-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215345" comment="php53-mysql-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215346" comment="php53-odbc-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215347" comment="php53-openssl-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215348" comment="php53-pcntl-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215349" comment="php53-pdo-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215350" comment="php53-pear-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215351" comment="php53-pgsql-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215352" comment="php53-pspell-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215353" comment="php53-shmop-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215354" comment="php53-snmp-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215355" comment="php53-soap-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215356" comment="php53-suhosin-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215357" comment="php53-sysvmsg-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215358" comment="php53-sysvsem-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215359" comment="php53-sysvshm-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215360" comment="php53-tokenizer-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215361" comment="php53-wddx-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215362" comment="php53-xmlreader-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215363" comment="php53-xmlrpc-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215364" comment="php53-xmlwriter-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215365" comment="php53-xsl-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215366" comment="php53-zip-5.3.17-0.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215367" comment="php53-zlib-5.3.17-0.29 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5471</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-5471" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471" source="CVE"/>
    <description>
    Stack consumption vulnerability in the parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to cause a denial of service (uncontrolled recursion, and system crash or reboot) via a crafted iso9660 image with a CL entry referring to a directory entry that has a CL entry.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-5471.html">CVE-2014-5471</cve>
<bugzilla href="https://bugzilla.suse.com/892490">SUSE bug 892490</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208673" comment="iscsitarget-kmp-bigsmp-1.4.20_3.0.101_0.40-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204510" comment="kernel-default-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204511" comment="kernel-default-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204512" comment="kernel-default-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204518" comment="kernel-source-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204519" comment="kernel-syms-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208596" comment="kernel-trace-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208597" comment="kernel-trace-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204520" comment="kernel-trace-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208676" comment="ofed-kmp-bigsmp-1.5.4.1_3.0.101_0.40-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208677" comment="oracleasm-kmp-bigsmp-2.0.5_3.0.101_0.40-7.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5472</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-5472" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472" source="CVE"/>
    <description>
    The parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to cause a denial of service (unkillable mount process) via a crafted iso9660 image with a self-referential CL entry.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-5472.html">CVE-2014-5472</cve>
<bugzilla href="https://bugzilla.suse.com/892490">SUSE bug 892490</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208673" comment="iscsitarget-kmp-bigsmp-1.4.20_3.0.101_0.40-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204510" comment="kernel-default-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204511" comment="kernel-default-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204512" comment="kernel-default-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204518" comment="kernel-source-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204519" comment="kernel-syms-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208596" comment="kernel-trace-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208597" comment="kernel-trace-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204520" comment="kernel-trace-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208676" comment="ofed-kmp-bigsmp-1.5.4.1_3.0.101_0.40-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208677" comment="oracleasm-kmp-bigsmp-2.0.5_3.0.101_0.40-7.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6040</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6040" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040" source="CVE"/>
    <description>
    GNU C Library (aka glibc) before 2.20 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via a multibyte character value of "0xffff" to the iconv function when converting (1) IBM933, (2) IBM935, (3) IBM937, (4) IBM939, or (5) IBM1364 encoded data to UTF-8.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6040.html">CVE-2014-6040</cve>
<bugzilla href="https://bugzilla.suse.com/894553">SUSE bug 894553</bugzilla>
<bugzilla href="https://bugzilla.suse.com/903057">SUSE bug 903057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/916222">SUSE bug 916222</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213477" comment="glibc-2.11.3-17.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213478" comment="glibc-32bit-2.11.3-17.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213479" comment="glibc-devel-2.11.3-17.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213480" comment="glibc-devel-32bit-2.11.3-17.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213509" comment="glibc-html-2.11.3-17.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213481" comment="glibc-i18ndata-2.11.3-17.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213510" comment="glibc-info-2.11.3-17.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213482" comment="glibc-locale-2.11.3-17.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213483" comment="glibc-locale-32bit-2.11.3-17.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213511" comment="glibc-profile-2.11.3-17.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213512" comment="glibc-profile-32bit-2.11.3-17.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213484" comment="nscd-2.11.3-17.80 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213477" comment="glibc-2.11.3-17.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213478" comment="glibc-32bit-2.11.3-17.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213479" comment="glibc-devel-2.11.3-17.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213480" comment="glibc-devel-32bit-2.11.3-17.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213509" comment="glibc-html-2.11.3-17.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213481" comment="glibc-i18ndata-2.11.3-17.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213510" comment="glibc-info-2.11.3-17.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213482" comment="glibc-locale-2.11.3-17.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213483" comment="glibc-locale-32bit-2.11.3-17.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264379" comment="glibc-locale-x86-2.11.3-17.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213511" comment="glibc-profile-2.11.3-17.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213512" comment="glibc-profile-32bit-2.11.3-17.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264380" comment="glibc-profile-x86-2.11.3-17.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264381" comment="glibc-x86-2.11.3-17.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213484" comment="nscd-2.11.3-17.80 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6051</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6051" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6051" source="CVE"/>
    <description>
    Integer overflow in the MallocFrameBuffer function in vncviewer.c in LibVNCServer 0.9.9 and earlier allows remote VNC servers to cause a denial of service (crash) and possibly execute arbitrary code via an advertisement for a large screen size, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6051.html">CVE-2014-6051</cve>
<bugzilla href="https://bugzilla.suse.com/897031">SUSE bug 897031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/900896">SUSE bug 900896</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201896" comment="LibVNCServer-0.9.1-156 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6052</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6052" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6052" source="CVE"/>
    <description>
    The HandleRFBServerMessage function in libvncclient/rfbproto.c in LibVNCServer 0.9.9 and earlier does not check certain malloc return values, which allows remote VNC servers to cause a denial of service (application crash) or possibly execute arbitrary code by specifying a large screen size in a (1) FramebufferUpdate, (2) ResizeFrameBuffer, or (3) PalmVNCReSizeFrameBuffer message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6052.html">CVE-2014-6052</cve>
<bugzilla href="https://bugzilla.suse.com/897031">SUSE bug 897031</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201896" comment="LibVNCServer-0.9.1-156 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6053</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6053" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6053" source="CVE"/>
    <description>
    The rfbProcessClientNormalMessage function in libvncserver/rfbserver.c in LibVNCServer 0.9.9 and earlier does not properly handle attempts to send a large amount of ClientCutText data, which allows remote attackers to cause a denial of service (memory consumption or daemon crash) via a crafted message that is processed by using a single unchecked malloc.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6053.html">CVE-2014-6053</cve>
<bugzilla href="https://bugzilla.suse.com/897031">SUSE bug 897031</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201896" comment="LibVNCServer-0.9.1-156 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6054</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6054" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6054" source="CVE"/>
    <description>
    The rfbProcessClientNormalMessage function in libvncserver/rfbserver.c in LibVNCServer 0.9.9 and earlier allows remote attackers to cause a denial of service (divide-by-zero error and server crash) via a zero value in the scaling factor in a (1) PalmVNCSetScaleFactor or (2) SetScale message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6054.html">CVE-2014-6054</cve>
<bugzilla href="https://bugzilla.suse.com/897031">SUSE bug 897031</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201896" comment="LibVNCServer-0.9.1-156 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6055</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6055" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6055" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in the File Transfer feature in rfbserver.c in LibVNCServer 0.9.9 and earlier allow remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via a (1) long file or (2) directory name or the (3) FileTime attribute in a rfbFileTransferOffer message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6055.html">CVE-2014-6055</cve>
<bugzilla href="https://bugzilla.suse.com/897031">SUSE bug 897031</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201896" comment="LibVNCServer-0.9.1-156 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6269</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2014-6269" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6269" source="CVE"/>
    <description>
    Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6269.html">CVE-2014-6269</cve>
<bugzilla href="https://bugzilla.suse.com/895849">SUSE bug 895849</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215790" comment="haproxy-1.5.4-0.7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6270</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6270" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6270" source="CVE"/>
    <description>
    Off-by-one error in the snmpHandleUdp function in snmp_core.cc in Squid 2.x and 3.x, when an SNMP port is configured, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted UDP SNMP request, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6270.html">CVE-2014-6270</cve>
<bugzilla href="https://bugzilla.suse.com/895773">SUSE bug 895773</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209041" comment="squid-2.7.STABLE5-2.12.24 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209041" comment="squid-2.7.STABLE5-2.12.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210806" comment="squid3-3.1.23-8.16.30 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6271</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6271" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271" source="CVE"/>
    <description>
    GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock."  NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6271.html">CVE-2014-6271</cve>
<bugzilla href="https://bugzilla.suse.com/1024628">SUSE bug 1024628</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1130324">SUSE bug 1130324</bugzilla>
<bugzilla href="https://bugzilla.suse.com/870618">SUSE bug 870618</bugzilla>
<bugzilla href="https://bugzilla.suse.com/896776">SUSE bug 896776</bugzilla>
<bugzilla href="https://bugzilla.suse.com/898346">SUSE bug 898346</bugzilla>
<bugzilla href="https://bugzilla.suse.com/898604">SUSE bug 898604</bugzilla>
<bugzilla href="https://bugzilla.suse.com/898664">SUSE bug 898664</bugzilla>
<bugzilla href="https://bugzilla.suse.com/898762">SUSE bug 898762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/898812">SUSE bug 898812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/898884">SUSE bug 898884</bugzilla>
<bugzilla href="https://bugzilla.suse.com/900057">SUSE bug 900057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/900127">SUSE bug 900127</bugzilla>
<bugzilla href="https://bugzilla.suse.com/900454">SUSE bug 900454</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215396" comment="bash-3.2-147.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215397" comment="bash-doc-3.2-147.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208432" comment="bash-x86-3.2-147.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215398" comment="libreadline5-5.2-147.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204214" comment="libreadline5-32bit-5.2-147.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208433" comment="libreadline5-x86-5.2-147.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215400" comment="readline-doc-5.2-147.20 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215396" comment="bash-3.2-147.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215397" comment="bash-doc-3.2-147.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215398" comment="libreadline5-5.2-147.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215399" comment="libreadline5-32bit-5.2-147.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215400" comment="readline-doc-5.2-147.20 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6272</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6272" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6272" source="CVE"/>
    <description>
    Multiple integer overflows in the evbuffer API in Libevent 1.4.x before 1.4.15, 2.0.x before 2.0.22, and 2.1.x before 2.1.5-beta allow context-dependent attackers to cause a denial of service or possibly have other unspecified impact via "insanely large inputs" to the (1) evbuffer_add, (2) evbuffer_expand, or (3) bufferevent_write function, which triggers a heap-based buffer overflow or an infinite loop.  NOTE: this identifier has been SPLIT per ADT3 due to different affected versions. See CVE-2015-6525 for the functions that are only affected in 2.0 and later.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6272.html">CVE-2014-6272</cve>
<bugzilla href="https://bugzilla.suse.com/1041410">SUSE bug 1041410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/897243">SUSE bug 897243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/943011">SUSE bug 943011</bugzilla>
<bugzilla href="https://bugzilla.suse.com/947373">SUSE bug 947373</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200213" comment="libevent-1_4-2-1.4.5-24.24 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6277</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6277" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6277" source="CVE"/>
    <description>
    GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6277.html">CVE-2014-6277</cve>
<bugzilla href="https://bugzilla.suse.com/898664">SUSE bug 898664</bugzilla>
<bugzilla href="https://bugzilla.suse.com/898762">SUSE bug 898762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/898812">SUSE bug 898812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/898884">SUSE bug 898884</bugzilla>
<bugzilla href="https://bugzilla.suse.com/900057">SUSE bug 900057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/900127">SUSE bug 900127</bugzilla>
<bugzilla href="https://bugzilla.suse.com/900454">SUSE bug 900454</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009249913" comment="bash-3.2-147.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249914" comment="bash-doc-3.2-147.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249915" comment="libreadline5-5.2-147.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249916" comment="libreadline5-32bit-5.2-147.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249917" comment="readline-doc-5.2-147.28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6278</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6278" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278" source="CVE"/>
    <description>
    GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6278.html">CVE-2014-6278</cve>
<bugzilla href="https://bugzilla.suse.com/898604">SUSE bug 898604</bugzilla>
<bugzilla href="https://bugzilla.suse.com/898664">SUSE bug 898664</bugzilla>
<bugzilla href="https://bugzilla.suse.com/898762">SUSE bug 898762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/898812">SUSE bug 898812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/898884">SUSE bug 898884</bugzilla>
<bugzilla href="https://bugzilla.suse.com/900057">SUSE bug 900057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/900127">SUSE bug 900127</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009249913" comment="bash-3.2-147.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249914" comment="bash-doc-3.2-147.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249915" comment="libreadline5-5.2-147.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249916" comment="libreadline5-32bit-5.2-147.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249917" comment="readline-doc-5.2-147.28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6410</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6410" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410" source="CVE"/>
    <description>
    The __udf_read_inode function in fs/udf/inode.c in the Linux kernel through 3.16.3 does not restrict the amount of ICB indirection, which allows physically proximate attackers to cause a denial of service (infinite loop or stack consumption) via a UDF filesystem with a crafted inode.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6410.html">CVE-2014-6410</cve>
<bugzilla href="https://bugzilla.suse.com/896689">SUSE bug 896689</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204510" comment="kernel-default-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204511" comment="kernel-default-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204512" comment="kernel-default-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208589" comment="kernel-default-man-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208590" comment="kernel-ec2-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208591" comment="kernel-ec2-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208592" comment="kernel-ec2-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204514" comment="kernel-pae-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204515" comment="kernel-pae-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204516" comment="kernel-pae-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208593" comment="kernel-ppc64-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208594" comment="kernel-ppc64-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208595" comment="kernel-ppc64-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204518" comment="kernel-source-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204519" comment="kernel-syms-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208596" comment="kernel-trace-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208597" comment="kernel-trace-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204520" comment="kernel-trace-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204521" comment="kernel-xen-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204522" comment="kernel-xen-base-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204523" comment="kernel-xen-devel-3.0.101-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204525" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204526" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6421</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6421" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6421" source="CVE"/>
    <description>
    Use-after-free vulnerability in the SDP dissector in Wireshark 1.10.x before 1.10.10 allows remote attackers to cause a denial of service (application crash) via a crafted packet that leverages split memory ownership between the SDP and RTP dissectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6421.html">CVE-2014-6421</cve>
<bugzilla href="https://bugzilla.suse.com/897055">SUSE bug 897055</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215408" comment="wireshark-1.10.10-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6422" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6422" source="CVE"/>
    <description>
    The SDP dissector in Wireshark 1.10.x before 1.10.10 creates duplicate hashtables for a media channel, which allows remote attackers to cause a denial of service (application crash) via a crafted packet to the RTP dissector.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6422.html">CVE-2014-6422</cve>
<bugzilla href="https://bugzilla.suse.com/897055">SUSE bug 897055</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215408" comment="wireshark-1.10.10-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6423" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6423" source="CVE"/>
    <description>
    The tvb_raw_text_add function in epan/dissectors/packet-megaco.c in the MEGACO dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (infinite loop) via an empty line.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6423.html">CVE-2014-6423</cve>
<bugzilla href="https://bugzilla.suse.com/897055">SUSE bug 897055</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215408" comment="wireshark-1.10.10-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6424</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6424" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6424" source="CVE"/>
    <description>
    The dissect_v9_v10_pdu_data function in epan/dissectors/packet-netflow.c in the Netflow dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 refers to incorrect offset and start variables, which allows remote attackers to cause a denial of service (uninitialized memory read and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6424.html">CVE-2014-6424</cve>
<bugzilla href="https://bugzilla.suse.com/897055">SUSE bug 897055</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215408" comment="wireshark-1.10.10-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6427</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6427" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6427" source="CVE"/>
    <description>
    Off-by-one error in the is_rtsp_request_or_reply function in epan/dissectors/packet-rtsp.c in the RTSP dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet that triggers parsing of a token located one position beyond the current position.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6427.html">CVE-2014-6427</cve>
<bugzilla href="https://bugzilla.suse.com/897055">SUSE bug 897055</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215408" comment="wireshark-1.10.10-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6428</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6428" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6428" source="CVE"/>
    <description>
    The dissect_spdu function in epan/dissectors/packet-ses.c in the SES dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not initialize a certain ID value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6428.html">CVE-2014-6428</cve>
<bugzilla href="https://bugzilla.suse.com/897055">SUSE bug 897055</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215408" comment="wireshark-1.10.10-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6429</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6429" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6429" source="CVE"/>
    <description>
    The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not properly handle empty input data, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6429.html">CVE-2014-6429</cve>
<bugzilla href="https://bugzilla.suse.com/897055">SUSE bug 897055</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215408" comment="wireshark-1.10.10-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6430</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6430" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6430" source="CVE"/>
    <description>
    The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not validate bitmask data, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6430.html">CVE-2014-6430</cve>
<bugzilla href="https://bugzilla.suse.com/897055">SUSE bug 897055</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215408" comment="wireshark-1.10.10-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6431</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6431" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6431" source="CVE"/>
    <description>
    Buffer overflow in the SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (application crash) via a crafted file that triggers writes of uncompressed bytes beyond the end of the output buffer.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6431.html">CVE-2014-6431</cve>
<bugzilla href="https://bugzilla.suse.com/897055">SUSE bug 897055</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215408" comment="wireshark-1.10.10-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6432</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6432" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6432" source="CVE"/>
    <description>
    The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not prevent data overwrites during copy operations, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6432.html">CVE-2014-6432</cve>
<bugzilla href="https://bugzilla.suse.com/897055">SUSE bug 897055</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215408" comment="wireshark-1.10.10-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6456</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6456" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6456" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u67 and 8u20 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6456.html">CVE-2014-6456</cve>
<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201722" comment="java-1_6_0-ibm-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201724" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208544" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208552" comment="java-1_7_0-ibm-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208554" comment="java-1_7_0-ibm-jdbc-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201722" comment="java-1_6_0-ibm-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201724" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208544" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208552" comment="java-1_7_0-ibm-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208554" comment="java-1_7_0-ibm-jdbc-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6457</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6457" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6457" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20; Java SE Embedded 7u60; and JRockit R27.8.3, and R28.3.3 allows remote attackers to affect confidentiality and integrity via vectors related to JSSE.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6457.html">CVE-2014-6457</cve>
<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201722" comment="java-1_6_0-ibm-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201724" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208544" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208552" comment="java-1_7_0-ibm-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208554" comment="java-1_7_0-ibm-jdbc-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201722" comment="java-1_6_0-ibm-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201724" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208544" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208552" comment="java-1_7_0-ibm-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208554" comment="java-1_7_0-ibm-jdbc-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6458</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6458" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6458" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6458.html">CVE-2014-6458</cve>
<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201722" comment="java-1_6_0-ibm-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201724" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208544" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208552" comment="java-1_7_0-ibm-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208554" comment="java-1_7_0-ibm-jdbc-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201722" comment="java-1_6_0-ibm-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201724" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208544" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208552" comment="java-1_7_0-ibm-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208554" comment="java-1_7_0-ibm-jdbc-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6463</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6463" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6463" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:REPLICATION ROW FORMAT BINARY LOG DML.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6463.html">CVE-2014-6463</cve>
<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264365" comment="libmysql55client18-x86-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6464</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6464" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6464" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:INNODB DML FOREIGN KEYS.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6464.html">CVE-2014-6464</cve>
<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915912">SUSE bug 915912</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264365" comment="libmysql55client18-x86-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6466</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6466" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6466" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20, when running on Internet Explorer, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6466.html">CVE-2014-6466</cve>
<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201722" comment="java-1_6_0-ibm-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201724" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208544" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208552" comment="java-1_7_0-ibm-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208554" comment="java-1_7_0-ibm-jdbc-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201722" comment="java-1_6_0-ibm-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201724" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208544" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208552" comment="java-1_7_0-ibm-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208554" comment="java-1_7_0-ibm-jdbc-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6469</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6469" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6469" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:OPTIMIZER.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6469.html">CVE-2014-6469</cve>
<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915912">SUSE bug 915912</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264365" comment="libmysql55client18-x86-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6474</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6474" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6474" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.19 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:MEMCACHED.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6474.html">CVE-2014-6474</cve>
<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264365" comment="libmysql55client18-x86-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6476</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6476" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6476" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u67 and 8u20 allows remote attackers to affect integrity via unknown vectors related to Deployment, a different vulnerability than CVE-2014-6527.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6476.html">CVE-2014-6476</cve>
<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201722" comment="java-1_6_0-ibm-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201724" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208544" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208552" comment="java-1_7_0-ibm-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208554" comment="java-1_7_0-ibm-jdbc-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201722" comment="java-1_6_0-ibm-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201724" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208544" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208552" comment="java-1_7_0-ibm-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208554" comment="java-1_7_0-ibm-jdbc-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6478</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6478" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6478" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote attackers to affect integrity via vectors related to SERVER:SSL:yaSSL.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6478.html">CVE-2014-6478</cve>
<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264365" comment="libmysql55client18-x86-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6484" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6484" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect availability via vectors related to SERVER:DML.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6484.html">CVE-2014-6484</cve>
<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264365" comment="libmysql55client18-x86-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6489</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6489" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6489" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.19 and earlier allows remote authenticated users to affect integrity and availability via vectors related to SERVER:SP.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6489.html">CVE-2014-6489</cve>
<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264365" comment="libmysql55client18-x86-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6491</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6491" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6491" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to SERVER:SSL:yaSSL, a different vulnerability than CVE-2014-6500.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6491.html">CVE-2014-6491</cve>
<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915912">SUSE bug 915912</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264365" comment="libmysql55client18-x86-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6492</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6492" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6492" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20, when running on Firefox, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6492.html">CVE-2014-6492</cve>
<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201722" comment="java-1_6_0-ibm-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201724" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208544" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208552" comment="java-1_7_0-ibm-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208554" comment="java-1_7_0-ibm-jdbc-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201722" comment="java-1_6_0-ibm-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201724" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208544" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208552" comment="java-1_7_0-ibm-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208554" comment="java-1_7_0-ibm-jdbc-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6493</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6493" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6493" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2014-4288, CVE-2014-6503, and CVE-2014-6532.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6493.html">CVE-2014-6493</cve>
<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201722" comment="java-1_6_0-ibm-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201724" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208544" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208552" comment="java-1_7_0-ibm-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208554" comment="java-1_7_0-ibm-jdbc-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201722" comment="java-1_6_0-ibm-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201724" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208544" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208552" comment="java-1_7_0-ibm-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208554" comment="java-1_7_0-ibm-jdbc-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6494</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6494" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6494" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect availability via vectors related to CLIENT:SSL:yaSSL, a different vulnerability than CVE-2014-6496.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6494.html">CVE-2014-6494</cve>
<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915912">SUSE bug 915912</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264365" comment="libmysql55client18-x86-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6495</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6495" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6495" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote attackers to affect availability via vectors related to SERVER:SSL:yaSSL.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6495.html">CVE-2014-6495</cve>
<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264365" comment="libmysql55client18-x86-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6496</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6496" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6496" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect availability via vectors related to CLIENT:SSL:yaSSL, a different vulnerability than CVE-2014-6494.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6496.html">CVE-2014-6496</cve>
<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915912">SUSE bug 915912</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264365" comment="libmysql55client18-x86-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6500</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6500" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6500" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to SERVER:SSL:yaSSL, a different vulnerability than CVE-2014-6491.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6500.html">CVE-2014-6500</cve>
<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915912">SUSE bug 915912</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264365" comment="libmysql55client18-x86-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6502</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6502" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6502" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20, and Java SE Embedded 7u60, allows remote attackers to affect integrity via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6502.html">CVE-2014-6502</cve>
<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201722" comment="java-1_6_0-ibm-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201724" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208544" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208552" comment="java-1_7_0-ibm-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208554" comment="java-1_7_0-ibm-jdbc-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201722" comment="java-1_6_0-ibm-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201724" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208544" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208552" comment="java-1_7_0-ibm-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208554" comment="java-1_7_0-ibm-jdbc-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6503</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6503" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6503" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2014-4288, CVE-2014-6493, and CVE-2014-6532.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6503.html">CVE-2014-6503</cve>
<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201722" comment="java-1_6_0-ibm-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201724" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208544" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208552" comment="java-1_7_0-ibm-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208554" comment="java-1_7_0-ibm-jdbc-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201722" comment="java-1_6_0-ibm-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201724" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208544" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208552" comment="java-1_7_0-ibm-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208554" comment="java-1_7_0-ibm-jdbc-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6505" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6505" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect availability via vectors related to SERVER:MEMORY STORAGE ENGINE.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6505.html">CVE-2014-6505</cve>
<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264365" comment="libmysql55client18-x86-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6506</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6506" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6506" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20, and Java SE Embedded 7u60, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6506.html">CVE-2014-6506</cve>
<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201722" comment="java-1_6_0-ibm-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201724" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208544" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208552" comment="java-1_7_0-ibm-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208554" comment="java-1_7_0-ibm-jdbc-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201722" comment="java-1_6_0-ibm-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201724" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208544" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208552" comment="java-1_7_0-ibm-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208554" comment="java-1_7_0-ibm-jdbc-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6507</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6507" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6507" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SERVER:DML.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6507.html">CVE-2014-6507</cve>
<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915912">SUSE bug 915912</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264365" comment="libmysql55client18-x86-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6511" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20 allows remote attackers to affect confidentiality via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6511.html">CVE-2014-6511</cve>
<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201722" comment="java-1_6_0-ibm-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201724" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208544" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208552" comment="java-1_7_0-ibm-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208554" comment="java-1_7_0-ibm-jdbc-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201722" comment="java-1_6_0-ibm-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201724" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208544" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208552" comment="java-1_7_0-ibm-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208554" comment="java-1_7_0-ibm-jdbc-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6512</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6512" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6512" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20; Java SE Embedded 7u60; and JRockit R27.8.3 and R28.3.3 allows remote attackers to affect integrity via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6512.html">CVE-2014-6512</cve>
<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201722" comment="java-1_6_0-ibm-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201724" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208544" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208552" comment="java-1_7_0-ibm-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208554" comment="java-1_7_0-ibm-jdbc-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201722" comment="java-1_6_0-ibm-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201724" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208544" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208552" comment="java-1_7_0-ibm-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208554" comment="java-1_7_0-ibm-jdbc-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6513</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6513" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6513" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20, and Java SE Embedded 7u60, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6513.html">CVE-2014-6513</cve>
<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201722" comment="java-1_6_0-ibm-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201724" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208544" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208552" comment="java-1_7_0-ibm-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208554" comment="java-1_7_0-ibm-jdbc-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201722" comment="java-1_6_0-ibm-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201724" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208544" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208552" comment="java-1_7_0-ibm-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208554" comment="java-1_7_0-ibm-jdbc-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6515</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6515" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6515" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20 allows remote attackers to affect integrity via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6515.html">CVE-2014-6515</cve>
<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201722" comment="java-1_6_0-ibm-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201724" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208544" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208552" comment="java-1_7_0-ibm-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208554" comment="java-1_7_0-ibm-jdbc-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201722" comment="java-1_6_0-ibm-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201724" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208544" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208552" comment="java-1_7_0-ibm-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208554" comment="java-1_7_0-ibm-jdbc-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6520</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6520" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6520" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:DDL.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6520.html">CVE-2014-6520</cve>
<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264365" comment="libmysql55client18-x86-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6527</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6527" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6527" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u67 and 8u20 allows remote attackers to affect integrity via unknown vectors related to Deployment, a different vulnerability than CVE-2014-6476.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6527.html">CVE-2014-6527</cve>
<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201722" comment="java-1_6_0-ibm-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201724" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208544" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208552" comment="java-1_7_0-ibm-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208554" comment="java-1_7_0-ibm-jdbc-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201722" comment="java-1_6_0-ibm-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201724" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208544" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208552" comment="java-1_7_0-ibm-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208554" comment="java-1_7_0-ibm-jdbc-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6530</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6530" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6530" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to CLIENT:MYSQLDUMP.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6530.html">CVE-2014-6530</cve>
<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264365" comment="libmysql55client18-x86-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6531</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6531" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6531" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20, and Java SE Embedded 7u60, allows remote attackers to affect confidentiality via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6531.html">CVE-2014-6531</cve>
<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201722" comment="java-1_6_0-ibm-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201724" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208544" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208552" comment="java-1_7_0-ibm-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208554" comment="java-1_7_0-ibm-jdbc-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201722" comment="java-1_6_0-ibm-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201724" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208544" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208552" comment="java-1_7_0-ibm-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208554" comment="java-1_7_0-ibm-jdbc-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6532</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6532" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6532" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2014-4288, CVE-2014-6493, and CVE-2014-6503.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6532.html">CVE-2014-6532</cve>
<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201722" comment="java-1_6_0-ibm-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201724" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208544" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208552" comment="java-1_7_0-ibm-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208554" comment="java-1_7_0-ibm-jdbc-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201722" comment="java-1_6_0-ibm-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201724" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208544" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208552" comment="java-1_7_0-ibm-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208554" comment="java-1_7_0-ibm-jdbc-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6551</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6551" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6551" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows local users to affect confidentiality via vectors related to CLIENT:MYSQLADMIN.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6551.html">CVE-2014-6551</cve>
<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264365" comment="libmysql55client18-x86-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6555</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6555" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SERVER:DML.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6555.html">CVE-2014-6555</cve>
<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915912">SUSE bug 915912</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264365" comment="libmysql55client18-x86-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6558</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6558" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6558" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20; Java SE Embedded 7u60; and JRockit R27.8.3 and JRockit R28.3.3 allows remote attackers to affect integrity via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6558.html">CVE-2014-6558</cve>
<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201722" comment="java-1_6_0-ibm-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201724" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208544" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208552" comment="java-1_7_0-ibm-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208554" comment="java-1_7_0-ibm-jdbc-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201722" comment="java-1_6_0-ibm-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208543" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201724" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208544" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208545" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208552" comment="java-1_7_0-ibm-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208553" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208554" comment="java-1_7_0-ibm-jdbc-1.7.0_sr8.0-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208555" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6559</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6559" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6559" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect confidentiality via vectors related to C API SSL CERTIFICATE HANDLING.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6559.html">CVE-2014-6559</cve>
<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915912">SUSE bug 915912</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264365" comment="libmysql55client18-x86-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6564</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6564" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6564" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.19 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:INNODB FULLTEXT SEARCH DML.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6564.html">CVE-2014-6564</cve>
<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264365" comment="libmysql55client18-x86-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-6568" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6568" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier, and 5.6.21 and earlier, allows remote authenticated users to affect availability via vectors related to Server : InnoDB : DML.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6568.html">CVE-2014-6568</cve>
<bugzilla href="https://bugzilla.suse.com/914058">SUSE bug 914058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915911">SUSE bug 915911</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264365" comment="libmysql55client18-x86-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7141</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-7141" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7141" source="CVE"/>
    <description>
    The pinger in Squid 3.x before 3.4.8 allows remote attackers to obtain sensitive information or cause a denial of service (out-of-bounds read and crash) via a crafted type in an (1) ICMP or (2) ICMP6 packet.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-7141.html">CVE-2014-7141</cve>
<bugzilla href="https://bugzilla.suse.com/1040640">SUSE bug 1040640</bugzilla>
<bugzilla href="https://bugzilla.suse.com/891268">SUSE bug 891268</bugzilla>
<bugzilla href="https://bugzilla.suse.com/895773">SUSE bug 895773</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210806" comment="squid3-3.1.23-8.16.30 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7142</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-7142" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7142" source="CVE"/>
    <description>
    The pinger in Squid 3.x before 3.4.8 allows remote attackers to obtain sensitive information or cause a denial of service (crash) via a crafted (1) ICMP or (2) ICMP6 packet size.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-7142.html">CVE-2014-7142</cve>
<bugzilla href="https://bugzilla.suse.com/895773">SUSE bug 895773</bugzilla>
<bugzilla href="https://bugzilla.suse.com/973782">SUSE bug 973782</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210806" comment="squid3-3.1.23-8.16.30 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7154</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-7154" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7154" source="CVE"/>
    <description>
    Race condition in HVMOP_track_dirty_vram in Xen 4.0.0 through 4.4.x does not ensure possession of the guarding lock for dirty video RAM tracking, which allows certain local guest domains to cause a denial of service via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-7154.html">CVE-2014-7154</cve>
<bugzilla href="https://bugzilla.suse.com/880751">SUSE bug 880751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/895798">SUSE bug 895798</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204923" comment="xen-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204924" comment="xen-doc-html-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204925" comment="xen-doc-pdf-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204926" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204927" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204928" comment="xen-libs-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204929" comment="xen-libs-32bit-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204930" comment="xen-tools-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204931" comment="xen-tools-domU-4.2.4_04-0.9 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204923" comment="xen-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204924" comment="xen-doc-html-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204925" comment="xen-doc-pdf-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204926" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204928" comment="xen-libs-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204929" comment="xen-libs-32bit-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204930" comment="xen-tools-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204931" comment="xen-tools-domU-4.2.4_04-0.9 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-7155" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7155" source="CVE"/>
    <description>
    The x86_emulate function in arch/x86/x86_emulate/x86_emulate.c in Xen 4.4.x and earlier does not properly check supervisor mode permissions, which allows local HVM users to cause a denial of service (guest crash) or gain guest kernel mode privileges via vectors involving an (1) HLT, (2) LGDT, (3) LIDT, or (4) LMSW instruction.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-7155.html">CVE-2014-7155</cve>
<bugzilla href="https://bugzilla.suse.com/880751">SUSE bug 880751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/895799">SUSE bug 895799</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204923" comment="xen-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204924" comment="xen-doc-html-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204925" comment="xen-doc-pdf-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204926" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204927" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204928" comment="xen-libs-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204929" comment="xen-libs-32bit-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204930" comment="xen-tools-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204931" comment="xen-tools-domU-4.2.4_04-0.9 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204923" comment="xen-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204924" comment="xen-doc-html-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204925" comment="xen-doc-pdf-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204926" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204928" comment="xen-libs-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204929" comment="xen-libs-32bit-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204930" comment="xen-tools-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204931" comment="xen-tools-domU-4.2.4_04-0.9 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7156</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-7156" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7156" source="CVE"/>
    <description>
    The x86_emulate function in arch/x86/x86_emulate/x86_emulate.c in Xen 3.3.x through 4.4.x does not check the supervisor mode permissions for instructions that generate software interrupts, which allows local HVM guest users to cause a denial of service (guest crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-7156.html">CVE-2014-7156</cve>
<bugzilla href="https://bugzilla.suse.com/880751">SUSE bug 880751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/895802">SUSE bug 895802</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204923" comment="xen-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204924" comment="xen-doc-html-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204925" comment="xen-doc-pdf-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204926" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204927" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204928" comment="xen-libs-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204929" comment="xen-libs-32bit-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204930" comment="xen-tools-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204931" comment="xen-tools-domU-4.2.4_04-0.9 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204923" comment="xen-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204924" comment="xen-doc-html-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204925" comment="xen-doc-pdf-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204926" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204928" comment="xen-libs-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204929" comment="xen-libs-32bit-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204930" comment="xen-tools-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204931" comment="xen-tools-domU-4.2.4_04-0.9 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7169</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-7169" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169" source="CVE"/>
    <description>
    GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-7169.html">CVE-2014-7169</cve>
<bugzilla href="https://bugzilla.suse.com/1024628">SUSE bug 1024628</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1130324">SUSE bug 1130324</bugzilla>
<bugzilla href="https://bugzilla.suse.com/870618">SUSE bug 870618</bugzilla>
<bugzilla href="https://bugzilla.suse.com/896776">SUSE bug 896776</bugzilla>
<bugzilla href="https://bugzilla.suse.com/898346">SUSE bug 898346</bugzilla>
<bugzilla href="https://bugzilla.suse.com/898664">SUSE bug 898664</bugzilla>
<bugzilla href="https://bugzilla.suse.com/898762">SUSE bug 898762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/898812">SUSE bug 898812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/898884">SUSE bug 898884</bugzilla>
<bugzilla href="https://bugzilla.suse.com/899266">SUSE bug 899266</bugzilla>
<bugzilla href="https://bugzilla.suse.com/900057">SUSE bug 900057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/900127">SUSE bug 900127</bugzilla>
<bugzilla href="https://bugzilla.suse.com/900454">SUSE bug 900454</bugzilla>
<bugzilla href="https://bugzilla.suse.com/902237">SUSE bug 902237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/926146">SUSE bug 926146</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204212" comment="bash-3.2-147.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204213" comment="bash-doc-3.2-147.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201586" comment="libreadline5-5.2-147.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204214" comment="libreadline5-32bit-5.2-147.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204215" comment="readline-doc-5.2-147.22 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204212" comment="bash-3.2-147.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204213" comment="bash-doc-3.2-147.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208432" comment="bash-x86-3.2-147.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201586" comment="libreadline5-5.2-147.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204214" comment="libreadline5-32bit-5.2-147.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208433" comment="libreadline5-x86-5.2-147.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204215" comment="readline-doc-5.2-147.22 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7185</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-7185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7185" source="CVE"/>
    <description>
    Integer overflow in bufferobject.c in Python before 2.7.8 allows context-dependent attackers to obtain sensitive information from process memory via a large size and offset in a "buffer" function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-7185.html">CVE-2014-7185</cve>
<bugzilla href="https://bugzilla.suse.com/898572">SUSE bug 898572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/913479">SUSE bug 913479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/955182">SUSE bug 955182</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204772" comment="libpython2_6-1_0-2.6.9-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204773" comment="libpython2_6-1_0-32bit-2.6.9-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204774" comment="python-2.6.9-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202000" comment="python-32bit-2.6.9-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204775" comment="python-base-2.6.9-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204776" comment="python-base-32bit-2.6.9-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204777" comment="python-curses-2.6.9-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202001" comment="python-demo-2.6.9-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202003" comment="python-doc-2.6-8.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202004" comment="python-doc-pdf-2.6-8.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202005" comment="python-gdbm-2.6.9-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202006" comment="python-idle-2.6.9-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202007" comment="python-tk-2.6.9-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204778" comment="python-xml-2.6.9-0.33 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204772" comment="libpython2_6-1_0-2.6.9-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204773" comment="libpython2_6-1_0-32bit-2.6.9-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208954" comment="libpython2_6-1_0-x86-2.6.9-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204774" comment="python-2.6.9-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202000" comment="python-32bit-2.6.9-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204775" comment="python-base-2.6.9-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204776" comment="python-base-32bit-2.6.9-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208955" comment="python-base-x86-2.6.9-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204777" comment="python-curses-2.6.9-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202001" comment="python-demo-2.6.9-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202003" comment="python-doc-2.6-8.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202004" comment="python-doc-pdf-2.6-8.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202005" comment="python-gdbm-2.6.9-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202006" comment="python-idle-2.6.9-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202007" comment="python-tk-2.6.9-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208956" comment="python-x86-2.6.9-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204778" comment="python-xml-2.6.9-0.33 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7186</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-7186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186" source="CVE"/>
    <description>
    The redirection implementation in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via crafted use of here documents, aka the "redir_stack" issue.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-7186.html">CVE-2014-7186</cve>
<bugzilla href="https://bugzilla.suse.com/1024628">SUSE bug 1024628</bugzilla>
<bugzilla href="https://bugzilla.suse.com/898603">SUSE bug 898603</bugzilla>
<bugzilla href="https://bugzilla.suse.com/898664">SUSE bug 898664</bugzilla>
<bugzilla href="https://bugzilla.suse.com/898762">SUSE bug 898762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/898812">SUSE bug 898812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/898884">SUSE bug 898884</bugzilla>
<bugzilla href="https://bugzilla.suse.com/900057">SUSE bug 900057</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204212" comment="bash-3.2-147.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204213" comment="bash-doc-3.2-147.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201586" comment="libreadline5-5.2-147.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204214" comment="libreadline5-32bit-5.2-147.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204215" comment="readline-doc-5.2-147.22 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204212" comment="bash-3.2-147.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204213" comment="bash-doc-3.2-147.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208432" comment="bash-x86-3.2-147.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201586" comment="libreadline5-5.2-147.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204214" comment="libreadline5-32bit-5.2-147.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208433" comment="libreadline5-x86-5.2-147.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204215" comment="readline-doc-5.2-147.22 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7187</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-7187" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187" source="CVE"/>
    <description>
    Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the "word_lineno" issue.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-7187.html">CVE-2014-7187</cve>
<bugzilla href="https://bugzilla.suse.com/1024628">SUSE bug 1024628</bugzilla>
<bugzilla href="https://bugzilla.suse.com/898603">SUSE bug 898603</bugzilla>
<bugzilla href="https://bugzilla.suse.com/898664">SUSE bug 898664</bugzilla>
<bugzilla href="https://bugzilla.suse.com/898762">SUSE bug 898762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/898812">SUSE bug 898812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/898884">SUSE bug 898884</bugzilla>
<bugzilla href="https://bugzilla.suse.com/900057">SUSE bug 900057</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204212" comment="bash-3.2-147.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204213" comment="bash-doc-3.2-147.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201586" comment="libreadline5-5.2-147.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204214" comment="libreadline5-32bit-5.2-147.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204215" comment="readline-doc-5.2-147.22 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204212" comment="bash-3.2-147.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204213" comment="bash-doc-3.2-147.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208432" comment="bash-x86-3.2-147.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201586" comment="libreadline5-5.2-147.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204214" comment="libreadline5-32bit-5.2-147.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208433" comment="libreadline5-x86-5.2-147.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204215" comment="readline-doc-5.2-147.22 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7188</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-7188" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7188" source="CVE"/>
    <description>
    The hvm_msr_read_intercept function in arch/x86/hvm/hvm.c in Xen 4.1 through 4.4.x uses an improper MSR range for x2APIC emulation, which allows local HVM guests to cause a denial of service (host crash) or read data from the hypervisor or other guests via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-7188.html">CVE-2014-7188</cve>
<bugzilla href="https://bugzilla.suse.com/880751">SUSE bug 880751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/897657">SUSE bug 897657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/903970">SUSE bug 903970</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204923" comment="xen-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204924" comment="xen-doc-html-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204925" comment="xen-doc-pdf-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204926" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204927" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204928" comment="xen-libs-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204929" comment="xen-libs-32bit-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204930" comment="xen-tools-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204931" comment="xen-tools-domU-4.2.4_04-0.9 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204923" comment="xen-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204924" comment="xen-doc-html-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204925" comment="xen-doc-pdf-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204926" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204928" comment="xen-libs-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204929" comment="xen-libs-32bit-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204930" comment="xen-tools-4.2.4_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204931" comment="xen-tools-domU-4.2.4_04-0.9 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7810</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-7810" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7810" source="CVE"/>
    <description>
    The Expression Language (EL) implementation in Apache Tomcat 6.x before 6.0.44, 7.x before 7.0.58, and 8.x before 8.0.16 does not properly consider the possibility of an accessible interface implemented by an inaccessible class, which allows attackers to bypass a SecurityManager protection mechanism via a web application that leverages use of incorrect privileges during EL evaluation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-7810.html">CVE-2014-7810</cve>
<bugzilla href="https://bugzilla.suse.com/931442">SUSE bug 931442</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215064" comment="tomcat6-6.0.41-0.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215065" comment="tomcat6-admin-webapps-6.0.41-0.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215066" comment="tomcat6-docs-webapp-6.0.41-0.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215067" comment="tomcat6-javadoc-6.0.41-0.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215068" comment="tomcat6-jsp-2_1-api-6.0.41-0.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215069" comment="tomcat6-lib-6.0.41-0.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215070" comment="tomcat6-servlet-2_5-api-6.0.41-0.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215071" comment="tomcat6-webapps-6.0.41-0.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-7815" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7815" source="CVE"/>
    <description>
    The set_pixel_format function in ui/vnc.c in QEMU allows remote attackers to cause a denial of service (crash) via a small bytes_per_pixel value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-7815.html">CVE-2014-7815</cve>
<bugzilla href="https://bugzilla.suse.com/902737">SUSE bug 902737</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962627">SUSE bug 962627</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209045" comment="xen-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209046" comment="xen-doc-html-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209047" comment="xen-doc-pdf-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209048" comment="xen-kmp-default-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209049" comment="xen-kmp-pae-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209050" comment="xen-libs-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209051" comment="xen-libs-32bit-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209052" comment="xen-tools-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209053" comment="xen-tools-domU-4.2.5_20-24 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250394" comment="kvm-1.4.2-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7817</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-7817" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817" source="CVE"/>
    <description>
    The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((`...`))".
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-7817.html">CVE-2014-7817</cve>
<bugzilla href="https://bugzilla.suse.com/906371">SUSE bug 906371</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214849" comment="glibc-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214850" comment="glibc-32bit-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214851" comment="glibc-devel-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214852" comment="glibc-devel-32bit-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214881" comment="glibc-html-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214853" comment="glibc-i18ndata-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214882" comment="glibc-info-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214854" comment="glibc-locale-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214855" comment="glibc-locale-32bit-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214883" comment="glibc-profile-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214884" comment="glibc-profile-32bit-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214856" comment="nscd-2.11.3-17.82 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214849" comment="glibc-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214850" comment="glibc-32bit-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214851" comment="glibc-devel-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214852" comment="glibc-devel-32bit-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214881" comment="glibc-html-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214853" comment="glibc-i18ndata-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214882" comment="glibc-info-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214854" comment="glibc-locale-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214855" comment="glibc-locale-32bit-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264500" comment="glibc-locale-x86-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214883" comment="glibc-profile-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214884" comment="glibc-profile-32bit-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264501" comment="glibc-profile-x86-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264502" comment="glibc-x86-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214856" comment="nscd-2.11.3-17.82 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7819</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2014-7819" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7819" source="CVE"/>
    <description>
    Multiple directory traversal vulnerabilities in server.rb in Sprockets before 2.0.5, 2.1.x before 2.1.4, 2.2.x before 2.2.3, 2.3.x before 2.3.3, 2.4.x before 2.4.6, 2.5.x before 2.5.1, 2.6.x and 2.7.x before 2.7.1, 2.8.x before 2.8.3, 2.9.x before 2.9.4, 2.10.x before 2.10.2, 2.11.x before 2.11.3, 2.12.x before 2.12.3, and 3.x before 3.0.0.beta.3, as distributed with Ruby on Rails 3.x and 4.x, allow remote attackers to determine the existence of files outside the application root via a ../ (dot dot slash) sequence with (1) double slashes or (2) URL encoding.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-7819.html">CVE-2014-7819</cve>
<bugzilla href="https://bugzilla.suse.com/903658">SUSE bug 903658</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215939" comment="ruby2.1-rubygem-sprockets-2_11-2.11.0-0.9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7822</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2014-7822" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7822" source="CVE"/>
    <description>
    The implementation of certain splice_write file operations in the Linux kernel before 3.16 does not enforce a restriction on the maximum size of a single file, which allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted splice system call, as demonstrated by use of a file descriptor associated with an ext4 filesystem.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-7822.html">CVE-2014-7822</cve>
<bugzilla href="https://bugzilla.suse.com/915322">SUSE bug 915322</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915517">SUSE bug 915517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/939240">SUSE bug 939240</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214952" comment="kernel-bigsmp-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214953" comment="kernel-bigsmp-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214910" comment="kernel-bigsmp-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214911" comment="kernel-default-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214912" comment="kernel-default-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214913" comment="kernel-default-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264496" comment="kernel-default-man-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214954" comment="kernel-ec2-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214955" comment="kernel-ec2-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214956" comment="kernel-ec2-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264488" comment="kernel-pae-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264489" comment="kernel-pae-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264490" comment="kernel-pae-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264497" comment="kernel-ppc64-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264498" comment="kernel-ppc64-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264499" comment="kernel-ppc64-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214915" comment="kernel-source-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214916" comment="kernel-syms-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214957" comment="kernel-trace-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214958" comment="kernel-trace-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214917" comment="kernel-trace-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214918" comment="kernel-xen-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214919" comment="kernel-xen-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214920" comment="kernel-xen-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214922" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.50-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264492" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.50-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7823</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-7823" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7823" source="CVE"/>
    <description>
    The virDomainGetXMLDesc API in Libvirt before 1.2.11 allows remote read-only users to obtain the VNC password by using the VIR_DOMAIN_XML_MIGRATABLE flag, which triggers the use of the VIR_DOMAIN_XML_SECURE flag.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-7823.html">CVE-2014-7823</cve>
<bugzilla href="https://bugzilla.suse.com/904176">SUSE bug 904176</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204579" comment="kvm-1.4.2-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204580" comment="libvirt-1.0.5.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204581" comment="libvirt-client-1.0.5.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204582" comment="libvirt-client-32bit-1.0.5.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204583" comment="libvirt-doc-1.0.5.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208729" comment="libvirt-lock-sanlock-1.0.5.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204584" comment="libvirt-python-1.0.5.9-0.19 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7826</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-7826" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7826" source="CVE"/>
    <description>
    kernel/trace/trace_syscalls.c in the Linux kernel through 3.17.2 does not properly handle private syscall numbers during use of the ftrace subsystem, which allows local users to gain privileges or cause a denial of service (invalid pointer dereference) via a crafted application.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-7826.html">CVE-2014-7826</cve>
<bugzilla href="https://bugzilla.suse.com/904012">SUSE bug 904012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/904013">SUSE bug 904013</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213307" comment="kernel-bigsmp-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213308" comment="kernel-bigsmp-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213244" comment="kernel-bigsmp-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213245" comment="kernel-default-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213246" comment="kernel-default-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213247" comment="kernel-default-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264361" comment="kernel-default-man-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213309" comment="kernel-ec2-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213310" comment="kernel-ec2-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213311" comment="kernel-ec2-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264348" comment="kernel-pae-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264349" comment="kernel-pae-base-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264350" comment="kernel-pae-devel-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264362" comment="kernel-ppc64-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264363" comment="kernel-ppc64-base-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264364" comment="kernel-ppc64-devel-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213249" comment="kernel-source-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213250" comment="kernel-syms-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213312" comment="kernel-trace-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213313" comment="kernel-trace-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213251" comment="kernel-trace-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213252" comment="kernel-xen-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213253" comment="kernel-xen-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213254" comment="kernel-xen-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213256" comment="xen-kmp-default-4.2.5_02_3.0.101_0.46-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264352" comment="xen-kmp-pae-4.2.5_02_3.0.101_0.42-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-7840" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7840" source="CVE"/>
    <description>
    The host_from_stream_offset function in arch_init.c in QEMU, when loading RAM during migration, allows remote attackers to execute arbitrary code via a crafted (1) offset or (2) length value in savevm data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-7840.html">CVE-2014-7840</cve>
<bugzilla href="https://bugzilla.suse.com/905097">SUSE bug 905097</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204579" comment="kvm-1.4.2-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204580" comment="libvirt-1.0.5.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204581" comment="libvirt-client-1.0.5.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204582" comment="libvirt-client-32bit-1.0.5.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204583" comment="libvirt-doc-1.0.5.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208729" comment="libvirt-lock-sanlock-1.0.5.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204584" comment="libvirt-python-1.0.5.9-0.19 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7841</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-7841" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7841" source="CVE"/>
    <description>
    The sctp_process_param function in net/sctp/sm_make_chunk.c in the SCTP implementation in the Linux kernel before 3.17.4, when ASCONF is used, allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via a malformed INIT chunk.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-7841.html">CVE-2014-7841</cve>
<bugzilla href="https://bugzilla.suse.com/904899">SUSE bug 904899</bugzilla>
<bugzilla href="https://bugzilla.suse.com/905100">SUSE bug 905100</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213307" comment="kernel-bigsmp-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213308" comment="kernel-bigsmp-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213244" comment="kernel-bigsmp-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213245" comment="kernel-default-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213246" comment="kernel-default-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213247" comment="kernel-default-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264361" comment="kernel-default-man-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213309" comment="kernel-ec2-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213310" comment="kernel-ec2-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213311" comment="kernel-ec2-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264348" comment="kernel-pae-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264349" comment="kernel-pae-base-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264350" comment="kernel-pae-devel-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264362" comment="kernel-ppc64-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264363" comment="kernel-ppc64-base-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264364" comment="kernel-ppc64-devel-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213249" comment="kernel-source-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213250" comment="kernel-syms-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213312" comment="kernel-trace-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213313" comment="kernel-trace-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213251" comment="kernel-trace-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213252" comment="kernel-xen-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213253" comment="kernel-xen-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213254" comment="kernel-xen-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213256" comment="xen-kmp-default-4.2.5_02_3.0.101_0.46-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264352" comment="xen-kmp-pae-4.2.5_02_3.0.101_0.42-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7842</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2014-7842" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7842" source="CVE"/>
    <description>
    Race condition in arch/x86/kvm/x86.c in the Linux kernel before 3.17.4 allows guest OS users to cause a denial of service (guest OS crash) via a crafted application that performs an MMIO transaction or a PIO transaction to trigger a guest userspace emulation error report, a similar issue to CVE-2010-5313.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-7842.html">CVE-2014-7842</cve>
<bugzilla href="https://bugzilla.suse.com/905312">SUSE bug 905312</bugzilla>
<bugzilla href="https://bugzilla.suse.com/907822">SUSE bug 907822</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214952" comment="kernel-bigsmp-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214953" comment="kernel-bigsmp-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214910" comment="kernel-bigsmp-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214911" comment="kernel-default-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214912" comment="kernel-default-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214913" comment="kernel-default-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264496" comment="kernel-default-man-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214954" comment="kernel-ec2-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214955" comment="kernel-ec2-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214956" comment="kernel-ec2-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264488" comment="kernel-pae-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264489" comment="kernel-pae-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264490" comment="kernel-pae-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264497" comment="kernel-ppc64-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264498" comment="kernel-ppc64-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264499" comment="kernel-ppc64-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214915" comment="kernel-source-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214916" comment="kernel-syms-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214957" comment="kernel-trace-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214958" comment="kernel-trace-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214917" comment="kernel-trace-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214918" comment="kernel-xen-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214919" comment="kernel-xen-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214920" comment="kernel-xen-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214922" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.50-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264492" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.50-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7844</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-7844" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7844" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-7844.html">CVE-2014-7844</cve>
<bugzilla href="https://bugzilla.suse.com/909208">SUSE bug 909208</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204672" comment="mailx-12.5-1.7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7960</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2014-7960" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7960" source="CVE"/>
    <description>
    OpenStack Object Storage (Swift) before 2.2.0 allows remote authenticated users to bypass the max_meta_count and other metadata constraints via multiple crafted requests which exceed the limit when combined.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-7960.html">CVE-2014-7960</cve>
<bugzilla href="https://bugzilla.suse.com/900253">SUSE bug 900253</bugzilla>
<bugzilla href="https://bugzilla.suse.com/927793">SUSE bug 927793</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215911" comment="openstack-swift-2.1.0-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215912" comment="openstack-swift-account-2.1.0-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215913" comment="openstack-swift-container-2.1.0-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215914" comment="openstack-swift-doc-2.1.0-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215915" comment="openstack-swift-object-2.1.0-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215916" comment="openstack-swift-proxy-2.1.0-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215917" comment="python-swift-2.1.0-11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7970</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2014-7970" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7970" source="CVE"/>
    <description>
    The pivot_root implementation in fs/namespace.c in the Linux kernel through 3.17 does not properly interact with certain locations of a chroot directory, which allows local users to cause a denial of service (mount-tree loop) via . (dot) values in both arguments to the pivot_root system call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-7970.html">CVE-2014-7970</cve>
<bugzilla href="https://bugzilla.suse.com/900644">SUSE bug 900644</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214952" comment="kernel-bigsmp-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214953" comment="kernel-bigsmp-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214910" comment="kernel-bigsmp-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214911" comment="kernel-default-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214912" comment="kernel-default-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214913" comment="kernel-default-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264496" comment="kernel-default-man-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214954" comment="kernel-ec2-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214955" comment="kernel-ec2-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214956" comment="kernel-ec2-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264488" comment="kernel-pae-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264489" comment="kernel-pae-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264490" comment="kernel-pae-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264497" comment="kernel-ppc64-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264498" comment="kernel-ppc64-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264499" comment="kernel-ppc64-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214915" comment="kernel-source-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214916" comment="kernel-syms-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214957" comment="kernel-trace-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214958" comment="kernel-trace-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214917" comment="kernel-trace-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214918" comment="kernel-xen-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214919" comment="kernel-xen-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214920" comment="kernel-xen-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214922" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.50-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264492" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.50-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8080</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8080" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8080" source="CVE"/>
    <description>
    The REXML parser in Ruby 1.9.x before 1.9.3-p550, 2.0.x before 2.0.0-p594, and 2.1.x before 2.1.4 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document, aka an XML Entity Expansion (XEE) attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8080.html">CVE-2014-8080</cve>
<bugzilla href="https://bugzilla.suse.com/902851">SUSE bug 902851</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200440" comment="ruby-1.8.7.p357-0.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200441" comment="ruby-doc-html-1.8.7.p357-0.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200442" comment="ruby-tk-1.8.7.p357-0.9.17 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8086</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8086" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8086" source="CVE"/>
    <description>
    Race condition in the ext4_file_write_iter function in fs/ext4/file.c in the Linux kernel through 3.17 allows local users to cause a denial of service (file unavailability) via a combination of a write action and an F_SETFL fcntl operation for the O_DIRECT flag.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8086.html">CVE-2014-8086</cve>
<bugzilla href="https://bugzilla.suse.com/900881">SUSE bug 900881</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215410" comment="kernel-default-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215411" comment="kernel-default-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215412" comment="kernel-default-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264515" comment="kernel-default-man-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215451" comment="kernel-ec2-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215452" comment="kernel-ec2-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215453" comment="kernel-ec2-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264508" comment="kernel-pae-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264509" comment="kernel-pae-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264510" comment="kernel-pae-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264516" comment="kernel-ppc64-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264517" comment="kernel-ppc64-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264518" comment="kernel-ppc64-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215414" comment="kernel-source-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215415" comment="kernel-syms-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215454" comment="kernel-trace-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215455" comment="kernel-trace-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215416" comment="kernel-trace-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215417" comment="kernel-xen-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215418" comment="kernel-xen-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215419" comment="kernel-xen-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215421" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264390" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8090</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8090" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8090" source="CVE"/>
    <description>
    The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8090.html">CVE-2014-8090</cve>
<bugzilla href="https://bugzilla.suse.com/905326">SUSE bug 905326</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200440" comment="ruby-1.8.7.p357-0.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200441" comment="ruby-doc-html-1.8.7.p357-0.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200442" comment="ruby-tk-1.8.7.p357-0.9.17 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8091</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8091" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091" source="CVE"/>
    <description>
    X.Org X Window System (aka X11 and X) X11R5 and X.Org Server (aka xserver and xorg-server) before 1.16.3, when using SUN-DES-1 (Secure RPC) authentication credentials, does not check the return value of a malloc call, which allows remote attackers to cause a denial of service (NULL pointer dereference and server crash) via a crafted connection request.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8091.html">CVE-2014-8091</cve>
<bugzilla href="https://bugzilla.suse.com/882226">SUSE bug 882226</bugzilla>
<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215456" comment="xorg-x11-Xvnc-7.4-27.101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215457" comment="xorg-x11-server-7.4-27.101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215458" comment="xorg-x11-server-extra-7.4-27.101 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8092</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8092" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092" source="CVE"/>
    <description>
    Multiple integer overflows in X.Org X Window System (aka X11 or X) X11R1 and X.Org Server (aka xserver and xorg-server) before 1.16.3 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a crafted request to the (1) ProcPutImage, (2) GetHosts, (3) RegionSizeof, or (4) REQUEST_FIXED_SIZE function, which triggers an out-of-bounds read or write.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8092.html">CVE-2014-8092</cve>
<bugzilla href="https://bugzilla.suse.com/1146596">SUSE bug 1146596</bugzilla>
<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
<bugzilla href="https://bugzilla.suse.com/928520">SUSE bug 928520</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215456" comment="xorg-x11-Xvnc-7.4-27.101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215457" comment="xorg-x11-server-7.4-27.101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215458" comment="xorg-x11-server-extra-7.4-27.101 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8093</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8093" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093" source="CVE"/>
    <description>
    Multiple integer overflows in the GLX extension in XFree86 4.0, X.Org X Window System (aka X11 or X) X11R6.7, and X.Org Server (aka xserver and xorg-server) before 1.16.3 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a crafted request to the (1) __glXDisp_ReadPixels, (2) __glXDispSwap_ReadPixels, (3) __glXDisp_GetTexImage, (4) __glXDispSwap_GetTexImage, (5) GetSeparableFilter, (6) GetConvolutionFilter, (7) GetHistogram, (8) GetMinmax, (9) GetColorTable, (10) __glXGetAnswerBuffer, (11) __GLX_GET_ANSWER_BUFFER, (12) __glXMap1dReqSize, (13) __glXMap1fReqSize, (14) Map2Size, (15) __glXMap2dReqSize, (16) __glXMap2fReqSize, (17) __glXImageSize, or (18) __glXSeparableFilter2DReqSize function, which triggers an out-of-bounds read or write.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8093.html">CVE-2014-8093</cve>
<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215456" comment="xorg-x11-Xvnc-7.4-27.101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215457" comment="xorg-x11-server-7.4-27.101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215458" comment="xorg-x11-server-extra-7.4-27.101 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8094</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8094" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094" source="CVE"/>
    <description>
    Integer overflow in the ProcDRI2GetBuffers function in the DRI2 extension in X.Org Server (aka xserver and xorg-server) 1.7.0 through 1.16.x before 1.16.3 allows remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a crafted request, which triggers an out-of-bounds read or write.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8094.html">CVE-2014-8094</cve>
<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215456" comment="xorg-x11-Xvnc-7.4-27.101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215457" comment="xorg-x11-server-7.4-27.101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215458" comment="xorg-x11-server-extra-7.4-27.101 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8095</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8095" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095" source="CVE"/>
    <description>
    The XInput extension in X.Org X Window System (aka X11 or X) X11R4 and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) SProcXChangeDeviceControl, (2) ProcXChangeDeviceControl, (3) ProcXChangeFeedbackControl, (4) ProcXSendExtensionEvent, (5) SProcXIAllowEvents, (6) SProcXIChangeCursor, (7) ProcXIChangeHierarchy, (8) SProcXIGetClientPointer, (9) SProcXIGrabDevice, (10) SProcXIUngrabDevice, (11) ProcXIUngrabDevice, (12) SProcXIPassiveGrabDevice, (13) ProcXIPassiveGrabDevice, (14) SProcXIPassiveUngrabDevice, (15) ProcXIPassiveUngrabDevice, (16) SProcXListDeviceProperties, (17) SProcXDeleteDeviceProperty, (18) SProcXIListProperties, (19) SProcXIDeleteProperty, (20) SProcXIGetProperty, (21) SProcXIQueryDevice, (22) SProcXIQueryPointer, (23) SProcXISelectEvents, (24) SProcXISetClientPointer, (25) SProcXISetFocus, (26) SProcXIGetFocus, or (27) SProcXIWarpPointer function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8095.html">CVE-2014-8095</cve>
<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215456" comment="xorg-x11-Xvnc-7.4-27.101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215457" comment="xorg-x11-server-7.4-27.101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215458" comment="xorg-x11-server-extra-7.4-27.101 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8096</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8096" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096" source="CVE"/>
    <description>
    The SProcXCMiscGetXIDList function in the XC-MISC extension in X.Org X Window System (aka X11 or X) X11R6.0 and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8096.html">CVE-2014-8096</cve>
<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215456" comment="xorg-x11-Xvnc-7.4-27.101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215457" comment="xorg-x11-server-7.4-27.101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215458" comment="xorg-x11-server-extra-7.4-27.101 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8097</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8097" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097" source="CVE"/>
    <description>
    The DBE extension in X.Org X Window System (aka X11 or X) X11R6.1 and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) ProcDbeSwapBuffers or (2) SProcDbeSwapBuffers function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8097.html">CVE-2014-8097</cve>
<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215456" comment="xorg-x11-Xvnc-7.4-27.101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215457" comment="xorg-x11-server-7.4-27.101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215458" comment="xorg-x11-server-extra-7.4-27.101 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8098</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8098" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098" source="CVE"/>
    <description>
    The GLX extension in XFree86 4.0, X.Org X Window System (aka X11 or X) X11R6.7, and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) __glXDisp_Render, (2) __glXDisp_RenderLarge, (3) __glXDispSwap_VendorPrivate, (4) __glXDispSwap_VendorPrivateWithReply, (5) set_client_info, (6) __glXDispSwap_SetClientInfoARB, (7) DoSwapInterval, (8) DoGetProgramString, (9) DoGetString, (10) __glXDispSwap_RenderMode, (11) __glXDisp_GetCompressedTexImage, (12) __glXDispSwap_GetCompressedTexImage, (13) __glXDisp_FeedbackBuffer, (14) __glXDispSwap_FeedbackBuffer, (15) __glXDisp_SelectBuffer, (16) __glXDispSwap_SelectBuffer, (17) __glXDisp_Flush, (18) __glXDispSwap_Flush, (19) __glXDisp_Finish, (20) __glXDispSwap_Finish, (21) __glXDisp_ReadPixels, (22) __glXDispSwap_ReadPixels, (23) __glXDisp_GetTexImage, (24) __glXDispSwap_GetTexImage, (25) __glXDisp_GetPolygonStipple, (26) __glXDispSwap_GetPolygonStipple, (27) __glXDisp_GetSeparableFilter, (28) __glXDisp_GetSeparableFilterEXT, (29) __glXDisp_GetConvolutionFilter, (30) __glXDisp_GetConvolutionFilterEXT, (31) __glXDisp_GetHistogram, (32) __glXDisp_GetHistogramEXT, (33) __glXDisp_GetMinmax, (34) __glXDisp_GetMinmaxEXT, (35) __glXDisp_GetColorTable, (36) __glXDisp_GetColorTableSGI, (37) GetSeparableFilter, (38) GetConvolutionFilter, (39) GetHistogram, (40) GetMinmax, or (41) GetColorTable function.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8098.html">CVE-2014-8098</cve>
<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215456" comment="xorg-x11-Xvnc-7.4-27.101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215457" comment="xorg-x11-server-7.4-27.101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215458" comment="xorg-x11-server-extra-7.4-27.101 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8099</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8099" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099" source="CVE"/>
    <description>
    The XVideo extension in XFree86 4.0.0, X.Org X Window System (aka X11 or X) X11R6.7, and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) SProcXvQueryExtension, (2) SProcXvQueryAdaptors, (3) SProcXvQueryEncodings, (4) SProcXvGrabPort, (5) SProcXvUngrabPort, (6) SProcXvPutVideo, (7) SProcXvPutStill, (8) SProcXvGetVideo, (9) SProcXvGetStill, (10) SProcXvPutImage, (11) SProcXvShmPutImage, (12) SProcXvSelectVideoNotify, (13) SProcXvSelectPortNotify, (14) SProcXvStopVideo, (15) SProcXvSetPortAttribute, (16) SProcXvGetPortAttribute, (17) SProcXvQueryBestSize, (18) SProcXvQueryPortAttributes, (19) SProcXvQueryImageAttributes, or (20) SProcXvListImageFormats function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8099.html">CVE-2014-8099</cve>
<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215456" comment="xorg-x11-Xvnc-7.4-27.101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215457" comment="xorg-x11-server-7.4-27.101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215458" comment="xorg-x11-server-extra-7.4-27.101 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8100</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8100" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100" source="CVE"/>
    <description>
    The Render extension in XFree86 4.0.1, X.Org X Window System (aka X11 or X) X11R6.7, and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) ProcRenderQueryVersion, (2) SProcRenderQueryVersion, (3) SProcRenderQueryPictFormats, (4) SProcRenderQueryPictIndexValues, (5) SProcRenderCreatePicture, (6) SProcRenderChangePicture, (7) SProcRenderSetPictureClipRectangles, (8) SProcRenderFreePicture, (9) SProcRenderComposite, (10) SProcRenderScale, (11) SProcRenderCreateGlyphSet, (12) SProcRenderReferenceGlyphSet, (13) SProcRenderFreeGlyphSet, (14) SProcRenderFreeGlyphs, or (15) SProcRenderCompositeGlyphs function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8100.html">CVE-2014-8100</cve>
<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215456" comment="xorg-x11-Xvnc-7.4-27.101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215457" comment="xorg-x11-server-7.4-27.101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215458" comment="xorg-x11-server-extra-7.4-27.101 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8101</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8101" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101" source="CVE"/>
    <description>
    The RandR extension in XFree86 4.2.0, X.Org X Window System (aka X11 or X) X11R6.7, and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) SProcRRQueryVersion, (2) SProcRRGetScreenInfo, (3) SProcRRSelectInput, or (4) SProcRRConfigureOutputProperty function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8101.html">CVE-2014-8101</cve>
<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215456" comment="xorg-x11-Xvnc-7.4-27.101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215457" comment="xorg-x11-server-7.4-27.101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215458" comment="xorg-x11-server-extra-7.4-27.101 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8102</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8102" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102" source="CVE"/>
    <description>
    The SProcXFixesSelectSelectionInput function in the XFixes extension in X.Org X Window System (aka X11 or X) X11R6.8.0 and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8102.html">CVE-2014-8102</cve>
<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215456" comment="xorg-x11-Xvnc-7.4-27.101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215457" comment="xorg-x11-server-7.4-27.101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215458" comment="xorg-x11-server-extra-7.4-27.101 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8104</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8104" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8104" source="CVE"/>
    <description>
    OpenVPN 2.x before 2.0.11, 2.1.x, 2.2.x before 2.2.3, and 2.3.x before 2.3.6 allows remote authenticated users to cause a denial of service (server crash) via a small control channel packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8104.html">CVE-2014-8104</cve>
<bugzilla href="https://bugzilla.suse.com/907764">SUSE bug 907764</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200391" comment="openvpn-2.0.9-143.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200392" comment="openvpn-auth-pam-plugin-2.0.9-143.44 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8106</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2014-8106" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8106" source="CVE"/>
    <description>
    Heap-based buffer overflow in the Cirrus VGA emulator (hw/display/cirrus_vga.c) in QEMU before 2.2.0 allows local guest users to execute arbitrary code via vectors related to blit regions. NOTE: this vulnerability exists because an incomplete fix for CVE-2007-1320.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8106.html">CVE-2014-8106</cve>
<bugzilla href="https://bugzilla.suse.com/1023004">SUSE bug 1023004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/907805">SUSE bug 907805</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204579" comment="kvm-1.4.2-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204580" comment="libvirt-1.0.5.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204581" comment="libvirt-client-1.0.5.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204582" comment="libvirt-client-32bit-1.0.5.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204583" comment="libvirt-doc-1.0.5.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208729" comment="libvirt-lock-sanlock-1.0.5.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204584" comment="libvirt-python-1.0.5.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250412" comment="xen-4.2.5_21-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250413" comment="xen-doc-html-4.2.5_21-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250414" comment="xen-doc-pdf-4.2.5_21-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250415" comment="xen-kmp-default-4.2.5_21_3.0.101_0.116.TDC-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250416" comment="xen-libs-4.2.5_21-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250417" comment="xen-tools-4.2.5_21-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250418" comment="xen-tools-domU-4.2.5_21-37 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204579" comment="kvm-1.4.2-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204580" comment="libvirt-1.0.5.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204581" comment="libvirt-client-1.0.5.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204582" comment="libvirt-client-32bit-1.0.5.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204583" comment="libvirt-doc-1.0.5.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208729" comment="libvirt-lock-sanlock-1.0.5.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204584" comment="libvirt-python-1.0.5.9-0.19 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205957" comment="xen-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209062" comment="xen-doc-html-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209063" comment="xen-doc-pdf-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205958" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205959" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205960" comment="xen-libs-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209064" comment="xen-libs-32bit-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209065" comment="xen-tools-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205961" comment="xen-tools-domU-4.2.5_21-35 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205957" comment="xen-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209062" comment="xen-doc-html-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209063" comment="xen-doc-pdf-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205958" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205960" comment="xen-libs-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209064" comment="xen-libs-32bit-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209065" comment="xen-tools-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205961" comment="xen-tools-domU-4.2.5_21-35 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8111</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8111" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8111" source="CVE"/>
    <description>
    Apache Tomcat Connectors (mod_jk) before 1.2.41 ignores JkUnmount rules for subtrees of previous JkMount rules, which allows remote attackers to access otherwise restricted artifacts via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8111.html">CVE-2014-8111</cve>
<bugzilla href="https://bugzilla.suse.com/927845">SUSE bug 927845</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240961" comment="apache2-mod_jk-1.2.40-0.2.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8118</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8118" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8118" source="CVE"/>
    <description>
    Integer overflow in RPM 4.12 and earlier allows remote attackers to execute arbitrary code via a crafted CPIO header in the payload section of an RPM file, which triggers a stack-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8118.html">CVE-2014-8118</cve>
<bugzilla href="https://bugzilla.suse.com/1101137">SUSE bug 1101137</bugzilla>
<bugzilla href="https://bugzilla.suse.com/906803">SUSE bug 906803</bugzilla>
<bugzilla href="https://bugzilla.suse.com/908128">SUSE bug 908128</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204751" comment="popt-1.7-37.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204752" comment="popt-32bit-1.7-37.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204753" comment="rpm-4.4.2.3-37.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201990" comment="rpm-32bit-4.4.2.3-37.60 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204751" comment="popt-1.7-37.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204752" comment="popt-32bit-1.7-37.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208941" comment="popt-x86-1.7-37.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204753" comment="rpm-4.4.2.3-37.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201990" comment="rpm-32bit-4.4.2.3-37.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201993" comment="rpm-x86-4.4.2.3-37.60 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8119</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8119" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8119" source="CVE"/>
    <description>
    The find_ifcfg_path function in netcf before 0.2.7 might allow attackers to cause a denial of service (application crash) via vectors involving augeas path expressions.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8119.html">CVE-2014-8119</cve>
<bugzilla href="https://bugzilla.suse.com/925225">SUSE bug 925225</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201584" comment="augeas-0.9.0-3.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208431" comment="augeas-lenses-0.9.0-3.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204211" comment="libaugeas0-0.9.0-3.17 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202424" comment="augeas-0.9.0-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209168" comment="augeas-lenses-0.9.0-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209169" comment="libaugeas0-0.9.0-3.21.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8121</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8121" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121" source="CVE"/>
    <description>
    DB_LOOKUP in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C Library (aka glibc or libc6) 2.21 and earlier does not properly check if a file is open, which allows remote attackers to cause a denial of service (infinite loop) by performing a look-up on a database while iterating over it, which triggers the file pointer to be reset.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8121.html">CVE-2014-8121</cve>
<bugzilla href="https://bugzilla.suse.com/918187">SUSE bug 918187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/939211">SUSE bug 939211</bugzilla>
<bugzilla href="https://bugzilla.suse.com/945779">SUSE bug 945779</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201690" comment="glibc-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204409" comment="glibc-32bit-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204410" comment="glibc-devel-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204411" comment="glibc-devel-32bit-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201691" comment="glibc-html-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204412" comment="glibc-i18ndata-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201692" comment="glibc-info-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204413" comment="glibc-locale-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204414" comment="glibc-locale-32bit-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208504" comment="glibc-locale-x86-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208505" comment="glibc-profile-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208506" comment="glibc-profile-32bit-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208507" comment="glibc-profile-x86-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208508" comment="glibc-x86-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204415" comment="nscd-2.11.3-17.87 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201690" comment="glibc-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204409" comment="glibc-32bit-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204410" comment="glibc-devel-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204411" comment="glibc-devel-32bit-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201691" comment="glibc-html-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204412" comment="glibc-i18ndata-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201692" comment="glibc-info-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204413" comment="glibc-locale-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204414" comment="glibc-locale-32bit-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208505" comment="glibc-profile-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208506" comment="glibc-profile-32bit-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204415" comment="nscd-2.11.3-17.87 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8127</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8127" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8127" source="CVE"/>
    <description>
    LibTIFF 4.0.3 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted TIFF image to the (1) checkInkNamesString function in tif_dir.c in the thumbnail tool, (2) compresscontig function in tiff2bw.c in the tiff2bw tool, (3) putcontig8bitCIELab function in tif_getimage.c in the tiff2rgba tool, LZWPreDecode function in tif_lzw.c in the (4) tiff2ps or (5) tiffdither tool, (6) NeXTDecode function in tif_next.c in the tiffmedian tool, or (7) TIFFWriteDirectoryTagLongLong8Array function in tif_dirwrite.c in the tiffset tool.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8127.html">CVE-2014-8127</cve>
<bugzilla href="https://bugzilla.suse.com/914890">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/916925">SUSE bug 916925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/942690">SUSE bug 942690</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204848" comment="libtiff3-3.8.2-141.160 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204849" comment="libtiff3-32bit-3.8.2-141.160 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202100" comment="tiff-3.8.2-141.160 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204848" comment="libtiff3-3.8.2-141.160 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204849" comment="libtiff3-32bit-3.8.2-141.160 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209042" comment="libtiff3-x86-3.8.2-141.160 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202100" comment="tiff-3.8.2-141.160 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8128</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8128" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8128" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8128.html">CVE-2014-8128</cve>
<bugzilla href="https://bugzilla.suse.com/1007276">SUSE bug 1007276</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1017690">SUSE bug 1017690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1040322">SUSE bug 1040322</bugzilla>
<bugzilla href="https://bugzilla.suse.com/914890">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/916925">SUSE bug 916925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/942690">SUSE bug 942690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/960341">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/974621">SUSE bug 974621</bugzilla>
<bugzilla href="https://bugzilla.suse.com/983436">SUSE bug 983436</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204848" comment="libtiff3-3.8.2-141.160 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204849" comment="libtiff3-32bit-3.8.2-141.160 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209042" comment="libtiff3-x86-3.8.2-141.160 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202100" comment="tiff-3.8.2-141.160 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009229551" comment="libtiff3-3.8.2-141.169.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229568" comment="libtiff3-32bit-3.8.2-141.169.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229522" comment="tiff-3.8.2-141.169.9 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8129</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8129" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8129" source="CVE"/>
    <description>
    LibTIFF 4.0.3 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by failure of tif_next.c to verify that the BitsPerSample value is 2, and the t2p_sample_lab_signed_to_unsigned function in tiff2pdf.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8129.html">CVE-2014-8129</cve>
<bugzilla href="https://bugzilla.suse.com/914890">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/916925">SUSE bug 916925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/942690">SUSE bug 942690</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204848" comment="libtiff3-3.8.2-141.160 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204849" comment="libtiff3-32bit-3.8.2-141.160 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202100" comment="tiff-3.8.2-141.160 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204848" comment="libtiff3-3.8.2-141.160 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204849" comment="libtiff3-32bit-3.8.2-141.160 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209042" comment="libtiff3-x86-3.8.2-141.160 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202100" comment="tiff-3.8.2-141.160 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8130</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8130" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8130" source="CVE"/>
    <description>
    The _TIFFmalloc function in tif_unix.c in LibTIFF 4.0.3 does not reject a zero size, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image that is mishandled by the TIFFWriteScanline function in tif_write.c, as demonstrated by tiffdither.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8130.html">CVE-2014-8130</cve>
<bugzilla href="https://bugzilla.suse.com/914890">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/916925">SUSE bug 916925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/942690">SUSE bug 942690</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204848" comment="libtiff3-3.8.2-141.160 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204849" comment="libtiff3-32bit-3.8.2-141.160 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202100" comment="tiff-3.8.2-141.160 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204848" comment="libtiff3-3.8.2-141.160 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204849" comment="libtiff3-32bit-3.8.2-141.160 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209042" comment="libtiff3-x86-3.8.2-141.160 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202100" comment="tiff-3.8.2-141.160 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8133</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8133" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8133" source="CVE"/>
    <description>
    arch/x86/kernel/tls.c in the Thread Local Storage (TLS) implementation in the Linux kernel through 3.18.1 allows local users to bypass the espfix protection mechanism, and consequently makes it easier for local users to bypass the ASLR protection mechanism, via a crafted application that makes a set_thread_area system call and later reads a 16-bit value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8133.html">CVE-2014-8133</cve>
<bugzilla href="https://bugzilla.suse.com/817142">SUSE bug 817142</bugzilla>
<bugzilla href="https://bugzilla.suse.com/906545">SUSE bug 906545</bugzilla>
<bugzilla href="https://bugzilla.suse.com/907818">SUSE bug 907818</bugzilla>
<bugzilla href="https://bugzilla.suse.com/909077">SUSE bug 909077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/923485">SUSE bug 923485</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214952" comment="kernel-bigsmp-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214953" comment="kernel-bigsmp-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214910" comment="kernel-bigsmp-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214911" comment="kernel-default-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214912" comment="kernel-default-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214913" comment="kernel-default-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264496" comment="kernel-default-man-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214954" comment="kernel-ec2-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214955" comment="kernel-ec2-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214956" comment="kernel-ec2-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264488" comment="kernel-pae-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264489" comment="kernel-pae-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264490" comment="kernel-pae-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264497" comment="kernel-ppc64-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264498" comment="kernel-ppc64-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264499" comment="kernel-ppc64-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214915" comment="kernel-source-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214916" comment="kernel-syms-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214957" comment="kernel-trace-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214958" comment="kernel-trace-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214917" comment="kernel-trace-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214918" comment="kernel-xen-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214919" comment="kernel-xen-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214920" comment="kernel-xen-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214922" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.50-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264492" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.50-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8134</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2014-8134" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8134" source="CVE"/>
    <description>
    The paravirt_ops_setup function in arch/x86/kernel/kvm.c in the Linux kernel through 3.18 uses an improper paravirt_enabled setting for KVM guest kernels, which makes it easier for guest OS users to bypass the ASLR protection mechanism via a crafted application that reads a 16-bit value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8134.html">CVE-2014-8134</cve>
<bugzilla href="https://bugzilla.suse.com/907818">SUSE bug 907818</bugzilla>
<bugzilla href="https://bugzilla.suse.com/909077">SUSE bug 909077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/909078">SUSE bug 909078</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214952" comment="kernel-bigsmp-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214953" comment="kernel-bigsmp-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214910" comment="kernel-bigsmp-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214911" comment="kernel-default-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214912" comment="kernel-default-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214913" comment="kernel-default-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264496" comment="kernel-default-man-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214954" comment="kernel-ec2-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214955" comment="kernel-ec2-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214956" comment="kernel-ec2-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264488" comment="kernel-pae-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264489" comment="kernel-pae-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264490" comment="kernel-pae-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264497" comment="kernel-ppc64-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264498" comment="kernel-ppc64-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264499" comment="kernel-ppc64-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214915" comment="kernel-source-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214916" comment="kernel-syms-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214957" comment="kernel-trace-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214958" comment="kernel-trace-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214917" comment="kernel-trace-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214918" comment="kernel-xen-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214919" comment="kernel-xen-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214920" comment="kernel-xen-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214922" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.50-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264492" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.50-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8137</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8137" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8137" source="CVE"/>
    <description>
    Double free vulnerability in the jas_iccattrval_destroy function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted ICC color profile in a JPEG 2000 image file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8137.html">CVE-2014-8137</cve>
<bugzilla href="https://bugzilla.suse.com/909474">SUSE bug 909474</bugzilla>
<bugzilla href="https://bugzilla.suse.com/909475">SUSE bug 909475</bugzilla>
<bugzilla href="https://bugzilla.suse.com/911837">SUSE bug 911837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/968373">SUSE bug 968373</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200241" comment="libjasper-1.900.1-134.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200242" comment="libjasper-32bit-1.900.1-134.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200243" comment="libjasper-x86-1.900.1-134.17 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200241" comment="libjasper-1.900.1-134.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200242" comment="libjasper-32bit-1.900.1-134.17 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8138</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8138" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8138" source="CVE"/>
    <description>
    Heap-based buffer overflow in the jp2_decode function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8138.html">CVE-2014-8138</cve>
<bugzilla href="https://bugzilla.suse.com/909474">SUSE bug 909474</bugzilla>
<bugzilla href="https://bugzilla.suse.com/909475">SUSE bug 909475</bugzilla>
<bugzilla href="https://bugzilla.suse.com/911837">SUSE bug 911837</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200241" comment="libjasper-1.900.1-134.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200242" comment="libjasper-32bit-1.900.1-134.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200243" comment="libjasper-x86-1.900.1-134.17 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200241" comment="libjasper-1.900.1-134.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200242" comment="libjasper-32bit-1.900.1-134.17 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8139" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8139" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8139.html">CVE-2014-8139</cve>
<bugzilla href="https://bugzilla.suse.com/909214">SUSE bug 909214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915880">SUSE bug 915880</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200465" comment="unzip-6.00-11.13 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8140</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8140" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8140" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8140.html">CVE-2014-8140</cve>
<bugzilla href="https://bugzilla.suse.com/909214">SUSE bug 909214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/914442">SUSE bug 914442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915880">SUSE bug 915880</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215492" comment="unzip-6.00-11.9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8141</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8141" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8141" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8141.html">CVE-2014-8141</cve>
<bugzilla href="https://bugzilla.suse.com/909214">SUSE bug 909214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915880">SUSE bug 915880</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215492" comment="unzip-6.00-11.9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8142</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8142" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8142" source="CVE"/>
    <description>
    Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.36, 5.5.x before 5.5.20, and 5.6.x before 5.6.4 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate keys within the serialized properties of an object, a different vulnerability than CVE-2004-1019.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8142.html">CVE-2014-8142</cve>
<bugzilla href="https://bugzilla.suse.com/910659">SUSE bug 910659</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215493" comment="apache2-mod_php53-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215494" comment="php53-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215495" comment="php53-bcmath-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215496" comment="php53-bz2-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215497" comment="php53-calendar-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215498" comment="php53-ctype-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215499" comment="php53-curl-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215500" comment="php53-dba-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215501" comment="php53-dom-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215502" comment="php53-exif-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215503" comment="php53-fastcgi-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215504" comment="php53-fileinfo-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215505" comment="php53-ftp-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215506" comment="php53-gd-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215507" comment="php53-gettext-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215508" comment="php53-gmp-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215509" comment="php53-iconv-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215510" comment="php53-intl-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215511" comment="php53-json-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215512" comment="php53-ldap-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215513" comment="php53-mbstring-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215514" comment="php53-mcrypt-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215515" comment="php53-mysql-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215516" comment="php53-odbc-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215517" comment="php53-openssl-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215518" comment="php53-pcntl-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215519" comment="php53-pdo-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215520" comment="php53-pear-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215521" comment="php53-pgsql-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215522" comment="php53-pspell-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215523" comment="php53-shmop-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215524" comment="php53-snmp-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215525" comment="php53-soap-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215526" comment="php53-suhosin-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215527" comment="php53-sysvmsg-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215528" comment="php53-sysvsem-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215529" comment="php53-sysvshm-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215530" comment="php53-tokenizer-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215531" comment="php53-wddx-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215532" comment="php53-xmlreader-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215533" comment="php53-xmlrpc-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215534" comment="php53-xmlwriter-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215535" comment="php53-xsl-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215536" comment="php53-zip-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215537" comment="php53-zlib-5.3.17-0.33 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8150</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8150" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8150" source="CVE"/>
    <description>
    CRLF injection vulnerability in libcurl 6.0 through 7.x before 7.40.0, when using an HTTP proxy, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in a URL.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8150.html">CVE-2014-8150</cve>
<bugzilla href="https://bugzilla.suse.com/911363">SUSE bug 911363</bugzilla>
<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204269" comment="curl-7.19.7-1.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204270" comment="libcurl4-7.19.7-1.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204271" comment="libcurl4-32bit-7.19.7-1.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208456" comment="libcurl4-x86-7.19.7-1.40 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204269" comment="curl-7.19.7-1.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204270" comment="libcurl4-7.19.7-1.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204271" comment="libcurl4-32bit-7.19.7-1.40 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8155" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8155" source="CVE"/>
    <description>
    GnuTLS before 2.9.10 does not verify the activation and expiration dates of CA certificates, which allows man-in-the-middle attackers to spoof servers via a certificate issued by a CA certificate that is (1) not yet valid or (2) no longer valid.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8155.html">CVE-2014-8155</cve>
<bugzilla href="https://bugzilla.suse.com/920366">SUSE bug 920366</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200061" comment="gnutls-2.4.1-24.39.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200062" comment="libgnutls-extra26-2.4.1-24.39.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200063" comment="libgnutls26-2.4.1-24.39.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200064" comment="libgnutls26-32bit-2.4.1-24.39.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200065" comment="libgnutls26-x86-2.4.1-24.39.55 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200061" comment="gnutls-2.4.1-24.39.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200062" comment="libgnutls-extra26-2.4.1-24.39.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200063" comment="libgnutls26-2.4.1-24.39.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200064" comment="libgnutls26-32bit-2.4.1-24.39.55 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8159</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8159" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8159" source="CVE"/>
    <description>
    The InfiniBand (IB) implementation in the Linux kernel package before 2.6.32-504.12.2 on Red Hat Enterprise Linux (RHEL) 6 does not properly restrict use of User Verbs for registration of memory regions, which allows local users to access arbitrary physical memory locations, and consequently cause a denial of service (system crash) or gain privileges, by leveraging permissions on a uverbs device under /dev/infiniband/.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8159.html">CVE-2014-8159</cve>
<bugzilla href="https://bugzilla.suse.com/903967">SUSE bug 903967</bugzilla>
<bugzilla href="https://bugzilla.suse.com/914742">SUSE bug 914742</bugzilla>
<bugzilla href="https://bugzilla.suse.com/939241">SUSE bug 939241</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215410" comment="kernel-default-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215411" comment="kernel-default-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215412" comment="kernel-default-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264515" comment="kernel-default-man-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215451" comment="kernel-ec2-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215452" comment="kernel-ec2-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215453" comment="kernel-ec2-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264508" comment="kernel-pae-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264509" comment="kernel-pae-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264510" comment="kernel-pae-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264516" comment="kernel-ppc64-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264517" comment="kernel-ppc64-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264518" comment="kernel-ppc64-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215414" comment="kernel-source-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215415" comment="kernel-syms-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215454" comment="kernel-trace-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215455" comment="kernel-trace-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215416" comment="kernel-trace-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215417" comment="kernel-xen-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215418" comment="kernel-xen-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215419" comment="kernel-xen-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215421" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264390" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8160</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2014-8160" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8160" source="CVE"/>
    <description>
    net/netfilter/nf_conntrack_proto_generic.c in the Linux kernel before 3.18 generates incorrect conntrack entries during handling of certain iptables rule sets for the SCTP, DCCP, GRE, and UDP-Lite protocols, which allows remote attackers to bypass intended access restrictions via packets with disallowed port numbers.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8160.html">CVE-2014-8160</cve>
<bugzilla href="https://bugzilla.suse.com/857643">SUSE bug 857643</bugzilla>
<bugzilla href="https://bugzilla.suse.com/913059">SUSE bug 913059</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214952" comment="kernel-bigsmp-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214953" comment="kernel-bigsmp-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214910" comment="kernel-bigsmp-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214911" comment="kernel-default-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214912" comment="kernel-default-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214913" comment="kernel-default-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264496" comment="kernel-default-man-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214954" comment="kernel-ec2-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214955" comment="kernel-ec2-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214956" comment="kernel-ec2-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264488" comment="kernel-pae-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264489" comment="kernel-pae-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264490" comment="kernel-pae-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264497" comment="kernel-ppc64-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264498" comment="kernel-ppc64-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264499" comment="kernel-ppc64-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214915" comment="kernel-source-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214916" comment="kernel-syms-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214957" comment="kernel-trace-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214958" comment="kernel-trace-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214917" comment="kernel-trace-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214918" comment="kernel-xen-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214919" comment="kernel-xen-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214920" comment="kernel-xen-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214922" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.50-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264492" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.50-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8161</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8161" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8161" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8161.html">CVE-2014-8161</cve>
<bugzilla href="https://bugzilla.suse.com/916953">SUSE bug 916953</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204759" comment="libecpg6-9.1.15-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204760" comment="libpq5-9.1.15-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204761" comment="libpq5-32bit-9.1.15-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204762" comment="postgresql91-9.1.15-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208944" comment="postgresql91-contrib-9.1.15-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204763" comment="postgresql91-docs-9.1.15-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208945" comment="postgresql91-server-9.1.15-0.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8184</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8184" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8184" source="CVE"/>
    <description>
    A vulnerability was found in liblouis, versions 2.5.x before 2.5.4. A stack-based buffer overflow was found in findTable() in liblouis. An attacker could create a malicious file that would cause applications that use liblouis (such as Orca) to crash, or potentially execute arbitrary code when opened.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8184.html">CVE-2014-8184</cve>
<bugzilla href="https://bugzilla.suse.com/1056088">SUSE bug 1056088</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1056090">SUSE bug 1056090</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1056093">SUSE bug 1056093</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1056095">SUSE bug 1056095</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1056105">SUSE bug 1056105</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1062458">SUSE bug 1062458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1067336">SUSE bug 1067336</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209919" comment="liblouis-1.7.0-1.3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209920" comment="liblouis0-1.7.0-1.3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209921" comment="python-louis-1.7.0-1.3.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8242</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8242" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8242" source="CVE"/>
    <description>
    librsync before 1.0.0 uses a truncated MD4 checksum to match blocks, which makes it easier for remote attackers to modify transmitted data via a birthday attack.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8242.html">CVE-2014-8242</cve>
<bugzilla href="https://bugzilla.suse.com/900914">SUSE bug 900914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/922710">SUSE bug 922710</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204802" comment="rsync-3.0.4-2.49 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8275</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8275" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8275" source="CVE"/>
    <description>
    OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not enforce certain constraints on certificate data, which allows remote attackers to defeat a fingerprint-based certificate-blacklist protection mechanism by including crafted data within a certificate's unsigned portion, related to crypto/asn1/a_verify.c, crypto/dsa/dsa_asn1.c, crypto/ecdsa/ecs_vrf.c, and crypto/x509/x_all.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8275.html">CVE-2014-8275</cve>
<bugzilla href="https://bugzilla.suse.com/911906">SUSE bug 911906</bugzilla>
<bugzilla href="https://bugzilla.suse.com/912018">SUSE bug 912018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/920339">SUSE bug 920339</bugzilla>
<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200254" comment="libmysql55client18-x86-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215291" comment="libopenssl0_9_8-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215292" comment="libopenssl0_9_8-32bit-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215295" comment="libopenssl0_9_8-hmac-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215296" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264506" comment="libopenssl0_9_8-x86-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215293" comment="openssl-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215297" comment="openssl-doc-0.9.8j-0.68 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215291" comment="libopenssl0_9_8-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215292" comment="libopenssl0_9_8-32bit-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215295" comment="libopenssl0_9_8-hmac-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215296" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215293" comment="openssl-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215297" comment="openssl-doc-0.9.8j-0.68 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8354</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8354" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8354" source="CVE"/>
    <description>
    The HorizontalFilter function in resize.c in ImageMagick before 6.8.9-9 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted image file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8354.html">CVE-2014-8354</cve>
<bugzilla href="https://bugzilla.suse.com/903204">SUSE bug 903204</bugzilla>
<bugzilla href="https://bugzilla.suse.com/903638">SUSE bug 903638</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200170" comment="libMagickCore1-6.4.3.6-7.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200171" comment="libMagickCore1-32bit-6.4.3.6-7.30 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8355</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8355" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8355" source="CVE"/>
    <description>
    PCX parser code in ImageMagick before 6.8.9-9 allows remote attackers to cause a denial of service (out-of-bounds read).
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8355.html">CVE-2014-8355</cve>
<bugzilla href="https://bugzilla.suse.com/903216">SUSE bug 903216</bugzilla>
<bugzilla href="https://bugzilla.suse.com/903638">SUSE bug 903638</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200170" comment="libMagickCore1-6.4.3.6-7.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200171" comment="libMagickCore1-32bit-6.4.3.6-7.30 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8369</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2014-8369" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8369" source="CVE"/>
    <description>
    The kvm_iommu_map_pages function in virt/kvm/iommu.c in the Linux kernel through 3.17.2 miscalculates the number of pages during the handling of a mapping failure, which allows guest OS users to cause a denial of service (host OS page unpinning) or possibly have unspecified other impact by leveraging guest OS privileges.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2014-3601.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8369.html">CVE-2014-8369</cve>
<bugzilla href="https://bugzilla.suse.com/892782">SUSE bug 892782</bugzilla>
<bugzilla href="https://bugzilla.suse.com/902675">SUSE bug 902675</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214952" comment="kernel-bigsmp-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214953" comment="kernel-bigsmp-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214910" comment="kernel-bigsmp-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214911" comment="kernel-default-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214912" comment="kernel-default-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214913" comment="kernel-default-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264496" comment="kernel-default-man-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214954" comment="kernel-ec2-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214955" comment="kernel-ec2-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214956" comment="kernel-ec2-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264488" comment="kernel-pae-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264489" comment="kernel-pae-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264490" comment="kernel-pae-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264497" comment="kernel-ppc64-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264498" comment="kernel-ppc64-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264499" comment="kernel-ppc64-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214915" comment="kernel-source-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214916" comment="kernel-syms-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214957" comment="kernel-trace-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214958" comment="kernel-trace-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214917" comment="kernel-trace-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214918" comment="kernel-xen-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214919" comment="kernel-xen-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214920" comment="kernel-xen-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214922" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.50-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264492" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.50-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8484" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8484" source="CVE"/>
    <description>
    The srec_scan function in bfd/srec.c in libdbfd in GNU binutils before 2.25 allows remote attackers to cause a denial of service (out-of-bounds read) via a small S-record.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8484.html">CVE-2014-8484</cve>
<bugzilla href="https://bugzilla.suse.com/902676">SUSE bug 902676</bugzilla>
<bugzilla href="https://bugzilla.suse.com/902677">SUSE bug 902677</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204228" comment="binutils-2.23.1-0.23 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8485" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8485" source="CVE"/>
    <description>
    The setup_group function in bfd/elf.c in libbfd in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted section group headers in an ELF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8485.html">CVE-2014-8485</cve>
<bugzilla href="https://bugzilla.suse.com/902676">SUSE bug 902676</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204228" comment="binutils-2.23.1-0.23 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8500</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8500" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8500" source="CVE"/>
    <description>
    ISC BIND 9.0.x through 9.8.x, 9.9.0 through 9.9.6, and 9.10.0 through 9.10.1 does not limit delegation chaining, which allows remote attackers to cause a denial of service (memory consumption and named crash) via a large or infinite number of referrals.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8500.html">CVE-2014-8500</cve>
<bugzilla href="https://bugzilla.suse.com/908994">SUSE bug 908994</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199934" comment="bind-9.9.6P1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199935" comment="bind-chrootenv-9.9.6P1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199936" comment="bind-doc-9.9.6P1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199937" comment="bind-libs-9.9.6P1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199938" comment="bind-libs-32bit-9.9.6P1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199939" comment="bind-libs-x86-9.9.6P1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199940" comment="bind-utils-9.9.6P1-0.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199934" comment="bind-9.9.6P1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199935" comment="bind-chrootenv-9.9.6P1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199936" comment="bind-doc-9.9.6P1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199937" comment="bind-libs-9.9.6P1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199938" comment="bind-libs-32bit-9.9.6P1-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199940" comment="bind-utils-9.9.6P1-0.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8501</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8501" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8501" source="CVE"/>
    <description>
    The _bfd_XXi_swap_aouthdr_in function in bfd/peXXigen.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (out-of-bounds write) and possibly have other unspecified impact via a crafted NumberOfRvaAndSizes field in the AOUT header in a PE executable.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8501.html">CVE-2014-8501</cve>
<bugzilla href="https://bugzilla.suse.com/903655">SUSE bug 903655</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204228" comment="binutils-2.23.1-0.23 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8502</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8502" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8502" source="CVE"/>
    <description>
    Heap-based buffer overflow in the pe_print_edata function in bfd/peXXigen.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (crash) and possibly have other unspecified impact via a truncated export table in a PE file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8502.html">CVE-2014-8502</cve>
<bugzilla href="https://bugzilla.suse.com/903655">SUSE bug 903655</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204228" comment="binutils-2.23.1-0.23 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8503</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8503" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8503" source="CVE"/>
    <description>
    Stack-based buffer overflow in the ihex_scan function in bfd/ihex.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (crash) and possibly have other unspecified impact via a crafted ihex file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8503.html">CVE-2014-8503</cve>
<bugzilla href="https://bugzilla.suse.com/903655">SUSE bug 903655</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204228" comment="binutils-2.23.1-0.23 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8504</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8504" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8504" source="CVE"/>
    <description>
    Stack-based buffer overflow in the srec_scan function in bfd/srec.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (crash) and possibly have other unspecified impact via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8504.html">CVE-2014-8504</cve>
<bugzilla href="https://bugzilla.suse.com/903655">SUSE bug 903655</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204228" comment="binutils-2.23.1-0.23 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8559</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2014-8559" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8559" source="CVE"/>
    <description>
    The d_walk function in fs/dcache.c in the Linux kernel through 3.17.2 does not properly maintain the semantics of rename_lock, which allows local users to cause a denial of service (deadlock and system hang) via a crafted application.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8559.html">CVE-2014-8559</cve>
<bugzilla href="https://bugzilla.suse.com/903640">SUSE bug 903640</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915517">SUSE bug 915517</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214952" comment="kernel-bigsmp-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214953" comment="kernel-bigsmp-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214910" comment="kernel-bigsmp-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214911" comment="kernel-default-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214912" comment="kernel-default-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214913" comment="kernel-default-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264496" comment="kernel-default-man-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214954" comment="kernel-ec2-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214955" comment="kernel-ec2-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214956" comment="kernel-ec2-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264488" comment="kernel-pae-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264489" comment="kernel-pae-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264490" comment="kernel-pae-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264497" comment="kernel-ppc64-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264498" comment="kernel-ppc64-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264499" comment="kernel-ppc64-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214915" comment="kernel-source-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214916" comment="kernel-syms-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214957" comment="kernel-trace-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214958" comment="kernel-trace-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214917" comment="kernel-trace-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214918" comment="kernel-xen-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214919" comment="kernel-xen-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214920" comment="kernel-xen-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214922" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.50-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264492" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.50-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8562</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8562" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8562" source="CVE"/>
    <description>
    DCM decode in ImageMagick before 6.8.9-9 allows remote attackers to cause a denial of service (out-of-bounds read).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8562.html">CVE-2014-8562</cve>
<bugzilla href="https://bugzilla.suse.com/903638">SUSE bug 903638</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200170" comment="libMagickCore1-6.4.3.6-7.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200171" comment="libMagickCore1-32bit-6.4.3.6-7.30 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8594</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8594" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8594" source="CVE"/>
    <description>
    The do_mmu_update function in arch/x86/mm.c in Xen 4.x through 4.4.x does not properly restrict updates to only PV page tables, which allows remote PV guests to cause a denial of service (NULL pointer dereference) by leveraging hardware emulation services for HVM guests using Hardware Assisted Paging (HAP).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8594.html">CVE-2014-8594</cve>
<bugzilla href="https://bugzilla.suse.com/903967">SUSE bug 903967</bugzilla>
<bugzilla href="https://bugzilla.suse.com/903970">SUSE bug 903970</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204863" comment="xen-4.2.5_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204864" comment="xen-doc-html-4.2.5_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204865" comment="xen-doc-pdf-4.2.5_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204866" comment="xen-kmp-default-4.2.5_02_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204867" comment="xen-libs-4.2.5_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204868" comment="xen-libs-32bit-4.2.5_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204869" comment="xen-tools-4.2.5_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204870" comment="xen-tools-domU-4.2.5_02-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8595</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8595" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8595" source="CVE"/>
    <description>
    arch/x86/x86_emulate/x86_emulate.c in Xen 3.2.1 through 4.4.x does not properly check privileges, which allows local HVM guest users to gain privileges or cause a denial of service (crash) via a crafted (1) CALL, (2) JMP, (3) RETF, (4) LCALL, (5) LJMP, or (6) LRET far branch instruction.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8595.html">CVE-2014-8595</cve>
<bugzilla href="https://bugzilla.suse.com/903970">SUSE bug 903970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/907649">SUSE bug 907649</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204863" comment="xen-4.2.5_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204864" comment="xen-doc-html-4.2.5_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204865" comment="xen-doc-pdf-4.2.5_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204866" comment="xen-kmp-default-4.2.5_02_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204867" comment="xen-libs-4.2.5_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204868" comment="xen-libs-32bit-4.2.5_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204869" comment="xen-tools-4.2.5_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204870" comment="xen-tools-domU-4.2.5_02-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8634</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8634" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8634.html">CVE-2014-8634</cve>
<bugzilla href="https://bugzilla.suse.com/913064">SUSE bug 913064</bugzilla>
<bugzilla href="https://bugzilla.suse.com/913096">SUSE bug 913096</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204324" comment="MozillaFirefox-31.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204325" comment="MozillaFirefox-translations-31.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200214" comment="libfreebl3-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200215" comment="libfreebl3-32bit-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200216" comment="libfreebl3-x86-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200217" comment="libsoftokn3-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200218" comment="libsoftokn3-32bit-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200219" comment="libsoftokn3-x86-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200220" comment="mozilla-nss-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200221" comment="mozilla-nss-32bit-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200222" comment="mozilla-nss-tools-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200223" comment="mozilla-nss-x86-3.17.3-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204324" comment="MozillaFirefox-31.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204325" comment="MozillaFirefox-translations-31.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200214" comment="libfreebl3-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200215" comment="libfreebl3-32bit-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200217" comment="libsoftokn3-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200218" comment="libsoftokn3-32bit-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200220" comment="mozilla-nss-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200221" comment="mozilla-nss-32bit-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200222" comment="mozilla-nss-tools-3.17.3-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8636" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8636" source="CVE"/>
    <description>
    The XrayWrapper implementation in Mozilla Firefox before 35.0 and SeaMonkey before 2.32 does not properly interact with a DOM object that has a named getter, which might allow remote attackers to execute arbitrary JavaScript code with chrome privileges via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8636.html">CVE-2014-8636</cve>
<bugzilla href="https://bugzilla.suse.com/913096">SUSE bug 913096</bugzilla>
<bugzilla href="https://bugzilla.suse.com/913102">SUSE bug 913102</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204324" comment="MozillaFirefox-31.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204325" comment="MozillaFirefox-translations-31.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200214" comment="libfreebl3-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200215" comment="libfreebl3-32bit-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200216" comment="libfreebl3-x86-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200217" comment="libsoftokn3-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200218" comment="libsoftokn3-32bit-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200219" comment="libsoftokn3-x86-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200220" comment="mozilla-nss-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200221" comment="mozilla-nss-32bit-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200222" comment="mozilla-nss-tools-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200223" comment="mozilla-nss-x86-3.17.3-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204324" comment="MozillaFirefox-31.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204325" comment="MozillaFirefox-translations-31.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200214" comment="libfreebl3-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200215" comment="libfreebl3-32bit-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200217" comment="libsoftokn3-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200218" comment="libsoftokn3-32bit-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200220" comment="mozilla-nss-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200221" comment="mozilla-nss-32bit-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200222" comment="mozilla-nss-tools-3.17.3-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8637</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8637" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8637" source="CVE"/>
    <description>
    Mozilla Firefox before 35.0 and SeaMonkey before 2.32 do not properly initialize memory for BMP images, which allows remote attackers to obtain sensitive information from process memory via a crafted web page that triggers the rendering of malformed BMP data within a CANVAS element.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8637.html">CVE-2014-8637</cve>
<bugzilla href="https://bugzilla.suse.com/913096">SUSE bug 913096</bugzilla>
<bugzilla href="https://bugzilla.suse.com/913103">SUSE bug 913103</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204324" comment="MozillaFirefox-31.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204325" comment="MozillaFirefox-translations-31.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200214" comment="libfreebl3-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200215" comment="libfreebl3-32bit-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200216" comment="libfreebl3-x86-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200217" comment="libsoftokn3-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200218" comment="libsoftokn3-32bit-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200219" comment="libsoftokn3-x86-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200220" comment="mozilla-nss-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200221" comment="mozilla-nss-32bit-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200222" comment="mozilla-nss-tools-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200223" comment="mozilla-nss-x86-3.17.3-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204324" comment="MozillaFirefox-31.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204325" comment="MozillaFirefox-translations-31.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200214" comment="libfreebl3-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200215" comment="libfreebl3-32bit-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200217" comment="libsoftokn3-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200218" comment="libsoftokn3-32bit-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200220" comment="mozilla-nss-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200221" comment="mozilla-nss-32bit-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200222" comment="mozilla-nss-tools-3.17.3-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8638</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8638" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638" source="CVE"/>
    <description>
    The navigator.sendBeacon implementation in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 omits the CORS Origin header, which allows remote attackers to bypass intended CORS access-control checks and conduct cross-site request forgery (CSRF) attacks via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8638.html">CVE-2014-8638</cve>
<bugzilla href="https://bugzilla.suse.com/913068">SUSE bug 913068</bugzilla>
<bugzilla href="https://bugzilla.suse.com/913096">SUSE bug 913096</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204324" comment="MozillaFirefox-31.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204325" comment="MozillaFirefox-translations-31.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200214" comment="libfreebl3-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200215" comment="libfreebl3-32bit-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200216" comment="libfreebl3-x86-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200217" comment="libsoftokn3-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200218" comment="libsoftokn3-32bit-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200219" comment="libsoftokn3-x86-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200220" comment="mozilla-nss-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200221" comment="mozilla-nss-32bit-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200222" comment="mozilla-nss-tools-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200223" comment="mozilla-nss-x86-3.17.3-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204324" comment="MozillaFirefox-31.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204325" comment="MozillaFirefox-translations-31.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200214" comment="libfreebl3-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200215" comment="libfreebl3-32bit-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200217" comment="libsoftokn3-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200218" comment="libsoftokn3-32bit-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200220" comment="mozilla-nss-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200221" comment="mozilla-nss-32bit-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200222" comment="mozilla-nss-tools-3.17.3-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8639</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8639" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639" source="CVE"/>
    <description>
    Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 do not properly interpret Set-Cookie headers within responses that have a 407 (aka Proxy Authentication Required) status code, which allows remote HTTP proxy servers to conduct session fixation attacks by providing a cookie name that corresponds to the session cookie of the origin server.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8639.html">CVE-2014-8639</cve>
<bugzilla href="https://bugzilla.suse.com/913066">SUSE bug 913066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/913096">SUSE bug 913096</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204324" comment="MozillaFirefox-31.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204325" comment="MozillaFirefox-translations-31.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200214" comment="libfreebl3-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200215" comment="libfreebl3-32bit-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200216" comment="libfreebl3-x86-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200217" comment="libsoftokn3-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200218" comment="libsoftokn3-32bit-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200219" comment="libsoftokn3-x86-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200220" comment="mozilla-nss-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200221" comment="mozilla-nss-32bit-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200222" comment="mozilla-nss-tools-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200223" comment="mozilla-nss-x86-3.17.3-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204324" comment="MozillaFirefox-31.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204325" comment="MozillaFirefox-translations-31.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200214" comment="libfreebl3-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200215" comment="libfreebl3-32bit-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200217" comment="libsoftokn3-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200218" comment="libsoftokn3-32bit-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200220" comment="mozilla-nss-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200221" comment="mozilla-nss-32bit-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200222" comment="mozilla-nss-tools-3.17.3-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8640</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8640" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8640" source="CVE"/>
    <description>
    The mozilla::dom::AudioParamTimeline::AudioNodeInputValue function in the Web Audio API implementation in Mozilla Firefox before 35.0 and SeaMonkey before 2.32 does not properly restrict timeline operations, which allows remote attackers to cause a denial of service (uninitialized-memory read and application crash) via crafted API calls.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8640.html">CVE-2014-8640</cve>
<bugzilla href="https://bugzilla.suse.com/913096">SUSE bug 913096</bugzilla>
<bugzilla href="https://bugzilla.suse.com/913104">SUSE bug 913104</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204324" comment="MozillaFirefox-31.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204325" comment="MozillaFirefox-translations-31.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200214" comment="libfreebl3-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200215" comment="libfreebl3-32bit-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200216" comment="libfreebl3-x86-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200217" comment="libsoftokn3-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200218" comment="libsoftokn3-32bit-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200219" comment="libsoftokn3-x86-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200220" comment="mozilla-nss-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200221" comment="mozilla-nss-32bit-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200222" comment="mozilla-nss-tools-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200223" comment="mozilla-nss-x86-3.17.3-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204324" comment="MozillaFirefox-31.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204325" comment="MozillaFirefox-translations-31.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200214" comment="libfreebl3-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200215" comment="libfreebl3-32bit-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200217" comment="libsoftokn3-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200218" comment="libsoftokn3-32bit-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200220" comment="mozilla-nss-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200221" comment="mozilla-nss-32bit-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200222" comment="mozilla-nss-tools-3.17.3-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8641</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8641" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641" source="CVE"/>
    <description>
    Use-after-free vulnerability in the WebRTC implementation in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, and SeaMonkey before 2.32 allows remote attackers to execute arbitrary code via crafted track data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8641.html">CVE-2014-8641</cve>
<bugzilla href="https://bugzilla.suse.com/913067">SUSE bug 913067</bugzilla>
<bugzilla href="https://bugzilla.suse.com/913096">SUSE bug 913096</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204324" comment="MozillaFirefox-31.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204325" comment="MozillaFirefox-translations-31.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200214" comment="libfreebl3-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200215" comment="libfreebl3-32bit-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200216" comment="libfreebl3-x86-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200217" comment="libsoftokn3-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200218" comment="libsoftokn3-32bit-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200219" comment="libsoftokn3-x86-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200220" comment="mozilla-nss-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200221" comment="mozilla-nss-32bit-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200222" comment="mozilla-nss-tools-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200223" comment="mozilla-nss-x86-3.17.3-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204324" comment="MozillaFirefox-31.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204325" comment="MozillaFirefox-translations-31.4.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200214" comment="libfreebl3-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200215" comment="libfreebl3-32bit-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200217" comment="libsoftokn3-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200218" comment="libsoftokn3-32bit-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200220" comment="mozilla-nss-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200221" comment="mozilla-nss-32bit-3.17.3-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200222" comment="mozilla-nss-tools-3.17.3-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8651</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8651" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8651" source="CVE"/>
    <description>
    The KDE Clock KCM policykit helper in kde-workspace before 4.11.14 and plasma-desktop before 5.1.1 allows local users to gain privileges via a crafted ntpUtility (ntp utility name) argument.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8651.html">CVE-2014-8651</cve>
<bugzilla href="https://bugzilla.suse.com/904625">SUSE bug 904625</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204504" comment="kde4-kgreeter-plugins-4.3.5-0.12.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204505" comment="kdebase4-wallpapers-4.3.5-0.11.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201738" comment="kdebase4-workspace-4.3.5-0.12.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204506" comment="kdebase4-workspace-ksysguardd-4.3.5-0.12.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204507" comment="kdm-4.3.5-0.12.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204508" comment="kwin-4.3.5-0.12.20 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8709</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8709" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8709" source="CVE"/>
    <description>
    The ieee80211_fragment function in net/mac80211/tx.c in the Linux kernel before 3.13.5 does not properly maintain a certain tail pointer, which allows remote attackers to obtain sensitive cleartext information by reading packets.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8709.html">CVE-2014-8709</cve>
<bugzilla href="https://bugzilla.suse.com/904700">SUSE bug 904700</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213307" comment="kernel-bigsmp-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213308" comment="kernel-bigsmp-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213244" comment="kernel-bigsmp-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213245" comment="kernel-default-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213246" comment="kernel-default-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213247" comment="kernel-default-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264361" comment="kernel-default-man-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213309" comment="kernel-ec2-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213310" comment="kernel-ec2-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213311" comment="kernel-ec2-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264348" comment="kernel-pae-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264349" comment="kernel-pae-base-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264350" comment="kernel-pae-devel-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264362" comment="kernel-ppc64-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264363" comment="kernel-ppc64-base-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264364" comment="kernel-ppc64-devel-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213249" comment="kernel-source-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213250" comment="kernel-syms-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213312" comment="kernel-trace-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213313" comment="kernel-trace-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213251" comment="kernel-trace-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213252" comment="kernel-xen-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213253" comment="kernel-xen-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213254" comment="kernel-xen-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213256" comment="xen-kmp-default-4.2.5_02_3.0.101_0.46-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264352" comment="xen-kmp-pae-4.2.5_02_3.0.101_0.42-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8710</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8710" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8710" source="CVE"/>
    <description>
    The decompress_sigcomp_message function in epan/sigcomp-udvm.c in the SigComp UDVM dissector in Wireshark 1.10.x before 1.10.11 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8710.html">CVE-2014-8710</cve>
<bugzilla href="https://bugzilla.suse.com/905246">SUSE bug 905246</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202101" comment="wireshark-1.10.11-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8711</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8711" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8711" source="CVE"/>
    <description>
    Multiple integer overflows in epan/dissectors/packet-amqp.c in the AMQP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allow remote attackers to cause a denial of service (application crash) via a crafted amqp_0_10 PDU in a packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8711.html">CVE-2014-8711</cve>
<bugzilla href="https://bugzilla.suse.com/905245">SUSE bug 905245</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202101" comment="wireshark-1.10.11-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8712</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8712" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8712" source="CVE"/>
    <description>
    The build_expert_data function in epan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8712.html">CVE-2014-8712</cve>
<bugzilla href="https://bugzilla.suse.com/905248">SUSE bug 905248</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202101" comment="wireshark-1.10.11-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8713</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8713" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8713" source="CVE"/>
    <description>
    Stack-based buffer overflow in the build_expert_data function in epan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8713.html">CVE-2014-8713</cve>
<bugzilla href="https://bugzilla.suse.com/905248">SUSE bug 905248</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202101" comment="wireshark-1.10.11-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8714</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8714" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8714" source="CVE"/>
    <description>
    The dissect_write_structured_field function in epan/dissectors/packet-tn5250.c in the TN5250 dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8714.html">CVE-2014-8714</cve>
<bugzilla href="https://bugzilla.suse.com/905247">SUSE bug 905247</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202101" comment="wireshark-1.10.11-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8716</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8716" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8716" source="CVE"/>
    <description>
    The JPEG decoder in ImageMagick before 6.8.9-9 allows local users to cause a denial of service (out-of-bounds memory access and crash).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8716.html">CVE-2014-8716</cve>
<bugzilla href="https://bugzilla.suse.com/905260">SUSE bug 905260</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200170" comment="libMagickCore1-6.4.3.6-7.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200171" comment="libMagickCore1-32bit-6.4.3.6-7.30 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8737</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8737" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8737" source="CVE"/>
    <description>
    Multiple directory traversal vulnerabilities in GNU binutils 2.24 and earlier allow local users to delete arbitrary files via a .. (dot dot) or full path name in an archive to (1) strip or (2) objcopy or create arbitrary files via (3) a .. (dot dot) or full path name in an archive to ar.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8737.html">CVE-2014-8737</cve>
<bugzilla href="https://bugzilla.suse.com/905736">SUSE bug 905736</bugzilla>
<bugzilla href="https://bugzilla.suse.com/912408">SUSE bug 912408</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204228" comment="binutils-2.23.1-0.23 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8738</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8738" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8738" source="CVE"/>
    <description>
    The _bfd_slurp_extended_name_table function in bfd/archive.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (invalid write, segmentation fault, and crash) via a crafted extended name table in an archive.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8738.html">CVE-2014-8738</cve>
<bugzilla href="https://bugzilla.suse.com/905735">SUSE bug 905735</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204228" comment="binutils-2.23.1-0.23 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8767</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8767" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8767" source="CVE"/>
    <description>
    Integer underflow in the olsr_print function in tcpdump 3.9.6 through 4.6.2, when in verbose mode, allows remote attackers to cause a denial of service (crash) via a crafted length value in an OLSR frame.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8767.html">CVE-2014-8767</cve>
<bugzilla href="https://bugzilla.suse.com/905870">SUSE bug 905870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/905871">SUSE bug 905871</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215553" comment="tcpdump-3.9.8-1.23 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8769</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8769" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8769" source="CVE"/>
    <description>
    tcpdump 3.8 through 4.6.2 might allow remote attackers to obtain sensitive information from memory or cause a denial of service (packet loss or segmentation fault) via a crafted Ad hoc On-Demand Distance Vector (AODV) packet, which triggers an out-of-bounds memory access.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8769.html">CVE-2014-8769</cve>
<bugzilla href="https://bugzilla.suse.com/905871">SUSE bug 905871</bugzilla>
<bugzilla href="https://bugzilla.suse.com/905872">SUSE bug 905872</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215553" comment="tcpdump-3.9.8-1.23 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8866</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8866" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8866" source="CVE"/>
    <description>
    The compatibility mode hypercall argument translation in Xen 3.3.x through 4.4.x, when running on a 64-bit hypervisor, allows local 32-bit HVM guests to cause a denial of service (host crash) via vectors involving altering the high halves of registers while in 64-bit mode.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8866.html">CVE-2014-8866</cve>
<bugzilla href="https://bugzilla.suse.com/903970">SUSE bug 903970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/905465">SUSE bug 905465</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204863" comment="xen-4.2.5_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204864" comment="xen-doc-html-4.2.5_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204865" comment="xen-doc-pdf-4.2.5_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204866" comment="xen-kmp-default-4.2.5_02_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204867" comment="xen-libs-4.2.5_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204868" comment="xen-libs-32bit-4.2.5_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204869" comment="xen-tools-4.2.5_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204870" comment="xen-tools-domU-4.2.5_02-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8867</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8867" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8867" source="CVE"/>
    <description>
    The acceleration support for the "REP MOVS" instruction in Xen 4.4.x, 3.2.x, and earlier lacks properly bounds checking for memory mapped I/O (MMIO) emulated in the hypervisor, which allows local HVM guests to cause a denial of service (host crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8867.html">CVE-2014-8867</cve>
<bugzilla href="https://bugzilla.suse.com/903970">SUSE bug 903970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/905467">SUSE bug 905467</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204863" comment="xen-4.2.5_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204864" comment="xen-doc-html-4.2.5_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204865" comment="xen-doc-pdf-4.2.5_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204866" comment="xen-kmp-default-4.2.5_02_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204867" comment="xen-libs-4.2.5_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204868" comment="xen-libs-32bit-4.2.5_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204869" comment="xen-tools-4.2.5_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204870" comment="xen-tools-domU-4.2.5_02-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8884</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8884" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8884" source="CVE"/>
    <description>
    Stack-based buffer overflow in the ttusbdecfe_dvbs_diseqc_send_master_cmd function in drivers/media/usb/ttusb-dec/ttusbdecfe.c in the Linux kernel before 3.17.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via a large message length in an ioctl call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8884.html">CVE-2014-8884</cve>
<bugzilla href="https://bugzilla.suse.com/904876">SUSE bug 904876</bugzilla>
<bugzilla href="https://bugzilla.suse.com/905522">SUSE bug 905522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/905739">SUSE bug 905739</bugzilla>
<bugzilla href="https://bugzilla.suse.com/905744">SUSE bug 905744</bugzilla>
<bugzilla href="https://bugzilla.suse.com/905748">SUSE bug 905748</bugzilla>
<bugzilla href="https://bugzilla.suse.com/905764">SUSE bug 905764</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213307" comment="kernel-bigsmp-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213308" comment="kernel-bigsmp-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213244" comment="kernel-bigsmp-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213245" comment="kernel-default-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213246" comment="kernel-default-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213247" comment="kernel-default-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264361" comment="kernel-default-man-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213309" comment="kernel-ec2-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213310" comment="kernel-ec2-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213311" comment="kernel-ec2-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264348" comment="kernel-pae-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264349" comment="kernel-pae-base-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264350" comment="kernel-pae-devel-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264362" comment="kernel-ppc64-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264363" comment="kernel-ppc64-base-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264364" comment="kernel-ppc64-devel-3.0.101-0.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213249" comment="kernel-source-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213250" comment="kernel-syms-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213312" comment="kernel-trace-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213313" comment="kernel-trace-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213251" comment="kernel-trace-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213252" comment="kernel-xen-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213253" comment="kernel-xen-base-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213254" comment="kernel-xen-devel-3.0.101-0.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213256" comment="xen-kmp-default-4.2.5_02_3.0.101_0.46-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264352" comment="xen-kmp-pae-4.2.5_02_3.0.101_0.42-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8891</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8891" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8891" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Virtual Machine (JVM) in IBM SDK, Java Technology Edition 5.0 before SR16-FP9, 6 before SR16-FP3, 6R1 before SR8-FP3, 7 before SR8-FP10, and 7R1 before SR2-FP10 allows remote attackers to escape the Java sandbox and execute arbitrary code via unspecified vectors related to the security manager.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8891.html">CVE-2014-8891</cve>
<bugzilla href="https://bugzilla.suse.com/916266">SUSE bug 916266</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215554" comment="java-1_6_0-ibm-1.6.0_sr16.3-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215555" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.3-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215556" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.3-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215557" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.3-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215559" comment="java-1_7_0-ibm-1.7.0_sr8.10-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215560" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.10-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215562" comment="java-1_7_0-ibm-jdbc-1.7.0_sr8.10-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215563" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.10-0.6 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215554" comment="java-1_6_0-ibm-1.6.0_sr16.3-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264520" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.3-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215555" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.3-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215556" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.3-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215557" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.3-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215559" comment="java-1_7_0-ibm-1.7.0_sr8.10-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215560" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.10-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215562" comment="java-1_7_0-ibm-jdbc-1.7.0_sr8.10-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215563" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.10-0.6 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148892" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8892</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8892" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8892" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Virtual Machine (JVM) in IBM SDK, Java Technology Edition 5.0 before SR16-FP9, 6 before SR16-FP3, 6R1 before SR8-FP3, 7 before SR8-FP10, and 7R1 before SR2-FP10 allows remote attackers to bypass intended access permissions and obtain sensitive information via unspecified vectors related to the security manager.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8892.html">CVE-2014-8892</cve>
<bugzilla href="https://bugzilla.suse.com/916265">SUSE bug 916265</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215554" comment="java-1_6_0-ibm-1.6.0_sr16.3-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215555" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.3-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215556" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.3-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215557" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.3-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215559" comment="java-1_7_0-ibm-1.7.0_sr8.10-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215560" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.10-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215562" comment="java-1_7_0-ibm-jdbc-1.7.0_sr8.10-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215563" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.10-0.6 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215554" comment="java-1_6_0-ibm-1.6.0_sr16.3-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264520" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.3-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215555" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.3-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215556" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.3-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215557" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.3-0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215559" comment="java-1_7_0-ibm-1.7.0_sr8.10-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215560" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.10-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215562" comment="java-1_7_0-ibm-jdbc-1.7.0_sr8.10-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215563" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.10-0.6 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8962</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-8962" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8962" source="CVE"/>
    <description>
    Stack-based buffer overflow in stream_decoder.c in libFLAC before 1.3.1 allows remote attackers to execute arbitrary code via a crafted .flac file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8962.html">CVE-2014-8962</cve>
<bugzilla href="https://bugzilla.suse.com/906831">SUSE bug 906831</bugzilla>
<bugzilla href="https://bugzilla.suse.com/907764">SUSE bug 907764</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200166" comment="libFLAC++6-1.2.1-68.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200167" comment="libFLAC8-1.2.1-68.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200168" comment="libFLAC8-32bit-1.2.1-68.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200169" comment="libFLAC8-x86-1.2.1-68.17 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200166" comment="libFLAC++6-1.2.1-68.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200167" comment="libFLAC8-1.2.1-68.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200168" comment="libFLAC8-32bit-1.2.1-68.17 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9028</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9028" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9028" source="CVE"/>
    <description>
    Heap-based buffer overflow in stream_decoder.c in libFLAC before 1.3.1 allows remote attackers to execute arbitrary code via a crafted .flac file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9028.html">CVE-2014-9028</cve>
<bugzilla href="https://bugzilla.suse.com/907016">SUSE bug 907016</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200166" comment="libFLAC++6-1.2.1-68.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200167" comment="libFLAC8-1.2.1-68.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200168" comment="libFLAC8-32bit-1.2.1-68.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200169" comment="libFLAC8-x86-1.2.1-68.17 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200166" comment="libFLAC++6-1.2.1-68.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200167" comment="libFLAC8-1.2.1-68.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200168" comment="libFLAC8-32bit-1.2.1-68.17 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9029</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9029" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9029" source="CVE"/>
    <description>
    Multiple off-by-one errors in the (1) jpc_dec_cp_setfromcox and (2) jpc_dec_cp_setfromrgn functions in jpc/jpc_dec.c in JasPer 1.900.1 and earlier allow remote attackers to execute arbitrary code via a crafted jp2 file, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9029.html">CVE-2014-9029</cve>
<bugzilla href="https://bugzilla.suse.com/906364">SUSE bug 906364</bugzilla>
<bugzilla href="https://bugzilla.suse.com/909474">SUSE bug 909474</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204614" comment="libjasper-1.900.1-134.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204615" comment="libjasper-32bit-1.900.1-134.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208741" comment="libjasper-x86-1.900.1-134.13 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204614" comment="libjasper-1.900.1-134.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204615" comment="libjasper-32bit-1.900.1-134.13 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9030</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9030" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9030" source="CVE"/>
    <description>
    The do_mmu_update function in arch/x86/mm.c in Xen 3.2.x through 4.4.x does not properly manage page references, which allows remote domains to cause a denial of service by leveraging control over an HVM guest and a crafted MMU_MACHPHYS_UPDATE.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9030.html">CVE-2014-9030</cve>
<bugzilla href="https://bugzilla.suse.com/903970">SUSE bug 903970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/906439">SUSE bug 906439</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204863" comment="xen-4.2.5_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204864" comment="xen-doc-html-4.2.5_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204865" comment="xen-doc-pdf-4.2.5_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204866" comment="xen-kmp-default-4.2.5_02_3.0.101_0.40-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204867" comment="xen-libs-4.2.5_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204868" comment="xen-libs-32bit-4.2.5_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204869" comment="xen-tools-4.2.5_02-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204870" comment="xen-tools-domU-4.2.5_02-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9050</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9050" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9050" source="CVE"/>
    <description>
    Heap-based buffer overflow in the cli_scanpe function in libclamav/pe.c in ClamAV before 0.98.5 allows remote attackers to cause a denial of service (crash) via a crafted y0da Crypter PE file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9050.html">CVE-2014-9050</cve>
<bugzilla href="https://bugzilla.suse.com/1040662">SUSE bug 1040662</bugzilla>
<bugzilla href="https://bugzilla.suse.com/906770">SUSE bug 906770</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214783" comment="clamav-0.98.5-0.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9087</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9087" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9087" source="CVE"/>
    <description>
    Integer underflow in the ksba_oid_to_str function in Libksba before 1.3.2, as used in GnuPG, allows remote attackers to cause a denial of service (crash) via a crafted OID in a (1) S/MIME message or (2) ECC based OpenPGP data, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9087.html">CVE-2014-9087</cve>
<bugzilla href="https://bugzilla.suse.com/907074">SUSE bug 907074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/926826">SUSE bug 926826</bugzilla>
<bugzilla href="https://bugzilla.suse.com/996084">SUSE bug 996084</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200244" comment="libksba-1.0.4-1.18 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9090</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9090" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9090" source="CVE"/>
    <description>
    The do_double_fault function in arch/x86/kernel/traps.c in the Linux kernel through 3.17.4 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to cause a denial of service (panic) via a modify_ldt system call, as demonstrated by sigreturn_32 in the linux-clock-tests test suite.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9090.html">CVE-2014-9090</cve>
<bugzilla href="https://bugzilla.suse.com/817142">SUSE bug 817142</bugzilla>
<bugzilla href="https://bugzilla.suse.com/907818">SUSE bug 907818</bugzilla>
<bugzilla href="https://bugzilla.suse.com/909077">SUSE bug 909077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/910251">SUSE bug 910251</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214952" comment="kernel-bigsmp-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214953" comment="kernel-bigsmp-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214910" comment="kernel-bigsmp-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214911" comment="kernel-default-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214912" comment="kernel-default-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214913" comment="kernel-default-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264496" comment="kernel-default-man-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214954" comment="kernel-ec2-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214955" comment="kernel-ec2-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214956" comment="kernel-ec2-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264488" comment="kernel-pae-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264489" comment="kernel-pae-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264490" comment="kernel-pae-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264497" comment="kernel-ppc64-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264498" comment="kernel-ppc64-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264499" comment="kernel-ppc64-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214915" comment="kernel-source-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214916" comment="kernel-syms-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214957" comment="kernel-trace-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214958" comment="kernel-trace-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214917" comment="kernel-trace-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214918" comment="kernel-xen-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214919" comment="kernel-xen-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214920" comment="kernel-xen-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214922" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.50-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264492" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.50-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9112</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9112" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9112" source="CVE"/>
    <description>
    Heap-based buffer overflow in the process_copy_in function in GNU Cpio 2.11 allows remote attackers to cause a denial of service via a large block value in a cpio archive.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9112.html">CVE-2014-9112</cve>
<bugzilla href="https://bugzilla.suse.com/907456">SUSE bug 907456</bugzilla>
<bugzilla href="https://bugzilla.suse.com/913479">SUSE bug 913479</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199962" comment="cpio-2.9-75.78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199963" comment="cpio-lang-2.9-75.78 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9114</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9114" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9114" source="CVE"/>
    <description>
    Blkid in util-linux before 2.26rc-1 allows local users to execute arbitrary code.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9114.html">CVE-2014-9114</cve>
<bugzilla href="https://bugzilla.suse.com/888678">SUSE bug 888678</bugzilla>
<bugzilla href="https://bugzilla.suse.com/906725">SUSE bug 906725</bugzilla>
<bugzilla href="https://bugzilla.suse.com/907434">SUSE bug 907434</bugzilla>
<bugzilla href="https://bugzilla.suse.com/908742">SUSE bug 908742</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204276" comment="libblkid1-2.19.1-6.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204277" comment="libblkid1-32bit-2.19.1-6.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204281" comment="libuuid1-2.19.1-6.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204282" comment="libuuid1-32bit-2.19.1-6.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204598" comment="util-linux-2.19.1-6.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204599" comment="util-linux-lang-2.19.1-6.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204283" comment="uuid-runtime-2.19.1-6.62 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204276" comment="libblkid1-2.19.1-6.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204277" comment="libblkid1-32bit-2.19.1-6.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208459" comment="libblkid1-x86-2.19.1-6.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204281" comment="libuuid1-2.19.1-6.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204282" comment="libuuid1-32bit-2.19.1-6.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208461" comment="libuuid1-x86-2.19.1-6.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204598" comment="util-linux-2.19.1-6.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204599" comment="util-linux-lang-2.19.1-6.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204283" comment="uuid-runtime-2.19.1-6.62 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9116</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9116" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9116" source="CVE"/>
    <description>
    The write_one_header function in mutt 1.5.23 does not properly handle newline characters at the beginning of a header, which allows remote attackers to cause a denial of service (crash) via a header with an empty body, which triggers a heap-based buffer overflow in the mutt_substrdup function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9116.html">CVE-2014-9116</cve>
<bugzilla href="https://bugzilla.suse.com/907453">SUSE bug 907453</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200365" comment="mutt-1.5.17-42.39 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9130</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2014-9130" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9130" source="CVE"/>
    <description>
    scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allows context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9130.html">CVE-2014-9130</cve>
<bugzilla href="https://bugzilla.suse.com/907809">SUSE bug 907809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/911782">SUSE bug 911782</bugzilla>
<bugzilla href="https://bugzilla.suse.com/921588">SUSE bug 921588</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215930" comment="python-PyYAML-3.10-0.13 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9140</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9140" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9140" source="CVE"/>
    <description>
    Buffer overflow in the ppp_hdlc function in print-ppp.c in tcpdump 4.6.2 and earlier allows remote attackers to cause a denial of service (crash) cia a crafted PPP packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9140.html">CVE-2014-9140</cve>
<bugzilla href="https://bugzilla.suse.com/923142">SUSE bug 923142</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200456" comment="tcpdump-3.9.8-1.27 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9293</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9293" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9293" source="CVE"/>
    <description>
    The config_auth function in ntpd in NTP before 4.2.7p11, when an auth key is not configured, improperly generates a key, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via a brute-force attack.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9293.html">CVE-2014-9293</cve>
<bugzilla href="https://bugzilla.suse.com/910764">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/911792">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207290" comment="ntp-4.2.4p8-1.29.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207291" comment="ntp-doc-4.2.4p8-1.29.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9294</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9294" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9294" source="CVE"/>
    <description>
    util/ntp-keygen.c in ntp-keygen in NTP before 4.2.7p230 uses a weak RNG seed, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via a brute-force attack.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9294.html">CVE-2014-9294</cve>
<bugzilla href="https://bugzilla.suse.com/910764">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/911792">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207290" comment="ntp-4.2.4p8-1.29.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207291" comment="ntp-doc-4.2.4p8-1.29.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9295</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9295" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9295" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in ntpd in NTP before 4.2.8 allow remote attackers to execute arbitrary code via a crafted packet, related to (1) the crypto_recv function when the Autokey Authentication feature is used, (2) the ctl_putdata function, and (3) the configure function.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9295.html">CVE-2014-9295</cve>
<bugzilla href="https://bugzilla.suse.com/883859">SUSE bug 883859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/910764">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/911792">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/912826">SUSE bug 912826</bugzilla>
<bugzilla href="https://bugzilla.suse.com/916239">SUSE bug 916239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215564" comment="ntp-4.2.4p8-1.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215565" comment="ntp-doc-4.2.4p8-1.28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9297</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9297" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9297" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2014-9750, CVE-2014-9751.  Reason: this ID was intended for one issue, but was associated with two issues.  Notes: All CVE users should consult CVE-2014-9750 and CVE-2014-9751 to identify the ID or IDs of interest. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9297.html">CVE-2014-9297</cve>
<bugzilla href="https://bugzilla.suse.com/911792">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/948963">SUSE bug 948963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207290" comment="ntp-4.2.4p8-1.29.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207291" comment="ntp-doc-4.2.4p8-1.29.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9298</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9298" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9298" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2014-9750, CVE-2014-9751.  Reason: this ID was intended for one issue, but was associated with two issues.  Notes: All CVE users should consult CVE-2014-9750 and CVE-2014-9751 to identify the ID or IDs of interest. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9298.html">CVE-2014-9298</cve>
<bugzilla href="https://bugzilla.suse.com/911792">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/948963">SUSE bug 948963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207290" comment="ntp-4.2.4p8-1.29.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207291" comment="ntp-doc-4.2.4p8-1.29.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9322</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9322" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9322" source="CVE"/>
    <description>
    arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9322.html">CVE-2014-9322</cve>
<bugzilla href="https://bugzilla.suse.com/817142">SUSE bug 817142</bugzilla>
<bugzilla href="https://bugzilla.suse.com/910251">SUSE bug 910251</bugzilla>
<bugzilla href="https://bugzilla.suse.com/923485">SUSE bug 923485</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214952" comment="kernel-bigsmp-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214953" comment="kernel-bigsmp-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214910" comment="kernel-bigsmp-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214911" comment="kernel-default-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214912" comment="kernel-default-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214913" comment="kernel-default-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264496" comment="kernel-default-man-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214954" comment="kernel-ec2-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214955" comment="kernel-ec2-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214956" comment="kernel-ec2-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264488" comment="kernel-pae-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264489" comment="kernel-pae-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264490" comment="kernel-pae-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264497" comment="kernel-ppc64-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264498" comment="kernel-ppc64-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264499" comment="kernel-ppc64-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214915" comment="kernel-source-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214916" comment="kernel-syms-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214957" comment="kernel-trace-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214958" comment="kernel-trace-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214917" comment="kernel-trace-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214918" comment="kernel-xen-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214919" comment="kernel-xen-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214920" comment="kernel-xen-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214922" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.50-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264492" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.50-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9328</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9328" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9328" source="CVE"/>
    <description>
    ClamAV before 0.98.6 allows remote attackers to have unspecified impact via a crafted upack packer file, related to a "heap out of bounds condition."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9328.html">CVE-2014-9328</cve>
<bugzilla href="https://bugzilla.suse.com/1040662">SUSE bug 1040662</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915512">SUSE bug 915512</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215566" comment="clamav-0.98.6-0.6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9402</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9402" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402" source="CVE"/>
    <description>
    The nss_dns implementation of getnetbyname in GNU C Library (aka glibc) before 2.21, when the DNS backend in the Name Service Switch configuration is enabled, allows remote attackers to cause a denial of service (infinite loop) by sending a positive answer while a network name is being process.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9402.html">CVE-2014-9402</cve>
<bugzilla href="https://bugzilla.suse.com/910599">SUSE bug 910599</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214849" comment="glibc-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214850" comment="glibc-32bit-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214851" comment="glibc-devel-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214852" comment="glibc-devel-32bit-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214881" comment="glibc-html-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214853" comment="glibc-i18ndata-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214882" comment="glibc-info-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214854" comment="glibc-locale-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214855" comment="glibc-locale-32bit-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214883" comment="glibc-profile-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214884" comment="glibc-profile-32bit-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214856" comment="nscd-2.11.3-17.82 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214849" comment="glibc-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214850" comment="glibc-32bit-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214851" comment="glibc-devel-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214852" comment="glibc-devel-32bit-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214881" comment="glibc-html-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214853" comment="glibc-i18ndata-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214882" comment="glibc-info-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214854" comment="glibc-locale-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214855" comment="glibc-locale-32bit-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264500" comment="glibc-locale-x86-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214883" comment="glibc-profile-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214884" comment="glibc-profile-32bit-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264501" comment="glibc-profile-x86-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264502" comment="glibc-x86-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214856" comment="nscd-2.11.3-17.82 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9419</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2014-9419" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9419" source="CVE"/>
    <description>
    The __switch_to function in arch/x86/kernel/process_64.c in the Linux kernel through 3.18.1 does not ensure that Thread Local Storage (TLS) descriptors are loaded before proceeding with other steps, which makes it easier for local users to bypass the ASLR protection mechanism via a crafted application that reads a TLS base address.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9419.html">CVE-2014-9419</cve>
<bugzilla href="https://bugzilla.suse.com/911326">SUSE bug 911326</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215410" comment="kernel-default-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215411" comment="kernel-default-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215412" comment="kernel-default-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264515" comment="kernel-default-man-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215451" comment="kernel-ec2-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215452" comment="kernel-ec2-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215453" comment="kernel-ec2-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264508" comment="kernel-pae-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264509" comment="kernel-pae-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264510" comment="kernel-pae-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264516" comment="kernel-ppc64-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264517" comment="kernel-ppc64-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264518" comment="kernel-ppc64-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215414" comment="kernel-source-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215415" comment="kernel-syms-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215454" comment="kernel-trace-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215455" comment="kernel-trace-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215416" comment="kernel-trace-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215417" comment="kernel-xen-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215418" comment="kernel-xen-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215419" comment="kernel-xen-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215421" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264390" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9420</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2014-9420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9420" source="CVE"/>
    <description>
    The rock_continue function in fs/isofs/rock.c in the Linux kernel through 3.18.1 does not restrict the number of Rock Ridge continuation entries, which allows local users to cause a denial of service (infinite loop, and system crash or hang) via a crafted iso9660 image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9420.html">CVE-2014-9420</cve>
<bugzilla href="https://bugzilla.suse.com/906545">SUSE bug 906545</bugzilla>
<bugzilla href="https://bugzilla.suse.com/911325">SUSE bug 911325</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214952" comment="kernel-bigsmp-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214953" comment="kernel-bigsmp-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214910" comment="kernel-bigsmp-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214911" comment="kernel-default-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214912" comment="kernel-default-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214913" comment="kernel-default-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264496" comment="kernel-default-man-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214954" comment="kernel-ec2-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214955" comment="kernel-ec2-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214956" comment="kernel-ec2-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264488" comment="kernel-pae-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264489" comment="kernel-pae-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264490" comment="kernel-pae-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264497" comment="kernel-ppc64-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264498" comment="kernel-ppc64-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264499" comment="kernel-ppc64-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214915" comment="kernel-source-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214916" comment="kernel-syms-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214957" comment="kernel-trace-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214958" comment="kernel-trace-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214917" comment="kernel-trace-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214918" comment="kernel-xen-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214919" comment="kernel-xen-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214920" comment="kernel-xen-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214922" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.50-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264492" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.50-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9421</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9421" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9421" source="CVE"/>
    <description>
    The auth_gssapi_unwrap_data function in lib/rpc/auth_gssapi_misc.c in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 does not properly handle partial XDR deserialization, which allows remote authenticated users to cause a denial of service (use-after-free and double free, and daemon crash) or possibly execute arbitrary code via malformed XDR data, as demonstrated by data sent to kadmind.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9421.html">CVE-2014-9421</cve>
<bugzilla href="https://bugzilla.suse.com/1005509">SUSE bug 1005509</bugzilla>
<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
<bugzilla href="https://bugzilla.suse.com/912002">SUSE bug 912002</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200125" comment="krb5-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200126" comment="krb5-32bit-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200127" comment="krb5-apps-clients-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200128" comment="krb5-apps-servers-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200129" comment="krb5-client-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200132" comment="krb5-doc-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200133" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200134" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200130" comment="krb5-server-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200131" comment="krb5-x86-1.6.3-133.49.66 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200125" comment="krb5-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200126" comment="krb5-32bit-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200127" comment="krb5-apps-clients-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200128" comment="krb5-apps-servers-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200129" comment="krb5-client-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200132" comment="krb5-doc-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200133" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200134" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200130" comment="krb5-server-1.6.3-133.49.66 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9422" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9422" source="CVE"/>
    <description>
    The check_rpcsec_auth function in kadmin/server/kadm_rpc_svc.c in kadmind in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 allows remote authenticated users to bypass a kadmin/* authorization check and obtain administrative access by leveraging access to a two-component principal with an initial "kadmind" substring, as demonstrated by a "ka/x" principal.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9422.html">CVE-2014-9422</cve>
<bugzilla href="https://bugzilla.suse.com/1005509">SUSE bug 1005509</bugzilla>
<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
<bugzilla href="https://bugzilla.suse.com/912002">SUSE bug 912002</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200125" comment="krb5-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200126" comment="krb5-32bit-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200127" comment="krb5-apps-clients-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200128" comment="krb5-apps-servers-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200129" comment="krb5-client-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200132" comment="krb5-doc-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200133" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200134" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200130" comment="krb5-server-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200131" comment="krb5-x86-1.6.3-133.49.66 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200125" comment="krb5-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200126" comment="krb5-32bit-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200127" comment="krb5-apps-clients-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200128" comment="krb5-apps-servers-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200129" comment="krb5-client-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200132" comment="krb5-doc-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200133" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200134" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200130" comment="krb5-server-1.6.3-133.49.66 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9423" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9423" source="CVE"/>
    <description>
    The svcauth_gss_accept_sec_context function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (aka krb5) 1.11.x through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 transmits uninitialized interposer data to clients, which allows remote attackers to obtain sensitive information from process heap memory by sniffing the network for data in a handle field.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9423.html">CVE-2014-9423</cve>
<bugzilla href="https://bugzilla.suse.com/1005509">SUSE bug 1005509</bugzilla>
<bugzilla href="https://bugzilla.suse.com/912002">SUSE bug 912002</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200125" comment="krb5-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200126" comment="krb5-32bit-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200127" comment="krb5-apps-clients-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200128" comment="krb5-apps-servers-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200129" comment="krb5-client-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200132" comment="krb5-doc-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200133" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200134" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200130" comment="krb5-server-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200131" comment="krb5-x86-1.6.3-133.49.66 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200125" comment="krb5-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200126" comment="krb5-32bit-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200127" comment="krb5-apps-clients-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200128" comment="krb5-apps-servers-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200129" comment="krb5-client-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200132" comment="krb5-doc-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200133" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200134" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200130" comment="krb5-server-1.6.3-133.49.66 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9447</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9447" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9447" source="CVE"/>
    <description>
    Directory traversal vulnerability in the read_long_names function in libelf/elf_begin.c in elfutils 0.152 and 0.161 allows remote attackers to write to arbitrary files to the root directory via a / (slash) in a crafted archive, as demonstrated using the ar program.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9447.html">CVE-2014-9447</cve>
<bugzilla href="https://bugzilla.suse.com/911662">SUSE bug 911662</bugzilla>
<bugzilla href="https://bugzilla.suse.com/912408">SUSE bug 912408</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199989" comment="elfutils-0.152-4.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199990" comment="libasm1-0.152-4.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199991" comment="libasm1-32bit-0.152-4.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199992" comment="libdw1-0.152-4.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199993" comment="libdw1-32bit-0.152-4.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199994" comment="libdw1-x86-0.152-4.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199995" comment="libebl1-0.152-4.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199996" comment="libebl1-32bit-0.152-4.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199997" comment="libebl1-x86-0.152-4.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199998" comment="libelf1-0.152-4.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199999" comment="libelf1-32bit-0.152-4.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200000" comment="libelf1-x86-0.152-4.9 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199989" comment="elfutils-0.152-4.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199990" comment="libasm1-0.152-4.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199991" comment="libasm1-32bit-0.152-4.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199992" comment="libdw1-0.152-4.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199993" comment="libdw1-32bit-0.152-4.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199995" comment="libebl1-0.152-4.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199996" comment="libebl1-32bit-0.152-4.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199998" comment="libelf1-0.152-4.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199999" comment="libelf1-32bit-0.152-4.9 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9471</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9471" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9471" source="CVE"/>
    <description>
    The parse_datetime function in GNU coreutils allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted date string, as demonstrated by the "--date=TZ="123"345" @1" string to the touch or date command.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9471.html">CVE-2014-9471</cve>
<bugzilla href="https://bugzilla.suse.com/911832">SUSE bug 911832</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199959" comment="coreutils-8.12-6.25.32.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199960" comment="coreutils-lang-8.12-6.25.32.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199961" comment="coreutils-x86-8.12-6.25.32.33 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199959" comment="coreutils-8.12-6.25.32.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199960" comment="coreutils-lang-8.12-6.25.32.33 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9474</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9474" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9474" source="CVE"/>
    <description>
    Buffer overflow in the mpfr_strtofr function in GNU MPFR before 3.1.2-p11 allows context-dependent attackers to have unspecified impact via vectors related to incorrect documentation for mpn_set_str.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9474.html">CVE-2014-9474</cve>
<bugzilla href="https://bugzilla.suse.com/911812">SUSE bug 911812</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200248" comment="libmpfr1-2.3.2-3.118 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200249" comment="libmpfr1-32bit-2.3.2-3.118 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200250" comment="libmpfr1-x86-2.3.2-3.118 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200248" comment="libmpfr1-2.3.2-3.118 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200249" comment="libmpfr1-32bit-2.3.2-3.118 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9496</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9496" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9496" source="CVE"/>
    <description>
    The sd2_parse_rsrc_fork function in sd2.c in libsndfile allows attackers to have unspecified impact via vectors related to a (1) map offset or (2) rsrc marker, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9496.html">CVE-2014-9496</cve>
<bugzilla href="https://bugzilla.suse.com/911796">SUSE bug 911796</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200300" comment="libsndfile-1.0.20-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200301" comment="libsndfile-32bit-1.0.20-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200302" comment="libsndfile-x86-1.0.20-2.6 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200300" comment="libsndfile-1.0.20-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200301" comment="libsndfile-32bit-1.0.20-2.6 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9512</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9512" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9512" source="CVE"/>
    <description>
    rsync 3.1.1 allows remote attackers to write to arbitrary files via a symlink attack on a file in the synchronization path.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9512.html">CVE-2014-9512</cve>
<bugzilla href="https://bugzilla.suse.com/915410">SUSE bug 915410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/960191">SUSE bug 960191</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204802" comment="rsync-3.0.4-2.49 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210682" comment="rsync-3.0.4-2.52 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9529</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2014-9529" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9529" source="CVE"/>
    <description>
    Race condition in the key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 3.18.2 allows local users to cause a denial of service (memory corruption or panic) or possibly have unspecified other impact via keyctl commands that trigger access to a key structure member during garbage collection of a key.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9529.html">CVE-2014-9529</cve>
<bugzilla href="https://bugzilla.suse.com/912202">SUSE bug 912202</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215410" comment="kernel-default-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215411" comment="kernel-default-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215412" comment="kernel-default-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264515" comment="kernel-default-man-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215451" comment="kernel-ec2-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215452" comment="kernel-ec2-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215453" comment="kernel-ec2-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264508" comment="kernel-pae-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264509" comment="kernel-pae-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264510" comment="kernel-pae-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264516" comment="kernel-ppc64-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264517" comment="kernel-ppc64-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264518" comment="kernel-ppc64-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215414" comment="kernel-source-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215415" comment="kernel-syms-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215454" comment="kernel-trace-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215455" comment="kernel-trace-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215416" comment="kernel-trace-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215417" comment="kernel-xen-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215418" comment="kernel-xen-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215419" comment="kernel-xen-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215421" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264390" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9556</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9556" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9556" source="CVE"/>
    <description>
    Integer overflow in the qtmd_decompress function in libmspack 0.4 allows remote attackers to cause a denial of service (hang) via a crafted CAB file, which triggers an infinite loop.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9556.html">CVE-2014-9556</cve>
<bugzilla href="https://bugzilla.suse.com/912214">SUSE bug 912214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/919283">SUSE bug 919283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/934533">SUSE bug 934533</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200251" comment="libmspack0-0.0.20060920alpha-74.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9584</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2014-9584" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9584" source="CVE"/>
    <description>
    The parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel before 3.18.2 does not validate a length value in the Extensions Reference (ER) System Use Field, which allows local users to obtain sensitive information from kernel memory via a crafted iso9660 image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9584.html">CVE-2014-9584</cve>
<bugzilla href="https://bugzilla.suse.com/912654">SUSE bug 912654</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214952" comment="kernel-bigsmp-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214953" comment="kernel-bigsmp-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214910" comment="kernel-bigsmp-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214911" comment="kernel-default-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214912" comment="kernel-default-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214913" comment="kernel-default-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264496" comment="kernel-default-man-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214954" comment="kernel-ec2-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214955" comment="kernel-ec2-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214956" comment="kernel-ec2-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264488" comment="kernel-pae-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264489" comment="kernel-pae-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264490" comment="kernel-pae-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264497" comment="kernel-ppc64-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264498" comment="kernel-ppc64-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264499" comment="kernel-ppc64-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214915" comment="kernel-source-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214916" comment="kernel-syms-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214957" comment="kernel-trace-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214958" comment="kernel-trace-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214917" comment="kernel-trace-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214918" comment="kernel-xen-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214919" comment="kernel-xen-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214920" comment="kernel-xen-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214922" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.50-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264492" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.50-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9585</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2014-9585" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9585" source="CVE"/>
    <description>
    The vdso_addr function in arch/x86/vdso/vma.c in the Linux kernel through 3.18.2 does not properly choose memory locations for the vDSO area, which makes it easier for local users to bypass the ASLR protection mechanism by guessing a location at the end of a PMD.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9585.html">CVE-2014-9585</cve>
<bugzilla href="https://bugzilla.suse.com/912705">SUSE bug 912705</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214952" comment="kernel-bigsmp-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214953" comment="kernel-bigsmp-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214910" comment="kernel-bigsmp-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214911" comment="kernel-default-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214912" comment="kernel-default-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214913" comment="kernel-default-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264496" comment="kernel-default-man-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214954" comment="kernel-ec2-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214955" comment="kernel-ec2-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214956" comment="kernel-ec2-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264488" comment="kernel-pae-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264489" comment="kernel-pae-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264490" comment="kernel-pae-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264497" comment="kernel-ppc64-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264498" comment="kernel-ppc64-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264499" comment="kernel-ppc64-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214915" comment="kernel-source-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214916" comment="kernel-syms-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214957" comment="kernel-trace-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214958" comment="kernel-trace-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214917" comment="kernel-trace-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214918" comment="kernel-xen-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214919" comment="kernel-xen-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214920" comment="kernel-xen-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214922" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.50-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264492" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.50-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9601</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2014-9601" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9601" source="CVE"/>
    <description>
    Pillow before 2.7.0 allows remote attackers to cause a denial of service via a compressed text chunk in a PNG image that has a large size when it is decompressed.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9601.html">CVE-2014-9601</cve>
<bugzilla href="https://bugzilla.suse.com/921566">SUSE bug 921566</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215928" comment="python-Pillow-2.7.0-0.7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9636" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9636" source="CVE"/>
    <description>
    unzip 6.0 allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) via an extra field with an uncompressed size smaller than the compressed field size in a zip archive that advertises STORED method compression.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9636.html">CVE-2014-9636</cve>
<bugzilla href="https://bugzilla.suse.com/914442">SUSE bug 914442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915880">SUSE bug 915880</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200465" comment="unzip-6.00-11.13 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9637</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9637" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9637" source="CVE"/>
    <description>
    GNU patch 2.7.2 and earlier allows remote attackers to cause a denial of service (memory consumption and segmentation fault) via a crafted diff file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9637.html">CVE-2014-9637</cve>
<bugzilla href="https://bugzilla.suse.com/1059698">SUSE bug 1059698</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1101128">SUSE bug 1101128</bugzilla>
<bugzilla href="https://bugzilla.suse.com/914891">SUSE bug 914891</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205697" comment="patch-2.5.9-252.22.7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9652</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9652" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9652" source="CVE"/>
    <description>
    The mconvert function in softmagic.c in file before 5.21, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not properly handle a certain string-length field during a copy of a truncated version of a Pascal string, which might allow remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9652.html">CVE-2014-9652</cve>
<bugzilla href="https://bugzilla.suse.com/917150">SUSE bug 917150</bugzilla>
<bugzilla href="https://bugzilla.suse.com/917302">SUSE bug 917302</bugzilla>
<bugzilla href="https://bugzilla.suse.com/918768">SUSE bug 918768</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214784" comment="apache2-mod_php53-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214785" comment="php53-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214786" comment="php53-bcmath-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214787" comment="php53-bz2-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214788" comment="php53-calendar-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214789" comment="php53-ctype-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214790" comment="php53-curl-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214791" comment="php53-dba-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214792" comment="php53-dom-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214793" comment="php53-exif-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214794" comment="php53-fastcgi-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214795" comment="php53-fileinfo-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214796" comment="php53-ftp-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214797" comment="php53-gd-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214798" comment="php53-gettext-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214799" comment="php53-gmp-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214800" comment="php53-iconv-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214801" comment="php53-intl-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214802" comment="php53-json-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214803" comment="php53-ldap-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214804" comment="php53-mbstring-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214805" comment="php53-mcrypt-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214806" comment="php53-mysql-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214807" comment="php53-odbc-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214808" comment="php53-openssl-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214809" comment="php53-pcntl-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214810" comment="php53-pdo-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214811" comment="php53-pear-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214812" comment="php53-pgsql-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214813" comment="php53-pspell-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214814" comment="php53-shmop-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214815" comment="php53-snmp-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214816" comment="php53-soap-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214817" comment="php53-suhosin-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214818" comment="php53-sysvmsg-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214819" comment="php53-sysvsem-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214820" comment="php53-sysvshm-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214821" comment="php53-tokenizer-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214822" comment="php53-wddx-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214823" comment="php53-xmlreader-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214824" comment="php53-xmlrpc-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214825" comment="php53-xmlwriter-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214826" comment="php53-xsl-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214827" comment="php53-zip-5.3.17-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214828" comment="php53-zlib-5.3.17-0.35 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9654</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9654" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9654" source="CVE"/>
    <description>
    The Regular Expressions package in International Components for Unicode (ICU) for C/C++ before 2014-12-03, as used in Google Chrome before 40.0.2214.91, calculates certain values without ensuring that they can be represented in a 24-bit field, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted string, a related issue to CVE-2014-7923.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9654.html">CVE-2014-9654</cve>
<bugzilla href="https://bugzilla.suse.com/917129">SUSE bug 917129</bugzilla>
<bugzilla href="https://bugzilla.suse.com/929629">SUSE bug 929629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/952260">SUSE bug 952260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/969781">SUSE bug 969781</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202728" comment="icu-4.0-38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209351" comment="libicu-4.0-38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202729" comment="libicu-32bit-4.0-38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209352" comment="libicu-doc-4.0-38 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204452" comment="libicu-4.0-7.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201719" comment="libicu-32bit-4.0-7.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208537" comment="libicu-doc-4.0-7.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208538" comment="libicu-x86-4.0-7.28 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9655</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9655" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9655" source="CVE"/>
    <description>
    The (1) putcontig8bitYCbCr21tile function in tif_getimage.c or (2) NeXTDecode function in tif_next.c in LibTIFF allows remote attackers to cause a denial of service (uninitialized memory access) via a crafted TIFF image, as demonstrated by libtiff-cvs-1.tif and libtiff-cvs-2.tif.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9655.html">CVE-2014-9655</cve>
<bugzilla href="https://bugzilla.suse.com/914890">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/916925">SUSE bug 916925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/916927">SUSE bug 916927</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204848" comment="libtiff3-3.8.2-141.160 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204849" comment="libtiff3-32bit-3.8.2-141.160 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202100" comment="tiff-3.8.2-141.160 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204848" comment="libtiff3-3.8.2-141.160 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204849" comment="libtiff3-32bit-3.8.2-141.160 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209042" comment="libtiff3-x86-3.8.2-141.160 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202100" comment="tiff-3.8.2-141.160 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9656</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9656" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656" source="CVE"/>
    <description>
    The tt_sbit_decoder_load_image function in sfnt/ttsbit.c in FreeType before 2.5.4 does not properly check for an integer overflow, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted OpenType font.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9656.html">CVE-2014-9656</cve>
<bugzilla href="https://bugzilla.suse.com/916847">SUSE bug 916847</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204397" comment="freetype2-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204398" comment="freetype2-32bit-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204399" comment="ft2demos-2.3.7-25.34 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204397" comment="freetype2-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204398" comment="freetype2-32bit-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208492" comment="freetype2-x86-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204399" comment="ft2demos-2.3.7-25.34 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9657</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9657" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" source="CVE"/>
    <description>
    The tt_face_load_hdmx function in truetype/ttpload.c in FreeType before 2.5.4 does not establish a minimum record size, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted TrueType font.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9657.html">CVE-2014-9657</cve>
<bugzilla href="https://bugzilla.suse.com/916856">SUSE bug 916856</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204397" comment="freetype2-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204398" comment="freetype2-32bit-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204399" comment="ft2demos-2.3.7-25.34 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204397" comment="freetype2-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204398" comment="freetype2-32bit-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208492" comment="freetype2-x86-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204399" comment="ft2demos-2.3.7-25.34 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9658</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9658" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" source="CVE"/>
    <description>
    The tt_face_load_kern function in sfnt/ttkern.c in FreeType before 2.5.4 enforces an incorrect minimum table length, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted TrueType font.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9658.html">CVE-2014-9658</cve>
<bugzilla href="https://bugzilla.suse.com/916857">SUSE bug 916857</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204397" comment="freetype2-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204398" comment="freetype2-32bit-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204399" comment="ft2demos-2.3.7-25.34 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204397" comment="freetype2-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204398" comment="freetype2-32bit-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208492" comment="freetype2-x86-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204399" comment="ft2demos-2.3.7-25.34 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9659</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9659" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9659" source="CVE"/>
    <description>
    cff/cf2intrp.c in the CFF CharString interpreter in FreeType before 2.5.4 proceeds with additional hints after the hint mask has been computed, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted OpenType font.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2240.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9659.html">CVE-2014-9659</cve>
<bugzilla href="https://bugzilla.suse.com/916867">SUSE bug 916867</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204397" comment="freetype2-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204398" comment="freetype2-32bit-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204399" comment="ft2demos-2.3.7-25.34 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204397" comment="freetype2-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204398" comment="freetype2-32bit-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208492" comment="freetype2-x86-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204399" comment="ft2demos-2.3.7-25.34 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9660</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9660" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" source="CVE"/>
    <description>
    The _bdf_parse_glyphs function in bdf/bdflib.c in FreeType before 2.5.4 does not properly handle a missing ENDCHAR record, which allows remote attackers to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted BDF font.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9660.html">CVE-2014-9660</cve>
<bugzilla href="https://bugzilla.suse.com/916858">SUSE bug 916858</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204397" comment="freetype2-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204398" comment="freetype2-32bit-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204399" comment="ft2demos-2.3.7-25.34 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204397" comment="freetype2-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204398" comment="freetype2-32bit-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208492" comment="freetype2-x86-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204399" comment="ft2demos-2.3.7-25.34 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9661</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9661" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" source="CVE"/>
    <description>
    type42/t42parse.c in FreeType before 2.5.4 does not consider that scanning can be incomplete without triggering an error, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted Type42 font.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9661.html">CVE-2014-9661</cve>
<bugzilla href="https://bugzilla.suse.com/916859">SUSE bug 916859</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204397" comment="freetype2-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204398" comment="freetype2-32bit-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204399" comment="ft2demos-2.3.7-25.34 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204397" comment="freetype2-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204398" comment="freetype2-32bit-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208492" comment="freetype2-x86-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204399" comment="ft2demos-2.3.7-25.34 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9662</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9662" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9662" source="CVE"/>
    <description>
    cff/cf2ft.c in FreeType before 2.5.4 does not validate the return values of point-allocation functions, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted OTF font.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9662.html">CVE-2014-9662</cve>
<bugzilla href="https://bugzilla.suse.com/916860">SUSE bug 916860</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204397" comment="freetype2-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204398" comment="freetype2-32bit-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204399" comment="ft2demos-2.3.7-25.34 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204397" comment="freetype2-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204398" comment="freetype2-32bit-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208492" comment="freetype2-x86-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204399" comment="ft2demos-2.3.7-25.34 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9663</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9663" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" source="CVE"/>
    <description>
    The tt_cmap4_validate function in sfnt/ttcmap.c in FreeType before 2.5.4 validates a certain length field before that field's value is completely calculated, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted cmap SFNT table.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9663.html">CVE-2014-9663</cve>
<bugzilla href="https://bugzilla.suse.com/916865">SUSE bug 916865</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204397" comment="freetype2-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204398" comment="freetype2-32bit-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204399" comment="ft2demos-2.3.7-25.34 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204397" comment="freetype2-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204398" comment="freetype2-32bit-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208492" comment="freetype2-x86-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204399" comment="ft2demos-2.3.7-25.34 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9664</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9664" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" source="CVE"/>
    <description>
    FreeType before 2.5.4 does not check for the end of the data during certain parsing actions, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted Type42 font, related to type42/t42parse.c and type1/t1load.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9664.html">CVE-2014-9664</cve>
<bugzilla href="https://bugzilla.suse.com/916864">SUSE bug 916864</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204397" comment="freetype2-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204398" comment="freetype2-32bit-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204399" comment="ft2demos-2.3.7-25.34 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204397" comment="freetype2-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204398" comment="freetype2-32bit-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208492" comment="freetype2-x86-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204399" comment="ft2demos-2.3.7-25.34 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9665</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9665" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9665" source="CVE"/>
    <description>
    The Load_SBit_Png function in sfnt/pngshim.c in FreeType before 2.5.4 does not restrict the rows and pitch values of PNG data, which allows remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact by embedding a PNG file in a .ttf font file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9665.html">CVE-2014-9665</cve>
<bugzilla href="https://bugzilla.suse.com/916863">SUSE bug 916863</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204397" comment="freetype2-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204398" comment="freetype2-32bit-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204399" comment="ft2demos-2.3.7-25.34 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204397" comment="freetype2-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204398" comment="freetype2-32bit-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208492" comment="freetype2-x86-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204399" comment="ft2demos-2.3.7-25.34 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9666</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9666" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666" source="CVE"/>
    <description>
    The tt_sbit_decoder_init function in sfnt/ttsbit.c in FreeType before 2.5.4 proceeds with a count-to-size association without restricting the count value, which allows remote attackers to cause a denial of service (integer overflow and out-of-bounds read) or possibly have unspecified other impact via a crafted embedded bitmap.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9666.html">CVE-2014-9666</cve>
<bugzilla href="https://bugzilla.suse.com/916862">SUSE bug 916862</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204397" comment="freetype2-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204398" comment="freetype2-32bit-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204399" comment="ft2demos-2.3.7-25.34 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204397" comment="freetype2-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204398" comment="freetype2-32bit-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208492" comment="freetype2-x86-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204399" comment="ft2demos-2.3.7-25.34 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9667</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9667" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" source="CVE"/>
    <description>
    sfnt/ttload.c in FreeType before 2.5.4 proceeds with offset+length calculations without restricting the values, which allows remote attackers to cause a denial of service (integer overflow and out-of-bounds read) or possibly have unspecified other impact via a crafted SFNT table.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9667.html">CVE-2014-9667</cve>
<bugzilla href="https://bugzilla.suse.com/916861">SUSE bug 916861</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204397" comment="freetype2-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204398" comment="freetype2-32bit-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204399" comment="ft2demos-2.3.7-25.34 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204397" comment="freetype2-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204398" comment="freetype2-32bit-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208492" comment="freetype2-x86-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204399" comment="ft2demos-2.3.7-25.34 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9668</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9668" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9668" source="CVE"/>
    <description>
    The woff_open_font function in sfnt/sfobjs.c in FreeType before 2.5.4 proceeds with offset+length calculations without restricting length values, which allows remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact via a crafted Web Open Font Format (WOFF) file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9668.html">CVE-2014-9668</cve>
<bugzilla href="https://bugzilla.suse.com/916868">SUSE bug 916868</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204397" comment="freetype2-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204398" comment="freetype2-32bit-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204399" comment="ft2demos-2.3.7-25.34 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204397" comment="freetype2-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204398" comment="freetype2-32bit-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208492" comment="freetype2-x86-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204399" comment="ft2demos-2.3.7-25.34 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9669</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9669" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" source="CVE"/>
    <description>
    Multiple integer overflows in sfnt/ttcmap.c in FreeType before 2.5.4 allow remote attackers to cause a denial of service (out-of-bounds read or memory corruption) or possibly have unspecified other impact via a crafted cmap SFNT table.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9669.html">CVE-2014-9669</cve>
<bugzilla href="https://bugzilla.suse.com/916870">SUSE bug 916870</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204397" comment="freetype2-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204398" comment="freetype2-32bit-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204399" comment="ft2demos-2.3.7-25.34 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204397" comment="freetype2-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204398" comment="freetype2-32bit-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208492" comment="freetype2-x86-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204399" comment="ft2demos-2.3.7-25.34 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9670</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9670" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" source="CVE"/>
    <description>
    Multiple integer signedness errors in the pcf_get_encodings function in pcf/pcfread.c in FreeType before 2.5.4 allow remote attackers to cause a denial of service (integer overflow, NULL pointer dereference, and application crash) via a crafted PCF file that specifies negative values for the first column and first row.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9670.html">CVE-2014-9670</cve>
<bugzilla href="https://bugzilla.suse.com/916871">SUSE bug 916871</bugzilla>
<bugzilla href="https://bugzilla.suse.com/933247">SUSE bug 933247</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204397" comment="freetype2-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204398" comment="freetype2-32bit-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204399" comment="ft2demos-2.3.7-25.34 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204397" comment="freetype2-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204398" comment="freetype2-32bit-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208492" comment="freetype2-x86-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204399" comment="ft2demos-2.3.7-25.34 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9671</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9671" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" source="CVE"/>
    <description>
    Off-by-one error in the pcf_get_properties function in pcf/pcfread.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted PCF file with a 0xffffffff size value that is improperly incremented.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9671.html">CVE-2014-9671</cve>
<bugzilla href="https://bugzilla.suse.com/916872">SUSE bug 916872</bugzilla>
<bugzilla href="https://bugzilla.suse.com/933247">SUSE bug 933247</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204397" comment="freetype2-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204398" comment="freetype2-32bit-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204399" comment="ft2demos-2.3.7-25.34 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204397" comment="freetype2-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204398" comment="freetype2-32bit-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208492" comment="freetype2-x86-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204399" comment="ft2demos-2.3.7-25.34 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9672</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9672" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672" source="CVE"/>
    <description>
    Array index error in the parse_fond function in base/ftmac.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (out-of-bounds read) or obtain sensitive information from process memory via a crafted FOND resource in a Mac font file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9672.html">CVE-2014-9672</cve>
<bugzilla href="https://bugzilla.suse.com/916873">SUSE bug 916873</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204397" comment="freetype2-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204398" comment="freetype2-32bit-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204399" comment="ft2demos-2.3.7-25.34 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204397" comment="freetype2-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204398" comment="freetype2-32bit-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208492" comment="freetype2-x86-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204399" comment="ft2demos-2.3.7-25.34 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9673</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9673" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" source="CVE"/>
    <description>
    Integer signedness error in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted Mac font.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9673.html">CVE-2014-9673</cve>
<bugzilla href="https://bugzilla.suse.com/916874">SUSE bug 916874</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204397" comment="freetype2-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204398" comment="freetype2-32bit-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204399" comment="ft2demos-2.3.7-25.34 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204397" comment="freetype2-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204398" comment="freetype2-32bit-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208492" comment="freetype2-x86-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204399" comment="ft2demos-2.3.7-25.34 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9674</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9674" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9674" source="CVE"/>
    <description>
    The Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.5.4 proceeds with adding to length values without validating the original values, which allows remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact via a crafted Mac font.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9674.html">CVE-2014-9674</cve>
<bugzilla href="https://bugzilla.suse.com/916879">SUSE bug 916879</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204397" comment="freetype2-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204398" comment="freetype2-32bit-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204399" comment="ft2demos-2.3.7-25.34 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204397" comment="freetype2-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204398" comment="freetype2-32bit-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208492" comment="freetype2-x86-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204399" comment="ft2demos-2.3.7-25.34 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9675</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9675" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" source="CVE"/>
    <description>
    bdf/bdflib.c in FreeType before 2.5.4 identifies property names by only verifying that an initial substring is present, which allows remote attackers to discover heap pointer values and bypass the ASLR protection mechanism via a crafted BDF font.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9675.html">CVE-2014-9675</cve>
<bugzilla href="https://bugzilla.suse.com/916881">SUSE bug 916881</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204397" comment="freetype2-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204398" comment="freetype2-32bit-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204399" comment="ft2demos-2.3.7-25.34 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204397" comment="freetype2-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204398" comment="freetype2-32bit-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208492" comment="freetype2-x86-2.3.7-25.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204399" comment="ft2demos-2.3.7-25.34 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9679</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9679" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9679" source="CVE"/>
    <description>
    Integer underflow in the cupsRasterReadPixels function in filter/raster.c in CUPS before 2.0.2 allows remote attackers to have unspecified impact via a malformed compressed raster file, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9679.html">CVE-2014-9679</cve>
<bugzilla href="https://bugzilla.suse.com/917799">SUSE bug 917799</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215567" comment="cups-1.3.9-8.46.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215568" comment="cups-client-1.3.9-8.46.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215569" comment="cups-libs-1.3.9-8.46.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215570" comment="cups-libs-32bit-1.3.9-8.46.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264521" comment="cups-libs-x86-1.3.9-8.46.54 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215567" comment="cups-1.3.9-8.46.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215568" comment="cups-client-1.3.9-8.46.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215569" comment="cups-libs-1.3.9-8.46.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215570" comment="cups-libs-32bit-1.3.9-8.46.54 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9680</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9680" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9680" source="CVE"/>
    <description>
    sudo before 1.8.12 does not ensure that the TZ environment variable is associated with a zoneinfo file, which allows local users to open arbitrary files for read access (but not view file contents) by running a program within an sudo session, as demonstrated by interfering with terminal output, discarding kernel-log messages, or repositioning tape drives.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9680.html">CVE-2014-9680</cve>
<bugzilla href="https://bugzilla.suse.com/917806">SUSE bug 917806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/919737">SUSE bug 919737</bugzilla>
<bugzilla href="https://bugzilla.suse.com/921999">SUSE bug 921999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/953359">SUSE bug 953359</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200451" comment="sudo-1.7.6p2-0.23 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9683</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9683" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9683" source="CVE"/>
    <description>
    Off-by-one error in the ecryptfs_decode_from_filename function in fs/ecryptfs/crypto.c in the eCryptfs subsystem in the Linux kernel before 3.18.2 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted filename.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9683.html">CVE-2014-9683</cve>
<bugzilla href="https://bugzilla.suse.com/918333">SUSE bug 918333</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215410" comment="kernel-default-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215411" comment="kernel-default-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215412" comment="kernel-default-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264515" comment="kernel-default-man-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215451" comment="kernel-ec2-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215452" comment="kernel-ec2-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215453" comment="kernel-ec2-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264508" comment="kernel-pae-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264509" comment="kernel-pae-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264510" comment="kernel-pae-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264516" comment="kernel-ppc64-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264517" comment="kernel-ppc64-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264518" comment="kernel-ppc64-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215414" comment="kernel-source-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215415" comment="kernel-syms-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215454" comment="kernel-trace-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215455" comment="kernel-trace-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215416" comment="kernel-trace-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215417" comment="kernel-xen-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215418" comment="kernel-xen-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215419" comment="kernel-xen-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215421" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264390" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9684</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2014-9684" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9684" source="CVE"/>
    <description>
    OpenStack Image Registry and Delivery Service (Glance) 2014.2 through 2014.2.2 does not properly remove images, which allows remote authenticated users to cause a denial of service (disk consumption) by creating a large number of images using the task v2 API and then deleting them before the uploads finish, a different vulnerability than CVE-2015-1881.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9684.html">CVE-2014-9684</cve>
<bugzilla href="https://bugzilla.suse.com/918784">SUSE bug 918784</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215822" comment="openstack-ceilometer-2014.2.4.dev18-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215823" comment="openstack-ceilometer-agent-central-2014.2.4.dev18-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215824" comment="openstack-ceilometer-agent-compute-2014.2.4.dev18-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215825" comment="openstack-ceilometer-agent-ipmi-2014.2.4.dev18-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215826" comment="openstack-ceilometer-agent-notification-2014.2.4.dev18-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215827" comment="openstack-ceilometer-alarm-evaluator-2014.2.4.dev18-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215828" comment="openstack-ceilometer-alarm-notifier-2014.2.4.dev18-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215829" comment="openstack-ceilometer-api-2014.2.4.dev18-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215830" comment="openstack-ceilometer-collector-2014.2.4.dev18-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215831" comment="openstack-ceilometer-doc-2014.2.4.dev18-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215832" comment="openstack-cinder-2014.2.4.dev19-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215833" comment="openstack-cinder-api-2014.2.4.dev19-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215834" comment="openstack-cinder-backup-2014.2.4.dev19-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215835" comment="openstack-cinder-doc-2014.2.4.dev19-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215836" comment="openstack-cinder-scheduler-2014.2.4.dev19-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215837" comment="openstack-cinder-volume-2014.2.4.dev19-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215838" comment="openstack-glance-2014.2.4.dev5-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215839" comment="openstack-glance-doc-2014.2.4.dev5-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215840" comment="openstack-heat-2014.2.4.dev13-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215841" comment="openstack-heat-api-2014.2.4.dev13-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215842" comment="openstack-heat-api-cfn-2014.2.4.dev13-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215843" comment="openstack-heat-api-cloudwatch-2014.2.4.dev13-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215844" comment="openstack-heat-doc-2014.2.4.dev13-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215845" comment="openstack-heat-engine-2014.2.4.dev13-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215846" comment="openstack-keystone-2014.2.4.dev5-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215847" comment="openstack-keystone-doc-2014.2.4.dev5-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215848" comment="openstack-sahara-2014.2.4.dev3-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215849" comment="openstack-sahara-api-2014.2.4.dev3-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215850" comment="openstack-sahara-doc-2014.2.4.dev3-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215851" comment="openstack-sahara-engine-2014.2.4.dev3-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215852" comment="openstack-suse-2014.2-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215853" comment="openstack-suse-sudo-2014.2-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215854" comment="python-ceilometer-2014.2.4.dev18-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215855" comment="python-cinder-2014.2.4.dev19-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215856" comment="python-glance-2014.2.4.dev5-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215857" comment="python-heat-2014.2.4.dev13-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215858" comment="python-keystone-2014.2.4.dev5-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215859" comment="python-oslo.i18n-1.3.1-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215860" comment="python-oslo.utils-1.4.0-14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215861" comment="python-oslotest-1.2.0-2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215862" comment="python-sahara-2014.2.4.dev3-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215863" comment="python-six-1.9.0-9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9687</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9687" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9687" source="CVE"/>
    <description>
    eCryptfs 104 and earlier uses a default salt to encrypt the mount passphrase, which makes it easier for attackers to obtain user passwords via a brute force attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9687.html">CVE-2014-9687</cve>
<bugzilla href="https://bugzilla.suse.com/920160">SUSE bug 920160</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204284" comment="ecryptfs-utils-61-1.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204285" comment="ecryptfs-utils-32bit-61-1.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208462" comment="ecryptfs-utils-x86-61-1.35 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204284" comment="ecryptfs-utils-61-1.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204285" comment="ecryptfs-utils-32bit-61-1.35 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9705</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9705" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9705" source="CVE"/>
    <description>
    Heap-based buffer overflow in the enchant_broker_request_dict function in ext/enchant/enchant.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 allows remote attackers to execute arbitrary code via vectors that trigger creation of multiple dictionaries.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9705.html">CVE-2014-9705</cve>
<bugzilla href="https://bugzilla.suse.com/922451">SUSE bug 922451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199864" comment="apache2-mod_php53-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199865" comment="php53-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199866" comment="php53-bcmath-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199867" comment="php53-bz2-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199868" comment="php53-calendar-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199869" comment="php53-ctype-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199870" comment="php53-curl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199871" comment="php53-dba-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199872" comment="php53-dom-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199873" comment="php53-exif-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199874" comment="php53-fastcgi-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199875" comment="php53-fileinfo-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199876" comment="php53-ftp-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199877" comment="php53-gd-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199878" comment="php53-gettext-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199879" comment="php53-gmp-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199880" comment="php53-iconv-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199881" comment="php53-intl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199882" comment="php53-json-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199883" comment="php53-ldap-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199884" comment="php53-mbstring-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199885" comment="php53-mcrypt-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199886" comment="php53-mysql-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199887" comment="php53-odbc-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199888" comment="php53-openssl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199889" comment="php53-pcntl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199890" comment="php53-pdo-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199891" comment="php53-pear-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199892" comment="php53-pgsql-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199893" comment="php53-pspell-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199894" comment="php53-shmop-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199895" comment="php53-snmp-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199896" comment="php53-soap-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199897" comment="php53-suhosin-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199898" comment="php53-sysvmsg-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199899" comment="php53-sysvsem-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199900" comment="php53-sysvshm-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199901" comment="php53-tokenizer-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199902" comment="php53-wddx-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199903" comment="php53-xmlreader-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199904" comment="php53-xmlrpc-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199905" comment="php53-xmlwriter-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199906" comment="php53-xsl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199907" comment="php53-zip-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199908" comment="php53-zlib-5.3.17-0.41 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9709</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9709" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9709" source="CVE"/>
    <description>
    The GetCode_ function in gd_gif_in.c in GD 2.1.1 and earlier, as used in PHP before 5.5.21 and 5.6.x before 5.6.5, allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted GIF image that is improperly handled by the gdImageCreateFromGif function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9709.html">CVE-2014-9709</cve>
<bugzilla href="https://bugzilla.suse.com/923945">SUSE bug 923945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/923946">SUSE bug 923946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199864" comment="apache2-mod_php53-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200025" comment="gd-2.0.36.RC1-52.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199865" comment="php53-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199866" comment="php53-bcmath-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199867" comment="php53-bz2-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199868" comment="php53-calendar-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199869" comment="php53-ctype-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199870" comment="php53-curl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199871" comment="php53-dba-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199872" comment="php53-dom-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199873" comment="php53-exif-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199874" comment="php53-fastcgi-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199875" comment="php53-fileinfo-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199876" comment="php53-ftp-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199877" comment="php53-gd-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199878" comment="php53-gettext-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199879" comment="php53-gmp-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199880" comment="php53-iconv-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199881" comment="php53-intl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199882" comment="php53-json-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199883" comment="php53-ldap-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199884" comment="php53-mbstring-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199885" comment="php53-mcrypt-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199886" comment="php53-mysql-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199887" comment="php53-odbc-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199888" comment="php53-openssl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199889" comment="php53-pcntl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199890" comment="php53-pdo-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199891" comment="php53-pear-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199892" comment="php53-pgsql-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199893" comment="php53-pspell-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199894" comment="php53-shmop-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199895" comment="php53-snmp-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199896" comment="php53-soap-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199897" comment="php53-suhosin-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199898" comment="php53-sysvmsg-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199899" comment="php53-sysvsem-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199900" comment="php53-sysvshm-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199901" comment="php53-tokenizer-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199902" comment="php53-wddx-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199903" comment="php53-xmlreader-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199904" comment="php53-xmlrpc-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199905" comment="php53-xmlwriter-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199906" comment="php53-xsl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199907" comment="php53-zip-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199908" comment="php53-zlib-5.3.17-0.41 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9710</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9710" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9710" source="CVE"/>
    <description>
    The Btrfs implementation in the Linux kernel before 3.19 does not ensure that the visible xattr state is consistent with a requested replacement, which allows local users to bypass intended ACL settings and gain privileges via standard filesystem operations (1) during an xattr-replacement time window, related to a race condition, or (2) after an xattr-replacement attempt that fails because the data does not fit.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9710.html">CVE-2014-9710</cve>
<bugzilla href="https://bugzilla.suse.com/923908">SUSE bug 923908</bugzilla>
<bugzilla href="https://bugzilla.suse.com/939260">SUSE bug 939260</bugzilla>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:20149718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9718</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9718" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9718" source="CVE"/>
    <description>
    The (1) BMDMA and (2) AHCI HBA interfaces in the IDE functionality in QEMU 1.0 through 2.1.3 have multiple interpretations of a function's return value, which allows guest OS users to cause a host OS denial of service (memory consumption or infinite loop, and system crash) via a PRDT with zero complete sectors, related to the bmdma_prepare_buf and ahci_dma_prepare_buf functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9718.html">CVE-2014-9718</cve>
<bugzilla href="https://bugzilla.suse.com/928393">SUSE bug 928393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/964431">SUSE bug 964431</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209045" comment="xen-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209046" comment="xen-doc-html-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209047" comment="xen-doc-pdf-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209048" comment="xen-kmp-default-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209049" comment="xen-kmp-pae-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209050" comment="xen-libs-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209051" comment="xen-libs-32bit-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209052" comment="xen-tools-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209053" comment="xen-tools-domU-4.2.5_20-24 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9728</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9728" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9728" source="CVE"/>
    <description>
    The UDF filesystem implementation in the Linux kernel before 3.18.2 does not validate certain lengths, which allows local users to cause a denial of service (buffer over-read and system crash) via a crafted filesystem image, related to fs/udf/inode.c and fs/udf/symlink.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9728.html">CVE-2014-9728</cve>
<bugzilla href="https://bugzilla.suse.com/911325">SUSE bug 911325</bugzilla>
<bugzilla href="https://bugzilla.suse.com/933904">SUSE bug 933904</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204527" comment="kernel-bigsmp-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208622" comment="kernel-bigsmp-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204528" comment="kernel-bigsmp-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204529" comment="kernel-default-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204530" comment="kernel-default-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204531" comment="kernel-default-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208623" comment="kernel-default-man-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208624" comment="kernel-ec2-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208625" comment="kernel-ec2-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208626" comment="kernel-ec2-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204533" comment="kernel-pae-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204534" comment="kernel-pae-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204535" comment="kernel-pae-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208627" comment="kernel-ppc64-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208628" comment="kernel-ppc64-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208629" comment="kernel-ppc64-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204537" comment="kernel-source-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204538" comment="kernel-syms-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204539" comment="kernel-trace-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208630" comment="kernel-trace-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204540" comment="kernel-trace-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204541" comment="kernel-xen-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204542" comment="kernel-xen-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204543" comment="kernel-xen-devel-3.0.101-0.47.67 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9729</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9729" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9729" source="CVE"/>
    <description>
    The udf_read_inode function in fs/udf/inode.c in the Linux kernel before 3.18.2 does not ensure a certain data-structure size consistency, which allows local users to cause a denial of service (system crash) via a crafted UDF filesystem image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9729.html">CVE-2014-9729</cve>
<bugzilla href="https://bugzilla.suse.com/911325">SUSE bug 911325</bugzilla>
<bugzilla href="https://bugzilla.suse.com/933904">SUSE bug 933904</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204527" comment="kernel-bigsmp-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208622" comment="kernel-bigsmp-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204528" comment="kernel-bigsmp-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204529" comment="kernel-default-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204530" comment="kernel-default-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204531" comment="kernel-default-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208623" comment="kernel-default-man-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208624" comment="kernel-ec2-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208625" comment="kernel-ec2-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208626" comment="kernel-ec2-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204533" comment="kernel-pae-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204534" comment="kernel-pae-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204535" comment="kernel-pae-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208627" comment="kernel-ppc64-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208628" comment="kernel-ppc64-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208629" comment="kernel-ppc64-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204537" comment="kernel-source-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204538" comment="kernel-syms-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204539" comment="kernel-trace-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208630" comment="kernel-trace-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204540" comment="kernel-trace-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204541" comment="kernel-xen-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204542" comment="kernel-xen-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204543" comment="kernel-xen-devel-3.0.101-0.47.67 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9730</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9730" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9730" source="CVE"/>
    <description>
    The udf_pc_to_char function in fs/udf/symlink.c in the Linux kernel before 3.18.2 relies on component lengths that are unused, which allows local users to cause a denial of service (system crash) via a crafted UDF filesystem image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9730.html">CVE-2014-9730</cve>
<bugzilla href="https://bugzilla.suse.com/911325">SUSE bug 911325</bugzilla>
<bugzilla href="https://bugzilla.suse.com/933904">SUSE bug 933904</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204527" comment="kernel-bigsmp-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208622" comment="kernel-bigsmp-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204528" comment="kernel-bigsmp-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204529" comment="kernel-default-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204530" comment="kernel-default-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204531" comment="kernel-default-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208623" comment="kernel-default-man-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208624" comment="kernel-ec2-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208625" comment="kernel-ec2-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208626" comment="kernel-ec2-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204533" comment="kernel-pae-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204534" comment="kernel-pae-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204535" comment="kernel-pae-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208627" comment="kernel-ppc64-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208628" comment="kernel-ppc64-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208629" comment="kernel-ppc64-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204537" comment="kernel-source-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204538" comment="kernel-syms-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204539" comment="kernel-trace-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208630" comment="kernel-trace-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204540" comment="kernel-trace-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204541" comment="kernel-xen-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204542" comment="kernel-xen-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204543" comment="kernel-xen-devel-3.0.101-0.47.67 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9731</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9731" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9731" source="CVE"/>
    <description>
    The UDF filesystem implementation in the Linux kernel before 3.18.2 does not ensure that space is available for storing a symlink target's name along with a trailing \0 character, which allows local users to obtain sensitive information via a crafted filesystem image, related to fs/udf/symlink.c and fs/udf/unicode.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9731.html">CVE-2014-9731</cve>
<bugzilla href="https://bugzilla.suse.com/911325">SUSE bug 911325</bugzilla>
<bugzilla href="https://bugzilla.suse.com/933896">SUSE bug 933896</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204527" comment="kernel-bigsmp-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208622" comment="kernel-bigsmp-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204528" comment="kernel-bigsmp-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204529" comment="kernel-default-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204530" comment="kernel-default-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204531" comment="kernel-default-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208623" comment="kernel-default-man-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208624" comment="kernel-ec2-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208625" comment="kernel-ec2-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208626" comment="kernel-ec2-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204533" comment="kernel-pae-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204534" comment="kernel-pae-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204535" comment="kernel-pae-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208627" comment="kernel-ppc64-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208628" comment="kernel-ppc64-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208629" comment="kernel-ppc64-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204537" comment="kernel-source-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204538" comment="kernel-syms-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204539" comment="kernel-trace-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208630" comment="kernel-trace-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204540" comment="kernel-trace-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204541" comment="kernel-xen-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204542" comment="kernel-xen-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204543" comment="kernel-xen-devel-3.0.101-0.47.67 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9732</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9732" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9732" source="CVE"/>
    <description>
    The cabd_extract function in cabd.c in libmspack before 0.5 does not properly maintain decompression callbacks in certain cases where an invalid file follows a valid file, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted CAB archive.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9732.html">CVE-2014-9732</cve>
<bugzilla href="https://bugzilla.suse.com/934524">SUSE bug 934524</bugzilla>
<bugzilla href="https://bugzilla.suse.com/934533">SUSE bug 934533</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201785" comment="libmspack-0.0.20060920alpha-74.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204616" comment="libmspack0-0.0.20060920alpha-74.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9745" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745" source="CVE"/>
    <description>
    The parse_encoding function in type1/t1load.c in FreeType before 2.5.3 allows remote attackers to cause a denial of service (infinite loop) via a "broken number-with-base" in a Postscript stream, as demonstrated by 8#garbage.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9745.html">CVE-2014-9745</cve>
<bugzilla href="https://bugzilla.suse.com/945849">SUSE bug 945849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/947966">SUSE bug 947966</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202528" comment="freetype2-2.3.7-25.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209248" comment="freetype2-32bit-2.3.7-25.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209250" comment="ft2demos-2.3.7-25.41 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9747</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9747" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747" source="CVE"/>
    <description>
    The t42_parse_encoding function in type42/t42parse.c in FreeType before 2.5.4 does not properly update the current position for immediates-only mode, which allows remote attackers to cause a denial of service (infinite loop) via a Type42 font.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9747.html">CVE-2014-9747</cve>
<bugzilla href="https://bugzilla.suse.com/947966">SUSE bug 947966</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202528" comment="freetype2-2.3.7-25.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209248" comment="freetype2-32bit-2.3.7-25.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209250" comment="ft2demos-2.3.7-25.41 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9749</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9749" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9749" source="CVE"/>
    <description>
    Squid 3.4.4 through 3.4.11 and 3.5.0.1 through 3.5.1, when Digest authentication is used, allow remote authenticated users to retain access by leveraging a stale nonce, aka "Nonce replay vulnerability."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9749.html">CVE-2014-9749</cve>
<bugzilla href="https://bugzilla.suse.com/949942">SUSE bug 949942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/993299">SUSE bug 993299</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209041" comment="squid-2.7.STABLE5-2.12.24 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209041" comment="squid-2.7.STABLE5-2.12.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210807" comment="squid3-3.1.23-8.16.36 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9756</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9756" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9756" source="CVE"/>
    <description>
    The psf_fwrite function in file_io.c in libsndfile allows attackers to cause a denial of service (divide-by-zero error and application crash) via unspecified vectors related to the headindex variable.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9756.html">CVE-2014-9756</cve>
<bugzilla href="https://bugzilla.suse.com/953516">SUSE bug 953516</bugzilla>
<bugzilla href="https://bugzilla.suse.com/953519">SUSE bug 953519</bugzilla>
<bugzilla href="https://bugzilla.suse.com/953521">SUSE bug 953521</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201891" comment="libsndfile-1.0.20-2.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204655" comment="libsndfile-32bit-1.0.20-2.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208757" comment="libsndfile-x86-1.0.20-2.10 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201891" comment="libsndfile-1.0.20-2.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204655" comment="libsndfile-32bit-1.0.20-2.10 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9761</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9761" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9761" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in the GNU C Library (aka glibc or libc6) before 2.23 allow context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long argument to the (1) nan, (2) nanf, or (3) nanl function.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9761.html">CVE-2014-9761</cve>
<bugzilla href="https://bugzilla.suse.com/962738">SUSE bug 962738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/986086">SUSE bug 986086</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201693" comment="glibc-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204416" comment="glibc-32bit-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204417" comment="glibc-devel-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204418" comment="glibc-devel-32bit-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201694" comment="glibc-html-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204419" comment="glibc-i18ndata-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201695" comment="glibc-info-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204420" comment="glibc-locale-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204421" comment="glibc-locale-32bit-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208509" comment="glibc-locale-x86-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208510" comment="glibc-profile-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208511" comment="glibc-profile-32bit-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208512" comment="glibc-profile-x86-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208513" comment="glibc-x86-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204422" comment="nscd-2.11.3-17.95 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201693" comment="glibc-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204416" comment="glibc-32bit-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204417" comment="glibc-devel-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204418" comment="glibc-devel-32bit-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201694" comment="glibc-html-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204419" comment="glibc-i18ndata-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201695" comment="glibc-info-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204420" comment="glibc-locale-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204421" comment="glibc-locale-32bit-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208510" comment="glibc-profile-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208511" comment="glibc-profile-32bit-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204422" comment="nscd-2.11.3-17.95 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9767</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2014-9767" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9767" source="CVE"/>
    <description>
    Directory traversal vulnerability in the ZipArchive::extractTo function in ext/zip/php_zip.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 and ext/zip/ext_zip.cpp in HHVM before 3.12.1 allows remote attackers to create arbitrary empty directories via a crafted ZIP archive.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9767.html">CVE-2014-9767</cve>
<bugzilla href="https://bugzilla.suse.com/971612">SUSE bug 971612</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208897" comment="apache2-mod_php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203264" comment="php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208898" comment="php53-bcmath-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208899" comment="php53-bz2-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208900" comment="php53-calendar-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208901" comment="php53-ctype-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208902" comment="php53-curl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208903" comment="php53-dba-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208904" comment="php53-dom-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208905" comment="php53-exif-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208906" comment="php53-fastcgi-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208907" comment="php53-fileinfo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208908" comment="php53-ftp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208909" comment="php53-gd-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208910" comment="php53-gettext-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208911" comment="php53-gmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208912" comment="php53-iconv-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208913" comment="php53-intl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208914" comment="php53-json-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208915" comment="php53-ldap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208916" comment="php53-mbstring-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208917" comment="php53-mcrypt-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208918" comment="php53-mysql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208919" comment="php53-odbc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208920" comment="php53-openssl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208921" comment="php53-pcntl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208922" comment="php53-pdo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208923" comment="php53-pear-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208924" comment="php53-pgsql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208925" comment="php53-pspell-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208926" comment="php53-shmop-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208927" comment="php53-snmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208928" comment="php53-soap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208929" comment="php53-suhosin-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208930" comment="php53-sysvmsg-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208931" comment="php53-sysvsem-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208932" comment="php53-sysvshm-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208933" comment="php53-tokenizer-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208934" comment="php53-wddx-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208935" comment="php53-xmlreader-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208936" comment="php53-xmlrpc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208937" comment="php53-xmlwriter-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208938" comment="php53-xsl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208939" comment="php53-zip-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208940" comment="php53-zlib-5.3.17-71 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9805" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9805" source="CVE"/>
    <description>
    ImageMagick allows remote attackers to cause a denial of service (segmentation fault and application crash) via a crafted pnm file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9805.html">CVE-2014-9805</cve>
<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/983752">SUSE bug 983752</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9806" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9806" source="CVE"/>
    <description>
    ImageMagick allows remote attackers to cause a denial of service (file descriptor consumption) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9806.html">CVE-2014-9806</cve>
<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/983774">SUSE bug 983774</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9807</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9807" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9807" source="CVE"/>
    <description>
    The pdb coder in ImageMagick allows remote attackers to cause a denial of service (double free) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9807.html">CVE-2014-9807</cve>
<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/983794">SUSE bug 983794</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9808</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9808" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9808" source="CVE"/>
    <description>
    ImageMagick allows remote attackers to cause a denial of service (segmentation fault and application crash) via a crafted dpc image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9808.html">CVE-2014-9808</cve>
<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/983796">SUSE bug 983796</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9809</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9809" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9809" source="CVE"/>
    <description>
    ImageMagick allows remote attackers to cause a denial of service (segmentation fault and application crash) via a crafted xwd image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9809.html">CVE-2014-9809</cve>
<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/983799">SUSE bug 983799</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9810</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9810" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9810" source="CVE"/>
    <description>
    The dpx file handler in ImageMagick allows remote attackers to cause a denial of service (segmentation fault and application crash) via a malformed dpx file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9810.html">CVE-2014-9810</cve>
<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/983803">SUSE bug 983803</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9811</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9811" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9811" source="CVE"/>
    <description>
    The xwd file handler in ImageMagick allows remote attackers to cause a denial of service (segmentation fault and application crash) via a malformed xwd file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9811.html">CVE-2014-9811</cve>
<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/984032">SUSE bug 984032</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9812</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9812" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9812" source="CVE"/>
    <description>
    ImageMagick allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted ps file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9812.html">CVE-2014-9812</cve>
<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/984137">SUSE bug 984137</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9813</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9813" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9813" source="CVE"/>
    <description>
    ImageMagick allows remote attackers to cause a denial of service (application crash) via a crafted viff file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9813.html">CVE-2014-9813</cve>
<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/984035">SUSE bug 984035</bugzilla>
<bugzilla href="https://bugzilla.suse.com/984398">SUSE bug 984398</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9814" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9814" source="CVE"/>
    <description>
    ImageMagick allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted wpg file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9814.html">CVE-2014-9814</cve>
<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/984193">SUSE bug 984193</bugzilla>
<bugzilla href="https://bugzilla.suse.com/984372">SUSE bug 984372</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9815" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9815" source="CVE"/>
    <description>
    ImageMagick allows remote attackers to cause a denial of service (application crash) via a crafted wpg file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9815.html">CVE-2014-9815</cve>
<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/984372">SUSE bug 984372</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9816</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9816" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9816" source="CVE"/>
    <description>
    ImageMagick allows remote attackers to cause a denial of service (out-of-bounds access) via a crafted viff file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9816.html">CVE-2014-9816</cve>
<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/984035">SUSE bug 984035</bugzilla>
<bugzilla href="https://bugzilla.suse.com/984398">SUSE bug 984398</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9817</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9817" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9817" source="CVE"/>
    <description>
    Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted pdb file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9817.html">CVE-2014-9817</cve>
<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/984400">SUSE bug 984400</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9818</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9818" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9818" source="CVE"/>
    <description>
    ImageMagick allows remote attackers to cause a denial of service (out-of-bounds access) via a malformed sun file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9818.html">CVE-2014-9818</cve>
<bugzilla href="https://bugzilla.suse.com/1000690">SUSE bug 1000690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/984181">SUSE bug 984181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/984186">SUSE bug 984186</bugzilla>
<bugzilla href="https://bugzilla.suse.com/984409">SUSE bug 984409</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9819</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9819" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9819" source="CVE"/>
    <description>
    Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted palm file, a different vulnerability than CVE-2014-9823.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9819.html">CVE-2014-9819</cve>
<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/984142">SUSE bug 984142</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9820</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9820" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9820" source="CVE"/>
    <description>
    Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted pnm file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9820.html">CVE-2014-9820</cve>
<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/984150">SUSE bug 984150</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9822</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9822" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9822" source="CVE"/>
    <description>
    Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted quantum file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9822.html">CVE-2014-9822</cve>
<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/984187">SUSE bug 984187</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9823</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9823" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9823" source="CVE"/>
    <description>
    Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted palm file, a different vulnerability than CVE-2014-9819.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9823.html">CVE-2014-9823</cve>
<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/984401">SUSE bug 984401</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9824</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9824" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9824" source="CVE"/>
    <description>
    Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted psd file, a different vulnerability than CVE-2014-9825.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9824.html">CVE-2014-9824</cve>
<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/984185">SUSE bug 984185</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9826</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9826" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9826" source="CVE"/>
    <description>
    ImageMagick allows remote attackers to have unspecified impact via vectors related to error handling in sun files.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9826.html">CVE-2014-9826</cve>
<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/984186">SUSE bug 984186</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9828</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9828" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9828" source="CVE"/>
    <description>
    coders/psd.c in ImageMagick allows remote attackers to have unspecified impact via a crafted psd file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9828.html">CVE-2014-9828</cve>
<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/984028">SUSE bug 984028</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9829</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9829" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9829" source="CVE"/>
    <description>
    coders/sun.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds access) via a crafted sun file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9829.html">CVE-2014-9829</cve>
<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/984409">SUSE bug 984409</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9830" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9830" source="CVE"/>
    <description>
    coders/sun.c in ImageMagick allows remote attackers to have unspecified impact via a corrupted sun file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9830.html">CVE-2014-9830</cve>
<bugzilla href="https://bugzilla.suse.com/1000690">SUSE bug 1000690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/984135">SUSE bug 984135</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9831</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9831" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9831" source="CVE"/>
    <description>
    coders/wpg.c in ImageMagick allows remote attackers to have unspecified impact via a corrupted wpg file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9831.html">CVE-2014-9831</cve>
<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/984375">SUSE bug 984375</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9834</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9834" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9834" source="CVE"/>
    <description>
    Heap overflow in ImageMagick 6.8.9-9 via a crafted pict file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9834.html">CVE-2014-9834</cve>
<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/984436">SUSE bug 984436</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9835" source="CVE"/>
    <description>
    Heap overflow in ImageMagick 6.8.9-9 via a crafted wpf file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9835.html">CVE-2014-9835</cve>
<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/984145">SUSE bug 984145</bugzilla>
<bugzilla href="https://bugzilla.suse.com/984375">SUSE bug 984375</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9836" source="CVE"/>
    <description>
    ImageMagick 6.8.9-9 allows remote attackers to cause a denial of service via a crafted xpm file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9836.html">CVE-2014-9836</cve>
<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/984023">SUSE bug 984023</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9837</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9837" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9837" source="CVE"/>
    <description>
    coders/pnm.c in ImageMagick 6.9.0-1 Beta and earlier allows remote attackers to cause a denial of service (crash) via a crafted png file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9837.html">CVE-2014-9837</cve>
<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/984166">SUSE bug 984166</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9838</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9838" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9838" source="CVE"/>
    <description>
    magick/cache.c in ImageMagick 6.8.9-9 allows remote attackers to cause a denial of service (crash).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9838.html">CVE-2014-9838</cve>
<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/984370">SUSE bug 984370</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9839</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9839" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9839" source="CVE"/>
    <description>
    magick/colormap-private.h in ImageMagick 6.8.9-9 allows remote attackers to cause a denial of service (out-of-bounds access).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9839.html">CVE-2014-9839</cve>
<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/984379">SUSE bug 984379</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9840" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9840" source="CVE"/>
    <description>
    ImageMagick 6.8.9-9 allows remote attackers to cause a denial of service (out-of-bounds access) via a crafted palm file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9840.html">CVE-2014-9840</cve>
<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/984433">SUSE bug 984433</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9842</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9842" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9842" source="CVE"/>
    <description>
    Memory leak in the ReadPSDLayers function in coders/psd.c in ImageMagick 6.8.9.9 allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9842.html">CVE-2014-9842</cve>
<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/984172">SUSE bug 984172</bugzilla>
<bugzilla href="https://bugzilla.suse.com/984374">SUSE bug 984374</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9844</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9844" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9844" source="CVE"/>
    <description>
    The ReadRLEImage function in coders/rle.c in ImageMagick 6.8.9.9 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted image file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9844.html">CVE-2014-9844</cve>
<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/984373">SUSE bug 984373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/984408">SUSE bug 984408</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9845</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9845" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9845" source="CVE"/>
    <description>
    The ReadDIBImage function in coders/dib.c in ImageMagick allows remote attackers to cause a denial of service (crash) via a corrupted dib file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9845.html">CVE-2014-9845</cve>
<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/984394">SUSE bug 984394</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9846</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9846" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9846" source="CVE"/>
    <description>
    Buffer overflow in the ReadRLEImage function in coders/rle.c in ImageMagick 6.8.9.9 allows remote attackers to have unspecified impact.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9846.html">CVE-2014-9846</cve>
<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/983521">SUSE bug 983521</bugzilla>
<bugzilla href="https://bugzilla.suse.com/984408">SUSE bug 984408</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202248" comment="ImageMagick-6.4.3.6-7.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209114" comment="libMagickCore1-6.4.3.6-7.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209115" comment="libMagickCore1-32bit-6.4.3.6-7.77 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9847</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9847" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9847" source="CVE"/>
    <description>
    The jng decoder in ImageMagick 6.8.9.9 allows remote attackers to have an unspecified impact.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9847.html">CVE-2014-9847</cve>
<bugzilla href="https://bugzilla.suse.com/1040304">SUSE bug 1040304</bugzilla>
<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/984144">SUSE bug 984144</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9849</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9849" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9849" source="CVE"/>
    <description>
    The png coder in ImageMagick allows remote attackers to cause a denial of service (crash).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9849.html">CVE-2014-9849</cve>
<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/984018">SUSE bug 984018</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9851</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9851" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9851" source="CVE"/>
    <description>
    ImageMagick 6.8.9.9 allows remote attackers to cause a denial of service (application crash).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9851.html">CVE-2014-9851</cve>
<bugzilla href="https://bugzilla.suse.com/1106989">SUSE bug 1106989</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1106996">SUSE bug 1106996</bugzilla>
<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/984160">SUSE bug 984160</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9853</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9853" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9853" source="CVE"/>
    <description>
    Memory leak in coders/rle.c in ImageMagick allows remote attackers to cause a denial of service (memory consumption) via a crafted rle file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9853.html">CVE-2014-9853</cve>
<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/984408">SUSE bug 984408</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9854</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9854" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9854" source="CVE"/>
    <description>
    coders/tiff.c in ImageMagick allows remote attackers to cause a denial of service (application crash) via vectors related to the "identification of image."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9854.html">CVE-2014-9854</cve>
<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/984184">SUSE bug 984184</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9907</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9907" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9907" source="CVE"/>
    <description>
    coders/dds.c in ImageMagick allows remote attackers to cause a denial of service via a crafted DDS file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9907.html">CVE-2014-9907</cve>
<bugzilla href="https://bugzilla.suse.com/1000714">SUSE bug 1000714</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1074610">SUSE bug 1074610</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202227" comment="ImageMagick-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209108" comment="libMagickCore1-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209109" comment="libMagickCore1-32bit-6.4.3.6-7.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9911</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9911" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9911" source="CVE"/>
    <description>
    Stack-based buffer overflow in the ures_getByKeyWithFallback function in common/uresbund.cpp in International Components for Unicode (ICU) before 54.1 for C/C++ allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted uloc_getDisplayName call.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9911.html">CVE-2014-9911</cve>
<bugzilla href="https://bugzilla.suse.com/1012224">SUSE bug 1012224</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1012232">SUSE bug 1012232</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202736" comment="icu-4.0-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209357" comment="libicu-4.0-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202737" comment="libicu-32bit-4.0-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209358" comment="libicu-doc-4.0-46 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9912</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9912" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9912" source="CVE"/>
    <description>
    The get_icu_disp_value_src_php function in ext/intl/locale/locale_methods.c in PHP before 5.3.29, 5.4.x before 5.4.30, and 5.5.x before 5.5.14 does not properly restrict calls to the ICU uresbund.cpp component, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a locale_get_display_name call with a long first argument.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9912.html">CVE-2014-9912</cve>
<bugzilla href="https://bugzilla.suse.com/1012224">SUSE bug 1012224</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1012232">SUSE bug 1012232</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210400" comment="apache2-mod_php53-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203304" comment="php53-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210401" comment="php53-bcmath-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210402" comment="php53-bz2-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210403" comment="php53-calendar-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210404" comment="php53-ctype-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210405" comment="php53-curl-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210406" comment="php53-dba-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210407" comment="php53-dom-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210408" comment="php53-exif-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210409" comment="php53-fastcgi-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210410" comment="php53-fileinfo-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210411" comment="php53-ftp-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210412" comment="php53-gd-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210413" comment="php53-gettext-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210414" comment="php53-gmp-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210415" comment="php53-iconv-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210416" comment="php53-intl-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210417" comment="php53-json-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210418" comment="php53-ldap-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210419" comment="php53-mbstring-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210420" comment="php53-mcrypt-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210421" comment="php53-mysql-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210422" comment="php53-odbc-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210423" comment="php53-openssl-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210424" comment="php53-pcntl-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210425" comment="php53-pdo-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210426" comment="php53-pear-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210427" comment="php53-pgsql-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210428" comment="php53-pspell-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210429" comment="php53-shmop-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210430" comment="php53-snmp-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210431" comment="php53-soap-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210432" comment="php53-suhosin-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210433" comment="php53-sysvmsg-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210434" comment="php53-sysvsem-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210435" comment="php53-sysvshm-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210436" comment="php53-tokenizer-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210437" comment="php53-wddx-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210438" comment="php53-xmlreader-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210439" comment="php53-xmlrpc-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210440" comment="php53-xmlwriter-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210441" comment="php53-xsl-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210442" comment="php53-zip-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210443" comment="php53-zlib-5.3.17-94 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9913</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9913" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9913" source="CVE"/>
    <description>
    Buffer overflow in the list_files function in list.c in Info-Zip UnZip 6.0 allows remote attackers to cause a denial of service (crash) via vectors related to the compression method.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9913.html">CVE-2014-9913</cve>
<bugzilla href="https://bugzilla.suse.com/1013993">SUSE bug 1013993</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210860" comment="unzip-6.00-11.17 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9922</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2014-9922" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9922" source="CVE"/>
    <description>
    The eCryptfs subsystem in the Linux kernel before 3.18 allows local users to gain privileges via a large filesystem stack that includes an overlayfs layer, related to fs/ecryptfs/main.c and fs/overlayfs/super.c.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9922.html">CVE-2014-9922</cve>
<bugzilla href="https://bugzilla.suse.com/1032340">SUSE bug 1032340</bugzilla>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:20150138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0138</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0138" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0138" source="CVE"/>
    <description>
    GSKit in IBM Tivoli Directory Server (ITDS) 6.0 before 6.0.0.73-ISS-ITDS-IF0073, 6.1 before 6.1.0.66-ISS-ITDS-IF0066, 6.2 before 6.2.0.42-ISS-ITDS-IF0042, and 6.3 before 6.3.0.35-ISS-ITDS-IF0035 and IBM Security Directory Server (ISDS) 6.3.1 before 6.3.1.9-ISS-ISDS-IF0009 does not properly restrict TLS state transitions, which makes it easier for remote attackers to conduct cipher-downgrade attacks to EXPORT_RSA ciphers via crafted TLS traffic, related to the "FREAK" issue, a different vulnerability than CVE-2015-0204.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0138.html">CVE-2015-0138</cve>
<bugzilla href="https://bugzilla.suse.com/952088">SUSE bug 952088</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215572" comment="java-1_6_0-ibm-1.6.0_sr16.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215573" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215574" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215575" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215577" comment="java-1_7_0-ibm-1.7.0_sr9.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215578" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215579" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215580" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.0-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215572" comment="java-1_6_0-ibm-1.6.0_sr16.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264522" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215573" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215574" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215575" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215577" comment="java-1_7_0-ibm-1.7.0_sr9.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215578" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215579" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215580" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.0-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0192</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0192" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0192" source="CVE"/>
    <description>
    Unspecified vulnerability in IBM Java 8 before SR1, 7 R1 before SR2 FP11, 7 before SR9, 6 R1 before SR8 FP4, 6 before SR16 FP4, and 5.0 before SR16 FP10 allows remote attackers to gain privileges via unknown vectors related to the Java Virtual Machine.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0192.html">CVE-2015-0192</cve>
<bugzilla href="https://bugzilla.suse.com/952088">SUSE bug 952088</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215572" comment="java-1_6_0-ibm-1.6.0_sr16.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215573" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215574" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215575" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201732" comment="java-1_7_0-ibm-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207724" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207725" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207726" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215572" comment="java-1_6_0-ibm-1.6.0_sr16.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264522" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215573" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215574" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215575" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201732" comment="java-1_7_0-ibm-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207724" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207725" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207726" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0204</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0204" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0204" source="CVE"/>
    <description>
    The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the "FREAK" issue.  NOTE: the scope of this CVE is only client code based on OpenSSL, not EXPORT_RSA issues associated with servers or other TLS implementations.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0204.html">CVE-2015-0204</cve>
<bugzilla href="https://bugzilla.suse.com/912014">SUSE bug 912014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/920339">SUSE bug 920339</bugzilla>
<bugzilla href="https://bugzilla.suse.com/920482">SUSE bug 920482</bugzilla>
<bugzilla href="https://bugzilla.suse.com/920484">SUSE bug 920484</bugzilla>
<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
<bugzilla href="https://bugzilla.suse.com/936787">SUSE bug 936787</bugzilla>
<bugzilla href="https://bugzilla.suse.com/952088">SUSE bug 952088</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215291" comment="libopenssl0_9_8-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215292" comment="libopenssl0_9_8-32bit-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215295" comment="libopenssl0_9_8-hmac-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215296" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215293" comment="openssl-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215297" comment="openssl-doc-0.9.8j-0.68 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207716" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200254" comment="libmysql55client18-x86-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215291" comment="libopenssl0_9_8-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215292" comment="libopenssl0_9_8-32bit-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215295" comment="libopenssl0_9_8-hmac-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215296" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264506" comment="libopenssl0_9_8-x86-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215293" comment="openssl-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215297" comment="openssl-doc-0.9.8j-0.68 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0205</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0205" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0205" source="CVE"/>
    <description>
    The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k accepts client authentication with a Diffie-Hellman (DH) certificate without requiring a CertificateVerify message, which allows remote attackers to obtain access without knowledge of a private key via crafted TLS Handshake Protocol traffic to a server that recognizes a Certification Authority with DH support.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0205.html">CVE-2015-0205</cve>
<bugzilla href="https://bugzilla.suse.com/912293">SUSE bug 912293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/920339">SUSE bug 920339</bugzilla>
<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200254" comment="libmysql55client18-x86-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215291" comment="libopenssl0_9_8-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215292" comment="libopenssl0_9_8-32bit-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215295" comment="libopenssl0_9_8-hmac-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215296" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264506" comment="libopenssl0_9_8-x86-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215293" comment="openssl-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215297" comment="openssl-doc-0.9.8j-0.68 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215291" comment="libopenssl0_9_8-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215292" comment="libopenssl0_9_8-32bit-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215295" comment="libopenssl0_9_8-hmac-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215296" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215293" comment="openssl-0.9.8j-0.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215297" comment="openssl-doc-0.9.8j-0.68 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0206</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0206" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0206" source="CVE"/>
    <description>
    Memory leak in the dtls1_buffer_record function in d1_pkt.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate records for the next epoch, leading to failure of replay detection.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0206.html">CVE-2015-0206</cve>
<bugzilla href="https://bugzilla.suse.com/912292">SUSE bug 912292</bugzilla>
<bugzilla href="https://bugzilla.suse.com/920339">SUSE bug 920339</bugzilla>
<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200254" comment="libmysql55client18-x86-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0209" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0209" source="CVE"/>
    <description>
    Use-after-free vulnerability in the d2i_ECPrivateKey function in crypto/ec/ec_asn1.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a malformed Elliptic Curve (EC) private-key file that is improperly handled during import.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0209.html">CVE-2015-0209</cve>
<bugzilla href="https://bugzilla.suse.com/919648">SUSE bug 919648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200261" comment="libopenssl0_9_8-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200262" comment="libopenssl0_9_8-32bit-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200263" comment="libopenssl0_9_8-hmac-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200264" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200265" comment="libopenssl0_9_8-x86-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200266" comment="openssl-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200267" comment="openssl-doc-0.9.8j-0.70 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200261" comment="libopenssl0_9_8-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200262" comment="libopenssl0_9_8-32bit-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200263" comment="libopenssl0_9_8-hmac-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200264" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200266" comment="openssl-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200267" comment="openssl-doc-0.9.8j-0.70 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0210</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0210" source="CVE"/>
    <description>
    wpa_supplicant 2.0-16 does not properly check certificate subject name, which allows remote attackers to cause a man-in-the-middle attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0210.html">CVE-2015-0210</cve>
<bugzilla href="https://bugzilla.suse.com/915323">SUSE bug 915323</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009223436" comment="wpa_supplicant-0.7.1-6.18.6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0231</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0231" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0231" source="CVE"/>
    <description>
    Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate numerical keys within the serialized properties of an object.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-8142.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0231.html">CVE-2015-0231</cve>
<bugzilla href="https://bugzilla.suse.com/910659">SUSE bug 910659</bugzilla>
<bugzilla href="https://bugzilla.suse.com/924972">SUSE bug 924972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215493" comment="apache2-mod_php53-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215494" comment="php53-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215495" comment="php53-bcmath-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215496" comment="php53-bz2-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215497" comment="php53-calendar-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215498" comment="php53-ctype-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215499" comment="php53-curl-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215500" comment="php53-dba-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215501" comment="php53-dom-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215502" comment="php53-exif-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215503" comment="php53-fastcgi-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215504" comment="php53-fileinfo-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215505" comment="php53-ftp-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215506" comment="php53-gd-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215507" comment="php53-gettext-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215508" comment="php53-gmp-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215509" comment="php53-iconv-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215510" comment="php53-intl-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215511" comment="php53-json-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215512" comment="php53-ldap-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215513" comment="php53-mbstring-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215514" comment="php53-mcrypt-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215515" comment="php53-mysql-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215516" comment="php53-odbc-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215517" comment="php53-openssl-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215518" comment="php53-pcntl-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215519" comment="php53-pdo-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215520" comment="php53-pear-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215521" comment="php53-pgsql-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215522" comment="php53-pspell-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215523" comment="php53-shmop-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215524" comment="php53-snmp-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215525" comment="php53-soap-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215526" comment="php53-suhosin-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215527" comment="php53-sysvmsg-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215528" comment="php53-sysvsem-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215529" comment="php53-sysvshm-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215530" comment="php53-tokenizer-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215531" comment="php53-wddx-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215532" comment="php53-xmlreader-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215533" comment="php53-xmlrpc-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215534" comment="php53-xmlwriter-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215535" comment="php53-xsl-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215536" comment="php53-zip-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215537" comment="php53-zlib-5.3.17-0.33 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0232</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0232" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0232" source="CVE"/>
    <description>
    The exif_process_unicode function in ext/exif/exif.c in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5 allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized pointer free and application crash) via crafted EXIF data in a JPEG image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0232.html">CVE-2015-0232</cve>
<bugzilla href="https://bugzilla.suse.com/914690">SUSE bug 914690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215493" comment="apache2-mod_php53-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215494" comment="php53-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215495" comment="php53-bcmath-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215496" comment="php53-bz2-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215497" comment="php53-calendar-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215498" comment="php53-ctype-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215499" comment="php53-curl-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215500" comment="php53-dba-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215501" comment="php53-dom-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215502" comment="php53-exif-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215503" comment="php53-fastcgi-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215504" comment="php53-fileinfo-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215505" comment="php53-ftp-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215506" comment="php53-gd-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215507" comment="php53-gettext-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215508" comment="php53-gmp-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215509" comment="php53-iconv-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215510" comment="php53-intl-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215511" comment="php53-json-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215512" comment="php53-ldap-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215513" comment="php53-mbstring-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215514" comment="php53-mcrypt-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215515" comment="php53-mysql-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215516" comment="php53-odbc-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215517" comment="php53-openssl-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215518" comment="php53-pcntl-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215519" comment="php53-pdo-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215520" comment="php53-pear-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215521" comment="php53-pgsql-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215522" comment="php53-pspell-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215523" comment="php53-shmop-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215524" comment="php53-snmp-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215525" comment="php53-soap-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215526" comment="php53-suhosin-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215527" comment="php53-sysvmsg-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215528" comment="php53-sysvsem-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215529" comment="php53-sysvshm-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215530" comment="php53-tokenizer-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215531" comment="php53-wddx-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215532" comment="php53-xmlreader-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215533" comment="php53-xmlrpc-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215534" comment="php53-xmlwriter-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215535" comment="php53-xsl-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215536" comment="php53-zip-5.3.17-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215537" comment="php53-zlib-5.3.17-0.33 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0235</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0235" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235" source="CVE"/>
    <description>
    Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0235.html">CVE-2015-0235</cve>
<bugzilla href="https://bugzilla.suse.com/844309">SUSE bug 844309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/913646">SUSE bug 913646</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915263">SUSE bug 915263</bugzilla>
<bugzilla href="https://bugzilla.suse.com/917876">SUSE bug 917876</bugzilla>
<bugzilla href="https://bugzilla.suse.com/920055">SUSE bug 920055</bugzilla>
<bugzilla href="https://bugzilla.suse.com/949238">SUSE bug 949238</bugzilla>
<bugzilla href="https://bugzilla.suse.com/954983">SUSE bug 954983</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215586" comment="glibc-2.11.3-17.74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215587" comment="glibc-32bit-2.11.3-17.74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215588" comment="glibc-devel-2.11.3-17.74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215589" comment="glibc-devel-32bit-2.11.3-17.74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215618" comment="glibc-html-2.11.3-17.74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215590" comment="glibc-i18ndata-2.11.3-17.74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215619" comment="glibc-info-2.11.3-17.74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215591" comment="glibc-locale-2.11.3-17.74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215592" comment="glibc-locale-32bit-2.11.3-17.74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215620" comment="glibc-profile-2.11.3-17.74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215621" comment="glibc-profile-32bit-2.11.3-17.74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215593" comment="nscd-2.11.3-17.74 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215586" comment="glibc-2.11.3-17.74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215587" comment="glibc-32bit-2.11.3-17.74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215588" comment="glibc-devel-2.11.3-17.74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215589" comment="glibc-devel-32bit-2.11.3-17.74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215618" comment="glibc-html-2.11.3-17.74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215590" comment="glibc-i18ndata-2.11.3-17.74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215619" comment="glibc-info-2.11.3-17.74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215591" comment="glibc-locale-2.11.3-17.74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215592" comment="glibc-locale-32bit-2.11.3-17.74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264524" comment="glibc-locale-x86-2.11.3-17.74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215620" comment="glibc-profile-2.11.3-17.74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215621" comment="glibc-profile-32bit-2.11.3-17.74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264525" comment="glibc-profile-x86-2.11.3-17.74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264526" comment="glibc-x86-2.11.3-17.74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215593" comment="nscd-2.11.3-17.74 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0239</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0239" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0239" source="CVE"/>
    <description>
    The em_sysenter function in arch/x86/kvm/emulate.c in the Linux kernel before 3.18.5, when the guest OS lacks SYSENTER MSR initialization, allows guest OS users to gain guest OS privileges or cause a denial of service (guest OS crash) by triggering use of a 16-bit code segment for emulation of a SYSENTER instruction.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0239.html">CVE-2015-0239</cve>
<bugzilla href="https://bugzilla.suse.com/994618">SUSE bug 994618</bugzilla>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:20150240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0240</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0240" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0240" source="CVE"/>
    <description>
    The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0240.html">CVE-2015-0240</cve>
<bugzilla href="https://bugzilla.suse.com/917376">SUSE bug 917376</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209025" comment="ldapsmb-1.34b-12.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204804" comment="libldb1-3.6.3-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204806" comment="libsmbclient0-3.6.3-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204807" comment="libsmbclient0-32bit-3.6.3-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204808" comment="libtalloc2-3.6.3-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204809" comment="libtalloc2-32bit-3.6.3-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204810" comment="libtdb1-3.6.3-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204811" comment="libtdb1-32bit-3.6.3-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204812" comment="libtevent0-3.6.3-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204813" comment="libtevent0-32bit-3.6.3-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204814" comment="libwbclient0-3.6.3-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204815" comment="libwbclient0-32bit-3.6.3-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204816" comment="samba-3.6.3-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204817" comment="samba-32bit-3.6.3-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204818" comment="samba-client-3.6.3-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204819" comment="samba-client-32bit-3.6.3-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204820" comment="samba-doc-3.6.3-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204821" comment="samba-krb-printing-3.6.3-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204822" comment="samba-winbind-3.6.3-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204823" comment="samba-winbind-32bit-3.6.3-0.56 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209025" comment="ldapsmb-1.34b-12.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204804" comment="libldb1-3.6.3-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204806" comment="libsmbclient0-3.6.3-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204807" comment="libsmbclient0-32bit-3.6.3-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209026" comment="libsmbclient0-x86-3.6.3-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204808" comment="libtalloc2-3.6.3-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204809" comment="libtalloc2-32bit-3.6.3-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209027" comment="libtalloc2-x86-3.6.3-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204810" comment="libtdb1-3.6.3-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204811" comment="libtdb1-32bit-3.6.3-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209028" comment="libtdb1-x86-3.6.3-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204812" comment="libtevent0-3.6.3-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204813" comment="libtevent0-32bit-3.6.3-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204814" comment="libwbclient0-3.6.3-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204815" comment="libwbclient0-32bit-3.6.3-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209029" comment="libwbclient0-x86-3.6.3-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204816" comment="samba-3.6.3-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204817" comment="samba-32bit-3.6.3-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204818" comment="samba-client-3.6.3-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204819" comment="samba-client-32bit-3.6.3-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209030" comment="samba-client-x86-3.6.3-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204820" comment="samba-doc-3.6.3-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204821" comment="samba-krb-printing-3.6.3-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204822" comment="samba-winbind-3.6.3-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204823" comment="samba-winbind-32bit-3.6.3-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209031" comment="samba-winbind-x86-3.6.3-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209032" comment="samba-x86-3.6.3-0.56 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0241</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0241" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0241" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0241.html">CVE-2015-0241</cve>
<bugzilla href="https://bugzilla.suse.com/916953">SUSE bug 916953</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204759" comment="libecpg6-9.1.15-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204760" comment="libpq5-9.1.15-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204761" comment="libpq5-32bit-9.1.15-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204762" comment="postgresql91-9.1.15-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208944" comment="postgresql91-contrib-9.1.15-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204763" comment="postgresql91-docs-9.1.15-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208945" comment="postgresql91-server-9.1.15-0.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0243</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0243" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0243" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0243.html">CVE-2015-0243</cve>
<bugzilla href="https://bugzilla.suse.com/916953">SUSE bug 916953</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204759" comment="libecpg6-9.1.15-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204760" comment="libpq5-9.1.15-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204761" comment="libpq5-32bit-9.1.15-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204762" comment="postgresql91-9.1.15-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208944" comment="postgresql91-contrib-9.1.15-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204763" comment="postgresql91-docs-9.1.15-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208945" comment="postgresql91-server-9.1.15-0.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0244</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0244" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0244" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0244.html">CVE-2015-0244</cve>
<bugzilla href="https://bugzilla.suse.com/916953">SUSE bug 916953</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204759" comment="libecpg6-9.1.15-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204760" comment="libpq5-9.1.15-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204761" comment="libpq5-32bit-9.1.15-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204762" comment="postgresql91-9.1.15-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208944" comment="postgresql91-contrib-9.1.15-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204763" comment="postgresql91-docs-9.1.15-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208945" comment="postgresql91-server-9.1.15-0.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0247</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0247" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0247" source="CVE"/>
    <description>
    Heap-based buffer overflow in openfs.c in the libext2fs library in e2fsprogs before 1.42.12 allows local users to execute arbitrary code via crafted block group descriptor data in a filesystem image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0247.html">CVE-2015-0247</cve>
<bugzilla href="https://bugzilla.suse.com/1123790">SUSE bug 1123790</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915402">SUSE bug 915402</bugzilla>
<bugzilla href="https://bugzilla.suse.com/918346">SUSE bug 918346</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204275" comment="e2fsprogs-1.41.9-2.10.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204276" comment="libblkid1-2.19.1-6.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204277" comment="libblkid1-32bit-2.19.1-6.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204278" comment="libcom_err2-1.41.9-2.10.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204279" comment="libcom_err2-32bit-1.41.9-2.10.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204280" comment="libext2fs2-1.41.9-2.10.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204281" comment="libuuid1-2.19.1-6.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204282" comment="libuuid1-32bit-2.19.1-6.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204283" comment="uuid-runtime-2.19.1-6.62 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204275" comment="e2fsprogs-1.41.9-2.10.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204276" comment="libblkid1-2.19.1-6.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204277" comment="libblkid1-32bit-2.19.1-6.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208459" comment="libblkid1-x86-2.19.1-6.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204278" comment="libcom_err2-1.41.9-2.10.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204279" comment="libcom_err2-32bit-1.41.9-2.10.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208460" comment="libcom_err2-x86-1.41.9-2.10.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204280" comment="libext2fs2-1.41.9-2.10.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204281" comment="libuuid1-2.19.1-6.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204282" comment="libuuid1-32bit-2.19.1-6.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208461" comment="libuuid1-x86-2.19.1-6.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204283" comment="uuid-runtime-2.19.1-6.62 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0254</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0254" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0254" source="CVE"/>
    <description>
    Apache Standard Taglibs before 1.2.3 allows remote attackers to execute arbitrary code or conduct external XML entity (XXE) attacks via a crafted XSLT extension in a (1) &lt;x:parse&gt; or (2) &lt;x:transform&gt; JSTL XML tag.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0254.html">CVE-2015-0254</cve>
<bugzilla href="https://bugzilla.suse.com/920813">SUSE bug 920813</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209365" comment="jakarta-taglibs-standard-1.1.1-234.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209366" comment="jakarta-taglibs-standard-javadoc-1.1.1-234.31 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0255</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0255" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0255" source="CVE"/>
    <description>
    X.Org Server (aka xserver and xorg-server) before 1.16.3 and 1.17.x before 1.17.1 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (crash) via a crafted string length value in a XkbSetGeometry request.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0255.html">CVE-2015-0255</cve>
<bugzilla href="https://bugzilla.suse.com/915810">SUSE bug 915810</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215642" comment="xorg-x11-Xvnc-7.4-27.103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215643" comment="xorg-x11-server-7.4-27.103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215644" comment="xorg-x11-server-extra-7.4-27.103 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0261</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0261" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0261" source="CVE"/>
    <description>
    Integer signedness error in the mobility_opt_print function in the IPv6 mobility printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (out-of-bounds read and crash) or possibly execute arbitrary code via a negative length value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0261.html">CVE-2015-0261</cve>
<bugzilla href="https://bugzilla.suse.com/922220">SUSE bug 922220</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200456" comment="tcpdump-3.9.8-1.27 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0272</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0272" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0272" source="CVE"/>
    <description>
    GNOME NetworkManager allows remote attackers to cause a denial of service (IPv6 traffic disruption) via a crafted MTU value in an IPv6 Router Advertisement (RA) message, a different vulnerability than CVE-2015-8215.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0272.html">CVE-2015-0272</cve>
<bugzilla href="https://bugzilla.suse.com/944296">SUSE bug 944296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/951638">SUSE bug 951638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/955354">SUSE bug 955354</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204546" comment="kernel-bigsmp-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208678" comment="kernel-bigsmp-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204547" comment="kernel-bigsmp-devel-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204548" comment="kernel-default-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204549" comment="kernel-default-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204550" comment="kernel-default-devel-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208679" comment="kernel-default-man-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208680" comment="kernel-ec2-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208681" comment="kernel-ec2-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208682" comment="kernel-ec2-devel-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204552" comment="kernel-pae-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204553" comment="kernel-pae-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204554" comment="kernel-pae-devel-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208683" comment="kernel-ppc64-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208684" comment="kernel-ppc64-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208685" comment="kernel-ppc64-devel-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204556" comment="kernel-source-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204557" comment="kernel-syms-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204558" comment="kernel-trace-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208686" comment="kernel-trace-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204559" comment="kernel-trace-devel-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204560" comment="kernel-xen-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204561" comment="kernel-xen-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204562" comment="kernel-xen-devel-3.0.101-0.47.71 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0282</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0282" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0282" source="CVE"/>
    <description>
    GnuTLS before 3.1.0 does not verify that the RSA PKCS #1 signature algorithm matches the signature algorithm in the certificate, which allows remote attackers to conduct downgrade attacks via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0282.html">CVE-2015-0282</cve>
<bugzilla href="https://bugzilla.suse.com/919938">SUSE bug 919938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/921684">SUSE bug 921684</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200061" comment="gnutls-2.4.1-24.39.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200062" comment="libgnutls-extra26-2.4.1-24.39.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200063" comment="libgnutls26-2.4.1-24.39.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200064" comment="libgnutls26-32bit-2.4.1-24.39.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200065" comment="libgnutls26-x86-2.4.1-24.39.55 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200061" comment="gnutls-2.4.1-24.39.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200062" comment="libgnutls-extra26-2.4.1-24.39.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200063" comment="libgnutls26-2.4.1-24.39.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200064" comment="libgnutls26-32bit-2.4.1-24.39.55 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0286</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0286" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0286" source="CVE"/>
    <description>
    The ASN1_TYPE_cmp function in crypto/asn1/a_type.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly perform boolean-type comparisons, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted X.509 certificate to an endpoint that uses the certificate-verification feature.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0286.html">CVE-2015-0286</cve>
<bugzilla href="https://bugzilla.suse.com/919648">SUSE bug 919648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/922496">SUSE bug 922496</bugzilla>
<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200261" comment="libopenssl0_9_8-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200262" comment="libopenssl0_9_8-32bit-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200263" comment="libopenssl0_9_8-hmac-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200264" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200266" comment="openssl-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200267" comment="openssl-doc-0.9.8j-0.70 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208786" comment="libmysql55client18-x86-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200261" comment="libopenssl0_9_8-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200262" comment="libopenssl0_9_8-32bit-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200263" comment="libopenssl0_9_8-hmac-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200264" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200265" comment="libopenssl0_9_8-x86-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200266" comment="openssl-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200267" comment="openssl-doc-0.9.8j-0.70 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0287</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0287" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0287" source="CVE"/>
    <description>
    The ASN1_item_ex_d2i function in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not reinitialize CHOICE and ADB data structures, which might allow attackers to cause a denial of service (invalid write operation and memory corruption) by leveraging an application that relies on ASN.1 structure reuse.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0287.html">CVE-2015-0287</cve>
<bugzilla href="https://bugzilla.suse.com/919648">SUSE bug 919648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/922499">SUSE bug 922499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
<bugzilla href="https://bugzilla.suse.com/937492">SUSE bug 937492</bugzilla>
<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
<bugzilla href="https://bugzilla.suse.com/940369">SUSE bug 940369</bugzilla>
<bugzilla href="https://bugzilla.suse.com/968888">SUSE bug 968888</bugzilla>
<bugzilla href="https://bugzilla.suse.com/991722">SUSE bug 991722</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200261" comment="libopenssl0_9_8-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200262" comment="libopenssl0_9_8-32bit-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200263" comment="libopenssl0_9_8-hmac-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200264" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200265" comment="libopenssl0_9_8-x86-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200266" comment="openssl-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200267" comment="openssl-doc-0.9.8j-0.70 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200261" comment="libopenssl0_9_8-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200262" comment="libopenssl0_9_8-32bit-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200263" comment="libopenssl0_9_8-hmac-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200264" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200266" comment="openssl-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200267" comment="openssl-doc-0.9.8j-0.70 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0288</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0288" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0288" source="CVE"/>
    <description>
    The X509_to_X509_REQ function in crypto/x509/x509_req.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow attackers to cause a denial of service (NULL pointer dereference and application crash) via an invalid certificate key.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0288.html">CVE-2015-0288</cve>
<bugzilla href="https://bugzilla.suse.com/919648">SUSE bug 919648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/920236">SUSE bug 920236</bugzilla>
<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200261" comment="libopenssl0_9_8-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200262" comment="libopenssl0_9_8-32bit-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200263" comment="libopenssl0_9_8-hmac-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200264" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200266" comment="openssl-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200267" comment="openssl-doc-0.9.8j-0.70 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208786" comment="libmysql55client18-x86-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200261" comment="libopenssl0_9_8-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200262" comment="libopenssl0_9_8-32bit-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200263" comment="libopenssl0_9_8-hmac-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200264" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200265" comment="libopenssl0_9_8-x86-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200266" comment="openssl-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200267" comment="openssl-doc-0.9.8j-0.70 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0289</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0289" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0289" source="CVE"/>
    <description>
    The PKCS#7 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly handle a lack of outer ContentInfo, which allows attackers to cause a denial of service (NULL pointer dereference and application crash) by leveraging an application that processes arbitrary PKCS#7 data and providing malformed data with ASN.1 encoding, related to crypto/pkcs7/pk7_doit.c and crypto/pkcs7/pk7_lib.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0289.html">CVE-2015-0289</cve>
<bugzilla href="https://bugzilla.suse.com/919648">SUSE bug 919648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/922500">SUSE bug 922500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200261" comment="libopenssl0_9_8-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200262" comment="libopenssl0_9_8-32bit-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200263" comment="libopenssl0_9_8-hmac-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200264" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200265" comment="libopenssl0_9_8-x86-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200266" comment="openssl-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200267" comment="openssl-doc-0.9.8j-0.70 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200261" comment="libopenssl0_9_8-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200262" comment="libopenssl0_9_8-32bit-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200263" comment="libopenssl0_9_8-hmac-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200264" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200266" comment="openssl-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200267" comment="openssl-doc-0.9.8j-0.70 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0292</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0292" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0292" source="CVE"/>
    <description>
    Integer underflow in the EVP_DecodeUpdate function in crypto/evp/encode.c in the base64-decoding implementation in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted base64 data that triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0292.html">CVE-2015-0292</cve>
<bugzilla href="https://bugzilla.suse.com/919648">SUSE bug 919648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/922501">SUSE bug 922501</bugzilla>
<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200261" comment="libopenssl0_9_8-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200262" comment="libopenssl0_9_8-32bit-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200263" comment="libopenssl0_9_8-hmac-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200264" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200265" comment="libopenssl0_9_8-x86-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200266" comment="openssl-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200267" comment="openssl-doc-0.9.8j-0.70 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200261" comment="libopenssl0_9_8-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200262" comment="libopenssl0_9_8-32bit-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200263" comment="libopenssl0_9_8-hmac-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200264" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200266" comment="openssl-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200267" comment="openssl-doc-0.9.8j-0.70 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0293</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0293" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0293" source="CVE"/>
    <description>
    The SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (s2_lib.c assertion failure and daemon exit) via a crafted CLIENT-MASTER-KEY message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0293.html">CVE-2015-0293</cve>
<bugzilla href="https://bugzilla.suse.com/919648">SUSE bug 919648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/922488">SUSE bug 922488</bugzilla>
<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
<bugzilla href="https://bugzilla.suse.com/968044">SUSE bug 968044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/968051">SUSE bug 968051</bugzilla>
<bugzilla href="https://bugzilla.suse.com/968053">SUSE bug 968053</bugzilla>
<bugzilla href="https://bugzilla.suse.com/986238">SUSE bug 986238</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200261" comment="libopenssl0_9_8-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200262" comment="libopenssl0_9_8-32bit-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200263" comment="libopenssl0_9_8-hmac-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200264" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200265" comment="libopenssl0_9_8-x86-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200266" comment="openssl-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200267" comment="openssl-doc-0.9.8j-0.70 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200261" comment="libopenssl0_9_8-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200262" comment="libopenssl0_9_8-32bit-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200263" comment="libopenssl0_9_8-hmac-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200264" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200266" comment="openssl-0.9.8j-0.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200267" comment="openssl-doc-0.9.8j-0.70 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0294</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0294" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0294" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0294.html">CVE-2015-0294</cve>
<bugzilla href="https://bugzilla.suse.com/919938">SUSE bug 919938</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200061" comment="gnutls-2.4.1-24.39.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200062" comment="libgnutls-extra26-2.4.1-24.39.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200063" comment="libgnutls26-2.4.1-24.39.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200064" comment="libgnutls26-32bit-2.4.1-24.39.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200065" comment="libgnutls26-x86-2.4.1-24.39.55 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200061" comment="gnutls-2.4.1-24.39.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200062" comment="libgnutls-extra26-2.4.1-24.39.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200063" comment="libgnutls26-2.4.1-24.39.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200064" comment="libgnutls26-32bit-2.4.1-24.39.55 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0295</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0295" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0295" source="CVE"/>
    <description>
    The BMP decoder in QtGui in QT before 5.5 does not properly calculate the masks used to extract the color components, which allows remote attackers to cause a denial of service (divide-by-zero and crash) via a crafted BMP file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0295.html">CVE-2015-0295</cve>
<bugzilla href="https://bugzilla.suse.com/921999">SUSE bug 921999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/927806">SUSE bug 927806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/927807">SUSE bug 927807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/927808">SUSE bug 927808</bugzilla>
<bugzilla href="https://bugzilla.suse.com/936523">SUSE bug 936523</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200172" comment="libQtWebKit4-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200173" comment="libQtWebKit4-32bit-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200174" comment="libQtWebKit4-x86-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200175" comment="libqt4-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200176" comment="libqt4-32bit-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200177" comment="libqt4-qt3support-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200178" comment="libqt4-qt3support-32bit-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200179" comment="libqt4-qt3support-x86-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200180" comment="libqt4-sql-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200181" comment="libqt4-sql-32bit-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200182" comment="libqt4-sql-mysql-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200183" comment="libqt4-sql-sqlite-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200184" comment="libqt4-sql-x86-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200185" comment="libqt4-x11-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200186" comment="libqt4-x11-32bit-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200187" comment="libqt4-x11-x86-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200188" comment="libqt4-x86-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200189" comment="qt4-x11-tools-4.6.3-5.34 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200172" comment="libQtWebKit4-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200173" comment="libQtWebKit4-32bit-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200175" comment="libqt4-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200176" comment="libqt4-32bit-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200177" comment="libqt4-qt3support-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200178" comment="libqt4-qt3support-32bit-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200180" comment="libqt4-sql-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200181" comment="libqt4-sql-32bit-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200182" comment="libqt4-sql-mysql-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200183" comment="libqt4-sql-sqlite-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200185" comment="libqt4-x11-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200186" comment="libqt4-x11-32bit-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200189" comment="qt4-x11-tools-4.6.3-5.34 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0374</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0374" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0374" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Security : Privileges : Foreign Key.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0374.html">CVE-2015-0374</cve>
<bugzilla href="https://bugzilla.suse.com/914058">SUSE bug 914058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915911">SUSE bug 915911</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264365" comment="libmysql55client18-x86-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0381</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0381" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0381" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0382.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0381.html">CVE-2015-0381</cve>
<bugzilla href="https://bugzilla.suse.com/914058">SUSE bug 914058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915911">SUSE bug 915911</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264365" comment="libmysql55client18-x86-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0382</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0382" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0382" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0381.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0382.html">CVE-2015-0382</cve>
<bugzilla href="https://bugzilla.suse.com/914058">SUSE bug 914058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915911">SUSE bug 915911</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264365" comment="libmysql55client18-x86-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0385</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0385" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0385" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.21 and earlier allows remote authenticated users to affect availability via unknown vectors related to Pluggable Auth.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0385.html">CVE-2015-0385</cve>
<bugzilla href="https://bugzilla.suse.com/914058">SUSE bug 914058</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264365" comment="libmysql55client18-x86-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0391</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0391" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0391" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect availability via vectors related to DDL.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0391.html">CVE-2015-0391</cve>
<bugzilla href="https://bugzilla.suse.com/914058">SUSE bug 914058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264365" comment="libmysql55client18-x86-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0405</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0405" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0405" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.22 and earlier allows remote authenticated users to affect availability via unknown vectors related to XA.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0405.html">CVE-2015-0405</cve>
<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200254" comment="libmysql55client18-x86-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0409</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0409" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0409" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.21 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0409.html">CVE-2015-0409</cve>
<bugzilla href="https://bugzilla.suse.com/914058">SUSE bug 914058</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264365" comment="libmysql55client18-x86-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0411</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0411" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0411" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier, and 5.6.21 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Server : Security : Encryption.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0411.html">CVE-2015-0411</cve>
<bugzilla href="https://bugzilla.suse.com/914058">SUSE bug 914058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915911">SUSE bug 915911</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264365" comment="libmysql55client18-x86-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0423" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0423" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.22 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0423.html">CVE-2015-0423</cve>
<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200254" comment="libmysql55client18-x86-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0432</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0432" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0432" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier allows remote authenticated users to affect availability via vectors related to Server : InnoDB : DDL : Foreign Key.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0432.html">CVE-2015-0432</cve>
<bugzilla href="https://bugzilla.suse.com/914058">SUSE bug 914058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915911">SUSE bug 915911</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009213402" comment="libmysql55client18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213403" comment="libmysql55client18-32bit-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264365" comment="libmysql55client18-x86-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213404" comment="libmysql55client_r18-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213406" comment="mysql-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213407" comment="mysql-client-5.5.42-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009213408" comment="mysql-tools-5.5.42-0.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0433</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0433" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote authenticated users to affect availability via vectors related to InnoDB : DML.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0433.html">CVE-2015-0433</cve>
<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
<bugzilla href="https://bugzilla.suse.com/936409">SUSE bug 936409</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200254" comment="libmysql55client18-x86-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0438</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0438" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0438" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.22 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Partition.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0438.html">CVE-2015-0438</cve>
<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200254" comment="libmysql55client18-x86-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0439</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0439" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0439" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.22 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB, a different vulnerability than CVE-2015-4756.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0439.html">CVE-2015-0439</cve>
<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200254" comment="libmysql55client18-x86-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0441</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0441" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Security : Encryption.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0441.html">CVE-2015-0441</cve>
<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
<bugzilla href="https://bugzilla.suse.com/936409">SUSE bug 936409</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200254" comment="libmysql55client18-x86-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0458</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0458" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0458" source="CVE"/>
    <description>
    Unspecified vulnerability in in Oracle Java SE 6u91, 7u76, and 8u40 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0458.html">CVE-2015-0458</cve>
<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207716" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0459</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0459" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0459" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40, and JavaFX 2.2.76, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2015-0491.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0459.html">CVE-2015-0459</cve>
<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
<bugzilla href="https://bugzilla.suse.com/932310">SUSE bug 932310</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207716" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0469</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0469" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0469.html">CVE-2015-0469</cve>
<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
<bugzilla href="https://bugzilla.suse.com/932310">SUSE bug 932310</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207716" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0477</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0477" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40 allows remote attackers to affect integrity via unknown vectors related to Beans.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0477.html">CVE-2015-0477</cve>
<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207716" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0478</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0478" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40, and JRockit R28.3.5, allows remote attackers to affect confidentiality via vectors related to JCE.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0478.html">CVE-2015-0478</cve>
<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
<bugzilla href="https://bugzilla.suse.com/944456">SUSE bug 944456</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207716" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0480</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0480" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40 allows remote attackers to affect integrity and availability via unknown vectors related to Tools.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0480.html">CVE-2015-0480</cve>
<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207716" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0488</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0488" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40, and JRockit R28.3.5, allows remote attackers to affect availability via vectors related to JSSE.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0488.html">CVE-2015-0488</cve>
<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207716" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0491</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0491" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0491" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40, and Java FX 2.2.76, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2015-0459.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0491.html">CVE-2015-0491</cve>
<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
<bugzilla href="https://bugzilla.suse.com/932310">SUSE bug 932310</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207716" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0498</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0498" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0498" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to Replication.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0498.html">CVE-2015-0498</cve>
<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200254" comment="libmysql55client18-x86-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0499</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0499" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Federated.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0499.html">CVE-2015-0499</cve>
<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
<bugzilla href="https://bugzilla.suse.com/936408">SUSE bug 936408</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200254" comment="libmysql55client18-x86-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0500</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0500" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0500" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.23 and earlier allows remote authenticated users to affect availability via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0500.html">CVE-2015-0500</cve>
<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200254" comment="libmysql55client18-x86-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0501</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0501" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Compiling.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0501.html">CVE-2015-0501</cve>
<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
<bugzilla href="https://bugzilla.suse.com/936408">SUSE bug 936408</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200254" comment="libmysql55client18-x86-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0503</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0503" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0503" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Partition.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0503.html">CVE-2015-0503</cve>
<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200254" comment="libmysql55client18-x86-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0505" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via vectors related to DDL.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0505.html">CVE-2015-0505</cve>
<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
<bugzilla href="https://bugzilla.suse.com/936408">SUSE bug 936408</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200254" comment="libmysql55client18-x86-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0506</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0506" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0506" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB, a different vulnerability than CVE-2015-0508.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0506.html">CVE-2015-0506</cve>
<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200254" comment="libmysql55client18-x86-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0507</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0507" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0507" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Memcached.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0507.html">CVE-2015-0507</cve>
<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200254" comment="libmysql55client18-x86-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0508</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0508" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0508" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB, a different vulnerability than CVE-2015-0506.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0508.html">CVE-2015-0508</cve>
<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200254" comment="libmysql55client18-x86-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0511" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : SP.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0511.html">CVE-2015-0511</cve>
<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200254" comment="libmysql55client18-x86-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0559</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0559" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0559" source="CVE"/>
    <description>
    Multiple use-after-free vulnerabilities in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allow remote attackers to cause a denial of service (application crash) via a crafted packet, related to the use of packet-scope memory instead of pinfo-scope memory.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0559.html">CVE-2015-0559</cve>
<bugzilla href="https://bugzilla.suse.com/912365">SUSE bug 912365</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215667" comment="wireshark-1.10.12-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0560</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0560" source="CVE"/>
    <description>
    The dissect_wccp2r1_address_table_info function in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 does not initialize certain data structures, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0560.html">CVE-2015-0560</cve>
<bugzilla href="https://bugzilla.suse.com/912365">SUSE bug 912365</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215667" comment="wireshark-1.10.12-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0561</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0561" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0561" source="CVE"/>
    <description>
    asn1/lpp/lpp.cnf in the LPP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 does not validate a certain index value, which allows remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0561.html">CVE-2015-0561</cve>
<bugzilla href="https://bugzilla.suse.com/912368">SUSE bug 912368</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215667" comment="wireshark-1.10.12-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0562</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0562" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0562" source="CVE"/>
    <description>
    Multiple use-after-free vulnerabilities in epan/dissectors/packet-dec-dnart.c in the DEC DNA Routing Protocol dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allow remote attackers to cause a denial of service (application crash) via a crafted packet, related to the use of packet-scope memory instead of pinfo-scope memory.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0562.html">CVE-2015-0562</cve>
<bugzilla href="https://bugzilla.suse.com/912369">SUSE bug 912369</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215667" comment="wireshark-1.10.12-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0563</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0563" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0563" source="CVE"/>
    <description>
    epan/dissectors/packet-smtp.c in the SMTP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 uses an incorrect length value for certain string-append operations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0563.html">CVE-2015-0563</cve>
<bugzilla href="https://bugzilla.suse.com/912370">SUSE bug 912370</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215667" comment="wireshark-1.10.12-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0564</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0564" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0564" source="CVE"/>
    <description>
    Buffer underflow in the ssl_decrypt_record function in epan/dissectors/packet-ssl-utils.c in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allows remote attackers to cause a denial of service (application crash) via a crafted packet that is improperly handled during decryption of an SSL session.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0564.html">CVE-2015-0564</cve>
<bugzilla href="https://bugzilla.suse.com/912372">SUSE bug 912372</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215667" comment="wireshark-1.10.12-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0777</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0777" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0777" source="CVE"/>
    <description>
    drivers/xen/usbback/usbback.c in linux-2.6.18-xen-3.4.0 (aka the Xen 3.4.x support patches for the Linux kernel 2.6.18), as used in the Linux kernel 2.6.x and 3.x in SUSE Linux distributions, allows guest OS users to obtain sensitive information from uninitialized locations in host OS kernel memory via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0777.html">CVE-2015-0777</cve>
<bugzilla href="https://bugzilla.suse.com/917830">SUSE bug 917830</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204527" comment="kernel-bigsmp-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208622" comment="kernel-bigsmp-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204528" comment="kernel-bigsmp-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204529" comment="kernel-default-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204530" comment="kernel-default-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204531" comment="kernel-default-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208623" comment="kernel-default-man-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208624" comment="kernel-ec2-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208625" comment="kernel-ec2-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208626" comment="kernel-ec2-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204533" comment="kernel-pae-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204534" comment="kernel-pae-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204535" comment="kernel-pae-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208627" comment="kernel-ppc64-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208628" comment="kernel-ppc64-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208629" comment="kernel-ppc64-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204537" comment="kernel-source-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204538" comment="kernel-syms-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204539" comment="kernel-trace-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208630" comment="kernel-trace-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204540" comment="kernel-trace-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204541" comment="kernel-xen-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204542" comment="kernel-xen-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204543" comment="kernel-xen-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215421" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264390" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0797</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0797" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797" source="CVE"/>
    <description>
    GStreamer before 1.4.5, as used in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 on Linux, allows remote attackers to cause a denial of service (buffer over-read and application crash) or possibly execute arbitrary code via crafted H.264 video data in an m4v file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0797.html">CVE-2015-0797</cve>
<bugzilla href="https://bugzilla.suse.com/927559">SUSE bug 927559</bugzilla>
<bugzilla href="https://bugzilla.suse.com/930622">SUSE bug 930622</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199838" comment="MozillaFirefox-31.7.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199839" comment="MozillaFirefox-translations-31.7.0esr-0.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0801</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0801" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801" source="CVE"/>
    <description>
    Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 allow remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code with chrome privileges via vectors involving anchor navigation, a similar issue to CVE-2015-0818.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0801.html">CVE-2015-0801</cve>
<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/925401">SUSE bug 925401</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204201" comment="MozillaFirefox-31.6.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204202" comment="MozillaFirefox-translations-31.6.0esr-0.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0807</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0807" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807" source="CVE"/>
    <description>
    The navigator.sendBeacon implementation in Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 processes HTTP 30x status codes for redirects after a preflight request has occurred, which allows remote attackers to bypass intended CORS access-control checks and conduct cross-site request forgery (CSRF) attacks via a crafted web site, a similar issue to CVE-2014-8638.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0807.html">CVE-2015-0807</cve>
<bugzilla href="https://bugzilla.suse.com/913068">SUSE bug 913068</bugzilla>
<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/925398">SUSE bug 925398</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204201" comment="MozillaFirefox-31.6.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204202" comment="MozillaFirefox-translations-31.6.0esr-0.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0813</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0813" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813" source="CVE"/>
    <description>
    Use-after-free vulnerability in the AppendElements function in Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 on Linux, when the Fluendo MP3 plugin for GStreamer is used, allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted MP3 file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0813.html">CVE-2015-0813</cve>
<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/925393">SUSE bug 925393</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204201" comment="MozillaFirefox-31.6.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204202" comment="MozillaFirefox-translations-31.6.0esr-0.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0814" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0814" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 37.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0814.html">CVE-2015-0814</cve>
<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/925392">SUSE bug 925392</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204201" comment="MozillaFirefox-31.6.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204202" comment="MozillaFirefox-translations-31.6.0esr-0.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0816</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0816" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816" source="CVE"/>
    <description>
    Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 do not properly restrict resource: URLs, which makes it easier for remote attackers to execute arbitrary JavaScript code with chrome privileges by leveraging the ability to bypass the Same Origin Policy, as demonstrated by the resource: URL associated with PDF.js.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0816.html">CVE-2015-0816</cve>
<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/925395">SUSE bug 925395</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204201" comment="MozillaFirefox-31.6.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204202" comment="MozillaFirefox-translations-31.6.0esr-0.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0817</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0817" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0817" source="CVE"/>
    <description>
    The asm.js implementation in Mozilla Firefox before 36.0.3, Firefox ESR 31.x before 31.5.2, and SeaMonkey before 2.33.1 does not properly determine the cases in which bounds checking may be safely skipped during JIT compilation and heap access, which allows remote attackers to read or write to unintended memory locations, and consequently execute arbitrary code, via crafted JavaScript.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0817.html">CVE-2015-0817</cve>
<bugzilla href="https://bugzilla.suse.com/923495">SUSE bug 923495</bugzilla>
<bugzilla href="https://bugzilla.suse.com/923534">SUSE bug 923534</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204326" comment="MozillaFirefox-31.5.3esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204327" comment="MozillaFirefox-translations-31.5.3esr-0.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0818</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0818" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0818" source="CVE"/>
    <description>
    Mozilla Firefox before 36.0.4, Firefox ESR 31.x before 31.5.3, and SeaMonkey before 2.33.1 allow remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code with chrome privileges via vectors involving SVG hash navigation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0818.html">CVE-2015-0818</cve>
<bugzilla href="https://bugzilla.suse.com/923495">SUSE bug 923495</bugzilla>
<bugzilla href="https://bugzilla.suse.com/923534">SUSE bug 923534</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204326" comment="MozillaFirefox-31.5.3esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204327" comment="MozillaFirefox-translations-31.5.3esr-0.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0822</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0822" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822" source="CVE"/>
    <description>
    The Form Autocompletion feature in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allows remote attackers to read arbitrary files via crafted JavaScript code.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0822.html">CVE-2015-0822</cve>
<bugzilla href="https://bugzilla.suse.com/910669">SUSE bug 910669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/917597">SUSE bug 917597</bugzilla>
<bugzilla href="https://bugzilla.suse.com/923534">SUSE bug 923534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/924515">SUSE bug 924515</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215669" comment="MozillaFirefox-31.5.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215670" comment="MozillaFirefox-translations-31.5.0esr-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0827</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0827" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827" source="CVE"/>
    <description>
    Heap-based buffer overflow in the mozilla::gfx::CopyRect function in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allows remote attackers to obtain sensitive information from uninitialized process memory via a malformed SVG graphic.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0827.html">CVE-2015-0827</cve>
<bugzilla href="https://bugzilla.suse.com/910669">SUSE bug 910669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/917597">SUSE bug 917597</bugzilla>
<bugzilla href="https://bugzilla.suse.com/923534">SUSE bug 923534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/924515">SUSE bug 924515</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215669" comment="MozillaFirefox-31.5.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215670" comment="MozillaFirefox-translations-31.5.0esr-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0831</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0831" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozilla::dom::IndexedDB::IDBObjectStore::CreateIndex function in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via crafted content that is improperly handled during IndexedDB index creation.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0831.html">CVE-2015-0831</cve>
<bugzilla href="https://bugzilla.suse.com/910669">SUSE bug 910669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/917597">SUSE bug 917597</bugzilla>
<bugzilla href="https://bugzilla.suse.com/923534">SUSE bug 923534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/924515">SUSE bug 924515</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215669" comment="MozillaFirefox-31.5.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215670" comment="MozillaFirefox-translations-31.5.0esr-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0836.html">CVE-2015-0836</cve>
<bugzilla href="https://bugzilla.suse.com/910669">SUSE bug 910669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/917597">SUSE bug 917597</bugzilla>
<bugzilla href="https://bugzilla.suse.com/923534">SUSE bug 923534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/924515">SUSE bug 924515</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215669" comment="MozillaFirefox-31.5.0esr-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215670" comment="MozillaFirefox-translations-31.5.0esr-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0837</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-0837" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0837" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0837.html">CVE-2015-0837</cve>
<bugzilla href="https://bugzilla.suse.com/920057">SUSE bug 920057</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201780" comment="libgcrypt-1.5.0-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204612" comment="libgcrypt11-1.5.0-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204613" comment="libgcrypt11-32bit-1.5.0-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208740" comment="libgcrypt11-x86-1.5.0-0.19 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201780" comment="libgcrypt-1.5.0-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204612" comment="libgcrypt11-1.5.0-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204613" comment="libgcrypt11-32bit-1.5.0-0.19 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1283</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-1283" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1283" source="CVE"/>
    <description>
    Multiple integer overflows in the XML_GetBuffer function in Expat through 2.1.0, as used in Google Chrome before 44.0.2403.89 and other products, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted XML data, a related issue to CVE-2015-2716.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1283.html">CVE-2015-1283</cve>
<bugzilla href="https://bugzilla.suse.com/1034050">SUSE bug 1034050</bugzilla>
<bugzilla href="https://bugzilla.suse.com/939077">SUSE bug 939077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/979441">SUSE bug 979441</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980391">SUSE bug 980391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/983985">SUSE bug 983985</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202509" comment="expat-2.0.1-88.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209227" comment="libexpat1-2.0.1-88.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209228" comment="libexpat1-32bit-2.0.1-88.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1335</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-1335" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1335" source="CVE"/>
    <description>
    lxc-start in lxc before 1.0.8 and 1.1.x before 1.1.4 allows local container administrators to escape AppArmor confinement via a symlink attack on a (1) mount target or (2) bind mount source.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1335.html">CVE-2015-1335</cve>
<bugzilla href="https://bugzilla.suse.com/946744">SUSE bug 946744</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201913" comment="lxc-0.8.0-0.25 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1338</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-1338" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1338" source="CVE"/>
    <description>
    kernel_crashdump in Apport before 2.19 allows local users to cause a denial of service (disk consumption) or possibly gain privileges via a (1) symlink or (2) hard link attack on /var/crash/vmcore.log.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1338.html">CVE-2015-1338</cve>
<bugzilla href="https://bugzilla.suse.com/1049352">SUSE bug 1049352</bugzilla>
<bugzilla href="https://bugzilla.suse.com/947731">SUSE bug 947731</bugzilla>
<bugzilla href="https://bugzilla.suse.com/952246">SUSE bug 952246</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209163" comment="apport-0.114-12.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209164" comment="apport-crashdb-sle-0.114-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209165" comment="apport-gtk-0.114-12.8.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1349</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-1349" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1349" source="CVE"/>
    <description>
    named in ISC BIND 9.7.0 through 9.9.6 before 9.9.6-P2 and 9.10.x before 9.10.1-P2, when DNSSEC validation and the managed-keys feature are enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit, or daemon crash) by triggering an incorrect trust-anchor management scenario in which no key is ready for use.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1349.html">CVE-2015-1349</cve>
<bugzilla href="https://bugzilla.suse.com/918330">SUSE bug 918330</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215677" comment="bind-9.9.6P1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215678" comment="bind-chrootenv-9.9.6P1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215679" comment="bind-doc-9.9.6P1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215674" comment="bind-libs-9.9.6P1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215675" comment="bind-libs-32bit-9.9.6P1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215676" comment="bind-utils-9.9.6P1-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215677" comment="bind-9.9.6P1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215678" comment="bind-chrootenv-9.9.6P1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215679" comment="bind-doc-9.9.6P1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215674" comment="bind-libs-9.9.6P1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215675" comment="bind-libs-32bit-9.9.6P1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264527" comment="bind-libs-x86-9.9.6P1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215676" comment="bind-utils-9.9.6P1-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1350</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-1350" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1350" source="CVE"/>
    <description>
    The VFS subsystem in the Linux kernel 3.x provides an incomplete set of requirements for setattr operations that underspecifies removing extended privilege attributes, which allows local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1350.html">CVE-2015-1350</cve>
<bugzilla href="https://bugzilla.suse.com/1025354">SUSE bug 1025354</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1052256">SUSE bug 1052256</bugzilla>
<bugzilla href="https://bugzilla.suse.com/914939">SUSE bug 914939</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208770" comment="kernel-default-man-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205650" comment="kernel-pae-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205651" comment="kernel-pae-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205652" comment="kernel-pae-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1419</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-1419" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1419" source="CVE"/>
    <description>
    Unspecified vulnerability in vsftpd 3.0.2 and earlier allows remote attackers to bypass access restrictions via unknown vectors, related to deny_file parsing.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1419.html">CVE-2015-1419</cve>
<bugzilla href="https://bugzilla.suse.com/900326">SUSE bug 900326</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915522">SUSE bug 915522</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209044" comment="vsftpd-2.0.7-4.29 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1420</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-1420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1420" source="CVE"/>
    <description>
    Race condition in the handle_to_path function in fs/fhandle.c in the Linux kernel through 3.19.1 allows local users to bypass intended size restrictions and trigger read operations on additional memory locations by changing the handle_bytes value of a file handle during the execution of this function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1420.html">CVE-2015-1420</cve>
<bugzilla href="https://bugzilla.suse.com/915517">SUSE bug 915517</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204527" comment="kernel-bigsmp-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208622" comment="kernel-bigsmp-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204528" comment="kernel-bigsmp-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204529" comment="kernel-default-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204530" comment="kernel-default-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204531" comment="kernel-default-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208623" comment="kernel-default-man-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208624" comment="kernel-ec2-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208625" comment="kernel-ec2-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208626" comment="kernel-ec2-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204533" comment="kernel-pae-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204534" comment="kernel-pae-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204535" comment="kernel-pae-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208627" comment="kernel-ppc64-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208628" comment="kernel-ppc64-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208629" comment="kernel-ppc64-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204537" comment="kernel-source-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204538" comment="kernel-syms-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204539" comment="kernel-trace-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208630" comment="kernel-trace-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204540" comment="kernel-trace-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204541" comment="kernel-xen-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204542" comment="kernel-xen-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204543" comment="kernel-xen-devel-3.0.101-0.47.67 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1421</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-1421" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1421" source="CVE"/>
    <description>
    Use-after-free vulnerability in the sctp_assoc_update function in net/sctp/associola.c in the Linux kernel before 3.18.8 allows remote attackers to cause a denial of service (slab corruption and panic) or possibly have unspecified other impact by triggering an INIT collision that leads to improper handling of shared-key data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1421.html">CVE-2015-1421</cve>
<bugzilla href="https://bugzilla.suse.com/915577">SUSE bug 915577</bugzilla>
<bugzilla href="https://bugzilla.suse.com/922004">SUSE bug 922004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/939261">SUSE bug 939261</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215410" comment="kernel-default-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215411" comment="kernel-default-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215412" comment="kernel-default-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264515" comment="kernel-default-man-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215451" comment="kernel-ec2-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215452" comment="kernel-ec2-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215453" comment="kernel-ec2-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264508" comment="kernel-pae-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264509" comment="kernel-pae-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264510" comment="kernel-pae-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264516" comment="kernel-ppc64-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264517" comment="kernel-ppc64-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264518" comment="kernel-ppc64-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215414" comment="kernel-source-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215415" comment="kernel-syms-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215454" comment="kernel-trace-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215455" comment="kernel-trace-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215416" comment="kernel-trace-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215417" comment="kernel-xen-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215418" comment="kernel-xen-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215419" comment="kernel-xen-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215421" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264390" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1461</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-1461" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1461" source="CVE"/>
    <description>
    ClamAV before 0.98.6 allows remote attackers to have unspecified impact via a crafted (1) Yoda's crypter or (2) mew packer file, related to a "heap out of bounds condition."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1461.html">CVE-2015-1461</cve>
<bugzilla href="https://bugzilla.suse.com/1040662">SUSE bug 1040662</bugzilla>
<bugzilla href="https://bugzilla.suse.com/916217">SUSE bug 916217</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215566" comment="clamav-0.98.6-0.6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1462</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-1462" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1462" source="CVE"/>
    <description>
    ClamAV before 0.98.6 allows remote attackers to have unspecified impact via a crafted upx packer file, related to a "heap out of bounds condition."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1462.html">CVE-2015-1462</cve>
<bugzilla href="https://bugzilla.suse.com/1040662">SUSE bug 1040662</bugzilla>
<bugzilla href="https://bugzilla.suse.com/916214">SUSE bug 916214</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215566" comment="clamav-0.98.6-0.6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1463</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-1463" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1463" source="CVE"/>
    <description>
    ClamAV before 0.98.6 allows remote attackers to cause a denial of service (crash) via a crafted petite packer file, related to an "incorrect compiler optimization."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1463.html">CVE-2015-1463</cve>
<bugzilla href="https://bugzilla.suse.com/1040662">SUSE bug 1040662</bugzilla>
<bugzilla href="https://bugzilla.suse.com/916215">SUSE bug 916215</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215566" comment="clamav-0.98.6-0.6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1472</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-1472" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472" source="CVE"/>
    <description>
    The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during memory allocation, which allows context-dependent attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a long line containing wide characters that are improperly handled in a wscanf call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1472.html">CVE-2015-1472</cve>
<bugzilla href="https://bugzilla.suse.com/916222">SUSE bug 916222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/920341">SUSE bug 920341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/922243">SUSE bug 922243</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214849" comment="glibc-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214850" comment="glibc-32bit-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214851" comment="glibc-devel-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214852" comment="glibc-devel-32bit-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214881" comment="glibc-html-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214853" comment="glibc-i18ndata-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214882" comment="glibc-info-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214854" comment="glibc-locale-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214855" comment="glibc-locale-32bit-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214883" comment="glibc-profile-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214884" comment="glibc-profile-32bit-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214856" comment="nscd-2.11.3-17.82 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214849" comment="glibc-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214850" comment="glibc-32bit-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214851" comment="glibc-devel-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214852" comment="glibc-devel-32bit-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214881" comment="glibc-html-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214853" comment="glibc-i18ndata-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214882" comment="glibc-info-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214854" comment="glibc-locale-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214855" comment="glibc-locale-32bit-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264500" comment="glibc-locale-x86-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214883" comment="glibc-profile-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214884" comment="glibc-profile-32bit-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264501" comment="glibc-profile-x86-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264502" comment="glibc-x86-2.11.3-17.82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214856" comment="nscd-2.11.3-17.82 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1545</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-1545" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1545" source="CVE"/>
    <description>
    The deref_parseCtrl function in servers/slapd/overlays/deref.c in OpenLDAP 2.4.13 through 2.4.40 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an empty attribute list in a deref control in a search request.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1545.html">CVE-2015-1545</cve>
<bugzilla href="https://bugzilla.suse.com/846389">SUSE bug 846389</bugzilla>
<bugzilla href="https://bugzilla.suse.com/905959">SUSE bug 905959</bugzilla>
<bugzilla href="https://bugzilla.suse.com/916897">SUSE bug 916897</bugzilla>
<bugzilla href="https://bugzilla.suse.com/916914">SUSE bug 916914</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199952" comment="compat-libldap-2_3-0-2.3.37-2.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199953" comment="libldap-2_4-2-2.4.26-0.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199954" comment="libldap-2_4-2-32bit-2.4.26-0.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199955" comment="libldap-2_4-2-x86-2.4.26-0.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199956" comment="openldap2-2.4.26-0.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199957" comment="openldap2-back-meta-2.4.26-0.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199958" comment="openldap2-client-2.4.26-0.30 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199952" comment="compat-libldap-2_3-0-2.3.37-2.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199953" comment="libldap-2_4-2-2.4.26-0.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199954" comment="libldap-2_4-2-32bit-2.4.26-0.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199956" comment="openldap2-2.4.26-0.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199957" comment="openldap2-back-meta-2.4.26-0.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199958" comment="openldap2-client-2.4.26-0.30 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1546</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-1546" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1546" source="CVE"/>
    <description>
    Double free vulnerability in the get_vrFilter function in servers/slapd/filter.c in OpenLDAP 2.4.40 allows remote attackers to cause a denial of service (crash) via a crafted search query with a matched values control.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1546.html">CVE-2015-1546</cve>
<bugzilla href="https://bugzilla.suse.com/916914">SUSE bug 916914</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199952" comment="compat-libldap-2_3-0-2.3.37-2.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199953" comment="libldap-2_4-2-2.4.26-0.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199954" comment="libldap-2_4-2-32bit-2.4.26-0.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199955" comment="libldap-2_4-2-x86-2.4.26-0.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199956" comment="openldap2-2.4.26-0.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199957" comment="openldap2-back-meta-2.4.26-0.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199958" comment="openldap2-client-2.4.26-0.30 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199952" comment="compat-libldap-2_3-0-2.3.37-2.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199953" comment="libldap-2_4-2-2.4.26-0.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199954" comment="libldap-2_4-2-32bit-2.4.26-0.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199956" comment="openldap2-2.4.26-0.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199957" comment="openldap2-back-meta-2.4.26-0.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199958" comment="openldap2-client-2.4.26-0.30 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1572</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-1572" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1572" source="CVE"/>
    <description>
    Heap-based buffer overflow in closefs.c in the libext2fs library in e2fsprogs before 1.42.12 allows local users to execute arbitrary code by causing a crafted block group descriptor to be marked as dirty. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-0247.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1572.html">CVE-2015-1572</cve>
<bugzilla href="https://bugzilla.suse.com/1123790">SUSE bug 1123790</bugzilla>
<bugzilla href="https://bugzilla.suse.com/915402">SUSE bug 915402</bugzilla>
<bugzilla href="https://bugzilla.suse.com/918346">SUSE bug 918346</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204275" comment="e2fsprogs-1.41.9-2.10.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204276" comment="libblkid1-2.19.1-6.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204277" comment="libblkid1-32bit-2.19.1-6.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204278" comment="libcom_err2-1.41.9-2.10.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204279" comment="libcom_err2-32bit-1.41.9-2.10.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204280" comment="libext2fs2-1.41.9-2.10.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204281" comment="libuuid1-2.19.1-6.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204282" comment="libuuid1-32bit-2.19.1-6.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204283" comment="uuid-runtime-2.19.1-6.62 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204275" comment="e2fsprogs-1.41.9-2.10.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204276" comment="libblkid1-2.19.1-6.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204277" comment="libblkid1-32bit-2.19.1-6.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208459" comment="libblkid1-x86-2.19.1-6.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204278" comment="libcom_err2-1.41.9-2.10.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204279" comment="libcom_err2-32bit-1.41.9-2.10.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208460" comment="libcom_err2-x86-1.41.9-2.10.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204280" comment="libext2fs2-1.41.9-2.10.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204281" comment="libuuid1-2.19.1-6.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204282" comment="libuuid1-32bit-2.19.1-6.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208461" comment="libuuid1-x86-2.19.1-6.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204283" comment="uuid-runtime-2.19.1-6.62 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1593</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2015-1593" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1593" source="CVE"/>
    <description>
    The stack randomization feature in the Linux kernel before 3.19.1 on 64-bit platforms uses incorrect data types for the results of bitwise left-shift operations, which makes it easier for attackers to bypass the ASLR protection mechanism by predicting the address of the top of the stack, related to the randomize_stack_top function in fs/binfmt_elf.c and the stack_maxrandom_size function in arch/x86/mm/mmap.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1593.html">CVE-2015-1593</cve>
<bugzilla href="https://bugzilla.suse.com/1044934">SUSE bug 1044934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/917839">SUSE bug 917839</bugzilla>
<bugzilla href="https://bugzilla.suse.com/942663">SUSE bug 942663</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009214952" comment="kernel-bigsmp-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214953" comment="kernel-bigsmp-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214910" comment="kernel-bigsmp-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214911" comment="kernel-default-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214912" comment="kernel-default-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214913" comment="kernel-default-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264496" comment="kernel-default-man-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214954" comment="kernel-ec2-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214955" comment="kernel-ec2-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214956" comment="kernel-ec2-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264488" comment="kernel-pae-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264489" comment="kernel-pae-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264490" comment="kernel-pae-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264497" comment="kernel-ppc64-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264498" comment="kernel-ppc64-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264499" comment="kernel-ppc64-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214915" comment="kernel-source-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214916" comment="kernel-syms-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214957" comment="kernel-trace-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214958" comment="kernel-trace-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214917" comment="kernel-trace-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214918" comment="kernel-xen-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214919" comment="kernel-xen-base-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214920" comment="kernel-xen-devel-3.0.101-0.47.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009214922" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.50-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264492" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.50-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1606</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-1606" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1606" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1606.html">CVE-2015-1606</cve>
<bugzilla href="https://bugzilla.suse.com/918089">SUSE bug 918089</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204430" comment="gpg2-2.0.9-25.33.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204431" comment="gpg2-lang-2.0.9-25.33.41 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1607</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-1607" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1607" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1607.html">CVE-2015-1607</cve>
<bugzilla href="https://bugzilla.suse.com/918090">SUSE bug 918090</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204430" comment="gpg2-2.0.9-25.33.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204431" comment="gpg2-lang-2.0.9-25.33.41 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1609</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-1609" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1609" source="CVE"/>
    <description>
    MongoDB before 2.4.13 and 2.6.x before 2.6.8 allows remote attackers to cause a denial of service via a crafted UTF-8 string in a BSON request.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1609.html">CVE-2015-1609</cve>
<bugzilla href="https://bugzilla.suse.com/921759">SUSE bug 921759</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215792" comment="mongodb-2.4.3-0.25 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1779</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-1779" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1779" source="CVE"/>
    <description>
    The VNC websocket frame decoder in QEMU allows remote attackers to cause a denial of service (memory and CPU consumption) via a large (1) websocket payload or (2) HTTP headers section.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1779.html">CVE-2015-1779</cve>
<bugzilla href="https://bugzilla.suse.com/924018">SUSE bug 924018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962632">SUSE bug 962632</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215681" comment="kvm-1.4.2-0.22.25 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1781</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-1781" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781" source="CVE"/>
    <description>
    Buffer overflow in the gethostbyname_r and other unspecified NSS functions in the GNU C Library (aka glibc or libc6) before 2.22 allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response, which triggers a call with a misaligned buffer.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1781.html">CVE-2015-1781</cve>
<bugzilla href="https://bugzilla.suse.com/927080">SUSE bug 927080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/939211">SUSE bug 939211</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201690" comment="glibc-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204409" comment="glibc-32bit-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204410" comment="glibc-devel-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204411" comment="glibc-devel-32bit-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201691" comment="glibc-html-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204412" comment="glibc-i18ndata-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201692" comment="glibc-info-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204413" comment="glibc-locale-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204414" comment="glibc-locale-32bit-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208504" comment="glibc-locale-x86-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208505" comment="glibc-profile-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208506" comment="glibc-profile-32bit-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208507" comment="glibc-profile-x86-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208508" comment="glibc-x86-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204415" comment="nscd-2.11.3-17.87 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201690" comment="glibc-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204409" comment="glibc-32bit-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204410" comment="glibc-devel-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204411" comment="glibc-devel-32bit-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201691" comment="glibc-html-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204412" comment="glibc-i18ndata-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201692" comment="glibc-info-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204413" comment="glibc-locale-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204414" comment="glibc-locale-32bit-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208505" comment="glibc-profile-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208506" comment="glibc-profile-32bit-2.11.3-17.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204415" comment="nscd-2.11.3-17.87 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1782</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-1782" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1782" source="CVE"/>
    <description>
    The kex_agree_methods function in libssh2 before 1.5.0 allows remote servers to cause a denial of service (crash) or have other unspecified impact via crafted length values in an SSH_MSG_KEXINIT packet.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1782.html">CVE-2015-1782</cve>
<bugzilla href="https://bugzilla.suse.com/921070">SUSE bug 921070</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200309" comment="libssh2-1-1.2.9-4.2.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1788</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-1788" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1788" source="CVE"/>
    <description>
    The BN_GF2m_mod_inv function in crypto/bn/bn_gf2m.c in OpenSSL before 0.9.8s, 1.0.0 before 1.0.0e, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b does not properly handle ECParameters structures in which the curve is over a malformed binary polynomial field, which allows remote attackers to cause a denial of service (infinite loop) via a session that uses an Elliptic Curve algorithm, as demonstrated by an attack against a server that supports client authentication.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1788.html">CVE-2015-1788</cve>
<bugzilla href="https://bugzilla.suse.com/934487">SUSE bug 934487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938432">SUSE bug 938432</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215682" comment="libopenssl0_9_8-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215683" comment="libopenssl0_9_8-32bit-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215685" comment="libopenssl0_9_8-hmac-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215686" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215684" comment="openssl-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215687" comment="openssl-doc-0.9.8j-0.72 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215682" comment="libopenssl0_9_8-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215683" comment="libopenssl0_9_8-32bit-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215685" comment="libopenssl0_9_8-hmac-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215686" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264529" comment="libopenssl0_9_8-x86-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215684" comment="openssl-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215687" comment="openssl-doc-0.9.8j-0.72 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1789</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-1789" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789" source="CVE"/>
    <description>
    The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted length field in ASN1_TIME data, as demonstrated by an attack against a server that supports client authentication with a custom verification callback.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1789.html">CVE-2015-1789</cve>
<bugzilla href="https://bugzilla.suse.com/934489">SUSE bug 934489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938432">SUSE bug 938432</bugzilla>
<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215682" comment="libopenssl0_9_8-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215683" comment="libopenssl0_9_8-32bit-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215685" comment="libopenssl0_9_8-hmac-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215686" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215684" comment="openssl-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215687" comment="openssl-doc-0.9.8j-0.72 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208786" comment="libmysql55client18-x86-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215682" comment="libopenssl0_9_8-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215683" comment="libopenssl0_9_8-32bit-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215685" comment="libopenssl0_9_8-hmac-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215686" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264529" comment="libopenssl0_9_8-x86-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215684" comment="openssl-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215687" comment="openssl-doc-0.9.8j-0.72 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1790</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-1790" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790" source="CVE"/>
    <description>
    The PKCS7_dataDecodefunction in crypto/pkcs7/pk7_doit.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a PKCS#7 blob that uses ASN.1 encoding and lacks inner EncryptedContent data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1790.html">CVE-2015-1790</cve>
<bugzilla href="https://bugzilla.suse.com/934491">SUSE bug 934491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938432">SUSE bug 938432</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215682" comment="libopenssl0_9_8-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215683" comment="libopenssl0_9_8-32bit-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215685" comment="libopenssl0_9_8-hmac-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215686" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215684" comment="openssl-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215687" comment="openssl-doc-0.9.8j-0.72 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215682" comment="libopenssl0_9_8-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215683" comment="libopenssl0_9_8-32bit-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215685" comment="libopenssl0_9_8-hmac-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215686" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264529" comment="libopenssl0_9_8-x86-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215684" comment="openssl-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215687" comment="openssl-doc-0.9.8j-0.72 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1791</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-1791" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1791" source="CVE"/>
    <description>
    Race condition in the ssl3_get_new_session_ticket function in ssl/s3_clnt.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b, when used for a multi-threaded client, allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspecified other impact by providing a NewSessionTicket during an attempt to reuse a ticket that had been obtained earlier.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1791.html">CVE-2015-1791</cve>
<bugzilla href="https://bugzilla.suse.com/933911">SUSE bug 933911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/986238">SUSE bug 986238</bugzilla>
<bugzilla href="https://bugzilla.suse.com/989464">SUSE bug 989464</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215682" comment="libopenssl0_9_8-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215683" comment="libopenssl0_9_8-32bit-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215685" comment="libopenssl0_9_8-hmac-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215686" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215684" comment="openssl-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215687" comment="openssl-doc-0.9.8j-0.72 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215682" comment="libopenssl0_9_8-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215683" comment="libopenssl0_9_8-32bit-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215685" comment="libopenssl0_9_8-hmac-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215686" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264529" comment="libopenssl0_9_8-x86-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215684" comment="openssl-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215687" comment="openssl-doc-0.9.8j-0.72 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1792</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-1792" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1792" source="CVE"/>
    <description>
    The do_free_upto function in crypto/cms/cms_smime.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (infinite loop) via vectors that trigger a NULL value of a BIO data structure, as demonstrated by an unrecognized X.660 OID for a hash function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1792.html">CVE-2015-1792</cve>
<bugzilla href="https://bugzilla.suse.com/934493">SUSE bug 934493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
<bugzilla href="https://bugzilla.suse.com/986238">SUSE bug 986238</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215682" comment="libopenssl0_9_8-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215683" comment="libopenssl0_9_8-32bit-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215685" comment="libopenssl0_9_8-hmac-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215686" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215684" comment="openssl-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215687" comment="openssl-doc-0.9.8j-0.72 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215682" comment="libopenssl0_9_8-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215683" comment="libopenssl0_9_8-32bit-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215685" comment="libopenssl0_9_8-hmac-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215686" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264529" comment="libopenssl0_9_8-x86-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215684" comment="openssl-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215687" comment="openssl-doc-0.9.8j-0.72 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1793</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-1793" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1793" source="CVE"/>
    <description>
    The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certificate verifications via a valid leaf certificate.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1793.html">CVE-2015-1793</cve>
<bugzilla href="https://bugzilla.suse.com/936746">SUSE bug 936746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/937637">SUSE bug 937637</bugzilla>
<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208786" comment="libmysql55client18-x86-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1799</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-1799" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1799" source="CVE"/>
    <description>
    The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 3.x and 4.x before 4.2.8p2 performs state-variable updates upon receiving certain invalid packets, which makes it easier for man-in-the-middle attackers to cause a denial of service (synchronization loss) by spoofing the source IP address of a peer.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1799.html">CVE-2015-1799</cve>
<bugzilla href="https://bugzilla.suse.com/924202">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/927497">SUSE bug 927497</bugzilla>
<bugzilla href="https://bugzilla.suse.com/928321">SUSE bug 928321</bugzilla>
<bugzilla href="https://bugzilla.suse.com/943565">SUSE bug 943565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/957163">SUSE bug 957163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215688" comment="ntp-4.2.4p8-1.29.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215689" comment="ntp-doc-4.2.4p8-1.29.36 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1802</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-1802" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1802" source="CVE"/>
    <description>
    The bdfReadProperties function in bitmap/bdfread.c in X.Org libXfont before 1.4.9 and 1.5.x before 1.5.1 allows remote authenticated users to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a (1) negative or (2) large property count in a BDF font file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1802.html">CVE-2015-1802</cve>
<bugzilla href="https://bugzilla.suse.com/921978">SUSE bug 921978</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200509" comment="xorg-x11-libs-7.4-8.26.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200510" comment="xorg-x11-libs-32bit-7.4-8.26.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200511" comment="xorg-x11-libs-x86-7.4-8.26.44 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200509" comment="xorg-x11-libs-7.4-8.26.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200510" comment="xorg-x11-libs-32bit-7.4-8.26.44 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1803</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-1803" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1803" source="CVE"/>
    <description>
    The bdfReadCharacters function in bitmap/bdfread.c in X.Org libXfont before 1.4.9 and 1.5.x before 1.5.1 does not properly handle character bitmaps it cannot read, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) and possibly execute arbitrary code via a crafted BDF font file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1803.html">CVE-2015-1803</cve>
<bugzilla href="https://bugzilla.suse.com/921978">SUSE bug 921978</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200509" comment="xorg-x11-libs-7.4-8.26.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200510" comment="xorg-x11-libs-32bit-7.4-8.26.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200511" comment="xorg-x11-libs-x86-7.4-8.26.44 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200509" comment="xorg-x11-libs-7.4-8.26.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200510" comment="xorg-x11-libs-32bit-7.4-8.26.44 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1804</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-1804" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1804" source="CVE"/>
    <description>
    The bdfReadCharacters function in bitmap/bdfread.c in X.Org libXfont before 1.4.9 and 1.5.x before 1.5.1 does not properly perform type conversion for metrics values, which allows remote authenticated users to cause a denial of service (out-of-bounds memory access) and possibly execute arbitrary code via a crafted BDF font file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1804.html">CVE-2015-1804</cve>
<bugzilla href="https://bugzilla.suse.com/921978">SUSE bug 921978</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200509" comment="xorg-x11-libs-7.4-8.26.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200510" comment="xorg-x11-libs-32bit-7.4-8.26.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200511" comment="xorg-x11-libs-x86-7.4-8.26.44 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200509" comment="xorg-x11-libs-7.4-8.26.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200510" comment="xorg-x11-libs-32bit-7.4-8.26.44 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-1805" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1805" source="CVE"/>
    <description>
    The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in the Linux kernel before 3.16 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an "I/O vector array overrun."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1805.html">CVE-2015-1805</cve>
<bugzilla href="https://bugzilla.suse.com/917839">SUSE bug 917839</bugzilla>
<bugzilla href="https://bugzilla.suse.com/933429">SUSE bug 933429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/939270">SUSE bug 939270</bugzilla>
<bugzilla href="https://bugzilla.suse.com/964730">SUSE bug 964730</bugzilla>
<bugzilla href="https://bugzilla.suse.com/964732">SUSE bug 964732</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204527" comment="kernel-bigsmp-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208622" comment="kernel-bigsmp-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204528" comment="kernel-bigsmp-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204529" comment="kernel-default-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204530" comment="kernel-default-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204531" comment="kernel-default-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208623" comment="kernel-default-man-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208624" comment="kernel-ec2-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208625" comment="kernel-ec2-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208626" comment="kernel-ec2-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204533" comment="kernel-pae-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204534" comment="kernel-pae-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204535" comment="kernel-pae-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208627" comment="kernel-ppc64-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208628" comment="kernel-ppc64-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208629" comment="kernel-ppc64-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204537" comment="kernel-source-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204538" comment="kernel-syms-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204539" comment="kernel-trace-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208630" comment="kernel-trace-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204540" comment="kernel-trace-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204541" comment="kernel-xen-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204542" comment="kernel-xen-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204543" comment="kernel-xen-devel-3.0.101-0.47.67 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1819</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-1819" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1819" source="CVE"/>
    <description>
    The xmlreader in libxml allows remote attackers to cause a denial of service (memory consumption) via crafted XML data, related to an XML Entity Expansion (XEE) attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1819.html">CVE-2015-1819</cve>
<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/928193">SUSE bug 928193</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201905" comment="libxml2-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204668" comment="libxml2-32bit-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208763" comment="libxml2-doc-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204669" comment="libxml2-python-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208764" comment="libxml2-x86-2.7.6-0.34 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201905" comment="libxml2-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204668" comment="libxml2-32bit-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208763" comment="libxml2-doc-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204669" comment="libxml2-python-2.7.6-0.34 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1852</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-1852" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1852" source="CVE"/>
    <description>
    The s3_token middleware in OpenStack keystonemiddleware before 1.6.0 and python-keystoneclient before 1.4.0 disables certification verification when the "insecure" option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate, a different vulnerability than CVE-2014-7144.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1852.html">CVE-2015-1852</cve>
<bugzilla href="https://bugzilla.suse.com/928205">SUSE bug 928205</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215931" comment="python-glanceclient-0.15.0-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215932" comment="python-keystoneclient-1.0.0-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215933" comment="python-keystoneclient-doc-1.0.0-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215934" comment="python-keystonemiddleware-1.2.0-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215935" comment="python-novaclient-2.20.0-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215936" comment="python-novaclient-doc-2.20.0-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215937" comment="python-openstackclient-0.4.1-9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1855</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-1855" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1855" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1855.html">CVE-2015-1855</cve>
<bugzilla href="https://bugzilla.suse.com/926974">SUSE bug 926974</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203428" comment="ruby-1.8.7.p357-0.9.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203430" comment="ruby-doc-html-1.8.7.p357-0.9.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203434" comment="ruby-tk-1.8.7.p357-0.9.19 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1856</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-1856" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1856" source="CVE"/>
    <description>
    OpenStack Object Storage (Swift) before 2.3.0, when allow_version is configured, allows remote authenticated users to delete the latest version of an object by leveraging listing access to the x-versions-location container.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1856.html">CVE-2015-1856</cve>
<bugzilla href="https://bugzilla.suse.com/927793">SUSE bug 927793</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215911" comment="openstack-swift-2.1.0-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215912" comment="openstack-swift-account-2.1.0-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215913" comment="openstack-swift-container-2.1.0-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215914" comment="openstack-swift-doc-2.1.0-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215915" comment="openstack-swift-object-2.1.0-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215916" comment="openstack-swift-proxy-2.1.0-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215917" comment="python-swift-2.1.0-11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1858</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-1858" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1858" source="CVE"/>
    <description>
    Multiple buffer overflows in gui/image/qbmphandler.cpp in the QtBase module in Qt before 4.8.7 and 5.x before 5.4.2 allow remote attackers to cause a denial of service (segmentation fault and crash) and possibly execute arbitrary code via a crafted BMP image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1858.html">CVE-2015-1858</cve>
<bugzilla href="https://bugzilla.suse.com/921999">SUSE bug 921999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/927806">SUSE bug 927806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/927807">SUSE bug 927807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/927808">SUSE bug 927808</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200172" comment="libQtWebKit4-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200173" comment="libQtWebKit4-32bit-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200174" comment="libQtWebKit4-x86-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200175" comment="libqt4-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200176" comment="libqt4-32bit-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200177" comment="libqt4-qt3support-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200178" comment="libqt4-qt3support-32bit-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200179" comment="libqt4-qt3support-x86-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200180" comment="libqt4-sql-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200181" comment="libqt4-sql-32bit-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200182" comment="libqt4-sql-mysql-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200183" comment="libqt4-sql-sqlite-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200184" comment="libqt4-sql-x86-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200185" comment="libqt4-x11-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200186" comment="libqt4-x11-32bit-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200187" comment="libqt4-x11-x86-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200188" comment="libqt4-x86-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200189" comment="qt4-x11-tools-4.6.3-5.34 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200172" comment="libQtWebKit4-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200173" comment="libQtWebKit4-32bit-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200175" comment="libqt4-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200176" comment="libqt4-32bit-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200177" comment="libqt4-qt3support-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200178" comment="libqt4-qt3support-32bit-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200180" comment="libqt4-sql-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200181" comment="libqt4-sql-32bit-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200182" comment="libqt4-sql-mysql-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200183" comment="libqt4-sql-sqlite-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200185" comment="libqt4-x11-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200186" comment="libqt4-x11-32bit-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200189" comment="qt4-x11-tools-4.6.3-5.34 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1859</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-1859" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1859" source="CVE"/>
    <description>
    Multiple buffer overflows in plugins/imageformats/ico/qicohandler.cpp in the QtBase module in Qt before 4.8.7 and 5.x before 5.4.2 allow remote attackers to cause a denial of service (segmentation fault and crash) and possibly execute arbitrary code via a crafted ICO image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1859.html">CVE-2015-1859</cve>
<bugzilla href="https://bugzilla.suse.com/921999">SUSE bug 921999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/927806">SUSE bug 927806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/927807">SUSE bug 927807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/927808">SUSE bug 927808</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200172" comment="libQtWebKit4-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200173" comment="libQtWebKit4-32bit-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200174" comment="libQtWebKit4-x86-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200175" comment="libqt4-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200176" comment="libqt4-32bit-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200177" comment="libqt4-qt3support-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200178" comment="libqt4-qt3support-32bit-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200179" comment="libqt4-qt3support-x86-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200180" comment="libqt4-sql-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200181" comment="libqt4-sql-32bit-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200182" comment="libqt4-sql-mysql-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200183" comment="libqt4-sql-sqlite-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200184" comment="libqt4-sql-x86-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200185" comment="libqt4-x11-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200186" comment="libqt4-x11-32bit-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200187" comment="libqt4-x11-x86-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200188" comment="libqt4-x86-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200189" comment="qt4-x11-tools-4.6.3-5.34 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200172" comment="libQtWebKit4-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200173" comment="libQtWebKit4-32bit-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200175" comment="libqt4-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200176" comment="libqt4-32bit-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200177" comment="libqt4-qt3support-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200178" comment="libqt4-qt3support-32bit-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200180" comment="libqt4-sql-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200181" comment="libqt4-sql-32bit-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200182" comment="libqt4-sql-mysql-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200183" comment="libqt4-sql-sqlite-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200185" comment="libqt4-x11-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200186" comment="libqt4-x11-32bit-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200189" comment="qt4-x11-tools-4.6.3-5.34 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1860</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-1860" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1860" source="CVE"/>
    <description>
    Multiple buffer overflows in gui/image/qgifhandler.cpp in the QtBase module in Qt before 4.8.7 and 5.x before 5.4.2 allow remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a crafted GIF image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1860.html">CVE-2015-1860</cve>
<bugzilla href="https://bugzilla.suse.com/921999">SUSE bug 921999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/927806">SUSE bug 927806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/927807">SUSE bug 927807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/927808">SUSE bug 927808</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200172" comment="libQtWebKit4-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200173" comment="libQtWebKit4-32bit-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200174" comment="libQtWebKit4-x86-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200175" comment="libqt4-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200176" comment="libqt4-32bit-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200177" comment="libqt4-qt3support-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200178" comment="libqt4-qt3support-32bit-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200179" comment="libqt4-qt3support-x86-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200180" comment="libqt4-sql-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200181" comment="libqt4-sql-32bit-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200182" comment="libqt4-sql-mysql-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200183" comment="libqt4-sql-sqlite-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200184" comment="libqt4-sql-x86-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200185" comment="libqt4-x11-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200186" comment="libqt4-x11-32bit-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200187" comment="libqt4-x11-x86-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200188" comment="libqt4-x86-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200189" comment="qt4-x11-tools-4.6.3-5.34 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200172" comment="libQtWebKit4-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200173" comment="libQtWebKit4-32bit-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200175" comment="libqt4-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200176" comment="libqt4-32bit-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200177" comment="libqt4-qt3support-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200178" comment="libqt4-qt3support-32bit-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200180" comment="libqt4-sql-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200181" comment="libqt4-sql-32bit-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200182" comment="libqt4-sql-mysql-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200183" comment="libqt4-sql-sqlite-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200185" comment="libqt4-x11-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200186" comment="libqt4-x11-32bit-4.6.3-5.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200189" comment="qt4-x11-tools-4.6.3-5.34 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1914</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-1914" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1914" source="CVE"/>
    <description>
    IBM Java 7 R1 before SR3, 7 before SR9, 6 R1 before SR8 FP4, 6 before SR16 FP4, and 5.0 before SR16 FP10 allows remote attackers to bypass "permission checks" and obtain sensitive information via vectors related to the Java Virtual Machine.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1914.html">CVE-2015-1914</cve>
<bugzilla href="https://bugzilla.suse.com/952088">SUSE bug 952088</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215572" comment="java-1_6_0-ibm-1.6.0_sr16.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215573" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215574" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215575" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215577" comment="java-1_7_0-ibm-1.7.0_sr9.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215578" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215579" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215580" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.0-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215572" comment="java-1_6_0-ibm-1.6.0_sr16.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264522" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215573" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215574" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215575" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.4-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215577" comment="java-1_7_0-ibm-1.7.0_sr9.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215578" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215579" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.0-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215580" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.0-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1931</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-1931" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1931" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1931.html">CVE-2015-1931</cve>
<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
<bugzilla href="https://bugzilla.suse.com/939382">SUSE bug 939382</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201725" comment="java-1_6_0-ibm-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201727" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207151" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207152" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201732" comment="java-1_7_0-ibm-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207724" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207725" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207726" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201725" comment="java-1_6_0-ibm-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207150" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201727" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207151" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207152" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201732" comment="java-1_7_0-ibm-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207724" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207725" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207726" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2041</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2041" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2041" source="CVE"/>
    <description>
    net/llc/sysctl_net_llc.c in the Linux kernel before 3.19 uses an incorrect data type in a sysctl table, which allows local users to obtain potentially sensitive information from kernel memory or possibly have unspecified other impact by accessing a sysctl entry.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2041.html">CVE-2015-2041</cve>
<bugzilla href="https://bugzilla.suse.com/903967">SUSE bug 903967</bugzilla>
<bugzilla href="https://bugzilla.suse.com/919007">SUSE bug 919007</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215410" comment="kernel-default-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215411" comment="kernel-default-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215412" comment="kernel-default-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264515" comment="kernel-default-man-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215451" comment="kernel-ec2-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215452" comment="kernel-ec2-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215453" comment="kernel-ec2-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264508" comment="kernel-pae-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264509" comment="kernel-pae-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264510" comment="kernel-pae-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264516" comment="kernel-ppc64-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264517" comment="kernel-ppc64-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264518" comment="kernel-ppc64-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215414" comment="kernel-source-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215415" comment="kernel-syms-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215454" comment="kernel-trace-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215455" comment="kernel-trace-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215416" comment="kernel-trace-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215417" comment="kernel-xen-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215418" comment="kernel-xen-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215419" comment="kernel-xen-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215421" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264390" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2042</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2042" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2042" source="CVE"/>
    <description>
    net/rds/sysctl.c in the Linux kernel before 3.19 uses an incorrect data type in a sysctl table, which allows local users to obtain potentially sensitive information from kernel memory or possibly have unspecified other impact by accessing a sysctl entry.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2042.html">CVE-2015-2042</cve>
<bugzilla href="https://bugzilla.suse.com/903967">SUSE bug 903967</bugzilla>
<bugzilla href="https://bugzilla.suse.com/919018">SUSE bug 919018</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215410" comment="kernel-default-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215411" comment="kernel-default-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215412" comment="kernel-default-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264515" comment="kernel-default-man-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215451" comment="kernel-ec2-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215452" comment="kernel-ec2-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215453" comment="kernel-ec2-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264508" comment="kernel-pae-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264509" comment="kernel-pae-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264510" comment="kernel-pae-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264516" comment="kernel-ppc64-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264517" comment="kernel-ppc64-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264518" comment="kernel-ppc64-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215414" comment="kernel-source-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215415" comment="kernel-syms-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215454" comment="kernel-trace-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215455" comment="kernel-trace-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215416" comment="kernel-trace-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215417" comment="kernel-xen-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215418" comment="kernel-xen-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215419" comment="kernel-xen-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215421" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264390" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2044</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2044" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2044" source="CVE"/>
    <description>
    The emulation routines for unspecified X86 devices in Xen 3.2.x through 4.5.x does not properly initialize data, which allow local HVM guest users to obtain sensitive information via vectors involving an unsupported access size.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2044.html">CVE-2015-2044</cve>
<bugzilla href="https://bugzilla.suse.com/918995">SUSE bug 918995</bugzilla>
<bugzilla href="https://bugzilla.suse.com/918998">SUSE bug 918998</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204932" comment="xen-4.2.5_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204933" comment="xen-doc-html-4.2.5_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204934" comment="xen-doc-pdf-4.2.5_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204935" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.52-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204936" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.52-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204937" comment="xen-libs-4.2.5_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204938" comment="xen-libs-32bit-4.2.5_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204939" comment="xen-tools-4.2.5_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204940" comment="xen-tools-domU-4.2.5_04-0.9 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204932" comment="xen-4.2.5_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204933" comment="xen-doc-html-4.2.5_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204934" comment="xen-doc-pdf-4.2.5_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204935" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.52-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204937" comment="xen-libs-4.2.5_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204938" comment="xen-libs-32bit-4.2.5_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204939" comment="xen-tools-4.2.5_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204940" comment="xen-tools-domU-4.2.5_04-0.9 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2045</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2045" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2045" source="CVE"/>
    <description>
    The HYPERVISOR_xen_version hypercall in Xen 3.2.x through 4.5.x does not properly initialize data structures, which allows local guest users to obtain sensitive information via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2045.html">CVE-2015-2045</cve>
<bugzilla href="https://bugzilla.suse.com/918998">SUSE bug 918998</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204932" comment="xen-4.2.5_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204933" comment="xen-doc-html-4.2.5_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204934" comment="xen-doc-pdf-4.2.5_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204935" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.52-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204936" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.52-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204937" comment="xen-libs-4.2.5_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204938" comment="xen-libs-32bit-4.2.5_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204939" comment="xen-tools-4.2.5_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204940" comment="xen-tools-domU-4.2.5_04-0.9 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204932" comment="xen-4.2.5_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204933" comment="xen-doc-html-4.2.5_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204934" comment="xen-doc-pdf-4.2.5_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204935" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.52-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204937" comment="xen-libs-4.2.5_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204938" comment="xen-libs-32bit-4.2.5_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204939" comment="xen-tools-4.2.5_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204940" comment="xen-tools-domU-4.2.5_04-0.9 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2059</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2059" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2059" source="CVE"/>
    <description>
    The stringprep_utf8_to_ucs4 function in libin before 1.31, as used in jabberd2, allows context-dependent attackers to read system memory and possibly have other unspecified impact via invalid UTF-8 characters in a string, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2059.html">CVE-2015-2059</cve>
<bugzilla href="https://bugzilla.suse.com/919214">SUSE bug 919214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/923241">SUSE bug 923241</bugzilla>
<bugzilla href="https://bugzilla.suse.com/937096">SUSE bug 937096</bugzilla>
<bugzilla href="https://bugzilla.suse.com/937097">SUSE bug 937097</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202841" comment="libidn-1.10-6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209912" comment="libidn-32bit-1.10-6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2150</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2150" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2150" source="CVE"/>
    <description>
    Xen 3.3.x through 4.5.x and the Linux kernel through 3.19.1 do not properly restrict access to PCI command registers, which might allow local guest OS users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2150.html">CVE-2015-2150</cve>
<bugzilla href="https://bugzilla.suse.com/800280">SUSE bug 800280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/903967">SUSE bug 903967</bugzilla>
<bugzilla href="https://bugzilla.suse.com/919463">SUSE bug 919463</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204527" comment="kernel-bigsmp-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208622" comment="kernel-bigsmp-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204528" comment="kernel-bigsmp-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204529" comment="kernel-default-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204530" comment="kernel-default-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204531" comment="kernel-default-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208623" comment="kernel-default-man-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208624" comment="kernel-ec2-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208625" comment="kernel-ec2-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208626" comment="kernel-ec2-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204533" comment="kernel-pae-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204534" comment="kernel-pae-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204535" comment="kernel-pae-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208627" comment="kernel-ppc64-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208628" comment="kernel-ppc64-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208629" comment="kernel-ppc64-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204537" comment="kernel-source-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204538" comment="kernel-syms-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204539" comment="kernel-trace-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208630" comment="kernel-trace-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204540" comment="kernel-trace-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204541" comment="kernel-xen-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204542" comment="kernel-xen-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204543" comment="kernel-xen-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215421" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264390" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2151</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2151" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2151" source="CVE"/>
    <description>
    The x86 emulator in Xen 3.2.x through 4.5.x does not properly ignore segment overrides for instructions with register operands, which allows local guest users to obtain sensitive information, cause a denial of service (memory corruption), or possibly execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2151.html">CVE-2015-2151</cve>
<bugzilla href="https://bugzilla.suse.com/918998">SUSE bug 918998</bugzilla>
<bugzilla href="https://bugzilla.suse.com/919464">SUSE bug 919464</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204932" comment="xen-4.2.5_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204933" comment="xen-doc-html-4.2.5_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204934" comment="xen-doc-pdf-4.2.5_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204935" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.52-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204936" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.52-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204937" comment="xen-libs-4.2.5_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204938" comment="xen-libs-32bit-4.2.5_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204939" comment="xen-tools-4.2.5_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204940" comment="xen-tools-domU-4.2.5_04-0.9 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204932" comment="xen-4.2.5_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204933" comment="xen-doc-html-4.2.5_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204934" comment="xen-doc-pdf-4.2.5_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204935" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.52-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204937" comment="xen-libs-4.2.5_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204938" comment="xen-libs-32bit-4.2.5_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204939" comment="xen-tools-4.2.5_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204940" comment="xen-tools-domU-4.2.5_04-0.9 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2154</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2154" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2154" source="CVE"/>
    <description>
    The osi_print_cksum function in print-isoclns.c in the ethernet printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted (1) length, (2) offset, or (3) base pointer checksum value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2154.html">CVE-2015-2154</cve>
<bugzilla href="https://bugzilla.suse.com/922222">SUSE bug 922222</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200456" comment="tcpdump-3.9.8-1.27 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2170</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2170" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2170" source="CVE"/>
    <description>
    The upx decoder in ClamAV before 0.98.7 allows remote attackers to cause a denial of service (crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2170.html">CVE-2015-2170</cve>
<bugzilla href="https://bugzilla.suse.com/1040662">SUSE bug 1040662</bugzilla>
<bugzilla href="https://bugzilla.suse.com/921950">SUSE bug 921950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/922560">SUSE bug 922560</bugzilla>
<bugzilla href="https://bugzilla.suse.com/929192">SUSE bug 929192</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199951" comment="clamav-0.98.7-0.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2188</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2188" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2188" source="CVE"/>
    <description>
    epan/dissectors/packet-wcp.c in the WCP dissector in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet that is improperly handled during decompression.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2188.html">CVE-2015-2188</cve>
<bugzilla href="https://bugzilla.suse.com/920696">SUSE bug 920696</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200471" comment="wireshark-1.10.13-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2189</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2189" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2189" source="CVE"/>
    <description>
    Off-by-one error in the pcapng_read function in wiretap/pcapng.c in the pcapng file parser in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via an invalid Interface Statistics Block (ISB) interface ID in a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2189.html">CVE-2015-2189</cve>
<bugzilla href="https://bugzilla.suse.com/920697">SUSE bug 920697</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200471" comment="wireshark-1.10.13-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2191</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2191" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2191" source="CVE"/>
    <description>
    Integer overflow in the dissect_tnef function in epan/dissectors/packet-tnef.c in the TNEF dissector in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted length field in a packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2191.html">CVE-2015-2191</cve>
<bugzilla href="https://bugzilla.suse.com/920699">SUSE bug 920699</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200471" comment="wireshark-1.10.13-0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2221</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2221" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2221" source="CVE"/>
    <description>
    ClamAV before 0.98.7 allows remote attackers to cause a denial of service (infinite loop) via a crafted y0da cryptor file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2221.html">CVE-2015-2221</cve>
<bugzilla href="https://bugzilla.suse.com/1040662">SUSE bug 1040662</bugzilla>
<bugzilla href="https://bugzilla.suse.com/921950">SUSE bug 921950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/922560">SUSE bug 922560</bugzilla>
<bugzilla href="https://bugzilla.suse.com/929192">SUSE bug 929192</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199951" comment="clamav-0.98.7-0.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2222</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2222" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2222" source="CVE"/>
    <description>
    ClamAV before 0.98.7 allows remote attackers to cause a denial of service (crash) via a crafted petite packed file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2222.html">CVE-2015-2222</cve>
<bugzilla href="https://bugzilla.suse.com/1040662">SUSE bug 1040662</bugzilla>
<bugzilla href="https://bugzilla.suse.com/921950">SUSE bug 921950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/922560">SUSE bug 922560</bugzilla>
<bugzilla href="https://bugzilla.suse.com/929192">SUSE bug 929192</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199951" comment="clamav-0.98.7-0.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2296</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-2296" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2296" source="CVE"/>
    <description>
    The resolve_redirects function in sessions.py in requests 2.1.0 through 2.5.3 allows remote attackers to conduct session fixation attacks via a cookie without a host value in a redirect.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2296.html">CVE-2015-2296</cve>
<bugzilla href="https://bugzilla.suse.com/922448">SUSE bug 922448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/926396">SUSE bug 926396</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215938" comment="python-requests-2.3.0-9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2301</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2301" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2301" source="CVE"/>
    <description>
    Use-after-free vulnerability in the phar_rename_archive function in phar_object.c in PHP before 5.5.22 and 5.6.x before 5.6.6 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an attempted renaming of a Phar archive to the name of an existing file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2301.html">CVE-2015-2301</cve>
<bugzilla href="https://bugzilla.suse.com/922452">SUSE bug 922452</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199864" comment="apache2-mod_php53-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199865" comment="php53-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199866" comment="php53-bcmath-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199867" comment="php53-bz2-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199868" comment="php53-calendar-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199869" comment="php53-ctype-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199870" comment="php53-curl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199871" comment="php53-dba-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199872" comment="php53-dom-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199873" comment="php53-exif-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199874" comment="php53-fastcgi-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199875" comment="php53-fileinfo-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199876" comment="php53-ftp-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199877" comment="php53-gd-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199878" comment="php53-gettext-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199879" comment="php53-gmp-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199880" comment="php53-iconv-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199881" comment="php53-intl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199882" comment="php53-json-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199883" comment="php53-ldap-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199884" comment="php53-mbstring-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199885" comment="php53-mcrypt-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199886" comment="php53-mysql-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199887" comment="php53-odbc-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199888" comment="php53-openssl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199889" comment="php53-pcntl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199890" comment="php53-pdo-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199891" comment="php53-pear-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199892" comment="php53-pgsql-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199893" comment="php53-pspell-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199894" comment="php53-shmop-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199895" comment="php53-snmp-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199896" comment="php53-soap-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199897" comment="php53-suhosin-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199898" comment="php53-sysvmsg-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199899" comment="php53-sysvsem-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199900" comment="php53-sysvshm-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199901" comment="php53-tokenizer-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199902" comment="php53-wddx-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199903" comment="php53-xmlreader-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199904" comment="php53-xmlrpc-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199905" comment="php53-xmlwriter-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199906" comment="php53-xsl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199907" comment="php53-zip-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199908" comment="php53-zlib-5.3.17-0.41 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2304</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-2304" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2304" source="CVE"/>
    <description>
    Absolute path traversal vulnerability in bsdcpio in libarchive 3.1.2 and earlier allows remote attackers to write to arbitrary files via a full pathname in an archive.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2304.html">CVE-2015-2304</cve>
<bugzilla href="https://bugzilla.suse.com/920870">SUSE bug 920870</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202461" comment="bsdtar-2.5.5-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205311" comment="libarchive2-2.5.5-9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2305</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2305" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2305" source="CVE"/>
    <description>
    Integer overflow in the regcomp implementation in the Henry Spencer BSD regex library (aka rxspencer) alpha3.8.g5 on 32-bit platforms, as used in NetBSD through 6.1.5 and other products, might allow context-dependent attackers to execute arbitrary code via a large regular expression that leads to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2305.html">CVE-2015-2305</cve>
<bugzilla href="https://bugzilla.suse.com/1040662">SUSE bug 1040662</bugzilla>
<bugzilla href="https://bugzilla.suse.com/921950">SUSE bug 921950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/922022">SUSE bug 922022</bugzilla>
<bugzilla href="https://bugzilla.suse.com/922028">SUSE bug 922028</bugzilla>
<bugzilla href="https://bugzilla.suse.com/922030">SUSE bug 922030</bugzilla>
<bugzilla href="https://bugzilla.suse.com/922043">SUSE bug 922043</bugzilla>
<bugzilla href="https://bugzilla.suse.com/922560">SUSE bug 922560</bugzilla>
<bugzilla href="https://bugzilla.suse.com/922567">SUSE bug 922567</bugzilla>
<bugzilla href="https://bugzilla.suse.com/929192">SUSE bug 929192</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199864" comment="apache2-mod_php53-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199951" comment="clamav-0.98.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200254" comment="libmysql55client18-x86-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199865" comment="php53-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199866" comment="php53-bcmath-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199867" comment="php53-bz2-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199868" comment="php53-calendar-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199869" comment="php53-ctype-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199870" comment="php53-curl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199871" comment="php53-dba-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199872" comment="php53-dom-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199873" comment="php53-exif-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199874" comment="php53-fastcgi-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199875" comment="php53-fileinfo-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199876" comment="php53-ftp-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199877" comment="php53-gd-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199878" comment="php53-gettext-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199879" comment="php53-gmp-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199880" comment="php53-iconv-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199881" comment="php53-intl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199882" comment="php53-json-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199883" comment="php53-ldap-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199884" comment="php53-mbstring-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199885" comment="php53-mcrypt-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199886" comment="php53-mysql-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199887" comment="php53-odbc-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199888" comment="php53-openssl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199889" comment="php53-pcntl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199890" comment="php53-pdo-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199891" comment="php53-pear-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199892" comment="php53-pgsql-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199893" comment="php53-pspell-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199894" comment="php53-shmop-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199895" comment="php53-snmp-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199896" comment="php53-soap-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199897" comment="php53-suhosin-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199898" comment="php53-sysvmsg-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199899" comment="php53-sysvsem-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199900" comment="php53-sysvshm-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199901" comment="php53-tokenizer-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199902" comment="php53-wddx-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199903" comment="php53-xmlreader-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199904" comment="php53-xmlrpc-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199905" comment="php53-xmlwriter-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199906" comment="php53-xsl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199907" comment="php53-zip-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199908" comment="php53-zlib-5.3.17-0.41 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199864" comment="apache2-mod_php53-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199951" comment="clamav-0.98.7-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199865" comment="php53-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199866" comment="php53-bcmath-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199867" comment="php53-bz2-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199868" comment="php53-calendar-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199869" comment="php53-ctype-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199870" comment="php53-curl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199871" comment="php53-dba-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199872" comment="php53-dom-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199873" comment="php53-exif-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199874" comment="php53-fastcgi-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199875" comment="php53-fileinfo-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199876" comment="php53-ftp-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199877" comment="php53-gd-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199878" comment="php53-gettext-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199879" comment="php53-gmp-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199880" comment="php53-iconv-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199881" comment="php53-intl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199882" comment="php53-json-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199883" comment="php53-ldap-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199884" comment="php53-mbstring-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199885" comment="php53-mcrypt-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199886" comment="php53-mysql-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199887" comment="php53-odbc-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199888" comment="php53-openssl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199889" comment="php53-pcntl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199890" comment="php53-pdo-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199891" comment="php53-pear-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199892" comment="php53-pgsql-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199893" comment="php53-pspell-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199894" comment="php53-shmop-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199895" comment="php53-snmp-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199896" comment="php53-soap-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199897" comment="php53-suhosin-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199898" comment="php53-sysvmsg-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199899" comment="php53-sysvsem-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199900" comment="php53-sysvshm-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199901" comment="php53-tokenizer-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199902" comment="php53-wddx-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199903" comment="php53-xmlreader-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199904" comment="php53-xmlrpc-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199905" comment="php53-xmlwriter-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199906" comment="php53-xsl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199907" comment="php53-zip-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199908" comment="php53-zlib-5.3.17-0.41 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2316</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-2316" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2316" source="CVE"/>
    <description>
    The utils.html.strip_tags function in Django 1.6.x before 1.6.11, 1.7.x before 1.7.7, and 1.8.x before 1.8c1, when using certain versions of Python, allows remote attackers to cause a denial of service (infinite loop) by increasing the length of the input string.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2316.html">CVE-2015-2316</cve>
<bugzilla href="https://bugzilla.suse.com/923172">SUSE bug 923172</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215925" comment="python-Django-1.6.11-0.7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2317</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-2317" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2317" source="CVE"/>
    <description>
    The utils.http.is_safe_url function in Django before 1.4.20, 1.5.x, 1.6.x before 1.6.11, 1.7.x before 1.7.7, and 1.8.x before 1.8c1 does not properly validate URLs, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a control character in a URL, as demonstrated by a \x08javascript: URL.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2317.html">CVE-2015-2317</cve>
<bugzilla href="https://bugzilla.suse.com/923176">SUSE bug 923176</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215925" comment="python-Django-1.6.11-0.7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2318</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2318" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2318" source="CVE"/>
    <description>
    The TLS stack in Mono before 3.12.1 allows man-in-the-middle attackers to conduct message skipping attacks and consequently impersonate clients by leveraging missing handshake state validation, aka a "SMACK SKIP-TLS" issue.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2318.html">CVE-2015-2318</cve>
<bugzilla href="https://bugzilla.suse.com/921312">SUSE bug 921312</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200354" comment="mono-core-2.6.7-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200355" comment="mono-data-2.6.7-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200356" comment="mono-data-postgresql-2.6.7-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200357" comment="mono-data-sqlite-2.6.7-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200358" comment="mono-locale-extras-2.6.7-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200359" comment="mono-nunit-2.6.7-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200360" comment="mono-web-2.6.7-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200361" comment="mono-winforms-2.6.7-0.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2319</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2319" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2319" source="CVE"/>
    <description>
    The TLS stack in Mono before 3.12.1 makes it easier for remote attackers to conduct cipher-downgrade attacks to EXPORT_RSA ciphers via crafted TLS traffic, related to the "FREAK" issue, a different vulnerability than CVE-2015-0204.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2319.html">CVE-2015-2319</cve>
<bugzilla href="https://bugzilla.suse.com/921312">SUSE bug 921312</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200354" comment="mono-core-2.6.7-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200355" comment="mono-data-2.6.7-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200356" comment="mono-data-postgresql-2.6.7-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200357" comment="mono-data-sqlite-2.6.7-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200358" comment="mono-locale-extras-2.6.7-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200359" comment="mono-nunit-2.6.7-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200360" comment="mono-web-2.6.7-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200361" comment="mono-winforms-2.6.7-0.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152320" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2320</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2320" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2320" source="CVE"/>
    <description>
    The TLS stack in Mono before 3.12.1 allows remote attackers to have unspecified impact via vectors related to client-side SSLv2 fallback.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2320.html">CVE-2015-2320</cve>
<bugzilla href="https://bugzilla.suse.com/921312">SUSE bug 921312</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200354" comment="mono-core-2.6.7-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200355" comment="mono-data-2.6.7-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200356" comment="mono-data-postgresql-2.6.7-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200357" comment="mono-data-sqlite-2.6.7-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200358" comment="mono-locale-extras-2.6.7-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200359" comment="mono-nunit-2.6.7-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200360" comment="mono-web-2.6.7-0.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200361" comment="mono-winforms-2.6.7-0.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2566</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2566" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2566" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.22 and earlier allows remote authenticated users to affect availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2566.html">CVE-2015-2566</cve>
<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200254" comment="libmysql55client18-x86-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2567</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2567" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2567" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Security : Privileges.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2567.html">CVE-2015-2567</cve>
<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200254" comment="libmysql55client18-x86-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2568" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote attackers to affect availability via unknown vectors related to Server : Security : Privileges.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2568.html">CVE-2015-2568</cve>
<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
<bugzilla href="https://bugzilla.suse.com/936409">SUSE bug 936409</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200254" comment="libmysql55client18-x86-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2571</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2571" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Optimizer.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2571.html">CVE-2015-2571</cve>
<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
<bugzilla href="https://bugzilla.suse.com/936408">SUSE bug 936408</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200254" comment="libmysql55client18-x86-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2573</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2573" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote authenticated users to affect availability via vectors related to DDL.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2573.html">CVE-2015-2573</cve>
<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
<bugzilla href="https://bugzilla.suse.com/936409">SUSE bug 936409</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200254" comment="libmysql55client18-x86-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2576</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2576" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2576" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Utilities component in Oracle MySQL 1.5.1 and earlier, when running on Windows, allows local users to affect integrity via unknown vectors related to Installation.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2576.html">CVE-2015-2576</cve>
<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200254" comment="libmysql55client18-x86-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199633" comment="libmysqlclient15-x86-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200252" comment="libmysql55client18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200253" comment="libmysql55client18-32bit-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200255" comment="libmysql55client_r18-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199631" comment="libmysqlclient15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199632" comment="libmysqlclient15-32bit-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199634" comment="libmysqlclient_r15-5.0.96-0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200258" comment="mysql-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200259" comment="mysql-client-5.5.43-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200260" comment="mysql-tools-5.5.43-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2582</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2582" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to GIS.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2582.html">CVE-2015-2582</cve>
<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204696" comment="libmysql55client18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204697" comment="libmysql55client18-32bit-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204698" comment="libmysql55client_r18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201944" comment="mysql-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204699" comment="mysql-client-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208785" comment="mysql-tools-5.5.45-0.11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204696" comment="libmysql55client18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204697" comment="libmysql55client18-32bit-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208784" comment="libmysql55client18-x86-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204698" comment="libmysql55client_r18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201944" comment="mysql-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204699" comment="mysql-client-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208785" comment="mysql-tools-5.5.45-0.11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2590</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2590" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2015-4732.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2590.html">CVE-2015-2590</cve>
<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201725" comment="java-1_6_0-ibm-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201727" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207151" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207152" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201732" comment="java-1_7_0-ibm-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207724" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207725" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207726" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201725" comment="java-1_6_0-ibm-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207150" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201727" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207151" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207152" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201732" comment="java-1_7_0-ibm-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207724" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207725" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207726" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2601</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2601" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, JRockit R28.3.6, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality via vectors related to JCE.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2601.html">CVE-2015-2601</cve>
<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201725" comment="java-1_6_0-ibm-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201727" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207151" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207152" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201732" comment="java-1_7_0-ibm-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207724" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207725" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207726" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201725" comment="java-1_6_0-ibm-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207150" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201727" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207151" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207152" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201732" comment="java-1_7_0-ibm-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207724" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207725" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207726" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2611</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2611" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2611" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2611.html">CVE-2015-2611</cve>
<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204696" comment="libmysql55client18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204697" comment="libmysql55client18-32bit-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204698" comment="libmysql55client_r18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201944" comment="mysql-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204699" comment="mysql-client-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208785" comment="mysql-tools-5.5.45-0.11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204696" comment="libmysql55client18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204697" comment="libmysql55client18-32bit-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208784" comment="libmysql55client18-x86-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204698" comment="libmysql55client_r18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201944" comment="mysql-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204699" comment="mysql-client-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208785" comment="mysql-tools-5.5.45-0.11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2613</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2613" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u80 and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality via vectors related to JCE.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2613.html">CVE-2015-2613</cve>
<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
<bugzilla href="https://bugzilla.suse.com/951727">SUSE bug 951727</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201732" comment="java-1_7_0-ibm-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207724" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207725" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207726" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2617</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2617" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2617" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Partition.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2617.html">CVE-2015-2617</cve>
<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204696" comment="libmysql55client18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204697" comment="libmysql55client18-32bit-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204698" comment="libmysql55client_r18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201944" comment="mysql-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204699" comment="mysql-client-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208785" comment="mysql-tools-5.5.45-0.11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204696" comment="libmysql55client18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204697" comment="libmysql55client18-32bit-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208784" comment="libmysql55client18-x86-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204698" comment="libmysql55client_r18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201944" comment="mysql-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204699" comment="mysql-client-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208785" comment="mysql-tools-5.5.45-0.11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2619</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2619" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2619" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u80 and 8u45, JavaFX 2.2.80, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2619.html">CVE-2015-2619</cve>
<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201732" comment="java-1_7_0-ibm-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207724" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207725" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207726" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2620</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2620" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.23 and earlier allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Security : Privileges.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2620.html">CVE-2015-2620</cve>
<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204696" comment="libmysql55client18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204697" comment="libmysql55client18-32bit-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204698" comment="libmysql55client_r18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201944" comment="mysql-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204699" comment="mysql-client-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208785" comment="mysql-tools-5.5.45-0.11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204696" comment="libmysql55client18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204697" comment="libmysql55client18-32bit-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208784" comment="libmysql55client18-x86-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204698" comment="libmysql55client_r18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201944" comment="mysql-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204699" comment="mysql-client-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208785" comment="mysql-tools-5.5.45-0.11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2621</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2621" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33, allows remote attackers to affect confidentiality via vectors related to JMX.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2621.html">CVE-2015-2621</cve>
<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201725" comment="java-1_6_0-ibm-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201727" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207151" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207152" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201732" comment="java-1_7_0-ibm-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207724" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207725" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207726" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201725" comment="java-1_6_0-ibm-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207150" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201727" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207151" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207152" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201732" comment="java-1_7_0-ibm-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207724" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207725" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207726" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2625</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2625" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JRockit R28.3.6; and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality via vectors related to JSSE.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2625.html">CVE-2015-2625</cve>
<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201732" comment="java-1_7_0-ibm-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207724" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207725" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207726" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207716" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201732" comment="java-1_7_0-ibm-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207724" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207725" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207726" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2632</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2632" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allows remote attackers to affect confidentiality via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2632.html">CVE-2015-2632</cve>
<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201725" comment="java-1_6_0-ibm-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201727" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207151" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207152" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201732" comment="java-1_7_0-ibm-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207724" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207725" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207726" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201725" comment="java-1_6_0-ibm-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207150" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201727" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207151" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207152" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201732" comment="java-1_7_0-ibm-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207724" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207725" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207726" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2637</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2637" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2637" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JavaFX 2.2.80; and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2637.html">CVE-2015-2637</cve>
<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201725" comment="java-1_6_0-ibm-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201727" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207151" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207152" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201732" comment="java-1_7_0-ibm-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207724" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207725" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207726" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201725" comment="java-1_6_0-ibm-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207150" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201727" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207151" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207152" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201732" comment="java-1_7_0-ibm-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207724" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207725" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207726" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2638</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2638" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2638" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JavaFX 2.2.80; and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2638.html">CVE-2015-2638</cve>
<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201725" comment="java-1_6_0-ibm-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201727" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207151" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207152" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201732" comment="java-1_7_0-ibm-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207724" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207725" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207726" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201725" comment="java-1_6_0-ibm-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207150" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201727" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207151" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207152" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201732" comment="java-1_7_0-ibm-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207724" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207725" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207726" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2639</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2639" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2639" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Server : Security : Firewall.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2639.html">CVE-2015-2639</cve>
<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204696" comment="libmysql55client18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204697" comment="libmysql55client18-32bit-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204698" comment="libmysql55client_r18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201944" comment="mysql-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204699" comment="mysql-client-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208785" comment="mysql-tools-5.5.45-0.11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204696" comment="libmysql55client18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204697" comment="libmysql55client18-32bit-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208784" comment="libmysql55client18-x86-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204698" comment="libmysql55client_r18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201944" comment="mysql-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204699" comment="mysql-client-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208785" comment="mysql-tools-5.5.45-0.11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2641</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2641" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2641" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Security : Privileges.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2641.html">CVE-2015-2641</cve>
<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204696" comment="libmysql55client18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204697" comment="libmysql55client18-32bit-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204698" comment="libmysql55client_r18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201944" comment="mysql-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204699" comment="mysql-client-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208785" comment="mysql-tools-5.5.45-0.11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204696" comment="libmysql55client18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204697" comment="libmysql55client18-32bit-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208784" comment="libmysql55client18-x86-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204698" comment="libmysql55client_r18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201944" comment="mysql-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204699" comment="mysql-client-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208785" comment="mysql-tools-5.5.45-0.11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2643</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2643" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Optimizer.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2643.html">CVE-2015-2643</cve>
<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204696" comment="libmysql55client18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204697" comment="libmysql55client18-32bit-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204698" comment="libmysql55client_r18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201944" comment="mysql-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204699" comment="mysql-client-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208785" comment="mysql-tools-5.5.45-0.11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204696" comment="libmysql55client18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204697" comment="libmysql55client18-32bit-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208784" comment="libmysql55client18-x86-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204698" comment="libmysql55client_r18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201944" comment="mysql-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204699" comment="mysql-client-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208785" comment="mysql-tools-5.5.45-0.11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2648</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2648" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2648.html">CVE-2015-2648</cve>
<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204696" comment="libmysql55client18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204697" comment="libmysql55client18-32bit-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204698" comment="libmysql55client_r18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201944" comment="mysql-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204699" comment="mysql-client-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208785" comment="mysql-tools-5.5.45-0.11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204696" comment="libmysql55client18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204697" comment="libmysql55client18-32bit-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208784" comment="libmysql55client18-x86-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204698" comment="libmysql55client_r18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201944" comment="mysql-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204699" comment="mysql-client-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208785" comment="mysql-tools-5.5.45-0.11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2661</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2661" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2661" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows local users to affect availability via unknown vectors related to Client.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2661.html">CVE-2015-2661</cve>
<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204696" comment="libmysql55client18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204697" comment="libmysql55client18-32bit-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204698" comment="libmysql55client_r18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201944" comment="mysql-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204699" comment="mysql-client-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208785" comment="mysql-tools-5.5.45-0.11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204696" comment="libmysql55client18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204697" comment="libmysql55client18-32bit-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208784" comment="libmysql55client18-x86-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204698" comment="libmysql55client_r18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201944" comment="mysql-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204699" comment="mysql-client-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208785" comment="mysql-tools-5.5.45-0.11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2664</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2664" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2664" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2664.html">CVE-2015-2664</cve>
<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201725" comment="java-1_6_0-ibm-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201727" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207151" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207152" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201732" comment="java-1_7_0-ibm-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207724" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207725" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207726" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201725" comment="java-1_6_0-ibm-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207150" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201727" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207151" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207152" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201732" comment="java-1_7_0-ibm-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207724" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207725" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207726" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2668</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2668" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2668" source="CVE"/>
    <description>
    ClamAV before 0.98.7 allows remote attackers to cause a denial of service (infinite loop) via a crafted xz archive file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2668.html">CVE-2015-2668</cve>
<bugzilla href="https://bugzilla.suse.com/1040662">SUSE bug 1040662</bugzilla>
<bugzilla href="https://bugzilla.suse.com/921950">SUSE bug 921950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/922560">SUSE bug 922560</bugzilla>
<bugzilla href="https://bugzilla.suse.com/929192">SUSE bug 929192</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199951" comment="clamav-0.98.7-0.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2695</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2695" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2695" source="CVE"/>
    <description>
    lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) before 1.14 relies on an inappropriate context handle, which allows remote attackers to cause a denial of service (incorrect pointer read and process crash) via a crafted SPNEGO packet that is mishandled during a gss_inquire_context call.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2695.html">CVE-2015-2695</cve>
<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
<bugzilla href="https://bugzilla.suse.com/952188">SUSE bug 952188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/969771">SUSE bug 969771</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201748" comment="krb5-1.6.3-133.49.103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204569" comment="krb5-32bit-1.6.3-133.49.103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208712" comment="krb5-apps-clients-1.6.3-133.49.103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208713" comment="krb5-apps-servers-1.6.3-133.49.103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204570" comment="krb5-client-1.6.3-133.49.103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208707" comment="krb5-doc-1.6.3-133.49.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208708" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208709" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208710" comment="krb5-plugins-1.6.3-133.49.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201751" comment="krb5-server-1.6.3-133.49.103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208714" comment="krb5-x86-1.6.3-133.49.103 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201748" comment="krb5-1.6.3-133.49.103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204569" comment="krb5-32bit-1.6.3-133.49.103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208712" comment="krb5-apps-clients-1.6.3-133.49.103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208713" comment="krb5-apps-servers-1.6.3-133.49.103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204570" comment="krb5-client-1.6.3-133.49.103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208707" comment="krb5-doc-1.6.3-133.49.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208708" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208709" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208710" comment="krb5-plugins-1.6.3-133.49.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201751" comment="krb5-server-1.6.3-133.49.103 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2697</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2697" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2697" source="CVE"/>
    <description>
    The build_principal_va function in lib/krb5/krb/bld_princ.c in MIT Kerberos 5 (aka krb5) before 1.14 allows remote authenticated users to cause a denial of service (out-of-bounds read and KDC crash) via an initial '\0' character in a long realm field within a TGS request.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2697.html">CVE-2015-2697</cve>
<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
<bugzilla href="https://bugzilla.suse.com/952190">SUSE bug 952190</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009248574" comment="krb5-1.8.6-133.49.121 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248575" comment="krb5-32bit-1.8.6-133.49.121 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248576" comment="krb5-apps-clients-1.8.6-133.49.121 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248577" comment="krb5-apps-servers-1.8.6-133.49.121 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248578" comment="krb5-client-1.8.6-133.49.121 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248579" comment="krb5-devel-1.8.6-133.49.121 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248580" comment="krb5-devel-32bit-1.8.6-133.49.121 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248581" comment="krb5-doc-1.8.6-133.49.121 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248582" comment="krb5-plugin-kdb-ldap-1.8.6-133.49.121 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248583" comment="krb5-plugin-preauth-pkinit-1.8.6-133.49.121 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248584" comment="krb5-server-1.8.6-133.49.121 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2708</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2708" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2708.html">CVE-2015-2708</cve>
<bugzilla href="https://bugzilla.suse.com/930622">SUSE bug 930622</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199838" comment="MozillaFirefox-31.7.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199839" comment="MozillaFirefox-translations-31.7.0esr-0.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2709</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2709" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2709" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 38.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2709.html">CVE-2015-2709</cve>
<bugzilla href="https://bugzilla.suse.com/930622">SUSE bug 930622</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199838" comment="MozillaFirefox-31.7.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199839" comment="MozillaFirefox-translations-31.7.0esr-0.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2710</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2710" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710" source="CVE"/>
    <description>
    Heap-based buffer overflow in the SVGTextFrame class in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allows remote attackers to execute arbitrary code via crafted SVG graphics data in conjunction with a crafted Cascading Style Sheets (CSS) token sequence.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2710.html">CVE-2015-2710</cve>
<bugzilla href="https://bugzilla.suse.com/930622">SUSE bug 930622</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199838" comment="MozillaFirefox-31.7.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199839" comment="MozillaFirefox-translations-31.7.0esr-0.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2713</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2713" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713" source="CVE"/>
    <description>
    Use-after-free vulnerability in the SetBreaks function in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a document containing crafted text in conjunction with a Cascading Style Sheets (CSS) token sequence containing properties related to vertical text.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2713.html">CVE-2015-2713</cve>
<bugzilla href="https://bugzilla.suse.com/930622">SUSE bug 930622</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199838" comment="MozillaFirefox-31.7.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199839" comment="MozillaFirefox-translations-31.7.0esr-0.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2716</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2716" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716" source="CVE"/>
    <description>
    Buffer overflow in the XML parser in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allows remote attackers to execute arbitrary code by providing a large amount of compressed XML data, a related issue to CVE-2015-1283.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2716.html">CVE-2015-2716</cve>
<bugzilla href="https://bugzilla.suse.com/930622">SUSE bug 930622</bugzilla>
<bugzilla href="https://bugzilla.suse.com/939077">SUSE bug 939077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980391">SUSE bug 980391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/983985">SUSE bug 983985</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199838" comment="MozillaFirefox-31.7.0esr-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199839" comment="MozillaFirefox-translations-31.7.0esr-0.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2721</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2721" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721" source="CVE"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.19, as used in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, Thunderbird before 38.1, and other products, does not properly determine state transitions for the TLS state machine, which allows man-in-the-middle attackers to defeat cryptographic protection mechanisms by blocking messages, as demonstrated by removing a forward-secrecy property by blocking a ServerKeyExchange message, aka a "SMACK SKIP-TLS" issue.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2721.html">CVE-2015-2721</cve>
<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201557" comment="MozillaFirefox-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204203" comment="MozillaFirefox-translations-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204204" comment="libfreebl3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204205" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204206" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204207" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201559" comment="mozilla-nspr-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204208" comment="mozilla-nspr-32bit-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201561" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204209" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204210" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201557" comment="MozillaFirefox-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204203" comment="MozillaFirefox-translations-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204204" comment="libfreebl3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204205" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208382" comment="libfreebl3-x86-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204206" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204207" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208383" comment="libsoftokn3-x86-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201559" comment="mozilla-nspr-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204208" comment="mozilla-nspr-32bit-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208384" comment="mozilla-nspr-x86-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201561" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204209" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204210" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208385" comment="mozilla-nss-x86-3.19.2_CKBI_1.98-0.10 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2722</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2722" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2722" source="CVE"/>
    <description>
    Use-after-free vulnerability in the CanonicalizeXPCOMParticipant function in Mozilla Firefox before 39.0 and Firefox ESR 31.x before 31.8 and 38.x before 38.1 allows remote attackers to execute arbitrary code via vectors involving attachment of an XMLHttpRequest object to a shared worker.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2722.html">CVE-2015-2722</cve>
<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201557" comment="MozillaFirefox-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204203" comment="MozillaFirefox-translations-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204204" comment="libfreebl3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204205" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204206" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204207" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201559" comment="mozilla-nspr-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204208" comment="mozilla-nspr-32bit-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201561" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204209" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204210" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201557" comment="MozillaFirefox-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204203" comment="MozillaFirefox-translations-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204204" comment="libfreebl3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204205" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208382" comment="libfreebl3-x86-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204206" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204207" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208383" comment="libsoftokn3-x86-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201559" comment="mozilla-nspr-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204208" comment="mozilla-nspr-32bit-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208384" comment="mozilla-nspr-x86-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201561" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204209" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204210" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208385" comment="mozilla-nss-x86-3.19.2_CKBI_1.98-0.10 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2724</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2724" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2724.html">CVE-2015-2724</cve>
<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201557" comment="MozillaFirefox-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204203" comment="MozillaFirefox-translations-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204204" comment="libfreebl3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204205" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204206" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204207" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201559" comment="mozilla-nspr-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204208" comment="mozilla-nspr-32bit-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201561" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204209" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204210" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201557" comment="MozillaFirefox-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204203" comment="MozillaFirefox-translations-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204204" comment="libfreebl3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204205" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208382" comment="libfreebl3-x86-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204206" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204207" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208383" comment="libsoftokn3-x86-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201559" comment="mozilla-nspr-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204208" comment="mozilla-nspr-32bit-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208384" comment="mozilla-nspr-x86-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201561" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204209" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204210" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208385" comment="mozilla-nss-x86-3.19.2_CKBI_1.98-0.10 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2725</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2725" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2725" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 39.0, Firefox ESR 38.x before 38.1, and Thunderbird before 38.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2725.html">CVE-2015-2725</cve>
<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201557" comment="MozillaFirefox-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204203" comment="MozillaFirefox-translations-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204204" comment="libfreebl3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204205" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204206" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204207" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201559" comment="mozilla-nspr-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204208" comment="mozilla-nspr-32bit-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201561" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204209" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204210" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201557" comment="MozillaFirefox-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204203" comment="MozillaFirefox-translations-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204204" comment="libfreebl3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204205" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208382" comment="libfreebl3-x86-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204206" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204207" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208383" comment="libsoftokn3-x86-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201559" comment="mozilla-nspr-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204208" comment="mozilla-nspr-32bit-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208384" comment="mozilla-nspr-x86-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201561" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204209" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204210" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208385" comment="mozilla-nss-x86-3.19.2_CKBI_1.98-0.10 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2726</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2726" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2726" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 39.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2726.html">CVE-2015-2726</cve>
<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201557" comment="MozillaFirefox-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204203" comment="MozillaFirefox-translations-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204204" comment="libfreebl3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204205" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204206" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204207" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201559" comment="mozilla-nspr-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204208" comment="mozilla-nspr-32bit-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201561" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204209" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204210" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201557" comment="MozillaFirefox-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204203" comment="MozillaFirefox-translations-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204204" comment="libfreebl3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204205" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208382" comment="libfreebl3-x86-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204206" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204207" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208383" comment="libsoftokn3-x86-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201559" comment="mozilla-nspr-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204208" comment="mozilla-nspr-32bit-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208384" comment="mozilla-nspr-x86-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201561" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204209" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204210" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208385" comment="mozilla-nss-x86-3.19.2_CKBI_1.98-0.10 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2728</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2728" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728" source="CVE"/>
    <description>
    The IndexedDatabaseManager class in the IndexedDB implementation in Mozilla Firefox before 39.0 and Firefox ESR 31.x before 31.8 and 38.x before 38.1 misinterprets an unspecified IDBDatabase field as a pointer, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via unspecified vectors, related to a "type confusion" issue.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2728.html">CVE-2015-2728</cve>
<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201557" comment="MozillaFirefox-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204203" comment="MozillaFirefox-translations-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204204" comment="libfreebl3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204205" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204206" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204207" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201559" comment="mozilla-nspr-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204208" comment="mozilla-nspr-32bit-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201561" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204209" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204210" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201557" comment="MozillaFirefox-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204203" comment="MozillaFirefox-translations-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204204" comment="libfreebl3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204205" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208382" comment="libfreebl3-x86-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204206" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204207" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208383" comment="libsoftokn3-x86-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201559" comment="mozilla-nspr-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204208" comment="mozilla-nspr-32bit-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208384" comment="mozilla-nspr-x86-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201561" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204209" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204210" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208385" comment="mozilla-nss-x86-3.19.2_CKBI_1.98-0.10 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2730</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2730" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730" source="CVE"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.19.1, as used in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and other products, does not properly perform Elliptical Curve Cryptography (ECC) multiplications, which makes it easier for remote attackers to spoof ECDSA signatures via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2730.html">CVE-2015-2730</cve>
<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201557" comment="MozillaFirefox-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204203" comment="MozillaFirefox-translations-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204204" comment="libfreebl3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204205" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204206" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204207" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201559" comment="mozilla-nspr-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204208" comment="mozilla-nspr-32bit-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201561" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204209" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204210" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201557" comment="MozillaFirefox-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204203" comment="MozillaFirefox-translations-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204204" comment="libfreebl3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204205" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208382" comment="libfreebl3-x86-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204206" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204207" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208383" comment="libsoftokn3-x86-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201559" comment="mozilla-nspr-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204208" comment="mozilla-nspr-32bit-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208384" comment="mozilla-nspr-x86-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201561" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204209" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204210" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208385" comment="mozilla-nss-x86-3.19.2_CKBI_1.98-0.10 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2733</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2733" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2733" source="CVE"/>
    <description>
    Use-after-free vulnerability in the CanonicalizeXPCOMParticipant function in Mozilla Firefox before 39.0 and Firefox ESR 31.x before 31.8 and 38.x before 38.1 allows remote attackers to execute arbitrary code via vectors involving attachment of an XMLHttpRequest object to a dedicated worker.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2733.html">CVE-2015-2733</cve>
<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201557" comment="MozillaFirefox-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204203" comment="MozillaFirefox-translations-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204204" comment="libfreebl3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204205" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204206" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204207" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201559" comment="mozilla-nspr-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204208" comment="mozilla-nspr-32bit-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201561" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204209" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204210" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201557" comment="MozillaFirefox-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204203" comment="MozillaFirefox-translations-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204204" comment="libfreebl3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204205" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208382" comment="libfreebl3-x86-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204206" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204207" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208383" comment="libsoftokn3-x86-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201559" comment="mozilla-nspr-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204208" comment="mozilla-nspr-32bit-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208384" comment="mozilla-nspr-x86-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201561" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204209" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204210" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208385" comment="mozilla-nss-x86-3.19.2_CKBI_1.98-0.10 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2734</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2734" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734" source="CVE"/>
    <description>
    The CairoTextureClientD3D9::BorrowDrawTarget function in the Direct3D 9 implementation in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 reads data from uninitialized memory locations, which has unspecified impact and attack vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2734.html">CVE-2015-2734</cve>
<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201557" comment="MozillaFirefox-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204203" comment="MozillaFirefox-translations-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204204" comment="libfreebl3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204205" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204206" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204207" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201559" comment="mozilla-nspr-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204208" comment="mozilla-nspr-32bit-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201561" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204209" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204210" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201557" comment="MozillaFirefox-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204203" comment="MozillaFirefox-translations-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204204" comment="libfreebl3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204205" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208382" comment="libfreebl3-x86-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204206" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204207" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208383" comment="libsoftokn3-x86-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201559" comment="mozilla-nspr-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204208" comment="mozilla-nspr-32bit-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208384" comment="mozilla-nspr-x86-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201561" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204209" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204210" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208385" comment="mozilla-nss-x86-3.19.2_CKBI_1.98-0.10 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2735</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2735" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735" source="CVE"/>
    <description>
    nsZipArchive.cpp in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 accesses unintended memory locations, which allows remote attackers to have an unspecified impact via a crafted ZIP archive.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2735.html">CVE-2015-2735</cve>
<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201557" comment="MozillaFirefox-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204203" comment="MozillaFirefox-translations-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204204" comment="libfreebl3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204205" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204206" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204207" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201559" comment="mozilla-nspr-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204208" comment="mozilla-nspr-32bit-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201561" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204209" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204210" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201557" comment="MozillaFirefox-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204203" comment="MozillaFirefox-translations-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204204" comment="libfreebl3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204205" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208382" comment="libfreebl3-x86-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204206" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204207" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208383" comment="libsoftokn3-x86-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201559" comment="mozilla-nspr-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204208" comment="mozilla-nspr-32bit-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208384" comment="mozilla-nspr-x86-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201561" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204209" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204210" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208385" comment="mozilla-nss-x86-3.19.2_CKBI_1.98-0.10 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2736</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2736" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736" source="CVE"/>
    <description>
    The nsZipArchive::BuildFileList function in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 accesses unintended memory locations, which allows remote attackers to have an unspecified impact via a crafted ZIP archive.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2736.html">CVE-2015-2736</cve>
<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201557" comment="MozillaFirefox-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204203" comment="MozillaFirefox-translations-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204204" comment="libfreebl3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204205" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204206" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204207" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201559" comment="mozilla-nspr-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204208" comment="mozilla-nspr-32bit-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201561" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204209" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204210" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201557" comment="MozillaFirefox-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204203" comment="MozillaFirefox-translations-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204204" comment="libfreebl3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204205" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208382" comment="libfreebl3-x86-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204206" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204207" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208383" comment="libsoftokn3-x86-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201559" comment="mozilla-nspr-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204208" comment="mozilla-nspr-32bit-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208384" comment="mozilla-nspr-x86-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201561" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204209" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204210" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208385" comment="mozilla-nss-x86-3.19.2_CKBI_1.98-0.10 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2737</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2737" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737" source="CVE"/>
    <description>
    The rx::d3d11::SetBufferData function in the Direct3D 11 implementation in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 reads data from uninitialized memory locations, which has unspecified impact and attack vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2737.html">CVE-2015-2737</cve>
<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201557" comment="MozillaFirefox-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204203" comment="MozillaFirefox-translations-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204204" comment="libfreebl3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204205" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204206" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204207" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201559" comment="mozilla-nspr-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204208" comment="mozilla-nspr-32bit-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201561" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204209" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204210" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201557" comment="MozillaFirefox-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204203" comment="MozillaFirefox-translations-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204204" comment="libfreebl3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204205" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208382" comment="libfreebl3-x86-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204206" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204207" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208383" comment="libsoftokn3-x86-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201559" comment="mozilla-nspr-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204208" comment="mozilla-nspr-32bit-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208384" comment="mozilla-nspr-x86-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201561" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204209" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204210" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208385" comment="mozilla-nss-x86-3.19.2_CKBI_1.98-0.10 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2738</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2738" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738" source="CVE"/>
    <description>
    The YCbCrImageDataDeserializer::ToDataSourceSurface function in the YCbCr implementation in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 reads data from uninitialized memory locations, which has unspecified impact and attack vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2738.html">CVE-2015-2738</cve>
<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201557" comment="MozillaFirefox-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204203" comment="MozillaFirefox-translations-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204204" comment="libfreebl3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204205" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204206" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204207" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201559" comment="mozilla-nspr-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204208" comment="mozilla-nspr-32bit-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201561" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204209" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204210" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201557" comment="MozillaFirefox-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204203" comment="MozillaFirefox-translations-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204204" comment="libfreebl3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204205" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208382" comment="libfreebl3-x86-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204206" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204207" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208383" comment="libsoftokn3-x86-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201559" comment="mozilla-nspr-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204208" comment="mozilla-nspr-32bit-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208384" comment="mozilla-nspr-x86-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201561" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204209" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204210" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208385" comment="mozilla-nss-x86-3.19.2_CKBI_1.98-0.10 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2739</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2739" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739" source="CVE"/>
    <description>
    The ArrayBufferBuilder::append function in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 accesses unintended memory locations, which has unspecified impact and attack vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2739.html">CVE-2015-2739</cve>
<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201557" comment="MozillaFirefox-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204203" comment="MozillaFirefox-translations-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204204" comment="libfreebl3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204205" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204206" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204207" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201559" comment="mozilla-nspr-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204208" comment="mozilla-nspr-32bit-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201561" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204209" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204210" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201557" comment="MozillaFirefox-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204203" comment="MozillaFirefox-translations-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204204" comment="libfreebl3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204205" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208382" comment="libfreebl3-x86-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204206" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204207" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208383" comment="libsoftokn3-x86-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201559" comment="mozilla-nspr-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204208" comment="mozilla-nspr-32bit-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208384" comment="mozilla-nspr-x86-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201561" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204209" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204210" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208385" comment="mozilla-nss-x86-3.19.2_CKBI_1.98-0.10 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2740</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2740" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740" source="CVE"/>
    <description>
    Buffer overflow in the nsXMLHttpRequest::AppendToResponseText function in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 might allow remote attackers to cause a denial of service or have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2740.html">CVE-2015-2740</cve>
<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201557" comment="MozillaFirefox-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204203" comment="MozillaFirefox-translations-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204204" comment="libfreebl3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204205" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204206" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204207" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201559" comment="mozilla-nspr-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204208" comment="mozilla-nspr-32bit-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201561" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204209" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204210" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201557" comment="MozillaFirefox-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204203" comment="MozillaFirefox-translations-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204204" comment="libfreebl3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204205" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208382" comment="libfreebl3-x86-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204206" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204207" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208383" comment="libsoftokn3-x86-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201559" comment="mozilla-nspr-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204208" comment="mozilla-nspr-32bit-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208384" comment="mozilla-nspr-x86-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201561" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204209" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204210" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208385" comment="mozilla-nss-x86-3.19.2_CKBI_1.98-0.10 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2743</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2743" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743" source="CVE"/>
    <description>
    PDF.js in Mozilla Firefox before 39.0 and Firefox ESR 31.x before 31.8 and 38.x before 38.1 enables excessive privileges for internal Workers, which might allow remote attackers to execute arbitrary code by leveraging a Same Origin Policy bypass.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2743.html">CVE-2015-2743</cve>
<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201557" comment="MozillaFirefox-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204203" comment="MozillaFirefox-translations-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204204" comment="libfreebl3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204205" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204206" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204207" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201559" comment="mozilla-nspr-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204208" comment="mozilla-nspr-32bit-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201561" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204209" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204210" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201557" comment="MozillaFirefox-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204203" comment="MozillaFirefox-translations-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204204" comment="libfreebl3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204205" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208382" comment="libfreebl3-x86-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204206" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204207" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208383" comment="libsoftokn3-x86-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201559" comment="mozilla-nspr-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204208" comment="mozilla-nspr-32bit-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208384" comment="mozilla-nspr-x86-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201561" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204209" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204210" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208385" comment="mozilla-nss-x86-3.19.2_CKBI_1.98-0.10 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2751</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2751" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2751" source="CVE"/>
    <description>
    Xen 4.3.x, 4.4.x, and 4.5.x, when using toolstack disaggregation, allows remote domains with partial management control to cause a denial of service (host lock) via unspecified domctl operations.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2751.html">CVE-2015-2751</cve>
<bugzilla href="https://bugzilla.suse.com/922709">SUSE bug 922709</bugzilla>
<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202109" comment="xen-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204871" comment="xen-doc-html-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204872" comment="xen-doc-pdf-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204873" comment="xen-kmp-default-4.2.5_12_3.0.101_0.47.55-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204874" comment="xen-kmp-pae-4.2.5_12_3.0.101_0.47.55-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204875" comment="xen-libs-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204876" comment="xen-libs-32bit-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204877" comment="xen-tools-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204878" comment="xen-tools-domU-4.2.5_12-15 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202109" comment="xen-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204871" comment="xen-doc-html-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204872" comment="xen-doc-pdf-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204873" comment="xen-kmp-default-4.2.5_12_3.0.101_0.47.55-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204875" comment="xen-libs-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204876" comment="xen-libs-32bit-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204877" comment="xen-tools-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204878" comment="xen-tools-domU-4.2.5_12-15 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2756</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2756" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2756" source="CVE"/>
    <description>
    QEMU, as used in Xen 3.3.x through 4.5.x, does not properly restrict access to PCI command registers, which might allow local HVM guest users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.
    </description>
<advisory from="security@suse.de">
<cve href="https://www.suse.com/security/cve/CVE-2015-2756.html">CVE-2015-2756</cve>
<bugzilla href="https://bugzilla.suse.com/922706">SUSE bug 922706</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204932" comment="xen-4.2.5_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204933" comment="xen-doc-html-4.2.5_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204934" comment="xen-doc-pdf-4.2.5_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204935" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.52-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204936" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.52-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204937" comment="xen-libs-4.2.5_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204938" comment="xen-libs-32bit-4.2.5_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204939" comment="xen-tools-4.2.5_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204940" comment="xen-tools-domU-4.2.5_04-0.9 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204932" comment="xen-4.2.5_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204933" comment="xen-doc-html-4.2.5_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204934" comment="xen-doc-pdf-4.2.5_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204935" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.52-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204937" comment="xen-libs-4.2.5_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204938" comment="xen-libs-32bit-4.2.5_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204939" comment="xen-tools-4.2.5_04-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204940" comment="xen-tools-domU-4.2.5_04-0.9 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2775</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2775" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2775" source="CVE"/>
    <description>
    Directory traversal vulnerability in GNU Mailman before 2.1.20, when not using a static alias, allows remote attackers to execute arbitrary files via a .. (dot dot) in a list name.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2775.html">CVE-2015-2775</cve>
<bugzilla href="https://bugzilla.suse.com/925502">SUSE bug 925502</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009242811" comment="mailman-2.1.15-9.6.6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2783</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2783" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2783" source="CVE"/>
    <description>
    ext/phar/phar.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read and application crash) via a crafted length value in conjunction with crafted serialized data in a phar archive, related to the phar_parse_metadata and phar_parse_pharfile functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2783.html">CVE-2015-2783</cve>
<bugzilla href="https://bugzilla.suse.com/928408">SUSE bug 928408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/928506">SUSE bug 928506</bugzilla>
<bugzilla href="https://bugzilla.suse.com/928511">SUSE bug 928511</bugzilla>
<bugzilla href="https://bugzilla.suse.com/931418">SUSE bug 931418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199864" comment="apache2-mod_php53-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199865" comment="php53-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199866" comment="php53-bcmath-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199867" comment="php53-bz2-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199868" comment="php53-calendar-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199869" comment="php53-ctype-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199870" comment="php53-curl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199871" comment="php53-dba-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199872" comment="php53-dom-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199873" comment="php53-exif-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199874" comment="php53-fastcgi-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199875" comment="php53-fileinfo-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199876" comment="php53-ftp-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199877" comment="php53-gd-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199878" comment="php53-gettext-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199879" comment="php53-gmp-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199880" comment="php53-iconv-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199881" comment="php53-intl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199882" comment="php53-json-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199883" comment="php53-ldap-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199884" comment="php53-mbstring-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199885" comment="php53-mcrypt-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199886" comment="php53-mysql-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199887" comment="php53-odbc-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199888" comment="php53-openssl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199889" comment="php53-pcntl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199890" comment="php53-pdo-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199891" comment="php53-pear-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199892" comment="php53-pgsql-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199893" comment="php53-pspell-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199894" comment="php53-shmop-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199895" comment="php53-snmp-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199896" comment="php53-soap-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199897" comment="php53-suhosin-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199898" comment="php53-sysvmsg-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199899" comment="php53-sysvsem-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199900" comment="php53-sysvshm-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199901" comment="php53-tokenizer-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199902" comment="php53-wddx-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199903" comment="php53-xmlreader-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199904" comment="php53-xmlrpc-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199905" comment="php53-xmlwriter-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199906" comment="php53-xsl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199907" comment="php53-zip-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199908" comment="php53-zlib-5.3.17-0.41 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2787</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2787" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2787" source="CVE"/>
    <description>
    Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages use of the unset function within an __wakeup function, a related issue to CVE-2015-0231.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2787.html">CVE-2015-2787</cve>
<bugzilla href="https://bugzilla.suse.com/924972">SUSE bug 924972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199864" comment="apache2-mod_php53-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199865" comment="php53-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199866" comment="php53-bcmath-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199867" comment="php53-bz2-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199868" comment="php53-calendar-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199869" comment="php53-ctype-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199870" comment="php53-curl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199871" comment="php53-dba-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199872" comment="php53-dom-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199873" comment="php53-exif-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199874" comment="php53-fastcgi-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199875" comment="php53-fileinfo-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199876" comment="php53-ftp-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199877" comment="php53-gd-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199878" comment="php53-gettext-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199879" comment="php53-gmp-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199880" comment="php53-iconv-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199881" comment="php53-intl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199882" comment="php53-json-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199883" comment="php53-ldap-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199884" comment="php53-mbstring-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199885" comment="php53-mcrypt-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199886" comment="php53-mysql-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199887" comment="php53-odbc-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199888" comment="php53-openssl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199889" comment="php53-pcntl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199890" comment="php53-pdo-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199891" comment="php53-pear-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199892" comment="php53-pgsql-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199893" comment="php53-pspell-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199894" comment="php53-shmop-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199895" comment="php53-snmp-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199896" comment="php53-soap-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199897" comment="php53-suhosin-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199898" comment="php53-sysvmsg-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199899" comment="php53-sysvsem-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199900" comment="php53-sysvshm-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199901" comment="php53-tokenizer-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199902" comment="php53-wddx-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199903" comment="php53-xmlreader-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199904" comment="php53-xmlrpc-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199905" comment="php53-xmlwriter-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199906" comment="php53-xsl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199907" comment="php53-zip-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199908" comment="php53-zlib-5.3.17-0.41 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2806" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2806" source="CVE"/>
    <description>
    Stack-based buffer overflow in asn1_der_decoding in libtasn1 before 4.4 allows remote attackers to have unspecified impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2806.html">CVE-2015-2806</cve>
<bugzilla href="https://bugzilla.suse.com/924828">SUSE bug 924828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/929414">SUSE bug 929414</bugzilla>
<bugzilla href="https://bugzilla.suse.com/961491">SUSE bug 961491</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201703" comment="gnutls-2.4.1-24.39.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201706" comment="libgnutls-extra26-2.4.1-24.39.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204428" comment="libgnutls26-2.4.1-24.39.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204429" comment="libgnutls26-32bit-2.4.1-24.39.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200315" comment="libtasn1-1.5-1.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200316" comment="libtasn1-3-1.5-1.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200317" comment="libtasn1-3-32bit-1.5-1.30 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201703" comment="gnutls-2.4.1-24.39.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201706" comment="libgnutls-extra26-2.4.1-24.39.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204428" comment="libgnutls26-2.4.1-24.39.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204429" comment="libgnutls26-32bit-2.4.1-24.39.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208528" comment="libgnutls26-x86-2.4.1-24.39.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200315" comment="libtasn1-1.5-1.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200316" comment="libtasn1-3-1.5-1.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200317" comment="libtasn1-3-32bit-1.5-1.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200318" comment="libtasn1-3-x86-1.5-1.30 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2808</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2808" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808" source="CVE"/>
    <description>
    The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2808.html">CVE-2015-2808</cve>
<bugzilla href="https://bugzilla.suse.com/925378">SUSE bug 925378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
<bugzilla href="https://bugzilla.suse.com/952088">SUSE bug 952088</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201732" comment="java-1_7_0-ibm-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207724" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207725" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207726" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207716" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201732" comment="java-1_7_0-ibm-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207724" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207725" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207726" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2830" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2830" source="CVE"/>
    <description>
    arch/x86/kernel/entry_64.S in the Linux kernel before 3.19.2 does not prevent the TS_COMPAT flag from reaching a user-mode task, which might allow local users to bypass the seccomp or audit protection mechanism via a crafted application that uses the (1) fork or (2) close system call, as demonstrated by an attack against seccomp before 3.16.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2830.html">CVE-2015-2830</cve>
<bugzilla href="https://bugzilla.suse.com/903967">SUSE bug 903967</bugzilla>
<bugzilla href="https://bugzilla.suse.com/926240">SUSE bug 926240</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204527" comment="kernel-bigsmp-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208622" comment="kernel-bigsmp-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204528" comment="kernel-bigsmp-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204529" comment="kernel-default-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204530" comment="kernel-default-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204531" comment="kernel-default-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208623" comment="kernel-default-man-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208624" comment="kernel-ec2-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208625" comment="kernel-ec2-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208626" comment="kernel-ec2-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204533" comment="kernel-pae-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204534" comment="kernel-pae-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204535" comment="kernel-pae-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208627" comment="kernel-ppc64-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208628" comment="kernel-ppc64-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208629" comment="kernel-ppc64-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204537" comment="kernel-source-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204538" comment="kernel-syms-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204539" comment="kernel-trace-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208630" comment="kernel-trace-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204540" comment="kernel-trace-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204541" comment="kernel-xen-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204542" comment="kernel-xen-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204543" comment="kernel-xen-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215421" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264390" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2922</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-2922" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2922" source="CVE"/>
    <description>
    The ndisc_router_discovery function in net/ipv6/ndisc.c in the Neighbor Discovery (ND) protocol implementation in the IPv6 stack in the Linux kernel before 3.19.6 allows remote attackers to reconfigure a hop-limit setting via a small hop_limit value in a Router Advertisement (RA) message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2922.html">CVE-2015-2922</cve>
<bugzilla href="https://bugzilla.suse.com/903967">SUSE bug 903967</bugzilla>
<bugzilla href="https://bugzilla.suse.com/922583">SUSE bug 922583</bugzilla>
<bugzilla href="https://bugzilla.suse.com/926223">SUSE bug 926223</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215410" comment="kernel-default-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215411" comment="kernel-default-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215412" comment="kernel-default-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264515" comment="kernel-default-man-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215451" comment="kernel-ec2-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215452" comment="kernel-ec2-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215453" comment="kernel-ec2-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264508" comment="kernel-pae-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264509" comment="kernel-pae-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264510" comment="kernel-pae-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264516" comment="kernel-ppc64-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264517" comment="kernel-ppc64-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264518" comment="kernel-ppc64-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215414" comment="kernel-source-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215415" comment="kernel-syms-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215454" comment="kernel-trace-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215455" comment="kernel-trace-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215416" comment="kernel-trace-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215417" comment="kernel-xen-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215418" comment="kernel-xen-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215419" comment="kernel-xen-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215421" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264390" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-3143" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3143" source="CVE"/>
    <description>
    cURL and libcurl 7.10.6 through 7.41.0 does not properly re-use NTLM connections, which allows remote attackers to connect as other users via an unauthenticated request, a similar issue to CVE-2014-0015.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3143.html">CVE-2015-3143</cve>
<bugzilla href="https://bugzilla.suse.com/927556">SUSE bug 927556</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199970" comment="curl-7.19.7-1.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199971" comment="libcurl4-7.19.7-1.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199972" comment="libcurl4-32bit-7.19.7-1.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199973" comment="libcurl4-x86-7.19.7-1.42 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199970" comment="curl-7.19.7-1.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199971" comment="libcurl4-7.19.7-1.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199972" comment="libcurl4-32bit-7.19.7-1.42 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3148</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-3148" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3148" source="CVE"/>
    <description>
    cURL and libcurl 7.10.6 through 7.41.0 do not properly re-use authenticated Negotiate connections, which allows remote attackers to connect as other users via a request.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3148.html">CVE-2015-3148</cve>
<bugzilla href="https://bugzilla.suse.com/1092962">SUSE bug 1092962</bugzilla>
<bugzilla href="https://bugzilla.suse.com/927746">SUSE bug 927746</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199970" comment="curl-7.19.7-1.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199971" comment="libcurl4-7.19.7-1.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199972" comment="libcurl4-32bit-7.19.7-1.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199973" comment="libcurl4-x86-7.19.7-1.42 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199970" comment="curl-7.19.7-1.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199971" comment="libcurl4-7.19.7-1.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199972" comment="libcurl4-32bit-7.19.7-1.42 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3152</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-3152" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152" source="CVE"/>
    <description>
    Oracle MySQL before 5.7.3, Oracle MySQL Connector/C (aka libmysqlclient) before 6.1.3, and MariaDB before 5.5.44 use the --ssl option to mean that SSL is optional, which allows man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, aka a "BACKRONYM" attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3152.html">CVE-2015-3152</cve>
<bugzilla href="https://bugzilla.suse.com/1037590">SUSE bug 1037590</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1047059">SUSE bug 1047059</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1088681">SUSE bug 1088681</bugzilla>
<bugzilla href="https://bugzilla.suse.com/924663">SUSE bug 924663</bugzilla>
<bugzilla href="https://bugzilla.suse.com/928962">SUSE bug 928962</bugzilla>
<bugzilla href="https://bugzilla.suse.com/936407">SUSE bug 936407</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204696" comment="libmysql55client18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204697" comment="libmysql55client18-32bit-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204698" comment="libmysql55client_r18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201944" comment="mysql-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204699" comment="mysql-client-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208785" comment="mysql-tools-5.5.45-0.11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204696" comment="libmysql55client18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204697" comment="libmysql55client18-32bit-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208784" comment="libmysql55client18-x86-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204698" comment="libmysql55client_r18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201944" comment="mysql-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204699" comment="mysql-client-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208785" comment="mysql-tools-5.5.45-0.11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3153</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-3153" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3153" source="CVE"/>
    <description>
    The default configuration for cURL and libcurl before 7.42.1 sends custom HTTP headers to both the proxy and destination server, which might allow remote proxy servers to obtain sensitive information by reading the header contents.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3153.html">CVE-2015-3153</cve>
<bugzilla href="https://bugzilla.suse.com/928533">SUSE bug 928533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199970" comment="curl-7.19.7-1.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199971" comment="libcurl4-7.19.7-1.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199972" comment="libcurl4-32bit-7.19.7-1.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199973" comment="libcurl4-x86-7.19.7-1.42 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199970" comment="curl-7.19.7-1.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199971" comment="libcurl4-7.19.7-1.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199972" comment="libcurl4-32bit-7.19.7-1.42 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3156</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-3156" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3156" source="CVE"/>
    <description>
    The _write_config function in trove/guestagent/datastore/experimental/mongodb/service.py, reset_configuration function in trove/guestagent/datastore/experimental/postgresql/service/config.py, write_config function in trove/guestagent/datastore/experimental/redis/service.py, _write_mycnf function in trove/guestagent/datastore/mysql/service.py, InnoBackupEx::_run_prepare function in trove/guestagent/strategies/restore/mysql_impl.py, InnoBackupEx::cmd function in trove/guestagent/strategies/backup/mysql_impl.py, MySQLDump::cmd in trove/guestagent/strategies/backup/mysql_impl.py, InnoBackupExIncremental::cmd function in trove/guestagent/strategies/backup/mysql_impl.py, _get_actual_db_status function in trove/guestagent/datastore/experimental/cassandra/system.py and trove/guestagent/datastore/experimental/cassandra/service.py, and multiple class CbBackup methods in trove/guestagent/strategies/backup/experimental/couchbase_impl.py in Openstack DBaaS (aka Trove) as packaged in Openstack before 2015.1.0 (aka Kilo) allows local users to write to configuration files via a symlink attack on a temporary file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3156.html">CVE-2015-3156</cve>
<bugzilla href="https://bugzilla.suse.com/929535">SUSE bug 929535</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215918" comment="openstack-trove-2014.2.4.juno-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215919" comment="openstack-trove-api-2014.2.4.juno-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215920" comment="openstack-trove-conductor-2014.2.4.juno-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215921" comment="openstack-trove-doc-2014.2.4.juno-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215922" comment="openstack-trove-guestagent-2014.2.4.juno-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215923" comment="openstack-trove-taskmanager-2014.2.4.juno-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215924" comment="python-trove-2014.2.4.juno-15 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3165</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-3165" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3165" source="CVE"/>
    <description>
    Double free vulnerability in PostgreSQL before 9.0.20, 9.1.x before 9.1.16, 9.2.x before 9.2.11, 9.3.x before 9.3.7, and 9.4.x before 9.4.2 allows remote attackers to cause a denial of service (crash) by closing an SSL session at a time when the authentication timeout will expire during the session shutdown sequence.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3165.html">CVE-2015-3165</cve>
<bugzilla href="https://bugzilla.suse.com/931972">SUSE bug 931972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/931973">SUSE bug 931973</bugzilla>
<bugzilla href="https://bugzilla.suse.com/931974">SUSE bug 931974</bugzilla>
<bugzilla href="https://bugzilla.suse.com/932040">SUSE bug 932040</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204764" comment="postgresql91-9.1.18-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208946" comment="postgresql91-contrib-9.1.18-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204765" comment="postgresql91-docs-9.1.18-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208947" comment="postgresql91-server-9.1.18-0.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3166</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-3166" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3166" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3166.html">CVE-2015-3166</cve>
<bugzilla href="https://bugzilla.suse.com/931972">SUSE bug 931972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/931973">SUSE bug 931973</bugzilla>
<bugzilla href="https://bugzilla.suse.com/931974">SUSE bug 931974</bugzilla>
<bugzilla href="https://bugzilla.suse.com/932040">SUSE bug 932040</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204764" comment="postgresql91-9.1.18-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208946" comment="postgresql91-contrib-9.1.18-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204765" comment="postgresql91-docs-9.1.18-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208947" comment="postgresql91-server-9.1.18-0.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3167</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-3167" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3167" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3167.html">CVE-2015-3167</cve>
<bugzilla href="https://bugzilla.suse.com/931972">SUSE bug 931972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/931973">SUSE bug 931973</bugzilla>
<bugzilla href="https://bugzilla.suse.com/931974">SUSE bug 931974</bugzilla>
<bugzilla href="https://bugzilla.suse.com/932040">SUSE bug 932040</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204764" comment="postgresql91-9.1.18-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208946" comment="postgresql91-contrib-9.1.18-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204765" comment="postgresql91-docs-9.1.18-0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208947" comment="postgresql91-server-9.1.18-0.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3183</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-3183" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3183" source="CVE"/>
    <description>
    The chunked transfer coding implementation in the Apache HTTP Server before 2.4.14 does not properly parse chunk headers, which allows remote attackers to conduct HTTP request smuggling attacks via a crafted request, related to mishandling of large chunk-size values and invalid chunk-extension characters in modules/http/http_filters.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3183.html">CVE-2015-3183</cve>
<bugzilla href="https://bugzilla.suse.com/938728">SUSE bug 938728</bugzilla>
<bugzilla href="https://bugzilla.suse.com/948325">SUSE bug 948325</bugzilla>
<bugzilla href="https://bugzilla.suse.com/949218">SUSE bug 949218</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201570" comment="apache2-2.2.12-59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201572" comment="apache2-doc-2.2.12-59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201573" comment="apache2-example-pages-2.2.12-59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201574" comment="apache2-prefork-2.2.12-59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201575" comment="apache2-utils-2.2.12-59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201576" comment="apache2-worker-2.2.12-59 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3195</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-3195" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3195" source="CVE"/>
    <description>
    The ASN1_TFLG_COMBINE implementation in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zh, 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1q, and 1.0.2 before 1.0.2e mishandles errors caused by malformed X509_ATTRIBUTE data, which allows remote attackers to obtain sensitive information from process memory by triggering a decoding failure in a PKCS#7 or CMS application.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3195.html">CVE-2015-3195</cve>
<bugzilla href="https://bugzilla.suse.com/923755">SUSE bug 923755</bugzilla>
<bugzilla href="https://bugzilla.suse.com/957812">SUSE bug 957812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/957815">SUSE bug 957815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/958768">SUSE bug 958768</bugzilla>
<bugzilla href="https://bugzilla.suse.com/963977">SUSE bug 963977</bugzilla>
<bugzilla href="https://bugzilla.suse.com/986238">SUSE bug 986238</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204736" comment="libopenssl0_9_8-0.9.8j-0.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204737" comment="libopenssl0_9_8-32bit-0.9.8j-0.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207916" comment="libopenssl0_9_8-hmac-0.9.8j-0.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207917" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201967" comment="openssl-0.9.8j-0.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207918" comment="openssl-doc-0.9.8j-0.80 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204736" comment="libopenssl0_9_8-0.9.8j-0.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204737" comment="libopenssl0_9_8-32bit-0.9.8j-0.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207916" comment="libopenssl0_9_8-hmac-0.9.8j-0.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207917" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208803" comment="libopenssl0_9_8-x86-0.9.8j-0.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201967" comment="openssl-0.9.8j-0.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207918" comment="openssl-doc-0.9.8j-0.80 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3197</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-3197" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3197" source="CVE"/>
    <description>
    ssl/s2_srvr.c in OpenSSL 1.0.1 before 1.0.1r and 1.0.2 before 1.0.2f does not prevent use of disabled ciphers, which makes it easier for man-in-the-middle attackers to defeat cryptographic protection mechanisms by performing computations on SSLv2 traffic, related to the get_client_master_key and get_client_hello functions.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3197.html">CVE-2015-3197</cve>
<bugzilla href="https://bugzilla.suse.com/963410">SUSE bug 963410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/963415">SUSE bug 963415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/968044">SUSE bug 968044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/968046">SUSE bug 968046</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205075" comment="libopenssl0_9_8-0.9.8j-0.89 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205076" comment="libopenssl0_9_8-32bit-0.9.8j-0.89 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207919" comment="libopenssl0_9_8-hmac-0.9.8j-0.89 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207920" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.89 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203222" comment="openssl-0.9.8j-0.89 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207921" comment="openssl-doc-0.9.8j-0.89 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215815" comment="libopenssl-devel-0.9.8j-0.91 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215816" comment="libopenssl0_9_8-0.9.8j-0.91 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215817" comment="libopenssl0_9_8-32bit-0.9.8j-0.91 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215818" comment="libopenssl0_9_8-hmac-0.9.8j-0.91 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215819" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.91 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215820" comment="openssl-0.9.8j-0.91 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215821" comment="openssl-doc-0.9.8j-0.91 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3202</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-3202" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3202" source="CVE"/>
    <description>
    fusermount in FUSE before 2.9.3-15 does not properly clear the environment before invoking (1) mount or (2) umount as root, which allows local users to write to arbitrary files via a crafted LIBMOUNT_MTAB environment variable that is used by mount's debugging feature.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3202.html">CVE-2015-3202</cve>
<bugzilla href="https://bugzilla.suse.com/931452">SUSE bug 931452</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200023" comment="fuse-2.8.7-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200024" comment="libfuse2-2.8.7-0.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-3209" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209" source="CVE"/>
    <description>
    Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3209.html">CVE-2015-3209</cve>
<bugzilla href="https://bugzilla.suse.com/932267">SUSE bug 932267</bugzilla>
<bugzilla href="https://bugzilla.suse.com/932770">SUSE bug 932770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/932823">SUSE bug 932823</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215699" comment="kvm-1.4.2-0.22.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204941" comment="xen-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204942" comment="xen-doc-html-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204943" comment="xen-doc-pdf-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204944" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204945" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204946" comment="xen-libs-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204947" comment="xen-libs-32bit-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204948" comment="xen-tools-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204949" comment="xen-tools-domU-4.2.5_08-0.9 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215699" comment="kvm-1.4.2-0.22.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204941" comment="xen-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204942" comment="xen-doc-html-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204943" comment="xen-doc-pdf-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204944" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204946" comment="xen-libs-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204947" comment="xen-libs-32bit-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204948" comment="xen-tools-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204949" comment="xen-tools-domU-4.2.5_08-0.9 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3214</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-3214" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3214" source="CVE"/>
    <description>
    The pit_ioport_read in i8254.c in the Linux kernel before 2.6.33 and QEMU before 2.3.1 does not distinguish between read lengths and write lengths, which might allow guest OS users to execute arbitrary code on the host OS by triggering use of an invalid index.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3214.html">CVE-2015-3214</cve>
<bugzilla href="https://bugzilla.suse.com/934069">SUSE bug 934069</bugzilla>
<bugzilla href="https://bugzilla.suse.com/936025">SUSE bug 936025</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3216</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-3216" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3216" source="CVE"/>
    <description>
    Race condition in a certain Red Hat patch to the PRNG lock implementation in the ssleay_rand_bytes function in OpenSSL, as distributed in openssl-1.0.1e-25.el7 in Red Hat Enterprise Linux (RHEL) 7 and other products, allows remote attackers to cause a denial of service (application crash) by establishing many TLS sessions to a multithreaded server, leading to use of a negative value for a certain length field.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3216.html">CVE-2015-3216</cve>
<bugzilla href="https://bugzilla.suse.com/933898">SUSE bug 933898</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215682" comment="libopenssl0_9_8-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215683" comment="libopenssl0_9_8-32bit-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215685" comment="libopenssl0_9_8-hmac-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215686" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215684" comment="openssl-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215687" comment="openssl-doc-0.9.8j-0.72 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215682" comment="libopenssl0_9_8-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215683" comment="libopenssl0_9_8-32bit-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215685" comment="libopenssl0_9_8-hmac-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215686" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264529" comment="libopenssl0_9_8-x86-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215684" comment="openssl-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215687" comment="openssl-doc-0.9.8j-0.72 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3219</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-3219" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3219" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the Orchestration/Stack section in OpenStack Dashboard (Horizon) 2014.2 before 2014.2.4 and 2015.1.x before 2015.1.1 allows remote attackers to inject arbitrary web script or HTML via the description parameter in a heat template, which is not properly handled in the help_text attribute in the Field class.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3219.html">CVE-2015-3219</cve>
<bugzilla href="https://bugzilla.suse.com/933722">SUSE bug 933722</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215864" comment="crowbar-barclamp-nova_dashboard-1.9+git.1443622531.b2b2939-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215865" comment="openstack-dashboard-2014.2.4~a0~dev12-13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215866" comment="python-django_openstack_auth-1.1.7-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215867" comment="python-horizon-2014.2.4~a0~dev12-13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3221</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-3221" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3221" source="CVE"/>
    <description>
    OpenStack Neutron before 2014.2.4 (juno) and 2015.1.x before 2015.1.1 (kilo), when using the IPTables firewall driver, allows remote authenticated users to cause a denial of service (L2 agent crash) by adding an address pair that is rejected by the ipset tool.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3221.html">CVE-2015-3221</cve>
<bugzilla href="https://bugzilla.suse.com/935263">SUSE bug 935263</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215793" comment="crowbar-barclamp-neutron-1.9+git.1443859419.95e948a-12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215794" comment="openstack-neutron-2014.2.4~a0~dev103-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215795" comment="openstack-neutron-dhcp-agent-2014.2.4~a0~dev103-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215796" comment="openstack-neutron-doc-2014.2.4~a0~dev103-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215797" comment="openstack-neutron-ha-tool-2014.2.4~a0~dev103-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215798" comment="openstack-neutron-ibm-agent-2014.2.4~a0~dev103-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215799" comment="openstack-neutron-l3-agent-2014.2.4~a0~dev103-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215800" comment="openstack-neutron-lbaas-agent-2014.2.4~a0~dev103-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215801" comment="openstack-neutron-linuxbridge-agent-2014.2.4~a0~dev103-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215802" comment="openstack-neutron-metadata-agent-2014.2.4~a0~dev103-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215803" comment="openstack-neutron-metering-agent-2014.2.4~a0~dev103-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215804" comment="openstack-neutron-mlnx-agent-2014.2.4~a0~dev103-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215805" comment="openstack-neutron-nec-agent-2014.2.4~a0~dev103-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215806" comment="openstack-neutron-nvsd-agent-2014.2.4~a0~dev103-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215807" comment="openstack-neutron-openvswitch-agent-2014.2.4~a0~dev103-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215808" comment="openstack-neutron-plugin-cisco-2014.2.4~a0~dev103-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215809" comment="openstack-neutron-restproxy-agent-2014.2.4~a0~dev103-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215810" comment="openstack-neutron-ryu-agent-2014.2.4~a0~dev103-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215811" comment="openstack-neutron-server-2014.2.4~a0~dev103-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215812" comment="openstack-neutron-vpn-agent-2014.2.4~a0~dev103-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215813" comment="python-neutron-2014.2.4~a0~dev103-16 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3225</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-3225" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3225" source="CVE"/>
    <description>
    lib/rack/utils.rb in Rack before 1.5.4 and 1.6.x before 1.6.2, as used with Ruby on Rails 3.x and 4.x and other products, allows remote attackers to cause a denial of service (SystemStackError) via a request with a large parameter depth.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3225.html">CVE-2015-3225</cve>
<bugzilla href="https://bugzilla.suse.com/934797">SUSE bug 934797</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215964" comment="ruby2.1-rubygem-rack-1.5.2-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215965" comment="rubygem-rack-1.5.2-9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3226</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-3226" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3226" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in json/encoding.rb in Active Support in Ruby on Rails 3.x and 4.1.x before 4.1.11 and 4.2.x before 4.2.2 allows remote attackers to inject arbitrary web script or HTML via a crafted Hash that is mishandled during JSON encoding.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3226.html">CVE-2015-3226</cve>
<bugzilla href="https://bugzilla.suse.com/934799">SUSE bug 934799</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215950" comment="ruby2.1-rubygem-activesupport-4_1-4.1.9-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215951" comment="rubygem-activesupport-4_1-4.1.9-9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3227</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-3227" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3227" source="CVE"/>
    <description>
    The (1) jdom.rb and (2) rexml.rb components in Active Support in Ruby on Rails before 4.1.11 and 4.2.x before 4.2.2, when JDOM or REXML is enabled, allow remote attackers to cause a denial of service (SystemStackError) via a large XML document depth.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3227.html">CVE-2015-3227</cve>
<bugzilla href="https://bugzilla.suse.com/934800">SUSE bug 934800</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215950" comment="ruby2.1-rubygem-activesupport-4_1-4.1.9-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215951" comment="rubygem-activesupport-4_1-4.1.9-9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3228</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-3228" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3228" source="CVE"/>
    <description>
    Integer overflow in the gs_heap_alloc_bytes function in base/gsmalloc.c in Ghostscript 9.15 and earlier allows remote attackers to cause a denial of service (crash) via a crafted Postscript (ps) file, as demonstrated by using the ps2pdf command, which triggers an out-of-bounds read or write.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3228.html">CVE-2015-3228</cve>
<bugzilla href="https://bugzilla.suse.com/939342">SUSE bug 939342</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205336" comment="ghostscript-fonts-other-8.62-32.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205337" comment="ghostscript-fonts-rus-8.62-32.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205338" comment="ghostscript-fonts-std-8.62-32.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202626" comment="ghostscript-library-8.62-32.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205339" comment="ghostscript-omni-8.62-32.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205340" comment="ghostscript-x11-8.62-32.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205341" comment="libgimpprint-4.2.7-32.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3238</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-3238" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3238" source="CVE"/>
    <description>
    The _unix_run_helper_binary function in the pam_unix module in Linux-PAM (aka pam) before 1.2.1, when unable to directly access passwords, allows local users to enumerate usernames or cause a denial of service (hang) via a large password.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3238.html">CVE-2015-3238</cve>
<bugzilla href="https://bugzilla.suse.com/1123794">SUSE bug 1123794</bugzilla>
<bugzilla href="https://bugzilla.suse.com/934920">SUSE bug 934920</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009253961" comment="pam-1.1.5-0.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253962" comment="pam-32bit-1.1.5-0.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253963" comment="pam-doc-1.1.5-0.12.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3241</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-3241" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3241" source="CVE"/>
    <description>
    OpenStack Compute (nova) 2015.1 through 2015.1.1, 2014.2.3, and earlier does not stop the migration process when the instance is deleted, which allows remote authenticated users to cause a denial of service (disk, network, and other resource consumption) by resizing and then deleting an instance.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3241.html">CVE-2015-3241</cve>
<bugzilla href="https://bugzilla.suse.com/935017">SUSE bug 935017</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215896" comment="openstack-nova-2014.2.4~a0~dev80-20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215897" comment="openstack-nova-api-2014.2.4~a0~dev80-20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215898" comment="openstack-nova-cells-2014.2.4~a0~dev80-20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215899" comment="openstack-nova-cert-2014.2.4~a0~dev80-20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215900" comment="openstack-nova-compute-2014.2.4~a0~dev80-20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215901" comment="openstack-nova-conductor-2014.2.4~a0~dev80-20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215902" comment="openstack-nova-console-2014.2.4~a0~dev80-20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215903" comment="openstack-nova-consoleauth-2014.2.4~a0~dev80-20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215904" comment="openstack-nova-doc-2014.2.4~a0~dev80-20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215905" comment="openstack-nova-novncproxy-2014.2.4~a0~dev80-20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215906" comment="openstack-nova-objectstore-2014.2.4~a0~dev80-20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215907" comment="openstack-nova-scheduler-2014.2.4~a0~dev80-20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215908" comment="openstack-nova-serialproxy-2014.2.4~a0~dev80-20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215909" comment="openstack-nova-vncproxy-2014.2.4~a0~dev80-20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215910" comment="python-nova-2014.2.4~a0~dev80-20 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153259" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3259</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-3259" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3259" source="CVE"/>
    <description>
    Stack-based buffer overflow in the xl command line utility in Xen 4.1.x through 4.5.x allows local guest administrators to gain privileges via a long configuration argument.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3259.html">CVE-2015-3259</cve>
<bugzilla href="https://bugzilla.suse.com/935634">SUSE bug 935634</bugzilla>
<bugzilla href="https://bugzilla.suse.com/936281">SUSE bug 936281</bugzilla>
<bugzilla href="https://bugzilla.suse.com/937018">SUSE bug 937018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202109" comment="xen-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204871" comment="xen-doc-html-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204872" comment="xen-doc-pdf-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204873" comment="xen-kmp-default-4.2.5_12_3.0.101_0.47.55-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204874" comment="xen-kmp-pae-4.2.5_12_3.0.101_0.47.55-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204875" comment="xen-libs-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204876" comment="xen-libs-32bit-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204877" comment="xen-tools-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204878" comment="xen-tools-domU-4.2.5_12-15 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202109" comment="xen-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204871" comment="xen-doc-html-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204872" comment="xen-doc-pdf-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204873" comment="xen-kmp-default-4.2.5_12_3.0.101_0.47.55-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204875" comment="xen-libs-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204876" comment="xen-libs-32bit-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204877" comment="xen-tools-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204878" comment="xen-tools-domU-4.2.5_12-15 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153280" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3280</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-3280" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3280" source="CVE"/>
    <description>
    OpenStack Compute (nova) before 2014.2.4 (juno) and 2015.1.x before 2015.1.2 (kilo) does not properly delete instances from compute nodes, which allows remote authenticated users to cause a denial of service (disk consumption) by deleting instances while in the resize state.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3280.html">CVE-2015-3280</cve>
<bugzilla href="https://bugzilla.suse.com/1000443">SUSE bug 1000443</bugzilla>
<bugzilla href="https://bugzilla.suse.com/944178">SUSE bug 944178</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215896" comment="openstack-nova-2014.2.4~a0~dev80-20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215897" comment="openstack-nova-api-2014.2.4~a0~dev80-20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215898" comment="openstack-nova-cells-2014.2.4~a0~dev80-20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215899" comment="openstack-nova-cert-2014.2.4~a0~dev80-20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215900" comment="openstack-nova-compute-2014.2.4~a0~dev80-20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215901" comment="openstack-nova-conductor-2014.2.4~a0~dev80-20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215902" comment="openstack-nova-console-2014.2.4~a0~dev80-20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215903" comment="openstack-nova-consoleauth-2014.2.4~a0~dev80-20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215904" comment="openstack-nova-doc-2014.2.4~a0~dev80-20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215905" comment="openstack-nova-novncproxy-2014.2.4~a0~dev80-20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215906" comment="openstack-nova-objectstore-2014.2.4~a0~dev80-20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215907" comment="openstack-nova-scheduler-2014.2.4~a0~dev80-20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215908" comment="openstack-nova-serialproxy-2014.2.4~a0~dev80-20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215909" comment="openstack-nova-vncproxy-2014.2.4~a0~dev80-20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215910" comment="python-nova-2014.2.4~a0~dev80-20 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3281</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-3281" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3281" source="CVE"/>
    <description>
    The buffer_slow_realign function in HAProxy 1.5.x before 1.5.14 and 1.6-dev does not properly realign a buffer that is used for pending outgoing data, which allows remote attackers to obtain sensitive information (uninitialized memory contents of previous requests) via a crafted request.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3281.html">CVE-2015-3281</cve>
<bugzilla href="https://bugzilla.suse.com/937042">SUSE bug 937042</bugzilla>
<bugzilla href="https://bugzilla.suse.com/937202">SUSE bug 937202</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215791" comment="haproxy-1.5.4-12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3288</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-3288" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3288" source="CVE"/>
    <description>
    mm/memory.c in the Linux kernel before 4.1.4 mishandles anonymous pages, which allows local users to gain privileges or cause a denial of service (page tainting) via a crafted application that triggers writing to page zero.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3288.html">CVE-2015-3288</cve>
<bugzilla href="https://bugzilla.suse.com/979021">SUSE bug 979021</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208610" comment="kernel-bigsmp-3.0.101-0.47.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208611" comment="kernel-bigsmp-base-3.0.101-0.47.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208612" comment="kernel-bigsmp-devel-3.0.101-0.47.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205473" comment="kernel-default-3.0.101-0.47.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205474" comment="kernel-default-base-3.0.101-0.47.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205475" comment="kernel-default-devel-3.0.101-0.47.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208613" comment="kernel-default-man-3.0.101-0.47.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205476" comment="kernel-ec2-3.0.101-0.47.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205477" comment="kernel-ec2-base-3.0.101-0.47.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205478" comment="kernel-ec2-devel-3.0.101-0.47.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205479" comment="kernel-pae-3.0.101-0.47.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205480" comment="kernel-pae-base-3.0.101-0.47.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205481" comment="kernel-pae-devel-3.0.101-0.47.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205482" comment="kernel-source-3.0.101-0.47.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205483" comment="kernel-syms-3.0.101-0.47.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205484" comment="kernel-trace-3.0.101-0.47.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205485" comment="kernel-trace-base-3.0.101-0.47.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205486" comment="kernel-trace-devel-3.0.101-0.47.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205487" comment="kernel-xen-3.0.101-0.47.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205488" comment="kernel-xen-base-3.0.101-0.47.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205489" comment="kernel-xen-devel-3.0.101-0.47.102 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3294</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-3294" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3294" source="CVE"/>
    <description>
    The tcp_request function in Dnsmasq before 2.73rc4 does not properly handle the return value of the setup_reply function, which allows remote attackers to read process memory and cause a denial of service (out-of-bounds read and crash) via a malformed DNS request.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3294.html">CVE-2015-3294</cve>
<bugzilla href="https://bugzilla.suse.com/923144">SUSE bug 923144</bugzilla>
<bugzilla href="https://bugzilla.suse.com/928867">SUSE bug 928867</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204274" comment="dnsmasq-2.71-0.12.13 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205320" comment="dnsmasq-2.78-0.16.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3310</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-3310" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3310" source="CVE"/>
    <description>
    Buffer overflow in the rc_mksid function in plugins/radius/util.c in Paul's PPP Package (ppp) 2.4.6 and earlier, when the PID for pppd is greater than 65535, allows remote attackers to cause a denial of service (crash) via a start accounting message to the RADIUS server.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3310.html">CVE-2015-3310</cve>
<bugzilla href="https://bugzilla.suse.com/1149972">SUSE bug 1149972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/927841">SUSE bug 927841</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203396" comment="ppp-2.4.5.git-2.31 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153329" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3329</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-3329" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3329" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in the phar_set_inode function in phar_internal.h in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allow remote attackers to execute arbitrary code via a crafted length value in a (1) tar, (2) phar, or (3) ZIP archive.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3329.html">CVE-2015-3329</cve>
<bugzilla href="https://bugzilla.suse.com/928408">SUSE bug 928408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/928506">SUSE bug 928506</bugzilla>
<bugzilla href="https://bugzilla.suse.com/928511">SUSE bug 928511</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199864" comment="apache2-mod_php53-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199865" comment="php53-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199866" comment="php53-bcmath-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199867" comment="php53-bz2-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199868" comment="php53-calendar-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199869" comment="php53-ctype-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199870" comment="php53-curl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199871" comment="php53-dba-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199872" comment="php53-dom-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199873" comment="php53-exif-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199874" comment="php53-fastcgi-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199875" comment="php53-fileinfo-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199876" comment="php53-ftp-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199877" comment="php53-gd-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199878" comment="php53-gettext-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199879" comment="php53-gmp-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199880" comment="php53-iconv-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199881" comment="php53-intl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199882" comment="php53-json-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199883" comment="php53-ldap-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199884" comment="php53-mbstring-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199885" comment="php53-mcrypt-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199886" comment="php53-mysql-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199887" comment="php53-odbc-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199888" comment="php53-openssl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199889" comment="php53-pcntl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199890" comment="php53-pdo-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199891" comment="php53-pear-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199892" comment="php53-pgsql-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199893" comment="php53-pspell-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199894" comment="php53-shmop-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199895" comment="php53-snmp-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199896" comment="php53-soap-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199897" comment="php53-suhosin-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199898" comment="php53-sysvmsg-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199899" comment="php53-sysvsem-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199900" comment="php53-sysvshm-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199901" comment="php53-tokenizer-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199902" comment="php53-wddx-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199903" comment="php53-xmlreader-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199904" comment="php53-xmlrpc-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199905" comment="php53-xmlwriter-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199906" comment="php53-xsl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199907" comment="php53-zip-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199908" comment="php53-zlib-5.3.17-0.41 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153331" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3331</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-3331" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3331" source="CVE"/>
    <description>
    The __driver_rfc4106_decrypt function in arch/x86/crypto/aesni-intel_glue.c in the Linux kernel before 3.19.3 does not properly determine the memory locations used for encrypted data, which allows context-dependent attackers to cause a denial of service (buffer overflow and system crash) or possibly execute arbitrary code by triggering a crypto API call, as demonstrated by use of a libkcapi test program with an AF_ALG(aead) socket.
    </description>
<advisory from="security@suse.de">
<cve href="https://www.suse.com/security/cve/CVE-2015-3331.html">CVE-2015-3331</cve>
<bugzilla href="https://bugzilla.suse.com/927257">SUSE bug 927257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/931231">SUSE bug 931231</bugzilla>
<bugzilla href="https://bugzilla.suse.com/939262">SUSE bug 939262</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215410" comment="kernel-default-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215411" comment="kernel-default-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215412" comment="kernel-default-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264515" comment="kernel-default-man-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215451" comment="kernel-ec2-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215452" comment="kernel-ec2-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215453" comment="kernel-ec2-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264508" comment="kernel-pae-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264509" comment="kernel-pae-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264510" comment="kernel-pae-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264516" comment="kernel-ppc64-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264517" comment="kernel-ppc64-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264518" comment="kernel-ppc64-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215414" comment="kernel-source-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215415" comment="kernel-syms-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215454" comment="kernel-trace-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215455" comment="kernel-trace-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215416" comment="kernel-trace-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215417" comment="kernel-xen-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215418" comment="kernel-xen-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215419" comment="kernel-xen-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215421" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264390" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3339</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-3339" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3339" source="CVE"/>
    <description>
    Race condition in the prepare_binprm function in fs/exec.c in the Linux kernel before 3.19.6 allows local users to gain privileges by executing a setuid program at a time instant when a chown to root is in progress, and the ownership is changed but the setuid bit is not yet stripped.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3339.html">CVE-2015-3339</cve>
<bugzilla href="https://bugzilla.suse.com/903967">SUSE bug 903967</bugzilla>
<bugzilla href="https://bugzilla.suse.com/928130">SUSE bug 928130</bugzilla>
<bugzilla href="https://bugzilla.suse.com/939263">SUSE bug 939263</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215410" comment="kernel-default-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215411" comment="kernel-default-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215412" comment="kernel-default-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264515" comment="kernel-default-man-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215451" comment="kernel-ec2-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215452" comment="kernel-ec2-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215453" comment="kernel-ec2-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264508" comment="kernel-pae-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264509" comment="kernel-pae-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264510" comment="kernel-pae-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264516" comment="kernel-ppc64-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264517" comment="kernel-ppc64-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264518" comment="kernel-ppc64-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215414" comment="kernel-source-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215415" comment="kernel-syms-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215454" comment="kernel-trace-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215455" comment="kernel-trace-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215416" comment="kernel-trace-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215417" comment="kernel-xen-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215418" comment="kernel-xen-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215419" comment="kernel-xen-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215421" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264390" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3405</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-3405" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3405" source="CVE"/>
    <description>
    ntp-keygen in ntp 4.2.8px before 4.2.8p2-RC2 and 4.3.x before 4.3.12 does not generate MD5 keys with sufficient entropy on big endian machines when the lowest order byte of the temp variable is between 0x20 and 0x7f and not #, which might allow remote attackers to obtain the value of generated MD5 keys via a brute force attack with the 93 possible keys.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3405.html">CVE-2015-3405</cve>
<bugzilla href="https://bugzilla.suse.com/924202">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/928321">SUSE bug 928321</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215688" comment="ntp-4.2.4p8-1.29.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215689" comment="ntp-doc-4.2.4p8-1.29.36 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3411</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-3411" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3411" source="CVE"/>
    <description>
    PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to read or write to arbitrary files via crafted input to an application that calls (1) a DOMDocument load method, (2) the xmlwriter_open_uri function, (3) the finfo_file function, or (4) the hash_hmac_file function, as demonstrated by a filename\0.xml attack that bypasses an intended configuration in which client users may read only .xml files.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3411.html">CVE-2015-3411</cve>
<bugzilla href="https://bugzilla.suse.com/935074">SUSE bug 935074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/935227">SUSE bug 935227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/935229">SUSE bug 935229</bugzilla>
<bugzilla href="https://bugzilla.suse.com/935232">SUSE bug 935232</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215710" comment="apache2-mod_php53-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215711" comment="php53-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215712" comment="php53-bcmath-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215713" comment="php53-bz2-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215714" comment="php53-calendar-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215715" comment="php53-ctype-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215716" comment="php53-curl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215717" comment="php53-dba-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215718" comment="php53-dom-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215719" comment="php53-exif-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215720" comment="php53-fastcgi-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215721" comment="php53-fileinfo-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215722" comment="php53-ftp-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215723" comment="php53-gd-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215724" comment="php53-gettext-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215725" comment="php53-gmp-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215726" comment="php53-iconv-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215727" comment="php53-intl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215728" comment="php53-json-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215729" comment="php53-ldap-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215730" comment="php53-mbstring-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215731" comment="php53-mcrypt-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215732" comment="php53-mysql-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215733" comment="php53-odbc-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215734" comment="php53-openssl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215735" comment="php53-pcntl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215736" comment="php53-pdo-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215737" comment="php53-pear-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215738" comment="php53-pgsql-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215739" comment="php53-pspell-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215740" comment="php53-shmop-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215741" comment="php53-snmp-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215742" comment="php53-soap-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215743" comment="php53-suhosin-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215744" comment="php53-sysvmsg-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215745" comment="php53-sysvsem-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215746" comment="php53-sysvshm-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215747" comment="php53-tokenizer-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215748" comment="php53-wddx-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215749" comment="php53-xmlreader-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215750" comment="php53-xmlrpc-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215751" comment="php53-xmlwriter-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215752" comment="php53-xsl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215753" comment="php53-zip-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215754" comment="php53-zlib-5.3.17-0.43 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3412</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-3412" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3412" source="CVE"/>
    <description>
    PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to read arbitrary files via crafted input to an application that calls the stream_resolve_include_path function in ext/standard/streamsfuncs.c, as demonstrated by a filename\0.extension attack that bypasses an intended configuration in which client users may read files with only one specific extension.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3412.html">CVE-2015-3412</cve>
<bugzilla href="https://bugzilla.suse.com/935227">SUSE bug 935227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/935229">SUSE bug 935229</bugzilla>
<bugzilla href="https://bugzilla.suse.com/935232">SUSE bug 935232</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215710" comment="apache2-mod_php53-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215711" comment="php53-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215712" comment="php53-bcmath-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215713" comment="php53-bz2-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215714" comment="php53-calendar-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215715" comment="php53-ctype-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215716" comment="php53-curl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215717" comment="php53-dba-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215718" comment="php53-dom-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215719" comment="php53-exif-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215720" comment="php53-fastcgi-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215721" comment="php53-fileinfo-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215722" comment="php53-ftp-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215723" comment="php53-gd-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215724" comment="php53-gettext-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215725" comment="php53-gmp-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215726" comment="php53-iconv-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215727" comment="php53-intl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215728" comment="php53-json-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215729" comment="php53-ldap-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215730" comment="php53-mbstring-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215731" comment="php53-mcrypt-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215732" comment="php53-mysql-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215733" comment="php53-odbc-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215734" comment="php53-openssl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215735" comment="php53-pcntl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215736" comment="php53-pdo-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215737" comment="php53-pear-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215738" comment="php53-pgsql-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215739" comment="php53-pspell-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215740" comment="php53-shmop-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215741" comment="php53-snmp-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215742" comment="php53-soap-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215743" comment="php53-suhosin-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215744" comment="php53-sysvmsg-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215745" comment="php53-sysvsem-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215746" comment="php53-sysvshm-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215747" comment="php53-tokenizer-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215748" comment="php53-wddx-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215749" comment="php53-xmlreader-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215750" comment="php53-xmlrpc-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215751" comment="php53-xmlwriter-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215752" comment="php53-xsl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215753" comment="php53-zip-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215754" comment="php53-zlib-5.3.17-0.43 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3418</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-3418" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3418" source="CVE"/>
    <description>
    The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3418.html">CVE-2015-3418</cve>
<bugzilla href="https://bugzilla.suse.com/928520">SUSE bug 928520</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009200485" comment="xorg-x11-Xvnc-7.4-27.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200486" comment="xorg-x11-server-7.4-27.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009200487" comment="xorg-x11-server-extra-7.4-27.105 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3456</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-3456" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456" source="CVE"/>
    <description>
    The Floppy Disk Controller (FDC) in QEMU, as used in Xen 4.5.x and earlier and KVM, allows local guest users to cause a denial of service (out-of-bounds write and guest crash) or possibly execute arbitrary code via the (1) FD_CMD_READ_ID, (2) FD_CMD_DRIVE_SPECIFICATION_COMMAND, or other unspecified commands, aka VENOM.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3456.html">CVE-2015-3456</cve>
<bugzilla href="https://bugzilla.suse.com/929339">SUSE bug 929339</bugzilla>
<bugzilla href="https://bugzilla.suse.com/932770">SUSE bug 932770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/935900">SUSE bug 935900</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215762" comment="kvm-1.4.2-0.22.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204854" comment="xen-4.2.5_06-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204855" comment="xen-doc-html-4.2.5_06-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204856" comment="xen-doc-pdf-4.2.5_06-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204857" comment="xen-kmp-default-4.2.5_06_3.0.101_0.47.52-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204858" comment="xen-kmp-pae-4.2.5_06_3.0.101_0.47.52-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204859" comment="xen-libs-4.2.5_06-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204860" comment="xen-libs-32bit-4.2.5_06-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204861" comment="xen-tools-4.2.5_06-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204862" comment="xen-tools-domU-4.2.5_06-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215762" comment="kvm-1.4.2-0.22.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204854" comment="xen-4.2.5_06-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204855" comment="xen-doc-html-4.2.5_06-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204856" comment="xen-doc-pdf-4.2.5_06-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204857" comment="xen-kmp-default-4.2.5_06_3.0.101_0.47.52-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204859" comment="xen-libs-4.2.5_06-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204860" comment="xen-libs-32bit-4.2.5_06-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204861" comment="xen-tools-4.2.5_06-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204862" comment="xen-tools-domU-4.2.5_06-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3622</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-3622" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3622" source="CVE"/>
    <description>
    The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.5 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted certificate.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3622.html">CVE-2015-3622</cve>
<bugzilla href="https://bugzilla.suse.com/929414">SUSE bug 929414</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203210" comment="libtasn1-1.5-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210125" comment="libtasn1-3-1.5-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210126" comment="libtasn1-3-32bit-1.5-1.34 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-3636" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3636" source="CVE"/>
    <description>
    The ping_unhash function in net/ipv4/ping.c in the Linux kernel before 4.0.3 does not initialize a certain list data structure during an unhash operation, which allows local users to gain privileges or cause a denial of service (use-after-free and system crash) by leveraging the ability to make a SOCK_DGRAM socket system call for the IPPROTO_ICMP or IPPROTO_ICMPV6 protocol, and then making a connect system call after a disconnect.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3636.html">CVE-2015-3636</cve>
<bugzilla href="https://bugzilla.suse.com/929525">SUSE bug 929525</bugzilla>
<bugzilla href="https://bugzilla.suse.com/939277">SUSE bug 939277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/994624">SUSE bug 994624</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208587" comment="kernel-bigsmp-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208588" comment="kernel-bigsmp-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204509" comment="kernel-bigsmp-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215410" comment="kernel-default-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215411" comment="kernel-default-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215412" comment="kernel-default-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264515" comment="kernel-default-man-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215451" comment="kernel-ec2-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215452" comment="kernel-ec2-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215453" comment="kernel-ec2-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264508" comment="kernel-pae-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264509" comment="kernel-pae-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264510" comment="kernel-pae-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264516" comment="kernel-ppc64-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264517" comment="kernel-ppc64-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264518" comment="kernel-ppc64-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215414" comment="kernel-source-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215415" comment="kernel-syms-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215454" comment="kernel-trace-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215455" comment="kernel-trace-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215416" comment="kernel-trace-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215417" comment="kernel-xen-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215418" comment="kernel-xen-base-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215419" comment="kernel-xen-devel-3.0.101-0.47.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215421" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264390" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3646</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-3646" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3646" source="CVE"/>
    <description>
    OpenStack Identity (Keystone) before 2014.1.5 and 2014.2.x before 2014.2.4 logs the backend_argument configuration option content, which allows remote authenticated users to obtain passwords and other sensitive backend information by reading the Keystone logs.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3646.html">CVE-2015-3646</cve>
<bugzilla href="https://bugzilla.suse.com/929628">SUSE bug 929628</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215871" comment="openstack-keystone-2014.2.4.juno-17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215872" comment="openstack-keystone-doc-2014.2.4.juno-17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215873" comment="openstack-nova-2014.2.4.juno-29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215874" comment="openstack-nova-api-2014.2.4.juno-29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215875" comment="openstack-nova-cells-2014.2.4.juno-29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215876" comment="openstack-nova-cert-2014.2.4.juno-29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215877" comment="openstack-nova-compute-2014.2.4.juno-29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215878" comment="openstack-nova-conductor-2014.2.4.juno-29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215879" comment="openstack-nova-console-2014.2.4.juno-29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215880" comment="openstack-nova-consoleauth-2014.2.4.juno-29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215881" comment="openstack-nova-doc-2014.2.4.juno-29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215882" comment="openstack-nova-novncproxy-2014.2.4.juno-29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215883" comment="openstack-nova-objectstore-2014.2.4.juno-29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215884" comment="openstack-nova-scheduler-2014.2.4.juno-29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215885" comment="openstack-nova-serialproxy-2014.2.4.juno-29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215886" comment="openstack-nova-vncproxy-2014.2.4.juno-29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215887" comment="openstack-swift-2.1.0-14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215888" comment="openstack-swift-account-2.1.0-14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215889" comment="openstack-swift-container-2.1.0-14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215890" comment="openstack-swift-doc-2.1.0-14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215891" comment="openstack-swift-object-2.1.0-14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215892" comment="openstack-swift-proxy-2.1.0-14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215893" comment="python-keystone-2014.2.4.juno-17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215894" comment="python-nova-2014.2.4.juno-29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215895" comment="python-swift-2.1.0-14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3811</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-3811" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3811" source="CVE"/>
    <description>
    epan/dissectors/packet-wcp.c in the WCP dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 improperly refers to previously processed bytes, which allows remote attackers to cause a denial of service (application crash) via a crafted packet, a different vulnerability than CVE-2015-2188.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3811.html">CVE-2015-3811</cve>
<bugzilla href="https://bugzilla.suse.com/930689">SUSE bug 930689</bugzilla>
<bugzilla href="https://bugzilla.suse.com/930691">SUSE bug 930691</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215764" comment="wireshark-1.10.14-0.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3812</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-3812" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3812" source="CVE"/>
    <description>
    Multiple memory leaks in the x11_init_protocol function in epan/dissectors/packet-x11.c in the X11 dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 allow remote attackers to cause a denial of service (memory consumption) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3812.html">CVE-2015-3812</cve>
<bugzilla href="https://bugzilla.suse.com/930689">SUSE bug 930689</bugzilla>
<bugzilla href="https://bugzilla.suse.com/930691">SUSE bug 930691</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215764" comment="wireshark-1.10.14-0.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3813</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-3813" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3813" source="CVE"/>
    <description>
    The fragment_add_work function in epan/reassemble.c in the packet-reassembly feature in Wireshark 1.12.x before 1.12.5 does not properly determine the defragmentation state in a case of an insufficient snapshot length, which allows remote attackers to cause a denial of service (memory consumption) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3813.html">CVE-2015-3813</cve>
<bugzilla href="https://bugzilla.suse.com/930689">SUSE bug 930689</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202103" comment="wireshark-1.12.7-0.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-3814" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3814" source="CVE"/>
    <description>
    The (1) dissect_tfs_request and (2) dissect_tfs_response functions in epan/dissectors/packet-ieee80211.c in the IEEE 802.11 dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 interpret a zero value as a length rather than an error condition, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3814.html">CVE-2015-3814</cve>
<bugzilla href="https://bugzilla.suse.com/930689">SUSE bug 930689</bugzilla>
<bugzilla href="https://bugzilla.suse.com/930691">SUSE bug 930691</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215764" comment="wireshark-1.10.14-0.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3988</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-3988" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3988" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in OpenStack Dashboard (Horizon) 2015.1.0 allow remote authenticated users to inject arbitrary web script or HTML via the metadata to a (1) Glance image, (2) Nova flavor or (3) Host Aggregate.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3988.html">CVE-2015-3988</cve>
<bugzilla href="https://bugzilla.suse.com/931437">SUSE bug 931437</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215864" comment="crowbar-barclamp-nova_dashboard-1.9+git.1443622531.b2b2939-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215865" comment="openstack-dashboard-2014.2.4~a0~dev12-13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215866" comment="python-django_openstack_auth-1.1.7-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215867" comment="python-horizon-2014.2.4~a0~dev12-13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4000</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4000" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000" source="CVE"/>
    <description>
    The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the "Logjam" issue.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4000.html">CVE-2015-4000</cve>
<bugzilla href="https://bugzilla.suse.com/1074631">SUSE bug 1074631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/931600">SUSE bug 931600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/931698">SUSE bug 931698</bugzilla>
<bugzilla href="https://bugzilla.suse.com/931723">SUSE bug 931723</bugzilla>
<bugzilla href="https://bugzilla.suse.com/931845">SUSE bug 931845</bugzilla>
<bugzilla href="https://bugzilla.suse.com/932026">SUSE bug 932026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/932483">SUSE bug 932483</bugzilla>
<bugzilla href="https://bugzilla.suse.com/934789">SUSE bug 934789</bugzilla>
<bugzilla href="https://bugzilla.suse.com/935033">SUSE bug 935033</bugzilla>
<bugzilla href="https://bugzilla.suse.com/935540">SUSE bug 935540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
<bugzilla href="https://bugzilla.suse.com/936168">SUSE bug 936168</bugzilla>
<bugzilla href="https://bugzilla.suse.com/937202">SUSE bug 937202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/937724">SUSE bug 937724</bugzilla>
<bugzilla href="https://bugzilla.suse.com/937766">SUSE bug 937766</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938432">SUSE bug 938432</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938905">SUSE bug 938905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938906">SUSE bug 938906</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938913">SUSE bug 938913</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938945">SUSE bug 938945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/941696">SUSE bug 941696</bugzilla>
<bugzilla href="https://bugzilla.suse.com/943664">SUSE bug 943664</bugzilla>
<bugzilla href="https://bugzilla.suse.com/944729">SUSE bug 944729</bugzilla>
<bugzilla href="https://bugzilla.suse.com/945582">SUSE bug 945582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/955589">SUSE bug 955589</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980406">SUSE bug 980406</bugzilla>
<bugzilla href="https://bugzilla.suse.com/990592">SUSE bug 990592</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201557" comment="MozillaFirefox-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204203" comment="MozillaFirefox-translations-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208797" comment="compat-libldap-2_3-0-2.3.37-2.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201699" comment="gnutls-2.4.1-24.39.57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201725" comment="java-1_6_0-ibm-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201727" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207151" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207152" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201732" comment="java-1_7_0-ibm-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207724" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207725" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207726" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204204" comment="libfreebl3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204205" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201702" comment="libgnutls-extra26-2.4.1-24.39.57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204426" comment="libgnutls26-2.4.1-24.39.57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204427" comment="libgnutls26-32bit-2.4.1-24.39.57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204723" comment="libldap-2_4-2-2.4.26-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204724" comment="libldap-2_4-2-32bit-2.4.26-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215766" comment="libmysql55client18-5.5.43-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215767" comment="libmysql55client18-32bit-5.5.43-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215768" comment="libmysql55client_r18-5.5.43-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210049" comment="libmysqlclient15-5.0.96-0.8.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210050" comment="libmysqlclient15-32bit-5.0.96-0.8.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210052" comment="libmysqlclient_r15-5.0.96-0.8.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215682" comment="libopenssl0_9_8-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215683" comment="libopenssl0_9_8-32bit-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215685" comment="libopenssl0_9_8-hmac-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215686" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204206" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204207" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209932" comment="libtcnative-1-0-1.3.3-12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201559" comment="mozilla-nspr-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204208" comment="mozilla-nspr-32bit-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201561" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204209" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204210" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215774" comment="mysql-5.5.43-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215775" comment="mysql-client-5.5.43-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215780" comment="mysql-tools-5.5.43-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229378" comment="nagios-nrpe-2.12-24.4.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229379" comment="nagios-nrpe-doc-2.12-24.4.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229380" comment="nagios-plugins-nrpe-2.12-24.4.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201956" comment="openldap2-2.4.26-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208799" comment="openldap2-back-meta-2.4.26-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201958" comment="openldap2-client-2.4.26-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204730" comment="openssh-6.2p2-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204731" comment="openssh-askpass-6.2p2-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204732" comment="openssh-askpass-gnome-6.2p2-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215684" comment="openssl-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215687" comment="openssl-doc-0.9.8j-0.72 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201557" comment="MozillaFirefox-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204203" comment="MozillaFirefox-translations-31.8.0esr-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208797" comment="compat-libldap-2_3-0-2.3.37-2.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201699" comment="gnutls-2.4.1-24.39.57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201725" comment="java-1_6_0-ibm-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207150" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201727" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207151" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207152" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201732" comment="java-1_7_0-ibm-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207724" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207725" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207726" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204204" comment="libfreebl3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204205" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208382" comment="libfreebl3-x86-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201702" comment="libgnutls-extra26-2.4.1-24.39.57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204426" comment="libgnutls26-2.4.1-24.39.57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204427" comment="libgnutls26-32bit-2.4.1-24.39.57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208527" comment="libgnutls26-x86-2.4.1-24.39.57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204723" comment="libldap-2_4-2-2.4.26-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204724" comment="libldap-2_4-2-32bit-2.4.26-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208798" comment="libldap-2_4-2-x86-2.4.26-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215766" comment="libmysql55client18-5.5.43-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215767" comment="libmysql55client18-32bit-5.5.43-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264530" comment="libmysql55client18-x86-5.5.43-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215768" comment="libmysql55client_r18-5.5.43-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215770" comment="libmysqlclient15-5.0.96-0.8.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215771" comment="libmysqlclient15-32bit-5.0.96-0.8.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264531" comment="libmysqlclient15-x86-5.0.96-0.8.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215772" comment="libmysqlclient_r15-5.0.96-0.8.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215682" comment="libopenssl0_9_8-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215683" comment="libopenssl0_9_8-32bit-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215685" comment="libopenssl0_9_8-hmac-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215686" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264529" comment="libopenssl0_9_8-x86-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204206" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204207" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208383" comment="libsoftokn3-x86-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201559" comment="mozilla-nspr-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204208" comment="mozilla-nspr-32bit-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208384" comment="mozilla-nspr-x86-4.10.8-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201561" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204209" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204210" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208385" comment="mozilla-nss-x86-3.19.2_CKBI_1.98-0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215774" comment="mysql-5.5.43-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215775" comment="mysql-client-5.5.43-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215780" comment="mysql-tools-5.5.43-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201956" comment="openldap2-2.4.26-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208799" comment="openldap2-back-meta-2.4.26-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201958" comment="openldap2-client-2.4.26-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204730" comment="openssh-6.2p2-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204731" comment="openssh-askpass-6.2p2-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204732" comment="openssh-askpass-gnome-6.2p2-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215684" comment="openssl-0.9.8j-0.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215687" comment="openssl-doc-0.9.8j-0.72 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4021</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4021" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4021" source="CVE"/>
    <description>
    The phar_parse_tarfile function in ext/phar/tar.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 does not verify that the first character of a filename is different from the \0 character, which allows remote attackers to cause a denial of service (integer underflow and memory corruption) via a crafted entry in a tar archive.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4021.html">CVE-2015-4021</cve>
<bugzilla href="https://bugzilla.suse.com/931769">SUSE bug 931769</bugzilla>
<bugzilla href="https://bugzilla.suse.com/935074">SUSE bug 935074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199864" comment="apache2-mod_php53-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199865" comment="php53-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199866" comment="php53-bcmath-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199867" comment="php53-bz2-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199868" comment="php53-calendar-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199869" comment="php53-ctype-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199870" comment="php53-curl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199871" comment="php53-dba-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199872" comment="php53-dom-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199873" comment="php53-exif-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199874" comment="php53-fastcgi-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199875" comment="php53-fileinfo-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199876" comment="php53-ftp-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199877" comment="php53-gd-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199878" comment="php53-gettext-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199879" comment="php53-gmp-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199880" comment="php53-iconv-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199881" comment="php53-intl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199882" comment="php53-json-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199883" comment="php53-ldap-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199884" comment="php53-mbstring-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199885" comment="php53-mcrypt-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199886" comment="php53-mysql-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199887" comment="php53-odbc-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199888" comment="php53-openssl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199889" comment="php53-pcntl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199890" comment="php53-pdo-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199891" comment="php53-pear-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199892" comment="php53-pgsql-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199893" comment="php53-pspell-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199894" comment="php53-shmop-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199895" comment="php53-snmp-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199896" comment="php53-soap-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199897" comment="php53-suhosin-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199898" comment="php53-sysvmsg-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199899" comment="php53-sysvsem-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199900" comment="php53-sysvshm-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199901" comment="php53-tokenizer-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199902" comment="php53-wddx-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199903" comment="php53-xmlreader-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199904" comment="php53-xmlrpc-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199905" comment="php53-xmlwriter-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199906" comment="php53-xsl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199907" comment="php53-zip-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199908" comment="php53-zlib-5.3.17-0.41 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4022</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4022" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4022" source="CVE"/>
    <description>
    Integer overflow in the ftp_genlist function in ext/ftp/ftp.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 allows remote FTP servers to execute arbitrary code via a long reply to a LIST command, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4022.html">CVE-2015-4022</cve>
<bugzilla href="https://bugzilla.suse.com/931769">SUSE bug 931769</bugzilla>
<bugzilla href="https://bugzilla.suse.com/931772">SUSE bug 931772</bugzilla>
<bugzilla href="https://bugzilla.suse.com/935275">SUSE bug 935275</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199864" comment="apache2-mod_php53-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199865" comment="php53-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199866" comment="php53-bcmath-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199867" comment="php53-bz2-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199868" comment="php53-calendar-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199869" comment="php53-ctype-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199870" comment="php53-curl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199871" comment="php53-dba-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199872" comment="php53-dom-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199873" comment="php53-exif-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199874" comment="php53-fastcgi-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199875" comment="php53-fileinfo-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199876" comment="php53-ftp-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199877" comment="php53-gd-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199878" comment="php53-gettext-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199879" comment="php53-gmp-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199880" comment="php53-iconv-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199881" comment="php53-intl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199882" comment="php53-json-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199883" comment="php53-ldap-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199884" comment="php53-mbstring-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199885" comment="php53-mcrypt-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199886" comment="php53-mysql-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199887" comment="php53-odbc-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199888" comment="php53-openssl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199889" comment="php53-pcntl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199890" comment="php53-pdo-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199891" comment="php53-pear-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199892" comment="php53-pgsql-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199893" comment="php53-pspell-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199894" comment="php53-shmop-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199895" comment="php53-snmp-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199896" comment="php53-soap-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199897" comment="php53-suhosin-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199898" comment="php53-sysvmsg-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199899" comment="php53-sysvsem-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199900" comment="php53-sysvshm-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199901" comment="php53-tokenizer-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199902" comment="php53-wddx-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199903" comment="php53-xmlreader-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199904" comment="php53-xmlrpc-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199905" comment="php53-xmlwriter-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199906" comment="php53-xsl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199907" comment="php53-zip-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199908" comment="php53-zlib-5.3.17-0.41 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4024</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4024" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4024" source="CVE"/>
    <description>
    Algorithmic complexity vulnerability in the multipart_buffer_headers function in main/rfc1867.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 allows remote attackers to cause a denial of service (CPU consumption) via crafted form data that triggers an improper order-of-growth outcome.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4024.html">CVE-2015-4024</cve>
<bugzilla href="https://bugzilla.suse.com/931421">SUSE bug 931421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199864" comment="apache2-mod_php53-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199865" comment="php53-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199866" comment="php53-bcmath-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199867" comment="php53-bz2-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199868" comment="php53-calendar-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199869" comment="php53-ctype-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199870" comment="php53-curl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199871" comment="php53-dba-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199872" comment="php53-dom-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199873" comment="php53-exif-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199874" comment="php53-fastcgi-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199875" comment="php53-fileinfo-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199876" comment="php53-ftp-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199877" comment="php53-gd-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199878" comment="php53-gettext-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199879" comment="php53-gmp-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199880" comment="php53-iconv-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199881" comment="php53-intl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199882" comment="php53-json-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199883" comment="php53-ldap-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199884" comment="php53-mbstring-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199885" comment="php53-mcrypt-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199886" comment="php53-mysql-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199887" comment="php53-odbc-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199888" comment="php53-openssl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199889" comment="php53-pcntl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199890" comment="php53-pdo-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199891" comment="php53-pear-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199892" comment="php53-pgsql-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199893" comment="php53-pspell-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199894" comment="php53-shmop-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199895" comment="php53-snmp-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199896" comment="php53-soap-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199897" comment="php53-suhosin-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199898" comment="php53-sysvmsg-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199899" comment="php53-sysvsem-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199900" comment="php53-sysvshm-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199901" comment="php53-tokenizer-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199902" comment="php53-wddx-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199903" comment="php53-xmlreader-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199904" comment="php53-xmlrpc-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199905" comment="php53-xmlwriter-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199906" comment="php53-xsl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199907" comment="php53-zip-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199908" comment="php53-zlib-5.3.17-0.41 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4026</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4026" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4026" source="CVE"/>
    <description>
    The pcntl_exec implementation in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering a \x00 character, which might allow remote attackers to bypass intended extension restrictions and execute files with unexpected names via a crafted first argument.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4026.html">CVE-2015-4026</cve>
<bugzilla href="https://bugzilla.suse.com/931776">SUSE bug 931776</bugzilla>
<bugzilla href="https://bugzilla.suse.com/935227">SUSE bug 935227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009199864" comment="apache2-mod_php53-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199865" comment="php53-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199866" comment="php53-bcmath-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199867" comment="php53-bz2-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199868" comment="php53-calendar-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199869" comment="php53-ctype-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199870" comment="php53-curl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199871" comment="php53-dba-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199872" comment="php53-dom-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199873" comment="php53-exif-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199874" comment="php53-fastcgi-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199875" comment="php53-fileinfo-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199876" comment="php53-ftp-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199877" comment="php53-gd-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199878" comment="php53-gettext-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199879" comment="php53-gmp-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199880" comment="php53-iconv-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199881" comment="php53-intl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199882" comment="php53-json-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199883" comment="php53-ldap-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199884" comment="php53-mbstring-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199885" comment="php53-mcrypt-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199886" comment="php53-mysql-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199887" comment="php53-odbc-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199888" comment="php53-openssl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199889" comment="php53-pcntl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199890" comment="php53-pdo-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199891" comment="php53-pear-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199892" comment="php53-pgsql-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199893" comment="php53-pspell-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199894" comment="php53-shmop-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199895" comment="php53-snmp-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199896" comment="php53-soap-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199897" comment="php53-suhosin-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199898" comment="php53-sysvmsg-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199899" comment="php53-sysvsem-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199900" comment="php53-sysvshm-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199901" comment="php53-tokenizer-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199902" comment="php53-wddx-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199903" comment="php53-xmlreader-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199904" comment="php53-xmlrpc-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199905" comment="php53-xmlwriter-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199906" comment="php53-xsl-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199907" comment="php53-zip-5.3.17-0.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009199908" comment="php53-zlib-5.3.17-0.41 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4037</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4037" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4037" source="CVE"/>
    <description>
    The slirp_smb function in net/slirp.c in QEMU 2.3.0 and earlier creates temporary files with predictable names, which allows local users to cause a denial of service (instantiation failure) by creating /tmp/qemu-smb.*-* files before the program.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4037.html">CVE-2015-4037</cve>
<bugzilla href="https://bugzilla.suse.com/932267">SUSE bug 932267</bugzilla>
<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202111" comment="xen-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204879" comment="xen-doc-html-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204880" comment="xen-doc-pdf-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204881" comment="xen-kmp-default-4.2.5_14_3.0.101_0.47.67-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204882" comment="xen-kmp-pae-4.2.5_14_3.0.101_0.47.67-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204883" comment="xen-libs-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204884" comment="xen-libs-32bit-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204885" comment="xen-tools-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204886" comment="xen-tools-domU-4.2.5_14-18 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202111" comment="xen-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204879" comment="xen-doc-html-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204880" comment="xen-doc-pdf-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204881" comment="xen-kmp-default-4.2.5_14_3.0.101_0.47.67-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204883" comment="xen-libs-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204884" comment="xen-libs-32bit-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204885" comment="xen-tools-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204886" comment="xen-tools-domU-4.2.5_14-18 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4041</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4041" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4041" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4041.html">CVE-2015-4041</cve>
<bugzilla href="https://bugzilla.suse.com/928749">SUSE bug 928749</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009259453" comment="coreutils-8.12-6.25.33.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009259454" comment="coreutils-lang-8.12-6.25.33.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4042</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4042" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4042" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4042.html">CVE-2015-4042</cve>
<bugzilla href="https://bugzilla.suse.com/928749">SUSE bug 928749</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009259453" comment="coreutils-8.12-6.25.33.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009259454" comment="coreutils-lang-8.12-6.25.33.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4047</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4047" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4047" source="CVE"/>
    <description>
    racoon/gssapi.c in IPsec-Tools 0.8.2 allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon crash) via a series of crafted UDP requests.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4047.html">CVE-2015-4047</cve>
<bugzilla href="https://bugzilla.suse.com/931989">SUSE bug 931989</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208539" comment="ipsec-tools-0.7.3-1.13 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4103</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4103" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4103" source="CVE"/>
    <description>
    Xen 3.3.x through 4.5.x does not properly restrict write access to the host MSI message data field, which allows local x86 HVM guest administrators to cause a denial of service (host interrupt handling confusion) via vectors related to qemu and accessing spanning multiple fields.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4103.html">CVE-2015-4103</cve>
<bugzilla href="https://bugzilla.suse.com/931625">SUSE bug 931625</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204941" comment="xen-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204942" comment="xen-doc-html-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204943" comment="xen-doc-pdf-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204944" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204945" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204946" comment="xen-libs-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204947" comment="xen-libs-32bit-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204948" comment="xen-tools-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204949" comment="xen-tools-domU-4.2.5_08-0.9 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204941" comment="xen-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204942" comment="xen-doc-html-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204943" comment="xen-doc-pdf-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204944" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204946" comment="xen-libs-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204947" comment="xen-libs-32bit-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204948" comment="xen-tools-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204949" comment="xen-tools-domU-4.2.5_08-0.9 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4104</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4104" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4104" source="CVE"/>
    <description>
    Xen 3.3.x through 4.5.x does not properly restrict access to PCI MSI mask bits, which allows local x86 HVM guest users to cause a denial of service (unexpected interrupt and host crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4104.html">CVE-2015-4104</cve>
<bugzilla href="https://bugzilla.suse.com/931626">SUSE bug 931626</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204941" comment="xen-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204942" comment="xen-doc-html-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204943" comment="xen-doc-pdf-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204944" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204945" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204946" comment="xen-libs-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204947" comment="xen-libs-32bit-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204948" comment="xen-tools-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204949" comment="xen-tools-domU-4.2.5_08-0.9 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204941" comment="xen-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204942" comment="xen-doc-html-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204943" comment="xen-doc-pdf-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204944" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204946" comment="xen-libs-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204947" comment="xen-libs-32bit-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204948" comment="xen-tools-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204949" comment="xen-tools-domU-4.2.5_08-0.9 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4105</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4105" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4105" source="CVE"/>
    <description>
    Xen 3.3.x through 4.5.x enables logging for PCI MSI-X pass-through error messages, which allows local x86 HVM guests to cause a denial of service (host disk consumption) via certain invalid operations.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4105.html">CVE-2015-4105</cve>
<bugzilla href="https://bugzilla.suse.com/931627">SUSE bug 931627</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204941" comment="xen-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204942" comment="xen-doc-html-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204943" comment="xen-doc-pdf-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204944" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204945" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204946" comment="xen-libs-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204947" comment="xen-libs-32bit-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204948" comment="xen-tools-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204949" comment="xen-tools-domU-4.2.5_08-0.9 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204941" comment="xen-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204942" comment="xen-doc-html-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204943" comment="xen-doc-pdf-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204944" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204946" comment="xen-libs-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204947" comment="xen-libs-32bit-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204948" comment="xen-tools-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204949" comment="xen-tools-domU-4.2.5_08-0.9 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4106</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4106" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4106" source="CVE"/>
    <description>
    QEMU does not properly restrict write access to the PCI config space for certain PCI pass-through devices, which might allow local x86 HVM guests to gain privileges, cause a denial of service (host crash), obtain sensitive information, or possibly have other unspecified impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4106.html">CVE-2015-4106</cve>
<bugzilla href="https://bugzilla.suse.com/931628">SUSE bug 931628</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204941" comment="xen-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204942" comment="xen-doc-html-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204943" comment="xen-doc-pdf-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204944" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204945" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204946" comment="xen-libs-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204947" comment="xen-libs-32bit-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204948" comment="xen-tools-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204949" comment="xen-tools-domU-4.2.5_08-0.9 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204941" comment="xen-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204942" comment="xen-doc-html-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204943" comment="xen-doc-pdf-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204944" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204946" comment="xen-libs-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204947" comment="xen-libs-32bit-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204948" comment="xen-tools-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204949" comment="xen-tools-domU-4.2.5_08-0.9 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4116</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-4116" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4116" source="CVE"/>
    <description>
    Use-after-free vulnerability in the spl_ptr_heap_insert function in ext/spl/spl_heap.c in PHP before 5.5.27 and 5.6.x before 5.6.11 allows remote attackers to execute arbitrary code by triggering a failed SplMinHeap::compare operation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4116.html">CVE-2015-4116</cve>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208897" comment="apache2-mod_php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203264" comment="php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208898" comment="php53-bcmath-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208899" comment="php53-bz2-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208900" comment="php53-calendar-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208901" comment="php53-ctype-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208902" comment="php53-curl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208903" comment="php53-dba-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208904" comment="php53-dom-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208905" comment="php53-exif-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208906" comment="php53-fastcgi-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208907" comment="php53-fileinfo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208908" comment="php53-ftp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208909" comment="php53-gd-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208910" comment="php53-gettext-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208911" comment="php53-gmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208912" comment="php53-iconv-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208913" comment="php53-intl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208914" comment="php53-json-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208915" comment="php53-ldap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208916" comment="php53-mbstring-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208917" comment="php53-mcrypt-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208918" comment="php53-mysql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208919" comment="php53-odbc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208920" comment="php53-openssl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208921" comment="php53-pcntl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208922" comment="php53-pdo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208923" comment="php53-pear-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208924" comment="php53-pgsql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208925" comment="php53-pspell-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208926" comment="php53-shmop-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208927" comment="php53-snmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208928" comment="php53-soap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208929" comment="php53-suhosin-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208930" comment="php53-sysvmsg-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208931" comment="php53-sysvsem-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208932" comment="php53-sysvshm-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208933" comment="php53-tokenizer-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208934" comment="php53-wddx-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208935" comment="php53-xmlreader-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208936" comment="php53-xmlrpc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208937" comment="php53-xmlwriter-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208938" comment="php53-xsl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208939" comment="php53-zip-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208940" comment="php53-zlib-5.3.17-71 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4141</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4141" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4141" source="CVE"/>
    <description>
    The WPS UPnP function in hostapd, when using WPS AP, and wpa_supplicant, when using WPS external registrar (ER), 0.7.0 through 2.4 allows remote attackers to cause a denial of service (crash) via a negative chunk length, which triggers an out-of-bounds read or heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4141.html">CVE-2015-4141</cve>
<bugzilla href="https://bugzilla.suse.com/915323">SUSE bug 915323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/930077">SUSE bug 930077</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204852" comment="wpa_supplicant-0.7.1-6.17 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4142</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4142" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4142" source="CVE"/>
    <description>
    Integer underflow in the WMM Action frame parser in hostapd 0.5.5 through 2.4 and wpa_supplicant 0.7.0 through 2.4, when used for AP mode MLME/SME functionality, allows remote attackers to cause a denial of service (crash) via a crafted frame, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4142.html">CVE-2015-4142</cve>
<bugzilla href="https://bugzilla.suse.com/915323">SUSE bug 915323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/930078">SUSE bug 930078</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204852" comment="wpa_supplicant-0.7.1-6.17 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4148</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4148" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4148" source="CVE"/>
    <description>
    The do_soap_call function in ext/soap/soap.c in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 does not verify that the uri property is a string, which allows remote attackers to obtain sensitive information by providing crafted serialized data with an int data type, related to a "type confusion" issue.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4148.html">CVE-2015-4148</cve>
<bugzilla href="https://bugzilla.suse.com/933227">SUSE bug 933227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/935074">SUSE bug 935074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/935226">SUSE bug 935226</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215710" comment="apache2-mod_php53-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215711" comment="php53-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215712" comment="php53-bcmath-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215713" comment="php53-bz2-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215714" comment="php53-calendar-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215715" comment="php53-ctype-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215716" comment="php53-curl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215717" comment="php53-dba-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215718" comment="php53-dom-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215719" comment="php53-exif-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215720" comment="php53-fastcgi-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215721" comment="php53-fileinfo-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215722" comment="php53-ftp-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215723" comment="php53-gd-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215724" comment="php53-gettext-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215725" comment="php53-gmp-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215726" comment="php53-iconv-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215727" comment="php53-intl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215728" comment="php53-json-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215729" comment="php53-ldap-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215730" comment="php53-mbstring-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215731" comment="php53-mcrypt-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215732" comment="php53-mysql-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215733" comment="php53-odbc-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215734" comment="php53-openssl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215735" comment="php53-pcntl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215736" comment="php53-pdo-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215737" comment="php53-pear-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215738" comment="php53-pgsql-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215739" comment="php53-pspell-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215740" comment="php53-shmop-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215741" comment="php53-snmp-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215742" comment="php53-soap-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215743" comment="php53-suhosin-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215744" comment="php53-sysvmsg-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215745" comment="php53-sysvsem-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215746" comment="php53-sysvshm-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215747" comment="php53-tokenizer-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215748" comment="php53-wddx-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215749" comment="php53-xmlreader-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215750" comment="php53-xmlrpc-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215751" comment="php53-xmlwriter-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215752" comment="php53-xsl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215753" comment="php53-zip-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215754" comment="php53-zlib-5.3.17-0.43 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4163</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4163" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4163" source="CVE"/>
    <description>
    GNTTABOP_swap_grant_ref in Xen 4.2 through 4.5 does not check the grant table operation version, which allows local guest domains to cause a denial of service (NULL pointer dereference) via a hypercall without a GNTTABOP_setup_table or GNTTABOP_set_version.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4163.html">CVE-2015-4163</cve>
<bugzilla href="https://bugzilla.suse.com/932790">SUSE bug 932790</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204941" comment="xen-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204942" comment="xen-doc-html-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204943" comment="xen-doc-pdf-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204944" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204945" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204946" comment="xen-libs-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204947" comment="xen-libs-32bit-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204948" comment="xen-tools-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204949" comment="xen-tools-domU-4.2.5_08-0.9 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204941" comment="xen-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204942" comment="xen-doc-html-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204943" comment="xen-doc-pdf-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204944" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204946" comment="xen-libs-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204947" comment="xen-libs-32bit-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204948" comment="xen-tools-4.2.5_08-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204949" comment="xen-tools-domU-4.2.5_08-0.9 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4164</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4164" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4164" source="CVE"/>
    <description>
    The compat_iret function in Xen 3.1 through 4.5 iterates the wrong way through a loop, which allows local 32-bit PV guest administrators to cause a denial of service (large loop and system hang) via a hypercall_iret call with EFLAGS.VM set.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4164.html">CVE-2015-4164</cve>
<bugzilla href="https://bugzilla.suse.com/932996">SUSE bug 932996</bugzilla>
<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202109" comment="xen-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204871" comment="xen-doc-html-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204872" comment="xen-doc-pdf-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204873" comment="xen-kmp-default-4.2.5_12_3.0.101_0.47.55-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204874" comment="xen-kmp-pae-4.2.5_12_3.0.101_0.47.55-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204875" comment="xen-libs-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204876" comment="xen-libs-32bit-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204877" comment="xen-tools-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204878" comment="xen-tools-domU-4.2.5_12-15 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202109" comment="xen-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204871" comment="xen-doc-html-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204872" comment="xen-doc-pdf-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204873" comment="xen-kmp-default-4.2.5_12_3.0.101_0.47.55-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204875" comment="xen-libs-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204876" comment="xen-libs-32bit-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204877" comment="xen-tools-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204878" comment="xen-tools-domU-4.2.5_12-15 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4167</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
    </affected>
    <reference ref_id="CVE-2015-4167" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4167" source="CVE"/>
    <description>
    The udf_read_inode function in fs/udf/inode.c in the Linux kernel before 3.19.1 does not validate certain length values, which allows local users to cause a denial of service (incorrect data representation or integer overflow, and OOPS) via a crafted UDF filesystem.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4167.html">CVE-2015-4167</cve>
<bugzilla href="https://bugzilla.suse.com/917839">SUSE bug 917839</bugzilla>
<bugzilla href="https://bugzilla.suse.com/933907">SUSE bug 933907</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204527" comment="kernel-bigsmp-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208622" comment="kernel-bigsmp-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204528" comment="kernel-bigsmp-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204529" comment="kernel-default-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204530" comment="kernel-default-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204531" comment="kernel-default-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208623" comment="kernel-default-man-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208624" comment="kernel-ec2-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208625" comment="kernel-ec2-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208626" comment="kernel-ec2-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204533" comment="kernel-pae-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204534" comment="kernel-pae-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204535" comment="kernel-pae-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208627" comment="kernel-ppc64-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208628" comment="kernel-ppc64-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208629" comment="kernel-ppc64-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204537" comment="kernel-source-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204538" comment="kernel-syms-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204539" comment="kernel-trace-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208630" comment="kernel-trace-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204540" comment="kernel-trace-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204541" comment="kernel-xen-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204542" comment="kernel-xen-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204543" comment="kernel-xen-devel-3.0.101-0.47.67 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4171</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4171" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4171" source="CVE"/>
    <description>
    strongSwan 4.3.0 through 5.x before 5.3.2 and strongSwan VPN Client before 1.4.6, when using EAP or pre-shared keys for authenticating an IKEv2 connection, does not enforce server authentication restrictions until the entire authentication process is complete, which allows remote servers to obtain credentials by using a valid certificate and then reading the responses.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4171.html">CVE-2015-4171</cve>
<bugzilla href="https://bugzilla.suse.com/931845">SUSE bug 931845</bugzilla>
<bugzilla href="https://bugzilla.suse.com/933591">SUSE bug 933591</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215781" comment="strongswan-4.4.0-6.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215782" comment="strongswan-doc-4.4.0-6.27 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4410</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-4410" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4410" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4410.html">CVE-2015-4410</cve>
<bugzilla href="https://bugzilla.suse.com/933961">SUSE bug 933961</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215956" comment="ruby2.1-rubygem-bson-1_11-1.11.1-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215957" comment="ruby2.1-rubygem-easy_diff-0.0.5-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215958" comment="ruby2.1-rubygem-redcarpet-3.2.3-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215959" comment="ruby2.1-rubygem-sprockets-2_11-2.11.3-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215960" comment="rubygem-bson-1_11-1.11.1-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215961" comment="rubygem-easy_diff-0.0.5-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215962" comment="rubygem-redcarpet-3.2.3-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215963" comment="rubygem-sprockets-2_11-2.11.3-11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4467</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4467" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4467" source="CVE"/>
    <description>
    The chmd_init_decomp function in chmd.c in libmspack before 0.5 does not properly validate the reset interval, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted CHM file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4467.html">CVE-2015-4467</cve>
<bugzilla href="https://bugzilla.suse.com/934524">SUSE bug 934524</bugzilla>
<bugzilla href="https://bugzilla.suse.com/934525">SUSE bug 934525</bugzilla>
<bugzilla href="https://bugzilla.suse.com/934529">SUSE bug 934529</bugzilla>
<bugzilla href="https://bugzilla.suse.com/934533">SUSE bug 934533</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201785" comment="libmspack-0.0.20060920alpha-74.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204616" comment="libmspack0-0.0.20060920alpha-74.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4469</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4469" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4469" source="CVE"/>
    <description>
    The chmd_read_headers function in chmd.c in libmspack before 0.5 does not validate name lengths, which allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted CHM file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4469.html">CVE-2015-4469</cve>
<bugzilla href="https://bugzilla.suse.com/934524">SUSE bug 934524</bugzilla>
<bugzilla href="https://bugzilla.suse.com/934526">SUSE bug 934526</bugzilla>
<bugzilla href="https://bugzilla.suse.com/934529">SUSE bug 934529</bugzilla>
<bugzilla href="https://bugzilla.suse.com/934533">SUSE bug 934533</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201785" comment="libmspack-0.0.20060920alpha-74.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204616" comment="libmspack0-0.0.20060920alpha-74.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4470</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4470" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4470" source="CVE"/>
    <description>
    Off-by-one error in the inflate function in mszipd.c in libmspack before 0.5 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted CAB archive.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4470.html">CVE-2015-4470</cve>
<bugzilla href="https://bugzilla.suse.com/934527">SUSE bug 934527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/934533">SUSE bug 934533</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201785" comment="libmspack-0.0.20060920alpha-74.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204616" comment="libmspack0-0.0.20060920alpha-74.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4471</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4471" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4471" source="CVE"/>
    <description>
    Off-by-one error in the lzxd_decompress function in lzxd.c in libmspack before 0.5 allows remote attackers to cause a denial of service (buffer under-read and application crash) via a crafted CAB archive.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4471.html">CVE-2015-4471</cve>
<bugzilla href="https://bugzilla.suse.com/934528">SUSE bug 934528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/934533">SUSE bug 934533</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201785" comment="libmspack-0.0.20060920alpha-74.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204616" comment="libmspack0-0.0.20060920alpha-74.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4472</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4472" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4472" source="CVE"/>
    <description>
    Off-by-one error in the READ_ENCINT macro in chmd.c in libmspack before 0.5 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted CHM file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4472.html">CVE-2015-4472</cve>
<bugzilla href="https://bugzilla.suse.com/934525">SUSE bug 934525</bugzilla>
<bugzilla href="https://bugzilla.suse.com/934529">SUSE bug 934529</bugzilla>
<bugzilla href="https://bugzilla.suse.com/934533">SUSE bug 934533</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201785" comment="libmspack-0.0.20060920alpha-74.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204616" comment="libmspack0-0.0.20060920alpha-74.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4473</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4473" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4473.html">CVE-2015-4473</cve>
<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201669" comment="MozillaFirefox-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204358" comment="MozillaFirefox-branding-SLED-31.0-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204359" comment="MozillaFirefox-translations-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204360" comment="libfreebl3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204361" comment="libfreebl3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204362" comment="libsoftokn3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204363" comment="libsoftokn3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201671" comment="mozilla-nss-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204364" comment="mozilla-nss-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204365" comment="mozilla-nss-tools-3.19.2.0-0.16 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201669" comment="MozillaFirefox-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204358" comment="MozillaFirefox-branding-SLED-31.0-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204359" comment="MozillaFirefox-translations-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204360" comment="libfreebl3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204361" comment="libfreebl3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208489" comment="libfreebl3-x86-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204362" comment="libsoftokn3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204363" comment="libsoftokn3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208490" comment="libsoftokn3-x86-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201671" comment="mozilla-nss-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204364" comment="mozilla-nss-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204365" comment="mozilla-nss-tools-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208491" comment="mozilla-nss-x86-3.19.2.0-0.16 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4474</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4474" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4474" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 40.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4474.html">CVE-2015-4474</cve>
<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201669" comment="MozillaFirefox-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204358" comment="MozillaFirefox-branding-SLED-31.0-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204359" comment="MozillaFirefox-translations-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204360" comment="libfreebl3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204361" comment="libfreebl3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204362" comment="libsoftokn3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204363" comment="libsoftokn3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201671" comment="mozilla-nss-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204364" comment="mozilla-nss-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204365" comment="mozilla-nss-tools-3.19.2.0-0.16 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201669" comment="MozillaFirefox-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204358" comment="MozillaFirefox-branding-SLED-31.0-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204359" comment="MozillaFirefox-translations-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204360" comment="libfreebl3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204361" comment="libfreebl3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208489" comment="libfreebl3-x86-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204362" comment="libsoftokn3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204363" comment="libsoftokn3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208490" comment="libsoftokn3-x86-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201671" comment="mozilla-nss-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204364" comment="mozilla-nss-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204365" comment="mozilla-nss-tools-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208491" comment="mozilla-nss-x86-3.19.2.0-0.16 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4475</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4475" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475" source="CVE"/>
    <description>
    The mozilla::AudioSink function in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 mishandles inconsistent sample formats within MP3 audio data, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via a malformed file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4475.html">CVE-2015-4475</cve>
<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201669" comment="MozillaFirefox-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204358" comment="MozillaFirefox-branding-SLED-31.0-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204359" comment="MozillaFirefox-translations-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204360" comment="libfreebl3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204361" comment="libfreebl3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204362" comment="libsoftokn3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204363" comment="libsoftokn3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201671" comment="mozilla-nss-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204364" comment="mozilla-nss-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204365" comment="mozilla-nss-tools-3.19.2.0-0.16 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201669" comment="MozillaFirefox-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204358" comment="MozillaFirefox-branding-SLED-31.0-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204359" comment="MozillaFirefox-translations-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204360" comment="libfreebl3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204361" comment="libfreebl3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208489" comment="libfreebl3-x86-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204362" comment="libsoftokn3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204363" comment="libsoftokn3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208490" comment="libsoftokn3-x86-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201671" comment="mozilla-nss-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204364" comment="mozilla-nss-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204365" comment="mozilla-nss-tools-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208491" comment="mozilla-nss-x86-3.19.2.0-0.16 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4478</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4478" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478" source="CVE"/>
    <description>
    Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 do not impose certain ECMAScript 6 requirements on JavaScript object properties, which allows remote attackers to bypass the Same Origin Policy via the reviver parameter to the JSON.parse method.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4478.html">CVE-2015-4478</cve>
<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201669" comment="MozillaFirefox-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204358" comment="MozillaFirefox-branding-SLED-31.0-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204359" comment="MozillaFirefox-translations-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204360" comment="libfreebl3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204361" comment="libfreebl3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204362" comment="libsoftokn3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204363" comment="libsoftokn3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201671" comment="mozilla-nss-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204364" comment="mozilla-nss-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204365" comment="mozilla-nss-tools-3.19.2.0-0.16 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201669" comment="MozillaFirefox-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204358" comment="MozillaFirefox-branding-SLED-31.0-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204359" comment="MozillaFirefox-translations-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204360" comment="libfreebl3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204361" comment="libfreebl3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208489" comment="libfreebl3-x86-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204362" comment="libsoftokn3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204363" comment="libsoftokn3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208490" comment="libsoftokn3-x86-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201671" comment="mozilla-nss-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204364" comment="mozilla-nss-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204365" comment="mozilla-nss-tools-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208491" comment="mozilla-nss-x86-3.19.2.0-0.16 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4479</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4479" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479" source="CVE"/>
    <description>
    Multiple integer overflows in libstagefright in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allow remote attackers to execute arbitrary code via a crafted saio chunk in MPEG-4 video data.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4479.html">CVE-2015-4479</cve>
<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201669" comment="MozillaFirefox-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204358" comment="MozillaFirefox-branding-SLED-31.0-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204359" comment="MozillaFirefox-translations-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204360" comment="libfreebl3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204361" comment="libfreebl3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204362" comment="libsoftokn3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204363" comment="libsoftokn3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201671" comment="mozilla-nss-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204364" comment="mozilla-nss-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204365" comment="mozilla-nss-tools-3.19.2.0-0.16 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201669" comment="MozillaFirefox-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204358" comment="MozillaFirefox-branding-SLED-31.0-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204359" comment="MozillaFirefox-translations-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204360" comment="libfreebl3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204361" comment="libfreebl3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208489" comment="libfreebl3-x86-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204362" comment="libsoftokn3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204363" comment="libsoftokn3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208490" comment="libsoftokn3-x86-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201671" comment="mozilla-nss-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204364" comment="mozilla-nss-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204365" comment="mozilla-nss-tools-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208491" comment="mozilla-nss-x86-3.19.2.0-0.16 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4484" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484" source="CVE"/>
    <description>
    The js::jit::AssemblerX86Shared::lock_addl function in the JavaScript implementation in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to cause a denial of service (application crash) by leveraging the use of shared memory and accessing (1) an Atomics object or (2) a SharedArrayBuffer object.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4484.html">CVE-2015-4484</cve>
<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201669" comment="MozillaFirefox-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204358" comment="MozillaFirefox-branding-SLED-31.0-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204359" comment="MozillaFirefox-translations-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204360" comment="libfreebl3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204361" comment="libfreebl3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204362" comment="libsoftokn3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204363" comment="libsoftokn3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201671" comment="mozilla-nss-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204364" comment="mozilla-nss-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204365" comment="mozilla-nss-tools-3.19.2.0-0.16 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201669" comment="MozillaFirefox-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204358" comment="MozillaFirefox-branding-SLED-31.0-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204359" comment="MozillaFirefox-translations-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204360" comment="libfreebl3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204361" comment="libfreebl3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208489" comment="libfreebl3-x86-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204362" comment="libsoftokn3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204363" comment="libsoftokn3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208490" comment="libsoftokn3-x86-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201671" comment="mozilla-nss-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204364" comment="mozilla-nss-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204365" comment="mozilla-nss-tools-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208491" comment="mozilla-nss-x86-3.19.2.0-0.16 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4485" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4485" source="CVE"/>
    <description>
    Heap-based buffer overflow in the resize_context_buffers function in libvpx in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code via malformed WebM video data.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4485.html">CVE-2015-4485</cve>
<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201669" comment="MozillaFirefox-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204358" comment="MozillaFirefox-branding-SLED-31.0-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204359" comment="MozillaFirefox-translations-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204360" comment="libfreebl3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204361" comment="libfreebl3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204362" comment="libsoftokn3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204363" comment="libsoftokn3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201671" comment="mozilla-nss-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204364" comment="mozilla-nss-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204365" comment="mozilla-nss-tools-3.19.2.0-0.16 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201669" comment="MozillaFirefox-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204358" comment="MozillaFirefox-branding-SLED-31.0-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204359" comment="MozillaFirefox-translations-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204360" comment="libfreebl3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204361" comment="libfreebl3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208489" comment="libfreebl3-x86-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204362" comment="libsoftokn3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204363" comment="libsoftokn3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208490" comment="libsoftokn3-x86-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201671" comment="mozilla-nss-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204364" comment="mozilla-nss-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204365" comment="mozilla-nss-tools-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208491" comment="mozilla-nss-x86-3.19.2.0-0.16 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4486</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4486" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4486" source="CVE"/>
    <description>
    The decrease_ref_count function in libvpx in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via malformed WebM video data.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4486.html">CVE-2015-4486</cve>
<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201669" comment="MozillaFirefox-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204358" comment="MozillaFirefox-branding-SLED-31.0-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204359" comment="MozillaFirefox-translations-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204360" comment="libfreebl3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204361" comment="libfreebl3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204362" comment="libsoftokn3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204363" comment="libsoftokn3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201671" comment="mozilla-nss-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204364" comment="mozilla-nss-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204365" comment="mozilla-nss-tools-3.19.2.0-0.16 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201669" comment="MozillaFirefox-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204358" comment="MozillaFirefox-branding-SLED-31.0-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204359" comment="MozillaFirefox-translations-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204360" comment="libfreebl3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204361" comment="libfreebl3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208489" comment="libfreebl3-x86-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204362" comment="libsoftokn3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204363" comment="libsoftokn3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208490" comment="libsoftokn3-x86-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201671" comment="mozilla-nss-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204364" comment="mozilla-nss-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204365" comment="mozilla-nss-tools-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208491" comment="mozilla-nss-x86-3.19.2.0-0.16 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4487</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4487" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487" source="CVE"/>
    <description>
    The nsTSubstring::ReplacePrep function in Mozilla Firefox before 40.0, Firefox ESR 38.x before 38.2, and Firefox OS before 2.2 might allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors, related to an "overflow."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4487.html">CVE-2015-4487</cve>
<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201669" comment="MozillaFirefox-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204358" comment="MozillaFirefox-branding-SLED-31.0-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204359" comment="MozillaFirefox-translations-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204360" comment="libfreebl3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204361" comment="libfreebl3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204362" comment="libsoftokn3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204363" comment="libsoftokn3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201671" comment="mozilla-nss-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204364" comment="mozilla-nss-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204365" comment="mozilla-nss-tools-3.19.2.0-0.16 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201669" comment="MozillaFirefox-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204358" comment="MozillaFirefox-branding-SLED-31.0-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204359" comment="MozillaFirefox-translations-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204360" comment="libfreebl3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204361" comment="libfreebl3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208489" comment="libfreebl3-x86-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204362" comment="libsoftokn3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204363" comment="libsoftokn3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208490" comment="libsoftokn3-x86-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201671" comment="mozilla-nss-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204364" comment="mozilla-nss-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204365" comment="mozilla-nss-tools-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208491" comment="mozilla-nss-x86-3.19.2.0-0.16 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4488</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4488" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488" source="CVE"/>
    <description>
    Use-after-free vulnerability in the StyleAnimationValue class in Mozilla Firefox before 40.0, Firefox ESR 38.x before 38.2, and Firefox OS before 2.2 allows remote attackers to have an unspecified impact by leveraging a StyleAnimationValue::operator self assignment.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4488.html">CVE-2015-4488</cve>
<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201669" comment="MozillaFirefox-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204358" comment="MozillaFirefox-branding-SLED-31.0-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204359" comment="MozillaFirefox-translations-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204360" comment="libfreebl3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204361" comment="libfreebl3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204362" comment="libsoftokn3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204363" comment="libsoftokn3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201671" comment="mozilla-nss-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204364" comment="mozilla-nss-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204365" comment="mozilla-nss-tools-3.19.2.0-0.16 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201669" comment="MozillaFirefox-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204358" comment="MozillaFirefox-branding-SLED-31.0-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204359" comment="MozillaFirefox-translations-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204360" comment="libfreebl3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204361" comment="libfreebl3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208489" comment="libfreebl3-x86-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204362" comment="libsoftokn3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204363" comment="libsoftokn3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208490" comment="libsoftokn3-x86-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201671" comment="mozilla-nss-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204364" comment="mozilla-nss-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204365" comment="mozilla-nss-tools-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208491" comment="mozilla-nss-x86-3.19.2.0-0.16 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4489</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4489" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489" source="CVE"/>
    <description>
    The nsTArray_Impl class in Mozilla Firefox before 40.0, Firefox ESR 38.x before 38.2, and Firefox OS before 2.2 might allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging a self assignment.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4489.html">CVE-2015-4489</cve>
<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201669" comment="MozillaFirefox-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204358" comment="MozillaFirefox-branding-SLED-31.0-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204359" comment="MozillaFirefox-translations-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204360" comment="libfreebl3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204361" comment="libfreebl3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204362" comment="libsoftokn3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204363" comment="libsoftokn3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201671" comment="mozilla-nss-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204364" comment="mozilla-nss-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204365" comment="mozilla-nss-tools-3.19.2.0-0.16 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201669" comment="MozillaFirefox-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204358" comment="MozillaFirefox-branding-SLED-31.0-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204359" comment="MozillaFirefox-translations-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204360" comment="libfreebl3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204361" comment="libfreebl3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208489" comment="libfreebl3-x86-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204362" comment="libsoftokn3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204363" comment="libsoftokn3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208490" comment="libsoftokn3-x86-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201671" comment="mozilla-nss-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204364" comment="mozilla-nss-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204365" comment="mozilla-nss-tools-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208491" comment="mozilla-nss-x86-3.19.2.0-0.16 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4491</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4491" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4491" source="CVE"/>
    <description>
    Integer overflow in the make_filter_table function in pixops/pixops.c in gdk-pixbuf before 2.31.5, as used in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 on Linux, Google Chrome on Linux, and other products, allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow and application crash) via crafted bitmap dimensions that are mishandled during scaling.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4491.html">CVE-2015-4491</cve>
<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/942801">SUSE bug 942801</bugzilla>
<bugzilla href="https://bugzilla.suse.com/948790">SUSE bug 948790</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201669" comment="MozillaFirefox-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204358" comment="MozillaFirefox-branding-SLED-31.0-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204359" comment="MozillaFirefox-translations-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201707" comment="gtk2-2.18.9-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204447" comment="gtk2-32bit-2.18.9-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208529" comment="gtk2-doc-2.18.9-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204448" comment="gtk2-lang-2.18.9-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204360" comment="libfreebl3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204361" comment="libfreebl3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204362" comment="libsoftokn3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204363" comment="libsoftokn3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201671" comment="mozilla-nss-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204364" comment="mozilla-nss-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204365" comment="mozilla-nss-tools-3.19.2.0-0.16 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201669" comment="MozillaFirefox-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204358" comment="MozillaFirefox-branding-SLED-31.0-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204359" comment="MozillaFirefox-translations-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201707" comment="gtk2-2.18.9-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204447" comment="gtk2-32bit-2.18.9-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208529" comment="gtk2-doc-2.18.9-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204448" comment="gtk2-lang-2.18.9-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208530" comment="gtk2-x86-2.18.9-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204360" comment="libfreebl3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204361" comment="libfreebl3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208489" comment="libfreebl3-x86-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204362" comment="libsoftokn3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204363" comment="libsoftokn3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208490" comment="libsoftokn3-x86-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201671" comment="mozilla-nss-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204364" comment="mozilla-nss-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204365" comment="mozilla-nss-tools-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208491" comment="mozilla-nss-x86-3.19.2.0-0.16 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4492</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4492" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492" source="CVE"/>
    <description>
    Use-after-free vulnerability in the XMLHttpRequest::Open implementation in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 might allow remote attackers to execute arbitrary code via a SharedWorker object that makes recursive calls to the open method of an XMLHttpRequest object.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4492.html">CVE-2015-4492</cve>
<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201669" comment="MozillaFirefox-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204358" comment="MozillaFirefox-branding-SLED-31.0-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204359" comment="MozillaFirefox-translations-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204360" comment="libfreebl3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204361" comment="libfreebl3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204362" comment="libsoftokn3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204363" comment="libsoftokn3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201671" comment="mozilla-nss-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204364" comment="mozilla-nss-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204365" comment="mozilla-nss-tools-3.19.2.0-0.16 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201669" comment="MozillaFirefox-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204358" comment="MozillaFirefox-branding-SLED-31.0-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204359" comment="MozillaFirefox-translations-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204360" comment="libfreebl3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204361" comment="libfreebl3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208489" comment="libfreebl3-x86-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204362" comment="libsoftokn3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204363" comment="libsoftokn3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208490" comment="libsoftokn3-x86-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201671" comment="mozilla-nss-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204364" comment="mozilla-nss-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204365" comment="mozilla-nss-tools-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208491" comment="mozilla-nss-x86-3.19.2.0-0.16 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4495</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4495" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4495" source="CVE"/>
    <description>
    The PDF reader in Mozilla Firefox before 39.0.3, Firefox ESR 38.x before 38.1.1, and Firefox OS before 2.2 allows remote attackers to bypass the Same Origin Policy, and read arbitrary files or gain privileges, via vectors involving crafted JavaScript code and a native setter, as exploited in the wild in August 2015.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4495.html">CVE-2015-4495</cve>
<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/940918">SUSE bug 940918</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201669" comment="MozillaFirefox-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204358" comment="MozillaFirefox-branding-SLED-31.0-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204359" comment="MozillaFirefox-translations-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204360" comment="libfreebl3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204361" comment="libfreebl3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204362" comment="libsoftokn3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204363" comment="libsoftokn3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201671" comment="mozilla-nss-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204364" comment="mozilla-nss-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204365" comment="mozilla-nss-tools-3.19.2.0-0.16 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201669" comment="MozillaFirefox-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204358" comment="MozillaFirefox-branding-SLED-31.0-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204359" comment="MozillaFirefox-translations-38.2.1esr-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204360" comment="libfreebl3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204361" comment="libfreebl3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208489" comment="libfreebl3-x86-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204362" comment="libsoftokn3-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204363" comment="libsoftokn3-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208490" comment="libsoftokn3-x86-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201671" comment="mozilla-nss-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204364" comment="mozilla-nss-32bit-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204365" comment="mozilla-nss-tools-3.19.2.0-0.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208491" comment="mozilla-nss-x86-3.19.2.0-0.16 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4500</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4500" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4500.html">CVE-2015-4500</cve>
<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201657" comment="MozillaFirefox-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204329" comment="MozillaFirefox-translations-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201655" comment="mozilla-nspr-4.10.9-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204328" comment="mozilla-nspr-32bit-4.10.9-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208472" comment="mozilla-nspr-x86-4.10.9-11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201657" comment="MozillaFirefox-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204329" comment="MozillaFirefox-translations-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201655" comment="mozilla-nspr-4.10.9-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204328" comment="mozilla-nspr-32bit-4.10.9-11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4501</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4501" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4501" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 41.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4501.html">CVE-2015-4501</cve>
<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201657" comment="MozillaFirefox-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204329" comment="MozillaFirefox-translations-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201655" comment="mozilla-nspr-4.10.9-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204328" comment="mozilla-nspr-32bit-4.10.9-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208472" comment="mozilla-nspr-x86-4.10.9-11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201657" comment="MozillaFirefox-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204329" comment="MozillaFirefox-translations-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201655" comment="mozilla-nspr-4.10.9-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204328" comment="mozilla-nspr-32bit-4.10.9-11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4506</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4506" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506" source="CVE"/>
    <description>
    Buffer overflow in the vp9_init_context_buffers function in libvpx, as used in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3, allows remote attackers to execute arbitrary code via a crafted VP9 file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4506.html">CVE-2015-4506</cve>
<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201657" comment="MozillaFirefox-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204329" comment="MozillaFirefox-translations-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201655" comment="mozilla-nspr-4.10.9-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204328" comment="mozilla-nspr-32bit-4.10.9-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208472" comment="mozilla-nspr-x86-4.10.9-11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201657" comment="MozillaFirefox-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204329" comment="MozillaFirefox-translations-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201655" comment="mozilla-nspr-4.10.9-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204328" comment="mozilla-nspr-32bit-4.10.9-11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4509</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4509" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509" source="CVE"/>
    <description>
    Use-after-free vulnerability in the HTMLVideoElement interface in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allows remote attackers to execute arbitrary code via crafted JavaScript code that modifies the URI table of a media element, aka ZDI-CAN-3176.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4509.html">CVE-2015-4509</cve>
<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201657" comment="MozillaFirefox-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204329" comment="MozillaFirefox-translations-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201655" comment="mozilla-nspr-4.10.9-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204328" comment="mozilla-nspr-32bit-4.10.9-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208472" comment="mozilla-nspr-x86-4.10.9-11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201657" comment="MozillaFirefox-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204329" comment="MozillaFirefox-translations-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201655" comment="mozilla-nspr-4.10.9-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204328" comment="mozilla-nspr-32bit-4.10.9-11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511" source="CVE"/>
    <description>
    Heap-based buffer overflow in the nestegg_track_codec_data function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allows remote attackers to execute arbitrary code via a crafted header in a WebM video.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4511.html">CVE-2015-4511</cve>
<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201657" comment="MozillaFirefox-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204329" comment="MozillaFirefox-translations-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201655" comment="mozilla-nspr-4.10.9-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204328" comment="mozilla-nspr-32bit-4.10.9-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208472" comment="mozilla-nspr-x86-4.10.9-11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201657" comment="MozillaFirefox-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204329" comment="MozillaFirefox-translations-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201655" comment="mozilla-nspr-4.10.9-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204328" comment="mozilla-nspr-32bit-4.10.9-11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4513</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4513" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4513.html">CVE-2015-4513</cve>
<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201659" comment="MozillaFirefox-38.4.0esr-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204330" comment="MozillaFirefox-branding-SLED-38-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204331" comment="MozillaFirefox-translations-38.4.0esr-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204332" comment="libfreebl3-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204333" comment="libfreebl3-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204334" comment="libsoftokn3-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204335" comment="libsoftokn3-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201661" comment="mozilla-nspr-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204336" comment="mozilla-nspr-32bit-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201663" comment="mozilla-nss-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204337" comment="mozilla-nss-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204338" comment="mozilla-nss-tools-3.19.2.1-19 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201659" comment="MozillaFirefox-38.4.0esr-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204330" comment="MozillaFirefox-branding-SLED-38-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204331" comment="MozillaFirefox-translations-38.4.0esr-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204332" comment="libfreebl3-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204333" comment="libfreebl3-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208474" comment="libfreebl3-x86-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204334" comment="libsoftokn3-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204335" comment="libsoftokn3-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208475" comment="libsoftokn3-x86-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201661" comment="mozilla-nspr-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204336" comment="mozilla-nspr-32bit-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208476" comment="mozilla-nspr-x86-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201663" comment="mozilla-nss-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204337" comment="mozilla-nss-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204338" comment="mozilla-nss-tools-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208477" comment="mozilla-nss-x86-3.19.2.1-19 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4517</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4517" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517" source="CVE"/>
    <description>
    NetworkUtils.cpp in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4517.html">CVE-2015-4517</cve>
<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201657" comment="MozillaFirefox-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204329" comment="MozillaFirefox-translations-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201655" comment="mozilla-nspr-4.10.9-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204328" comment="mozilla-nspr-32bit-4.10.9-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208472" comment="mozilla-nspr-x86-4.10.9-11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201657" comment="MozillaFirefox-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204329" comment="MozillaFirefox-translations-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201655" comment="mozilla-nspr-4.10.9-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204328" comment="mozilla-nspr-32bit-4.10.9-11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4519</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4519" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519" source="CVE"/>
    <description>
    Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allow user-assisted remote attackers to bypass intended access restrictions and discover a redirect's target URL via crafted JavaScript code that executes after a drag-and-drop action of an image into a TEXTBOX element.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4519.html">CVE-2015-4519</cve>
<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201657" comment="MozillaFirefox-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204329" comment="MozillaFirefox-translations-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201655" comment="mozilla-nspr-4.10.9-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204328" comment="mozilla-nspr-32bit-4.10.9-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208472" comment="mozilla-nspr-x86-4.10.9-11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201657" comment="MozillaFirefox-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204329" comment="MozillaFirefox-translations-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201655" comment="mozilla-nspr-4.10.9-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204328" comment="mozilla-nspr-32bit-4.10.9-11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4520</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4520" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520" source="CVE"/>
    <description>
    Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allow remote attackers to bypass CORS preflight protection mechanisms by leveraging (1) duplicate cache-key generation or (2) retrieval of a value from an incorrect HTTP Access-Control-* response header.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4520.html">CVE-2015-4520</cve>
<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201657" comment="MozillaFirefox-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204329" comment="MozillaFirefox-translations-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201655" comment="mozilla-nspr-4.10.9-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204328" comment="mozilla-nspr-32bit-4.10.9-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208472" comment="mozilla-nspr-x86-4.10.9-11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201657" comment="MozillaFirefox-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204329" comment="MozillaFirefox-translations-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201655" comment="mozilla-nspr-4.10.9-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204328" comment="mozilla-nspr-32bit-4.10.9-11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4521</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4521" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521" source="CVE"/>
    <description>
    The ConvertDialogOptions function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4521.html">CVE-2015-4521</cve>
<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201657" comment="MozillaFirefox-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204329" comment="MozillaFirefox-translations-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201655" comment="mozilla-nspr-4.10.9-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204328" comment="mozilla-nspr-32bit-4.10.9-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208472" comment="mozilla-nspr-x86-4.10.9-11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201657" comment="MozillaFirefox-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204329" comment="MozillaFirefox-translations-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201655" comment="mozilla-nspr-4.10.9-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204328" comment="mozilla-nspr-32bit-4.10.9-11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4522</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4522" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522" source="CVE"/>
    <description>
    The nsUnicodeToUTF8::GetMaxLength function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors, related to an "overflow."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4522.html">CVE-2015-4522</cve>
<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201657" comment="MozillaFirefox-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204329" comment="MozillaFirefox-translations-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201655" comment="mozilla-nspr-4.10.9-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204328" comment="mozilla-nspr-32bit-4.10.9-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208472" comment="mozilla-nspr-x86-4.10.9-11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201657" comment="MozillaFirefox-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204329" comment="MozillaFirefox-translations-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201655" comment="mozilla-nspr-4.10.9-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204328" comment="mozilla-nspr-32bit-4.10.9-11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4598</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4598" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4598" source="CVE"/>
    <description>
    PHP before 5.4.42, 5.5.x before 5.5.26, and 5.6.x before 5.6.10 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to read or write to arbitrary files via crafted input to an application that calls (1) a DOMDocument save method or (2) the GD imagepsloadfont function, as demonstrated by a filename\0.html attack that bypasses an intended configuration in which client users may write to only .html files.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4598.html">CVE-2015-4598</cve>
<bugzilla href="https://bugzilla.suse.com/935227">SUSE bug 935227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/935232">SUSE bug 935232</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215710" comment="apache2-mod_php53-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215711" comment="php53-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215712" comment="php53-bcmath-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215713" comment="php53-bz2-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215714" comment="php53-calendar-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215715" comment="php53-ctype-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215716" comment="php53-curl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215717" comment="php53-dba-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215718" comment="php53-dom-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215719" comment="php53-exif-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215720" comment="php53-fastcgi-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215721" comment="php53-fileinfo-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215722" comment="php53-ftp-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215723" comment="php53-gd-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215724" comment="php53-gettext-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215725" comment="php53-gmp-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215726" comment="php53-iconv-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215727" comment="php53-intl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215728" comment="php53-json-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215729" comment="php53-ldap-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215730" comment="php53-mbstring-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215731" comment="php53-mcrypt-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215732" comment="php53-mysql-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215733" comment="php53-odbc-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215734" comment="php53-openssl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215735" comment="php53-pcntl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215736" comment="php53-pdo-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215737" comment="php53-pear-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215738" comment="php53-pgsql-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215739" comment="php53-pspell-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215740" comment="php53-shmop-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215741" comment="php53-snmp-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215742" comment="php53-soap-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215743" comment="php53-suhosin-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215744" comment="php53-sysvmsg-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215745" comment="php53-sysvsem-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215746" comment="php53-sysvshm-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215747" comment="php53-tokenizer-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215748" comment="php53-wddx-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215749" comment="php53-xmlreader-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215750" comment="php53-xmlrpc-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215751" comment="php53-xmlwriter-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215752" comment="php53-xsl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215753" comment="php53-zip-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215754" comment="php53-zlib-5.3.17-0.43 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4599</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4599" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4599" source="CVE"/>
    <description>
    The SoapFault::__toString method in ext/soap/soap.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to obtain sensitive information, cause a denial of service (application crash), or possibly execute arbitrary code via an unexpected data type, related to a "type confusion" issue.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4599.html">CVE-2015-4599</cve>
<bugzilla href="https://bugzilla.suse.com/935074">SUSE bug 935074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/935226">SUSE bug 935226</bugzilla>
<bugzilla href="https://bugzilla.suse.com/935234">SUSE bug 935234</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215710" comment="apache2-mod_php53-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215711" comment="php53-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215712" comment="php53-bcmath-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215713" comment="php53-bz2-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215714" comment="php53-calendar-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215715" comment="php53-ctype-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215716" comment="php53-curl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215717" comment="php53-dba-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215718" comment="php53-dom-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215719" comment="php53-exif-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215720" comment="php53-fastcgi-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215721" comment="php53-fileinfo-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215722" comment="php53-ftp-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215723" comment="php53-gd-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215724" comment="php53-gettext-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215725" comment="php53-gmp-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215726" comment="php53-iconv-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215727" comment="php53-intl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215728" comment="php53-json-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215729" comment="php53-ldap-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215730" comment="php53-mbstring-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215731" comment="php53-mcrypt-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215732" comment="php53-mysql-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215733" comment="php53-odbc-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215734" comment="php53-openssl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215735" comment="php53-pcntl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215736" comment="php53-pdo-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215737" comment="php53-pear-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215738" comment="php53-pgsql-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215739" comment="php53-pspell-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215740" comment="php53-shmop-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215741" comment="php53-snmp-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215742" comment="php53-soap-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215743" comment="php53-suhosin-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215744" comment="php53-sysvmsg-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215745" comment="php53-sysvsem-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215746" comment="php53-sysvshm-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215747" comment="php53-tokenizer-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215748" comment="php53-wddx-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215749" comment="php53-xmlreader-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215750" comment="php53-xmlrpc-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215751" comment="php53-xmlwriter-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215752" comment="php53-xsl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215753" comment="php53-zip-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215754" comment="php53-zlib-5.3.17-0.43 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4600</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4600" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4600" source="CVE"/>
    <description>
    The SoapClient implementation in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to "type confusion" issues in the (1) SoapClient::__getLastRequest, (2) SoapClient::__getLastResponse, (3) SoapClient::__getLastRequestHeaders, (4) SoapClient::__getLastResponseHeaders, (5) SoapClient::__getCookies, and (6) SoapClient::__setCookie methods.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4600.html">CVE-2015-4600</cve>
<bugzilla href="https://bugzilla.suse.com/935226">SUSE bug 935226</bugzilla>
<bugzilla href="https://bugzilla.suse.com/935234">SUSE bug 935234</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215710" comment="apache2-mod_php53-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215711" comment="php53-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215712" comment="php53-bcmath-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215713" comment="php53-bz2-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215714" comment="php53-calendar-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215715" comment="php53-ctype-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215716" comment="php53-curl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215717" comment="php53-dba-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215718" comment="php53-dom-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215719" comment="php53-exif-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215720" comment="php53-fastcgi-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215721" comment="php53-fileinfo-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215722" comment="php53-ftp-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215723" comment="php53-gd-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215724" comment="php53-gettext-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215725" comment="php53-gmp-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215726" comment="php53-iconv-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215727" comment="php53-intl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215728" comment="php53-json-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215729" comment="php53-ldap-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215730" comment="php53-mbstring-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215731" comment="php53-mcrypt-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215732" comment="php53-mysql-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215733" comment="php53-odbc-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215734" comment="php53-openssl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215735" comment="php53-pcntl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215736" comment="php53-pdo-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215737" comment="php53-pear-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215738" comment="php53-pgsql-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215739" comment="php53-pspell-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215740" comment="php53-shmop-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215741" comment="php53-snmp-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215742" comment="php53-soap-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215743" comment="php53-suhosin-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215744" comment="php53-sysvmsg-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215745" comment="php53-sysvsem-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215746" comment="php53-sysvshm-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215747" comment="php53-tokenizer-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215748" comment="php53-wddx-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215749" comment="php53-xmlreader-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215750" comment="php53-xmlrpc-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215751" comment="php53-xmlwriter-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215752" comment="php53-xsl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215753" comment="php53-zip-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215754" comment="php53-zlib-5.3.17-0.43 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4601</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4601" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4601" source="CVE"/>
    <description>
    PHP before 5.6.7 might allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to "type confusion" issues in (1) ext/soap/php_encoding.c, (2) ext/soap/php_http.c, and (3) ext/soap/soap.c, a different issue than CVE-2015-4600.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4601.html">CVE-2015-4601</cve>
<bugzilla href="https://bugzilla.suse.com/935226">SUSE bug 935226</bugzilla>
<bugzilla href="https://bugzilla.suse.com/935234">SUSE bug 935234</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215710" comment="apache2-mod_php53-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215711" comment="php53-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215712" comment="php53-bcmath-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215713" comment="php53-bz2-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215714" comment="php53-calendar-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215715" comment="php53-ctype-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215716" comment="php53-curl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215717" comment="php53-dba-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215718" comment="php53-dom-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215719" comment="php53-exif-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215720" comment="php53-fastcgi-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215721" comment="php53-fileinfo-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215722" comment="php53-ftp-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215723" comment="php53-gd-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215724" comment="php53-gettext-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215725" comment="php53-gmp-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215726" comment="php53-iconv-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215727" comment="php53-intl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215728" comment="php53-json-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215729" comment="php53-ldap-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215730" comment="php53-mbstring-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215731" comment="php53-mcrypt-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215732" comment="php53-mysql-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215733" comment="php53-odbc-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215734" comment="php53-openssl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215735" comment="php53-pcntl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215736" comment="php53-pdo-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215737" comment="php53-pear-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215738" comment="php53-pgsql-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215739" comment="php53-pspell-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215740" comment="php53-shmop-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215741" comment="php53-snmp-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215742" comment="php53-soap-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215743" comment="php53-suhosin-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215744" comment="php53-sysvmsg-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215745" comment="php53-sysvsem-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215746" comment="php53-sysvshm-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215747" comment="php53-tokenizer-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215748" comment="php53-wddx-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215749" comment="php53-xmlreader-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215750" comment="php53-xmlrpc-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215751" comment="php53-xmlwriter-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215752" comment="php53-xsl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215753" comment="php53-zip-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215754" comment="php53-zlib-5.3.17-0.43 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4602</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4602" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4602" source="CVE"/>
    <description>
    The __PHP_Incomplete_Class function in ext/standard/incomplete_class.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to a "type confusion" issue.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4602.html">CVE-2015-4602</cve>
<bugzilla href="https://bugzilla.suse.com/935074">SUSE bug 935074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/935224">SUSE bug 935224</bugzilla>
<bugzilla href="https://bugzilla.suse.com/935226">SUSE bug 935226</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215710" comment="apache2-mod_php53-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215711" comment="php53-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215712" comment="php53-bcmath-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215713" comment="php53-bz2-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215714" comment="php53-calendar-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215715" comment="php53-ctype-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215716" comment="php53-curl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215717" comment="php53-dba-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215718" comment="php53-dom-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215719" comment="php53-exif-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215720" comment="php53-fastcgi-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215721" comment="php53-fileinfo-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215722" comment="php53-ftp-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215723" comment="php53-gd-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215724" comment="php53-gettext-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215725" comment="php53-gmp-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215726" comment="php53-iconv-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215727" comment="php53-intl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215728" comment="php53-json-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215729" comment="php53-ldap-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215730" comment="php53-mbstring-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215731" comment="php53-mcrypt-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215732" comment="php53-mysql-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215733" comment="php53-odbc-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215734" comment="php53-openssl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215735" comment="php53-pcntl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215736" comment="php53-pdo-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215737" comment="php53-pear-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215738" comment="php53-pgsql-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215739" comment="php53-pspell-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215740" comment="php53-shmop-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215741" comment="php53-snmp-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215742" comment="php53-soap-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215743" comment="php53-suhosin-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215744" comment="php53-sysvmsg-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215745" comment="php53-sysvsem-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215746" comment="php53-sysvshm-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215747" comment="php53-tokenizer-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215748" comment="php53-wddx-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215749" comment="php53-xmlreader-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215750" comment="php53-xmlrpc-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215751" comment="php53-xmlwriter-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215752" comment="php53-xsl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215753" comment="php53-zip-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215754" comment="php53-zlib-5.3.17-0.43 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4603</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4603" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4603" source="CVE"/>
    <description>
    The exception::getTraceAsString function in Zend/zend_exceptions.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to execute arbitrary code via an unexpected data type, related to a "type confusion" issue.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4603.html">CVE-2015-4603</cve>
<bugzilla href="https://bugzilla.suse.com/935074">SUSE bug 935074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/935226">SUSE bug 935226</bugzilla>
<bugzilla href="https://bugzilla.suse.com/935234">SUSE bug 935234</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215710" comment="apache2-mod_php53-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215711" comment="php53-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215712" comment="php53-bcmath-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215713" comment="php53-bz2-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215714" comment="php53-calendar-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215715" comment="php53-ctype-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215716" comment="php53-curl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215717" comment="php53-dba-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215718" comment="php53-dom-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215719" comment="php53-exif-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215720" comment="php53-fastcgi-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215721" comment="php53-fileinfo-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215722" comment="php53-ftp-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215723" comment="php53-gd-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215724" comment="php53-gettext-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215725" comment="php53-gmp-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215726" comment="php53-iconv-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215727" comment="php53-intl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215728" comment="php53-json-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215729" comment="php53-ldap-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215730" comment="php53-mbstring-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215731" comment="php53-mcrypt-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215732" comment="php53-mysql-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215733" comment="php53-odbc-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215734" comment="php53-openssl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215735" comment="php53-pcntl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215736" comment="php53-pdo-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215737" comment="php53-pear-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215738" comment="php53-pgsql-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215739" comment="php53-pspell-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215740" comment="php53-shmop-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215741" comment="php53-snmp-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215742" comment="php53-soap-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215743" comment="php53-suhosin-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215744" comment="php53-sysvmsg-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215745" comment="php53-sysvsem-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215746" comment="php53-sysvshm-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215747" comment="php53-tokenizer-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215748" comment="php53-wddx-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215749" comment="php53-xmlreader-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215750" comment="php53-xmlrpc-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215751" comment="php53-xmlwriter-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215752" comment="php53-xsl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215753" comment="php53-zip-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215754" comment="php53-zlib-5.3.17-0.43 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4620</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4620" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4620" source="CVE"/>
    <description>
    name.c in named in ISC BIND 9.7.x through 9.9.x before 9.9.7-P1 and 9.10.x before 9.10.2-P2, when configured as a recursive resolver with DNSSEC validation, allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) by constructing crafted zone data and then making a query for a name in that zone.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4620.html">CVE-2015-4620</cve>
<bugzilla href="https://bugzilla.suse.com/936476">SUSE bug 936476</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215677" comment="bind-9.9.6P1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215678" comment="bind-chrootenv-9.9.6P1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215679" comment="bind-doc-9.9.6P1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215674" comment="bind-libs-9.9.6P1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215675" comment="bind-libs-32bit-9.9.6P1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215676" comment="bind-utils-9.9.6P1-0.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215677" comment="bind-9.9.6P1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215678" comment="bind-chrootenv-9.9.6P1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215679" comment="bind-doc-9.9.6P1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215674" comment="bind-libs-9.9.6P1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215675" comment="bind-libs-32bit-9.9.6P1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264527" comment="bind-libs-x86-9.9.6P1-0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215676" comment="bind-utils-9.9.6P1-0.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4643</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4643" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4643" source="CVE"/>
    <description>
    Integer overflow in the ftp_genlist function in ext/ftp/ftp.c in PHP before 5.4.42, 5.5.x before 5.5.26, and 5.6.x before 5.6.10 allows remote FTP servers to execute arbitrary code via a long reply to a LIST command, leading to a heap-based buffer overflow.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-4022.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4643.html">CVE-2015-4643</cve>
<bugzilla href="https://bugzilla.suse.com/931769">SUSE bug 931769</bugzilla>
<bugzilla href="https://bugzilla.suse.com/935074">SUSE bug 935074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/935275">SUSE bug 935275</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215710" comment="apache2-mod_php53-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215711" comment="php53-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215712" comment="php53-bcmath-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215713" comment="php53-bz2-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215714" comment="php53-calendar-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215715" comment="php53-ctype-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215716" comment="php53-curl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215717" comment="php53-dba-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215718" comment="php53-dom-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215719" comment="php53-exif-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215720" comment="php53-fastcgi-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215721" comment="php53-fileinfo-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215722" comment="php53-ftp-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215723" comment="php53-gd-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215724" comment="php53-gettext-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215725" comment="php53-gmp-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215726" comment="php53-iconv-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215727" comment="php53-intl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215728" comment="php53-json-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215729" comment="php53-ldap-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215730" comment="php53-mbstring-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215731" comment="php53-mcrypt-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215732" comment="php53-mysql-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215733" comment="php53-odbc-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215734" comment="php53-openssl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215735" comment="php53-pcntl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215736" comment="php53-pdo-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215737" comment="php53-pear-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215738" comment="php53-pgsql-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215739" comment="php53-pspell-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215740" comment="php53-shmop-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215741" comment="php53-snmp-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215742" comment="php53-soap-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215743" comment="php53-suhosin-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215744" comment="php53-sysvmsg-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215745" comment="php53-sysvsem-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215746" comment="php53-sysvshm-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215747" comment="php53-tokenizer-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215748" comment="php53-wddx-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215749" comment="php53-xmlreader-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215750" comment="php53-xmlrpc-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215751" comment="php53-xmlwriter-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215752" comment="php53-xsl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215753" comment="php53-zip-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215754" comment="php53-zlib-5.3.17-0.43 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4644</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4644" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4644" source="CVE"/>
    <description>
    The php_pgsql_meta_data function in pgsql.c in the PostgreSQL (aka pgsql) extension in PHP before 5.4.42, 5.5.x before 5.5.26, and 5.6.x before 5.6.10 does not validate token extraction for table names, which might allow remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted name.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1352.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4644.html">CVE-2015-4644</cve>
<bugzilla href="https://bugzilla.suse.com/935074">SUSE bug 935074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/935274">SUSE bug 935274</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215710" comment="apache2-mod_php53-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215711" comment="php53-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215712" comment="php53-bcmath-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215713" comment="php53-bz2-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215714" comment="php53-calendar-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215715" comment="php53-ctype-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215716" comment="php53-curl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215717" comment="php53-dba-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215718" comment="php53-dom-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215719" comment="php53-exif-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215720" comment="php53-fastcgi-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215721" comment="php53-fileinfo-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215722" comment="php53-ftp-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215723" comment="php53-gd-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215724" comment="php53-gettext-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215725" comment="php53-gmp-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215726" comment="php53-iconv-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215727" comment="php53-intl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215728" comment="php53-json-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215729" comment="php53-ldap-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215730" comment="php53-mbstring-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215731" comment="php53-mcrypt-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215732" comment="php53-mysql-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215733" comment="php53-odbc-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215734" comment="php53-openssl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215735" comment="php53-pcntl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215736" comment="php53-pdo-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215737" comment="php53-pear-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215738" comment="php53-pgsql-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215739" comment="php53-pspell-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215740" comment="php53-shmop-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215741" comment="php53-snmp-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215742" comment="php53-soap-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215743" comment="php53-suhosin-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215744" comment="php53-sysvmsg-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215745" comment="php53-sysvsem-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215746" comment="php53-sysvshm-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215747" comment="php53-tokenizer-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215748" comment="php53-wddx-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215749" comment="php53-xmlreader-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215750" comment="php53-xmlrpc-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215751" comment="php53-xmlwriter-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215752" comment="php53-xsl-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215753" comment="php53-zip-5.3.17-0.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215754" comment="php53-zlib-5.3.17-0.43 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4652</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4652" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4652" source="CVE"/>
    <description>
    epan/dissectors/packet-gsm_a_dtap.c in the GSM DTAP dissector in Wireshark 1.12.x before 1.12.6 does not properly validate digit characters, which allows remote attackers to cause a denial of service (application crash) via a crafted packet, related to the de_emerg_num_list and de_bcd_num functions.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4652.html">CVE-2015-4652</cve>
<bugzilla href="https://bugzilla.suse.com/935158">SUSE bug 935158</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202103" comment="wireshark-1.12.7-0.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4680</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4680" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4680" source="CVE"/>
    <description>
    FreeRADIUS 2.2.x before 2.2.8 and 3.0.x before 3.0.9 does not properly check revocation of intermediate CA certificates.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4680.html">CVE-2015-4680</cve>
<bugzilla href="https://bugzilla.suse.com/935573">SUSE bug 935573</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202522" comment="freeradius-server-2.1.1-7.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209242" comment="freeradius-server-dialupadmin-2.1.1-7.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209243" comment="freeradius-server-doc-2.1.1-7.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202524" comment="freeradius-server-libs-2.1.1-7.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209244" comment="freeradius-server-utils-2.1.1-7.24 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4700</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4700" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4700" source="CVE"/>
    <description>
    The bpf_int_jit_compile function in arch/x86/net/bpf_jit_comp.c in the Linux kernel before 4.0.6 allows local users to cause a denial of service (system crash) by creating a packet filter and then loading crafted BPF instructions that trigger late convergence by the JIT compiler.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4700.html">CVE-2015-4700</cve>
<bugzilla href="https://bugzilla.suse.com/935705">SUSE bug 935705</bugzilla>
<bugzilla href="https://bugzilla.suse.com/939273">SUSE bug 939273</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204527" comment="kernel-bigsmp-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208622" comment="kernel-bigsmp-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204528" comment="kernel-bigsmp-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204529" comment="kernel-default-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204530" comment="kernel-default-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204531" comment="kernel-default-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208623" comment="kernel-default-man-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208624" comment="kernel-ec2-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208625" comment="kernel-ec2-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208626" comment="kernel-ec2-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204533" comment="kernel-pae-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204534" comment="kernel-pae-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204535" comment="kernel-pae-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208627" comment="kernel-ppc64-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208628" comment="kernel-ppc64-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208629" comment="kernel-ppc64-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204537" comment="kernel-source-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204538" comment="kernel-syms-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204539" comment="kernel-trace-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208630" comment="kernel-trace-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204540" comment="kernel-trace-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204541" comment="kernel-xen-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204542" comment="kernel-xen-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204543" comment="kernel-xen-devel-3.0.101-0.47.67 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4729</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4729" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4729" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u80 and 8u45 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4729.html">CVE-2015-4729</cve>
<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201732" comment="java-1_7_0-ibm-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207724" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207725" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207726" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4730</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4730" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4730" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.20 and earlier allows remote authenticated users to affect availability via unknown vectors related to Types.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4730.html">CVE-2015-4730</cve>
<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208786" comment="libmysql55client18-x86-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4731</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4731" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; Java SE Embedded 7u75; and Java SE Embedded 8u33 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4731.html">CVE-2015-4731</cve>
<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201725" comment="java-1_6_0-ibm-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201727" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207151" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207152" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201732" comment="java-1_7_0-ibm-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207724" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207725" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207726" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201725" comment="java-1_6_0-ibm-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207150" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201727" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207151" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207152" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201732" comment="java-1_7_0-ibm-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207724" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207725" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207726" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4732</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4732" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2015-2590.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4732.html">CVE-2015-4732</cve>
<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201725" comment="java-1_6_0-ibm-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201727" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207151" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207152" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201732" comment="java-1_7_0-ibm-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207724" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207725" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207726" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201725" comment="java-1_6_0-ibm-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207150" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201727" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207151" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207152" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201732" comment="java-1_7_0-ibm-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207724" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207725" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207726" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4733</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4733" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4733.html">CVE-2015-4733</cve>
<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201725" comment="java-1_6_0-ibm-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201727" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207151" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207152" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201732" comment="java-1_7_0-ibm-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207724" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207725" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207726" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201725" comment="java-1_6_0-ibm-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207150" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201727" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207151" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207152" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201732" comment="java-1_7_0-ibm-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207724" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207725" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207726" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4734</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4734" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85 and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via vectors related to JGSS.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4734.html">CVE-2015-4734</cve>
<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207716" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4737</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4737" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Pluggable Auth.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4737.html">CVE-2015-4737</cve>
<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204696" comment="libmysql55client18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204697" comment="libmysql55client18-32bit-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204698" comment="libmysql55client_r18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201944" comment="mysql-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204699" comment="mysql-client-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208785" comment="mysql-tools-5.5.45-0.11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204696" comment="libmysql55client18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204697" comment="libmysql55client18-32bit-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208784" comment="libmysql55client18-x86-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204698" comment="libmysql55client_r18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201944" comment="mysql-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204699" comment="mysql-client-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208785" comment="mysql-tools-5.5.45-0.11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4748</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4748" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JRockit R28.3.6; and Java SE Embedded 7u75 and Embedded 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4748.html">CVE-2015-4748</cve>
<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201725" comment="java-1_6_0-ibm-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201727" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207151" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207152" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201732" comment="java-1_7_0-ibm-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207724" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207725" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207726" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201725" comment="java-1_6_0-ibm-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207150" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201727" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207151" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207152" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201732" comment="java-1_7_0-ibm-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207724" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207725" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207726" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4749</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4749" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JRockit R28.3.6; and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect availability via vectors related to JNDI.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4749.html">CVE-2015-4749</cve>
<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201725" comment="java-1_6_0-ibm-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201727" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207151" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207152" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201732" comment="java-1_7_0-ibm-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207724" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207725" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207726" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201725" comment="java-1_6_0-ibm-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207150" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201727" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207151" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207152" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201732" comment="java-1_7_0-ibm-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207724" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207725" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207726" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4752</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4752" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to Server : I_S.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4752.html">CVE-2015-4752</cve>
<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204696" comment="libmysql55client18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204697" comment="libmysql55client18-32bit-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204698" comment="libmysql55client_r18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201944" comment="mysql-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204699" comment="mysql-client-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208785" comment="mysql-tools-5.5.45-0.11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204696" comment="libmysql55client18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204697" comment="libmysql55client18-32bit-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208784" comment="libmysql55client18-x86-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204698" comment="libmysql55client_r18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201944" comment="mysql-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204699" comment="mysql-client-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208785" comment="mysql-tools-5.5.45-0.11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4756</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4756" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4756" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.22 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB, a different vulnerability than CVE-2015-0439.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4756.html">CVE-2015-4756</cve>
<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204696" comment="libmysql55client18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204697" comment="libmysql55client18-32bit-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204698" comment="libmysql55client_r18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201944" comment="mysql-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204699" comment="mysql-client-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208785" comment="mysql-tools-5.5.45-0.11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204696" comment="libmysql55client18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204697" comment="libmysql55client18-32bit-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208784" comment="libmysql55client18-x86-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204698" comment="libmysql55client_r18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201944" comment="mysql-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204699" comment="mysql-client-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208785" comment="mysql-tools-5.5.45-0.11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4757</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4757" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier and 5.6.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Optimizer.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4757.html">CVE-2015-4757</cve>
<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204696" comment="libmysql55client18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204697" comment="libmysql55client18-32bit-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204698" comment="libmysql55client_r18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201944" comment="mysql-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204699" comment="mysql-client-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208785" comment="mysql-tools-5.5.45-0.11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204696" comment="libmysql55client18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204697" comment="libmysql55client18-32bit-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208784" comment="libmysql55client18-x86-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204698" comment="libmysql55client_r18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201944" comment="mysql-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204699" comment="mysql-client-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208785" comment="mysql-tools-5.5.45-0.11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4760</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4760" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4760.html">CVE-2015-4760</cve>
<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201725" comment="java-1_6_0-ibm-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201727" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207151" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207152" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201732" comment="java-1_7_0-ibm-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207724" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207725" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207726" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201725" comment="java-1_6_0-ibm-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207150" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201727" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207151" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207152" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.7-10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201732" comment="java-1_7_0-ibm-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207724" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207725" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207726" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4761</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4761" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4761" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Memcached.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4761.html">CVE-2015-4761</cve>
<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204696" comment="libmysql55client18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204697" comment="libmysql55client18-32bit-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204698" comment="libmysql55client_r18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201944" comment="mysql-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204699" comment="mysql-client-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208785" comment="mysql-tools-5.5.45-0.11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204696" comment="libmysql55client18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204697" comment="libmysql55client18-32bit-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208784" comment="libmysql55client18-x86-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204698" comment="libmysql55client_r18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201944" comment="mysql-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204699" comment="mysql-client-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208785" comment="mysql-tools-5.5.45-0.11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4766</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4766" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4766" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.25 and earlier allows local users to affect availability via unknown vectors related to Server : Security : Firewall.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4766.html">CVE-2015-4766</cve>
<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208786" comment="libmysql55client18-x86-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4767</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4767" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4767" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Security : Firewall, a different vulnerability than CVE-2015-4769.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4767.html">CVE-2015-4767</cve>
<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204696" comment="libmysql55client18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204697" comment="libmysql55client18-32bit-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204698" comment="libmysql55client_r18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201944" comment="mysql-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204699" comment="mysql-client-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208785" comment="mysql-tools-5.5.45-0.11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204696" comment="libmysql55client18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204697" comment="libmysql55client18-32bit-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208784" comment="libmysql55client18-x86-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204698" comment="libmysql55client_r18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201944" comment="mysql-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204699" comment="mysql-client-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208785" comment="mysql-tools-5.5.45-0.11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4769</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4769" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4769" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Security : Firewall, a different vulnerability than CVE-2015-4767.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4769.html">CVE-2015-4769</cve>
<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204696" comment="libmysql55client18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204697" comment="libmysql55client18-32bit-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204698" comment="libmysql55client_r18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201944" comment="mysql-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204699" comment="mysql-client-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208785" comment="mysql-tools-5.5.45-0.11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204696" comment="libmysql55client18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204697" comment="libmysql55client18-32bit-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208784" comment="libmysql55client18-x86-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204698" comment="libmysql55client_r18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201944" comment="mysql-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204699" comment="mysql-client-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208785" comment="mysql-tools-5.5.45-0.11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4771</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4771" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4771" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to RBR.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4771.html">CVE-2015-4771</cve>
<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204696" comment="libmysql55client18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204697" comment="libmysql55client18-32bit-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204698" comment="libmysql55client_r18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201944" comment="mysql-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204699" comment="mysql-client-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208785" comment="mysql-tools-5.5.45-0.11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204696" comment="libmysql55client18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204697" comment="libmysql55client18-32bit-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208784" comment="libmysql55client18-x86-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204698" comment="libmysql55client_r18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201944" comment="mysql-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204699" comment="mysql-client-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208785" comment="mysql-tools-5.5.45-0.11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4772</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4772" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4772" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Partition.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4772.html">CVE-2015-4772</cve>
<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204696" comment="libmysql55client18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204697" comment="libmysql55client18-32bit-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204698" comment="libmysql55client_r18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201944" comment="mysql-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204699" comment="mysql-client-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208785" comment="mysql-tools-5.5.45-0.11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204696" comment="libmysql55client18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204697" comment="libmysql55client18-32bit-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208784" comment="libmysql55client18-x86-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204698" comment="libmysql55client_r18-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201944" comment="mysql-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204699" comment="mysql-client-5.5.45-0.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208785" comment="mysql-tools-5.5.45-0.11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4792</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4792" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Partition, a different vulnerability than CVE-2015-4802.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4792.html">CVE-2015-4792</cve>
<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208786" comment="libmysql55client18-x86-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4800" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Optimizer.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4800.html">CVE-2015-4800</cve>
<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208786" comment="libmysql55client18-x86-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4802</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4802" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Partition, a different vulnerability than CVE-2015-4792.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4802.html">CVE-2015-4802</cve>
<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208786" comment="libmysql55client18-x86-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4803</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4803" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allows remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2015-4893 and CVE-2015-4911.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4803.html">CVE-2015-4803</cve>
<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207716" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4805" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Serialization.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4805.html">CVE-2015-4805</cve>
<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207716" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4806" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4806.html">CVE-2015-4806</cve>
<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207716" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4810</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4810" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4810" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u85 and 8u60 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4810.html">CVE-2015-4810</cve>
<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207716" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4815" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via vectors related to Server : DDL.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4815.html">CVE-2015-4815</cve>
<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208786" comment="libmysql55client18-x86-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4816</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4816" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4816.html">CVE-2015-4816</cve>
<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/958790">SUSE bug 958790</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208786" comment="libmysql55client18-x86-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4819</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4819" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier, and 5.6.25 and earlier, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Client programs.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4819.html">CVE-2015-4819</cve>
<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/958790">SUSE bug 958790</bugzilla>
<bugzilla href="https://bugzilla.suse.com/969667">SUSE bug 969667</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208786" comment="libmysql55client18-x86-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4826</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4826" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Types.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4826.html">CVE-2015-4826</cve>
<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208786" comment="libmysql55client18-x86-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4830" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Server : Security : Privileges.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4830.html">CVE-2015-4830</cve>
<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208786" comment="libmysql55client18-x86-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4833</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4833" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4833" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.25 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Partition.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4833.html">CVE-2015-4833</cve>
<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208786" comment="libmysql55client18-x86-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2015-4881.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4835.html">CVE-2015-4835</cve>
<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207716" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : SP.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4836.html">CVE-2015-4836</cve>
<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208786" comment="libmysql55client18-x86-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4840" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u85 and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4840.html">CVE-2015-4840</cve>
<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207716" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4842</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4842" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via vectors related to JAXP.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4842.html">CVE-2015-4842</cve>
<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207716" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4843</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4843" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4843.html">CVE-2015-4843</cve>
<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207716" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4844</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4844" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4844.html">CVE-2015-4844</cve>
<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207716" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4858</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4858" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via vectors related to DML, a different vulnerability than CVE-2015-4913.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4858.html">CVE-2015-4858</cve>
<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208786" comment="libmysql55client18-x86-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4860</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4860" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI, a different vulnerability than CVE-2015-4883.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4860.html">CVE-2015-4860</cve>
<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207716" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4861</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4861" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4861.html">CVE-2015-4861</cve>
<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208786" comment="libmysql55client18-x86-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4862</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4862" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4862" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.26 and earlier allows remote authenticated users to affect availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4862.html">CVE-2015-4862</cve>
<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208786" comment="libmysql55client18-x86-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4864</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4864" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4864" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Server : Security : Privileges.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4864.html">CVE-2015-4864</cve>
<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208786" comment="libmysql55client18-x86-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4866</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4866" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4866" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4866.html">CVE-2015-4866</cve>
<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208786" comment="libmysql55client18-x86-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4870</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4870" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Parser.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4870.html">CVE-2015-4870</cve>
<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208786" comment="libmysql55client18-x86-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4871</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4871" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4871" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u85 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4871.html">CVE-2015-4871</cve>
<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207716" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4872</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4872" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allows remote attackers to affect integrity via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4872.html">CVE-2015-4872</cve>
<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207716" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4879</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4879" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier, and 5.6.25 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4879.html">CVE-2015-4879</cve>
<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/958790">SUSE bug 958790</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208786" comment="libmysql55client18-x86-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4882</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4882" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect availability via vectors related to CORBA.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4882.html">CVE-2015-4882</cve>
<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207716" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4883</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4883" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI, a different vulnerability than CVE-2015-4860.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4883.html">CVE-2015-4883</cve>
<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207716" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4890</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4890" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4890" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Replication.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4890.html">CVE-2015-4890</cve>
<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208786" comment="libmysql55client18-x86-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4893</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4893" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allows remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2015-4803 and CVE-2015-4911.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4893.html">CVE-2015-4893</cve>
<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207716" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4895</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4895" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.25 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4895.html">CVE-2015-4895</cve>
<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/958790">SUSE bug 958790</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208786" comment="libmysql55client18-x86-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4902</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4902" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4902" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60 allows remote attackers to affect integrity via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4902.html">CVE-2015-4902</cve>
<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207716" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4903</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4903" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via vectors related to RMI.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4903.html">CVE-2015-4903</cve>
<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207716" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4904</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4904" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4904" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.25 and earlier allows remote authenticated users to affect availability via unknown vectors related to libmysqld.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4904.html">CVE-2015-4904</cve>
<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208786" comment="libmysql55client18-x86-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4905</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4905" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4905" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.23 and earlier allows remote authenticated users to affect availability via vectors related to Server : DML.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4905.html">CVE-2015-4905</cve>
<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208786" comment="libmysql55client18-x86-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4910</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4910" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4910" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Memcached.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4910.html">CVE-2015-4910</cve>
<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208786" comment="libmysql55client18-x86-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4911</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4911" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allows remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2015-4803 and CVE-2015-4893.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4911.html">CVE-2015-4911</cve>
<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207716" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4913</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-4913" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via vectors related to Server : DML, a different vulnerability than CVE-2015-4858.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4913.html">CVE-2015-4913</cve>
<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204700" comment="libmysql55client18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204701" comment="libmysql55client18-32bit-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208786" comment="libmysql55client18-x86-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204702" comment="libmysql55client_r18-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201947" comment="mysql-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204703" comment="mysql-client-5.5.46-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208787" comment="mysql-tools-5.5.46-0.14 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5006</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-5006" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5006" source="CVE"/>
    <description>
    IBM Java Security Components in IBM SDK, Java Technology Edition 8 before SR2, 7 R1 before SR3 FP20, 7 before SR9 FP20, 6 R1 before SR8 FP15, and 6 before SR16 FP15 allow physically proximate attackers to obtain sensitive information by reading the Kerberos Credential Cache.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5006.html">CVE-2015-5006</cve>
<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201728" comment="java-1_6_0-ibm-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207716" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201730" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207717" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207718" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201734" comment="java-1_7_0-ibm-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207727" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207728" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207729" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5041</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-5041" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5041" source="CVE"/>
    <description>
    The J9 JVM in IBM SDK, Java Technology Edition 6 before SR16 FP20, 6 R1 before SR8 FP20, 7 before SR9 FP30, and 7 R1 before SR3 FP30 allows remote attackers to obtain sensitive information or inject data by invoking non-public interface methods.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5041.html">CVE-2015-5041</cve>
<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207704" comment="java-1_6_0-ibm-1.6.0_sr16.20-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207707" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.20-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207708" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.20-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207709" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.20-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207730" comment="java-1_7_0-ibm-1.7.0_sr9.30-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207731" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.30-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207733" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.30-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207734" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.30-45 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208546" comment="java-1_6_0-ibm-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208547" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208548" comment="java-1_6_0-ibm-devel-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208549" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208550" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208551" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208556" comment="java-1_7_0-ibm-1.7.0_sr9.30-47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208557" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.30-47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208558" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.30-47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208559" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.30-47 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5143</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-5143" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5143" source="CVE"/>
    <description>
    The session backends in Django before 1.4.21, 1.5.x through 1.6.x, 1.7.x before 1.7.9, and 1.8.x before 1.8.3 allows remote attackers to cause a denial of service (session store consumption) via multiple requests with unique session keys.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5143.html">CVE-2015-5143</cve>
<bugzilla href="https://bugzilla.suse.com/937522">SUSE bug 937522</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215926" comment="python-Django-1.6.11-10 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5144</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-5144" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5144" source="CVE"/>
    <description>
    Django before 1.4.21, 1.5.x through 1.6.x, 1.7.x before 1.7.9, and 1.8.x before 1.8.3 uses an incorrect regular expression, which allows remote attackers to inject arbitrary headers and conduct HTTP response splitting attacks via a newline character in an (1) email message to the EmailValidator, a (2) URL to the URLValidator, or unspecified vectors to the (3) validate_ipv4_address or (4) validate_slug validator.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5144.html">CVE-2015-5144</cve>
<bugzilla href="https://bugzilla.suse.com/937523">SUSE bug 937523</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215926" comment="python-Django-1.6.11-10 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5154</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-5154" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5154" source="CVE"/>
    <description>
    Heap-based buffer overflow in the IDE subsystem in QEMU, as used in Xen 4.5.x and earlier, when the container has a CDROM drive enabled, allows local guest users to execute arbitrary code on the host via unspecified ATAPI commands.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5154.html">CVE-2015-5154</cve>
<bugzilla href="https://bugzilla.suse.com/938344">SUSE bug 938344</bugzilla>
<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204577" comment="kvm-1.4.2-0.22.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202109" comment="xen-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204871" comment="xen-doc-html-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204872" comment="xen-doc-pdf-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204873" comment="xen-kmp-default-4.2.5_12_3.0.101_0.47.55-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204874" comment="xen-kmp-pae-4.2.5_12_3.0.101_0.47.55-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204875" comment="xen-libs-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204876" comment="xen-libs-32bit-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204877" comment="xen-tools-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204878" comment="xen-tools-domU-4.2.5_12-15 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204577" comment="kvm-1.4.2-0.22.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202109" comment="xen-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204871" comment="xen-doc-html-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204872" comment="xen-doc-pdf-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204873" comment="xen-kmp-default-4.2.5_12_3.0.101_0.47.55-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204875" comment="xen-libs-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204876" comment="xen-libs-32bit-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204877" comment="xen-tools-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204878" comment="xen-tools-domU-4.2.5_12-15 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5156</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-5156" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5156" source="CVE"/>
    <description>
    The virtnet_probe function in drivers/net/virtio_net.c in the Linux kernel before 4.2 attempts to support a FRAGLIST feature without proper memory allocation, which allows guest OS users to cause a denial of service (buffer overflow and memory corruption) via a crafted sequence of fragmented packets.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5156.html">CVE-2015-5156</cve>
<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123903">SUSE bug 1123903</bugzilla>
<bugzilla href="https://bugzilla.suse.com/940776">SUSE bug 940776</bugzilla>
<bugzilla href="https://bugzilla.suse.com/945048">SUSE bug 945048</bugzilla>
<bugzilla href="https://bugzilla.suse.com/951638">SUSE bug 951638</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208695" comment="kernel-bigsmp-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208696" comment="kernel-bigsmp-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208697" comment="kernel-bigsmp-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205609" comment="kernel-default-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205610" comment="kernel-default-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205611" comment="kernel-default-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208698" comment="kernel-default-man-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205612" comment="kernel-ec2-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205613" comment="kernel-ec2-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205614" comment="kernel-ec2-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205615" comment="kernel-pae-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205616" comment="kernel-pae-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205617" comment="kernel-pae-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205618" comment="kernel-source-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205619" comment="kernel-syms-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205620" comment="kernel-trace-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205621" comment="kernel-trace-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205622" comment="kernel-trace-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205623" comment="kernel-xen-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205624" comment="kernel-xen-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205625" comment="kernel-xen-devel-3.0.101-0.47.106.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5157</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-5157" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5157" source="CVE"/>
    <description>
    arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform mishandles IRET faults in processing NMIs that occurred during userspace execution, which might allow local users to gain privileges by triggering an NMI.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5157.html">CVE-2015-5157</cve>
<bugzilla href="https://bugzilla.suse.com/937969">SUSE bug 937969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/937970">SUSE bug 937970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938706">SUSE bug 938706</bugzilla>
<bugzilla href="https://bugzilla.suse.com/939207">SUSE bug 939207</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204546" comment="kernel-bigsmp-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208678" comment="kernel-bigsmp-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204547" comment="kernel-bigsmp-devel-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204548" comment="kernel-default-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204549" comment="kernel-default-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204550" comment="kernel-default-devel-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208679" comment="kernel-default-man-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208680" comment="kernel-ec2-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208681" comment="kernel-ec2-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208682" comment="kernel-ec2-devel-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204552" comment="kernel-pae-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204553" comment="kernel-pae-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204554" comment="kernel-pae-devel-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208683" comment="kernel-ppc64-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208684" comment="kernel-ppc64-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208685" comment="kernel-ppc64-devel-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204556" comment="kernel-source-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204557" comment="kernel-syms-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204558" comment="kernel-trace-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208686" comment="kernel-trace-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204559" comment="kernel-trace-devel-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204560" comment="kernel-xen-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204561" comment="kernel-xen-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204562" comment="kernel-xen-devel-3.0.101-0.47.71 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5165</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-5165" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5165" source="CVE"/>
    <description>
    The C+ mode offload emulation in the RTL8139 network card device model in QEMU, as used in Xen 4.5.x and earlier, allows remote attackers to read process heap memory via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5165.html">CVE-2015-5165</cve>
<bugzilla href="https://bugzilla.suse.com/939712">SUSE bug 939712</bugzilla>
<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202109" comment="xen-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204871" comment="xen-doc-html-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204872" comment="xen-doc-pdf-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204873" comment="xen-kmp-default-4.2.5_12_3.0.101_0.47.55-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204874" comment="xen-kmp-pae-4.2.5_12_3.0.101_0.47.55-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204875" comment="xen-libs-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204876" comment="xen-libs-32bit-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204877" comment="xen-tools-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204878" comment="xen-tools-domU-4.2.5_12-15 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202109" comment="xen-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204871" comment="xen-doc-html-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204872" comment="xen-doc-pdf-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204873" comment="xen-kmp-default-4.2.5_12_3.0.101_0.47.55-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204875" comment="xen-libs-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204876" comment="xen-libs-32bit-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204877" comment="xen-tools-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204878" comment="xen-tools-domU-4.2.5_12-15 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5166</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-5166" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5166" source="CVE"/>
    <description>
    Use-after-free vulnerability in QEMU in Xen 4.5.x and earlier does not completely unplug emulated block devices, which allows local HVM guest users to gain privileges by unplugging a block device twice.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5166.html">CVE-2015-5166</cve>
<bugzilla href="https://bugzilla.suse.com/939709">SUSE bug 939709</bugzilla>
<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202109" comment="xen-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204871" comment="xen-doc-html-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204872" comment="xen-doc-pdf-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204873" comment="xen-kmp-default-4.2.5_12_3.0.101_0.47.55-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204874" comment="xen-kmp-pae-4.2.5_12_3.0.101_0.47.55-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204875" comment="xen-libs-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204876" comment="xen-libs-32bit-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204877" comment="xen-tools-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204878" comment="xen-tools-domU-4.2.5_12-15 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202109" comment="xen-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204871" comment="xen-doc-html-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204872" comment="xen-doc-pdf-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204873" comment="xen-kmp-default-4.2.5_12_3.0.101_0.47.55-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204875" comment="xen-libs-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204876" comment="xen-libs-32bit-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204877" comment="xen-tools-4.2.5_12-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204878" comment="xen-tools-domU-4.2.5_12-15 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5174</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-5174" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5174" source="CVE"/>
    <description>
    Directory traversal vulnerability in RequestUtil.java in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.65, and 8.x before 8.0.27 allows remote authenticated users to bypass intended SecurityManager restrictions and list a parent directory via a /.. (slash dot dot) in a pathname used by a web application in a getResource, getResourceAsStream, or getResourcePaths call, as demonstrated by the $CATALINA_BASE/webapps directory.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5174.html">CVE-2015-5174</cve>
<bugzilla href="https://bugzilla.suse.com/967967">SUSE bug 967967</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210850" comment="tomcat6-6.0.45-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210851" comment="tomcat6-admin-webapps-6.0.45-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210852" comment="tomcat6-docs-webapp-6.0.45-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210853" comment="tomcat6-javadoc-6.0.45-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210854" comment="tomcat6-jsp-2_1-api-6.0.45-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210855" comment="tomcat6-lib-6.0.45-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210856" comment="tomcat6-servlet-2_5-api-6.0.45-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210857" comment="tomcat6-webapps-6.0.45-0.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5180</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-5180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5180" source="CVE"/>
    <description>
    res_query in libresolv in glibc before 2.25 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash).
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5180.html">CVE-2015-5180</cve>
<bugzilla href="https://bugzilla.suse.com/941234">SUSE bug 941234</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009235436" comment="glibc-2.11.3-17.110.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235452" comment="glibc-32bit-2.11.3-17.110.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235447" comment="glibc-devel-2.11.3-17.110.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235453" comment="glibc-devel-32bit-2.11.3-17.110.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235437" comment="glibc-html-2.11.3-17.110.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235448" comment="glibc-i18ndata-2.11.3-17.110.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235438" comment="glibc-info-2.11.3-17.110.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235449" comment="glibc-locale-2.11.3-17.110.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235454" comment="glibc-locale-32bit-2.11.3-17.110.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235450" comment="glibc-profile-2.11.3-17.110.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235455" comment="glibc-profile-32bit-2.11.3-17.110.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235451" comment="nscd-2.11.3-17.110.19 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5185</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-5185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5185" source="CVE"/>
    <description>
    The lookupProviders function in providerMgr.c in sblim-sfcb 1.3.4 and 1.3.18 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty className in a packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5185.html">CVE-2015-5185</cve>
<bugzilla href="https://bugzilla.suse.com/942628">SUSE bug 942628</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204843" comment="sblim-sfcb-1.3.11-0.25 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5194</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-5194" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5194" source="CVE"/>
    <description>
    The log_config_command function in ntp_parser.y in ntpd in NTP before 4.2.7p42 allows remote attackers to cause a denial of service (ntpd crash) via crafted logconfig commands.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5194.html">CVE-2015-5194</cve>
<bugzilla href="https://bugzilla.suse.com/943216">SUSE bug 943216</bugzilla>
<bugzilla href="https://bugzilla.suse.com/943218">SUSE bug 943218</bugzilla>
<bugzilla href="https://bugzilla.suse.com/943219">SUSE bug 943219</bugzilla>
<bugzilla href="https://bugzilla.suse.com/943221">SUSE bug 943221</bugzilla>
<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207904" comment="ntp-4.2.8p6-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207905" comment="ntp-doc-4.2.8p6-41 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5203</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-5203" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5203" source="CVE"/>
    <description>
    Double free vulnerability in the jasper_image_stop_load function in JasPer 1.900.17 allows remote attackers to cause a denial of service (crash) via a crafted JPEG 2000 image file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5203.html">CVE-2015-5203</cve>
<bugzilla href="https://bugzilla.suse.com/941919">SUSE bug 941919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/942553">SUSE bug 942553</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202748" comment="jasper-1.900.14-134.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209367" comment="libjasper-1.900.14-134.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209368" comment="libjasper-32bit-1.900.14-134.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5219</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-5219" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5219" source="CVE"/>
    <description>
    The ULOGTOD function in ntp.d in SNTP before 4.2.7p366 does not properly perform type conversions from a precision value to a double, which allows remote attackers to cause a denial of service (infinite loop) via a crafted NTP packet.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5219.html">CVE-2015-5219</cve>
<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/943216">SUSE bug 943216</bugzilla>
<bugzilla href="https://bugzilla.suse.com/943218">SUSE bug 943218</bugzilla>
<bugzilla href="https://bugzilla.suse.com/943219">SUSE bug 943219</bugzilla>
<bugzilla href="https://bugzilla.suse.com/943221">SUSE bug 943221</bugzilla>
<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205679" comment="ntp-4.2.8p9-48.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205680" comment="ntp-doc-4.2.8p9-48.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5221</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-5221" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5221" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mif_process_cmpt function in libjasper/mif/mif_cod.c in the JasPer JPEG-2000 library before 1.900.2 allows remote attackers to cause a denial of service (crash) via a crafted JPEG 2000 image file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5221.html">CVE-2015-5221</cve>
<bugzilla href="https://bugzilla.suse.com/942553">SUSE bug 942553</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202748" comment="jasper-1.900.14-134.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209367" comment="libjasper-1.900.14-134.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209368" comment="libjasper-32bit-1.900.14-134.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5223</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-5223" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5223" source="CVE"/>
    <description>
    OpenStack Object Storage (Swift) before 2.4.0 allows attackers to obtain sensitive information via a PUT tempurl and a DLO object manifest that references an object in another container.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5223.html">CVE-2015-5223</cve>
<bugzilla href="https://bugzilla.suse.com/942641">SUSE bug 942641</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215911" comment="openstack-swift-2.1.0-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215912" comment="openstack-swift-account-2.1.0-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215913" comment="openstack-swift-container-2.1.0-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215914" comment="openstack-swift-doc-2.1.0-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215915" comment="openstack-swift-object-2.1.0-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215916" comment="openstack-swift-proxy-2.1.0-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215917" comment="python-swift-2.1.0-11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5239</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-5239" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5239" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5239.html">CVE-2015-5239</cve>
<bugzilla href="https://bugzilla.suse.com/944463">SUSE bug 944463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202111" comment="xen-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204879" comment="xen-doc-html-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204880" comment="xen-doc-pdf-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204881" comment="xen-kmp-default-4.2.5_14_3.0.101_0.47.67-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204882" comment="xen-kmp-pae-4.2.5_14_3.0.101_0.47.67-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204883" comment="xen-libs-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204884" comment="xen-libs-32bit-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204885" comment="xen-tools-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204886" comment="xen-tools-domU-4.2.5_14-18 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202111" comment="xen-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204879" comment="xen-doc-html-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204880" comment="xen-doc-pdf-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204881" comment="xen-kmp-default-4.2.5_14_3.0.101_0.47.67-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204883" comment="xen-libs-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204884" comment="xen-libs-32bit-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204885" comment="xen-tools-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204886" comment="xen-tools-domU-4.2.5_14-18 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5240</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-5240" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5240" source="CVE"/>
    <description>
    Race condition in OpenStack Neutron before 2014.2.4 and 2015.1 before 2015.1.2, when using the ML2 plugin or the security groups AMQP API, allows remote authenticated users to bypass IP anti-spoofing controls by changing the device owner of a port to start with network: before the security group rules are applied.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5240.html">CVE-2015-5240</cve>
<bugzilla href="https://bugzilla.suse.com/943648">SUSE bug 943648</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215793" comment="crowbar-barclamp-neutron-1.9+git.1443859419.95e948a-12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215794" comment="openstack-neutron-2014.2.4~a0~dev103-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215795" comment="openstack-neutron-dhcp-agent-2014.2.4~a0~dev103-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215796" comment="openstack-neutron-doc-2014.2.4~a0~dev103-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215797" comment="openstack-neutron-ha-tool-2014.2.4~a0~dev103-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215798" comment="openstack-neutron-ibm-agent-2014.2.4~a0~dev103-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215799" comment="openstack-neutron-l3-agent-2014.2.4~a0~dev103-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215800" comment="openstack-neutron-lbaas-agent-2014.2.4~a0~dev103-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215801" comment="openstack-neutron-linuxbridge-agent-2014.2.4~a0~dev103-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215802" comment="openstack-neutron-metadata-agent-2014.2.4~a0~dev103-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215803" comment="openstack-neutron-metering-agent-2014.2.4~a0~dev103-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215804" comment="openstack-neutron-mlnx-agent-2014.2.4~a0~dev103-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215805" comment="openstack-neutron-nec-agent-2014.2.4~a0~dev103-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215806" comment="openstack-neutron-nvsd-agent-2014.2.4~a0~dev103-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215807" comment="openstack-neutron-openvswitch-agent-2014.2.4~a0~dev103-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215808" comment="openstack-neutron-plugin-cisco-2014.2.4~a0~dev103-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215809" comment="openstack-neutron-restproxy-agent-2014.2.4~a0~dev103-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215810" comment="openstack-neutron-ryu-agent-2014.2.4~a0~dev103-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215811" comment="openstack-neutron-server-2014.2.4~a0~dev103-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215812" comment="openstack-neutron-vpn-agent-2014.2.4~a0~dev103-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215813" comment="python-neutron-2014.2.4~a0~dev103-16 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5251</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-5251" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5251" source="CVE"/>
    <description>
    OpenStack Image Service (Glance) before 2014.2.4 (juno) and 2015.1.x before 2015.1.2 (kilo) allow remote authenticated users to change the status of their images and bypass access restrictions via the HTTP x-image-meta-status header to images/*.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5251.html">CVE-2015-5251</cve>
<bugzilla href="https://bugzilla.suse.com/945994">SUSE bug 945994</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215868" comment="openstack-glance-2014.2.4.juno-14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215869" comment="openstack-glance-doc-2014.2.4.juno-14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215870" comment="python-glance-2014.2.4.juno-14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5252</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-5252" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5252" source="CVE"/>
    <description>
    vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5252.html">CVE-2015-5252</cve>
<bugzilla href="https://bugzilla.suse.com/958582">SUSE bug 958582</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209033" comment="ldapsmb-1.34b-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204824" comment="libldb1-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204826" comment="libsmbclient0-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204827" comment="libsmbclient0-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204828" comment="libtalloc2-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204829" comment="libtalloc2-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204830" comment="libtdb1-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204831" comment="libtdb1-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204832" comment="libtevent0-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204833" comment="libtevent0-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204834" comment="libwbclient0-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204835" comment="libwbclient0-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202082" comment="samba-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204836" comment="samba-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204837" comment="samba-client-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204838" comment="samba-client-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204839" comment="samba-doc-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204840" comment="samba-krb-printing-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204841" comment="samba-winbind-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204842" comment="samba-winbind-32bit-3.6.3-64 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209033" comment="ldapsmb-1.34b-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204824" comment="libldb1-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204826" comment="libsmbclient0-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204827" comment="libsmbclient0-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209034" comment="libsmbclient0-x86-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204828" comment="libtalloc2-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204829" comment="libtalloc2-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209035" comment="libtalloc2-x86-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204830" comment="libtdb1-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204831" comment="libtdb1-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209036" comment="libtdb1-x86-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204832" comment="libtevent0-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204833" comment="libtevent0-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204834" comment="libwbclient0-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204835" comment="libwbclient0-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209037" comment="libwbclient0-x86-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202082" comment="samba-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204836" comment="samba-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204837" comment="samba-client-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204838" comment="samba-client-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209038" comment="samba-client-x86-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204839" comment="samba-doc-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204840" comment="samba-krb-printing-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204841" comment="samba-winbind-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204842" comment="samba-winbind-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209039" comment="samba-winbind-x86-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209040" comment="samba-x86-3.6.3-64 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155276" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5276</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-5276" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5276" source="CVE"/>
    <description>
    The std::random_device class in libstdc++ in the GNU Compiler Collection (aka GCC) before 4.9.4 does not properly handle short reads from blocking sources, which makes it easier for context-dependent attackers to predict the random values via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5276.html">CVE-2015-5276</cve>
<bugzilla href="https://bugzilla.suse.com/945842">SUSE bug 945842</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202571" comment="cpp48-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202572" comment="gcc48-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202573" comment="gcc48-32bit-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202574" comment="gcc48-c++-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202575" comment="gcc48-fortran-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202576" comment="gcc48-fortran-32bit-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202577" comment="gcc48-info-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202578" comment="gcc48-locale-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202579" comment="libasan0-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202580" comment="libasan0-32bit-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247925" comment="libatomic1-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247926" comment="libatomic1-32bit-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247927" comment="libgcc_s1-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247928" comment="libgcc_s1-32bit-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247929" comment="libgfortran3-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247930" comment="libgfortran3-32bit-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247931" comment="libgomp1-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247932" comment="libgomp1-32bit-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247933" comment="libitm1-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247934" comment="libitm1-32bit-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247935" comment="libmpfr4-3.1.2-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247936" comment="libquadmath0-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247937" comment="libquadmath0-32bit-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202581" comment="libstdc++48-devel-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202582" comment="libstdc++48-devel-32bit-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247938" comment="libstdc++6-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247939" comment="libstdc++6-32bit-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247940" comment="libtsan0-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247941" comment="mpfr-3.1.2-3.3 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5278</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-5278" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5278" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5278.html">CVE-2015-5278</cve>
<bugzilla href="https://bugzilla.suse.com/945989">SUSE bug 945989</bugzilla>
<bugzilla href="https://bugzilla.suse.com/964947">SUSE bug 964947</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209045" comment="xen-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209046" comment="xen-doc-html-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209047" comment="xen-doc-pdf-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209048" comment="xen-kmp-default-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209049" comment="xen-kmp-pae-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209050" comment="xen-libs-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209051" comment="xen-libs-32bit-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209052" comment="xen-tools-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209053" comment="xen-tools-domU-4.2.5_20-24 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155279" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5279</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-5279" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5279" source="CVE"/>
    <description>
    Heap-based buffer overflow in the ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via vectors related to receiving packets.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5279.html">CVE-2015-5279</cve>
<bugzilla href="https://bugzilla.suse.com/945987">SUSE bug 945987</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5286</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-5286" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5286" source="CVE"/>
    <description>
    OpenStack Image Service (Glance) before 2014.2.4 (juno) and 2015.1.x before 2015.1.2 (kilo) allows remote authenticated users to bypass the storage quota and cause a denial of service (disk consumption) by deleting images that are being uploaded using a token that expires during the process.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-9623.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5286.html">CVE-2015-5286</cve>
<bugzilla href="https://bugzilla.suse.com/947735">SUSE bug 947735</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215868" comment="openstack-glance-2014.2.4.juno-14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215869" comment="openstack-glance-doc-2014.2.4.juno-14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215870" comment="python-glance-2014.2.4.juno-14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5288</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-5288" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5288" source="CVE"/>
    <description>
    The crypt function in contrib/pgcrypto in PostgreSQL before 9.0.23, 9.1.x before 9.1.19, 9.2.x before 9.2.14, 9.3.x before 9.3.10, and 9.4.x before 9.4.5 allows attackers to cause a denial of service (server crash) or read arbitrary server memory via a "too-short" salt.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5288.html">CVE-2015-5288</cve>
<bugzilla href="https://bugzilla.suse.com/949669">SUSE bug 949669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/949670">SUSE bug 949670</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204754" comment="libecpg6-9.4.5-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204755" comment="libpq5-9.4.5-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204756" comment="libpq5-32bit-9.4.5-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204766" comment="postgresql91-9.1.19-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208948" comment="postgresql91-contrib-9.1.19-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204767" comment="postgresql91-docs-9.1.19-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208949" comment="postgresql91-server-9.1.19-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204757" comment="postgresql94-9.4.5-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208942" comment="postgresql94-contrib-9.4.5-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204758" comment="postgresql94-docs-9.4.5-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201995" comment="postgresql94-libs-9.4.5-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208943" comment="postgresql94-server-9.4.5-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205077" comment="libecpg6-9.4.6-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205078" comment="libpq5-9.4.6-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205079" comment="libpq5-32bit-9.4.6-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204766" comment="postgresql91-9.1.19-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208948" comment="postgresql91-contrib-9.1.19-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204767" comment="postgresql91-docs-9.1.19-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208949" comment="postgresql91-server-9.1.19-0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205080" comment="postgresql94-9.4.6-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210626" comment="postgresql94-contrib-9.4.6-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205081" comment="postgresql94-docs-9.4.6-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203383" comment="postgresql94-libs-9.4.6-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210627" comment="postgresql94-server-9.4.6-0.14 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5289</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-5289" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5289" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in json parsing in PostgreSQL before 9.3.x before 9.3.10 and 9.4.x before 9.4.5 allow attackers to cause a denial of service (server crash) via unspecified vectors, which are not properly handled in (1) json or (2) jsonb values.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5289.html">CVE-2015-5289</cve>
<bugzilla href="https://bugzilla.suse.com/949669">SUSE bug 949669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/949670">SUSE bug 949670</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204754" comment="libecpg6-9.4.5-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204755" comment="libpq5-9.4.5-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204756" comment="libpq5-32bit-9.4.5-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204757" comment="postgresql94-9.4.5-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208942" comment="postgresql94-contrib-9.4.5-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204758" comment="postgresql94-docs-9.4.5-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201995" comment="postgresql94-libs-9.4.5-0.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208943" comment="postgresql94-server-9.4.5-0.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205077" comment="libecpg6-9.4.6-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205078" comment="libpq5-9.4.6-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205079" comment="libpq5-32bit-9.4.6-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205080" comment="postgresql94-9.4.6-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210626" comment="postgresql94-contrib-9.4.6-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205081" comment="postgresql94-docs-9.4.6-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203383" comment="postgresql94-libs-9.4.6-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210627" comment="postgresql94-server-9.4.6-0.14 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5296</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-5296" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5296" source="CVE"/>
    <description>
    Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 supports connections that are encrypted but unsigned, which allows man-in-the-middle attackers to conduct encrypted-to-unencrypted downgrade attacks by modifying the client-server data stream, related to clidfs.c, libsmb_server.c, and smbXcli_base.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5296.html">CVE-2015-5296</cve>
<bugzilla href="https://bugzilla.suse.com/1058622">SUSE bug 1058622</bugzilla>
<bugzilla href="https://bugzilla.suse.com/958584">SUSE bug 958584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/973031">SUSE bug 973031</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209033" comment="ldapsmb-1.34b-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204824" comment="libldb1-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204826" comment="libsmbclient0-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204827" comment="libsmbclient0-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204828" comment="libtalloc2-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204829" comment="libtalloc2-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204830" comment="libtdb1-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204831" comment="libtdb1-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204832" comment="libtevent0-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204833" comment="libtevent0-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204834" comment="libwbclient0-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204835" comment="libwbclient0-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202082" comment="samba-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204836" comment="samba-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204837" comment="samba-client-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204838" comment="samba-client-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204839" comment="samba-doc-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204840" comment="samba-krb-printing-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204841" comment="samba-winbind-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204842" comment="samba-winbind-32bit-3.6.3-64 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209033" comment="ldapsmb-1.34b-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204824" comment="libldb1-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204826" comment="libsmbclient0-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204827" comment="libsmbclient0-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209034" comment="libsmbclient0-x86-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204828" comment="libtalloc2-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204829" comment="libtalloc2-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209035" comment="libtalloc2-x86-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204830" comment="libtdb1-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204831" comment="libtdb1-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209036" comment="libtdb1-x86-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204832" comment="libtevent0-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204833" comment="libtevent0-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204834" comment="libwbclient0-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204835" comment="libwbclient0-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209037" comment="libwbclient0-x86-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202082" comment="samba-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204836" comment="samba-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204837" comment="samba-client-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204838" comment="samba-client-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209038" comment="samba-client-x86-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204839" comment="samba-doc-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204840" comment="samba-krb-printing-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204841" comment="samba-winbind-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204842" comment="samba-winbind-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209039" comment="samba-winbind-x86-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209040" comment="samba-x86-3.6.3-64 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155299" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5299</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-5299" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5299" source="CVE"/>
    <description>
    The shadow_copy2_get_shadow_copy_data function in modules/vfs_shadow_copy2.c in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 does not verify that the DIRECTORY_LIST access right has been granted, which allows remote attackers to access snapshots by visiting a shadow copy directory.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5299.html">CVE-2015-5299</cve>
<bugzilla href="https://bugzilla.suse.com/958583">SUSE bug 958583</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209033" comment="ldapsmb-1.34b-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204824" comment="libldb1-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204826" comment="libsmbclient0-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204827" comment="libsmbclient0-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204828" comment="libtalloc2-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204829" comment="libtalloc2-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204830" comment="libtdb1-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204831" comment="libtdb1-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204832" comment="libtevent0-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204833" comment="libtevent0-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204834" comment="libwbclient0-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204835" comment="libwbclient0-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202082" comment="samba-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204836" comment="samba-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204837" comment="samba-client-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204838" comment="samba-client-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204839" comment="samba-doc-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204840" comment="samba-krb-printing-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204841" comment="samba-winbind-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204842" comment="samba-winbind-32bit-3.6.3-64 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209033" comment="ldapsmb-1.34b-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204824" comment="libldb1-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204826" comment="libsmbclient0-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204827" comment="libsmbclient0-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209034" comment="libsmbclient0-x86-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204828" comment="libtalloc2-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204829" comment="libtalloc2-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209035" comment="libtalloc2-x86-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204830" comment="libtdb1-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204831" comment="libtdb1-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209036" comment="libtdb1-x86-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204832" comment="libtevent0-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204833" comment="libtevent0-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204834" comment="libwbclient0-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204835" comment="libwbclient0-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209037" comment="libwbclient0-x86-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202082" comment="samba-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204836" comment="samba-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204837" comment="samba-client-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204838" comment="samba-client-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209038" comment="samba-client-x86-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204839" comment="samba-doc-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204840" comment="samba-krb-printing-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204841" comment="samba-winbind-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204842" comment="samba-winbind-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209039" comment="samba-winbind-x86-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209040" comment="samba-x86-3.6.3-64 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5300</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-5300" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5300" source="CVE"/>
    <description>
    The panic_gate check in NTP before 4.2.8p5 is only re-enabled after the first change to the system clock that was greater than 128 milliseconds by default, which allows remote attackers to set NTP to an arbitrary time when started with the -g option, or to alter the time by up to 900 seconds otherwise by responding to an unspecified number of requests from trusted sources, and leveraging a resulting denial of service (abort and restart).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5300.html">CVE-2015-5300</cve>
<bugzilla href="https://bugzilla.suse.com/951629">SUSE bug 951629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207904" comment="ntp-4.2.8p6-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207905" comment="ntp-doc-4.2.8p6-41 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155307" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5307</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-5307" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5307" source="CVE"/>
    <description>
    The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5307.html">CVE-2015-5307</cve>
<bugzilla href="https://bugzilla.suse.com/953527">SUSE bug 953527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/954018">SUSE bug 954018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/954404">SUSE bug 954404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/954405">SUSE bug 954405</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962977">SUSE bug 962977</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204546" comment="kernel-bigsmp-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208678" comment="kernel-bigsmp-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204547" comment="kernel-bigsmp-devel-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204548" comment="kernel-default-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204549" comment="kernel-default-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204550" comment="kernel-default-devel-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208679" comment="kernel-default-man-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208680" comment="kernel-ec2-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208681" comment="kernel-ec2-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208682" comment="kernel-ec2-devel-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204552" comment="kernel-pae-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204553" comment="kernel-pae-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204554" comment="kernel-pae-devel-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208683" comment="kernel-ppc64-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208684" comment="kernel-ppc64-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208685" comment="kernel-ppc64-devel-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204556" comment="kernel-source-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204557" comment="kernel-syms-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204558" comment="kernel-trace-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208686" comment="kernel-trace-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204559" comment="kernel-trace-devel-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204560" comment="kernel-xen-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204561" comment="kernel-xen-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204562" comment="kernel-xen-devel-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202120" comment="xen-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204950" comment="xen-doc-html-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204951" comment="xen-doc-pdf-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204952" comment="xen-kmp-default-4.2.5_18_3.0.101_0.47.71-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204953" comment="xen-kmp-pae-4.2.5_18_3.0.101_0.47.71-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204954" comment="xen-libs-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204955" comment="xen-libs-32bit-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204956" comment="xen-tools-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204957" comment="xen-tools-domU-4.2.5_18-21 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5312</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-5312" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5312" source="CVE"/>
    <description>
    The xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.3 does not properly prevent entity expansion, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted XML data, a different vulnerability than CVE-2014-3660.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5312.html">CVE-2015-5312</cve>
<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/957105">SUSE bug 957105</bugzilla>
<bugzilla href="https://bugzilla.suse.com/959469">SUSE bug 959469</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201905" comment="libxml2-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204668" comment="libxml2-32bit-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208763" comment="libxml2-doc-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204669" comment="libxml2-python-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208764" comment="libxml2-x86-2.7.6-0.34 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201905" comment="libxml2-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204668" comment="libxml2-32bit-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208763" comment="libxml2-doc-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204669" comment="libxml2-python-2.7.6-0.34 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5330</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-5330" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5330" source="CVE"/>
    <description>
    ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5330.html">CVE-2015-5330</cve>
<bugzilla href="https://bugzilla.suse.com/958581">SUSE bug 958581</bugzilla>
<bugzilla href="https://bugzilla.suse.com/958586">SUSE bug 958586</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209033" comment="ldapsmb-1.34b-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204824" comment="libldb1-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204826" comment="libsmbclient0-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204827" comment="libsmbclient0-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204828" comment="libtalloc2-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204829" comment="libtalloc2-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204830" comment="libtdb1-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204831" comment="libtdb1-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204832" comment="libtevent0-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204833" comment="libtevent0-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204834" comment="libwbclient0-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204835" comment="libwbclient0-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202082" comment="samba-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204836" comment="samba-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204837" comment="samba-client-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204838" comment="samba-client-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204839" comment="samba-doc-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204840" comment="samba-krb-printing-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204841" comment="samba-winbind-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204842" comment="samba-winbind-32bit-3.6.3-64 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209033" comment="ldapsmb-1.34b-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204824" comment="libldb1-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204826" comment="libsmbclient0-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204827" comment="libsmbclient0-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209034" comment="libsmbclient0-x86-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204828" comment="libtalloc2-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204829" comment="libtalloc2-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209035" comment="libtalloc2-x86-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204830" comment="libtdb1-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204831" comment="libtdb1-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209036" comment="libtdb1-x86-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204832" comment="libtevent0-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204833" comment="libtevent0-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204834" comment="libwbclient0-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204835" comment="libwbclient0-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209037" comment="libwbclient0-x86-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202082" comment="samba-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204836" comment="samba-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204837" comment="samba-client-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204838" comment="samba-client-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209038" comment="samba-client-x86-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204839" comment="samba-doc-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204840" comment="samba-krb-printing-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204841" comment="samba-winbind-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204842" comment="samba-winbind-32bit-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209039" comment="samba-winbind-x86-3.6.3-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209040" comment="samba-x86-3.6.3-64 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5345</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-5345" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5345" source="CVE"/>
    <description>
    The Mapper component in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.30, and 9.x before 9.0.0.M2 processes redirects before considering security constraints and Filters, which allows remote attackers to determine the existence of a directory via a URL that lacks a trailing / (slash) character.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5345.html">CVE-2015-5345</cve>
<bugzilla href="https://bugzilla.suse.com/967965">SUSE bug 967965</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210850" comment="tomcat6-6.0.45-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210851" comment="tomcat6-admin-webapps-6.0.45-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210852" comment="tomcat6-docs-webapp-6.0.45-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210853" comment="tomcat6-javadoc-6.0.45-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210854" comment="tomcat6-jsp-2_1-api-6.0.45-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210855" comment="tomcat6-lib-6.0.45-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210856" comment="tomcat6-servlet-2_5-api-6.0.45-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210857" comment="tomcat6-webapps-6.0.45-0.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5352</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-5352" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5352" source="CVE"/>
    <description>
    The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5352.html">CVE-2015-5352</cve>
<bugzilla href="https://bugzilla.suse.com/1074631">SUSE bug 1074631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
<bugzilla href="https://bugzilla.suse.com/936695">SUSE bug 936695</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938277">SUSE bug 938277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/948086">SUSE bug 948086</bugzilla>
<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204730" comment="openssh-6.2p2-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204731" comment="openssh-askpass-6.2p2-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204732" comment="openssh-askpass-gnome-6.2p2-0.21 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5364</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-5364" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5364" source="CVE"/>
    <description>
    The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 do not properly consider yielding a processor, which allows remote attackers to cause a denial of service (system hang) via incorrect checksums within a UDP packet flood.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5364.html">CVE-2015-5364</cve>
<bugzilla href="https://bugzilla.suse.com/781018">SUSE bug 781018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/936831">SUSE bug 936831</bugzilla>
<bugzilla href="https://bugzilla.suse.com/939276">SUSE bug 939276</bugzilla>
<bugzilla href="https://bugzilla.suse.com/945112">SUSE bug 945112</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204527" comment="kernel-bigsmp-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208622" comment="kernel-bigsmp-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204528" comment="kernel-bigsmp-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204529" comment="kernel-default-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204530" comment="kernel-default-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204531" comment="kernel-default-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208623" comment="kernel-default-man-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208624" comment="kernel-ec2-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208625" comment="kernel-ec2-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208626" comment="kernel-ec2-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204533" comment="kernel-pae-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204534" comment="kernel-pae-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204535" comment="kernel-pae-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208627" comment="kernel-ppc64-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208628" comment="kernel-ppc64-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208629" comment="kernel-ppc64-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204537" comment="kernel-source-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204538" comment="kernel-syms-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204539" comment="kernel-trace-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208630" comment="kernel-trace-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204540" comment="kernel-trace-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204541" comment="kernel-xen-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204542" comment="kernel-xen-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204543" comment="kernel-xen-devel-3.0.101-0.47.67 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155366" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5366</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-5366" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5366" source="CVE"/>
    <description>
    The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 provide inappropriate -EAGAIN return values, which allows remote attackers to cause a denial of service (EPOLLET epoll application read outage) via an incorrect checksum in a UDP packet, a different vulnerability than CVE-2015-5364.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5366.html">CVE-2015-5366</cve>
<bugzilla href="https://bugzilla.suse.com/781018">SUSE bug 781018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/936831">SUSE bug 936831</bugzilla>
<bugzilla href="https://bugzilla.suse.com/939276">SUSE bug 939276</bugzilla>
<bugzilla href="https://bugzilla.suse.com/945112">SUSE bug 945112</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204527" comment="kernel-bigsmp-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208622" comment="kernel-bigsmp-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204528" comment="kernel-bigsmp-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204529" comment="kernel-default-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204530" comment="kernel-default-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204531" comment="kernel-default-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208623" comment="kernel-default-man-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208624" comment="kernel-ec2-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208625" comment="kernel-ec2-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208626" comment="kernel-ec2-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204533" comment="kernel-pae-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204534" comment="kernel-pae-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204535" comment="kernel-pae-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208627" comment="kernel-ppc64-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208628" comment="kernel-ppc64-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208629" comment="kernel-ppc64-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204537" comment="kernel-source-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204538" comment="kernel-syms-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204539" comment="kernel-trace-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208630" comment="kernel-trace-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204540" comment="kernel-trace-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204541" comment="kernel-xen-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204542" comment="kernel-xen-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204543" comment="kernel-xen-devel-3.0.101-0.47.67 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5370</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-5370" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370" source="CVE"/>
    <description>
    Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not properly implement the DCE-RPC layer, which allows remote attackers to perform protocol-downgrade attacks, cause a denial of service (application crash or CPU consumption), or possibly execute arbitrary code on a client system via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5370.html">CVE-2015-5370</cve>
<bugzilla href="https://bugzilla.suse.com/936862">SUSE bug 936862</bugzilla>
<bugzilla href="https://bugzilla.suse.com/975276">SUSE bug 975276</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208966" comment="ldapsmb-1.34b-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208967" comment="libldb1-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208968" comment="libsmbclient0-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208969" comment="libsmbclient0-32bit-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208970" comment="libtalloc2-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208971" comment="libtalloc2-32bit-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208972" comment="libtdb1-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208973" comment="libtdb1-32bit-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208974" comment="libtevent0-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208975" comment="libtevent0-32bit-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208976" comment="libwbclient0-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208977" comment="libwbclient0-32bit-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202058" comment="samba-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208978" comment="samba-32bit-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208979" comment="samba-client-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208980" comment="samba-client-32bit-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208981" comment="samba-doc-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208982" comment="samba-krb-printing-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208983" comment="samba-winbind-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208984" comment="samba-winbind-32bit-3.6.3-76 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5400</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-5400" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5400" source="CVE"/>
    <description>
    Squid before 3.5.6 does not properly handle CONNECT method peer responses when configured with cache_peer, which allows remote attackers to bypass intended restrictions and gain access to a backend proxy via a CONNECT request.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5400.html">CVE-2015-5400</cve>
<bugzilla href="https://bugzilla.suse.com/938715">SUSE bug 938715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/967073">SUSE bug 967073</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210806" comment="squid3-3.1.23-8.16.30 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5477</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-5477" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5477" source="CVE"/>
    <description>
    named in ISC BIND 9.x before 9.9.7-P2 and 9.10.x before 9.10.2-P3 allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via TKEY queries.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5477.html">CVE-2015-5477</cve>
<bugzilla href="https://bugzilla.suse.com/1000362">SUSE bug 1000362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/939567">SUSE bug 939567</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980168">SUSE bug 980168</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201589" comment="bind-9.9.6P1-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207606" comment="bind-chrootenv-9.9.6P1-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207607" comment="bind-doc-9.9.6P1-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204216" comment="bind-libs-9.9.6P1-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204217" comment="bind-libs-32bit-9.9.6P1-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204218" comment="bind-utils-9.9.6P1-0.12 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201589" comment="bind-9.9.6P1-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207606" comment="bind-chrootenv-9.9.6P1-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207607" comment="bind-doc-9.9.6P1-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204216" comment="bind-libs-9.9.6P1-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204217" comment="bind-libs-32bit-9.9.6P1-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208434" comment="bind-libs-x86-9.9.6P1-0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204218" comment="bind-utils-9.9.6P1-0.12 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5589</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-5589" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5589" source="CVE"/>
    <description>
    The phar_convert_to_other function in ext/phar/phar_object.c in PHP before 5.4.43, 5.5.x before 5.5.27, and 5.6.x before 5.6.11 does not validate a file pointer before a close operation, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted TAR archive that is mishandled in a Phar::convertToData call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5589.html">CVE-2015-5589</cve>
<bugzilla href="https://bugzilla.suse.com/935074">SUSE bug 935074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938721">SUSE bug 938721</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208809" comment="apache2-mod_php53-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201972" comment="php53-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208810" comment="php53-bcmath-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208811" comment="php53-bz2-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208812" comment="php53-calendar-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208813" comment="php53-ctype-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208814" comment="php53-curl-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208815" comment="php53-dba-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208816" comment="php53-dom-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208817" comment="php53-exif-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208818" comment="php53-fastcgi-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208819" comment="php53-fileinfo-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208820" comment="php53-ftp-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208821" comment="php53-gd-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208822" comment="php53-gettext-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208823" comment="php53-gmp-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208824" comment="php53-iconv-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208825" comment="php53-intl-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208826" comment="php53-json-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208827" comment="php53-ldap-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208828" comment="php53-mbstring-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208829" comment="php53-mcrypt-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208830" comment="php53-mysql-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208831" comment="php53-odbc-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208832" comment="php53-openssl-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208833" comment="php53-pcntl-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208834" comment="php53-pdo-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208835" comment="php53-pear-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208836" comment="php53-pgsql-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208837" comment="php53-pspell-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208838" comment="php53-shmop-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208839" comment="php53-snmp-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208840" comment="php53-soap-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208841" comment="php53-suhosin-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208842" comment="php53-sysvmsg-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208843" comment="php53-sysvsem-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208844" comment="php53-sysvshm-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208845" comment="php53-tokenizer-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208846" comment="php53-wddx-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208847" comment="php53-xmlreader-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208848" comment="php53-xmlrpc-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208849" comment="php53-xmlwriter-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208850" comment="php53-xsl-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208851" comment="php53-zip-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208852" comment="php53-zlib-5.3.17-45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5590</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-5590" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5590" source="CVE"/>
    <description>
    Stack-based buffer overflow in the phar_fix_filepath function in ext/phar/phar.c in PHP before 5.4.43, 5.5.x before 5.5.27, and 5.6.x before 5.6.11 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a large length value, as demonstrated by mishandling of an e-mail attachment by the imap PHP extension.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5590.html">CVE-2015-5590</cve>
<bugzilla href="https://bugzilla.suse.com/935074">SUSE bug 935074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938719">SUSE bug 938719</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208809" comment="apache2-mod_php53-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201972" comment="php53-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208810" comment="php53-bcmath-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208811" comment="php53-bz2-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208812" comment="php53-calendar-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208813" comment="php53-ctype-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208814" comment="php53-curl-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208815" comment="php53-dba-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208816" comment="php53-dom-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208817" comment="php53-exif-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208818" comment="php53-fastcgi-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208819" comment="php53-fileinfo-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208820" comment="php53-ftp-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208821" comment="php53-gd-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208822" comment="php53-gettext-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208823" comment="php53-gmp-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208824" comment="php53-iconv-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208825" comment="php53-intl-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208826" comment="php53-json-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208827" comment="php53-ldap-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208828" comment="php53-mbstring-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208829" comment="php53-mcrypt-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208830" comment="php53-mysql-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208831" comment="php53-odbc-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208832" comment="php53-openssl-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208833" comment="php53-pcntl-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208834" comment="php53-pdo-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208835" comment="php53-pear-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208836" comment="php53-pgsql-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208837" comment="php53-pspell-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208838" comment="php53-shmop-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208839" comment="php53-snmp-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208840" comment="php53-soap-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208841" comment="php53-suhosin-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208842" comment="php53-sysvmsg-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208843" comment="php53-sysvsem-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208844" comment="php53-sysvshm-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208845" comment="php53-tokenizer-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208846" comment="php53-wddx-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208847" comment="php53-xmlreader-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208848" comment="php53-xmlrpc-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208849" comment="php53-xmlwriter-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208850" comment="php53-xsl-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208851" comment="php53-zip-5.3.17-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208852" comment="php53-zlib-5.3.17-45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5600</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-5600" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5600" source="CVE"/>
    <description>
    The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5600.html">CVE-2015-5600</cve>
<bugzilla href="https://bugzilla.suse.com/1009988">SUSE bug 1009988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1074631">SUSE bug 1074631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
<bugzilla href="https://bugzilla.suse.com/938746">SUSE bug 938746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/943006">SUSE bug 943006</bugzilla>
<bugzilla href="https://bugzilla.suse.com/943007">SUSE bug 943007</bugzilla>
<bugzilla href="https://bugzilla.suse.com/943010">SUSE bug 943010</bugzilla>
<bugzilla href="https://bugzilla.suse.com/943504">SUSE bug 943504</bugzilla>
<bugzilla href="https://bugzilla.suse.com/945985">SUSE bug 945985</bugzilla>
<bugzilla href="https://bugzilla.suse.com/948086">SUSE bug 948086</bugzilla>
<bugzilla href="https://bugzilla.suse.com/954457">SUSE bug 954457</bugzilla>
<bugzilla href="https://bugzilla.suse.com/957883">SUSE bug 957883</bugzilla>
<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204730" comment="openssh-6.2p2-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204731" comment="openssh-askpass-6.2p2-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204732" comment="openssh-askpass-gnome-6.2p2-0.21 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5621</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-5621" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5621" source="CVE"/>
    <description>
    The snmp_pdu_parse function in snmp_api.c in net-snmp 5.7.2 and earlier does not remove the varBind variable in a netsnmp_variable_list item when parsing of the SNMP PDU fails, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5621.html">CVE-2015-5621</cve>
<bugzilla href="https://bugzilla.suse.com/1111123">SUSE bug 1111123</bugzilla>
<bugzilla href="https://bugzilla.suse.com/940188">SUSE bug 940188</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204708" comment="libsnmp15-5.4.2.1-8.12.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201951" comment="libsnmp15-32bit-5.4.2.1-8.12.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201952" comment="net-snmp-5.4.2.1-8.12.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204709" comment="perl-SNMP-5.4.2.1-8.12.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204710" comment="snmp-mibs-5.4.2.1-8.12.24 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204708" comment="libsnmp15-5.4.2.1-8.12.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201951" comment="libsnmp15-32bit-5.4.2.1-8.12.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208793" comment="libsnmp15-x86-5.4.2.1-8.12.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201952" comment="net-snmp-5.4.2.1-8.12.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204709" comment="perl-SNMP-5.4.2.1-8.12.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204710" comment="snmp-mibs-5.4.2.1-8.12.24 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5707</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-5707" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5707" source="CVE"/>
    <description>
    Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel 2.6.x through 4.x before 4.1 allows local users to cause a denial of service or possibly have unspecified other impact via a large iov_count value in a write request.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5707.html">CVE-2015-5707</cve>
<bugzilla href="https://bugzilla.suse.com/923755">SUSE bug 923755</bugzilla>
<bugzilla href="https://bugzilla.suse.com/940338">SUSE bug 940338</bugzilla>
<bugzilla href="https://bugzilla.suse.com/940342">SUSE bug 940342</bugzilla>
<bugzilla href="https://bugzilla.suse.com/963994">SUSE bug 963994</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204527" comment="kernel-bigsmp-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208622" comment="kernel-bigsmp-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204528" comment="kernel-bigsmp-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204529" comment="kernel-default-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204530" comment="kernel-default-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204531" comment="kernel-default-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208623" comment="kernel-default-man-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208624" comment="kernel-ec2-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208625" comment="kernel-ec2-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208626" comment="kernel-ec2-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204533" comment="kernel-pae-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204534" comment="kernel-pae-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204535" comment="kernel-pae-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208627" comment="kernel-ppc64-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208628" comment="kernel-ppc64-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208629" comment="kernel-ppc64-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204537" comment="kernel-source-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204538" comment="kernel-syms-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204539" comment="kernel-trace-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208630" comment="kernel-trace-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204540" comment="kernel-trace-devel-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204541" comment="kernel-xen-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204542" comment="kernel-xen-base-3.0.101-0.47.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204543" comment="kernel-xen-devel-3.0.101-0.47.67 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5722</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-5722" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5722" source="CVE"/>
    <description>
    buffer.c in named in ISC BIND 9.x before 9.9.7-P3 and 9.10.x before 9.10.2-P4 allows remote attackers to cause a denial of service (assertion failure and daemon exit) by creating a zone containing a malformed DNSSEC key and issuing a query for a name in that zone.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5722.html">CVE-2015-5722</cve>
<bugzilla href="https://bugzilla.suse.com/944066">SUSE bug 944066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/944107">SUSE bug 944107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/954983">SUSE bug 954983</bugzilla>
<bugzilla href="https://bugzilla.suse.com/958861">SUSE bug 958861</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201592" comment="bind-9.9.6P1-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207608" comment="bind-chrootenv-9.9.6P1-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207609" comment="bind-doc-9.9.6P1-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204219" comment="bind-libs-9.9.6P1-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204220" comment="bind-libs-32bit-9.9.6P1-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204221" comment="bind-utils-9.9.6P1-0.15 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201592" comment="bind-9.9.6P1-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207608" comment="bind-chrootenv-9.9.6P1-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207609" comment="bind-doc-9.9.6P1-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204219" comment="bind-libs-9.9.6P1-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204220" comment="bind-libs-32bit-9.9.6P1-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208435" comment="bind-libs-x86-9.9.6P1-0.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204221" comment="bind-utils-9.9.6P1-0.15 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-5745" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5745" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5745.html">CVE-2015-5745</cve>
<bugzilla href="https://bugzilla.suse.com/940929">SUSE bug 940929</bugzilla>
<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5963</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-5963" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5963" source="CVE"/>
    <description>
    contrib.sessions.middleware.SessionMiddleware in Django 1.8.x before 1.8.4, 1.7.x before 1.7.10, 1.4.x before 1.4.22, and possibly other versions allows remote attackers to cause a denial of service (session store consumption or session record removal) via a large number of requests to contrib.auth.views.logout, which triggers the creation of an empty session record.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5963.html">CVE-2015-5963</cve>
<bugzilla href="https://bugzilla.suse.com/941587">SUSE bug 941587</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215926" comment="python-Django-1.6.11-10 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6241</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-6241" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6241" source="CVE"/>
    <description>
    The proto_tree_add_bytes_item function in epan/proto.c in the protocol-tree implementation in Wireshark 1.12.x before 1.12.7 does not properly terminate a data structure after a failure to locate a number within a string, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6241.html">CVE-2015-6241</cve>
<bugzilla href="https://bugzilla.suse.com/941500">SUSE bug 941500</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202103" comment="wireshark-1.12.7-0.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6242</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-6242" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6242" source="CVE"/>
    <description>
    The wmem_block_split_free_chunk function in epan/wmem/wmem_allocator_block.c in the wmem block allocator in the memory manager in Wireshark 1.12.x before 1.12.7 does not properly consider a certain case of multiple realloc operations that restore a memory chunk to its original size, which allows remote attackers to cause a denial of service (incorrect free operation and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6242.html">CVE-2015-6242</cve>
<bugzilla href="https://bugzilla.suse.com/941500">SUSE bug 941500</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202103" comment="wireshark-1.12.7-0.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6243</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-6243" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6243" source="CVE"/>
    <description>
    The dissector-table implementation in epan/packet.c in Wireshark 1.12.x before 1.12.7 mishandles table searches for empty strings, which allows remote attackers to cause a denial of service (application crash) via a crafted packet, related to the (1) dissector_get_string_handle and (2) dissector_get_default_string_handle functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6243.html">CVE-2015-6243</cve>
<bugzilla href="https://bugzilla.suse.com/941500">SUSE bug 941500</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202103" comment="wireshark-1.12.7-0.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6244</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-6244" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6244" source="CVE"/>
    <description>
    The dissect_zbee_secure function in epan/dissectors/packet-zbee-security.c in the ZigBee dissector in Wireshark 1.12.x before 1.12.7 improperly relies on length fields contained in packet data, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6244.html">CVE-2015-6244</cve>
<bugzilla href="https://bugzilla.suse.com/941500">SUSE bug 941500</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202103" comment="wireshark-1.12.7-0.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6245</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-6245" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6245" source="CVE"/>
    <description>
    epan/dissectors/packet-gsm_rlcmac.c in the GSM RLC/MAC dissector in Wireshark 1.12.x before 1.12.7 uses incorrect integer data types, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6245.html">CVE-2015-6245</cve>
<bugzilla href="https://bugzilla.suse.com/941500">SUSE bug 941500</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202103" comment="wireshark-1.12.7-0.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6246</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-6246" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6246" source="CVE"/>
    <description>
    The dissect_wa_payload function in epan/dissectors/packet-waveagent.c in the WaveAgent dissector in Wireshark 1.12.x before 1.12.7 mishandles large tag values, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6246.html">CVE-2015-6246</cve>
<bugzilla href="https://bugzilla.suse.com/941500">SUSE bug 941500</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202103" comment="wireshark-1.12.7-0.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6247</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-6247" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6247" source="CVE"/>
    <description>
    The dissect_openflow_tablemod_v5 function in epan/dissectors/packet-openflow_v5.c in the OpenFlow dissector in Wireshark 1.12.x before 1.12.7 does not validate a certain offset value, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6247.html">CVE-2015-6247</cve>
<bugzilla href="https://bugzilla.suse.com/941500">SUSE bug 941500</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202103" comment="wireshark-1.12.7-0.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6248</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-6248" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6248" source="CVE"/>
    <description>
    The ptvcursor_add function in the ptvcursor implementation in epan/proto.c in Wireshark 1.12.x before 1.12.7 does not check whether the expected amount of data is available, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6248.html">CVE-2015-6248</cve>
<bugzilla href="https://bugzilla.suse.com/941500">SUSE bug 941500</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202103" comment="wireshark-1.12.7-0.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6249</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-6249" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6249" source="CVE"/>
    <description>
    The dissect_wccp2r1_address_table_info function in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.12.x before 1.12.7 does not prevent the conflicting use of a table for both IPv4 and IPv6 addresses, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6249.html">CVE-2015-6249</cve>
<bugzilla href="https://bugzilla.suse.com/941500">SUSE bug 941500</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202103" comment="wireshark-1.12.7-0.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6252</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-6252" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6252" source="CVE"/>
    <description>
    The vhost_dev_ioctl function in drivers/vhost/vhost.c in the Linux kernel before 4.1.5 allows local users to cause a denial of service (memory consumption) via a VHOST_SET_LOG_FD ioctl call that triggers permanent file-descriptor allocation.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6252.html">CVE-2015-6252</cve>
<bugzilla href="https://bugzilla.suse.com/942367">SUSE bug 942367</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204546" comment="kernel-bigsmp-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208678" comment="kernel-bigsmp-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204547" comment="kernel-bigsmp-devel-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204548" comment="kernel-default-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204549" comment="kernel-default-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204550" comment="kernel-default-devel-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208679" comment="kernel-default-man-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208680" comment="kernel-ec2-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208681" comment="kernel-ec2-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208682" comment="kernel-ec2-devel-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204552" comment="kernel-pae-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204553" comment="kernel-pae-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204554" comment="kernel-pae-devel-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208683" comment="kernel-ppc64-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208684" comment="kernel-ppc64-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208685" comment="kernel-ppc64-devel-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204556" comment="kernel-source-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204557" comment="kernel-syms-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204558" comment="kernel-trace-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208686" comment="kernel-trace-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204559" comment="kernel-trace-devel-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204560" comment="kernel-xen-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204561" comment="kernel-xen-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204562" comment="kernel-xen-devel-3.0.101-0.47.71 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6563</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-6563" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6563" source="CVE"/>
    <description>
    The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6563.html">CVE-2015-6563</cve>
<bugzilla href="https://bugzilla.suse.com/1074631">SUSE bug 1074631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/943006">SUSE bug 943006</bugzilla>
<bugzilla href="https://bugzilla.suse.com/943007">SUSE bug 943007</bugzilla>
<bugzilla href="https://bugzilla.suse.com/943010">SUSE bug 943010</bugzilla>
<bugzilla href="https://bugzilla.suse.com/948086">SUSE bug 948086</bugzilla>
<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204730" comment="openssh-6.2p2-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204731" comment="openssh-askpass-6.2p2-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204732" comment="openssh-askpass-gnome-6.2p2-0.21 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6564</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-6564" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6564" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6564.html">CVE-2015-6564</cve>
<bugzilla href="https://bugzilla.suse.com/1074631">SUSE bug 1074631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
<bugzilla href="https://bugzilla.suse.com/942850">SUSE bug 942850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/943006">SUSE bug 943006</bugzilla>
<bugzilla href="https://bugzilla.suse.com/943007">SUSE bug 943007</bugzilla>
<bugzilla href="https://bugzilla.suse.com/943010">SUSE bug 943010</bugzilla>
<bugzilla href="https://bugzilla.suse.com/948086">SUSE bug 948086</bugzilla>
<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204730" comment="openssh-6.2p2-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204731" comment="openssh-askpass-6.2p2-0.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204732" comment="openssh-askpass-gnome-6.2p2-0.21 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-6806" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6806" source="CVE"/>
    <description>
    The MScrollV function in ansi.c in GNU screen 4.3.1 and earlier does not properly limit recursion, which allows remote attackers to cause a denial of service (stack consumption) via an escape sequence with a large repeat count value.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6806.html">CVE-2015-6806</cve>
<bugzilla href="https://bugzilla.suse.com/944458">SUSE bug 944458</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253698" comment="screen-4.0.2-162.19.2.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-6815" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6815" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6815.html">CVE-2015-6815</cve>
<bugzilla href="https://bugzilla.suse.com/944697">SUSE bug 944697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202111" comment="xen-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204879" comment="xen-doc-html-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204880" comment="xen-doc-pdf-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204881" comment="xen-kmp-default-4.2.5_14_3.0.101_0.47.67-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204882" comment="xen-kmp-pae-4.2.5_14_3.0.101_0.47.67-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204883" comment="xen-libs-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204884" comment="xen-libs-32bit-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204885" comment="xen-tools-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204886" comment="xen-tools-domU-4.2.5_14-18 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250394" comment="kvm-1.4.2-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202111" comment="xen-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204879" comment="xen-doc-html-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204880" comment="xen-doc-pdf-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204881" comment="xen-kmp-default-4.2.5_14_3.0.101_0.47.67-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204883" comment="xen-libs-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204884" comment="xen-libs-32bit-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204885" comment="xen-tools-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204886" comment="xen-tools-domU-4.2.5_14-18 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6831</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-6831" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6831" source="CVE"/>
    <description>
    Multiple use-after-free vulnerabilities in SPL in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allow remote attackers to execute arbitrary code via vectors involving (1) ArrayObject, (2) SplObjectStorage, and (3) SplDoublyLinkedList, which are mishandled during unserialization.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6831.html">CVE-2015-6831</cve>
<bugzilla href="https://bugzilla.suse.com/942291">SUSE bug 942291</bugzilla>
<bugzilla href="https://bugzilla.suse.com/942294">SUSE bug 942294</bugzilla>
<bugzilla href="https://bugzilla.suse.com/942295">SUSE bug 942295</bugzilla>
<bugzilla href="https://bugzilla.suse.com/945188">SUSE bug 945188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208853" comment="apache2-mod_php53-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201980" comment="php53-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208854" comment="php53-bcmath-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208855" comment="php53-bz2-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208856" comment="php53-calendar-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208857" comment="php53-ctype-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208858" comment="php53-curl-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208859" comment="php53-dba-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208860" comment="php53-dom-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208861" comment="php53-exif-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208862" comment="php53-fastcgi-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208863" comment="php53-fileinfo-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208864" comment="php53-ftp-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208865" comment="php53-gd-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208866" comment="php53-gettext-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208867" comment="php53-gmp-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208868" comment="php53-iconv-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208869" comment="php53-intl-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208870" comment="php53-json-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208871" comment="php53-ldap-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208872" comment="php53-mbstring-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208873" comment="php53-mcrypt-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208874" comment="php53-mysql-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208875" comment="php53-odbc-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208876" comment="php53-openssl-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208877" comment="php53-pcntl-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208878" comment="php53-pdo-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208879" comment="php53-pear-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208880" comment="php53-pgsql-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208881" comment="php53-pspell-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208882" comment="php53-shmop-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208883" comment="php53-snmp-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208884" comment="php53-soap-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208885" comment="php53-suhosin-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208886" comment="php53-sysvmsg-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208887" comment="php53-sysvsem-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208888" comment="php53-sysvshm-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208889" comment="php53-tokenizer-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208890" comment="php53-wddx-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208891" comment="php53-xmlreader-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208892" comment="php53-xmlrpc-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208893" comment="php53-xmlwriter-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208894" comment="php53-xsl-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208895" comment="php53-zip-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208896" comment="php53-zlib-5.3.17-48 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6833</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-6833" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6833" source="CVE"/>
    <description>
    Directory traversal vulnerability in the PharData class in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allows remote attackers to write to arbitrary files via a .. (dot dot) in a ZIP archive entry that is mishandled during an extractTo call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6833.html">CVE-2015-6833</cve>
<bugzilla href="https://bugzilla.suse.com/942296">SUSE bug 942296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208853" comment="apache2-mod_php53-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201980" comment="php53-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208854" comment="php53-bcmath-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208855" comment="php53-bz2-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208856" comment="php53-calendar-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208857" comment="php53-ctype-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208858" comment="php53-curl-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208859" comment="php53-dba-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208860" comment="php53-dom-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208861" comment="php53-exif-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208862" comment="php53-fastcgi-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208863" comment="php53-fileinfo-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208864" comment="php53-ftp-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208865" comment="php53-gd-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208866" comment="php53-gettext-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208867" comment="php53-gmp-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208868" comment="php53-iconv-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208869" comment="php53-intl-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208870" comment="php53-json-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208871" comment="php53-ldap-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208872" comment="php53-mbstring-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208873" comment="php53-mcrypt-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208874" comment="php53-mysql-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208875" comment="php53-odbc-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208876" comment="php53-openssl-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208877" comment="php53-pcntl-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208878" comment="php53-pdo-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208879" comment="php53-pear-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208880" comment="php53-pgsql-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208881" comment="php53-pspell-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208882" comment="php53-shmop-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208883" comment="php53-snmp-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208884" comment="php53-soap-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208885" comment="php53-suhosin-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208886" comment="php53-sysvmsg-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208887" comment="php53-sysvsem-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208888" comment="php53-sysvshm-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208889" comment="php53-tokenizer-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208890" comment="php53-wddx-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208891" comment="php53-xmlreader-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208892" comment="php53-xmlrpc-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208893" comment="php53-xmlwriter-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208894" comment="php53-xsl-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208895" comment="php53-zip-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208896" comment="php53-zlib-5.3.17-48 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-6836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6836" source="CVE"/>
    <description>
    The SoapClient __call method in ext/soap/soap.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 does not properly manage headers, which allows remote attackers to execute arbitrary code via crafted serialized data that triggers a "type confusion" in the serialize_function_call function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6836.html">CVE-2015-6836</cve>
<bugzilla href="https://bugzilla.suse.com/945428">SUSE bug 945428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208853" comment="apache2-mod_php53-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201980" comment="php53-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208854" comment="php53-bcmath-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208855" comment="php53-bz2-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208856" comment="php53-calendar-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208857" comment="php53-ctype-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208858" comment="php53-curl-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208859" comment="php53-dba-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208860" comment="php53-dom-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208861" comment="php53-exif-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208862" comment="php53-fastcgi-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208863" comment="php53-fileinfo-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208864" comment="php53-ftp-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208865" comment="php53-gd-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208866" comment="php53-gettext-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208867" comment="php53-gmp-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208868" comment="php53-iconv-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208869" comment="php53-intl-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208870" comment="php53-json-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208871" comment="php53-ldap-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208872" comment="php53-mbstring-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208873" comment="php53-mcrypt-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208874" comment="php53-mysql-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208875" comment="php53-odbc-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208876" comment="php53-openssl-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208877" comment="php53-pcntl-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208878" comment="php53-pdo-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208879" comment="php53-pear-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208880" comment="php53-pgsql-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208881" comment="php53-pspell-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208882" comment="php53-shmop-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208883" comment="php53-snmp-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208884" comment="php53-soap-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208885" comment="php53-suhosin-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208886" comment="php53-sysvmsg-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208887" comment="php53-sysvsem-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208888" comment="php53-sysvshm-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208889" comment="php53-tokenizer-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208890" comment="php53-wddx-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208891" comment="php53-xmlreader-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208892" comment="php53-xmlrpc-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208893" comment="php53-xmlwriter-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208894" comment="php53-xsl-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208895" comment="php53-zip-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208896" comment="php53-zlib-5.3.17-48 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6837</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-6837" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6837" source="CVE"/>
    <description>
    The xsl_ext_function_php function in ext/xsl/xsltprocessor.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13, when libxml2 before 2.9.2 is used, does not consider the possibility of a NULL valuePop return value before proceeding with a free operation during initial error checking, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted XML document, a different vulnerability than CVE-2015-6838.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6837.html">CVE-2015-6837</cve>
<bugzilla href="https://bugzilla.suse.com/945412">SUSE bug 945412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208853" comment="apache2-mod_php53-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201980" comment="php53-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208854" comment="php53-bcmath-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208855" comment="php53-bz2-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208856" comment="php53-calendar-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208857" comment="php53-ctype-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208858" comment="php53-curl-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208859" comment="php53-dba-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208860" comment="php53-dom-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208861" comment="php53-exif-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208862" comment="php53-fastcgi-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208863" comment="php53-fileinfo-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208864" comment="php53-ftp-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208865" comment="php53-gd-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208866" comment="php53-gettext-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208867" comment="php53-gmp-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208868" comment="php53-iconv-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208869" comment="php53-intl-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208870" comment="php53-json-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208871" comment="php53-ldap-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208872" comment="php53-mbstring-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208873" comment="php53-mcrypt-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208874" comment="php53-mysql-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208875" comment="php53-odbc-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208876" comment="php53-openssl-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208877" comment="php53-pcntl-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208878" comment="php53-pdo-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208879" comment="php53-pear-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208880" comment="php53-pgsql-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208881" comment="php53-pspell-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208882" comment="php53-shmop-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208883" comment="php53-snmp-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208884" comment="php53-soap-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208885" comment="php53-suhosin-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208886" comment="php53-sysvmsg-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208887" comment="php53-sysvsem-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208888" comment="php53-sysvshm-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208889" comment="php53-tokenizer-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208890" comment="php53-wddx-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208891" comment="php53-xmlreader-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208892" comment="php53-xmlrpc-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208893" comment="php53-xmlwriter-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208894" comment="php53-xsl-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208895" comment="php53-zip-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208896" comment="php53-zlib-5.3.17-48 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6838</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-6838" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6838" source="CVE"/>
    <description>
    The xsl_ext_function_php function in ext/xsl/xsltprocessor.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13, when libxml2 before 2.9.2 is used, does not consider the possibility of a NULL valuePop return value before proceeding with a free operation after the principal argument loop, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted XML document, a different vulnerability than CVE-2015-6837.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6838.html">CVE-2015-6838</cve>
<bugzilla href="https://bugzilla.suse.com/945412">SUSE bug 945412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208853" comment="apache2-mod_php53-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201980" comment="php53-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208854" comment="php53-bcmath-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208855" comment="php53-bz2-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208856" comment="php53-calendar-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208857" comment="php53-ctype-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208858" comment="php53-curl-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208859" comment="php53-dba-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208860" comment="php53-dom-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208861" comment="php53-exif-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208862" comment="php53-fastcgi-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208863" comment="php53-fileinfo-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208864" comment="php53-ftp-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208865" comment="php53-gd-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208866" comment="php53-gettext-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208867" comment="php53-gmp-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208868" comment="php53-iconv-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208869" comment="php53-intl-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208870" comment="php53-json-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208871" comment="php53-ldap-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208872" comment="php53-mbstring-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208873" comment="php53-mcrypt-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208874" comment="php53-mysql-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208875" comment="php53-odbc-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208876" comment="php53-openssl-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208877" comment="php53-pcntl-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208878" comment="php53-pdo-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208879" comment="php53-pear-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208880" comment="php53-pgsql-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208881" comment="php53-pspell-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208882" comment="php53-shmop-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208883" comment="php53-snmp-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208884" comment="php53-soap-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208885" comment="php53-suhosin-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208886" comment="php53-sysvmsg-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208887" comment="php53-sysvsem-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208888" comment="php53-sysvshm-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208889" comment="php53-tokenizer-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208890" comment="php53-wddx-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208891" comment="php53-xmlreader-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208892" comment="php53-xmlrpc-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208893" comment="php53-xmlwriter-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208894" comment="php53-xsl-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208895" comment="php53-zip-5.3.17-48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208896" comment="php53-zlib-5.3.17-48 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6855</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-6855" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6855" source="CVE"/>
    <description>
    hw/ide/core.c in QEMU does not properly restrict the commands accepted by an ATAPI device, which allows guest users to cause a denial of service or possibly have unspecified other impact via certain IDE commands, as demonstrated by a WIN_READ_NATIVE_MAX command to an empty drive, which triggers a divide-by-zero error and instance crash.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6855.html">CVE-2015-6855</cve>
<bugzilla href="https://bugzilla.suse.com/945404">SUSE bug 945404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/965156">SUSE bug 965156</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209045" comment="xen-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209046" comment="xen-doc-html-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209047" comment="xen-doc-pdf-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209048" comment="xen-kmp-default-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209049" comment="xen-kmp-pae-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209050" comment="xen-libs-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209051" comment="xen-libs-32bit-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209052" comment="xen-tools-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209053" comment="xen-tools-domU-4.2.5_20-24 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6908</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-6908" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6908" source="CVE"/>
    <description>
    The ber_get_next function in libraries/liblber/io.c in OpenLDAP 2.4.42 and earlier allows remote attackers to cause a denial of service (reachable assertion and application crash) via crafted BER data, as demonstrated by an attack against slapd.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6908.html">CVE-2015-6908</cve>
<bugzilla href="https://bugzilla.suse.com/945582">SUSE bug 945582</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208800" comment="compat-libldap-2_3-0-2.3.37-2.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204725" comment="libldap-2_4-2-2.4.26-0.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204726" comment="libldap-2_4-2-32bit-2.4.26-0.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201961" comment="openldap2-2.4.26-0.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208802" comment="openldap2-back-meta-2.4.26-0.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201963" comment="openldap2-client-2.4.26-0.62 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208800" comment="compat-libldap-2_3-0-2.3.37-2.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204725" comment="libldap-2_4-2-2.4.26-0.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204726" comment="libldap-2_4-2-32bit-2.4.26-0.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208801" comment="libldap-2_4-2-x86-2.4.26-0.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201961" comment="openldap2-2.4.26-0.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208802" comment="openldap2-back-meta-2.4.26-0.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201963" comment="openldap2-client-2.4.26-0.62 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6937</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-6937" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6937" source="CVE"/>
    <description>
    The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6937.html">CVE-2015-6937</cve>
<bugzilla href="https://bugzilla.suse.com/923755">SUSE bug 923755</bugzilla>
<bugzilla href="https://bugzilla.suse.com/945825">SUSE bug 945825</bugzilla>
<bugzilla href="https://bugzilla.suse.com/952384">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/953052">SUSE bug 953052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/963994">SUSE bug 963994</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204546" comment="kernel-bigsmp-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208678" comment="kernel-bigsmp-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204547" comment="kernel-bigsmp-devel-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204548" comment="kernel-default-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204549" comment="kernel-default-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204550" comment="kernel-default-devel-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208679" comment="kernel-default-man-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208680" comment="kernel-ec2-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208681" comment="kernel-ec2-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208682" comment="kernel-ec2-devel-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204552" comment="kernel-pae-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204553" comment="kernel-pae-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204554" comment="kernel-pae-devel-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208683" comment="kernel-ppc64-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208684" comment="kernel-ppc64-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208685" comment="kernel-ppc64-devel-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204556" comment="kernel-source-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204557" comment="kernel-syms-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204558" comment="kernel-trace-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208686" comment="kernel-trace-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204559" comment="kernel-trace-devel-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204560" comment="kernel-xen-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204561" comment="kernel-xen-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204562" comment="kernel-xen-devel-3.0.101-0.47.71 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7174</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7174" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174" source="CVE"/>
    <description>
    The nsAttrAndChildArray::GrowBy function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors, related to an "overflow."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7174.html">CVE-2015-7174</cve>
<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201657" comment="MozillaFirefox-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204329" comment="MozillaFirefox-translations-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201655" comment="mozilla-nspr-4.10.9-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204328" comment="mozilla-nspr-32bit-4.10.9-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208472" comment="mozilla-nspr-x86-4.10.9-11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201657" comment="MozillaFirefox-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204329" comment="MozillaFirefox-translations-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201655" comment="mozilla-nspr-4.10.9-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204328" comment="mozilla-nspr-32bit-4.10.9-11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7175</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7175" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175" source="CVE"/>
    <description>
    The XULContentSinkImpl::AddText function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors, related to an "overflow."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7175.html">CVE-2015-7175</cve>
<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201657" comment="MozillaFirefox-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204329" comment="MozillaFirefox-translations-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201655" comment="mozilla-nspr-4.10.9-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204328" comment="mozilla-nspr-32bit-4.10.9-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208472" comment="mozilla-nspr-x86-4.10.9-11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201657" comment="MozillaFirefox-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204329" comment="MozillaFirefox-translations-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201655" comment="mozilla-nspr-4.10.9-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204328" comment="mozilla-nspr-32bit-4.10.9-11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7176</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7176" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176" source="CVE"/>
    <description>
    The AnimationThread function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 uses an incorrect argument to the sscanf function, which might allow remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7176.html">CVE-2015-7176</cve>
<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201657" comment="MozillaFirefox-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204329" comment="MozillaFirefox-translations-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201655" comment="mozilla-nspr-4.10.9-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204328" comment="mozilla-nspr-32bit-4.10.9-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208472" comment="mozilla-nspr-x86-4.10.9-11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201657" comment="MozillaFirefox-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204329" comment="MozillaFirefox-translations-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201655" comment="mozilla-nspr-4.10.9-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204328" comment="mozilla-nspr-32bit-4.10.9-11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7177</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7177" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177" source="CVE"/>
    <description>
    The InitTextures function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7177.html">CVE-2015-7177</cve>
<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201657" comment="MozillaFirefox-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204329" comment="MozillaFirefox-translations-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201655" comment="mozilla-nspr-4.10.9-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204328" comment="mozilla-nspr-32bit-4.10.9-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208472" comment="mozilla-nspr-x86-4.10.9-11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201657" comment="MozillaFirefox-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204329" comment="MozillaFirefox-translations-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201655" comment="mozilla-nspr-4.10.9-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204328" comment="mozilla-nspr-32bit-4.10.9-11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7180</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180" source="CVE"/>
    <description>
    The ReadbackResultWriterD3D11::Run function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 misinterprets the return value of a function call, which might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7180.html">CVE-2015-7180</cve>
<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201657" comment="MozillaFirefox-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204329" comment="MozillaFirefox-translations-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201655" comment="mozilla-nspr-4.10.9-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204328" comment="mozilla-nspr-32bit-4.10.9-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208472" comment="mozilla-nspr-x86-4.10.9-11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201657" comment="MozillaFirefox-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204329" comment="MozillaFirefox-translations-38.3.0esr-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201655" comment="mozilla-nspr-4.10.9-11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204328" comment="mozilla-nspr-32bit-4.10.9-11 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7181</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7181" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181" source="CVE"/>
    <description>
    The sec_asn1d_parse_leaf function in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, improperly restricts access to an unspecified data structure, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OCTET STRING data, related to a "use-after-poison" issue.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7181.html">CVE-2015-7181</cve>
<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201659" comment="MozillaFirefox-38.4.0esr-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204330" comment="MozillaFirefox-branding-SLED-38-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204331" comment="MozillaFirefox-translations-38.4.0esr-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204332" comment="libfreebl3-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204333" comment="libfreebl3-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204334" comment="libsoftokn3-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204335" comment="libsoftokn3-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201661" comment="mozilla-nspr-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204336" comment="mozilla-nspr-32bit-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201663" comment="mozilla-nss-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204337" comment="mozilla-nss-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204338" comment="mozilla-nss-tools-3.19.2.1-19 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201659" comment="MozillaFirefox-38.4.0esr-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204330" comment="MozillaFirefox-branding-SLED-38-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204331" comment="MozillaFirefox-translations-38.4.0esr-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204332" comment="libfreebl3-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204333" comment="libfreebl3-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208474" comment="libfreebl3-x86-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204334" comment="libsoftokn3-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204335" comment="libsoftokn3-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208475" comment="libsoftokn3-x86-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201661" comment="mozilla-nspr-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204336" comment="mozilla-nspr-32bit-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208476" comment="mozilla-nspr-x86-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201663" comment="mozilla-nss-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204337" comment="mozilla-nss-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204338" comment="mozilla-nss-tools-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208477" comment="mozilla-nss-x86-3.19.2.1-19 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182" source="CVE"/>
    <description>
    Heap-based buffer overflow in the ASN.1 decoder in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OCTET STRING data.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7182.html">CVE-2015-7182</cve>
<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201659" comment="MozillaFirefox-38.4.0esr-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204330" comment="MozillaFirefox-branding-SLED-38-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204331" comment="MozillaFirefox-translations-38.4.0esr-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204332" comment="libfreebl3-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204333" comment="libfreebl3-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204334" comment="libsoftokn3-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204335" comment="libsoftokn3-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201661" comment="mozilla-nspr-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204336" comment="mozilla-nspr-32bit-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201663" comment="mozilla-nss-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204337" comment="mozilla-nss-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204338" comment="mozilla-nss-tools-3.19.2.1-19 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201659" comment="MozillaFirefox-38.4.0esr-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204330" comment="MozillaFirefox-branding-SLED-38-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204331" comment="MozillaFirefox-translations-38.4.0esr-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204332" comment="libfreebl3-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204333" comment="libfreebl3-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208474" comment="libfreebl3-x86-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204334" comment="libsoftokn3-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204335" comment="libsoftokn3-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208475" comment="libsoftokn3-x86-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201661" comment="mozilla-nspr-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204336" comment="mozilla-nspr-32bit-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208476" comment="mozilla-nspr-x86-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201663" comment="mozilla-nss-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204337" comment="mozilla-nss-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204338" comment="mozilla-nss-tools-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208477" comment="mozilla-nss-x86-3.19.2.1-19 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7183</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7183" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183" source="CVE"/>
    <description>
    Integer overflow in the PL_ARENA_ALLOCATE implementation in Netscape Portable Runtime (NSPR) in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7183.html">CVE-2015-7183</cve>
<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962977">SUSE bug 962977</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201659" comment="MozillaFirefox-38.4.0esr-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204330" comment="MozillaFirefox-branding-SLED-38-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204331" comment="MozillaFirefox-translations-38.4.0esr-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204332" comment="libfreebl3-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204333" comment="libfreebl3-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204334" comment="libsoftokn3-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204335" comment="libsoftokn3-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201661" comment="mozilla-nspr-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204336" comment="mozilla-nspr-32bit-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201663" comment="mozilla-nss-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204337" comment="mozilla-nss-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204338" comment="mozilla-nss-tools-3.19.2.1-19 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201659" comment="MozillaFirefox-38.4.0esr-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204330" comment="MozillaFirefox-branding-SLED-38-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204331" comment="MozillaFirefox-translations-38.4.0esr-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204332" comment="libfreebl3-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204333" comment="libfreebl3-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208474" comment="libfreebl3-x86-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204334" comment="libsoftokn3-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204335" comment="libsoftokn3-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208475" comment="libsoftokn3-x86-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201661" comment="mozilla-nspr-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204336" comment="mozilla-nspr-32bit-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208476" comment="mozilla-nspr-x86-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201663" comment="mozilla-nss-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204337" comment="mozilla-nss-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204338" comment="mozilla-nss-tools-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208477" comment="mozilla-nss-x86-3.19.2.1-19 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7188</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7188" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188" source="CVE"/>
    <description>
    Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 allow remote attackers to bypass the Same Origin Policy for an IP address origin, and conduct cross-site scripting (XSS) attacks, by appending whitespace characters to an IP address string.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7188.html">CVE-2015-7188</cve>
<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201659" comment="MozillaFirefox-38.4.0esr-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204330" comment="MozillaFirefox-branding-SLED-38-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204331" comment="MozillaFirefox-translations-38.4.0esr-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204332" comment="libfreebl3-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204333" comment="libfreebl3-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204334" comment="libsoftokn3-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204335" comment="libsoftokn3-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201661" comment="mozilla-nspr-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204336" comment="mozilla-nspr-32bit-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201663" comment="mozilla-nss-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204337" comment="mozilla-nss-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204338" comment="mozilla-nss-tools-3.19.2.1-19 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201659" comment="MozillaFirefox-38.4.0esr-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204330" comment="MozillaFirefox-branding-SLED-38-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204331" comment="MozillaFirefox-translations-38.4.0esr-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204332" comment="libfreebl3-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204333" comment="libfreebl3-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208474" comment="libfreebl3-x86-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204334" comment="libsoftokn3-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204335" comment="libsoftokn3-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208475" comment="libsoftokn3-x86-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201661" comment="mozilla-nspr-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204336" comment="mozilla-nspr-32bit-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208476" comment="mozilla-nspr-x86-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201663" comment="mozilla-nss-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204337" comment="mozilla-nss-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204338" comment="mozilla-nss-tools-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208477" comment="mozilla-nss-x86-3.19.2.1-19 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7189</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7189" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189" source="CVE"/>
    <description>
    Race condition in the JPEGEncoder function in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow) via vectors involving a CANVAS element and crafted JavaScript code.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7189.html">CVE-2015-7189</cve>
<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201659" comment="MozillaFirefox-38.4.0esr-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204330" comment="MozillaFirefox-branding-SLED-38-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204331" comment="MozillaFirefox-translations-38.4.0esr-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204332" comment="libfreebl3-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204333" comment="libfreebl3-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204334" comment="libsoftokn3-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204335" comment="libsoftokn3-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201661" comment="mozilla-nspr-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204336" comment="mozilla-nspr-32bit-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201663" comment="mozilla-nss-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204337" comment="mozilla-nss-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204338" comment="mozilla-nss-tools-3.19.2.1-19 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201659" comment="MozillaFirefox-38.4.0esr-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204330" comment="MozillaFirefox-branding-SLED-38-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204331" comment="MozillaFirefox-translations-38.4.0esr-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204332" comment="libfreebl3-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204333" comment="libfreebl3-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208474" comment="libfreebl3-x86-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204334" comment="libsoftokn3-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204335" comment="libsoftokn3-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208475" comment="libsoftokn3-x86-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201661" comment="mozilla-nspr-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204336" comment="mozilla-nspr-32bit-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208476" comment="mozilla-nspr-x86-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201663" comment="mozilla-nss-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204337" comment="mozilla-nss-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204338" comment="mozilla-nss-tools-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208477" comment="mozilla-nss-x86-3.19.2.1-19 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7193</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7193" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193" source="CVE"/>
    <description>
    Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 improperly follow the CORS cross-origin request algorithm for the POST method in situations involving an unspecified Content-Type header manipulation, which allows remote attackers to bypass the Same Origin Policy by leveraging the lack of a preflight-request step.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7193.html">CVE-2015-7193</cve>
<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201659" comment="MozillaFirefox-38.4.0esr-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204330" comment="MozillaFirefox-branding-SLED-38-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204331" comment="MozillaFirefox-translations-38.4.0esr-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204332" comment="libfreebl3-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204333" comment="libfreebl3-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204334" comment="libsoftokn3-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204335" comment="libsoftokn3-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201661" comment="mozilla-nspr-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204336" comment="mozilla-nspr-32bit-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201663" comment="mozilla-nss-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204337" comment="mozilla-nss-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204338" comment="mozilla-nss-tools-3.19.2.1-19 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201659" comment="MozillaFirefox-38.4.0esr-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204330" comment="MozillaFirefox-branding-SLED-38-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204331" comment="MozillaFirefox-translations-38.4.0esr-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204332" comment="libfreebl3-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204333" comment="libfreebl3-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208474" comment="libfreebl3-x86-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204334" comment="libsoftokn3-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204335" comment="libsoftokn3-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208475" comment="libsoftokn3-x86-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201661" comment="mozilla-nspr-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204336" comment="mozilla-nspr-32bit-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208476" comment="mozilla-nspr-x86-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201663" comment="mozilla-nss-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204337" comment="mozilla-nss-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204338" comment="mozilla-nss-tools-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208477" comment="mozilla-nss-x86-3.19.2.1-19 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7194</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7194" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194" source="CVE"/>
    <description>
    Buffer underflow in libjar in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted ZIP archive.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7194.html">CVE-2015-7194</cve>
<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201659" comment="MozillaFirefox-38.4.0esr-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204330" comment="MozillaFirefox-branding-SLED-38-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204331" comment="MozillaFirefox-translations-38.4.0esr-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204332" comment="libfreebl3-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204333" comment="libfreebl3-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204334" comment="libsoftokn3-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204335" comment="libsoftokn3-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201661" comment="mozilla-nspr-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204336" comment="mozilla-nspr-32bit-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201663" comment="mozilla-nss-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204337" comment="mozilla-nss-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204338" comment="mozilla-nss-tools-3.19.2.1-19 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201659" comment="MozillaFirefox-38.4.0esr-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204330" comment="MozillaFirefox-branding-SLED-38-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204331" comment="MozillaFirefox-translations-38.4.0esr-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204332" comment="libfreebl3-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204333" comment="libfreebl3-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208474" comment="libfreebl3-x86-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204334" comment="libsoftokn3-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204335" comment="libsoftokn3-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208475" comment="libsoftokn3-x86-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201661" comment="mozilla-nspr-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204336" comment="mozilla-nspr-32bit-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208476" comment="mozilla-nspr-x86-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201663" comment="mozilla-nss-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204337" comment="mozilla-nss-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204338" comment="mozilla-nss-tools-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208477" comment="mozilla-nss-x86-3.19.2.1-19 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7196</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7196" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196" source="CVE"/>
    <description>
    Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4, when a Java plugin is enabled, allow remote attackers to cause a denial of service (incorrect garbage collection and application crash) or possibly execute arbitrary code via a crafted Java applet that deallocates an in-use JavaScript wrapper.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7196.html">CVE-2015-7196</cve>
<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201659" comment="MozillaFirefox-38.4.0esr-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204330" comment="MozillaFirefox-branding-SLED-38-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204331" comment="MozillaFirefox-translations-38.4.0esr-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204332" comment="libfreebl3-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204333" comment="libfreebl3-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204334" comment="libsoftokn3-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204335" comment="libsoftokn3-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201661" comment="mozilla-nspr-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204336" comment="mozilla-nspr-32bit-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201663" comment="mozilla-nss-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204337" comment="mozilla-nss-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204338" comment="mozilla-nss-tools-3.19.2.1-19 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201659" comment="MozillaFirefox-38.4.0esr-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204330" comment="MozillaFirefox-branding-SLED-38-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204331" comment="MozillaFirefox-translations-38.4.0esr-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204332" comment="libfreebl3-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204333" comment="libfreebl3-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208474" comment="libfreebl3-x86-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204334" comment="libsoftokn3-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204335" comment="libsoftokn3-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208475" comment="libsoftokn3-x86-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201661" comment="mozilla-nspr-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204336" comment="mozilla-nspr-32bit-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208476" comment="mozilla-nspr-x86-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201663" comment="mozilla-nss-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204337" comment="mozilla-nss-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204338" comment="mozilla-nss-tools-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208477" comment="mozilla-nss-x86-3.19.2.1-19 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7197</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7197" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197" source="CVE"/>
    <description>
    Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 improperly control the ability of a web worker to create a WebSocket object, which allows remote attackers to bypass intended mixed-content restrictions via crafted JavaScript code.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7197.html">CVE-2015-7197</cve>
<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201659" comment="MozillaFirefox-38.4.0esr-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204330" comment="MozillaFirefox-branding-SLED-38-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204331" comment="MozillaFirefox-translations-38.4.0esr-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204332" comment="libfreebl3-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204333" comment="libfreebl3-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204334" comment="libsoftokn3-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204335" comment="libsoftokn3-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201661" comment="mozilla-nspr-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204336" comment="mozilla-nspr-32bit-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201663" comment="mozilla-nss-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204337" comment="mozilla-nss-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204338" comment="mozilla-nss-tools-3.19.2.1-19 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201659" comment="MozillaFirefox-38.4.0esr-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204330" comment="MozillaFirefox-branding-SLED-38-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204331" comment="MozillaFirefox-translations-38.4.0esr-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204332" comment="libfreebl3-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204333" comment="libfreebl3-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208474" comment="libfreebl3-x86-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204334" comment="libsoftokn3-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204335" comment="libsoftokn3-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208475" comment="libsoftokn3-x86-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201661" comment="mozilla-nspr-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204336" comment="mozilla-nspr-32bit-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208476" comment="mozilla-nspr-x86-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201663" comment="mozilla-nss-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204337" comment="mozilla-nss-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204338" comment="mozilla-nss-tools-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208477" comment="mozilla-nss-x86-3.19.2.1-19 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7198</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7198" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198" source="CVE"/>
    <description>
    Buffer overflow in the rx::TextureStorage11 class in ANGLE, as used in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted texture data.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7198.html">CVE-2015-7198</cve>
<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201659" comment="MozillaFirefox-38.4.0esr-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204330" comment="MozillaFirefox-branding-SLED-38-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204331" comment="MozillaFirefox-translations-38.4.0esr-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204332" comment="libfreebl3-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204333" comment="libfreebl3-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204334" comment="libsoftokn3-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204335" comment="libsoftokn3-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201661" comment="mozilla-nspr-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204336" comment="mozilla-nspr-32bit-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201663" comment="mozilla-nss-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204337" comment="mozilla-nss-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204338" comment="mozilla-nss-tools-3.19.2.1-19 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201659" comment="MozillaFirefox-38.4.0esr-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204330" comment="MozillaFirefox-branding-SLED-38-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204331" comment="MozillaFirefox-translations-38.4.0esr-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204332" comment="libfreebl3-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204333" comment="libfreebl3-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208474" comment="libfreebl3-x86-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204334" comment="libsoftokn3-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204335" comment="libsoftokn3-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208475" comment="libsoftokn3-x86-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201661" comment="mozilla-nspr-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204336" comment="mozilla-nspr-32bit-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208476" comment="mozilla-nspr-x86-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201663" comment="mozilla-nss-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204337" comment="mozilla-nss-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204338" comment="mozilla-nss-tools-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208477" comment="mozilla-nss-x86-3.19.2.1-19 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7199</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7199" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199" source="CVE"/>
    <description>
    The (1) AddWeightedPathSegLists and (2) SVGPathSegListSMILType::Interpolate functions in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 lack status checking, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted SVG document.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7199.html">CVE-2015-7199</cve>
<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201659" comment="MozillaFirefox-38.4.0esr-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204330" comment="MozillaFirefox-branding-SLED-38-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204331" comment="MozillaFirefox-translations-38.4.0esr-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204332" comment="libfreebl3-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204333" comment="libfreebl3-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204334" comment="libsoftokn3-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204335" comment="libsoftokn3-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201661" comment="mozilla-nspr-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204336" comment="mozilla-nspr-32bit-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201663" comment="mozilla-nss-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204337" comment="mozilla-nss-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204338" comment="mozilla-nss-tools-3.19.2.1-19 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201659" comment="MozillaFirefox-38.4.0esr-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204330" comment="MozillaFirefox-branding-SLED-38-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204331" comment="MozillaFirefox-translations-38.4.0esr-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204332" comment="libfreebl3-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204333" comment="libfreebl3-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208474" comment="libfreebl3-x86-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204334" comment="libsoftokn3-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204335" comment="libsoftokn3-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208475" comment="libsoftokn3-x86-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201661" comment="mozilla-nspr-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204336" comment="mozilla-nspr-32bit-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208476" comment="mozilla-nspr-x86-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201663" comment="mozilla-nss-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204337" comment="mozilla-nss-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204338" comment="mozilla-nss-tools-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208477" comment="mozilla-nss-x86-3.19.2.1-19 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7200</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7200" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200" source="CVE"/>
    <description>
    The CryptoKey interface implementation in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 lacks status checking, which allows attackers to have an unspecified impact via vectors related to a cryptographic key.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7200.html">CVE-2015-7200</cve>
<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201659" comment="MozillaFirefox-38.4.0esr-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204330" comment="MozillaFirefox-branding-SLED-38-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204331" comment="MozillaFirefox-translations-38.4.0esr-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204332" comment="libfreebl3-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204333" comment="libfreebl3-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204334" comment="libsoftokn3-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204335" comment="libsoftokn3-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201661" comment="mozilla-nspr-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204336" comment="mozilla-nspr-32bit-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201663" comment="mozilla-nss-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204337" comment="mozilla-nss-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204338" comment="mozilla-nss-tools-3.19.2.1-19 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201659" comment="MozillaFirefox-38.4.0esr-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204330" comment="MozillaFirefox-branding-SLED-38-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204331" comment="MozillaFirefox-translations-38.4.0esr-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204332" comment="libfreebl3-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204333" comment="libfreebl3-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208474" comment="libfreebl3-x86-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204334" comment="libsoftokn3-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204335" comment="libsoftokn3-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208475" comment="libsoftokn3-x86-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201661" comment="mozilla-nspr-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204336" comment="mozilla-nspr-32bit-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208476" comment="mozilla-nspr-x86-4.10.10-16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201663" comment="mozilla-nss-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204337" comment="mozilla-nss-32bit-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204338" comment="mozilla-nss-tools-3.19.2.1-19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208477" comment="mozilla-nss-x86-3.19.2.1-19 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7201</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7201" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7201" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7201.html">CVE-2015-7201</cve>
<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201551" comment="MozillaFirefox-38.5.0esr-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204189" comment="MozillaFirefox-translations-38.5.0esr-28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7202</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7202" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7202" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 43.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7202.html">CVE-2015-7202</cve>
<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201551" comment="MozillaFirefox-38.5.0esr-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204189" comment="MozillaFirefox-translations-38.5.0esr-28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7205</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7205" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7205" source="CVE"/>
    <description>
    Integer underflow in the RTPReceiverVideo::ParseRtpPacket function in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 might allow remote attackers to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a crafted WebRTC RTP packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7205.html">CVE-2015-7205</cve>
<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201551" comment="MozillaFirefox-38.5.0esr-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204189" comment="MozillaFirefox-translations-38.5.0esr-28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7210</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7210" source="CVE"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 allows remote attackers to execute arbitrary code by triggering attempted use of a data channel that has been closed by a WebRTC function.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7210.html">CVE-2015-7210</cve>
<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201551" comment="MozillaFirefox-38.5.0esr-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204189" comment="MozillaFirefox-translations-38.5.0esr-28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7212</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7212" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7212" source="CVE"/>
    <description>
    Integer overflow in the mozilla::layers::BufferTextureClient::AllocateForSurface function in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 allows remote attackers to execute arbitrary code by triggering a graphics operation that requires a large texture allocation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7212.html">CVE-2015-7212</cve>
<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201551" comment="MozillaFirefox-38.5.0esr-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204189" comment="MozillaFirefox-translations-38.5.0esr-28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7213</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7213" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7213" source="CVE"/>
    <description>
    Integer overflow in the MPEG4Extractor::readMetaData function in MPEG4Extractor.cpp in libstagefright in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 on 64-bit platforms allows remote attackers to execute arbitrary code via a crafted MP4 video file that triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7213.html">CVE-2015-7213</cve>
<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201551" comment="MozillaFirefox-38.5.0esr-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204189" comment="MozillaFirefox-translations-38.5.0esr-28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7214</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7214" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7214" source="CVE"/>
    <description>
    Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 allow remote attackers to bypass the Same Origin Policy via data: and view-source: URIs.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7214.html">CVE-2015-7214</cve>
<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201551" comment="MozillaFirefox-38.5.0esr-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204189" comment="MozillaFirefox-translations-38.5.0esr-28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7222</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7222" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7222" source="CVE"/>
    <description>
    Integer underflow in the Metadata::setData function in MetaData.cpp in libstagefright in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 allows remote attackers to execute arbitrary code or cause a denial of service (incorrect memory allocation and application crash) via an MP4 video file with crafted covr metadata that triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7222.html">CVE-2015-7222</cve>
<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201551" comment="MozillaFirefox-38.5.0esr-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204189" comment="MozillaFirefox-translations-38.5.0esr-28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7236</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7236" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7236" source="CVE"/>
    <description>
    Use-after-free vulnerability in xprt_set_caller in rpcb_svc_com.c in rpcbind 0.2.1 and earlier allows remote attackers to cause a denial of service (daemon crash) via crafted packets, involving a PMAP_CALLIT code.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7236.html">CVE-2015-7236</cve>
<bugzilla href="https://bugzilla.suse.com/940191">SUSE bug 940191</bugzilla>
<bugzilla href="https://bugzilla.suse.com/946204">SUSE bug 946204</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204801" comment="rpcbind-0.1.6+git20080930-6.24 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7295</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7295" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295" source="CVE"/>
    <description>
    hw/virtio/virtio.c in the Virtual Network Device (virtio-net) support in QEMU, when big or mergeable receive buffers are not supported, allows remote attackers to cause a denial of service (guest network consumption) via a flood of jumbo frames on the (1) tuntap or (2) macvtap interface.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7295.html">CVE-2015-7295</cve>
<bugzilla href="https://bugzilla.suse.com/947159">SUSE bug 947159</bugzilla>
<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7311</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7311" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7311" source="CVE"/>
    <description>
    libxl in Xen 4.1.x through 4.6.x does not properly handle the readonly flag on disks when using the qemu-xen device model, which allows local guest users to write to a read-only disk image.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7311.html">CVE-2015-7311</cve>
<bugzilla href="https://bugzilla.suse.com/947165">SUSE bug 947165</bugzilla>
<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202120" comment="xen-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204950" comment="xen-doc-html-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204951" comment="xen-doc-pdf-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204952" comment="xen-kmp-default-4.2.5_18_3.0.101_0.47.71-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204953" comment="xen-kmp-pae-4.2.5_18_3.0.101_0.47.71-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204954" comment="xen-libs-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204955" comment="xen-libs-32bit-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204956" comment="xen-tools-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204957" comment="xen-tools-domU-4.2.5_18-21 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202120" comment="xen-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204950" comment="xen-doc-html-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204951" comment="xen-doc-pdf-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204952" comment="xen-kmp-default-4.2.5_18_3.0.101_0.47.71-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204954" comment="xen-libs-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204955" comment="xen-libs-32bit-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204956" comment="xen-tools-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204957" comment="xen-tools-domU-4.2.5_18-21 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7497</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7497" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7497" source="CVE"/>
    <description>
    Heap-based buffer overflow in the xmlDictComputeFastQKey function in dict.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7497.html">CVE-2015-7497</cve>
<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/957106">SUSE bug 957106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/959469">SUSE bug 959469</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201905" comment="libxml2-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204668" comment="libxml2-32bit-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208763" comment="libxml2-doc-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204669" comment="libxml2-python-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208764" comment="libxml2-x86-2.7.6-0.34 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201905" comment="libxml2-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204668" comment="libxml2-32bit-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208763" comment="libxml2-doc-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204669" comment="libxml2-python-2.7.6-0.34 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7498</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7498" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7498" source="CVE"/>
    <description>
    Heap-based buffer overflow in the xmlParseXmlDecl function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service via unspecified vectors related to extracting errors after an encoding conversion failure.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7498.html">CVE-2015-7498</cve>
<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/957107">SUSE bug 957107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/959469">SUSE bug 959469</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201905" comment="libxml2-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204668" comment="libxml2-32bit-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208763" comment="libxml2-doc-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204669" comment="libxml2-python-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208764" comment="libxml2-x86-2.7.6-0.34 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201905" comment="libxml2-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204668" comment="libxml2-32bit-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208763" comment="libxml2-doc-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204669" comment="libxml2-python-2.7.6-0.34 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7499</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7499" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7499" source="CVE"/>
    <description>
    Heap-based buffer overflow in the xmlGROW function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive process memory information via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7499.html">CVE-2015-7499</cve>
<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/957109">SUSE bug 957109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/959469">SUSE bug 959469</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201905" comment="libxml2-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204668" comment="libxml2-32bit-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208763" comment="libxml2-doc-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204669" comment="libxml2-python-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208764" comment="libxml2-x86-2.7.6-0.34 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201905" comment="libxml2-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204668" comment="libxml2-32bit-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208763" comment="libxml2-doc-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204669" comment="libxml2-python-2.7.6-0.34 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7500</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7500" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7500" source="CVE"/>
    <description>
    The xmlParseMisc function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service (out-of-bounds heap read) via unspecified vectors related to incorrect entities boundaries and start tags.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7500.html">CVE-2015-7500</cve>
<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/957110">SUSE bug 957110</bugzilla>
<bugzilla href="https://bugzilla.suse.com/959469">SUSE bug 959469</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201905" comment="libxml2-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204668" comment="libxml2-32bit-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208763" comment="libxml2-doc-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204669" comment="libxml2-python-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208764" comment="libxml2-x86-2.7.6-0.34 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201905" comment="libxml2-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204668" comment="libxml2-32bit-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208763" comment="libxml2-doc-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204669" comment="libxml2-python-2.7.6-0.34 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7504</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7504" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504" source="CVE"/>
    <description>
    Heap-based buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU allows guest OS administrators to cause a denial of service (instance crash) or possibly execute arbitrary code via a series of packets in loopback mode.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7504.html">CVE-2015-7504</cve>
<bugzilla href="https://bugzilla.suse.com/956411">SUSE bug 956411</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202120" comment="xen-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204950" comment="xen-doc-html-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204951" comment="xen-doc-pdf-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204952" comment="xen-kmp-default-4.2.5_18_3.0.101_0.47.71-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204953" comment="xen-kmp-pae-4.2.5_18_3.0.101_0.47.71-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204954" comment="xen-libs-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204955" comment="xen-libs-32bit-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204956" comment="xen-tools-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204957" comment="xen-tools-domU-4.2.5_18-21 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202120" comment="xen-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204950" comment="xen-doc-html-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204951" comment="xen-doc-pdf-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204952" comment="xen-kmp-default-4.2.5_18_3.0.101_0.47.71-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204954" comment="xen-libs-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204955" comment="xen-libs-32bit-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204956" comment="xen-tools-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204957" comment="xen-tools-domU-4.2.5_18-21 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7509</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-7509" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7509" source="CVE"/>
    <description>
    fs/ext4/namei.c in the Linux kernel before 3.7 allows physically proximate attackers to cause a denial of service (system crash) via a crafted no-journal filesystem, a related issue to CVE-2013-2015.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7509.html">CVE-2015-7509</cve>
<bugzilla href="https://bugzilla.suse.com/956707">SUSE bug 956707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/956709">SUSE bug 956709</bugzilla>
<bugzilla href="https://bugzilla.suse.com/956766">SUSE bug 956766</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208637" comment="kernel-default-man-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208641" comment="kernel-pae-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208642" comment="kernel-pae-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208643" comment="kernel-pae-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7512</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7512" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512" source="CVE"/>
    <description>
    Buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU, when a guest NIC has a larger MTU, allows remote attackers to cause a denial of service (guest OS crash) or execute arbitrary code via a large packet.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7512.html">CVE-2015-7512</cve>
<bugzilla href="https://bugzilla.suse.com/957162">SUSE bug 957162</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962360">SUSE bug 962360</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204578" comment="kvm-1.4.2-37 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204578" comment="kvm-1.4.2-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209045" comment="xen-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209046" comment="xen-doc-html-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209047" comment="xen-doc-pdf-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209048" comment="xen-kmp-default-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209049" comment="xen-kmp-pae-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209050" comment="xen-libs-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209051" comment="xen-libs-32bit-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209052" comment="xen-tools-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209053" comment="xen-tools-domU-4.2.5_20-24 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7513</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-7513" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7513" source="CVE"/>
    <description>
    arch/x86/kvm/x86.c in the Linux kernel before 4.4 does not reset the PIT counter values during state restoration, which allows guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7513.html">CVE-2015-7513</cve>
<bugzilla href="https://bugzilla.suse.com/960689">SUSE bug 960689</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208598" comment="kernel-bigsmp-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208599" comment="kernel-bigsmp-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208600" comment="kernel-bigsmp-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205422" comment="kernel-default-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205423" comment="kernel-default-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205424" comment="kernel-default-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205425" comment="kernel-ec2-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205426" comment="kernel-ec2-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205427" comment="kernel-ec2-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205431" comment="kernel-source-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205432" comment="kernel-syms-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205433" comment="kernel-trace-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205434" comment="kernel-trace-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205435" comment="kernel-trace-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205436" comment="kernel-xen-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205437" comment="kernel-xen-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205438" comment="kernel-xen-devel-3.0.101-0.47.86 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208598" comment="kernel-bigsmp-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208599" comment="kernel-bigsmp-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208600" comment="kernel-bigsmp-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205422" comment="kernel-default-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205423" comment="kernel-default-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205424" comment="kernel-default-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208601" comment="kernel-default-man-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205425" comment="kernel-ec2-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205426" comment="kernel-ec2-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205427" comment="kernel-ec2-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205428" comment="kernel-pae-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205429" comment="kernel-pae-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205430" comment="kernel-pae-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205431" comment="kernel-source-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205432" comment="kernel-syms-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205433" comment="kernel-trace-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205434" comment="kernel-trace-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205435" comment="kernel-trace-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205436" comment="kernel-xen-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205437" comment="kernel-xen-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205438" comment="kernel-xen-devel-3.0.101-0.47.86 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7515</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-7515" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7515" source="CVE"/>
    <description>
    The aiptek_probe function in drivers/input/tablet/aiptek.c in the Linux kernel before 4.4 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device that lacks endpoints.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7515.html">CVE-2015-7515</cve>
<bugzilla href="https://bugzilla.suse.com/956708">SUSE bug 956708</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208637" comment="kernel-default-man-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208641" comment="kernel-pae-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208642" comment="kernel-pae-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208643" comment="kernel-pae-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7543</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7543" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7543" source="CVE"/>
    <description>
    aRts 1.5.10 and kdelibs3 3.5.10 and earlier do not properly create temporary directories, which allows local users to hijack the IPC by pre-creating the temporary directory.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7543.html">CVE-2015-7543</cve>
<bugzilla href="https://bugzilla.suse.com/958347">SUSE bug 958347</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009238285" comment="kdelibs3-3.5.10-23.30.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238286" comment="kdelibs3-32bit-3.5.10-23.30.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238293" comment="kdelibs3-default-style-3.5.10-23.30.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238290" comment="kdelibs3-default-style-32bit-3.5.10-23.30.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7547.html">CVE-2015-7547</cve>
<bugzilla href="https://bugzilla.suse.com/1077097">SUSE bug 1077097</bugzilla>
<bugzilla href="https://bugzilla.suse.com/847227">SUSE bug 847227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/961721">SUSE bug 961721</bugzilla>
<bugzilla href="https://bugzilla.suse.com/967023">SUSE bug 967023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/967061">SUSE bug 967061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/967072">SUSE bug 967072</bugzilla>
<bugzilla href="https://bugzilla.suse.com/967496">SUSE bug 967496</bugzilla>
<bugzilla href="https://bugzilla.suse.com/969216">SUSE bug 969216</bugzilla>
<bugzilla href="https://bugzilla.suse.com/969241">SUSE bug 969241</bugzilla>
<bugzilla href="https://bugzilla.suse.com/986086">SUSE bug 986086</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201693" comment="glibc-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204416" comment="glibc-32bit-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204417" comment="glibc-devel-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204418" comment="glibc-devel-32bit-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201694" comment="glibc-html-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204419" comment="glibc-i18ndata-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201695" comment="glibc-info-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204420" comment="glibc-locale-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204421" comment="glibc-locale-32bit-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208509" comment="glibc-locale-x86-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208510" comment="glibc-profile-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208511" comment="glibc-profile-32bit-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208512" comment="glibc-profile-x86-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208513" comment="glibc-x86-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204422" comment="nscd-2.11.3-17.95 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201693" comment="glibc-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204416" comment="glibc-32bit-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204417" comment="glibc-devel-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204418" comment="glibc-devel-32bit-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201694" comment="glibc-html-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204419" comment="glibc-i18ndata-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201695" comment="glibc-info-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204420" comment="glibc-locale-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204421" comment="glibc-locale-32bit-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208510" comment="glibc-profile-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208511" comment="glibc-profile-32bit-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204422" comment="nscd-2.11.3-17.95 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7548</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-7548" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7548" source="CVE"/>
    <description>
    OpenStack Compute (Nova) before 2015.1.3 (kilo) and 12.0.x before 12.0.1 (liberty), when using libvirt to spawn instances and use_cow_images is set to false, allow remote authenticated users to read arbitrary files by overwriting an instance disk with a crafted image and requesting a snapshot.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7548.html">CVE-2015-7548</cve>
<bugzilla href="https://bugzilla.suse.com/960601">SUSE bug 960601</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215871" comment="openstack-keystone-2014.2.4.juno-17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215872" comment="openstack-keystone-doc-2014.2.4.juno-17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215873" comment="openstack-nova-2014.2.4.juno-29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215874" comment="openstack-nova-api-2014.2.4.juno-29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215875" comment="openstack-nova-cells-2014.2.4.juno-29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215876" comment="openstack-nova-cert-2014.2.4.juno-29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215877" comment="openstack-nova-compute-2014.2.4.juno-29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215878" comment="openstack-nova-conductor-2014.2.4.juno-29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215879" comment="openstack-nova-console-2014.2.4.juno-29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215880" comment="openstack-nova-consoleauth-2014.2.4.juno-29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215881" comment="openstack-nova-doc-2014.2.4.juno-29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215882" comment="openstack-nova-novncproxy-2014.2.4.juno-29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215883" comment="openstack-nova-objectstore-2014.2.4.juno-29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215884" comment="openstack-nova-scheduler-2014.2.4.juno-29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215885" comment="openstack-nova-serialproxy-2014.2.4.juno-29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215886" comment="openstack-nova-vncproxy-2014.2.4.juno-29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215887" comment="openstack-swift-2.1.0-14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215888" comment="openstack-swift-account-2.1.0-14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215889" comment="openstack-swift-container-2.1.0-14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215890" comment="openstack-swift-doc-2.1.0-14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215891" comment="openstack-swift-object-2.1.0-14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215892" comment="openstack-swift-proxy-2.1.0-14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215893" comment="python-keystone-2014.2.4.juno-17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215894" comment="python-nova-2014.2.4.juno-29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215895" comment="python-swift-2.1.0-14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7549</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7549" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549" source="CVE"/>
    <description>
    The MSI-X MMIO support in hw/pci/msix.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) by leveraging failure to define the .write method.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7549.html">CVE-2015-7549</cve>
<bugzilla href="https://bugzilla.suse.com/958917">SUSE bug 958917</bugzilla>
<bugzilla href="https://bugzilla.suse.com/958918">SUSE bug 958918</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7550</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-7550" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7550" source="CVE"/>
    <description>
    The keyctl_read_key function in security/keys/keyctl.c in the Linux kernel before 4.3.4 does not properly use a semaphore, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted application that leverages a race condition between keyctl_revoke and keyctl_read calls.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7550.html">CVE-2015-7550</cve>
<bugzilla href="https://bugzilla.suse.com/1052256">SUSE bug 1052256</bugzilla>
<bugzilla href="https://bugzilla.suse.com/958951">SUSE bug 958951</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208637" comment="kernel-default-man-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208641" comment="kernel-pae-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208642" comment="kernel-pae-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208643" comment="kernel-pae-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7551</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7551" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7551" source="CVE"/>
    <description>
    The Fiddle::Handle implementation in ext/fiddle/handle.c in Ruby before 2.0.0-p648, 2.1 before 2.1.8, and 2.2 before 2.2.4, as distributed in Apple OS X before 10.11.4 and other products, mishandles tainting, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted string, related to the DL module and the libffi library.  NOTE: this vulnerability exists because of a CVE-2009-5147 regression.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7551.html">CVE-2015-7551</cve>
<bugzilla href="https://bugzilla.suse.com/939860">SUSE bug 939860</bugzilla>
<bugzilla href="https://bugzilla.suse.com/959495">SUSE bug 959495</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203428" comment="ruby-1.8.7.p357-0.9.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203430" comment="ruby-doc-html-1.8.7.p357-0.9.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203434" comment="ruby-tk-1.8.7.p357-0.9.19 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7552</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7552" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7552" source="CVE"/>
    <description>
    Heap-based buffer overflow in the gdk_pixbuf_flip function in gdk-pixbuf-scale.c in gdk-pixbuf 2.30.x allows remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted BMP file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7552.html">CVE-2015-7552</cve>
<bugzilla href="https://bugzilla.suse.com/958963">SUSE bug 958963</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201710" comment="gtk2-2.18.9-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204449" comment="gtk2-32bit-2.18.9-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208531" comment="gtk2-doc-2.18.9-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204450" comment="gtk2-lang-2.18.9-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208532" comment="gtk2-x86-2.18.9-0.39 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201710" comment="gtk2-2.18.9-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204449" comment="gtk2-32bit-2.18.9-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208531" comment="gtk2-doc-2.18.9-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204450" comment="gtk2-lang-2.18.9-0.39 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7554</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7554" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7554" source="CVE"/>
    <description>
    The _TIFFVGetField function in tif_dir.c in libtiff 4.0.6 allows attackers to cause a denial of service (invalid memory write and crash) or possibly have unspecified other impact via crafted field data in an extension tag in a TIFF image.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7554.html">CVE-2015-7554</cve>
<bugzilla href="https://bugzilla.suse.com/1007276">SUSE bug 1007276</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1017690">SUSE bug 1017690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1040322">SUSE bug 1040322</bugzilla>
<bugzilla href="https://bugzilla.suse.com/960341">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/974621">SUSE bug 974621</bugzilla>
<bugzilla href="https://bugzilla.suse.com/983436">SUSE bug 983436</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009229551" comment="libtiff3-3.8.2-141.169.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229568" comment="libtiff3-32bit-3.8.2-141.169.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229522" comment="tiff-3.8.2-141.169.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7555</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7555" source="CVE"/>
    <description>
    Heap-based buffer overflow in giffix.c in giffix in giflib 5.1.1 allows attackers to cause a denial of service (program crash) via crafted image and logical screen width fields in a GIF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7555.html">CVE-2015-7555</cve>
<bugzilla href="https://bugzilla.suse.com/960319">SUSE bug 960319</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201675" comment="giflib-4.1.6-13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204400" comment="giflib-32bit-4.1.6-13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208497" comment="giflib-progs-4.1.6-13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208498" comment="giflib-x86-4.1.6-13 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201675" comment="giflib-4.1.6-13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204400" comment="giflib-32bit-4.1.6-13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208497" comment="giflib-progs-4.1.6-13 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7560</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7560" source="CVE"/>
    <description>
    The SMB1 implementation in smbd in Samba 3.x and 4.x before 4.1.23, 4.2.x before 4.2.9, 4.3.x before 4.3.6, and 4.4.x before 4.4.0rc4 allows remote authenticated users to modify arbitrary ACLs by using a UNIX SMB1 call to create a symlink, and then using a non-UNIX SMB1 call to write to the ACL content.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7560.html">CVE-2015-7560</cve>
<bugzilla href="https://bugzilla.suse.com/968222">SUSE bug 968222</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210686" comment="ldapsmb-1.34b-67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205082" comment="libldb1-3.6.3-67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205084" comment="libsmbclient0-3.6.3-67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205085" comment="libsmbclient0-32bit-3.6.3-67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205086" comment="libtalloc2-3.6.3-67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205087" comment="libtalloc2-32bit-3.6.3-67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205088" comment="libtdb1-3.6.3-67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205089" comment="libtdb1-32bit-3.6.3-67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205090" comment="libtevent0-3.6.3-67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205091" comment="libtevent0-32bit-3.6.3-67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205092" comment="libwbclient0-3.6.3-67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205093" comment="libwbclient0-32bit-3.6.3-67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203450" comment="samba-3.6.3-67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205094" comment="samba-32bit-3.6.3-67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205095" comment="samba-client-3.6.3-67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205096" comment="samba-client-32bit-3.6.3-67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205097" comment="samba-doc-3.6.3-67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205098" comment="samba-krb-printing-3.6.3-67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205099" comment="samba-winbind-3.6.3-67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205100" comment="samba-winbind-32bit-3.6.3-67 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7566</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-7566" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7566" source="CVE"/>
    <description>
    The clie_5_attach function in drivers/usb/serial/visor.c in the Linux kernel through 4.4.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a bulk-out endpoint.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7566.html">CVE-2015-7566</cve>
<bugzilla href="https://bugzilla.suse.com/961512">SUSE bug 961512</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208637" comment="kernel-default-man-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208641" comment="kernel-pae-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208642" comment="kernel-pae-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208643" comment="kernel-pae-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7575</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7575" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575" source="CVE"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.20.2, as used in Mozilla Firefox before 43.0.2 and Firefox ESR 38.x before 38.5.2, does not reject MD5 signatures in Server Key Exchange messages in TLS 1.2 Handshake Protocol traffic, which makes it easier for man-in-the-middle attackers to spoof servers by triggering a collision.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7575.html">CVE-2015-7575</cve>
<bugzilla href="https://bugzilla.suse.com/959888">SUSE bug 959888</bugzilla>
<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
<bugzilla href="https://bugzilla.suse.com/960996">SUSE bug 960996</bugzilla>
<bugzilla href="https://bugzilla.suse.com/961280">SUSE bug 961280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/961281">SUSE bug 961281</bugzilla>
<bugzilla href="https://bugzilla.suse.com/961282">SUSE bug 961282</bugzilla>
<bugzilla href="https://bugzilla.suse.com/961283">SUSE bug 961283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/961284">SUSE bug 961284</bugzilla>
<bugzilla href="https://bugzilla.suse.com/961290">SUSE bug 961290</bugzilla>
<bugzilla href="https://bugzilla.suse.com/961357">SUSE bug 961357</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962743">SUSE bug 962743</bugzilla>
<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/967521">SUSE bug 967521</bugzilla>
<bugzilla href="https://bugzilla.suse.com/981087">SUSE bug 981087</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204682" comment="libfreebl3-3.19.2.2-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204683" comment="libfreebl3-32bit-3.19.2.2-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208778" comment="libfreebl3-x86-3.19.2.2-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204684" comment="libsoftokn3-3.19.2.2-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204685" comment="libsoftokn3-32bit-3.19.2.2-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208779" comment="libsoftokn3-x86-3.19.2.2-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201939" comment="mozilla-nss-3.19.2.2-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204686" comment="mozilla-nss-32bit-3.19.2.2-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204687" comment="mozilla-nss-tools-3.19.2.2-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208780" comment="mozilla-nss-x86-3.19.2.2-22 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207704" comment="java-1_6_0-ibm-1.6.0_sr16.20-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207707" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.20-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207708" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.20-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207709" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.20-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207730" comment="java-1_7_0-ibm-1.7.0_sr9.30-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207731" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.30-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207733" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.30-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207734" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.30-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204682" comment="libfreebl3-3.19.2.2-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204683" comment="libfreebl3-32bit-3.19.2.2-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204684" comment="libsoftokn3-3.19.2.2-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204685" comment="libsoftokn3-32bit-3.19.2.2-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201939" comment="mozilla-nss-3.19.2.2-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204686" comment="mozilla-nss-32bit-3.19.2.2-22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204687" comment="mozilla-nss-tools-3.19.2.2-22 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208546" comment="java-1_6_0-ibm-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208547" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208548" comment="java-1_6_0-ibm-devel-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208549" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208550" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208551" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208556" comment="java-1_7_0-ibm-1.7.0_sr9.30-47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208557" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.30-47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208558" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.30-47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208559" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.30-47 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7576</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-7576" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7576" source="CVE"/>
    <description>
    The http_basic_authenticate_with method in actionpack/lib/action_controller/metal/http_authentication.rb in the Basic Authentication implementation in Action Controller in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not use a constant-time algorithm for verifying credentials, which makes it easier for remote attackers to bypass authentication by measuring timing differences.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7576.html">CVE-2015-7576</cve>
<bugzilla href="https://bugzilla.suse.com/963329">SUSE bug 963329</bugzilla>
<bugzilla href="https://bugzilla.suse.com/970715">SUSE bug 970715</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215940" comment="ruby2.1-rubygem-actionpack-4_1-4.1.9-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215954" comment="ruby2.1-rubygem-activesupport-4_1-4.1.9-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215941" comment="rubygem-actionpack-4_1-4.1.9-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215955" comment="rubygem-activesupport-4_1-4.1.9-15 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7577</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-7577" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7577" source="CVE"/>
    <description>
    activerecord/lib/active_record/nested_attributes.rb in Active Record in Ruby on Rails 3.1.x and 3.2.x before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly implement a certain destroy option, which allows remote attackers to bypass intended change restrictions by leveraging use of the nested attributes feature.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7577.html">CVE-2015-7577</cve>
<bugzilla href="https://bugzilla.suse.com/963330">SUSE bug 963330</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215948" comment="ruby2.1-rubygem-activerecord-4_1-4.1.9-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215949" comment="rubygem-activerecord-4_1-4.1.9-9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7581</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-7581" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7581" source="CVE"/>
    <description>
    actionpack/lib/action_dispatch/routing/route_set.rb in Action Pack in Ruby on Rails 4.x before 4.2.5.1 and 5.x before 5.0.0.beta1.1 allows remote attackers to cause a denial of service (superfluous caching and memory consumption) by leveraging an application's use of a wildcard controller route.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7581.html">CVE-2015-7581</cve>
<bugzilla href="https://bugzilla.suse.com/963335">SUSE bug 963335</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215940" comment="ruby2.1-rubygem-actionpack-4_1-4.1.9-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215941" comment="rubygem-actionpack-4_1-4.1.9-9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7674</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7674" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7674" source="CVE"/>
    <description>
    Integer overflow in the pixops_scale_nearest function in pixops/pixops.c in gdk-pixbuf before 2.32.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted GIF image file, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7674.html">CVE-2015-7674</cve>
<bugzilla href="https://bugzilla.suse.com/948791">SUSE bug 948791</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201707" comment="gtk2-2.18.9-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204447" comment="gtk2-32bit-2.18.9-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208529" comment="gtk2-doc-2.18.9-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204448" comment="gtk2-lang-2.18.9-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208530" comment="gtk2-x86-2.18.9-0.35 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201707" comment="gtk2-2.18.9-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204447" comment="gtk2-32bit-2.18.9-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208529" comment="gtk2-doc-2.18.9-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204448" comment="gtk2-lang-2.18.9-0.35 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7691</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-7691" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7691" source="CVE"/>
    <description>
    The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash) via crafted packets containing particular autokey operations.  NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7691.html">CVE-2015-7691</cve>
<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/911792">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207904" comment="ntp-4.2.8p6-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207905" comment="ntp-doc-4.2.8p6-41 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7692</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-7692" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7692" source="CVE"/>
    <description>
    The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash).  NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7692.html">CVE-2015-7692</cve>
<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/911792">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207904" comment="ntp-4.2.8p6-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207905" comment="ntp-doc-4.2.8p6-41 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7696</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7696" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7696" source="CVE"/>
    <description>
    Info-ZIP UnZip 6.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly execute arbitrary code via a crafted password-protected ZIP archive, possibly related to an Extra-Field size value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7696.html">CVE-2015-7696</cve>
<bugzilla href="https://bugzilla.suse.com/950110">SUSE bug 950110</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210860" comment="unzip-6.00-11.17 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7697</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7697" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7697" source="CVE"/>
    <description>
    Info-ZIP UnZip 6.0 allows remote attackers to cause a denial of service (infinite loop) via empty bzip2 data in a ZIP archive.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7697.html">CVE-2015-7697</cve>
<bugzilla href="https://bugzilla.suse.com/950110">SUSE bug 950110</bugzilla>
<bugzilla href="https://bugzilla.suse.com/950111">SUSE bug 950111</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210860" comment="unzip-6.00-11.17 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7701</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-7701" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7701" source="CVE"/>
    <description>
    Memory leak in the CRYPTO_ASSOC function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (memory consumption).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7701.html">CVE-2015-7701</cve>
<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207904" comment="ntp-4.2.8p6-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207905" comment="ntp-doc-4.2.8p6-41 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7702</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-7702" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7702" source="CVE"/>
    <description>
    The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash).  NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7702.html">CVE-2015-7702</cve>
<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/911792">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207904" comment="ntp-4.2.8p6-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207905" comment="ntp-doc-4.2.8p6-41 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7703</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-7703" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7703" source="CVE"/>
    <description>
    The "pidfile" or "driftfile" directives in NTP ntpd 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77, when ntpd is configured to allow remote configuration, allows remote attackers with an IP address that is allowed to send configuration requests, and with knowledge of the remote configuration password to write to arbitrary files via the :config command.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7703.html">CVE-2015-7703</cve>
<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/943216">SUSE bug 943216</bugzilla>
<bugzilla href="https://bugzilla.suse.com/943218">SUSE bug 943218</bugzilla>
<bugzilla href="https://bugzilla.suse.com/943219">SUSE bug 943219</bugzilla>
<bugzilla href="https://bugzilla.suse.com/943221">SUSE bug 943221</bugzilla>
<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207904" comment="ntp-4.2.8p6-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207905" comment="ntp-doc-4.2.8p6-41 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7704</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-7704" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704" source="CVE"/>
    <description>
    The ntpd client in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service via a number of crafted "KOD" messages.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7704.html">CVE-2015-7704</cve>
<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/952611">SUSE bug 952611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/977446">SUSE bug 977446</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207907" comment="ntp-4.2.8p7-44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207908" comment="ntp-doc-4.2.8p7-44 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7705</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-7705" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7705" source="CVE"/>
    <description>
    The rate limiting feature in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to have unspecified impact via a large number of crafted requests.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7705.html">CVE-2015-7705</cve>
<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/952611">SUSE bug 952611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207907" comment="ntp-4.2.8p7-44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207908" comment="ntp-doc-4.2.8p7-44 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7713</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-7713" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7713" source="CVE"/>
    <description>
    OpenStack Compute (Nova) before 2014.2.4 (juno) and 2015.1.x before 2015.1.2 (kilo) do not properly apply security group changes, which allows remote attackers to bypass intended restriction by leveraging an instance that was running when the change was made.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7713.html">CVE-2015-7713</cve>
<bugzilla href="https://bugzilla.suse.com/949070">SUSE bug 949070</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215896" comment="openstack-nova-2014.2.4~a0~dev80-20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215897" comment="openstack-nova-api-2014.2.4~a0~dev80-20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215898" comment="openstack-nova-cells-2014.2.4~a0~dev80-20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215899" comment="openstack-nova-cert-2014.2.4~a0~dev80-20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215900" comment="openstack-nova-compute-2014.2.4~a0~dev80-20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215901" comment="openstack-nova-conductor-2014.2.4~a0~dev80-20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215902" comment="openstack-nova-console-2014.2.4~a0~dev80-20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215903" comment="openstack-nova-consoleauth-2014.2.4~a0~dev80-20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215904" comment="openstack-nova-doc-2014.2.4~a0~dev80-20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215905" comment="openstack-nova-novncproxy-2014.2.4~a0~dev80-20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215906" comment="openstack-nova-objectstore-2014.2.4~a0~dev80-20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215907" comment="openstack-nova-scheduler-2014.2.4~a0~dev80-20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215908" comment="openstack-nova-serialproxy-2014.2.4~a0~dev80-20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215909" comment="openstack-nova-vncproxy-2014.2.4~a0~dev80-20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215910" comment="python-nova-2014.2.4~a0~dev80-20 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7744</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7744" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7744" source="CVE"/>
    <description>
    wolfSSL (formerly CyaSSL) before 3.6.8 does not properly handle faults associated with the Chinese Remainder Theorem (CRT) process when allowing ephemeral key exchange without low memory optimizations on a server, which makes it easier for remote attackers to obtain private RSA keys by capturing TLS handshakes, aka a Lenstra attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7744.html">CVE-2015-7744</cve>
<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204704" comment="libmysql55client18-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204705" comment="libmysql55client18-32bit-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204706" comment="libmysql55client_r18-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201950" comment="mysql-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204707" comment="mysql-client-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208789" comment="mysql-tools-5.5.47-0.17 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204704" comment="libmysql55client18-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204705" comment="libmysql55client18-32bit-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208788" comment="libmysql55client18-x86-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204706" comment="libmysql55client_r18-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201950" comment="mysql-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204707" comment="mysql-client-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208789" comment="mysql-tools-5.5.47-0.17 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7799</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-7799" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7799" source="CVE"/>
    <description>
    The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel through 4.2.3 does not ensure that certain slot numbers are valid, which allows local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7799.html">CVE-2015-7799</cve>
<bugzilla href="https://bugzilla.suse.com/1052256">SUSE bug 1052256</bugzilla>
<bugzilla href="https://bugzilla.suse.com/949936">SUSE bug 949936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/951638">SUSE bug 951638</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208637" comment="kernel-default-man-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208641" comment="kernel-pae-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208642" comment="kernel-pae-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208643" comment="kernel-pae-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7803</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-7803" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7803" source="CVE"/>
    <description>
    The phar_get_entry_data function in ext/phar/util.c in PHP before 5.5.30 and 5.6.x before 5.6.14 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a .phar file with a crafted TAR archive entry in which the Link indicator references a file that does not exist.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7803.html">CVE-2015-7803</cve>
<bugzilla href="https://bugzilla.suse.com/949961">SUSE bug 949961</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208897" comment="apache2-mod_php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203264" comment="php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208898" comment="php53-bcmath-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208899" comment="php53-bz2-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208900" comment="php53-calendar-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208901" comment="php53-ctype-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208902" comment="php53-curl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208903" comment="php53-dba-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208904" comment="php53-dom-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208905" comment="php53-exif-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208906" comment="php53-fastcgi-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208907" comment="php53-fileinfo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208908" comment="php53-ftp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208909" comment="php53-gd-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208910" comment="php53-gettext-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208911" comment="php53-gmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208912" comment="php53-iconv-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208913" comment="php53-intl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208914" comment="php53-json-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208915" comment="php53-ldap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208916" comment="php53-mbstring-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208917" comment="php53-mcrypt-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208918" comment="php53-mysql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208919" comment="php53-odbc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208920" comment="php53-openssl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208921" comment="php53-pcntl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208922" comment="php53-pdo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208923" comment="php53-pear-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208924" comment="php53-pgsql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208925" comment="php53-pspell-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208926" comment="php53-shmop-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208927" comment="php53-snmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208928" comment="php53-soap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208929" comment="php53-suhosin-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208930" comment="php53-sysvmsg-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208931" comment="php53-sysvsem-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208932" comment="php53-sysvshm-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208933" comment="php53-tokenizer-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208934" comment="php53-wddx-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208935" comment="php53-xmlreader-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208936" comment="php53-xmlrpc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208937" comment="php53-xmlwriter-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208938" comment="php53-xsl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208939" comment="php53-zip-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208940" comment="php53-zlib-5.3.17-71 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7805" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7805" source="CVE"/>
    <description>
    Heap-based buffer overflow in libsndfile 1.0.25 allows remote attackers to have unspecified impact via the headindex value in the header in an AIFF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7805.html">CVE-2015-7805</cve>
<bugzilla href="https://bugzilla.suse.com/953516">SUSE bug 953516</bugzilla>
<bugzilla href="https://bugzilla.suse.com/953519">SUSE bug 953519</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201891" comment="libsndfile-1.0.20-2.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204655" comment="libsndfile-32bit-1.0.20-2.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208757" comment="libsndfile-x86-1.0.20-2.10 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201891" comment="libsndfile-1.0.20-2.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204655" comment="libsndfile-32bit-1.0.20-2.10 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7830" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7830" source="CVE"/>
    <description>
    The pcapng_read_if_descr_block function in wiretap/pcapng.c in the pcapng parser in Wireshark 1.12.x before 1.12.8 uses too many levels of pointer indirection, which allows remote attackers to cause a denial of service (incorrect free and application crash) via a crafted packet that triggers interface-filter copying.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7830.html">CVE-2015-7830</cve>
<bugzilla href="https://bugzilla.suse.com/950437">SUSE bug 950437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202105" comment="wireshark-1.12.9-0.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7833</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-7833" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7833" source="CVE"/>
    <description>
    The usbvision driver in the Linux kernel package 3.10.0-123.20.1.el7 through 3.10.0-229.14.1.el7 in Red Hat Enterprise Linux (RHEL) 7.1 allows physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7833.html">CVE-2015-7833</cve>
<bugzilla href="https://bugzilla.suse.com/950998">SUSE bug 950998</bugzilla>
<bugzilla href="https://bugzilla.suse.com/990058">SUSE bug 990058</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208598" comment="kernel-bigsmp-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208599" comment="kernel-bigsmp-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208600" comment="kernel-bigsmp-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205422" comment="kernel-default-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205423" comment="kernel-default-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205424" comment="kernel-default-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205425" comment="kernel-ec2-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205426" comment="kernel-ec2-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205427" comment="kernel-ec2-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205431" comment="kernel-source-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205432" comment="kernel-syms-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205433" comment="kernel-trace-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205434" comment="kernel-trace-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205435" comment="kernel-trace-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205436" comment="kernel-xen-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205437" comment="kernel-xen-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205438" comment="kernel-xen-devel-3.0.101-0.47.86 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208598" comment="kernel-bigsmp-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208599" comment="kernel-bigsmp-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208600" comment="kernel-bigsmp-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205422" comment="kernel-default-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205423" comment="kernel-default-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205424" comment="kernel-default-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208601" comment="kernel-default-man-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205425" comment="kernel-ec2-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205426" comment="kernel-ec2-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205427" comment="kernel-ec2-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205428" comment="kernel-pae-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205429" comment="kernel-pae-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205430" comment="kernel-pae-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205431" comment="kernel-source-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205432" comment="kernel-syms-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205433" comment="kernel-trace-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205434" comment="kernel-trace-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205435" comment="kernel-trace-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205436" comment="kernel-xen-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205437" comment="kernel-xen-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205438" comment="kernel-xen-devel-3.0.101-0.47.86 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7835" source="CVE"/>
    <description>
    The mod_l2_entry function in arch/x86/mm.c in Xen 3.4 through 4.6.x does not properly validate level 2 page table entries, which allows local PV guest administrators to gain privileges via a crafted superpage mapping.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7835.html">CVE-2015-7835</cve>
<bugzilla href="https://bugzilla.suse.com/940929">SUSE bug 940929</bugzilla>
<bugzilla href="https://bugzilla.suse.com/947159">SUSE bug 947159</bugzilla>
<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202111" comment="xen-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204879" comment="xen-doc-html-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204880" comment="xen-doc-pdf-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204881" comment="xen-kmp-default-4.2.5_14_3.0.101_0.47.67-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204882" comment="xen-kmp-pae-4.2.5_14_3.0.101_0.47.67-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204883" comment="xen-libs-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204884" comment="xen-libs-32bit-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204885" comment="xen-tools-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204886" comment="xen-tools-domU-4.2.5_14-18 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202111" comment="xen-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204879" comment="xen-doc-html-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204880" comment="xen-doc-pdf-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204881" comment="xen-kmp-default-4.2.5_14_3.0.101_0.47.67-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204883" comment="xen-libs-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204884" comment="xen-libs-32bit-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204885" comment="xen-tools-4.2.5_14-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204886" comment="xen-tools-domU-4.2.5_14-18 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7848</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-7848" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7848" source="CVE"/>
    <description>
    An integer overflow can occur in NTP-dev.4.3.70 leading to an out-of-bounds memory copy operation when processing a specially crafted private mode packet. The crafted packet needs to have the correct message authentication code and a valid timestamp. When processed by the NTP daemon, it leads to an immediate crash.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7848.html">CVE-2015-7848</cve>
<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207904" comment="ntp-4.2.8p6-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207905" comment="ntp-doc-4.2.8p6-41 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7849</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-7849" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7849" source="CVE"/>
    <description>
    Use-after-free vulnerability in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to possibly execute arbitrary code or cause a denial of service (crash) via crafted packets.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7849.html">CVE-2015-7849</cve>
<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207904" comment="ntp-4.2.8p6-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207905" comment="ntp-doc-4.2.8p6-41 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7850</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-7850" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7850" source="CVE"/>
    <description>
    ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to cause a denial of service (infinite loop or crash) by pointing the key file at the log file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7850.html">CVE-2015-7850</cve>
<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207904" comment="ntp-4.2.8p6-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207905" comment="ntp-doc-4.2.8p6-41 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7851</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-7851" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7851" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7851.html">CVE-2015-7851</cve>
<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207904" comment="ntp-4.2.8p6-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207905" comment="ntp-doc-4.2.8p6-41 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7852</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-7852" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7852" source="CVE"/>
    <description>
    ntpq in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash) via crafted mode 6 response packets.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7852.html">CVE-2015-7852</cve>
<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207904" comment="ntp-4.2.8p6-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207905" comment="ntp-doc-4.2.8p6-41 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7853</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-7853" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7853" source="CVE"/>
    <description>
    The datalen parameter in the refclock driver in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a negative input value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7853.html">CVE-2015-7853</cve>
<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207904" comment="ntp-4.2.8p6-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207905" comment="ntp-doc-4.2.8p6-41 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7854</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-7854" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7854" source="CVE"/>
    <description>
    Buffer overflow in the password management functionality in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted key file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7854.html">CVE-2015-7854</cve>
<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207904" comment="ntp-4.2.8p6-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207905" comment="ntp-doc-4.2.8p6-41 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7855</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-7855" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7855" source="CVE"/>
    <description>
    The decodenetnum function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (assertion failure) via a 6 or mode 7 packet containing a long data value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7855.html">CVE-2015-7855</cve>
<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207904" comment="ntp-4.2.8p6-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207905" comment="ntp-doc-4.2.8p6-41 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7871</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-7871" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7871" source="CVE"/>
    <description>
    Crypto-NAK packets in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to bypass authentication.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7871.html">CVE-2015-7871</cve>
<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/952606">SUSE bug 952606</bugzilla>
<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207904" comment="ntp-4.2.8p6-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207905" comment="ntp-doc-4.2.8p6-41 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7872</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7872" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7872" source="CVE"/>
    <description>
    The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 4.2.6 allows local users to cause a denial of service (OOPS) via crafted keyctl commands.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7872.html">CVE-2015-7872</cve>
<bugzilla href="https://bugzilla.suse.com/951440">SUSE bug 951440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/951542">SUSE bug 951542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/951638">SUSE bug 951638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/958463">SUSE bug 958463</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204546" comment="kernel-bigsmp-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208678" comment="kernel-bigsmp-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204547" comment="kernel-bigsmp-devel-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204548" comment="kernel-default-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204549" comment="kernel-default-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204550" comment="kernel-default-devel-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208679" comment="kernel-default-man-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208680" comment="kernel-ec2-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208681" comment="kernel-ec2-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208682" comment="kernel-ec2-devel-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204552" comment="kernel-pae-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204553" comment="kernel-pae-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204554" comment="kernel-pae-devel-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208683" comment="kernel-ppc64-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208684" comment="kernel-ppc64-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208685" comment="kernel-ppc64-devel-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204556" comment="kernel-source-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204557" comment="kernel-syms-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204558" comment="kernel-trace-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208686" comment="kernel-trace-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204559" comment="kernel-trace-devel-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204560" comment="kernel-xen-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204561" comment="kernel-xen-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204562" comment="kernel-xen-devel-3.0.101-0.47.71 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7941</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7941" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7941" source="CVE"/>
    <description>
    libxml2 2.9.2 does not properly stop parsing invalid input, which allows context-dependent attackers to cause a denial of service (out-of-bounds read and libxml2 crash) via crafted XML data to the (1) xmlParseEntityDecl or (2) xmlParseConditionalSections function in parser.c, as demonstrated by non-terminated entities.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7941.html">CVE-2015-7941</cve>
<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/951734">SUSE bug 951734</bugzilla>
<bugzilla href="https://bugzilla.suse.com/951735">SUSE bug 951735</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201905" comment="libxml2-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204668" comment="libxml2-32bit-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208763" comment="libxml2-doc-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204669" comment="libxml2-python-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208764" comment="libxml2-x86-2.7.6-0.34 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201905" comment="libxml2-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204668" comment="libxml2-32bit-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208763" comment="libxml2-doc-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204669" comment="libxml2-python-2.7.6-0.34 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7942</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7942" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7942" source="CVE"/>
    <description>
    The xmlParseConditionalSections function in parser.c in libxml2 does not properly skip intermediary entities when it stops parsing invalid input, which allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via crafted XML data, a different vulnerability than CVE-2015-7941.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7942.html">CVE-2015-7942</cve>
<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/951735">SUSE bug 951735</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201905" comment="libxml2-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204668" comment="libxml2-32bit-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208763" comment="libxml2-doc-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204669" comment="libxml2-python-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208764" comment="libxml2-x86-2.7.6-0.34 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201905" comment="libxml2-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204668" comment="libxml2-32bit-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208763" comment="libxml2-doc-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204669" comment="libxml2-python-2.7.6-0.34 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7969</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7969" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7969" source="CVE"/>
    <description>
    Multiple memory leaks in Xen 4.0 through 4.6.x allow local guest administrators or domains with certain permission to cause a denial of service (memory consumption) via a large number of "teardowns" of domains with the vcpu pointer array allocated using the (1) XEN_DOMCTL_max_vcpus hypercall or the xenoprofile state vcpu pointer array allocated using the (2) XENOPROF_get_buffer or (3) XENOPROF_set_passive hypercall.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7969.html">CVE-2015-7969</cve>
<bugzilla href="https://bugzilla.suse.com/950703">SUSE bug 950703</bugzilla>
<bugzilla href="https://bugzilla.suse.com/950705">SUSE bug 950705</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202120" comment="xen-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204950" comment="xen-doc-html-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204951" comment="xen-doc-pdf-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204952" comment="xen-kmp-default-4.2.5_18_3.0.101_0.47.71-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204953" comment="xen-kmp-pae-4.2.5_18_3.0.101_0.47.71-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204954" comment="xen-libs-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204955" comment="xen-libs-32bit-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204956" comment="xen-tools-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204957" comment="xen-tools-domU-4.2.5_18-21 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202120" comment="xen-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204950" comment="xen-doc-html-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204951" comment="xen-doc-pdf-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204952" comment="xen-kmp-default-4.2.5_18_3.0.101_0.47.71-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204954" comment="xen-libs-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204955" comment="xen-libs-32bit-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204956" comment="xen-tools-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204957" comment="xen-tools-domU-4.2.5_18-21 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7970</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7970" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7970" source="CVE"/>
    <description>
    The p2m_pod_emergency_sweep function in arch/x86/mm/p2m-pod.c in Xen 3.4.x, 3.5.x, and 3.6.x is not preemptible, which allows local x86 HVM guest administrators to cause a denial of service (CPU consumption and possibly reboot) via crafted memory contents that triggers a "time-consuming linear scan," related to Populate-on-Demand.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7970.html">CVE-2015-7970</cve>
<bugzilla href="https://bugzilla.suse.com/950704">SUSE bug 950704</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202120" comment="xen-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204950" comment="xen-doc-html-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204951" comment="xen-doc-pdf-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204952" comment="xen-kmp-default-4.2.5_18_3.0.101_0.47.71-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204953" comment="xen-kmp-pae-4.2.5_18_3.0.101_0.47.71-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204954" comment="xen-libs-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204955" comment="xen-libs-32bit-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204956" comment="xen-tools-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204957" comment="xen-tools-domU-4.2.5_18-21 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202120" comment="xen-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204950" comment="xen-doc-html-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204951" comment="xen-doc-pdf-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204952" comment="xen-kmp-default-4.2.5_18_3.0.101_0.47.71-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204954" comment="xen-libs-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204955" comment="xen-libs-32bit-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204956" comment="xen-tools-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204957" comment="xen-tools-domU-4.2.5_18-21 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7971</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7971" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7971" source="CVE"/>
    <description>
    Xen 3.2.x through 4.6.x does not limit the number of printk console messages when logging certain pmu and profiling hypercalls, which allows local guests to cause a denial of service via a sequence of crafted (1) HYPERCALL_xenoprof_op hypercalls, which are not properly handled in the do_xenoprof_op function in common/xenoprof.c, or (2) HYPERVISOR_xenpmu_op hypercalls, which are not properly handled in the do_xenpmu_op function in arch/x86/cpu/vpmu.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7971.html">CVE-2015-7971</cve>
<bugzilla href="https://bugzilla.suse.com/950706">SUSE bug 950706</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202120" comment="xen-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204950" comment="xen-doc-html-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204951" comment="xen-doc-pdf-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204952" comment="xen-kmp-default-4.2.5_18_3.0.101_0.47.71-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204953" comment="xen-kmp-pae-4.2.5_18_3.0.101_0.47.71-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204954" comment="xen-libs-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204955" comment="xen-libs-32bit-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204956" comment="xen-tools-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204957" comment="xen-tools-domU-4.2.5_18-21 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202120" comment="xen-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204950" comment="xen-doc-html-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204951" comment="xen-doc-pdf-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204952" comment="xen-kmp-default-4.2.5_18_3.0.101_0.47.71-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204954" comment="xen-libs-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204955" comment="xen-libs-32bit-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204956" comment="xen-tools-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204957" comment="xen-tools-domU-4.2.5_18-21 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7972</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7972" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7972" source="CVE"/>
    <description>
    The (1) libxl_set_memory_target function in tools/libxl/libxl.c and (2) libxl__build_post function in tools/libxl/libxl_dom.c in Xen 3.4.x through 4.6.x do not properly calculate the balloon size when using the populate-on-demand (PoD) system, which allows local HVM guest users to cause a denial of service (guest crash) via unspecified vectors related to "heavy memory pressure."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7972.html">CVE-2015-7972</cve>
<bugzilla href="https://bugzilla.suse.com/950704">SUSE bug 950704</bugzilla>
<bugzilla href="https://bugzilla.suse.com/951845">SUSE bug 951845</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202120" comment="xen-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204950" comment="xen-doc-html-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204951" comment="xen-doc-pdf-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204952" comment="xen-kmp-default-4.2.5_18_3.0.101_0.47.71-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204953" comment="xen-kmp-pae-4.2.5_18_3.0.101_0.47.71-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204954" comment="xen-libs-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204955" comment="xen-libs-32bit-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204956" comment="xen-tools-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204957" comment="xen-tools-domU-4.2.5_18-21 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202120" comment="xen-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204950" comment="xen-doc-html-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204951" comment="xen-doc-pdf-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204952" comment="xen-kmp-default-4.2.5_18_3.0.101_0.47.71-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204954" comment="xen-libs-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204955" comment="xen-libs-32bit-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204956" comment="xen-tools-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204957" comment="xen-tools-domU-4.2.5_18-21 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7973</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-7973" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7973" source="CVE"/>
    <description>
    NTP before 4.2.8p6 and 4.3.x before 4.3.90, when configured in broadcast mode, allows man-in-the-middle attackers to conduct replay attacks by sniffing the network.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7973.html">CVE-2015-7973</cve>
<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962995">SUSE bug 962995</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207904" comment="ntp-4.2.8p6-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207905" comment="ntp-doc-4.2.8p6-41 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7974</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-7974" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974" source="CVE"/>
    <description>
    NTP 4.x before 4.2.8p6 and 4.3.x before 4.3.90 do not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a "skeleton key."
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7974.html">CVE-2015-7974</cve>
<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962960">SUSE bug 962960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962995">SUSE bug 962995</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207907" comment="ntp-4.2.8p7-44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207908" comment="ntp-doc-4.2.8p7-44 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7975</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-7975" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7975" source="CVE"/>
    <description>
    The nextvar function in NTP before 4.2.8p6 and 4.3.x before 4.3.90 does not properly validate the length of its input, which allows an attacker to cause a denial of service (application crash).
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7975.html">CVE-2015-7975</cve>
<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962988">SUSE bug 962988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962995">SUSE bug 962995</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207904" comment="ntp-4.2.8p6-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207905" comment="ntp-doc-4.2.8p6-41 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7976</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-7976" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7976" source="CVE"/>
    <description>
    The ntpq saveconfig command in NTP 4.1.2, 4.2.x before 4.2.8p6, 4.3, 4.3.25, 4.3.70, and 4.3.77 does not properly filter special characters, which allows attackers to cause unspecified impact via a crafted filename.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7976.html">CVE-2015-7976</cve>
<bugzilla href="https://bugzilla.suse.com/962802">SUSE bug 962802</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962995">SUSE bug 962995</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207904" comment="ntp-4.2.8p6-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207905" comment="ntp-doc-4.2.8p6-41 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7977</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-7977" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977" source="CVE"/>
    <description>
    ntpd in NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (NULL pointer dereference) via a ntpdc reslist command.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7977.html">CVE-2015-7977</cve>
<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962970">SUSE bug 962970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962995">SUSE bug 962995</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207904" comment="ntp-4.2.8p6-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207905" comment="ntp-doc-4.2.8p6-41 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7978</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-7978" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978" source="CVE"/>
    <description>
    NTP before 4.2.8p6 and 4.3.0 before 4.3.90 allows a remote attackers to cause a denial of service (stack exhaustion) via an ntpdc relist command, which triggers recursive traversal of the restriction list.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7978.html">CVE-2015-7978</cve>
<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962970">SUSE bug 962970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962995">SUSE bug 962995</bugzilla>
<bugzilla href="https://bugzilla.suse.com/963000">SUSE bug 963000</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207904" comment="ntp-4.2.8p6-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207905" comment="ntp-doc-4.2.8p6-41 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7979</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-7979" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979" source="CVE"/>
    <description>
    NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (client-server association tear down) by sending broadcast packets with invalid authentication to a broadcast client.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7979.html">CVE-2015-7979</cve>
<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962784">SUSE bug 962784</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962995">SUSE bug 962995</bugzilla>
<bugzilla href="https://bugzilla.suse.com/977459">SUSE bug 977459</bugzilla>
<bugzilla href="https://bugzilla.suse.com/982065">SUSE bug 982065</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207904" comment="ntp-4.2.8p6-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207905" comment="ntp-doc-4.2.8p6-41 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7981</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7981" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7981" source="CVE"/>
    <description>
    The png_convert_to_rfc1123 function in png.c in libpng 1.0.x before 1.0.64, 1.2.x before 1.2.54, and 1.4.x before 1.4.17 allows remote attackers to obtain sensitive process memory information via crafted tIME chunk data in an image file, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7981.html">CVE-2015-7981</cve>
<bugzilla href="https://bugzilla.suse.com/952051">SUSE bug 952051</bugzilla>
<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201792" comment="libpng12-0-1.2.31-5.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204625" comment="libpng12-0-32bit-1.2.31-5.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208748" comment="libpng12-0-x86-1.2.31-5.35 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207704" comment="java-1_6_0-ibm-1.6.0_sr16.20-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207707" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.20-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207708" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.20-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207709" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.20-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207730" comment="java-1_7_0-ibm-1.7.0_sr9.30-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207731" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.30-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207733" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.30-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207734" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.30-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201792" comment="libpng12-0-1.2.31-5.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204625" comment="libpng12-0-32bit-1.2.31-5.35 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208546" comment="java-1_6_0-ibm-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208547" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208548" comment="java-1_6_0-ibm-devel-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208549" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208550" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208551" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208556" comment="java-1_7_0-ibm-1.7.0_sr9.30-47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208557" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.30-47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208558" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.30-47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208559" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.30-47 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7990</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7990" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7990" source="CVE"/>
    <description>
    Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7990.html">CVE-2015-7990</cve>
<bugzilla href="https://bugzilla.suse.com/945825">SUSE bug 945825</bugzilla>
<bugzilla href="https://bugzilla.suse.com/952384">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/953052">SUSE bug 953052</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204546" comment="kernel-bigsmp-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208678" comment="kernel-bigsmp-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204547" comment="kernel-bigsmp-devel-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204548" comment="kernel-default-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204549" comment="kernel-default-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204550" comment="kernel-default-devel-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208679" comment="kernel-default-man-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208680" comment="kernel-ec2-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208681" comment="kernel-ec2-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208682" comment="kernel-ec2-devel-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204552" comment="kernel-pae-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204553" comment="kernel-pae-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204554" comment="kernel-pae-devel-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208683" comment="kernel-ppc64-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208684" comment="kernel-ppc64-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208685" comment="kernel-ppc64-devel-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204556" comment="kernel-source-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204557" comment="kernel-syms-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204558" comment="kernel-trace-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208686" comment="kernel-trace-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204559" comment="kernel-trace-devel-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204560" comment="kernel-xen-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204561" comment="kernel-xen-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204562" comment="kernel-xen-devel-3.0.101-0.47.71 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7995</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-7995" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7995" source="CVE"/>
    <description>
    The xsltStylePreCompute function in preproc.c in libxslt 1.1.28 does not check if the parent node is an element, which allows attackers to cause a denial of service via a crafted XML file, related to a "type confusion" issue.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7995.html">CVE-2015-7995</cve>
<bugzilla href="https://bugzilla.suse.com/1123130">SUSE bug 1123130</bugzilla>
<bugzilla href="https://bugzilla.suse.com/952474">SUSE bug 952474</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203113" comment="libxslt-1.1.24-19.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209989" comment="libxslt-32bit-1.1.24-19.33 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8000</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8000" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8000" source="CVE"/>
    <description>
    db.c in named in ISC BIND 9.x before 9.9.8-P2 and 9.10.x before 9.10.3-P2 allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via a malformed class attribute.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8000.html">CVE-2015-8000</cve>
<bugzilla href="https://bugzilla.suse.com/944066">SUSE bug 944066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/958861">SUSE bug 958861</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201595" comment="bind-9.9.6P1-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207610" comment="bind-chrootenv-9.9.6P1-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207611" comment="bind-doc-9.9.6P1-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204222" comment="bind-libs-9.9.6P1-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204223" comment="bind-libs-32bit-9.9.6P1-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204224" comment="bind-utils-9.9.6P1-0.19 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201595" comment="bind-9.9.6P1-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207610" comment="bind-chrootenv-9.9.6P1-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207611" comment="bind-doc-9.9.6P1-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204222" comment="bind-libs-9.9.6P1-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204223" comment="bind-libs-32bit-9.9.6P1-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208436" comment="bind-libs-x86-9.9.6P1-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204224" comment="bind-utils-9.9.6P1-0.19 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8023</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8023" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8023" source="CVE"/>
    <description>
    The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8023.html">CVE-2015-8023</cve>
<bugzilla href="https://bugzilla.suse.com/953817">SUSE bug 953817</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204844" comment="strongswan-4.4.0-6.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204845" comment="strongswan-doc-4.4.0-6.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8025</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8025" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8025" source="CVE"/>
    <description>
    driver/subprocs.c in XScreenSaver before 5.34 does not properly perform an internal consistency check, which allows physically proximate attackers to bypass the lock screen by hot swapping monitors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8025.html">CVE-2015-8025</cve>
<bugzilla href="https://bugzilla.suse.com/952062">SUSE bug 952062</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204964" comment="xscreensaver-5.07-6.36 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8076</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8076" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8076" source="CVE"/>
    <description>
    The index_urlfetch function in index.c in Cyrus IMAP 2.3.x before 2.3.19, 2.4.x before 2.4.18, 2.5.x before 2.5.4 allows remote attackers to obtain sensitive information or possibly have unspecified other impact via vectors related to the urlfetch range, which triggers an out-of-bounds heap read.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8076.html">CVE-2015-8076</cve>
<bugzilla href="https://bugzilla.suse.com/954200">SUSE bug 954200</bugzilla>
<bugzilla href="https://bugzilla.suse.com/954201">SUSE bug 954201</bugzilla>
<bugzilla href="https://bugzilla.suse.com/981670">SUSE bug 981670</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202495" comment="cyrus-imapd-2.3.11-60.65.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202497" comment="perl-Cyrus-IMAP-2.3.11-60.65.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202498" comment="perl-Cyrus-SIEVE-managesieve-2.3.11-60.65.67 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8077</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8077" source="CVE"/>
    <description>
    Integer overflow in the index_urlfetch function in imap/index.c in Cyrus IMAP 2.3.19, 2.4.18, and 2.5.6 allows remote attackers to have unspecified impact via vectors related to urlfetch range checks and the start_octet variable.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8076.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8077.html">CVE-2015-8077</cve>
<bugzilla href="https://bugzilla.suse.com/954200">SUSE bug 954200</bugzilla>
<bugzilla href="https://bugzilla.suse.com/954201">SUSE bug 954201</bugzilla>
<bugzilla href="https://bugzilla.suse.com/981670">SUSE bug 981670</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202495" comment="cyrus-imapd-2.3.11-60.65.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202497" comment="perl-Cyrus-IMAP-2.3.11-60.65.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202498" comment="perl-Cyrus-SIEVE-managesieve-2.3.11-60.65.67 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8078</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8078" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8078" source="CVE"/>
    <description>
    Integer overflow in the index_urlfetch function in imap/index.c in Cyrus IMAP 2.3.19, 2.4.18, and 2.5.6 allows remote attackers to have unspecified impact via vectors related to urlfetch range checks and the section_offset variable.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8076.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8078.html">CVE-2015-8078</cve>
<bugzilla href="https://bugzilla.suse.com/954201">SUSE bug 954201</bugzilla>
<bugzilla href="https://bugzilla.suse.com/981670">SUSE bug 981670</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202495" comment="cyrus-imapd-2.3.11-60.65.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202497" comment="perl-Cyrus-IMAP-2.3.11-60.65.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202498" comment="perl-Cyrus-SIEVE-managesieve-2.3.11-60.65.67 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8104</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8104" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104" source="CVE"/>
    <description>
    The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8104.html">CVE-2015-8104</cve>
<bugzilla href="https://bugzilla.suse.com/953527">SUSE bug 953527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/954018">SUSE bug 954018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/954404">SUSE bug 954404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/954405">SUSE bug 954405</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962977">SUSE bug 962977</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204546" comment="kernel-bigsmp-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208678" comment="kernel-bigsmp-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204547" comment="kernel-bigsmp-devel-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204548" comment="kernel-default-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204549" comment="kernel-default-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204550" comment="kernel-default-devel-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208679" comment="kernel-default-man-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208680" comment="kernel-ec2-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208681" comment="kernel-ec2-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208682" comment="kernel-ec2-devel-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204552" comment="kernel-pae-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204553" comment="kernel-pae-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204554" comment="kernel-pae-devel-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208683" comment="kernel-ppc64-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208684" comment="kernel-ppc64-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208685" comment="kernel-ppc64-devel-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204556" comment="kernel-source-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204557" comment="kernel-syms-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204558" comment="kernel-trace-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208686" comment="kernel-trace-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204559" comment="kernel-trace-devel-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204560" comment="kernel-xen-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204561" comment="kernel-xen-base-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204562" comment="kernel-xen-devel-3.0.101-0.47.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202120" comment="xen-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204950" comment="xen-doc-html-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204951" comment="xen-doc-pdf-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204952" comment="xen-kmp-default-4.2.5_18_3.0.101_0.47.71-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204953" comment="xen-kmp-pae-4.2.5_18_3.0.101_0.47.71-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204954" comment="xen-libs-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204955" comment="xen-libs-32bit-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204956" comment="xen-tools-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204957" comment="xen-tools-domU-4.2.5_18-21 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8126" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126" source="CVE"/>
    <description>
    Multiple buffer overflows in the (1) png_set_PLTE and (2) png_get_PLTE functions in libpng before 1.0.64, 1.1.x and 1.2.x before 1.2.54, 1.3.x and 1.4.x before 1.4.17, 1.5.x before 1.5.24, and 1.6.x before 1.6.19 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8126.html">CVE-2015-8126</cve>
<bugzilla href="https://bugzilla.suse.com/954980">SUSE bug 954980</bugzilla>
<bugzilla href="https://bugzilla.suse.com/958198">SUSE bug 958198</bugzilla>
<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962743">SUSE bug 962743</bugzilla>
<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/969333">SUSE bug 969333</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201795" comment="libpng12-0-1.2.31-5.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204626" comment="libpng12-0-32bit-1.2.31-5.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208749" comment="libpng12-0-x86-1.2.31-5.38 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207704" comment="java-1_6_0-ibm-1.6.0_sr16.20-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207707" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.20-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207708" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.20-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207709" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.20-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207730" comment="java-1_7_0-ibm-1.7.0_sr9.30-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207731" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.30-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207733" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.30-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207734" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.30-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201795" comment="libpng12-0-1.2.31-5.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204626" comment="libpng12-0-32bit-1.2.31-5.38 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208546" comment="java-1_6_0-ibm-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208547" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208548" comment="java-1_6_0-ibm-devel-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208549" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208550" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208551" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208556" comment="java-1_7_0-ibm-1.7.0_sr9.30-47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208557" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.30-47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208558" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.30-47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208559" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.30-47 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8138</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-8138" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138" source="CVE"/>
    <description>
    NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to bypass the origin timestamp validation via a packet with an origin timestamp set to zero.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8138.html">CVE-2015-8138</cve>
<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/963002">SUSE bug 963002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/974668">SUSE bug 974668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/977446">SUSE bug 977446</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207904" comment="ntp-4.2.8p6-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207905" comment="ntp-doc-4.2.8p6-41 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-8139" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8139" source="CVE"/>
    <description>
    ntpq in NTP before 4.2.8p7 allows remote attackers to obtain origin timestamps and then impersonate peers via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8139.html">CVE-2015-8139</cve>
<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962997">SUSE bug 962997</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205679" comment="ntp-4.2.8p9-48.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205680" comment="ntp-doc-4.2.8p9-48.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8140</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-8140" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8140" source="CVE"/>
    <description>
    The ntpq protocol in NTP before 4.2.8p7 allows remote attackers to conduct replay attacks by sniffing the network.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8140.html">CVE-2015-8140</cve>
<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962994">SUSE bug 962994</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205679" comment="ntp-4.2.8p9-48.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205680" comment="ntp-doc-4.2.8p9-48.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8158</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-8158" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158" source="CVE"/>
    <description>
    The getresponse function in ntpq in NTP versions before 4.2.8p9 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (infinite loop) via crafted packets with incorrect values.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8158.html">CVE-2015-8158</cve>
<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962966">SUSE bug 962966</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207904" comment="ntp-4.2.8p6-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207905" comment="ntp-doc-4.2.8p6-41 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8213</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-8213" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8213" source="CVE"/>
    <description>
    The get_format function in utils/formats.py in Django before 1.7.x before 1.7.11, 1.8.x before 1.8.7, and 1.9.x before 1.9rc2 might allow remote attackers to obtain sensitive application secrets via a settings key in place of a date/time format setting, as demonstrated by SECRET_KEY.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8213.html">CVE-2015-8213</cve>
<bugzilla href="https://bugzilla.suse.com/955412">SUSE bug 955412</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215927" comment="python-Django-1.6.11-13 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8215</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-8215" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8215" source="CVE"/>
    <description>
    net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel before 4.0 does not validate attempted changes to the MTU value, which allows context-dependent attackers to cause a denial of service (packet loss) via a value that is (1) smaller than the minimum compliant value or (2) larger than the MTU of an interface, as demonstrated by a Router Advertisement (RA) message that is not validated by a daemon, a different vulnerability than CVE-2015-0272.  NOTE: the scope of CVE-2015-0272 is limited to the NetworkManager product.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8215.html">CVE-2015-8215</cve>
<bugzilla href="https://bugzilla.suse.com/1052256">SUSE bug 1052256</bugzilla>
<bugzilla href="https://bugzilla.suse.com/944296">SUSE bug 944296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/951638">SUSE bug 951638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/955354">SUSE bug 955354</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208637" comment="kernel-default-man-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208641" comment="kernel-pae-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208642" comment="kernel-pae-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208643" comment="kernel-pae-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8241</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8241" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8241" source="CVE"/>
    <description>
    The xmlNextChar function in libxml2 2.9.2 does not properly check the state, which allows context-dependent attackers to cause a denial of service (heap-based buffer over-read and application crash) or obtain sensitive information via crafted XML data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8241.html">CVE-2015-8241</cve>
<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/956018">SUSE bug 956018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/959469">SUSE bug 959469</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201905" comment="libxml2-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204668" comment="libxml2-32bit-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208763" comment="libxml2-doc-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204669" comment="libxml2-python-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208764" comment="libxml2-x86-2.7.6-0.34 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201905" comment="libxml2-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204668" comment="libxml2-32bit-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208763" comment="libxml2-doc-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204669" comment="libxml2-python-2.7.6-0.34 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8242</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8242" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8242" source="CVE"/>
    <description>
    The xmlSAX2TextNode function in SAX2.c in the push interface in the HTML parser in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service (stack-based buffer over-read and application crash) or obtain sensitive information via crafted XML data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8242.html">CVE-2015-8242</cve>
<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/956021">SUSE bug 956021</bugzilla>
<bugzilla href="https://bugzilla.suse.com/959469">SUSE bug 959469</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201905" comment="libxml2-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204668" comment="libxml2-32bit-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208763" comment="libxml2-doc-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204669" comment="libxml2-python-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208764" comment="libxml2-x86-2.7.6-0.34 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201905" comment="libxml2-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204668" comment="libxml2-32bit-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208763" comment="libxml2-doc-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204669" comment="libxml2-python-2.7.6-0.34 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8313</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8313" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8313" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8313.html">CVE-2015-8313</cve>
<bugzilla href="https://bugzilla.suse.com/957568">SUSE bug 957568</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201703" comment="gnutls-2.4.1-24.39.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201706" comment="libgnutls-extra26-2.4.1-24.39.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204428" comment="libgnutls26-2.4.1-24.39.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204429" comment="libgnutls26-32bit-2.4.1-24.39.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208528" comment="libgnutls26-x86-2.4.1-24.39.60 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201703" comment="gnutls-2.4.1-24.39.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201706" comment="libgnutls-extra26-2.4.1-24.39.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204428" comment="libgnutls26-2.4.1-24.39.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204429" comment="libgnutls26-32bit-2.4.1-24.39.60 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8317</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8317" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8317" source="CVE"/>
    <description>
    The xmlParseXMLDecl function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive information via an (1) unterminated encoding value or (2) incomplete XML declaration in XML data, which triggers an out-of-bounds heap read.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8317.html">CVE-2015-8317</cve>
<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/956260">SUSE bug 956260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/959469">SUSE bug 959469</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201905" comment="libxml2-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204668" comment="libxml2-32bit-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208763" comment="libxml2-doc-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204669" comment="libxml2-python-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208764" comment="libxml2-x86-2.7.6-0.34 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201905" comment="libxml2-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204668" comment="libxml2-32bit-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208763" comment="libxml2-doc-2.7.6-0.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204669" comment="libxml2-python-2.7.6-0.34 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8325</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-8325" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8325" source="CVE"/>
    <description>
    The do_setup_env function in session.c in sshd in OpenSSH through 7.2p2, when the UseLogin feature is enabled and PAM is configured to read .pam_environment files in user home directories, allows local users to gain privileges by triggering a crafted environment for the /bin/login program, as demonstrated by an LD_PRELOAD environment variable.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8325.html">CVE-2015-8325</cve>
<bugzilla href="https://bugzilla.suse.com/1016709">SUSE bug 1016709</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
<bugzilla href="https://bugzilla.suse.com/975865">SUSE bug 975865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205681" comment="openssh-6.2p2-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205682" comment="openssh-askpass-6.2p2-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205683" comment="openssh-askpass-gnome-6.2p2-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203762" comment="openssh-openssl1-6.6p1-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203763" comment="openssh-openssl1-helpers-6.6p1-15 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205681" comment="openssh-6.2p2-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205682" comment="openssh-askpass-6.2p2-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205683" comment="openssh-askpass-gnome-6.2p2-0.33 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8327</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8327" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8327" source="CVE"/>
    <description>
    Incomplete blacklist vulnerability in util.c in foomatic-rip in cups-filters 1.0.42 before 1.2.0 and in foomatic-filters in Foomatic 4.0.x allows remote attackers to execute arbitrary commands via ` (backtick) characters in a print job.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8327.html">CVE-2015-8327</cve>
<bugzilla href="https://bugzilla.suse.com/1027197">SUSE bug 1027197</bugzilla>
<bugzilla href="https://bugzilla.suse.com/957531">SUSE bug 957531</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204396" comment="foomatic-filters-3.0.2-269.39 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8339</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8339" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8339" source="CVE"/>
    <description>
    The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly hand back pages to a domain, which might allow guest OS administrators to cause a denial of service (host crash) via unspecified vectors related to domain teardown.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8339.html">CVE-2015-8339</cve>
<bugzilla href="https://bugzilla.suse.com/956408">SUSE bug 956408</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202120" comment="xen-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204950" comment="xen-doc-html-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204951" comment="xen-doc-pdf-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204952" comment="xen-kmp-default-4.2.5_18_3.0.101_0.47.71-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204953" comment="xen-kmp-pae-4.2.5_18_3.0.101_0.47.71-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204954" comment="xen-libs-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204955" comment="xen-libs-32bit-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204956" comment="xen-tools-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204957" comment="xen-tools-domU-4.2.5_18-21 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202120" comment="xen-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204950" comment="xen-doc-html-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204951" comment="xen-doc-pdf-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204952" comment="xen-kmp-default-4.2.5_18_3.0.101_0.47.71-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204954" comment="xen-libs-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204955" comment="xen-libs-32bit-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204956" comment="xen-tools-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204957" comment="xen-tools-domU-4.2.5_18-21 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8340</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8340" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8340" source="CVE"/>
    <description>
    The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly release locks, which might allow guest OS administrators to cause a denial of service (deadlock or host crash) via unspecified vectors, related to XENMEM_exchange error handling.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8340.html">CVE-2015-8340</cve>
<bugzilla href="https://bugzilla.suse.com/956408">SUSE bug 956408</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202120" comment="xen-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204950" comment="xen-doc-html-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204951" comment="xen-doc-pdf-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204952" comment="xen-kmp-default-4.2.5_18_3.0.101_0.47.71-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204953" comment="xen-kmp-pae-4.2.5_18_3.0.101_0.47.71-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204954" comment="xen-libs-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204955" comment="xen-libs-32bit-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204956" comment="xen-tools-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204957" comment="xen-tools-domU-4.2.5_18-21 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202120" comment="xen-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204950" comment="xen-doc-html-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204951" comment="xen-doc-pdf-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204952" comment="xen-kmp-default-4.2.5_18_3.0.101_0.47.71-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204954" comment="xen-libs-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204955" comment="xen-libs-32bit-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204956" comment="xen-tools-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204957" comment="xen-tools-domU-4.2.5_18-21 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8341</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8341" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8341" source="CVE"/>
    <description>
    The libxl toolstack library in Xen 4.1.x through 4.6.x does not properly release mappings of files used as kernels and initial ramdisks when managing multiple domains in the same process, which allows attackers to cause a denial of service (memory and disk consumption) by starting domains.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8341.html">CVE-2015-8341</cve>
<bugzilla href="https://bugzilla.suse.com/956409">SUSE bug 956409</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202120" comment="xen-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204950" comment="xen-doc-html-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204951" comment="xen-doc-pdf-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204952" comment="xen-kmp-default-4.2.5_18_3.0.101_0.47.71-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204953" comment="xen-kmp-pae-4.2.5_18_3.0.101_0.47.71-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204954" comment="xen-libs-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204955" comment="xen-libs-32bit-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204956" comment="xen-tools-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204957" comment="xen-tools-domU-4.2.5_18-21 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202120" comment="xen-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204950" comment="xen-doc-html-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204951" comment="xen-doc-pdf-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204952" comment="xen-kmp-default-4.2.5_18_3.0.101_0.47.71-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204954" comment="xen-libs-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204955" comment="xen-libs-32bit-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204956" comment="xen-tools-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204957" comment="xen-tools-domU-4.2.5_18-21 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8345</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8345" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345" source="CVE"/>
    <description>
    The eepro100 emulator in QEMU qemu-kvm blank allows local guest users to cause a denial of service (application crash and infinite loop) via vectors involving the command block list.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8345.html">CVE-2015-8345</cve>
<bugzilla href="https://bugzilla.suse.com/956829">SUSE bug 956829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/956832">SUSE bug 956832</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204578" comment="kvm-1.4.2-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202120" comment="xen-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204950" comment="xen-doc-html-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204951" comment="xen-doc-pdf-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204952" comment="xen-kmp-default-4.2.5_18_3.0.101_0.47.71-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204953" comment="xen-kmp-pae-4.2.5_18_3.0.101_0.47.71-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204954" comment="xen-libs-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204955" comment="xen-libs-32bit-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204956" comment="xen-tools-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204957" comment="xen-tools-domU-4.2.5_18-21 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204578" comment="kvm-1.4.2-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204955" comment="xen-libs-32bit-4.2.5_18-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209045" comment="xen-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209046" comment="xen-doc-html-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209047" comment="xen-doc-pdf-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209048" comment="xen-kmp-default-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209049" comment="xen-kmp-pae-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209050" comment="xen-libs-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209051" comment="xen-libs-32bit-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209052" comment="xen-tools-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209053" comment="xen-tools-domU-4.2.5_20-24 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8370</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8370" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8370" source="CVE"/>
    <description>
    Multiple integer underflows in Grub2 1.98 through 2.02 allow physically proximate attackers to bypass authentication, obtain sensitive information, or cause a denial of service (disk corruption) via backspace characters in the (1) grub_username_get function in grub-core/normal/auth.c or the (2) grub_password_get function in lib/crypto.c, which trigger an "Off-by-two" or "Out of bounds overwrite" memory error.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8370.html">CVE-2015-8370</cve>
<bugzilla href="https://bugzilla.suse.com/956631">SUSE bug 956631</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204432" comment="grub2-2.00-0.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204433" comment="grub2-x86_64-efi-2.00-0.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204434" comment="grub2-x86_64-xen-2.00-0.49 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8472</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8472" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8472" source="CVE"/>
    <description>
    Buffer overflow in the png_set_PLTE function in libpng before 1.0.65, 1.1.x and 1.2.x before 1.2.55, 1.3.x, 1.4.x before 1.4.18, 1.5.x before 1.5.25, and 1.6.x before 1.6.20 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8126.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8472.html">CVE-2015-8472</cve>
<bugzilla href="https://bugzilla.suse.com/954980">SUSE bug 954980</bugzilla>
<bugzilla href="https://bugzilla.suse.com/958198">SUSE bug 958198</bugzilla>
<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207704" comment="java-1_6_0-ibm-1.6.0_sr16.20-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207707" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.20-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207708" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.20-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207709" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.20-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207730" comment="java-1_7_0-ibm-1.7.0_sr9.30-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207731" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.30-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207733" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.30-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207734" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.30-45 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208546" comment="java-1_6_0-ibm-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208547" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208548" comment="java-1_6_0-ibm-devel-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208549" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208550" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208551" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208556" comment="java-1_7_0-ibm-1.7.0_sr9.30-47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208557" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.30-47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208558" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.30-47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208559" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.30-47 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8504</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8504" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504" source="CVE"/>
    <description>
    Qemu, when built with VNC display driver support, allows remote attackers to cause a denial of service (arithmetic exception and application crash) via crafted SetPixelFormat messages from a client.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8504.html">CVE-2015-8504</cve>
<bugzilla href="https://bugzilla.suse.com/958491">SUSE bug 958491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/958493">SUSE bug 958493</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209045" comment="xen-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209046" comment="xen-doc-html-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209047" comment="xen-doc-pdf-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209048" comment="xen-kmp-default-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209049" comment="xen-kmp-pae-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209050" comment="xen-libs-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209051" comment="xen-libs-32bit-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209052" comment="xen-tools-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209053" comment="xen-tools-domU-4.2.5_20-24 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8539</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-8539" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8539" source="CVE"/>
    <description>
    The KEYS subsystem in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8539.html">CVE-2015-8539</cve>
<bugzilla href="https://bugzilla.suse.com/781018">SUSE bug 781018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/958463">SUSE bug 958463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/958601">SUSE bug 958601</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208637" comment="kernel-default-man-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208641" comment="kernel-pae-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208642" comment="kernel-pae-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208643" comment="kernel-pae-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8540</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8540" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8540" source="CVE"/>
    <description>
    Integer underflow in the png_check_keyword function in pngwutil.c in libpng 0.90 through 0.99, 1.0.x before 1.0.66, 1.1.x and 1.2.x before 1.2.56, 1.3.x and 1.4.x before 1.4.19, and 1.5.x before 1.5.26 allows remote attackers to have unspecified impact via a space character as a keyword in a PNG image, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8540.html">CVE-2015-8540</cve>
<bugzilla href="https://bugzilla.suse.com/1149680">SUSE bug 1149680</bugzilla>
<bugzilla href="https://bugzilla.suse.com/958791">SUSE bug 958791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207704" comment="java-1_6_0-ibm-1.6.0_sr16.20-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207707" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.20-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207708" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.20-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207709" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.20-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207730" comment="java-1_7_0-ibm-1.7.0_sr9.30-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207731" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.30-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207733" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.30-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207734" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.30-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202855" comment="libpng12-0-1.2.31-5.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209922" comment="libpng12-0-32bit-1.2.31-5.43 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208546" comment="java-1_6_0-ibm-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208547" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208548" comment="java-1_6_0-ibm-devel-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208549" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208550" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208551" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208556" comment="java-1_7_0-ibm-1.7.0_sr9.30-47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208557" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.30-47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208558" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.30-47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208559" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.30-47 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8543</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-8543" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8543" source="CVE"/>
    <description>
    The networking implementation in the Linux kernel through 4.3.3, as used in Android and other products, does not validate protocol identifiers for certain protocol families, which allows local users to cause a denial of service (NULL function pointer dereference and system crash) or possibly gain privileges by leveraging CLONE_NEWUSER support to execute a crafted SOCK_RAW application.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8543.html">CVE-2015-8543</cve>
<bugzilla href="https://bugzilla.suse.com/1052256">SUSE bug 1052256</bugzilla>
<bugzilla href="https://bugzilla.suse.com/923755">SUSE bug 923755</bugzilla>
<bugzilla href="https://bugzilla.suse.com/958886">SUSE bug 958886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/963994">SUSE bug 963994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/969522">SUSE bug 969522</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208637" comment="kernel-default-man-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208641" comment="kernel-pae-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208642" comment="kernel-pae-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208643" comment="kernel-pae-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8550</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-8550" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550" source="CVE"/>
    <description>
    Xen, when used on a system providing PV backends, allows local guest OS administrators to cause a denial of service (host OS crash) or gain privileges by writing to memory shared between the frontend and backend, aka a double fetch vulnerability.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8550.html">CVE-2015-8550</cve>
<bugzilla href="https://bugzilla.suse.com/1052256">SUSE bug 1052256</bugzilla>
<bugzilla href="https://bugzilla.suse.com/957988">SUSE bug 957988</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208637" comment="kernel-default-man-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208641" comment="kernel-pae-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208642" comment="kernel-pae-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208643" comment="kernel-pae-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209045" comment="xen-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209046" comment="xen-doc-html-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209047" comment="xen-doc-pdf-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209048" comment="xen-kmp-default-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209049" comment="xen-kmp-pae-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209050" comment="xen-libs-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209051" comment="xen-libs-32bit-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209052" comment="xen-tools-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209053" comment="xen-tools-domU-4.2.5_20-24 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8551</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-8551" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8551" source="CVE"/>
    <description>
    The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to hit BUG conditions and cause a denial of service (NULL pointer dereference and host OS crash) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and a crafted sequence of XEN_PCI_OP_* operations, aka "Linux pciback missing sanity checks."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8551.html">CVE-2015-8551</cve>
<bugzilla href="https://bugzilla.suse.com/957990">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/990058">SUSE bug 990058</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208637" comment="kernel-default-man-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208641" comment="kernel-pae-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208642" comment="kernel-pae-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208643" comment="kernel-pae-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8552</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-8552" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8552" source="CVE"/>
    <description>
    The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka "Linux pciback missing sanity checks."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8552.html">CVE-2015-8552</cve>
<bugzilla href="https://bugzilla.suse.com/957990">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/990058">SUSE bug 990058</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208637" comment="kernel-default-man-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208641" comment="kernel-pae-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208642" comment="kernel-pae-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208643" comment="kernel-pae-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8554</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8554" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8554" source="CVE"/>
    <description>
    Buffer overflow in hw/pt-msi.c in Xen 4.6.x and earlier, when using the qemu-xen-traditional (aka qemu-dm) device model, allows local x86 HVM guest administrators to gain privileges by leveraging a system with access to a passed-through MSI-X capable physical PCI device and MSI-X table entries, related to a "write path."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8554.html">CVE-2015-8554</cve>
<bugzilla href="https://bugzilla.suse.com/958007">SUSE bug 958007</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209045" comment="xen-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209046" comment="xen-doc-html-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209047" comment="xen-doc-pdf-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209048" comment="xen-kmp-default-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209049" comment="xen-kmp-pae-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209050" comment="xen-libs-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209051" comment="xen-libs-32bit-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209052" comment="xen-tools-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209053" comment="xen-tools-domU-4.2.5_20-24 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8555</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8555" source="CVE"/>
    <description>
    Xen 4.6.x, 4.5.x, 4.4.x, 4.3.x, and earlier do not initialize x86 FPU stack and XMM registers when XSAVE/XRSTOR are not used to manage guest extended register state, which allows local guest domains to obtain sensitive information from other domains via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8555.html">CVE-2015-8555</cve>
<bugzilla href="https://bugzilla.suse.com/958009">SUSE bug 958009</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209045" comment="xen-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209046" comment="xen-doc-html-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209047" comment="xen-doc-pdf-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209048" comment="xen-kmp-default-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209049" comment="xen-kmp-pae-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209050" comment="xen-libs-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209051" comment="xen-libs-32bit-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209052" comment="xen-tools-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209053" comment="xen-tools-domU-4.2.5_20-24 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8558</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8558" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558" source="CVE"/>
    <description>
    The ehci_process_itd function in hw/usb/hcd-ehci.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular isochronous transfer descriptor (iTD) list.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8558.html">CVE-2015-8558</cve>
<bugzilla href="https://bugzilla.suse.com/959005">SUSE bug 959005</bugzilla>
<bugzilla href="https://bugzilla.suse.com/959006">SUSE bug 959006</bugzilla>
<bugzilla href="https://bugzilla.suse.com/976109">SUSE bug 976109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/976111">SUSE bug 976111</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209045" comment="xen-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209046" comment="xen-doc-html-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209047" comment="xen-doc-pdf-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209048" comment="xen-kmp-default-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209049" comment="xen-kmp-pae-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209050" comment="xen-libs-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209051" comment="xen-libs-32bit-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209052" comment="xen-tools-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209053" comment="xen-tools-domU-4.2.5_20-24 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8560</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8560" source="CVE"/>
    <description>
    Incomplete blacklist vulnerability in util.c in foomatic-rip in cups-filters 1.0.42 before 1.4.0 and in foomatic-filters in Foomatic 4.0.x allows remote attackers to execute arbitrary commands via a ; (semicolon) character in a print job, a different vulnerability than CVE-2015-8327.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8560.html">CVE-2015-8560</cve>
<bugzilla href="https://bugzilla.suse.com/1027197">SUSE bug 1027197</bugzilla>
<bugzilla href="https://bugzilla.suse.com/957531">SUSE bug 957531</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204396" comment="foomatic-filters-3.0.2-269.39 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8569</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-8569" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8569" source="CVE"/>
    <description>
    The (1) pptp_bind and (2) pptp_connect functions in drivers/net/ppp/pptp.c in the Linux kernel through 4.3.3 do not verify an address length, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8569.html">CVE-2015-8569</cve>
<bugzilla href="https://bugzilla.suse.com/923755">SUSE bug 923755</bugzilla>
<bugzilla href="https://bugzilla.suse.com/959190">SUSE bug 959190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/959399">SUSE bug 959399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/963994">SUSE bug 963994</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208637" comment="kernel-default-man-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208641" comment="kernel-pae-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208642" comment="kernel-pae-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208643" comment="kernel-pae-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8575</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-8575" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8575" source="CVE"/>
    <description>
    The sco_sock_bind function in net/bluetooth/sco.c in the Linux kernel before 4.3.4 does not verify an address length, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8575.html">CVE-2015-8575</cve>
<bugzilla href="https://bugzilla.suse.com/959190">SUSE bug 959190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/959399">SUSE bug 959399</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208637" comment="kernel-default-man-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208641" comment="kernel-pae-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208642" comment="kernel-pae-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208643" comment="kernel-pae-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8605</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8605" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8605" source="CVE"/>
    <description>
    ISC DHCP 4.x before 4.1-ESV-R12-P1, 4.2.x, and 4.3.x before 4.3.3-P1 allows remote attackers to cause a denial of service (application crash) via an invalid length field in a UDP IPv4 packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8605.html">CVE-2015-8605</cve>
<bugzilla href="https://bugzilla.suse.com/961305">SUSE bug 961305</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201622" comment="dhcp-4.2.4.P2-0.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204272" comment="dhcp-client-4.2.4.P2-0.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208457" comment="dhcp-relay-4.2.4.P2-0.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208458" comment="dhcp-server-4.2.4.P2-0.24 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8613</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8613" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613" source="CVE"/>
    <description>
    Stack-based buffer overflow in the megasas_ctrl_get_info function in QEMU, when built with SCSI MegaRAID SAS HBA emulation support, allows local guest users to cause a denial of service (QEMU instance crash) via a crafted SCSI controller CTRL_GET_INFO command.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8613.html">CVE-2015-8613</cve>
<bugzilla href="https://bugzilla.suse.com/961358">SUSE bug 961358</bugzilla>
<bugzilla href="https://bugzilla.suse.com/961556">SUSE bug 961556</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8619</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8619" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619" source="CVE"/>
    <description>
    The Human Monitor Interface support in QEMU allows remote attackers to cause a denial of service (out-of-bounds write and application crash).
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8619.html">CVE-2015-8619</cve>
<bugzilla href="https://bugzilla.suse.com/960334">SUSE bug 960334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/965269">SUSE bug 965269</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8629</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8629" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8629" source="CVE"/>
    <description>
    The xdr_nullstring function in lib/kadm5/kadm_rpc_xdr.c in kadmind in MIT Kerberos 5 (aka krb5) before 1.13.4 and 1.14.x before 1.14.1 does not verify whether '\0' characters exist as expected, which allows remote authenticated users to obtain sensitive information or cause a denial of service (out-of-bounds read) via a crafted string.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8629.html">CVE-2015-8629</cve>
<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
<bugzilla href="https://bugzilla.suse.com/963968">SUSE bug 963968</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202800" comment="krb5-1.6.3-133.49.106 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205058" comment="krb5-32bit-1.6.3-133.49.106 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209869" comment="krb5-apps-clients-1.6.3-133.49.106 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209870" comment="krb5-apps-servers-1.6.3-133.49.106 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205059" comment="krb5-client-1.6.3-133.49.106 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202803" comment="krb5-server-1.6.3-133.49.106 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8631</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8631" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8631" source="CVE"/>
    <description>
    Multiple memory leaks in kadmin/server/server_stubs.c in kadmind in MIT Kerberos 5 (aka krb5) before 1.13.4 and 1.14.x before 1.14.1 allow remote authenticated users to cause a denial of service (memory consumption) via a request specifying a NULL principal name.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8631.html">CVE-2015-8631</cve>
<bugzilla href="https://bugzilla.suse.com/963975">SUSE bug 963975</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202800" comment="krb5-1.6.3-133.49.106 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205058" comment="krb5-32bit-1.6.3-133.49.106 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209869" comment="krb5-apps-clients-1.6.3-133.49.106 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209870" comment="krb5-apps-servers-1.6.3-133.49.106 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205059" comment="krb5-client-1.6.3-133.49.106 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202803" comment="krb5-server-1.6.3-133.49.106 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8668</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8668" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8668" source="CVE"/>
    <description>
    Heap-based buffer overflow in the PackBitsPreEncode function in tif_packbits.c in bmp2tiff in libtiff 4.0.6 and earlier allows remote attackers to execute arbitrary code or cause a denial of service via a large width field in a BMP image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8668.html">CVE-2015-8668</cve>
<bugzilla href="https://bugzilla.suse.com/1014461">SUSE bug 1014461</bugzilla>
<bugzilla href="https://bugzilla.suse.com/960589">SUSE bug 960589</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009234383" comment="libtiff3-3.8.2-141.169.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234384" comment="libtiff3-32bit-3.8.2-141.169.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234338" comment="tiff-3.8.2-141.169.16 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8704</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8704" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8704" source="CVE"/>
    <description>
    apl_42.c in ISC BIND 9.x before 9.9.8-P3, 9.9.x, and 9.10.x before 9.10.3-P3 allows remote authenticated users to cause a denial of service (INSIST assertion failure and daemon exit) via a malformed Address Prefix List (APL) record.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8704.html">CVE-2015-8704</cve>
<bugzilla href="https://bugzilla.suse.com/962189">SUSE bug 962189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962190">SUSE bug 962190</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201598" comment="bind-9.9.6P1-0.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207612" comment="bind-chrootenv-9.9.6P1-0.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207613" comment="bind-doc-9.9.6P1-0.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204225" comment="bind-libs-9.9.6P1-0.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204226" comment="bind-libs-32bit-9.9.6P1-0.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204227" comment="bind-utils-9.9.6P1-0.22 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201598" comment="bind-9.9.6P1-0.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207612" comment="bind-chrootenv-9.9.6P1-0.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207613" comment="bind-doc-9.9.6P1-0.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204225" comment="bind-libs-9.9.6P1-0.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204226" comment="bind-libs-32bit-9.9.6P1-0.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208437" comment="bind-libs-x86-9.9.6P1-0.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204227" comment="bind-utils-9.9.6P1-0.22 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8710</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8710" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8710" source="CVE"/>
    <description>
    The htmlParseComment function in HTMLparser.c in libxml2 allows attackers to obtain sensitive information, cause a denial of service (out-of-bounds heap memory access and application crash), or possibly have unspecified other impact via an unclosed HTML comment.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8710.html">CVE-2015-8710</cve>
<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/960674">SUSE bug 960674</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201908" comment="libxml2-2.7.6-0.37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204670" comment="libxml2-32bit-2.7.6-0.37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208765" comment="libxml2-doc-2.7.6-0.37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204671" comment="libxml2-python-2.7.6-0.37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208766" comment="libxml2-x86-2.7.6-0.37 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201908" comment="libxml2-2.7.6-0.37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204670" comment="libxml2-32bit-2.7.6-0.37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208765" comment="libxml2-doc-2.7.6-0.37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204671" comment="libxml2-python-2.7.6-0.37 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8711</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8711" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8711" source="CVE"/>
    <description>
    epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate conversation data, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8711.html">CVE-2015-8711</cve>
<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202105" comment="wireshark-1.12.9-0.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8712</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8712" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8712" source="CVE"/>
    <description>
    The dissect_hsdsch_channel_info function in epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not validate the number of PDUs, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8712.html">CVE-2015-8712</cve>
<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202105" comment="wireshark-1.12.9-0.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8713</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8713" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8713" source="CVE"/>
    <description>
    epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not properly reserve memory for channel ID mappings, which allows remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8713.html">CVE-2015-8713</cve>
<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202105" comment="wireshark-1.12.9-0.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8714</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8714" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8714" source="CVE"/>
    <description>
    The dissect_dcom_OBJREF function in epan/dissectors/packet-dcom.c in the DCOM dissector in Wireshark 1.12.x before 1.12.9 does not initialize a certain IPv4 data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8714.html">CVE-2015-8714</cve>
<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202105" comment="wireshark-1.12.9-0.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8715</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8715" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8715" source="CVE"/>
    <description>
    epan/dissectors/packet-alljoyn.c in the AllJoyn dissector in Wireshark 1.12.x before 1.12.9 does not check for empty arguments, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8715.html">CVE-2015-8715</cve>
<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202105" comment="wireshark-1.12.9-0.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8716</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8716" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8716" source="CVE"/>
    <description>
    The init_t38_info_conv function in epan/dissectors/packet-t38.c in the T.38 dissector in Wireshark 1.12.x before 1.12.9 does not ensure that a conversation exists, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8716.html">CVE-2015-8716</cve>
<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202105" comment="wireshark-1.12.9-0.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8717</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8717" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8717" source="CVE"/>
    <description>
    The dissect_sdp function in epan/dissectors/packet-sdp.c in the SDP dissector in Wireshark 1.12.x before 1.12.9 does not prevent use of a negative media count, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8717.html">CVE-2015-8717</cve>
<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202105" comment="wireshark-1.12.9-0.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8718</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8718" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8718" source="CVE"/>
    <description>
    Double free vulnerability in epan/dissectors/packet-nlm.c in the NLM dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1, when the "Match MSG/RES packets for async NLM" option is enabled, allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8718.html">CVE-2015-8718</cve>
<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202105" comment="wireshark-1.12.9-0.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8719</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8719" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8719" source="CVE"/>
    <description>
    The dissect_dns_answer function in epan/dissectors/packet-dns.c in the DNS dissector in Wireshark 1.12.x before 1.12.9 mishandles the EDNS0 Client Subnet option, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8719.html">CVE-2015-8719</cve>
<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202105" comment="wireshark-1.12.9-0.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8720</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8720" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8720" source="CVE"/>
    <description>
    The dissect_ber_GeneralizedTime function in epan/dissectors/packet-ber.c in the BER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly checks an sscanf return value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8720.html">CVE-2015-8720</cve>
<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202105" comment="wireshark-1.12.9-0.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8721</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8721" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8721" source="CVE"/>
    <description>
    Buffer overflow in the tvb_uncompress function in epan/tvbuff_zlib.c in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet with zlib compression.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8721.html">CVE-2015-8721</cve>
<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202105" comment="wireshark-1.12.9-0.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8722</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8722" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8722" source="CVE"/>
    <description>
    epan/dissectors/packet-sctp.c in the SCTP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the frame pointer, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8722.html">CVE-2015-8722</cve>
<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202105" comment="wireshark-1.12.9-0.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8723</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8723" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8723" source="CVE"/>
    <description>
    The AirPDcapPacketProcess function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationship between the total length and the capture length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8723.html">CVE-2015-8723</cve>
<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202105" comment="wireshark-1.12.9-0.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8724</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8724" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8724" source="CVE"/>
    <description>
    The AirPDcapDecryptWPABroadcastKey function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not verify the WPA broadcast key length, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8724.html">CVE-2015-8724</cve>
<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202105" comment="wireshark-1.12.9-0.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8725</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8725" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8725" source="CVE"/>
    <description>
    The dissect_diameter_base_framed_ipv6_prefix function in epan/dissectors/packet-diameter.c in the DIAMETER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the IPv6 prefix length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8725.html">CVE-2015-8725</cve>
<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202105" comment="wireshark-1.12.9-0.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8726</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8726" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8726" source="CVE"/>
    <description>
    wiretap/vwr.c in the VeriWave file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate certain signature and Modulation and Coding Scheme (MCS) data, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8726.html">CVE-2015-8726</cve>
<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202105" comment="wireshark-1.12.9-0.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8727</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8727" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8727" source="CVE"/>
    <description>
    The dissect_rsvp_common function in epan/dissectors/packet-rsvp.c in the RSVP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not properly maintain request-key data, which allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8727.html">CVE-2015-8727</cve>
<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202105" comment="wireshark-1.12.9-0.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8728</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8728" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8728" source="CVE"/>
    <description>
    The Mobile Identity parser in (1) epan/dissectors/packet-ansi_a.c in the ANSI A dissector and (2) epan/dissectors/packet-gsm_a_common.c in the GSM A dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly uses the tvb_bcd_dig_to_wmem_packet_str function, which allows remote attackers to cause a denial of service (buffer overflow and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8728.html">CVE-2015-8728</cve>
<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202105" comment="wireshark-1.12.9-0.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8729</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8729" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8729" source="CVE"/>
    <description>
    The ascend_seek function in wiretap/ascendtext.c in the Ascend file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not ensure the presence of a '\0' character at the end of a date string, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8729.html">CVE-2015-8729</cve>
<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202105" comment="wireshark-1.12.9-0.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8730</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8730" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8730" source="CVE"/>
    <description>
    epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the number of items, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8730.html">CVE-2015-8730</cve>
<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202105" comment="wireshark-1.12.9-0.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8731</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8731" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8731" source="CVE"/>
    <description>
    The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not reject unknown TLV types, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8731.html">CVE-2015-8731</cve>
<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202105" comment="wireshark-1.12.9-0.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8732</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8732" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8732" source="CVE"/>
    <description>
    The dissect_zcl_pwr_prof_pwrprofstatersp function in epan/dissectors/packet-zbee-zcl-general.c in the ZigBee ZCL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the Total Profile Number field, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8732.html">CVE-2015-8732</cve>
<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202105" comment="wireshark-1.12.9-0.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8733</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8733" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8733" source="CVE"/>
    <description>
    The ngsniffer_process_record function in wiretap/ngsniffer.c in the Sniffer file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationships between record lengths and record header lengths, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8733.html">CVE-2015-8733</cve>
<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202105" comment="wireshark-1.12.9-0.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8743</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8743" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743" source="CVE"/>
    <description>
    QEMU (aka Quick Emulator) built with the NE2000 device emulation support is vulnerable to an OOB r/w access issue. It could occur while performing 'ioport' r/w operations. A privileged (CAP_SYS_RAWIO) user/process could use this flaw to leak or corrupt QEMU memory bytes.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8743.html">CVE-2015-8743</cve>
<bugzilla href="https://bugzilla.suse.com/960725">SUSE bug 960725</bugzilla>
<bugzilla href="https://bugzilla.suse.com/960726">SUSE bug 960726</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209045" comment="xen-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209046" comment="xen-doc-html-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209047" comment="xen-doc-pdf-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209048" comment="xen-kmp-default-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209049" comment="xen-kmp-pae-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209050" comment="xen-libs-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209051" comment="xen-libs-32bit-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209052" comment="xen-tools-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209053" comment="xen-tools-domU-4.2.5_20-24 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
    </affected>
    <reference ref_id="CVE-2015-8745" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745" source="CVE"/>
    <description>
    QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It could occur while reading Interrupt Mask Registers (IMR). A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulting in DoS.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8745.html">CVE-2015-8745</cve>
<bugzilla href="https://bugzilla.suse.com/960707">SUSE bug 960707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/960708">SUSE bug 960708</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209045" comment="xen-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209046" comment="xen-doc-html-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209047" comment="xen-doc-pdf-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209048" comment="xen-kmp-default-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209049" comment="xen-kmp-pae-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209050" comment="xen-libs-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209051" comment="xen-libs-32bit-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209052" comment="xen-tools-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209053" comment="xen-tools-domU-4.2.5_20-24 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8767</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-8767" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8767" source="CVE"/>
    <description>
    net/sctp/sm_sideeffect.c in the Linux kernel before 4.3 does not properly manage the relationship between a lock and a socket, which allows local users to cause a denial of service (deadlock) via a crafted sctp_accept call.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8767.html">CVE-2015-8767</cve>
<bugzilla href="https://bugzilla.suse.com/961509">SUSE bug 961509</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208637" comment="kernel-default-man-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208641" comment="kernel-pae-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208642" comment="kernel-pae-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208643" comment="kernel-pae-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8776</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8776" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776" source="CVE"/>
    <description>
    The strftime function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly obtain sensitive information via an out-of-range time value.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8776.html">CVE-2015-8776</cve>
<bugzilla href="https://bugzilla.suse.com/962736">SUSE bug 962736</bugzilla>
<bugzilla href="https://bugzilla.suse.com/986086">SUSE bug 986086</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201693" comment="glibc-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204416" comment="glibc-32bit-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204417" comment="glibc-devel-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204418" comment="glibc-devel-32bit-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201694" comment="glibc-html-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204419" comment="glibc-i18ndata-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201695" comment="glibc-info-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204420" comment="glibc-locale-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204421" comment="glibc-locale-32bit-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208509" comment="glibc-locale-x86-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208510" comment="glibc-profile-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208511" comment="glibc-profile-32bit-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208512" comment="glibc-profile-x86-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208513" comment="glibc-x86-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204422" comment="nscd-2.11.3-17.95 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201693" comment="glibc-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204416" comment="glibc-32bit-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204417" comment="glibc-devel-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204418" comment="glibc-devel-32bit-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201694" comment="glibc-html-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204419" comment="glibc-i18ndata-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201695" comment="glibc-info-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204420" comment="glibc-locale-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204421" comment="glibc-locale-32bit-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208510" comment="glibc-profile-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208511" comment="glibc-profile-32bit-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204422" comment="nscd-2.11.3-17.95 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8777</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8777" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777" source="CVE"/>
    <description>
    The process_envvars function in elf/rtld.c in the GNU C Library (aka glibc or libc6) before 2.23 allows local users to bypass a pointer-guarding protection mechanism via a zero value of the LD_POINTER_GUARD environment variable.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8777.html">CVE-2015-8777</cve>
<bugzilla href="https://bugzilla.suse.com/950944">SUSE bug 950944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962735">SUSE bug 962735</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201693" comment="glibc-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204416" comment="glibc-32bit-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204417" comment="glibc-devel-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204418" comment="glibc-devel-32bit-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201694" comment="glibc-html-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204419" comment="glibc-i18ndata-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201695" comment="glibc-info-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204420" comment="glibc-locale-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204421" comment="glibc-locale-32bit-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208509" comment="glibc-locale-x86-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208510" comment="glibc-profile-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208511" comment="glibc-profile-32bit-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208512" comment="glibc-profile-x86-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208513" comment="glibc-x86-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204422" comment="nscd-2.11.3-17.95 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201693" comment="glibc-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204416" comment="glibc-32bit-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204417" comment="glibc-devel-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204418" comment="glibc-devel-32bit-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201694" comment="glibc-html-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204419" comment="glibc-i18ndata-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201695" comment="glibc-info-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204420" comment="glibc-locale-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204421" comment="glibc-locale-32bit-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208510" comment="glibc-profile-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208511" comment="glibc-profile-32bit-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204422" comment="nscd-2.11.3-17.95 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8778</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8778" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778" source="CVE"/>
    <description>
    Integer overflow in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via the size argument to the __hcreate_r function, which triggers out-of-bounds heap-memory access.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8778.html">CVE-2015-8778</cve>
<bugzilla href="https://bugzilla.suse.com/962737">SUSE bug 962737</bugzilla>
<bugzilla href="https://bugzilla.suse.com/986086">SUSE bug 986086</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201693" comment="glibc-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204416" comment="glibc-32bit-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204417" comment="glibc-devel-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204418" comment="glibc-devel-32bit-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201694" comment="glibc-html-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204419" comment="glibc-i18ndata-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201695" comment="glibc-info-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204420" comment="glibc-locale-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204421" comment="glibc-locale-32bit-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208509" comment="glibc-locale-x86-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208510" comment="glibc-profile-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208511" comment="glibc-profile-32bit-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208512" comment="glibc-profile-x86-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208513" comment="glibc-x86-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204422" comment="nscd-2.11.3-17.95 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201693" comment="glibc-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204416" comment="glibc-32bit-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204417" comment="glibc-devel-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204418" comment="glibc-devel-32bit-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201694" comment="glibc-html-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204419" comment="glibc-i18ndata-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201695" comment="glibc-info-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204420" comment="glibc-locale-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204421" comment="glibc-locale-32bit-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208510" comment="glibc-profile-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208511" comment="glibc-profile-32bit-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204422" comment="nscd-2.11.3-17.95 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8779</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8779" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779" source="CVE"/>
    <description>
    Stack-based buffer overflow in the catopen function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long catalog name.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8779.html">CVE-2015-8779</cve>
<bugzilla href="https://bugzilla.suse.com/962739">SUSE bug 962739</bugzilla>
<bugzilla href="https://bugzilla.suse.com/965453">SUSE bug 965453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/986086">SUSE bug 986086</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201693" comment="glibc-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204416" comment="glibc-32bit-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204417" comment="glibc-devel-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204418" comment="glibc-devel-32bit-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201694" comment="glibc-html-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204419" comment="glibc-i18ndata-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201695" comment="glibc-info-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204420" comment="glibc-locale-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204421" comment="glibc-locale-32bit-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208509" comment="glibc-locale-x86-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208510" comment="glibc-profile-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208511" comment="glibc-profile-32bit-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208512" comment="glibc-profile-x86-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208513" comment="glibc-x86-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204422" comment="nscd-2.11.3-17.95 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201693" comment="glibc-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204416" comment="glibc-32bit-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204417" comment="glibc-devel-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204418" comment="glibc-devel-32bit-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201694" comment="glibc-html-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204419" comment="glibc-i18ndata-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201695" comment="glibc-info-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204420" comment="glibc-locale-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204421" comment="glibc-locale-32bit-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208510" comment="glibc-profile-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208511" comment="glibc-profile-32bit-2.11.3-17.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204422" comment="nscd-2.11.3-17.95 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8781</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8781" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8781" source="CVE"/>
    <description>
    tif_luv.c in libtiff allows attackers to cause a denial of service (out-of-bounds write) via an invalid number of samples per pixel in a LogL compressed TIFF image, a different vulnerability than CVE-2015-8782.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8781.html">CVE-2015-8781</cve>
<bugzilla href="https://bugzilla.suse.com/964213">SUSE bug 964213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/964225">SUSE bug 964225</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205102" comment="libtiff3-3.8.2-141.163 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205103" comment="libtiff3-32bit-3.8.2-141.163 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203570" comment="tiff-3.8.2-141.163 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8782</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8782" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8782" source="CVE"/>
    <description>
    tif_luv.c in libtiff allows attackers to cause a denial of service (out-of-bounds writes) via a crafted TIFF image, a different vulnerability than CVE-2015-8781.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8782.html">CVE-2015-8782</cve>
<bugzilla href="https://bugzilla.suse.com/964213">SUSE bug 964213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/964225">SUSE bug 964225</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205102" comment="libtiff3-3.8.2-141.163 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205103" comment="libtiff3-32bit-3.8.2-141.163 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203570" comment="tiff-3.8.2-141.163 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8783</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8783" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8783" source="CVE"/>
    <description>
    tif_luv.c in libtiff allows attackers to cause a denial of service (out-of-bounds reads) via a crafted TIFF image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8783.html">CVE-2015-8783</cve>
<bugzilla href="https://bugzilla.suse.com/964213">SUSE bug 964213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/964225">SUSE bug 964225</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205102" comment="libtiff3-3.8.2-141.163 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205103" comment="libtiff3-32bit-3.8.2-141.163 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203570" comment="tiff-3.8.2-141.163 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8785</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-8785" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8785" source="CVE"/>
    <description>
    The fuse_fill_write_pages function in fs/fuse/file.c in the Linux kernel before 4.4 allows local users to cause a denial of service (infinite loop) via a writev system call that triggers a zero length for the first segment of an iov.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8785.html">CVE-2015-8785</cve>
<bugzilla href="https://bugzilla.suse.com/963765">SUSE bug 963765</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208637" comment="kernel-default-man-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208641" comment="kernel-pae-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208642" comment="kernel-pae-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208643" comment="kernel-pae-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-8806" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8806" source="CVE"/>
    <description>
    dict.c in libxml2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via an unexpected character immediately after the "&lt;!DOCTYPE html" substring in a crafted HTML document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8806.html">CVE-2015-8806</cve>
<bugzilla href="https://bugzilla.suse.com/963963">SUSE bug 963963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/965283">SUSE bug 965283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/981114">SUSE bug 981114</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203092" comment="libxml2-2.7.6-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207874" comment="libxml2-32bit-2.7.6-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207875" comment="libxml2-doc-2.7.6-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207876" comment="libxml2-python-2.7.6-0.44 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8812</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-8812" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8812" source="CVE"/>
    <description>
    drivers/infiniband/hw/cxgb3/iwch_cm.c in the Linux kernel before 4.5 does not properly identify error conditions, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via crafted packets.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8812.html">CVE-2015-8812</cve>
<bugzilla href="https://bugzilla.suse.com/966437">SUSE bug 966437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/966683">SUSE bug 966683</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208637" comment="kernel-default-man-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208641" comment="kernel-pae-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208642" comment="kernel-pae-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208643" comment="kernel-pae-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8816</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-8816" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8816" source="CVE"/>
    <description>
    The hub_activate function in drivers/usb/core/hub.c in the Linux kernel before 4.3.5 does not properly maintain a hub-interface data structure, which allows physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8816.html">CVE-2015-8816</cve>
<bugzilla href="https://bugzilla.suse.com/968010">SUSE bug 968010</bugzilla>
<bugzilla href="https://bugzilla.suse.com/979064">SUSE bug 979064</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208637" comment="kernel-default-man-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208641" comment="kernel-pae-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208642" comment="kernel-pae-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208643" comment="kernel-pae-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-8835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8835" source="CVE"/>
    <description>
    The make_http_soap_request function in ext/soap/php_http.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 does not properly retrieve keys, which allows remote attackers to cause a denial of service (NULL pointer dereference, type confusion, and application crash) or possibly execute arbitrary code via crafted serialized data representing a numerically indexed _cookies array, related to the SoapClient::__call method in ext/soap/soap.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8835.html">CVE-2015-8835</cve>
<bugzilla href="https://bugzilla.suse.com/973351">SUSE bug 973351</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208897" comment="apache2-mod_php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203264" comment="php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208898" comment="php53-bcmath-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208899" comment="php53-bz2-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208900" comment="php53-calendar-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208901" comment="php53-ctype-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208902" comment="php53-curl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208903" comment="php53-dba-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208904" comment="php53-dom-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208905" comment="php53-exif-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208906" comment="php53-fastcgi-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208907" comment="php53-fileinfo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208908" comment="php53-ftp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208909" comment="php53-gd-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208910" comment="php53-gettext-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208911" comment="php53-gmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208912" comment="php53-iconv-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208913" comment="php53-intl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208914" comment="php53-json-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208915" comment="php53-ldap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208916" comment="php53-mbstring-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208917" comment="php53-mcrypt-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208918" comment="php53-mysql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208919" comment="php53-odbc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208920" comment="php53-openssl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208921" comment="php53-pcntl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208922" comment="php53-pdo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208923" comment="php53-pear-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208924" comment="php53-pgsql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208925" comment="php53-pspell-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208926" comment="php53-shmop-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208927" comment="php53-snmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208928" comment="php53-soap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208929" comment="php53-suhosin-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208930" comment="php53-sysvmsg-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208931" comment="php53-sysvsem-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208932" comment="php53-sysvshm-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208933" comment="php53-tokenizer-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208934" comment="php53-wddx-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208935" comment="php53-xmlreader-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208936" comment="php53-xmlrpc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208937" comment="php53-xmlwriter-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208938" comment="php53-xsl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208939" comment="php53-zip-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208940" comment="php53-zlib-5.3.17-71 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8838</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-8838" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8838" source="CVE"/>
    <description>
    ext/mysqlnd/mysqlnd.c in PHP before 5.4.43, 5.5.x before 5.5.27, and 5.6.x before 5.6.11 uses a client SSL option to mean that SSL is optional, which allows man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, a related issue to CVE-2015-3152.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8838.html">CVE-2015-8838</cve>
<bugzilla href="https://bugzilla.suse.com/973792">SUSE bug 973792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208897" comment="apache2-mod_php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203264" comment="php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208898" comment="php53-bcmath-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208899" comment="php53-bz2-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208900" comment="php53-calendar-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208901" comment="php53-ctype-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208902" comment="php53-curl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208903" comment="php53-dba-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208904" comment="php53-dom-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208905" comment="php53-exif-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208906" comment="php53-fastcgi-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208907" comment="php53-fileinfo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208908" comment="php53-ftp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208909" comment="php53-gd-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208910" comment="php53-gettext-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208911" comment="php53-gmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208912" comment="php53-iconv-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208913" comment="php53-intl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208914" comment="php53-json-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208915" comment="php53-ldap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208916" comment="php53-mbstring-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208917" comment="php53-mcrypt-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208918" comment="php53-mysql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208919" comment="php53-odbc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208920" comment="php53-openssl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208921" comment="php53-pcntl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208922" comment="php53-pdo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208923" comment="php53-pear-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208924" comment="php53-pgsql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208925" comment="php53-pspell-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208926" comment="php53-shmop-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208927" comment="php53-snmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208928" comment="php53-soap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208929" comment="php53-suhosin-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208930" comment="php53-sysvmsg-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208931" comment="php53-sysvsem-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208932" comment="php53-sysvshm-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208933" comment="php53-tokenizer-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208934" comment="php53-wddx-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208935" comment="php53-xmlreader-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208936" comment="php53-xmlrpc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208937" comment="php53-xmlwriter-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208938" comment="php53-xsl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208939" comment="php53-zip-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208940" comment="php53-zlib-5.3.17-71 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8853</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8853" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8853" source="CVE"/>
    <description>
    The (1) S_reghop3, (2) S_reghop4, and (3) S_reghopmaybe3 functions in regexec.c in Perl before 5.24.0 allow context-dependent attackers to cause a denial of service (infinite loop) via crafted utf-8 data, as demonstrated by "a\x80."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8853.html">CVE-2015-8853</cve>
<bugzilla href="https://bugzilla.suse.com/976584">SUSE bug 976584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/997948">SUSE bug 997948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/997950">SUSE bug 997950</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203238" comment="perl-5.10.0-64.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210162" comment="perl-32bit-5.10.0-64.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210163" comment="perl-Module-Build-0.2808.01-0.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210164" comment="perl-Test-Simple-0.72-0.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210165" comment="perl-base-5.10.0-64.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210166" comment="perl-doc-5.10.0-64.80 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8866</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-8866" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8866" source="CVE"/>
    <description>
    ext/libxml/libxml.c in PHP before 5.5.22 and 5.6.x before 5.6.6, when PHP-FPM is used, does not isolate each thread from libxml_disable_entity_loader changes in other threads, which allows remote attackers to conduct XML External Entity (XXE) and XML Entity Expansion (XEE) attacks via a crafted XML document, a related issue to CVE-2015-5161.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8866.html">CVE-2015-8866</cve>
<bugzilla href="https://bugzilla.suse.com/976996">SUSE bug 976996</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208897" comment="apache2-mod_php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203264" comment="php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208898" comment="php53-bcmath-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208899" comment="php53-bz2-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208900" comment="php53-calendar-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208901" comment="php53-ctype-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208902" comment="php53-curl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208903" comment="php53-dba-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208904" comment="php53-dom-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208905" comment="php53-exif-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208906" comment="php53-fastcgi-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208907" comment="php53-fileinfo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208908" comment="php53-ftp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208909" comment="php53-gd-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208910" comment="php53-gettext-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208911" comment="php53-gmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208912" comment="php53-iconv-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208913" comment="php53-intl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208914" comment="php53-json-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208915" comment="php53-ldap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208916" comment="php53-mbstring-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208917" comment="php53-mcrypt-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208918" comment="php53-mysql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208919" comment="php53-odbc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208920" comment="php53-openssl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208921" comment="php53-pcntl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208922" comment="php53-pdo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208923" comment="php53-pear-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208924" comment="php53-pgsql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208925" comment="php53-pspell-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208926" comment="php53-shmop-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208927" comment="php53-snmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208928" comment="php53-soap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208929" comment="php53-suhosin-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208930" comment="php53-sysvmsg-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208931" comment="php53-sysvsem-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208932" comment="php53-sysvshm-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208933" comment="php53-tokenizer-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208934" comment="php53-wddx-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208935" comment="php53-xmlreader-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208936" comment="php53-xmlrpc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208937" comment="php53-xmlwriter-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208938" comment="php53-xsl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208939" comment="php53-zip-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208940" comment="php53-zlib-5.3.17-71 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8867</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-8867" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8867" source="CVE"/>
    <description>
    The openssl_random_pseudo_bytes function in ext/openssl/openssl.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 incorrectly relies on the deprecated RAND_pseudo_bytes function, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8867.html">CVE-2015-8867</cve>
<bugzilla href="https://bugzilla.suse.com/977005">SUSE bug 977005</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208897" comment="apache2-mod_php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203264" comment="php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208898" comment="php53-bcmath-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208899" comment="php53-bz2-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208900" comment="php53-calendar-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208901" comment="php53-ctype-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208902" comment="php53-curl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208903" comment="php53-dba-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208904" comment="php53-dom-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208905" comment="php53-exif-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208906" comment="php53-fastcgi-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208907" comment="php53-fileinfo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208908" comment="php53-ftp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208909" comment="php53-gd-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208910" comment="php53-gettext-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208911" comment="php53-gmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208912" comment="php53-iconv-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208913" comment="php53-intl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208914" comment="php53-json-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208915" comment="php53-ldap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208916" comment="php53-mbstring-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208917" comment="php53-mcrypt-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208918" comment="php53-mysql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208919" comment="php53-odbc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208920" comment="php53-openssl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208921" comment="php53-pcntl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208922" comment="php53-pdo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208923" comment="php53-pear-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208924" comment="php53-pgsql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208925" comment="php53-pspell-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208926" comment="php53-shmop-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208927" comment="php53-snmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208928" comment="php53-soap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208929" comment="php53-suhosin-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208930" comment="php53-sysvmsg-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208931" comment="php53-sysvsem-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208932" comment="php53-sysvshm-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208933" comment="php53-tokenizer-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208934" comment="php53-wddx-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208935" comment="php53-xmlreader-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208936" comment="php53-xmlrpc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208937" comment="php53-xmlwriter-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208938" comment="php53-xsl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208939" comment="php53-zip-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208940" comment="php53-zlib-5.3.17-71 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8868</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8868" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8868" source="CVE"/>
    <description>
    Heap-based buffer overflow in the ExponentialFunction::ExponentialFunction function in Poppler before 0.40.0 allows remote attackers to cause a denial of service (memory corruption and crash) or possibly execute arbitrary code via an invalid blend mode in the ExtGState dictionary in a crafted PDF document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8868.html">CVE-2015-8868</cve>
<bugzilla href="https://bugzilla.suse.com/976844">SUSE bug 976844</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210622" comment="libpoppler-glib4-0.12.3-1.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210623" comment="libpoppler-qt4-3-0.12.3-1.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210624" comment="libpoppler5-0.12.3-1.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203380" comment="poppler-0.12.3-1.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203381" comment="poppler-tools-0.12.3-1.12 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8870</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8870" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8870" source="CVE"/>
    <description>
    Integer overflow in tools/bmp2tiff.c in LibTIFF before 4.0.4 allows remote attackers to cause a denial of service (heap-based buffer over-read), or possibly obtain sensitive information from process memory, via crafted width and length values in RLE4 or RLE8 data in a BMP file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8870.html">CVE-2015-8870</cve>
<bugzilla href="https://bugzilla.suse.com/1014461">SUSE bug 1014461</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1150480">SUSE bug 1150480</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009240660" comment="libtiff3-3.8.2-141.169.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240661" comment="libtiff3-32bit-3.8.2-141.169.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240659" comment="tiff-3.8.2-141.169.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8872</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8872" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8872" source="CVE"/>
    <description>
    The set_fat function in fat.c in dosfstools before 4.0 might allow attackers to corrupt a FAT12 filesystem or cause a denial of service (invalid memory read and crash) by writing an odd number of clusters to the third to last entry on a FAT12 filesystem, which triggers an "off-by-two error."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8872.html">CVE-2015-8872</cve>
<bugzilla href="https://bugzilla.suse.com/980364">SUSE bug 980364</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249922" comment="dosfstools-2.11-121.31.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8873</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-8873" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8873" source="CVE"/>
    <description>
    Stack consumption vulnerability in Zend/zend_exceptions.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allows remote attackers to cause a denial of service (segmentation fault) via recursive method calls.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8873.html">CVE-2015-8873</cve>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980373">SUSE bug 980373</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208897" comment="apache2-mod_php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203264" comment="php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208898" comment="php53-bcmath-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208899" comment="php53-bz2-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208900" comment="php53-calendar-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208901" comment="php53-ctype-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208902" comment="php53-curl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208903" comment="php53-dba-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208904" comment="php53-dom-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208905" comment="php53-exif-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208906" comment="php53-fastcgi-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208907" comment="php53-fileinfo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208908" comment="php53-ftp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208909" comment="php53-gd-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208910" comment="php53-gettext-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208911" comment="php53-gmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208912" comment="php53-iconv-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208913" comment="php53-intl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208914" comment="php53-json-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208915" comment="php53-ldap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208916" comment="php53-mbstring-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208917" comment="php53-mcrypt-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208918" comment="php53-mysql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208919" comment="php53-odbc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208920" comment="php53-openssl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208921" comment="php53-pcntl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208922" comment="php53-pdo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208923" comment="php53-pear-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208924" comment="php53-pgsql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208925" comment="php53-pspell-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208926" comment="php53-shmop-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208927" comment="php53-snmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208928" comment="php53-soap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208929" comment="php53-suhosin-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208930" comment="php53-sysvmsg-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208931" comment="php53-sysvsem-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208932" comment="php53-sysvshm-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208933" comment="php53-tokenizer-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208934" comment="php53-wddx-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208935" comment="php53-xmlreader-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208936" comment="php53-xmlrpc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208937" comment="php53-xmlwriter-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208938" comment="php53-xsl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208939" comment="php53-zip-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208940" comment="php53-zlib-5.3.17-71 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8874</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-8874" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8874" source="CVE"/>
    <description>
    Stack consumption vulnerability in GD in PHP before 5.6.12 allows remote attackers to cause a denial of service via a crafted imagefilltoborder call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8874.html">CVE-2015-8874</cve>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980375">SUSE bug 980375</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208897" comment="apache2-mod_php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203264" comment="php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208898" comment="php53-bcmath-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208899" comment="php53-bz2-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208900" comment="php53-calendar-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208901" comment="php53-ctype-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208902" comment="php53-curl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208903" comment="php53-dba-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208904" comment="php53-dom-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208905" comment="php53-exif-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208906" comment="php53-fastcgi-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208907" comment="php53-fileinfo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208908" comment="php53-ftp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208909" comment="php53-gd-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208910" comment="php53-gettext-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208911" comment="php53-gmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208912" comment="php53-iconv-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208913" comment="php53-intl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208914" comment="php53-json-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208915" comment="php53-ldap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208916" comment="php53-mbstring-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208917" comment="php53-mcrypt-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208918" comment="php53-mysql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208919" comment="php53-odbc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208920" comment="php53-openssl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208921" comment="php53-pcntl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208922" comment="php53-pdo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208923" comment="php53-pear-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208924" comment="php53-pgsql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208925" comment="php53-pspell-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208926" comment="php53-shmop-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208927" comment="php53-snmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208928" comment="php53-soap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208929" comment="php53-suhosin-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208930" comment="php53-sysvmsg-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208931" comment="php53-sysvsem-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208932" comment="php53-sysvshm-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208933" comment="php53-tokenizer-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208934" comment="php53-wddx-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208935" comment="php53-xmlreader-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208936" comment="php53-xmlrpc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208937" comment="php53-xmlwriter-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208938" comment="php53-xsl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208939" comment="php53-zip-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208940" comment="php53-zlib-5.3.17-71 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8879</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-8879" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8879" source="CVE"/>
    <description>
    The odbc_bindcols function in ext/odbc/php_odbc.c in PHP before 5.6.12 mishandles driver behavior for SQL_WVARCHAR columns, which allows remote attackers to cause a denial of service (application crash) in opportunistic circumstances by leveraging use of the odbc_fetch_array function to access a certain type of Microsoft SQL Server table.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8879.html">CVE-2015-8879</cve>
<bugzilla href="https://bugzilla.suse.com/981050">SUSE bug 981050</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208897" comment="apache2-mod_php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203264" comment="php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208898" comment="php53-bcmath-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208899" comment="php53-bz2-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208900" comment="php53-calendar-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208901" comment="php53-ctype-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208902" comment="php53-curl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208903" comment="php53-dba-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208904" comment="php53-dom-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208905" comment="php53-exif-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208906" comment="php53-fastcgi-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208907" comment="php53-fileinfo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208908" comment="php53-ftp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208909" comment="php53-gd-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208910" comment="php53-gettext-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208911" comment="php53-gmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208912" comment="php53-iconv-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208913" comment="php53-intl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208914" comment="php53-json-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208915" comment="php53-ldap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208916" comment="php53-mbstring-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208917" comment="php53-mcrypt-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208918" comment="php53-mysql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208919" comment="php53-odbc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208920" comment="php53-openssl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208921" comment="php53-pcntl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208922" comment="php53-pdo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208923" comment="php53-pear-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208924" comment="php53-pgsql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208925" comment="php53-pspell-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208926" comment="php53-shmop-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208927" comment="php53-snmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208928" comment="php53-soap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208929" comment="php53-suhosin-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208930" comment="php53-sysvmsg-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208931" comment="php53-sysvsem-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208932" comment="php53-sysvshm-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208933" comment="php53-tokenizer-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208934" comment="php53-wddx-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208935" comment="php53-xmlreader-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208936" comment="php53-xmlrpc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208937" comment="php53-xmlwriter-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208938" comment="php53-xsl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208939" comment="php53-zip-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208940" comment="php53-zlib-5.3.17-71 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8894</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8894" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8894" source="CVE"/>
    <description>
    Double free vulnerability in coders/tga.c in ImageMagick 7.0.0 and later allows remote attackers to cause a denial of service (application crash) via a crafted tga file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8894.html">CVE-2015-8894</cve>
<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/983523">SUSE bug 983523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/983533">SUSE bug 983533</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8896</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8896" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8896" source="CVE"/>
    <description>
    Integer truncation issue in coders/pict.c in ImageMagick before 7.0.5-0 allows remote attackers to cause a denial of service (application crash) via a crafted .pict file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8896.html">CVE-2015-8896</cve>
<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/983533">SUSE bug 983533</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8897</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8897" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8897" source="CVE"/>
    <description>
    The SpliceImage function in MagickCore/transform.c in ImageMagick before 6.9.2-4 allows remote attackers to cause a denial of service (application crash) via a crafted png file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8897.html">CVE-2015-8897</cve>
<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/983739">SUSE bug 983739</bugzilla>
<bugzilla href="https://bugzilla.suse.com/983746">SUSE bug 983746</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8898</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8898" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8898" source="CVE"/>
    <description>
    The WriteImages function in magick/constitute.c in ImageMagick before 6.9.2-4 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted image file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8898.html">CVE-2015-8898</cve>
<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/983739">SUSE bug 983739</bugzilla>
<bugzilla href="https://bugzilla.suse.com/983746">SUSE bug 983746</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8899</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8899" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8899" source="CVE"/>
    <description>
    Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash) via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8899.html">CVE-2015-8899</cve>
<bugzilla href="https://bugzilla.suse.com/983273">SUSE bug 983273</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205320" comment="dnsmasq-2.78-0.16.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8901</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8901" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8901" source="CVE"/>
    <description>
    ImageMagick 6.x before 6.9.0-5 Beta allows remote attackers to cause a denial of service (infinite loop) via a crafted MIFF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8901.html">CVE-2015-8901</cve>
<bugzilla href="https://bugzilla.suse.com/983234">SUSE bug 983234</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8902</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8902" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8902" source="CVE"/>
    <description>
    The ReadBlobByte function in coders/pdb.c in ImageMagick 6.x before 6.9.0-5 Beta allows remote attackers to cause a denial of service (infinite loop) via a crafted PDB file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8902.html">CVE-2015-8902</cve>
<bugzilla href="https://bugzilla.suse.com/1052711">SUSE bug 1052711</bugzilla>
<bugzilla href="https://bugzilla.suse.com/983253">SUSE bug 983253</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8903</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8903" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8903" source="CVE"/>
    <description>
    The ReadVICARImage function in coders/vicar.c in ImageMagick 6.x before 6.9.0-5 Beta allows remote attackers to cause a denial of service (infinite loop) via a crafted VICAR file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8903.html">CVE-2015-8903</cve>
<bugzilla href="https://bugzilla.suse.com/983259">SUSE bug 983259</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8918</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-8918" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8918" source="CVE"/>
    <description>
    The archive_string_append function in archive_string.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (crash) via a crafted cab files, related to "overlapping memcpy."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8918.html">CVE-2015-8918</cve>
<bugzilla href="https://bugzilla.suse.com/985698">SUSE bug 985698</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202461" comment="bsdtar-2.5.5-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205311" comment="libarchive2-2.5.5-9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8920</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-8920" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8920" source="CVE"/>
    <description>
    The _ar_read_header function in archive_read_support_format_ar.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (out-of-bounds stack read) via a crafted ar file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8920.html">CVE-2015-8920</cve>
<bugzilla href="https://bugzilla.suse.com/985675">SUSE bug 985675</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202461" comment="bsdtar-2.5.5-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205311" comment="libarchive2-2.5.5-9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8921</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-8921" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8921" source="CVE"/>
    <description>
    The ae_strtofflags function in archive_entry.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted mtree file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8921.html">CVE-2015-8921</cve>
<bugzilla href="https://bugzilla.suse.com/985682">SUSE bug 985682</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202461" comment="bsdtar-2.5.5-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205311" comment="libarchive2-2.5.5-9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8924</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-8924" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8924" source="CVE"/>
    <description>
    The archive_read_format_tar_read_header function in archive_read_support_format_tar.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted tar file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8924.html">CVE-2015-8924</cve>
<bugzilla href="https://bugzilla.suse.com/985609">SUSE bug 985609</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202461" comment="bsdtar-2.5.5-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205311" comment="libarchive2-2.5.5-9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8929</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-8929" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8929" source="CVE"/>
    <description>
    Memory leak in the __archive_read_get_extract function in archive_read_extract2.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service via a tar file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8929.html">CVE-2015-8929</cve>
<bugzilla href="https://bugzilla.suse.com/985669">SUSE bug 985669</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202461" comment="bsdtar-2.5.5-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205311" comment="libarchive2-2.5.5-9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8935</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8935" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8935" source="CVE"/>
    <description>
    The sapi_header_op function in main/SAPI.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 supports deprecated line folding without considering browser compatibility, which allows remote attackers to conduct cross-site scripting (XSS) attacks against Internet Explorer by leveraging (1) %0A%20 or (2) %0D%0A%20 mishandling in the header function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8935.html">CVE-2015-8935</cve>
<bugzilla href="https://bugzilla.suse.com/986004">SUSE bug 986004</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210268" comment="apache2-mod_php53-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203272" comment="php53-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210269" comment="php53-bcmath-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210270" comment="php53-bz2-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210271" comment="php53-calendar-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210272" comment="php53-ctype-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210273" comment="php53-curl-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210274" comment="php53-dba-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210275" comment="php53-dom-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210276" comment="php53-exif-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210277" comment="php53-fastcgi-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210278" comment="php53-fileinfo-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210279" comment="php53-ftp-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210280" comment="php53-gd-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210281" comment="php53-gettext-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210282" comment="php53-gmp-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210283" comment="php53-iconv-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210284" comment="php53-intl-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210285" comment="php53-json-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210286" comment="php53-ldap-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210287" comment="php53-mbstring-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210288" comment="php53-mcrypt-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210289" comment="php53-mysql-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210290" comment="php53-odbc-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210291" comment="php53-openssl-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210292" comment="php53-pcntl-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210293" comment="php53-pdo-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210294" comment="php53-pear-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210295" comment="php53-pgsql-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210296" comment="php53-pspell-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210297" comment="php53-shmop-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210298" comment="php53-snmp-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210299" comment="php53-soap-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210300" comment="php53-suhosin-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210301" comment="php53-sysvmsg-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210302" comment="php53-sysvsem-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210303" comment="php53-sysvshm-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210304" comment="php53-tokenizer-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210305" comment="php53-wddx-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210306" comment="php53-xmlreader-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210307" comment="php53-xmlrpc-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210308" comment="php53-xmlwriter-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210309" comment="php53-xsl-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210310" comment="php53-zip-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210311" comment="php53-zlib-5.3.17-74 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8936</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8936" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8936" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in squidGuard.cgi in squidGuard before 1.5 allows remote attackers to inject arbitrary web script or HTML via a blocked site link.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8936.html">CVE-2015-8936</cve>
<bugzilla href="https://bugzilla.suse.com/1040287">SUSE bug 1040287</bugzilla>
<bugzilla href="https://bugzilla.suse.com/985612">SUSE bug 985612</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210810" comment="squidGuard-1.4-13.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210811" comment="squidGuard-doc-1.4-13.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8948</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8948" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8948" source="CVE"/>
    <description>
    idn in GNU libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8948.html">CVE-2015-8948</cve>
<bugzilla href="https://bugzilla.suse.com/1014473">SUSE bug 1014473</bugzilla>
<bugzilla href="https://bugzilla.suse.com/990189">SUSE bug 990189</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202841" comment="libidn-1.10-6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209912" comment="libidn-32bit-1.10-6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8956</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-8956" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8956" source="CVE"/>
    <description>
    The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 4.2 allows local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8956.html">CVE-2015-8956</cve>
<bugzilla href="https://bugzilla.suse.com/1003925">SUSE bug 1003925</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208770" comment="kernel-default-man-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205650" comment="kernel-pae-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205651" comment="kernel-pae-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205652" comment="kernel-pae-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8957</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8957" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8957" source="CVE"/>
    <description>
    Buffer overflow in ImageMagick before 6.9.0-4 Beta allows remote attackers to cause a denial of service (application crash) via a crafted SUN file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8957.html">CVE-2015-8957</cve>
<bugzilla href="https://bugzilla.suse.com/1000690">SUSE bug 1000690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1000691">SUSE bug 1000691</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202227" comment="ImageMagick-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209108" comment="libMagickCore1-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209109" comment="libMagickCore1-32bit-6.4.3.6-7.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8958</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8958" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8958" source="CVE"/>
    <description>
    coders/sun.c in ImageMagick before 6.9.0-4 Beta allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted SUN file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8958.html">CVE-2015-8958</cve>
<bugzilla href="https://bugzilla.suse.com/1000690">SUSE bug 1000690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1000691">SUSE bug 1000691</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1000694">SUSE bug 1000694</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1028079">SUSE bug 1028079</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202227" comment="ImageMagick-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209108" comment="libMagickCore1-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209109" comment="libMagickCore1-32bit-6.4.3.6-7.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8959</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-8959" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8959" source="CVE"/>
    <description>
    coders/dds.c in ImageMagick before 6.9.0-4 Beta allows remote attackers to cause a denial of service (CPU consumption) via a crafted DDS file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8959.html">CVE-2015-8959</cve>
<bugzilla href="https://bugzilla.suse.com/1000713">SUSE bug 1000713</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1074610">SUSE bug 1074610</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202227" comment="ImageMagick-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209108" comment="libMagickCore1-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209109" comment="libMagickCore1-32bit-6.4.3.6-7.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8962</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-8962" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8962" source="CVE"/>
    <description>
    Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8962.html">CVE-2015-8962</cve>
<bugzilla href="https://bugzilla.suse.com/1010501">SUSE bug 1010501</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208770" comment="kernel-default-man-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205650" comment="kernel-pae-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205651" comment="kernel-pae-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205652" comment="kernel-pae-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8964</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-8964" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8964" source="CVE"/>
    <description>
    The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel before 4.5 allows local users to obtain sensitive information from kernel memory by reading a tty data structure.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8964.html">CVE-2015-8964</cve>
<bugzilla href="https://bugzilla.suse.com/1010507">SUSE bug 1010507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1025354">SUSE bug 1025354</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208770" comment="kernel-default-man-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205650" comment="kernel-pae-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205651" comment="kernel-pae-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205652" comment="kernel-pae-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8970</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2015-8970" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8970" source="CVE"/>
    <description>
    crypto/algif_skcipher.c in the Linux kernel before 4.4.2 does not verify that a setkey operation has been performed on an AF_ALG socket before an accept system call is processed, which allows local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted application that does not supply a key, related to the lrw_crypt function in crypto/lrw.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8970.html">CVE-2015-8970</cve>
<bugzilla href="https://bugzilla.suse.com/1008374">SUSE bug 1008374</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1008850">SUSE bug 1008850</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208770" comment="kernel-default-man-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205650" comment="kernel-pae-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205651" comment="kernel-pae-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205652" comment="kernel-pae-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20159019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-9019</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-9019" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019" source="CVE"/>
    <description>
    In libxslt 1.1.29 and earlier, the EXSLT math.random function was not initialized with a random seed during startup, which could cause usage of this function to produce predictable outputs.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-9019.html">CVE-2015-9019</cve>
<bugzilla href="https://bugzilla.suse.com/1123130">SUSE bug 1123130</bugzilla>
<bugzilla href="https://bugzilla.suse.com/934119">SUSE bug 934119</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203113" comment="libxslt-1.1.24-19.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209989" comment="libxslt-32bit-1.1.24-19.33 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20159262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-9262</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-9262" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9262" source="CVE"/>
    <description>
    _XcursorThemeInherits in library.c in libXcursor before 1.1.15 allows remote attackers to cause denial of service or potentially code execution via a one-byte heap overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-9262.html">CVE-2015-9262</cve>
<bugzilla href="https://bugzilla.suse.com/1103511">SUSE bug 1103511</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123801">SUSE bug 1123801</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009235030" comment="xorg-x11-libs-7.4-8.26.50.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235031" comment="xorg-x11-libs-32bit-7.4-8.26.50.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20159289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-9289</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2015-9289" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9289" source="CVE"/>
    <description>
    In the Linux kernel before 4.1.4, a buffer overflow occurs when checking userspace params in drivers/media/dvb-frontends/cx24116.c. The maximum size for a DiSEqC command is 6, according to the userspace API. However, the code allows larger values such as 23.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-9289.html">CVE-2015-9289</cve>
<bugzilla href="https://bugzilla.suse.com/1143179">SUSE bug 1143179</bugzilla>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:20160264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0264</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-0264" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0264" source="CVE"/>
    <description>
    Buffer overflow in the Java Virtual Machine (JVM) in IBM SDK, Java Technology Edition 6 before SR16 FP25 (6.0.16.25), 6 R1 before SR8 FP25 (6.1.8.25), 7 before SR9 FP40 (7.0.9.40), 7 R1 before SR3 FP40 (7.1.3.40), and 8 before SR3 (8.0.3.0) allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0264.html">CVE-2016-0264</cve>
<bugzilla href="https://bugzilla.suse.com/977648">SUSE bug 977648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/979252">SUSE bug 979252</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207710" comment="java-1_6_0-ibm-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207711" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207712" comment="java-1_6_0-ibm-devel-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207713" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207714" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207715" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207735" comment="java-1_7_0-ibm-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207736" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207738" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207739" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.40-52 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207710" comment="java-1_6_0-ibm-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207712" comment="java-1_6_0-ibm-devel-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207713" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207714" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207715" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207735" comment="java-1_7_0-ibm-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207736" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207738" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207739" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.40-52 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207710" comment="java-1_6_0-ibm-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207713" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207714" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207715" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207735" comment="java-1_7_0-ibm-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207736" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207738" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207739" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.40-52 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0363</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-0363" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0363" source="CVE"/>
    <description>
    The com.ibm.CORBA.iiop.ClientDelegate class in IBM SDK, Java Technology Edition 6 before SR16 FP25 (6.0.16.25), 6 R1 before SR8 FP25 (6.1.8.25), 7 before SR9 FP40 (7.0.9.40), 7 R1 before SR3 FP40 (7.1.3.40), and 8 before SR3 (8.0.3.0) uses the invoke method of the java.lang.reflect.Method class in an AccessController doPrivileged block, which allows remote attackers to call setSecurityManager and bypass a sandbox protection mechanism via vectors related to a Proxy object instance implementing the java.lang.reflect.InvocationHandler interface.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-3009.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0363.html">CVE-2016-0363</cve>
<bugzilla href="https://bugzilla.suse.com/977650">SUSE bug 977650</bugzilla>
<bugzilla href="https://bugzilla.suse.com/979252">SUSE bug 979252</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207710" comment="java-1_6_0-ibm-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207711" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207712" comment="java-1_6_0-ibm-devel-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207713" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207714" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207715" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207735" comment="java-1_7_0-ibm-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207736" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207738" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207739" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.40-52 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207710" comment="java-1_6_0-ibm-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207712" comment="java-1_6_0-ibm-devel-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207713" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207714" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207715" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207735" comment="java-1_7_0-ibm-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207736" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207738" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207739" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.40-52 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207710" comment="java-1_6_0-ibm-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207713" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207714" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207715" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207735" comment="java-1_7_0-ibm-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207736" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207738" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207739" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.40-52 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0376</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-0376" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0376" source="CVE"/>
    <description>
    The com.ibm.rmi.io.SunSerializableFactory class in IBM SDK, Java Technology Edition 6 before SR16 FP25 (6.0.16.25), 6 R1 before SR8 FP25 (6.1.8.25), 7 before SR9 FP40 (7.0.9.40), 7 R1 before SR3 FP40 (7.1.3.40), and 8 before SR3 (8.0.3.0) does not properly deserialize classes in an AccessController doPrivileged block, which allows remote attackers to bypass a sandbox protection mechanism and execute arbitrary code as demonstrated by the readValue method of the com.ibm.rmi.io.ValueHandlerPool.ValueHandlerSingleton class, which implements the javax.rmi.CORBA.ValueHandler interface.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-5456.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0376.html">CVE-2016-0376</cve>
<bugzilla href="https://bugzilla.suse.com/977646">SUSE bug 977646</bugzilla>
<bugzilla href="https://bugzilla.suse.com/977650">SUSE bug 977650</bugzilla>
<bugzilla href="https://bugzilla.suse.com/979252">SUSE bug 979252</bugzilla>
<bugzilla href="https://bugzilla.suse.com/981057">SUSE bug 981057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/981060">SUSE bug 981060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/981087">SUSE bug 981087</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207710" comment="java-1_6_0-ibm-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207711" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207712" comment="java-1_6_0-ibm-devel-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207713" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207714" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207715" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207735" comment="java-1_7_0-ibm-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207736" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207738" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207739" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.40-52 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207710" comment="java-1_6_0-ibm-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207712" comment="java-1_6_0-ibm-devel-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207713" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207714" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207715" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207735" comment="java-1_7_0-ibm-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207736" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207738" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207739" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.40-52 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207710" comment="java-1_6_0-ibm-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207713" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207714" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207715" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207735" comment="java-1_7_0-ibm-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207736" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207738" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207739" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.40-52 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0402</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-0402" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java SE and Java SE Embedded components in Oracle Java SE 6u105, 7u91, and 8u66 and Java SE Embedded 8u65 allows remote attackers to affect integrity via unknown vectors related to Networking.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0402.html">CVE-2016-0402</cve>
<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962743">SUSE bug 962743</bugzilla>
<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207704" comment="java-1_6_0-ibm-1.6.0_sr16.20-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207707" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.20-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207708" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.20-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207709" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.20-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207730" comment="java-1_7_0-ibm-1.7.0_sr9.30-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207731" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.30-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207733" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.30-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207734" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.30-45 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208546" comment="java-1_6_0-ibm-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208547" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208548" comment="java-1_6_0-ibm-devel-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208549" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208550" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208551" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208556" comment="java-1_7_0-ibm-1.7.0_sr9.30-47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208557" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.30-47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208558" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.30-47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208559" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.30-47 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0448</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-0448" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java SE and Java SE Embedded components in Oracle Java SE 6u105, 7u91, and 8u66, and Java SE Embedded 8u65 allows remote authenticated users to affect confidentiality via vectors related to JMX.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0448.html">CVE-2016-0448</cve>
<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962743">SUSE bug 962743</bugzilla>
<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207704" comment="java-1_6_0-ibm-1.6.0_sr16.20-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207707" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.20-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207708" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.20-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207709" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.20-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207730" comment="java-1_7_0-ibm-1.7.0_sr9.30-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207731" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.30-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207733" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.30-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207734" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.30-45 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208546" comment="java-1_6_0-ibm-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208547" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208548" comment="java-1_6_0-ibm-devel-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208549" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208550" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208551" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208556" comment="java-1_7_0-ibm-1.7.0_sr9.30-47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208557" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.30-47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208558" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.30-47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208559" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.30-47 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0466</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-0466" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java SE, Java SE Embedded, and JRockit components in Oracle Java SE 6u105, 7u91, and 8u66; Java SE Embedded 8u65; and JRockit R28.3.8 allows remote attackers to affect availability via vectors related to JAXP.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0466.html">CVE-2016-0466</cve>
<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962743">SUSE bug 962743</bugzilla>
<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207704" comment="java-1_6_0-ibm-1.6.0_sr16.20-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207707" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.20-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207708" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.20-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207709" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.20-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207730" comment="java-1_7_0-ibm-1.7.0_sr9.30-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207731" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.30-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207733" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.30-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207734" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.30-45 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208546" comment="java-1_6_0-ibm-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208547" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208548" comment="java-1_6_0-ibm-devel-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208549" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208550" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208551" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208556" comment="java-1_7_0-ibm-1.7.0_sr9.30-47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208557" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.30-47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208558" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.30-47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208559" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.30-47 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0483</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-0483" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u105, 7u91, and 8u66; Java SE Embedded 8u65; and JRockit R28.3.8 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.  NOTE: the previous information is from the January 2016 CPU. Oracle has not commented on third-party claims that this is a heap-based buffer overflow in the readImage function, which allows remote attackers to execute arbitrary code via crafted image data.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0483.html">CVE-2016-0483</cve>
<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962743">SUSE bug 962743</bugzilla>
<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207704" comment="java-1_6_0-ibm-1.6.0_sr16.20-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207707" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.20-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207708" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.20-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207709" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.20-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207730" comment="java-1_7_0-ibm-1.7.0_sr9.30-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207731" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.30-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207733" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.30-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207734" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.30-45 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208546" comment="java-1_6_0-ibm-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208547" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208548" comment="java-1_6_0-ibm-devel-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208549" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208550" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208551" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208556" comment="java-1_7_0-ibm-1.7.0_sr9.30-47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208557" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.30-47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208558" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.30-47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208559" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.30-47 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0494</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-0494" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java SE and Java SE Embedded components in Oracle Java SE 6u105, 7u91, and 8u66 and Java SE Embedded 8u65 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0494.html">CVE-2016-0494</cve>
<bugzilla href="https://bugzilla.suse.com/962743">SUSE bug 962743</bugzilla>
<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207704" comment="java-1_6_0-ibm-1.6.0_sr16.20-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207707" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.20-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207708" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.20-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207709" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.20-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207730" comment="java-1_7_0-ibm-1.7.0_sr9.30-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207731" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.30-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207733" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.30-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207734" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.30-45 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208546" comment="java-1_6_0-ibm-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208547" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208548" comment="java-1_6_0-ibm-devel-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208549" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208550" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208551" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.20-51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208556" comment="java-1_7_0-ibm-1.7.0_sr9.30-47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208557" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.30-47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208558" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.30-47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208559" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.30-47 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0502</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-0502" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0502" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0502.html">CVE-2016-0502</cve>
<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204704" comment="libmysql55client18-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204705" comment="libmysql55client18-32bit-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204706" comment="libmysql55client_r18-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201950" comment="mysql-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204707" comment="mysql-client-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208789" comment="mysql-tools-5.5.47-0.17 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204704" comment="libmysql55client18-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204705" comment="libmysql55client18-32bit-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208788" comment="libmysql55client18-x86-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204706" comment="libmysql55client_r18-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201950" comment="mysql-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204707" comment="mysql-client-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208789" comment="mysql-tools-5.5.47-0.17 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-0505" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Options.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0505.html">CVE-2016-0505</cve>
<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204704" comment="libmysql55client18-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204705" comment="libmysql55client18-32bit-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204706" comment="libmysql55client_r18-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201950" comment="mysql-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204707" comment="mysql-client-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208789" comment="mysql-tools-5.5.47-0.17 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204704" comment="libmysql55client18-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204705" comment="libmysql55client18-32bit-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208788" comment="libmysql55client18-x86-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204706" comment="libmysql55client_r18-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201950" comment="mysql-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204707" comment="mysql-client-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208789" comment="mysql-tools-5.5.47-0.17 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0546</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-0546" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Client.  NOTE: the previous information is from the January 2016 CPU. Oracle has not commented on third-party claims that these are multiple buffer overflows in the mysqlshow tool that allow remote database servers to have unspecified impact via a long table or database name.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0546.html">CVE-2016-0546</cve>
<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204704" comment="libmysql55client18-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204705" comment="libmysql55client18-32bit-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204706" comment="libmysql55client_r18-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201950" comment="mysql-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204707" comment="mysql-client-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208789" comment="mysql-tools-5.5.47-0.17 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204704" comment="libmysql55client18-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204705" comment="libmysql55client18-32bit-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208788" comment="libmysql55client18-x86-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204706" comment="libmysql55client_r18-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201950" comment="mysql-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204707" comment="mysql-client-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208789" comment="mysql-tools-5.5.47-0.17 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0596</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-0596" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier and 5.6.27 and earlier and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0596.html">CVE-2016-0596</cve>
<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204704" comment="libmysql55client18-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204705" comment="libmysql55client18-32bit-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204706" comment="libmysql55client_r18-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201950" comment="mysql-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204707" comment="mysql-client-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208789" comment="mysql-tools-5.5.47-0.17 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204704" comment="libmysql55client18-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204705" comment="libmysql55client18-32bit-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208788" comment="libmysql55client18-x86-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204706" comment="libmysql55client_r18-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201950" comment="mysql-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204707" comment="mysql-client-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208789" comment="mysql-tools-5.5.47-0.17 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0597</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-0597" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0597.html">CVE-2016-0597</cve>
<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204704" comment="libmysql55client18-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204705" comment="libmysql55client18-32bit-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204706" comment="libmysql55client_r18-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201950" comment="mysql-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204707" comment="mysql-client-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208789" comment="mysql-tools-5.5.47-0.17 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204704" comment="libmysql55client18-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204705" comment="libmysql55client18-32bit-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208788" comment="libmysql55client18-x86-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204706" comment="libmysql55client_r18-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201950" comment="mysql-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204707" comment="mysql-client-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208789" comment="mysql-tools-5.5.47-0.17 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0598</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-0598" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0598.html">CVE-2016-0598</cve>
<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204704" comment="libmysql55client18-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204705" comment="libmysql55client18-32bit-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204706" comment="libmysql55client_r18-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201950" comment="mysql-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204707" comment="mysql-client-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208789" comment="mysql-tools-5.5.47-0.17 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204704" comment="libmysql55client18-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204705" comment="libmysql55client18-32bit-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208788" comment="libmysql55client18-x86-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204706" comment="libmysql55client_r18-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201950" comment="mysql-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204707" comment="mysql-client-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208789" comment="mysql-tools-5.5.47-0.17 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0600</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-0600" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to InnoDB.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0600.html">CVE-2016-0600</cve>
<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204704" comment="libmysql55client18-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204705" comment="libmysql55client18-32bit-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204706" comment="libmysql55client_r18-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201950" comment="mysql-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204707" comment="mysql-client-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208789" comment="mysql-tools-5.5.47-0.17 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204704" comment="libmysql55client18-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204705" comment="libmysql55client18-32bit-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208788" comment="libmysql55client18-x86-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204706" comment="libmysql55client_r18-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201950" comment="mysql-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204707" comment="mysql-client-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208789" comment="mysql-tools-5.5.47-0.17 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0606</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-0606" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect integrity via unknown vectors related to encryption.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0606.html">CVE-2016-0606</cve>
<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204704" comment="libmysql55client18-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204705" comment="libmysql55client18-32bit-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204706" comment="libmysql55client_r18-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201950" comment="mysql-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204707" comment="mysql-client-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208789" comment="mysql-tools-5.5.47-0.17 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204704" comment="libmysql55client18-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204705" comment="libmysql55client18-32bit-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208788" comment="libmysql55client18-x86-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204706" comment="libmysql55client_r18-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201950" comment="mysql-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204707" comment="mysql-client-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208789" comment="mysql-tools-5.5.47-0.17 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0608</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-0608" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to UDF.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0608.html">CVE-2016-0608</cve>
<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204704" comment="libmysql55client18-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204705" comment="libmysql55client18-32bit-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204706" comment="libmysql55client_r18-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201950" comment="mysql-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204707" comment="mysql-client-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208789" comment="mysql-tools-5.5.47-0.17 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204704" comment="libmysql55client18-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204705" comment="libmysql55client18-32bit-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208788" comment="libmysql55client18-x86-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204706" comment="libmysql55client_r18-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201950" comment="mysql-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204707" comment="mysql-client-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208789" comment="mysql-tools-5.5.47-0.17 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0609</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-0609" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to privileges.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0609.html">CVE-2016-0609</cve>
<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204704" comment="libmysql55client18-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204705" comment="libmysql55client18-32bit-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204706" comment="libmysql55client_r18-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201950" comment="mysql-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204707" comment="mysql-client-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208789" comment="mysql-tools-5.5.47-0.17 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204704" comment="libmysql55client18-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204705" comment="libmysql55client18-32bit-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208788" comment="libmysql55client18-x86-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204706" comment="libmysql55client_r18-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201950" comment="mysql-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204707" comment="mysql-client-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208789" comment="mysql-tools-5.5.47-0.17 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0616</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-0616" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0616.html">CVE-2016-0616</cve>
<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204704" comment="libmysql55client18-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204705" comment="libmysql55client18-32bit-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204706" comment="libmysql55client_r18-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201950" comment="mysql-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204707" comment="mysql-client-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208789" comment="mysql-tools-5.5.47-0.17 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204704" comment="libmysql55client18-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204705" comment="libmysql55client18-32bit-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208788" comment="libmysql55client18-x86-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204706" comment="libmysql55client_r18-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201950" comment="mysql-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204707" comment="mysql-client-5.5.47-0.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208789" comment="mysql-tools-5.5.47-0.17 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0634</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-0634" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0634" source="CVE"/>
    <description>
    The expansion of '\h' in the prompt string in bash 4.3 allows remote authenticated users to execute arbitrary code via shell metacharacters placed in 'hostname' of a machine.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0634.html">CVE-2016-0634</cve>
<bugzilla href="https://bugzilla.suse.com/1000396">SUSE bug 1000396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1001299">SUSE bug 1001299</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009249913" comment="bash-3.2-147.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249914" comment="bash-doc-3.2-147.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249915" comment="libreadline5-5.2-147.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249916" comment="libreadline5-32bit-5.2-147.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249917" comment="readline-doc-5.2-147.28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0640</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-0640" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect integrity and availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0640.html">CVE-2016-0640</cve>
<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210043" comment="libmysql55client18-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210044" comment="libmysql55client18-32bit-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210046" comment="libmysql55client_r18-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203161" comment="mysql-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210047" comment="mysql-client-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210048" comment="mysql-tools-5.5.49-0.20 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0641</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-0641" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect confidentiality and availability via vectors related to MyISAM.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0641.html">CVE-2016-0641</cve>
<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210043" comment="libmysql55client18-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210044" comment="libmysql55client18-32bit-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210046" comment="libmysql55client_r18-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203161" comment="mysql-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210047" comment="mysql-client-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210048" comment="mysql-tools-5.5.49-0.20 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0642</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-0642" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier allows local users to affect integrity and availability via vectors related to Federated.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0642.html">CVE-2016-0642</cve>
<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210043" comment="libmysql55client18-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210044" comment="libmysql55client18-32bit-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210046" comment="libmysql55client_r18-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203161" comment="mysql-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210047" comment="mysql-client-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210048" comment="mysql-tools-5.5.49-0.20 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0643</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-0643" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows local users to affect confidentiality via vectors related to DML.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0643.html">CVE-2016-0643</cve>
<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210043" comment="libmysql55client18-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210044" comment="libmysql55client18-32bit-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210046" comment="libmysql55client_r18-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203161" comment="mysql-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210047" comment="mysql-client-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210048" comment="mysql-tools-5.5.49-0.20 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0644</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-0644" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to DDL.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0644.html">CVE-2016-0644</cve>
<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210043" comment="libmysql55client18-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210044" comment="libmysql55client18-32bit-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210046" comment="libmysql55client_r18-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203161" comment="mysql-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210047" comment="mysql-client-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210048" comment="mysql-tools-5.5.49-0.20 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0646</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-0646" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0646.html">CVE-2016-0646</cve>
<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210043" comment="libmysql55client18-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210044" comment="libmysql55client18-32bit-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210046" comment="libmysql55client_r18-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203161" comment="mysql-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210047" comment="mysql-client-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210048" comment="mysql-tools-5.5.49-0.20 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0647</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-0647" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows local users to affect availability via vectors related to FTS.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0647.html">CVE-2016-0647</cve>
<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210043" comment="libmysql55client18-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210044" comment="libmysql55client18-32bit-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210046" comment="libmysql55client_r18-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203161" comment="mysql-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210047" comment="mysql-client-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210048" comment="mysql-tools-5.5.49-0.20 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0648</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-0648" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows local users to affect availability via vectors related to PS.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0648.html">CVE-2016-0648</cve>
<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210043" comment="libmysql55client18-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210044" comment="libmysql55client18-32bit-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210046" comment="libmysql55client_r18-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203161" comment="mysql-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210047" comment="mysql-client-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210048" comment="mysql-tools-5.5.49-0.20 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0649</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-0649" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to PS.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0649.html">CVE-2016-0649</cve>
<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210043" comment="libmysql55client18-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210044" comment="libmysql55client18-32bit-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210046" comment="libmysql55client_r18-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203161" comment="mysql-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210047" comment="mysql-client-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210048" comment="mysql-tools-5.5.49-0.20 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0650</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-0650" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to Replication.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0650.html">CVE-2016-0650</cve>
<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210043" comment="libmysql55client18-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210044" comment="libmysql55client18-32bit-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210046" comment="libmysql55client_r18-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203161" comment="mysql-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210047" comment="mysql-client-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210048" comment="mysql-tools-5.5.49-0.20 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0651</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-0651" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0651" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier allows local users to affect availability via vectors related to Optimizer.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0651.html">CVE-2016-0651</cve>
<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210043" comment="libmysql55client18-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210044" comment="libmysql55client18-32bit-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210046" comment="libmysql55client_r18-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203161" comment="mysql-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210047" comment="mysql-client-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210048" comment="mysql-tools-5.5.49-0.20 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0666</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-0666" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows local users to affect availability via vectors related to Security: Privileges.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0666.html">CVE-2016-0666</cve>
<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210043" comment="libmysql55client18-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210044" comment="libmysql55client18-32bit-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210046" comment="libmysql55client_r18-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203161" comment="mysql-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210047" comment="mysql-client-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210048" comment="mysql-tools-5.5.49-0.20 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0686</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-0686" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77 and Java SE Embedded 8u77 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Serialization.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0686.html">CVE-2016-0686</cve>
<bugzilla href="https://bugzilla.suse.com/976340">SUSE bug 976340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/979252">SUSE bug 979252</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207710" comment="java-1_6_0-ibm-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207711" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207712" comment="java-1_6_0-ibm-devel-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207713" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207714" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207715" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207735" comment="java-1_7_0-ibm-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207736" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207738" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207739" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.40-52 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207710" comment="java-1_6_0-ibm-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207712" comment="java-1_6_0-ibm-devel-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207713" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207714" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207715" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207735" comment="java-1_7_0-ibm-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207736" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207738" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207739" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.40-52 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207710" comment="java-1_6_0-ibm-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207713" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207714" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207715" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207735" comment="java-1_7_0-ibm-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207736" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207738" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207739" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.40-52 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0687</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-0687" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77 and Java SE Embedded 8u77 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to the Hotspot sub-component.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0687.html">CVE-2016-0687</cve>
<bugzilla href="https://bugzilla.suse.com/976340">SUSE bug 976340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/979252">SUSE bug 979252</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207710" comment="java-1_6_0-ibm-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207711" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207712" comment="java-1_6_0-ibm-devel-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207713" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207714" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207715" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207735" comment="java-1_7_0-ibm-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207736" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207738" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207739" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.40-52 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207710" comment="java-1_6_0-ibm-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207712" comment="java-1_6_0-ibm-devel-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207713" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207714" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207715" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207735" comment="java-1_7_0-ibm-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207736" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207738" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207739" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.40-52 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207710" comment="java-1_6_0-ibm-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207713" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207714" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207715" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207735" comment="java-1_7_0-ibm-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207736" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207738" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207739" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.40-52 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0702</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-0702" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0702" source="CVE"/>
    <description>
    The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy Bridge CPU core as a victim and leveraging cache-bank conflicts, aka a "CacheBleed" attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0702.html">CVE-2016-0702</cve>
<bugzilla href="https://bugzilla.suse.com/1007806">SUSE bug 1007806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/968044">SUSE bug 968044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/968050">SUSE bug 968050</bugzilla>
<bugzilla href="https://bugzilla.suse.com/971238">SUSE bug 971238</bugzilla>
<bugzilla href="https://bugzilla.suse.com/990370">SUSE bug 990370</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203223" comment="libopenssl-devel-0.9.8j-0.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207922" comment="libopenssl0_9_8-0.9.8j-0.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207923" comment="libopenssl0_9_8-32bit-0.9.8j-0.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207924" comment="libopenssl0_9_8-hmac-0.9.8j-0.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207925" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203225" comment="openssl-0.9.8j-0.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207926" comment="openssl-doc-0.9.8j-0.97 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207922" comment="libopenssl0_9_8-0.9.8j-0.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207923" comment="libopenssl0_9_8-32bit-0.9.8j-0.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207924" comment="libopenssl0_9_8-hmac-0.9.8j-0.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207925" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203225" comment="openssl-0.9.8j-0.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207926" comment="openssl-doc-0.9.8j-0.97 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0703</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-0703" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0703" source="CVE"/>
    <description>
    The get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a accepts a nonzero CLIENT-MASTER-KEY CLEAR-KEY-LENGTH value for an arbitrary cipher, which allows man-in-the-middle attackers to determine the MASTER-KEY value and decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0703.html">CVE-2016-0703</cve>
<bugzilla href="https://bugzilla.suse.com/968044">SUSE bug 968044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/968046">SUSE bug 968046</bugzilla>
<bugzilla href="https://bugzilla.suse.com/968051">SUSE bug 968051</bugzilla>
<bugzilla href="https://bugzilla.suse.com/986238">SUSE bug 986238</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205075" comment="libopenssl0_9_8-0.9.8j-0.89 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205076" comment="libopenssl0_9_8-32bit-0.9.8j-0.89 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207919" comment="libopenssl0_9_8-hmac-0.9.8j-0.89 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207920" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.89 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203222" comment="openssl-0.9.8j-0.89 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207921" comment="openssl-doc-0.9.8j-0.89 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215815" comment="libopenssl-devel-0.9.8j-0.91 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215816" comment="libopenssl0_9_8-0.9.8j-0.91 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215817" comment="libopenssl0_9_8-32bit-0.9.8j-0.91 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215818" comment="libopenssl0_9_8-hmac-0.9.8j-0.91 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215819" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.91 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215820" comment="openssl-0.9.8j-0.91 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215821" comment="openssl-doc-0.9.8j-0.91 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0705</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-0705" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0705" source="CVE"/>
    <description>
    Double free vulnerability in the dsa_priv_decode function in crypto/dsa/dsa_ameth.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a malformed DSA private key.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0705.html">CVE-2016-0705</cve>
<bugzilla href="https://bugzilla.suse.com/968044">SUSE bug 968044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/968047">SUSE bug 968047</bugzilla>
<bugzilla href="https://bugzilla.suse.com/971238">SUSE bug 971238</bugzilla>
<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205075" comment="libopenssl0_9_8-0.9.8j-0.89 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205076" comment="libopenssl0_9_8-32bit-0.9.8j-0.89 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207919" comment="libopenssl0_9_8-hmac-0.9.8j-0.89 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207920" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.89 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203222" comment="openssl-0.9.8j-0.89 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207921" comment="openssl-doc-0.9.8j-0.89 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215815" comment="libopenssl-devel-0.9.8j-0.91 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215816" comment="libopenssl0_9_8-0.9.8j-0.91 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215817" comment="libopenssl0_9_8-32bit-0.9.8j-0.91 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215818" comment="libopenssl0_9_8-hmac-0.9.8j-0.91 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215819" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.91 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215820" comment="openssl-0.9.8j-0.91 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215821" comment="openssl-doc-0.9.8j-0.91 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0706</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-0706" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0706" source="CVE"/>
    <description>
    Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 does not place org.apache.catalina.manager.StatusManagerServlet on the org/apache/catalina/core/RestrictedServlets.properties list, which allows remote authenticated users to bypass intended SecurityManager restrictions and read arbitrary HTTP requests, and consequently discover session ID values, via a crafted web application.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0706.html">CVE-2016-0706</cve>
<bugzilla href="https://bugzilla.suse.com/967815">SUSE bug 967815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/988489">SUSE bug 988489</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210850" comment="tomcat6-6.0.45-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210851" comment="tomcat6-admin-webapps-6.0.45-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210852" comment="tomcat6-docs-webapp-6.0.45-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210853" comment="tomcat6-javadoc-6.0.45-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210854" comment="tomcat6-jsp-2_1-api-6.0.45-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210855" comment="tomcat6-lib-6.0.45-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210856" comment="tomcat6-servlet-2_5-api-6.0.45-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210857" comment="tomcat6-webapps-6.0.45-0.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0714</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-0714" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0714" source="CVE"/>
    <description>
    The session-persistence implementation in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 mishandles session attributes, which allows remote authenticated users to bypass intended SecurityManager restrictions and execute arbitrary code in a privileged context via a web application that places a crafted object in a session.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0714.html">CVE-2016-0714</cve>
<bugzilla href="https://bugzilla.suse.com/967964">SUSE bug 967964</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210850" comment="tomcat6-6.0.45-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210851" comment="tomcat6-admin-webapps-6.0.45-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210852" comment="tomcat6-docs-webapp-6.0.45-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210853" comment="tomcat6-javadoc-6.0.45-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210854" comment="tomcat6-jsp-2_1-api-6.0.45-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210855" comment="tomcat6-lib-6.0.45-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210856" comment="tomcat6-servlet-2_5-api-6.0.45-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210857" comment="tomcat6-webapps-6.0.45-0.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0718</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-0718" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0718" source="CVE"/>
    <description>
    Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0718.html">CVE-2016-0718</cve>
<bugzilla href="https://bugzilla.suse.com/979441">SUSE bug 979441</bugzilla>
<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202509" comment="expat-2.0.1-88.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209227" comment="libexpat1-2.0.1-88.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209228" comment="libexpat1-32bit-2.0.1-88.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0723</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-0723" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0723" source="CVE"/>
    <description>
    Race condition in the tty_ioctl function in drivers/tty/tty_io.c in the Linux kernel through 4.4.1 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free and system crash) by making a TIOCGETD ioctl call during processing of a TIOCSETD ioctl call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0723.html">CVE-2016-0723</cve>
<bugzilla href="https://bugzilla.suse.com/961500">SUSE bug 961500</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208637" comment="kernel-default-man-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208641" comment="kernel-pae-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208642" comment="kernel-pae-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208643" comment="kernel-pae-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0740</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-0740" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0740" source="CVE"/>
    <description>
    Buffer overflow in the ImagingLibTiffDecode function in libImaging/TiffDecode.c in Pillow before 3.1.1 allows remote attackers to overwrite memory via a crafted TIFF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0740.html">CVE-2016-0740</cve>
<bugzilla href="https://bugzilla.suse.com/965579">SUSE bug 965579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/965582">SUSE bug 965582</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215929" comment="python-Pillow-2.7.0-9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0751</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-0751" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0751" source="CVE"/>
    <description>
    actionpack/lib/action_dispatch/http/mime_type.rb in Action Pack in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly restrict use of the MIME type cache, which allows remote attackers to cause a denial of service (memory consumption) via a crafted HTTP Accept header.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0751.html">CVE-2016-0751</cve>
<bugzilla href="https://bugzilla.suse.com/963331">SUSE bug 963331</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215940" comment="ruby2.1-rubygem-actionpack-4_1-4.1.9-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215941" comment="rubygem-actionpack-4_1-4.1.9-9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0752</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-0752" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0752" source="CVE"/>
    <description>
    Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0752.html">CVE-2016-0752</cve>
<bugzilla href="https://bugzilla.suse.com/963332">SUSE bug 963332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/968850">SUSE bug 968850</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215940" comment="ruby2.1-rubygem-actionpack-4_1-4.1.9-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215942" comment="ruby2.1-rubygem-actionview-4_1-4.1.9-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215941" comment="rubygem-actionpack-4_1-4.1.9-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215943" comment="rubygem-actionview-4_1-4.1.9-9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0753</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-0753" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0753" source="CVE"/>
    <description>
    Active Model in Ruby on Rails 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 supports the use of instance-level writers for class accessors, which allows remote attackers to bypass intended validation steps via crafted parameters.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0753.html">CVE-2016-0753</cve>
<bugzilla href="https://bugzilla.suse.com/963334">SUSE bug 963334</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215946" comment="ruby2.1-rubygem-activemodel-4_1-4.1.9-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215948" comment="ruby2.1-rubygem-activerecord-4_1-4.1.9-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215952" comment="ruby2.1-rubygem-activesupport-4_1-4.1.9-12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215947" comment="rubygem-activemodel-4_1-4.1.9-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215949" comment="rubygem-activerecord-4_1-4.1.9-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215953" comment="rubygem-activesupport-4_1-4.1.9-12 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0755</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-0755" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0755" source="CVE"/>
    <description>
    The ConnectionExists function in lib/url.c in libcurl before 7.47.0 does not properly re-use NTLM-authenticated proxy connections, which might allow remote attackers to authenticate as other users via a request, a similar issue to CVE-2014-0015.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0755.html">CVE-2016-0755</cve>
<bugzilla href="https://bugzilla.suse.com/962983">SUSE bug 962983</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201619" comment="curl-7.19.7-1.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204267" comment="libcurl4-7.19.7-1.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204268" comment="libcurl4-32bit-7.19.7-1.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208453" comment="libcurl4-x86-7.19.7-1.46 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201619" comment="curl-7.19.7-1.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204267" comment="libcurl4-7.19.7-1.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204268" comment="libcurl4-32bit-7.19.7-1.46 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0758</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-0758" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0758" source="CVE"/>
    <description>
    Integer overflow in lib/asn1_decoder.c in the Linux kernel before 4.6 allows local users to gain privileges via crafted ASN.1 data.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0758.html">CVE-2016-0758</cve>
<bugzilla href="https://bugzilla.suse.com/979867">SUSE bug 979867</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980856">SUSE bug 980856</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208598" comment="kernel-bigsmp-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208599" comment="kernel-bigsmp-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208600" comment="kernel-bigsmp-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205422" comment="kernel-default-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205423" comment="kernel-default-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205424" comment="kernel-default-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205425" comment="kernel-ec2-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205426" comment="kernel-ec2-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205427" comment="kernel-ec2-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205431" comment="kernel-source-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205432" comment="kernel-syms-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205433" comment="kernel-trace-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205434" comment="kernel-trace-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205435" comment="kernel-trace-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205436" comment="kernel-xen-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205437" comment="kernel-xen-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205438" comment="kernel-xen-devel-3.0.101-0.47.86 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208598" comment="kernel-bigsmp-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208599" comment="kernel-bigsmp-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208600" comment="kernel-bigsmp-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205422" comment="kernel-default-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205423" comment="kernel-default-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205424" comment="kernel-default-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208601" comment="kernel-default-man-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205425" comment="kernel-ec2-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205426" comment="kernel-ec2-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205427" comment="kernel-ec2-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205428" comment="kernel-pae-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205429" comment="kernel-pae-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205430" comment="kernel-pae-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205431" comment="kernel-source-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205432" comment="kernel-syms-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205433" comment="kernel-trace-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205434" comment="kernel-trace-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205435" comment="kernel-trace-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205436" comment="kernel-xen-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205437" comment="kernel-xen-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205438" comment="kernel-xen-devel-3.0.101-0.47.86 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0762</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-0762" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0762" source="CVE"/>
    <description>
    The Realm implementations in Apache Tomcat versions 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not process the supplied password if the supplied user name did not exist. This made a timing attack possible to determine valid user names. Note that the default configuration includes the LockOutRealm which makes exploitation of this vulnerability harder.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0762.html">CVE-2016-0762</cve>
<bugzilla href="https://bugzilla.suse.com/1007854">SUSE bug 1007854</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205936" comment="tomcat6-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205937" comment="tomcat6-admin-webapps-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205938" comment="tomcat6-docs-webapp-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205939" comment="tomcat6-javadoc-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205940" comment="tomcat6-jsp-2_1-api-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205941" comment="tomcat6-lib-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205942" comment="tomcat6-servlet-2_5-api-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205943" comment="tomcat6-webapps-6.0.53-0.56 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0766</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-0766" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0766" source="CVE"/>
    <description>
    PostgreSQL before 9.1.20, 9.2.x before 9.2.15, 9.3.x before 9.3.11, 9.4.x before 9.4.6, and 9.5.x before 9.5.1 does not properly restrict access to unspecified custom configuration settings (GUCS) for PL/Java, which allows attackers to gain privileges via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0766.html">CVE-2016-0766</cve>
<bugzilla href="https://bugzilla.suse.com/966435">SUSE bug 966435</bugzilla>
<bugzilla href="https://bugzilla.suse.com/966436">SUSE bug 966436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/978323">SUSE bug 978323</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205077" comment="libecpg6-9.4.6-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205078" comment="libpq5-9.4.6-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205079" comment="libpq5-32bit-9.4.6-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205080" comment="postgresql94-9.4.6-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210626" comment="postgresql94-contrib-9.4.6-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205081" comment="postgresql94-docs-9.4.6-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203383" comment="postgresql94-libs-9.4.6-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210627" comment="postgresql94-server-9.4.6-0.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0772</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-0772" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0772" source="CVE"/>
    <description>
    The smtplib library in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 does not return an error when StartTLS fails, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a "StartTLS stripping attack."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0772.html">CVE-2016-0772</cve>
<bugzilla href="https://bugzilla.suse.com/984751">SUSE bug 984751</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210666" comment="libpython2_6-1_0-2.6.9-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210667" comment="libpython2_6-1_0-32bit-2.6.9-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203398" comment="python-2.6.9-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203399" comment="python-32bit-2.6.9-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203400" comment="python-base-2.6.9-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210669" comment="python-base-32bit-2.6.9-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210671" comment="python-curses-2.6.9-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203401" comment="python-demo-2.6.9-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203403" comment="python-doc-2.6-8.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203404" comment="python-doc-pdf-2.6-8.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203405" comment="python-gdbm-2.6.9-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203406" comment="python-idle-2.6.9-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203407" comment="python-tk-2.6.9-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210673" comment="python-xml-2.6.9-39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0773</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-0773" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0773" source="CVE"/>
    <description>
    PostgreSQL before 9.1.20, 9.2.x before 9.2.15, 9.3.x before 9.3.11, 9.4.x before 9.4.6, and 9.5.x before 9.5.1 allows remote attackers to cause a denial of service (infinite loop or buffer overflow and crash) via a large Unicode character range in a regular expression.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0773.html">CVE-2016-0773</cve>
<bugzilla href="https://bugzilla.suse.com/966435">SUSE bug 966435</bugzilla>
<bugzilla href="https://bugzilla.suse.com/966436">SUSE bug 966436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/978323">SUSE bug 978323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/983246">SUSE bug 983246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/986409">SUSE bug 986409</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205077" comment="libecpg6-9.4.6-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205078" comment="libpq5-9.4.6-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205079" comment="libpq5-32bit-9.4.6-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205080" comment="postgresql94-9.4.6-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210626" comment="postgresql94-contrib-9.4.6-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205081" comment="postgresql94-docs-9.4.6-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203383" comment="postgresql94-libs-9.4.6-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210627" comment="postgresql94-server-9.4.6-0.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0775</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-0775" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0775" source="CVE"/>
    <description>
    Buffer overflow in the ImagingFliDecode function in libImaging/FliDecode.c in Pillow before 3.1.1 allows remote attackers to cause a denial of service (crash) via a crafted FLI file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0775.html">CVE-2016-0775</cve>
<bugzilla href="https://bugzilla.suse.com/965579">SUSE bug 965579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/965582">SUSE bug 965582</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215929" comment="python-Pillow-2.7.0-9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0777</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-0777" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0777" source="CVE"/>
    <description>
    The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0777.html">CVE-2016-0777</cve>
<bugzilla href="https://bugzilla.suse.com/1087412">SUSE bug 1087412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/961642">SUSE bug 961642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204733" comment="openssh-6.2p2-0.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204734" comment="openssh-askpass-6.2p2-0.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204735" comment="openssh-askpass-gnome-6.2p2-0.24 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0778</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-0778" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0778" source="CVE"/>
    <description>
    The (1) roaming_read and (2) roaming_write functions in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2, when certain proxy and forward options are enabled, do not properly maintain connection file descriptors, which allows remote servers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact by requesting many forwardings.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0778.html">CVE-2016-0778</cve>
<bugzilla href="https://bugzilla.suse.com/1087412">SUSE bug 1087412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/961645">SUSE bug 961645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204733" comment="openssh-6.2p2-0.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204734" comment="openssh-askpass-6.2p2-0.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204735" comment="openssh-askpass-gnome-6.2p2-0.24 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0787</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-0787" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0787" source="CVE"/>
    <description>
    The diffie_hellman_sha256 function in kex.c in libssh2 before 1.7.0 improperly truncates secrets to 128 or 256 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a "bits/bytes confusion bug."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0787.html">CVE-2016-0787</cve>
<bugzilla href="https://bugzilla.suse.com/1149968">SUSE bug 1149968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/967026">SUSE bug 967026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/968174">SUSE bug 968174</bugzilla>
<bugzilla href="https://bugzilla.suse.com/974691">SUSE bug 974691</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203059" comment="libssh2-1-1.2.9-4.2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203063" comment="libssh2_org-1.2.9-4.2.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0797</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-0797" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0797" source="CVE"/>
    <description>
    Multiple integer overflows in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allow remote attackers to cause a denial of service (heap memory corruption or NULL pointer dereference) or possibly have unspecified other impact via a long digit string that is mishandled by the (1) BN_dec2bn or (2) BN_hex2bn function, related to crypto/bn/bn.h and crypto/bn/bn_print.c.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0797.html">CVE-2016-0797</cve>
<bugzilla href="https://bugzilla.suse.com/968044">SUSE bug 968044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/968048">SUSE bug 968048</bugzilla>
<bugzilla href="https://bugzilla.suse.com/990370">SUSE bug 990370</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205075" comment="libopenssl0_9_8-0.9.8j-0.89 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205076" comment="libopenssl0_9_8-32bit-0.9.8j-0.89 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207919" comment="libopenssl0_9_8-hmac-0.9.8j-0.89 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207920" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.89 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203222" comment="openssl-0.9.8j-0.89 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207921" comment="openssl-doc-0.9.8j-0.89 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215815" comment="libopenssl-devel-0.9.8j-0.91 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215816" comment="libopenssl0_9_8-0.9.8j-0.91 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215817" comment="libopenssl0_9_8-32bit-0.9.8j-0.91 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215818" comment="libopenssl0_9_8-hmac-0.9.8j-0.91 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215819" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.91 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215820" comment="openssl-0.9.8j-0.91 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215821" comment="openssl-doc-0.9.8j-0.91 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0799</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-0799" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0799" source="CVE"/>
    <description>
    The fmtstr function in crypto/bio/b_print.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g improperly calculates string lengths, which allows remote attackers to cause a denial of service (overflow and out-of-bounds read) or possibly have unspecified other impact via a long string, as demonstrated by a large amount of ASN.1 data, a different vulnerability than CVE-2016-2842.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0799.html">CVE-2016-0799</cve>
<bugzilla href="https://bugzilla.suse.com/968044">SUSE bug 968044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/968374">SUSE bug 968374</bugzilla>
<bugzilla href="https://bugzilla.suse.com/969517">SUSE bug 969517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/989345">SUSE bug 989345</bugzilla>
<bugzilla href="https://bugzilla.suse.com/990370">SUSE bug 990370</bugzilla>
<bugzilla href="https://bugzilla.suse.com/991722">SUSE bug 991722</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205075" comment="libopenssl0_9_8-0.9.8j-0.89 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205076" comment="libopenssl0_9_8-32bit-0.9.8j-0.89 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207919" comment="libopenssl0_9_8-hmac-0.9.8j-0.89 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207920" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.89 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203222" comment="openssl-0.9.8j-0.89 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207921" comment="openssl-doc-0.9.8j-0.89 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215815" comment="libopenssl-devel-0.9.8j-0.91 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215816" comment="libopenssl0_9_8-0.9.8j-0.91 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215817" comment="libopenssl0_9_8-32bit-0.9.8j-0.91 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215818" comment="libopenssl0_9_8-hmac-0.9.8j-0.91 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215819" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.91 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215820" comment="openssl-0.9.8j-0.91 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215821" comment="openssl-doc-0.9.8j-0.91 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-0800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0800" source="CVE"/>
    <description>
    The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0800.html">CVE-2016-0800</cve>
<bugzilla href="https://bugzilla.suse.com/1106871">SUSE bug 1106871</bugzilla>
<bugzilla href="https://bugzilla.suse.com/961377">SUSE bug 961377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/968044">SUSE bug 968044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/968046">SUSE bug 968046</bugzilla>
<bugzilla href="https://bugzilla.suse.com/968888">SUSE bug 968888</bugzilla>
<bugzilla href="https://bugzilla.suse.com/979060">SUSE bug 979060</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205075" comment="libopenssl0_9_8-0.9.8j-0.89 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205076" comment="libopenssl0_9_8-32bit-0.9.8j-0.89 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207919" comment="libopenssl0_9_8-hmac-0.9.8j-0.89 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207920" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.89 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203222" comment="openssl-0.9.8j-0.89 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207921" comment="openssl-doc-0.9.8j-0.89 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215815" comment="libopenssl-devel-0.9.8j-0.91 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215816" comment="libopenssl0_9_8-0.9.8j-0.91 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215817" comment="libopenssl0_9_8-32bit-0.9.8j-0.91 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215818" comment="libopenssl0_9_8-hmac-0.9.8j-0.91 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215819" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.91 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215820" comment="openssl-0.9.8j-0.91 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215821" comment="openssl-doc-0.9.8j-0.91 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0823</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-0823" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0823" source="CVE"/>
    <description>
    The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel before 3.19.3, as used in Android 6.0.1 before 2016-03-01, allows local users to obtain sensitive physical-address information by reading a pagemap file, aka Android internal bug 25739721.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0823.html">CVE-2016-0823</cve>
<bugzilla href="https://bugzilla.suse.com/994759">SUSE bug 994759</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208770" comment="kernel-default-man-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205650" comment="kernel-pae-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205651" comment="kernel-pae-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205652" comment="kernel-pae-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161000031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1000031</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-1000031" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000031" source="CVE"/>
    <description>
    Apache Commons FileUpload before 1.3.3 DiskFileItem File Manipulation Remote Code Execution
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1000031.html">CVE-2016-1000031</cve>
<bugzilla href="https://bugzilla.suse.com/1128963">SUSE bug 1128963</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009253254" comment="jakarta-commons-fileupload-1.1.1-1.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253255" comment="jakarta-commons-fileupload-javadoc-1.1.1-1.37.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161000110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1000110</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-1000110" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000110" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1000110.html">CVE-2016-1000110</cve>
<bugzilla href="https://bugzilla.suse.com/988484">SUSE bug 988484</bugzilla>
<bugzilla href="https://bugzilla.suse.com/989523">SUSE bug 989523</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210666" comment="libpython2_6-1_0-2.6.9-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210667" comment="libpython2_6-1_0-32bit-2.6.9-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203398" comment="python-2.6.9-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203399" comment="python-32bit-2.6.9-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203400" comment="python-base-2.6.9-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210669" comment="python-base-32bit-2.6.9-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210671" comment="python-curses-2.6.9-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203401" comment="python-demo-2.6.9-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203403" comment="python-doc-2.6-8.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203404" comment="python-doc-pdf-2.6-8.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203405" comment="python-gdbm-2.6.9-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203406" comment="python-idle-2.6.9-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203407" comment="python-tk-2.6.9-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210673" comment="python-xml-2.6.9-39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10002</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10002" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10002" source="CVE"/>
    <description>
    Incorrect processing of responses to If-None-Modified HTTP conditional requests in Squid HTTP Proxy 3.1.10 through 3.1.23, 3.2.0.3 through 3.5.22, and 4.0.1 through 4.0.16 leads to client-specific Cookie data being leaked to other clients. Attack requests can easily be crafted by a client to probe a cache for this information.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10002.html">CVE-2016-10002</cve>
<bugzilla href="https://bugzilla.suse.com/1016168">SUSE bug 1016168</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210807" comment="squid3-3.1.23-8.16.36 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10009</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-10009" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10009" source="CVE"/>
    <description>
    Untrusted search path vulnerability in ssh-agent.c in ssh-agent in OpenSSH before 7.4 allows remote attackers to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10009.html">CVE-2016-10009</cve>
<bugzilla href="https://bugzilla.suse.com/1016336">SUSE bug 1016336</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1016366">SUSE bug 1016366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1016370">SUSE bug 1016370</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1017555">SUSE bug 1017555</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1017870">SUSE bug 1017870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1021751">SUSE bug 1021751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1025354">SUSE bug 1025354</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1026634">SUSE bug 1026634</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1087412">SUSE bug 1087412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205684" comment="openssh-6.2p2-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205685" comment="openssh-askpass-6.2p2-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205686" comment="openssh-askpass-gnome-6.2p2-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203764" comment="openssh-openssl1-6.6p1-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203765" comment="openssh-openssl1-helpers-6.6p1-18 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205684" comment="openssh-6.2p2-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205685" comment="openssh-askpass-6.2p2-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205686" comment="openssh-askpass-gnome-6.2p2-0.40 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10011</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-10011" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10011" source="CVE"/>
    <description>
    authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10011.html">CVE-2016-10011</cve>
<bugzilla href="https://bugzilla.suse.com/1016336">SUSE bug 1016336</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1016369">SUSE bug 1016369</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1016370">SUSE bug 1016370</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1017870">SUSE bug 1017870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1025354">SUSE bug 1025354</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1026634">SUSE bug 1026634</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1087412">SUSE bug 1087412</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205684" comment="openssh-6.2p2-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205685" comment="openssh-askpass-6.2p2-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205686" comment="openssh-askpass-gnome-6.2p2-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203764" comment="openssh-openssl1-6.6p1-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203765" comment="openssh-openssl1-helpers-6.6p1-18 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205684" comment="openssh-6.2p2-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205685" comment="openssh-askpass-6.2p2-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205686" comment="openssh-askpass-gnome-6.2p2-0.40 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10012</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10012" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10012" source="CVE"/>
    <description>
    The shared memory manager (associated with pre-authentication compression) in sshd in OpenSSH before 7.4 does not ensure that a bounds check is enforced by all compilers, which might allows local users to gain privileges by leveraging access to a sandboxed privilege-separation process, related to the m_zback and m_zlib data structures.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10012.html">CVE-2016-10012</cve>
<bugzilla href="https://bugzilla.suse.com/1006166">SUSE bug 1006166</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1016369">SUSE bug 1016369</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1016370">SUSE bug 1016370</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1017870">SUSE bug 1017870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1021751">SUSE bug 1021751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1025354">SUSE bug 1025354</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1026634">SUSE bug 1026634</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1034031">SUSE bug 1034031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1035742">SUSE bug 1035742</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1073044">SUSE bug 1073044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1090629">SUSE bug 1090629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1092582">SUSE bug 1092582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093652">SUSE bug 1093652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009238396" comment="openssh-6.2p2-0.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238397" comment="openssh-askpass-6.2p2-0.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238398" comment="openssh-askpass-gnome-6.2p2-0.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234528" comment="openssh-openssl1-6.6p1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234529" comment="openssh-openssl1-helpers-6.6p1-19.3 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009238396" comment="openssh-6.2p2-0.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238397" comment="openssh-askpass-6.2p2-0.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238398" comment="openssh-askpass-gnome-6.2p2-0.41.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10013</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-10013" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10013" source="CVE"/>
    <description>
    Xen through 4.8.x allows local 64-bit x86 HVM guest OS users to gain privileges by leveraging mishandling of SYSCALL singlestep during emulation.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10013.html">CVE-2016-10013</cve>
<bugzilla href="https://bugzilla.suse.com/1016340">SUSE bug 1016340</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205957" comment="xen-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209062" comment="xen-doc-html-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209063" comment="xen-doc-pdf-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205958" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205959" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205960" comment="xen-libs-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209064" comment="xen-libs-32bit-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209065" comment="xen-tools-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205961" comment="xen-tools-domU-4.2.5_21-35 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205957" comment="xen-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209062" comment="xen-doc-html-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209063" comment="xen-doc-pdf-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205958" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205960" comment="xen-libs-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209064" comment="xen-libs-32bit-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209065" comment="xen-tools-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205961" comment="xen-tools-domU-4.2.5_21-35 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10024</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-10024" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10024" source="CVE"/>
    <description>
    Xen through 4.8.x allows local x86 PV guest OS kernel administrators to cause a denial of service (host hang or crash) by modifying the instruction stream asynchronously while performing certain kernel operations.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10024.html">CVE-2016-10024</cve>
<bugzilla href="https://bugzilla.suse.com/1014298">SUSE bug 1014298</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205957" comment="xen-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209062" comment="xen-doc-html-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209063" comment="xen-doc-pdf-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205958" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205959" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205960" comment="xen-libs-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209064" comment="xen-libs-32bit-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209065" comment="xen-tools-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205961" comment="xen-tools-domU-4.2.5_21-35 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205957" comment="xen-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209062" comment="xen-doc-html-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209063" comment="xen-doc-pdf-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205958" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205960" comment="xen-libs-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209064" comment="xen-libs-32bit-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209065" comment="xen-tools-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205961" comment="xen-tools-domU-4.2.5_21-35 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610046" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10046</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10046" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10046" source="CVE"/>
    <description>
    Heap-based buffer overflow in the DrawImage function in magick/draw.c in ImageMagick before 6.9.5-5 allows remote attackers to cause a denial of service (application crash) via a crafted image file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10046.html">CVE-2016-10046</cve>
<bugzilla href="https://bugzilla.suse.com/1016742">SUSE bug 1016742</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1017308">SUSE bug 1017308</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202241" comment="ImageMagick-6.4.3.6-7.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209112" comment="libMagickCore1-6.4.3.6-7.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209113" comment="libMagickCore1-32bit-6.4.3.6-7.65 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10048</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10048" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10048" source="CVE"/>
    <description>
    Directory traversal vulnerability in magick/module.c in ImageMagick 6.9.4-7 allows remote attackers to load arbitrary modules via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10048.html">CVE-2016-10048</cve>
<bugzilla href="https://bugzilla.suse.com/1017310">SUSE bug 1017310</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202241" comment="ImageMagick-6.4.3.6-7.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209112" comment="libMagickCore1-6.4.3.6-7.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209113" comment="libMagickCore1-32bit-6.4.3.6-7.65 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10049</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10049" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10049" source="CVE"/>
    <description>
    Buffer overflow in the ReadRLEImage function in coders/rle.c in ImageMagick before 6.9.4-4 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted RLE file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10049.html">CVE-2016-10049</cve>
<bugzilla href="https://bugzilla.suse.com/1017311">SUSE bug 1017311</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202241" comment="ImageMagick-6.4.3.6-7.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209112" comment="libMagickCore1-6.4.3.6-7.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209113" comment="libMagickCore1-32bit-6.4.3.6-7.65 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10050</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10050" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10050" source="CVE"/>
    <description>
    Heap-based buffer overflow in the ReadRLEImage function in coders/rle.c in ImageMagick 6.9.4-8 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted RLE file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10050.html">CVE-2016-10050</cve>
<bugzilla href="https://bugzilla.suse.com/1017312">SUSE bug 1017312</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202248" comment="ImageMagick-6.4.3.6-7.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209114" comment="libMagickCore1-6.4.3.6-7.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209115" comment="libMagickCore1-32bit-6.4.3.6-7.77 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10051</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10051" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10051" source="CVE"/>
    <description>
    Use-after-free vulnerability in the ReadPWPImage function in coders/pwp.c in ImageMagick 6.9.5-5 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10051.html">CVE-2016-10051</cve>
<bugzilla href="https://bugzilla.suse.com/1017313">SUSE bug 1017313</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202241" comment="ImageMagick-6.4.3.6-7.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209112" comment="libMagickCore1-6.4.3.6-7.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209113" comment="libMagickCore1-32bit-6.4.3.6-7.65 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10052</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10052" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10052" source="CVE"/>
    <description>
    Buffer overflow in the WriteProfile function in coders/jpeg.c in ImageMagick before 6.9.5-6 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10052.html">CVE-2016-10052</cve>
<bugzilla href="https://bugzilla.suse.com/1017314">SUSE bug 1017314</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202241" comment="ImageMagick-6.4.3.6-7.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209112" comment="libMagickCore1-6.4.3.6-7.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209113" comment="libMagickCore1-32bit-6.4.3.6-7.65 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10059</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10059" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10059" source="CVE"/>
    <description>
    Buffer overflow in coders/tiff.c in ImageMagick before 6.9.4-1 allows remote attackers to cause a denial of service (application crash) or have unspecified other impact via a crafted TIFF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10059.html">CVE-2016-10059</cve>
<bugzilla href="https://bugzilla.suse.com/1017318">SUSE bug 1017318</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202241" comment="ImageMagick-6.4.3.6-7.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209112" comment="libMagickCore1-6.4.3.6-7.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209113" comment="libMagickCore1-32bit-6.4.3.6-7.65 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10060</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10060" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10060" source="CVE"/>
    <description>
    The ConcatenateImages function in MagickWand/magick-cli.c in ImageMagick before 7.0.1-10 does not check the return value of the fputc function, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10060.html">CVE-2016-10060</cve>
<bugzilla href="https://bugzilla.suse.com/1017319">SUSE bug 1017319</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202241" comment="ImageMagick-6.4.3.6-7.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209112" comment="libMagickCore1-6.4.3.6-7.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209113" comment="libMagickCore1-32bit-6.4.3.6-7.65 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10063</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10063" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10063" source="CVE"/>
    <description>
    Buffer overflow in coders/tiff.c in ImageMagick before 6.9.5-1 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file, related to extend validity.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10063.html">CVE-2016-10063</cve>
<bugzilla href="https://bugzilla.suse.com/1016589">SUSE bug 1016589</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1017320">SUSE bug 1017320</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202241" comment="ImageMagick-6.4.3.6-7.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209112" comment="libMagickCore1-6.4.3.6-7.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209113" comment="libMagickCore1-32bit-6.4.3.6-7.65 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10064</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10064" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10064" source="CVE"/>
    <description>
    Buffer overflow in coders/tiff.c in ImageMagick before 6.9.5-1 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10064.html">CVE-2016-10064</cve>
<bugzilla href="https://bugzilla.suse.com/1016590">SUSE bug 1016590</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1017321">SUSE bug 1017321</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202241" comment="ImageMagick-6.4.3.6-7.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209112" comment="libMagickCore1-6.4.3.6-7.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209113" comment="libMagickCore1-32bit-6.4.3.6-7.65 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10065</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10065" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10065" source="CVE"/>
    <description>
    The ReadVIFFImage function in coders/viff.c in ImageMagick before 7.0.1-0 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10065.html">CVE-2016-10065</cve>
<bugzilla href="https://bugzilla.suse.com/1016591">SUSE bug 1016591</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1017322">SUSE bug 1017322</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202241" comment="ImageMagick-6.4.3.6-7.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209112" comment="libMagickCore1-6.4.3.6-7.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209113" comment="libMagickCore1-32bit-6.4.3.6-7.65 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10068</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10068" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10068" source="CVE"/>
    <description>
    The MSL interpreter in ImageMagick before 6.9.6-4 allows remote attackers to cause a denial of service (segmentation fault and application crash) via a crafted XML file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10068.html">CVE-2016-10068</cve>
<bugzilla href="https://bugzilla.suse.com/1017324">SUSE bug 1017324</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202241" comment="ImageMagick-6.4.3.6-7.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209112" comment="libMagickCore1-6.4.3.6-7.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209113" comment="libMagickCore1-32bit-6.4.3.6-7.65 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10070</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10070" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10070" source="CVE"/>
    <description>
    Heap-based buffer overflow in the CalcMinMax function in coders/mat.c in ImageMagick before 6.9.4-0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted mat file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10070.html">CVE-2016-10070</cve>
<bugzilla href="https://bugzilla.suse.com/1017326">SUSE bug 1017326</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202241" comment="ImageMagick-6.4.3.6-7.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209112" comment="libMagickCore1-6.4.3.6-7.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209113" comment="libMagickCore1-32bit-6.4.3.6-7.65 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10071</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10071" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10071" source="CVE"/>
    <description>
    coders/mat.c in ImageMagick before 6.9.4-0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted mat file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10071.html">CVE-2016-10071</cve>
<bugzilla href="https://bugzilla.suse.com/1017326">SUSE bug 1017326</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202241" comment="ImageMagick-6.4.3.6-7.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209112" comment="libMagickCore1-6.4.3.6-7.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209113" comment="libMagickCore1-32bit-6.4.3.6-7.65 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10087</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10087" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10087" source="CVE"/>
    <description>
    The png_set_text_2 function in libpng 0.71 before 1.0.67, 1.2.x before 1.2.57, 1.4.x before 1.4.20, 1.5.x before 1.5.28, and 1.6.x before 1.6.27 allows context-dependent attackers to cause a NULL pointer dereference vectors involving loading a text chunk into a png structure, removing the text, and then adding another text chunk to the structure.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10087.html">CVE-2016-10087</cve>
<bugzilla href="https://bugzilla.suse.com/1017646">SUSE bug 1017646</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1149680">SUSE bug 1149680</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202855" comment="libpng12-0-1.2.31-5.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209922" comment="libpng12-0-32bit-1.2.31-5.43 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10088</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-10088" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10088" source="CVE"/>
    <description>
    The sg implementation in the Linux kernel through 4.9 does not properly restrict write operations in situations where the KERNEL_DS option is set, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10088.html">CVE-2016-10088</cve>
<bugzilla href="https://bugzilla.suse.com/1013604">SUSE bug 1013604</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1014271">SUSE bug 1014271</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1017710">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1019079">SUSE bug 1019079</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208770" comment="kernel-default-man-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205650" comment="kernel-pae-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205651" comment="kernel-pae-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205652" comment="kernel-pae-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10089</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10089" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10089" source="CVE"/>
    <description>
    Nagios 4.3.2 and earlier allows local users to gain root privileges via a hard link attack on the Nagios init script file, related to CVE-2016-8641.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10089.html">CVE-2016-10089</cve>
<bugzilla href="https://bugzilla.suse.com/1011630">SUSE bug 1011630</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1018047">SUSE bug 1018047</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009237466" comment="nagios-3.0.6-1.25.36.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237468" comment="nagios-www-3.0.6-1.25.36.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10092</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10092" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092" source="CVE"/>
    <description>
    Heap-based buffer overflow in the readContigStripsIntoBuffer function in tif_unix.c in LibTIFF 4.0.7 allows remote attackers to have unspecified impact via a crafted image.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10092.html">CVE-2016-10092</cve>
<bugzilla href="https://bugzilla.suse.com/1017693">SUSE bug 1017693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1122679">SUSE bug 1122679</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009241792" comment="libtiff3-3.8.2-141.169.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241793" comment="libtiff3-32bit-3.8.2-141.169.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241790" comment="tiff-3.8.2-141.169.26 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10093</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10093" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093" source="CVE"/>
    <description>
    Integer overflow in tools/tiffcp.c in LibTIFF 4.0.7 allows remote attackers to have unspecified impact via a crafted image, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10093.html">CVE-2016-10093</cve>
<bugzilla href="https://bugzilla.suse.com/1017693">SUSE bug 1017693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1122679">SUSE bug 1122679</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009241792" comment="libtiff3-3.8.2-141.169.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241793" comment="libtiff3-32bit-3.8.2-141.169.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241790" comment="tiff-3.8.2-141.169.26 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10094</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10094" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094" source="CVE"/>
    <description>
    Off-by-one error in the t2p_readwrite_pdf_image_tile function in tools/tiff2pdf.c in LibTIFF 4.0.7 allows remote attackers to have unspecified impact via a crafted image.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10094.html">CVE-2016-10094</cve>
<bugzilla href="https://bugzilla.suse.com/1017693">SUSE bug 1017693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1122679">SUSE bug 1122679</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009241792" comment="libtiff3-3.8.2-141.169.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241793" comment="libtiff3-32bit-3.8.2-141.169.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241790" comment="tiff-3.8.2-141.169.26 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10095</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10095" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10095" source="CVE"/>
    <description>
    Stack-based buffer overflow in the _TIFFVGetField function in tif_dir.c in LibTIFF 4.0.7 allows remote attackers to cause a denial of service (crash) via a crafted TIFF file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10095.html">CVE-2016-10095</cve>
<bugzilla href="https://bugzilla.suse.com/1017690">SUSE bug 1017690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/960341">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/983436">SUSE bug 983436</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009229551" comment="libtiff3-3.8.2-141.169.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229568" comment="libtiff3-32bit-3.8.2-141.169.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229522" comment="tiff-3.8.2-141.169.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10144</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10144" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10144" source="CVE"/>
    <description>
    coders/ipl.c in ImageMagick allows remote attackers to have unspecific impact by leveraging a missing malloc check.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10144.html">CVE-2016-10144</cve>
<bugzilla href="https://bugzilla.suse.com/1020433">SUSE bug 1020433</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202241" comment="ImageMagick-6.4.3.6-7.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209112" comment="libMagickCore1-6.4.3.6-7.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209113" comment="libMagickCore1-32bit-6.4.3.6-7.65 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10145</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10145" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10145" source="CVE"/>
    <description>
    Off-by-one error in coders/wpg.c in ImageMagick allows remote attackers to have unspecified impact via vectors related to a string copy.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10145.html">CVE-2016-10145</cve>
<bugzilla href="https://bugzilla.suse.com/1020435">SUSE bug 1020435</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202241" comment="ImageMagick-6.4.3.6-7.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209112" comment="libMagickCore1-6.4.3.6-7.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209113" comment="libMagickCore1-32bit-6.4.3.6-7.65 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10146" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10146" source="CVE"/>
    <description>
    Multiple memory leaks in the caption and label handling code in ImageMagick allow remote attackers to cause a denial of service (memory consumption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10146.html">CVE-2016-10146</cve>
<bugzilla href="https://bugzilla.suse.com/1020443">SUSE bug 1020443</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202241" comment="ImageMagick-6.4.3.6-7.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209112" comment="libMagickCore1-6.4.3.6-7.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209113" comment="libMagickCore1-32bit-6.4.3.6-7.65 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-10155" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10155" source="CVE"/>
    <description>
    Memory leak in hw/watchdog/wdt_i6300esb.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10155.html">CVE-2016-10155</cve>
<bugzilla href="https://bugzilla.suse.com/1021129">SUSE bug 1021129</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1024183">SUSE bug 1024183</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205626" comment="kvm-1.4.2-53.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205957" comment="xen-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209062" comment="xen-doc-html-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209063" comment="xen-doc-pdf-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205958" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205959" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205960" comment="xen-libs-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209064" comment="xen-libs-32bit-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209065" comment="xen-tools-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205961" comment="xen-tools-domU-4.2.5_21-35 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205626" comment="kvm-1.4.2-53.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250412" comment="xen-4.2.5_21-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250413" comment="xen-doc-html-4.2.5_21-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250414" comment="xen-doc-pdf-4.2.5_21-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250415" comment="xen-kmp-default-4.2.5_21_3.0.101_0.116.TDC-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250416" comment="xen-libs-4.2.5_21-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250417" comment="xen-tools-4.2.5_21-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250418" comment="xen-tools-domU-4.2.5_21-37 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205957" comment="xen-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209062" comment="xen-doc-html-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209063" comment="xen-doc-pdf-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205958" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205960" comment="xen-libs-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209064" comment="xen-libs-32bit-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209065" comment="xen-tools-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205961" comment="xen-tools-domU-4.2.5_21-35 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10158</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-10158" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10158" source="CVE"/>
    <description>
    The exif_convert_any_to_int function in ext/exif/exif.c in PHP before 5.6.30, 7.0.x before 7.0.15, and 7.1.x before 7.1.1 allows remote attackers to cause a denial of service (application crash) via crafted EXIF data that triggers an attempt to divide the minimum representable negative integer by -1.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10158.html">CVE-2016-10158</cve>
<bugzilla href="https://bugzilla.suse.com/1022219">SUSE bug 1022219</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205743" comment="apache2-mod_php53-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203312" comment="php53-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205744" comment="php53-bcmath-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205745" comment="php53-bz2-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205746" comment="php53-calendar-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205747" comment="php53-ctype-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205748" comment="php53-curl-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205749" comment="php53-dba-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205750" comment="php53-dom-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205751" comment="php53-exif-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205752" comment="php53-fastcgi-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205753" comment="php53-fileinfo-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205754" comment="php53-ftp-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205755" comment="php53-gd-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205756" comment="php53-gettext-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205757" comment="php53-gmp-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205758" comment="php53-iconv-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205759" comment="php53-intl-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205760" comment="php53-json-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205761" comment="php53-ldap-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205762" comment="php53-mbstring-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205763" comment="php53-mcrypt-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205764" comment="php53-mysql-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205765" comment="php53-odbc-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205766" comment="php53-openssl-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205767" comment="php53-pcntl-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205768" comment="php53-pdo-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205769" comment="php53-pear-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205770" comment="php53-pgsql-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205771" comment="php53-pspell-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205772" comment="php53-shmop-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205773" comment="php53-snmp-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205774" comment="php53-soap-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205775" comment="php53-suhosin-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205776" comment="php53-sysvmsg-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205777" comment="php53-sysvsem-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205778" comment="php53-sysvshm-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205779" comment="php53-tokenizer-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205780" comment="php53-wddx-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205781" comment="php53-xmlreader-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205782" comment="php53-xmlrpc-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205783" comment="php53-xmlwriter-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205784" comment="php53-xsl-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205785" comment="php53-zip-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205786" comment="php53-zlib-5.3.17-101 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10159</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-10159" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10159" source="CVE"/>
    <description>
    Integer overflow in the phar_parse_pharfile function in ext/phar/phar.c in PHP before 5.6.30 and 7.0.x before 7.0.15 allows remote attackers to cause a denial of service (memory consumption or application crash) via a truncated manifest entry in a PHAR archive.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10159.html">CVE-2016-10159</cve>
<bugzilla href="https://bugzilla.suse.com/1022255">SUSE bug 1022255</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1048094">SUSE bug 1048094</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205743" comment="apache2-mod_php53-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203312" comment="php53-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205744" comment="php53-bcmath-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205745" comment="php53-bz2-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205746" comment="php53-calendar-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205747" comment="php53-ctype-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205748" comment="php53-curl-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205749" comment="php53-dba-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205750" comment="php53-dom-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205751" comment="php53-exif-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205752" comment="php53-fastcgi-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205753" comment="php53-fileinfo-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205754" comment="php53-ftp-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205755" comment="php53-gd-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205756" comment="php53-gettext-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205757" comment="php53-gmp-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205758" comment="php53-iconv-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205759" comment="php53-intl-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205760" comment="php53-json-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205761" comment="php53-ldap-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205762" comment="php53-mbstring-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205763" comment="php53-mcrypt-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205764" comment="php53-mysql-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205765" comment="php53-odbc-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205766" comment="php53-openssl-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205767" comment="php53-pcntl-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205768" comment="php53-pdo-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205769" comment="php53-pear-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205770" comment="php53-pgsql-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205771" comment="php53-pspell-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205772" comment="php53-shmop-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205773" comment="php53-snmp-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205774" comment="php53-soap-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205775" comment="php53-suhosin-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205776" comment="php53-sysvmsg-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205777" comment="php53-sysvsem-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205778" comment="php53-sysvshm-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205779" comment="php53-tokenizer-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205780" comment="php53-wddx-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205781" comment="php53-xmlreader-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205782" comment="php53-xmlrpc-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205783" comment="php53-xmlwriter-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205784" comment="php53-xsl-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205785" comment="php53-zip-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205786" comment="php53-zlib-5.3.17-101 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10160</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-10160" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10160" source="CVE"/>
    <description>
    Off-by-one error in the phar_parse_pharfile function in ext/phar/phar.c in PHP before 5.6.30 and 7.0.x before 7.0.15 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted PHAR archive with an alias mismatch.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10160.html">CVE-2016-10160</cve>
<bugzilla href="https://bugzilla.suse.com/1022257">SUSE bug 1022257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1048094">SUSE bug 1048094</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205743" comment="apache2-mod_php53-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203312" comment="php53-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205744" comment="php53-bcmath-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205745" comment="php53-bz2-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205746" comment="php53-calendar-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205747" comment="php53-ctype-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205748" comment="php53-curl-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205749" comment="php53-dba-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205750" comment="php53-dom-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205751" comment="php53-exif-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205752" comment="php53-fastcgi-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205753" comment="php53-fileinfo-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205754" comment="php53-ftp-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205755" comment="php53-gd-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205756" comment="php53-gettext-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205757" comment="php53-gmp-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205758" comment="php53-iconv-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205759" comment="php53-intl-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205760" comment="php53-json-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205761" comment="php53-ldap-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205762" comment="php53-mbstring-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205763" comment="php53-mcrypt-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205764" comment="php53-mysql-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205765" comment="php53-odbc-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205766" comment="php53-openssl-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205767" comment="php53-pcntl-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205768" comment="php53-pdo-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205769" comment="php53-pear-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205770" comment="php53-pgsql-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205771" comment="php53-pspell-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205772" comment="php53-shmop-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205773" comment="php53-snmp-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205774" comment="php53-soap-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205775" comment="php53-suhosin-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205776" comment="php53-sysvmsg-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205777" comment="php53-sysvsem-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205778" comment="php53-sysvshm-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205779" comment="php53-tokenizer-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205780" comment="php53-wddx-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205781" comment="php53-xmlreader-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205782" comment="php53-xmlrpc-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205783" comment="php53-xmlwriter-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205784" comment="php53-xsl-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205785" comment="php53-zip-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205786" comment="php53-zlib-5.3.17-101 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10161</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-10161" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10161" source="CVE"/>
    <description>
    The object_common1 function in ext/standard/var_unserializer.c in PHP before 5.6.30, 7.0.x before 7.0.15, and 7.1.x before 7.1.1 allows remote attackers to cause a denial of service (buffer over-read and application crash) via crafted serialized data that is mishandled in a finish_nested_data call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10161.html">CVE-2016-10161</cve>
<bugzilla href="https://bugzilla.suse.com/1022260">SUSE bug 1022260</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205743" comment="apache2-mod_php53-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203312" comment="php53-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205744" comment="php53-bcmath-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205745" comment="php53-bz2-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205746" comment="php53-calendar-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205747" comment="php53-ctype-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205748" comment="php53-curl-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205749" comment="php53-dba-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205750" comment="php53-dom-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205751" comment="php53-exif-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205752" comment="php53-fastcgi-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205753" comment="php53-fileinfo-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205754" comment="php53-ftp-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205755" comment="php53-gd-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205756" comment="php53-gettext-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205757" comment="php53-gmp-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205758" comment="php53-iconv-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205759" comment="php53-intl-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205760" comment="php53-json-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205761" comment="php53-ldap-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205762" comment="php53-mbstring-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205763" comment="php53-mcrypt-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205764" comment="php53-mysql-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205765" comment="php53-odbc-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205766" comment="php53-openssl-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205767" comment="php53-pcntl-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205768" comment="php53-pdo-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205769" comment="php53-pear-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205770" comment="php53-pgsql-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205771" comment="php53-pspell-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205772" comment="php53-shmop-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205773" comment="php53-snmp-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205774" comment="php53-soap-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205775" comment="php53-suhosin-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205776" comment="php53-sysvmsg-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205777" comment="php53-sysvsem-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205778" comment="php53-sysvshm-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205779" comment="php53-tokenizer-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205780" comment="php53-wddx-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205781" comment="php53-xmlreader-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205782" comment="php53-xmlrpc-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205783" comment="php53-xmlwriter-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205784" comment="php53-xsl-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205785" comment="php53-zip-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205786" comment="php53-zlib-5.3.17-101 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10164</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10164" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10164" source="CVE"/>
    <description>
    Multiple integer overflows in libXpm before 3.5.12, when a program requests parsing XPM extensions on a 64-bit platform, allow remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via (1) the number of extensions or (2) their concatenated length in a crafted XPM file, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10164.html">CVE-2016-10164</cve>
<bugzilla href="https://bugzilla.suse.com/1021315">SUSE bug 1021315</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123144">SUSE bug 1123144</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203683" comment="xorg-x11-libXpm-7.4-3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210981" comment="xorg-x11-libXpm-32bit-7.4-3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10165</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10165" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10165" source="CVE"/>
    <description>
    The Type_MLU_Read function in cmstypes.c in Little CMS (aka lcms2) allows remote attackers to obtain sensitive information or cause a denial of service via an image with a crafted ICC profile, which triggers an out-of-bounds heap read.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10165.html">CVE-2016-10165</cve>
<bugzilla href="https://bugzilla.suse.com/1021364">SUSE bug 1021364</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1064069">SUSE bug 1064069</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205407" comment="java-1_7_0-ibm-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205408" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205409" comment="java-1_7_0-ibm-devel-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205410" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205411" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.15-65.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205407" comment="java-1_7_0-ibm-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205408" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205410" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205411" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.15-65.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10166</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-10166" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166" source="CVE"/>
    <description>
    Integer underflow in the _gdContributionsAlloc function in gd_interpolation.c in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to have unspecified impact via vectors related to decrementing the u variable.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10166.html">CVE-2016-10166</cve>
<bugzilla href="https://bugzilla.suse.com/1022069">SUSE bug 1022069</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1022263">SUSE bug 1022263</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205743" comment="apache2-mod_php53-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203312" comment="php53-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205744" comment="php53-bcmath-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205745" comment="php53-bz2-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205746" comment="php53-calendar-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205747" comment="php53-ctype-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205748" comment="php53-curl-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205749" comment="php53-dba-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205750" comment="php53-dom-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205751" comment="php53-exif-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205752" comment="php53-fastcgi-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205753" comment="php53-fileinfo-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205754" comment="php53-ftp-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205755" comment="php53-gd-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205756" comment="php53-gettext-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205757" comment="php53-gmp-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205758" comment="php53-iconv-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205759" comment="php53-intl-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205760" comment="php53-json-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205761" comment="php53-ldap-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205762" comment="php53-mbstring-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205763" comment="php53-mcrypt-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205764" comment="php53-mysql-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205765" comment="php53-odbc-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205766" comment="php53-openssl-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205767" comment="php53-pcntl-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205768" comment="php53-pdo-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205769" comment="php53-pear-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205770" comment="php53-pgsql-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205771" comment="php53-pspell-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205772" comment="php53-shmop-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205773" comment="php53-snmp-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205774" comment="php53-soap-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205775" comment="php53-suhosin-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205776" comment="php53-sysvmsg-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205777" comment="php53-sysvsem-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205778" comment="php53-sysvshm-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205779" comment="php53-tokenizer-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205780" comment="php53-wddx-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205781" comment="php53-xmlreader-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205782" comment="php53-xmlrpc-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205783" comment="php53-xmlwriter-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205784" comment="php53-xsl-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205785" comment="php53-zip-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205786" comment="php53-zlib-5.3.17-101 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10167</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-10167" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167" source="CVE"/>
    <description>
    The gdImageCreateFromGd2Ctx function in gd_gd2.c in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to cause a denial of service (application crash) via a crafted image file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10167.html">CVE-2016-10167</cve>
<bugzilla href="https://bugzilla.suse.com/1022069">SUSE bug 1022069</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1022264">SUSE bug 1022264</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205743" comment="apache2-mod_php53-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202616" comment="gd-2.0.36.RC1-52.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203312" comment="php53-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205744" comment="php53-bcmath-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205745" comment="php53-bz2-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205746" comment="php53-calendar-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205747" comment="php53-ctype-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205748" comment="php53-curl-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205749" comment="php53-dba-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205750" comment="php53-dom-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205751" comment="php53-exif-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205752" comment="php53-fastcgi-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205753" comment="php53-fileinfo-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205754" comment="php53-ftp-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205755" comment="php53-gd-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205756" comment="php53-gettext-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205757" comment="php53-gmp-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205758" comment="php53-iconv-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205759" comment="php53-intl-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205760" comment="php53-json-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205761" comment="php53-ldap-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205762" comment="php53-mbstring-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205763" comment="php53-mcrypt-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205764" comment="php53-mysql-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205765" comment="php53-odbc-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205766" comment="php53-openssl-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205767" comment="php53-pcntl-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205768" comment="php53-pdo-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205769" comment="php53-pear-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205770" comment="php53-pgsql-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205771" comment="php53-pspell-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205772" comment="php53-shmop-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205773" comment="php53-snmp-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205774" comment="php53-soap-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205775" comment="php53-suhosin-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205776" comment="php53-sysvmsg-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205777" comment="php53-sysvsem-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205778" comment="php53-sysvshm-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205779" comment="php53-tokenizer-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205780" comment="php53-wddx-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205781" comment="php53-xmlreader-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205782" comment="php53-xmlrpc-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205783" comment="php53-xmlwriter-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205784" comment="php53-xsl-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205785" comment="php53-zip-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205786" comment="php53-zlib-5.3.17-101 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205743" comment="apache2-mod_php53-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203312" comment="php53-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205744" comment="php53-bcmath-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205745" comment="php53-bz2-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205746" comment="php53-calendar-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205747" comment="php53-ctype-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205748" comment="php53-curl-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205749" comment="php53-dba-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205750" comment="php53-dom-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205751" comment="php53-exif-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205752" comment="php53-fastcgi-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205753" comment="php53-fileinfo-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205754" comment="php53-ftp-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205755" comment="php53-gd-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205756" comment="php53-gettext-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205757" comment="php53-gmp-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205758" comment="php53-iconv-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205759" comment="php53-intl-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205760" comment="php53-json-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205761" comment="php53-ldap-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205762" comment="php53-mbstring-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205763" comment="php53-mcrypt-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205764" comment="php53-mysql-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205765" comment="php53-odbc-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205766" comment="php53-openssl-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205767" comment="php53-pcntl-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205768" comment="php53-pdo-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205769" comment="php53-pear-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205770" comment="php53-pgsql-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205771" comment="php53-pspell-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205772" comment="php53-shmop-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205773" comment="php53-snmp-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205774" comment="php53-soap-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205775" comment="php53-suhosin-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205776" comment="php53-sysvmsg-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205777" comment="php53-sysvsem-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205778" comment="php53-sysvshm-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205779" comment="php53-tokenizer-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205780" comment="php53-wddx-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205781" comment="php53-xmlreader-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205782" comment="php53-xmlrpc-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205783" comment="php53-xmlwriter-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205784" comment="php53-xsl-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205785" comment="php53-zip-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205786" comment="php53-zlib-5.3.17-101 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10168</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-10168" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168" source="CVE"/>
    <description>
    Integer overflow in gd_io.c in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to have unspecified impact via vectors involving the number of horizontal and vertical chunks in an image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10168.html">CVE-2016-10168</cve>
<bugzilla href="https://bugzilla.suse.com/1022069">SUSE bug 1022069</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1022265">SUSE bug 1022265</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205743" comment="apache2-mod_php53-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203312" comment="php53-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205744" comment="php53-bcmath-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205745" comment="php53-bz2-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205746" comment="php53-calendar-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205747" comment="php53-ctype-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205748" comment="php53-curl-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205749" comment="php53-dba-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205750" comment="php53-dom-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205751" comment="php53-exif-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205752" comment="php53-fastcgi-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205753" comment="php53-fileinfo-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205754" comment="php53-ftp-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205755" comment="php53-gd-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205756" comment="php53-gettext-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205757" comment="php53-gmp-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205758" comment="php53-iconv-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205759" comment="php53-intl-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205760" comment="php53-json-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205761" comment="php53-ldap-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205762" comment="php53-mbstring-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205763" comment="php53-mcrypt-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205764" comment="php53-mysql-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205765" comment="php53-odbc-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205766" comment="php53-openssl-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205767" comment="php53-pcntl-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205768" comment="php53-pdo-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205769" comment="php53-pear-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205770" comment="php53-pgsql-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205771" comment="php53-pspell-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205772" comment="php53-shmop-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205773" comment="php53-snmp-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205774" comment="php53-soap-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205775" comment="php53-suhosin-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205776" comment="php53-sysvmsg-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205777" comment="php53-sysvsem-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205778" comment="php53-sysvshm-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205779" comment="php53-tokenizer-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205780" comment="php53-wddx-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205781" comment="php53-xmlreader-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205782" comment="php53-xmlrpc-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205783" comment="php53-xmlwriter-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205784" comment="php53-xsl-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205785" comment="php53-zip-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205786" comment="php53-zlib-5.3.17-101 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210532" comment="apache2-mod_php53-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202616" comment="gd-2.0.36.RC1-52.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203336" comment="php53-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210533" comment="php53-bcmath-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210534" comment="php53-bz2-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210535" comment="php53-calendar-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210536" comment="php53-ctype-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210537" comment="php53-curl-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210538" comment="php53-dba-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210539" comment="php53-dom-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210540" comment="php53-exif-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210541" comment="php53-fastcgi-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210542" comment="php53-fileinfo-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210543" comment="php53-ftp-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210544" comment="php53-gd-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210545" comment="php53-gettext-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210546" comment="php53-gmp-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210547" comment="php53-iconv-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210548" comment="php53-intl-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210549" comment="php53-json-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210550" comment="php53-ldap-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210551" comment="php53-mbstring-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210552" comment="php53-mcrypt-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210553" comment="php53-mysql-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210554" comment="php53-odbc-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210555" comment="php53-openssl-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210556" comment="php53-pcntl-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210557" comment="php53-pdo-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210558" comment="php53-pear-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210559" comment="php53-pgsql-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210560" comment="php53-pspell-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210561" comment="php53-shmop-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210562" comment="php53-snmp-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210563" comment="php53-soap-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210564" comment="php53-suhosin-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210565" comment="php53-sysvmsg-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210566" comment="php53-sysvsem-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210567" comment="php53-sysvshm-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210568" comment="php53-tokenizer-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210569" comment="php53-wddx-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210570" comment="php53-xmlreader-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210571" comment="php53-xmlrpc-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210572" comment="php53-xmlwriter-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210573" comment="php53-xsl-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210574" comment="php53-zip-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210575" comment="php53-zlib-5.3.17-112.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10169</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10169" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10169" source="CVE"/>
    <description>
    The read_code function in read_words.c in Wavpack before 5.1.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WV file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10169.html">CVE-2016-10169</cve>
<bugzilla href="https://bugzilla.suse.com/1021483">SUSE bug 1021483</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210871" comment="libwavpack1-4.50.1-1.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203580" comment="wavpack-4.50.1-1.27 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10170</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10170" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10170" source="CVE"/>
    <description>
    The WriteCaffHeader function in cli/caff.c in Wavpack before 5.1.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WV file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10170.html">CVE-2016-10170</cve>
<bugzilla href="https://bugzilla.suse.com/1021483">SUSE bug 1021483</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210871" comment="libwavpack1-4.50.1-1.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203580" comment="wavpack-4.50.1-1.27 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10171</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10171" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10171" source="CVE"/>
    <description>
    The unreorder_channels function in cli/wvunpack.c in Wavpack before 5.1.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WV file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10171.html">CVE-2016-10171</cve>
<bugzilla href="https://bugzilla.suse.com/1021483">SUSE bug 1021483</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210871" comment="libwavpack1-4.50.1-1.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203580" comment="wavpack-4.50.1-1.27 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10172</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10172" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10172" source="CVE"/>
    <description>
    The read_new_config_info function in open_utils.c in Wavpack before 5.1.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WV file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10172.html">CVE-2016-10172</cve>
<bugzilla href="https://bugzilla.suse.com/1021483">SUSE bug 1021483</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210871" comment="libwavpack1-4.50.1-1.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203580" comment="wavpack-4.50.1-1.27 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10195</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10195" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10195" source="CVE"/>
    <description>
    The name_parse function in evdns.c in libevent before 2.1.6-beta allows remote attackers to have unspecified impact via vectors involving the label_len variable, which triggers an out-of-bounds stack read.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10195.html">CVE-2016-10195</cve>
<bugzilla href="https://bugzilla.suse.com/1022917">SUSE bug 1022917</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1075618">SUSE bug 1075618</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123122">SUSE bug 1123122</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202826" comment="libevent-1.4.5-24.24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209902" comment="libevent-1_4-2-1.4.5-24.24.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10196</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10196" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10196" source="CVE"/>
    <description>
    Stack-based buffer overflow in the evutil_parse_sockaddr_port function in evutil.c in libevent before 2.1.6-beta allows attackers to cause a denial of service (segmentation fault) via vectors involving a long string in brackets in the ip_as_string argument.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10196.html">CVE-2016-10196</cve>
<bugzilla href="https://bugzilla.suse.com/1022918">SUSE bug 1022918</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1075618">SUSE bug 1075618</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202826" comment="libevent-1.4.5-24.24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209902" comment="libevent-1_4-2-1.4.5-24.24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10197</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10197" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10197" source="CVE"/>
    <description>
    The search_make_new function in evdns.c in libevent before 2.1.6-beta allows attackers to cause a denial of service (out-of-bounds read) via an empty hostname.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10197.html">CVE-2016-10197</cve>
<bugzilla href="https://bugzilla.suse.com/1022919">SUSE bug 1022919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1075618">SUSE bug 1075618</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123122">SUSE bug 1123122</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202826" comment="libevent-1.4.5-24.24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209902" comment="libevent-1_4-2-1.4.5-24.24.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10200</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10200" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10200" source="CVE"/>
    <description>
    Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel before 4.8.14 allows local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10200.html">CVE-2016-10200</cve>
<bugzilla href="https://bugzilla.suse.com/1027179">SUSE bug 1027179</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1028415">SUSE bug 1028415</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208691" comment="kernel-bigsmp-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208692" comment="kernel-bigsmp-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208693" comment="kernel-bigsmp-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205592" comment="kernel-default-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205593" comment="kernel-default-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205594" comment="kernel-default-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208694" comment="kernel-default-man-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205595" comment="kernel-ec2-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205596" comment="kernel-ec2-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205597" comment="kernel-ec2-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205598" comment="kernel-pae-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205599" comment="kernel-pae-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205600" comment="kernel-pae-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205601" comment="kernel-source-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205602" comment="kernel-syms-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205603" comment="kernel-trace-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205604" comment="kernel-trace-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205605" comment="kernel-trace-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205606" comment="kernel-xen-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205607" comment="kernel-xen-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205608" comment="kernel-xen-devel-3.0.101-0.47.106.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10219</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10219" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10219" source="CVE"/>
    <description>
    The intersect function in base/gxfill.c in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10219.html">CVE-2016-10219</cve>
<bugzilla href="https://bugzilla.suse.com/1032138">SUSE bug 1032138</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209272" comment="ghostscript-fonts-other-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209273" comment="ghostscript-fonts-rus-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209274" comment="ghostscript-fonts-std-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202638" comment="ghostscript-library-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209275" comment="ghostscript-omni-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209276" comment="ghostscript-x11-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209277" comment="libgimpprint-4.2.7-32.47.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10244</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10244" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244" source="CVE"/>
    <description>
    The parse_charstrings function in type1/t1load.c in FreeType 2 before 2.7 does not ensure that a font contains a glyph name, which allows remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10244.html">CVE-2016-10244</cve>
<bugzilla href="https://bugzilla.suse.com/1028103">SUSE bug 1028103</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202531" comment="freetype2-2.3.7-25.45.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209251" comment="freetype2-32bit-2.3.7-25.45.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209253" comment="ft2demos-2.3.7-25.45.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10251</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10251" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10251" source="CVE"/>
    <description>
    Integer overflow in the jpc_pi_nextcprl function in jpc_t2cod.c in JasPer before 1.900.20 allows remote attackers to have unspecified impact via a crafted file, which triggers use of an uninitialized value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10251.html">CVE-2016-10251</cve>
<bugzilla href="https://bugzilla.suse.com/1029497">SUSE bug 1029497</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202750" comment="jasper-1.900.14-134.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209370" comment="libjasper-1.900.14-134.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209371" comment="libjasper-32bit-1.900.14-134.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10254</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10254" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10254" source="CVE"/>
    <description>
    The allocate_elf function in common.h in elfutils before 0.168 allows remote attackers to cause a denial of service (crash) via a crafted ELF file, which triggers a memory allocation failure.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10254.html">CVE-2016-10254</cve>
<bugzilla href="https://bugzilla.suse.com/1030472">SUSE bug 1030472</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009256650" comment="elfutils-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256651" comment="libasm1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256652" comment="libasm1-32bit-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256653" comment="libdw1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256654" comment="libdw1-32bit-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256655" comment="libebl1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256656" comment="libebl1-32bit-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256657" comment="libelf1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256658" comment="libelf1-32bit-0.152-4.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10255</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10255" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10255" source="CVE"/>
    <description>
    The __libelf_set_rawdata_wrlock function in elf_getdata.c in elfutils before 0.168 allows remote attackers to cause a denial of service (crash) via a crafted (1) sh_off or (2) sh_size ELF header value, which triggers a memory allocation failure.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10255.html">CVE-2016-10255</cve>
<bugzilla href="https://bugzilla.suse.com/1030472">SUSE bug 1030472</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1030476">SUSE bug 1030476</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009256650" comment="elfutils-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256651" comment="libasm1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256652" comment="libasm1-32bit-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256653" comment="libdw1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256654" comment="libdw1-32bit-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256655" comment="libebl1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256656" comment="libebl1-32bit-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256657" comment="libelf1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256658" comment="libelf1-32bit-0.152-4.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10266</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10266" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10266" source="CVE"/>
    <description>
    LibTIFF 4.0.7 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image, related to libtiff/tif_read.c:351:22.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10266.html">CVE-2016-10266</cve>
<bugzilla href="https://bugzilla.suse.com/1017694">SUSE bug 1017694</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1031263">SUSE bug 1031263</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009229551" comment="libtiff3-3.8.2-141.169.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229568" comment="libtiff3-32bit-3.8.2-141.169.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229522" comment="tiff-3.8.2-141.169.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610267" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10267</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10267" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10267" source="CVE"/>
    <description>
    LibTIFF 4.0.7 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image, related to libtiff/tif_ojpeg.c:816:8.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10267.html">CVE-2016-10267</cve>
<bugzilla href="https://bugzilla.suse.com/1017694">SUSE bug 1017694</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1031262">SUSE bug 1031262</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210831" comment="libtiff3-3.8.2-141.169.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210832" comment="libtiff3-32bit-3.8.2-141.169.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203579" comment="tiff-3.8.2-141.169.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10268</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10268" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10268" source="CVE"/>
    <description>
    tools/tiffcp.c in LibTIFF 4.0.7 allows remote attackers to cause a denial of service (integer underflow and heap-based buffer under-read) or possibly have unspecified other impact via a crafted TIFF image, related to "READ of size 78490" and libtiff/tif_unix.c:115:23.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10268.html">CVE-2016-10268</cve>
<bugzilla href="https://bugzilla.suse.com/1017693">SUSE bug 1017693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1031255">SUSE bug 1031255</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210828" comment="libtiff3-3.8.2-141.169.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210829" comment="libtiff3-32bit-3.8.2-141.169.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203576" comment="tiff-3.8.2-141.169.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10269</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10269" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10269" source="CVE"/>
    <description>
    LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to "READ of size 512" and libtiff/tif_unix.c:340:2.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10269.html">CVE-2016-10269</cve>
<bugzilla href="https://bugzilla.suse.com/1017693">SUSE bug 1017693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1031254">SUSE bug 1031254</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210831" comment="libtiff3-3.8.2-141.169.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210832" comment="libtiff3-32bit-3.8.2-141.169.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203579" comment="tiff-3.8.2-141.169.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10270</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10270" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10270" source="CVE"/>
    <description>
    LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to "READ of size 8" and libtiff/tif_read.c:523:22.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10270.html">CVE-2016-10270</cve>
<bugzilla href="https://bugzilla.suse.com/1031250">SUSE bug 1031250</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210831" comment="libtiff3-3.8.2-141.169.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210832" comment="libtiff3-32bit-3.8.2-141.169.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203579" comment="tiff-3.8.2-141.169.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10328</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10328" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10328" source="CVE"/>
    <description>
    FreeType 2 before 2016-12-16 has an out-of-bounds write caused by a heap-based buffer overflow related to the cff_parser_run function in cff/cffparse.c.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10328.html">CVE-2016-10328</cve>
<bugzilla href="https://bugzilla.suse.com/1034191">SUSE bug 1034191</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123117">SUSE bug 1123117</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202534" comment="freetype2-2.3.7-25.45.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209254" comment="freetype2-32bit-2.3.7-25.45.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209256" comment="ft2demos-2.3.7-25.45.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10396</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10396" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10396" source="CVE"/>
    <description>
    The racoon daemon in IPsec-Tools 0.8.2 contains a remotely exploitable computational-complexity attack when parsing and storing ISAKMP fragments. The implementation permits a remote attacker to exhaust computational resources on the remote endpoint by repeatedly sending ISAKMP fragment packets in a particular order such that the worst-case computational complexity is realized in the algorithm utilized to determine if reassembly of the fragments can take place.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10396.html">CVE-2016-10396</cve>
<bugzilla href="https://bugzilla.suse.com/1047443">SUSE bug 1047443</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209364" comment="ipsec-tools-0.7.3-1.38.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10397</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10397" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10397" source="CVE"/>
    <description>
    In PHP before 5.6.28 and 7.x before 7.0.13, incorrect handling of various URI components in the URL parser could be used by attackers to bypass hostname-specific URL checks, as demonstrated by evil.example.com:80#@good.example.com/ and evil.example.com:80?@good.example.com/ inputs to the parse_url function (implemented in the php_url_parse_ex function in ext/standard/url.c).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10397.html">CVE-2016-10397</cve>
<bugzilla href="https://bugzilla.suse.com/1047454">SUSE bug 1047454</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210532" comment="apache2-mod_php53-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203336" comment="php53-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210533" comment="php53-bcmath-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210534" comment="php53-bz2-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210535" comment="php53-calendar-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210536" comment="php53-ctype-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210537" comment="php53-curl-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210538" comment="php53-dba-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210539" comment="php53-dom-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210540" comment="php53-exif-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210541" comment="php53-fastcgi-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210542" comment="php53-fileinfo-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210543" comment="php53-ftp-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210544" comment="php53-gd-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210545" comment="php53-gettext-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210546" comment="php53-gmp-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210547" comment="php53-iconv-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210548" comment="php53-intl-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210549" comment="php53-json-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210550" comment="php53-ldap-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210551" comment="php53-mbstring-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210552" comment="php53-mcrypt-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210553" comment="php53-mysql-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210554" comment="php53-odbc-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210555" comment="php53-openssl-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210556" comment="php53-pcntl-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210557" comment="php53-pdo-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210558" comment="php53-pear-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210559" comment="php53-pgsql-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210560" comment="php53-pspell-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210561" comment="php53-shmop-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210562" comment="php53-snmp-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210563" comment="php53-soap-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210564" comment="php53-suhosin-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210565" comment="php53-sysvmsg-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210566" comment="php53-sysvsem-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210567" comment="php53-sysvshm-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210568" comment="php53-tokenizer-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210569" comment="php53-wddx-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210570" comment="php53-xmlreader-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210571" comment="php53-xmlrpc-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210572" comment="php53-xmlwriter-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210573" comment="php53-xsl-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210574" comment="php53-zip-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210575" comment="php53-zlib-5.3.17-112.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10708</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10708" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10708" source="CVE"/>
    <description>
    sshd in OpenSSH before 7.4 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence NEWKEYS message, as demonstrated by Honggfuzz, related to kex.c and packet.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10708.html">CVE-2016-10708</cve>
<bugzilla href="https://bugzilla.suse.com/1076957">SUSE bug 1076957</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1087412">SUSE bug 1087412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1102768">SUSE bug 1102768</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009238396" comment="openssh-6.2p2-0.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238397" comment="openssh-askpass-6.2p2-0.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238398" comment="openssh-askpass-gnome-6.2p2-0.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234528" comment="openssh-openssl1-6.6p1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234529" comment="openssh-openssl1-helpers-6.6p1-19.3 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009238396" comment="openssh-6.2p2-0.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238397" comment="openssh-askpass-6.2p2-0.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238398" comment="openssh-askpass-gnome-6.2p2-0.41.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10712</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10712" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10712" source="CVE"/>
    <description>
    In PHP before 5.5.32, 5.6.x before 5.6.18, and 7.x before 7.0.3, all of the return values of stream_get_meta_data can be controlled if the input can be controlled (e.g., during file uploads). For example, a "$uri = stream_get_meta_data(fopen($file, "r"))['uri']" call mishandles the case where $file is data:text/plain;uri=eviluri, -- in other words, metadata can be set by an attacker.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10712.html">CVE-2016-10712</cve>
<bugzilla href="https://bugzilla.suse.com/1080234">SUSE bug 1080234</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205787" comment="apache2-mod_php53-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203352" comment="php53-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205788" comment="php53-bcmath-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205789" comment="php53-bz2-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205790" comment="php53-calendar-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205791" comment="php53-ctype-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205792" comment="php53-curl-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205793" comment="php53-dba-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205794" comment="php53-dom-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205795" comment="php53-exif-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205796" comment="php53-fastcgi-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205797" comment="php53-fileinfo-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205798" comment="php53-ftp-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205799" comment="php53-gd-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205800" comment="php53-gettext-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205801" comment="php53-gmp-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205802" comment="php53-iconv-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205803" comment="php53-intl-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205804" comment="php53-json-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205805" comment="php53-ldap-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205806" comment="php53-mbstring-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205807" comment="php53-mcrypt-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205808" comment="php53-mysql-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205809" comment="php53-odbc-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205810" comment="php53-openssl-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205811" comment="php53-pcntl-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205812" comment="php53-pdo-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205813" comment="php53-pear-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205814" comment="php53-pgsql-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205815" comment="php53-pspell-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205816" comment="php53-shmop-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205817" comment="php53-snmp-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205818" comment="php53-soap-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205819" comment="php53-suhosin-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205820" comment="php53-sysvmsg-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205821" comment="php53-sysvsem-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205822" comment="php53-sysvshm-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205823" comment="php53-tokenizer-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205824" comment="php53-wddx-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205825" comment="php53-xmlreader-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205826" comment="php53-xmlrpc-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205827" comment="php53-xmlwriter-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205828" comment="php53-xsl-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205829" comment="php53-zip-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205830" comment="php53-zlib-5.3.17-112.20 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10713</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10713" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10713" source="CVE"/>
    <description>
    An issue was discovered in GNU patch before 2.7.6. Out-of-bounds access within pch_write_line() in pch.c can possibly lead to DoS via a crafted input file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10713.html">CVE-2016-10713</cve>
<bugzilla href="https://bugzilla.suse.com/1080918">SUSE bug 1080918</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1101128">SUSE bug 1101128</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205697" comment="patch-2.5.9-252.22.7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10729</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10729" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10729" source="CVE"/>
    <description>
    An issue was discovered in Amanda 3.3.1. A user with backup privileges can trivially compromise a client installation. The "runtar" setuid root binary does not check for additional arguments supplied after --create, allowing users to manipulate commands and perform command injection as root.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10729.html">CVE-2016-10729</cve>
<bugzilla href="https://bugzilla.suse.com/1110797">SUSE bug 1110797</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1112916">SUSE bug 1112916</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241791" comment="amanda-2.5.2.1-188.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10741</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-10741" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10741" source="CVE"/>
    <description>
    In the Linux kernel before 4.9.3, fs/xfs/xfs_aops.c allows local users to cause a denial of service (system crash) because there is a race condition between direct and memory-mapped I/O (associated with a hole) that is handled with BUG_ON instead of an I/O failure.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10741.html">CVE-2016-10741</cve>
<bugzilla href="https://bugzilla.suse.com/1114920">SUSE bug 1114920</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1124010">SUSE bug 1124010</bugzilla>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:20161234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1234</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-1234" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1234" source="CVE"/>
    <description>
    Stack-based buffer overflow in the glob implementation in GNU C Library (aka glibc) before 2.24, when GLOB_ALTDIRFUNC is used, allows context-dependent attackers to cause a denial of service (crash) via a long name.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1234.html">CVE-2016-1234</cve>
<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/969727">SUSE bug 969727</bugzilla>
<bugzilla href="https://bugzilla.suse.com/988770">SUSE bug 988770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/988782">SUSE bug 988782</bugzilla>
<bugzilla href="https://bugzilla.suse.com/989127">SUSE bug 989127</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202691" comment="glibc-2.11.3-17.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209287" comment="glibc-32bit-2.11.3-17.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209288" comment="glibc-devel-2.11.3-17.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209289" comment="glibc-devel-32bit-2.11.3-17.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202692" comment="glibc-html-2.11.3-17.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209290" comment="glibc-i18ndata-2.11.3-17.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202693" comment="glibc-info-2.11.3-17.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209291" comment="glibc-locale-2.11.3-17.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209292" comment="glibc-locale-32bit-2.11.3-17.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209294" comment="glibc-profile-2.11.3-17.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209295" comment="glibc-profile-32bit-2.11.3-17.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209298" comment="nscd-2.11.3-17.102 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1238</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-1238" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1238" source="CVE"/>
    <description>
    (1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1238.html">CVE-2016-1238</cve>
<bugzilla href="https://bugzilla.suse.com/1108749">SUSE bug 1108749</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123389">SUSE bug 1123389</bugzilla>
<bugzilla href="https://bugzilla.suse.com/987887">SUSE bug 987887</bugzilla>
<bugzilla href="https://bugzilla.suse.com/988311">SUSE bug 988311</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203238" comment="perl-5.10.0-64.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210162" comment="perl-32bit-5.10.0-64.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210163" comment="perl-Module-Build-0.2808.01-0.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210164" comment="perl-Test-Simple-0.72-0.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210165" comment="perl-base-5.10.0-64.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210166" comment="perl-doc-5.10.0-64.80 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1245</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-1245" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1245" source="CVE"/>
    <description>
    It was discovered that the zebra daemon in Quagga before 1.0.20161017 suffered from a stack-based buffer overflow when processing IPv6 Neighbor Discovery messages. The root cause was relying on BUFSIZ to be compatible with a message size; however, BUFSIZ is system-dependent.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1245.html">CVE-2016-1245</cve>
<bugzilla href="https://bugzilla.suse.com/1005258">SUSE bug 1005258</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203424" comment="quagga-0.99.15-0.29 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1246</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-1246" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1246" source="CVE"/>
    <description>
    Buffer overflow in the DBD::mysql module before 4.037 for Perl allows context-dependent attackers to cause a denial of service (crash) via vectors related to an error message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1246.html">CVE-2016-1246</cve>
<bugzilla href="https://bugzilla.suse.com/1002626">SUSE bug 1002626</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203245" comment="perl-DBD-mysql-4.008-9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1248</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-1248" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1248" source="CVE"/>
    <description>
    vim before patch 8.0.0056 does not properly validate values for the 'filetype', 'syntax' and 'keymap' options, which may result in the execution of arbitrary code if a file with a specially crafted modeline is opened.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1248.html">CVE-2016-1248</cve>
<bugzilla href="https://bugzilla.suse.com/1010685">SUSE bug 1010685</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210862" comment="gvim-7.2-8.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210863" comment="vim-7.2-8.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210864" comment="vim-base-7.2-8.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210865" comment="vim-data-7.2-8.17 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1249</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-1249" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1249" source="CVE"/>
    <description>
    The DBD::mysql module before 4.039 for Perl, when using server-side prepared statement support, allows attackers to cause a denial of service (out-of-bounds read) via vectors involving an unaligned number of placeholders in WHERE condition and output fields in SELECT expression.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1249.html">CVE-2016-1249</cve>
<bugzilla href="https://bugzilla.suse.com/1010457">SUSE bug 1010457</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203245" comment="perl-DBD-mysql-4.008-9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1251</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-1251" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1251" source="CVE"/>
    <description>
    There is a vulnerability of type use-after-free affecting DBD::mysql (aka DBD-mysql or the Database Interface (DBI) MySQL driver for Perl) 3.x and 4.x before 4.041 when used with mysql_server_prepare=1.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1251.html">CVE-2016-1251</cve>
<bugzilla href="https://bugzilla.suse.com/1012546">SUSE bug 1012546</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203244" comment="perl-DBD-mysql-4.008-6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1285</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-1285" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1285" source="CVE"/>
    <description>
    named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 does not properly handle DNAME records when parsing fetch reply messages, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed packet to the rndc (aka control channel) interface, related to alist.c and sexpr.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1285.html">CVE-2016-1285</cve>
<bugzilla href="https://bugzilla.suse.com/970072">SUSE bug 970072</bugzilla>
<bugzilla href="https://bugzilla.suse.com/978322">SUSE bug 978322</bugzilla>
<bugzilla href="https://bugzilla.suse.com/981200">SUSE bug 981200</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202434" comment="bind-9.9.6P1-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207614" comment="bind-chrootenv-9.9.6P1-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207615" comment="bind-doc-9.9.6P1-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204981" comment="bind-libs-9.9.6P1-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204982" comment="bind-libs-32bit-9.9.6P1-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204983" comment="bind-utils-9.9.6P1-0.25 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215783" comment="bind-9.9.6P1-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215784" comment="bind-chrootenv-9.9.6P1-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215785" comment="bind-doc-9.9.6P1-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215786" comment="bind-libs-9.9.6P1-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215787" comment="bind-libs-32bit-9.9.6P1-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215788" comment="bind-utils-9.9.6P1-0.27 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1286</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-1286" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1286" source="CVE"/>
    <description>
    named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted signature record for a DNAME record, related to db.c and resolver.c.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1286.html">CVE-2016-1286</cve>
<bugzilla href="https://bugzilla.suse.com/970073">SUSE bug 970073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/978322">SUSE bug 978322</bugzilla>
<bugzilla href="https://bugzilla.suse.com/981200">SUSE bug 981200</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202434" comment="bind-9.9.6P1-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207614" comment="bind-chrootenv-9.9.6P1-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207615" comment="bind-doc-9.9.6P1-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204981" comment="bind-libs-9.9.6P1-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204982" comment="bind-libs-32bit-9.9.6P1-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204983" comment="bind-utils-9.9.6P1-0.25 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215783" comment="bind-9.9.6P1-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215784" comment="bind-chrootenv-9.9.6P1-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215785" comment="bind-doc-9.9.6P1-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215786" comment="bind-libs-9.9.6P1-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215787" comment="bind-libs-32bit-9.9.6P1-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215788" comment="bind-utils-9.9.6P1-0.27 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1523</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-1523" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1523" source="CVE"/>
    <description>
    The SillMap::readFace function in FeatureMap.cpp in Libgraphite in Graphite 2 1.2.4, as used in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.6.1, mishandles a return value, which allows remote attackers to cause a denial of service (missing initialization, NULL pointer dereference, and application crash) via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1523.html">CVE-2016-1523</cve>
<bugzilla href="https://bugzilla.suse.com/965803">SUSE bug 965803</bugzilla>
<bugzilla href="https://bugzilla.suse.com/965806">SUSE bug 965806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/965807">SUSE bug 965807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/965810">SUSE bug 965810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/967087">SUSE bug 967087</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202329" comment="MozillaFirefox-38.6.1esr-34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204965" comment="MozillaFirefox-translations-38.6.1esr-34 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-1547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547" source="CVE"/>
    <description>
    An off-path attacker can cause a preemptible client association to be demobilized in NTP 4.2.8p4 and earlier and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92 by sending a crypto NAK packet to a victim client with a spoofed source address of an existing associated peer. This is true even if authentication is enabled.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1547.html">CVE-2016-1547</cve>
<bugzilla href="https://bugzilla.suse.com/962784">SUSE bug 962784</bugzilla>
<bugzilla href="https://bugzilla.suse.com/977446">SUSE bug 977446</bugzilla>
<bugzilla href="https://bugzilla.suse.com/977459">SUSE bug 977459</bugzilla>
<bugzilla href="https://bugzilla.suse.com/982064">SUSE bug 982064</bugzilla>
<bugzilla href="https://bugzilla.suse.com/982065">SUSE bug 982065</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207907" comment="ntp-4.2.8p7-44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207908" comment="ntp-doc-4.2.8p7-44 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1548</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-1548" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548" source="CVE"/>
    <description>
    An attacker can spoof a packet from a legitimate ntpd server with an origin timestamp that matches the peer-&gt;dst timestamp recorded for that server. After making this switch, the client in NTP 4.2.8p4 and earlier and NTPSec aa48d001683e5b791a743ec9c575aaf7d867a2b0c will reject all future legitimate server responses. It is possible to force the victim client to move time after the mode has been changed. ntpq gives no indication that the mode has been switched.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1548.html">CVE-2016-1548</cve>
<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/977446">SUSE bug 977446</bugzilla>
<bugzilla href="https://bugzilla.suse.com/977461">SUSE bug 977461</bugzilla>
<bugzilla href="https://bugzilla.suse.com/982068">SUSE bug 982068</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207907" comment="ntp-4.2.8p7-44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207908" comment="ntp-doc-4.2.8p7-44 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1549</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-1549" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1549" source="CVE"/>
    <description>
    A malicious authenticated peer can create arbitrarily-many ephemeral associations in order to win the clock selection algorithm in ntpd in NTP 4.2.8p4 and earlier and NTPsec 3e160db8dc248a0bcb053b56a80167dc742d2b74 and a5fb34b9cc89b92a8fef2f459004865c93bb7f92 and modify a victim's clock.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1549.html">CVE-2016-1549</cve>
<bugzilla href="https://bugzilla.suse.com/1083424">SUSE bug 1083424</bugzilla>
<bugzilla href="https://bugzilla.suse.com/977446">SUSE bug 977446</bugzilla>
<bugzilla href="https://bugzilla.suse.com/977451">SUSE bug 977451</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207907" comment="ntp-4.2.8p7-44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207908" comment="ntp-doc-4.2.8p7-44 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009248666" comment="ntp-4.2.8p11-48.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248667" comment="ntp-doc-4.2.8p11-48.18 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1550</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-1550" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550" source="CVE"/>
    <description>
    An exploitable vulnerability exists in the message authentication functionality of libntp in ntp 4.2.8p4 and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92. An attacker can send a series of crafted messages to attempt to recover the message digest key.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1550.html">CVE-2016-1550</cve>
<bugzilla href="https://bugzilla.suse.com/977446">SUSE bug 977446</bugzilla>
<bugzilla href="https://bugzilla.suse.com/977464">SUSE bug 977464</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207907" comment="ntp-4.2.8p7-44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207908" comment="ntp-doc-4.2.8p7-44 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1551</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-1551" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1551" source="CVE"/>
    <description>
    ntpd in NTP 4.2.8p3 and NTPsec a5fb34b9cc89b92a8fef2f459004865c93bb7f92 relies on the underlying operating system to protect it from requests that impersonate reference clocks. Because reference clocks are treated like other peers and stored in the same structure, any packet with a source ip address of a reference clock (127.127.1.1 for example) that reaches the receive() function will match that reference clock's peer record and will be treated as a trusted peer. Any system that lacks the typical martian packet filtering which would block these packets is in danger of having its time controlled by an attacker.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1551.html">CVE-2016-1551</cve>
<bugzilla href="https://bugzilla.suse.com/977446">SUSE bug 977446</bugzilla>
<bugzilla href="https://bugzilla.suse.com/977450">SUSE bug 977450</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207907" comment="ntp-4.2.8p7-44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207908" comment="ntp-doc-4.2.8p7-44 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-1568" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568" source="CVE"/>
    <description>
    Use-after-free vulnerability in hw/ide/ahci.c in QEMU, when built with IDE AHCI Emulation support, allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via an invalid AHCI Native Command Queuing (NCQ) AIO command.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1568.html">CVE-2016-1568</cve>
<bugzilla href="https://bugzilla.suse.com/961332">SUSE bug 961332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/961333">SUSE bug 961333</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209045" comment="xen-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209046" comment="xen-doc-html-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209047" comment="xen-doc-pdf-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209048" comment="xen-kmp-default-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209049" comment="xen-kmp-pae-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209050" comment="xen-libs-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209051" comment="xen-libs-32bit-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209052" comment="xen-tools-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209053" comment="xen-tools-domU-4.2.5_20-24 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1570</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-1570" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1570" source="CVE"/>
    <description>
    The PV superpage functionality in arch/x86/mm.c in Xen 3.4.0, 3.4.1, and 4.1.x through 4.6.x allows local PV guests to obtain sensitive information, cause a denial of service, gain privileges, or have unspecified other impact via a crafted page identifier (MFN) to the (1) MMUEXT_MARK_SUPER or (2) MMUEXT_UNMARK_SUPER sub-op in the HYPERVISOR_mmuext_op hypercall or (3) unknown vectors related to page table updates.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1570.html">CVE-2016-1570</cve>
<bugzilla href="https://bugzilla.suse.com/960861">SUSE bug 960861</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209045" comment="xen-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209046" comment="xen-doc-html-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209047" comment="xen-doc-pdf-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209048" comment="xen-kmp-default-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209049" comment="xen-kmp-pae-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209050" comment="xen-libs-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209051" comment="xen-libs-32bit-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209052" comment="xen-tools-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209053" comment="xen-tools-domU-4.2.5_20-24 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1571</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-1571" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1571" source="CVE"/>
    <description>
    The paging_invlpg function in include/asm-x86/paging.h in Xen 3.3.x through 4.6.x, when using shadow mode paging or nested virtualization is enabled, allows local HVM guest users to cause a denial of service (host crash) via a non-canonical guest address in an INVVPID instruction, which triggers a hypervisor bug check.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1571.html">CVE-2016-1571</cve>
<bugzilla href="https://bugzilla.suse.com/960861">SUSE bug 960861</bugzilla>
<bugzilla href="https://bugzilla.suse.com/960862">SUSE bug 960862</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209045" comment="xen-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209046" comment="xen-doc-html-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209047" comment="xen-doc-pdf-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209048" comment="xen-kmp-default-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209049" comment="xen-kmp-pae-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209050" comment="xen-libs-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209051" comment="xen-libs-32bit-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209052" comment="xen-tools-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209053" comment="xen-tools-domU-4.2.5_20-24 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1572</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-1572" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1572" source="CVE"/>
    <description>
    mount.ecryptfs_private.c in eCryptfs-utils does not validate mount destination filesystem types, which allows local users to gain privileges by mounting over a nonstandard filesystem, as demonstrated by /proc/$pid.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1572.html">CVE-2016-1572</cve>
<bugzilla href="https://bugzilla.suse.com/962052">SUSE bug 962052</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204284" comment="ecryptfs-utils-61-1.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204285" comment="ecryptfs-utils-32bit-61-1.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208462" comment="ecryptfs-utils-x86-61-1.35 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009204284" comment="ecryptfs-utils-61-1.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204285" comment="ecryptfs-utils-32bit-61-1.35 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1577</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-1577" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1577" source="CVE"/>
    <description>
    Double free vulnerability in the jas_iccattrval_destroy function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted ICC color profile in a JPEG 2000 image file, a different vulnerability than CVE-2014-8137.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1577.html">CVE-2016-1577</cve>
<bugzilla href="https://bugzilla.suse.com/968373">SUSE bug 968373</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202748" comment="jasper-1.900.14-134.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209367" comment="libjasper-1.900.14-134.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209368" comment="libjasper-32bit-1.900.14-134.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1583</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-1583" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1583" source="CVE"/>
    <description>
    The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1583.html">CVE-2016-1583</cve>
<bugzilla href="https://bugzilla.suse.com/1052256">SUSE bug 1052256</bugzilla>
<bugzilla href="https://bugzilla.suse.com/983143">SUSE bug 983143</bugzilla>
<bugzilla href="https://bugzilla.suse.com/983144">SUSE bug 983144</bugzilla>
<bugzilla href="https://bugzilla.suse.com/990058">SUSE bug 990058</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208598" comment="kernel-bigsmp-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208599" comment="kernel-bigsmp-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208600" comment="kernel-bigsmp-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205422" comment="kernel-default-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205423" comment="kernel-default-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205424" comment="kernel-default-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205425" comment="kernel-ec2-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205426" comment="kernel-ec2-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205427" comment="kernel-ec2-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205431" comment="kernel-source-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205432" comment="kernel-syms-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205433" comment="kernel-trace-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205434" comment="kernel-trace-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205435" comment="kernel-trace-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205436" comment="kernel-xen-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205437" comment="kernel-xen-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205438" comment="kernel-xen-devel-3.0.101-0.47.86 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208598" comment="kernel-bigsmp-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208599" comment="kernel-bigsmp-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208600" comment="kernel-bigsmp-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205422" comment="kernel-default-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205423" comment="kernel-default-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205424" comment="kernel-default-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208601" comment="kernel-default-man-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205425" comment="kernel-ec2-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205426" comment="kernel-ec2-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205427" comment="kernel-ec2-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205428" comment="kernel-pae-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205429" comment="kernel-pae-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205430" comment="kernel-pae-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205431" comment="kernel-source-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205432" comment="kernel-syms-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205433" comment="kernel-trace-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205434" comment="kernel-trace-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205435" comment="kernel-trace-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205436" comment="kernel-xen-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205437" comment="kernel-xen-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205438" comment="kernel-xen-devel-3.0.101-0.47.86 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1602</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-1602" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1602" source="CVE"/>
    <description>
    A code injection in the supportconfig data collection tool in supportutils in SUSE Linux Enterprise Server 12 and 12-SP1 and SUSE Linux Enterprise Desktop 12 and 12-SP1 could be used by local attackers to execute code as the user running supportconfig (usually root).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1602.html">CVE-2016-1602</cve>
<bugzilla href="https://bugzilla.suse.com/1063385">SUSE bug 1063385</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980670">SUSE bug 980670</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210819" comment="supportutils-1.20-121 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1714</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-1714" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714" source="CVE"/>
    <description>
    The (1) fw_cfg_write and (2) fw_cfg_read functions in hw/nvram/fw_cfg.c in QEMU before 2.4, when built with the Firmware Configuration device emulation support, allow guest OS users with the CAP_SYS_RAWIO privilege to cause a denial of service (out-of-bounds read or write access and process crash) or possibly execute arbitrary code via an invalid current entry value in a firmware configuration.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1714.html">CVE-2016-1714</cve>
<bugzilla href="https://bugzilla.suse.com/961691">SUSE bug 961691</bugzilla>
<bugzilla href="https://bugzilla.suse.com/961692">SUSE bug 961692</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209045" comment="xen-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209046" comment="xen-doc-html-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209047" comment="xen-doc-pdf-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209048" comment="xen-kmp-default-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209049" comment="xen-kmp-pae-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209050" comment="xen-libs-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209051" comment="xen-libs-32bit-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209052" comment="xen-tools-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209053" comment="xen-tools-domU-4.2.5_20-24 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1762</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-1762" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1762" source="CVE"/>
    <description>
    The xmlNextChar function in libxml2 before 2.9.4 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1762.html">CVE-2016-1762</cve>
<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/981040">SUSE bug 981040</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203092" comment="libxml2-2.7.6-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207874" comment="libxml2-32bit-2.7.6-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207875" comment="libxml2-doc-2.7.6-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207876" comment="libxml2-python-2.7.6-0.44 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1833</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-1833" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1833" source="CVE"/>
    <description>
    The htmlCurrentChar function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1833.html">CVE-2016-1833</cve>
<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/981108">SUSE bug 981108</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203092" comment="libxml2-2.7.6-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207874" comment="libxml2-32bit-2.7.6-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207875" comment="libxml2-doc-2.7.6-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207876" comment="libxml2-python-2.7.6-0.44 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1834</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-1834" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1834" source="CVE"/>
    <description>
    Heap-based buffer overflow in the xmlStrncat function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1834.html">CVE-2016-1834</cve>
<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/981041">SUSE bug 981041</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203092" comment="libxml2-2.7.6-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207874" comment="libxml2-32bit-2.7.6-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207875" comment="libxml2-doc-2.7.6-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207876" comment="libxml2-python-2.7.6-0.44 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-1835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1835" source="CVE"/>
    <description>
    Use-after-free vulnerability in the xmlSAX2AttributeNs function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2 and OS X before 10.11.5, allows remote attackers to cause a denial of service via a crafted XML document.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1835.html">CVE-2016-1835</cve>
<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/981109">SUSE bug 981109</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203092" comment="libxml2-2.7.6-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207874" comment="libxml2-32bit-2.7.6-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207875" comment="libxml2-doc-2.7.6-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207876" comment="libxml2-python-2.7.6-0.44 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1837</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-1837" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1837" source="CVE"/>
    <description>
    Multiple use-after-free vulnerabilities in the (1) htmlPArsePubidLiteral and (2) htmlParseSystemiteral functions in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allow remote attackers to cause a denial of service via a crafted XML document.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1837.html">CVE-2016-1837</cve>
<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/981111">SUSE bug 981111</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203092" comment="libxml2-2.7.6-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207874" comment="libxml2-32bit-2.7.6-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207875" comment="libxml2-doc-2.7.6-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207876" comment="libxml2-python-2.7.6-0.44 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1838</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-1838" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1838" source="CVE"/>
    <description>
    The xmlPArserPrintFileContextInternal function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1838.html">CVE-2016-1838</cve>
<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/981112">SUSE bug 981112</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203092" comment="libxml2-2.7.6-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207874" comment="libxml2-32bit-2.7.6-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207875" comment="libxml2-doc-2.7.6-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207876" comment="libxml2-python-2.7.6-0.44 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1839</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-1839" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1839" source="CVE"/>
    <description>
    The xmlDictAddString function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1839.html">CVE-2016-1839</cve>
<bugzilla href="https://bugzilla.suse.com/1039069">SUSE bug 1039069</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1039661">SUSE bug 1039661</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1069433">SUSE bug 1069433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1069690">SUSE bug 1069690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/963963">SUSE bug 963963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/981114">SUSE bug 981114</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203092" comment="libxml2-2.7.6-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207874" comment="libxml2-32bit-2.7.6-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207875" comment="libxml2-doc-2.7.6-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207876" comment="libxml2-python-2.7.6-0.44 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-1840" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1840" source="CVE"/>
    <description>
    Heap-based buffer overflow in the xmlFAParsePosCharGroup function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1840.html">CVE-2016-1840</cve>
<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/981115">SUSE bug 981115</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203092" comment="libxml2-2.7.6-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207874" comment="libxml2-32bit-2.7.6-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207875" comment="libxml2-doc-2.7.6-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207876" comment="libxml2-python-2.7.6-0.44 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1867</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-1867" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1867" source="CVE"/>
    <description>
    The jpc_pi_nextcprl function in JasPer 1.900.1 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG 2000 image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1867.html">CVE-2016-1867</cve>
<bugzilla href="https://bugzilla.suse.com/961886">SUSE bug 961886</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202748" comment="jasper-1.900.14-134.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209367" comment="libjasper-1.900.14-134.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209368" comment="libjasper-32bit-1.900.14-134.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1908</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-1908" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1908" source="CVE"/>
    <description>
    The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server, as demonstrated by lack of the SECURITY extension on this X11 server.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1908.html">CVE-2016-1908</cve>
<bugzilla href="https://bugzilla.suse.com/1001712">SUSE bug 1001712</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1005738">SUSE bug 1005738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1087412">SUSE bug 1087412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962313">SUSE bug 962313</bugzilla>
<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205681" comment="openssh-6.2p2-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205682" comment="openssh-askpass-6.2p2-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205683" comment="openssh-askpass-gnome-6.2p2-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203762" comment="openssh-openssl1-6.6p1-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203763" comment="openssh-openssl1-helpers-6.6p1-15 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205681" comment="openssh-6.2p2-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205682" comment="openssh-askpass-6.2p2-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205683" comment="openssh-askpass-gnome-6.2p2-0.33 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1922</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-1922" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922" source="CVE"/>
    <description>
    QEMU (aka Quick Emulator) built with the TPR optimization for 32-bit Windows guests support is vulnerable to a null pointer dereference flaw. It occurs while doing I/O port write operations via hmp interface. In that, 'current_cpu' remains null, which leads to the null pointer dereference. A user or process could use this flaw to crash the QEMU instance, resulting in DoS issue.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1922.html">CVE-2016-1922</cve>
<bugzilla href="https://bugzilla.suse.com/962320">SUSE bug 962320</bugzilla>
<bugzilla href="https://bugzilla.suse.com/962321">SUSE bug 962321</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1925</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-1925" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1925" source="CVE"/>
    <description>
    Integer underflow in header.c in lha allows remote attackers to have unspecified impact via a large header size value for the (1) level0 or (2) level1 header in a lha archive, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1925.html">CVE-2016-1925</cve>
<bugzilla href="https://bugzilla.suse.com/962528">SUSE bug 962528</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209890" comment="lha-1.14.0.894-3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1930</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-1930" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1930" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 44.0 and Firefox ESR 38.x before 38.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1930.html">CVE-2016-1930</cve>
<bugzilla href="https://bugzilla.suse.com/963520">SUSE bug 963520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/963632">SUSE bug 963632</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201933" comment="MozillaFirefox-38.6.0esr-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204673" comment="MozillaFirefox-branding-SLED-38-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204674" comment="MozillaFirefox-translations-38.6.0esr-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204675" comment="libfreebl3-3.20.2-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204676" comment="libfreebl3-32bit-3.20.2-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204677" comment="libsoftokn3-3.20.2-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204678" comment="libsoftokn3-32bit-3.20.2-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201935" comment="mozilla-nss-3.20.2-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204679" comment="mozilla-nss-32bit-3.20.2-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204680" comment="mozilla-nss-tools-3.20.2-25 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201933" comment="MozillaFirefox-38.6.0esr-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204673" comment="MozillaFirefox-branding-SLED-38-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204674" comment="MozillaFirefox-translations-38.6.0esr-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204675" comment="libfreebl3-3.20.2-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204676" comment="libfreebl3-32bit-3.20.2-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208774" comment="libfreebl3-x86-3.20.2-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204677" comment="libsoftokn3-3.20.2-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204678" comment="libsoftokn3-32bit-3.20.2-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208775" comment="libsoftokn3-x86-3.20.2-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201935" comment="mozilla-nss-3.20.2-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204679" comment="mozilla-nss-32bit-3.20.2-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204680" comment="mozilla-nss-tools-3.20.2-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208776" comment="mozilla-nss-x86-3.20.2-25 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1935</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-1935" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1935" source="CVE"/>
    <description>
    Buffer overflow in the BufferSubData function in Mozilla Firefox before 44.0 and Firefox ESR 38.x before 38.6 allows remote attackers to execute arbitrary code via crafted WebGL content.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1935.html">CVE-2016-1935</cve>
<bugzilla href="https://bugzilla.suse.com/963520">SUSE bug 963520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/963635">SUSE bug 963635</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201933" comment="MozillaFirefox-38.6.0esr-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204673" comment="MozillaFirefox-branding-SLED-38-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204674" comment="MozillaFirefox-translations-38.6.0esr-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204675" comment="libfreebl3-3.20.2-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204676" comment="libfreebl3-32bit-3.20.2-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204677" comment="libsoftokn3-3.20.2-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204678" comment="libsoftokn3-32bit-3.20.2-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201935" comment="mozilla-nss-3.20.2-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204679" comment="mozilla-nss-32bit-3.20.2-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204680" comment="mozilla-nss-tools-3.20.2-25 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201933" comment="MozillaFirefox-38.6.0esr-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204673" comment="MozillaFirefox-branding-SLED-38-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204674" comment="MozillaFirefox-translations-38.6.0esr-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204675" comment="libfreebl3-3.20.2-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204676" comment="libfreebl3-32bit-3.20.2-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208774" comment="libfreebl3-x86-3.20.2-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204677" comment="libsoftokn3-3.20.2-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204678" comment="libsoftokn3-32bit-3.20.2-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208775" comment="libsoftokn3-x86-3.20.2-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201935" comment="mozilla-nss-3.20.2-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204679" comment="mozilla-nss-32bit-3.20.2-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204680" comment="mozilla-nss-tools-3.20.2-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208776" comment="mozilla-nss-x86-3.20.2-25 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1938</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-1938" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1938" source="CVE"/>
    <description>
    The s_mp_div function in lib/freebl/mpi/mpi.c in Mozilla Network Security Services (NSS) before 3.21, as used in Mozilla Firefox before 44.0, improperly divides numbers, which might make it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging use of the (1) mp_div or (2) mp_exptmod function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1938.html">CVE-2016-1938</cve>
<bugzilla href="https://bugzilla.suse.com/963731">SUSE bug 963731</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201933" comment="MozillaFirefox-38.6.0esr-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204673" comment="MozillaFirefox-branding-SLED-38-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204674" comment="MozillaFirefox-translations-38.6.0esr-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204675" comment="libfreebl3-3.20.2-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204676" comment="libfreebl3-32bit-3.20.2-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204677" comment="libsoftokn3-3.20.2-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204678" comment="libsoftokn3-32bit-3.20.2-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201935" comment="mozilla-nss-3.20.2-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204679" comment="mozilla-nss-32bit-3.20.2-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204680" comment="mozilla-nss-tools-3.20.2-25 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009201933" comment="MozillaFirefox-38.6.0esr-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204673" comment="MozillaFirefox-branding-SLED-38-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204674" comment="MozillaFirefox-translations-38.6.0esr-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204675" comment="libfreebl3-3.20.2-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204676" comment="libfreebl3-32bit-3.20.2-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208774" comment="libfreebl3-x86-3.20.2-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204677" comment="libsoftokn3-3.20.2-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204678" comment="libsoftokn3-32bit-3.20.2-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208775" comment="libsoftokn3-x86-3.20.2-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009201935" comment="mozilla-nss-3.20.2-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204679" comment="mozilla-nss-32bit-3.20.2-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204680" comment="mozilla-nss-tools-3.20.2-25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208776" comment="mozilla-nss-x86-3.20.2-25 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1950</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-1950" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950" source="CVE"/>
    <description>
    Heap-based buffer overflow in Mozilla Network Security Services (NSS) before 3.19.2.3 and 3.20.x and 3.21.x before 3.21.1, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to execute arbitrary code via crafted ASN.1 data in an X.509 certificate.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1950.html">CVE-2016-1950</cve>
<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/970257">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/970377">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/970378">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/970379">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/970380">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/970381">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/970431">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/970433">SUSE bug 970433</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202355" comment="MozillaFirefox-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205245" comment="MozillaFirefox-translations-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205246" comment="libfreebl3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208371" comment="libfreebl3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205247" comment="libsoftokn3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208372" comment="libsoftokn3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202359" comment="mozilla-nss-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208374" comment="mozilla-nss-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205248" comment="mozilla-nss-tools-3.29.5-46 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1952</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-1952" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1952" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1952.html">CVE-2016-1952</cve>
<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202375" comment="MozillaFirefox-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204966" comment="MozillaFirefox-translations-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204967" comment="libfreebl3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204968" comment="libfreebl3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204969" comment="libsoftokn3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204970" comment="libsoftokn3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202377" comment="mozilla-nspr-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204971" comment="mozilla-nspr-32bit-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202379" comment="mozilla-nss-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204972" comment="mozilla-nss-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204973" comment="mozilla-nss-tools-3.20.2-28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1953</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-1953" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1953" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 45.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to js/src/jit/arm/Assembler-arm.cpp, and unknown other vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1953.html">CVE-2016-1953</cve>
<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202375" comment="MozillaFirefox-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204966" comment="MozillaFirefox-translations-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204967" comment="libfreebl3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204968" comment="libfreebl3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204969" comment="libsoftokn3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204970" comment="libsoftokn3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202377" comment="mozilla-nspr-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204971" comment="mozilla-nspr-32bit-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202379" comment="mozilla-nss-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204972" comment="mozilla-nss-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204973" comment="mozilla-nss-tools-3.20.2-28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1954</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-1954" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1954" source="CVE"/>
    <description>
    The nsCSPContext::SendReports function in dom/security/nsCSPContext.cpp in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 does not prevent use of a non-HTTP report-uri for a Content Security Policy (CSP) violation report, which allows remote attackers to cause a denial of service (data overwrite) or possibly gain privileges by specifying a URL of a local file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1954.html">CVE-2016-1954</cve>
<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202375" comment="MozillaFirefox-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204966" comment="MozillaFirefox-translations-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204967" comment="libfreebl3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204968" comment="libfreebl3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204969" comment="libsoftokn3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204970" comment="libsoftokn3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202377" comment="mozilla-nspr-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204971" comment="mozilla-nspr-32bit-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202379" comment="mozilla-nss-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204972" comment="mozilla-nss-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204973" comment="mozilla-nss-tools-3.20.2-28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1957</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-1957" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1957" source="CVE"/>
    <description>
    Memory leak in libstagefright in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to cause a denial of service (memory consumption) via an MPEG-4 file that triggers a delete operation on an array.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1957.html">CVE-2016-1957</cve>
<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202375" comment="MozillaFirefox-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204966" comment="MozillaFirefox-translations-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204967" comment="libfreebl3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204968" comment="libfreebl3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204969" comment="libsoftokn3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204970" comment="libsoftokn3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202377" comment="mozilla-nspr-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204971" comment="mozilla-nspr-32bit-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202379" comment="mozilla-nss-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204972" comment="mozilla-nss-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204973" comment="mozilla-nss-tools-3.20.2-28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1958</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-1958" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1958" source="CVE"/>
    <description>
    browser/base/content/browser.js in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to spoof the address bar via a javascript: URL.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1958.html">CVE-2016-1958</cve>
<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202375" comment="MozillaFirefox-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204966" comment="MozillaFirefox-translations-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204967" comment="libfreebl3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204968" comment="libfreebl3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204969" comment="libsoftokn3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204970" comment="libsoftokn3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202377" comment="mozilla-nspr-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204971" comment="mozilla-nspr-32bit-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202379" comment="mozilla-nss-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204972" comment="mozilla-nss-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204973" comment="mozilla-nss-tools-3.20.2-28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1960</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-1960" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1960" source="CVE"/>
    <description>
    Integer underflow in the nsHtml5TreeBuilder class in the HTML5 string parser in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) by leveraging mishandling of end tags, as demonstrated by incorrect SVG processing, aka ZDI-CAN-3545.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1960.html">CVE-2016-1960</cve>
<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202375" comment="MozillaFirefox-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204966" comment="MozillaFirefox-translations-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204967" comment="libfreebl3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204968" comment="libfreebl3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204969" comment="libsoftokn3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204970" comment="libsoftokn3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202377" comment="mozilla-nspr-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204971" comment="mozilla-nspr-32bit-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202379" comment="mozilla-nss-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204972" comment="mozilla-nss-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204973" comment="mozilla-nss-tools-3.20.2-28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1961</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-1961" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1961" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsHTMLDocument::SetBody function in dom/html/nsHTMLDocument.cpp in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code by leveraging mishandling of a root element, aka ZDI-CAN-3574.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1961.html">CVE-2016-1961</cve>
<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202375" comment="MozillaFirefox-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204966" comment="MozillaFirefox-translations-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204967" comment="libfreebl3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204968" comment="libfreebl3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204969" comment="libsoftokn3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204970" comment="libsoftokn3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202377" comment="mozilla-nspr-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204971" comment="mozilla-nspr-32bit-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202379" comment="mozilla-nss-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204972" comment="mozilla-nss-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204973" comment="mozilla-nss-tools-3.20.2-28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1962</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-1962" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1962" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozilla::DataChannelConnection::Close function in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code by leveraging mishandling of WebRTC data-channel connections.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1962.html">CVE-2016-1962</cve>
<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202375" comment="MozillaFirefox-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204966" comment="MozillaFirefox-translations-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204967" comment="libfreebl3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204968" comment="libfreebl3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204969" comment="libsoftokn3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204970" comment="libsoftokn3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202377" comment="mozilla-nspr-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204971" comment="mozilla-nspr-32bit-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202379" comment="mozilla-nss-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204972" comment="mozilla-nss-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204973" comment="mozilla-nss-tools-3.20.2-28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1964</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-1964" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1964" source="CVE"/>
    <description>
    Use-after-free vulnerability in the AtomicBaseIncDec function in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by leveraging mishandling of XML transformations.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1964.html">CVE-2016-1964</cve>
<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202375" comment="MozillaFirefox-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204966" comment="MozillaFirefox-translations-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204967" comment="libfreebl3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204968" comment="libfreebl3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204969" comment="libsoftokn3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204970" comment="libsoftokn3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202377" comment="mozilla-nspr-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204971" comment="mozilla-nspr-32bit-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202379" comment="mozilla-nss-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204972" comment="mozilla-nss-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204973" comment="mozilla-nss-tools-3.20.2-28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1965</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-1965" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1965" source="CVE"/>
    <description>
    Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 mishandle a navigation sequence that returns to the original page, which allows remote attackers to spoof the address bar via vectors involving the history.back method and the location.protocol property.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1965.html">CVE-2016-1965</cve>
<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202375" comment="MozillaFirefox-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204966" comment="MozillaFirefox-translations-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204967" comment="libfreebl3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204968" comment="libfreebl3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204969" comment="libsoftokn3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204970" comment="libsoftokn3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202377" comment="mozilla-nspr-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204971" comment="mozilla-nspr-32bit-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202379" comment="mozilla-nss-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204972" comment="mozilla-nss-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204973" comment="mozilla-nss-tools-3.20.2-28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1966</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-1966" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1966" source="CVE"/>
    <description>
    The nsNPObjWrapper::GetNewOrUsed function in dom/plugins/base/nsJSNPRuntime.cpp in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code or cause a denial of service (invalid pointer dereference and memory corruption) via a crafted NPAPI plugin.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1966.html">CVE-2016-1966</cve>
<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202375" comment="MozillaFirefox-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204966" comment="MozillaFirefox-translations-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204967" comment="libfreebl3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204968" comment="libfreebl3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204969" comment="libsoftokn3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204970" comment="libsoftokn3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202377" comment="mozilla-nspr-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204971" comment="mozilla-nspr-32bit-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202379" comment="mozilla-nss-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204972" comment="mozilla-nss-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204973" comment="mozilla-nss-tools-3.20.2-28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1974</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-1974" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1974" source="CVE"/>
    <description>
    The nsScannerString::AppendUnicodeTo function in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 does not verify that memory allocation succeeds, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via crafted Unicode data in an HTML, XML, or SVG document.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1974.html">CVE-2016-1974</cve>
<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202375" comment="MozillaFirefox-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204966" comment="MozillaFirefox-translations-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204967" comment="libfreebl3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204968" comment="libfreebl3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204969" comment="libsoftokn3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204970" comment="libsoftokn3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202377" comment="mozilla-nspr-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204971" comment="mozilla-nspr-32bit-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202379" comment="mozilla-nss-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204972" comment="mozilla-nss-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204973" comment="mozilla-nss-tools-3.20.2-28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1977</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-1977" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1977" source="CVE"/>
    <description>
    The Machine::Code::decoder::analysis::set_ref function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1977.html">CVE-2016-1977</cve>
<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202375" comment="MozillaFirefox-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204966" comment="MozillaFirefox-translations-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204967" comment="libfreebl3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204968" comment="libfreebl3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204969" comment="libsoftokn3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204970" comment="libsoftokn3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202377" comment="mozilla-nspr-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204971" comment="mozilla-nspr-32bit-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202379" comment="mozilla-nss-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204972" comment="mozilla-nss-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204973" comment="mozilla-nss-tools-3.20.2-28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1978</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-1978" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1978" source="CVE"/>
    <description>
    Use-after-free vulnerability in the ssl3_HandleECDHServerKeyExchange function in Mozilla Network Security Services (NSS) before 3.21, as used in Mozilla Firefox before 44.0, allows remote attackers to cause a denial of service or possibly have unspecified other impact by making an SSL (1) DHE or (2) ECDHE handshake at a time of high memory consumption.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1978.html">CVE-2016-1978</cve>
<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202375" comment="MozillaFirefox-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204966" comment="MozillaFirefox-translations-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204967" comment="libfreebl3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204968" comment="libfreebl3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204969" comment="libsoftokn3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204970" comment="libsoftokn3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202377" comment="mozilla-nspr-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204971" comment="mozilla-nspr-32bit-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202379" comment="mozilla-nss-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204972" comment="mozilla-nss-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204973" comment="mozilla-nss-tools-3.20.2-28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1979</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-1979" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1979" source="CVE"/>
    <description>
    Use-after-free vulnerability in the PK11_ImportDERPrivateKeyInfoAndReturnKey function in Mozilla Network Security Services (NSS) before 3.21.1, as used in Mozilla Firefox before 45.0, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted key data with DER encoding.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1979.html">CVE-2016-1979</cve>
<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202375" comment="MozillaFirefox-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204966" comment="MozillaFirefox-translations-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204967" comment="libfreebl3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204968" comment="libfreebl3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204969" comment="libsoftokn3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204970" comment="libsoftokn3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202377" comment="mozilla-nspr-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204971" comment="mozilla-nspr-32bit-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202379" comment="mozilla-nss-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204972" comment="mozilla-nss-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204973" comment="mozilla-nss-tools-3.20.2-28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1981</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-1981" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981" source="CVE"/>
    <description>
    QEMU (aka Quick Emulator) built with the e1000 NIC emulation support is vulnerable to an infinite loop issue. It could occur while processing data via transmit or receive descriptors, provided the initial receive/transmit descriptor head (TDH/RDH) is set outside the allocated descriptor buffer. A privileged user inside guest could use this flaw to crash the QEMU instance resulting in DoS.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1981.html">CVE-2016-1981</cve>
<bugzilla href="https://bugzilla.suse.com/963782">SUSE bug 963782</bugzilla>
<bugzilla href="https://bugzilla.suse.com/963783">SUSE bug 963783</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209045" comment="xen-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209046" comment="xen-doc-html-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209047" comment="xen-doc-pdf-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209048" comment="xen-kmp-default-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209049" comment="xen-kmp-pae-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209050" comment="xen-libs-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209051" comment="xen-libs-32bit-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209052" comment="xen-tools-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209053" comment="xen-tools-domU-4.2.5_20-24 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2047</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-2047" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047" source="CVE"/>
    <description>
    The ssl_verify_server_cert function in sql-common/client.c in MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10; Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier; and Percona Server do not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "/CN=" string in a field in a certificate, as demonstrated by "/OU=/CN=bar.com/CN=foo.com."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2047.html">CVE-2016-2047</cve>
<bugzilla href="https://bugzilla.suse.com/963806">SUSE bug 963806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210043" comment="libmysql55client18-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210044" comment="libmysql55client18-32bit-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210046" comment="libmysql55client_r18-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203161" comment="mysql-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210047" comment="mysql-client-5.5.49-0.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210048" comment="mysql-tools-5.5.49-0.20 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2053</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2053" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2053" source="CVE"/>
    <description>
    The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel before 4.3 allows attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2053.html">CVE-2016-2053</cve>
<bugzilla href="https://bugzilla.suse.com/963762">SUSE bug 963762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/979074">SUSE bug 979074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/990058">SUSE bug 990058</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208598" comment="kernel-bigsmp-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208599" comment="kernel-bigsmp-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208600" comment="kernel-bigsmp-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205422" comment="kernel-default-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205423" comment="kernel-default-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205424" comment="kernel-default-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205425" comment="kernel-ec2-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205426" comment="kernel-ec2-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205427" comment="kernel-ec2-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205431" comment="kernel-source-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205432" comment="kernel-syms-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205433" comment="kernel-trace-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205434" comment="kernel-trace-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205435" comment="kernel-trace-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205436" comment="kernel-xen-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205437" comment="kernel-xen-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205438" comment="kernel-xen-devel-3.0.101-0.47.86 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208598" comment="kernel-bigsmp-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208599" comment="kernel-bigsmp-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208600" comment="kernel-bigsmp-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205422" comment="kernel-default-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205423" comment="kernel-default-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205424" comment="kernel-default-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208601" comment="kernel-default-man-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205425" comment="kernel-ec2-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205426" comment="kernel-ec2-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205427" comment="kernel-ec2-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205428" comment="kernel-pae-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205429" comment="kernel-pae-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205430" comment="kernel-pae-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205431" comment="kernel-source-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205432" comment="kernel-syms-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205433" comment="kernel-trace-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205434" comment="kernel-trace-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205435" comment="kernel-trace-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205436" comment="kernel-xen-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205437" comment="kernel-xen-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205438" comment="kernel-xen-devel-3.0.101-0.47.86 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2069</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2069" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2069" source="CVE"/>
    <description>
    Race condition in arch/x86/mm/tlb.c in the Linux kernel before 4.4.1 allows local users to gain privileges by triggering access to a paging structure by a different CPU.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2069.html">CVE-2016-2069</cve>
<bugzilla href="https://bugzilla.suse.com/870618">SUSE bug 870618</bugzilla>
<bugzilla href="https://bugzilla.suse.com/963767">SUSE bug 963767</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208637" comment="kernel-default-man-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208641" comment="kernel-pae-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208642" comment="kernel-pae-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208643" comment="kernel-pae-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2073</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2073" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2073" source="CVE"/>
    <description>
    The htmlParseNameComplex function in HTMLparser.c in libxml2 allows attackers to cause a denial of service (out-of-bounds read) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2073.html">CVE-2016-2073</cve>
<bugzilla href="https://bugzilla.suse.com/963963">SUSE bug 963963</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203092" comment="libxml2-2.7.6-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207874" comment="libxml2-32bit-2.7.6-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207875" comment="libxml2-doc-2.7.6-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207876" comment="libxml2-python-2.7.6-0.44 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2089</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-2089" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2089" source="CVE"/>
    <description>
    The jas_matrix_clip function in jas_seq.c in JasPer 1.900.1 allows remote attackers to cause a denial of service (invalid read and application crash) via a crafted JPEG 2000 image.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2089.html">CVE-2016-2089</cve>
<bugzilla href="https://bugzilla.suse.com/963983">SUSE bug 963983</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202748" comment="jasper-1.900.14-134.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209367" comment="libjasper-1.900.14-134.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209368" comment="libjasper-32bit-1.900.14-134.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2097</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2097" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2097" source="CVE"/>
    <description>
    Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.2 and 4.x before 4.1.14.2 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-0752.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2097.html">CVE-2016-2097</cve>
<bugzilla href="https://bugzilla.suse.com/963332">SUSE bug 963332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/968850">SUSE bug 968850</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215944" comment="ruby2.1-rubygem-actionview-4_1-4.1.9-12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215945" comment="rubygem-actionview-4_1-4.1.9-12 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2098</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2098" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2098" source="CVE"/>
    <description>
    Action Pack in Ruby on Rails before 3.2.22.2, 4.x before 4.1.14.2, and 4.2.x before 4.2.5.2 allows remote attackers to execute arbitrary Ruby code by leveraging an application's unrestricted use of the render method.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2098.html">CVE-2016-2098</cve>
<bugzilla href="https://bugzilla.suse.com/968849">SUSE bug 968849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/993313">SUSE bug 993313</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009215944" comment="ruby2.1-rubygem-actionview-4_1-4.1.9-12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215945" comment="rubygem-actionview-4_1-4.1.9-12 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2105</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2105" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2105" source="CVE"/>
    <description>
    Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2105.html">CVE-2016-2105</cve>
<bugzilla href="https://bugzilla.suse.com/1025347">SUSE bug 1025347</bugzilla>
<bugzilla href="https://bugzilla.suse.com/977584">SUSE bug 977584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/977614">SUSE bug 977614</bugzilla>
<bugzilla href="https://bugzilla.suse.com/978492">SUSE bug 978492</bugzilla>
<bugzilla href="https://bugzilla.suse.com/989902">SUSE bug 989902</bugzilla>
<bugzilla href="https://bugzilla.suse.com/990369">SUSE bug 990369</bugzilla>
<bugzilla href="https://bugzilla.suse.com/990370">SUSE bug 990370</bugzilla>
<bugzilla href="https://bugzilla.suse.com/991918">SUSE bug 991918</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203223" comment="libopenssl-devel-0.9.8j-0.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207922" comment="libopenssl0_9_8-0.9.8j-0.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207923" comment="libopenssl0_9_8-32bit-0.9.8j-0.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207924" comment="libopenssl0_9_8-hmac-0.9.8j-0.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207925" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203225" comment="openssl-0.9.8j-0.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207926" comment="openssl-doc-0.9.8j-0.97 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207922" comment="libopenssl0_9_8-0.9.8j-0.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207923" comment="libopenssl0_9_8-32bit-0.9.8j-0.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207924" comment="libopenssl0_9_8-hmac-0.9.8j-0.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207925" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203778" comment="libopenssl1-devel-1.0.1g-0.47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203779" comment="libopenssl1_0_0-1.0.1g-0.47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203780" comment="libopenssl1_0_0-32bit-1.0.1g-0.47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203225" comment="openssl-0.9.8j-0.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207926" comment="openssl-doc-0.9.8j-0.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203782" comment="openssl1-1.0.1g-0.47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203783" comment="openssl1-doc-1.0.1g-0.47 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2106</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2106" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2106" source="CVE"/>
    <description>
    Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2106.html">CVE-2016-2106</cve>
<bugzilla href="https://bugzilla.suse.com/1025347">SUSE bug 1025347</bugzilla>
<bugzilla href="https://bugzilla.suse.com/977584">SUSE bug 977584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/977615">SUSE bug 977615</bugzilla>
<bugzilla href="https://bugzilla.suse.com/978492">SUSE bug 978492</bugzilla>
<bugzilla href="https://bugzilla.suse.com/990369">SUSE bug 990369</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203223" comment="libopenssl-devel-0.9.8j-0.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207922" comment="libopenssl0_9_8-0.9.8j-0.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207923" comment="libopenssl0_9_8-32bit-0.9.8j-0.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207924" comment="libopenssl0_9_8-hmac-0.9.8j-0.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207925" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203225" comment="openssl-0.9.8j-0.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207926" comment="openssl-doc-0.9.8j-0.97 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207922" comment="libopenssl0_9_8-0.9.8j-0.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207923" comment="libopenssl0_9_8-32bit-0.9.8j-0.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207924" comment="libopenssl0_9_8-hmac-0.9.8j-0.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207925" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203778" comment="libopenssl1-devel-1.0.1g-0.47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203779" comment="libopenssl1_0_0-1.0.1g-0.47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203780" comment="libopenssl1_0_0-32bit-1.0.1g-0.47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203225" comment="openssl-0.9.8j-0.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207926" comment="openssl-doc-0.9.8j-0.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203782" comment="openssl1-1.0.1g-0.47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203783" comment="openssl1-doc-1.0.1g-0.47 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2107</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-2107" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2107" source="CVE"/>
    <description>
    The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2107.html">CVE-2016-2107</cve>
<bugzilla href="https://bugzilla.suse.com/976942">SUSE bug 976942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/977584">SUSE bug 977584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/977616">SUSE bug 977616</bugzilla>
<bugzilla href="https://bugzilla.suse.com/978492">SUSE bug 978492</bugzilla>
<bugzilla href="https://bugzilla.suse.com/990369">SUSE bug 990369</bugzilla>
<bugzilla href="https://bugzilla.suse.com/990370">SUSE bug 990370</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203778" comment="libopenssl1-devel-1.0.1g-0.47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203779" comment="libopenssl1_0_0-1.0.1g-0.47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203780" comment="libopenssl1_0_0-32bit-1.0.1g-0.47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203782" comment="openssl1-1.0.1g-0.47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203783" comment="openssl1-doc-1.0.1g-0.47 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2108</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2108" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2108" source="CVE"/>
    <description>
    The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the "negative zero" issue.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2108.html">CVE-2016-2108</cve>
<bugzilla href="https://bugzilla.suse.com/1001502">SUSE bug 1001502</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1004499">SUSE bug 1004499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1005878">SUSE bug 1005878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1025347">SUSE bug 1025347</bugzilla>
<bugzilla href="https://bugzilla.suse.com/977584">SUSE bug 977584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/977617">SUSE bug 977617</bugzilla>
<bugzilla href="https://bugzilla.suse.com/978492">SUSE bug 978492</bugzilla>
<bugzilla href="https://bugzilla.suse.com/989345">SUSE bug 989345</bugzilla>
<bugzilla href="https://bugzilla.suse.com/996067">SUSE bug 996067</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203229" comment="libopenssl-devel-0.9.8j-0.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205690" comment="libopenssl0_9_8-0.9.8j-0.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208804" comment="libopenssl0_9_8-32bit-0.9.8j-0.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205691" comment="libopenssl0_9_8-hmac-0.9.8j-0.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208805" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203231" comment="openssl-0.9.8j-0.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205692" comment="openssl-doc-0.9.8j-0.105 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205690" comment="libopenssl0_9_8-0.9.8j-0.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208804" comment="libopenssl0_9_8-32bit-0.9.8j-0.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205691" comment="libopenssl0_9_8-hmac-0.9.8j-0.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208805" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203790" comment="libopenssl1-devel-1.0.1g-0.57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248700" comment="libopenssl1-devel-32bit-1.0.1g-0.57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203791" comment="libopenssl1_0_0-1.0.1g-0.57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203792" comment="libopenssl1_0_0-32bit-1.0.1g-0.57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203231" comment="openssl-0.9.8j-0.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205692" comment="openssl-doc-0.9.8j-0.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203794" comment="openssl1-1.0.1g-0.57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203795" comment="openssl1-doc-1.0.1g-0.57 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2109</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2109" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2109" source="CVE"/>
    <description>
    The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in the ASN.1 BIO implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (memory consumption) via a short invalid encoding.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2109.html">CVE-2016-2109</cve>
<bugzilla href="https://bugzilla.suse.com/1015243">SUSE bug 1015243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1025347">SUSE bug 1025347</bugzilla>
<bugzilla href="https://bugzilla.suse.com/976942">SUSE bug 976942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/977584">SUSE bug 977584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/978492">SUSE bug 978492</bugzilla>
<bugzilla href="https://bugzilla.suse.com/990369">SUSE bug 990369</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203223" comment="libopenssl-devel-0.9.8j-0.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207922" comment="libopenssl0_9_8-0.9.8j-0.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207923" comment="libopenssl0_9_8-32bit-0.9.8j-0.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207924" comment="libopenssl0_9_8-hmac-0.9.8j-0.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207925" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203225" comment="openssl-0.9.8j-0.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207926" comment="openssl-doc-0.9.8j-0.97 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207922" comment="libopenssl0_9_8-0.9.8j-0.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207923" comment="libopenssl0_9_8-32bit-0.9.8j-0.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207924" comment="libopenssl0_9_8-hmac-0.9.8j-0.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207925" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203778" comment="libopenssl1-devel-1.0.1g-0.47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203779" comment="libopenssl1_0_0-1.0.1g-0.47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203780" comment="libopenssl1_0_0-32bit-1.0.1g-0.47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203225" comment="openssl-0.9.8j-0.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207926" comment="openssl-doc-0.9.8j-0.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203782" comment="openssl1-1.0.1g-0.47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203783" comment="openssl1-doc-1.0.1g-0.47 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2110</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2110" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110" source="CVE"/>
    <description>
    The NTLMSSP authentication implementation in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 allows man-in-the-middle attackers to perform protocol-downgrade attacks by modifying the client-server data stream to remove application-layer flags or encryption settings, as demonstrated by clearing the NTLMSSP_NEGOTIATE_SEAL or NTLMSSP_NEGOTIATE_SIGN option to disrupt LDAP security.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2110.html">CVE-2016-2110</cve>
<bugzilla href="https://bugzilla.suse.com/1009711">SUSE bug 1009711</bugzilla>
<bugzilla href="https://bugzilla.suse.com/973031">SUSE bug 973031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/973033">SUSE bug 973033</bugzilla>
<bugzilla href="https://bugzilla.suse.com/973036">SUSE bug 973036</bugzilla>
<bugzilla href="https://bugzilla.suse.com/975276">SUSE bug 975276</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208966" comment="ldapsmb-1.34b-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208967" comment="libldb1-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208968" comment="libsmbclient0-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208969" comment="libsmbclient0-32bit-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208970" comment="libtalloc2-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208971" comment="libtalloc2-32bit-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208972" comment="libtdb1-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208973" comment="libtdb1-32bit-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208974" comment="libtevent0-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208975" comment="libtevent0-32bit-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208976" comment="libwbclient0-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208977" comment="libwbclient0-32bit-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202058" comment="samba-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208978" comment="samba-32bit-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208979" comment="samba-client-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208980" comment="samba-client-32bit-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208981" comment="samba-doc-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208982" comment="samba-krb-printing-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208983" comment="samba-winbind-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208984" comment="samba-winbind-32bit-3.6.3-76 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2111</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2111" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111" source="CVE"/>
    <description>
    The NETLOGON service in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2, when a domain controller is configured, allows remote attackers to spoof the computer name of a secure channel's endpoint, and obtain sensitive session information, by running a crafted application and leveraging the ability to sniff network traffic, a related issue to CVE-2015-0005.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2111.html">CVE-2016-2111</cve>
<bugzilla href="https://bugzilla.suse.com/973032">SUSE bug 973032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/975276">SUSE bug 975276</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208966" comment="ldapsmb-1.34b-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208967" comment="libldb1-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208968" comment="libsmbclient0-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208969" comment="libsmbclient0-32bit-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208970" comment="libtalloc2-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208971" comment="libtalloc2-32bit-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208972" comment="libtdb1-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208973" comment="libtdb1-32bit-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208974" comment="libtevent0-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208975" comment="libtevent0-32bit-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208976" comment="libwbclient0-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208977" comment="libwbclient0-32bit-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202058" comment="samba-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208978" comment="samba-32bit-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208979" comment="samba-client-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208980" comment="samba-client-32bit-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208981" comment="samba-doc-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208982" comment="samba-krb-printing-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208983" comment="samba-winbind-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208984" comment="samba-winbind-32bit-3.6.3-76 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2112</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2112" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112" source="CVE"/>
    <description>
    The bundled LDAP client library in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not recognize the "client ldap sasl wrapping" setting, which allows man-in-the-middle attackers to perform LDAP protocol-downgrade attacks by modifying the client-server data stream.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2112.html">CVE-2016-2112</cve>
<bugzilla href="https://bugzilla.suse.com/973031">SUSE bug 973031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/973033">SUSE bug 973033</bugzilla>
<bugzilla href="https://bugzilla.suse.com/975276">SUSE bug 975276</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208966" comment="ldapsmb-1.34b-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208967" comment="libldb1-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208968" comment="libsmbclient0-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208969" comment="libsmbclient0-32bit-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208970" comment="libtalloc2-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208971" comment="libtalloc2-32bit-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208972" comment="libtdb1-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208973" comment="libtdb1-32bit-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208974" comment="libtevent0-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208975" comment="libtevent0-32bit-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208976" comment="libwbclient0-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208977" comment="libwbclient0-32bit-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202058" comment="samba-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208978" comment="samba-32bit-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208979" comment="samba-client-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208980" comment="samba-client-32bit-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208981" comment="samba-doc-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208982" comment="samba-krb-printing-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208983" comment="samba-winbind-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208984" comment="samba-winbind-32bit-3.6.3-76 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2113</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2113" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2113" source="CVE"/>
    <description>
    Samba 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not verify X.509 certificates from TLS servers, which allows man-in-the-middle attackers to spoof LDAPS and HTTPS servers and obtain sensitive information via a crafted certificate.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2113.html">CVE-2016-2113</cve>
<bugzilla href="https://bugzilla.suse.com/973031">SUSE bug 973031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/973033">SUSE bug 973033</bugzilla>
<bugzilla href="https://bugzilla.suse.com/973034">SUSE bug 973034</bugzilla>
<bugzilla href="https://bugzilla.suse.com/975276">SUSE bug 975276</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208966" comment="ldapsmb-1.34b-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208967" comment="libldb1-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208968" comment="libsmbclient0-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208969" comment="libsmbclient0-32bit-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208970" comment="libtalloc2-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208971" comment="libtalloc2-32bit-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208972" comment="libtdb1-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208973" comment="libtdb1-32bit-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208974" comment="libtevent0-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208975" comment="libtevent0-32bit-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208976" comment="libwbclient0-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208977" comment="libwbclient0-32bit-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202058" comment="samba-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208978" comment="samba-32bit-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208979" comment="samba-client-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208980" comment="samba-client-32bit-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208981" comment="samba-doc-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208982" comment="samba-krb-printing-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208983" comment="samba-winbind-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208984" comment="samba-winbind-32bit-3.6.3-76 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2115</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2115" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115" source="CVE"/>
    <description>
    Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not require SMB signing within a DCERPC session over ncacn_np, which allows man-in-the-middle attackers to spoof SMB clients by modifying the client-server data stream.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2115.html">CVE-2016-2115</cve>
<bugzilla href="https://bugzilla.suse.com/973036">SUSE bug 973036</bugzilla>
<bugzilla href="https://bugzilla.suse.com/975276">SUSE bug 975276</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208966" comment="ldapsmb-1.34b-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208967" comment="libldb1-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208968" comment="libsmbclient0-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208969" comment="libsmbclient0-32bit-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208970" comment="libtalloc2-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208971" comment="libtalloc2-32bit-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208972" comment="libtdb1-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208973" comment="libtdb1-32bit-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208974" comment="libtevent0-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208975" comment="libtevent0-32bit-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208976" comment="libwbclient0-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208977" comment="libwbclient0-32bit-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202058" comment="samba-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208978" comment="samba-32bit-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208979" comment="samba-client-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208980" comment="samba-client-32bit-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208981" comment="samba-doc-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208982" comment="samba-krb-printing-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208983" comment="samba-winbind-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208984" comment="samba-winbind-32bit-3.6.3-76 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2116</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-2116" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2116" source="CVE"/>
    <description>
    Memory leak in the jas_iccprof_createfrombuf function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (memory consumption) via a crafted ICC color profile in a JPEG 2000 image file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2116.html">CVE-2016-2116</cve>
<bugzilla href="https://bugzilla.suse.com/968373">SUSE bug 968373</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202748" comment="jasper-1.900.14-134.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209367" comment="libjasper-1.900.14-134.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209368" comment="libjasper-32bit-1.900.14-134.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2118</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2118" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118" source="CVE"/>
    <description>
    The MS-SAMR and MS-LSAD protocol implementations in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 mishandle DCERPC connections, which allows man-in-the-middle attackers to perform protocol-downgrade attacks and impersonate users by modifying the client-server data stream, aka "BADLOCK."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2118.html">CVE-2016-2118</cve>
<bugzilla href="https://bugzilla.suse.com/971965">SUSE bug 971965</bugzilla>
<bugzilla href="https://bugzilla.suse.com/975276">SUSE bug 975276</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208966" comment="ldapsmb-1.34b-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208967" comment="libldb1-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208968" comment="libsmbclient0-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208969" comment="libsmbclient0-32bit-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208970" comment="libtalloc2-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208971" comment="libtalloc2-32bit-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208972" comment="libtdb1-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208973" comment="libtdb1-32bit-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208974" comment="libtevent0-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208975" comment="libtevent0-32bit-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208976" comment="libwbclient0-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208977" comment="libwbclient0-32bit-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202058" comment="samba-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208978" comment="samba-32bit-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208979" comment="samba-client-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208980" comment="samba-client-32bit-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208981" comment="samba-doc-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208982" comment="samba-krb-printing-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208983" comment="samba-winbind-3.6.3-76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208984" comment="samba-winbind-32bit-3.6.3-76 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2125</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2125" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2125" source="CVE"/>
    <description>
    It was found that Samba before versions 4.5.3, 4.4.8, 4.3.13 always requested forwardable tickets when using Kerberos authentication. A service to which Samba authenticated using Kerberos could subsequently use the ticket to impersonate Samba to other services or domain users.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2125.html">CVE-2016-2125</cve>
<bugzilla href="https://bugzilla.suse.com/1014441">SUSE bug 1014441</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205881" comment="ldapsmb-1.34b-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205882" comment="libldb1-3.6.3-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205883" comment="libsmbclient0-3.6.3-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208985" comment="libsmbclient0-32bit-3.6.3-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205884" comment="libtalloc2-3.6.3-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208986" comment="libtalloc2-32bit-3.6.3-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205885" comment="libtdb1-3.6.3-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208987" comment="libtdb1-32bit-3.6.3-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205886" comment="libtevent0-3.6.3-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208988" comment="libtevent0-32bit-3.6.3-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205887" comment="libwbclient0-3.6.3-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208989" comment="libwbclient0-32bit-3.6.3-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203463" comment="samba-3.6.3-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208990" comment="samba-32bit-3.6.3-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205888" comment="samba-client-3.6.3-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208991" comment="samba-client-32bit-3.6.3-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205889" comment="samba-doc-3.6.3-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205890" comment="samba-krb-printing-3.6.3-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205891" comment="samba-winbind-3.6.3-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208992" comment="samba-winbind-32bit-3.6.3-84 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2126" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2126" source="CVE"/>
    <description>
    Samba version 4.0.0 up to 4.5.2 is vulnerable to privilege elevation due to incorrect handling of the PAC (Privilege Attribute Certificate) checksum. A remote, authenticated, attacker can cause the winbindd process to crash using a legitimate Kerberos ticket. A local service with access to the winbindd privileged pipe can cause winbindd to cache elevated access permissions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2126.html">CVE-2016-2126</cve>
<bugzilla href="https://bugzilla.suse.com/1014442">SUSE bug 1014442</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205881" comment="ldapsmb-1.34b-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205882" comment="libldb1-3.6.3-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205883" comment="libsmbclient0-3.6.3-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208985" comment="libsmbclient0-32bit-3.6.3-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205884" comment="libtalloc2-3.6.3-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208986" comment="libtalloc2-32bit-3.6.3-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205885" comment="libtdb1-3.6.3-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208987" comment="libtdb1-32bit-3.6.3-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205886" comment="libtevent0-3.6.3-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208988" comment="libtevent0-32bit-3.6.3-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205887" comment="libwbclient0-3.6.3-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208989" comment="libwbclient0-32bit-3.6.3-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203463" comment="samba-3.6.3-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208990" comment="samba-32bit-3.6.3-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205888" comment="samba-client-3.6.3-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208991" comment="samba-client-32bit-3.6.3-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205889" comment="samba-doc-3.6.3-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205890" comment="samba-krb-printing-3.6.3-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205891" comment="samba-winbind-3.6.3-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208992" comment="samba-winbind-32bit-3.6.3-84 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2143" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2143" source="CVE"/>
    <description>
    The fork implementation in the Linux kernel before 4.5 on s390 platforms mishandles the case of four page-table levels, which allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted application, related to arch/s390/include/asm/mmu_context.h and arch/s390/include/asm/pgalloc.h.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2143.html">CVE-2016-2143</cve>
<bugzilla href="https://bugzilla.suse.com/970504">SUSE bug 970504</bugzilla>
<bugzilla href="https://bugzilla.suse.com/987099">SUSE bug 987099</bugzilla>
<bugzilla href="https://bugzilla.suse.com/993872">SUSE bug 993872</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208637" comment="kernel-default-man-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208641" comment="kernel-pae-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208642" comment="kernel-pae-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208643" comment="kernel-pae-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2161</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-2161" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2161" source="CVE"/>
    <description>
    In Apache HTTP Server versions 2.4.0 to 2.4.23, malicious input to mod_auth_digest can cause the server to crash, and each instance continues to crash even for subsequently valid requests.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2161.html">CVE-2016-2161</cve>
<bugzilla href="https://bugzilla.suse.com/1016714">SUSE bug 1016714</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1033513">SUSE bug 1033513</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202393" comment="apache2-2.2.12-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202395" comment="apache2-doc-2.2.12-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202396" comment="apache2-example-pages-2.2.12-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202397" comment="apache2-prefork-2.2.12-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202398" comment="apache2-utils-2.2.12-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202399" comment="apache2-worker-2.2.12-69 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2177</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2177" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2177" source="CVE"/>
    <description>
    OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for heap-buffer boundary checks, which might allow remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact by leveraging unexpected malloc behavior, related to s3_srvr.c, ssl_sess.c, and t1_lib.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2177.html">CVE-2016-2177</cve>
<bugzilla href="https://bugzilla.suse.com/982575">SUSE bug 982575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/999075">SUSE bug 999075</bugzilla>
<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203226" comment="libopenssl-devel-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205687" comment="libopenssl0_9_8-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207927" comment="libopenssl0_9_8-32bit-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205688" comment="libopenssl0_9_8-hmac-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207928" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203228" comment="openssl-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205689" comment="openssl-doc-0.9.8j-0.102 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205687" comment="libopenssl0_9_8-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207927" comment="libopenssl0_9_8-32bit-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205688" comment="libopenssl0_9_8-hmac-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207928" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203784" comment="libopenssl1-devel-1.0.1g-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203785" comment="libopenssl1_0_0-1.0.1g-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203786" comment="libopenssl1_0_0-32bit-1.0.1g-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203228" comment="openssl-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205689" comment="openssl-doc-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203788" comment="openssl1-1.0.1g-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203789" comment="openssl1-doc-1.0.1g-0.52 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2178</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2178" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2178" source="CVE"/>
    <description>
    The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ensure the use of constant-time operations, which makes it easier for local users to discover a DSA private key via a timing side-channel attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2178.html">CVE-2016-2178</cve>
<bugzilla href="https://bugzilla.suse.com/983249">SUSE bug 983249</bugzilla>
<bugzilla href="https://bugzilla.suse.com/983519">SUSE bug 983519</bugzilla>
<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203226" comment="libopenssl-devel-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205687" comment="libopenssl0_9_8-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207927" comment="libopenssl0_9_8-32bit-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205688" comment="libopenssl0_9_8-hmac-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207928" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203228" comment="openssl-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205689" comment="openssl-doc-0.9.8j-0.102 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205687" comment="libopenssl0_9_8-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207927" comment="libopenssl0_9_8-32bit-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205688" comment="libopenssl0_9_8-hmac-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207928" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203784" comment="libopenssl1-devel-1.0.1g-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203785" comment="libopenssl1_0_0-1.0.1g-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203786" comment="libopenssl1_0_0-32bit-1.0.1g-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203228" comment="openssl-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205689" comment="openssl-doc-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203788" comment="openssl1-1.0.1g-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203789" comment="openssl1-doc-1.0.1g-0.52 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2179</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2179" source="CVE"/>
    <description>
    The DTLS implementation in OpenSSL before 1.1.0 does not properly restrict the lifetime of queue entries associated with unused out-of-order messages, which allows remote attackers to cause a denial of service (memory consumption) by maintaining many crafted DTLS sessions simultaneously, related to d1_lib.c, statem_dtls.c, statem_lib.c, and statem_srvr.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2179.html">CVE-2016-2179</cve>
<bugzilla href="https://bugzilla.suse.com/994844">SUSE bug 994844</bugzilla>
<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203226" comment="libopenssl-devel-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205687" comment="libopenssl0_9_8-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207927" comment="libopenssl0_9_8-32bit-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205688" comment="libopenssl0_9_8-hmac-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207928" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203228" comment="openssl-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205689" comment="openssl-doc-0.9.8j-0.102 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205687" comment="libopenssl0_9_8-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207927" comment="libopenssl0_9_8-32bit-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205688" comment="libopenssl0_9_8-hmac-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207928" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203784" comment="libopenssl1-devel-1.0.1g-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203785" comment="libopenssl1_0_0-1.0.1g-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203786" comment="libopenssl1_0_0-32bit-1.0.1g-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203228" comment="openssl-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205689" comment="openssl-doc-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203788" comment="openssl1-1.0.1g-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203789" comment="openssl1-doc-1.0.1g-0.52 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2180</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-2180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2180" source="CVE"/>
    <description>
    The TS_OBJ_print_bio function in crypto/ts/ts_lib.c in the X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) implementation in OpenSSL through 1.0.2h allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted time-stamp file that is mishandled by the "openssl ts" command.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2180.html">CVE-2016-2180</cve>
<bugzilla href="https://bugzilla.suse.com/1003811">SUSE bug 1003811</bugzilla>
<bugzilla href="https://bugzilla.suse.com/990419">SUSE bug 990419</bugzilla>
<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203784" comment="libopenssl1-devel-1.0.1g-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203785" comment="libopenssl1_0_0-1.0.1g-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203786" comment="libopenssl1_0_0-32bit-1.0.1g-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203788" comment="openssl1-1.0.1g-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203789" comment="openssl1-doc-1.0.1g-0.52 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2181</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2181" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2181" source="CVE"/>
    <description>
    The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to rec_layer_d1.c and ssl3_record.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2181.html">CVE-2016-2181</cve>
<bugzilla href="https://bugzilla.suse.com/994749">SUSE bug 994749</bugzilla>
<bugzilla href="https://bugzilla.suse.com/994844">SUSE bug 994844</bugzilla>
<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203226" comment="libopenssl-devel-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205687" comment="libopenssl0_9_8-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207927" comment="libopenssl0_9_8-32bit-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205688" comment="libopenssl0_9_8-hmac-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207928" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203228" comment="openssl-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205689" comment="openssl-doc-0.9.8j-0.102 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205687" comment="libopenssl0_9_8-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207927" comment="libopenssl0_9_8-32bit-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205688" comment="libopenssl0_9_8-hmac-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207928" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203784" comment="libopenssl1-devel-1.0.1g-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203785" comment="libopenssl1_0_0-1.0.1g-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203786" comment="libopenssl1_0_0-32bit-1.0.1g-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203228" comment="openssl-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205689" comment="openssl-doc-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203788" comment="openssl1-1.0.1g-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203789" comment="openssl1-doc-1.0.1g-0.52 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2182" source="CVE"/>
    <description>
    The BN_bn2dec function in crypto/bn/bn_print.c in OpenSSL before 1.1.0 does not properly validate division results, which allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2182.html">CVE-2016-2182</cve>
<bugzilla href="https://bugzilla.suse.com/993819">SUSE bug 993819</bugzilla>
<bugzilla href="https://bugzilla.suse.com/994844">SUSE bug 994844</bugzilla>
<bugzilla href="https://bugzilla.suse.com/995959">SUSE bug 995959</bugzilla>
<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203226" comment="libopenssl-devel-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205687" comment="libopenssl0_9_8-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207927" comment="libopenssl0_9_8-32bit-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205688" comment="libopenssl0_9_8-hmac-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207928" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203228" comment="openssl-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205689" comment="openssl-doc-0.9.8j-0.102 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205687" comment="libopenssl0_9_8-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207927" comment="libopenssl0_9_8-32bit-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205688" comment="libopenssl0_9_8-hmac-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207928" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203784" comment="libopenssl1-devel-1.0.1g-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203785" comment="libopenssl1_0_0-1.0.1g-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203786" comment="libopenssl1_0_0-32bit-1.0.1g-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203228" comment="openssl-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205689" comment="openssl-doc-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203788" comment="openssl1-1.0.1g-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203789" comment="openssl1-doc-1.0.1g-0.52 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2183</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2183" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183" source="CVE"/>
    <description>
    The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2183.html">CVE-2016-2183</cve>
<bugzilla href="https://bugzilla.suse.com/1001912">SUSE bug 1001912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1020747">SUSE bug 1020747</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1024218">SUSE bug 1024218</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1027038">SUSE bug 1027038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1034689">SUSE bug 1034689</bugzilla>
<bugzilla href="https://bugzilla.suse.com/994844">SUSE bug 994844</bugzilla>
<bugzilla href="https://bugzilla.suse.com/995359">SUSE bug 995359</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205375" comment="java-1_6_0-ibm-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205376" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205377" comment="java-1_6_0-ibm-devel-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205378" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205379" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205380" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205397" comment="java-1_7_0-ibm-1.7.0_sr10.1-61 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205398" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.1-61 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205399" comment="java-1_7_0-ibm-devel-1.7.0_sr10.1-61 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205400" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.1-61 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205401" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.1-61 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203226" comment="libopenssl-devel-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205687" comment="libopenssl0_9_8-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207927" comment="libopenssl0_9_8-32bit-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205688" comment="libopenssl0_9_8-hmac-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207928" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203228" comment="openssl-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205689" comment="openssl-doc-0.9.8j-0.102 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205375" comment="java-1_6_0-ibm-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205378" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205379" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205380" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205397" comment="java-1_7_0-ibm-1.7.0_sr10.1-61 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205398" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.1-61 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205400" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.1-61 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205401" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.1-61 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205687" comment="libopenssl0_9_8-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207927" comment="libopenssl0_9_8-32bit-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205688" comment="libopenssl0_9_8-hmac-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207928" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203784" comment="libopenssl1-devel-1.0.1g-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203785" comment="libopenssl1_0_0-1.0.1g-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203786" comment="libopenssl1_0_0-32bit-1.0.1g-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203228" comment="openssl-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205689" comment="openssl-doc-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203788" comment="openssl1-1.0.1g-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203789" comment="openssl1-doc-1.0.1g-0.52 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205397" comment="java-1_7_0-ibm-1.7.0_sr10.1-61 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205398" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.1-61 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205399" comment="java-1_7_0-ibm-devel-1.7.0_sr10.1-61 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205400" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.1-61 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205401" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.1-61 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203226" comment="libopenssl-devel-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205687" comment="libopenssl0_9_8-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207927" comment="libopenssl0_9_8-32bit-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205688" comment="libopenssl0_9_8-hmac-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207928" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203228" comment="openssl-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205689" comment="openssl-doc-0.9.8j-0.102 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2184</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2184" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2184" source="CVE"/>
    <description>
    The create_fixed_stream_quirk function in sound/usb/quirks.c in the snd-usb-audio driver in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference or double free, and system crash) via a crafted endpoints value in a USB device descriptor.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2184.html">CVE-2016-2184</cve>
<bugzilla href="https://bugzilla.suse.com/971125">SUSE bug 971125</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208637" comment="kernel-default-man-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208641" comment="kernel-pae-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208642" comment="kernel-pae-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208643" comment="kernel-pae-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2185</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2185" source="CVE"/>
    <description>
    The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2185.html">CVE-2016-2185</cve>
<bugzilla href="https://bugzilla.suse.com/971124">SUSE bug 971124</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208637" comment="kernel-default-man-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208641" comment="kernel-pae-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208642" comment="kernel-pae-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208643" comment="kernel-pae-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2186</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2186" source="CVE"/>
    <description>
    The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2186.html">CVE-2016-2186</cve>
<bugzilla href="https://bugzilla.suse.com/970958">SUSE bug 970958</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208637" comment="kernel-default-man-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208641" comment="kernel-pae-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208642" comment="kernel-pae-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208643" comment="kernel-pae-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2187</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2187" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2187" source="CVE"/>
    <description>
    The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel through 4.5.2 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2187.html">CVE-2016-2187</cve>
<bugzilla href="https://bugzilla.suse.com/971919">SUSE bug 971919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/971944">SUSE bug 971944</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208598" comment="kernel-bigsmp-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208599" comment="kernel-bigsmp-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208600" comment="kernel-bigsmp-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205422" comment="kernel-default-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205423" comment="kernel-default-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205424" comment="kernel-default-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205425" comment="kernel-ec2-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205426" comment="kernel-ec2-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205427" comment="kernel-ec2-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205431" comment="kernel-source-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205432" comment="kernel-syms-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205433" comment="kernel-trace-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205434" comment="kernel-trace-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205435" comment="kernel-trace-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205436" comment="kernel-xen-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205437" comment="kernel-xen-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205438" comment="kernel-xen-devel-3.0.101-0.47.86 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208598" comment="kernel-bigsmp-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208599" comment="kernel-bigsmp-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208600" comment="kernel-bigsmp-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205422" comment="kernel-default-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205423" comment="kernel-default-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205424" comment="kernel-default-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208601" comment="kernel-default-man-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205425" comment="kernel-ec2-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205426" comment="kernel-ec2-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205427" comment="kernel-ec2-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205428" comment="kernel-pae-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205429" comment="kernel-pae-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205430" comment="kernel-pae-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205431" comment="kernel-source-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205432" comment="kernel-syms-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205433" comment="kernel-trace-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205434" comment="kernel-trace-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205435" comment="kernel-trace-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205436" comment="kernel-xen-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205437" comment="kernel-xen-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205438" comment="kernel-xen-devel-3.0.101-0.47.86 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2188</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2188" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2188" source="CVE"/>
    <description>
    The iowarrior_probe function in drivers/usb/misc/iowarrior.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2188.html">CVE-2016-2188</cve>
<bugzilla href="https://bugzilla.suse.com/1067912">SUSE bug 1067912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1132190">SUSE bug 1132190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/970956">SUSE bug 970956</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208637" comment="kernel-default-man-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208641" comment="kernel-pae-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208642" comment="kernel-pae-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208643" comment="kernel-pae-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2198</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-2198" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2198" source="CVE"/>
    <description>
    QEMU (aka Quick Emulator) built with the USB EHCI emulation support is vulnerable to a null pointer dereference flaw. It could occur when an application attempts to write to EHCI capabilities registers. A privileged user inside quest could use this flaw to crash the QEMU process instance resulting in DoS.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2198.html">CVE-2016-2198</cve>
<bugzilla href="https://bugzilla.suse.com/964413">SUSE bug 964413</bugzilla>
<bugzilla href="https://bugzilla.suse.com/964415">SUSE bug 964415</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2270</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-2270" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2270" source="CVE"/>
    <description>
    Xen 4.6.x and earlier allows local guest administrators to cause a denial of service (host reboot) via vectors related to multiple mappings of MMIO pages with different cachability settings.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2270.html">CVE-2016-2270</cve>
<bugzilla href="https://bugzilla.suse.com/965315">SUSE bug 965315</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209045" comment="xen-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209046" comment="xen-doc-html-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209047" comment="xen-doc-pdf-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209048" comment="xen-kmp-default-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209049" comment="xen-kmp-pae-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209050" comment="xen-libs-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209051" comment="xen-libs-32bit-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209052" comment="xen-tools-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209053" comment="xen-tools-domU-4.2.5_20-24 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2271</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-2271" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2271" source="CVE"/>
    <description>
    VMX in Xen 4.6.x and earlier, when using an Intel or Cyrix CPU, allows local HVM guest users to cause a denial of service (guest crash) via vectors related to a non-canonical RIP.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2271.html">CVE-2016-2271</cve>
<bugzilla href="https://bugzilla.suse.com/965317">SUSE bug 965317</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209045" comment="xen-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209046" comment="xen-doc-html-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209047" comment="xen-doc-pdf-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209048" comment="xen-kmp-default-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209049" comment="xen-kmp-pae-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209050" comment="xen-libs-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209051" comment="xen-libs-32bit-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209052" comment="xen-tools-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209053" comment="xen-tools-domU-4.2.5_20-24 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162315" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2315</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2315" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2315" source="CVE"/>
    <description>
    revision.c in git before 2.7.4 uses an incorrect integer data type, which allows remote attackers to execute arbitrary code via a (1) long filename or (2) many nested trees, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2315.html">CVE-2016-2315</cve>
<bugzilla href="https://bugzilla.suse.com/971328">SUSE bug 971328</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202651" comment="git-1.7.12.4-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202653" comment="git-core-1.7.12.4-0.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2324</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2324" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2324" source="CVE"/>
    <description>
    Integer overflow in Git before 2.7.4 allows remote attackers to execute arbitrary code via a (1) long filename or (2) many nested trees, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2324.html">CVE-2016-2324</cve>
<bugzilla href="https://bugzilla.suse.com/971328">SUSE bug 971328</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202651" comment="git-1.7.12.4-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202653" comment="git-core-1.7.12.4-0.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2342</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-2342" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2342" source="CVE"/>
    <description>
    The bgp_nlri_parse_vpnv4 function in bgp_mplsvpn.c in the VPNv4 NLRI parser in bgpd in Quagga before 1.0.20160309, when a certain VPNv4 configuration is used, relies on a Labeled-VPN SAFI routes-data length field during a data copy, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2342.html">CVE-2016-2342</cve>
<bugzilla href="https://bugzilla.suse.com/970952">SUSE bug 970952</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203418" comment="quagga-0.99.15-0.16 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2381</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-2381" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2381" source="CVE"/>
    <description>
    Perl might allow context-dependent attackers to bypass the taint protection mechanism in a child process via duplicate environment variables in envp.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2381.html">CVE-2016-2381</cve>
<bugzilla href="https://bugzilla.suse.com/967082">SUSE bug 967082</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203238" comment="perl-5.10.0-64.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210162" comment="perl-32bit-5.10.0-64.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210163" comment="perl-Module-Build-0.2808.01-0.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210164" comment="perl-Test-Simple-0.72-0.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210165" comment="perl-base-5.10.0-64.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210166" comment="perl-doc-5.10.0-64.80 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2384</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2384" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2384" source="CVE"/>
    <description>
    Double free vulnerability in the snd_usbmidi_create function in sound/usb/midi.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (panic) or possibly have unspecified other impact via vectors involving an invalid USB descriptor.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2384.html">CVE-2016-2384</cve>
<bugzilla href="https://bugzilla.suse.com/966693">SUSE bug 966693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/967773">SUSE bug 967773</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208637" comment="kernel-default-man-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208641" comment="kernel-pae-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208642" comment="kernel-pae-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208643" comment="kernel-pae-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2390</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-2390" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2390" source="CVE"/>
    <description>
    The FwdState::connectedToPeer method in FwdState.cc in Squid before 3.5.14 and 4.0.x before 4.0.6 does not properly handle SSL handshake errors when built with the --with-openssl option, which allows remote attackers to cause a denial of service (application crash) via a plaintext HTTP message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2390.html">CVE-2016-2390</cve>
<bugzilla href="https://bugzilla.suse.com/967011">SUSE bug 967011</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210806" comment="squid3-3.1.23-8.16.30 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2391</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-2391" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2391" source="CVE"/>
    <description>
    The ohci_bus_start function in the USB OHCI emulation support (hw/usb/hcd-ohci.c) in QEMU allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors related to multiple eof_timers.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2391.html">CVE-2016-2391</cve>
<bugzilla href="https://bugzilla.suse.com/967012">SUSE bug 967012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/967013">SUSE bug 967013</bugzilla>
<bugzilla href="https://bugzilla.suse.com/967101">SUSE bug 967101</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209045" comment="xen-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209046" comment="xen-doc-html-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209047" comment="xen-doc-pdf-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209048" comment="xen-kmp-default-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209049" comment="xen-kmp-pae-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209050" comment="xen-libs-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209051" comment="xen-libs-32bit-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209052" comment="xen-tools-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209053" comment="xen-tools-domU-4.2.5_20-24 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250394" comment="kvm-1.4.2-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2392</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-2392" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2392" source="CVE"/>
    <description>
    The is_rndis function in the USB Net device emulator (hw/usb/dev-network.c) in QEMU before 2.5.1 does not properly validate USB configuration descriptor objects, which allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving a remote NDIS control message packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2392.html">CVE-2016-2392</cve>
<bugzilla href="https://bugzilla.suse.com/967012">SUSE bug 967012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/967090">SUSE bug 967090</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209045" comment="xen-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209046" comment="xen-doc-html-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209047" comment="xen-doc-pdf-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209048" comment="xen-kmp-default-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209049" comment="xen-kmp-pae-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209050" comment="xen-libs-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209051" comment="xen-libs-32bit-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209052" comment="xen-tools-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209053" comment="xen-tools-domU-4.2.5_20-24 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250394" comment="kvm-1.4.2-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2516</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2516" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2516" source="CVE"/>
    <description>
    NTP before 4.2.8p7 and 4.3.x before 4.3.92, when mode7 is enabled, allows remote attackers to cause a denial of service (ntpd abort) by using the same IP address multiple times in an unconfig directive.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2516.html">CVE-2016-2516</cve>
<bugzilla href="https://bugzilla.suse.com/0">SUSE bug 0</bugzilla>
<bugzilla href="https://bugzilla.suse.com/977446">SUSE bug 977446</bugzilla>
<bugzilla href="https://bugzilla.suse.com/977452">SUSE bug 977452</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207907" comment="ntp-4.2.8p7-44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207908" comment="ntp-doc-4.2.8p7-44 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2517</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2517" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2517" source="CVE"/>
    <description>
    NTP before 4.2.8p7 and 4.3.x before 4.3.92 allows remote attackers to cause a denial of service (prevent subsequent authentication) by leveraging knowledge of the controlkey or requestkey and sending a crafted packet to ntpd, which changes the value of trustedkey, controlkey, or requestkey.  NOTE: this vulnerability exists because of a CVE-2016-2516 regression.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2517.html">CVE-2016-2517</cve>
<bugzilla href="https://bugzilla.suse.com/0">SUSE bug 0</bugzilla>
<bugzilla href="https://bugzilla.suse.com/977446">SUSE bug 977446</bugzilla>
<bugzilla href="https://bugzilla.suse.com/977455">SUSE bug 977455</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207907" comment="ntp-4.2.8p7-44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207908" comment="ntp-doc-4.2.8p7-44 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2518</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2518" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518" source="CVE"/>
    <description>
    The MATCH_ASSOC function in NTP before version 4.2.8p9 and 4.3.x before 4.3.92 allows remote attackers to cause an out-of-bounds reference via an addpeer request with a large hmode value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2518.html">CVE-2016-2518</cve>
<bugzilla href="https://bugzilla.suse.com/977446">SUSE bug 977446</bugzilla>
<bugzilla href="https://bugzilla.suse.com/977457">SUSE bug 977457</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207907" comment="ntp-4.2.8p7-44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207908" comment="ntp-doc-4.2.8p7-44 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2519</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2519" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2519" source="CVE"/>
    <description>
    ntpd in NTP before 4.2.8p7 and 4.3.x before 4.3.92 allows remote attackers to cause a denial of service (ntpd abort) by a large request data value, which triggers the ctl_getitem function to return a NULL value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2519.html">CVE-2016-2519</cve>
<bugzilla href="https://bugzilla.suse.com/0">SUSE bug 0</bugzilla>
<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/977446">SUSE bug 977446</bugzilla>
<bugzilla href="https://bugzilla.suse.com/977458">SUSE bug 977458</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207907" comment="ntp-4.2.8p7-44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207908" comment="ntp-doc-4.2.8p7-44 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2523</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-2523" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2523" source="CVE"/>
    <description>
    The dnp3_al_process_object function in epan/dissectors/packet-dnp.c in the DNP3 dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2523.html">CVE-2016-2523</cve>
<bugzilla href="https://bugzilla.suse.com/968565">SUSE bug 968565</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203582" comment="wireshark-1.12.11-0.18 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2530</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-2530" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2530" source="CVE"/>
    <description>
    The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 mishandles the case of an unrecognized TLV type, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet, a different vulnerability than CVE-2016-2531.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2530.html">CVE-2016-2530</cve>
<bugzilla href="https://bugzilla.suse.com/968565">SUSE bug 968565</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203582" comment="wireshark-1.12.11-0.18 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2531</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-2531" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2531" source="CVE"/>
    <description>
    Off-by-one error in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet that triggers a 0xff tag value, a different vulnerability than CVE-2016-2530.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2531.html">CVE-2016-2531</cve>
<bugzilla href="https://bugzilla.suse.com/968565">SUSE bug 968565</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203582" comment="wireshark-1.12.11-0.18 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2532</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-2532" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2532" source="CVE"/>
    <description>
    The dissect_llrp_parameters function in epan/dissectors/packet-llrp.c in the LLRP dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 does not limit the recursion depth, which allows remote attackers to cause a denial of service (memory consumption or application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2532.html">CVE-2016-2532</cve>
<bugzilla href="https://bugzilla.suse.com/968565">SUSE bug 968565</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203582" comment="wireshark-1.12.11-0.18 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2538</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-2538" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2538" source="CVE"/>
    <description>
    Multiple integer overflows in the USB Net device emulator (hw/usb/dev-network.c) in QEMU before 2.5.1 allow local guest OS administrators to cause a denial of service (QEMU process crash) or obtain sensitive host memory information via a remote NDIS control message packet that is mishandled in the (1) rndis_query_response, (2) rndis_set_response, or (3) usb_net_handle_dataout function.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2538.html">CVE-2016-2538</cve>
<bugzilla href="https://bugzilla.suse.com/967969">SUSE bug 967969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/968004">SUSE bug 968004</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209045" comment="xen-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209046" comment="xen-doc-html-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209047" comment="xen-doc-pdf-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209048" comment="xen-kmp-default-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209049" comment="xen-kmp-pae-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209050" comment="xen-libs-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209051" comment="xen-libs-32bit-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209052" comment="xen-tools-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209053" comment="xen-tools-domU-4.2.5_20-24 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2543</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2543" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2543" source="CVE"/>
    <description>
    The snd_seq_ioctl_remove_events function in sound/core/seq/seq_clientmgr.c in the Linux kernel before 4.4.1 does not verify FIFO assignment before proceeding with FIFO clearing, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted ioctl call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2543.html">CVE-2016-2543</cve>
<bugzilla href="https://bugzilla.suse.com/967972">SUSE bug 967972</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208637" comment="kernel-default-man-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208641" comment="kernel-pae-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208642" comment="kernel-pae-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208643" comment="kernel-pae-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2544</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2544" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2544" source="CVE"/>
    <description>
    Race condition in the queue_delete function in sound/core/seq/seq_queue.c in the Linux kernel before 4.4.1 allows local users to cause a denial of service (use-after-free and system crash) by making an ioctl call at a certain time.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2544.html">CVE-2016-2544</cve>
<bugzilla href="https://bugzilla.suse.com/967973">SUSE bug 967973</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208637" comment="kernel-default-man-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208641" comment="kernel-pae-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208642" comment="kernel-pae-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208643" comment="kernel-pae-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2545</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2545" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2545" source="CVE"/>
    <description>
    The snd_timer_interrupt function in sound/core/timer.c in the Linux kernel before 4.4.1 does not properly maintain a certain linked list, which allows local users to cause a denial of service (race condition and system crash) via a crafted ioctl call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2545.html">CVE-2016-2545</cve>
<bugzilla href="https://bugzilla.suse.com/967974">SUSE bug 967974</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208637" comment="kernel-default-man-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208641" comment="kernel-pae-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208642" comment="kernel-pae-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208643" comment="kernel-pae-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2546</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2546" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2546" source="CVE"/>
    <description>
    sound/core/timer.c in the Linux kernel before 4.4.1 uses an incorrect type of mutex, which allows local users to cause a denial of service (race condition, use-after-free, and system crash) via a crafted ioctl call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2546.html">CVE-2016-2546</cve>
<bugzilla href="https://bugzilla.suse.com/967975">SUSE bug 967975</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208637" comment="kernel-default-man-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208641" comment="kernel-pae-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208642" comment="kernel-pae-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208643" comment="kernel-pae-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2547" source="CVE"/>
    <description>
    sound/core/timer.c in the Linux kernel before 4.4.1 employs a locking approach that does not consider slave timer instances, which allows local users to cause a denial of service (race condition, use-after-free, and system crash) via a crafted ioctl call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2547.html">CVE-2016-2547</cve>
<bugzilla href="https://bugzilla.suse.com/968011">SUSE bug 968011</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208637" comment="kernel-default-man-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208641" comment="kernel-pae-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208642" comment="kernel-pae-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208643" comment="kernel-pae-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2548</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2548" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2548" source="CVE"/>
    <description>
    sound/core/timer.c in the Linux kernel before 4.4.1 retains certain linked lists after a close or stop action, which allows local users to cause a denial of service (system crash) via a crafted ioctl call, related to the (1) snd_timer_close and (2) _snd_timer_stop functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2548.html">CVE-2016-2548</cve>
<bugzilla href="https://bugzilla.suse.com/968012">SUSE bug 968012</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208637" comment="kernel-default-man-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208641" comment="kernel-pae-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208642" comment="kernel-pae-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208643" comment="kernel-pae-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2549</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2549" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2549" source="CVE"/>
    <description>
    sound/core/hrtimer.c in the Linux kernel before 4.4.1 does not prevent recursive callback access, which allows local users to cause a denial of service (deadlock) via a crafted ioctl call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2549.html">CVE-2016-2549</cve>
<bugzilla href="https://bugzilla.suse.com/968013">SUSE bug 968013</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208637" comment="kernel-default-man-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208641" comment="kernel-pae-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208642" comment="kernel-pae-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208643" comment="kernel-pae-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2554</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2554" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2554" source="CVE"/>
    <description>
    Stack-based buffer overflow in ext/phar/tar.c in PHP before 5.5.32, 5.6.x before 5.6.18, and 7.x before 7.0.3 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TAR archive.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2554.html">CVE-2016-2554</cve>
<bugzilla href="https://bugzilla.suse.com/968284">SUSE bug 968284</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208897" comment="apache2-mod_php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203264" comment="php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208898" comment="php53-bcmath-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208899" comment="php53-bz2-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208900" comment="php53-calendar-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208901" comment="php53-ctype-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208902" comment="php53-curl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208903" comment="php53-dba-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208904" comment="php53-dom-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208905" comment="php53-exif-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208906" comment="php53-fastcgi-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208907" comment="php53-fileinfo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208908" comment="php53-ftp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208909" comment="php53-gd-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208910" comment="php53-gettext-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208911" comment="php53-gmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208912" comment="php53-iconv-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208913" comment="php53-intl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208914" comment="php53-json-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208915" comment="php53-ldap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208916" comment="php53-mbstring-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208917" comment="php53-mcrypt-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208918" comment="php53-mysql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208919" comment="php53-odbc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208920" comment="php53-openssl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208921" comment="php53-pcntl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208922" comment="php53-pdo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208923" comment="php53-pear-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208924" comment="php53-pgsql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208925" comment="php53-pspell-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208926" comment="php53-shmop-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208927" comment="php53-snmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208928" comment="php53-soap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208929" comment="php53-suhosin-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208930" comment="php53-sysvmsg-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208931" comment="php53-sysvsem-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208932" comment="php53-sysvshm-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208933" comment="php53-tokenizer-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208934" comment="php53-wddx-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208935" comment="php53-xmlreader-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208936" comment="php53-xmlrpc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208937" comment="php53-xmlwriter-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208938" comment="php53-xsl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208939" comment="php53-zip-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208940" comment="php53-zlib-5.3.17-71 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2569</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-2569" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2569" source="CVE"/>
    <description>
    Squid 3.x before 3.5.15 and 4.x before 4.0.7 does not properly append data to String objects, which allows remote servers to cause a denial of service (assertion failure and daemon exit) via a long string, as demonstrated by a crafted HTTP Vary header.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2569.html">CVE-2016-2569</cve>
<bugzilla href="https://bugzilla.suse.com/968392">SUSE bug 968392</bugzilla>
<bugzilla href="https://bugzilla.suse.com/968393">SUSE bug 968393</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210806" comment="squid3-3.1.23-8.16.30 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2570</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-2570" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2570" source="CVE"/>
    <description>
    The Edge Side Includes (ESI) parser in Squid 3.x before 3.5.15 and 4.x before 4.0.7 does not check buffer limits during XML parsing, which allows remote HTTP servers to cause a denial of service (assertion failure and daemon exit) via a crafted XML document, related to esi/CustomParser.cc and esi/CustomParser.h.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2570.html">CVE-2016-2570</cve>
<bugzilla href="https://bugzilla.suse.com/968392">SUSE bug 968392</bugzilla>
<bugzilla href="https://bugzilla.suse.com/968393">SUSE bug 968393</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210806" comment="squid3-3.1.23-8.16.30 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2571</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-2571" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2571" source="CVE"/>
    <description>
    http.cc in Squid 3.x before 3.5.15 and 4.x before 4.0.7 proceeds with the storage of certain data after a response-parsing failure, which allows remote HTTP servers to cause a denial of service (assertion failure and daemon exit) via a malformed response.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2571.html">CVE-2016-2571</cve>
<bugzilla href="https://bugzilla.suse.com/968394">SUSE bug 968394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/968395">SUSE bug 968395</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210806" comment="squid3-3.1.23-8.16.30 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2572</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-2572" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2572" source="CVE"/>
    <description>
    http.cc in Squid 4.x before 4.0.7 relies on the HTTP status code after a response-parsing failure, which allows remote HTTP servers to cause a denial of service (assertion failure and daemon exit) via a malformed response.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2572.html">CVE-2016-2572</cve>
<bugzilla href="https://bugzilla.suse.com/968394">SUSE bug 968394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/968395">SUSE bug 968395</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210806" comment="squid3-3.1.23-8.16.30 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2774</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2774" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2774" source="CVE"/>
    <description>
    ISC DHCP 4.1.x before 4.1-ESV-R13 and 4.2.x and 4.3.x before 4.3.4 does not restrict the number of concurrent TCP sessions, which allows remote attackers to cause a denial of service (INSIST assertion failure or request-processing outage) by establishing many sessions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2774.html">CVE-2016-2774</cve>
<bugzilla href="https://bugzilla.suse.com/969820">SUSE bug 969820</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202499" comment="dhcp-4.2.4.P2-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205317" comment="dhcp-client-4.2.4.P2-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205318" comment="dhcp-relay-4.2.4.P2-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205319" comment="dhcp-server-4.2.4.P2-0.27 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2775</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2775" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2775" source="CVE"/>
    <description>
    ISC BIND 9.x before 9.9.9-P2, 9.10.x before 9.10.4-P2, and 9.11.x before 9.11.0b2, when lwresd or the named lwres option is enabled, allows remote attackers to cause a denial of service (daemon crash) via a long request that uses the lightweight resolver protocol.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2775.html">CVE-2016-2775</cve>
<bugzilla href="https://bugzilla.suse.com/989528">SUSE bug 989528</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202449" comment="bind-9.9.6P1-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205295" comment="bind-chrootenv-9.9.6P1-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202450" comment="bind-devel-9.9.6P1-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205296" comment="bind-doc-9.9.6P1-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205297" comment="bind-libs-9.9.6P1-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208439" comment="bind-libs-32bit-9.9.6P1-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205298" comment="bind-utils-9.9.6P1-0.44 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202449" comment="bind-9.9.6P1-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205295" comment="bind-chrootenv-9.9.6P1-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205296" comment="bind-doc-9.9.6P1-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205297" comment="bind-libs-9.9.6P1-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208439" comment="bind-libs-32bit-9.9.6P1-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205298" comment="bind-utils-9.9.6P1-0.44 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2776</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2776" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2776" source="CVE"/>
    <description>
    buffer.c in named in ISC BIND 9 before 9.9.9-P3, 9.10.x before 9.10.4-P3, and 9.11.x before 9.11.0rc3 does not properly construct responses, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted query.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2776.html">CVE-2016-2776</cve>
<bugzilla href="https://bugzilla.suse.com/1000362">SUSE bug 1000362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1001595">SUSE bug 1001595</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1001597">SUSE bug 1001597</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1007829">SUSE bug 1007829</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202437" comment="bind-9.9.6P1-0.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205279" comment="bind-chrootenv-9.9.6P1-0.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205280" comment="bind-doc-9.9.6P1-0.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205281" comment="bind-libs-9.9.6P1-0.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207616" comment="bind-libs-32bit-9.9.6P1-0.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205282" comment="bind-utils-9.9.6P1-0.30 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2782</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2782" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2782" source="CVE"/>
    <description>
    The treo_attach function in drivers/usb/serial/visor.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a (1) bulk-in or (2) interrupt-in endpoint.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2782.html">CVE-2016-2782</cve>
<bugzilla href="https://bugzilla.suse.com/961512">SUSE bug 961512</bugzilla>
<bugzilla href="https://bugzilla.suse.com/968670">SUSE bug 968670</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208637" comment="kernel-default-man-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208641" comment="kernel-pae-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208642" comment="kernel-pae-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208643" comment="kernel-pae-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2790</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-2790" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2790" source="CVE"/>
    <description>
    The graphite2::TtfUtil::GetTableInfo function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, does not initialize memory for an unspecified data structure, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2790.html">CVE-2016-2790</cve>
<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202375" comment="MozillaFirefox-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204966" comment="MozillaFirefox-translations-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204967" comment="libfreebl3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204968" comment="libfreebl3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204969" comment="libsoftokn3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204970" comment="libsoftokn3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202377" comment="mozilla-nspr-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204971" comment="mozilla-nspr-32bit-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202379" comment="mozilla-nss-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204972" comment="mozilla-nss-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204973" comment="mozilla-nss-tools-3.20.2-28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2791</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-2791" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2791" source="CVE"/>
    <description>
    The graphite2::GlyphCache::glyph function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2791.html">CVE-2016-2791</cve>
<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202375" comment="MozillaFirefox-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204966" comment="MozillaFirefox-translations-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204967" comment="libfreebl3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204968" comment="libfreebl3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204969" comment="libsoftokn3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204970" comment="libsoftokn3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202377" comment="mozilla-nspr-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204971" comment="mozilla-nspr-32bit-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202379" comment="mozilla-nss-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204972" comment="mozilla-nss-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204973" comment="mozilla-nss-tools-3.20.2-28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2792</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-2792" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2792" source="CVE"/>
    <description>
    The graphite2::Slot::getAttr function in Slot.cpp in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font, a different vulnerability than CVE-2016-2800.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2792.html">CVE-2016-2792</cve>
<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202375" comment="MozillaFirefox-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204966" comment="MozillaFirefox-translations-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204967" comment="libfreebl3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204968" comment="libfreebl3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204969" comment="libsoftokn3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204970" comment="libsoftokn3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202377" comment="mozilla-nspr-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204971" comment="mozilla-nspr-32bit-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202379" comment="mozilla-nss-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204972" comment="mozilla-nss-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204973" comment="mozilla-nss-tools-3.20.2-28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2793</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-2793" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2793" source="CVE"/>
    <description>
    CachedCmap.cpp in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2793.html">CVE-2016-2793</cve>
<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202375" comment="MozillaFirefox-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204966" comment="MozillaFirefox-translations-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204967" comment="libfreebl3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204968" comment="libfreebl3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204969" comment="libsoftokn3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204970" comment="libsoftokn3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202377" comment="mozilla-nspr-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204971" comment="mozilla-nspr-32bit-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202379" comment="mozilla-nss-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204972" comment="mozilla-nss-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204973" comment="mozilla-nss-tools-3.20.2-28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2794</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-2794" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2794" source="CVE"/>
    <description>
    The graphite2::TtfUtil::CmapSubtable12NextCodepoint function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2794.html">CVE-2016-2794</cve>
<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202375" comment="MozillaFirefox-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204966" comment="MozillaFirefox-translations-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204967" comment="libfreebl3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204968" comment="libfreebl3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204969" comment="libsoftokn3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204970" comment="libsoftokn3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202377" comment="mozilla-nspr-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204971" comment="mozilla-nspr-32bit-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202379" comment="mozilla-nss-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204972" comment="mozilla-nss-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204973" comment="mozilla-nss-tools-3.20.2-28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2795</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-2795" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2795" source="CVE"/>
    <description>
    The graphite2::FileFace::get_table_fn function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, does not initialize memory for an unspecified data structure, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2795.html">CVE-2016-2795</cve>
<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202375" comment="MozillaFirefox-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204966" comment="MozillaFirefox-translations-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204967" comment="libfreebl3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204968" comment="libfreebl3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204969" comment="libsoftokn3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204970" comment="libsoftokn3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202377" comment="mozilla-nspr-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204971" comment="mozilla-nspr-32bit-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202379" comment="mozilla-nss-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204972" comment="mozilla-nss-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204973" comment="mozilla-nss-tools-3.20.2-28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2796</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-2796" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2796" source="CVE"/>
    <description>
    Heap-based buffer overflow in the graphite2::vm::Machine::Code::Code function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2796.html">CVE-2016-2796</cve>
<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202375" comment="MozillaFirefox-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204966" comment="MozillaFirefox-translations-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204967" comment="libfreebl3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204968" comment="libfreebl3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204969" comment="libsoftokn3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204970" comment="libsoftokn3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202377" comment="mozilla-nspr-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204971" comment="mozilla-nspr-32bit-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202379" comment="mozilla-nss-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204972" comment="mozilla-nss-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204973" comment="mozilla-nss-tools-3.20.2-28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2797</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-2797" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2797" source="CVE"/>
    <description>
    The graphite2::TtfUtil::CmapSubtable12Lookup function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font, a different vulnerability than CVE-2016-2801.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2797.html">CVE-2016-2797</cve>
<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202375" comment="MozillaFirefox-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204966" comment="MozillaFirefox-translations-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204967" comment="libfreebl3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204968" comment="libfreebl3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204969" comment="libsoftokn3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204970" comment="libsoftokn3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202377" comment="mozilla-nspr-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204971" comment="mozilla-nspr-32bit-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202379" comment="mozilla-nss-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204972" comment="mozilla-nss-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204973" comment="mozilla-nss-tools-3.20.2-28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2798</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-2798" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2798" source="CVE"/>
    <description>
    The graphite2::GlyphCache::Loader::Loader function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2798.html">CVE-2016-2798</cve>
<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202375" comment="MozillaFirefox-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204966" comment="MozillaFirefox-translations-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204967" comment="libfreebl3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204968" comment="libfreebl3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204969" comment="libsoftokn3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204970" comment="libsoftokn3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202377" comment="mozilla-nspr-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204971" comment="mozilla-nspr-32bit-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202379" comment="mozilla-nss-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204972" comment="mozilla-nss-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204973" comment="mozilla-nss-tools-3.20.2-28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2799</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-2799" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2799" source="CVE"/>
    <description>
    Heap-based buffer overflow in the graphite2::Slot::setAttr function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2799.html">CVE-2016-2799</cve>
<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202375" comment="MozillaFirefox-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204966" comment="MozillaFirefox-translations-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204967" comment="libfreebl3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204968" comment="libfreebl3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204969" comment="libsoftokn3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204970" comment="libsoftokn3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202377" comment="mozilla-nspr-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204971" comment="mozilla-nspr-32bit-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202379" comment="mozilla-nss-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204972" comment="mozilla-nss-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204973" comment="mozilla-nss-tools-3.20.2-28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-2800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2800" source="CVE"/>
    <description>
    The graphite2::Slot::getAttr function in Slot.cpp in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font, a different vulnerability than CVE-2016-2792.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2800.html">CVE-2016-2800</cve>
<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202375" comment="MozillaFirefox-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204966" comment="MozillaFirefox-translations-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204967" comment="libfreebl3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204968" comment="libfreebl3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204969" comment="libsoftokn3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204970" comment="libsoftokn3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202377" comment="mozilla-nspr-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204971" comment="mozilla-nspr-32bit-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202379" comment="mozilla-nss-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204972" comment="mozilla-nss-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204973" comment="mozilla-nss-tools-3.20.2-28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2801</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-2801" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2801" source="CVE"/>
    <description>
    The graphite2::TtfUtil::CmapSubtable12Lookup function in TtfUtil.cpp in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font, a different vulnerability than CVE-2016-2797.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2801.html">CVE-2016-2801</cve>
<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202375" comment="MozillaFirefox-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204966" comment="MozillaFirefox-translations-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204967" comment="libfreebl3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204968" comment="libfreebl3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204969" comment="libsoftokn3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204970" comment="libsoftokn3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202377" comment="mozilla-nspr-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204971" comment="mozilla-nspr-32bit-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202379" comment="mozilla-nss-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204972" comment="mozilla-nss-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204973" comment="mozilla-nss-tools-3.20.2-28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2802</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-2802" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2802" source="CVE"/>
    <description>
    The graphite2::TtfUtil::CmapSubtable4NextCodepoint function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2802.html">CVE-2016-2802</cve>
<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202375" comment="MozillaFirefox-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204966" comment="MozillaFirefox-translations-38.7.0esr-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204967" comment="libfreebl3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204968" comment="libfreebl3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204969" comment="libsoftokn3-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204970" comment="libsoftokn3-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202377" comment="mozilla-nspr-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204971" comment="mozilla-nspr-32bit-4.12-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202379" comment="mozilla-nss-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204972" comment="mozilla-nss-32bit-3.20.2-28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009204973" comment="mozilla-nss-tools-3.20.2-28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2805" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2805" source="CVE"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox ESR 38.x before 38.8 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2805.html">CVE-2016-2805</cve>
<bugzilla href="https://bugzilla.suse.com/977333">SUSE bug 977333</bugzilla>
<bugzilla href="https://bugzilla.suse.com/977374">SUSE bug 977374</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202331" comment="MozillaFirefox-38.8.0esr-40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207521" comment="MozillaFirefox-translations-38.8.0esr-40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208360" comment="libfreebl3-3.20.2-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208361" comment="libfreebl3-32bit-3.20.2-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208362" comment="libsoftokn3-3.20.2-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208363" comment="libsoftokn3-32bit-3.20.2-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202333" comment="mozilla-nspr-4.12-26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208364" comment="mozilla-nspr-32bit-4.12-26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202335" comment="mozilla-nss-3.20.2-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208365" comment="mozilla-nss-32bit-3.20.2-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208366" comment="mozilla-nss-tools-3.20.2-30 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2807</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2807" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2807" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 46.0, Firefox ESR 38.x before 38.8, and Firefox ESR 45.x before 45.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2807.html">CVE-2016-2807</cve>
<bugzilla href="https://bugzilla.suse.com/977333">SUSE bug 977333</bugzilla>
<bugzilla href="https://bugzilla.suse.com/977376">SUSE bug 977376</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202331" comment="MozillaFirefox-38.8.0esr-40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207521" comment="MozillaFirefox-translations-38.8.0esr-40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208360" comment="libfreebl3-3.20.2-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208361" comment="libfreebl3-32bit-3.20.2-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208362" comment="libsoftokn3-3.20.2-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208363" comment="libsoftokn3-32bit-3.20.2-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202333" comment="mozilla-nspr-4.12-26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208364" comment="mozilla-nspr-32bit-4.12-26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202335" comment="mozilla-nss-3.20.2-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208365" comment="mozilla-nss-32bit-3.20.2-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208366" comment="mozilla-nss-tools-3.20.2-30 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2808</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2808" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2808" source="CVE"/>
    <description>
    The watch implementation in the JavaScript engine in Mozilla Firefox before 46.0, Firefox ESR 38.x before 38.8, and Firefox ESR 45.x before 45.1 allows remote attackers to execute arbitrary code or cause a denial of service (generation-count overflow, out-of-bounds HashMap write access, and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2808.html">CVE-2016-2808</cve>
<bugzilla href="https://bugzilla.suse.com/977333">SUSE bug 977333</bugzilla>
<bugzilla href="https://bugzilla.suse.com/977386">SUSE bug 977386</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202331" comment="MozillaFirefox-38.8.0esr-40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207521" comment="MozillaFirefox-translations-38.8.0esr-40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208360" comment="libfreebl3-3.20.2-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208361" comment="libfreebl3-32bit-3.20.2-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208362" comment="libsoftokn3-3.20.2-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208363" comment="libsoftokn3-32bit-3.20.2-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202333" comment="mozilla-nspr-4.12-26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208364" comment="mozilla-nspr-32bit-4.12-26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202335" comment="mozilla-nss-3.20.2-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208365" comment="mozilla-nss-32bit-3.20.2-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208366" comment="mozilla-nss-tools-3.20.2-30 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2814" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2814" source="CVE"/>
    <description>
    Heap-based buffer overflow in the stagefright::SampleTable::parseSampleCencInfo function in libstagefright in Mozilla Firefox before 46.0, Firefox ESR 38.x before 38.8, and Firefox ESR 45.x before 45.1 allows remote attackers to execute arbitrary code via crafted CENC offsets that lead to mismanagement of the sizes table.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2814.html">CVE-2016-2814</cve>
<bugzilla href="https://bugzilla.suse.com/977333">SUSE bug 977333</bugzilla>
<bugzilla href="https://bugzilla.suse.com/977381">SUSE bug 977381</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202331" comment="MozillaFirefox-38.8.0esr-40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207521" comment="MozillaFirefox-translations-38.8.0esr-40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208360" comment="libfreebl3-3.20.2-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208361" comment="libfreebl3-32bit-3.20.2-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208362" comment="libsoftokn3-3.20.2-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208363" comment="libsoftokn3-32bit-3.20.2-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202333" comment="mozilla-nspr-4.12-26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208364" comment="mozilla-nspr-32bit-4.12-26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202335" comment="mozilla-nss-3.20.2-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208365" comment="mozilla-nss-32bit-3.20.2-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208366" comment="mozilla-nss-tools-3.20.2-30 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2815" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2815" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 47.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2815.html">CVE-2016-2815</cve>
<bugzilla href="https://bugzilla.suse.com/983549">SUSE bug 983549</bugzilla>
<bugzilla href="https://bugzilla.suse.com/983638">SUSE bug 983638</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202337" comment="MozillaFirefox-45.2.0esr-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205235" comment="MozillaFirefox-branding-SLED-45.0-23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205236" comment="MozillaFirefox-translations-45.2.0esr-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202339" comment="firefox-fontconfig-2.11.0-2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205237" comment="libfreebl3-3.21.1-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208367" comment="libfreebl3-32bit-3.21.1-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205238" comment="libsoftokn3-3.21.1-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208368" comment="libsoftokn3-32bit-3.21.1-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202341" comment="mozilla-nspr-4.12-29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208369" comment="mozilla-nspr-32bit-4.12-29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202343" comment="mozilla-nss-3.21.1-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208370" comment="mozilla-nss-32bit-3.21.1-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205239" comment="mozilla-nss-tools-3.21.1-35 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2818</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2818" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2818" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2818.html">CVE-2016-2818</cve>
<bugzilla href="https://bugzilla.suse.com/983549">SUSE bug 983549</bugzilla>
<bugzilla href="https://bugzilla.suse.com/983638">SUSE bug 983638</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202337" comment="MozillaFirefox-45.2.0esr-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205235" comment="MozillaFirefox-branding-SLED-45.0-23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205236" comment="MozillaFirefox-translations-45.2.0esr-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202339" comment="firefox-fontconfig-2.11.0-2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205237" comment="libfreebl3-3.21.1-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208367" comment="libfreebl3-32bit-3.21.1-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205238" comment="libsoftokn3-3.21.1-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208368" comment="libsoftokn3-32bit-3.21.1-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202341" comment="mozilla-nspr-4.12-29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208369" comment="mozilla-nspr-32bit-4.12-29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202343" comment="mozilla-nss-3.21.1-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208370" comment="mozilla-nss-32bit-3.21.1-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205239" comment="mozilla-nss-tools-3.21.1-35 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2819</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2819" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2819" source="CVE"/>
    <description>
    Heap-based buffer overflow in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 allows remote attackers to execute arbitrary code via foreign-context HTML5 fragments, as demonstrated by fragments within an SVG element.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2819.html">CVE-2016-2819</cve>
<bugzilla href="https://bugzilla.suse.com/983549">SUSE bug 983549</bugzilla>
<bugzilla href="https://bugzilla.suse.com/983655">SUSE bug 983655</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202337" comment="MozillaFirefox-45.2.0esr-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205235" comment="MozillaFirefox-branding-SLED-45.0-23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205236" comment="MozillaFirefox-translations-45.2.0esr-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202339" comment="firefox-fontconfig-2.11.0-2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205237" comment="libfreebl3-3.21.1-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208367" comment="libfreebl3-32bit-3.21.1-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205238" comment="libsoftokn3-3.21.1-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208368" comment="libsoftokn3-32bit-3.21.1-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202341" comment="mozilla-nspr-4.12-29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208369" comment="mozilla-nspr-32bit-4.12-29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202343" comment="mozilla-nss-3.21.1-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208370" comment="mozilla-nss-32bit-3.21.1-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205239" comment="mozilla-nss-tools-3.21.1-35 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2821</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2821" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2821" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozilla::dom::Element class in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2, when contenteditable mode is enabled, allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by triggering deletion of DOM elements that were created in the editor.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2821.html">CVE-2016-2821</cve>
<bugzilla href="https://bugzilla.suse.com/983549">SUSE bug 983549</bugzilla>
<bugzilla href="https://bugzilla.suse.com/983653">SUSE bug 983653</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202337" comment="MozillaFirefox-45.2.0esr-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205235" comment="MozillaFirefox-branding-SLED-45.0-23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205236" comment="MozillaFirefox-translations-45.2.0esr-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202339" comment="firefox-fontconfig-2.11.0-2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205237" comment="libfreebl3-3.21.1-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208367" comment="libfreebl3-32bit-3.21.1-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205238" comment="libsoftokn3-3.21.1-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208368" comment="libsoftokn3-32bit-3.21.1-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202341" comment="mozilla-nspr-4.12-29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208369" comment="mozilla-nspr-32bit-4.12-29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202343" comment="mozilla-nss-3.21.1-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208370" comment="mozilla-nss-32bit-3.21.1-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205239" comment="mozilla-nss-tools-3.21.1-35 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2822</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2822" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2822" source="CVE"/>
    <description>
    Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 allow remote attackers to spoof the address bar via a SELECT element with a persistent menu.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2822.html">CVE-2016-2822</cve>
<bugzilla href="https://bugzilla.suse.com/983549">SUSE bug 983549</bugzilla>
<bugzilla href="https://bugzilla.suse.com/983652">SUSE bug 983652</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202337" comment="MozillaFirefox-45.2.0esr-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205235" comment="MozillaFirefox-branding-SLED-45.0-23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205236" comment="MozillaFirefox-translations-45.2.0esr-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202339" comment="firefox-fontconfig-2.11.0-2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205237" comment="libfreebl3-3.21.1-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208367" comment="libfreebl3-32bit-3.21.1-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205238" comment="libsoftokn3-3.21.1-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208368" comment="libsoftokn3-32bit-3.21.1-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202341" comment="mozilla-nspr-4.12-29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208369" comment="mozilla-nspr-32bit-4.12-29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202343" comment="mozilla-nss-3.21.1-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208370" comment="mozilla-nss-32bit-3.21.1-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205239" comment="mozilla-nss-tools-3.21.1-35 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2824</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2824" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2824" source="CVE"/>
    <description>
    The TSymbolTableLevel class in ANGLE, as used in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 on Windows, allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact by triggering use of a WebGL shader that writes to an array.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2824.html">CVE-2016-2824</cve>
<bugzilla href="https://bugzilla.suse.com/983549">SUSE bug 983549</bugzilla>
<bugzilla href="https://bugzilla.suse.com/983651">SUSE bug 983651</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202337" comment="MozillaFirefox-45.2.0esr-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205235" comment="MozillaFirefox-branding-SLED-45.0-23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205236" comment="MozillaFirefox-translations-45.2.0esr-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202339" comment="firefox-fontconfig-2.11.0-2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205237" comment="libfreebl3-3.21.1-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208367" comment="libfreebl3-32bit-3.21.1-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205238" comment="libsoftokn3-3.21.1-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208368" comment="libsoftokn3-32bit-3.21.1-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202341" comment="mozilla-nspr-4.12-29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208369" comment="mozilla-nspr-32bit-4.12-29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202343" comment="mozilla-nss-3.21.1-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208370" comment="mozilla-nss-32bit-3.21.1-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205239" comment="mozilla-nss-tools-3.21.1-35 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2828</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2828" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2828" source="CVE"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 allows remote attackers to execute arbitrary code via WebGL content that triggers texture access after destruction of the texture's recycle pool.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2828.html">CVE-2016-2828</cve>
<bugzilla href="https://bugzilla.suse.com/983549">SUSE bug 983549</bugzilla>
<bugzilla href="https://bugzilla.suse.com/983646">SUSE bug 983646</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202337" comment="MozillaFirefox-45.2.0esr-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205235" comment="MozillaFirefox-branding-SLED-45.0-23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205236" comment="MozillaFirefox-translations-45.2.0esr-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202339" comment="firefox-fontconfig-2.11.0-2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205237" comment="libfreebl3-3.21.1-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208367" comment="libfreebl3-32bit-3.21.1-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205238" comment="libsoftokn3-3.21.1-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208368" comment="libsoftokn3-32bit-3.21.1-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202341" comment="mozilla-nspr-4.12-29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208369" comment="mozilla-nspr-32bit-4.12-29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202343" comment="mozilla-nss-3.21.1-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208370" comment="mozilla-nss-32bit-3.21.1-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205239" comment="mozilla-nss-tools-3.21.1-35 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2830" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2830" source="CVE"/>
    <description>
    Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 preserve the network connection used for favicon resource retrieval after the associated browser window is closed, which makes it easier for remote web servers to track users by observing network traffic from multiple IP addresses.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2830.html">CVE-2016-2830</cve>
<bugzilla href="https://bugzilla.suse.com/983922">SUSE bug 983922</bugzilla>
<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202345" comment="MozillaFirefox-45.3.0esr-50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205240" comment="MozillaFirefox-translations-45.3.0esr-50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2831</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2831" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2831" source="CVE"/>
    <description>
    Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 do not ensure that the user approves the fullscreen and pointerlock settings, which allows remote attackers to cause a denial of service (UI outage), or conduct clickjacking or spoofing attacks, via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2831.html">CVE-2016-2831</cve>
<bugzilla href="https://bugzilla.suse.com/983549">SUSE bug 983549</bugzilla>
<bugzilla href="https://bugzilla.suse.com/983632">SUSE bug 983632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/983643">SUSE bug 983643</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202337" comment="MozillaFirefox-45.2.0esr-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205235" comment="MozillaFirefox-branding-SLED-45.0-23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205236" comment="MozillaFirefox-translations-45.2.0esr-45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202339" comment="firefox-fontconfig-2.11.0-2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205237" comment="libfreebl3-3.21.1-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208367" comment="libfreebl3-32bit-3.21.1-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205238" comment="libsoftokn3-3.21.1-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208368" comment="libsoftokn3-32bit-3.21.1-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202341" comment="mozilla-nspr-4.12-29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208369" comment="mozilla-nspr-32bit-4.12-29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202343" comment="mozilla-nss-3.21.1-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208370" comment="mozilla-nss-32bit-3.21.1-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205239" comment="mozilla-nss-tools-3.21.1-35 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2834</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2834" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2834" source="CVE"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.23, as used in Mozilla Firefox before 47.0, allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2834.html">CVE-2016-2834</cve>
<bugzilla href="https://bugzilla.suse.com/983549">SUSE bug 983549</bugzilla>
<bugzilla href="https://bugzilla.suse.com/983639">SUSE bug 983639</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202355" comment="MozillaFirefox-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205235" comment="MozillaFirefox-branding-SLED-45.0-23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205245" comment="MozillaFirefox-translations-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202339" comment="firefox-fontconfig-2.11.0-2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205246" comment="libfreebl3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208371" comment="libfreebl3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205247" comment="libsoftokn3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208372" comment="libsoftokn3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202359" comment="mozilla-nss-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208374" comment="mozilla-nss-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205248" comment="mozilla-nss-tools-3.29.5-46 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2835" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 48.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2835.html">CVE-2016-2835</cve>
<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202345" comment="MozillaFirefox-45.3.0esr-50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205240" comment="MozillaFirefox-translations-45.3.0esr-50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2836" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to Http2Session::Shutdown and SpdySession31::Shutdown, and other vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2836.html">CVE-2016-2836</cve>
<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202345" comment="MozillaFirefox-45.3.0esr-50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205240" comment="MozillaFirefox-translations-45.3.0esr-50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2837</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2837" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2837" source="CVE"/>
    <description>
    Heap-based buffer overflow in the ClearKey Content Decryption Module (CDM) in the Encrypted Media Extensions (EME) API in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 might allow remote attackers to execute arbitrary code by providing a malformed video and leveraging a Gecko Media Plugin (GMP) sandbox bypass.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2837.html">CVE-2016-2837</cve>
<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202345" comment="MozillaFirefox-45.3.0esr-50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205240" comment="MozillaFirefox-translations-45.3.0esr-50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2838</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2838" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2838" source="CVE"/>
    <description>
    Heap-based buffer overflow in the nsBidi::BracketData::AddOpening function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code via directional content in an SVG document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2838.html">CVE-2016-2838</cve>
<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202345" comment="MozillaFirefox-45.3.0esr-50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205240" comment="MozillaFirefox-translations-45.3.0esr-50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2839</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2839" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2839" source="CVE"/>
    <description>
    Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 on Linux make cairo _cairo_surface_get_extents calls that do not properly interact with libav header allocation in FFmpeg 0.10, which allows remote attackers to cause a denial of service (application crash) via a crafted video.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2839.html">CVE-2016-2839</cve>
<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202345" comment="MozillaFirefox-45.3.0esr-50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205240" comment="MozillaFirefox-translations-45.3.0esr-50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2841</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-2841" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2841" source="CVE"/>
    <description>
    The ne2000_receive function in the NE2000 NIC emulation support (hw/net/ne2000.c) in QEMU before 2.5.1 allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via crafted values for the PSTART and PSTOP registers, involving ring buffer control.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2841.html">CVE-2016-2841</cve>
<bugzilla href="https://bugzilla.suse.com/969350">SUSE bug 969350</bugzilla>
<bugzilla href="https://bugzilla.suse.com/969351">SUSE bug 969351</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209045" comment="xen-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209046" comment="xen-doc-html-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209047" comment="xen-doc-pdf-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209048" comment="xen-kmp-default-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209049" comment="xen-kmp-pae-4.2.5_20_3.0.101_0.47.79-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209050" comment="xen-libs-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209051" comment="xen-libs-32bit-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209052" comment="xen-tools-4.2.5_20-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209053" comment="xen-tools-domU-4.2.5_20-24 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2847</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-2847" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2847" source="CVE"/>
    <description>
    fs/pipe.c in the Linux kernel before 4.5 does not limit the amount of unread data in pipes, which allows local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2847.html">CVE-2016-2847</cve>
<bugzilla href="https://bugzilla.suse.com/970948">SUSE bug 970948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/974646">SUSE bug 974646</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208637" comment="kernel-default-man-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208641" comment="kernel-pae-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208642" comment="kernel-pae-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208643" comment="kernel-pae-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2851</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-2851" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2851" source="CVE"/>
    <description>
    Integer overflow in proto.c in libotr before 4.1.1 on 64-bit platforms allows remote attackers to cause a denial of service (memory corruption and application crash) or execute arbitrary code via a series of large OTR messages, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2851.html">CVE-2016-2851</cve>
<bugzilla href="https://bugzilla.suse.com/969785">SUSE bug 969785</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202851" comment="libotr-3.2.0-10.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205062" comment="libotr2-3.2.0-10.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2857</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-2857" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2857" source="CVE"/>
    <description>
    The net_checksum_calculate function in net/checksum.c in QEMU allows local guest OS users to cause a denial of service (out-of-bounds heap read and crash) via the payload length in a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2857.html">CVE-2016-2857</cve>
<bugzilla href="https://bugzilla.suse.com/970037">SUSE bug 970037</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2858</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-2858" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2858" source="CVE"/>
    <description>
    QEMU, when built with the Pseudo Random Number Generator (PRNG) back-end support, allows local guest OS users to cause a denial of service (process crash) via an entropy request, which triggers arbitrary stack based allocation and memory corruption.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2858.html">CVE-2016-2858</cve>
<bugzilla href="https://bugzilla.suse.com/970036">SUSE bug 970036</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3075</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-3075" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3075" source="CVE"/>
    <description>
    Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3075.html">CVE-2016-3075</cve>
<bugzilla href="https://bugzilla.suse.com/973164">SUSE bug 973164</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202691" comment="glibc-2.11.3-17.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209287" comment="glibc-32bit-2.11.3-17.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209288" comment="glibc-devel-2.11.3-17.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209289" comment="glibc-devel-32bit-2.11.3-17.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202692" comment="glibc-html-2.11.3-17.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209290" comment="glibc-i18ndata-2.11.3-17.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202693" comment="glibc-info-2.11.3-17.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209291" comment="glibc-locale-2.11.3-17.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209292" comment="glibc-locale-32bit-2.11.3-17.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209294" comment="glibc-profile-2.11.3-17.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209295" comment="glibc-profile-32bit-2.11.3-17.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209298" comment="nscd-2.11.3-17.102 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3115</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-3115" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3115" source="CVE"/>
    <description>
    Multiple CRLF injection vulnerabilities in session.c in sshd in OpenSSH before 7.2p2 allow remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data, related to the (1) do_authenticated1 and (2) session_x11_req functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3115.html">CVE-2016-3115</cve>
<bugzilla href="https://bugzilla.suse.com/1005738">SUSE bug 1005738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1087412">SUSE bug 1087412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
<bugzilla href="https://bugzilla.suse.com/970632">SUSE bug 970632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/992296">SUSE bug 992296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205681" comment="openssh-6.2p2-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205682" comment="openssh-askpass-6.2p2-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205683" comment="openssh-askpass-gnome-6.2p2-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203762" comment="openssh-openssl1-6.6p1-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203763" comment="openssh-openssl1-helpers-6.6p1-15 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205681" comment="openssh-6.2p2-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205682" comment="openssh-askpass-6.2p2-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205683" comment="openssh-askpass-gnome-6.2p2-0.33 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3119</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-3119" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3119" source="CVE"/>
    <description>
    The process_db_args function in plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in the LDAP KDB module in kadmind in MIT Kerberos 5 (aka krb5) through 1.13.4 and 1.14.x through 1.14.1 mishandles the DB argument, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted request to modify a principal.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3119.html">CVE-2016-3119</cve>
<bugzilla href="https://bugzilla.suse.com/971942">SUSE bug 971942</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202804" comment="krb5-1.6.3-133.49.109 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209872" comment="krb5-32bit-1.6.3-133.49.109 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209873" comment="krb5-apps-clients-1.6.3-133.49.109 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209874" comment="krb5-apps-servers-1.6.3-133.49.109 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209875" comment="krb5-client-1.6.3-133.49.109 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202807" comment="krb5-server-1.6.3-133.49.109 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3134</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-3134" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3134" source="CVE"/>
    <description>
    The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3134.html">CVE-2016-3134</cve>
<bugzilla href="https://bugzilla.suse.com/1052256">SUSE bug 1052256</bugzilla>
<bugzilla href="https://bugzilla.suse.com/971126">SUSE bug 971126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/971793">SUSE bug 971793</bugzilla>
<bugzilla href="https://bugzilla.suse.com/986362">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/986365">SUSE bug 986365</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208598" comment="kernel-bigsmp-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208599" comment="kernel-bigsmp-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208600" comment="kernel-bigsmp-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205422" comment="kernel-default-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205423" comment="kernel-default-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205424" comment="kernel-default-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205425" comment="kernel-ec2-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205426" comment="kernel-ec2-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205427" comment="kernel-ec2-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205431" comment="kernel-source-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205432" comment="kernel-syms-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205433" comment="kernel-trace-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205434" comment="kernel-trace-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205435" comment="kernel-trace-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205436" comment="kernel-xen-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205437" comment="kernel-xen-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205438" comment="kernel-xen-devel-3.0.101-0.47.86 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208598" comment="kernel-bigsmp-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208599" comment="kernel-bigsmp-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208600" comment="kernel-bigsmp-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205422" comment="kernel-default-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205423" comment="kernel-default-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205424" comment="kernel-default-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208601" comment="kernel-default-man-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205425" comment="kernel-ec2-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205426" comment="kernel-ec2-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205427" comment="kernel-ec2-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205428" comment="kernel-pae-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205429" comment="kernel-pae-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205430" comment="kernel-pae-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205431" comment="kernel-source-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205432" comment="kernel-syms-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205433" comment="kernel-trace-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205434" comment="kernel-trace-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205435" comment="kernel-trace-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205436" comment="kernel-xen-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205437" comment="kernel-xen-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205438" comment="kernel-xen-devel-3.0.101-0.47.86 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3137</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-3137" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3137" source="CVE"/>
    <description>
    drivers/usb/serial/cypress_m8.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both an interrupt-in and an interrupt-out endpoint descriptor, related to the cypress_generic_port_probe and cypress_open functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3137.html">CVE-2016-3137</cve>
<bugzilla href="https://bugzilla.suse.com/970970">SUSE bug 970970</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208637" comment="kernel-default-man-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208641" comment="kernel-pae-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208642" comment="kernel-pae-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208643" comment="kernel-pae-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3138</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-3138" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3138" source="CVE"/>
    <description>
    The acm_probe function in drivers/usb/class/cdc-acm.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both a control and a data endpoint descriptor.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3138.html">CVE-2016-3138</cve>
<bugzilla href="https://bugzilla.suse.com/970911">SUSE bug 970911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/970970">SUSE bug 970970</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208637" comment="kernel-default-man-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208641" comment="kernel-pae-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208642" comment="kernel-pae-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208643" comment="kernel-pae-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-3139" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3139" source="CVE"/>
    <description>
    The wacom_probe function in drivers/input/tablet/wacom_sys.c in the Linux kernel before 3.17 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3139.html">CVE-2016-3139</cve>
<bugzilla href="https://bugzilla.suse.com/970909">SUSE bug 970909</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208637" comment="kernel-default-man-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208641" comment="kernel-pae-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208642" comment="kernel-pae-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208643" comment="kernel-pae-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3140</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-3140" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3140" source="CVE"/>
    <description>
    The digi_port_init function in drivers/usb/serial/digi_acceleport.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3140.html">CVE-2016-3140</cve>
<bugzilla href="https://bugzilla.suse.com/970892">SUSE bug 970892</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208637" comment="kernel-default-man-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208641" comment="kernel-pae-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208642" comment="kernel-pae-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208643" comment="kernel-pae-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3141</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-3141" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3141" source="CVE"/>
    <description>
    Use-after-free vulnerability in wddx.c in the WDDX extension in PHP before 5.5.33 and 5.6.x before 5.6.19 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact by triggering a wddx_deserialize call on XML data containing a crafted var element.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3141.html">CVE-2016-3141</cve>
<bugzilla href="https://bugzilla.suse.com/969821">SUSE bug 969821</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208897" comment="apache2-mod_php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203264" comment="php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208898" comment="php53-bcmath-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208899" comment="php53-bz2-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208900" comment="php53-calendar-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208901" comment="php53-ctype-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208902" comment="php53-curl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208903" comment="php53-dba-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208904" comment="php53-dom-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208905" comment="php53-exif-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208906" comment="php53-fastcgi-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208907" comment="php53-fileinfo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208908" comment="php53-ftp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208909" comment="php53-gd-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208910" comment="php53-gettext-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208911" comment="php53-gmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208912" comment="php53-iconv-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208913" comment="php53-intl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208914" comment="php53-json-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208915" comment="php53-ldap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208916" comment="php53-mbstring-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208917" comment="php53-mcrypt-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208918" comment="php53-mysql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208919" comment="php53-odbc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208920" comment="php53-openssl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208921" comment="php53-pcntl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208922" comment="php53-pdo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208923" comment="php53-pear-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208924" comment="php53-pgsql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208925" comment="php53-pspell-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208926" comment="php53-shmop-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208927" comment="php53-snmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208928" comment="php53-soap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208929" comment="php53-suhosin-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208930" comment="php53-sysvmsg-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208931" comment="php53-sysvsem-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208932" comment="php53-sysvshm-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208933" comment="php53-tokenizer-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208934" comment="php53-wddx-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208935" comment="php53-xmlreader-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208936" comment="php53-xmlrpc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208937" comment="php53-xmlwriter-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208938" comment="php53-xsl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208939" comment="php53-zip-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208940" comment="php53-zlib-5.3.17-71 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3142</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-3142" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3142" source="CVE"/>
    <description>
    The phar_parse_zipfile function in zip.c in the PHAR extension in PHP before 5.5.33 and 5.6.x before 5.6.19 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read and application crash) by placing a PK\x05\x06 signature at an invalid location.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3142.html">CVE-2016-3142</cve>
<bugzilla href="https://bugzilla.suse.com/971912">SUSE bug 971912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208897" comment="apache2-mod_php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203264" comment="php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208898" comment="php53-bcmath-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208899" comment="php53-bz2-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208900" comment="php53-calendar-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208901" comment="php53-ctype-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208902" comment="php53-curl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208903" comment="php53-dba-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208904" comment="php53-dom-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208905" comment="php53-exif-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208906" comment="php53-fastcgi-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208907" comment="php53-fileinfo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208908" comment="php53-ftp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208909" comment="php53-gd-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208910" comment="php53-gettext-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208911" comment="php53-gmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208912" comment="php53-iconv-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208913" comment="php53-intl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208914" comment="php53-json-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208915" comment="php53-ldap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208916" comment="php53-mbstring-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208917" comment="php53-mcrypt-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208918" comment="php53-mysql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208919" comment="php53-odbc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208920" comment="php53-openssl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208921" comment="php53-pcntl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208922" comment="php53-pdo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208923" comment="php53-pear-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208924" comment="php53-pgsql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208925" comment="php53-pspell-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208926" comment="php53-shmop-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208927" comment="php53-snmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208928" comment="php53-soap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208929" comment="php53-suhosin-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208930" comment="php53-sysvmsg-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208931" comment="php53-sysvsem-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208932" comment="php53-sysvshm-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208933" comment="php53-tokenizer-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208934" comment="php53-wddx-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208935" comment="php53-xmlreader-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208936" comment="php53-xmlrpc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208937" comment="php53-xmlwriter-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208938" comment="php53-xsl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208939" comment="php53-zip-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208940" comment="php53-zlib-5.3.17-71 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3156</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-3156" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3156" source="CVE"/>
    <description>
    The IPv4 implementation in the Linux kernel before 4.5.2 mishandles destruction of device objects, which allows guest OS users to cause a denial of service (host OS networking outage) by arranging for a large number of IP addresses.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3156.html">CVE-2016-3156</cve>
<bugzilla href="https://bugzilla.suse.com/971360">SUSE bug 971360</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208637" comment="kernel-default-man-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208641" comment="kernel-pae-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208642" comment="kernel-pae-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208643" comment="kernel-pae-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208631" comment="kernel-bigsmp-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208632" comment="kernel-bigsmp-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208633" comment="kernel-bigsmp-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208634" comment="kernel-default-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208635" comment="kernel-default-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208636" comment="kernel-default-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208638" comment="kernel-ec2-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208639" comment="kernel-ec2-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208640" comment="kernel-ec2-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208644" comment="kernel-source-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208645" comment="kernel-syms-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208646" comment="kernel-trace-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208647" comment="kernel-trace-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208648" comment="kernel-trace-devel-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208649" comment="kernel-xen-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208650" comment="kernel-xen-base-3.0.101-0.47.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208651" comment="kernel-xen-devel-3.0.101-0.47.79 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3158</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-3158" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3158" source="CVE"/>
    <description>
    The xrstor function in arch/x86/xstate.c in Xen 4.x does not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allows local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-2076.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3158.html">CVE-2016-3158</cve>
<bugzilla href="https://bugzilla.suse.com/973188">SUSE bug 973188</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205947" comment="xen-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209054" comment="xen-doc-html-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209055" comment="xen-doc-pdf-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205948" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205949" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205950" comment="xen-libs-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209056" comment="xen-libs-32bit-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209057" comment="xen-tools-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205951" comment="xen-tools-domU-4.2.5_21-27 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205947" comment="xen-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209054" comment="xen-doc-html-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209055" comment="xen-doc-pdf-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205948" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205950" comment="xen-libs-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209056" comment="xen-libs-32bit-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209057" comment="xen-tools-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205951" comment="xen-tools-domU-4.2.5_21-27 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3159</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-3159" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3159" source="CVE"/>
    <description>
    The fpu_fxrstor function in arch/x86/i387.c in Xen 4.x does not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allows local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-2076.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3159.html">CVE-2016-3159</cve>
<bugzilla href="https://bugzilla.suse.com/973188">SUSE bug 973188</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205947" comment="xen-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209054" comment="xen-doc-html-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209055" comment="xen-doc-pdf-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205948" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205949" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205950" comment="xen-libs-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209056" comment="xen-libs-32bit-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209057" comment="xen-tools-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205951" comment="xen-tools-domU-4.2.5_21-27 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205947" comment="xen-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209054" comment="xen-doc-html-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209055" comment="xen-doc-pdf-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205948" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205950" comment="xen-libs-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209056" comment="xen-libs-32bit-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209057" comment="xen-tools-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205951" comment="xen-tools-domU-4.2.5_21-27 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3185</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-3185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3185" source="CVE"/>
    <description>
    The make_http_soap_request function in ext/soap/php_http.c in PHP before 5.4.44, 5.5.x before 5.5.28, 5.6.x before 5.6.12, and 7.x before 7.0.4 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (type confusion and application crash) via crafted serialized _cookies data, related to the SoapClient::__call method in ext/soap/soap.c.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3185.html">CVE-2016-3185</cve>
<bugzilla href="https://bugzilla.suse.com/971611">SUSE bug 971611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/973351">SUSE bug 973351</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208897" comment="apache2-mod_php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203264" comment="php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208898" comment="php53-bcmath-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208899" comment="php53-bz2-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208900" comment="php53-calendar-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208901" comment="php53-ctype-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208902" comment="php53-curl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208903" comment="php53-dba-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208904" comment="php53-dom-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208905" comment="php53-exif-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208906" comment="php53-fastcgi-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208907" comment="php53-fileinfo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208908" comment="php53-ftp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208909" comment="php53-gd-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208910" comment="php53-gettext-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208911" comment="php53-gmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208912" comment="php53-iconv-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208913" comment="php53-intl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208914" comment="php53-json-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208915" comment="php53-ldap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208916" comment="php53-mbstring-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208917" comment="php53-mcrypt-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208918" comment="php53-mysql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208919" comment="php53-odbc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208920" comment="php53-openssl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208921" comment="php53-pcntl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208922" comment="php53-pdo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208923" comment="php53-pear-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208924" comment="php53-pgsql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208925" comment="php53-pspell-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208926" comment="php53-shmop-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208927" comment="php53-snmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208928" comment="php53-soap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208929" comment="php53-suhosin-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208930" comment="php53-sysvmsg-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208931" comment="php53-sysvsem-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208932" comment="php53-sysvshm-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208933" comment="php53-tokenizer-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208934" comment="php53-wddx-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208935" comment="php53-xmlreader-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208936" comment="php53-xmlrpc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208937" comment="php53-xmlwriter-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208938" comment="php53-xsl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208939" comment="php53-zip-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208940" comment="php53-zlib-5.3.17-71 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3186</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-3186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3186" source="CVE"/>
    <description>
    Buffer overflow in the readextension function in gif2tiff.c in LibTIFF 4.0.6 allows remote attackers to cause a denial of service (application crash) via a crafted GIF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3186.html">CVE-2016-3186</cve>
<bugzilla href="https://bugzilla.suse.com/973340">SUSE bug 973340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/983268">SUSE bug 983268</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210825" comment="libtiff3-3.8.2-141.168 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210826" comment="libtiff3-32bit-3.8.2-141.168 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203573" comment="tiff-3.8.2-141.168 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3189</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-3189" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3189" source="CVE"/>
    <description>
    Use-after-free vulnerability in bzip2recover in bzip2 1.0.6 allows remote attackers to cause a denial of service (crash) via a crafted bzip2 file, related to block ends set to before the start of the block.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3189.html">CVE-2016-3189</cve>
<bugzilla href="https://bugzilla.suse.com/985657">SUSE bug 985657</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009259373" comment="bzip2-1.0.6-257.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009259374" comment="bzip2-doc-1.0.6-257.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009259375" comment="libbz2-1-1.0.6-257.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009259376" comment="libbz2-1-32bit-1.0.6-257.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009259377" comment="libbz2-devel-1.0.6-257.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-3422" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3422" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77 allows remote attackers to affect availability via vectors related to 2D.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3422.html">CVE-2016-3422</cve>
<bugzilla href="https://bugzilla.suse.com/976340">SUSE bug 976340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/979252">SUSE bug 979252</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207710" comment="java-1_6_0-ibm-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207711" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207712" comment="java-1_6_0-ibm-devel-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207713" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207714" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207715" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207735" comment="java-1_7_0-ibm-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207736" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207738" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207739" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.40-52 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207710" comment="java-1_6_0-ibm-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207712" comment="java-1_6_0-ibm-devel-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207713" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207714" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207715" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207735" comment="java-1_7_0-ibm-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207736" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207738" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207739" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.40-52 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207710" comment="java-1_6_0-ibm-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207713" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207714" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207715" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207735" comment="java-1_7_0-ibm-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207736" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207738" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207739" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.40-52 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3426</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-3426" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u77 and Java SE Embedded 8u77 allows remote attackers to affect confidentiality via vectors related to JCE.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3426.html">CVE-2016-3426</cve>
<bugzilla href="https://bugzilla.suse.com/976340">SUSE bug 976340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/979252">SUSE bug 979252</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207710" comment="java-1_6_0-ibm-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207711" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207712" comment="java-1_6_0-ibm-devel-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207713" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207714" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207715" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207735" comment="java-1_7_0-ibm-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207736" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207738" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207739" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.40-52 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207710" comment="java-1_6_0-ibm-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207712" comment="java-1_6_0-ibm-devel-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207713" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207714" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207715" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207735" comment="java-1_7_0-ibm-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207736" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207738" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207739" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.40-52 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207710" comment="java-1_6_0-ibm-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207713" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207714" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207715" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207735" comment="java-1_7_0-ibm-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207736" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207738" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207739" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.40-52 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3427</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-3427" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77; Java SE Embedded 8u77; and JRockit R28.3.9 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3427.html">CVE-2016-3427</cve>
<bugzilla href="https://bugzilla.suse.com/1011805">SUSE bug 1011805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/976340">SUSE bug 976340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/979252">SUSE bug 979252</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207710" comment="java-1_6_0-ibm-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207711" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207712" comment="java-1_6_0-ibm-devel-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207713" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207714" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207715" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207735" comment="java-1_7_0-ibm-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207736" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207738" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207739" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.40-52 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207710" comment="java-1_6_0-ibm-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207712" comment="java-1_6_0-ibm-devel-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207713" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207714" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207715" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207735" comment="java-1_7_0-ibm-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207736" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207738" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207739" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.40-52 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207710" comment="java-1_6_0-ibm-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207713" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207714" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207715" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207735" comment="java-1_7_0-ibm-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207736" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207738" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207739" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.40-52 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3443</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-3443" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3443" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to 2D.  NOTE: the previous information is from the April 2016 CPU. Oracle has not commented on third-party claims that this issue allows remote attackers to obtain sensitive information via crafted font data, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3443.html">CVE-2016-3443</cve>
<bugzilla href="https://bugzilla.suse.com/976340">SUSE bug 976340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/979252">SUSE bug 979252</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207710" comment="java-1_6_0-ibm-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207711" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207712" comment="java-1_6_0-ibm-devel-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207713" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207714" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207715" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207735" comment="java-1_7_0-ibm-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207736" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207738" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207739" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.40-52 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207710" comment="java-1_6_0-ibm-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207712" comment="java-1_6_0-ibm-devel-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207713" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207714" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207715" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207735" comment="java-1_7_0-ibm-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207736" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207738" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207739" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.40-52 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207710" comment="java-1_6_0-ibm-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207713" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207714" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207715" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207735" comment="java-1_7_0-ibm-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207736" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207738" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207739" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.40-52 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3449</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-3449" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3449" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3449.html">CVE-2016-3449</cve>
<bugzilla href="https://bugzilla.suse.com/976340">SUSE bug 976340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/979252">SUSE bug 979252</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207710" comment="java-1_6_0-ibm-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207711" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207712" comment="java-1_6_0-ibm-devel-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207713" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207714" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207715" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207735" comment="java-1_7_0-ibm-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207736" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207738" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207739" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.40-52 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207710" comment="java-1_6_0-ibm-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207712" comment="java-1_6_0-ibm-devel-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207713" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207714" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207715" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207735" comment="java-1_7_0-ibm-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207736" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207738" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207739" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.40-52 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207710" comment="java-1_6_0-ibm-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207713" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207714" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207715" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.25-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207735" comment="java-1_7_0-ibm-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207736" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207738" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.40-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207739" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.40-52 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3477</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-3477" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.49 and earlier, 5.6.30 and earlier, and 5.7.12 and earlier and MariaDB before 5.5.50, 10.0.x before 10.0.26, and 10.1.x before 10.1.15 allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Parser.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3477.html">CVE-2016-3477</cve>
<bugzilla href="https://bugzilla.suse.com/989913">SUSE bug 989913</bugzilla>
<bugzilla href="https://bugzilla.suse.com/991616">SUSE bug 991616</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205667" comment="libmysql55client18-5.5.52-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208790" comment="libmysql55client18-32bit-5.5.52-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205668" comment="libmysql55client_r18-5.5.52-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203168" comment="mysql-5.5.52-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205669" comment="mysql-client-5.5.52-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205670" comment="mysql-tools-5.5.52-0.27 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-3485" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3485" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92; Java SE Embedded 8u91; and JRockit R28.3.10 allows local users to affect integrity via vectors related to Networking.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3485.html">CVE-2016-3485</cve>
<bugzilla href="https://bugzilla.suse.com/1009280">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/989734">SUSE bug 989734</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205363" comment="java-1_6_0-ibm-1.6.0_sr16.30-75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205364" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.30-75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205365" comment="java-1_6_0-ibm-devel-1.6.0_sr16.30-75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205366" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.30-75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205367" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.30-75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205368" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.30-75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205387" comment="java-1_7_0-ibm-1.7.0_sr9.50-55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205388" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.50-55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205389" comment="java-1_7_0-ibm-devel-1.7.0_sr9.50-55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205390" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.50-55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205391" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.50-55 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205363" comment="java-1_6_0-ibm-1.6.0_sr16.30-75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205365" comment="java-1_6_0-ibm-devel-1.6.0_sr16.30-75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205366" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.30-75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205367" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.30-75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205368" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.30-75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205387" comment="java-1_7_0-ibm-1.7.0_sr9.50-55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205388" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.50-55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205389" comment="java-1_7_0-ibm-devel-1.7.0_sr9.50-55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205390" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.50-55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205391" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.50-55 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205363" comment="java-1_6_0-ibm-1.6.0_sr16.30-75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205366" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.30-75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205367" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.30-75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205368" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.30-75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205387" comment="java-1_7_0-ibm-1.7.0_sr9.50-55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205388" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.50-55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205390" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.50-55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205391" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.50-55 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-3511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3511" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u101 and 8u92 allows local users to affect confidentiality, integrity, and availability via vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3511.html">CVE-2016-3511</cve>
<bugzilla href="https://bugzilla.suse.com/1009280">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/989727">SUSE bug 989727</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205387" comment="java-1_7_0-ibm-1.7.0_sr9.50-55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205388" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.50-55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205389" comment="java-1_7_0-ibm-devel-1.7.0_sr9.50-55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205390" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.50-55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205391" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.50-55 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205387" comment="java-1_7_0-ibm-1.7.0_sr9.50-55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205388" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.50-55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205390" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.50-55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205391" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.50-55 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3521</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-3521" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.49 and earlier, 5.6.30 and earlier, and 5.7.12 and earlier and MariaDB before 5.5.50, 10.0.x before 10.0.26, and 10.1.x before 10.1.15 allows remote authenticated users to affect availability via vectors related to Server: Types.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3521.html">CVE-2016-3521</cve>
<bugzilla href="https://bugzilla.suse.com/989919">SUSE bug 989919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/991616">SUSE bug 991616</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205667" comment="libmysql55client18-5.5.52-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208790" comment="libmysql55client18-32bit-5.5.52-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205668" comment="libmysql55client_r18-5.5.52-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203168" comment="mysql-5.5.52-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205669" comment="mysql-client-5.5.52-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205670" comment="mysql-tools-5.5.52-0.27 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3598</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-3598" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Libraries, a different vulnerability than CVE-2016-3610.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3598.html">CVE-2016-3598</cve>
<bugzilla href="https://bugzilla.suse.com/1009280">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/989723">SUSE bug 989723</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205387" comment="java-1_7_0-ibm-1.7.0_sr9.50-55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205388" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.50-55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205389" comment="java-1_7_0-ibm-devel-1.7.0_sr9.50-55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205390" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.50-55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205391" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.50-55 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205387" comment="java-1_7_0-ibm-1.7.0_sr9.50-55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205388" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.50-55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205390" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.50-55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205391" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.50-55 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3615</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-3615" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.49 and earlier, 5.6.30 and earlier, and 5.7.12 and earlier and MariaDB before 5.5.50, 10.0.x before 10.0.26, and 10.1.x before 10.1.15 allows remote authenticated users to affect availability via vectors related to Server: DML.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3615.html">CVE-2016-3615</cve>
<bugzilla href="https://bugzilla.suse.com/989922">SUSE bug 989922</bugzilla>
<bugzilla href="https://bugzilla.suse.com/991616">SUSE bug 991616</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205667" comment="libmysql55client18-5.5.52-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208790" comment="libmysql55client18-32bit-5.5.52-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205668" comment="libmysql55client_r18-5.5.52-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203168" comment="mysql-5.5.52-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205669" comment="mysql-client-5.5.52-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205670" comment="mysql-tools-5.5.52-0.27 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3619</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-3619" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3619" source="CVE"/>
    <description>
    The DumpModeEncode function in tif_dumpmode.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the "-c none" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3619.html">CVE-2016-3619</cve>
<bugzilla href="https://bugzilla.suse.com/1040080">SUSE bug 1040080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1150480">SUSE bug 1150480</bugzilla>
<bugzilla href="https://bugzilla.suse.com/974446">SUSE bug 974446</bugzilla>
<bugzilla href="https://bugzilla.suse.com/974447">SUSE bug 974447</bugzilla>
<bugzilla href="https://bugzilla.suse.com/974448">SUSE bug 974448</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009240660" comment="libtiff3-3.8.2-141.169.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240661" comment="libtiff3-32bit-3.8.2-141.169.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240659" comment="tiff-3.8.2-141.169.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3620</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-3620" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3620" source="CVE"/>
    <description>
    The ZIPEncode function in tif_zip.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the "-c zip" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3620.html">CVE-2016-3620</cve>
<bugzilla href="https://bugzilla.suse.com/1040080">SUSE bug 1040080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1150480">SUSE bug 1150480</bugzilla>
<bugzilla href="https://bugzilla.suse.com/974447">SUSE bug 974447</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009240660" comment="libtiff3-3.8.2-141.169.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240661" comment="libtiff3-32bit-3.8.2-141.169.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240659" comment="tiff-3.8.2-141.169.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3621</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-3621" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3621" source="CVE"/>
    <description>
    The LZWEncode function in tif_lzw.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the "-c lzw" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3621.html">CVE-2016-3621</cve>
<bugzilla href="https://bugzilla.suse.com/1040080">SUSE bug 1040080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1150480">SUSE bug 1150480</bugzilla>
<bugzilla href="https://bugzilla.suse.com/974448">SUSE bug 974448</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009240660" comment="libtiff3-3.8.2-141.169.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240661" comment="libtiff3-32bit-3.8.2-141.169.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240659" comment="tiff-3.8.2-141.169.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3622</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-3622" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622" source="CVE"/>
    <description>
    The fpAcc function in tif_predict.c in the tiff2rgba tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted TIFF image.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3622.html">CVE-2016-3622</cve>
<bugzilla href="https://bugzilla.suse.com/974449">SUSE bug 974449</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210825" comment="libtiff3-3.8.2-141.168 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210826" comment="libtiff3-32bit-3.8.2-141.168 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203573" comment="tiff-3.8.2-141.168 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3623</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-3623" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623" source="CVE"/>
    <description>
    The rgb2ycbcr tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (divide-by-zero) by setting the (1) v or (2) h parameter to 0.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3623.html">CVE-2016-3623</cve>
<bugzilla href="https://bugzilla.suse.com/974617">SUSE bug 974617</bugzilla>
<bugzilla href="https://bugzilla.suse.com/974618">SUSE bug 974618</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210825" comment="libtiff3-3.8.2-141.168 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210826" comment="libtiff3-32bit-3.8.2-141.168 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203573" comment="tiff-3.8.2-141.168 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3627</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-3627" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3627" source="CVE"/>
    <description>
    The xmlStringGetNodeList function in tree.c in libxml2 2.9.3 and earlier, when used in recovery mode, allows context-dependent attackers to cause a denial of service (infinite recursion, stack consumption, and application crash) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3627.html">CVE-2016-3627</cve>
<bugzilla href="https://bugzilla.suse.com/1026099">SUSE bug 1026099</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1026101">SUSE bug 1026101</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/972335">SUSE bug 972335</bugzilla>
<bugzilla href="https://bugzilla.suse.com/975947">SUSE bug 975947</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203089" comment="libxml2-2.7.6-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209963" comment="libxml2-32bit-2.7.6-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209964" comment="libxml2-doc-2.7.6-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209965" comment="libxml2-python-2.7.6-0.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3632</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-3632" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3632" source="CVE"/>
    <description>
    The _TIFFVGetField function in tif_dirinfo.c in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via a crafted TIFF image.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3632.html">CVE-2016-3632</cve>
<bugzilla href="https://bugzilla.suse.com/1007276">SUSE bug 1007276</bugzilla>
<bugzilla href="https://bugzilla.suse.com/974621">SUSE bug 974621</bugzilla>
<bugzilla href="https://bugzilla.suse.com/983436">SUSE bug 983436</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009229551" comment="libtiff3-3.8.2-141.169.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229568" comment="libtiff3-32bit-3.8.2-141.169.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229522" comment="tiff-3.8.2-141.169.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3705</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-3705" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3705" source="CVE"/>
    <description>
    The (1) xmlParserEntityCheck and (2) xmlParseAttValueComplex functions in parser.c in libxml2 2.9.3 do not properly keep track of the recursion depth, which allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a crafted XML document containing a large number of nested entity references.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3705.html">CVE-2016-3705</cve>
<bugzilla href="https://bugzilla.suse.com/1017497">SUSE bug 1017497</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/975947">SUSE bug 975947</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203092" comment="libxml2-2.7.6-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207874" comment="libxml2-32bit-2.7.6-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207875" comment="libxml2-doc-2.7.6-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207876" comment="libxml2-python-2.7.6-0.44 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3706</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-3706" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3706" source="CVE"/>
    <description>
    Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in the GNU C Library (aka glibc or libc6) allows remote attackers to cause a denial of service (crash) via vectors involving hostent conversion. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-4458.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3706.html">CVE-2016-3706</cve>
<bugzilla href="https://bugzilla.suse.com/980483">SUSE bug 980483</bugzilla>
<bugzilla href="https://bugzilla.suse.com/997423">SUSE bug 997423</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202691" comment="glibc-2.11.3-17.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209287" comment="glibc-32bit-2.11.3-17.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209288" comment="glibc-devel-2.11.3-17.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209289" comment="glibc-devel-32bit-2.11.3-17.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202692" comment="glibc-html-2.11.3-17.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209290" comment="glibc-i18ndata-2.11.3-17.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202693" comment="glibc-info-2.11.3-17.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209291" comment="glibc-locale-2.11.3-17.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209292" comment="glibc-locale-32bit-2.11.3-17.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209294" comment="glibc-profile-2.11.3-17.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209295" comment="glibc-profile-32bit-2.11.3-17.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209298" comment="nscd-2.11.3-17.102 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3710</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-3710" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3710" source="CVE"/>
    <description>
    The VGA module in QEMU improperly performs bounds checking on banked access to video memory, which allows local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the "Dark Portal" issue.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3710.html">CVE-2016-3710</cve>
<bugzilla href="https://bugzilla.suse.com/978158">SUSE bug 978158</bugzilla>
<bugzilla href="https://bugzilla.suse.com/978164">SUSE bug 978164</bugzilla>
<bugzilla href="https://bugzilla.suse.com/978167">SUSE bug 978167</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205947" comment="xen-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209054" comment="xen-doc-html-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209055" comment="xen-doc-pdf-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205948" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205950" comment="xen-libs-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209056" comment="xen-libs-32bit-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209057" comment="xen-tools-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205951" comment="xen-tools-domU-4.2.5_21-27 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205947" comment="xen-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209054" comment="xen-doc-html-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209055" comment="xen-doc-pdf-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205948" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205949" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205950" comment="xen-libs-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209056" comment="xen-libs-32bit-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209057" comment="xen-tools-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205951" comment="xen-tools-domU-4.2.5_21-27 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3712</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-3712" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3712" source="CVE"/>
    <description>
    Integer overflow in the VGA module in QEMU allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) by editing VGA registers in VBE mode.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3712.html">CVE-2016-3712</cve>
<bugzilla href="https://bugzilla.suse.com/978160">SUSE bug 978160</bugzilla>
<bugzilla href="https://bugzilla.suse.com/978164">SUSE bug 978164</bugzilla>
<bugzilla href="https://bugzilla.suse.com/978167">SUSE bug 978167</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205947" comment="xen-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209054" comment="xen-doc-html-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209055" comment="xen-doc-pdf-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205948" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205950" comment="xen-libs-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209056" comment="xen-libs-32bit-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209057" comment="xen-tools-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205951" comment="xen-tools-domU-4.2.5_21-27 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205947" comment="xen-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209054" comment="xen-doc-html-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209055" comment="xen-doc-pdf-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205948" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205949" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205950" comment="xen-libs-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209056" comment="xen-libs-32bit-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209057" comment="xen-tools-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205951" comment="xen-tools-domU-4.2.5_21-27 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3714</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-3714" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714" source="CVE"/>
    <description>
    The (1) EPHEMERAL, (2) HTTPS, (3) MVG, (4) MSL, (5) TEXT, (6) SHOW, (7) WIN, and (8) PLT coders in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allow remote attackers to execute arbitrary code via shell metacharacters in a crafted image, aka "ImageTragick."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3714.html">CVE-2016-3714</cve>
<bugzilla href="https://bugzilla.suse.com/1057163">SUSE bug 1057163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1105592">SUSE bug 1105592</bugzilla>
<bugzilla href="https://bugzilla.suse.com/978061">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/982178">SUSE bug 982178</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202199" comment="ImageMagick-6.4.3.6-7.37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207516" comment="libMagickCore1-6.4.3.6-7.37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207517" comment="libMagickCore1-32bit-6.4.3.6-7.37 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3715</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-3715" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715" source="CVE"/>
    <description>
    The EPHEMERAL coder in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allows remote attackers to delete arbitrary files via a crafted image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3715.html">CVE-2016-3715</cve>
<bugzilla href="https://bugzilla.suse.com/1057163">SUSE bug 1057163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1105592">SUSE bug 1105592</bugzilla>
<bugzilla href="https://bugzilla.suse.com/978061">SUSE bug 978061</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202192" comment="ImageMagick-6.4.3.6-7.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207514" comment="libMagickCore1-6.4.3.6-7.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207515" comment="libMagickCore1-32bit-6.4.3.6-7.34 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3716</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-3716" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3716" source="CVE"/>
    <description>
    The MSL coder in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allows remote attackers to move arbitrary files via a crafted image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3716.html">CVE-2016-3716</cve>
<bugzilla href="https://bugzilla.suse.com/1057163">SUSE bug 1057163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1105592">SUSE bug 1105592</bugzilla>
<bugzilla href="https://bugzilla.suse.com/978061">SUSE bug 978061</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202192" comment="ImageMagick-6.4.3.6-7.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207514" comment="libMagickCore1-6.4.3.6-7.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207515" comment="libMagickCore1-32bit-6.4.3.6-7.34 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3717</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-3717" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3717" source="CVE"/>
    <description>
    The LABEL coder in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allows remote attackers to read arbitrary files via a crafted image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3717.html">CVE-2016-3717</cve>
<bugzilla href="https://bugzilla.suse.com/1057163">SUSE bug 1057163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1105592">SUSE bug 1105592</bugzilla>
<bugzilla href="https://bugzilla.suse.com/978061">SUSE bug 978061</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202192" comment="ImageMagick-6.4.3.6-7.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207514" comment="libMagickCore1-6.4.3.6-7.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207515" comment="libMagickCore1-32bit-6.4.3.6-7.34 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3718</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-3718" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3718" source="CVE"/>
    <description>
    The (1) HTTP and (2) FTP coders in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allow remote attackers to conduct server-side request forgery (SSRF) attacks via a crafted image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3718.html">CVE-2016-3718</cve>
<bugzilla href="https://bugzilla.suse.com/1057163">SUSE bug 1057163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1105592">SUSE bug 1105592</bugzilla>
<bugzilla href="https://bugzilla.suse.com/978061">SUSE bug 978061</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202192" comment="ImageMagick-6.4.3.6-7.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207514" comment="libMagickCore1-6.4.3.6-7.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207515" comment="libMagickCore1-32bit-6.4.3.6-7.34 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3841</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-3841" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3841" source="CVE"/>
    <description>
    The IPv6 stack in the Linux kernel before 4.3.3 mishandles options data, which allows local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3841.html">CVE-2016-3841</cve>
<bugzilla href="https://bugzilla.suse.com/1052256">SUSE bug 1052256</bugzilla>
<bugzilla href="https://bugzilla.suse.com/992566">SUSE bug 992566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/992569">SUSE bug 992569</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208770" comment="kernel-default-man-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205650" comment="kernel-pae-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205651" comment="kernel-pae-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205652" comment="kernel-pae-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3945</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-3945" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945" source="CVE"/>
    <description>
    Multiple integer overflows in the (1) cvt_by_strip and (2) cvt_by_tile functions in the tiff2rgba tool in LibTIFF 4.0.6 and earlier, when -b mode is enabled, allow remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted TIFF image, which triggers an out-of-bounds write.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3945.html">CVE-2016-3945</cve>
<bugzilla href="https://bugzilla.suse.com/974614">SUSE bug 974614</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210828" comment="libtiff3-3.8.2-141.169.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210829" comment="libtiff3-32bit-3.8.2-141.169.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203576" comment="tiff-3.8.2-141.169.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3947</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-3947" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3947" source="CVE"/>
    <description>
    Heap-based buffer overflow in the Icmp6::Recv function in icmp/Icmp6.cc in the pinger utility in Squid before 3.5.16 and 4.x before 4.0.8 allows remote servers to cause a denial of service (performance degradation or transition failures) or write sensitive information to log files via an ICMPv6 packet.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3947.html">CVE-2016-3947</cve>
<bugzilla href="https://bugzilla.suse.com/973782">SUSE bug 973782</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210806" comment="squid3-3.1.23-8.16.30 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3948</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-3948" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3948" source="CVE"/>
    <description>
    Squid 3.x before 3.5.16 and 4.x before 4.0.8 improperly perform bounds checking, which allows remote attackers to cause a denial of service via a crafted HTTP response, related to Vary headers.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3948.html">CVE-2016-3948</cve>
<bugzilla href="https://bugzilla.suse.com/973783">SUSE bug 973783</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210806" comment="squid3-3.1.23-8.16.30 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3955</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-3955" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3955" source="CVE"/>
    <description>
    The usbip_recv_xbuff function in drivers/usb/usbip/usbip_common.c in the Linux kernel before 4.5.3 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted length value in a USB/IP packet.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3955.html">CVE-2016-3955</cve>
<bugzilla href="https://bugzilla.suse.com/975945">SUSE bug 975945</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208598" comment="kernel-bigsmp-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208599" comment="kernel-bigsmp-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208600" comment="kernel-bigsmp-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205422" comment="kernel-default-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205423" comment="kernel-default-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205424" comment="kernel-default-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205425" comment="kernel-ec2-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205426" comment="kernel-ec2-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205427" comment="kernel-ec2-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205431" comment="kernel-source-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205432" comment="kernel-syms-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205433" comment="kernel-trace-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205434" comment="kernel-trace-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205435" comment="kernel-trace-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205436" comment="kernel-xen-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205437" comment="kernel-xen-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205438" comment="kernel-xen-devel-3.0.101-0.47.86 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208598" comment="kernel-bigsmp-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208599" comment="kernel-bigsmp-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208600" comment="kernel-bigsmp-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205422" comment="kernel-default-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205423" comment="kernel-default-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205424" comment="kernel-default-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208601" comment="kernel-default-man-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205425" comment="kernel-ec2-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205426" comment="kernel-ec2-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205427" comment="kernel-ec2-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205428" comment="kernel-pae-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205429" comment="kernel-pae-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205430" comment="kernel-pae-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205431" comment="kernel-source-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205432" comment="kernel-syms-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205433" comment="kernel-trace-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205434" comment="kernel-trace-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205435" comment="kernel-trace-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205436" comment="kernel-xen-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205437" comment="kernel-xen-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205438" comment="kernel-xen-devel-3.0.101-0.47.86 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3960</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-3960" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3960" source="CVE"/>
    <description>
    Integer overflow in the x86 shadow pagetable code in Xen allows local guest OS users to cause a denial of service (host crash) or possibly gain privileges by shadowing a superpage mapping.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3960.html">CVE-2016-3960</cve>
<bugzilla href="https://bugzilla.suse.com/974038">SUSE bug 974038</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205947" comment="xen-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209054" comment="xen-doc-html-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209055" comment="xen-doc-pdf-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205948" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205949" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205950" comment="xen-libs-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209056" comment="xen-libs-32bit-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209057" comment="xen-tools-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205951" comment="xen-tools-domU-4.2.5_21-27 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205947" comment="xen-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209054" comment="xen-doc-html-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209055" comment="xen-doc-pdf-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205948" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205950" comment="xen-libs-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209056" comment="xen-libs-32bit-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209057" comment="xen-tools-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205951" comment="xen-tools-domU-4.2.5_21-27 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3977</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-3977" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3977" source="CVE"/>
    <description>
    Heap-based buffer overflow in util/gif2rgb.c in gif2rgb in giflib 5.1.2 allows remote attackers to cause a denial of service (application crash) via the background color index in a GIF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3977.html">CVE-2016-3977</cve>
<bugzilla href="https://bugzilla.suse.com/974847">SUSE bug 974847</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202644" comment="giflib-4.1.6-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209284" comment="giflib-32bit-4.1.6-21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209285" comment="giflib-progs-4.1.6-21 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3990</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-3990" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990" source="CVE"/>
    <description>
    Heap-based buffer overflow in the horizontalDifference8 function in tif_pixarlog.c in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted TIFF image to tiffcp.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3990.html">CVE-2016-3990</cve>
<bugzilla href="https://bugzilla.suse.com/975069">SUSE bug 975069</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210825" comment="libtiff3-3.8.2-141.168 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210826" comment="libtiff3-32bit-3.8.2-141.168 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203573" comment="tiff-3.8.2-141.168 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4001</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-4001" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4001" source="CVE"/>
    <description>
    Buffer overflow in the stellaris_enet_receive function in hw/net/stellaris_enet.c in QEMU, when the Stellaris ethernet controller is configured to accept large packets, allows remote attackers to cause a denial of service (QEMU crash) via a large packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4001.html">CVE-2016-4001</cve>
<bugzilla href="https://bugzilla.suse.com/975128">SUSE bug 975128</bugzilla>
<bugzilla href="https://bugzilla.suse.com/975130">SUSE bug 975130</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205947" comment="xen-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209054" comment="xen-doc-html-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209055" comment="xen-doc-pdf-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205948" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205950" comment="xen-libs-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209056" comment="xen-libs-32bit-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209057" comment="xen-tools-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205951" comment="xen-tools-domU-4.2.5_21-27 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205947" comment="xen-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209054" comment="xen-doc-html-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209055" comment="xen-doc-pdf-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205948" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205949" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205950" comment="xen-libs-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209056" comment="xen-libs-32bit-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209057" comment="xen-tools-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205951" comment="xen-tools-domU-4.2.5_21-27 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4002</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-4002" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4002" source="CVE"/>
    <description>
    Buffer overflow in the mipsnet_receive function in hw/net/mipsnet.c in QEMU, when the guest NIC is configured to accept large packets, allows remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4002.html">CVE-2016-4002</cve>
<bugzilla href="https://bugzilla.suse.com/975136">SUSE bug 975136</bugzilla>
<bugzilla href="https://bugzilla.suse.com/975138">SUSE bug 975138</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205947" comment="xen-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209054" comment="xen-doc-html-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209055" comment="xen-doc-pdf-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205948" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205950" comment="xen-libs-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209056" comment="xen-libs-32bit-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209057" comment="xen-tools-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205951" comment="xen-tools-domU-4.2.5_21-27 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205947" comment="xen-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209054" comment="xen-doc-html-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209055" comment="xen-doc-pdf-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205948" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205949" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205950" comment="xen-libs-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209056" comment="xen-libs-32bit-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209057" comment="xen-tools-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205951" comment="xen-tools-domU-4.2.5_21-27 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4008</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-4008" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4008" source="CVE"/>
    <description>
    The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4008.html">CVE-2016-4008</cve>
<bugzilla href="https://bugzilla.suse.com/982779">SUSE bug 982779</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203210" comment="libtasn1-1.5-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210125" comment="libtasn1-3-1.5-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210126" comment="libtasn1-3-32bit-1.5-1.34 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4020</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-4020" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4020" source="CVE"/>
    <description>
    The patch_instruction function in hw/i386/kvmvapic.c in QEMU does not initialize the imm32 variable, which allows local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR).
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4020.html">CVE-2016-4020</cve>
<bugzilla href="https://bugzilla.suse.com/975700">SUSE bug 975700</bugzilla>
<bugzilla href="https://bugzilla.suse.com/975907">SUSE bug 975907</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4037</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-4037" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4037" source="CVE"/>
    <description>
    The ehci_advance_state function in hw/usb/hcd-ehci.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular split isochronous transfer descriptor (siTD) list, a related issue to CVE-2015-8558.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4037.html">CVE-2016-4037</cve>
<bugzilla href="https://bugzilla.suse.com/959005">SUSE bug 959005</bugzilla>
<bugzilla href="https://bugzilla.suse.com/959006">SUSE bug 959006</bugzilla>
<bugzilla href="https://bugzilla.suse.com/976109">SUSE bug 976109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/976111">SUSE bug 976111</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4049</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-4049" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4049" source="CVE"/>
    <description>
    The bgp_dump_routes_func function in bgpd/bgp_dump.c in Quagga does not perform size checks when dumping data, which might allow remote attackers to cause a denial of service (assertion failure and daemon crash) via a large BGP packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4049.html">CVE-2016-4049</cve>
<bugzilla href="https://bugzilla.suse.com/977012">SUSE bug 977012</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203422" comment="quagga-0.99.15-0.24 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4051</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-4051" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4051" source="CVE"/>
    <description>
    Buffer overflow in cachemgr.cgi in Squid 2.x, 3.x before 3.5.17, and 4.x before 4.0.9 might allow remote attackers to cause a denial of service or execute arbitrary code by seeding manager reports with crafted data.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4051.html">CVE-2016-4051</cve>
<bugzilla href="https://bugzilla.suse.com/976553">SUSE bug 976553</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210805" comment="squid-2.7.STABLE5-2.12.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210806" comment="squid3-3.1.23-8.16.30 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4052</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-4052" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4052" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in Squid 3.x before 3.5.17 and 4.x before 4.0.9 allow remote HTTP servers to cause a denial of service or execute arbitrary code via crafted Edge Side Includes (ESI) responses.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4052.html">CVE-2016-4052</cve>
<bugzilla href="https://bugzilla.suse.com/976556">SUSE bug 976556</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210806" comment="squid3-3.1.23-8.16.30 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4053</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-4053" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4053" source="CVE"/>
    <description>
    Squid 3.x before 3.5.17 and 4.x before 4.0.9 allow remote attackers to obtain sensitive stack layout information via crafted Edge Side Includes (ESI) responses, related to incorrect use of assert and compiler optimization.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4053.html">CVE-2016-4053</cve>
<bugzilla href="https://bugzilla.suse.com/976556">SUSE bug 976556</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210806" comment="squid3-3.1.23-8.16.30 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4054</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-4054" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4054" source="CVE"/>
    <description>
    Buffer overflow in Squid 3.x before 3.5.17 and 4.x before 4.0.9 allows remote attackers to execute arbitrary code via crafted Edge Side Includes (ESI) responses.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4054.html">CVE-2016-4054</cve>
<bugzilla href="https://bugzilla.suse.com/976556">SUSE bug 976556</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210806" comment="squid3-3.1.23-8.16.30 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4070</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-4070" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4070" source="CVE"/>
    <description>
    ** DISPUTED ** Integer overflow in the php_raw_url_encode function in ext/standard/url.c in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to cause a denial of service (application crash) via a long string to the rawurlencode function. NOTE: the vendor says "Not sure if this qualifies as security issue (probably not)."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4070.html">CVE-2016-4070</cve>
<bugzilla href="https://bugzilla.suse.com/976997">SUSE bug 976997</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208897" comment="apache2-mod_php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203264" comment="php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208898" comment="php53-bcmath-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208899" comment="php53-bz2-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208900" comment="php53-calendar-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208901" comment="php53-ctype-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208902" comment="php53-curl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208903" comment="php53-dba-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208904" comment="php53-dom-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208905" comment="php53-exif-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208906" comment="php53-fastcgi-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208907" comment="php53-fileinfo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208908" comment="php53-ftp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208909" comment="php53-gd-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208910" comment="php53-gettext-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208911" comment="php53-gmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208912" comment="php53-iconv-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208913" comment="php53-intl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208914" comment="php53-json-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208915" comment="php53-ldap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208916" comment="php53-mbstring-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208917" comment="php53-mcrypt-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208918" comment="php53-mysql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208919" comment="php53-odbc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208920" comment="php53-openssl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208921" comment="php53-pcntl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208922" comment="php53-pdo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208923" comment="php53-pear-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208924" comment="php53-pgsql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208925" comment="php53-pspell-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208926" comment="php53-shmop-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208927" comment="php53-snmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208928" comment="php53-soap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208929" comment="php53-suhosin-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208930" comment="php53-sysvmsg-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208931" comment="php53-sysvsem-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208932" comment="php53-sysvshm-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208933" comment="php53-tokenizer-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208934" comment="php53-wddx-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208935" comment="php53-xmlreader-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208936" comment="php53-xmlrpc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208937" comment="php53-xmlwriter-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208938" comment="php53-xsl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208939" comment="php53-zip-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208940" comment="php53-zlib-5.3.17-71 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4073</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-4073" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4073" source="CVE"/>
    <description>
    Multiple integer overflows in the mbfl_strcut function in ext/mbstring/libmbfl/mbfl/mbfilter.c in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted mb_strcut call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4073.html">CVE-2016-4073</cve>
<bugzilla href="https://bugzilla.suse.com/977003">SUSE bug 977003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208897" comment="apache2-mod_php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203264" comment="php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208898" comment="php53-bcmath-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208899" comment="php53-bz2-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208900" comment="php53-calendar-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208901" comment="php53-ctype-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208902" comment="php53-curl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208903" comment="php53-dba-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208904" comment="php53-dom-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208905" comment="php53-exif-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208906" comment="php53-fastcgi-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208907" comment="php53-fileinfo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208908" comment="php53-ftp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208909" comment="php53-gd-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208910" comment="php53-gettext-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208911" comment="php53-gmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208912" comment="php53-iconv-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208913" comment="php53-intl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208914" comment="php53-json-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208915" comment="php53-ldap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208916" comment="php53-mbstring-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208917" comment="php53-mcrypt-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208918" comment="php53-mysql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208919" comment="php53-odbc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208920" comment="php53-openssl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208921" comment="php53-pcntl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208922" comment="php53-pdo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208923" comment="php53-pear-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208924" comment="php53-pgsql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208925" comment="php53-pspell-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208926" comment="php53-shmop-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208927" comment="php53-snmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208928" comment="php53-soap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208929" comment="php53-suhosin-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208930" comment="php53-sysvmsg-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208931" comment="php53-sysvsem-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208932" comment="php53-sysvshm-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208933" comment="php53-tokenizer-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208934" comment="php53-wddx-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208935" comment="php53-xmlreader-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208936" comment="php53-xmlrpc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208937" comment="php53-xmlwriter-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208938" comment="php53-xsl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208939" comment="php53-zip-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208940" comment="php53-zlib-5.3.17-71 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4342</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-4342" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4342" source="CVE"/>
    <description>
    ext/phar/phar_object.c in PHP before 5.5.32, 5.6.x before 5.6.18, and 7.x before 7.0.3 mishandles zero-length uncompressed data, which allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted (1) TAR, (2) ZIP, or (3) PHAR archive.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4342.html">CVE-2016-4342</cve>
<bugzilla href="https://bugzilla.suse.com/977991">SUSE bug 977991</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208897" comment="apache2-mod_php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203264" comment="php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208898" comment="php53-bcmath-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208899" comment="php53-bz2-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208900" comment="php53-calendar-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208901" comment="php53-ctype-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208902" comment="php53-curl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208903" comment="php53-dba-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208904" comment="php53-dom-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208905" comment="php53-exif-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208906" comment="php53-fastcgi-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208907" comment="php53-fileinfo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208908" comment="php53-ftp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208909" comment="php53-gd-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208910" comment="php53-gettext-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208911" comment="php53-gmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208912" comment="php53-iconv-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208913" comment="php53-intl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208914" comment="php53-json-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208915" comment="php53-ldap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208916" comment="php53-mbstring-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208917" comment="php53-mcrypt-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208918" comment="php53-mysql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208919" comment="php53-odbc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208920" comment="php53-openssl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208921" comment="php53-pcntl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208922" comment="php53-pdo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208923" comment="php53-pear-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208924" comment="php53-pgsql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208925" comment="php53-pspell-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208926" comment="php53-shmop-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208927" comment="php53-snmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208928" comment="php53-soap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208929" comment="php53-suhosin-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208930" comment="php53-sysvmsg-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208931" comment="php53-sysvsem-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208932" comment="php53-sysvshm-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208933" comment="php53-tokenizer-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208934" comment="php53-wddx-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208935" comment="php53-xmlreader-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208936" comment="php53-xmlrpc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208937" comment="php53-xmlwriter-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208938" comment="php53-xsl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208939" comment="php53-zip-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208940" comment="php53-zlib-5.3.17-71 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4346</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-4346" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4346" source="CVE"/>
    <description>
    Integer overflow in the str_pad function in ext/standard/string.c in PHP before 7.0.4 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a long string, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4346.html">CVE-2016-4346</cve>
<bugzilla href="https://bugzilla.suse.com/977993">SUSE bug 977993</bugzilla>
<bugzilla href="https://bugzilla.suse.com/977994">SUSE bug 977994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/977995">SUSE bug 977995</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208897" comment="apache2-mod_php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203264" comment="php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208898" comment="php53-bcmath-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208899" comment="php53-bz2-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208900" comment="php53-calendar-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208901" comment="php53-ctype-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208902" comment="php53-curl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208903" comment="php53-dba-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208904" comment="php53-dom-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208905" comment="php53-exif-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208906" comment="php53-fastcgi-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208907" comment="php53-fileinfo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208908" comment="php53-ftp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208909" comment="php53-gd-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208910" comment="php53-gettext-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208911" comment="php53-gmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208912" comment="php53-iconv-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208913" comment="php53-intl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208914" comment="php53-json-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208915" comment="php53-ldap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208916" comment="php53-mbstring-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208917" comment="php53-mcrypt-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208918" comment="php53-mysql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208919" comment="php53-odbc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208920" comment="php53-openssl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208921" comment="php53-pcntl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208922" comment="php53-pdo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208923" comment="php53-pear-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208924" comment="php53-pgsql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208925" comment="php53-pspell-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208926" comment="php53-shmop-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208927" comment="php53-snmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208928" comment="php53-soap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208929" comment="php53-suhosin-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208930" comment="php53-sysvmsg-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208931" comment="php53-sysvsem-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208932" comment="php53-sysvshm-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208933" comment="php53-tokenizer-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208934" comment="php53-wddx-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208935" comment="php53-xmlreader-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208936" comment="php53-xmlrpc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208937" comment="php53-xmlwriter-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208938" comment="php53-xsl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208939" comment="php53-zip-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208940" comment="php53-zlib-5.3.17-71 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4429</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-4429" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4429" source="CVE"/>
    <description>
    Stack-based buffer overflow in the clntudp_call function in sunrpc/clnt_udp.c in the GNU C Library (aka glibc or libc6) allows remote servers to cause a denial of service (crash) or possibly unspecified other impact via a flood of crafted ICMP and UDP packets.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4429.html">CVE-2016-4429</cve>
<bugzilla href="https://bugzilla.suse.com/1081556">SUSE bug 1081556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980854">SUSE bug 980854</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202691" comment="glibc-2.11.3-17.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209287" comment="glibc-32bit-2.11.3-17.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209288" comment="glibc-devel-2.11.3-17.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209289" comment="glibc-devel-32bit-2.11.3-17.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202692" comment="glibc-html-2.11.3-17.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209290" comment="glibc-i18ndata-2.11.3-17.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202693" comment="glibc-info-2.11.3-17.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209291" comment="glibc-locale-2.11.3-17.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209292" comment="glibc-locale-32bit-2.11.3-17.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209294" comment="glibc-profile-2.11.3-17.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209295" comment="glibc-profile-32bit-2.11.3-17.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209298" comment="nscd-2.11.3-17.102 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4439</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-4439" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4439" source="CVE"/>
    <description>
    The esp_reg_write function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check command buffer length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the QEMU host via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4439.html">CVE-2016-4439</cve>
<bugzilla href="https://bugzilla.suse.com/980711">SUSE bug 980711</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980716">SUSE bug 980716</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205947" comment="xen-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209054" comment="xen-doc-html-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209055" comment="xen-doc-pdf-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205948" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205950" comment="xen-libs-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209056" comment="xen-libs-32bit-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209057" comment="xen-tools-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205951" comment="xen-tools-domU-4.2.5_21-27 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205947" comment="xen-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209054" comment="xen-doc-html-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209055" comment="xen-doc-pdf-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205948" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205949" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205950" comment="xen-libs-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209056" comment="xen-libs-32bit-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209057" comment="xen-tools-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205951" comment="xen-tools-domU-4.2.5_21-27 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4441</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-4441" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4441" source="CVE"/>
    <description>
    The get_cmd function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check DMA length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4441.html">CVE-2016-4441</cve>
<bugzilla href="https://bugzilla.suse.com/980723">SUSE bug 980723</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980724">SUSE bug 980724</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205947" comment="xen-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209054" comment="xen-doc-html-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209055" comment="xen-doc-pdf-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205948" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205950" comment="xen-libs-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209056" comment="xen-libs-32bit-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209057" comment="xen-tools-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205951" comment="xen-tools-domU-4.2.5_21-27 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205947" comment="xen-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209054" comment="xen-doc-html-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209055" comment="xen-doc-pdf-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205948" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205949" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205950" comment="xen-libs-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209056" comment="xen-libs-32bit-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209057" comment="xen-tools-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205951" comment="xen-tools-domU-4.2.5_21-27 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208728" comment="kvm-1.4.2-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4447</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-4447" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4447" source="CVE"/>
    <description>
    The xmlParseElementDecl function in parser.c in libxml2 before 2.9.4 allows context-dependent attackers to cause a denial of service (heap-based buffer underread and application crash) via a crafted file, involving xmlParseName.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4447.html">CVE-2016-4447</cve>
<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/981548">SUSE bug 981548</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203092" comment="libxml2-2.7.6-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207874" comment="libxml2-32bit-2.7.6-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207875" comment="libxml2-doc-2.7.6-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207876" comment="libxml2-python-2.7.6-0.44 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4448</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-4448" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4448" source="CVE"/>
    <description>
    Format string vulnerability in libxml2 before 2.9.4 allows attackers to have unspecified impact via format string specifiers in unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4448.html">CVE-2016-4448</cve>
<bugzilla href="https://bugzilla.suse.com/1010299">SUSE bug 1010299</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/981549">SUSE bug 981549</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203092" comment="libxml2-2.7.6-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207874" comment="libxml2-32bit-2.7.6-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207875" comment="libxml2-doc-2.7.6-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207876" comment="libxml2-python-2.7.6-0.44 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4449</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-4449" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4449" source="CVE"/>
    <description>
    XML external entity (XXE) vulnerability in the xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.4, when not in validating mode, allows context-dependent attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4449.html">CVE-2016-4449</cve>
<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/981550">SUSE bug 981550</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203092" comment="libxml2-2.7.6-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207874" comment="libxml2-32bit-2.7.6-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207875" comment="libxml2-doc-2.7.6-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207876" comment="libxml2-python-2.7.6-0.44 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4453</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-4453" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4453" source="CVE"/>
    <description>
    The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4453.html">CVE-2016-4453</cve>
<bugzilla href="https://bugzilla.suse.com/982223">SUSE bug 982223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/982225">SUSE bug 982225</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205947" comment="xen-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209054" comment="xen-doc-html-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209055" comment="xen-doc-pdf-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205948" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205949" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205950" comment="xen-libs-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209056" comment="xen-libs-32bit-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209057" comment="xen-tools-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205951" comment="xen-tools-domU-4.2.5_21-27 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205947" comment="xen-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209054" comment="xen-doc-html-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209055" comment="xen-doc-pdf-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205948" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205950" comment="xen-libs-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209056" comment="xen-libs-32bit-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209057" comment="xen-tools-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205951" comment="xen-tools-domU-4.2.5_21-27 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250394" comment="kvm-1.4.2-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4454</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-4454" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4454" source="CVE"/>
    <description>
    The vmsvga_fifo_read_raw function in hw/display/vmware_vga.c in QEMU allows local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4454.html">CVE-2016-4454</cve>
<bugzilla href="https://bugzilla.suse.com/982222">SUSE bug 982222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/982224">SUSE bug 982224</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205947" comment="xen-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209054" comment="xen-doc-html-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209055" comment="xen-doc-pdf-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205948" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205949" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205950" comment="xen-libs-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209056" comment="xen-libs-32bit-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209057" comment="xen-tools-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205951" comment="xen-tools-domU-4.2.5_21-27 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205947" comment="xen-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209054" comment="xen-doc-html-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209055" comment="xen-doc-pdf-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205948" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205950" comment="xen-libs-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209056" comment="xen-libs-32bit-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209057" comment="xen-tools-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205951" comment="xen-tools-domU-4.2.5_21-27 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250394" comment="kvm-1.4.2-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4470</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-4470" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4470" source="CVE"/>
    <description>
    The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4470.html">CVE-2016-4470</cve>
<bugzilla href="https://bugzilla.suse.com/984755">SUSE bug 984755</bugzilla>
<bugzilla href="https://bugzilla.suse.com/984764">SUSE bug 984764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/990058">SUSE bug 990058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/991651">SUSE bug 991651</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208598" comment="kernel-bigsmp-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208599" comment="kernel-bigsmp-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208600" comment="kernel-bigsmp-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205422" comment="kernel-default-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205423" comment="kernel-default-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205424" comment="kernel-default-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205425" comment="kernel-ec2-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205426" comment="kernel-ec2-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205427" comment="kernel-ec2-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205431" comment="kernel-source-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205432" comment="kernel-syms-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205433" comment="kernel-trace-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205434" comment="kernel-trace-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205435" comment="kernel-trace-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205436" comment="kernel-xen-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205437" comment="kernel-xen-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205438" comment="kernel-xen-devel-3.0.101-0.47.86 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208598" comment="kernel-bigsmp-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208599" comment="kernel-bigsmp-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208600" comment="kernel-bigsmp-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205422" comment="kernel-default-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205423" comment="kernel-default-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205424" comment="kernel-default-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208601" comment="kernel-default-man-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205425" comment="kernel-ec2-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205426" comment="kernel-ec2-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205427" comment="kernel-ec2-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205428" comment="kernel-pae-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205429" comment="kernel-pae-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205430" comment="kernel-pae-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205431" comment="kernel-source-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205432" comment="kernel-syms-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205433" comment="kernel-trace-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205434" comment="kernel-trace-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205435" comment="kernel-trace-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205436" comment="kernel-xen-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205437" comment="kernel-xen-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205438" comment="kernel-xen-devel-3.0.101-0.47.86 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4480</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-4480" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4480" source="CVE"/>
    <description>
    The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen 4.6.x and earlier does not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might allow local guest OS users to gain privileges via a crafted mapping of memory.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4480.html">CVE-2016-4480</cve>
<bugzilla href="https://bugzilla.suse.com/978288">SUSE bug 978288</bugzilla>
<bugzilla href="https://bugzilla.suse.com/978295">SUSE bug 978295</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205947" comment="xen-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209054" comment="xen-doc-html-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209055" comment="xen-doc-pdf-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205948" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205949" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205950" comment="xen-libs-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209056" comment="xen-libs-32bit-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209057" comment="xen-tools-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205951" comment="xen-tools-domU-4.2.5_21-27 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205947" comment="xen-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209054" comment="xen-doc-html-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209055" comment="xen-doc-pdf-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205948" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205950" comment="xen-libs-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209056" comment="xen-libs-32bit-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209057" comment="xen-tools-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205951" comment="xen-tools-domU-4.2.5_21-27 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4482</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-4482" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4482" source="CVE"/>
    <description>
    The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4482.html">CVE-2016-4482</cve>
<bugzilla href="https://bugzilla.suse.com/978401">SUSE bug 978401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/978445">SUSE bug 978445</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208598" comment="kernel-bigsmp-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208599" comment="kernel-bigsmp-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208600" comment="kernel-bigsmp-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205422" comment="kernel-default-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205423" comment="kernel-default-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205424" comment="kernel-default-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205425" comment="kernel-ec2-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205426" comment="kernel-ec2-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205427" comment="kernel-ec2-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205431" comment="kernel-source-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205432" comment="kernel-syms-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205433" comment="kernel-trace-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205434" comment="kernel-trace-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205435" comment="kernel-trace-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205436" comment="kernel-xen-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205437" comment="kernel-xen-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205438" comment="kernel-xen-devel-3.0.101-0.47.86 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208598" comment="kernel-bigsmp-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208599" comment="kernel-bigsmp-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208600" comment="kernel-bigsmp-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205422" comment="kernel-default-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205423" comment="kernel-default-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205424" comment="kernel-default-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208601" comment="kernel-default-man-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205425" comment="kernel-ec2-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205426" comment="kernel-ec2-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205427" comment="kernel-ec2-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205428" comment="kernel-pae-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205429" comment="kernel-pae-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205430" comment="kernel-pae-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205431" comment="kernel-source-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205432" comment="kernel-syms-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205433" comment="kernel-trace-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205434" comment="kernel-trace-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205435" comment="kernel-trace-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205436" comment="kernel-xen-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205437" comment="kernel-xen-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205438" comment="kernel-xen-devel-3.0.101-0.47.86 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4483</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-4483" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4483" source="CVE"/>
    <description>
    The xmlBufAttrSerializeTxtContent function in xmlsave.c in libxml2 allows context-dependent attackers to cause a denial of service (out-of-bounds read and application crash) via a non-UTF-8 attribute value, related to serialization.  NOTE: this vulnerability may be a duplicate of CVE-2016-3627.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4483.html">CVE-2016-4483</cve>
<bugzilla href="https://bugzilla.suse.com/1026101">SUSE bug 1026101</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/978395">SUSE bug 978395</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203092" comment="libxml2-2.7.6-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207874" comment="libxml2-32bit-2.7.6-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207875" comment="libxml2-doc-2.7.6-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207876" comment="libxml2-python-2.7.6-0.44 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-4485" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4485" source="CVE"/>
    <description>
    The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows attackers to obtain sensitive information from kernel stack memory by reading a message.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4485.html">CVE-2016-4485</cve>
<bugzilla href="https://bugzilla.suse.com/978821">SUSE bug 978821</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208598" comment="kernel-bigsmp-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208599" comment="kernel-bigsmp-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208600" comment="kernel-bigsmp-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205422" comment="kernel-default-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205423" comment="kernel-default-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205424" comment="kernel-default-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205425" comment="kernel-ec2-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205426" comment="kernel-ec2-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205427" comment="kernel-ec2-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205431" comment="kernel-source-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205432" comment="kernel-syms-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205433" comment="kernel-trace-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205434" comment="kernel-trace-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205435" comment="kernel-trace-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205436" comment="kernel-xen-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205437" comment="kernel-xen-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205438" comment="kernel-xen-devel-3.0.101-0.47.86 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208598" comment="kernel-bigsmp-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208599" comment="kernel-bigsmp-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208600" comment="kernel-bigsmp-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205422" comment="kernel-default-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205423" comment="kernel-default-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205424" comment="kernel-default-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208601" comment="kernel-default-man-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205425" comment="kernel-ec2-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205426" comment="kernel-ec2-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205427" comment="kernel-ec2-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205428" comment="kernel-pae-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205429" comment="kernel-pae-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205430" comment="kernel-pae-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205431" comment="kernel-source-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205432" comment="kernel-syms-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205433" comment="kernel-trace-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205434" comment="kernel-trace-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205435" comment="kernel-trace-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205436" comment="kernel-xen-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205437" comment="kernel-xen-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205438" comment="kernel-xen-devel-3.0.101-0.47.86 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4486</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-4486" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4486" source="CVE"/>
    <description>
    The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4486.html">CVE-2016-4486</cve>
<bugzilla href="https://bugzilla.suse.com/978822">SUSE bug 978822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/990058">SUSE bug 990058</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208598" comment="kernel-bigsmp-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208599" comment="kernel-bigsmp-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208600" comment="kernel-bigsmp-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205422" comment="kernel-default-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205423" comment="kernel-default-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205424" comment="kernel-default-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205425" comment="kernel-ec2-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205426" comment="kernel-ec2-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205427" comment="kernel-ec2-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205431" comment="kernel-source-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205432" comment="kernel-syms-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205433" comment="kernel-trace-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205434" comment="kernel-trace-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205435" comment="kernel-trace-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205436" comment="kernel-xen-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205437" comment="kernel-xen-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205438" comment="kernel-xen-devel-3.0.101-0.47.86 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208598" comment="kernel-bigsmp-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208599" comment="kernel-bigsmp-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208600" comment="kernel-bigsmp-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205422" comment="kernel-default-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205423" comment="kernel-default-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205424" comment="kernel-default-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208601" comment="kernel-default-man-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205425" comment="kernel-ec2-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205426" comment="kernel-ec2-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205427" comment="kernel-ec2-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205428" comment="kernel-pae-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205429" comment="kernel-pae-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205430" comment="kernel-pae-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205431" comment="kernel-source-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205432" comment="kernel-syms-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205433" comment="kernel-trace-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205434" comment="kernel-trace-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205435" comment="kernel-trace-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205436" comment="kernel-xen-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205437" comment="kernel-xen-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205438" comment="kernel-xen-devel-3.0.101-0.47.86 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4537</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-4537" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4537" source="CVE"/>
    <description>
    The bcpowmod function in ext/bcmath/bcmath.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 accepts a negative integer for the scale argument, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted call.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4537.html">CVE-2016-4537</cve>
<bugzilla href="https://bugzilla.suse.com/978827">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208897" comment="apache2-mod_php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203264" comment="php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208898" comment="php53-bcmath-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208899" comment="php53-bz2-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208900" comment="php53-calendar-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208901" comment="php53-ctype-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208902" comment="php53-curl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208903" comment="php53-dba-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208904" comment="php53-dom-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208905" comment="php53-exif-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208906" comment="php53-fastcgi-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208907" comment="php53-fileinfo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208908" comment="php53-ftp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208909" comment="php53-gd-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208910" comment="php53-gettext-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208911" comment="php53-gmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208912" comment="php53-iconv-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208913" comment="php53-intl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208914" comment="php53-json-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208915" comment="php53-ldap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208916" comment="php53-mbstring-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208917" comment="php53-mcrypt-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208918" comment="php53-mysql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208919" comment="php53-odbc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208920" comment="php53-openssl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208921" comment="php53-pcntl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208922" comment="php53-pdo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208923" comment="php53-pear-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208924" comment="php53-pgsql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208925" comment="php53-pspell-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208926" comment="php53-shmop-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208927" comment="php53-snmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208928" comment="php53-soap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208929" comment="php53-suhosin-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208930" comment="php53-sysvmsg-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208931" comment="php53-sysvsem-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208932" comment="php53-sysvshm-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208933" comment="php53-tokenizer-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208934" comment="php53-wddx-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208935" comment="php53-xmlreader-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208936" comment="php53-xmlrpc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208937" comment="php53-xmlwriter-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208938" comment="php53-xsl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208939" comment="php53-zip-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208940" comment="php53-zlib-5.3.17-71 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4538</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-4538" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4538" source="CVE"/>
    <description>
    The bcpowmod function in ext/bcmath/bcmath.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 modifies certain data structures without considering whether they are copies of the _zero_, _one_, or _two_ global variable, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted call.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4538.html">CVE-2016-4538</cve>
<bugzilla href="https://bugzilla.suse.com/978827">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208897" comment="apache2-mod_php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203264" comment="php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208898" comment="php53-bcmath-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208899" comment="php53-bz2-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208900" comment="php53-calendar-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208901" comment="php53-ctype-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208902" comment="php53-curl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208903" comment="php53-dba-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208904" comment="php53-dom-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208905" comment="php53-exif-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208906" comment="php53-fastcgi-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208907" comment="php53-fileinfo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208908" comment="php53-ftp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208909" comment="php53-gd-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208910" comment="php53-gettext-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208911" comment="php53-gmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208912" comment="php53-iconv-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208913" comment="php53-intl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208914" comment="php53-json-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208915" comment="php53-ldap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208916" comment="php53-mbstring-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208917" comment="php53-mcrypt-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208918" comment="php53-mysql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208919" comment="php53-odbc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208920" comment="php53-openssl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208921" comment="php53-pcntl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208922" comment="php53-pdo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208923" comment="php53-pear-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208924" comment="php53-pgsql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208925" comment="php53-pspell-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208926" comment="php53-shmop-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208927" comment="php53-snmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208928" comment="php53-soap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208929" comment="php53-suhosin-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208930" comment="php53-sysvmsg-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208931" comment="php53-sysvsem-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208932" comment="php53-sysvshm-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208933" comment="php53-tokenizer-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208934" comment="php53-wddx-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208935" comment="php53-xmlreader-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208936" comment="php53-xmlrpc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208937" comment="php53-xmlwriter-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208938" comment="php53-xsl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208939" comment="php53-zip-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208940" comment="php53-zlib-5.3.17-71 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4539</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-4539" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4539" source="CVE"/>
    <description>
    The xml_parse_into_struct function in ext/xml/xml.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 allows remote attackers to cause a denial of service (buffer under-read and segmentation fault) or possibly have unspecified other impact via crafted XML data in the second argument, leading to a parser level of zero.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4539.html">CVE-2016-4539</cve>
<bugzilla href="https://bugzilla.suse.com/978828">SUSE bug 978828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208897" comment="apache2-mod_php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203264" comment="php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208898" comment="php53-bcmath-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208899" comment="php53-bz2-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208900" comment="php53-calendar-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208901" comment="php53-ctype-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208902" comment="php53-curl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208903" comment="php53-dba-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208904" comment="php53-dom-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208905" comment="php53-exif-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208906" comment="php53-fastcgi-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208907" comment="php53-fileinfo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208908" comment="php53-ftp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208909" comment="php53-gd-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208910" comment="php53-gettext-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208911" comment="php53-gmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208912" comment="php53-iconv-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208913" comment="php53-intl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208914" comment="php53-json-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208915" comment="php53-ldap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208916" comment="php53-mbstring-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208917" comment="php53-mcrypt-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208918" comment="php53-mysql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208919" comment="php53-odbc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208920" comment="php53-openssl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208921" comment="php53-pcntl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208922" comment="php53-pdo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208923" comment="php53-pear-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208924" comment="php53-pgsql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208925" comment="php53-pspell-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208926" comment="php53-shmop-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208927" comment="php53-snmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208928" comment="php53-soap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208929" comment="php53-suhosin-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208930" comment="php53-sysvmsg-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208931" comment="php53-sysvsem-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208932" comment="php53-sysvshm-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208933" comment="php53-tokenizer-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208934" comment="php53-wddx-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208935" comment="php53-xmlreader-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208936" comment="php53-xmlrpc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208937" comment="php53-xmlwriter-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208938" comment="php53-xsl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208939" comment="php53-zip-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208940" comment="php53-zlib-5.3.17-71 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4540</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-4540" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4540" source="CVE"/>
    <description>
    The grapheme_stripos function in ext/intl/grapheme/grapheme_string.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a negative offset.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4540.html">CVE-2016-4540</cve>
<bugzilla href="https://bugzilla.suse.com/978829">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208897" comment="apache2-mod_php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203264" comment="php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208898" comment="php53-bcmath-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208899" comment="php53-bz2-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208900" comment="php53-calendar-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208901" comment="php53-ctype-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208902" comment="php53-curl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208903" comment="php53-dba-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208904" comment="php53-dom-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208905" comment="php53-exif-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208906" comment="php53-fastcgi-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208907" comment="php53-fileinfo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208908" comment="php53-ftp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208909" comment="php53-gd-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208910" comment="php53-gettext-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208911" comment="php53-gmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208912" comment="php53-iconv-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208913" comment="php53-intl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208914" comment="php53-json-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208915" comment="php53-ldap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208916" comment="php53-mbstring-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208917" comment="php53-mcrypt-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208918" comment="php53-mysql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208919" comment="php53-odbc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208920" comment="php53-openssl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208921" comment="php53-pcntl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208922" comment="php53-pdo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208923" comment="php53-pear-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208924" comment="php53-pgsql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208925" comment="php53-pspell-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208926" comment="php53-shmop-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208927" comment="php53-snmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208928" comment="php53-soap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208929" comment="php53-suhosin-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208930" comment="php53-sysvmsg-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208931" comment="php53-sysvsem-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208932" comment="php53-sysvshm-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208933" comment="php53-tokenizer-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208934" comment="php53-wddx-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208935" comment="php53-xmlreader-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208936" comment="php53-xmlrpc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208937" comment="php53-xmlwriter-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208938" comment="php53-xsl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208939" comment="php53-zip-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208940" comment="php53-zlib-5.3.17-71 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4541</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-4541" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4541" source="CVE"/>
    <description>
    The grapheme_strpos function in ext/intl/grapheme/grapheme_string.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a negative offset.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4541.html">CVE-2016-4541</cve>
<bugzilla href="https://bugzilla.suse.com/978829">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208897" comment="apache2-mod_php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203264" comment="php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208898" comment="php53-bcmath-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208899" comment="php53-bz2-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208900" comment="php53-calendar-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208901" comment="php53-ctype-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208902" comment="php53-curl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208903" comment="php53-dba-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208904" comment="php53-dom-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208905" comment="php53-exif-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208906" comment="php53-fastcgi-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208907" comment="php53-fileinfo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208908" comment="php53-ftp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208909" comment="php53-gd-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208910" comment="php53-gettext-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208911" comment="php53-gmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208912" comment="php53-iconv-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208913" comment="php53-intl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208914" comment="php53-json-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208915" comment="php53-ldap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208916" comment="php53-mbstring-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208917" comment="php53-mcrypt-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208918" comment="php53-mysql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208919" comment="php53-odbc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208920" comment="php53-openssl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208921" comment="php53-pcntl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208922" comment="php53-pdo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208923" comment="php53-pear-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208924" comment="php53-pgsql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208925" comment="php53-pspell-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208926" comment="php53-shmop-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208927" comment="php53-snmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208928" comment="php53-soap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208929" comment="php53-suhosin-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208930" comment="php53-sysvmsg-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208931" comment="php53-sysvsem-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208932" comment="php53-sysvshm-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208933" comment="php53-tokenizer-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208934" comment="php53-wddx-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208935" comment="php53-xmlreader-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208936" comment="php53-xmlrpc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208937" comment="php53-xmlwriter-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208938" comment="php53-xsl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208939" comment="php53-zip-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208940" comment="php53-zlib-5.3.17-71 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4542</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-4542" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4542" source="CVE"/>
    <description>
    The exif_process_IFD_TAG function in ext/exif/exif.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 does not properly construct spprintf arguments, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted header data.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4542.html">CVE-2016-4542</cve>
<bugzilla href="https://bugzilla.suse.com/978830">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208897" comment="apache2-mod_php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203264" comment="php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208898" comment="php53-bcmath-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208899" comment="php53-bz2-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208900" comment="php53-calendar-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208901" comment="php53-ctype-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208902" comment="php53-curl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208903" comment="php53-dba-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208904" comment="php53-dom-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208905" comment="php53-exif-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208906" comment="php53-fastcgi-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208907" comment="php53-fileinfo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208908" comment="php53-ftp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208909" comment="php53-gd-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208910" comment="php53-gettext-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208911" comment="php53-gmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208912" comment="php53-iconv-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208913" comment="php53-intl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208914" comment="php53-json-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208915" comment="php53-ldap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208916" comment="php53-mbstring-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208917" comment="php53-mcrypt-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208918" comment="php53-mysql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208919" comment="php53-odbc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208920" comment="php53-openssl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208921" comment="php53-pcntl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208922" comment="php53-pdo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208923" comment="php53-pear-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208924" comment="php53-pgsql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208925" comment="php53-pspell-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208926" comment="php53-shmop-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208927" comment="php53-snmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208928" comment="php53-soap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208929" comment="php53-suhosin-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208930" comment="php53-sysvmsg-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208931" comment="php53-sysvsem-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208932" comment="php53-sysvshm-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208933" comment="php53-tokenizer-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208934" comment="php53-wddx-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208935" comment="php53-xmlreader-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208936" comment="php53-xmlrpc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208937" comment="php53-xmlwriter-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208938" comment="php53-xsl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208939" comment="php53-zip-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208940" comment="php53-zlib-5.3.17-71 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4543</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-4543" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4543" source="CVE"/>
    <description>
    The exif_process_IFD_in_JPEG function in ext/exif/exif.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 does not validate IFD sizes, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted header data.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4543.html">CVE-2016-4543</cve>
<bugzilla href="https://bugzilla.suse.com/978830">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208897" comment="apache2-mod_php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203264" comment="php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208898" comment="php53-bcmath-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208899" comment="php53-bz2-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208900" comment="php53-calendar-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208901" comment="php53-ctype-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208902" comment="php53-curl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208903" comment="php53-dba-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208904" comment="php53-dom-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208905" comment="php53-exif-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208906" comment="php53-fastcgi-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208907" comment="php53-fileinfo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208908" comment="php53-ftp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208909" comment="php53-gd-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208910" comment="php53-gettext-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208911" comment="php53-gmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208912" comment="php53-iconv-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208913" comment="php53-intl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208914" comment="php53-json-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208915" comment="php53-ldap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208916" comment="php53-mbstring-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208917" comment="php53-mcrypt-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208918" comment="php53-mysql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208919" comment="php53-odbc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208920" comment="php53-openssl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208921" comment="php53-pcntl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208922" comment="php53-pdo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208923" comment="php53-pear-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208924" comment="php53-pgsql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208925" comment="php53-pspell-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208926" comment="php53-shmop-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208927" comment="php53-snmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208928" comment="php53-soap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208929" comment="php53-suhosin-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208930" comment="php53-sysvmsg-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208931" comment="php53-sysvsem-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208932" comment="php53-sysvshm-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208933" comment="php53-tokenizer-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208934" comment="php53-wddx-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208935" comment="php53-xmlreader-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208936" comment="php53-xmlrpc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208937" comment="php53-xmlwriter-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208938" comment="php53-xsl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208939" comment="php53-zip-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208940" comment="php53-zlib-5.3.17-71 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4544</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-4544" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4544" source="CVE"/>
    <description>
    The exif_process_TIFF_in_JPEG function in ext/exif/exif.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 does not validate TIFF start data, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted header data.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4544.html">CVE-2016-4544</cve>
<bugzilla href="https://bugzilla.suse.com/978830">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208897" comment="apache2-mod_php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203264" comment="php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208898" comment="php53-bcmath-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208899" comment="php53-bz2-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208900" comment="php53-calendar-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208901" comment="php53-ctype-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208902" comment="php53-curl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208903" comment="php53-dba-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208904" comment="php53-dom-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208905" comment="php53-exif-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208906" comment="php53-fastcgi-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208907" comment="php53-fileinfo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208908" comment="php53-ftp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208909" comment="php53-gd-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208910" comment="php53-gettext-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208911" comment="php53-gmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208912" comment="php53-iconv-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208913" comment="php53-intl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208914" comment="php53-json-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208915" comment="php53-ldap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208916" comment="php53-mbstring-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208917" comment="php53-mcrypt-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208918" comment="php53-mysql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208919" comment="php53-odbc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208920" comment="php53-openssl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208921" comment="php53-pcntl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208922" comment="php53-pdo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208923" comment="php53-pear-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208924" comment="php53-pgsql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208925" comment="php53-pspell-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208926" comment="php53-shmop-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208927" comment="php53-snmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208928" comment="php53-soap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208929" comment="php53-suhosin-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208930" comment="php53-sysvmsg-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208931" comment="php53-sysvsem-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208932" comment="php53-sysvshm-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208933" comment="php53-tokenizer-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208934" comment="php53-wddx-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208935" comment="php53-xmlreader-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208936" comment="php53-xmlrpc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208937" comment="php53-xmlwriter-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208938" comment="php53-xsl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208939" comment="php53-zip-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208940" comment="php53-zlib-5.3.17-71 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4553</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-4553" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4553" source="CVE"/>
    <description>
    client_side.cc in Squid before 3.5.18 and 4.x before 4.0.10 does not properly ignore the Host header when absolute-URI is provided, which allows remote attackers to conduct cache-poisoning attacks via an HTTP request.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4553.html">CVE-2016-4553</cve>
<bugzilla href="https://bugzilla.suse.com/979009">SUSE bug 979009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/990451">SUSE bug 990451</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210806" comment="squid3-3.1.23-8.16.30 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4554</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-4554" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4554" source="CVE"/>
    <description>
    mime_header.cc in Squid before 3.5.18 allows remote attackers to bypass intended same-origin restrictions and possibly conduct cache-poisoning attacks via a crafted HTTP Host header, aka a "header smuggling" issue.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4554.html">CVE-2016-4554</cve>
<bugzilla href="https://bugzilla.suse.com/979010">SUSE bug 979010</bugzilla>
<bugzilla href="https://bugzilla.suse.com/990451">SUSE bug 990451</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210805" comment="squid-2.7.STABLE5-2.12.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210806" comment="squid3-3.1.23-8.16.30 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4555</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-4555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4555" source="CVE"/>
    <description>
    client_side_request.cc in Squid 3.x before 3.5.18 and 4.x before 4.0.10 allows remote servers to cause a denial of service (crash) via crafted Edge Side Includes (ESI) responses.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4555.html">CVE-2016-4555</cve>
<bugzilla href="https://bugzilla.suse.com/979008">SUSE bug 979008</bugzilla>
<bugzilla href="https://bugzilla.suse.com/979011">SUSE bug 979011</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210806" comment="squid3-3.1.23-8.16.30 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4556</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-4556" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4556" source="CVE"/>
    <description>
    Double free vulnerability in Esi.cc in Squid 3.x before 3.5.18 and 4.x before 4.0.10 allows remote servers to cause a denial of service (crash) via a crafted Edge Side Includes (ESI) response.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4556.html">CVE-2016-4556</cve>
<bugzilla href="https://bugzilla.suse.com/979008">SUSE bug 979008</bugzilla>
<bugzilla href="https://bugzilla.suse.com/979011">SUSE bug 979011</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210806" comment="squid3-3.1.23-8.16.30 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4562</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-4562" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4562" source="CVE"/>
    <description>
    The DrawDashPolygon function in MagickCore/draw.c in ImageMagick before 6.9.4-0 and 7.x before 7.0.1-2 mishandles calculations of certain vertices integer data, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4562.html">CVE-2016-4562</cve>
<bugzilla href="https://bugzilla.suse.com/983292">SUSE bug 983292</bugzilla>
<bugzilla href="https://bugzilla.suse.com/983305">SUSE bug 983305</bugzilla>
<bugzilla href="https://bugzilla.suse.com/983308">SUSE bug 983308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/983309">SUSE bug 983309</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4563</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-4563" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4563" source="CVE"/>
    <description>
    The TraceStrokePolygon function in MagickCore/draw.c in ImageMagick before 6.9.4-0 and 7.x before 7.0.1-2 mishandles the relationship between the BezierQuantum value and certain strokes data, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4563.html">CVE-2016-4563</cve>
<bugzilla href="https://bugzilla.suse.com/983305">SUSE bug 983305</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4564</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-4564" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4564" source="CVE"/>
    <description>
    The DrawImage function in MagickCore/draw.c in ImageMagick before 6.9.4-0 and 7.x before 7.0.1-2 makes an incorrect function call in attempting to locate the next token, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4564.html">CVE-2016-4564</cve>
<bugzilla href="https://bugzilla.suse.com/983308">SUSE bug 983308</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4565</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-4565" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4565" source="CVE"/>
    <description>
    The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4565.html">CVE-2016-4565</cve>
<bugzilla href="https://bugzilla.suse.com/979548">SUSE bug 979548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980363">SUSE bug 980363</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980883">SUSE bug 980883</bugzilla>
<bugzilla href="https://bugzilla.suse.com/990058">SUSE bug 990058</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208598" comment="kernel-bigsmp-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208599" comment="kernel-bigsmp-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208600" comment="kernel-bigsmp-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205422" comment="kernel-default-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205423" comment="kernel-default-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205424" comment="kernel-default-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205425" comment="kernel-ec2-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205426" comment="kernel-ec2-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205427" comment="kernel-ec2-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205431" comment="kernel-source-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205432" comment="kernel-syms-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205433" comment="kernel-trace-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205434" comment="kernel-trace-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205435" comment="kernel-trace-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205436" comment="kernel-xen-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205437" comment="kernel-xen-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205438" comment="kernel-xen-devel-3.0.101-0.47.86 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208598" comment="kernel-bigsmp-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208599" comment="kernel-bigsmp-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208600" comment="kernel-bigsmp-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205422" comment="kernel-default-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205423" comment="kernel-default-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205424" comment="kernel-default-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208601" comment="kernel-default-man-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205425" comment="kernel-ec2-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205426" comment="kernel-ec2-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205427" comment="kernel-ec2-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205428" comment="kernel-pae-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205429" comment="kernel-pae-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205430" comment="kernel-pae-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205431" comment="kernel-source-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205432" comment="kernel-syms-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205433" comment="kernel-trace-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205434" comment="kernel-trace-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205435" comment="kernel-trace-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205436" comment="kernel-xen-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205437" comment="kernel-xen-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205438" comment="kernel-xen-devel-3.0.101-0.47.86 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4569</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-4569" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4569" source="CVE"/>
    <description>
    The snd_timer_user_params function in sound/core/timer.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4569.html">CVE-2016-4569</cve>
<bugzilla href="https://bugzilla.suse.com/979213">SUSE bug 979213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/979879">SUSE bug 979879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/990058">SUSE bug 990058</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208598" comment="kernel-bigsmp-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208599" comment="kernel-bigsmp-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208600" comment="kernel-bigsmp-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205422" comment="kernel-default-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205423" comment="kernel-default-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205424" comment="kernel-default-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205425" comment="kernel-ec2-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205426" comment="kernel-ec2-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205427" comment="kernel-ec2-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205431" comment="kernel-source-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205432" comment="kernel-syms-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205433" comment="kernel-trace-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205434" comment="kernel-trace-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205435" comment="kernel-trace-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205436" comment="kernel-xen-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205437" comment="kernel-xen-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205438" comment="kernel-xen-devel-3.0.101-0.47.86 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208598" comment="kernel-bigsmp-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208599" comment="kernel-bigsmp-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208600" comment="kernel-bigsmp-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205422" comment="kernel-default-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205423" comment="kernel-default-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205424" comment="kernel-default-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208601" comment="kernel-default-man-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205425" comment="kernel-ec2-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205426" comment="kernel-ec2-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205427" comment="kernel-ec2-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205428" comment="kernel-pae-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205429" comment="kernel-pae-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205430" comment="kernel-pae-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205431" comment="kernel-source-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205432" comment="kernel-syms-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205433" comment="kernel-trace-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205434" comment="kernel-trace-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205435" comment="kernel-trace-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205436" comment="kernel-xen-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205437" comment="kernel-xen-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205438" comment="kernel-xen-devel-3.0.101-0.47.86 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4574</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-4574" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4574" source="CVE"/>
    <description>
    Off-by-one error in the append_utf8_value function in the DN decoder (dn.c) in Libksba before 1.3.4 allows remote attackers to cause a denial of service (out-of-bounds read) via invalid utf-8 encoded data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-4356.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4574.html">CVE-2016-4574</cve>
<bugzilla href="https://bugzilla.suse.com/1135436">SUSE bug 1135436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/979261">SUSE bug 979261</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202845" comment="libksba-1.0.4-1.25 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4578</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-4578" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4578" source="CVE"/>
    <description>
    sound/core/timer.c in the Linux kernel through 4.6 does not initialize certain r1 data structures, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4578.html">CVE-2016-4578</cve>
<bugzilla href="https://bugzilla.suse.com/1052256">SUSE bug 1052256</bugzilla>
<bugzilla href="https://bugzilla.suse.com/979879">SUSE bug 979879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/990058">SUSE bug 990058</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208598" comment="kernel-bigsmp-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208599" comment="kernel-bigsmp-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208600" comment="kernel-bigsmp-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205422" comment="kernel-default-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205423" comment="kernel-default-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205424" comment="kernel-default-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205425" comment="kernel-ec2-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205426" comment="kernel-ec2-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205427" comment="kernel-ec2-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205431" comment="kernel-source-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205432" comment="kernel-syms-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205433" comment="kernel-trace-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205434" comment="kernel-trace-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205435" comment="kernel-trace-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205436" comment="kernel-xen-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205437" comment="kernel-xen-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205438" comment="kernel-xen-devel-3.0.101-0.47.86 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208598" comment="kernel-bigsmp-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208599" comment="kernel-bigsmp-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208600" comment="kernel-bigsmp-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205422" comment="kernel-default-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205423" comment="kernel-default-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205424" comment="kernel-default-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208601" comment="kernel-default-man-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205425" comment="kernel-ec2-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205426" comment="kernel-ec2-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205427" comment="kernel-ec2-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205428" comment="kernel-pae-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205429" comment="kernel-pae-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205430" comment="kernel-pae-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205431" comment="kernel-source-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205432" comment="kernel-syms-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205433" comment="kernel-trace-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205434" comment="kernel-trace-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205435" comment="kernel-trace-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205436" comment="kernel-xen-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205437" comment="kernel-xen-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205438" comment="kernel-xen-devel-3.0.101-0.47.86 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4579</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-4579" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4579" source="CVE"/>
    <description>
    Libksba before 1.3.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via unspecified vectors, related to the "returned length of the object from _ksba_ber_parse_tl."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4579.html">CVE-2016-4579</cve>
<bugzilla href="https://bugzilla.suse.com/1135436">SUSE bug 1135436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/979906">SUSE bug 979906</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202845" comment="libksba-1.0.4-1.25 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4580</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-4580" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4580" source="CVE"/>
    <description>
    The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel before 4.5.5 does not properly initialize a certain data structure, which allows attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4580.html">CVE-2016-4580</cve>
<bugzilla href="https://bugzilla.suse.com/870618">SUSE bug 870618</bugzilla>
<bugzilla href="https://bugzilla.suse.com/981267">SUSE bug 981267</bugzilla>
<bugzilla href="https://bugzilla.suse.com/985132">SUSE bug 985132</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208598" comment="kernel-bigsmp-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208599" comment="kernel-bigsmp-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208600" comment="kernel-bigsmp-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205422" comment="kernel-default-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205423" comment="kernel-default-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205424" comment="kernel-default-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205425" comment="kernel-ec2-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205426" comment="kernel-ec2-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205427" comment="kernel-ec2-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205431" comment="kernel-source-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205432" comment="kernel-syms-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205433" comment="kernel-trace-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205434" comment="kernel-trace-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205435" comment="kernel-trace-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205436" comment="kernel-xen-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205437" comment="kernel-xen-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205438" comment="kernel-xen-devel-3.0.101-0.47.86 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208598" comment="kernel-bigsmp-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208599" comment="kernel-bigsmp-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208600" comment="kernel-bigsmp-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205422" comment="kernel-default-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205423" comment="kernel-default-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205424" comment="kernel-default-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208601" comment="kernel-default-man-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205425" comment="kernel-ec2-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205426" comment="kernel-ec2-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205427" comment="kernel-ec2-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205428" comment="kernel-pae-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205429" comment="kernel-pae-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205430" comment="kernel-pae-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205431" comment="kernel-source-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205432" comment="kernel-syms-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205433" comment="kernel-trace-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205434" comment="kernel-trace-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205435" comment="kernel-trace-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205436" comment="kernel-xen-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205437" comment="kernel-xen-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205438" comment="kernel-xen-devel-3.0.101-0.47.86 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4658</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-4658" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4658" source="CVE"/>
    <description>
    xpointer.c in libxml2 before 2.9.5 (as used in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3, and other products) does not forbid namespace nodes in XPointer ranges, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and memory corruption) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4658.html">CVE-2016-4658</cve>
<bugzilla href="https://bugzilla.suse.com/1005544">SUSE bug 1005544</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1014873">SUSE bug 1014873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1069433">SUSE bug 1069433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1078813">SUSE bug 1078813</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203095" comment="libxml2-2.7.6-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209968" comment="libxml2-32bit-2.7.6-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209969" comment="libxml2-doc-2.7.6-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209970" comment="libxml2-python-2.7.6-0.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4738</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-4738" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4738" source="CVE"/>
    <description>
    libxslt in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4738.html">CVE-2016-4738</cve>
<bugzilla href="https://bugzilla.suse.com/1005591">SUSE bug 1005591</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123130">SUSE bug 1123130</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203113" comment="libxslt-1.1.24-19.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209989" comment="libxslt-32bit-1.1.24-19.33 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4804</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-4804" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4804" source="CVE"/>
    <description>
    The read_boot function in boot.c in dosfstools before 4.0 allows attackers to cause a denial of service (crash) via a crafted filesystem, which triggers a heap-based buffer overflow in the (1) read_fat function or an out-of-bounds heap read in (2) get_fat function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4804.html">CVE-2016-4804</cve>
<bugzilla href="https://bugzilla.suse.com/980364">SUSE bug 980364</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980377">SUSE bug 980377</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249922" comment="dosfstools-2.11-121.31.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-4805" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4805" source="CVE"/>
    <description>
    Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel before 4.5.2 allows local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4805.html">CVE-2016-4805</cve>
<bugzilla href="https://bugzilla.suse.com/980371">SUSE bug 980371</bugzilla>
<bugzilla href="https://bugzilla.suse.com/990058">SUSE bug 990058</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208598" comment="kernel-bigsmp-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208599" comment="kernel-bigsmp-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208600" comment="kernel-bigsmp-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205422" comment="kernel-default-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205423" comment="kernel-default-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205424" comment="kernel-default-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205425" comment="kernel-ec2-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205426" comment="kernel-ec2-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205427" comment="kernel-ec2-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205431" comment="kernel-source-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205432" comment="kernel-syms-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205433" comment="kernel-trace-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205434" comment="kernel-trace-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205435" comment="kernel-trace-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205436" comment="kernel-xen-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205437" comment="kernel-xen-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205438" comment="kernel-xen-devel-3.0.101-0.47.86 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208598" comment="kernel-bigsmp-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208599" comment="kernel-bigsmp-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208600" comment="kernel-bigsmp-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205422" comment="kernel-default-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205423" comment="kernel-default-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205424" comment="kernel-default-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208601" comment="kernel-default-man-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205425" comment="kernel-ec2-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205426" comment="kernel-ec2-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205427" comment="kernel-ec2-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205428" comment="kernel-pae-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205429" comment="kernel-pae-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205430" comment="kernel-pae-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205431" comment="kernel-source-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205432" comment="kernel-syms-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205433" comment="kernel-trace-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205434" comment="kernel-trace-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205435" comment="kernel-trace-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205436" comment="kernel-xen-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205437" comment="kernel-xen-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205438" comment="kernel-xen-devel-3.0.101-0.47.86 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4809</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-4809" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4809" source="CVE"/>
    <description>
    The archive_read_format_cpio_read_header function in archive_read_support_format_cpio.c in libarchive before 3.2.1 allows remote attackers to cause a denial of service (application crash) via a CPIO archive with a large symlink.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4809.html">CVE-2016-4809</cve>
<bugzilla href="https://bugzilla.suse.com/984990">SUSE bug 984990</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202461" comment="bsdtar-2.5.5-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205311" comment="libarchive2-2.5.5-9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4913</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-4913" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4913" source="CVE"/>
    <description>
    The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel before 4.5.5 mishandles NM (aka alternate name) entries containing \0 characters, which allows local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4913.html">CVE-2016-4913</cve>
<bugzilla href="https://bugzilla.suse.com/870618">SUSE bug 870618</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980725">SUSE bug 980725</bugzilla>
<bugzilla href="https://bugzilla.suse.com/985132">SUSE bug 985132</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208598" comment="kernel-bigsmp-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208599" comment="kernel-bigsmp-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208600" comment="kernel-bigsmp-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205422" comment="kernel-default-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205423" comment="kernel-default-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205424" comment="kernel-default-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205425" comment="kernel-ec2-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205426" comment="kernel-ec2-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205427" comment="kernel-ec2-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205431" comment="kernel-source-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205432" comment="kernel-syms-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205433" comment="kernel-trace-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205434" comment="kernel-trace-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205435" comment="kernel-trace-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205436" comment="kernel-xen-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205437" comment="kernel-xen-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205438" comment="kernel-xen-devel-3.0.101-0.47.86 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208598" comment="kernel-bigsmp-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208599" comment="kernel-bigsmp-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208600" comment="kernel-bigsmp-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205422" comment="kernel-default-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205423" comment="kernel-default-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205424" comment="kernel-default-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208601" comment="kernel-default-man-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205425" comment="kernel-ec2-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205426" comment="kernel-ec2-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205427" comment="kernel-ec2-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205428" comment="kernel-pae-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205429" comment="kernel-pae-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205430" comment="kernel-pae-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205431" comment="kernel-source-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205432" comment="kernel-syms-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205433" comment="kernel-trace-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205434" comment="kernel-trace-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205435" comment="kernel-trace-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205436" comment="kernel-xen-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205437" comment="kernel-xen-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205438" comment="kernel-xen-devel-3.0.101-0.47.86 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4953</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-4953" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4953" source="CVE"/>
    <description>
    ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (ephemeral-association demobilization) by sending a spoofed crypto-NAK packet with incorrect authentication data at a certain time.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4953.html">CVE-2016-4953</cve>
<bugzilla href="https://bugzilla.suse.com/962784">SUSE bug 962784</bugzilla>
<bugzilla href="https://bugzilla.suse.com/977459">SUSE bug 977459</bugzilla>
<bugzilla href="https://bugzilla.suse.com/982056">SUSE bug 982056</bugzilla>
<bugzilla href="https://bugzilla.suse.com/982065">SUSE bug 982065</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207909" comment="ntp-4.2.8p8-47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207910" comment="ntp-doc-4.2.8p8-47 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4954</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-4954" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4954" source="CVE"/>
    <description>
    The process_packet function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (peer-variable modification) by sending spoofed packets from many source IP addresses in a certain scenario, as demonstrated by triggering an incorrect leap indication.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4954.html">CVE-2016-4954</cve>
<bugzilla href="https://bugzilla.suse.com/982056">SUSE bug 982056</bugzilla>
<bugzilla href="https://bugzilla.suse.com/982066">SUSE bug 982066</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207909" comment="ntp-4.2.8p8-47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207910" comment="ntp-doc-4.2.8p8-47 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4955</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-4955" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4955" source="CVE"/>
    <description>
    ntpd in NTP 4.x before 4.2.8p8, when autokey is enabled, allows remote attackers to cause a denial of service (peer-variable clearing and association outage) by sending (1) a spoofed crypto-NAK packet or (2) a packet with an incorrect MAC value at a certain time.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4955.html">CVE-2016-4955</cve>
<bugzilla href="https://bugzilla.suse.com/982056">SUSE bug 982056</bugzilla>
<bugzilla href="https://bugzilla.suse.com/982067">SUSE bug 982067</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207909" comment="ntp-4.2.8p8-47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207910" comment="ntp-doc-4.2.8p8-47 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4956</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-4956" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4956" source="CVE"/>
    <description>
    ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (interleaved-mode transition and time change) via a spoofed broadcast packet.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-1548.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4956.html">CVE-2016-4956</cve>
<bugzilla href="https://bugzilla.suse.com/977461">SUSE bug 977461</bugzilla>
<bugzilla href="https://bugzilla.suse.com/982056">SUSE bug 982056</bugzilla>
<bugzilla href="https://bugzilla.suse.com/982068">SUSE bug 982068</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207909" comment="ntp-4.2.8p8-47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207910" comment="ntp-doc-4.2.8p8-47 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4957</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-4957" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4957" source="CVE"/>
    <description>
    ntpd in NTP before 4.2.8p8 allows remote attackers to cause a denial of service (daemon crash) via a crypto-NAK packet.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2016-1547.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4957.html">CVE-2016-4957</cve>
<bugzilla href="https://bugzilla.suse.com/977459">SUSE bug 977459</bugzilla>
<bugzilla href="https://bugzilla.suse.com/982056">SUSE bug 982056</bugzilla>
<bugzilla href="https://bugzilla.suse.com/982064">SUSE bug 982064</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009207909" comment="ntp-4.2.8p8-47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207910" comment="ntp-doc-4.2.8p8-47 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4971</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-4971" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4971" source="CVE"/>
    <description>
    GNU wget before 1.18 allows remote servers to write to arbitrary files by redirecting a request from HTTP to a crafted FTP resource.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4971.html">CVE-2016-4971</cve>
<bugzilla href="https://bugzilla.suse.com/1023231">SUSE bug 1023231</bugzilla>
<bugzilla href="https://bugzilla.suse.com/984060">SUSE bug 984060</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205945" comment="wget-1.11.4-1.32 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205945" comment="wget-1.11.4-1.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203813" comment="wget-openssl1-1.11.4-1.32 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4997</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-4997" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4997" source="CVE"/>
    <description>
    The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4997.html">CVE-2016-4997</cve>
<bugzilla href="https://bugzilla.suse.com/986362">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/986365">SUSE bug 986365</bugzilla>
<bugzilla href="https://bugzilla.suse.com/986377">SUSE bug 986377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/990058">SUSE bug 990058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/991651">SUSE bug 991651</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208598" comment="kernel-bigsmp-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208599" comment="kernel-bigsmp-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208600" comment="kernel-bigsmp-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205422" comment="kernel-default-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205423" comment="kernel-default-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205424" comment="kernel-default-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205425" comment="kernel-ec2-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205426" comment="kernel-ec2-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205427" comment="kernel-ec2-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205431" comment="kernel-source-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205432" comment="kernel-syms-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205433" comment="kernel-trace-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205434" comment="kernel-trace-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205435" comment="kernel-trace-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205436" comment="kernel-xen-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205437" comment="kernel-xen-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205438" comment="kernel-xen-devel-3.0.101-0.47.86 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208598" comment="kernel-bigsmp-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208599" comment="kernel-bigsmp-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208600" comment="kernel-bigsmp-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205422" comment="kernel-default-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205423" comment="kernel-default-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205424" comment="kernel-default-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208601" comment="kernel-default-man-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205425" comment="kernel-ec2-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205426" comment="kernel-ec2-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205427" comment="kernel-ec2-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205428" comment="kernel-pae-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205429" comment="kernel-pae-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205430" comment="kernel-pae-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205431" comment="kernel-source-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205432" comment="kernel-syms-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205433" comment="kernel-trace-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205434" comment="kernel-trace-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205435" comment="kernel-trace-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205436" comment="kernel-xen-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205437" comment="kernel-xen-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205438" comment="kernel-xen-devel-3.0.101-0.47.86 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5008</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5008" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5008" source="CVE"/>
    <description>
    libvirt before 2.0.0 improperly disables password checking when the password on a VNC server is set to an empty string, which allows remote attackers to bypass authentication and establish a VNC session by connecting to the server.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5008.html">CVE-2016-5008</cve>
<bugzilla href="https://bugzilla.suse.com/987527">SUSE bug 987527</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009261379" comment="libvirt-1.0.5.9-21.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009261380" comment="libvirt-client-1.0.5.9-21.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009261381" comment="libvirt-client-32bit-1.0.5.9-21.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009261382" comment="libvirt-doc-1.0.5.9-21.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009261383" comment="libvirt-lock-sanlock-1.0.5.9-21.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009261384" comment="libvirt-python-1.0.5.9-21.23 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5018</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5018" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5018" source="CVE"/>
    <description>
    In Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 a malicious web application was able to bypass a configured SecurityManager via a Tomcat utility method that was accessible to web applications.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5018.html">CVE-2016-5018</cve>
<bugzilla href="https://bugzilla.suse.com/1007855">SUSE bug 1007855</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205936" comment="tomcat6-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205937" comment="tomcat6-admin-webapps-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205938" comment="tomcat6-docs-webapp-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205939" comment="tomcat6-javadoc-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205940" comment="tomcat6-jsp-2_1-api-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205941" comment="tomcat6-lib-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205942" comment="tomcat6-servlet-2_5-api-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205943" comment="tomcat6-webapps-6.0.53-0.56 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5093</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-5093" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5093" source="CVE"/>
    <description>
    The get_icu_value_internal function in ext/intl/locale/locale_methods.c in PHP before 5.5.36, 5.6.x before 5.6.22, and 7.x before 7.0.7 does not ensure the presence of a '\0' character, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted locale_get_primary_language call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5093.html">CVE-2016-5093</cve>
<bugzilla href="https://bugzilla.suse.com/982010">SUSE bug 982010</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208897" comment="apache2-mod_php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203264" comment="php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208898" comment="php53-bcmath-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208899" comment="php53-bz2-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208900" comment="php53-calendar-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208901" comment="php53-ctype-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208902" comment="php53-curl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208903" comment="php53-dba-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208904" comment="php53-dom-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208905" comment="php53-exif-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208906" comment="php53-fastcgi-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208907" comment="php53-fileinfo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208908" comment="php53-ftp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208909" comment="php53-gd-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208910" comment="php53-gettext-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208911" comment="php53-gmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208912" comment="php53-iconv-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208913" comment="php53-intl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208914" comment="php53-json-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208915" comment="php53-ldap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208916" comment="php53-mbstring-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208917" comment="php53-mcrypt-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208918" comment="php53-mysql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208919" comment="php53-odbc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208920" comment="php53-openssl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208921" comment="php53-pcntl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208922" comment="php53-pdo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208923" comment="php53-pear-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208924" comment="php53-pgsql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208925" comment="php53-pspell-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208926" comment="php53-shmop-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208927" comment="php53-snmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208928" comment="php53-soap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208929" comment="php53-suhosin-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208930" comment="php53-sysvmsg-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208931" comment="php53-sysvsem-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208932" comment="php53-sysvshm-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208933" comment="php53-tokenizer-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208934" comment="php53-wddx-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208935" comment="php53-xmlreader-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208936" comment="php53-xmlrpc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208937" comment="php53-xmlwriter-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208938" comment="php53-xsl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208939" comment="php53-zip-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208940" comment="php53-zlib-5.3.17-71 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5094</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-5094" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5094" source="CVE"/>
    <description>
    Integer overflow in the php_html_entities function in ext/standard/html.c in PHP before 5.5.36 and 5.6.x before 5.6.22 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering a large output string from the htmlspecialchars function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5094.html">CVE-2016-5094</cve>
<bugzilla href="https://bugzilla.suse.com/982011">SUSE bug 982011</bugzilla>
<bugzilla href="https://bugzilla.suse.com/982012">SUSE bug 982012</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208897" comment="apache2-mod_php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203264" comment="php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208898" comment="php53-bcmath-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208899" comment="php53-bz2-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208900" comment="php53-calendar-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208901" comment="php53-ctype-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208902" comment="php53-curl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208903" comment="php53-dba-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208904" comment="php53-dom-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208905" comment="php53-exif-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208906" comment="php53-fastcgi-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208907" comment="php53-fileinfo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208908" comment="php53-ftp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208909" comment="php53-gd-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208910" comment="php53-gettext-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208911" comment="php53-gmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208912" comment="php53-iconv-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208913" comment="php53-intl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208914" comment="php53-json-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208915" comment="php53-ldap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208916" comment="php53-mbstring-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208917" comment="php53-mcrypt-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208918" comment="php53-mysql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208919" comment="php53-odbc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208920" comment="php53-openssl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208921" comment="php53-pcntl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208922" comment="php53-pdo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208923" comment="php53-pear-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208924" comment="php53-pgsql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208925" comment="php53-pspell-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208926" comment="php53-shmop-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208927" comment="php53-snmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208928" comment="php53-soap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208929" comment="php53-suhosin-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208930" comment="php53-sysvmsg-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208931" comment="php53-sysvsem-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208932" comment="php53-sysvshm-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208933" comment="php53-tokenizer-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208934" comment="php53-wddx-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208935" comment="php53-xmlreader-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208936" comment="php53-xmlrpc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208937" comment="php53-xmlwriter-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208938" comment="php53-xsl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208939" comment="php53-zip-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208940" comment="php53-zlib-5.3.17-71 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5095</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-5095" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5095" source="CVE"/>
    <description>
    Integer overflow in the php_escape_html_entities_ex function in ext/standard/html.c in PHP before 5.5.36 and 5.6.x before 5.6.22 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering a large output string from a FILTER_SANITIZE_FULL_SPECIAL_CHARS filter_var call.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-5094.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5095.html">CVE-2016-5095</cve>
<bugzilla href="https://bugzilla.suse.com/982011">SUSE bug 982011</bugzilla>
<bugzilla href="https://bugzilla.suse.com/982012">SUSE bug 982012</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208897" comment="apache2-mod_php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203264" comment="php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208898" comment="php53-bcmath-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208899" comment="php53-bz2-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208900" comment="php53-calendar-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208901" comment="php53-ctype-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208902" comment="php53-curl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208903" comment="php53-dba-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208904" comment="php53-dom-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208905" comment="php53-exif-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208906" comment="php53-fastcgi-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208907" comment="php53-fileinfo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208908" comment="php53-ftp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208909" comment="php53-gd-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208910" comment="php53-gettext-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208911" comment="php53-gmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208912" comment="php53-iconv-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208913" comment="php53-intl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208914" comment="php53-json-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208915" comment="php53-ldap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208916" comment="php53-mbstring-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208917" comment="php53-mcrypt-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208918" comment="php53-mysql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208919" comment="php53-odbc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208920" comment="php53-openssl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208921" comment="php53-pcntl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208922" comment="php53-pdo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208923" comment="php53-pear-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208924" comment="php53-pgsql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208925" comment="php53-pspell-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208926" comment="php53-shmop-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208927" comment="php53-snmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208928" comment="php53-soap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208929" comment="php53-suhosin-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208930" comment="php53-sysvmsg-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208931" comment="php53-sysvsem-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208932" comment="php53-sysvshm-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208933" comment="php53-tokenizer-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208934" comment="php53-wddx-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208935" comment="php53-xmlreader-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208936" comment="php53-xmlrpc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208937" comment="php53-xmlwriter-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208938" comment="php53-xsl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208939" comment="php53-zip-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208940" comment="php53-zlib-5.3.17-71 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5096</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-5096" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5096" source="CVE"/>
    <description>
    Integer overflow in the fread function in ext/standard/file.c in PHP before 5.5.36 and 5.6.x before 5.6.22 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a large integer in the second argument.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5096.html">CVE-2016-5096</cve>
<bugzilla href="https://bugzilla.suse.com/982013">SUSE bug 982013</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208897" comment="apache2-mod_php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203264" comment="php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208898" comment="php53-bcmath-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208899" comment="php53-bz2-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208900" comment="php53-calendar-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208901" comment="php53-ctype-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208902" comment="php53-curl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208903" comment="php53-dba-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208904" comment="php53-dom-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208905" comment="php53-exif-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208906" comment="php53-fastcgi-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208907" comment="php53-fileinfo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208908" comment="php53-ftp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208909" comment="php53-gd-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208910" comment="php53-gettext-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208911" comment="php53-gmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208912" comment="php53-iconv-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208913" comment="php53-intl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208914" comment="php53-json-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208915" comment="php53-ldap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208916" comment="php53-mbstring-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208917" comment="php53-mcrypt-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208918" comment="php53-mysql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208919" comment="php53-odbc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208920" comment="php53-openssl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208921" comment="php53-pcntl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208922" comment="php53-pdo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208923" comment="php53-pear-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208924" comment="php53-pgsql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208925" comment="php53-pspell-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208926" comment="php53-shmop-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208927" comment="php53-snmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208928" comment="php53-soap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208929" comment="php53-suhosin-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208930" comment="php53-sysvmsg-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208931" comment="php53-sysvsem-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208932" comment="php53-sysvshm-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208933" comment="php53-tokenizer-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208934" comment="php53-wddx-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208935" comment="php53-xmlreader-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208936" comment="php53-xmlrpc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208937" comment="php53-xmlwriter-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208938" comment="php53-xsl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208939" comment="php53-zip-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208940" comment="php53-zlib-5.3.17-71 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5102</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5102" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5102" source="CVE"/>
    <description>
    Buffer overflow in the readgifimage function in gif2tiff.c in the gif2tiff tool in LibTIFF 4.0.6 allows remote attackers to cause a denial of service (segmentation fault) via a crafted gif file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5102.html">CVE-2016-5102</cve>
<bugzilla href="https://bugzilla.suse.com/983268">SUSE bug 983268</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009246748" comment="libtiff3-3.8.2-141.169.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246752" comment="libtiff3-32bit-3.8.2-141.169.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246742" comment="tiff-3.8.2-141.169.31 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5105</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5105" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5105" source="CVE"/>
    <description>
    The megasas_dcmd_cfg_read function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, uses an uninitialized variable, which allows local guest administrators to read host memory via vectors involving a MegaRAID Firmware Interface (MFI) command.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5105.html">CVE-2016-5105</cve>
<bugzilla href="https://bugzilla.suse.com/982017">SUSE bug 982017</bugzilla>
<bugzilla href="https://bugzilla.suse.com/982024">SUSE bug 982024</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250394" comment="kvm-1.4.2-49 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5106</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5106" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5106" source="CVE"/>
    <description>
    The megasas_dcmd_set_properties function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest administrators to cause a denial of service (out-of-bounds write access) via vectors involving a MegaRAID Firmware Interface (MFI) command.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5106.html">CVE-2016-5106</cve>
<bugzilla href="https://bugzilla.suse.com/982018">SUSE bug 982018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/982025">SUSE bug 982025</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250394" comment="kvm-1.4.2-49 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5107</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5107" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5107" source="CVE"/>
    <description>
    The megasas_lookup_frame function in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds read and crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5107.html">CVE-2016-5107</cve>
<bugzilla href="https://bugzilla.suse.com/982019">SUSE bug 982019</bugzilla>
<bugzilla href="https://bugzilla.suse.com/982026">SUSE bug 982026</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250394" comment="kvm-1.4.2-49 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5114</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-5114" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5114" source="CVE"/>
    <description>
    sapi/fpm/fpm/fpm_log.c in PHP before 5.5.31, 5.6.x before 5.6.17, and 7.x before 7.0.2 misinterprets the semantics of the snprintf return value, which allows attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read and buffer overflow) via a long string, as demonstrated by a long URI in a configuration with custom REQUEST_URI logging.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5114.html">CVE-2016-5114</cve>
<bugzilla href="https://bugzilla.suse.com/982162">SUSE bug 982162</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208897" comment="apache2-mod_php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203264" comment="php53-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208898" comment="php53-bcmath-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208899" comment="php53-bz2-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208900" comment="php53-calendar-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208901" comment="php53-ctype-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208902" comment="php53-curl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208903" comment="php53-dba-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208904" comment="php53-dom-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208905" comment="php53-exif-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208906" comment="php53-fastcgi-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208907" comment="php53-fileinfo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208908" comment="php53-ftp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208909" comment="php53-gd-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208910" comment="php53-gettext-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208911" comment="php53-gmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208912" comment="php53-iconv-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208913" comment="php53-intl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208914" comment="php53-json-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208915" comment="php53-ldap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208916" comment="php53-mbstring-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208917" comment="php53-mcrypt-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208918" comment="php53-mysql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208919" comment="php53-odbc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208920" comment="php53-openssl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208921" comment="php53-pcntl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208922" comment="php53-pdo-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208923" comment="php53-pear-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208924" comment="php53-pgsql-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208925" comment="php53-pspell-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208926" comment="php53-shmop-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208927" comment="php53-snmp-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208928" comment="php53-soap-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208929" comment="php53-suhosin-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208930" comment="php53-sysvmsg-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208931" comment="php53-sysvsem-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208932" comment="php53-sysvshm-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208933" comment="php53-tokenizer-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208934" comment="php53-wddx-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208935" comment="php53-xmlreader-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208936" comment="php53-xmlrpc-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208937" comment="php53-xmlwriter-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208938" comment="php53-xsl-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208939" comment="php53-zip-5.3.17-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208940" comment="php53-zlib-5.3.17-71 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5118</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-5118" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5118" source="CVE"/>
    <description>
    The OpenBlob function in blob.c in GraphicsMagick before 1.3.24 and ImageMagick allows remote attackers to execute arbitrary code via a | (pipe) character at the start of a filename.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5118.html">CVE-2016-5118</cve>
<bugzilla href="https://bugzilla.suse.com/982178">SUSE bug 982178</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202206" comment="ImageMagick-6.4.3.6-7.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207518" comment="libMagickCore1-6.4.3.6-7.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207519" comment="libMagickCore1-32bit-6.4.3.6-7.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5126" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5126" source="CVE"/>
    <description>
    Heap-based buffer overflow in the iscsi_aio_ioctl function in block/iscsi.c in QEMU allows local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5126.html">CVE-2016-5126</cve>
<bugzilla href="https://bugzilla.suse.com/982285">SUSE bug 982285</bugzilla>
<bugzilla href="https://bugzilla.suse.com/982286">SUSE bug 982286</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250394" comment="kvm-1.4.2-49 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5131</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5131" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131" source="CVE"/>
    <description>
    Use-after-free vulnerability in libxml2 through 2.9.4, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the XPointer range-to function.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5131.html">CVE-2016-5131</cve>
<bugzilla href="https://bugzilla.suse.com/1014873">SUSE bug 1014873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1069433">SUSE bug 1069433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1078813">SUSE bug 1078813</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/989901">SUSE bug 989901</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203110" comment="libxml2-2.7.6-0.77.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209985" comment="libxml2-32bit-2.7.6-0.77.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209986" comment="libxml2-doc-2.7.6-0.77.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209987" comment="libxml2-python-2.7.6-0.77.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5180</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5180" source="CVE"/>
    <description>
    Heap-based buffer overflow in the ares_create_query function in c-ares 1.x before 1.12.0 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly execute arbitrary code via a hostname with an escaped trailing dot.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5180.html">CVE-2016-5180</cve>
<bugzilla href="https://bugzilla.suse.com/1007728">SUSE bug 1007728</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202822" comment="libcares2-1.7.4-7.9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5195</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-5195" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5195" source="CVE"/>
    <description>
    Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5195.html">CVE-2016-5195</cve>
<bugzilla href="https://bugzilla.suse.com/1004418">SUSE bug 1004418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1004419">SUSE bug 1004419</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1004436">SUSE bug 1004436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1006323">SUSE bug 1006323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1006695">SUSE bug 1006695</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1008110">SUSE bug 1008110</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1030118">SUSE bug 1030118</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1069496">SUSE bug 1069496</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1149725">SUSE bug 1149725</bugzilla>
<bugzilla href="https://bugzilla.suse.com/870618">SUSE bug 870618</bugzilla>
<bugzilla href="https://bugzilla.suse.com/986445">SUSE bug 986445</bugzilla>
<bugzilla href="https://bugzilla.suse.com/987565">SUSE bug 987565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/998689">SUSE bug 998689</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208687" comment="kernel-bigsmp-3.0.101-0.47.90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208688" comment="kernel-bigsmp-base-3.0.101-0.47.90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208689" comment="kernel-bigsmp-devel-3.0.101-0.47.90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205575" comment="kernel-default-3.0.101-0.47.90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205576" comment="kernel-default-base-3.0.101-0.47.90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205577" comment="kernel-default-devel-3.0.101-0.47.90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205578" comment="kernel-ec2-3.0.101-0.47.90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205579" comment="kernel-ec2-base-3.0.101-0.47.90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205580" comment="kernel-ec2-devel-3.0.101-0.47.90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205584" comment="kernel-source-3.0.101-0.47.90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205585" comment="kernel-syms-3.0.101-0.47.90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205586" comment="kernel-trace-3.0.101-0.47.90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205587" comment="kernel-trace-base-3.0.101-0.47.90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205588" comment="kernel-trace-devel-3.0.101-0.47.90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205589" comment="kernel-xen-3.0.101-0.47.90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205590" comment="kernel-xen-base-3.0.101-0.47.90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205591" comment="kernel-xen-devel-3.0.101-0.47.90 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208687" comment="kernel-bigsmp-3.0.101-0.47.90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208688" comment="kernel-bigsmp-base-3.0.101-0.47.90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208689" comment="kernel-bigsmp-devel-3.0.101-0.47.90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205575" comment="kernel-default-3.0.101-0.47.90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205576" comment="kernel-default-base-3.0.101-0.47.90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205577" comment="kernel-default-devel-3.0.101-0.47.90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208690" comment="kernel-default-man-3.0.101-0.47.90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205578" comment="kernel-ec2-3.0.101-0.47.90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205579" comment="kernel-ec2-base-3.0.101-0.47.90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205580" comment="kernel-ec2-devel-3.0.101-0.47.90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205581" comment="kernel-pae-3.0.101-0.47.90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205582" comment="kernel-pae-base-3.0.101-0.47.90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205583" comment="kernel-pae-devel-3.0.101-0.47.90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205584" comment="kernel-source-3.0.101-0.47.90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205585" comment="kernel-syms-3.0.101-0.47.90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205586" comment="kernel-trace-3.0.101-0.47.90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205587" comment="kernel-trace-base-3.0.101-0.47.90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205588" comment="kernel-trace-devel-3.0.101-0.47.90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205589" comment="kernel-xen-3.0.101-0.47.90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205590" comment="kernel-xen-base-3.0.101-0.47.90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205591" comment="kernel-xen-devel-3.0.101-0.47.90 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5238</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-5238" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5238" source="CVE"/>
    <description>
    The get_cmd function in hw/scsi/esp.c in QEMU might allow local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5238.html">CVE-2016-5238</cve>
<bugzilla href="https://bugzilla.suse.com/982959">SUSE bug 982959</bugzilla>
<bugzilla href="https://bugzilla.suse.com/982960">SUSE bug 982960</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205947" comment="xen-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209054" comment="xen-doc-html-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209055" comment="xen-doc-pdf-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205948" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205949" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205950" comment="xen-libs-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209056" comment="xen-libs-32bit-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209057" comment="xen-tools-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205951" comment="xen-tools-domU-4.2.5_21-27 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205947" comment="xen-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209054" comment="xen-doc-html-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209055" comment="xen-doc-pdf-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205948" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205950" comment="xen-libs-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209056" comment="xen-libs-32bit-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209057" comment="xen-tools-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205951" comment="xen-tools-domU-4.2.5_21-27 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250394" comment="kvm-1.4.2-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5243</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5243" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5243" source="CVE"/>
    <description>
    The tipc_nl_compat_link_dump function in net/tipc/netlink_compat.c in the Linux kernel through 4.6.3 does not properly copy a certain string, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5243.html">CVE-2016-5243</cve>
<bugzilla href="https://bugzilla.suse.com/983212">SUSE bug 983212</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208691" comment="kernel-bigsmp-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208692" comment="kernel-bigsmp-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208693" comment="kernel-bigsmp-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205592" comment="kernel-default-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205593" comment="kernel-default-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205594" comment="kernel-default-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208694" comment="kernel-default-man-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205595" comment="kernel-ec2-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205596" comment="kernel-ec2-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205597" comment="kernel-ec2-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205598" comment="kernel-pae-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205599" comment="kernel-pae-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205600" comment="kernel-pae-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205601" comment="kernel-source-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205602" comment="kernel-syms-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205603" comment="kernel-trace-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205604" comment="kernel-trace-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205605" comment="kernel-trace-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205606" comment="kernel-xen-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205607" comment="kernel-xen-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205608" comment="kernel-xen-devel-3.0.101-0.47.106.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5244</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-5244" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5244" source="CVE"/>
    <description>
    The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel through 4.6.3 does not initialize a certain structure member, which allows remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5244.html">CVE-2016-5244</cve>
<bugzilla href="https://bugzilla.suse.com/983213">SUSE bug 983213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/990058">SUSE bug 990058</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208598" comment="kernel-bigsmp-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208599" comment="kernel-bigsmp-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208600" comment="kernel-bigsmp-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205422" comment="kernel-default-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205423" comment="kernel-default-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205424" comment="kernel-default-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205425" comment="kernel-ec2-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205426" comment="kernel-ec2-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205427" comment="kernel-ec2-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205431" comment="kernel-source-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205432" comment="kernel-syms-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205433" comment="kernel-trace-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205434" comment="kernel-trace-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205435" comment="kernel-trace-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205436" comment="kernel-xen-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205437" comment="kernel-xen-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205438" comment="kernel-xen-devel-3.0.101-0.47.86 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208598" comment="kernel-bigsmp-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208599" comment="kernel-bigsmp-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208600" comment="kernel-bigsmp-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205422" comment="kernel-default-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205423" comment="kernel-default-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205424" comment="kernel-default-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208601" comment="kernel-default-man-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205425" comment="kernel-ec2-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205426" comment="kernel-ec2-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205427" comment="kernel-ec2-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205428" comment="kernel-pae-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205429" comment="kernel-pae-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205430" comment="kernel-pae-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205431" comment="kernel-source-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205432" comment="kernel-syms-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205433" comment="kernel-trace-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205434" comment="kernel-trace-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205435" comment="kernel-trace-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205436" comment="kernel-xen-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205437" comment="kernel-xen-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205438" comment="kernel-xen-devel-3.0.101-0.47.86 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5250</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-5250" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5250" source="CVE"/>
    <description>
    Mozilla Firefox before 48.0, Firefox ESR &lt; 45.4 and Thunderbird &lt; 45.4 allow remote attackers to obtain sensitive information about the previously retrieved page via Resource Timing API calls.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5250.html">CVE-2016-5250</cve>
<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202347" comment="MozillaFirefox-45.4.0esr-53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205241" comment="MozillaFirefox-translations-45.4.0esr-53 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5252</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-5252" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5252" source="CVE"/>
    <description>
    Stack-based buffer underflow in the mozilla::gfx::BasePoint4d function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code via crafted two-dimensional graphics data that is mishandled during clipping-region calculations.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5252.html">CVE-2016-5252</cve>
<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202345" comment="MozillaFirefox-45.3.0esr-50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205240" comment="MozillaFirefox-translations-45.3.0esr-50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5254</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-5254" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5254" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsXULPopupManager::KeyDown function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows attackers to execute arbitrary code or cause a denial of service (heap memory corruption and application crash) by leveraging keyboard access to use the Alt key during selection of top-level menu items.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5254.html">CVE-2016-5254</cve>
<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202345" comment="MozillaFirefox-45.3.0esr-50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205240" comment="MozillaFirefox-translations-45.3.0esr-50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165257" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5257</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-5257" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5257" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4 and Thunderbird &lt; 45.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5257.html">CVE-2016-5257</cve>
<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202347" comment="MozillaFirefox-45.4.0esr-53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205241" comment="MozillaFirefox-translations-45.4.0esr-53 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5258</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-5258" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5258" source="CVE"/>
    <description>
    Use-after-free vulnerability in the WebRTC socket thread in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code by leveraging incorrect free operations on DTLS objects during the shutdown of a WebRTC session.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5258.html">CVE-2016-5258</cve>
<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202345" comment="MozillaFirefox-45.3.0esr-50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205240" comment="MozillaFirefox-translations-45.3.0esr-50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165259" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5259</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-5259" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5259" source="CVE"/>
    <description>
    Use-after-free vulnerability in the CanonicalizeXPCOMParticipant function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code via a script that closes its own Service Worker within a nested sync event loop.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5259.html">CVE-2016-5259</cve>
<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202345" comment="MozillaFirefox-45.3.0esr-50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205240" comment="MozillaFirefox-translations-45.3.0esr-50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5261</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-5261" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5261" source="CVE"/>
    <description>
    Integer overflow in the WebSocketChannel class in the WebSockets subsystem in Mozilla Firefox before 48.0 and Firefox ESR &lt; 45.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted packets that trigger incorrect buffer-resize operations during buffering.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5261.html">CVE-2016-5261</cve>
<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202347" comment="MozillaFirefox-45.4.0esr-53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205241" comment="MozillaFirefox-translations-45.4.0esr-53 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5262</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-5262" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5262" source="CVE"/>
    <description>
    Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 process JavaScript event-handler attributes of a MARQUEE element within a sandboxed IFRAME element that lacks the sandbox="allow-scripts" attribute value, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5262.html">CVE-2016-5262</cve>
<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202345" comment="MozillaFirefox-45.3.0esr-50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205240" comment="MozillaFirefox-translations-45.3.0esr-50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5263</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-5263" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5263" source="CVE"/>
    <description>
    The nsDisplayList::HitTest function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 mishandles rendering display transformation, which allows remote attackers to execute arbitrary code via a crafted web site that leverages "type confusion."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5263.html">CVE-2016-5263</cve>
<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202345" comment="MozillaFirefox-45.3.0esr-50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205240" comment="MozillaFirefox-translations-45.3.0esr-50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5264</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-5264" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5264" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsNodeUtils::NativeAnonymousChildListChange function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via an SVG element that is mishandled during effect application.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5264.html">CVE-2016-5264</cve>
<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202345" comment="MozillaFirefox-45.3.0esr-50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205240" comment="MozillaFirefox-translations-45.3.0esr-50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5265</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-5265" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5265" source="CVE"/>
    <description>
    Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allow user-assisted remote attackers to bypass the Same Origin Policy, and conduct Universal XSS (UXSS) attacks or read arbitrary files, by arranging for the presence of a crafted HTML document and a crafted shortcut file in the same local directory.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5265.html">CVE-2016-5265</cve>
<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202345" comment="MozillaFirefox-45.3.0esr-50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205240" comment="MozillaFirefox-translations-45.3.0esr-50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5270</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-5270" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5270" source="CVE"/>
    <description>
    Heap-based buffer overflow in the nsCaseTransformTextRunFactory::TransformString function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 allows remote attackers to cause a denial of service (boolean out-of-bounds write) or possibly have unspecified other impact via Unicode characters that are mishandled during text conversion.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5270.html">CVE-2016-5270</cve>
<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202347" comment="MozillaFirefox-45.4.0esr-53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205241" comment="MozillaFirefox-translations-45.4.0esr-53 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5272</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-5272" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5272" source="CVE"/>
    <description>
    The nsImageGeometryMixin class in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 does not properly perform a cast of an unspecified variable during handling of INPUT elements, which allows remote attackers to execute arbitrary code via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5272.html">CVE-2016-5272</cve>
<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202347" comment="MozillaFirefox-45.4.0esr-53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205241" comment="MozillaFirefox-translations-45.4.0esr-53 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5274</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-5274" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5274" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsFrameManager::CaptureFrameState function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 allows remote attackers to execute arbitrary code by leveraging improper interaction between restyling and the Web Animations model implementation.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5274.html">CVE-2016-5274</cve>
<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202347" comment="MozillaFirefox-45.4.0esr-53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205241" comment="MozillaFirefox-translations-45.4.0esr-53 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165276" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5276</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-5276" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5276" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozilla::a11y::DocAccessible::ProcessInvalidationList function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via an aria-owns attribute.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5276.html">CVE-2016-5276</cve>
<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202347" comment="MozillaFirefox-45.4.0esr-53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205241" comment="MozillaFirefox-translations-45.4.0esr-53 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5277</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-5277" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5277" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsRefreshDriver::Tick function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by leveraging improper interaction between timeline destruction and the Web Animations model implementation.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5277.html">CVE-2016-5277</cve>
<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202347" comment="MozillaFirefox-45.4.0esr-53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205241" comment="MozillaFirefox-translations-45.4.0esr-53 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5278</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-5278" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5278" source="CVE"/>
    <description>
    Heap-based buffer overflow in the nsBMPEncoder::AddImageFrame function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 allows remote attackers to execute arbitrary code via a crafted image data that is mishandled during the encoding of an image frame to an image.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5278.html">CVE-2016-5278</cve>
<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202347" comment="MozillaFirefox-45.4.0esr-53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205241" comment="MozillaFirefox-translations-45.4.0esr-53 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165280" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5280</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-5280" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5280" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozilla::nsTextNodeDirectionalityMap::RemoveElementFromMap function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 allows remote attackers to execute arbitrary code via bidirectional text.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5280.html">CVE-2016-5280</cve>
<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202347" comment="MozillaFirefox-45.4.0esr-53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205241" comment="MozillaFirefox-translations-45.4.0esr-53 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5281</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-5281" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5281" source="CVE"/>
    <description>
    Use-after-free vulnerability in the DOMSVGLength class in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 allows remote attackers to execute arbitrary code by leveraging improper interaction between JavaScript code and an SVG document.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5281.html">CVE-2016-5281</cve>
<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202347" comment="MozillaFirefox-45.4.0esr-53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205241" comment="MozillaFirefox-translations-45.4.0esr-53 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5284</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-5284" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5284" source="CVE"/>
    <description>
    Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 rely on unintended expiration dates for Preloaded Public Key Pinning, which allows man-in-the-middle attackers to spoof add-on updates by leveraging possession of an X.509 server certificate for addons.mozilla.org signed by an arbitrary built-in Certification Authority.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5284.html">CVE-2016-5284</cve>
<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202347" comment="MozillaFirefox-45.4.0esr-53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205241" comment="MozillaFirefox-translations-45.4.0esr-53 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5285</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-5285" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5285" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5285.html">CVE-2016-5285</cve>
<bugzilla href="https://bugzilla.suse.com/1010517">SUSE bug 1010517</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203135" comment="MozillaFirefox-45.5.1esr-59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205661" comment="MozillaFirefox-translations-45.5.1esr-59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205662" comment="libfreebl3-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208771" comment="libfreebl3-32bit-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205663" comment="libsoftokn3-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208772" comment="libsoftokn3-32bit-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203137" comment="mozilla-nss-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208773" comment="mozilla-nss-32bit-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205664" comment="mozilla-nss-tools-3.21.3-39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5290</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-5290" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5290" source="CVE"/>
    <description>
    Memory safety bugs were reported in Firefox 49 and Firefox ESR 45.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 45.5, Firefox ESR &lt; 45.5, and Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5290.html">CVE-2016-5290</cve>
<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1010427">SUSE bug 1010427</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203135" comment="MozillaFirefox-45.5.1esr-59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205661" comment="MozillaFirefox-translations-45.5.1esr-59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205662" comment="libfreebl3-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208771" comment="libfreebl3-32bit-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205663" comment="libsoftokn3-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208772" comment="libsoftokn3-32bit-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203137" comment="mozilla-nss-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208773" comment="mozilla-nss-32bit-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205664" comment="mozilla-nss-tools-3.21.3-39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5291</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-5291" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5291" source="CVE"/>
    <description>
    A same-origin policy bypass with local shortcut files to load arbitrary local content from disk. This vulnerability affects Thunderbird &lt; 45.5, Firefox ESR &lt; 45.5, and Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5291.html">CVE-2016-5291</cve>
<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1010410">SUSE bug 1010410</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203135" comment="MozillaFirefox-45.5.1esr-59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205661" comment="MozillaFirefox-translations-45.5.1esr-59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205662" comment="libfreebl3-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208771" comment="libfreebl3-32bit-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205663" comment="libsoftokn3-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208772" comment="libsoftokn3-32bit-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203137" comment="mozilla-nss-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208773" comment="mozilla-nss-32bit-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205664" comment="mozilla-nss-tools-3.21.3-39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5296</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-5296" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5296" source="CVE"/>
    <description>
    A heap-buffer-overflow in Cairo when processing SVG content caused by compiler optimization, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 45.5, Firefox ESR &lt; 45.5, and Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5296.html">CVE-2016-5296</cve>
<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1010395">SUSE bug 1010395</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203135" comment="MozillaFirefox-45.5.1esr-59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205661" comment="MozillaFirefox-translations-45.5.1esr-59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205662" comment="libfreebl3-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208771" comment="libfreebl3-32bit-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205663" comment="libsoftokn3-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208772" comment="libsoftokn3-32bit-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203137" comment="mozilla-nss-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208773" comment="mozilla-nss-32bit-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205664" comment="mozilla-nss-tools-3.21.3-39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5297</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-5297" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5297" source="CVE"/>
    <description>
    An error in argument length checking in JavaScript, leading to potential integer overflows or other bounds checking issues. This vulnerability affects Thunderbird &lt; 45.5, Firefox ESR &lt; 45.5, and Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5297.html">CVE-2016-5297</cve>
<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1010401">SUSE bug 1010401</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203135" comment="MozillaFirefox-45.5.1esr-59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205661" comment="MozillaFirefox-translations-45.5.1esr-59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205662" comment="libfreebl3-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208771" comment="libfreebl3-32bit-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205663" comment="libsoftokn3-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208772" comment="libsoftokn3-32bit-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203137" comment="mozilla-nss-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208773" comment="mozilla-nss-32bit-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205664" comment="mozilla-nss-tools-3.21.3-39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5300</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5300" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5300" source="CVE"/>
    <description>
    The XML parser in Expat does not use sufficient entropy for hash initialization, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted identifiers in an XML document.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0876.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5300.html">CVE-2016-5300</cve>
<bugzilla href="https://bugzilla.suse.com/983216">SUSE bug 983216</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202511" comment="expat-2.0.1-88.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209230" comment="libexpat1-2.0.1-88.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209231" comment="libexpat1-32bit-2.0.1-88.41 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5314</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5314" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314" source="CVE"/>
    <description>
    Buffer overflow in the PixarLogDecode function in tif_pixarlog.c in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by overwriting the vgetparent function pointer with rgb2ycbcr.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5314.html">CVE-2016-5314</cve>
<bugzilla href="https://bugzilla.suse.com/984831">SUSE bug 984831</bugzilla>
<bugzilla href="https://bugzilla.suse.com/987351">SUSE bug 987351</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210831" comment="libtiff3-3.8.2-141.169.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210832" comment="libtiff3-32bit-3.8.2-141.169.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203579" comment="tiff-3.8.2-141.169.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165315" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5315</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5315" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315" source="CVE"/>
    <description>
    The setByteArray function in tif_dir.c in libtiff 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted tiff image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5315.html">CVE-2016-5315</cve>
<bugzilla href="https://bugzilla.suse.com/984809">SUSE bug 984809</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210831" comment="libtiff3-3.8.2-141.169.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210832" comment="libtiff3-32bit-3.8.2-141.169.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203579" comment="tiff-3.8.2-141.169.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5316</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5316" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316" source="CVE"/>
    <description>
    Out-of-bounds read in the PixarLogCleanup function in tif_pixarlog.c in libtiff 4.0.6 and earlier allows remote attackers to crash the application by sending a crafted TIFF image to the rgb2ycbcr tool.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5316.html">CVE-2016-5316</cve>
<bugzilla href="https://bugzilla.suse.com/984837">SUSE bug 984837</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210825" comment="libtiff3-3.8.2-141.168 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210826" comment="libtiff3-32bit-3.8.2-141.168 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203573" comment="tiff-3.8.2-141.168 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5317</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5317" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317" source="CVE"/>
    <description>
    Buffer overflow in the PixarLogDecode function in libtiff.so in the PixarLogDecode function in libtiff 4.0.6 and earlier, as used in GNOME nautilus, allows attackers to cause a denial of service attack (crash) via a crafted TIFF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5317.html">CVE-2016-5317</cve>
<bugzilla href="https://bugzilla.suse.com/984842">SUSE bug 984842</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210825" comment="libtiff3-3.8.2-141.168 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210826" comment="libtiff3-32bit-3.8.2-141.168 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203573" comment="tiff-3.8.2-141.168 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5318</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5318" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5318" source="CVE"/>
    <description>
    Stack-based buffer overflow in the _TIFFVGetField function in libtiff 4.0.6 and earlier allows remote attackers to crash the application via a crafted tiff.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5318.html">CVE-2016-5318</cve>
<bugzilla href="https://bugzilla.suse.com/1007276">SUSE bug 1007276</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1017690">SUSE bug 1017690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1040322">SUSE bug 1040322</bugzilla>
<bugzilla href="https://bugzilla.suse.com/960341">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/974621">SUSE bug 974621</bugzilla>
<bugzilla href="https://bugzilla.suse.com/983436">SUSE bug 983436</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009229551" comment="libtiff3-3.8.2-141.169.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229568" comment="libtiff3-32bit-3.8.2-141.169.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229522" comment="tiff-3.8.2-141.169.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5319</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5319" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5319" source="CVE"/>
    <description>
    Heap-based buffer overflow in tif_packbits.c in libtiff 4.0.6 and earlier allows remote attackers to crash the application via a crafted bmp file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5319.html">CVE-2016-5319</cve>
<bugzilla href="https://bugzilla.suse.com/1074186">SUSE bug 1074186</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1150480">SUSE bug 1150480</bugzilla>
<bugzilla href="https://bugzilla.suse.com/983440">SUSE bug 983440</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009240660" comment="libtiff3-3.8.2-141.169.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240661" comment="libtiff3-32bit-3.8.2-141.169.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240659" comment="tiff-3.8.2-141.169.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165320" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5320</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5320" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5320" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2016-5314.  Reason: This candidate is a reservation duplicate of CVE-2016-5314.  Notes: All CVE users should reference CVE-2016-5314 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5320.html">CVE-2016-5320</cve>
<bugzilla href="https://bugzilla.suse.com/1007284">SUSE bug 1007284</bugzilla>
<bugzilla href="https://bugzilla.suse.com/984808">SUSE bug 984808</bugzilla>
<bugzilla href="https://bugzilla.suse.com/987351">SUSE bug 987351</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210825" comment="libtiff3-3.8.2-141.168 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210826" comment="libtiff3-32bit-3.8.2-141.168 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203573" comment="tiff-3.8.2-141.168 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5337</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5337" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5337" source="CVE"/>
    <description>
    The megasas_ctrl_get_info function in hw/scsi/megasas.c in QEMU allows local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5337.html">CVE-2016-5337</cve>
<bugzilla href="https://bugzilla.suse.com/983961">SUSE bug 983961</bugzilla>
<bugzilla href="https://bugzilla.suse.com/983973">SUSE bug 983973</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250394" comment="kvm-1.4.2-49 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5338</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-5338" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5338" source="CVE"/>
    <description>
    The (1) esp_reg_read and (2) esp_reg_write functions in hw/scsi/esp.c in QEMU allow local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the QEMU host via vectors related to the information transfer buffer.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5338.html">CVE-2016-5338</cve>
<bugzilla href="https://bugzilla.suse.com/983982">SUSE bug 983982</bugzilla>
<bugzilla href="https://bugzilla.suse.com/983984">SUSE bug 983984</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205947" comment="xen-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209054" comment="xen-doc-html-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209055" comment="xen-doc-pdf-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205948" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205949" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205950" comment="xen-libs-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209056" comment="xen-libs-32bit-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209057" comment="xen-tools-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205951" comment="xen-tools-domU-4.2.5_21-27 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205947" comment="xen-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209054" comment="xen-doc-html-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209055" comment="xen-doc-pdf-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205948" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205950" comment="xen-libs-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209056" comment="xen-libs-32bit-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209057" comment="xen-tools-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205951" comment="xen-tools-domU-4.2.5_21-27 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250394" comment="kvm-1.4.2-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5350</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5350" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5350" source="CVE"/>
    <description>
    epan/dissectors/packet-dcerpc-spoolss.c in the SPOOLS component in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles unexpected offsets, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5350.html">CVE-2016-5350</cve>
<bugzilla href="https://bugzilla.suse.com/983671">SUSE bug 983671</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203584" comment="wireshark-1.12.13-0.23 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5351</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5351" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5351" source="CVE"/>
    <description>
    epan/crypt/airpdcap.c in the IEEE 802.11 dissector in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles the lack of an EAPOL_RSN_KEY, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5351.html">CVE-2016-5351</cve>
<bugzilla href="https://bugzilla.suse.com/983671">SUSE bug 983671</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203584" comment="wireshark-1.12.13-0.23 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5352</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5352" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5352" source="CVE"/>
    <description>
    epan/crypt/airpdcap.c in the IEEE 802.11 dissector in Wireshark 2.x before 2.0.4 mishandles certain length values, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5352.html">CVE-2016-5352</cve>
<bugzilla href="https://bugzilla.suse.com/983671">SUSE bug 983671</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203584" comment="wireshark-1.12.13-0.23 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5353</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5353" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5353" source="CVE"/>
    <description>
    epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles the reserved C/T value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5353.html">CVE-2016-5353</cve>
<bugzilla href="https://bugzilla.suse.com/983671">SUSE bug 983671</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203584" comment="wireshark-1.12.13-0.23 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5354</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5354" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5354" source="CVE"/>
    <description>
    The USB subsystem in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles class types, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5354.html">CVE-2016-5354</cve>
<bugzilla href="https://bugzilla.suse.com/983671">SUSE bug 983671</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203584" comment="wireshark-1.12.13-0.23 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5355</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5355" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5355" source="CVE"/>
    <description>
    wiretap/toshiba.c in the Toshiba file parser in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles sscanf unsigned-integer processing, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5355.html">CVE-2016-5355</cve>
<bugzilla href="https://bugzilla.suse.com/983671">SUSE bug 983671</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203584" comment="wireshark-1.12.13-0.23 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5356</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5356" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5356" source="CVE"/>
    <description>
    wiretap/cosine.c in the CoSine file parser in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles sscanf unsigned-integer processing, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5356.html">CVE-2016-5356</cve>
<bugzilla href="https://bugzilla.suse.com/983671">SUSE bug 983671</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203584" comment="wireshark-1.12.13-0.23 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5357</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5357" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5357" source="CVE"/>
    <description>
    wiretap/netscreen.c in the NetScreen file parser in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles sscanf unsigned-integer processing, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5357.html">CVE-2016-5357</cve>
<bugzilla href="https://bugzilla.suse.com/983671">SUSE bug 983671</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203584" comment="wireshark-1.12.13-0.23 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5358</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5358" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5358" source="CVE"/>
    <description>
    epan/dissectors/packet-pktap.c in the Ethernet dissector in Wireshark 2.x before 2.0.4 mishandles the packet-header data type, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5358.html">CVE-2016-5358</cve>
<bugzilla href="https://bugzilla.suse.com/983671">SUSE bug 983671</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203584" comment="wireshark-1.12.13-0.23 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165359" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5359</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5359" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5359" source="CVE"/>
    <description>
    epan/dissectors/packet-wbxml.c in the WBXML dissector in Wireshark 1.12.x before 1.12.12 mishandles offsets, which allows remote attackers to cause a denial of service (integer overflow and infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5359.html">CVE-2016-5359</cve>
<bugzilla href="https://bugzilla.suse.com/983671">SUSE bug 983671</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203584" comment="wireshark-1.12.13-0.23 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5384</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5384" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5384" source="CVE"/>
    <description>
    fontconfig before 2.12.1 does not validate offsets, which allows local users to trigger arbitrary free calls and consequently conduct double free attacks and execute arbitrary code via a crafted cache file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5384.html">CVE-2016-5384</cve>
<bugzilla href="https://bugzilla.suse.com/1123116">SUSE bug 1123116</bugzilla>
<bugzilla href="https://bugzilla.suse.com/992534">SUSE bug 992534</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202519" comment="fontconfig-2.6.0-10.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209240" comment="fontconfig-32bit-2.6.0-10.19 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5387</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5387" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5387" source="CVE"/>
    <description>
    The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue.  NOTE: the vendor states "This mitigation has been assigned the identifier CVE-2016-5387"; in other words, this is not a CVE ID for a vulnerability.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5387.html">CVE-2016-5387</cve>
<bugzilla href="https://bugzilla.suse.com/988484">SUSE bug 988484</bugzilla>
<bugzilla href="https://bugzilla.suse.com/988486">SUSE bug 988486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/988487">SUSE bug 988487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/988488">SUSE bug 988488</bugzilla>
<bugzilla href="https://bugzilla.suse.com/988489">SUSE bug 988489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/988491">SUSE bug 988491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/988492">SUSE bug 988492</bugzilla>
<bugzilla href="https://bugzilla.suse.com/989125">SUSE bug 989125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/989174">SUSE bug 989174</bugzilla>
<bugzilla href="https://bugzilla.suse.com/989684">SUSE bug 989684</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202386" comment="apache2-2.2.12-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202388" comment="apache2-doc-2.2.12-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202389" comment="apache2-example-pages-2.2.12-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202390" comment="apache2-prefork-2.2.12-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202391" comment="apache2-utils-2.2.12-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202392" comment="apache2-worker-2.2.12-64 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5388</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5388" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5388" source="CVE"/>
    <description>
    Apache Tomcat 7.x through 7.0.70 and 8.x through 8.5.4, when the CGI Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "A mitigation is planned for future releases of Tomcat, tracked as CVE-2016-5388"; in other words, this is not a CVE ID for a vulnerability.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5388.html">CVE-2016-5388</cve>
<bugzilla href="https://bugzilla.suse.com/988484">SUSE bug 988484</bugzilla>
<bugzilla href="https://bugzilla.suse.com/988486">SUSE bug 988486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/988487">SUSE bug 988487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/988488">SUSE bug 988488</bugzilla>
<bugzilla href="https://bugzilla.suse.com/988489">SUSE bug 988489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/988491">SUSE bug 988491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/988492">SUSE bug 988492</bugzilla>
<bugzilla href="https://bugzilla.suse.com/989125">SUSE bug 989125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/989174">SUSE bug 989174</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205936" comment="tomcat6-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205937" comment="tomcat6-admin-webapps-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205938" comment="tomcat6-docs-webapp-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205939" comment="tomcat6-javadoc-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205940" comment="tomcat6-jsp-2_1-api-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205941" comment="tomcat6-lib-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205942" comment="tomcat6-servlet-2_5-api-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205943" comment="tomcat6-webapps-6.0.53-0.56 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165399" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5399</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5399" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5399" source="CVE"/>
    <description>
    The bzread function in ext/bz2/bz2.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via a crafted bz2 archive.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5399.html">CVE-2016-5399</cve>
<bugzilla href="https://bugzilla.suse.com/991430">SUSE bug 991430</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210312" comment="apache2-mod_php53-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203280" comment="php53-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210313" comment="php53-bcmath-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210314" comment="php53-bz2-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210315" comment="php53-calendar-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210316" comment="php53-ctype-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210317" comment="php53-curl-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210318" comment="php53-dba-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210319" comment="php53-dom-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210320" comment="php53-exif-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210321" comment="php53-fastcgi-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210322" comment="php53-fileinfo-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210323" comment="php53-ftp-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210324" comment="php53-gd-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210325" comment="php53-gettext-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210326" comment="php53-gmp-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210327" comment="php53-iconv-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210328" comment="php53-intl-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210329" comment="php53-json-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210330" comment="php53-ldap-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210331" comment="php53-mbstring-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210332" comment="php53-mcrypt-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210333" comment="php53-mysql-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210334" comment="php53-odbc-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210335" comment="php53-openssl-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210336" comment="php53-pcntl-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210337" comment="php53-pdo-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210338" comment="php53-pear-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210339" comment="php53-pgsql-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210340" comment="php53-pspell-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210341" comment="php53-shmop-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210342" comment="php53-snmp-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210343" comment="php53-soap-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210344" comment="php53-suhosin-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210345" comment="php53-sysvmsg-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210346" comment="php53-sysvsem-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210347" comment="php53-sysvshm-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210348" comment="php53-tokenizer-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210349" comment="php53-wddx-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210350" comment="php53-xmlreader-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210351" comment="php53-xmlrpc-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210352" comment="php53-xmlwriter-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210353" comment="php53-xsl-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210354" comment="php53-zip-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210355" comment="php53-zlib-5.3.17-79 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5403</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-5403" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5403" source="CVE"/>
    <description>
    The virtqueue_pop function in hw/virtio/virtio.c in QEMU allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by submitting requests without waiting for completion.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5403.html">CVE-2016-5403</cve>
<bugzilla href="https://bugzilla.suse.com/990923">SUSE bug 990923</bugzilla>
<bugzilla href="https://bugzilla.suse.com/991080">SUSE bug 991080</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205947" comment="xen-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209054" comment="xen-doc-html-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209055" comment="xen-doc-pdf-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205948" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205949" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205950" comment="xen-libs-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209056" comment="xen-libs-32bit-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209057" comment="xen-tools-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205951" comment="xen-tools-domU-4.2.5_21-27 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205947" comment="xen-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209054" comment="xen-doc-html-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209055" comment="xen-doc-pdf-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205948" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205950" comment="xen-libs-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209056" comment="xen-libs-32bit-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209057" comment="xen-tools-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205951" comment="xen-tools-domU-4.2.5_21-27 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250394" comment="kvm-1.4.2-49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5407</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5407" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5407" source="CVE"/>
    <description>
    The (1) XvQueryAdaptors and (2) XvQueryEncodings functions in X.org libXv before 1.0.11 allow remote X servers to trigger out-of-bounds memory access operations via vectors involving length specifications in received data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5407.html">CVE-2016-5407</cve>
<bugzilla href="https://bugzilla.suse.com/1003017">SUSE bug 1003017</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123148">SUSE bug 1123148</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203689" comment="xorg-x11-libXv-7.4-1.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210985" comment="xorg-x11-libXv-32bit-7.4-1.20 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5419</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-5419" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419" source="CVE"/>
    <description>
    curl and libcurl before 7.50.1 do not prevent TLS session resumption when the client certificate has changed, which allows remote attackers to bypass intended restrictions by resuming a session.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5419.html">CVE-2016-5419</cve>
<bugzilla href="https://bugzilla.suse.com/1033413">SUSE bug 1033413</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1033442">SUSE bug 1033442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/991389">SUSE bug 991389</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202477" comment="curl-7.19.7-1.61 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203709" comment="curl-openssl1-7.19.7-1.61 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205315" comment="libcurl4-7.19.7-1.61 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208454" comment="libcurl4-32bit-7.19.7-1.61 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203710" comment="libcurl4-openssl1-7.19.7-1.61 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203711" comment="libcurl4-openssl1-32bit-7.19.7-1.61 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202477" comment="curl-7.19.7-1.61 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205315" comment="libcurl4-7.19.7-1.61 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208454" comment="libcurl4-32bit-7.19.7-1.61 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5420</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-5420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420" source="CVE"/>
    <description>
    curl and libcurl before 7.50.1 do not check the client certificate when choosing the TLS connection to reuse, which might allow remote attackers to hijack the authentication of the connection by leveraging a previously created connection with a different client certificate.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5420.html">CVE-2016-5420</cve>
<bugzilla href="https://bugzilla.suse.com/991390">SUSE bug 991390</bugzilla>
<bugzilla href="https://bugzilla.suse.com/997420">SUSE bug 997420</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202477" comment="curl-7.19.7-1.61 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203709" comment="curl-openssl1-7.19.7-1.61 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205315" comment="libcurl4-7.19.7-1.61 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208454" comment="libcurl4-32bit-7.19.7-1.61 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203710" comment="libcurl4-openssl1-7.19.7-1.61 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203711" comment="libcurl4-openssl1-32bit-7.19.7-1.61 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202477" comment="curl-7.19.7-1.61 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205315" comment="libcurl4-7.19.7-1.61 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208454" comment="libcurl4-32bit-7.19.7-1.61 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5423" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5423" source="CVE"/>
    <description>
    PostgreSQL before 9.1.23, 9.2.x before 9.2.18, 9.3.x before 9.3.14, 9.4.x before 9.4.9, and 9.5.x before 9.5.4 allow remote authenticated users to cause a denial of service (NULL pointer dereference and server crash), obtain sensitive memory information, or possibly execute arbitrary code via (1) a CASE expression within the test value subexpression of another CASE or (2) inlining of an SQL function that implements the equality operator used for a CASE expression involving values of different types.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5423.html">CVE-2016-5423</cve>
<bugzilla href="https://bugzilla.suse.com/1041981">SUSE bug 1041981</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1042497">SUSE bug 1042497</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1052683">SUSE bug 1052683</bugzilla>
<bugzilla href="https://bugzilla.suse.com/993454">SUSE bug 993454</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210628" comment="libecpg6-9.4.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210629" comment="libpq5-9.4.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210630" comment="libpq5-32bit-9.4.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210631" comment="postgresql94-9.4.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210632" comment="postgresql94-contrib-9.4.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210633" comment="postgresql94-docs-9.4.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203385" comment="postgresql94-libs-9.4.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210634" comment="postgresql94-server-9.4.9-0.19 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5424</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5424" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5424" source="CVE"/>
    <description>
    PostgreSQL before 9.1.23, 9.2.x before 9.2.18, 9.3.x before 9.3.14, 9.4.x before 9.4.9, and 9.5.x before 9.5.4 might allow remote authenticated users with the CREATEDB or CREATEROLE role to gain superuser privileges via a (1) " (double quote), (2) \ (backslash), (3) carriage return, or (4) newline character in a (a) database or (b) role name that is mishandled during an administrative operation.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5424.html">CVE-2016-5424</cve>
<bugzilla href="https://bugzilla.suse.com/1041981">SUSE bug 1041981</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1042497">SUSE bug 1042497</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1052683">SUSE bug 1052683</bugzilla>
<bugzilla href="https://bugzilla.suse.com/993453">SUSE bug 993453</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210628" comment="libecpg6-9.4.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210629" comment="libpq5-9.4.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210630" comment="libpq5-32bit-9.4.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210631" comment="postgresql94-9.4.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210632" comment="postgresql94-contrib-9.4.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210633" comment="postgresql94-docs-9.4.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203385" comment="postgresql94-libs-9.4.9-0.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210634" comment="postgresql94-server-9.4.9-0.19 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5440</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-5440" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.49 and earlier, 5.6.30 and earlier, and 5.7.12 and earlier and MariaDB before 5.5.50, 10.0.x before 10.0.26, and 10.1.x before 10.1.15 allows remote administrators to affect availability via vectors related to Server: RBR.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5440.html">CVE-2016-5440</cve>
<bugzilla href="https://bugzilla.suse.com/989926">SUSE bug 989926</bugzilla>
<bugzilla href="https://bugzilla.suse.com/991616">SUSE bug 991616</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205667" comment="libmysql55client18-5.5.52-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208790" comment="libmysql55client18-32bit-5.5.52-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205668" comment="libmysql55client_r18-5.5.52-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203168" comment="mysql-5.5.52-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205669" comment="mysql-client-5.5.52-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205670" comment="mysql-tools-5.5.52-0.27 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5483</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5483" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5483" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2017-3600.  Reason: This candidate is a reservation duplicate of CVE-2017-3600.  Notes: All CVE users should reference CVE-2017-3600 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5483.html">CVE-2016-5483</cve>
<bugzilla href="https://bugzilla.suse.com/1001367">SUSE bug 1001367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1005555">SUSE bug 1005555</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1005557">SUSE bug 1005557</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1005561">SUSE bug 1005561</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1005562">SUSE bug 1005562</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1005563">SUSE bug 1005563</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1005564">SUSE bug 1005564</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1005566">SUSE bug 1005566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1005569">SUSE bug 1005569</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1005570">SUSE bug 1005570</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1005582">SUSE bug 1005582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1020875">SUSE bug 1020875</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1020876">SUSE bug 1020876</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1020877">SUSE bug 1020877</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1020878">SUSE bug 1020878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1020882">SUSE bug 1020882</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1020883">SUSE bug 1020883</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1020884">SUSE bug 1020884</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1020885">SUSE bug 1020885</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1020888">SUSE bug 1020888</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1020890">SUSE bug 1020890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1020891">SUSE bug 1020891</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1020893">SUSE bug 1020893</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1020894">SUSE bug 1020894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1020896">SUSE bug 1020896</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1020898">SUSE bug 1020898</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1020901">SUSE bug 1020901</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1022428">SUSE bug 1022428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1029014">SUSE bug 1029014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1029396">SUSE bug 1029396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1034850">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049393">SUSE bug 1049393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049394">SUSE bug 1049394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049396">SUSE bug 1049396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049399">SUSE bug 1049399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049400">SUSE bug 1049400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049401">SUSE bug 1049401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049402">SUSE bug 1049402</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049403">SUSE bug 1049403</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049404">SUSE bug 1049404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049405">SUSE bug 1049405</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049406">SUSE bug 1049406</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049407">SUSE bug 1049407</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049408">SUSE bug 1049408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049409">SUSE bug 1049409</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049410">SUSE bug 1049410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049411">SUSE bug 1049411</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049412">SUSE bug 1049412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049414">SUSE bug 1049414</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049415">SUSE bug 1049415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049416">SUSE bug 1049416</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049417">SUSE bug 1049417</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1064101">SUSE bug 1064101</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1064107">SUSE bug 1064107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1064115">SUSE bug 1064115</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1064116">SUSE bug 1064116</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1064117">SUSE bug 1064117</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210061" comment="libmysql55client18-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210062" comment="libmysql55client18-32bit-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210064" comment="libmysql55client_r18-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203177" comment="mysql-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210065" comment="mysql-client-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210066" comment="mysql-tools-5.5.55-0.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5542</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-5542" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u121, 7u111, 8u102; and Java SE Embedded 8u101 allows remote attackers to affect integrity via vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5542.html">CVE-2016-5542</cve>
<bugzilla href="https://bugzilla.suse.com/1005522">SUSE bug 1005522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1009280">SUSE bug 1009280</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205369" comment="java-1_6_0-ibm-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205370" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205371" comment="java-1_6_0-ibm-devel-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205372" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205373" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205374" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205392" comment="java-1_7_0-ibm-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205393" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205394" comment="java-1_7_0-ibm-devel-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205395" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205396" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.60-58 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205369" comment="java-1_6_0-ibm-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205371" comment="java-1_6_0-ibm-devel-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205372" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205373" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205374" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205392" comment="java-1_7_0-ibm-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205393" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205394" comment="java-1_7_0-ibm-devel-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205395" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205396" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.60-58 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205369" comment="java-1_6_0-ibm-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205372" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205373" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205374" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205392" comment="java-1_7_0-ibm-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205393" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205395" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205396" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.60-58 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5554</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-5554" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u121, 7u111, 8u102; and Java SE Embedded 8u101 allows remote attackers to affect integrity via vectors related to JMX.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5554.html">CVE-2016-5554</cve>
<bugzilla href="https://bugzilla.suse.com/1005523">SUSE bug 1005523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1009280">SUSE bug 1009280</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205369" comment="java-1_6_0-ibm-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205370" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205371" comment="java-1_6_0-ibm-devel-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205372" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205373" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205374" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205392" comment="java-1_7_0-ibm-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205393" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205394" comment="java-1_7_0-ibm-devel-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205395" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205396" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.60-58 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205369" comment="java-1_6_0-ibm-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205371" comment="java-1_6_0-ibm-devel-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205372" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205373" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205374" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205392" comment="java-1_7_0-ibm-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205393" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205394" comment="java-1_7_0-ibm-devel-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205395" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205396" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.60-58 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205369" comment="java-1_6_0-ibm-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205372" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205373" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205374" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205392" comment="java-1_7_0-ibm-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205393" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205395" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205396" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.60-58 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5556</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-5556" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5556" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u121, 7u111, and 8u102 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to 2D.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5556.html">CVE-2016-5556</cve>
<bugzilla href="https://bugzilla.suse.com/1005524">SUSE bug 1005524</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1009280">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1016265">SUSE bug 1016265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1016289">SUSE bug 1016289</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205369" comment="java-1_6_0-ibm-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205370" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205371" comment="java-1_6_0-ibm-devel-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205372" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205373" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205374" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205392" comment="java-1_7_0-ibm-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205393" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205394" comment="java-1_7_0-ibm-devel-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205395" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205396" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.60-58 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205369" comment="java-1_6_0-ibm-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205371" comment="java-1_6_0-ibm-devel-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205372" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205373" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205374" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205392" comment="java-1_7_0-ibm-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205393" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205394" comment="java-1_7_0-ibm-devel-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205395" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205396" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.60-58 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205369" comment="java-1_6_0-ibm-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205372" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205373" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205374" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205392" comment="java-1_7_0-ibm-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205393" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205395" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205396" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.60-58 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-5568" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5568" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u121, 7u111, and 8u102 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5568.html">CVE-2016-5568</cve>
<bugzilla href="https://bugzilla.suse.com/1005525">SUSE bug 1005525</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1009280">SUSE bug 1009280</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205369" comment="java-1_6_0-ibm-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205370" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205371" comment="java-1_6_0-ibm-devel-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205372" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205373" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205374" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205392" comment="java-1_7_0-ibm-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205393" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205394" comment="java-1_7_0-ibm-devel-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205395" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205396" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.60-58 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205369" comment="java-1_6_0-ibm-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205371" comment="java-1_6_0-ibm-devel-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205372" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205373" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205374" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205392" comment="java-1_7_0-ibm-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205393" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205394" comment="java-1_7_0-ibm-devel-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205395" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205396" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.60-58 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205369" comment="java-1_6_0-ibm-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205372" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205373" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205374" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205392" comment="java-1_7_0-ibm-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205393" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205395" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205396" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.60-58 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5573</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-5573" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u121, 7u111, 8u102; and Java SE Embedded 8u101 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Hotspot, a different vulnerability than CVE-2016-5582.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5573.html">CVE-2016-5573</cve>
<bugzilla href="https://bugzilla.suse.com/1005526">SUSE bug 1005526</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1009280">SUSE bug 1009280</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205369" comment="java-1_6_0-ibm-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205370" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205371" comment="java-1_6_0-ibm-devel-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205372" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205373" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205374" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205392" comment="java-1_7_0-ibm-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205393" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205394" comment="java-1_7_0-ibm-devel-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205395" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205396" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.60-58 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205369" comment="java-1_6_0-ibm-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205371" comment="java-1_6_0-ibm-devel-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205372" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205373" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205374" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205392" comment="java-1_7_0-ibm-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205393" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205394" comment="java-1_7_0-ibm-devel-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205395" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205396" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.60-58 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205369" comment="java-1_6_0-ibm-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205372" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205373" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205374" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205392" comment="java-1_7_0-ibm-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205393" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205395" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205396" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.60-58 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5584</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5584" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.52 and earlier, 5.6.33 and earlier, and 5.7.15 and earlier allows remote administrators to affect confidentiality via vectors related to Server: Security: Encryption.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5584.html">CVE-2016-5584</cve>
<bugzilla href="https://bugzilla.suse.com/1005558">SUSE bug 1005558</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1008318">SUSE bug 1008318</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210054" comment="libmysql55client18-5.5.53-0.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210055" comment="libmysql55client18-32bit-5.5.53-0.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210057" comment="libmysql55client_r18-5.5.53-0.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203171" comment="mysql-5.5.53-0.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210058" comment="mysql-client-5.5.53-0.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210059" comment="mysql-tools-5.5.53-0.30 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5597</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-5597" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u121, 7u111, 8u102; and Java SE Embedded 8u101 allows remote attackers to affect confidentiality via vectors related to Networking.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5597.html">CVE-2016-5597</cve>
<bugzilla href="https://bugzilla.suse.com/1005528">SUSE bug 1005528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1009280">SUSE bug 1009280</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205369" comment="java-1_6_0-ibm-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205370" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205371" comment="java-1_6_0-ibm-devel-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205372" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205373" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205374" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205392" comment="java-1_7_0-ibm-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205393" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205394" comment="java-1_7_0-ibm-devel-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205395" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205396" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.60-58 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205369" comment="java-1_6_0-ibm-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205371" comment="java-1_6_0-ibm-devel-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205372" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205373" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205374" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205392" comment="java-1_7_0-ibm-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205393" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205394" comment="java-1_7_0-ibm-devel-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205395" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205396" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.60-58 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205369" comment="java-1_6_0-ibm-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205372" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205373" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205374" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.35-78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205392" comment="java-1_7_0-ibm-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205393" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205395" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.60-58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205396" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.60-58 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5636" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5636" source="CVE"/>
    <description>
    Integer overflow in the get_data function in zipimport.c in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 allows remote attackers to have unspecified impact via a negative data size value, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5636.html">CVE-2016-5636</cve>
<bugzilla href="https://bugzilla.suse.com/1065451">SUSE bug 1065451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1095424">SUSE bug 1095424</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1106262">SUSE bug 1106262</bugzilla>
<bugzilla href="https://bugzilla.suse.com/985177">SUSE bug 985177</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009232735" comment="libpython2_6-1_0-2.6.9-40.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232738" comment="libpython2_6-1_0-32bit-2.6.9-40.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232717" comment="python-2.6.9-40.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232718" comment="python-32bit-2.6.9-40.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232719" comment="python-base-2.6.9-40.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232739" comment="python-base-32bit-2.6.9-40.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232736" comment="python-curses-2.6.9-40.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232720" comment="python-demo-2.6.9-40.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232722" comment="python-doc-2.6-8.40.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232723" comment="python-doc-pdf-2.6-8.40.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232724" comment="python-gdbm-2.6.9-40.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232725" comment="python-idle-2.6.9-40.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232726" comment="python-tk-2.6.9-40.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232737" comment="python-xml-2.6.9-40.15 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5652</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5652" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652" source="CVE"/>
    <description>
    An exploitable heap-based buffer overflow exists in the handling of TIFF images in LibTIFF's TIFF2PDF tool. A crafted TIFF document can lead to a heap-based buffer overflow resulting in remote code execution. Vulnerability can be triggered via a saved TIFF file delivered by other means.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5652.html">CVE-2016-5652</cve>
<bugzilla href="https://bugzilla.suse.com/1007280">SUSE bug 1007280</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210828" comment="libtiff3-3.8.2-141.169.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210829" comment="libtiff3-32bit-3.8.2-141.169.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203576" comment="tiff-3.8.2-141.169.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5687</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5687" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5687" source="CVE"/>
    <description>
    The VerticalFilter function in the DDS coder in ImageMagick before 6.9.4-3 and 7.x before 7.0.1-4 allows remote attackers to have unspecified impact via a crafted DDS file, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5687.html">CVE-2016-5687</cve>
<bugzilla href="https://bugzilla.suse.com/1000713">SUSE bug 1000713</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1000714">SUSE bug 1000714</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1074610">SUSE bug 1074610</bugzilla>
<bugzilla href="https://bugzilla.suse.com/985448">SUSE bug 985448</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202227" comment="ImageMagick-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209108" comment="libMagickCore1-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209109" comment="libMagickCore1-32bit-6.4.3.6-7.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5688</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5688" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5688" source="CVE"/>
    <description>
    The WPG parser in ImageMagick before 6.9.4-4 and 7.x before 7.0.1-5, when a memory limit is set, allows remote attackers to have unspecified impact via vectors related to the SetImageExtent return-value check, which trigger (1) a heap-based buffer overflow in the SetPixelIndex function or an invalid write operation in the (2) ScaleCharToQuantum or (3) SetPixelIndex functions.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5688.html">CVE-2016-5688</cve>
<bugzilla href="https://bugzilla.suse.com/985442">SUSE bug 985442</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5689</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5689" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5689" source="CVE"/>
    <description>
    The DCM reader in ImageMagick before 6.9.4-5 and 7.x before 7.0.1-7 allows remote attackers to have unspecified impact by leveraging lack of NULL pointer checks.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5689.html">CVE-2016-5689</cve>
<bugzilla href="https://bugzilla.suse.com/985460">SUSE bug 985460</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5690</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5690" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5690" source="CVE"/>
    <description>
    The ReadDCMImage function in DCM reader in ImageMagick before 6.9.4-5 and 7.x before 7.0.1-7 allows remote attackers to have unspecified impact via vectors involving the for statement in computing the pixel scaling table.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5690.html">CVE-2016-5690</cve>
<bugzilla href="https://bugzilla.suse.com/985451">SUSE bug 985451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/985460">SUSE bug 985460</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5691</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5691" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5691" source="CVE"/>
    <description>
    The DCM reader in ImageMagick before 6.9.4-5 and 7.x before 7.0.1-7 allows remote attackers to have unspecified impact by leveraging lack of validation of (1) pixel.red, (2) pixel.green, and (3) pixel.blue.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5691.html">CVE-2016-5691</cve>
<bugzilla href="https://bugzilla.suse.com/985456">SUSE bug 985456</bugzilla>
<bugzilla href="https://bugzilla.suse.com/985460">SUSE bug 985460</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5696</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-5696" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5696" source="CVE"/>
    <description>
    net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5696.html">CVE-2016-5696</cve>
<bugzilla href="https://bugzilla.suse.com/989152">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/994167">SUSE bug 994167</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208598" comment="kernel-bigsmp-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208599" comment="kernel-bigsmp-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208600" comment="kernel-bigsmp-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205422" comment="kernel-default-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205423" comment="kernel-default-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205424" comment="kernel-default-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205425" comment="kernel-ec2-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205426" comment="kernel-ec2-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205427" comment="kernel-ec2-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205431" comment="kernel-source-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205432" comment="kernel-syms-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205433" comment="kernel-trace-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205434" comment="kernel-trace-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205435" comment="kernel-trace-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205436" comment="kernel-xen-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205437" comment="kernel-xen-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205438" comment="kernel-xen-devel-3.0.101-0.47.86 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208598" comment="kernel-bigsmp-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208599" comment="kernel-bigsmp-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208600" comment="kernel-bigsmp-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205422" comment="kernel-default-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205423" comment="kernel-default-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205424" comment="kernel-default-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208601" comment="kernel-default-man-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205425" comment="kernel-ec2-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205426" comment="kernel-ec2-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205427" comment="kernel-ec2-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205428" comment="kernel-pae-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205429" comment="kernel-pae-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205430" comment="kernel-pae-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205431" comment="kernel-source-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205432" comment="kernel-syms-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205433" comment="kernel-trace-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205434" comment="kernel-trace-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205435" comment="kernel-trace-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205436" comment="kernel-xen-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205437" comment="kernel-xen-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205438" comment="kernel-xen-devel-3.0.101-0.47.86 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5699</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5699" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5699" source="CVE"/>
    <description>
    CRLF injection vulnerability in the HTTPConnection.putheader function in urllib2 and urllib in CPython (aka Python) before 2.7.10 and 3.x before 3.4.4 allows remote attackers to inject arbitrary HTTP headers via CRLF sequences in a URL.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5699.html">CVE-2016-5699</cve>
<bugzilla href="https://bugzilla.suse.com/1122729">SUSE bug 1122729</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1130840">SUSE bug 1130840</bugzilla>
<bugzilla href="https://bugzilla.suse.com/985348">SUSE bug 985348</bugzilla>
<bugzilla href="https://bugzilla.suse.com/985351">SUSE bug 985351</bugzilla>
<bugzilla href="https://bugzilla.suse.com/986630">SUSE bug 986630</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210666" comment="libpython2_6-1_0-2.6.9-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210667" comment="libpython2_6-1_0-32bit-2.6.9-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203398" comment="python-2.6.9-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203399" comment="python-32bit-2.6.9-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203400" comment="python-base-2.6.9-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210669" comment="python-base-32bit-2.6.9-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210671" comment="python-curses-2.6.9-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203401" comment="python-demo-2.6.9-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203403" comment="python-doc-2.6-8.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203404" comment="python-doc-pdf-2.6-8.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203405" comment="python-gdbm-2.6.9-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203406" comment="python-idle-2.6.9-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203407" comment="python-tk-2.6.9-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210673" comment="python-xml-2.6.9-39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5746</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5746" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5746" source="CVE"/>
    <description>
    libstorage, libstorage-ng, and yast-storage improperly store passphrases for encrypted storage devices in a temporary file on disk, which might allow local users to obtain sensitive information by reading the file, as demonstrated by /tmp/libstorage-XXXXXX/pwdf.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5746.html">CVE-2016-5746</cve>
<bugzilla href="https://bugzilla.suse.com/984245">SUSE bug 984245</bugzilla>
<bugzilla href="https://bugzilla.suse.com/986971">SUSE bug 986971</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250496" comment="yast2-storage-2.17.147.1-9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250497" comment="yast2-storage-lib-2.17.147.1-9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5766</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5766" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766" source="CVE"/>
    <description>
    Integer overflow in the _gd2GetHeader function in gd_gd2.c in the GD Graphics Library (aka libgd) before 2.2.3, as used in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8, allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via crafted chunk dimensions in an image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5766.html">CVE-2016-5766</cve>
<bugzilla href="https://bugzilla.suse.com/986386">SUSE bug 986386</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210532" comment="apache2-mod_php53-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203336" comment="php53-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210533" comment="php53-bcmath-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210534" comment="php53-bz2-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210535" comment="php53-calendar-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210536" comment="php53-ctype-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210537" comment="php53-curl-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210538" comment="php53-dba-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210539" comment="php53-dom-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210540" comment="php53-exif-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210541" comment="php53-fastcgi-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210542" comment="php53-fileinfo-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210543" comment="php53-ftp-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210544" comment="php53-gd-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210545" comment="php53-gettext-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210546" comment="php53-gmp-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210547" comment="php53-iconv-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210548" comment="php53-intl-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210549" comment="php53-json-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210550" comment="php53-ldap-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210551" comment="php53-mbstring-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210552" comment="php53-mcrypt-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210553" comment="php53-mysql-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210554" comment="php53-odbc-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210555" comment="php53-openssl-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210556" comment="php53-pcntl-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210557" comment="php53-pdo-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210558" comment="php53-pear-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210559" comment="php53-pgsql-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210560" comment="php53-pspell-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210561" comment="php53-shmop-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210562" comment="php53-snmp-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210563" comment="php53-soap-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210564" comment="php53-suhosin-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210565" comment="php53-sysvmsg-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210566" comment="php53-sysvsem-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210567" comment="php53-sysvshm-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210568" comment="php53-tokenizer-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210569" comment="php53-wddx-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210570" comment="php53-xmlreader-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210571" comment="php53-xmlrpc-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210572" comment="php53-xmlwriter-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210573" comment="php53-xsl-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210574" comment="php53-zip-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210575" comment="php53-zlib-5.3.17-112.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5767</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5767" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5767" source="CVE"/>
    <description>
    Integer overflow in the gdImageCreate function in gd.c in the GD Graphics Library (aka libgd) before 2.0.34RC1, as used in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8, allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted image dimensions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5767.html">CVE-2016-5767</cve>
<bugzilla href="https://bugzilla.suse.com/986393">SUSE bug 986393</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210268" comment="apache2-mod_php53-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203272" comment="php53-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210269" comment="php53-bcmath-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210270" comment="php53-bz2-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210271" comment="php53-calendar-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210272" comment="php53-ctype-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210273" comment="php53-curl-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210274" comment="php53-dba-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210275" comment="php53-dom-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210276" comment="php53-exif-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210277" comment="php53-fastcgi-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210278" comment="php53-fileinfo-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210279" comment="php53-ftp-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210280" comment="php53-gd-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210281" comment="php53-gettext-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210282" comment="php53-gmp-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210283" comment="php53-iconv-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210284" comment="php53-intl-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210285" comment="php53-json-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210286" comment="php53-ldap-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210287" comment="php53-mbstring-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210288" comment="php53-mcrypt-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210289" comment="php53-mysql-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210290" comment="php53-odbc-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210291" comment="php53-openssl-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210292" comment="php53-pcntl-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210293" comment="php53-pdo-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210294" comment="php53-pear-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210295" comment="php53-pgsql-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210296" comment="php53-pspell-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210297" comment="php53-shmop-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210298" comment="php53-snmp-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210299" comment="php53-soap-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210300" comment="php53-suhosin-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210301" comment="php53-sysvmsg-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210302" comment="php53-sysvsem-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210303" comment="php53-sysvshm-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210304" comment="php53-tokenizer-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210305" comment="php53-wddx-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210306" comment="php53-xmlreader-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210307" comment="php53-xmlrpc-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210308" comment="php53-xmlwriter-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210309" comment="php53-xsl-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210310" comment="php53-zip-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210311" comment="php53-zlib-5.3.17-74 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5769</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5769" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5769" source="CVE"/>
    <description>
    Multiple integer overflows in mcrypt.c in the mcrypt extension in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8 allow remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted length value, related to the (1) mcrypt_generic and (2) mdecrypt_generic functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5769.html">CVE-2016-5769</cve>
<bugzilla href="https://bugzilla.suse.com/986388">SUSE bug 986388</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210268" comment="apache2-mod_php53-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203272" comment="php53-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210269" comment="php53-bcmath-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210270" comment="php53-bz2-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210271" comment="php53-calendar-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210272" comment="php53-ctype-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210273" comment="php53-curl-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210274" comment="php53-dba-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210275" comment="php53-dom-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210276" comment="php53-exif-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210277" comment="php53-fastcgi-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210278" comment="php53-fileinfo-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210279" comment="php53-ftp-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210280" comment="php53-gd-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210281" comment="php53-gettext-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210282" comment="php53-gmp-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210283" comment="php53-iconv-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210284" comment="php53-intl-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210285" comment="php53-json-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210286" comment="php53-ldap-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210287" comment="php53-mbstring-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210288" comment="php53-mcrypt-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210289" comment="php53-mysql-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210290" comment="php53-odbc-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210291" comment="php53-openssl-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210292" comment="php53-pcntl-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210293" comment="php53-pdo-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210294" comment="php53-pear-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210295" comment="php53-pgsql-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210296" comment="php53-pspell-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210297" comment="php53-shmop-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210298" comment="php53-snmp-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210299" comment="php53-soap-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210300" comment="php53-suhosin-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210301" comment="php53-sysvmsg-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210302" comment="php53-sysvsem-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210303" comment="php53-sysvshm-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210304" comment="php53-tokenizer-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210305" comment="php53-wddx-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210306" comment="php53-xmlreader-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210307" comment="php53-xmlrpc-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210308" comment="php53-xmlwriter-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210309" comment="php53-xsl-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210310" comment="php53-zip-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210311" comment="php53-zlib-5.3.17-74 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5771</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5771" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5771" source="CVE"/>
    <description>
    spl_array.c in the SPL extension in PHP before 5.5.37 and 5.6.x before 5.6.23 improperly interacts with the unserialize implementation and garbage collection, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and application crash) via crafted serialized data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5771.html">CVE-2016-5771</cve>
<bugzilla href="https://bugzilla.suse.com/986247">SUSE bug 986247</bugzilla>
<bugzilla href="https://bugzilla.suse.com/986391">SUSE bug 986391</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205787" comment="apache2-mod_php53-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203352" comment="php53-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205788" comment="php53-bcmath-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205789" comment="php53-bz2-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205790" comment="php53-calendar-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205791" comment="php53-ctype-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205792" comment="php53-curl-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205793" comment="php53-dba-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205794" comment="php53-dom-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205795" comment="php53-exif-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205796" comment="php53-fastcgi-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205797" comment="php53-fileinfo-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205798" comment="php53-ftp-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205799" comment="php53-gd-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205800" comment="php53-gettext-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205801" comment="php53-gmp-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205802" comment="php53-iconv-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205803" comment="php53-intl-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205804" comment="php53-json-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205805" comment="php53-ldap-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205806" comment="php53-mbstring-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205807" comment="php53-mcrypt-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205808" comment="php53-mysql-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205809" comment="php53-odbc-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205810" comment="php53-openssl-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205811" comment="php53-pcntl-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205812" comment="php53-pdo-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205813" comment="php53-pear-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205814" comment="php53-pgsql-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205815" comment="php53-pspell-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205816" comment="php53-shmop-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205817" comment="php53-snmp-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205818" comment="php53-soap-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205819" comment="php53-suhosin-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205820" comment="php53-sysvmsg-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205821" comment="php53-sysvsem-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205822" comment="php53-sysvshm-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205823" comment="php53-tokenizer-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205824" comment="php53-wddx-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205825" comment="php53-xmlreader-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205826" comment="php53-xmlrpc-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205827" comment="php53-xmlwriter-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205828" comment="php53-xsl-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205829" comment="php53-zip-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205830" comment="php53-zlib-5.3.17-112.20 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5772</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5772" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5772" source="CVE"/>
    <description>
    Double free vulnerability in the php_wddx_process_data function in wddx.c in the WDDX extension in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted XML data that is mishandled in a wddx_deserialize call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5772.html">CVE-2016-5772</cve>
<bugzilla href="https://bugzilla.suse.com/986244">SUSE bug 986244</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210268" comment="apache2-mod_php53-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203272" comment="php53-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210269" comment="php53-bcmath-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210270" comment="php53-bz2-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210271" comment="php53-calendar-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210272" comment="php53-ctype-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210273" comment="php53-curl-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210274" comment="php53-dba-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210275" comment="php53-dom-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210276" comment="php53-exif-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210277" comment="php53-fastcgi-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210278" comment="php53-fileinfo-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210279" comment="php53-ftp-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210280" comment="php53-gd-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210281" comment="php53-gettext-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210282" comment="php53-gmp-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210283" comment="php53-iconv-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210284" comment="php53-intl-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210285" comment="php53-json-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210286" comment="php53-ldap-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210287" comment="php53-mbstring-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210288" comment="php53-mcrypt-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210289" comment="php53-mysql-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210290" comment="php53-odbc-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210291" comment="php53-openssl-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210292" comment="php53-pcntl-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210293" comment="php53-pdo-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210294" comment="php53-pear-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210295" comment="php53-pgsql-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210296" comment="php53-pspell-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210297" comment="php53-shmop-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210298" comment="php53-snmp-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210299" comment="php53-soap-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210300" comment="php53-suhosin-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210301" comment="php53-sysvmsg-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210302" comment="php53-sysvsem-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210303" comment="php53-sysvshm-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210304" comment="php53-tokenizer-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210305" comment="php53-wddx-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210306" comment="php53-xmlreader-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210307" comment="php53-xmlrpc-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210308" comment="php53-xmlwriter-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210309" comment="php53-xsl-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210310" comment="php53-zip-5.3.17-74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210311" comment="php53-zlib-5.3.17-74 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5773</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5773" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5773" source="CVE"/>
    <description>
    php_zip.c in the zip extension in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8 improperly interacts with the unserialize implementation and garbage collection, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and application crash) via crafted serialized data containing a ZipArchive object.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5773.html">CVE-2016-5773</cve>
<bugzilla href="https://bugzilla.suse.com/986247">SUSE bug 986247</bugzilla>
<bugzilla href="https://bugzilla.suse.com/986391">SUSE bug 986391</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205787" comment="apache2-mod_php53-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203352" comment="php53-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205788" comment="php53-bcmath-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205789" comment="php53-bz2-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205790" comment="php53-calendar-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205791" comment="php53-ctype-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205792" comment="php53-curl-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205793" comment="php53-dba-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205794" comment="php53-dom-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205795" comment="php53-exif-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205796" comment="php53-fastcgi-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205797" comment="php53-fileinfo-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205798" comment="php53-ftp-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205799" comment="php53-gd-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205800" comment="php53-gettext-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205801" comment="php53-gmp-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205802" comment="php53-iconv-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205803" comment="php53-intl-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205804" comment="php53-json-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205805" comment="php53-ldap-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205806" comment="php53-mbstring-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205807" comment="php53-mcrypt-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205808" comment="php53-mysql-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205809" comment="php53-odbc-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205810" comment="php53-openssl-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205811" comment="php53-pcntl-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205812" comment="php53-pdo-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205813" comment="php53-pear-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205814" comment="php53-pgsql-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205815" comment="php53-pspell-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205816" comment="php53-shmop-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205817" comment="php53-snmp-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205818" comment="php53-soap-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205819" comment="php53-suhosin-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205820" comment="php53-sysvmsg-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205821" comment="php53-sysvsem-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205822" comment="php53-sysvshm-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205823" comment="php53-tokenizer-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205824" comment="php53-wddx-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205825" comment="php53-xmlreader-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205826" comment="php53-xmlrpc-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205827" comment="php53-xmlwriter-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205828" comment="php53-xsl-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205829" comment="php53-zip-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205830" comment="php53-zlib-5.3.17-112.20 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5823</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5823" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5823" source="CVE"/>
    <description>
    The icalproperty_new_clone function in libical 0.47 and 1.0 allows remote attackers to cause a denial of service (use-after-free) via a crafted ics file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5823.html">CVE-2016-5823</cve>
<bugzilla href="https://bugzilla.suse.com/986632">SUSE bug 986632</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202836" comment="libical-0.43-1.10.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209911" comment="libical0-0.43-1.10.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202838" comment="libical0-32bit-0.43-1.10.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5824</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5824" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5824" source="CVE"/>
    <description>
    libical 1.0 allows remote attackers to cause a denial of service (use-after-free) via a crafted ics file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5824.html">CVE-2016-5824</cve>
<bugzilla href="https://bugzilla.suse.com/1015964">SUSE bug 1015964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1122983">SUSE bug 1122983</bugzilla>
<bugzilla href="https://bugzilla.suse.com/986631">SUSE bug 986631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/986639">SUSE bug 986639</bugzilla>
<bugzilla href="https://bugzilla.suse.com/986642">SUSE bug 986642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/986658">SUSE bug 986658</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202836" comment="libical-0.43-1.10.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209911" comment="libical0-0.43-1.10.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202838" comment="libical0-32bit-0.43-1.10.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5825</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5825" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5825" source="CVE"/>
    <description>
    The icalparser_parse_string function in libical 0.47 and 1.0 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted ics file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5825.html">CVE-2016-5825</cve>
<bugzilla href="https://bugzilla.suse.com/986631">SUSE bug 986631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/986639">SUSE bug 986639</bugzilla>
<bugzilla href="https://bugzilla.suse.com/986642">SUSE bug 986642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/986658">SUSE bug 986658</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202836" comment="libical-0.43-1.10.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209911" comment="libical0-0.43-1.10.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202838" comment="libical0-32bit-0.43-1.10.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5826</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5826" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5826" source="CVE"/>
    <description>
    The parser_get_next_char function in libical 0.47 and 1.0 allows remote attackers to cause a denial of service (out-of-bounds heap read) by crafting a string to the icalparser_parse_string function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5826.html">CVE-2016-5826</cve>
<bugzilla href="https://bugzilla.suse.com/986631">SUSE bug 986631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/986639">SUSE bug 986639</bugzilla>
<bugzilla href="https://bugzilla.suse.com/986642">SUSE bug 986642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/986658">SUSE bug 986658</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202836" comment="libical-0.43-1.10.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209911" comment="libical0-0.43-1.10.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202838" comment="libical0-32bit-0.43-1.10.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5827</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5827" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5827" source="CVE"/>
    <description>
    The icaltime_from_string function in libical 0.47 and 1.0 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted string to the icalparser_parse_string function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5827.html">CVE-2016-5827</cve>
<bugzilla href="https://bugzilla.suse.com/986631">SUSE bug 986631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/986639">SUSE bug 986639</bugzilla>
<bugzilla href="https://bugzilla.suse.com/986642">SUSE bug 986642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/986658">SUSE bug 986658</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202836" comment="libical-0.43-1.10.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209911" comment="libical0-0.43-1.10.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202838" comment="libical0-32bit-0.43-1.10.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5829</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-5829" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5829" source="CVE"/>
    <description>
    Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel through 4.6.3 allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5829.html">CVE-2016-5829</cve>
<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1054127">SUSE bug 1054127</bugzilla>
<bugzilla href="https://bugzilla.suse.com/986572">SUSE bug 986572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/986573">SUSE bug 986573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/990058">SUSE bug 990058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/991651">SUSE bug 991651</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208598" comment="kernel-bigsmp-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208599" comment="kernel-bigsmp-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208600" comment="kernel-bigsmp-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205422" comment="kernel-default-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205423" comment="kernel-default-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205424" comment="kernel-default-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205425" comment="kernel-ec2-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205426" comment="kernel-ec2-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205427" comment="kernel-ec2-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205431" comment="kernel-source-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205432" comment="kernel-syms-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205433" comment="kernel-trace-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205434" comment="kernel-trace-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205435" comment="kernel-trace-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205436" comment="kernel-xen-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205437" comment="kernel-xen-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205438" comment="kernel-xen-devel-3.0.101-0.47.86 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208598" comment="kernel-bigsmp-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208599" comment="kernel-bigsmp-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208600" comment="kernel-bigsmp-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205422" comment="kernel-default-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205423" comment="kernel-default-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205424" comment="kernel-default-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208601" comment="kernel-default-man-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205425" comment="kernel-ec2-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205426" comment="kernel-ec2-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205427" comment="kernel-ec2-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205428" comment="kernel-pae-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205429" comment="kernel-pae-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205430" comment="kernel-pae-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205431" comment="kernel-source-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205432" comment="kernel-syms-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205433" comment="kernel-trace-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205434" comment="kernel-trace-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205435" comment="kernel-trace-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205436" comment="kernel-xen-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205437" comment="kernel-xen-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205438" comment="kernel-xen-devel-3.0.101-0.47.86 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5841</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5841" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5841" source="CVE"/>
    <description>
    Integer overflow in MagickCore/profile.c in ImageMagick before 7.0.2-1 allows remote attackers to cause a denial of service (segmentation fault) or possibly execute arbitrary code via vectors involving the offset variable.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5841.html">CVE-2016-5841</cve>
<bugzilla href="https://bugzilla.suse.com/986609">SUSE bug 986609</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5842</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5842" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5842" source="CVE"/>
    <description>
    MagickCore/property.c in ImageMagick before 7.0.2-1 allows remote attackers to obtain sensitive memory information via vectors involving the q variable, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5842.html">CVE-2016-5842</cve>
<bugzilla href="https://bugzilla.suse.com/986608">SUSE bug 986608</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202213" comment="ImageMagick-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209104" comment="libMagickCore1-6.4.3.6-7.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209105" comment="libMagickCore1-32bit-6.4.3.6-7.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5875</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-5875" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5875" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2016-5314.  Reason: This candidate is a reservation duplicate of CVE-2016-5314.  Notes: All CVE users should reference CVE-2016-5314 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5875.html">CVE-2016-5875</cve>
<bugzilla href="https://bugzilla.suse.com/1007284">SUSE bug 1007284</bugzilla>
<bugzilla href="https://bugzilla.suse.com/984809">SUSE bug 984809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/984831">SUSE bug 984831</bugzilla>
<bugzilla href="https://bugzilla.suse.com/987351">SUSE bug 987351</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210825" comment="libtiff3-3.8.2-141.168 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210826" comment="libtiff3-32bit-3.8.2-141.168 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203573" comment="tiff-3.8.2-141.168 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6153</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-6153" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6153" source="CVE"/>
    <description>
    os_unix.c in SQLite before 3.13.0 improperly implements the temporary directory search algorithm, which might allow local users to obtain sensitive information, cause a denial of service (application crash), or have unspecified other impact by leveraging use of the current working directory for temporary files.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6153.html">CVE-2016-6153</cve>
<bugzilla href="https://bugzilla.suse.com/1149969">SUSE bug 1149969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/987394">SUSE bug 987394</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210802" comment="libsqlite3-0-3.7.6.3-1.4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210803" comment="libsqlite3-0-32bit-3.7.6.3-1.4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203554" comment="sqlite3-3.7.6.3-1.4.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6161</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-6161" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161" source="CVE"/>
    <description>
    The output function in gd_gif_out.c in the GD Graphics Library (aka libgd) allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted image.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6161.html">CVE-2016-6161</cve>
<bugzilla href="https://bugzilla.suse.com/988032">SUSE bug 988032</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202610" comment="gd-2.0.36.RC1-52.22 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6170</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-6170" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6170" source="CVE"/>
    <description>
    ISC BIND through 9.9.9-P1, 9.10.x through 9.10.4-P1, and 9.11.x through 9.11.0b1 allows primary DNS servers to cause a denial of service (secondary DNS server crash) via a large AXFR response, and possibly allows IXFR servers to cause a denial of service (IXFR client crash) via a large IXFR response and allows remote authenticated users to cause a denial of service (primary DNS server crash) via a large UPDATE message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6170.html">CVE-2016-6170</cve>
<bugzilla href="https://bugzilla.suse.com/987866">SUSE bug 987866</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202449" comment="bind-9.9.6P1-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205295" comment="bind-chrootenv-9.9.6P1-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202450" comment="bind-devel-9.9.6P1-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205296" comment="bind-doc-9.9.6P1-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205297" comment="bind-libs-9.9.6P1-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208439" comment="bind-libs-32bit-9.9.6P1-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205298" comment="bind-utils-9.9.6P1-0.44 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202449" comment="bind-9.9.6P1-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205295" comment="bind-chrootenv-9.9.6P1-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205296" comment="bind-doc-9.9.6P1-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205297" comment="bind-libs-9.9.6P1-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208439" comment="bind-libs-32bit-9.9.6P1-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205298" comment="bind-utils-9.9.6P1-0.44 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6185</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-6185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6185" source="CVE"/>
    <description>
    The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6185.html">CVE-2016-6185</cve>
<bugzilla href="https://bugzilla.suse.com/988311">SUSE bug 988311</bugzilla>
<bugzilla href="https://bugzilla.suse.com/999993">SUSE bug 999993</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203238" comment="perl-5.10.0-64.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210162" comment="perl-32bit-5.10.0-64.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210163" comment="perl-Module-Build-0.2808.01-0.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210164" comment="perl-Test-Simple-0.72-0.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210165" comment="perl-base-5.10.0-64.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210166" comment="perl-doc-5.10.0-64.80 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6210</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-6210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6210" source="CVE"/>
    <description>
    sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6210.html">CVE-2016-6210</cve>
<bugzilla href="https://bugzilla.suse.com/1001712">SUSE bug 1001712</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1087412">SUSE bug 1087412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1105010">SUSE bug 1105010</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
<bugzilla href="https://bugzilla.suse.com/989363">SUSE bug 989363</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205681" comment="openssh-6.2p2-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205682" comment="openssh-askpass-6.2p2-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205683" comment="openssh-askpass-gnome-6.2p2-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203762" comment="openssh-openssl1-6.6p1-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203763" comment="openssh-openssl1-helpers-6.6p1-15 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205681" comment="openssh-6.2p2-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205682" comment="openssh-askpass-6.2p2-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205683" comment="openssh-askpass-gnome-6.2p2-0.33 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6258</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-6258" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6258" source="CVE"/>
    <description>
    The PV pagetable code in arch/x86/mm.c in Xen 4.7.x and earlier allows local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6258.html">CVE-2016-6258</cve>
<bugzilla href="https://bugzilla.suse.com/988675">SUSE bug 988675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/988692">SUSE bug 988692</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205947" comment="xen-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209054" comment="xen-doc-html-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209055" comment="xen-doc-pdf-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205948" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205949" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205950" comment="xen-libs-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209056" comment="xen-libs-32bit-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209057" comment="xen-tools-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205951" comment="xen-tools-domU-4.2.5_21-27 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205947" comment="xen-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209054" comment="xen-doc-html-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209055" comment="xen-doc-pdf-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205948" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205950" comment="xen-libs-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209056" comment="xen-libs-32bit-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209057" comment="xen-tools-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205951" comment="xen-tools-domU-4.2.5_21-27 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6261</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-6261" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6261" source="CVE"/>
    <description>
    The idna_to_ascii_4i function in lib/idna.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via 64 bytes of input.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6261.html">CVE-2016-6261</cve>
<bugzilla href="https://bugzilla.suse.com/1118435">SUSE bug 1118435</bugzilla>
<bugzilla href="https://bugzilla.suse.com/990190">SUSE bug 990190</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202841" comment="libidn-1.10-6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209912" comment="libidn-32bit-1.10-6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6262</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-6262" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6262" source="CVE"/>
    <description>
    idn in libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read, a different vulnerability than CVE-2015-8948.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6262.html">CVE-2016-6262</cve>
<bugzilla href="https://bugzilla.suse.com/1014473">SUSE bug 1014473</bugzilla>
<bugzilla href="https://bugzilla.suse.com/990189">SUSE bug 990189</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202841" comment="libidn-1.10-6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209912" comment="libidn-32bit-1.10-6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6263</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-6263" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6263" source="CVE"/>
    <description>
    The stringprep_utf8_nfkc_normalize function in lib/nfkc.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via crafted UTF-8 data.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6263.html">CVE-2016-6263</cve>
<bugzilla href="https://bugzilla.suse.com/1118435">SUSE bug 1118435</bugzilla>
<bugzilla href="https://bugzilla.suse.com/990191">SUSE bug 990191</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202841" comment="libidn-1.10-6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209912" comment="libidn-32bit-1.10-6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6288</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-6288" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6288" source="CVE"/>
    <description>
    The php_url_parse_ex function in ext/standard/url.c in PHP before 5.5.38 allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via vectors involving the smart_str data type.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6288.html">CVE-2016-6288</cve>
<bugzilla href="https://bugzilla.suse.com/991433">SUSE bug 991433</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210312" comment="apache2-mod_php53-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203280" comment="php53-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210313" comment="php53-bcmath-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210314" comment="php53-bz2-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210315" comment="php53-calendar-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210316" comment="php53-ctype-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210317" comment="php53-curl-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210318" comment="php53-dba-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210319" comment="php53-dom-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210320" comment="php53-exif-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210321" comment="php53-fastcgi-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210322" comment="php53-fileinfo-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210323" comment="php53-ftp-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210324" comment="php53-gd-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210325" comment="php53-gettext-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210326" comment="php53-gmp-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210327" comment="php53-iconv-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210328" comment="php53-intl-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210329" comment="php53-json-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210330" comment="php53-ldap-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210331" comment="php53-mbstring-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210332" comment="php53-mcrypt-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210333" comment="php53-mysql-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210334" comment="php53-odbc-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210335" comment="php53-openssl-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210336" comment="php53-pcntl-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210337" comment="php53-pdo-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210338" comment="php53-pear-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210339" comment="php53-pgsql-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210340" comment="php53-pspell-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210341" comment="php53-shmop-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210342" comment="php53-snmp-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210343" comment="php53-soap-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210344" comment="php53-suhosin-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210345" comment="php53-sysvmsg-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210346" comment="php53-sysvsem-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210347" comment="php53-sysvshm-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210348" comment="php53-tokenizer-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210349" comment="php53-wddx-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210350" comment="php53-xmlreader-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210351" comment="php53-xmlrpc-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210352" comment="php53-xmlwriter-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210353" comment="php53-xsl-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210354" comment="php53-zip-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210355" comment="php53-zlib-5.3.17-79 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6289</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-6289" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6289" source="CVE"/>
    <description>
    Integer overflow in the virtual_file_ex function in TSRM/tsrm_virtual_cwd.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a crafted extract operation on a ZIP archive.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6289.html">CVE-2016-6289</cve>
<bugzilla href="https://bugzilla.suse.com/991428">SUSE bug 991428</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210312" comment="apache2-mod_php53-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203280" comment="php53-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210313" comment="php53-bcmath-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210314" comment="php53-bz2-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210315" comment="php53-calendar-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210316" comment="php53-ctype-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210317" comment="php53-curl-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210318" comment="php53-dba-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210319" comment="php53-dom-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210320" comment="php53-exif-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210321" comment="php53-fastcgi-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210322" comment="php53-fileinfo-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210323" comment="php53-ftp-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210324" comment="php53-gd-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210325" comment="php53-gettext-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210326" comment="php53-gmp-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210327" comment="php53-iconv-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210328" comment="php53-intl-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210329" comment="php53-json-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210330" comment="php53-ldap-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210331" comment="php53-mbstring-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210332" comment="php53-mcrypt-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210333" comment="php53-mysql-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210334" comment="php53-odbc-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210335" comment="php53-openssl-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210336" comment="php53-pcntl-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210337" comment="php53-pdo-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210338" comment="php53-pear-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210339" comment="php53-pgsql-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210340" comment="php53-pspell-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210341" comment="php53-shmop-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210342" comment="php53-snmp-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210343" comment="php53-soap-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210344" comment="php53-suhosin-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210345" comment="php53-sysvmsg-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210346" comment="php53-sysvsem-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210347" comment="php53-sysvshm-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210348" comment="php53-tokenizer-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210349" comment="php53-wddx-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210350" comment="php53-xmlreader-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210351" comment="php53-xmlrpc-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210352" comment="php53-xmlwriter-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210353" comment="php53-xsl-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210354" comment="php53-zip-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210355" comment="php53-zlib-5.3.17-79 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6290</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-6290" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6290" source="CVE"/>
    <description>
    ext/session/session.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 does not properly maintain a certain hash data structure, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via vectors related to session deserialization.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6290.html">CVE-2016-6290</cve>
<bugzilla href="https://bugzilla.suse.com/991429">SUSE bug 991429</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210312" comment="apache2-mod_php53-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203280" comment="php53-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210313" comment="php53-bcmath-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210314" comment="php53-bz2-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210315" comment="php53-calendar-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210316" comment="php53-ctype-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210317" comment="php53-curl-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210318" comment="php53-dba-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210319" comment="php53-dom-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210320" comment="php53-exif-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210321" comment="php53-fastcgi-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210322" comment="php53-fileinfo-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210323" comment="php53-ftp-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210324" comment="php53-gd-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210325" comment="php53-gettext-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210326" comment="php53-gmp-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210327" comment="php53-iconv-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210328" comment="php53-intl-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210329" comment="php53-json-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210330" comment="php53-ldap-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210331" comment="php53-mbstring-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210332" comment="php53-mcrypt-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210333" comment="php53-mysql-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210334" comment="php53-odbc-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210335" comment="php53-openssl-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210336" comment="php53-pcntl-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210337" comment="php53-pdo-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210338" comment="php53-pear-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210339" comment="php53-pgsql-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210340" comment="php53-pspell-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210341" comment="php53-shmop-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210342" comment="php53-snmp-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210343" comment="php53-soap-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210344" comment="php53-suhosin-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210345" comment="php53-sysvmsg-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210346" comment="php53-sysvsem-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210347" comment="php53-sysvshm-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210348" comment="php53-tokenizer-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210349" comment="php53-wddx-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210350" comment="php53-xmlreader-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210351" comment="php53-xmlrpc-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210352" comment="php53-xmlwriter-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210353" comment="php53-xsl-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210354" comment="php53-zip-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210355" comment="php53-zlib-5.3.17-79 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6291</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-6291" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6291" source="CVE"/>
    <description>
    The exif_process_IFD_in_MAKERNOTE function in ext/exif/exif.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows remote attackers to cause a denial of service (out-of-bounds array access and memory corruption), obtain sensitive information from process memory, or possibly have unspecified other impact via a crafted JPEG image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6291.html">CVE-2016-6291</cve>
<bugzilla href="https://bugzilla.suse.com/991427">SUSE bug 991427</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210312" comment="apache2-mod_php53-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203280" comment="php53-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210313" comment="php53-bcmath-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210314" comment="php53-bz2-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210315" comment="php53-calendar-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210316" comment="php53-ctype-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210317" comment="php53-curl-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210318" comment="php53-dba-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210319" comment="php53-dom-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210320" comment="php53-exif-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210321" comment="php53-fastcgi-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210322" comment="php53-fileinfo-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210323" comment="php53-ftp-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210324" comment="php53-gd-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210325" comment="php53-gettext-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210326" comment="php53-gmp-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210327" comment="php53-iconv-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210328" comment="php53-intl-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210329" comment="php53-json-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210330" comment="php53-ldap-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210331" comment="php53-mbstring-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210332" comment="php53-mcrypt-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210333" comment="php53-mysql-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210334" comment="php53-odbc-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210335" comment="php53-openssl-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210336" comment="php53-pcntl-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210337" comment="php53-pdo-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210338" comment="php53-pear-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210339" comment="php53-pgsql-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210340" comment="php53-pspell-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210341" comment="php53-shmop-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210342" comment="php53-snmp-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210343" comment="php53-soap-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210344" comment="php53-suhosin-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210345" comment="php53-sysvmsg-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210346" comment="php53-sysvsem-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210347" comment="php53-sysvshm-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210348" comment="php53-tokenizer-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210349" comment="php53-wddx-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210350" comment="php53-xmlreader-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210351" comment="php53-xmlrpc-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210352" comment="php53-xmlwriter-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210353" comment="php53-xsl-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210354" comment="php53-zip-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210355" comment="php53-zlib-5.3.17-79 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6293</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-6293" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6293" source="CVE"/>
    <description>
    The uloc_acceptLanguageFromHTTP function in common/uloc.cpp in International Components for Unicode (ICU) through 57.1 for C/C++ does not ensure that there is a '\0' character at the end of a certain temporary array, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a call with a long httpAcceptLanguage argument.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6293.html">CVE-2016-6293</cve>
<bugzilla href="https://bugzilla.suse.com/1035111">SUSE bug 1035111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123121">SUSE bug 1123121</bugzilla>
<bugzilla href="https://bugzilla.suse.com/990636">SUSE bug 990636</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202740" comment="icu-4.0-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209360" comment="libicu-4.0-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202741" comment="libicu-32bit-4.0-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209361" comment="libicu-doc-4.0-47.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6294</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-6294" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6294" source="CVE"/>
    <description>
    The locale_accept_from_http function in ext/intl/locale/locale_methods.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 does not properly restrict calls to the ICU uloc_acceptLanguageFromHTTP function, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a call with a long argument.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6294.html">CVE-2016-6294</cve>
<bugzilla href="https://bugzilla.suse.com/1035111">SUSE bug 1035111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044976">SUSE bug 1044976</bugzilla>
<bugzilla href="https://bugzilla.suse.com/990636">SUSE bug 990636</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210444" comment="apache2-mod_php53-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203320" comment="php53-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210445" comment="php53-bcmath-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210446" comment="php53-bz2-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210447" comment="php53-calendar-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210448" comment="php53-ctype-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210449" comment="php53-curl-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210450" comment="php53-dba-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210451" comment="php53-dom-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210452" comment="php53-exif-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210453" comment="php53-fastcgi-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210454" comment="php53-fileinfo-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210455" comment="php53-ftp-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210456" comment="php53-gd-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210457" comment="php53-gettext-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210458" comment="php53-gmp-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210459" comment="php53-iconv-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210460" comment="php53-intl-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210461" comment="php53-json-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210462" comment="php53-ldap-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210463" comment="php53-mbstring-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210464" comment="php53-mcrypt-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210465" comment="php53-mysql-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210466" comment="php53-odbc-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210467" comment="php53-openssl-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210468" comment="php53-pcntl-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210469" comment="php53-pdo-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210470" comment="php53-pear-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210471" comment="php53-pgsql-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210472" comment="php53-pspell-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210473" comment="php53-shmop-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210474" comment="php53-snmp-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210475" comment="php53-soap-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210476" comment="php53-suhosin-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210477" comment="php53-sysvmsg-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210478" comment="php53-sysvsem-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210479" comment="php53-sysvshm-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210480" comment="php53-tokenizer-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210481" comment="php53-wddx-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210482" comment="php53-xmlreader-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210483" comment="php53-xmlrpc-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210484" comment="php53-xmlwriter-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210485" comment="php53-xsl-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210486" comment="php53-zip-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210487" comment="php53-zlib-5.3.17-108 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6296</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-6296" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6296" source="CVE"/>
    <description>
    Integer signedness error in the simplestring_addn function in simplestring.c in xmlrpc-epi through 0.54.2, as used in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9, allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a long first argument to the PHP xmlrpc_encode_request function.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6296.html">CVE-2016-6296</cve>
<bugzilla href="https://bugzilla.suse.com/991437">SUSE bug 991437</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210312" comment="apache2-mod_php53-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203280" comment="php53-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210313" comment="php53-bcmath-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210314" comment="php53-bz2-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210315" comment="php53-calendar-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210316" comment="php53-ctype-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210317" comment="php53-curl-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210318" comment="php53-dba-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210319" comment="php53-dom-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210320" comment="php53-exif-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210321" comment="php53-fastcgi-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210322" comment="php53-fileinfo-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210323" comment="php53-ftp-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210324" comment="php53-gd-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210325" comment="php53-gettext-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210326" comment="php53-gmp-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210327" comment="php53-iconv-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210328" comment="php53-intl-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210329" comment="php53-json-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210330" comment="php53-ldap-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210331" comment="php53-mbstring-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210332" comment="php53-mcrypt-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210333" comment="php53-mysql-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210334" comment="php53-odbc-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210335" comment="php53-openssl-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210336" comment="php53-pcntl-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210337" comment="php53-pdo-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210338" comment="php53-pear-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210339" comment="php53-pgsql-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210340" comment="php53-pspell-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210341" comment="php53-shmop-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210342" comment="php53-snmp-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210343" comment="php53-soap-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210344" comment="php53-suhosin-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210345" comment="php53-sysvmsg-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210346" comment="php53-sysvsem-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210347" comment="php53-sysvshm-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210348" comment="php53-tokenizer-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210349" comment="php53-wddx-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210350" comment="php53-xmlreader-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210351" comment="php53-xmlrpc-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210352" comment="php53-xmlwriter-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210353" comment="php53-xsl-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210354" comment="php53-zip-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210355" comment="php53-zlib-5.3.17-79 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6297</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-6297" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6297" source="CVE"/>
    <description>
    Integer overflow in the php_stream_zip_opener function in ext/zip/zip_stream.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a crafted zip:// URL.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6297.html">CVE-2016-6297</cve>
<bugzilla href="https://bugzilla.suse.com/991426">SUSE bug 991426</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210312" comment="apache2-mod_php53-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203280" comment="php53-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210313" comment="php53-bcmath-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210314" comment="php53-bz2-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210315" comment="php53-calendar-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210316" comment="php53-ctype-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210317" comment="php53-curl-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210318" comment="php53-dba-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210319" comment="php53-dom-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210320" comment="php53-exif-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210321" comment="php53-fastcgi-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210322" comment="php53-fileinfo-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210323" comment="php53-ftp-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210324" comment="php53-gd-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210325" comment="php53-gettext-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210326" comment="php53-gmp-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210327" comment="php53-iconv-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210328" comment="php53-intl-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210329" comment="php53-json-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210330" comment="php53-ldap-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210331" comment="php53-mbstring-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210332" comment="php53-mcrypt-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210333" comment="php53-mysql-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210334" comment="php53-odbc-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210335" comment="php53-openssl-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210336" comment="php53-pcntl-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210337" comment="php53-pdo-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210338" comment="php53-pear-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210339" comment="php53-pgsql-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210340" comment="php53-pspell-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210341" comment="php53-shmop-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210342" comment="php53-snmp-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210343" comment="php53-soap-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210344" comment="php53-suhosin-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210345" comment="php53-sysvmsg-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210346" comment="php53-sysvsem-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210347" comment="php53-sysvshm-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210348" comment="php53-tokenizer-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210349" comment="php53-wddx-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210350" comment="php53-xmlreader-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210351" comment="php53-xmlrpc-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210352" comment="php53-xmlwriter-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210353" comment="php53-xsl-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210354" comment="php53-zip-5.3.17-79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210355" comment="php53-zlib-5.3.17-79 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6302</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-6302" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6302" source="CVE"/>
    <description>
    The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6302.html">CVE-2016-6302</cve>
<bugzilla href="https://bugzilla.suse.com/994844">SUSE bug 994844</bugzilla>
<bugzilla href="https://bugzilla.suse.com/995324">SUSE bug 995324</bugzilla>
<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203226" comment="libopenssl-devel-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205687" comment="libopenssl0_9_8-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207927" comment="libopenssl0_9_8-32bit-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205688" comment="libopenssl0_9_8-hmac-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207928" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203228" comment="openssl-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205689" comment="openssl-doc-0.9.8j-0.102 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205687" comment="libopenssl0_9_8-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207927" comment="libopenssl0_9_8-32bit-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205688" comment="libopenssl0_9_8-hmac-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207928" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203784" comment="libopenssl1-devel-1.0.1g-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203785" comment="libopenssl1_0_0-1.0.1g-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203786" comment="libopenssl1_0_0-32bit-1.0.1g-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203228" comment="openssl-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205689" comment="openssl-doc-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203788" comment="openssl1-1.0.1g-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203789" comment="openssl1-doc-1.0.1g-0.52 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6303</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-6303" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6303" source="CVE"/>
    <description>
    Integer overflow in the MDC2_Update function in crypto/mdc2/mdc2dgst.c in OpenSSL before 1.1.0 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6303.html">CVE-2016-6303</cve>
<bugzilla href="https://bugzilla.suse.com/994844">SUSE bug 994844</bugzilla>
<bugzilla href="https://bugzilla.suse.com/995377">SUSE bug 995377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203226" comment="libopenssl-devel-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205687" comment="libopenssl0_9_8-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207927" comment="libopenssl0_9_8-32bit-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205688" comment="libopenssl0_9_8-hmac-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207928" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203228" comment="openssl-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205689" comment="openssl-doc-0.9.8j-0.102 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205687" comment="libopenssl0_9_8-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207927" comment="libopenssl0_9_8-32bit-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205688" comment="libopenssl0_9_8-hmac-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207928" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203784" comment="libopenssl1-devel-1.0.1g-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203785" comment="libopenssl1_0_0-1.0.1g-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203786" comment="libopenssl1_0_0-32bit-1.0.1g-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203228" comment="openssl-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205689" comment="openssl-doc-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203788" comment="openssl1-1.0.1g-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203789" comment="openssl1-doc-1.0.1g-0.52 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6304</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-6304" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6304" source="CVE"/>
    <description>
    Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6304.html">CVE-2016-6304</cve>
<bugzilla href="https://bugzilla.suse.com/1001706">SUSE bug 1001706</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1003811">SUSE bug 1003811</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1005579">SUSE bug 1005579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1021375">SUSE bug 1021375</bugzilla>
<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/999666">SUSE bug 999666</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203226" comment="libopenssl-devel-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205687" comment="libopenssl0_9_8-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207927" comment="libopenssl0_9_8-32bit-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205688" comment="libopenssl0_9_8-hmac-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207928" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203228" comment="openssl-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205689" comment="openssl-doc-0.9.8j-0.102 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205687" comment="libopenssl0_9_8-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207927" comment="libopenssl0_9_8-32bit-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205688" comment="libopenssl0_9_8-hmac-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207928" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203784" comment="libopenssl1-devel-1.0.1g-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203785" comment="libopenssl1_0_0-1.0.1g-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203786" comment="libopenssl1_0_0-32bit-1.0.1g-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203228" comment="openssl-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205689" comment="openssl-doc-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203788" comment="openssl1-1.0.1g-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203789" comment="openssl1-doc-1.0.1g-0.52 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6306</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-6306" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6306" source="CVE"/>
    <description>
    The certificate parser in OpenSSL before 1.0.1u and 1.0.2 before 1.0.2i might allow remote attackers to cause a denial of service (out-of-bounds read) via crafted certificate operations, related to s3_clnt.c and s3_srvr.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6306.html">CVE-2016-6306</cve>
<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/999668">SUSE bug 999668</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203226" comment="libopenssl-devel-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205687" comment="libopenssl0_9_8-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207927" comment="libopenssl0_9_8-32bit-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205688" comment="libopenssl0_9_8-hmac-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207928" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203228" comment="openssl-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205689" comment="openssl-doc-0.9.8j-0.102 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205687" comment="libopenssl0_9_8-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207927" comment="libopenssl0_9_8-32bit-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205688" comment="libopenssl0_9_8-hmac-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207928" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203784" comment="libopenssl1-devel-1.0.1g-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203785" comment="libopenssl1_0_0-1.0.1g-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203786" comment="libopenssl1_0_0-32bit-1.0.1g-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203228" comment="openssl-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205689" comment="openssl-doc-0.9.8j-0.102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203788" comment="openssl1-1.0.1g-0.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203789" comment="openssl1-doc-1.0.1g-0.52 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6313</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-6313" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6313" source="CVE"/>
    <description>
    The mixing functions in the random number generator in Libgcrypt before 1.5.6, 1.6.x before 1.6.6, and 1.7.x before 1.7.3 and GnuPG before 1.4.21 make it easier for attackers to obtain the values of 160 bits by leveraging knowledge of the previous 4640 bits.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6313.html">CVE-2016-6313</cve>
<bugzilla href="https://bugzilla.suse.com/1123792">SUSE bug 1123792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/994157">SUSE bug 994157</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202830" comment="libgcrypt-1.5.0-0.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209905" comment="libgcrypt11-1.5.0-0.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209906" comment="libgcrypt11-32bit-1.5.0-0.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6318</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-6318" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6318" source="CVE"/>
    <description>
    Stack-based buffer overflow in the FascistGecosUser function in lib/fascist.c in cracklib allows local users to cause a denial of service (application crash) or gain privileges via a long GECOS field, involving longbuffer.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6318.html">CVE-2016-6318</cve>
<bugzilla href="https://bugzilla.suse.com/1123113">SUSE bug 1123113</bugzilla>
<bugzilla href="https://bugzilla.suse.com/992966">SUSE bug 992966</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202473" comment="cracklib-2.8.12-56.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209195" comment="cracklib-32bit-2.8.12-56.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6321</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-6321" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6321" source="CVE"/>
    <description>
    Directory traversal vulnerability in the safer_name_suffix function in GNU tar 1.14 through 1.29 might allow remote attackers to bypass an intended protection mechanism and write to arbitrary files via vectors related to improper sanitization of the file_name parameter, aka POINTYFEATHER.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6321.html">CVE-2016-6321</cve>
<bugzilla href="https://bugzilla.suse.com/1007188">SUSE bug 1007188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123796">SUSE bug 1123796</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210820" comment="tar-1.26-1.2.10 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166329" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6329</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-6329" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6329" source="CVE"/>
    <description>
    OpenVPN, when using a 64-bit block cipher, makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTP-over-OpenVPN session using Blowfish in CBC mode, aka a "Sweet32" attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6329.html">CVE-2016-6329</cve>
<bugzilla href="https://bugzilla.suse.com/1026864">SUSE bug 1026864</bugzilla>
<bugzilla href="https://bugzilla.suse.com/995374">SUSE bug 995374</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205695" comment="openvpn-2.0.9-143.47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205696" comment="openvpn-auth-pam-plugin-2.0.9-143.47.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6351</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-6351" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6351" source="CVE"/>
    <description>
    The esp_do_dma function in hw/scsi/esp.c in QEMU (aka Quick Emulator), when built with ESP/NCR53C9x controller emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or execute arbitrary code on the QEMU host via vectors involving DMA read into ESP command buffer.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6351.html">CVE-2016-6351</cve>
<bugzilla href="https://bugzilla.suse.com/990835">SUSE bug 990835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/990843">SUSE bug 990843</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205947" comment="xen-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209054" comment="xen-doc-html-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209055" comment="xen-doc-pdf-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205948" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205949" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205950" comment="xen-libs-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209056" comment="xen-libs-32bit-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209057" comment="xen-tools-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205951" comment="xen-tools-domU-4.2.5_21-27 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205947" comment="xen-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209054" comment="xen-doc-html-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209055" comment="xen-doc-pdf-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205948" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205950" comment="xen-libs-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209056" comment="xen-libs-32bit-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209057" comment="xen-tools-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205951" comment="xen-tools-domU-4.2.5_21-27 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6352</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-6352" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6352" source="CVE"/>
    <description>
    The OneLine32 function in io-ico.c in gdk-pixbuf before 2.35.3 allows remote attackers to cause a denial of service (out-of-bounds write and crash) via crafted dimensions in an ICO file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6352.html">CVE-2016-6352</cve>
<bugzilla href="https://bugzilla.suse.com/991450">SUSE bug 991450</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202716" comment="gtk2-2.18.9-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209341" comment="gtk2-32bit-2.18.9-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209342" comment="gtk2-doc-2.18.9-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209343" comment="gtk2-lang-2.18.9-0.44 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6354</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-6354" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6354" source="CVE"/>
    <description>
    Heap-based buffer overflow in the yy_get_next_buffer function in Flex before 2.6.1 might allow context-dependent attackers to cause a denial of service or possibly execute arbitrary code via vectors involving num_to_read.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6354.html">CVE-2016-6354</cve>
<bugzilla href="https://bugzilla.suse.com/1026047">SUSE bug 1026047</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/990856">SUSE bug 990856</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202345" comment="MozillaFirefox-45.3.0esr-50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205240" comment="MozillaFirefox-translations-45.3.0esr-50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6480</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-6480" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6480" source="CVE"/>
    <description>
    Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a "double fetch" vulnerability.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6480.html">CVE-2016-6480</cve>
<bugzilla href="https://bugzilla.suse.com/1004418">SUSE bug 1004418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/991608">SUSE bug 991608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/991667">SUSE bug 991667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/992568">SUSE bug 992568</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208598" comment="kernel-bigsmp-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208599" comment="kernel-bigsmp-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208600" comment="kernel-bigsmp-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205422" comment="kernel-default-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205423" comment="kernel-default-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205424" comment="kernel-default-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205425" comment="kernel-ec2-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205426" comment="kernel-ec2-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205427" comment="kernel-ec2-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205431" comment="kernel-source-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205432" comment="kernel-syms-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205433" comment="kernel-trace-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205434" comment="kernel-trace-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205435" comment="kernel-trace-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205436" comment="kernel-xen-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205437" comment="kernel-xen-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205438" comment="kernel-xen-devel-3.0.101-0.47.86 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208598" comment="kernel-bigsmp-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208599" comment="kernel-bigsmp-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208600" comment="kernel-bigsmp-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205422" comment="kernel-default-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205423" comment="kernel-default-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205424" comment="kernel-default-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208601" comment="kernel-default-man-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205425" comment="kernel-ec2-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205426" comment="kernel-ec2-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205427" comment="kernel-ec2-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205428" comment="kernel-pae-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205429" comment="kernel-pae-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205430" comment="kernel-pae-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205431" comment="kernel-source-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205432" comment="kernel-syms-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205433" comment="kernel-trace-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205434" comment="kernel-trace-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205435" comment="kernel-trace-devel-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205436" comment="kernel-xen-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205437" comment="kernel-xen-base-3.0.101-0.47.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205438" comment="kernel-xen-devel-3.0.101-0.47.86 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6490</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-6490" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6490" source="CVE"/>
    <description>
    The virtqueue_map_desc function in hw/virtio/virtio.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a zero length for the descriptor buffer.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6490.html">CVE-2016-6490</cve>
<bugzilla href="https://bugzilla.suse.com/991466">SUSE bug 991466</bugzilla>
<bugzilla href="https://bugzilla.suse.com/993854">SUSE bug 993854</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250394" comment="kvm-1.4.2-49 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6491</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-6491" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6491" source="CVE"/>
    <description>
    Buffer overflow in the Get8BIMProperty function in MagickCore/property.c in ImageMagick before 6.9.5-4 and 7.x before 7.0.2-6 allows remote attackers to cause a denial of service (out-of-bounds read, memory leak, and crash) via a crafted image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6491.html">CVE-2016-6491</cve>
<bugzilla href="https://bugzilla.suse.com/991445">SUSE bug 991445</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202220" comment="ImageMagick-6.4.3.6-7.48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209106" comment="libMagickCore1-6.4.3.6-7.48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209107" comment="libMagickCore1-32bit-6.4.3.6-7.48 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6504</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-6504" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6504" source="CVE"/>
    <description>
    epan/dissectors/packet-ncp2222.inc in the NDS dissector in Wireshark 1.12.x before 1.12.13 does not properly maintain a ptvc data structure, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6504.html">CVE-2016-6504</cve>
<bugzilla href="https://bugzilla.suse.com/991012">SUSE bug 991012</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203584" comment="wireshark-1.12.13-0.23 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-6505" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6505" source="CVE"/>
    <description>
    epan/dissectors/packet-packetbb.c in the PacketBB dissector in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6505.html">CVE-2016-6505</cve>
<bugzilla href="https://bugzilla.suse.com/991013">SUSE bug 991013</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203584" comment="wireshark-1.12.13-0.23 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6506</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-6506" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6506" source="CVE"/>
    <description>
    epan/dissectors/packet-wsp.c in the WSP dissector in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6506.html">CVE-2016-6506</cve>
<bugzilla href="https://bugzilla.suse.com/991015">SUSE bug 991015</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203584" comment="wireshark-1.12.13-0.23 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6507</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-6507" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6507" source="CVE"/>
    <description>
    epan/dissectors/packet-mmse.c in the MMSE dissector in Wireshark 1.12.x before 1.12.13 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6507.html">CVE-2016-6507</cve>
<bugzilla href="https://bugzilla.suse.com/991016">SUSE bug 991016</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203584" comment="wireshark-1.12.13-0.23 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6508</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-6508" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6508" source="CVE"/>
    <description>
    epan/dissectors/packet-rlc.c in the RLC dissector in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 uses an incorrect integer data type, which allows remote attackers to cause a denial of service (large loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6508.html">CVE-2016-6508</cve>
<bugzilla href="https://bugzilla.suse.com/991017">SUSE bug 991017</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203584" comment="wireshark-1.12.13-0.23 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6509</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-6509" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6509" source="CVE"/>
    <description>
    epan/dissectors/packet-ldss.c in the LDSS dissector in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 mishandles conversations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6509.html">CVE-2016-6509</cve>
<bugzilla href="https://bugzilla.suse.com/991018">SUSE bug 991018</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203584" comment="wireshark-1.12.13-0.23 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6510</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-6510" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6510" source="CVE"/>
    <description>
    Off-by-one error in epan/dissectors/packet-rlc.c in the RLC dissector in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6510.html">CVE-2016-6510</cve>
<bugzilla href="https://bugzilla.suse.com/991019">SUSE bug 991019</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203584" comment="wireshark-1.12.13-0.23 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-6511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6511" source="CVE"/>
    <description>
    epan/proto.c in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 allows remote attackers to cause a denial of service (OpenFlow dissector large loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6511.html">CVE-2016-6511</cve>
<bugzilla href="https://bugzilla.suse.com/991020">SUSE bug 991020</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203584" comment="wireshark-1.12.13-0.23 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6515</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-6515" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6515" source="CVE"/>
    <description>
    The auth_password function in auth-passwd.c in sshd in OpenSSH before 7.3 does not limit password lengths for password authentication, which allows remote attackers to cause a denial of service (crypt CPU consumption) via a long string.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6515.html">CVE-2016-6515</cve>
<bugzilla href="https://bugzilla.suse.com/1087412">SUSE bug 1087412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/992533">SUSE bug 992533</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205681" comment="openssh-6.2p2-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205682" comment="openssh-askpass-6.2p2-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205683" comment="openssh-askpass-gnome-6.2p2-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203762" comment="openssh-openssl1-6.6p1-15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203763" comment="openssh-openssl1-helpers-6.6p1-15 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205681" comment="openssh-6.2p2-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205682" comment="openssh-askpass-6.2p2-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205683" comment="openssh-askpass-gnome-6.2p2-0.33 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6520</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-6520" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6520" source="CVE"/>
    <description>
    Buffer overflow in MagickCore/enhance.c in ImageMagick before 7.0.2-7 allows remote attackers to have unspecified impact via vectors related to pixel cache morphology.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6520.html">CVE-2016-6520</cve>
<bugzilla href="https://bugzilla.suse.com/991872">SUSE bug 991872</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202220" comment="ImageMagick-6.4.3.6-7.48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209106" comment="libMagickCore1-6.4.3.6-7.48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209107" comment="libMagickCore1-32bit-6.4.3.6-7.48 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6662</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-6662" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6662" source="CVE"/>
    <description>
    Oracle MySQL through 5.5.52, 5.6.x through 5.6.33, and 5.7.x through 5.7.15; MariaDB before 5.5.51, 10.0.x before 10.0.27, and 10.1.x before 10.1.17; and Percona Server before 5.5.51-38.1, 5.6.x before 5.6.32-78.0, and 5.7.x before 5.7.14-7 allow local users to create arbitrary configurations and bypass certain protection mechanisms by setting general_log_file to a my.cnf configuration. NOTE: this can be leveraged to execute arbitrary code with root privileges by setting malloc_lib. NOTE: the affected MySQL version information is from Oracle's October 2016 CPU. Oracle has not commented on third-party claims that the issue was silently patched in MySQL 5.5.52, 5.6.33, and 5.7.15.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6662.html">CVE-2016-6662</cve>
<bugzilla href="https://bugzilla.suse.com/1001367">SUSE bug 1001367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1005580">SUSE bug 1005580</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1020873">SUSE bug 1020873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1020884">SUSE bug 1020884</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1021755">SUSE bug 1021755</bugzilla>
<bugzilla href="https://bugzilla.suse.com/998309">SUSE bug 998309</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205667" comment="libmysql55client18-5.5.52-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208790" comment="libmysql55client18-32bit-5.5.52-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205668" comment="libmysql55client_r18-5.5.52-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203168" comment="mysql-5.5.52-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205669" comment="mysql-client-5.5.52-0.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205670" comment="mysql-tools-5.5.52-0.27 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210054" comment="libmysql55client18-5.5.53-0.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210055" comment="libmysql55client18-32bit-5.5.53-0.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210057" comment="libmysql55client_r18-5.5.53-0.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203171" comment="mysql-5.5.53-0.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210058" comment="mysql-client-5.5.53-0.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210059" comment="mysql-tools-5.5.53-0.30 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6794</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-6794" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6794" source="CVE"/>
    <description>
    When a SecurityManager is configured, a web application's ability to read system properties should be controlled by the SecurityManager. In Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70, 6.0.0 to 6.0.45 the system property replacement feature for configuration files could be used by a malicious web application to bypass the SecurityManager and read system properties that should not be visible.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6794.html">CVE-2016-6794</cve>
<bugzilla href="https://bugzilla.suse.com/1007857">SUSE bug 1007857</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205936" comment="tomcat6-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205937" comment="tomcat6-admin-webapps-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205938" comment="tomcat6-docs-webapp-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205939" comment="tomcat6-javadoc-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205940" comment="tomcat6-jsp-2_1-api-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205941" comment="tomcat6-lib-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205942" comment="tomcat6-servlet-2_5-api-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205943" comment="tomcat6-webapps-6.0.53-0.56 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6796</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-6796" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6796" source="CVE"/>
    <description>
    A malicious web application running on Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 was able to bypass a configured SecurityManager via manipulation of the configuration parameters for the JSP Servlet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6796.html">CVE-2016-6796</cve>
<bugzilla href="https://bugzilla.suse.com/1007858">SUSE bug 1007858</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205936" comment="tomcat6-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205937" comment="tomcat6-admin-webapps-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205938" comment="tomcat6-docs-webapp-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205939" comment="tomcat6-javadoc-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205940" comment="tomcat6-jsp-2_1-api-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205941" comment="tomcat6-lib-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205942" comment="tomcat6-servlet-2_5-api-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205943" comment="tomcat6-webapps-6.0.53-0.56 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6797</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-6797" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6797" source="CVE"/>
    <description>
    The ResourceLinkFactory implementation in Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not limit web application access to global JNDI resources to those resources explicitly linked to the web application. Therefore, it was possible for a web application to access any global JNDI resource whether an explicit ResourceLink had been configured or not.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6797.html">CVE-2016-6797</cve>
<bugzilla href="https://bugzilla.suse.com/1007853">SUSE bug 1007853</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205936" comment="tomcat6-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205937" comment="tomcat6-admin-webapps-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205938" comment="tomcat6-docs-webapp-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205939" comment="tomcat6-javadoc-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205940" comment="tomcat6-jsp-2_1-api-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205941" comment="tomcat6-lib-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205942" comment="tomcat6-servlet-2_5-api-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205943" comment="tomcat6-webapps-6.0.53-0.56 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6816</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-6816" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6816" source="CVE"/>
    <description>
    The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6816.html">CVE-2016-6816</cve>
<bugzilla href="https://bugzilla.suse.com/1011812">SUSE bug 1011812</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205936" comment="tomcat6-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205937" comment="tomcat6-admin-webapps-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205938" comment="tomcat6-docs-webapp-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205939" comment="tomcat6-javadoc-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205940" comment="tomcat6-jsp-2_1-api-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205941" comment="tomcat6-lib-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205942" comment="tomcat6-servlet-2_5-api-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205943" comment="tomcat6-webapps-6.0.53-0.56 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6823</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-6823" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6823" source="CVE"/>
    <description>
    Integer overflow in the BMP coder in ImageMagick before 7.0.2-10 allows remote attackers to cause a denial of service (crash) via crafted height and width values, which triggers an out-of-bounds write.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6823.html">CVE-2016-6823</cve>
<bugzilla href="https://bugzilla.suse.com/1001066">SUSE bug 1001066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1002207">SUSE bug 1002207</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202227" comment="ImageMagick-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209108" comment="libMagickCore1-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209109" comment="libMagickCore1-32bit-6.4.3.6-7.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6828</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-6828" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6828" source="CVE"/>
    <description>
    The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6828.html">CVE-2016-6828</cve>
<bugzilla href="https://bugzilla.suse.com/1052256">SUSE bug 1052256</bugzilla>
<bugzilla href="https://bugzilla.suse.com/994296">SUSE bug 994296</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208770" comment="kernel-default-man-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205650" comment="kernel-pae-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205651" comment="kernel-pae-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205652" comment="kernel-pae-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6829</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-6829" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6829" source="CVE"/>
    <description>
    The trove service user in (1) Openstack deployment (aka crowbar-openstack) and (2) Trove Barclamp (aka barclamp-trove and crowbar-barclamp-trove) in the Crowbar Framework has a default password, which makes it easier for remote attackers to obtain access via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6829.html">CVE-2016-6829</cve>
<bugzilla href="https://bugzilla.suse.com/991729">SUSE bug 991729</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009215789" comment="crowbar-barclamp-trove-1.9+git.1473844105.932298f-9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6893</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-6893" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6893" source="CVE"/>
    <description>
    Cross-site request forgery (CSRF) vulnerability in the user options page in GNU Mailman 2.1.x before 2.1.23 allows remote attackers to hijack the authentication of arbitrary users for requests that modify an option, as demonstrated by gaining access to the credentials of a victim's account.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6893.html">CVE-2016-6893</cve>
<bugzilla href="https://bugzilla.suse.com/995352">SUSE bug 995352</bugzilla>
<bugzilla href="https://bugzilla.suse.com/997205">SUSE bug 997205</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009242811" comment="mailman-2.1.15-9.6.6 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009255760" comment="mailman-2.1.15-9.6.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6911</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-6911" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6911" source="CVE"/>
    <description>
    The dynamicGetbuf function in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TIFF image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6911.html">CVE-2016-6911</cve>
<bugzilla href="https://bugzilla.suse.com/1004924">SUSE bug 1004924</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1005274">SUSE bug 1005274</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210356" comment="apache2-mod_php53-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202612" comment="gd-2.0.36.RC1-52.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203296" comment="php53-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210357" comment="php53-bcmath-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210358" comment="php53-bz2-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210359" comment="php53-calendar-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210360" comment="php53-ctype-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210361" comment="php53-curl-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210362" comment="php53-dba-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210363" comment="php53-dom-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210364" comment="php53-exif-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210365" comment="php53-fastcgi-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210366" comment="php53-fileinfo-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210367" comment="php53-ftp-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210368" comment="php53-gd-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210369" comment="php53-gettext-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210370" comment="php53-gmp-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210371" comment="php53-iconv-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210372" comment="php53-intl-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210373" comment="php53-json-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210374" comment="php53-ldap-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210375" comment="php53-mbstring-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210376" comment="php53-mcrypt-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210377" comment="php53-mysql-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210378" comment="php53-odbc-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210379" comment="php53-openssl-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210380" comment="php53-pcntl-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210381" comment="php53-pdo-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210382" comment="php53-pear-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210383" comment="php53-pgsql-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210384" comment="php53-pspell-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210385" comment="php53-shmop-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210386" comment="php53-snmp-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210387" comment="php53-soap-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210388" comment="php53-suhosin-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210389" comment="php53-sysvmsg-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210390" comment="php53-sysvsem-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210391" comment="php53-sysvshm-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210392" comment="php53-tokenizer-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210393" comment="php53-wddx-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210394" comment="php53-xmlreader-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210395" comment="php53-xmlrpc-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210396" comment="php53-xmlwriter-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210397" comment="php53-xsl-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210398" comment="php53-zip-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210399" comment="php53-zlib-5.3.17-87 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7032</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7032" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7032" source="CVE"/>
    <description>
    sudo_noexec.so in Sudo before 1.8.15 on Linux might allow local users to bypass intended noexec command restrictions via an application that calls the (1) system or (2) popen function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7032.html">CVE-2016-7032</cve>
<bugzilla href="https://bugzilla.suse.com/1007501">SUSE bug 1007501</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1007766">SUSE bug 1007766</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1011975">SUSE bug 1011975</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1011976">SUSE bug 1011976</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1149974">SUSE bug 1149974</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1149975">SUSE bug 1149975</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210818" comment="sudo-1.7.6p2-0.29 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7042</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-7042" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7042" source="CVE"/>
    <description>
    The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7042.html">CVE-2016-7042</cve>
<bugzilla href="https://bugzilla.suse.com/1004517">SUSE bug 1004517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1025354">SUSE bug 1025354</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208770" comment="kernel-default-man-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205650" comment="kernel-pae-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205651" comment="kernel-pae-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205652" comment="kernel-pae-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7056</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-7056" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7056" source="CVE"/>
    <description>
    A timing attack flaw was found in OpenSSL 1.0.1u and before that could allow a malicious user with local access to recover ECDSA P-256 private keys.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7056.html">CVE-2016-7056</cve>
<bugzilla href="https://bugzilla.suse.com/1005878">SUSE bug 1005878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1018910">SUSE bug 1018910</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1019334">SUSE bug 1019334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1025347">SUSE bug 1025347</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203229" comment="libopenssl-devel-0.9.8j-0.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205690" comment="libopenssl0_9_8-0.9.8j-0.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208804" comment="libopenssl0_9_8-32bit-0.9.8j-0.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205691" comment="libopenssl0_9_8-hmac-0.9.8j-0.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208805" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203231" comment="openssl-0.9.8j-0.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205692" comment="openssl-doc-0.9.8j-0.105 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205690" comment="libopenssl0_9_8-0.9.8j-0.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208804" comment="libopenssl0_9_8-32bit-0.9.8j-0.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205691" comment="libopenssl0_9_8-hmac-0.9.8j-0.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208805" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203790" comment="libopenssl1-devel-1.0.1g-0.57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248700" comment="libopenssl1-devel-32bit-1.0.1g-0.57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203791" comment="libopenssl1_0_0-1.0.1g-0.57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203792" comment="libopenssl1_0_0-32bit-1.0.1g-0.57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203231" comment="openssl-0.9.8j-0.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205692" comment="openssl-doc-0.9.8j-0.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203794" comment="openssl1-1.0.1g-0.57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203795" comment="openssl1-doc-1.0.1g-0.57 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7076</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7076" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7076" source="CVE"/>
    <description>
    sudo before version 1.8.18p1 is vulnerable to a bypass in the sudo noexec restriction if application run via sudo executed wordexp() C library function with a user supplied argument. A local user permitted to run such application via sudo with noexec restriction could possibly use this flaw to execute arbitrary commands with elevated privileges.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7076.html">CVE-2016-7076</cve>
<bugzilla href="https://bugzilla.suse.com/1007501">SUSE bug 1007501</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1011975">SUSE bug 1011975</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1011976">SUSE bug 1011976</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1149974">SUSE bug 1149974</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1149975">SUSE bug 1149975</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210818" comment="sudo-1.7.6p2-0.29 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7092</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-7092" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7092" source="CVE"/>
    <description>
    The get_page_from_l3e function in arch/x86/mm.c in Xen allows local 32-bit PV guest OS administrators to gain host OS privileges via vectors related to L3 recursive pagetables.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7092.html">CVE-2016-7092</cve>
<bugzilla href="https://bugzilla.suse.com/995785">SUSE bug 995785</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205947" comment="xen-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209054" comment="xen-doc-html-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209055" comment="xen-doc-pdf-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205948" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205949" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205950" comment="xen-libs-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209056" comment="xen-libs-32bit-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209057" comment="xen-tools-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205951" comment="xen-tools-domU-4.2.5_21-27 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205947" comment="xen-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209054" comment="xen-doc-html-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209055" comment="xen-doc-pdf-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205948" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205950" comment="xen-libs-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209056" comment="xen-libs-32bit-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209057" comment="xen-tools-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205951" comment="xen-tools-domU-4.2.5_21-27 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7094</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-7094" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7094" source="CVE"/>
    <description>
    Buffer overflow in Xen 4.7.x and earlier allows local x86 HVM guest OS administrators on guests running with shadow paging to cause a denial of service via a pagetable update.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7094.html">CVE-2016-7094</cve>
<bugzilla href="https://bugzilla.suse.com/995792">SUSE bug 995792</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205947" comment="xen-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209054" comment="xen-doc-html-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209055" comment="xen-doc-pdf-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205948" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205949" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205950" comment="xen-libs-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209056" comment="xen-libs-32bit-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209057" comment="xen-tools-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205951" comment="xen-tools-domU-4.2.5_21-27 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205947" comment="xen-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209054" comment="xen-doc-html-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209055" comment="xen-doc-pdf-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205948" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205950" comment="xen-libs-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209056" comment="xen-libs-32bit-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209057" comment="xen-tools-4.2.5_21-27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205951" comment="xen-tools-domU-4.2.5_21-27 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7097</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-7097" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7097" source="CVE"/>
    <description>
    The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7097.html">CVE-2016-7097</cve>
<bugzilla href="https://bugzilla.suse.com/1021258">SUSE bug 1021258</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1052256">SUSE bug 1052256</bugzilla>
<bugzilla href="https://bugzilla.suse.com/870618">SUSE bug 870618</bugzilla>
<bugzilla href="https://bugzilla.suse.com/995968">SUSE bug 995968</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208770" comment="kernel-default-man-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205650" comment="kernel-pae-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205651" comment="kernel-pae-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205652" comment="kernel-pae-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7098</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-7098" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7098" source="CVE"/>
    <description>
    Race condition in wget 1.17 and earlier, when used in recursive or mirroring mode to download a single file, might allow remote servers to bypass intended access list restrictions by keeping an HTTP connection open.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7098.html">CVE-2016-7098</cve>
<bugzilla href="https://bugzilla.suse.com/995964">SUSE bug 995964</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205945" comment="wget-1.11.4-1.32 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205945" comment="wget-1.11.4-1.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203813" comment="wget-openssl1-1.11.4-1.32 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7101</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7101" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7101" source="CVE"/>
    <description>
    The SGI coder in ImageMagick before 7.0.2-10 allows remote attackers to cause a denial of service (out-of-bounds read) via a large row value in an sgi file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7101.html">CVE-2016-7101</cve>
<bugzilla href="https://bugzilla.suse.com/1001221">SUSE bug 1001221</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1002207">SUSE bug 1002207</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202227" comment="ImageMagick-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209108" comment="libMagickCore1-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209109" comment="libMagickCore1-32bit-6.4.3.6-7.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7116</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7116" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7116" source="CVE"/>
    <description>
    Directory traversal vulnerability in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to access host files outside the export path via a .. (dot dot) in an unspecified string.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7116.html">CVE-2016-7116</cve>
<bugzilla href="https://bugzilla.suse.com/996441">SUSE bug 996441</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250394" comment="kvm-1.4.2-49 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7117</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-7117" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7117" source="CVE"/>
    <description>
    Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7117.html">CVE-2016-7117</cve>
<bugzilla href="https://bugzilla.suse.com/1003077">SUSE bug 1003077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1003253">SUSE bug 1003253</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1057478">SUSE bug 1057478</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208770" comment="kernel-default-man-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205650" comment="kernel-pae-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205651" comment="kernel-pae-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205652" comment="kernel-pae-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7124</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-7124" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7124" source="CVE"/>
    <description>
    ext/standard/var_unserializer.c in PHP before 5.6.25 and 7.x before 7.0.10 mishandles certain invalid objects, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data that leads to a (1) __destruct call or (2) magic method call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7124.html">CVE-2016-7124</cve>
<bugzilla href="https://bugzilla.suse.com/997206">SUSE bug 997206</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205699" comment="apache2-mod_php53-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203288" comment="php53-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205700" comment="php53-bcmath-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205701" comment="php53-bz2-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205702" comment="php53-calendar-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205703" comment="php53-ctype-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205704" comment="php53-curl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205705" comment="php53-dba-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205706" comment="php53-dom-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205707" comment="php53-exif-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205708" comment="php53-fastcgi-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205709" comment="php53-fileinfo-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205710" comment="php53-ftp-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205711" comment="php53-gd-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205712" comment="php53-gettext-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205713" comment="php53-gmp-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205714" comment="php53-iconv-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205715" comment="php53-intl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205716" comment="php53-json-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205717" comment="php53-ldap-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205718" comment="php53-mbstring-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205719" comment="php53-mcrypt-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205720" comment="php53-mysql-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205721" comment="php53-odbc-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205722" comment="php53-openssl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205723" comment="php53-pcntl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205724" comment="php53-pdo-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205725" comment="php53-pear-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205726" comment="php53-pgsql-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205727" comment="php53-pspell-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205728" comment="php53-shmop-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205729" comment="php53-snmp-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205730" comment="php53-soap-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205731" comment="php53-suhosin-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205732" comment="php53-sysvmsg-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205733" comment="php53-sysvsem-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205734" comment="php53-sysvshm-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205735" comment="php53-tokenizer-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205736" comment="php53-wddx-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205737" comment="php53-xmlreader-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205738" comment="php53-xmlrpc-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205739" comment="php53-xmlwriter-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205740" comment="php53-xsl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205741" comment="php53-zip-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205742" comment="php53-zlib-5.3.17-84 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7125</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-7125" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7125" source="CVE"/>
    <description>
    ext/session/session.c in PHP before 5.6.25 and 7.x before 7.0.10 skips invalid session names in a way that triggers incorrect parsing, which allows remote attackers to inject arbitrary-type session data by leveraging control of a session name, as demonstrated by object injection.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7125.html">CVE-2016-7125</cve>
<bugzilla href="https://bugzilla.suse.com/997207">SUSE bug 997207</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205699" comment="apache2-mod_php53-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203288" comment="php53-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205700" comment="php53-bcmath-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205701" comment="php53-bz2-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205702" comment="php53-calendar-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205703" comment="php53-ctype-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205704" comment="php53-curl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205705" comment="php53-dba-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205706" comment="php53-dom-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205707" comment="php53-exif-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205708" comment="php53-fastcgi-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205709" comment="php53-fileinfo-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205710" comment="php53-ftp-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205711" comment="php53-gd-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205712" comment="php53-gettext-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205713" comment="php53-gmp-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205714" comment="php53-iconv-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205715" comment="php53-intl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205716" comment="php53-json-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205717" comment="php53-ldap-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205718" comment="php53-mbstring-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205719" comment="php53-mcrypt-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205720" comment="php53-mysql-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205721" comment="php53-odbc-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205722" comment="php53-openssl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205723" comment="php53-pcntl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205724" comment="php53-pdo-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205725" comment="php53-pear-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205726" comment="php53-pgsql-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205727" comment="php53-pspell-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205728" comment="php53-shmop-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205729" comment="php53-snmp-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205730" comment="php53-soap-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205731" comment="php53-suhosin-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205732" comment="php53-sysvmsg-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205733" comment="php53-sysvsem-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205734" comment="php53-sysvshm-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205735" comment="php53-tokenizer-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205736" comment="php53-wddx-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205737" comment="php53-xmlreader-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205738" comment="php53-xmlrpc-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205739" comment="php53-xmlwriter-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205740" comment="php53-xsl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205741" comment="php53-zip-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205742" comment="php53-zlib-5.3.17-84 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-7126" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7126" source="CVE"/>
    <description>
    The imagetruecolortopalette function in ext/gd/gd.c in PHP before 5.6.25 and 7.x before 7.0.10 does not properly validate the number of colors, which allows remote attackers to cause a denial of service (select_colors allocation error and out-of-bounds write) or possibly have unspecified other impact via a large value in the third argument.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7126.html">CVE-2016-7126</cve>
<bugzilla href="https://bugzilla.suse.com/997208">SUSE bug 997208</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205699" comment="apache2-mod_php53-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203288" comment="php53-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205700" comment="php53-bcmath-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205701" comment="php53-bz2-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205702" comment="php53-calendar-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205703" comment="php53-ctype-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205704" comment="php53-curl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205705" comment="php53-dba-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205706" comment="php53-dom-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205707" comment="php53-exif-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205708" comment="php53-fastcgi-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205709" comment="php53-fileinfo-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205710" comment="php53-ftp-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205711" comment="php53-gd-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205712" comment="php53-gettext-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205713" comment="php53-gmp-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205714" comment="php53-iconv-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205715" comment="php53-intl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205716" comment="php53-json-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205717" comment="php53-ldap-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205718" comment="php53-mbstring-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205719" comment="php53-mcrypt-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205720" comment="php53-mysql-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205721" comment="php53-odbc-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205722" comment="php53-openssl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205723" comment="php53-pcntl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205724" comment="php53-pdo-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205725" comment="php53-pear-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205726" comment="php53-pgsql-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205727" comment="php53-pspell-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205728" comment="php53-shmop-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205729" comment="php53-snmp-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205730" comment="php53-soap-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205731" comment="php53-suhosin-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205732" comment="php53-sysvmsg-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205733" comment="php53-sysvsem-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205734" comment="php53-sysvshm-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205735" comment="php53-tokenizer-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205736" comment="php53-wddx-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205737" comment="php53-xmlreader-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205738" comment="php53-xmlrpc-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205739" comment="php53-xmlwriter-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205740" comment="php53-xsl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205741" comment="php53-zip-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205742" comment="php53-zlib-5.3.17-84 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7127</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-7127" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7127" source="CVE"/>
    <description>
    The imagegammacorrect function in ext/gd/gd.c in PHP before 5.6.25 and 7.x before 7.0.10 does not properly validate gamma values, which allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact by providing different signs for the second and third arguments.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7127.html">CVE-2016-7127</cve>
<bugzilla href="https://bugzilla.suse.com/997210">SUSE bug 997210</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205699" comment="apache2-mod_php53-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203288" comment="php53-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205700" comment="php53-bcmath-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205701" comment="php53-bz2-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205702" comment="php53-calendar-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205703" comment="php53-ctype-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205704" comment="php53-curl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205705" comment="php53-dba-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205706" comment="php53-dom-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205707" comment="php53-exif-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205708" comment="php53-fastcgi-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205709" comment="php53-fileinfo-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205710" comment="php53-ftp-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205711" comment="php53-gd-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205712" comment="php53-gettext-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205713" comment="php53-gmp-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205714" comment="php53-iconv-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205715" comment="php53-intl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205716" comment="php53-json-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205717" comment="php53-ldap-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205718" comment="php53-mbstring-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205719" comment="php53-mcrypt-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205720" comment="php53-mysql-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205721" comment="php53-odbc-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205722" comment="php53-openssl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205723" comment="php53-pcntl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205724" comment="php53-pdo-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205725" comment="php53-pear-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205726" comment="php53-pgsql-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205727" comment="php53-pspell-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205728" comment="php53-shmop-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205729" comment="php53-snmp-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205730" comment="php53-soap-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205731" comment="php53-suhosin-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205732" comment="php53-sysvmsg-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205733" comment="php53-sysvsem-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205734" comment="php53-sysvshm-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205735" comment="php53-tokenizer-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205736" comment="php53-wddx-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205737" comment="php53-xmlreader-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205738" comment="php53-xmlrpc-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205739" comment="php53-xmlwriter-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205740" comment="php53-xsl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205741" comment="php53-zip-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205742" comment="php53-zlib-5.3.17-84 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7128</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-7128" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7128" source="CVE"/>
    <description>
    The exif_process_IFD_in_TIFF function in ext/exif/exif.c in PHP before 5.6.25 and 7.x before 7.0.10 mishandles the case of a thumbnail offset that exceeds the file size, which allows remote attackers to obtain sensitive information from process memory via a crafted TIFF image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7128.html">CVE-2016-7128</cve>
<bugzilla href="https://bugzilla.suse.com/997211">SUSE bug 997211</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205699" comment="apache2-mod_php53-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203288" comment="php53-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205700" comment="php53-bcmath-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205701" comment="php53-bz2-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205702" comment="php53-calendar-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205703" comment="php53-ctype-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205704" comment="php53-curl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205705" comment="php53-dba-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205706" comment="php53-dom-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205707" comment="php53-exif-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205708" comment="php53-fastcgi-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205709" comment="php53-fileinfo-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205710" comment="php53-ftp-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205711" comment="php53-gd-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205712" comment="php53-gettext-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205713" comment="php53-gmp-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205714" comment="php53-iconv-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205715" comment="php53-intl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205716" comment="php53-json-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205717" comment="php53-ldap-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205718" comment="php53-mbstring-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205719" comment="php53-mcrypt-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205720" comment="php53-mysql-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205721" comment="php53-odbc-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205722" comment="php53-openssl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205723" comment="php53-pcntl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205724" comment="php53-pdo-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205725" comment="php53-pear-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205726" comment="php53-pgsql-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205727" comment="php53-pspell-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205728" comment="php53-shmop-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205729" comment="php53-snmp-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205730" comment="php53-soap-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205731" comment="php53-suhosin-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205732" comment="php53-sysvmsg-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205733" comment="php53-sysvsem-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205734" comment="php53-sysvshm-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205735" comment="php53-tokenizer-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205736" comment="php53-wddx-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205737" comment="php53-xmlreader-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205738" comment="php53-xmlrpc-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205739" comment="php53-xmlwriter-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205740" comment="php53-xsl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205741" comment="php53-zip-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205742" comment="php53-zlib-5.3.17-84 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7129</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-7129" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7129" source="CVE"/>
    <description>
    The php_wddx_process_data function in ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via an invalid ISO 8601 time value, as demonstrated by a wddx_deserialize call that mishandles a dateTime element in a wddxPacket XML document.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7129.html">CVE-2016-7129</cve>
<bugzilla href="https://bugzilla.suse.com/997220">SUSE bug 997220</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205699" comment="apache2-mod_php53-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203288" comment="php53-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205700" comment="php53-bcmath-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205701" comment="php53-bz2-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205702" comment="php53-calendar-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205703" comment="php53-ctype-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205704" comment="php53-curl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205705" comment="php53-dba-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205706" comment="php53-dom-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205707" comment="php53-exif-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205708" comment="php53-fastcgi-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205709" comment="php53-fileinfo-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205710" comment="php53-ftp-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205711" comment="php53-gd-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205712" comment="php53-gettext-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205713" comment="php53-gmp-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205714" comment="php53-iconv-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205715" comment="php53-intl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205716" comment="php53-json-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205717" comment="php53-ldap-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205718" comment="php53-mbstring-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205719" comment="php53-mcrypt-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205720" comment="php53-mysql-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205721" comment="php53-odbc-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205722" comment="php53-openssl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205723" comment="php53-pcntl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205724" comment="php53-pdo-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205725" comment="php53-pear-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205726" comment="php53-pgsql-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205727" comment="php53-pspell-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205728" comment="php53-shmop-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205729" comment="php53-snmp-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205730" comment="php53-soap-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205731" comment="php53-suhosin-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205732" comment="php53-sysvmsg-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205733" comment="php53-sysvsem-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205734" comment="php53-sysvshm-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205735" comment="php53-tokenizer-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205736" comment="php53-wddx-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205737" comment="php53-xmlreader-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205738" comment="php53-xmlrpc-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205739" comment="php53-xmlwriter-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205740" comment="php53-xsl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205741" comment="php53-zip-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205742" comment="php53-zlib-5.3.17-84 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7130</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-7130" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7130" source="CVE"/>
    <description>
    The php_wddx_pop_element function in ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly have unspecified other impact via an invalid base64 binary value, as demonstrated by a wddx_deserialize call that mishandles a binary element in a wddxPacket XML document.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7130.html">CVE-2016-7130</cve>
<bugzilla href="https://bugzilla.suse.com/997257">SUSE bug 997257</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205699" comment="apache2-mod_php53-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203288" comment="php53-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205700" comment="php53-bcmath-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205701" comment="php53-bz2-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205702" comment="php53-calendar-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205703" comment="php53-ctype-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205704" comment="php53-curl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205705" comment="php53-dba-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205706" comment="php53-dom-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205707" comment="php53-exif-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205708" comment="php53-fastcgi-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205709" comment="php53-fileinfo-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205710" comment="php53-ftp-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205711" comment="php53-gd-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205712" comment="php53-gettext-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205713" comment="php53-gmp-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205714" comment="php53-iconv-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205715" comment="php53-intl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205716" comment="php53-json-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205717" comment="php53-ldap-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205718" comment="php53-mbstring-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205719" comment="php53-mcrypt-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205720" comment="php53-mysql-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205721" comment="php53-odbc-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205722" comment="php53-openssl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205723" comment="php53-pcntl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205724" comment="php53-pdo-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205725" comment="php53-pear-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205726" comment="php53-pgsql-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205727" comment="php53-pspell-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205728" comment="php53-shmop-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205729" comment="php53-snmp-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205730" comment="php53-soap-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205731" comment="php53-suhosin-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205732" comment="php53-sysvmsg-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205733" comment="php53-sysvsem-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205734" comment="php53-sysvshm-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205735" comment="php53-tokenizer-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205736" comment="php53-wddx-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205737" comment="php53-xmlreader-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205738" comment="php53-xmlrpc-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205739" comment="php53-xmlwriter-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205740" comment="php53-xsl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205741" comment="php53-zip-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205742" comment="php53-zlib-5.3.17-84 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7131</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-7131" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7131" source="CVE"/>
    <description>
    ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly have unspecified other impact via a malformed wddxPacket XML document that is mishandled in a wddx_deserialize call, as demonstrated by a tag that lacks a &lt; (less than) character.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7131.html">CVE-2016-7131</cve>
<bugzilla href="https://bugzilla.suse.com/997225">SUSE bug 997225</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205699" comment="apache2-mod_php53-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203288" comment="php53-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205700" comment="php53-bcmath-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205701" comment="php53-bz2-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205702" comment="php53-calendar-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205703" comment="php53-ctype-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205704" comment="php53-curl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205705" comment="php53-dba-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205706" comment="php53-dom-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205707" comment="php53-exif-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205708" comment="php53-fastcgi-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205709" comment="php53-fileinfo-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205710" comment="php53-ftp-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205711" comment="php53-gd-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205712" comment="php53-gettext-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205713" comment="php53-gmp-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205714" comment="php53-iconv-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205715" comment="php53-intl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205716" comment="php53-json-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205717" comment="php53-ldap-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205718" comment="php53-mbstring-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205719" comment="php53-mcrypt-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205720" comment="php53-mysql-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205721" comment="php53-odbc-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205722" comment="php53-openssl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205723" comment="php53-pcntl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205724" comment="php53-pdo-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205725" comment="php53-pear-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205726" comment="php53-pgsql-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205727" comment="php53-pspell-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205728" comment="php53-shmop-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205729" comment="php53-snmp-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205730" comment="php53-soap-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205731" comment="php53-suhosin-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205732" comment="php53-sysvmsg-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205733" comment="php53-sysvsem-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205734" comment="php53-sysvshm-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205735" comment="php53-tokenizer-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205736" comment="php53-wddx-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205737" comment="php53-xmlreader-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205738" comment="php53-xmlrpc-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205739" comment="php53-xmlwriter-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205740" comment="php53-xsl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205741" comment="php53-zip-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205742" comment="php53-zlib-5.3.17-84 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7132</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-7132" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7132" source="CVE"/>
    <description>
    ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly have unspecified other impact via an invalid wddxPacket XML document that is mishandled in a wddx_deserialize call, as demonstrated by a stray element inside a boolean element, leading to incorrect pop processing.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7132.html">CVE-2016-7132</cve>
<bugzilla href="https://bugzilla.suse.com/997230">SUSE bug 997230</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205699" comment="apache2-mod_php53-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203288" comment="php53-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205700" comment="php53-bcmath-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205701" comment="php53-bz2-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205702" comment="php53-calendar-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205703" comment="php53-ctype-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205704" comment="php53-curl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205705" comment="php53-dba-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205706" comment="php53-dom-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205707" comment="php53-exif-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205708" comment="php53-fastcgi-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205709" comment="php53-fileinfo-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205710" comment="php53-ftp-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205711" comment="php53-gd-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205712" comment="php53-gettext-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205713" comment="php53-gmp-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205714" comment="php53-iconv-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205715" comment="php53-intl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205716" comment="php53-json-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205717" comment="php53-ldap-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205718" comment="php53-mbstring-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205719" comment="php53-mcrypt-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205720" comment="php53-mysql-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205721" comment="php53-odbc-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205722" comment="php53-openssl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205723" comment="php53-pcntl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205724" comment="php53-pdo-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205725" comment="php53-pear-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205726" comment="php53-pgsql-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205727" comment="php53-pspell-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205728" comment="php53-shmop-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205729" comment="php53-snmp-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205730" comment="php53-soap-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205731" comment="php53-suhosin-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205732" comment="php53-sysvmsg-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205733" comment="php53-sysvsem-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205734" comment="php53-sysvshm-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205735" comment="php53-tokenizer-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205736" comment="php53-wddx-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205737" comment="php53-xmlreader-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205738" comment="php53-xmlrpc-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205739" comment="php53-xmlwriter-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205740" comment="php53-xsl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205741" comment="php53-zip-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205742" comment="php53-zlib-5.3.17-84 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7141</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-7141" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7141" source="CVE"/>
    <description>
    curl and libcurl before 7.50.2, when built with NSS and the libnsspem.so library is available at runtime, allow remote attackers to hijack the authentication of a TLS connection by leveraging reuse of a previously loaded client certificate from file for a connection for which no certificate has been set, a different vulnerability than CVE-2016-5420.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7141.html">CVE-2016-7141</cve>
<bugzilla href="https://bugzilla.suse.com/991390">SUSE bug 991390</bugzilla>
<bugzilla href="https://bugzilla.suse.com/997420">SUSE bug 997420</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202477" comment="curl-7.19.7-1.61 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203709" comment="curl-openssl1-7.19.7-1.61 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205315" comment="libcurl4-7.19.7-1.61 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208454" comment="libcurl4-32bit-7.19.7-1.61 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203710" comment="libcurl4-openssl1-7.19.7-1.61 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203711" comment="libcurl4-openssl1-32bit-7.19.7-1.61 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202477" comment="curl-7.19.7-1.61 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205315" comment="libcurl4-7.19.7-1.61 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208454" comment="libcurl4-32bit-7.19.7-1.61 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202487" comment="curl-7.19.7-1.70.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203729" comment="curl-openssl1-7.19.7-1.70.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209210" comment="libcurl4-7.19.7-1.70.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209211" comment="libcurl4-32bit-7.19.7-1.70.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203730" comment="libcurl4-openssl1-7.19.7-1.70.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203731" comment="libcurl4-openssl1-32bit-7.19.7-1.70.13 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7161</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7161" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7161" source="CVE"/>
    <description>
    Heap-based buffer overflow in the .receive callback of xlnx.xps-ethernetlite in QEMU (aka Quick Emulator) allows attackers to execute arbitrary code on the QEMU host via a large ethlite packet.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7161.html">CVE-2016-7161</cve>
<bugzilla href="https://bugzilla.suse.com/1001151">SUSE bug 1001151</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1001152">SUSE bug 1001152</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250395" comment="kvm-1.4.2-52 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7167</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7167" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7167" source="CVE"/>
    <description>
    Multiple integer overflows in the (1) curl_escape, (2) curl_easy_escape, (3) curl_unescape, and (4) curl_easy_unescape functions in libcurl before 7.50.3 allow attackers to have unspecified impact via a string of length 0xffffffff, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7167.html">CVE-2016-7167</cve>
<bugzilla href="https://bugzilla.suse.com/998760">SUSE bug 998760</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202479" comment="curl-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203713" comment="curl-openssl1-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209198" comment="libcurl4-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209199" comment="libcurl4-32bit-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203714" comment="libcurl4-openssl1-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203715" comment="libcurl4-openssl1-32bit-7.19.7-1.64 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7170</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7170" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7170" source="CVE"/>
    <description>
    The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to cursor.mask[] and cursor.image[] array sizes when processing a DEFINE_CURSOR svga command.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7170.html">CVE-2016-7170</cve>
<bugzilla href="https://bugzilla.suse.com/998516">SUSE bug 998516</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250395" comment="kvm-1.4.2-52 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7175</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7175" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7175" source="CVE"/>
    <description>
    epan/dissectors/packet-qnet6.c in the QNX6 QNET dissector in Wireshark 2.x before 2.0.6 mishandles MAC address data, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7175.html">CVE-2016-7175</cve>
<bugzilla href="https://bugzilla.suse.com/998099">SUSE bug 998099</bugzilla>
<bugzilla href="https://bugzilla.suse.com/998761">SUSE bug 998761</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203586" comment="wireshark-2.0.12-36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203588" comment="wireshark-gtk-2.0.12-36 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7176</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7176" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7176" source="CVE"/>
    <description>
    epan/dissectors/packet-h225.c in the H.225 dissector in Wireshark 2.x before 2.0.6 calls snprintf with one of its input buffers as the output buffer, which allows remote attackers to cause a denial of service (copy overlap and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7176.html">CVE-2016-7176</cve>
<bugzilla href="https://bugzilla.suse.com/998099">SUSE bug 998099</bugzilla>
<bugzilla href="https://bugzilla.suse.com/998762">SUSE bug 998762</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203586" comment="wireshark-2.0.12-36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203588" comment="wireshark-gtk-2.0.12-36 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7177</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7177" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7177" source="CVE"/>
    <description>
    epan/dissectors/packet-catapult-dct2000.c in the Catapult DCT2000 dissector in Wireshark 2.x before 2.0.6 does not restrict the number of channels, which allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7177.html">CVE-2016-7177</cve>
<bugzilla href="https://bugzilla.suse.com/998099">SUSE bug 998099</bugzilla>
<bugzilla href="https://bugzilla.suse.com/998763">SUSE bug 998763</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203586" comment="wireshark-2.0.12-36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203588" comment="wireshark-gtk-2.0.12-36 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7178</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7178" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7178" source="CVE"/>
    <description>
    epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 2.x before 2.0.6 does not ensure that memory is allocated for certain data structures, which allows remote attackers to cause a denial of service (invalid write access and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7178.html">CVE-2016-7178</cve>
<bugzilla href="https://bugzilla.suse.com/998099">SUSE bug 998099</bugzilla>
<bugzilla href="https://bugzilla.suse.com/998964">SUSE bug 998964</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203586" comment="wireshark-2.0.12-36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203588" comment="wireshark-gtk-2.0.12-36 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7179</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7179" source="CVE"/>
    <description>
    Stack-based buffer overflow in epan/dissectors/packet-catapult-dct2000.c in the Catapult DCT2000 dissector in Wireshark 2.x before 2.0.6 allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7179.html">CVE-2016-7179</cve>
<bugzilla href="https://bugzilla.suse.com/998099">SUSE bug 998099</bugzilla>
<bugzilla href="https://bugzilla.suse.com/998963">SUSE bug 998963</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203586" comment="wireshark-2.0.12-36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203588" comment="wireshark-gtk-2.0.12-36 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7180</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7180" source="CVE"/>
    <description>
    epan/dissectors/packet-ipmi-trace.c in the IPMI trace dissector in Wireshark 2.x before 2.0.6 does not properly consider whether a string is constant, which allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7180.html">CVE-2016-7180</cve>
<bugzilla href="https://bugzilla.suse.com/998099">SUSE bug 998099</bugzilla>
<bugzilla href="https://bugzilla.suse.com/998800">SUSE bug 998800</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203586" comment="wireshark-2.0.12-36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203588" comment="wireshark-gtk-2.0.12-36 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7411</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-7411" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7411" source="CVE"/>
    <description>
    ext/standard/var_unserializer.re in PHP before 5.6.26 mishandles object-deserialization failures, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via an unserialize call that references a partially constructed object.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7411.html">CVE-2016-7411</cve>
<bugzilla href="https://bugzilla.suse.com/999682">SUSE bug 999682</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205699" comment="apache2-mod_php53-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203288" comment="php53-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205700" comment="php53-bcmath-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205701" comment="php53-bz2-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205702" comment="php53-calendar-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205703" comment="php53-ctype-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205704" comment="php53-curl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205705" comment="php53-dba-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205706" comment="php53-dom-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205707" comment="php53-exif-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205708" comment="php53-fastcgi-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205709" comment="php53-fileinfo-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205710" comment="php53-ftp-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205711" comment="php53-gd-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205712" comment="php53-gettext-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205713" comment="php53-gmp-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205714" comment="php53-iconv-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205715" comment="php53-intl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205716" comment="php53-json-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205717" comment="php53-ldap-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205718" comment="php53-mbstring-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205719" comment="php53-mcrypt-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205720" comment="php53-mysql-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205721" comment="php53-odbc-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205722" comment="php53-openssl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205723" comment="php53-pcntl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205724" comment="php53-pdo-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205725" comment="php53-pear-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205726" comment="php53-pgsql-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205727" comment="php53-pspell-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205728" comment="php53-shmop-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205729" comment="php53-snmp-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205730" comment="php53-soap-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205731" comment="php53-suhosin-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205732" comment="php53-sysvmsg-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205733" comment="php53-sysvsem-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205734" comment="php53-sysvshm-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205735" comment="php53-tokenizer-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205736" comment="php53-wddx-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205737" comment="php53-xmlreader-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205738" comment="php53-xmlrpc-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205739" comment="php53-xmlwriter-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205740" comment="php53-xsl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205741" comment="php53-zip-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205742" comment="php53-zlib-5.3.17-84 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7412</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-7412" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7412" source="CVE"/>
    <description>
    ext/mysqlnd/mysqlnd_wireprotocol.c in PHP before 5.6.26 and 7.x before 7.0.11 does not verify that a BIT field has the UNSIGNED_FLAG flag, which allows remote MySQL servers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted field metadata.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7412.html">CVE-2016-7412</cve>
<bugzilla href="https://bugzilla.suse.com/999680">SUSE bug 999680</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205699" comment="apache2-mod_php53-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203288" comment="php53-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205700" comment="php53-bcmath-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205701" comment="php53-bz2-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205702" comment="php53-calendar-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205703" comment="php53-ctype-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205704" comment="php53-curl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205705" comment="php53-dba-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205706" comment="php53-dom-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205707" comment="php53-exif-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205708" comment="php53-fastcgi-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205709" comment="php53-fileinfo-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205710" comment="php53-ftp-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205711" comment="php53-gd-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205712" comment="php53-gettext-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205713" comment="php53-gmp-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205714" comment="php53-iconv-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205715" comment="php53-intl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205716" comment="php53-json-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205717" comment="php53-ldap-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205718" comment="php53-mbstring-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205719" comment="php53-mcrypt-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205720" comment="php53-mysql-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205721" comment="php53-odbc-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205722" comment="php53-openssl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205723" comment="php53-pcntl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205724" comment="php53-pdo-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205725" comment="php53-pear-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205726" comment="php53-pgsql-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205727" comment="php53-pspell-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205728" comment="php53-shmop-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205729" comment="php53-snmp-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205730" comment="php53-soap-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205731" comment="php53-suhosin-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205732" comment="php53-sysvmsg-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205733" comment="php53-sysvsem-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205734" comment="php53-sysvshm-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205735" comment="php53-tokenizer-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205736" comment="php53-wddx-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205737" comment="php53-xmlreader-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205738" comment="php53-xmlrpc-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205739" comment="php53-xmlwriter-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205740" comment="php53-xsl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205741" comment="php53-zip-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205742" comment="php53-zlib-5.3.17-84 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167413" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7413</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-7413" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7413" source="CVE"/>
    <description>
    Use-after-free vulnerability in the wddx_stack_destroy function in ext/wddx/wddx.c in PHP before 5.6.26 and 7.x before 7.0.11 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a wddxPacket XML document that lacks an end-tag for a recordset field element, leading to mishandling in a wddx_deserialize call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7413.html">CVE-2016-7413</cve>
<bugzilla href="https://bugzilla.suse.com/999679">SUSE bug 999679</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205699" comment="apache2-mod_php53-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203288" comment="php53-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205700" comment="php53-bcmath-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205701" comment="php53-bz2-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205702" comment="php53-calendar-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205703" comment="php53-ctype-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205704" comment="php53-curl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205705" comment="php53-dba-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205706" comment="php53-dom-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205707" comment="php53-exif-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205708" comment="php53-fastcgi-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205709" comment="php53-fileinfo-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205710" comment="php53-ftp-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205711" comment="php53-gd-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205712" comment="php53-gettext-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205713" comment="php53-gmp-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205714" comment="php53-iconv-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205715" comment="php53-intl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205716" comment="php53-json-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205717" comment="php53-ldap-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205718" comment="php53-mbstring-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205719" comment="php53-mcrypt-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205720" comment="php53-mysql-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205721" comment="php53-odbc-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205722" comment="php53-openssl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205723" comment="php53-pcntl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205724" comment="php53-pdo-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205725" comment="php53-pear-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205726" comment="php53-pgsql-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205727" comment="php53-pspell-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205728" comment="php53-shmop-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205729" comment="php53-snmp-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205730" comment="php53-soap-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205731" comment="php53-suhosin-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205732" comment="php53-sysvmsg-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205733" comment="php53-sysvsem-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205734" comment="php53-sysvshm-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205735" comment="php53-tokenizer-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205736" comment="php53-wddx-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205737" comment="php53-xmlreader-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205738" comment="php53-xmlrpc-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205739" comment="php53-xmlwriter-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205740" comment="php53-xsl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205741" comment="php53-zip-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205742" comment="php53-zlib-5.3.17-84 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7414</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-7414" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7414" source="CVE"/>
    <description>
    The ZIP signature-verification feature in PHP before 5.6.26 and 7.x before 7.0.11 does not ensure that the uncompressed_filesize field is large enough, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via a crafted PHAR archive, related to ext/phar/util.c and ext/phar/zip.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7414.html">CVE-2016-7414</cve>
<bugzilla href="https://bugzilla.suse.com/999820">SUSE bug 999820</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205699" comment="apache2-mod_php53-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203288" comment="php53-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205700" comment="php53-bcmath-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205701" comment="php53-bz2-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205702" comment="php53-calendar-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205703" comment="php53-ctype-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205704" comment="php53-curl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205705" comment="php53-dba-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205706" comment="php53-dom-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205707" comment="php53-exif-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205708" comment="php53-fastcgi-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205709" comment="php53-fileinfo-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205710" comment="php53-ftp-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205711" comment="php53-gd-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205712" comment="php53-gettext-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205713" comment="php53-gmp-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205714" comment="php53-iconv-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205715" comment="php53-intl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205716" comment="php53-json-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205717" comment="php53-ldap-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205718" comment="php53-mbstring-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205719" comment="php53-mcrypt-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205720" comment="php53-mysql-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205721" comment="php53-odbc-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205722" comment="php53-openssl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205723" comment="php53-pcntl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205724" comment="php53-pdo-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205725" comment="php53-pear-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205726" comment="php53-pgsql-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205727" comment="php53-pspell-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205728" comment="php53-shmop-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205729" comment="php53-snmp-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205730" comment="php53-soap-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205731" comment="php53-suhosin-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205732" comment="php53-sysvmsg-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205733" comment="php53-sysvsem-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205734" comment="php53-sysvshm-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205735" comment="php53-tokenizer-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205736" comment="php53-wddx-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205737" comment="php53-xmlreader-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205738" comment="php53-xmlrpc-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205739" comment="php53-xmlwriter-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205740" comment="php53-xsl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205741" comment="php53-zip-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205742" comment="php53-zlib-5.3.17-84 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7416</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-7416" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7416" source="CVE"/>
    <description>
    ext/intl/msgformat/msgformat_format.c in PHP before 5.6.26 and 7.x before 7.0.11 does not properly restrict the locale length provided to the Locale class in the ICU library, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a MessageFormatter::formatMessage call with a long first argument.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7416.html">CVE-2016-7416</cve>
<bugzilla href="https://bugzilla.suse.com/999685">SUSE bug 999685</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205699" comment="apache2-mod_php53-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203288" comment="php53-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205700" comment="php53-bcmath-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205701" comment="php53-bz2-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205702" comment="php53-calendar-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205703" comment="php53-ctype-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205704" comment="php53-curl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205705" comment="php53-dba-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205706" comment="php53-dom-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205707" comment="php53-exif-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205708" comment="php53-fastcgi-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205709" comment="php53-fileinfo-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205710" comment="php53-ftp-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205711" comment="php53-gd-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205712" comment="php53-gettext-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205713" comment="php53-gmp-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205714" comment="php53-iconv-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205715" comment="php53-intl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205716" comment="php53-json-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205717" comment="php53-ldap-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205718" comment="php53-mbstring-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205719" comment="php53-mcrypt-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205720" comment="php53-mysql-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205721" comment="php53-odbc-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205722" comment="php53-openssl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205723" comment="php53-pcntl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205724" comment="php53-pdo-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205725" comment="php53-pear-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205726" comment="php53-pgsql-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205727" comment="php53-pspell-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205728" comment="php53-shmop-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205729" comment="php53-snmp-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205730" comment="php53-soap-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205731" comment="php53-suhosin-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205732" comment="php53-sysvmsg-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205733" comment="php53-sysvsem-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205734" comment="php53-sysvshm-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205735" comment="php53-tokenizer-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205736" comment="php53-wddx-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205737" comment="php53-xmlreader-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205738" comment="php53-xmlrpc-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205739" comment="php53-xmlwriter-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205740" comment="php53-xsl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205741" comment="php53-zip-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205742" comment="php53-zlib-5.3.17-84 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7417</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-7417" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7417" source="CVE"/>
    <description>
    ext/spl/spl_array.c in PHP before 5.6.26 and 7.x before 7.0.11 proceeds with SplArray unserialization without validating a return value and data type, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7417.html">CVE-2016-7417</cve>
<bugzilla href="https://bugzilla.suse.com/999684">SUSE bug 999684</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205699" comment="apache2-mod_php53-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203288" comment="php53-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205700" comment="php53-bcmath-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205701" comment="php53-bz2-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205702" comment="php53-calendar-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205703" comment="php53-ctype-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205704" comment="php53-curl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205705" comment="php53-dba-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205706" comment="php53-dom-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205707" comment="php53-exif-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205708" comment="php53-fastcgi-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205709" comment="php53-fileinfo-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205710" comment="php53-ftp-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205711" comment="php53-gd-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205712" comment="php53-gettext-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205713" comment="php53-gmp-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205714" comment="php53-iconv-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205715" comment="php53-intl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205716" comment="php53-json-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205717" comment="php53-ldap-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205718" comment="php53-mbstring-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205719" comment="php53-mcrypt-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205720" comment="php53-mysql-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205721" comment="php53-odbc-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205722" comment="php53-openssl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205723" comment="php53-pcntl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205724" comment="php53-pdo-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205725" comment="php53-pear-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205726" comment="php53-pgsql-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205727" comment="php53-pspell-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205728" comment="php53-shmop-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205729" comment="php53-snmp-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205730" comment="php53-soap-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205731" comment="php53-suhosin-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205732" comment="php53-sysvmsg-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205733" comment="php53-sysvsem-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205734" comment="php53-sysvshm-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205735" comment="php53-tokenizer-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205736" comment="php53-wddx-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205737" comment="php53-xmlreader-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205738" comment="php53-xmlrpc-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205739" comment="php53-xmlwriter-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205740" comment="php53-xsl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205741" comment="php53-zip-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205742" comment="php53-zlib-5.3.17-84 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7418</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-7418" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7418" source="CVE"/>
    <description>
    The php_wddx_push_element function in ext/wddx/wddx.c in PHP before 5.6.26 and 7.x before 7.0.11 allows remote attackers to cause a denial of service (invalid pointer access and out-of-bounds read) or possibly have unspecified other impact via an incorrect boolean element in a wddxPacket XML document, leading to mishandling in a wddx_deserialize call.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7418.html">CVE-2016-7418</cve>
<bugzilla href="https://bugzilla.suse.com/999819">SUSE bug 999819</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205699" comment="apache2-mod_php53-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203288" comment="php53-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205700" comment="php53-bcmath-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205701" comment="php53-bz2-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205702" comment="php53-calendar-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205703" comment="php53-ctype-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205704" comment="php53-curl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205705" comment="php53-dba-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205706" comment="php53-dom-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205707" comment="php53-exif-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205708" comment="php53-fastcgi-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205709" comment="php53-fileinfo-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205710" comment="php53-ftp-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205711" comment="php53-gd-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205712" comment="php53-gettext-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205713" comment="php53-gmp-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205714" comment="php53-iconv-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205715" comment="php53-intl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205716" comment="php53-json-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205717" comment="php53-ldap-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205718" comment="php53-mbstring-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205719" comment="php53-mcrypt-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205720" comment="php53-mysql-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205721" comment="php53-odbc-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205722" comment="php53-openssl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205723" comment="php53-pcntl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205724" comment="php53-pdo-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205725" comment="php53-pear-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205726" comment="php53-pgsql-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205727" comment="php53-pspell-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205728" comment="php53-shmop-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205729" comment="php53-snmp-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205730" comment="php53-soap-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205731" comment="php53-suhosin-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205732" comment="php53-sysvmsg-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205733" comment="php53-sysvsem-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205734" comment="php53-sysvshm-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205735" comment="php53-tokenizer-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205736" comment="php53-wddx-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205737" comment="php53-xmlreader-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205738" comment="php53-xmlrpc-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205739" comment="php53-xmlwriter-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205740" comment="php53-xsl-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205741" comment="php53-zip-5.3.17-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205742" comment="php53-zlib-5.3.17-84 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7425</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-7425" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7425" source="CVE"/>
    <description>
    The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel through 4.8.2 does not restrict a certain length field, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7425.html">CVE-2016-7425</cve>
<bugzilla href="https://bugzilla.suse.com/1025354">SUSE bug 1025354</bugzilla>
<bugzilla href="https://bugzilla.suse.com/999932">SUSE bug 999932</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208770" comment="kernel-default-man-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205650" comment="kernel-pae-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205651" comment="kernel-pae-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205652" comment="kernel-pae-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7426</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-7426" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7426" source="CVE"/>
    <description>
    NTP before 4.2.8p9 rate limits responses received from the configured sources when rate limiting for all associations is enabled, which allows remote attackers to cause a denial of service (prevent responses from the sources) by sending responses with a spoofed source address.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7426.html">CVE-2016-7426</cve>
<bugzilla href="https://bugzilla.suse.com/1011406">SUSE bug 1011406</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1011421">SUSE bug 1011421</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205679" comment="ntp-4.2.8p9-48.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205680" comment="ntp-doc-4.2.8p9-48.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7427</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-7427" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7427" source="CVE"/>
    <description>
    The broadcast mode replay prevention functionality in ntpd in NTP before 4.2.8p9 allows remote attackers to cause a denial of service (reject broadcast mode packets) via a crafted broadcast mode packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7427.html">CVE-2016-7427</cve>
<bugzilla href="https://bugzilla.suse.com/1011390">SUSE bug 1011390</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1011421">SUSE bug 1011421</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205679" comment="ntp-4.2.8p9-48.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205680" comment="ntp-doc-4.2.8p9-48.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7428</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-7428" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7428" source="CVE"/>
    <description>
    ntpd in NTP before 4.2.8p9 allows remote attackers to cause a denial of service (reject broadcast mode packets) via the poll interval in a broadcast packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7428.html">CVE-2016-7428</cve>
<bugzilla href="https://bugzilla.suse.com/1011417">SUSE bug 1011417</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1011421">SUSE bug 1011421</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205679" comment="ntp-4.2.8p9-48.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205680" comment="ntp-doc-4.2.8p9-48.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7429</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-7429" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7429" source="CVE"/>
    <description>
    NTP before 4.2.8p9 changes the peer structure to the interface it receives the response from a source, which allows remote attackers to cause a denial of service (prevent communication with a source) by sending a response for a source to an interface the source does not use.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7429.html">CVE-2016-7429</cve>
<bugzilla href="https://bugzilla.suse.com/1011404">SUSE bug 1011404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1011421">SUSE bug 1011421</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205679" comment="ntp-4.2.8p9-48.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205680" comment="ntp-doc-4.2.8p9-48.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7431</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-7431" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7431" source="CVE"/>
    <description>
    NTP before 4.2.8p9 allows remote attackers to bypass the origin timestamp protection mechanism via an origin timestamp of zero.  NOTE: this vulnerability exists because of a CVE-2015-8138 regression.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7431.html">CVE-2016-7431</cve>
<bugzilla href="https://bugzilla.suse.com/1011395">SUSE bug 1011395</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1011421">SUSE bug 1011421</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205679" comment="ntp-4.2.8p9-48.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205680" comment="ntp-doc-4.2.8p9-48.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7433</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-7433" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7433" source="CVE"/>
    <description>
    NTP before 4.2.8p9 does not properly perform the initial sync calculations, which allows remote attackers to unspecified impact via unknown vectors, related to a "root distance that did not include the peer dispersion."
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7433.html">CVE-2016-7433</cve>
<bugzilla href="https://bugzilla.suse.com/1011411">SUSE bug 1011411</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1011421">SUSE bug 1011421</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205679" comment="ntp-4.2.8p9-48.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205680" comment="ntp-doc-4.2.8p9-48.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7434</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-7434" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7434" source="CVE"/>
    <description>
    The read_mru_list function in NTP before 4.2.8p9 allows remote attackers to cause a denial of service (crash) via a crafted mrulist query.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7434.html">CVE-2016-7434</cve>
<bugzilla href="https://bugzilla.suse.com/1011398">SUSE bug 1011398</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1011421">SUSE bug 1011421</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205679" comment="ntp-4.2.8p9-48.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205680" comment="ntp-doc-4.2.8p9-48.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7440</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7440" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440" source="CVE"/>
    <description>
    The C software implementation of AES Encryption and Decryption in wolfSSL (formerly CyaSSL) before 3.9.10 makes it easier for local users to discover AES keys by leveraging cache-bank timing differences.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7440.html">CVE-2016-7440</cve>
<bugzilla href="https://bugzilla.suse.com/1005581">SUSE bug 1005581</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1008318">SUSE bug 1008318</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210054" comment="libmysql55client18-5.5.53-0.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210055" comment="libmysql55client18-32bit-5.5.53-0.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210057" comment="libmysql55client_r18-5.5.53-0.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203171" comment="mysql-5.5.53-0.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210058" comment="mysql-client-5.5.53-0.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210059" comment="mysql-tools-5.5.53-0.30 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7478</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-7478" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7478" source="CVE"/>
    <description>
    Zend/zend_exceptions.c in PHP, possibly 5.x before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (infinite loop) via a crafted Exception object in serialized data, a related issue to CVE-2015-8876.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7478.html">CVE-2016-7478</cve>
<bugzilla href="https://bugzilla.suse.com/1019550">SUSE bug 1019550</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205743" comment="apache2-mod_php53-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203312" comment="php53-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205744" comment="php53-bcmath-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205745" comment="php53-bz2-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205746" comment="php53-calendar-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205747" comment="php53-ctype-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205748" comment="php53-curl-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205749" comment="php53-dba-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205750" comment="php53-dom-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205751" comment="php53-exif-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205752" comment="php53-fastcgi-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205753" comment="php53-fileinfo-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205754" comment="php53-ftp-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205755" comment="php53-gd-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205756" comment="php53-gettext-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205757" comment="php53-gmp-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205758" comment="php53-iconv-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205759" comment="php53-intl-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205760" comment="php53-json-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205761" comment="php53-ldap-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205762" comment="php53-mbstring-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205763" comment="php53-mcrypt-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205764" comment="php53-mysql-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205765" comment="php53-odbc-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205766" comment="php53-openssl-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205767" comment="php53-pcntl-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205768" comment="php53-pdo-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205769" comment="php53-pear-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205770" comment="php53-pgsql-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205771" comment="php53-pspell-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205772" comment="php53-shmop-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205773" comment="php53-snmp-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205774" comment="php53-soap-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205775" comment="php53-suhosin-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205776" comment="php53-sysvmsg-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205777" comment="php53-sysvsem-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205778" comment="php53-sysvshm-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205779" comment="php53-tokenizer-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205780" comment="php53-wddx-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205781" comment="php53-xmlreader-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205782" comment="php53-xmlrpc-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205783" comment="php53-xmlwriter-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205784" comment="php53-xsl-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205785" comment="php53-zip-5.3.17-101 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205786" comment="php53-zlib-5.3.17-101 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7514</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7514" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7514" source="CVE"/>
    <description>
    The ReadPSDChannelPixels function in coders/psd.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PSD file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7514.html">CVE-2016-7514</cve>
<bugzilla href="https://bugzilla.suse.com/1000688">SUSE bug 1000688</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202227" comment="ImageMagick-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209108" comment="libMagickCore1-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209109" comment="libMagickCore1-32bit-6.4.3.6-7.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7515</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7515" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7515" source="CVE"/>
    <description>
    The ReadRLEImage function in coders/rle.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via vectors related to the number of pixels.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7515.html">CVE-2016-7515</cve>
<bugzilla href="https://bugzilla.suse.com/1000689">SUSE bug 1000689</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1000695">SUSE bug 1000695</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202227" comment="ImageMagick-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209108" comment="libMagickCore1-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209109" comment="libMagickCore1-32bit-6.4.3.6-7.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7516</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7516" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7516" source="CVE"/>
    <description>
    The ReadVIFFImage function in coders/viff.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted VIFF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7516.html">CVE-2016-7516</cve>
<bugzilla href="https://bugzilla.suse.com/1000692">SUSE bug 1000692</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1000693">SUSE bug 1000693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1000695">SUSE bug 1000695</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202227" comment="ImageMagick-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209108" comment="libMagickCore1-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209109" comment="libMagickCore1-32bit-6.4.3.6-7.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7517</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7517" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7517" source="CVE"/>
    <description>
    The EncodeImage function in coders/pict.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PICT file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7517.html">CVE-2016-7517</cve>
<bugzilla href="https://bugzilla.suse.com/1000693">SUSE bug 1000693</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202227" comment="ImageMagick-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209108" comment="libMagickCore1-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209109" comment="libMagickCore1-32bit-6.4.3.6-7.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7518</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7518" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7518" source="CVE"/>
    <description>
    The ReadSUNImage function in coders/sun.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted SUN file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7518.html">CVE-2016-7518</cve>
<bugzilla href="https://bugzilla.suse.com/1000694">SUSE bug 1000694</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1028079">SUSE bug 1028079</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202227" comment="ImageMagick-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209108" comment="libMagickCore1-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209109" comment="libMagickCore1-32bit-6.4.3.6-7.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7519</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7519" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7519" source="CVE"/>
    <description>
    The ReadRLEImage function in coders/rle.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7519.html">CVE-2016-7519</cve>
<bugzilla href="https://bugzilla.suse.com/1000689">SUSE bug 1000689</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1000695">SUSE bug 1000695</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202227" comment="ImageMagick-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209108" comment="libMagickCore1-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209109" comment="libMagickCore1-32bit-6.4.3.6-7.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7522</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7522" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7522" source="CVE"/>
    <description>
    The ReadPSDImage function in MagickCore/locale.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PSD file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7522.html">CVE-2016-7522</cve>
<bugzilla href="https://bugzilla.suse.com/1000698">SUSE bug 1000698</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202227" comment="ImageMagick-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209108" comment="libMagickCore1-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209109" comment="libMagickCore1-32bit-6.4.3.6-7.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7523</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7523" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7523" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7523.html">CVE-2016-7523</cve>
<bugzilla href="https://bugzilla.suse.com/1000699">SUSE bug 1000699</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202227" comment="ImageMagick-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209108" comment="libMagickCore1-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209109" comment="libMagickCore1-32bit-6.4.3.6-7.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7524</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7524" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7524" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7524.html">CVE-2016-7524</cve>
<bugzilla href="https://bugzilla.suse.com/1000700">SUSE bug 1000700</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1002422">SUSE bug 1002422</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202227" comment="ImageMagick-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209108" comment="libMagickCore1-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209109" comment="libMagickCore1-32bit-6.4.3.6-7.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7525</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7525" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7525" source="CVE"/>
    <description>
    Heap-based buffer overflow in coders/psd.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PSD file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7525.html">CVE-2016-7525</cve>
<bugzilla href="https://bugzilla.suse.com/1000688">SUSE bug 1000688</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1000701">SUSE bug 1000701</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202227" comment="ImageMagick-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209108" comment="libMagickCore1-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209109" comment="libMagickCore1-32bit-6.4.3.6-7.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7526</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7526" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7526" source="CVE"/>
    <description>
    coders/wpg.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7526.html">CVE-2016-7526</cve>
<bugzilla href="https://bugzilla.suse.com/1000436">SUSE bug 1000436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1000702">SUSE bug 1000702</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1107616">SUSE bug 1107616</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202227" comment="ImageMagick-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209108" comment="libMagickCore1-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209109" comment="libMagickCore1-32bit-6.4.3.6-7.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7527</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7527" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7527" source="CVE"/>
    <description>
    coders/wpg.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7527.html">CVE-2016-7527</cve>
<bugzilla href="https://bugzilla.suse.com/1000436">SUSE bug 1000436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1000702">SUSE bug 1000702</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202227" comment="ImageMagick-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209108" comment="libMagickCore1-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209109" comment="libMagickCore1-32bit-6.4.3.6-7.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7528</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7528" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7528" source="CVE"/>
    <description>
    The ReadVIFFImage function in coders/viff.c in ImageMagick allows remote attackers to cause a denial of service (segmentation fault) via a crafted VIFF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7528.html">CVE-2016-7528</cve>
<bugzilla href="https://bugzilla.suse.com/1000434">SUSE bug 1000434</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202227" comment="ImageMagick-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209108" comment="libMagickCore1-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209109" comment="libMagickCore1-32bit-6.4.3.6-7.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7529</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7529" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7529" source="CVE"/>
    <description>
    coders/xcf.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted XCF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7529.html">CVE-2016-7529</cve>
<bugzilla href="https://bugzilla.suse.com/1000399">SUSE bug 1000399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1000434">SUSE bug 1000434</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1000703">SUSE bug 1000703</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1054924">SUSE bug 1054924</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202227" comment="ImageMagick-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209108" comment="libMagickCore1-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209109" comment="libMagickCore1-32bit-6.4.3.6-7.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7530</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7530" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7530" source="CVE"/>
    <description>
    The quantum handling code in ImageMagick allows remote attackers to cause a denial of service (divide-by-zero error or out-of-bounds write) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7530.html">CVE-2016-7530</cve>
<bugzilla href="https://bugzilla.suse.com/1000399">SUSE bug 1000399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1000703">SUSE bug 1000703</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1054924">SUSE bug 1054924</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202234" comment="ImageMagick-6.4.3.6-7.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209110" comment="libMagickCore1-6.4.3.6-7.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209111" comment="libMagickCore1-32bit-6.4.3.6-7.60 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7531</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7531" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7531" source="CVE"/>
    <description>
    MagickCore/memory.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted PDB file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7531.html">CVE-2016-7531</cve>
<bugzilla href="https://bugzilla.suse.com/1000704">SUSE bug 1000704</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202227" comment="ImageMagick-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209108" comment="libMagickCore1-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209109" comment="libMagickCore1-32bit-6.4.3.6-7.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7533</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7533" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7533" source="CVE"/>
    <description>
    The ReadWPGImage function in coders/wpg.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WPG file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7533.html">CVE-2016-7533</cve>
<bugzilla href="https://bugzilla.suse.com/1000707">SUSE bug 1000707</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202227" comment="ImageMagick-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209108" comment="libMagickCore1-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209109" comment="libMagickCore1-32bit-6.4.3.6-7.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7535</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7535" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7535" source="CVE"/>
    <description>
    coders/psd.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted PSD file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7535.html">CVE-2016-7535</cve>
<bugzilla href="https://bugzilla.suse.com/1000709">SUSE bug 1000709</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202227" comment="ImageMagick-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209108" comment="libMagickCore1-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209109" comment="libMagickCore1-32bit-6.4.3.6-7.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7537</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7537" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7537" source="CVE"/>
    <description>
    MagickCore/memory.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds access) via a crafted PDB file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7537.html">CVE-2016-7537</cve>
<bugzilla href="https://bugzilla.suse.com/1000711">SUSE bug 1000711</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202227" comment="ImageMagick-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209108" comment="libMagickCore1-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209109" comment="libMagickCore1-32bit-6.4.3.6-7.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7543</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7543" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7543" source="CVE"/>
    <description>
    Bash before 4.4 allows local users to execute arbitrary commands with root privileges via crafted SHELLOPTS and PS4 environment variables.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7543.html">CVE-2016-7543</cve>
<bugzilla href="https://bugzilla.suse.com/1001299">SUSE bug 1001299</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009249913" comment="bash-3.2-147.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249914" comment="bash-doc-3.2-147.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249915" comment="libreadline5-5.2-147.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249916" comment="libreadline5-32bit-5.2-147.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249917" comment="readline-doc-5.2-147.28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7545</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7545" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7545" source="CVE"/>
    <description>
    SELinux policycoreutils allows local users to execute arbitrary commands outside of the sandbox via a crafted TIOCSTI ioctl call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7545.html">CVE-2016-7545</cve>
<bugzilla href="https://bugzilla.suse.com/1000998">SUSE bug 1000998</bugzilla>
<bugzilla href="https://bugzilla.suse.com/968375">SUSE bug 968375</bugzilla>
<bugzilla href="https://bugzilla.suse.com/968674">SUSE bug 968674</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210620" comment="policycoreutils-2.0.79-4.8 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7777</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-7777" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7777" source="CVE"/>
    <description>
    Xen 4.7.x and earlier does not properly honor CR0.TS and CR0.EM, which allows local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7777.html">CVE-2016-7777</cve>
<bugzilla href="https://bugzilla.suse.com/1000106">SUSE bug 1000106</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205952" comment="xen-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209058" comment="xen-doc-html-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209059" comment="xen-doc-pdf-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205953" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.90-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205954" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.90-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205955" comment="xen-libs-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209060" comment="xen-libs-32bit-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209061" comment="xen-tools-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205956" comment="xen-tools-domU-4.2.5_21-30 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205952" comment="xen-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209058" comment="xen-doc-html-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209059" comment="xen-doc-pdf-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205953" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.90-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205955" comment="xen-libs-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209060" comment="xen-libs-32bit-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209061" comment="xen-tools-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205956" comment="xen-tools-domU-4.2.5_21-30 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7799</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7799" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7799" source="CVE"/>
    <description>
    MagickCore/profile.c in ImageMagick before 7.0.3-2 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7799.html">CVE-2016-7799</cve>
<bugzilla href="https://bugzilla.suse.com/1002421">SUSE bug 1002421</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202227" comment="ImageMagick-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209108" comment="libMagickCore1-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209109" comment="libMagickCore1-32bit-6.4.3.6-7.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7800" source="CVE"/>
    <description>
    Integer underflow in the parse8BIM function in coders/meta.c in GraphicsMagick 1.3.25 and earlier allows remote attackers to cause a denial of service (application crash) via a crafted 8BIM chunk, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7800.html">CVE-2016-7800</cve>
<bugzilla href="https://bugzilla.suse.com/1002422">SUSE bug 1002422</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202227" comment="ImageMagick-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209108" comment="libMagickCore1-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209109" comment="libMagickCore1-32bit-6.4.3.6-7.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7908</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-7908" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7908" source="CVE"/>
    <description>
    The mcf_fec_do_tx function in hw/net/mcf_fec.c in QEMU (aka Quick Emulator) does not properly limit the buffer descriptor count when transmitting packets, which allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7908.html">CVE-2016-7908</cve>
<bugzilla href="https://bugzilla.suse.com/1002550">SUSE bug 1002550</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1003030">SUSE bug 1003030</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205952" comment="xen-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209058" comment="xen-doc-html-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209059" comment="xen-doc-pdf-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205953" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.90-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205954" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.90-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205955" comment="xen-libs-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209060" comment="xen-libs-32bit-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209061" comment="xen-tools-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205956" comment="xen-tools-domU-4.2.5_21-30 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205952" comment="xen-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209058" comment="xen-doc-html-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209059" comment="xen-doc-pdf-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205953" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.90-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205955" comment="xen-libs-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209060" comment="xen-libs-32bit-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209061" comment="xen-tools-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205956" comment="xen-tools-domU-4.2.5_21-30 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250395" comment="kvm-1.4.2-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7909</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-7909" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7909" source="CVE"/>
    <description>
    The pcnet_rdra_addr function in hw/net/pcnet.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by setting the (1) receive or (2) transmit descriptor ring length to 0.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7909.html">CVE-2016-7909</cve>
<bugzilla href="https://bugzilla.suse.com/1002557">SUSE bug 1002557</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1003032">SUSE bug 1003032</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205952" comment="xen-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209058" comment="xen-doc-html-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209059" comment="xen-doc-pdf-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205953" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.90-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205954" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.90-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205955" comment="xen-libs-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209060" comment="xen-libs-32bit-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209061" comment="xen-tools-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205956" comment="xen-tools-domU-4.2.5_21-30 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205952" comment="xen-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209058" comment="xen-doc-html-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209059" comment="xen-doc-pdf-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205953" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.90-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205955" comment="xen-libs-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209060" comment="xen-libs-32bit-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209061" comment="xen-tools-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205956" comment="xen-tools-domU-4.2.5_21-30 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250395" comment="kvm-1.4.2-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7910</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-7910" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7910" source="CVE"/>
    <description>
    Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel before 4.7.1 allows local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7910.html">CVE-2016-7910</cve>
<bugzilla href="https://bugzilla.suse.com/1010716">SUSE bug 1010716</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208770" comment="kernel-default-man-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205650" comment="kernel-pae-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205651" comment="kernel-pae-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205652" comment="kernel-pae-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7911</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-7911" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7911" source="CVE"/>
    <description>
    Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel before 4.6.6 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7911.html">CVE-2016-7911</cve>
<bugzilla href="https://bugzilla.suse.com/1010711">SUSE bug 1010711</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1010713">SUSE bug 1010713</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208770" comment="kernel-default-man-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205650" comment="kernel-pae-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205651" comment="kernel-pae-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205652" comment="kernel-pae-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7915</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7915" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7915" source="CVE"/>
    <description>
    The hid_input_field function in drivers/hid/hid-core.c in the Linux kernel before 4.6 allows physically proximate attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read) by connecting a device, as demonstrated by a Logitech DJ receiver.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7915.html">CVE-2016-7915</cve>
<bugzilla href="https://bugzilla.suse.com/1010470">SUSE bug 1010470</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208695" comment="kernel-bigsmp-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208696" comment="kernel-bigsmp-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208697" comment="kernel-bigsmp-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205609" comment="kernel-default-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205610" comment="kernel-default-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205611" comment="kernel-default-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208698" comment="kernel-default-man-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205612" comment="kernel-ec2-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205613" comment="kernel-ec2-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205614" comment="kernel-ec2-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205615" comment="kernel-pae-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205616" comment="kernel-pae-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205617" comment="kernel-pae-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205618" comment="kernel-source-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205619" comment="kernel-syms-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205620" comment="kernel-trace-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205621" comment="kernel-trace-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205622" comment="kernel-trace-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205623" comment="kernel-xen-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205624" comment="kernel-xen-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205625" comment="kernel-xen-devel-3.0.101-0.47.106.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7916</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-7916" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7916" source="CVE"/>
    <description>
    Race condition in the environ_read function in fs/proc/base.c in the Linux kernel before 4.5.4 allows local users to obtain sensitive information from kernel memory by reading a /proc/*/environ file during a process-setup time interval in which environment-variable copying is incomplete.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7916.html">CVE-2016-7916</cve>
<bugzilla href="https://bugzilla.suse.com/1010467">SUSE bug 1010467</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208770" comment="kernel-default-man-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205650" comment="kernel-pae-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205651" comment="kernel-pae-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205652" comment="kernel-pae-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7922</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7922" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7922" source="CVE"/>
    <description>
    The AH parser in tcpdump before 4.9.0 has a buffer overflow in print-ah.c:ah_print().
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7922.html">CVE-2016-7922</cve>
<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210822" comment="tcpdump-3.9.8-1.29 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7923</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7923" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7923" source="CVE"/>
    <description>
    The ARP parser in tcpdump before 4.9.0 has a buffer overflow in print-arp.c:arp_print().
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7923.html">CVE-2016-7923</cve>
<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210822" comment="tcpdump-3.9.8-1.29 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7925</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7925" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7925" source="CVE"/>
    <description>
    The compressed SLIP parser in tcpdump before 4.9.0 has a buffer overflow in print-sl.c:sl_if_print().
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7925.html">CVE-2016-7925</cve>
<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210822" comment="tcpdump-3.9.8-1.29 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7926</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7926" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7926" source="CVE"/>
    <description>
    The Ethernet parser in tcpdump before 4.9.0 has a buffer overflow in print-ether.c:ethertype_print().
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7926.html">CVE-2016-7926</cve>
<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210822" comment="tcpdump-3.9.8-1.29 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7927</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7927" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7927" source="CVE"/>
    <description>
    The IEEE 802.11 parser in tcpdump before 4.9.0 has a buffer overflow in print-802_11.c:ieee802_11_radio_print().
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7927.html">CVE-2016-7927</cve>
<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210822" comment="tcpdump-3.9.8-1.29 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7928</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7928" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7928" source="CVE"/>
    <description>
    The IPComp parser in tcpdump before 4.9.0 has a buffer overflow in print-ipcomp.c:ipcomp_print().
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7928.html">CVE-2016-7928</cve>
<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210822" comment="tcpdump-3.9.8-1.29 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7931</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7931" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7931" source="CVE"/>
    <description>
    The MPLS parser in tcpdump before 4.9.0 has a buffer overflow in print-mpls.c:mpls_print().
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7931.html">CVE-2016-7931</cve>
<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210822" comment="tcpdump-3.9.8-1.29 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7934</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7934" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7934" source="CVE"/>
    <description>
    The RTCP parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:rtcp_print().
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7934.html">CVE-2016-7934</cve>
<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210822" comment="tcpdump-3.9.8-1.29 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7935</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7935" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7935" source="CVE"/>
    <description>
    The RTP parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:rtp_print().
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7935.html">CVE-2016-7935</cve>
<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210822" comment="tcpdump-3.9.8-1.29 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7936</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7936" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7936" source="CVE"/>
    <description>
    The UDP parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:udp_print().
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7936.html">CVE-2016-7936</cve>
<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210822" comment="tcpdump-3.9.8-1.29 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7937</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7937" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7937" source="CVE"/>
    <description>
    The VAT parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:vat_print().
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7937.html">CVE-2016-7937</cve>
<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210822" comment="tcpdump-3.9.8-1.29 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7939</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7939" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7939" source="CVE"/>
    <description>
    The GRE parser in tcpdump before 4.9.0 has a buffer overflow in print-gre.c, multiple functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7939.html">CVE-2016-7939</cve>
<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210822" comment="tcpdump-3.9.8-1.29 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7940</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7940" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7940" source="CVE"/>
    <description>
    The STP parser in tcpdump before 4.9.0 has a buffer overflow in print-stp.c, multiple functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7940.html">CVE-2016-7940</cve>
<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210822" comment="tcpdump-3.9.8-1.29 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7942</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7942" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7942" source="CVE"/>
    <description>
    The XGetImage function in X.org libX11 before 1.6.4 might allow remote X servers to gain privileges via vectors involving image type and geometry, which triggers out-of-bounds read operations.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7942.html">CVE-2016-7942</cve>
<bugzilla href="https://bugzilla.suse.com/1002991">SUSE bug 1002991</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203670" comment="xorg-x11-libX11-7.4-5.11.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210974" comment="xorg-x11-libX11-32bit-7.4-5.11.65 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7944</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7944" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7944" source="CVE"/>
    <description>
    Integer overflow in X.org libXfixes before 5.0.3 on 32-bit platforms might allow remote X servers to gain privileges via a length value of INT_MAX, which triggers the client to stop reading data and get out of sync.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7944.html">CVE-2016-7944</cve>
<bugzilla href="https://bugzilla.suse.com/1002995">SUSE bug 1002995</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1149962">SUSE bug 1149962</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203680" comment="xorg-x11-libXfixes-7.4-1.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210979" comment="xorg-x11-libXfixes-32bit-7.4-1.20 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7945</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7945" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7945" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXi before 1.7.7 allow remote X servers to cause a denial of service (out-of-bounds memory access or infinite loop) via vectors involving length fields.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7945.html">CVE-2016-7945</cve>
<bugzilla href="https://bugzilla.suse.com/1002998">SUSE bug 1002998</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1134167">SUSE bug 1134167</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203694" comment="xorg-x11-libs-7.4-8.26.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210987" comment="xorg-x11-libs-32bit-7.4-8.26.49 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7946</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7946" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7946" source="CVE"/>
    <description>
    X.org libXi before 1.7.7 allows remote X servers to cause a denial of service (infinite loop) via vectors involving length fields.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7946.html">CVE-2016-7946</cve>
<bugzilla href="https://bugzilla.suse.com/1002998">SUSE bug 1002998</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1134167">SUSE bug 1134167</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203694" comment="xorg-x11-libs-7.4-8.26.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210987" comment="xorg-x11-libs-32bit-7.4-8.26.49 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7947</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7947" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7947" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXrandr before 1.5.1 allow remote X servers to trigger out-of-bounds write operations via a crafted response.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7947.html">CVE-2016-7947</cve>
<bugzilla href="https://bugzilla.suse.com/1003000">SUSE bug 1003000</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203694" comment="xorg-x11-libs-7.4-8.26.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210987" comment="xorg-x11-libs-32bit-7.4-8.26.49 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7948</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7948" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7948" source="CVE"/>
    <description>
    X.org libXrandr before 1.5.1 allows remote X servers to trigger out-of-bounds write operations by leveraging mishandling of reply data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7948.html">CVE-2016-7948</cve>
<bugzilla href="https://bugzilla.suse.com/1003000">SUSE bug 1003000</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203694" comment="xorg-x11-libs-7.4-8.26.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210987" comment="xorg-x11-libs-32bit-7.4-8.26.49 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7949</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7949" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7949" source="CVE"/>
    <description>
    Multiple buffer overflows in the (1) XvQueryAdaptors and (2) XvQueryEncodings functions in X.org libXrender before 0.9.10 allow remote X servers to trigger out-of-bounds write operations via vectors involving length fields.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7949.html">CVE-2016-7949</cve>
<bugzilla href="https://bugzilla.suse.com/1003002">SUSE bug 1003002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015442">SUSE bug 1015442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123146">SUSE bug 1123146</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203686" comment="xorg-x11-libXrender-7.4-1.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210983" comment="xorg-x11-libXrender-32bit-7.4-1.20 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7950</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7950" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7950" source="CVE"/>
    <description>
    The XRenderQueryFilters function in X.org libXrender before 0.9.10 allows remote X servers to trigger out-of-bounds write operations via vectors involving filter name lengths.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7950.html">CVE-2016-7950</cve>
<bugzilla href="https://bugzilla.suse.com/1003002">SUSE bug 1003002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015442">SUSE bug 1015442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123146">SUSE bug 1123146</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203686" comment="xorg-x11-libXrender-7.4-1.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210983" comment="xorg-x11-libXrender-32bit-7.4-1.20 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7951</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7951" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7951" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXtst before 1.2.3 allow remote X servers to trigger out-of-bounds memory access operations by leveraging the lack of range checks.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7951.html">CVE-2016-7951</cve>
<bugzilla href="https://bugzilla.suse.com/1003012">SUSE bug 1003012</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203694" comment="xorg-x11-libs-7.4-8.26.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210987" comment="xorg-x11-libs-32bit-7.4-8.26.49 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7952</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7952" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7952" source="CVE"/>
    <description>
    X.org libXtst before 1.2.3 allows remote X servers to cause a denial of service (infinite loop) via a reply in the (1) XRecordStartOfData, (2) XRecordEndOfData, or (3) XRecordClientDied category without a client sequence and with attached data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7952.html">CVE-2016-7952</cve>
<bugzilla href="https://bugzilla.suse.com/1003012">SUSE bug 1003012</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203694" comment="xorg-x11-libs-7.4-8.26.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210987" comment="xorg-x11-libs-32bit-7.4-8.26.49 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7953</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7953" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7953" source="CVE"/>
    <description>
    Buffer underflow in X.org libXvMC before 1.0.10 allows remote X servers to have unspecified impact via an empty string.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7953.html">CVE-2016-7953</cve>
<bugzilla href="https://bugzilla.suse.com/1003023">SUSE bug 1003023</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203694" comment="xorg-x11-libs-7.4-8.26.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210987" comment="xorg-x11-libs-32bit-7.4-8.26.49 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7973</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7973" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7973" source="CVE"/>
    <description>
    The AppleTalk parser in tcpdump before 4.9.0 has a buffer overflow in print-atalk.c, multiple functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7973.html">CVE-2016-7973</cve>
<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210822" comment="tcpdump-3.9.8-1.29 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7974</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7974" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7974" source="CVE"/>
    <description>
    The IP parser in tcpdump before 4.9.0 has a buffer overflow in print-ip.c, multiple functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7974.html">CVE-2016-7974</cve>
<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210822" comment="tcpdump-3.9.8-1.29 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7975</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7975" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7975" source="CVE"/>
    <description>
    The TCP parser in tcpdump before 4.9.0 has a buffer overflow in print-tcp.c:tcp_print().
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7975.html">CVE-2016-7975</cve>
<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210822" comment="tcpdump-3.9.8-1.29 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7977</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-7977" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7977" source="CVE"/>
    <description>
    Ghostscript before 9.21 might allow remote attackers to bypass the SAFER mode protection mechanism and consequently read arbitrary files via the use of the .libfile operator in a crafted postscript document.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7977.html">CVE-2016-7977</cve>
<bugzilla href="https://bugzilla.suse.com/1001951">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1004237">SUSE bug 1004237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1095610">SUSE bug 1095610</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205336" comment="ghostscript-fonts-other-8.62-32.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205337" comment="ghostscript-fonts-rus-8.62-32.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205338" comment="ghostscript-fonts-std-8.62-32.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202626" comment="ghostscript-library-8.62-32.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205339" comment="ghostscript-omni-8.62-32.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205340" comment="ghostscript-x11-8.62-32.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205341" comment="libgimpprint-4.2.7-32.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7979</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-7979" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7979" source="CVE"/>
    <description>
    Ghostscript before 9.21 might allow remote attackers to bypass the SAFER mode protection mechanism and consequently execute arbitrary code by leveraging type confusion in .initialize_dsc_parser.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7979.html">CVE-2016-7979</cve>
<bugzilla href="https://bugzilla.suse.com/1001951">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1004237">SUSE bug 1004237</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205336" comment="ghostscript-fonts-other-8.62-32.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205337" comment="ghostscript-fonts-rus-8.62-32.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205338" comment="ghostscript-fonts-std-8.62-32.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202626" comment="ghostscript-library-8.62-32.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205339" comment="ghostscript-omni-8.62-32.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205340" comment="ghostscript-x11-8.62-32.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205341" comment="libgimpprint-4.2.7-32.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7983</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7983" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7983" source="CVE"/>
    <description>
    The BOOTP parser in tcpdump before 4.9.0 has a buffer overflow in print-bootp.c:bootp_print().
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7983.html">CVE-2016-7983</cve>
<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210822" comment="tcpdump-3.9.8-1.29 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7984</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7984" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7984" source="CVE"/>
    <description>
    The TFTP parser in tcpdump before 4.9.0 has a buffer overflow in print-tftp.c:tftp_print().
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7984.html">CVE-2016-7984</cve>
<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210822" comment="tcpdump-3.9.8-1.29 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7992</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7992" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7992" source="CVE"/>
    <description>
    The Classical IP over ATM parser in tcpdump before 4.9.0 has a buffer overflow in print-cip.c:cip_if_print().
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7992.html">CVE-2016-7992</cve>
<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210822" comment="tcpdump-3.9.8-1.29 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7993</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7993" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7993" source="CVE"/>
    <description>
    A bug in util-print.c:relts_print() in tcpdump before 4.9.0 could cause a buffer overflow in multiple protocol parsers (DNS, DVMRP, HSRP, IGMP, lightweight resolver protocol, PIM).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7993.html">CVE-2016-7993</cve>
<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210822" comment="tcpdump-3.9.8-1.29 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7996</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7996" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7996" source="CVE"/>
    <description>
    Heap-based buffer overflow in the WPG format reader in GraphicsMagick 1.3.25 and earlier allows remote attackers to have unspecified impact via a colormap with a large number of entries.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7996.html">CVE-2016-7996</cve>
<bugzilla href="https://bugzilla.suse.com/1003629">SUSE bug 1003629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1067184">SUSE bug 1067184</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202227" comment="ImageMagick-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209108" comment="libMagickCore1-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209109" comment="libMagickCore1-32bit-6.4.3.6-7.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7997</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-7997" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7997" source="CVE"/>
    <description>
    The WPG format reader in GraphicsMagick 1.3.25 and earlier allows remote attackers to cause a denial of service (assertion failure and crash) via vectors related to a ReferenceBlob and a NULL pointer.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7997.html">CVE-2016-7997</cve>
<bugzilla href="https://bugzilla.suse.com/1003629">SUSE bug 1003629</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202227" comment="ImageMagick-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209108" comment="libMagickCore1-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209109" comment="libMagickCore1-32bit-6.4.3.6-7.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168331" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8331</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-8331" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8331" source="CVE"/>
    <description>
    An exploitable remote code execution vulnerability exists in the handling of TIFF images in LibTIFF version 4.0.6. A crafted TIFF document can lead to a type confusion vulnerability resulting in remote code execution. This vulnerability can be triggered via a TIFF file delivered to the application using LibTIFF's tag extension functionality.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8331.html">CVE-2016-8331</cve>
<bugzilla href="https://bugzilla.suse.com/1007276">SUSE bug 1007276</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009229551" comment="libtiff3-3.8.2-141.169.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229568" comment="libtiff3-32bit-3.8.2-141.169.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229522" comment="tiff-3.8.2-141.169.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168399" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8399</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-8399" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8399" source="CVE"/>
    <description>
    An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8399.html">CVE-2016-8399</cve>
<bugzilla href="https://bugzilla.suse.com/1014746">SUSE bug 1014746</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208770" comment="kernel-default-man-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205650" comment="kernel-pae-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205651" comment="kernel-pae-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205652" comment="kernel-pae-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8405</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-8405" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8405" source="CVE"/>
    <description>
    An information disclosure vulnerability in kernel components including the ION subsystem, Binder, USB driver and networking subsystem could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31651010.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8405.html">CVE-2016-8405</cve>
<bugzilla href="https://bugzilla.suse.com/1099942">SUSE bug 1099942</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009232611" comment="kernel-bigsmp-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232612" comment="kernel-bigsmp-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232613" comment="kernel-bigsmp-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232594" comment="kernel-default-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232595" comment="kernel-default-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232596" comment="kernel-default-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232614" comment="kernel-default-man-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232597" comment="kernel-ec2-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232598" comment="kernel-ec2-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232599" comment="kernel-ec2-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232600" comment="kernel-pae-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232601" comment="kernel-pae-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232602" comment="kernel-pae-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232603" comment="kernel-source-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232604" comment="kernel-syms-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232605" comment="kernel-trace-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232606" comment="kernel-trace-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232607" comment="kernel-trace-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232608" comment="kernel-xen-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232609" comment="kernel-xen-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232610" comment="kernel-xen-devel-3.0.101-0.47.106.43 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8574</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-8574" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8574" source="CVE"/>
    <description>
    The FRF.15 parser in tcpdump before 4.9.0 has a buffer overflow in print-fr.c:frf15_print().
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8574.html">CVE-2016-8574</cve>
<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210822" comment="tcpdump-3.9.8-1.29 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8576</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-8576" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8576" source="CVE"/>
    <description>
    The xhci_ring_fetch function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging failure to limit the number of link Transfer Request Blocks (TRB) to process.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8576.html">CVE-2016-8576</cve>
<bugzilla href="https://bugzilla.suse.com/1003878">SUSE bug 1003878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1004016">SUSE bug 1004016</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250395" comment="kvm-1.4.2-52 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8577</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-8577" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8577" source="CVE"/>
    <description>
    Memory leak in the v9fs_read function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via vectors related to an I/O read operation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8577.html">CVE-2016-8577</cve>
<bugzilla href="https://bugzilla.suse.com/1003893">SUSE bug 1003893</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1004021">SUSE bug 1004021</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250395" comment="kvm-1.4.2-52 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8578</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-8578" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8578" source="CVE"/>
    <description>
    The v9fs_iov_vunmarshal function in fsdev/9p-iov-marshal.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) by sending an empty string parameter to a 9P operation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8578.html">CVE-2016-8578</cve>
<bugzilla href="https://bugzilla.suse.com/1003894">SUSE bug 1003894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1004023">SUSE bug 1004023</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250395" comment="kvm-1.4.2-52 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8602</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-8602" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8602" source="CVE"/>
    <description>
    The .sethalftone5 function in psi/zht2.c in Ghostscript before 9.21 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted Postscript document that calls .sethalftone5 with an empty operand stack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8602.html">CVE-2016-8602</cve>
<bugzilla href="https://bugzilla.suse.com/1001951">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1004237">SUSE bug 1004237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1036453">SUSE bug 1036453</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209260" comment="ghostscript-fonts-other-8.62-32.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209261" comment="ghostscript-fonts-rus-8.62-32.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209262" comment="ghostscript-fonts-std-8.62-32.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202622" comment="ghostscript-library-8.62-32.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209263" comment="ghostscript-omni-8.62-32.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209264" comment="ghostscript-x11-8.62-32.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209265" comment="libgimpprint-4.2.7-32.41 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8605</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-8605" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8605" source="CVE"/>
    <description>
    The mkdir procedure of GNU Guile temporarily changed the process' umask to zero. During that time window, in a multithreaded application, other threads could end up creating files with insecure permissions. For example, mkdir without the optional mode argument would create directories as 0777. This is fixed in Guile 2.0.13. Prior versions are affected.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8605.html">CVE-2016-8605</cve>
<bugzilla href="https://bugzilla.suse.com/1004221">SUSE bug 1004221</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202722" comment="guile-1.8.5-24 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8610</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-8610" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8610" source="CVE"/>
    <description>
    A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8610.html">CVE-2016-8610</cve>
<bugzilla href="https://bugzilla.suse.com/1005878">SUSE bug 1005878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1005879">SUSE bug 1005879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1025347">SUSE bug 1025347</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1120592">SUSE bug 1120592</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
<bugzilla href="https://bugzilla.suse.com/982575">SUSE bug 982575</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202706" comment="gnutls-2.4.1-24.39.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202709" comment="libgnutls-extra26-2.4.1-24.39.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209322" comment="libgnutls26-2.4.1-24.39.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209323" comment="libgnutls26-32bit-2.4.1-24.39.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009242431" comment="libopenssl0_9_8-0.9.8j-0.106.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009242434" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009242432" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009242435" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240955" comment="libopenssl1-devel-1.0.1g-0.58.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248704" comment="libopenssl1-devel-32bit-1.0.1g-0.58.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240956" comment="libopenssl1_0_0-1.0.1g-0.58.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240957" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009242430" comment="openssl-0.9.8j-0.106.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009242433" comment="openssl-doc-0.9.8j-0.106.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240959" comment="openssl1-1.0.1g-0.58.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240960" comment="openssl1-doc-1.0.1g-0.58.15 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203229" comment="libopenssl-devel-0.9.8j-0.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205690" comment="libopenssl0_9_8-0.9.8j-0.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208804" comment="libopenssl0_9_8-32bit-0.9.8j-0.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205691" comment="libopenssl0_9_8-hmac-0.9.8j-0.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208805" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203231" comment="openssl-0.9.8j-0.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205692" comment="openssl-doc-0.9.8j-0.105 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009242428" comment="libopenssl-devel-0.9.8j-0.106.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009242431" comment="libopenssl0_9_8-0.9.8j-0.106.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009242434" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009242432" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009242435" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009242430" comment="openssl-0.9.8j-0.106.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009242433" comment="openssl-doc-0.9.8j-0.106.18 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8614</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-8614" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8614" source="CVE"/>
    <description>
    A flaw was found in Ansible before version 2.2.0. The apt_key module does not properly verify key fingerprints, allowing remote adversary to create an OpenPGP key which matches the short key ID and inject this key instead of the correct key.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8614.html">CVE-2016-8614</cve>
<bugzilla href="https://bugzilla.suse.com/1008038">SUSE bug 1008038</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249903" comment="ansible-2.2.0.0-7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8615</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-8615" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615" source="CVE"/>
    <description>
    A flaw was found in curl before version 7.51. If cookie state is written into a cookie jar file that is later read back and used for subsequent requests, a malicious HTTP server can inject new cookies for arbitrary domains into said cookie jar.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8615.html">CVE-2016-8615</cve>
<bugzilla href="https://bugzilla.suse.com/1005633">SUSE bug 1005633</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202479" comment="curl-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203713" comment="curl-openssl1-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209198" comment="libcurl4-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209199" comment="libcurl4-32bit-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203714" comment="libcurl4-openssl1-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203715" comment="libcurl4-openssl1-32bit-7.19.7-1.64 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8616</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-8616" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616" source="CVE"/>
    <description>
    A flaw was found in curl before version 7.51.0 When re-using a connection, curl was doing case insensitive comparisons of user name and password with the existing connections. This means that if an unused connection with proper credentials exists for a protocol that has connection-scoped credentials, an attacker can cause that connection to be reused if s/he knows the case-insensitive version of the correct password.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8616.html">CVE-2016-8616</cve>
<bugzilla href="https://bugzilla.suse.com/1005634">SUSE bug 1005634</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202479" comment="curl-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203713" comment="curl-openssl1-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209198" comment="libcurl4-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209199" comment="libcurl4-32bit-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203714" comment="libcurl4-openssl1-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203715" comment="libcurl4-openssl1-32bit-7.19.7-1.64 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8617</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-8617" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617" source="CVE"/>
    <description>
    The base64 encode function in curl before version 7.51.0 is prone to a buffer being under allocated in 32bit systems if it receives at least 1Gb as input via `CURLOPT_USERNAME`.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8617.html">CVE-2016-8617</cve>
<bugzilla href="https://bugzilla.suse.com/1005635">SUSE bug 1005635</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202479" comment="curl-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203713" comment="curl-openssl1-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209198" comment="libcurl4-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209199" comment="libcurl4-32bit-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203714" comment="libcurl4-openssl1-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203715" comment="libcurl4-openssl1-32bit-7.19.7-1.64 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8618</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-8618" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618" source="CVE"/>
    <description>
    The libcurl API function called `curl_maprintf()` before version 7.51.0 can be tricked into doing a double-free due to an unsafe `size_t` multiplication, on systems using 32 bit `size_t` variables.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8618.html">CVE-2016-8618</cve>
<bugzilla href="https://bugzilla.suse.com/1005637">SUSE bug 1005637</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202479" comment="curl-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203713" comment="curl-openssl1-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209198" comment="libcurl4-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209199" comment="libcurl4-32bit-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203714" comment="libcurl4-openssl1-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203715" comment="libcurl4-openssl1-32bit-7.19.7-1.64 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8619</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-8619" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619" source="CVE"/>
    <description>
    The function `read_data()` in security.c in curl before version 7.51.0 is vulnerable to memory double free.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8619.html">CVE-2016-8619</cve>
<bugzilla href="https://bugzilla.suse.com/1005638">SUSE bug 1005638</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202479" comment="curl-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203713" comment="curl-openssl1-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209198" comment="libcurl4-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209199" comment="libcurl4-32bit-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203714" comment="libcurl4-openssl1-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203715" comment="libcurl4-openssl1-32bit-7.19.7-1.64 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8620</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-8620" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620" source="CVE"/>
    <description>
    The 'globbing' feature in curl before version 7.51.0 has a flaw that leads to integer overflow and out-of-bounds read via user controlled input.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8620.html">CVE-2016-8620</cve>
<bugzilla href="https://bugzilla.suse.com/1005640">SUSE bug 1005640</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202479" comment="curl-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203713" comment="curl-openssl1-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209198" comment="libcurl4-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209199" comment="libcurl4-32bit-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203714" comment="libcurl4-openssl1-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203715" comment="libcurl4-openssl1-32bit-7.19.7-1.64 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8621</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-8621" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621" source="CVE"/>
    <description>
    The `curl_getdate` function in curl before version 7.51.0 is vulnerable to an out of bounds read if it receives an input with one digit short.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8621.html">CVE-2016-8621</cve>
<bugzilla href="https://bugzilla.suse.com/1005642">SUSE bug 1005642</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202479" comment="curl-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203713" comment="curl-openssl1-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209198" comment="libcurl4-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209199" comment="libcurl4-32bit-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203714" comment="libcurl4-openssl1-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203715" comment="libcurl4-openssl1-32bit-7.19.7-1.64 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8622</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-8622" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622" source="CVE"/>
    <description>
    The URL percent-encoding decode function in libcurl before 7.51.0 is called `curl_easy_unescape`. Internally, even if this function would be made to allocate a unscape destination buffer larger than 2GB, it would return that new length in a signed 32 bit integer variable, thus the length would get either just truncated or both truncated and turned negative. That could then lead to libcurl writing outside of its heap based buffer.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8622.html">CVE-2016-8622</cve>
<bugzilla href="https://bugzilla.suse.com/1005643">SUSE bug 1005643</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202479" comment="curl-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203713" comment="curl-openssl1-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209198" comment="libcurl4-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209199" comment="libcurl4-32bit-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203714" comment="libcurl4-openssl1-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203715" comment="libcurl4-openssl1-32bit-7.19.7-1.64 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8623</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-8623" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623" source="CVE"/>
    <description>
    A flaw was found in curl before version 7.51.0. The way curl handles cookies permits other threads to trigger a use-after-free leading to information disclosure.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8623.html">CVE-2016-8623</cve>
<bugzilla href="https://bugzilla.suse.com/1005645">SUSE bug 1005645</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202479" comment="curl-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203713" comment="curl-openssl1-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209198" comment="libcurl4-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209199" comment="libcurl4-32bit-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203714" comment="libcurl4-openssl1-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203715" comment="libcurl4-openssl1-32bit-7.19.7-1.64 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8624</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-8624" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624" source="CVE"/>
    <description>
    curl before version 7.51.0 doesn't parse the authority component of the URL correctly when the host name part ends with a '#' character, and could instead be tricked into connecting to a different host. This may have security implications if you for example use an URL parser that follows the RFC to check for allowed domains before using curl to request them.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8624.html">CVE-2016-8624</cve>
<bugzilla href="https://bugzilla.suse.com/1005646">SUSE bug 1005646</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202479" comment="curl-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203713" comment="curl-openssl1-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209198" comment="libcurl4-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209199" comment="libcurl4-32bit-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203714" comment="libcurl4-openssl1-7.19.7-1.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203715" comment="libcurl4-openssl1-32bit-7.19.7-1.64 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8628</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-8628" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8628" source="CVE"/>
    <description>
    Ansible before version 2.2.0 fails to properly sanitize fact variables sent from the Ansible controller. An attacker with the ability to create special variables on the controller could execute arbitrary commands on Ansible clients as the user Ansible runs as.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8628.html">CVE-2016-8628</cve>
<bugzilla href="https://bugzilla.suse.com/1008037">SUSE bug 1008037</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249903" comment="ansible-2.2.0.0-7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8632</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-8632" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8632" source="CVE"/>
    <description>
    The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8632.html">CVE-2016-8632</cve>
<bugzilla href="https://bugzilla.suse.com/1008831">SUSE bug 1008831</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1012852">SUSE bug 1012852</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208770" comment="kernel-default-man-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205650" comment="kernel-pae-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205651" comment="kernel-pae-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205652" comment="kernel-pae-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8633</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-8633" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8633" source="CVE"/>
    <description>
    drivers/firewire/net.c in the Linux kernel before 4.8.7, in certain unusual hardware configurations, allows remote attackers to execute arbitrary code via crafted fragmented packets.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8633.html">CVE-2016-8633</cve>
<bugzilla href="https://bugzilla.suse.com/1008833">SUSE bug 1008833</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208770" comment="kernel-default-man-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205650" comment="kernel-pae-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205651" comment="kernel-pae-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205652" comment="kernel-pae-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8635</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-8635" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8635" source="CVE"/>
    <description>
    It was found that Diffie Hellman Client key exchange handling in NSS 3.21.x was vulnerable to small subgroup confinement attack. An attacker could use this flaw to recover private keys by confining the client DH key to small subgroup of the desired group.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8635.html">CVE-2016-8635</cve>
<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015547">SUSE bug 1015547</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202355" comment="MozillaFirefox-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205245" comment="MozillaFirefox-translations-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205246" comment="libfreebl3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208371" comment="libfreebl3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205247" comment="libsoftokn3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208372" comment="libsoftokn3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202359" comment="mozilla-nss-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208374" comment="mozilla-nss-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205248" comment="mozilla-nss-tools-3.29.5-46 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8641</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-8641" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8641" source="CVE"/>
    <description>
    A privilege escalation vulnerability was found in nagios 4.2.x that occurs in daemon-init.in when creating necessary files and insecurely changing the ownership afterwards. It's possible for the local attacker to create symbolic links before the files are to be created and possibly escalating the privileges with the ownership change.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8641.html">CVE-2016-8641</cve>
<bugzilla href="https://bugzilla.suse.com/1011630">SUSE bug 1011630</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1018047">SUSE bug 1018047</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009237466" comment="nagios-3.0.6-1.25.36.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237468" comment="nagios-www-3.0.6-1.25.36.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8646</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-8646" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8646" source="CVE"/>
    <description>
    The hash_accept function in crypto/algif_hash.c in the Linux kernel before 4.3.6 allows local users to cause a denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero bytes of data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8646.html">CVE-2016-8646</cve>
<bugzilla href="https://bugzilla.suse.com/1010150">SUSE bug 1010150</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208770" comment="kernel-default-man-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205650" comment="kernel-pae-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205651" comment="kernel-pae-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205652" comment="kernel-pae-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8647</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-8647" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8647" source="CVE"/>
    <description>
    An input validation vulnerability was found in Ansible's mysql_user module before 2.2.1.0, which may fail to correctly change a password in certain circumstances. Thus the previous password would still be active when it should have been changed.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8647.html">CVE-2016-8647</cve>
<bugzilla href="https://bugzilla.suse.com/1008038">SUSE bug 1008038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1010940">SUSE bug 1010940</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249903" comment="ansible-2.2.0.0-7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8654</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-8654" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8654" source="CVE"/>
    <description>
    A heap-buffer overflow vulnerability was found in QMFB code in JPC codec caused by buffer being allocated with too small size. jasper versions before 2.0.0 are affected.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8654.html">CVE-2016-8654</cve>
<bugzilla href="https://bugzilla.suse.com/1012530">SUSE bug 1012530</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202750" comment="jasper-1.900.14-134.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209370" comment="libjasper-1.900.14-134.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209371" comment="libjasper-32bit-1.900.14-134.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8667</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-8667" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8667" source="CVE"/>
    <description>
    The rc4030_write function in hw/dma/rc4030.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via a large interval timer reload value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8667.html">CVE-2016-8667</cve>
<bugzilla href="https://bugzilla.suse.com/1004702">SUSE bug 1004702</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1005004">SUSE bug 1005004</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205952" comment="xen-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209058" comment="xen-doc-html-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209059" comment="xen-doc-pdf-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205953" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.90-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205954" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.90-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205955" comment="xen-libs-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209060" comment="xen-libs-32bit-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209061" comment="xen-tools-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205956" comment="xen-tools-domU-4.2.5_21-30 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205952" comment="xen-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209058" comment="xen-doc-html-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209059" comment="xen-doc-pdf-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205953" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.90-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205955" comment="xen-libs-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209060" comment="xen-libs-32bit-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209061" comment="xen-tools-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205956" comment="xen-tools-domU-4.2.5_21-30 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250395" comment="kvm-1.4.2-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8669</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-8669" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8669" source="CVE"/>
    <description>
    The serial_update_parameters function in hw/char/serial.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving a value of divider greater than baud base.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8669.html">CVE-2016-8669</cve>
<bugzilla href="https://bugzilla.suse.com/1004707">SUSE bug 1004707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1005005">SUSE bug 1005005</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205952" comment="xen-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209058" comment="xen-doc-html-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209059" comment="xen-doc-pdf-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205953" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.90-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205954" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.90-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205955" comment="xen-libs-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209060" comment="xen-libs-32bit-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209061" comment="xen-tools-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205956" comment="xen-tools-domU-4.2.5_21-30 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205952" comment="xen-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209058" comment="xen-doc-html-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209059" comment="xen-doc-pdf-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205953" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.90-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205955" comment="xen-libs-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209060" comment="xen-libs-32bit-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209061" comment="xen-tools-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205956" comment="xen-tools-domU-4.2.5_21-30 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250395" comment="kvm-1.4.2-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8670</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-8670" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8670" source="CVE"/>
    <description>
    Integer signedness error in the dynamicGetbuf function in gd_io_dp.c in the GD Graphics Library (aka libgd) through 2.2.3, as used in PHP before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a crafted imagecreatefromstring call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8670.html">CVE-2016-8670</cve>
<bugzilla href="https://bugzilla.suse.com/1004924">SUSE bug 1004924</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210356" comment="apache2-mod_php53-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202612" comment="gd-2.0.36.RC1-52.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203296" comment="php53-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210357" comment="php53-bcmath-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210358" comment="php53-bz2-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210359" comment="php53-calendar-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210360" comment="php53-ctype-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210361" comment="php53-curl-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210362" comment="php53-dba-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210363" comment="php53-dom-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210364" comment="php53-exif-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210365" comment="php53-fastcgi-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210366" comment="php53-fileinfo-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210367" comment="php53-ftp-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210368" comment="php53-gd-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210369" comment="php53-gettext-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210370" comment="php53-gmp-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210371" comment="php53-iconv-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210372" comment="php53-intl-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210373" comment="php53-json-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210374" comment="php53-ldap-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210375" comment="php53-mbstring-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210376" comment="php53-mcrypt-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210377" comment="php53-mysql-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210378" comment="php53-odbc-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210379" comment="php53-openssl-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210380" comment="php53-pcntl-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210381" comment="php53-pdo-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210382" comment="php53-pear-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210383" comment="php53-pgsql-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210384" comment="php53-pspell-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210385" comment="php53-shmop-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210386" comment="php53-snmp-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210387" comment="php53-soap-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210388" comment="php53-suhosin-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210389" comment="php53-sysvmsg-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210390" comment="php53-sysvsem-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210391" comment="php53-sysvshm-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210392" comment="php53-tokenizer-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210393" comment="php53-wddx-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210394" comment="php53-xmlreader-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210395" comment="php53-xmlrpc-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210396" comment="php53-xmlwriter-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210397" comment="php53-xsl-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210398" comment="php53-zip-5.3.17-87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210399" comment="php53-zlib-5.3.17-87 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8682</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-8682" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8682" source="CVE"/>
    <description>
    The ReadSCTImage function in coders/sct.c in GraphicsMagick 1.3.25 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted SCT header.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8682.html">CVE-2016-8682</cve>
<bugzilla href="https://bugzilla.suse.com/1005125">SUSE bug 1005125</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202227" comment="ImageMagick-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209108" comment="libMagickCore1-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209109" comment="libMagickCore1-32bit-6.4.3.6-7.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8683</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-8683" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8683" source="CVE"/>
    <description>
    The ReadPCXImage function in coders/pcx.c in GraphicsMagick 1.3.25 allows remote attackers to have unspecified impact via a crafted image, which triggers a memory allocation failure and a "file truncation error for corrupt file."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8683.html">CVE-2016-8683</cve>
<bugzilla href="https://bugzilla.suse.com/1005127">SUSE bug 1005127</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202227" comment="ImageMagick-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209108" comment="libMagickCore1-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209109" comment="libMagickCore1-32bit-6.4.3.6-7.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8684</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-8684" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8684" source="CVE"/>
    <description>
    The MagickMalloc function in magick/memory.c in GraphicsMagick 1.3.25 allows remote attackers to have unspecified impact via a crafted image, which triggers a memory allocation failure and a "file truncation error for corrupt file."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8684.html">CVE-2016-8684</cve>
<bugzilla href="https://bugzilla.suse.com/1005123">SUSE bug 1005123</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202227" comment="ImageMagick-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209108" comment="libMagickCore1-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209109" comment="libMagickCore1-32bit-6.4.3.6-7.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8690</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-8690" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8690" source="CVE"/>
    <description>
    The bmp_getdata function in libjasper/bmp/bmp_dec.c in JasPer before 1.900.5 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted BMP image in an imginfo command.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8690.html">CVE-2016-8690</cve>
<bugzilla href="https://bugzilla.suse.com/1005084">SUSE bug 1005084</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1007009">SUSE bug 1007009</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202748" comment="jasper-1.900.14-134.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209367" comment="libjasper-1.900.14-134.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209368" comment="libjasper-32bit-1.900.14-134.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8691</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-8691" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8691" source="CVE"/>
    <description>
    The jpc_dec_process_siz function in libjasper/jpc/jpc_dec.c in JasPer before 1.900.4 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted XRsiz value in a BMP image to the imginfo command.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8691.html">CVE-2016-8691</cve>
<bugzilla href="https://bugzilla.suse.com/1005090">SUSE bug 1005090</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202748" comment="jasper-1.900.14-134.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209367" comment="libjasper-1.900.14-134.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209368" comment="libjasper-32bit-1.900.14-134.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8692</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-8692" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8692" source="CVE"/>
    <description>
    The jpc_dec_process_siz function in libjasper/jpc/jpc_dec.c in JasPer before 1.900.4 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted YRsiz value in a BMP image to the imginfo command.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8692.html">CVE-2016-8692</cve>
<bugzilla href="https://bugzilla.suse.com/1005090">SUSE bug 1005090</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202748" comment="jasper-1.900.14-134.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209367" comment="libjasper-1.900.14-134.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209368" comment="libjasper-32bit-1.900.14-134.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8693</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-8693" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8693" source="CVE"/>
    <description>
    Double free vulnerability in the mem_close function in jas_stream.c in JasPer before 1.900.10 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted BMP image to the imginfo command.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8693.html">CVE-2016-8693</cve>
<bugzilla href="https://bugzilla.suse.com/1005242">SUSE bug 1005242</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202748" comment="jasper-1.900.14-134.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209367" comment="libjasper-1.900.14-134.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209368" comment="libjasper-32bit-1.900.14-134.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8707</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-8707" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8707" source="CVE"/>
    <description>
    An exploitable out of bounds write exists in the handling of compressed TIFF images in ImageMagicks's convert utility. A crafted TIFF document can lead to an out of bounds write which in particular circumstances could be leveraged into remote code execution. The vulnerability can be triggered through any user controlled TIFF that is handled by this functionality.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8707.html">CVE-2016-8707</cve>
<bugzilla href="https://bugzilla.suse.com/1014159">SUSE bug 1014159</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202234" comment="ImageMagick-6.4.3.6-7.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209110" comment="libMagickCore1-6.4.3.6-7.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209111" comment="libMagickCore1-32bit-6.4.3.6-7.60 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8735</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-8735" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8735" source="CVE"/>
    <description>
    Remote code execution is possible with Apache Tomcat before 6.0.48, 7.x before 7.0.73, 8.x before 8.0.39, 8.5.x before 8.5.7, and 9.x before 9.0.0.M12 if JmxRemoteLifecycleListener is used and an attacker can reach JMX ports. The issue exists because this listener wasn't updated for consistency with the CVE-2016-3427 Oracle patch that affected credential types.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8735.html">CVE-2016-8735</cve>
<bugzilla href="https://bugzilla.suse.com/1011805">SUSE bug 1011805</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205936" comment="tomcat6-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205937" comment="tomcat6-admin-webapps-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205938" comment="tomcat6-docs-webapp-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205939" comment="tomcat6-javadoc-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205940" comment="tomcat6-jsp-2_1-api-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205941" comment="tomcat6-lib-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205942" comment="tomcat6-servlet-2_5-api-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205943" comment="tomcat6-webapps-6.0.53-0.56 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8743</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-8743" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8743" source="CVE"/>
    <description>
    Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8743.html">CVE-2016-8743</cve>
<bugzilla href="https://bugzilla.suse.com/1016715">SUSE bug 1016715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1033513">SUSE bug 1033513</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1086774">SUSE bug 1086774</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1104826">SUSE bug 1104826</bugzilla>
<bugzilla href="https://bugzilla.suse.com/930944">SUSE bug 930944</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202393" comment="apache2-2.2.12-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202395" comment="apache2-doc-2.2.12-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202396" comment="apache2-example-pages-2.2.12-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202397" comment="apache2-prefork-2.2.12-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202398" comment="apache2-utils-2.2.12-69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202399" comment="apache2-worker-2.2.12-69 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-8745" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8745" source="CVE"/>
    <description>
    A bug in the error handling of the send file code for the NIO HTTP connector in Apache Tomcat 9.0.0.M1 to 9.0.0.M13, 8.5.0 to 8.5.8, 8.0.0.RC1 to 8.0.39, 7.0.0 to 7.0.73 and 6.0.16 to 6.0.48 resulted in the current Processor object being added to the Processor cache multiple times. This in turn meant that the same Processor could be used for concurrent requests. Sharing a Processor can result in information leakage between requests including, not not limited to, session ID and the response body. The bug was first noticed in 8.5.x onwards where it appears the refactoring of the Connector code for 8.5.x onwards made it more likely that the bug was observed. Initially it was thought that the 8.5.x refactoring introduced the bug but further investigation has shown that the bug is present in all currently supported Tomcat versions.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8745.html">CVE-2016-8745</cve>
<bugzilla href="https://bugzilla.suse.com/1015119">SUSE bug 1015119</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205936" comment="tomcat6-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205937" comment="tomcat6-admin-webapps-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205938" comment="tomcat6-docs-webapp-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205939" comment="tomcat6-javadoc-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205940" comment="tomcat6-jsp-2_1-api-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205941" comment="tomcat6-lib-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205942" comment="tomcat6-servlet-2_5-api-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205943" comment="tomcat6-webapps-6.0.53-0.56 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8858</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-8858" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8858" source="CVE"/>
    <description>
    ** DISPUTED ** The kex_input_kexinit function in kex.c in OpenSSH 6.x and 7.x through 7.3 allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate KEXINIT requests.  NOTE: a third party reports that "OpenSSH upstream does not consider this as a security issue."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8858.html">CVE-2016-8858</cve>
<bugzilla href="https://bugzilla.suse.com/1005480">SUSE bug 1005480</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1025354">SUSE bug 1025354</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1039572">SUSE bug 1039572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1087412">SUSE bug 1087412</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205684" comment="openssh-6.2p2-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205685" comment="openssh-askpass-6.2p2-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205686" comment="openssh-askpass-gnome-6.2p2-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203764" comment="openssh-openssl1-6.6p1-18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203765" comment="openssh-openssl1-helpers-6.6p1-18 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205684" comment="openssh-6.2p2-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205685" comment="openssh-askpass-6.2p2-0.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205686" comment="openssh-askpass-gnome-6.2p2-0.40 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8862</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-8862" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8862" source="CVE"/>
    <description>
    The AcquireMagickMemory function in MagickCore/memory.c in ImageMagick before 7.0.3.3 allows remote attackers to have unspecified impact via a crafted image, which triggers a memory allocation failure.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8862.html">CVE-2016-8862</cve>
<bugzilla href="https://bugzilla.suse.com/1007245">SUSE bug 1007245</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1009318">SUSE bug 1009318</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1031267">SUSE bug 1031267</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202227" comment="ImageMagick-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209108" comment="libMagickCore1-6.4.3.6-7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209109" comment="libMagickCore1-32bit-6.4.3.6-7.54 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8864</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-8864" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8864" source="CVE"/>
    <description>
    named in ISC BIND 9.x before 9.9.9-P4, 9.10.x before 9.10.4-P4, and 9.11.x before 9.11.0-P1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a DNAME record in the answer section of a response to a recursive query, related to db.c and resolver.c.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8864.html">CVE-2016-8864</cve>
<bugzilla href="https://bugzilla.suse.com/1007829">SUSE bug 1007829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1018700">SUSE bug 1018700</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1018701">SUSE bug 1018701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1018702">SUSE bug 1018702</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1020526">SUSE bug 1020526</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1024130">SUSE bug 1024130</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1033466">SUSE bug 1033466</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202440" comment="bind-9.9.6P1-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205283" comment="bind-chrootenv-9.9.6P1-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205284" comment="bind-doc-9.9.6P1-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205285" comment="bind-libs-9.9.6P1-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207617" comment="bind-libs-32bit-9.9.6P1-0.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205286" comment="bind-utils-9.9.6P1-0.33 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8866</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-8866" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8866" source="CVE"/>
    <description>
    The AcquireMagickMemory function in MagickCore/memory.c in ImageMagick 7.0.3.3 before 7.0.3.8 allows remote attackers to have unspecified impact via a crafted image, which triggers a memory allocation failure.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-8862.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8866.html">CVE-2016-8866</cve>
<bugzilla href="https://bugzilla.suse.com/1007245">SUSE bug 1007245</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1009318">SUSE bug 1009318</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1031267">SUSE bug 1031267</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202234" comment="ImageMagick-6.4.3.6-7.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209110" comment="libMagickCore1-6.4.3.6-7.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209111" comment="libMagickCore1-32bit-6.4.3.6-7.60 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8880</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-8880" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8880" source="CVE"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2011-4516. Reason: This candidate is a duplicate of CVE-2011-4516. Notes: All CVE users should reference CVE-2011-4516 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8880.html">CVE-2016-8880</cve>
<bugzilla href="https://bugzilla.suse.com/1006591">SUSE bug 1006591</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202748" comment="jasper-1.900.14-134.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209367" comment="libjasper-1.900.14-134.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209368" comment="libjasper-32bit-1.900.14-134.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8881</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-8881" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8881" source="CVE"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2011-4517. Reason: This candidate is a duplicate of CVE-2011-4517. Notes: All CVE users should reference CVE-2011-4517 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8881.html">CVE-2016-8881</cve>
<bugzilla href="https://bugzilla.suse.com/1006593">SUSE bug 1006593</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202748" comment="jasper-1.900.14-134.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209367" comment="libjasper-1.900.14-134.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209368" comment="libjasper-32bit-1.900.14-134.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8882</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-8882" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8882" source="CVE"/>
    <description>
    The jpc_dec_tilefini function in libjasper/jpc/jpc_dec.c in JasPer before 1.900.8 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8882.html">CVE-2016-8882</cve>
<bugzilla href="https://bugzilla.suse.com/1006597">SUSE bug 1006597</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202748" comment="jasper-1.900.14-134.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209367" comment="libjasper-1.900.14-134.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209368" comment="libjasper-32bit-1.900.14-134.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8883</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-8883" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8883" source="CVE"/>
    <description>
    The jpc_dec_tiledecode function in jpc_dec.c in JasPer before 1.900.8 allows remote attackers to cause a denial of service (assertion failure) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8883.html">CVE-2016-8883</cve>
<bugzilla href="https://bugzilla.suse.com/1006598">SUSE bug 1006598</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202748" comment="jasper-1.900.14-134.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209367" comment="libjasper-1.900.14-134.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209368" comment="libjasper-32bit-1.900.14-134.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8884</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-8884" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8884" source="CVE"/>
    <description>
    The bmp_getdata function in libjasper/bmp/bmp_dec.c in JasPer 1.900.5 allows remote attackers to cause a denial of service (NULL pointer dereference) by calling the imginfo command with a crafted BMP image. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-8690.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8884.html">CVE-2016-8884</cve>
<bugzilla href="https://bugzilla.suse.com/1005084">SUSE bug 1005084</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1007009">SUSE bug 1007009</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202748" comment="jasper-1.900.14-134.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209367" comment="libjasper-1.900.14-134.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209368" comment="libjasper-32bit-1.900.14-134.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8885</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-8885" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8885" source="CVE"/>
    <description>
    The bmp_getdata function in libjasper/bmp/bmp_dec.c in JasPer before 1.900.9 allows remote attackers to cause a denial of service (NULL pointer dereference) by calling the imginfo command with a crafted BMP image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8885.html">CVE-2016-8885</cve>
<bugzilla href="https://bugzilla.suse.com/1005084">SUSE bug 1005084</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1007009">SUSE bug 1007009</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202748" comment="jasper-1.900.14-134.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209367" comment="libjasper-1.900.14-134.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209368" comment="libjasper-32bit-1.900.14-134.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8886</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-8886" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8886" source="CVE"/>
    <description>
    The jas_malloc function in libjasper/base/jas_malloc.c in JasPer before 1.900.11 allows remote attackers to have unspecified impact via a crafted file, which triggers a memory allocation failure.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8886.html">CVE-2016-8886</cve>
<bugzilla href="https://bugzilla.suse.com/1006599">SUSE bug 1006599</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202748" comment="jasper-1.900.14-134.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209367" comment="libjasper-1.900.14-134.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209368" comment="libjasper-32bit-1.900.14-134.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8887</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-8887" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8887" source="CVE"/>
    <description>
    The jp2_colr_destroy function in libjasper/jp2/jp2_cod.c in JasPer before 1.900.10 allows remote attackers to cause a denial of service (NULL pointer dereference).
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8887.html">CVE-2016-8887</cve>
<bugzilla href="https://bugzilla.suse.com/1006836">SUSE bug 1006836</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1006839">SUSE bug 1006839</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202748" comment="jasper-1.900.14-134.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209367" comment="libjasper-1.900.14-134.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209368" comment="libjasper-32bit-1.900.14-134.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8909</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-8909" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8909" source="CVE"/>
    <description>
    The intel_hda_xfer function in hw/audio/intel-hda.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via an entry with the same value for buffer length and pointer position.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8909.html">CVE-2016-8909</cve>
<bugzilla href="https://bugzilla.suse.com/1006536">SUSE bug 1006536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1007160">SUSE bug 1007160</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205952" comment="xen-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209058" comment="xen-doc-html-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209059" comment="xen-doc-pdf-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205953" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.90-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205954" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.90-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205955" comment="xen-libs-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209060" comment="xen-libs-32bit-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209061" comment="xen-tools-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205956" comment="xen-tools-domU-4.2.5_21-30 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205952" comment="xen-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209058" comment="xen-doc-html-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209059" comment="xen-doc-pdf-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205953" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.90-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205955" comment="xen-libs-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209060" comment="xen-libs-32bit-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209061" comment="xen-tools-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205956" comment="xen-tools-domU-4.2.5_21-30 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250395" comment="kvm-1.4.2-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8910</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-8910" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8910" source="CVE"/>
    <description>
    The rtl8139_cplus_transmit function in hw/net/rtl8139.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) by leveraging failure to limit the ring descriptor count.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8910.html">CVE-2016-8910</cve>
<bugzilla href="https://bugzilla.suse.com/1006538">SUSE bug 1006538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1007157">SUSE bug 1007157</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1024178">SUSE bug 1024178</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205952" comment="xen-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209058" comment="xen-doc-html-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209059" comment="xen-doc-pdf-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205953" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.90-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205954" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.90-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205955" comment="xen-libs-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209060" comment="xen-libs-32bit-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209061" comment="xen-tools-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205956" comment="xen-tools-domU-4.2.5_21-30 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205952" comment="xen-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209058" comment="xen-doc-html-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209059" comment="xen-doc-pdf-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205953" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.90-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205955" comment="xen-libs-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209060" comment="xen-libs-32bit-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209061" comment="xen-tools-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205956" comment="xen-tools-domU-4.2.5_21-30 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250395" comment="kvm-1.4.2-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9042</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9042" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9042" source="CVE"/>
    <description>
    An exploitable denial of service vulnerability exists in the origin timestamp check functionality of ntpd 4.2.8p9. A specially crafted unauthenticated network packet can be used to reset the expected origin timestamp for target peers. Legitimate replies from targeted peers will fail the origin timestamp check (TEST2) causing the reply to be dropped and creating a denial of service condition.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9042.html">CVE-2016-9042</cve>
<bugzilla href="https://bugzilla.suse.com/1030050">SUSE bug 1030050</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009248664" comment="ntp-4.2.8p10-48.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248665" comment="ntp-doc-4.2.8p10-48.15 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9063</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9063" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9063" source="CVE"/>
    <description>
    An integer overflow during the parsing of XML using the Expat library. This vulnerability affects Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9063.html">CVE-2016-9063</cve>
<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1010424">SUSE bug 1010424</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1047240">SUSE bug 1047240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123115">SUSE bug 1123115</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202513" comment="expat-2.0.1-88.42.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209233" comment="libexpat1-2.0.1-88.42.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209234" comment="libexpat1-32bit-2.0.1-88.42.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9064</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-9064" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9064" source="CVE"/>
    <description>
    Add-on updates failed to verify that the add-on ID inside the signed package matched the ID of the add-on being updated. An attacker who could perform a man-in-the-middle attack on the user's connection to the update server and defeat the certificate pinning protection could provide a malicious signed add-on instead of a valid update. This vulnerability affects Firefox ESR &lt; 45.5 and Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9064.html">CVE-2016-9064</cve>
<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1010402">SUSE bug 1010402</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203135" comment="MozillaFirefox-45.5.1esr-59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205661" comment="MozillaFirefox-translations-45.5.1esr-59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205662" comment="libfreebl3-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208771" comment="libfreebl3-32bit-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205663" comment="libsoftokn3-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208772" comment="libsoftokn3-32bit-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203137" comment="mozilla-nss-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208773" comment="mozilla-nss-32bit-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205664" comment="mozilla-nss-tools-3.21.3-39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9066</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-9066" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9066" source="CVE"/>
    <description>
    A buffer overflow resulting in a potentially exploitable crash due to memory allocation issues when handling large amounts of incoming data. This vulnerability affects Thunderbird &lt; 45.5, Firefox ESR &lt; 45.5, and Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9066.html">CVE-2016-9066</cve>
<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1010404">SUSE bug 1010404</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203135" comment="MozillaFirefox-45.5.1esr-59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205661" comment="MozillaFirefox-translations-45.5.1esr-59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205662" comment="libfreebl3-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208771" comment="libfreebl3-32bit-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205663" comment="libsoftokn3-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208772" comment="libsoftokn3-32bit-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203137" comment="mozilla-nss-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208773" comment="mozilla-nss-32bit-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205664" comment="mozilla-nss-tools-3.21.3-39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9074</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-9074" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9074" source="CVE"/>
    <description>
    An existing mitigation of timing side-channel attacks is insufficient in some circumstances. This issue is addressed in Network Security Services (NSS) 3.26.1. This vulnerability affects Thunderbird &lt; 45.5, Firefox ESR &lt; 45.5, and Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9074.html">CVE-2016-9074</cve>
<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1010422">SUSE bug 1010422</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203135" comment="MozillaFirefox-45.5.1esr-59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205661" comment="MozillaFirefox-translations-45.5.1esr-59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205662" comment="libfreebl3-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208771" comment="libfreebl3-32bit-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205663" comment="libsoftokn3-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208772" comment="libsoftokn3-32bit-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203137" comment="mozilla-nss-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208773" comment="mozilla-nss-32bit-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205664" comment="mozilla-nss-tools-3.21.3-39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9079</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-9079" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9079" source="CVE"/>
    <description>
    A use-after-free vulnerability in SVG Animation has been discovered. An exploit built on this vulnerability has been discovered in the wild targeting Firefox and Tor Browser users on Windows. This vulnerability affects Firefox &lt; 50.0.2, Firefox ESR &lt; 45.5.1, and Thunderbird &lt; 45.5.1.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9079.html">CVE-2016-9079</cve>
<bugzilla href="https://bugzilla.suse.com/1012964">SUSE bug 1012964</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203135" comment="MozillaFirefox-45.5.1esr-59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205661" comment="MozillaFirefox-translations-45.5.1esr-59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205662" comment="libfreebl3-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208771" comment="libfreebl3-32bit-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205663" comment="libsoftokn3-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208772" comment="libsoftokn3-32bit-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203137" comment="mozilla-nss-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208773" comment="mozilla-nss-32bit-3.21.3-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205664" comment="mozilla-nss-tools-3.21.3-39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9082</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9082" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9082" source="CVE"/>
    <description>
    Integer overflow in the write_png function in cairo 1.14.6 allows remote attackers to cause a denial of service (invalid pointer dereference) via a large svg file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9082.html">CVE-2016-9082</cve>
<bugzilla href="https://bugzilla.suse.com/1007255">SUSE bug 1007255</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202469" comment="cairo-1.8.8-2.3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209188" comment="cairo-32bit-1.8.8-2.3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202472" comment="cairo-doc-1.8.8-2.3.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9101</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-9101" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9101" source="CVE"/>
    <description>
    Memory leak in hw/net/eepro100.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by repeatedly unplugging an i8255x (PRO100) NIC device.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9101.html">CVE-2016-9101</cve>
<bugzilla href="https://bugzilla.suse.com/1007391">SUSE bug 1007391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1013668">SUSE bug 1013668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1024181">SUSE bug 1024181</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205957" comment="xen-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209062" comment="xen-doc-html-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209063" comment="xen-doc-pdf-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205958" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205959" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205960" comment="xen-libs-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209064" comment="xen-libs-32bit-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209065" comment="xen-tools-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205961" comment="xen-tools-domU-4.2.5_21-35 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205957" comment="xen-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209062" comment="xen-doc-html-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209063" comment="xen-doc-pdf-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205958" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205960" comment="xen-libs-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209064" comment="xen-libs-32bit-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209065" comment="xen-tools-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205961" comment="xen-tools-domU-4.2.5_21-35 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250395" comment="kvm-1.4.2-52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250412" comment="xen-4.2.5_21-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250413" comment="xen-doc-html-4.2.5_21-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250414" comment="xen-doc-pdf-4.2.5_21-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250415" comment="xen-kmp-default-4.2.5_21_3.0.101_0.116.TDC-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250416" comment="xen-libs-4.2.5_21-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250417" comment="xen-tools-4.2.5_21-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250418" comment="xen-tools-domU-4.2.5_21-37 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9102</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9102" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9102" source="CVE"/>
    <description>
    Memory leak in the v9fs_xattrcreate function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) via a large number of Txattrcreate messages with the same fid number.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9102.html">CVE-2016-9102</cve>
<bugzilla href="https://bugzilla.suse.com/1007450">SUSE bug 1007450</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1014256">SUSE bug 1014256</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250395" comment="kvm-1.4.2-52 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9103</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9103" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9103" source="CVE"/>
    <description>
    The v9fs_xattrcreate function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to obtain sensitive host heap memory information by reading xattribute values before writing to them.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9103.html">CVE-2016-9103</cve>
<bugzilla href="https://bugzilla.suse.com/1007454">SUSE bug 1007454</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1014259">SUSE bug 1014259</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250395" comment="kvm-1.4.2-52 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9104</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9104" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9104" source="CVE"/>
    <description>
    Multiple integer overflows in the (1) v9fs_xattr_read and (2) v9fs_xattr_write functions in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allow local guest OS administrators to cause a denial of service (QEMU process crash) via a crafted offset, which triggers an out-of-bounds access.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9104.html">CVE-2016-9104</cve>
<bugzilla href="https://bugzilla.suse.com/1007493">SUSE bug 1007493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1014297">SUSE bug 1014297</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1034990">SUSE bug 1034990</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250395" comment="kvm-1.4.2-52 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9105</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9105" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9105" source="CVE"/>
    <description>
    Memory leak in the v9fs_link function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via vectors involving a reference to the source fid object.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9105.html">CVE-2016-9105</cve>
<bugzilla href="https://bugzilla.suse.com/1007494">SUSE bug 1007494</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1014279">SUSE bug 1014279</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250395" comment="kvm-1.4.2-52 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9106</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9106" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9106" source="CVE"/>
    <description>
    Memory leak in the v9fs_write function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) by leveraging failure to free an IO vector.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9106.html">CVE-2016-9106</cve>
<bugzilla href="https://bugzilla.suse.com/1007495">SUSE bug 1007495</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1014299">SUSE bug 1014299</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250395" comment="kvm-1.4.2-52 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9131</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-9131" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9131" source="CVE"/>
    <description>
    named in ISC BIND 9.x before 9.9.9-P5, 9.10.x before 9.10.4-P5, and 9.11.x before 9.11.0-P2 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed response to an RTYPE ANY query.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9131.html">CVE-2016-9131</cve>
<bugzilla href="https://bugzilla.suse.com/1018699">SUSE bug 1018699</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1018700">SUSE bug 1018700</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1018701">SUSE bug 1018701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1018702">SUSE bug 1018702</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1033466">SUSE bug 1033466</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202443" comment="bind-9.9.6P1-0.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205287" comment="bind-chrootenv-9.9.6P1-0.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205288" comment="bind-doc-9.9.6P1-0.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205289" comment="bind-libs-9.9.6P1-0.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207618" comment="bind-libs-32bit-9.9.6P1-0.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205290" comment="bind-utils-9.9.6P1-0.36 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9147</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-9147" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9147" source="CVE"/>
    <description>
    named in ISC BIND 9.9.9-P4, 9.9.9-S6, 9.10.4-P4, and 9.11.0-P1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a response containing an inconsistency among the DNSSEC-related RRsets.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9147.html">CVE-2016-9147</cve>
<bugzilla href="https://bugzilla.suse.com/1018699">SUSE bug 1018699</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1018700">SUSE bug 1018700</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1018701">SUSE bug 1018701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1018702">SUSE bug 1018702</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1033466">SUSE bug 1033466</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1081545">SUSE bug 1081545</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202443" comment="bind-9.9.6P1-0.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205287" comment="bind-chrootenv-9.9.6P1-0.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205288" comment="bind-doc-9.9.6P1-0.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205289" comment="bind-libs-9.9.6P1-0.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207618" comment="bind-libs-32bit-9.9.6P1-0.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205290" comment="bind-utils-9.9.6P1-0.36 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9262</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9262" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9262" source="CVE"/>
    <description>
    Multiple integer overflows in the (1) jas_realloc function in base/jas_malloc.c and (2) mem_resize function in base/jas_stream.c in JasPer before 1.900.22 allow remote attackers to cause a denial of service via a crafted image, which triggers use after free vulnerabilities.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9262.html">CVE-2016-9262</cve>
<bugzilla href="https://bugzilla.suse.com/1009994">SUSE bug 1009994</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202752" comment="jasper-1.900.14-134.33.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209373" comment="libjasper-1.900.14-134.33.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209374" comment="libjasper-32bit-1.900.14-134.33.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9273</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9273" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273" source="CVE"/>
    <description>
    tiffsplit in libtiff 4.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file, related to changing td_nstrips in TIFF_STRIPCHOP mode.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9273.html">CVE-2016-9273</cve>
<bugzilla href="https://bugzilla.suse.com/1010163">SUSE bug 1010163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1017693">SUSE bug 1017693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1150480">SUSE bug 1150480</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009240660" comment="libtiff3-3.8.2-141.169.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240661" comment="libtiff3-32bit-3.8.2-141.169.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240659" comment="tiff-3.8.2-141.169.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9310</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-9310" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9310" source="CVE"/>
    <description>
    The control mode (mode 6) functionality in ntpd in NTP before 4.2.8p9 allows remote attackers to set or unset traps via a crafted control mode packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9310.html">CVE-2016-9310</cve>
<bugzilla href="https://bugzilla.suse.com/1011377">SUSE bug 1011377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1011421">SUSE bug 1011421</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205679" comment="ntp-4.2.8p9-48.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205680" comment="ntp-doc-4.2.8p9-48.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9311</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-9311" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9311" source="CVE"/>
    <description>
    ntpd in NTP before 4.2.8p9, when the trap service is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9311.html">CVE-2016-9311</cve>
<bugzilla href="https://bugzilla.suse.com/1011377">SUSE bug 1011377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1011421">SUSE bug 1011421</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205679" comment="ntp-4.2.8p9-48.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205680" comment="ntp-doc-4.2.8p9-48.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9317</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9317" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317" source="CVE"/>
    <description>
    The gdImageCreate function in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to cause a denial of service (system hang) via an oversized image.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9317.html">CVE-2016-9317</cve>
<bugzilla href="https://bugzilla.suse.com/1022283">SUSE bug 1022283</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202616" comment="gd-2.0.36.RC1-52.32 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9318</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9318" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318" source="CVE"/>
    <description>
    libxml2 2.9.4 and earlier, as used in XMLSec 1.2.23 and earlier and other products, does not offer a flag directly indicating that the current document may be read but other files may not be opened, which makes it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9318.html">CVE-2016-9318</cve>
<bugzilla href="https://bugzilla.suse.com/1010675">SUSE bug 1010675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1013930">SUSE bug 1013930</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1014873">SUSE bug 1014873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1019074">SUSE bug 1019074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1118959">SUSE bug 1118959</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1126613">SUSE bug 1126613</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1148896">SUSE bug 1148896</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203101" comment="libxml2-2.7.6-0.69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208762" comment="libxml2-32bit-2.7.6-0.69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205642" comment="libxml2-doc-2.7.6-0.69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205643" comment="libxml2-python-2.7.6-0.69 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009246169" comment="libxml2-2.7.6-0.77.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246174" comment="libxml2-32bit-2.7.6-0.77.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246172" comment="libxml2-doc-2.7.6-0.77.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246173" comment="libxml2-python-2.7.6-0.77.15 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9373</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9373" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9373" source="CVE"/>
    <description>
    In Wireshark 2.2.0 to 2.2.1 and 2.0.0 to 2.0.7, the DCERPC dissector could crash with a use-after-free, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-dcerpc-nt.c and epan/dissectors/packet-dcerpc-spoolss.c by using the wmem file scope for private strings.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9373.html">CVE-2016-9373</cve>
<bugzilla href="https://bugzilla.suse.com/1010754">SUSE bug 1010754</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1010911">SUSE bug 1010911</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203586" comment="wireshark-2.0.12-36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203588" comment="wireshark-gtk-2.0.12-36 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9374</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9374" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9374" source="CVE"/>
    <description>
    In Wireshark 2.2.0 to 2.2.1 and 2.0.0 to 2.0.7, the AllJoyn dissector could crash with a buffer over-read, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-alljoyn.c by ensuring that a length variable properly tracked the state of a signature variable.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9374.html">CVE-2016-9374</cve>
<bugzilla href="https://bugzilla.suse.com/1010752">SUSE bug 1010752</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1010911">SUSE bug 1010911</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203586" comment="wireshark-2.0.12-36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203588" comment="wireshark-gtk-2.0.12-36 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9375</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9375" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9375" source="CVE"/>
    <description>
    In Wireshark 2.2.0 to 2.2.1 and 2.0.0 to 2.0.7, the DTN dissector could go into an infinite loop, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-dtn.c by checking whether SDNV evaluation was successful.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9375.html">CVE-2016-9375</cve>
<bugzilla href="https://bugzilla.suse.com/1010740">SUSE bug 1010740</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1010911">SUSE bug 1010911</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203586" comment="wireshark-2.0.12-36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203588" comment="wireshark-gtk-2.0.12-36 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9376</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9376" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9376" source="CVE"/>
    <description>
    In Wireshark 2.2.0 to 2.2.1 and 2.0.0 to 2.0.7, the OpenFlow dissector could crash with memory exhaustion, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-openflow_v5.c by ensuring that certain length values were sufficiently large.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9376.html">CVE-2016-9376</cve>
<bugzilla href="https://bugzilla.suse.com/1010735">SUSE bug 1010735</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1010911">SUSE bug 1010911</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203586" comment="wireshark-2.0.12-36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203588" comment="wireshark-gtk-2.0.12-36 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9379</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-9379" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9379" source="CVE"/>
    <description>
    The pygrub boot loader emulator in Xen, when S-expression output format is requested, allows local pygrub-using guest OS administrators to read or delete arbitrary files on the host via string quotes and S-expressions in the bootloader configuration file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9379.html">CVE-2016-9379</cve>
<bugzilla href="https://bugzilla.suse.com/1009111">SUSE bug 1009111</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205952" comment="xen-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209058" comment="xen-doc-html-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209059" comment="xen-doc-pdf-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205953" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.90-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205954" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.90-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205955" comment="xen-libs-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209060" comment="xen-libs-32bit-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209061" comment="xen-tools-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205956" comment="xen-tools-domU-4.2.5_21-30 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205952" comment="xen-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209058" comment="xen-doc-html-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209059" comment="xen-doc-pdf-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205953" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.90-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205955" comment="xen-libs-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209060" comment="xen-libs-32bit-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209061" comment="xen-tools-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205956" comment="xen-tools-domU-4.2.5_21-30 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9380</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-9380" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9380" source="CVE"/>
    <description>
    The pygrub boot loader emulator in Xen, when nul-delimited output format is requested, allows local pygrub-using guest OS administrators to read or delete arbitrary files on the host via NUL bytes in the bootloader configuration file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9380.html">CVE-2016-9380</cve>
<bugzilla href="https://bugzilla.suse.com/1009111">SUSE bug 1009111</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205952" comment="xen-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209058" comment="xen-doc-html-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209059" comment="xen-doc-pdf-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205953" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.90-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205954" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.90-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205955" comment="xen-libs-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209060" comment="xen-libs-32bit-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209061" comment="xen-tools-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205956" comment="xen-tools-domU-4.2.5_21-30 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205952" comment="xen-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209058" comment="xen-doc-html-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209059" comment="xen-doc-pdf-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205953" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.90-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205955" comment="xen-libs-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209060" comment="xen-libs-32bit-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209061" comment="xen-tools-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205956" comment="xen-tools-domU-4.2.5_21-30 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9381</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-9381" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9381" source="CVE"/>
    <description>
    Race condition in QEMU in Xen allows local x86 HVM guest OS administrators to gain privileges by changing certain data on shared rings, aka a "double fetch" vulnerability.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9381.html">CVE-2016-9381</cve>
<bugzilla href="https://bugzilla.suse.com/1009109">SUSE bug 1009109</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205952" comment="xen-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209058" comment="xen-doc-html-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209059" comment="xen-doc-pdf-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205953" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.90-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205954" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.90-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205955" comment="xen-libs-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209060" comment="xen-libs-32bit-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209061" comment="xen-tools-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205956" comment="xen-tools-domU-4.2.5_21-30 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205952" comment="xen-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209058" comment="xen-doc-html-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209059" comment="xen-doc-pdf-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205953" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.90-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205955" comment="xen-libs-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209060" comment="xen-libs-32bit-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209061" comment="xen-tools-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205956" comment="xen-tools-domU-4.2.5_21-30 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9382</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-9382" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9382" source="CVE"/>
    <description>
    Xen 4.0.x through 4.7.x mishandle x86 task switches to VM86 mode, which allows local 32-bit x86 HVM guest OS users to gain privileges or cause a denial of service (guest OS crash) by leveraging a guest operating system that uses hardware task switching and allows a new task to start in VM86 mode.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9382.html">CVE-2016-9382</cve>
<bugzilla href="https://bugzilla.suse.com/1009103">SUSE bug 1009103</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205952" comment="xen-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209058" comment="xen-doc-html-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209059" comment="xen-doc-pdf-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205953" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.90-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205954" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.90-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205955" comment="xen-libs-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209060" comment="xen-libs-32bit-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209061" comment="xen-tools-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205956" comment="xen-tools-domU-4.2.5_21-30 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205952" comment="xen-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209058" comment="xen-doc-html-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209059" comment="xen-doc-pdf-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205953" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.90-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205955" comment="xen-libs-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209060" comment="xen-libs-32bit-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209061" comment="xen-tools-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205956" comment="xen-tools-domU-4.2.5_21-30 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9383</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-9383" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9383" source="CVE"/>
    <description>
    Xen, when running on a 64-bit hypervisor, allows local x86 guest OS users to modify arbitrary memory and consequently obtain sensitive information, cause a denial of service (host crash), or execute arbitrary code on the host by leveraging broken emulation of bit test instructions.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9383.html">CVE-2016-9383</cve>
<bugzilla href="https://bugzilla.suse.com/1009107">SUSE bug 1009107</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205952" comment="xen-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209058" comment="xen-doc-html-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209059" comment="xen-doc-pdf-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205953" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.90-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205954" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.90-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205955" comment="xen-libs-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209060" comment="xen-libs-32bit-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209061" comment="xen-tools-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205956" comment="xen-tools-domU-4.2.5_21-30 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205952" comment="xen-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209058" comment="xen-doc-html-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209059" comment="xen-doc-pdf-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205953" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.90-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205955" comment="xen-libs-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209060" comment="xen-libs-32bit-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209061" comment="xen-tools-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205956" comment="xen-tools-domU-4.2.5_21-30 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9386</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-9386" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9386" source="CVE"/>
    <description>
    The x86 emulator in Xen does not properly treat x86 NULL segments as unusable when accessing memory, which might allow local HVM guest users to gain privileges via vectors involving "unexpected" base/limit values.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9386.html">CVE-2016-9386</cve>
<bugzilla href="https://bugzilla.suse.com/1009100">SUSE bug 1009100</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205952" comment="xen-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209058" comment="xen-doc-html-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209059" comment="xen-doc-pdf-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205953" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.90-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205954" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.90-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205955" comment="xen-libs-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209060" comment="xen-libs-32bit-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209061" comment="xen-tools-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205956" comment="xen-tools-domU-4.2.5_21-30 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205952" comment="xen-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209058" comment="xen-doc-html-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209059" comment="xen-doc-pdf-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205953" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.90-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205955" comment="xen-libs-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209060" comment="xen-libs-32bit-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209061" comment="xen-tools-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205956" comment="xen-tools-domU-4.2.5_21-30 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9388</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9388" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9388" source="CVE"/>
    <description>
    The ras_getcmap function in ras_dec.c in JasPer before 1.900.14 allows remote attackers to cause a denial of service (assertion failure) via a crafted image file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9388.html">CVE-2016-9388</cve>
<bugzilla href="https://bugzilla.suse.com/1010975">SUSE bug 1010975</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202752" comment="jasper-1.900.14-134.33.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209373" comment="libjasper-1.900.14-134.33.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209374" comment="libjasper-32bit-1.900.14-134.33.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9389</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9389" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9389" source="CVE"/>
    <description>
    The jpc_irct and jpc_iict functions in jpc_mct.c in JasPer before 1.900.14 allow remote attackers to cause a denial of service (assertion failure).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9389.html">CVE-2016-9389</cve>
<bugzilla href="https://bugzilla.suse.com/1010968">SUSE bug 1010968</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202752" comment="jasper-1.900.14-134.33.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209373" comment="libjasper-1.900.14-134.33.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209374" comment="libjasper-32bit-1.900.14-134.33.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9390</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9390" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9390" source="CVE"/>
    <description>
    The jas_seq2d_create function in jas_seq.c in JasPer before 1.900.14 allows remote attackers to cause a denial of service (assertion failure) via a crafted image file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9390.html">CVE-2016-9390</cve>
<bugzilla href="https://bugzilla.suse.com/1010774">SUSE bug 1010774</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202752" comment="jasper-1.900.14-134.33.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209373" comment="libjasper-1.900.14-134.33.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209374" comment="libjasper-32bit-1.900.14-134.33.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9391</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9391" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9391" source="CVE"/>
    <description>
    The jpc_bitstream_getbits function in jpc_bs.c in JasPer before 2.0.10 allows remote attackers to cause a denial of service (assertion failure) via a very large integer.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9391.html">CVE-2016-9391</cve>
<bugzilla href="https://bugzilla.suse.com/1010782">SUSE bug 1010782</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202752" comment="jasper-1.900.14-134.33.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209373" comment="libjasper-1.900.14-134.33.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209374" comment="libjasper-32bit-1.900.14-134.33.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9392</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9392" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9392" source="CVE"/>
    <description>
    The calcstepsizes function in jpc_dec.c in JasPer before 1.900.17 allows remote attackers to cause a denial of service (assertion failure) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9392.html">CVE-2016-9392</cve>
<bugzilla href="https://bugzilla.suse.com/1010757">SUSE bug 1010757</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202752" comment="jasper-1.900.14-134.33.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209373" comment="libjasper-1.900.14-134.33.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209374" comment="libjasper-32bit-1.900.14-134.33.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9393</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9393" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9393" source="CVE"/>
    <description>
    The jpc_pi_nextrpcl function in jpc_t2cod.c in JasPer before 1.900.17 allows remote attackers to cause a denial of service (assertion failure) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9393.html">CVE-2016-9393</cve>
<bugzilla href="https://bugzilla.suse.com/1010757">SUSE bug 1010757</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1010766">SUSE bug 1010766</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202752" comment="jasper-1.900.14-134.33.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209373" comment="libjasper-1.900.14-134.33.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209374" comment="libjasper-32bit-1.900.14-134.33.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169394" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9394</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9394" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9394" source="CVE"/>
    <description>
    The jas_seq2d_create function in jas_seq.c in JasPer before 1.900.17 allows remote attackers to cause a denial of service (assertion failure) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9394.html">CVE-2016-9394</cve>
<bugzilla href="https://bugzilla.suse.com/1010756">SUSE bug 1010756</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1010757">SUSE bug 1010757</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202752" comment="jasper-1.900.14-134.33.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209373" comment="libjasper-1.900.14-134.33.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209374" comment="libjasper-32bit-1.900.14-134.33.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9395</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9395" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9395" source="CVE"/>
    <description>
    The jas_seq2d_create function in jas_seq.c in JasPer before 1.900.25 allows remote attackers to cause a denial of service (assertion failure) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9395.html">CVE-2016-9395</cve>
<bugzilla href="https://bugzilla.suse.com/1010977">SUSE bug 1010977</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202750" comment="jasper-1.900.14-134.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209370" comment="libjasper-1.900.14-134.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209371" comment="libjasper-32bit-1.900.14-134.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9398</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9398" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9398" source="CVE"/>
    <description>
    The jpc_floorlog2 function in jpc_math.c in JasPer before 1.900.17 allows remote attackers to cause a denial of service (assertion failure) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9398.html">CVE-2016-9398</cve>
<bugzilla href="https://bugzilla.suse.com/1010979">SUSE bug 1010979</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202750" comment="jasper-1.900.14-134.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209370" comment="libjasper-1.900.14-134.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209371" comment="libjasper-32bit-1.900.14-134.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9401</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9401" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9401" source="CVE"/>
    <description>
    popd in bash might allow local users to bypass the restricted shell and cause a use-after-free via a crafted address.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9401.html">CVE-2016-9401</cve>
<bugzilla href="https://bugzilla.suse.com/1010845">SUSE bug 1010845</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123788">SUSE bug 1123788</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202430" comment="bash-3.2-147.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209175" comment="bash-doc-3.2-147.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202431" comment="libreadline5-5.2-147.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209177" comment="libreadline5-32bit-5.2-147.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209179" comment="readline-doc-5.2-147.35 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9422" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9422" source="CVE"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. The feed_table_tag function in w3m doesn't properly validate the value of table span, which allows remote attackers to cause a denial of service (stack and/or heap buffer overflow) and possibly execute arbitrary code via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9422.html">CVE-2016-9422</cve>
<bugzilla href="https://bugzilla.suse.com/1011269">SUSE bug 1011269</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210870" comment="w3m-0.5.3.git20161120-4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9423" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9423" source="CVE"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. Heap-based buffer overflow in w3m allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9423.html">CVE-2016-9423</cve>
<bugzilla href="https://bugzilla.suse.com/1011270">SUSE bug 1011270</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210870" comment="w3m-0.5.3.git20161120-4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9424</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9424" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9424" source="CVE"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m doesn't properly validate the value of tag attribute, which allows remote attackers to cause a denial of service (heap buffer overflow crash) and possibly execute arbitrary code via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9424.html">CVE-2016-9424</cve>
<bugzilla href="https://bugzilla.suse.com/1011271">SUSE bug 1011271</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210870" comment="w3m-0.5.3.git20161120-4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9425</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9425" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9425" source="CVE"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. Heap-based buffer overflow in the addMultirowsForm function in w3m allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9425.html">CVE-2016-9425</cve>
<bugzilla href="https://bugzilla.suse.com/1011272">SUSE bug 1011272</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210870" comment="w3m-0.5.3.git20161120-4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9434</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9434" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9434" source="CVE"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9434.html">CVE-2016-9434</cve>
<bugzilla href="https://bugzilla.suse.com/1011283">SUSE bug 1011283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210870" comment="w3m-0.5.3.git20161120-4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9435</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9435" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9435" source="CVE"/>
    <description>
    The HTMLtagproc1 function in file.c in w3m before 0.5.3+git20161009 does not properly initialize values, which allows remote attackers to crash the application via a crafted html file, related to &lt;dd&gt; tags.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9435.html">CVE-2016-9435</cve>
<bugzilla href="https://bugzilla.suse.com/1011284">SUSE bug 1011284</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210870" comment="w3m-0.5.3.git20161120-4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9436</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9436" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9436" source="CVE"/>
    <description>
    parsetagx.c in w3m before 0.5.3+git20161009 does not properly initialize values, which allows remote attackers to crash the application via a crafted html file, related to a &lt;i&gt; tag.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9436.html">CVE-2016-9436</cve>
<bugzilla href="https://bugzilla.suse.com/1011285">SUSE bug 1011285</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210870" comment="w3m-0.5.3.git20161120-4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9437</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9437" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9437" source="CVE"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) and possibly memory corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9437.html">CVE-2016-9437</cve>
<bugzilla href="https://bugzilla.suse.com/1011286">SUSE bug 1011286</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210870" comment="w3m-0.5.3.git20161120-4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9438</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9438" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9438" source="CVE"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9438.html">CVE-2016-9438</cve>
<bugzilla href="https://bugzilla.suse.com/1011287">SUSE bug 1011287</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210870" comment="w3m-0.5.3.git20161120-4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9439</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9439" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9439" source="CVE"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. Infinite recursion vulnerability in w3m allows remote attackers to cause a denial of service via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9439.html">CVE-2016-9439</cve>
<bugzilla href="https://bugzilla.suse.com/1011288">SUSE bug 1011288</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210870" comment="w3m-0.5.3.git20161120-4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9440</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9440" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9440" source="CVE"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9440.html">CVE-2016-9440</cve>
<bugzilla href="https://bugzilla.suse.com/1011289">SUSE bug 1011289</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210870" comment="w3m-0.5.3.git20161120-4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9441</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9441" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9441" source="CVE"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9441.html">CVE-2016-9441</cve>
<bugzilla href="https://bugzilla.suse.com/1011290">SUSE bug 1011290</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210870" comment="w3m-0.5.3.git20161120-4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9442</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9442" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9442" source="CVE"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause memory corruption in certain conditions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9442.html">CVE-2016-9442</cve>
<bugzilla href="https://bugzilla.suse.com/1011291">SUSE bug 1011291</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210870" comment="w3m-0.5.3.git20161120-4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9443</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9443" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9443" source="CVE"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9443.html">CVE-2016-9443</cve>
<bugzilla href="https://bugzilla.suse.com/1011292">SUSE bug 1011292</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210870" comment="w3m-0.5.3.git20161120-4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9444</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-9444" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9444" source="CVE"/>
    <description>
    named in ISC BIND 9.x before 9.9.9-P5, 9.10.x before 9.10.4-P5, and 9.11.x before 9.11.0-P2 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted DS resource record in an answer.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9444.html">CVE-2016-9444</cve>
<bugzilla href="https://bugzilla.suse.com/1018699">SUSE bug 1018699</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1018700">SUSE bug 1018700</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1018701">SUSE bug 1018701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1018702">SUSE bug 1018702</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1033466">SUSE bug 1033466</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202443" comment="bind-9.9.6P1-0.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205287" comment="bind-chrootenv-9.9.6P1-0.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205288" comment="bind-doc-9.9.6P1-0.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205289" comment="bind-libs-9.9.6P1-0.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009207618" comment="bind-libs-32bit-9.9.6P1-0.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205290" comment="bind-utils-9.9.6P1-0.36 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9453</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9453" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453" source="CVE"/>
    <description>
    The t2p_readwrite_pdf_image_tile function in LibTIFF allows remote attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a JPEG file with a TIFFTAG_JPEGTABLES of length one.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9453.html">CVE-2016-9453</cve>
<bugzilla href="https://bugzilla.suse.com/1007280">SUSE bug 1007280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1011107">SUSE bug 1011107</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210828" comment="libtiff3-3.8.2-141.169.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210829" comment="libtiff3-32bit-3.8.2-141.169.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203576" comment="tiff-3.8.2-141.169.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9535</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9535" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9535" source="CVE"/>
    <description>
    tif_predict.h and tif_predict.c in libtiff 4.0.6 have assertions that can lead to assertion failures in debug mode, or buffer overflows in release mode, when dealing with unusual tile size like YCbCr with subsampling. Reported as MSVR 35105, aka "Predictor heap-buffer-overflow."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9535.html">CVE-2016-9535</cve>
<bugzilla href="https://bugzilla.suse.com/1011846">SUSE bug 1011846</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1013308">SUSE bug 1013308</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009229551" comment="libtiff3-3.8.2-141.169.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229568" comment="libtiff3-32bit-3.8.2-141.169.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229522" comment="tiff-3.8.2-141.169.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9536</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9536" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536" source="CVE"/>
    <description>
    tools/tiff2pdf.c in libtiff 4.0.6 has out-of-bounds write vulnerabilities in heap allocated buffers in t2p_process_jpeg_strip(). Reported as MSVR 35098, aka "t2p_process_jpeg_strip heap-buffer-overflow."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9536.html">CVE-2016-9536</cve>
<bugzilla href="https://bugzilla.suse.com/1011845">SUSE bug 1011845</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210828" comment="libtiff3-3.8.2-141.169.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210829" comment="libtiff3-32bit-3.8.2-141.169.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203576" comment="tiff-3.8.2-141.169.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9540</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9540" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540" source="CVE"/>
    <description>
    tools/tiffcp.c in libtiff 4.0.6 has an out-of-bounds write on tiled images with odd tile width versus image width. Reported as MSVR 35103, aka "cpStripToTile heap-buffer-overflow."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9540.html">CVE-2016-9540</cve>
<bugzilla href="https://bugzilla.suse.com/1011839">SUSE bug 1011839</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1013308">SUSE bug 1013308</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009229551" comment="libtiff3-3.8.2-141.169.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229568" comment="libtiff3-32bit-3.8.2-141.169.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229522" comment="tiff-3.8.2-141.169.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9555</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-9555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9555" source="CVE"/>
    <description>
    The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9555.html">CVE-2016-9555</cve>
<bugzilla href="https://bugzilla.suse.com/1011685">SUSE bug 1011685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1012183">SUSE bug 1012183</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208770" comment="kernel-default-man-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205650" comment="kernel-pae-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205651" comment="kernel-pae-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205652" comment="kernel-pae-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9556</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9556" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9556" source="CVE"/>
    <description>
    The IsPixelGray function in MagickCore/pixel-accessor.h in ImageMagick 7.0.3-8 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted image file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9556.html">CVE-2016-9556</cve>
<bugzilla href="https://bugzilla.suse.com/1011130">SUSE bug 1011130</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1013376">SUSE bug 1013376</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202234" comment="ImageMagick-6.4.3.6-7.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209110" comment="libMagickCore1-6.4.3.6-7.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209111" comment="libMagickCore1-32bit-6.4.3.6-7.60 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9559</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9559" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9559" source="CVE"/>
    <description>
    coders/tiff.c in ImageMagick before 7.0.3.7 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9559.html">CVE-2016-9559</cve>
<bugzilla href="https://bugzilla.suse.com/1011136">SUSE bug 1011136</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202234" comment="ImageMagick-6.4.3.6-7.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209110" comment="libMagickCore1-6.4.3.6-7.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209111" comment="libMagickCore1-32bit-6.4.3.6-7.60 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9560</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9560" source="CVE"/>
    <description>
    Stack-based buffer overflow in the jpc_tsfb_getbands2 function in jpc_tsfb.c in JasPer before 1.900.30 allows remote attackers to have unspecified impact via a crafted image.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9560.html">CVE-2016-9560</cve>
<bugzilla href="https://bugzilla.suse.com/1011830">SUSE bug 1011830</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202750" comment="jasper-1.900.14-134.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209370" comment="libjasper-1.900.14-134.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209371" comment="libjasper-32bit-1.900.14-134.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9574</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-9574" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9574" source="CVE"/>
    <description>
    nss before version 3.30 is vulnerable to a remote denial of service during the session handshake when using SessionTicket extension and ECDHE-ECDSA.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9574.html">CVE-2016-9574</cve>
<bugzilla href="https://bugzilla.suse.com/1015499">SUSE bug 1015499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202355" comment="MozillaFirefox-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205245" comment="MozillaFirefox-translations-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205246" comment="libfreebl3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208371" comment="libfreebl3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205247" comment="libsoftokn3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208372" comment="libsoftokn3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202359" comment="mozilla-nss-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208374" comment="mozilla-nss-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205248" comment="mozilla-nss-tools-3.29.5-46 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9576</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-9576" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9576" source="CVE"/>
    <description>
    The blk_rq_map_user_iov function in block/blk-map.c in the Linux kernel before 4.8.14 does not properly restrict the type of iterator, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9576.html">CVE-2016-9576</cve>
<bugzilla href="https://bugzilla.suse.com/1013604">SUSE bug 1013604</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1014271">SUSE bug 1014271</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1017710">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1019079">SUSE bug 1019079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1019668">SUSE bug 1019668</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208602" comment="kernel-bigsmp-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208603" comment="kernel-bigsmp-base-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208604" comment="kernel-bigsmp-devel-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205439" comment="kernel-default-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205440" comment="kernel-default-base-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205441" comment="kernel-default-devel-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205442" comment="kernel-ec2-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205443" comment="kernel-ec2-base-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205444" comment="kernel-ec2-devel-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205448" comment="kernel-source-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205449" comment="kernel-syms-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205450" comment="kernel-trace-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205451" comment="kernel-trace-base-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205452" comment="kernel-trace-devel-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205453" comment="kernel-xen-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205454" comment="kernel-xen-base-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205455" comment="kernel-xen-devel-3.0.101-0.47.93 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208602" comment="kernel-bigsmp-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208603" comment="kernel-bigsmp-base-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208604" comment="kernel-bigsmp-devel-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205439" comment="kernel-default-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205440" comment="kernel-default-base-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205441" comment="kernel-default-devel-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208605" comment="kernel-default-man-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205442" comment="kernel-ec2-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205443" comment="kernel-ec2-base-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205444" comment="kernel-ec2-devel-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205445" comment="kernel-pae-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205446" comment="kernel-pae-base-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205447" comment="kernel-pae-devel-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205448" comment="kernel-source-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205449" comment="kernel-syms-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205450" comment="kernel-trace-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205451" comment="kernel-trace-base-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205452" comment="kernel-trace-devel-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205453" comment="kernel-xen-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205454" comment="kernel-xen-base-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205455" comment="kernel-xen-devel-3.0.101-0.47.93 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9583</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9583" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9583" source="CVE"/>
    <description>
    An out-of-bounds heap read vulnerability was found in the jpc_pi_nextpcrl() function of jasper before 2.0.6 when processing crafted input.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9583.html">CVE-2016-9583</cve>
<bugzilla href="https://bugzilla.suse.com/1015400">SUSE bug 1015400</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202750" comment="jasper-1.900.14-134.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209370" comment="libjasper-1.900.14-134.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209371" comment="libjasper-32bit-1.900.14-134.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9584</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9584" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9584" source="CVE"/>
    <description>
    libical allows remote attackers to cause a denial of service (use-after-free) and possibly read heap memory via a crafted ics file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9584.html">CVE-2016-9584</cve>
<bugzilla href="https://bugzilla.suse.com/1015964">SUSE bug 1015964</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202836" comment="libical-0.43-1.10.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209911" comment="libical0-0.43-1.10.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202838" comment="libical0-32bit-0.43-1.10.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9586</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9586" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9586" source="CVE"/>
    <description>
    curl before version 7.52.0 is vulnerable to a buffer overflow when doing a large floating point output in libcurl's implementation of the printf() functions. If there are any application that accepts a format string from the outside without necessary input filtering, it could allow remote attacks.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9586.html">CVE-2016-9586</cve>
<bugzilla href="https://bugzilla.suse.com/1015332">SUSE bug 1015332</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202483" comment="curl-7.19.7-1.70.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203721" comment="curl-openssl1-7.19.7-1.70.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209204" comment="libcurl4-7.19.7-1.70.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209205" comment="libcurl4-32bit-7.19.7-1.70.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203722" comment="libcurl4-openssl1-7.19.7-1.70.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203723" comment="libcurl4-openssl1-32bit-7.19.7-1.70.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9587</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9587" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9587" source="CVE"/>
    <description>
    Ansible before versions 2.1.4, 2.2.1 is vulnerable to an improper input validation in Ansible's handling of data sent from client systems. An attacker with control over a client system being managed by Ansible and the ability to send facts back to the Ansible server could use this flaw to execute arbitrary code on the Ansible server using the Ansible server privileges.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9587.html">CVE-2016-9587</cve>
<bugzilla href="https://bugzilla.suse.com/1019021">SUSE bug 1019021</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249903" comment="ansible-2.2.0.0-7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9591</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9591" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9591" source="CVE"/>
    <description>
    JasPer before version 2.0.12 is vulnerable to a use-after-free in the way it decodes certain JPEG 2000 image files resulting in a crash on the application using JasPer.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9591.html">CVE-2016-9591</cve>
<bugzilla href="https://bugzilla.suse.com/1015993">SUSE bug 1015993</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202750" comment="jasper-1.900.14-134.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209370" comment="libjasper-1.900.14-134.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209371" comment="libjasper-32bit-1.900.14-134.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9600</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9600" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9600" source="CVE"/>
    <description>
    JasPer before version 2.0.10 is vulnerable to a null pointer dereference was found in the decoded creation of JPEG 2000 image files. A specially crafted file could cause an application using JasPer to crash.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9600.html">CVE-2016-9600</cve>
<bugzilla href="https://bugzilla.suse.com/1018088">SUSE bug 1018088</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202750" comment="jasper-1.900.14-134.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209370" comment="libjasper-1.900.14-134.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209371" comment="libjasper-32bit-1.900.14-134.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9601</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9601" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9601" source="CVE"/>
    <description>
    ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation fault in ghostscript.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9601.html">CVE-2016-9601</cve>
<bugzilla href="https://bugzilla.suse.com/1018128">SUSE bug 1018128</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1036453">SUSE bug 1036453</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209278" comment="ghostscript-fonts-other-8.62-32.47.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209279" comment="ghostscript-fonts-rus-8.62-32.47.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209280" comment="ghostscript-fonts-std-8.62-32.47.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202642" comment="ghostscript-library-8.62-32.47.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209281" comment="ghostscript-omni-8.62-32.47.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209282" comment="ghostscript-x11-8.62-32.47.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209283" comment="libgimpprint-4.2.7-32.47.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9602</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9602" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9602" source="CVE"/>
    <description>
    Qemu before version 2.9 is vulnerable to an improper link following when built with the VirtFS. A privileged user inside guest could use this flaw to access host file system beyond the shared folder and potentially escalating their privileges on a host.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9602.html">CVE-2016-9602</cve>
<bugzilla href="https://bugzilla.suse.com/1020427">SUSE bug 1020427</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205626" comment="kvm-1.4.2-53.11 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9603</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-9603" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9603" source="CVE"/>
    <description>
    A heap buffer overflow flaw was found in QEMU's Cirrus CLGD 54xx VGA emulator's VNC display driver support before 2.9; the issue could occur when a VNC client attempted to update its display after a VGA operation is performed by a guest. A privileged user/process inside a guest could use this flaw to crash the QEMU process or, potentially, execute arbitrary code on the host with privileges of the QEMU process.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9603.html">CVE-2016-9603</cve>
<bugzilla href="https://bugzilla.suse.com/1028655">SUSE bug 1028655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1028656">SUSE bug 1028656</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205626" comment="kvm-1.4.2-53.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205967" comment="xen-4.2.5_21-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209070" comment="xen-doc-html-4.2.5_21-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209071" comment="xen-doc-pdf-4.2.5_21-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205968" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.99-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205969" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.99-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205970" comment="xen-libs-4.2.5_21-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209072" comment="xen-libs-32bit-4.2.5_21-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209073" comment="xen-tools-4.2.5_21-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205971" comment="xen-tools-domU-4.2.5_21-41 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205626" comment="kvm-1.4.2-53.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250426" comment="xen-4.2.5_21-43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250427" comment="xen-doc-html-4.2.5_21-43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250428" comment="xen-doc-pdf-4.2.5_21-43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250429" comment="xen-kmp-default-4.2.5_21_3.0.101_0.119.TDC-43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250430" comment="xen-libs-4.2.5_21-43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250431" comment="xen-tools-4.2.5_21-43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250432" comment="xen-tools-domU-4.2.5_21-43 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205967" comment="xen-4.2.5_21-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209070" comment="xen-doc-html-4.2.5_21-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209071" comment="xen-doc-pdf-4.2.5_21-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205968" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.99-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205970" comment="xen-libs-4.2.5_21-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209072" comment="xen-libs-32bit-4.2.5_21-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209073" comment="xen-tools-4.2.5_21-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205971" comment="xen-tools-domU-4.2.5_21-41 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9621</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9621" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9621" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2016-9429.  Reason: This candidate is a reservation duplicate of CVE-2016-9429.  Notes: All CVE users should reference CVE-2016-9429 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9621.html">CVE-2016-9621</cve>
<bugzilla href="https://bugzilla.suse.com/1011278">SUSE bug 1011278</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1012020">SUSE bug 1012020</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210870" comment="w3m-0.5.3.git20161120-4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9622</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9622" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9622" source="CVE"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9622.html">CVE-2016-9622</cve>
<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1012021">SUSE bug 1012021</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210870" comment="w3m-0.5.3.git20161120-4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9623</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9623" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9623" source="CVE"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9623.html">CVE-2016-9623</cve>
<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1012022">SUSE bug 1012022</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210870" comment="w3m-0.5.3.git20161120-4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9624</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9624" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9624" source="CVE"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9624.html">CVE-2016-9624</cve>
<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1012023">SUSE bug 1012023</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210870" comment="w3m-0.5.3.git20161120-4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9625</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9625" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9625" source="CVE"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. Infinite recursion vulnerability in w3m allows remote attackers to cause a denial of service via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9625.html">CVE-2016-9625</cve>
<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1012024">SUSE bug 1012024</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210870" comment="w3m-0.5.3.git20161120-4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9626</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9626" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9626" source="CVE"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. Infinite recursion vulnerability in w3m allows remote attackers to cause a denial of service via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9626.html">CVE-2016-9626</cve>
<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1012025">SUSE bug 1012025</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210870" comment="w3m-0.5.3.git20161120-4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9627</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9627" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9627" source="CVE"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (heap buffer overflow and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9627.html">CVE-2016-9627</cve>
<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1012026">SUSE bug 1012026</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210870" comment="w3m-0.5.3.git20161120-4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9628</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9628" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9628" source="CVE"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9628.html">CVE-2016-9628</cve>
<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1012027">SUSE bug 1012027</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210870" comment="w3m-0.5.3.git20161120-4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9629</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9629" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9629" source="CVE"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9629.html">CVE-2016-9629</cve>
<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1012028">SUSE bug 1012028</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210870" comment="w3m-0.5.3.git20161120-4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9630</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9630" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9630" source="CVE"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (global buffer overflow and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9630.html">CVE-2016-9630</cve>
<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1012029">SUSE bug 1012029</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210870" comment="w3m-0.5.3.git20161120-4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9631</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9631" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9631" source="CVE"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9631.html">CVE-2016-9631</cve>
<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1012030">SUSE bug 1012030</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210870" comment="w3m-0.5.3.git20161120-4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9632</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9632" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9632" source="CVE"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (global buffer overflow and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9632.html">CVE-2016-9632</cve>
<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1012031">SUSE bug 1012031</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210870" comment="w3m-0.5.3.git20161120-4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9633</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9633" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9633" source="CVE"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (infinite loop and resource consumption) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9633.html">CVE-2016-9633</cve>
<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1012032">SUSE bug 1012032</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210870" comment="w3m-0.5.3.git20161120-4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9634</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9634" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9634" source="CVE"/>
    <description>
    Heap-based buffer overflow in the flx_decode_delta_fli function in gst/flx/gstflxdec.c in the FLIC decoder in GStreamer before 1.10.2 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via the start_line parameter.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9634.html">CVE-2016-9634</cve>
<bugzilla href="https://bugzilla.suse.com/1012102">SUSE bug 1012102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1012103">SUSE bug 1012103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1012104">SUSE bug 1012104</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209338" comment="gstreamer-0_10-plugins-good-0.10.30-5.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209339" comment="gstreamer-0_10-plugins-good-doc-0.10.30-5.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209340" comment="gstreamer-0_10-plugins-good-lang-0.10.30-5.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9635</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9635" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9635" source="CVE"/>
    <description>
    Heap-based buffer overflow in the flx_decode_delta_fli function in gst/flx/gstflxdec.c in the FLIC decoder in GStreamer before 1.10.2 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) by providing a 'skip count' that goes beyond initialized buffer.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9635.html">CVE-2016-9635</cve>
<bugzilla href="https://bugzilla.suse.com/1012102">SUSE bug 1012102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1012103">SUSE bug 1012103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1012104">SUSE bug 1012104</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1013653">SUSE bug 1013653</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209338" comment="gstreamer-0_10-plugins-good-0.10.30-5.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209339" comment="gstreamer-0_10-plugins-good-doc-0.10.30-5.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209340" comment="gstreamer-0_10-plugins-good-lang-0.10.30-5.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9636" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9636" source="CVE"/>
    <description>
    Heap-based buffer overflow in the flx_decode_delta_fli function in gst/flx/gstflxdec.c in the FLIC decoder in GStreamer before 1.10.2 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) by providing a 'write count' that goes beyond the initialized buffer.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9636.html">CVE-2016-9636</cve>
<bugzilla href="https://bugzilla.suse.com/1012102">SUSE bug 1012102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1012103">SUSE bug 1012103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1012104">SUSE bug 1012104</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209338" comment="gstreamer-0_10-plugins-good-0.10.30-5.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209339" comment="gstreamer-0_10-plugins-good-doc-0.10.30-5.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209340" comment="gstreamer-0_10-plugins-good-lang-0.10.30-5.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9637</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-9637" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9637" source="CVE"/>
    <description>
    The (1) ioport_read and (2) ioport_write functions in Xen, when qemu is used as a device model within Xen, might allow local x86 HVM guest OS administrators to gain qemu process privileges via vectors involving an out-of-range ioport access.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9637.html">CVE-2016-9637</cve>
<bugzilla href="https://bugzilla.suse.com/1011652">SUSE bug 1011652</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205952" comment="xen-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209058" comment="xen-doc-html-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209059" comment="xen-doc-pdf-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205953" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.90-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205954" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.90-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205955" comment="xen-libs-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209060" comment="xen-libs-32bit-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209061" comment="xen-tools-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205956" comment="xen-tools-domU-4.2.5_21-30 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205952" comment="xen-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209058" comment="xen-doc-html-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209059" comment="xen-doc-pdf-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205953" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.90-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205955" comment="xen-libs-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209060" comment="xen-libs-32bit-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209061" comment="xen-tools-4.2.5_21-30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205956" comment="xen-tools-domU-4.2.5_21-30 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9685</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-9685" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9685" source="CVE"/>
    <description>
    Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel before 4.5.1 allow local users to cause a denial of service (memory consumption) via crafted XFS filesystem operations.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9685.html">CVE-2016-9685</cve>
<bugzilla href="https://bugzilla.suse.com/1012832">SUSE bug 1012832</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208770" comment="kernel-default-man-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205650" comment="kernel-pae-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205651" comment="kernel-pae-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205652" comment="kernel-pae-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9756</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-9756" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9756" source="CVE"/>
    <description>
    arch/x86/kvm/emulate.c in the Linux kernel before 4.8.12 does not properly initialize Code Segment (CS) in certain error cases, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9756.html">CVE-2016-9756</cve>
<bugzilla href="https://bugzilla.suse.com/1013038">SUSE bug 1013038</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208770" comment="kernel-default-man-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205650" comment="kernel-pae-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205651" comment="kernel-pae-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205652" comment="kernel-pae-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9773</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9773" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9773" source="CVE"/>
    <description>
    Heap-based buffer overflow in the IsPixelGray function in MagickCore/pixel-accessor.h in ImageMagick 7.0.3.8 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted image file.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9556.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9773.html">CVE-2016-9773</cve>
<bugzilla href="https://bugzilla.suse.com/1011130">SUSE bug 1011130</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1013376">SUSE bug 1013376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1017421">SUSE bug 1017421</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202234" comment="ImageMagick-6.4.3.6-7.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209110" comment="libMagickCore1-6.4.3.6-7.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209111" comment="libMagickCore1-32bit-6.4.3.6-7.60 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9776</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-9776" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9776" source="CVE"/>
    <description>
    QEMU (aka Quick Emulator) built with the ColdFire Fast Ethernet Controller emulator support is vulnerable to an infinite loop issue. It could occur while receiving packets in 'mcf_fec_receive'. A privileged user/process inside guest could use this issue to crash the QEMU process on the host leading to DoS.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9776.html">CVE-2016-9776</cve>
<bugzilla href="https://bugzilla.suse.com/1013285">SUSE bug 1013285</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1013657">SUSE bug 1013657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1024182">SUSE bug 1024182</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205626" comment="kvm-1.4.2-53.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205957" comment="xen-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209062" comment="xen-doc-html-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209063" comment="xen-doc-pdf-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205958" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205959" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205960" comment="xen-libs-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209064" comment="xen-libs-32bit-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209065" comment="xen-tools-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205961" comment="xen-tools-domU-4.2.5_21-35 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205626" comment="kvm-1.4.2-53.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250412" comment="xen-4.2.5_21-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250413" comment="xen-doc-html-4.2.5_21-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250414" comment="xen-doc-pdf-4.2.5_21-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250415" comment="xen-kmp-default-4.2.5_21_3.0.101_0.116.TDC-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250416" comment="xen-libs-4.2.5_21-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250417" comment="xen-tools-4.2.5_21-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250418" comment="xen-tools-domU-4.2.5_21-37 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205957" comment="xen-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209062" comment="xen-doc-html-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209063" comment="xen-doc-pdf-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205958" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205960" comment="xen-libs-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209064" comment="xen-libs-32bit-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209065" comment="xen-tools-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205961" comment="xen-tools-domU-4.2.5_21-35 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9793</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-9793" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9793" source="CVE"/>
    <description>
    The sock_setsockopt function in net/core/sock.c in the Linux kernel before 4.8.14 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9793.html">CVE-2016-9793</cve>
<bugzilla href="https://bugzilla.suse.com/1013531">SUSE bug 1013531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1013542">SUSE bug 1013542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1025354">SUSE bug 1025354</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208770" comment="kernel-default-man-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205650" comment="kernel-pae-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205651" comment="kernel-pae-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205652" comment="kernel-pae-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9794</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-9794" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9794" source="CVE"/>
    <description>
    Race condition in the snd_pcm_period_elapsed function in sound/core/pcm_lib.c in the ALSA subsystem in the Linux kernel before 4.7 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted SNDRV_PCM_TRIGGER_START command.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9794.html">CVE-2016-9794</cve>
<bugzilla href="https://bugzilla.suse.com/1013533">SUSE bug 1013533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1013543">SUSE bug 1013543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1013604">SUSE bug 1013604</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208602" comment="kernel-bigsmp-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208603" comment="kernel-bigsmp-base-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208604" comment="kernel-bigsmp-devel-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205439" comment="kernel-default-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205440" comment="kernel-default-base-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205441" comment="kernel-default-devel-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205442" comment="kernel-ec2-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205443" comment="kernel-ec2-base-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205444" comment="kernel-ec2-devel-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205448" comment="kernel-source-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205449" comment="kernel-syms-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205450" comment="kernel-trace-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205451" comment="kernel-trace-base-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205452" comment="kernel-trace-devel-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205453" comment="kernel-xen-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205454" comment="kernel-xen-base-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205455" comment="kernel-xen-devel-3.0.101-0.47.93 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208602" comment="kernel-bigsmp-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208603" comment="kernel-bigsmp-base-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208604" comment="kernel-bigsmp-devel-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205439" comment="kernel-default-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205440" comment="kernel-default-base-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205441" comment="kernel-default-devel-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208605" comment="kernel-default-man-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205442" comment="kernel-ec2-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205443" comment="kernel-ec2-base-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205444" comment="kernel-ec2-devel-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205445" comment="kernel-pae-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205446" comment="kernel-pae-base-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205447" comment="kernel-pae-devel-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205448" comment="kernel-source-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205449" comment="kernel-syms-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205450" comment="kernel-trace-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205451" comment="kernel-trace-base-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205452" comment="kernel-trace-devel-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205453" comment="kernel-xen-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205454" comment="kernel-xen-base-3.0.101-0.47.93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205455" comment="kernel-xen-devel-3.0.101-0.47.93 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9807</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9807" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9807" source="CVE"/>
    <description>
    The flx_decode_chunks function in gst/flx/gstflxdec.c in GStreamer before 1.10.2 allows remote attackers to cause a denial of service (invalid memory read and crash) via a crafted FLIC file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9807.html">CVE-2016-9807</cve>
<bugzilla href="https://bugzilla.suse.com/1013655">SUSE bug 1013655</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209338" comment="gstreamer-0_10-plugins-good-0.10.30-5.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209339" comment="gstreamer-0_10-plugins-good-doc-0.10.30-5.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209340" comment="gstreamer-0_10-plugins-good-lang-0.10.30-5.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9808</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9808" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9808" source="CVE"/>
    <description>
    The FLIC decoder in GStreamer before 1.10.2 allows remote attackers to cause a denial of service (out-of-bounds write and crash) via a crafted series of skip and count pairs.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9808.html">CVE-2016-9808</cve>
<bugzilla href="https://bugzilla.suse.com/1012102">SUSE bug 1012102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1012103">SUSE bug 1012103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1012104">SUSE bug 1012104</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1013653">SUSE bug 1013653</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209338" comment="gstreamer-0_10-plugins-good-0.10.30-5.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209339" comment="gstreamer-0_10-plugins-good-doc-0.10.30-5.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209340" comment="gstreamer-0_10-plugins-good-lang-0.10.30-5.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9810</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9810" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9810" source="CVE"/>
    <description>
    The gst_decode_chain_free_internal function in the flxdex decoder in gst-plugins-good in GStreamer before 1.10.2 allows remote attackers to cause a denial of service (invalid memory read and crash) via an invalid file, which triggers an incorrect unref call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9810.html">CVE-2016-9810</cve>
<bugzilla href="https://bugzilla.suse.com/1013663">SUSE bug 1013663</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209338" comment="gstreamer-0_10-plugins-good-0.10.30-5.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209339" comment="gstreamer-0_10-plugins-good-doc-0.10.30-5.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209340" comment="gstreamer-0_10-plugins-good-lang-0.10.30-5.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9811</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9811" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9811" source="CVE"/>
    <description>
    The windows_icon_typefind function in gst-plugins-base in GStreamer before 1.10.2, when G_SLICE is set to always-malloc, allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted ico file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9811.html">CVE-2016-9811</cve>
<bugzilla href="https://bugzilla.suse.com/1013669">SUSE bug 1013669</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202714" comment="gstreamer-0_10-plugins-base-0.10.35-5.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209328" comment="gstreamer-0_10-plugins-base-32bit-0.10.35-5.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209329" comment="gstreamer-0_10-plugins-base-doc-0.10.35-5.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209330" comment="gstreamer-0_10-plugins-base-lang-0.10.35-5.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209332" comment="libgstapp-0_10-0-0.10.35-5.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209333" comment="libgstapp-0_10-0-32bit-0.10.35-5.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209335" comment="libgstinterfaces-0_10-0-0.10.35-5.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209336" comment="libgstinterfaces-0_10-0-32bit-0.10.35-5.17 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9840" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9840" source="CVE"/>
    <description>
    inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9840.html">CVE-2016-9840</cve>
<bugzilla href="https://bugzilla.suse.com/1003579">SUSE bug 1003579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1023215">SUSE bug 1023215</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1120866">SUSE bug 1120866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123150">SUSE bug 1123150</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205375" comment="java-1_6_0-ibm-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205376" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205377" comment="java-1_6_0-ibm-devel-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205378" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205379" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205380" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205402" comment="java-1_7_0-ibm-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205403" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205404" comment="java-1_7_0-ibm-devel-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205405" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205406" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.5-64 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205375" comment="java-1_6_0-ibm-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205378" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205379" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205380" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205402" comment="java-1_7_0-ibm-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205403" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205405" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205406" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251872" comment="zlib-1.2.7-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210996" comment="zlib-32bit-1.2.7-0.14 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9841</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9841" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9841" source="CVE"/>
    <description>
    inffast.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9841.html">CVE-2016-9841</cve>
<bugzilla href="https://bugzilla.suse.com/1003579">SUSE bug 1003579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1064070">SUSE bug 1064070</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1120866">SUSE bug 1120866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123150">SUSE bug 1123150</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205381" comment="java-1_6_0-ibm-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205382" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205383" comment="java-1_6_0-ibm-devel-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205384" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205385" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205386" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205407" comment="java-1_7_0-ibm-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205408" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205409" comment="java-1_7_0-ibm-devel-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205410" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205411" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.15-65.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205381" comment="java-1_6_0-ibm-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205384" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205385" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205386" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205407" comment="java-1_7_0-ibm-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205408" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205410" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205411" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251872" comment="zlib-1.2.7-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210996" comment="zlib-32bit-1.2.7-0.14 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9842</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9842" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9842" source="CVE"/>
    <description>
    The inflateMark function in inflate.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving left shifts of negative integers.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9842.html">CVE-2016-9842</cve>
<bugzilla href="https://bugzilla.suse.com/1003580">SUSE bug 1003580</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1023215">SUSE bug 1023215</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1120866">SUSE bug 1120866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123150">SUSE bug 1123150</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205375" comment="java-1_6_0-ibm-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205376" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205377" comment="java-1_6_0-ibm-devel-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205378" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205379" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205380" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205402" comment="java-1_7_0-ibm-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205403" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205404" comment="java-1_7_0-ibm-devel-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205405" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205406" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.5-64 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205375" comment="java-1_6_0-ibm-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205378" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205379" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205380" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205402" comment="java-1_7_0-ibm-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205403" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205405" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205406" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251872" comment="zlib-1.2.7-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210996" comment="zlib-32bit-1.2.7-0.14 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9843</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9843" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9843" source="CVE"/>
    <description>
    The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9843.html">CVE-2016-9843</cve>
<bugzilla href="https://bugzilla.suse.com/1003580">SUSE bug 1003580</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1013882">SUSE bug 1013882</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1120866">SUSE bug 1120866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123150">SUSE bug 1123150</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205375" comment="java-1_6_0-ibm-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205376" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205377" comment="java-1_6_0-ibm-devel-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205378" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205379" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205380" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205402" comment="java-1_7_0-ibm-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205403" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205404" comment="java-1_7_0-ibm-devel-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205405" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205406" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238392" comment="libmysql55client18-5.5.62-0.39.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238399" comment="libmysql55client18-32bit-5.5.62-0.39.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238393" comment="libmysql55client_r18-5.5.62-0.39.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238391" comment="mysql-5.5.62-0.39.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238394" comment="mysql-client-5.5.62-0.39.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238395" comment="mysql-tools-5.5.62-0.39.18 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205375" comment="java-1_6_0-ibm-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205378" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205379" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205380" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205402" comment="java-1_7_0-ibm-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205403" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205405" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205406" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238392" comment="libmysql55client18-5.5.62-0.39.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238399" comment="libmysql55client18-32bit-5.5.62-0.39.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238393" comment="libmysql55client_r18-5.5.62-0.39.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238391" comment="mysql-5.5.62-0.39.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238394" comment="mysql-client-5.5.62-0.39.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238395" comment="mysql-tools-5.5.62-0.39.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251872" comment="zlib-1.2.7-0.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210996" comment="zlib-32bit-1.2.7-0.14 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9844</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9844" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9844" source="CVE"/>
    <description>
    Buffer overflow in the zi_short function in zipinfo.c in Info-Zip UnZip 6.0 allows remote attackers to cause a denial of service (crash) via a large compression method value in the central directory file header.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9844.html">CVE-2016-9844</cve>
<bugzilla href="https://bugzilla.suse.com/1013992">SUSE bug 1013992</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210860" comment="unzip-6.00-11.17 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9893</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-9893" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9893" source="CVE"/>
    <description>
    Memory safety bugs were reported in Thunderbird 45.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 50.1, Firefox ESR &lt; 45.6, and Thunderbird &lt; 45.6.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9893.html">CVE-2016-9893</cve>
<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015527">SUSE bug 1015527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015528">SUSE bug 1015528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015529">SUSE bug 1015529</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015530">SUSE bug 1015530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015531">SUSE bug 1015531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015533">SUSE bug 1015533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015534">SUSE bug 1015534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015535">SUSE bug 1015535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015536">SUSE bug 1015536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015537">SUSE bug 1015537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015538">SUSE bug 1015538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015540">SUSE bug 1015540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015541">SUSE bug 1015541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015542">SUSE bug 1015542</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202349" comment="MozillaFirefox-45.6.0esr-62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205242" comment="MozillaFirefox-translations-45.6.0esr-62 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9895</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-9895" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9895" source="CVE"/>
    <description>
    Event handlers on "marquee" elements were executed despite a strict Content Security Policy (CSP) that disallowed inline JavaScript. This vulnerability affects Firefox &lt; 50.1, Firefox ESR &lt; 45.6, and Thunderbird &lt; 45.6.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9895.html">CVE-2016-9895</cve>
<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015527">SUSE bug 1015527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015528">SUSE bug 1015528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015529">SUSE bug 1015529</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015530">SUSE bug 1015530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015531">SUSE bug 1015531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015533">SUSE bug 1015533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015534">SUSE bug 1015534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015535">SUSE bug 1015535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015536">SUSE bug 1015536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015537">SUSE bug 1015537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015538">SUSE bug 1015538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015540">SUSE bug 1015540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015541">SUSE bug 1015541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015542">SUSE bug 1015542</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202349" comment="MozillaFirefox-45.6.0esr-62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205242" comment="MozillaFirefox-translations-45.6.0esr-62 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9897</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-9897" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9897" source="CVE"/>
    <description>
    Memory corruption resulting in a potentially exploitable crash during WebGL functions using a vector constructor with a varying array within libGLES. This vulnerability affects Firefox &lt; 50.1, Firefox ESR &lt; 45.6, and Thunderbird &lt; 45.6.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9897.html">CVE-2016-9897</cve>
<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015527">SUSE bug 1015527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015528">SUSE bug 1015528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015529">SUSE bug 1015529</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015530">SUSE bug 1015530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015531">SUSE bug 1015531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015533">SUSE bug 1015533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015534">SUSE bug 1015534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015535">SUSE bug 1015535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015536">SUSE bug 1015536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015537">SUSE bug 1015537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015538">SUSE bug 1015538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015540">SUSE bug 1015540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015541">SUSE bug 1015541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015542">SUSE bug 1015542</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202349" comment="MozillaFirefox-45.6.0esr-62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205242" comment="MozillaFirefox-translations-45.6.0esr-62 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9898</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-9898" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9898" source="CVE"/>
    <description>
    Use-after-free resulting in potentially exploitable crash when manipulating DOM subtrees in the Editor. This vulnerability affects Firefox &lt; 50.1, Firefox ESR &lt; 45.6, and Thunderbird &lt; 45.6.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9898.html">CVE-2016-9898</cve>
<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015527">SUSE bug 1015527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015528">SUSE bug 1015528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015529">SUSE bug 1015529</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015530">SUSE bug 1015530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015531">SUSE bug 1015531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015533">SUSE bug 1015533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015534">SUSE bug 1015534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015535">SUSE bug 1015535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015536">SUSE bug 1015536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015537">SUSE bug 1015537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015538">SUSE bug 1015538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015540">SUSE bug 1015540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015541">SUSE bug 1015541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015542">SUSE bug 1015542</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202349" comment="MozillaFirefox-45.6.0esr-62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205242" comment="MozillaFirefox-translations-45.6.0esr-62 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9899</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-9899" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9899" source="CVE"/>
    <description>
    Use-after-free while manipulating DOM events and removing audio elements due to errors in the handling of node adoption. This vulnerability affects Firefox &lt; 50.1, Firefox ESR &lt; 45.6, and Thunderbird &lt; 45.6.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9899.html">CVE-2016-9899</cve>
<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015527">SUSE bug 1015527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015528">SUSE bug 1015528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015529">SUSE bug 1015529</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015530">SUSE bug 1015530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015531">SUSE bug 1015531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015533">SUSE bug 1015533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015534">SUSE bug 1015534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015535">SUSE bug 1015535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015536">SUSE bug 1015536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015537">SUSE bug 1015537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015538">SUSE bug 1015538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015540">SUSE bug 1015540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015541">SUSE bug 1015541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015542">SUSE bug 1015542</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202349" comment="MozillaFirefox-45.6.0esr-62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205242" comment="MozillaFirefox-translations-45.6.0esr-62 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9900</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-9900" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9900" source="CVE"/>
    <description>
    External resources that should be blocked when loaded by SVG images can bypass security restrictions through the use of "data:" URLs. This could allow for cross-domain data leakage. This vulnerability affects Firefox &lt; 50.1, Firefox ESR &lt; 45.6, and Thunderbird &lt; 45.6.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9900.html">CVE-2016-9900</cve>
<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015527">SUSE bug 1015527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015528">SUSE bug 1015528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015529">SUSE bug 1015529</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015530">SUSE bug 1015530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015531">SUSE bug 1015531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015533">SUSE bug 1015533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015534">SUSE bug 1015534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015535">SUSE bug 1015535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015536">SUSE bug 1015536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015537">SUSE bug 1015537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015538">SUSE bug 1015538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015540">SUSE bug 1015540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015541">SUSE bug 1015541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015542">SUSE bug 1015542</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202349" comment="MozillaFirefox-45.6.0esr-62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205242" comment="MozillaFirefox-translations-45.6.0esr-62 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9901</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-9901" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9901" source="CVE"/>
    <description>
    HTML tags received from the Pocket server will be processed without sanitization and any JavaScript code executed will be run in the "about:pocket-saved" (unprivileged) page, giving it access to Pocket's messaging API through HTML injection. This vulnerability affects Firefox ESR &lt; 45.6 and Firefox &lt; 50.1.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9901.html">CVE-2016-9901</cve>
<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015527">SUSE bug 1015527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015528">SUSE bug 1015528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015529">SUSE bug 1015529</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015530">SUSE bug 1015530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015531">SUSE bug 1015531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015533">SUSE bug 1015533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015534">SUSE bug 1015534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015535">SUSE bug 1015535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015536">SUSE bug 1015536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015537">SUSE bug 1015537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015538">SUSE bug 1015538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015540">SUSE bug 1015540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015541">SUSE bug 1015541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015542">SUSE bug 1015542</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202349" comment="MozillaFirefox-45.6.0esr-62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205242" comment="MozillaFirefox-translations-45.6.0esr-62 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9902</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-9902" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9902" source="CVE"/>
    <description>
    The Pocket toolbar button, once activated, listens for events fired from it's own pages but does not verify the origin of incoming events. This allows content from other origins to fire events and inject content and commands into the Pocket context. Note: this issue does not affect users with e10s enabled. This vulnerability affects Firefox ESR &lt; 45.6 and Firefox &lt; 50.1.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9902.html">CVE-2016-9902</cve>
<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015527">SUSE bug 1015527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015528">SUSE bug 1015528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015529">SUSE bug 1015529</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015530">SUSE bug 1015530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015531">SUSE bug 1015531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015533">SUSE bug 1015533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015534">SUSE bug 1015534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015535">SUSE bug 1015535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015536">SUSE bug 1015536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015537">SUSE bug 1015537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015538">SUSE bug 1015538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015540">SUSE bug 1015540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015541">SUSE bug 1015541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015542">SUSE bug 1015542</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202349" comment="MozillaFirefox-45.6.0esr-62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205242" comment="MozillaFirefox-translations-45.6.0esr-62 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9904</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-9904" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9904" source="CVE"/>
    <description>
    An attacker could use a JavaScript Map/Set timing attack to determine whether an atom is used by another compartment/zone in specific contexts. This could be used to leak information, such as usernames embedded in JavaScript code, across websites. This vulnerability affects Firefox &lt; 50.1, Firefox ESR &lt; 45.6, and Thunderbird &lt; 45.6.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9904.html">CVE-2016-9904</cve>
<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015527">SUSE bug 1015527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015528">SUSE bug 1015528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015529">SUSE bug 1015529</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015530">SUSE bug 1015530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015531">SUSE bug 1015531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015533">SUSE bug 1015533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015534">SUSE bug 1015534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015535">SUSE bug 1015535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015536">SUSE bug 1015536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015537">SUSE bug 1015537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015538">SUSE bug 1015538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015540">SUSE bug 1015540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015541">SUSE bug 1015541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015542">SUSE bug 1015542</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202349" comment="MozillaFirefox-45.6.0esr-62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205242" comment="MozillaFirefox-translations-45.6.0esr-62 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9905</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-9905" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9905" source="CVE"/>
    <description>
    A potentially exploitable crash in "EnumerateSubDocuments" while adding or removing sub-documents. This vulnerability affects Firefox ESR &lt; 45.6 and Thunderbird &lt; 45.6.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9905.html">CVE-2016-9905</cve>
<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015527">SUSE bug 1015527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015528">SUSE bug 1015528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015529">SUSE bug 1015529</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015530">SUSE bug 1015530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015531">SUSE bug 1015531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015533">SUSE bug 1015533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015534">SUSE bug 1015534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015535">SUSE bug 1015535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015536">SUSE bug 1015536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015537">SUSE bug 1015537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015538">SUSE bug 1015538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015540">SUSE bug 1015540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015541">SUSE bug 1015541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015542">SUSE bug 1015542</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202349" comment="MozillaFirefox-45.6.0esr-62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205242" comment="MozillaFirefox-translations-45.6.0esr-62 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9907</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9907" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9907" source="CVE"/>
    <description>
    Quick Emulator (Qemu) built with the USB redirector usb-guest support is vulnerable to a memory leakage flaw. It could occur while destroying the USB redirector in 'usbredir_handle_destroy'. A guest user/process could use this issue to leak host memory, resulting in DoS for a host.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9907.html">CVE-2016-9907</cve>
<bugzilla href="https://bugzilla.suse.com/1014109">SUSE bug 1014109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1014490">SUSE bug 1014490</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205626" comment="kvm-1.4.2-53.11 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9911</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-9911" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9911" source="CVE"/>
    <description>
    Quick Emulator (Qemu) built with the USB EHCI Emulation support is vulnerable to a memory leakage issue. It could occur while processing packet data in 'ehci_init_transfer'. A guest user/process could use this issue to leak host memory, resulting in DoS for a host.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9911.html">CVE-2016-9911</cve>
<bugzilla href="https://bugzilla.suse.com/1014111">SUSE bug 1014111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1014507">SUSE bug 1014507</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205626" comment="kvm-1.4.2-53.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205957" comment="xen-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209062" comment="xen-doc-html-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209063" comment="xen-doc-pdf-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205958" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205959" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205960" comment="xen-libs-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209064" comment="xen-libs-32bit-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209065" comment="xen-tools-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205961" comment="xen-tools-domU-4.2.5_21-35 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205626" comment="kvm-1.4.2-53.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250412" comment="xen-4.2.5_21-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250413" comment="xen-doc-html-4.2.5_21-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250414" comment="xen-doc-pdf-4.2.5_21-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250415" comment="xen-kmp-default-4.2.5_21_3.0.101_0.116.TDC-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250416" comment="xen-libs-4.2.5_21-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250417" comment="xen-tools-4.2.5_21-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250418" comment="xen-tools-domU-4.2.5_21-37 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205957" comment="xen-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209062" comment="xen-doc-html-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209063" comment="xen-doc-pdf-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205958" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205960" comment="xen-libs-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209064" comment="xen-libs-32bit-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209065" comment="xen-tools-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205961" comment="xen-tools-domU-4.2.5_21-35 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9921</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-9921" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9921" source="CVE"/>
    <description>
    Quick emulator (Qemu) built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to a divide by zero issue. It could occur while copying VGA data when cirrus graphics mode was set to be VGA. A privileged user inside guest could use this flaw to crash the Qemu process instance on the host, resulting in DoS.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9921.html">CVE-2016-9921</cve>
<bugzilla href="https://bugzilla.suse.com/1014702">SUSE bug 1014702</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015169">SUSE bug 1015169</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205626" comment="kvm-1.4.2-53.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205957" comment="xen-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209062" comment="xen-doc-html-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209063" comment="xen-doc-pdf-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205958" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205959" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205960" comment="xen-libs-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209064" comment="xen-libs-32bit-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209065" comment="xen-tools-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205961" comment="xen-tools-domU-4.2.5_21-35 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205626" comment="kvm-1.4.2-53.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250412" comment="xen-4.2.5_21-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250413" comment="xen-doc-html-4.2.5_21-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250414" comment="xen-doc-pdf-4.2.5_21-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250415" comment="xen-kmp-default-4.2.5_21_3.0.101_0.116.TDC-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250416" comment="xen-libs-4.2.5_21-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250417" comment="xen-tools-4.2.5_21-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250418" comment="xen-tools-domU-4.2.5_21-37 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205957" comment="xen-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209062" comment="xen-doc-html-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209063" comment="xen-doc-pdf-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205958" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205960" comment="xen-libs-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209064" comment="xen-libs-32bit-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209065" comment="xen-tools-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205961" comment="xen-tools-domU-4.2.5_21-35 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9922</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-9922" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9922" source="CVE"/>
    <description>
    The cirrus_do_copy function in hw/display/cirrus_vga.c in QEMU (aka Quick Emulator), when cirrus graphics mode is VGA, allows local guest OS privileged users to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving blit pitch values.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9922.html">CVE-2016-9922</cve>
<bugzilla href="https://bugzilla.suse.com/1014702">SUSE bug 1014702</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1015169">SUSE bug 1015169</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205626" comment="kvm-1.4.2-53.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205957" comment="xen-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209062" comment="xen-doc-html-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209063" comment="xen-doc-pdf-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205958" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205959" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205960" comment="xen-libs-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209064" comment="xen-libs-32bit-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209065" comment="xen-tools-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205961" comment="xen-tools-domU-4.2.5_21-35 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205626" comment="kvm-1.4.2-53.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250412" comment="xen-4.2.5_21-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250413" comment="xen-doc-html-4.2.5_21-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250414" comment="xen-doc-pdf-4.2.5_21-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250415" comment="xen-kmp-default-4.2.5_21_3.0.101_0.116.TDC-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250416" comment="xen-libs-4.2.5_21-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250417" comment="xen-tools-4.2.5_21-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250418" comment="xen-tools-domU-4.2.5_21-37 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205957" comment="xen-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209062" comment="xen-doc-html-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209063" comment="xen-doc-pdf-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205958" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205960" comment="xen-libs-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209064" comment="xen-libs-32bit-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209065" comment="xen-tools-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205961" comment="xen-tools-domU-4.2.5_21-35 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9932</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2016-9932" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9932" source="CVE"/>
    <description>
    CMPXCHG8B emulation in Xen 3.3.x through 4.7.x on x86 systems allows local HVM guest OS users to obtain sensitive information from host stack memory via a "supposedly-ignored" operand size prefix.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9932.html">CVE-2016-9932</cve>
<bugzilla href="https://bugzilla.suse.com/1012651">SUSE bug 1012651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1016340">SUSE bug 1016340</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205957" comment="xen-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209062" comment="xen-doc-html-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209063" comment="xen-doc-pdf-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205958" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205959" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205960" comment="xen-libs-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209064" comment="xen-libs-32bit-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209065" comment="xen-tools-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205961" comment="xen-tools-domU-4.2.5_21-35 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205957" comment="xen-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209062" comment="xen-doc-html-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209063" comment="xen-doc-pdf-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205958" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205960" comment="xen-libs-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209064" comment="xen-libs-32bit-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209065" comment="xen-tools-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205961" comment="xen-tools-domU-4.2.5_21-35 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250405" comment="xen-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250406" comment="xen-doc-html-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250407" comment="xen-doc-pdf-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250408" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250409" comment="xen-libs-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250410" comment="xen-tools-4.2.5_21-31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250411" comment="xen-tools-domU-4.2.5_21-31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9933</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9933" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9933" source="CVE"/>
    <description>
    Stack consumption vulnerability in the gdImageFillToBorder function in gd.c in the GD Graphics Library (aka libgd) before 2.2.2, as used in PHP before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (segmentation violation) via a crafted imagefilltoborder call that triggers use of a negative color value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9933.html">CVE-2016-9933</cve>
<bugzilla href="https://bugzilla.suse.com/1015187">SUSE bug 1015187</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210400" comment="apache2-mod_php53-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202614" comment="gd-2.0.36.RC1-52.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203304" comment="php53-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210401" comment="php53-bcmath-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210402" comment="php53-bz2-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210403" comment="php53-calendar-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210404" comment="php53-ctype-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210405" comment="php53-curl-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210406" comment="php53-dba-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210407" comment="php53-dom-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210408" comment="php53-exif-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210409" comment="php53-fastcgi-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210410" comment="php53-fileinfo-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210411" comment="php53-ftp-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210412" comment="php53-gd-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210413" comment="php53-gettext-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210414" comment="php53-gmp-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210415" comment="php53-iconv-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210416" comment="php53-intl-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210417" comment="php53-json-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210418" comment="php53-ldap-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210419" comment="php53-mbstring-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210420" comment="php53-mcrypt-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210421" comment="php53-mysql-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210422" comment="php53-odbc-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210423" comment="php53-openssl-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210424" comment="php53-pcntl-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210425" comment="php53-pdo-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210426" comment="php53-pear-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210427" comment="php53-pgsql-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210428" comment="php53-pspell-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210429" comment="php53-shmop-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210430" comment="php53-snmp-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210431" comment="php53-soap-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210432" comment="php53-suhosin-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210433" comment="php53-sysvmsg-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210434" comment="php53-sysvsem-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210435" comment="php53-sysvshm-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210436" comment="php53-tokenizer-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210437" comment="php53-wddx-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210438" comment="php53-xmlreader-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210439" comment="php53-xmlrpc-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210440" comment="php53-xmlwriter-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210441" comment="php53-xsl-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210442" comment="php53-zip-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210443" comment="php53-zlib-5.3.17-94 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9934</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9934" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9934" source="CVE"/>
    <description>
    ext/wddx/wddx.c in PHP before 5.6.28 and 7.x before 7.0.13 allows remote attackers to cause a denial of service (NULL pointer dereference) via crafted serialized data in a wddxPacket XML document, as demonstrated by a PDORow string.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9934.html">CVE-2016-9934</cve>
<bugzilla href="https://bugzilla.suse.com/1015188">SUSE bug 1015188</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210400" comment="apache2-mod_php53-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203304" comment="php53-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210401" comment="php53-bcmath-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210402" comment="php53-bz2-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210403" comment="php53-calendar-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210404" comment="php53-ctype-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210405" comment="php53-curl-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210406" comment="php53-dba-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210407" comment="php53-dom-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210408" comment="php53-exif-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210409" comment="php53-fastcgi-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210410" comment="php53-fileinfo-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210411" comment="php53-ftp-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210412" comment="php53-gd-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210413" comment="php53-gettext-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210414" comment="php53-gmp-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210415" comment="php53-iconv-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210416" comment="php53-intl-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210417" comment="php53-json-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210418" comment="php53-ldap-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210419" comment="php53-mbstring-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210420" comment="php53-mcrypt-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210421" comment="php53-mysql-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210422" comment="php53-odbc-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210423" comment="php53-openssl-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210424" comment="php53-pcntl-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210425" comment="php53-pdo-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210426" comment="php53-pear-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210427" comment="php53-pgsql-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210428" comment="php53-pspell-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210429" comment="php53-shmop-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210430" comment="php53-snmp-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210431" comment="php53-soap-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210432" comment="php53-suhosin-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210433" comment="php53-sysvmsg-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210434" comment="php53-sysvsem-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210435" comment="php53-sysvshm-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210436" comment="php53-tokenizer-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210437" comment="php53-wddx-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210438" comment="php53-xmlreader-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210439" comment="php53-xmlrpc-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210440" comment="php53-xmlwriter-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210441" comment="php53-xsl-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210442" comment="php53-zip-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210443" comment="php53-zlib-5.3.17-94 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9935</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9935" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9935" source="CVE"/>
    <description>
    The php_wddx_push_element function in ext/wddx/wddx.c in PHP before 5.6.29 and 7.x before 7.0.14 allows remote attackers to cause a denial of service (out-of-bounds read and memory corruption) or possibly have unspecified other impact via an empty boolean element in a wddxPacket XML document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9935.html">CVE-2016-9935</cve>
<bugzilla href="https://bugzilla.suse.com/1015189">SUSE bug 1015189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1048097">SUSE bug 1048097</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210400" comment="apache2-mod_php53-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203304" comment="php53-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210401" comment="php53-bcmath-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210402" comment="php53-bz2-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210403" comment="php53-calendar-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210404" comment="php53-ctype-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210405" comment="php53-curl-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210406" comment="php53-dba-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210407" comment="php53-dom-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210408" comment="php53-exif-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210409" comment="php53-fastcgi-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210410" comment="php53-fileinfo-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210411" comment="php53-ftp-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210412" comment="php53-gd-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210413" comment="php53-gettext-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210414" comment="php53-gmp-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210415" comment="php53-iconv-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210416" comment="php53-intl-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210417" comment="php53-json-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210418" comment="php53-ldap-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210419" comment="php53-mbstring-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210420" comment="php53-mcrypt-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210421" comment="php53-mysql-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210422" comment="php53-odbc-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210423" comment="php53-openssl-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210424" comment="php53-pcntl-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210425" comment="php53-pdo-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210426" comment="php53-pear-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210427" comment="php53-pgsql-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210428" comment="php53-pspell-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210429" comment="php53-shmop-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210430" comment="php53-snmp-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210431" comment="php53-soap-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210432" comment="php53-suhosin-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210433" comment="php53-sysvmsg-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210434" comment="php53-sysvsem-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210435" comment="php53-sysvshm-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210436" comment="php53-tokenizer-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210437" comment="php53-wddx-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210438" comment="php53-xmlreader-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210439" comment="php53-xmlrpc-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210440" comment="php53-xmlwriter-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210441" comment="php53-xsl-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210442" comment="php53-zip-5.3.17-94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210443" comment="php53-zlib-5.3.17-94 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9941</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9941" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9941" source="CVE"/>
    <description>
    Heap-based buffer overflow in rfbproto.c in LibVNCClient in LibVNCServer before 0.9.11 allows remote servers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted FramebufferUpdate message containing a subrectangle outside of the client drawing area.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9941.html">CVE-2016-9941</cve>
<bugzilla href="https://bugzilla.suse.com/1017711">SUSE bug 1017711</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1019274">SUSE bug 1019274</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202325" comment="LibVNCServer-0.9.1-159 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9942</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2016-9942" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9942" source="CVE"/>
    <description>
    Heap-based buffer overflow in ultra.c in LibVNCClient in LibVNCServer before 0.9.11 allows remote servers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted FramebufferUpdate message with the Ultra type tile, such that the LZO payload decompressed length exceeds what is specified by the tile dimensions.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9942.html">CVE-2016-9942</cve>
<bugzilla href="https://bugzilla.suse.com/1017712">SUSE bug 1017712</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1019274">SUSE bug 1019274</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202325" comment="LibVNCServer-0.9.1-159 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20170663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-0663</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-0663" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0663" source="CVE"/>
    <description>
    A remote code execution vulnerability in libxml2 could enable an attacker using a specially crafted file to execute arbitrary code within the context of an unprivileged process. This issue is rated as High due to the possibility of remote code execution in an application that uses this library. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-37104170.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-0663.html">CVE-2017-0663</cve>
<bugzilla href="https://bugzilla.suse.com/1044337">SUSE bug 1044337</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049467">SUSE bug 1049467</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203104" comment="libxml2-2.7.6-0.76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209977" comment="libxml2-32bit-2.7.6-0.76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209978" comment="libxml2-doc-2.7.6-0.76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209979" comment="libxml2-python-2.7.6-0.76 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20170861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-0861</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-0861" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861" source="CVE"/>
    <description>
    Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem in the Linux kernel allows attackers to gain privileges via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-0861.html">CVE-2017-0861</cve>
<bugzilla href="https://bugzilla.suse.com/1088260">SUSE bug 1088260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1088268">SUSE bug 1088268</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208695" comment="kernel-bigsmp-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208696" comment="kernel-bigsmp-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208697" comment="kernel-bigsmp-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205609" comment="kernel-default-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205610" comment="kernel-default-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205611" comment="kernel-default-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208698" comment="kernel-default-man-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205612" comment="kernel-ec2-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205613" comment="kernel-ec2-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205614" comment="kernel-ec2-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205615" comment="kernel-pae-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205616" comment="kernel-pae-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205617" comment="kernel-pae-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205618" comment="kernel-source-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205619" comment="kernel-syms-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205620" comment="kernel-trace-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205621" comment="kernel-trace-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205622" comment="kernel-trace-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205623" comment="kernel-xen-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205624" comment="kernel-xen-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205625" comment="kernel-xen-devel-3.0.101-0.47.106.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000050</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-1000050" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000050" source="CVE"/>
    <description>
    JasPer 2.0.12 is vulnerable to a NULL pointer exception in the function jp2_encode which failed to check to see if the image contained at least one component resulting in a denial-of-service.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-1000050.html">CVE-2017-1000050</cve>
<bugzilla href="https://bugzilla.suse.com/1047958">SUSE bug 1047958</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202752" comment="jasper-1.900.14-134.33.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209373" comment="libjasper-1.900.14-134.33.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209374" comment="libjasper-32bit-1.900.14-134.33.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000100</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-1000100" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100" source="CVE"/>
    <description>
    When doing a TFTP transfer and curl/libcurl is given a URL that contains a very long file name (longer than about 515 bytes), the file name is truncated to fit within the buffer boundaries, but the buffer size is still wrongly updated to use the untruncated length. This too large value is then used in the sendto() call, making curl attempt to send more data than what is actually put into the buffer. The endto() function will then read beyond the end of the heap based buffer. A malicious HTTP(S) server could redirect a vulnerable libcurl-using client to a crafted TFTP URL (if the client hasn't restricted which protocols it allows redirects to) and trick it to send private memory contents to a remote server over UDP. Limit curl's redirect protocols with --proto-redir and libcurl's with CURLOPT_REDIR_PROTOCOLS.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-1000100.html">CVE-2017-1000100</cve>
<bugzilla href="https://bugzilla.suse.com/1051644">SUSE bug 1051644</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202483" comment="curl-7.19.7-1.70.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203721" comment="curl-openssl1-7.19.7-1.70.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209204" comment="libcurl4-7.19.7-1.70.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209205" comment="libcurl4-32bit-7.19.7-1.70.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203722" comment="libcurl4-openssl1-7.19.7-1.70.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203723" comment="libcurl4-openssl1-32bit-7.19.7-1.70.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000112</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-1000112" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000112" source="CVE"/>
    <description>
    Linux kernel: Exploitable memory corruption due to UFO to non-UFO path switch. When building a UFO packet with MSG_MORE __ip_append_data() calls ip_ufo_append_data() to append. However in between two send() calls, the append path can be switched from UFO to non-UFO one, which leads to a memory corruption. In case UFO packet lengths exceeds MTU, copy = maxfraglen - skb-&gt;len becomes negative on the non-UFO path and the branch to allocate new skb is taken. This triggers fragmentation and computation of fraggap = skb_prev-&gt;len - maxfraglen. Fraggap can exceed MTU, causing copy = datalen - transhdrlen - fraggap to become negative. Subsequently skb_copy_and_csum_bits() writes out-of-bounds. A similar issue is present in IPv6 code. The bug was introduced in e89e9cf539a2 ("[IPv4/IPv6]: UFO Scatter-gather approach") on Oct 18 2005.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-1000112.html">CVE-2017-1000112</cve>
<bugzilla href="https://bugzilla.suse.com/1052311">SUSE bug 1052311</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1052365">SUSE bug 1052365</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1052368">SUSE bug 1052368</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208691" comment="kernel-bigsmp-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208692" comment="kernel-bigsmp-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208693" comment="kernel-bigsmp-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205592" comment="kernel-default-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205593" comment="kernel-default-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205594" comment="kernel-default-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208694" comment="kernel-default-man-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205595" comment="kernel-ec2-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205596" comment="kernel-ec2-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205597" comment="kernel-ec2-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205598" comment="kernel-pae-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205599" comment="kernel-pae-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205600" comment="kernel-pae-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205601" comment="kernel-source-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205602" comment="kernel-syms-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205603" comment="kernel-trace-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205604" comment="kernel-trace-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205605" comment="kernel-trace-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205606" comment="kernel-xen-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205607" comment="kernel-xen-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205608" comment="kernel-xen-devel-3.0.101-0.47.106.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000158</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-1000158" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000158" source="CVE"/>
    <description>
    CPython (aka Python) up to 2.7.13 is vulnerable to an integer overflow in the PyString_DecodeEscape function in stringobject.c, resulting in heap-based buffer overflow (and possible arbitrary code execution)
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-1000158.html">CVE-2017-1000158</cve>
<bugzilla href="https://bugzilla.suse.com/1068664">SUSE bug 1068664</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210674" comment="libpython2_6-1_0-2.6.9-40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210675" comment="libpython2_6-1_0-32bit-2.6.9-40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249543" comment="libpython2_7-1_0-2.7.9-6.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249544" comment="libpython2_7-1_0-32bit-2.7.9-6.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203408" comment="python-2.6.9-40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203409" comment="python-32bit-2.6.9-40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203410" comment="python-base-2.6.9-40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210677" comment="python-base-32bit-2.6.9-40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210679" comment="python-curses-2.6.9-40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203411" comment="python-demo-2.6.9-40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203413" comment="python-doc-2.6-8.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203414" comment="python-doc-pdf-2.6-8.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203415" comment="python-gdbm-2.6.9-40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203416" comment="python-idle-2.6.9-40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203417" comment="python-tk-2.6.9-40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210681" comment="python-xml-2.6.9-40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249545" comment="python27-2.7.9-6.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249546" comment="python27-32bit-2.7.9-6.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249547" comment="python27-base-2.7.9-6.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249548" comment="python27-base-32bit-2.7.9-6.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249549" comment="python27-curses-2.7.9-6.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249550" comment="python27-demo-2.7.9-6.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249551" comment="python27-devel-2.7.9-6.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249552" comment="python27-doc-2.7.9-6.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249553" comment="python27-doc-pdf-2.7.9-6.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249554" comment="python27-gdbm-2.7.9-6.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249555" comment="python27-idle-2.7.9-6.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249556" comment="python27-tk-2.7.9-6.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249557" comment="python27-xml-2.7.9-6.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000159</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-1000159" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000159" source="CVE"/>
    <description>
    Command injection in evince via filename when printing to PDF. This affects versions earlier than 3.25.91.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-1000159.html">CVE-2017-1000159</cve>
<bugzilla href="https://bugzilla.suse.com/1070046">SUSE bug 1070046</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202507" comment="evince-2.28.2-0.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209225" comment="evince-doc-2.28.2-0.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209226" comment="evince-lang-2.28.2-0.7.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000250</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-1000250" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000250" source="CVE"/>
    <description>
    All versions of the SDP server in BlueZ 5.46 and earlier are vulnerable to an information disclosure vulnerability which allows remote attackers to obtain sensitive information from the bluetoothd process memory. This vulnerability lies in the processing of SDP search attribute requests.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-1000250.html">CVE-2017-1000250</cve>
<bugzilla href="https://bugzilla.suse.com/1057342">SUSE bug 1057342</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009249918" comment="bluez-4.99-0.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249919" comment="libbluetooth3-4.99-0.9.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000251</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-1000251" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000251" source="CVE"/>
    <description>
    The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-1000251.html">CVE-2017-1000251</cve>
<bugzilla href="https://bugzilla.suse.com/1057389">SUSE bug 1057389</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1057950">SUSE bug 1057950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1070535">SUSE bug 1070535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1120758">SUSE bug 1120758</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208652" comment="kernel-bigsmp-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208653" comment="kernel-bigsmp-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208654" comment="kernel-bigsmp-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205524" comment="kernel-default-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205525" comment="kernel-default-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205526" comment="kernel-default-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208655" comment="kernel-default-man-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205527" comment="kernel-ec2-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205528" comment="kernel-ec2-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205529" comment="kernel-ec2-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205530" comment="kernel-pae-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205531" comment="kernel-pae-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205532" comment="kernel-pae-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205533" comment="kernel-source-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205534" comment="kernel-syms-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205535" comment="kernel-trace-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205536" comment="kernel-trace-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205537" comment="kernel-trace-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205538" comment="kernel-xen-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205539" comment="kernel-xen-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205540" comment="kernel-xen-devel-3.0.101-0.47.106.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000253" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000253</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-1000253" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000253" source="CVE"/>
    <description>
    Linux distributions that have not patched their long-term kernels with https://git.kernel.org/linus/a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (committed on April 14, 2015). This kernel vulnerability was fixed in April 2015 by commit a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (backported to Linux 3.10.77 in May 2015), but it was not recognized as a security threat. With CONFIG_ARCH_BINFMT_ELF_RANDOMIZE_PIE enabled, and a normal top-down address allocation strategy, load_elf_binary() will attempt to map a PIE binary into an address range immediately below mm-&gt;mmap_base. Unfortunately, load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary which means that, while the first PT_LOAD segment is mapped below mm-&gt;mmap_base, the subsequent PT_LOAD segment(s) end up being mapped above mm-&gt;mmap_base into the are that is supposed to be the "gap" between the stack and the binary.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-1000253.html">CVE-2017-1000253</cve>
<bugzilla href="https://bugzilla.suse.com/1059525">SUSE bug 1059525</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1061680">SUSE bug 1061680</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1075506">SUSE bug 1075506</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1149729">SUSE bug 1149729</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208618" comment="kernel-bigsmp-3.0.101-0.47.106.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208619" comment="kernel-bigsmp-base-3.0.101-0.47.106.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208620" comment="kernel-bigsmp-devel-3.0.101-0.47.106.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205507" comment="kernel-default-3.0.101-0.47.106.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205508" comment="kernel-default-base-3.0.101-0.47.106.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205509" comment="kernel-default-devel-3.0.101-0.47.106.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208621" comment="kernel-default-man-3.0.101-0.47.106.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205510" comment="kernel-ec2-3.0.101-0.47.106.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205511" comment="kernel-ec2-base-3.0.101-0.47.106.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205512" comment="kernel-ec2-devel-3.0.101-0.47.106.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205513" comment="kernel-pae-3.0.101-0.47.106.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205514" comment="kernel-pae-base-3.0.101-0.47.106.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205515" comment="kernel-pae-devel-3.0.101-0.47.106.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205516" comment="kernel-source-3.0.101-0.47.106.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205517" comment="kernel-syms-3.0.101-0.47.106.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205518" comment="kernel-trace-3.0.101-0.47.106.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205519" comment="kernel-trace-base-3.0.101-0.47.106.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205520" comment="kernel-trace-devel-3.0.101-0.47.106.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205521" comment="kernel-xen-3.0.101-0.47.106.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205522" comment="kernel-xen-base-3.0.101-0.47.106.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205523" comment="kernel-xen-devel-3.0.101-0.47.106.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000254</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-1000254" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254" source="CVE"/>
    <description>
    libcurl may read outside of a heap allocated buffer when doing FTP. When libcurl connects to an FTP server and successfully logs in (anonymous or not), it asks the server for the current directory with the `PWD` command. The server then responds with a 257 response containing the path, inside double quotes. The returned path name is then kept by libcurl for subsequent uses. Due to a flaw in the string parser for this directory name, a directory name passed like this but without a closing double quote would lead to libcurl not adding a trailing NUL byte to the buffer holding the name. When libcurl would then later access the string, it could read beyond the allocated heap buffer and crash or wrongly access data beyond the buffer, thinking it was part of the path. A malicious server could abuse this fact and effectively prevent libcurl-based clients to work with it - the PWD command is always issued on new FTP connections and the mistake has a high chance of causing a segfault. The simple fact that this has issue remained undiscovered for this long could suggest that malformed PWD responses are rare in benign servers. We are not aware of any exploit of this flaw. This bug was introduced in commit [415d2e7cb7](https://github.com/curl/curl/commit/415d2e7cb7), March 2005. In libcurl version 7.56.0, the parser always zero terminates the string but also rejects it if not terminated properly with a final double quote.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-1000254.html">CVE-2017-1000254</cve>
<bugzilla href="https://bugzilla.suse.com/1061876">SUSE bug 1061876</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202485" comment="curl-7.19.7-1.70.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203725" comment="curl-openssl1-7.19.7-1.70.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209207" comment="libcurl4-7.19.7-1.70.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209208" comment="libcurl4-32bit-7.19.7-1.70.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203726" comment="libcurl4-openssl1-7.19.7-1.70.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203727" comment="libcurl4-openssl1-32bit-7.19.7-1.70.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000363</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-1000363" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000363" source="CVE"/>
    <description>
    Linux drivers/char/lp.c Out-of-Bounds Write. Due to a missing bounds check, and the fact that parport_ptr integer is static, a 'secure boot' kernel command line adversary (can happen due to bootloader vulns, e.g. Google Nexus 6's CVE-2016-10277, where due to a vulnerability the adversary has partial control over the command line) can overflow the parport_nr array in the following code, by appending many (&gt;LP_NO) 'lp=none' arguments to the command line.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-1000363.html">CVE-2017-1000363</cve>
<bugzilla href="https://bugzilla.suse.com/1039456">SUSE bug 1039456</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208691" comment="kernel-bigsmp-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208692" comment="kernel-bigsmp-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208693" comment="kernel-bigsmp-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205592" comment="kernel-default-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205593" comment="kernel-default-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205594" comment="kernel-default-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208694" comment="kernel-default-man-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205595" comment="kernel-ec2-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205596" comment="kernel-ec2-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205597" comment="kernel-ec2-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205598" comment="kernel-pae-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205599" comment="kernel-pae-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205600" comment="kernel-pae-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205601" comment="kernel-source-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205602" comment="kernel-syms-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205603" comment="kernel-trace-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205604" comment="kernel-trace-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205605" comment="kernel-trace-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205606" comment="kernel-xen-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205607" comment="kernel-xen-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205608" comment="kernel-xen-devel-3.0.101-0.47.106.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000364</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-1000364" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364" source="CVE"/>
    <description>
    An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be "jumped" over (the stack guard page is bypassed), this affects Linux Kernel versions 4.11.5 and earlier (the stackguard page was introduced in 2010).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-1000364.html">CVE-2017-1000364</cve>
<bugzilla href="https://bugzilla.suse.com/1035920">SUSE bug 1035920</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1039346">SUSE bug 1039346</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1039348">SUSE bug 1039348</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1042200">SUSE bug 1042200</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044985">SUSE bug 1044985</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1075506">SUSE bug 1075506</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1077345">SUSE bug 1077345</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1149726">SUSE bug 1149726</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208614" comment="kernel-bigsmp-3.0.101-0.47.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208615" comment="kernel-bigsmp-base-3.0.101-0.47.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208616" comment="kernel-bigsmp-devel-3.0.101-0.47.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205490" comment="kernel-default-3.0.101-0.47.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205491" comment="kernel-default-base-3.0.101-0.47.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205492" comment="kernel-default-devel-3.0.101-0.47.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208617" comment="kernel-default-man-3.0.101-0.47.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205493" comment="kernel-ec2-3.0.101-0.47.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205494" comment="kernel-ec2-base-3.0.101-0.47.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205495" comment="kernel-ec2-devel-3.0.101-0.47.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205496" comment="kernel-pae-3.0.101-0.47.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205497" comment="kernel-pae-base-3.0.101-0.47.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205498" comment="kernel-pae-devel-3.0.101-0.47.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205499" comment="kernel-source-3.0.101-0.47.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205500" comment="kernel-syms-3.0.101-0.47.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205501" comment="kernel-trace-3.0.101-0.47.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205502" comment="kernel-trace-base-3.0.101-0.47.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205503" comment="kernel-trace-devel-3.0.101-0.47.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205504" comment="kernel-xen-3.0.101-0.47.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205505" comment="kernel-xen-base-3.0.101-0.47.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205506" comment="kernel-xen-devel-3.0.101-0.47.105 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000365</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-1000365" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000365" source="CVE"/>
    <description>
    The Linux Kernel imposes a size restriction on the arguments and environmental strings passed through RLIMIT_STACK/RLIM_INFINITY (1/4 of the size), but does not take the argument and environment pointers into account, which allows attackers to bypass this limitation. This affects Linux Kernel versions 4.11.5 and earlier. It appears that this feature was introduced in the Linux Kernel version 2.6.23.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-1000365.html">CVE-2017-1000365</cve>
<bugzilla href="https://bugzilla.suse.com/1037551">SUSE bug 1037551</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1039346">SUSE bug 1039346</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1039349">SUSE bug 1039349</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1039354">SUSE bug 1039354</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1046527">SUSE bug 1046527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1054557">SUSE bug 1054557</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1077345">SUSE bug 1077345</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208691" comment="kernel-bigsmp-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208692" comment="kernel-bigsmp-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208693" comment="kernel-bigsmp-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205592" comment="kernel-default-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205593" comment="kernel-default-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205594" comment="kernel-default-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208694" comment="kernel-default-man-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205595" comment="kernel-ec2-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205596" comment="kernel-ec2-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205597" comment="kernel-ec2-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205598" comment="kernel-pae-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205599" comment="kernel-pae-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205600" comment="kernel-pae-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205601" comment="kernel-source-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205602" comment="kernel-syms-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205603" comment="kernel-trace-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205604" comment="kernel-trace-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205605" comment="kernel-trace-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205606" comment="kernel-xen-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205607" comment="kernel-xen-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205608" comment="kernel-xen-devel-3.0.101-0.47.106.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000366" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000366</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-1000366" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000366" source="CVE"/>
    <description>
    glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-1000366.html">CVE-2017-1000366</cve>
<bugzilla href="https://bugzilla.suse.com/0">SUSE bug 0</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1037551">SUSE bug 1037551</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1039357">SUSE bug 1039357</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1071319">SUSE bug 1071319</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202694" comment="glibc-2.11.3-17.109 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208514" comment="glibc-32bit-2.11.3-17.109 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205348" comment="glibc-devel-2.11.3-17.109 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208515" comment="glibc-devel-32bit-2.11.3-17.109 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202695" comment="glibc-html-2.11.3-17.109 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205349" comment="glibc-i18ndata-2.11.3-17.109 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202696" comment="glibc-info-2.11.3-17.109 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205350" comment="glibc-locale-2.11.3-17.109 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208516" comment="glibc-locale-32bit-2.11.3-17.109 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205351" comment="glibc-profile-2.11.3-17.109 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208517" comment="glibc-profile-32bit-2.11.3-17.109 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205352" comment="nscd-2.11.3-17.109 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000376</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-1000376" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000376" source="CVE"/>
    <description>
    libffi requests an executable stack allowing attackers to more easily trigger arbitrary code execution by overwriting the stack. Please note that libffi is used by a number of other libraries. It was previously stated that this affects libffi version 3.2.1 but this appears to be incorrect. libffi prior to version 3.1 on 32 bit x86 systems was vulnerable, and upstream is believed to have fixed this issue in version 3.1.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-1000376.html">CVE-2017-1000376</cve>
<bugzilla href="https://bugzilla.suse.com/1045091">SUSE bug 1045091</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202537" comment="cpp43-4.3.4_20091019-37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202538" comment="gcc43-4.3.4_20091019-37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208493" comment="gcc43-32bit-4.3.4_20091019-37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205328" comment="gcc43-c++-4.3.4_20091019-37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202540" comment="gcc43-fortran-4.3.4_20091019-37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202541" comment="gcc43-fortran-32bit-4.3.4_20091019-37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205329" comment="gcc43-info-4.3.4_20091019-37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205330" comment="gcc43-locale-4.3.4_20091019-37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205331" comment="libstdc++43-devel-4.3.4_20091019-37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208494" comment="libstdc++43-devel-32bit-4.3.4_20091019-37.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000380</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-1000380" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000380" source="CVE"/>
    <description>
    sound/core/timer.c in the Linux kernel before 4.11.5 is vulnerable to a data race in the ALSA /dev/snd/timer driver resulting in local users being able to read information belonging to other users, i.e., uninitialized memory contents may be disclosed when a read and an ioctl happen at the same time.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-1000380.html">CVE-2017-1000380</cve>
<bugzilla href="https://bugzilla.suse.com/1044125">SUSE bug 1044125</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208691" comment="kernel-bigsmp-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208692" comment="kernel-bigsmp-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208693" comment="kernel-bigsmp-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205592" comment="kernel-default-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205593" comment="kernel-default-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205594" comment="kernel-default-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208694" comment="kernel-default-man-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205595" comment="kernel-ec2-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205596" comment="kernel-ec2-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205597" comment="kernel-ec2-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205598" comment="kernel-pae-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205599" comment="kernel-pae-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205600" comment="kernel-pae-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205601" comment="kernel-source-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205602" comment="kernel-syms-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205603" comment="kernel-trace-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205604" comment="kernel-trace-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205605" comment="kernel-trace-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205606" comment="kernel-xen-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205607" comment="kernel-xen-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205608" comment="kernel-xen-devel-3.0.101-0.47.106.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000407</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-1000407" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000407" source="CVE"/>
    <description>
    The Linux Kernel 2.6.32 and later are affected by a denial of service, by flooding the diagnostic port 0x80 an exception can be triggered leading to a kernel panic.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-1000407.html">CVE-2017-1000407</cve>
<bugzilla href="https://bugzilla.suse.com/1071021">SUSE bug 1071021</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009243428" comment="kernel-bigsmp-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243429" comment="kernel-bigsmp-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243430" comment="kernel-bigsmp-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243411" comment="kernel-default-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243412" comment="kernel-default-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243413" comment="kernel-default-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243431" comment="kernel-default-man-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243414" comment="kernel-ec2-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243415" comment="kernel-ec2-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243416" comment="kernel-ec2-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243417" comment="kernel-pae-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243418" comment="kernel-pae-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243419" comment="kernel-pae-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243420" comment="kernel-source-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243421" comment="kernel-syms-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243422" comment="kernel-trace-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243423" comment="kernel-trace-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243424" comment="kernel-trace-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243425" comment="kernel-xen-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243426" comment="kernel-xen-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243427" comment="kernel-xen-devel-3.0.101-0.47.106.59 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000445</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-1000445" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000445" source="CVE"/>
    <description>
    ImageMagick 7.0.7-1 and older version are vulnerable to null pointer dereference in the MagickCore component and might lead to denial of service
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-1000445.html">CVE-2017-1000445</cve>
<bugzilla href="https://bugzilla.suse.com/1074425">SUSE bug 1074425</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202283" comment="ImageMagick-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209124" comment="libMagickCore1-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209125" comment="libMagickCore1-32bit-6.4.3.6-7.78.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000456</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-1000456" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000456" source="CVE"/>
    <description>
    freedesktop.org libpoppler 0.60.1 fails to validate boundaries in TextPool::addWord, leading to overflow in subsequent calculations.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-1000456.html">CVE-2017-1000456</cve>
<bugzilla href="https://bugzilla.suse.com/1074453">SUSE bug 1074453</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009223533" comment="libpoppler-glib4-0.12.3-1.13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009223534" comment="libpoppler-qt4-3-0.12.3-1.13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009223535" comment="libpoppler5-0.12.3-1.13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009223528" comment="poppler-0.12.3-1.13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009223529" comment="poppler-tools-0.12.3-1.13.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000469</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS</platform>
    </affected>
    <reference ref_id="CVE-2017-1000469" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000469" source="CVE"/>
    <description>
    Cobbler version up to 2.8.2 is vulnerable to a command injection vulnerability in the "add repo" component resulting in arbitrary code execution as root user.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-1000469.html">CVE-2017-1000469</cve>
<bugzilla href="https://bugzilla.suse.com/1074594">SUSE bug 1074594</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009229363" comment="cobbler-2.2.2-0.68.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229364" comment="koan-2.2.2-0.68.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000476</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-1000476" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000476" source="CVE"/>
    <description>
    ImageMagick 7.0.7-12 Q16, a CPU exhaustion vulnerability was found in the function ReadDDSInfo in coders/dds.c, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-1000476.html">CVE-2017-1000476</cve>
<bugzilla href="https://bugzilla.suse.com/1074610">SUSE bug 1074610</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202318" comment="ImageMagick-6.4.3.6-78.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209134" comment="libMagickCore1-6.4.3.6-78.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209135" comment="libMagickCore1-32bit-6.4.3.6-78.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10053</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10053" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: 2D). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10053.html">CVE-2017-10053</cve>
<bugzilla href="https://bugzilla.suse.com/1049305">SUSE bug 1049305</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009249923" comment="java-1_7_0-ibm-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249924" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249925" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249926" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.10-65.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10067</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10067" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067" source="CVE"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10067.html">CVE-2017-10067</cve>
<bugzilla href="https://bugzilla.suse.com/1049306">SUSE bug 1049306</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009249923" comment="java-1_7_0-ibm-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249924" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249925" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249926" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.10-65.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10074</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10074" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10074.html">CVE-2017-10074</cve>
<bugzilla href="https://bugzilla.suse.com/1049307">SUSE bug 1049307</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009249923" comment="java-1_7_0-ibm-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249924" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249925" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249926" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.10-65.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10081</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10081" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10081.html">CVE-2017-10081</cve>
<bugzilla href="https://bugzilla.suse.com/1049309">SUSE bug 1049309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009249923" comment="java-1_7_0-ibm-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249924" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249925" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249926" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.10-65.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10087</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10087" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10087.html">CVE-2017-10087</cve>
<bugzilla href="https://bugzilla.suse.com/1049311">SUSE bug 1049311</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009249923" comment="java-1_7_0-ibm-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249924" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249925" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249926" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.10-65.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10089</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10089" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089" source="CVE"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: ImageIO). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10089.html">CVE-2017-10089</cve>
<bugzilla href="https://bugzilla.suse.com/1049312">SUSE bug 1049312</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009249923" comment="java-1_7_0-ibm-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249924" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249925" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249926" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.10-65.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10090</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10090" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10090.html">CVE-2017-10090</cve>
<bugzilla href="https://bugzilla.suse.com/1049313">SUSE bug 1049313</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009249923" comment="java-1_7_0-ibm-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249924" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249925" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249926" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.10-65.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10096</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10096" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10096.html">CVE-2017-10096</cve>
<bugzilla href="https://bugzilla.suse.com/1049314">SUSE bug 1049314</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009249923" comment="java-1_7_0-ibm-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249924" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249925" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249926" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.10-65.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10101</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10101" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10101.html">CVE-2017-10101</cve>
<bugzilla href="https://bugzilla.suse.com/1049315">SUSE bug 1049315</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009249923" comment="java-1_7_0-ibm-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249924" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249925" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249926" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.10-65.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10102</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10102" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10102.html">CVE-2017-10102</cve>
<bugzilla href="https://bugzilla.suse.com/1049316">SUSE bug 1049316</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009249923" comment="java-1_7_0-ibm-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249924" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249925" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249926" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.10-65.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10105</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10105" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10105" source="CVE"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10105.html">CVE-2017-10105</cve>
<bugzilla href="https://bugzilla.suse.com/1049317">SUSE bug 1049317</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009249923" comment="java-1_7_0-ibm-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249924" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249925" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249926" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.10-65.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10107</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10107" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10107.html">CVE-2017-10107</cve>
<bugzilla href="https://bugzilla.suse.com/1049318">SUSE bug 1049318</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009249923" comment="java-1_7_0-ibm-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249924" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249925" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249926" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.10-65.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10108</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10108" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10108.html">CVE-2017-10108</cve>
<bugzilla href="https://bugzilla.suse.com/1049319">SUSE bug 1049319</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009249923" comment="java-1_7_0-ibm-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249924" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249925" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249926" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.10-65.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10109</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10109" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10109.html">CVE-2017-10109</cve>
<bugzilla href="https://bugzilla.suse.com/1049320">SUSE bug 1049320</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009249923" comment="java-1_7_0-ibm-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249924" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249925" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249926" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.10-65.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10110</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10110" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110" source="CVE"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10110.html">CVE-2017-10110</cve>
<bugzilla href="https://bugzilla.suse.com/1049321">SUSE bug 1049321</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009249923" comment="java-1_7_0-ibm-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249924" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249925" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249926" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.10-65.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10111</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10111" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). The supported version that is affected is Java SE: 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10111.html">CVE-2017-10111</cve>
<bugzilla href="https://bugzilla.suse.com/1049322">SUSE bug 1049322</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009249923" comment="java-1_7_0-ibm-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249924" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249925" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249926" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.10-65.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10115</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10115" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10115.html">CVE-2017-10115</cve>
<bugzilla href="https://bugzilla.suse.com/1049324">SUSE bug 1049324</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009249923" comment="java-1_7_0-ibm-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249924" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249925" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249926" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.10-65.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10116</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10116" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10116.html">CVE-2017-10116</cve>
<bugzilla href="https://bugzilla.suse.com/1049325">SUSE bug 1049325</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009249923" comment="java-1_7_0-ibm-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249924" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249925" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249926" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.10-65.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10125</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10125" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10125" source="CVE"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 7u141 and 8u131. Difficult to exploit vulnerability allows physical access to compromise Java SE. While the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: Applies to deployment of Java where the Java Auto Update is enabled. CVSS 3.0 Base Score 7.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10125.html">CVE-2017-10125</cve>
<bugzilla href="https://bugzilla.suse.com/1049327">SUSE bug 1049327</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009249923" comment="java-1_7_0-ibm-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249924" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249925" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249926" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.10-65.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10243</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10243" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAX-WS). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 6.5 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10243.html">CVE-2017-10243</cve>
<bugzilla href="https://bugzilla.suse.com/1049332">SUSE bug 1049332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009249923" comment="java-1_7_0-ibm-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249924" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249925" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.10-65.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249926" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.10-65.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10268</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10268" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.19 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.0 Base Score 4.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10268.html">CVE-2017-10268</cve>
<bugzilla href="https://bugzilla.suse.com/1064101">SUSE bug 1064101</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1064119">SUSE bug 1064119</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1076505">SUSE bug 1076505</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1076506">SUSE bug 1076506</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205675" comment="libmysql55client18-5.5.58-0.39.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208792" comment="libmysql55client18-32bit-5.5.58-0.39.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205676" comment="libmysql55client_r18-5.5.58-0.39.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203183" comment="mysql-5.5.58-0.39.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205677" comment="mysql-client-5.5.58-0.39.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205678" comment="mysql-tools-5.5.58-0.39.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10281</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10281" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10281.html">CVE-2017-10281</cve>
<bugzilla href="https://bugzilla.suse.com/1064072">SUSE bug 1064072</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205381" comment="java-1_6_0-ibm-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205382" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205383" comment="java-1_6_0-ibm-devel-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205384" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205385" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205386" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205407" comment="java-1_7_0-ibm-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205408" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205409" comment="java-1_7_0-ibm-devel-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205410" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205411" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.15-65.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205381" comment="java-1_6_0-ibm-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205384" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205385" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205386" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205407" comment="java-1_7_0-ibm-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205408" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205410" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205411" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.15-65.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10285</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10285" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10285.html">CVE-2017-10285</cve>
<bugzilla href="https://bugzilla.suse.com/1064073">SUSE bug 1064073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205381" comment="java-1_6_0-ibm-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205382" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205383" comment="java-1_6_0-ibm-devel-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205384" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205385" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205386" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205407" comment="java-1_7_0-ibm-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205408" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205409" comment="java-1_7_0-ibm-devel-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205410" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205411" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.15-65.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205381" comment="java-1_6_0-ibm-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205384" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205385" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205386" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205407" comment="java-1_7_0-ibm-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205408" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205410" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205411" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.15-65.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10293</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10293" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10293" source="CVE"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Javadoc). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10293.html">CVE-2017-10293</cve>
<bugzilla href="https://bugzilla.suse.com/1064074">SUSE bug 1064074</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205381" comment="java-1_6_0-ibm-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205382" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205383" comment="java-1_6_0-ibm-devel-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205384" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205385" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205386" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205407" comment="java-1_7_0-ibm-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205408" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205409" comment="java-1_7_0-ibm-devel-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205410" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205411" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.15-65.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205381" comment="java-1_6_0-ibm-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205384" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205385" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205386" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205407" comment="java-1_7_0-ibm-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205408" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205410" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205411" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.15-65.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10295</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10295" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.0 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10295.html">CVE-2017-10295</cve>
<bugzilla href="https://bugzilla.suse.com/1064075">SUSE bug 1064075</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205381" comment="java-1_6_0-ibm-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205382" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205383" comment="java-1_6_0-ibm-devel-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205384" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205385" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205386" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205407" comment="java-1_7_0-ibm-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205408" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205409" comment="java-1_7_0-ibm-devel-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205410" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205411" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.15-65.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205381" comment="java-1_6_0-ibm-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205384" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205385" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205386" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205407" comment="java-1_7_0-ibm-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205408" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205410" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205411" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.15-65.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10345</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10345" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10345.html">CVE-2017-10345</cve>
<bugzilla href="https://bugzilla.suse.com/1064077">SUSE bug 1064077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205381" comment="java-1_6_0-ibm-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205382" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205383" comment="java-1_6_0-ibm-devel-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205384" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205385" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205386" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205407" comment="java-1_7_0-ibm-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205408" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205409" comment="java-1_7_0-ibm-devel-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205410" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205411" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.15-65.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205381" comment="java-1_6_0-ibm-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205384" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205385" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205386" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205407" comment="java-1_7_0-ibm-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205408" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205410" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205411" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.15-65.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10346</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10346" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10346.html">CVE-2017-10346</cve>
<bugzilla href="https://bugzilla.suse.com/1064078">SUSE bug 1064078</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205381" comment="java-1_6_0-ibm-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205382" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205383" comment="java-1_6_0-ibm-devel-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205384" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205385" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205386" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205407" comment="java-1_7_0-ibm-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205408" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205409" comment="java-1_7_0-ibm-devel-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205410" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205411" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.15-65.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205381" comment="java-1_6_0-ibm-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205384" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205385" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205386" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205407" comment="java-1_7_0-ibm-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205408" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205410" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205411" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.15-65.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10347</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10347" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347" source="CVE"/>
    <description>
    Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10347.html">CVE-2017-10347</cve>
<bugzilla href="https://bugzilla.suse.com/1064079">SUSE bug 1064079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205381" comment="java-1_6_0-ibm-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205382" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205383" comment="java-1_6_0-ibm-devel-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205384" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205385" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205386" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205407" comment="java-1_7_0-ibm-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205408" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205409" comment="java-1_7_0-ibm-devel-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205410" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205411" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.15-65.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205381" comment="java-1_6_0-ibm-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205384" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205385" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205386" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205407" comment="java-1_7_0-ibm-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205408" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205410" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205411" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.15-65.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10348</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10348" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10348.html">CVE-2017-10348</cve>
<bugzilla href="https://bugzilla.suse.com/1064080">SUSE bug 1064080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205381" comment="java-1_6_0-ibm-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205382" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205383" comment="java-1_6_0-ibm-devel-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205384" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205385" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205386" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205407" comment="java-1_7_0-ibm-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205408" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205409" comment="java-1_7_0-ibm-devel-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205410" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205411" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.15-65.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205381" comment="java-1_6_0-ibm-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205384" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205385" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205386" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205407" comment="java-1_7_0-ibm-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205408" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205410" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205411" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.15-65.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10349</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10349" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10349.html">CVE-2017-10349</cve>
<bugzilla href="https://bugzilla.suse.com/1064081">SUSE bug 1064081</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205381" comment="java-1_6_0-ibm-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205382" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205383" comment="java-1_6_0-ibm-devel-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205384" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205385" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205386" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205407" comment="java-1_7_0-ibm-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205408" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205409" comment="java-1_7_0-ibm-devel-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205410" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205411" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.15-65.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205381" comment="java-1_6_0-ibm-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205384" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205385" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205386" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205407" comment="java-1_7_0-ibm-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205408" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205410" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205411" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.15-65.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10350</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10350" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JAX-WS). Supported versions that are affected are Java SE: 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10350.html">CVE-2017-10350</cve>
<bugzilla href="https://bugzilla.suse.com/1064082">SUSE bug 1064082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205381" comment="java-1_6_0-ibm-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205382" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205383" comment="java-1_6_0-ibm-devel-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205384" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205385" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205386" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205407" comment="java-1_7_0-ibm-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205408" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205409" comment="java-1_7_0-ibm-devel-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205410" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205411" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.15-65.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205381" comment="java-1_6_0-ibm-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205384" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205385" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205386" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205407" comment="java-1_7_0-ibm-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205408" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205410" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205411" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.15-65.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10355</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10355" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10355.html">CVE-2017-10355</cve>
<bugzilla href="https://bugzilla.suse.com/1064083">SUSE bug 1064083</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205381" comment="java-1_6_0-ibm-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205382" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205383" comment="java-1_6_0-ibm-devel-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205384" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205385" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205386" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205407" comment="java-1_7_0-ibm-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205408" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205409" comment="java-1_7_0-ibm-devel-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205410" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205411" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.15-65.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205381" comment="java-1_6_0-ibm-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205384" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205385" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205386" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205407" comment="java-1_7_0-ibm-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205408" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205410" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205411" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.15-65.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10356</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10356" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, Java SE Embedded, JRockit executes to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 6.2 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10356.html">CVE-2017-10356</cve>
<bugzilla href="https://bugzilla.suse.com/1064084">SUSE bug 1064084</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205381" comment="java-1_6_0-ibm-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205382" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205383" comment="java-1_6_0-ibm-devel-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205384" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205385" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205386" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205407" comment="java-1_7_0-ibm-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205408" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205409" comment="java-1_7_0-ibm-devel-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205410" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205411" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.15-65.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205381" comment="java-1_6_0-ibm-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205384" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205385" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205386" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205407" comment="java-1_7_0-ibm-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205408" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205410" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205411" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.15-65.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10357</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10357" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10357.html">CVE-2017-10357</cve>
<bugzilla href="https://bugzilla.suse.com/1064085">SUSE bug 1064085</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205381" comment="java-1_6_0-ibm-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205382" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205383" comment="java-1_6_0-ibm-devel-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205384" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205385" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205386" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205407" comment="java-1_7_0-ibm-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205408" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205409" comment="java-1_7_0-ibm-devel-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205410" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205411" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.15-65.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205381" comment="java-1_6_0-ibm-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205384" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205385" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205386" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205407" comment="java-1_7_0-ibm-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205408" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205410" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205411" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.15-65.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10378</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10378" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.11 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10378.html">CVE-2017-10378</cve>
<bugzilla href="https://bugzilla.suse.com/1064115">SUSE bug 1064115</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1064119">SUSE bug 1064119</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1076505">SUSE bug 1076505</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1076506">SUSE bug 1076506</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205675" comment="libmysql55client18-5.5.58-0.39.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208792" comment="libmysql55client18-32bit-5.5.58-0.39.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205676" comment="libmysql55client_r18-5.5.58-0.39.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203183" comment="mysql-5.5.58-0.39.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205677" comment="mysql-client-5.5.58-0.39.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205678" comment="mysql-tools-5.5.58-0.39.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10379</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10379" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.19 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10379.html">CVE-2017-10379</cve>
<bugzilla href="https://bugzilla.suse.com/1064116">SUSE bug 1064116</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1064119">SUSE bug 1064119</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1076506">SUSE bug 1076506</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205675" comment="libmysql55client18-5.5.58-0.39.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208792" comment="libmysql55client18-32bit-5.5.58-0.39.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205676" comment="libmysql55client_r18-5.5.58-0.39.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203183" comment="mysql-5.5.58-0.39.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205677" comment="mysql-client-5.5.58-0.39.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205678" comment="mysql-tools-5.5.58-0.39.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10384</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10384" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.57 and earlier 5.6.37 and earlier 5.7.19 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10384.html">CVE-2017-10384</cve>
<bugzilla href="https://bugzilla.suse.com/1064117">SUSE bug 1064117</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1064119">SUSE bug 1064119</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1076506">SUSE bug 1076506</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205675" comment="libmysql55client18-5.5.58-0.39.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208792" comment="libmysql55client18-32bit-5.5.58-0.39.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205676" comment="libmysql55client_r18-5.5.58-0.39.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203183" comment="mysql-5.5.58-0.39.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205677" comment="mysql-client-5.5.58-0.39.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205678" comment="mysql-tools-5.5.58-0.39.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10388</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10388" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: Applies to the Java SE Kerberos client. CVSS 3.0 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10388.html">CVE-2017-10388</cve>
<bugzilla href="https://bugzilla.suse.com/1064086">SUSE bug 1064086</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205381" comment="java-1_6_0-ibm-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205382" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205383" comment="java-1_6_0-ibm-devel-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205384" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205385" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205386" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205407" comment="java-1_7_0-ibm-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205408" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205409" comment="java-1_7_0-ibm-devel-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205410" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205411" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.15-65.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205381" comment="java-1_6_0-ibm-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205384" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205385" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205386" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.50-85.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205407" comment="java-1_7_0-ibm-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205408" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205410" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.15-65.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205411" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.15-65.8 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10661</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10661" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10661" source="CVE"/>
    <description>
    Race condition in fs/timerfd.c in the Linux kernel before 4.10.15 allows local users to gain privileges or cause a denial of service (list corruption or use-after-free) via simultaneous file-descriptor operations that leverage improper might_cancel queueing.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10661.html">CVE-2017-10661</cve>
<bugzilla href="https://bugzilla.suse.com/1053152">SUSE bug 1053152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1053153">SUSE bug 1053153</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208691" comment="kernel-bigsmp-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208692" comment="kernel-bigsmp-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208693" comment="kernel-bigsmp-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205592" comment="kernel-default-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205593" comment="kernel-default-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205594" comment="kernel-default-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208694" comment="kernel-default-man-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205595" comment="kernel-ec2-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205596" comment="kernel-ec2-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205597" comment="kernel-ec2-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205598" comment="kernel-pae-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205599" comment="kernel-pae-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205600" comment="kernel-pae-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205601" comment="kernel-source-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205602" comment="kernel-syms-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205603" comment="kernel-trace-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205604" comment="kernel-trace-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205605" comment="kernel-trace-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205606" comment="kernel-xen-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205607" comment="kernel-xen-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205608" comment="kernel-xen-devel-3.0.101-0.47.106.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10664</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10664" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10664" source="CVE"/>
    <description>
    qemu-nbd in QEMU (aka Quick Emulator) does not ignore SIGPIPE, which allows remote attackers to cause a denial of service (daemon crash) by disconnecting during a server-to-client reply attempt.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10664.html">CVE-2017-10664</cve>
<bugzilla href="https://bugzilla.suse.com/1046636">SUSE bug 1046636</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1046637">SUSE bug 1046637</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205626" comment="kvm-1.4.2-53.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205977" comment="xen-4.2.5_21-45.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209078" comment="xen-doc-html-4.2.5_21-45.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209079" comment="xen-doc-pdf-4.2.5_21-45.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205978" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.105-45.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205979" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.105-45.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205980" comment="xen-libs-4.2.5_21-45.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209080" comment="xen-libs-32bit-4.2.5_21-45.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209081" comment="xen-tools-4.2.5_21-45.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205981" comment="xen-tools-domU-4.2.5_21-45.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205626" comment="kvm-1.4.2-53.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250440" comment="xen-4.2.5_21-47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250441" comment="xen-doc-html-4.2.5_21-47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250442" comment="xen-doc-pdf-4.2.5_21-47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250443" comment="xen-kmp-default-4.2.5_21_3.0.101_0.125.TDC-47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250444" comment="xen-libs-4.2.5_21-47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250445" comment="xen-tools-4.2.5_21-47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250446" comment="xen-tools-domU-4.2.5_21-47.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10672</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10672" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10672" source="CVE"/>
    <description>
    Use-after-free in the XML-LibXML module through 2.0129 for Perl allows remote attackers to execute arbitrary code by controlling the arguments to a replaceChild call.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10672.html">CVE-2017-10672</cve>
<bugzilla href="https://bugzilla.suse.com/1046848">SUSE bug 1046848</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1069732">SUSE bug 1069732</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205698" comment="perl-XML-LibXML-1.66-3.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10684</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10684" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10684" source="CVE"/>
    <description>
    In ncurses 6.0, there is a stack-based buffer overflow in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10684.html">CVE-2017-10684</cve>
<bugzilla href="https://bugzilla.suse.com/1046858">SUSE bug 1046858</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1115932">SUSE bug 1115932</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210095" comment="libncurses5-5.6-93.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210096" comment="libncurses5-32bit-5.6-93.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210098" comment="libncurses6-5.6-93.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210099" comment="libncurses6-32bit-5.6-93.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203195" comment="ncurses-5.6-93.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203196" comment="ncurses-devel-5.6-93.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203197" comment="ncurses-devel-32bit-5.6-93.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210101" comment="ncurses-utils-5.6-93.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203198" comment="tack-5.6-93.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210102" comment="terminfo-5.6-93.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210103" comment="terminfo-base-5.6-93.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10685</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10685" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10685" source="CVE"/>
    <description>
    In ncurses 6.0, there is a format string vulnerability in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10685.html">CVE-2017-10685</cve>
<bugzilla href="https://bugzilla.suse.com/1046853">SUSE bug 1046853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1115932">SUSE bug 1115932</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210095" comment="libncurses5-5.6-93.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210096" comment="libncurses5-32bit-5.6-93.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210098" comment="libncurses6-5.6-93.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210099" comment="libncurses6-32bit-5.6-93.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203195" comment="ncurses-5.6-93.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203196" comment="ncurses-devel-5.6-93.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203197" comment="ncurses-devel-32bit-5.6-93.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210101" comment="ncurses-utils-5.6-93.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203198" comment="tack-5.6-93.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210102" comment="terminfo-5.6-93.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210103" comment="terminfo-base-5.6-93.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10788</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10788" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10788" source="CVE"/>
    <description>
    The DBD::mysql module through 4.043 for Perl allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact by triggering (1) certain error responses from a MySQL server or (2) a loss of a network connection to a MySQL server. The use-after-free defect was introduced by relying on incorrect Oracle mysql_stmt_close documentation and code examples.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10788.html">CVE-2017-10788</cve>
<bugzilla href="https://bugzilla.suse.com/1047095">SUSE bug 1047095</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203246" comment="perl-DBD-mysql-4.008-10.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10789</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10789" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10789" source="CVE"/>
    <description>
    The DBD::mysql module through 4.043 for Perl uses the mysql_ssl=1 setting to mean that SSL is optional (even though this setting's documentation has a "your communication with the server will be encrypted" statement), which allows man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, a related issue to CVE-2015-3152.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10789.html">CVE-2017-10789</cve>
<bugzilla href="https://bugzilla.suse.com/1047059">SUSE bug 1047059</bugzilla>
<bugzilla href="https://bugzilla.suse.com/924663">SUSE bug 924663</bugzilla>
<bugzilla href="https://bugzilla.suse.com/928962">SUSE bug 928962</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203246" comment="perl-DBD-mysql-4.008-10.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10790</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10790" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10790" source="CVE"/>
    <description>
    The _asn1_check_identifier function in GNU Libtasn1 through 4.12 causes a NULL pointer dereference and crash when reading crafted input that triggers assignment of a NULL value within an asn1_node structure. It may lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10790.html">CVE-2017-10790</cve>
<bugzilla href="https://bugzilla.suse.com/1047002">SUSE bug 1047002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1047453">SUSE bug 1047453</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009253936" comment="gnutls-2.4.1-24.39.76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253937" comment="libgnutls-extra26-2.4.1-24.39.76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253939" comment="libgnutls26-2.4.1-24.39.76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253940" comment="libgnutls26-32bit-2.4.1-24.39.76 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800" source="CVE"/>
    <description>
    When GraphicsMagick 1.3.25 processes a MATLAB image in coders/mat.c, it can lead to a denial of service (OOM) in ReadMATImage() if the size specified for a MAT Object is larger than the actual amount of data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10800.html">CVE-2017-10800</cve>
<bugzilla href="https://bugzilla.suse.com/1047044">SUSE bug 1047044</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202283" comment="ImageMagick-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209124" comment="libMagickCore1-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209125" comment="libMagickCore1-32bit-6.4.3.6-7.78.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10806" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10806" source="CVE"/>
    <description>
    Stack-based buffer overflow in hw/usb/redirect.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (QEMU process crash) via vectors related to logging debug messages.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10806.html">CVE-2017-10806</cve>
<bugzilla href="https://bugzilla.suse.com/1047674">SUSE bug 1047674</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1047675">SUSE bug 1047675</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205626" comment="kvm-1.4.2-53.11 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10928</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10928" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10928" source="CVE"/>
    <description>
    In ImageMagick 7.0.6-0, a heap-based buffer over-read in the GetNextToken function in token.c allows remote attackers to obtain sensitive information from process memory or possibly have unspecified other impact via a crafted SVG document that is mishandled in the GetUserSpaceCoordinateValue function in coders/svg.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10928.html">CVE-2017-10928</cve>
<bugzilla href="https://bugzilla.suse.com/1047356">SUSE bug 1047356</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1047359">SUSE bug 1047359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1056277">SUSE bug 1056277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1060176">SUSE bug 1060176</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1096261">SUSE bug 1096261</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202318" comment="ImageMagick-6.4.3.6-78.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209134" comment="libMagickCore1-6.4.3.6-78.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209135" comment="libMagickCore1-32bit-6.4.3.6-78.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10971</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10971" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10971" source="CVE"/>
    <description>
    In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10971.html">CVE-2017-10971</cve>
<bugzilla href="https://bugzilla.suse.com/1035283">SUSE bug 1035283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1047730">SUSE bug 1047730</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009206007" comment="xorg-x11-Xvnc-7.4-27.121 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203700" comment="xorg-x11-server-7.4-27.121 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206008" comment="xorg-x11-server-extra-7.4-27.121 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10972</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10972" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10972" source="CVE"/>
    <description>
    Uninitialized data in endianness conversion in the XEvent handling of the X.Org X Server before 2017-06-19 allowed authenticated malicious users to access potentially privileged data from the X server.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10972.html">CVE-2017-10972</cve>
<bugzilla href="https://bugzilla.suse.com/1035283">SUSE bug 1035283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1047730">SUSE bug 1047730</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009206007" comment="xorg-x11-Xvnc-7.4-27.121 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203700" comment="xorg-x11-server-7.4-27.121 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206008" comment="xorg-x11-server-extra-7.4-27.121 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10978</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10978" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10978" source="CVE"/>
    <description>
    An FR-GV-201 issue in FreeRADIUS 2.x before 2.2.10 and 3.x before 3.0.15 allows "Read / write overflow in make_secret()" and a denial of service.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10978.html">CVE-2017-10978</cve>
<bugzilla href="https://bugzilla.suse.com/1049086">SUSE bug 1049086</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202525" comment="freeradius-server-2.1.1-7.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209245" comment="freeradius-server-dialupadmin-2.1.1-7.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209246" comment="freeradius-server-doc-2.1.1-7.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202527" comment="freeradius-server-libs-2.1.1-7.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209247" comment="freeradius-server-utils-2.1.1-7.25.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10979</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10979" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10979" source="CVE"/>
    <description>
    An FR-GV-202 issue in FreeRADIUS 2.x before 2.2.10 allows "Write overflow in rad_coalesce()" - this allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10979.html">CVE-2017-10979</cve>
<bugzilla href="https://bugzilla.suse.com/1049086">SUSE bug 1049086</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202525" comment="freeradius-server-2.1.1-7.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209245" comment="freeradius-server-dialupadmin-2.1.1-7.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209246" comment="freeradius-server-doc-2.1.1-7.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202527" comment="freeradius-server-libs-2.1.1-7.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209247" comment="freeradius-server-utils-2.1.1-7.25.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10981</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10981" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10981" source="CVE"/>
    <description>
    An FR-GV-204 issue in FreeRADIUS 2.x before 2.2.10 allows "DHCP - Memory leak in fr_dhcp_decode()" and a denial of service.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10981.html">CVE-2017-10981</cve>
<bugzilla href="https://bugzilla.suse.com/1049086">SUSE bug 1049086</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202525" comment="freeradius-server-2.1.1-7.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209245" comment="freeradius-server-dialupadmin-2.1.1-7.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209246" comment="freeradius-server-doc-2.1.1-7.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202527" comment="freeradius-server-libs-2.1.1-7.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209247" comment="freeradius-server-utils-2.1.1-7.25.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10982</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10982" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10982" source="CVE"/>
    <description>
    An FR-GV-205 issue in FreeRADIUS 2.x before 2.2.10 allows "DHCP - Buffer over-read in fr_dhcp_decode_options()" and a denial of service.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10982.html">CVE-2017-10982</cve>
<bugzilla href="https://bugzilla.suse.com/1049086">SUSE bug 1049086</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202525" comment="freeradius-server-2.1.1-7.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209245" comment="freeradius-server-dialupadmin-2.1.1-7.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209246" comment="freeradius-server-doc-2.1.1-7.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202527" comment="freeradius-server-libs-2.1.1-7.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209247" comment="freeradius-server-utils-2.1.1-7.25.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10983</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10983" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10983" source="CVE"/>
    <description>
    An FR-GV-206 issue in FreeRADIUS 2.x before 2.2.10 and 3.x before 3.0.15 allows "DHCP - Read overflow when decoding option 63" and a denial of service.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10983.html">CVE-2017-10983</cve>
<bugzilla href="https://bugzilla.suse.com/1049086">SUSE bug 1049086</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202525" comment="freeradius-server-2.1.1-7.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209245" comment="freeradius-server-dialupadmin-2.1.1-7.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209246" comment="freeradius-server-doc-2.1.1-7.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202527" comment="freeradius-server-libs-2.1.1-7.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209247" comment="freeradius-server-utils-2.1.1-7.25.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10989</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10989" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10989" source="CVE"/>
    <description>
    The getNodeSize function in ext/rtree/rtree.c in SQLite through 3.19.3, as used in GDAL and other products, mishandles undersized RTree blobs in a crafted database, leading to a heap-based buffer over-read or possibly unspecified other impact.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10989.html">CVE-2017-10989</cve>
<bugzilla href="https://bugzilla.suse.com/1131919">SUSE bug 1131919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1132045">SUSE bug 1132045</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009252988" comment="libsqlite3-0-3.7.6.3-1.4.7.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009252989" comment="libsqlite3-0-32bit-3.7.6.3-1.4.7.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009252990" comment="sqlite3-3.7.6.3-1.4.7.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10995</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-10995" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10995" source="CVE"/>
    <description>
    The mng_get_long function in coders/png.c in ImageMagick 7.0.6-0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted MNG image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-10995.html">CVE-2017-10995</cve>
<bugzilla href="https://bugzilla.suse.com/1047908">SUSE bug 1047908</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202290" comment="ImageMagick-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209126" comment="libMagickCore1-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209127" comment="libMagickCore1-32bit-6.4.3.6-7.78.29 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11108</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11108" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11108" source="CVE"/>
    <description>
    tcpdump 4.9.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via crafted packet data. The crash occurs in the EXTRACT_16BITS function, called from the stp_print function for the Spanning Tree Protocol.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11108.html">CVE-2017-11108</cve>
<bugzilla href="https://bugzilla.suse.com/1047873">SUSE bug 1047873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123142">SUSE bug 1123142</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210823" comment="tcpdump-3.9.8-1.30.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11112</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11112" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11112" source="CVE"/>
    <description>
    In ncurses 6.0, there is an attempted 0xffffffffffffffff access in the append_acs function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11112.html">CVE-2017-11112</cve>
<bugzilla href="https://bugzilla.suse.com/1046853">SUSE bug 1046853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1047964">SUSE bug 1047964</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210095" comment="libncurses5-5.6-93.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210096" comment="libncurses5-32bit-5.6-93.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210098" comment="libncurses6-5.6-93.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210099" comment="libncurses6-32bit-5.6-93.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203195" comment="ncurses-5.6-93.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203196" comment="ncurses-devel-5.6-93.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203197" comment="ncurses-devel-32bit-5.6-93.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210101" comment="ncurses-utils-5.6-93.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203198" comment="tack-5.6-93.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210102" comment="terminfo-5.6-93.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210103" comment="terminfo-base-5.6-93.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11113</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11113" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11113" source="CVE"/>
    <description>
    In ncurses 6.0, there is a NULL Pointer Dereference in the _nc_parse_entry function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11113.html">CVE-2017-11113</cve>
<bugzilla href="https://bugzilla.suse.com/1046853">SUSE bug 1046853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1047965">SUSE bug 1047965</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210095" comment="libncurses5-5.6-93.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210096" comment="libncurses5-32bit-5.6-93.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210098" comment="libncurses6-5.6-93.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210099" comment="libncurses6-32bit-5.6-93.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203195" comment="ncurses-5.6-93.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203196" comment="ncurses-devel-5.6-93.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203197" comment="ncurses-devel-32bit-5.6-93.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210101" comment="ncurses-utils-5.6-93.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203198" comment="tack-5.6-93.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210102" comment="terminfo-5.6-93.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210103" comment="terminfo-base-5.6-93.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11141</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11141" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11141" source="CVE"/>
    <description>
    The ReadMATImage function in coders\mat.c in ImageMagick 7.0.5-6 has a memory leak vulnerability that can cause memory exhaustion via a crafted MAT file, related to incorrect ordering of a SetImageExtent call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11141.html">CVE-2017-11141</cve>
<bugzilla href="https://bugzilla.suse.com/1047898">SUSE bug 1047898</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202283" comment="ImageMagick-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209124" comment="libMagickCore1-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209125" comment="libMagickCore1-32bit-6.4.3.6-7.78.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11144</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11144" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11144" source="CVE"/>
    <description>
    In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, the openssl extension PEM sealing code did not check the return value of the OpenSSL sealing function, which could lead to a crash of the PHP interpreter, related to an interpretation conflict for a negative number in ext/openssl/openssl.c, and an OpenSSL documentation omission.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11144.html">CVE-2017-11144</cve>
<bugzilla href="https://bugzilla.suse.com/1048096">SUSE bug 1048096</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210532" comment="apache2-mod_php53-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203336" comment="php53-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210533" comment="php53-bcmath-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210534" comment="php53-bz2-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210535" comment="php53-calendar-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210536" comment="php53-ctype-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210537" comment="php53-curl-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210538" comment="php53-dba-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210539" comment="php53-dom-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210540" comment="php53-exif-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210541" comment="php53-fastcgi-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210542" comment="php53-fileinfo-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210543" comment="php53-ftp-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210544" comment="php53-gd-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210545" comment="php53-gettext-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210546" comment="php53-gmp-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210547" comment="php53-iconv-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210548" comment="php53-intl-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210549" comment="php53-json-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210550" comment="php53-ldap-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210551" comment="php53-mbstring-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210552" comment="php53-mcrypt-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210553" comment="php53-mysql-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210554" comment="php53-odbc-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210555" comment="php53-openssl-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210556" comment="php53-pcntl-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210557" comment="php53-pdo-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210558" comment="php53-pear-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210559" comment="php53-pgsql-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210560" comment="php53-pspell-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210561" comment="php53-shmop-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210562" comment="php53-snmp-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210563" comment="php53-soap-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210564" comment="php53-suhosin-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210565" comment="php53-sysvmsg-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210566" comment="php53-sysvsem-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210567" comment="php53-sysvshm-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210568" comment="php53-tokenizer-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210569" comment="php53-wddx-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210570" comment="php53-xmlreader-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210571" comment="php53-xmlrpc-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210572" comment="php53-xmlwriter-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210573" comment="php53-xsl-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210574" comment="php53-zip-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210575" comment="php53-zlib-5.3.17-112.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11145</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11145" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11145" source="CVE"/>
    <description>
    In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, an error in the date extension's timelib_meridian parsing code could be used by attackers able to supply date strings to leak information from the interpreter, related to ext/date/lib/parse_date.c out-of-bounds reads affecting the php_parse_date function. NOTE: the correct fix is in the e8b7698f5ee757ce2c8bd10a192a491a498f891c commit, not the bd77ac90d3bdf31ce2a5251ad92e9e75 gist.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11145.html">CVE-2017-11145</cve>
<bugzilla href="https://bugzilla.suse.com/1048111">SUSE bug 1048111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1048112">SUSE bug 1048112</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1067441">SUSE bug 1067441</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210532" comment="apache2-mod_php53-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203336" comment="php53-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210533" comment="php53-bcmath-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210534" comment="php53-bz2-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210535" comment="php53-calendar-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210536" comment="php53-ctype-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210537" comment="php53-curl-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210538" comment="php53-dba-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210539" comment="php53-dom-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210540" comment="php53-exif-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210541" comment="php53-fastcgi-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210542" comment="php53-fileinfo-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210543" comment="php53-ftp-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210544" comment="php53-gd-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210545" comment="php53-gettext-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210546" comment="php53-gmp-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210547" comment="php53-iconv-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210548" comment="php53-intl-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210549" comment="php53-json-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210550" comment="php53-ldap-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210551" comment="php53-mbstring-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210552" comment="php53-mcrypt-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210553" comment="php53-mysql-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210554" comment="php53-odbc-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210555" comment="php53-openssl-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210556" comment="php53-pcntl-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210557" comment="php53-pdo-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210558" comment="php53-pear-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210559" comment="php53-pgsql-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210560" comment="php53-pspell-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210561" comment="php53-shmop-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210562" comment="php53-snmp-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210563" comment="php53-soap-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210564" comment="php53-suhosin-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210565" comment="php53-sysvmsg-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210566" comment="php53-sysvsem-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210567" comment="php53-sysvshm-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210568" comment="php53-tokenizer-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210569" comment="php53-wddx-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210570" comment="php53-xmlreader-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210571" comment="php53-xmlrpc-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210572" comment="php53-xmlwriter-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210573" comment="php53-xsl-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210574" comment="php53-zip-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210575" comment="php53-zlib-5.3.17-112.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11146" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11146" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its CNA.  Further investigation showed that it was not an independently fixable security issue relative to CVE-2017-11145.  Notes: none.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11146.html">CVE-2017-11146</cve>
<bugzilla href="https://bugzilla.suse.com/1048111">SUSE bug 1048111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1048112">SUSE bug 1048112</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210532" comment="apache2-mod_php53-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203336" comment="php53-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210533" comment="php53-bcmath-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210534" comment="php53-bz2-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210535" comment="php53-calendar-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210536" comment="php53-ctype-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210537" comment="php53-curl-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210538" comment="php53-dba-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210539" comment="php53-dom-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210540" comment="php53-exif-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210541" comment="php53-fastcgi-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210542" comment="php53-fileinfo-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210543" comment="php53-ftp-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210544" comment="php53-gd-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210545" comment="php53-gettext-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210546" comment="php53-gmp-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210547" comment="php53-iconv-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210548" comment="php53-intl-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210549" comment="php53-json-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210550" comment="php53-ldap-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210551" comment="php53-mbstring-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210552" comment="php53-mcrypt-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210553" comment="php53-mysql-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210554" comment="php53-odbc-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210555" comment="php53-openssl-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210556" comment="php53-pcntl-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210557" comment="php53-pdo-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210558" comment="php53-pear-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210559" comment="php53-pgsql-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210560" comment="php53-pspell-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210561" comment="php53-shmop-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210562" comment="php53-snmp-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210563" comment="php53-soap-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210564" comment="php53-suhosin-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210565" comment="php53-sysvmsg-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210566" comment="php53-sysvsem-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210567" comment="php53-sysvshm-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210568" comment="php53-tokenizer-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210569" comment="php53-wddx-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210570" comment="php53-xmlreader-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210571" comment="php53-xmlrpc-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210572" comment="php53-xmlwriter-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210573" comment="php53-xsl-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210574" comment="php53-zip-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210575" comment="php53-zlib-5.3.17-112.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11147</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11147" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11147" source="CVE"/>
    <description>
    In PHP before 5.6.30 and 7.x before 7.0.15, the PHAR archive handler could be used by attackers supplying malicious archive files to crash the PHP interpreter or potentially disclose information due to a buffer over-read in the phar_parse_pharfile function in ext/phar/phar.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11147.html">CVE-2017-11147</cve>
<bugzilla href="https://bugzilla.suse.com/1048094">SUSE bug 1048094</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210532" comment="apache2-mod_php53-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203336" comment="php53-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210533" comment="php53-bcmath-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210534" comment="php53-bz2-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210535" comment="php53-calendar-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210536" comment="php53-ctype-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210537" comment="php53-curl-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210538" comment="php53-dba-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210539" comment="php53-dom-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210540" comment="php53-exif-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210541" comment="php53-fastcgi-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210542" comment="php53-fileinfo-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210543" comment="php53-ftp-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210544" comment="php53-gd-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210545" comment="php53-gettext-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210546" comment="php53-gmp-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210547" comment="php53-iconv-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210548" comment="php53-intl-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210549" comment="php53-json-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210550" comment="php53-ldap-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210551" comment="php53-mbstring-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210552" comment="php53-mcrypt-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210553" comment="php53-mysql-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210554" comment="php53-odbc-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210555" comment="php53-openssl-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210556" comment="php53-pcntl-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210557" comment="php53-pdo-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210558" comment="php53-pear-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210559" comment="php53-pgsql-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210560" comment="php53-pspell-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210561" comment="php53-shmop-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210562" comment="php53-snmp-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210563" comment="php53-soap-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210564" comment="php53-suhosin-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210565" comment="php53-sysvmsg-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210566" comment="php53-sysvsem-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210567" comment="php53-sysvshm-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210568" comment="php53-tokenizer-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210569" comment="php53-wddx-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210570" comment="php53-xmlreader-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210571" comment="php53-xmlrpc-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210572" comment="php53-xmlwriter-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210573" comment="php53-xsl-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210574" comment="php53-zip-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210575" comment="php53-zlib-5.3.17-112.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11166</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11166" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11166" source="CVE"/>
    <description>
    The ReadXWDImage function in coders\xwd.c in ImageMagick 7.0.5-6 has a memory leak vulnerability that can cause memory exhaustion via a crafted length (number of color-map entries) field in the header of an XWD file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11166.html">CVE-2017-11166</cve>
<bugzilla href="https://bugzilla.suse.com/1048110">SUSE bug 1048110</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202297" comment="ImageMagick-6.4.3.6-7.78.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209128" comment="libMagickCore1-6.4.3.6-7.78.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209129" comment="libMagickCore1-32bit-6.4.3.6-7.78.34 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11171</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11171" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11171" source="CVE"/>
    <description>
    Bad reference counting in the context of accept_ice_connection() in gsm-xsmp-server.c in old versions of gnome-session up until version 2.29.92 allows a local attacker to establish ICE connections to gnome-session with invalid authentication data (an invalid magic cookie). Each failed authentication attempt will leak a file descriptor in gnome-session. When the maximum number of file descriptors is exhausted in the gnome-session process, it will enter an infinite loop trying to communicate without success, consuming 100% of the CPU. The graphical session associated with the gnome-session process will stop working correctly, because communication with gnome-session is no longer possible.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11171.html">CVE-2017-11171</cve>
<bugzilla href="https://bugzilla.suse.com/1025068">SUSE bug 1025068</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1048274">SUSE bug 1048274</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209320" comment="gnome-session-2.28.0-3.11.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209321" comment="gnome-session-lang-2.28.0-3.11.12 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11176</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11176" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11176" source="CVE"/>
    <description>
    The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11176.html">CVE-2017-11176</cve>
<bugzilla href="https://bugzilla.suse.com/1048275">SUSE bug 1048275</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208691" comment="kernel-bigsmp-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208692" comment="kernel-bigsmp-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208693" comment="kernel-bigsmp-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205592" comment="kernel-default-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205593" comment="kernel-default-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205594" comment="kernel-default-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208694" comment="kernel-default-man-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205595" comment="kernel-ec2-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205596" comment="kernel-ec2-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205597" comment="kernel-ec2-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205598" comment="kernel-pae-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205599" comment="kernel-pae-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205600" comment="kernel-pae-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205601" comment="kernel-source-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205602" comment="kernel-syms-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205603" comment="kernel-trace-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205604" comment="kernel-trace-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205605" comment="kernel-trace-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205606" comment="kernel-xen-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205607" comment="kernel-xen-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205608" comment="kernel-xen-devel-3.0.101-0.47.106.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11185</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11185" source="CVE"/>
    <description>
    The gmp plugin in strongSwan before 5.6.0 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted RSA signature.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11185.html">CVE-2017-11185</cve>
<bugzilla href="https://bugzilla.suse.com/1051222">SUSE bug 1051222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1107874">SUSE bug 1107874</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210816" comment="strongswan-4.4.0-6.36.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210817" comment="strongswan-doc-4.4.0-6.36.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11188</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11188" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11188" source="CVE"/>
    <description>
    The ReadDPXImage function in coders\dpx.c in ImageMagick 7.0.6-0 has a large loop vulnerability that can cause CPU exhaustion via a crafted DPX file, related to lack of an EOF check.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11188.html">CVE-2017-11188</cve>
<bugzilla href="https://bugzilla.suse.com/1048457">SUSE bug 1048457</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202269" comment="ImageMagick-6.4.3.6-7.78.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209120" comment="libMagickCore1-6.4.3.6-7.78.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209121" comment="libMagickCore1-32bit-6.4.3.6-7.78.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711334" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11334</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11334" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11334" source="CVE"/>
    <description>
    The address_space_write_continue function in exec.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds access and guest instance crash) by leveraging use of qemu_map_ram_ptr to access guest ram block area.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11334.html">CVE-2017-11334</cve>
<bugzilla href="https://bugzilla.suse.com/1048902">SUSE bug 1048902</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1048920">SUSE bug 1048920</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205626" comment="kvm-1.4.2-53.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205997" comment="xen-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209094" comment="xen-doc-html-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209095" comment="xen-doc-pdf-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205998" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205999" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206000" comment="xen-libs-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209096" comment="xen-libs-32bit-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209097" comment="xen-tools-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206001" comment="xen-tools-domU-4.2.5_21-45.19 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205626" comment="kvm-1.4.2-53.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250440" comment="xen-4.2.5_21-47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250441" comment="xen-doc-html-4.2.5_21-47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250442" comment="xen-doc-pdf-4.2.5_21-47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250443" comment="xen-kmp-default-4.2.5_21_3.0.101_0.125.TDC-47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250444" comment="xen-libs-4.2.5_21-47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250445" comment="xen-tools-4.2.5_21-47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250446" comment="xen-tools-domU-4.2.5_21-47.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11335</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11335" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11335" source="CVE"/>
    <description>
    There is a heap based buffer overflow in tools/tiff2pdf.c of LibTIFF 4.0.8 via a PlanarConfig=Contig image, which causes a more than one hundred bytes out-of-bounds write (related to the ZIPDecode function in tif_zip.c). A crafted input may lead to a remote denial of service attack or an arbitrary code execution attack.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11335.html">CVE-2017-11335</cve>
<bugzilla href="https://bugzilla.suse.com/1048937">SUSE bug 1048937</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210828" comment="libtiff3-3.8.2-141.169.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210829" comment="libtiff3-32bit-3.8.2-141.169.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203576" comment="tiff-3.8.2-141.169.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11368</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11368" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11368" source="CVE"/>
    <description>
    In MIT Kerberos 5 (aka krb5) 1.7 and later, an authenticated attacker can cause a KDC assertion failure by sending invalid S4U2Self or S4U2Proxy requests.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11368.html">CVE-2017-11368</cve>
<bugzilla href="https://bugzilla.suse.com/1049819">SUSE bug 1049819</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009248585" comment="krb5-1.8.6-133.49.125.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248586" comment="krb5-32bit-1.8.6-133.49.125.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248587" comment="krb5-apps-clients-1.8.6-133.49.125.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248588" comment="krb5-apps-servers-1.8.6-133.49.125.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248589" comment="krb5-client-1.8.6-133.49.125.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248590" comment="krb5-devel-1.8.6-133.49.125.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248591" comment="krb5-devel-32bit-1.8.6-133.49.125.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248592" comment="krb5-doc-1.8.6-133.49.125.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248593" comment="krb5-plugin-kdb-ldap-1.8.6-133.49.125.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248594" comment="krb5-plugin-preauth-pkinit-1.8.6-133.49.125.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248595" comment="krb5-server-1.8.6-133.49.125.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11403</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11403" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403" source="CVE"/>
    <description>
    The ReadMNGImage function in coders/png.c in GraphicsMagick 1.3.26 has an out-of-order CloseBlob call, resulting in a use-after-free via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11403.html">CVE-2017-11403</cve>
<bugzilla href="https://bugzilla.suse.com/1049072">SUSE bug 1049072</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1053809">SUSE bug 1053809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1054600">SUSE bug 1054600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1057000">SUSE bug 1057000</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1084062">SUSE bug 1084062</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202255" comment="ImageMagick-6.4.3.6-7.78.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209116" comment="libMagickCore1-6.4.3.6-7.78.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209117" comment="libMagickCore1-32bit-6.4.3.6-7.78.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11406</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11406" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11406" source="CVE"/>
    <description>
    In Wireshark 2.2.0 to 2.2.7 and 2.0.0 to 2.0.13, the DOCSIS dissector could go into an infinite loop. This was addressed in plugins/docsis/packet-docsis.c by rejecting invalid Frame Control parameter values.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11406.html">CVE-2017-11406</cve>
<bugzilla href="https://bugzilla.suse.com/1049255">SUSE bug 1049255</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203592" comment="wireshark-2.0.14-40.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203594" comment="wireshark-gtk-2.0.14-40.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11407</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11407" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11407" source="CVE"/>
    <description>
    In Wireshark 2.2.0 to 2.2.7 and 2.0.0 to 2.0.13, the MQ dissector could crash. This was addressed in epan/dissectors/packet-mq.c by validating the fragment length before a reassembly attempt.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11407.html">CVE-2017-11407</cve>
<bugzilla href="https://bugzilla.suse.com/1049255">SUSE bug 1049255</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203592" comment="wireshark-2.0.14-40.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203594" comment="wireshark-gtk-2.0.14-40.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11408</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11408" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11408" source="CVE"/>
    <description>
    In Wireshark 2.2.0 to 2.2.7 and 2.0.0 to 2.0.13, the AMQP dissector could crash. This was addressed in epan/dissectors/packet-amqp.c by checking for successful list dissection.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11408.html">CVE-2017-11408</cve>
<bugzilla href="https://bugzilla.suse.com/1049255">SUSE bug 1049255</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203592" comment="wireshark-2.0.14-40.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203594" comment="wireshark-gtk-2.0.14-40.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11410</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11410" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11410" source="CVE"/>
    <description>
    In Wireshark through 2.0.13 and 2.2.x through 2.2.7, the WBXML dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wbxml.c by adding validation of the relationships between indexes and lengths. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-7702.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11410.html">CVE-2017-11410</cve>
<bugzilla href="https://bugzilla.suse.com/1033938">SUSE bug 1033938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049255">SUSE bug 1049255</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203592" comment="wireshark-2.0.14-40.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203594" comment="wireshark-gtk-2.0.14-40.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11411</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11411" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11411" source="CVE"/>
    <description>
    In Wireshark through 2.0.13 and 2.2.x through 2.2.7, the openSAFETY dissector could crash or exhaust system memory. This was addressed in epan/dissectors/packet-opensafety.c by adding length validation. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-9350.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11411.html">CVE-2017-11411</cve>
<bugzilla href="https://bugzilla.suse.com/1049255">SUSE bug 1049255</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049621">SUSE bug 1049621</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203592" comment="wireshark-2.0.14-40.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203594" comment="wireshark-gtk-2.0.14-40.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11423" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11423" source="CVE"/>
    <description>
    The cabd_read_string function in mspack/cabd.c in libmspack 0.5alpha, as used in ClamAV 0.99.2 and other products, allows remote attackers to cause a denial of service (stack-based buffer over-read and application crash) via a crafted CAB file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11423.html">CVE-2017-11423</cve>
<bugzilla href="https://bugzilla.suse.com/1049423">SUSE bug 1049423</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1083915">SUSE bug 1083915</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205314" comment="clamav-0.99.4-0.20.7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11434</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11434" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11434" source="CVE"/>
    <description>
    The dhcp_decode function in slirp/bootp.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) via a crafted DHCP options string.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11434.html">CVE-2017-11434</cve>
<bugzilla href="https://bugzilla.suse.com/1049381">SUSE bug 1049381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049578">SUSE bug 1049578</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205626" comment="kvm-1.4.2-53.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205977" comment="xen-4.2.5_21-45.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209078" comment="xen-doc-html-4.2.5_21-45.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209079" comment="xen-doc-pdf-4.2.5_21-45.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205978" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.105-45.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205979" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.105-45.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205980" comment="xen-libs-4.2.5_21-45.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209080" comment="xen-libs-32bit-4.2.5_21-45.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209081" comment="xen-tools-4.2.5_21-45.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205981" comment="xen-tools-domU-4.2.5_21-45.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205626" comment="kvm-1.4.2-53.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250440" comment="xen-4.2.5_21-47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250441" comment="xen-doc-html-4.2.5_21-47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250442" comment="xen-doc-pdf-4.2.5_21-47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250443" comment="xen-kmp-default-4.2.5_21_3.0.101_0.125.TDC-47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250444" comment="xen-libs-4.2.5_21-47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250445" comment="xen-tools-4.2.5_21-47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250446" comment="xen-tools-domU-4.2.5_21-47.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11448</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11448" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11448" source="CVE"/>
    <description>
    The ReadJPEGImage function in coders/jpeg.c in ImageMagick before 7.0.6-1 allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11448.html">CVE-2017-11448</cve>
<bugzilla href="https://bugzilla.suse.com/1049375">SUSE bug 1049375</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202297" comment="ImageMagick-6.4.3.6-7.78.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209128" comment="libMagickCore1-6.4.3.6-7.78.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209129" comment="libMagickCore1-32bit-6.4.3.6-7.78.34 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11449</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11449" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11449" source="CVE"/>
    <description>
    coders/mpc.c in ImageMagick before 7.0.6-1 does not enable seekable streams and thus cannot validate blob sizes, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an image received from stdin.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11449.html">CVE-2017-11449</cve>
<bugzilla href="https://bugzilla.suse.com/1049373">SUSE bug 1049373</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202283" comment="ImageMagick-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209124" comment="libMagickCore1-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209125" comment="libMagickCore1-32bit-6.4.3.6-7.78.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11450</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11450" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11450" source="CVE"/>
    <description>
    coders/jpeg.c in ImageMagick before 7.0.6-1 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via JPEG data that is too short.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11450.html">CVE-2017-11450</cve>
<bugzilla href="https://bugzilla.suse.com/1049374">SUSE bug 1049374</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202297" comment="ImageMagick-6.4.3.6-7.78.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209128" comment="libMagickCore1-6.4.3.6-7.78.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209129" comment="libMagickCore1-32bit-6.4.3.6-7.78.34 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11462</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11462" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462" source="CVE"/>
    <description>
    Double free vulnerability in MIT Kerberos 5 (aka krb5) allows attackers to have unspecified impact via vectors involving automatic deletion of security contexts on error.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11462.html">CVE-2017-11462</cve>
<bugzilla href="https://bugzilla.suse.com/1056995">SUSE bug 1056995</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1122468">SUSE bug 1122468</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009248596" comment="krb5-1.8.6-133.49.125.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248597" comment="krb5-32bit-1.8.6-133.49.125.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248598" comment="krb5-apps-clients-1.8.6-133.49.125.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248599" comment="krb5-apps-servers-1.8.6-133.49.125.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248600" comment="krb5-client-1.8.6-133.49.125.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248601" comment="krb5-devel-1.8.6-133.49.125.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248602" comment="krb5-devel-32bit-1.8.6-133.49.125.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248603" comment="krb5-doc-1.8.6-133.49.125.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248604" comment="krb5-plugin-kdb-ldap-1.8.6-133.49.125.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248605" comment="krb5-plugin-preauth-pkinit-1.8.6-133.49.125.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248606" comment="krb5-server-1.8.6-133.49.125.16 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11473</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11473" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11473" source="CVE"/>
    <description>
    Buffer overflow in the mp_override_legacy_irq() function in arch/x86/kernel/acpi/boot.c in the Linux kernel through 4.12.2 allows local users to gain privileges via a crafted ACPI table.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11473.html">CVE-2017-11473</cve>
<bugzilla href="https://bugzilla.suse.com/1049603">SUSE bug 1049603</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1061680">SUSE bug 1061680</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208691" comment="kernel-bigsmp-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208692" comment="kernel-bigsmp-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208693" comment="kernel-bigsmp-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205592" comment="kernel-default-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205593" comment="kernel-default-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205594" comment="kernel-default-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208694" comment="kernel-default-man-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205595" comment="kernel-ec2-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205596" comment="kernel-ec2-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205597" comment="kernel-ec2-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205598" comment="kernel-pae-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205599" comment="kernel-pae-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205600" comment="kernel-pae-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205601" comment="kernel-source-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205602" comment="kernel-syms-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205603" comment="kernel-trace-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205604" comment="kernel-trace-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205605" comment="kernel-trace-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205606" comment="kernel-xen-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205607" comment="kernel-xen-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205608" comment="kernel-xen-devel-3.0.101-0.47.106.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11478</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11478" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11478" source="CVE"/>
    <description>
    The ReadOneDJVUImage function in coders/djvu.c in ImageMagick through 6.9.9-0 and 7.x through 7.0.6-1 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a malformed DJVU image.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11478.html">CVE-2017-11478</cve>
<bugzilla href="https://bugzilla.suse.com/1049796">SUSE bug 1049796</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202269" comment="ImageMagick-6.4.3.6-7.78.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209120" comment="libMagickCore1-6.4.3.6-7.78.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209121" comment="libMagickCore1-32bit-6.4.3.6-7.78.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11505" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11505" source="CVE"/>
    <description>
    The ReadOneJNGImage function in coders/png.c in ImageMagick through 6.9.9-0 and 7.x through 7.0.6-1 allows remote attackers to cause a denial of service (large loop and CPU consumption) via a malformed JNG file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11505.html">CVE-2017-11505</cve>
<bugzilla href="https://bugzilla.suse.com/1050072">SUSE bug 1050072</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1050100">SUSE bug 1050100</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202290" comment="ImageMagick-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209126" comment="libMagickCore1-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209127" comment="libMagickCore1-32bit-6.4.3.6-7.78.29 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11524</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11524" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11524" source="CVE"/>
    <description>
    The WriteBlob function in MagickCore/blob.c in ImageMagick before 6.9.8-10 and 7.x before 7.6.0-0 allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11524.html">CVE-2017-11524</cve>
<bugzilla href="https://bugzilla.suse.com/1050087">SUSE bug 1050087</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202311" comment="ImageMagick-6.4.3.6-78.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209132" comment="libMagickCore1-6.4.3.6-78.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209133" comment="libMagickCore1-32bit-6.4.3.6-78.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11525</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11525" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11525" source="CVE"/>
    <description>
    The ReadCINImage function in coders/cin.c in ImageMagick before 6.9.9-0 and 7.x before 7.0.6-1 allows remote attackers to cause a denial of service (memory consumption) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11525.html">CVE-2017-11525</cve>
<bugzilla href="https://bugzilla.suse.com/1050098">SUSE bug 1050098</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202290" comment="ImageMagick-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209126" comment="libMagickCore1-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209127" comment="libMagickCore1-32bit-6.4.3.6-7.78.29 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11526</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11526" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11526" source="CVE"/>
    <description>
    The ReadOneMNGImage function in coders/png.c in ImageMagick before 6.9.9-0 and 7.x before 7.0.6-1 allows remote attackers to cause a denial of service (large loop and CPU consumption) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11526.html">CVE-2017-11526</cve>
<bugzilla href="https://bugzilla.suse.com/1050072">SUSE bug 1050072</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1050100">SUSE bug 1050100</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202290" comment="ImageMagick-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209126" comment="libMagickCore1-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209127" comment="libMagickCore1-32bit-6.4.3.6-7.78.29 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11527</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11527" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11527" source="CVE"/>
    <description>
    The ReadDPXImage function in coders/dpx.c in ImageMagick before 6.9.9-0 and 7.x before 7.0.6-1 allows remote attackers to cause a denial of service (memory consumption) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11527.html">CVE-2017-11527</cve>
<bugzilla href="https://bugzilla.suse.com/1050116">SUSE bug 1050116</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202269" comment="ImageMagick-6.4.3.6-7.78.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209120" comment="libMagickCore1-6.4.3.6-7.78.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209121" comment="libMagickCore1-32bit-6.4.3.6-7.78.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11528</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11528" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11528" source="CVE"/>
    <description>
    The ReadDIBImage function in coders/dib.c in ImageMagick before 6.9.9-0 and 7.x before 7.0.6-1 allows remote attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11528.html">CVE-2017-11528</cve>
<bugzilla href="https://bugzilla.suse.com/1050119">SUSE bug 1050119</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202304" comment="ImageMagick-6.4.3.6-7.78.37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209130" comment="libMagickCore1-6.4.3.6-7.78.37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209131" comment="libMagickCore1-32bit-6.4.3.6-7.78.37 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11529</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11529" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11529" source="CVE"/>
    <description>
    The ReadMATImage function in coders/mat.c in ImageMagick before 6.9.9-0 and 7.x before 7.0.6-1 allows remote attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11529.html">CVE-2017-11529</cve>
<bugzilla href="https://bugzilla.suse.com/1050120">SUSE bug 1050120</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202283" comment="ImageMagick-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209124" comment="libMagickCore1-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209125" comment="libMagickCore1-32bit-6.4.3.6-7.78.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11530</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11530" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11530" source="CVE"/>
    <description>
    The ReadEPTImage function in coders/ept.c in ImageMagick before 6.9.9-0 and 7.x before 7.0.6-1 allows remote attackers to cause a denial of service (memory consumption) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11530.html">CVE-2017-11530</cve>
<bugzilla href="https://bugzilla.suse.com/1050122">SUSE bug 1050122</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202304" comment="ImageMagick-6.4.3.6-7.78.37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209130" comment="libMagickCore1-6.4.3.6-7.78.37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209131" comment="libMagickCore1-32bit-6.4.3.6-7.78.37 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11532</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11532" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11532" source="CVE"/>
    <description>
    When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to a Memory Leak in the WriteMPCImage() function in coders/mpc.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11532.html">CVE-2017-11532</cve>
<bugzilla href="https://bugzilla.suse.com/1050129">SUSE bug 1050129</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1050623">SUSE bug 1050623</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239793" comment="ImageMagick-6.4.3.6-78.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009239803" comment="libMagickCore1-6.4.3.6-78.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009239804" comment="libMagickCore1-32bit-6.4.3.6-78.79 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11533</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11533" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11533" source="CVE"/>
    <description>
    When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to a heap-based buffer over-read in the WriteUILImage() function in coders/uil.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11533.html">CVE-2017-11533</cve>
<bugzilla href="https://bugzilla.suse.com/1050132">SUSE bug 1050132</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202304" comment="ImageMagick-6.4.3.6-7.78.37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209130" comment="libMagickCore1-6.4.3.6-7.78.37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209131" comment="libMagickCore1-32bit-6.4.3.6-7.78.37 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11534</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11534" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11534" source="CVE"/>
    <description>
    When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to a Memory Leak in the lite_font_map() function in coders/wmf.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11534.html">CVE-2017-11534</cve>
<bugzilla href="https://bugzilla.suse.com/1050135">SUSE bug 1050135</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202262" comment="ImageMagick-6.4.3.6-7.78.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209118" comment="libMagickCore1-6.4.3.6-7.78.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209119" comment="libMagickCore1-32bit-6.4.3.6-7.78.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11535</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11535" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11535" source="CVE"/>
    <description>
    When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to a heap-based buffer over-read in the WritePSImage() function in coders/ps.c.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11535.html">CVE-2017-11535</cve>
<bugzilla href="https://bugzilla.suse.com/1050139">SUSE bug 1050139</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202269" comment="ImageMagick-6.4.3.6-7.78.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209120" comment="libMagickCore1-6.4.3.6-7.78.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209121" comment="libMagickCore1-32bit-6.4.3.6-7.78.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11537</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11537" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11537" source="CVE"/>
    <description>
    When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to a Floating Point Exception (FPE) in the WritePALMImage() function in coders/palm.c, related to an incorrect bits-per-pixel calculation.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11537.html">CVE-2017-11537</cve>
<bugzilla href="https://bugzilla.suse.com/1050048">SUSE bug 1050048</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202297" comment="ImageMagick-6.4.3.6-7.78.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209128" comment="libMagickCore1-6.4.3.6-7.78.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209129" comment="libMagickCore1-32bit-6.4.3.6-7.78.34 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11539</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11539" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11539" source="CVE"/>
    <description>
    When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to a Memory Leak in the ReadOnePNGImage() function in coders/png.c.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11539.html">CVE-2017-11539</cve>
<bugzilla href="https://bugzilla.suse.com/1050037">SUSE bug 1050037</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202290" comment="ImageMagick-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209126" comment="libMagickCore1-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209127" comment="libMagickCore1-32bit-6.4.3.6-7.78.29 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11541</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11541" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11541" source="CVE"/>
    <description>
    tcpdump 4.9.0 has a heap-based buffer over-read in the lldp_print function in print-lldp.c, related to util-print.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11541.html">CVE-2017-11541</cve>
<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123142">SUSE bug 1123142</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210823" comment="tcpdump-3.9.8-1.30.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11542</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11542" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11542" source="CVE"/>
    <description>
    tcpdump 4.9.0 has a heap-based buffer over-read in the pimv1_print function in print-pim.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11542.html">CVE-2017-11542</cve>
<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123142">SUSE bug 1123142</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210823" comment="tcpdump-3.9.8-1.30.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11543</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11543" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11543" source="CVE"/>
    <description>
    tcpdump 4.9.0 has a buffer overflow in the sliplink_print function in print-sl.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11543.html">CVE-2017-11543</cve>
<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123142">SUSE bug 1123142</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210823" comment="tcpdump-3.9.8-1.30.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11600</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11600" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11600" source="CVE"/>
    <description>
    net/xfrm/xfrm_policy.c in the Linux kernel through 4.12.3, when CONFIG_XFRM_MIGRATE is enabled, does not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allows local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11600.html">CVE-2017-11600</cve>
<bugzilla href="https://bugzilla.suse.com/1050231">SUSE bug 1050231</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1096564">SUSE bug 1096564</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208652" comment="kernel-bigsmp-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208653" comment="kernel-bigsmp-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208654" comment="kernel-bigsmp-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205524" comment="kernel-default-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205525" comment="kernel-default-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205526" comment="kernel-default-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208655" comment="kernel-default-man-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205527" comment="kernel-ec2-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205528" comment="kernel-ec2-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205529" comment="kernel-ec2-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205530" comment="kernel-pae-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205531" comment="kernel-pae-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205532" comment="kernel-pae-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205533" comment="kernel-source-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205534" comment="kernel-syms-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205535" comment="kernel-trace-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205536" comment="kernel-trace-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205537" comment="kernel-trace-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205538" comment="kernel-xen-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205539" comment="kernel-xen-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205540" comment="kernel-xen-devel-3.0.101-0.47.106.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11613</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11613" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11613" source="CVE"/>
    <description>
    In LibTIFF 4.0.8, there is a denial of service vulnerability in the TIFFOpen function. A crafted input will lead to a denial of service attack. During the TIFFOpen process, td_imagelength is not checked. The value of td_imagelength can be directly controlled by an input file. In the ChopUpSingleUncompressedStrip function, the _TIFFCheckMalloc function is called based on td_imagelength. If we set the value of td_imagelength close to the amount of system memory, it will hang the system or trigger the OOM killer.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11613.html">CVE-2017-11613</cve>
<bugzilla href="https://bugzilla.suse.com/1082332">SUSE bug 1082332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1106853">SUSE bug 1106853</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009238088" comment="libtiff3-3.8.2-141.169.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238089" comment="libtiff3-32bit-3.8.2-141.169.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238087" comment="tiff-3.8.2-141.169.19 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11628</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11628" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11628" source="CVE"/>
    <description>
    In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, a stack-based buffer overflow in the zend_ini_do_op() function in Zend/zend_ini_parser.c could cause a denial of service or potentially allow executing code. NOTE: this is only relevant for PHP applications that accept untrusted input (instead of the system's php.ini file) for the parse_ini_string or parse_ini_file function, e.g., a web application for syntax validation of php.ini directives.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11628.html">CVE-2017-11628</cve>
<bugzilla href="https://bugzilla.suse.com/1050726">SUSE bug 1050726</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210532" comment="apache2-mod_php53-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203336" comment="php53-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210533" comment="php53-bcmath-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210534" comment="php53-bz2-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210535" comment="php53-calendar-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210536" comment="php53-ctype-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210537" comment="php53-curl-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210538" comment="php53-dba-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210539" comment="php53-dom-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210540" comment="php53-exif-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210541" comment="php53-fastcgi-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210542" comment="php53-fileinfo-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210543" comment="php53-ftp-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210544" comment="php53-gd-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210545" comment="php53-gettext-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210546" comment="php53-gmp-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210547" comment="php53-iconv-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210548" comment="php53-intl-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210549" comment="php53-json-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210550" comment="php53-ldap-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210551" comment="php53-mbstring-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210552" comment="php53-mcrypt-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210553" comment="php53-mysql-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210554" comment="php53-odbc-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210555" comment="php53-openssl-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210556" comment="php53-pcntl-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210557" comment="php53-pdo-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210558" comment="php53-pear-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210559" comment="php53-pgsql-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210560" comment="php53-pspell-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210561" comment="php53-shmop-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210562" comment="php53-snmp-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210563" comment="php53-soap-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210564" comment="php53-suhosin-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210565" comment="php53-sysvmsg-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210566" comment="php53-sysvsem-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210567" comment="php53-sysvshm-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210568" comment="php53-tokenizer-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210569" comment="php53-wddx-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210570" comment="php53-xmlreader-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210571" comment="php53-xmlrpc-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210572" comment="php53-xmlwriter-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210573" comment="php53-xsl-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210574" comment="php53-zip-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210575" comment="php53-zlib-5.3.17-112.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11637</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11637" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637" source="CVE"/>
    <description>
    GraphicsMagick 1.3.26 has a NULL pointer dereference in the WritePCLImage() function in coders/pcl.c during writes of monochrome images.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11637.html">CVE-2017-11637</cve>
<bugzilla href="https://bugzilla.suse.com/1050669">SUSE bug 1050669</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202297" comment="ImageMagick-6.4.3.6-7.78.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209128" comment="libMagickCore1-6.4.3.6-7.78.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209129" comment="libMagickCore1-32bit-6.4.3.6-7.78.34 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11638</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11638" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638" source="CVE"/>
    <description>
    GraphicsMagick 1.3.26 has a segmentation violation in the WriteMAPImage() function in coders/map.c when processing a non-colormapped image, a different vulnerability than CVE-2017-11642.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11638.html">CVE-2017-11638</cve>
<bugzilla href="https://bugzilla.suse.com/1050617">SUSE bug 1050617</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202297" comment="ImageMagick-6.4.3.6-7.78.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209128" comment="libMagickCore1-6.4.3.6-7.78.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209129" comment="libMagickCore1-32bit-6.4.3.6-7.78.34 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11639</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11639" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11639" source="CVE"/>
    <description>
    When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to a heap-based buffer over-read in the WriteCIPImage() function in coders/cip.c, related to the GetPixelLuma function in MagickCore/pixel-accessor.h.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11639.html">CVE-2017-11639</cve>
<bugzilla href="https://bugzilla.suse.com/1050635">SUSE bug 1050635</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239793" comment="ImageMagick-6.4.3.6-78.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009239803" comment="libMagickCore1-6.4.3.6-78.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009239804" comment="libMagickCore1-32bit-6.4.3.6-78.79 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11640</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11640" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11640" source="CVE"/>
    <description>
    When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to an address access exception in the WritePTIFImage() function in coders/tiff.c.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11640.html">CVE-2017-11640</cve>
<bugzilla href="https://bugzilla.suse.com/1050632">SUSE bug 1050632</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202269" comment="ImageMagick-6.4.3.6-7.78.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209120" comment="libMagickCore1-6.4.3.6-7.78.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209121" comment="libMagickCore1-32bit-6.4.3.6-7.78.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11642</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11642" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642" source="CVE"/>
    <description>
    GraphicsMagick 1.3.26 has a NULL pointer dereference in the WriteMAPImage() function in coders/map.c when processing a non-colormapped image, a different vulnerability than CVE-2017-11638.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11642.html">CVE-2017-11642</cve>
<bugzilla href="https://bugzilla.suse.com/1050617">SUSE bug 1050617</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202297" comment="ImageMagick-6.4.3.6-7.78.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209128" comment="libMagickCore1-6.4.3.6-7.78.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209129" comment="libMagickCore1-32bit-6.4.3.6-7.78.34 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11644</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11644" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11644" source="CVE"/>
    <description>
    When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to a Memory Leak in the ReadMATImage() function in coders/mat.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11644.html">CVE-2017-11644</cve>
<bugzilla href="https://bugzilla.suse.com/1050606">SUSE bug 1050606</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202283" comment="ImageMagick-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209124" comment="libMagickCore1-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209125" comment="libMagickCore1-32bit-6.4.3.6-7.78.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11671</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11671" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11671" source="CVE"/>
    <description>
    Under certain circumstances, the ix86_expand_builtin function in i386.c in GNU Compiler Collection (GCC) version 4.6, 4.7, 4.8, 4.9, 5 before 5.5, and 6 before 6.4 will generate instruction sequences that clobber the status flag of the RDRAND and RDSEED intrinsics before it can be read, potentially causing failures of these instructions to go unreported. This could potentially lead to less randomness in random number generation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11671.html">CVE-2017-11671</cve>
<bugzilla href="https://bugzilla.suse.com/1050947">SUSE bug 1050947</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202571" comment="cpp48-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202572" comment="gcc48-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202573" comment="gcc48-32bit-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202574" comment="gcc48-c++-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202575" comment="gcc48-fortran-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202576" comment="gcc48-fortran-32bit-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202577" comment="gcc48-info-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202578" comment="gcc48-locale-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202579" comment="libasan0-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202580" comment="libasan0-32bit-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247925" comment="libatomic1-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247926" comment="libatomic1-32bit-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247927" comment="libgcc_s1-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247928" comment="libgcc_s1-32bit-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247929" comment="libgfortran3-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247930" comment="libgfortran3-32bit-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247931" comment="libgomp1-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247932" comment="libgomp1-32bit-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247933" comment="libitm1-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247934" comment="libitm1-32bit-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247935" comment="libmpfr4-3.1.2-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247936" comment="libquadmath0-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247937" comment="libquadmath0-32bit-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202581" comment="libstdc++48-devel-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202582" comment="libstdc++48-devel-32bit-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247938" comment="libstdc++6-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247939" comment="libstdc++6-32bit-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247940" comment="libtsan0-4.8.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247941" comment="mpfr-3.1.2-3.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11714</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11714" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714" source="CVE"/>
    <description>
    psi/ztoken.c in Artifex Ghostscript 9.21 mishandles references to the scanner state structure, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted PostScript document, related to an out-of-bounds read in the igc_reloc_struct_ptr function in psi/igc.c.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11714.html">CVE-2017-11714</cve>
<bugzilla href="https://bugzilla.suse.com/1051184">SUSE bug 1051184</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209272" comment="ghostscript-fonts-other-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209273" comment="ghostscript-fonts-rus-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209274" comment="ghostscript-fonts-std-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202638" comment="ghostscript-library-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209275" comment="ghostscript-omni-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209276" comment="ghostscript-x11-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209277" comment="libgimpprint-4.2.7-32.47.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11724</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11724" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11724" source="CVE"/>
    <description>
    The ReadMATImage function in coders/mat.c in ImageMagick through 6.9.9-3 and 7.x through 7.0.6-3 has memory leaks involving the quantum_info and clone_info data structures.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11724.html">CVE-2017-11724</cve>
<bugzilla href="https://bugzilla.suse.com/1051446">SUSE bug 1051446</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202283" comment="ImageMagick-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209124" comment="libMagickCore1-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209125" comment="libMagickCore1-32bit-6.4.3.6-7.78.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11750</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11750" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11750" source="CVE"/>
    <description>
    The ReadOneJNGImage function in coders/png.c in ImageMagick 6.9.9-4 and 7.0.6-4 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11750.html">CVE-2017-11750</cve>
<bugzilla href="https://bugzilla.suse.com/1047910">SUSE bug 1047910</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1051442">SUSE bug 1051442</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202290" comment="ImageMagick-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209126" comment="libMagickCore1-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209127" comment="libMagickCore1-32bit-6.4.3.6-7.78.29 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11751</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11751" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11751" source="CVE"/>
    <description>
    The WritePICONImage function in coders/xpm.c in ImageMagick 7.0.6-4 allows remote attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11751.html">CVE-2017-11751</cve>
<bugzilla href="https://bugzilla.suse.com/1051412">SUSE bug 1051412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1051416">SUSE bug 1051416</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1051430">SUSE bug 1051430</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202283" comment="ImageMagick-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209124" comment="libMagickCore1-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209125" comment="libMagickCore1-32bit-6.4.3.6-7.78.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11752</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-11752" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11752" source="CVE"/>
    <description>
    The ReadMAGICKImage function in coders/magick.c in ImageMagick 7.0.6-4 allows remote attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-11752.html">CVE-2017-11752</cve>
<bugzilla href="https://bugzilla.suse.com/1051441">SUSE bug 1051441</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202269" comment="ImageMagick-6.4.3.6-7.78.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209120" comment="libMagickCore1-6.4.3.6-7.78.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209121" comment="libMagickCore1-32bit-6.4.3.6-7.78.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12132</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12132" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12132" source="CVE"/>
    <description>
    The DNS stub resolver in the GNU C Library (aka glibc or libc6) before version 2.26, when EDNS support is enabled, will solicit large UDP responses from name servers, potentially simplifying off-path DNS spoofing attacks due to IP fragmentation.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12132.html">CVE-2017-12132</cve>
<bugzilla href="https://bugzilla.suse.com/1051791">SUSE bug 1051791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1089314">SUSE bug 1089314</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202700" comment="glibc-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208522" comment="glibc-32bit-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205358" comment="glibc-devel-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208523" comment="glibc-devel-32bit-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202701" comment="glibc-html-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205359" comment="glibc-i18ndata-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202702" comment="glibc-info-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205360" comment="glibc-locale-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208524" comment="glibc-locale-32bit-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205361" comment="glibc-profile-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208525" comment="glibc-profile-32bit-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205362" comment="nscd-2.11.3-17.110.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12133</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12133" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12133" source="CVE"/>
    <description>
    Use-after-free vulnerability in the clntudp_call function in sunrpc/clnt_udp.c in the GNU C Library (aka glibc or libc6) before 2.26 allows remote attackers to have unspecified impact via vectors related to error path.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12133.html">CVE-2017-12133</cve>
<bugzilla href="https://bugzilla.suse.com/1081556">SUSE bug 1081556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1089314">SUSE bug 1089314</bugzilla>
<bugzilla href="https://bugzilla.suse.com/980854">SUSE bug 980854</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202703" comment="glibc-2.11.3-17.110.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209308" comment="glibc-32bit-2.11.3-17.110.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209309" comment="glibc-devel-2.11.3-17.110.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209310" comment="glibc-devel-32bit-2.11.3-17.110.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202704" comment="glibc-html-2.11.3-17.110.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209311" comment="glibc-i18ndata-2.11.3-17.110.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202705" comment="glibc-info-2.11.3-17.110.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209312" comment="glibc-locale-2.11.3-17.110.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209313" comment="glibc-locale-32bit-2.11.3-17.110.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209315" comment="glibc-profile-2.11.3-17.110.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209316" comment="glibc-profile-32bit-2.11.3-17.110.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209319" comment="nscd-2.11.3-17.110.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12135</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12135" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12135" source="CVE"/>
    <description>
    Xen allows local OS guest users to cause a denial of service (crash) or possibly obtain sensitive information or gain privileges via vectors involving transitive grants.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12135.html">CVE-2017-12135</cve>
<bugzilla href="https://bugzilla.suse.com/1051787">SUSE bug 1051787</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205977" comment="xen-4.2.5_21-45.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209078" comment="xen-doc-html-4.2.5_21-45.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209079" comment="xen-doc-pdf-4.2.5_21-45.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205978" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.105-45.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205979" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.105-45.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205980" comment="xen-libs-4.2.5_21-45.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209080" comment="xen-libs-32bit-4.2.5_21-45.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209081" comment="xen-tools-4.2.5_21-45.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205981" comment="xen-tools-domU-4.2.5_21-45.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250440" comment="xen-4.2.5_21-47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250441" comment="xen-doc-html-4.2.5_21-47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250442" comment="xen-doc-pdf-4.2.5_21-47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250443" comment="xen-kmp-default-4.2.5_21_3.0.101_0.125.TDC-47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250444" comment="xen-libs-4.2.5_21-47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250445" comment="xen-tools-4.2.5_21-47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250446" comment="xen-tools-domU-4.2.5_21-47.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12137</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12137" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12137" source="CVE"/>
    <description>
    arch/x86/mm.c in Xen allows local PV guest OS users to gain host OS privileges via vectors related to map_grant_ref.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12137.html">CVE-2017-12137</cve>
<bugzilla href="https://bugzilla.suse.com/1051788">SUSE bug 1051788</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205977" comment="xen-4.2.5_21-45.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209078" comment="xen-doc-html-4.2.5_21-45.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209079" comment="xen-doc-pdf-4.2.5_21-45.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205978" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.105-45.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205979" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.105-45.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205980" comment="xen-libs-4.2.5_21-45.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209080" comment="xen-libs-32bit-4.2.5_21-45.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209081" comment="xen-tools-4.2.5_21-45.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205981" comment="xen-tools-domU-4.2.5_21-45.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250440" comment="xen-4.2.5_21-47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250441" comment="xen-doc-html-4.2.5_21-47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250442" comment="xen-doc-pdf-4.2.5_21-47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250443" comment="xen-kmp-default-4.2.5_21_3.0.101_0.125.TDC-47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250444" comment="xen-libs-4.2.5_21-47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250445" comment="xen-tools-4.2.5_21-47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250446" comment="xen-tools-domU-4.2.5_21-47.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12140</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12140" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12140" source="CVE"/>
    <description>
    The ReadDCMImage function in coders\dcm.c in ImageMagick 7.0.6-1 has an integer signedness error leading to excessive memory consumption via a crafted DCM file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12140.html">CVE-2017-12140</cve>
<bugzilla href="https://bugzilla.suse.com/1051847">SUSE bug 1051847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1052764">SUSE bug 1052764</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202269" comment="ImageMagick-6.4.3.6-7.78.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209120" comment="libMagickCore1-6.4.3.6-7.78.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209121" comment="libMagickCore1-32bit-6.4.3.6-7.78.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12150</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12150" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12150" source="CVE"/>
    <description>
    It was found that samba before 4.4.16, 4.5.x before 4.5.14, and 4.6.x before 4.6.8 did not enforce "SMB signing" when certain configuration options were enabled. A remote attacker could launch a man-in-the-middle attack and retrieve information in plain-text.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12150.html">CVE-2017-12150</cve>
<bugzilla href="https://bugzilla.suse.com/1058622">SUSE bug 1058622</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205914" comment="ldapsmb-1.34b-94.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205915" comment="libldb1-3.6.3-94.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205916" comment="libsmbclient0-3.6.3-94.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209009" comment="libsmbclient0-32bit-3.6.3-94.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205917" comment="libtalloc2-3.6.3-94.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209010" comment="libtalloc2-32bit-3.6.3-94.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205918" comment="libtdb1-3.6.3-94.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209011" comment="libtdb1-32bit-3.6.3-94.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205919" comment="libtevent0-3.6.3-94.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209012" comment="libtevent0-32bit-3.6.3-94.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205920" comment="libwbclient0-3.6.3-94.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209013" comment="libwbclient0-32bit-3.6.3-94.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203515" comment="samba-3.6.3-94.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209014" comment="samba-32bit-3.6.3-94.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205921" comment="samba-client-3.6.3-94.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209015" comment="samba-client-32bit-3.6.3-94.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205922" comment="samba-doc-3.6.3-94.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205923" comment="samba-krb-printing-3.6.3-94.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205924" comment="samba-winbind-3.6.3-94.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209016" comment="samba-winbind-32bit-3.6.3-94.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12163</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12163" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12163" source="CVE"/>
    <description>
    An information leak flaw was found in the way SMB1 protocol was implemented by Samba before 4.4.16, 4.5.x before 4.5.14, and 4.6.x before 4.6.8. A malicious client could use this flaw to dump server memory contents to a file on the samba share or to a shared printer, though the exact area of server memory cannot be controlled by the attacker.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12163.html">CVE-2017-12163</cve>
<bugzilla href="https://bugzilla.suse.com/1058410">SUSE bug 1058410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1058624">SUSE bug 1058624</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205914" comment="ldapsmb-1.34b-94.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205915" comment="libldb1-3.6.3-94.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205916" comment="libsmbclient0-3.6.3-94.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209009" comment="libsmbclient0-32bit-3.6.3-94.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205917" comment="libtalloc2-3.6.3-94.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209010" comment="libtalloc2-32bit-3.6.3-94.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205918" comment="libtdb1-3.6.3-94.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209011" comment="libtdb1-32bit-3.6.3-94.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205919" comment="libtevent0-3.6.3-94.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209012" comment="libtevent0-32bit-3.6.3-94.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205920" comment="libwbclient0-3.6.3-94.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209013" comment="libwbclient0-32bit-3.6.3-94.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203515" comment="samba-3.6.3-94.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209014" comment="samba-32bit-3.6.3-94.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205921" comment="samba-client-3.6.3-94.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209015" comment="samba-client-32bit-3.6.3-94.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205922" comment="samba-doc-3.6.3-94.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205923" comment="samba-krb-printing-3.6.3-94.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205924" comment="samba-winbind-3.6.3-94.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209016" comment="samba-winbind-32bit-3.6.3-94.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12166</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12166" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12166" source="CVE"/>
    <description>
    OpenVPN versions before 2.3.3 and 2.4.x before 2.4.4 are vulnerable to a buffer overflow vulnerability when key-method 1 is used, possibly resulting in code execution.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12166.html">CVE-2017-12166</cve>
<bugzilla href="https://bugzilla.suse.com/1060877">SUSE bug 1060877</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205695" comment="openvpn-2.0.9-143.47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205696" comment="openvpn-auth-pam-plugin-2.0.9-143.47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203810" comment="openvpn-openssl1-2.3.2-0.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203811" comment="openvpn-openssl1-down-root-plugin-2.3.2-0.10.3 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205695" comment="openvpn-2.0.9-143.47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205696" comment="openvpn-auth-pam-plugin-2.0.9-143.47.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12172</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12172" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12172" source="CVE"/>
    <description>
    PostgreSQL 10.x before 10.1, 9.6.x before 9.6.6, 9.5.x before 9.5.10, 9.4.x before 9.4.15, 9.3.x before 9.3.20, and 9.2.x before 9.2.24 runs under a non-root operating system account, and database superusers have effective ability to run arbitrary code under that system account. PostgreSQL provides a script for starting the database server during system boot. Packages of PostgreSQL for many operating systems provide their own, packager-authored startup implementations. Several implementations use a log file name that the database superuser can replace with a symbolic link. As root, they open(), chmod() and/or chown() this log file name. This often suffices for the database superuser to escalate to root privileges when root starts the server.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12172.html">CVE-2017-12172</cve>
<bugzilla href="https://bugzilla.suse.com/1062538">SUSE bug 1062538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1062722">SUSE bug 1062722</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210642" comment="libecpg6-9.4.15-0.23.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210643" comment="libpq5-9.4.15-0.23.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210644" comment="libpq5-32bit-9.4.15-0.23.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210645" comment="postgresql94-9.4.15-0.23.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210646" comment="postgresql94-contrib-9.4.15-0.23.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210647" comment="postgresql94-docs-9.4.15-0.23.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203391" comment="postgresql94-libs-9.4.15-0.23.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210648" comment="postgresql94-server-9.4.15-0.23.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12176</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12176" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176" source="CVE"/>
    <description>
    xorg-x11-server before 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12176.html">CVE-2017-12176</cve>
<bugzilla href="https://bugzilla.suse.com/1063041">SUSE bug 1063041</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210993" comment="xorg-x11-Xvnc-7.4-27.122.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203702" comment="xorg-x11-server-7.4-27.122.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210994" comment="xorg-x11-server-extra-7.4-27.122.16 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12177</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12177" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177" source="CVE"/>
    <description>
    xorg-x11-server before 1.19.5 was vulnerable to integer overflow in ProcDbeGetVisualInfo function allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12177.html">CVE-2017-12177</cve>
<bugzilla href="https://bugzilla.suse.com/1063040">SUSE bug 1063040</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210993" comment="xorg-x11-Xvnc-7.4-27.122.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203702" comment="xorg-x11-server-7.4-27.122.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210994" comment="xorg-x11-server-extra-7.4-27.122.16 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12178</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12178" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178" source="CVE"/>
    <description>
    xorg-x11-server before 1.19.5 had wrong extra length check in ProcXIChangeHierarchy function allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12178.html">CVE-2017-12178</cve>
<bugzilla href="https://bugzilla.suse.com/1063039">SUSE bug 1063039</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210993" comment="xorg-x11-Xvnc-7.4-27.122.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203702" comment="xorg-x11-server-7.4-27.122.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210994" comment="xorg-x11-server-extra-7.4-27.122.16 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12179</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179" source="CVE"/>
    <description>
    xorg-x11-server before 1.19.5 was vulnerable to integer overflow in (S)ProcXIBarrierReleasePointer functions allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12179.html">CVE-2017-12179</cve>
<bugzilla href="https://bugzilla.suse.com/1063038">SUSE bug 1063038</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210993" comment="xorg-x11-Xvnc-7.4-27.122.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203702" comment="xorg-x11-server-7.4-27.122.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210994" comment="xorg-x11-server-extra-7.4-27.122.16 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12180</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180" source="CVE"/>
    <description>
    xorg-x11-server before 1.19.5 was missing length validation in XFree86 VidModeExtension allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12180.html">CVE-2017-12180</cve>
<bugzilla href="https://bugzilla.suse.com/1063037">SUSE bug 1063037</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210993" comment="xorg-x11-Xvnc-7.4-27.122.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203702" comment="xorg-x11-server-7.4-27.122.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210994" comment="xorg-x11-server-extra-7.4-27.122.16 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12181</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12181" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181" source="CVE"/>
    <description>
    xorg-x11-server before 1.19.5 was missing length validation in XFree86 DGA extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12181.html">CVE-2017-12181</cve>
<bugzilla href="https://bugzilla.suse.com/1063037">SUSE bug 1063037</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210993" comment="xorg-x11-Xvnc-7.4-27.122.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203702" comment="xorg-x11-server-7.4-27.122.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210994" comment="xorg-x11-server-extra-7.4-27.122.16 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182" source="CVE"/>
    <description>
    xorg-x11-server before 1.19.5 was missing length validation in XFree86 DRI extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12182.html">CVE-2017-12182</cve>
<bugzilla href="https://bugzilla.suse.com/1063037">SUSE bug 1063037</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210993" comment="xorg-x11-Xvnc-7.4-27.122.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203702" comment="xorg-x11-server-7.4-27.122.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210994" comment="xorg-x11-server-extra-7.4-27.122.16 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12183</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12183" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183" source="CVE"/>
    <description>
    xorg-x11-server before 1.19.5 was missing length validation in XFIXES extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12183.html">CVE-2017-12183</cve>
<bugzilla href="https://bugzilla.suse.com/1063035">SUSE bug 1063035</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210993" comment="xorg-x11-Xvnc-7.4-27.122.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203702" comment="xorg-x11-server-7.4-27.122.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210994" comment="xorg-x11-server-extra-7.4-27.122.16 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12184</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12184" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184" source="CVE"/>
    <description>
    xorg-x11-server before 1.19.5 was missing length validation in XINERAMA extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12184.html">CVE-2017-12184</cve>
<bugzilla href="https://bugzilla.suse.com/1063034">SUSE bug 1063034</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210993" comment="xorg-x11-Xvnc-7.4-27.122.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203702" comment="xorg-x11-server-7.4-27.122.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210994" comment="xorg-x11-server-extra-7.4-27.122.16 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12185</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185" source="CVE"/>
    <description>
    xorg-x11-server before 1.19.5 was missing length validation in MIT-SCREEN-SAVER extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12185.html">CVE-2017-12185</cve>
<bugzilla href="https://bugzilla.suse.com/1063034">SUSE bug 1063034</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210993" comment="xorg-x11-Xvnc-7.4-27.122.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203702" comment="xorg-x11-server-7.4-27.122.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210994" comment="xorg-x11-server-extra-7.4-27.122.16 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12186</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186" source="CVE"/>
    <description>
    xorg-x11-server before 1.19.5 was missing length validation in X-Resource extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12186.html">CVE-2017-12186</cve>
<bugzilla href="https://bugzilla.suse.com/1063034">SUSE bug 1063034</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210993" comment="xorg-x11-Xvnc-7.4-27.122.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203702" comment="xorg-x11-server-7.4-27.122.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210994" comment="xorg-x11-server-extra-7.4-27.122.16 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12187</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12187" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187" source="CVE"/>
    <description>
    xorg-x11-server before 1.19.5 was missing length validation in RENDER extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12187.html">CVE-2017-12187</cve>
<bugzilla href="https://bugzilla.suse.com/1063034">SUSE bug 1063034</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210993" comment="xorg-x11-Xvnc-7.4-27.122.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203702" comment="xorg-x11-server-7.4-27.122.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210994" comment="xorg-x11-server-extra-7.4-27.122.16 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12190</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12190" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12190" source="CVE"/>
    <description>
    The bio_map_user_iov and bio_unmap_user functions in block/bio.c in the Linux kernel before 4.13.8 do unbalanced refcounting when a SCSI I/O vector has small consecutive buffers belonging to the same page. The bio_add_pc_page function merges them into one, but the page reference is never dropped. This causes a memory leak and possible system lockup (exploitable against the host OS by a guest OS user, if a SCSI disk is passed through to a virtual machine) due to an out-of-memory condition.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12190.html">CVE-2017-12190</cve>
<bugzilla href="https://bugzilla.suse.com/1062568">SUSE bug 1062568</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208695" comment="kernel-bigsmp-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208696" comment="kernel-bigsmp-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208697" comment="kernel-bigsmp-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205609" comment="kernel-default-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205610" comment="kernel-default-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205611" comment="kernel-default-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208698" comment="kernel-default-man-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205612" comment="kernel-ec2-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205613" comment="kernel-ec2-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205614" comment="kernel-ec2-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205615" comment="kernel-pae-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205616" comment="kernel-pae-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205617" comment="kernel-pae-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205618" comment="kernel-source-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205619" comment="kernel-syms-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205620" comment="kernel-trace-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205621" comment="kernel-trace-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205622" comment="kernel-trace-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205623" comment="kernel-xen-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205624" comment="kernel-xen-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205625" comment="kernel-xen-devel-3.0.101-0.47.106.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12374</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12374" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12374" source="CVE"/>
    <description>
    The ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of input validation checking mechanisms during certain mail parsing operations (mbox.c operations on bounce messages). If successfully exploited, the ClamAV software could allow a variable pointing to the mail body which could cause a used after being free (use-after-free) instance which may lead to a disruption of services on an affected device to include a denial of service condition.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12374.html">CVE-2017-12374</cve>
<bugzilla href="https://bugzilla.suse.com/1077732">SUSE bug 1077732</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205313" comment="clamav-0.99.3-0.20.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12375</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12375" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12375" source="CVE"/>
    <description>
    The ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of input validation checking mechanisms during certain mail parsing functions (the rfc2047 function in mbox.c). An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted email to the affected device. This action could cause a buffer overflow condition when ClamAV scans the malicious email, allowing the attacker to potentially cause a DoS condition on an affected device.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12375.html">CVE-2017-12375</cve>
<bugzilla href="https://bugzilla.suse.com/1077732">SUSE bug 1077732</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205313" comment="clamav-0.99.3-0.20.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12376</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12376" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12376" source="CVE"/>
    <description>
    ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or potentially execute arbitrary code on an affected device. The vulnerability is due to improper input validation checking mechanisms when handling Portable Document Format (.pdf) files sent to an affected device. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted .pdf file to an affected device. This action could cause a handle_pdfname (in pdf.c) buffer overflow when ClamAV scans the malicious file, allowing the attacker to cause a DoS condition or potentially execute arbitrary code.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12376.html">CVE-2017-12376</cve>
<bugzilla href="https://bugzilla.suse.com/1077732">SUSE bug 1077732</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205313" comment="clamav-0.99.3-0.20.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12377</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12377" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12377" source="CVE"/>
    <description>
    ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or potentially execute arbitrary code on an affected device. The vulnerability is due to improper input validation checking mechanisms in mew packet files sent to an affected device. A successful exploit could cause a heap-based buffer over-read condition in mew.c when ClamAV scans the malicious file, allowing the attacker to cause a DoS condition or potentially execute arbitrary code on the affected device.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12377.html">CVE-2017-12377</cve>
<bugzilla href="https://bugzilla.suse.com/1077732">SUSE bug 1077732</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205313" comment="clamav-0.99.3-0.20.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12378</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12378" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12378" source="CVE"/>
    <description>
    ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation checking mechanisms of .tar (Tape Archive) files sent to an affected device. A successful exploit could cause a checksum buffer over-read condition when ClamAV scans the malicious .tar file, potentially allowing the attacker to cause a DoS condition on the affected device.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12378.html">CVE-2017-12378</cve>
<bugzilla href="https://bugzilla.suse.com/1077732">SUSE bug 1077732</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205313" comment="clamav-0.99.3-0.20.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12379</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12379" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12379" source="CVE"/>
    <description>
    ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or potentially execute arbitrary code on an affected device. The vulnerability is due to improper input validation checking mechanisms in the message parsing function on an affected system. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted email to the affected device. This action could cause a messageAddArgument (in message.c) buffer overflow condition when ClamAV scans the malicious email, allowing the attacker to potentially cause a DoS condition or execute arbitrary code on an affected device.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12379.html">CVE-2017-12379</cve>
<bugzilla href="https://bugzilla.suse.com/1077732">SUSE bug 1077732</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205313" comment="clamav-0.99.3-0.20.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12380</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12380" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12380" source="CVE"/>
    <description>
    ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation checking mechanisms in mbox.c during certain mail parsing functions of the ClamAV software. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted email to the affected device. An exploit could trigger a NULL pointer dereference condition when ClamAV scans the malicious email, which may result in a DoS condition.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12380.html">CVE-2017-12380</cve>
<bugzilla href="https://bugzilla.suse.com/1077732">SUSE bug 1077732</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205313" comment="clamav-0.99.3-0.20.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12418</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12418" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12418" source="CVE"/>
    <description>
    ImageMagick 7.0.6-5 has memory leaks in the parse8BIMW and format8BIM functions in coders/meta.c, related to the WriteImage function in MagickCore/constitute.c.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12418.html">CVE-2017-12418</cve>
<bugzilla href="https://bugzilla.suse.com/1052207">SUSE bug 1052207</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202297" comment="ImageMagick-6.4.3.6-7.78.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209128" comment="libMagickCore1-6.4.3.6-7.78.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209129" comment="libMagickCore1-32bit-6.4.3.6-7.78.34 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12427</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12427" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12427" source="CVE"/>
    <description>
    The ProcessMSLScript function in coders/msl.c in ImageMagick before 6.9.9-5 and 7.x before 7.0.6-5 allows remote attackers to cause a denial of service (memory leak) via a crafted file, related to the WriteMSLImage function.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12427.html">CVE-2017-12427</cve>
<bugzilla href="https://bugzilla.suse.com/1052248">SUSE bug 1052248</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202297" comment="ImageMagick-6.4.3.6-7.78.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209128" comment="libMagickCore1-6.4.3.6-7.78.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209129" comment="libMagickCore1-32bit-6.4.3.6-7.78.34 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12429</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12429" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12429" source="CVE"/>
    <description>
    In ImageMagick 7.0.6-1, a memory exhaustion vulnerability was found in the function ReadMIFFImage in coders/miff.c, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12429.html">CVE-2017-12429</cve>
<bugzilla href="https://bugzilla.suse.com/1052251">SUSE bug 1052251</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202297" comment="ImageMagick-6.4.3.6-7.78.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209128" comment="libMagickCore1-6.4.3.6-7.78.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209129" comment="libMagickCore1-32bit-6.4.3.6-7.78.34 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12430</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12430" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12430" source="CVE"/>
    <description>
    In ImageMagick 7.0.6-1, a memory exhaustion vulnerability was found in the function ReadMPCImage in coders/mpc.c, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12430.html">CVE-2017-12430</cve>
<bugzilla href="https://bugzilla.suse.com/1052251">SUSE bug 1052251</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1052252">SUSE bug 1052252</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202283" comment="ImageMagick-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209124" comment="libMagickCore1-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209125" comment="libMagickCore1-32bit-6.4.3.6-7.78.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12432</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12432" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12432" source="CVE"/>
    <description>
    In ImageMagick 7.0.6-1, a memory exhaustion vulnerability was found in the function ReadPCXImage in coders/pcx.c, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12432.html">CVE-2017-12432</cve>
<bugzilla href="https://bugzilla.suse.com/1052254">SUSE bug 1052254</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202297" comment="ImageMagick-6.4.3.6-7.78.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209128" comment="libMagickCore1-6.4.3.6-7.78.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209129" comment="libMagickCore1-32bit-6.4.3.6-7.78.34 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12434</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12434" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12434" source="CVE"/>
    <description>
    In ImageMagick 7.0.6-1, a missing NULL check vulnerability was found in the function ReadMATImage in coders/mat.c, which allows attackers to cause a denial of service (assertion failure) in DestroyImageInfo in image.c.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12434.html">CVE-2017-12434</cve>
<bugzilla href="https://bugzilla.suse.com/1052550">SUSE bug 1052550</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202283" comment="ImageMagick-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209124" comment="libMagickCore1-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209125" comment="libMagickCore1-32bit-6.4.3.6-7.78.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12435</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12435" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12435" source="CVE"/>
    <description>
    In ImageMagick 7.0.6-1, a memory exhaustion vulnerability was found in the function ReadSUNImage in coders/sun.c, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12435.html">CVE-2017-12435</cve>
<bugzilla href="https://bugzilla.suse.com/1052553">SUSE bug 1052553</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1057508">SUSE bug 1057508</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202269" comment="ImageMagick-6.4.3.6-7.78.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209120" comment="libMagickCore1-6.4.3.6-7.78.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209121" comment="libMagickCore1-32bit-6.4.3.6-7.78.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12563</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12563" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12563" source="CVE"/>
    <description>
    In ImageMagick 7.0.6-2, a memory exhaustion vulnerability was found in the function ReadPSDImage in coders/psd.c, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12563.html">CVE-2017-12563</cve>
<bugzilla href="https://bugzilla.suse.com/1052460">SUSE bug 1052460</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1072901">SUSE bug 1072901</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202276" comment="ImageMagick-6.4.3.6-7.78.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209122" comment="libMagickCore1-6.4.3.6-7.78.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209123" comment="libMagickCore1-32bit-6.4.3.6-7.78.17 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12564</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12564" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12564" source="CVE"/>
    <description>
    In ImageMagick 7.0.6-2, a memory leak vulnerability was found in the function ReadMATImage in coders/mat.c, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12564.html">CVE-2017-12564</cve>
<bugzilla href="https://bugzilla.suse.com/1052468">SUSE bug 1052468</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202283" comment="ImageMagick-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209124" comment="libMagickCore1-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209125" comment="libMagickCore1-32bit-6.4.3.6-7.78.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12565</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12565" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12565" source="CVE"/>
    <description>
    In ImageMagick 7.0.6-2, a memory leak vulnerability was found in the function ReadOneJNGImage in coders/png.c, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12565.html">CVE-2017-12565</cve>
<bugzilla href="https://bugzilla.suse.com/1047910">SUSE bug 1047910</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1052470">SUSE bug 1052470</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202290" comment="ImageMagick-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209126" comment="libMagickCore1-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209127" comment="libMagickCore1-32bit-6.4.3.6-7.78.29 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12566</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12566" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12566" source="CVE"/>
    <description>
    In ImageMagick 7.0.6-2, a memory leak vulnerability was found in the function ReadMVGImage in coders/mvg.c, which allows attackers to cause a denial of service, related to the function ReadSVGImage in svg.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12566.html">CVE-2017-12566</cve>
<bugzilla href="https://bugzilla.suse.com/1052472">SUSE bug 1052472</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202297" comment="ImageMagick-6.4.3.6-7.78.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209128" comment="libMagickCore1-6.4.3.6-7.78.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209129" comment="libMagickCore1-32bit-6.4.3.6-7.78.34 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12587</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12587" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12587" source="CVE"/>
    <description>
    ImageMagick 7.0.6-1 has a large loop vulnerability in the ReadPWPImage function in coders\pwp.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12587.html">CVE-2017-12587</cve>
<bugzilla href="https://bugzilla.suse.com/1052450">SUSE bug 1052450</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202269" comment="ImageMagick-6.4.3.6-7.78.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209120" comment="libMagickCore1-6.4.3.6-7.78.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209121" comment="libMagickCore1-32bit-6.4.3.6-7.78.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12596</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12596" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12596" source="CVE"/>
    <description>
    In OpenEXR 2.2.0, a crafted image causes a heap-based buffer over-read in the hufDecode function in IlmImf/ImfHuf.cpp during exrmaketiled execution; it may result in denial of service or possibly unspecified other impact.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12596.html">CVE-2017-12596</cve>
<bugzilla href="https://bugzilla.suse.com/1052522">SUSE bug 1052522</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202381" comment="OpenEXR-1.6.1-83.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202382" comment="OpenEXR-32bit-1.6.1-83.17.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12613</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12613" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12613" source="CVE"/>
    <description>
    When apr_time_exp*() or apr_os_exp_time*() functions are invoked with an invalid month field value in Apache Portable Runtime APR 1.6.2 and prior, out of bounds memory may be accessed in converting this value to an apr_time_exp_t value, potentially revealing the contents of a different static heap value or resulting in program termination, and may represent an information disclosure or denial of service vulnerability to applications which call these APR functions with unvalidated external input.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12613.html">CVE-2017-12613</cve>
<bugzilla href="https://bugzilla.suse.com/1064982">SUSE bug 1064982</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202815" comment="libapr1-1.3.3-11.18.19.13 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12618</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12618" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12618" source="CVE"/>
    <description>
    Apache Portable Runtime Utility (APR-util) 1.6.0 and prior fail to validate the integrity of SDBM database files used by apr_sdbm*() functions, resulting in a possible out of bound read access. A local user with write access to the database can make a program or process using these functions crash, and cause a denial of service.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12618.html">CVE-2017-12618</cve>
<bugzilla href="https://bugzilla.suse.com/1064990">SUSE bug 1064990</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202812" comment="libapr-util1-1.3.4-12.22.23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209892" comment="libapr-util1-dbd-sqlite3-1.3.4-12.22.23.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12640</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12640" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12640" source="CVE"/>
    <description>
    ImageMagick 7.0.6-1 has an out-of-bounds read vulnerability in ReadOneMNGImage in coders/png.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12640.html">CVE-2017-12640</cve>
<bugzilla href="https://bugzilla.suse.com/1052781">SUSE bug 1052781</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202290" comment="ImageMagick-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209126" comment="libMagickCore1-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209127" comment="libMagickCore1-32bit-6.4.3.6-7.78.29 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12641</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12641" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12641" source="CVE"/>
    <description>
    ImageMagick 7.0.6-1 has a memory leak vulnerability in ReadOneJNGImage in coders\png.c.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12641.html">CVE-2017-12641</cve>
<bugzilla href="https://bugzilla.suse.com/1052777">SUSE bug 1052777</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202290" comment="ImageMagick-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209126" comment="libMagickCore1-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209127" comment="libMagickCore1-32bit-6.4.3.6-7.78.29 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12642</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12642" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12642" source="CVE"/>
    <description>
    ImageMagick 7.0.6-1 has a memory leak vulnerability in ReadMPCImage in coders\mpc.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12642.html">CVE-2017-12642</cve>
<bugzilla href="https://bugzilla.suse.com/1052771">SUSE bug 1052771</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202283" comment="ImageMagick-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209124" comment="libMagickCore1-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209125" comment="libMagickCore1-32bit-6.4.3.6-7.78.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12643</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12643" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12643" source="CVE"/>
    <description>
    ImageMagick 7.0.6-1 has a memory exhaustion vulnerability in ReadOneJNGImage in coders\png.c.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12643.html">CVE-2017-12643</cve>
<bugzilla href="https://bugzilla.suse.com/1052768">SUSE bug 1052768</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202290" comment="ImageMagick-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209126" comment="libMagickCore1-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209127" comment="libMagickCore1-32bit-6.4.3.6-7.78.29 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12644</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12644" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12644" source="CVE"/>
    <description>
    ImageMagick 7.0.6-1 has a memory leak vulnerability in ReadDCMImage in coders\dcm.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12644.html">CVE-2017-12644</cve>
<bugzilla href="https://bugzilla.suse.com/1051847">SUSE bug 1051847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1052764">SUSE bug 1052764</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202269" comment="ImageMagick-6.4.3.6-7.78.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209120" comment="libMagickCore1-6.4.3.6-7.78.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209121" comment="libMagickCore1-32bit-6.4.3.6-7.78.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12654</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12654" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12654" source="CVE"/>
    <description>
    The ReadPICTImage function in coders/pict.c in ImageMagick 7.0.6-3 allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12654.html">CVE-2017-12654</cve>
<bugzilla href="https://bugzilla.suse.com/1052761">SUSE bug 1052761</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1074119">SUSE bug 1074119</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202297" comment="ImageMagick-6.4.3.6-7.78.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209128" comment="libMagickCore1-6.4.3.6-7.78.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209129" comment="libMagickCore1-32bit-6.4.3.6-7.78.34 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12662</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12662" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12662" source="CVE"/>
    <description>
    ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePDFImage in coders/pdf.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12662.html">CVE-2017-12662</cve>
<bugzilla href="https://bugzilla.suse.com/1052758">SUSE bug 1052758</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202269" comment="ImageMagick-6.4.3.6-7.78.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209120" comment="libMagickCore1-6.4.3.6-7.78.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209121" comment="libMagickCore1-32bit-6.4.3.6-7.78.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12663</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12663" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12663" source="CVE"/>
    <description>
    ImageMagick 7.0.6-2 has a memory leak vulnerability in WriteMAPImage in coders/map.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12663.html">CVE-2017-12663</cve>
<bugzilla href="https://bugzilla.suse.com/1052754">SUSE bug 1052754</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202304" comment="ImageMagick-6.4.3.6-7.78.37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209130" comment="libMagickCore1-6.4.3.6-7.78.37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209131" comment="libMagickCore1-32bit-6.4.3.6-7.78.37 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12664</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12664" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12664" source="CVE"/>
    <description>
    ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePALMImage in coders/palm.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12664.html">CVE-2017-12664</cve>
<bugzilla href="https://bugzilla.suse.com/1052750">SUSE bug 1052750</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202297" comment="ImageMagick-6.4.3.6-7.78.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209128" comment="libMagickCore1-6.4.3.6-7.78.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209129" comment="libMagickCore1-32bit-6.4.3.6-7.78.34 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12665</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12665" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12665" source="CVE"/>
    <description>
    ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePICTImage in coders/pict.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12665.html">CVE-2017-12665</cve>
<bugzilla href="https://bugzilla.suse.com/1052747">SUSE bug 1052747</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202297" comment="ImageMagick-6.4.3.6-7.78.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209128" comment="libMagickCore1-6.4.3.6-7.78.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209129" comment="libMagickCore1-32bit-6.4.3.6-7.78.34 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12667</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12667" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12667" source="CVE"/>
    <description>
    ImageMagick 7.0.6-1 has a memory leak vulnerability in ReadMATImage in coders\mat.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12667.html">CVE-2017-12667</cve>
<bugzilla href="https://bugzilla.suse.com/1052732">SUSE bug 1052732</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202283" comment="ImageMagick-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209124" comment="libMagickCore1-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209125" comment="libMagickCore1-32bit-6.4.3.6-7.78.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12668</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12668" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12668" source="CVE"/>
    <description>
    ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePCXImage in coders/pcx.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12668.html">CVE-2017-12668</cve>
<bugzilla href="https://bugzilla.suse.com/1052688">SUSE bug 1052688</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202297" comment="ImageMagick-6.4.3.6-7.78.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209128" comment="libMagickCore1-6.4.3.6-7.78.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209129" comment="libMagickCore1-32bit-6.4.3.6-7.78.34 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12669</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12669" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12669" source="CVE"/>
    <description>
    ImageMagick 7.0.6-2 has a memory leak vulnerability in WriteCALSImage in coders/cals.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12669.html">CVE-2017-12669</cve>
<bugzilla href="https://bugzilla.suse.com/1052689">SUSE bug 1052689</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202269" comment="ImageMagick-6.4.3.6-7.78.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209120" comment="libMagickCore1-6.4.3.6-7.78.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209121" comment="libMagickCore1-32bit-6.4.3.6-7.78.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12670</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12670" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12670" source="CVE"/>
    <description>
    In ImageMagick 7.0.6-3, missing validation was found in coders/mat.c, leading to an assertion failure in the function DestroyImage in MagickCore/image.c, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12670.html">CVE-2017-12670</cve>
<bugzilla href="https://bugzilla.suse.com/1052731">SUSE bug 1052731</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202283" comment="ImageMagick-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209124" comment="libMagickCore1-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209125" comment="libMagickCore1-32bit-6.4.3.6-7.78.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12671</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12671" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12671" source="CVE"/>
    <description>
    In ImageMagick 7.0.6-3, a missing NULL assignment was found in coders/png.c, leading to an invalid free in the function RelinquishMagickMemory in MagickCore/memory.c, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12671.html">CVE-2017-12671</cve>
<bugzilla href="https://bugzilla.suse.com/1052721">SUSE bug 1052721</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202290" comment="ImageMagick-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209126" comment="libMagickCore1-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209127" comment="libMagickCore1-32bit-6.4.3.6-7.78.29 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12672</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12672" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12672" source="CVE"/>
    <description>
    In ImageMagick 7.0.6-3, a memory leak vulnerability was found in the function ReadMATImage in coders/mat.c, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12672.html">CVE-2017-12672</cve>
<bugzilla href="https://bugzilla.suse.com/1052720">SUSE bug 1052720</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1055434">SUSE bug 1055434</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202283" comment="ImageMagick-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209124" comment="libMagickCore1-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209125" comment="libMagickCore1-32bit-6.4.3.6-7.78.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12673</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12673" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12673" source="CVE"/>
    <description>
    In ImageMagick 7.0.6-3, a memory leak vulnerability was found in the function ReadOneMNGImage in coders/png.c, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12673.html">CVE-2017-12673</cve>
<bugzilla href="https://bugzilla.suse.com/1052717">SUSE bug 1052717</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202290" comment="ImageMagick-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209126" comment="libMagickCore1-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209127" comment="libMagickCore1-32bit-6.4.3.6-7.78.29 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12674</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12674" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12674" source="CVE"/>
    <description>
    In ImageMagick 7.0.6-2, a CPU exhaustion vulnerability was found in the function ReadPDBImage in coders/pdb.c, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12674.html">CVE-2017-12674</cve>
<bugzilla href="https://bugzilla.suse.com/1052711">SUSE bug 1052711</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202297" comment="ImageMagick-6.4.3.6-7.78.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209128" comment="libMagickCore1-6.4.3.6-7.78.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209129" comment="libMagickCore1-32bit-6.4.3.6-7.78.34 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12675</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12675" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12675" source="CVE"/>
    <description>
    In ImageMagick 7.0.6-3, a missing check for multidimensional data was found in coders/mat.c, leading to a memory leak in the function ReadImage in MagickCore/constitute.c, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12675.html">CVE-2017-12675</cve>
<bugzilla href="https://bugzilla.suse.com/1052710">SUSE bug 1052710</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202283" comment="ImageMagick-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209124" comment="libMagickCore1-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209125" comment="libMagickCore1-32bit-6.4.3.6-7.78.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12676</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12676" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12676" source="CVE"/>
    <description>
    In ImageMagick 7.0.6-3, a memory leak vulnerability was found in the function ReadOneJNGImage in coders/png.c, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12676.html">CVE-2017-12676</cve>
<bugzilla href="https://bugzilla.suse.com/1052708">SUSE bug 1052708</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202290" comment="ImageMagick-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209126" comment="libMagickCore1-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209127" comment="libMagickCore1-32bit-6.4.3.6-7.78.29 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12691</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12691" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12691" source="CVE"/>
    <description>
    The ReadOneLayer function in coders/xcf.c in ImageMagick 7.0.6-6 allows remote attackers to cause a denial of service (memory consumption) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12691.html">CVE-2017-12691</cve>
<bugzilla href="https://bugzilla.suse.com/1053955">SUSE bug 1053955</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1058422">SUSE bug 1058422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1082363">SUSE bug 1082363</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202311" comment="ImageMagick-6.4.3.6-78.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209132" comment="libMagickCore1-6.4.3.6-78.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209133" comment="libMagickCore1-32bit-6.4.3.6-78.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12692</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12692" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12692" source="CVE"/>
    <description>
    The ReadVIFFImage function in coders/viff.c in ImageMagick 7.0.6-6 allows remote attackers to cause a denial of service (memory consumption) via a crafted VIFF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12692.html">CVE-2017-12692</cve>
<bugzilla href="https://bugzilla.suse.com/1053955">SUSE bug 1053955</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1082362">SUSE bug 1082362</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202311" comment="ImageMagick-6.4.3.6-78.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209132" comment="libMagickCore1-6.4.3.6-78.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209133" comment="libMagickCore1-32bit-6.4.3.6-78.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12693</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12693" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12693" source="CVE"/>
    <description>
    The ReadBMPImage function in coders/bmp.c in ImageMagick 7.0.6-6 allows remote attackers to cause a denial of service (memory consumption) via a crafted BMP file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12693.html">CVE-2017-12693</cve>
<bugzilla href="https://bugzilla.suse.com/1053955">SUSE bug 1053955</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1082348">SUSE bug 1082348</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202311" comment="ImageMagick-6.4.3.6-78.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209132" comment="libMagickCore1-6.4.3.6-78.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209133" comment="libMagickCore1-32bit-6.4.3.6-78.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12762</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12762" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12762" source="CVE"/>
    <description>
    In /drivers/isdn/i4l/isdn_net.c: A user-controlled buffer is copied into a local buffer of constant size using strcpy without a length check which can cause a buffer overflow. This affects the Linux kernel 4.9-stable tree, 4.12-stable tree, 3.18-stable tree, and 4.4-stable tree.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12762.html">CVE-2017-12762</cve>
<bugzilla href="https://bugzilla.suse.com/1053148">SUSE bug 1053148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1053150">SUSE bug 1053150</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208691" comment="kernel-bigsmp-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208692" comment="kernel-bigsmp-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208693" comment="kernel-bigsmp-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205592" comment="kernel-default-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205593" comment="kernel-default-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205594" comment="kernel-default-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208694" comment="kernel-default-man-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205595" comment="kernel-ec2-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205596" comment="kernel-ec2-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205597" comment="kernel-ec2-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205598" comment="kernel-pae-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205599" comment="kernel-pae-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205600" comment="kernel-pae-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205601" comment="kernel-source-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205602" comment="kernel-syms-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205603" comment="kernel-trace-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205604" comment="kernel-trace-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205605" comment="kernel-trace-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205606" comment="kernel-xen-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205607" comment="kernel-xen-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205608" comment="kernel-xen-devel-3.0.101-0.47.106.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12791</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS</platform>
    </affected>
    <reference ref_id="CVE-2017-12791" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12791" source="CVE"/>
    <description>
    Directory traversal vulnerability in minion id validation in SaltStack Salt before 2016.11.7 and 2017.7.x before 2017.7.1 allows remote minions with incorrect credentials to authenticate to a master via a crafted minion ID.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12791.html">CVE-2017-12791</cve>
<bugzilla href="https://bugzilla.suse.com/1053955">SUSE bug 1053955</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1062462">SUSE bug 1062462</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009206233" comment="salt-2016.11.4-43.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206234" comment="salt-doc-2016.11.4-43.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206235" comment="salt-minion-2016.11.4-43.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12805" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12805" source="CVE"/>
    <description>
    In ImageMagick 7.0.6-6, a memory exhaustion vulnerability was found in the function ReadTIFFImage, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12805.html">CVE-2017-12805</cve>
<bugzilla href="https://bugzilla.suse.com/1135236">SUSE bug 1135236</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009257059" comment="ImageMagick-6.4.3.6-78.106 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009257060" comment="libMagickCore1-6.4.3.6-78.106 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009257061" comment="libMagickCore1-32bit-6.4.3.6-78.106 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12806" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12806" source="CVE"/>
    <description>
    In ImageMagick 7.0.6-6, a memory exhaustion vulnerability was found in the function format8BIM, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12806.html">CVE-2017-12806</cve>
<bugzilla href="https://bugzilla.suse.com/1135232">SUSE bug 1135232</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009257059" comment="ImageMagick-6.4.3.6-78.106 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009257060" comment="libMagickCore1-6.4.3.6-78.106 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009257061" comment="libMagickCore1-32bit-6.4.3.6-78.106 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12836" source="CVE"/>
    <description>
    CVS 1.12.x, when configured to use SSH for remote repositories, might allow remote attackers to execute arbitrary code via a repository URL with a crafted hostname, as demonstrated by "-oProxyCommand=id;localhost:/bar."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12836.html">CVE-2017-12836</cve>
<bugzilla href="https://bugzilla.suse.com/1052481">SUSE bug 1052481</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1052696">SUSE bug 1052696</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1052932">SUSE bug 1052932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1053364">SUSE bug 1053364</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1066430">SUSE bug 1066430</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1071709">SUSE bug 1071709</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202493" comment="cvs-1.12.12-144.23.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202494" comment="cvs-doc-1.12.12-144.23.5.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12855</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12855" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12855" source="CVE"/>
    <description>
    Xen maintains the _GTF_{read,writ}ing bits as appropriate, to inform the guest that a grant is in use. A guest is expected not to modify the grant details while it is in use, whereas the guest is free to modify/reuse the grant entry when it is not in use. Under some circumstances, Xen will clear the status bits too early, incorrectly informing the guest that the grant is no longer in use. A guest may prematurely believe that a granted frame is safely private again, and reuse it in a way which contains sensitive information, while the domain on the far end of the grant is still using the grant. Xen 4.9, 4.8, 4.7, 4.6, and 4.5 are affected.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12855.html">CVE-2017-12855</cve>
<bugzilla href="https://bugzilla.suse.com/1052686">SUSE bug 1052686</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205977" comment="xen-4.2.5_21-45.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209078" comment="xen-doc-html-4.2.5_21-45.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209079" comment="xen-doc-pdf-4.2.5_21-45.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205978" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.105-45.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205979" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.105-45.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205980" comment="xen-libs-4.2.5_21-45.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209080" comment="xen-libs-32bit-4.2.5_21-45.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209081" comment="xen-tools-4.2.5_21-45.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205981" comment="xen-tools-domU-4.2.5_21-45.5 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250440" comment="xen-4.2.5_21-47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250441" comment="xen-doc-html-4.2.5_21-47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250442" comment="xen-doc-pdf-4.2.5_21-47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250443" comment="xen-kmp-default-4.2.5_21_3.0.101_0.125.TDC-47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250444" comment="xen-libs-4.2.5_21-47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250445" comment="xen-tools-4.2.5_21-47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250446" comment="xen-tools-domU-4.2.5_21-47.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12880</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12880" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12880" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2017-11424.  Reason: This candidate is a duplicate of CVE-2017-11424.  Notes: All CVE users should reference CVE-2017-11424 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12880.html">CVE-2017-12880</cve>
<bugzilla href="https://bugzilla.suse.com/1054106">SUSE bug 1054106</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009263589" comment="cloud-init-18.5-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263590" comment="cloud-init-config-suse-18.5-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263591" comment="cloud-init-doc-18.5-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263592" comment="growpart-0.30-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263573" comment="libpython2_7-1_0-2.7.16-6.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263574" comment="libpython2_7-1_0-32bit-2.7.16-6.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263575" comment="python27-2.7.16-6.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263576" comment="python27-32bit-2.7.16-6.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263593" comment="python27-Cheetah-2.4.4-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263594" comment="python27-Jinja2-2.7.2-2.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263595" comment="python27-MarkupSafe-0.18-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263596" comment="python27-PrettyTable-0.7.2-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263597" comment="python27-PyJWT-1.4.2-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263598" comment="python27-PyYAML-3.10-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263599" comment="python27-argparse-1.2.1-2.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263577" comment="python27-base-2.7.16-6.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263578" comment="python27-base-32bit-2.7.16-6.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263600" comment="python27-blinker-1.4-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263601" comment="python27-boto3-1.7.42-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263602" comment="python27-botocore-1.10.57-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263603" comment="python27-cffi-1.5.2-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263604" comment="python27-configobj-5.0.6-1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263605" comment="python27-cryptography-1.3.1-3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263579" comment="python27-curses-2.7.16-6.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263606" comment="python27-dateutil-2.1-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263580" comment="python27-demo-2.7.16-6.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263581" comment="python27-devel-2.7.16-6.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263582" comment="python27-doc-2.7.16-6.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263583" comment="python27-doc-pdf-2.7.16-6.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263607" comment="python27-docutils-0.11-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263608" comment="python27-ecdsa-0.10-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263609" comment="python27-enum34-1.1.3-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263610" comment="python27-futures-3.0.2-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263584" comment="python27-gdbm-2.7.16-6.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263611" comment="python27-httplib2-0.9.2-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263585" comment="python27-idle-2.7.16-6.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263612" comment="python27-idna-2.0-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263613" comment="python27-ipaddress-1.0.18-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263614" comment="python27-jmespath-0.9.2-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263615" comment="python27-jsonpatch-1.1-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263616" comment="python27-jsonpointer-1.0-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263617" comment="python27-jsonschema-2.4.0-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263618" comment="python27-lockfile-0.9.1-2.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263619" comment="python27-oauth-1.0.1-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263620" comment="python27-oauthlib-0.7.2-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263621" comment="python27-paramiko-1.13.1-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263622" comment="python27-ply-3.4-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263623" comment="python27-pyasn1-0.1.9-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263624" comment="python27-pyasn1-modules-0.0.5-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263625" comment="python27-pycparser-2.10-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263626" comment="python27-pycrypto-2.6-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263627" comment="python27-pyserial-2.7-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263628" comment="python27-pytest-2.5.1-0.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263629" comment="python27-python-daemon-1.5.5-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263630" comment="python27-requests-2.0.1-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263631" comment="python27-s3transfer-0.1.13-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263586" comment="python27-setuptools-18.0.1-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263632" comment="python27-simplejson-3.8.2-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263633" comment="python27-six-1.7.2-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263587" comment="python27-tk-2.7.16-6.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263588" comment="python27-xml-2.7.16-6.29 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1289</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-1289" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1289" source="CVE"/>
    <description>
    IBM SDK, Java Technology Edition is vulnerable XML External Entity Injection (XXE) error when processing XML data. A remote attacker could exploit this vulnerability to expose highly sensitive information or consume memory resources. IBM X-Force ID: 125150.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-1289.html">CVE-2017-1289</cve>
<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205375" comment="java-1_6_0-ibm-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205376" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205377" comment="java-1_6_0-ibm-devel-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205378" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205379" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205380" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205402" comment="java-1_7_0-ibm-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205403" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205404" comment="java-1_7_0-ibm-devel-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205405" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205406" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.5-64 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205375" comment="java-1_6_0-ibm-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205378" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205379" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205380" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205402" comment="java-1_7_0-ibm-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205403" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205405" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205406" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.5-64 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12933</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12933" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12933" source="CVE"/>
    <description>
    The finish_nested_data function in ext/standard/var_unserializer.re in PHP before 5.6.31, 7.0.x before 7.0.21, and 7.1.x before 7.1.7 is prone to a buffer over-read while unserializing untrusted data. Exploitation of this issue can have an unspecified impact on the integrity of PHP.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12933.html">CVE-2017-12933</cve>
<bugzilla href="https://bugzilla.suse.com/1054430">SUSE bug 1054430</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210532" comment="apache2-mod_php53-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203336" comment="php53-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210533" comment="php53-bcmath-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210534" comment="php53-bz2-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210535" comment="php53-calendar-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210536" comment="php53-ctype-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210537" comment="php53-curl-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210538" comment="php53-dba-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210539" comment="php53-dom-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210540" comment="php53-exif-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210541" comment="php53-fastcgi-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210542" comment="php53-fileinfo-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210543" comment="php53-ftp-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210544" comment="php53-gd-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210545" comment="php53-gettext-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210546" comment="php53-gmp-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210547" comment="php53-iconv-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210548" comment="php53-intl-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210549" comment="php53-json-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210550" comment="php53-ldap-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210551" comment="php53-mbstring-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210552" comment="php53-mcrypt-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210553" comment="php53-mysql-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210554" comment="php53-odbc-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210555" comment="php53-openssl-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210556" comment="php53-pcntl-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210557" comment="php53-pdo-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210558" comment="php53-pear-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210559" comment="php53-pgsql-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210560" comment="php53-pspell-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210561" comment="php53-shmop-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210562" comment="php53-snmp-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210563" comment="php53-soap-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210564" comment="php53-suhosin-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210565" comment="php53-sysvmsg-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210566" comment="php53-sysvsem-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210567" comment="php53-sysvshm-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210568" comment="php53-tokenizer-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210569" comment="php53-wddx-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210570" comment="php53-xmlreader-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210571" comment="php53-xmlrpc-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210572" comment="php53-xmlwriter-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210573" comment="php53-xsl-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210574" comment="php53-zip-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210575" comment="php53-zlib-5.3.17-112.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12935</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12935" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935" source="CVE"/>
    <description>
    The ReadMNGImage function in coders/png.c in GraphicsMagick 1.3.26 mishandles large MNG images, leading to an invalid memory read in the SetImageColorCallBack function in magick/image.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12935.html">CVE-2017-12935</cve>
<bugzilla href="https://bugzilla.suse.com/1054598">SUSE bug 1054598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1054600">SUSE bug 1054600</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202290" comment="ImageMagick-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209126" comment="libMagickCore1-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209127" comment="libMagickCore1-32bit-6.4.3.6-7.78.29 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12938</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12938" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12938" source="CVE"/>
    <description>
    UnRAR before 5.5.7 allows remote attackers to bypass a directory-traversal protection mechanism via vectors involving a symlink to the . directory, a symlink to the .. directory, and a regular file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12938.html">CVE-2017-12938</cve>
<bugzilla href="https://bugzilla.suse.com/1054038">SUSE bug 1054038</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210859" comment="unrar-5.6.1-5.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12940</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12940" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12940" source="CVE"/>
    <description>
    libunrar.a in UnRAR before 5.5.7 has an out-of-bounds read in the EncodeFileName::Decode call within the Archive::ReadHeader15 function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12940.html">CVE-2017-12940</cve>
<bugzilla href="https://bugzilla.suse.com/1054038">SUSE bug 1054038</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210859" comment="unrar-5.6.1-5.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12941</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12941" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12941" source="CVE"/>
    <description>
    libunrar.a in UnRAR before 5.5.7 has an out-of-bounds read in the Unpack::Unpack20 function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12941.html">CVE-2017-12941</cve>
<bugzilla href="https://bugzilla.suse.com/1054038">SUSE bug 1054038</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210859" comment="unrar-5.6.1-5.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12942</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12942" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12942" source="CVE"/>
    <description>
    libunrar.a in UnRAR before 5.5.7 has a buffer overflow in the Unpack::LongLZ function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12942.html">CVE-2017-12942</cve>
<bugzilla href="https://bugzilla.suse.com/1054038">SUSE bug 1054038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1054600">SUSE bug 1054600</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210859" comment="unrar-5.6.1-5.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12983</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-12983" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12983" source="CVE"/>
    <description>
    Heap-based buffer overflow in the ReadSFWImage function in coders/sfw.c in ImageMagick 7.0.6-8 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-12983.html">CVE-2017-12983</cve>
<bugzilla href="https://bugzilla.suse.com/1054757">SUSE bug 1054757</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202269" comment="ImageMagick-6.4.3.6-7.78.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209120" comment="libMagickCore1-6.4.3.6-7.78.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209121" comment="libMagickCore1-32bit-6.4.3.6-7.78.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13011</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-13011" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13011" source="CVE"/>
    <description>
    Several protocol parsers in tcpdump before 4.9.2 could cause a buffer overflow in util-print.c:bittok2str_internal().
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-13011.html">CVE-2017-13011</cve>
<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123142">SUSE bug 1123142</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210823" comment="tcpdump-3.9.8-1.30.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13058</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-13058" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13058" source="CVE"/>
    <description>
    In ImageMagick 7.0.6-6, a memory leak vulnerability was found in the function WritePCXImage in coders/pcx.c, which allows attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-13058.html">CVE-2017-13058</cve>
<bugzilla href="https://bugzilla.suse.com/1055069">SUSE bug 1055069</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1111072">SUSE bug 1111072</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1117463">SUSE bug 1117463</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202297" comment="ImageMagick-6.4.3.6-7.78.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209128" comment="libMagickCore1-6.4.3.6-7.78.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209129" comment="libMagickCore1-32bit-6.4.3.6-7.78.34 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13060</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-13060" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13060" source="CVE"/>
    <description>
    In ImageMagick 7.0.6-5, a memory leak vulnerability was found in the function ReadMATImage in coders/mat.c, which allows attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-13060.html">CVE-2017-13060</cve>
<bugzilla href="https://bugzilla.suse.com/1055065">SUSE bug 1055065</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1055434">SUSE bug 1055434</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1076021">SUSE bug 1076021</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202283" comment="ImageMagick-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209124" comment="libMagickCore1-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209125" comment="libMagickCore1-32bit-6.4.3.6-7.78.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13061</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-13061" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13061" source="CVE"/>
    <description>
    In ImageMagick 7.0.6-5, a length-validation vulnerability was found in the function ReadPSDLayersInternal in coders/psd.c, which allows attackers to cause a denial of service (ReadPSDImage memory exhaustion) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-13061.html">CVE-2017-13061</cve>
<bugzilla href="https://bugzilla.suse.com/1055063">SUSE bug 1055063</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1072901">SUSE bug 1072901</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202276" comment="ImageMagick-6.4.3.6-7.78.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209122" comment="libMagickCore1-6.4.3.6-7.78.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209123" comment="libMagickCore1-32bit-6.4.3.6-7.78.17 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13062</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-13062" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13062" source="CVE"/>
    <description>
    In ImageMagick 7.0.6-6, a memory leak vulnerability was found in the function formatIPTC in coders/meta.c, which allows attackers to cause a denial of service (WriteMETAImage memory consumption) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-13062.html">CVE-2017-13062</cve>
<bugzilla href="https://bugzilla.suse.com/1055053">SUSE bug 1055053</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1055055">SUSE bug 1055055</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202276" comment="ImageMagick-6.4.3.6-7.78.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209122" comment="libMagickCore1-6.4.3.6-7.78.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209123" comment="libMagickCore1-32bit-6.4.3.6-7.78.17 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13078</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-13078" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13078" source="CVE"/>
    <description>
    Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the four-way handshake, allowing an attacker within radio range to replay frames from access points to clients.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-13078.html">CVE-2017-13078</cve>
<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1063667">SUSE bug 1063667</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205946" comment="wpa_supplicant-0.7.1-6.18.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13079</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-13079" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13079" source="CVE"/>
    <description>
    Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the four-way handshake, allowing an attacker within radio range to spoof frames from access points to clients.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-13079.html">CVE-2017-13079</cve>
<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205946" comment="wpa_supplicant-0.7.1-6.18.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13080</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-13080" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13080" source="CVE"/>
    <description>
    Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-13080.html">CVE-2017-13080</cve>
<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1063667">SUSE bug 1063667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1063671">SUSE bug 1063671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1066295">SUSE bug 1066295</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1105108">SUSE bug 1105108</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208652" comment="kernel-bigsmp-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208653" comment="kernel-bigsmp-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208654" comment="kernel-bigsmp-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205524" comment="kernel-default-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205525" comment="kernel-default-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205526" comment="kernel-default-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208655" comment="kernel-default-man-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205527" comment="kernel-ec2-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205528" comment="kernel-ec2-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205529" comment="kernel-ec2-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205530" comment="kernel-pae-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205531" comment="kernel-pae-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205532" comment="kernel-pae-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205533" comment="kernel-source-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205534" comment="kernel-syms-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205535" comment="kernel-trace-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205536" comment="kernel-trace-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205537" comment="kernel-trace-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205538" comment="kernel-xen-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205539" comment="kernel-xen-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205540" comment="kernel-xen-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205946" comment="wpa_supplicant-0.7.1-6.18.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13081</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-13081" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13081" source="CVE"/>
    <description>
    Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-13081.html">CVE-2017-13081</cve>
<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1066295">SUSE bug 1066295</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1105108">SUSE bug 1105108</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205946" comment="wpa_supplicant-0.7.1-6.18.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13087</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-13087" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13087" source="CVE"/>
    <description>
    Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Group Temporal Key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-13087.html">CVE-2017-13087</cve>
<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205946" comment="wpa_supplicant-0.7.1-6.18.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13088</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-13088" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13088" source="CVE"/>
    <description>
    Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Integrity Group Temporal Key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-13088.html">CVE-2017-13088</cve>
<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205946" comment="wpa_supplicant-0.7.1-6.18.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13131</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-13131" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13131" source="CVE"/>
    <description>
    In ImageMagick 7.0.6-8, a memory leak vulnerability was found in the function ReadMIFFImage in coders/miff.c, which allows attackers to cause a denial of service (memory consumption in NewLinkedList in MagickCore/linked-list.c) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-13131.html">CVE-2017-13131</cve>
<bugzilla href="https://bugzilla.suse.com/1055229">SUSE bug 1055229</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202297" comment="ImageMagick-6.4.3.6-7.78.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209128" comment="libMagickCore1-6.4.3.6-7.78.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209129" comment="libMagickCore1-32bit-6.4.3.6-7.78.34 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13133</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-13133" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13133" source="CVE"/>
    <description>
    In ImageMagick 7.0.6-8, the load_level function in coders/xcf.c lacks offset validation, which allows attackers to cause a denial of service (load_tile memory exhaustion) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-13133.html">CVE-2017-13133</cve>
<bugzilla href="https://bugzilla.suse.com/1055219">SUSE bug 1055219</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202262" comment="ImageMagick-6.4.3.6-7.78.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209118" comment="libMagickCore1-6.4.3.6-7.78.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209119" comment="libMagickCore1-32bit-6.4.3.6-7.78.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13134</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-13134" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134" source="CVE"/>
    <description>
    In ImageMagick 7.0.6-6 and GraphicsMagick 1.3.26, a heap-based buffer over-read was found in the function SFWScan in coders/sfw.c, which allows attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-13134.html">CVE-2017-13134</cve>
<bugzilla href="https://bugzilla.suse.com/1055214">SUSE bug 1055214</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202269" comment="ImageMagick-6.4.3.6-7.78.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209120" comment="libMagickCore1-6.4.3.6-7.78.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209121" comment="libMagickCore1-32bit-6.4.3.6-7.78.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-13139" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13139" source="CVE"/>
    <description>
    In ImageMagick before 6.9.9-0 and 7.x before 7.0.6-1, the ReadOneMNGImage function in coders/png.c has an out-of-bounds read with the MNG CLIP chunk.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-13139.html">CVE-2017-13139</cve>
<bugzilla href="https://bugzilla.suse.com/1055430">SUSE bug 1055430</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202262" comment="ImageMagick-6.4.3.6-7.78.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209118" comment="libMagickCore1-6.4.3.6-7.78.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209119" comment="libMagickCore1-32bit-6.4.3.6-7.78.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13141</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-13141" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13141" source="CVE"/>
    <description>
    In ImageMagick before 6.9.9-4 and 7.x before 7.0.6-4, a crafted file could trigger a memory leak in ReadOnePNGImage in coders/png.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-13141.html">CVE-2017-13141</cve>
<bugzilla href="https://bugzilla.suse.com/1055456">SUSE bug 1055456</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1060162">SUSE bug 1060162</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202290" comment="ImageMagick-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209126" comment="libMagickCore1-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209127" comment="libMagickCore1-32bit-6.4.3.6-7.78.29 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13142</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-13142" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13142" source="CVE"/>
    <description>
    In ImageMagick before 6.9.9-0 and 7.x before 7.0.6-1, a crafted PNG file could trigger a crash because there was an insufficient check for short files.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-13142.html">CVE-2017-13142</cve>
<bugzilla href="https://bugzilla.suse.com/1055455">SUSE bug 1055455</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202290" comment="ImageMagick-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209126" comment="libMagickCore1-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209127" comment="libMagickCore1-32bit-6.4.3.6-7.78.29 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-13146" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13146" source="CVE"/>
    <description>
    In ImageMagick before 6.9.8-5 and 7.x before 7.0.5-6, there is a memory leak in the ReadMATImage function in coders/mat.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-13146.html">CVE-2017-13146</cve>
<bugzilla href="https://bugzilla.suse.com/1055323">SUSE bug 1055323</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202283" comment="ImageMagick-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209124" comment="libMagickCore1-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209125" comment="libMagickCore1-32bit-6.4.3.6-7.78.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13147</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-13147" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13147" source="CVE"/>
    <description>
    In GraphicsMagick 1.3.26, an allocation failure vulnerability was found in the function ReadMNGImage in coders/png.c when a small MNG file has a MEND chunk with a large length value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-13147.html">CVE-2017-13147</cve>
<bugzilla href="https://bugzilla.suse.com/1055374">SUSE bug 1055374</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202290" comment="ImageMagick-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209126" comment="libMagickCore1-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209127" comment="libMagickCore1-32bit-6.4.3.6-7.78.29 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13166</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-13166" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166" source="CVE"/>
    <description>
    An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-13166.html">CVE-2017-13166</cve>
<bugzilla href="https://bugzilla.suse.com/1072865">SUSE bug 1072865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1085447">SUSE bug 1085447</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208695" comment="kernel-bigsmp-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208696" comment="kernel-bigsmp-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208697" comment="kernel-bigsmp-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205609" comment="kernel-default-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205610" comment="kernel-default-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205611" comment="kernel-default-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208698" comment="kernel-default-man-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205612" comment="kernel-ec2-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205613" comment="kernel-ec2-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205614" comment="kernel-ec2-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205615" comment="kernel-pae-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205616" comment="kernel-pae-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205617" comment="kernel-pae-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205618" comment="kernel-source-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205619" comment="kernel-syms-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205620" comment="kernel-trace-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205621" comment="kernel-trace-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205622" comment="kernel-trace-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205623" comment="kernel-xen-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205624" comment="kernel-xen-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205625" comment="kernel-xen-devel-3.0.101-0.47.106.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13167</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-13167" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13167" source="CVE"/>
    <description>
    An elevation of privilege vulnerability in the kernel sound timer. Product: Android. Versions: Android kernel. Android ID A-37240993.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-13167.html">CVE-2017-13167</cve>
<bugzilla href="https://bugzilla.suse.com/1072876">SUSE bug 1072876</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208652" comment="kernel-bigsmp-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208653" comment="kernel-bigsmp-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208654" comment="kernel-bigsmp-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205524" comment="kernel-default-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205525" comment="kernel-default-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205526" comment="kernel-default-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208655" comment="kernel-default-man-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205527" comment="kernel-ec2-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205528" comment="kernel-ec2-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205529" comment="kernel-ec2-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205530" comment="kernel-pae-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205531" comment="kernel-pae-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205532" comment="kernel-pae-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205533" comment="kernel-source-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205534" comment="kernel-syms-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205535" comment="kernel-trace-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205536" comment="kernel-trace-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205537" comment="kernel-trace-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205538" comment="kernel-xen-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205539" comment="kernel-xen-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205540" comment="kernel-xen-devel-3.0.101-0.47.106.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13215</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-13215" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13215" source="CVE"/>
    <description>
    A elevation of privilege vulnerability in the Upstream kernel skcipher. Product: Android. Versions: Android kernel. Android ID: A-64386293. References: Upstream kernel.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-13215.html">CVE-2017-13215</cve>
<bugzilla href="https://bugzilla.suse.com/1075908">SUSE bug 1075908</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208665" comment="kernel-bigsmp-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208666" comment="kernel-bigsmp-base-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208667" comment="kernel-bigsmp-devel-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205541" comment="kernel-default-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205542" comment="kernel-default-base-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205543" comment="kernel-default-devel-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208668" comment="kernel-default-man-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205544" comment="kernel-ec2-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205545" comment="kernel-ec2-base-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205546" comment="kernel-ec2-devel-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205547" comment="kernel-pae-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205548" comment="kernel-pae-base-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205549" comment="kernel-pae-devel-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205550" comment="kernel-source-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205551" comment="kernel-syms-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205552" comment="kernel-trace-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205553" comment="kernel-trace-base-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205554" comment="kernel-trace-devel-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205555" comment="kernel-xen-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205556" comment="kernel-xen-base-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205557" comment="kernel-xen-devel-3.0.101-0.47.106.19 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13305</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-13305" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13305" source="CVE"/>
    <description>
    A information disclosure vulnerability in the Upstream kernel encrypted-keys. Product: Android. Versions: Android kernel. Android ID: A-70526974.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-13305.html">CVE-2017-13305</cve>
<bugzilla href="https://bugzilla.suse.com/1094353">SUSE bug 1094353</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1105412">SUSE bug 1105412</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009232611" comment="kernel-bigsmp-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232612" comment="kernel-bigsmp-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232613" comment="kernel-bigsmp-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232594" comment="kernel-default-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232595" comment="kernel-default-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232596" comment="kernel-default-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232614" comment="kernel-default-man-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232597" comment="kernel-ec2-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232598" comment="kernel-ec2-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232599" comment="kernel-ec2-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232600" comment="kernel-pae-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232601" comment="kernel-pae-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232602" comment="kernel-pae-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232603" comment="kernel-source-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232604" comment="kernel-syms-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232605" comment="kernel-trace-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232606" comment="kernel-trace-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232607" comment="kernel-trace-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232608" comment="kernel-xen-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232609" comment="kernel-xen-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232610" comment="kernel-xen-devel-3.0.101-0.47.106.43 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13648</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-13648" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13648" source="CVE"/>
    <description>
    In GraphicsMagick 1.3.26, a memory leak vulnerability was found in the function ReadMATImage in coders/mat.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-13648.html">CVE-2017-13648</cve>
<bugzilla href="https://bugzilla.suse.com/1054598">SUSE bug 1054598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1054600">SUSE bug 1054600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1055434">SUSE bug 1055434</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202283" comment="ImageMagick-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209124" comment="libMagickCore1-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209125" comment="libMagickCore1-32bit-6.4.3.6-7.78.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13658</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-13658" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13658" source="CVE"/>
    <description>
    In ImageMagick before 6.9.9-3 and 7.x before 7.0.6-3, there is a missing NULL check in the ReadMATImage function in coders/mat.c, leading to a denial of service (assertion failure and application exit) in the DestroyImageInfo function in MagickCore/image.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-13658.html">CVE-2017-13658</cve>
<bugzilla href="https://bugzilla.suse.com/1055855">SUSE bug 1055855</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202283" comment="ImageMagick-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209124" comment="libMagickCore1-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209125" comment="libMagickCore1-32bit-6.4.3.6-7.78.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13672</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-13672" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13672" source="CVE"/>
    <description>
    QEMU (aka Quick Emulator), when built with the VGA display emulator support, allows local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors involving display update.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-13672.html">CVE-2017-13672</cve>
<bugzilla href="https://bugzilla.suse.com/1056334">SUSE bug 1056334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1056336">SUSE bug 1056336</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1084604">SUSE bug 1084604</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205626" comment="kvm-1.4.2-53.11 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13720</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-13720" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13720" source="CVE"/>
    <description>
    In the PatternMatch function in fontfile/fontdir.c in libXfont through 1.5.2 and 2.x before 2.0.2, an attacker with access to an X connection can cause a buffer over-read during pattern matching of fonts, leading to information disclosure or a crash (denial of service). This occurs because '\0' characters are incorrectly skipped in situations involving ? characters.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-13720.html">CVE-2017-13720</cve>
<bugzilla href="https://bugzilla.suse.com/1054285">SUSE bug 1054285</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203697" comment="xorg-x11-libs-7.4-8.26.50.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210989" comment="xorg-x11-libs-32bit-7.4-8.26.50.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13722</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-13722" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13722" source="CVE"/>
    <description>
    In the pcfGetProperties function in bitmap/pcfread.c in libXfont through 1.5.2 and 2.x before 2.0.2, a missing boundary check (for PCF files) could be used by local attackers authenticated to an Xserver for a buffer over-read, for information disclosure or a crash of the X server.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-13722.html">CVE-2017-13722</cve>
<bugzilla href="https://bugzilla.suse.com/1049692">SUSE bug 1049692</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203697" comment="xorg-x11-libs-7.4-8.26.50.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210989" comment="xorg-x11-libs-32bit-7.4-8.26.50.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13723</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-13723" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723" source="CVE"/>
    <description>
    In X.Org Server (aka xserver and xorg-server) before 1.19.4, a local attacker authenticated to the X server could overflow a global buffer, causing crashes of the X server or potentially other problems by injecting large or malformed XKB related atoms and accessing them via xkbcomp.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-13723.html">CVE-2017-13723</cve>
<bugzilla href="https://bugzilla.suse.com/1051150">SUSE bug 1051150</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1052984">SUSE bug 1052984</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210993" comment="xorg-x11-Xvnc-7.4-27.122.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203702" comment="xorg-x11-server-7.4-27.122.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210994" comment="xorg-x11-server-extra-7.4-27.122.16 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13728</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-13728" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13728" source="CVE"/>
    <description>
    There is an infinite loop in the next_char function in comp_scan.c in ncurses 6.0, related to libtic. A crafted input will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-13728.html">CVE-2017-13728</cve>
<bugzilla href="https://bugzilla.suse.com/1056136">SUSE bug 1056136</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1069530">SUSE bug 1069530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1115932">SUSE bug 1115932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123132">SUSE bug 1123132</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210104" comment="libncurses5-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210105" comment="libncurses5-32bit-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210107" comment="libncurses6-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210108" comment="libncurses6-32bit-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203199" comment="ncurses-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203200" comment="ncurses-devel-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203201" comment="ncurses-devel-32bit-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210110" comment="ncurses-utils-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203202" comment="tack-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210111" comment="terminfo-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210112" comment="terminfo-base-5.6-93.12 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13729</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-13729" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13729" source="CVE"/>
    <description>
    There is an illegal address access in the _nc_save_str function in alloc_entry.c in ncurses 6.0. It will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-13729.html">CVE-2017-13729</cve>
<bugzilla href="https://bugzilla.suse.com/1056132">SUSE bug 1056132</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1069530">SUSE bug 1069530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1115932">SUSE bug 1115932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123132">SUSE bug 1123132</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210104" comment="libncurses5-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210105" comment="libncurses5-32bit-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210107" comment="libncurses6-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210108" comment="libncurses6-32bit-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203199" comment="ncurses-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203200" comment="ncurses-devel-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203201" comment="ncurses-devel-32bit-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210110" comment="ncurses-utils-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203202" comment="tack-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210111" comment="terminfo-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210112" comment="terminfo-base-5.6-93.12 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13730</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-13730" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13730" source="CVE"/>
    <description>
    There is an illegal address access in the function _nc_read_entry_source() in progs/tic.c in ncurses 6.0 that might lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-13730.html">CVE-2017-13730</cve>
<bugzilla href="https://bugzilla.suse.com/1056131">SUSE bug 1056131</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1069530">SUSE bug 1069530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1115932">SUSE bug 1115932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123132">SUSE bug 1123132</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210104" comment="libncurses5-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210105" comment="libncurses5-32bit-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210107" comment="libncurses6-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210108" comment="libncurses6-32bit-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203199" comment="ncurses-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203200" comment="ncurses-devel-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203201" comment="ncurses-devel-32bit-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210110" comment="ncurses-utils-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203202" comment="tack-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210111" comment="terminfo-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210112" comment="terminfo-base-5.6-93.12 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13731</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-13731" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13731" source="CVE"/>
    <description>
    There is an illegal address access in the function postprocess_termcap() in parse_entry.c in ncurses 6.0 that will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-13731.html">CVE-2017-13731</cve>
<bugzilla href="https://bugzilla.suse.com/1056129">SUSE bug 1056129</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1069530">SUSE bug 1069530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1115932">SUSE bug 1115932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123132">SUSE bug 1123132</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210104" comment="libncurses5-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210105" comment="libncurses5-32bit-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210107" comment="libncurses6-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210108" comment="libncurses6-32bit-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203199" comment="ncurses-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203200" comment="ncurses-devel-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203201" comment="ncurses-devel-32bit-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210110" comment="ncurses-utils-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203202" comment="tack-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210111" comment="terminfo-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210112" comment="terminfo-base-5.6-93.12 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13732</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-13732" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13732" source="CVE"/>
    <description>
    There is an illegal address access in the function dump_uses() in progs/dump_entry.c in ncurses 6.0 that might lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-13732.html">CVE-2017-13732</cve>
<bugzilla href="https://bugzilla.suse.com/1056128">SUSE bug 1056128</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1069530">SUSE bug 1069530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1115932">SUSE bug 1115932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123132">SUSE bug 1123132</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210104" comment="libncurses5-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210105" comment="libncurses5-32bit-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210107" comment="libncurses6-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210108" comment="libncurses6-32bit-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203199" comment="ncurses-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203200" comment="ncurses-devel-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203201" comment="ncurses-devel-32bit-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210110" comment="ncurses-utils-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203202" comment="tack-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210111" comment="terminfo-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210112" comment="terminfo-base-5.6-93.12 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13733</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-13733" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13733" source="CVE"/>
    <description>
    There is an illegal address access in the fmt_entry function in progs/dump_entry.c in ncurses 6.0 that might lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-13733.html">CVE-2017-13733</cve>
<bugzilla href="https://bugzilla.suse.com/1056127">SUSE bug 1056127</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1069530">SUSE bug 1069530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1115932">SUSE bug 1115932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123132">SUSE bug 1123132</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210113" comment="libncurses5-5.6-93.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210114" comment="libncurses5-32bit-5.6-93.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210116" comment="libncurses6-5.6-93.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210117" comment="libncurses6-32bit-5.6-93.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203203" comment="ncurses-5.6-93.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203204" comment="ncurses-devel-5.6-93.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203205" comment="ncurses-devel-32bit-5.6-93.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210119" comment="ncurses-utils-5.6-93.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203206" comment="tack-5.6-93.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210120" comment="terminfo-5.6-93.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210121" comment="terminfo-base-5.6-93.15 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13739</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-13739" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13739" source="CVE"/>
    <description>
    There is a heap-based buffer overflow that causes a more than two thousand bytes out-of-bounds write in Liblouis 3.2.0, triggered in the function resolveSubtable() in compileTranslationTable.c. It will lead to denial of service or remote code execution.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-13739.html">CVE-2017-13739</cve>
<bugzilla href="https://bugzilla.suse.com/1056101">SUSE bug 1056101</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209916" comment="liblouis-1.7.0-1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209917" comment="liblouis0-1.7.0-1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209918" comment="python-louis-1.7.0-1.3.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13740</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-13740" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13740" source="CVE"/>
    <description>
    There is a stack-based buffer overflow in Liblouis 3.2.0, triggered in the function parseChars() in compileTranslationTable.c, that will lead to denial of service or possibly unspecified other impact.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-13740.html">CVE-2017-13740</cve>
<bugzilla href="https://bugzilla.suse.com/1056097">SUSE bug 1056097</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209916" comment="liblouis-1.7.0-1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209917" comment="liblouis0-1.7.0-1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209918" comment="python-louis-1.7.0-1.3.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13741</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-13741" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13741" source="CVE"/>
    <description>
    There is a use-after-free in the function compileBrailleIndicator() in compileTranslationTable.c in Liblouis 3.2.0 that will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-13741.html">CVE-2017-13741</cve>
<bugzilla href="https://bugzilla.suse.com/1056095">SUSE bug 1056095</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209916" comment="liblouis-1.7.0-1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209917" comment="liblouis0-1.7.0-1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209918" comment="python-louis-1.7.0-1.3.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13743</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-13743" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13743" source="CVE"/>
    <description>
    There is a buffer overflow in Liblouis 3.2.0, triggered in the function _lou_showString() in utils.c, that will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-13743.html">CVE-2017-13743</cve>
<bugzilla href="https://bugzilla.suse.com/1056090">SUSE bug 1056090</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209916" comment="liblouis-1.7.0-1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209917" comment="liblouis0-1.7.0-1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209918" comment="python-louis-1.7.0-1.3.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13758</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-13758" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13758" source="CVE"/>
    <description>
    In ImageMagick 7.0.6-10, there is a heap-based buffer overflow in the TracePoint() function in MagickCore/draw.c.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-13758.html">CVE-2017-13758</cve>
<bugzilla href="https://bugzilla.suse.com/1056277">SUSE bug 1056277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1096261">SUSE bug 1096261</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009233150" comment="ImageMagick-6.4.3.6-78.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233160" comment="libMagickCore1-6.4.3.6-78.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233161" comment="libMagickCore1-32bit-6.4.3.6-78.56 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13765</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-13765" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13765" source="CVE"/>
    <description>
    In Wireshark 2.4.0, 2.2.0 to 2.2.8, and 2.0.0 to 2.0.14, the IrCOMM dissector has a buffer over-read and application crash. This was addressed in plugins/irda/packet-ircomm.c by adding length validation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-13765.html">CVE-2017-13765</cve>
<bugzilla href="https://bugzilla.suse.com/1056251">SUSE bug 1056251</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203595" comment="libsmi-0.4.5-2.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203596" comment="libwireshark8-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203597" comment="libwiretap6-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203598" comment="libwscodecs1-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203599" comment="libwsutil7-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203600" comment="portaudio-19-234.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203602" comment="wireshark-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203604" comment="wireshark-gtk-2.2.11-40.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13766</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-13766" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13766" source="CVE"/>
    <description>
    In Wireshark 2.4.0 and 2.2.0 to 2.2.8, the Profinet I/O dissector could crash with an out-of-bounds write. This was addressed in plugins/profinet/packet-dcerpc-pn-io.c by adding string validation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-13766.html">CVE-2017-13766</cve>
<bugzilla href="https://bugzilla.suse.com/1056249">SUSE bug 1056249</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203595" comment="libsmi-0.4.5-2.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203596" comment="libwireshark8-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203597" comment="libwiretap6-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203598" comment="libwscodecs1-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203599" comment="libwsutil7-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203600" comment="portaudio-19-234.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203602" comment="wireshark-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203604" comment="wireshark-gtk-2.2.11-40.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13767</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-13767" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13767" source="CVE"/>
    <description>
    In Wireshark 2.4.0, 2.2.0 to 2.2.8, and 2.0.0 to 2.0.14, the MSDP dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-msdp.c by adding length validation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-13767.html">CVE-2017-13767</cve>
<bugzilla href="https://bugzilla.suse.com/1056248">SUSE bug 1056248</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203595" comment="libsmi-0.4.5-2.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203596" comment="libwireshark8-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203597" comment="libwiretap6-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203598" comment="libwscodecs1-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203599" comment="libwsutil7-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203600" comment="portaudio-19-234.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203602" comment="wireshark-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203604" comment="wireshark-gtk-2.2.11-40.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13768</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-13768" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13768" source="CVE"/>
    <description>
    Null Pointer Dereference in the IdentifyImage function in MagickCore/identify.c in ImageMagick through 7.0.6-10 allows an attacker to perform denial of service by sending a crafted image file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-13768.html">CVE-2017-13768</cve>
<bugzilla href="https://bugzilla.suse.com/1056434">SUSE bug 1056434</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202311" comment="ImageMagick-6.4.3.6-78.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209132" comment="libMagickCore1-6.4.3.6-78.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209133" comment="libMagickCore1-32bit-6.4.3.6-78.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13769</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-13769" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13769" source="CVE"/>
    <description>
    The WriteTHUMBNAILImage function in coders/thumbnail.c in ImageMagick through 7.0.6-10 allows an attacker to cause a denial of service (buffer over-read) by sending a crafted JPEG file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-13769.html">CVE-2017-13769</cve>
<bugzilla href="https://bugzilla.suse.com/1056432">SUSE bug 1056432</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202269" comment="ImageMagick-6.4.3.6-7.78.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209120" comment="libMagickCore1-6.4.3.6-7.78.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209121" comment="libMagickCore1-32bit-6.4.3.6-7.78.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14042</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-14042" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14042" source="CVE"/>
    <description>
    A memory allocation failure was discovered in the ReadPNMImage function in coders/pnm.c in GraphicsMagick 1.3.26. The vulnerability causes a big memory allocation, which may lead to remote denial of service in the MagickRealloc function in magick/memory.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-14042.html">CVE-2017-14042</cve>
<bugzilla href="https://bugzilla.suse.com/1054598">SUSE bug 1054598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1054600">SUSE bug 1054600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1056550">SUSE bug 1056550</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1059721">SUSE bug 1059721</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202276" comment="ImageMagick-6.4.3.6-7.78.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209122" comment="libMagickCore1-6.4.3.6-7.78.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209123" comment="libMagickCore1-32bit-6.4.3.6-7.78.17 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14051</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-14051" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14051" source="CVE"/>
    <description>
    An integer overflow in the qla2x00_sysfs_write_optrom_ctl function in drivers/scsi/qla2xxx/qla_attr.c in the Linux kernel through 4.12.10 allows local users to cause a denial of service (memory corruption and system crash) by leveraging root access.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-14051.html">CVE-2017-14051</cve>
<bugzilla href="https://bugzilla.suse.com/1056588">SUSE bug 1056588</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208691" comment="kernel-bigsmp-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208692" comment="kernel-bigsmp-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208693" comment="kernel-bigsmp-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205592" comment="kernel-default-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205593" comment="kernel-default-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205594" comment="kernel-default-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208694" comment="kernel-default-man-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205595" comment="kernel-ec2-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205596" comment="kernel-ec2-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205597" comment="kernel-ec2-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205598" comment="kernel-pae-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205599" comment="kernel-pae-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205600" comment="kernel-pae-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205601" comment="kernel-source-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205602" comment="kernel-syms-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205603" comment="kernel-trace-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205604" comment="kernel-trace-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205605" comment="kernel-trace-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205606" comment="kernel-xen-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205607" comment="kernel-xen-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205608" comment="kernel-xen-devel-3.0.101-0.47.106.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14062</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-14062" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14062" source="CVE"/>
    <description>
    Integer overflow in the decode_digit function in puny_decode.c in Libidn2 before 2.0.4 allows remote attackers to cause a denial of service or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-14062.html">CVE-2017-14062</cve>
<bugzilla href="https://bugzilla.suse.com/1056450">SUSE bug 1056450</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1087709">SUSE bug 1087709</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1118435">SUSE bug 1118435</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123123">SUSE bug 1123123</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202843" comment="libidn-1.10-7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209914" comment="libidn-32bit-1.10-7.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14103</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-14103" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14103" source="CVE"/>
    <description>
    The ReadJNGImage and ReadOneJNGImage functions in coders/png.c in GraphicsMagick 1.3.26 do not properly manage image pointers after certain error conditions, which allows remote attackers to conduct use-after-free attacks via a crafted file, related to a ReadMNGImage out-of-order CloseBlob call. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-11403.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-14103.html">CVE-2017-14103</cve>
<bugzilla href="https://bugzilla.suse.com/1057000">SUSE bug 1057000</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202290" comment="ImageMagick-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209126" comment="libMagickCore1-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209127" comment="libMagickCore1-32bit-6.4.3.6-7.78.29 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14106</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-14106" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14106" source="CVE"/>
    <description>
    The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel before 4.12 allows local users to cause a denial of service (__tcp_select_window divide-by-zero error and system crash) by triggering a disconnect within a certain tcp_recvmsg code path.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-14106.html">CVE-2017-14106</cve>
<bugzilla href="https://bugzilla.suse.com/1056982">SUSE bug 1056982</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208652" comment="kernel-bigsmp-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208653" comment="kernel-bigsmp-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208654" comment="kernel-bigsmp-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205524" comment="kernel-default-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205525" comment="kernel-default-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205526" comment="kernel-default-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208655" comment="kernel-default-man-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205527" comment="kernel-ec2-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205528" comment="kernel-ec2-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205529" comment="kernel-ec2-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205530" comment="kernel-pae-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205531" comment="kernel-pae-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205532" comment="kernel-pae-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205533" comment="kernel-source-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205534" comment="kernel-syms-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205535" comment="kernel-trace-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205536" comment="kernel-trace-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205537" comment="kernel-trace-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205538" comment="kernel-xen-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205539" comment="kernel-xen-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205540" comment="kernel-xen-devel-3.0.101-0.47.106.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14140</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-14140" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14140" source="CVE"/>
    <description>
    The move_pages system call in mm/migrate.c in the Linux kernel before 4.12.9 doesn't check the effective uid of the target process, enabling a local attacker to learn the memory layout of a setuid executable despite ASLR.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-14140.html">CVE-2017-14140</cve>
<bugzilla href="https://bugzilla.suse.com/1057179">SUSE bug 1057179</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208652" comment="kernel-bigsmp-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208653" comment="kernel-bigsmp-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208654" comment="kernel-bigsmp-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205524" comment="kernel-default-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205525" comment="kernel-default-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205526" comment="kernel-default-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208655" comment="kernel-default-man-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205527" comment="kernel-ec2-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205528" comment="kernel-ec2-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205529" comment="kernel-ec2-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205530" comment="kernel-pae-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205531" comment="kernel-pae-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205532" comment="kernel-pae-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205533" comment="kernel-source-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205534" comment="kernel-syms-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205535" comment="kernel-trace-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205536" comment="kernel-trace-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205537" comment="kernel-trace-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205538" comment="kernel-xen-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205539" comment="kernel-xen-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205540" comment="kernel-xen-devel-3.0.101-0.47.106.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14160</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-14160" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14160" source="CVE"/>
    <description>
    The bark_noise_hybridmp function in psy.c in Xiph.Org libvorbis 1.3.5 allows remote attackers to cause a denial of service (out-of-bounds access and application crash) or possibly have unspecified other impact via a crafted mp4 file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-14160.html">CVE-2017-14160</cve>
<bugzilla href="https://bugzilla.suse.com/1059812">SUSE bug 1059812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1091072">SUSE bug 1091072</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203085" comment="libvorbis-1.2.0-79.20.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209957" comment="libvorbis-32bit-1.2.0-79.20.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209958" comment="libvorbis-doc-1.2.0-79.20.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14167</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-14167" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14167" source="CVE"/>
    <description>
    Integer overflow in the load_multiboot function in hw/i386/multiboot.c in QEMU (aka Quick Emulator) allows local guest OS users to execute arbitrary code on the host via crafted multiboot header address values, which trigger an out-of-bounds write.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-14167.html">CVE-2017-14167</cve>
<bugzilla href="https://bugzilla.suse.com/1057585">SUSE bug 1057585</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205626" comment="kvm-1.4.2-53.11 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14172</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-14172" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14172" source="CVE"/>
    <description>
    In coders/ps.c in ImageMagick 7.0.7-0 Q16, a DoS in ReadPSImage() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted PSD file, which claims a large "extent" field in the header but does not contain sufficient backing data, is provided, the loop over "length" would consume huge CPU resources, since there is no EOF check inside the loop.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-14172.html">CVE-2017-14172</cve>
<bugzilla href="https://bugzilla.suse.com/1057730">SUSE bug 1057730</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202269" comment="ImageMagick-6.4.3.6-7.78.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209120" comment="libMagickCore1-6.4.3.6-7.78.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209121" comment="libMagickCore1-32bit-6.4.3.6-7.78.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14173</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-14173" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14173" source="CVE"/>
    <description>
    In the function ReadTXTImage() in coders/txt.c in ImageMagick 7.0.6-10, an integer overflow might occur for the addition operation "GetQuantumRange(depth)+1" when "depth" is large, producing a smaller value than expected. As a result, an infinite loop would occur for a crafted TXT file that claims a very large "max_value" value.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-14173.html">CVE-2017-14173</cve>
<bugzilla href="https://bugzilla.suse.com/1057729">SUSE bug 1057729</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202269" comment="ImageMagick-6.4.3.6-7.78.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209120" comment="libMagickCore1-6.4.3.6-7.78.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209121" comment="libMagickCore1-32bit-6.4.3.6-7.78.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14174</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-14174" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14174" source="CVE"/>
    <description>
    In coders/psd.c in ImageMagick 7.0.7-0 Q16, a DoS in ReadPSDLayersInternal() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted PSD file, which claims a large "length" field in the header but does not contain sufficient backing data, is provided, the loop over "length" would consume huge CPU resources, since there is no EOF check inside the loop.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-14174.html">CVE-2017-14174</cve>
<bugzilla href="https://bugzilla.suse.com/1057723">SUSE bug 1057723</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1072901">SUSE bug 1072901</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202276" comment="ImageMagick-6.4.3.6-7.78.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209122" comment="libMagickCore1-6.4.3.6-7.78.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209123" comment="libMagickCore1-32bit-6.4.3.6-7.78.17 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14175</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-14175" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14175" source="CVE"/>
    <description>
    In coders/xbm.c in ImageMagick 7.0.6-1 Q16, a DoS in ReadXBMImage() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted XBM file, which claims large rows and columns fields in the header but does not contain sufficient backing data, is provided, the loop over the rows would consume huge CPU resources, since there is no EOF check inside the loop.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-14175.html">CVE-2017-14175</cve>
<bugzilla href="https://bugzilla.suse.com/1056426">SUSE bug 1056426</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1056429">SUSE bug 1056429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1057719">SUSE bug 1057719</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202269" comment="ImageMagick-6.4.3.6-7.78.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209120" comment="libMagickCore1-6.4.3.6-7.78.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209121" comment="libMagickCore1-32bit-6.4.3.6-7.78.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14224</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-14224" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14224" source="CVE"/>
    <description>
    A heap-based buffer overflow in WritePCXImage in coders/pcx.c in ImageMagick 7.0.6-8 Q16 allows remote attackers to cause a denial of service or code execution via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-14224.html">CVE-2017-14224</cve>
<bugzilla href="https://bugzilla.suse.com/1058009">SUSE bug 1058009</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202297" comment="ImageMagick-6.4.3.6-7.78.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209128" comment="libMagickCore1-6.4.3.6-7.78.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209129" comment="libMagickCore1-32bit-6.4.3.6-7.78.34 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14245</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-14245" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14245" source="CVE"/>
    <description>
    An out of bounds read in the function d2alaw_array() in alaw.c of libsndfile 1.0.28 may lead to a remote DoS attack or information disclosure, related to mishandling of the NAN and INFINITY floating-point values.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-14245.html">CVE-2017-14245</cve>
<bugzilla href="https://bugzilla.suse.com/1059912">SUSE bug 1059912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1071777">SUSE bug 1071777</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203053" comment="libsndfile-1.0.20-2.19.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209930" comment="libsndfile-32bit-1.0.20-2.19.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14246</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-14246" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14246" source="CVE"/>
    <description>
    An out of bounds read in the function d2ulaw_array() in ulaw.c of libsndfile 1.0.28 may lead to a remote DoS attack or information disclosure, related to mishandling of the NAN and INFINITY floating-point values.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-14246.html">CVE-2017-14246</cve>
<bugzilla href="https://bugzilla.suse.com/1059913">SUSE bug 1059913</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1071767">SUSE bug 1071767</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203053" comment="libsndfile-1.0.20-2.19.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209930" comment="libsndfile-32bit-1.0.20-2.19.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14249</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-14249" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14249" source="CVE"/>
    <description>
    ImageMagick 7.0.6-8 Q16 mishandles EOF checks in ReadMPCImage in coders/mpc.c, leading to division by zero in GetPixelCacheTileSize in MagickCore/cache.c, allowing remote attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-14249.html">CVE-2017-14249</cve>
<bugzilla href="https://bugzilla.suse.com/1058082">SUSE bug 1058082</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202283" comment="ImageMagick-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209124" comment="libMagickCore1-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209125" comment="libMagickCore1-32bit-6.4.3.6-7.78.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14314</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-14314" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314" source="CVE"/>
    <description>
    Off-by-one error in the DrawImage function in magick/render.c in GraphicsMagick 1.3.26 allows remote attackers to cause a denial of service (DrawDashPolygon heap-based buffer over-read and application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-14314.html">CVE-2017-14314</cve>
<bugzilla href="https://bugzilla.suse.com/1058630">SUSE bug 1058630</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202311" comment="ImageMagick-6.4.3.6-78.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209132" comment="libMagickCore1-6.4.3.6-78.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209133" comment="libMagickCore1-32bit-6.4.3.6-78.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14316</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-14316" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14316" source="CVE"/>
    <description>
    A parameter verification issue was discovered in Xen through 4.9.x. The function `alloc_heap_pages` allows callers to specify the first NUMA node that should be used for allocations through the `memflags` parameter; the node is extracted using the `MEMF_get_node` macro. While the function checks to see if the special constant `NUMA_NO_NODE` is specified, it otherwise does not handle the case where `node &gt;= MAX_NUMNODES`. This allows an out-of-bounds access to an internal array.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-14316.html">CVE-2017-14316</cve>
<bugzilla href="https://bugzilla.suse.com/1056278">SUSE bug 1056278</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205982" comment="xen-4.2.5_21-45.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209082" comment="xen-doc-html-4.2.5_21-45.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209083" comment="xen-doc-pdf-4.2.5_21-45.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205983" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.105-45.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205984" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.105-45.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205985" comment="xen-libs-4.2.5_21-45.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209084" comment="xen-libs-32bit-4.2.5_21-45.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209085" comment="xen-tools-4.2.5_21-45.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205986" comment="xen-tools-domU-4.2.5_21-45.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250447" comment="xen-4.2.5_21-47.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250448" comment="xen-doc-html-4.2.5_21-47.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250449" comment="xen-doc-pdf-4.2.5_21-47.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250450" comment="xen-kmp-default-4.2.5_21_3.0.101_0.126.5.TDC-47.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250451" comment="xen-libs-4.2.5_21-47.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250452" comment="xen-tools-4.2.5_21-47.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250453" comment="xen-tools-domU-4.2.5_21-47.10 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14317</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-14317" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14317" source="CVE"/>
    <description>
    A domain cleanup issue was discovered in the C xenstore daemon (aka cxenstored) in Xen through 4.9.x. When shutting down a VM with a stubdomain, a race in cxenstored may cause a double-free. The xenstored daemon may crash, resulting in a DoS of any parts of the system relying on it (including domain creation / destruction, ballooning, device changes, etc.).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-14317.html">CVE-2017-14317</cve>
<bugzilla href="https://bugzilla.suse.com/1056281">SUSE bug 1056281</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205982" comment="xen-4.2.5_21-45.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209082" comment="xen-doc-html-4.2.5_21-45.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209083" comment="xen-doc-pdf-4.2.5_21-45.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205983" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.105-45.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205984" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.105-45.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205985" comment="xen-libs-4.2.5_21-45.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209084" comment="xen-libs-32bit-4.2.5_21-45.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209085" comment="xen-tools-4.2.5_21-45.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205986" comment="xen-tools-domU-4.2.5_21-45.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250447" comment="xen-4.2.5_21-47.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250448" comment="xen-doc-html-4.2.5_21-47.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250449" comment="xen-doc-pdf-4.2.5_21-47.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250450" comment="xen-kmp-default-4.2.5_21_3.0.101_0.126.5.TDC-47.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250451" comment="xen-libs-4.2.5_21-47.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250452" comment="xen-tools-4.2.5_21-47.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250453" comment="xen-tools-domU-4.2.5_21-47.10 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14319</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-14319" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14319" source="CVE"/>
    <description>
    A grant unmapping issue was discovered in Xen through 4.9.x. When removing or replacing a grant mapping, the x86 PV specific path needs to make sure page table entries remain in sync with other accounting done. Although the identity of the page frame was validated correctly, neither the presence of the mapping nor page writability were taken into account.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-14319.html">CVE-2017-14319</cve>
<bugzilla href="https://bugzilla.suse.com/1056282">SUSE bug 1056282</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205982" comment="xen-4.2.5_21-45.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209082" comment="xen-doc-html-4.2.5_21-45.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209083" comment="xen-doc-pdf-4.2.5_21-45.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205983" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.105-45.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205984" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.105-45.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205985" comment="xen-libs-4.2.5_21-45.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209084" comment="xen-libs-32bit-4.2.5_21-45.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209085" comment="xen-tools-4.2.5_21-45.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205986" comment="xen-tools-domU-4.2.5_21-45.8 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250447" comment="xen-4.2.5_21-47.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250448" comment="xen-doc-html-4.2.5_21-47.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250449" comment="xen-doc-pdf-4.2.5_21-47.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250450" comment="xen-kmp-default-4.2.5_21_3.0.101_0.126.5.TDC-47.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250451" comment="xen-libs-4.2.5_21-47.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250452" comment="xen-tools-4.2.5_21-47.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250453" comment="xen-tools-domU-4.2.5_21-47.10 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714326" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14326</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-14326" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14326" source="CVE"/>
    <description>
    In ImageMagick 7.0.7-1 Q16, a memory leak vulnerability was found in the function ReadMATImage in coders/mat.c, which allows attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-14326.html">CVE-2017-14326</cve>
<bugzilla href="https://bugzilla.suse.com/1058640">SUSE bug 1058640</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202283" comment="ImageMagick-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209124" comment="libMagickCore1-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209125" comment="libMagickCore1-32bit-6.4.3.6-7.78.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14340</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-14340" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14340" source="CVE"/>
    <description>
    The XFS_IS_REALTIME_INODE macro in fs/xfs/xfs_linux.h in the Linux kernel before 4.13.2 does not verify that a filesystem has a realtime device, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via vectors related to setting an RHINHERIT flag on a directory.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-14340.html">CVE-2017-14340</cve>
<bugzilla href="https://bugzilla.suse.com/1058524">SUSE bug 1058524</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208652" comment="kernel-bigsmp-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208653" comment="kernel-bigsmp-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208654" comment="kernel-bigsmp-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205524" comment="kernel-default-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205525" comment="kernel-default-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205526" comment="kernel-default-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208655" comment="kernel-default-man-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205527" comment="kernel-ec2-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205528" comment="kernel-ec2-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205529" comment="kernel-ec2-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205530" comment="kernel-pae-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205531" comment="kernel-pae-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205532" comment="kernel-pae-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205533" comment="kernel-source-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205534" comment="kernel-syms-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205535" comment="kernel-trace-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205536" comment="kernel-trace-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205537" comment="kernel-trace-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205538" comment="kernel-xen-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205539" comment="kernel-xen-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205540" comment="kernel-xen-devel-3.0.101-0.47.106.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14341</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-14341" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14341" source="CVE"/>
    <description>
    ImageMagick 7.0.6-6 has a large loop vulnerability in ReadWPGImage in coders/wpg.c, causing CPU exhaustion via a crafted wpg image file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-14341.html">CVE-2017-14341</cve>
<bugzilla href="https://bugzilla.suse.com/1058637">SUSE bug 1058637</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202269" comment="ImageMagick-6.4.3.6-7.78.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209120" comment="libMagickCore1-6.4.3.6-7.78.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209121" comment="libMagickCore1-32bit-6.4.3.6-7.78.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14342</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-14342" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14342" source="CVE"/>
    <description>
    ImageMagick 7.0.6-6 has a memory exhaustion vulnerability in ReadWPGImage in coders/wpg.c via a crafted wpg image file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-14342.html">CVE-2017-14342</cve>
<bugzilla href="https://bugzilla.suse.com/1058485">SUSE bug 1058485</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202269" comment="ImageMagick-6.4.3.6-7.78.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209120" comment="libMagickCore1-6.4.3.6-7.78.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209121" comment="libMagickCore1-32bit-6.4.3.6-7.78.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14343</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-14343" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14343" source="CVE"/>
    <description>
    ImageMagick 7.0.6-6 has a memory leak vulnerability in ReadXCFImage in coders/xcf.c via a crafted xcf image file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-14343.html">CVE-2017-14343</cve>
<bugzilla href="https://bugzilla.suse.com/1058422">SUSE bug 1058422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1082363">SUSE bug 1082363</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202311" comment="ImageMagick-6.4.3.6-78.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209132" comment="libMagickCore1-6.4.3.6-78.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209133" comment="libMagickCore1-32bit-6.4.3.6-78.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14482</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-14482" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14482" source="CVE"/>
    <description>
    GNU Emacs before 25.3 allows remote attackers to execute arbitrary code via email with crafted "Content-Type: text/enriched" data containing an x-display XML element that specifies execution of shell commands, related to an unsafe text/enriched extension in lisp/textmodes/enriched.el, and unsafe Gnus support for enriched and richtext inline MIME objects in lisp/gnus/mm-view.el. In particular, an Emacs user can be instantly compromised by reading a crafted email message (or Usenet news article).
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-14482.html">CVE-2017-14482</cve>
<bugzilla href="https://bugzilla.suse.com/1058425">SUSE bug 1058425</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202505" comment="emacs-22.3-42.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205321" comment="emacs-el-22.3-42.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205322" comment="emacs-info-22.3-42.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202506" comment="emacs-nox-22.3-42.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205323" comment="emacs-x11-22.3-42.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14489</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-14489" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14489" source="CVE"/>
    <description>
    The iscsi_if_rx function in drivers/scsi/scsi_transport_iscsi.c in the Linux kernel through 4.13.2 allows local users to cause a denial of service (panic) by leveraging incorrect length validation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-14489.html">CVE-2017-14489</cve>
<bugzilla href="https://bugzilla.suse.com/1059051">SUSE bug 1059051</bugzilla>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:201714491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14491</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-14491" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14491" source="CVE"/>
    <description>
    Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-14491.html">CVE-2017-14491</cve>
<bugzilla href="https://bugzilla.suse.com/1060354">SUSE bug 1060354</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1060360">SUSE bug 1060360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1060361">SUSE bug 1060361</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1060362">SUSE bug 1060362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1060364">SUSE bug 1060364</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1063832">SUSE bug 1063832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1143944">SUSE bug 1143944</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205320" comment="dnsmasq-2.78-0.16.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14492</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-14492" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14492" source="CVE"/>
    <description>
    Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted IPv6 router advertisement request.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-14492.html">CVE-2017-14492</cve>
<bugzilla href="https://bugzilla.suse.com/1060355">SUSE bug 1060355</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1060360">SUSE bug 1060360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1060361">SUSE bug 1060361</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1060362">SUSE bug 1060362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1060364">SUSE bug 1060364</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1063832">SUSE bug 1063832</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205320" comment="dnsmasq-2.78-0.16.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14493</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-14493" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14493" source="CVE"/>
    <description>
    Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-14493.html">CVE-2017-14493</cve>
<bugzilla href="https://bugzilla.suse.com/1060360">SUSE bug 1060360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1060361">SUSE bug 1060361</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1060362">SUSE bug 1060362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1060364">SUSE bug 1060364</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1063832">SUSE bug 1063832</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205320" comment="dnsmasq-2.78-0.16.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14494</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-14494" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14494" source="CVE"/>
    <description>
    dnsmasq before 2.78, when configured as a relay, allows remote attackers to obtain sensitive memory information via vectors involving handling DHCPv6 forwarded requests.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-14494.html">CVE-2017-14494</cve>
<bugzilla href="https://bugzilla.suse.com/1060360">SUSE bug 1060360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1060361">SUSE bug 1060361</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1060362">SUSE bug 1060362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1060364">SUSE bug 1060364</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205320" comment="dnsmasq-2.78-0.16.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14495</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-14495" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14495" source="CVE"/>
    <description>
    Memory leak in dnsmasq before 2.78, when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service (memory consumption) via vectors involving DNS response creation.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-14495.html">CVE-2017-14495</cve>
<bugzilla href="https://bugzilla.suse.com/1060360">SUSE bug 1060360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1060361">SUSE bug 1060361</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1060362">SUSE bug 1060362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1060364">SUSE bug 1060364</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205320" comment="dnsmasq-2.78-0.16.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14496</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-14496" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14496" source="CVE"/>
    <description>
    Integer underflow in the add_pseudoheader function in dnsmasq before 2.78 , when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service via a crafted DNS request.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-14496.html">CVE-2017-14496</cve>
<bugzilla href="https://bugzilla.suse.com/1060360">SUSE bug 1060360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1060361">SUSE bug 1060361</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1060362">SUSE bug 1060362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1060364">SUSE bug 1060364</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205320" comment="dnsmasq-2.78-0.16.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-14505" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14505" source="CVE"/>
    <description>
    DrawGetStrokeDashArray in wand/drawing-wand.c in ImageMagick 7.0.7-1 mishandles certain NULL arrays, which allows attackers to perform Denial of Service (NULL pointer dereference and application crash in AcquireQuantumMemory within MagickCore/memory.c) by providing a crafted Image File as input.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-14505.html">CVE-2017-14505</cve>
<bugzilla href="https://bugzilla.suse.com/1059735">SUSE bug 1059735</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202311" comment="ImageMagick-6.4.3.6-78.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209132" comment="libMagickCore1-6.4.3.6-78.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209133" comment="libMagickCore1-32bit-6.4.3.6-78.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14531</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-14531" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14531" source="CVE"/>
    <description>
    ImageMagick 7.0.7-0 has a memory exhaustion issue in ReadSUNImage in coders/sun.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-14531.html">CVE-2017-14531</cve>
<bugzilla href="https://bugzilla.suse.com/1057508">SUSE bug 1057508</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1059666">SUSE bug 1059666</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202269" comment="ImageMagick-6.4.3.6-7.78.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209120" comment="libMagickCore1-6.4.3.6-7.78.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209121" comment="libMagickCore1-32bit-6.4.3.6-7.78.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14533</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-14533" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14533" source="CVE"/>
    <description>
    ImageMagick 7.0.6-6 has a memory leak in ReadMATImage in coders/mat.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-14533.html">CVE-2017-14533</cve>
<bugzilla href="https://bugzilla.suse.com/1059751">SUSE bug 1059751</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202283" comment="ImageMagick-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209124" comment="libMagickCore1-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209125" comment="libMagickCore1-32bit-6.4.3.6-7.78.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14604</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-14604" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14604" source="CVE"/>
    <description>
    GNOME Nautilus before 3.23.90 allows attackers to spoof a file type by using the .desktop file extension, as demonstrated by an attack in which a .desktop file's Name field ends in .pdf but this file's Exec field launches a malicious "sh -c" command. In other words, Nautilus provides no UI indication that a file actually has the potentially unsafe .desktop extension; instead, the UI only shows the .pdf extension. One (slightly) mitigating factor is that an attack requires the .desktop file to have execute permission. The solution is to ask the user to confirm that the file is supposed to be treated as a .desktop file, and then remember the user's answer in the metadata::trusted field.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-14604.html">CVE-2017-14604</cve>
<bugzilla href="https://bugzilla.suse.com/1060031">SUSE bug 1060031</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009223521" comment="nautilus-2.28.4-1.16.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009223530" comment="nautilus-32bit-2.28.4-1.16.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009223531" comment="nautilus-lang-2.28.4-1.16.21.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14607</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-14607" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14607" source="CVE"/>
    <description>
    In ImageMagick 7.0.7-4 Q16, an out of bounds read flaw related to ReadTIFFImage has been reported in coders/tiff.c. An attacker could possibly exploit this flaw to disclose potentially sensitive memory or cause an application crash.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-14607.html">CVE-2017-14607</cve>
<bugzilla href="https://bugzilla.suse.com/1059778">SUSE bug 1059778</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202269" comment="ImageMagick-6.4.3.6-7.78.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209120" comment="libMagickCore1-6.4.3.6-7.78.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209121" comment="libMagickCore1-32bit-6.4.3.6-7.78.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14632</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-14632" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14632" source="CVE"/>
    <description>
    Xiph.Org libvorbis 1.3.5 allows Remote Code Execution upon freeing uninitialized memory in the function vorbis_analysis_headerout() in info.c when vi-&gt;channels&lt;=0, a similar issue to Mozilla bug 550184.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-14632.html">CVE-2017-14632</cve>
<bugzilla href="https://bugzilla.suse.com/1059809">SUSE bug 1059809</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203081" comment="libvorbis-1.2.0-79.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209951" comment="libvorbis-32bit-1.2.0-79.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209952" comment="libvorbis-doc-1.2.0-79.20.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14633</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-14633" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14633" source="CVE"/>
    <description>
    In Xiph.Org libvorbis 1.3.5, an out-of-bounds array read vulnerability exists in the function mapping0_forward() in mapping0.c, which may lead to DoS when operating on a crafted audio file with vorbis_analysis().
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-14633.html">CVE-2017-14633</cve>
<bugzilla href="https://bugzilla.suse.com/1059811">SUSE bug 1059811</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1081833">SUSE bug 1081833</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203081" comment="libvorbis-1.2.0-79.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209951" comment="libvorbis-32bit-1.2.0-79.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209952" comment="libvorbis-doc-1.2.0-79.20.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14634</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-14634" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14634" source="CVE"/>
    <description>
    In libsndfile 1.0.28, a divide-by-zero error exists in the function double64_init() in double64.c, which may lead to DoS when playing a crafted audio file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-14634.html">CVE-2017-14634</cve>
<bugzilla href="https://bugzilla.suse.com/1059911">SUSE bug 1059911</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203053" comment="libsndfile-1.0.20-2.19.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209930" comment="libsndfile-32bit-1.0.20-2.19.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14649</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-14649" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14649" source="CVE"/>
    <description>
    ReadOneJNGImage in coders/png.c in GraphicsMagick version 1.3.26 does not properly validate JNG data, leading to a denial of service (assertion failure in magick/pixel_cache.c, and application crash).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-14649.html">CVE-2017-14649</cve>
<bugzilla href="https://bugzilla.suse.com/1060162">SUSE bug 1060162</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202290" comment="ImageMagick-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209126" comment="libMagickCore1-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209127" comment="libMagickCore1-32bit-6.4.3.6-7.78.29 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14695</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS</platform>
    </affected>
    <reference ref_id="CVE-2017-14695" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14695" source="CVE"/>
    <description>
    Directory traversal vulnerability in minion id validation in SaltStack Salt before 2016.3.8, 2016.11.x before 2016.11.8, and 2017.7.x before 2017.7.2 allows remote minions with incorrect credentials to authenticate to a master via a crafted minion ID.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-12791.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-14695.html">CVE-2017-14695</cve>
<bugzilla href="https://bugzilla.suse.com/1053955">SUSE bug 1053955</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1062462">SUSE bug 1062462</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009206236" comment="salt-2016.11.4-43.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206237" comment="salt-doc-2016.11.4-43.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206238" comment="salt-minion-2016.11.4-43.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14696</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS</platform>
    </affected>
    <reference ref_id="CVE-2017-14696" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14696" source="CVE"/>
    <description>
    SaltStack Salt before 2016.3.8, 2016.11.x before 2016.11.8, and 2017.7.x before 2017.7.2 allows remote attackers to cause a denial of service via a crafted authentication request.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-14696.html">CVE-2017-14696</cve>
<bugzilla href="https://bugzilla.suse.com/1053955">SUSE bug 1053955</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1062464">SUSE bug 1062464</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009206236" comment="salt-2016.11.4-43.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206237" comment="salt-doc-2016.11.4-43.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206238" comment="salt-minion-2016.11.4-43.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14733</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-14733" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733" source="CVE"/>
    <description>
    ReadRLEImage in coders/rle.c in GraphicsMagick 1.3.26 mishandles RLE headers that specify too few colors, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-14733.html">CVE-2017-14733</cve>
<bugzilla href="https://bugzilla.suse.com/1060577">SUSE bug 1060577</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202269" comment="ImageMagick-6.4.3.6-7.78.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209120" comment="libMagickCore1-6.4.3.6-7.78.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209121" comment="libMagickCore1-32bit-6.4.3.6-7.78.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14798</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-14798" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14798" source="CVE"/>
    <description>
    A race condition in the postgresql init script could be used by attackers able to access the postgresql account to escalate their privileges to root.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-14798.html">CVE-2017-14798</cve>
<bugzilla href="https://bugzilla.suse.com/1062722">SUSE bug 1062722</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210625" comment="postgresql-init-9.4-0.5.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14952</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-14952" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14952" source="CVE"/>
    <description>
    Double free in i18n/zonemeta.cpp in International Components for Unicode (ICU) for C/C++ through 59.1 allows remote attackers to execute arbitrary code via a crafted string, aka a "redundant UVector entry clean up function call" issue.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-14952.html">CVE-2017-14952</cve>
<bugzilla href="https://bugzilla.suse.com/1067203">SUSE bug 1067203</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123121">SUSE bug 1123121</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202740" comment="icu-4.0-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209360" comment="libicu-4.0-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202741" comment="libicu-32bit-4.0-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209361" comment="libicu-doc-4.0-47.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14977</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-14977" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14977" source="CVE"/>
    <description>
    The FoFiTrueType::getCFFBlock function in FoFiTrueType.cc in Poppler 0.59.0 has a NULL pointer dereference vulnerability due to lack of validation of a table pointer, which allows an attacker to launch a denial of service attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-14977.html">CVE-2017-14977</cve>
<bugzilla href="https://bugzilla.suse.com/1061265">SUSE bug 1061265</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009223533" comment="libpoppler-glib4-0.12.3-1.13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009223534" comment="libpoppler-qt4-3-0.12.3-1.13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009223535" comment="libpoppler5-0.12.3-1.13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009223528" comment="poppler-0.12.3-1.13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009223529" comment="poppler-tools-0.12.3-1.13.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14997</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-14997" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997" source="CVE"/>
    <description>
    GraphicsMagick 1.3.26 allows remote attackers to cause a denial of service (excessive memory allocation) because of an integer underflow in ReadPICTImage in coders/pict.c.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-14997.html">CVE-2017-14997</cve>
<bugzilla href="https://bugzilla.suse.com/1112399">SUSE bug 1112399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1117463">SUSE bug 1117463</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239793" comment="ImageMagick-6.4.3.6-78.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009239803" comment="libMagickCore1-6.4.3.6-78.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009239804" comment="libMagickCore1-32bit-6.4.3.6-78.79 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15016</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-15016" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15016" source="CVE"/>
    <description>
    ImageMagick 7.0.7-0 Q16 has a NULL pointer dereference vulnerability in ReadEnhMetaFile in coders/emf.c.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-15016.html">CVE-2017-15016</cve>
<bugzilla href="https://bugzilla.suse.com/1082291">SUSE bug 1082291</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202311" comment="ImageMagick-6.4.3.6-78.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209132" comment="libMagickCore1-6.4.3.6-78.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209133" comment="libMagickCore1-32bit-6.4.3.6-78.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15017</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-15017" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15017" source="CVE"/>
    <description>
    ImageMagick 7.0.7-0 Q16 has a NULL pointer dereference vulnerability in ReadOneMNGImage in coders/png.c.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-15017.html">CVE-2017-15017</cve>
<bugzilla href="https://bugzilla.suse.com/1082283">SUSE bug 1082283</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202311" comment="ImageMagick-6.4.3.6-78.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209132" comment="libMagickCore1-6.4.3.6-78.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209133" comment="libMagickCore1-32bit-6.4.3.6-78.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715033" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15033</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-15033" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15033" source="CVE"/>
    <description>
    ImageMagick version 7.0.7-2 contains a memory leak in ReadYUVImage in coders/yuv.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-15033.html">CVE-2017-15033</cve>
<bugzilla href="https://bugzilla.suse.com/1061873">SUSE bug 1061873</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202262" comment="ImageMagick-6.4.3.6-7.78.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209118" comment="libMagickCore1-6.4.3.6-7.78.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209119" comment="libMagickCore1-32bit-6.4.3.6-7.78.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15038</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-15038" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038" source="CVE"/>
    <description>
    Race condition in the v9fs_xattrwalk function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS users to obtain sensitive information from host heap memory via vectors related to reading extended attributes.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-15038.html">CVE-2017-15038</cve>
<bugzilla href="https://bugzilla.suse.com/1062069">SUSE bug 1062069</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205626" comment="kvm-1.4.2-53.11 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15088</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-15088" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15088" source="CVE"/>
    <description>
    plugins/preauth/pkinit/pkinit_crypto_openssl.c in MIT Kerberos 5 (aka krb5) through 1.15.2 mishandles Distinguished Name (DN) fields, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) in situations involving untrusted X.509 data, related to the get_matching_data and X509_NAME_oneline_ex functions. NOTE: this has security relevance only in use cases outside of the MIT Kerberos distribution, e.g., the use of get_matching_data in KDC certauth plugin code that is specific to Red Hat.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-15088.html">CVE-2017-15088</cve>
<bugzilla href="https://bugzilla.suse.com/1065274">SUSE bug 1065274</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009248596" comment="krb5-1.8.6-133.49.125.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248597" comment="krb5-32bit-1.8.6-133.49.125.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248598" comment="krb5-apps-clients-1.8.6-133.49.125.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248599" comment="krb5-apps-servers-1.8.6-133.49.125.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248600" comment="krb5-client-1.8.6-133.49.125.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248601" comment="krb5-devel-1.8.6-133.49.125.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248602" comment="krb5-devel-32bit-1.8.6-133.49.125.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248603" comment="krb5-doc-1.8.6-133.49.125.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248604" comment="krb5-plugin-kdb-ldap-1.8.6-133.49.125.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248605" comment="krb5-plugin-preauth-pkinit-1.8.6-133.49.125.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248606" comment="krb5-server-1.8.6-133.49.125.16 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15098</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-15098" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15098" source="CVE"/>
    <description>
    Invalid json_populate_recordset or jsonb_populate_recordset function calls in PostgreSQL 10.x before 10.1, 9.6.x before 9.6.6, 9.5.x before 9.5.10, 9.4.x before 9.4.15, and 9.3.x before 9.3.20 can crash the server or disclose a few bytes of server memory.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-15098.html">CVE-2017-15098</cve>
<bugzilla href="https://bugzilla.suse.com/1067844">SUSE bug 1067844</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210642" comment="libecpg6-9.4.15-0.23.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210643" comment="libpq5-9.4.15-0.23.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210644" comment="libpq5-32bit-9.4.15-0.23.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210645" comment="postgresql94-9.4.15-0.23.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210646" comment="postgresql94-contrib-9.4.15-0.23.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210647" comment="postgresql94-docs-9.4.15-0.23.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203391" comment="postgresql94-libs-9.4.15-0.23.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210648" comment="postgresql94-server-9.4.15-0.23.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15101</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-15101" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15101" source="CVE"/>
    <description>
    A missing patch for a stack-based buffer overflow in findTable() was found in Red Hat version of liblouis before 2.5.4. An attacker could cause a denial of service condition or potentially even arbitrary code execution.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-15101.html">CVE-2017-15101</cve>
<bugzilla href="https://bugzilla.suse.com/1067336">SUSE bug 1067336</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209919" comment="liblouis-1.7.0-1.3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209920" comment="liblouis0-1.7.0-1.3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209921" comment="python-louis-1.7.0-1.3.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15102</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-15102" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15102" source="CVE"/>
    <description>
    The tower_probe function in drivers/usb/misc/legousbtower.c in the Linux kernel before 4.8.1 allows local users (who are physically proximate for inserting a crafted USB device) to gain privileges by leveraging a write-what-where condition that occurs after a race condition and a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-15102.html">CVE-2017-15102</cve>
<bugzilla href="https://bugzilla.suse.com/1066705">SUSE bug 1066705</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208652" comment="kernel-bigsmp-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208653" comment="kernel-bigsmp-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208654" comment="kernel-bigsmp-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205524" comment="kernel-default-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205525" comment="kernel-default-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205526" comment="kernel-default-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208655" comment="kernel-default-man-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205527" comment="kernel-ec2-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205528" comment="kernel-ec2-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205529" comment="kernel-ec2-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205530" comment="kernel-pae-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205531" comment="kernel-pae-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205532" comment="kernel-pae-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205533" comment="kernel-source-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205534" comment="kernel-syms-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205535" comment="kernel-trace-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205536" comment="kernel-trace-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205537" comment="kernel-trace-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205538" comment="kernel-xen-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205539" comment="kernel-xen-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205540" comment="kernel-xen-devel-3.0.101-0.47.106.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15107</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-15107" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15107" source="CVE"/>
    <description>
    A vulnerability was found in the implementation of DNSSEC in Dnsmasq up to and including 2.78. Wildcard synthesized NSEC records could be improperly interpreted to prove the non-existence of hostnames that actually exist.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-15107.html">CVE-2017-15107</cve>
<bugzilla href="https://bugzilla.suse.com/1076958">SUSE bug 1076958</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254108" comment="dnsmasq-2.78-0.16.8 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15115</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-15115" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15115" source="CVE"/>
    <description>
    The sctp_do_peeloff function in net/sctp/socket.c in the Linux kernel before 4.14 does not check whether the intended netns is used in a peel-off action, which allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-15115.html">CVE-2017-15115</cve>
<bugzilla href="https://bugzilla.suse.com/1068671">SUSE bug 1068671</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208652" comment="kernel-bigsmp-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208653" comment="kernel-bigsmp-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208654" comment="kernel-bigsmp-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205524" comment="kernel-default-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205525" comment="kernel-default-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205526" comment="kernel-default-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208655" comment="kernel-default-man-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205527" comment="kernel-ec2-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205528" comment="kernel-ec2-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205529" comment="kernel-ec2-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205530" comment="kernel-pae-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205531" comment="kernel-pae-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205532" comment="kernel-pae-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205533" comment="kernel-source-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205534" comment="kernel-syms-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205535" comment="kernel-trace-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205536" comment="kernel-trace-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205537" comment="kernel-trace-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205538" comment="kernel-xen-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205539" comment="kernel-xen-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205540" comment="kernel-xen-devel-3.0.101-0.47.106.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15191</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-15191" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15191" source="CVE"/>
    <description>
    In Wireshark 2.4.0 to 2.4.1, 2.2.0 to 2.2.9, and 2.0.0 to 2.0.15, the DMP dissector could crash. This was addressed in epan/dissectors/packet-dmp.c by validating a string length.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-15191.html">CVE-2017-15191</cve>
<bugzilla href="https://bugzilla.suse.com/1062645">SUSE bug 1062645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/983671">SUSE bug 983671</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203595" comment="libsmi-0.4.5-2.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203596" comment="libwireshark8-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203597" comment="libwiretap6-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203598" comment="libwscodecs1-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203599" comment="libwsutil7-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203600" comment="portaudio-19-234.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203602" comment="wireshark-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203604" comment="wireshark-gtk-2.2.11-40.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15192</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-15192" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15192" source="CVE"/>
    <description>
    In Wireshark 2.4.0 to 2.4.1 and 2.2.0 to 2.2.9, the BT ATT dissector could crash. This was addressed in epan/dissectors/packet-btatt.c by considering a case where not all of the BTATT packets have the same encapsulation level.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-15192.html">CVE-2017-15192</cve>
<bugzilla href="https://bugzilla.suse.com/1062645">SUSE bug 1062645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/983671">SUSE bug 983671</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203595" comment="libsmi-0.4.5-2.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203596" comment="libwireshark8-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203597" comment="libwiretap6-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203598" comment="libwscodecs1-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203599" comment="libwsutil7-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203600" comment="portaudio-19-234.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203602" comment="wireshark-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203604" comment="wireshark-gtk-2.2.11-40.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15193</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-15193" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15193" source="CVE"/>
    <description>
    In Wireshark 2.4.0 to 2.4.1 and 2.2.0 to 2.2.9, the MBIM dissector could crash or exhaust system memory. This was addressed in epan/dissectors/packet-mbim.c by changing the memory-allocation approach.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-15193.html">CVE-2017-15193</cve>
<bugzilla href="https://bugzilla.suse.com/1062645">SUSE bug 1062645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/983671">SUSE bug 983671</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203595" comment="libsmi-0.4.5-2.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203596" comment="libwireshark8-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203597" comment="libwiretap6-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203598" comment="libwscodecs1-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203599" comment="libwsutil7-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203600" comment="portaudio-19-234.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203602" comment="wireshark-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203604" comment="wireshark-gtk-2.2.11-40.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15218</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-15218" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15218" source="CVE"/>
    <description>
    ImageMagick 7.0.7-2 has a memory leak in ReadOneJNGImage in coders/png.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-15218.html">CVE-2017-15218</cve>
<bugzilla href="https://bugzilla.suse.com/1047910">SUSE bug 1047910</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1062752">SUSE bug 1062752</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202290" comment="ImageMagick-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209126" comment="libMagickCore1-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209127" comment="libMagickCore1-32bit-6.4.3.6-7.78.29 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15232</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-15232" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15232" source="CVE"/>
    <description>
    libjpeg-turbo 1.5.2 has a NULL Pointer Dereference in jdpostct.c and jquant1.c via a crafted JPEG file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-15232.html">CVE-2017-15232</cve>
<bugzilla href="https://bugzilla.suse.com/1062937">SUSE bug 1062937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1149960">SUSE bug 1149960</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009229516" comment="jpeg-6b-879.12.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229524" comment="libjpeg-6.2.0-879.12.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229525" comment="libjpeg-32bit-6.2.0-879.12.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15265</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-15265" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15265" source="CVE"/>
    <description>
    Race condition in the ALSA subsystem in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clientmgr.c and sound/core/seq/seq_ports.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-15265.html">CVE-2017-15265</cve>
<bugzilla href="https://bugzilla.suse.com/1062520">SUSE bug 1062520</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208652" comment="kernel-bigsmp-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208653" comment="kernel-bigsmp-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208654" comment="kernel-bigsmp-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205524" comment="kernel-default-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205525" comment="kernel-default-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205526" comment="kernel-default-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208655" comment="kernel-default-man-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205527" comment="kernel-ec2-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205528" comment="kernel-ec2-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205529" comment="kernel-ec2-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205530" comment="kernel-pae-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205531" comment="kernel-pae-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205532" comment="kernel-pae-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205533" comment="kernel-source-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205534" comment="kernel-syms-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205535" comment="kernel-trace-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205536" comment="kernel-trace-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205537" comment="kernel-trace-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205538" comment="kernel-xen-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205539" comment="kernel-xen-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205540" comment="kernel-xen-devel-3.0.101-0.47.106.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15274</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-15274" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15274" source="CVE"/>
    <description>
    security/keys/keyctl.c in the Linux kernel before 4.11.5 does not consider the case of a NULL payload in conjunction with a nonzero length value, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted add_key or keyctl system call, a different vulnerability than CVE-2017-12192.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-15274.html">CVE-2017-15274</cve>
<bugzilla href="https://bugzilla.suse.com/1045327">SUSE bug 1045327</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1062471">SUSE bug 1062471</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208652" comment="kernel-bigsmp-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208653" comment="kernel-bigsmp-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208654" comment="kernel-bigsmp-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205524" comment="kernel-default-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205525" comment="kernel-default-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205526" comment="kernel-default-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208655" comment="kernel-default-man-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205527" comment="kernel-ec2-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205528" comment="kernel-ec2-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205529" comment="kernel-ec2-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205530" comment="kernel-pae-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205531" comment="kernel-pae-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205532" comment="kernel-pae-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205533" comment="kernel-source-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205534" comment="kernel-syms-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205535" comment="kernel-trace-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205536" comment="kernel-trace-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205537" comment="kernel-trace-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205538" comment="kernel-xen-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205539" comment="kernel-xen-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205540" comment="kernel-xen-devel-3.0.101-0.47.106.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15275</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-15275" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15275" source="CVE"/>
    <description>
    Samba before 4.7.3 might allow remote attackers to obtain sensitive information by leveraging failure of the server to clear allocated heap memory.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-15275.html">CVE-2017-15275</cve>
<bugzilla href="https://bugzilla.suse.com/1063008">SUSE bug 1063008</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205925" comment="ldapsmb-1.34b-94.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205926" comment="libldb1-3.6.3-94.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205927" comment="libsmbclient0-3.6.3-94.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209017" comment="libsmbclient0-32bit-3.6.3-94.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205928" comment="libtalloc2-3.6.3-94.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209018" comment="libtalloc2-32bit-3.6.3-94.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205929" comment="libtdb1-3.6.3-94.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209019" comment="libtdb1-32bit-3.6.3-94.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205930" comment="libtevent0-3.6.3-94.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209020" comment="libtevent0-32bit-3.6.3-94.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205931" comment="libwbclient0-3.6.3-94.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209021" comment="libwbclient0-32bit-3.6.3-94.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203528" comment="samba-3.6.3-94.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209022" comment="samba-32bit-3.6.3-94.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205932" comment="samba-client-3.6.3-94.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209023" comment="samba-client-32bit-3.6.3-94.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205933" comment="samba-doc-3.6.3-94.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205934" comment="samba-krb-printing-3.6.3-94.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205935" comment="samba-winbind-3.6.3-94.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209024" comment="samba-winbind-32bit-3.6.3-94.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15277</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-15277" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277" source="CVE"/>
    <description>
    ReadGIFImage in coders/gif.c in ImageMagick 7.0.6-1 and GraphicsMagick 1.3.26 leaves the palette uninitialized when processing a GIF file that has neither a global nor local palette. If the affected product is used as a library loaded into a process that operates on interesting data, this data sometimes can be leaked via the uninitialized palette.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-15277.html">CVE-2017-15277</cve>
<bugzilla href="https://bugzilla.suse.com/1063050">SUSE bug 1063050</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202276" comment="ImageMagick-6.4.3.6-7.78.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209122" comment="libMagickCore1-6.4.3.6-7.78.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209123" comment="libMagickCore1-32bit-6.4.3.6-7.78.17 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15281</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-15281" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15281" source="CVE"/>
    <description>
    ReadPSDImage in coders/psd.c in ImageMagick 7.0.7-6 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file, related to "Conditional jump or move depends on uninitialised value(s)."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-15281.html">CVE-2017-15281</cve>
<bugzilla href="https://bugzilla.suse.com/1063049">SUSE bug 1063049</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1072901">SUSE bug 1072901</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202276" comment="ImageMagick-6.4.3.6-7.78.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209122" comment="libMagickCore1-6.4.3.6-7.78.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209123" comment="libMagickCore1-32bit-6.4.3.6-7.78.17 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15289</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-15289" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289" source="CVE"/>
    <description>
    The mode4and5 write functions in hw/display/cirrus_vga.c in Qemu allow local OS guest privileged users to cause a denial of service (out-of-bounds write access and Qemu process crash) via vectors related to dst calculation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-15289.html">CVE-2017-15289</cve>
<bugzilla href="https://bugzilla.suse.com/1063122">SUSE bug 1063122</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1063123">SUSE bug 1063123</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205626" comment="kvm-1.4.2-53.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205992" comment="xen-4.2.5_21-45.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209090" comment="xen-doc-html-4.2.5_21-45.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209091" comment="xen-doc-pdf-4.2.5_21-45.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205993" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.8-45.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205994" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.8-45.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205995" comment="xen-libs-4.2.5_21-45.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209092" comment="xen-libs-32bit-4.2.5_21-45.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209093" comment="xen-tools-4.2.5_21-45.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205996" comment="xen-tools-domU-4.2.5_21-45.16 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205626" comment="kvm-1.4.2-53.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250461" comment="xen-4.2.5_21-47.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250462" comment="xen-doc-html-4.2.5_21-47.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250463" comment="xen-doc-pdf-4.2.5_21-47.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250464" comment="xen-kmp-default-4.2.5_21_3.0.101_0.139.TDC-47.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250465" comment="xen-libs-4.2.5_21-47.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250466" comment="xen-tools-4.2.5_21-47.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250467" comment="xen-tools-domU-4.2.5_21-47.16 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15412</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-15412" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15412" source="CVE"/>
    <description>
    Use after free in libxml2 before 2.9.5, as used in Google Chrome prior to 63.0.3239.84 and other products, allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-15412.html">CVE-2017-15412</cve>
<bugzilla href="https://bugzilla.suse.com/1071691">SUSE bug 1071691</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1077993">SUSE bug 1077993</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123129">SUSE bug 1123129</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203110" comment="libxml2-2.7.6-0.77.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209985" comment="libxml2-32bit-2.7.6-0.77.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209986" comment="libxml2-doc-2.7.6-0.77.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209987" comment="libxml2-python-2.7.6-0.77.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-15422" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15422" source="CVE"/>
    <description>
    Integer overflow in international date handling in International Components for Unicode (ICU) for C/C++ before 60.1, as used in V8 in Google Chrome prior to 63.0.3239.84 and other products, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-15422.html">CVE-2017-15422</cve>
<bugzilla href="https://bugzilla.suse.com/1071691">SUSE bug 1071691</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1077999">SUSE bug 1077999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123121">SUSE bug 1123121</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202740" comment="icu-4.0-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209360" comment="libicu-4.0-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202741" comment="libicu-32bit-4.0-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209361" comment="libicu-doc-4.0-47.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15565</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-15565" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15565" source="CVE"/>
    <description>
    In Poppler 0.59.0, a NULL Pointer Dereference exists in the GfxImageColorMap::getGrayLine() function in GfxState.cc via a crafted PDF document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-15565.html">CVE-2017-15565</cve>
<bugzilla href="https://bugzilla.suse.com/1064593">SUSE bug 1064593</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009223533" comment="libpoppler-glib4-0.12.3-1.13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009223534" comment="libpoppler-qt4-3-0.12.3-1.13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009223535" comment="libpoppler5-0.12.3-1.13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009223528" comment="poppler-0.12.3-1.13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009223529" comment="poppler-tools-0.12.3-1.13.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15588</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-15588" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15588" source="CVE"/>
    <description>
    An issue was discovered in Xen through 4.9.x allowing x86 PV guest OS users to execute arbitrary code on the host OS because of a race condition that can cause a stale TLB entry.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-15588.html">CVE-2017-15588</cve>
<bugzilla href="https://bugzilla.suse.com/1061082">SUSE bug 1061082</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205987" comment="xen-4.2.5_21-45.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209086" comment="xen-doc-html-4.2.5_21-45.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209087" comment="xen-doc-pdf-4.2.5_21-45.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205988" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.5-45.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205989" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.5-45.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205990" comment="xen-libs-4.2.5_21-45.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209088" comment="xen-libs-32bit-4.2.5_21-45.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209089" comment="xen-tools-4.2.5_21-45.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205991" comment="xen-tools-domU-4.2.5_21-45.11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250454" comment="xen-4.2.5_21-47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250455" comment="xen-doc-html-4.2.5_21-47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250456" comment="xen-doc-pdf-4.2.5_21-47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250457" comment="xen-kmp-default-4.2.5_21_3.0.101_0.132.TDC-47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250458" comment="xen-libs-4.2.5_21-47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250459" comment="xen-tools-4.2.5_21-47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250460" comment="xen-tools-domU-4.2.5_21-47.13 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15589</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-15589" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15589" source="CVE"/>
    <description>
    An issue was discovered in Xen through 4.9.x allowing x86 HVM guest OS users to obtain sensitive information from the host OS (or an arbitrary guest OS) because intercepted I/O operations can cause a write of data from uninitialized hypervisor stack memory.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-15589.html">CVE-2017-15589</cve>
<bugzilla href="https://bugzilla.suse.com/1061080">SUSE bug 1061080</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205987" comment="xen-4.2.5_21-45.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209086" comment="xen-doc-html-4.2.5_21-45.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209087" comment="xen-doc-pdf-4.2.5_21-45.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205988" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.5-45.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205989" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.5-45.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205990" comment="xen-libs-4.2.5_21-45.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209088" comment="xen-libs-32bit-4.2.5_21-45.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209089" comment="xen-tools-4.2.5_21-45.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205991" comment="xen-tools-domU-4.2.5_21-45.11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250454" comment="xen-4.2.5_21-47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250455" comment="xen-doc-html-4.2.5_21-47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250456" comment="xen-doc-pdf-4.2.5_21-47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250457" comment="xen-kmp-default-4.2.5_21_3.0.101_0.132.TDC-47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250458" comment="xen-libs-4.2.5_21-47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250459" comment="xen-tools-4.2.5_21-47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250460" comment="xen-tools-domU-4.2.5_21-47.13 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15590</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-15590" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15590" source="CVE"/>
    <description>
    An issue was discovered in Xen through 4.9.x allowing x86 guest OS users to cause a denial of service (hypervisor crash) or possibly gain privileges because MSI mapping was mishandled.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-15590.html">CVE-2017-15590</cve>
<bugzilla href="https://bugzilla.suse.com/1061076">SUSE bug 1061076</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205987" comment="xen-4.2.5_21-45.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209086" comment="xen-doc-html-4.2.5_21-45.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209087" comment="xen-doc-pdf-4.2.5_21-45.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205988" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.5-45.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205989" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.5-45.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205990" comment="xen-libs-4.2.5_21-45.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209088" comment="xen-libs-32bit-4.2.5_21-45.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209089" comment="xen-tools-4.2.5_21-45.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205991" comment="xen-tools-domU-4.2.5_21-45.11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250454" comment="xen-4.2.5_21-47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250455" comment="xen-doc-html-4.2.5_21-47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250456" comment="xen-doc-pdf-4.2.5_21-47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250457" comment="xen-kmp-default-4.2.5_21_3.0.101_0.132.TDC-47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250458" comment="xen-libs-4.2.5_21-47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250459" comment="xen-tools-4.2.5_21-47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250460" comment="xen-tools-domU-4.2.5_21-47.13 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15592</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-15592" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15592" source="CVE"/>
    <description>
    An issue was discovered in Xen through 4.9.x allowing x86 HVM guest OS users to cause a denial of service (hypervisor crash) or possibly gain privileges because self-linear shadow mappings are mishandled for translated guests.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-15592.html">CVE-2017-15592</cve>
<bugzilla href="https://bugzilla.suse.com/1061086">SUSE bug 1061086</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205992" comment="xen-4.2.5_21-45.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209090" comment="xen-doc-html-4.2.5_21-45.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209091" comment="xen-doc-pdf-4.2.5_21-45.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205993" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.8-45.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205994" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.8-45.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205995" comment="xen-libs-4.2.5_21-45.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209092" comment="xen-libs-32bit-4.2.5_21-45.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209093" comment="xen-tools-4.2.5_21-45.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205996" comment="xen-tools-domU-4.2.5_21-45.16 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250461" comment="xen-4.2.5_21-47.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250462" comment="xen-doc-html-4.2.5_21-47.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250463" comment="xen-doc-pdf-4.2.5_21-47.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250464" comment="xen-kmp-default-4.2.5_21_3.0.101_0.139.TDC-47.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250465" comment="xen-libs-4.2.5_21-47.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250466" comment="xen-tools-4.2.5_21-47.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250467" comment="xen-tools-domU-4.2.5_21-47.16 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15593</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-15593" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15593" source="CVE"/>
    <description>
    An issue was discovered in Xen through 4.9.x allowing x86 PV guest OS users to cause a denial of service (memory leak) because reference counts are mishandled.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-15593.html">CVE-2017-15593</cve>
<bugzilla href="https://bugzilla.suse.com/1061084">SUSE bug 1061084</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205987" comment="xen-4.2.5_21-45.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209086" comment="xen-doc-html-4.2.5_21-45.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209087" comment="xen-doc-pdf-4.2.5_21-45.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205988" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.5-45.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205989" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.5-45.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205990" comment="xen-libs-4.2.5_21-45.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209088" comment="xen-libs-32bit-4.2.5_21-45.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209089" comment="xen-tools-4.2.5_21-45.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205991" comment="xen-tools-domU-4.2.5_21-45.11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250454" comment="xen-4.2.5_21-47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250455" comment="xen-doc-html-4.2.5_21-47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250456" comment="xen-doc-pdf-4.2.5_21-47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250457" comment="xen-kmp-default-4.2.5_21_3.0.101_0.132.TDC-47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250458" comment="xen-libs-4.2.5_21-47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250459" comment="xen-tools-4.2.5_21-47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250460" comment="xen-tools-domU-4.2.5_21-47.13 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15594</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-15594" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15594" source="CVE"/>
    <description>
    An issue was discovered in Xen through 4.9.x allowing x86 SVM PV guest OS users to cause a denial of service (hypervisor crash) or gain privileges because IDT settings are mishandled during CPU hotplugging.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-15594.html">CVE-2017-15594</cve>
<bugzilla href="https://bugzilla.suse.com/1061087">SUSE bug 1061087</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205987" comment="xen-4.2.5_21-45.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209086" comment="xen-doc-html-4.2.5_21-45.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209087" comment="xen-doc-pdf-4.2.5_21-45.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205988" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.5-45.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205989" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.5-45.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205990" comment="xen-libs-4.2.5_21-45.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209088" comment="xen-libs-32bit-4.2.5_21-45.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209089" comment="xen-tools-4.2.5_21-45.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205991" comment="xen-tools-domU-4.2.5_21-45.11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250454" comment="xen-4.2.5_21-47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250455" comment="xen-doc-html-4.2.5_21-47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250456" comment="xen-doc-pdf-4.2.5_21-47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250457" comment="xen-kmp-default-4.2.5_21_3.0.101_0.132.TDC-47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250458" comment="xen-libs-4.2.5_21-47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250459" comment="xen-tools-4.2.5_21-47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250460" comment="xen-tools-domU-4.2.5_21-47.13 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15595</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-15595" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15595" source="CVE"/>
    <description>
    An issue was discovered in Xen through 4.9.x allowing x86 PV guest OS users to cause a denial of service (unbounded recursion, stack consumption, and hypervisor crash) or possibly gain privileges via crafted page-table stacking.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-15595.html">CVE-2017-15595</cve>
<bugzilla href="https://bugzilla.suse.com/1061081">SUSE bug 1061081</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205997" comment="xen-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209094" comment="xen-doc-html-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209095" comment="xen-doc-pdf-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205998" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205999" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206000" comment="xen-libs-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209096" comment="xen-libs-32bit-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209097" comment="xen-tools-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206001" comment="xen-tools-domU-4.2.5_21-45.19 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250468" comment="xen-4.2.5_21-47.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250469" comment="xen-doc-html-4.2.5_21-47.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250470" comment="xen-doc-pdf-4.2.5_21-47.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250471" comment="xen-kmp-default-4.2.5_21_3.0.101_0.150.TDC-47.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250472" comment="xen-libs-4.2.5_21-47.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250473" comment="xen-tools-4.2.5_21-47.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250474" comment="xen-tools-domU-4.2.5_21-47.21 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15597</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-15597" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15597" source="CVE"/>
    <description>
    An issue was discovered in Xen through 4.9.x. Grant copying code made an implication that any grant pin would be accompanied by a suitable page reference. Other portions of code, however, did not match up with that assumption. When such a grant copy operation is being done on a grant of a dying domain, the assumption turns out wrong. A malicious guest administrator can cause hypervisor memory corruption, most likely resulting in host crash and a Denial of Service. Privilege escalation and information leaks cannot be ruled out.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-15597.html">CVE-2017-15597</cve>
<bugzilla href="https://bugzilla.suse.com/1061075">SUSE bug 1061075</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205992" comment="xen-4.2.5_21-45.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209090" comment="xen-doc-html-4.2.5_21-45.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209091" comment="xen-doc-pdf-4.2.5_21-45.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205993" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.8-45.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205994" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.8-45.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205995" comment="xen-libs-4.2.5_21-45.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209092" comment="xen-libs-32bit-4.2.5_21-45.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209093" comment="xen-tools-4.2.5_21-45.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205996" comment="xen-tools-domU-4.2.5_21-45.16 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250461" comment="xen-4.2.5_21-47.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250462" comment="xen-doc-html-4.2.5_21-47.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250463" comment="xen-doc-pdf-4.2.5_21-47.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250464" comment="xen-kmp-default-4.2.5_21_3.0.101_0.139.TDC-47.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250465" comment="xen-libs-4.2.5_21-47.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250466" comment="xen-tools-4.2.5_21-47.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250467" comment="xen-tools-domU-4.2.5_21-47.16 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15638</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-15638" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15638" source="CVE"/>
    <description>
    The SuSEfirewall2 package before 3.6.312-2.13.1 in SUSE Linux Enterprise (SLE) Desktop 12 SP2, Server 12 SP2, and Server for Raspberry Pi 12 SP2; before 3.6.312.333-3.10.1 in SLE Desktop 12 SP3 and Server 12 SP3; before 3.6_SVNr208-2.18.3.1 in SLE Server 11 SP4; before 3.6.312-5.9.1 in openSUSE Leap 42.2; and before 3.6.312.333-7.1 in openSUSE Leap 42.3 might allow remote attackers to bypass intended access restrictions on the portmap service by leveraging a missing source net restriction for _rpc_ services.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-15638.html">CVE-2017-15638</cve>
<bugzilla href="https://bugzilla.suse.com/1064127">SUSE bug 1064127</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209162" comment="SuSEfirewall2-3.6_SVNr208-2.18.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15670</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-15670" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15670" source="CVE"/>
    <description>
    The GNU C Library (aka glibc or libc6) before 2.27 contains an off-by-one error leading to a heap-based buffer overflow in the glob function in glob.c, related to the processing of home directories using the ~ operator followed by a long string.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-15670.html">CVE-2017-15670</cve>
<bugzilla href="https://bugzilla.suse.com/1064583">SUSE bug 1064583</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009235436" comment="glibc-2.11.3-17.110.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235452" comment="glibc-32bit-2.11.3-17.110.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235447" comment="glibc-devel-2.11.3-17.110.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235453" comment="glibc-devel-32bit-2.11.3-17.110.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235437" comment="glibc-html-2.11.3-17.110.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235448" comment="glibc-i18ndata-2.11.3-17.110.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235438" comment="glibc-info-2.11.3-17.110.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235449" comment="glibc-locale-2.11.3-17.110.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235454" comment="glibc-locale-32bit-2.11.3-17.110.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235450" comment="glibc-profile-2.11.3-17.110.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235455" comment="glibc-profile-32bit-2.11.3-17.110.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235451" comment="nscd-2.11.3-17.110.19 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15671</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-15671" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15671" source="CVE"/>
    <description>
    The glob function in glob.c in the GNU C Library (aka glibc or libc6) before 2.27, when invoked with GLOB_TILDE, could skip freeing allocated memory when processing the ~ operator with a long user name, potentially leading to a denial of service (memory leak).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-15671.html">CVE-2017-15671</cve>
<bugzilla href="https://bugzilla.suse.com/1064569">SUSE bug 1064569</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1135444">SUSE bug 1135444</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009241585" comment="glibc-2.11.3-17.110.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241593" comment="glibc-32bit-2.11.3-17.110.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241588" comment="glibc-devel-2.11.3-17.110.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241594" comment="glibc-devel-32bit-2.11.3-17.110.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241586" comment="glibc-html-2.11.3-17.110.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241589" comment="glibc-i18ndata-2.11.3-17.110.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241587" comment="glibc-info-2.11.3-17.110.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241590" comment="glibc-locale-2.11.3-17.110.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241595" comment="glibc-locale-32bit-2.11.3-17.110.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241591" comment="glibc-profile-2.11.3-17.110.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241596" comment="glibc-profile-32bit-2.11.3-17.110.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241592" comment="nscd-2.11.3-17.110.24 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15698</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-15698" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15698" source="CVE"/>
    <description>
    When parsing the AIA-Extension field of a client certificate, Apache Tomcat Native Connector 1.2.0 to 1.2.14 and 1.1.23 to 1.1.34 did not correctly handle fields longer than 127 bytes. The result of the parsing error was to skip the OCSP check. It was therefore possible for client certificates that should have been rejected (if the OCSP check had been made) to be accepted. Users not using OCSP checks are not affected by this vulnerability.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-15698.html">CVE-2017-15698</cve>
<bugzilla href="https://bugzilla.suse.com/1078679">SUSE bug 1078679</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247298" comment="libtcnative-1-0-1.3.4-12.5.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15710</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-15710" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15710" source="CVE"/>
    <description>
    In Apache httpd 2.0.23 to 2.0.65, 2.2.0 to 2.2.34, and 2.4.0 to 2.4.29, mod_authnz_ldap, if configured with AuthLDAPCharsetConfig, uses the Accept-Language header value to lookup the right charset encoding when verifying the user's credentials. If the header value is not present in the charset conversion table, a fallback mechanism is used to truncate it to a two characters value to allow a quick retry (for example, 'en-US' is truncated to 'en'). A header value of less than two characters forces an out of bound write of one NUL byte to a memory location that is not part of the string. In the worst case, quite unlikely, the process would crash which could be used as a Denial of Service attack. In the more likely case, this memory is already reserved for future use and the issue has no effect at all.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-15710.html">CVE-2017-15710</cve>
<bugzilla href="https://bugzilla.suse.com/1086776">SUSE bug 1086776</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202414" comment="apache2-2.2.34-70.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202416" comment="apache2-doc-2.2.34-70.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202417" comment="apache2-example-pages-2.2.34-70.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202418" comment="apache2-prefork-2.2.34-70.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202419" comment="apache2-utils-2.2.34-70.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202420" comment="apache2-worker-2.2.34-70.15 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15804</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-15804" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15804" source="CVE"/>
    <description>
    The glob function in glob.c in the GNU C Library (aka glibc or libc6) before 2.27 contains a buffer overflow during unescaping of user names with the ~ operator.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-15804.html">CVE-2017-15804</cve>
<bugzilla href="https://bugzilla.suse.com/1064580">SUSE bug 1064580</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009235436" comment="glibc-2.11.3-17.110.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235452" comment="glibc-32bit-2.11.3-17.110.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235447" comment="glibc-devel-2.11.3-17.110.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235453" comment="glibc-devel-32bit-2.11.3-17.110.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235437" comment="glibc-html-2.11.3-17.110.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235448" comment="glibc-i18ndata-2.11.3-17.110.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235438" comment="glibc-info-2.11.3-17.110.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235449" comment="glibc-locale-2.11.3-17.110.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235454" comment="glibc-locale-32bit-2.11.3-17.110.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235450" comment="glibc-profile-2.11.3-17.110.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235455" comment="glibc-profile-32bit-2.11.3-17.110.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235451" comment="nscd-2.11.3-17.110.19 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15868</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-15868" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15868" source="CVE"/>
    <description>
    The bnep_add_connection function in net/bluetooth/bnep/core.c in the Linux kernel before 3.19 does not ensure that an l2cap socket is available, which allows local users to gain privileges via a crafted application.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-15868.html">CVE-2017-15868</cve>
<bugzilla href="https://bugzilla.suse.com/1071470">SUSE bug 1071470</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1071471">SUSE bug 1071471</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208652" comment="kernel-bigsmp-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208653" comment="kernel-bigsmp-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208654" comment="kernel-bigsmp-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205524" comment="kernel-default-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205525" comment="kernel-default-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205526" comment="kernel-default-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208655" comment="kernel-default-man-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205527" comment="kernel-ec2-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205528" comment="kernel-ec2-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205529" comment="kernel-ec2-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205530" comment="kernel-pae-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205531" comment="kernel-pae-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205532" comment="kernel-pae-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205533" comment="kernel-source-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205534" comment="kernel-syms-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205535" comment="kernel-trace-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205536" comment="kernel-trace-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205537" comment="kernel-trace-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205538" comment="kernel-xen-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205539" comment="kernel-xen-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205540" comment="kernel-xen-devel-3.0.101-0.47.106.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15906</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-15906" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15906" source="CVE"/>
    <description>
    The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-15906.html">CVE-2017-15906</cve>
<bugzilla href="https://bugzilla.suse.com/1064285">SUSE bug 1064285</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1065000">SUSE bug 1065000</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1074115">SUSE bug 1074115</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1079488">SUSE bug 1079488</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1090163">SUSE bug 1090163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1099316">SUSE bug 1099316</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009238396" comment="openssh-6.2p2-0.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238397" comment="openssh-askpass-6.2p2-0.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238398" comment="openssh-askpass-gnome-6.2p2-0.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234528" comment="openssh-openssl1-6.6p1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234529" comment="openssh-openssl1-helpers-6.6p1-19.3 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009238396" comment="openssh-6.2p2-0.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238397" comment="openssh-askpass-6.2p2-0.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238398" comment="openssh-askpass-gnome-6.2p2-0.41.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15930</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-15930" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930" source="CVE"/>
    <description>
    In ReadOneJNGImage in coders/png.c in GraphicsMagick 1.3.26, a Null Pointer Dereference occurs while transferring JPEG scanlines, related to a PixelPacket pointer.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-15930.html">CVE-2017-15930</cve>
<bugzilla href="https://bugzilla.suse.com/1066003">SUSE bug 1066003</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202269" comment="ImageMagick-6.4.3.6-7.78.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209120" comment="libMagickCore1-6.4.3.6-7.78.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209121" comment="libMagickCore1-32bit-6.4.3.6-7.78.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16227</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-16227" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16227" source="CVE"/>
    <description>
    The aspath_put function in bgpd/bgp_aspath.c in Quagga before 1.2.2 allows remote attackers to cause a denial of service (session drop) via BGP UPDATE messages, because AS_PATH size calculation for long paths counts certain bytes twice and consequently constructs an invalid message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-16227.html">CVE-2017-16227</cve>
<bugzilla href="https://bugzilla.suse.com/1065641">SUSE bug 1065641</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203426" comment="quagga-0.99.15-0.30.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16352</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-16352" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352" source="CVE"/>
    <description>
    GraphicsMagick 1.3.26 is vulnerable to a heap-based buffer overflow vulnerability found in the "Display visual image directory" feature of the DescribeImage() function of the magick/describe.c file. One possible way to trigger the vulnerability is to run the identify command on a specially crafted MIFF format file with the verbose flag.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-16352.html">CVE-2017-16352</cve>
<bugzilla href="https://bugzilla.suse.com/1066168">SUSE bug 1066168</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1066170">SUSE bug 1066170</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202311" comment="ImageMagick-6.4.3.6-78.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209132" comment="libMagickCore1-6.4.3.6-78.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209133" comment="libMagickCore1-32bit-6.4.3.6-78.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16353</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-16353" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353" source="CVE"/>
    <description>
    GraphicsMagick 1.3.26 is vulnerable to a memory information disclosure vulnerability found in the DescribeImage function of the magick/describe.c file, because of a heap-based buffer over-read. The portion of the code containing the vulnerability is responsible for printing the IPTC Profile information contained in the image. This vulnerability can be triggered with a specially crafted MIFF file. There is an out-of-bounds buffer dereference because certain increments are never checked.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-16353.html">CVE-2017-16353</cve>
<bugzilla href="https://bugzilla.suse.com/1066170">SUSE bug 1066170</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202311" comment="ImageMagick-6.4.3.6-78.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209132" comment="libMagickCore1-6.4.3.6-78.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209133" comment="libMagickCore1-32bit-6.4.3.6-78.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16525</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-16525" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16525" source="CVE"/>
    <description>
    The usb_serial_console_disconnect function in drivers/usb/serial/console.c in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device, related to disconnection and failed setup.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-16525.html">CVE-2017-16525</cve>
<bugzilla href="https://bugzilla.suse.com/1066618">SUSE bug 1066618</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208652" comment="kernel-bigsmp-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208653" comment="kernel-bigsmp-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208654" comment="kernel-bigsmp-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205524" comment="kernel-default-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205525" comment="kernel-default-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205526" comment="kernel-default-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208655" comment="kernel-default-man-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205527" comment="kernel-ec2-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205528" comment="kernel-ec2-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205529" comment="kernel-ec2-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205530" comment="kernel-pae-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205531" comment="kernel-pae-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205532" comment="kernel-pae-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205533" comment="kernel-source-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205534" comment="kernel-syms-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205535" comment="kernel-trace-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205536" comment="kernel-trace-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205537" comment="kernel-trace-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205538" comment="kernel-xen-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205539" comment="kernel-xen-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205540" comment="kernel-xen-devel-3.0.101-0.47.106.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16527</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-16527" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16527" source="CVE"/>
    <description>
    sound/usb/mixer.c in the Linux kernel before 4.13.8 allows local users to cause a denial of service (snd_usb_mixer_interrupt use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-16527.html">CVE-2017-16527</cve>
<bugzilla href="https://bugzilla.suse.com/1066625">SUSE bug 1066625</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208652" comment="kernel-bigsmp-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208653" comment="kernel-bigsmp-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208654" comment="kernel-bigsmp-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205524" comment="kernel-default-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205525" comment="kernel-default-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205526" comment="kernel-default-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208655" comment="kernel-default-man-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205527" comment="kernel-ec2-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205528" comment="kernel-ec2-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205529" comment="kernel-ec2-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205530" comment="kernel-pae-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205531" comment="kernel-pae-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205532" comment="kernel-pae-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205533" comment="kernel-source-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205534" comment="kernel-syms-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205535" comment="kernel-trace-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205536" comment="kernel-trace-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205537" comment="kernel-trace-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205538" comment="kernel-xen-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205539" comment="kernel-xen-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205540" comment="kernel-xen-devel-3.0.101-0.47.106.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16529</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-16529" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16529" source="CVE"/>
    <description>
    The snd_usb_create_streams function in sound/usb/card.c in the Linux kernel before 4.13.6 allows local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-16529.html">CVE-2017-16529</cve>
<bugzilla href="https://bugzilla.suse.com/1066650">SUSE bug 1066650</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208652" comment="kernel-bigsmp-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208653" comment="kernel-bigsmp-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208654" comment="kernel-bigsmp-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205524" comment="kernel-default-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205525" comment="kernel-default-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205526" comment="kernel-default-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208655" comment="kernel-default-man-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205527" comment="kernel-ec2-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205528" comment="kernel-ec2-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205529" comment="kernel-ec2-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205530" comment="kernel-pae-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205531" comment="kernel-pae-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205532" comment="kernel-pae-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205533" comment="kernel-source-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205534" comment="kernel-syms-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205535" comment="kernel-trace-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205536" comment="kernel-trace-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205537" comment="kernel-trace-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205538" comment="kernel-xen-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205539" comment="kernel-xen-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205540" comment="kernel-xen-devel-3.0.101-0.47.106.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16531</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-16531" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16531" source="CVE"/>
    <description>
    drivers/usb/core/config.c in the Linux kernel before 4.13.6 allows local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device, related to the USB_DT_INTERFACE_ASSOCIATION descriptor.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-16531.html">CVE-2017-16531</cve>
<bugzilla href="https://bugzilla.suse.com/1066671">SUSE bug 1066671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208652" comment="kernel-bigsmp-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208653" comment="kernel-bigsmp-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208654" comment="kernel-bigsmp-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205524" comment="kernel-default-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205525" comment="kernel-default-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205526" comment="kernel-default-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208655" comment="kernel-default-man-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205527" comment="kernel-ec2-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205528" comment="kernel-ec2-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205529" comment="kernel-ec2-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205530" comment="kernel-pae-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205531" comment="kernel-pae-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205532" comment="kernel-pae-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205533" comment="kernel-source-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205534" comment="kernel-syms-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205535" comment="kernel-trace-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205536" comment="kernel-trace-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205537" comment="kernel-trace-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205538" comment="kernel-xen-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205539" comment="kernel-xen-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205540" comment="kernel-xen-devel-3.0.101-0.47.106.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16533</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-16533" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16533" source="CVE"/>
    <description>
    The usbhid_parse function in drivers/hid/usbhid/hid-core.c in the Linux kernel before 4.13.8 allows local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-16533.html">CVE-2017-16533</cve>
<bugzilla href="https://bugzilla.suse.com/1066674">SUSE bug 1066674</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009243428" comment="kernel-bigsmp-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243429" comment="kernel-bigsmp-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243430" comment="kernel-bigsmp-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243411" comment="kernel-default-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243412" comment="kernel-default-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243413" comment="kernel-default-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243431" comment="kernel-default-man-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243414" comment="kernel-ec2-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243415" comment="kernel-ec2-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243416" comment="kernel-ec2-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243417" comment="kernel-pae-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243418" comment="kernel-pae-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243419" comment="kernel-pae-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243420" comment="kernel-source-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243421" comment="kernel-syms-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243422" comment="kernel-trace-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243423" comment="kernel-trace-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243424" comment="kernel-trace-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243425" comment="kernel-xen-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243426" comment="kernel-xen-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243427" comment="kernel-xen-devel-3.0.101-0.47.106.59 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16534</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-16534" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16534" source="CVE"/>
    <description>
    The cdc_parse_cdc_header function in drivers/usb/core/message.c in the Linux kernel before 4.13.6 allows local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-16534.html">CVE-2017-16534</cve>
<bugzilla href="https://bugzilla.suse.com/1066693">SUSE bug 1066693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208652" comment="kernel-bigsmp-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208653" comment="kernel-bigsmp-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208654" comment="kernel-bigsmp-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205524" comment="kernel-default-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205525" comment="kernel-default-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205526" comment="kernel-default-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208655" comment="kernel-default-man-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205527" comment="kernel-ec2-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205528" comment="kernel-ec2-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205529" comment="kernel-ec2-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205530" comment="kernel-pae-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205531" comment="kernel-pae-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205532" comment="kernel-pae-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205533" comment="kernel-source-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205534" comment="kernel-syms-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205535" comment="kernel-trace-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205536" comment="kernel-trace-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205537" comment="kernel-trace-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205538" comment="kernel-xen-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205539" comment="kernel-xen-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205540" comment="kernel-xen-devel-3.0.101-0.47.106.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16535</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-16535" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16535" source="CVE"/>
    <description>
    The usb_get_bos_descriptor function in drivers/usb/core/config.c in the Linux kernel before 4.13.10 allows local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-16535.html">CVE-2017-16535</cve>
<bugzilla href="https://bugzilla.suse.com/1066700">SUSE bug 1066700</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208652" comment="kernel-bigsmp-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208653" comment="kernel-bigsmp-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208654" comment="kernel-bigsmp-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205524" comment="kernel-default-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205525" comment="kernel-default-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205526" comment="kernel-default-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208655" comment="kernel-default-man-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205527" comment="kernel-ec2-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205528" comment="kernel-ec2-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205529" comment="kernel-ec2-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205530" comment="kernel-pae-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205531" comment="kernel-pae-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205532" comment="kernel-pae-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205533" comment="kernel-source-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205534" comment="kernel-syms-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205535" comment="kernel-trace-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205536" comment="kernel-trace-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205537" comment="kernel-trace-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205538" comment="kernel-xen-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205539" comment="kernel-xen-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205540" comment="kernel-xen-devel-3.0.101-0.47.106.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16536</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-16536" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16536" source="CVE"/>
    <description>
    The cx231xx_usb_probe function in drivers/media/usb/cx231xx/cx231xx-cards.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-16536.html">CVE-2017-16536</cve>
<bugzilla href="https://bugzilla.suse.com/1066606">SUSE bug 1066606</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208652" comment="kernel-bigsmp-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208653" comment="kernel-bigsmp-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208654" comment="kernel-bigsmp-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205524" comment="kernel-default-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205525" comment="kernel-default-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205526" comment="kernel-default-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208655" comment="kernel-default-man-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205527" comment="kernel-ec2-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205528" comment="kernel-ec2-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205529" comment="kernel-ec2-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205530" comment="kernel-pae-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205531" comment="kernel-pae-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205532" comment="kernel-pae-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205533" comment="kernel-source-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205534" comment="kernel-syms-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205535" comment="kernel-trace-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205536" comment="kernel-trace-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205537" comment="kernel-trace-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205538" comment="kernel-xen-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205539" comment="kernel-xen-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205540" comment="kernel-xen-devel-3.0.101-0.47.106.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16537</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-16537" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16537" source="CVE"/>
    <description>
    The imon_probe function in drivers/media/rc/imon.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-16537.html">CVE-2017-16537</cve>
<bugzilla href="https://bugzilla.suse.com/1066573">SUSE bug 1066573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208652" comment="kernel-bigsmp-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208653" comment="kernel-bigsmp-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208654" comment="kernel-bigsmp-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205524" comment="kernel-default-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205525" comment="kernel-default-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205526" comment="kernel-default-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208655" comment="kernel-default-man-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205527" comment="kernel-ec2-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205528" comment="kernel-ec2-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205529" comment="kernel-ec2-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205530" comment="kernel-pae-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205531" comment="kernel-pae-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205532" comment="kernel-pae-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205533" comment="kernel-source-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205534" comment="kernel-syms-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205535" comment="kernel-trace-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205536" comment="kernel-trace-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205537" comment="kernel-trace-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205538" comment="kernel-xen-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205539" comment="kernel-xen-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205540" comment="kernel-xen-devel-3.0.101-0.47.106.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16538</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-16538" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16538" source="CVE"/>
    <description>
    drivers/media/usb/dvb-usb-v2/lmedm04.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (general protection fault and system crash) or possibly have unspecified other impact via a crafted USB device, related to a missing warm-start check and incorrect attach timing (dm04_lme2510_frontend_attach versus dm04_lme2510_tuner).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-16538.html">CVE-2017-16538</cve>
<bugzilla href="https://bugzilla.suse.com/1066569">SUSE bug 1066569</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208652" comment="kernel-bigsmp-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208653" comment="kernel-bigsmp-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208654" comment="kernel-bigsmp-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205524" comment="kernel-default-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205525" comment="kernel-default-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205526" comment="kernel-default-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208655" comment="kernel-default-man-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205527" comment="kernel-ec2-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205528" comment="kernel-ec2-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205529" comment="kernel-ec2-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205530" comment="kernel-pae-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205531" comment="kernel-pae-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205532" comment="kernel-pae-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205533" comment="kernel-source-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205534" comment="kernel-syms-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205535" comment="kernel-trace-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205536" comment="kernel-trace-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205537" comment="kernel-trace-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205538" comment="kernel-xen-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205539" comment="kernel-xen-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205540" comment="kernel-xen-devel-3.0.101-0.47.106.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16545</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-16545" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545" source="CVE"/>
    <description>
    The ReadWPGImage function in coders/wpg.c in GraphicsMagick 1.3.26 does not properly validate colormapped images, which allows remote attackers to cause a denial of service (ImportIndexQuantumType invalid write and application crash) or possibly have unspecified other impact via a malformed WPG image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-16545.html">CVE-2017-16545</cve>
<bugzilla href="https://bugzilla.suse.com/1067184">SUSE bug 1067184</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202269" comment="ImageMagick-6.4.3.6-7.78.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209120" comment="libMagickCore1-6.4.3.6-7.78.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209121" comment="libMagickCore1-32bit-6.4.3.6-7.78.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16546</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-16546" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16546" source="CVE"/>
    <description>
    The ReadWPGImage function in coders/wpg.c in ImageMagick 7.0.7-9 does not properly validate the colormap index in a WPG palette, which allows remote attackers to cause a denial of service (use of uninitialized data or invalid memory allocation) or possibly have unspecified other impact via a malformed WPG file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-16546.html">CVE-2017-16546</cve>
<bugzilla href="https://bugzilla.suse.com/1067181">SUSE bug 1067181</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202269" comment="ImageMagick-6.4.3.6-7.78.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209120" comment="libMagickCore1-6.4.3.6-7.78.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209121" comment="libMagickCore1-32bit-6.4.3.6-7.78.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16548</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-16548" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16548" source="CVE"/>
    <description>
    The receive_xattr function in xattrs.c in rsync 3.1.2 and 3.1.3-development does not check for a trailing '\0' character in an xattr name, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact by sending crafted data to the daemon.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-16548.html">CVE-2017-16548</cve>
<bugzilla href="https://bugzilla.suse.com/1066644">SUSE bug 1066644</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210683" comment="rsync-3.0.4-2.53.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16612</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-16612" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16612" source="CVE"/>
    <description>
    libXcursor before 1.1.15 has various integer overflows that could lead to heap buffer overflows when processing malicious cursors, e.g., with programs like GIMP. It is also possible that an attack vector exists against the related code in cursor/xcursor.c in Wayland through 1.14.0.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-16612.html">CVE-2017-16612</cve>
<bugzilla href="https://bugzilla.suse.com/1065386">SUSE bug 1065386</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203697" comment="xorg-x11-libs-7.4-8.26.50.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210989" comment="xorg-x11-libs-32bit-7.4-8.26.50.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16642</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-16642" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16642" source="CVE"/>
    <description>
    In PHP before 5.6.32, 7.x before 7.0.25, and 7.1.x before 7.1.11, an error in the date extension's timelib_meridian handling of 'front of' and 'back of' directives could be used by attackers able to supply date strings to leak information from the interpreter, related to ext/date/lib/parse_date.c out-of-bounds reads affecting the php_parse_date function. NOTE: this is a different issue than CVE-2017-11145.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-16642.html">CVE-2017-16642</cve>
<bugzilla href="https://bugzilla.suse.com/1048112">SUSE bug 1048112</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1067441">SUSE bug 1067441</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1076391">SUSE bug 1076391</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210576" comment="apache2-mod_php53-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203344" comment="php53-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210577" comment="php53-bcmath-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210578" comment="php53-bz2-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210579" comment="php53-calendar-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210580" comment="php53-ctype-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210581" comment="php53-curl-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210582" comment="php53-dba-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210583" comment="php53-dom-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210584" comment="php53-exif-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210585" comment="php53-fastcgi-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210586" comment="php53-fileinfo-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210587" comment="php53-ftp-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210588" comment="php53-gd-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210589" comment="php53-gettext-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210590" comment="php53-gmp-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210591" comment="php53-iconv-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210592" comment="php53-intl-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210593" comment="php53-json-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210594" comment="php53-ldap-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210595" comment="php53-mbstring-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210596" comment="php53-mcrypt-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210597" comment="php53-mysql-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210598" comment="php53-odbc-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210599" comment="php53-openssl-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210600" comment="php53-pcntl-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210601" comment="php53-pdo-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210602" comment="php53-pear-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210603" comment="php53-pgsql-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210604" comment="php53-pspell-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210605" comment="php53-shmop-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210606" comment="php53-snmp-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210607" comment="php53-soap-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210608" comment="php53-suhosin-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210609" comment="php53-sysvmsg-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210610" comment="php53-sysvsem-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210611" comment="php53-sysvshm-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210612" comment="php53-tokenizer-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210613" comment="php53-wddx-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210614" comment="php53-xmlreader-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210615" comment="php53-xmlrpc-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210616" comment="php53-xmlwriter-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210617" comment="php53-xsl-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210618" comment="php53-zip-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210619" comment="php53-zlib-5.3.17-112.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16644</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-16644" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16644" source="CVE"/>
    <description>
    The hdpvr_probe function in drivers/media/usb/hdpvr/hdpvr-core.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (improper error handling and system crash) or possibly have unspecified other impact via a crafted USB device.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-16644.html">CVE-2017-16644</cve>
<bugzilla href="https://bugzilla.suse.com/1067118">SUSE bug 1067118</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208695" comment="kernel-bigsmp-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208696" comment="kernel-bigsmp-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208697" comment="kernel-bigsmp-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205609" comment="kernel-default-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205610" comment="kernel-default-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205611" comment="kernel-default-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208698" comment="kernel-default-man-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205612" comment="kernel-ec2-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205613" comment="kernel-ec2-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205614" comment="kernel-ec2-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205615" comment="kernel-pae-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205616" comment="kernel-pae-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205617" comment="kernel-pae-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205618" comment="kernel-source-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205619" comment="kernel-syms-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205620" comment="kernel-trace-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205621" comment="kernel-trace-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205622" comment="kernel-trace-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205623" comment="kernel-xen-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205624" comment="kernel-xen-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205625" comment="kernel-xen-devel-3.0.101-0.47.106.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16649</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-16649" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16649" source="CVE"/>
    <description>
    The usbnet_generic_cdc_bind function in drivers/net/usb/cdc_ether.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (divide-by-zero error and system crash) or possibly have unspecified other impact via a crafted USB device.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-16649.html">CVE-2017-16649</cve>
<bugzilla href="https://bugzilla.suse.com/1067085">SUSE bug 1067085</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1067115">SUSE bug 1067115</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208652" comment="kernel-bigsmp-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208653" comment="kernel-bigsmp-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208654" comment="kernel-bigsmp-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205524" comment="kernel-default-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205525" comment="kernel-default-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205526" comment="kernel-default-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208655" comment="kernel-default-man-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205527" comment="kernel-ec2-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205528" comment="kernel-ec2-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205529" comment="kernel-ec2-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205530" comment="kernel-pae-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205531" comment="kernel-pae-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205532" comment="kernel-pae-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205533" comment="kernel-source-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205534" comment="kernel-syms-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205535" comment="kernel-trace-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205536" comment="kernel-trace-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205537" comment="kernel-trace-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205538" comment="kernel-xen-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205539" comment="kernel-xen-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205540" comment="kernel-xen-devel-3.0.101-0.47.106.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16844</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-16844" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16844" source="CVE"/>
    <description>
    Heap-based buffer overflow in the loadbuf function in formisc.c in formail in procmail 3.22 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted e-mail message because of a hardcoded realloc size, a different vulnerability than CVE-2014-3618.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-16844.html">CVE-2017-16844</cve>
<bugzilla href="https://bugzilla.suse.com/1068648">SUSE bug 1068648</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210663" comment="procmail-3.22-240.8.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16879</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-16879" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16879" source="CVE"/>
    <description>
    Stack-based buffer overflow in the _nc_write_entry function in tinfo/write_entry.c in ncurses 6.0 allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted terminfo file, as demonstrated by tic.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-16879.html">CVE-2017-16879</cve>
<bugzilla href="https://bugzilla.suse.com/1069530">SUSE bug 1069530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123132">SUSE bug 1123132</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210104" comment="libncurses5-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210105" comment="libncurses5-32bit-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210107" comment="libncurses6-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210108" comment="libncurses6-32bit-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203199" comment="ncurses-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203200" comment="ncurses-devel-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203201" comment="ncurses-devel-32bit-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210110" comment="ncurses-utils-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203202" comment="tack-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210111" comment="terminfo-5.6-93.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210112" comment="terminfo-base-5.6-93.12 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16899</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-16899" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16899" source="CVE"/>
    <description>
    An array index error in the fig2dev program in Xfig 3.2.6a allows remote attackers to cause a denial-of-service attack or information disclosure with a maliciously crafted Fig format file, related to a negative font value in dev/gentikz.c, and the read_textobject functions in read.c and read1_3.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-16899.html">CVE-2017-16899</cve>
<bugzilla href="https://bugzilla.suse.com/1069257">SUSE bug 1069257</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210858" comment="transfig-3.2.5-160.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16911</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-16911" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911" source="CVE"/>
    <description>
    The vhci_hcd driver in the Linux Kernel before version 4.14.8 and 4.4.114 allows allows local attackers to disclose kernel memory addresses. Successful exploitation requires that a USB device is attached over IP.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-16911.html">CVE-2017-16911</cve>
<bugzilla href="https://bugzilla.suse.com/1078674">SUSE bug 1078674</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208695" comment="kernel-bigsmp-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208696" comment="kernel-bigsmp-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208697" comment="kernel-bigsmp-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205609" comment="kernel-default-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205610" comment="kernel-default-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205611" comment="kernel-default-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208698" comment="kernel-default-man-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205612" comment="kernel-ec2-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205613" comment="kernel-ec2-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205614" comment="kernel-ec2-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205615" comment="kernel-pae-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205616" comment="kernel-pae-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205617" comment="kernel-pae-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205618" comment="kernel-source-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205619" comment="kernel-syms-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205620" comment="kernel-trace-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205621" comment="kernel-trace-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205622" comment="kernel-trace-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205623" comment="kernel-xen-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205624" comment="kernel-xen-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205625" comment="kernel-xen-devel-3.0.101-0.47.106.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16912</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-16912" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912" source="CVE"/>
    <description>
    The "get_pipe()" function (drivers/usb/usbip/stub_rx.c) in the Linux Kernel before version 4.14.8, 4.9.71, and 4.4.114 allows attackers to cause a denial of service (out-of-bounds read) via a specially crafted USB over IP packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-16912.html">CVE-2017-16912</cve>
<bugzilla href="https://bugzilla.suse.com/1078673">SUSE bug 1078673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208695" comment="kernel-bigsmp-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208696" comment="kernel-bigsmp-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208697" comment="kernel-bigsmp-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205609" comment="kernel-default-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205610" comment="kernel-default-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205611" comment="kernel-default-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208698" comment="kernel-default-man-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205612" comment="kernel-ec2-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205613" comment="kernel-ec2-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205614" comment="kernel-ec2-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205615" comment="kernel-pae-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205616" comment="kernel-pae-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205617" comment="kernel-pae-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205618" comment="kernel-source-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205619" comment="kernel-syms-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205620" comment="kernel-trace-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205621" comment="kernel-trace-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205622" comment="kernel-trace-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205623" comment="kernel-xen-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205624" comment="kernel-xen-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205625" comment="kernel-xen-devel-3.0.101-0.47.106.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16913</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-16913" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913" source="CVE"/>
    <description>
    The "stub_recv_cmd_submit()" function (drivers/usb/usbip/stub_rx.c) in the Linux Kernel before version 4.14.8, 4.9.71, and 4.4.114 when handling CMD_SUBMIT packets allows attackers to cause a denial of service (arbitrary memory allocation) via a specially crafted USB over IP packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-16913.html">CVE-2017-16913</cve>
<bugzilla href="https://bugzilla.suse.com/1078672">SUSE bug 1078672</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208695" comment="kernel-bigsmp-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208696" comment="kernel-bigsmp-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208697" comment="kernel-bigsmp-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205609" comment="kernel-default-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205610" comment="kernel-default-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205611" comment="kernel-default-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208698" comment="kernel-default-man-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205612" comment="kernel-ec2-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205613" comment="kernel-ec2-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205614" comment="kernel-ec2-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205615" comment="kernel-pae-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205616" comment="kernel-pae-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205617" comment="kernel-pae-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205618" comment="kernel-source-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205619" comment="kernel-syms-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205620" comment="kernel-trace-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205621" comment="kernel-trace-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205622" comment="kernel-trace-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205623" comment="kernel-xen-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205624" comment="kernel-xen-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205625" comment="kernel-xen-devel-3.0.101-0.47.106.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16914</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-16914" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914" source="CVE"/>
    <description>
    The "stub_send_ret_submit()" function (drivers/usb/usbip/stub_tx.c) in the Linux Kernel before version 4.14.8, 4.9.71, 4.1.49, and 4.4.107 allows attackers to cause a denial of service (NULL pointer dereference) via a specially crafted USB over IP packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-16914.html">CVE-2017-16914</cve>
<bugzilla href="https://bugzilla.suse.com/1078669">SUSE bug 1078669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208695" comment="kernel-bigsmp-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208696" comment="kernel-bigsmp-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208697" comment="kernel-bigsmp-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205609" comment="kernel-default-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205610" comment="kernel-default-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205611" comment="kernel-default-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208698" comment="kernel-default-man-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205612" comment="kernel-ec2-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205613" comment="kernel-ec2-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205614" comment="kernel-ec2-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205615" comment="kernel-pae-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205616" comment="kernel-pae-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205617" comment="kernel-pae-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205618" comment="kernel-source-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205619" comment="kernel-syms-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205620" comment="kernel-trace-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205621" comment="kernel-trace-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205622" comment="kernel-trace-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205623" comment="kernel-xen-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205624" comment="kernel-xen-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205625" comment="kernel-xen-devel-3.0.101-0.47.106.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16932</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-16932" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932" source="CVE"/>
    <description>
    parser.c in libxml2 before 2.9.5 does not prevent infinite recursion in parameter entities.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-16932.html">CVE-2017-16932</cve>
<bugzilla href="https://bugzilla.suse.com/1069689">SUSE bug 1069689</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1103099">SUSE bug 1103099</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123129">SUSE bug 1123129</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203110" comment="libxml2-2.7.6-0.77.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209985" comment="libxml2-32bit-2.7.6-0.77.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209986" comment="libxml2-doc-2.7.6-0.77.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209987" comment="libxml2-python-2.7.6-0.77.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16939</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-16939" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16939" source="CVE"/>
    <description>
    The XFRM dump policy implementation in net/xfrm/xfrm_user.c in the Linux kernel before 4.13.11 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-16939.html">CVE-2017-16939</cve>
<bugzilla href="https://bugzilla.suse.com/1069702">SUSE bug 1069702</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1069708">SUSE bug 1069708</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1119445">SUSE bug 1119445</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1120260">SUSE bug 1120260</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208652" comment="kernel-bigsmp-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208653" comment="kernel-bigsmp-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208654" comment="kernel-bigsmp-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205524" comment="kernel-default-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205525" comment="kernel-default-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205526" comment="kernel-default-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208655" comment="kernel-default-man-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205527" comment="kernel-ec2-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205528" comment="kernel-ec2-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205529" comment="kernel-ec2-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205530" comment="kernel-pae-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205531" comment="kernel-pae-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205532" comment="kernel-pae-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205533" comment="kernel-source-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205534" comment="kernel-syms-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205535" comment="kernel-trace-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205536" comment="kernel-trace-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205537" comment="kernel-trace-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205538" comment="kernel-xen-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205539" comment="kernel-xen-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205540" comment="kernel-xen-devel-3.0.101-0.47.106.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16942</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-16942" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16942" source="CVE"/>
    <description>
    In libsndfile 1.0.25 (fixed in 1.0.26), a divide-by-zero error exists in the function wav_w64_read_fmt_chunk() in wav_w64.c, which may lead to DoS when playing a crafted audio file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-16942.html">CVE-2017-16942</cve>
<bugzilla href="https://bugzilla.suse.com/1069874">SUSE bug 1069874</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203053" comment="libsndfile-1.0.20-2.19.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209930" comment="libsndfile-32bit-1.0.20-2.19.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17083</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-17083" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17083" source="CVE"/>
    <description>
    In Wireshark 2.4.0 to 2.4.2 and 2.2.0 to 2.2.10, the NetBIOS dissector could crash. This was addressed in epan/dissectors/packet-netbios.c by ensuring that write operations are bounded by the beginning of a buffer.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-17083.html">CVE-2017-17083</cve>
<bugzilla href="https://bugzilla.suse.com/1070727">SUSE bug 1070727</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203595" comment="libsmi-0.4.5-2.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203596" comment="libwireshark8-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203597" comment="libwiretap6-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203598" comment="libwscodecs1-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203599" comment="libwsutil7-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203600" comment="portaudio-19-234.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203602" comment="wireshark-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203604" comment="wireshark-gtk-2.2.11-40.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17084</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-17084" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17084" source="CVE"/>
    <description>
    In Wireshark 2.4.0 to 2.4.2 and 2.2.0 to 2.2.10, the IWARP_MPA dissector could crash. This was addressed in epan/dissectors/packet-iwarp-mpa.c by validating a ULPDU length.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-17084.html">CVE-2017-17084</cve>
<bugzilla href="https://bugzilla.suse.com/1070727">SUSE bug 1070727</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203595" comment="libsmi-0.4.5-2.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203596" comment="libwireshark8-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203597" comment="libwiretap6-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203598" comment="libwscodecs1-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203599" comment="libwsutil7-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203600" comment="portaudio-19-234.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203602" comment="wireshark-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203604" comment="wireshark-gtk-2.2.11-40.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17085</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-17085" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17085" source="CVE"/>
    <description>
    In Wireshark 2.4.0 to 2.4.2 and 2.2.0 to 2.2.10, the CIP Safety dissector could crash. This was addressed in epan/dissectors/packet-cipsafety.c by validating the packet length.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-17085.html">CVE-2017-17085</cve>
<bugzilla href="https://bugzilla.suse.com/1070727">SUSE bug 1070727</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203595" comment="libsmi-0.4.5-2.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203596" comment="libwireshark8-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203597" comment="libwiretap6-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203598" comment="libwscodecs1-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203599" comment="libwsutil7-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203600" comment="portaudio-19-234.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203602" comment="wireshark-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203604" comment="wireshark-gtk-2.2.11-40.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17433</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-17433" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17433" source="CVE"/>
    <description>
    The recv_files function in receiver.c in the daemon in rsync 3.1.2, and 3.1.3-development before 2017-12-03, proceeds with certain file metadata updates before checking for a filename in the daemon_filter_list data structure, which allows remote attackers to bypass intended access restrictions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-17433.html">CVE-2017-17433</cve>
<bugzilla href="https://bugzilla.suse.com/1071459">SUSE bug 1071459</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210683" comment="rsync-3.0.4-2.53.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17434</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-17434" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17434" source="CVE"/>
    <description>
    The daemon in rsync 3.1.2, and 3.1.3-development before 2017-12-03, does not check for fnamecmp filenames in the daemon_filter_list data structure (in the recv_files function in receiver.c) and also does not apply the sanitize_paths protection mechanism to pathnames found in "xname follows" strings (in the read_ndx_and_attrs function in rsync.c), which allows remote attackers to bypass intended access restrictions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-17434.html">CVE-2017-17434</cve>
<bugzilla href="https://bugzilla.suse.com/1071460">SUSE bug 1071460</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210683" comment="rsync-3.0.4-2.53.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17450</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-17450" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17450" source="CVE"/>
    <description>
    net/netfilter/xt_osf.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allows local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-17450.html">CVE-2017-17450</cve>
<bugzilla href="https://bugzilla.suse.com/1071695">SUSE bug 1071695</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1074033">SUSE bug 1074033</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208652" comment="kernel-bigsmp-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208653" comment="kernel-bigsmp-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208654" comment="kernel-bigsmp-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205524" comment="kernel-default-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205525" comment="kernel-default-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205526" comment="kernel-default-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208655" comment="kernel-default-man-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205527" comment="kernel-ec2-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205528" comment="kernel-ec2-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205529" comment="kernel-ec2-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205530" comment="kernel-pae-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205531" comment="kernel-pae-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205532" comment="kernel-pae-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205533" comment="kernel-source-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205534" comment="kernel-syms-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205535" comment="kernel-trace-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205536" comment="kernel-trace-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205537" comment="kernel-trace-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205538" comment="kernel-xen-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205539" comment="kernel-xen-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205540" comment="kernel-xen-devel-3.0.101-0.47.106.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17456</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-17456" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17456" source="CVE"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2017-14245. Reason: This candidate is a duplicate of CVE-2017-14245. Notes: All CVE users should reference CVE-2017-14245 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-17456.html">CVE-2017-17456</cve>
<bugzilla href="https://bugzilla.suse.com/1059912">SUSE bug 1059912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1071777">SUSE bug 1071777</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1117906">SUSE bug 1117906</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009246794" comment="libsndfile-1.0.20-2.19.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246796" comment="libsndfile-32bit-1.0.20-2.19.12 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17457</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-17457" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17457" source="CVE"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2017-14246. Reason: This candidate is a duplicate of CVE-2017-14246. Notes: All CVE users should reference CVE-2017-14246 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-17457.html">CVE-2017-17457</cve>
<bugzilla href="https://bugzilla.suse.com/1059913">SUSE bug 1059913</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1071767">SUSE bug 1071767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1117906">SUSE bug 1117906</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009246794" comment="libsndfile-1.0.20-2.19.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246796" comment="libsndfile-32bit-1.0.20-2.19.12 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-17484" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17484" source="CVE"/>
    <description>
    The ucnv_UTF8FromUTF8 function in ucnv_u8.cpp in International Components for Unicode (ICU) for C/C++ through 60.1 mishandles ucnv_convertEx calls for UTF-8 to UTF-8 conversion, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted string, as demonstrated by ZNC.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-17484.html">CVE-2017-17484</cve>
<bugzilla href="https://bugzilla.suse.com/1072193">SUSE bug 1072193</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123121">SUSE bug 1123121</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202740" comment="icu-4.0-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209360" comment="libicu-4.0-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202741" comment="libicu-32bit-4.0-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209361" comment="libicu-doc-4.0-47.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17504</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-17504" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17504" source="CVE"/>
    <description>
    ImageMagick before 7.0.7-12 has a coders/png.c Magick_png_read_raw_profile heap-based buffer over-read via a crafted file, related to ReadOneMNGImage.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-17504.html">CVE-2017-17504</cve>
<bugzilla href="https://bugzilla.suse.com/1072362">SUSE bug 1072362</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202290" comment="ImageMagick-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209126" comment="libMagickCore1-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209127" comment="libMagickCore1-32bit-6.4.3.6-7.78.29 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17558</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-17558" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17558" source="CVE"/>
    <description>
    The usb_destroy_configuration function in drivers/usb/core/config.c in the USB core subsystem in the Linux kernel through 4.14.5 does not consider the maximum number of configurations and interfaces before attempting to release resources, which allows local users to cause a denial of service (out-of-bounds write access) or possibly have unspecified other impact via a crafted USB device.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-17558.html">CVE-2017-17558</cve>
<bugzilla href="https://bugzilla.suse.com/1072561">SUSE bug 1072561</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208652" comment="kernel-bigsmp-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208653" comment="kernel-bigsmp-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208654" comment="kernel-bigsmp-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205524" comment="kernel-default-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205525" comment="kernel-default-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205526" comment="kernel-default-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208655" comment="kernel-default-man-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205527" comment="kernel-ec2-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205528" comment="kernel-ec2-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205529" comment="kernel-ec2-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205530" comment="kernel-pae-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205531" comment="kernel-pae-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205532" comment="kernel-pae-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205533" comment="kernel-source-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205534" comment="kernel-syms-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205535" comment="kernel-trace-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205536" comment="kernel-trace-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205537" comment="kernel-trace-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205538" comment="kernel-xen-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205539" comment="kernel-xen-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205540" comment="kernel-xen-devel-3.0.101-0.47.106.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17563</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-17563" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17563" source="CVE"/>
    <description>
    An issue was discovered in Xen through 4.9.x allowing guest OS users to cause a denial of service (host OS crash) or gain host OS privileges by leveraging an incorrect mask for reference-count overflow checking in shadow mode.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-17563.html">CVE-2017-17563</cve>
<bugzilla href="https://bugzilla.suse.com/1070159">SUSE bug 1070159</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205997" comment="xen-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209094" comment="xen-doc-html-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209095" comment="xen-doc-pdf-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205998" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205999" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206000" comment="xen-libs-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209096" comment="xen-libs-32bit-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209097" comment="xen-tools-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206001" comment="xen-tools-domU-4.2.5_21-45.19 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250468" comment="xen-4.2.5_21-47.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250469" comment="xen-doc-html-4.2.5_21-47.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250470" comment="xen-doc-pdf-4.2.5_21-47.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250471" comment="xen-kmp-default-4.2.5_21_3.0.101_0.150.TDC-47.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250472" comment="xen-libs-4.2.5_21-47.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250473" comment="xen-tools-4.2.5_21-47.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250474" comment="xen-tools-domU-4.2.5_21-47.21 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17564</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-17564" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17564" source="CVE"/>
    <description>
    An issue was discovered in Xen through 4.9.x allowing guest OS users to cause a denial of service (host OS crash) or gain host OS privileges by leveraging incorrect error handling for reference counting in shadow mode.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-17564.html">CVE-2017-17564</cve>
<bugzilla href="https://bugzilla.suse.com/1070160">SUSE bug 1070160</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205997" comment="xen-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209094" comment="xen-doc-html-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209095" comment="xen-doc-pdf-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205998" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205999" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206000" comment="xen-libs-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209096" comment="xen-libs-32bit-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209097" comment="xen-tools-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206001" comment="xen-tools-domU-4.2.5_21-45.19 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250468" comment="xen-4.2.5_21-47.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250469" comment="xen-doc-html-4.2.5_21-47.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250470" comment="xen-doc-pdf-4.2.5_21-47.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250471" comment="xen-kmp-default-4.2.5_21_3.0.101_0.150.TDC-47.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250472" comment="xen-libs-4.2.5_21-47.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250473" comment="xen-tools-4.2.5_21-47.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250474" comment="xen-tools-domU-4.2.5_21-47.21 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17565</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-17565" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17565" source="CVE"/>
    <description>
    An issue was discovered in Xen through 4.9.x allowing PV guest OS users to cause a denial of service (host OS crash) if shadow mode and log-dirty mode are in place, because of an incorrect assertion related to M2P.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-17565.html">CVE-2017-17565</cve>
<bugzilla href="https://bugzilla.suse.com/1070163">SUSE bug 1070163</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205997" comment="xen-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209094" comment="xen-doc-html-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209095" comment="xen-doc-pdf-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205998" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205999" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206000" comment="xen-libs-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209096" comment="xen-libs-32bit-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209097" comment="xen-tools-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206001" comment="xen-tools-domU-4.2.5_21-45.19 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250468" comment="xen-4.2.5_21-47.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250469" comment="xen-doc-html-4.2.5_21-47.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250470" comment="xen-doc-pdf-4.2.5_21-47.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250471" comment="xen-kmp-default-4.2.5_21_3.0.101_0.150.TDC-47.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250472" comment="xen-libs-4.2.5_21-47.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250473" comment="xen-tools-4.2.5_21-47.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250474" comment="xen-tools-domU-4.2.5_21-47.21 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17566</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-17566" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17566" source="CVE"/>
    <description>
    An issue was discovered in Xen through 4.9.x allowing PV guest OS users to cause a denial of service (host OS crash) or gain host OS privileges in shadow mode by mapping a certain auxiliary page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-17566.html">CVE-2017-17566</cve>
<bugzilla href="https://bugzilla.suse.com/1070158">SUSE bug 1070158</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205997" comment="xen-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209094" comment="xen-doc-html-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209095" comment="xen-doc-pdf-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205998" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205999" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206000" comment="xen-libs-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209096" comment="xen-libs-32bit-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209097" comment="xen-tools-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206001" comment="xen-tools-domU-4.2.5_21-45.19 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250468" comment="xen-4.2.5_21-47.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250469" comment="xen-doc-html-4.2.5_21-47.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250470" comment="xen-doc-pdf-4.2.5_21-47.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250471" comment="xen-kmp-default-4.2.5_21_3.0.101_0.150.TDC-47.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250472" comment="xen-libs-4.2.5_21-47.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250473" comment="xen-tools-4.2.5_21-47.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250474" comment="xen-tools-domU-4.2.5_21-47.21 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17680</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-17680" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17680" source="CVE"/>
    <description>
    In ImageMagick 7.0.7-12 Q16, a memory leak vulnerability was found in the function ReadXPMImage in coders/xpm.c, which allows attackers to cause a denial of service via a crafted xpm image file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-17680.html">CVE-2017-17680</cve>
<bugzilla href="https://bugzilla.suse.com/1072902">SUSE bug 1072902</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1074122">SUSE bug 1074122</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202283" comment="ImageMagick-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209124" comment="libMagickCore1-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209125" comment="libMagickCore1-32bit-6.4.3.6-7.78.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17682</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-17682" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17682" source="CVE"/>
    <description>
    In ImageMagick 7.0.7-12 Q16, a large loop vulnerability was found in the function ExtractPostscript in coders/wpg.c, which allows attackers to cause a denial of service (CPU exhaustion) via a crafted wpg image file that triggers a ReadWPGImage call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-17682.html">CVE-2017-17682</cve>
<bugzilla href="https://bugzilla.suse.com/1072898">SUSE bug 1072898</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202304" comment="ImageMagick-6.4.3.6-7.78.37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209130" comment="libMagickCore1-6.4.3.6-7.78.37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209131" comment="libMagickCore1-32bit-6.4.3.6-7.78.37 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17741</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-17741" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17741" source="CVE"/>
    <description>
    The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-17741.html">CVE-2017-17741</cve>
<bugzilla href="https://bugzilla.suse.com/1073311">SUSE bug 1073311</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208665" comment="kernel-bigsmp-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208666" comment="kernel-bigsmp-base-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208667" comment="kernel-bigsmp-devel-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205541" comment="kernel-default-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205542" comment="kernel-default-base-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205543" comment="kernel-default-devel-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208668" comment="kernel-default-man-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205544" comment="kernel-ec2-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205545" comment="kernel-ec2-base-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205546" comment="kernel-ec2-devel-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205547" comment="kernel-pae-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205548" comment="kernel-pae-base-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205549" comment="kernel-pae-devel-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205550" comment="kernel-source-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205551" comment="kernel-syms-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205552" comment="kernel-trace-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205553" comment="kernel-trace-base-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205554" comment="kernel-trace-devel-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205555" comment="kernel-xen-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205556" comment="kernel-xen-base-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205557" comment="kernel-xen-devel-3.0.101-0.47.106.19 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-17805" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17805" source="CVE"/>
    <description>
    The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-17805.html">CVE-2017-17805</cve>
<bugzilla href="https://bugzilla.suse.com/1073792">SUSE bug 1073792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208652" comment="kernel-bigsmp-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208653" comment="kernel-bigsmp-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208654" comment="kernel-bigsmp-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205524" comment="kernel-default-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205525" comment="kernel-default-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205526" comment="kernel-default-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208655" comment="kernel-default-man-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205527" comment="kernel-ec2-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205528" comment="kernel-ec2-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205529" comment="kernel-ec2-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205530" comment="kernel-pae-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205531" comment="kernel-pae-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205532" comment="kernel-pae-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205533" comment="kernel-source-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205534" comment="kernel-syms-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205535" comment="kernel-trace-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205536" comment="kernel-trace-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205537" comment="kernel-trace-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205538" comment="kernel-xen-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205539" comment="kernel-xen-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205540" comment="kernel-xen-devel-3.0.101-0.47.106.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-17806" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17806" source="CVE"/>
    <description>
    The HMAC implementation (crypto/hmac.c) in the Linux kernel before 4.14.8 does not validate that the underlying cryptographic hash algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorithm (CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by executing a crafted sequence of system calls that encounter a missing SHA-3 initialization.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-17806.html">CVE-2017-17806</cve>
<bugzilla href="https://bugzilla.suse.com/1073874">SUSE bug 1073874</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208652" comment="kernel-bigsmp-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208653" comment="kernel-bigsmp-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208654" comment="kernel-bigsmp-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205524" comment="kernel-default-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205525" comment="kernel-default-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205526" comment="kernel-default-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208655" comment="kernel-default-man-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205527" comment="kernel-ec2-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205528" comment="kernel-ec2-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205529" comment="kernel-ec2-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205530" comment="kernel-pae-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205531" comment="kernel-pae-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205532" comment="kernel-pae-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205533" comment="kernel-source-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205534" comment="kernel-syms-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205535" comment="kernel-trace-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205536" comment="kernel-trace-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205537" comment="kernel-trace-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205538" comment="kernel-xen-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205539" comment="kernel-xen-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205540" comment="kernel-xen-devel-3.0.101-0.47.106.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17833</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-17833" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17833" source="CVE"/>
    <description>
    OpenSLP releases in the 1.0.2 and 1.1.0 code streams have a heap-related memory corruption issue which may manifest itself as a denial-of-service or a remote code-execution vulnerability.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-17833.html">CVE-2017-17833</cve>
<bugzilla href="https://bugzilla.suse.com/1090638">SUSE bug 1090638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1099519">SUSE bug 1099519</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009230000" comment="libslp1-openssl1-1.2.0-172.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248680" comment="libslp1-openssl1-32bit-1.2.0-172.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229997" comment="openslp-1.2.0-172.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230002" comment="openslp-32bit-1.2.0-172.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230001" comment="openslp-openssl1-1.2.0-172.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229999" comment="openslp-server-1.2.0-172.27.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17879</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-17879" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17879" source="CVE"/>
    <description>
    In ImageMagick 7.0.7-16 Q16 x86_64 2017-12-21, there is a heap-based buffer over-read in ReadOneMNGImage in coders/png.c, related to length calculation and caused by an off-by-one error.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-17879.html">CVE-2017-17879</cve>
<bugzilla href="https://bugzilla.suse.com/1074125">SUSE bug 1074125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1074175">SUSE bug 1074175</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202290" comment="ImageMagick-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209126" comment="libMagickCore1-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209127" comment="libMagickCore1-32bit-6.4.3.6-7.78.29 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17881</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-17881" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17881" source="CVE"/>
    <description>
    In ImageMagick 7.0.7-12 Q16, a memory leak vulnerability was found in the function ReadMATImage in coders/mat.c, which allows attackers to cause a denial of service via a crafted MAT image file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-17881.html">CVE-2017-17881</cve>
<bugzilla href="https://bugzilla.suse.com/1074123">SUSE bug 1074123</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202283" comment="ImageMagick-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209124" comment="libMagickCore1-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209125" comment="libMagickCore1-32bit-6.4.3.6-7.78.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17882</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-17882" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17882" source="CVE"/>
    <description>
    In ImageMagick 7.0.7-12 Q16, a memory leak vulnerability was found in the function ReadXPMImage in coders/xpm.c, which allows attackers to cause a denial of service via a crafted XPM image file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-17882.html">CVE-2017-17882</cve>
<bugzilla href="https://bugzilla.suse.com/1074122">SUSE bug 1074122</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202283" comment="ImageMagick-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209124" comment="libMagickCore1-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209125" comment="libMagickCore1-32bit-6.4.3.6-7.78.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17884</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-17884" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17884" source="CVE"/>
    <description>
    In ImageMagick 7.0.7-16 Q16, a memory leak vulnerability was found in the function WriteOnePNGImage in coders/png.c, which allows attackers to cause a denial of service via a crafted PNG image file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-17884.html">CVE-2017-17884</cve>
<bugzilla href="https://bugzilla.suse.com/1074120">SUSE bug 1074120</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202290" comment="ImageMagick-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209126" comment="libMagickCore1-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209127" comment="libMagickCore1-32bit-6.4.3.6-7.78.29 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17885</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-17885" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17885" source="CVE"/>
    <description>
    In ImageMagick 7.0.7-12 Q16, a memory leak vulnerability was found in the function ReadPICTImage in coders/pict.c, which allows attackers to cause a denial of service via a crafted PICT image file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-17885.html">CVE-2017-17885</cve>
<bugzilla href="https://bugzilla.suse.com/1074119">SUSE bug 1074119</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202297" comment="ImageMagick-6.4.3.6-7.78.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209128" comment="libMagickCore1-6.4.3.6-7.78.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209129" comment="libMagickCore1-32bit-6.4.3.6-7.78.34 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17914</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-17914" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17914" source="CVE"/>
    <description>
    In ImageMagick 7.0.7-16 Q16, a vulnerability was found in the function ReadOnePNGImage in coders/png.c, which allows attackers to cause a denial of service (ReadOneMNGImage large loop) via a crafted mng image file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-17914.html">CVE-2017-17914</cve>
<bugzilla href="https://bugzilla.suse.com/1074185">SUSE bug 1074185</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202290" comment="ImageMagick-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209126" comment="libMagickCore1-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209127" comment="libMagickCore1-32bit-6.4.3.6-7.78.29 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17934</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-17934" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17934" source="CVE"/>
    <description>
    ImageMagick 7.0.7-17 Q16 x86_64 has memory leaks in coders/msl.c, related to MSLPopImage and ProcessMSLScript, and associated with mishandling of MSLPushImage calls.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-17934.html">CVE-2017-17934</cve>
<bugzilla href="https://bugzilla.suse.com/1074170">SUSE bug 1074170</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009237944" comment="ImageMagick-6.4.3.6-78.74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237963" comment="libMagickCore1-6.4.3.6-78.74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237964" comment="libMagickCore1-32bit-6.4.3.6-78.74 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17935</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-17935" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17935" source="CVE"/>
    <description>
    The File_read_line function in epan/wslua/wslua_file.c in Wireshark through 2.2.11 does not properly strip '\n' characters, which allows remote attackers to cause a denial of service (buffer underflow and application crash) via a crafted packet that triggers the attempted processing of an empty line.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-17935.html">CVE-2017-17935</cve>
<bugzilla href="https://bugzilla.suse.com/1074171">SUSE bug 1074171</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203605" comment="libwireshark8-2.2.12-40.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203606" comment="libwiretap6-2.2.12-40.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203607" comment="libwscodecs1-2.2.12-40.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203608" comment="libwsutil7-2.2.12-40.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203609" comment="wireshark-2.2.12-40.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203611" comment="wireshark-gtk-2.2.12-40.17 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17942</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-17942" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17942" source="CVE"/>
    <description>
    In LibTIFF 4.0.9, there is a heap-based buffer over-read in the function PackBitsEncode in tif_packbits.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-17942.html">CVE-2017-17942</cve>
<bugzilla href="https://bugzilla.suse.com/1074186">SUSE bug 1074186</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1150480">SUSE bug 1150480</bugzilla>
<bugzilla href="https://bugzilla.suse.com/983440">SUSE bug 983440</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009240660" comment="libtiff3-3.8.2-141.169.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240661" comment="libtiff3-32bit-3.8.2-141.169.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240659" comment="tiff-3.8.2-141.169.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17973</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-17973" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17973" source="CVE"/>
    <description>
    ** DISPUTED ** In LibTIFF 4.0.8, there is a heap-based use-after-free in the t2p_writeproc function in tiff2pdf.c. NOTE: there is a third-party report of inability to reproduce this issue.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-17973.html">CVE-2017-17973</cve>
<bugzilla href="https://bugzilla.suse.com/1074318">SUSE bug 1074318</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210828" comment="libtiff3-3.8.2-141.169.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210829" comment="libtiff3-32bit-3.8.2-141.169.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203576" comment="tiff-3.8.2-141.169.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17997</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-17997" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17997" source="CVE"/>
    <description>
    In Wireshark before 2.2.12, the MRDISC dissector misuses a NULL pointer and crashes. This was addressed in epan/dissectors/packet-mrdisc.c by validating an IPv4 address. This vulnerability is similar to CVE-2017-9343.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-17997.html">CVE-2017-17997</cve>
<bugzilla href="https://bugzilla.suse.com/1077080">SUSE bug 1077080</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203612" comment="libwireshark8-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203613" comment="libwiretap6-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203614" comment="libwscodecs1-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203615" comment="libwsutil7-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203616" comment="wireshark-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203618" comment="wireshark-gtk-2.2.13-40.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18013</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-18013" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18013" source="CVE"/>
    <description>
    In LibTIFF 4.0.9, there is a Null-Pointer Dereference in the tif_print.c TIFFPrintDirectory function, as demonstrated by a tiffinfo crash.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-18013.html">CVE-2017-18013</cve>
<bugzilla href="https://bugzilla.suse.com/1074317">SUSE bug 1074317</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1082825">SUSE bug 1082825</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210831" comment="libtiff3-3.8.2-141.169.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210832" comment="libtiff3-32bit-3.8.2-141.169.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203579" comment="tiff-3.8.2-141.169.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18017</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-18017" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017" source="CVE"/>
    <description>
    The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before 4.11, and 4.9.x before 4.9.36, allows remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-18017.html">CVE-2017-18017</cve>
<bugzilla href="https://bugzilla.suse.com/1074488">SUSE bug 1074488</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1080255">SUSE bug 1080255</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/971126">SUSE bug 971126</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208665" comment="kernel-bigsmp-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208666" comment="kernel-bigsmp-base-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208667" comment="kernel-bigsmp-devel-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205541" comment="kernel-default-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205542" comment="kernel-default-base-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205543" comment="kernel-default-devel-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208668" comment="kernel-default-man-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205544" comment="kernel-ec2-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205545" comment="kernel-ec2-base-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205546" comment="kernel-ec2-devel-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205547" comment="kernel-pae-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205548" comment="kernel-pae-base-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205549" comment="kernel-pae-devel-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205550" comment="kernel-source-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205551" comment="kernel-syms-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205552" comment="kernel-trace-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205553" comment="kernel-trace-base-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205554" comment="kernel-trace-devel-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205555" comment="kernel-xen-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205556" comment="kernel-xen-base-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205557" comment="kernel-xen-devel-3.0.101-0.47.106.19 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18022</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-18022" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18022" source="CVE"/>
    <description>
    In ImageMagick 7.0.7-12 Q16, there are memory leaks in MontageImageCommand in MagickWand/montage.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-18022.html">CVE-2017-18022</cve>
<bugzilla href="https://bugzilla.suse.com/1074969">SUSE bug 1074969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1074975">SUSE bug 1074975</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202283" comment="ImageMagick-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209124" comment="libMagickCore1-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209125" comment="libMagickCore1-32bit-6.4.3.6-7.78.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18027</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-18027" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18027" source="CVE"/>
    <description>
    In ImageMagick 7.0.7-1 Q16, a memory leak vulnerability was found in the function ReadMATImage in coders/mat.c, which allow remote attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-18027.html">CVE-2017-18027</cve>
<bugzilla href="https://bugzilla.suse.com/1076051">SUSE bug 1076051</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202290" comment="ImageMagick-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209126" comment="libMagickCore1-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209127" comment="libMagickCore1-32bit-6.4.3.6-7.78.29 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18028</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-18028" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18028" source="CVE"/>
    <description>
    In ImageMagick 7.0.7-1 Q16, a memory exhaustion vulnerability was found in the function ReadTIFFImage in coders/tiff.c, which allow remote attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-18028.html">CVE-2017-18028</cve>
<bugzilla href="https://bugzilla.suse.com/1076182">SUSE bug 1076182</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1082792">SUSE bug 1082792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1085236">SUSE bug 1085236</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202297" comment="ImageMagick-6.4.3.6-7.78.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209128" comment="libMagickCore1-6.4.3.6-7.78.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209129" comment="libMagickCore1-32bit-6.4.3.6-7.78.34 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18029</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-18029" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18029" source="CVE"/>
    <description>
    In ImageMagick 7.0.6-10 Q16, a memory leak vulnerability was found in the function ReadMATImage in coders/mat.c, which allow remote attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-18029.html">CVE-2017-18029</cve>
<bugzilla href="https://bugzilla.suse.com/1076021">SUSE bug 1076021</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1076051">SUSE bug 1076051</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202290" comment="ImageMagick-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209126" comment="libMagickCore1-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209127" comment="libMagickCore1-32bit-6.4.3.6-7.78.29 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18030</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-18030" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18030" source="CVE"/>
    <description>
    The cirrus_invalidate_region function in hw/display/cirrus_vga.c in Qemu allows local OS guest privileged users to cause a denial of service (out-of-bounds array access and QEMU process crash) via vectors related to negative pitch.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-18030.html">CVE-2017-18030</cve>
<bugzilla href="https://bugzilla.suse.com/1076179">SUSE bug 1076179</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1076180">SUSE bug 1076180</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205628" comment="kvm-1.4.2-53.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205997" comment="xen-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209094" comment="xen-doc-html-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209095" comment="xen-doc-pdf-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205998" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205999" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206000" comment="xen-libs-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209096" comment="xen-libs-32bit-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209097" comment="xen-tools-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206001" comment="xen-tools-domU-4.2.5_21-45.19 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205628" comment="kvm-1.4.2-53.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250468" comment="xen-4.2.5_21-47.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250469" comment="xen-doc-html-4.2.5_21-47.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250470" comment="xen-doc-pdf-4.2.5_21-47.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250471" comment="xen-kmp-default-4.2.5_21_3.0.101_0.150.TDC-47.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250472" comment="xen-libs-4.2.5_21-47.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250473" comment="xen-tools-4.2.5_21-47.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250474" comment="xen-tools-domU-4.2.5_21-47.21 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18079</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-18079" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18079" source="CVE"/>
    <description>
    drivers/input/serio/i8042.c in the Linux kernel before 4.12.4 allows attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact because the port-&gt;exists value can change after it is validated.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-18079.html">CVE-2017-18079</cve>
<bugzilla href="https://bugzilla.suse.com/1077922">SUSE bug 1077922</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208665" comment="kernel-bigsmp-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208666" comment="kernel-bigsmp-base-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208667" comment="kernel-bigsmp-devel-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205541" comment="kernel-default-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205542" comment="kernel-default-base-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205543" comment="kernel-default-devel-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208668" comment="kernel-default-man-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205544" comment="kernel-ec2-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205545" comment="kernel-ec2-base-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205546" comment="kernel-ec2-devel-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205547" comment="kernel-pae-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205548" comment="kernel-pae-base-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205549" comment="kernel-pae-devel-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205550" comment="kernel-source-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205551" comment="kernel-syms-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205552" comment="kernel-trace-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205553" comment="kernel-trace-base-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205554" comment="kernel-trace-devel-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205555" comment="kernel-xen-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205556" comment="kernel-xen-base-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205557" comment="kernel-xen-devel-3.0.101-0.47.106.19 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18203</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-18203" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203" source="CVE"/>
    <description>
    The dm_get_from_kobject function in drivers/md/dm.c in the Linux kernel before 4.14.3 allow local users to cause a denial of service (BUG) by leveraging a race condition with __dm_destroy during creation and removal of DM devices.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-18203.html">CVE-2017-18203</cve>
<bugzilla href="https://bugzilla.suse.com/1083242">SUSE bug 1083242</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208695" comment="kernel-bigsmp-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208696" comment="kernel-bigsmp-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208697" comment="kernel-bigsmp-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205609" comment="kernel-default-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205610" comment="kernel-default-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205611" comment="kernel-default-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208698" comment="kernel-default-man-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205612" comment="kernel-ec2-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205613" comment="kernel-ec2-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205614" comment="kernel-ec2-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205615" comment="kernel-pae-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205616" comment="kernel-pae-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205617" comment="kernel-pae-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205618" comment="kernel-source-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205619" comment="kernel-syms-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205620" comment="kernel-trace-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205621" comment="kernel-trace-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205622" comment="kernel-trace-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205623" comment="kernel-xen-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205624" comment="kernel-xen-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205625" comment="kernel-xen-devel-3.0.101-0.47.106.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18207</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-18207" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18207" source="CVE"/>
    <description>
    ** DISPUTED ** The Wave_read._read_fmt_chunk function in Lib/wave.py in Python through 3.6.4 does not ensure a nonzero channel value, which allows attackers to cause a denial of service (divide-by-zero and exception) via a crafted wav format audio file. NOTE: the vendor disputes this issue because Python applications "need to be prepared to handle a wide variety of exceptions."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-18207.html">CVE-2017-18207</cve>
<bugzilla href="https://bugzilla.suse.com/1083507">SUSE bug 1083507</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009229384" comment="libpython2_6-1_0-2.6.9-40.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229385" comment="libpython2_6-1_0-32bit-2.6.9-40.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249558" comment="libpython2_7-1_0-2.7.9-6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249559" comment="libpython2_7-1_0-32bit-2.7.9-6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229348" comment="python-2.6.9-40.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229349" comment="python-32bit-2.6.9-40.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229350" comment="python-base-2.6.9-40.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229387" comment="python-base-32bit-2.6.9-40.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229389" comment="python-curses-2.6.9-40.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229351" comment="python-demo-2.6.9-40.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229353" comment="python-doc-2.6-8.40.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229354" comment="python-doc-pdf-2.6-8.40.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229355" comment="python-gdbm-2.6.9-40.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229356" comment="python-idle-2.6.9-40.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229357" comment="python-tk-2.6.9-40.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229391" comment="python-xml-2.6.9-40.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249560" comment="python27-2.7.9-6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249561" comment="python27-32bit-2.7.9-6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249562" comment="python27-base-2.7.9-6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249563" comment="python27-base-32bit-2.7.9-6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249564" comment="python27-curses-2.7.9-6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249565" comment="python27-demo-2.7.9-6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249566" comment="python27-devel-2.7.9-6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249567" comment="python27-doc-2.7.9-6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249568" comment="python27-doc-pdf-2.7.9-6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249569" comment="python27-gdbm-2.7.9-6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249570" comment="python27-idle-2.7.9-6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249571" comment="python27-tk-2.7.9-6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249572" comment="python27-xml-2.7.9-6.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18208</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-18208" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18208" source="CVE"/>
    <description>
    The madvise_willneed function in mm/madvise.c in the Linux kernel before 4.14.4 allows local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-18208.html">CVE-2017-18208</cve>
<bugzilla href="https://bugzilla.suse.com/1083494">SUSE bug 1083494</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208695" comment="kernel-bigsmp-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208696" comment="kernel-bigsmp-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208697" comment="kernel-bigsmp-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205609" comment="kernel-default-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205610" comment="kernel-default-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205611" comment="kernel-default-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208698" comment="kernel-default-man-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205612" comment="kernel-ec2-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205613" comment="kernel-ec2-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205614" comment="kernel-ec2-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205615" comment="kernel-pae-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205616" comment="kernel-pae-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205617" comment="kernel-pae-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205618" comment="kernel-source-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205619" comment="kernel-syms-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205620" comment="kernel-trace-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205621" comment="kernel-trace-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205622" comment="kernel-trace-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205623" comment="kernel-xen-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205624" comment="kernel-xen-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205625" comment="kernel-xen-devel-3.0.101-0.47.106.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18219</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-18219" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219" source="CVE"/>
    <description>
    An issue was discovered in GraphicsMagick 1.3.26. An allocation failure vulnerability was found in the function ReadOnePNGImage in coders/png.c, which allows attackers to cause a denial of service via a crafted file that triggers an attempt at a large png_pixels array allocation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-18219.html">CVE-2017-18219</cve>
<bugzilla href="https://bugzilla.suse.com/1084060">SUSE bug 1084060</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202311" comment="ImageMagick-6.4.3.6-78.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209132" comment="libMagickCore1-6.4.3.6-78.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209133" comment="libMagickCore1-32bit-6.4.3.6-78.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18234</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-18234" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18234" source="CVE"/>
    <description>
    An issue was discovered in Exempi before 2.4.3. It allows remote attackers to cause a denial of service (invalid memcpy with resultant use-after-free) or possibly have unspecified other impact via a .pdf file containing JPEG data, related to XMPFiles/source/FormatSupport/ReconcileTIFF.cpp, XMPFiles/source/FormatSupport/TIFF_MemoryReader.cpp, and XMPFiles/source/FormatSupport/TIFF_Support.hpp.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-18234.html">CVE-2017-18234</cve>
<bugzilla href="https://bugzilla.suse.com/1085585">SUSE bug 1085585</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1103718">SUSE bug 1103718</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009230745" comment="exempi-2.0.2-4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230752" comment="libexempi3-2.0.2-4.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18251</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-18251" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18251" source="CVE"/>
    <description>
    An issue was discovered in ImageMagick 7.0.7. A memory leak vulnerability was found in the function ReadPCDImage in coders/pcd.c, which allow remote attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-18251.html">CVE-2017-18251</cve>
<bugzilla href="https://bugzilla.suse.com/1087037">SUSE bug 1087037</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202318" comment="ImageMagick-6.4.3.6-78.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209134" comment="libMagickCore1-6.4.3.6-78.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209135" comment="libMagickCore1-32bit-6.4.3.6-78.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18252</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-18252" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18252" source="CVE"/>
    <description>
    An issue was discovered in ImageMagick 7.0.7. The MogrifyImageList function in MagickWand/mogrify.c allows attackers to cause a denial of service (assertion failure and application exit in ReplaceImageInList) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-18252.html">CVE-2017-18252</cve>
<bugzilla href="https://bugzilla.suse.com/1087033">SUSE bug 1087033</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202318" comment="ImageMagick-6.4.3.6-78.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209134" comment="libMagickCore1-6.4.3.6-78.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209135" comment="libMagickCore1-32bit-6.4.3.6-78.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18254</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-18254" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18254" source="CVE"/>
    <description>
    An issue was discovered in ImageMagick 7.0.7. A memory leak vulnerability was found in the function WriteGIFImage in coders/gif.c, which allow remote attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-18254.html">CVE-2017-18254</cve>
<bugzilla href="https://bugzilla.suse.com/1087027">SUSE bug 1087027</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202318" comment="ImageMagick-6.4.3.6-78.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209134" comment="libMagickCore1-6.4.3.6-78.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209135" comment="libMagickCore1-32bit-6.4.3.6-78.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18271</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-18271" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18271" source="CVE"/>
    <description>
    In ImageMagick 7.0.7-16 Q16 x86_64 2017-12-22, an infinite loop vulnerability was found in the function ReadMIFFImage in coders/miff.c, which allows attackers to cause a denial of service (CPU exhaustion) via a crafted MIFF image file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-18271.html">CVE-2017-18271</cve>
<bugzilla href="https://bugzilla.suse.com/1094204">SUSE bug 1094204</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009233150" comment="ImageMagick-6.4.3.6-78.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233160" comment="libMagickCore1-6.4.3.6-78.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233161" comment="libMagickCore1-32bit-6.4.3.6-78.56 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18360</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-18360" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18360" source="CVE"/>
    <description>
    In change_port_settings in drivers/usb/serial/io_ti.c in the Linux kernel before 4.11.3, local users could cause a denial of service by division-by-zero in the serial device layer by trying to set very high baud rates.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-18360.html">CVE-2017-18360</cve>
<bugzilla href="https://bugzilla.suse.com/1123706">SUSE bug 1123706</bugzilla>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:201718509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18509</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-18509" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18509" source="CVE"/>
    <description>
    An issue was discovered in net/ipv6/ip6mr.c in the Linux kernel before 4.11. By setting a specific socket option, an attacker can control a pointer in kernel land and cause an inet_csk_listen_stop general protection fault, or potentially execute arbitrary code under certain circumstances. The issue can be triggered as root (e.g., inside a default LXC container or with the CAP_NET_ADMIN capability) or after namespace unsharing. This occurs because sk_type and protocol are not checked in the appropriate part of the ip6_mroute_* functions. NOTE: this affects Linux distributions that use 4.9.x longterm kernels before 4.9.187.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-18509.html">CVE-2017-18509</cve>
<bugzilla href="https://bugzilla.suse.com/1145477">SUSE bug 1145477</bugzilla>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:201718551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18551</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-18551" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18551" source="CVE"/>
    <description>
    An issue was discovered in drivers/i2c/i2c-core-smbus.c in the Linux kernel before 4.14.15. There is an out of bounds write in the function i2c_smbus_xfer_emulated.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-18551.html">CVE-2017-18551</cve>
<bugzilla href="https://bugzilla.suse.com/1146163">SUSE bug 1146163</bugzilla>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:20172295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2295</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-2295" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2295" source="CVE"/>
    <description>
    Versions of Puppet prior to 4.10.1 will deserialize data off the wire (from the agent to the server, in this case) with a attacker-specified format. This could be used to force YAML deserialization in an unsafe manner, which would lead to remote code execution. This change constrains the format of data on the wire to PSON or safely decoded YAML.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-2295.html">CVE-2017-2295</cve>
<bugzilla href="https://bugzilla.suse.com/1040151">SUSE bug 1040151</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210664" comment="puppet-2.7.26-0.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210665" comment="puppet-server-2.7.26-0.5.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2579</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-2579" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2579" source="CVE"/>
    <description>
    An out-of-bounds read vulnerability was found in netpbm before 10.61. The expandCodeOntoStack() function has an insufficient code value check, so that a maliciously crafted file could cause the application to crash or possibly allows code execution.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-2579.html">CVE-2017-2579</cve>
<bugzilla href="https://bugzilla.suse.com/1024287">SUSE bug 1024287</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1024288">SUSE bug 1024288</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009257955" comment="libnetpbm10-10.26.44-101.15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009257957" comment="libnetpbm10-32bit-10.26.44-101.15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009257956" comment="netpbm-10.26.44-101.15.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2580</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-2580" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2580" source="CVE"/>
    <description>
    An out-of-bounds write vulnerability was found in netpbm before 10.61. A maliciously crafted file could cause the application to crash or possibly allow code execution.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-2580.html">CVE-2017-2580</cve>
<bugzilla href="https://bugzilla.suse.com/1024287">SUSE bug 1024287</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1024291">SUSE bug 1024291</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009257955" comment="libnetpbm10-10.26.44-101.15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009257957" comment="libnetpbm10-32bit-10.26.44-101.15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009257956" comment="netpbm-10.26.44-101.15.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2581</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-2581" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2581" source="CVE"/>
    <description>
    An out-of-bounds write vulnerability was found in netpbm before 10.61. A maliciously crafted file could cause the application to crash or possibly allow code execution.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-2581.html">CVE-2017-2581</cve>
<bugzilla href="https://bugzilla.suse.com/1024287">SUSE bug 1024287</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210122" comment="libnetpbm10-10.26.44-101.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210123" comment="libnetpbm10-32bit-10.26.44-101.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203209" comment="netpbm-10.26.44-101.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2615</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-2615" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2615" source="CVE"/>
    <description>
    Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA emulator support is vulnerable to an out-of-bounds access issue. It could occur while copying VGA data via bitblt copy in backward mode. A privileged user inside a guest could use this flaw to crash the QEMU process resulting in DoS or potentially execute arbitrary code on the host with privileges of QEMU process on the host.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-2615.html">CVE-2017-2615</cve>
<bugzilla href="https://bugzilla.suse.com/1023004">SUSE bug 1023004</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205626" comment="kvm-1.4.2-53.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205957" comment="xen-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209062" comment="xen-doc-html-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209063" comment="xen-doc-pdf-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205958" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205959" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205960" comment="xen-libs-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209064" comment="xen-libs-32bit-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209065" comment="xen-tools-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205961" comment="xen-tools-domU-4.2.5_21-35 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205626" comment="kvm-1.4.2-53.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250412" comment="xen-4.2.5_21-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250413" comment="xen-doc-html-4.2.5_21-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250414" comment="xen-doc-pdf-4.2.5_21-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250415" comment="xen-kmp-default-4.2.5_21_3.0.101_0.116.TDC-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250416" comment="xen-libs-4.2.5_21-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250417" comment="xen-tools-4.2.5_21-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250418" comment="xen-tools-domU-4.2.5_21-37 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205957" comment="xen-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209062" comment="xen-doc-html-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209063" comment="xen-doc-pdf-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205958" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205960" comment="xen-libs-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209064" comment="xen-libs-32bit-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209065" comment="xen-tools-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205961" comment="xen-tools-domU-4.2.5_21-35 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2616</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-2616" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2616" source="CVE"/>
    <description>
    A race condition was found in util-linux before 2.32.1 in the way su handled the management of child processes. A local authenticated attacker could use this flaw to kill other processes with root privileges under specific conditions.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-2616.html">CVE-2017-2616</cve>
<bugzilla href="https://bugzilla.suse.com/1023041">SUSE bug 1023041</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123789">SUSE bug 1123789</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209192" comment="coreutils-8.12-6.25.33.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209193" comment="coreutils-lang-8.12-6.25.33.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2619</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-2619" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2619" source="CVE"/>
    <description>
    Samba before versions 4.6.1, 4.5.7 and 4.4.11 are vulnerable to a malicious client using a symlink race to allow access to areas of the server file system not exported under the share definition.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-2619.html">CVE-2017-2619</cve>
<bugzilla href="https://bugzilla.suse.com/1027147">SUSE bug 1027147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1036283">SUSE bug 1036283</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205892" comment="ldapsmb-1.34b-90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205893" comment="libldb1-3.6.3-90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205894" comment="libsmbclient0-3.6.3-90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208993" comment="libsmbclient0-32bit-3.6.3-90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205895" comment="libtalloc2-3.6.3-90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208994" comment="libtalloc2-32bit-3.6.3-90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205896" comment="libtdb1-3.6.3-90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208995" comment="libtdb1-32bit-3.6.3-90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205897" comment="libtevent0-3.6.3-90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208996" comment="libtevent0-32bit-3.6.3-90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205898" comment="libwbclient0-3.6.3-90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208997" comment="libwbclient0-32bit-3.6.3-90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203489" comment="samba-3.6.3-90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208998" comment="samba-32bit-3.6.3-90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205899" comment="samba-client-3.6.3-90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208999" comment="samba-client-32bit-3.6.3-90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205900" comment="samba-doc-3.6.3-90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205901" comment="samba-krb-printing-3.6.3-90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205902" comment="samba-winbind-3.6.3-90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209000" comment="samba-winbind-32bit-3.6.3-90 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2620</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-2620" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2620" source="CVE"/>
    <description>
    Quick emulator (QEMU) before 2.8 built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to an out-of-bounds access issue. The issue could occur while copying VGA data in cirrus_bitblt_cputovideo. A privileged user inside guest could use this flaw to crash the QEMU process OR potentially execute arbitrary code on host with privileges of the QEMU process.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-2620.html">CVE-2017-2620</cve>
<bugzilla href="https://bugzilla.suse.com/1024834">SUSE bug 1024834</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1024972">SUSE bug 1024972</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205626" comment="kvm-1.4.2-53.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205957" comment="xen-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209062" comment="xen-doc-html-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209063" comment="xen-doc-pdf-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205958" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205959" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205960" comment="xen-libs-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209064" comment="xen-libs-32bit-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209065" comment="xen-tools-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205961" comment="xen-tools-domU-4.2.5_21-35 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205626" comment="kvm-1.4.2-53.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250412" comment="xen-4.2.5_21-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250413" comment="xen-doc-html-4.2.5_21-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250414" comment="xen-doc-pdf-4.2.5_21-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250415" comment="xen-kmp-default-4.2.5_21_3.0.101_0.116.TDC-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250416" comment="xen-libs-4.2.5_21-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250417" comment="xen-tools-4.2.5_21-37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250418" comment="xen-tools-domU-4.2.5_21-37 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205957" comment="xen-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209062" comment="xen-doc-html-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209063" comment="xen-doc-pdf-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205958" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205960" comment="xen-libs-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209064" comment="xen-libs-32bit-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209065" comment="xen-tools-4.2.5_21-35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205961" comment="xen-tools-domU-4.2.5_21-35 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2624</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-2624" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2624" source="CVE"/>
    <description>
    It was found that xorg-x11-server before 1.19.0 including uses memcmp() to check the received MIT cookie against a series of valid cookies. If the cookie is correct, it is allowed to attach to the Xorg session. Since most memcmp() implementations return after an invalid byte is seen, this causes a time difference between a valid and invalid byte, which could allow an efficient brute force attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-2624.html">CVE-2017-2624</cve>
<bugzilla href="https://bugzilla.suse.com/1025029">SUSE bug 1025029</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1025639">SUSE bug 1025639</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1035283">SUSE bug 1035283</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210991" comment="xorg-x11-Xvnc-7.4-27.118 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203698" comment="xorg-x11-server-7.4-27.118 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210992" comment="xorg-x11-server-extra-7.4-27.118 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2625</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-2625" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2625" source="CVE"/>
    <description>
    It was discovered that libXdmcp before 1.1.2 including used weak entropy to generate session keys. On a multi-user system using xdmcp, a local attacker could potentially use information available from the process list to brute force the key, allowing them to hijack other users' sessions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-2625.html">CVE-2017-2625</cve>
<bugzilla href="https://bugzilla.suse.com/1025046">SUSE bug 1025046</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1025068">SUSE bug 1025068</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1025639">SUSE bug 1025639</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123802">SUSE bug 1123802</bugzilla>
<bugzilla href="https://bugzilla.suse.com/815650">SUSE bug 815650</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203676" comment="xorg-x11-libXdmcp-7.4-3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203677" comment="xorg-x11-libXdmcp-32bit-7.4-3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2626</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-2626" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2626" source="CVE"/>
    <description>
    It was discovered that libICE before 1.0.9-8 used a weak entropy to generate keys. A local attacker could potentially use this flaw for session hijacking using the information available from the process list.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-2626.html">CVE-2017-2626</cve>
<bugzilla href="https://bugzilla.suse.com/1025068">SUSE bug 1025068</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1025639">SUSE bug 1025639</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1048274">SUSE bug 1048274</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123800">SUSE bug 1123800</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203667" comment="xorg-x11-libICE-7.4-3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210972" comment="xorg-x11-libICE-32bit-7.4-3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2633</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-2633" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2633" source="CVE"/>
    <description>
    An out-of-bounds memory access issue was found in Quick Emulator (QEMU) before 1.7.2 in the VNC display driver. This flaw could occur while refreshing the VNC display surface area in the 'vnc_refresh_server_surface'. A user inside a guest could use this flaw to crash the QEMU process.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-2633.html">CVE-2017-2633</cve>
<bugzilla href="https://bugzilla.suse.com/1026612">SUSE bug 1026612</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1026636">SUSE bug 1026636</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1074701">SUSE bug 1074701</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205627" comment="kvm-1.4.2-53.14 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-2636" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2636" source="CVE"/>
    <description>
    Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-2636.html">CVE-2017-2636</cve>
<bugzilla href="https://bugzilla.suse.com/1027565">SUSE bug 1027565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1027575">SUSE bug 1027575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1028372">SUSE bug 1028372</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208606" comment="kernel-bigsmp-3.0.101-0.47.99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208607" comment="kernel-bigsmp-base-3.0.101-0.47.99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208608" comment="kernel-bigsmp-devel-3.0.101-0.47.99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205456" comment="kernel-default-3.0.101-0.47.99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205457" comment="kernel-default-base-3.0.101-0.47.99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205458" comment="kernel-default-devel-3.0.101-0.47.99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205459" comment="kernel-ec2-3.0.101-0.47.99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205460" comment="kernel-ec2-base-3.0.101-0.47.99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205461" comment="kernel-ec2-devel-3.0.101-0.47.99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205465" comment="kernel-source-3.0.101-0.47.99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205466" comment="kernel-syms-3.0.101-0.47.99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205467" comment="kernel-trace-3.0.101-0.47.99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205468" comment="kernel-trace-base-3.0.101-0.47.99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205469" comment="kernel-trace-devel-3.0.101-0.47.99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205470" comment="kernel-xen-3.0.101-0.47.99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205471" comment="kernel-xen-base-3.0.101-0.47.99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205472" comment="kernel-xen-devel-3.0.101-0.47.99 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208606" comment="kernel-bigsmp-3.0.101-0.47.99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208607" comment="kernel-bigsmp-base-3.0.101-0.47.99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208608" comment="kernel-bigsmp-devel-3.0.101-0.47.99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205456" comment="kernel-default-3.0.101-0.47.99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205457" comment="kernel-default-base-3.0.101-0.47.99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205458" comment="kernel-default-devel-3.0.101-0.47.99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208609" comment="kernel-default-man-3.0.101-0.47.99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205459" comment="kernel-ec2-3.0.101-0.47.99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205460" comment="kernel-ec2-base-3.0.101-0.47.99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205461" comment="kernel-ec2-devel-3.0.101-0.47.99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205462" comment="kernel-pae-3.0.101-0.47.99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205463" comment="kernel-pae-base-3.0.101-0.47.99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205464" comment="kernel-pae-devel-3.0.101-0.47.99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205465" comment="kernel-source-3.0.101-0.47.99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205466" comment="kernel-syms-3.0.101-0.47.99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205467" comment="kernel-trace-3.0.101-0.47.99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205468" comment="kernel-trace-base-3.0.101-0.47.99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205469" comment="kernel-trace-devel-3.0.101-0.47.99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205470" comment="kernel-xen-3.0.101-0.47.99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205471" comment="kernel-xen-base-3.0.101-0.47.99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205472" comment="kernel-xen-devel-3.0.101-0.47.99 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2647</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-2647" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2647" source="CVE"/>
    <description>
    The KEYS subsystem in the Linux kernel before 3.18 allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving a NULL value for a certain match field, related to the keyring_search_iterator function in keyring.c.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-2647.html">CVE-2017-2647</cve>
<bugzilla href="https://bugzilla.suse.com/1030593">SUSE bug 1030593</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208691" comment="kernel-bigsmp-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208692" comment="kernel-bigsmp-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208693" comment="kernel-bigsmp-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205592" comment="kernel-default-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205593" comment="kernel-default-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205594" comment="kernel-default-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208694" comment="kernel-default-man-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205595" comment="kernel-ec2-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205596" comment="kernel-ec2-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205597" comment="kernel-ec2-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205598" comment="kernel-pae-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205599" comment="kernel-pae-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205600" comment="kernel-pae-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205601" comment="kernel-source-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205602" comment="kernel-syms-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205603" comment="kernel-trace-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205604" comment="kernel-trace-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205605" comment="kernel-trace-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205606" comment="kernel-xen-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205607" comment="kernel-xen-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205608" comment="kernel-xen-devel-3.0.101-0.47.106.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2671</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-2671" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2671" source="CVE"/>
    <description>
    The ping_unhash function in net/ipv4/ping.c in the Linux kernel through 4.10.8 is too late in obtaining a certain lock and consequently cannot ensure that disconnect function calls are safe, which allows local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-2671.html">CVE-2017-2671</cve>
<bugzilla href="https://bugzilla.suse.com/1027179">SUSE bug 1027179</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1031003">SUSE bug 1031003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208691" comment="kernel-bigsmp-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208692" comment="kernel-bigsmp-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208693" comment="kernel-bigsmp-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205592" comment="kernel-default-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205593" comment="kernel-default-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205594" comment="kernel-default-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208694" comment="kernel-default-man-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205595" comment="kernel-ec2-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205596" comment="kernel-ec2-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205597" comment="kernel-ec2-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205598" comment="kernel-pae-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205599" comment="kernel-pae-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205600" comment="kernel-pae-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205601" comment="kernel-source-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205602" comment="kernel-syms-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205603" comment="kernel-trace-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205604" comment="kernel-trace-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205605" comment="kernel-trace-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205606" comment="kernel-xen-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205607" comment="kernel-xen-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205608" comment="kernel-xen-devel-3.0.101-0.47.106.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2862</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-2862" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2862" source="CVE"/>
    <description>
    An exploitable heap overflow vulnerability exists in the gdk_pixbuf__jpeg_image_load_increment functionality of Gdk-Pixbuf 2.36.6. A specially crafted jpeg file can cause a heap overflow resulting in remote code execution. An attacker can send a file or url to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-2862.html">CVE-2017-2862</cve>
<bugzilla href="https://bugzilla.suse.com/1048289">SUSE bug 1048289</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009233157" comment="gtk2-2.18.9-0.45.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233162" comment="gtk2-32bit-2.18.9-0.45.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233163" comment="gtk2-doc-2.18.9-0.45.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233164" comment="gtk2-lang-2.18.9-0.45.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2870</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-2870" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2870" source="CVE"/>
    <description>
    An exploitable integer overflow vulnerability exists in the tiff_image_parse functionality of Gdk-Pixbuf 2.36.6 when compiled with Clang. A specially crafted tiff file can cause a heap-overflow resulting in remote code execution. An attacker can send a file or a URL to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-2870.html">CVE-2017-2870</cve>
<bugzilla href="https://bugzilla.suse.com/1048289">SUSE bug 1048289</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1048544">SUSE bug 1048544</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009233157" comment="gtk2-2.18.9-0.45.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233162" comment="gtk2-32bit-2.18.9-0.45.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233163" comment="gtk2-doc-2.18.9-0.45.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233164" comment="gtk2-lang-2.18.9-0.45.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3135</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-3135" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3135" source="CVE"/>
    <description>
    Under some conditions when using both DNS64 and RPZ to rewrite query responses, query processing can resume in an inconsistent state leading to either an INSIST assertion failure or an attempt to read through a NULL pointer. Affects BIND 9.8.8, 9.9.3-S1 -&gt; 9.9.9-S7, 9.9.3 -&gt; 9.9.9-P5, 9.9.10b1, 9.10.0 -&gt; 9.10.4-P5, 9.10.5b1, 9.11.0 -&gt; 9.11.0-P2, 9.11.1b1.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3135.html">CVE-2017-3135</cve>
<bugzilla href="https://bugzilla.suse.com/1018700">SUSE bug 1018700</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1018701">SUSE bug 1018701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1018702">SUSE bug 1018702</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1024130">SUSE bug 1024130</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1033466">SUSE bug 1033466</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202446" comment="bind-9.9.6P1-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205291" comment="bind-chrootenv-9.9.6P1-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205292" comment="bind-doc-9.9.6P1-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205293" comment="bind-libs-9.9.6P1-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208438" comment="bind-libs-32bit-9.9.6P1-0.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205294" comment="bind-utils-9.9.6P1-0.39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3136</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-3136" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3136" source="CVE"/>
    <description>
    A query with a specific set of characteristics could cause a server using DNS64 to encounter an assertion failure and terminate. An attacker could deliberately construct a query, enabling denial-of-service against a server if it was configured to use the DNS64 feature and other preconditions were met. Affects BIND 9.8.0 -&gt; 9.8.8-P1, 9.9.0 -&gt; 9.9.9-P6, 9.9.10b1-&gt;9.9.10rc1, 9.10.0 -&gt; 9.10.4-P6, 9.10.5b1-&gt;9.10.5rc1, 9.11.0 -&gt; 9.11.0-P3, 9.11.1b1-&gt;9.11.1rc1, 9.9.3-S1 -&gt; 9.9.9-S8.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3136.html">CVE-2017-3136</cve>
<bugzilla href="https://bugzilla.suse.com/1018700">SUSE bug 1018700</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1018701">SUSE bug 1018701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1018702">SUSE bug 1018702</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1024130">SUSE bug 1024130</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1033461">SUSE bug 1033461</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1033466">SUSE bug 1033466</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1081545">SUSE bug 1081545</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202449" comment="bind-9.9.6P1-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205295" comment="bind-chrootenv-9.9.6P1-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202450" comment="bind-devel-9.9.6P1-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205296" comment="bind-doc-9.9.6P1-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205297" comment="bind-libs-9.9.6P1-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208439" comment="bind-libs-32bit-9.9.6P1-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205298" comment="bind-utils-9.9.6P1-0.44 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202449" comment="bind-9.9.6P1-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205295" comment="bind-chrootenv-9.9.6P1-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205296" comment="bind-doc-9.9.6P1-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205297" comment="bind-libs-9.9.6P1-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208439" comment="bind-libs-32bit-9.9.6P1-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205298" comment="bind-utils-9.9.6P1-0.44 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3137</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-3137" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3137" source="CVE"/>
    <description>
    Mistaken assumptions about the ordering of records in the answer section of a response containing CNAME or DNAME resource records could lead to a situation in which named would exit with an assertion failure when processing a response in which records occurred in an unusual order. Affects BIND 9.9.9-P6, 9.9.10b1-&gt;9.9.10rc1, 9.10.4-P6, 9.10.5b1-&gt;9.10.5rc1, 9.11.0-P3, 9.11.1b1-&gt;9.11.1rc1, and 9.9.9-S8.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3137.html">CVE-2017-3137</cve>
<bugzilla href="https://bugzilla.suse.com/1018700">SUSE bug 1018700</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1018701">SUSE bug 1018701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1018702">SUSE bug 1018702</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1024130">SUSE bug 1024130</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1033461">SUSE bug 1033461</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1033466">SUSE bug 1033466</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1033467">SUSE bug 1033467</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1034162">SUSE bug 1034162</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1076118">SUSE bug 1076118</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1081545">SUSE bug 1081545</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202452" comment="bind-9.9.6P1-0.47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205299" comment="bind-chrootenv-9.9.6P1-0.47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202453" comment="bind-devel-9.9.6P1-0.47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205300" comment="bind-doc-9.9.6P1-0.47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205301" comment="bind-libs-9.9.6P1-0.47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208440" comment="bind-libs-32bit-9.9.6P1-0.47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205302" comment="bind-utils-9.9.6P1-0.47 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202452" comment="bind-9.9.6P1-0.47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205299" comment="bind-chrootenv-9.9.6P1-0.47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205300" comment="bind-doc-9.9.6P1-0.47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205301" comment="bind-libs-9.9.6P1-0.47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208440" comment="bind-libs-32bit-9.9.6P1-0.47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205302" comment="bind-utils-9.9.6P1-0.47 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3138</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-3138" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3138" source="CVE"/>
    <description>
    named contains a feature which allows operators to issue commands to a running server by communicating with the server process over a control channel, using a utility program such as rndc. A regression introduced in a recent feature change has created a situation under which some versions of named can be caused to exit with a REQUIRE assertion failure if they are sent a null command string. Affects BIND 9.9.9-&gt;9.9.9-P7, 9.9.10b1-&gt;9.9.10rc2, 9.10.4-&gt;9.10.4-P7, 9.10.5b1-&gt;9.10.5rc2, 9.11.0-&gt;9.11.0-P4, 9.11.1b1-&gt;9.11.1rc2, 9.9.9-S1-&gt;9.9.9-S9.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3138.html">CVE-2017-3138</cve>
<bugzilla href="https://bugzilla.suse.com/1018700">SUSE bug 1018700</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1018701">SUSE bug 1018701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1018702">SUSE bug 1018702</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1024130">SUSE bug 1024130</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1033461">SUSE bug 1033461</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1033466">SUSE bug 1033466</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1033468">SUSE bug 1033468</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202449" comment="bind-9.9.6P1-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205295" comment="bind-chrootenv-9.9.6P1-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202450" comment="bind-devel-9.9.6P1-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205296" comment="bind-doc-9.9.6P1-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205297" comment="bind-libs-9.9.6P1-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208439" comment="bind-libs-32bit-9.9.6P1-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205298" comment="bind-utils-9.9.6P1-0.44 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202449" comment="bind-9.9.6P1-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205295" comment="bind-chrootenv-9.9.6P1-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205296" comment="bind-doc-9.9.6P1-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205297" comment="bind-libs-9.9.6P1-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208439" comment="bind-libs-32bit-9.9.6P1-0.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205298" comment="bind-utils-9.9.6P1-0.44 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3142</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-3142" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3142" source="CVE"/>
    <description>
    An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name may be able to circumvent TSIG authentication of AXFR requests via a carefully constructed request packet. A server that relies solely on TSIG keys for protection with no other ACL protection could be manipulated into: providing an AXFR of a zone to an unauthorized recipient or accepting bogus NOTIFY packets. Affects BIND 9.4.0-&gt;9.8.8, 9.9.0-&gt;9.9.10-P1, 9.10.0-&gt;9.10.5-P1, 9.11.0-&gt;9.11.1-P1, 9.9.3-S1-&gt;9.9.10-S2, 9.10.5-S1-&gt;9.10.5-S2.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3142.html">CVE-2017-3142</cve>
<bugzilla href="https://bugzilla.suse.com/1024130">SUSE bug 1024130</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1046554">SUSE bug 1046554</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1046555">SUSE bug 1046555</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202455" comment="bind-9.9.6P1-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205303" comment="bind-chrootenv-9.9.6P1-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202456" comment="bind-devel-9.9.6P1-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205304" comment="bind-doc-9.9.6P1-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205305" comment="bind-libs-9.9.6P1-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208441" comment="bind-libs-32bit-9.9.6P1-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205306" comment="bind-utils-9.9.6P1-0.50 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202455" comment="bind-9.9.6P1-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205303" comment="bind-chrootenv-9.9.6P1-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205304" comment="bind-doc-9.9.6P1-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205305" comment="bind-libs-9.9.6P1-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208441" comment="bind-libs-32bit-9.9.6P1-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205306" comment="bind-utils-9.9.6P1-0.50 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-3143" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3143" source="CVE"/>
    <description>
    An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name for the zone and service being targeted may be able to manipulate BIND into accepting an unauthorized dynamic update. Affects BIND 9.4.0-&gt;9.8.8, 9.9.0-&gt;9.9.10-P1, 9.10.0-&gt;9.10.5-P1, 9.11.0-&gt;9.11.1-P1, 9.9.3-S1-&gt;9.9.10-S2, 9.10.5-S1-&gt;9.10.5-S2.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3143.html">CVE-2017-3143</cve>
<bugzilla href="https://bugzilla.suse.com/1024130">SUSE bug 1024130</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1046554">SUSE bug 1046554</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1046555">SUSE bug 1046555</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202455" comment="bind-9.9.6P1-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205303" comment="bind-chrootenv-9.9.6P1-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202456" comment="bind-devel-9.9.6P1-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205304" comment="bind-doc-9.9.6P1-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205305" comment="bind-libs-9.9.6P1-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208441" comment="bind-libs-32bit-9.9.6P1-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205306" comment="bind-utils-9.9.6P1-0.50 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202455" comment="bind-9.9.6P1-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205303" comment="bind-chrootenv-9.9.6P1-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205304" comment="bind-doc-9.9.6P1-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205305" comment="bind-libs-9.9.6P1-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208441" comment="bind-libs-32bit-9.9.6P1-0.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205306" comment="bind-utils-9.9.6P1-0.50 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3144</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-3144" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3144" source="CVE"/>
    <description>
    A vulnerability stemming from failure to properly clean up closed OMAPI connections can lead to exhaustion of the pool of socket descriptors available to the DHCP server. Affects ISC DHCP 4.1.0 to 4.1-ESV-R15, 4.2.0 to 4.2.8, 4.3.0 to 4.3.6. Older versions may also be affected but are well beyond their end-of-life (EOL). Releases prior to 4.1.0 have not been tested.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3144.html">CVE-2017-3144</cve>
<bugzilla href="https://bugzilla.suse.com/1076118">SUSE bug 1076118</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1076119">SUSE bug 1076119</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202501" comment="dhcp-4.2.4.P2-0.28.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209216" comment="dhcp-client-4.2.4.P2-0.28.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209217" comment="dhcp-relay-4.2.4.P2-0.28.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209218" comment="dhcp-server-4.2.4.P2-0.28.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3145</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-3145" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3145" source="CVE"/>
    <description>
    BIND was improperly sequencing cleanup operations on upstream recursion fetch contexts, leading in some cases to a use-after-free error that can trigger an assertion failure and crash in named. Affects BIND 9.0.0 to 9.8.x, 9.9.0 to 9.9.11, 9.10.0 to 9.10.6, 9.11.0 to 9.11.2, 9.9.3-S1 to 9.9.11-S1, 9.10.5-S1 to 9.10.6-S1, 9.12.0a1 to 9.12.0rc1.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3145.html">CVE-2017-3145</cve>
<bugzilla href="https://bugzilla.suse.com/1076118">SUSE bug 1076118</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1101131">SUSE bug 1101131</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202458" comment="bind-9.9.6P1-0.51.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205307" comment="bind-chrootenv-9.9.6P1-0.51.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202459" comment="bind-devel-9.9.6P1-0.51.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205308" comment="bind-doc-9.9.6P1-0.51.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205309" comment="bind-libs-9.9.6P1-0.51.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208442" comment="bind-libs-32bit-9.9.6P1-0.51.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205310" comment="bind-utils-9.9.6P1-0.51.7 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202458" comment="bind-9.9.6P1-0.51.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205307" comment="bind-chrootenv-9.9.6P1-0.51.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205308" comment="bind-doc-9.9.6P1-0.51.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205309" comment="bind-libs-9.9.6P1-0.51.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208442" comment="bind-libs-32bit-9.9.6P1-0.51.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205310" comment="bind-utils-9.9.6P1-0.51.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3167</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-3167" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3167" source="CVE"/>
    <description>
    In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may lead to authentication requirements being bypassed.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3167.html">CVE-2017-3167</cve>
<bugzilla href="https://bugzilla.suse.com/1045065">SUSE bug 1045065</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049674">SUSE bug 1049674</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1052635">SUSE bug 1052635</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1060041">SUSE bug 1060041</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1078450">SUSE bug 1078450</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1095150">SUSE bug 1095150</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202407" comment="apache2-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202408" comment="apache2-devel-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202409" comment="apache2-doc-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202410" comment="apache2-example-pages-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202411" comment="apache2-prefork-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202412" comment="apache2-utils-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202413" comment="apache2-worker-2.2.34-70.12 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202407" comment="apache2-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202409" comment="apache2-doc-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202410" comment="apache2-example-pages-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202411" comment="apache2-prefork-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202412" comment="apache2-utils-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202413" comment="apache2-worker-2.2.34-70.12 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3169</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-3169" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3169" source="CVE"/>
    <description>
    In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_ssl may dereference a NULL pointer when third-party modules call ap_hook_process_connection() during an HTTP request to an HTTPS port.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3169.html">CVE-2017-3169</cve>
<bugzilla href="https://bugzilla.suse.com/1045062">SUSE bug 1045062</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049674">SUSE bug 1049674</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1052635">SUSE bug 1052635</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1060041">SUSE bug 1060041</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1078450">SUSE bug 1078450</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1095150">SUSE bug 1095150</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202407" comment="apache2-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202408" comment="apache2-devel-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202409" comment="apache2-doc-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202410" comment="apache2-example-pages-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202411" comment="apache2-prefork-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202412" comment="apache2-utils-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202413" comment="apache2-worker-2.2.34-70.12 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202407" comment="apache2-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202409" comment="apache2-doc-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202410" comment="apache2-example-pages-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202411" comment="apache2-prefork-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202412" comment="apache2-utils-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202413" comment="apache2-worker-2.2.34-70.12 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3238</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-3238" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3238.html">CVE-2017-3238</cve>
<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1020882">SUSE bug 1020882</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205671" comment="libmysql55client18-5.5.54-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208791" comment="libmysql55client18-32bit-5.5.54-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205672" comment="libmysql55client_r18-5.5.54-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203174" comment="mysql-5.5.54-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205673" comment="mysql-client-5.5.54-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205674" comment="mysql-tools-5.5.54-0.35 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3243</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-3243" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Charsets). Supported versions that are affected are 5.5.53 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 4.4 (Availability impacts).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3243.html">CVE-2017-3243</cve>
<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1020891">SUSE bug 1020891</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205671" comment="libmysql55client18-5.5.54-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208791" comment="libmysql55client18-32bit-5.5.54-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205672" comment="libmysql55client_r18-5.5.54-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203174" comment="mysql-5.5.54-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205673" comment="mysql-client-5.5.54-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205674" comment="mysql-tools-5.5.54-0.35 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3244</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-3244" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3244.html">CVE-2017-3244</cve>
<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1020877">SUSE bug 1020877</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205671" comment="libmysql55client18-5.5.54-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208791" comment="libmysql55client18-32bit-5.5.54-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205672" comment="libmysql55client_r18-5.5.54-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203174" comment="mysql-5.5.54-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205673" comment="mysql-client-5.5.54-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205674" comment="mysql-tools-5.5.54-0.35 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3258</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-3258" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3258.html">CVE-2017-3258</cve>
<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1020875">SUSE bug 1020875</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205671" comment="libmysql55client18-5.5.54-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208791" comment="libmysql55client18-32bit-5.5.54-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205672" comment="libmysql55client_r18-5.5.54-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203174" comment="mysql-5.5.54-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205673" comment="mysql-client-5.5.54-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205674" comment="mysql-tools-5.5.54-0.35 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3265</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-3265" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 5.6 (Confidentiality and Availability impacts).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3265.html">CVE-2017-3265</cve>
<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1020885">SUSE bug 1020885</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205671" comment="libmysql55client18-5.5.54-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208791" comment="libmysql55client18-32bit-5.5.54-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205672" comment="libmysql55client_r18-5.5.54-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203174" comment="mysql-5.5.54-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205673" comment="mysql-client-5.5.54-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205674" comment="mysql-tools-5.5.54-0.35 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3291</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-3291" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS v3.0 Base Score 6.3 (Confidentiality, Integrity and Availability impacts).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3291.html">CVE-2017-3291</cve>
<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1020884">SUSE bug 1020884</bugzilla>
<bugzilla href="https://bugzilla.suse.com/998309">SUSE bug 998309</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205671" comment="libmysql55client18-5.5.54-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208791" comment="libmysql55client18-32bit-5.5.54-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205672" comment="libmysql55client_r18-5.5.54-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203174" comment="mysql-5.5.54-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205673" comment="mysql-client-5.5.54-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205674" comment="mysql-tools-5.5.54-0.35 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3302</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-3302" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302" source="CVE"/>
    <description>
    Crash in libmysqlclient.so in Oracle MySQL before 5.6.21 and 5.7.x before 5.7.5 and MariaDB through 5.5.54, 10.0.x through 10.0.29, 10.1.x through 10.1.21, and 10.2.x through 10.2.3.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3302.html">CVE-2017-3302</cve>
<bugzilla href="https://bugzilla.suse.com/1022428">SUSE bug 1022428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1034850">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1034911">SUSE bug 1034911</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210061" comment="libmysql55client18-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210062" comment="libmysql55client18-32bit-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210064" comment="libmysql55client_r18-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203177" comment="mysql-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210065" comment="mysql-client-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210066" comment="mysql-tools-5.5.55-0.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3305</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-3305" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: C API). Supported versions that are affected are 5.5.55 and earlier and 5.6.35 and earlier. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N). NOTE: the previous information is from the April 2017 CPU. Oracle has not commented on third-party claims that this issue allows man-in-the-middle attackers to hijack the authentication of users by leveraging incorrect ordering of security parameter verification in a client, aka, "The Riddle".
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3305.html">CVE-2017-3305</cve>
<bugzilla href="https://bugzilla.suse.com/1029396">SUSE bug 1029396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1034850">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1037590">SUSE bug 1037590</bugzilla>
<bugzilla href="https://bugzilla.suse.com/924663">SUSE bug 924663</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210061" comment="libmysql55client18-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210062" comment="libmysql55client18-32bit-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210064" comment="libmysql55client_r18-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203177" comment="mysql-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210065" comment="mysql-client-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210066" comment="mysql-tools-5.5.55-0.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3308</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-3308" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. While the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3308.html">CVE-2017-3308</cve>
<bugzilla href="https://bugzilla.suse.com/1034850">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1048715">SUSE bug 1048715</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210061" comment="libmysql55client18-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210062" comment="libmysql55client18-32bit-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210064" comment="libmysql55client_r18-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203177" comment="mysql-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210065" comment="mysql-client-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210066" comment="mysql-tools-5.5.55-0.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3309</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-3309" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. While the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3309.html">CVE-2017-3309</cve>
<bugzilla href="https://bugzilla.suse.com/1034850">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1048715">SUSE bug 1048715</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210061" comment="libmysql55client18-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210062" comment="libmysql55client18-32bit-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210064" comment="libmysql55client_r18-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203177" comment="mysql-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210065" comment="mysql-client-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210066" comment="mysql-tools-5.5.55-0.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3312</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-3312" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS v3.0 Base Score 6.7 (Confidentiality, Integrity and Availability impacts).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3312.html">CVE-2017-3312</cve>
<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1020873">SUSE bug 1020873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/998309">SUSE bug 998309</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205671" comment="libmysql55client18-5.5.54-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208791" comment="libmysql55client18-32bit-5.5.54-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205672" comment="libmysql55client_r18-5.5.54-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203174" comment="mysql-5.5.54-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205673" comment="mysql-client-5.5.54-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205674" comment="mysql-tools-5.5.54-0.35 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3313</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-3313" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: MyISAM). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS v3.0 Base Score 4.7 (Confidentiality impacts).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3313.html">CVE-2017-3313</cve>
<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1020890">SUSE bug 1020890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1034911">SUSE bug 1034911</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205671" comment="libmysql55client18-5.5.54-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208791" comment="libmysql55client18-32bit-5.5.54-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205672" comment="libmysql55client_r18-5.5.54-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203174" comment="mysql-5.5.54-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205673" comment="mysql-client-5.5.54-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205674" comment="mysql-tools-5.5.54-0.35 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3317</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-3317" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Logging). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 4.0 (Availability impacts).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3317.html">CVE-2017-3317</cve>
<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1020894">SUSE bug 1020894</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205671" comment="libmysql55client18-5.5.54-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208791" comment="libmysql55client18-32bit-5.5.54-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205672" comment="libmysql55client_r18-5.5.54-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203174" comment="mysql-5.5.54-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205673" comment="mysql-client-5.5.54-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205674" comment="mysql-tools-5.5.54-0.35 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3318</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-3318" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Error Handling). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS v3.0 Base Score 4.0 (Confidentiality impacts).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3318.html">CVE-2017-3318</cve>
<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1020896">SUSE bug 1020896</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205671" comment="libmysql55client18-5.5.54-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208791" comment="libmysql55client18-32bit-5.5.54-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205672" comment="libmysql55client_r18-5.5.54-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203174" comment="mysql-5.5.54-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205673" comment="mysql-client-5.5.54-0.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205674" comment="mysql-tools-5.5.54-0.35 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173329" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3329</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-3329" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Thread Pooling). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3329.html">CVE-2017-3329</cve>
<bugzilla href="https://bugzilla.suse.com/1034850">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1048715">SUSE bug 1048715</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210061" comment="libmysql55client18-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210062" comment="libmysql55client18-32bit-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210064" comment="libmysql55client_r18-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203177" comment="mysql-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210065" comment="mysql-client-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210066" comment="mysql-tools-5.5.55-0.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3453</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-3453" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3453.html">CVE-2017-3453</cve>
<bugzilla href="https://bugzilla.suse.com/1034850">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1048715">SUSE bug 1048715</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210061" comment="libmysql55client18-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210062" comment="libmysql55client18-32bit-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210064" comment="libmysql55client_r18-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203177" comment="mysql-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210065" comment="mysql-client-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210066" comment="mysql-tools-5.5.55-0.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3456</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-3456" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3456.html">CVE-2017-3456</cve>
<bugzilla href="https://bugzilla.suse.com/1034850">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1048715">SUSE bug 1048715</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210061" comment="libmysql55client18-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210062" comment="libmysql55client18-32bit-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210064" comment="libmysql55client_r18-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203177" comment="mysql-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210065" comment="mysql-client-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210066" comment="mysql-tools-5.5.55-0.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3461</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-3461" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3461.html">CVE-2017-3461</cve>
<bugzilla href="https://bugzilla.suse.com/1034850">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1048715">SUSE bug 1048715</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210061" comment="libmysql55client18-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210062" comment="libmysql55client18-32bit-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210064" comment="libmysql55client_r18-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203177" comment="mysql-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210065" comment="mysql-client-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210066" comment="mysql-tools-5.5.55-0.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3462</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-3462" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3462.html">CVE-2017-3462</cve>
<bugzilla href="https://bugzilla.suse.com/1034850">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1048715">SUSE bug 1048715</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210061" comment="libmysql55client18-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210062" comment="libmysql55client18-32bit-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210064" comment="libmysql55client_r18-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203177" comment="mysql-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210065" comment="mysql-client-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210066" comment="mysql-tools-5.5.55-0.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3463</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-3463" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3463.html">CVE-2017-3463</cve>
<bugzilla href="https://bugzilla.suse.com/1034850">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1048715">SUSE bug 1048715</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210061" comment="libmysql55client18-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210062" comment="libmysql55client18-32bit-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210064" comment="libmysql55client_r18-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203177" comment="mysql-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210065" comment="mysql-client-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210066" comment="mysql-tools-5.5.55-0.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3464</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-3464" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3464.html">CVE-2017-3464</cve>
<bugzilla href="https://bugzilla.suse.com/1034850">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1048715">SUSE bug 1048715</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210061" comment="libmysql55client18-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210062" comment="libmysql55client18-32bit-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210064" comment="libmysql55client_r18-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203177" comment="mysql-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210065" comment="mysql-client-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210066" comment="mysql-tools-5.5.55-0.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3509</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-3509" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3509.html">CVE-2017-3509</cve>
<bugzilla href="https://bugzilla.suse.com/1034849">SUSE bug 1034849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205375" comment="java-1_6_0-ibm-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205376" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205377" comment="java-1_6_0-ibm-devel-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205378" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205379" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205380" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205402" comment="java-1_7_0-ibm-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205403" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205404" comment="java-1_7_0-ibm-devel-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205405" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205406" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.5-64 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205375" comment="java-1_6_0-ibm-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205378" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205379" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205380" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205402" comment="java-1_7_0-ibm-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205403" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205405" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205406" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.5-64 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-3511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, Java SE Embedded, JRockit executes to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3511.html">CVE-2017-3511</cve>
<bugzilla href="https://bugzilla.suse.com/1034849">SUSE bug 1034849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205402" comment="java-1_7_0-ibm-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205403" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205404" comment="java-1_7_0-ibm-devel-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205405" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205406" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.5-64 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205402" comment="java-1_7_0-ibm-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205403" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205405" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205406" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.5-64 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3514</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-3514" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3514" source="CVE"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3514.html">CVE-2017-3514</cve>
<bugzilla href="https://bugzilla.suse.com/1034849">SUSE bug 1034849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205375" comment="java-1_6_0-ibm-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205376" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205377" comment="java-1_6_0-ibm-devel-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205378" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205379" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205380" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.45-84 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205375" comment="java-1_6_0-ibm-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205378" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205379" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205380" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.45-84 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3533</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-3533" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via FTP to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3533.html">CVE-2017-3533</cve>
<bugzilla href="https://bugzilla.suse.com/1034849">SUSE bug 1034849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205375" comment="java-1_6_0-ibm-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205376" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205377" comment="java-1_6_0-ibm-devel-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205378" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205379" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205380" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205402" comment="java-1_7_0-ibm-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205403" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205404" comment="java-1_7_0-ibm-devel-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205405" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205406" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.5-64 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205375" comment="java-1_6_0-ibm-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205378" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205379" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205380" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205402" comment="java-1_7_0-ibm-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205403" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205405" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205406" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.5-64 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3539</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-3539" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3539.html">CVE-2017-3539</cve>
<bugzilla href="https://bugzilla.suse.com/1005522">SUSE bug 1005522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1034849">SUSE bug 1034849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205375" comment="java-1_6_0-ibm-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205376" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205377" comment="java-1_6_0-ibm-devel-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205378" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205379" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205380" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205402" comment="java-1_7_0-ibm-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205403" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205404" comment="java-1_7_0-ibm-devel-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205405" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205406" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.5-64 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205375" comment="java-1_6_0-ibm-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205378" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205379" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205380" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205402" comment="java-1_7_0-ibm-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205403" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205405" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205406" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.5-64 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3544</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-3544" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SMTP to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3544.html">CVE-2017-3544</cve>
<bugzilla href="https://bugzilla.suse.com/1034849">SUSE bug 1034849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205375" comment="java-1_6_0-ibm-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205376" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205377" comment="java-1_6_0-ibm-devel-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205378" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205379" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205380" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205402" comment="java-1_7_0-ibm-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205403" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205404" comment="java-1_7_0-ibm-devel-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205405" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205406" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.5-64 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205375" comment="java-1_6_0-ibm-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205378" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205379" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205380" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.45-84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205402" comment="java-1_7_0-ibm-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205403" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205405" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.5-64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205406" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.5-64 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3600</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-3600" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client mysqldump). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. Note: CVE-2017-3600 is equivalent to CVE-2016-5483. CVSS 3.0 Base Score 6.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3600.html">CVE-2017-3600</cve>
<bugzilla href="https://bugzilla.suse.com/1029014">SUSE bug 1029014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1034850">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1048715">SUSE bug 1048715</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210061" comment="libmysql55client18-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210062" comment="libmysql55client18-32bit-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210064" comment="libmysql55client_r18-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203177" comment="mysql-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210065" comment="mysql-client-5.5.55-0.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210066" comment="mysql-tools-5.5.55-0.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3635</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-3635" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635" source="CVE"/>
    <description>
    Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/C). Supported versions that are affected are 6.1.10 and earlier. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Connectors. Note: The documentation has also been updated for the correct way to use mysql_stmt_close(). Please see: https://dev.mysql.com/doc/refman/5.7/en/mysql-stmt-execute.html,  https://dev.mysql.com/doc/refman/5.7/en/mysql-stmt-fetch.html, https://dev.mysql.com/doc/refman/5.7/en/mysql-stmt-close.html, https://dev.mysql.com/doc/refman/5.7/en/mysql-stmt-error.html, https://dev.mysql.com/doc/refman/5.7/en/mysql-stmt-errno.html, and  https://dev.mysql.com/doc/refman/5.7/en/mysql-stmt-sqlstate.html. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3635.html">CVE-2017-3635</cve>
<bugzilla href="https://bugzilla.suse.com/1049397">SUSE bug 1049397</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049398">SUSE bug 1049398</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049422">SUSE bug 1049422</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210067" comment="libmysql55client18-5.5.57-0.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210068" comment="libmysql55client18-32bit-5.5.57-0.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210070" comment="libmysql55client_r18-5.5.57-0.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203180" comment="mysql-5.5.57-0.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210071" comment="mysql-client-5.5.57-0.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210072" comment="mysql-tools-5.5.57-0.39.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-3636" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.56 and earlier and 5.6.36 and earlier. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.0 Base Score 5.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3636.html">CVE-2017-3636</cve>
<bugzilla href="https://bugzilla.suse.com/1049399">SUSE bug 1049399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049422">SUSE bug 1049422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1054591">SUSE bug 1054591</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1076506">SUSE bug 1076506</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210067" comment="libmysql55client18-5.5.57-0.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210068" comment="libmysql55client18-32bit-5.5.57-0.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210070" comment="libmysql55client_r18-5.5.57-0.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203180" comment="mysql-5.5.57-0.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210071" comment="mysql-client-5.5.57-0.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210072" comment="mysql-tools-5.5.57-0.39.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3641</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-3641" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.56 and earlier, 5.6.36 and earlier and 5.7.18 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3641.html">CVE-2017-3641</cve>
<bugzilla href="https://bugzilla.suse.com/1049404">SUSE bug 1049404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049422">SUSE bug 1049422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1054591">SUSE bug 1054591</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1076506">SUSE bug 1076506</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210067" comment="libmysql55client18-5.5.57-0.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210068" comment="libmysql55client18-32bit-5.5.57-0.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210070" comment="libmysql55client_r18-5.5.57-0.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203180" comment="mysql-5.5.57-0.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210071" comment="mysql-client-5.5.57-0.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210072" comment="mysql-tools-5.5.57-0.39.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3648</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-3648" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Charsets). Supported versions that are affected are 5.5.56 and earlier, 5.6.36 and earlier and 5.7.18 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3648.html">CVE-2017-3648</cve>
<bugzilla href="https://bugzilla.suse.com/1049411">SUSE bug 1049411</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049422">SUSE bug 1049422</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210067" comment="libmysql55client18-5.5.57-0.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210068" comment="libmysql55client18-32bit-5.5.57-0.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210070" comment="libmysql55client_r18-5.5.57-0.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203180" comment="mysql-5.5.57-0.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210071" comment="mysql-client-5.5.57-0.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210072" comment="mysql-tools-5.5.57-0.39.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3651</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-3651" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client mysqldump). Supported versions that are affected are 5.5.56 and earlier, 5.6.36 and earlier and 5.7.18 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3651.html">CVE-2017-3651</cve>
<bugzilla href="https://bugzilla.suse.com/1049415">SUSE bug 1049415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049422">SUSE bug 1049422</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210067" comment="libmysql55client18-5.5.57-0.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210068" comment="libmysql55client18-32bit-5.5.57-0.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210070" comment="libmysql55client_r18-5.5.57-0.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203180" comment="mysql-5.5.57-0.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210071" comment="mysql-client-5.5.57-0.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210072" comment="mysql-tools-5.5.57-0.39.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3652</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-3652" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.56 and earlier, 5.6.36 and earlier and 5.7.18 and earlier. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3652.html">CVE-2017-3652</cve>
<bugzilla href="https://bugzilla.suse.com/1049416">SUSE bug 1049416</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049422">SUSE bug 1049422</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210067" comment="libmysql55client18-5.5.57-0.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210068" comment="libmysql55client18-32bit-5.5.57-0.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210070" comment="libmysql55client_r18-5.5.57-0.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203180" comment="mysql-5.5.57-0.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210071" comment="mysql-client-5.5.57-0.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210072" comment="mysql-tools-5.5.57-0.39.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3653</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-3653" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.56 and earlier, 5.6.36 and earlier and 5.7.18 and earlier. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3653.html">CVE-2017-3653</cve>
<bugzilla href="https://bugzilla.suse.com/1049417">SUSE bug 1049417</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049422">SUSE bug 1049422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1054591">SUSE bug 1054591</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1076506">SUSE bug 1076506</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210067" comment="libmysql55client18-5.5.57-0.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210068" comment="libmysql55client18-32bit-5.5.57-0.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210070" comment="libmysql55client_r18-5.5.57-0.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203180" comment="mysql-5.5.57-0.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210071" comment="mysql-client-5.5.57-0.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210072" comment="mysql-tools-5.5.57-0.39.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3731</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-3731" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3731" source="CVE"/>
    <description>
    If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3731.html">CVE-2017-3731</cve>
<bugzilla href="https://bugzilla.suse.com/1021641">SUSE bug 1021641</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1022085">SUSE bug 1022085</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1025347">SUSE bug 1025347</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1025354">SUSE bug 1025354</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1064118">SUSE bug 1064118</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1064119">SUSE bug 1064119</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203790" comment="libopenssl1-devel-1.0.1g-0.57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248700" comment="libopenssl1-devel-32bit-1.0.1g-0.57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203791" comment="libopenssl1_0_0-1.0.1g-0.57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203792" comment="libopenssl1_0_0-32bit-1.0.1g-0.57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203794" comment="openssl1-1.0.1g-0.57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203795" comment="openssl1-doc-1.0.1g-0.57 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3735</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-3735" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3735" source="CVE"/>
    <description>
    While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3735.html">CVE-2017-3735</cve>
<bugzilla href="https://bugzilla.suse.com/1056058">SUSE bug 1056058</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203796" comment="libopenssl1-devel-1.0.1g-0.58.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248701" comment="libopenssl1-devel-32bit-1.0.1g-0.58.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203797" comment="libopenssl1_0_0-1.0.1g-0.58.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203798" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203800" comment="openssl1-1.0.1g-0.58.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203801" comment="openssl1-doc-1.0.1g-0.58.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5029</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-5029" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5029" source="CVE"/>
    <description>
    The xsltAddTextString function in transform.c in libxslt 1.1.29, as used in Blink in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android, lacked a check for integer overflow during a size calculation, which allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5029.html">CVE-2017-5029</cve>
<bugzilla href="https://bugzilla.suse.com/1028848">SUSE bug 1028848</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1028875">SUSE bug 1028875</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1035905">SUSE bug 1035905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123130">SUSE bug 1123130</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203113" comment="libxslt-1.1.24-19.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209989" comment="libxslt-32bit-1.1.24-19.33 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5130</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-5130" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5130" source="CVE"/>
    <description>
    An integer overflow in xmlmemory.c in libxml2 before 2.9.5, as used in Google Chrome prior to 62.0.3202.62 and other products, allowed a remote attacker to potentially exploit heap corruption via a crafted XML file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5130.html">CVE-2017-5130</cve>
<bugzilla href="https://bugzilla.suse.com/1064066">SUSE bug 1064066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1064089">SUSE bug 1064089</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1078806">SUSE bug 1078806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123129">SUSE bug 1123129</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203110" comment="libxml2-2.7.6-0.77.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209985" comment="libxml2-32bit-2.7.6-0.77.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209986" comment="libxml2-doc-2.7.6-0.77.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209987" comment="libxml2-python-2.7.6-0.77.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5200</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS</platform>
    </affected>
    <reference ref_id="CVE-2017-5200" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5200" source="CVE"/>
    <description>
    Salt-api in SaltStack Salt before 2015.8.13, 2016.3.x before 2016.3.5, and 2016.11.x before 2016.11.2 allows arbitrary command execution on a salt-master via Salt's ssh_client.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5200.html">CVE-2017-5200</cve>
<bugzilla href="https://bugzilla.suse.com/1011800">SUSE bug 1011800</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009206239" comment="salt-2016.11.4-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206240" comment="salt-doc-2016.11.4-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206241" comment="salt-minion-2016.11.4-42 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5202</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-5202" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5202" source="CVE"/>
    <description>
    The ISO CLNS parser in tcpdump before 4.9.0 has a buffer overflow in print-isoclns.c:clnp_print().
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5202.html">CVE-2017-5202</cve>
<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210822" comment="tcpdump-3.9.8-1.29 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5203</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-5203" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5203" source="CVE"/>
    <description>
    The BOOTP parser in tcpdump before 4.9.0 has a buffer overflow in print-bootp.c:bootp_print().
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5203.html">CVE-2017-5203</cve>
<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210822" comment="tcpdump-3.9.8-1.29 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5204</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-5204" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5204" source="CVE"/>
    <description>
    The IPv6 parser in tcpdump before 4.9.0 has a buffer overflow in print-ip6.c:ip6_print().
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5204.html">CVE-2017-5204</cve>
<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210822" comment="tcpdump-3.9.8-1.29 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5225</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-5225" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5225" source="CVE"/>
    <description>
    LibTIFF version 4.0.7 is vulnerable to a heap buffer overflow in the tools/tiffcp resulting in DoS or code execution via a crafted BitsPerSample value.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5225.html">CVE-2017-5225</cve>
<bugzilla href="https://bugzilla.suse.com/1019611">SUSE bug 1019611</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009229551" comment="libtiff3-3.8.2-141.169.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229568" comment="libtiff3-32bit-3.8.2-141.169.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229522" comment="tiff-3.8.2-141.169.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5335</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-5335" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5335" source="CVE"/>
    <description>
    The stream reading functions in lib/opencdk/read-packet.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to cause a denial of service (out-of-memory error and crash) via a crafted OpenPGP certificate.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5335.html">CVE-2017-5335</cve>
<bugzilla href="https://bugzilla.suse.com/1018832">SUSE bug 1018832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1021057">SUSE bug 1021057</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202706" comment="gnutls-2.4.1-24.39.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202709" comment="libgnutls-extra26-2.4.1-24.39.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209322" comment="libgnutls26-2.4.1-24.39.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209323" comment="libgnutls26-32bit-2.4.1-24.39.67 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5336</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-5336" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5336" source="CVE"/>
    <description>
    Stack-based buffer overflow in the cdk_pk_get_keyid function in lib/opencdk/pubkey.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allows remote attackers to have unspecified impact via a crafted OpenPGP certificate.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5336.html">CVE-2017-5336</cve>
<bugzilla href="https://bugzilla.suse.com/1018832">SUSE bug 1018832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1021057">SUSE bug 1021057</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202706" comment="gnutls-2.4.1-24.39.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202709" comment="libgnutls-extra26-2.4.1-24.39.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209322" comment="libgnutls26-2.4.1-24.39.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209323" comment="libgnutls26-32bit-2.4.1-24.39.67 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5337</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-5337" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5337" source="CVE"/>
    <description>
    Multiple heap-based buffer overflows in the read_attribute function in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to have unspecified impact via a crafted OpenPGP certificate.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5337.html">CVE-2017-5337</cve>
<bugzilla href="https://bugzilla.suse.com/1018832">SUSE bug 1018832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1021057">SUSE bug 1021057</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202706" comment="gnutls-2.4.1-24.39.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202709" comment="libgnutls-extra26-2.4.1-24.39.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209322" comment="libgnutls26-2.4.1-24.39.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209323" comment="libgnutls26-32bit-2.4.1-24.39.67 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5357</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-5357" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5357" source="CVE"/>
    <description>
    regex.c in GNU ed before 1.14.1 allows attackers to cause a denial of service (crash) via a malformed command, which triggers an invalid free.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5357.html">CVE-2017-5357</cve>
<bugzilla href="https://bugzilla.suse.com/1019807">SUSE bug 1019807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1148899">SUSE bug 1148899</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246749" comment="ed-0.2-1001.30.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5373</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-5373" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5373" source="CVE"/>
    <description>
    Memory safety bugs were reported in Firefox 50.1 and Firefox ESR 45.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 45.7, Firefox ESR &lt; 45.7, and Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5373.html">CVE-2017-5373</cve>
<bugzilla href="https://bugzilla.suse.com/1021824">SUSE bug 1021824</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202351" comment="MozillaFirefox-45.7.0esr-65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205243" comment="MozillaFirefox-translations-45.7.0esr-65 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5375</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-5375" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5375" source="CVE"/>
    <description>
    JIT code allocation can allow for a bypass of ASLR and DEP protections leading to potential memory corruption attacks. This vulnerability affects Thunderbird &lt; 45.7, Firefox ESR &lt; 45.7, and Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5375.html">CVE-2017-5375</cve>
<bugzilla href="https://bugzilla.suse.com/1021814">SUSE bug 1021814</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202351" comment="MozillaFirefox-45.7.0esr-65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205243" comment="MozillaFirefox-translations-45.7.0esr-65 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5376</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-5376" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5376" source="CVE"/>
    <description>
    Use-after-free while manipulating XSL in XSLT documents. This vulnerability affects Thunderbird &lt; 45.7, Firefox ESR &lt; 45.7, and Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5376.html">CVE-2017-5376</cve>
<bugzilla href="https://bugzilla.suse.com/1021817">SUSE bug 1021817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202351" comment="MozillaFirefox-45.7.0esr-65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205243" comment="MozillaFirefox-translations-45.7.0esr-65 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5378</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-5378" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5378" source="CVE"/>
    <description>
    Hashed codes of JavaScript objects are shared between pages. This allows for pointer leaks because an object's address can be discovered through hash codes, and also allows for data leakage of an object's content using these hash codes. This vulnerability affects Thunderbird &lt; 45.7, Firefox ESR &lt; 45.7, and Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5378.html">CVE-2017-5378</cve>
<bugzilla href="https://bugzilla.suse.com/1021818">SUSE bug 1021818</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202351" comment="MozillaFirefox-45.7.0esr-65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205243" comment="MozillaFirefox-translations-45.7.0esr-65 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5380</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-5380" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5380" source="CVE"/>
    <description>
    A potential use-after-free found through fuzzing during DOM manipulation of SVG content. This vulnerability affects Thunderbird &lt; 45.7, Firefox ESR &lt; 45.7, and Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5380.html">CVE-2017-5380</cve>
<bugzilla href="https://bugzilla.suse.com/1021819">SUSE bug 1021819</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202351" comment="MozillaFirefox-45.7.0esr-65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205243" comment="MozillaFirefox-translations-45.7.0esr-65 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5383</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-5383" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5383" source="CVE"/>
    <description>
    URLs containing certain unicode glyphs for alternative hyphens and quotes do not properly trigger punycode display, allowing for domain name spoofing attacks in the location bar. This vulnerability affects Thunderbird &lt; 45.7, Firefox ESR &lt; 45.7, and Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5383.html">CVE-2017-5383</cve>
<bugzilla href="https://bugzilla.suse.com/1021822">SUSE bug 1021822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202351" comment="MozillaFirefox-45.7.0esr-65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205243" comment="MozillaFirefox-translations-45.7.0esr-65 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5386</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-5386" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5386" source="CVE"/>
    <description>
    WebExtension scripts can use the "data:" protocol to affect pages loaded by other web extensions using this protocol, leading to potential data disclosure or privilege escalation in affected extensions. This vulnerability affects Firefox ESR &lt; 45.7 and Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5386.html">CVE-2017-5386</cve>
<bugzilla href="https://bugzilla.suse.com/1021823">SUSE bug 1021823</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202351" comment="MozillaFirefox-45.7.0esr-65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205243" comment="MozillaFirefox-translations-45.7.0esr-65 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5390</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-5390" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5390" source="CVE"/>
    <description>
    The JSON viewer in the Developer Tools uses insecure methods to create a communication channel for copying and viewing JSON or HTTP headers data, allowing for potential privilege escalation. This vulnerability affects Thunderbird &lt; 45.7, Firefox ESR &lt; 45.7, and Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5390.html">CVE-2017-5390</cve>
<bugzilla href="https://bugzilla.suse.com/1021820">SUSE bug 1021820</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202351" comment="MozillaFirefox-45.7.0esr-65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205243" comment="MozillaFirefox-translations-45.7.0esr-65 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5396</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-5396" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5396" source="CVE"/>
    <description>
    A use-after-free vulnerability in the Media Decoder when working with media files when some events are fired after the media elements are freed from memory. This vulnerability affects Thunderbird &lt; 45.7, Firefox ESR &lt; 45.7, and Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5396.html">CVE-2017-5396</cve>
<bugzilla href="https://bugzilla.suse.com/1021821">SUSE bug 1021821</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202351" comment="MozillaFirefox-45.7.0esr-65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205243" comment="MozillaFirefox-translations-45.7.0esr-65 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5398</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-5398" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5398" source="CVE"/>
    <description>
    Memory safety bugs were reported in Thunderbird 45.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 52, Firefox ESR &lt; 45.8, Thunderbird &lt; 52, and Thunderbird &lt; 45.8.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5398.html">CVE-2017-5398</cve>
<bugzilla href="https://bugzilla.suse.com/1028391">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1028393">SUSE bug 1028393</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202353" comment="MozillaFirefox-45.8.0esr-68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205244" comment="MozillaFirefox-translations-45.8.0esr-68 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5400</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-5400" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5400" source="CVE"/>
    <description>
    JIT-spray targeting asm.js combined with a heap spray allows for a bypass of ASLR and DEP protections leading to potential memory corruption attacks. This vulnerability affects Firefox &lt; 52, Firefox ESR &lt; 45.8, Thunderbird &lt; 52, and Thunderbird &lt; 45.8.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5400.html">CVE-2017-5400</cve>
<bugzilla href="https://bugzilla.suse.com/1028391">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1028393">SUSE bug 1028393</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202353" comment="MozillaFirefox-45.8.0esr-68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205244" comment="MozillaFirefox-translations-45.8.0esr-68 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5401</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-5401" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5401" source="CVE"/>
    <description>
    A crash triggerable by web content in which an "ErrorResult" references unassigned memory due to a logic error. The resulting crash may be exploitable. This vulnerability affects Firefox &lt; 52, Firefox ESR &lt; 45.8, Thunderbird &lt; 52, and Thunderbird &lt; 45.8.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5401.html">CVE-2017-5401</cve>
<bugzilla href="https://bugzilla.suse.com/1028391">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1028393">SUSE bug 1028393</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202353" comment="MozillaFirefox-45.8.0esr-68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205244" comment="MozillaFirefox-translations-45.8.0esr-68 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5402</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-5402" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5402" source="CVE"/>
    <description>
    A use-after-free can occur when events are fired for a "FontFace" object after the object has been already been destroyed while working with fonts. This results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 52, Firefox ESR &lt; 45.8, Thunderbird &lt; 52, and Thunderbird &lt; 45.8.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5402.html">CVE-2017-5402</cve>
<bugzilla href="https://bugzilla.suse.com/1028391">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1028393">SUSE bug 1028393</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202353" comment="MozillaFirefox-45.8.0esr-68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205244" comment="MozillaFirefox-translations-45.8.0esr-68 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5404</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-5404" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5404" source="CVE"/>
    <description>
    A use-after-free error can occur when manipulating ranges in selections with one node inside a native anonymous tree and one node outside of it. This results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 52, Firefox ESR &lt; 45.8, Thunderbird &lt; 52, and Thunderbird &lt; 45.8.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5404.html">CVE-2017-5404</cve>
<bugzilla href="https://bugzilla.suse.com/1028391">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1028393">SUSE bug 1028393</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202353" comment="MozillaFirefox-45.8.0esr-68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205244" comment="MozillaFirefox-translations-45.8.0esr-68 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5405</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-5405" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5405" source="CVE"/>
    <description>
    Certain response codes in FTP connections can result in the use of uninitialized values for ports in FTP operations. This vulnerability affects Firefox &lt; 52, Firefox ESR &lt; 45.8, Thunderbird &lt; 52, and Thunderbird &lt; 45.8.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5405.html">CVE-2017-5405</cve>
<bugzilla href="https://bugzilla.suse.com/1028391">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1028393">SUSE bug 1028393</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202353" comment="MozillaFirefox-45.8.0esr-68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205244" comment="MozillaFirefox-translations-45.8.0esr-68 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5407</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-5407" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5407" source="CVE"/>
    <description>
    Using SVG filters that don't use the fixed point math implementation on a target iframe, a malicious page can extract pixel values from a targeted user. This can be used to extract history information and read text values across domains. This violates same-origin policy and leads to information disclosure. This vulnerability affects Firefox &lt; 52, Firefox ESR &lt; 45.8, Thunderbird &lt; 52, and Thunderbird &lt; 45.8.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5407.html">CVE-2017-5407</cve>
<bugzilla href="https://bugzilla.suse.com/1028391">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1028393">SUSE bug 1028393</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202353" comment="MozillaFirefox-45.8.0esr-68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205244" comment="MozillaFirefox-translations-45.8.0esr-68 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5408</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-5408" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5408" source="CVE"/>
    <description>
    Video files loaded video captions cross-origin without checking for the presence of CORS headers permitting such cross-origin use, leading to potential information disclosure for video captions. This vulnerability affects Firefox &lt; 52, Firefox ESR &lt; 45.8, Thunderbird &lt; 52, and Thunderbird &lt; 45.8.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5408.html">CVE-2017-5408</cve>
<bugzilla href="https://bugzilla.suse.com/1028391">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1028393">SUSE bug 1028393</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202353" comment="MozillaFirefox-45.8.0esr-68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205244" comment="MozillaFirefox-translations-45.8.0esr-68 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5409</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-5409" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5409" source="CVE"/>
    <description>
    The Mozilla Windows updater can be called by a non-privileged user to delete an arbitrary local file by passing a special path to the callback parameter through the Mozilla Maintenance Service, which has privileged access. Note: This attack requires local system access and only affects Windows. Other operating systems are not affected. This vulnerability affects Firefox ESR &lt; 45.8 and Firefox &lt; 52.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5409.html">CVE-2017-5409</cve>
<bugzilla href="https://bugzilla.suse.com/1028391">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1028393">SUSE bug 1028393</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202353" comment="MozillaFirefox-45.8.0esr-68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205244" comment="MozillaFirefox-translations-45.8.0esr-68 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5410</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-5410" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5410" source="CVE"/>
    <description>
    Memory corruption resulting in a potentially exploitable crash during garbage collection of JavaScript due errors in how incremental sweeping is managed for memory cleanup. This vulnerability affects Firefox &lt; 52, Firefox ESR &lt; 45.8, Thunderbird &lt; 52, and Thunderbird &lt; 45.8.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5410.html">CVE-2017-5410</cve>
<bugzilla href="https://bugzilla.suse.com/1028391">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1028393">SUSE bug 1028393</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202353" comment="MozillaFirefox-45.8.0esr-68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205244" comment="MozillaFirefox-translations-45.8.0esr-68 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5429</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-5429" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5429" source="CVE"/>
    <description>
    Memory safety bugs were reported in Firefox 52, Firefox ESR 45.8, Firefox ESR 52, and Thunderbird 52. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5429.html">CVE-2017-5429</cve>
<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202355" comment="MozillaFirefox-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205245" comment="MozillaFirefox-translations-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205246" comment="libfreebl3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208371" comment="libfreebl3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205247" comment="libsoftokn3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208372" comment="libsoftokn3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202359" comment="mozilla-nss-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208374" comment="mozilla-nss-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205248" comment="mozilla-nss-tools-3.29.5-46 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5430</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-5430" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5430" source="CVE"/>
    <description>
    Memory safety bugs were reported in Firefox 52, Firefox ESR 52, and Thunderbird 52. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5430.html">CVE-2017-5430</cve>
<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5432</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-5432" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5432" source="CVE"/>
    <description>
    A use-after-free vulnerability occurs during certain text input selection resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5432.html">CVE-2017-5432</cve>
<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202355" comment="MozillaFirefox-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205245" comment="MozillaFirefox-translations-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205246" comment="libfreebl3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208371" comment="libfreebl3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205247" comment="libsoftokn3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208372" comment="libsoftokn3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202359" comment="mozilla-nss-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208374" comment="mozilla-nss-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205248" comment="mozilla-nss-tools-3.29.5-46 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5433</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-5433" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5433" source="CVE"/>
    <description>
    A use-after-free vulnerability in SMIL animation functions occurs when pointers to animation elements in an array are dropped from the animation controller while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5433.html">CVE-2017-5433</cve>
<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202355" comment="MozillaFirefox-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205245" comment="MozillaFirefox-translations-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205246" comment="libfreebl3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208371" comment="libfreebl3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205247" comment="libsoftokn3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208372" comment="libsoftokn3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202359" comment="mozilla-nss-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208374" comment="mozilla-nss-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205248" comment="mozilla-nss-tools-3.29.5-46 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5434</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-5434" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5434" source="CVE"/>
    <description>
    A use-after-free vulnerability occurs when redirecting focus handling which results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5434.html">CVE-2017-5434</cve>
<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202355" comment="MozillaFirefox-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205245" comment="MozillaFirefox-translations-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205246" comment="libfreebl3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208371" comment="libfreebl3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205247" comment="libsoftokn3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208372" comment="libsoftokn3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202359" comment="mozilla-nss-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208374" comment="mozilla-nss-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205248" comment="mozilla-nss-tools-3.29.5-46 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5435</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-5435" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5435" source="CVE"/>
    <description>
    A use-after-free vulnerability occurs during transaction processing in the editor during design mode interactions. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5435.html">CVE-2017-5435</cve>
<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202355" comment="MozillaFirefox-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205245" comment="MozillaFirefox-translations-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205246" comment="libfreebl3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208371" comment="libfreebl3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205247" comment="libsoftokn3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208372" comment="libsoftokn3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202359" comment="mozilla-nss-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208374" comment="mozilla-nss-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205248" comment="mozilla-nss-tools-3.29.5-46 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5436</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-5436" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5436" source="CVE"/>
    <description>
    An out-of-bounds write in the Graphite 2 library triggered with a maliciously crafted Graphite font. This results in a potentially exploitable crash. This issue was fixed in the Graphite 2 library as well as Mozilla products. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5436.html">CVE-2017-5436</cve>
<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1035204">SUSE bug 1035204</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202355" comment="MozillaFirefox-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205245" comment="MozillaFirefox-translations-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205246" comment="libfreebl3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208371" comment="libfreebl3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205247" comment="libsoftokn3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208372" comment="libsoftokn3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202359" comment="mozilla-nss-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208374" comment="mozilla-nss-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205248" comment="mozilla-nss-tools-3.29.5-46 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5437</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-5437" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5437" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2016-10195, CVE-2016-10196, CVE-2016-10197.  Reason: This candidate is a duplicate of CVE-2016-10195, CVE-2016-10196, and CVE-2016-10197.  Notes: All CVE users should reference CVE-2016-10195, CVE-2016-10196, and/or CVE-2016-10197 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5437.html">CVE-2017-5437</cve>
<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202355" comment="MozillaFirefox-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205245" comment="MozillaFirefox-translations-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205246" comment="libfreebl3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208371" comment="libfreebl3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205247" comment="libsoftokn3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208372" comment="libsoftokn3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202359" comment="mozilla-nss-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208374" comment="mozilla-nss-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205248" comment="mozilla-nss-tools-3.29.5-46 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5438</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-5438" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5438" source="CVE"/>
    <description>
    A use-after-free vulnerability during XSLT processing due to the result handler being held by a freed handler during handling. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5438.html">CVE-2017-5438</cve>
<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202355" comment="MozillaFirefox-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205245" comment="MozillaFirefox-translations-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205246" comment="libfreebl3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208371" comment="libfreebl3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205247" comment="libsoftokn3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208372" comment="libsoftokn3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202359" comment="mozilla-nss-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208374" comment="mozilla-nss-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205248" comment="mozilla-nss-tools-3.29.5-46 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5439</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-5439" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5439" source="CVE"/>
    <description>
    A use-after-free vulnerability during XSLT processing due to poor handling of template parameters. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5439.html">CVE-2017-5439</cve>
<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202355" comment="MozillaFirefox-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205245" comment="MozillaFirefox-translations-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205246" comment="libfreebl3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208371" comment="libfreebl3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205247" comment="libsoftokn3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208372" comment="libsoftokn3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202359" comment="mozilla-nss-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208374" comment="mozilla-nss-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205248" comment="mozilla-nss-tools-3.29.5-46 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5440</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-5440" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5440" source="CVE"/>
    <description>
    A use-after-free vulnerability during XSLT processing due to a failure to propagate error conditions during matching while evaluating context, leading to objects being used when they no longer exist. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5440.html">CVE-2017-5440</cve>
<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202355" comment="MozillaFirefox-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205245" comment="MozillaFirefox-translations-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205246" comment="libfreebl3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208371" comment="libfreebl3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205247" comment="libsoftokn3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208372" comment="libsoftokn3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202359" comment="mozilla-nss-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208374" comment="mozilla-nss-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205248" comment="mozilla-nss-tools-3.29.5-46 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5441</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-5441" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5441" source="CVE"/>
    <description>
    A use-after-free vulnerability when holding a selection during scroll events. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5441.html">CVE-2017-5441</cve>
<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202355" comment="MozillaFirefox-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205245" comment="MozillaFirefox-translations-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205246" comment="libfreebl3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208371" comment="libfreebl3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205247" comment="libsoftokn3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208372" comment="libsoftokn3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202359" comment="mozilla-nss-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208374" comment="mozilla-nss-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205248" comment="mozilla-nss-tools-3.29.5-46 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5442</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-5442" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5442" source="CVE"/>
    <description>
    A use-after-free vulnerability during changes in style when manipulating DOM elements. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5442.html">CVE-2017-5442</cve>
<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202355" comment="MozillaFirefox-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205245" comment="MozillaFirefox-translations-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205246" comment="libfreebl3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208371" comment="libfreebl3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205247" comment="libsoftokn3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208372" comment="libsoftokn3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202359" comment="mozilla-nss-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208374" comment="mozilla-nss-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205248" comment="mozilla-nss-tools-3.29.5-46 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5443</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-5443" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5443" source="CVE"/>
    <description>
    An out-of-bounds write vulnerability while decoding improperly formed BinHex format archives. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5443.html">CVE-2017-5443</cve>
<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202355" comment="MozillaFirefox-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205245" comment="MozillaFirefox-translations-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205246" comment="libfreebl3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208371" comment="libfreebl3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205247" comment="libsoftokn3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208372" comment="libsoftokn3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202359" comment="mozilla-nss-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208374" comment="mozilla-nss-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205248" comment="mozilla-nss-tools-3.29.5-46 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5444</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-5444" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5444" source="CVE"/>
    <description>
    A buffer overflow vulnerability while parsing "application/http-index-format" format content when the header contains improperly formatted data. This allows for an out-of-bounds read of data from memory. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5444.html">CVE-2017-5444</cve>
<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202355" comment="MozillaFirefox-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205245" comment="MozillaFirefox-translations-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205246" comment="libfreebl3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208371" comment="libfreebl3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205247" comment="libsoftokn3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208372" comment="libsoftokn3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202359" comment="mozilla-nss-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208374" comment="mozilla-nss-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205248" comment="mozilla-nss-tools-3.29.5-46 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5445</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-5445" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5445" source="CVE"/>
    <description>
    A vulnerability while parsing "application/http-index-format" format content where uninitialized values are used to create an array. This could allow the reading of uninitialized memory into the arrays affected. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5445.html">CVE-2017-5445</cve>
<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202355" comment="MozillaFirefox-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205245" comment="MozillaFirefox-translations-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205246" comment="libfreebl3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208371" comment="libfreebl3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205247" comment="libsoftokn3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208372" comment="libsoftokn3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202359" comment="mozilla-nss-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208374" comment="mozilla-nss-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205248" comment="mozilla-nss-tools-3.29.5-46 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5446</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-5446" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5446" source="CVE"/>
    <description>
    An out-of-bounds read when an HTTP/2 connection to a servers sends "DATA" frames with incorrect data content. This leads to a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5446.html">CVE-2017-5446</cve>
<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202355" comment="MozillaFirefox-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205245" comment="MozillaFirefox-translations-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205246" comment="libfreebl3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208371" comment="libfreebl3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205247" comment="libsoftokn3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208372" comment="libsoftokn3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202359" comment="mozilla-nss-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208374" comment="mozilla-nss-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205248" comment="mozilla-nss-tools-3.29.5-46 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5447</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-5447" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5447" source="CVE"/>
    <description>
    An out-of-bounds read during the processing of glyph widths during text layout. This results in a potentially exploitable crash and could allow an attacker to read otherwise inaccessible memory. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5447.html">CVE-2017-5447</cve>
<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202355" comment="MozillaFirefox-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205245" comment="MozillaFirefox-translations-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205246" comment="libfreebl3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208371" comment="libfreebl3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205247" comment="libsoftokn3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208372" comment="libsoftokn3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202359" comment="mozilla-nss-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208374" comment="mozilla-nss-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205248" comment="mozilla-nss-tools-3.29.5-46 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5448</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-5448" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5448" source="CVE"/>
    <description>
    An out-of-bounds write in "ClearKeyDecryptor" while decrypting some Clearkey-encrypted media content. The "ClearKeyDecryptor" code runs within the Gecko Media Plugin (GMP) sandbox. If a second mechanism is found to escape the sandbox, this vulnerability allows for the writing of arbitrary data within memory, resulting in a potentially exploitable crash. This vulnerability affects Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5448.html">CVE-2017-5448</cve>
<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202355" comment="MozillaFirefox-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205245" comment="MozillaFirefox-translations-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205246" comment="libfreebl3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208371" comment="libfreebl3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205247" comment="libsoftokn3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208372" comment="libsoftokn3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202359" comment="mozilla-nss-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208374" comment="mozilla-nss-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205248" comment="mozilla-nss-tools-3.29.5-46 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5449</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-5449" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5449" source="CVE"/>
    <description>
    A possibly exploitable crash triggered during layout and manipulation of bidirectional unicode text in concert with CSS animations. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5449.html">CVE-2017-5449</cve>
<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5451</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-5451" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5451" source="CVE"/>
    <description>
    A mechanism to spoof the addressbar through the user interaction on the addressbar and the "onblur" event. The event could be used by script to affect text display to make the loaded site appear to be different from the one actually loaded within the addressbar. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5451.html">CVE-2017-5451</cve>
<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5454</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-5454" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5454" source="CVE"/>
    <description>
    A mechanism to bypass file system access protections in the sandbox to use the file picker to access different files than those selected in the file picker through the use of relative paths. This allows for read only access to the local file system. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5454.html">CVE-2017-5454</cve>
<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5455</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-5455" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5455" source="CVE"/>
    <description>
    The internal feed reader APIs that crossed the sandbox barrier allowed for a sandbox escape and escalation of privilege if combined with another vulnerability that resulted in remote code execution inside the sandboxed process. This vulnerability affects Firefox ESR &lt; 52.1 and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5455.html">CVE-2017-5455</cve>
<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5456</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-5456" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5456" source="CVE"/>
    <description>
    A mechanism to bypass file system access protections in the sandbox using the file system request constructor through an IPC message. This allows for read and write access to the local file system. This vulnerability affects Firefox ESR &lt; 52.1 and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5456.html">CVE-2017-5456</cve>
<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5459</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-5459" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5459" source="CVE"/>
    <description>
    A buffer overflow in WebGL triggerable by web content, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5459.html">CVE-2017-5459</cve>
<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202355" comment="MozillaFirefox-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205245" comment="MozillaFirefox-translations-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205246" comment="libfreebl3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208371" comment="libfreebl3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205247" comment="libsoftokn3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208372" comment="libsoftokn3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202359" comment="mozilla-nss-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208374" comment="mozilla-nss-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205248" comment="mozilla-nss-tools-3.29.5-46 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5460</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-5460" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5460" source="CVE"/>
    <description>
    A use-after-free vulnerability in frame selection triggered by a combination of malicious script content and key presses by a user. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5460.html">CVE-2017-5460</cve>
<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202355" comment="MozillaFirefox-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205245" comment="MozillaFirefox-translations-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205246" comment="libfreebl3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208371" comment="libfreebl3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205247" comment="libsoftokn3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208372" comment="libsoftokn3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202359" comment="mozilla-nss-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208374" comment="mozilla-nss-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205248" comment="mozilla-nss-tools-3.29.5-46 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5461</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-5461" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5461" source="CVE"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.21.4, 3.22.x through 3.28.x before 3.28.4, 3.29.x before 3.29.5, and 3.30.x before 3.30.1 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact by leveraging incorrect base64 operations.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5461.html">CVE-2017-5461</cve>
<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202355" comment="MozillaFirefox-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205245" comment="MozillaFirefox-translations-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205246" comment="libfreebl3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208371" comment="libfreebl3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205247" comment="libsoftokn3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208372" comment="libsoftokn3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202359" comment="mozilla-nss-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208374" comment="mozilla-nss-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205248" comment="mozilla-nss-tools-3.29.5-46 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5462</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-5462" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5462" source="CVE"/>
    <description>
    A flaw in DRBG number generation within the Network Security Services (NSS) library where the internal state V does not correctly carry bits over. The NSS library has been updated to fix this issue to address this issue and Firefox ESR 52.1 has been updated with NSS version 3.28.4. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5462.html">CVE-2017-5462</cve>
<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202355" comment="MozillaFirefox-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205245" comment="MozillaFirefox-translations-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205246" comment="libfreebl3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208371" comment="libfreebl3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205247" comment="libsoftokn3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208372" comment="libsoftokn3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202359" comment="mozilla-nss-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208374" comment="mozilla-nss-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205248" comment="mozilla-nss-tools-3.29.5-46 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5464</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-5464" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5464" source="CVE"/>
    <description>
    During DOM manipulations of the accessibility tree through script, the DOM tree can become out of sync with the accessibility tree, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5464.html">CVE-2017-5464</cve>
<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202355" comment="MozillaFirefox-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205245" comment="MozillaFirefox-translations-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205246" comment="libfreebl3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208371" comment="libfreebl3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205247" comment="libsoftokn3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208372" comment="libsoftokn3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202359" comment="mozilla-nss-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208374" comment="mozilla-nss-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205248" comment="mozilla-nss-tools-3.29.5-46 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5465</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-5465" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5465" source="CVE"/>
    <description>
    An out-of-bounds read while processing SVG content in "ConvolvePixel". This results in a crash and also allows for otherwise inaccessible memory being copied into SVG graphic content, which could then displayed. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5465.html">CVE-2017-5465</cve>
<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202355" comment="MozillaFirefox-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205245" comment="MozillaFirefox-translations-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205246" comment="libfreebl3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208371" comment="libfreebl3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205247" comment="libsoftokn3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208372" comment="libsoftokn3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202359" comment="mozilla-nss-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208374" comment="mozilla-nss-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205248" comment="mozilla-nss-tools-3.29.5-46 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5466</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-5466" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5466" source="CVE"/>
    <description>
    If a page is loaded from an original site through a hyperlink and contains a redirect to a "data:text/html" URL, triggering a reload will run the reloaded "data:text/html" page with its origin set incorrectly. This allows for a cross-site scripting (XSS) attack. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5466.html">CVE-2017-5466</cve>
<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5467</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-5467" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5467" source="CVE"/>
    <description>
    A potential memory corruption and crash when using Skia content when drawing content outside of the bounds of a clipping region. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5467.html">CVE-2017-5467</cve>
<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5469</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-5469" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5469" source="CVE"/>
    <description>
    Fixed potential buffer overflows in generated Firefox code due to CVE-2016-6354 issue in Flex. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5469.html">CVE-2017-5469</cve>
<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202355" comment="MozillaFirefox-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205245" comment="MozillaFirefox-translations-45.9.0esr-71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205246" comment="libfreebl3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208371" comment="libfreebl3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205247" comment="libsoftokn3-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208372" comment="libsoftokn3-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202359" comment="mozilla-nss-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208374" comment="mozilla-nss-32bit-3.29.5-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205248" comment="mozilla-nss-tools-3.29.5-46 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202357" comment="mozilla-nspr-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208373" comment="mozilla-nspr-32bit-4.13.1-32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5470</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-5470" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5470" source="CVE"/>
    <description>
    Memory safety bugs were reported in Firefox 53 and Firefox ESR 52.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5470.html">CVE-2017-5470</cve>
<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5472</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-5472" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5472" source="CVE"/>
    <description>
    A use-after-free vulnerability with the frameloader during tree reconstruction while regenerating CSS layout when attempting to use a node in the tree that no longer exists. This results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5472.html">CVE-2017-5472</cve>
<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5483</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-5483" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5483" source="CVE"/>
    <description>
    The SNMP parser in tcpdump before 4.9.0 has a buffer overflow in print-snmp.c:asn1_parse().
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5483.html">CVE-2017-5483</cve>
<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210822" comment="tcpdump-3.9.8-1.29 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-5484" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5484" source="CVE"/>
    <description>
    The ATM parser in tcpdump before 4.9.0 has a buffer overflow in print-atm.c:sig_print().
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5484.html">CVE-2017-5484</cve>
<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210822" comment="tcpdump-3.9.8-1.29 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-5485" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5485" source="CVE"/>
    <description>
    The ISO CLNS parser in tcpdump before 4.9.0 has a buffer overflow in addrtoname.c:lookup_nsap().
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5485.html">CVE-2017-5485</cve>
<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210822" comment="tcpdump-3.9.8-1.29 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5486</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-5486" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5486" source="CVE"/>
    <description>
    The ISO CLNS parser in tcpdump before 4.9.0 has a buffer overflow in print-isoclns.c:clnp_print().
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5486.html">CVE-2017-5486</cve>
<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210822" comment="tcpdump-3.9.8-1.29 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5495</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-5495" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5495" source="CVE"/>
    <description>
    All versions of Quagga, 0.93 through 1.1.0, are vulnerable to an unbounded memory allocation in the telnet 'vty' CLI, leading to a Denial-of-Service of Quagga daemons, or even the entire host. When Quagga daemons are configured with their telnet CLI enabled, anyone who can connect to the TCP ports can trigger this vulnerability, prior to authentication. Most distributions restrict the Quagga telnet interface to local access only by default. The Quagga telnet interface 'vty' input buffer grows automatically, without bound, so long as a newline is not entered. This allows an attacker to cause the Quagga daemon to allocate unbounded memory by sending very long strings without a newline. Eventually the daemon is terminated by the system, or the system itself runs out of memory. This is fixed in Quagga 1.1.1 and Free Range Routing (FRR) Protocol Suite 2017-01-10.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5495.html">CVE-2017-5495</cve>
<bugzilla href="https://bugzilla.suse.com/1021669">SUSE bug 1021669</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203426" comment="quagga-0.99.15-0.30.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5498</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-5498" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5498" source="CVE"/>
    <description>
    libjasper/include/jasper/jas_math.h in JasPer 1.900.17 allows remote attackers to cause a denial of service (crash) via vectors involving left shift of a negative value.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5498.html">CVE-2017-5498</cve>
<bugzilla href="https://bugzilla.suse.com/1020353">SUSE bug 1020353</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1020451">SUSE bug 1020451</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202750" comment="jasper-1.900.14-134.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209370" comment="libjasper-1.900.14-134.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209371" comment="libjasper-32bit-1.900.14-134.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5506</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-5506" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5506" source="CVE"/>
    <description>
    Double free vulnerability in magick/profile.c in ImageMagick allows remote attackers to have unspecified impact via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5506.html">CVE-2017-5506</cve>
<bugzilla href="https://bugzilla.suse.com/1020436">SUSE bug 1020436</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202241" comment="ImageMagick-6.4.3.6-7.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209112" comment="libMagickCore1-6.4.3.6-7.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209113" comment="libMagickCore1-32bit-6.4.3.6-7.65 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5507</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-5507" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5507" source="CVE"/>
    <description>
    Memory leak in coders/mpc.c in ImageMagick before 6.9.7-4 and 7.x before 7.0.4-4 allows remote attackers to cause a denial of service (memory consumption) via vectors involving a pixel cache.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5507.html">CVE-2017-5507</cve>
<bugzilla href="https://bugzilla.suse.com/1020439">SUSE bug 1020439</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202241" comment="ImageMagick-6.4.3.6-7.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209112" comment="libMagickCore1-6.4.3.6-7.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209113" comment="libMagickCore1-32bit-6.4.3.6-7.65 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5508</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-5508" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5508" source="CVE"/>
    <description>
    Heap-based buffer overflow in the PushQuantumPixel function in ImageMagick before 6.9.7-3 and 7.x before 7.0.4-3 allows remote attackers to cause a denial of service (application crash) via a crafted TIFF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5508.html">CVE-2017-5508</cve>
<bugzilla href="https://bugzilla.suse.com/1020441">SUSE bug 1020441</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1086782">SUSE bug 1086782</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202241" comment="ImageMagick-6.4.3.6-7.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209112" comment="libMagickCore1-6.4.3.6-7.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209113" comment="libMagickCore1-32bit-6.4.3.6-7.65 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-5511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5511" source="CVE"/>
    <description>
    coders/psd.c in ImageMagick allows remote attackers to have unspecified impact by leveraging an improper cast, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5511.html">CVE-2017-5511</cve>
<bugzilla href="https://bugzilla.suse.com/1020448">SUSE bug 1020448</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202241" comment="ImageMagick-6.4.3.6-7.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209112" comment="libMagickCore1-6.4.3.6-7.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209113" comment="libMagickCore1-32bit-6.4.3.6-7.65 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5526</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-5526" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5526" source="CVE"/>
    <description>
    Memory leak in hw/audio/es1370.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5526.html">CVE-2017-5526</cve>
<bugzilla href="https://bugzilla.suse.com/1020589">SUSE bug 1020589</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1059777">SUSE bug 1059777</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205987" comment="xen-4.2.5_21-45.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209086" comment="xen-doc-html-4.2.5_21-45.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209087" comment="xen-doc-pdf-4.2.5_21-45.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205988" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.5-45.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205989" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.5-45.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205990" comment="xen-libs-4.2.5_21-45.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209088" comment="xen-libs-32bit-4.2.5_21-45.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209089" comment="xen-tools-4.2.5_21-45.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205991" comment="xen-tools-domU-4.2.5_21-45.11 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250454" comment="xen-4.2.5_21-47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250455" comment="xen-doc-html-4.2.5_21-47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250456" comment="xen-doc-pdf-4.2.5_21-47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250457" comment="xen-kmp-default-4.2.5_21_3.0.101_0.132.TDC-47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250458" comment="xen-libs-4.2.5_21-47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250459" comment="xen-tools-4.2.5_21-47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250460" comment="xen-tools-domU-4.2.5_21-47.13 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5551</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-5551" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5551" source="CVE"/>
    <description>
    The simple_set_acl function in fs/posix_acl.c in the Linux kernel before 4.9.6 preserves the setgid bit during a setxattr call involving a tmpfs filesystem, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-7097.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5551.html">CVE-2017-5551</cve>
<bugzilla href="https://bugzilla.suse.com/1021258">SUSE bug 1021258</bugzilla>
<bugzilla href="https://bugzilla.suse.com/995968">SUSE bug 995968</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208767" comment="kernel-bigsmp-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208768" comment="kernel-bigsmp-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208769" comment="kernel-bigsmp-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205644" comment="kernel-default-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205645" comment="kernel-default-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205646" comment="kernel-default-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208770" comment="kernel-default-man-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205647" comment="kernel-ec2-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205648" comment="kernel-ec2-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205649" comment="kernel-ec2-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205650" comment="kernel-pae-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205651" comment="kernel-pae-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205652" comment="kernel-pae-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205653" comment="kernel-source-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205654" comment="kernel-syms-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205655" comment="kernel-trace-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205656" comment="kernel-trace-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205657" comment="kernel-trace-devel-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205658" comment="kernel-xen-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205659" comment="kernel-xen-base-3.0.101-0.47.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205660" comment="kernel-xen-devel-3.0.101-0.47.96 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5579</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-5579" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5579" source="CVE"/>
    <description>
    Memory leak in the serial_exit_core function in hw/char/serial.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5579.html">CVE-2017-5579</cve>
<bugzilla href="https://bugzilla.suse.com/1021741">SUSE bug 1021741</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1022627">SUSE bug 1022627</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205626" comment="kvm-1.4.2-53.11 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5596</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-5596" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5596" source="CVE"/>
    <description>
    In Wireshark 2.2.0 to 2.2.3 and 2.0.0 to 2.0.9, the ASTERIX dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-asterix.c by changing a data type to avoid an integer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5596.html">CVE-2017-5596</cve>
<bugzilla href="https://bugzilla.suse.com/1021739">SUSE bug 1021739</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203586" comment="wireshark-2.0.12-36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203588" comment="wireshark-gtk-2.0.12-36 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5597</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-5597" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5597" source="CVE"/>
    <description>
    In Wireshark 2.2.0 to 2.2.3 and 2.0.0 to 2.0.9, the DHCPv6 dissector could go into a large loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-dhcpv6.c by changing a data type to avoid an integer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5597.html">CVE-2017-5597</cve>
<bugzilla href="https://bugzilla.suse.com/1021739">SUSE bug 1021739</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203586" comment="wireshark-2.0.12-36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203588" comment="wireshark-gtk-2.0.12-36 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5647</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-5647" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5647" source="CVE"/>
    <description>
    A bug in the handling of the pipelined requests in Apache Tomcat 9.0.0.M1 to 9.0.0.M18, 8.5.0 to 8.5.12, 8.0.0.RC1 to 8.0.42, 7.0.0 to 7.0.76, and 6.0.0 to 6.0.52, when send file was used, results in the pipelined request being lost when send file processing of the previous request completed. This could result in responses appearing to be sent for the wrong request. For example, a user agent that sent requests A, B and C could see the correct response for request A, the response for request C for request B and no response for request C.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5647.html">CVE-2017-5647</cve>
<bugzilla href="https://bugzilla.suse.com/1033448">SUSE bug 1033448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1036642">SUSE bug 1036642</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205936" comment="tomcat6-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205937" comment="tomcat6-admin-webapps-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205938" comment="tomcat6-docs-webapp-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205939" comment="tomcat6-javadoc-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205940" comment="tomcat6-jsp-2_1-api-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205941" comment="tomcat6-lib-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205942" comment="tomcat6-servlet-2_5-api-6.0.53-0.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205943" comment="tomcat6-webapps-6.0.53-0.56 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5664</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-5664" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5664" source="CVE"/>
    <description>
    The error page mechanism of the Java Servlet Specification requires that, when an error occurs and an error page is configured for the error that occurred, the original request and response are forwarded to the error page. This means that the request is presented to the error page with the original HTTP method. If the error page is a static file, expected behaviour is to serve content of the file as if processing a GET request, regardless of the actual HTTP method. The Default Servlet in Apache Tomcat 9.0.0.M1 to 9.0.0.M20, 8.5.0 to 8.5.14, 8.0.0.RC1 to 8.0.43 and 7.0.0 to 7.0.77 did not do this. Depending on the original request this could lead to unexpected and undesirable results for static error pages including, if the DefaultServlet is configured to permit writes, the replacement or removal of the custom error page. Notes for other user provided error pages: (1) Unless explicitly coded otherwise, JSPs ignore the HTTP method. JSPs used as error pages must must ensure that they handle any error dispatch as a GET request, regardless of the actual method. (2) By default, the response generated by a Servlet does depend on the HTTP method. Custom Servlets used as error pages must ensure that they handle any error dispatch as a GET request, regardless of the actual method.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5664.html">CVE-2017-5664</cve>
<bugzilla href="https://bugzilla.suse.com/1042910">SUSE bug 1042910</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009229621" comment="tomcat6-6.0.53-0.57.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229622" comment="tomcat6-admin-webapps-6.0.53-0.57.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229623" comment="tomcat6-docs-webapp-6.0.53-0.57.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229624" comment="tomcat6-javadoc-6.0.53-0.57.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229625" comment="tomcat6-jsp-2_1-api-6.0.53-0.57.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229626" comment="tomcat6-lib-6.0.53-0.57.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229627" comment="tomcat6-servlet-2_5-api-6.0.53-0.57.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229628" comment="tomcat6-webapps-6.0.53-0.57.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5669</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-5669" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5669" source="CVE"/>
    <description>
    The do_shmat function in ipc/shm.c in the Linux kernel through 4.9.12 does not restrict the address calculated by a certain rounding operation, which allows local users to map page zero, and consequently bypass a protection mechanism that exists for the mmap system call, by making crafted shmget and shmat system calls in a privileged context.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5669.html">CVE-2017-5669</cve>
<bugzilla href="https://bugzilla.suse.com/1026914">SUSE bug 1026914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1090078">SUSE bug 1090078</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208691" comment="kernel-bigsmp-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208692" comment="kernel-bigsmp-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208693" comment="kernel-bigsmp-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205592" comment="kernel-default-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205593" comment="kernel-default-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205594" comment="kernel-default-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208694" comment="kernel-default-man-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205595" comment="kernel-ec2-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205596" comment="kernel-ec2-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205597" comment="kernel-ec2-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205598" comment="kernel-pae-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205599" comment="kernel-pae-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205600" comment="kernel-pae-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205601" comment="kernel-source-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205602" comment="kernel-syms-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205603" comment="kernel-trace-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205604" comment="kernel-trace-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205605" comment="kernel-trace-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205606" comment="kernel-xen-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205607" comment="kernel-xen-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205608" comment="kernel-xen-devel-3.0.101-0.47.106.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5715</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-5715" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715" source="CVE"/>
    <description>
    Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5715.html">CVE-2017-5715</cve>
<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1074562">SUSE bug 1074562</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1074578">SUSE bug 1074578</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1074701">SUSE bug 1074701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1074741">SUSE bug 1074741</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1074919">SUSE bug 1074919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1075006">SUSE bug 1075006</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1075007">SUSE bug 1075007</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1075262">SUSE bug 1075262</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1075419">SUSE bug 1075419</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1076115">SUSE bug 1076115</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1076372">SUSE bug 1076372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1078353">SUSE bug 1078353</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1080039">SUSE bug 1080039</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1087939">SUSE bug 1087939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1095735">SUSE bug 1095735</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1102055">SUSE bug 1102055</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1102517">SUSE bug 1102517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1105108">SUSE bug 1105108</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1126516">SUSE bug 1126516</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202548" comment="cpp43-4.3.4_20091019-37.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202549" comment="gcc43-4.3.4_20091019-37.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208495" comment="gcc43-32bit-4.3.4_20091019-37.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205332" comment="gcc43-c++-4.3.4_20091019-37.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202551" comment="gcc43-fortran-4.3.4_20091019-37.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202552" comment="gcc43-fortran-32bit-4.3.4_20091019-37.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205333" comment="gcc43-info-4.3.4_20091019-37.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205334" comment="gcc43-locale-4.3.4_20091019-37.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208669" comment="kernel-bigsmp-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208670" comment="kernel-bigsmp-base-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208671" comment="kernel-bigsmp-devel-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205558" comment="kernel-default-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205559" comment="kernel-default-base-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205560" comment="kernel-default-devel-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208672" comment="kernel-default-man-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205561" comment="kernel-ec2-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205562" comment="kernel-ec2-base-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205563" comment="kernel-ec2-devel-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205564" comment="kernel-pae-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205565" comment="kernel-pae-base-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205566" comment="kernel-pae-devel-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205567" comment="kernel-source-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205568" comment="kernel-syms-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205569" comment="kernel-trace-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205570" comment="kernel-trace-base-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205571" comment="kernel-trace-devel-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205572" comment="kernel-xen-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205573" comment="kernel-xen-base-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205574" comment="kernel-xen-devel-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205628" comment="kvm-1.4.2-53.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205335" comment="libstdc++43-devel-4.3.4_20091019-37.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208496" comment="libstdc++43-devel-32bit-4.3.4_20091019-37.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205632" comment="libvirt-1.0.5.9-21.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205633" comment="libvirt-client-1.0.5.9-21.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208760" comment="libvirt-client-32bit-1.0.5.9-21.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205634" comment="libvirt-doc-1.0.5.9-21.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205635" comment="libvirt-lock-sanlock-1.0.5.9-21.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205636" comment="libvirt-python-1.0.5.9-21.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205666" comment="microcode_ctl-1.17-102.83.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233376" comment="xen-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233381" comment="xen-doc-html-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233382" comment="xen-doc-pdf-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233377" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233378" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233379" comment="xen-libs-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233383" comment="xen-libs-32bit-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233384" comment="xen-tools-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233380" comment="xen-tools-domU-4.2.5_21-45.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5753</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-5753" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753" source="CVE"/>
    <description>
    Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5753.html">CVE-2017-5753</cve>
<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1074562">SUSE bug 1074562</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1074578">SUSE bug 1074578</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1074701">SUSE bug 1074701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1075006">SUSE bug 1075006</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1075419">SUSE bug 1075419</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1075748">SUSE bug 1075748</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1080039">SUSE bug 1080039</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1087084">SUSE bug 1087084</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1087939">SUSE bug 1087939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1102055">SUSE bug 1102055</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208669" comment="kernel-bigsmp-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208670" comment="kernel-bigsmp-base-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208671" comment="kernel-bigsmp-devel-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205558" comment="kernel-default-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205559" comment="kernel-default-base-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205560" comment="kernel-default-devel-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208672" comment="kernel-default-man-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205561" comment="kernel-ec2-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205562" comment="kernel-ec2-base-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205563" comment="kernel-ec2-devel-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205564" comment="kernel-pae-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205565" comment="kernel-pae-base-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205566" comment="kernel-pae-devel-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205567" comment="kernel-source-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205568" comment="kernel-syms-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205569" comment="kernel-trace-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205570" comment="kernel-trace-base-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205571" comment="kernel-trace-devel-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205572" comment="kernel-xen-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205573" comment="kernel-xen-base-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205574" comment="kernel-xen-devel-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233376" comment="xen-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233381" comment="xen-doc-html-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233382" comment="xen-doc-pdf-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233377" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233378" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233379" comment="xen-libs-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233383" comment="xen-libs-32bit-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233384" comment="xen-tools-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233380" comment="xen-tools-domU-4.2.5_21-45.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5754</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-5754" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754" source="CVE"/>
    <description>
    Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5754.html">CVE-2017-5754</cve>
<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1074562">SUSE bug 1074562</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1074578">SUSE bug 1074578</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1074701">SUSE bug 1074701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1075006">SUSE bug 1075006</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1075008">SUSE bug 1075008</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1087939">SUSE bug 1087939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1102055">SUSE bug 1102055</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1115045">SUSE bug 1115045</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208652" comment="kernel-bigsmp-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208653" comment="kernel-bigsmp-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208654" comment="kernel-bigsmp-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205524" comment="kernel-default-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205525" comment="kernel-default-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205526" comment="kernel-default-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208655" comment="kernel-default-man-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205527" comment="kernel-ec2-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205528" comment="kernel-ec2-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205529" comment="kernel-ec2-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205530" comment="kernel-pae-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205531" comment="kernel-pae-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205532" comment="kernel-pae-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205533" comment="kernel-source-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205534" comment="kernel-syms-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205535" comment="kernel-trace-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205536" comment="kernel-trace-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205537" comment="kernel-trace-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205538" comment="kernel-xen-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205539" comment="kernel-xen-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205540" comment="kernel-xen-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233376" comment="xen-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233381" comment="xen-doc-html-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233382" comment="xen-doc-pdf-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233377" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233378" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233379" comment="xen-libs-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233383" comment="xen-libs-32bit-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233384" comment="xen-tools-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233380" comment="xen-tools-domU-4.2.5_21-45.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5837</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-5837" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5837" source="CVE"/>
    <description>
    The gst_riff_create_audio_caps function in gst-libs/gst/riff/riff-media.c in gst-plugins-base in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (floating point exception and crash) via a crafted video file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5837.html">CVE-2017-5837</cve>
<bugzilla href="https://bugzilla.suse.com/1023259">SUSE bug 1023259</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1024076">SUSE bug 1024076</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1024079">SUSE bug 1024079</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009256637" comment="gstreamer-0_10-plugins-base-0.10.35-5.18.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256659" comment="gstreamer-0_10-plugins-base-32bit-0.10.35-5.18.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256638" comment="gstreamer-0_10-plugins-base-doc-0.10.35-5.18.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256639" comment="gstreamer-0_10-plugins-base-lang-0.10.35-5.18.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256640" comment="libgstapp-0_10-0-0.10.35-5.18.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256660" comment="libgstapp-0_10-0-32bit-0.10.35-5.18.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256641" comment="libgstinterfaces-0_10-0-0.10.35-5.18.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256661" comment="libgstinterfaces-0_10-0-32bit-0.10.35-5.18.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5844</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-5844" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5844" source="CVE"/>
    <description>
    The gst_riff_create_audio_caps function in gst-libs/gst/riff/riff-media.c in gst-plugins-base in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (floating point exception and crash) via a crafted ASF file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5844.html">CVE-2017-5844</cve>
<bugzilla href="https://bugzilla.suse.com/1023259">SUSE bug 1023259</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1024079">SUSE bug 1024079</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009256637" comment="gstreamer-0_10-plugins-base-0.10.35-5.18.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256659" comment="gstreamer-0_10-plugins-base-32bit-0.10.35-5.18.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256638" comment="gstreamer-0_10-plugins-base-doc-0.10.35-5.18.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256639" comment="gstreamer-0_10-plugins-base-lang-0.10.35-5.18.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256640" comment="libgstapp-0_10-0-0.10.35-5.18.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256660" comment="libgstapp-0_10-0-32bit-0.10.35-5.18.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256641" comment="libgstinterfaces-0_10-0-0.10.35-5.18.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256661" comment="libgstinterfaces-0_10-0-32bit-0.10.35-5.18.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5856</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-5856" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5856" source="CVE"/>
    <description>
    Memory leak in the megasas_handle_dcmd function in hw/scsi/megasas.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption) via MegaRAID Firmware Interface (MFI) commands with the sglist size set to a value over 2 Gb.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5856.html">CVE-2017-5856</cve>
<bugzilla href="https://bugzilla.suse.com/1023053">SUSE bug 1023053</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1024186">SUSE bug 1024186</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205626" comment="kvm-1.4.2-53.11 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5898</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-5898" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5898" source="CVE"/>
    <description>
    Integer overflow in the emulated_apdu_from_guest function in usb/dev-smartcard-reader.c in Quick Emulator (Qemu), when built with the CCID Card device emulator support, allows local users to cause a denial of service (application crash) via a large Application Protocol Data Units (APDU) unit.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5898.html">CVE-2017-5898</cve>
<bugzilla href="https://bugzilla.suse.com/1023907">SUSE bug 1023907</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1024307">SUSE bug 1024307</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205626" comment="kvm-1.4.2-53.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205997" comment="xen-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209094" comment="xen-doc-html-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209095" comment="xen-doc-pdf-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205998" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205999" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206000" comment="xen-libs-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209096" comment="xen-libs-32bit-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209097" comment="xen-tools-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206001" comment="xen-tools-domU-4.2.5_21-45.19 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205626" comment="kvm-1.4.2-53.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250468" comment="xen-4.2.5_21-47.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250469" comment="xen-doc-html-4.2.5_21-47.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250470" comment="xen-doc-pdf-4.2.5_21-47.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250471" comment="xen-kmp-default-4.2.5_21_3.0.101_0.150.TDC-47.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250472" comment="xen-libs-4.2.5_21-47.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250473" comment="xen-tools-4.2.5_21-47.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250474" comment="xen-tools-domU-4.2.5_21-47.21 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5953</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-5953" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5953" source="CVE"/>
    <description>
    vim before patch 8.0.0322 does not properly validate values for tree length when handling a spell file, which may result in an integer overflow at a memory allocation site and a resultant buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5953.html">CVE-2017-5953</cve>
<bugzilla href="https://bugzilla.suse.com/1024724">SUSE bug 1024724</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123143">SUSE bug 1123143</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210866" comment="gvim-7.2-8.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210867" comment="vim-7.2-8.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210868" comment="vim-base-7.2-8.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210869" comment="vim-data-7.2-8.20 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5969</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-5969" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5969" source="CVE"/>
    <description>
    ** DISPUTED ** libxml2 2.9.4, when used in recover mode, allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted XML document.  NOTE: The maintainer states "I would disagree of a CVE with the Recover parsing option which should only be used for manual recovery at least for XML parser."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5969.html">CVE-2017-5969</cve>
<bugzilla href="https://bugzilla.suse.com/1024989">SUSE bug 1024989</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049467">SUSE bug 1049467</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203104" comment="libxml2-2.7.6-0.76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209977" comment="libxml2-32bit-2.7.6-0.76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209978" comment="libxml2-doc-2.7.6-0.76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209979" comment="libxml2-python-2.7.6-0.76 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5970</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-5970" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5970" source="CVE"/>
    <description>
    The ipv4_pktinfo_prepare function in net/ipv4/ip_sockglue.c in the Linux kernel through 4.9.9 allows attackers to cause a denial of service (system crash) via (1) an application that makes crafted system calls or possibly (2) IPv4 traffic with invalid IP options.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5970.html">CVE-2017-5970</cve>
<bugzilla href="https://bugzilla.suse.com/1024938">SUSE bug 1024938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1025013">SUSE bug 1025013</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208691" comment="kernel-bigsmp-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208692" comment="kernel-bigsmp-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208693" comment="kernel-bigsmp-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205592" comment="kernel-default-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205593" comment="kernel-default-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205594" comment="kernel-default-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208694" comment="kernel-default-man-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205595" comment="kernel-ec2-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205596" comment="kernel-ec2-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205597" comment="kernel-ec2-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205598" comment="kernel-pae-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205599" comment="kernel-pae-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205600" comment="kernel-pae-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205601" comment="kernel-source-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205602" comment="kernel-syms-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205603" comment="kernel-trace-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205604" comment="kernel-trace-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205605" comment="kernel-trace-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205606" comment="kernel-xen-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205607" comment="kernel-xen-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205608" comment="kernel-xen-devel-3.0.101-0.47.106.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5973</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-5973" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5973" source="CVE"/>
    <description>
    The xhci_kick_epctx function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (infinite loop and QEMU process crash) via vectors related to control transfer descriptor sequence.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5973.html">CVE-2017-5973</cve>
<bugzilla href="https://bugzilla.suse.com/1025109">SUSE bug 1025109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1025188">SUSE bug 1025188</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205626" comment="kvm-1.4.2-53.11 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5986</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-5986" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5986" source="CVE"/>
    <description>
    Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel before 4.9.11 allows local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5986.html">CVE-2017-5986</cve>
<bugzilla href="https://bugzilla.suse.com/1025235">SUSE bug 1025235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1027066">SUSE bug 1027066</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208691" comment="kernel-bigsmp-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208692" comment="kernel-bigsmp-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208693" comment="kernel-bigsmp-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205592" comment="kernel-default-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205593" comment="kernel-default-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205594" comment="kernel-default-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208694" comment="kernel-default-man-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205595" comment="kernel-ec2-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205596" comment="kernel-ec2-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205597" comment="kernel-ec2-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205598" comment="kernel-pae-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205599" comment="kernel-pae-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205600" comment="kernel-pae-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205601" comment="kernel-source-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205602" comment="kernel-syms-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205603" comment="kernel-trace-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205604" comment="kernel-trace-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205605" comment="kernel-trace-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205606" comment="kernel-xen-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205607" comment="kernel-xen-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205608" comment="kernel-xen-devel-3.0.101-0.47.106.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6014</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-6014" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6014" source="CVE"/>
    <description>
    In Wireshark 2.2.4 and earlier, a crafted or malformed STANAG 4607 capture file will cause an infinite loop and memory exhaustion. If the packet size field in a packet header is null, the offset to read from will not advance, causing continuous attempts to read the same zero length packet. This will quickly exhaust all system memory.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6014.html">CVE-2017-6014</cve>
<bugzilla href="https://bugzilla.suse.com/1025913">SUSE bug 1025913</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203586" comment="wireshark-2.0.12-36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203588" comment="wireshark-gtk-2.0.12-36 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6074</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-6074" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074" source="CVE"/>
    <description>
    The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel through 4.9.11 mishandles DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allows local users to obtain root privileges or cause a denial of service (double free) via an application that makes an IPV6_RECVPKTINFO setsockopt system call.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6074.html">CVE-2017-6074</cve>
<bugzilla href="https://bugzilla.suse.com/1026024">SUSE bug 1026024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1033287">SUSE bug 1033287</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208691" comment="kernel-bigsmp-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208692" comment="kernel-bigsmp-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208693" comment="kernel-bigsmp-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205592" comment="kernel-default-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205593" comment="kernel-default-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205594" comment="kernel-default-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208694" comment="kernel-default-man-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205595" comment="kernel-ec2-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205596" comment="kernel-ec2-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205597" comment="kernel-ec2-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205598" comment="kernel-pae-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205599" comment="kernel-pae-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205600" comment="kernel-pae-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205601" comment="kernel-source-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205602" comment="kernel-syms-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205603" comment="kernel-trace-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205604" comment="kernel-trace-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205605" comment="kernel-trace-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205606" comment="kernel-xen-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205607" comment="kernel-xen-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205608" comment="kernel-xen-devel-3.0.101-0.47.106.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6214</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-6214" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6214" source="CVE"/>
    <description>
    The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel before 4.9.11 allows remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6214.html">CVE-2017-6214</cve>
<bugzilla href="https://bugzilla.suse.com/1026722">SUSE bug 1026722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1027179">SUSE bug 1027179</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208691" comment="kernel-bigsmp-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208692" comment="kernel-bigsmp-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208693" comment="kernel-bigsmp-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205592" comment="kernel-default-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205593" comment="kernel-default-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205594" comment="kernel-default-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208694" comment="kernel-default-man-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205595" comment="kernel-ec2-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205596" comment="kernel-ec2-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205597" comment="kernel-ec2-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205598" comment="kernel-pae-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205599" comment="kernel-pae-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205600" comment="kernel-pae-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205601" comment="kernel-source-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205602" comment="kernel-syms-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205603" comment="kernel-trace-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205604" comment="kernel-trace-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205605" comment="kernel-trace-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205606" comment="kernel-xen-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205607" comment="kernel-xen-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205608" comment="kernel-xen-devel-3.0.101-0.47.106.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6312</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-6312" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6312" source="CVE"/>
    <description>
    Integer overflow in io-ico.c in gdk-pixbuf allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted image entry offset in an ICO file, which triggers an out-of-bounds read, related to compiler optimizations.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6312.html">CVE-2017-6312</cve>
<bugzilla href="https://bugzilla.suse.com/1027024">SUSE bug 1027024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1027026">SUSE bug 1027026</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009233157" comment="gtk2-2.18.9-0.45.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233162" comment="gtk2-32bit-2.18.9-0.45.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233163" comment="gtk2-doc-2.18.9-0.45.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233164" comment="gtk2-lang-2.18.9-0.45.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6313</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-6313" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6313" source="CVE"/>
    <description>
    Integer underflow in the load_resources function in io-icns.c in gdk-pixbuf allows context-dependent attackers to cause a denial of service (out-of-bounds read and program crash) via a crafted image entry size in an ICO file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6313.html">CVE-2017-6313</cve>
<bugzilla href="https://bugzilla.suse.com/1027024">SUSE bug 1027024</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009233157" comment="gtk2-2.18.9-0.45.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233162" comment="gtk2-32bit-2.18.9-0.45.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233163" comment="gtk2-doc-2.18.9-0.45.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233164" comment="gtk2-lang-2.18.9-0.45.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6314</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-6314" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6314" source="CVE"/>
    <description>
    The make_available_at_least function in io-tiff.c in gdk-pixbuf allows context-dependent attackers to cause a denial of service (infinite loop) via a large TIFF file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6314.html">CVE-2017-6314</cve>
<bugzilla href="https://bugzilla.suse.com/1027024">SUSE bug 1027024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1027025">SUSE bug 1027025</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009233157" comment="gtk2-2.18.9-0.45.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233162" comment="gtk2-32bit-2.18.9-0.45.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233163" comment="gtk2-doc-2.18.9-0.45.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233164" comment="gtk2-lang-2.18.9-0.45.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6318</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-6318" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6318" source="CVE"/>
    <description>
    saned in sane-backends 1.0.25 allows remote attackers to obtain sensitive memory information via a crafted SANE_NET_CONTROL_OPTION packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6318.html">CVE-2017-6318</cve>
<bugzilla href="https://bugzilla.suse.com/1027197">SUSE bug 1027197</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203544" comment="sane-backends-1.0.20-7.8 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6348</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-6348" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6348" source="CVE"/>
    <description>
    The hashbin_delete function in net/irda/irqueue.c in the Linux kernel before 4.9.13 improperly manages lock dropping, which allows local users to cause a denial of service (deadlock) via crafted operations on IrDA devices.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6348.html">CVE-2017-6348</cve>
<bugzilla href="https://bugzilla.suse.com/1027178">SUSE bug 1027178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208691" comment="kernel-bigsmp-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208692" comment="kernel-bigsmp-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208693" comment="kernel-bigsmp-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205592" comment="kernel-default-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205593" comment="kernel-default-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205594" comment="kernel-default-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208694" comment="kernel-default-man-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205595" comment="kernel-ec2-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205596" comment="kernel-ec2-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205597" comment="kernel-ec2-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205598" comment="kernel-pae-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205599" comment="kernel-pae-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205600" comment="kernel-pae-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205601" comment="kernel-source-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205602" comment="kernel-syms-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205603" comment="kernel-trace-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205604" comment="kernel-trace-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205605" comment="kernel-trace-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205606" comment="kernel-xen-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205607" comment="kernel-xen-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205608" comment="kernel-xen-devel-3.0.101-0.47.106.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6353</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-6353" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6353" source="CVE"/>
    <description>
    net/sctp/socket.c in the Linux kernel through 4.10.1 does not properly restrict association peel-off operations during certain wait states, which allows local users to cause a denial of service (invalid unlock and double free) via a multithreaded application.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-5986.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6353.html">CVE-2017-6353</cve>
<bugzilla href="https://bugzilla.suse.com/1025235">SUSE bug 1025235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1027066">SUSE bug 1027066</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208691" comment="kernel-bigsmp-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208692" comment="kernel-bigsmp-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208693" comment="kernel-bigsmp-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205592" comment="kernel-default-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205593" comment="kernel-default-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205594" comment="kernel-default-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208694" comment="kernel-default-man-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205595" comment="kernel-ec2-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205596" comment="kernel-ec2-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205597" comment="kernel-ec2-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205598" comment="kernel-pae-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205599" comment="kernel-pae-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205600" comment="kernel-pae-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205601" comment="kernel-source-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205602" comment="kernel-syms-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205603" comment="kernel-trace-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205604" comment="kernel-trace-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205605" comment="kernel-trace-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205606" comment="kernel-xen-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205607" comment="kernel-xen-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205608" comment="kernel-xen-devel-3.0.101-0.47.106.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6414</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-6414" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6414" source="CVE"/>
    <description>
    Memory leak in the vcard_apdu_new function in card_7816.c in libcacard before 2.5.3 allows local guest OS users to cause a denial of service (host memory consumption) via vectors related to allocating a new APDU object.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6414.html">CVE-2017-6414</cve>
<bugzilla href="https://bugzilla.suse.com/1027514">SUSE bug 1027514</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1027570">SUSE bug 1027570</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205962" comment="xen-4.2.5_21-38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209066" comment="xen-doc-html-4.2.5_21-38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209067" comment="xen-doc-pdf-4.2.5_21-38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205963" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.99-38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205964" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.99-38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205965" comment="xen-libs-4.2.5_21-38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209068" comment="xen-libs-32bit-4.2.5_21-38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209069" comment="xen-tools-4.2.5_21-38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205966" comment="xen-tools-domU-4.2.5_21-38 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205962" comment="xen-4.2.5_21-38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209066" comment="xen-doc-html-4.2.5_21-38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209067" comment="xen-doc-pdf-4.2.5_21-38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205963" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.99-38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205965" comment="xen-libs-4.2.5_21-38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209068" comment="xen-libs-32bit-4.2.5_21-38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209069" comment="xen-tools-4.2.5_21-38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205966" comment="xen-tools-domU-4.2.5_21-38 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250419" comment="xen-4.2.5_21-40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250420" comment="xen-doc-html-4.2.5_21-40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250421" comment="xen-doc-pdf-4.2.5_21-40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250422" comment="xen-kmp-default-4.2.5_21_3.0.101_0.119.TDC-40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250423" comment="xen-libs-4.2.5_21-40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250424" comment="xen-tools-4.2.5_21-40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250425" comment="xen-tools-domU-4.2.5_21-40 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6418</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-6418" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6418" source="CVE"/>
    <description>
    libclamav/message.c in ClamAV 0.99.2 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted e-mail message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6418.html">CVE-2017-6418</cve>
<bugzilla href="https://bugzilla.suse.com/1052466">SUSE bug 1052466</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205313" comment="clamav-0.99.3-0.20.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6419</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-6419" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6419" source="CVE"/>
    <description>
    mspack/lzxd.c in libmspack 0.5alpha, as used in ClamAV 0.99.2, allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted CHM file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6419.html">CVE-2017-6419</cve>
<bugzilla href="https://bugzilla.suse.com/1052449">SUSE bug 1052449</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1083915">SUSE bug 1083915</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205314" comment="clamav-0.99.4-0.20.7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6420</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-6420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6420" source="CVE"/>
    <description>
    The wwunpack function in libclamav/wwunpack.c in ClamAV 0.99.2 allows remote attackers to cause a denial of service (use-after-free) via a crafted PE file with WWPack compression.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6420.html">CVE-2017-6420</cve>
<bugzilla href="https://bugzilla.suse.com/1052448">SUSE bug 1052448</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205313" comment="clamav-0.99.3-0.20.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6451</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-6451" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6451" source="CVE"/>
    <description>
    The mx4200_send function in the legacy MX4200 refclock in NTP before 4.2.8p10 and 4.3.x before 4.3.94 does not properly handle the return value of the snprintf function, which allows local users to execute arbitrary code via unspecified vectors, which trigger an out-of-bounds memory write.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6451.html">CVE-2017-6451</cve>
<bugzilla href="https://bugzilla.suse.com/1030050">SUSE bug 1030050</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009248664" comment="ntp-4.2.8p10-48.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248665" comment="ntp-doc-4.2.8p10-48.15 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6458</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-6458" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6458" source="CVE"/>
    <description>
    Multiple buffer overflows in the ctl_put* functions in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allow remote authenticated users to have unspecified impact via a long variable.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6458.html">CVE-2017-6458</cve>
<bugzilla href="https://bugzilla.suse.com/1030050">SUSE bug 1030050</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009248664" comment="ntp-4.2.8p10-48.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248665" comment="ntp-doc-4.2.8p10-48.15 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6460</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-6460" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6460" source="CVE"/>
    <description>
    Stack-based buffer overflow in the reslist function in ntpq in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote servers have unspecified impact via a long flagstr variable in a restriction list response.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6460.html">CVE-2017-6460</cve>
<bugzilla href="https://bugzilla.suse.com/1030050">SUSE bug 1030050</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009248664" comment="ntp-4.2.8p10-48.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248665" comment="ntp-doc-4.2.8p10-48.15 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6462</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-6462" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6462" source="CVE"/>
    <description>
    Buffer overflow in the legacy Datum Programmable Time Server (DPTS) refclock driver in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows local users to have unspecified impact via a crafted /dev/datum device.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6462.html">CVE-2017-6462</cve>
<bugzilla href="https://bugzilla.suse.com/1030050">SUSE bug 1030050</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009248664" comment="ntp-4.2.8p10-48.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248665" comment="ntp-doc-4.2.8p10-48.15 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6463</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-6463" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6463" source="CVE"/>
    <description>
    NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote authenticated users to cause a denial of service (daemon crash) via an invalid setting in a :config directive, related to the unpeer option.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6463.html">CVE-2017-6463</cve>
<bugzilla href="https://bugzilla.suse.com/1030050">SUSE bug 1030050</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009248664" comment="ntp-4.2.8p10-48.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248665" comment="ntp-doc-4.2.8p10-48.15 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6464</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-6464" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6464" source="CVE"/>
    <description>
    NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote attackers to cause a denial of service (ntpd crash) via a malformed mode configuration directive.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6464.html">CVE-2017-6464</cve>
<bugzilla href="https://bugzilla.suse.com/1030050">SUSE bug 1030050</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009248664" comment="ntp-4.2.8p10-48.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248665" comment="ntp-doc-4.2.8p10-48.15 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-6505" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6505" source="CVE"/>
    <description>
    The ohci_service_ed_list function in hw/usb/hcd-ohci.c in QEMU (aka Quick Emulator) before 2.9.0 allows local guest OS users to cause a denial of service (infinite loop) via vectors involving the number of link endpoint list descriptors, a different vulnerability than CVE-2017-9330.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6505.html">CVE-2017-6505</cve>
<bugzilla href="https://bugzilla.suse.com/1028184">SUSE bug 1028184</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1028235">SUSE bug 1028235</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205626" comment="kvm-1.4.2-53.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205962" comment="xen-4.2.5_21-38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209066" comment="xen-doc-html-4.2.5_21-38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209067" comment="xen-doc-pdf-4.2.5_21-38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205963" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.99-38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205964" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.99-38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205965" comment="xen-libs-4.2.5_21-38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209068" comment="xen-libs-32bit-4.2.5_21-38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209069" comment="xen-tools-4.2.5_21-38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205966" comment="xen-tools-domU-4.2.5_21-38 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205626" comment="kvm-1.4.2-53.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250419" comment="xen-4.2.5_21-40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250420" comment="xen-doc-html-4.2.5_21-40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250421" comment="xen-doc-pdf-4.2.5_21-40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250422" comment="xen-kmp-default-4.2.5_21_3.0.101_0.119.TDC-40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250423" comment="xen-libs-4.2.5_21-40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250424" comment="xen-tools-4.2.5_21-40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250425" comment="xen-tools-domU-4.2.5_21-40 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205962" comment="xen-4.2.5_21-38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209066" comment="xen-doc-html-4.2.5_21-38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209067" comment="xen-doc-pdf-4.2.5_21-38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205963" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.99-38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205965" comment="xen-libs-4.2.5_21-38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209068" comment="xen-libs-32bit-4.2.5_21-38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209069" comment="xen-tools-4.2.5_21-38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205966" comment="xen-tools-domU-4.2.5_21-38 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6508</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-6508" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6508" source="CVE"/>
    <description>
    CRLF injection vulnerability in the url_parse function in url.c in Wget through 1.19.1 allows remote attackers to inject arbitrary HTTP headers via CRLF sequences in the host subcomponent of a URL.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6508.html">CVE-2017-6508</cve>
<bugzilla href="https://bugzilla.suse.com/1028301">SUSE bug 1028301</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210872" comment="wget-1.11.4-1.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203814" comment="wget-openssl1-1.11.4-1.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6512</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-6512" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6512" source="CVE"/>
    <description>
    Race condition in the rmtree and remove_tree functions in the File-Path module before 2.13 for Perl allows attackers to set the mode on arbitrary files via vectors involving directory-permission loosening logic.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6512.html">CVE-2017-6512</cve>
<bugzilla href="https://bugzilla.suse.com/1047178">SUSE bug 1047178</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203240" comment="perl-5.10.0-64.81.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210168" comment="perl-32bit-5.10.0-64.81.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210169" comment="perl-Module-Build-0.2808.01-0.81.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210170" comment="perl-Test-Simple-0.72-0.81.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210171" comment="perl-base-5.10.0-64.81.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210172" comment="perl-doc-5.10.0-64.81.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6827</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-6827" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6827" source="CVE"/>
    <description>
    Heap-based buffer overflow in the MSADPCM::initializeCoefficients function in MSADPCM.cpp in audiofile (aka libaudiofile and Audio File Library) 0.3.6 allows remote attackers to have unspecified impact via a crafted audio file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6827.html">CVE-2017-6827</cve>
<bugzilla href="https://bugzilla.suse.com/1026979">SUSE bug 1026979</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202422" comment="audiofile-0.2.6-142.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209166" comment="audiofile-32bit-0.2.6-142.17 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6828</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-6828" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6828" source="CVE"/>
    <description>
    Heap-based buffer overflow in the readValue function in FileHandle.cpp in audiofile (aka libaudiofile and Audio File Library) 0.3.6 allows remote attackers to have unspecified impact via a crafted WAV file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6828.html">CVE-2017-6828</cve>
<bugzilla href="https://bugzilla.suse.com/1026980">SUSE bug 1026980</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202422" comment="audiofile-0.2.6-142.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209166" comment="audiofile-32bit-0.2.6-142.17 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6829</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-6829" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6829" source="CVE"/>
    <description>
    The decodeSample function in IMA.cpp in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service (crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6829.html">CVE-2017-6829</cve>
<bugzilla href="https://bugzilla.suse.com/1026981">SUSE bug 1026981</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202422" comment="audiofile-0.2.6-142.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209166" comment="audiofile-32bit-0.2.6-142.17 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-6830" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6830" source="CVE"/>
    <description>
    Heap-based buffer overflow in the alaw2linear_buf function in G711.cpp in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service (crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6830.html">CVE-2017-6830</cve>
<bugzilla href="https://bugzilla.suse.com/1026982">SUSE bug 1026982</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202422" comment="audiofile-0.2.6-142.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209166" comment="audiofile-32bit-0.2.6-142.17 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6831</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-6831" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6831" source="CVE"/>
    <description>
    Heap-based buffer overflow in the decodeBlockWAVE function in IMA.cpp in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service (crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6831.html">CVE-2017-6831</cve>
<bugzilla href="https://bugzilla.suse.com/1026983">SUSE bug 1026983</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202422" comment="audiofile-0.2.6-142.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209166" comment="audiofile-32bit-0.2.6-142.17 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176832" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6832</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-6832" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6832" source="CVE"/>
    <description>
    Heap-based buffer overflow in the decodeBlock in MSADPCM.cpp in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service (crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6832.html">CVE-2017-6832</cve>
<bugzilla href="https://bugzilla.suse.com/1026984">SUSE bug 1026984</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202422" comment="audiofile-0.2.6-142.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209166" comment="audiofile-32bit-0.2.6-142.17 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6833</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-6833" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6833" source="CVE"/>
    <description>
    The runPull function in libaudiofile/modules/BlockCodec.cpp in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service (divide-by-zero error and crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6833.html">CVE-2017-6833</cve>
<bugzilla href="https://bugzilla.suse.com/1026985">SUSE bug 1026985</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202422" comment="audiofile-0.2.6-142.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209166" comment="audiofile-32bit-0.2.6-142.17 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6834</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-6834" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6834" source="CVE"/>
    <description>
    Heap-based buffer overflow in the ulaw2linear_buf function in G711.cpp in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service (crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6834.html">CVE-2017-6834</cve>
<bugzilla href="https://bugzilla.suse.com/1026986">SUSE bug 1026986</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202422" comment="audiofile-0.2.6-142.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209166" comment="audiofile-32bit-0.2.6-142.17 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-6835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6835" source="CVE"/>
    <description>
    The reset1 function in libaudiofile/modules/BlockCodec.cpp in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service (divide-by-zero error and crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6835.html">CVE-2017-6835</cve>
<bugzilla href="https://bugzilla.suse.com/1026988">SUSE bug 1026988</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202422" comment="audiofile-0.2.6-142.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209166" comment="audiofile-32bit-0.2.6-142.17 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-6836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6836" source="CVE"/>
    <description>
    Heap-based buffer overflow in the Expand3To4Module::run function in libaudiofile/modules/SimpleModule.h in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service (crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6836.html">CVE-2017-6836</cve>
<bugzilla href="https://bugzilla.suse.com/1026987">SUSE bug 1026987</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202422" comment="audiofile-0.2.6-142.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209166" comment="audiofile-32bit-0.2.6-142.17 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6837</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-6837" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6837" source="CVE"/>
    <description>
    WAVE.cpp in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service (crash) via vectors related to a large number of coefficients.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6837.html">CVE-2017-6837</cve>
<bugzilla href="https://bugzilla.suse.com/1026978">SUSE bug 1026978</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202422" comment="audiofile-0.2.6-142.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209166" comment="audiofile-32bit-0.2.6-142.17 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6838</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-6838" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6838" source="CVE"/>
    <description>
    Integer overflow in sfcommands/sfconvert.c in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service (crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6838.html">CVE-2017-6838</cve>
<bugzilla href="https://bugzilla.suse.com/1026978">SUSE bug 1026978</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202422" comment="audiofile-0.2.6-142.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209166" comment="audiofile-32bit-0.2.6-142.17 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6839</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-6839" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6839" source="CVE"/>
    <description>
    Integer overflow in modules/MSADPCM.cpp in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service (crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6839.html">CVE-2017-6839</cve>
<bugzilla href="https://bugzilla.suse.com/1026978">SUSE bug 1026978</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202422" comment="audiofile-0.2.6-142.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209166" comment="audiofile-32bit-0.2.6-142.17 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6850</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-6850" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6850" source="CVE"/>
    <description>
    The jp2_cdef_destroy function in jp2_cod.c in JasPer before 2.0.13 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted image.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6850.html">CVE-2017-6850</cve>
<bugzilla href="https://bugzilla.suse.com/1021868">SUSE bug 1021868</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202750" comment="jasper-1.900.14-134.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209370" comment="libjasper-1.900.14-134.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209371" comment="libjasper-32bit-1.900.14-134.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6891</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-6891" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6891" source="CVE"/>
    <description>
    Two errors in the "asn1_find_node()" function (lib/parser_aux.c) within GnuTLS libtasn1 version 4.10 can be exploited to cause a stacked-based buffer overflow by tricking a user into processing a specially crafted assignments file via the e.g. asn1Coding utility.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6891.html">CVE-2017-6891</cve>
<bugzilla href="https://bugzilla.suse.com/1040621">SUSE bug 1040621</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1149679">SUSE bug 1149679</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202710" comment="gnutls-2.4.1-24.39.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202713" comment="libgnutls-extra26-2.4.1-24.39.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209325" comment="libgnutls26-2.4.1-24.39.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209326" comment="libgnutls26-32bit-2.4.1-24.39.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254570" comment="libtasn1-1.5-1.35.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254571" comment="libtasn1-3-1.5-1.35.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254572" comment="libtasn1-3-32bit-1.5-1.35.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6951</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-6951" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6951" source="CVE"/>
    <description>
    The keyring_search_aux function in security/keys/keyring.c in the Linux kernel through 3.14.79 allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a request_key system call for the "dead" type.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6951.html">CVE-2017-6951</cve>
<bugzilla href="https://bugzilla.suse.com/1029850">SUSE bug 1029850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1030593">SUSE bug 1030593</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208691" comment="kernel-bigsmp-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208692" comment="kernel-bigsmp-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208693" comment="kernel-bigsmp-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205592" comment="kernel-default-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205593" comment="kernel-default-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205594" comment="kernel-default-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208694" comment="kernel-default-man-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205595" comment="kernel-ec2-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205596" comment="kernel-ec2-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205597" comment="kernel-ec2-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205598" comment="kernel-pae-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205599" comment="kernel-pae-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205600" comment="kernel-pae-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205601" comment="kernel-source-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205602" comment="kernel-syms-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205603" comment="kernel-trace-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205604" comment="kernel-trace-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205605" comment="kernel-trace-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205606" comment="kernel-xen-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205607" comment="kernel-xen-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205608" comment="kernel-xen-devel-3.0.101-0.47.106.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7184</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7184" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7184" source="CVE"/>
    <description>
    The xfrm_replay_verify_len function in net/xfrm/xfrm_user.c in the Linux kernel through 4.10.6 does not validate certain size data after an XFRM_MSG_NEWAE update, which allows local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) by leveraging the CAP_NET_ADMIN capability, as demonstrated during a Pwn2Own competition at CanSecWest 2017 for the Ubuntu 16.10 linux-image-* package 4.8.0.41.52.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7184.html">CVE-2017-7184</cve>
<bugzilla href="https://bugzilla.suse.com/1030573">SUSE bug 1030573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1030575">SUSE bug 1030575</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208691" comment="kernel-bigsmp-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208692" comment="kernel-bigsmp-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208693" comment="kernel-bigsmp-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205592" comment="kernel-default-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205593" comment="kernel-default-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205594" comment="kernel-default-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208694" comment="kernel-default-man-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205595" comment="kernel-ec2-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205596" comment="kernel-ec2-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205597" comment="kernel-ec2-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205598" comment="kernel-pae-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205599" comment="kernel-pae-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205600" comment="kernel-pae-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205601" comment="kernel-source-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205602" comment="kernel-syms-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205603" comment="kernel-trace-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205604" comment="kernel-trace-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205605" comment="kernel-trace-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205606" comment="kernel-xen-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205607" comment="kernel-xen-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205608" comment="kernel-xen-devel-3.0.101-0.47.106.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7187</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7187" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7187" source="CVE"/>
    <description>
    The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel through 4.10.4 allows local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a large command size in an SG_NEXT_CMD_LEN ioctl call, leading to out-of-bounds write access in the sg_write function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7187.html">CVE-2017-7187</cve>
<bugzilla href="https://bugzilla.suse.com/1027179">SUSE bug 1027179</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1030213">SUSE bug 1030213</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208691" comment="kernel-bigsmp-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208692" comment="kernel-bigsmp-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208693" comment="kernel-bigsmp-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205592" comment="kernel-default-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205593" comment="kernel-default-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205594" comment="kernel-default-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208694" comment="kernel-default-man-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205595" comment="kernel-ec2-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205596" comment="kernel-ec2-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205597" comment="kernel-ec2-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205598" comment="kernel-pae-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205599" comment="kernel-pae-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205600" comment="kernel-pae-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205601" comment="kernel-source-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205602" comment="kernel-syms-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205603" comment="kernel-trace-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205604" comment="kernel-trace-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205605" comment="kernel-trace-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205606" comment="kernel-xen-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205607" comment="kernel-xen-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205608" comment="kernel-xen-devel-3.0.101-0.47.106.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7207</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7207" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7207" source="CVE"/>
    <description>
    The mem_get_bits_rectangle function in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted PostScript document.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7207.html">CVE-2017-7207</cve>
<bugzilla href="https://bugzilla.suse.com/1030263">SUSE bug 1030263</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1036453">SUSE bug 1036453</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209272" comment="ghostscript-fonts-other-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209273" comment="ghostscript-fonts-rus-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209274" comment="ghostscript-fonts-std-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202638" comment="ghostscript-library-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209275" comment="ghostscript-omni-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209276" comment="ghostscript-x11-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209277" comment="libgimpprint-4.2.7-32.47.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7228</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-7228" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7228" source="CVE"/>
    <description>
    An issue (known as XSA-212) was discovered in Xen, with fixes available for 4.8.x, 4.7.x, 4.6.x, 4.5.x, and 4.4.x. The earlier XSA-29 fix introduced an insufficient check on XENMEM_exchange input, allowing the caller to drive hypervisor memory accesses outside of the guest provided input/output arrays.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7228.html">CVE-2017-7228</cve>
<bugzilla href="https://bugzilla.suse.com/1030442">SUSE bug 1030442</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205962" comment="xen-4.2.5_21-38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209066" comment="xen-doc-html-4.2.5_21-38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209067" comment="xen-doc-pdf-4.2.5_21-38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205963" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.99-38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205964" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.99-38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205965" comment="xen-libs-4.2.5_21-38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209068" comment="xen-libs-32bit-4.2.5_21-38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209069" comment="xen-tools-4.2.5_21-38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205966" comment="xen-tools-domU-4.2.5_21-38 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205962" comment="xen-4.2.5_21-38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209066" comment="xen-doc-html-4.2.5_21-38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209067" comment="xen-doc-pdf-4.2.5_21-38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205963" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.99-38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205965" comment="xen-libs-4.2.5_21-38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209068" comment="xen-libs-32bit-4.2.5_21-38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209069" comment="xen-tools-4.2.5_21-38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205966" comment="xen-tools-domU-4.2.5_21-38 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250419" comment="xen-4.2.5_21-40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250420" comment="xen-doc-html-4.2.5_21-40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250421" comment="xen-doc-pdf-4.2.5_21-40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250422" comment="xen-kmp-default-4.2.5_21_3.0.101_0.119.TDC-40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250423" comment="xen-libs-4.2.5_21-40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250424" comment="xen-tools-4.2.5_21-40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250425" comment="xen-tools-domU-4.2.5_21-40 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7261</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7261" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7261" source="CVE"/>
    <description>
    The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel through 4.10.5 does not check for a zero value of certain levels data, which allows local users to cause a denial of service (ZERO_SIZE_PTR dereference, and GPF and possibly panic) via a crafted ioctl call for a /dev/dri/renderD* device.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7261.html">CVE-2017-7261</cve>
<bugzilla href="https://bugzilla.suse.com/1027179">SUSE bug 1027179</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1031052">SUSE bug 1031052</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208691" comment="kernel-bigsmp-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208692" comment="kernel-bigsmp-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208693" comment="kernel-bigsmp-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205592" comment="kernel-default-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205593" comment="kernel-default-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205594" comment="kernel-default-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208694" comment="kernel-default-man-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205595" comment="kernel-ec2-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205596" comment="kernel-ec2-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205597" comment="kernel-ec2-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205598" comment="kernel-pae-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205599" comment="kernel-pae-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205600" comment="kernel-pae-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205601" comment="kernel-source-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205602" comment="kernel-syms-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205603" comment="kernel-trace-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205604" comment="kernel-trace-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205605" comment="kernel-trace-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205606" comment="kernel-xen-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205607" comment="kernel-xen-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205608" comment="kernel-xen-devel-3.0.101-0.47.106.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7272</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7272" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7272" source="CVE"/>
    <description>
    PHP through 7.1.11 enables potential SSRF in applications that accept an fsockopen or pfsockopen hostname argument with an expectation that the port number is constrained. Because a :port syntax is recognized, fsockopen will use the port number that is specified in the hostname argument, instead of the port number in the second argument of the function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7272.html">CVE-2017-7272</cve>
<bugzilla href="https://bugzilla.suse.com/1031246">SUSE bug 1031246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044976">SUSE bug 1044976</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210488" comment="apache2-mod_php53-5.3.17-111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203328" comment="php53-5.3.17-111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210489" comment="php53-bcmath-5.3.17-111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210490" comment="php53-bz2-5.3.17-111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210491" comment="php53-calendar-5.3.17-111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210492" comment="php53-ctype-5.3.17-111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210493" comment="php53-curl-5.3.17-111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210494" comment="php53-dba-5.3.17-111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210495" comment="php53-dom-5.3.17-111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210496" comment="php53-exif-5.3.17-111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210497" comment="php53-fastcgi-5.3.17-111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210498" comment="php53-fileinfo-5.3.17-111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210499" comment="php53-ftp-5.3.17-111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210500" comment="php53-gd-5.3.17-111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210501" comment="php53-gettext-5.3.17-111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210502" comment="php53-gmp-5.3.17-111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210503" comment="php53-iconv-5.3.17-111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210504" comment="php53-intl-5.3.17-111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210505" comment="php53-json-5.3.17-111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210506" comment="php53-ldap-5.3.17-111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210507" comment="php53-mbstring-5.3.17-111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210508" comment="php53-mcrypt-5.3.17-111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210509" comment="php53-mysql-5.3.17-111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210510" comment="php53-odbc-5.3.17-111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210511" comment="php53-openssl-5.3.17-111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210512" comment="php53-pcntl-5.3.17-111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210513" comment="php53-pdo-5.3.17-111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210514" comment="php53-pear-5.3.17-111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210515" comment="php53-pgsql-5.3.17-111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210516" comment="php53-pspell-5.3.17-111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210517" comment="php53-shmop-5.3.17-111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210518" comment="php53-snmp-5.3.17-111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210519" comment="php53-soap-5.3.17-111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210520" comment="php53-suhosin-5.3.17-111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210521" comment="php53-sysvmsg-5.3.17-111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210522" comment="php53-sysvsem-5.3.17-111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210523" comment="php53-sysvshm-5.3.17-111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210524" comment="php53-tokenizer-5.3.17-111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210525" comment="php53-wddx-5.3.17-111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210526" comment="php53-xmlreader-5.3.17-111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210527" comment="php53-xmlrpc-5.3.17-111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210528" comment="php53-xmlwriter-5.3.17-111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210529" comment="php53-xsl-5.3.17-111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210530" comment="php53-zip-5.3.17-111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210531" comment="php53-zlib-5.3.17-111 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7273</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7273" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7273" source="CVE"/>
    <description>
    The cp_report_fixup function in drivers/hid/hid-cypress.c in the Linux kernel 4.x before 4.9.4 allows physically proximate attackers to cause a denial of service (integer underflow) or possibly have unspecified other impact via a crafted HID report.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7273.html">CVE-2017-7273</cve>
<bugzilla href="https://bugzilla.suse.com/1031240">SUSE bug 1031240</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009243428" comment="kernel-bigsmp-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243429" comment="kernel-bigsmp-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243430" comment="kernel-bigsmp-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243411" comment="kernel-default-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243412" comment="kernel-default-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243413" comment="kernel-default-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243431" comment="kernel-default-man-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243414" comment="kernel-ec2-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243415" comment="kernel-ec2-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243416" comment="kernel-ec2-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243417" comment="kernel-pae-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243418" comment="kernel-pae-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243419" comment="kernel-pae-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243420" comment="kernel-source-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243421" comment="kernel-syms-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243422" comment="kernel-trace-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243423" comment="kernel-trace-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243424" comment="kernel-trace-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243425" comment="kernel-xen-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243426" comment="kernel-xen-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243427" comment="kernel-xen-devel-3.0.101-0.47.106.59 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7294</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7294" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7294" source="CVE"/>
    <description>
    The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel through 4.10.6 does not validate addition of certain levels data, which allows local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7294.html">CVE-2017-7294</cve>
<bugzilla href="https://bugzilla.suse.com/1027179">SUSE bug 1027179</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1031440">SUSE bug 1031440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1031481">SUSE bug 1031481</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208691" comment="kernel-bigsmp-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208692" comment="kernel-bigsmp-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208693" comment="kernel-bigsmp-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205592" comment="kernel-default-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205593" comment="kernel-default-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205594" comment="kernel-default-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208694" comment="kernel-default-man-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205595" comment="kernel-ec2-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205596" comment="kernel-ec2-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205597" comment="kernel-ec2-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205598" comment="kernel-pae-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205599" comment="kernel-pae-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205600" comment="kernel-pae-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205601" comment="kernel-source-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205602" comment="kernel-syms-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205603" comment="kernel-trace-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205604" comment="kernel-trace-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205605" comment="kernel-trace-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205606" comment="kernel-xen-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205607" comment="kernel-xen-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205608" comment="kernel-xen-devel-3.0.101-0.47.106.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7308</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7308" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7308" source="CVE"/>
    <description>
    The packet_set_ring function in net/packet/af_packet.c in the Linux kernel through 4.10.6 does not properly validate certain block-size data, which allows local users to cause a denial of service (integer signedness error and out-of-bounds write), or gain privileges (if the CAP_NET_RAW capability is held), via crafted system calls.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7308.html">CVE-2017-7308</cve>
<bugzilla href="https://bugzilla.suse.com/1027179">SUSE bug 1027179</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1031579">SUSE bug 1031579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1031660">SUSE bug 1031660</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208691" comment="kernel-bigsmp-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208692" comment="kernel-bigsmp-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208693" comment="kernel-bigsmp-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205592" comment="kernel-default-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205593" comment="kernel-default-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205594" comment="kernel-default-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208694" comment="kernel-default-man-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205595" comment="kernel-ec2-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205596" comment="kernel-ec2-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205597" comment="kernel-ec2-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205598" comment="kernel-pae-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205599" comment="kernel-pae-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205600" comment="kernel-pae-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205601" comment="kernel-source-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205602" comment="kernel-syms-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205603" comment="kernel-trace-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205604" comment="kernel-trace-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205605" comment="kernel-trace-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205606" comment="kernel-xen-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205607" comment="kernel-xen-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205608" comment="kernel-xen-devel-3.0.101-0.47.106.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7375</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7375" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7375" source="CVE"/>
    <description>
    A flaw in libxml2 allows remote XML entity inclusion with default parser flags (i.e., when the caller did not request entity substitution, DTD validation, external DTD subset loading, or default DTD attributes). Depending on the context, this may expose a higher-risk attack surface in libxml2 not usually reachable with default parser flags, and expose content from local files, HTTP, or FTP servers (which might be otherwise unreachable).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7375.html">CVE-2017-7375</cve>
<bugzilla href="https://bugzilla.suse.com/1044894">SUSE bug 1044894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049467">SUSE bug 1049467</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203104" comment="libxml2-2.7.6-0.76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209977" comment="libxml2-32bit-2.7.6-0.76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209978" comment="libxml2-doc-2.7.6-0.76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209979" comment="libxml2-python-2.7.6-0.76 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7376</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7376" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7376" source="CVE"/>
    <description>
    Buffer overflow in libxml2 allows remote attackers to execute arbitrary code by leveraging an incorrect limit for port values when handling redirects.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7376.html">CVE-2017-7376</cve>
<bugzilla href="https://bugzilla.suse.com/1044887">SUSE bug 1044887</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049467">SUSE bug 1049467</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203104" comment="libxml2-2.7.6-0.76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209977" comment="libxml2-32bit-2.7.6-0.76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209978" comment="libxml2-doc-2.7.6-0.76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209979" comment="libxml2-python-2.7.6-0.76 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7407</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7407" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7407" source="CVE"/>
    <description>
    The ourWriteOut function in tool_writeout.c in curl 7.53.1 might allow physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which leads to a heap-based buffer over-read.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7407.html">CVE-2017-7407</cve>
<bugzilla href="https://bugzilla.suse.com/1032309">SUSE bug 1032309</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202483" comment="curl-7.19.7-1.70.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203721" comment="curl-openssl1-7.19.7-1.70.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209204" comment="libcurl4-7.19.7-1.70.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209205" comment="libcurl4-32bit-7.19.7-1.70.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203722" comment="libcurl4-openssl1-7.19.7-1.70.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203723" comment="libcurl4-openssl1-32bit-7.19.7-1.70.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7467</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7467" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7467" source="CVE"/>
    <description>
    A buffer overflow flaw was found in the way minicom before version 2.7.1 handled VT100 escape sequences. A malicious terminal device could potentially use this flaw to crash minicom, or execute arbitrary code in the context of the minicom process.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7467.html">CVE-2017-7467</cve>
<bugzilla href="https://bugzilla.suse.com/1033783">SUSE bug 1033783</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210042" comment="minicom-2.3-27.24.6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7470</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS</platform>
    </affected>
    <reference ref_id="CVE-2017-7470" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7470" source="CVE"/>
    <description>
    It was found that spacewalk-channel can be used by a non-admin user or disabled users to perform administrative tasks due to an incorrect authorization check in backend/server/rhnChannel.py.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7470.html">CVE-2017-7470</cve>
<bugzilla href="https://bugzilla.suse.com/1026633">SUSE bug 1026633</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1057882">SUSE bug 1057882</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009206225" comment="rhnlib-2.5.84.4-8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206226" comment="spacecmd-2.5.5.5-14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206227" comment="spacewalk-backend-2.5.24.9-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206228" comment="spacewalk-backend-libs-2.5.24.9-24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206229" comment="spacewalk-check-2.5.13.8-23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206230" comment="spacewalk-client-setup-2.5.13.8-23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206231" comment="spacewalk-client-tools-2.5.13.8-23 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7471</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7471" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7471" source="CVE"/>
    <description>
    Quick Emulator (Qemu) built with the VirtFS, host directory sharing via Plan 9 File System (9pfs) support, is vulnerable to an improper access control issue. It could occur while accessing files on a shared host directory. A privileged user inside guest could use this flaw to access host file system beyond the shared folder and potentially escalating their privileges on a host.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7471.html">CVE-2017-7471</cve>
<bugzilla href="https://bugzilla.suse.com/1034866">SUSE bug 1034866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1034990">SUSE bug 1034990</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205626" comment="kvm-1.4.2-53.11 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7472</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7472" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7472" source="CVE"/>
    <description>
    The KEYS subsystem in the Linux kernel before 4.10.13 allows local users to cause a denial of service (memory consumption) via a series of KEY_REQKEY_DEFL_THREAD_KEYRING keyctl_set_reqkey_keyring calls.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7472.html">CVE-2017-7472</cve>
<bugzilla href="https://bugzilla.suse.com/1034862">SUSE bug 1034862</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208652" comment="kernel-bigsmp-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208653" comment="kernel-bigsmp-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208654" comment="kernel-bigsmp-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205524" comment="kernel-default-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205525" comment="kernel-default-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205526" comment="kernel-default-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208655" comment="kernel-default-man-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205527" comment="kernel-ec2-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205528" comment="kernel-ec2-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205529" comment="kernel-ec2-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205530" comment="kernel-pae-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205531" comment="kernel-pae-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205532" comment="kernel-pae-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205533" comment="kernel-source-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205534" comment="kernel-syms-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205535" comment="kernel-trace-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205536" comment="kernel-trace-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205537" comment="kernel-trace-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205538" comment="kernel-xen-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205539" comment="kernel-xen-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205540" comment="kernel-xen-devel-3.0.101-0.47.106.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7475</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7475" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7475" source="CVE"/>
    <description>
    Cairo version 1.15.4 is vulnerable to a NULL pointer dereference related to the FT_Load_Glyph and FT_Render_Glyph resulting in an application crash.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7475.html">CVE-2017-7475</cve>
<bugzilla href="https://bugzilla.suse.com/1036789">SUSE bug 1036789</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202469" comment="cairo-1.8.8-2.3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209188" comment="cairo-32bit-1.8.8-2.3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202472" comment="cairo-doc-1.8.8-2.3.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7478</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7478" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7478" source="CVE"/>
    <description>
    OpenVPN version 2.3.12 and newer is vulnerable to unauthenticated Denial of Service of server via received large control packet. Note that this issue is fixed in 2.3.15 and 2.4.2.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7478.html">CVE-2017-7478</cve>
<bugzilla href="https://bugzilla.suse.com/1038709">SUSE bug 1038709</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1038713">SUSE bug 1038713</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205695" comment="openvpn-2.0.9-143.47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205696" comment="openvpn-auth-pam-plugin-2.0.9-143.47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203808" comment="openvpn-openssl1-2.3.2-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203809" comment="openvpn-openssl1-down-root-plugin-2.3.2-0.9 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205695" comment="openvpn-2.0.9-143.47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205696" comment="openvpn-auth-pam-plugin-2.0.9-143.47.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7479</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7479" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7479" source="CVE"/>
    <description>
    OpenVPN versions before 2.3.15 and before 2.4.2 are vulnerable to reachable assertion when packet-ID counter rolls over resulting into Denial of Service of server by authenticated attacker.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7479.html">CVE-2017-7479</cve>
<bugzilla href="https://bugzilla.suse.com/1038711">SUSE bug 1038711</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1038713">SUSE bug 1038713</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205695" comment="openvpn-2.0.9-143.47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205696" comment="openvpn-auth-pam-plugin-2.0.9-143.47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203808" comment="openvpn-openssl1-2.3.2-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203809" comment="openvpn-openssl1-down-root-plugin-2.3.2-0.9 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205695" comment="openvpn-2.0.9-143.47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205696" comment="openvpn-auth-pam-plugin-2.0.9-143.47.3 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7481</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7481" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7481" source="CVE"/>
    <description>
    Ansible before versions 2.3.1.0 and 2.4.0.0 fails to properly mark lookup-plugin results as unsafe. If an attacker could control the results of lookup() calls, they could inject Unicode strings to be parsed by the jinja2 templating system, resulting in code execution. By default, the jinja2 templating language is now marked as 'unsafe' and is not evaluated.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7481.html">CVE-2017-7481</cve>
<bugzilla href="https://bugzilla.suse.com/1038785">SUSE bug 1038785</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249904" comment="ansible-2.2.0.0-10 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7482</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7482" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7482" source="CVE"/>
    <description>
    In the Linux kernel before version 4.12, Kerberos 5 tickets decoded when using the RXRPC keys incorrectly assumes the size of a field. This could lead to the size-remaining variable wrapping and the data pointer going over the end of the buffer. This could possibly lead to memory corruption and possible privilege escalation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7482.html">CVE-2017-7482</cve>
<bugzilla href="https://bugzilla.suse.com/1046107">SUSE bug 1046107</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208691" comment="kernel-bigsmp-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208692" comment="kernel-bigsmp-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208693" comment="kernel-bigsmp-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205592" comment="kernel-default-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205593" comment="kernel-default-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205594" comment="kernel-default-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208694" comment="kernel-default-man-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205595" comment="kernel-ec2-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205596" comment="kernel-ec2-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205597" comment="kernel-ec2-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205598" comment="kernel-pae-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205599" comment="kernel-pae-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205600" comment="kernel-pae-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205601" comment="kernel-source-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205602" comment="kernel-syms-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205603" comment="kernel-trace-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205604" comment="kernel-trace-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205605" comment="kernel-trace-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205606" comment="kernel-xen-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205607" comment="kernel-xen-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205608" comment="kernel-xen-devel-3.0.101-0.47.106.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7484" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7484" source="CVE"/>
    <description>
    It was found that some selectivity estimation functions in PostgreSQL before 9.2.21, 9.3.x before 9.3.17, 9.4.x before 9.4.12, 9.5.x before 9.5.7, and 9.6.x before 9.6.3 did not check user privileges before providing information from pg_statistic, possibly leaking information. An unprivileged attacker could use this flaw to steal some information from tables they are otherwise not allowed to access.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7484.html">CVE-2017-7484</cve>
<bugzilla href="https://bugzilla.suse.com/1037603">SUSE bug 1037603</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1051015">SUSE bug 1051015</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210635" comment="libecpg6-9.4.12-0.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210636" comment="libpq5-9.4.12-0.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210637" comment="libpq5-32bit-9.4.12-0.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210638" comment="postgresql94-9.4.12-0.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210639" comment="postgresql94-contrib-9.4.12-0.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210640" comment="postgresql94-docs-9.4.12-0.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203387" comment="postgresql94-libs-9.4.12-0.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210641" comment="postgresql94-server-9.4.12-0.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7485" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7485" source="CVE"/>
    <description>
    In PostgreSQL 9.3.x before 9.3.17, 9.4.x before 9.4.12, 9.5.x before 9.5.7, and 9.6.x before 9.6.3, it was found that the PGREQUIRESSL environment variable was no longer enforcing a SSL/TLS connection to a PostgreSQL server. An active Man-in-the-Middle attacker could use this flaw to strip the SSL/TLS protection from a connection between a client and a server.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7485.html">CVE-2017-7485</cve>
<bugzilla href="https://bugzilla.suse.com/1038293">SUSE bug 1038293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1051015">SUSE bug 1051015</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210635" comment="libecpg6-9.4.12-0.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210636" comment="libpq5-9.4.12-0.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210637" comment="libpq5-32bit-9.4.12-0.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210638" comment="postgresql94-9.4.12-0.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210639" comment="postgresql94-contrib-9.4.12-0.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210640" comment="postgresql94-docs-9.4.12-0.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203387" comment="postgresql94-libs-9.4.12-0.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210641" comment="postgresql94-server-9.4.12-0.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7486</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7486" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7486" source="CVE"/>
    <description>
    PostgreSQL versions 8.4 - 9.6 are vulnerable to information leak in pg_user_mappings view which discloses foreign server passwords to any user having USAGE privilege on the associated foreign server.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7486.html">CVE-2017-7486</cve>
<bugzilla href="https://bugzilla.suse.com/1037624">SUSE bug 1037624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1051015">SUSE bug 1051015</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1051685">SUSE bug 1051685</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210635" comment="libecpg6-9.4.12-0.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210636" comment="libpq5-9.4.12-0.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210637" comment="libpq5-32bit-9.4.12-0.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210638" comment="postgresql94-9.4.12-0.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210639" comment="postgresql94-contrib-9.4.12-0.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210640" comment="postgresql94-docs-9.4.12-0.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203387" comment="postgresql94-libs-9.4.12-0.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210641" comment="postgresql94-server-9.4.12-0.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7487</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7487" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487" source="CVE"/>
    <description>
    The ipxitf_ioctl function in net/ipx/af_ipx.c in the Linux kernel through 4.11.1 mishandles reference counts, which allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a failed SIOCGIFADDR ioctl call for an IPX interface.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7487.html">CVE-2017-7487</cve>
<bugzilla href="https://bugzilla.suse.com/1038879">SUSE bug 1038879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1038883">SUSE bug 1038883</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1038981">SUSE bug 1038981</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1038982">SUSE bug 1038982</bugzilla>
<bugzilla href="https://bugzilla.suse.com/870618">SUSE bug 870618</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208691" comment="kernel-bigsmp-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208692" comment="kernel-bigsmp-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208693" comment="kernel-bigsmp-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205592" comment="kernel-default-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205593" comment="kernel-default-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205594" comment="kernel-default-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208694" comment="kernel-default-man-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205595" comment="kernel-ec2-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205596" comment="kernel-ec2-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205597" comment="kernel-ec2-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205598" comment="kernel-pae-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205599" comment="kernel-pae-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205600" comment="kernel-pae-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205601" comment="kernel-source-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205602" comment="kernel-syms-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205603" comment="kernel-trace-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205604" comment="kernel-trace-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205605" comment="kernel-trace-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205606" comment="kernel-xen-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205607" comment="kernel-xen-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205608" comment="kernel-xen-devel-3.0.101-0.47.106.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7493</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7493" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7493" source="CVE"/>
    <description>
    Quick Emulator (Qemu) built with the VirtFS, host directory sharing via Plan 9 File System(9pfs) support, is vulnerable to an improper access control issue. It could occur while accessing virtfs metadata files in mapped-file security mode. A guest user could use this flaw to escalate their privileges inside guest.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7493.html">CVE-2017-7493</cve>
<bugzilla href="https://bugzilla.suse.com/1039495">SUSE bug 1039495</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205626" comment="kvm-1.4.2-53.11 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7494</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7494" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7494" source="CVE"/>
    <description>
    Samba since version 3.5.0 and before 4.6.4, 4.5.10 and 4.4.14 is vulnerable to remote code execution vulnerability, allowing a malicious client to upload a shared library to a writable share, and then cause the server to load and execute it.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7494.html">CVE-2017-7494</cve>
<bugzilla href="https://bugzilla.suse.com/1038231">SUSE bug 1038231</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1040816">SUSE bug 1040816</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205903" comment="ldapsmb-1.34b-93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205904" comment="libldb1-3.6.3-93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205905" comment="libsmbclient0-3.6.3-93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209001" comment="libsmbclient0-32bit-3.6.3-93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205906" comment="libtalloc2-3.6.3-93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209002" comment="libtalloc2-32bit-3.6.3-93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205907" comment="libtdb1-3.6.3-93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209003" comment="libtdb1-32bit-3.6.3-93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205908" comment="libtevent0-3.6.3-93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209004" comment="libtevent0-32bit-3.6.3-93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205909" comment="libwbclient0-3.6.3-93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209005" comment="libwbclient0-32bit-3.6.3-93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203502" comment="samba-3.6.3-93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209006" comment="samba-32bit-3.6.3-93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205910" comment="samba-client-3.6.3-93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209007" comment="samba-client-32bit-3.6.3-93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205911" comment="samba-doc-3.6.3-93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205912" comment="samba-krb-printing-3.6.3-93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205913" comment="samba-winbind-3.6.3-93 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209008" comment="samba-winbind-32bit-3.6.3-93 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7508</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7508" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7508" source="CVE"/>
    <description>
    OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to remote denial-of-service when receiving malformed IPv6 packet.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7508.html">CVE-2017-7508</cve>
<bugzilla href="https://bugzilla.suse.com/1044947">SUSE bug 1044947</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205693" comment="openvpn-2.0.9-143.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205694" comment="openvpn-auth-pam-plugin-2.0.9-143.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203808" comment="openvpn-openssl1-2.3.2-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203809" comment="openvpn-openssl1-down-root-plugin-2.3.2-0.9 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205693" comment="openvpn-2.0.9-143.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205694" comment="openvpn-auth-pam-plugin-2.0.9-143.46 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7520</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7520" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7520" source="CVE"/>
    <description>
    OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to denial-of-service and/or possibly sensitive memory leak triggered by man-in-the-middle attacker.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7520.html">CVE-2017-7520</cve>
<bugzilla href="https://bugzilla.suse.com/1044947">SUSE bug 1044947</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203808" comment="openvpn-openssl1-2.3.2-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203809" comment="openvpn-openssl1-down-root-plugin-2.3.2-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7521</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7521" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7521" source="CVE"/>
    <description>
    OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to remote denial-of-service due to memory exhaustion caused by memory leaks and double-free issue in extract_x509_extension().
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7521.html">CVE-2017-7521</cve>
<bugzilla href="https://bugzilla.suse.com/1044947">SUSE bug 1044947</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203808" comment="openvpn-openssl1-2.3.2-0.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203809" comment="openvpn-openssl1-down-root-plugin-2.3.2-0.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7526</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7526" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7526" source="CVE"/>
    <description>
    libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attacker can run arbitrary software on the hardware where the private RSA key is used.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7526.html">CVE-2017-7526</cve>
<bugzilla href="https://bugzilla.suse.com/1046607">SUSE bug 1046607</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1047462">SUSE bug 1047462</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123792">SUSE bug 1123792</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202833" comment="libgcrypt-1.5.0-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209908" comment="libgcrypt11-1.5.0-0.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209909" comment="libgcrypt11-32bit-1.5.0-0.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7533</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7533" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7533" source="CVE"/>
    <description>
    Race condition in the fsnotify implementation in the Linux kernel through 4.12.4 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7533.html">CVE-2017-7533</cve>
<bugzilla href="https://bugzilla.suse.com/1049483">SUSE bug 1049483</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1050677">SUSE bug 1050677</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1050751">SUSE bug 1050751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208691" comment="kernel-bigsmp-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208692" comment="kernel-bigsmp-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208693" comment="kernel-bigsmp-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205592" comment="kernel-default-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205593" comment="kernel-default-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205594" comment="kernel-default-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208694" comment="kernel-default-man-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205595" comment="kernel-ec2-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205596" comment="kernel-ec2-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205597" comment="kernel-ec2-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205598" comment="kernel-pae-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205599" comment="kernel-pae-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205600" comment="kernel-pae-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205601" comment="kernel-source-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205602" comment="kernel-syms-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205603" comment="kernel-trace-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205604" comment="kernel-trace-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205605" comment="kernel-trace-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205606" comment="kernel-xen-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205607" comment="kernel-xen-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205608" comment="kernel-xen-devel-3.0.101-0.47.106.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7542</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7542" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7542" source="CVE"/>
    <description>
    The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel through 4.12.3 allows local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7542.html">CVE-2017-7542</cve>
<bugzilla href="https://bugzilla.suse.com/1049882">SUSE bug 1049882</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1061936">SUSE bug 1061936</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208691" comment="kernel-bigsmp-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208692" comment="kernel-bigsmp-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208693" comment="kernel-bigsmp-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205592" comment="kernel-default-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205593" comment="kernel-default-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205594" comment="kernel-default-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208694" comment="kernel-default-man-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205595" comment="kernel-ec2-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205596" comment="kernel-ec2-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205597" comment="kernel-ec2-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205598" comment="kernel-pae-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205599" comment="kernel-pae-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205600" comment="kernel-pae-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205601" comment="kernel-source-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205602" comment="kernel-syms-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205603" comment="kernel-trace-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205604" comment="kernel-trace-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205605" comment="kernel-trace-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205606" comment="kernel-xen-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205607" comment="kernel-xen-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205608" comment="kernel-xen-devel-3.0.101-0.47.106.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7544</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7544" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7544" source="CVE"/>
    <description>
    libexif through 0.6.21 is vulnerable to out-of-bounds heap read vulnerability in exif_data_save_data_entry function in libexif/exif-data.c caused by improper length computation of the allocated data of an ExifMnote entry which can cause denial-of-service or possibly information disclosure.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7544.html">CVE-2017-7544</cve>
<bugzilla href="https://bugzilla.suse.com/1059893">SUSE bug 1059893</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202828" comment="libexif-0.6.17-2.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209903" comment="libexif-32bit-0.6.17-2.14.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7546</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7546" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7546" source="CVE"/>
    <description>
    PostgreSQL versions before 9.2.22, 9.3.18, 9.4.13, 9.5.8 and 9.6.4 are vulnerable to incorrect authentication flaw allowing remote attackers to gain access to database accounts with an empty password.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7546.html">CVE-2017-7546</cve>
<bugzilla href="https://bugzilla.suse.com/1051684">SUSE bug 1051684</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1054365">SUSE bug 1054365</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1140876">SUSE bug 1140876</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205875" comment="libecpg6-9.4.13-0.23.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205876" comment="libpq5-9.4.13-0.23.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208950" comment="libpq5-32bit-9.4.13-0.23.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205877" comment="postgresql94-9.4.13-0.23.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205878" comment="postgresql94-contrib-9.4.13-0.23.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205879" comment="postgresql94-docs-9.4.13-0.23.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203389" comment="postgresql94-libs-9.4.13-0.23.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205880" comment="postgresql94-server-9.4.13-0.23.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7547" source="CVE"/>
    <description>
    PostgreSQL versions before 9.2.22, 9.3.18, 9.4.13, 9.5.8 and 9.6.4 are vulnerable to authorization flaw allowing remote authenticated attackers to retrieve passwords from the user mappings defined by the foreign server owners without actually having the privileges to do so.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7547.html">CVE-2017-7547</cve>
<bugzilla href="https://bugzilla.suse.com/1051685">SUSE bug 1051685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1054365">SUSE bug 1054365</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1140876">SUSE bug 1140876</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205875" comment="libecpg6-9.4.13-0.23.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205876" comment="libpq5-9.4.13-0.23.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208950" comment="libpq5-32bit-9.4.13-0.23.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205877" comment="postgresql94-9.4.13-0.23.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205878" comment="postgresql94-contrib-9.4.13-0.23.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205879" comment="postgresql94-docs-9.4.13-0.23.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203389" comment="postgresql94-libs-9.4.13-0.23.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205880" comment="postgresql94-server-9.4.13-0.23.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7548</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7548" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7548" source="CVE"/>
    <description>
    PostgreSQL versions before 9.4.13, 9.5.8 and 9.6.4 are vulnerable to authorization flaw allowing remote authenticated attackers with no privileges on a large object to overwrite the entire contents of the object, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7548.html">CVE-2017-7548</cve>
<bugzilla href="https://bugzilla.suse.com/1053259">SUSE bug 1053259</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1054365">SUSE bug 1054365</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1140876">SUSE bug 1140876</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205875" comment="libecpg6-9.4.13-0.23.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205876" comment="libpq5-9.4.13-0.23.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208950" comment="libpq5-32bit-9.4.13-0.23.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205877" comment="postgresql94-9.4.13-0.23.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205878" comment="postgresql94-contrib-9.4.13-0.23.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205879" comment="postgresql94-docs-9.4.13-0.23.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203389" comment="postgresql94-libs-9.4.13-0.23.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205880" comment="postgresql94-server-9.4.13-0.23.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7550</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7550" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7550" source="CVE"/>
    <description>
    A flaw was found in the way Ansible (2.3.x before 2.3.3, and 2.4.x before 2.4.1) passed certain parameters to the jenkins_plugin module. Remote attackers could use this flaw to expose sensitive information from a remote host's logs. This flaw was fixed by not allowing passwords to be specified in the "params" argument, and noting this in the module documentation.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7550.html">CVE-2017-7550</cve>
<bugzilla href="https://bugzilla.suse.com/1035124">SUSE bug 1035124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1065872">SUSE bug 1065872</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009249905" comment="ansible-2.3.2.0-11.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249906" comment="libyaml-0.1.3-0.10.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249907" comment="libyaml-0-2-0.1.3-0.10.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249908" comment="python-Jinja2-2.6-2.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249909" comment="python-PyYAML-3.10-0.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249910" comment="python-ecdsa-0.10-0.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249911" comment="python-paramiko-1.13.1-0.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249912" comment="python-pycrypto-2.6-0.3.2 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7555</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7555" source="CVE"/>
    <description>
    Augeas versions up to and including 1.8.0 are vulnerable to heap-based buffer overflow due to improper handling of escaped strings. Attacker could send crafted strings that would cause the application using augeas to copy past the end of a buffer, leading to a crash or possible code execution.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7555.html">CVE-2017-7555</cve>
<bugzilla href="https://bugzilla.suse.com/1054171">SUSE bug 1054171</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202424" comment="augeas-0.9.0-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209168" comment="augeas-lenses-0.9.0-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209169" comment="libaugeas0-0.9.0-3.21.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7585</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7585" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7585" source="CVE"/>
    <description>
    In libsndfile before 1.0.28, an error in the "flac_buffer_copy()" function (flac.c) can be exploited to cause a stack-based buffer overflow via a specially crafted FLAC file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7585.html">CVE-2017-7585</cve>
<bugzilla href="https://bugzilla.suse.com/1033054">SUSE bug 1033054</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1033914">SUSE bug 1033914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1033915">SUSE bug 1033915</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203051" comment="libsndfile-1.0.20-2.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209928" comment="libsndfile-32bit-1.0.20-2.18 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7593</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7593" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7593" source="CVE"/>
    <description>
    tif_read.c in LibTIFF 4.0.7 does not ensure that tif_rawdata is properly initialized, which might allow remote attackers to obtain sensitive information from process memory via a crafted image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7593.html">CVE-2017-7593</cve>
<bugzilla href="https://bugzilla.suse.com/1033129">SUSE bug 1033129</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210831" comment="libtiff3-3.8.2-141.169.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210832" comment="libtiff3-32bit-3.8.2-141.169.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203579" comment="tiff-3.8.2-141.169.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7595</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7595" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7595" source="CVE"/>
    <description>
    The JPEGSetupEncode function in tiff_jpeg.c in LibTIFF 4.0.7 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7595.html">CVE-2017-7595</cve>
<bugzilla href="https://bugzilla.suse.com/1033111">SUSE bug 1033111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1033127">SUSE bug 1033127</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210831" comment="libtiff3-3.8.2-141.169.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210832" comment="libtiff3-32bit-3.8.2-141.169.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203579" comment="tiff-3.8.2-141.169.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7596</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7596" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7596" source="CVE"/>
    <description>
    LibTIFF 4.0.7 has an "outside the range of representable values of type float" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7596.html">CVE-2017-7596</cve>
<bugzilla href="https://bugzilla.suse.com/1033112">SUSE bug 1033112</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1033113">SUSE bug 1033113</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1033120">SUSE bug 1033120</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1033126">SUSE bug 1033126</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210831" comment="libtiff3-3.8.2-141.169.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210832" comment="libtiff3-32bit-3.8.2-141.169.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203579" comment="tiff-3.8.2-141.169.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7597</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7597" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7597" source="CVE"/>
    <description>
    tif_dirread.c in LibTIFF 4.0.7 has an "outside the range of representable values of type float" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7597.html">CVE-2017-7597</cve>
<bugzilla href="https://bugzilla.suse.com/1033112">SUSE bug 1033112</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1033113">SUSE bug 1033113</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1033120">SUSE bug 1033120</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1033126">SUSE bug 1033126</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210831" comment="libtiff3-3.8.2-141.169.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210832" comment="libtiff3-32bit-3.8.2-141.169.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203579" comment="tiff-3.8.2-141.169.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7599</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7599" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7599" source="CVE"/>
    <description>
    LibTIFF 4.0.7 has an "outside the range of representable values of type short" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7599.html">CVE-2017-7599</cve>
<bugzilla href="https://bugzilla.suse.com/1033112">SUSE bug 1033112</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1033113">SUSE bug 1033113</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1033120">SUSE bug 1033120</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1033126">SUSE bug 1033126</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210831" comment="libtiff3-3.8.2-141.169.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210832" comment="libtiff3-32bit-3.8.2-141.169.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203579" comment="tiff-3.8.2-141.169.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7600</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7600" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7600" source="CVE"/>
    <description>
    LibTIFF 4.0.7 has an "outside the range of representable values of type unsigned char" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7600.html">CVE-2017-7600</cve>
<bugzilla href="https://bugzilla.suse.com/1033112">SUSE bug 1033112</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1033113">SUSE bug 1033113</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1033120">SUSE bug 1033120</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1033126">SUSE bug 1033126</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210831" comment="libtiff3-3.8.2-141.169.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210832" comment="libtiff3-32bit-3.8.2-141.169.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203579" comment="tiff-3.8.2-141.169.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7601</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7601" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7601" source="CVE"/>
    <description>
    LibTIFF 4.0.7 has a "shift exponent too large for 64-bit type long" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7601.html">CVE-2017-7601</cve>
<bugzilla href="https://bugzilla.suse.com/1033111">SUSE bug 1033111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1033127">SUSE bug 1033127</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210831" comment="libtiff3-3.8.2-141.169.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210832" comment="libtiff3-32bit-3.8.2-141.169.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203579" comment="tiff-3.8.2-141.169.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7602</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7602" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7602" source="CVE"/>
    <description>
    LibTIFF 4.0.7 has a signed integer overflow, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7602.html">CVE-2017-7602</cve>
<bugzilla href="https://bugzilla.suse.com/1033109">SUSE bug 1033109</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210831" comment="libtiff3-3.8.2-141.169.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210832" comment="libtiff3-32bit-3.8.2-141.169.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203579" comment="tiff-3.8.2-141.169.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7606</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7606" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7606" source="CVE"/>
    <description>
    coders/rle.c in ImageMagick 7.0.5-4 has an "outside the range of representable values of type unsigned char" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7606.html">CVE-2017-7606</cve>
<bugzilla href="https://bugzilla.suse.com/1033091">SUSE bug 1033091</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202248" comment="ImageMagick-6.4.3.6-7.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209114" comment="libMagickCore1-6.4.3.6-7.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209115" comment="libMagickCore1-32bit-6.4.3.6-7.77 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7607</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7607" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7607" source="CVE"/>
    <description>
    The handle_gnu_hash function in readelf.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7607.html">CVE-2017-7607</cve>
<bugzilla href="https://bugzilla.suse.com/1033084">SUSE bug 1033084</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009256650" comment="elfutils-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256651" comment="libasm1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256652" comment="libasm1-32bit-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256653" comment="libdw1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256654" comment="libdw1-32bit-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256655" comment="libebl1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256656" comment="libebl1-32bit-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256657" comment="libelf1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256658" comment="libelf1-32bit-0.152-4.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7608</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7608" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7608" source="CVE"/>
    <description>
    The ebl_object_note_type_name function in eblobjnotetypename.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7608.html">CVE-2017-7608</cve>
<bugzilla href="https://bugzilla.suse.com/1033085">SUSE bug 1033085</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009256650" comment="elfutils-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256651" comment="libasm1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256652" comment="libasm1-32bit-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256653" comment="libdw1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256654" comment="libdw1-32bit-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256655" comment="libebl1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256656" comment="libebl1-32bit-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256657" comment="libelf1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256658" comment="libelf1-32bit-0.152-4.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7610</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7610" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7610" source="CVE"/>
    <description>
    The check_group function in elflint.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7610.html">CVE-2017-7610</cve>
<bugzilla href="https://bugzilla.suse.com/1033087">SUSE bug 1033087</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009256650" comment="elfutils-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256651" comment="libasm1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256652" comment="libasm1-32bit-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256653" comment="libdw1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256654" comment="libdw1-32bit-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256655" comment="libebl1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256656" comment="libebl1-32bit-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256657" comment="libelf1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256658" comment="libelf1-32bit-0.152-4.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7611</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7611" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7611" source="CVE"/>
    <description>
    The check_symtab_shndx function in elflint.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7611.html">CVE-2017-7611</cve>
<bugzilla href="https://bugzilla.suse.com/1033088">SUSE bug 1033088</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009256650" comment="elfutils-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256651" comment="libasm1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256652" comment="libasm1-32bit-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256653" comment="libdw1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256654" comment="libdw1-32bit-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256655" comment="libebl1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256656" comment="libebl1-32bit-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256657" comment="libelf1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256658" comment="libelf1-32bit-0.152-4.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7612</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7612" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7612" source="CVE"/>
    <description>
    The check_sysv_hash function in elflint.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7612.html">CVE-2017-7612</cve>
<bugzilla href="https://bugzilla.suse.com/1033089">SUSE bug 1033089</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009256650" comment="elfutils-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256651" comment="libasm1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256652" comment="libasm1-32bit-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256653" comment="libdw1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256654" comment="libdw1-32bit-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256655" comment="libebl1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256656" comment="libebl1-32bit-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256657" comment="libelf1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256658" comment="libelf1-32bit-0.152-4.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7613</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7613" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7613" source="CVE"/>
    <description>
    elflint.c in elfutils 0.168 does not validate the number of sections and the number of segments, which allows remote attackers to cause a denial of service (memory consumption) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7613.html">CVE-2017-7613</cve>
<bugzilla href="https://bugzilla.suse.com/1033090">SUSE bug 1033090</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009256650" comment="elfutils-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256651" comment="libasm1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256652" comment="libasm1-32bit-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256653" comment="libdw1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256654" comment="libdw1-32bit-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256655" comment="libebl1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256656" comment="libebl1-32bit-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256657" comment="libelf1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256658" comment="libelf1-32bit-0.152-4.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7616</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7616" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7616" source="CVE"/>
    <description>
    Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c in the Linux kernel through 4.10.9 allows local users to obtain sensitive information from uninitialized stack data by triggering failure of a certain bitmap operation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7616.html">CVE-2017-7616</cve>
<bugzilla href="https://bugzilla.suse.com/1033336">SUSE bug 1033336</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208691" comment="kernel-bigsmp-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208692" comment="kernel-bigsmp-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208693" comment="kernel-bigsmp-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205592" comment="kernel-default-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205593" comment="kernel-default-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205594" comment="kernel-default-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208694" comment="kernel-default-man-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205595" comment="kernel-ec2-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205596" comment="kernel-ec2-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205597" comment="kernel-ec2-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205598" comment="kernel-pae-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205599" comment="kernel-pae-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205600" comment="kernel-pae-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205601" comment="kernel-source-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205602" comment="kernel-syms-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205603" comment="kernel-trace-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205604" comment="kernel-trace-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205605" comment="kernel-trace-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205606" comment="kernel-xen-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205607" comment="kernel-xen-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205608" comment="kernel-xen-devel-3.0.101-0.47.106.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7668</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7668" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7668" source="CVE"/>
    <description>
    The HTTP strict parsing changes added in Apache httpd 2.2.32 and 2.4.24 introduced a bug in token list parsing, which allows ap_find_token() to search past the end of its input string. By maliciously crafting a sequence of request headers, an attacker may be able to cause a segmentation fault, or to force ap_find_token() to return an incorrect value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7668.html">CVE-2017-7668</cve>
<bugzilla href="https://bugzilla.suse.com/1045061">SUSE bug 1045061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049674">SUSE bug 1049674</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1078450">SUSE bug 1078450</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1095150">SUSE bug 1095150</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202407" comment="apache2-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202408" comment="apache2-devel-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202409" comment="apache2-doc-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202410" comment="apache2-example-pages-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202411" comment="apache2-prefork-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202412" comment="apache2-utils-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202413" comment="apache2-worker-2.2.34-70.12 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202407" comment="apache2-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202409" comment="apache2-doc-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202410" comment="apache2-example-pages-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202411" comment="apache2-prefork-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202412" comment="apache2-utils-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202413" comment="apache2-worker-2.2.34-70.12 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7679</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7679" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7679" source="CVE"/>
    <description>
    In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_mime can read one byte past the end of a buffer when sending a malicious Content-Type response header.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7679.html">CVE-2017-7679</cve>
<bugzilla href="https://bugzilla.suse.com/1045060">SUSE bug 1045060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049674">SUSE bug 1049674</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1052635">SUSE bug 1052635</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1057861">SUSE bug 1057861</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1060041">SUSE bug 1060041</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1078450">SUSE bug 1078450</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1095150">SUSE bug 1095150</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202407" comment="apache2-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202408" comment="apache2-devel-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202409" comment="apache2-doc-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202410" comment="apache2-example-pages-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202411" comment="apache2-prefork-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202412" comment="apache2-utils-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202413" comment="apache2-worker-2.2.34-70.12 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202407" comment="apache2-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202409" comment="apache2-doc-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202410" comment="apache2-example-pages-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202411" comment="apache2-prefork-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202412" comment="apache2-utils-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202413" comment="apache2-worker-2.2.34-70.12 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7697</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7697" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7697" source="CVE"/>
    <description>
    In libsamplerate before 0.1.9, a buffer over-read occurs in the calc_output_single function in src_sinc.c via a crafted audio file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7697.html">CVE-2017-7697</cve>
<bugzilla href="https://bugzilla.suse.com/1033564">SUSE bug 1033564</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203047" comment="libsamplerate-0.1.4-3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209924" comment="libsamplerate-32bit-0.1.4-3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7700</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7700" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7700" source="CVE"/>
    <description>
    In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the NetScaler file parser could go into an infinite loop, triggered by a malformed capture file. This was addressed in wiretap/netscaler.c by ensuring a nonzero record size.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7700.html">CVE-2017-7700</cve>
<bugzilla href="https://bugzilla.suse.com/1033936">SUSE bug 1033936</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203586" comment="wireshark-2.0.12-36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203588" comment="wireshark-gtk-2.0.12-36 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7701</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7701" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7701" source="CVE"/>
    <description>
    In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the BGP dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-bgp.c by using a different integer data type.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7701.html">CVE-2017-7701</cve>
<bugzilla href="https://bugzilla.suse.com/1033937">SUSE bug 1033937</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203586" comment="wireshark-2.0.12-36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203588" comment="wireshark-gtk-2.0.12-36 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7702</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7702" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7702" source="CVE"/>
    <description>
    In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the WBXML dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wbxml.c by adding length validation.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7702.html">CVE-2017-7702</cve>
<bugzilla href="https://bugzilla.suse.com/1033938">SUSE bug 1033938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049255">SUSE bug 1049255</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203586" comment="wireshark-2.0.12-36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203588" comment="wireshark-gtk-2.0.12-36 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7703</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7703" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7703" source="CVE"/>
    <description>
    In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the IMAP dissector could crash, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-imap.c by calculating a line's end correctly.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7703.html">CVE-2017-7703</cve>
<bugzilla href="https://bugzilla.suse.com/1033939">SUSE bug 1033939</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203586" comment="wireshark-2.0.12-36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203588" comment="wireshark-gtk-2.0.12-36 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7704</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7704" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7704" source="CVE"/>
    <description>
    In Wireshark 2.2.0 to 2.2.5, the DOF dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-dof.c by using a different integer data type and adjusting a return value.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7704.html">CVE-2017-7704</cve>
<bugzilla href="https://bugzilla.suse.com/1033940">SUSE bug 1033940</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203586" comment="wireshark-2.0.12-36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203588" comment="wireshark-gtk-2.0.12-36 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7705</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7705" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7705" source="CVE"/>
    <description>
    In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the RPC over RDMA dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-rpcrdma.c by correctly checking for going beyond the maximum offset.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7705.html">CVE-2017-7705</cve>
<bugzilla href="https://bugzilla.suse.com/1033941">SUSE bug 1033941</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203586" comment="wireshark-2.0.12-36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203588" comment="wireshark-gtk-2.0.12-36 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7718</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-7718" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7718" source="CVE"/>
    <description>
    hw/display/cirrus_vga_rop.h in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors related to copying VGA data via the cirrus_bitblt_rop_fwd_transp_ and cirrus_bitblt_rop_fwd_ functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7718.html">CVE-2017-7718</cve>
<bugzilla href="https://bugzilla.suse.com/1034908">SUSE bug 1034908</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1034994">SUSE bug 1034994</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205626" comment="kvm-1.4.2-53.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205967" comment="xen-4.2.5_21-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209070" comment="xen-doc-html-4.2.5_21-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209071" comment="xen-doc-pdf-4.2.5_21-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205968" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.99-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205969" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.99-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205970" comment="xen-libs-4.2.5_21-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209072" comment="xen-libs-32bit-4.2.5_21-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209073" comment="xen-tools-4.2.5_21-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205971" comment="xen-tools-domU-4.2.5_21-41 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205626" comment="kvm-1.4.2-53.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250426" comment="xen-4.2.5_21-43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250427" comment="xen-doc-html-4.2.5_21-43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250428" comment="xen-doc-pdf-4.2.5_21-43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250429" comment="xen-kmp-default-4.2.5_21_3.0.101_0.119.TDC-43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250430" comment="xen-libs-4.2.5_21-43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250431" comment="xen-tools-4.2.5_21-43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250432" comment="xen-tools-domU-4.2.5_21-43 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205967" comment="xen-4.2.5_21-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209070" comment="xen-doc-html-4.2.5_21-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209071" comment="xen-doc-pdf-4.2.5_21-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205968" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.99-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205970" comment="xen-libs-4.2.5_21-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209072" comment="xen-libs-32bit-4.2.5_21-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209073" comment="xen-tools-4.2.5_21-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205971" comment="xen-tools-domU-4.2.5_21-41 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7741</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7741" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7741" source="CVE"/>
    <description>
    In libsndfile before 1.0.28, an error in the "flac_buffer_copy()" function (flac.c) can be exploited to cause a segmentation violation (with write memory access) via a specially crafted FLAC file during a resample attempt, a similar issue to CVE-2017-7585.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7741.html">CVE-2017-7741</cve>
<bugzilla href="https://bugzilla.suse.com/1033054">SUSE bug 1033054</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1033915">SUSE bug 1033915</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203051" comment="libsndfile-1.0.20-2.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209928" comment="libsndfile-32bit-1.0.20-2.18 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7742</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7742" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7742" source="CVE"/>
    <description>
    In libsndfile before 1.0.28, an error in the "flac_buffer_copy()" function (flac.c) can be exploited to cause a segmentation violation (with read memory access) via a specially crafted FLAC file during a resample attempt, a similar issue to CVE-2017-7585.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7742.html">CVE-2017-7742</cve>
<bugzilla href="https://bugzilla.suse.com/1033054">SUSE bug 1033054</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1033914">SUSE bug 1033914</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203051" comment="libsndfile-1.0.20-2.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209928" comment="libsndfile-32bit-1.0.20-2.18 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7745" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7745" source="CVE"/>
    <description>
    In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the SIGCOMP dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-sigcomp.c by correcting a memory-size check.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7745.html">CVE-2017-7745</cve>
<bugzilla href="https://bugzilla.suse.com/1033942">SUSE bug 1033942</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203586" comment="wireshark-2.0.12-36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203588" comment="wireshark-gtk-2.0.12-36 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7746</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7746" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7746" source="CVE"/>
    <description>
    In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the SLSK dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-slsk.c by adding checks for the remaining length.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7746.html">CVE-2017-7746</cve>
<bugzilla href="https://bugzilla.suse.com/1033943">SUSE bug 1033943</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203586" comment="wireshark-2.0.12-36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203588" comment="wireshark-gtk-2.0.12-36 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7747</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7747" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7747" source="CVE"/>
    <description>
    In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the PacketBB dissector could crash, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-packetbb.c by restricting additions to the protocol tree.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7747.html">CVE-2017-7747</cve>
<bugzilla href="https://bugzilla.suse.com/1033944">SUSE bug 1033944</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203586" comment="wireshark-2.0.12-36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203588" comment="wireshark-gtk-2.0.12-36 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7748</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7748" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7748" source="CVE"/>
    <description>
    In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the WSP dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wsp.c by adding a length check.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7748.html">CVE-2017-7748</cve>
<bugzilla href="https://bugzilla.suse.com/1033945">SUSE bug 1033945</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203586" comment="wireshark-2.0.12-36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203588" comment="wireshark-gtk-2.0.12-36 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7749</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7749" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7749" source="CVE"/>
    <description>
    A use-after-free vulnerability when using an incorrect URL during the reloading of a docshell. This results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7749.html">CVE-2017-7749</cve>
<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7750</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7750" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7750" source="CVE"/>
    <description>
    A use-after-free vulnerability during video control operations when a "&lt;track&gt;" element holds a reference to an older window if that window has been replaced in the DOM. This results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7750.html">CVE-2017-7750</cve>
<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7751</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7751" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7751" source="CVE"/>
    <description>
    A use-after-free vulnerability with content viewer listeners that results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7751.html">CVE-2017-7751</cve>
<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7752</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7752" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7752" source="CVE"/>
    <description>
    A use-after-free vulnerability during specific user interactions with the input method editor (IME) in some languages due to how events are handled. This results in a potentially exploitable crash but would require specific user interaction to trigger. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7752.html">CVE-2017-7752</cve>
<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7753</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7753" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7753" source="CVE"/>
    <description>
    An out-of-bounds read occurs when applying style rules to pseudo-elements, such as ::first-line, using cached style data. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7753.html">CVE-2017-7753</cve>
<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202365" comment="MozillaFirefox-52.3.0esr-72.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205258" comment="MozillaFirefox-branding-SLED-52-24.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205259" comment="MozillaFirefox-translations-52.3.0esr-72.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7754</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7754" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7754" source="CVE"/>
    <description>
    An out-of-bounds read in WebGL with a maliciously crafted "ImageInfo" object during WebGL operations. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7754.html">CVE-2017-7754</cve>
<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7755</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7755" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7755" source="CVE"/>
    <description>
    The Firefox installer on Windows can be made to load malicious DLL files stored in the same directory as the installer when it is run. This allows privileged execution if the installer is run with elevated privileges. Note: This attack only affects Windows operating systems. Other operating systems are unaffected. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7755.html">CVE-2017-7755</cve>
<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7756</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7756" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7756" source="CVE"/>
    <description>
    A use-after-free and use-after-scope vulnerability when logging errors from headers for XML HTTP Requests (XHR). This could result in a potentially exploitable crash. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7756.html">CVE-2017-7756</cve>
<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7757</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7757" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7757" source="CVE"/>
    <description>
    A use-after-free vulnerability in IndexedDB when one of its objects is destroyed in memory while a method on it is still being executed. This results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7757.html">CVE-2017-7757</cve>
<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7758</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7758" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7758" source="CVE"/>
    <description>
    An out-of-bounds read vulnerability with the Opus encoder when the number of channels in an audio stream changes while the encoder is in use. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7758.html">CVE-2017-7758</cve>
<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7761</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7761" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7761" source="CVE"/>
    <description>
    The Mozilla Maintenance Service "helper.exe" application creates a temporary directory writable by non-privileged users. When this is combined with creation of a junction (a form of symbolic link), protected files in the target directory of the junction can be deleted by the Mozilla Maintenance Service, which has privileged access. Note: This attack requires local system access and only affects Windows. Other operating systems are not affected. This vulnerability affects Firefox ESR &lt; 52.2 and Firefox &lt; 54.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7761.html">CVE-2017-7761</cve>
<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7763</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7763" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7763" source="CVE"/>
    <description>
    Default fonts on OS X display some Tibetan characters as whitespace. When used in the addressbar as part of an IDN this can be used for domain name spoofing attacks. Note: This attack only affects OS X operating systems. Other operating systems are unaffected. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7763.html">CVE-2017-7763</cve>
<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7764</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7764" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7764" source="CVE"/>
    <description>
    Characters from the "Canadian Syllabics" unicode block can be mixed with characters from other unicode blocks in the addressbar instead of being rendered as their raw "punycode" form, allowing for domain name spoofing attacks through character confusion. The current Unicode standard allows characters from "Aspirational Use Scripts" such as Canadian Syllabics to be mixed with Latin characters in the "moderately restrictive" IDN profile. We have changed Firefox behavior to match the upcoming Unicode version 10.0 which removes this category and treats them as "Limited Use Scripts.". This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7764.html">CVE-2017-7764</cve>
<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7765</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7765" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7765" source="CVE"/>
    <description>
    The "Mark of the Web" was not correctly saved on Windows when files with very long names were downloaded from the Internet. Without the Mark of the Web data, the security warning that Windows displays before running executables downloaded from the Internet is not shown. Note: This attack only affects Windows operating systems. Other operating systems are unaffected. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7765.html">CVE-2017-7765</cve>
<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7768</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7768" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7768" source="CVE"/>
    <description>
    The Mozilla Maintenance Service can be invoked by an unprivileged user to read 32 bytes of any arbitrary file on the local system by convincing the service that it is reading a status file provided by the Mozilla Windows Updater. The Mozilla Maintenance Service executes with privileged access, bypassing system protections against unprivileged users. Note: This attack requires local system access and only affects Windows. Other operating systems are not affected. This vulnerability affects Firefox ESR &lt; 52.2 and Firefox &lt; 54.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7768.html">CVE-2017-7768</cve>
<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7778</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7778" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7778" source="CVE"/>
    <description>
    A number of security vulnerabilities in the Graphite 2 library including out-of-bounds reads, buffer overflow reads and writes, and the use of uninitialized memory. These issues were addressed in Graphite 2 version 1.3.10. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7778.html">CVE-2017-7778</cve>
<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202361" comment="MozillaFirefox-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205249" comment="MozillaFirefox-branding-SLED-52-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205250" comment="MozillaFirefox-translations-52.2.0esr-72.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205251" comment="firefox-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205252" comment="firefox-libffi-gcc5-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205253" comment="firefox-libffi4-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205254" comment="firefox-libstdc++6-5.3.1+r233831-7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205255" comment="libfreebl3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208375" comment="libfreebl3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205256" comment="libsoftokn3-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208376" comment="libsoftokn3-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202363" comment="mozilla-nss-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208377" comment="mozilla-nss-32bit-3.29.5-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205257" comment="mozilla-nss-tools-3.29.5-47.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7779</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7779" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7779" source="CVE"/>
    <description>
    Memory safety bugs were reported in Firefox 54, Firefox ESR 52.2, and Thunderbird 52.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7779.html">CVE-2017-7779</cve>
<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202365" comment="MozillaFirefox-52.3.0esr-72.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205258" comment="MozillaFirefox-branding-SLED-52-24.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205259" comment="MozillaFirefox-translations-52.3.0esr-72.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7782</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7782" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7782" source="CVE"/>
    <description>
    An error in the "WindowsDllDetourPatcher" where a RWX ("Read/Write/Execute") 4k block is allocated but never protected, violating DEP protections. Note: This attack only affects Windows operating systems. Other operating systems are not affected. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7782.html">CVE-2017-7782</cve>
<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202365" comment="MozillaFirefox-52.3.0esr-72.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205258" comment="MozillaFirefox-branding-SLED-52-24.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205259" comment="MozillaFirefox-translations-52.3.0esr-72.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7784</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7784" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7784" source="CVE"/>
    <description>
    A use-after-free vulnerability can occur when reading an image observer during frame reconstruction after the observer has been freed. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7784.html">CVE-2017-7784</cve>
<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202365" comment="MozillaFirefox-52.3.0esr-72.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205258" comment="MozillaFirefox-branding-SLED-52-24.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205259" comment="MozillaFirefox-translations-52.3.0esr-72.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7785</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7785" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7785" source="CVE"/>
    <description>
    A buffer overflow can occur when manipulating Accessible Rich Internet Applications (ARIA) attributes within the DOM. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7785.html">CVE-2017-7785</cve>
<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202365" comment="MozillaFirefox-52.3.0esr-72.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205258" comment="MozillaFirefox-branding-SLED-52-24.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205259" comment="MozillaFirefox-translations-52.3.0esr-72.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7786</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7786" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7786" source="CVE"/>
    <description>
    A buffer overflow can occur when the image renderer attempts to paint non-displayable SVG elements. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7786.html">CVE-2017-7786</cve>
<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202365" comment="MozillaFirefox-52.3.0esr-72.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205258" comment="MozillaFirefox-branding-SLED-52-24.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205259" comment="MozillaFirefox-translations-52.3.0esr-72.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7787</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7787" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7787" source="CVE"/>
    <description>
    Same-origin policy protections can be bypassed on pages with embedded iframes during page reloads, allowing the iframes to access content on the top level page, leading to information disclosure. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7787.html">CVE-2017-7787</cve>
<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202365" comment="MozillaFirefox-52.3.0esr-72.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205258" comment="MozillaFirefox-branding-SLED-52-24.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205259" comment="MozillaFirefox-translations-52.3.0esr-72.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7791</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7791" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7791" source="CVE"/>
    <description>
    On pages containing an iframe, the "data:" protocol can be used to create a modal alert that will render over arbitrary domains following page navigation, spoofing of the origin of the modal alert from the iframe content. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7791.html">CVE-2017-7791</cve>
<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202365" comment="MozillaFirefox-52.3.0esr-72.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205258" comment="MozillaFirefox-branding-SLED-52-24.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205259" comment="MozillaFirefox-translations-52.3.0esr-72.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7792</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7792" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7792" source="CVE"/>
    <description>
    A buffer overflow will occur when viewing a certificate in the certificate manager if the certificate has an extremely long object identifier (OID). This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7792.html">CVE-2017-7792</cve>
<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202365" comment="MozillaFirefox-52.3.0esr-72.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205258" comment="MozillaFirefox-branding-SLED-52-24.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205259" comment="MozillaFirefox-translations-52.3.0esr-72.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7793</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7793" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7793" source="CVE"/>
    <description>
    A use-after-free vulnerability can occur in the Fetch API when the worker or the associated window are freed when still in use, resulting in a potentially exploitable crash. This vulnerability affects Firefox &lt; 56, Firefox ESR &lt; 52.4, and Thunderbird &lt; 52.4.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7793.html">CVE-2017-7793</cve>
<bugzilla href="https://bugzilla.suse.com/1060445">SUSE bug 1060445</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202515" comment="MozillaFirefox-52.4.0esr-72.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205324" comment="MozillaFirefox-translations-52.4.0esr-72.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205325" comment="libfreebl3-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208478" comment="libfreebl3-32bit-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205326" comment="libsoftokn3-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208479" comment="libsoftokn3-32bit-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202517" comment="mozilla-nss-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208480" comment="mozilla-nss-32bit-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205327" comment="mozilla-nss-tools-3.29.5-47.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7798</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7798" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7798" source="CVE"/>
    <description>
    The Developer Tools feature suffers from a XUL injection vulnerability due to improper sanitization of the web page source code. In the worst case, this could allow arbitrary code execution when opening a malicious page with the style editor tool. This vulnerability affects Firefox ESR &lt; 52.3 and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7798.html">CVE-2017-7798</cve>
<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202365" comment="MozillaFirefox-52.3.0esr-72.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205258" comment="MozillaFirefox-branding-SLED-52-24.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205259" comment="MozillaFirefox-translations-52.3.0esr-72.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7800" source="CVE"/>
    <description>
    A use-after-free vulnerability can occur in WebSockets when the object holding the connection is freed before the disconnection operation is finished. This results in an exploitable crash. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7800.html">CVE-2017-7800</cve>
<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202365" comment="MozillaFirefox-52.3.0esr-72.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205258" comment="MozillaFirefox-branding-SLED-52-24.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205259" comment="MozillaFirefox-translations-52.3.0esr-72.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7801</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7801" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7801" source="CVE"/>
    <description>
    A use-after-free vulnerability can occur while re-computing layout for a "marquee" element during window resizing where the updated style object is freed while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7801.html">CVE-2017-7801</cve>
<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202365" comment="MozillaFirefox-52.3.0esr-72.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205258" comment="MozillaFirefox-branding-SLED-52-24.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205259" comment="MozillaFirefox-translations-52.3.0esr-72.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7802</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7802" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7802" source="CVE"/>
    <description>
    A use-after-free vulnerability can occur when manipulating the DOM during the resize event of an image element. If these elements have been freed due to a lack of strong references, a potentially exploitable crash may occur when the freed elements are accessed. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7802.html">CVE-2017-7802</cve>
<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202365" comment="MozillaFirefox-52.3.0esr-72.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205258" comment="MozillaFirefox-branding-SLED-52-24.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205259" comment="MozillaFirefox-translations-52.3.0esr-72.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7803</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7803" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7803" source="CVE"/>
    <description>
    When a page's content security policy (CSP) header contains a "sandbox" directive, other directives are ignored. This results in the incorrect enforcement of CSP. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7803.html">CVE-2017-7803</cve>
<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202365" comment="MozillaFirefox-52.3.0esr-72.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205258" comment="MozillaFirefox-branding-SLED-52-24.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205259" comment="MozillaFirefox-translations-52.3.0esr-72.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7804</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7804" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7804" source="CVE"/>
    <description>
    The destructor function for the "WindowsDllDetourPatcher" class can be re-purposed by malicious code in concert with another vulnerability to write arbitrary data to an attacker controlled location in memory. This can be used to bypass existing memory protections in this situation. Note: This attack only affects Windows operating systems. Other operating systems are not affected. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7804.html">CVE-2017-7804</cve>
<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202365" comment="MozillaFirefox-52.3.0esr-72.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205258" comment="MozillaFirefox-branding-SLED-52-24.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205259" comment="MozillaFirefox-translations-52.3.0esr-72.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7805" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7805" source="CVE"/>
    <description>
    During TLS 1.2 exchanges, handshake hashes are generated which point to a message buffer. This saved data is used for later messages but in some cases, the handshake transcript can exceed the space available in the current buffer, causing the allocation of a new buffer. This leaves a pointer pointing to the old, freed buffer, resulting in a use-after-free when handshake hashes are then calculated afterwards. This can result in a potentially exploitable crash. This vulnerability affects Firefox &lt; 56, Firefox ESR &lt; 52.4, and Thunderbird &lt; 52.4.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7805.html">CVE-2017-7805</cve>
<bugzilla href="https://bugzilla.suse.com/1060445">SUSE bug 1060445</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1061005">SUSE bug 1061005</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202515" comment="MozillaFirefox-52.4.0esr-72.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205324" comment="MozillaFirefox-translations-52.4.0esr-72.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205325" comment="libfreebl3-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208478" comment="libfreebl3-32bit-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205326" comment="libsoftokn3-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208479" comment="libsoftokn3-32bit-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202517" comment="mozilla-nss-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208480" comment="mozilla-nss-32bit-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205327" comment="mozilla-nss-tools-3.29.5-47.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7807</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7807" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7807" source="CVE"/>
    <description>
    A mechanism that uses AppCache to hijack a URL in a domain using fallback by serving the files from a sub-path on the domain. This has been addressed by requiring fallback files be inside the manifest directory. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7807.html">CVE-2017-7807</cve>
<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202365" comment="MozillaFirefox-52.3.0esr-72.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205258" comment="MozillaFirefox-branding-SLED-52-24.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205259" comment="MozillaFirefox-translations-52.3.0esr-72.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7810</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7810" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7810" source="CVE"/>
    <description>
    Memory safety bugs were reported in Firefox 55 and Firefox ESR 52.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 56, Firefox ESR &lt; 52.4, and Thunderbird &lt; 52.4.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7810.html">CVE-2017-7810</cve>
<bugzilla href="https://bugzilla.suse.com/1060445">SUSE bug 1060445</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202515" comment="MozillaFirefox-52.4.0esr-72.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205324" comment="MozillaFirefox-translations-52.4.0esr-72.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205325" comment="libfreebl3-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208478" comment="libfreebl3-32bit-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205326" comment="libsoftokn3-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208479" comment="libsoftokn3-32bit-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202517" comment="mozilla-nss-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208480" comment="mozilla-nss-32bit-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205327" comment="mozilla-nss-tools-3.29.5-47.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7814" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7814" source="CVE"/>
    <description>
    File downloads encoded with "blob:" and "data:" URL elements bypassed normal file download checks though the Phishing and Malware Protection feature and its block lists of suspicious sites and files. This would allow malicious sites to lure users into downloading executables that would otherwise be detected as suspicious. This vulnerability affects Firefox &lt; 56, Firefox ESR &lt; 52.4, and Thunderbird &lt; 52.4.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7814.html">CVE-2017-7814</cve>
<bugzilla href="https://bugzilla.suse.com/1060445">SUSE bug 1060445</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202515" comment="MozillaFirefox-52.4.0esr-72.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205324" comment="MozillaFirefox-translations-52.4.0esr-72.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205325" comment="libfreebl3-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208478" comment="libfreebl3-32bit-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205326" comment="libsoftokn3-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208479" comment="libsoftokn3-32bit-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202517" comment="mozilla-nss-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208480" comment="mozilla-nss-32bit-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205327" comment="mozilla-nss-tools-3.29.5-47.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7818</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7818" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7818" source="CVE"/>
    <description>
    A use-after-free vulnerability can occur when manipulating arrays of Accessible Rich Internet Applications (ARIA) elements within containers through the DOM. This results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 56, Firefox ESR &lt; 52.4, and Thunderbird &lt; 52.4.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7818.html">CVE-2017-7818</cve>
<bugzilla href="https://bugzilla.suse.com/1060445">SUSE bug 1060445</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202515" comment="MozillaFirefox-52.4.0esr-72.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205324" comment="MozillaFirefox-translations-52.4.0esr-72.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205325" comment="libfreebl3-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208478" comment="libfreebl3-32bit-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205326" comment="libsoftokn3-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208479" comment="libsoftokn3-32bit-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202517" comment="mozilla-nss-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208480" comment="mozilla-nss-32bit-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205327" comment="mozilla-nss-tools-3.29.5-47.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7819</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7819" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7819" source="CVE"/>
    <description>
    A use-after-free vulnerability can occur in design mode when image objects are resized if objects referenced during the resizing have been freed from memory. This results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 56, Firefox ESR &lt; 52.4, and Thunderbird &lt; 52.4.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7819.html">CVE-2017-7819</cve>
<bugzilla href="https://bugzilla.suse.com/1060445">SUSE bug 1060445</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202515" comment="MozillaFirefox-52.4.0esr-72.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205324" comment="MozillaFirefox-translations-52.4.0esr-72.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205325" comment="libfreebl3-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208478" comment="libfreebl3-32bit-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205326" comment="libsoftokn3-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208479" comment="libsoftokn3-32bit-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202517" comment="mozilla-nss-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208480" comment="mozilla-nss-32bit-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205327" comment="mozilla-nss-tools-3.29.5-47.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7823</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7823" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7823" source="CVE"/>
    <description>
    The content security policy (CSP) "sandbox" directive did not create a unique origin for the document, causing it to behave as if the "allow-same-origin" keyword were always specified. This could allow a Cross-Site Scripting (XSS) attack to be launched from unsafe content. This vulnerability affects Firefox &lt; 56, Firefox ESR &lt; 52.4, and Thunderbird &lt; 52.4.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7823.html">CVE-2017-7823</cve>
<bugzilla href="https://bugzilla.suse.com/1060445">SUSE bug 1060445</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202515" comment="MozillaFirefox-52.4.0esr-72.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205324" comment="MozillaFirefox-translations-52.4.0esr-72.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205325" comment="libfreebl3-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208478" comment="libfreebl3-32bit-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205326" comment="libsoftokn3-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208479" comment="libsoftokn3-32bit-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202517" comment="mozilla-nss-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208480" comment="mozilla-nss-32bit-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205327" comment="mozilla-nss-tools-3.29.5-47.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7824</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7824" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7824" source="CVE"/>
    <description>
    A buffer overflow occurs when drawing and validating elements with the ANGLE graphics library, used for WebGL content. This is due to an incorrect value being passed within the library during checks and results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 56, Firefox ESR &lt; 52.4, and Thunderbird &lt; 52.4.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7824.html">CVE-2017-7824</cve>
<bugzilla href="https://bugzilla.suse.com/1060445">SUSE bug 1060445</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202515" comment="MozillaFirefox-52.4.0esr-72.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205324" comment="MozillaFirefox-translations-52.4.0esr-72.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205325" comment="libfreebl3-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208478" comment="libfreebl3-32bit-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205326" comment="libsoftokn3-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208479" comment="libsoftokn3-32bit-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202517" comment="mozilla-nss-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208480" comment="mozilla-nss-32bit-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205327" comment="mozilla-nss-tools-3.29.5-47.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7825</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7825" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7825" source="CVE"/>
    <description>
    Several fonts on OS X display some Tibetan and Arabic characters as whitespace. When used in the addressbar as part of an IDN this can be used for domain name spoofing attacks. Note: This attack only affects OS X operating systems. Other operating systems are unaffected. This vulnerability affects Firefox &lt; 56, Firefox ESR &lt; 52.4, and Thunderbird &lt; 52.4.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7825.html">CVE-2017-7825</cve>
<bugzilla href="https://bugzilla.suse.com/1060445">SUSE bug 1060445</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202515" comment="MozillaFirefox-52.4.0esr-72.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205324" comment="MozillaFirefox-translations-52.4.0esr-72.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205325" comment="libfreebl3-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208478" comment="libfreebl3-32bit-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205326" comment="libsoftokn3-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208479" comment="libsoftokn3-32bit-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202517" comment="mozilla-nss-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208480" comment="mozilla-nss-32bit-3.29.5-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205327" comment="mozilla-nss-tools-3.29.5-47.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7826</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7826" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7826" source="CVE"/>
    <description>
    Memory safety bugs were reported in Firefox 56 and Firefox ESR 52.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 57, Firefox ESR &lt; 52.5, and Thunderbird &lt; 52.5.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7826.html">CVE-2017-7826</cve>
<bugzilla href="https://bugzilla.suse.com/1068101">SUSE bug 1068101</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202367" comment="MozillaFirefox-52.5.0esr-72.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205260" comment="MozillaFirefox-translations-52.5.0esr-72.17 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7828</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7828" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7828" source="CVE"/>
    <description>
    A use-after-free vulnerability can occur when flushing and resizing layout because the "PressShell" object has been freed while still in use. This results in a potentially exploitable crash during these operations. This vulnerability affects Firefox &lt; 57, Firefox ESR &lt; 52.5, and Thunderbird &lt; 52.5.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7828.html">CVE-2017-7828</cve>
<bugzilla href="https://bugzilla.suse.com/1068101">SUSE bug 1068101</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202367" comment="MozillaFirefox-52.5.0esr-72.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205260" comment="MozillaFirefox-translations-52.5.0esr-72.17 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7830" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7830" source="CVE"/>
    <description>
    The Resource Timing API incorrectly revealed navigations in cross-origin iframes. This is a same-origin policy violation and could allow for data theft of URLs loaded by users. This vulnerability affects Firefox &lt; 57, Firefox ESR &lt; 52.5, and Thunderbird &lt; 52.5.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7830.html">CVE-2017-7830</cve>
<bugzilla href="https://bugzilla.suse.com/1068101">SUSE bug 1068101</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202367" comment="MozillaFirefox-52.5.0esr-72.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205260" comment="MozillaFirefox-translations-52.5.0esr-72.17 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7867</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7867" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7867" source="CVE"/>
    <description>
    International Components for Unicode (ICU) for C/C++ before 2017-02-13 has an out-of-bounds write caused by a heap-based buffer overflow related to the utf8TextAccess function in common/utext.cpp and the utext_setNativeIndex* function.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7867.html">CVE-2017-7867</cve>
<bugzilla href="https://bugzilla.suse.com/1034678">SUSE bug 1034678</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123121">SUSE bug 1123121</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202740" comment="icu-4.0-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209360" comment="libicu-4.0-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202741" comment="libicu-32bit-4.0-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209361" comment="libicu-doc-4.0-47.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7868</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7868" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7868" source="CVE"/>
    <description>
    International Components for Unicode (ICU) for C/C++ before 2017-02-13 has an out-of-bounds write caused by a heap-based buffer overflow related to the utf8TextAccess function in common/utext.cpp and the utext_moveIndex32* function.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7868.html">CVE-2017-7868</cve>
<bugzilla href="https://bugzilla.suse.com/1034674">SUSE bug 1034674</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123121">SUSE bug 1123121</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202740" comment="icu-4.0-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209360" comment="libicu-4.0-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202741" comment="libicu-32bit-4.0-47.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209361" comment="libicu-doc-4.0-47.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7869</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7869" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7869" source="CVE"/>
    <description>
    GnuTLS before 2017-02-20 has an out-of-bounds write caused by an integer overflow and heap-based buffer overflow related to the cdk_pkt_read function in opencdk/read-packet.c. This issue (which is a subset of the vendor's GNUTLS-SA-2017-3 report) is fixed in 3.5.10.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7869.html">CVE-2017-7869</cve>
<bugzilla href="https://bugzilla.suse.com/1034173">SUSE bug 1034173</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1038337">SUSE bug 1038337</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1149679">SUSE bug 1149679</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202710" comment="gnutls-2.4.1-24.39.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202713" comment="libgnutls-extra26-2.4.1-24.39.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209325" comment="libgnutls26-2.4.1-24.39.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209326" comment="libgnutls26-32bit-2.4.1-24.39.70 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7890</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7890" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7890" source="CVE"/>
    <description>
    The GIF decoding function gdImageCreateFromGifCtx in gd_gif_in.c in the GD Graphics Library (aka libgd), as used in PHP before 5.6.31 and 7.x before 7.1.7, does not zero colorMap arrays before use. A specially crafted GIF image could use the uninitialized tables to read ~700 bytes from the top of the stack, potentially disclosing sensitive information.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7890.html">CVE-2017-7890</cve>
<bugzilla href="https://bugzilla.suse.com/1050241">SUSE bug 1050241</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210532" comment="apache2-mod_php53-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203336" comment="php53-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210533" comment="php53-bcmath-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210534" comment="php53-bz2-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210535" comment="php53-calendar-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210536" comment="php53-ctype-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210537" comment="php53-curl-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210538" comment="php53-dba-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210539" comment="php53-dom-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210540" comment="php53-exif-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210541" comment="php53-fastcgi-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210542" comment="php53-fileinfo-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210543" comment="php53-ftp-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210544" comment="php53-gd-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210545" comment="php53-gettext-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210546" comment="php53-gmp-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210547" comment="php53-iconv-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210548" comment="php53-intl-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210549" comment="php53-json-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210550" comment="php53-ldap-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210551" comment="php53-mbstring-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210552" comment="php53-mcrypt-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210553" comment="php53-mysql-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210554" comment="php53-odbc-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210555" comment="php53-openssl-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210556" comment="php53-pcntl-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210557" comment="php53-pdo-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210558" comment="php53-pear-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210559" comment="php53-pgsql-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210560" comment="php53-pspell-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210561" comment="php53-shmop-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210562" comment="php53-snmp-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210563" comment="php53-soap-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210564" comment="php53-suhosin-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210565" comment="php53-sysvmsg-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210566" comment="php53-sysvsem-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210567" comment="php53-sysvshm-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210568" comment="php53-tokenizer-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210569" comment="php53-wddx-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210570" comment="php53-xmlreader-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210571" comment="php53-xmlrpc-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210572" comment="php53-xmlwriter-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210573" comment="php53-xsl-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210574" comment="php53-zip-5.3.17-112.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210575" comment="php53-zlib-5.3.17-112.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7941</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7941" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7941" source="CVE"/>
    <description>
    The ReadSGIImage function in sgi.c in ImageMagick 7.0.5-4 allows remote attackers to consume an amount of available memory via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7941.html">CVE-2017-7941</cve>
<bugzilla href="https://bugzilla.suse.com/1034876">SUSE bug 1034876</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202248" comment="ImageMagick-6.4.3.6-7.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209114" comment="libMagickCore1-6.4.3.6-7.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209115" comment="libMagickCore1-32bit-6.4.3.6-7.77 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7942</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7942" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7942" source="CVE"/>
    <description>
    The ReadAVSImage function in avs.c in ImageMagick 7.0.5-4 allows remote attackers to consume an amount of available memory via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7942.html">CVE-2017-7942</cve>
<bugzilla href="https://bugzilla.suse.com/1034872">SUSE bug 1034872</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202248" comment="ImageMagick-6.4.3.6-7.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209114" comment="libMagickCore1-6.4.3.6-7.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209115" comment="libMagickCore1-32bit-6.4.3.6-7.77 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177943" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7943</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7943" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7943" source="CVE"/>
    <description>
    The ReadSVGImage function in svg.c in ImageMagick 7.0.5-4 allows remote attackers to consume an amount of available memory via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7943.html">CVE-2017-7943</cve>
<bugzilla href="https://bugzilla.suse.com/1034870">SUSE bug 1034870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1036985">SUSE bug 1036985</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202248" comment="ImageMagick-6.4.3.6-7.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209114" comment="libMagickCore1-6.4.3.6-7.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209115" comment="libMagickCore1-32bit-6.4.3.6-7.77 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7960</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7960" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7960" source="CVE"/>
    <description>
    The cr_input_new_from_uri function in cr-input.c in libcroco 0.6.11 and 0.6.12 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted CSS file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7960.html">CVE-2017-7960</cve>
<bugzilla href="https://bugzilla.suse.com/1034481">SUSE bug 1034481</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009256846" comment="libcroco-0.6.1-122.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256847" comment="libcroco-0_6-3-0.6.1-122.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256848" comment="libcroco-0_6-3-32bit-0.6.1-122.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7961</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-7961" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7961" source="CVE"/>
    <description>
    ** DISPUTED ** The cr_tknzr_parse_rgb function in cr-tknzr.c in libcroco 0.6.11 and 0.6.12 has an "outside the range of representable values of type long" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted CSS file. NOTE: third-party analysis reports "This is not a security issue in my view. The conversion surely is truncating the double into a long value, but there is no impact as the value is one of the RGB components."
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7961.html">CVE-2017-7961</cve>
<bugzilla href="https://bugzilla.suse.com/1034482">SUSE bug 1034482</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1132069">SUSE bug 1132069</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009256846" comment="libcroco-0.6.1-122.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256847" comment="libcroco-0_6-3-0.6.1-122.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256848" comment="libcroco-0_6-3-32bit-0.6.1-122.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7980</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-7980" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7980" source="CVE"/>
    <description>
    Heap-based buffer overflow in Cirrus CLGD 54xx VGA Emulator in Quick Emulator (Qemu) 2.8 and earlier allows local guest OS users to execute arbitrary code or cause a denial of service (crash) via vectors related to a VNC client updating its display after a VGA operation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7980.html">CVE-2017-7980</cve>
<bugzilla href="https://bugzilla.suse.com/1035406">SUSE bug 1035406</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1035483">SUSE bug 1035483</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205626" comment="kvm-1.4.2-53.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205967" comment="xen-4.2.5_21-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209070" comment="xen-doc-html-4.2.5_21-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209071" comment="xen-doc-pdf-4.2.5_21-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205968" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.99-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205969" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.99-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205970" comment="xen-libs-4.2.5_21-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209072" comment="xen-libs-32bit-4.2.5_21-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209073" comment="xen-tools-4.2.5_21-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205971" comment="xen-tools-domU-4.2.5_21-41 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205626" comment="kvm-1.4.2-53.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250426" comment="xen-4.2.5_21-43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250427" comment="xen-doc-html-4.2.5_21-43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250428" comment="xen-doc-pdf-4.2.5_21-43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250429" comment="xen-kmp-default-4.2.5_21_3.0.101_0.119.TDC-43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250430" comment="xen-libs-4.2.5_21-43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250431" comment="xen-tools-4.2.5_21-43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250432" comment="xen-tools-domU-4.2.5_21-43 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205967" comment="xen-4.2.5_21-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209070" comment="xen-doc-html-4.2.5_21-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209071" comment="xen-doc-pdf-4.2.5_21-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205968" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.99-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205970" comment="xen-libs-4.2.5_21-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209072" comment="xen-libs-32bit-4.2.5_21-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209073" comment="xen-tools-4.2.5_21-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205971" comment="xen-tools-domU-4.2.5_21-41 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7995</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-7995" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7995" source="CVE"/>
    <description>
    Xen PV guest before Xen 4.3 checked access permissions to MMIO ranges only after accessing them, allowing host PCI device space memory reads, leading to information disclosure. This is an error in the get_user function. NOTE: the upstream Xen Project considers versions before 4.5.x to be EOL.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7995.html">CVE-2017-7995</cve>
<bugzilla href="https://bugzilla.suse.com/1033948">SUSE bug 1033948</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205967" comment="xen-4.2.5_21-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209070" comment="xen-doc-html-4.2.5_21-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209071" comment="xen-doc-pdf-4.2.5_21-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205968" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.99-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205969" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.99-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205970" comment="xen-libs-4.2.5_21-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209072" comment="xen-libs-32bit-4.2.5_21-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209073" comment="xen-tools-4.2.5_21-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205971" comment="xen-tools-domU-4.2.5_21-41 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205967" comment="xen-4.2.5_21-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209070" comment="xen-doc-html-4.2.5_21-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209071" comment="xen-doc-pdf-4.2.5_21-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205968" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.99-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205970" comment="xen-libs-4.2.5_21-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209072" comment="xen-libs-32bit-4.2.5_21-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209073" comment="xen-tools-4.2.5_21-41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205971" comment="xen-tools-domU-4.2.5_21-41 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250426" comment="xen-4.2.5_21-43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250427" comment="xen-doc-html-4.2.5_21-43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250428" comment="xen-doc-pdf-4.2.5_21-43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250429" comment="xen-kmp-default-4.2.5_21_3.0.101_0.119.TDC-43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250430" comment="xen-libs-4.2.5_21-43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250431" comment="xen-tools-4.2.5_21-43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250432" comment="xen-tools-domU-4.2.5_21-43 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8086</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-8086" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8086" source="CVE"/>
    <description>
    Memory leak in the v9fs_list_xattr function in hw/9pfs/9p-xattr.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (memory consumption) via vectors involving the orig_value variable.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-8086.html">CVE-2017-8086</cve>
<bugzilla href="https://bugzilla.suse.com/1035950">SUSE bug 1035950</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205626" comment="kvm-1.4.2-53.11 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8105</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-8105" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105" source="CVE"/>
    <description>
    FreeType 2 before 2017-03-24 has an out-of-bounds write caused by a heap-based buffer overflow related to the t1_decoder_parse_charstrings function in psaux/t1decode.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-8105.html">CVE-2017-8105</cve>
<bugzilla href="https://bugzilla.suse.com/1034186">SUSE bug 1034186</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1035807">SUSE bug 1035807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1036457">SUSE bug 1036457</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1079459">SUSE bug 1079459</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202531" comment="freetype2-2.3.7-25.45.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209251" comment="freetype2-32bit-2.3.7-25.45.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209253" comment="ft2demos-2.3.7-25.45.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8109</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS</platform>
    </affected>
    <reference ref_id="CVE-2017-8109" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8109" source="CVE"/>
    <description>
    The salt-ssh minion code in SaltStack Salt 2016.11 before 2016.11.4 copied over configuration from the Salt Master without adjusting permissions, which might leak credentials to local attackers on configured minions (clients).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-8109.html">CVE-2017-8109</cve>
<bugzilla href="https://bugzilla.suse.com/1035912">SUSE bug 1035912</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009206239" comment="salt-2016.11.4-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206240" comment="salt-doc-2016.11.4-42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206241" comment="salt-minion-2016.11.4-42 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8287</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-8287" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287" source="CVE"/>
    <description>
    FreeType 2 before 2017-03-26 has an out-of-bounds write caused by a heap-based buffer overflow related to the t1_builder_close_contour function in psaux/psobjs.c.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-8287.html">CVE-2017-8287</cve>
<bugzilla href="https://bugzilla.suse.com/1034186">SUSE bug 1034186</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1035807">SUSE bug 1035807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1036457">SUSE bug 1036457</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1079459">SUSE bug 1079459</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202531" comment="freetype2-2.3.7-25.45.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209251" comment="freetype2-32bit-2.3.7-25.45.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209253" comment="ft2demos-2.3.7-25.45.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8291</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
            <platform>SUSE OpenStack Cloud 5</platform>
    </affected>
    <reference ref_id="CVE-2017-8291" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8291" source="CVE"/>
    <description>
    Artifex Ghostscript through 2017-04-26 allows -dSAFER bypass and remote command execution via .rsdparams type confusion with a "/OutputFile (%pipe%" substring in a crafted .eps document that is an input to the gs program, as exploited in the wild in April 2017.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-8291.html">CVE-2017-8291</cve>
<bugzilla href="https://bugzilla.suse.com/1036453">SUSE bug 1036453</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009175222" comment="SUSE OpenStack Cloud 5 is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205342" comment="ghostscript-fonts-other-8.62-32.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205343" comment="ghostscript-fonts-rus-8.62-32.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205344" comment="ghostscript-fonts-std-8.62-32.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202634" comment="ghostscript-library-8.62-32.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205345" comment="ghostscript-omni-8.62-32.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205346" comment="ghostscript-x11-8.62-32.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205347" comment="libgimpprint-4.2.7-32.46 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8309</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-8309" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8309" source="CVE"/>
    <description>
    Memory leak in the audio/audio.c in QEMU (aka Quick Emulator) allows remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-8309.html">CVE-2017-8309</cve>
<bugzilla href="https://bugzilla.suse.com/1037242">SUSE bug 1037242</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1037243">SUSE bug 1037243</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205626" comment="kvm-1.4.2-53.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205972" comment="xen-4.2.5_21-44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209074" comment="xen-doc-html-4.2.5_21-44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209075" comment="xen-doc-pdf-4.2.5_21-44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205973" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.102-44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205974" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.102-44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205975" comment="xen-libs-4.2.5_21-44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209076" comment="xen-libs-32bit-4.2.5_21-44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209077" comment="xen-tools-4.2.5_21-44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205976" comment="xen-tools-domU-4.2.5_21-44 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205626" comment="kvm-1.4.2-53.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250433" comment="xen-4.2.5_21-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250434" comment="xen-doc-html-4.2.5_21-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250435" comment="xen-doc-pdf-4.2.5_21-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250436" comment="xen-kmp-default-4.2.5_21_3.0.101_0.122.TDC-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250437" comment="xen-libs-4.2.5_21-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250438" comment="xen-tools-4.2.5_21-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250439" comment="xen-tools-domU-4.2.5_21-46 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8344</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-8344" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8344" source="CVE"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadPCXImage function in pcx.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-8344.html">CVE-2017-8344</cve>
<bugzilla href="https://bugzilla.suse.com/1036978">SUSE bug 1036978</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202248" comment="ImageMagick-6.4.3.6-7.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209114" comment="libMagickCore1-6.4.3.6-7.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209115" comment="libMagickCore1-32bit-6.4.3.6-7.77 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8345</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-8345" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8345" source="CVE"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadMNGImage function in png.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-8345.html">CVE-2017-8345</cve>
<bugzilla href="https://bugzilla.suse.com/1036980">SUSE bug 1036980</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202248" comment="ImageMagick-6.4.3.6-7.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209114" comment="libMagickCore1-6.4.3.6-7.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209115" comment="libMagickCore1-32bit-6.4.3.6-7.77 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8346</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-8346" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8346" source="CVE"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadDCMImage function in dcm.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-8346.html">CVE-2017-8346</cve>
<bugzilla href="https://bugzilla.suse.com/1036981">SUSE bug 1036981</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202248" comment="ImageMagick-6.4.3.6-7.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209114" comment="libMagickCore1-6.4.3.6-7.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209115" comment="libMagickCore1-32bit-6.4.3.6-7.77 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8348</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-8348" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8348" source="CVE"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadMATImage function in mat.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-8348.html">CVE-2017-8348</cve>
<bugzilla href="https://bugzilla.suse.com/1036983">SUSE bug 1036983</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202248" comment="ImageMagick-6.4.3.6-7.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209114" comment="libMagickCore1-6.4.3.6-7.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209115" comment="libMagickCore1-32bit-6.4.3.6-7.77 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8349</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-8349" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8349" source="CVE"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadSFWImage function in sfw.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-8349.html">CVE-2017-8349</cve>
<bugzilla href="https://bugzilla.suse.com/1036984">SUSE bug 1036984</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202248" comment="ImageMagick-6.4.3.6-7.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209114" comment="libMagickCore1-6.4.3.6-7.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209115" comment="libMagickCore1-32bit-6.4.3.6-7.77 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8350</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-8350" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8350" source="CVE"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadJNGImage function in png.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-8350.html">CVE-2017-8350</cve>
<bugzilla href="https://bugzilla.suse.com/1036985">SUSE bug 1036985</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202248" comment="ImageMagick-6.4.3.6-7.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209114" comment="libMagickCore1-6.4.3.6-7.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209115" comment="libMagickCore1-32bit-6.4.3.6-7.77 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8351</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-8351" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8351" source="CVE"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadPCDImage function in pcd.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-8351.html">CVE-2017-8351</cve>
<bugzilla href="https://bugzilla.suse.com/1036986">SUSE bug 1036986</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202248" comment="ImageMagick-6.4.3.6-7.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209114" comment="libMagickCore1-6.4.3.6-7.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209115" comment="libMagickCore1-32bit-6.4.3.6-7.77 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8352</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-8352" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8352" source="CVE"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadXWDImage function in xwd.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-8352.html">CVE-2017-8352</cve>
<bugzilla href="https://bugzilla.suse.com/1036987">SUSE bug 1036987</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202248" comment="ImageMagick-6.4.3.6-7.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209114" comment="libMagickCore1-6.4.3.6-7.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209115" comment="libMagickCore1-32bit-6.4.3.6-7.77 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8353</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-8353" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8353" source="CVE"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadPICTImage function in pict.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-8353.html">CVE-2017-8353</cve>
<bugzilla href="https://bugzilla.suse.com/1036988">SUSE bug 1036988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1055010">SUSE bug 1055010</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202248" comment="ImageMagick-6.4.3.6-7.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209114" comment="libMagickCore1-6.4.3.6-7.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209115" comment="libMagickCore1-32bit-6.4.3.6-7.77 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8354</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-8354" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8354" source="CVE"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadBMPImage function in bmp.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-8354.html">CVE-2017-8354</cve>
<bugzilla href="https://bugzilla.suse.com/1036989">SUSE bug 1036989</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202248" comment="ImageMagick-6.4.3.6-7.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209114" comment="libMagickCore1-6.4.3.6-7.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209115" comment="libMagickCore1-32bit-6.4.3.6-7.77 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8355</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-8355" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8355" source="CVE"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadMTVImage function in mtv.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-8355.html">CVE-2017-8355</cve>
<bugzilla href="https://bugzilla.suse.com/1036990">SUSE bug 1036990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202248" comment="ImageMagick-6.4.3.6-7.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209114" comment="libMagickCore1-6.4.3.6-7.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209115" comment="libMagickCore1-32bit-6.4.3.6-7.77 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8357</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-8357" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8357" source="CVE"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadEPTImage function in ept.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-8357.html">CVE-2017-8357</cve>
<bugzilla href="https://bugzilla.suse.com/1036976">SUSE bug 1036976</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202248" comment="ImageMagick-6.4.3.6-7.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209114" comment="libMagickCore1-6.4.3.6-7.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209115" comment="libMagickCore1-32bit-6.4.3.6-7.77 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8361</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-8361" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8361" source="CVE"/>
    <description>
    The flac_buffer_copy function in flac.c in libsndfile 1.0.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted audio file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-8361.html">CVE-2017-8361</cve>
<bugzilla href="https://bugzilla.suse.com/1036944">SUSE bug 1036944</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203051" comment="libsndfile-1.0.20-2.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209928" comment="libsndfile-32bit-1.0.20-2.18 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8362</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-8362" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8362" source="CVE"/>
    <description>
    The flac_buffer_copy function in flac.c in libsndfile 1.0.28 allows remote attackers to cause a denial of service (invalid read and application crash) via a crafted audio file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-8362.html">CVE-2017-8362</cve>
<bugzilla href="https://bugzilla.suse.com/1036943">SUSE bug 1036943</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203051" comment="libsndfile-1.0.20-2.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209928" comment="libsndfile-32bit-1.0.20-2.18 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8363</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-8363" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8363" source="CVE"/>
    <description>
    The flac_buffer_copy function in flac.c in libsndfile 1.0.28 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted audio file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-8363.html">CVE-2017-8363</cve>
<bugzilla href="https://bugzilla.suse.com/1036945">SUSE bug 1036945</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203051" comment="libsndfile-1.0.20-2.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209928" comment="libsndfile-32bit-1.0.20-2.18 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8365</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-8365" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8365" source="CVE"/>
    <description>
    The i2les_array function in pcm.c in libsndfile 1.0.28 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted audio file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-8365.html">CVE-2017-8365</cve>
<bugzilla href="https://bugzilla.suse.com/1036946">SUSE bug 1036946</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203051" comment="libsndfile-1.0.20-2.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209928" comment="libsndfile-32bit-1.0.20-2.18 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8765</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-8765" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8765" source="CVE"/>
    <description>
    The function named ReadICONImage in coders\icon.c in ImageMagick 7.0.5-5 has a memory leak vulnerability which can cause memory exhaustion via a crafted ICON file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-8765.html">CVE-2017-8765</cve>
<bugzilla href="https://bugzilla.suse.com/1037527">SUSE bug 1037527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202248" comment="ImageMagick-6.4.3.6-7.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209114" comment="libMagickCore1-6.4.3.6-7.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209115" comment="libMagickCore1-32bit-6.4.3.6-7.77 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8779</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-8779" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8779" source="CVE"/>
    <description>
    rpcbind through 0.2.4, LIBTIRPC through 1.0.1 and 1.0.2-rc through 1.0.2-rc3, and NTIRPC through 1.4.3 do not consider the maximum RPC data size during memory allocation for XDR strings, which allows remote attackers to cause a denial of service (memory consumption with no subsequent free) via a crafted UDP packet to port 111, aka rpcbomb.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-8779.html">CVE-2017-8779</cve>
<bugzilla href="https://bugzilla.suse.com/1037559">SUSE bug 1037559</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1037930">SUSE bug 1037930</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1101814">SUSE bug 1101814</bugzilla>
<bugzilla href="https://bugzilla.suse.com/798028">SUSE bug 798028</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203064" comment="libtirpc-0.2.1-1.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205630" comment="libtirpc1-0.2.1-1.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205631" comment="rpcbind-0.1.6+git20080930-6.27 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8804</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-8804" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8804" source="CVE"/>
    <description>
    The xdr_bytes and xdr_string functions in the GNU C Library (aka glibc or libc6) 2.25 mishandle failures of buffer deserialization, which allows remote attackers to cause a denial of service (virtual memory allocation, or memory consumption if an overcommit setting is not used) via a crafted UDP packet to port 111, a related issue to CVE-2017-8779.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-8804.html">CVE-2017-8804</cve>
<bugzilla href="https://bugzilla.suse.com/1037559">SUSE bug 1037559</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1037930">SUSE bug 1037930</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202700" comment="glibc-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208522" comment="glibc-32bit-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205358" comment="glibc-devel-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208523" comment="glibc-devel-32bit-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202701" comment="glibc-html-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205359" comment="glibc-i18ndata-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202702" comment="glibc-info-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205360" comment="glibc-locale-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208524" comment="glibc-locale-32bit-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205361" comment="glibc-profile-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208525" comment="glibc-profile-32bit-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205362" comment="nscd-2.11.3-17.110.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8824</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-8824" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8824" source="CVE"/>
    <description>
    The dccp_disconnect function in net/dccp/proto.c in the Linux kernel through 4.14.3 allows local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-8824.html">CVE-2017-8824</cve>
<bugzilla href="https://bugzilla.suse.com/1070771">SUSE bug 1070771</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1092904">SUSE bug 1092904</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208652" comment="kernel-bigsmp-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208653" comment="kernel-bigsmp-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208654" comment="kernel-bigsmp-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205524" comment="kernel-default-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205525" comment="kernel-default-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205526" comment="kernel-default-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208655" comment="kernel-default-man-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205527" comment="kernel-ec2-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205528" comment="kernel-ec2-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205529" comment="kernel-ec2-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205530" comment="kernel-pae-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205531" comment="kernel-pae-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205532" comment="kernel-pae-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205533" comment="kernel-source-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205534" comment="kernel-syms-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205535" comment="kernel-trace-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205536" comment="kernel-trace-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205537" comment="kernel-trace-devel-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205538" comment="kernel-xen-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205539" comment="kernel-xen-base-3.0.101-0.47.106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205540" comment="kernel-xen-devel-3.0.101-0.47.106.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-8830" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8830" source="CVE"/>
    <description>
    In ImageMagick 7.0.5-6, the ReadBMPImage function in bmp.c:1379 allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-8830.html">CVE-2017-8830</cve>
<bugzilla href="https://bugzilla.suse.com/1038000">SUSE bug 1038000</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202248" comment="ImageMagick-6.4.3.6-7.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209114" comment="libMagickCore1-6.4.3.6-7.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209115" comment="libMagickCore1-32bit-6.4.3.6-7.77 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8831</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-8831" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8831" source="CVE"/>
    <description>
    The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel through 4.11.5 allows local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a "double fetch" vulnerability.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-8831.html">CVE-2017-8831</cve>
<bugzilla href="https://bugzilla.suse.com/1037994">SUSE bug 1037994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1053611">SUSE bug 1053611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1061936">SUSE bug 1061936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208691" comment="kernel-bigsmp-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208692" comment="kernel-bigsmp-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208693" comment="kernel-bigsmp-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205592" comment="kernel-default-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205593" comment="kernel-default-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205594" comment="kernel-default-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208694" comment="kernel-default-man-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205595" comment="kernel-ec2-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205596" comment="kernel-ec2-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205597" comment="kernel-ec2-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205598" comment="kernel-pae-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205599" comment="kernel-pae-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205600" comment="kernel-pae-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205601" comment="kernel-source-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205602" comment="kernel-syms-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205603" comment="kernel-trace-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205604" comment="kernel-trace-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205605" comment="kernel-trace-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205606" comment="kernel-xen-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205607" comment="kernel-xen-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205608" comment="kernel-xen-devel-3.0.101-0.47.106.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8834</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-8834" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8834" source="CVE"/>
    <description>
    The cr_tknzr_parse_comment function in cr-tknzr.c in libcroco 0.6.12 allows remote attackers to cause a denial of service (memory allocation error) via a crafted CSS file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-8834.html">CVE-2017-8834</cve>
<bugzilla href="https://bugzilla.suse.com/1043898">SUSE bug 1043898</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1043899">SUSE bug 1043899</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009256846" comment="libcroco-0.6.1-122.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256847" comment="libcroco-0_6-3-0.6.1-122.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256848" comment="libcroco-0_6-3-32bit-0.6.1-122.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8871</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-8871" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8871" source="CVE"/>
    <description>
    The cr_parser_parse_selector_core function in cr-parser.c in libcroco 0.6.12 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted CSS file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-8871.html">CVE-2017-8871</cve>
<bugzilla href="https://bugzilla.suse.com/1043898">SUSE bug 1043898</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1043899">SUSE bug 1043899</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009256846" comment="libcroco-0.6.1-122.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256847" comment="libcroco-0_6-3-0.6.1-122.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256848" comment="libcroco-0_6-3-32bit-0.6.1-122.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8872</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-8872" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8872" source="CVE"/>
    <description>
    The htmlParseTryOrFinish function in HTMLparser.c in libxml2 2.9.4 allows attackers to cause a denial of service (buffer over-read) or information disclosure.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-8872.html">CVE-2017-8872</cve>
<bugzilla href="https://bugzilla.suse.com/1038444">SUSE bug 1038444</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203107" comment="libxml2-2.7.6-0.77.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209981" comment="libxml2-32bit-2.7.6-0.77.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209982" comment="libxml2-doc-2.7.6-0.77.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209983" comment="libxml2-python-2.7.6-0.77.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8890</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-8890" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890" source="CVE"/>
    <description>
    The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel through 4.10.15 allows attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-8890.html">CVE-2017-8890</cve>
<bugzilla href="https://bugzilla.suse.com/1038544">SUSE bug 1038544</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1038564">SUSE bug 1038564</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1039883">SUSE bug 1039883</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1039885">SUSE bug 1039885</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1040069">SUSE bug 1040069</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1042364">SUSE bug 1042364</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1051906">SUSE bug 1051906</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208691" comment="kernel-bigsmp-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208692" comment="kernel-bigsmp-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208693" comment="kernel-bigsmp-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205592" comment="kernel-default-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205593" comment="kernel-default-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205594" comment="kernel-default-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208694" comment="kernel-default-man-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205595" comment="kernel-ec2-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205596" comment="kernel-ec2-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205597" comment="kernel-ec2-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205598" comment="kernel-pae-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205599" comment="kernel-pae-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205600" comment="kernel-pae-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205601" comment="kernel-source-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205602" comment="kernel-syms-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205603" comment="kernel-trace-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205604" comment="kernel-trace-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205605" comment="kernel-trace-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205606" comment="kernel-xen-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205607" comment="kernel-xen-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205608" comment="kernel-xen-devel-3.0.101-0.47.106.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8905</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-8905" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8905" source="CVE"/>
    <description>
    Xen through 4.6.x on 64-bit platforms mishandles a failsafe callback, which might allow PV guest OS users to execute arbitrary code on the host OS, aka XSA-215.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-8905.html">CVE-2017-8905</cve>
<bugzilla href="https://bugzilla.suse.com/1034845">SUSE bug 1034845</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205972" comment="xen-4.2.5_21-44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209074" comment="xen-doc-html-4.2.5_21-44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209075" comment="xen-doc-pdf-4.2.5_21-44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205973" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.102-44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205974" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.102-44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205975" comment="xen-libs-4.2.5_21-44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209076" comment="xen-libs-32bit-4.2.5_21-44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209077" comment="xen-tools-4.2.5_21-44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205976" comment="xen-tools-domU-4.2.5_21-44 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250440" comment="xen-4.2.5_21-47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250441" comment="xen-doc-html-4.2.5_21-47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250442" comment="xen-doc-pdf-4.2.5_21-47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250443" comment="xen-kmp-default-4.2.5_21_3.0.101_0.125.TDC-47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250444" comment="xen-libs-4.2.5_21-47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250445" comment="xen-tools-4.2.5_21-47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250446" comment="xen-tools-domU-4.2.5_21-47.7 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8924</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-8924" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924" source="CVE"/>
    <description>
    The edge_bulk_in_callback function in drivers/usb/serial/io_ti.c in the Linux kernel before 4.10.4 allows local users to obtain sensitive information (in the dmesg ringbuffer and syslog) from uninitialized kernel memory by using a crafted USB device (posing as an io_ti USB serial device) to trigger an integer underflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-8924.html">CVE-2017-8924</cve>
<bugzilla href="https://bugzilla.suse.com/1037182">SUSE bug 1037182</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1038981">SUSE bug 1038981</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1038982">SUSE bug 1038982</bugzilla>
<bugzilla href="https://bugzilla.suse.com/870618">SUSE bug 870618</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208691" comment="kernel-bigsmp-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208692" comment="kernel-bigsmp-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208693" comment="kernel-bigsmp-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205592" comment="kernel-default-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205593" comment="kernel-default-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205594" comment="kernel-default-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208694" comment="kernel-default-man-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205595" comment="kernel-ec2-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205596" comment="kernel-ec2-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205597" comment="kernel-ec2-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205598" comment="kernel-pae-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205599" comment="kernel-pae-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205600" comment="kernel-pae-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205601" comment="kernel-source-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205602" comment="kernel-syms-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205603" comment="kernel-trace-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205604" comment="kernel-trace-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205605" comment="kernel-trace-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205606" comment="kernel-xen-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205607" comment="kernel-xen-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205608" comment="kernel-xen-devel-3.0.101-0.47.106.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8925</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-8925" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925" source="CVE"/>
    <description>
    The omninet_open function in drivers/usb/serial/omninet.c in the Linux kernel before 4.10.4 allows local users to cause a denial of service (tty exhaustion) by leveraging reference count mishandling.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-8925.html">CVE-2017-8925</cve>
<bugzilla href="https://bugzilla.suse.com/1037183">SUSE bug 1037183</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1038981">SUSE bug 1038981</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1038982">SUSE bug 1038982</bugzilla>
<bugzilla href="https://bugzilla.suse.com/870618">SUSE bug 870618</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208691" comment="kernel-bigsmp-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208692" comment="kernel-bigsmp-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208693" comment="kernel-bigsmp-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205592" comment="kernel-default-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205593" comment="kernel-default-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205594" comment="kernel-default-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208694" comment="kernel-default-man-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205595" comment="kernel-ec2-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205596" comment="kernel-ec2-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205597" comment="kernel-ec2-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205598" comment="kernel-pae-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205599" comment="kernel-pae-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205600" comment="kernel-pae-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205601" comment="kernel-source-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205602" comment="kernel-syms-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205603" comment="kernel-trace-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205604" comment="kernel-trace-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205605" comment="kernel-trace-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205606" comment="kernel-xen-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205607" comment="kernel-xen-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205608" comment="kernel-xen-devel-3.0.101-0.47.106.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9022</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9022" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9022" source="CVE"/>
    <description>
    The gmp plugin in strongSwan before 5.5.3 does not properly validate RSA public keys before calling mpz_powm_sec, which allows remote peers to cause a denial of service (floating point exception and process crash) via a crafted certificate.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9022.html">CVE-2017-9022</cve>
<bugzilla href="https://bugzilla.suse.com/1039514">SUSE bug 1039514</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210814" comment="strongswan-4.4.0-6.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210815" comment="strongswan-doc-4.4.0-6.35 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9023</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9023" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9023" source="CVE"/>
    <description>
    The ASN.1 parser in strongSwan before 5.5.3 improperly handles CHOICE types when the x509 plugin is enabled, which allows remote attackers to cause a denial of service (infinite loop) via a crafted certificate.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9023.html">CVE-2017-9023</cve>
<bugzilla href="https://bugzilla.suse.com/1039515">SUSE bug 1039515</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210814" comment="strongswan-4.4.0-6.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210815" comment="strongswan-doc-4.4.0-6.35 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9047</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9047" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9047" source="CVE"/>
    <description>
    A buffer overflow was discovered in libxml2 20904-GITv2.9.4-16-g0741801. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. The variable len is assigned strlen(buf). If the content-&gt;type is XML_ELEMENT_CONTENT_ELEMENT, then (i) the content-&gt;prefix is appended to buf (if it actually fits) whereupon (ii) content-&gt;name is written to the buffer. However, the check for whether the content-&gt;name actually fits also uses 'len' rather than the updated buffer length strlen(buf). This allows us to write about "size" many bytes beyond the allocated memory. This vulnerability causes programs that use libxml2, such as PHP, to crash.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9047.html">CVE-2017-9047</cve>
<bugzilla href="https://bugzilla.suse.com/1039063">SUSE bug 1039063</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1039066">SUSE bug 1039066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1039657">SUSE bug 1039657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203101" comment="libxml2-2.7.6-0.69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208762" comment="libxml2-32bit-2.7.6-0.69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205642" comment="libxml2-doc-2.7.6-0.69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205643" comment="libxml2-python-2.7.6-0.69 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9048</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9048" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9048" source="CVE"/>
    <description>
    libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 &lt; size. This vulnerability causes programs that use libxml2, such as PHP, to crash.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9048.html">CVE-2017-9048</cve>
<bugzilla href="https://bugzilla.suse.com/1039064">SUSE bug 1039064</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1039066">SUSE bug 1039066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1039658">SUSE bug 1039658</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203101" comment="libxml2-2.7.6-0.69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208762" comment="libxml2-32bit-2.7.6-0.69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205642" comment="libxml2-doc-2.7.6-0.69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205643" comment="libxml2-python-2.7.6-0.69 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9049</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9049" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9049" source="CVE"/>
    <description>
    libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictComputeFastKey function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for libxml2 Bug 759398.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9049.html">CVE-2017-9049</cve>
<bugzilla href="https://bugzilla.suse.com/1039063">SUSE bug 1039063</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1039064">SUSE bug 1039064</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1039066">SUSE bug 1039066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1039659">SUSE bug 1039659</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1039661">SUSE bug 1039661</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1069690">SUSE bug 1069690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203101" comment="libxml2-2.7.6-0.69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208762" comment="libxml2-32bit-2.7.6-0.69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205642" comment="libxml2-doc-2.7.6-0.69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205643" comment="libxml2-python-2.7.6-0.69 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9050</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9050" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9050" source="CVE"/>
    <description>
    libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictAddString function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for CVE-2016-1839.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9050.html">CVE-2017-9050</cve>
<bugzilla href="https://bugzilla.suse.com/1039066">SUSE bug 1039066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1039069">SUSE bug 1039069</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1039661">SUSE bug 1039661</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1069433">SUSE bug 1069433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1069690">SUSE bug 1069690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203101" comment="libxml2-2.7.6-0.69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208762" comment="libxml2-32bit-2.7.6-0.69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205642" comment="libxml2-doc-2.7.6-0.69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205643" comment="libxml2-python-2.7.6-0.69 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9074</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9074" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074" source="CVE"/>
    <description>
    The IPv6 fragmentation implementation in the Linux kernel through 4.11.1 does not consider that the nexthdr field may be associated with an invalid option, which allows local users to cause a denial of service (out-of-bounds read and BUG) or possibly have unspecified other impact via crafted socket and send system calls.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9074.html">CVE-2017-9074</cve>
<bugzilla href="https://bugzilla.suse.com/1039882">SUSE bug 1039882</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208691" comment="kernel-bigsmp-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208692" comment="kernel-bigsmp-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208693" comment="kernel-bigsmp-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205592" comment="kernel-default-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205593" comment="kernel-default-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205594" comment="kernel-default-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208694" comment="kernel-default-man-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205595" comment="kernel-ec2-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205596" comment="kernel-ec2-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205597" comment="kernel-ec2-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205598" comment="kernel-pae-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205599" comment="kernel-pae-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205600" comment="kernel-pae-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205601" comment="kernel-source-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205602" comment="kernel-syms-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205603" comment="kernel-trace-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205604" comment="kernel-trace-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205605" comment="kernel-trace-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205606" comment="kernel-xen-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205607" comment="kernel-xen-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205608" comment="kernel-xen-devel-3.0.101-0.47.106.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9075</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9075" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075" source="CVE"/>
    <description>
    The sctp_v6_create_accept_sk function in net/sctp/ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9075.html">CVE-2017-9075</cve>
<bugzilla href="https://bugzilla.suse.com/1038544">SUSE bug 1038544</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1039883">SUSE bug 1039883</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1051906">SUSE bug 1051906</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208691" comment="kernel-bigsmp-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208692" comment="kernel-bigsmp-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208693" comment="kernel-bigsmp-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205592" comment="kernel-default-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205593" comment="kernel-default-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205594" comment="kernel-default-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208694" comment="kernel-default-man-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205595" comment="kernel-ec2-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205596" comment="kernel-ec2-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205597" comment="kernel-ec2-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205598" comment="kernel-pae-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205599" comment="kernel-pae-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205600" comment="kernel-pae-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205601" comment="kernel-source-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205602" comment="kernel-syms-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205603" comment="kernel-trace-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205604" comment="kernel-trace-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205605" comment="kernel-trace-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205606" comment="kernel-xen-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205607" comment="kernel-xen-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205608" comment="kernel-xen-devel-3.0.101-0.47.106.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9076</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9076" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076" source="CVE"/>
    <description>
    The dccp_v6_request_recv_sock function in net/dccp/ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9076.html">CVE-2017-9076</cve>
<bugzilla href="https://bugzilla.suse.com/1038544">SUSE bug 1038544</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1039885">SUSE bug 1039885</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1040069">SUSE bug 1040069</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1051906">SUSE bug 1051906</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208691" comment="kernel-bigsmp-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208692" comment="kernel-bigsmp-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208693" comment="kernel-bigsmp-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205592" comment="kernel-default-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205593" comment="kernel-default-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205594" comment="kernel-default-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208694" comment="kernel-default-man-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205595" comment="kernel-ec2-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205596" comment="kernel-ec2-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205597" comment="kernel-ec2-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205598" comment="kernel-pae-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205599" comment="kernel-pae-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205600" comment="kernel-pae-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205601" comment="kernel-source-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205602" comment="kernel-syms-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205603" comment="kernel-trace-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205604" comment="kernel-trace-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205605" comment="kernel-trace-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205606" comment="kernel-xen-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205607" comment="kernel-xen-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205608" comment="kernel-xen-devel-3.0.101-0.47.106.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9077</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077" source="CVE"/>
    <description>
    The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9077.html">CVE-2017-9077</cve>
<bugzilla href="https://bugzilla.suse.com/1038544">SUSE bug 1038544</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1040069">SUSE bug 1040069</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1042364">SUSE bug 1042364</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208691" comment="kernel-bigsmp-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208692" comment="kernel-bigsmp-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208693" comment="kernel-bigsmp-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205592" comment="kernel-default-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205593" comment="kernel-default-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205594" comment="kernel-default-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208694" comment="kernel-default-man-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205595" comment="kernel-ec2-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205596" comment="kernel-ec2-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205597" comment="kernel-ec2-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205598" comment="kernel-pae-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205599" comment="kernel-pae-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205600" comment="kernel-pae-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205601" comment="kernel-source-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205602" comment="kernel-syms-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205603" comment="kernel-trace-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205604" comment="kernel-trace-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205605" comment="kernel-trace-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205606" comment="kernel-xen-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205607" comment="kernel-xen-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205608" comment="kernel-xen-devel-3.0.101-0.47.106.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9098</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9098" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9098" source="CVE"/>
    <description>
    ImageMagick before 7.0.5-2 and GraphicsMagick before 1.3.24 use uninitialized memory in the RLE decoder, allowing an attacker to leak sensitive information from process memory space, as demonstrated by remote attacks against ImageMagick code in a long-running server process that converts image data on behalf of multiple users. This is caused by a missing initialization step in the ReadRLEImage function in coders/rle.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9098.html">CVE-2017-9098</cve>
<bugzilla href="https://bugzilla.suse.com/1040025">SUSE bug 1040025</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202248" comment="ImageMagick-6.4.3.6-7.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209114" comment="libMagickCore1-6.4.3.6-7.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209115" comment="libMagickCore1-32bit-6.4.3.6-7.77 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9110</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9110" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9110" source="CVE"/>
    <description>
    In OpenEXR 2.2.0, an invalid read of size 2 in the hufDecode function in ImfHuf.cpp could cause the application to crash.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9110.html">CVE-2017-9110</cve>
<bugzilla href="https://bugzilla.suse.com/1040107">SUSE bug 1040107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1040112">SUSE bug 1040112</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009261368" comment="OpenEXR-1.6.1-83.17.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009261369" comment="OpenEXR-32bit-1.6.1-83.17.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9111</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9111" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9111" source="CVE"/>
    <description>
    In OpenEXR 2.2.0, an invalid write of size 8 in the storeSSE function in ImfOptimizedPixelReading.h could cause the application to crash or execute arbitrary code.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9111.html">CVE-2017-9111</cve>
<bugzilla href="https://bugzilla.suse.com/1040109">SUSE bug 1040109</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009260603" comment="OpenEXR-1.6.1-83.17.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009260604" comment="OpenEXR-32bit-1.6.1-83.17.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9112</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9112" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9112" source="CVE"/>
    <description>
    In OpenEXR 2.2.0, an invalid read of size 1 in the getBits function in ImfHuf.cpp could cause the application to crash.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9112.html">CVE-2017-9112</cve>
<bugzilla href="https://bugzilla.suse.com/1040112">SUSE bug 1040112</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009260603" comment="OpenEXR-1.6.1-83.17.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009260604" comment="OpenEXR-32bit-1.6.1-83.17.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9113</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9113" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9113" source="CVE"/>
    <description>
    In OpenEXR 2.2.0, an invalid write of size 1 in the bufferedReadPixels function in ImfInputFile.cpp could cause the application to crash or execute arbitrary code.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9113.html">CVE-2017-9113</cve>
<bugzilla href="https://bugzilla.suse.com/1040113">SUSE bug 1040113</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009260603" comment="OpenEXR-1.6.1-83.17.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009260604" comment="OpenEXR-32bit-1.6.1-83.17.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9114</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9114" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9114" source="CVE"/>
    <description>
    In OpenEXR 2.2.0, an invalid read of size 1 in the refill function in ImfFastHuf.cpp could cause the application to crash.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9114.html">CVE-2017-9114</cve>
<bugzilla href="https://bugzilla.suse.com/1040114">SUSE bug 1040114</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202381" comment="OpenEXR-1.6.1-83.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202382" comment="OpenEXR-32bit-1.6.1-83.17.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9115</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9115" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9115" source="CVE"/>
    <description>
    In OpenEXR 2.2.0, an invalid write of size 2 in the = operator function in half.h could cause the application to crash or execute arbitrary code.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9115.html">CVE-2017-9115</cve>
<bugzilla href="https://bugzilla.suse.com/1040115">SUSE bug 1040115</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009260603" comment="OpenEXR-1.6.1-83.17.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009260604" comment="OpenEXR-32bit-1.6.1-83.17.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9117</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9117" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9117" source="CVE"/>
    <description>
    In LibTIFF 4.0.7, the program processes BMP images without verifying that biWidth and biHeight in the bitmap-information header match the actual input, leading to a heap-based buffer over-read in bmp2tiff.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9117.html">CVE-2017-9117</cve>
<bugzilla href="https://bugzilla.suse.com/1040080">SUSE bug 1040080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1150480">SUSE bug 1150480</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009240660" comment="libtiff3-3.8.2-141.169.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240661" comment="libtiff3-32bit-3.8.2-141.169.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240659" comment="tiff-3.8.2-141.169.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9118</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9118" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9118" source="CVE"/>
    <description>
    PHP 7.1.5 has an Out of bounds access in php_pcre_replace_impl via a crafted preg_replace call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9118.html">CVE-2017-9118</cve>
<bugzilla href="https://bugzilla.suse.com/1105466">SUSE bug 1105466</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009234339" comment="apache2-mod_php53-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234328" comment="php53-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234340" comment="php53-bcmath-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234341" comment="php53-bz2-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234342" comment="php53-calendar-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234343" comment="php53-ctype-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234344" comment="php53-curl-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234345" comment="php53-dba-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234346" comment="php53-dom-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234347" comment="php53-exif-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234348" comment="php53-fastcgi-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234349" comment="php53-fileinfo-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234350" comment="php53-ftp-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234351" comment="php53-gd-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234352" comment="php53-gettext-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234353" comment="php53-gmp-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234354" comment="php53-iconv-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234355" comment="php53-intl-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234356" comment="php53-json-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234357" comment="php53-ldap-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234358" comment="php53-mbstring-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234359" comment="php53-mcrypt-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234360" comment="php53-mysql-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234361" comment="php53-odbc-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234362" comment="php53-openssl-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234363" comment="php53-pcntl-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234364" comment="php53-pdo-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234365" comment="php53-pear-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234366" comment="php53-pgsql-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234367" comment="php53-pspell-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234368" comment="php53-shmop-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234369" comment="php53-snmp-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234370" comment="php53-soap-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234371" comment="php53-suhosin-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234372" comment="php53-sysvmsg-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234373" comment="php53-sysvsem-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234374" comment="php53-sysvshm-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234375" comment="php53-tokenizer-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234376" comment="php53-wddx-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234377" comment="php53-xmlreader-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234378" comment="php53-xmlrpc-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234379" comment="php53-xmlwriter-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234380" comment="php53-xsl-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234381" comment="php53-zip-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234382" comment="php53-zlib-5.3.17-112.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9141</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9141" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9141" source="CVE"/>
    <description>
    In ImageMagick 7.0.5-7 Q16, a crafted file could trigger an assertion failure in the ResetImageProfileIterator function in MagickCore/profile.c because of missing checks in the ReadDDSImage function in coders/dds.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9141.html">CVE-2017-9141</cve>
<bugzilla href="https://bugzilla.suse.com/1040303">SUSE bug 1040303</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202248" comment="ImageMagick-6.4.3.6-7.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209114" comment="libMagickCore1-6.4.3.6-7.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209115" comment="libMagickCore1-32bit-6.4.3.6-7.77 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9142</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9142" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9142" source="CVE"/>
    <description>
    In ImageMagick 7.0.5-7 Q16, a crafted file could trigger an assertion failure in the WriteBlob function in MagickCore/blob.c because of missing checks in the ReadOneJNGImage function in coders/png.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9142.html">CVE-2017-9142</cve>
<bugzilla href="https://bugzilla.suse.com/1036985">SUSE bug 1036985</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1040304">SUSE bug 1040304</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202248" comment="ImageMagick-6.4.3.6-7.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209114" comment="libMagickCore1-6.4.3.6-7.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209115" comment="libMagickCore1-32bit-6.4.3.6-7.77 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9143" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9143" source="CVE"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadARTImage function in coders/art.c allows attackers to cause a denial of service (memory leak) via a crafted .art file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9143.html">CVE-2017-9143</cve>
<bugzilla href="https://bugzilla.suse.com/1040306">SUSE bug 1040306</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202248" comment="ImageMagick-6.4.3.6-7.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209114" comment="libMagickCore1-6.4.3.6-7.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209115" comment="libMagickCore1-32bit-6.4.3.6-7.77 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9144</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9144" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9144" source="CVE"/>
    <description>
    In ImageMagick 7.0.5-5, a crafted RLE image can trigger a crash because of incorrect EOF handling in coders/rle.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9144.html">CVE-2017-9144</cve>
<bugzilla href="https://bugzilla.suse.com/1040332">SUSE bug 1040332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1048936">SUSE bug 1048936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202248" comment="ImageMagick-6.4.3.6-7.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209114" comment="libMagickCore1-6.4.3.6-7.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209115" comment="libMagickCore1-32bit-6.4.3.6-7.77 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9147</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9147" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9147" source="CVE"/>
    <description>
    LibTIFF 4.0.7 has an invalid read in the _TIFFVGetField function in tif_dir.c, which might allow remote attackers to cause a denial of service (crash) via a crafted TIFF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9147.html">CVE-2017-9147</cve>
<bugzilla href="https://bugzilla.suse.com/1040322">SUSE bug 1040322</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1150480">SUSE bug 1150480</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009240660" comment="libtiff3-3.8.2-141.169.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240661" comment="libtiff3-32bit-3.8.2-141.169.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240659" comment="tiff-3.8.2-141.169.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9148</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9148" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9148" source="CVE"/>
    <description>
    The TLS session cache in FreeRADIUS 2.1.1 through 2.1.7, 3.0.x before 3.0.14, 3.1.x before 2017-02-04, and 4.0.x before 2017-02-04 fails to reliably prevent resumption of an unauthenticated session, which allows remote attackers (such as malicious 802.1X supplicants) to bypass authentication via PEAP or TTLS.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9148.html">CVE-2017-9148</cve>
<bugzilla href="https://bugzilla.suse.com/1041445">SUSE bug 1041445</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1046141">SUSE bug 1046141</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202522" comment="freeradius-server-2.1.1-7.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209242" comment="freeradius-server-dialupadmin-2.1.1-7.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209243" comment="freeradius-server-doc-2.1.1-7.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202524" comment="freeradius-server-libs-2.1.1-7.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209244" comment="freeradius-server-utils-2.1.1-7.24 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9216</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9216" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9216" source="CVE"/>
    <description>
    libjbig2dec.a in Artifex jbig2dec 0.13, as used in MuPDF and Ghostscript, has a NULL pointer dereference in the jbig2_huffman_get function in jbig2_huffman.c. For example, the jbig2dec utility will crash (segmentation fault) when parsing an invalid file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9216.html">CVE-2017-9216</cve>
<bugzilla href="https://bugzilla.suse.com/1040643">SUSE bug 1040643</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209272" comment="ghostscript-fonts-other-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209273" comment="ghostscript-fonts-rus-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209274" comment="ghostscript-fonts-std-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202638" comment="ghostscript-library-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209275" comment="ghostscript-omni-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209276" comment="ghostscript-x11-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209277" comment="libgimpprint-4.2.7-32.47.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9224</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9224" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9224" source="CVE"/>
    <description>
    An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds read occurs in match_at() during regular expression searching. A logical error involving order of validation and access in match_at() could result in an out-of-bounds read from a stack buffer.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9224.html">CVE-2017-9224</cve>
<bugzilla href="https://bugzilla.suse.com/1040891">SUSE bug 1040891</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044976">SUSE bug 1044976</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210444" comment="apache2-mod_php53-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203320" comment="php53-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210445" comment="php53-bcmath-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210446" comment="php53-bz2-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210447" comment="php53-calendar-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210448" comment="php53-ctype-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210449" comment="php53-curl-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210450" comment="php53-dba-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210451" comment="php53-dom-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210452" comment="php53-exif-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210453" comment="php53-fastcgi-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210454" comment="php53-fileinfo-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210455" comment="php53-ftp-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210456" comment="php53-gd-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210457" comment="php53-gettext-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210458" comment="php53-gmp-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210459" comment="php53-iconv-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210460" comment="php53-intl-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210461" comment="php53-json-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210462" comment="php53-ldap-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210463" comment="php53-mbstring-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210464" comment="php53-mcrypt-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210465" comment="php53-mysql-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210466" comment="php53-odbc-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210467" comment="php53-openssl-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210468" comment="php53-pcntl-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210469" comment="php53-pdo-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210470" comment="php53-pear-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210471" comment="php53-pgsql-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210472" comment="php53-pspell-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210473" comment="php53-shmop-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210474" comment="php53-snmp-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210475" comment="php53-soap-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210476" comment="php53-suhosin-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210477" comment="php53-sysvmsg-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210478" comment="php53-sysvsem-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210479" comment="php53-sysvshm-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210480" comment="php53-tokenizer-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210481" comment="php53-wddx-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210482" comment="php53-xmlreader-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210483" comment="php53-xmlrpc-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210484" comment="php53-xmlwriter-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210485" comment="php53-xsl-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210486" comment="php53-zip-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210487" comment="php53-zlib-5.3.17-108 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9226</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9226" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9226" source="CVE"/>
    <description>
    An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds write or read occurs in next_state_val() during regular expression compilation. Octal numbers larger than 0xff are not handled correctly in fetch_token() and fetch_token_in_cc(). A malformed regular expression containing an octal number in the form of '\700' would produce an invalid code point value larger than 0xff in next_state_val(), resulting in an out-of-bounds write memory corruption.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9226.html">CVE-2017-9226</cve>
<bugzilla href="https://bugzilla.suse.com/1040889">SUSE bug 1040889</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044976">SUSE bug 1044976</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210444" comment="apache2-mod_php53-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203320" comment="php53-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210445" comment="php53-bcmath-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210446" comment="php53-bz2-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210447" comment="php53-calendar-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210448" comment="php53-ctype-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210449" comment="php53-curl-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210450" comment="php53-dba-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210451" comment="php53-dom-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210452" comment="php53-exif-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210453" comment="php53-fastcgi-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210454" comment="php53-fileinfo-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210455" comment="php53-ftp-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210456" comment="php53-gd-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210457" comment="php53-gettext-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210458" comment="php53-gmp-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210459" comment="php53-iconv-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210460" comment="php53-intl-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210461" comment="php53-json-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210462" comment="php53-ldap-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210463" comment="php53-mbstring-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210464" comment="php53-mcrypt-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210465" comment="php53-mysql-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210466" comment="php53-odbc-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210467" comment="php53-openssl-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210468" comment="php53-pcntl-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210469" comment="php53-pdo-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210470" comment="php53-pear-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210471" comment="php53-pgsql-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210472" comment="php53-pspell-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210473" comment="php53-shmop-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210474" comment="php53-snmp-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210475" comment="php53-soap-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210476" comment="php53-suhosin-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210477" comment="php53-sysvmsg-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210478" comment="php53-sysvsem-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210479" comment="php53-sysvshm-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210480" comment="php53-tokenizer-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210481" comment="php53-wddx-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210482" comment="php53-xmlreader-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210483" comment="php53-xmlrpc-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210484" comment="php53-xmlwriter-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210485" comment="php53-xsl-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210486" comment="php53-zip-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210487" comment="php53-zlib-5.3.17-108 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9227</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9227" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9227" source="CVE"/>
    <description>
    An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds read occurs in mbc_enc_len() during regular expression searching. Invalid handling of reg-&gt;dmin in forward_search_range() could result in an invalid pointer dereference, as an out-of-bounds read from a stack buffer.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9227.html">CVE-2017-9227</cve>
<bugzilla href="https://bugzilla.suse.com/1040883">SUSE bug 1040883</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1044976">SUSE bug 1044976</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210444" comment="apache2-mod_php53-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203320" comment="php53-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210445" comment="php53-bcmath-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210446" comment="php53-bz2-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210447" comment="php53-calendar-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210448" comment="php53-ctype-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210449" comment="php53-curl-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210450" comment="php53-dba-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210451" comment="php53-dom-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210452" comment="php53-exif-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210453" comment="php53-fastcgi-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210454" comment="php53-fileinfo-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210455" comment="php53-ftp-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210456" comment="php53-gd-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210457" comment="php53-gettext-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210458" comment="php53-gmp-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210459" comment="php53-iconv-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210460" comment="php53-intl-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210461" comment="php53-json-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210462" comment="php53-ldap-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210463" comment="php53-mbstring-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210464" comment="php53-mcrypt-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210465" comment="php53-mysql-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210466" comment="php53-odbc-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210467" comment="php53-openssl-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210468" comment="php53-pcntl-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210469" comment="php53-pdo-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210470" comment="php53-pear-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210471" comment="php53-pgsql-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210472" comment="php53-pspell-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210473" comment="php53-shmop-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210474" comment="php53-snmp-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210475" comment="php53-soap-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210476" comment="php53-suhosin-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210477" comment="php53-sysvmsg-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210478" comment="php53-sysvsem-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210479" comment="php53-sysvshm-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210480" comment="php53-tokenizer-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210481" comment="php53-wddx-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210482" comment="php53-xmlreader-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210483" comment="php53-xmlrpc-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210484" comment="php53-xmlwriter-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210485" comment="php53-xsl-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210486" comment="php53-zip-5.3.17-108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210487" comment="php53-zlib-5.3.17-108 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9228</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9228" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9228" source="CVE"/>
    <description>
    An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds write occurs in bitset_set_range() during regular expression compilation due to an uninitialized variable from an incorrect state transition. An incorrect state transition in parse_char_class() could create an execution path that leaves a critical local variable uninitialized until it's used as an index, resulting in an out-of-bounds write memory corruption.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9228.html">CVE-2017-9228</cve>
<bugzilla href="https://bugzilla.suse.com/1068376">SUSE bug 1068376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1069606">SUSE bug 1069606</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1069607">SUSE bug 1069607</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1076391">SUSE bug 1076391</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210576" comment="apache2-mod_php53-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203344" comment="php53-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210577" comment="php53-bcmath-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210578" comment="php53-bz2-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210579" comment="php53-calendar-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210580" comment="php53-ctype-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210581" comment="php53-curl-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210582" comment="php53-dba-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210583" comment="php53-dom-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210584" comment="php53-exif-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210585" comment="php53-fastcgi-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210586" comment="php53-fileinfo-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210587" comment="php53-ftp-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210588" comment="php53-gd-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210589" comment="php53-gettext-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210590" comment="php53-gmp-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210591" comment="php53-iconv-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210592" comment="php53-intl-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210593" comment="php53-json-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210594" comment="php53-ldap-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210595" comment="php53-mbstring-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210596" comment="php53-mcrypt-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210597" comment="php53-mysql-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210598" comment="php53-odbc-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210599" comment="php53-openssl-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210600" comment="php53-pcntl-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210601" comment="php53-pdo-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210602" comment="php53-pear-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210603" comment="php53-pgsql-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210604" comment="php53-pspell-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210605" comment="php53-shmop-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210606" comment="php53-snmp-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210607" comment="php53-soap-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210608" comment="php53-suhosin-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210609" comment="php53-sysvmsg-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210610" comment="php53-sysvsem-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210611" comment="php53-sysvshm-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210612" comment="php53-tokenizer-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210613" comment="php53-wddx-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210614" comment="php53-xmlreader-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210615" comment="php53-xmlrpc-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210616" comment="php53-xmlwriter-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210617" comment="php53-xsl-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210618" comment="php53-zip-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210619" comment="php53-zlib-5.3.17-112.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9229</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9229" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9229" source="CVE"/>
    <description>
    An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A SIGSEGV occurs in left_adjust_char_head() during regular expression compilation. Invalid handling of reg-&gt;dmax in forward_search_range() could result in an invalid pointer dereference, normally as an immediate denial-of-service condition.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9229.html">CVE-2017-9229</cve>
<bugzilla href="https://bugzilla.suse.com/1068376">SUSE bug 1068376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1069631">SUSE bug 1069631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1069632">SUSE bug 1069632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1076391">SUSE bug 1076391</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210576" comment="apache2-mod_php53-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203344" comment="php53-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210577" comment="php53-bcmath-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210578" comment="php53-bz2-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210579" comment="php53-calendar-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210580" comment="php53-ctype-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210581" comment="php53-curl-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210582" comment="php53-dba-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210583" comment="php53-dom-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210584" comment="php53-exif-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210585" comment="php53-fastcgi-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210586" comment="php53-fileinfo-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210587" comment="php53-ftp-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210588" comment="php53-gd-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210589" comment="php53-gettext-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210590" comment="php53-gmp-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210591" comment="php53-iconv-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210592" comment="php53-intl-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210593" comment="php53-json-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210594" comment="php53-ldap-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210595" comment="php53-mbstring-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210596" comment="php53-mcrypt-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210597" comment="php53-mysql-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210598" comment="php53-odbc-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210599" comment="php53-openssl-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210600" comment="php53-pcntl-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210601" comment="php53-pdo-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210602" comment="php53-pear-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210603" comment="php53-pgsql-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210604" comment="php53-pspell-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210605" comment="php53-shmop-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210606" comment="php53-snmp-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210607" comment="php53-soap-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210608" comment="php53-suhosin-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210609" comment="php53-sysvmsg-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210610" comment="php53-sysvsem-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210611" comment="php53-sysvshm-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210612" comment="php53-tokenizer-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210613" comment="php53-wddx-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210614" comment="php53-xmlreader-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210615" comment="php53-xmlrpc-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210616" comment="php53-xmlwriter-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210617" comment="php53-xsl-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210618" comment="php53-zip-5.3.17-112.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210619" comment="php53-zlib-5.3.17-112.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9233</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9233" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9233" source="CVE"/>
    <description>
    XML External Entity vulnerability in libexpat 2.2.0 and earlier (Expat XML Parser Library) allows attackers to put the parser in an infinite loop using a malformed external entity definition from an external DTD.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9233.html">CVE-2017-9233</cve>
<bugzilla href="https://bugzilla.suse.com/1030296">SUSE bug 1030296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1047236">SUSE bug 1047236</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1073350">SUSE bug 1073350</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123115">SUSE bug 1123115</bugzilla>
<bugzilla href="https://bugzilla.suse.com/983216">SUSE bug 983216</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202513" comment="expat-2.0.1-88.42.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209233" comment="libexpat1-2.0.1-88.42.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209234" comment="libexpat1-32bit-2.0.1-88.42.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9242</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9242" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242" source="CVE"/>
    <description>
    The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel through 4.11.3 is too late in checking whether an overwrite of an skb data structure may occur, which allows local users to cause a denial of service (system crash) via crafted system calls.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9242.html">CVE-2017-9242</cve>
<bugzilla href="https://bugzilla.suse.com/1041431">SUSE bug 1041431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1042892">SUSE bug 1042892</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208691" comment="kernel-bigsmp-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208692" comment="kernel-bigsmp-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208693" comment="kernel-bigsmp-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205592" comment="kernel-default-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205593" comment="kernel-default-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205594" comment="kernel-default-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208694" comment="kernel-default-man-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205595" comment="kernel-ec2-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205596" comment="kernel-ec2-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205597" comment="kernel-ec2-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205598" comment="kernel-pae-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205599" comment="kernel-pae-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205600" comment="kernel-pae-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205601" comment="kernel-source-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205602" comment="kernel-syms-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205603" comment="kernel-trace-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205604" comment="kernel-trace-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205605" comment="kernel-trace-devel-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205606" comment="kernel-xen-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205607" comment="kernel-xen-base-3.0.101-0.47.106.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205608" comment="kernel-xen-devel-3.0.101-0.47.106.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9261</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9261" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9261" source="CVE"/>
    <description>
    In ImageMagick 7.0.5-6 Q16, the ReadMNGImage function in coders/png.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9261.html">CVE-2017-9261</cve>
<bugzilla href="https://bugzilla.suse.com/1043354">SUSE bug 1043354</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202290" comment="ImageMagick-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209126" comment="libMagickCore1-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209127" comment="libMagickCore1-32bit-6.4.3.6-7.78.29 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9262</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9262" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9262" source="CVE"/>
    <description>
    In ImageMagick 7.0.5-6 Q16, the ReadJNGImage function in coders/png.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9262.html">CVE-2017-9262</cve>
<bugzilla href="https://bugzilla.suse.com/1043353">SUSE bug 1043353</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202290" comment="ImageMagick-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209126" comment="libMagickCore1-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209127" comment="libMagickCore1-32bit-6.4.3.6-7.78.29 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9330</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9330" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9330" source="CVE"/>
    <description>
    QEMU (aka Quick Emulator) before 2.9.0, when built with the USB OHCI Emulation support, allows local guest OS users to cause a denial of service (infinite loop) by leveraging an incorrect return value, a different vulnerability than CVE-2017-6505.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9330.html">CVE-2017-9330</cve>
<bugzilla href="https://bugzilla.suse.com/1042159">SUSE bug 1042159</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1042160">SUSE bug 1042160</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1043157">SUSE bug 1043157</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205626" comment="kvm-1.4.2-53.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205972" comment="xen-4.2.5_21-44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209074" comment="xen-doc-html-4.2.5_21-44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209075" comment="xen-doc-pdf-4.2.5_21-44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205973" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.102-44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205974" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.102-44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205975" comment="xen-libs-4.2.5_21-44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209076" comment="xen-libs-32bit-4.2.5_21-44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209077" comment="xen-tools-4.2.5_21-44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205976" comment="xen-tools-domU-4.2.5_21-44 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205626" comment="kvm-1.4.2-53.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250433" comment="xen-4.2.5_21-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250434" comment="xen-doc-html-4.2.5_21-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250435" comment="xen-doc-pdf-4.2.5_21-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250436" comment="xen-kmp-default-4.2.5_21_3.0.101_0.122.TDC-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250437" comment="xen-libs-4.2.5_21-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250438" comment="xen-tools-4.2.5_21-46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250439" comment="xen-tools-domU-4.2.5_21-46 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9343</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9343" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9343" source="CVE"/>
    <description>
    In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the MSNIP dissector misuses a NULL pointer. This was addressed in epan/dissectors/packet-msnip.c by validating an IPv4 address.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9343.html">CVE-2017-9343</cve>
<bugzilla href="https://bugzilla.suse.com/1042309">SUSE bug 1042309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1042324">SUSE bug 1042324</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1042330">SUSE bug 1042330</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1042331">SUSE bug 1042331</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1077080">SUSE bug 1077080</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203589" comment="wireshark-2.0.13-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203591" comment="wireshark-gtk-2.0.13-39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9344</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9344" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9344" source="CVE"/>
    <description>
    In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the Bluetooth L2CAP dissector could divide by zero. This was addressed in epan/dissectors/packet-btl2cap.c by validating an interval value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9344.html">CVE-2017-9344</cve>
<bugzilla href="https://bugzilla.suse.com/1042298">SUSE bug 1042298</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1042324">SUSE bug 1042324</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1042330">SUSE bug 1042330</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1042331">SUSE bug 1042331</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203589" comment="wireshark-2.0.13-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203591" comment="wireshark-gtk-2.0.13-39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9345</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9345" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9345" source="CVE"/>
    <description>
    In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the DNS dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-dns.c by trying to detect self-referencing pointers.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9345.html">CVE-2017-9345</cve>
<bugzilla href="https://bugzilla.suse.com/1042300">SUSE bug 1042300</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1042324">SUSE bug 1042324</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1042330">SUSE bug 1042330</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1042331">SUSE bug 1042331</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203589" comment="wireshark-2.0.13-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203591" comment="wireshark-gtk-2.0.13-39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9346</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9346" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9346" source="CVE"/>
    <description>
    In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the SoulSeek dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-slsk.c by making loop bounds more explicit.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9346.html">CVE-2017-9346</cve>
<bugzilla href="https://bugzilla.suse.com/1042301">SUSE bug 1042301</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1042324">SUSE bug 1042324</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1042330">SUSE bug 1042330</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1042331">SUSE bug 1042331</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203589" comment="wireshark-2.0.13-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203591" comment="wireshark-gtk-2.0.13-39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9347</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9347" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9347" source="CVE"/>
    <description>
    In Wireshark 2.2.0 to 2.2.6, the ROS dissector could crash with a NULL pointer dereference. This was addressed in epan/dissectors/asn1/ros/packet-ros-template.c by validating an OID.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9347.html">CVE-2017-9347</cve>
<bugzilla href="https://bugzilla.suse.com/1042308">SUSE bug 1042308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1042324">SUSE bug 1042324</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1042330">SUSE bug 1042330</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203589" comment="wireshark-2.0.13-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203591" comment="wireshark-gtk-2.0.13-39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9348</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9348" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9348" source="CVE"/>
    <description>
    In Wireshark 2.2.0 to 2.2.6, the DOF dissector could read past the end of a buffer. This was addressed in epan/dissectors/packet-dof.c by validating a size value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9348.html">CVE-2017-9348</cve>
<bugzilla href="https://bugzilla.suse.com/1042303">SUSE bug 1042303</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1042324">SUSE bug 1042324</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1042330">SUSE bug 1042330</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203589" comment="wireshark-2.0.13-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203591" comment="wireshark-gtk-2.0.13-39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9349</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9349" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9349" source="CVE"/>
    <description>
    In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the DICOM dissector has an infinite loop. This was addressed in epan/dissectors/packet-dcm.c by validating a length value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9349.html">CVE-2017-9349</cve>
<bugzilla href="https://bugzilla.suse.com/1042305">SUSE bug 1042305</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1042324">SUSE bug 1042324</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1042330">SUSE bug 1042330</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1042331">SUSE bug 1042331</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203589" comment="wireshark-2.0.13-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203591" comment="wireshark-gtk-2.0.13-39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9350</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9350" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9350" source="CVE"/>
    <description>
    In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the openSAFETY dissector could crash or exhaust system memory. This was addressed in epan/dissectors/packet-opensafety.c by checking for a negative length.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9350.html">CVE-2017-9350</cve>
<bugzilla href="https://bugzilla.suse.com/1042299">SUSE bug 1042299</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1042324">SUSE bug 1042324</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1042330">SUSE bug 1042330</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1042331">SUSE bug 1042331</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049255">SUSE bug 1049255</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1049621">SUSE bug 1049621</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203589" comment="wireshark-2.0.13-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203591" comment="wireshark-gtk-2.0.13-39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9351</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9351" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9351" source="CVE"/>
    <description>
    In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the DHCP dissector could read past the end of a buffer. This was addressed in epan/dissectors/packet-bootp.c by extracting the Vendor Class Identifier more carefully.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9351.html">CVE-2017-9351</cve>
<bugzilla href="https://bugzilla.suse.com/1042302">SUSE bug 1042302</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1042324">SUSE bug 1042324</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1042330">SUSE bug 1042330</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1042331">SUSE bug 1042331</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203589" comment="wireshark-2.0.13-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203591" comment="wireshark-gtk-2.0.13-39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9352</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9352" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9352" source="CVE"/>
    <description>
    In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the Bazaar dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-bzr.c by ensuring that backwards parsing cannot occur.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9352.html">CVE-2017-9352</cve>
<bugzilla href="https://bugzilla.suse.com/1042304">SUSE bug 1042304</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1042324">SUSE bug 1042324</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1042330">SUSE bug 1042330</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1042331">SUSE bug 1042331</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203589" comment="wireshark-2.0.13-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203591" comment="wireshark-gtk-2.0.13-39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9353</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9353" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9353" source="CVE"/>
    <description>
    In Wireshark 2.2.0 to 2.2.6, the IPv6 dissector could crash. This was addressed in epan/dissectors/packet-ipv6.c by validating an IPv6 address.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9353.html">CVE-2017-9353</cve>
<bugzilla href="https://bugzilla.suse.com/1042306">SUSE bug 1042306</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1042324">SUSE bug 1042324</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1042330">SUSE bug 1042330</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203589" comment="wireshark-2.0.13-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203591" comment="wireshark-gtk-2.0.13-39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9354</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9354" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9354" source="CVE"/>
    <description>
    In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the RGMP dissector could crash. This was addressed in epan/dissectors/packet-rgmp.c by validating an IPv4 address.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9354.html">CVE-2017-9354</cve>
<bugzilla href="https://bugzilla.suse.com/1042307">SUSE bug 1042307</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1042324">SUSE bug 1042324</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1042330">SUSE bug 1042330</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1042331">SUSE bug 1042331</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203589" comment="wireshark-2.0.13-39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203591" comment="wireshark-gtk-2.0.13-39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9373</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9373" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9373" source="CVE"/>
    <description>
    Memory leak in QEMU (aka Quick Emulator), when built with IDE AHCI Emulation support, allows local guest OS privileged users to cause a denial of service (memory consumption) by repeatedly hot-unplugging the AHCI device.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9373.html">CVE-2017-9373</cve>
<bugzilla href="https://bugzilla.suse.com/1042801">SUSE bug 1042801</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205626" comment="kvm-1.4.2-53.11 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9375</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9375" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9375" source="CVE"/>
    <description>
    QEMU (aka Quick Emulator), when built with USB xHCI controller emulator support, allows local guest OS privileged users to cause a denial of service (infinite recursive call) via vectors involving control transfer descriptors sequencing.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9375.html">CVE-2017-9375</cve>
<bugzilla href="https://bugzilla.suse.com/1042800">SUSE bug 1042800</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205626" comment="kvm-1.4.2-53.11 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9405</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9405" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9405" source="CVE"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadICONImage function in icon.c:452 allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9405.html">CVE-2017-9405</cve>
<bugzilla href="https://bugzilla.suse.com/1042911">SUSE bug 1042911</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202304" comment="ImageMagick-6.4.3.6-7.78.37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209130" comment="libMagickCore1-6.4.3.6-7.78.37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209131" comment="libMagickCore1-32bit-6.4.3.6-7.78.37 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9407</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9407" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9407" source="CVE"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadPALMImage function in palm.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9407.html">CVE-2017-9407</cve>
<bugzilla href="https://bugzilla.suse.com/1042824">SUSE bug 1042824</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202297" comment="ImageMagick-6.4.3.6-7.78.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209128" comment="libMagickCore1-6.4.3.6-7.78.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209129" comment="libMagickCore1-32bit-6.4.3.6-7.78.34 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9409</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9409" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9409" source="CVE"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadMPCImage function in mpc.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9409.html">CVE-2017-9409</cve>
<bugzilla href="https://bugzilla.suse.com/1042948">SUSE bug 1042948</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202283" comment="ImageMagick-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209124" comment="libMagickCore1-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209125" comment="libMagickCore1-32bit-6.4.3.6-7.78.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9439</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9439" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9439" source="CVE"/>
    <description>
    In ImageMagick 7.0.5-5, a memory leak was found in the function ReadPDBImage in coders/pdb.c, which allows attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9439.html">CVE-2017-9439</cve>
<bugzilla href="https://bugzilla.suse.com/1042826">SUSE bug 1042826</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202255" comment="ImageMagick-6.4.3.6-7.78.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209116" comment="libMagickCore1-6.4.3.6-7.78.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209117" comment="libMagickCore1-32bit-6.4.3.6-7.78.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9500</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9500" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9500" source="CVE"/>
    <description>
    In ImageMagick 7.0.5-8 Q16, an assertion failure was found in the function ResetImageProfileIterator, which allows attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9500.html">CVE-2017-9500</cve>
<bugzilla href="https://bugzilla.suse.com/1043290">SUSE bug 1043290</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202311" comment="ImageMagick-6.4.3.6-78.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209132" comment="libMagickCore1-6.4.3.6-78.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209133" comment="libMagickCore1-32bit-6.4.3.6-78.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9501</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9501" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9501" source="CVE"/>
    <description>
    In ImageMagick 7.0.5-7 Q16, an assertion failure was found in the function LockSemaphoreInfo, which allows attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9501.html">CVE-2017-9501</cve>
<bugzilla href="https://bugzilla.suse.com/1043289">SUSE bug 1043289</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202255" comment="ImageMagick-6.4.3.6-7.78.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209116" comment="libMagickCore1-6.4.3.6-7.78.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209117" comment="libMagickCore1-32bit-6.4.3.6-7.78.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9503</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9503" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9503" source="CVE"/>
    <description>
    QEMU (aka Quick Emulator), when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving megasas command processing.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9503.html">CVE-2017-9503</cve>
<bugzilla href="https://bugzilla.suse.com/1043296">SUSE bug 1043296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1043297">SUSE bug 1043297</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1043312">SUSE bug 1043312</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205626" comment="kvm-1.4.2-53.11 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9611</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9611" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611" source="CVE"/>
    <description>
    The Ins_MIRP function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9611.html">CVE-2017-9611</cve>
<bugzilla href="https://bugzilla.suse.com/1050893">SUSE bug 1050893</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009237955" comment="ghostscript-fonts-other-8.62-32.47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237956" comment="ghostscript-fonts-rus-8.62-32.47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237957" comment="ghostscript-fonts-std-8.62-32.47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237953" comment="ghostscript-library-8.62-32.47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237958" comment="ghostscript-omni-8.62-32.47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237959" comment="ghostscript-x11-8.62-32.47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237960" comment="libgimpprint-4.2.7-32.47.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9612</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9612" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612" source="CVE"/>
    <description>
    The Ins_IP function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact via a crafted document.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9612.html">CVE-2017-9612</cve>
<bugzilla href="https://bugzilla.suse.com/1050891">SUSE bug 1050891</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209272" comment="ghostscript-fonts-other-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209273" comment="ghostscript-fonts-rus-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209274" comment="ghostscript-fonts-std-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202638" comment="ghostscript-library-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209275" comment="ghostscript-omni-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209276" comment="ghostscript-x11-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209277" comment="libgimpprint-4.2.7-32.47.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9617</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9617" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9617" source="CVE"/>
    <description>
    In Wireshark 2.2.7, deeply nested DAAP data may cause stack exhaustion (uncontrolled recursion) in the dissect_daap_one_tag function in epan/dissectors/packet-daap.c in the DAAP dissector.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9617.html">CVE-2017-9617</cve>
<bugzilla href="https://bugzilla.suse.com/1044417">SUSE bug 1044417</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203595" comment="libsmi-0.4.5-2.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203596" comment="libwireshark8-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203597" comment="libwiretap6-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203598" comment="libwscodecs1-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203599" comment="libwsutil7-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203600" comment="portaudio-19-234.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203602" comment="wireshark-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203604" comment="wireshark-gtk-2.2.11-40.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9726</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9726" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726" source="CVE"/>
    <description>
    The Ins_MDRP function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9726.html">CVE-2017-9726</cve>
<bugzilla href="https://bugzilla.suse.com/1050889">SUSE bug 1050889</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209272" comment="ghostscript-fonts-other-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209273" comment="ghostscript-fonts-rus-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209274" comment="ghostscript-fonts-std-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202638" comment="ghostscript-library-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209275" comment="ghostscript-omni-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209276" comment="ghostscript-x11-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209277" comment="libgimpprint-4.2.7-32.47.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9727</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9727" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727" source="CVE"/>
    <description>
    The gx_ttfReader__Read function in base/gxttfb.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9727.html">CVE-2017-9727</cve>
<bugzilla href="https://bugzilla.suse.com/1050888">SUSE bug 1050888</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209272" comment="ghostscript-fonts-other-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209273" comment="ghostscript-fonts-rus-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209274" comment="ghostscript-fonts-std-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202638" comment="ghostscript-library-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209275" comment="ghostscript-omni-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209276" comment="ghostscript-x11-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209277" comment="libgimpprint-4.2.7-32.47.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9739</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9739" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739" source="CVE"/>
    <description>
    The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9739.html">CVE-2017-9739</cve>
<bugzilla href="https://bugzilla.suse.com/1050887">SUSE bug 1050887</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209272" comment="ghostscript-fonts-other-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209273" comment="ghostscript-fonts-rus-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209274" comment="ghostscript-fonts-std-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202638" comment="ghostscript-library-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209275" comment="ghostscript-omni-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209276" comment="ghostscript-x11-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209277" comment="libgimpprint-4.2.7-32.47.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9766</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9766" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9766" source="CVE"/>
    <description>
    In Wireshark 2.2.7, PROFINET IO data with a high recursion depth allows remote attackers to cause a denial of service (stack exhaustion) in the dissect_IODWriteReq function in plugins/profinet/packet-dcerpc-pn-io.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9766.html">CVE-2017-9766</cve>
<bugzilla href="https://bugzilla.suse.com/1045341">SUSE bug 1045341</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203595" comment="libsmi-0.4.5-2.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203596" comment="libwireshark8-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203597" comment="libwiretap6-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203598" comment="libwscodecs1-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203599" comment="libwsutil7-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203600" comment="portaudio-19-234.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203602" comment="wireshark-2.2.11-40.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203604" comment="wireshark-gtk-2.2.11-40.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9788</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9788" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9788" source="CVE"/>
    <description>
    In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type 'Digest' was not initialized or reset before or between successive key=value assignments by mod_auth_digest. Providing an initial key with no '=' assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault in other cases resulting in denial of service.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9788.html">CVE-2017-9788</cve>
<bugzilla href="https://bugzilla.suse.com/1048576">SUSE bug 1048576</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1052635">SUSE bug 1052635</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1060041">SUSE bug 1060041</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202400" comment="apache2-2.2.34-70.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202402" comment="apache2-doc-2.2.34-70.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202403" comment="apache2-example-pages-2.2.34-70.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202404" comment="apache2-prefork-2.2.34-70.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202405" comment="apache2-utils-2.2.34-70.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202406" comment="apache2-worker-2.2.34-70.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9798</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9798" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9798" source="CVE"/>
    <description>
    Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user's .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27. The attacker sends an unauthenticated OPTIONS HTTP request when attempting to read secret data. This is a use-after-free issue and thus secret data is not always sent, and the specific data depends on many factors including configuration. Exploitation with .htaccess can be blocked with a patch to the ap_limit_section function in server/core.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9798.html">CVE-2017-9798</cve>
<bugzilla href="https://bugzilla.suse.com/1058058">SUSE bug 1058058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1060757">SUSE bug 1060757</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1077582">SUSE bug 1077582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1078450">SUSE bug 1078450</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1089997">SUSE bug 1089997</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1095150">SUSE bug 1095150</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202407" comment="apache2-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202408" comment="apache2-devel-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202409" comment="apache2-doc-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202410" comment="apache2-example-pages-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202411" comment="apache2-prefork-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202412" comment="apache2-utils-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202413" comment="apache2-worker-2.2.34-70.12 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202407" comment="apache2-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202409" comment="apache2-doc-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202410" comment="apache2-example-pages-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202411" comment="apache2-prefork-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202412" comment="apache2-utils-2.2.34-70.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202413" comment="apache2-worker-2.2.34-70.12 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9814" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9814" source="CVE"/>
    <description>
    cairo-truetype-subset.c in cairo 1.15.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds read) because of mishandling of an unexpected malloc(0) call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9814.html">CVE-2017-9814</cve>
<bugzilla href="https://bugzilla.suse.com/1049092">SUSE bug 1049092</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202469" comment="cairo-1.8.8-2.3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209188" comment="cairo-32bit-1.8.8-2.3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202472" comment="cairo-doc-1.8.8-2.3.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835" source="CVE"/>
    <description>
    The gs_alloc_ref_array function in psi/ialloc.c in Artifex Ghostscript 9.21 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted PostScript document. This is related to a lack of an integer overflow check in base/gsalloc.c.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9835.html">CVE-2017-9835</cve>
<bugzilla href="https://bugzilla.suse.com/1050879">SUSE bug 1050879</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209272" comment="ghostscript-fonts-other-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209273" comment="ghostscript-fonts-rus-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209274" comment="ghostscript-fonts-std-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202638" comment="ghostscript-library-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209275" comment="ghostscript-omni-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209276" comment="ghostscript-x11-8.62-32.47.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209277" comment="libgimpprint-4.2.7-32.47.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9935</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2017-9935" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9935" source="CVE"/>
    <description>
    In LibTIFF 4.0.8, there is a heap-based buffer overflow in the t2p_write_pdf function in tools/tiff2pdf.c. This heap overflow could lead to different damages. For example, a crafted TIFF document can lead to an out-of-bounds read in TIFFCleanup, an invalid free in TIFFClose or t2p_free, memory corruption in t2p_readwrite_pdf_image, or a double free in t2p_free. Given these possibilities, it probably could cause arbitrary code execution.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-9935.html">CVE-2017-9935</cve>
<bugzilla href="https://bugzilla.suse.com/1046077">SUSE bug 1046077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1074318">SUSE bug 1074318</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1108606">SUSE bug 1108606</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1110358">SUSE bug 1110358</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009238088" comment="libtiff3-3.8.2-141.169.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238089" comment="libtiff3-32bit-3.8.2-141.169.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238087" comment="tiff-3.8.2-141.169.19 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20180202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-0202</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-0202" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0202" source="CVE"/>
    <description>
    clamscan in ClamAV before 0.99.4 contains a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation checking mechanisms when handling Portable Document Format (.pdf) files sent to an affected device. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted .pdf file to an affected device. This action could cause an out-of-bounds read when ClamAV scans the malicious file, allowing the attacker to cause a DoS condition. This concerns pdf_parse_array and pdf_parse_string in libclamav/pdfng.c. Cisco Bug IDs: CSCvh91380, CSCvh91400.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-0202.html">CVE-2018-0202</cve>
<bugzilla href="https://bugzilla.suse.com/1083915">SUSE bug 1083915</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205314" comment="clamav-0.99.4-0.20.7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20180360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-0360</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-0360" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0360" source="CVE"/>
    <description>
    ClamAV before 0.100.1 has an HWP integer overflow with a resultant infinite loop via a crafted Hangul Word Processor file. This is in parsehwp3_paragraph() in libclamav/hwp.c.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-0360.html">CVE-2018-0360</cve>
<bugzilla href="https://bugzilla.suse.com/1101410">SUSE bug 1101410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1103091">SUSE bug 1103091</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1103092">SUSE bug 1103092</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1103099">SUSE bug 1103099</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009231494" comment="clamav-0.100.1-0.20.15 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20180361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-0361</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-0361" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0361" source="CVE"/>
    <description>
    ClamAV before 0.100.1 lacks a PDF object length check, resulting in an unreasonably long time to parse a relatively small file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-0361.html">CVE-2018-0361</cve>
<bugzilla href="https://bugzilla.suse.com/1101410">SUSE bug 1101410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1101412">SUSE bug 1101412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1103091">SUSE bug 1103091</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1103092">SUSE bug 1103092</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1103099">SUSE bug 1103099</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009231494" comment="clamav-0.100.1-0.20.15 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20180494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-0494</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-0494" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0494" source="CVE"/>
    <description>
    GNU Wget before 1.19.5 is prone to a cookie injection vulnerability in the resp_new function in http.c via a \r\n sequence in a continuation line.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-0494.html">CVE-2018-0494</cve>
<bugzilla href="https://bugzilla.suse.com/1092061">SUSE bug 1092061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123797">SUSE bug 1123797</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210873" comment="wget-1.11.4-1.41.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203815" comment="wget-openssl1-1.11.4-1.41.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20180618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-0618</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-0618" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0618" source="CVE"/>
    <description>
    Cross-site scripting vulnerability in Mailman 2.1.26 and earlier allows remote authenticated attackers to inject arbitrary web script or HTML via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-0618.html">CVE-2018-0618</cve>
<bugzilla href="https://bugzilla.suse.com/1099510">SUSE bug 1099510</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009242811" comment="mailman-2.1.15-9.6.6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20180732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-0732</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-0732" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0732" source="CVE"/>
    <description>
    During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-0732.html">CVE-2018-0732</cve>
<bugzilla href="https://bugzilla.suse.com/1077628">SUSE bug 1077628</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1097158">SUSE bug 1097158</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1099502">SUSE bug 1099502</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1106692">SUSE bug 1106692</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1108542">SUSE bug 1108542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1112097">SUSE bug 1112097</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1122198">SUSE bug 1122198</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009231336" comment="libopenssl-devel-0.9.8j-0.106.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009231339" comment="libopenssl0_9_8-0.9.8j-0.106.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009231342" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009231340" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009231343" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009231338" comment="openssl-0.9.8j-0.106.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009231341" comment="openssl-doc-0.9.8j-0.106.12 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009231339" comment="libopenssl0_9_8-0.9.8j-0.106.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009231342" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009231340" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009231343" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233691" comment="libopenssl1-devel-1.0.1g-0.58.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248703" comment="libopenssl1-devel-32bit-1.0.1g-0.58.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233692" comment="libopenssl1_0_0-1.0.1g-0.58.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233693" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009231338" comment="openssl-0.9.8j-0.106.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009231341" comment="openssl-doc-0.9.8j-0.106.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233695" comment="openssl1-1.0.1g-0.58.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233696" comment="openssl1-doc-1.0.1g-0.58.12 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20180734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-0734</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-0734" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0734" source="CVE"/>
    <description>
    The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-0734.html">CVE-2018-0734</cve>
<bugzilla href="https://bugzilla.suse.com/1113534">SUSE bug 1113534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1113652">SUSE bug 1113652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1113742">SUSE bug 1113742</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1122198">SUSE bug 1122198</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1122212">SUSE bug 1122212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009242428" comment="libopenssl-devel-0.9.8j-0.106.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009242431" comment="libopenssl0_9_8-0.9.8j-0.106.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009242434" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009242432" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009242435" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009242430" comment="openssl-0.9.8j-0.106.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009242433" comment="openssl-doc-0.9.8j-0.106.18 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009242431" comment="libopenssl0_9_8-0.9.8j-0.106.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009242434" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009242432" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009242435" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240955" comment="libopenssl1-devel-1.0.1g-0.58.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248704" comment="libopenssl1-devel-32bit-1.0.1g-0.58.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240956" comment="libopenssl1_0_0-1.0.1g-0.58.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240957" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009242430" comment="openssl-0.9.8j-0.106.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009242433" comment="openssl-doc-0.9.8j-0.106.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240959" comment="openssl1-1.0.1g-0.58.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240960" comment="openssl1-doc-1.0.1g-0.58.15 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20180737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-0737</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-0737" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0737" source="CVE"/>
    <description>
    The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-0737.html">CVE-2018-0737</cve>
<bugzilla href="https://bugzilla.suse.com/1089039">SUSE bug 1089039</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1089041">SUSE bug 1089041</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1089044">SUSE bug 1089044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1089045">SUSE bug 1089045</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1108542">SUSE bug 1108542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123780">SUSE bug 1123780</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009233298" comment="libopenssl0_9_8-0.9.8j-0.106.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233299" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233300" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233301" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233691" comment="libopenssl1-devel-1.0.1g-0.58.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248703" comment="libopenssl1-devel-32bit-1.0.1g-0.58.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233692" comment="libopenssl1_0_0-1.0.1g-0.58.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233693" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233297" comment="openssl-0.9.8j-0.106.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233303" comment="openssl-doc-0.9.8j-0.106.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233695" comment="openssl1-1.0.1g-0.58.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233696" comment="openssl1-doc-1.0.1g-0.58.12 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20180739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-0739</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-0739" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0739" source="CVE"/>
    <description>
    Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7) could eventually exceed the stack given malicious input with excessive recursion. This could result in a Denial Of Service attack. There are no such structures used within SSL/TLS that come from untrusted sources so this is considered safe. Fixed in OpenSSL 1.1.0h (Affected 1.1.0-1.1.0g). Fixed in OpenSSL 1.0.2o (Affected 1.0.2b-1.0.2n).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-0739.html">CVE-2018-0739</cve>
<bugzilla href="https://bugzilla.suse.com/1087102">SUSE bug 1087102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1089997">SUSE bug 1089997</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1108542">SUSE bug 1108542</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210153" comment="libopenssl0_9_8-0.9.8j-0.106.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210154" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210155" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210156" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203802" comment="libopenssl1-devel-1.0.1g-0.58.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248702" comment="libopenssl1-devel-32bit-1.0.1g-0.58.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203803" comment="libopenssl1_0_0-1.0.1g-0.58.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203804" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203234" comment="openssl-0.9.8j-0.106.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210158" comment="openssl-doc-0.9.8j-0.106.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203806" comment="openssl1-1.0.1g-0.58.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203807" comment="openssl1-doc-1.0.1g-0.58.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000001</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-1000001" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000001" source="CVE"/>
    <description>
    In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpath() which can be used to write before the destination buffer leading to a buffer underflow and potential code execution.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-1000001.html">CVE-2018-1000001</cve>
<bugzilla href="https://bugzilla.suse.com/1074293">SUSE bug 1074293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1099047">SUSE bug 1099047</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202700" comment="glibc-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208522" comment="glibc-32bit-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205358" comment="glibc-devel-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208523" comment="glibc-devel-32bit-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202701" comment="glibc-html-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205359" comment="glibc-i18ndata-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202702" comment="glibc-info-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205360" comment="glibc-locale-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208524" comment="glibc-locale-32bit-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205361" comment="glibc-profile-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208525" comment="glibc-profile-32bit-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205362" comment="nscd-2.11.3-17.110.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000004</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-1000004" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004" source="CVE"/>
    <description>
    In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-1000004.html">CVE-2018-1000004</cve>
<bugzilla href="https://bugzilla.suse.com/1076017">SUSE bug 1076017</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208665" comment="kernel-bigsmp-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208666" comment="kernel-bigsmp-base-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208667" comment="kernel-bigsmp-devel-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205541" comment="kernel-default-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205542" comment="kernel-default-base-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205543" comment="kernel-default-devel-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208668" comment="kernel-default-man-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205544" comment="kernel-ec2-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205545" comment="kernel-ec2-base-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205546" comment="kernel-ec2-devel-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205547" comment="kernel-pae-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205548" comment="kernel-pae-base-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205549" comment="kernel-pae-devel-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205550" comment="kernel-source-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205551" comment="kernel-syms-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205552" comment="kernel-trace-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205553" comment="kernel-trace-base-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205554" comment="kernel-trace-devel-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205555" comment="kernel-xen-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205556" comment="kernel-xen-base-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205557" comment="kernel-xen-devel-3.0.101-0.47.106.19 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000007</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-1000007" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000007" source="CVE"/>
    <description>
    libcurl 7.1 through 7.57.0 might accidentally leak authentication data to third parties. When asked to send custom headers in its HTTP requests, libcurl will send that set of headers first to the host in the initial URL but also, if asked to follow redirects and a 30X HTTP response code is returned, to the host mentioned in URL in the `Location:` response header value. Sending the same set of headers to subsequent hosts is in particular a problem for applications that pass on custom `Authorization:` headers, as this header often contains privacy sensitive information or data that could allow others to impersonate the libcurl-using client's request.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-1000007.html">CVE-2018-1000007</cve>
<bugzilla href="https://bugzilla.suse.com/1077001">SUSE bug 1077001</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1145903">SUSE bug 1145903</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202487" comment="curl-7.19.7-1.70.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203729" comment="curl-openssl1-7.19.7-1.70.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209210" comment="libcurl4-7.19.7-1.70.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209211" comment="libcurl4-32bit-7.19.7-1.70.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203730" comment="libcurl4-openssl1-7.19.7-1.70.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203731" comment="libcurl4-openssl1-32bit-7.19.7-1.70.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000024</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-1000024" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000024" source="CVE"/>
    <description>
    The Squid Software Foundation Squid HTTP Caching Proxy version 3.0 to 3.5.27, 4.0 to 4.0.22 contains a Incorrect Pointer Handling vulnerability in ESI Response Processing that can result in Denial of Service for all clients using the proxy.. This attack appear to be exploitable via Remote server delivers an HTTP response payload containing valid but unusual ESI syntax.. This vulnerability appears to have been fixed in 4.0.23 and later.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-1000024.html">CVE-2018-1000024</cve>
<bugzilla href="https://bugzilla.suse.com/1077003">SUSE bug 1077003</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210808" comment="squid3-3.1.23-8.16.37.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000027</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-1000027" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000027" source="CVE"/>
    <description>
    The Squid Software Foundation Squid HTTP Caching Proxy version prior to version 4.0.23 contains a NULL Pointer Dereference vulnerability in HTTP Response X-Forwarded-For header processing that can result in Denial of Service to all clients of the proxy. This attack appear to be exploitable via Remote HTTP server responding with an X-Forwarded-For header to certain types of HTTP request. This vulnerability appears to have been fixed in 4.0.23 and later.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-1000027.html">CVE-2018-1000027</cve>
<bugzilla href="https://bugzilla.suse.com/1077006">SUSE bug 1077006</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210808" comment="squid3-3.1.23-8.16.37.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000030</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-1000030" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000030" source="CVE"/>
    <description>
    Python 2.7.14 is vulnerable to a Heap-Buffer-Overflow as well as a Heap-Use-After-Free. Python versions prior to 2.7.14 may also be vulnerable and it appears that Python 2.7.17 and prior may also be vulnerable however this has not been confirmed. The vulnerability lies when multiply threads are handling large amounts of data. In both cases there is essentially a race condition that occurs. For the Heap-Buffer-Overflow, Thread 2 is creating the size for a buffer, but Thread1 is already writing to the buffer without knowing how much to write. So when a large amount of data is being processed, it is very easy to cause memory corruption using a Heap-Buffer-Overflow. As for the Use-After-Free, Thread3-&gt;Malloc-&gt;Thread1-&gt;Free's-&gt;Thread2-Re-uses-Free'd Memory. The PSRT has stated that this is not a security vulnerability due to the fact that the attacker must be able to run code, however in some situations, such as function as a service, this vulnerability can potentially be used by an attacker to violate a trust boundary, as such the DWF feels this issue deserves a CVE.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-1000030.html">CVE-2018-1000030</cve>
<bugzilla href="https://bugzilla.suse.com/1079300">SUSE bug 1079300</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009249543" comment="libpython2_7-1_0-2.7.9-6.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249544" comment="libpython2_7-1_0-32bit-2.7.9-6.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249545" comment="python27-2.7.9-6.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249546" comment="python27-32bit-2.7.9-6.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249547" comment="python27-base-2.7.9-6.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249548" comment="python27-base-32bit-2.7.9-6.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249549" comment="python27-curses-2.7.9-6.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249550" comment="python27-demo-2.7.9-6.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249551" comment="python27-devel-2.7.9-6.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249552" comment="python27-doc-2.7.9-6.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249553" comment="python27-doc-pdf-2.7.9-6.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249554" comment="python27-gdbm-2.7.9-6.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249555" comment="python27-idle-2.7.9-6.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249556" comment="python27-tk-2.7.9-6.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249557" comment="python27-xml-2.7.9-6.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000035</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-1000035" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000035" source="CVE"/>
    <description>
    A heap-based buffer overflow exists in Info-Zip UnZip version &lt;= 6.00 in the processing of password-protected archives that allows an attacker to perform a denial of service or to possibly achieve code execution.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-1000035.html">CVE-2018-1000035</cve>
<bugzilla href="https://bugzilla.suse.com/1076531">SUSE bug 1076531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1080074">SUSE bug 1080074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1149684">SUSE bug 1149684</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210861" comment="unzip-6.00-11.18.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000085</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-1000085" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000085" source="CVE"/>
    <description>
    ClamAV version version 0.99.3 contains a Out of bounds heap memory read vulnerability in XAR parser, function xar_hash_check() that can result in Leaking of memory, may help in developing exploit chains.. This attack appear to be exploitable via The victim must scan a crafted XAR file. This vulnerability appears to have been fixed in after commit d96a6b8bcc7439fa7e3876207aa0a8e79c8451b6.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-1000085.html">CVE-2018-1000085</cve>
<bugzilla href="https://bugzilla.suse.com/1082858">SUSE bug 1082858</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1083915">SUSE bug 1083915</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205314" comment="clamav-0.99.4-0.20.7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000120</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-1000120" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000120" source="CVE"/>
    <description>
    A buffer overflow exists in curl 7.12.3 to and including curl 7.58.0 in the FTP URL handling that allows an attacker to cause a denial of service or worse.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-1000120.html">CVE-2018-1000120</cve>
<bugzilla href="https://bugzilla.suse.com/1084521">SUSE bug 1084521</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1101811">SUSE bug 1101811</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1112526">SUSE bug 1112526</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202489" comment="curl-7.37.0-70.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203732" comment="curl-openssl1-7.37.0-70.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205316" comment="libcurl4-7.37.0-70.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208455" comment="libcurl4-32bit-7.37.0-70.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203733" comment="libcurl4-openssl1-7.37.0-70.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203734" comment="libcurl4-openssl1-32bit-7.37.0-70.27 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000121</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-1000121" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000121" source="CVE"/>
    <description>
    A NULL pointer dereference exists in curl 7.21.0 to and including curl 7.58.0 in the LDAP code that allows an attacker to cause a denial of service
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-1000121.html">CVE-2018-1000121</cve>
<bugzilla href="https://bugzilla.suse.com/1084524">SUSE bug 1084524</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1085215">SUSE bug 1085215</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1101811">SUSE bug 1101811</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1112526">SUSE bug 1112526</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202489" comment="curl-7.37.0-70.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203732" comment="curl-openssl1-7.37.0-70.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205316" comment="libcurl4-7.37.0-70.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208455" comment="libcurl4-32bit-7.37.0-70.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203733" comment="libcurl4-openssl1-7.37.0-70.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203734" comment="libcurl4-openssl1-32bit-7.37.0-70.27 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000122</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-1000122" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000122" source="CVE"/>
    <description>
    A buffer over-read exists in curl 7.20.0 to and including curl 7.58.0 in the RTSP+RTP handling code that allows an attacker to cause a denial of service or information leakage
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-1000122.html">CVE-2018-1000122</cve>
<bugzilla href="https://bugzilla.suse.com/1084532">SUSE bug 1084532</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1101811">SUSE bug 1101811</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1112526">SUSE bug 1112526</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202489" comment="curl-7.37.0-70.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203732" comment="curl-openssl1-7.37.0-70.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205316" comment="libcurl4-7.37.0-70.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208455" comment="libcurl4-32bit-7.37.0-70.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203733" comment="libcurl4-openssl1-7.37.0-70.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203734" comment="libcurl4-openssl1-32bit-7.37.0-70.27 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000156</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-1000156" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000156" source="CVE"/>
    <description>
    GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via the patch utility. This is similar to FreeBSD's CVE-2015-1418 however although they share a common ancestry the code bases have diverged over time.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-1000156.html">CVE-2018-1000156</cve>
<bugzilla href="https://bugzilla.suse.com/1088420">SUSE bug 1088420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093615">SUSE bug 1093615</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1101128">SUSE bug 1101128</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1142513">SUSE bug 1142513</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205697" comment="patch-2.5.9-252.22.7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000199</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-1000199" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199" source="CVE"/>
    <description>
    The Linux Kernel version 3.18 contains a dangerous feature vulnerability in modify_user_hw_breakpoint() that can result in crash and possibly memory corruption. This attack appear to be exploitable via local code execution and the ability to use ptrace. This vulnerability appears to have been fixed in git commit f67b15037a7a50c57f72e69a6d59941ad90a0f0f.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-1000199.html">CVE-2018-1000199</cve>
<bugzilla href="https://bugzilla.suse.com/1089895">SUSE bug 1089895</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1090036">SUSE bug 1090036</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208669" comment="kernel-bigsmp-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208670" comment="kernel-bigsmp-base-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208671" comment="kernel-bigsmp-devel-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205558" comment="kernel-default-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205559" comment="kernel-default-base-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205560" comment="kernel-default-devel-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208672" comment="kernel-default-man-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205561" comment="kernel-ec2-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205562" comment="kernel-ec2-base-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205563" comment="kernel-ec2-devel-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205564" comment="kernel-pae-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205565" comment="kernel-pae-base-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205566" comment="kernel-pae-devel-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205567" comment="kernel-source-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205568" comment="kernel-syms-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205569" comment="kernel-trace-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205570" comment="kernel-trace-base-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205571" comment="kernel-trace-devel-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205572" comment="kernel-xen-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205573" comment="kernel-xen-base-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205574" comment="kernel-xen-devel-3.0.101-0.47.106.29 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000204</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-1000204" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000204" source="CVE"/>
    <description>
    ** DISPUTED ** Linux Kernel version 3.18 to 4.16 incorrectly handles an SG_IO ioctl on /dev/sg0 with dxfer_direction=SG_DXFER_FROM_DEV and an empty 6-byte cmdp. This may lead to copying up to 1000 kernel heap pages to the userspace. This has been fixed upstream in https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824 already. The problem has limited scope, as users don't usually have permissions to access SCSI devices. On the other hand, e.g. the Nero user manual suggests doing `chmod o+r+w /dev/sg*` to make the devices accessible. NOTE: third parties dispute the relevance of this report, noting that the requirement for an attacker to have both the CAP_SYS_ADMIN and CAP_SYS_RAWIO capabilities makes it "virtually impossible to exploit."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-1000204.html">CVE-2018-1000204</cve>
<bugzilla href="https://bugzilla.suse.com/1096728">SUSE bug 1096728</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1105412">SUSE bug 1105412</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009232611" comment="kernel-bigsmp-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232612" comment="kernel-bigsmp-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232613" comment="kernel-bigsmp-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232594" comment="kernel-default-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232595" comment="kernel-default-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232596" comment="kernel-default-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232614" comment="kernel-default-man-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232597" comment="kernel-ec2-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232598" comment="kernel-ec2-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232599" comment="kernel-ec2-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232600" comment="kernel-pae-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232601" comment="kernel-pae-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232602" comment="kernel-pae-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232603" comment="kernel-source-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232604" comment="kernel-syms-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232605" comment="kernel-trace-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232606" comment="kernel-trace-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232607" comment="kernel-trace-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232608" comment="kernel-xen-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232609" comment="kernel-xen-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232610" comment="kernel-xen-devel-3.0.101-0.47.106.43 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000301</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-1000301" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000301" source="CVE"/>
    <description>
    curl version curl 7.20.0 to and including curl 7.59.0 contains a CWE-126: Buffer Over-read vulnerability in denial of service that can result in curl can be tricked into reading data beyond the end of a heap based buffer used to store downloaded RTSP content.. This vulnerability appears to have been fixed in curl &lt; 7.20.0 and curl &gt;= 7.60.0.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-1000301.html">CVE-2018-1000301</cve>
<bugzilla href="https://bugzilla.suse.com/1092098">SUSE bug 1092098</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1122464">SUSE bug 1122464</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202491" comment="curl-7.37.0-70.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203736" comment="curl-openssl1-7.37.0-70.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209213" comment="libcurl4-7.37.0-70.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209214" comment="libcurl4-32bit-7.37.0-70.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203737" comment="libcurl4-openssl1-7.37.0-70.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203738" comment="libcurl4-openssl1-32bit-7.37.0-70.30 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000654</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-1000654" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654" source="CVE"/>
    <description>
    GNU Libtasn1-4.13 libtasn1-4.13 version libtasn1-4.13, libtasn1-4.12 contains a DoS, specifically CPU usage will reach 100% when running asn1Paser against the POC due to an issue in _asn1_expand_object_id(p_tree), after a long time, the program will be killed. This attack appears to be exploitable via parsing a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-1000654.html">CVE-2018-1000654</cve>
<bugzilla href="https://bugzilla.suse.com/1105435">SUSE bug 1105435</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009254570" comment="libtasn1-1.5-1.35.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254571" comment="libtasn1-3-1.5-1.35.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254572" comment="libtasn1-3-32bit-1.5-1.35.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000802</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-1000802" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000802" source="CVE"/>
    <description>
    Python Software Foundation Python (CPython) version 2.7 contains a CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in shutil module (make_archive function) that can result in Denial of service, Information gain via injection of arbitrary files on the system or entire drive. This attack appear to be exploitable via Passage of unfiltered user input to the function. This vulnerability appears to have been fixed in after commit add531a1e55b0a739b0f42582f1c9747e5649ace.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-1000802.html">CVE-2018-1000802</cve>
<bugzilla href="https://bugzilla.suse.com/1109663">SUSE bug 1109663</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009249573" comment="libpython2_7-1_0-2.7.9-6.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249574" comment="libpython2_7-1_0-32bit-2.7.9-6.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249575" comment="python27-2.7.9-6.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249576" comment="python27-32bit-2.7.9-6.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249577" comment="python27-base-2.7.9-6.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249578" comment="python27-base-32bit-2.7.9-6.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249579" comment="python27-curses-2.7.9-6.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249580" comment="python27-demo-2.7.9-6.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249581" comment="python27-devel-2.7.9-6.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249582" comment="python27-doc-2.7.9-6.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249583" comment="python27-doc-pdf-2.7.9-6.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249584" comment="python27-gdbm-2.7.9-6.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249585" comment="python27-idle-2.7.9-6.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249586" comment="python27-tk-2.7.9-6.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249587" comment="python27-xml-2.7.9-6.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000845</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-1000845" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000845" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultID: CVE-2017-6519.  Reason: This candidate is a duplicate of CVE-2017-6519.  Notes: All CVE users should reference CVE-2017-6519 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-1000845.html">CVE-2018-1000845</cve>
<bugzilla href="https://bugzilla.suse.com/1120281">SUSE bug 1120281</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009243970" comment="avahi-0.6.23-35.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243973" comment="avahi-glib2-0.6.23-35.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243985" comment="avahi-lang-0.6.23-35.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243986" comment="avahi-utils-0.6.23-35.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243987" comment="libavahi-client3-0.6.23-35.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243988" comment="libavahi-client3-32bit-0.6.23-35.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243990" comment="libavahi-common3-0.6.23-35.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243991" comment="libavahi-common3-32bit-0.6.23-35.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243993" comment="libavahi-core5-0.6.23-35.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243994" comment="libavahi-glib1-0.6.23-35.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243995" comment="libavahi-glib1-32bit-0.6.23-35.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243997" comment="libdns_sd-0.6.23-35.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243998" comment="libdns_sd-32bit-0.6.23-35.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10087</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-10087" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10087" source="CVE"/>
    <description>
    The kernel_wait4 function in kernel/exit.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service by triggering an attempted use of the -INT_MIN value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-10087.html">CVE-2018-10087</cve>
<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1089608">SUSE bug 1089608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208695" comment="kernel-bigsmp-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208696" comment="kernel-bigsmp-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208697" comment="kernel-bigsmp-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205609" comment="kernel-default-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205610" comment="kernel-default-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205611" comment="kernel-default-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208698" comment="kernel-default-man-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205612" comment="kernel-ec2-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205613" comment="kernel-ec2-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205614" comment="kernel-ec2-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205615" comment="kernel-pae-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205616" comment="kernel-pae-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205617" comment="kernel-pae-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205618" comment="kernel-source-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205619" comment="kernel-syms-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205620" comment="kernel-trace-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205621" comment="kernel-trace-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205622" comment="kernel-trace-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205623" comment="kernel-xen-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205624" comment="kernel-xen-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205625" comment="kernel-xen-devel-3.0.101-0.47.106.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10124</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-10124" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10124" source="CVE"/>
    <description>
    The kill_something_info function in kernel/signal.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service via an INT_MIN argument.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-10124.html">CVE-2018-10124</cve>
<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1089752">SUSE bug 1089752</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208695" comment="kernel-bigsmp-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208696" comment="kernel-bigsmp-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208697" comment="kernel-bigsmp-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205609" comment="kernel-default-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205610" comment="kernel-default-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205611" comment="kernel-default-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208698" comment="kernel-default-man-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205612" comment="kernel-ec2-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205613" comment="kernel-ec2-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205614" comment="kernel-ec2-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205615" comment="kernel-pae-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205616" comment="kernel-pae-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205617" comment="kernel-pae-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205618" comment="kernel-source-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205619" comment="kernel-syms-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205620" comment="kernel-trace-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205621" comment="kernel-trace-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205622" comment="kernel-trace-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205623" comment="kernel-xen-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205624" comment="kernel-xen-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205625" comment="kernel-xen-devel-3.0.101-0.47.106.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10177</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-10177" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10177" source="CVE"/>
    <description>
    In ImageMagick 7.0.7-28, there is an infinite loop in the ReadOneMNGImage function of the coders/png.c file. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted mng file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-10177.html">CVE-2018-10177</cve>
<bugzilla href="https://bugzilla.suse.com/1089781">SUSE bug 1089781</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202318" comment="ImageMagick-6.4.3.6-78.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209134" comment="libMagickCore1-6.4.3.6-78.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209135" comment="libMagickCore1-32bit-6.4.3.6-78.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10194</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-10194" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10194" source="CVE"/>
    <description>
    The set_text_distance function in devices/vector/gdevpdts.c in the pdfwrite component in Artifex Ghostscript through 9.22 does not prevent overflows in text-positioning calculation, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted PDF document.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-10194.html">CVE-2018-10194</cve>
<bugzilla href="https://bugzilla.suse.com/1090099">SUSE bug 1090099</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009209278" comment="ghostscript-fonts-other-8.62-32.47.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209279" comment="ghostscript-fonts-rus-8.62-32.47.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209280" comment="ghostscript-fonts-std-8.62-32.47.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202642" comment="ghostscript-library-8.62-32.47.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209281" comment="ghostscript-omni-8.62-32.47.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209282" comment="ghostscript-x11-8.62-32.47.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209283" comment="libgimpprint-4.2.7-32.47.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10195</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-10195" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10195" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-10195.html">CVE-2018-10195</cve>
<bugzilla href="https://bugzilla.suse.com/1090051">SUSE bug 1090051</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1149678">SUSE bug 1149678</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210685" comment="rzsz-0.12.21~rc-936.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10360</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-10360" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10360" source="CVE"/>
    <description>
    The do_core_note function in readelf.c in libmagic.a in file 5.33 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-10360.html">CVE-2018-10360</cve>
<bugzilla href="https://bugzilla.suse.com/1096974">SUSE bug 1096974</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1096984">SUSE bug 1096984</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1126118">SUSE bug 1126118</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009230565" comment="apache2-mod_php53-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230555" comment="php53-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230566" comment="php53-bcmath-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230567" comment="php53-bz2-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230568" comment="php53-calendar-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230569" comment="php53-ctype-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230570" comment="php53-curl-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230571" comment="php53-dba-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230572" comment="php53-dom-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230573" comment="php53-exif-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230574" comment="php53-fastcgi-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230575" comment="php53-fileinfo-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230576" comment="php53-ftp-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230577" comment="php53-gd-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230578" comment="php53-gettext-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230579" comment="php53-gmp-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230580" comment="php53-iconv-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230581" comment="php53-intl-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230582" comment="php53-json-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230583" comment="php53-ldap-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230584" comment="php53-mbstring-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230585" comment="php53-mcrypt-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230586" comment="php53-mysql-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230587" comment="php53-odbc-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230588" comment="php53-openssl-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230589" comment="php53-pcntl-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230590" comment="php53-pdo-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230591" comment="php53-pear-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230592" comment="php53-pgsql-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230593" comment="php53-pspell-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230594" comment="php53-shmop-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230595" comment="php53-snmp-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230596" comment="php53-soap-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230597" comment="php53-suhosin-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230598" comment="php53-sysvmsg-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230599" comment="php53-sysvsem-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230600" comment="php53-sysvshm-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230601" comment="php53-tokenizer-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230602" comment="php53-wddx-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230603" comment="php53-xmlreader-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230604" comment="php53-xmlrpc-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230605" comment="php53-xmlwriter-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230606" comment="php53-xsl-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230607" comment="php53-zip-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230608" comment="php53-zlib-5.3.17-112.28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10392</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-10392" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10392" source="CVE"/>
    <description>
    mapping0_forward in mapping0.c in Xiph.Org libvorbis 1.3.6 does not validate the number of channels, which allows remote attackers to cause a denial of service (heap-based buffer overflow or over-read) or possibly have unspecified other impact via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-10392.html">CVE-2018-10392</cve>
<bugzilla href="https://bugzilla.suse.com/1091070">SUSE bug 1091070</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203087" comment="libvorbis-1.2.0-79.20.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209960" comment="libvorbis-32bit-1.2.0-79.20.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209961" comment="libvorbis-doc-1.2.0-79.20.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10393</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-10393" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10393" source="CVE"/>
    <description>
    bark_noise_hybridmp in psy.c in Xiph.Org libvorbis 1.3.6 has a stack-based buffer over-read.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-10393.html">CVE-2018-10393</cve>
<bugzilla href="https://bugzilla.suse.com/1091072">SUSE bug 1091072</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203085" comment="libvorbis-1.2.0-79.20.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209957" comment="libvorbis-32bit-1.2.0-79.20.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209958" comment="libvorbis-doc-1.2.0-79.20.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10471</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-10471" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471" source="CVE"/>
    <description>
    An issue was discovered in Xen through 4.10.x allowing x86 PV guest OS users to cause a denial of service (out-of-bounds zero write and hypervisor crash) via unexpected INT 80 processing, because of an incorrect fix for CVE-2017-5754.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-10471.html">CVE-2018-10471</cve>
<bugzilla href="https://bugzilla.suse.com/1089635">SUSE bug 1089635</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009206002" comment="xen-4.2.5_21-45.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209098" comment="xen-doc-html-4.2.5_21-45.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209099" comment="xen-doc-pdf-4.2.5_21-45.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206003" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206004" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.19-45.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206005" comment="xen-libs-4.2.5_21-45.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209100" comment="xen-libs-32bit-4.2.5_21-45.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209101" comment="xen-tools-4.2.5_21-45.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206006" comment="xen-tools-domU-4.2.5_21-45.22 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250475" comment="xen-4.2.5_21-47.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250476" comment="xen-doc-html-4.2.5_21-47.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250477" comment="xen-doc-pdf-4.2.5_21-47.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250478" comment="xen-kmp-default-4.2.5_21_3.0.101_0.156.TDC-47.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250479" comment="xen-libs-4.2.5_21-47.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250480" comment="xen-tools-4.2.5_21-47.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250481" comment="xen-tools-domU-4.2.5_21-47.24 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10472</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-10472" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472" source="CVE"/>
    <description>
    An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users (in certain configurations) to read arbitrary dom0 files via QMP live insertion of a CDROM, in conjunction with specifying the target file as the backing file of a snapshot.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-10472.html">CVE-2018-10472</cve>
<bugzilla href="https://bugzilla.suse.com/1089152">SUSE bug 1089152</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009206002" comment="xen-4.2.5_21-45.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209098" comment="xen-doc-html-4.2.5_21-45.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209099" comment="xen-doc-pdf-4.2.5_21-45.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206003" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206004" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.19-45.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206005" comment="xen-libs-4.2.5_21-45.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209100" comment="xen-libs-32bit-4.2.5_21-45.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209101" comment="xen-tools-4.2.5_21-45.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206006" comment="xen-tools-domU-4.2.5_21-45.22 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250475" comment="xen-4.2.5_21-47.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250476" comment="xen-doc-html-4.2.5_21-47.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250477" comment="xen-doc-pdf-4.2.5_21-47.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250478" comment="xen-kmp-default-4.2.5_21_3.0.101_0.156.TDC-47.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250479" comment="xen-libs-4.2.5_21-47.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250480" comment="xen-tools-4.2.5_21-47.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250481" comment="xen-tools-domU-4.2.5_21-47.24 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1050</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-1050" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1050" source="CVE"/>
    <description>
    All versions of Samba from 4.0.0 onwards are vulnerable to a denial of service attack when the RPC spoolss service is configured to be run as an external daemon. Missing input sanitization checks on some of the input parameters to spoolss RPC calls could cause the print spooler service to crash.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-1050.html">CVE-2018-1050</cve>
<bugzilla href="https://bugzilla.suse.com/1081741">SUSE bug 1081741</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210770" comment="ldapsmb-1.34b-94.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210771" comment="libldb1-3.6.3-94.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210772" comment="libsmbclient0-3.6.3-94.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210773" comment="libsmbclient0-32bit-3.6.3-94.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210775" comment="libtalloc2-3.6.3-94.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210776" comment="libtalloc2-32bit-3.6.3-94.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210778" comment="libtdb1-3.6.3-94.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210779" comment="libtdb1-32bit-3.6.3-94.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210781" comment="libtevent0-3.6.3-94.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210782" comment="libtevent0-32bit-3.6.3-94.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210784" comment="libwbclient0-3.6.3-94.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210785" comment="libwbclient0-32bit-3.6.3-94.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203541" comment="samba-3.6.3-94.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210787" comment="samba-32bit-3.6.3-94.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210788" comment="samba-client-3.6.3-94.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210789" comment="samba-client-32bit-3.6.3-94.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210791" comment="samba-doc-3.6.3-94.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210792" comment="samba-krb-printing-3.6.3-94.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210793" comment="samba-winbind-3.6.3-94.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210794" comment="samba-winbind-32bit-3.6.3-94.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1053</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-1053" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1053" source="CVE"/>
    <description>
    In postgresql 9.3.x before 9.3.21, 9.4.x before 9.4.16, 9.5.x before 9.5.11, 9.6.x before 9.6.7 and 10.x before 10.2, pg_upgrade creates file in current working directory containing the output of `pg_dumpall -g` under umask which was in effect when the user invoked pg_upgrade, and not under 0077 which is normally used for other temporary files. This can allow an authenticated attacker to read or modify the one file, which may contain encrypted or unencrypted database passwords. The attack is infeasible if a directory mode blocks the attacker searching the current working directory or if the prevailing umask blocks the attacker opening the file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-1053.html">CVE-2018-1053</cve>
<bugzilla href="https://bugzilla.suse.com/1077983">SUSE bug 1077983</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210649" comment="libecpg6-9.4.16-0.23.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210650" comment="libpq5-9.4.16-0.23.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210651" comment="libpq5-32bit-9.4.16-0.23.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210652" comment="postgresql94-9.4.16-0.23.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210653" comment="postgresql94-contrib-9.4.16-0.23.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210654" comment="postgresql94-docs-9.4.16-0.23.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203393" comment="postgresql94-libs-9.4.16-0.23.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210655" comment="postgresql94-server-9.4.16-0.23.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10545</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-10545" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10545" source="CVE"/>
    <description>
    An issue was discovered in PHP before 5.6.35, 7.0.x before 7.0.29, 7.1.x before 7.1.16, and 7.2.x before 7.2.4. Dumpable FPM child processes allow bypassing opcache access controls because fpm_unix.c makes a PR_SET_DUMPABLE prctl call, allowing one user (in a multiuser environment) to obtain sensitive information from the process memory of a second user's PHP applications by running gcore on the PID of the PHP-FPM worker process.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-10545.html">CVE-2018-10545</cve>
<bugzilla href="https://bugzilla.suse.com/1091367">SUSE bug 1091367</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205831" comment="apache2-mod_php53-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203360" comment="php53-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205832" comment="php53-bcmath-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205833" comment="php53-bz2-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205834" comment="php53-calendar-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205835" comment="php53-ctype-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205836" comment="php53-curl-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205837" comment="php53-dba-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205838" comment="php53-dom-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205839" comment="php53-exif-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205840" comment="php53-fastcgi-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205841" comment="php53-fileinfo-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205842" comment="php53-ftp-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205843" comment="php53-gd-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205844" comment="php53-gettext-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205845" comment="php53-gmp-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205846" comment="php53-iconv-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205847" comment="php53-intl-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205848" comment="php53-json-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205849" comment="php53-ldap-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205850" comment="php53-mbstring-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205851" comment="php53-mcrypt-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205852" comment="php53-mysql-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205853" comment="php53-odbc-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205854" comment="php53-openssl-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205855" comment="php53-pcntl-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205856" comment="php53-pdo-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205857" comment="php53-pear-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205858" comment="php53-pgsql-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205859" comment="php53-pspell-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205860" comment="php53-shmop-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205861" comment="php53-snmp-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205862" comment="php53-soap-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205863" comment="php53-suhosin-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205864" comment="php53-sysvmsg-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205865" comment="php53-sysvsem-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205866" comment="php53-sysvshm-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205867" comment="php53-tokenizer-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205868" comment="php53-wddx-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205869" comment="php53-xmlreader-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205870" comment="php53-xmlrpc-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205871" comment="php53-xmlwriter-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205872" comment="php53-xsl-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205873" comment="php53-zip-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205874" comment="php53-zlib-5.3.17-112.23 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10546</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-10546" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10546" source="CVE"/>
    <description>
    An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. An infinite loop exists in ext/iconv/iconv.c because the iconv stream filter does not reject invalid multibyte sequences.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-10546.html">CVE-2018-10546</cve>
<bugzilla href="https://bugzilla.suse.com/1091363">SUSE bug 1091363</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205831" comment="apache2-mod_php53-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203360" comment="php53-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205832" comment="php53-bcmath-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205833" comment="php53-bz2-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205834" comment="php53-calendar-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205835" comment="php53-ctype-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205836" comment="php53-curl-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205837" comment="php53-dba-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205838" comment="php53-dom-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205839" comment="php53-exif-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205840" comment="php53-fastcgi-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205841" comment="php53-fileinfo-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205842" comment="php53-ftp-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205843" comment="php53-gd-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205844" comment="php53-gettext-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205845" comment="php53-gmp-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205846" comment="php53-iconv-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205847" comment="php53-intl-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205848" comment="php53-json-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205849" comment="php53-ldap-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205850" comment="php53-mbstring-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205851" comment="php53-mcrypt-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205852" comment="php53-mysql-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205853" comment="php53-odbc-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205854" comment="php53-openssl-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205855" comment="php53-pcntl-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205856" comment="php53-pdo-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205857" comment="php53-pear-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205858" comment="php53-pgsql-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205859" comment="php53-pspell-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205860" comment="php53-shmop-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205861" comment="php53-snmp-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205862" comment="php53-soap-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205863" comment="php53-suhosin-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205864" comment="php53-sysvmsg-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205865" comment="php53-sysvsem-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205866" comment="php53-sysvshm-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205867" comment="php53-tokenizer-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205868" comment="php53-wddx-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205869" comment="php53-xmlreader-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205870" comment="php53-xmlrpc-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205871" comment="php53-xmlwriter-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205872" comment="php53-xsl-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205873" comment="php53-zip-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205874" comment="php53-zlib-5.3.17-112.23 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-10547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10547" source="CVE"/>
    <description>
    An issue was discovered in ext/phar/phar_object.c in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. There is Reflected XSS on the PHAR 403 and 404 error pages via request data of a request for a .phar file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2018-5712.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-10547.html">CVE-2018-10547</cve>
<bugzilla href="https://bugzilla.suse.com/1091362">SUSE bug 1091362</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205831" comment="apache2-mod_php53-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203360" comment="php53-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205832" comment="php53-bcmath-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205833" comment="php53-bz2-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205834" comment="php53-calendar-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205835" comment="php53-ctype-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205836" comment="php53-curl-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205837" comment="php53-dba-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205838" comment="php53-dom-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205839" comment="php53-exif-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205840" comment="php53-fastcgi-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205841" comment="php53-fileinfo-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205842" comment="php53-ftp-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205843" comment="php53-gd-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205844" comment="php53-gettext-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205845" comment="php53-gmp-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205846" comment="php53-iconv-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205847" comment="php53-intl-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205848" comment="php53-json-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205849" comment="php53-ldap-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205850" comment="php53-mbstring-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205851" comment="php53-mcrypt-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205852" comment="php53-mysql-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205853" comment="php53-odbc-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205854" comment="php53-openssl-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205855" comment="php53-pcntl-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205856" comment="php53-pdo-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205857" comment="php53-pear-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205858" comment="php53-pgsql-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205859" comment="php53-pspell-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205860" comment="php53-shmop-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205861" comment="php53-snmp-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205862" comment="php53-soap-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205863" comment="php53-suhosin-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205864" comment="php53-sysvmsg-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205865" comment="php53-sysvsem-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205866" comment="php53-sysvshm-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205867" comment="php53-tokenizer-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205868" comment="php53-wddx-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205869" comment="php53-xmlreader-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205870" comment="php53-xmlrpc-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205871" comment="php53-xmlwriter-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205872" comment="php53-xsl-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205873" comment="php53-zip-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205874" comment="php53-zlib-5.3.17-112.23 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10548</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-10548" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10548" source="CVE"/>
    <description>
    An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. ext/ldap/ldap.c allows remote LDAP servers to cause a denial of service (NULL pointer dereference and application crash) because of mishandling of the ldap_get_dn return value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-10548.html">CVE-2018-10548</cve>
<bugzilla href="https://bugzilla.suse.com/1091355">SUSE bug 1091355</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205831" comment="apache2-mod_php53-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203360" comment="php53-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205832" comment="php53-bcmath-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205833" comment="php53-bz2-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205834" comment="php53-calendar-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205835" comment="php53-ctype-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205836" comment="php53-curl-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205837" comment="php53-dba-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205838" comment="php53-dom-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205839" comment="php53-exif-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205840" comment="php53-fastcgi-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205841" comment="php53-fileinfo-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205842" comment="php53-ftp-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205843" comment="php53-gd-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205844" comment="php53-gettext-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205845" comment="php53-gmp-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205846" comment="php53-iconv-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205847" comment="php53-intl-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205848" comment="php53-json-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205849" comment="php53-ldap-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205850" comment="php53-mbstring-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205851" comment="php53-mcrypt-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205852" comment="php53-mysql-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205853" comment="php53-odbc-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205854" comment="php53-openssl-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205855" comment="php53-pcntl-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205856" comment="php53-pdo-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205857" comment="php53-pear-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205858" comment="php53-pgsql-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205859" comment="php53-pspell-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205860" comment="php53-shmop-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205861" comment="php53-snmp-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205862" comment="php53-soap-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205863" comment="php53-suhosin-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205864" comment="php53-sysvmsg-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205865" comment="php53-sysvsem-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205866" comment="php53-sysvshm-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205867" comment="php53-tokenizer-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205868" comment="php53-wddx-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205869" comment="php53-xmlreader-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205870" comment="php53-xmlrpc-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205871" comment="php53-xmlwriter-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205872" comment="php53-xsl-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205873" comment="php53-zip-5.3.17-112.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205874" comment="php53-zlib-5.3.17-112.23 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1058</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-1058" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1058" source="CVE"/>
    <description>
    A flaw was found in the way Postgresql allowed a user to modify the behavior of a query for other users. An attacker with a user account could use this flaw to execute code with the permissions of superuser in the database. Versions 9.3 through 10 are affected.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-1058.html">CVE-2018-1058</cve>
<bugzilla href="https://bugzilla.suse.com/1081925">SUSE bug 1081925</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210656" comment="libecpg6-9.4.17-0.23.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210657" comment="libpq5-9.4.17-0.23.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210658" comment="libpq5-32bit-9.4.17-0.23.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210659" comment="postgresql94-9.4.17-0.23.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210660" comment="postgresql94-contrib-9.4.17-0.23.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210661" comment="postgresql94-docs-9.4.17-0.23.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203395" comment="postgresql94-libs-9.4.17-0.23.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210662" comment="postgresql94-server-9.4.17-0.23.16 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1060</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-1060" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1060" source="CVE"/>
    <description>
    python before versions 2.7.15, 3.4.9, 3.5.6rc1, 3.6.5rc1 and 3.7.0 is vulnerable to catastrophic backtracking in pop3lib's apop() method.  An attacker could use this flaw to cause denial of service.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-1060.html">CVE-2018-1060</cve>
<bugzilla href="https://bugzilla.suse.com/1088009">SUSE bug 1088009</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009232735" comment="libpython2_6-1_0-2.6.9-40.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232738" comment="libpython2_6-1_0-32bit-2.6.9-40.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232717" comment="python-2.6.9-40.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232718" comment="python-32bit-2.6.9-40.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232719" comment="python-base-2.6.9-40.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232739" comment="python-base-32bit-2.6.9-40.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232736" comment="python-curses-2.6.9-40.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232720" comment="python-demo-2.6.9-40.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232722" comment="python-doc-2.6-8.40.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232723" comment="python-doc-pdf-2.6-8.40.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232724" comment="python-gdbm-2.6.9-40.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232725" comment="python-idle-2.6.9-40.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232726" comment="python-tk-2.6.9-40.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232737" comment="python-xml-2.6.9-40.15 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1061</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-1061" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1061" source="CVE"/>
    <description>
    python before versions 2.7.15, 3.4.9, 3.5.6rc1, 3.6.5rc1 and 3.7.0 is vulnerable to catastrophic backtracking in the difflib.IS_LINE_JUNK method.  An attacker could use this flaw to cause denial of service.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-1061.html">CVE-2018-1061</cve>
<bugzilla href="https://bugzilla.suse.com/1088004">SUSE bug 1088004</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009232735" comment="libpython2_6-1_0-2.6.9-40.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232738" comment="libpython2_6-1_0-32bit-2.6.9-40.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232717" comment="python-2.6.9-40.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232718" comment="python-32bit-2.6.9-40.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232719" comment="python-base-2.6.9-40.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232739" comment="python-base-32bit-2.6.9-40.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232736" comment="python-curses-2.6.9-40.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232720" comment="python-demo-2.6.9-40.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232722" comment="python-doc-2.6-8.40.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232723" comment="python-doc-pdf-2.6-8.40.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232724" comment="python-gdbm-2.6.9-40.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232725" comment="python-idle-2.6.9-40.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232726" comment="python-tk-2.6.9-40.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232737" comment="python-xml-2.6.9-40.15 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1063</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-1063" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1063" source="CVE"/>
    <description>
    Context relabeling of filesystems is vulnerable to symbolic link attack, allowing a local, unprivileged malicious entity to change the SELinux context of an arbitrary file to a context with few restrictions. This only happens when the relabeling process is done, usually when taking SELinux state from disabled to enable (permissive or enforcing). The issue was found in policycoreutils 2.5-11.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-1063.html">CVE-2018-1063</cve>
<bugzilla href="https://bugzilla.suse.com/1083624">SUSE bug 1083624</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210621" comment="policycoreutils-2.0.79-4.9.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1064</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-1064" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1064" source="CVE"/>
    <description>
    libvirt version before 4.2.0-rc1 is vulnerable to a resource exhaustion as a result of an incomplete fix for CVE-2018-5748 that affects QEMU monitor but now also triggered via QEMU guest agent.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-1064.html">CVE-2018-1064</cve>
<bugzilla href="https://bugzilla.suse.com/1076500">SUSE bug 1076500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1083625">SUSE bug 1083625</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205632" comment="libvirt-1.0.5.9-21.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205633" comment="libvirt-client-1.0.5.9-21.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208760" comment="libvirt-client-32bit-1.0.5.9-21.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205634" comment="libvirt-doc-1.0.5.9-21.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205635" comment="libvirt-lock-sanlock-1.0.5.9-21.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205636" comment="libvirt-python-1.0.5.9-21.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10675</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-10675" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10675" source="CVE"/>
    <description>
    The do_get_mempolicy function in mm/mempolicy.c in the Linux kernel before 4.12.9 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted system calls.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-10675.html">CVE-2018-10675</cve>
<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1091755">SUSE bug 1091755</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208669" comment="kernel-bigsmp-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208670" comment="kernel-bigsmp-base-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208671" comment="kernel-bigsmp-devel-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205558" comment="kernel-default-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205559" comment="kernel-default-base-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205560" comment="kernel-default-devel-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208672" comment="kernel-default-man-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205561" comment="kernel-ec2-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205562" comment="kernel-ec2-base-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205563" comment="kernel-ec2-devel-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205564" comment="kernel-pae-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205565" comment="kernel-pae-base-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205566" comment="kernel-pae-devel-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205567" comment="kernel-source-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205568" comment="kernel-syms-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205569" comment="kernel-trace-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205570" comment="kernel-trace-base-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205571" comment="kernel-trace-devel-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205572" comment="kernel-xen-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205573" comment="kernel-xen-base-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205574" comment="kernel-xen-devel-3.0.101-0.47.106.29 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1068</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-1068" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068" source="CVE"/>
    <description>
    A flaw was found in the Linux 4.x kernel's implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-1068.html">CVE-2018-1068</cve>
<bugzilla href="https://bugzilla.suse.com/1085107">SUSE bug 1085107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1085114">SUSE bug 1085114</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123903">SUSE bug 1123903</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009232611" comment="kernel-bigsmp-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232612" comment="kernel-bigsmp-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232613" comment="kernel-bigsmp-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232594" comment="kernel-default-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232595" comment="kernel-default-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232596" comment="kernel-default-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232614" comment="kernel-default-man-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232597" comment="kernel-ec2-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232598" comment="kernel-ec2-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232599" comment="kernel-ec2-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232600" comment="kernel-pae-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232601" comment="kernel-pae-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232602" comment="kernel-pae-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232603" comment="kernel-source-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232604" comment="kernel-syms-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232605" comment="kernel-trace-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232606" comment="kernel-trace-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232607" comment="kernel-trace-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232608" comment="kernel-xen-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232609" comment="kernel-xen-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232610" comment="kernel-xen-devel-3.0.101-0.47.106.43 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10779</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-10779" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10779" source="CVE"/>
    <description>
    TIFFWriteScanline in tif_write.c in LibTIFF 3.8.2 has a heap-based buffer over-read, as demonstrated by bmp2tiff.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-10779.html">CVE-2018-10779</cve>
<bugzilla href="https://bugzilla.suse.com/1092480">SUSE bug 1092480</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009234383" comment="libtiff3-3.8.2-141.169.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234384" comment="libtiff3-32bit-3.8.2-141.169.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234338" comment="tiff-3.8.2-141.169.16 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-10805" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10805" source="CVE"/>
    <description>
    ImageMagick version 7.0.7-28 contains a memory leak in ReadYCBCRImage in coders/ycbcr.c.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-10805.html">CVE-2018-10805</cve>
<bugzilla href="https://bugzilla.suse.com/1095812">SUSE bug 1095812</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009233150" comment="ImageMagick-6.4.3.6-78.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233160" comment="libMagickCore1-6.4.3.6-78.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233161" comment="libMagickCore1-32bit-6.4.3.6-78.56 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10839</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-10839" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10839" source="CVE"/>
    <description>
    Qemu emulator &lt;= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-10839.html">CVE-2018-10839</cve>
<bugzilla href="https://bugzilla.suse.com/1110910">SUSE bug 1110910</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1110924">SUSE bug 1110924</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241072" comment="kvm-1.4.2-53.26 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009241072" comment="kvm-1.4.2-53.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250489" comment="xen-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250490" comment="xen-doc-html-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250491" comment="xen-doc-pdf-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250492" comment="xen-kmp-default-4.2.5_21_3.0.101_0.190.TDC-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250493" comment="xen-libs-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250494" comment="xen-tools-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250495" comment="xen-tools-domU-4.2.5_21-47.32 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10846</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-10846" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10846" source="CVE"/>
    <description>
    A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM attack setting was found. An attacker could use a combination of "Just in Time" Prime+probe attack in combination with Lucky-13 attack to recover plain text using crafted packets.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-10846.html">CVE-2018-10846</cve>
<bugzilla href="https://bugzilla.suse.com/1105460">SUSE bug 1105460</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009253936" comment="gnutls-2.4.1-24.39.76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253937" comment="libgnutls-extra26-2.4.1-24.39.76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253939" comment="libgnutls26-2.4.1-24.39.76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253940" comment="libgnutls26-32bit-2.4.1-24.39.76 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10858</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-10858" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10858" source="CVE"/>
    <description>
    A heap-buffer overflow was found in the way samba clients processed extra long filename in a directory listing. A malicious samba server could use this flaw to cause arbitrary code execution on a samba client. Samba versions before 4.6.16, 4.7.9 and 4.8.4 are vulnerable.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-10858.html">CVE-2018-10858</cve>
<bugzilla href="https://bugzilla.suse.com/1103411">SUSE bug 1103411</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009232174" comment="ldapsmb-1.34b-94.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232175" comment="libldb1-3.6.3-94.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232176" comment="libsmbclient0-3.6.3-94.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232185" comment="libsmbclient0-32bit-3.6.3-94.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232177" comment="libtalloc2-3.6.3-94.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232186" comment="libtalloc2-32bit-3.6.3-94.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232178" comment="libtdb1-3.6.3-94.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232187" comment="libtdb1-32bit-3.6.3-94.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232179" comment="libtevent0-3.6.3-94.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232188" comment="libtevent0-32bit-3.6.3-94.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232180" comment="libwbclient0-3.6.3-94.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232189" comment="libwbclient0-32bit-3.6.3-94.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232170" comment="samba-3.6.3-94.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232190" comment="samba-32bit-3.6.3-94.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232181" comment="samba-client-3.6.3-94.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232191" comment="samba-client-32bit-3.6.3-94.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232182" comment="samba-doc-3.6.3-94.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232183" comment="samba-krb-printing-3.6.3-94.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232184" comment="samba-winbind-3.6.3-94.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232192" comment="samba-winbind-32bit-3.6.3-94.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10860</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-10860" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10860" source="CVE"/>
    <description>
    perl-archive-zip is vulnerable to a directory traversal in Archive::Zip. It was found that the Archive::Zip module did not properly sanitize paths while extracting zip files. An attacker able to provide a specially crafted archive for processing could use this flaw to write or overwrite arbitrary files in the context of the perl interpreter.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-10860.html">CVE-2018-10860</cve>
<bugzilla href="https://bugzilla.suse.com/1099497">SUSE bug 1099497</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232615" comment="perl-Archive-Zip-1.24-4.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1087</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
    </affected>
    <reference ref_id="CVE-2018-1087" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1087" source="CVE"/>
    <description>
    kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel's KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-1087.html">CVE-2018-1087</cve>
<bugzilla href="https://bugzilla.suse.com/1087088">SUSE bug 1087088</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208695" comment="kernel-bigsmp-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208696" comment="kernel-bigsmp-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208697" comment="kernel-bigsmp-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205609" comment="kernel-default-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205610" comment="kernel-default-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205611" comment="kernel-default-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208698" comment="kernel-default-man-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205612" comment="kernel-ec2-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205613" comment="kernel-ec2-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205614" comment="kernel-ec2-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205615" comment="kernel-pae-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205616" comment="kernel-pae-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205617" comment="kernel-pae-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205618" comment="kernel-source-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205619" comment="kernel-syms-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205620" comment="kernel-trace-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205621" comment="kernel-trace-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205622" comment="kernel-trace-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205623" comment="kernel-xen-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205624" comment="kernel-xen-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205625" comment="kernel-xen-devel-3.0.101-0.47.106.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10886</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-10886" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10886" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: this candidate is not about any specific product, protocol, or design, that falls into the scope of the assigning CNA. Notes: None.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-10886.html">CVE-2018-10886</cve>
<bugzilla href="https://bugzilla.suse.com/1100053">SUSE bug 1100053</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009235010" comment="ant-1.7.1-20.11.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235011" comment="ant-antlr-1.7.1-16.11.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235027" comment="ant-trax-1.7.1-16.11.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10902</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-10902" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10902" source="CVE"/>
    <description>
    It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-10902.html">CVE-2018-10902</cve>
<bugzilla href="https://bugzilla.suse.com/1105322">SUSE bug 1105322</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1105323">SUSE bug 1105323</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009235558" comment="kernel-bigsmp-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235559" comment="kernel-bigsmp-base-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235560" comment="kernel-bigsmp-devel-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235541" comment="kernel-default-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235542" comment="kernel-default-base-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235543" comment="kernel-default-devel-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235561" comment="kernel-default-man-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235544" comment="kernel-ec2-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235545" comment="kernel-ec2-base-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235546" comment="kernel-ec2-devel-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235547" comment="kernel-pae-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235548" comment="kernel-pae-base-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235549" comment="kernel-pae-devel-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235550" comment="kernel-source-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235551" comment="kernel-syms-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235552" comment="kernel-trace-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235553" comment="kernel-trace-base-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235554" comment="kernel-trace-devel-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235555" comment="kernel-xen-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235556" comment="kernel-xen-base-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235557" comment="kernel-xen-devel-3.0.101-0.47.106.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10906</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-10906" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10906" source="CVE"/>
    <description>
    In fuse before versions 2.9.8 and 3.x before 3.2.5, fusermount is vulnerable to a restriction bypass when SELinux is active. This allows non-root users to mount a FUSE file system with the 'allow_other' mount option regardless of whether 'user_allow_other' is set in the fuse configuration. An attacker may use this flaw to mount a FUSE file system, accessible by other users, and trick them into accessing files on that file system, possibly causing Denial of Service or other unspecified effects.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-10906.html">CVE-2018-10906</cve>
<bugzilla href="https://bugzilla.suse.com/1101797">SUSE bug 1101797</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1127346">SUSE bug 1127346</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1127350">SUSE bug 1127350</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009243983" comment="fuse-2.8.7-0.11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244000" comment="libfuse2-2.8.7-0.11.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10915</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-10915" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10915" source="CVE"/>
    <description>
    A vulnerability was found in libpq, the default PostgreSQL client library where libpq failed to properly reset its internal state between connections. If an affected version of libpq was used with "host" or "hostaddr" connection parameters from untrusted input, attackers could bypass client-side connection security features, obtain access to higher privileged connections or potentially cause other impact through SQL injection, by causing the PQescape() functions to malfunction. Postgresql versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 are affected.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-10915.html">CVE-2018-10915</cve>
<bugzilla href="https://bugzilla.suse.com/1104199">SUSE bug 1104199</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1140876">SUSE bug 1140876</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009237897" comment="libecpg6-9.4.19-0.23.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237898" comment="libpq5-9.4.19-0.23.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237899" comment="libpq5-32bit-9.4.19-0.23.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237900" comment="postgresql94-9.4.19-0.23.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237901" comment="postgresql94-contrib-9.4.19-0.23.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237902" comment="postgresql94-docs-9.4.19-0.23.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237896" comment="postgresql94-libs-9.4.19-0.23.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237903" comment="postgresql94-server-9.4.19-0.23.19 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10931</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS</platform>
    </affected>
    <reference ref_id="CVE-2018-10931" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10931" source="CVE"/>
    <description>
    It was found that cobbler 2.6.x exposed all functions from its CobblerXMLRPCInterface class over XMLRPC. A remote, unauthenticated attacker could use this flaw to gain high privileges within cobbler, upload files to arbitrary location in the context of the daemon.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-10931.html">CVE-2018-10931</cve>
<bugzilla href="https://bugzilla.suse.com/1104189">SUSE bug 1104189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1104190">SUSE bug 1104190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1104287">SUSE bug 1104287</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1105440">SUSE bug 1105440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1105442">SUSE bug 1105442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1130105">SUSE bug 1130105</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009233712" comment="cobbler-2.2.2-0.68.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233713" comment="koan-2.2.2-0.68.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10940</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-10940" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10940" source="CVE"/>
    <description>
    The cdrom_ioctl_media_changed function in drivers/cdrom/cdrom.c in the Linux kernel before 4.16.6 allows local attackers to use a incorrect bounds check in the CDROM driver CDROM_MEDIA_CHANGED ioctl to read out kernel memory.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-10940.html">CVE-2018-10940</cve>
<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1092903">SUSE bug 1092903</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1107689">SUSE bug 1107689</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1113751">SUSE bug 1113751</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009235558" comment="kernel-bigsmp-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235559" comment="kernel-bigsmp-base-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235560" comment="kernel-bigsmp-devel-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235541" comment="kernel-default-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235542" comment="kernel-default-base-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235543" comment="kernel-default-devel-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235561" comment="kernel-default-man-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235544" comment="kernel-ec2-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235545" comment="kernel-ec2-base-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235546" comment="kernel-ec2-devel-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235547" comment="kernel-pae-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235548" comment="kernel-pae-base-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235549" comment="kernel-pae-devel-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235550" comment="kernel-source-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235551" comment="kernel-syms-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235552" comment="kernel-trace-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235553" comment="kernel-trace-base-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235554" comment="kernel-trace-devel-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235555" comment="kernel-xen-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235556" comment="kernel-xen-base-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235557" comment="kernel-xen-devel-3.0.101-0.47.106.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10981</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-10981" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981" source="CVE"/>
    <description>
    An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users to cause a denial of service (host OS infinite loop) in situations where a QEMU device model attempts to make invalid transitions between states of a request.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-10981.html">CVE-2018-10981</cve>
<bugzilla href="https://bugzilla.suse.com/1090823">SUSE bug 1090823</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009233376" comment="xen-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233381" comment="xen-doc-html-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233382" comment="xen-doc-pdf-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233377" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233378" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233379" comment="xen-libs-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233383" comment="xen-libs-32bit-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233384" comment="xen-tools-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233380" comment="xen-tools-domU-4.2.5_21-45.25 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250482" comment="xen-4.2.5_21-47.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250483" comment="xen-doc-html-4.2.5_21-47.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250484" comment="xen-doc-pdf-4.2.5_21-47.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250485" comment="xen-kmp-default-4.2.5_21_3.0.101_0.181.TDC-47.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250486" comment="xen-libs-4.2.5_21-47.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250487" comment="xen-tools-4.2.5_21-47.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250488" comment="xen-tools-domU-4.2.5_21-47.27 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10982</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-10982" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982" source="CVE"/>
    <description>
    An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users to cause a denial of service (unexpectedly high interrupt number, array overrun, and hypervisor crash) or possibly gain hypervisor privileges by setting up an HPET timer to deliver interrupts in IO-APIC mode, aka vHPET interrupt injection.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-10982.html">CVE-2018-10982</cve>
<bugzilla href="https://bugzilla.suse.com/1090822">SUSE bug 1090822</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009233376" comment="xen-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233381" comment="xen-doc-html-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233382" comment="xen-doc-pdf-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233377" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233378" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233379" comment="xen-libs-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233383" comment="xen-libs-32bit-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233384" comment="xen-tools-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233380" comment="xen-tools-domU-4.2.5_21-45.25 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250482" comment="xen-4.2.5_21-47.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250483" comment="xen-doc-html-4.2.5_21-47.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250484" comment="xen-doc-pdf-4.2.5_21-47.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250485" comment="xen-kmp-default-4.2.5_21_3.0.101_0.181.TDC-47.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250486" comment="xen-libs-4.2.5_21-47.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250487" comment="xen-tools-4.2.5_21-47.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250488" comment="xen-tools-domU-4.2.5_21-47.27 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1100</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-1100" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1100" source="CVE"/>
    <description>
    zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this to execute arbitrary code in the context of another user.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-1100.html">CVE-2018-1100</cve>
<bugzilla href="https://bugzilla.suse.com/1089030">SUSE bug 1089030</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251878" comment="zsh-4.3.6-67.9.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11212</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-11212" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11212" source="CVE"/>
    <description>
    An issue was discovered in libjpeg 9a. The alloc_sarray function in jmemmgr.c allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-11212.html">CVE-2018-11212</cve>
<bugzilla href="https://bugzilla.suse.com/1122299">SUSE bug 1122299</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009245809" comment="java-1_7_0-ibm-1.7.0_sr10.40-65.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009245810" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.40-65.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009245812" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.40-65.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009245813" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.40-65.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009255761" comment="jpeg-6b-879.12.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009255762" comment="libjpeg-6.2.0-879.12.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009255763" comment="libjpeg-32bit-6.2.0-879.12.12 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1122</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-1122" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1122" source="CVE"/>
    <description>
    procps-ng before version 3.3.15 is vulnerable to a local privilege escalation in top. If a user runs top with HOME unset in an attacker-controlled directory, the attacker could achieve privilege escalation by exploiting one of several vulnerabilities in the config_file() function.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-1122.html">CVE-2018-1122</cve>
<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1092100">SUSE bug 1092100</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093158">SUSE bug 1093158</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123135">SUSE bug 1123135</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230609" comment="procps-3.2.7-152.31 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1123</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-1123" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1123" source="CVE"/>
    <description>
    procps-ng before version 3.3.15 is vulnerable to a denial of service in ps via mmap buffer overflow. Inbuilt protection in ps maps a guard page at the end of the overflowed buffer, ensuring that the impact of this flaw is limited to a crash (temporary denial of service).
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-1123.html">CVE-2018-1123</cve>
<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1092100">SUSE bug 1092100</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093158">SUSE bug 1093158</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123135">SUSE bug 1123135</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230609" comment="procps-3.2.7-152.31 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11236</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-11236" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11236" source="CVE"/>
    <description>
    stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-11236.html">CVE-2018-11236</cve>
<bugzilla href="https://bugzilla.suse.com/1094161">SUSE bug 1094161</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1118435">SUSE bug 1118435</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009231870" comment="glibc-2.11.3-17.110.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009231878" comment="glibc-32bit-2.11.3-17.110.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009231873" comment="glibc-devel-2.11.3-17.110.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009231879" comment="glibc-devel-32bit-2.11.3-17.110.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009231871" comment="glibc-html-2.11.3-17.110.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009231874" comment="glibc-i18ndata-2.11.3-17.110.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009231872" comment="glibc-info-2.11.3-17.110.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009231875" comment="glibc-locale-2.11.3-17.110.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009231880" comment="glibc-locale-32bit-2.11.3-17.110.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009231876" comment="glibc-profile-2.11.3-17.110.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009231881" comment="glibc-profile-32bit-2.11.3-17.110.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009231877" comment="nscd-2.11.3-17.110.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1124</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-1124" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1124" source="CVE"/>
    <description>
    procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-1124.html">CVE-2018-1124</cve>
<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1092100">SUSE bug 1092100</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093158">SUSE bug 1093158</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123135">SUSE bug 1123135</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230609" comment="procps-3.2.7-152.31 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1125</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-1125" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1125" source="CVE"/>
    <description>
    procps-ng before version 3.3.15 is vulnerable to a stack buffer overflow in pgrep. This vulnerability is mitigated by FORTIFY, as it involves strncat() to a stack-allocated string. When pgrep is compiled with FORTIFY (as on Red Hat Enterprise Linux and Fedora), the impact is limited to a crash.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-1125.html">CVE-2018-1125</cve>
<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1092100">SUSE bug 1092100</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093158">SUSE bug 1093158</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123135">SUSE bug 1123135</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230609" comment="procps-3.2.7-152.31 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11251</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-11251" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11251" source="CVE"/>
    <description>
    In ImageMagick 7.0.7-23 Q16 x86_64 2018-01-24, there is a heap-based buffer over-read in ReadSUNImage in coders/sun.c, which allows attackers to cause a denial of service (application crash in SetGrayscaleImage in MagickCore/quantize.c) via a crafted SUN image file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-11251.html">CVE-2018-11251</cve>
<bugzilla href="https://bugzilla.suse.com/1094237">SUSE bug 1094237</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009233150" comment="ImageMagick-6.4.3.6-78.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233160" comment="libMagickCore1-6.4.3.6-78.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233161" comment="libMagickCore1-32bit-6.4.3.6-78.56 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-1126" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1126" source="CVE"/>
    <description>
    procps-ng before version 3.3.15 is vulnerable to an incorrect integer size in proc/alloc.* leading to truncation/integer overflow issues. This flaw is related to CVE-2018-1124.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-1126.html">CVE-2018-1126</cve>
<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1092100">SUSE bug 1092100</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093158">SUSE bug 1093158</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123135">SUSE bug 1123135</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230609" comment="procps-3.2.7-152.31 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1130</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-1130" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1130" source="CVE"/>
    <description>
    Linux kernel before version 4.16-rc7 is vulnerable to a null pointer dereference in dccp_write_xmit() function in net/dccp/output.c in that allows a local user to cause a denial of service by a number of certain crafted system calls.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-1130.html">CVE-2018-1130</cve>
<bugzilla href="https://bugzilla.suse.com/1092904">SUSE bug 1092904</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009232611" comment="kernel-bigsmp-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232612" comment="kernel-bigsmp-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232613" comment="kernel-bigsmp-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232594" comment="kernel-default-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232595" comment="kernel-default-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232596" comment="kernel-default-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232614" comment="kernel-default-man-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232597" comment="kernel-ec2-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232598" comment="kernel-ec2-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232599" comment="kernel-ec2-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232600" comment="kernel-pae-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232601" comment="kernel-pae-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232602" comment="kernel-pae-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232603" comment="kernel-source-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232604" comment="kernel-syms-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232605" comment="kernel-trace-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232606" comment="kernel-trace-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232607" comment="kernel-trace-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232608" comment="kernel-xen-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232609" comment="kernel-xen-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232610" comment="kernel-xen-devel-3.0.101-0.47.106.43 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11354</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-11354" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11354" source="CVE"/>
    <description>
    In Wireshark 2.6.0, the IEEE 1905.1a dissector could crash. This was addressed in epan/dissectors/packet-ieee1905.c by making a certain correction to string handling.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-11354.html">CVE-2018-11354</cve>
<bugzilla href="https://bugzilla.suse.com/1094301">SUSE bug 1094301</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009232727" comment="libwireshark8-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232728" comment="libwiretap6-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232729" comment="libwscodecs1-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232730" comment="libwsutil7-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232731" comment="wireshark-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232733" comment="wireshark-gtk-2.2.16-40.28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11355</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-11355" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11355" source="CVE"/>
    <description>
    In Wireshark 2.6.0, the RTCP dissector could crash. This was addressed in epan/dissectors/packet-rtcp.c by avoiding a buffer overflow for packet status chunks.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-11355.html">CVE-2018-11355</cve>
<bugzilla href="https://bugzilla.suse.com/1094301">SUSE bug 1094301</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009232727" comment="libwireshark8-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232728" comment="libwiretap6-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232729" comment="libwscodecs1-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232730" comment="libwsutil7-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232731" comment="wireshark-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232733" comment="wireshark-gtk-2.2.16-40.28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11356</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-11356" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11356" source="CVE"/>
    <description>
    In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the DNS dissector could crash. This was addressed in epan/dissectors/packet-dns.c by avoiding a NULL pointer dereference for an empty name in an SRV record.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-11356.html">CVE-2018-11356</cve>
<bugzilla href="https://bugzilla.suse.com/1094301">SUSE bug 1094301</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009232727" comment="libwireshark8-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232728" comment="libwiretap6-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232729" comment="libwscodecs1-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232730" comment="libwsutil7-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232731" comment="wireshark-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232733" comment="wireshark-gtk-2.2.16-40.28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11357</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-11357" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11357" source="CVE"/>
    <description>
    In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the LTP dissector and other dissectors could consume excessive memory. This was addressed in epan/tvbuff.c by rejecting negative lengths.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-11357.html">CVE-2018-11357</cve>
<bugzilla href="https://bugzilla.suse.com/1094301">SUSE bug 1094301</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009232727" comment="libwireshark8-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232728" comment="libwiretap6-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232729" comment="libwscodecs1-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232730" comment="libwsutil7-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232731" comment="wireshark-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232733" comment="wireshark-gtk-2.2.16-40.28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11358</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-11358" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11358" source="CVE"/>
    <description>
    In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the Q.931 dissector could crash. This was addressed in epan/dissectors/packet-q931.c by avoiding a use-after-free after a malformed packet prevented certain cleanup.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-11358.html">CVE-2018-11358</cve>
<bugzilla href="https://bugzilla.suse.com/1094301">SUSE bug 1094301</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009232727" comment="libwireshark8-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232728" comment="libwiretap6-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232729" comment="libwscodecs1-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232730" comment="libwsutil7-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232731" comment="wireshark-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232733" comment="wireshark-gtk-2.2.16-40.28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811359" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11359</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-11359" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11359" source="CVE"/>
    <description>
    In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the RRC dissector and other dissectors could crash. This was addressed in epan/proto.c by avoiding a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-11359.html">CVE-2018-11359</cve>
<bugzilla href="https://bugzilla.suse.com/1094301">SUSE bug 1094301</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009232727" comment="libwireshark8-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232728" comment="libwiretap6-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232729" comment="libwscodecs1-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232730" comment="libwsutil7-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232731" comment="wireshark-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232733" comment="wireshark-gtk-2.2.16-40.28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11360</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-11360" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11360" source="CVE"/>
    <description>
    In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the GSM A DTAP dissector could crash. This was addressed in epan/dissectors/packet-gsm_a_dtap.c by fixing an off-by-one error that caused a buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-11360.html">CVE-2018-11360</cve>
<bugzilla href="https://bugzilla.suse.com/1094301">SUSE bug 1094301</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009232727" comment="libwireshark8-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232728" comment="libwiretap6-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232729" comment="libwscodecs1-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232730" comment="libwsutil7-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232731" comment="wireshark-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232733" comment="wireshark-gtk-2.2.16-40.28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11361</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-11361" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11361" source="CVE"/>
    <description>
    In Wireshark 2.6.0, the IEEE 802.11 protocol dissector could crash. This was addressed in epan/crypt/dot11decrypt.c by avoiding a buffer overflow during FTE processing in Dot11DecryptTDLSDeriveKey.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-11361.html">CVE-2018-11361</cve>
<bugzilla href="https://bugzilla.suse.com/1094301">SUSE bug 1094301</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009232727" comment="libwireshark8-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232728" comment="libwiretap6-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232729" comment="libwscodecs1-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232730" comment="libwsutil7-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232731" comment="wireshark-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232733" comment="wireshark-gtk-2.2.16-40.28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11362</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-11362" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11362" source="CVE"/>
    <description>
    In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the LDSS dissector could crash. This was addressed in epan/dissectors/packet-ldss.c by avoiding a buffer over-read upon encountering a missing '\0' character.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-11362.html">CVE-2018-11362</cve>
<bugzilla href="https://bugzilla.suse.com/1094301">SUSE bug 1094301</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009232727" comment="libwireshark8-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232728" comment="libwiretap6-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232729" comment="libwscodecs1-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232730" comment="libwsutil7-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232731" comment="wireshark-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232733" comment="wireshark-gtk-2.2.16-40.28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1152</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-1152" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1152" source="CVE"/>
    <description>
    libjpeg-turbo 1.5.90 is vulnerable to a denial of service vulnerability caused by a divide by zero when processing a crafted BMP image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-1152.html">CVE-2018-1152</cve>
<bugzilla href="https://bugzilla.suse.com/1098155">SUSE bug 1098155</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1149960">SUSE bug 1149960</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009229516" comment="jpeg-6b-879.12.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229524" comment="libjpeg-6.2.0-879.12.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229525" comment="libjpeg-32bit-6.2.0-879.12.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11683</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-11683" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11683" source="CVE"/>
    <description>
    Liblouis 3.5.0 has a stack-based Buffer Overflow in the function parseChars in compileTranslationTable.c, a different vulnerability than CVE-2018-11440.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-11683.html">CVE-2018-11683</cve>
<bugzilla href="https://bugzilla.suse.com/1095827">SUSE bug 1095827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1096665">SUSE bug 1096665</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009233822" comment="liblouis-1.7.0-1.3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233823" comment="liblouis0-1.7.0-1.3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233824" comment="python-louis-1.7.0-1.3.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11684</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-11684" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11684" source="CVE"/>
    <description>
    Liblouis 3.5.0 has a stack-based Buffer Overflow in the function includeFile in compileTranslationTable.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-11684.html">CVE-2018-11684</cve>
<bugzilla href="https://bugzilla.suse.com/1095826">SUSE bug 1095826</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009233822" comment="liblouis-1.7.0-1.3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233823" comment="liblouis0-1.7.0-1.3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233824" comment="python-louis-1.7.0-1.3.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11685</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-11685" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11685" source="CVE"/>
    <description>
    Liblouis 3.5.0 has a stack-based Buffer Overflow in the function compileHyphenation in compileTranslationTable.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-11685.html">CVE-2018-11685</cve>
<bugzilla href="https://bugzilla.suse.com/1095825">SUSE bug 1095825</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009233822" comment="liblouis-1.7.0-1.3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233823" comment="liblouis0-1.7.0-1.3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233824" comment="python-louis-1.7.0-1.3.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1172</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-1172" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1172" source="CVE"/>
    <description>
    This vulnerability allows remote attackers to deny service on vulnerable installations of The Squid Software Foundation Squid 3.5.27-20180318. Authentication is not required to exploit this vulnerability. The specific flaw exists within ClientRequestContext::sslBumpAccessCheck(). A crafted request can trigger the dereference of a null pointer. An attacker can leverage this vulnerability to create a denial-of-service condition to users of the system. Was ZDI-CAN-6088.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-1172.html">CVE-2018-1172</cve>
<bugzilla href="https://bugzilla.suse.com/1090089">SUSE bug 1090089</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210809" comment="squid3-3.1.23-8.16.37.6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11759</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-11759" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11759" source="CVE"/>
    <description>
    The Apache Web Server (httpd) specific code that normalised the requested path before matching it to the URI-worker map in Apache Tomcat JK (mod_jk) Connector 1.2.0 to 1.2.44 did not handle some edge cases correctly. If only a sub-set of the URLs supported by Tomcat were exposed via httpd, then it was possible for a specially constructed request to expose application functionality through the reverse proxy that was not intended for clients accessing the application via the reverse proxy. It was also possible in some configurations for a specially constructed request to bypass the access controls configured in httpd. While there is some overlap between this issue and CVE-2018-1323, they are not identical.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-11759.html">CVE-2018-11759</cve>
<bugzilla href="https://bugzilla.suse.com/1114612">SUSE bug 1114612</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240961" comment="apache2-mod_jk-1.2.40-0.2.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11784</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-11784" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11784" source="CVE"/>
    <description>
    When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-11784.html">CVE-2018-11784</cve>
<bugzilla href="https://bugzilla.suse.com/1110850">SUSE bug 1110850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1122212">SUSE bug 1122212</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009240868" comment="tomcat6-6.0.53-0.57.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240869" comment="tomcat6-admin-webapps-6.0.53-0.57.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240870" comment="tomcat6-docs-webapp-6.0.53-0.57.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240871" comment="tomcat6-javadoc-6.0.53-0.57.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240872" comment="tomcat6-jsp-2_1-api-6.0.53-0.57.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240873" comment="tomcat6-lib-6.0.53-0.57.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240874" comment="tomcat6-servlet-2_5-api-6.0.53-0.57.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240875" comment="tomcat6-webapps-6.0.53-0.57.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-11806" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11806" source="CVE"/>
    <description>
    m_cat in slirp/mbuf.c in Qemu has a heap-based buffer overflow via incoming fragmented datagrams.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-11806.html">CVE-2018-11806</cve>
<bugzilla href="https://bugzilla.suse.com/1096223">SUSE bug 1096223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1096224">SUSE bug 1096224</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009233933" comment="kvm-1.4.2-53.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233376" comment="xen-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233381" comment="xen-doc-html-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233382" comment="xen-doc-pdf-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233377" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233378" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233379" comment="xen-libs-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233383" comment="xen-libs-32bit-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233384" comment="xen-tools-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233380" comment="xen-tools-domU-4.2.5_21-45.25 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009233933" comment="kvm-1.4.2-53.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250482" comment="xen-4.2.5_21-47.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250483" comment="xen-doc-html-4.2.5_21-47.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250484" comment="xen-doc-pdf-4.2.5_21-47.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250485" comment="xen-kmp-default-4.2.5_21_3.0.101_0.181.TDC-47.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250486" comment="xen-libs-4.2.5_21-47.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250487" comment="xen-tools-4.2.5_21-47.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250488" comment="xen-tools-domU-4.2.5_21-47.27 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11813</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-11813" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11813" source="CVE"/>
    <description>
    libjpeg 9c has a large loop because read_pixel in rdtarga.c mishandles EOF.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-11813.html">CVE-2018-11813</cve>
<bugzilla href="https://bugzilla.suse.com/1096209">SUSE bug 1096209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1149960">SUSE bug 1149960</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009229516" comment="jpeg-6b-879.12.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229524" comment="libjpeg-6.2.0-879.12.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229525" comment="libjpeg-32bit-6.2.0-879.12.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12015</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-12015" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12015" source="CVE"/>
    <description>
    In Perl through 5.26.2, the Archive::Tar module allows remote attackers to bypass a directory-traversal protection mechanism, and overwrite arbitrary files, via an archive file containing a symlink and a regular file with the same name.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-12015.html">CVE-2018-12015</cve>
<bugzilla href="https://bugzilla.suse.com/1096718">SUSE bug 1096718</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1099497">SUSE bug 1099497</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1099507">SUSE bug 1099507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1106717">SUSE bug 1106717</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009230373" comment="perl-5.10.0-64.81.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230379" comment="perl-32bit-5.10.0-64.81.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230375" comment="perl-Module-Build-0.2808.01-0.81.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230376" comment="perl-Test-Simple-0.72-0.81.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230377" comment="perl-base-5.10.0-64.81.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230378" comment="perl-doc-5.10.0-64.81.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12020</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-12020" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12020" source="CVE"/>
    <description>
    mainproc.c in GnuPG before 2.2.8 mishandles the original filename during decryption and verification actions, which allows remote attackers to spoof the output that GnuPG sends on file descriptor 2 to other programs that use the "--status-fd 2" option. For example, the OpenPGP data might represent an original filename that contains line feed characters in conjunction with GOODSIG or VALIDSIG status codes.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-12020.html">CVE-2018-12020</cve>
<bugzilla href="https://bugzilla.suse.com/1096745">SUSE bug 1096745</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1101134">SUSE bug 1101134</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009223547" comment="gpg2-2.0.9-25.33.42.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009223548" comment="gpg2-lang-2.0.9-25.33.42.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-12126" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126" source="CVE"/>
    <description>
    Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-12126.html">CVE-2018-12126</cve>
<bugzilla href="https://bugzilla.suse.com/1103186">SUSE bug 1103186</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1132686">SUSE bug 1132686</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1135409">SUSE bug 1135409</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1135522">SUSE bug 1135522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1135524">SUSE bug 1135524</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1137916">SUSE bug 1137916</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1149725">SUSE bug 1149725</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1149726">SUSE bug 1149726</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1149729">SUSE bug 1149729</bugzilla>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:201812127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12127</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-12127" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127" source="CVE"/>
    <description>
    Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-12127.html">CVE-2018-12127</cve>
<bugzilla href="https://bugzilla.suse.com/1103186">SUSE bug 1103186</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1132686">SUSE bug 1132686</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1135409">SUSE bug 1135409</bugzilla>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:201812130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12130</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-12130" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130" source="CVE"/>
    <description>
    Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-12130.html">CVE-2018-12130</cve>
<bugzilla href="https://bugzilla.suse.com/1103186">SUSE bug 1103186</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1132686">SUSE bug 1132686</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1135409">SUSE bug 1135409</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1137916">SUSE bug 1137916</bugzilla>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:201812233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12233</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-12233" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12233" source="CVE"/>
    <description>
    In the ea_get function in fs/jfs/xattr.c in the Linux kernel through 4.17.1, a memory corruption bug in JFS can be triggered by calling setxattr twice with two different extended attribute names on the same file. This vulnerability can be triggered by an unprivileged user with the ability to create files and execute programs. A kmalloc call is incorrect, leading to slab-out-of-bounds in jfs_xattr.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-12233.html">CVE-2018-12233</cve>
<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1097234">SUSE bug 1097234</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009232611" comment="kernel-bigsmp-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232612" comment="kernel-bigsmp-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232613" comment="kernel-bigsmp-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232594" comment="kernel-default-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232595" comment="kernel-default-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232596" comment="kernel-default-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232614" comment="kernel-default-man-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232597" comment="kernel-ec2-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232598" comment="kernel-ec2-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232599" comment="kernel-ec2-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232600" comment="kernel-pae-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232601" comment="kernel-pae-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232602" comment="kernel-pae-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232603" comment="kernel-source-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232604" comment="kernel-syms-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232605" comment="kernel-trace-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232606" comment="kernel-trace-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232607" comment="kernel-trace-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232608" comment="kernel-xen-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232609" comment="kernel-xen-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232610" comment="kernel-xen-devel-3.0.101-0.47.106.43 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12327</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-12327" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12327" source="CVE"/>
    <description>
    Stack-based buffer overflow in ntpq and ntpdc of NTP version 4.2.8p11 allows an attacker to achieve code execution or escalate to higher privileges via a long string as the argument for an IPv4 or IPv6 command-line parameter. NOTE: It is unclear whether there are any common situations in which ntpq or ntpdc is used with a command line from an untrusted source.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-12327.html">CVE-2018-12327</cve>
<bugzilla href="https://bugzilla.suse.com/1098531">SUSE bug 1098531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1107887">SUSE bug 1107887</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1111552">SUSE bug 1111552</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1111853">SUSE bug 1111853</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009237961" comment="ntp-4.2.8p12-48.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237962" comment="ntp-doc-4.2.8p12-48.21 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812359" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12359</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-12359" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12359" source="CVE"/>
    <description>
    A buffer overflow can occur when rendering canvas content while adjusting the height and width of the canvas element dynamically, causing data to be written outside of the currently computed boundaries. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-12359.html">CVE-2018-12359</cve>
<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009232158" comment="MozillaFirefox-52.9.0esr-72.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232173" comment="MozillaFirefox-translations-52.9.0esr-72.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12360</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-12360" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12360" source="CVE"/>
    <description>
    A use-after-free vulnerability can occur when deleting an input element during a mutation event handler triggered by focusing that element. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-12360.html">CVE-2018-12360</cve>
<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009232158" comment="MozillaFirefox-52.9.0esr-72.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232173" comment="MozillaFirefox-translations-52.9.0esr-72.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12362</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-12362" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12362" source="CVE"/>
    <description>
    An integer overflow can occur during graphics operations done by the Supplemental Streaming SIMD Extensions 3 (SSSE3) scaler, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-12362.html">CVE-2018-12362</cve>
<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009232158" comment="MozillaFirefox-52.9.0esr-72.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232173" comment="MozillaFirefox-translations-52.9.0esr-72.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12363</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-12363" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12363" source="CVE"/>
    <description>
    A use-after-free vulnerability can occur when script uses mutation events to move DOM nodes between documents, resulting in the old document that held the node being freed but the node still having a pointer referencing it. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-12363.html">CVE-2018-12363</cve>
<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009232158" comment="MozillaFirefox-52.9.0esr-72.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232173" comment="MozillaFirefox-translations-52.9.0esr-72.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12364</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-12364" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12364" source="CVE"/>
    <description>
    NPAPI plugins, such as Adobe Flash, can send non-simple cross-origin requests, bypassing CORS by making a same-origin POST that does a 307 redirect to the target site. This allows for a malicious site to engage in cross-site request forgery (CSRF) attacks. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-12364.html">CVE-2018-12364</cve>
<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009232158" comment="MozillaFirefox-52.9.0esr-72.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232173" comment="MozillaFirefox-translations-52.9.0esr-72.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12365</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-12365" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12365" source="CVE"/>
    <description>
    A compromised IPC child process can escape the content sandbox and list the names of arbitrary files on the file system without user consent or interaction. This could result in exposure of private local files. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-12365.html">CVE-2018-12365</cve>
<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009232158" comment="MozillaFirefox-52.9.0esr-72.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232173" comment="MozillaFirefox-translations-52.9.0esr-72.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812366" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12366</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-12366" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12366" source="CVE"/>
    <description>
    An invalid grid size during QCMS (color profile) transformations can result in the out-of-bounds read interpreted as a float value. This could leak private data into the output. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-12366.html">CVE-2018-12366</cve>
<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009232158" comment="MozillaFirefox-52.9.0esr-72.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232173" comment="MozillaFirefox-translations-52.9.0esr-72.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12368</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-12368" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12368" source="CVE"/>
    <description>
    Windows 10 does not warn users before opening executable files with the SettingContent-ms extension even when they have been downloaded from the internet and have the "Mark of the Web." Without the warning, unsuspecting users unfamiliar with this new file type might run an unwanted executable. This also allows a WebExtension with the limited downloads.open permission to execute arbitrary code without user interaction on Windows 10 systems. *Note: this issue only affects Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-12368.html">CVE-2018-12368</cve>
<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009232158" comment="MozillaFirefox-52.9.0esr-72.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232173" comment="MozillaFirefox-translations-52.9.0esr-72.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12539</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-12539" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12539" source="CVE"/>
    <description>
    In Eclipse OpenJ9 version 0.8, users other than the process owner may be able to use Java Attach API to connect to an Eclipse OpenJ9 or IBM JVM on the same machine and use Attach API operations, which includes the ability to execute untrusted native code. Attach API is enabled by default on Windows, Linux and AIX JVMs and can be disabled using the command line option -Dcom.ibm.tools.attach.enable=no.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-12539.html">CVE-2018-12539</cve>
<bugzilla href="https://bugzilla.suse.com/1101645">SUSE bug 1101645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1101656">SUSE bug 1101656</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009233814" comment="java-1_7_0-ibm-1.7.0_sr10.30-65.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233815" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.30-65.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233816" comment="java-1_7_0-ibm-devel-1.7.0_sr10.30-65.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233817" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.30-65.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233818" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.30-65.28 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009233814" comment="java-1_7_0-ibm-1.7.0_sr10.30-65.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233815" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.30-65.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233817" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.30-65.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233818" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.30-65.28 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12599</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-12599" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12599" source="CVE"/>
    <description>
    In ImageMagick 7.0.8-3 Q16, ReadBMPImage and WriteBMPImage in coders/bmp.c allow attackers to cause an out of bounds write via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-12599.html">CVE-2018-12599</cve>
<bugzilla href="https://bugzilla.suse.com/1098546">SUSE bug 1098546</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1117463">SUSE bug 1117463</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009233150" comment="ImageMagick-6.4.3.6-78.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233160" comment="libMagickCore1-6.4.3.6-78.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233161" comment="libMagickCore1-32bit-6.4.3.6-78.56 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12600</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-12600" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12600" source="CVE"/>
    <description>
    In ImageMagick 7.0.8-3 Q16, ReadDIBImage and WriteDIBImage in coders/dib.c allow attackers to cause an out of bounds write via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-12600.html">CVE-2018-12600</cve>
<bugzilla href="https://bugzilla.suse.com/1098545">SUSE bug 1098545</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1098546">SUSE bug 1098546</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1117463">SUSE bug 1117463</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009233150" comment="ImageMagick-6.4.3.6-78.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233160" comment="libMagickCore1-6.4.3.6-78.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233161" comment="libMagickCore1-32bit-6.4.3.6-78.56 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12617</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-12617" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12617" source="CVE"/>
    <description>
    qmp_guest_file_read in qga/commands-posix.c and qga/commands-win32.c in qemu-ga (aka QEMU Guest Agent) in QEMU 2.12.50 has an integer overflow causing a g_malloc0() call to trigger a segmentation fault when trying to allocate a large memory chunk. The vulnerability can be exploited by sending a crafted QMP command (including guest-file-read with a large count value) to the agent via the listening socket.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-12617.html">CVE-2018-12617</cve>
<bugzilla href="https://bugzilla.suse.com/1098735">SUSE bug 1098735</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1098744">SUSE bug 1098744</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009233933" comment="kvm-1.4.2-53.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233376" comment="xen-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233381" comment="xen-doc-html-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233382" comment="xen-doc-pdf-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233377" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233378" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233379" comment="xen-libs-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233383" comment="xen-libs-32bit-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233384" comment="xen-tools-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233380" comment="xen-tools-domU-4.2.5_21-45.25 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009233933" comment="kvm-1.4.2-53.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250482" comment="xen-4.2.5_21-47.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250483" comment="xen-doc-html-4.2.5_21-47.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250484" comment="xen-doc-pdf-4.2.5_21-47.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250485" comment="xen-kmp-default-4.2.5_21_3.0.101_0.181.TDC-47.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250486" comment="xen-libs-4.2.5_21-47.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250487" comment="xen-tools-4.2.5_21-47.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250488" comment="xen-tools-domU-4.2.5_21-47.27 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12882</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-12882" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12882" source="CVE"/>
    <description>
    exif_read_from_impl in ext/exif/exif.c in PHP 7.2.x through 7.2.7 allows attackers to trigger a use-after-free (in exif_read_from_file) because it closes a stream that it is not responsible for closing. The vulnerable code is reachable through the PHP exif_read_data function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-12882.html">CVE-2018-12882</cve>
<bugzilla href="https://bugzilla.suse.com/1099098">SUSE bug 1099098</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009230565" comment="apache2-mod_php53-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230555" comment="php53-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230566" comment="php53-bcmath-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230567" comment="php53-bz2-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230568" comment="php53-calendar-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230569" comment="php53-ctype-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230570" comment="php53-curl-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230571" comment="php53-dba-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230572" comment="php53-dom-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230573" comment="php53-exif-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230574" comment="php53-fastcgi-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230575" comment="php53-fileinfo-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230576" comment="php53-ftp-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230577" comment="php53-gd-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230578" comment="php53-gettext-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230579" comment="php53-gmp-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230580" comment="php53-iconv-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230581" comment="php53-intl-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230582" comment="php53-json-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230583" comment="php53-ldap-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230584" comment="php53-mbstring-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230585" comment="php53-mcrypt-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230586" comment="php53-mysql-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230587" comment="php53-odbc-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230588" comment="php53-openssl-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230589" comment="php53-pcntl-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230590" comment="php53-pdo-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230591" comment="php53-pear-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230592" comment="php53-pgsql-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230593" comment="php53-pspell-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230594" comment="php53-shmop-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230595" comment="php53-snmp-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230596" comment="php53-soap-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230597" comment="php53-suhosin-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230598" comment="php53-sysvmsg-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230599" comment="php53-sysvsem-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230600" comment="php53-sysvshm-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230601" comment="php53-tokenizer-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230602" comment="php53-wddx-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230603" comment="php53-xmlreader-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230604" comment="php53-xmlrpc-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230605" comment="php53-xmlwriter-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230606" comment="php53-xsl-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230607" comment="php53-zip-5.3.17-112.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230608" comment="php53-zlib-5.3.17-112.28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12891</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-12891" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12891" source="CVE"/>
    <description>
    An issue was discovered in Xen through 4.10.x. Certain PV MMU operations may take a long time to process. For that reason Xen explicitly checks for the need to preempt the current vCPU at certain points. A few rarely taken code paths did bypass such checks. By suitably enforcing the conditions through its own page table contents, a malicious guest may cause such bypasses to be used for an unbounded number of iterations. A malicious or buggy PV guest may cause a Denial of Service (DoS) affecting the entire host. Specifically, it may prevent use of a physical CPU for an indeterminate period of time. All Xen versions from 3.4 onwards are vulnerable. Xen versions 3.3 and earlier are vulnerable to an even wider class of attacks, due to them lacking preemption checks altogether in the affected code paths. Only x86 systems are affected. ARM systems are not affected. Only multi-vCPU x86 PV guests can leverage the vulnerability. x86 HVM or PVH guests as well as x86 single-vCPU PV ones cannot leverage the vulnerability.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-12891.html">CVE-2018-12891</cve>
<bugzilla href="https://bugzilla.suse.com/1097521">SUSE bug 1097521</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009233376" comment="xen-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233381" comment="xen-doc-html-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233382" comment="xen-doc-pdf-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233377" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233378" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233379" comment="xen-libs-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233383" comment="xen-libs-32bit-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233384" comment="xen-tools-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233380" comment="xen-tools-domU-4.2.5_21-45.25 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250482" comment="xen-4.2.5_21-47.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250483" comment="xen-doc-html-4.2.5_21-47.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250484" comment="xen-doc-pdf-4.2.5_21-47.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250485" comment="xen-kmp-default-4.2.5_21_3.0.101_0.181.TDC-47.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250486" comment="xen-libs-4.2.5_21-47.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250487" comment="xen-tools-4.2.5_21-47.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250488" comment="xen-tools-domU-4.2.5_21-47.27 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12893</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-12893" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12893" source="CVE"/>
    <description>
    An issue was discovered in Xen through 4.10.x. One of the fixes in XSA-260 added some safety checks to help prevent Xen livelocking with debug exceptions. Unfortunately, due to an oversight, at least one of these safety checks can be triggered by a guest. A malicious PV guest can crash Xen, leading to a Denial of Service. All Xen systems which have applied the XSA-260 fix are vulnerable. Only x86 systems are vulnerable. ARM systems are not vulnerable. Only x86 PV guests can exploit the vulnerability. x86 HVM and PVH guests cannot exploit the vulnerability. An attacker needs to be able to control hardware debugging facilities to exploit the vulnerability, but such permissions are typically available to unprivileged users.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-12893.html">CVE-2018-12893</cve>
<bugzilla href="https://bugzilla.suse.com/1097522">SUSE bug 1097522</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009233376" comment="xen-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233381" comment="xen-doc-html-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233382" comment="xen-doc-pdf-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233377" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233378" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233379" comment="xen-libs-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233383" comment="xen-libs-32bit-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233384" comment="xen-tools-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233380" comment="xen-tools-domU-4.2.5_21-45.25 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250482" comment="xen-4.2.5_21-47.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250483" comment="xen-doc-html-4.2.5_21-47.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250484" comment="xen-doc-pdf-4.2.5_21-47.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250485" comment="xen-kmp-default-4.2.5_21_3.0.101_0.181.TDC-47.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250486" comment="xen-libs-4.2.5_21-47.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250487" comment="xen-tools-4.2.5_21-47.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250488" comment="xen-tools-domU-4.2.5_21-47.27 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12896</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-12896" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12896" source="CVE"/>
    <description>
    An issue was discovered in the Linux kernel through 4.17.3. An Integer Overflow in kernel/time/posix-timers.c in the POSIX timer code is caused by the way the overrun accounting works. Depending on interval and expiry time values, the overrun can be larger than INT_MAX, but the accounting is int based. This basically makes the accounting values, which are visible to user space via timer_getoverrun(2) and siginfo::si_overrun, random. For example, a local user can cause a denial of service (signed integer overflow) via crafted mmap, futex, timer_create, and timer_settime system calls.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-12896.html">CVE-2018-12896</cve>
<bugzilla href="https://bugzilla.suse.com/1099922">SUSE bug 1099922</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009238589" comment="kernel-bigsmp-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238590" comment="kernel-bigsmp-base-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238591" comment="kernel-bigsmp-devel-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238572" comment="kernel-default-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238573" comment="kernel-default-base-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238574" comment="kernel-default-devel-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238592" comment="kernel-default-man-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238575" comment="kernel-ec2-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238576" comment="kernel-ec2-base-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238577" comment="kernel-ec2-devel-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238578" comment="kernel-pae-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238579" comment="kernel-pae-base-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238580" comment="kernel-pae-devel-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238581" comment="kernel-source-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238582" comment="kernel-syms-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238583" comment="kernel-trace-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238584" comment="kernel-trace-base-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238585" comment="kernel-trace-devel-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238586" comment="kernel-xen-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238587" comment="kernel-xen-base-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238588" comment="kernel-xen-devel-3.0.101-0.47.106.56 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12900</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-12900" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12900" source="CVE"/>
    <description>
    Heap-based buffer overflow in the cpSeparateBufToContigBuf function in tiffcp.c in LibTIFF 4.0.9 allows remote attackers to cause a denial of service (crash) or possibly have unspecified other impact via a crafted TIFF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-12900.html">CVE-2018-12900</cve>
<bugzilla href="https://bugzilla.suse.com/1099257">SUSE bug 1099257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1125113">SUSE bug 1125113</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1150480">SUSE bug 1150480</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009240660" comment="libtiff3-3.8.2-141.169.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240661" comment="libtiff3-32bit-3.8.2-141.169.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240659" comment="tiff-3.8.2-141.169.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1301</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-1301" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1301" source="CVE"/>
    <description>
    A specially crafted request could have crashed the Apache HTTP Server prior to version 2.4.30, due to an out of bound access after a size limit is reached by reading the HTTP header. This vulnerability is considered very hard if not impossible to trigger in non-debug mode (both log and build level), so it is classified as low risk for common server usage.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-1301.html">CVE-2018-1301</cve>
<bugzilla href="https://bugzilla.suse.com/1086817">SUSE bug 1086817</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202414" comment="apache2-2.2.34-70.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202416" comment="apache2-doc-2.2.34-70.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202417" comment="apache2-example-pages-2.2.34-70.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202418" comment="apache2-prefork-2.2.34-70.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202419" comment="apache2-utils-2.2.34-70.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202420" comment="apache2-worker-2.2.34-70.15 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1304</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-1304" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1304" source="CVE"/>
    <description>
    The URL pattern of "" (the empty string) which exactly maps to the context root was not correctly handled in Apache Tomcat 9.0.0.M1 to 9.0.4, 8.5.0 to 8.5.27, 8.0.0.RC1 to 8.0.49 and 7.0.0 to 7.0.84 when used as part of a security constraint definition. This caused the constraint to be ignored. It was, therefore, possible for unauthorised users to gain access to web application resources that should have been protected. Only security constraints with a URL pattern of the empty string were affected.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-1304.html">CVE-2018-1304</cve>
<bugzilla href="https://bugzilla.suse.com/1082480">SUSE bug 1082480</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009229621" comment="tomcat6-6.0.53-0.57.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229622" comment="tomcat6-admin-webapps-6.0.53-0.57.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229623" comment="tomcat6-docs-webapp-6.0.53-0.57.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229624" comment="tomcat6-javadoc-6.0.53-0.57.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229625" comment="tomcat6-jsp-2_1-api-6.0.53-0.57.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229626" comment="tomcat6-lib-6.0.53-0.57.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229627" comment="tomcat6-servlet-2_5-api-6.0.53-0.57.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229628" comment="tomcat6-webapps-6.0.53-0.57.7 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201813053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-13053</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-13053" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13053" source="CVE"/>
    <description>
    The alarm_timer_nsleep function in kernel/time/alarmtimer.c in the Linux kernel through 4.17.3 has an integer overflow via a large relative timeout because ktime_add_safe is not used.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-13053.html">CVE-2018-13053</cve>
<bugzilla href="https://bugzilla.suse.com/1099924">SUSE bug 1099924</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009232611" comment="kernel-bigsmp-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232612" comment="kernel-bigsmp-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232613" comment="kernel-bigsmp-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232594" comment="kernel-default-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232595" comment="kernel-default-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232596" comment="kernel-default-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232614" comment="kernel-default-man-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232597" comment="kernel-ec2-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232598" comment="kernel-ec2-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232599" comment="kernel-ec2-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232600" comment="kernel-pae-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232601" comment="kernel-pae-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232602" comment="kernel-pae-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232603" comment="kernel-source-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232604" comment="kernel-syms-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232605" comment="kernel-trace-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232606" comment="kernel-trace-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232607" comment="kernel-trace-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232608" comment="kernel-xen-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232609" comment="kernel-xen-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232610" comment="kernel-xen-devel-3.0.101-0.47.106.43 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1312</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-1312" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1312" source="CVE"/>
    <description>
    In Apache httpd 2.2.0 to 2.4.29, when generating an HTTP Digest authentication challenge, the nonce sent to prevent reply attacks was not correctly generated using a pseudo-random seed. In a cluster of servers using a common Digest authentication configuration, HTTP requests could be replayed across servers by an attacker without detection.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-1312.html">CVE-2018-1312</cve>
<bugzilla href="https://bugzilla.suse.com/1086775">SUSE bug 1086775</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202414" comment="apache2-2.2.34-70.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202416" comment="apache2-doc-2.2.34-70.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202417" comment="apache2-example-pages-2.2.34-70.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202418" comment="apache2-prefork-2.2.34-70.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202419" comment="apache2-utils-2.2.34-70.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202420" comment="apache2-worker-2.2.34-70.15 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201813406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-13406</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-13406" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13406" source="CVE"/>
    <description>
    An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c in the Linux kernel before 4.17.4 could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-13406.html">CVE-2018-13406</cve>
<bugzilla href="https://bugzilla.suse.com/1098016">SUSE bug 1098016</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1100418">SUSE bug 1100418</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009232611" comment="kernel-bigsmp-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232612" comment="kernel-bigsmp-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232613" comment="kernel-bigsmp-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232594" comment="kernel-default-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232595" comment="kernel-default-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232596" comment="kernel-default-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232614" comment="kernel-default-man-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232597" comment="kernel-ec2-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232598" comment="kernel-ec2-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232599" comment="kernel-ec2-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232600" comment="kernel-pae-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232601" comment="kernel-pae-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232602" comment="kernel-pae-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232603" comment="kernel-source-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232604" comment="kernel-syms-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232605" comment="kernel-trace-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232606" comment="kernel-trace-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232607" comment="kernel-trace-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232608" comment="kernel-xen-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232609" comment="kernel-xen-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232610" comment="kernel-xen-devel-3.0.101-0.47.106.43 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201813785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-13785</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-13785" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13785" source="CVE"/>
    <description>
    In libpng 1.6.34, a wrong calculation of row_factor in the png_check_chunk_length function (pngrutil.c) may trigger an integer overflow and resultant divide-by-zero while processing a crafted PNG file, leading to a denial of service.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-13785.html">CVE-2018-13785</cve>
<bugzilla href="https://bugzilla.suse.com/1100687">SUSE bug 1100687</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1112153">SUSE bug 1112153</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1116574">SUSE bug 1116574</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009240826" comment="java-1_7_0-ibm-1.7.0_sr10.35-65.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240827" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.35-65.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240828" comment="java-1_7_0-ibm-devel-1.7.0_sr10.35-65.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240829" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.35-65.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240830" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.35-65.31 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009240826" comment="java-1_7_0-ibm-1.7.0_sr10.35-65.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240827" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.35-65.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240829" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.35-65.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240830" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.35-65.31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201813796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-13796</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-13796" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13796" source="CVE"/>
    <description>
    An issue was discovered in GNU Mailman before 2.1.28. A crafted URL can cause arbitrary text to be displayed on a web page from a trusted site.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-13796.html">CVE-2018-13796</cve>
<bugzilla href="https://bugzilla.suse.com/1101288">SUSE bug 1101288</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009242811" comment="mailman-2.1.15-9.6.6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1417</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-1417" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1417" source="CVE"/>
    <description>
    Under certain circumstances, a flaw in the J9 JVM (IBM SDK, Java Technology Edition 7.1 and 8.0) allows untrusted code running under a security manager to elevate its privileges. IBM X-Force ID: 138823.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-1417.html">CVE-2018-1417</cve>
<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205417" comment="java-1_7_0-ibm-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205418" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205419" comment="java-1_7_0-ibm-devel-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205420" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205421" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.25-65.25 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205417" comment="java-1_7_0-ibm-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205418" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205420" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205421" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.25-65.25 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14339</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-14339" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14339" source="CVE"/>
    <description>
    In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the MMSE dissector could go into an infinite loop. This was addressed in epan/proto.c by adding offset and length validation.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-14339.html">CVE-2018-14339</cve>
<bugzilla href="https://bugzilla.suse.com/1101810">SUSE bug 1101810</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009232727" comment="libwireshark8-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232728" comment="libwiretap6-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232729" comment="libwscodecs1-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232730" comment="libwsutil7-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232731" comment="wireshark-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232733" comment="wireshark-gtk-2.2.16-40.28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14340</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-14340" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14340" source="CVE"/>
    <description>
    In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, dissectors that support zlib decompression could crash. This was addressed in epan/tvbuff_zlib.c by rejecting negative lengths to avoid a buffer over-read.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-14340.html">CVE-2018-14340</cve>
<bugzilla href="https://bugzilla.suse.com/1101804">SUSE bug 1101804</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009232727" comment="libwireshark8-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232728" comment="libwiretap6-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232729" comment="libwscodecs1-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232730" comment="libwsutil7-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232731" comment="wireshark-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232733" comment="wireshark-gtk-2.2.16-40.28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14341</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-14341" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14341" source="CVE"/>
    <description>
    In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the DICOM dissector could go into a large or infinite loop. This was addressed in epan/dissectors/packet-dcm.c by preventing an offset overflow.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-14341.html">CVE-2018-14341</cve>
<bugzilla href="https://bugzilla.suse.com/1101776">SUSE bug 1101776</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009232727" comment="libwireshark8-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232728" comment="libwiretap6-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232729" comment="libwscodecs1-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232730" comment="libwsutil7-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232731" comment="wireshark-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232733" comment="wireshark-gtk-2.2.16-40.28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14342</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-14342" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14342" source="CVE"/>
    <description>
    In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the BGP protocol dissector could go into a large loop. This was addressed in epan/dissectors/packet-bgp.c by validating Path Attribute lengths.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-14342.html">CVE-2018-14342</cve>
<bugzilla href="https://bugzilla.suse.com/1101777">SUSE bug 1101777</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009232727" comment="libwireshark8-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232728" comment="libwiretap6-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232729" comment="libwscodecs1-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232730" comment="libwsutil7-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232731" comment="wireshark-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232733" comment="wireshark-gtk-2.2.16-40.28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14343</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-14343" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14343" source="CVE"/>
    <description>
    In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the ASN.1 BER dissector could crash. This was addressed in epan/dissectors/packet-ber.c by ensuring that length values do not exceed the maximum signed integer.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-14343.html">CVE-2018-14343</cve>
<bugzilla href="https://bugzilla.suse.com/1101786">SUSE bug 1101786</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009232727" comment="libwireshark8-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232728" comment="libwiretap6-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232729" comment="libwscodecs1-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232730" comment="libwsutil7-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232731" comment="wireshark-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232733" comment="wireshark-gtk-2.2.16-40.28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14344</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-14344" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14344" source="CVE"/>
    <description>
    In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the ISMP dissector could crash. This was addressed in epan/dissectors/packet-ismp.c by validating the IPX address length to avoid a buffer over-read.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-14344.html">CVE-2018-14344</cve>
<bugzilla href="https://bugzilla.suse.com/1101788">SUSE bug 1101788</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009232727" comment="libwireshark8-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232728" comment="libwiretap6-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232729" comment="libwscodecs1-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232730" comment="libwsutil7-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232731" comment="wireshark-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232733" comment="wireshark-gtk-2.2.16-40.28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14348</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-14348" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14348" source="CVE"/>
    <description>
    libcgroup up to and including 0.41 creates /var/log/cgred with mode 0666 regardless of the configured umask, leading to disclosure of information.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-14348.html">CVE-2018-14348</cve>
<bugzilla href="https://bugzilla.suse.com/1100365">SUSE bug 1100365</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1149966">SUSE bug 1149966</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248620" comment="libcgroup1-0.37.1-5.19.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14349</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-14349" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14349" source="CVE"/>
    <description>
    An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/command.c mishandles a NO response without a message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-14349.html">CVE-2018-14349</cve>
<bugzilla href="https://bugzilla.suse.com/1101428">SUSE bug 1101428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1101589">SUSE bug 1101589</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1101593">SUSE bug 1101593</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232734" comment="mutt-1.5.17-42.43 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14350</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-14350" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14350" source="CVE"/>
    <description>
    An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long INTERNALDATE field.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-14350.html">CVE-2018-14350</cve>
<bugzilla href="https://bugzilla.suse.com/1101428">SUSE bug 1101428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1101588">SUSE bug 1101588</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1101593">SUSE bug 1101593</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232734" comment="mutt-1.5.17-42.43 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14352</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-14352" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14352" source="CVE"/>
    <description>
    An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap_quote_string in imap/util.c does not leave room for quote characters, leading to a stack-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-14352.html">CVE-2018-14352</cve>
<bugzilla href="https://bugzilla.suse.com/1101428">SUSE bug 1101428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1101582">SUSE bug 1101582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1101593">SUSE bug 1101593</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232734" comment="mutt-1.5.17-42.43 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14353</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-14353" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14353" source="CVE"/>
    <description>
    An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap_quote_string in imap/util.c has an integer underflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-14353.html">CVE-2018-14353</cve>
<bugzilla href="https://bugzilla.suse.com/1101428">SUSE bug 1101428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1101581">SUSE bug 1101581</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1101593">SUSE bug 1101593</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232734" comment="mutt-1.5.17-42.43 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14354</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-14354" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14354" source="CVE"/>
    <description>
    An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote IMAP servers to execute arbitrary commands via backquote characters, related to the mailboxes command associated with a manual subscription or unsubscription.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-14354.html">CVE-2018-14354</cve>
<bugzilla href="https://bugzilla.suse.com/1101428">SUSE bug 1101428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1101578">SUSE bug 1101578</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1101581">SUSE bug 1101581</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1101589">SUSE bug 1101589</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1101593">SUSE bug 1101593</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232734" comment="mutt-1.5.17-42.43 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14355</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-14355" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14355" source="CVE"/>
    <description>
    An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/util.c mishandles ".." directory traversal in a mailbox name.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-14355.html">CVE-2018-14355</cve>
<bugzilla href="https://bugzilla.suse.com/1101428">SUSE bug 1101428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1101577">SUSE bug 1101577</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1101593">SUSE bug 1101593</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232734" comment="mutt-1.5.17-42.43 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14356</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-14356" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14356" source="CVE"/>
    <description>
    An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. pop.c mishandles a zero-length UID.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-14356.html">CVE-2018-14356</cve>
<bugzilla href="https://bugzilla.suse.com/1101428">SUSE bug 1101428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1101576">SUSE bug 1101576</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1101589">SUSE bug 1101589</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1101593">SUSE bug 1101593</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232734" comment="mutt-1.5.17-42.43 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14357</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-14357" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14357" source="CVE"/>
    <description>
    An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote IMAP servers to execute arbitrary commands via backquote characters, related to the mailboxes command associated with an automatic subscription.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-14357.html">CVE-2018-14357</cve>
<bugzilla href="https://bugzilla.suse.com/1101428">SUSE bug 1101428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1101573">SUSE bug 1101573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1101581">SUSE bug 1101581</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1101589">SUSE bug 1101589</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1101593">SUSE bug 1101593</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232734" comment="mutt-1.5.17-42.43 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14358</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-14358" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14358" source="CVE"/>
    <description>
    An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long RFC822.SIZE field.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-14358.html">CVE-2018-14358</cve>
<bugzilla href="https://bugzilla.suse.com/1101428">SUSE bug 1101428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1101571">SUSE bug 1101571</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1101593">SUSE bug 1101593</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232734" comment="mutt-1.5.17-42.43 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814359" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14359</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-14359" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14359" source="CVE"/>
    <description>
    An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They have a buffer overflow via base64 data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-14359.html">CVE-2018-14359</cve>
<bugzilla href="https://bugzilla.suse.com/1101428">SUSE bug 1101428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1101570">SUSE bug 1101570</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1101589">SUSE bug 1101589</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1101593">SUSE bug 1101593</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232734" comment="mutt-1.5.17-42.43 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14362</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-14362" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14362" source="CVE"/>
    <description>
    An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. pop.c does not forbid characters that may have unsafe interaction with message-cache pathnames, as demonstrated by a '/' character.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-14362.html">CVE-2018-14362</cve>
<bugzilla href="https://bugzilla.suse.com/1101428">SUSE bug 1101428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1101567">SUSE bug 1101567</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1101589">SUSE bug 1101589</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1101593">SUSE bug 1101593</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232734" comment="mutt-1.5.17-42.43 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814367" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14367</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-14367" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14367" source="CVE"/>
    <description>
    In Wireshark 2.6.0 to 2.6.1 and 2.4.0 to 2.4.7, the CoAP protocol dissector could crash. This was addressed in epan/dissectors/packet-coap.c by properly checking for a NULL condition.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-14367.html">CVE-2018-14367</cve>
<bugzilla href="https://bugzilla.suse.com/1101791">SUSE bug 1101791</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009232727" comment="libwireshark8-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232728" comment="libwiretap6-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232729" comment="libwscodecs1-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232730" comment="libwsutil7-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232731" comment="wireshark-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232733" comment="wireshark-gtk-2.2.16-40.28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14368</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-14368" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14368" source="CVE"/>
    <description>
    In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the Bazaar protocol dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-bzr.c by properly handling items that are too long.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-14368.html">CVE-2018-14368</cve>
<bugzilla href="https://bugzilla.suse.com/1101794">SUSE bug 1101794</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009232727" comment="libwireshark8-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232728" comment="libwiretap6-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232729" comment="libwscodecs1-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232730" comment="libwsutil7-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232731" comment="wireshark-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232733" comment="wireshark-gtk-2.2.16-40.28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14369</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-14369" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14369" source="CVE"/>
    <description>
    In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the HTTP2 dissector could crash. This was addressed in epan/dissectors/packet-http2.c by verifying that header data was found before proceeding to header decompression.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-14369.html">CVE-2018-14369</cve>
<bugzilla href="https://bugzilla.suse.com/1101800">SUSE bug 1101800</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009232727" comment="libwireshark8-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232728" comment="libwiretap6-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232729" comment="libwscodecs1-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232730" comment="libwsutil7-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232731" comment="wireshark-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232733" comment="wireshark-gtk-2.2.16-40.28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14370</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-14370" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14370" source="CVE"/>
    <description>
    In Wireshark 2.6.0 to 2.6.1 and 2.4.0 to 2.4.7, the IEEE 802.11 protocol dissector could crash. This was addressed in epan/crypt/airpdcap.c via bounds checking that prevents a buffer over-read.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-14370.html">CVE-2018-14370</cve>
<bugzilla href="https://bugzilla.suse.com/1101802">SUSE bug 1101802</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009232727" comment="libwireshark8-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232728" comment="libwiretap6-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232729" comment="libwscodecs1-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232730" comment="libwsutil7-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232731" comment="wireshark-2.2.16-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232733" comment="wireshark-gtk-2.2.16-40.28 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14404</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-14404" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14404" source="CVE"/>
    <description>
    A NULL pointer dereference vulnerability exists in the xpath.c:xmlXPathCompOpEval() function of libxml2 through 2.9.8 when parsing an invalid XPath expression in the XPATH_OP_AND or XPATH_OP_OR case. Applications processing untrusted XSL format inputs with the use of the libxml2 library may be vulnerable to a denial of service attack due to a crash of the application.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-14404.html">CVE-2018-14404</cve>
<bugzilla href="https://bugzilla.suse.com/1102046">SUSE bug 1102046</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1148896">SUSE bug 1148896</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009246169" comment="libxml2-2.7.6-0.77.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246174" comment="libxml2-32bit-2.7.6-0.77.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246172" comment="libxml2-doc-2.7.6-0.77.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246173" comment="libxml2-python-2.7.6-0.77.15 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14434</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-14434" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14434" source="CVE"/>
    <description>
    ImageMagick 7.0.8-4 has a memory leak for a colormap in WriteMPCImage in coders/mpc.c.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-14434.html">CVE-2018-14434</cve>
<bugzilla href="https://bugzilla.suse.com/1102003">SUSE bug 1102003</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009233150" comment="ImageMagick-6.4.3.6-78.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233160" comment="libMagickCore1-6.4.3.6-78.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233161" comment="libMagickCore1-32bit-6.4.3.6-78.56 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14435</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-14435" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14435" source="CVE"/>
    <description>
    ImageMagick 7.0.8-4 has a memory leak in DecodeImage in coders/pcd.c.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-14435.html">CVE-2018-14435</cve>
<bugzilla href="https://bugzilla.suse.com/1102007">SUSE bug 1102007</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009233150" comment="ImageMagick-6.4.3.6-78.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233160" comment="libMagickCore1-6.4.3.6-78.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233161" comment="libMagickCore1-32bit-6.4.3.6-78.56 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14436</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-14436" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14436" source="CVE"/>
    <description>
    ImageMagick 7.0.8-4 has a memory leak in ReadMIFFImage in coders/miff.c.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-14436.html">CVE-2018-14436</cve>
<bugzilla href="https://bugzilla.suse.com/1102005">SUSE bug 1102005</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009233150" comment="ImageMagick-6.4.3.6-78.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233160" comment="libMagickCore1-6.4.3.6-78.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233161" comment="libMagickCore1-32bit-6.4.3.6-78.56 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14437</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-14437" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14437" source="CVE"/>
    <description>
    ImageMagick 7.0.8-4 has a memory leak in parse8BIM in coders/meta.c.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-14437.html">CVE-2018-14437</cve>
<bugzilla href="https://bugzilla.suse.com/1102004">SUSE bug 1102004</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009233150" comment="ImageMagick-6.4.3.6-78.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233160" comment="libMagickCore1-6.4.3.6-78.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233161" comment="libMagickCore1-32bit-6.4.3.6-78.56 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14498</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-14498" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14498" source="CVE"/>
    <description>
    get_8bit_row in rdbmp.c in libjpeg-turbo through 1.5.90 and MozJPEG through 3.3.1 allows attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted 8-bit BMP in which one or more of the color indices is out of range for the number of palette entries.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-14498.html">CVE-2018-14498</cve>
<bugzilla href="https://bugzilla.suse.com/1128712">SUSE bug 1128712</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009255761" comment="jpeg-6b-879.12.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009255762" comment="libjpeg-6.2.0-879.12.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009255763" comment="libjpeg-32bit-6.2.0-879.12.12 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14598</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-14598" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14598" source="CVE"/>
    <description>
    An issue was discovered in XListExtensions in ListExt.c in libX11 through 1.6.5. A malicious server can send a reply in which the first string overflows, causing a variable to be set to NULL that will be freed later on, leading to DoS (segmentation fault).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-14598.html">CVE-2018-14598</cve>
<bugzilla href="https://bugzilla.suse.com/1102073">SUSE bug 1102073</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009235620" comment="xorg-x11-libX11-7.4-5.11.72.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235623" comment="xorg-x11-libX11-32bit-7.4-5.11.72.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14599</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-14599" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14599" source="CVE"/>
    <description>
    An issue was discovered in libX11 through 1.6.5. The function XListExtensions in ListExt.c is vulnerable to an off-by-one error caused by malicious server responses, leading to DoS or possibly unspecified other impact.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-14599.html">CVE-2018-14599</cve>
<bugzilla href="https://bugzilla.suse.com/1102062">SUSE bug 1102062</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009235620" comment="xorg-x11-libX11-7.4-5.11.72.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235623" comment="xorg-x11-libX11-32bit-7.4-5.11.72.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14600</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-14600" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14600" source="CVE"/>
    <description>
    An issue was discovered in libX11 through 1.6.5. The function XListExtensions in ListExt.c interprets a variable as signed instead of unsigned, resulting in an out-of-bounds write (of up to 128 bytes), leading to DoS or remote code execution.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-14600.html">CVE-2018-14600</cve>
<bugzilla href="https://bugzilla.suse.com/1102068">SUSE bug 1102068</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009235620" comment="xorg-x11-libX11-7.4-5.11.72.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235623" comment="xorg-x11-libX11-32bit-7.4-5.11.72.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14617</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-14617" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14617" source="CVE"/>
    <description>
    An issue was discovered in the Linux kernel through 4.17.10. There is a NULL pointer dereference and panic in hfsplus_lookup() in fs/hfsplus/dir.c when opening a file (that is purportedly a hard link) in an hfs+ filesystem that has malformed catalog data, and is mounted read-only without a metadata directory.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-14617.html">CVE-2018-14617</cve>
<bugzilla href="https://bugzilla.suse.com/1102870">SUSE bug 1102870</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009238589" comment="kernel-bigsmp-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238590" comment="kernel-bigsmp-base-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238591" comment="kernel-bigsmp-devel-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238572" comment="kernel-default-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238573" comment="kernel-default-base-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238574" comment="kernel-default-devel-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238592" comment="kernel-default-man-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238575" comment="kernel-ec2-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238576" comment="kernel-ec2-base-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238577" comment="kernel-ec2-devel-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238578" comment="kernel-pae-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238579" comment="kernel-pae-base-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238580" comment="kernel-pae-devel-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238581" comment="kernel-source-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238582" comment="kernel-syms-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238583" comment="kernel-trace-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238584" comment="kernel-trace-base-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238585" comment="kernel-trace-devel-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238586" comment="kernel-xen-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238587" comment="kernel-xen-base-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238588" comment="kernel-xen-devel-3.0.101-0.47.106.56 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14618</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-14618" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14618" source="CVE"/>
    <description>
    curl before version 7.61.1 is vulnerable to a buffer overrun in the NTLM authentication code. The internal function Curl_ntlm_core_mk_nt_hash multiplies the length of the password by two (SUM) to figure out how large temporary storage area to allocate from the heap. The length value is then subsequently used to iterate over the password and generate output into the allocated storage buffer. On systems with a 32 bit size_t, the math to calculate SUM triggers an integer overflow when the password length exceeds 2GB (2^31 bytes). This integer overflow usually causes a very small buffer to actually get allocated instead of the intended very huge one, making the use of that buffer end up in a heap buffer overflow. (This bug is almost identical to CVE-2017-8816.)
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-14618.html">CVE-2018-14618</cve>
<bugzilla href="https://bugzilla.suse.com/1106019">SUSE bug 1106019</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1112758">SUSE bug 1112758</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1122464">SUSE bug 1122464</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009234522" comment="curl-7.37.0-70.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234524" comment="curl-openssl1-7.37.0-70.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234530" comment="libcurl4-7.37.0-70.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234531" comment="libcurl4-32bit-7.37.0-70.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234525" comment="libcurl4-openssl1-7.37.0-70.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234526" comment="libcurl4-openssl1-32bit-7.37.0-70.33 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14621</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-14621" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14621" source="CVE"/>
    <description>
    An infinite loop vulnerability was found in libtirpc before version 1.0.2-rc2. With the port to using poll rather than select, exhaustion of file descriptors would cause the server to enter an infinite loop, consuming a large amount of CPU time and denying service to other clients until restarted.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-14621.html">CVE-2018-14621</cve>
<bugzilla href="https://bugzilla.suse.com/1106519">SUSE bug 1106519</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009237185" comment="libtirpc-0.2.1-1.13.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237187" comment="libtirpc1-0.2.1-1.13.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14622</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-14622" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14622" source="CVE"/>
    <description>
    A null-pointer dereference vulnerability was found in libtirpc before version 0.3.3-rc3. The return value of makefd_xprt() was not checked in all instances, which could lead to a crash when the server exhausted the maximum number of available file descriptors. A remote attacker could cause an rpc-based application to crash by flooding it with new connections.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-14622.html">CVE-2018-14622</cve>
<bugzilla href="https://bugzilla.suse.com/1106517">SUSE bug 1106517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/968175">SUSE bug 968175</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009237185" comment="libtirpc-0.2.1-1.13.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237187" comment="libtirpc1-0.2.1-1.13.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14633</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-14633" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14633" source="CVE"/>
    <description>
    A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-14633.html">CVE-2018-14633</cve>
<bugzilla href="https://bugzilla.suse.com/1107829">SUSE bug 1107829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1107832">SUSE bug 1107832</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009238589" comment="kernel-bigsmp-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238590" comment="kernel-bigsmp-base-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238591" comment="kernel-bigsmp-devel-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238572" comment="kernel-default-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238573" comment="kernel-default-base-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238574" comment="kernel-default-devel-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238592" comment="kernel-default-man-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238575" comment="kernel-ec2-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238576" comment="kernel-ec2-base-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238577" comment="kernel-ec2-devel-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238578" comment="kernel-pae-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238579" comment="kernel-pae-base-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238580" comment="kernel-pae-devel-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238581" comment="kernel-source-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238582" comment="kernel-syms-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238583" comment="kernel-trace-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238584" comment="kernel-trace-base-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238585" comment="kernel-trace-devel-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238586" comment="kernel-xen-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238587" comment="kernel-xen-base-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238588" comment="kernel-xen-devel-3.0.101-0.47.106.56 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14634</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-14634" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14634" source="CVE"/>
    <description>
    An integer overflow flaw was found in the Linux kernel's create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-14634.html">CVE-2018-14634</cve>
<bugzilla href="https://bugzilla.suse.com/1108912">SUSE bug 1108912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1108963">SUSE bug 1108963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1120323">SUSE bug 1120323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1122265">SUSE bug 1122265</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009235558" comment="kernel-bigsmp-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235559" comment="kernel-bigsmp-base-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235560" comment="kernel-bigsmp-devel-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235541" comment="kernel-default-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235542" comment="kernel-default-base-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235543" comment="kernel-default-devel-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235561" comment="kernel-default-man-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235544" comment="kernel-ec2-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235545" comment="kernel-ec2-base-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235546" comment="kernel-ec2-devel-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235547" comment="kernel-pae-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235548" comment="kernel-pae-base-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235549" comment="kernel-pae-devel-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235550" comment="kernel-source-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235551" comment="kernel-syms-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235552" comment="kernel-trace-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235553" comment="kernel-trace-base-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235554" comment="kernel-trace-devel-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235555" comment="kernel-xen-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235556" comment="kernel-xen-base-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235557" comment="kernel-xen-devel-3.0.101-0.47.106.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14647</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-14647" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14647" source="CVE"/>
    <description>
    Python's elementtree C accelerator failed to initialise Expat's hash salt during initialization. This could make it easy to conduct denial of service attacks against Expat by constructing an XML document that would cause pathological hash collisions in Expat's internal data structures, consuming large amounts CPU and RAM. Python 3.8, 3.7, 3.6, 3.5, 3.4, 2.7 are believed to be vulnerable.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-14647.html">CVE-2018-14647</cve>
<bugzilla href="https://bugzilla.suse.com/1109847">SUSE bug 1109847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009237359" comment="libpython2_6-1_0-2.6.9-40.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237360" comment="libpython2_6-1_0-32bit-2.6.9-40.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249573" comment="libpython2_7-1_0-2.7.9-6.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249574" comment="libpython2_7-1_0-32bit-2.7.9-6.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237349" comment="python-2.6.9-40.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237350" comment="python-32bit-2.6.9-40.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237351" comment="python-base-2.6.9-40.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237362" comment="python-base-32bit-2.6.9-40.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237364" comment="python-curses-2.6.9-40.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237352" comment="python-demo-2.6.9-40.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237354" comment="python-doc-2.6-8.40.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237355" comment="python-doc-pdf-2.6-8.40.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237356" comment="python-gdbm-2.6.9-40.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237357" comment="python-idle-2.6.9-40.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237358" comment="python-tk-2.6.9-40.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237366" comment="python-xml-2.6.9-40.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249575" comment="python27-2.7.9-6.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249576" comment="python27-32bit-2.7.9-6.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249577" comment="python27-base-2.7.9-6.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249578" comment="python27-base-32bit-2.7.9-6.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249579" comment="python27-curses-2.7.9-6.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249580" comment="python27-demo-2.7.9-6.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249581" comment="python27-devel-2.7.9-6.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249582" comment="python27-doc-2.7.9-6.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249583" comment="python27-doc-pdf-2.7.9-6.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249584" comment="python27-gdbm-2.7.9-6.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249585" comment="python27-idle-2.7.9-6.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249586" comment="python27-tk-2.7.9-6.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249587" comment="python27-xml-2.7.9-6.14 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14665</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-14665" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14665" source="CVE"/>
    <description>
    A flaw was found in xorg-x11-server before 1.20.3. An incorrect permission check for -modulepath and -logfile options when starting Xorg. X server allows unprivileged users with the ability to log in to the system via physical console to escalate their privileges and run arbitrary code under root privileges.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-14665.html">CVE-2018-14665</cve>
<bugzilla href="https://bugzilla.suse.com/1111697">SUSE bug 1111697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1112020">SUSE bug 1112020</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009238169" comment="xorg-x11-Xvnc-7.4-27.122.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238166" comment="xorg-x11-server-7.4-27.122.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238170" comment="xorg-x11-server-extra-7.4-27.122.21 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14680</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-14680" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14680" source="CVE"/>
    <description>
    An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. It does not reject blank CHM filenames.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-14680.html">CVE-2018-14680</cve>
<bugzilla href="https://bugzilla.suse.com/1102922">SUSE bug 1102922</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1103032">SUSE bug 1103032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1103040">SUSE bug 1103040</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238168" comment="clamav-0.100.2-0.20.18 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14681</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-14681" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14681" source="CVE"/>
    <description>
    An issue was discovered in kwajd_read_headers in mspack/kwajd.c in libmspack before 0.7alpha. Bad KWAJ file header extensions could cause a one or two byte overwrite.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-14681.html">CVE-2018-14681</cve>
<bugzilla href="https://bugzilla.suse.com/1102922">SUSE bug 1102922</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1103032">SUSE bug 1103032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1103040">SUSE bug 1103040</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238168" comment="clamav-0.100.2-0.20.18 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14682</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-14682" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14682" source="CVE"/>
    <description>
    An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. There is an off-by-one error in the TOLOWER() macro for CHM decompression.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-14682.html">CVE-2018-14682</cve>
<bugzilla href="https://bugzilla.suse.com/1102922">SUSE bug 1102922</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1103032">SUSE bug 1103032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1103040">SUSE bug 1103040</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238168" comment="clamav-0.100.2-0.20.18 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14734</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-14734" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14734" source="CVE"/>
    <description>
    drivers/infiniband/core/ucma.c in the Linux kernel through 4.17.11 allows ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allows attackers to cause a denial of service (use-after-free).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-14734.html">CVE-2018-14734</cve>
<bugzilla href="https://bugzilla.suse.com/1103119">SUSE bug 1103119</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1131390">SUSE bug 1131390</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009235558" comment="kernel-bigsmp-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235559" comment="kernel-bigsmp-base-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235560" comment="kernel-bigsmp-devel-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235541" comment="kernel-default-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235542" comment="kernel-default-base-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235543" comment="kernel-default-devel-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235561" comment="kernel-default-man-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235544" comment="kernel-ec2-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235545" comment="kernel-ec2-base-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235546" comment="kernel-ec2-devel-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235547" comment="kernel-pae-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235548" comment="kernel-pae-base-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235549" comment="kernel-pae-devel-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235550" comment="kernel-source-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235551" comment="kernel-syms-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235552" comment="kernel-trace-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235553" comment="kernel-trace-base-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235554" comment="kernel-trace-devel-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235555" comment="kernel-xen-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235556" comment="kernel-xen-base-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235557" comment="kernel-xen-devel-3.0.101-0.47.106.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14851</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-14851" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14851" source="CVE"/>
    <description>
    exif_process_IFD_in_MAKERNOTE in ext/exif/exif.c in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-14851.html">CVE-2018-14851</cve>
<bugzilla href="https://bugzilla.suse.com/1103659">SUSE bug 1103659</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009234339" comment="apache2-mod_php53-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234328" comment="php53-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234340" comment="php53-bcmath-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234341" comment="php53-bz2-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234342" comment="php53-calendar-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234343" comment="php53-ctype-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234344" comment="php53-curl-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234345" comment="php53-dba-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234346" comment="php53-dom-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234347" comment="php53-exif-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234348" comment="php53-fastcgi-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234349" comment="php53-fileinfo-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234350" comment="php53-ftp-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234351" comment="php53-gd-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234352" comment="php53-gettext-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234353" comment="php53-gmp-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234354" comment="php53-iconv-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234355" comment="php53-intl-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234356" comment="php53-json-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234357" comment="php53-ldap-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234358" comment="php53-mbstring-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234359" comment="php53-mcrypt-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234360" comment="php53-mysql-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234361" comment="php53-odbc-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234362" comment="php53-openssl-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234363" comment="php53-pcntl-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234364" comment="php53-pdo-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234365" comment="php53-pear-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234366" comment="php53-pgsql-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234367" comment="php53-pspell-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234368" comment="php53-shmop-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234369" comment="php53-snmp-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234370" comment="php53-soap-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234371" comment="php53-suhosin-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234372" comment="php53-sysvmsg-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234373" comment="php53-sysvsem-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234374" comment="php53-sysvshm-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234375" comment="php53-tokenizer-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234376" comment="php53-wddx-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234377" comment="php53-xmlreader-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234378" comment="php53-xmlrpc-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234379" comment="php53-xmlwriter-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234380" comment="php53-xsl-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234381" comment="php53-zip-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234382" comment="php53-zlib-5.3.17-112.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14883</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-14883" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14883" source="CVE"/>
    <description>
    An issue was discovered in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8. An Integer Overflow leads to a heap-based buffer over-read in exif_thumbnail_extract of exif.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-14883.html">CVE-2018-14883</cve>
<bugzilla href="https://bugzilla.suse.com/1103836">SUSE bug 1103836</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009234339" comment="apache2-mod_php53-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234328" comment="php53-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234340" comment="php53-bcmath-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234341" comment="php53-bz2-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234342" comment="php53-calendar-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234343" comment="php53-ctype-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234344" comment="php53-curl-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234345" comment="php53-dba-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234346" comment="php53-dom-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234347" comment="php53-exif-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234348" comment="php53-fastcgi-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234349" comment="php53-fileinfo-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234350" comment="php53-ftp-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234351" comment="php53-gd-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234352" comment="php53-gettext-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234353" comment="php53-gmp-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234354" comment="php53-iconv-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234355" comment="php53-intl-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234356" comment="php53-json-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234357" comment="php53-ldap-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234358" comment="php53-mbstring-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234359" comment="php53-mcrypt-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234360" comment="php53-mysql-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234361" comment="php53-odbc-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234362" comment="php53-openssl-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234363" comment="php53-pcntl-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234364" comment="php53-pdo-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234365" comment="php53-pear-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234366" comment="php53-pgsql-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234367" comment="php53-pspell-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234368" comment="php53-shmop-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234369" comment="php53-snmp-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234370" comment="php53-soap-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234371" comment="php53-suhosin-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234372" comment="php53-sysvmsg-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234373" comment="php53-sysvsem-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234374" comment="php53-sysvshm-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234375" comment="php53-tokenizer-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234376" comment="php53-wddx-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234377" comment="php53-xmlreader-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234378" comment="php53-xmlrpc-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234379" comment="php53-xmlwriter-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234380" comment="php53-xsl-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234381" comment="php53-zip-5.3.17-112.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009234382" comment="php53-zlib-5.3.17-112.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-15126" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15126" source="CVE"/>
    <description>
    LibVNC before commit 73cb96fec028a576a5a24417b57723b55854ad7b contains heap use-after-free vulnerability in server code of file transfer extension that can result remote code execution
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-15126.html">CVE-2018-15126</cve>
<bugzilla href="https://bugzilla.suse.com/1120114">SUSE bug 1120114</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009242916" comment="LibVNCServer-0.9.1-160.6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15127</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-15127" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15127" source="CVE"/>
    <description>
    LibVNC before commit 502821828ed00b4a2c4bef90683d0fd88ce495de contains heap out-of-bound write vulnerability in server code of file transfer extension that can result remote code execution
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-15127.html">CVE-2018-15127</cve>
<bugzilla href="https://bugzilla.suse.com/1120117">SUSE bug 1120117</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123828">SUSE bug 1123828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123832">SUSE bug 1123832</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009242916" comment="LibVNCServer-0.9.1-160.6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1517</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-1517" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1517" source="CVE"/>
    <description>
    A flaw in the java.math component in IBM SDK, Java Technology Edition 6.0, 7.0, and 8.0 may allow an attacker to inflict a denial-of-service attack with specially crafted String data. IBM X-Force ID: 141681.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-1517.html">CVE-2018-1517</cve>
<bugzilla href="https://bugzilla.suse.com/1101645">SUSE bug 1101645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1101656">SUSE bug 1101656</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009233814" comment="java-1_7_0-ibm-1.7.0_sr10.30-65.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233815" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.30-65.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233816" comment="java-1_7_0-ibm-devel-1.7.0_sr10.30-65.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233817" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.30-65.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233818" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.30-65.28 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009233814" comment="java-1_7_0-ibm-1.7.0_sr10.30-65.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233815" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.30-65.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233817" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.30-65.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233818" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.30-65.28 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15173</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-15173" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15173" source="CVE"/>
    <description>
    Nmap through 7.70, when the -sV option is used, allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted TCP-based service.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-15173.html">CVE-2018-15173</cve>
<bugzilla href="https://bugzilla.suse.com/1104139">SUSE bug 1104139</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009265063" comment="nmap-4.75-1.30.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15378</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-15378" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15378" source="CVE"/>
    <description>
    A vulnerability in ClamAV versions prior to 0.100.2 could allow an attacker to cause a denial of service (DoS) condition. The vulnerability is due to an error related to the MEW unpacker within the "unmew11()" function (libclamav/mew.c), which can be exploited to trigger an invalid read memory access via a specially crafted EXE file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-15378.html">CVE-2018-15378</cve>
<bugzilla href="https://bugzilla.suse.com/1110723">SUSE bug 1110723</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238168" comment="clamav-0.100.2-0.20.18 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15473</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-15473" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15473" source="CVE"/>
    <description>
    OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-15473.html">CVE-2018-15473</cve>
<bugzilla href="https://bugzilla.suse.com/1105010">SUSE bug 1105010</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1106163">SUSE bug 1106163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123133">SUSE bug 1123133</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009238396" comment="openssh-6.2p2-0.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238397" comment="openssh-askpass-6.2p2-0.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238398" comment="openssh-askpass-gnome-6.2p2-0.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009239198" comment="openssh-openssl1-6.6p1-19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009239199" comment="openssh-openssl1-helpers-6.6p1-19.6 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009238396" comment="openssh-6.2p2-0.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238397" comment="openssh-askpass-6.2p2-0.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238398" comment="openssh-askpass-gnome-6.2p2-0.41.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15572</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-15572" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15572" source="CVE"/>
    <description>
    The spectre_v2_select_mitigation function in arch/x86/kernel/cpu/bugs.c in the Linux kernel before 4.18.1 does not always fill RSB upon a context switch, which makes it easier for attackers to conduct userspace-userspace spectreRSB attacks.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-15572.html">CVE-2018-15572</cve>
<bugzilla href="https://bugzilla.suse.com/1102517">SUSE bug 1102517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1105296">SUSE bug 1105296</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009235558" comment="kernel-bigsmp-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235559" comment="kernel-bigsmp-base-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235560" comment="kernel-bigsmp-devel-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235541" comment="kernel-default-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235542" comment="kernel-default-base-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235543" comment="kernel-default-devel-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235561" comment="kernel-default-man-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235544" comment="kernel-ec2-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235545" comment="kernel-ec2-base-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235546" comment="kernel-ec2-devel-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235547" comment="kernel-pae-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235548" comment="kernel-pae-base-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235549" comment="kernel-pae-devel-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235550" comment="kernel-source-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235551" comment="kernel-syms-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235552" comment="kernel-trace-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235553" comment="kernel-trace-base-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235554" comment="kernel-trace-devel-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235555" comment="kernel-xen-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235556" comment="kernel-xen-base-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235557" comment="kernel-xen-devel-3.0.101-0.47.106.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15594</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-15594" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15594" source="CVE"/>
    <description>
    arch/x86/kernel/paravirt.c in the Linux kernel before 4.18.1 mishandles certain indirect calls, which makes it easier for attackers to conduct Spectre-v2 attacks against paravirtual guests.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-15594.html">CVE-2018-15594</cve>
<bugzilla href="https://bugzilla.suse.com/1105348">SUSE bug 1105348</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1119974">SUSE bug 1119974</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1133319">SUSE bug 1133319</bugzilla>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:201815746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15746</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-15746" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15746" source="CVE"/>
    <description>
    qemu-seccomp.c in QEMU might allow local OS guest users to cause a denial of service (guest crash) by leveraging mishandling of the seccomp policy for threads other than the main thread.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-15746.html">CVE-2018-15746</cve>
<bugzilla href="https://bugzilla.suse.com/1106222">SUSE bug 1106222</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241072" comment="kvm-1.4.2-53.26 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15750</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS</platform>
    </affected>
    <reference ref_id="CVE-2018-15750" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15750" source="CVE"/>
    <description>
    Directory Traversal vulnerability in salt-api in SaltStack Salt before 2017.7.8 and 2018.3.x before 2018.3.3 allows remote attackers to determine which files exist on the server.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-15750.html">CVE-2018-15750</cve>
<bugzilla href="https://bugzilla.suse.com/1113698">SUSE bug 1113698</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239800" comment="salt-2016.11.10-43.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009239801" comment="salt-doc-2016.11.10-43.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009239802" comment="salt-minion-2016.11.10-43.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15751</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS</platform>
    </affected>
    <reference ref_id="CVE-2018-15751" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15751" source="CVE"/>
    <description>
    SaltStack Salt before 2017.7.8 and 2018.3.x before 2018.3.3 allow remote attackers to bypass authentication and execute arbitrary commands via salt-api(netapi).
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-15751.html">CVE-2018-15751</cve>
<bugzilla href="https://bugzilla.suse.com/1113698">SUSE bug 1113698</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1113699">SUSE bug 1113699</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239800" comment="salt-2016.11.10-43.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009239801" comment="salt-doc-2016.11.10-43.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009239802" comment="salt-minion-2016.11.10-43.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15910</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-15910" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910" source="CVE"/>
    <description>
    In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the LockDistillerParams parameter to crash the interpreter or execute code.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-15910.html">CVE-2018-15910</cve>
<bugzilla href="https://bugzilla.suse.com/1106173">SUSE bug 1106173</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009237955" comment="ghostscript-fonts-other-8.62-32.47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237956" comment="ghostscript-fonts-rus-8.62-32.47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237957" comment="ghostscript-fonts-std-8.62-32.47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237953" comment="ghostscript-library-8.62-32.47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237958" comment="ghostscript-omni-8.62-32.47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237959" comment="ghostscript-x11-8.62-32.47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237960" comment="libgimpprint-4.2.7-32.47.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15919</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-15919" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15919" source="CVE"/>
    <description>
    Remotely observable behaviour in auth-gss2.c in OpenSSH through 7.8 could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. NOTE: the discoverer states 'We understand that the OpenSSH developers do not want to treat such a username enumeration (or "oracle") as a vulnerability.'
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-15919.html">CVE-2018-15919</cve>
<bugzilla href="https://bugzilla.suse.com/1105010">SUSE bug 1105010</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1106163">SUSE bug 1106163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1114890">SUSE bug 1114890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1115654">SUSE bug 1115654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123133">SUSE bug 1123133</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009238396" comment="openssh-6.2p2-0.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238397" comment="openssh-askpass-6.2p2-0.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238398" comment="openssh-askpass-gnome-6.2p2-0.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009239198" comment="openssh-openssl1-6.6p1-19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009239199" comment="openssh-openssl1-helpers-6.6p1-19.6 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009238396" comment="openssh-6.2p2-0.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238397" comment="openssh-askpass-6.2p2-0.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238398" comment="openssh-askpass-gnome-6.2p2-0.41.5 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16056</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-16056" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16056" source="CVE"/>
    <description>
    In Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8, and 2.2.0 to 2.2.16, the Bluetooth Attribute Protocol dissector could crash. This was addressed in epan/dissectors/packet-btatt.c by verifying that a dissector for a specific UUID exists.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-16056.html">CVE-2018-16056</cve>
<bugzilla href="https://bugzilla.suse.com/1106514">SUSE bug 1106514</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009235440" comment="libwireshark8-2.2.17-40.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235441" comment="libwiretap6-2.2.17-40.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235442" comment="libwscodecs1-2.2.17-40.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235443" comment="libwsutil7-2.2.17-40.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235444" comment="wireshark-2.2.17-40.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235446" comment="wireshark-gtk-2.2.17-40.31 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16057</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-16057" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16057" source="CVE"/>
    <description>
    In Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8, and 2.2.0 to 2.2.16, the Radiotap dissector could crash. This was addressed in epan/dissectors/packet-ieee80211-radiotap-iter.c by validating iterator operations.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-16057.html">CVE-2018-16057</cve>
<bugzilla href="https://bugzilla.suse.com/1106514">SUSE bug 1106514</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009235440" comment="libwireshark8-2.2.17-40.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235441" comment="libwiretap6-2.2.17-40.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235442" comment="libwscodecs1-2.2.17-40.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235443" comment="libwsutil7-2.2.17-40.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235444" comment="wireshark-2.2.17-40.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235446" comment="wireshark-gtk-2.2.17-40.31 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16058</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-16058" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16058" source="CVE"/>
    <description>
    In Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8, and 2.2.0 to 2.2.16, the Bluetooth AVDTP dissector could crash. This was addressed in epan/dissectors/packet-btavdtp.c by properly initializing a data structure.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-16058.html">CVE-2018-16058</cve>
<bugzilla href="https://bugzilla.suse.com/1106514">SUSE bug 1106514</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009235440" comment="libwireshark8-2.2.17-40.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235441" comment="libwiretap6-2.2.17-40.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235442" comment="libwscodecs1-2.2.17-40.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235443" comment="libwsutil7-2.2.17-40.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235444" comment="wireshark-2.2.17-40.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235446" comment="wireshark-gtk-2.2.17-40.31 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16062</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-16062" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16062" source="CVE"/>
    <description>
    dwarf_getaranges in dwarf_getaranges.c in libdw in elfutils before 2018-08-18 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-16062.html">CVE-2018-16062</cve>
<bugzilla href="https://bugzilla.suse.com/1106390">SUSE bug 1106390</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009256650" comment="elfutils-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256651" comment="libasm1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256652" comment="libasm1-32bit-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256653" comment="libdw1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256654" comment="libdw1-32bit-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256655" comment="libebl1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256656" comment="libebl1-32bit-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256657" comment="libelf1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256658" comment="libelf1-32bit-0.152-4.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816276" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16276</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-16276" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16276" source="CVE"/>
    <description>
    An issue was discovered in yurex_read in drivers/usb/misc/yurex.c in the Linux kernel before 4.17.7. Local attackers could use user access read/writes with incorrect bounds checking in the yurex USB driver to crash the kernel or potentially escalate privileges.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-16276.html">CVE-2018-16276</cve>
<bugzilla href="https://bugzilla.suse.com/1106095">SUSE bug 1106095</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1115593">SUSE bug 1115593</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009238589" comment="kernel-bigsmp-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238590" comment="kernel-bigsmp-base-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238591" comment="kernel-bigsmp-devel-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238572" comment="kernel-default-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238573" comment="kernel-default-base-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238574" comment="kernel-default-devel-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238592" comment="kernel-default-man-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238575" comment="kernel-ec2-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238576" comment="kernel-ec2-base-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238577" comment="kernel-ec2-devel-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238578" comment="kernel-pae-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238579" comment="kernel-pae-base-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238580" comment="kernel-pae-devel-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238581" comment="kernel-source-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238582" comment="kernel-syms-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238583" comment="kernel-trace-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238584" comment="kernel-trace-base-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238585" comment="kernel-trace-devel-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238586" comment="kernel-xen-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238587" comment="kernel-xen-base-3.0.101-0.47.106.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238588" comment="kernel-xen-devel-3.0.101-0.47.106.56 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16323</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-16323" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16323" source="CVE"/>
    <description>
    ReadXBMImage in coders/xbm.c in ImageMagick before 7.0.8-9 leaves data uninitialized when processing an XBM file that has a negative pixel value. If the affected code is used as a library loaded into a process that includes sensitive information, that information sometimes can be leaked via the image data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-16323.html">CVE-2018-16323</cve>
<bugzilla href="https://bugzilla.suse.com/1106855">SUSE bug 1106855</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009237944" comment="ImageMagick-6.4.3.6-78.74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237963" comment="libMagickCore1-6.4.3.6-78.74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237964" comment="libMagickCore1-32bit-6.4.3.6-78.74 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16335</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-16335" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16335" source="CVE"/>
    <description>
    newoffsets handling in ChopUpSingleUncompressedStrip in tif_dirread.c in LibTIFF 4.0.9 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file, as demonstrated by tiff2pdf. This is a different vulnerability than CVE-2018-15209.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-16335.html">CVE-2018-16335</cve>
<bugzilla href="https://bugzilla.suse.com/1106853">SUSE bug 1106853</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009238088" comment="libtiff3-3.8.2-141.169.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238089" comment="libtiff3-32bit-3.8.2-141.169.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238087" comment="tiff-3.8.2-141.169.19 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16391</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-16391" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16391" source="CVE"/>
    <description>
    Several buffer overflows when handling responses from a Muscle Card in muscle_list_files in libopensc/card-muscle.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-16391.html">CVE-2018-16391</cve>
<bugzilla href="https://bugzilla.suse.com/1106998">SUSE bug 1106998</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009238593" comment="libopensc2-0.11.6-5.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238594" comment="libopensc2-32bit-0.11.6-5.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238570" comment="opensc-0.11.6-5.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238596" comment="opensc-32bit-0.11.6-5.27.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16392</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-16392" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16392" source="CVE"/>
    <description>
    Several buffer overflows when handling responses from a TCOS Card in tcos_select_file in libopensc/card-tcos.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-16392.html">CVE-2018-16392</cve>
<bugzilla href="https://bugzilla.suse.com/1106999">SUSE bug 1106999</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009238593" comment="libopensc2-0.11.6-5.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238594" comment="libopensc2-32bit-0.11.6-5.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238570" comment="opensc-0.11.6-5.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238596" comment="opensc-32bit-0.11.6-5.27.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16393</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-16393" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16393" source="CVE"/>
    <description>
    Several buffer overflows when handling responses from a Gemsafe V1 Smartcard in gemsafe_get_cert_len in libopensc/pkcs15-gemsafeV1.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-16393.html">CVE-2018-16393</cve>
<bugzilla href="https://bugzilla.suse.com/1108318">SUSE bug 1108318</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009238593" comment="libopensc2-0.11.6-5.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238594" comment="libopensc2-32bit-0.11.6-5.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238570" comment="opensc-0.11.6-5.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238596" comment="opensc-32bit-0.11.6-5.27.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16403</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-16403" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16403" source="CVE"/>
    <description>
    libdw in elfutils 0.173 checks the end of the attributes list incorrectly in dwarf_getabbrev in dwarf_getabbrev.c and dwarf_hasattr in dwarf_hasattr.c, leading to a heap-based buffer over-read and an application crash.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-16403.html">CVE-2018-16403</cve>
<bugzilla href="https://bugzilla.suse.com/1107067">SUSE bug 1107067</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009256650" comment="elfutils-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256651" comment="libasm1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256652" comment="libasm1-32bit-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256653" comment="libdw1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256654" comment="libdw1-32bit-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256655" comment="libebl1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256656" comment="libebl1-32bit-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256657" comment="libelf1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256658" comment="libelf1-32bit-0.152-4.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16412</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-16412" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16412" source="CVE"/>
    <description>
    ImageMagick 7.0.8-11 Q16 has a heap-based buffer over-read in the coders/psd.c ParseImageResourceBlocks function.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-16412.html">CVE-2018-16412</cve>
<bugzilla href="https://bugzilla.suse.com/1106989">SUSE bug 1106989</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1106996">SUSE bug 1106996</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009246344" comment="ImageMagick-6.4.3.6-78.92 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246355" comment="libMagickCore1-6.4.3.6-78.92 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246356" comment="libMagickCore1-32bit-6.4.3.6-78.92 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816413" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16413</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-16413" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16413" source="CVE"/>
    <description>
    ImageMagick 7.0.8-11 Q16 has a heap-based buffer over-read in the MagickCore/quantum-private.h PushShortPixel function when called from the coders/psd.c ParseImageResourceBlocks function.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-16413.html">CVE-2018-16413</cve>
<bugzilla href="https://bugzilla.suse.com/1106989">SUSE bug 1106989</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1106996">SUSE bug 1106996</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009246344" comment="ImageMagick-6.4.3.6-78.92 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246355" comment="libMagickCore1-6.4.3.6-78.92 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246356" comment="libMagickCore1-32bit-6.4.3.6-78.92 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16418</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-16418" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16418" source="CVE"/>
    <description>
    A buffer overflow when handling string concatenation in util_acl_to_str in tools/util.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-16418.html">CVE-2018-16418</cve>
<bugzilla href="https://bugzilla.suse.com/1107039">SUSE bug 1107039</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009238593" comment="libopensc2-0.11.6-5.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238594" comment="libopensc2-32bit-0.11.6-5.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238570" comment="opensc-0.11.6-5.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238596" comment="opensc-32bit-0.11.6-5.27.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16419</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-16419" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16419" source="CVE"/>
    <description>
    Several buffer overflows when handling responses from a Cryptoflex card in read_public_key in tools/cryptoflex-tool.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-16419.html">CVE-2018-16419</cve>
<bugzilla href="https://bugzilla.suse.com/1107107">SUSE bug 1107107</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009238593" comment="libopensc2-0.11.6-5.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238594" comment="libopensc2-32bit-0.11.6-5.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238570" comment="opensc-0.11.6-5.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238596" comment="opensc-32bit-0.11.6-5.27.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-16422" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16422" source="CVE"/>
    <description>
    A single byte buffer overflow when handling responses from an esteid Card in sc_pkcs15emu_esteid_init in libopensc/pkcs15-esteid.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-16422.html">CVE-2018-16422</cve>
<bugzilla href="https://bugzilla.suse.com/1107038">SUSE bug 1107038</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009238593" comment="libopensc2-0.11.6-5.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238594" comment="libopensc2-32bit-0.11.6-5.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238570" comment="opensc-0.11.6-5.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238596" comment="opensc-32bit-0.11.6-5.27.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-16423" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16423" source="CVE"/>
    <description>
    A double free when handling responses from a smartcard in sc_file_set_sec_attr in libopensc/sc.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-16423.html">CVE-2018-16423</cve>
<bugzilla href="https://bugzilla.suse.com/1107037">SUSE bug 1107037</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009238593" comment="libopensc2-0.11.6-5.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238594" comment="libopensc2-32bit-0.11.6-5.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238570" comment="opensc-0.11.6-5.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238596" comment="opensc-32bit-0.11.6-5.27.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16427</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-16427" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16427" source="CVE"/>
    <description>
    Various out of bounds reads when handling responses in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to potentially crash the opensc library using programs.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-16427.html">CVE-2018-16427</cve>
<bugzilla href="https://bugzilla.suse.com/1107033">SUSE bug 1107033</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009238593" comment="libopensc2-0.11.6-5.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238594" comment="libopensc2-32bit-0.11.6-5.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238570" comment="opensc-0.11.6-5.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238596" comment="opensc-32bit-0.11.6-5.27.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16429</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-16429" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16429" source="CVE"/>
    <description>
    GNOME GLib 2.56.1 has an out-of-bounds read vulnerability in g_markup_parse_context_parse() in gmarkup.c, related to utf8_str().
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-16429.html">CVE-2018-16429</cve>
<bugzilla href="https://bugzilla.suse.com/1107116">SUSE bug 1107116</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1148890">SUSE bug 1148890</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009240950" comment="glib2-2.22.5-0.8.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240953" comment="glib2-doc-2.22.5-0.8.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240962" comment="glib2-lang-2.22.5-0.8.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240963" comment="libgio-2_0-0-2.22.5-0.8.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240964" comment="libgio-2_0-0-32bit-2.22.5-0.8.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240966" comment="libglib-2_0-0-2.22.5-0.8.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240967" comment="libglib-2_0-0-32bit-2.22.5-0.8.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240969" comment="libgmodule-2_0-0-2.22.5-0.8.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240970" comment="libgmodule-2_0-0-32bit-2.22.5-0.8.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240972" comment="libgobject-2_0-0-2.22.5-0.8.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240973" comment="libgobject-2_0-0-32bit-2.22.5-0.8.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240975" comment="libgthread-2_0-0-2.22.5-0.8.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240976" comment="libgthread-2_0-0-32bit-2.22.5-0.8.36 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16509</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-16509" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16509" source="CVE"/>
    <description>
    An issue was discovered in Artifex Ghostscript before 9.24. Incorrect "restoration of privilege" checking during handling of /invalidaccess exceptions could be used by attackers able to supply crafted PostScript to execute code using the "pipe" instruction.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-16509.html">CVE-2018-16509</cve>
<bugzilla href="https://bugzilla.suse.com/1107410">SUSE bug 1107410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1108027">SUSE bug 1108027</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1118318">SUSE bug 1118318</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009237955" comment="ghostscript-fonts-other-8.62-32.47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237956" comment="ghostscript-fonts-rus-8.62-32.47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237957" comment="ghostscript-fonts-std-8.62-32.47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237953" comment="ghostscript-library-8.62-32.47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237958" comment="ghostscript-omni-8.62-32.47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237959" comment="ghostscript-x11-8.62-32.47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237960" comment="libgimpprint-4.2.7-32.47.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-16511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511" source="CVE"/>
    <description>
    An issue was discovered in Artifex Ghostscript before 9.24. A type confusion in "ztype" could be used by remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-16511.html">CVE-2018-16511</cve>
<bugzilla href="https://bugzilla.suse.com/1107426">SUSE bug 1107426</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1111479">SUSE bug 1111479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1112229">SUSE bug 1112229</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009237955" comment="ghostscript-fonts-other-8.62-32.47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237956" comment="ghostscript-fonts-rus-8.62-32.47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237957" comment="ghostscript-fonts-std-8.62-32.47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237953" comment="ghostscript-library-8.62-32.47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237958" comment="ghostscript-omni-8.62-32.47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237959" comment="ghostscript-x11-8.62-32.47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237960" comment="libgimpprint-4.2.7-32.47.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16513</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-16513" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513" source="CVE"/>
    <description>
    In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-16513.html">CVE-2018-16513</cve>
<bugzilla href="https://bugzilla.suse.com/1107412">SUSE bug 1107412</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009237955" comment="ghostscript-fonts-other-8.62-32.47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237956" comment="ghostscript-fonts-rus-8.62-32.47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237957" comment="ghostscript-fonts-std-8.62-32.47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237953" comment="ghostscript-library-8.62-32.47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237958" comment="ghostscript-omni-8.62-32.47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237959" comment="ghostscript-x11-8.62-32.47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237960" comment="libgimpprint-4.2.7-32.47.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16540</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-16540" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540" source="CVE"/>
    <description>
    In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files to the builtin PDF14 converter could use a use-after-free in copydevice handling to crash the interpreter or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-16540.html">CVE-2018-16540</cve>
<bugzilla href="https://bugzilla.suse.com/1107420">SUSE bug 1107420</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009237955" comment="ghostscript-fonts-other-8.62-32.47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237956" comment="ghostscript-fonts-rus-8.62-32.47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237957" comment="ghostscript-fonts-std-8.62-32.47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237953" comment="ghostscript-library-8.62-32.47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237958" comment="ghostscript-omni-8.62-32.47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237959" comment="ghostscript-x11-8.62-32.47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237960" comment="libgimpprint-4.2.7-32.47.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16541</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-16541" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541" source="CVE"/>
    <description>
    In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-16541.html">CVE-2018-16541</cve>
<bugzilla href="https://bugzilla.suse.com/1107421">SUSE bug 1107421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1108027">SUSE bug 1108027</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1109105">SUSE bug 1109105</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1111479">SUSE bug 1111479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1111480">SUSE bug 1111480</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1112229">SUSE bug 1112229</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1117022">SUSE bug 1117022</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1118455">SUSE bug 1118455</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009237955" comment="ghostscript-fonts-other-8.62-32.47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237956" comment="ghostscript-fonts-rus-8.62-32.47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237957" comment="ghostscript-fonts-std-8.62-32.47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237953" comment="ghostscript-library-8.62-32.47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237958" comment="ghostscript-omni-8.62-32.47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237959" comment="ghostscript-x11-8.62-32.47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237960" comment="libgimpprint-4.2.7-32.47.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16542</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-16542" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542" source="CVE"/>
    <description>
    In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use insufficient interpreter stack-size checking during error handling to crash the interpreter.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-16542.html">CVE-2018-16542</cve>
<bugzilla href="https://bugzilla.suse.com/1107413">SUSE bug 1107413</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009237955" comment="ghostscript-fonts-other-8.62-32.47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237956" comment="ghostscript-fonts-rus-8.62-32.47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237957" comment="ghostscript-fonts-std-8.62-32.47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237953" comment="ghostscript-library-8.62-32.47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237958" comment="ghostscript-omni-8.62-32.47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237959" comment="ghostscript-x11-8.62-32.47.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237960" comment="libgimpprint-4.2.7-32.47.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1656</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-1656" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1656" source="CVE"/>
    <description>
    The IBM Java Runtime Environment's Diagnostic Tooling Framework for Java (DTFJ) (IBM SDK, Java Technology Edition 6.0 , 7.0, and 8.0) does not protect against path traversal attacks when extracting compressed dump files. IBM X-Force ID: 144882.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-1656.html">CVE-2018-1656</cve>
<bugzilla href="https://bugzilla.suse.com/1101645">SUSE bug 1101645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1101656">SUSE bug 1101656</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009233814" comment="java-1_7_0-ibm-1.7.0_sr10.30-65.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233815" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.30-65.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233816" comment="java-1_7_0-ibm-devel-1.7.0_sr10.30-65.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233817" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.30-65.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233818" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.30-65.28 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009233814" comment="java-1_7_0-ibm-1.7.0_sr10.30-65.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233815" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.30-65.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233817" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.30-65.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233818" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.30-65.28 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16642</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-16642" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16642" source="CVE"/>
    <description>
    The function InsertRow in coders/cut.c in ImageMagick 7.0.7-37 allows remote attackers to cause a denial of service via a crafted image file due to an out-of-bounds write.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-16642.html">CVE-2018-16642</cve>
<bugzilla href="https://bugzilla.suse.com/1107616">SUSE bug 1107616</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009237944" comment="ImageMagick-6.4.3.6-78.74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237963" comment="libMagickCore1-6.4.3.6-78.74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237964" comment="libMagickCore1-32bit-6.4.3.6-78.74 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16643</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-16643" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16643" source="CVE"/>
    <description>
    The functions ReadDCMImage in coders/dcm.c, ReadPWPImage in coders/pwp.c, ReadCALSImage in coders/cals.c, and ReadPICTImage in coders/pict.c in ImageMagick 7.0.8-4 do not check the return value of the fputc function, which allows remote attackers to cause a denial of service via a crafted image file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-16643.html">CVE-2018-16643</cve>
<bugzilla href="https://bugzilla.suse.com/1107612">SUSE bug 1107612</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009237944" comment="ImageMagick-6.4.3.6-78.74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237963" comment="libMagickCore1-6.4.3.6-78.74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237964" comment="libMagickCore1-32bit-6.4.3.6-78.74 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16644</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-16644" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16644" source="CVE"/>
    <description>
    There is a missing check for length in the functions ReadDCMImage of coders/dcm.c and ReadPICTImage of coders/pict.c in ImageMagick 7.0.8-11, which allows remote attackers to cause a denial of service via a crafted image.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-16644.html">CVE-2018-16644</cve>
<bugzilla href="https://bugzilla.suse.com/1107609">SUSE bug 1107609</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1107612">SUSE bug 1107612</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1117463">SUSE bug 1117463</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009239793" comment="ImageMagick-6.4.3.6-78.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009239803" comment="libMagickCore1-6.4.3.6-78.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009239804" comment="libMagickCore1-32bit-6.4.3.6-78.79 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16645</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-16645" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16645" source="CVE"/>
    <description>
    There is an excessive memory allocation issue in the functions ReadBMPImage of coders/bmp.c and ReadDIBImage of coders/dib.c in ImageMagick 7.0.8-11, which allows remote attackers to cause a denial of service via a crafted image file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-16645.html">CVE-2018-16645</cve>
<bugzilla href="https://bugzilla.suse.com/1107604">SUSE bug 1107604</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009237944" comment="ImageMagick-6.4.3.6-78.74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237963" comment="libMagickCore1-6.4.3.6-78.74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237964" comment="libMagickCore1-32bit-6.4.3.6-78.74 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16658</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-16658" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16658" source="CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 4.18.6. An information leak in cdrom_ioctl_drive_status in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-16658.html">CVE-2018-16658</cve>
<bugzilla href="https://bugzilla.suse.com/1092903">SUSE bug 1092903</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1107689">SUSE bug 1107689</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1113751">SUSE bug 1113751</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009235558" comment="kernel-bigsmp-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235559" comment="kernel-bigsmp-base-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235560" comment="kernel-bigsmp-devel-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235541" comment="kernel-default-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235542" comment="kernel-default-base-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235543" comment="kernel-default-devel-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235561" comment="kernel-default-man-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235544" comment="kernel-ec2-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235545" comment="kernel-ec2-base-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235546" comment="kernel-ec2-devel-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235547" comment="kernel-pae-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235548" comment="kernel-pae-base-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235549" comment="kernel-pae-devel-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235550" comment="kernel-source-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235551" comment="kernel-syms-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235552" comment="kernel-trace-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235553" comment="kernel-trace-base-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235554" comment="kernel-trace-devel-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235555" comment="kernel-xen-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235556" comment="kernel-xen-base-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235557" comment="kernel-xen-devel-3.0.101-0.47.106.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16741</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-16741" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16741" source="CVE"/>
    <description>
    An issue was discovered in mgetty before 1.2.1. In fax/faxq-helper.c, the function do_activate() does not properly sanitize shell metacharacters to prevent command injection. It is possible to use the ||, &amp;&amp;, or &gt; characters within a file created by the "faxq-helper activate &lt;jobid&gt;" command.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-16741.html">CVE-2018-16741</cve>
<bugzilla href="https://bugzilla.suse.com/1108752">SUSE bug 1108752</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1112042">SUSE bug 1112042</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1149970">SUSE bug 1149970</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009235286" comment="g3utils-1.1.36-28.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235287" comment="mgetty-1.1.36-28.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16742</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-16742" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16742" source="CVE"/>
    <description>
    An issue was discovered in mgetty before 1.2.1. In contrib/scrts.c, a stack-based buffer overflow can be triggered via a command-line parameter.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-16742.html">CVE-2018-16742</cve>
<bugzilla href="https://bugzilla.suse.com/1108762">SUSE bug 1108762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1112042">SUSE bug 1112042</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1149970">SUSE bug 1149970</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009235286" comment="g3utils-1.1.36-28.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235287" comment="mgetty-1.1.36-28.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16743</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-16743" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16743" source="CVE"/>
    <description>
    An issue was discovered in mgetty before 1.2.1. In contrib/next-login/login.c, the command-line parameter username is passed unsanitized to strcpy(), which can cause a stack-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-16743.html">CVE-2018-16743</cve>
<bugzilla href="https://bugzilla.suse.com/1108761">SUSE bug 1108761</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1112042">SUSE bug 1112042</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1149970">SUSE bug 1149970</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009235286" comment="g3utils-1.1.36-28.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235287" comment="mgetty-1.1.36-28.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16744</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-16744" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16744" source="CVE"/>
    <description>
    An issue was discovered in mgetty before 1.2.1. In fax_notify_mail() in faxrec.c, the mail_to parameter is not sanitized. It could allow for command injection if untrusted input can reach it, because popen is used.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-16744.html">CVE-2018-16744</cve>
<bugzilla href="https://bugzilla.suse.com/1108757">SUSE bug 1108757</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1112042">SUSE bug 1112042</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1149970">SUSE bug 1149970</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009235286" comment="g3utils-1.1.36-28.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235287" comment="mgetty-1.1.36-28.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-16745" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16745" source="CVE"/>
    <description>
    An issue was discovered in mgetty before 1.2.1. In fax_notify_mail() in faxrec.c, the mail_to parameter is not sanitized. It could allow a buffer overflow if long untrusted input can reach it.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-16745.html">CVE-2018-16745</cve>
<bugzilla href="https://bugzilla.suse.com/1108756">SUSE bug 1108756</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1112042">SUSE bug 1112042</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1149970">SUSE bug 1149970</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009235286" comment="g3utils-1.1.36-28.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235287" comment="mgetty-1.1.36-28.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16749</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-16749" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16749" source="CVE"/>
    <description>
    In ImageMagick 7.0.7-29 and earlier, a missing NULL check in ReadOneJNGImage in coders/png.c allows an attacker to cause a denial of service (WriteBlob assertion failure and application exit) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-16749.html">CVE-2018-16749</cve>
<bugzilla href="https://bugzilla.suse.com/1108282">SUSE bug 1108282</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009237944" comment="ImageMagick-6.4.3.6-78.74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237963" comment="libMagickCore1-6.4.3.6-78.74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237964" comment="libMagickCore1-32bit-6.4.3.6-78.74 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16750</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-16750" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16750" source="CVE"/>
    <description>
    In ImageMagick 7.0.7-29 and earlier, a memory leak in the formatIPTCfromBuffer function in coders/meta.c was found.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-16750.html">CVE-2018-16750</cve>
<bugzilla href="https://bugzilla.suse.com/1108283">SUSE bug 1108283</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009237944" comment="ImageMagick-6.4.3.6-78.74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237963" comment="libMagickCore1-6.4.3.6-78.74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237964" comment="libMagickCore1-32bit-6.4.3.6-78.74 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-16840" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16840" source="CVE"/>
    <description>
    A heap use-after-free flaw was found in curl versions from 7.59.0 through 7.61.1 in the code related to closing an easy handle. When closing and cleaning up an 'easy' handle in the `Curl_close()` function, the library code first frees a struct (without nulling the pointer) and might then subsequently erroneously write to a struct field within that already freed struct.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-16840.html">CVE-2018-16840</cve>
<bugzilla href="https://bugzilla.suse.com/1112758">SUSE bug 1112758</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1113029">SUSE bug 1113029</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1122464">SUSE bug 1122464</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009238964" comment="curl-7.37.0-70.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238966" comment="curl-openssl1-7.37.0-70.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238965" comment="libcurl-devel-7.37.0-70.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238970" comment="libcurl4-7.37.0-70.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238971" comment="libcurl4-32bit-7.37.0-70.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238967" comment="libcurl4-openssl1-7.37.0-70.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238968" comment="libcurl4-openssl1-32bit-7.37.0-70.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16842</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-16842" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16842" source="CVE"/>
    <description>
    Curl versions 7.14.1 through 7.61.1 are vulnerable to a heap-based buffer over-read in the tool_msgs.c:voutf() function that may result in information exposure and denial of service.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-16842.html">CVE-2018-16842</cve>
<bugzilla href="https://bugzilla.suse.com/1113660">SUSE bug 1113660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1122464">SUSE bug 1122464</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009238964" comment="curl-7.37.0-70.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238966" comment="curl-openssl1-7.37.0-70.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238965" comment="libcurl-devel-7.37.0-70.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238970" comment="libcurl4-7.37.0-70.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238971" comment="libcurl4-32bit-7.37.0-70.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238967" comment="libcurl4-openssl1-7.37.0-70.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238968" comment="libcurl4-openssl1-32bit-7.37.0-70.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17082</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-17082" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17082" source="CVE"/>
    <description>
    The Apache2 component in PHP before 5.6.38, 7.0.x before 7.0.32, 7.1.x before 7.1.22, and 7.2.x before 7.2.10 allows XSS via the body of a "Transfer-Encoding: chunked" request, because the bucket brigade is mishandled in the php_handler function in sapi/apache2handler/sapi_apache2.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-17082.html">CVE-2018-17082</cve>
<bugzilla href="https://bugzilla.suse.com/1108753">SUSE bug 1108753</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009236429" comment="apache2-mod_php53-5.3.17-112.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009236421" comment="php53-5.3.17-112.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009236430" comment="php53-bcmath-5.3.17-112.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009236431" comment="php53-bz2-5.3.17-112.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009236432" comment="php53-calendar-5.3.17-112.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009236433" comment="php53-ctype-5.3.17-112.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009236434" comment="php53-curl-5.3.17-112.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009236435" comment="php53-dba-5.3.17-112.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009236436" comment="php53-dom-5.3.17-112.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009236437" comment="php53-exif-5.3.17-112.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009236438" comment="php53-fastcgi-5.3.17-112.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009236439" comment="php53-fileinfo-5.3.17-112.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009236440" comment="php53-ftp-5.3.17-112.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009236441" comment="php53-gd-5.3.17-112.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009236442" comment="php53-gettext-5.3.17-112.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009236443" comment="php53-gmp-5.3.17-112.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009236444" comment="php53-iconv-5.3.17-112.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009236445" comment="php53-intl-5.3.17-112.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009236446" comment="php53-json-5.3.17-112.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009236447" comment="php53-ldap-5.3.17-112.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009236448" comment="php53-mbstring-5.3.17-112.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009236449" comment="php53-mcrypt-5.3.17-112.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009236450" comment="php53-mysql-5.3.17-112.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009236451" comment="php53-odbc-5.3.17-112.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009236452" comment="php53-openssl-5.3.17-112.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009236453" comment="php53-pcntl-5.3.17-112.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009236454" comment="php53-pdo-5.3.17-112.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009236455" comment="php53-pear-5.3.17-112.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009236456" comment="php53-pgsql-5.3.17-112.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009236457" comment="php53-pspell-5.3.17-112.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009236458" comment="php53-shmop-5.3.17-112.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009236459" comment="php53-snmp-5.3.17-112.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009236460" comment="php53-soap-5.3.17-112.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009236461" comment="php53-suhosin-5.3.17-112.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009236462" comment="php53-sysvmsg-5.3.17-112.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009236463" comment="php53-sysvsem-5.3.17-112.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009236464" comment="php53-sysvshm-5.3.17-112.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009236465" comment="php53-tokenizer-5.3.17-112.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009236466" comment="php53-wddx-5.3.17-112.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009236467" comment="php53-xmlreader-5.3.17-112.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009236468" comment="php53-xmlrpc-5.3.17-112.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009236469" comment="php53-xmlwriter-5.3.17-112.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009236470" comment="php53-xsl-5.3.17-112.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009236471" comment="php53-zip-5.3.17-112.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009236472" comment="php53-zlib-5.3.17-112.41 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17100</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-17100" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17100" source="CVE"/>
    <description>
    An issue was discovered in LibTIFF 4.0.9. There is a int32 overflow in multiply_ms in tools/ppm2tiff.c, which can cause a denial of service (crash) or possibly have unspecified other impact via a crafted image file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-17100.html">CVE-2018-17100</cve>
<bugzilla href="https://bugzilla.suse.com/1108637">SUSE bug 1108637</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009238088" comment="libtiff3-3.8.2-141.169.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238089" comment="libtiff3-32bit-3.8.2-141.169.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238087" comment="tiff-3.8.2-141.169.19 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17101</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-17101" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17101" source="CVE"/>
    <description>
    An issue was discovered in LibTIFF 4.0.9. There are two out-of-bounds writes in cpTags in tools/tiff2bw.c and tools/pal2rgb.c, which can cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-17101.html">CVE-2018-17101</cve>
<bugzilla href="https://bugzilla.suse.com/1108627">SUSE bug 1108627</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009238088" comment="libtiff3-3.8.2-141.169.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238089" comment="libtiff3-32bit-3.8.2-141.169.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238087" comment="tiff-3.8.2-141.169.19 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17294</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-17294" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17294" source="CVE"/>
    <description>
    The matchCurrentInput function inside lou_translateString.c of Liblouis prior to 3.7 does not check the input string's length, allowing attackers to cause a denial of service (application crash via out-of-bounds read) by crafting an input file with certain translation dictionaries.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-17294.html">CVE-2018-17294</cve>
<bugzilla href="https://bugzilla.suse.com/1109319">SUSE bug 1109319</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009246647" comment="liblouis-1.7.0-1.3.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246648" comment="liblouis0-1.7.0-1.3.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246649" comment="python-louis-1.7.0-1.3.16 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17795</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-17795" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17795" source="CVE"/>
    <description>
    The function t2p_write_pdf in tiff2pdf.c in LibTIFF 4.0.9 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file, a similar issue to CVE-2017-9935.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-17795.html">CVE-2018-17795</cve>
<bugzilla href="https://bugzilla.suse.com/1046077">SUSE bug 1046077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1110358">SUSE bug 1110358</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009238088" comment="libtiff3-3.8.2-141.169.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238089" comment="libtiff3-32bit-3.8.2-141.169.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238087" comment="tiff-3.8.2-141.169.19 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17958</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-17958" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17958" source="CVE"/>
    <description>
    Qemu has a Buffer Overflow in rtl8139_do_receive in hw/net/rtl8139.c because an incorrect integer data type is used.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-17958.html">CVE-2018-17958</cve>
<bugzilla href="https://bugzilla.suse.com/1111006">SUSE bug 1111006</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1111007">SUSE bug 1111007</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241072" comment="kvm-1.4.2-53.26 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009241072" comment="kvm-1.4.2-53.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250489" comment="xen-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250490" comment="xen-doc-html-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250491" comment="xen-doc-pdf-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250492" comment="xen-kmp-default-4.2.5_21_3.0.101_0.190.TDC-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250493" comment="xen-libs-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250494" comment="xen-tools-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250495" comment="xen-tools-domU-4.2.5_21-47.32 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17962</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-17962" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17962" source="CVE"/>
    <description>
    Qemu has a Buffer Overflow in pcnet_receive in hw/net/pcnet.c because an incorrect integer data type is used.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-17962.html">CVE-2018-17962</cve>
<bugzilla href="https://bugzilla.suse.com/1111010">SUSE bug 1111010</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1111011">SUSE bug 1111011</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241072" comment="kvm-1.4.2-53.26 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009241072" comment="kvm-1.4.2-53.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250489" comment="xen-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250490" comment="xen-doc-html-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250491" comment="xen-doc-pdf-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250492" comment="xen-kmp-default-4.2.5_21_3.0.101_0.190.TDC-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250493" comment="xen-libs-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250494" comment="xen-tools-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250495" comment="xen-tools-domU-4.2.5_21-47.32 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17963</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-17963" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17963" source="CVE"/>
    <description>
    qemu_deliver_packet_iov in net/net.c in Qemu accepts packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-17963.html">CVE-2018-17963</cve>
<bugzilla href="https://bugzilla.suse.com/1111013">SUSE bug 1111013</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1111014">SUSE bug 1111014</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241072" comment="kvm-1.4.2-53.26 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009241072" comment="kvm-1.4.2-53.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250489" comment="xen-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250490" comment="xen-doc-html-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250491" comment="xen-doc-pdf-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250492" comment="xen-kmp-default-4.2.5_21_3.0.101_0.190.TDC-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250493" comment="xen-libs-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250494" comment="xen-tools-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250495" comment="xen-tools-domU-4.2.5_21-47.32 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17965</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-17965" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17965" source="CVE"/>
    <description>
    ImageMagick 7.0.7-28 has a memory leak vulnerability in WriteSGIImage in coders/sgi.c.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-17965.html">CVE-2018-17965</cve>
<bugzilla href="https://bugzilla.suse.com/1110747">SUSE bug 1110747</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1117463">SUSE bug 1117463</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009237944" comment="ImageMagick-6.4.3.6-78.74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237963" comment="libMagickCore1-6.4.3.6-78.74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237964" comment="libMagickCore1-32bit-6.4.3.6-78.74 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17966</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-17966" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17966" source="CVE"/>
    <description>
    ImageMagick 7.0.7-28 has a memory leak vulnerability in WritePDBImage in coders/pdb.c.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-17966.html">CVE-2018-17966</cve>
<bugzilla href="https://bugzilla.suse.com/1110746">SUSE bug 1110746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1117463">SUSE bug 1117463</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009237944" comment="ImageMagick-6.4.3.6-78.74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237963" comment="libMagickCore1-6.4.3.6-78.74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237964" comment="libMagickCore1-32bit-6.4.3.6-78.74 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17972</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-17972" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17972" source="CVE"/>
    <description>
    An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-17972.html">CVE-2018-17972</cve>
<bugzilla href="https://bugzilla.suse.com/1110785">SUSE bug 1110785</bugzilla>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:201818016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18016</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-18016" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18016" source="CVE"/>
    <description>
    ImageMagick 7.0.7-28 has a memory leak vulnerability in WritePCXImage in coders/pcx.c.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-18016.html">CVE-2018-18016</cve>
<bugzilla href="https://bugzilla.suse.com/1111072">SUSE bug 1111072</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1117463">SUSE bug 1117463</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009237944" comment="ImageMagick-6.4.3.6-78.74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237963" comment="libMagickCore1-6.4.3.6-78.74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237964" comment="libMagickCore1-32bit-6.4.3.6-78.74 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18024</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-18024" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18024" source="CVE"/>
    <description>
    In ImageMagick 7.0.8-13 Q16, there is an infinite loop in the ReadBMPImage function of the coders/bmp.c file. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-18024.html">CVE-2018-18024</cve>
<bugzilla href="https://bugzilla.suse.com/1111069">SUSE bug 1111069</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1117463">SUSE bug 1117463</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009237944" comment="ImageMagick-6.4.3.6-78.74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237963" comment="libMagickCore1-6.4.3.6-78.74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237964" comment="libMagickCore1-32bit-6.4.3.6-78.74 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18281</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-18281" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18281" source="CVE"/>
    <description>
    Since Linux kernel version 3.2, the mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. This is fixed in the following kernel versions: 4.9.135, 4.14.78, 4.18.16, 4.19.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-18281.html">CVE-2018-18281</cve>
<bugzilla href="https://bugzilla.suse.com/1113769">SUSE bug 1113769</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009243428" comment="kernel-bigsmp-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243429" comment="kernel-bigsmp-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243430" comment="kernel-bigsmp-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243411" comment="kernel-default-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243412" comment="kernel-default-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243413" comment="kernel-default-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243431" comment="kernel-default-man-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243414" comment="kernel-ec2-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243415" comment="kernel-ec2-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243416" comment="kernel-ec2-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243417" comment="kernel-pae-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243418" comment="kernel-pae-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243419" comment="kernel-pae-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243420" comment="kernel-source-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243421" comment="kernel-syms-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243422" comment="kernel-trace-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243423" comment="kernel-trace-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243424" comment="kernel-trace-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243425" comment="kernel-xen-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243426" comment="kernel-xen-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243427" comment="kernel-xen-devel-3.0.101-0.47.106.59 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18310</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-18310" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18310" source="CVE"/>
    <description>
    An invalid memory address dereference was discovered in dwfl_segment_report_module.c in libdwfl in elfutils through v0.174. The vulnerability allows attackers to cause a denial of service (application crash) with a crafted ELF file, as demonstrated by consider_notes.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-18310.html">CVE-2018-18310</cve>
<bugzilla href="https://bugzilla.suse.com/1111973">SUSE bug 1111973</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009256650" comment="elfutils-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256651" comment="libasm1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256652" comment="libasm1-32bit-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256653" comment="libdw1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256654" comment="libdw1-32bit-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256655" comment="libebl1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256656" comment="libebl1-32bit-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256657" comment="libelf1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256658" comment="libelf1-32bit-0.152-4.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18384</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-18384" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18384" source="CVE"/>
    <description>
    Info-ZIP UnZip 6.0 has a buffer overflow in list.c, when a ZIP archive has a crafted relationship between the compressed-size value and the uncompressed-size value, because a buffer size is 10 and is supposed to be 12.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-18384.html">CVE-2018-18384</cve>
<bugzilla href="https://bugzilla.suse.com/1110194">SUSE bug 1110194</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1148898">SUSE bug 1148898</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246176" comment="unzip-6.00-11.18.8 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18386</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-18386" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18386" source="CVE"/>
    <description>
    drivers/tty/n_tty.c in the Linux kernel before 4.14.11 allows local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-18386.html">CVE-2018-18386</cve>
<bugzilla href="https://bugzilla.suse.com/1094825">SUSE bug 1094825</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1112039">SUSE bug 1112039</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009243428" comment="kernel-bigsmp-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243429" comment="kernel-bigsmp-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243430" comment="kernel-bigsmp-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243411" comment="kernel-default-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243412" comment="kernel-default-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243413" comment="kernel-default-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243431" comment="kernel-default-man-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243414" comment="kernel-ec2-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243415" comment="kernel-ec2-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243416" comment="kernel-ec2-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243417" comment="kernel-pae-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243418" comment="kernel-pae-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243419" comment="kernel-pae-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243420" comment="kernel-source-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243421" comment="kernel-syms-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243422" comment="kernel-trace-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243423" comment="kernel-trace-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243424" comment="kernel-trace-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243425" comment="kernel-xen-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243426" comment="kernel-xen-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243427" comment="kernel-xen-devel-3.0.101-0.47.106.59 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18438</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-18438" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18438" source="CVE"/>
    <description>
    Qemu has integer overflows because IOReadHandler and its associated functions use a signed integer data type for a size value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-18438.html">CVE-2018-18438</cve>
<bugzilla href="https://bugzilla.suse.com/1112185">SUSE bug 1112185</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1112188">SUSE bug 1112188</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241072" comment="kvm-1.4.2-53.26 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009241072" comment="kvm-1.4.2-53.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250489" comment="xen-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250490" comment="xen-doc-html-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250491" comment="xen-doc-pdf-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250492" comment="xen-kmp-default-4.2.5_21_3.0.101_0.190.TDC-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250493" comment="xen-libs-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250494" comment="xen-tools-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250495" comment="xen-tools-domU-4.2.5_21-47.32 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18520</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-18520" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18520" source="CVE"/>
    <description>
    An Invalid Memory Address Dereference exists in the function elf_end in libelf in elfutils through v0.174. Although eu-size is intended to support ar files inside ar files, handle_ar in size.c closes the outer ar file before handling all inner entries. The vulnerability allows attackers to cause a denial of service (application crash) with a crafted ELF file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-18520.html">CVE-2018-18520</cve>
<bugzilla href="https://bugzilla.suse.com/1112726">SUSE bug 1112726</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009256650" comment="elfutils-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256651" comment="libasm1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256652" comment="libasm1-32bit-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256653" comment="libdw1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256654" comment="libdw1-32bit-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256655" comment="libebl1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256656" comment="libebl1-32bit-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256657" comment="libelf1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256658" comment="libelf1-32bit-0.152-4.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18521</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-18521" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18521" source="CVE"/>
    <description>
    Divide-by-zero vulnerabilities in the function arlib_add_symbols() in arlib.c in elfutils 0.174 allow remote attackers to cause a denial of service (application crash) with a crafted ELF file, as demonstrated by eu-ranlib, because a zero sh_entsize is mishandled.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-18521.html">CVE-2018-18521</cve>
<bugzilla href="https://bugzilla.suse.com/1112723">SUSE bug 1112723</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009256650" comment="elfutils-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256651" comment="libasm1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256652" comment="libasm1-32bit-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256653" comment="libdw1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256654" comment="libdw1-32bit-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256655" comment="libebl1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256656" comment="libebl1-32bit-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256657" comment="libelf1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256658" comment="libelf1-32bit-0.152-4.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18544</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-18544" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544" source="CVE"/>
    <description>
    There is a memory leak in the function WriteMSLImage of coders/msl.c in ImageMagick 7.0.8-13 Q16, and the function ProcessMSLScript of coders/msl.c in GraphicsMagick before 1.3.31.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-18544.html">CVE-2018-18544</cve>
<bugzilla href="https://bugzilla.suse.com/1113064">SUSE bug 1113064</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009246344" comment="ImageMagick-6.4.3.6-78.92 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246355" comment="libMagickCore1-6.4.3.6-78.92 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246356" comment="libMagickCore1-32bit-6.4.3.6-78.92 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18584</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-18584" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18584" source="CVE"/>
    <description>
    In mspack/cab.h in libmspack before 0.8alpha and cabextract before 1.8, the CAB block input buffer is one byte too small for the maximal Quantum block, leading to an out-of-bounds write.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-18584.html">CVE-2018-18584</cve>
<bugzilla href="https://bugzilla.suse.com/1113038">SUSE bug 1113038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1113039">SUSE bug 1113039</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009246351" comment="libmspack-0.0.20060920alpha-74.11.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246360" comment="libmspack0-0.0.20060920alpha-74.11.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18585</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-18585" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18585" source="CVE"/>
    <description>
    chmd_read_headers in mspack/chmd.c in libmspack before 0.8alpha accepts a filename that has '\0' as its first or second character (such as the "/\0" name).
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-18585.html">CVE-2018-18585</cve>
<bugzilla href="https://bugzilla.suse.com/1113038">SUSE bug 1113038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1113039">SUSE bug 1113039</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009246351" comment="libmspack-0.0.20060920alpha-74.11.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246360" comment="libmspack0-0.0.20060920alpha-74.11.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18661</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-18661" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18661" source="CVE"/>
    <description>
    An issue was discovered in LibTIFF 4.0.9. There is a NULL pointer dereference in the function LZWDecode in the file tif_lzw.c.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-18661.html">CVE-2018-18661</cve>
<bugzilla href="https://bugzilla.suse.com/1113672">SUSE bug 1113672</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009240660" comment="libtiff3-3.8.2-141.169.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240661" comment="libtiff3-32bit-3.8.2-141.169.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240659" comment="tiff-3.8.2-141.169.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18710</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-18710" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18710" source="CVE"/>
    <description>
    An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-18710.html">CVE-2018-18710</cve>
<bugzilla href="https://bugzilla.suse.com/1113751">SUSE bug 1113751</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009243428" comment="kernel-bigsmp-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243429" comment="kernel-bigsmp-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243430" comment="kernel-bigsmp-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243411" comment="kernel-default-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243412" comment="kernel-default-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243413" comment="kernel-default-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243431" comment="kernel-default-man-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243414" comment="kernel-ec2-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243415" comment="kernel-ec2-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243416" comment="kernel-ec2-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243417" comment="kernel-pae-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243418" comment="kernel-pae-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243419" comment="kernel-pae-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243420" comment="kernel-source-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243421" comment="kernel-syms-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243422" comment="kernel-trace-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243423" comment="kernel-trace-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243424" comment="kernel-trace-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243425" comment="kernel-xen-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243426" comment="kernel-xen-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243427" comment="kernel-xen-devel-3.0.101-0.47.106.59 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18849</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-18849" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18849" source="CVE"/>
    <description>
    In Qemu 3.0.0, lsi_do_msgin in hw/scsi/lsi53c895a.c allows out-of-bounds access by triggering an invalid msg_len value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-18849.html">CVE-2018-18849</cve>
<bugzilla href="https://bugzilla.suse.com/1114422">SUSE bug 1114422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1114423">SUSE bug 1114423</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241072" comment="kvm-1.4.2-53.26 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009241072" comment="kvm-1.4.2-53.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250489" comment="xen-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250490" comment="xen-doc-html-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250491" comment="xen-doc-pdf-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250492" comment="xen-kmp-default-4.2.5_21_3.0.101_0.190.TDC-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250493" comment="xen-libs-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250494" comment="xen-tools-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250495" comment="xen-tools-domU-4.2.5_21-47.32 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19131</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-19131" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19131" source="CVE"/>
    <description>
    Squid before 4.4 has XSS via a crafted X.509 certificate during HTTP(S) error page generation for certificate errors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-19131.html">CVE-2018-19131</cve>
<bugzilla href="https://bugzilla.suse.com/1113668">SUSE bug 1113668</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009239311" comment="squid3-3.1.23-8.16.37.9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19364</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-19364" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19364" source="CVE"/>
    <description>
    hw/9pfs/cofile.c and hw/9pfs/9p.c in QEMU can modify an fid path while it is being accessed by a second thread, leading to (for example) a use-after-free outcome.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-19364.html">CVE-2018-19364</cve>
<bugzilla href="https://bugzilla.suse.com/1116717">SUSE bug 1116717</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1116726">SUSE bug 1116726</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250396" comment="kvm-1.4.2-53.29 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19407</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-19407" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19407" source="CVE"/>
    <description>
    The vcpu_scan_ioapic function in arch/x86/kvm/x86.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-19407.html">CVE-2018-19407</cve>
<bugzilla href="https://bugzilla.suse.com/1116841">SUSE bug 1116841</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009243428" comment="kernel-bigsmp-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243429" comment="kernel-bigsmp-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243430" comment="kernel-bigsmp-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243411" comment="kernel-default-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243412" comment="kernel-default-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243413" comment="kernel-default-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243431" comment="kernel-default-man-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243414" comment="kernel-ec2-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243415" comment="kernel-ec2-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243416" comment="kernel-ec2-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243417" comment="kernel-pae-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243418" comment="kernel-pae-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243419" comment="kernel-pae-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243420" comment="kernel-source-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243421" comment="kernel-syms-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243422" comment="kernel-trace-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243423" comment="kernel-trace-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243424" comment="kernel-trace-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243425" comment="kernel-xen-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243426" comment="kernel-xen-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243427" comment="kernel-xen-devel-3.0.101-0.47.106.59 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19489</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-19489" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19489" source="CVE"/>
    <description>
    v9fs_wstat in hw/9pfs/9p.c in QEMU allows guest OS users to cause a denial of service (crash) because of a race condition during file renaming.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-19489.html">CVE-2018-19489</cve>
<bugzilla href="https://bugzilla.suse.com/1117275">SUSE bug 1117275</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1117279">SUSE bug 1117279</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250396" comment="kvm-1.4.2-53.29 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19518</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-19518" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19518" source="CVE"/>
    <description>
    University of Washington IMAP Toolkit 2007f on UNIX, as used in imap_open() in PHP and other products, launches an rsh command (by means of the imap_rimap function in c-client/imap4r1.c and the tcp_aopen function in osdep/unix/tcp_unix.c) without preventing argument injection, which might allow remote attackers to execute arbitrary OS commands if the IMAP server name is untrusted input (e.g., entered by a user of a web application) and if rsh has been replaced by a program with different argument semantics. For example, if rsh is a link to ssh (as seen on Debian and Ubuntu systems), then the attack can use an IMAP server name containing a "-oProxyCommand" argument.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-19518.html">CVE-2018-19518</cve>
<bugzilla href="https://bugzilla.suse.com/1117107">SUSE bug 1117107</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009241073" comment="apache2-mod_php53-5.3.17-112.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241064" comment="php53-5.3.17-112.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241074" comment="php53-bcmath-5.3.17-112.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241075" comment="php53-bz2-5.3.17-112.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241076" comment="php53-calendar-5.3.17-112.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241077" comment="php53-ctype-5.3.17-112.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241078" comment="php53-curl-5.3.17-112.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241079" comment="php53-dba-5.3.17-112.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241080" comment="php53-dom-5.3.17-112.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241081" comment="php53-exif-5.3.17-112.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241082" comment="php53-fastcgi-5.3.17-112.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241083" comment="php53-fileinfo-5.3.17-112.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241084" comment="php53-ftp-5.3.17-112.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241085" comment="php53-gd-5.3.17-112.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241086" comment="php53-gettext-5.3.17-112.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241087" comment="php53-gmp-5.3.17-112.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241088" comment="php53-iconv-5.3.17-112.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241089" comment="php53-intl-5.3.17-112.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241090" comment="php53-json-5.3.17-112.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241091" comment="php53-ldap-5.3.17-112.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241092" comment="php53-mbstring-5.3.17-112.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241093" comment="php53-mcrypt-5.3.17-112.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241094" comment="php53-mysql-5.3.17-112.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241095" comment="php53-odbc-5.3.17-112.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241096" comment="php53-openssl-5.3.17-112.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241097" comment="php53-pcntl-5.3.17-112.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241098" comment="php53-pdo-5.3.17-112.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241099" comment="php53-pear-5.3.17-112.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241100" comment="php53-pgsql-5.3.17-112.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241101" comment="php53-pspell-5.3.17-112.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241102" comment="php53-shmop-5.3.17-112.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241103" comment="php53-snmp-5.3.17-112.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241104" comment="php53-soap-5.3.17-112.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241105" comment="php53-suhosin-5.3.17-112.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241106" comment="php53-sysvmsg-5.3.17-112.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241107" comment="php53-sysvsem-5.3.17-112.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241108" comment="php53-sysvshm-5.3.17-112.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241109" comment="php53-tokenizer-5.3.17-112.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241110" comment="php53-wddx-5.3.17-112.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241111" comment="php53-xmlreader-5.3.17-112.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241112" comment="php53-xmlrpc-5.3.17-112.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241113" comment="php53-xmlwriter-5.3.17-112.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241114" comment="php53-xsl-5.3.17-112.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241115" comment="php53-zip-5.3.17-112.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009241116" comment="php53-zlib-5.3.17-112.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-19636" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19636" source="CVE"/>
    <description>
    Supportutils, before version 3.1-5.7.1, when run with command line argument -A searched the file system for a ndspath binary. If an attacker provides one at an arbitrary location it is executed with root privileges
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-19636.html">CVE-2018-19636</cve>
<bugzilla href="https://bugzilla.suse.com/1063385">SUSE bug 1063385</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1117751">SUSE bug 1117751</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009245815" comment="supportutils-1.20-122.9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19638</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-19638" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19638" source="CVE"/>
    <description>
    In supportutils, before version 3.1-5.7.1 and if pacemaker is installed on the system, an unprivileged user could have overwritten arbitrary files in the directory that is used by supportutils to collect the log files.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-19638.html">CVE-2018-19638</cve>
<bugzilla href="https://bugzilla.suse.com/1063385">SUSE bug 1063385</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1118460">SUSE bug 1118460</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1118462">SUSE bug 1118462</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1118463">SUSE bug 1118463</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009245815" comment="supportutils-1.20-122.9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19639</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-19639" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19639" source="CVE"/>
    <description>
    If supportutils before version 3.1-5.7.1 is run with -v to perform rpm verification and the attacker manages to manipulate the rpm listing (e.g. with CVE-2018-19638) he can execute arbitrary commands as root.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-19639.html">CVE-2018-19639</cve>
<bugzilla href="https://bugzilla.suse.com/1063385">SUSE bug 1063385</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1118460">SUSE bug 1118460</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1118462">SUSE bug 1118462</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009245815" comment="supportutils-1.20-122.9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19640</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-19640" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19640" source="CVE"/>
    <description>
    If the attacker manages to create files in the directory used to collect log files in supportutils before version 3.1-5.7.1 (e.g. with CVE-2018-19638) he can kill arbitrary processes on the local machine.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-19640.html">CVE-2018-19640</cve>
<bugzilla href="https://bugzilla.suse.com/1063385">SUSE bug 1063385</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1118463">SUSE bug 1118463</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009245815" comment="supportutils-1.20-122.9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19665</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-19665" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19665" source="CVE"/>
    <description>
    The Bluetooth subsystem in QEMU mishandles negative values for length variables, leading to memory corruption.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-19665.html">CVE-2018-19665</cve>
<bugzilla href="https://bugzilla.suse.com/1117749">SUSE bug 1117749</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1117756">SUSE bug 1117756</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250489" comment="xen-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250490" comment="xen-doc-html-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250491" comment="xen-doc-pdf-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250492" comment="xen-kmp-default-4.2.5_21_3.0.101_0.190.TDC-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250493" comment="xen-libs-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250494" comment="xen-tools-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250495" comment="xen-tools-domU-4.2.5_21-47.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19758</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-19758" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19758" source="CVE"/>
    <description>
    There is a heap-based buffer over-read at wav.c in wav_write_header in libsndfile 1.0.28 that will cause a denial of service.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-19758.html">CVE-2018-19758</cve>
<bugzilla href="https://bugzilla.suse.com/1117954">SUSE bug 1117954</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1125575">SUSE bug 1125575</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009246794" comment="libsndfile-1.0.20-2.19.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246796" comment="libsndfile-32bit-1.0.20-2.19.12 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19824</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-19824" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19824" source="CVE"/>
    <description>
    In the Linux kernel through 4.19.6, a local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-19824.html">CVE-2018-19824</cve>
<bugzilla href="https://bugzilla.suse.com/1118152">SUSE bug 1118152</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009243428" comment="kernel-bigsmp-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243429" comment="kernel-bigsmp-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243430" comment="kernel-bigsmp-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243411" comment="kernel-default-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243412" comment="kernel-default-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243413" comment="kernel-default-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243431" comment="kernel-default-man-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243414" comment="kernel-ec2-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243415" comment="kernel-ec2-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243416" comment="kernel-ec2-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243417" comment="kernel-pae-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243418" comment="kernel-pae-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243419" comment="kernel-pae-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243420" comment="kernel-source-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243421" comment="kernel-syms-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243422" comment="kernel-trace-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243423" comment="kernel-trace-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243424" comment="kernel-trace-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243425" comment="kernel-xen-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243426" comment="kernel-xen-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243427" comment="kernel-xen-devel-3.0.101-0.47.106.59 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-19840" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19840" source="CVE"/>
    <description>
    The function WavpackPackInit in pack_utils.c in libwavpack.a in WavPack through 5.1.0 allows attackers to cause a denial-of-service (resource exhaustion caused by an infinite loop) via a crafted wav audio file because WavpackSetConfiguration64 mishandles a sample rate of zero.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-19840.html">CVE-2018-19840</cve>
<bugzilla href="https://bugzilla.suse.com/1120930">SUSE bug 1120930</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009246363" comment="libwavpack1-4.50.1-1.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246353" comment="wavpack-4.50.1-1.30 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19961</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-19961" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19961" source="CVE"/>
    <description>
    An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because TLB flushes do not always occur after IOMMU mapping changes.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-19961.html">CVE-2018-19961</cve>
<bugzilla href="https://bugzilla.suse.com/1115040">SUSE bug 1115040</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250489" comment="xen-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250490" comment="xen-doc-html-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250491" comment="xen-doc-pdf-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250492" comment="xen-kmp-default-4.2.5_21_3.0.101_0.190.TDC-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250493" comment="xen-libs-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250494" comment="xen-tools-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250495" comment="xen-tools-domU-4.2.5_21-47.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19962</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-19962" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19962" source="CVE"/>
    <description>
    An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because small IOMMU mappings are unsafely combined into larger ones.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-19962.html">CVE-2018-19962</cve>
<bugzilla href="https://bugzilla.suse.com/1115040">SUSE bug 1115040</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250489" comment="xen-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250490" comment="xen-doc-html-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250491" comment="xen-doc-pdf-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250492" comment="xen-kmp-default-4.2.5_21_3.0.101_0.190.TDC-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250493" comment="xen-libs-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250494" comment="xen-tools-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250495" comment="xen-tools-domU-4.2.5_21-47.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19965</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-19965" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19965" source="CVE"/>
    <description>
    An issue was discovered in Xen through 4.11.x allowing 64-bit PV guest OS users to cause a denial of service (host OS crash) because #GP[0] can occur after a non-canonical address is passed to the TLB flushing code. NOTE: this issue exists because of an incorrect CVE-2017-5754 (aka Meltdown) mitigation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-19965.html">CVE-2018-19965</cve>
<bugzilla href="https://bugzilla.suse.com/1115045">SUSE bug 1115045</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250489" comment="xen-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250490" comment="xen-doc-html-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250491" comment="xen-doc-pdf-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250492" comment="xen-kmp-default-4.2.5_21_3.0.101_0.190.TDC-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250493" comment="xen-libs-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250494" comment="xen-tools-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250495" comment="xen-tools-domU-4.2.5_21-47.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19966</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-19966" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19966" source="CVE"/>
    <description>
    An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service (host OS crash) or possibly gain host OS privileges because of an interpretation conflict for a union data structure associated with shadow paging. NOTE: this issue exists because of an incorrect fix for CVE-2017-15595.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-19966.html">CVE-2018-19966</cve>
<bugzilla href="https://bugzilla.suse.com/1115047">SUSE bug 1115047</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250489" comment="xen-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250490" comment="xen-doc-html-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250491" comment="xen-doc-pdf-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250492" comment="xen-kmp-default-4.2.5_21_3.0.101_0.190.TDC-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250493" comment="xen-libs-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250494" comment="xen-tools-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250495" comment="xen-tools-domU-4.2.5_21-47.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19967</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-19967" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19967" source="CVE"/>
    <description>
    An issue was discovered in Xen through 4.11.x on Intel x86 platforms allowing guest OS users to cause a denial of service (host OS hang) because Xen does not work around Intel's mishandling of certain HLE transactions associated with the KACQUIRE instruction prefix.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-19967.html">CVE-2018-19967</cve>
<bugzilla href="https://bugzilla.suse.com/1114988">SUSE bug 1114988</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250489" comment="xen-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250490" comment="xen-doc-html-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250491" comment="xen-doc-pdf-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250492" comment="xen-kmp-default-4.2.5_21_3.0.101_0.190.TDC-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250493" comment="xen-libs-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250494" comment="xen-tools-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250495" comment="xen-tools-domU-4.2.5_21-47.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19985</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-19985" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19985" source="CVE"/>
    <description>
    The function hso_get_config_data in drivers/net/usb/hso.c in the Linux kernel through 4.19.8 reads if_num from the USB device (as a u8) and uses it to index a small array, resulting in an object out-of-bounds (OOB) read that potentially allows arbitrary read in the kernel address space.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-19985.html">CVE-2018-19985</cve>
<bugzilla href="https://bugzilla.suse.com/1120743">SUSE bug 1120743</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009243428" comment="kernel-bigsmp-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243429" comment="kernel-bigsmp-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243430" comment="kernel-bigsmp-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243411" comment="kernel-default-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243412" comment="kernel-default-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243413" comment="kernel-default-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243431" comment="kernel-default-man-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243414" comment="kernel-ec2-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243415" comment="kernel-ec2-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243416" comment="kernel-ec2-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243417" comment="kernel-pae-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243418" comment="kernel-pae-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243419" comment="kernel-pae-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243420" comment="kernel-source-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243421" comment="kernel-syms-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243422" comment="kernel-trace-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243423" comment="kernel-trace-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243424" comment="kernel-trace-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243425" comment="kernel-xen-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243426" comment="kernel-xen-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243427" comment="kernel-xen-devel-3.0.101-0.47.106.59 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20019</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-20019" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20019" source="CVE"/>
    <description>
    LibVNC before commit a83439b9fbe0f03c48eb94ed05729cb016f8b72f contains multiple heap out-of-bound write vulnerabilities in VNC client code that can result remote code execution
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-20019.html">CVE-2018-20019</cve>
<bugzilla href="https://bugzilla.suse.com/1120118">SUSE bug 1120118</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123823">SUSE bug 1123823</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009242916" comment="LibVNCServer-0.9.1-160.6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20020</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-20020" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20020" source="CVE"/>
    <description>
    LibVNC before commit 7b1ef0ffc4815cab9a96c7278394152bdc89dc4d contains heap out-of-bound write vulnerability inside structure in VNC client code that can result remote code execution
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-20020.html">CVE-2018-20020</cve>
<bugzilla href="https://bugzilla.suse.com/1120116">SUSE bug 1120116</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009242916" comment="LibVNCServer-0.9.1-160.6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20021</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-20021" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20021" source="CVE"/>
    <description>
    LibVNC before commit c3115350eb8bb635d0fdb4dbbb0d0541f38ed19c contains a CWE-835: Infinite loop vulnerability in VNC client code. Vulnerability allows attacker to consume excessive amount of resources like CPU and RAM
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-20021.html">CVE-2018-20021</cve>
<bugzilla href="https://bugzilla.suse.com/1120122">SUSE bug 1120122</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009242916" comment="LibVNCServer-0.9.1-160.6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20022</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-20022" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20022" source="CVE"/>
    <description>
    LibVNC before 2f5b2ad1c6c99b1ac6482c95844a84d66bb52838 contains multiple weaknesses CWE-665: Improper Initialization vulnerability in VNC client code that allows attacker to read stack memory and can be abuse for information disclosure. Combined with another vulnerability, it can be used to leak stack memory layout and in bypassing ASLR
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-20022.html">CVE-2018-20022</cve>
<bugzilla href="https://bugzilla.suse.com/1120120">SUSE bug 1120120</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009242916" comment="LibVNCServer-0.9.1-160.6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20024</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-20024" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20024" source="CVE"/>
    <description>
    LibVNC before commit 4a21bbd097ef7c44bb000c3bd0907f96a10e4ce7 contains null pointer dereference in VNC client code that can result DoS.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-20024.html">CVE-2018-20024</cve>
<bugzilla href="https://bugzilla.suse.com/1120121">SUSE bug 1120121</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009242916" comment="LibVNCServer-0.9.1-160.6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20169</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-20169" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20169" source="CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 4.19.9. The USB subsystem mishandles size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c.
    </description>
<advisory from="security@suse.de">
<cve href="https://www.suse.com/security/cve/CVE-2018-20169.html">CVE-2018-20169</cve>
<bugzilla href="https://bugzilla.suse.com/1119714">SUSE bug 1119714</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009243428" comment="kernel-bigsmp-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243429" comment="kernel-bigsmp-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243430" comment="kernel-bigsmp-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243411" comment="kernel-default-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243412" comment="kernel-default-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243413" comment="kernel-default-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243431" comment="kernel-default-man-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243414" comment="kernel-ec2-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243415" comment="kernel-ec2-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243416" comment="kernel-ec2-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243417" comment="kernel-pae-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243418" comment="kernel-pae-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243419" comment="kernel-pae-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243420" comment="kernel-source-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243421" comment="kernel-syms-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243422" comment="kernel-trace-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243423" comment="kernel-trace-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243424" comment="kernel-trace-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243425" comment="kernel-xen-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243426" comment="kernel-xen-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243427" comment="kernel-xen-devel-3.0.101-0.47.106.59 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20346</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-20346" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20346" source="CVE"/>
    <description>
    SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries that occur after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases), aka Magellan.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-20346.html">CVE-2018-20346</cve>
<bugzilla href="https://bugzilla.suse.com/1119687">SUSE bug 1119687</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1120335">SUSE bug 1120335</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1131576">SUSE bug 1131576</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1131918">SUSE bug 1131918</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1131919">SUSE bug 1131919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1148893">SUSE bug 1148893</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009246747" comment="libsqlite3-0-3.7.6.3-1.4.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246750" comment="libsqlite3-0-32bit-3.7.6.3-1.4.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246738" comment="sqlite3-3.7.6.3-1.4.7.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20467</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-20467" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20467" source="CVE"/>
    <description>
    In coders/bmp.c in ImageMagick before 7.0.8-16, an input file can result in an infinite loop and hang, with high CPU and memory consumption. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
<cve href="https://www.suse.com/security/cve/CVE-2018-20467.html">CVE-2018-20467</cve>
<bugzilla href="https://bugzilla.suse.com/1120381">SUSE bug 1120381</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009246344" comment="ImageMagick-6.4.3.6-78.92 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246355" comment="libMagickCore1-6.4.3.6-78.92 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246356" comment="libMagickCore1-32bit-6.4.3.6-78.92 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20685</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-20685" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20685" source="CVE"/>
    <description>
    In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-20685.html">CVE-2018-20685</cve>
<bugzilla href="https://bugzilla.suse.com/1121571">SUSE bug 1121571</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123220">SUSE bug 1123220</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250397" comment="openssh-6.6p1-41.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250398" comment="openssh-askpass-gnome-6.6p1-41.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250399" comment="openssh-openssl1-6.6p1-41.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250400" comment="openssh-openssl1-helpers-6.6p1-41.13 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20748</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-20748" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20748" source="CVE"/>
    <description>
    LibVNC before 0.9.12 contains multiple heap out-of-bounds write vulnerabilities in libvncclient/rfbproto.c. The fix for CVE-2018-20019 was incomplete.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-20748.html">CVE-2018-20748</cve>
<bugzilla href="https://bugzilla.suse.com/1120118">SUSE bug 1120118</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123823">SUSE bug 1123823</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244172" comment="LibVNCServer-0.9.1-160.9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20749</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-20749" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20749" source="CVE"/>
    <description>
    LibVNC before 0.9.12 contains a heap out-of-bounds write vulnerability in libvncserver/rfbserver.c. The fix for CVE-2018-15127 was incomplete.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-20749.html">CVE-2018-20749</cve>
<bugzilla href="https://bugzilla.suse.com/1120117">SUSE bug 1120117</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123828">SUSE bug 1123828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123832">SUSE bug 1123832</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244172" comment="LibVNCServer-0.9.1-160.9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20750</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-20750" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20750" source="CVE"/>
    <description>
    LibVNC through 0.9.12 contains a heap out-of-bounds write vulnerability in libvncserver/rfbserver.c. The fix for CVE-2018-15127 was incomplete.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-20750.html">CVE-2018-20750</cve>
<bugzilla href="https://bugzilla.suse.com/1120117">SUSE bug 1120117</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123832">SUSE bug 1123832</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244172" comment="LibVNCServer-0.9.1-160.9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20783</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-20783" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20783" source="CVE"/>
    <description>
    In PHP before 5.6.39, 7.x before 7.0.33, 7.1.x before 7.1.25, and 7.2.x before 7.2.13, a buffer over-read in PHAR reading functions may allow an attacker to read allocated or unallocated memory past the actual data when trying to parse a .phar file. This is related to phar_parse_pharfile in ext/phar/phar.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-20783.html">CVE-2018-20783</cve>
<bugzilla href="https://bugzilla.suse.com/1126713">SUSE bug 1126713</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1127122">SUSE bug 1127122</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009247299" comment="apache2-mod_php53-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247289" comment="php53-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247300" comment="php53-bcmath-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247301" comment="php53-bz2-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247302" comment="php53-calendar-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247303" comment="php53-ctype-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247304" comment="php53-curl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247305" comment="php53-dba-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247306" comment="php53-dom-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247307" comment="php53-exif-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247308" comment="php53-fastcgi-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247309" comment="php53-fileinfo-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247310" comment="php53-ftp-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247311" comment="php53-gd-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247312" comment="php53-gettext-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247313" comment="php53-gmp-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247314" comment="php53-iconv-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247315" comment="php53-intl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247316" comment="php53-json-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247317" comment="php53-ldap-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247318" comment="php53-mbstring-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247319" comment="php53-mcrypt-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247320" comment="php53-mysql-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247321" comment="php53-odbc-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247322" comment="php53-openssl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247323" comment="php53-pcntl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247324" comment="php53-pdo-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247325" comment="php53-pear-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247326" comment="php53-pgsql-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247327" comment="php53-pspell-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247328" comment="php53-shmop-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247329" comment="php53-snmp-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247330" comment="php53-soap-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247331" comment="php53-suhosin-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247332" comment="php53-sysvmsg-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247333" comment="php53-sysvsem-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247334" comment="php53-sysvshm-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247335" comment="php53-tokenizer-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247336" comment="php53-wddx-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247337" comment="php53-xmlreader-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247338" comment="php53-xmlrpc-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247339" comment="php53-xmlwriter-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247340" comment="php53-xsl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247341" comment="php53-zip-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247342" comment="php53-zlib-5.3.17-112.58 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-20815" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20815" source="CVE"/>
    <description>
    In QEMU 3.1.0, load_device_tree in device_tree.c calls the deprecated load_image function, which has a buffer overflow risk.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-20815.html">CVE-2018-20815</cve>
<bugzilla href="https://bugzilla.suse.com/1118900">SUSE bug 1118900</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1130675">SUSE bug 1130675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1130680">SUSE bug 1130680</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253938" comment="kvm-1.4.2-53.32 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-20836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20836" source="CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 4.20. There is a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-20836.html">CVE-2018-20836</cve>
<bugzilla href="https://bugzilla.suse.com/1134395">SUSE bug 1134395</bugzilla>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:201820843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20843</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-20843" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20843" source="CVE"/>
    <description>
    In libexpat in Expat before 2.2.7, XML input including XML names that contain a large number of colons could make the XML parser consume a high amount of RAM and CPU resources while processing (enough to be usable for denial-of-service attacks).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-20843.html">CVE-2018-20843</cve>
<bugzilla href="https://bugzilla.suse.com/1139937">SUSE bug 1139937</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009259211" comment="expat-2.0.1-88.42.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009259212" comment="libexpat1-2.0.1-88.42.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009259213" comment="libexpat1-32bit-2.0.1-88.42.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20852</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-20852" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20852" source="CVE"/>
    <description>
    http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-20852.html">CVE-2018-20852</cve>
<bugzilla href="https://bugzilla.suse.com/1141853">SUSE bug 1141853</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009261357" comment="libpython2_6-1_0-2.6.9-40.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009261371" comment="libpython2_6-1_0-32bit-2.6.9-40.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009261358" comment="python-2.6.9-40.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009261372" comment="python-32bit-2.6.9-40.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009261359" comment="python-base-2.6.9-40.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009261373" comment="python-base-32bit-2.6.9-40.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009261360" comment="python-curses-2.6.9-40.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009261361" comment="python-demo-2.6.9-40.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009261362" comment="python-doc-2.6-8.40.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009261363" comment="python-doc-pdf-2.6-8.40.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009261364" comment="python-gdbm-2.6.9-40.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009261365" comment="python-idle-2.6.9-40.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009261366" comment="python-tk-2.6.9-40.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009261367" comment="python-xml-2.6.9-40.29 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20976</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-20976" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20976" source="CVE"/>
    <description>
    An issue was discovered in fs/xfs/xfs_super.c in the Linux kernel before 4.18. A use after free exists, related to xfs_fs_fill_super failure.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-20976.html">CVE-2018-20976</cve>
<bugzilla href="https://bugzilla.suse.com/1146285">SUSE bug 1146285</bugzilla>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:20182562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2562</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-2562" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Partition). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.19 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-2562.html">CVE-2018-2562</cve>
<bugzilla href="https://bugzilla.suse.com/1076369">SUSE bug 1076369</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1078431">SUSE bug 1078431</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210074" comment="libmysql55client18-5.5.59-0.39.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210075" comment="libmysql55client18-32bit-5.5.59-0.39.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210077" comment="libmysql55client_r18-5.5.59-0.39.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203186" comment="mysql-5.5.59-0.39.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210078" comment="mysql-client-5.5.59-0.39.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210079" comment="mysql-tools-5.5.59-0.39.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2579</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-2579" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-2579.html">CVE-2018-2579</cve>
<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205412" comment="java-1_7_0-ibm-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205413" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205414" comment="java-1_7_0-ibm-devel-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205415" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205416" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.20-65.13 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205412" comment="java-1_7_0-ibm-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205413" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205415" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205416" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.20-65.13 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2582</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-2582" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 8u152 and 9.0.1; Java SE Embedded: 8u151. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 6.5 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-2582.html">CVE-2018-2582</cve>
<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205412" comment="java-1_7_0-ibm-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205413" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205414" comment="java-1_7_0-ibm-devel-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205415" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205416" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.20-65.13 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205412" comment="java-1_7_0-ibm-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205413" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205415" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205416" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.20-65.13 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2588</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-2588" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: LDAP). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-2588.html">CVE-2018-2588</cve>
<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205412" comment="java-1_7_0-ibm-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205413" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205414" comment="java-1_7_0-ibm-devel-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205415" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205416" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.20-65.13 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205412" comment="java-1_7_0-ibm-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205413" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205415" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205416" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.20-65.13 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2599</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-2599" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.8 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-2599.html">CVE-2018-2599</cve>
<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205412" comment="java-1_7_0-ibm-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205413" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205414" comment="java-1_7_0-ibm-devel-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205415" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205416" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.20-65.13 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205412" comment="java-1_7_0-ibm-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205413" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205415" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205416" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.20-65.13 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2602</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-2602" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: I18n). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, Java SE Embedded executes to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-2602.html">CVE-2018-2602</cve>
<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205412" comment="java-1_7_0-ibm-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205413" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205414" comment="java-1_7_0-ibm-devel-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205415" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205416" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.20-65.13 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205412" comment="java-1_7_0-ibm-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205413" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205415" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205416" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.20-65.13 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2603</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-2603" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-2603.html">CVE-2018-2603</cve>
<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205412" comment="java-1_7_0-ibm-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205413" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205414" comment="java-1_7_0-ibm-devel-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205415" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205416" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.20-65.13 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205412" comment="java-1_7_0-ibm-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205413" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205415" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205416" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.20-65.13 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2618</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-2618" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-2618.html">CVE-2018-2618</cve>
<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205412" comment="java-1_7_0-ibm-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205413" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205414" comment="java-1_7_0-ibm-devel-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205415" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205416" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.20-65.13 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205412" comment="java-1_7_0-ibm-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205413" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205415" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205416" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.20-65.13 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2622</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-2622" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-2622.html">CVE-2018-2622</cve>
<bugzilla href="https://bugzilla.suse.com/1076369">SUSE bug 1076369</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1078431">SUSE bug 1078431</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210074" comment="libmysql55client18-5.5.59-0.39.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210075" comment="libmysql55client18-32bit-5.5.59-0.39.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210077" comment="libmysql55client_r18-5.5.59-0.39.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203186" comment="mysql-5.5.59-0.39.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210078" comment="mysql-client-5.5.59-0.39.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210079" comment="mysql-tools-5.5.59-0.39.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2633</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-2633" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-2633.html">CVE-2018-2633</cve>
<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205412" comment="java-1_7_0-ibm-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205413" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205414" comment="java-1_7_0-ibm-devel-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205415" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205416" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.20-65.13 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205412" comment="java-1_7_0-ibm-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205413" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205415" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205416" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.20-65.13 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2634</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-2634" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JGSS). Supported versions that are affected are Java SE: 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-2634.html">CVE-2018-2634</cve>
<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205412" comment="java-1_7_0-ibm-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205413" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205414" comment="java-1_7_0-ibm-devel-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205415" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205416" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.20-65.13 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205412" comment="java-1_7_0-ibm-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205413" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205415" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205416" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.20-65.13 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2637</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-2637" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JMX). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-2637.html">CVE-2018-2637</cve>
<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205412" comment="java-1_7_0-ibm-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205413" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205414" comment="java-1_7_0-ibm-devel-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205415" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205416" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.20-65.13 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205412" comment="java-1_7_0-ibm-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205413" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205415" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205416" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.20-65.13 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2640</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-2640" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-2640.html">CVE-2018-2640</cve>
<bugzilla href="https://bugzilla.suse.com/1076369">SUSE bug 1076369</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1078431">SUSE bug 1078431</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210074" comment="libmysql55client18-5.5.59-0.39.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210075" comment="libmysql55client18-32bit-5.5.59-0.39.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210077" comment="libmysql55client_r18-5.5.59-0.39.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203186" comment="mysql-5.5.59-0.39.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210078" comment="mysql-client-5.5.59-0.39.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210079" comment="mysql-tools-5.5.59-0.39.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2641</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-2641" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 6.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-2641.html">CVE-2018-2641</cve>
<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205412" comment="java-1_7_0-ibm-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205413" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205414" comment="java-1_7_0-ibm-devel-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205415" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205416" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.20-65.13 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205412" comment="java-1_7_0-ibm-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205413" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205415" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205416" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.20-65.13 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2657</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-2657" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2657" source="CVE"/>
    <description>
    Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u171 and 7u161; JRockit: R28.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, JRockit. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-2657.html">CVE-2018-2657</cve>
<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205412" comment="java-1_7_0-ibm-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205413" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205414" comment="java-1_7_0-ibm-devel-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205415" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205416" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.20-65.13 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205412" comment="java-1_7_0-ibm-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205413" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205415" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205416" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.20-65.13 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2663</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-2663" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-2663.html">CVE-2018-2663</cve>
<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205412" comment="java-1_7_0-ibm-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205413" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205414" comment="java-1_7_0-ibm-devel-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205415" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205416" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.20-65.13 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205412" comment="java-1_7_0-ibm-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205413" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205415" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205416" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.20-65.13 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2665</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-2665" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-2665.html">CVE-2018-2665</cve>
<bugzilla href="https://bugzilla.suse.com/1076369">SUSE bug 1076369</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1078431">SUSE bug 1078431</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210074" comment="libmysql55client18-5.5.59-0.39.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210075" comment="libmysql55client18-32bit-5.5.59-0.39.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210077" comment="libmysql55client_r18-5.5.59-0.39.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203186" comment="mysql-5.5.59-0.39.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210078" comment="mysql-client-5.5.59-0.39.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210079" comment="mysql-tools-5.5.59-0.39.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2668</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-2668" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-2668.html">CVE-2018-2668</cve>
<bugzilla href="https://bugzilla.suse.com/1076369">SUSE bug 1076369</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1078431">SUSE bug 1078431</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210074" comment="libmysql55client18-5.5.59-0.39.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210075" comment="libmysql55client18-32bit-5.5.59-0.39.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210077" comment="libmysql55client_r18-5.5.59-0.39.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203186" comment="mysql-5.5.59-0.39.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210078" comment="mysql-client-5.5.59-0.39.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210079" comment="mysql-tools-5.5.59-0.39.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2677</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-2677" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-2677.html">CVE-2018-2677</cve>
<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205412" comment="java-1_7_0-ibm-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205413" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205414" comment="java-1_7_0-ibm-devel-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205415" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205416" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.20-65.13 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205412" comment="java-1_7_0-ibm-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205413" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205415" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205416" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.20-65.13 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2678</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-2678" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-2678.html">CVE-2018-2678</cve>
<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205412" comment="java-1_7_0-ibm-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205413" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205414" comment="java-1_7_0-ibm-devel-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205415" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205416" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.20-65.13 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205412" comment="java-1_7_0-ibm-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205413" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205415" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.20-65.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205416" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.20-65.13 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2755</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-2755" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-2755.html">CVE-2018-2755</cve>
<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1090518">SUSE bug 1090518</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210080" comment="libmysql55client18-5.5.60-0.39.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210081" comment="libmysql55client18-32bit-5.5.60-0.39.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210083" comment="libmysql55client_r18-5.5.60-0.39.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203189" comment="mysql-5.5.60-0.39.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210084" comment="mysql-client-5.5.60-0.39.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210085" comment="mysql-tools-5.5.60-0.39.12 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2761</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-2761" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-2761.html">CVE-2018-2761</cve>
<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1090518">SUSE bug 1090518</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210080" comment="libmysql55client18-5.5.60-0.39.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210081" comment="libmysql55client18-32bit-5.5.60-0.39.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210083" comment="libmysql55client_r18-5.5.60-0.39.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203189" comment="mysql-5.5.60-0.39.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210084" comment="mysql-client-5.5.60-0.39.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210085" comment="mysql-tools-5.5.60-0.39.12 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2771</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-2771" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Locking). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-2771.html">CVE-2018-2771</cve>
<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1090518">SUSE bug 1090518</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210080" comment="libmysql55client18-5.5.60-0.39.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210081" comment="libmysql55client18-32bit-5.5.60-0.39.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210083" comment="libmysql55client_r18-5.5.60-0.39.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203189" comment="mysql-5.5.60-0.39.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210084" comment="mysql-client-5.5.60-0.39.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210085" comment="mysql-tools-5.5.60-0.39.12 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2773</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-2773" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2773" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-2773.html">CVE-2018-2773</cve>
<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210080" comment="libmysql55client18-5.5.60-0.39.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210081" comment="libmysql55client18-32bit-5.5.60-0.39.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210083" comment="libmysql55client_r18-5.5.60-0.39.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203189" comment="mysql-5.5.60-0.39.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210084" comment="mysql-client-5.5.60-0.39.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210085" comment="mysql-tools-5.5.60-0.39.12 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2781</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-2781" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-2781.html">CVE-2018-2781</cve>
<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1090518">SUSE bug 1090518</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210080" comment="libmysql55client18-5.5.60-0.39.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210081" comment="libmysql55client18-32bit-5.5.60-0.39.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210083" comment="libmysql55client_r18-5.5.60-0.39.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203189" comment="mysql-5.5.60-0.39.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210084" comment="mysql-client-5.5.60-0.39.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210085" comment="mysql-tools-5.5.60-0.39.12 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2783</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-2783" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2783" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u161 and 8u152; Java SE Embedded: 8u152; JRockit: R28.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-2783.html">CVE-2018-2783</cve>
<bugzilla href="https://bugzilla.suse.com/1090022">SUSE bug 1090022</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205417" comment="java-1_7_0-ibm-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205418" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205419" comment="java-1_7_0-ibm-devel-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205420" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205421" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.25-65.25 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205417" comment="java-1_7_0-ibm-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205418" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205420" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205421" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.25-65.25 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2790</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-2790" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2790" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-2790.html">CVE-2018-2790</cve>
<bugzilla href="https://bugzilla.suse.com/1090023">SUSE bug 1090023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1101637">SUSE bug 1101637</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205417" comment="java-1_7_0-ibm-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205418" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205419" comment="java-1_7_0-ibm-devel-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205420" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205421" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.25-65.25 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205417" comment="java-1_7_0-ibm-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205418" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205420" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205421" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.25-65.25 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2794</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-2794" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2794" source="CVE"/>
    <description>
    Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162, 10 and JRockit: R28.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, JRockit executes to compromise Java SE, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-2794.html">CVE-2018-2794</cve>
<bugzilla href="https://bugzilla.suse.com/1090024">SUSE bug 1090024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205417" comment="java-1_7_0-ibm-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205418" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205419" comment="java-1_7_0-ibm-devel-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205420" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205421" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.25-65.25 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205417" comment="java-1_7_0-ibm-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205418" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205420" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205421" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.25-65.25 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2795</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-2795" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2795" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-2795.html">CVE-2018-2795</cve>
<bugzilla href="https://bugzilla.suse.com/1090025">SUSE bug 1090025</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205417" comment="java-1_7_0-ibm-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205418" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205419" comment="java-1_7_0-ibm-devel-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205420" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205421" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.25-65.25 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205417" comment="java-1_7_0-ibm-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205418" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205420" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205421" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.25-65.25 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2796</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-2796" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2796" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-2796.html">CVE-2018-2796</cve>
<bugzilla href="https://bugzilla.suse.com/1090026">SUSE bug 1090026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205417" comment="java-1_7_0-ibm-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205418" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205419" comment="java-1_7_0-ibm-devel-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205420" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205421" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.25-65.25 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205417" comment="java-1_7_0-ibm-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205418" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205420" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205421" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.25-65.25 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2797</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-2797" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2797" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JMX). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-2797.html">CVE-2018-2797</cve>
<bugzilla href="https://bugzilla.suse.com/1090027">SUSE bug 1090027</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205417" comment="java-1_7_0-ibm-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205418" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205419" comment="java-1_7_0-ibm-devel-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205420" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205421" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.25-65.25 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205417" comment="java-1_7_0-ibm-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205418" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205420" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205421" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.25-65.25 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2798</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-2798" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2798" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-2798.html">CVE-2018-2798</cve>
<bugzilla href="https://bugzilla.suse.com/1090028">SUSE bug 1090028</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205417" comment="java-1_7_0-ibm-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205418" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205419" comment="java-1_7_0-ibm-devel-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205420" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205421" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.25-65.25 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205417" comment="java-1_7_0-ibm-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205418" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205420" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205421" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.25-65.25 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2799</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-2799" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2799" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-2799.html">CVE-2018-2799</cve>
<bugzilla href="https://bugzilla.suse.com/1090029">SUSE bug 1090029</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205417" comment="java-1_7_0-ibm-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205418" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205419" comment="java-1_7_0-ibm-devel-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205420" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205421" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.25-65.25 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205417" comment="java-1_7_0-ibm-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205418" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205420" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205421" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.25-65.25 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-2800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2800" source="CVE"/>
    <description>
    Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u181, 7u171 and 8u162; JRockit: R28.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, JRockit accessible data as well as unauthorized read access to a subset of Java SE, JRockit accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-2800.html">CVE-2018-2800</cve>
<bugzilla href="https://bugzilla.suse.com/1090030">SUSE bug 1090030</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205417" comment="java-1_7_0-ibm-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205418" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205419" comment="java-1_7_0-ibm-devel-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205420" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205421" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.25-65.25 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205417" comment="java-1_7_0-ibm-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205418" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205420" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205421" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.25-65.25 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2813</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-2813" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-2813.html">CVE-2018-2813</cve>
<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1090518">SUSE bug 1090518</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210080" comment="libmysql55client18-5.5.60-0.39.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210081" comment="libmysql55client18-32bit-5.5.60-0.39.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210083" comment="libmysql55client_r18-5.5.60-0.39.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203189" comment="mysql-5.5.60-0.39.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210084" comment="mysql-client-5.5.60-0.39.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210085" comment="mysql-tools-5.5.60-0.39.12 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-2814" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2814" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-2814.html">CVE-2018-2814</cve>
<bugzilla href="https://bugzilla.suse.com/1090032">SUSE bug 1090032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205417" comment="java-1_7_0-ibm-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205418" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205419" comment="java-1_7_0-ibm-devel-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205420" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205421" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.25-65.25 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205417" comment="java-1_7_0-ibm-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205418" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205420" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.25-65.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205421" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.25-65.25 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2817</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-2817" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-2817.html">CVE-2018-2817</cve>
<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1090518">SUSE bug 1090518</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210080" comment="libmysql55client18-5.5.60-0.39.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210081" comment="libmysql55client18-32bit-5.5.60-0.39.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210083" comment="libmysql55client_r18-5.5.60-0.39.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203189" comment="mysql-5.5.60-0.39.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210084" comment="mysql-client-5.5.60-0.39.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210085" comment="mysql-tools-5.5.60-0.39.12 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2818</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-2818" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2818" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Security : Privileges). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-2818.html">CVE-2018-2818</cve>
<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210080" comment="libmysql55client18-5.5.60-0.39.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210081" comment="libmysql55client18-32bit-5.5.60-0.39.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210083" comment="libmysql55client_r18-5.5.60-0.39.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203189" comment="mysql-5.5.60-0.39.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210084" comment="mysql-client-5.5.60-0.39.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210085" comment="mysql-tools-5.5.60-0.39.12 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2819</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-2819" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-2819.html">CVE-2018-2819</cve>
<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1090518">SUSE bug 1090518</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009210080" comment="libmysql55client18-5.5.60-0.39.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210081" comment="libmysql55client18-32bit-5.5.60-0.39.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210083" comment="libmysql55client_r18-5.5.60-0.39.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203189" comment="mysql-5.5.60-0.39.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210084" comment="mysql-client-5.5.60-0.39.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210085" comment="mysql-tools-5.5.60-0.39.12 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2940</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-2940" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2940" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-2940.html">CVE-2018-2940</cve>
<bugzilla href="https://bugzilla.suse.com/1101645">SUSE bug 1101645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1101656">SUSE bug 1101656</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009233814" comment="java-1_7_0-ibm-1.7.0_sr10.30-65.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233815" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.30-65.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233816" comment="java-1_7_0-ibm-devel-1.7.0_sr10.30-65.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233817" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.30-65.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233818" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.30-65.28 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009233814" comment="java-1_7_0-ibm-1.7.0_sr10.30-65.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233815" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.30-65.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233817" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.30-65.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233818" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.30-65.28 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2952</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-2952" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2952" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
<cve href="https://www.suse.com/security/cve/CVE-2018-2952.html">CVE-2018-2952</cve>
<bugzilla href="https://bugzilla.suse.com/1101645">SUSE bug 1101645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1101651">SUSE bug 1101651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1101656">SUSE bug 1101656</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009233814" comment="java-1_7_0-ibm-1.7.0_sr10.30-65.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233815" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.30-65.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233816" comment="java-1_7_0-ibm-devel-1.7.0_sr10.30-65.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233817" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.30-65.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233818" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.30-65.28 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009233814" comment="java-1_7_0-ibm-1.7.0_sr10.30-65.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233815" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.30-65.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233817" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.30-65.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233818" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.30-65.28 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2973</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-2973" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2973" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-2973.html">CVE-2018-2973</cve>
<bugzilla href="https://bugzilla.suse.com/1101645">SUSE bug 1101645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1101656">SUSE bug 1101656</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009233814" comment="java-1_7_0-ibm-1.7.0_sr10.30-65.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233815" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.30-65.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233816" comment="java-1_7_0-ibm-devel-1.7.0_sr10.30-65.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233817" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.30-65.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233818" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.30-65.28 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009233814" comment="java-1_7_0-ibm-1.7.0_sr10.30-65.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233815" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.30-65.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233817" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.30-65.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233818" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.30-65.28 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3058</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-3058" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: MyISAM). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior and 5.7.22 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-3058.html">CVE-2018-3058</cve>
<bugzilla href="https://bugzilla.suse.com/1101676">SUSE bug 1101676</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009232740" comment="libmysql55client18-5.5.61-0.39.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232741" comment="libmysql55client18-32bit-5.5.61-0.39.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232743" comment="libmysql55client_r18-5.5.61-0.39.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232716" comment="mysql-5.5.61-0.39.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232744" comment="mysql-client-5.5.61-0.39.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232745" comment="mysql-tools-5.5.61-0.39.15 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3063</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-3063" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.5.60 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-3063.html">CVE-2018-3063</cve>
<bugzilla href="https://bugzilla.suse.com/1101677">SUSE bug 1101677</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009232740" comment="libmysql55client18-5.5.61-0.39.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232741" comment="libmysql55client18-32bit-5.5.61-0.39.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232743" comment="libmysql55client_r18-5.5.61-0.39.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232716" comment="mysql-5.5.61-0.39.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232744" comment="mysql-client-5.5.61-0.39.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232745" comment="mysql-tools-5.5.61-0.39.15 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3066</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-3066" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Options). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior and 5.7.22 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 3.3 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N).
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-3066.html">CVE-2018-3066</cve>
<bugzilla href="https://bugzilla.suse.com/1101678">SUSE bug 1101678</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009232740" comment="libmysql55client18-5.5.61-0.39.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232741" comment="libmysql55client18-32bit-5.5.61-0.39.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232743" comment="libmysql55client_r18-5.5.61-0.39.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232716" comment="mysql-5.5.61-0.39.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232744" comment="mysql-client-5.5.61-0.39.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232745" comment="mysql-tools-5.5.61-0.39.15 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3070</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-3070" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3070" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client mysqldump). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior and 5.7.22 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-3070.html">CVE-2018-3070</cve>
<bugzilla href="https://bugzilla.suse.com/1101679">SUSE bug 1101679</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009232740" comment="libmysql55client18-5.5.61-0.39.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232741" comment="libmysql55client18-32bit-5.5.61-0.39.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232743" comment="libmysql55client_r18-5.5.61-0.39.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232716" comment="mysql-5.5.61-0.39.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232744" comment="mysql-client-5.5.61-0.39.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232745" comment="mysql-tools-5.5.61-0.39.15 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3081</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-3081" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081" source="CVE"/>
    <description>
    Vulnerability in the MySQL Client component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior, 5.7.22 and prior and 8.0.11 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client as well as unauthorized update, insert or delete access to some of MySQL Client accessible data. CVSS 3.0 Base Score 5.0 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-3081.html">CVE-2018-3081</cve>
<bugzilla href="https://bugzilla.suse.com/1101680">SUSE bug 1101680</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009232740" comment="libmysql55client18-5.5.61-0.39.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232741" comment="libmysql55client18-32bit-5.5.61-0.39.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232743" comment="libmysql55client_r18-5.5.61-0.39.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232716" comment="mysql-5.5.61-0.39.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232744" comment="mysql-client-5.5.61-0.39.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232745" comment="mysql-tools-5.5.61-0.39.15 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3133</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-3133" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3133" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Parser). Supported versions that are affected are 5.5.61 and prior, 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-3133.html">CVE-2018-3133</cve>
<bugzilla href="https://bugzilla.suse.com/1112369">SUSE bug 1112369</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009238392" comment="libmysql55client18-5.5.62-0.39.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238399" comment="libmysql55client18-32bit-5.5.62-0.39.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238393" comment="libmysql55client_r18-5.5.62-0.39.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238391" comment="mysql-5.5.62-0.39.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238394" comment="mysql-client-5.5.62-0.39.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238395" comment="mysql-tools-5.5.62-0.39.18 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3136</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-3136" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3136" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 3.4 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-3136.html">CVE-2018-3136</cve>
<bugzilla href="https://bugzilla.suse.com/1112142">SUSE bug 1112142</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1112143">SUSE bug 1112143</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1112144">SUSE bug 1112144</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1112146">SUSE bug 1112146</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1112148">SUSE bug 1112148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1112152">SUSE bug 1112152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1116574">SUSE bug 1116574</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009240826" comment="java-1_7_0-ibm-1.7.0_sr10.35-65.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240827" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.35-65.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240828" comment="java-1_7_0-ibm-devel-1.7.0_sr10.35-65.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240829" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.35-65.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240830" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.35-65.31 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009240826" comment="java-1_7_0-ibm-1.7.0_sr10.35-65.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240827" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.35-65.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240829" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.35-65.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240830" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.35-65.31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-3139" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3139" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-3139.html">CVE-2018-3139</cve>
<bugzilla href="https://bugzilla.suse.com/1112142">SUSE bug 1112142</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1112143">SUSE bug 1112143</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1112144">SUSE bug 1112144</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1112146">SUSE bug 1112146</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1112148">SUSE bug 1112148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1112152">SUSE bug 1112152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1116574">SUSE bug 1116574</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009240826" comment="java-1_7_0-ibm-1.7.0_sr10.35-65.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240827" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.35-65.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240828" comment="java-1_7_0-ibm-devel-1.7.0_sr10.35-65.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240829" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.35-65.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240830" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.35-65.31 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009240826" comment="java-1_7_0-ibm-1.7.0_sr10.35-65.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240827" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.35-65.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240829" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.35-65.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240830" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.35-65.31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3149</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-3149" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3149" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-3149.html">CVE-2018-3149</cve>
<bugzilla href="https://bugzilla.suse.com/1112142">SUSE bug 1112142</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1112143">SUSE bug 1112143</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1112144">SUSE bug 1112144</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1112146">SUSE bug 1112146</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1112148">SUSE bug 1112148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1112152">SUSE bug 1112152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1116574">SUSE bug 1116574</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009240826" comment="java-1_7_0-ibm-1.7.0_sr10.35-65.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240827" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.35-65.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240828" comment="java-1_7_0-ibm-devel-1.7.0_sr10.35-65.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240829" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.35-65.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240830" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.35-65.31 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009240826" comment="java-1_7_0-ibm-1.7.0_sr10.35-65.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240827" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.35-65.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240829" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.35-65.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240830" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.35-65.31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3169</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-3169" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3169" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-3169.html">CVE-2018-3169</cve>
<bugzilla href="https://bugzilla.suse.com/1112142">SUSE bug 1112142</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1112143">SUSE bug 1112143</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1112144">SUSE bug 1112144</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1112146">SUSE bug 1112146</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1112148">SUSE bug 1112148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1112152">SUSE bug 1112152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1116574">SUSE bug 1116574</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009240826" comment="java-1_7_0-ibm-1.7.0_sr10.35-65.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240827" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.35-65.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240828" comment="java-1_7_0-ibm-devel-1.7.0_sr10.35-65.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240829" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.35-65.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240830" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.35-65.31 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009240826" comment="java-1_7_0-ibm-1.7.0_sr10.35-65.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240827" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.35-65.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240829" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.35-65.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240830" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.35-65.31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3174</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-3174" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.61 and prior, 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. While the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-3174.html">CVE-2018-3174</cve>
<bugzilla href="https://bugzilla.suse.com/1112368">SUSE bug 1112368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009238392" comment="libmysql55client18-5.5.62-0.39.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238399" comment="libmysql55client18-32bit-5.5.62-0.39.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238393" comment="libmysql55client_r18-5.5.62-0.39.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238391" comment="mysql-5.5.62-0.39.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238394" comment="mysql-client-5.5.62-0.39.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238395" comment="mysql-tools-5.5.62-0.39.18 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3180</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-3180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3180" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-3180.html">CVE-2018-3180</cve>
<bugzilla href="https://bugzilla.suse.com/1112142">SUSE bug 1112142</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1112143">SUSE bug 1112143</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1112144">SUSE bug 1112144</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1112146">SUSE bug 1112146</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1112147">SUSE bug 1112147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1112148">SUSE bug 1112148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1112152">SUSE bug 1112152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1116574">SUSE bug 1116574</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009240826" comment="java-1_7_0-ibm-1.7.0_sr10.35-65.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240827" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.35-65.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240828" comment="java-1_7_0-ibm-devel-1.7.0_sr10.35-65.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240829" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.35-65.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240830" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.35-65.31 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009240826" comment="java-1_7_0-ibm-1.7.0_sr10.35-65.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240827" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.35-65.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240829" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.35-65.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240830" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.35-65.31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3214</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-3214" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3214" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Sound). Supported versions that are affected are Java SE: 6u201, 7u191 and 8u182; Java SE Embedded: 8u181; JRockit: R28.3.19. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-3214.html">CVE-2018-3214</cve>
<bugzilla href="https://bugzilla.suse.com/1112142">SUSE bug 1112142</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1112143">SUSE bug 1112143</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1112144">SUSE bug 1112144</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1112146">SUSE bug 1112146</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1112148">SUSE bug 1112148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1112152">SUSE bug 1112152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1116574">SUSE bug 1116574</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009240826" comment="java-1_7_0-ibm-1.7.0_sr10.35-65.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240827" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.35-65.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240828" comment="java-1_7_0-ibm-devel-1.7.0_sr10.35-65.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240829" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.35-65.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240830" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.35-65.31 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009240826" comment="java-1_7_0-ibm-1.7.0_sr10.35-65.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240827" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.35-65.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240829" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.35-65.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240830" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.35-65.31 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3282</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-3282" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Storage Engines). Supported versions that are affected are 5.5.61 and prior, 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-3282.html">CVE-2018-3282</cve>
<bugzilla href="https://bugzilla.suse.com/1112432">SUSE bug 1112432</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009238392" comment="libmysql55client18-5.5.62-0.39.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238399" comment="libmysql55client18-32bit-5.5.62-0.39.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238393" comment="libmysql55client_r18-5.5.62-0.39.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238391" comment="mysql-5.5.62-0.39.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238394" comment="mysql-client-5.5.62-0.39.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009238395" comment="mysql-tools-5.5.62-0.39.18 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3620</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-3620" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620" source="CVE"/>
    <description>
    Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-3620.html">CVE-2018-3620</cve>
<bugzilla href="https://bugzilla.suse.com/1087078">SUSE bug 1087078</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1087081">SUSE bug 1087081</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1089343">SUSE bug 1089343</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1090340">SUSE bug 1090340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1091107">SUSE bug 1091107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1099306">SUSE bug 1099306</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1104894">SUSE bug 1104894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1106631">SUSE bug 1106631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1111368">SUSE bug 1111368</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009232611" comment="kernel-bigsmp-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232612" comment="kernel-bigsmp-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232613" comment="kernel-bigsmp-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232594" comment="kernel-default-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232595" comment="kernel-default-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232596" comment="kernel-default-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232614" comment="kernel-default-man-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232597" comment="kernel-ec2-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232598" comment="kernel-ec2-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232599" comment="kernel-ec2-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232600" comment="kernel-pae-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232601" comment="kernel-pae-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232602" comment="kernel-pae-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232603" comment="kernel-source-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232604" comment="kernel-syms-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232605" comment="kernel-trace-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232606" comment="kernel-trace-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232607" comment="kernel-trace-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232608" comment="kernel-xen-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232609" comment="kernel-xen-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232610" comment="kernel-xen-devel-3.0.101-0.47.106.43 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3639</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-3639" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639" source="CVE"/>
    <description>
    Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-3639.html">CVE-2018-3639</cve>
<bugzilla href="https://bugzilla.suse.com/0">SUSE bug 0</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1074701">SUSE bug 1074701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1085235">SUSE bug 1085235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1085308">SUSE bug 1085308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1087078">SUSE bug 1087078</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1094912">SUSE bug 1094912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1100394">SUSE bug 1100394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1102640">SUSE bug 1102640</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1105412">SUSE bug 1105412</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208669" comment="kernel-bigsmp-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208670" comment="kernel-bigsmp-base-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208671" comment="kernel-bigsmp-devel-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205558" comment="kernel-default-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205559" comment="kernel-default-base-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205560" comment="kernel-default-devel-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208672" comment="kernel-default-man-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205561" comment="kernel-ec2-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205562" comment="kernel-ec2-base-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205563" comment="kernel-ec2-devel-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205564" comment="kernel-pae-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205565" comment="kernel-pae-base-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205566" comment="kernel-pae-devel-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205567" comment="kernel-source-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205568" comment="kernel-syms-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205569" comment="kernel-trace-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205570" comment="kernel-trace-base-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205571" comment="kernel-trace-devel-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205572" comment="kernel-xen-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205573" comment="kernel-xen-base-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205574" comment="kernel-xen-devel-3.0.101-0.47.106.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233933" comment="kvm-1.4.2-53.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205637" comment="libvirt-1.0.5.9-21.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205638" comment="libvirt-client-1.0.5.9-21.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208761" comment="libvirt-client-32bit-1.0.5.9-21.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205639" comment="libvirt-doc-1.0.5.9-21.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205640" comment="libvirt-lock-sanlock-1.0.5.9-21.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205641" comment="libvirt-python-1.0.5.9-21.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232393" comment="microcode_ctl-1.17-102.83.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233376" comment="xen-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233381" comment="xen-doc-html-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233382" comment="xen-doc-pdf-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233377" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233378" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233379" comment="xen-libs-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233383" comment="xen-libs-32bit-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233384" comment="xen-tools-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233380" comment="xen-tools-domU-4.2.5_21-45.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3640</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-3640" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3640" source="CVE"/>
    <description>
    Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis, aka Rogue System Register Read (RSRE), Variant 3a.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-3640.html">CVE-2018-3640</cve>
<bugzilla href="https://bugzilla.suse.com/0">SUSE bug 0</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1074701">SUSE bug 1074701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1087078">SUSE bug 1087078</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1087083">SUSE bug 1087083</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1094912">SUSE bug 1094912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1100394">SUSE bug 1100394</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232393" comment="microcode_ctl-1.17-102.83.27 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3646</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-3646" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646" source="CVE"/>
    <description>
    Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-3646.html">CVE-2018-3646</cve>
<bugzilla href="https://bugzilla.suse.com/1087078">SUSE bug 1087078</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1087081">SUSE bug 1087081</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1089343">SUSE bug 1089343</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1091107">SUSE bug 1091107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1099306">SUSE bug 1099306</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1104365">SUSE bug 1104365</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1104894">SUSE bug 1104894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1106548">SUSE bug 1106548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1113534">SUSE bug 1113534</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009232611" comment="kernel-bigsmp-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232612" comment="kernel-bigsmp-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232613" comment="kernel-bigsmp-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232594" comment="kernel-default-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232595" comment="kernel-default-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232596" comment="kernel-default-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232614" comment="kernel-default-man-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232597" comment="kernel-ec2-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232598" comment="kernel-ec2-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232599" comment="kernel-ec2-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232600" comment="kernel-pae-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232601" comment="kernel-pae-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232602" comment="kernel-pae-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232603" comment="kernel-source-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232604" comment="kernel-syms-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232605" comment="kernel-trace-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232606" comment="kernel-trace-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232607" comment="kernel-trace-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232608" comment="kernel-xen-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232609" comment="kernel-xen-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232610" comment="kernel-xen-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232393" comment="microcode_ctl-1.17-102.83.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233376" comment="xen-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233381" comment="xen-doc-html-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233382" comment="xen-doc-pdf-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233377" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233378" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233379" comment="xen-libs-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233383" comment="xen-libs-32bit-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233384" comment="xen-tools-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233380" comment="xen-tools-domU-4.2.5_21-45.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3665</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-3665" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3665" source="CVE"/>
    <description>
    System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-3665.html">CVE-2018-3665</cve>
<bugzilla href="https://bugzilla.suse.com/1087078">SUSE bug 1087078</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1087086">SUSE bug 1087086</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1090338">SUSE bug 1090338</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1095241">SUSE bug 1095241</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1095242">SUSE bug 1095242</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1096740">SUSE bug 1096740</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1100091">SUSE bug 1100091</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1100555">SUSE bug 1100555</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009229617" comment="kernel-bigsmp-3.0.101-0.47.106.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229618" comment="kernel-bigsmp-base-3.0.101-0.47.106.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229619" comment="kernel-bigsmp-devel-3.0.101-0.47.106.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229592" comment="kernel-default-3.0.101-0.47.106.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229593" comment="kernel-default-base-3.0.101-0.47.106.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229594" comment="kernel-default-devel-3.0.101-0.47.106.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229620" comment="kernel-default-man-3.0.101-0.47.106.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229595" comment="kernel-ec2-3.0.101-0.47.106.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229596" comment="kernel-ec2-base-3.0.101-0.47.106.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229597" comment="kernel-ec2-devel-3.0.101-0.47.106.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229598" comment="kernel-pae-3.0.101-0.47.106.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229599" comment="kernel-pae-base-3.0.101-0.47.106.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229600" comment="kernel-pae-devel-3.0.101-0.47.106.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229601" comment="kernel-source-3.0.101-0.47.106.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229602" comment="kernel-syms-3.0.101-0.47.106.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229603" comment="kernel-trace-3.0.101-0.47.106.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229604" comment="kernel-trace-base-3.0.101-0.47.106.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229605" comment="kernel-trace-devel-3.0.101-0.47.106.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229606" comment="kernel-xen-3.0.101-0.47.106.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229607" comment="kernel-xen-base-3.0.101-0.47.106.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229608" comment="kernel-xen-devel-3.0.101-0.47.106.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233376" comment="xen-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233381" comment="xen-doc-html-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233382" comment="xen-doc-pdf-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233377" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233378" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233379" comment="xen-libs-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233383" comment="xen-libs-32bit-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233384" comment="xen-tools-4.2.5_21-45.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009233380" comment="xen-tools-domU-4.2.5_21-45.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4180</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-4180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180" source="CVE"/>
    <description>
    In macOS High Sierra before 10.13.5, an issue existed in CUPS. This issue was addressed with improved access restrictions.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-4180.html">CVE-2018-4180</cve>
<bugzilla href="https://bugzilla.suse.com/1096405">SUSE bug 1096405</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1096408">SUSE bug 1096408</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009231485" comment="cups-1.3.9-8.46.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009231495" comment="cups-client-1.3.9-8.46.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009231496" comment="cups-libs-1.3.9-8.46.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009231497" comment="cups-libs-32bit-1.3.9-8.46.56.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4181</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-4181" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181" source="CVE"/>
    <description>
    In macOS High Sierra before 10.13.5, an issue existed in CUPS. This issue was addressed with improved access restrictions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-4181.html">CVE-2018-4181</cve>
<bugzilla href="https://bugzilla.suse.com/1096406">SUSE bug 1096406</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1096408">SUSE bug 1096408</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009231485" comment="cups-1.3.9-8.46.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009231495" comment="cups-client-1.3.9-8.46.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009231496" comment="cups-libs-1.3.9-8.46.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009231497" comment="cups-libs-32bit-1.3.9-8.46.56.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-4182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4182" source="CVE"/>
    <description>
    In macOS High Sierra before 10.13.5, an access issue was addressed with additional sandbox restrictions on CUPS.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-4182.html">CVE-2018-4182</cve>
<bugzilla href="https://bugzilla.suse.com/1096407">SUSE bug 1096407</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1096408">SUSE bug 1096408</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009231485" comment="cups-1.3.9-8.46.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009231495" comment="cups-client-1.3.9-8.46.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009231496" comment="cups-libs-1.3.9-8.46.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009231497" comment="cups-libs-32bit-1.3.9-8.46.56.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4183</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-4183" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4183" source="CVE"/>
    <description>
    In macOS High Sierra before 10.13.5, an access issue was addressed with additional sandbox restrictions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-4183.html">CVE-2018-4183</cve>
<bugzilla href="https://bugzilla.suse.com/1096407">SUSE bug 1096407</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1096408">SUSE bug 1096408</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009231485" comment="cups-1.3.9-8.46.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009231495" comment="cups-client-1.3.9-8.46.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009231496" comment="cups-libs-1.3.9-8.46.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009231497" comment="cups-libs-32bit-1.3.9-8.46.56.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5089</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5089" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5089" source="CVE"/>
    <description>
    Memory safety bugs were reported in Firefox 57 and Firefox ESR 52.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 52.6, Firefox ESR &lt; 52.6, and Firefox &lt; 58.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5089.html">CVE-2018-5089</cve>
<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202369" comment="MozillaFirefox-52.6.0esr-72.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205261" comment="MozillaFirefox-translations-52.6.0esr-72.20 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5091</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5091" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5091" source="CVE"/>
    <description>
    A use-after-free vulnerability can occur during WebRTC connections when interacting with the DTMF timers. This results in a potentially exploitable crash. This vulnerability affects Firefox ESR &lt; 52.6 and Firefox &lt; 58.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5091.html">CVE-2018-5091</cve>
<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202369" comment="MozillaFirefox-52.6.0esr-72.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205261" comment="MozillaFirefox-translations-52.6.0esr-72.20 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5095</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5095" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5095" source="CVE"/>
    <description>
    An integer overflow vulnerability in the Skia library when allocating memory for edge builders on some systems with at least 8 GB of RAM. This results in the use of uninitialized memory, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.6, Firefox ESR &lt; 52.6, and Firefox &lt; 58.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5095.html">CVE-2018-5095</cve>
<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202369" comment="MozillaFirefox-52.6.0esr-72.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205261" comment="MozillaFirefox-translations-52.6.0esr-72.20 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5096</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5096" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5096" source="CVE"/>
    <description>
    A use-after-free vulnerability can occur while editing events in form elements on a page, resulting in a potentially exploitable crash. This vulnerability affects Firefox ESR &lt; 52.6 and Thunderbird &lt; 52.6.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5096.html">CVE-2018-5096</cve>
<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202369" comment="MozillaFirefox-52.6.0esr-72.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205261" comment="MozillaFirefox-translations-52.6.0esr-72.20 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5097</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5097" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5097" source="CVE"/>
    <description>
    A use-after-free vulnerability can occur during XSL transformations when the source document for the transformation is manipulated by script content during the transformation. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.6, Firefox ESR &lt; 52.6, and Firefox &lt; 58.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5097.html">CVE-2018-5097</cve>
<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202369" comment="MozillaFirefox-52.6.0esr-72.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205261" comment="MozillaFirefox-translations-52.6.0esr-72.20 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5098</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5098" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5098" source="CVE"/>
    <description>
    A use-after-free vulnerability can occur when form input elements, focus, and selections are manipulated by script content. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.6, Firefox ESR &lt; 52.6, and Firefox &lt; 58.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5098.html">CVE-2018-5098</cve>
<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202369" comment="MozillaFirefox-52.6.0esr-72.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205261" comment="MozillaFirefox-translations-52.6.0esr-72.20 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5099</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5099" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5099" source="CVE"/>
    <description>
    A use-after-free vulnerability can occur when the widget listener is holding strong references to browser objects that have previously been freed, resulting in a potentially exploitable crash when these references are used. This vulnerability affects Thunderbird &lt; 52.6, Firefox ESR &lt; 52.6, and Firefox &lt; 58.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5099.html">CVE-2018-5099</cve>
<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202369" comment="MozillaFirefox-52.6.0esr-72.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205261" comment="MozillaFirefox-translations-52.6.0esr-72.20 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5102</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5102" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5102" source="CVE"/>
    <description>
    A use-after-free vulnerability can occur when manipulating HTML media elements with media streams, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.6, Firefox ESR &lt; 52.6, and Firefox &lt; 58.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5102.html">CVE-2018-5102</cve>
<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202369" comment="MozillaFirefox-52.6.0esr-72.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205261" comment="MozillaFirefox-translations-52.6.0esr-72.20 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5103</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5103" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5103" source="CVE"/>
    <description>
    A use-after-free vulnerability can occur during mouse event handling due to issues with multiprocess support. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.6, Firefox ESR &lt; 52.6, and Firefox &lt; 58.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5103.html">CVE-2018-5103</cve>
<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202369" comment="MozillaFirefox-52.6.0esr-72.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205261" comment="MozillaFirefox-translations-52.6.0esr-72.20 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5104</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5104" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5104" source="CVE"/>
    <description>
    A use-after-free vulnerability can occur during font face manipulation when a font face is freed while still in use, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.6, Firefox ESR &lt; 52.6, and Firefox &lt; 58.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5104.html">CVE-2018-5104</cve>
<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202369" comment="MozillaFirefox-52.6.0esr-72.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205261" comment="MozillaFirefox-translations-52.6.0esr-72.20 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5117</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5117" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5117" source="CVE"/>
    <description>
    If right-to-left text is used in the addressbar with left-to-right alignment, it is possible in some circumstances to scroll this text to spoof the displayed URL. This issue could result in the wrong URL being displayed as a location, which can mislead users to believe they are on a different site than the one loaded. This vulnerability affects Thunderbird &lt; 52.6, Firefox ESR &lt; 52.6, and Firefox &lt; 58.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5117.html">CVE-2018-5117</cve>
<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202369" comment="MozillaFirefox-52.6.0esr-72.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205261" comment="MozillaFirefox-translations-52.6.0esr-72.20 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5125</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5125" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5125" source="CVE"/>
    <description>
    Memory safety bugs were reported in Firefox 58 and Firefox ESR 52.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 52.7, Firefox ESR &lt; 52.7, and Firefox &lt; 59.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5125.html">CVE-2018-5125</cve>
<bugzilla href="https://bugzilla.suse.com/1085130">SUSE bug 1085130</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202371" comment="MozillaFirefox-52.7.3esr-72.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205262" comment="MozillaFirefox-translations-52.7.3esr-72.27 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5127</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5127" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5127" source="CVE"/>
    <description>
    A buffer overflow can occur when manipulating the SVG "animatedPathSegList" through script. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.7, Firefox ESR &lt; 52.7, and Firefox &lt; 59.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5127.html">CVE-2018-5127</cve>
<bugzilla href="https://bugzilla.suse.com/1085130">SUSE bug 1085130</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202371" comment="MozillaFirefox-52.7.3esr-72.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205262" comment="MozillaFirefox-translations-52.7.3esr-72.27 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5129</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5129" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5129" source="CVE"/>
    <description>
    A lack of parameter validation on IPC messages results in a potential out-of-bounds write through malformed IPC messages. This can potentially allow for sandbox escape through memory corruption in the parent process. This vulnerability affects Thunderbird &lt; 52.7, Firefox ESR &lt; 52.7, and Firefox &lt; 59.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5129.html">CVE-2018-5129</cve>
<bugzilla href="https://bugzilla.suse.com/1085130">SUSE bug 1085130</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202371" comment="MozillaFirefox-52.7.3esr-72.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205262" comment="MozillaFirefox-translations-52.7.3esr-72.27 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5130</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5130" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5130" source="CVE"/>
    <description>
    When packets with a mismatched RTP payload type are sent in WebRTC connections, in some circumstances a potentially exploitable crash is triggered. This vulnerability affects Firefox ESR &lt; 52.7 and Firefox &lt; 59.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5130.html">CVE-2018-5130</cve>
<bugzilla href="https://bugzilla.suse.com/1085130">SUSE bug 1085130</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202371" comment="MozillaFirefox-52.7.3esr-72.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205262" comment="MozillaFirefox-translations-52.7.3esr-72.27 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5131</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5131" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5131" source="CVE"/>
    <description>
    Under certain circumstances the "fetch()" API can return transient local copies of resources that were sent with a "no-store" or "no-cache" cache header instead of downloading a copy from the network as it should. This can result in previously stored, locally cached data of a website being accessible to users if they share a common profile while browsing. This vulnerability affects Firefox ESR &lt; 52.7 and Firefox &lt; 59.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5131.html">CVE-2018-5131</cve>
<bugzilla href="https://bugzilla.suse.com/1085130">SUSE bug 1085130</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202371" comment="MozillaFirefox-52.7.3esr-72.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205262" comment="MozillaFirefox-translations-52.7.3esr-72.27 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5144</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5144" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5144" source="CVE"/>
    <description>
    An integer overflow can occur during conversion of text to some Unicode character sets due to an unchecked length parameter. This vulnerability affects Firefox ESR &lt; 52.7 and Thunderbird &lt; 52.7.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5144.html">CVE-2018-5144</cve>
<bugzilla href="https://bugzilla.suse.com/1085130">SUSE bug 1085130</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202371" comment="MozillaFirefox-52.7.3esr-72.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205262" comment="MozillaFirefox-translations-52.7.3esr-72.27 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5145</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5145" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5145" source="CVE"/>
    <description>
    Memory safety bugs were reported in Firefox ESR 52.6. These bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 52.7 and Thunderbird &lt; 52.7.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5145.html">CVE-2018-5145</cve>
<bugzilla href="https://bugzilla.suse.com/1085130">SUSE bug 1085130</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202371" comment="MozillaFirefox-52.7.3esr-72.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205262" comment="MozillaFirefox-translations-52.7.3esr-72.27 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5146" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5146" source="CVE"/>
    <description>
    An out of bounds memory write while processing Vorbis audio data was reported through the Pwn2Own contest. This vulnerability affects Firefox &lt; 59.0.1, Firefox ESR &lt; 52.7.2, and Thunderbird &lt; 52.7.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5146.html">CVE-2018-5146</cve>
<bugzilla href="https://bugzilla.suse.com/1085671">SUSE bug 1085671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1085687">SUSE bug 1085687</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202371" comment="MozillaFirefox-52.7.3esr-72.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205262" comment="MozillaFirefox-translations-52.7.3esr-72.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203083" comment="libvorbis-1.2.0-79.20.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209954" comment="libvorbis-32bit-1.2.0-79.20.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209955" comment="libvorbis-doc-1.2.0-79.20.6 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202371" comment="MozillaFirefox-52.7.3esr-72.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205262" comment="MozillaFirefox-translations-52.7.3esr-72.27 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5147</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5147" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5147" source="CVE"/>
    <description>
    The libtremor library has the same flaw as CVE-2018-5146. This library is used by Firefox in place of libvorbis on Android and ARM platforms. This vulnerability affects Firefox ESR &lt; 52.7.2 and Firefox &lt; 59.0.1.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5147.html">CVE-2018-5147</cve>
<bugzilla href="https://bugzilla.suse.com/1085671">SUSE bug 1085671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1085687">SUSE bug 1085687</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202371" comment="MozillaFirefox-52.7.3esr-72.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205262" comment="MozillaFirefox-translations-52.7.3esr-72.27 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5148</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5148" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5148" source="CVE"/>
    <description>
    A use-after-free vulnerability can occur in the compositor during certain graphics operations when a raw pointer is used instead of a reference counted one. This results in a potentially exploitable crash. This vulnerability affects Firefox ESR &lt; 52.7.3 and Firefox &lt; 59.0.2.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5148.html">CVE-2018-5148</cve>
<bugzilla href="https://bugzilla.suse.com/1087059">SUSE bug 1087059</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202371" comment="MozillaFirefox-52.7.3esr-72.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205262" comment="MozillaFirefox-translations-52.7.3esr-72.27 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5150</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5150" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5150" source="CVE"/>
    <description>
    Memory safety bugs were reported in Firefox 59, Firefox ESR 52.7, and Thunderbird 52.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 52.8, Thunderbird ESR &lt; 52.8, Firefox &lt; 60, and Firefox ESR &lt; 52.8.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5150.html">CVE-2018-5150</cve>
<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202373" comment="MozillaFirefox-52.8.0esr-72.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205263" comment="MozillaFirefox-translations-52.8.0esr-72.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5154</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5154" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5154" source="CVE"/>
    <description>
    A use-after-free vulnerability can occur while enumerating attributes during SVG animations with clip paths. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.8, Thunderbird ESR &lt; 52.8, Firefox &lt; 60, and Firefox ESR &lt; 52.8.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5154.html">CVE-2018-5154</cve>
<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202373" comment="MozillaFirefox-52.8.0esr-72.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205263" comment="MozillaFirefox-translations-52.8.0esr-72.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5155" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5155" source="CVE"/>
    <description>
    A use-after-free vulnerability can occur while adjusting layout during SVG animations with text paths. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.8, Thunderbird ESR &lt; 52.8, Firefox &lt; 60, and Firefox ESR &lt; 52.8.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5155.html">CVE-2018-5155</cve>
<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202373" comment="MozillaFirefox-52.8.0esr-72.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205263" comment="MozillaFirefox-translations-52.8.0esr-72.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5156</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5156" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5156" source="CVE"/>
    <description>
    A vulnerability can occur when capturing a media stream when the media source type is changed as the capture is occurring. This can result in stream data being cast to the wrong type causing a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5156.html">CVE-2018-5156</cve>
<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009232158" comment="MozillaFirefox-52.9.0esr-72.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232173" comment="MozillaFirefox-translations-52.9.0esr-72.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5157</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5157" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5157" source="CVE"/>
    <description>
    Same-origin protections for the PDF viewer can be bypassed, allowing a malicious site to intercept messages meant for the viewer. This could allow the site to retrieve PDF files restricted to viewing by an authenticated user on a third-party website. This vulnerability affects Firefox ESR &lt; 52.8 and Firefox &lt; 60.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5157.html">CVE-2018-5157</cve>
<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202373" comment="MozillaFirefox-52.8.0esr-72.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205263" comment="MozillaFirefox-translations-52.8.0esr-72.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5158</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5158" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5158" source="CVE"/>
    <description>
    The PDF viewer does not sufficiently sanitize PostScript calculator functions, allowing malicious JavaScript to be injected through a crafted PDF file. This JavaScript can then be run with the permissions of the PDF viewer by its worker. This vulnerability affects Firefox ESR &lt; 52.8 and Firefox &lt; 60.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5158.html">CVE-2018-5158</cve>
<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202373" comment="MozillaFirefox-52.8.0esr-72.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205263" comment="MozillaFirefox-translations-52.8.0esr-72.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5159</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5159" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5159" source="CVE"/>
    <description>
    An integer overflow can occur in the Skia library due to 32-bit integer use in an array without integer overflow checks, resulting in possible out-of-bounds writes. This could lead to a potentially exploitable crash triggerable by web content. This vulnerability affects Thunderbird &lt; 52.8, Thunderbird ESR &lt; 52.8, Firefox &lt; 60, and Firefox ESR &lt; 52.8.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5159.html">CVE-2018-5159</cve>
<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202373" comment="MozillaFirefox-52.8.0esr-72.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205263" comment="MozillaFirefox-translations-52.8.0esr-72.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5168</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5168" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5168" source="CVE"/>
    <description>
    Sites can bypass security checks on permissions to install lightweight themes by manipulating the "baseURI" property of the theme element. This could allow a malicious site to install a theme without user interaction which could contain offensive or embarrassing images. This vulnerability affects Thunderbird &lt; 52.8, Thunderbird ESR &lt; 52.8, Firefox &lt; 60, and Firefox ESR &lt; 52.8.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5168.html">CVE-2018-5168</cve>
<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202373" comment="MozillaFirefox-52.8.0esr-72.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205263" comment="MozillaFirefox-translations-52.8.0esr-72.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5174</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5174" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5174" source="CVE"/>
    <description>
    In the Windows 10 April 2018 Update, Windows Defender SmartScreen honors the "SEE_MASK_FLAG_NO_UI" flag associated with downloaded files and will not show any UI. Files that are unknown and potentially dangerous will be allowed to run because SmartScreen will not prompt the user for a decision, and if the user is offline all files will be allowed to be opened because Windows won't prompt the user to ask what to do. Firefox incorrectly sets this flag when downloading files, leading to less secure behavior from SmartScreen. Note: this issue only affects Windows 10 users running the April 2018 update or later. It does not affect other Windows users or other operating systems. This vulnerability affects Thunderbird &lt; 52.8, Thunderbird ESR &lt; 52.8, Firefox &lt; 60, and Firefox ESR &lt; 52.8.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5174.html">CVE-2018-5174</cve>
<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202373" comment="MozillaFirefox-52.8.0esr-72.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205263" comment="MozillaFirefox-translations-52.8.0esr-72.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5178</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5178" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5178" source="CVE"/>
    <description>
    A buffer overflow was found during UTF8 to Unicode string conversion within JavaScript with extremely large amounts of data. This vulnerability requires the use of a malicious or vulnerable legacy extension in order to occur. This vulnerability affects Thunderbird ESR &lt; 52.8, Thunderbird &lt; 52.8, and Firefox ESR &lt; 52.8.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5178.html">CVE-2018-5178</cve>
<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202373" comment="MozillaFirefox-52.8.0esr-72.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205263" comment="MozillaFirefox-translations-52.8.0esr-72.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5183</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5183" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5183" source="CVE"/>
    <description>
    Mozilla developers backported selected changes in the Skia library. These changes correct memory corruption issues including invalid buffer reads and writes during graphic operations. This vulnerability affects Thunderbird ESR &lt; 52.8, Thunderbird &lt; 52.8, and Firefox ESR &lt; 52.8.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5183.html">CVE-2018-5183</cve>
<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202373" comment="MozillaFirefox-52.8.0esr-72.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205263" comment="MozillaFirefox-translations-52.8.0esr-72.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5188</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5188" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5188" source="CVE"/>
    <description>
    Memory safety bugs present in Firefox 60, Firefox ESR 60, and Firefox ESR 52.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5188.html">CVE-2018-5188</cve>
<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009232158" comment="MozillaFirefox-52.9.0esr-72.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232173" comment="MozillaFirefox-translations-52.9.0esr-72.38 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5246</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5246" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5246" source="CVE"/>
    <description>
    In ImageMagick 7.0.7-17 Q16, there are memory leaks in ReadPATTERNImage in coders/pattern.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5246.html">CVE-2018-5246</cve>
<bugzilla href="https://bugzilla.suse.com/1074973">SUSE bug 1074973</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202283" comment="ImageMagick-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209124" comment="libMagickCore1-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209125" comment="libMagickCore1-32bit-6.4.3.6-7.78.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5247</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5247" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5247" source="CVE"/>
    <description>
    In ImageMagick 7.0.7-17 Q16, there are memory leaks in ReadRLAImage in coders/rla.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5247.html">CVE-2018-5247</cve>
<bugzilla href="https://bugzilla.suse.com/1074969">SUSE bug 1074969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1074975">SUSE bug 1074975</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202283" comment="ImageMagick-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209124" comment="libMagickCore1-6.4.3.6-7.78.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209125" comment="libMagickCore1-32bit-6.4.3.6-7.78.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5332</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5332" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332" source="CVE"/>
    <description>
    In the Linux kernel through 4.14.13, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5332.html">CVE-2018-5332</cve>
<bugzilla href="https://bugzilla.suse.com/1075621">SUSE bug 1075621</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208665" comment="kernel-bigsmp-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208666" comment="kernel-bigsmp-base-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208667" comment="kernel-bigsmp-devel-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205541" comment="kernel-default-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205542" comment="kernel-default-base-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205543" comment="kernel-default-devel-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208668" comment="kernel-default-man-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205544" comment="kernel-ec2-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205545" comment="kernel-ec2-base-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205546" comment="kernel-ec2-devel-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205547" comment="kernel-pae-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205548" comment="kernel-pae-base-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205549" comment="kernel-pae-devel-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205550" comment="kernel-source-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205551" comment="kernel-syms-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205552" comment="kernel-trace-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205553" comment="kernel-trace-base-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205554" comment="kernel-trace-devel-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205555" comment="kernel-xen-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205556" comment="kernel-xen-base-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205557" comment="kernel-xen-devel-3.0.101-0.47.106.19 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185333" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5333</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5333" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333" source="CVE"/>
    <description>
    In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5333.html">CVE-2018-5333</cve>
<bugzilla href="https://bugzilla.suse.com/1075617">SUSE bug 1075617</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208665" comment="kernel-bigsmp-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208666" comment="kernel-bigsmp-base-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208667" comment="kernel-bigsmp-devel-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205541" comment="kernel-default-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205542" comment="kernel-default-base-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205543" comment="kernel-default-devel-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208668" comment="kernel-default-man-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205544" comment="kernel-ec2-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205545" comment="kernel-ec2-base-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205546" comment="kernel-ec2-devel-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205547" comment="kernel-pae-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205548" comment="kernel-pae-base-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205549" comment="kernel-pae-devel-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205550" comment="kernel-source-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205551" comment="kernel-syms-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205552" comment="kernel-trace-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205553" comment="kernel-trace-base-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205554" comment="kernel-trace-devel-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205555" comment="kernel-xen-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205556" comment="kernel-xen-base-3.0.101-0.47.106.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205557" comment="kernel-xen-devel-3.0.101-0.47.106.19 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185334" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5334</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5334" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5334" source="CVE"/>
    <description>
    In Wireshark 2.4.0 to 2.4.3 and 2.2.0 to 2.2.11, the IxVeriWave file parser could crash. This was addressed in wiretap/vwr.c by correcting the signature timestamp bounds checks.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5334.html">CVE-2018-5334</cve>
<bugzilla href="https://bugzilla.suse.com/1075737">SUSE bug 1075737</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203605" comment="libwireshark8-2.2.12-40.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203606" comment="libwiretap6-2.2.12-40.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203607" comment="libwscodecs1-2.2.12-40.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203608" comment="libwsutil7-2.2.12-40.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203609" comment="wireshark-2.2.12-40.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203611" comment="wireshark-gtk-2.2.12-40.17 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5335</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5335" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5335" source="CVE"/>
    <description>
    In Wireshark 2.4.0 to 2.4.3 and 2.2.0 to 2.2.11, the WCP dissector could crash. This was addressed in epan/dissectors/packet-wcp.c by validating the available buffer length.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5335.html">CVE-2018-5335</cve>
<bugzilla href="https://bugzilla.suse.com/1075738">SUSE bug 1075738</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203605" comment="libwireshark8-2.2.12-40.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203606" comment="libwiretap6-2.2.12-40.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203607" comment="libwscodecs1-2.2.12-40.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203608" comment="libwsutil7-2.2.12-40.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203609" comment="wireshark-2.2.12-40.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203611" comment="wireshark-gtk-2.2.12-40.17 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5336</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5336" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5336" source="CVE"/>
    <description>
    In Wireshark 2.4.0 to 2.4.3 and 2.2.0 to 2.2.11, the JSON, XML, NTP, XMPP, and GDB dissectors could crash. This was addressed in epan/tvbparse.c by limiting the recursion depth.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5336.html">CVE-2018-5336</cve>
<bugzilla href="https://bugzilla.suse.com/1075739">SUSE bug 1075739</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203605" comment="libwireshark8-2.2.12-40.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203606" comment="libwiretap6-2.2.12-40.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203607" comment="libwscodecs1-2.2.12-40.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203608" comment="libwsutil7-2.2.12-40.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203609" comment="wireshark-2.2.12-40.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203611" comment="wireshark-gtk-2.2.12-40.17 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5378</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5378" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5378" source="CVE"/>
    <description>
    The Quagga BGP daemon (bgpd) prior to version 1.2.3 does not properly bounds check the data sent with a NOTIFY to a peer, if an attribute length is invalid. Arbitrary data from the bgpd process may be sent over the network to a peer and/or bgpd may crash.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5378.html">CVE-2018-5378</cve>
<bugzilla href="https://bugzilla.suse.com/1079798">SUSE bug 1079798</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203426" comment="quagga-0.99.15-0.30.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5379</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5379" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5379" source="CVE"/>
    <description>
    The Quagga BGP daemon (bgpd) prior to version 1.2.3 can double-free memory when processing certain forms of UPDATE message, containing cluster-list and/or unknown attributes. A successful attack could cause a denial of service or potentially allow an attacker to execute arbitrary code.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5379.html">CVE-2018-5379</cve>
<bugzilla href="https://bugzilla.suse.com/1079799">SUSE bug 1079799</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203426" comment="quagga-0.99.15-0.30.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5380</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5380" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5380" source="CVE"/>
    <description>
    The Quagga BGP daemon (bgpd) prior to version 1.2.3 can overrun internal BGP code-to-string conversion tables used for debug by 1 pointer value, based on input.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5380.html">CVE-2018-5380</cve>
<bugzilla href="https://bugzilla.suse.com/1079800">SUSE bug 1079800</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203426" comment="quagga-0.99.15-0.30.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5381</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5381" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5381" source="CVE"/>
    <description>
    The Quagga BGP daemon (bgpd) prior to version 1.2.3 has a bug in its parsing of "Capabilities" in BGP OPEN messages, in the bgp_packet.c:bgp_capability_msg_parse function. The parser can enter an infinite loop on invalid capabilities if a Multi-Protocol capability does not have a recognized AFI/SAFI, causing a denial of service.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5381.html">CVE-2018-5381</cve>
<bugzilla href="https://bugzilla.suse.com/1079801">SUSE bug 1079801</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203426" comment="quagga-0.99.15-0.30.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5390</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5390" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5390" source="CVE"/>
    <description>
    Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5390.html">CVE-2018-5390</cve>
<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1102340">SUSE bug 1102340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1102682">SUSE bug 1102682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1103097">SUSE bug 1103097</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1144973">SUSE bug 1144973</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1149475">SUSE bug 1149475</bugzilla>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:20185407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5407</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5407" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5407" source="CVE"/>
    <description>
    Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention'.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5407.html">CVE-2018-5407</cve>
<bugzilla href="https://bugzilla.suse.com/1113534">SUSE bug 1113534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1116195">SUSE bug 1116195</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009242428" comment="libopenssl-devel-0.9.8j-0.106.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009242431" comment="libopenssl0_9_8-0.9.8j-0.106.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009242434" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009242432" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009242435" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009242430" comment="openssl-0.9.8j-0.106.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009242433" comment="openssl-doc-0.9.8j-0.106.18 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009242431" comment="libopenssl0_9_8-0.9.8j-0.106.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009242434" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009242432" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009242435" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240955" comment="libopenssl1-devel-1.0.1g-0.58.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248704" comment="libopenssl1-devel-32bit-1.0.1g-0.58.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240956" comment="libopenssl1_0_0-1.0.1g-0.58.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240957" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009242430" comment="openssl-0.9.8j-0.106.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009242433" comment="openssl-doc-0.9.8j-0.106.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240959" comment="openssl1-1.0.1g-0.58.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009240960" comment="openssl1-doc-1.0.1g-0.58.15 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5683</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5683" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683" source="CVE"/>
    <description>
    The vga_draw_text function in Qemu allows local OS guest privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) by leveraging improper memory address validation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5683.html">CVE-2018-5683</cve>
<bugzilla href="https://bugzilla.suse.com/1076114">SUSE bug 1076114</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1076116">SUSE bug 1076116</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205628" comment="kvm-1.4.2-53.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205997" comment="xen-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209094" comment="xen-doc-html-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209095" comment="xen-doc-pdf-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205998" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205999" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206000" comment="xen-libs-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209096" comment="xen-libs-32bit-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209097" comment="xen-tools-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206001" comment="xen-tools-domU-4.2.5_21-45.19 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205628" comment="kvm-1.4.2-53.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250468" comment="xen-4.2.5_21-47.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250469" comment="xen-doc-html-4.2.5_21-47.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250470" comment="xen-doc-pdf-4.2.5_21-47.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250471" comment="xen-kmp-default-4.2.5_21_3.0.101_0.150.TDC-47.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250472" comment="xen-libs-4.2.5_21-47.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250473" comment="xen-tools-4.2.5_21-47.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250474" comment="xen-tools-domU-4.2.5_21-47.21 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5685</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5685" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685" source="CVE"/>
    <description>
    In GraphicsMagick 1.3.27, there is an infinite loop and application hang in the ReadBMPImage function (coders/bmp.c). Remote attackers could leverage this vulnerability to cause a denial of service via an image file with a crafted bit-field mask value.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5685.html">CVE-2018-5685</cve>
<bugzilla href="https://bugzilla.suse.com/1075939">SUSE bug 1075939</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202290" comment="ImageMagick-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209126" comment="libMagickCore1-6.4.3.6-7.78.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209127" comment="libMagickCore1-32bit-6.4.3.6-7.78.29 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5711</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5711" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5711" source="CVE"/>
    <description>
    gd_gif_in.c in the GD Graphics Library (aka libgd), as used in PHP before 5.6.33, 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1, has an integer signedness error that leads to an infinite loop via a crafted GIF file, as demonstrated by a call to the imagecreatefromgif or imagecreatefromstring PHP function. This is related to GetCode_ and gdImageCreateFromGifCtx.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5711.html">CVE-2018-5711</cve>
<bugzilla href="https://bugzilla.suse.com/1076391">SUSE bug 1076391</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205787" comment="apache2-mod_php53-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202618" comment="gd-2.0.36.RC1-52.33.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203352" comment="php53-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205788" comment="php53-bcmath-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205789" comment="php53-bz2-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205790" comment="php53-calendar-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205791" comment="php53-ctype-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205792" comment="php53-curl-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205793" comment="php53-dba-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205794" comment="php53-dom-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205795" comment="php53-exif-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205796" comment="php53-fastcgi-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205797" comment="php53-fileinfo-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205798" comment="php53-ftp-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205799" comment="php53-gd-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205800" comment="php53-gettext-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205801" comment="php53-gmp-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205802" comment="php53-iconv-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205803" comment="php53-intl-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205804" comment="php53-json-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205805" comment="php53-ldap-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205806" comment="php53-mbstring-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205807" comment="php53-mcrypt-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205808" comment="php53-mysql-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205809" comment="php53-odbc-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205810" comment="php53-openssl-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205811" comment="php53-pcntl-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205812" comment="php53-pdo-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205813" comment="php53-pear-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205814" comment="php53-pgsql-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205815" comment="php53-pspell-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205816" comment="php53-shmop-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205817" comment="php53-snmp-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205818" comment="php53-soap-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205819" comment="php53-suhosin-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205820" comment="php53-sysvmsg-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205821" comment="php53-sysvsem-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205822" comment="php53-sysvshm-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205823" comment="php53-tokenizer-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205824" comment="php53-wddx-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205825" comment="php53-xmlreader-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205826" comment="php53-xmlrpc-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205827" comment="php53-xmlwriter-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205828" comment="php53-xsl-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205829" comment="php53-zip-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205830" comment="php53-zlib-5.3.17-112.20 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205787" comment="apache2-mod_php53-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203352" comment="php53-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205788" comment="php53-bcmath-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205789" comment="php53-bz2-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205790" comment="php53-calendar-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205791" comment="php53-ctype-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205792" comment="php53-curl-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205793" comment="php53-dba-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205794" comment="php53-dom-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205795" comment="php53-exif-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205796" comment="php53-fastcgi-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205797" comment="php53-fileinfo-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205798" comment="php53-ftp-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205799" comment="php53-gd-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205800" comment="php53-gettext-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205801" comment="php53-gmp-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205802" comment="php53-iconv-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205803" comment="php53-intl-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205804" comment="php53-json-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205805" comment="php53-ldap-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205806" comment="php53-mbstring-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205807" comment="php53-mcrypt-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205808" comment="php53-mysql-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205809" comment="php53-odbc-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205810" comment="php53-openssl-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205811" comment="php53-pcntl-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205812" comment="php53-pdo-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205813" comment="php53-pear-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205814" comment="php53-pgsql-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205815" comment="php53-pspell-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205816" comment="php53-shmop-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205817" comment="php53-snmp-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205818" comment="php53-soap-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205819" comment="php53-suhosin-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205820" comment="php53-sysvmsg-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205821" comment="php53-sysvsem-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205822" comment="php53-sysvshm-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205823" comment="php53-tokenizer-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205824" comment="php53-wddx-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205825" comment="php53-xmlreader-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205826" comment="php53-xmlrpc-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205827" comment="php53-xmlwriter-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205828" comment="php53-xsl-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205829" comment="php53-zip-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205830" comment="php53-zlib-5.3.17-112.20 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5712</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5712" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5712" source="CVE"/>
    <description>
    An issue was discovered in PHP before 5.6.33, 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1. There is Reflected XSS on the PHAR 404 error page via the URI of a request for a .phar file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5712.html">CVE-2018-5712</cve>
<bugzilla href="https://bugzilla.suse.com/1076220">SUSE bug 1076220</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1076391">SUSE bug 1076391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1091362">SUSE bug 1091362</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205787" comment="apache2-mod_php53-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203352" comment="php53-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205788" comment="php53-bcmath-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205789" comment="php53-bz2-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205790" comment="php53-calendar-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205791" comment="php53-ctype-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205792" comment="php53-curl-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205793" comment="php53-dba-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205794" comment="php53-dom-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205795" comment="php53-exif-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205796" comment="php53-fastcgi-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205797" comment="php53-fileinfo-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205798" comment="php53-ftp-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205799" comment="php53-gd-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205800" comment="php53-gettext-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205801" comment="php53-gmp-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205802" comment="php53-iconv-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205803" comment="php53-intl-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205804" comment="php53-json-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205805" comment="php53-ldap-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205806" comment="php53-mbstring-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205807" comment="php53-mcrypt-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205808" comment="php53-mysql-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205809" comment="php53-odbc-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205810" comment="php53-openssl-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205811" comment="php53-pcntl-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205812" comment="php53-pdo-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205813" comment="php53-pear-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205814" comment="php53-pgsql-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205815" comment="php53-pspell-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205816" comment="php53-shmop-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205817" comment="php53-snmp-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205818" comment="php53-soap-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205819" comment="php53-suhosin-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205820" comment="php53-sysvmsg-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205821" comment="php53-sysvsem-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205822" comment="php53-sysvshm-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205823" comment="php53-tokenizer-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205824" comment="php53-wddx-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205825" comment="php53-xmlreader-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205826" comment="php53-xmlrpc-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205827" comment="php53-xmlwriter-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205828" comment="php53-xsl-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205829" comment="php53-zip-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205830" comment="php53-zlib-5.3.17-112.20 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5729</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5729" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5729" source="CVE"/>
    <description>
    MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to cause a denial of service (NULL pointer dereference) or bypass a DN container check by supplying tagged data that is internal to the database module.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5729.html">CVE-2018-5729</cve>
<bugzilla href="https://bugzilla.suse.com/1076211">SUSE bug 1076211</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1083926">SUSE bug 1083926</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1122468">SUSE bug 1122468</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009248607" comment="krb5-1.8.6-133.49.125.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248608" comment="krb5-32bit-1.8.6-133.49.125.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248609" comment="krb5-apps-clients-1.8.6-133.49.125.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248610" comment="krb5-apps-servers-1.8.6-133.49.125.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248611" comment="krb5-client-1.8.6-133.49.125.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248612" comment="krb5-devel-1.8.6-133.49.125.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248613" comment="krb5-devel-32bit-1.8.6-133.49.125.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248614" comment="krb5-doc-1.8.6-133.49.125.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248615" comment="krb5-plugin-kdb-ldap-1.8.6-133.49.125.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248616" comment="krb5-plugin-preauth-pkinit-1.8.6-133.49.125.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248617" comment="krb5-server-1.8.6-133.49.125.19 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5730</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5730" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5730" source="CVE"/>
    <description>
    MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to circumvent a DN containership check by supplying both a "linkdn" and "containerdn" database argument, or by supplying a DN string which is a left extension of a container DN string but is not hierarchically within the container DN.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5730.html">CVE-2018-5730</cve>
<bugzilla href="https://bugzilla.suse.com/1076211">SUSE bug 1076211</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1083927">SUSE bug 1083927</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1122468">SUSE bug 1122468</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009248607" comment="krb5-1.8.6-133.49.125.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248608" comment="krb5-32bit-1.8.6-133.49.125.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248609" comment="krb5-apps-clients-1.8.6-133.49.125.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248610" comment="krb5-apps-servers-1.8.6-133.49.125.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248611" comment="krb5-client-1.8.6-133.49.125.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248612" comment="krb5-devel-1.8.6-133.49.125.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248613" comment="krb5-devel-32bit-1.8.6-133.49.125.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248614" comment="krb5-doc-1.8.6-133.49.125.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248615" comment="krb5-plugin-kdb-ldap-1.8.6-133.49.125.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248616" comment="krb5-plugin-preauth-pkinit-1.8.6-133.49.125.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248617" comment="krb5-server-1.8.6-133.49.125.19 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5732</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5732" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5732" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5732.html">CVE-2018-5732</cve>
<bugzilla href="https://bugzilla.suse.com/1083302">SUSE bug 1083302</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1085417">SUSE bug 1085417</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202503" comment="dhcp-4.2.4.P2-0.28.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209219" comment="dhcp-client-4.2.4.P2-0.28.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209220" comment="dhcp-relay-4.2.4.P2-0.28.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209221" comment="dhcp-server-4.2.4.P2-0.28.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5733</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5733" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5733" source="CVE"/>
    <description>
    A malicious client which is allowed to send very large amounts of traffic (billions of packets) to a DHCP server can eventually overflow a 32-bit reference counter, potentially causing dhcpd to crash. Affects ISC DHCP 4.1.0 -&gt; 4.1-ESV-R15, 4.2.0 -&gt; 4.2.8, 4.3.0 -&gt; 4.3.6, 4.4.0.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5733.html">CVE-2018-5733</cve>
<bugzilla href="https://bugzilla.suse.com/1083303">SUSE bug 1083303</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1085417">SUSE bug 1085417</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202503" comment="dhcp-4.2.4.P2-0.28.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209219" comment="dhcp-client-4.2.4.P2-0.28.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209220" comment="dhcp-relay-4.2.4.P2-0.28.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209221" comment="dhcp-server-4.2.4.P2-0.28.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5740</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5740" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5740" source="CVE"/>
    <description>
    "deny-answer-aliases" is a little-used feature intended to help recursive server operators protect end users against DNS rebinding attacks, a potential method of circumventing the security model used by client browsers. However, a defect in this feature makes it easy, when the feature is in use, to experience an assertion failure in name.c. Affects BIND 9.7.0-&gt;9.8.8, 9.9.0-&gt;9.9.13, 9.10.0-&gt;9.10.8, 9.11.0-&gt;9.11.4, 9.12.0-&gt;9.12.2, 9.13.0-&gt;9.13.2.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5740.html">CVE-2018-5740</cve>
<bugzilla href="https://bugzilla.suse.com/1104129">SUSE bug 1104129</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1148887">SUSE bug 1148887</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009256176" comment="bind-9.9.6P1-0.51.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256177" comment="bind-chrootenv-9.9.6P1-0.51.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256179" comment="bind-doc-9.9.6P1-0.51.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256180" comment="bind-libs-9.9.6P1-0.51.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256188" comment="bind-libs-32bit-9.9.6P1-0.51.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256181" comment="bind-utils-9.9.6P1-0.51.15 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5743</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5743" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5743" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5743.html">CVE-2018-5743</cve>
<bugzilla href="https://bugzilla.suse.com/1133185">SUSE bug 1133185</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1148887">SUSE bug 1148887</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009256176" comment="bind-9.9.6P1-0.51.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256177" comment="bind-chrootenv-9.9.6P1-0.51.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256179" comment="bind-doc-9.9.6P1-0.51.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256180" comment="bind-libs-9.9.6P1-0.51.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256188" comment="bind-libs-32bit-9.9.6P1-0.51.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256181" comment="bind-utils-9.9.6P1-0.51.15 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5745" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5745" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5745.html">CVE-2018-5745</cve>
<bugzilla href="https://bugzilla.suse.com/1126068">SUSE bug 1126068</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1148887">SUSE bug 1148887</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009256176" comment="bind-9.9.6P1-0.51.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256177" comment="bind-chrootenv-9.9.6P1-0.51.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256179" comment="bind-doc-9.9.6P1-0.51.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256180" comment="bind-libs-9.9.6P1-0.51.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256188" comment="bind-libs-32bit-9.9.6P1-0.51.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256181" comment="bind-utils-9.9.6P1-0.51.15 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5748</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5748" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5748" source="CVE"/>
    <description>
    qemu/qemu_monitor.c in libvirt allows attackers to cause a denial of service (memory consumption) via a large QEMU reply.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5748.html">CVE-2018-5748</cve>
<bugzilla href="https://bugzilla.suse.com/1076500">SUSE bug 1076500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1083625">SUSE bug 1083625</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205632" comment="libvirt-1.0.5.9-21.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205633" comment="libvirt-client-1.0.5.9-21.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208760" comment="libvirt-client-32bit-1.0.5.9-21.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205634" comment="libvirt-doc-1.0.5.9-21.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205635" comment="libvirt-lock-sanlock-1.0.5.9-21.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205636" comment="libvirt-python-1.0.5.9-21.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5764</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5764" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5764" source="CVE"/>
    <description>
    The parse_arguments function in options.c in rsyncd in rsync before 3.1.3 does not prevent multiple --protect-args uses, which allows remote attackers to bypass an argument-sanitization protection mechanism.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5764.html">CVE-2018-5764</cve>
<bugzilla href="https://bugzilla.suse.com/1076503">SUSE bug 1076503</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210684" comment="rsync-3.0.4-2.53.6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5803</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5803" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803" source="CVE"/>
    <description>
    In the Linux Kernel before version 4.15.8, 4.14.25, 4.9.87, 4.4.121, 4.1.51, and 3.2.102, an error in the "_sctp_make_chunk()" function (net/sctp/sm_make_chunk.c) when handling SCTP packets length can be exploited to cause a kernel crash.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5803.html">CVE-2018-5803</cve>
<bugzilla href="https://bugzilla.suse.com/1083900">SUSE bug 1083900</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009232611" comment="kernel-bigsmp-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232612" comment="kernel-bigsmp-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232613" comment="kernel-bigsmp-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232594" comment="kernel-default-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232595" comment="kernel-default-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232596" comment="kernel-default-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232614" comment="kernel-default-man-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232597" comment="kernel-ec2-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232598" comment="kernel-ec2-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232599" comment="kernel-ec2-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232600" comment="kernel-pae-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232601" comment="kernel-pae-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232602" comment="kernel-pae-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232603" comment="kernel-source-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232604" comment="kernel-syms-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232605" comment="kernel-trace-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232606" comment="kernel-trace-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232607" comment="kernel-trace-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232608" comment="kernel-xen-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232609" comment="kernel-xen-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232610" comment="kernel-xen-devel-3.0.101-0.47.106.43 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5814" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5814" source="CVE"/>
    <description>
    In the Linux Kernel before version 4.16.11, 4.14.43, 4.9.102, and 4.4.133, multiple race condition errors when handling probe, disconnect, and rebind operations can be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5814.html">CVE-2018-5814</cve>
<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1096480">SUSE bug 1096480</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1133319">SUSE bug 1133319</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009232611" comment="kernel-bigsmp-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232612" comment="kernel-bigsmp-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232613" comment="kernel-bigsmp-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232594" comment="kernel-default-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232595" comment="kernel-default-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232596" comment="kernel-default-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232614" comment="kernel-default-man-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232597" comment="kernel-ec2-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232598" comment="kernel-ec2-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232599" comment="kernel-ec2-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232600" comment="kernel-pae-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232601" comment="kernel-pae-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232602" comment="kernel-pae-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232603" comment="kernel-source-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232604" comment="kernel-syms-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232605" comment="kernel-trace-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232606" comment="kernel-trace-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232607" comment="kernel-trace-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232608" comment="kernel-xen-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232609" comment="kernel-xen-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232610" comment="kernel-xen-devel-3.0.101-0.47.106.43 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5950</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-5950" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5950" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the web UI in Mailman before 2.1.26 allows remote attackers to inject arbitrary web script or HTML via a user-options URL.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-5950.html">CVE-2018-5950</cve>
<bugzilla href="https://bugzilla.suse.com/1077358">SUSE bug 1077358</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009242811" comment="mailman-2.1.15-9.6.6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-6126" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6126" source="CVE"/>
    <description>
    A precision error in Skia in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-6126.html">CVE-2018-6126</cve>
<bugzilla href="https://bugzilla.suse.com/1095163">SUSE bug 1095163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1096449">SUSE bug 1096449</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009229514" comment="MozillaFirefox-52.8.1esr-72.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229523" comment="MozillaFirefox-translations-52.8.1esr-72.35 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186307" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6307</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-6307" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6307" source="CVE"/>
    <description>
    LibVNC before commit ca2a5ac02fbbadd0a21fabba779c1ea69173d10b contains heap use-after-free vulnerability in server code of file transfer extension that can result remote code execution.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-6307.html">CVE-2018-6307</cve>
<bugzilla href="https://bugzilla.suse.com/1120115">SUSE bug 1120115</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009242916" comment="LibVNCServer-0.9.1-160.6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6405</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-6405" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6405" source="CVE"/>
    <description>
    In the ReadDCMImage function in coders/dcm.c in ImageMagick before 7.0.7-23, each redmap, greenmap, and bluemap variable can be overwritten by a new pointer. The previous pointer is lost, which leads to a memory leak. This allows remote attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-6405.html">CVE-2018-6405</cve>
<bugzilla href="https://bugzilla.suse.com/1078433">SUSE bug 1078433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1095726">SUSE bug 1095726</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202297" comment="ImageMagick-6.4.3.6-7.78.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209128" comment="libMagickCore1-6.4.3.6-7.78.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209129" comment="libMagickCore1-32bit-6.4.3.6-7.78.34 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-6485" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6485" source="CVE"/>
    <description>
    An integer overflow in the implementation of the posix_memalign in memalign functions in the GNU C Library (aka glibc or libc6) 2.26 and earlier could cause these functions to return a pointer to a heap area that is too small, potentially leading to heap corruption.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-6485.html">CVE-2018-6485</cve>
<bugzilla href="https://bugzilla.suse.com/1079036">SUSE bug 1079036</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202700" comment="glibc-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208522" comment="glibc-32bit-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205358" comment="glibc-devel-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208523" comment="glibc-devel-32bit-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202701" comment="glibc-html-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205359" comment="glibc-i18ndata-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202702" comment="glibc-info-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205360" comment="glibc-locale-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208524" comment="glibc-locale-32bit-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205361" comment="glibc-profile-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208525" comment="glibc-profile-32bit-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205362" comment="nscd-2.11.3-17.110.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6551</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-6551" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6551" source="CVE"/>
    <description>
    The malloc implementation in the GNU C Library (aka glibc or libc6), from version 2.24 to 2.26 on powerpc, and only in version 2.26 on i386, did not properly handle malloc calls with arguments close to SIZE_MAX and could return a pointer to a heap region that is smaller than requested, eventually leading to heap corruption.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-6551.html">CVE-2018-6551</cve>
<bugzilla href="https://bugzilla.suse.com/1079036">SUSE bug 1079036</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202700" comment="glibc-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208522" comment="glibc-32bit-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205358" comment="glibc-devel-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208523" comment="glibc-devel-32bit-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202701" comment="glibc-html-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205359" comment="glibc-i18ndata-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202702" comment="glibc-info-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205360" comment="glibc-locale-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208524" comment="glibc-locale-32bit-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205361" comment="glibc-profile-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208525" comment="glibc-profile-32bit-2.11.3-17.110.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205362" comment="nscd-2.11.3-17.110.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6554</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-6554" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6554" source="CVE"/>
    <description>
    Memory leak in the irda_bind function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (memory consumption) by repeatedly binding an AF_IRDA socket.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-6554.html">CVE-2018-6554</cve>
<bugzilla href="https://bugzilla.suse.com/1106509">SUSE bug 1106509</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1106511">SUSE bug 1106511</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009235558" comment="kernel-bigsmp-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235559" comment="kernel-bigsmp-base-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235560" comment="kernel-bigsmp-devel-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235541" comment="kernel-default-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235542" comment="kernel-default-base-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235543" comment="kernel-default-devel-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235561" comment="kernel-default-man-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235544" comment="kernel-ec2-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235545" comment="kernel-ec2-base-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235546" comment="kernel-ec2-devel-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235547" comment="kernel-pae-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235548" comment="kernel-pae-base-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235549" comment="kernel-pae-devel-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235550" comment="kernel-source-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235551" comment="kernel-syms-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235552" comment="kernel-trace-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235553" comment="kernel-trace-base-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235554" comment="kernel-trace-devel-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235555" comment="kernel-xen-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235556" comment="kernel-xen-base-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235557" comment="kernel-xen-devel-3.0.101-0.47.106.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6555</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-6555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6555" source="CVE"/>
    <description>
    The irda_setsockopt function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (ias_object use-after-free and system crash) or possibly have unspecified other impact via an AF_IRDA socket.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-6555.html">CVE-2018-6555</cve>
<bugzilla href="https://bugzilla.suse.com/1106509">SUSE bug 1106509</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1106511">SUSE bug 1106511</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009235558" comment="kernel-bigsmp-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235559" comment="kernel-bigsmp-base-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235560" comment="kernel-bigsmp-devel-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235541" comment="kernel-default-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235542" comment="kernel-default-base-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235543" comment="kernel-default-devel-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235561" comment="kernel-default-man-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235544" comment="kernel-ec2-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235545" comment="kernel-ec2-base-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235546" comment="kernel-ec2-devel-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235547" comment="kernel-pae-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235548" comment="kernel-pae-base-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235549" comment="kernel-pae-devel-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235550" comment="kernel-source-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235551" comment="kernel-syms-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235552" comment="kernel-trace-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235553" comment="kernel-trace-base-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235554" comment="kernel-trace-devel-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235555" comment="kernel-xen-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235556" comment="kernel-xen-base-3.0.101-0.47.106.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009235557" comment="kernel-xen-devel-3.0.101-0.47.106.50 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6798</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-6798" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6798" source="CVE"/>
    <description>
    An issue was discovered in Perl 5.22 through 5.26. Matching a crafted locale dependent regular expression can cause a heap-based buffer over-read and potentially information disclosure.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-6798.html">CVE-2018-6798</cve>
<bugzilla href="https://bugzilla.suse.com/1082233">SUSE bug 1082233</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1106717">SUSE bug 1106717</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203242" comment="perl-5.10.0-64.81.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210174" comment="perl-32bit-5.10.0-64.81.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210175" comment="perl-Module-Build-0.2808.01-0.81.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210176" comment="perl-Test-Simple-0.72-0.81.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210177" comment="perl-base-5.10.0-64.81.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210178" comment="perl-doc-5.10.0-64.81.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6913</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-6913" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6913" source="CVE"/>
    <description>
    Heap-based buffer overflow in the pack function in Perl before 5.26.2 allows context-dependent attackers to execute arbitrary code via a large item count.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-6913.html">CVE-2018-6913</cve>
<bugzilla href="https://bugzilla.suse.com/1082216">SUSE bug 1082216</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1106717">SUSE bug 1106717</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203242" comment="perl-5.10.0-64.81.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210174" comment="perl-32bit-5.10.0-64.81.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210175" comment="perl-Module-Build-0.2808.01-0.81.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210176" comment="perl-Test-Simple-0.72-0.81.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210177" comment="perl-base-5.10.0-64.81.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009210178" comment="perl-doc-5.10.0-64.81.10 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6927</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-6927" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927" source="CVE"/>
    <description>
    The futex_requeue function in kernel/futex.c in the Linux kernel before 4.14.15 might allow attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact by triggering a negative wake or requeue value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-6927.html">CVE-2018-6927</cve>
<bugzilla href="https://bugzilla.suse.com/1080757">SUSE bug 1080757</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208695" comment="kernel-bigsmp-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208696" comment="kernel-bigsmp-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208697" comment="kernel-bigsmp-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205609" comment="kernel-default-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205610" comment="kernel-default-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205611" comment="kernel-default-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208698" comment="kernel-default-man-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205612" comment="kernel-ec2-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205613" comment="kernel-ec2-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205614" comment="kernel-ec2-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205615" comment="kernel-pae-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205616" comment="kernel-pae-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205617" comment="kernel-pae-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205618" comment="kernel-source-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205619" comment="kernel-syms-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205620" comment="kernel-trace-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205621" comment="kernel-trace-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205622" comment="kernel-trace-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205623" comment="kernel-xen-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205624" comment="kernel-xen-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205625" comment="kernel-xen-devel-3.0.101-0.47.106.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7170</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-7170" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7170" source="CVE"/>
    <description>
    ntpd in ntp 4.2.x before 4.2.8p7 and 4.3.x before 4.3.92 allows authenticated users that know the private symmetric key to create arbitrarily-many ephemeral associations in order to win the clock selection of ntpd and modify a victim's clock via a Sybil attack. This issue exists because of an incomplete fix for CVE-2016-1549.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-7170.html">CVE-2018-7170</cve>
<bugzilla href="https://bugzilla.suse.com/1082210">SUSE bug 1082210</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1083424">SUSE bug 1083424</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1098531">SUSE bug 1098531</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009237961" comment="ntp-4.2.8p12-48.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237962" comment="ntp-doc-4.2.8p12-48.21 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-7182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7182" source="CVE"/>
    <description>
    The ctl_getitem method in ntpd in ntp-4.2.8p6 before 4.2.8p11 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted mode 6 packet with a ntpd instance from 4.2.8p6 through 4.2.8p10.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-7182.html">CVE-2018-7182</cve>
<bugzilla href="https://bugzilla.suse.com/1082210">SUSE bug 1082210</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1083426">SUSE bug 1083426</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009248666" comment="ntp-4.2.8p11-48.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248667" comment="ntp-doc-4.2.8p11-48.18 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7183</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-7183" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7183" source="CVE"/>
    <description>
    Buffer overflow in the decodearr function in ntpq in ntp 4.2.8p6 through 4.2.8p10 allows remote attackers to execute arbitrary code by leveraging an ntpq query and sending a response with a crafted array.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-7183.html">CVE-2018-7183</cve>
<bugzilla href="https://bugzilla.suse.com/1082210">SUSE bug 1082210</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1083417">SUSE bug 1083417</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009248666" comment="ntp-4.2.8p11-48.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248667" comment="ntp-doc-4.2.8p11-48.18 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7184</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-7184" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7184" source="CVE"/>
    <description>
    ntpd in ntp 4.2.8p4 before 4.2.8p11 drops bad packets before updating the "received" timestamp, which allows remote attackers to cause a denial of service (disruption) by sending a packet with a zero-origin timestamp causing the association to reset and setting the contents of the packet as the most recent timestamp. This issue is a result of an incomplete fix for CVE-2015-7704.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-7184.html">CVE-2018-7184</cve>
<bugzilla href="https://bugzilla.suse.com/1082210">SUSE bug 1082210</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1083422">SUSE bug 1083422</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009248666" comment="ntp-4.2.8p11-48.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248667" comment="ntp-doc-4.2.8p11-48.18 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7185</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-7185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7185" source="CVE"/>
    <description>
    The protocol engine in ntp 4.2.6 before 4.2.8p11 allows a remote attackers to cause a denial of service (disruption) by continually sending a packet with a zero-origin timestamp and source IP address of the "other side" of an interleaved association causing the victim ntpd to reset its association.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-7185.html">CVE-2018-7185</cve>
<bugzilla href="https://bugzilla.suse.com/1082210">SUSE bug 1082210</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1083420">SUSE bug 1083420</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009248666" comment="ntp-4.2.8p11-48.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009248667" comment="ntp-doc-4.2.8p11-48.18 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7225</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-7225" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7225" source="CVE"/>
    <description>
    An issue was discovered in LibVNCServer through 0.9.11. rfbProcessClientNormalMessage() in rfbserver.c does not sanitize msg.cct.length, leading to access to uninitialized and potentially sensitive data or possibly unspecified other impact (e.g., an integer overflow) via specially crafted VNC packets.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-7225.html">CVE-2018-7225</cve>
<bugzilla href="https://bugzilla.suse.com/1081493">SUSE bug 1081493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1090647">SUSE bug 1090647</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009202327" comment="LibVNCServer-0.9.1-160.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187320" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7320</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-7320" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7320" source="CVE"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, the SIGCOMP protocol dissector could crash. This was addressed in epan/dissectors/packet-sigcomp.c by validating operand offsets.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-7320.html">CVE-2018-7320</cve>
<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203612" comment="libwireshark8-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203613" comment="libwiretap6-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203614" comment="libwscodecs1-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203615" comment="libwsutil7-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203616" comment="wireshark-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203618" comment="wireshark-gtk-2.2.13-40.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7321</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-7321" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7321" source="CVE"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-thrift.c had a large loop that was addressed by not proceeding with dissection after encountering an unexpected type.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-7321.html">CVE-2018-7321</cve>
<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203612" comment="libwireshark8-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203613" comment="libwiretap6-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203614" comment="libwscodecs1-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203615" comment="libwsutil7-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203616" comment="wireshark-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203618" comment="wireshark-gtk-2.2.13-40.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7322</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-7322" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7322" source="CVE"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-dcm.c had an infinite loop that was addressed by checking for integer wraparound.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-7322.html">CVE-2018-7322</cve>
<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203612" comment="libwireshark8-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203613" comment="libwiretap6-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203614" comment="libwscodecs1-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203615" comment="libwsutil7-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203616" comment="wireshark-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203618" comment="wireshark-gtk-2.2.13-40.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7323</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-7323" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7323" source="CVE"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-wccp.c had a large loop that was addressed by ensuring that a calculated length was monotonically increasing.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-7323.html">CVE-2018-7323</cve>
<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203612" comment="libwireshark8-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203613" comment="libwiretap6-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203614" comment="libwscodecs1-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203615" comment="libwsutil7-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203616" comment="wireshark-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203618" comment="wireshark-gtk-2.2.13-40.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7324</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-7324" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7324" source="CVE"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-sccp.c had an infinite loop that was addressed by using a correct integer data type.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-7324.html">CVE-2018-7324</cve>
<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203612" comment="libwireshark8-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203613" comment="libwiretap6-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203614" comment="libwscodecs1-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203615" comment="libwsutil7-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203616" comment="wireshark-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203618" comment="wireshark-gtk-2.2.13-40.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7325</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-7325" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7325" source="CVE"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-rpki-rtr.c had an infinite loop that was addressed by validating a length field.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-7325.html">CVE-2018-7325</cve>
<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203612" comment="libwireshark8-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203613" comment="libwiretap6-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203614" comment="libwscodecs1-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203615" comment="libwsutil7-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203616" comment="wireshark-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203618" comment="wireshark-gtk-2.2.13-40.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187326" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7326</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-7326" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7326" source="CVE"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-lltd.c had an infinite loop that was addressed by using a correct integer data type.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-7326.html">CVE-2018-7326</cve>
<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203612" comment="libwireshark8-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203613" comment="libwiretap6-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203614" comment="libwscodecs1-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203615" comment="libwsutil7-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203616" comment="wireshark-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203618" comment="wireshark-gtk-2.2.13-40.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7327</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-7327" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7327" source="CVE"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-openflow_v6.c had an infinite loop that was addressed by validating property lengths.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-7327.html">CVE-2018-7327</cve>
<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203612" comment="libwireshark8-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203613" comment="libwiretap6-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203614" comment="libwscodecs1-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203615" comment="libwsutil7-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203616" comment="wireshark-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203618" comment="wireshark-gtk-2.2.13-40.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7328</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-7328" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7328" source="CVE"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-usb.c had an infinite loop that was addressed by rejecting short frame header lengths.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-7328.html">CVE-2018-7328</cve>
<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203612" comment="libwireshark8-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203613" comment="libwiretap6-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203614" comment="libwscodecs1-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203615" comment="libwsutil7-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203616" comment="wireshark-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203618" comment="wireshark-gtk-2.2.13-40.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187329" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7329</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-7329" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7329" source="CVE"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-s7comm.c had an infinite loop that was addressed by correcting off-by-one errors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-7329.html">CVE-2018-7329</cve>
<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203612" comment="libwireshark8-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203613" comment="libwiretap6-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203614" comment="libwscodecs1-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203615" comment="libwsutil7-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203616" comment="wireshark-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203618" comment="wireshark-gtk-2.2.13-40.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7330</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-7330" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7330" source="CVE"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-thread.c had an infinite loop that was addressed by using a correct integer data type.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-7330.html">CVE-2018-7330</cve>
<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203612" comment="libwireshark8-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203613" comment="libwiretap6-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203614" comment="libwscodecs1-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203615" comment="libwsutil7-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203616" comment="wireshark-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203618" comment="wireshark-gtk-2.2.13-40.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187331" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7331</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-7331" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7331" source="CVE"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-ber.c had an infinite loop that was addressed by validating a length.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-7331.html">CVE-2018-7331</cve>
<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203612" comment="libwireshark8-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203613" comment="libwiretap6-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203614" comment="libwscodecs1-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203615" comment="libwsutil7-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203616" comment="wireshark-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203618" comment="wireshark-gtk-2.2.13-40.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7332</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-7332" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7332" source="CVE"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-reload.c had an infinite loop that was addressed by validating a length.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-7332.html">CVE-2018-7332</cve>
<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203612" comment="libwireshark8-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203613" comment="libwiretap6-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203614" comment="libwscodecs1-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203615" comment="libwsutil7-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203616" comment="wireshark-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203618" comment="wireshark-gtk-2.2.13-40.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187333" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7333</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-7333" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7333" source="CVE"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-rpcrdma.c had an infinite loop that was addressed by validating a chunk size.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-7333.html">CVE-2018-7333</cve>
<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203612" comment="libwireshark8-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203613" comment="libwiretap6-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203614" comment="libwscodecs1-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203615" comment="libwsutil7-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203616" comment="wireshark-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203618" comment="wireshark-gtk-2.2.13-40.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187334" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7334</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-7334" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7334" source="CVE"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, the UMTS MAC dissector could crash. This was addressed in epan/dissectors/packet-umts_mac.c by rejecting a certain reserved value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-7334.html">CVE-2018-7334</cve>
<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203612" comment="libwireshark8-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203613" comment="libwiretap6-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203614" comment="libwscodecs1-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203615" comment="libwsutil7-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203616" comment="wireshark-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203618" comment="wireshark-gtk-2.2.13-40.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7335</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-7335" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7335" source="CVE"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, the IEEE 802.11 dissector could crash. This was addressed in epan/crypt/airpdcap.c by rejecting lengths that are too small.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-7335.html">CVE-2018-7335</cve>
<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203612" comment="libwireshark8-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203613" comment="libwiretap6-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203614" comment="libwscodecs1-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203615" comment="libwsutil7-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203616" comment="wireshark-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203618" comment="wireshark-gtk-2.2.13-40.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7336</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-7336" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7336" source="CVE"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, the FCP protocol dissector could crash. This was addressed in epan/dissectors/packet-fcp.c by checking for a NULL pointer.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-7336.html">CVE-2018-7336</cve>
<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203612" comment="libwireshark8-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203613" comment="libwiretap6-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203614" comment="libwscodecs1-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203615" comment="libwsutil7-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203616" comment="wireshark-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203618" comment="wireshark-gtk-2.2.13-40.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7337</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-7337" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7337" source="CVE"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4, the DOCSIS protocol dissector could crash. This was addressed in plugins/docsis/packet-docsis.c by removing the recursive algorithm that had been used for concatenated PDUs.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-7337.html">CVE-2018-7337</cve>
<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203612" comment="libwireshark8-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203613" comment="libwiretap6-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203614" comment="libwscodecs1-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203615" comment="libwsutil7-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203616" comment="wireshark-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203618" comment="wireshark-gtk-2.2.13-40.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7417</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-7417" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7417" source="CVE"/>
    <description>
    In Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the IPMI dissector could crash. This was addressed in epan/dissectors/packet-ipmi-picmg.c by adding support for crafted packets that lack an IPMI header.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-7417.html">CVE-2018-7417</cve>
<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203612" comment="libwireshark8-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203613" comment="libwiretap6-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203614" comment="libwscodecs1-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203615" comment="libwsutil7-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203616" comment="wireshark-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203618" comment="wireshark-gtk-2.2.13-40.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7418</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-7418" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7418" source="CVE"/>
    <description>
    In Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the SIGCOMP dissector could crash. This was addressed in epan/dissectors/packet-sigcomp.c by correcting the extraction of the length value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-7418.html">CVE-2018-7418</cve>
<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203612" comment="libwireshark8-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203613" comment="libwiretap6-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203614" comment="libwscodecs1-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203615" comment="libwsutil7-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203616" comment="wireshark-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203618" comment="wireshark-gtk-2.2.13-40.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7419</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-7419" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7419" source="CVE"/>
    <description>
    In Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the NBAP dissector could crash. This was addressed in epan/dissectors/asn1/nbap/nbap.cnf by ensuring DCH ID initialization.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-7419.html">CVE-2018-7419</cve>
<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203612" comment="libwireshark8-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203613" comment="libwiretap6-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203614" comment="libwscodecs1-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203615" comment="libwsutil7-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203616" comment="wireshark-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203618" comment="wireshark-gtk-2.2.13-40.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7420</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-7420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7420" source="CVE"/>
    <description>
    In Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the pcapng file parser could crash. This was addressed in wiretap/pcapng.c by adding a block-size check for sysdig event blocks.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-7420.html">CVE-2018-7420</cve>
<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203612" comment="libwireshark8-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203613" comment="libwiretap6-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203614" comment="libwscodecs1-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203615" comment="libwsutil7-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203616" comment="wireshark-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203618" comment="wireshark-gtk-2.2.13-40.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7421</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-7421" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7421" source="CVE"/>
    <description>
    In Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the DMP dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-dmp.c by correctly supporting a bounded number of Security Categories for a DMP Security Classification.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-7421.html">CVE-2018-7421</cve>
<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203612" comment="libwireshark8-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203613" comment="libwiretap6-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203614" comment="libwscodecs1-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203615" comment="libwsutil7-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203616" comment="wireshark-2.2.13-40.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203618" comment="wireshark-gtk-2.2.13-40.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7443</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-7443" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7443" source="CVE"/>
    <description>
    The ReadTIFFImage function in coders/tiff.c in ImageMagick 7.0.7-23 Q16 does not properly validate the amount of image data in a file, which allows remote attackers to cause a denial of service (memory allocation failure in the AcquireMagickMemory function in MagickCore/memory.c).
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-7443.html">CVE-2018-7443</cve>
<bugzilla href="https://bugzilla.suse.com/1075944">SUSE bug 1075944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1082792">SUSE bug 1082792</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202311" comment="ImageMagick-6.4.3.6-78.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209132" comment="libMagickCore1-6.4.3.6-78.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209133" comment="libMagickCore1-32bit-6.4.3.6-78.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7456</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-7456" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7456" source="CVE"/>
    <description>
    A NULL Pointer Dereference occurs in the function TIFFPrintDirectory in tif_print.c in LibTIFF 4.0.9 when using the tiffinfo tool to print crafted TIFF information, a different vulnerability than CVE-2017-18013. (This affects an earlier part of the TIFFPrintDirectory function that was not addressed by the CVE-2017-18013 patch.)
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-7456.html">CVE-2018-7456</cve>
<bugzilla href="https://bugzilla.suse.com/1074317">SUSE bug 1074317</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1082825">SUSE bug 1082825</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009229551" comment="libtiff3-3.8.2-141.169.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229568" comment="libtiff3-32bit-3.8.2-141.169.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229522" comment="tiff-3.8.2-141.169.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7492</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-7492" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492" source="CVE"/>
    <description>
    A NULL pointer dereference was found in the net/rds/rdma.c __rds_rdma_map() function in the Linux kernel before 4.14.7 allowing local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-7492.html">CVE-2018-7492</cve>
<bugzilla href="https://bugzilla.suse.com/1082962">SUSE bug 1082962</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009232611" comment="kernel-bigsmp-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232612" comment="kernel-bigsmp-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232613" comment="kernel-bigsmp-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232594" comment="kernel-default-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232595" comment="kernel-default-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232596" comment="kernel-default-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232614" comment="kernel-default-man-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232597" comment="kernel-ec2-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232598" comment="kernel-ec2-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232599" comment="kernel-ec2-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232600" comment="kernel-pae-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232601" comment="kernel-pae-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232602" comment="kernel-pae-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232603" comment="kernel-source-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232604" comment="kernel-syms-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232605" comment="kernel-trace-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232606" comment="kernel-trace-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232607" comment="kernel-trace-devel-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232608" comment="kernel-xen-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232609" comment="kernel-xen-base-3.0.101-0.47.106.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232610" comment="kernel-xen-devel-3.0.101-0.47.106.43 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7540</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
    </affected>
    <reference ref_id="CVE-2018-7540" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7540" source="CVE"/>
    <description>
    An issue was discovered in Xen through 4.10.x allowing x86 PV guest OS users to cause a denial of service (host OS CPU hang) via non-preemptable L3/L4 pagetable freeing.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-7540.html">CVE-2018-7540</cve>
<bugzilla href="https://bugzilla.suse.com/1080635">SUSE bug 1080635</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205997" comment="xen-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209094" comment="xen-doc-html-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209095" comment="xen-doc-pdf-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205998" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205999" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206000" comment="xen-libs-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209096" comment="xen-libs-32bit-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209097" comment="xen-tools-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206001" comment="xen-tools-domU-4.2.5_21-45.19 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7541</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
    </affected>
    <reference ref_id="CVE-2018-7541" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7541" source="CVE"/>
    <description>
    An issue was discovered in Xen through 4.10.x allowing guest OS users to cause a denial of service (hypervisor crash) or gain privileges by triggering a grant-table transition from v2 to v1.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-7541.html">CVE-2018-7541</cve>
<bugzilla href="https://bugzilla.suse.com/1080662">SUSE bug 1080662</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205997" comment="xen-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209094" comment="xen-doc-html-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209095" comment="xen-doc-pdf-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205998" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205999" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206000" comment="xen-libs-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209096" comment="xen-libs-32bit-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209097" comment="xen-tools-4.2.5_21-45.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206001" comment="xen-tools-domU-4.2.5_21-45.19 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7550</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-7550" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550" source="CVE"/>
    <description>
    The load_multiboot function in hw/i386/multiboot.c in Quick Emulator (aka QEMU) allows local guest OS users to execute arbitrary code on the QEMU host via a mh_load_end_addr value greater than mh_bss_end_addr, which triggers an out-of-bounds read or write memory access.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-7550.html">CVE-2018-7550</cve>
<bugzilla href="https://bugzilla.suse.com/1083291">SUSE bug 1083291</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1083292">SUSE bug 1083292</bugzilla>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205628" comment="kvm-1.4.2-53.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206002" comment="xen-4.2.5_21-45.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209098" comment="xen-doc-html-4.2.5_21-45.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209099" comment="xen-doc-pdf-4.2.5_21-45.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206003" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206004" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.19-45.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206005" comment="xen-libs-4.2.5_21-45.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209100" comment="xen-libs-32bit-4.2.5_21-45.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209101" comment="xen-tools-4.2.5_21-45.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206006" comment="xen-tools-domU-4.2.5_21-45.22 is installed"/>
		</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205628" comment="kvm-1.4.2-53.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250475" comment="xen-4.2.5_21-47.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250476" comment="xen-doc-html-4.2.5_21-47.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250477" comment="xen-doc-pdf-4.2.5_21-47.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250478" comment="xen-kmp-default-4.2.5_21_3.0.101_0.156.TDC-47.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250479" comment="xen-libs-4.2.5_21-47.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250480" comment="xen-tools-4.2.5_21-47.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250481" comment="xen-tools-domU-4.2.5_21-47.24 is installed"/>
		</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7566</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-7566" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566" source="CVE"/>
    <description>
    The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-7566.html">CVE-2018-7566</cve>
<bugzilla href="https://bugzilla.suse.com/1083483">SUSE bug 1083483</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1083488">SUSE bug 1083488</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208695" comment="kernel-bigsmp-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208696" comment="kernel-bigsmp-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208697" comment="kernel-bigsmp-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205609" comment="kernel-default-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205610" comment="kernel-default-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205611" comment="kernel-default-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208698" comment="kernel-default-man-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205612" comment="kernel-ec2-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205613" comment="kernel-ec2-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205614" comment="kernel-ec2-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205615" comment="kernel-pae-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205616" comment="kernel-pae-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205617" comment="kernel-pae-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205618" comment="kernel-source-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205619" comment="kernel-syms-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205620" comment="kernel-trace-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205621" comment="kernel-trace-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205622" comment="kernel-trace-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205623" comment="kernel-xen-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205624" comment="kernel-xen-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205625" comment="kernel-xen-devel-3.0.101-0.47.106.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7584</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-7584" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7584" source="CVE"/>
    <description>
    In PHP through 5.6.33, 7.0.x before 7.0.28, 7.1.x through 7.1.14, and 7.2.x through 7.2.2, there is a stack-based buffer under-read while parsing an HTTP response in the php_stream_url_wrap_http_ex function in ext/standard/http_fopen_wrapper.c. This subsequently results in copying a large string.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-7584.html">CVE-2018-7584</cve>
<bugzilla href="https://bugzilla.suse.com/1083639">SUSE bug 1083639</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009205787" comment="apache2-mod_php53-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203352" comment="php53-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205788" comment="php53-bcmath-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205789" comment="php53-bz2-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205790" comment="php53-calendar-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205791" comment="php53-ctype-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205792" comment="php53-curl-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205793" comment="php53-dba-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205794" comment="php53-dom-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205795" comment="php53-exif-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205796" comment="php53-fastcgi-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205797" comment="php53-fileinfo-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205798" comment="php53-ftp-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205799" comment="php53-gd-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205800" comment="php53-gettext-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205801" comment="php53-gmp-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205802" comment="php53-iconv-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205803" comment="php53-intl-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205804" comment="php53-json-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205805" comment="php53-ldap-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205806" comment="php53-mbstring-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205807" comment="php53-mcrypt-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205808" comment="php53-mysql-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205809" comment="php53-odbc-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205810" comment="php53-openssl-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205811" comment="php53-pcntl-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205812" comment="php53-pdo-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205813" comment="php53-pear-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205814" comment="php53-pgsql-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205815" comment="php53-pspell-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205816" comment="php53-shmop-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205817" comment="php53-snmp-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205818" comment="php53-soap-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205819" comment="php53-suhosin-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205820" comment="php53-sysvmsg-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205821" comment="php53-sysvsem-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205822" comment="php53-sysvshm-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205823" comment="php53-tokenizer-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205824" comment="php53-wddx-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205825" comment="php53-xmlreader-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205826" comment="php53-xmlrpc-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205827" comment="php53-xmlwriter-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205828" comment="php53-xsl-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205829" comment="php53-zip-5.3.17-112.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205830" comment="php53-zlib-5.3.17-112.20 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7730</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-7730" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7730" source="CVE"/>
    <description>
    An issue was discovered in Exempi through 2.4.4. A certain case of a 0xffffffff length is mishandled in XMPFiles/source/FormatSupport/PSIR_FileWriter.cpp, leading to a heap-based buffer over-read in the PSD_MetaHandler::CacheFileData() function.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-7730.html">CVE-2018-7730</cve>
<bugzilla href="https://bugzilla.suse.com/1085295">SUSE bug 1085295</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1085585">SUSE bug 1085585</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1103718">SUSE bug 1103718</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009230745" comment="exempi-2.0.2-4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009230752" comment="libexempi3-2.0.2-4.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7750</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-7750" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7750" source="CVE"/>
    <description>
    transport.py in the SSH server implementation of Paramiko before 1.17.6, 1.18.x before 1.18.5, 2.0.x before 2.0.8, 2.1.x before 2.1.5, 2.2.x before 2.2.3, 2.3.x before 2.3.2, and 2.4.x before 2.4.1 does not properly check whether authentication is completed before processing other requests, as demonstrated by channel-open. A customized SSH client can simply skip the authentication step.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-7750.html">CVE-2018-7750</cve>
<bugzilla href="https://bugzilla.suse.com/1085276">SUSE bug 1085276</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1111151">SUSE bug 1111151</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250403" comment="python-paramiko-1.13.1-0.3.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7757</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-7757" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757" source="CVE"/>
    <description>
    Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c in the Linux kernel through 4.15.7 allows local users to cause a denial of service (memory consumption) via many read accesses to files in the /sys/class/sas_phy directory, as demonstrated by the /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-7757.html">CVE-2018-7757</cve>
<bugzilla href="https://bugzilla.suse.com/1084536">SUSE bug 1084536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1087209">SUSE bug 1087209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208695" comment="kernel-bigsmp-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208696" comment="kernel-bigsmp-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208697" comment="kernel-bigsmp-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205609" comment="kernel-default-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205610" comment="kernel-default-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205611" comment="kernel-default-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208698" comment="kernel-default-man-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205612" comment="kernel-ec2-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205613" comment="kernel-ec2-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205614" comment="kernel-ec2-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205615" comment="kernel-pae-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205616" comment="kernel-pae-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205617" comment="kernel-pae-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205618" comment="kernel-source-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205619" comment="kernel-syms-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205620" comment="kernel-trace-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205621" comment="kernel-trace-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205622" comment="kernel-trace-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205623" comment="kernel-xen-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205624" comment="kernel-xen-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205625" comment="kernel-xen-devel-3.0.101-0.47.106.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8019</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-8019" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8019" source="CVE"/>
    <description>
    When using an OCSP responder Apache Tomcat Native 1.2.0 to 1.2.16 and 1.1.23 to 1.1.34 did not correctly handle invalid responses. This allowed for revoked client certificates to be incorrectly identified. It was therefore possible for users to authenticate with revoked certificates when using mutual TLS. Users not using OCSP checks are not affected by this vulnerability.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-8019.html">CVE-2018-8019</cve>
<bugzilla href="https://bugzilla.suse.com/1103348">SUSE bug 1103348</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247298" comment="libtcnative-1-0-1.3.4-12.5.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8020</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-8020" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8020" source="CVE"/>
    <description>
    Apache Tomcat Native 1.2.0 to 1.2.16 and 1.1.23 to 1.1.34 has a flaw that does not properly check OCSP pre-produced responses, which are lists (multiple entries) of certificate statuses. Subsequently, revoked client certificates may not be properly identified, allowing for users to authenticate with revoked certificates to connections that require mutual TLS. Users not using OCSP checks are not affected by this vulnerability.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-8020.html">CVE-2018-8020</cve>
<bugzilla href="https://bugzilla.suse.com/1103347">SUSE bug 1103347</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247298" comment="libtcnative-1-0-1.3.4-12.5.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8032</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-8032" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8032" source="CVE"/>
    <description>
    Apache Axis 1.x up to and including 1.4 is vulnerable to a cross-site scripting (XSS) attack in the default servlet/services.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-8032.html">CVE-2018-8032</cve>
<bugzilla href="https://bugzilla.suse.com/1103658">SUSE bug 1103658</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009237105" comment="axis-1.4-236.236.44.9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8740</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-8740" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8740" source="CVE"/>
    <description>
    In SQLite through 3.22.0, databases whose schema is corrupted using a CREATE TABLE AS statement could cause a NULL pointer dereference, related to build.c and prepare.c.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-8740.html">CVE-2018-8740</cve>
<bugzilla href="https://bugzilla.suse.com/1085790">SUSE bug 1085790</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1131919">SUSE bug 1131919</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009252988" comment="libsqlite3-0-3.7.6.3-1.4.7.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009252989" comment="libsqlite3-0-32bit-3.7.6.3-1.4.7.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009252990" comment="sqlite3-3.7.6.3-1.4.7.6 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8804</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-8804" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8804" source="CVE"/>
    <description>
    WriteEPTImage in coders/ept.c in ImageMagick 7.0.7-25 Q16 allows remote attackers to cause a denial of service (MagickCore/memory.c double free and application crash) or possibly have unspecified other impact via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-8804.html">CVE-2018-8804</cve>
<bugzilla href="https://bugzilla.suse.com/1086011">SUSE bug 1086011</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202311" comment="ImageMagick-6.4.3.6-78.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209132" comment="libMagickCore1-6.4.3.6-78.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209133" comment="libMagickCore1-32bit-6.4.3.6-78.40 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8822</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-8822" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822" source="CVE"/>
    <description>
    Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-8822.html">CVE-2018-8822</cve>
<bugzilla href="https://bugzilla.suse.com/1086162">SUSE bug 1086162</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208695" comment="kernel-bigsmp-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208696" comment="kernel-bigsmp-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208697" comment="kernel-bigsmp-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205609" comment="kernel-default-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205610" comment="kernel-default-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205611" comment="kernel-default-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208698" comment="kernel-default-man-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205612" comment="kernel-ec2-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205613" comment="kernel-ec2-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205614" comment="kernel-ec2-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205615" comment="kernel-pae-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205616" comment="kernel-pae-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205617" comment="kernel-pae-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205618" comment="kernel-source-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205619" comment="kernel-syms-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205620" comment="kernel-trace-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205621" comment="kernel-trace-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205622" comment="kernel-trace-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205623" comment="kernel-xen-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205624" comment="kernel-xen-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205625" comment="kernel-xen-devel-3.0.101-0.47.106.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8897</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-8897" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897" source="CVE"/>
    <description>
    A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer's Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL &lt; 3, the debug exception is delivered after the transfer to CPL &lt; 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-8897.html">CVE-2018-8897</cve>
<bugzilla href="https://bugzilla.suse.com/1087078">SUSE bug 1087078</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1087088">SUSE bug 1087088</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1090368">SUSE bug 1090368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1090820">SUSE bug 1090820</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1090869">SUSE bug 1090869</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1092497">SUSE bug 1092497</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1098813">SUSE bug 1098813</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1100835">SUSE bug 1100835</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009208695" comment="kernel-bigsmp-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208696" comment="kernel-bigsmp-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208697" comment="kernel-bigsmp-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205609" comment="kernel-default-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205610" comment="kernel-default-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205611" comment="kernel-default-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009208698" comment="kernel-default-man-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205612" comment="kernel-ec2-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205613" comment="kernel-ec2-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205614" comment="kernel-ec2-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205615" comment="kernel-pae-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205616" comment="kernel-pae-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205617" comment="kernel-pae-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205618" comment="kernel-source-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205619" comment="kernel-syms-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205620" comment="kernel-trace-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205621" comment="kernel-trace-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205622" comment="kernel-trace-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205623" comment="kernel-xen-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205624" comment="kernel-xen-base-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009205625" comment="kernel-xen-devel-3.0.101-0.47.106.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206002" comment="xen-4.2.5_21-45.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209098" comment="xen-doc-html-4.2.5_21-45.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209099" comment="xen-doc-pdf-4.2.5_21-45.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206003" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206004" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.19-45.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206005" comment="xen-libs-4.2.5_21-45.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209100" comment="xen-libs-32bit-4.2.5_21-45.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209101" comment="xen-tools-4.2.5_21-45.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009206006" comment="xen-tools-domU-4.2.5_21-45.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8905</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-8905" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8905" source="CVE"/>
    <description>
    In LibTIFF 4.0.9, a heap-based buffer overflow occurs in the function LZWDecodeCompat in tif_lzw.c via a crafted TIFF file, as demonstrated by tiff2ps.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-8905.html">CVE-2018-8905</cve>
<bugzilla href="https://bugzilla.suse.com/1086408">SUSE bug 1086408</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009229551" comment="libtiff3-3.8.2-141.169.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229568" comment="libtiff3-32bit-3.8.2-141.169.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009229522" comment="tiff-3.8.2-141.169.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8960</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-8960" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8960" source="CVE"/>
    <description>
    The ReadTIFFImage function in coders/tiff.c in ImageMagick 7.0.7-26 Q16 does not properly restrict memory allocation, leading to a heap-based buffer over-read.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-8960.html">CVE-2018-8960</cve>
<bugzilla href="https://bugzilla.suse.com/1086782">SUSE bug 1086782</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202318" comment="ImageMagick-6.4.3.6-78.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209134" comment="libMagickCore1-6.4.3.6-78.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209135" comment="libMagickCore1-32bit-6.4.3.6-78.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9018</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-9018" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018" source="CVE"/>
    <description>
    In GraphicsMagick 1.3.28, there is a divide-by-zero in the ReadMNGImage function of coders/png.c. Remote attackers could leverage this vulnerability to cause a crash and denial of service via a crafted mng file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-9018.html">CVE-2018-9018</cve>
<bugzilla href="https://bugzilla.suse.com/1086773">SUSE bug 1086773</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009202318" comment="ImageMagick-6.4.3.6-78.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209134" comment="libMagickCore1-6.4.3.6-78.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009209135" comment="libMagickCore1-32bit-6.4.3.6-78.45 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189256" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9256</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-9256" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9256" source="CVE"/>
    <description>
    In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, the LWAPP dissector could crash. This was addressed in epan/dissectors/packet-lwapp.c by limiting the encapsulation levels to restrict the recursion depth.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-9256.html">CVE-2018-9256</cve>
<bugzilla href="https://bugzilla.suse.com/1088200">SUSE bug 1088200</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203619" comment="libwireshark8-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203620" comment="libwiretap6-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203621" comment="libwscodecs1-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203622" comment="libwsutil7-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203623" comment="wireshark-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203625" comment="wireshark-gtk-2.2.14-40.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189259" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9259</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-9259" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9259" source="CVE"/>
    <description>
    In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, the MP4 dissector could crash. This was addressed in epan/dissectors/file-mp4.c by restricting the box recursion depth.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-9259.html">CVE-2018-9259</cve>
<bugzilla href="https://bugzilla.suse.com/1088200">SUSE bug 1088200</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203619" comment="libwireshark8-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203620" comment="libwiretap6-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203621" comment="libwscodecs1-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203622" comment="libwsutil7-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203623" comment="wireshark-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203625" comment="wireshark-gtk-2.2.14-40.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189260" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9260</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-9260" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9260" source="CVE"/>
    <description>
    In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, the IEEE 802.15.4 dissector could crash. This was addressed in epan/dissectors/packet-ieee802154.c by ensuring that an allocation step occurs.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-9260.html">CVE-2018-9260</cve>
<bugzilla href="https://bugzilla.suse.com/1088200">SUSE bug 1088200</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203619" comment="libwireshark8-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203620" comment="libwiretap6-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203621" comment="libwscodecs1-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203622" comment="libwsutil7-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203623" comment="wireshark-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203625" comment="wireshark-gtk-2.2.14-40.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9261</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-9261" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9261" source="CVE"/>
    <description>
    In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, the NBAP dissector could crash with a large loop that ends with a heap-based buffer overflow. This was addressed in epan/dissectors/packet-nbap.c by prohibiting the self-linking of DCH-IDs.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-9261.html">CVE-2018-9261</cve>
<bugzilla href="https://bugzilla.suse.com/1088200">SUSE bug 1088200</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203619" comment="libwireshark8-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203620" comment="libwiretap6-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203621" comment="libwscodecs1-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203622" comment="libwsutil7-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203623" comment="wireshark-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203625" comment="wireshark-gtk-2.2.14-40.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9262</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-9262" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9262" source="CVE"/>
    <description>
    In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, the VLAN dissector could crash. This was addressed in epan/dissectors/packet-vlan.c by limiting VLAN tag nesting to restrict the recursion depth.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-9262.html">CVE-2018-9262</cve>
<bugzilla href="https://bugzilla.suse.com/1088200">SUSE bug 1088200</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203619" comment="libwireshark8-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203620" comment="libwiretap6-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203621" comment="libwscodecs1-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203622" comment="libwsutil7-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203623" comment="wireshark-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203625" comment="wireshark-gtk-2.2.14-40.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9263</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-9263" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9263" source="CVE"/>
    <description>
    In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, the Kerberos dissector could crash. This was addressed in epan/dissectors/packet-kerberos.c by ensuring a nonzero key length.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-9263.html">CVE-2018-9263</cve>
<bugzilla href="https://bugzilla.suse.com/1088200">SUSE bug 1088200</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203619" comment="libwireshark8-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203620" comment="libwiretap6-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203621" comment="libwscodecs1-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203622" comment="libwsutil7-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203623" comment="wireshark-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203625" comment="wireshark-gtk-2.2.14-40.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9264</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-9264" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9264" source="CVE"/>
    <description>
    In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, the ADB dissector could crash with a heap-based buffer overflow. This was addressed in epan/dissectors/packet-adb.c by checking for a length inconsistency.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-9264.html">CVE-2018-9264</cve>
<bugzilla href="https://bugzilla.suse.com/1088200">SUSE bug 1088200</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203619" comment="libwireshark8-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203620" comment="libwiretap6-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203621" comment="libwscodecs1-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203622" comment="libwsutil7-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203623" comment="wireshark-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203625" comment="wireshark-gtk-2.2.14-40.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9265</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-9265" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9265" source="CVE"/>
    <description>
    In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, epan/dissectors/packet-tn3270.c has a memory leak.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-9265.html">CVE-2018-9265</cve>
<bugzilla href="https://bugzilla.suse.com/1088200">SUSE bug 1088200</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203619" comment="libwireshark8-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203620" comment="libwiretap6-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203621" comment="libwscodecs1-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203622" comment="libwsutil7-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203623" comment="wireshark-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203625" comment="wireshark-gtk-2.2.14-40.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9266</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-9266" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9266" source="CVE"/>
    <description>
    In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, epan/dissectors/packet-isup.c has a memory leak.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-9266.html">CVE-2018-9266</cve>
<bugzilla href="https://bugzilla.suse.com/1088200">SUSE bug 1088200</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203619" comment="libwireshark8-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203620" comment="libwiretap6-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203621" comment="libwscodecs1-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203622" comment="libwsutil7-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203623" comment="wireshark-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203625" comment="wireshark-gtk-2.2.14-40.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189267" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9267</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-9267" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9267" source="CVE"/>
    <description>
    In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, epan/dissectors/packet-lapd.c has a memory leak.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-9267.html">CVE-2018-9267</cve>
<bugzilla href="https://bugzilla.suse.com/1088200">SUSE bug 1088200</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203619" comment="libwireshark8-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203620" comment="libwiretap6-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203621" comment="libwscodecs1-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203622" comment="libwsutil7-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203623" comment="wireshark-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203625" comment="wireshark-gtk-2.2.14-40.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9268</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-9268" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9268" source="CVE"/>
    <description>
    In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, epan/dissectors/packet-smb2.c has a memory leak.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-9268.html">CVE-2018-9268</cve>
<bugzilla href="https://bugzilla.suse.com/1088200">SUSE bug 1088200</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203619" comment="libwireshark8-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203620" comment="libwiretap6-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203621" comment="libwscodecs1-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203622" comment="libwsutil7-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203623" comment="wireshark-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203625" comment="wireshark-gtk-2.2.14-40.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9269</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-9269" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9269" source="CVE"/>
    <description>
    In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, epan/dissectors/packet-giop.c has a memory leak.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-9269.html">CVE-2018-9269</cve>
<bugzilla href="https://bugzilla.suse.com/1088200">SUSE bug 1088200</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203619" comment="libwireshark8-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203620" comment="libwiretap6-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203621" comment="libwscodecs1-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203622" comment="libwsutil7-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203623" comment="wireshark-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203625" comment="wireshark-gtk-2.2.14-40.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9270</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-9270" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9270" source="CVE"/>
    <description>
    In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, epan/oids.c has a memory leak.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-9270.html">CVE-2018-9270</cve>
<bugzilla href="https://bugzilla.suse.com/1088200">SUSE bug 1088200</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203619" comment="libwireshark8-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203620" comment="libwiretap6-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203621" comment="libwscodecs1-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203622" comment="libwsutil7-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203623" comment="wireshark-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203625" comment="wireshark-gtk-2.2.14-40.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9271</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-9271" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9271" source="CVE"/>
    <description>
    In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, epan/dissectors/packet-multipart.c has a memory leak.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-9271.html">CVE-2018-9271</cve>
<bugzilla href="https://bugzilla.suse.com/1088200">SUSE bug 1088200</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203619" comment="libwireshark8-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203620" comment="libwiretap6-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203621" comment="libwscodecs1-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203622" comment="libwsutil7-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203623" comment="wireshark-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203625" comment="wireshark-gtk-2.2.14-40.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9272</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-9272" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9272" source="CVE"/>
    <description>
    In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, epan/dissectors/packet-h223.c has a memory leak.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-9272.html">CVE-2018-9272</cve>
<bugzilla href="https://bugzilla.suse.com/1088200">SUSE bug 1088200</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203619" comment="libwireshark8-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203620" comment="libwiretap6-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203621" comment="libwscodecs1-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203622" comment="libwsutil7-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203623" comment="wireshark-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203625" comment="wireshark-gtk-2.2.14-40.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9273</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-9273" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9273" source="CVE"/>
    <description>
    In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, epan/dissectors/packet-pcp.c has a memory leak.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-9273.html">CVE-2018-9273</cve>
<bugzilla href="https://bugzilla.suse.com/1088200">SUSE bug 1088200</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203619" comment="libwireshark8-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203620" comment="libwiretap6-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203621" comment="libwscodecs1-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203622" comment="libwsutil7-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203623" comment="wireshark-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203625" comment="wireshark-gtk-2.2.14-40.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9274</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-9274" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9274" source="CVE"/>
    <description>
    In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, ui/failure_message.c has a memory leak.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-9274.html">CVE-2018-9274</cve>
<bugzilla href="https://bugzilla.suse.com/1088200">SUSE bug 1088200</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009203619" comment="libwireshark8-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203620" comment="libwiretap6-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203621" comment="libwscodecs1-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203622" comment="libwsutil7-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203623" comment="wireshark-2.2.14-40.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009203625" comment="wireshark-gtk-2.2.14-40.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9516</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-9516" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9516" source="CVE"/>
    <description>
    In hid_debug_events_read of drivers/hid/hid-debug.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-71361580.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-9516.html">CVE-2018-9516</cve>
<bugzilla href="https://bugzilla.suse.com/1108498">SUSE bug 1108498</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123161">SUSE bug 1123161</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009243428" comment="kernel-bigsmp-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243429" comment="kernel-bigsmp-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243430" comment="kernel-bigsmp-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243411" comment="kernel-default-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243412" comment="kernel-default-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243413" comment="kernel-default-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243431" comment="kernel-default-man-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243414" comment="kernel-ec2-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243415" comment="kernel-ec2-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243416" comment="kernel-ec2-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243417" comment="kernel-pae-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243418" comment="kernel-pae-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243419" comment="kernel-pae-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243420" comment="kernel-source-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243421" comment="kernel-syms-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243422" comment="kernel-trace-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243423" comment="kernel-trace-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243424" comment="kernel-trace-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243425" comment="kernel-xen-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243426" comment="kernel-xen-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243427" comment="kernel-xen-devel-3.0.101-0.47.106.59 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2018-9568" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9568" source="CVE"/>
    <description>
    In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-113509306. References: Upstream kernel.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2018-9568.html">CVE-2018-9568</cve>
<bugzilla href="https://bugzilla.suse.com/1118319">SUSE bug 1118319</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1118320">SUSE bug 1118320</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009243428" comment="kernel-bigsmp-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243429" comment="kernel-bigsmp-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243430" comment="kernel-bigsmp-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243411" comment="kernel-default-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243412" comment="kernel-default-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243413" comment="kernel-default-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243431" comment="kernel-default-man-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243414" comment="kernel-ec2-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243415" comment="kernel-ec2-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243416" comment="kernel-ec2-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243417" comment="kernel-pae-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243418" comment="kernel-pae-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243419" comment="kernel-pae-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243420" comment="kernel-source-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243421" comment="kernel-syms-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243422" comment="kernel-trace-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243423" comment="kernel-trace-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243424" comment="kernel-trace-devel-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243425" comment="kernel-xen-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243426" comment="kernel-xen-base-3.0.101-0.47.106.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009243427" comment="kernel-xen-devel-3.0.101-0.47.106.59 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20190217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-0217</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-0217" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0217" source="CVE"/>
    <description>
    In Apache HTTP Server 2.4 release 2.4.38 and prior, a race condition in mod_auth_digest when running in a threaded server could allow a user with valid credentials to authenticate using another username, bypassing configured access control restrictions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-0217.html">CVE-2019-0217</cve>
<bugzilla href="https://bugzilla.suse.com/1131239">SUSE bug 1131239</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009247012" comment="apache2-2.2.34-70.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247014" comment="apache2-doc-2.2.34-70.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247015" comment="apache2-example-pages-2.2.34-70.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247016" comment="apache2-prefork-2.2.34-70.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247017" comment="apache2-utils-2.2.34-70.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247018" comment="apache2-worker-2.2.34-70.18 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20190220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-0220</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-0220" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0220" source="CVE"/>
    <description>
    A vulnerability was found in Apache HTTP Server 2.4.0 to 2.4.38. When the path component of a request URL contains multiple consecutive slashes ('/'), directives such as LocationMatch and RewriteRule must account for duplicates in regular expressions while other aspects of the servers processing will implicitly collapse them.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-0220.html">CVE-2019-0220</cve>
<bugzilla href="https://bugzilla.suse.com/1131241">SUSE bug 1131241</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009247012" comment="apache2-2.2.34-70.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247014" comment="apache2-doc-2.2.34-70.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247015" comment="apache2-example-pages-2.2.34-70.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247016" comment="apache2-prefork-2.2.34-70.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247017" comment="apache2-utils-2.2.34-70.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247018" comment="apache2-worker-2.2.34-70.18 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10092</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-10092" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10092" source="CVE"/>
    <description>
    In Apache HTTP Server 2.4.0-2.4.39, a limited cross-site scripting issue was reported affecting the mod_proxy error page. An attacker could cause the link on the error page to be malformed and instead point to a page of their choice. This would only be exploitable where a server was set up with proxying enabled but was misconfigured in such a way that the Proxy Error page was displayed.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-10092.html">CVE-2019-10092</cve>
<bugzilla href="https://bugzilla.suse.com/1145740">SUSE bug 1145740</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009264578" comment="apache2-2.2.34-70.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264579" comment="apache2-doc-2.2.34-70.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264580" comment="apache2-example-pages-2.2.34-70.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264581" comment="apache2-prefork-2.2.34-70.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264582" comment="apache2-utils-2.2.34-70.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264583" comment="apache2-worker-2.2.34-70.21 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10098</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-10098" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10098" source="CVE"/>
    <description>
    In Apache HTTP server 2.4.0 to 2.4.39, Redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an unexpected URL within the request URL.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-10098.html">CVE-2019-10098</cve>
<bugzilla href="https://bugzilla.suse.com/1145738">SUSE bug 1145738</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009264578" comment="apache2-2.2.34-70.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264579" comment="apache2-doc-2.2.34-70.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264580" comment="apache2-example-pages-2.2.34-70.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264581" comment="apache2-prefork-2.2.34-70.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264582" comment="apache2-utils-2.2.34-70.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264583" comment="apache2-worker-2.2.34-70.21 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191010006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1010006</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-1010006" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010006" source="CVE"/>
    <description>
    Evince 3.26.0 is affected by buffer overflow. The impact is: DOS / Possible code execution. The component is: backend/tiff/tiff-document.c. The attack vector is: Victim must open a crafted PDF file. The issue occurs because of an incorrect integer overflow protection mechanism in tiff_document_render and tiff_document_get_thumbnail.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-1010006.html">CVE-2019-1010006</cve>
<bugzilla href="https://bugzilla.suse.com/1141619">SUSE bug 1141619</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009261354" comment="evince-2.28.2-0.7.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009261355" comment="evince-doc-2.28.2-0.7.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009261356" comment="evince-lang-2.28.2-0.7.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191010180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1010180</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-1010180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010180" source="CVE"/>
    <description>
    GNU gdb All versions is affected by: Buffer Overflow - Out of bound memory access. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution. The component is: The main gdb module. The attack vector is: Open an ELF for debugging. The fixed version is: Not fixed yet.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-1010180.html">CVE-2019-1010180</cve>
<bugzilla href="https://bugzilla.suse.com/1142772">SUSE bug 1142772</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009262813" comment="gdb-7.5.1-0.9.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10130</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-10130" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10130" source="CVE"/>
    <description>
    A vulnerability was found in PostgreSQL versions 11.x up to excluding 11.3, 10.x up to excluding 10.8, 9.6.x up to, excluding 9.6.13, 9.5.x up to, excluding 9.5.17. PostgreSQL maintains column statistics for tables. Certain statistics, such as histograms and lists of most common values, contain values taken from the column. PostgreSQL does not evaluate row security policies before consulting those statistics during query planning; an attacker can exploit this to read the most common values of certain columns. Affected columns are those for which the attacker has SELECT privilege and for which, in an ordinary query, row-level security prunes the set of rows visible to the attacker.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-10130.html">CVE-2019-10130</cve>
<bugzilla href="https://bugzilla.suse.com/1134689">SUSE bug 1134689</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009257190" comment="libecpg6-10.8-0.2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009257191" comment="libpq5-10.8-0.2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009257192" comment="libpq5-32bit-10.8-0.2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009257193" comment="postgresql10-10.8-0.2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009257194" comment="postgresql10-contrib-10.8-0.2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009257195" comment="postgresql10-docs-10.8-0.2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009257196" comment="postgresql10-libs-10.8-0.2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009257197" comment="postgresql10-server-10.8-0.2.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10131</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-10131" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10131" source="CVE"/>
    <description>
    An off-by-one read vulnerability was discovered in ImageMagick before version 7.0.7-28 in the formatIPTCfromBuffer function in coders/meta.c. A local attacker may use this flaw to read beyond the end of the buffer or to crash the program.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-10131.html">CVE-2019-10131</cve>
<bugzilla href="https://bugzilla.suse.com/1134075">SUSE bug 1134075</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009257059" comment="ImageMagick-6.4.3.6-78.106 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009257060" comment="libMagickCore1-6.4.3.6-78.106 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009257061" comment="libMagickCore1-32bit-6.4.3.6-78.106 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10136</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS</platform>
    </affected>
    <reference ref_id="CVE-2019-10136" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10136" source="CVE"/>
    <description>
    It was found that Spacewalk, all versions through 2.9, did not safely compute client token checksums. An attacker with a valid, but expired, authenticated set of headers could move some digits around, artificially extending the session validity without modifying the checksum.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-10136.html">CVE-2019-10136</cve>
<bugzilla href="https://bugzilla.suse.com/1136480">SUSE bug 1136480</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009263758" comment="mgr-cfg-4.0.9-5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263759" comment="mgr-cfg-actions-4.0.9-5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263760" comment="mgr-cfg-client-4.0.9-5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263761" comment="mgr-cfg-management-4.0.9-5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263762" comment="mgr-daemon-4.0.7-5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263763" comment="mgr-osad-4.0.9-5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263764" comment="mgr-virtualization-4.0.8-5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263765" comment="mgr-virtualization-host-4.0.8-5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263766" comment="python2-mgr-cfg-4.0.9-5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263767" comment="python2-mgr-cfg-actions-4.0.9-5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263768" comment="python2-mgr-cfg-client-4.0.9-5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263769" comment="python2-mgr-cfg-management-4.0.9-5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263770" comment="python2-mgr-osa-common-4.0.9-5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263771" comment="python2-mgr-osad-4.0.9-5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263772" comment="python2-mgr-virtualization-common-4.0.8-5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263773" comment="python2-mgr-virtualization-host-4.0.8-5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263774" comment="python2-rhnlib-4.0.11-12.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263775" comment="rhnlib-4.0.11-12.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263776" comment="spacecmd-4.0.14-18.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263777" comment="spacewalk-backend-4.0.25-28.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263778" comment="spacewalk-backend-libs-4.0.25-28.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263779" comment="spacewalk-remote-utils-4.0.5-6.12 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10160</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-10160" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10160" source="CVE"/>
    <description>
    A security regression of CVE-2019-9636 was discovered in python since commit d537ab0ff9767ef024f26246899728f0116b1ec3 affecting versions 2.7, 3.5, 3.6, 3.7 and from v3.8.0a4 through v3.8.0b1, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL. When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it is possible for an attacker to provide specially crafted URLs to make the application locate host-related information (e.g. cookies, authentication data) and send them to a different host than where it should, unlike if the URLs had been correctly parsed. The result of an attack may vary based on the application.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-10160.html">CVE-2019-10160</cve>
<bugzilla href="https://bugzilla.suse.com/1138459">SUSE bug 1138459</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009261357" comment="libpython2_6-1_0-2.6.9-40.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009261371" comment="libpython2_6-1_0-32bit-2.6.9-40.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009261358" comment="python-2.6.9-40.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009261372" comment="python-32bit-2.6.9-40.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009261359" comment="python-base-2.6.9-40.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009261373" comment="python-base-32bit-2.6.9-40.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009261360" comment="python-curses-2.6.9-40.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009261361" comment="python-demo-2.6.9-40.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009261362" comment="python-doc-2.6-8.40.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009261363" comment="python-doc-pdf-2.6-8.40.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009261364" comment="python-gdbm-2.6.9-40.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009261365" comment="python-idle-2.6.9-40.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009261366" comment="python-tk-2.6.9-40.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009261367" comment="python-xml-2.6.9-40.29 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10161</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-10161" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10161" source="CVE"/>
    <description>
    It was discovered that libvirtd before versions 4.10.1 and 5.4.1 would permit read-only clients to use the virDomainSaveImageGetXMLDesc() API, specifying an arbitrary path which would be accessed with the permissions of the libvirtd process. An attacker with access to the libvirtd socket could use this to probe the existence of arbitrary files, cause denial of service or cause libvirtd to execute arbitrary programs.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-10161.html">CVE-2019-10161</cve>
<bugzilla href="https://bugzilla.suse.com/1138301">SUSE bug 1138301</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009257950" comment="libvirt-1.0.5.9-21.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009257951" comment="libvirt-client-1.0.5.9-21.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258011" comment="libvirt-client-32bit-1.0.5.9-21.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009257952" comment="libvirt-doc-1.0.5.9-21.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009257953" comment="libvirt-lock-sanlock-1.0.5.9-21.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009257954" comment="libvirt-python-1.0.5.9-21.20 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10164</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-10164" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10164" source="CVE"/>
    <description>
    PostgreSQL versions 10.x before 10.9 and versions 11.x before 11.4 are vulnerable to a stack-based buffer overflow. Any authenticated user can overflow a stack-based buffer by changing the user's own password to a purpose-crafted value. This often suffices to execute arbitrary code as the PostgreSQL operating system account.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-10164.html">CVE-2019-10164</cve>
<bugzilla href="https://bugzilla.suse.com/1138034">SUSE bug 1138034</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009258003" comment="libecpg6-10.9-0.2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258004" comment="libpq5-10.9-0.2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258005" comment="libpq5-32bit-10.9-0.2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258006" comment="postgresql10-10.9-0.2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258007" comment="postgresql10-contrib-10.9-0.2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258008" comment="postgresql10-docs-10.9-0.2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258009" comment="postgresql10-libs-10.9-0.2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258010" comment="postgresql10-server-10.9-0.2.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10208</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-10208" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10208" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-10208.html">CVE-2019-10208</cve>
<bugzilla href="https://bugzilla.suse.com/1145092">SUSE bug 1145092</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009262486" comment="libecpg6-10.10-0.2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009262487" comment="libpq5-10.10-0.2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009262488" comment="libpq5-32bit-10.10-0.2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009262489" comment="postgresql10-10.10-0.2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009262490" comment="postgresql10-contrib-10.10-0.2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009262491" comment="postgresql10-docs-10.10-0.2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009262492" comment="postgresql10-libs-10.10-0.2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009262493" comment="postgresql10-server-10.10-0.2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009262494" comment="postgresql94-9.4.24-0.23.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009262495" comment="postgresql94-contrib-9.4.24-0.23.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009262496" comment="postgresql94-docs-9.4.24-0.23.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009262497" comment="postgresql94-server-9.4.24-0.23.22 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10245</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-10245" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10245" source="CVE"/>
    <description>
    In Eclipse OpenJ9 prior to the 0.14.0 release, the Java bytecode verifier incorrectly allows a method to execute past the end of bytecode array causing crashes. Eclipse OpenJ9 v0.14.0 correctly detects this case and rejects the attempted class load.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-10245.html">CVE-2019-10245</cve>
<bugzilla href="https://bugzilla.suse.com/1134718">SUSE bug 1134718</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009254109" comment="java-1_7_0-ibm-1.7.0_sr10.45-65.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254110" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.45-65.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254111" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.45-65.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254112" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.45-65.39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10650</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-10650" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10650" source="CVE"/>
    <description>
    In ImageMagick 7.0.8-36 Q16, there is a heap-based buffer over-read in the function WriteTIFFImage of coders/tiff.c, which allows an attacker to cause a denial of service or information disclosure via a crafted image file.
    </description>
<advisory from="security@suse.de">
<cve href="https://www.suse.com/security/cve/CVE-2019-10650.html">CVE-2019-10650</cve>
<bugzilla href="https://bugzilla.suse.com/1131317">SUSE bug 1131317</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009253268" comment="ImageMagick-6.4.3.6-78.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253269" comment="libMagickCore1-6.4.3.6-78.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253270" comment="libMagickCore1-32bit-6.4.3.6-78.97 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11007</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-11007" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11007" source="CVE"/>
    <description>
    In GraphicsMagick 1.4 snapshot-20190322 Q8, there is a heap-based buffer over-read in the ReadMNGImage function of coders/png.c, which allows attackers to cause a denial of service or information disclosure via an image colormap.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-11007.html">CVE-2019-11007</cve>
<bugzilla href="https://bugzilla.suse.com/1132060">SUSE bug 1132060</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009253268" comment="ImageMagick-6.4.3.6-78.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253269" comment="libMagickCore1-6.4.3.6-78.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253270" comment="libMagickCore1-32bit-6.4.3.6-78.97 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11009</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-11009" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11009" source="CVE"/>
    <description>
    In GraphicsMagick 1.4 snapshot-20190322 Q8, there is a heap-based buffer over-read in the function ReadXWDImage of coders/xwd.c, which allows attackers to cause a denial of service or information disclosure via a crafted image file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-11009.html">CVE-2019-11009</cve>
<bugzilla href="https://bugzilla.suse.com/1132053">SUSE bug 1132053</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1133202">SUSE bug 1133202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1133203">SUSE bug 1133203</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009253268" comment="ImageMagick-6.4.3.6-78.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253269" comment="libMagickCore1-6.4.3.6-78.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253270" comment="libMagickCore1-32bit-6.4.3.6-78.97 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11034</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-11034" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11034" source="CVE"/>
    <description>
    When processing certain files, PHP EXIF extension in versions 7.1.x below 7.1.28, 7.2.x below 7.2.17 and 7.3.x below 7.3.4 can be caused to read past allocated buffer in exif_process_IFD_TAG function. This may lead to information disclosure or crash.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-11034.html">CVE-2019-11034</cve>
<bugzilla href="https://bugzilla.suse.com/1132838">SUSE bug 1132838</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009254005" comment="apache2-mod_php53-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254006" comment="php53-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254007" comment="php53-bcmath-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254008" comment="php53-bz2-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254009" comment="php53-calendar-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254010" comment="php53-ctype-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254011" comment="php53-curl-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254012" comment="php53-dba-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254013" comment="php53-dom-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254014" comment="php53-exif-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254015" comment="php53-fastcgi-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254016" comment="php53-fileinfo-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254017" comment="php53-ftp-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254018" comment="php53-gd-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254019" comment="php53-gettext-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254020" comment="php53-gmp-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254021" comment="php53-iconv-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254022" comment="php53-intl-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254023" comment="php53-json-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254024" comment="php53-ldap-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254025" comment="php53-mbstring-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254026" comment="php53-mcrypt-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254027" comment="php53-mysql-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254028" comment="php53-odbc-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254029" comment="php53-openssl-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254030" comment="php53-pcntl-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254031" comment="php53-pdo-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254032" comment="php53-pear-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254033" comment="php53-pgsql-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254034" comment="php53-pspell-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254035" comment="php53-shmop-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254036" comment="php53-snmp-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254037" comment="php53-soap-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254038" comment="php53-suhosin-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254039" comment="php53-sysvmsg-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254040" comment="php53-sysvsem-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254041" comment="php53-sysvshm-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254042" comment="php53-tokenizer-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254043" comment="php53-wddx-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254044" comment="php53-xmlreader-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254045" comment="php53-xmlrpc-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254046" comment="php53-xmlwriter-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254047" comment="php53-xsl-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254048" comment="php53-zip-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254049" comment="php53-zlib-5.3.17-112.63 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11035</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-11035" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11035" source="CVE"/>
    <description>
    When processing certain files, PHP EXIF extension in versions 7.1.x below 7.1.28, 7.2.x below 7.2.17 and 7.3.x below 7.3.4 can be caused to read past allocated buffer in exif_iif_add_value function. This may lead to information disclosure or crash.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-11035.html">CVE-2019-11035</cve>
<bugzilla href="https://bugzilla.suse.com/1132837">SUSE bug 1132837</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009254005" comment="apache2-mod_php53-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254006" comment="php53-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254007" comment="php53-bcmath-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254008" comment="php53-bz2-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254009" comment="php53-calendar-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254010" comment="php53-ctype-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254011" comment="php53-curl-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254012" comment="php53-dba-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254013" comment="php53-dom-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254014" comment="php53-exif-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254015" comment="php53-fastcgi-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254016" comment="php53-fileinfo-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254017" comment="php53-ftp-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254018" comment="php53-gd-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254019" comment="php53-gettext-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254020" comment="php53-gmp-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254021" comment="php53-iconv-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254022" comment="php53-intl-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254023" comment="php53-json-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254024" comment="php53-ldap-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254025" comment="php53-mbstring-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254026" comment="php53-mcrypt-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254027" comment="php53-mysql-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254028" comment="php53-odbc-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254029" comment="php53-openssl-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254030" comment="php53-pcntl-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254031" comment="php53-pdo-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254032" comment="php53-pear-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254033" comment="php53-pgsql-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254034" comment="php53-pspell-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254035" comment="php53-shmop-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254036" comment="php53-snmp-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254037" comment="php53-soap-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254038" comment="php53-suhosin-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254039" comment="php53-sysvmsg-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254040" comment="php53-sysvsem-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254041" comment="php53-sysvshm-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254042" comment="php53-tokenizer-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254043" comment="php53-wddx-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254044" comment="php53-xmlreader-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254045" comment="php53-xmlrpc-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254046" comment="php53-xmlwriter-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254047" comment="php53-xsl-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254048" comment="php53-zip-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254049" comment="php53-zlib-5.3.17-112.63 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911036" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11036</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-11036" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11036" source="CVE"/>
    <description>
    When processing certain files, PHP EXIF extension in versions 7.1.x below 7.1.29, 7.2.x below 7.2.18 and 7.3.x below 7.3.5 can be caused to read past allocated buffer in exif_process_IFD_TAG function. This may lead to information disclosure or crash.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-11036.html">CVE-2019-11036</cve>
<bugzilla href="https://bugzilla.suse.com/1134322">SUSE bug 1134322</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009254005" comment="apache2-mod_php53-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254006" comment="php53-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254007" comment="php53-bcmath-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254008" comment="php53-bz2-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254009" comment="php53-calendar-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254010" comment="php53-ctype-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254011" comment="php53-curl-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254012" comment="php53-dba-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254013" comment="php53-dom-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254014" comment="php53-exif-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254015" comment="php53-fastcgi-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254016" comment="php53-fileinfo-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254017" comment="php53-ftp-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254018" comment="php53-gd-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254019" comment="php53-gettext-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254020" comment="php53-gmp-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254021" comment="php53-iconv-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254022" comment="php53-intl-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254023" comment="php53-json-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254024" comment="php53-ldap-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254025" comment="php53-mbstring-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254026" comment="php53-mcrypt-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254027" comment="php53-mysql-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254028" comment="php53-odbc-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254029" comment="php53-openssl-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254030" comment="php53-pcntl-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254031" comment="php53-pdo-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254032" comment="php53-pear-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254033" comment="php53-pgsql-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254034" comment="php53-pspell-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254035" comment="php53-shmop-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254036" comment="php53-snmp-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254037" comment="php53-soap-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254038" comment="php53-suhosin-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254039" comment="php53-sysvmsg-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254040" comment="php53-sysvsem-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254041" comment="php53-sysvshm-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254042" comment="php53-tokenizer-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254043" comment="php53-wddx-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254044" comment="php53-xmlreader-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254045" comment="php53-xmlrpc-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254046" comment="php53-xmlwriter-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254047" comment="php53-xsl-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254048" comment="php53-zip-5.3.17-112.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254049" comment="php53-zlib-5.3.17-112.63 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11038</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-11038" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11038" source="CVE"/>
    <description>
    When using the gdImageCreateFromXbm() function in the GD Graphics Library (aka LibGD) 2.2.5, as used in the PHP GD extension in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6, it is possible to supply data that will cause the function to use the value of uninitialized variable. This may lead to disclosing contents of the stack that has been left there by previous code.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-11038.html">CVE-2019-11038</cve>
<bugzilla href="https://bugzilla.suse.com/1140118">SUSE bug 1140118</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1140120">SUSE bug 1140120</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009263528" comment="apache2-mod_php53-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263529" comment="php53-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263530" comment="php53-bcmath-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263531" comment="php53-bz2-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263532" comment="php53-calendar-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263533" comment="php53-ctype-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263534" comment="php53-curl-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263535" comment="php53-dba-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263536" comment="php53-dom-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263537" comment="php53-exif-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263538" comment="php53-fastcgi-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263539" comment="php53-fileinfo-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263540" comment="php53-ftp-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263541" comment="php53-gd-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263542" comment="php53-gettext-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263543" comment="php53-gmp-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263544" comment="php53-iconv-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263545" comment="php53-intl-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263546" comment="php53-json-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263547" comment="php53-ldap-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263548" comment="php53-mbstring-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263549" comment="php53-mcrypt-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263550" comment="php53-mysql-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263551" comment="php53-odbc-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263552" comment="php53-openssl-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263553" comment="php53-pcntl-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263554" comment="php53-pdo-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263555" comment="php53-pear-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263556" comment="php53-pgsql-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263557" comment="php53-pspell-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263558" comment="php53-shmop-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263559" comment="php53-snmp-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263560" comment="php53-soap-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263561" comment="php53-suhosin-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263562" comment="php53-sysvmsg-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263563" comment="php53-sysvsem-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263564" comment="php53-sysvshm-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263565" comment="php53-tokenizer-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263566" comment="php53-wddx-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263567" comment="php53-xmlreader-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263568" comment="php53-xmlrpc-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263569" comment="php53-xmlwriter-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263570" comment="php53-xsl-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263571" comment="php53-zip-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263572" comment="php53-zlib-5.3.17-112.71 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11039</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-11039" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11039" source="CVE"/>
    <description>
    Function iconv_mime_decode_headers() in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6 may perform out-of-buffer read due to integer overflow when parsing MIME headers. This may lead to information disclosure or crash.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-11039.html">CVE-2019-11039</cve>
<bugzilla href="https://bugzilla.suse.com/1138173">SUSE bug 1138173</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009258877" comment="apache2-mod_php53-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258878" comment="php53-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258879" comment="php53-bcmath-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258880" comment="php53-bz2-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258881" comment="php53-calendar-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258882" comment="php53-ctype-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258883" comment="php53-curl-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258884" comment="php53-dba-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258885" comment="php53-dom-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258886" comment="php53-exif-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258887" comment="php53-fastcgi-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258888" comment="php53-fileinfo-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258889" comment="php53-ftp-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258890" comment="php53-gd-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258891" comment="php53-gettext-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258892" comment="php53-gmp-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258893" comment="php53-iconv-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258894" comment="php53-intl-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258895" comment="php53-json-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258896" comment="php53-ldap-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258897" comment="php53-mbstring-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258898" comment="php53-mcrypt-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258899" comment="php53-mysql-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258900" comment="php53-odbc-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258901" comment="php53-openssl-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258902" comment="php53-pcntl-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258903" comment="php53-pdo-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258904" comment="php53-pear-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258905" comment="php53-pgsql-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258906" comment="php53-pspell-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258907" comment="php53-shmop-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258908" comment="php53-snmp-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258909" comment="php53-soap-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258910" comment="php53-suhosin-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258911" comment="php53-sysvmsg-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258912" comment="php53-sysvsem-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258913" comment="php53-sysvshm-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258914" comment="php53-tokenizer-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258915" comment="php53-wddx-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258916" comment="php53-xmlreader-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258917" comment="php53-xmlrpc-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258918" comment="php53-xmlwriter-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258919" comment="php53-xsl-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258920" comment="php53-zip-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258921" comment="php53-zlib-5.3.17-112.66 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11040</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-11040" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11040" source="CVE"/>
    <description>
    When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-11040.html">CVE-2019-11040</cve>
<bugzilla href="https://bugzilla.suse.com/1138172">SUSE bug 1138172</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009258877" comment="apache2-mod_php53-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258878" comment="php53-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258879" comment="php53-bcmath-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258880" comment="php53-bz2-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258881" comment="php53-calendar-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258882" comment="php53-ctype-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258883" comment="php53-curl-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258884" comment="php53-dba-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258885" comment="php53-dom-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258886" comment="php53-exif-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258887" comment="php53-fastcgi-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258888" comment="php53-fileinfo-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258889" comment="php53-ftp-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258890" comment="php53-gd-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258891" comment="php53-gettext-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258892" comment="php53-gmp-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258893" comment="php53-iconv-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258894" comment="php53-intl-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258895" comment="php53-json-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258896" comment="php53-ldap-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258897" comment="php53-mbstring-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258898" comment="php53-mcrypt-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258899" comment="php53-mysql-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258900" comment="php53-odbc-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258901" comment="php53-openssl-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258902" comment="php53-pcntl-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258903" comment="php53-pdo-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258904" comment="php53-pear-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258905" comment="php53-pgsql-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258906" comment="php53-pspell-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258907" comment="php53-shmop-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258908" comment="php53-snmp-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258909" comment="php53-soap-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258910" comment="php53-suhosin-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258911" comment="php53-sysvmsg-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258912" comment="php53-sysvsem-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258913" comment="php53-sysvshm-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258914" comment="php53-tokenizer-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258915" comment="php53-wddx-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258916" comment="php53-xmlreader-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258917" comment="php53-xmlrpc-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258918" comment="php53-xmlwriter-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258919" comment="php53-xsl-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258920" comment="php53-zip-5.3.17-112.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258921" comment="php53-zlib-5.3.17-112.66 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11041</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-11041" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11041" source="CVE"/>
    <description>
    When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.1.x below 7.1.31, 7.2.x below 7.2.21 and 7.3.x below 7.3.8 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-11041.html">CVE-2019-11041</cve>
<bugzilla href="https://bugzilla.suse.com/1146360">SUSE bug 1146360</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009263528" comment="apache2-mod_php53-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263529" comment="php53-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263530" comment="php53-bcmath-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263531" comment="php53-bz2-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263532" comment="php53-calendar-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263533" comment="php53-ctype-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263534" comment="php53-curl-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263535" comment="php53-dba-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263536" comment="php53-dom-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263537" comment="php53-exif-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263538" comment="php53-fastcgi-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263539" comment="php53-fileinfo-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263540" comment="php53-ftp-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263541" comment="php53-gd-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263542" comment="php53-gettext-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263543" comment="php53-gmp-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263544" comment="php53-iconv-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263545" comment="php53-intl-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263546" comment="php53-json-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263547" comment="php53-ldap-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263548" comment="php53-mbstring-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263549" comment="php53-mcrypt-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263550" comment="php53-mysql-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263551" comment="php53-odbc-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263552" comment="php53-openssl-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263553" comment="php53-pcntl-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263554" comment="php53-pdo-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263555" comment="php53-pear-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263556" comment="php53-pgsql-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263557" comment="php53-pspell-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263558" comment="php53-shmop-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263559" comment="php53-snmp-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263560" comment="php53-soap-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263561" comment="php53-suhosin-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263562" comment="php53-sysvmsg-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263563" comment="php53-sysvsem-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263564" comment="php53-sysvshm-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263565" comment="php53-tokenizer-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263566" comment="php53-wddx-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263567" comment="php53-xmlreader-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263568" comment="php53-xmlrpc-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263569" comment="php53-xmlwriter-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263570" comment="php53-xsl-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263571" comment="php53-zip-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263572" comment="php53-zlib-5.3.17-112.71 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11042</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-11042" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11042" source="CVE"/>
    <description>
    When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.1.x below 7.1.31, 7.2.x below 7.2.21 and 7.3.x below 7.3.8 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-11042.html">CVE-2019-11042</cve>
<bugzilla href="https://bugzilla.suse.com/1145095">SUSE bug 1145095</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009263528" comment="apache2-mod_php53-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263529" comment="php53-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263530" comment="php53-bcmath-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263531" comment="php53-bz2-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263532" comment="php53-calendar-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263533" comment="php53-ctype-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263534" comment="php53-curl-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263535" comment="php53-dba-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263536" comment="php53-dom-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263537" comment="php53-exif-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263538" comment="php53-fastcgi-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263539" comment="php53-fileinfo-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263540" comment="php53-ftp-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263541" comment="php53-gd-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263542" comment="php53-gettext-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263543" comment="php53-gmp-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263544" comment="php53-iconv-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263545" comment="php53-intl-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263546" comment="php53-json-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263547" comment="php53-ldap-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263548" comment="php53-mbstring-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263549" comment="php53-mcrypt-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263550" comment="php53-mysql-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263551" comment="php53-odbc-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263552" comment="php53-openssl-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263553" comment="php53-pcntl-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263554" comment="php53-pdo-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263555" comment="php53-pear-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263556" comment="php53-pgsql-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263557" comment="php53-pspell-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263558" comment="php53-shmop-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263559" comment="php53-snmp-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263560" comment="php53-soap-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263561" comment="php53-suhosin-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263562" comment="php53-sysvmsg-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263563" comment="php53-sysvsem-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263564" comment="php53-sysvshm-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263565" comment="php53-tokenizer-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263566" comment="php53-wddx-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263567" comment="php53-xmlreader-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263568" comment="php53-xmlrpc-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263569" comment="php53-xmlwriter-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263570" comment="php53-xsl-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263571" comment="php53-zip-5.3.17-112.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263572" comment="php53-zlib-5.3.17-112.71 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11068</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-11068" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11068" source="CVE"/>
    <description>
    libxslt through 1.1.33 allows bypass of a protection mechanism because callers of xsltCheckRead and xsltCheckWrite permit access even upon receiving a -1 error code. xsltCheckRead can return -1 for a crafted URL that is not actually invalid and is subsequently loaded.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-11068.html">CVE-2019-11068</cve>
<bugzilla href="https://bugzilla.suse.com/1132160">SUSE bug 1132160</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009253696" comment="libxslt-1.1.24-19.34.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253697" comment="libxslt-32bit-1.1.24-19.34.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11091</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-11091" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091" source="CVE"/>
    <description>
    Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-11091.html">CVE-2019-11091</cve>
<bugzilla href="https://bugzilla.suse.com/1103186">SUSE bug 1103186</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1132686">SUSE bug 1132686</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1133319">SUSE bug 1133319</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1135394">SUSE bug 1135394</bugzilla>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:201911190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11190</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-11190" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11190" source="CVE"/>
    <description>
    The Linux kernel before 4.8 allows local users to bypass ASLR on setuid programs (such as /bin/su) because install_exec_creds() is called too late in load_elf_binary() in fs/binfmt_elf.c, and thus the ptrace_may_access() check has a race condition when reading /proc/pid/stat.
    </description>
<advisory from="security@suse.de">
<cve href="https://www.suse.com/security/cve/CVE-2019-11190.html">CVE-2019-11190</cve>
<bugzilla href="https://bugzilla.suse.com/1131543">SUSE bug 1131543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1132374">SUSE bug 1132374</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1132472">SUSE bug 1132472</bugzilla>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:20191125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1125</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-1125" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1125" source="CVE"/>
    <description>
    An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory, aka 'Windows Kernel Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1071, CVE-2019-1073.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-1125.html">CVE-2019-1125</cve>
<bugzilla href="https://bugzilla.suse.com/1139358">SUSE bug 1139358</bugzilla>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:201911365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11365</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-11365" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11365" source="CVE"/>
    <description>
    An issue was discovered in atftpd in atftp 0.7.1. A remote attacker may send a crafted packet triggering a stack-based buffer overflow due to an insecurely implemented strncpy call. The vulnerability is triggered by sending an error packet of 3 bytes or fewer. There are multiple instances of this vulnerable strncpy pattern within the code base, specifically within tftpd_file.c, tftp_file.c, tftpd_mtftp.c, and tftp_mtftp.c.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-11365.html">CVE-2019-11365</cve>
<bugzilla href="https://bugzilla.suse.com/1133114">SUSE bug 1133114</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009252541" comment="atftp-0.7.0-135.23.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911366" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11366</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-11366" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11366" source="CVE"/>
    <description>
    An issue was discovered in atftpd in atftp 0.7.1. It does not lock the thread_list_mutex mutex before assigning the current thread data structure. As a result, the daemon is vulnerable to a denial of service attack due to a NULL pointer dereference. If thread_data is NULL when assigned to current, and modified by another thread before a certain tftpd_list.c check, there is a crash when dereferencing current-&gt;next.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-11366.html">CVE-2019-11366</cve>
<bugzilla href="https://bugzilla.suse.com/1133145">SUSE bug 1133145</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009252541" comment="atftp-0.7.0-135.23.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11459</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-11459" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11459" source="CVE"/>
    <description>
    The tiff_document_render() and tiff_document_get_thumbnail() functions in the TIFF document backend in GNOME Evince through 3.32.0 did not handle errors from TIFFReadRGBAImageOriented(), leading to uninitialized memory use when processing certain TIFF image files.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-11459.html">CVE-2019-11459</cve>
<bugzilla href="https://bugzilla.suse.com/1133037">SUSE bug 1133037</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009261354" comment="evince-2.28.2-0.7.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009261355" comment="evince-doc-2.28.2-0.7.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009261356" comment="evince-lang-2.28.2-0.7.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11470</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-11470" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11470" source="CVE"/>
    <description>
    The cineon parsing component in ImageMagick 7.0.8-26 Q16 allows attackers to cause a denial-of-service (uncontrolled resource consumption) by crafting a Cineon image with an incorrect claimed image size. This occurs because ReadCINImage in coders/cin.c lacks a check for insufficient image data in a file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-11470.html">CVE-2019-11470</cve>
<bugzilla href="https://bugzilla.suse.com/1133205">SUSE bug 1133205</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009253268" comment="ImageMagick-6.4.3.6-78.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253269" comment="libMagickCore1-6.4.3.6-78.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253270" comment="libMagickCore1-32bit-6.4.3.6-78.97 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11472</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-11472" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11472" source="CVE"/>
    <description>
    ReadXWDImage in coders/xwd.c in the XWD image parsing component of ImageMagick 7.0.8-41 Q16 allows attackers to cause a denial-of-service (divide-by-zero error) by crafting an XWD image file in which the header indicates neither LSB first nor MSB first.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-11472.html">CVE-2019-11472</cve>
<bugzilla href="https://bugzilla.suse.com/1133202">SUSE bug 1133202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1133203">SUSE bug 1133203</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1133204">SUSE bug 1133204</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1146213">SUSE bug 1146213</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009253268" comment="ImageMagick-6.4.3.6-78.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253269" comment="libMagickCore1-6.4.3.6-78.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253270" comment="libMagickCore1-32bit-6.4.3.6-78.97 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11477</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-11477" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11477" source="CVE"/>
    <description>
    Jonathan Looney discovered that the TCP_SKB_CB(skb)-&gt;tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-11477.html">CVE-2019-11477</cve>
<bugzilla href="https://bugzilla.suse.com/1132686">SUSE bug 1132686</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1137586">SUSE bug 1137586</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1142129">SUSE bug 1142129</bugzilla>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:201911478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11478</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-11478" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11478" source="CVE"/>
    <description>
    Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-11478.html">CVE-2019-11478</cve>
<bugzilla href="https://bugzilla.suse.com/1132686">SUSE bug 1132686</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1137586">SUSE bug 1137586</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1142129">SUSE bug 1142129</bugzilla>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:201911479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11479</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-11479" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11479" source="CVE"/>
    <description>
    Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-11479.html">CVE-2019-11479</cve>
<bugzilla href="https://bugzilla.suse.com/1132686">SUSE bug 1132686</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1137586">SUSE bug 1137586</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1142129">SUSE bug 1142129</bugzilla>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:201911486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11486</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-11486" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11486" source="CVE"/>
    <description>
    The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c in the Linux kernel before 5.0.8 has multiple race conditions.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-11486.html">CVE-2019-11486</cve>
<bugzilla href="https://bugzilla.suse.com/1133188">SUSE bug 1133188</bugzilla>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:201911505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-11505" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11505" source="CVE"/>
    <description>
    In GraphicsMagick from version 1.3.8 to 1.4 snapshot-20190403 Q8, there is a heap-based buffer overflow in the function WritePDBImage of coders/pdb.c, which allows an attacker to cause a denial of service or possibly have unspecified other impact via a crafted image file. This is related to MagickBitStreamMSBWrite in magick/bit_stream.c.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-11505.html">CVE-2019-11505</cve>
<bugzilla href="https://bugzilla.suse.com/1133501">SUSE bug 1133501</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009253268" comment="ImageMagick-6.4.3.6-78.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253269" comment="libMagickCore1-6.4.3.6-78.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253270" comment="libMagickCore1-32bit-6.4.3.6-78.97 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11506</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-11506" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11506" source="CVE"/>
    <description>
    In GraphicsMagick from version 1.3.30 to 1.4 snapshot-20190403 Q8, there is a heap-based buffer overflow in the function WriteMATLABImage of coders/mat.c, which allows an attacker to cause a denial of service or possibly have unspecified other impact via a crafted image file. This is related to ExportRedQuantumType in magick/export.c.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-11506.html">CVE-2019-11506</cve>
<bugzilla href="https://bugzilla.suse.com/1133498">SUSE bug 1133498</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009253268" comment="ImageMagick-6.4.3.6-78.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253269" comment="libMagickCore1-6.4.3.6-78.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253270" comment="libMagickCore1-32bit-6.4.3.6-78.97 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11597</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-11597" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11597" source="CVE"/>
    <description>
    In ImageMagick 7.0.8-43 Q16, there is a heap-based buffer over-read in the function WriteTIFFImage of coders/tiff.c, which allows an attacker to cause a denial of service or possibly information disclosure via a crafted image file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-11597.html">CVE-2019-11597</cve>
<bugzilla href="https://bugzilla.suse.com/1138464">SUSE bug 1138464</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1146211">SUSE bug 1146211</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009258988" comment="ImageMagick-6.4.3.6-78.109 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258989" comment="libMagickCore1-6.4.3.6-78.109 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258990" comment="libMagickCore1-32bit-6.4.3.6-78.109 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11598</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-11598" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11598" source="CVE"/>
    <description>
    In ImageMagick 7.0.8-40 Q16, there is a heap-based buffer over-read in the function WritePNMImage of coders/pnm.c, which allows an attacker to cause a denial of service or possibly information disclosure via a crafted image file. This is related to SetGrayscaleImage in MagickCore/quantize.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-11598.html">CVE-2019-11598</cve>
<bugzilla href="https://bugzilla.suse.com/1136732">SUSE bug 1136732</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009257059" comment="ImageMagick-6.4.3.6-78.106 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009257060" comment="libMagickCore1-6.4.3.6-78.106 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009257061" comment="libMagickCore1-32bit-6.4.3.6-78.106 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11707</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-11707" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11707" source="CVE"/>
    <description>
    A type confusion vulnerability can occur when manipulating JavaScript objects due to issues in Array.pop. This can allow for an exploitable crash. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Firefox ESR &lt; 60.7.1, Firefox &lt; 67.0.3, and Thunderbird &lt; 60.7.2.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-11707.html">CVE-2019-11707</cve>
<bugzilla href="https://bugzilla.suse.com/1138614">SUSE bug 1138614</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009259450" comment="MozillaFirefox-60.8.0esr-78.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009259451" comment="MozillaFirefox-translations-common-60.8.0esr-78.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009259452" comment="MozillaFirefox-translations-other-60.8.0esr-78.43 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11708</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-11708" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11708" source="CVE"/>
    <description>
    Insufficient vetting of parameters passed with the Prompt:Open IPC message between child and parent processes can result in the non-sandboxed parent process opening web content chosen by a compromised child process. When combined with additional vulnerabilities this could result in executing arbitrary code on the user's computer. This vulnerability affects Firefox ESR &lt; 60.7.2, Firefox &lt; 67.0.4, and Thunderbird &lt; 60.7.2.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-11708.html">CVE-2019-11708</cve>
<bugzilla href="https://bugzilla.suse.com/1138872">SUSE bug 1138872</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009259450" comment="MozillaFirefox-60.8.0esr-78.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009259451" comment="MozillaFirefox-translations-common-60.8.0esr-78.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009259452" comment="MozillaFirefox-translations-other-60.8.0esr-78.43 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11709</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-11709" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11709" source="CVE"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 67 and Firefox ESR 60.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 60.8, Firefox &lt; 68, and Thunderbird &lt; 60.8.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-11709.html">CVE-2019-11709</cve>
<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009259450" comment="MozillaFirefox-60.8.0esr-78.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009259451" comment="MozillaFirefox-translations-common-60.8.0esr-78.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009259452" comment="MozillaFirefox-translations-other-60.8.0esr-78.43 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11711</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-11711" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11711" source="CVE"/>
    <description>
    When an inner window is reused, it does not consider the use of document.domain for cross-origin protections. If pages on different subdomains ever cooperatively use document.domain, then either page can abuse this to inject script into arbitrary pages on the other subdomain, even those that did not use document.domain to relax their origin security. This vulnerability affects Firefox ESR &lt; 60.8, Firefox &lt; 68, and Thunderbird &lt; 60.8.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-11711.html">CVE-2019-11711</cve>
<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009259450" comment="MozillaFirefox-60.8.0esr-78.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009259451" comment="MozillaFirefox-translations-common-60.8.0esr-78.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009259452" comment="MozillaFirefox-translations-other-60.8.0esr-78.43 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11712</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-11712" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11712" source="CVE"/>
    <description>
    POST requests made by NPAPI plugins, such as Flash, that receive a status 308 redirect response can bypass CORS requirements. This can allow an attacker to perform Cross-Site Request Forgery (CSRF) attacks. This vulnerability affects Firefox ESR &lt; 60.8, Firefox &lt; 68, and Thunderbird &lt; 60.8.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-11712.html">CVE-2019-11712</cve>
<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009259450" comment="MozillaFirefox-60.8.0esr-78.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009259451" comment="MozillaFirefox-translations-common-60.8.0esr-78.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009259452" comment="MozillaFirefox-translations-other-60.8.0esr-78.43 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11713</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-11713" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11713" source="CVE"/>
    <description>
    A use-after-free vulnerability can occur in HTTP/2 when a cached HTTP/2 stream is closed while still in use, resulting in a potentially exploitable crash. This vulnerability affects Firefox ESR &lt; 60.8, Firefox &lt; 68, and Thunderbird &lt; 60.8.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-11713.html">CVE-2019-11713</cve>
<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009259450" comment="MozillaFirefox-60.8.0esr-78.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009259451" comment="MozillaFirefox-translations-common-60.8.0esr-78.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009259452" comment="MozillaFirefox-translations-other-60.8.0esr-78.43 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11715</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-11715" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11715" source="CVE"/>
    <description>
    Due to an error while parsing page content, it is possible for properly sanitized user input to be misinterpreted and lead to XSS hazards on web sites in certain circumstances. This vulnerability affects Firefox ESR &lt; 60.8, Firefox &lt; 68, and Thunderbird &lt; 60.8.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-11715.html">CVE-2019-11715</cve>
<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009259450" comment="MozillaFirefox-60.8.0esr-78.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009259451" comment="MozillaFirefox-translations-common-60.8.0esr-78.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009259452" comment="MozillaFirefox-translations-other-60.8.0esr-78.43 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11717</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-11717" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11717" source="CVE"/>
    <description>
    A vulnerability exists where the caret ("^") character is improperly escaped constructing some URIs due to it being used as a separator, allowing for possible spoofing of origin attributes. This vulnerability affects Firefox ESR &lt; 60.8, Firefox &lt; 68, and Thunderbird &lt; 60.8.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-11717.html">CVE-2019-11717</cve>
<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009259450" comment="MozillaFirefox-60.8.0esr-78.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009259451" comment="MozillaFirefox-translations-common-60.8.0esr-78.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009259452" comment="MozillaFirefox-translations-other-60.8.0esr-78.43 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11719</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-11719" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11719" source="CVE"/>
    <description>
    When importing a curve25519 private key in PKCS#8format with leading 0x00 bytes, it is possible to trigger an out-of-bounds read in the Network Security Services (NSS) library. This could lead to information disclosure. This vulnerability affects Firefox ESR &lt; 60.8, Firefox &lt; 68, and Thunderbird &lt; 60.8.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-11719.html">CVE-2019-11719</cve>
<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009259450" comment="MozillaFirefox-60.8.0esr-78.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009259451" comment="MozillaFirefox-translations-common-60.8.0esr-78.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009259452" comment="MozillaFirefox-translations-other-60.8.0esr-78.43 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11729</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-11729" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11729" source="CVE"/>
    <description>
    Empty or malformed p256-ECDH public keys may trigger a segmentation fault due values being improperly sanitized before being copied into memory and used. This vulnerability affects Firefox ESR &lt; 60.8, Firefox &lt; 68, and Thunderbird &lt; 60.8.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-11729.html">CVE-2019-11729</cve>
<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009259450" comment="MozillaFirefox-60.8.0esr-78.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009259451" comment="MozillaFirefox-translations-common-60.8.0esr-78.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009259452" comment="MozillaFirefox-translations-other-60.8.0esr-78.43 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11730</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-11730" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11730" source="CVE"/>
    <description>
    A vulnerability exists where if a user opens a locally saved HTML file, this file can use file: URIs to access other files in the same directory or sub-directories if the names are known or guessed. The Fetch API can then be used to read the contents of any files stored in these directories and they may uploaded to a server. It was demonstrated that in combination with a popular Android messaging app, if a malicious HTML attachment is sent to a user and they opened that attachment in Firefox, due to that app's predictable pattern for locally-saved file names, it is possible to read attachments the victim received from other correspondents. This vulnerability affects Firefox ESR &lt; 60.8, Firefox &lt; 68, and Thunderbird &lt; 60.8.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-11730.html">CVE-2019-11730</cve>
<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009259450" comment="MozillaFirefox-60.8.0esr-78.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009259451" comment="MozillaFirefox-translations-common-60.8.0esr-78.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009259452" comment="MozillaFirefox-translations-other-60.8.0esr-78.43 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11740</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-11740" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11740" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-11740.html">CVE-2019-11740</cve>
<bugzilla href="https://bugzilla.suse.com/1149299">SUSE bug 1149299</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1150940">SUSE bug 1150940</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009264657" comment="MozillaFirefox-60.9.0esr-78.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264658" comment="MozillaFirefox-translations-common-60.9.0esr-78.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264659" comment="MozillaFirefox-translations-other-60.9.0esr-78.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264660" comment="firefox-gio-branding-upstream-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264661" comment="firefox-glib2-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264662" comment="firefox-glib2-lang-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264663" comment="firefox-glib2-tools-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264664" comment="firefox-gtk3-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264665" comment="firefox-gtk3-branding-upstream-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264666" comment="firefox-gtk3-data-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264667" comment="firefox-gtk3-immodule-amharic-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264668" comment="firefox-gtk3-immodule-inuktitut-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264669" comment="firefox-gtk3-immodule-multipress-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264670" comment="firefox-gtk3-immodule-thai-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264671" comment="firefox-gtk3-immodule-vietnamese-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264672" comment="firefox-gtk3-immodule-xim-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264673" comment="firefox-gtk3-immodules-tigrigna-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264674" comment="firefox-gtk3-lang-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264675" comment="firefox-gtk3-tools-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264676" comment="firefox-libgtk-3-0-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264677" comment="libfirefox-gio-2_0-0-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264678" comment="libfirefox-glib-2_0-0-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264679" comment="libfirefox-gmodule-2_0-0-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264680" comment="libfirefox-gobject-2_0-0-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264681" comment="libfirefox-gthread-2_0-0-2.54.3-2.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11742</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-11742" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11742" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-11742.html">CVE-2019-11742</cve>
<bugzilla href="https://bugzilla.suse.com/1149303">SUSE bug 1149303</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1150940">SUSE bug 1150940</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009264657" comment="MozillaFirefox-60.9.0esr-78.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264658" comment="MozillaFirefox-translations-common-60.9.0esr-78.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264659" comment="MozillaFirefox-translations-other-60.9.0esr-78.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264660" comment="firefox-gio-branding-upstream-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264661" comment="firefox-glib2-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264662" comment="firefox-glib2-lang-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264663" comment="firefox-glib2-tools-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264664" comment="firefox-gtk3-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264665" comment="firefox-gtk3-branding-upstream-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264666" comment="firefox-gtk3-data-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264667" comment="firefox-gtk3-immodule-amharic-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264668" comment="firefox-gtk3-immodule-inuktitut-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264669" comment="firefox-gtk3-immodule-multipress-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264670" comment="firefox-gtk3-immodule-thai-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264671" comment="firefox-gtk3-immodule-vietnamese-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264672" comment="firefox-gtk3-immodule-xim-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264673" comment="firefox-gtk3-immodules-tigrigna-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264674" comment="firefox-gtk3-lang-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264675" comment="firefox-gtk3-tools-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264676" comment="firefox-libgtk-3-0-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264677" comment="libfirefox-gio-2_0-0-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264678" comment="libfirefox-glib-2_0-0-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264679" comment="libfirefox-gmodule-2_0-0-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264680" comment="libfirefox-gobject-2_0-0-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264681" comment="libfirefox-gthread-2_0-0-2.54.3-2.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11743</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-11743" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11743" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-11743.html">CVE-2019-11743</cve>
<bugzilla href="https://bugzilla.suse.com/1149298">SUSE bug 1149298</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1150940">SUSE bug 1150940</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009264657" comment="MozillaFirefox-60.9.0esr-78.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264658" comment="MozillaFirefox-translations-common-60.9.0esr-78.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264659" comment="MozillaFirefox-translations-other-60.9.0esr-78.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264660" comment="firefox-gio-branding-upstream-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264661" comment="firefox-glib2-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264662" comment="firefox-glib2-lang-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264663" comment="firefox-glib2-tools-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264664" comment="firefox-gtk3-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264665" comment="firefox-gtk3-branding-upstream-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264666" comment="firefox-gtk3-data-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264667" comment="firefox-gtk3-immodule-amharic-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264668" comment="firefox-gtk3-immodule-inuktitut-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264669" comment="firefox-gtk3-immodule-multipress-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264670" comment="firefox-gtk3-immodule-thai-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264671" comment="firefox-gtk3-immodule-vietnamese-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264672" comment="firefox-gtk3-immodule-xim-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264673" comment="firefox-gtk3-immodules-tigrigna-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264674" comment="firefox-gtk3-lang-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264675" comment="firefox-gtk3-tools-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264676" comment="firefox-libgtk-3-0-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264677" comment="libfirefox-gio-2_0-0-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264678" comment="libfirefox-glib-2_0-0-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264679" comment="libfirefox-gmodule-2_0-0-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264680" comment="libfirefox-gobject-2_0-0-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264681" comment="libfirefox-gthread-2_0-0-2.54.3-2.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11744</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-11744" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11744" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-11744.html">CVE-2019-11744</cve>
<bugzilla href="https://bugzilla.suse.com/1149304">SUSE bug 1149304</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1150940">SUSE bug 1150940</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009264657" comment="MozillaFirefox-60.9.0esr-78.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264658" comment="MozillaFirefox-translations-common-60.9.0esr-78.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264659" comment="MozillaFirefox-translations-other-60.9.0esr-78.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264660" comment="firefox-gio-branding-upstream-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264661" comment="firefox-glib2-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264662" comment="firefox-glib2-lang-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264663" comment="firefox-glib2-tools-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264664" comment="firefox-gtk3-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264665" comment="firefox-gtk3-branding-upstream-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264666" comment="firefox-gtk3-data-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264667" comment="firefox-gtk3-immodule-amharic-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264668" comment="firefox-gtk3-immodule-inuktitut-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264669" comment="firefox-gtk3-immodule-multipress-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264670" comment="firefox-gtk3-immodule-thai-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264671" comment="firefox-gtk3-immodule-vietnamese-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264672" comment="firefox-gtk3-immodule-xim-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264673" comment="firefox-gtk3-immodules-tigrigna-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264674" comment="firefox-gtk3-lang-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264675" comment="firefox-gtk3-tools-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264676" comment="firefox-libgtk-3-0-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264677" comment="libfirefox-gio-2_0-0-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264678" comment="libfirefox-glib-2_0-0-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264679" comment="libfirefox-gmodule-2_0-0-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264680" comment="libfirefox-gobject-2_0-0-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264681" comment="libfirefox-gthread-2_0-0-2.54.3-2.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11746</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-11746" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11746" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-11746.html">CVE-2019-11746</cve>
<bugzilla href="https://bugzilla.suse.com/1149297">SUSE bug 1149297</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1150940">SUSE bug 1150940</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009264657" comment="MozillaFirefox-60.9.0esr-78.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264658" comment="MozillaFirefox-translations-common-60.9.0esr-78.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264659" comment="MozillaFirefox-translations-other-60.9.0esr-78.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264660" comment="firefox-gio-branding-upstream-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264661" comment="firefox-glib2-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264662" comment="firefox-glib2-lang-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264663" comment="firefox-glib2-tools-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264664" comment="firefox-gtk3-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264665" comment="firefox-gtk3-branding-upstream-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264666" comment="firefox-gtk3-data-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264667" comment="firefox-gtk3-immodule-amharic-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264668" comment="firefox-gtk3-immodule-inuktitut-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264669" comment="firefox-gtk3-immodule-multipress-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264670" comment="firefox-gtk3-immodule-thai-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264671" comment="firefox-gtk3-immodule-vietnamese-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264672" comment="firefox-gtk3-immodule-xim-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264673" comment="firefox-gtk3-immodules-tigrigna-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264674" comment="firefox-gtk3-lang-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264675" comment="firefox-gtk3-tools-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264676" comment="firefox-libgtk-3-0-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264677" comment="libfirefox-gio-2_0-0-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264678" comment="libfirefox-glib-2_0-0-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264679" comment="libfirefox-gmodule-2_0-0-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264680" comment="libfirefox-gobject-2_0-0-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264681" comment="libfirefox-gthread-2_0-0-2.54.3-2.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11752</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-11752" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11752" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-11752.html">CVE-2019-11752</cve>
<bugzilla href="https://bugzilla.suse.com/1149296">SUSE bug 1149296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1150940">SUSE bug 1150940</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009264657" comment="MozillaFirefox-60.9.0esr-78.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264658" comment="MozillaFirefox-translations-common-60.9.0esr-78.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264659" comment="MozillaFirefox-translations-other-60.9.0esr-78.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264660" comment="firefox-gio-branding-upstream-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264661" comment="firefox-glib2-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264662" comment="firefox-glib2-lang-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264663" comment="firefox-glib2-tools-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264664" comment="firefox-gtk3-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264665" comment="firefox-gtk3-branding-upstream-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264666" comment="firefox-gtk3-data-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264667" comment="firefox-gtk3-immodule-amharic-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264668" comment="firefox-gtk3-immodule-inuktitut-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264669" comment="firefox-gtk3-immodule-multipress-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264670" comment="firefox-gtk3-immodule-thai-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264671" comment="firefox-gtk3-immodule-vietnamese-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264672" comment="firefox-gtk3-immodule-xim-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264673" comment="firefox-gtk3-immodules-tigrigna-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264674" comment="firefox-gtk3-lang-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264675" comment="firefox-gtk3-tools-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264676" comment="firefox-libgtk-3-0-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264677" comment="libfirefox-gio-2_0-0-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264678" comment="libfirefox-glib-2_0-0-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264679" comment="libfirefox-gmodule-2_0-0-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264680" comment="libfirefox-gobject-2_0-0-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264681" comment="libfirefox-gthread-2_0-0-2.54.3-2.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11753</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-11753" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11753" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-11753.html">CVE-2019-11753</cve>
<bugzilla href="https://bugzilla.suse.com/1149295">SUSE bug 1149295</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009264657" comment="MozillaFirefox-60.9.0esr-78.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264658" comment="MozillaFirefox-translations-common-60.9.0esr-78.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264659" comment="MozillaFirefox-translations-other-60.9.0esr-78.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264660" comment="firefox-gio-branding-upstream-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264661" comment="firefox-glib2-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264662" comment="firefox-glib2-lang-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264663" comment="firefox-glib2-tools-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264664" comment="firefox-gtk3-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264665" comment="firefox-gtk3-branding-upstream-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264666" comment="firefox-gtk3-data-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264667" comment="firefox-gtk3-immodule-amharic-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264668" comment="firefox-gtk3-immodule-inuktitut-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264669" comment="firefox-gtk3-immodule-multipress-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264670" comment="firefox-gtk3-immodule-thai-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264671" comment="firefox-gtk3-immodule-vietnamese-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264672" comment="firefox-gtk3-immodule-xim-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264673" comment="firefox-gtk3-immodules-tigrigna-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264674" comment="firefox-gtk3-lang-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264675" comment="firefox-gtk3-tools-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264676" comment="firefox-libgtk-3-0-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264677" comment="libfirefox-gio-2_0-0-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264678" comment="libfirefox-glib-2_0-0-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264679" comment="libfirefox-gmodule-2_0-0-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264680" comment="libfirefox-gobject-2_0-0-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264681" comment="libfirefox-gthread-2_0-0-2.54.3-2.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11810</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-11810" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11810" source="CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0.7. A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-11810.html">CVE-2019-11810</cve>
<bugzilla href="https://bugzilla.suse.com/1134399">SUSE bug 1134399</bugzilla>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:201911884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11884</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-11884" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11884" source="CVE"/>
    <description>
    The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c in the Linux kernel before 5.0.15 allows a local user to obtain potentially sensitive information from kernel stack memory via a HIDPCONNADD command, because a name field may not end with a '\0' character.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-11884.html">CVE-2019-11884</cve>
<bugzilla href="https://bugzilla.suse.com/1134848">SUSE bug 1134848</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1139868">SUSE bug 1139868</bugzilla>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:201912155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-12155" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12155" source="CVE"/>
    <description>
    interface_release_resource in hw/display/qxl.c in QEMU 4.0.0 has a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-12155.html">CVE-2019-12155</cve>
<bugzilla href="https://bugzilla.suse.com/1135902">SUSE bug 1135902</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1135905">SUSE bug 1135905</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009262607" comment="kvm-1.4.2-53.35 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12450</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-12450" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12450" source="CVE"/>
    <description>
    file_copy_fallback in gio/gfile.c in GNOME GLib 2.15.0 through 2.61.1 does not properly restrict file permissions while a copy operation is in progress. Instead, default permissions are used.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-12450.html">CVE-2019-12450</cve>
<bugzilla href="https://bugzilla.suse.com/1137001">SUSE bug 1137001</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1139959">SUSE bug 1139959</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1141771">SUSE bug 1141771</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1142126">SUSE bug 1142126</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009258112" comment="glib2-2.22.5-0.8.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258113" comment="glib2-doc-2.22.5-0.8.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258114" comment="glib2-lang-2.22.5-0.8.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258115" comment="libgio-2_0-0-2.22.5-0.8.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258120" comment="libgio-2_0-0-32bit-2.22.5-0.8.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258116" comment="libglib-2_0-0-2.22.5-0.8.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258121" comment="libglib-2_0-0-32bit-2.22.5-0.8.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258117" comment="libgmodule-2_0-0-2.22.5-0.8.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258122" comment="libgmodule-2_0-0-32bit-2.22.5-0.8.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258118" comment="libgobject-2_0-0-2.22.5-0.8.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258123" comment="libgobject-2_0-0-32bit-2.22.5-0.8.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258119" comment="libgthread-2_0-0-2.22.5-0.8.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258124" comment="libgthread-2_0-0-32bit-2.22.5-0.8.39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12614</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-12614" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12614" source="CVE"/>
    <description>
    An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c in the Linux kernel through 5.1.6. There is an unchecked kstrdup of prop-&gt;name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-12614.html">CVE-2019-12614</cve>
<bugzilla href="https://bugzilla.suse.com/1137194">SUSE bug 1137194</bugzilla>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:201912735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12735</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-12735" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12735" source="CVE"/>
    <description>
    getchar.c in Vim before 8.1.1365 and Neovim before 0.3.6 allows remote attackers to execute arbitrary OS commands via the :source! command in a modeline, as demonstrated by execute in Vim, and assert_fails or nvim_input in Neovim.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-12735.html">CVE-2019-12735</cve>
<bugzilla href="https://bugzilla.suse.com/1137443">SUSE bug 1137443</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009256642" comment="gvim-7.2-8.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256643" comment="vim-7.2-8.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256644" comment="vim-base-7.2-8.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256645" comment="vim-data-7.2-8.21.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12749</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-12749" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12749" source="CVE"/>
    <description>
    dbus before 1.10.28, 1.12.x before 1.12.16, and 1.13.x before 1.13.12, as used in DBusServer in Canonical Upstart in Ubuntu 14.04 (and in some, less common, uses of dbus-daemon), allows cookie spoofing because of symlink mishandling in the reference implementation of DBUS_COOKIE_SHA1 in the libdbus library. (This only affects the DBUS_COOKIE_SHA1 authentication mechanism.) A malicious client with write access to its own home directory could manipulate a ~/.dbus-keyrings symlink to cause a DBusServer with a different uid to read and write in unintended locations. In the worst case, this could result in the DBusServer reusing a cookie that is known to the malicious client, and treating that cookie as evidence that a subsequent client connection came from an attacker-chosen uid, allowing authentication bypass.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-12749.html">CVE-2019-12749</cve>
<bugzilla href="https://bugzilla.suse.com/1137832">SUSE bug 1137832</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009258654" comment="dbus-1-1.2.10-3.34.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258656" comment="dbus-1-32bit-1.2.10-3.34.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258655" comment="dbus-1-x11-1.2.10-3.34.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12900</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-12900" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12900" source="CVE"/>
    <description>
    BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-12900.html">CVE-2019-12900</cve>
<bugzilla href="https://bugzilla.suse.com/1139083">SUSE bug 1139083</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1149458">SUSE bug 1149458</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009261374" comment="bzip2-1.0.6-257.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009261375" comment="bzip2-doc-1.0.6-257.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009261376" comment="libbz2-1-1.0.6-257.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009261377" comment="libbz2-1-32bit-1.0.6-257.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009261378" comment="libbz2-devel-1.0.6-257.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12975</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-12975" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975" source="CVE"/>
    <description>
    ImageMagick 7.0.8-34 has a memory leak vulnerability in the WriteDPXImage function in coders/dpx.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-12975.html">CVE-2019-12975</cve>
<bugzilla href="https://bugzilla.suse.com/1140106">SUSE bug 1140106</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009260896" comment="ImageMagick-6.4.3.6-78.112 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009260897" comment="libMagickCore1-6.4.3.6-78.112 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009260898" comment="libMagickCore1-32bit-6.4.3.6-78.112 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12976</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-12976" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976" source="CVE"/>
    <description>
    ImageMagick 7.0.8-34 has a memory leak in the ReadPCLImage function in coders/pcl.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-12976.html">CVE-2019-12976</cve>
<bugzilla href="https://bugzilla.suse.com/1140110">SUSE bug 1140110</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009260896" comment="ImageMagick-6.4.3.6-78.112 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009260897" comment="libMagickCore1-6.4.3.6-78.112 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009260898" comment="libMagickCore1-32bit-6.4.3.6-78.112 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12979</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-12979" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12979" source="CVE"/>
    <description>
    ImageMagick 7.0.8-34 has a "use of uninitialized value" vulnerability in the SyncImageSettings function in MagickCore/image.c. This is related to AcquireImage in magick/image.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-12979.html">CVE-2019-12979</cve>
<bugzilla href="https://bugzilla.suse.com/1139886">SUSE bug 1139886</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009260896" comment="ImageMagick-6.4.3.6-78.112 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009260897" comment="libMagickCore1-6.4.3.6-78.112 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009260898" comment="libMagickCore1-32bit-6.4.3.6-78.112 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13050</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-13050" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050" source="CVE"/>
    <description>
    Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this network may cause a persistent denial of service, because of a Certificate Spamming Attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-13050.html">CVE-2019-13050</cve>
<bugzilla href="https://bugzilla.suse.com/1141093">SUSE bug 1141093</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1149038">SUSE bug 1149038</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265275" comment="gpg2-2.0.9-25.33.42.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009265276" comment="gpg2-lang-2.0.9-25.33.42.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13132</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS</platform>
    </affected>
    <reference ref_id="CVE-2019-13132" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13132" source="CVE"/>
    <description>
    In ZeroMQ libzmq before 4.0.9, 4.1.x before 4.1.7, and 4.2.x before 4.3.2, a remote, unauthenticated client connecting to a libzmq application, running with a socket listening with CURVE encryption/authentication enabled, may cause a stack overflow and overwrite the stack with arbitrary data, due to a buffer overflow in the library. Users running public servers with the above configuration are highly encouraged to upgrade as soon as possible, as there are no known mitigations.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-13132.html">CVE-2019-13132</cve>
<bugzilla href="https://bugzilla.suse.com/1140255">SUSE bug 1140255</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009258986" comment="libzmq3-4.0.4-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258987" comment="zeromq-4.0.4-3.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13133</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-13133" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13133" source="CVE"/>
    <description>
    ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadBMPImage in coders/bmp.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-13133.html">CVE-2019-13133</cve>
<bugzilla href="https://bugzilla.suse.com/1140100">SUSE bug 1140100</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009260896" comment="ImageMagick-6.4.3.6-78.112 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009260897" comment="libMagickCore1-6.4.3.6-78.112 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009260898" comment="libMagickCore1-32bit-6.4.3.6-78.112 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13134</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-13134" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13134" source="CVE"/>
    <description>
    ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadVIFFImage in coders/viff.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-13134.html">CVE-2019-13134</cve>
<bugzilla href="https://bugzilla.suse.com/1140102">SUSE bug 1140102</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009260896" comment="ImageMagick-6.4.3.6-78.112 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009260897" comment="libMagickCore1-6.4.3.6-78.112 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009260898" comment="libMagickCore1-32bit-6.4.3.6-78.112 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13135</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-13135" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13135" source="CVE"/>
    <description>
    ImageMagick before 7.0.8-50 has a "use of uninitialized value" vulnerability in the function ReadCUTImage in coders/cut.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-13135.html">CVE-2019-13135</cve>
<bugzilla href="https://bugzilla.suse.com/1140103">SUSE bug 1140103</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009260896" comment="ImageMagick-6.4.3.6-78.112 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009260897" comment="libMagickCore1-6.4.3.6-78.112 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009260898" comment="libMagickCore1-32bit-6.4.3.6-78.112 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13164</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-13164" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13164" source="CVE"/>
    <description>
    qemu-bridge-helper.c in QEMU 4.0.0 does not ensure that a network interface name (obtained from bridge.conf or a --br=bridge option) is limited to the IFNAMSIZ size, which can lead to an ACL bypass.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-13164.html">CVE-2019-13164</cve>
<bugzilla href="https://bugzilla.suse.com/1140402">SUSE bug 1140402</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009262607" comment="kvm-1.4.2-53.35 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13295</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-13295" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13295" source="CVE"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage because a width of zero is mishandled.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-13295.html">CVE-2019-13295</cve>
<bugzilla href="https://bugzilla.suse.com/1140664">SUSE bug 1140664</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009260896" comment="ImageMagick-6.4.3.6-78.112 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009260897" comment="libMagickCore1-6.4.3.6-78.112 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009260898" comment="libMagickCore1-32bit-6.4.3.6-78.112 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13297</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-13297" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13297" source="CVE"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage because a height of zero is mishandled.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-13297.html">CVE-2019-13297</cve>
<bugzilla href="https://bugzilla.suse.com/1140666">SUSE bug 1140666</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009260896" comment="ImageMagick-6.4.3.6-78.112 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009260897" comment="libMagickCore1-6.4.3.6-78.112 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009260898" comment="libMagickCore1-32bit-6.4.3.6-78.112 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13301</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-13301" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301" source="CVE"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has memory leaks in AcquireMagickMemory because of an AnnotateImage error.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-13301.html">CVE-2019-13301</cve>
<bugzilla href="https://bugzilla.suse.com/1140554">SUSE bug 1140554</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009260896" comment="ImageMagick-6.4.3.6-78.112 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009260897" comment="libMagickCore1-6.4.3.6-78.112 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009260898" comment="libMagickCore1-32bit-6.4.3.6-78.112 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13311</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-13311" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311" source="CVE"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has memory leaks at AcquireMagickMemory because of a wand/mogrify.c error.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-13311.html">CVE-2019-13311</cve>
<bugzilla href="https://bugzilla.suse.com/1140513">SUSE bug 1140513</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1140554">SUSE bug 1140554</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009260896" comment="ImageMagick-6.4.3.6-78.112 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009260897" comment="libMagickCore1-6.4.3.6-78.112 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009260898" comment="libMagickCore1-32bit-6.4.3.6-78.112 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13345</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-13345" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13345" source="CVE"/>
    <description>
    The cachemgr.cgi web module of Squid through 4.7 has XSS via the user_name or auth parameter.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-13345.html">CVE-2019-13345</cve>
<bugzilla href="https://bugzilla.suse.com/1140738">SUSE bug 1140738</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009261584" comment="squid-2.7.STABLE5-2.12.30.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13454</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-13454" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13454" source="CVE"/>
    <description>
    ImageMagick 7.0.8-54 Q16 allows Division by Zero in RemoveDuplicateLayers in MagickCore/layer.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-13454.html">CVE-2019-13454</cve>
<bugzilla href="https://bugzilla.suse.com/1141171">SUSE bug 1141171</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009260896" comment="ImageMagick-6.4.3.6-78.112 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009260897" comment="libMagickCore1-6.4.3.6-78.112 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009260898" comment="libMagickCore1-32bit-6.4.3.6-78.112 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13627</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-13627" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627" source="CVE"/>
    <description>
    It was discovered that there was a ECDSA timing attack in the libgcrypt20 cryptographic library. Version affected: 1.8.4-5, 1.7.6-2+deb9u3, and 1.6.3-2+deb8u4. Versions fixed: 1.8.5-2 and 1.6.3-2+deb8u7.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-13627.html">CVE-2019-13627</cve>
<bugzilla href="https://bugzilla.suse.com/1148987">SUSE bug 1148987</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265199" comment="libgcrypt-1.5.0-0.26.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009265200" comment="libgcrypt11-1.5.0-0.26.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009265201" comment="libgcrypt11-32bit-1.5.0-0.26.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13631</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-13631" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13631" source="CVE"/>
    <description>
    In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel through 5.2.1, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-13631.html">CVE-2019-13631</cve>
<bugzilla href="https://bugzilla.suse.com/1142023">SUSE bug 1142023</bugzilla>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:201914283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14283</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-14283" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14283" source="CVE"/>
    <description>
    In the Linux kernel before 5.2.3, set_geometry in drivers/block/floppy.c does not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-14283.html">CVE-2019-14283</cve>
<bugzilla href="https://bugzilla.suse.com/1143191">SUSE bug 1143191</bugzilla>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:201914284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14284</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-14284" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14284" source="CVE"/>
    <description>
    In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-14284.html">CVE-2019-14284</cve>
<bugzilla href="https://bugzilla.suse.com/1143189">SUSE bug 1143189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1143191">SUSE bug 1143191</bugzilla>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:201914378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14378</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-14378" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14378" source="CVE"/>
    <description>
    ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer overflow via a large packet because it mishandles a case involving the first fragment.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-14378.html">CVE-2019-14378</cve>
<bugzilla href="https://bugzilla.suse.com/1143794">SUSE bug 1143794</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1143797">SUSE bug 1143797</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009262607" comment="kvm-1.4.2-53.35 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-14835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14835" source="CVE"/>
    <description>
    A buffer overflow flaw was found, in versions from 2.6.34 to 5.2.x, in the way Linux kernel's vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-14835.html">CVE-2019-14835</cve>
<bugzilla href="https://bugzilla.suse.com/1150112">SUSE bug 1150112</bugzilla>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:201915118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15118</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-15118" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15118" source="CVE"/>
    <description>
    check_input_term in sound/usb/mixer.c in the Linux kernel through 5.2.9 mishandles recursion, leading to kernel stack exhaustion.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-15118.html">CVE-2019-15118</cve>
<bugzilla href="https://bugzilla.suse.com/1145922">SUSE bug 1145922</bugzilla>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:201915142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15142</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-15142" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15142" source="CVE"/>
    <description>
    In DjVuLibre 3.5.27, DjVmDir.cpp in the DJVU reader component allows attackers to cause a denial-of-service (application crash in GStringRep::strdup in libdjvu/GString.cpp caused by a heap-based buffer over-read) by crafting a DJVU file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-15142.html">CVE-2019-15142</cve>
<bugzilla href="https://bugzilla.suse.com/1146702">SUSE bug 1146702</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265193" comment="djvulibre-3.5.21-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009265194" comment="libdjvulibre21-3.5.21-3.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-15143" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15143" source="CVE"/>
    <description>
    In DjVuLibre 3.5.27, the bitmap reader component allows attackers to cause a denial-of-service error (resource exhaustion caused by a GBitmap::read_rle_raw infinite loop) by crafting a corrupted image file, related to libdjvu/DjVmDir.cpp and libdjvu/GBitmap.cpp.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-15143.html">CVE-2019-15143</cve>
<bugzilla href="https://bugzilla.suse.com/1146569">SUSE bug 1146569</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265193" comment="djvulibre-3.5.21-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009265194" comment="libdjvulibre21-3.5.21-3.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15144</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-15144" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15144" source="CVE"/>
    <description>
    In DjVuLibre 3.5.27, the sorting functionality (aka GArrayTemplate&lt;TYPE&gt;::sort) allows attackers to cause a denial-of-service (application crash due to an Uncontrolled Recursion) by crafting a PBM image file that is mishandled in libdjvu/GContainer.h.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-15144.html">CVE-2019-15144</cve>
<bugzilla href="https://bugzilla.suse.com/1146571">SUSE bug 1146571</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265193" comment="djvulibre-3.5.21-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009265194" comment="libdjvulibre21-3.5.21-3.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15145</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-15145" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15145" source="CVE"/>
    <description>
    DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of-bounds read) by crafting a corrupted JB2 image file that is mishandled in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h because of a missing zero-bytes check in libdjvu/GBitmap.h.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-15145.html">CVE-2019-15145</cve>
<bugzilla href="https://bugzilla.suse.com/1146572">SUSE bug 1146572</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265193" comment="djvulibre-3.5.21-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009265194" comment="libdjvulibre21-3.5.21-3.3 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15212</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-15212" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15212" source="CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 5.1.8. There is a double-free caused by a malicious USB device in the drivers/usb/misc/rio500.c driver.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-15212.html">CVE-2019-15212</cve>
<bugzilla href="https://bugzilla.suse.com/1146391">SUSE bug 1146391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:201915216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15216</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-15216" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15216" source="CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0.14. There is a NULL pointer dereference caused by a malicious USB device in the drivers/usb/misc/yurex.c driver.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-15216.html">CVE-2019-15216</cve>
<bugzilla href="https://bugzilla.suse.com/1146361">SUSE bug 1146361</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:201915217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15217</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-15217" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15217" source="CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 5.2.3. There is a NULL pointer dereference caused by a malicious USB device in the drivers/media/usb/zr364xx/zr364xx.c driver.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-15217.html">CVE-2019-15217</cve>
<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1146547">SUSE bug 1146547</bugzilla>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:201915219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15219</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-15219" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15219" source="CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 5.1.8. There is a NULL pointer dereference caused by a malicious USB device in the drivers/usb/misc/sisusbvga/sisusb.c driver.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-15219.html">CVE-2019-15219</cve>
<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1146524">SUSE bug 1146524</bugzilla>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:201915292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15292</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-15292" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15292" source="CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0.9. There is a use-after-free in atalk_proc_exit, related to net/appletalk/atalk_proc.c, net/appletalk/ddp.c, and net/appletalk/sysctl_net_atalk.c.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-15292.html">CVE-2019-15292</cve>
<bugzilla href="https://bugzilla.suse.com/1146678">SUSE bug 1146678</bugzilla>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:20191547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-1547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1547" source="CVE"/>
    <description>
    Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those cases it is possible that such a group does not have the cofactor present. This can occur even where all the parameters match a known named curve. If such a curve is used then OpenSSL falls back to non-side channel resistant code paths which may result in full key recovery during an ECDSA signature operation. In order to be vulnerable an attacker would have to have the ability to time the creation of a large number of signatures where explicit parameters with no co-factor present are in use by an application using libcrypto. For the avoidance of doubt libssl is not vulnerable because explicit parameters are never used. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-1547.html">CVE-2019-1547</cve>
<bugzilla href="https://bugzilla.suse.com/1150003">SUSE bug 1150003</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009264918" comment="libopenssl0_9_8-0.9.8j-0.106.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264922" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264919" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264923" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264647" comment="libopenssl1-devel-1.0.1g-0.58.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264682" comment="libopenssl1-devel-32bit-1.0.1g-0.58.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264648" comment="libopenssl1_0_0-1.0.1g-0.58.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264649" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264920" comment="openssl-0.9.8j-0.106.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264921" comment="openssl-doc-0.9.8j-0.106.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264651" comment="openssl1-1.0.1g-0.58.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264652" comment="openssl1-doc-1.0.1g-0.58.21 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1559</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-1559" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1559" source="CVE"/>
    <description>
    If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 byte record is received with an invalid MAC. If the application then behaves differently based on that in a way that is detectable to the remote peer, then this amounts to a padding oracle that could be used to decrypt data. In order for this to be exploitable "non-stitched" ciphersuites must be in use. Stitched ciphersuites are optimised implementations of certain commonly used ciphersuites. Also the application must call SSL_shutdown() twice even if a protocol error has occurred (applications should not do this but some do anyway). Fixed in OpenSSL 1.0.2r (Affected 1.0.2-1.0.2q).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-1559.html">CVE-2019-1559</cve>
<bugzilla href="https://bugzilla.suse.com/1127080">SUSE bug 1127080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1130039">SUSE bug 1130039</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1141798">SUSE bug 1141798</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009257183" comment="libopenssl0_9_8-0.9.8j-0.106.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009257187" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009257184" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009257212" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009257178" comment="libopenssl1-devel-1.0.1g-0.58.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009257188" comment="libopenssl1-devel-32bit-1.0.1g-0.58.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009257179" comment="libopenssl1_0_0-1.0.1g-0.58.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009257189" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009257185" comment="openssl-0.9.8j-0.106.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009257186" comment="openssl-doc-0.9.8j-0.106.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009257180" comment="openssl1-1.0.1g-0.58.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009257181" comment="openssl1-doc-1.0.1g-0.58.18 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1563</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-1563" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1563" source="CVE"/>
    <description>
    In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message that was encrypted with the public RSA key, using a Bleichenbacher padding oracle attack. Applications are not affected if they use a certificate together with the private RSA key to the CMS_decrypt or PKCS7_decrypt functions to select the correct recipient info to decrypt. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-1563.html">CVE-2019-1563</cve>
<bugzilla href="https://bugzilla.suse.com/1150250">SUSE bug 1150250</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009264918" comment="libopenssl0_9_8-0.9.8j-0.106.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264922" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264919" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264923" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264647" comment="libopenssl1-devel-1.0.1g-0.58.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264682" comment="libopenssl1-devel-32bit-1.0.1g-0.58.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264648" comment="libopenssl1_0_0-1.0.1g-0.58.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264649" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264920" comment="openssl-0.9.8j-0.106.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264921" comment="openssl-doc-0.9.8j-0.106.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264651" comment="openssl1-1.0.1g-0.58.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264652" comment="openssl1-doc-1.0.1g-0.58.21 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15902</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-15902" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15902" source="CVE"/>
    <description>
    A backporting error was discovered in the Linux stable/longterm kernel 4.4.x through 4.4.190, 4.9.x through 4.9.190, 4.14.x through 4.14.141, 4.19.x through 4.19.69, and 5.2.x through 5.2.11. Misuse of the upstream "x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg()" commit reintroduced the Spectre vulnerability that it aimed to eliminate. This occurred because the backport process depends on cherry picking specific commits, and because two (correctly ordered) code lines were swapped.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-15902.html">CVE-2019-15902</cve>
<bugzilla href="https://bugzilla.suse.com/1149376">SUSE bug 1149376</bugzilla>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:201915903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15903</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-15903" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903" source="CVE"/>
    <description>
    In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-15903.html">CVE-2019-15903</cve>
<bugzilla href="https://bugzilla.suse.com/1149429">SUSE bug 1149429</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265195" comment="expat-2.0.1-88.42.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009265196" comment="libexpat1-2.0.1-88.42.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009265197" comment="libexpat1-32bit-2.0.1-88.42.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15927</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-15927" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15927" source="CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 4.20.2. An out-of-bounds access exists in the function build_audio_procunit in the file sound/usb/mixer.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-15927.html">CVE-2019-15927</cve>
<bugzilla href="https://bugzilla.suse.com/1149522">SUSE bug 1149522</bugzilla>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:20191787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1787</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-1787" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1787" source="CVE"/>
    <description>
    A vulnerability in the Portable Document Format (PDF) scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of proper data handling mechanisms within the device buffer while indexing remaining file data on an affected device. An attacker could exploit this vulnerability by sending crafted PDF files to an affected device. A successful exploit could allow the attacker to cause a heap buffer out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-1787.html">CVE-2019-1787</cve>
<bugzilla href="https://bugzilla.suse.com/1130721">SUSE bug 1130721</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247297" comment="clamav-0.100.3-0.20.21 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1788</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-1788" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1788" source="CVE"/>
    <description>
    A vulnerability in the Object Linking &amp; Embedding (OLE2) file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper input and validation checking mechanisms for OLE2 files sent an affected device. An attacker could exploit this vulnerability by sending malformed OLE2 files to the device running an affected version ClamAV Software. An exploit could allow the attacker to cause an out-of-bounds write condition, resulting in a crash that could result in a denial of service condition on an affected device.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-1788.html">CVE-2019-1788</cve>
<bugzilla href="https://bugzilla.suse.com/1130721">SUSE bug 1130721</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247297" comment="clamav-0.100.3-0.20.21 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1789</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-1789" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1789" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-1789.html">CVE-2019-1789</cve>
<bugzilla href="https://bugzilla.suse.com/1130721">SUSE bug 1130721</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247297" comment="clamav-0.100.3-0.20.21 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-2422" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2422" source="CVE"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-2422.html">CVE-2019-2422</cve>
<bugzilla href="https://bugzilla.suse.com/1122293">SUSE bug 1122293</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009245809" comment="java-1_7_0-ibm-1.7.0_sr10.40-65.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009245810" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.40-65.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009245812" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.40-65.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009245813" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.40-65.35 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2602</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-2602" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2602" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-2602.html">CVE-2019-2602</cve>
<bugzilla href="https://bugzilla.suse.com/1132728">SUSE bug 1132728</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1134718">SUSE bug 1134718</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009254109" comment="java-1_7_0-ibm-1.7.0_sr10.45-65.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254110" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.45-65.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254111" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.45-65.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254112" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.45-65.39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2684</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-2684" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2684" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-2684.html">CVE-2019-2684</cve>
<bugzilla href="https://bugzilla.suse.com/1132732">SUSE bug 1132732</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1134718">SUSE bug 1134718</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009254109" comment="java-1_7_0-ibm-1.7.0_sr10.45-65.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254110" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.45-65.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254111" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.45-65.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254112" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.45-65.39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2697</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-2697" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2697" source="CVE"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: 2D). Supported versions that are affected are Java SE: 7u211 and 8u202. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
<cve href="https://www.suse.com/security/cve/CVE-2019-2697.html">CVE-2019-2697</cve>
<bugzilla href="https://bugzilla.suse.com/1132734">SUSE bug 1132734</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1134718">SUSE bug 1134718</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009254109" comment="java-1_7_0-ibm-1.7.0_sr10.45-65.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254110" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.45-65.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254111" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.45-65.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254112" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.45-65.39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2698</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-2698" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2698" source="CVE"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: 2D). Supported versions that are affected are Java SE: 7u211 and 8u202. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
<cve href="https://www.suse.com/security/cve/CVE-2019-2698.html">CVE-2019-2698</cve>
<bugzilla href="https://bugzilla.suse.com/1132729">SUSE bug 1132729</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1134718">SUSE bug 1134718</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009254109" comment="java-1_7_0-ibm-1.7.0_sr10.45-65.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254110" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.45-65.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254111" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.45-65.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254112" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.45-65.39 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3459</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-3459" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3459" source="CVE"/>
    <description>
    A heap address information leak while using L2CAP_GET_CONF_OPT was discovered in the Linux kernel before 5.1-rc1.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-3459.html">CVE-2019-3459</cve>
<bugzilla href="https://bugzilla.suse.com/1120758">SUSE bug 1120758</bugzilla>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:20193460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3460</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-3460" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3460" source="CVE"/>
    <description>
    A heap data infoleak in multiple locations including L2CAP_PARSE_CONF_RSP was found in the Linux kernel before 5.1-rc1.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-3460.html">CVE-2019-3460</cve>
<bugzilla href="https://bugzilla.suse.com/1120758">SUSE bug 1120758</bugzilla>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:20193816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3816</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-3816" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3816" source="CVE"/>
    <description>
    Openwsman, versions up to and including 2.6.9, are vulnerable to arbitrary file disclosure because the working directory of openwsmand daemon was set to root directory. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted HTTP request to openwsman server.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-3816.html">CVE-2019-3816</cve>
<bugzilla href="https://bugzilla.suse.com/1122623">SUSE bug 1122623</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009245945" comment="libwsman1-2.2.3-0.16.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009245943" comment="openwsman-2.2.3-0.16.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009245946" comment="openwsman-client-2.2.3-0.16.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009245947" comment="openwsman-server-2.2.3-0.16.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3833</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-3833" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3833" source="CVE"/>
    <description>
    Openwsman, versions up to and including 2.6.9, are vulnerable to infinite loop in process_connection() when parsing specially crafted HTTP requests. A remote, unauthenticated attacker can exploit this vulnerability by sending malicious HTTP request to cause denial of service to openwsman server.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-3833.html">CVE-2019-3833</cve>
<bugzilla href="https://bugzilla.suse.com/1122623">SUSE bug 1122623</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009245945" comment="libwsman1-2.2.3-0.16.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009245943" comment="openwsman-2.2.3-0.16.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009245946" comment="openwsman-client-2.2.3-0.16.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009245947" comment="openwsman-server-2.2.3-0.16.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3838</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-3838" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3838" source="CVE"/>
    <description>
    It was found that the forceput operator could be extracted from the DefineResource method in ghostscript before 9.27. A specially crafted PostScript file could use this flaw in order to, for example, have access to the file system outside of the constrains imposed by -dSAFER.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-3838.html">CVE-2019-3838</cve>
<bugzilla href="https://bugzilla.suse.com/1129186">SUSE bug 1129186</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009263096" comment="ghostscript-fonts-other-8.62-47.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263097" comment="ghostscript-fonts-rus-8.62-47.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263098" comment="ghostscript-fonts-std-8.62-47.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263099" comment="ghostscript-library-8.62-47.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263100" comment="ghostscript-omni-8.62-47.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263101" comment="ghostscript-x11-8.62-47.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009263102" comment="libgimpprint-4.2.7-47.16 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3846</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-3846" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3846" source="CVE"/>
    <description>
    A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-3846.html">CVE-2019-3846</cve>
<bugzilla href="https://bugzilla.suse.com/1136424">SUSE bug 1136424</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1136446">SUSE bug 1136446</bugzilla>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:20193855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3855</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-3855" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3855" source="CVE"/>
    <description>
    An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way packets are read from the server. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-3855.html">CVE-2019-3855</cve>
<bugzilla href="https://bugzilla.suse.com/1128471">SUSE bug 1128471</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1134329">SUSE bug 1134329</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1141850">SUSE bug 1141850</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009246612" comment="libssh2-1-1.2.9-4.2.12.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246613" comment="libssh2_org-1.2.9-4.2.12.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3856</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-3856" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3856" source="CVE"/>
    <description>
    An integer overflow flaw, which could lead to an out of bounds write, was discovered in libssh2 before 1.8.1 in the way keyboard prompt requests are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-3856.html">CVE-2019-3856</cve>
<bugzilla href="https://bugzilla.suse.com/1128472">SUSE bug 1128472</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009246612" comment="libssh2-1-1.2.9-4.2.12.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246613" comment="libssh2_org-1.2.9-4.2.12.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3857</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-3857" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3857" source="CVE"/>
    <description>
    An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit signal are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-3857.html">CVE-2019-3857</cve>
<bugzilla href="https://bugzilla.suse.com/1128474">SUSE bug 1128474</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009246612" comment="libssh2-1-1.2.9-4.2.12.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246613" comment="libssh2_org-1.2.9-4.2.12.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3858</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-3858" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3858" source="CVE"/>
    <description>
    An out of bounds read flaw was discovered in libssh2 before 1.8.1 when a specially crafted SFTP packet is received from the server. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-3858.html">CVE-2019-3858</cve>
<bugzilla href="https://bugzilla.suse.com/1128476">SUSE bug 1128476</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009246612" comment="libssh2-1-1.2.9-4.2.12.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246613" comment="libssh2_org-1.2.9-4.2.12.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3859</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-3859" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3859" source="CVE"/>
    <description>
    An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the _libssh2_packet_require and _libssh2_packet_requirev functions. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-3859.html">CVE-2019-3859</cve>
<bugzilla href="https://bugzilla.suse.com/1128480">SUSE bug 1128480</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1130103">SUSE bug 1130103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009252446" comment="libssh2-1-1.2.9-4.2.12.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009252447" comment="libssh2_org-1.2.9-4.2.12.8 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3860</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-3860" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3860" source="CVE"/>
    <description>
    An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SFTP packets with empty payloads are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-3860.html">CVE-2019-3860</cve>
<bugzilla href="https://bugzilla.suse.com/1128481">SUSE bug 1128481</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1136570">SUSE bug 1136570</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009257948" comment="libssh2-1-1.2.9-4.2.12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009257949" comment="libssh2_org-1.2.9-4.2.12.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3861</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-3861" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3861" source="CVE"/>
    <description>
    An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH packets with a padding length value greater than the packet length are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-3861.html">CVE-2019-3861</cve>
<bugzilla href="https://bugzilla.suse.com/1128490">SUSE bug 1128490</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009246612" comment="libssh2-1-1.2.9-4.2.12.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246613" comment="libssh2_org-1.2.9-4.2.12.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3862</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-3862" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3862" source="CVE"/>
    <description>
    An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit status message and no payload are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-3862.html">CVE-2019-3862</cve>
<bugzilla href="https://bugzilla.suse.com/1128492">SUSE bug 1128492</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009246612" comment="libssh2-1-1.2.9-4.2.12.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246613" comment="libssh2_org-1.2.9-4.2.12.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3863</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-3863" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3863" source="CVE"/>
    <description>
    A flaw was found in libssh2 before 1.8.1. A server could send a multiple keyboard interactive response messages whose total length are greater than unsigned char max characters. This value is used as an index to copy memory causing in an out of bounds memory write error.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-3863.html">CVE-2019-3863</cve>
<bugzilla href="https://bugzilla.suse.com/1128493">SUSE bug 1128493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1130103">SUSE bug 1130103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009246612" comment="libssh2-1-1.2.9-4.2.12.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246613" comment="libssh2_org-1.2.9-4.2.12.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3880</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-3880" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3880" source="CVE"/>
    <description>
    A flaw was found in the way samba implemented an RPC endpoint emulating the Windows registry service API. An unprivileged attacker could use this flaw to create a new registry hive file anywhere they have unix permissions which could lead to creation of a new file in the Samba share. Versions before 4.8.11, 4.9.6 and 4.10.2 are vulnerable.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-3880.html">CVE-2019-3880</cve>
<bugzilla href="https://bugzilla.suse.com/1131060">SUSE bug 1131060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1139519">SUSE bug 1139519</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009253256" comment="ldapsmb-1.34b-94.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253257" comment="libldb1-3.6.3-94.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253258" comment="libsmbclient0-3.6.3-94.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253271" comment="libsmbclient0-32bit-3.6.3-94.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253259" comment="libtalloc2-3.6.3-94.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253272" comment="libtalloc2-32bit-3.6.3-94.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253260" comment="libtdb1-3.6.3-94.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253273" comment="libtdb1-32bit-3.6.3-94.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253261" comment="libtevent0-3.6.3-94.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253274" comment="libtevent0-32bit-3.6.3-94.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253262" comment="libwbclient0-3.6.3-94.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253275" comment="libwbclient0-32bit-3.6.3-94.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253263" comment="samba-3.6.3-94.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253276" comment="samba-32bit-3.6.3-94.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253264" comment="samba-client-3.6.3-94.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253277" comment="samba-client-32bit-3.6.3-94.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253265" comment="samba-doc-3.6.3-94.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253266" comment="samba-krb-printing-3.6.3-94.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253267" comment="samba-winbind-3.6.3-94.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253278" comment="samba-winbind-32bit-3.6.3-94.19 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3886</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-3886" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3886" source="CVE"/>
    <description>
    An incorrect permissions check was discovered in libvirt 4.8.0 and above. The readonly permission was allowed to invoke APIs depending on the guest agent, which could lead to potentially disclosing unintended information or denial of service by causing libvirt to block.
    </description>
<advisory from="security@suse.de">
<cve href="https://www.suse.com/security/cve/CVE-2019-3886.html">CVE-2019-3886</cve>
<bugzilla href="https://bugzilla.suse.com/1131595">SUSE bug 1131595</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1133150">SUSE bug 1133150</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1138301">SUSE bug 1138301</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009253955" comment="libvirt-1.0.5.9-21.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253956" comment="libvirt-client-1.0.5.9-21.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253957" comment="libvirt-client-32bit-1.0.5.9-21.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253958" comment="libvirt-doc-1.0.5.9-21.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253959" comment="libvirt-lock-sanlock-1.0.5.9-21.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253960" comment="libvirt-python-1.0.5.9-21.12 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3896</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-3896" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3896" source="CVE"/>
    <description>
    A double-free can happen in idr_remove_all() in lib/idr.c in the Linux kernel 2.6 branch. An unprivileged local attacker can use this flaw for a privilege escalation or for a system crash and a denial of service (DoS).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-3896.html">CVE-2019-3896</cve>
<bugzilla href="https://bugzilla.suse.com/1138943">SUSE bug 1138943</bugzilla>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:20195010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5010</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-5010" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5010" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-5010.html">CVE-2019-5010</cve>
<bugzilla href="https://bugzilla.suse.com/1122191">SUSE bug 1122191</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009249588" comment="libpython2_7-1_0-2.7.9-6.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249589" comment="libpython2_7-1_0-32bit-2.7.9-6.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249590" comment="python27-2.7.9-6.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249591" comment="python27-32bit-2.7.9-6.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249592" comment="python27-base-2.7.9-6.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249593" comment="python27-base-32bit-2.7.9-6.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249594" comment="python27-curses-2.7.9-6.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249595" comment="python27-demo-2.7.9-6.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249596" comment="python27-devel-2.7.9-6.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249597" comment="python27-doc-2.7.9-6.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249598" comment="python27-doc-pdf-2.7.9-6.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249599" comment="python27-gdbm-2.7.9-6.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249600" comment="python27-idle-2.7.9-6.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249601" comment="python27-tk-2.7.9-6.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009249602" comment="python27-xml-2.7.9-6.17 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5436</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-5436" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5436" source="CVE"/>
    <description>
    A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7.19.4 through 7.64.1.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-5436.html">CVE-2019-5436</cve>
<bugzilla href="https://bugzilla.suse.com/1135170">SUSE bug 1135170</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1149496">SUSE bug 1149496</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009254215" comment="curl-7.37.0-70.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254211" comment="curl-openssl1-7.37.0-70.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254216" comment="libcurl-devel-7.37.0-70.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254217" comment="libcurl4-7.37.0-70.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254218" comment="libcurl4-32bit-7.37.0-70.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254212" comment="libcurl4-openssl1-7.37.0-70.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009254213" comment="libcurl4-openssl1-32bit-7.37.0-70.41 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5482</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-5482" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5482" source="CVE"/>
    <description>
    Heap buffer overflow in the TFTP protocol handler in cURL 7.19.4 to 7.65.3.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-5482.html">CVE-2019-5482</cve>
<bugzilla href="https://bugzilla.suse.com/1149496">SUSE bug 1149496</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009264653" comment="curl-7.37.0-70.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264643" comment="curl-openssl1-7.37.0-70.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264654" comment="libcurl-devel-7.37.0-70.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264655" comment="libcurl4-7.37.0-70.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264656" comment="libcurl4-32bit-7.37.0-70.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264644" comment="libcurl4-openssl1-7.37.0-70.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264645" comment="libcurl4-openssl1-32bit-7.37.0-70.44 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5489</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-5489" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5489" source="CVE"/>
    <description>
    The mincore() implementation in mm/mincore.c in the Linux kernel through 4.19.13 allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may be possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-5489.html">CVE-2019-5489</cve>
<bugzilla href="https://bugzilla.suse.com/1120843">SUSE bug 1120843</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1120885">SUSE bug 1120885</bugzilla>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:20196109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6109</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-6109" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6109" source="CVE"/>
    <description>
    An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-6109.html">CVE-2019-6109</cve>
<bugzilla href="https://bugzilla.suse.com/1121571">SUSE bug 1121571</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1121816">SUSE bug 1121816</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1121818">SUSE bug 1121818</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1121821">SUSE bug 1121821</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1144902">SUSE bug 1144902</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1148884">SUSE bug 1148884</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009247592" comment="openssh-6.6p1-41.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247593" comment="openssh-askpass-gnome-6.6p1-41.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250401" comment="openssh-openssl1-6.6p1-41.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250402" comment="openssh-openssl1-helpers-6.6p1-41.18 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6111</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-6111" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6111" source="CVE"/>
    <description>
    An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-6111.html">CVE-2019-6111</cve>
<bugzilla href="https://bugzilla.suse.com/1121571">SUSE bug 1121571</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1121816">SUSE bug 1121816</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1121818">SUSE bug 1121818</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1121821">SUSE bug 1121821</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123028">SUSE bug 1123028</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123220">SUSE bug 1123220</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1131109">SUSE bug 1131109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1144902">SUSE bug 1144902</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1148884">SUSE bug 1148884</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009247592" comment="openssh-6.6p1-41.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247593" comment="openssh-askpass-gnome-6.6p1-41.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250401" comment="openssh-openssl1-6.6p1-41.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250402" comment="openssh-openssl1-helpers-6.6p1-41.18 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6128</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-6128" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6128" source="CVE"/>
    <description>
    The TIFFFdOpen function in tif_unix.c in LibTIFF 4.0.10 has a memory leak, as demonstrated by pal2rgb.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-6128.html">CVE-2019-6128</cve>
<bugzilla href="https://bugzilla.suse.com/1121626">SUSE bug 1121626</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009246748" comment="libtiff3-3.8.2-141.169.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246752" comment="libtiff3-32bit-3.8.2-141.169.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246742" comment="tiff-3.8.2-141.169.31 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6446</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-6446" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6446" source="CVE"/>
    <description>
    ** DISPUTED **   An issue was discovered in NumPy 1.16.0 and earlier. It uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, as demonstrated by a numpy.load call. NOTE: third parties dispute this issue because it is  a behavior that might have legitimate applications in (for example)  loading serialized Python object arrays from trusted and authenticated  sources.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-6446.html">CVE-2019-6446</cve>
<bugzilla href="https://bugzilla.suse.com/1122208">SUSE bug 1122208</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009245814" comment="python-numpy-1.3.0-1.3.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6465</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-6465" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6465" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-6465.html">CVE-2019-6465</cve>
<bugzilla href="https://bugzilla.suse.com/1126069">SUSE bug 1126069</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1148887">SUSE bug 1148887</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009256176" comment="bind-9.9.6P1-0.51.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256177" comment="bind-chrootenv-9.9.6P1-0.51.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256179" comment="bind-doc-9.9.6P1-0.51.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256180" comment="bind-libs-9.9.6P1-0.51.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256188" comment="bind-libs-32bit-9.9.6P1-0.51.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256181" comment="bind-utils-9.9.6P1-0.51.15 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6778</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-6778" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6778" source="CVE"/>
    <description>
    In QEMU 3.0.0, tcp_emu in slirp/tcp_subr.c has a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-6778.html">CVE-2019-6778</cve>
<bugzilla href="https://bugzilla.suse.com/1123156">SUSE bug 1123156</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123157">SUSE bug 1123157</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009250396" comment="kvm-1.4.2-53.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250489" comment="xen-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250490" comment="xen-doc-html-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250491" comment="xen-doc-pdf-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250492" comment="xen-kmp-default-4.2.5_21_3.0.101_0.190.TDC-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250493" comment="xen-libs-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250494" comment="xen-tools-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250495" comment="xen-tools-domU-4.2.5_21-47.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6977</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-6977" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6977" source="CVE"/>
    <description>
    gdImageColorMatch in gd_color_match.c in the GD Graphics Library (aka LibGD) 2.2.5, as used in the imagecolormatch function in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1, has a heap-based buffer overflow. This can be exploited by an attacker who is able to trigger imagecolormatch calls with crafted image data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-6977.html">CVE-2019-6977</cve>
<bugzilla href="https://bugzilla.suse.com/1123354">SUSE bug 1123354</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1123361">SUSE bug 1123361</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009244301" comment="apache2-mod_php53-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244292" comment="php53-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244302" comment="php53-bcmath-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244303" comment="php53-bz2-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244304" comment="php53-calendar-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244305" comment="php53-ctype-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244306" comment="php53-curl-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244307" comment="php53-dba-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244308" comment="php53-dom-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244309" comment="php53-exif-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244310" comment="php53-fastcgi-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244311" comment="php53-fileinfo-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244312" comment="php53-ftp-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244313" comment="php53-gd-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244314" comment="php53-gettext-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244315" comment="php53-gmp-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244316" comment="php53-iconv-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244317" comment="php53-intl-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244318" comment="php53-json-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244319" comment="php53-ldap-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244320" comment="php53-mbstring-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244321" comment="php53-mcrypt-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244322" comment="php53-mysql-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244323" comment="php53-odbc-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244324" comment="php53-openssl-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244325" comment="php53-pcntl-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244326" comment="php53-pdo-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244327" comment="php53-pear-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244328" comment="php53-pgsql-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244329" comment="php53-pspell-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244330" comment="php53-shmop-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244331" comment="php53-snmp-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244332" comment="php53-soap-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244333" comment="php53-suhosin-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244334" comment="php53-sysvmsg-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244335" comment="php53-sysvsem-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244336" comment="php53-sysvshm-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244337" comment="php53-tokenizer-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244338" comment="php53-wddx-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244339" comment="php53-xmlreader-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244340" comment="php53-xmlrpc-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244341" comment="php53-xmlwriter-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244342" comment="php53-xsl-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244343" comment="php53-zip-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244344" comment="php53-zlib-5.3.17-112.53 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6978</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-6978" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6978" source="CVE"/>
    <description>
    The GD Graphics Library (aka LibGD) 2.2.5 has a double free in the gdImage*Ptr() functions in gd_gif_out.c, gd_jpeg.c, and gd_wbmp.c. NOTE: PHP is unaffected.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-6978.html">CVE-2019-6978</cve>
<bugzilla href="https://bugzilla.suse.com/1123522">SUSE bug 1123522</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009244301" comment="apache2-mod_php53-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244292" comment="php53-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244302" comment="php53-bcmath-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244303" comment="php53-bz2-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244304" comment="php53-calendar-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244305" comment="php53-ctype-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244306" comment="php53-curl-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244307" comment="php53-dba-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244308" comment="php53-dom-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244309" comment="php53-exif-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244310" comment="php53-fastcgi-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244311" comment="php53-fileinfo-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244312" comment="php53-ftp-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244313" comment="php53-gd-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244314" comment="php53-gettext-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244315" comment="php53-gmp-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244316" comment="php53-iconv-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244317" comment="php53-intl-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244318" comment="php53-json-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244319" comment="php53-ldap-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244320" comment="php53-mbstring-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244321" comment="php53-mcrypt-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244322" comment="php53-mysql-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244323" comment="php53-odbc-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244324" comment="php53-openssl-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244325" comment="php53-pcntl-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244326" comment="php53-pdo-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244327" comment="php53-pear-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244328" comment="php53-pgsql-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244329" comment="php53-pspell-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244330" comment="php53-shmop-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244331" comment="php53-snmp-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244332" comment="php53-soap-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244333" comment="php53-suhosin-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244334" comment="php53-sysvmsg-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244335" comment="php53-sysvsem-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244336" comment="php53-sysvshm-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244337" comment="php53-tokenizer-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244338" comment="php53-wddx-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244339" comment="php53-xmlreader-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244340" comment="php53-xmlrpc-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244341" comment="php53-xmlwriter-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244342" comment="php53-xsl-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244343" comment="php53-zip-5.3.17-112.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009244344" comment="php53-zlib-5.3.17-112.53 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7150</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-7150" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7150" source="CVE"/>
    <description>
    An issue was discovered in elfutils 0.175. A segmentation fault can occur in the function elf64_xlatetom in libelf/elf32_xlatetom.c, due to dwfl_segment_report_module not checking whether the dyn data read from a core file is truncated. A crafted input can cause a program crash, leading to denial-of-service, as demonstrated by eu-stack.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-7150.html">CVE-2019-7150</cve>
<bugzilla href="https://bugzilla.suse.com/1123685">SUSE bug 1123685</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009256650" comment="elfutils-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256651" comment="libasm1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256652" comment="libasm1-32bit-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256653" comment="libdw1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256654" comment="libdw1-32bit-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256655" comment="libebl1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256656" comment="libebl1-32bit-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256657" comment="libelf1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256658" comment="libelf1-32bit-0.152-4.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7175</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-7175" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175" source="CVE"/>
    <description>
    In ImageMagick before 7.0.8-25, some memory leaks exist in DecodeImage in coders/pcd.c.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-7175.html">CVE-2019-7175</cve>
<bugzilla href="https://bugzilla.suse.com/1128649">SUSE bug 1128649</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009246344" comment="ImageMagick-6.4.3.6-78.92 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246355" comment="libMagickCore1-6.4.3.6-78.92 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246356" comment="libMagickCore1-32bit-6.4.3.6-78.92 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7222</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-7222" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7222" source="CVE"/>
    <description>
    The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-7222.html">CVE-2019-7222</cve>
<bugzilla href="https://bugzilla.suse.com/1124735">SUSE bug 1124735</bugzilla>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:20197397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7397</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-7397" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397" source="CVE"/>
    <description>
    In ImageMagick before 7.0.8-25 and GraphicsMagick through 1.3.31, several memory leaks exist in WritePDFImage in coders/pdf.c.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-7397.html">CVE-2019-7397</cve>
<bugzilla href="https://bugzilla.suse.com/1124366">SUSE bug 1124366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009246344" comment="ImageMagick-6.4.3.6-78.92 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246355" comment="libMagickCore1-6.4.3.6-78.92 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246356" comment="libMagickCore1-32bit-6.4.3.6-78.92 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7398</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-7398" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398" source="CVE"/>
    <description>
    In ImageMagick before 7.0.8-25, a memory leak exists in WriteDIBImage in coders/dib.c.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-7398.html">CVE-2019-7398</cve>
<bugzilla href="https://bugzilla.suse.com/1124365">SUSE bug 1124365</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009246344" comment="ImageMagick-6.4.3.6-78.92 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246355" comment="libMagickCore1-6.4.3.6-78.92 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246356" comment="libMagickCore1-32bit-6.4.3.6-78.92 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7572</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-7572" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7572" source="CVE"/>
    <description>
    SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a buffer over-read in IMA_ADPCM_nibble in audio/SDL_wave.c.
    </description>
<advisory from="security@suse.de">
<cve href="https://www.suse.com/security/cve/CVE-2019-7572.html">CVE-2019-7572</cve>
<bugzilla href="https://bugzilla.suse.com/1124806">SUSE bug 1124806</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009246571" comment="SDL-1.2.13-106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246572" comment="SDL-32bit-1.2.13-106.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7573</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-7573" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7573" source="CVE"/>
    <description>
    SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (inside the wNumCoef loop).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-7573.html">CVE-2019-7573</cve>
<bugzilla href="https://bugzilla.suse.com/1124805">SUSE bug 1124805</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009246571" comment="SDL-1.2.13-106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246572" comment="SDL-32bit-1.2.13-106.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7574</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-7574" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7574" source="CVE"/>
    <description>
    SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in IMA_ADPCM_decode in audio/SDL_wave.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-7574.html">CVE-2019-7574</cve>
<bugzilla href="https://bugzilla.suse.com/1124803">SUSE bug 1124803</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009246571" comment="SDL-1.2.13-106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246572" comment="SDL-32bit-1.2.13-106.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7575</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-7575" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7575" source="CVE"/>
    <description>
    SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer overflow in MS_ADPCM_decode in audio/SDL_wave.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-7575.html">CVE-2019-7575</cve>
<bugzilla href="https://bugzilla.suse.com/1124802">SUSE bug 1124802</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009246571" comment="SDL-1.2.13-106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246572" comment="SDL-32bit-1.2.13-106.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7576</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-7576" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7576" source="CVE"/>
    <description>
    SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (outside the wNumCoef loop).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-7576.html">CVE-2019-7576</cve>
<bugzilla href="https://bugzilla.suse.com/1124799">SUSE bug 1124799</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009246571" comment="SDL-1.2.13-106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246572" comment="SDL-32bit-1.2.13-106.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7577</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-7577" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7577" source="CVE"/>
    <description>
    SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a buffer over-read in SDL_LoadWAV_RW in audio/SDL_wave.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-7577.html">CVE-2019-7577</cve>
<bugzilla href="https://bugzilla.suse.com/1124800">SUSE bug 1124800</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009246571" comment="SDL-1.2.13-106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246572" comment="SDL-32bit-1.2.13-106.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7578</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-7578" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7578" source="CVE"/>
    <description>
    SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in InitIMA_ADPCM in audio/SDL_wave.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-7578.html">CVE-2019-7578</cve>
<bugzilla href="https://bugzilla.suse.com/1125099">SUSE bug 1125099</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009246571" comment="SDL-1.2.13-106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246572" comment="SDL-32bit-1.2.13-106.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7635</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-7635" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7635" source="CVE"/>
    <description>
    SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in Blit1to4 in video/SDL_blit_1.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-7635.html">CVE-2019-7635</cve>
<bugzilla href="https://bugzilla.suse.com/1124827">SUSE bug 1124827</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009246571" comment="SDL-1.2.13-106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246572" comment="SDL-32bit-1.2.13-106.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-7636" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7636" source="CVE"/>
    <description>
    SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in SDL_GetRGB in video/SDL_pixels.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-7636.html">CVE-2019-7636</cve>
<bugzilla href="https://bugzilla.suse.com/1124826">SUSE bug 1124826</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009246571" comment="SDL-1.2.13-106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246572" comment="SDL-32bit-1.2.13-106.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7637</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-7637" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7637" source="CVE"/>
    <description>
    SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer overflow in SDL_FillRect in video/SDL_surface.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-7637.html">CVE-2019-7637</cve>
<bugzilla href="https://bugzilla.suse.com/1124825">SUSE bug 1124825</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009246571" comment="SDL-1.2.13-106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246572" comment="SDL-32bit-1.2.13-106.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7638</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-7638" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7638" source="CVE"/>
    <description>
    SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in Map1toN in video/SDL_pixels.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-7638.html">CVE-2019-7638</cve>
<bugzilla href="https://bugzilla.suse.com/1124824">SUSE bug 1124824</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009246571" comment="SDL-1.2.13-106.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246572" comment="SDL-32bit-1.2.13-106.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7665</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-7665" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7665" source="CVE"/>
    <description>
    In elfutils 0.175, a heap-based buffer over-read was discovered in the function elf32_xlatetom in elf32_xlatetom.c in libelf. A crafted ELF input can cause a segmentation fault leading to denial of service (program crash) because ebl_core_note does not reject malformed core file notes.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-7665.html">CVE-2019-7665</cve>
<bugzilla href="https://bugzilla.suse.com/1125007">SUSE bug 1125007</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009256650" comment="elfutils-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256651" comment="libasm1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256652" comment="libasm1-32bit-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256653" comment="libdw1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256654" comment="libdw1-32bit-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256655" comment="libebl1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256656" comment="libebl1-32bit-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256657" comment="libelf1-0.152-4.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256658" comment="libelf1-32bit-0.152-4.25 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8457</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-8457" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457" source="CVE"/>
    <description>
    SQLite3 from 3.6.0 to and including 3.27.2 is vulnerable to heap out-of-bound read in the rtreenode() function when handling invalid rtree tables.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-8457.html">CVE-2019-8457</cve>
<bugzilla href="https://bugzilla.suse.com/1136976">SUSE bug 1136976</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009256844" comment="libsqlite3-0-3.7.6.3-1.4.7.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256853" comment="libsqlite3-0-32bit-3.7.6.3-1.4.7.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256845" comment="sqlite3-3.7.6.3-1.4.7.9 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8936</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-8936" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8936" source="CVE"/>
    <description>
    NTP through 4.2.8p12 has a NULL Pointer Dereference.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-8936.html">CVE-2019-8936</cve>
<bugzilla href="https://bugzilla.suse.com/1128525">SUSE bug 1128525</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1148892">SUSE bug 1148892</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009246745" comment="ntp-4.2.8p13-48.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009246746" comment="ntp-doc-4.2.8p13-48.27 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9020</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-9020" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9020" source="CVE"/>
    <description>
    An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. Invalid input to the function xmlrpc_decode() can lead to an invalid memory access (heap out of bounds read or read after free). This is related to xml_elem_parse_buf in ext/xmlrpc/libxmlrpc/xml_element.c.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-9020.html">CVE-2019-9020</cve>
<bugzilla href="https://bugzilla.suse.com/1126711">SUSE bug 1126711</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009247299" comment="apache2-mod_php53-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247289" comment="php53-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247300" comment="php53-bcmath-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247301" comment="php53-bz2-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247302" comment="php53-calendar-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247303" comment="php53-ctype-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247304" comment="php53-curl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247305" comment="php53-dba-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247306" comment="php53-dom-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247307" comment="php53-exif-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247308" comment="php53-fastcgi-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247309" comment="php53-fileinfo-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247310" comment="php53-ftp-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247311" comment="php53-gd-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247312" comment="php53-gettext-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247313" comment="php53-gmp-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247314" comment="php53-iconv-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247315" comment="php53-intl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247316" comment="php53-json-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247317" comment="php53-ldap-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247318" comment="php53-mbstring-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247319" comment="php53-mcrypt-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247320" comment="php53-mysql-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247321" comment="php53-odbc-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247322" comment="php53-openssl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247323" comment="php53-pcntl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247324" comment="php53-pdo-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247325" comment="php53-pear-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247326" comment="php53-pgsql-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247327" comment="php53-pspell-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247328" comment="php53-shmop-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247329" comment="php53-snmp-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247330" comment="php53-soap-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247331" comment="php53-suhosin-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247332" comment="php53-sysvmsg-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247333" comment="php53-sysvsem-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247334" comment="php53-sysvshm-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247335" comment="php53-tokenizer-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247336" comment="php53-wddx-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247337" comment="php53-xmlreader-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247338" comment="php53-xmlrpc-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247339" comment="php53-xmlwriter-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247340" comment="php53-xsl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247341" comment="php53-zip-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247342" comment="php53-zlib-5.3.17-112.58 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9021</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-9021" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9021" source="CVE"/>
    <description>
    An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. A heap-based buffer over-read in PHAR reading functions in the PHAR extension may allow an attacker to read allocated or unallocated memory past the actual data when trying to parse the file name, a different vulnerability than CVE-2018-20783. This is related to phar_detect_phar_fname_ext in ext/phar/phar.c.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-9021.html">CVE-2019-9021</cve>
<bugzilla href="https://bugzilla.suse.com/1126713">SUSE bug 1126713</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009247299" comment="apache2-mod_php53-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247289" comment="php53-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247300" comment="php53-bcmath-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247301" comment="php53-bz2-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247302" comment="php53-calendar-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247303" comment="php53-ctype-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247304" comment="php53-curl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247305" comment="php53-dba-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247306" comment="php53-dom-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247307" comment="php53-exif-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247308" comment="php53-fastcgi-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247309" comment="php53-fileinfo-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247310" comment="php53-ftp-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247311" comment="php53-gd-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247312" comment="php53-gettext-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247313" comment="php53-gmp-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247314" comment="php53-iconv-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247315" comment="php53-intl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247316" comment="php53-json-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247317" comment="php53-ldap-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247318" comment="php53-mbstring-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247319" comment="php53-mcrypt-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247320" comment="php53-mysql-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247321" comment="php53-odbc-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247322" comment="php53-openssl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247323" comment="php53-pcntl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247324" comment="php53-pdo-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247325" comment="php53-pear-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247326" comment="php53-pgsql-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247327" comment="php53-pspell-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247328" comment="php53-shmop-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247329" comment="php53-snmp-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247330" comment="php53-soap-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247331" comment="php53-suhosin-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247332" comment="php53-sysvmsg-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247333" comment="php53-sysvsem-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247334" comment="php53-sysvshm-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247335" comment="php53-tokenizer-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247336" comment="php53-wddx-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247337" comment="php53-xmlreader-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247338" comment="php53-xmlrpc-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247339" comment="php53-xmlwriter-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247340" comment="php53-xsl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247341" comment="php53-zip-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247342" comment="php53-zlib-5.3.17-112.58 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9023</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-9023" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9023" source="CVE"/>
    <description>
    An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. A number of heap-based buffer over-read instances are present in mbstring regular expression functions when supplied with invalid multibyte data. These occur in ext/mbstring/oniguruma/regcomp.c, ext/mbstring/oniguruma/regexec.c, ext/mbstring/oniguruma/regparse.c, ext/mbstring/oniguruma/enc/unicode.c, and ext/mbstring/oniguruma/src/utf32_be.c when a multibyte regular expression pattern contains invalid multibyte sequences.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-9023.html">CVE-2019-9023</cve>
<bugzilla href="https://bugzilla.suse.com/1126823">SUSE bug 1126823</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009247299" comment="apache2-mod_php53-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247289" comment="php53-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247300" comment="php53-bcmath-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247301" comment="php53-bz2-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247302" comment="php53-calendar-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247303" comment="php53-ctype-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247304" comment="php53-curl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247305" comment="php53-dba-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247306" comment="php53-dom-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247307" comment="php53-exif-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247308" comment="php53-fastcgi-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247309" comment="php53-fileinfo-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247310" comment="php53-ftp-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247311" comment="php53-gd-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247312" comment="php53-gettext-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247313" comment="php53-gmp-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247314" comment="php53-iconv-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247315" comment="php53-intl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247316" comment="php53-json-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247317" comment="php53-ldap-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247318" comment="php53-mbstring-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247319" comment="php53-mcrypt-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247320" comment="php53-mysql-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247321" comment="php53-odbc-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247322" comment="php53-openssl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247323" comment="php53-pcntl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247324" comment="php53-pdo-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247325" comment="php53-pear-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247326" comment="php53-pgsql-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247327" comment="php53-pspell-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247328" comment="php53-shmop-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247329" comment="php53-snmp-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247330" comment="php53-soap-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247331" comment="php53-suhosin-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247332" comment="php53-sysvmsg-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247333" comment="php53-sysvsem-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247334" comment="php53-sysvshm-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247335" comment="php53-tokenizer-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247336" comment="php53-wddx-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247337" comment="php53-xmlreader-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247338" comment="php53-xmlrpc-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247339" comment="php53-xmlwriter-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247340" comment="php53-xsl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247341" comment="php53-zip-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247342" comment="php53-zlib-5.3.17-112.58 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9024</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-9024" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9024" source="CVE"/>
    <description>
    An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. xmlrpc_decode() can allow a hostile XMLRPC server to cause PHP to read memory outside of allocated areas in base64_decode_xmlrpc in ext/xmlrpc/libxmlrpc/base64.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-9024.html">CVE-2019-9024</cve>
<bugzilla href="https://bugzilla.suse.com/1126821">SUSE bug 1126821</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009247299" comment="apache2-mod_php53-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247289" comment="php53-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247300" comment="php53-bcmath-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247301" comment="php53-bz2-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247302" comment="php53-calendar-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247303" comment="php53-ctype-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247304" comment="php53-curl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247305" comment="php53-dba-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247306" comment="php53-dom-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247307" comment="php53-exif-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247308" comment="php53-fastcgi-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247309" comment="php53-fileinfo-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247310" comment="php53-ftp-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247311" comment="php53-gd-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247312" comment="php53-gettext-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247313" comment="php53-gmp-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247314" comment="php53-iconv-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247315" comment="php53-intl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247316" comment="php53-json-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247317" comment="php53-ldap-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247318" comment="php53-mbstring-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247319" comment="php53-mcrypt-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247320" comment="php53-mysql-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247321" comment="php53-odbc-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247322" comment="php53-openssl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247323" comment="php53-pcntl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247324" comment="php53-pdo-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247325" comment="php53-pear-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247326" comment="php53-pgsql-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247327" comment="php53-pspell-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247328" comment="php53-shmop-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247329" comment="php53-snmp-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247330" comment="php53-soap-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247331" comment="php53-suhosin-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247332" comment="php53-sysvmsg-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247333" comment="php53-sysvsem-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247334" comment="php53-sysvshm-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247335" comment="php53-tokenizer-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247336" comment="php53-wddx-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247337" comment="php53-xmlreader-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247338" comment="php53-xmlrpc-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247339" comment="php53-xmlwriter-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247340" comment="php53-xsl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247341" comment="php53-zip-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247342" comment="php53-zlib-5.3.17-112.58 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9169</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-9169" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169" source="CVE"/>
    <description>
    In the GNU C Library (aka glibc or libc6) through 2.29, proceed_next_node in posix/regexec.c has a heap-based buffer over-read via an attempted case-insensitive regular-expression match.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-9169.html">CVE-2019-9169</cve>
<bugzilla href="https://bugzilla.suse.com/1127308">SUSE bug 1127308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1146392">SUSE bug 1146392</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009256836" comment="glibc-2.11.3-17.110.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256849" comment="glibc-32bit-2.11.3-17.110.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256837" comment="glibc-devel-2.11.3-17.110.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256850" comment="glibc-devel-32bit-2.11.3-17.110.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256838" comment="glibc-html-2.11.3-17.110.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256839" comment="glibc-i18ndata-2.11.3-17.110.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256840" comment="glibc-info-2.11.3-17.110.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256841" comment="glibc-locale-2.11.3-17.110.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256851" comment="glibc-locale-32bit-2.11.3-17.110.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256842" comment="glibc-profile-2.11.3-17.110.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256852" comment="glibc-profile-32bit-2.11.3-17.110.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256843" comment="nscd-2.11.3-17.110.33 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9213</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-9213" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9213" source="CVE"/>
    <description>
    In the Linux kernel before 4.20.14, expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which makes it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-9213.html">CVE-2019-9213</cve>
<bugzilla href="https://bugzilla.suse.com/1128166">SUSE bug 1128166</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1128378">SUSE bug 1128378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1129016">SUSE bug 1129016</bugzilla>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:20199456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9456</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-9456" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9456" source="CVE"/>
    <description>
    In the Android kernel in Pixel C USB monitor driver there is a possible OOB write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-9456.html">CVE-2019-9456</cve>
<bugzilla href="https://bugzilla.suse.com/1150025">SUSE bug 1150025</bugzilla>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:20199636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-9636" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9636" source="CVE"/>
    <description>
    Python 2.7.x through 2.7.16 and 3.x through 3.7.2 is affected by: Improper Handling of Unicode Encoding (with an incorrect netloc) during NFKC normalization. The impact is: Information disclosure (credentials, cookies, etc. that are cached against a given hostname). The components are: urllib.parse.urlsplit, urllib.parse.urlparse. The attack vector is: A specially crafted URL could be incorrectly parsed to locate cookies or authentication data and send that information to a different host than when parsed correctly.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-9636.html">CVE-2019-9636</cve>
<bugzilla href="https://bugzilla.suse.com/1129346">SUSE bug 1129346</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1135433">SUSE bug 1135433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1138459">SUSE bug 1138459</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009251184" comment="libpython2_6-1_0-2.6.9-40.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251195" comment="libpython2_6-1_0-32bit-2.6.9-40.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251198" comment="libpython2_7-1_0-2.7.9-6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251199" comment="libpython2_7-1_0-32bit-2.7.9-6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251185" comment="python-2.6.9-40.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251196" comment="python-32bit-2.6.9-40.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251186" comment="python-base-2.6.9-40.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251197" comment="python-base-32bit-2.6.9-40.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251187" comment="python-curses-2.6.9-40.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251188" comment="python-demo-2.6.9-40.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251189" comment="python-doc-2.6-8.40.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251190" comment="python-doc-pdf-2.6-8.40.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251191" comment="python-gdbm-2.6.9-40.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251192" comment="python-idle-2.6.9-40.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251193" comment="python-tk-2.6.9-40.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251194" comment="python-xml-2.6.9-40.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251200" comment="python27-2.7.9-6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251201" comment="python27-32bit-2.7.9-6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251202" comment="python27-base-2.7.9-6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251203" comment="python27-base-32bit-2.7.9-6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251204" comment="python27-curses-2.7.9-6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251205" comment="python27-demo-2.7.9-6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251206" comment="python27-devel-2.7.9-6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251207" comment="python27-doc-2.7.9-6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251208" comment="python27-doc-pdf-2.7.9-6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251209" comment="python27-gdbm-2.7.9-6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251210" comment="python27-idle-2.7.9-6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251211" comment="python27-tk-2.7.9-6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251212" comment="python27-xml-2.7.9-6.20 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9637</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-9637" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9637" source="CVE"/>
    <description>
    An issue was discovered in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. Due to the way rename() across filesystems is implemented, it is possible that file being renamed is briefly available with wrong permissions while the rename is ongoing, thus enabling unauthorized users to access the data.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-9637.html">CVE-2019-9637</cve>
<bugzilla href="https://bugzilla.suse.com/1128892">SUSE bug 1128892</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009247299" comment="apache2-mod_php53-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247289" comment="php53-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247300" comment="php53-bcmath-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247301" comment="php53-bz2-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247302" comment="php53-calendar-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247303" comment="php53-ctype-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247304" comment="php53-curl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247305" comment="php53-dba-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247306" comment="php53-dom-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247307" comment="php53-exif-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247308" comment="php53-fastcgi-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247309" comment="php53-fileinfo-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247310" comment="php53-ftp-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247311" comment="php53-gd-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247312" comment="php53-gettext-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247313" comment="php53-gmp-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247314" comment="php53-iconv-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247315" comment="php53-intl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247316" comment="php53-json-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247317" comment="php53-ldap-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247318" comment="php53-mbstring-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247319" comment="php53-mcrypt-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247320" comment="php53-mysql-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247321" comment="php53-odbc-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247322" comment="php53-openssl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247323" comment="php53-pcntl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247324" comment="php53-pdo-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247325" comment="php53-pear-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247326" comment="php53-pgsql-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247327" comment="php53-pspell-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247328" comment="php53-shmop-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247329" comment="php53-snmp-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247330" comment="php53-soap-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247331" comment="php53-suhosin-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247332" comment="php53-sysvmsg-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247333" comment="php53-sysvsem-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247334" comment="php53-sysvshm-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247335" comment="php53-tokenizer-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247336" comment="php53-wddx-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247337" comment="php53-xmlreader-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247338" comment="php53-xmlrpc-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247339" comment="php53-xmlwriter-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247340" comment="php53-xsl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247341" comment="php53-zip-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247342" comment="php53-zlib-5.3.17-112.58 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9638</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-9638" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9638" source="CVE"/>
    <description>
    An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an uninitialized read in exif_process_IFD_in_MAKERNOTE because of mishandling the maker_note-&gt;offset relationship to value_len.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-9638.html">CVE-2019-9638</cve>
<bugzilla href="https://bugzilla.suse.com/1128889">SUSE bug 1128889</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009247299" comment="apache2-mod_php53-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247289" comment="php53-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247300" comment="php53-bcmath-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247301" comment="php53-bz2-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247302" comment="php53-calendar-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247303" comment="php53-ctype-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247304" comment="php53-curl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247305" comment="php53-dba-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247306" comment="php53-dom-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247307" comment="php53-exif-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247308" comment="php53-fastcgi-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247309" comment="php53-fileinfo-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247310" comment="php53-ftp-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247311" comment="php53-gd-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247312" comment="php53-gettext-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247313" comment="php53-gmp-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247314" comment="php53-iconv-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247315" comment="php53-intl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247316" comment="php53-json-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247317" comment="php53-ldap-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247318" comment="php53-mbstring-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247319" comment="php53-mcrypt-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247320" comment="php53-mysql-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247321" comment="php53-odbc-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247322" comment="php53-openssl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247323" comment="php53-pcntl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247324" comment="php53-pdo-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247325" comment="php53-pear-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247326" comment="php53-pgsql-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247327" comment="php53-pspell-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247328" comment="php53-shmop-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247329" comment="php53-snmp-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247330" comment="php53-soap-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247331" comment="php53-suhosin-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247332" comment="php53-sysvmsg-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247333" comment="php53-sysvsem-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247334" comment="php53-sysvshm-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247335" comment="php53-tokenizer-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247336" comment="php53-wddx-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247337" comment="php53-xmlreader-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247338" comment="php53-xmlrpc-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247339" comment="php53-xmlwriter-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247340" comment="php53-xsl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247341" comment="php53-zip-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247342" comment="php53-zlib-5.3.17-112.58 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9639</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-9639" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9639" source="CVE"/>
    <description>
    An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an uninitialized read in exif_process_IFD_in_MAKERNOTE because of mishandling the data_len variable.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-9639.html">CVE-2019-9639</cve>
<bugzilla href="https://bugzilla.suse.com/1128887">SUSE bug 1128887</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009247299" comment="apache2-mod_php53-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247289" comment="php53-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247300" comment="php53-bcmath-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247301" comment="php53-bz2-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247302" comment="php53-calendar-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247303" comment="php53-ctype-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247304" comment="php53-curl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247305" comment="php53-dba-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247306" comment="php53-dom-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247307" comment="php53-exif-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247308" comment="php53-fastcgi-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247309" comment="php53-fileinfo-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247310" comment="php53-ftp-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247311" comment="php53-gd-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247312" comment="php53-gettext-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247313" comment="php53-gmp-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247314" comment="php53-iconv-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247315" comment="php53-intl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247316" comment="php53-json-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247317" comment="php53-ldap-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247318" comment="php53-mbstring-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247319" comment="php53-mcrypt-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247320" comment="php53-mysql-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247321" comment="php53-odbc-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247322" comment="php53-openssl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247323" comment="php53-pcntl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247324" comment="php53-pdo-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247325" comment="php53-pear-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247326" comment="php53-pgsql-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247327" comment="php53-pspell-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247328" comment="php53-shmop-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247329" comment="php53-snmp-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247330" comment="php53-soap-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247331" comment="php53-suhosin-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247332" comment="php53-sysvmsg-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247333" comment="php53-sysvsem-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247334" comment="php53-sysvshm-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247335" comment="php53-tokenizer-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247336" comment="php53-wddx-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247337" comment="php53-xmlreader-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247338" comment="php53-xmlrpc-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247339" comment="php53-xmlwriter-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247340" comment="php53-xsl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247341" comment="php53-zip-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247342" comment="php53-zlib-5.3.17-112.58 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9640</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-9640" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9640" source="CVE"/>
    <description>
    An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an Invalid Read in exif_process_SOFn.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-9640.html">CVE-2019-9640</cve>
<bugzilla href="https://bugzilla.suse.com/1128883">SUSE bug 1128883</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009247299" comment="apache2-mod_php53-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247289" comment="php53-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247300" comment="php53-bcmath-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247301" comment="php53-bz2-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247302" comment="php53-calendar-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247303" comment="php53-ctype-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247304" comment="php53-curl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247305" comment="php53-dba-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247306" comment="php53-dom-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247307" comment="php53-exif-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247308" comment="php53-fastcgi-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247309" comment="php53-fileinfo-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247310" comment="php53-ftp-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247311" comment="php53-gd-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247312" comment="php53-gettext-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247313" comment="php53-gmp-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247314" comment="php53-iconv-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247315" comment="php53-intl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247316" comment="php53-json-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247317" comment="php53-ldap-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247318" comment="php53-mbstring-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247319" comment="php53-mcrypt-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247320" comment="php53-mysql-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247321" comment="php53-odbc-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247322" comment="php53-openssl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247323" comment="php53-pcntl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247324" comment="php53-pdo-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247325" comment="php53-pear-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247326" comment="php53-pgsql-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247327" comment="php53-pspell-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247328" comment="php53-shmop-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247329" comment="php53-snmp-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247330" comment="php53-soap-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247331" comment="php53-suhosin-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247332" comment="php53-sysvmsg-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247333" comment="php53-sysvsem-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247334" comment="php53-sysvshm-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247335" comment="php53-tokenizer-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247336" comment="php53-wddx-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247337" comment="php53-xmlreader-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247338" comment="php53-xmlrpc-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247339" comment="php53-xmlwriter-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247340" comment="php53-xsl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247341" comment="php53-zip-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247342" comment="php53-zlib-5.3.17-112.58 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9641</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-9641" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9641" source="CVE"/>
    <description>
    An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an uninitialized read in exif_process_IFD_in_TIFF.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-9641.html">CVE-2019-9641</cve>
<bugzilla href="https://bugzilla.suse.com/1128722">SUSE bug 1128722</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009247299" comment="apache2-mod_php53-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247289" comment="php53-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247300" comment="php53-bcmath-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247301" comment="php53-bz2-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247302" comment="php53-calendar-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247303" comment="php53-ctype-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247304" comment="php53-curl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247305" comment="php53-dba-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247306" comment="php53-dom-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247307" comment="php53-exif-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247308" comment="php53-fastcgi-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247309" comment="php53-fileinfo-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247310" comment="php53-ftp-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247311" comment="php53-gd-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247312" comment="php53-gettext-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247313" comment="php53-gmp-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247314" comment="php53-iconv-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247315" comment="php53-intl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247316" comment="php53-json-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247317" comment="php53-ldap-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247318" comment="php53-mbstring-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247319" comment="php53-mcrypt-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247320" comment="php53-mysql-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247321" comment="php53-odbc-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247322" comment="php53-openssl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247323" comment="php53-pcntl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247324" comment="php53-pdo-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247325" comment="php53-pear-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247326" comment="php53-pgsql-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247327" comment="php53-pspell-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247328" comment="php53-shmop-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247329" comment="php53-snmp-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247330" comment="php53-soap-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247331" comment="php53-suhosin-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247332" comment="php53-sysvmsg-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247333" comment="php53-sysvsem-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247334" comment="php53-sysvshm-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247335" comment="php53-tokenizer-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247336" comment="php53-wddx-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247337" comment="php53-xmlreader-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247338" comment="php53-xmlrpc-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247339" comment="php53-xmlwriter-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247340" comment="php53-xsl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247341" comment="php53-zip-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247342" comment="php53-zlib-5.3.17-112.58 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9675</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-9675" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9675" source="CVE"/>
    <description>
    ** DISPUTED ** An issue was discovered in PHP 7.x before 7.1.27 and 7.3.x before 7.3.3. phar_tar_writeheaders_int in ext/phar/tar.c has a buffer overflow via a long link value. NOTE: The vendor indicates that the link value is used only when an archive contains a symlink, which currently cannot happen: "This issue allows theoretical compromise of security, but a practical attack is usually impossible."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-9675.html">CVE-2019-9675</cve>
<bugzilla href="https://bugzilla.suse.com/1128886">SUSE bug 1128886</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009247299" comment="apache2-mod_php53-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247289" comment="php53-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247300" comment="php53-bcmath-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247301" comment="php53-bz2-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247302" comment="php53-calendar-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247303" comment="php53-ctype-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247304" comment="php53-curl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247305" comment="php53-dba-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247306" comment="php53-dom-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247307" comment="php53-exif-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247308" comment="php53-fastcgi-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247309" comment="php53-fileinfo-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247310" comment="php53-ftp-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247311" comment="php53-gd-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247312" comment="php53-gettext-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247313" comment="php53-gmp-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247314" comment="php53-iconv-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247315" comment="php53-intl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247316" comment="php53-json-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247317" comment="php53-ldap-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247318" comment="php53-mbstring-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247319" comment="php53-mcrypt-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247320" comment="php53-mysql-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247321" comment="php53-odbc-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247322" comment="php53-openssl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247323" comment="php53-pcntl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247324" comment="php53-pdo-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247325" comment="php53-pear-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247326" comment="php53-pgsql-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247327" comment="php53-pspell-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247328" comment="php53-shmop-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247329" comment="php53-snmp-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247330" comment="php53-soap-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247331" comment="php53-suhosin-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247332" comment="php53-sysvmsg-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247333" comment="php53-sysvsem-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247334" comment="php53-sysvshm-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247335" comment="php53-tokenizer-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247336" comment="php53-wddx-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247337" comment="php53-xmlreader-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247338" comment="php53-xmlrpc-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247339" comment="php53-xmlwriter-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247340" comment="php53-xsl-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247341" comment="php53-zip-5.3.17-112.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009247342" comment="php53-zlib-5.3.17-112.58 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9811</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-9811" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9811" source="CVE"/>
    <description>
    As part of a winning Pwn2Own entry, a researcher demonstrated a sandbox escape by installing a malicious language pack and then opening a browser feature that used the compromised translation. This vulnerability affects Firefox ESR &lt; 60.8, Firefox &lt; 68, and Thunderbird &lt; 60.8.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-9811.html">CVE-2019-9811</cve>
<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009259450" comment="MozillaFirefox-60.8.0esr-78.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009259451" comment="MozillaFirefox-translations-common-60.8.0esr-78.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009259452" comment="MozillaFirefox-translations-other-60.8.0esr-78.43 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9812</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-9812" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9812" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-9812.html">CVE-2019-9812</cve>
<bugzilla href="https://bugzilla.suse.com/1149294">SUSE bug 1149294</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009264657" comment="MozillaFirefox-60.9.0esr-78.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264658" comment="MozillaFirefox-translations-common-60.9.0esr-78.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264659" comment="MozillaFirefox-translations-other-60.9.0esr-78.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264660" comment="firefox-gio-branding-upstream-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264661" comment="firefox-glib2-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264662" comment="firefox-glib2-lang-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264663" comment="firefox-glib2-tools-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264664" comment="firefox-gtk3-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264665" comment="firefox-gtk3-branding-upstream-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264666" comment="firefox-gtk3-data-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264667" comment="firefox-gtk3-immodule-amharic-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264668" comment="firefox-gtk3-immodule-inuktitut-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264669" comment="firefox-gtk3-immodule-multipress-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264670" comment="firefox-gtk3-immodule-thai-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264671" comment="firefox-gtk3-immodule-vietnamese-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264672" comment="firefox-gtk3-immodule-xim-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264673" comment="firefox-gtk3-immodules-tigrigna-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264674" comment="firefox-gtk3-lang-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264675" comment="firefox-gtk3-tools-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264676" comment="firefox-libgtk-3-0-3.10.9-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264677" comment="libfirefox-gio-2_0-0-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264678" comment="libfirefox-glib-2_0-0-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264679" comment="libfirefox-gmodule-2_0-0-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264680" comment="libfirefox-gobject-2_0-0-2.54.3-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009264681" comment="libfirefox-gthread-2_0-0-2.54.3-2.11 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9824</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-9824" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9824" source="CVE"/>
    <description>
    tcp_emu in slirp/tcp_subr.c (aka slirp/src/tcp_subr.c) in QEMU 3.0.0 uses uninitialized data in an snprintf call, leading to Information disclosure.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-9824.html">CVE-2019-9824</cve>
<bugzilla href="https://bugzilla.suse.com/1118900">SUSE bug 1118900</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1129622">SUSE bug 1129622</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1129623">SUSE bug 1129623</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009253938" comment="kvm-1.4.2-53.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250489" comment="xen-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250490" comment="xen-doc-html-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250491" comment="xen-doc-pdf-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250492" comment="xen-kmp-default-4.2.5_21_3.0.101_0.190.TDC-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250493" comment="xen-libs-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250494" comment="xen-tools-4.2.5_21-47.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009250495" comment="xen-tools-domU-4.2.5_21-47.32 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9928</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-9928" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9928" source="CVE"/>
    <description>
    GStreamer before 1.16.0 has a heap-based buffer overflow in the RTSP connection parser via a crafted response from a server, potentially allowing remote code execution.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-9928.html">CVE-2019-9928</cve>
<bugzilla href="https://bugzilla.suse.com/1133375">SUSE bug 1133375</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009256637" comment="gstreamer-0_10-plugins-base-0.10.35-5.18.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256659" comment="gstreamer-0_10-plugins-base-32bit-0.10.35-5.18.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256638" comment="gstreamer-0_10-plugins-base-doc-0.10.35-5.18.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256639" comment="gstreamer-0_10-plugins-base-lang-0.10.35-5.18.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256640" comment="libgstapp-0_10-0-0.10.35-5.18.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256660" comment="libgstapp-0_10-0-32bit-0.10.35-5.18.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256641" comment="libgstinterfaces-0_10-0-0.10.35-5.18.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009256661" comment="libgstinterfaces-0_10-0-32bit-0.10.35-5.18.5 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9948</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-9948" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9948" source="CVE"/>
    <description>
    urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which makes it easier for remote attackers to bypass protection mechanisms that blacklist file: URIs, as demonstrated by triggering a urllib.urlopen('local_file:///etc/passwd') call.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2019-9948.html">CVE-2019-9948</cve>
<bugzilla href="https://bugzilla.suse.com/1130847">SUSE bug 1130847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/1135433">SUSE bug 1135433</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009251184" comment="libpython2_6-1_0-2.6.9-40.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251195" comment="libpython2_6-1_0-32bit-2.6.9-40.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251198" comment="libpython2_7-1_0-2.7.9-6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251199" comment="libpython2_7-1_0-32bit-2.7.9-6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251185" comment="python-2.6.9-40.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251196" comment="python-32bit-2.6.9-40.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251186" comment="python-base-2.6.9-40.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251197" comment="python-base-32bit-2.6.9-40.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251187" comment="python-curses-2.6.9-40.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251188" comment="python-demo-2.6.9-40.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251189" comment="python-doc-2.6-8.40.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251190" comment="python-doc-pdf-2.6-8.40.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251191" comment="python-gdbm-2.6.9-40.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251192" comment="python-idle-2.6.9-40.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251193" comment="python-tk-2.6.9-40.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251194" comment="python-xml-2.6.9-40.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251200" comment="python27-2.7.9-6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251201" comment="python27-32bit-2.7.9-6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251202" comment="python27-base-2.7.9-6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251203" comment="python27-base-32bit-2.7.9-6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251204" comment="python27-curses-2.7.9-6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251205" comment="python27-demo-2.7.9-6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251206" comment="python27-devel-2.7.9-6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251207" comment="python27-doc-2.7.9-6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251208" comment="python27-doc-pdf-2.7.9-6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251209" comment="python27-gdbm-2.7.9-6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251210" comment="python27-idle-2.7.9-6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251211" comment="python27-tk-2.7.9-6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009251212" comment="python27-xml-2.7.9-6.20 is installed"/>
		</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9956</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
    </affected>
    <reference ref_id="CVE-2019-9956" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9956" source="CVE"/>
    <description>
    In ImageMagick 7.0.8-35 Q16, there is a stack-based buffer overflow in the function PopHexPixel of coders/ps.c, which allows an attacker to cause a denial of service or code execution via a crafted image file.
    </description>
<advisory from="security@suse.de">
<cve href="https://www.suse.com/security/cve/CVE-2019-9956.html">CVE-2019-9956</cve>
<bugzilla href="https://bugzilla.suse.com/1130330">SUSE bug 1130330</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009253268" comment="ImageMagick-6.4.3.6-78.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253269" comment="libMagickCore1-6.4.3.6-78.97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009253270" comment="libMagickCore1-32bit-6.4.3.6-78.97 is installed"/>
		</criteria>
		</criteria>
</definition>
</definitions>
<tests>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223698" version="1" comment="cluster-md-kmp-default is &lt;4.12.14-23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223699" version="1" comment="dlm-kmp-default is &lt;4.12.14-23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223700" version="1" comment="gfs2-kmp-default is &lt;4.12.14-23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223701" version="1" comment="ocfs2-kmp-default is &lt;4.12.14-23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223702" version="1" comment="sle-ha-release is ==15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223703" version="1" comment="corosync is &lt;2.4.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223704" version="1" comment="corosync-qdevice is &lt;2.4.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223705" version="1" comment="corosync-qnetd is &lt;2.4.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223706" version="1" comment="corosync-testagents is &lt;2.4.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223707" version="1" comment="libcfg6 is &lt;2.4.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223708" version="1" comment="libcmap4 is &lt;2.4.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223709" version="1" comment="libcorosync-devel is &lt;2.4.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223710" version="1" comment="libcorosync_common4 is &lt;2.4.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223711" version="1" comment="libcpg4 is &lt;2.4.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223712" version="1" comment="libquorum5 is &lt;2.4.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223713" version="1" comment="libsam4 is &lt;2.4.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223714" version="1" comment="libtotem_pg5 is &lt;2.4.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223715" version="1" comment="libvotequorum8 is &lt;2.4.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223716" version="1" comment="ctdb is &lt;4.7.6+git.54.6e3276c9872-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223717" version="1" comment="fence-agents is &lt;4.0.25+git.1524215631.8f9c770a-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223718" version="1" comment="fence-agents-devel is &lt;4.0.25+git.1524215631.8f9c770a-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223719" version="1" comment="haproxy is &lt;1.8.8-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223720" version="1" comment="libpacemaker-devel is &lt;1.1.18+20180430.b12c320f5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223721" version="1" comment="libpacemaker3 is &lt;1.1.18+20180430.b12c320f5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223722" version="1" comment="pacemaker is &lt;1.1.18+20180430.b12c320f5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223723" version="1" comment="pacemaker-cli is &lt;1.1.18+20180430.b12c320f5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223724" version="1" comment="pacemaker-cts is &lt;1.1.18+20180430.b12c320f5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223725" version="1" comment="pacemaker-remote is &lt;1.1.18+20180430.b12c320f5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223726" version="1" comment="ruby2.5-rubygem-actionpack-5_1 is &lt;5.1.4-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223727" version="1" comment="ruby2.5-rubygem-actionview-5_1 is &lt;5.1.4-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223728" version="1" comment="ruby2.5-rubygem-loofah is &lt;2.2.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223729" version="1" comment="ruby2.5-rubygem-nokogiri is &lt;1.8.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223730" version="1" comment="ruby2.5-rubygem-rack is &lt;2.0.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223731" version="1" comment="ruby2.5-rubygem-rails-html-sanitizer is &lt;1.0.4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223732" version="1" comment="ruby2.5-rubygem-railties-5_1 is &lt;5.1.4-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254599" version="1" comment="cluster-md-kmp-default is &lt;4.12.14-195" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254600" version="1" comment="dlm-kmp-default is &lt;4.12.14-195" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254601" version="1" comment="gfs2-kmp-default is &lt;4.12.14-195" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254602" version="1" comment="ocfs2-kmp-default is &lt;4.12.14-195" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254603" version="1" comment="sle-ha-release is ==15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254604" version="1" comment="corosync is &lt;2.4.4-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254605" version="1" comment="corosync-qdevice is &lt;2.4.4-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254606" version="1" comment="corosync-qnetd is &lt;2.4.4-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254607" version="1" comment="corosync-testagents is &lt;2.4.4-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254608" version="1" comment="libcfg6 is &lt;2.4.4-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254609" version="1" comment="libcmap4 is &lt;2.4.4-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254610" version="1" comment="libcorosync-devel is &lt;2.4.4-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254611" version="1" comment="libcorosync_common4 is &lt;2.4.4-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254612" version="1" comment="libcpg4 is &lt;2.4.4-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254613" version="1" comment="libquorum5 is &lt;2.4.4-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254614" version="1" comment="libsam4 is &lt;2.4.4-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254615" version="1" comment="libtotem_pg5 is &lt;2.4.4-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254616" version="1" comment="libvotequorum8 is &lt;2.4.4-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254617" version="1" comment="ctdb is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254618" version="1" comment="fence-agents is &lt;4.2.1+git.1537269352.7b1fd536-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254619" version="1" comment="fence-agents-devel is &lt;4.2.1+git.1537269352.7b1fd536-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254620" version="1" comment="haproxy is &lt;1.8.17~git0.e89d25b2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254621" version="1" comment="libpacemaker-devel is &lt;2.0.1+20190417.13d370ca9-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254622" version="1" comment="libpacemaker3 is &lt;2.0.1+20190417.13d370ca9-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254623" version="1" comment="pacemaker is &lt;2.0.1+20190417.13d370ca9-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254624" version="1" comment="pacemaker-cli is &lt;2.0.1+20190417.13d370ca9-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254625" version="1" comment="pacemaker-cts is &lt;2.0.1+20190417.13d370ca9-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254626" version="1" comment="pacemaker-remote is &lt;2.0.1+20190417.13d370ca9-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252530" version="1" comment="ruby2.5-rubygem-actionpack-5_1 is &lt;5.1.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241140" version="1" comment="ruby2.5-rubygem-activejob-5_1 is &lt;5.1.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240799" version="1" comment="ruby2.5-rubygem-loofah is &lt;2.2.2-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230363" version="1" comment="ruby2.5-rubygem-sprockets is &lt;3.7.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223733" version="1" comment="aaa_base is &lt;84.87+git20180409.04c9dae-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223734" version="1" comment="aaa_base-extras is &lt;84.87+git20180409.04c9dae-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223735" version="1" comment="sle-module-basesystem-release is ==15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223736" version="1" comment="alsa is &lt;1.1.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223737" version="1" comment="alsa-devel is &lt;1.1.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223738" version="1" comment="libasound2 is &lt;1.1.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223739" version="1" comment="libasound2-32bit is &lt;1.1.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223740" version="1" comment="apache-commons-httpclient is &lt;3.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223741" version="1" comment="apparmor-abstractions is &lt;2.12-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223742" version="1" comment="apparmor-docs is &lt;2.12-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223743" version="1" comment="apparmor-parser is &lt;2.12-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223744" version="1" comment="apparmor-parser-lang is &lt;2.12-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223745" version="1" comment="apparmor-profiles is &lt;2.12-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223746" version="1" comment="apparmor-utils is &lt;2.12-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223747" version="1" comment="apparmor-utils-lang is &lt;2.12-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223748" version="1" comment="pam_apparmor is &lt;2.12-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223749" version="1" comment="pam_apparmor-32bit is &lt;2.12-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223750" version="1" comment="perl-apparmor is &lt;2.12-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223751" version="1" comment="python3-apparmor is &lt;2.12-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223752" version="1" comment="apr-devel is &lt;1.6.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223753" version="1" comment="libapr1 is &lt;1.6.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223754" version="1" comment="apr-util-devel is &lt;1.6.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223755" version="1" comment="libapr-util1 is &lt;1.6.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223756" version="1" comment="audit-devel is &lt;2.8.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223757" version="1" comment="libaudit1 is &lt;2.8.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223758" version="1" comment="libaudit1-32bit is &lt;2.8.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223759" version="1" comment="libauparse0 is &lt;2.8.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223760" version="1" comment="augeas is &lt;1.10.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223761" version="1" comment="augeas-devel is &lt;1.10.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223762" version="1" comment="augeas-lenses is &lt;1.10.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223763" version="1" comment="libaugeas0 is &lt;1.10.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223764" version="1" comment="autofs is &lt;5.1.3-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223765" version="1" comment="automake is &lt;1.15.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223766" version="1" comment="m4 is &lt;1.4.18-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009216489" version="1" comment="avahi is &lt;0.6.32-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223767" version="1" comment="avahi-compat-howl-devel is &lt;0.6.32-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009216491" version="1" comment="avahi-compat-mDNSResponder-devel is &lt;0.6.32-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009216492" version="1" comment="avahi-lang is &lt;0.6.32-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223768" version="1" comment="avahi-utils is &lt;0.6.32-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009216493" version="1" comment="libavahi-client3 is &lt;0.6.32-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009216495" version="1" comment="libavahi-common3 is &lt;0.6.32-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009216497" version="1" comment="libavahi-core7 is &lt;0.6.32-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009216498" version="1" comment="libavahi-devel is &lt;0.6.32-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009216499" version="1" comment="libdns_sd is &lt;0.6.32-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223769" version="1" comment="libhowl0 is &lt;0.6.32-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223770" version="1" comment="bash is &lt;4.4-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223771" version="1" comment="bash-devel is &lt;4.4-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223772" version="1" comment="bash-doc is &lt;4.4-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223773" version="1" comment="bash-lang is &lt;4.4-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223774" version="1" comment="libreadline7 is &lt;7.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223775" version="1" comment="readline-devel is &lt;7.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223776" version="1" comment="readline-doc is &lt;7.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223777" version="1" comment="bind-devel is &lt;9.11.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223778" version="1" comment="bind-utils is &lt;9.11.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223779" version="1" comment="libbind9-160 is &lt;9.11.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223780" version="1" comment="libdns169 is &lt;9.11.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223781" version="1" comment="libirs-devel is &lt;9.11.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223782" version="1" comment="libirs160 is &lt;9.11.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223783" version="1" comment="libisc166 is &lt;9.11.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223784" version="1" comment="libisccc160 is &lt;9.11.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223785" version="1" comment="libisccfg160 is &lt;9.11.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223786" version="1" comment="liblwres160 is &lt;9.11.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223787" version="1" comment="python3-bind is &lt;9.11.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223788" version="1" comment="binutils is &lt;2.29.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223789" version="1" comment="binutils-devel is &lt;2.29.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223790" version="1" comment="bzip2 is &lt;1.0.6-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223791" version="1" comment="libbz2-1 is &lt;1.0.6-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223792" version="1" comment="libbz2-1-32bit is &lt;1.0.6-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223793" version="1" comment="libbz2-devel is &lt;1.0.6-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223794" version="1" comment="c-ares-devel is &lt;1.14.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223795" version="1" comment="libcares2 is &lt;1.14.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223796" version="1" comment="cairo-devel is &lt;1.15.10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223797" version="1" comment="libcairo-gobject2 is &lt;1.15.10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223798" version="1" comment="libcairo-script-interpreter2 is &lt;1.15.10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223799" version="1" comment="libcairo2 is &lt;1.15.10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223800" version="1" comment="ceph-common is &lt;13.0.2.1874+ge31585919b-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223801" version="1" comment="libcephfs-devel is &lt;13.0.2.1874+ge31585919b-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223802" version="1" comment="libcephfs2 is &lt;13.0.2.1874+ge31585919b-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223803" version="1" comment="librados-devel is &lt;13.0.2.1874+ge31585919b-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223804" version="1" comment="librados2 is &lt;13.0.2.1874+ge31585919b-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223805" version="1" comment="libradosstriper-devel is &lt;13.0.2.1874+ge31585919b-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223806" version="1" comment="libradosstriper1 is &lt;13.0.2.1874+ge31585919b-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223807" version="1" comment="librbd-devel is &lt;13.0.2.1874+ge31585919b-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223808" version="1" comment="librbd1 is &lt;13.0.2.1874+ge31585919b-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223809" version="1" comment="librgw-devel is &lt;13.0.2.1874+ge31585919b-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223810" version="1" comment="librgw2 is &lt;13.0.2.1874+ge31585919b-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223811" version="1" comment="python3-cephfs is &lt;13.0.2.1874+ge31585919b-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223812" version="1" comment="python3-rados is &lt;13.0.2.1874+ge31585919b-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223813" version="1" comment="python3-rbd is &lt;13.0.2.1874+ge31585919b-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223814" version="1" comment="python3-rgw is &lt;13.0.2.1874+ge31585919b-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223815" version="1" comment="rados-objclass-devel is &lt;13.0.2.1874+ge31585919b-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223816" version="1" comment="chrony is &lt;3.2-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223817" version="1" comment="cifs-utils is &lt;6.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223818" version="1" comment="cifs-utils-devel is &lt;6.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223819" version="1" comment="clamav is &lt;0.100.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223820" version="1" comment="clamav-devel is &lt;0.100.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223821" version="1" comment="libclamav7 is &lt;0.100.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223822" version="1" comment="libclammspack0 is &lt;0.100.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223823" version="1" comment="conntrack-tools is &lt;1.4.4-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223824" version="1" comment="coreutils is &lt;8.29-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223825" version="1" comment="coreutils-lang is &lt;8.29-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223826" version="1" comment="cpio is &lt;2.12-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223827" version="1" comment="cpio-lang is &lt;2.12-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223828" version="1" comment="cpio-mt is &lt;2.12-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223829" version="1" comment="cracklib is &lt;2.9.6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223830" version="1" comment="cracklib-devel is &lt;2.9.6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223831" version="1" comment="cracklib-dict-small is &lt;2.9.6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223832" version="1" comment="libcrack2 is &lt;2.9.6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223833" version="1" comment="libcrack2-32bit is &lt;2.9.6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223834" version="1" comment="cron is &lt;4.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223835" version="1" comment="cronie is &lt;1.5.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223836" version="1" comment="cups is &lt;2.2.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223837" version="1" comment="cups-client is &lt;2.2.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223838" version="1" comment="cups-config is &lt;2.2.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223839" version="1" comment="cups-devel is &lt;2.2.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223840" version="1" comment="libcups2 is &lt;2.2.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223841" version="1" comment="libcupscgi1 is &lt;2.2.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223842" version="1" comment="libcupsimage2 is &lt;2.2.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223843" version="1" comment="libcupsmime1 is &lt;2.2.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223844" version="1" comment="libcupsppdc1 is &lt;2.2.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223845" version="1" comment="cups-filters is &lt;1.20.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223846" version="1" comment="cups-filters-devel is &lt;1.20.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223847" version="1" comment="curl is &lt;7.60.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223848" version="1" comment="libcurl-devel is &lt;7.60.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223849" version="1" comment="libcurl4 is &lt;7.60.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223850" version="1" comment="libcurl4-32bit is &lt;7.60.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223851" version="1" comment="cyrus-sasl is &lt;2.1.26-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223852" version="1" comment="cyrus-sasl-32bit is &lt;2.1.26-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223853" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.26-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223854" version="1" comment="cyrus-sasl-crammd5-32bit is &lt;2.1.26-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223855" version="1" comment="cyrus-sasl-devel is &lt;2.1.26-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223856" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.26-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223857" version="1" comment="cyrus-sasl-digestmd5-32bit is &lt;2.1.26-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223858" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.26-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223859" version="1" comment="cyrus-sasl-gssapi-32bit is &lt;2.1.26-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223860" version="1" comment="cyrus-sasl-otp is &lt;2.1.26-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223861" version="1" comment="cyrus-sasl-plain is &lt;2.1.26-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223862" version="1" comment="cyrus-sasl-plain-32bit is &lt;2.1.26-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223863" version="1" comment="cyrus-sasl-saslauthd is &lt;2.1.26-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223864" version="1" comment="libsasl2-3 is &lt;2.1.26-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223865" version="1" comment="libsasl2-3-32bit is &lt;2.1.26-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223866" version="1" comment="dbus-1 is &lt;1.12.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223867" version="1" comment="dbus-1-devel is &lt;1.12.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223868" version="1" comment="dbus-1-x11 is &lt;1.12.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223869" version="1" comment="libdbus-1-3 is &lt;1.12.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223870" version="1" comment="libdbus-1-3-32bit is &lt;1.12.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223871" version="1" comment="dbus-1-glib is &lt;0.108-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223872" version="1" comment="dbus-1-glib-32bit is &lt;0.108-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223873" version="1" comment="dbus-1-glib-devel is &lt;0.108-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223874" version="1" comment="dbus-1-glib-tool is &lt;0.108-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223875" version="1" comment="dhcp is &lt;4.3.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223876" version="1" comment="dhcp-client is &lt;4.3.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223877" version="1" comment="dhcp-devel is &lt;4.3.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223878" version="1" comment="dnsmasq is &lt;2.78-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223879" version="1" comment="dracut is &lt;044.1-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223880" version="1" comment="dracut-fips is &lt;044.1-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223881" version="1" comment="dracut-ima is &lt;044.1-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223882" version="1" comment="dstat is &lt;0.7.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223883" version="1" comment="ecryptfs-utils is &lt;111-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223884" version="1" comment="ecryptfs-utils-devel is &lt;111-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223885" version="1" comment="libecryptfs1 is &lt;111-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223886" version="1" comment="elfutils is &lt;0.168-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223887" version="1" comment="elfutils-lang is &lt;0.168-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223888" version="1" comment="libasm-devel is &lt;0.168-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223889" version="1" comment="libasm1 is &lt;0.168-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223890" version="1" comment="libdw-devel is &lt;0.168-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223891" version="1" comment="libdw1 is &lt;0.168-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223892" version="1" comment="libdw1-32bit is &lt;0.168-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223893" version="1" comment="libebl-devel is &lt;0.168-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223894" version="1" comment="libebl-plugins is &lt;0.168-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223895" version="1" comment="libebl-plugins-32bit is &lt;0.168-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223896" version="1" comment="libelf-devel is &lt;0.168-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223897" version="1" comment="libelf1 is &lt;0.168-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223898" version="1" comment="libelf1-32bit is &lt;0.168-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223899" version="1" comment="emacs is &lt;25.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223900" version="1" comment="emacs-el is &lt;25.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223901" version="1" comment="emacs-info is &lt;25.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223902" version="1" comment="emacs-nox is &lt;25.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223903" version="1" comment="etags is &lt;25.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223904" version="1" comment="enscript is &lt;1.6.6-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223905" version="1" comment="expat is &lt;2.2.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223906" version="1" comment="libexpat-devel is &lt;2.2.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223907" version="1" comment="libexpat1 is &lt;2.2.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223908" version="1" comment="libexpat1-32bit is &lt;2.2.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223909" version="1" comment="fetchmail is &lt;6.3.26-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223910" version="1" comment="file is &lt;5.32-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223911" version="1" comment="file-devel is &lt;5.32-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223912" version="1" comment="file-magic is &lt;5.32-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223913" version="1" comment="libmagic1 is &lt;5.32-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223914" version="1" comment="libmagic1-32bit is &lt;5.32-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223915" version="1" comment="firewall-macros is &lt;0.5.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223916" version="1" comment="firewalld is &lt;0.5.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223917" version="1" comment="firewalld-lang is &lt;0.5.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223918" version="1" comment="python3-firewall is &lt;0.5.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009216631" version="1" comment="flac-devel is &lt;1.3.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009216632" version="1" comment="libFLAC++6 is &lt;1.3.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009216633" version="1" comment="libFLAC8 is &lt;1.3.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223919" version="1" comment="freetype2-devel is &lt;2.9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223920" version="1" comment="libfreetype6 is &lt;2.9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223921" version="1" comment="libfreetype6-32bit is &lt;2.9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223922" version="1" comment="fuse is &lt;2.9.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223923" version="1" comment="fuse-devel is &lt;2.9.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223924" version="1" comment="fuse-doc is &lt;2.9.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223925" version="1" comment="libfuse2 is &lt;2.9.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223926" version="1" comment="libulockmgr1 is &lt;2.9.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223927" version="1" comment="gc-devel is &lt;7.6.4-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223928" version="1" comment="libgc1 is &lt;7.6.4-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223929" version="1" comment="gdk-pixbuf-devel is &lt;2.36.11-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223930" version="1" comment="gdk-pixbuf-lang is &lt;2.36.11-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223931" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.36.11-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223932" version="1" comment="gdk-pixbuf-thumbnailer is &lt;2.36.11-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223933" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.36.11-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223934" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.36.11-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223935" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.42.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223936" version="1" comment="librsvg-2-2 is &lt;2.42.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223937" version="1" comment="ghostscript is &lt;9.23-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223938" version="1" comment="ghostscript-devel is &lt;9.23-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223939" version="1" comment="ghostscript-x11 is &lt;9.23-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223940" version="1" comment="giflib-devel is &lt;5.1.4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223941" version="1" comment="libgif7 is &lt;5.1.4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223942" version="1" comment="git-core is &lt;2.16.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223943" version="1" comment="glib2-devel is &lt;2.54.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223944" version="1" comment="glib2-lang is &lt;2.54.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223945" version="1" comment="glib2-tools is &lt;2.54.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223946" version="1" comment="libgio-2_0-0 is &lt;2.54.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223947" version="1" comment="libgio-2_0-0-32bit is &lt;2.54.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223948" version="1" comment="libglib-2_0-0 is &lt;2.54.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223949" version="1" comment="libglib-2_0-0-32bit is &lt;2.54.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223950" version="1" comment="libgmodule-2_0-0 is &lt;2.54.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223951" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.54.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223952" version="1" comment="libgobject-2_0-0 is &lt;2.54.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223953" version="1" comment="libgobject-2_0-0-32bit is &lt;2.54.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223954" version="1" comment="libgthread-2_0-0 is &lt;2.54.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223955" version="1" comment="glibc is &lt;2.26-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223956" version="1" comment="glibc-32bit is &lt;2.26-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223957" version="1" comment="glibc-devel is &lt;2.26-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223958" version="1" comment="glibc-extra is &lt;2.26-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223959" version="1" comment="glibc-i18ndata is &lt;2.26-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223960" version="1" comment="glibc-info is &lt;2.26-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223961" version="1" comment="glibc-locale is &lt;2.26-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223962" version="1" comment="glibc-locale-32bit is &lt;2.26-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223963" version="1" comment="glibc-profile is &lt;2.26-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223964" version="1" comment="nscd is &lt;2.26-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223965" version="1" comment="gnutls is &lt;3.6.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223966" version="1" comment="libgnutls-devel is &lt;3.6.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223967" version="1" comment="libgnutls30 is &lt;3.6.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223968" version="1" comment="libgnutlsxx-devel is &lt;3.6.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223969" version="1" comment="libgnutlsxx28 is &lt;3.6.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223970" version="1" comment="gpg2 is &lt;2.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223971" version="1" comment="gpg2-lang is &lt;2.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223972" version="1" comment="gpgme is &lt;1.10.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223973" version="1" comment="libgpgme-devel is &lt;1.10.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223974" version="1" comment="libgpgme11 is &lt;1.10.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223975" version="1" comment="libgpgmepp-devel is &lt;1.10.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223976" version="1" comment="libgpgmepp6 is &lt;1.10.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223977" version="1" comment="libqgpgme-devel is &lt;1.10.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223978" version="1" comment="libqgpgme7 is &lt;1.10.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223979" version="1" comment="graphite2-devel is &lt;1.3.11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223980" version="1" comment="libgraphite2-3 is &lt;1.3.11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223981" version="1" comment="libgraphite2-3-32bit is &lt;1.3.11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223982" version="1" comment="grep is &lt;3.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223983" version="1" comment="grep-lang is &lt;3.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223984" version="1" comment="groff is &lt;1.22.3-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223985" version="1" comment="groff-full is &lt;1.22.3-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223986" version="1" comment="gxditview is &lt;1.22.3-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223987" version="1" comment="grub2 is &lt;2.02-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223988" version="1" comment="grub2-i386-pc is &lt;2.02-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223989" version="1" comment="grub2-snapper-plugin is &lt;2.02-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223990" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.02-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223991" version="1" comment="grub2-x86_64-efi is &lt;2.02-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223992" version="1" comment="gstreamer is &lt;1.12.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223993" version="1" comment="gstreamer-lang is &lt;1.12.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223994" version="1" comment="libgstreamer-1_0-0 is &lt;1.12.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223995" version="1" comment="gstreamer-plugins-good is &lt;1.12.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223996" version="1" comment="gstreamer-plugins-good-lang is &lt;1.12.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223997" version="1" comment="gtk2-devel is &lt;2.24.32-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223998" version="1" comment="gtk2-lang is &lt;2.24.32-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223999" version="1" comment="gtk2-tools is &lt;2.24.32-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224000" version="1" comment="libgtk-2_0-0 is &lt;2.24.32-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224001" version="1" comment="typelib-1_0-Gtk-2_0 is &lt;2.24.32-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224002" version="1" comment="gzip is &lt;1.9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224003" version="1" comment="hardlink is &lt;1.0+git.e66999f-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224004" version="1" comment="hplip-devel is &lt;3.17.9-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224005" version="1" comment="hplip-hpijs is &lt;3.17.9-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224006" version="1" comment="hplip-sane is &lt;3.17.9-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224007" version="1" comment="hyper-v is &lt;7-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224008" version="1" comment="ipsec-tools is &lt;0.8.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224009" version="1" comment="iputils is &lt;s20161105-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224010" version="1" comment="java-10-openjdk is &lt;10.0.1.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224011" version="1" comment="java-10-openjdk-demo is &lt;10.0.1.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224012" version="1" comment="java-10-openjdk-devel is &lt;10.0.1.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224013" version="1" comment="java-10-openjdk-headless is &lt;10.0.1.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224014" version="1" comment="kbd is &lt;2.0.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224015" version="1" comment="kbd-legacy is &lt;2.0.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224016" version="1" comment="kdump is &lt;0.8.16-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224017" version="1" comment="kernel-default is &lt;4.12.14-23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224018" version="1" comment="kernel-default-devel is &lt;4.12.14-23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224019" version="1" comment="kernel-devel is &lt;4.12.14-23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224020" version="1" comment="kernel-macros is &lt;4.12.14-23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224021" version="1" comment="kernel-firmware is &lt;20180416-1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224022" version="1" comment="ucode-amd is &lt;20180416-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224023" version="1" comment="krb5 is &lt;1.15.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224024" version="1" comment="krb5-32bit is &lt;1.15.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224025" version="1" comment="krb5-client is &lt;1.15.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224026" version="1" comment="krb5-devel is &lt;1.15.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224027" version="1" comment="krb5-plugin-preauth-otp is &lt;1.15.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224028" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.15.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224029" version="1" comment="ldns-devel is &lt;1.7.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224030" version="1" comment="libldns2 is &lt;1.7.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224031" version="1" comment="less is &lt;530-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224032" version="1" comment="lftp is &lt;4.8.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224033" version="1" comment="libFS-devel is &lt;1.0.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224034" version="1" comment="libFS6 is &lt;1.0.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224035" version="1" comment="libHX-devel is &lt;3.22-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224036" version="1" comment="libHX28 is &lt;3.22-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224037" version="1" comment="libHX28-32bit is &lt;3.22-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224038" version="1" comment="libICE-devel is &lt;1.0.9-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224039" version="1" comment="libICE6 is &lt;1.0.9-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224040" version="1" comment="libQt5Concurrent-devel is &lt;5.9.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224041" version="1" comment="libQt5Concurrent5 is &lt;5.9.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224042" version="1" comment="libQt5Core-devel is &lt;5.9.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224043" version="1" comment="libQt5Core-private-headers-devel is &lt;5.9.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224044" version="1" comment="libQt5Core5 is &lt;5.9.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224045" version="1" comment="libQt5DBus-devel is &lt;5.9.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224046" version="1" comment="libQt5DBus-private-headers-devel is &lt;5.9.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224047" version="1" comment="libQt5DBus5 is &lt;5.9.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224048" version="1" comment="libQt5Gui-devel is &lt;5.9.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224049" version="1" comment="libQt5Gui-private-headers-devel is &lt;5.9.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224050" version="1" comment="libQt5Gui5 is &lt;5.9.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224051" version="1" comment="libQt5KmsSupport-devel-static is &lt;5.9.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224052" version="1" comment="libQt5KmsSupport-private-headers-devel is &lt;5.9.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224053" version="1" comment="libQt5Network-devel is &lt;5.9.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224054" version="1" comment="libQt5Network-private-headers-devel is &lt;5.9.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224055" version="1" comment="libQt5Network5 is &lt;5.9.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224056" version="1" comment="libQt5OpenGL-devel is &lt;5.9.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224057" version="1" comment="libQt5OpenGL-private-headers-devel is &lt;5.9.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224058" version="1" comment="libQt5OpenGL5 is &lt;5.9.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224059" version="1" comment="libQt5PlatformHeaders-devel is &lt;5.9.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224060" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.9.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224061" version="1" comment="libQt5PlatformSupport-private-headers-devel is &lt;5.9.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224062" version="1" comment="libQt5PrintSupport-devel is &lt;5.9.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224063" version="1" comment="libQt5PrintSupport-private-headers-devel is &lt;5.9.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224064" version="1" comment="libQt5PrintSupport5 is &lt;5.9.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224065" version="1" comment="libQt5Sql-devel is &lt;5.9.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224066" version="1" comment="libQt5Sql-private-headers-devel is &lt;5.9.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224067" version="1" comment="libQt5Sql5 is &lt;5.9.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224068" version="1" comment="libQt5Sql5-sqlite is &lt;5.9.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224069" version="1" comment="libQt5Test-devel is &lt;5.9.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224070" version="1" comment="libQt5Test-private-headers-devel is &lt;5.9.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224071" version="1" comment="libQt5Test5 is &lt;5.9.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224072" version="1" comment="libQt5Widgets-devel is &lt;5.9.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224073" version="1" comment="libQt5Widgets-private-headers-devel is &lt;5.9.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224074" version="1" comment="libQt5Widgets5 is &lt;5.9.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224075" version="1" comment="libQt5Xml-devel is &lt;5.9.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224076" version="1" comment="libQt5Xml5 is &lt;5.9.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224077" version="1" comment="libqt5-qtbase-common-devel is &lt;5.9.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224078" version="1" comment="libqt5-qtbase-devel is &lt;5.9.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224079" version="1" comment="libqt5-qtbase-private-headers-devel is &lt;5.9.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224080" version="1" comment="libX11-6 is &lt;1.6.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224081" version="1" comment="libX11-6-32bit is &lt;1.6.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224082" version="1" comment="libX11-data is &lt;1.6.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224083" version="1" comment="libX11-devel is &lt;1.6.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224084" version="1" comment="libX11-xcb1 is &lt;1.6.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224085" version="1" comment="libX11-xcb1-32bit is &lt;1.6.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224086" version="1" comment="libXRes1 is &lt;1.2.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224087" version="1" comment="libXres-devel is &lt;1.2.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224088" version="1" comment="libXcursor-devel is &lt;1.1.15-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224089" version="1" comment="libXcursor1 is &lt;1.1.15-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224090" version="1" comment="libXdmcp-devel is &lt;1.1.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224091" version="1" comment="libXdmcp6 is &lt;1.1.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224092" version="1" comment="libXext-devel is &lt;1.3.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224093" version="1" comment="libXext6 is &lt;1.3.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224094" version="1" comment="libXext6-32bit is &lt;1.3.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224095" version="1" comment="libXfixes-devel is &lt;5.0.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224096" version="1" comment="libXfixes3 is &lt;5.0.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224097" version="1" comment="libXfixes3-32bit is &lt;5.0.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224098" version="1" comment="libXfont-devel is &lt;1.5.4-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224099" version="1" comment="libXfont1 is &lt;1.5.4-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224100" version="1" comment="libXfont2-2 is &lt;2.0.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224101" version="1" comment="libXfont2-devel is &lt;2.0.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224102" version="1" comment="libXi-devel is &lt;1.7.9-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224103" version="1" comment="libXi6 is &lt;1.7.9-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224104" version="1" comment="libXinerama-devel is &lt;1.1.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224105" version="1" comment="libXinerama1 is &lt;1.1.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224106" version="1" comment="libXp-devel is &lt;1.0.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224107" version="1" comment="libXp6 is &lt;1.0.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224108" version="1" comment="libXrandr-devel is &lt;1.5.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224109" version="1" comment="libXrandr2 is &lt;1.5.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224110" version="1" comment="libXrender-devel is &lt;0.9.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224111" version="1" comment="libXrender1 is &lt;0.9.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224112" version="1" comment="libXrender1-32bit is &lt;0.9.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224113" version="1" comment="libXt-devel is &lt;1.1.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224114" version="1" comment="libXt6 is &lt;1.1.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224115" version="1" comment="libXtst-devel is &lt;1.2.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224116" version="1" comment="libXtst6 is &lt;1.2.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224117" version="1" comment="libXtst6-32bit is &lt;1.2.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224118" version="1" comment="libXv-devel is &lt;1.0.11-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224119" version="1" comment="libXv1 is &lt;1.0.11-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224120" version="1" comment="libXvMC-devel is &lt;1.0.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224121" version="1" comment="libXvMC1 is &lt;1.0.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224122" version="1" comment="libXvnc1 is &lt;1.8.0-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224123" version="1" comment="tigervnc is &lt;1.8.0-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224124" version="1" comment="xorg-x11-Xvnc is &lt;1.8.0-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224125" version="1" comment="xorg-x11-Xvnc-novnc is &lt;1.8.0-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224126" version="1" comment="libXxf86dga-devel is &lt;1.1.4-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224127" version="1" comment="libXxf86dga1 is &lt;1.1.4-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224128" version="1" comment="libXxf86vm-devel is &lt;1.1.4-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224129" version="1" comment="libXxf86vm1 is &lt;1.1.4-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224130" version="1" comment="libXxf86vm1-32bit is &lt;1.1.4-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224131" version="1" comment="libarchive-devel is &lt;3.3.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224132" version="1" comment="libarchive13 is &lt;3.3.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224133" version="1" comment="libblkid-devel is &lt;2.31.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224134" version="1" comment="libblkid-devel-static is &lt;2.31.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224135" version="1" comment="libblkid1 is &lt;2.31.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224136" version="1" comment="libblkid1-32bit is &lt;2.31.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224137" version="1" comment="libfdisk-devel is &lt;2.31.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224138" version="1" comment="libfdisk1 is &lt;2.31.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224139" version="1" comment="libmount-devel is &lt;2.31.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224140" version="1" comment="libmount1 is &lt;2.31.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224141" version="1" comment="libmount1-32bit is &lt;2.31.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224142" version="1" comment="libsmartcols-devel is &lt;2.31.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224143" version="1" comment="libsmartcols1 is &lt;2.31.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224144" version="1" comment="libuuid-devel is &lt;2.31.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224145" version="1" comment="libuuid-devel-static is &lt;2.31.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224146" version="1" comment="libuuid1 is &lt;2.31.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224147" version="1" comment="libuuid1-32bit is &lt;2.31.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224148" version="1" comment="util-linux is &lt;2.31.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224149" version="1" comment="util-linux-lang is &lt;2.31.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224150" version="1" comment="util-linux-systemd is &lt;2.31.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224151" version="1" comment="libbluetooth3 is &lt;5.48-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224152" version="1" comment="libcolord2 is &lt;1.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224153" version="1" comment="libcroco is &lt;0.6.12-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224154" version="1" comment="libcroco-0_6-3 is &lt;0.6.12-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224155" version="1" comment="libcroco-0_6-3-32bit is &lt;0.6.12-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224156" version="1" comment="libcroco-devel is &lt;0.6.12-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224157" version="1" comment="libdcerpc-binding0 is &lt;4.7.6+git.54.6e3276c9872-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224158" version="1" comment="libdcerpc-devel is &lt;4.7.6+git.54.6e3276c9872-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224159" version="1" comment="libdcerpc-samr-devel is &lt;4.7.6+git.54.6e3276c9872-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224160" version="1" comment="libdcerpc-samr0 is &lt;4.7.6+git.54.6e3276c9872-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224161" version="1" comment="libdcerpc0 is &lt;4.7.6+git.54.6e3276c9872-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224162" version="1" comment="libndr-devel is &lt;4.7.6+git.54.6e3276c9872-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224163" version="1" comment="libndr-krb5pac-devel is &lt;4.7.6+git.54.6e3276c9872-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224164" version="1" comment="libndr-krb5pac0 is &lt;4.7.6+git.54.6e3276c9872-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224165" version="1" comment="libndr-nbt-devel is &lt;4.7.6+git.54.6e3276c9872-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224166" version="1" comment="libndr-nbt0 is &lt;4.7.6+git.54.6e3276c9872-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224167" version="1" comment="libndr-standard-devel is &lt;4.7.6+git.54.6e3276c9872-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224168" version="1" comment="libndr-standard0 is &lt;4.7.6+git.54.6e3276c9872-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224169" version="1" comment="libndr0 is &lt;4.7.6+git.54.6e3276c9872-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224170" version="1" comment="libnetapi-devel is &lt;4.7.6+git.54.6e3276c9872-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224171" version="1" comment="libnetapi0 is &lt;4.7.6+git.54.6e3276c9872-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224172" version="1" comment="libsamba-credentials-devel is &lt;4.7.6+git.54.6e3276c9872-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224173" version="1" comment="libsamba-credentials0 is &lt;4.7.6+git.54.6e3276c9872-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224174" version="1" comment="libsamba-errors-devel is &lt;4.7.6+git.54.6e3276c9872-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224175" version="1" comment="libsamba-errors0 is &lt;4.7.6+git.54.6e3276c9872-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224176" version="1" comment="libsamba-hostconfig-devel is &lt;4.7.6+git.54.6e3276c9872-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224177" version="1" comment="libsamba-hostconfig0 is &lt;4.7.6+git.54.6e3276c9872-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224178" version="1" comment="libsamba-passdb-devel is &lt;4.7.6+git.54.6e3276c9872-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224179" version="1" comment="libsamba-passdb0 is &lt;4.7.6+git.54.6e3276c9872-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224180" version="1" comment="libsamba-policy-devel is &lt;4.7.6+git.54.6e3276c9872-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224181" version="1" comment="libsamba-policy0 is &lt;4.7.6+git.54.6e3276c9872-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224182" version="1" comment="libsamba-util-devel is &lt;4.7.6+git.54.6e3276c9872-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224183" version="1" comment="libsamba-util0 is &lt;4.7.6+git.54.6e3276c9872-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224184" version="1" comment="libsamdb-devel is &lt;4.7.6+git.54.6e3276c9872-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224185" version="1" comment="libsamdb0 is &lt;4.7.6+git.54.6e3276c9872-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224186" version="1" comment="libsmbclient-devel is &lt;4.7.6+git.54.6e3276c9872-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224187" version="1" comment="libsmbclient0 is &lt;4.7.6+git.54.6e3276c9872-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224188" version="1" comment="libsmbconf-devel is &lt;4.7.6+git.54.6e3276c9872-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224189" version="1" comment="libsmbconf0 is &lt;4.7.6+git.54.6e3276c9872-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224190" version="1" comment="libsmbldap-devel is &lt;4.7.6+git.54.6e3276c9872-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224191" version="1" comment="libsmbldap2 is &lt;4.7.6+git.54.6e3276c9872-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224192" version="1" comment="libtevent-util-devel is &lt;4.7.6+git.54.6e3276c9872-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224193" version="1" comment="libtevent-util0 is &lt;4.7.6+git.54.6e3276c9872-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224194" version="1" comment="libwbclient-devel is &lt;4.7.6+git.54.6e3276c9872-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224195" version="1" comment="libwbclient0 is &lt;4.7.6+git.54.6e3276c9872-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224196" version="1" comment="samba is &lt;4.7.6+git.54.6e3276c9872-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224197" version="1" comment="samba-client is &lt;4.7.6+git.54.6e3276c9872-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224198" version="1" comment="samba-core-devel is &lt;4.7.6+git.54.6e3276c9872-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224199" version="1" comment="samba-libs is &lt;4.7.6+git.54.6e3276c9872-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224200" version="1" comment="samba-winbind is &lt;4.7.6+git.54.6e3276c9872-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224201" version="1" comment="libdmx-devel is &lt;1.1.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224202" version="1" comment="libdmx1 is &lt;1.1.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224203" version="1" comment="libevent-2_1-8 is &lt;2.1.8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224204" version="1" comment="libevent-devel is &lt;2.1.8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224205" version="1" comment="libfreebl3 is &lt;3.36.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224206" version="1" comment="libfreebl3-32bit is &lt;3.36.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224207" version="1" comment="libsoftokn3 is &lt;3.36.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224208" version="1" comment="libsoftokn3-32bit is &lt;3.36.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224209" version="1" comment="mozilla-nss is &lt;3.36.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224210" version="1" comment="mozilla-nss-32bit is &lt;3.36.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224211" version="1" comment="mozilla-nss-certs is &lt;3.36.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224212" version="1" comment="mozilla-nss-certs-32bit is &lt;3.36.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224213" version="1" comment="mozilla-nss-devel is &lt;3.36.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224214" version="1" comment="mozilla-nss-sysinit is &lt;3.36.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224215" version="1" comment="mozilla-nss-tools is &lt;3.36.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224216" version="1" comment="libgcrypt-devel is &lt;1.8.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224217" version="1" comment="libgcrypt20 is &lt;1.8.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224218" version="1" comment="libgcrypt20-32bit is &lt;1.8.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224219" version="1" comment="libgcrypt20-hmac is &lt;1.8.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224220" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.8.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224221" version="1" comment="libgd3 is &lt;2.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224222" version="1" comment="libgstgl-1_0-0 is &lt;1.12.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224223" version="1" comment="libgstphotography-1_0-0 is &lt;1.12.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224224" version="1" comment="libgtk-vnc-2_0-0 is &lt;0.7.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224225" version="1" comment="libgvnc-1_0-0 is &lt;0.7.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224226" version="1" comment="libhogweed4 is &lt;3.4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224227" version="1" comment="libnettle-devel is &lt;3.4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224228" version="1" comment="libnettle6 is &lt;3.4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224229" version="1" comment="libical2 is &lt;2.0.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224230" version="1" comment="libidn-devel is &lt;1.34-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224231" version="1" comment="libidn11 is &lt;1.34-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224232" version="1" comment="libidn2-0 is &lt;2.0.4-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224233" version="1" comment="libidn2-0-32bit is &lt;2.0.4-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224234" version="1" comment="libidn2-devel is &lt;2.0.4-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224235" version="1" comment="libipa_hbac-devel is &lt;1.16.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224236" version="1" comment="libipa_hbac0 is &lt;1.16.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224237" version="1" comment="libsss_certmap-devel is &lt;1.16.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224238" version="1" comment="libsss_certmap0 is &lt;1.16.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224239" version="1" comment="libsss_idmap-devel is &lt;1.16.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224240" version="1" comment="libsss_idmap0 is &lt;1.16.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224241" version="1" comment="libsss_nss_idmap-devel is &lt;1.16.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224242" version="1" comment="libsss_nss_idmap0 is &lt;1.16.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224243" version="1" comment="libsss_simpleifp-devel is &lt;1.16.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224244" version="1" comment="libsss_simpleifp0 is &lt;1.16.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224245" version="1" comment="python3-sssd-config is &lt;1.16.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224246" version="1" comment="sssd is &lt;1.16.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224247" version="1" comment="sssd-32bit is &lt;1.16.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224248" version="1" comment="sssd-ad is &lt;1.16.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224249" version="1" comment="sssd-ipa is &lt;1.16.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224250" version="1" comment="sssd-krb5 is &lt;1.16.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224251" version="1" comment="sssd-krb5-common is &lt;1.16.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224252" version="1" comment="sssd-ldap is &lt;1.16.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224253" version="1" comment="sssd-proxy is &lt;1.16.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224254" version="1" comment="sssd-tools is &lt;1.16.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224255" version="1" comment="sssd-wbclient is &lt;1.16.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224256" version="1" comment="sssd-wbclient-devel is &lt;1.16.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224257" version="1" comment="libjansson-devel is &lt;2.9-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224258" version="1" comment="libjansson4 is &lt;2.9-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224259" version="1" comment="libjasper4 is &lt;2.0.14-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224260" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.20.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224261" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.20.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224262" version="1" comment="libwebkit2gtk3-lang is &lt;2.20.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224263" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.20.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224264" version="1" comment="libjbig-devel is &lt;2.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224265" version="1" comment="libjbig2 is &lt;2.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224266" version="1" comment="libjpeg62 is &lt;62.2.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224267" version="1" comment="libjpeg62-devel is &lt;62.2.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224268" version="1" comment="libjpeg8 is &lt;8.1.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224269" version="1" comment="libjpeg8-devel is &lt;8.1.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224270" version="1" comment="libturbojpeg0 is &lt;8.1.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224271" version="1" comment="libjson-c-devel is &lt;0.13-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224272" version="1" comment="libjson-c3 is &lt;0.13-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224273" version="1" comment="libjson-c3-32bit is &lt;0.13-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224274" version="1" comment="libksba-devel is &lt;1.3.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224275" version="1" comment="libksba8 is &lt;1.3.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224276" version="1" comment="libldap-2_4-2 is &lt;2.4.46-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224277" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.46-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224278" version="1" comment="openldap2-client is &lt;2.4.46-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224279" version="1" comment="openldap2-devel is &lt;2.4.46-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224280" version="1" comment="openldap2-devel-static is &lt;2.4.46-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224281" version="1" comment="libldb-devel is &lt;1.2.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224282" version="1" comment="libldb1 is &lt;1.2.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224283" version="1" comment="python-ldb is &lt;1.2.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224284" version="1" comment="python-ldb-devel is &lt;1.2.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224285" version="1" comment="python3-ldb is &lt;1.2.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224286" version="1" comment="python3-ldb-devel is &lt;1.2.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224287" version="1" comment="libltdl7 is &lt;2.4.6-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224288" version="1" comment="libtool is &lt;2.4.6-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224289" version="1" comment="liblzo2-2 is &lt;2.10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224290" version="1" comment="lzo-devel is &lt;2.10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224291" version="1" comment="lzo-devel-static is &lt;2.10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224292" version="1" comment="libminizip1 is &lt;1.2.11-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224293" version="1" comment="libz1 is &lt;1.2.11-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224294" version="1" comment="libz1-32bit is &lt;1.2.11-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224295" version="1" comment="minizip-devel is &lt;1.2.11-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224296" version="1" comment="zlib-devel is &lt;1.2.11-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224297" version="1" comment="zlib-devel-static is &lt;1.2.11-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224298" version="1" comment="libmpfr6 is &lt;4.0.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224299" version="1" comment="mpfr-devel is &lt;4.0.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224300" version="1" comment="libmspack-devel is &lt;0.6-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224301" version="1" comment="libmspack0 is &lt;0.6-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224302" version="1" comment="libneon-devel is &lt;0.30.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224303" version="1" comment="libneon27 is &lt;0.30.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224304" version="1" comment="libnewt0_52 is &lt;0.52.20-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224305" version="1" comment="newt is &lt;0.52.20-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224306" version="1" comment="python3-newt is &lt;0.52.20-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224307" version="1" comment="libnghttp2-14 is &lt;1.31.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224308" version="1" comment="libnghttp2-14-32bit is &lt;1.31.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224309" version="1" comment="libnghttp2-devel is &lt;1.31.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224310" version="1" comment="libnghttp2_asio-devel is &lt;1.31.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224311" version="1" comment="libnghttp2_asio1 is &lt;1.31.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224312" version="1" comment="libnm0 is &lt;1.10.6-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224313" version="1" comment="typelib-1_0-NM-1_0 is &lt;1.10.6-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224314" version="1" comment="liboath0 is &lt;2.6.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224315" version="1" comment="oath-toolkit-xml is &lt;2.6.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224316" version="1" comment="libopenjp2-7 is &lt;2.3.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224317" version="1" comment="openjpeg2 is &lt;2.3.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224318" version="1" comment="openjpeg2-devel is &lt;2.3.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224319" version="1" comment="libopenssl-1_1-devel is &lt;1.1.0h-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224320" version="1" comment="libopenssl1_1 is &lt;1.1.0h-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224321" version="1" comment="libopenssl1_1-32bit is &lt;1.1.0h-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224322" version="1" comment="libopenssl1_1-hmac is &lt;1.1.0h-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224323" version="1" comment="libopenssl1_1-hmac-32bit is &lt;1.1.0h-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224324" version="1" comment="openssl-1_1 is &lt;1.1.0h-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224325" version="1" comment="libopenssl-devel is &lt;1.1.0h-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224326" version="1" comment="openssl is &lt;1.1.0h-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224327" version="1" comment="libopus0 is &lt;1.2.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224328" version="1" comment="libpainter0 is &lt;0.9.6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224329" version="1" comment="librfxencode0 is &lt;0.9.6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224330" version="1" comment="xrdp is &lt;0.9.6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224331" version="1" comment="xrdp-devel is &lt;0.9.6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224332" version="1" comment="libpango-1_0-0 is &lt;1.40.14-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224333" version="1" comment="pango-devel is &lt;1.40.14-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224334" version="1" comment="typelib-1_0-Pango-1_0 is &lt;1.40.14-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224335" version="1" comment="libpcre1 is &lt;8.41-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224336" version="1" comment="libpcre1-32bit is &lt;8.41-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224337" version="1" comment="libpcre16-0 is &lt;8.41-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224338" version="1" comment="libpcrecpp0 is &lt;8.41-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224339" version="1" comment="libpcrecpp0-32bit is &lt;8.41-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224340" version="1" comment="libpcreposix0 is &lt;8.41-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224341" version="1" comment="pcre-devel is &lt;8.41-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224342" version="1" comment="pcre-tools is &lt;8.41-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224343" version="1" comment="libpcre2-16-0 is &lt;10.31-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224344" version="1" comment="libpcre2-32-0 is &lt;10.31-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224345" version="1" comment="libpcre2-8-0 is &lt;10.31-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224346" version="1" comment="libpcsclite1 is &lt;1.8.23-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224347" version="1" comment="libpcscspy0 is &lt;1.8.23-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224348" version="1" comment="pcsc-lite is &lt;1.8.23-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224349" version="1" comment="pcsc-lite-devel is &lt;1.8.23-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224350" version="1" comment="libpng12-0 is &lt;1.2.57-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224351" version="1" comment="libpng12-devel is &lt;1.2.57-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224352" version="1" comment="libpng16-16 is &lt;1.6.34-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224353" version="1" comment="libpng16-16-32bit is &lt;1.6.34-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224354" version="1" comment="libpng16-compat-devel is &lt;1.6.34-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224355" version="1" comment="libpng16-devel is &lt;1.6.34-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224356" version="1" comment="libpolkit0 is &lt;0.114-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224357" version="1" comment="polkit is &lt;0.114-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224358" version="1" comment="polkit-devel is &lt;0.114-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224359" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.114-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224360" version="1" comment="libpoppler-cpp0 is &lt;0.62.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224361" version="1" comment="libpoppler-devel is &lt;0.62.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224362" version="1" comment="libpoppler-glib-devel is &lt;0.62.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224363" version="1" comment="libpoppler-glib8 is &lt;0.62.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224364" version="1" comment="libpoppler73 is &lt;0.62.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224365" version="1" comment="poppler-tools is &lt;0.62.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224366" version="1" comment="typelib-1_0-Poppler-0_18 is &lt;0.62.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224367" version="1" comment="libpq5 is &lt;10.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224368" version="1" comment="postgresql10 is &lt;10.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224369" version="1" comment="libproxy-devel is &lt;0.4.15-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224370" version="1" comment="libproxy1 is &lt;0.4.15-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224371" version="1" comment="libpulse-devel is &lt;11.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224372" version="1" comment="libpulse-mainloop-glib0 is &lt;11.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224373" version="1" comment="libpulse0 is &lt;11.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224374" version="1" comment="libpython2_7-1_0 is &lt;2.7.14-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224375" version="1" comment="python-base is &lt;2.7.14-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224376" version="1" comment="python-devel is &lt;2.7.14-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224377" version="1" comment="python-xml is &lt;2.7.14-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224378" version="1" comment="libpython3_6m1_0 is &lt;3.6.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224379" version="1" comment="python3-base is &lt;3.6.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224380" version="1" comment="python3-devel is &lt;3.6.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224381" version="1" comment="python3-idle is &lt;3.6.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224382" version="1" comment="libqpdf21 is &lt;8.0.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224383" version="1" comment="qpdf is &lt;8.0.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224384" version="1" comment="qpdf-devel is &lt;8.0.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224385" version="1" comment="librrd8 is &lt;1.7.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224386" version="1" comment="rrdtool is &lt;1.7.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224387" version="1" comment="rrdtool-devel is &lt;1.7.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224388" version="1" comment="librsync-devel is &lt;1.0.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224389" version="1" comment="librsync2 is &lt;1.0.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224390" version="1" comment="libserf-1-1 is &lt;1.3.9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224391" version="1" comment="libserf-devel is &lt;1.3.9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224392" version="1" comment="libsha1detectcoll-devel is &lt;1.0.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224393" version="1" comment="libsha1detectcoll1 is &lt;1.0.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224394" version="1" comment="libsmi is &lt;0.4.8-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224395" version="1" comment="libsmi2 is &lt;0.4.8-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224396" version="1" comment="libsndfile-devel is &lt;1.0.28-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224397" version="1" comment="libsndfile1 is &lt;1.0.28-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224398" version="1" comment="libsnmp30 is &lt;5.7.3-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224399" version="1" comment="net-snmp is &lt;5.7.3-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224400" version="1" comment="net-snmp-devel is &lt;5.7.3-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224401" version="1" comment="perl-SNMP is &lt;5.7.3-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224402" version="1" comment="snmp-mibs is &lt;5.7.3-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224403" version="1" comment="libsoup-2_4-1 is &lt;2.62.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224404" version="1" comment="libsoup-lang is &lt;2.62.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224405" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.34-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224406" version="1" comment="libspice-client-glib-helper is &lt;0.34-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224407" version="1" comment="libspice-client-gtk-3_0-5 is &lt;0.34-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224408" version="1" comment="libspice-controller0 is &lt;0.34-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224409" version="1" comment="libsqlite3-0 is &lt;3.23.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224410" version="1" comment="libsqlite3-0-32bit is &lt;3.23.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224411" version="1" comment="sqlite3 is &lt;3.23.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224412" version="1" comment="sqlite3-devel is &lt;3.23.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224413" version="1" comment="libssh-devel is &lt;0.7.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224414" version="1" comment="libssh4 is &lt;0.7.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224415" version="1" comment="libssh4-32bit is &lt;0.7.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224416" version="1" comment="libssh2-1 is &lt;1.8.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224417" version="1" comment="libssh2-devel is &lt;1.8.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224418" version="1" comment="libsystemd0 is &lt;234-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224419" version="1" comment="libsystemd0-32bit is &lt;234-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224420" version="1" comment="libudev-devel is &lt;234-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224421" version="1" comment="libudev1 is &lt;234-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224422" version="1" comment="libudev1-32bit is &lt;234-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224423" version="1" comment="systemd is &lt;234-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224424" version="1" comment="systemd-32bit is &lt;234-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224425" version="1" comment="systemd-bash-completion is &lt;234-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224426" version="1" comment="systemd-container is &lt;234-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224427" version="1" comment="systemd-coredump is &lt;234-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224428" version="1" comment="systemd-devel is &lt;234-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224429" version="1" comment="systemd-sysvinit is &lt;234-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224430" version="1" comment="udev is &lt;234-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224431" version="1" comment="libtag1 is &lt;1.11.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224432" version="1" comment="libtasn1 is &lt;4.13-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224433" version="1" comment="libtasn1-6 is &lt;4.13-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224434" version="1" comment="libtasn1-devel is &lt;4.13-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224435" version="1" comment="libthai-data is &lt;0.1.27-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224436" version="1" comment="libthai0 is &lt;0.1.27-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224437" version="1" comment="libtiff-devel is &lt;4.0.9-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224438" version="1" comment="libtiff5 is &lt;4.0.9-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224439" version="1" comment="libudisks2-0 is &lt;2.6.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224440" version="1" comment="typelib-1_0-UDisks-2_0 is &lt;2.6.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224441" version="1" comment="udisks2 is &lt;2.6.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224442" version="1" comment="udisks2-devel is &lt;2.6.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224443" version="1" comment="udisks2-lang is &lt;2.6.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224444" version="1" comment="libunbound2 is &lt;1.6.8-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224445" version="1" comment="unbound-anchor is &lt;1.6.8-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224446" version="1" comment="unbound-devel is &lt;1.6.8-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224447" version="1" comment="libunwind is &lt;1.2.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224448" version="1" comment="libunwind-devel is &lt;1.2.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224449" version="1" comment="libvirt-libs is &lt;4.0.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224450" version="1" comment="libvmtools-devel is &lt;10.2.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224451" version="1" comment="libvmtools0 is &lt;10.2.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224452" version="1" comment="open-vm-tools is &lt;10.2.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224453" version="1" comment="libvorbis-devel is &lt;1.3.6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224454" version="1" comment="libvorbis0 is &lt;1.3.6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224455" version="1" comment="libvorbisenc2 is &lt;1.3.6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224456" version="1" comment="libvorbisfile3 is &lt;1.3.6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224457" version="1" comment="libvpx4 is &lt;1.6.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224458" version="1" comment="libwavpack1 is &lt;5.1.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224459" version="1" comment="libwireshark9 is &lt;2.4.6-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224460" version="1" comment="libwiretap7 is &lt;2.4.6-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224461" version="1" comment="libwscodecs1 is &lt;2.4.6-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224462" version="1" comment="libwsutil8 is &lt;2.4.6-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224463" version="1" comment="wireshark is &lt;2.4.6-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224464" version="1" comment="libxcb-composite0 is &lt;1.13-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224465" version="1" comment="libxcb-damage0 is &lt;1.13-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224466" version="1" comment="libxcb-devel is &lt;1.13-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224467" version="1" comment="libxcb-devel-doc is &lt;1.13-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224468" version="1" comment="libxcb-dpms0 is &lt;1.13-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224469" version="1" comment="libxcb-dri2-0 is &lt;1.13-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224470" version="1" comment="libxcb-dri2-0-32bit is &lt;1.13-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224471" version="1" comment="libxcb-dri3-0 is &lt;1.13-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224472" version="1" comment="libxcb-dri3-0-32bit is &lt;1.13-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224473" version="1" comment="libxcb-glx0 is &lt;1.13-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224474" version="1" comment="libxcb-glx0-32bit is &lt;1.13-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224475" version="1" comment="libxcb-present0 is &lt;1.13-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224476" version="1" comment="libxcb-present0-32bit is &lt;1.13-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224477" version="1" comment="libxcb-randr0 is &lt;1.13-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224478" version="1" comment="libxcb-record0 is &lt;1.13-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224479" version="1" comment="libxcb-render0 is &lt;1.13-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224480" version="1" comment="libxcb-res0 is &lt;1.13-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224481" version="1" comment="libxcb-screensaver0 is &lt;1.13-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224482" version="1" comment="libxcb-shape0 is &lt;1.13-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224483" version="1" comment="libxcb-shm0 is &lt;1.13-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224484" version="1" comment="libxcb-sync1 is &lt;1.13-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224485" version="1" comment="libxcb-sync1-32bit is &lt;1.13-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224486" version="1" comment="libxcb-xf86dri0 is &lt;1.13-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224487" version="1" comment="libxcb-xfixes0 is &lt;1.13-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224488" version="1" comment="libxcb-xfixes0-32bit is &lt;1.13-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224489" version="1" comment="libxcb-xinerama0 is &lt;1.13-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224490" version="1" comment="libxcb-xinput0 is &lt;1.13-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224491" version="1" comment="libxcb-xkb1 is &lt;1.13-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224492" version="1" comment="libxcb-xtest0 is &lt;1.13-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224493" version="1" comment="libxcb-xv0 is &lt;1.13-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224494" version="1" comment="libxcb-xvmc0 is &lt;1.13-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224495" version="1" comment="libxcb1 is &lt;1.13-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224496" version="1" comment="libxcb1-32bit is &lt;1.13-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224497" version="1" comment="libxerces-c-3_1 is &lt;3.1.4-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224498" version="1" comment="libxerces-c-devel is &lt;3.1.4-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224499" version="1" comment="libxml2-2 is &lt;2.9.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224500" version="1" comment="libxml2-2-32bit is &lt;2.9.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224501" version="1" comment="libxml2-devel is &lt;2.9.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224502" version="1" comment="libxml2-tools is &lt;2.9.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224503" version="1" comment="libxslt-devel is &lt;1.1.32-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224504" version="1" comment="libxslt-tools is &lt;1.1.32-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224505" version="1" comment="libxslt1 is &lt;1.1.32-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224506" version="1" comment="libyaml-0-2 is &lt;0.1.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224507" version="1" comment="libyaml-devel is &lt;0.1.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224508" version="1" comment="libzip-devel is &lt;1.5.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224509" version="1" comment="libzip5 is &lt;1.5.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224510" version="1" comment="libzmq5 is &lt;4.2.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224511" version="1" comment="zeromq-devel is &lt;4.2.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224512" version="1" comment="libzypp is &lt;17.3.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224513" version="1" comment="libzypp-devel is &lt;17.3.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224514" version="1" comment="libzzip-0-13 is &lt;0.13.69-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251773" version="1" comment="zziplib-devel is &lt;0.13.69-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224516" version="1" comment="logrotate is &lt;3.13.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224517" version="1" comment="mailx is &lt;12.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224518" version="1" comment="minicom is &lt;2.7.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224519" version="1" comment="minicom-lang is &lt;2.7.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224520" version="1" comment="mozilla-nspr is &lt;4.19-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224521" version="1" comment="mozilla-nspr-32bit is &lt;4.19-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224522" version="1" comment="mozilla-nspr-devel is &lt;4.19-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224523" version="1" comment="mutt is &lt;1.9.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224524" version="1" comment="mutt-doc is &lt;1.9.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224525" version="1" comment="mutt-lang is &lt;1.9.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224526" version="1" comment="opensc is &lt;0.17.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224527" version="1" comment="openslp is &lt;2.0.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224528" version="1" comment="openslp-32bit is &lt;2.0.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224529" version="1" comment="openslp-devel is &lt;2.0.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224530" version="1" comment="openssh is &lt;7.6p1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224531" version="1" comment="openssh-helpers is &lt;7.6p1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224532" version="1" comment="openvpn is &lt;2.4.3-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224533" version="1" comment="openvpn-auth-pam-plugin is &lt;2.4.3-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224534" version="1" comment="openvpn-devel is &lt;2.4.3-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224535" version="1" comment="opie-32bit is &lt;2.4-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224536" version="1" comment="p7zip is &lt;16.02-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224537" version="1" comment="pam is &lt;1.3.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224538" version="1" comment="pam-32bit is &lt;1.3.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224539" version="1" comment="pam-devel is &lt;1.3.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224540" version="1" comment="pam-doc is &lt;1.3.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224541" version="1" comment="pam_krb5 is &lt;2.4.13-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224542" version="1" comment="pam_krb5-32bit is &lt;2.4.13-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224543" version="1" comment="pam_ssh is &lt;2.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224544" version="1" comment="pam_ssh-32bit is &lt;2.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224545" version="1" comment="pam_yubico is &lt;2.26-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224546" version="1" comment="pcsc-ccid is &lt;1.4.28-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224547" version="1" comment="perl is &lt;5.26.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224548" version="1" comment="perl-base is &lt;5.26.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224549" version="1" comment="perl-base-32bit is &lt;5.26.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224550" version="1" comment="perl-DBD-mysql is &lt;4.046-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224551" version="1" comment="perl-HTML-Parser is &lt;3.72-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224552" version="1" comment="perl-LWP-Protocol-https is &lt;6.06-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224553" version="1" comment="perl-XML-LibXML is &lt;2.0132-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224554" version="1" comment="policycoreutils is &lt;2.6-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224555" version="1" comment="policycoreutils-lang is &lt;2.6-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224556" version="1" comment="policycoreutils-newrole is &lt;2.6-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224557" version="1" comment="postgresql is &lt;10-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224558" version="1" comment="procmail is &lt;3.22-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224559" version="1" comment="python is &lt;2.7.14-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224560" version="1" comment="python-curses is &lt;2.7.14-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224561" version="1" comment="python-gdbm is &lt;2.7.14-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224562" version="1" comment="python2-Jinja2 is &lt;2.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224563" version="1" comment="python3-Jinja2 is &lt;2.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224564" version="1" comment="python2-bottle is &lt;0.12.13-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224565" version="1" comment="python2-libxml2-python is &lt;2.9.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224566" version="1" comment="python3-libxml2-python is &lt;2.9.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224567" version="1" comment="python2-numpy is &lt;1.14.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224568" version="1" comment="python2-numpy-devel is &lt;1.14.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224569" version="1" comment="python3-numpy is &lt;1.14.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224570" version="1" comment="python3-numpy-devel is &lt;1.14.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224571" version="1" comment="python2-paramiko is &lt;2.4.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224572" version="1" comment="python2-pip is &lt;10.0.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224573" version="1" comment="python3-pip is &lt;10.0.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224574" version="1" comment="python2-pyOpenSSL is &lt;17.5.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224575" version="1" comment="python3-pyOpenSSL is &lt;17.5.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224576" version="1" comment="python2-pycrypto is &lt;2.6.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224577" version="1" comment="python3-pycrypto is &lt;2.6.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224578" version="1" comment="python2-pywbem is &lt;0.11.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224579" version="1" comment="python2-requests is &lt;2.18.4-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224580" version="1" comment="python3-requests is &lt;2.18.4-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224581" version="1" comment="python2-salt is &lt;2018.3.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224582" version="1" comment="python3-salt is &lt;2018.3.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224583" version="1" comment="salt is &lt;2018.3.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224584" version="1" comment="salt-bash-completion is &lt;2018.3.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224585" version="1" comment="salt-doc is &lt;2018.3.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224586" version="1" comment="salt-minion is &lt;2018.3.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224587" version="1" comment="salt-zsh-completion is &lt;2018.3.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224588" version="1" comment="python2-urllib3 is &lt;1.22-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224589" version="1" comment="python3-urllib3 is &lt;1.22-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224590" version="1" comment="python3 is &lt;3.6.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224591" version="1" comment="python3-curses is &lt;3.6.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224592" version="1" comment="python3-dbm is &lt;3.6.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224593" version="1" comment="python3-tk is &lt;3.6.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224594" version="1" comment="qemu-tools is &lt;2.11.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224595" version="1" comment="radvd is &lt;2.17-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224596" version="1" comment="rpcbind is &lt;0.2.3-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224597" version="1" comment="rsync is &lt;3.1.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224598" version="1" comment="rsyslog is &lt;8.33.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224599" version="1" comment="rzsz is &lt;0.12.21~rc-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224600" version="1" comment="screen is &lt;4.6.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224601" version="1" comment="shadow is &lt;4.5-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224602" version="1" comment="sharutils is &lt;4.15.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224603" version="1" comment="sharutils-lang is &lt;4.15.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224604" version="1" comment="shim is &lt;14-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179096" version="1" comment="squashfs is &lt;4.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224605" version="1" comment="strongswan is &lt;5.6.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224606" version="1" comment="strongswan-doc is &lt;5.6.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224607" version="1" comment="strongswan-hmac is &lt;5.6.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224608" version="1" comment="strongswan-ipsec is &lt;5.6.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224609" version="1" comment="strongswan-libs0 is &lt;5.6.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224610" version="1" comment="subversion is &lt;1.10.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224611" version="1" comment="subversion-devel is &lt;1.10.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224612" version="1" comment="sudo is &lt;1.8.22-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224613" version="1" comment="sudo-devel is &lt;1.8.22-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224614" version="1" comment="sysconfig is &lt;0.84.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224615" version="1" comment="sysconfig-netconfig is &lt;0.84.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224616" version="1" comment="syslog-service is &lt;2.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224617" version="1" comment="sysvinit-tools is &lt;2.88+-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224618" version="1" comment="whois is &lt;5.3.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224619" version="1" comment="tar is &lt;1.30-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224620" version="1" comment="tar-lang is &lt;1.30-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224621" version="1" comment="tar-rmt is &lt;1.30-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224622" version="1" comment="tboot is &lt;20170711_1.9.6-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224623" version="1" comment="tcpdump is &lt;4.9.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224624" version="1" comment="tftp is &lt;5.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224625" version="1" comment="tpm2.0-tools is &lt;3.0.4-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224626" version="1" comment="ucode-intel is &lt;20180425-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224627" version="1" comment="unixODBC is &lt;2.3.6-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224628" version="1" comment="unixODBC-devel is &lt;2.3.6-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224629" version="1" comment="unzip is &lt;6.00-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224630" version="1" comment="update-alternatives is &lt;1.19.0.4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224631" version="1" comment="vim is &lt;8.0.1568-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224632" version="1" comment="vim-data is &lt;8.0.1568-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224633" version="1" comment="vim-data-common is &lt;8.0.1568-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224634" version="1" comment="w3m is &lt;0.5.3+git20180125-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224635" version="1" comment="wget is &lt;1.19.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224636" version="1" comment="wpa_supplicant is &lt;2.6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224637" version="1" comment="xdg-utils is &lt;20170508-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224638" version="1" comment="xen-libs is &lt;4.10.1_04-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224639" version="1" comment="xen-tools-domU is &lt;4.10.1_04-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224640" version="1" comment="xf86-video-intel is &lt;2.99.917+git781.c8990575-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224641" version="1" comment="xorg-x11 is &lt;7.6_1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224642" version="1" comment="xorg-x11-essentials is &lt;7.6_1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224643" version="1" comment="xrdb is &lt;1.1.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224644" version="1" comment="xorg-x11-devel is &lt;7.6.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224645" version="1" comment="xorg-x11-libs is &lt;7.6.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224646" version="1" comment="xorg-x11-server is &lt;1.19.6-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224647" version="1" comment="xorg-x11-server-extra is &lt;1.19.6-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224648" version="1" comment="xscreensaver is &lt;5.37-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224649" version="1" comment="xscreensaver-data is &lt;5.37-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224650" version="1" comment="xscreensaver-lang is &lt;5.37-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224651" version="1" comment="yast2 is &lt;4.0.77-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224652" version="1" comment="yast2-core is &lt;4.0.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224653" version="1" comment="yast2-core-devel is &lt;4.0.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224654" version="1" comment="yast2-users is &lt;4.0.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224655" version="1" comment="yubikey-manager is &lt;0.6.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251774" version="1" comment="zoo is &lt;2.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251775" version="1" comment="zypper is &lt;1.14.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251776" version="1" comment="zypper-log is &lt;1.14.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254627" version="1" comment="aaa_base is &lt;84.87+git20180409.04c9dae-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254628" version="1" comment="aaa_base-extras is &lt;84.87+git20180409.04c9dae-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254629" version="1" comment="sle-module-basesystem-release is ==15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254630" version="1" comment="alsa is &lt;1.1.5-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254631" version="1" comment="alsa-devel is &lt;1.1.5-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254632" version="1" comment="libasound2 is &lt;1.1.5-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254633" version="1" comment="libasound2-32bit is &lt;1.1.5-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244972" version="1" comment="amavisd-new is &lt;2.11.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244973" version="1" comment="amavisd-new-docs is &lt;2.11.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254634" version="1" comment="apparmor-abstractions is &lt;2.12.2-7.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254635" version="1" comment="apparmor-docs is &lt;2.12.2-7.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254636" version="1" comment="apparmor-parser is &lt;2.12.2-7.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254637" version="1" comment="apparmor-parser-lang is &lt;2.12.2-7.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254638" version="1" comment="apparmor-profiles is &lt;2.12.2-7.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254639" version="1" comment="apparmor-utils is &lt;2.12.2-7.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254640" version="1" comment="apparmor-utils-lang is &lt;2.12.2-7.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254641" version="1" comment="pam_apparmor is &lt;2.12.2-7.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254642" version="1" comment="pam_apparmor-32bit is &lt;2.12.2-7.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254643" version="1" comment="perl-apparmor is &lt;2.12.2-7.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254644" version="1" comment="python3-apparmor is &lt;2.12.2-7.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254645" version="1" comment="apr-util-devel is &lt;1.6.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254646" version="1" comment="libapr-util1 is &lt;1.6.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254647" version="1" comment="autofs is &lt;5.1.3-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254648" version="1" comment="avahi is &lt;0.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254649" version="1" comment="avahi-compat-howl-devel is &lt;0.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254650" version="1" comment="avahi-compat-mDNSResponder-devel is &lt;0.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254651" version="1" comment="avahi-lang is &lt;0.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254652" version="1" comment="avahi-utils is &lt;0.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254653" version="1" comment="libavahi-client3 is &lt;0.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254654" version="1" comment="libavahi-client3-32bit is &lt;0.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254655" version="1" comment="libavahi-common3 is &lt;0.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254656" version="1" comment="libavahi-common3-32bit is &lt;0.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254657" version="1" comment="libavahi-core7 is &lt;0.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254658" version="1" comment="libavahi-devel is &lt;0.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254659" version="1" comment="libdns_sd is &lt;0.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254660" version="1" comment="libhowl0 is &lt;0.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236913" version="1" comment="axis is &lt;1.4-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254661" version="1" comment="bash is &lt;4.4-9.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254662" version="1" comment="bash-devel is &lt;4.4-9.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254663" version="1" comment="bash-doc is &lt;4.4-9.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254664" version="1" comment="bash-lang is &lt;4.4-9.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254665" version="1" comment="libreadline7 is &lt;7.0-9.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254666" version="1" comment="readline-devel is &lt;7.0-9.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254667" version="1" comment="readline-doc is &lt;7.0-9.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254668" version="1" comment="bind-devel is &lt;9.11.2-12.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254669" version="1" comment="bind-utils is &lt;9.11.2-12.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254670" version="1" comment="libbind9-160 is &lt;9.11.2-12.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254671" version="1" comment="libdns169 is &lt;9.11.2-12.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254672" version="1" comment="libirs-devel is &lt;9.11.2-12.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254673" version="1" comment="libirs160 is &lt;9.11.2-12.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254674" version="1" comment="libisc166 is &lt;9.11.2-12.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254675" version="1" comment="libisccc160 is &lt;9.11.2-12.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254676" version="1" comment="libisccfg160 is &lt;9.11.2-12.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254677" version="1" comment="liblwres160 is &lt;9.11.2-12.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254678" version="1" comment="python3-bind is &lt;9.11.2-12.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254679" version="1" comment="binutils is &lt;2.31-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254680" version="1" comment="binutils-devel is &lt;2.31-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254681" version="1" comment="btrfsmaintenance is &lt;0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229705" version="1" comment="cairo-devel is &lt;1.15.10-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229706" version="1" comment="libcairo-gobject2 is &lt;1.15.10-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229707" version="1" comment="libcairo-script-interpreter2 is &lt;1.15.10-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229708" version="1" comment="libcairo2 is &lt;1.15.10-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254682" version="1" comment="ceph-common is &lt;14.2.0.300+gacd2f2b9e1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254683" version="1" comment="libcephfs-devel is &lt;14.2.0.300+gacd2f2b9e1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254684" version="1" comment="libcephfs2 is &lt;14.2.0.300+gacd2f2b9e1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254685" version="1" comment="librados-devel is &lt;14.2.0.300+gacd2f2b9e1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254686" version="1" comment="librados2 is &lt;14.2.0.300+gacd2f2b9e1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254687" version="1" comment="libradospp-devel is &lt;14.2.0.300+gacd2f2b9e1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254688" version="1" comment="librbd-devel is &lt;14.2.0.300+gacd2f2b9e1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254689" version="1" comment="librbd1 is &lt;14.2.0.300+gacd2f2b9e1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254690" version="1" comment="librgw-devel is &lt;14.2.0.300+gacd2f2b9e1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254691" version="1" comment="librgw2 is &lt;14.2.0.300+gacd2f2b9e1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254692" version="1" comment="python3-ceph-argparse is &lt;14.2.0.300+gacd2f2b9e1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254693" version="1" comment="python3-cephfs is &lt;14.2.0.300+gacd2f2b9e1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254694" version="1" comment="python3-rados is &lt;14.2.0.300+gacd2f2b9e1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254695" version="1" comment="python3-rbd is &lt;14.2.0.300+gacd2f2b9e1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254696" version="1" comment="python3-rgw is &lt;14.2.0.300+gacd2f2b9e1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254697" version="1" comment="rados-objclass-devel is &lt;14.2.0.300+gacd2f2b9e1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254698" version="1" comment="chrony is &lt;3.2-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246921" version="1" comment="clamav is &lt;0.100.3-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246922" version="1" comment="clamav-devel is &lt;0.100.3-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246923" version="1" comment="libclamav7 is &lt;0.100.3-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246924" version="1" comment="libclammspack0 is &lt;0.100.3-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252009" version="1" comment="cups is &lt;2.2.7-3.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252010" version="1" comment="cups-client is &lt;2.2.7-3.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252011" version="1" comment="cups-config is &lt;2.2.7-3.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252012" version="1" comment="cups-devel is &lt;2.2.7-3.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252027" version="1" comment="libcups2 is &lt;2.2.7-3.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252028" version="1" comment="libcups2-32bit is &lt;2.2.7-3.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252029" version="1" comment="libcupscgi1 is &lt;2.2.7-3.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252030" version="1" comment="libcupsimage2 is &lt;2.2.7-3.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252031" version="1" comment="libcupsmime1 is &lt;2.2.7-3.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252032" version="1" comment="libcupsppdc1 is &lt;2.2.7-3.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243824" version="1" comment="curl is &lt;7.60.0-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243825" version="1" comment="libcurl-devel is &lt;7.60.0-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243826" version="1" comment="libcurl4 is &lt;7.60.0-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243827" version="1" comment="libcurl4-32bit is &lt;7.60.0-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254699" version="1" comment="cyrus-sasl is &lt;2.1.26-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254700" version="1" comment="cyrus-sasl-32bit is &lt;2.1.26-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254701" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.26-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254702" version="1" comment="cyrus-sasl-crammd5-32bit is &lt;2.1.26-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254703" version="1" comment="cyrus-sasl-devel is &lt;2.1.26-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254704" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.26-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254705" version="1" comment="cyrus-sasl-digestmd5-32bit is &lt;2.1.26-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254706" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.26-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254707" version="1" comment="cyrus-sasl-gssapi-32bit is &lt;2.1.26-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254708" version="1" comment="cyrus-sasl-otp is &lt;2.1.26-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254709" version="1" comment="cyrus-sasl-plain is &lt;2.1.26-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254710" version="1" comment="cyrus-sasl-plain-32bit is &lt;2.1.26-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254711" version="1" comment="cyrus-sasl-saslauthd is &lt;2.1.26-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254712" version="1" comment="libsasl2-3 is &lt;2.1.26-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254713" version="1" comment="libsasl2-3-32bit is &lt;2.1.26-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254714" version="1" comment="dbus-1 is &lt;1.12.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254715" version="1" comment="dbus-1-devel is &lt;1.12.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254716" version="1" comment="dbus-1-x11 is &lt;1.12.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254717" version="1" comment="libdbus-1-3 is &lt;1.12.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254718" version="1" comment="libdbus-1-3-32bit is &lt;1.12.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254719" version="1" comment="dnsmasq is &lt;2.78-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254720" version="1" comment="dracut is &lt;044.2-18.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254721" version="1" comment="dracut-fips is &lt;044.2-18.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254722" version="1" comment="dracut-ima is &lt;044.2-18.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230347" version="1" comment="e2fsprogs is &lt;1.43.8-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230348" version="1" comment="e2fsprogs-devel is &lt;1.43.8-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230349" version="1" comment="libcom_err-devel is &lt;1.43.8-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230350" version="1" comment="libcom_err-devel-static is &lt;1.43.8-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230351" version="1" comment="libcom_err2 is &lt;1.43.8-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230352" version="1" comment="libcom_err2-32bit is &lt;1.43.8-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230353" version="1" comment="libext2fs-devel is &lt;1.43.8-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230354" version="1" comment="libext2fs-devel-static is &lt;1.43.8-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230355" version="1" comment="libext2fs2 is &lt;1.43.8-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254723" version="1" comment="emacs is &lt;25.3-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254724" version="1" comment="emacs-el is &lt;25.3-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254725" version="1" comment="emacs-info is &lt;25.3-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254726" version="1" comment="emacs-nox is &lt;25.3-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254727" version="1" comment="etags is &lt;25.3-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245622" version="1" comment="file is &lt;5.32-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245623" version="1" comment="file-devel is &lt;5.32-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245624" version="1" comment="file-magic is &lt;5.32-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245625" version="1" comment="libmagic1 is &lt;5.32-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245626" version="1" comment="libmagic1-32bit is &lt;5.32-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254728" version="1" comment="firewall-macros is &lt;0.5.5-4.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254729" version="1" comment="firewalld is &lt;0.5.5-4.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254730" version="1" comment="firewalld-lang is &lt;0.5.5-4.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254731" version="1" comment="python3-firewall is &lt;0.5.5-4.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247131" version="1" comment="flac-devel is &lt;1.3.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247132" version="1" comment="libFLAC++6 is &lt;1.3.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247133" version="1" comment="libFLAC8 is &lt;1.3.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237396" version="1" comment="fuse is &lt;2.9.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237397" version="1" comment="fuse-devel is &lt;2.9.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237398" version="1" comment="fuse-doc is &lt;2.9.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237399" version="1" comment="libfuse2 is &lt;2.9.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237400" version="1" comment="libulockmgr1 is &lt;2.9.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235502" version="1" comment="g3utils is &lt;1.1.37-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235503" version="1" comment="mgetty is &lt;1.1.37-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246127" version="1" comment="ghostscript is &lt;9.26a-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246128" version="1" comment="ghostscript-devel is &lt;9.26a-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246129" version="1" comment="ghostscript-x11 is &lt;9.26a-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242042" version="1" comment="git-core is &lt;2.16.4-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254732" version="1" comment="glib2-devel is &lt;2.54.3-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254733" version="1" comment="glib2-lang is &lt;2.54.3-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254734" version="1" comment="glib2-tools is &lt;2.54.3-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254735" version="1" comment="libgio-2_0-0 is &lt;2.54.3-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254736" version="1" comment="libgio-2_0-0-32bit is &lt;2.54.3-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254737" version="1" comment="libglib-2_0-0 is &lt;2.54.3-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254738" version="1" comment="libglib-2_0-0-32bit is &lt;2.54.3-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254739" version="1" comment="libgmodule-2_0-0 is &lt;2.54.3-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254740" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.54.3-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254741" version="1" comment="libgobject-2_0-0 is &lt;2.54.3-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254742" version="1" comment="libgobject-2_0-0-32bit is &lt;2.54.3-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254743" version="1" comment="libgthread-2_0-0 is &lt;2.54.3-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247120" version="1" comment="glibc is &lt;2.26-13.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247121" version="1" comment="glibc-32bit is &lt;2.26-13.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247122" version="1" comment="glibc-devel is &lt;2.26-13.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247123" version="1" comment="glibc-extra is &lt;2.26-13.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247124" version="1" comment="glibc-i18ndata is &lt;2.26-13.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247125" version="1" comment="glibc-info is &lt;2.26-13.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247126" version="1" comment="glibc-locale is &lt;2.26-13.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247127" version="1" comment="glibc-locale-base is &lt;2.26-13.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247128" version="1" comment="glibc-profile is &lt;2.26-13.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247129" version="1" comment="nscd is &lt;2.26-13.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254744" version="1" comment="glibc-32bit is &lt;2.26-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254745" version="1" comment="glibc-locale-32bit is &lt;2.26-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254746" version="1" comment="glibc-locale-32bit is &lt;2.26-13.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252717" version="1" comment="gnutls is &lt;3.6.7-6.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252718" version="1" comment="libgnutls-devel is &lt;3.6.7-6.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252719" version="1" comment="libgnutls30 is &lt;3.6.7-6.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252720" version="1" comment="libgnutls30-32bit is &lt;3.6.7-6.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252721" version="1" comment="libgnutlsxx-devel is &lt;3.6.7-6.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252722" version="1" comment="libgnutlsxx28 is &lt;3.6.7-6.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242812" version="1" comment="gpg2 is &lt;2.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242813" version="1" comment="gpg2-lang is &lt;2.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254747" version="1" comment="gpgme is &lt;1.10.0-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254748" version="1" comment="libgpgme-devel is &lt;1.10.0-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254749" version="1" comment="libgpgme11 is &lt;1.10.0-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254750" version="1" comment="libgpgmepp-devel is &lt;1.10.0-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254751" version="1" comment="libgpgmepp6 is &lt;1.10.0-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254752" version="1" comment="libqgpgme-devel is &lt;1.10.0-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254753" version="1" comment="libqgpgme7 is &lt;1.10.0-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254754" version="1" comment="grub2 is &lt;2.02-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254755" version="1" comment="grub2-i386-pc is &lt;2.02-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254756" version="1" comment="grub2-powerpc-ieee1275 is &lt;2.02-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254757" version="1" comment="grub2-s390x-emu is &lt;2.02-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254758" version="1" comment="grub2-snapper-plugin is &lt;2.02-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254759" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.02-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254760" version="1" comment="grub2-x86_64-efi is &lt;2.02-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254761" version="1" comment="hplip-devel is &lt;3.18.6-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254762" version="1" comment="hplip-hpijs is &lt;3.18.6-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254763" version="1" comment="hplip-sane is &lt;3.18.6-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254764" version="1" comment="java-11-openjdk is &lt;11.0.3.0-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254765" version="1" comment="java-11-openjdk-demo is &lt;11.0.3.0-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254766" version="1" comment="java-11-openjdk-devel is &lt;11.0.3.0-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254767" version="1" comment="java-11-openjdk-headless is &lt;11.0.3.0-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254768" version="1" comment="jq is &lt;1.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254769" version="1" comment="libjq-devel is &lt;1.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254770" version="1" comment="libjq1 is &lt;1.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254771" version="1" comment="kbd is &lt;2.0.4-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254772" version="1" comment="kbd-legacy is &lt;2.0.4-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254773" version="1" comment="kdump is &lt;0.9.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254774" version="1" comment="kernel-default is &lt;4.12.14-195" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254775" version="1" comment="kernel-default-base is &lt;4.12.14-195" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254776" version="1" comment="kernel-default-devel is &lt;4.12.14-195" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254777" version="1" comment="kernel-default-man is &lt;4.12.14-195" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254778" version="1" comment="kernel-devel is &lt;4.12.14-195" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254779" version="1" comment="kernel-macros is &lt;4.12.14-195" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254780" version="1" comment="kernel-zfcpdump is &lt;4.12.14-195" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254781" version="1" comment="kernel-firmware is &lt;20190118-1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254782" version="1" comment="ucode-amd is &lt;20190118-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254783" version="1" comment="krb5 is &lt;1.16.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254784" version="1" comment="krb5-32bit is &lt;1.16.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254785" version="1" comment="krb5-client is &lt;1.16.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254786" version="1" comment="krb5-devel is &lt;1.16.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254787" version="1" comment="krb5-plugin-preauth-otp is &lt;1.16.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254788" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.16.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254789" version="1" comment="lftp is &lt;4.8.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254790" version="1" comment="libQt5Concurrent-devel is &lt;5.9.7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254791" version="1" comment="libQt5Concurrent5 is &lt;5.9.7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254792" version="1" comment="libQt5Core-devel is &lt;5.9.7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254793" version="1" comment="libQt5Core-private-headers-devel is &lt;5.9.7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254794" version="1" comment="libQt5Core5 is &lt;5.9.7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254795" version="1" comment="libQt5DBus-devel is &lt;5.9.7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254796" version="1" comment="libQt5DBus-private-headers-devel is &lt;5.9.7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254797" version="1" comment="libQt5DBus5 is &lt;5.9.7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254798" version="1" comment="libQt5Gui-devel is &lt;5.9.7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254799" version="1" comment="libQt5Gui-private-headers-devel is &lt;5.9.7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254800" version="1" comment="libQt5Gui5 is &lt;5.9.7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254801" version="1" comment="libQt5KmsSupport-devel-static is &lt;5.9.7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254802" version="1" comment="libQt5KmsSupport-private-headers-devel is &lt;5.9.7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254803" version="1" comment="libQt5Network-devel is &lt;5.9.7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254804" version="1" comment="libQt5Network-private-headers-devel is &lt;5.9.7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254805" version="1" comment="libQt5Network5 is &lt;5.9.7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254806" version="1" comment="libQt5OpenGL-devel is &lt;5.9.7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254807" version="1" comment="libQt5OpenGL-private-headers-devel is &lt;5.9.7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254808" version="1" comment="libQt5OpenGL5 is &lt;5.9.7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254809" version="1" comment="libQt5PlatformHeaders-devel is &lt;5.9.7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254810" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.9.7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254811" version="1" comment="libQt5PlatformSupport-private-headers-devel is &lt;5.9.7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254812" version="1" comment="libQt5PrintSupport-devel is &lt;5.9.7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254813" version="1" comment="libQt5PrintSupport-private-headers-devel is &lt;5.9.7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254814" version="1" comment="libQt5PrintSupport5 is &lt;5.9.7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254815" version="1" comment="libQt5Sql-devel is &lt;5.9.7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254816" version="1" comment="libQt5Sql-private-headers-devel is &lt;5.9.7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254817" version="1" comment="libQt5Sql5 is &lt;5.9.7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254818" version="1" comment="libQt5Sql5-sqlite is &lt;5.9.7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254819" version="1" comment="libQt5Test-devel is &lt;5.9.7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254820" version="1" comment="libQt5Test-private-headers-devel is &lt;5.9.7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254821" version="1" comment="libQt5Test5 is &lt;5.9.7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254822" version="1" comment="libQt5Widgets-devel is &lt;5.9.7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254823" version="1" comment="libQt5Widgets-private-headers-devel is &lt;5.9.7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254824" version="1" comment="libQt5Widgets5 is &lt;5.9.7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254825" version="1" comment="libQt5Xml-devel is &lt;5.9.7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254826" version="1" comment="libQt5Xml5 is &lt;5.9.7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254827" version="1" comment="libqt5-qtbase-common-devel is &lt;5.9.7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254828" version="1" comment="libqt5-qtbase-devel is &lt;5.9.7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254829" version="1" comment="libqt5-qtbase-private-headers-devel is &lt;5.9.7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235649" version="1" comment="libX11-6 is &lt;1.6.5-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235650" version="1" comment="libX11-6-32bit is &lt;1.6.5-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235651" version="1" comment="libX11-data is &lt;1.6.5-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235652" version="1" comment="libX11-devel is &lt;1.6.5-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235653" version="1" comment="libX11-xcb1 is &lt;1.6.5-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235654" version="1" comment="libX11-xcb1-32bit is &lt;1.6.5-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254830" version="1" comment="libXvnc1 is &lt;1.9.0-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254831" version="1" comment="tigervnc is &lt;1.9.0-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254832" version="1" comment="xorg-x11-Xvnc is &lt;1.9.0-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254833" version="1" comment="xorg-x11-Xvnc-module is &lt;1.9.0-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254834" version="1" comment="xorg-x11-Xvnc-novnc is &lt;1.9.0-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246706" version="1" comment="libarchive-devel is &lt;3.3.2-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246707" version="1" comment="libarchive13 is &lt;3.3.2-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254835" version="1" comment="libblkid-devel is &lt;2.33.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254836" version="1" comment="libblkid-devel-static is &lt;2.33.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254837" version="1" comment="libblkid1 is &lt;2.33.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254838" version="1" comment="libblkid1-32bit is &lt;2.33.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254839" version="1" comment="libfdisk-devel is &lt;2.33.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254840" version="1" comment="libfdisk1 is &lt;2.33.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254841" version="1" comment="libmount-devel is &lt;2.33.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254842" version="1" comment="libmount1 is &lt;2.33.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254843" version="1" comment="libmount1-32bit is &lt;2.33.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254844" version="1" comment="libsmartcols-devel is &lt;2.33.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254845" version="1" comment="libsmartcols1 is &lt;2.33.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254846" version="1" comment="libuuid-devel is &lt;2.33.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254847" version="1" comment="libuuid-devel-static is &lt;2.33.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254848" version="1" comment="libuuid1 is &lt;2.33.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254849" version="1" comment="libuuid1-32bit is &lt;2.33.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254850" version="1" comment="util-linux is &lt;2.33.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254851" version="1" comment="util-linux-lang is &lt;2.33.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254852" version="1" comment="util-linux-systemd is &lt;2.33.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246762" version="1" comment="libbluetooth3 is &lt;5.48-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246328" version="1" comment="libcaca-devel is &lt;0.99.beta19.git20171003-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246329" version="1" comment="libcaca0 is &lt;0.99.beta19.git20171003-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246330" version="1" comment="libcaca0-plugins is &lt;0.99.beta19.git20171003-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254853" version="1" comment="libdcerpc-binding0 is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254854" version="1" comment="libdcerpc-binding0-32bit is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254855" version="1" comment="libdcerpc-devel is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254856" version="1" comment="libdcerpc-samr-devel is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254857" version="1" comment="libdcerpc-samr0 is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254858" version="1" comment="libdcerpc0 is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254859" version="1" comment="libdcerpc0-32bit is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254860" version="1" comment="libndr-devel is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254861" version="1" comment="libndr-krb5pac-devel is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254862" version="1" comment="libndr-krb5pac0 is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254863" version="1" comment="libndr-krb5pac0-32bit is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254864" version="1" comment="libndr-nbt-devel is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254865" version="1" comment="libndr-nbt0 is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254866" version="1" comment="libndr-nbt0-32bit is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254867" version="1" comment="libndr-standard-devel is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254868" version="1" comment="libndr-standard0 is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254869" version="1" comment="libndr-standard0-32bit is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254870" version="1" comment="libndr0 is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254871" version="1" comment="libndr0-32bit is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254872" version="1" comment="libnetapi-devel is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254873" version="1" comment="libnetapi0 is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254874" version="1" comment="libnetapi0-32bit is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254875" version="1" comment="libsamba-credentials-devel is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254876" version="1" comment="libsamba-credentials0 is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254877" version="1" comment="libsamba-credentials0-32bit is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254878" version="1" comment="libsamba-errors-devel is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254879" version="1" comment="libsamba-errors0 is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254880" version="1" comment="libsamba-errors0-32bit is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254881" version="1" comment="libsamba-hostconfig-devel is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254882" version="1" comment="libsamba-hostconfig0 is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254883" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254884" version="1" comment="libsamba-passdb-devel is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254885" version="1" comment="libsamba-passdb0 is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254886" version="1" comment="libsamba-passdb0-32bit is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254887" version="1" comment="libsamba-policy-devel is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254888" version="1" comment="libsamba-policy-python3-devel is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254889" version="1" comment="libsamba-policy0-python3 is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254890" version="1" comment="libsamba-util-devel is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254891" version="1" comment="libsamba-util0 is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254892" version="1" comment="libsamba-util0-32bit is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254893" version="1" comment="libsamdb-devel is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254894" version="1" comment="libsamdb0 is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254895" version="1" comment="libsamdb0-32bit is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254896" version="1" comment="libsmbclient-devel is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254897" version="1" comment="libsmbclient0 is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254898" version="1" comment="libsmbconf-devel is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254899" version="1" comment="libsmbconf0 is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254900" version="1" comment="libsmbconf0-32bit is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254901" version="1" comment="libsmbldap-devel is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254902" version="1" comment="libsmbldap2 is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254903" version="1" comment="libsmbldap2-32bit is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254904" version="1" comment="libtevent-util-devel is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254905" version="1" comment="libtevent-util0 is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254906" version="1" comment="libtevent-util0-32bit is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254907" version="1" comment="libwbclient-devel is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254908" version="1" comment="libwbclient0 is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254909" version="1" comment="libwbclient0-32bit is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254910" version="1" comment="samba is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254911" version="1" comment="samba-client is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254912" version="1" comment="samba-core-devel is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254913" version="1" comment="samba-libs is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254914" version="1" comment="samba-libs-32bit is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254915" version="1" comment="samba-libs-python3 is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254916" version="1" comment="samba-python3 is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254917" version="1" comment="samba-winbind is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254918" version="1" comment="samba-winbind-32bit is &lt;4.9.5+git.149.9593f64a5c3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243835" version="1" comment="libfreebl3 is &lt;3.41.1-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243836" version="1" comment="libfreebl3-32bit is &lt;3.41.1-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243839" version="1" comment="libsoftokn3 is &lt;3.41.1-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243840" version="1" comment="libsoftokn3-32bit is &lt;3.41.1-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243843" version="1" comment="mozilla-nss is &lt;3.41.1-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243844" version="1" comment="mozilla-nss-32bit is &lt;3.41.1-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243845" version="1" comment="mozilla-nss-certs is &lt;3.41.1-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243846" version="1" comment="mozilla-nss-certs-32bit is &lt;3.41.1-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243847" version="1" comment="mozilla-nss-devel is &lt;3.41.1-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243848" version="1" comment="mozilla-nss-sysinit is &lt;3.41.1-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243849" version="1" comment="mozilla-nss-tools is &lt;3.41.1-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254919" version="1" comment="libgcrypt-devel is &lt;1.8.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254920" version="1" comment="libgcrypt20 is &lt;1.8.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254921" version="1" comment="libgcrypt20-32bit is &lt;1.8.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254922" version="1" comment="libgcrypt20-hmac is &lt;1.8.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254923" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.8.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246317" version="1" comment="libgd3 is &lt;2.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254924" version="1" comment="libgstgl-1_0-0 is &lt;1.12.5-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254925" version="1" comment="libgstphotography-1_0-0 is &lt;1.12.5-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252049" version="1" comment="libhogweed4 is &lt;3.4.1-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252050" version="1" comment="libhogweed4-32bit is &lt;3.4.1-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252071" version="1" comment="libnettle-devel is &lt;3.4.1-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252072" version="1" comment="libnettle6 is &lt;3.4.1-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252073" version="1" comment="libnettle6-32bit is &lt;3.4.1-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254926" version="1" comment="libidn11-32bit is &lt;1.34-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254927" version="1" comment="libipa_hbac-devel is &lt;1.16.1-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254928" version="1" comment="libipa_hbac0 is &lt;1.16.1-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254929" version="1" comment="libsss_certmap-devel is &lt;1.16.1-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254930" version="1" comment="libsss_certmap0 is &lt;1.16.1-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254931" version="1" comment="libsss_idmap-devel is &lt;1.16.1-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254932" version="1" comment="libsss_idmap0 is &lt;1.16.1-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254933" version="1" comment="libsss_nss_idmap-devel is &lt;1.16.1-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254934" version="1" comment="libsss_nss_idmap0 is &lt;1.16.1-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254935" version="1" comment="libsss_simpleifp-devel is &lt;1.16.1-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254936" version="1" comment="libsss_simpleifp0 is &lt;1.16.1-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254937" version="1" comment="python3-sssd-config is &lt;1.16.1-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254938" version="1" comment="sssd is &lt;1.16.1-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254939" version="1" comment="sssd-32bit is &lt;1.16.1-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254940" version="1" comment="sssd-ad is &lt;1.16.1-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254941" version="1" comment="sssd-dbus is &lt;1.16.1-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254942" version="1" comment="sssd-ipa is &lt;1.16.1-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254943" version="1" comment="sssd-krb5 is &lt;1.16.1-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254944" version="1" comment="sssd-krb5-common is &lt;1.16.1-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254945" version="1" comment="sssd-ldap is &lt;1.16.1-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254946" version="1" comment="sssd-proxy is &lt;1.16.1-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254947" version="1" comment="sssd-tools is &lt;1.16.1-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254948" version="1" comment="sssd-wbclient is &lt;1.16.1-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254949" version="1" comment="sssd-wbclient-devel is &lt;1.16.1-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254950" version="1" comment="libjansson4-32bit is &lt;2.9-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251784" version="1" comment="libjasper4 is &lt;2.0.14-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252845" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.24.1-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252846" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.24.1-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252847" version="1" comment="libwebkit2gtk3-lang is &lt;2.24.1-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252848" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.24.1-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246120" version="1" comment="libjpeg62 is &lt;62.2.0-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246121" version="1" comment="libjpeg62-devel is &lt;62.2.0-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246123" version="1" comment="libjpeg8 is &lt;8.1.2-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246124" version="1" comment="libjpeg8-devel is &lt;8.1.2-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246125" version="1" comment="libturbojpeg0 is &lt;8.1.2-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238254" version="1" comment="liblcms2-2 is &lt;2.9-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238255" version="1" comment="liblcms2-devel is &lt;2.9-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254951" version="1" comment="libldap-2_4-2 is &lt;2.4.46-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254952" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.46-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254953" version="1" comment="openldap2-client is &lt;2.4.46-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254954" version="1" comment="openldap2-devel is &lt;2.4.46-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254955" version="1" comment="openldap2-devel-static is &lt;2.4.46-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254956" version="1" comment="libldb-devel is &lt;1.4.6-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254957" version="1" comment="libldb1 is &lt;1.4.6-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254958" version="1" comment="libldb1-32bit is &lt;1.4.6-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254959" version="1" comment="python3-ldb is &lt;1.4.6-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254960" version="1" comment="python3-ldb-devel is &lt;1.4.6-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243820" version="1" comment="liblua5_3-5 is &lt;5.3.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243821" version="1" comment="liblua5_3-5-32bit is &lt;5.3.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243822" version="1" comment="lua53 is &lt;5.3.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243823" version="1" comment="lua53-devel is &lt;5.3.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254961" version="1" comment="libminizip1 is &lt;1.2.11-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254962" version="1" comment="libz1 is &lt;1.2.11-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254963" version="1" comment="libz1-32bit is &lt;1.2.11-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254964" version="1" comment="minizip-devel is &lt;1.2.11-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254965" version="1" comment="zlib-devel is &lt;1.2.11-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254966" version="1" comment="zlib-devel-static is &lt;1.2.11-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246237" version="1" comment="libmspack-devel is &lt;0.6-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246238" version="1" comment="libmspack0 is &lt;0.6-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241117" version="1" comment="libncurses6 is &lt;6.1-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241118" version="1" comment="libncurses6-32bit is &lt;6.1-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241120" version="1" comment="ncurses-devel is &lt;6.1-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241121" version="1" comment="ncurses-utils is &lt;6.1-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241122" version="1" comment="tack is &lt;6.1-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241123" version="1" comment="terminfo is &lt;6.1-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241124" version="1" comment="terminfo-base is &lt;6.1-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241125" version="1" comment="terminfo-iterm is &lt;6.1-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241126" version="1" comment="terminfo-screen is &lt;6.1-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246919" version="1" comment="libnetpbm11 is &lt;10.80.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246920" version="1" comment="netpbm is &lt;10.80.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254967" version="1" comment="libnm0 is &lt;1.10.6-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254968" version="1" comment="typelib-1_0-NM-1_0 is &lt;1.10.6-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254969" version="1" comment="liboath-devel is &lt;2.6.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254970" version="1" comment="libopenssl-1_1-devel is &lt;1.1.0i-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254971" version="1" comment="libopenssl1_1 is &lt;1.1.0i-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254972" version="1" comment="libopenssl1_1-32bit is &lt;1.1.0i-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254973" version="1" comment="libopenssl1_1-hmac is &lt;1.1.0i-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254974" version="1" comment="libopenssl1_1-hmac-32bit is &lt;1.1.0i-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254975" version="1" comment="openssl-1_1 is &lt;1.1.0i-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235656" version="1" comment="libopenssl-devel is &lt;1.1.0i-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235661" version="1" comment="openssl is &lt;1.1.0i-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234743" version="1" comment="libpango-1_0-0 is &lt;1.40.14-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234745" version="1" comment="pango-devel is &lt;1.40.14-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234746" version="1" comment="typelib-1_0-Pango-1_0 is &lt;1.40.14-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254976" version="1" comment="libpcsclite1 is &lt;1.8.24-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254977" version="1" comment="libpcscspy0 is &lt;1.8.24-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254978" version="1" comment="pcsc-lite is &lt;1.8.24-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254979" version="1" comment="pcsc-lite-devel is &lt;1.8.24-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242606" version="1" comment="libpolkit0 is &lt;0.114-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242607" version="1" comment="polkit is &lt;0.114-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242608" version="1" comment="polkit-devel is &lt;0.114-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242609" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.114-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254980" version="1" comment="libpq5 is &lt;10.6-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254981" version="1" comment="postgresql10 is &lt;10.6-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251355" version="1" comment="libpython2_7-1_0 is &lt;2.7.14-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251357" version="1" comment="python-base is &lt;2.7.14-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251347" version="1" comment="libpython3_6m1_0 is &lt;3.6.5-3.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251349" version="1" comment="python3-base is &lt;3.6.5-3.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251352" version="1" comment="python3-devel is &lt;3.6.5-3.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251353" version="1" comment="python3-idle is &lt;3.6.5-3.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230698" version="1" comment="libsndfile-devel is &lt;1.0.28-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230699" version="1" comment="libsndfile1 is &lt;1.0.28-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254982" version="1" comment="libsnmp30 is &lt;5.7.3-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254983" version="1" comment="net-snmp is &lt;5.7.3-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254984" version="1" comment="net-snmp-devel is &lt;5.7.3-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254985" version="1" comment="perl-SNMP is &lt;5.7.3-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254986" version="1" comment="snmp-mibs is &lt;5.7.3-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251615" version="1" comment="libsoup-2_4-1 is &lt;2.62.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251616" version="1" comment="libsoup-lang is &lt;2.62.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254987" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.35-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254988" version="1" comment="libspice-client-glib-helper is &lt;0.35-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254989" version="1" comment="libspice-client-gtk-3_0-5 is &lt;0.35-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252787" version="1" comment="libsqlite3-0 is &lt;3.28.0-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252788" version="1" comment="libsqlite3-0-32bit is &lt;3.28.0-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252789" version="1" comment="sqlite3 is &lt;3.28.0-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252790" version="1" comment="sqlite3-devel is &lt;3.28.0-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254990" version="1" comment="libssh-devel is &lt;0.8.4-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254991" version="1" comment="libssh4 is &lt;0.8.4-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254992" version="1" comment="libssh4-32bit is &lt;0.8.4-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252436" version="1" comment="libssh2-1 is &lt;1.8.0-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252437" version="1" comment="libssh2-devel is &lt;1.8.0-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244446" version="1" comment="libsystemd0 is &lt;234-24.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244447" version="1" comment="libsystemd0-32bit is &lt;234-24.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244448" version="1" comment="libudev-devel is &lt;234-24.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244449" version="1" comment="libudev1 is &lt;234-24.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244450" version="1" comment="libudev1-32bit is &lt;234-24.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244451" version="1" comment="systemd is &lt;234-24.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244452" version="1" comment="systemd-32bit is &lt;234-24.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244453" version="1" comment="systemd-bash-completion is &lt;234-24.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244454" version="1" comment="systemd-container is &lt;234-24.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244455" version="1" comment="systemd-coredump is &lt;234-24.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244456" version="1" comment="systemd-devel is &lt;234-24.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244457" version="1" comment="systemd-sysvinit is &lt;234-24.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244458" version="1" comment="udev is &lt;234-24.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252108" version="1" comment="libtasn1 is &lt;4.13-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252109" version="1" comment="libtasn1-6 is &lt;4.13-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252110" version="1" comment="libtasn1-6-32bit is &lt;4.13-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252111" version="1" comment="libtasn1-devel is &lt;4.13-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246387" version="1" comment="libtiff-devel is &lt;4.0.9-5.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246388" version="1" comment="libtiff5 is &lt;4.0.9-5.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237848" version="1" comment="libudisks2-0 is &lt;2.6.5-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237849" version="1" comment="typelib-1_0-UDisks-2_0 is &lt;2.6.5-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237850" version="1" comment="udisks2 is &lt;2.6.5-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237851" version="1" comment="udisks2-devel is &lt;2.6.5-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237852" version="1" comment="udisks2-lang is &lt;2.6.5-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254993" version="1" comment="libunbound2 is &lt;1.6.8-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254994" version="1" comment="unbound-anchor is &lt;1.6.8-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254995" version="1" comment="unbound-devel is &lt;1.6.8-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254996" version="1" comment="libvirt-libs is &lt;5.1.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254997" version="1" comment="libvmtools-devel is &lt;10.3.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254998" version="1" comment="libvmtools0 is &lt;10.3.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254999" version="1" comment="open-vm-tools is &lt;10.3.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229730" version="1" comment="libvorbis-devel is &lt;1.3.6-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229731" version="1" comment="libvorbis0 is &lt;1.3.6-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229732" version="1" comment="libvorbisenc2 is &lt;1.3.6-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229733" version="1" comment="libvorbisfile3 is &lt;1.3.6-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246318" version="1" comment="libwavpack1 is &lt;5.1.0-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251998" version="1" comment="libwireshark9 is &lt;2.4.14-3.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251999" version="1" comment="libwiretap7 is &lt;2.4.14-3.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252000" version="1" comment="libwscodecs1 is &lt;2.4.14-3.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252001" version="1" comment="libwsutil8 is &lt;2.4.14-3.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252002" version="1" comment="wireshark is &lt;2.4.14-3.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255000" version="1" comment="libxcb-composite0 is &lt;1.13-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255001" version="1" comment="libxcb-damage0 is &lt;1.13-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255002" version="1" comment="libxcb-devel is &lt;1.13-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255003" version="1" comment="libxcb-devel-doc is &lt;1.13-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255004" version="1" comment="libxcb-dpms0 is &lt;1.13-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255005" version="1" comment="libxcb-dri2-0 is &lt;1.13-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255006" version="1" comment="libxcb-dri2-0-32bit is &lt;1.13-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255007" version="1" comment="libxcb-dri3-0 is &lt;1.13-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255008" version="1" comment="libxcb-dri3-0-32bit is &lt;1.13-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255009" version="1" comment="libxcb-glx0 is &lt;1.13-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255010" version="1" comment="libxcb-glx0-32bit is &lt;1.13-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255011" version="1" comment="libxcb-present0 is &lt;1.13-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255012" version="1" comment="libxcb-present0-32bit is &lt;1.13-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255013" version="1" comment="libxcb-randr0 is &lt;1.13-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255014" version="1" comment="libxcb-record0 is &lt;1.13-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255015" version="1" comment="libxcb-render0 is &lt;1.13-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255016" version="1" comment="libxcb-res0 is &lt;1.13-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255017" version="1" comment="libxcb-screensaver0 is &lt;1.13-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255018" version="1" comment="libxcb-shape0 is &lt;1.13-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255019" version="1" comment="libxcb-shm0 is &lt;1.13-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255020" version="1" comment="libxcb-sync1 is &lt;1.13-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255021" version="1" comment="libxcb-sync1-32bit is &lt;1.13-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255022" version="1" comment="libxcb-xf86dri0 is &lt;1.13-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255023" version="1" comment="libxcb-xfixes0 is &lt;1.13-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255024" version="1" comment="libxcb-xfixes0-32bit is &lt;1.13-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255025" version="1" comment="libxcb-xinerama0 is &lt;1.13-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255026" version="1" comment="libxcb-xinput0 is &lt;1.13-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255027" version="1" comment="libxcb-xkb1 is &lt;1.13-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255028" version="1" comment="libxcb-xtest0 is &lt;1.13-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255029" version="1" comment="libxcb-xv0 is &lt;1.13-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255030" version="1" comment="libxcb-xvmc0 is &lt;1.13-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255031" version="1" comment="libxcb1 is &lt;1.13-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255032" version="1" comment="libxcb1-32bit is &lt;1.13-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251362" version="1" comment="libxerces-c-3_1 is &lt;3.1.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251363" version="1" comment="libxerces-c-devel is &lt;3.1.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238699" version="1" comment="libxkbcommon-devel is &lt;0.8.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238700" version="1" comment="libxkbcommon-x11-0 is &lt;0.8.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238701" version="1" comment="libxkbcommon-x11-devel is &lt;0.8.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238702" version="1" comment="libxkbcommon0 is &lt;0.8.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255033" version="1" comment="libxml2-2 is &lt;2.9.7-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255034" version="1" comment="libxml2-2-32bit is &lt;2.9.7-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255035" version="1" comment="libxml2-devel is &lt;2.9.7-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255036" version="1" comment="libxml2-tools is &lt;2.9.7-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255037" version="1" comment="libykcs11-1 is &lt;1.6.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255038" version="1" comment="libykcs11-devel is &lt;1.6.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255039" version="1" comment="libykpiv-devel is &lt;1.6.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255040" version="1" comment="libykpiv1 is &lt;1.6.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255041" version="1" comment="yubico-piv-tool is &lt;1.6.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243051" version="1" comment="libzmq5 is &lt;4.2.3-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243053" version="1" comment="zeromq-devel is &lt;4.2.3-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255042" version="1" comment="libzypp is &lt;17.11.4-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255043" version="1" comment="libzypp-devel is &lt;17.11.4-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237389" version="1" comment="libzzip-0-13 is &lt;0.13.69-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251782" version="1" comment="zziplib-devel is &lt;0.13.69-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255044" version="1" comment="logrotate is &lt;3.13.0-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242201" version="1" comment="mozilla-nspr is &lt;4.20-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242202" version="1" comment="mozilla-nspr-32bit is &lt;4.20-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242203" version="1" comment="mozilla-nspr-devel is &lt;4.20-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230777" version="1" comment="mutt is &lt;1.10.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230778" version="1" comment="mutt-doc is &lt;1.10.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230779" version="1" comment="mutt-lang is &lt;1.10.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255045" version="1" comment="opensc is &lt;0.19.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229989" version="1" comment="openslp is &lt;2.0.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229990" version="1" comment="openslp-32bit is &lt;2.0.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229991" version="1" comment="openslp-devel is &lt;2.0.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255046" version="1" comment="openssh is &lt;7.9p1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255047" version="1" comment="openssh-helpers is &lt;7.9p1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229734" version="1" comment="openvpn is &lt;2.4.3-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229735" version="1" comment="openvpn-auth-pam-plugin is &lt;2.4.3-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229736" version="1" comment="openvpn-devel is &lt;2.4.3-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240921" version="1" comment="pam is &lt;1.3.0-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240922" version="1" comment="pam-32bit is &lt;1.3.0-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240923" version="1" comment="pam-devel is &lt;1.3.0-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240924" version="1" comment="pam-doc is &lt;1.3.0-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228717" version="1" comment="patch is &lt;2.7.6-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242032" version="1" comment="perl is &lt;5.26.1-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242033" version="1" comment="perl-base is &lt;5.26.1-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242034" version="1" comment="perl-base-32bit is &lt;5.26.1-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232431" version="1" comment="perl-Archive-Zip is &lt;1.60-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255048" version="1" comment="perl-Mail-SpamAssassin is &lt;3.4.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255049" version="1" comment="spamassassin is &lt;3.4.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255050" version="1" comment="policycoreutils is &lt;2.8-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255051" version="1" comment="policycoreutils-lang is &lt;2.8-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255052" version="1" comment="policycoreutils-newrole is &lt;2.8-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255053" version="1" comment="python3-policycoreutils is &lt;2.8-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255054" version="1" comment="powerpc-utils is &lt;1.3.6-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251356" version="1" comment="python is &lt;2.7.14-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251348" version="1" comment="python3 is &lt;3.6.5-3.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251350" version="1" comment="python3-curses is &lt;3.6.5-3.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251351" version="1" comment="python3-dbm is &lt;3.6.5-3.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251354" version="1" comment="python3-tk is &lt;3.6.5-3.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252945" version="1" comment="python3-Jinja2 is &lt;2.10.1-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238044" version="1" comment="python3-cryptography is &lt;2.1.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255055" version="1" comment="python3-libxml2-python is &lt;2.9.7-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244422" version="1" comment="python3-numpy is &lt;1.14.0-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244423" version="1" comment="python3-numpy-devel is &lt;1.14.0-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255056" version="1" comment="python3-paramiko is &lt;2.4.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255057" version="1" comment="python3-pyOpenSSL is &lt;17.5.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255058" version="1" comment="python3-requests is &lt;2.20.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255059" version="1" comment="python3-salt is &lt;2019.2.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255060" version="1" comment="salt is &lt;2019.2.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255061" version="1" comment="salt-bash-completion is &lt;2019.2.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255062" version="1" comment="salt-doc is &lt;2019.2.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255063" version="1" comment="salt-minion is &lt;2019.2.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255064" version="1" comment="salt-zsh-completion is &lt;2019.2.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255065" version="1" comment="python3-urllib3 is &lt;1.24-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255066" version="1" comment="qemu-tools is &lt;3.1.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255067" version="1" comment="rpcbind is &lt;0.2.3-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255068" version="1" comment="rpm is &lt;4.14.1-10.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255069" version="1" comment="rpm-32bit is &lt;4.14.1-10.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255070" version="1" comment="rpm-devel is &lt;4.14.1-10.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255071" version="1" comment="rsyslog is &lt;8.33.1-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255072" version="1" comment="shadow is &lt;4.6-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255073" version="1" comment="shim is &lt;15+git47-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228980" version="1" comment="socat is &lt;1.7.3.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243342" version="1" comment="subversion is &lt;1.10.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243343" version="1" comment="subversion-devel is &lt;1.10.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255074" version="1" comment="sudo is &lt;1.8.22-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255075" version="1" comment="sudo-devel is &lt;1.8.22-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255076" version="1" comment="supportutils is &lt;3.1.1-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246515" version="1" comment="sysstat is &lt;12.0.2-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247135" version="1" comment="tar is &lt;1.30-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247136" version="1" comment="tar-lang is &lt;1.30-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247137" version="1" comment="tar-rmt is &lt;1.30-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255077" version="1" comment="tboot is &lt;20170711_1.9.8-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241752" version="1" comment="tcpdump is &lt;4.9.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255078" version="1" comment="tpm2.0-tools is &lt;3.1.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255079" version="1" comment="ucode-intel is &lt;20190507-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246118" version="1" comment="unzip is &lt;6.00-4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247134" version="1" comment="wget is &lt;1.19.5-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238252" version="1" comment="wpa_supplicant is &lt;2.6-4.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255080" version="1" comment="xen-libs is &lt;4.12.0_12-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255081" version="1" comment="xen-tools-domU is &lt;4.12.0_12-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255082" version="1" comment="xrdb is &lt;1.1.0-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255083" version="1" comment="xorg-x11-server is &lt;1.20.3-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255084" version="1" comment="xorg-x11-server-extra is &lt;1.20.3-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255085" version="1" comment="yast2-buildtools is &lt;4.1.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255086" version="1" comment="yast2-devtools is &lt;4.1.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255087" version="1" comment="yast2-multipath is &lt;4.1.1-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255088" version="1" comment="yast2-users is &lt;4.1.12-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255089" version="1" comment="yubikey-manager is &lt;2.1.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255090" version="1" comment="zsh is &lt;5.6-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255091" version="1" comment="zypper is &lt;1.14.27-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255092" version="1" comment="zypper-log is &lt;1.14.27-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255093" version="1" comment="zypper-needs-restarting is &lt;1.14.27-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224659" version="1" comment="containerd is &lt;0.2.9+gitr706_06b9cb351610-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224660" version="1" comment="docker-runc is &lt;1.0.0rc4+gitr3338_3f2f8b84a77f-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224661" version="1" comment="sle-module-containers-release is ==15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224662" version="1" comment="docker is &lt;17.09.1_ce-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224663" version="1" comment="docker-bash-completion is &lt;17.09.1_ce-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244974" version="1" comment="containerd is &lt;1.2.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255094" version="1" comment="sle-module-containers-release is ==15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244975" version="1" comment="docker is &lt;18.09.1_ce-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244976" version="1" comment="docker-bash-completion is &lt;18.09.1_ce-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244977" version="1" comment="docker-libnetwork is &lt;0.7.0.1+gitr2711_2cfbf9b1f981-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255095" version="1" comment="docker-runc is &lt;1.0.0rc6+gitr3748_96ec2177ae84-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255096" version="1" comment="runc is &lt;1.0.0~rc6-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255097" version="1" comment="podman is &lt;1.0.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255098" version="1" comment="podman-cni-config is &lt;1.0.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224664" version="1" comment="ImageMagick is &lt;7.0.7.34-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224665" version="1" comment="ImageMagick-devel is &lt;7.0.7.34-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224666" version="1" comment="libMagick++-7_Q16HDRI4 is &lt;7.0.7.34-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224667" version="1" comment="libMagick++-devel is &lt;7.0.7.34-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224668" version="1" comment="libMagickCore-7_Q16HDRI6 is &lt;7.0.7.34-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224669" version="1" comment="libMagickWand-7_Q16HDRI6 is &lt;7.0.7.34-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224670" version="1" comment="sle-module-desktop-applications-release is ==15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224671" version="1" comment="MozillaFirefox is &lt;52.7.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224672" version="1" comment="MozillaFirefox-devel is &lt;52.7.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224673" version="1" comment="MozillaFirefox-translations-common is &lt;52.7.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224674" version="1" comment="MozillaFirefox-translations-other is &lt;52.7.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224675" version="1" comment="NetworkManager is &lt;1.10.6-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224676" version="1" comment="NetworkManager-devel is &lt;1.10.6-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224677" version="1" comment="libnm-glib-vpn1 is &lt;1.10.6-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224678" version="1" comment="libnm-glib4 is &lt;1.10.6-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224679" version="1" comment="libnm-util2 is &lt;1.10.6-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224680" version="1" comment="typelib-1_0-NMClient-1_0 is &lt;1.10.6-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224681" version="1" comment="typelib-1_0-NetworkManager-1_0 is &lt;1.10.6-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224682" version="1" comment="PackageKit is &lt;1.1.10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224683" version="1" comment="PackageKit-backend-zypp is &lt;1.1.10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224684" version="1" comment="PackageKit-devel is &lt;1.1.10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224685" version="1" comment="PackageKit-lang is &lt;1.1.10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224686" version="1" comment="libpackagekit-glib2-18 is &lt;1.1.10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224687" version="1" comment="libpackagekit-glib2-devel is &lt;1.1.10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224688" version="1" comment="typelib-1_0-PackageKitGlib-1_0 is &lt;1.1.10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224689" version="1" comment="accountsservice is &lt;0.6.45-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224690" version="1" comment="accountsservice-devel is &lt;0.6.45-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224691" version="1" comment="accountsservice-lang is &lt;0.6.45-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224692" version="1" comment="libaccountsservice0 is &lt;0.6.45-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224693" version="1" comment="typelib-1_0-AccountsService-1_0 is &lt;0.6.45-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224694" version="1" comment="audiofile-devel is &lt;0.3.6-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224695" version="1" comment="libaudiofile1 is &lt;0.3.6-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009216490" version="1" comment="avahi-autoipd is &lt;0.6.32-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009216494" version="1" comment="libavahi-client3-32bit is &lt;0.6.32-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009216496" version="1" comment="libavahi-common3-32bit is &lt;0.6.32-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224696" version="1" comment="bluez is &lt;5.48-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224697" version="1" comment="bluez-devel is &lt;5.48-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224698" version="1" comment="bubblewrap is &lt;0.2.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224699" version="1" comment="colord-color-profiles is &lt;1.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224700" version="1" comment="libcolord-devel is &lt;1.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224701" version="1" comment="libcolord-gtk-devel is &lt;0.1.26-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224702" version="1" comment="libcolord-gtk1 is &lt;0.1.26-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224703" version="1" comment="libcolorhug2 is &lt;1.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224704" version="1" comment="typelib-1_0-Colord-1_0 is &lt;1.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224705" version="1" comment="typelib-1_0-ColordGtk-1_0 is &lt;0.1.26-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224706" version="1" comment="typelib-1_0-Colorhug-1_0 is &lt;1.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224707" version="1" comment="conky is &lt;1.10.6-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224708" version="1" comment="conky-doc is &lt;1.10.6-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224709" version="1" comment="vim-plugin-conky is &lt;1.10.6-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224710" version="1" comment="cups-pk-helper is &lt;0.2.6-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224711" version="1" comment="cups-pk-helper-lang is &lt;0.2.6-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224712" version="1" comment="emacs-x11 is &lt;25.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224713" version="1" comment="eog is &lt;3.26.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224714" version="1" comment="eog-devel is &lt;3.26.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224715" version="1" comment="eog-lang is &lt;3.26.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224716" version="1" comment="evince is &lt;3.26.0+20180128.1bd86963-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224717" version="1" comment="evince-devel is &lt;3.26.0+20180128.1bd86963-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224718" version="1" comment="evince-lang is &lt;3.26.0+20180128.1bd86963-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224719" version="1" comment="evince-plugin-djvudocument is &lt;3.26.0+20180128.1bd86963-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224720" version="1" comment="evince-plugin-dvidocument is &lt;3.26.0+20180128.1bd86963-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224721" version="1" comment="evince-plugin-pdfdocument is &lt;3.26.0+20180128.1bd86963-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224722" version="1" comment="evince-plugin-psdocument is &lt;3.26.0+20180128.1bd86963-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224723" version="1" comment="evince-plugin-tiffdocument is &lt;3.26.0+20180128.1bd86963-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224724" version="1" comment="evince-plugin-xpsdocument is &lt;3.26.0+20180128.1bd86963-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224725" version="1" comment="libevdocument3-4 is &lt;3.26.0+20180128.1bd86963-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224726" version="1" comment="libevview3-3 is &lt;3.26.0+20180128.1bd86963-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224727" version="1" comment="nautilus-evince is &lt;3.26.0+20180128.1bd86963-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224728" version="1" comment="typelib-1_0-EvinceDocument-3_0 is &lt;3.26.0+20180128.1bd86963-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224729" version="1" comment="typelib-1_0-EvinceView-3_0 is &lt;3.26.0+20180128.1bd86963-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224730" version="1" comment="fetchmailconf is &lt;6.3.26-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224731" version="1" comment="firewall-applet is &lt;0.5.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224732" version="1" comment="firewall-config is &lt;0.5.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224733" version="1" comment="flatpak is &lt;0.10.4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224734" version="1" comment="flatpak-devel is &lt;0.10.4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224735" version="1" comment="libflatpak0 is &lt;0.10.4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224736" version="1" comment="typelib-1_0-Flatpak-1_0 is &lt;0.10.4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224737" version="1" comment="gcab is &lt;1.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224738" version="1" comment="gcab-devel is &lt;1.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224739" version="1" comment="gcab-lang is &lt;1.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224740" version="1" comment="libgcab-1_0-0 is &lt;1.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224741" version="1" comment="typelib-1_0-GCab-1_0 is &lt;1.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224742" version="1" comment="gd is &lt;2.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224743" version="1" comment="gd-devel is &lt;2.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224744" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.36.11-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224745" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.36.11-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224746" version="1" comment="gdm is &lt;3.26.2.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224747" version="1" comment="gdm-devel is &lt;3.26.2.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224748" version="1" comment="gdm-lang is &lt;3.26.2.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224749" version="1" comment="gdmflexiserver is &lt;3.26.2.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224750" version="1" comment="libgdm1 is &lt;3.26.2.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224751" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.26.2.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224752" version="1" comment="gnome-keyring is &lt;3.20.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224753" version="1" comment="gnome-keyring-32bit is &lt;3.20.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224754" version="1" comment="gnome-keyring-lang is &lt;3.20.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224755" version="1" comment="gnome-keyring-pam is &lt;3.20.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224756" version="1" comment="gnome-keyring-pam-32bit is &lt;3.20.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224757" version="1" comment="libgck-modules-gnome-keyring is &lt;3.20.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224758" version="1" comment="gnome-online-accounts-devel is &lt;3.26.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224759" version="1" comment="libgoa-1_0-0 is &lt;3.26.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224760" version="1" comment="libgoa-backend-1_0-1 is &lt;3.26.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224761" version="1" comment="typelib-1_0-Goa-1_0 is &lt;3.26.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224762" version="1" comment="gnome-settings-daemon is &lt;3.26.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224763" version="1" comment="gnome-settings-daemon-devel is &lt;3.26.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224764" version="1" comment="gnome-settings-daemon-lang is &lt;3.26.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224765" version="1" comment="gnome-shell is &lt;3.26.2+20180130.0d9c74212-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224766" version="1" comment="gnome-shell-devel is &lt;3.26.2+20180130.0d9c74212-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224767" version="1" comment="gnome-shell-lang is &lt;3.26.2+20180130.0d9c74212-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224768" version="1" comment="gstreamer-devel is &lt;1.12.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224769" version="1" comment="gstreamer-utils is &lt;1.12.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224770" version="1" comment="typelib-1_0-Gst-1_0 is &lt;1.12.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224771" version="1" comment="gstreamer-plugins-bad is &lt;1.12.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224772" version="1" comment="gstreamer-plugins-bad-devel is &lt;1.12.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224773" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.12.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224774" version="1" comment="libgstadaptivedemux-1_0-0 is &lt;1.12.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224775" version="1" comment="libgstbadallocators-1_0-0 is &lt;1.12.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224776" version="1" comment="libgstbadaudio-1_0-0 is &lt;1.12.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224777" version="1" comment="libgstbadbase-1_0-0 is &lt;1.12.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224778" version="1" comment="libgstbadvideo-1_0-0 is &lt;1.12.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224779" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.12.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224780" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.12.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224781" version="1" comment="libgstinsertbin-1_0-0 is &lt;1.12.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224782" version="1" comment="libgstmpegts-1_0-0 is &lt;1.12.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224783" version="1" comment="libgstplayer-1_0-0 is &lt;1.12.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224784" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.12.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224785" version="1" comment="libgstwayland-1_0-0 is &lt;1.12.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224786" version="1" comment="typelib-1_0-GstBadAllocators-1_0 is &lt;1.12.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224787" version="1" comment="typelib-1_0-GstGL-1_0 is &lt;1.12.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224788" version="1" comment="typelib-1_0-GstInsertBin-1_0 is &lt;1.12.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224789" version="1" comment="typelib-1_0-GstMpegts-1_0 is &lt;1.12.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224790" version="1" comment="typelib-1_0-GstPlayer-1_0 is &lt;1.12.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224791" version="1" comment="gtk2-data is &lt;2.24.32-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224792" version="1" comment="gtk2-tools-32bit is &lt;2.24.32-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224793" version="1" comment="libgtk-2_0-0-32bit is &lt;2.24.32-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224794" version="1" comment="gvim is &lt;8.0.1568-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224795" version="1" comment="hplip is &lt;3.17.9-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224796" version="1" comment="ibus-chewing is &lt;1.4.14-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224797" version="1" comment="ibus-pinyin is &lt;1.5.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224798" version="1" comment="libICE6-32bit is &lt;1.0.9-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224799" version="1" comment="libIlmImf-2_2-23 is &lt;2.2.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224800" version="1" comment="libIlmImfUtil-2_2-23 is &lt;2.2.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224801" version="1" comment="openexr-devel is &lt;2.2.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224802" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.9.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224803" version="1" comment="libQt5Sql5-mysql is &lt;5.9.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224804" version="1" comment="libQt5Sql5-postgresql is &lt;5.9.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224805" version="1" comment="libQt5Sql5-unixODBC is &lt;5.9.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224806" version="1" comment="libqt5-qtbase-platformtheme-gtk3 is &lt;5.9.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224807" version="1" comment="libSDL2-2_0-0 is &lt;2.0.8-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224808" version="1" comment="libSDL2-devel is &lt;2.0.8-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224809" version="1" comment="libXcursor1-32bit is &lt;1.1.15-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224810" version="1" comment="libXi6-32bit is &lt;1.7.9-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224811" version="1" comment="libXinerama1-32bit is &lt;1.1.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224812" version="1" comment="libXp6-32bit is &lt;1.0.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224813" version="1" comment="libXrandr2-32bit is &lt;1.5.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224814" version="1" comment="libXt6-32bit is &lt;1.1.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224815" version="1" comment="libXvnc-devel is &lt;1.8.0-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224816" version="1" comment="libass-devel is &lt;0.14.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224817" version="1" comment="libass9 is &lt;0.14.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224818" version="1" comment="libavcodec57 is &lt;3.4.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224819" version="1" comment="libavutil-devel is &lt;3.4.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224820" version="1" comment="libavutil55 is &lt;3.4.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224821" version="1" comment="libpostproc-devel is &lt;3.4.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224822" version="1" comment="libpostproc54 is &lt;3.4.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224823" version="1" comment="libswresample-devel is &lt;3.4.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224824" version="1" comment="libswresample2 is &lt;3.4.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224825" version="1" comment="libswscale-devel is &lt;3.4.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224826" version="1" comment="libswscale4 is &lt;3.4.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224827" version="1" comment="libcairo2-32bit is &lt;1.15.10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224828" version="1" comment="libcdio++0 is &lt;0.94-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224829" version="1" comment="libcdio-devel is &lt;0.94-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224830" version="1" comment="libcdio16 is &lt;0.94-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224831" version="1" comment="libiso9660-10 is &lt;0.94-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224832" version="1" comment="libudf0 is &lt;0.94-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224833" version="1" comment="libcups2-32bit is &lt;2.2.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224834" version="1" comment="libexempi-devel is &lt;2.4.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224835" version="1" comment="libexempi3 is &lt;2.4.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224836" version="1" comment="libexif-devel is &lt;0.6.21-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224837" version="1" comment="libexif12 is &lt;0.6.21-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224838" version="1" comment="libexiv2-26 is &lt;0.26-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224839" version="1" comment="libexiv2-devel is &lt;0.26-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224840" version="1" comment="libgme-devel is &lt;0.6.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224841" version="1" comment="libgme0 is &lt;0.6.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224842" version="1" comment="libgnomesu is &lt;2.0.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224843" version="1" comment="libgnomesu-devel is &lt;2.0.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224844" version="1" comment="libgnomesu-lang is &lt;2.0.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224845" version="1" comment="libgnomesu0 is &lt;2.0.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224846" version="1" comment="libgnutls30-32bit is &lt;3.6.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224847" version="1" comment="libgypsy-devel is &lt;0.9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224848" version="1" comment="libgypsy0 is &lt;0.9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224849" version="1" comment="libhogweed4-32bit is &lt;3.4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224850" version="1" comment="libnettle6-32bit is &lt;3.4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224851" version="1" comment="libical-devel is &lt;2.0.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224852" version="1" comment="libimobiledevice-devel is &lt;1.2.0+git20170122.45fda81-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224853" version="1" comment="libimobiledevice6 is &lt;1.2.0+git20170122.45fda81-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224854" version="1" comment="libjasper-devel is &lt;2.0.14-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224855" version="1" comment="libjbig2-32bit is &lt;2.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224856" version="1" comment="libjpeg8-32bit is &lt;8.1.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224857" version="1" comment="libkpathsea6 is &lt;6.2.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224858" version="1" comment="libptexenc1 is &lt;1.3.5-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224859" version="1" comment="libsynctex1 is &lt;1.18-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224860" version="1" comment="libtexlua52-5 is &lt;5.2.4-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224861" version="1" comment="libtexluajit2 is &lt;2.1.0beta2-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224862" version="1" comment="perl-biber is &lt;2017.20170520.svn30357-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224863" version="1" comment="texlive is &lt;2017.20170520-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224864" version="1" comment="texlive-12many is &lt;2017.133.0.0.3svn15878-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224865" version="1" comment="texlive-2up is &lt;2017.133.1.2svn41578-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224866" version="1" comment="texlive-Asana-Math is &lt;2017.133.0.000.955svn37556-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224867" version="1" comment="texlive-Asana-Math-fonts is &lt;2017.133.0.000.955svn37556-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224868" version="1" comment="texlive-ESIEEcv is &lt;2017.133.svn15878-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224869" version="1" comment="texlive-FAQ-en is &lt;2017.133.3.28svn34303-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224870" version="1" comment="texlive-GS1 is &lt;2017.133.15svn27540-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224871" version="1" comment="texlive-HA-prosper is &lt;2017.133.4.21svn15878-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224872" version="1" comment="texlive-IEEEconf is &lt;2017.133.1.4svn15878-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224873" version="1" comment="texlive-IEEEtran is &lt;2017.133.1.8bsvn38238-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224874" version="1" comment="texlive-MemoirChapStyles is &lt;2017.133.1.7esvn25918-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224875" version="1" comment="texlive-SIstyle is &lt;2017.133.2.3asvn15878-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224876" version="1" comment="texlive-SIunits is &lt;2017.133.1.36svn15878-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224877" version="1" comment="texlive-Tabbing is &lt;2017.133.svn17022-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224878" version="1" comment="texlive-Type1fonts is &lt;2017.133.2.14svn19603-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224879" version="1" comment="texlive-a0poster is &lt;2017.133.1.22bsvn15878-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224880" version="1" comment="texlive-a2ping is &lt;2017.133.svn29725-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224881" version="1" comment="texlive-a2ping-bin is &lt;2017.20170520.svn27321-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224882" version="1" comment="texlive-a4wide is &lt;2017.133.svn20943-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224883" version="1" comment="texlive-a5comb is &lt;2017.133.4svn17020-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224884" version="1" comment="texlive-aastex is &lt;2017.133.6.0svn39929-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224885" version="1" comment="texlive-abbr is &lt;2017.133.svn15878-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224886" version="1" comment="texlive-abc is &lt;2017.133.2.0bsvn41157-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224887" version="1" comment="texlive-abntex2 is &lt;2017.133.1.9.6svn39913-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224888" version="1" comment="texlive-abraces is &lt;2017.133.1._svn27880-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224889" version="1" comment="texlive-abstract is &lt;2017.133.1.2asvn15878-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224890" version="1" comment="texlive-abstyles is &lt;2017.133.svn15878-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224891" version="1" comment="texlive-academicons is &lt;2017.133.1.8.0svn44380-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224892" version="1" comment="texlive-academicons-fonts is &lt;2017.133.1.8.0svn44380-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224893" version="1" comment="texlive-accanthis is &lt;2017.133.svn32089-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224894" version="1" comment="texlive-accanthis-fonts is &lt;2017.133.svn32089-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224895" version="1" comment="texlive-accfonts is &lt;2017.133.0.0.25svn18835-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224896" version="1" comment="texlive-accfonts-bin is &lt;2017.20170520.svn12688-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224897" version="1" comment="texlive-achemso is &lt;2017.133.3.10isvn44425-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224898" version="1" comment="texlive-acmart is &lt;2017.133.1.39svn44367-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224899" version="1" comment="texlive-acmconf is &lt;2017.133.1.3svn15878-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224900" version="1" comment="texlive-acro is &lt;2017.133.2.7asvn43186-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224901" version="1" comment="texlive-acronym is &lt;2017.133.1.41svn36582-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224902" version="1" comment="texlive-acroterm is &lt;2017.133.0.0.1svn20498-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224903" version="1" comment="texlive-active-conf is &lt;2017.133.0.0.3asvn15878-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224904" version="1" comment="texlive-actuarialangle is &lt;2017.133.2.0svn43751-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224905" version="1" comment="texlive-actuarialsymbol is &lt;2017.133.1.0svn43768-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224906" version="1" comment="texlive-addfont is &lt;2017.133.1svn41972-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224907" version="1" comment="texlive-addlines is &lt;2017.133.0.0.2asvn37805-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224908" version="1" comment="texlive-adfathesis is &lt;2017.133.2.42svn26048-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224909" version="1" comment="texlive-adforn is &lt;2017.133.1.001_b_2svn20019-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224910" version="1" comment="texlive-adforn-fonts is &lt;2017.133.1.001_b_2svn20019-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224911" version="1" comment="texlive-adfsymbols is &lt;2017.133.1.001svn19766-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224912" version="1" comment="texlive-adfsymbols-fonts is &lt;2017.133.1.001svn19766-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224913" version="1" comment="texlive-adhocfilelist is &lt;2017.133.svn29349-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224914" version="1" comment="texlive-adhocfilelist-bin is &lt;2017.20170520.svn28038-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224915" version="1" comment="texlive-adjmulticol is &lt;2017.133.1.1svn28936-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224916" version="1" comment="texlive-adjustbox is &lt;2017.133.1.0svn26555-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224917" version="1" comment="texlive-adobemapping is &lt;2017.133.svn44085-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224918" version="1" comment="texlive-adrconv is &lt;2017.133.1.3svn17683-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224919" version="1" comment="texlive-adtrees is &lt;2017.133.1.0svn39438-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224920" version="1" comment="texlive-advdate is &lt;2017.133.svn20538-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224921" version="1" comment="texlive-ae is &lt;2017.133.1.4svn15878-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224922" version="1" comment="texlive-aecc is &lt;2017.133.1.0svn28574-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224923" version="1" comment="texlive-aeguill is &lt;2017.133.svn15878-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224924" version="1" comment="texlive-afm2pl is &lt;2017.133.svn44166-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224925" version="1" comment="texlive-afm2pl-bin is &lt;2017.20170520.svn44143-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224926" version="1" comment="texlive-afparticle is &lt;2017.133.1.3svn35900-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224927" version="1" comment="texlive-afthesis is &lt;2017.133.2.7svn15878-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224928" version="1" comment="texlive-aguplus is &lt;2017.133.1.6bsvn17156-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224929" version="1" comment="texlive-aiaa is &lt;2017.133.3.6svn15878-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224930" version="1" comment="texlive-aichej is &lt;2017.133.svn15878-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224931" version="1" comment="texlive-ajl is &lt;2017.133.svn34016-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224932" version="1" comment="texlive-akktex is &lt;2017.133.0.0.3.2svn26055-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224933" version="1" comment="texlive-akletter is &lt;2017.133.1.5isvn15878-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224934" version="1" comment="texlive-alegreya is &lt;2017.133.svn42077-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224935" version="1" comment="texlive-alegreya-fonts is &lt;2017.133.svn42077-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224936" version="1" comment="texlive-aleph is &lt;2017.133.svn44166-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224937" version="1" comment="texlive-aleph-bin is &lt;2017.20170520.svn44143-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224938" version="1" comment="texlive-alertmessage is &lt;2017.133.1.1svn38055-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224939" version="1" comment="texlive-alg is &lt;2017.133.svn15878-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224940" version="1" comment="texlive-algorithm2e is &lt;2017.133.5.1svn38805-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224941" version="1" comment="texlive-algorithmicx is &lt;2017.133.svn15878-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224942" version="1" comment="texlive-algorithms is &lt;2017.133.0.0.1svn42428-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224943" version="1" comment="texlive-alkalami is &lt;2017.133.1.000svn44497-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224944" version="1" comment="texlive-alkalami-fonts is &lt;2017.133.1.000svn44497-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224945" version="1" comment="texlive-allrunes is &lt;2017.133.2.1.1svn42221-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224946" version="1" comment="texlive-allrunes-fonts is &lt;2017.133.2.1.1svn42221-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224947" version="1" comment="texlive-almfixed is &lt;2017.133.0.0.92svn35065-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224948" version="1" comment="texlive-almfixed-fonts is &lt;2017.133.0.0.92svn35065-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224949" version="1" comment="texlive-alnumsec is &lt;2017.133.0.0.03svn15878-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224950" version="1" comment="texlive-alterqcm is &lt;2017.133.3.7csvn23385-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224951" version="1" comment="texlive-altfont is &lt;2017.133.1.1svn15878-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224952" version="1" comment="texlive-ametsoc is &lt;2017.133.4.3.2svn36030-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224953" version="1" comment="texlive-amiri is &lt;2017.133.0.0.109svn44303-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224954" version="1" comment="texlive-amiri-fonts is &lt;2017.133.0.0.109svn44303-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224955" version="1" comment="texlive-amsaddr is &lt;2017.133.1.1svn29630-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224956" version="1" comment="texlive-amscls is &lt;2017.133.svn36804-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224957" version="1" comment="texlive-amsfonts is &lt;2017.133.3.04svn29208-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224958" version="1" comment="texlive-amsfonts-fonts is &lt;2017.133.3.04svn29208-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224959" version="1" comment="texlive-amslatex-primer is &lt;2017.133.2.3svn28980-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224960" version="1" comment="texlive-amsldoc-it is &lt;2017.133.svn15878-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224961" version="1" comment="texlive-amsldoc-vn is &lt;2017.133.2.0svn21855-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224962" version="1" comment="texlive-amsmath is &lt;2017.133.svn43813-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224963" version="1" comment="texlive-amsmath-it is &lt;2017.133.svn22930-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224964" version="1" comment="texlive-amsrefs is &lt;2017.133.2.14svn30646-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224965" version="1" comment="texlive-amstex is &lt;2017.133.2.2svn44166-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224966" version="1" comment="texlive-amstex-bin is &lt;2017.20170520.svn3006-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224967" version="1" comment="texlive-amsthdoc-it is &lt;2017.133.svn15878-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224968" version="1" comment="texlive-animate is &lt;2017.133.svn44410-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224969" version="1" comment="texlive-anonchap is &lt;2017.133.1.1asvn17049-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224970" version="1" comment="texlive-anonymouspro is &lt;2017.133.2.1svn33441-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224971" version="1" comment="texlive-anonymouspro-fonts is &lt;2017.133.2.1svn33441-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224972" version="1" comment="texlive-answers is &lt;2017.133.2.16svn35032-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224973" version="1" comment="texlive-antiqua is &lt;2017.133.001.003svn24266-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224974" version="1" comment="texlive-antiqua-fonts is &lt;2017.133.001.003svn24266-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224975" version="1" comment="texlive-antomega is &lt;2017.133.0.0.8svn21933-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224976" version="1" comment="texlive-antt is &lt;2017.133.2.08svn18651-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224977" version="1" comment="texlive-antt-fonts is &lt;2017.133.2.08svn18651-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224978" version="1" comment="texlive-anufinalexam is &lt;2017.133.svn26053-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224979" version="1" comment="texlive-anyfontsize is &lt;2017.133.svn17050-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224980" version="1" comment="texlive-anysize is &lt;2017.133.svn15878-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224981" version="1" comment="texlive-aobs-tikz is &lt;2017.133.1.0svn32662-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224982" version="1" comment="texlive-aomart is &lt;2017.133.1.20svn44282-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224983" version="1" comment="texlive-apa is &lt;2017.133.1.3.4svn42428-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224984" version="1" comment="texlive-apa6 is &lt;2017.133.2.31svn44477-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224985" version="1" comment="texlive-apa6e is &lt;2017.133.0.0.3svn23350-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224986" version="1" comment="texlive-apacite is &lt;2017.133.6.03svn31264-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224987" version="1" comment="texlive-apalike-german is &lt;2017.133.svn42045-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224988" version="1" comment="texlive-apalike2 is &lt;2017.133.svn15878-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224989" version="1" comment="texlive-apnum is &lt;2017.133.1.6svn39710-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224990" version="1" comment="texlive-appendix is &lt;2017.133.1.2bsvn42428-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224991" version="1" comment="texlive-appendixnumberbeamer is &lt;2017.133.svn40322-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224992" version="1" comment="texlive-apprends-latex is &lt;2017.133.4.02svn19306-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224993" version="1" comment="texlive-apptools is &lt;2017.133.1.0svn28400-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224994" version="1" comment="texlive-apxproof is &lt;2017.133.1.0.5svn44478-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224995" version="1" comment="texlive-arabi is &lt;2017.133.1.1svn25095-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224996" version="1" comment="texlive-arabi-add is &lt;2017.133.1.0svn37709-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224997" version="1" comment="texlive-arabi-fonts is &lt;2017.133.1.1svn25095-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224998" version="1" comment="texlive-arabluatex is &lt;2017.133.1.8.4svn44241-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009224999" version="1" comment="texlive-arabtex is &lt;2017.133.3.17svn25711-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225000" version="1" comment="texlive-arabtex-fonts is &lt;2017.133.3.17svn25711-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225001" version="1" comment="texlive-arabxetex is &lt;2017.133.1.2.1svn38299-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225002" version="1" comment="texlive-aramaic-serto is &lt;2017.133.1.0svn30042-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225003" version="1" comment="texlive-aramaic-serto-fonts is &lt;2017.133.1.0svn30042-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225004" version="1" comment="texlive-arara is &lt;2017.133.3.0svn29762-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225005" version="1" comment="texlive-arara-bin is &lt;2017.20170520.svn29036-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225006" version="1" comment="texlive-archaeologie is &lt;2017.133.2.31svn44484-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225007" version="1" comment="texlive-archaic is &lt;2017.133.svn38005-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225008" version="1" comment="texlive-archaic-fonts is &lt;2017.133.svn38005-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225009" version="1" comment="texlive-arcs is &lt;2017.133.1svn15878-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225010" version="1" comment="texlive-arev is &lt;2017.133.svn15878-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225011" version="1" comment="texlive-arev-fonts is &lt;2017.133.svn15878-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225012" version="1" comment="texlive-arimo is &lt;2017.133.svn42880-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225013" version="1" comment="texlive-arimo-fonts is &lt;2017.133.svn42880-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225014" version="1" comment="texlive-armtex is &lt;2017.133.3.0_beta3svn33894-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225015" version="1" comment="texlive-armtex-fonts is &lt;2017.133.3.0_beta3svn33894-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225016" version="1" comment="texlive-around-the-bend is &lt;2017.135.svn15878-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225017" version="1" comment="texlive-arphic is &lt;2017.135.svn15878-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225018" version="1" comment="texlive-arphic-fonts is &lt;2017.135.svn15878-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225019" version="1" comment="texlive-arphic-ttf is &lt;2017.135.svn42675-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225020" version="1" comment="texlive-arphic-ttf-fonts is &lt;2017.135.svn42675-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225021" version="1" comment="texlive-arrayjobx is &lt;2017.135.1.04svn18125-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225022" version="1" comment="texlive-arraysort is &lt;2017.135.1.0svn31576-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225023" version="1" comment="texlive-arsclassica is &lt;2017.135.march_2017svn43509-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225024" version="1" comment="texlive-articleingud is &lt;2017.135.0.0.3svn38741-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225025" version="1" comment="texlive-arydshln is &lt;2017.135.1.73svn40847-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225026" version="1" comment="texlive-asaetr is &lt;2017.135.1.0asvn15878-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225027" version="1" comment="texlive-asapsym is &lt;2017.135.1.0svn40201-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225028" version="1" comment="texlive-asapsym-fonts is &lt;2017.135.1.0svn40201-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225029" version="1" comment="texlive-ascelike is &lt;2017.135.2.3svn29129-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225030" version="1" comment="texlive-ascii-chart is &lt;2017.135.svn20536-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225031" version="1" comment="texlive-ascii-font is &lt;2017.135.2.0svn29989-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225032" version="1" comment="texlive-ascii-font-fonts is &lt;2017.135.2.0svn29989-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225033" version="1" comment="texlive-asciilist is &lt;2017.135.2.2svn41158-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225034" version="1" comment="texlive-askmaps is &lt;2017.135.0.0.1svn32320-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225035" version="1" comment="texlive-aspectratio is &lt;2017.135.2.0svn25243-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225036" version="1" comment="texlive-aspectratio-fonts is &lt;2017.135.2.0svn25243-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225037" version="1" comment="texlive-assignment is &lt;2017.135.svn20431-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225038" version="1" comment="texlive-assoccnt is &lt;2017.135.0.0.8svn38497-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225039" version="1" comment="texlive-astro is &lt;2017.135.2.20svn15878-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225040" version="1" comment="texlive-asyfig is &lt;2017.135.0.0.1csvn17512-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225041" version="1" comment="texlive-asymptote is &lt;2017.135.2.41svn43843-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225042" version="1" comment="texlive-asymptote-bin is &lt;2017.20170520.svn43843-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225043" version="1" comment="texlive-asymptote-by-example-zh-cn is &lt;2017.135.svn15878-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225044" version="1" comment="texlive-asymptote-faq-zh-cn is &lt;2017.135.svn15878-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225045" version="1" comment="texlive-asymptote-manual-zh-cn is &lt;2017.135.svn15878-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225046" version="1" comment="texlive-asypictureb is &lt;2017.135.0.0.3svn33490-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225047" version="1" comment="texlive-attachfile is &lt;2017.135.1.9svn42099-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225048" version="1" comment="texlive-aucklandthesis is &lt;2017.135.svn41506-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225049" version="1" comment="texlive-augie is &lt;2017.135.svn18948-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225050" version="1" comment="texlive-augie-fonts is &lt;2017.135.svn18948-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225051" version="1" comment="texlive-auncial-new is &lt;2017.135.2.0svn15878-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225052" version="1" comment="texlive-auncial-new-fonts is &lt;2017.135.2.0svn15878-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225053" version="1" comment="texlive-aurical is &lt;2017.135.1.5svn15878-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225054" version="1" comment="texlive-aurical-fonts is &lt;2017.135.1.5svn15878-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225055" version="1" comment="texlive-aurl is &lt;2017.135.svn41853-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225056" version="1" comment="texlive-authoraftertitle is &lt;2017.135.0.0.9svn24863-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225057" version="1" comment="texlive-authorindex is &lt;2017.135.svn26313-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225058" version="1" comment="texlive-authorindex-bin is &lt;2017.20170520.svn18790-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225059" version="1" comment="texlive-auto-pst-pdf is &lt;2017.135.0.0.6svn23723-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225060" version="1" comment="texlive-autoaligne is &lt;2017.135.1.3svn43195-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225061" version="1" comment="texlive-autoarea is &lt;2017.135.0.0.3asvn15878-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225062" version="1" comment="texlive-autobreak is &lt;2017.135.0.0.3svn43337-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225063" version="1" comment="texlive-automata is &lt;2017.135.0.0.3svn19717-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225064" version="1" comment="texlive-autonum is &lt;2017.135.0.0.3.11svn36084-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225065" version="1" comment="texlive-autopdf is &lt;2017.135.1.1svn32377-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225066" version="1" comment="texlive-autosp is &lt;2017.135.svn44166-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225067" version="1" comment="texlive-autosp-bin is &lt;2017.20170520.svn44143-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225068" version="1" comment="texlive-avantgar is &lt;2017.135.svn31835-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225069" version="1" comment="texlive-avantgar-fonts is &lt;2017.135.svn31835-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225070" version="1" comment="texlive-avremu is &lt;2017.135.0.0.1svn35373-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225071" version="1" comment="texlive-awesomebox is &lt;2017.135.0.0.1svn44131-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225072" version="1" comment="texlive-axodraw2 is &lt;2017.135.2.1.0bsvn44396-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225073" version="1" comment="texlive-b1encoding is &lt;2017.135.1.0svn21271-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225074" version="1" comment="texlive-babel is &lt;2017.135.3.10svn44427-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225075" version="1" comment="texlive-babel-albanian is &lt;2017.135.1.0csvn30254-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225076" version="1" comment="texlive-babel-azerbaijani is &lt;2017.135.1.0asvn44197-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225077" version="1" comment="texlive-babel-basque is &lt;2017.135.1.0fsvn30256-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225078" version="1" comment="texlive-babel-belarusian is &lt;2017.135.1.3hsvn40636-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225079" version="1" comment="texlive-babel-bosnian is &lt;2017.135.1.1svn38174-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225080" version="1" comment="texlive-babel-breton is &lt;2017.135.1.0hsvn30257-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225081" version="1" comment="texlive-babel-bulgarian is &lt;2017.135.1.2gsvn31902-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225082" version="1" comment="texlive-babel-catalan is &lt;2017.135.2.2psvn30259-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225083" version="1" comment="texlive-babel-croatian is &lt;2017.135.1.3lsvn35198-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225084" version="1" comment="texlive-babel-czech is &lt;2017.135.3.1asvn30261-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225085" version="1" comment="texlive-babel-danish is &lt;2017.135.1.3rsvn30262-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225086" version="1" comment="texlive-babel-dutch is &lt;2017.135.3.8isvn30263-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225087" version="1" comment="texlive-babel-english is &lt;2017.135.3.3qsvn44495-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225088" version="1" comment="texlive-babel-esperanto is &lt;2017.135.1.4tsvn30265-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225089" version="1" comment="texlive-babel-estonian is &lt;2017.135.1.1asvn38064-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225090" version="1" comment="texlive-babel-finnish is &lt;2017.135.1.3qsvn30267-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225091" version="1" comment="texlive-babel-french is &lt;2017.135.3.3asvn44270-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225092" version="1" comment="texlive-babel-friulan is &lt;2017.135.1.3svn39861-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225093" version="1" comment="texlive-babel-galician is &lt;2017.135.4.3csvn30270-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225094" version="1" comment="texlive-babel-georgian is &lt;2017.135.2.1svn33527-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225095" version="1" comment="texlive-babel-german is &lt;2017.135.2.9svn42424-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225096" version="1" comment="texlive-babel-greek is &lt;2017.135.1.9gsvn42010-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225097" version="1" comment="texlive-babel-hebrew is &lt;2017.135.2.3hsvn30273-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225098" version="1" comment="texlive-babel-hungarian is &lt;2017.135.1.5csvn41435-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225099" version="1" comment="texlive-babel-icelandic is &lt;2017.135.1.2bsvn39387-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225100" version="1" comment="texlive-babel-indonesian is &lt;2017.135.1.0msvn43235-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225101" version="1" comment="texlive-babel-interlingua is &lt;2017.135.1.6svn30276-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225102" version="1" comment="texlive-babel-irish is &lt;2017.135.1.0hsvn30277-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225103" version="1" comment="texlive-babel-italian is &lt;2017.135.1.3nsvn36645-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225104" version="1" comment="texlive-babel-japanese is &lt;2017.135.2.1svn43145-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225105" version="1" comment="texlive-babel-kurmanji is &lt;2017.135.1.1svn30279-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225106" version="1" comment="texlive-babel-latin is &lt;2017.135.3.5svn38173-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225107" version="1" comment="texlive-babel-latvian is &lt;2017.135.2.0asvn34377-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225108" version="1" comment="texlive-babel-macedonian is &lt;2017.135.svn39587-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225109" version="1" comment="texlive-babel-malay is &lt;2017.135.1.0msvn43234-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225110" version="1" comment="texlive-babel-norsk is &lt;2017.135.2.0isvn30281-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225111" version="1" comment="texlive-babel-occitan is &lt;2017.135.0.0.2svn39608-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225112" version="1" comment="texlive-babel-piedmontese is &lt;2017.135.1.0svn30282-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225113" version="1" comment="texlive-babel-polish is &lt;2017.135.1.2lsvn30283-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225114" version="1" comment="texlive-babel-portuges is &lt;2017.135.1.2qsvn30284-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225115" version="1" comment="texlive-babel-romanian is &lt;2017.135.1.2lsvn30285-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225116" version="1" comment="texlive-babel-romansh is &lt;2017.135.svn30286-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225117" version="1" comment="texlive-babel-russian is &lt;2017.135.1.3isvn42885-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225118" version="1" comment="texlive-babel-samin is &lt;2017.135.1.0csvn30288-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225119" version="1" comment="texlive-babel-scottish is &lt;2017.135.1.0gsvn30289-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225120" version="1" comment="texlive-babel-serbian is &lt;2017.135.1.0dsvn30290-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225121" version="1" comment="texlive-babel-serbianc is &lt;2017.135.2.2svn30348-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225122" version="1" comment="texlive-babel-slovak is &lt;2017.135.3.1asvn30292-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225123" version="1" comment="texlive-babel-slovenian is &lt;2017.135.1.2isvn30351-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225124" version="1" comment="texlive-babel-sorbian is &lt;2017.135.lower_sorbian_1.0g._upper_1.0ksvn30294-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225125" version="1" comment="texlive-babel-spanglish is &lt;2017.135.0.0.3svn37629-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225126" version="1" comment="texlive-babel-spanish is &lt;2017.135.5.0psvn39920-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225127" version="1" comment="texlive-babel-swedish is &lt;2017.135.2.3dsvn30296-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225128" version="1" comment="texlive-babel-thai is &lt;2017.135.1.0.0svn30564-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225129" version="1" comment="texlive-babel-turkish is &lt;2017.135.1.3bsvn33284-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225130" version="1" comment="texlive-babel-ukrainian is &lt;2017.135.1.4svn44550-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225131" version="1" comment="texlive-babel-vietnamese is &lt;2017.135.1.4svn39246-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225132" version="1" comment="texlive-babel-welsh is &lt;2017.135.1.1asvn38372-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225133" version="1" comment="texlive-babelbib is &lt;2017.135.1.31svn25245-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225134" version="1" comment="texlive-background is &lt;2017.135.2.1svn42428-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225135" version="1" comment="texlive-backnaur is &lt;2017.135.1.1svn28513-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225136" version="1" comment="texlive-baekmuk is &lt;2017.135.2.2svn42106-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225137" version="1" comment="texlive-baekmuk-fonts is &lt;2017.135.2.2svn42106-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225138" version="1" comment="texlive-bagpipe is &lt;2017.135.3.02svn34393-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225139" version="1" comment="texlive-bangorcsthesis is &lt;2017.135.1.5.1svn41919-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225140" version="1" comment="texlive-bangorexam is &lt;2017.135.1.2.0svn43500-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225141" version="1" comment="texlive-bangtex is &lt;2017.135.svn15878-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225142" version="1" comment="texlive-bankstatement is &lt;2017.135.0.0.9.2svn38857-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225143" version="1" comment="texlive-barcodes is &lt;2017.135.svn15878-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225144" version="1" comment="texlive-bardiag is &lt;2017.135.0.0.4asvn22013-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225145" version="1" comment="texlive-barr is &lt;2017.135.svn38479-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225146" version="1" comment="texlive-bartel-chess-fonts is &lt;2017.135.svn20619-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225147" version="1" comment="texlive-bashful is &lt;2017.135.0.0.93svn25597-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225148" version="1" comment="texlive-basicarith is &lt;2017.135.1.1svn35460-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225149" version="1" comment="texlive-baskervald is &lt;2017.135.1.016svn19490-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225150" version="1" comment="texlive-baskervald-fonts is &lt;2017.135.1.016svn19490-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225151" version="1" comment="texlive-baskervaldx is &lt;2017.135.1.072svn43461-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225152" version="1" comment="texlive-baskervaldx-fonts is &lt;2017.135.1.072svn43461-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225153" version="1" comment="texlive-baskervillef is &lt;2017.135.1.043svn43484-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225154" version="1" comment="texlive-baskervillef-fonts is &lt;2017.135.1.043svn43484-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225155" version="1" comment="texlive-basque-book is &lt;2017.135.1.20svn32924-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225156" version="1" comment="texlive-basque-date is &lt;2017.133.1.05svn26477-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225157" version="1" comment="texlive-bbcard is &lt;2017.133.svn19440-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225158" version="1" comment="texlive-bbding is &lt;2017.133.1.01svn17186-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225159" version="1" comment="texlive-bbm is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225160" version="1" comment="texlive-bbm-macros is &lt;2017.133.svn17224-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225161" version="1" comment="texlive-bbold is &lt;2017.133.1.01svn17187-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225162" version="1" comment="texlive-bbold-type1 is &lt;2017.133.svn33143-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225163" version="1" comment="texlive-bbold-type1-fonts is &lt;2017.133.svn33143-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225164" version="1" comment="texlive-bchart is &lt;2017.133.0.0.1.3svn43928-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225165" version="1" comment="texlive-bclogo is &lt;2017.133.3.1svn39364-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225166" version="1" comment="texlive-beamer is &lt;2017.133.3.41svn43073-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225167" version="1" comment="texlive-beamer-FUBerlin is &lt;2017.133.0.0.02bsvn38159-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225168" version="1" comment="texlive-beamer-tut-pt is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225169" version="1" comment="texlive-beamer-verona is &lt;2017.133.0.0.2svn39180-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225170" version="1" comment="texlive-beamer2thesis is &lt;2017.133.2.2svn27539-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225171" version="1" comment="texlive-beameraudience is &lt;2017.133.0.0.1svn23427-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225172" version="1" comment="texlive-beamercolorthemeowl is &lt;2017.133.0.0.1.1svn40105-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225173" version="1" comment="texlive-beamerdarkthemes is &lt;2017.133.0.0.4.1svn35101-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225174" version="1" comment="texlive-beamerposter is &lt;2017.133.1.12svn37009-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225175" version="1" comment="texlive-beamersubframe is &lt;2017.133.0.0.2svn23510-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225176" version="1" comment="texlive-beamerswitch is &lt;2017.133.1.2svn44568-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225177" version="1" comment="texlive-beamertheme-cuerna is &lt;2017.133.svn42161-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225178" version="1" comment="texlive-beamertheme-detlevcm is &lt;2017.133.1.02svn39048-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225179" version="1" comment="texlive-beamertheme-epyt is &lt;2017.133.1.0svn41404-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225180" version="1" comment="texlive-beamertheme-metropolis is &lt;2017.133.1.2svn43031-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225181" version="1" comment="texlive-beamertheme-phnompenh is &lt;2017.133.1.0svn39100-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225182" version="1" comment="texlive-beamertheme-upenn-bc is &lt;2017.133.1.0svn29937-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225183" version="1" comment="texlive-beamerthemejltree is &lt;2017.133.1.1svn21977-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225184" version="1" comment="texlive-beamerthemenirma is &lt;2017.133.0.0.1svn20765-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225185" version="1" comment="texlive-beebe is &lt;2017.133.svn44569-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225186" version="1" comment="texlive-begingreek is &lt;2017.133.1.5svn36294-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225187" version="1" comment="texlive-begriff is &lt;2017.133.1.6svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225188" version="1" comment="texlive-belleek is &lt;2017.133.svn18651-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225189" version="1" comment="texlive-belleek-fonts is &lt;2017.133.svn18651-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225190" version="1" comment="texlive-bengali is &lt;2017.133.svn20987-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225191" version="1" comment="texlive-bera is &lt;2017.133.svn20031-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225192" version="1" comment="texlive-bera-fonts is &lt;2017.133.svn20031-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225193" version="1" comment="texlive-berenisadf is &lt;2017.133.1.004svn32215-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225194" version="1" comment="texlive-berenisadf-fonts is &lt;2017.133.1.004svn32215-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225195" version="1" comment="texlive-besjournals is &lt;2017.133.svn35428-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225196" version="1" comment="texlive-bestpapers is &lt;2017.133.1.0svn38708-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225197" version="1" comment="texlive-betababel is &lt;2017.133.0.0.5svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225198" version="1" comment="texlive-beton is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225199" version="1" comment="texlive-beuron is &lt;2017.133.1.1svn42038-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225200" version="1" comment="texlive-beuron-fonts is &lt;2017.133.1.1svn42038-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225201" version="1" comment="texlive-bewerbung is &lt;2017.133.1.1svn37880-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225202" version="1" comment="texlive-bez123 is &lt;2017.133.1.1bsvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225203" version="1" comment="texlive-bezos is &lt;2017.133.svn25507-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225204" version="1" comment="texlive-bgreek is &lt;2017.133.0.0.3svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225205" version="1" comment="texlive-bgteubner is &lt;2017.133.2.11svn44205-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225206" version="1" comment="texlive-bguq is &lt;2017.133.0.0.4svn27401-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225207" version="1" comment="texlive-bguq-fonts is &lt;2017.133.0.0.4svn27401-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225208" version="1" comment="texlive-bhcexam is &lt;2017.133.0.0.4svn39041-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225209" version="1" comment="texlive-bib-fr is &lt;2017.133.1.5svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225210" version="1" comment="texlive-bibarts is &lt;2017.133.2.1svn40096-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225211" version="1" comment="texlive-biber is &lt;2017.133.2.7svn43910-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225212" version="1" comment="texlive-biber-bin is &lt;2017.20170520.svn42679-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225213" version="1" comment="texlive-bibexport is &lt;2017.133.3.02svn39928-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225214" version="1" comment="texlive-bibexport-bin is &lt;2017.20170520.svn16219-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225215" version="1" comment="texlive-bibhtml is &lt;2017.133.2.0.2svn31607-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225216" version="1" comment="texlive-biblatex is &lt;2017.133.3.7svn42680-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225217" version="1" comment="texlive-biblatex-abnt is &lt;2017.133.3.0.1svn43510-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225218" version="1" comment="texlive-biblatex-anonymous is &lt;2017.133.2.6.0svn43043-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225219" version="1" comment="texlive-biblatex-apa is &lt;2017.133.7.4svn42893-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225220" version="1" comment="texlive-biblatex-archaeology is &lt;2017.133.1.2svn44522-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225221" version="1" comment="texlive-biblatex-arthistory-bonn is &lt;2017.133.1.0svn43468-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225222" version="1" comment="texlive-biblatex-bookinarticle is &lt;2017.133.1.3.1asvn40323-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225223" version="1" comment="texlive-biblatex-bookinother is &lt;2017.133.2.3.0svn43619-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225224" version="1" comment="texlive-biblatex-bwl is &lt;2017.133.0.0.02svn26556-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225225" version="1" comment="texlive-biblatex-caspervector is &lt;2017.133.0.0.2.7svn43371-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225226" version="1" comment="texlive-biblatex-cheatsheet is &lt;2017.133.svn43650-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225227" version="1" comment="texlive-biblatex-chem is &lt;2017.133.1.1ssvn43116-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225228" version="1" comment="texlive-biblatex-chicago is &lt;2017.133.1.0rc4svn44156-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225229" version="1" comment="texlive-biblatex-claves is &lt;2017.133.1.2.0svn43723-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225230" version="1" comment="texlive-biblatex-dw is &lt;2017.133.1.7svn42649-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225231" version="1" comment="texlive-biblatex-fiwi is &lt;2017.133.1.6csvn43082-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225232" version="1" comment="texlive-biblatex-gb7714-2015 is &lt;2017.133.1.0gsvn43555-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225233" version="1" comment="texlive-biblatex-gost is &lt;2017.133.1.14svn44172-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225234" version="1" comment="texlive-biblatex-historian is &lt;2017.133.0.0.4svn19787-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225235" version="1" comment="texlive-biblatex-ieee is &lt;2017.133.1.2dsvn43620-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225236" version="1" comment="texlive-biblatex-ijsra is &lt;2017.133.0.0.1svn41634-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225237" version="1" comment="texlive-biblatex-iso690 is &lt;2017.133.0.0.3.2svn44066-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225238" version="1" comment="texlive-biblatex-juradiss is &lt;2017.133.0.0.1gsvn29252-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225239" version="1" comment="texlive-biblatex-lni is &lt;2017.133.0.0.4svn43032-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225240" version="1" comment="texlive-biblatex-luh-ipw is &lt;2017.133.0.0.3svn32180-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225241" version="1" comment="texlive-biblatex-manuscripts-philology is &lt;2017.133.1.12.2svn43108-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225242" version="1" comment="texlive-biblatex-mla is &lt;2017.133.1.9svn42445-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225243" version="1" comment="texlive-biblatex-morenames is &lt;2017.133.1.3.1svn43049-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225244" version="1" comment="texlive-biblatex-multiple-dm is &lt;2017.133.1.0.1svn37081-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225245" version="1" comment="texlive-biblatex-musuos is &lt;2017.133.1.0svn24097-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225246" version="1" comment="texlive-biblatex-nature is &lt;2017.133.1.3bsvn43382-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225247" version="1" comment="texlive-biblatex-nejm is &lt;2017.133.0.0.4svn24011-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225248" version="1" comment="texlive-biblatex-nottsclassic is &lt;2017.133.0.0.1svn41596-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225249" version="1" comment="texlive-biblatex-opcit-booktitle is &lt;2017.133.1.8.0svn43621-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225250" version="1" comment="texlive-biblatex-oxref is &lt;2017.133.0.0.10svn44385-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225251" version="1" comment="texlive-biblatex-philosophy is &lt;2017.133.1.9.5svn43860-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225252" version="1" comment="texlive-biblatex-phys is &lt;2017.133.1.0bsvn41922-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225253" version="1" comment="texlive-biblatex-publist is &lt;2017.133.1.7svn43765-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225254" version="1" comment="texlive-biblatex-realauthor is &lt;2017.133.2.7.0svn42390-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225255" version="1" comment="texlive-biblatex-sbl is &lt;2017.133.0.0.8.1svn42972-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225256" version="1" comment="texlive-biblatex-science is &lt;2017.133.1.1gsvn42147-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225257" version="1" comment="texlive-biblatex-shortfields is &lt;2017.133.1.0.0svn43738-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225258" version="1" comment="texlive-biblatex-source-division is &lt;2017.133.2.4.1svn41675-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225259" version="1" comment="texlive-biblatex-subseries is &lt;2017.133.1.2.0svn43330-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225260" version="1" comment="texlive-biblatex-swiss-legal is &lt;2017.133.1.1.2asvn32750-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225261" version="1" comment="texlive-biblatex-trad is &lt;2017.133.0.0.3svn41656-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225262" version="1" comment="texlive-biblatex-true-citepages-omit is &lt;2017.133.1.3.0svn42120-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225263" version="1" comment="texlive-bibleref is &lt;2017.133.1.16svn42162-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225264" version="1" comment="texlive-bibleref-french is &lt;2017.133.2.3.1svn35497-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225265" version="1" comment="texlive-bibleref-german is &lt;2017.133.1.0asvn21923-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225266" version="1" comment="texlive-bibleref-lds is &lt;2017.133.1.0svn25526-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225267" version="1" comment="texlive-bibleref-mouth is &lt;2017.133.1.0svn25527-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225268" version="1" comment="texlive-bibleref-parse is &lt;2017.133.1.1svn22054-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225269" version="1" comment="texlive-bibletext is &lt;2017.133.0.0.1svn39785-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225270" version="1" comment="texlive-biblist is &lt;2017.133.svn17116-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225271" version="1" comment="texlive-bibtex is &lt;2017.133.0.0.99dsvn44166-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225272" version="1" comment="texlive-bibtex-bin is &lt;2017.20170520.svn44143-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225273" version="1" comment="texlive-bibtex8 is &lt;2017.133.3.71svn29725-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225274" version="1" comment="texlive-bibtex8-bin is &lt;2017.20170520.svn44143-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225275" version="1" comment="texlive-bibtexperllibs is &lt;2017.133.1.3svn43549-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225276" version="1" comment="texlive-bibtexu is &lt;2017.133.svn29743-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225277" version="1" comment="texlive-bibtexu-bin is &lt;2017.20170520.svn44143-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225278" version="1" comment="texlive-bibtopic is &lt;2017.133.1.1asvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225279" version="1" comment="texlive-bibtopicprefix is &lt;2017.133.1.10svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225280" version="1" comment="texlive-bibunits is &lt;2017.133.2.2svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225281" version="1" comment="texlive-bidi is &lt;2017.133.30.7svn44546-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225282" version="1" comment="texlive-bidi-atbegshi is &lt;2017.133.0.0.1svn35154-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225283" version="1" comment="texlive-bidicontour is &lt;2017.133.0.0.2svn34631-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225284" version="1" comment="texlive-bidihl is &lt;2017.133.0.0.1csvn37795-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225285" version="1" comment="texlive-bidipagegrid is &lt;2017.133.0.0.2svn34632-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225286" version="1" comment="texlive-bidipresentation is &lt;2017.133.0.0.3svn35267-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225287" version="1" comment="texlive-bidishadowtext is &lt;2017.133.0.0.1svn34633-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225288" version="1" comment="texlive-bigfoot is &lt;2017.133.2.1svn38248-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225289" version="1" comment="texlive-bigints is &lt;2017.133.svn29803-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225290" version="1" comment="texlive-bin-devel is &lt;2017.20170520-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225291" version="1" comment="texlive-binarytree is &lt;2017.133.1.01svn41777-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225292" version="1" comment="texlive-binomexp is &lt;2017.133.1.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225293" version="1" comment="texlive-biochemistry-colors is &lt;2017.133.1.00svn43960-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225294" version="1" comment="texlive-biocon is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225295" version="1" comment="texlive-biolett-bst is &lt;2017.133.svn42217-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225296" version="1" comment="texlive-bitelist is &lt;2017.133.0.0.1svn25779-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225297" version="1" comment="texlive-bitpattern is &lt;2017.133.svn39073-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225298" version="1" comment="texlive-bizcard is &lt;2017.133.1.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225299" version="1" comment="texlive-blacklettert1 is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225300" version="1" comment="texlive-blindtext is &lt;2017.133.2.0svn25039-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225301" version="1" comment="texlive-blkarray is &lt;2017.133.0.0.07svn36406-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225302" version="1" comment="texlive-blochsphere is &lt;2017.133.1.1svn38388-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225303" version="1" comment="texlive-block is &lt;2017.133.svn17209-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225304" version="1" comment="texlive-blockdraw_mp is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225305" version="1" comment="texlive-bloques is &lt;2017.133.1.0svn22490-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225306" version="1" comment="texlive-blox is &lt;2017.133.2.5svn35014-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225307" version="1" comment="texlive-bnumexpr is &lt;2017.133.1.2asvn38638-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225308" version="1" comment="texlive-bodegraph is &lt;2017.133.1.4svn20047-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225309" version="1" comment="texlive-bohr is &lt;2017.133.1.0svn37657-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225310" version="1" comment="texlive-boisik is &lt;2017.133.0.0.5svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225311" version="1" comment="texlive-boites is &lt;2017.133.1.1svn32235-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225312" version="1" comment="texlive-bold-extra is &lt;2017.133.0.0.1svn17076-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225313" version="1" comment="texlive-boldtensors is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225314" version="1" comment="texlive-bondgraph is &lt;2017.133.1.0svn21670-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225315" version="1" comment="texlive-bondgraphs is &lt;2017.133.1.0.1svn36605-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225316" version="1" comment="texlive-bookcover is &lt;2017.133.2.1svn43861-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225317" version="1" comment="texlive-bookdb is &lt;2017.133.0.0.2svn37536-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225318" version="1" comment="texlive-bookest is &lt;2017.133.1.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225319" version="1" comment="texlive-bookhands is &lt;2017.133.svn23609-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225320" version="1" comment="texlive-bookhands-fonts is &lt;2017.133.svn23609-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225321" version="1" comment="texlive-booklet is &lt;2017.133.0.0.7bsvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225322" version="1" comment="texlive-bookman is &lt;2017.133.svn31835-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225323" version="1" comment="texlive-bookman-fonts is &lt;2017.133.svn31835-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225324" version="1" comment="texlive-booktabs is &lt;2017.133.1.618033svn40846-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225325" version="1" comment="texlive-booktabs-de is &lt;2017.133.1.61803svn21907-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225326" version="1" comment="texlive-booktabs-fr is &lt;2017.133.1.00svn21948-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225327" version="1" comment="texlive-boolexpr is &lt;2017.133.3.14svn17830-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225328" version="1" comment="texlive-boondox is &lt;2017.133.1.02dsvn43344-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225329" version="1" comment="texlive-boondox-fonts is &lt;2017.133.1.02dsvn43344-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225330" version="1" comment="texlive-bophook is &lt;2017.133.0.0.02svn17062-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225331" version="1" comment="texlive-borceux is &lt;2017.133.svn21047-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225332" version="1" comment="texlive-bosisio is &lt;2017.133.svn16989-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225333" version="1" comment="texlive-boxedminipage is &lt;2017.133.2svn17087-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225334" version="1" comment="texlive-boxedminipage2e is &lt;2017.133.1.0svn36477-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225335" version="1" comment="texlive-boxhandler is &lt;2017.133.1.30svn28031-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225336" version="1" comment="texlive-bpchem is &lt;2017.133.1.06svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225337" version="1" comment="texlive-bpolynomial is &lt;2017.133.0.0.5svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225338" version="1" comment="texlive-br-lex is &lt;2017.133.svn39701-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225339" version="1" comment="texlive-bracketkey is &lt;2017.133.1.0svn17129-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225340" version="1" comment="texlive-braids is &lt;2017.133.1.0svn23790-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225341" version="1" comment="texlive-braille is &lt;2017.133.svn20655-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225342" version="1" comment="texlive-braket is &lt;2017.133.svn17127-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225343" version="1" comment="texlive-brandeis-dissertation is &lt;2017.133.2.0svn32047-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225344" version="1" comment="texlive-breakcites is &lt;2017.133.svn21014-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225345" version="1" comment="texlive-breakurl is &lt;2017.133.1.40svn29901-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225346" version="1" comment="texlive-bredzenie is &lt;2017.133.1.0svn44371-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225347" version="1" comment="texlive-breqn is &lt;2017.133.0.0.98esvn43071-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225348" version="1" comment="texlive-bropd is &lt;2017.133.1.2svn35383-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225349" version="1" comment="texlive-brushscr is &lt;2017.133.svn28363-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225350" version="1" comment="texlive-brushscr-fonts is &lt;2017.133.svn28363-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225351" version="1" comment="texlive-bullcntr is &lt;2017.133.0.0.04svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225352" version="1" comment="texlive-bundledoc is &lt;2017.133.3.2svn35041-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225353" version="1" comment="texlive-bundledoc-bin is &lt;2017.20170520.svn17794-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225354" version="1" comment="texlive-burmese is &lt;2017.133.svn25185-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225355" version="1" comment="texlive-burmese-fonts is &lt;2017.133.svn25185-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225356" version="1" comment="texlive-bussproofs is &lt;2017.133.1.1svn27488-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225357" version="1" comment="texlive-bxbase is &lt;2017.133.1.1svn44481-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225358" version="1" comment="texlive-bxcalc is &lt;2017.133.1.0svn44514-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225359" version="1" comment="texlive-bxcjkjatype is &lt;2017.133.0.0.3svn42292-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225360" version="1" comment="texlive-bxdpx-beamer is &lt;2017.133.0.0.3svn41813-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225361" version="1" comment="texlive-bxdvidriver is &lt;2017.133.0.0.2asvn43219-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225362" version="1" comment="texlive-bxeepic is &lt;2017.133.0.0.2svn30559-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225363" version="1" comment="texlive-bxenclose is &lt;2017.133.0.0.2svn40213-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225364" version="1" comment="texlive-bxjalipsum is &lt;2017.133.0.0.3asvn43369-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225365" version="1" comment="texlive-bxjaprnind is &lt;2017.133.0.0.3asvn44554-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225366" version="1" comment="texlive-bxjscls is &lt;2017.133.1.5bsvn43741-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225367" version="1" comment="texlive-bxnewfont is &lt;2017.133.0.0.2bsvn44173-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225368" version="1" comment="texlive-bxorigcapt is &lt;2017.133.0.0.2asvn44195-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225369" version="1" comment="texlive-bxpapersize is &lt;2017.133.0.0.3asvn44174-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225370" version="1" comment="texlive-bxpdfver is &lt;2017.133.0.0.4svn43201-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225371" version="1" comment="texlive-bytefield is &lt;2017.133.2.3svn38736-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225372" version="1" comment="texlive-c-pascal is &lt;2017.133.1.2svn18337-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225373" version="1" comment="texlive-c90 is &lt;2017.133.svn42428-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225374" version="1" comment="texlive-cabin is &lt;2017.133.svn43687-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225375" version="1" comment="texlive-cabin-fonts is &lt;2017.133.svn43687-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225376" version="1" comment="texlive-cachepic is &lt;2017.133.1.0svn26313-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225377" version="1" comment="texlive-cachepic-bin is &lt;2017.20170520.svn15543-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225378" version="1" comment="texlive-caladea is &lt;2017.133.svn34991-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225379" version="1" comment="texlive-caladea-fonts is &lt;2017.133.svn34991-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225380" version="1" comment="texlive-calcage is &lt;2017.133.0.0.90svn27725-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225381" version="1" comment="texlive-calctab is &lt;2017.133.0.0.6.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225382" version="1" comment="texlive-calculation is &lt;2017.133.1.0svn35973-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225383" version="1" comment="texlive-calculator is &lt;2017.133.2.0svn33041-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225384" version="1" comment="texlive-calligra is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225385" version="1" comment="texlive-calligra-type1 is &lt;2017.133.001.000svn24302-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225386" version="1" comment="texlive-calligra-type1-fonts is &lt;2017.133.001.000svn24302-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225387" version="1" comment="texlive-callouts is &lt;2017.133.svn43515-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225388" version="1" comment="texlive-calrsfs is &lt;2017.133.svn17125-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225389" version="1" comment="texlive-cals is &lt;2017.133.2.4.2svn43003-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225390" version="1" comment="texlive-calxxxx-yyyy is &lt;2017.133.20.17asvn44131-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225391" version="1" comment="texlive-cancel is &lt;2017.133.2.2svn32508-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225392" version="1" comment="texlive-canoniclayout is &lt;2017.133.0.0.4svn24523-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225393" version="1" comment="texlive-cantarell is &lt;2017.133.2.4svn27066-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225394" version="1" comment="texlive-cantarell-fonts is &lt;2017.133.2.4svn27066-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225395" version="1" comment="texlive-capt-of is &lt;2017.133.svn29803-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225396" version="1" comment="texlive-captcont is &lt;2017.133.2.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225397" version="1" comment="texlive-captdef is &lt;2017.133.svn17353-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225398" version="1" comment="texlive-caption is &lt;2017.133.svn41409-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225399" version="1" comment="texlive-carbohydrates is &lt;2017.133.0.0.1svn39000-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225400" version="1" comment="texlive-carlisle is &lt;2017.133.svn18258-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225401" version="1" comment="texlive-carlito is &lt;2017.133.svn35002-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225402" version="1" comment="texlive-carlito-fonts is &lt;2017.133.svn35002-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225403" version="1" comment="texlive-carolmin-ps is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225404" version="1" comment="texlive-carolmin-ps-fonts is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225405" version="1" comment="texlive-cascadilla is &lt;2017.133.1.8.2svn25144-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225406" version="1" comment="texlive-cases is &lt;2017.133.2.5svn17123-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225407" version="1" comment="texlive-casyl is &lt;2017.133.2.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225408" version="1" comment="texlive-catchfilebetweentags is &lt;2017.133.1.1svn21476-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225409" version="1" comment="texlive-catcodes is &lt;2017.133.r0.2svn38859-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225410" version="1" comment="texlive-catechis is &lt;2017.133.1.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225411" version="1" comment="texlive-catoptions is &lt;2017.133.0.0.2.7hsvn35069-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225412" version="1" comment="texlive-cbcoptic is &lt;2017.133.0.0.2svn16666-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225413" version="1" comment="texlive-cbcoptic-fonts is &lt;2017.133.0.0.2svn16666-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225414" version="1" comment="texlive-cbfonts is &lt;2017.133.svn31624-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225415" version="1" comment="texlive-cbfonts-fd is &lt;2017.133.1.1svn39936-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225416" version="1" comment="texlive-cbfonts-fonts is &lt;2017.133.svn31624-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225417" version="1" comment="texlive-cc-pl is &lt;2017.133.1.02.2svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225418" version="1" comment="texlive-cc-pl-fonts is &lt;2017.133.1.02.2svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225419" version="1" comment="texlive-ccaption is &lt;2017.133.3.2csvn23443-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225420" version="1" comment="texlive-ccfonts is &lt;2017.133.1.1svn17122-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225421" version="1" comment="texlive-ccicons is &lt;2017.133.1.5svn30020-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225422" version="1" comment="texlive-ccicons-fonts is &lt;2017.133.1.5svn30020-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225423" version="1" comment="texlive-cclicenses is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225424" version="1" comment="texlive-cd is &lt;2017.133.1.4svn34452-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225425" version="1" comment="texlive-cd-cover is &lt;2017.133.1.0svn17121-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225426" version="1" comment="texlive-cdpbundl is &lt;2017.133.0.0.36svn36697-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225427" version="1" comment="texlive-cell is &lt;2017.133.svn42428-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225428" version="1" comment="texlive-cellspace is &lt;2017.133.1.6svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225429" version="1" comment="texlive-celtic is &lt;2017.133.1.1svn39797-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225430" version="1" comment="texlive-censor is &lt;2017.133.3.21svn31332-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225431" version="1" comment="texlive-cfr-initials is &lt;2017.133.1.01svn36728-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225432" version="1" comment="texlive-cfr-lm is &lt;2017.133.1.5svn36195-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225433" version="1" comment="texlive-changebar is &lt;2017.133.3.5csvn29349-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225434" version="1" comment="texlive-changelayout is &lt;2017.133.1.0svn16094-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225435" version="1" comment="texlive-changepage is &lt;2017.133.1.0csvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225436" version="1" comment="texlive-changes is &lt;2017.133.2.0.4svn41737-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225437" version="1" comment="texlive-chappg is &lt;2017.133.2.1bsvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225438" version="1" comment="texlive-chapterfolder is &lt;2017.133.2.0.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225439" version="1" comment="texlive-charter is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225440" version="1" comment="texlive-charter-fonts is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225441" version="1" comment="texlive-chbibref is &lt;2017.133.1.0svn17120-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225442" version="1" comment="texlive-checkcites is &lt;2017.133.1.0isvn28572-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225443" version="1" comment="texlive-checkcites-bin is &lt;2017.20170520.svn25623-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225444" version="1" comment="texlive-checklistings is &lt;2017.133.1.0svn38300-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225445" version="1" comment="texlive-checklistings-bin is &lt;2017.20170520.svn38300-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225446" version="1" comment="texlive-chem-journal is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225447" version="1" comment="texlive-chemarrow is &lt;2017.133.0.0.9svn17146-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225448" version="1" comment="texlive-chemarrow-fonts is &lt;2017.133.0.0.9svn17146-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225449" version="1" comment="texlive-chembst is &lt;2017.133.0.0.2.5svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225450" version="1" comment="texlive-chemcompounds is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225451" version="1" comment="texlive-chemcono is &lt;2017.133.1.3svn17119-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225452" version="1" comment="texlive-chemexec is &lt;2017.133.1.0svn21632-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225453" version="1" comment="texlive-chemfig is &lt;2017.133.1.2esvn44513-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225454" version="1" comment="texlive-chemformula is &lt;2017.133.4.15esvn43583-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225455" version="1" comment="texlive-chemgreek is &lt;2017.133.1.1svn42758-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225456" version="1" comment="texlive-chemmacros is &lt;2017.133.5.8svn44023-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225457" version="1" comment="texlive-chemnum is &lt;2017.133.1.2svn40522-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225458" version="1" comment="texlive-chemschemex is &lt;2017.133.1.1svn43747-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225459" version="1" comment="texlive-chemstyle is &lt;2017.133.2.0msvn31096-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225460" version="1" comment="texlive-cherokee is &lt;2017.133.svn21046-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225461" version="1" comment="texlive-chess is &lt;2017.133.1.2svn20582-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225462" version="1" comment="texlive-chess-problem-diagrams is &lt;2017.133.1.12svn39317-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225463" version="1" comment="texlive-chessboard is &lt;2017.133.1.7svn33801-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225464" version="1" comment="texlive-chessfss is &lt;2017.133.1.2asvn19440-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225465" version="1" comment="texlive-chet is &lt;2017.133.2.1svn38161-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225466" version="1" comment="texlive-chextras is &lt;2017.133.1.01svn27118-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225467" version="1" comment="texlive-chicago is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225468" version="1" comment="texlive-chicago-annote is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225469" version="1" comment="texlive-chickenize is &lt;2017.133.0.0.2.4svn42341-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225470" version="1" comment="texlive-childdoc is &lt;2017.133.1.5svn44512-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225471" version="1" comment="texlive-chivo is &lt;2017.133.1.0svn40931-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225472" version="1" comment="texlive-chivo-fonts is &lt;2017.133.1.0svn40931-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225473" version="1" comment="texlive-chkfloat is &lt;2017.133.0.0.1svn27473-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225474" version="1" comment="texlive-chktex is &lt;2017.133.1.7.6svn44166-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225475" version="1" comment="texlive-chktex-bin is &lt;2017.20170520.svn44143-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225476" version="1" comment="texlive-chletter is &lt;2017.133.2.0svn20060-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225477" version="1" comment="texlive-chngcntr is &lt;2017.133.1.0asvn17157-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225478" version="1" comment="texlive-chronology is &lt;2017.133.1.1.1svn37934-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225479" version="1" comment="texlive-chronosys is &lt;2017.133.1.2svn26700-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225480" version="1" comment="texlive-chscite is &lt;2017.133.2.9999svn28552-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225481" version="1" comment="texlive-churchslavonic is &lt;2017.133.0.0.2.1svn42751-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225482" version="1" comment="texlive-cinzel is &lt;2017.133.svn34408-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225483" version="1" comment="texlive-cinzel-fonts is &lt;2017.133.svn34408-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225484" version="1" comment="texlive-circ is &lt;2017.133.1.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225485" version="1" comment="texlive-circuitikz is &lt;2017.133.0.0.8.3svn44488-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225486" version="1" comment="texlive-cite is &lt;2017.133.5.5svn36428-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225487" version="1" comment="texlive-citeall is &lt;2017.133.1.2svn37103-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225488" version="1" comment="texlive-cje is &lt;2017.133.1.01svn44454-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225489" version="1" comment="texlive-cjhebrew is &lt;2017.133.0.0.2asvn43444-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225490" version="1" comment="texlive-cjhebrew-fonts is &lt;2017.133.0.0.2asvn43444-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225491" version="1" comment="texlive-cjk is &lt;2017.133.4.8.4svn36951-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225492" version="1" comment="texlive-cjk-gs-integrate is &lt;2017.133.20170505.0svn44207-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225493" version="1" comment="texlive-cjk-gs-integrate-bin is &lt;2017.20170520.svn37223-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225494" version="1" comment="texlive-cjk-ko is &lt;2017.133.1.8svn40373-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225495" version="1" comment="texlive-cjkpunct is &lt;2017.133.4.8.4svn41119-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225496" version="1" comment="texlive-cjkutils is &lt;2017.133.svn44166-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225497" version="1" comment="texlive-cjkutils-bin is &lt;2017.20170520.svn44143-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225498" version="1" comment="texlive-classics is &lt;2017.133.0.0.1svn29018-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225499" version="1" comment="texlive-classicthesis is &lt;2017.133.4.2svn38304-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225500" version="1" comment="texlive-classpack is &lt;2017.133.0.0.77svn33101-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225501" version="1" comment="texlive-cleanthesis is &lt;2017.133.0.0.3.1svn38221-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225502" version="1" comment="texlive-clearsans is &lt;2017.133.svn34405-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225503" version="1" comment="texlive-clearsans-fonts is &lt;2017.133.svn34405-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225504" version="1" comment="texlive-clefval is &lt;2017.133.0svn16549-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225505" version="1" comment="texlive-cleveref is &lt;2017.133.0.0.19svn32513-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225506" version="1" comment="texlive-clipboard is &lt;2017.133.0.0.2svn28876-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225507" version="1" comment="texlive-clock is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225508" version="1" comment="texlive-cloze is &lt;2017.133.1.2svn41531-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225509" version="1" comment="texlive-clrscode is &lt;2017.133.1.7svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225510" version="1" comment="texlive-clrscode3e is &lt;2017.133.svn34887-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225511" version="1" comment="texlive-cm is &lt;2017.133.svn42428-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225512" version="1" comment="texlive-cm-lgc is &lt;2017.133.0.0.5svn28250-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225513" version="1" comment="texlive-cm-lgc-fonts is &lt;2017.133.0.0.5svn28250-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225514" version="1" comment="texlive-cm-super is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225515" version="1" comment="texlive-cm-super-fonts is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225516" version="1" comment="texlive-cm-unicode is &lt;2017.133.0.0.7.0svn19445-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225517" version="1" comment="texlive-cm-unicode-fonts is &lt;2017.133.0.0.7.0svn19445-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225518" version="1" comment="texlive-cmap is &lt;2017.133.1.0hsvn42428-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225519" version="1" comment="texlive-cmarrows is &lt;2017.133.0.0.9svn24378-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225520" version="1" comment="texlive-cmbright is &lt;2017.133.8.1svn21107-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225521" version="1" comment="texlive-cmcyr is &lt;2017.133.svn39273-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225522" version="1" comment="texlive-cmcyr-fonts is &lt;2017.133.svn39273-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225523" version="1" comment="texlive-cmdstring is &lt;2017.133.1.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225524" version="1" comment="texlive-cmdtrack is &lt;2017.133.svn28910-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225525" version="1" comment="texlive-cmexb is &lt;2017.133.svn40785-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225526" version="1" comment="texlive-cmexb-fonts is &lt;2017.133.svn40785-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225527" version="1" comment="texlive-cmextra is &lt;2017.133.svn42428-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225528" version="1" comment="texlive-cmll is &lt;2017.133.svn17964-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225529" version="1" comment="texlive-cmll-fonts is &lt;2017.133.svn17964-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225530" version="1" comment="texlive-cmpica is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225531" version="1" comment="texlive-cmpj is &lt;2017.133.3.01svn44283-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225532" version="1" comment="texlive-cmsd is &lt;2017.133.svn18787-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225533" version="1" comment="texlive-cmtiup is &lt;2017.133.2.1svn39728-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225534" version="1" comment="texlive-cnbwp is &lt;2017.133.svn32550-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225535" version="1" comment="texlive-cnltx is &lt;2017.133.0.0.13svn38138-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225536" version="1" comment="texlive-cns is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225537" version="1" comment="texlive-cntformats is &lt;2017.133.0.0.7svn34668-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225538" version="1" comment="texlive-cntperchap is &lt;2017.133.0.0.3svn37572-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225539" version="1" comment="texlive-cochineal is &lt;2017.133.1.042svn43462-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225540" version="1" comment="texlive-cochineal-fonts is &lt;2017.133.1.042svn43462-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225541" version="1" comment="texlive-codedoc is &lt;2017.133.0.0.3svn17630-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225542" version="1" comment="texlive-codepage is &lt;2017.133.svn21126-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225543" version="1" comment="texlive-codesection is &lt;2017.133.0.0.1svn34481-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225544" version="1" comment="texlive-codicefiscaleitaliano is &lt;2017.133.1.2svn29803-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225545" version="1" comment="texlive-collcell is &lt;2017.133.0.0.5svn21539-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225546" version="1" comment="texlive-collectbox is &lt;2017.133.0.0.4bsvn26557-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225547" version="1" comment="texlive-collref is &lt;2017.133.2.0bsvn35084-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225548" version="1" comment="texlive-colordoc is &lt;2017.133.svn18270-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225549" version="1" comment="texlive-colorinfo is &lt;2017.133.0.0.3csvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225550" version="1" comment="texlive-coloring is &lt;2017.133.0.0.2svn41042-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225551" version="1" comment="texlive-colorsep is &lt;2017.133.svn13293-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225552" version="1" comment="texlive-colorspace is &lt;2017.133.1.2.0svn42228-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225553" version="1" comment="texlive-colortab is &lt;2017.133.1.0svn22155-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225554" version="1" comment="texlive-colortbl is &lt;2017.133.1.0asvn29803-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225555" version="1" comment="texlive-colorwav is &lt;2017.133.1.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225556" version="1" comment="texlive-colorweb is &lt;2017.133.1.3svn31490-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225557" version="1" comment="texlive-colourchange is &lt;2017.133.1.22svn21741-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225558" version="1" comment="texlive-combelow is &lt;2017.133.0.0.99fsvn18462-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225559" version="1" comment="texlive-combine is &lt;2017.133.0.0.7asvn19361-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225560" version="1" comment="texlive-combinedgraphics is &lt;2017.133.0.0.2.2svn27198-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225561" version="1" comment="texlive-combofont is &lt;2017.133.0.0.1svn44491-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225562" version="1" comment="texlive-comfortaa is &lt;2017.133.2.3svn27536-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225563" version="1" comment="texlive-comfortaa-fonts is &lt;2017.133.2.3svn27536-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225564" version="1" comment="texlive-comicneue is &lt;2017.133.1.1svn42851-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225565" version="1" comment="texlive-comicneue-fonts is &lt;2017.133.1.1svn42851-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225566" version="1" comment="texlive-comma is &lt;2017.133.1.2svn18259-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225567" version="1" comment="texlive-commado is &lt;2017.133.r0.11asvn38875-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225568" version="1" comment="texlive-commath is &lt;2017.133.0.0.3svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225569" version="1" comment="texlive-comment is &lt;2017.133.3.8svn41927-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225570" version="1" comment="texlive-compactbib is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225571" version="1" comment="texlive-complexity is &lt;2017.133.0.0.76svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225572" version="1" comment="texlive-components-of-TeX is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225573" version="1" comment="texlive-comprehensive is &lt;2017.133.12.3svn43001-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225574" version="1" comment="texlive-computational-complexity is &lt;2017.133.2.25fsvn39903-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225575" version="1" comment="texlive-concepts is &lt;2017.133.0.0.0.5_r1svn29020-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225576" version="1" comment="texlive-concmath is &lt;2017.133.svn17219-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225577" version="1" comment="texlive-concmath-fonts is &lt;2017.133.svn17218-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225578" version="1" comment="texlive-concprog is &lt;2017.133.svn18791-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225579" version="1" comment="texlive-concrete is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225580" version="1" comment="texlive-confproc is &lt;2017.133.0.0.8svn29349-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225581" version="1" comment="texlive-constants is &lt;2017.133.1.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225582" version="1" comment="texlive-conteq is &lt;2017.133.0.0.1.1svn37868-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225583" version="1" comment="texlive-context is &lt;2017.133.svn44436-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225584" version="1" comment="texlive-context-account is &lt;2017.133.svn23167-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225585" version="1" comment="texlive-context-algorithmic is &lt;2017.133.svn31026-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225586" version="1" comment="texlive-context-animation is &lt;2017.133.svn36188-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225587" version="1" comment="texlive-context-annotation is &lt;2017.133.svn36188-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225588" version="1" comment="texlive-context-bin is &lt;2017.20170520.svn34112-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225589" version="1" comment="texlive-context-bnf is &lt;2017.133.svn23167-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225590" version="1" comment="texlive-context-chromato is &lt;2017.133.svn23167-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225591" version="1" comment="texlive-context-cmscbf is &lt;2017.133.svn42327-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225592" version="1" comment="texlive-context-cmttbf is &lt;2017.133.svn42328-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225593" version="1" comment="texlive-context-construction-plan is &lt;2017.133.svn23167-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225594" version="1" comment="texlive-context-cyrillicnumbers is &lt;2017.133.svn29905-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225595" version="1" comment="texlive-context-degrade is &lt;2017.133.svn23167-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225596" version="1" comment="texlive-context-fancybreak is &lt;2017.133.svn36948-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225597" version="1" comment="texlive-context-filter is &lt;2017.133.svn42326-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225598" version="1" comment="texlive-context-fonts is &lt;2017.133.svn44436-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225599" version="1" comment="texlive-context-french is &lt;2017.133.svn24582-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225600" version="1" comment="texlive-context-fullpage is &lt;2017.133.svn23167-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225601" version="1" comment="texlive-context-gantt is &lt;2017.133.svn27472-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225602" version="1" comment="texlive-context-gnuplot is &lt;2017.133.svn30380-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225603" version="1" comment="texlive-context-inifile is &lt;2017.133.svn42329-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225604" version="1" comment="texlive-context-layout is &lt;2017.133.svn42330-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225605" version="1" comment="texlive-context-letter is &lt;2017.133.svn38202-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225606" version="1" comment="texlive-context-lettrine is &lt;2017.133.svn23167-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225607" version="1" comment="texlive-context-mathsets is &lt;2017.133.svn23167-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225608" version="1" comment="texlive-context-notes-zh-cn is &lt;2017.133.svn23171-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225609" version="1" comment="texlive-context-rst is &lt;2017.133.0.0.6csvn33092-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225610" version="1" comment="texlive-context-ruby is &lt;2017.133.svn28434-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225611" version="1" comment="texlive-context-simplefonts is &lt;2017.133.svn29229-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225612" version="1" comment="texlive-context-simpleslides is &lt;2017.133.svn34438-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225613" version="1" comment="texlive-context-title is &lt;2017.133.svn36189-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225614" version="1" comment="texlive-context-transliterator is &lt;2017.133.svn29801-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225615" version="1" comment="texlive-context-typearea is &lt;2017.133.svn23167-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225616" version="1" comment="texlive-context-typescripts is &lt;2017.133.svn25411-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225617" version="1" comment="texlive-context-vim is &lt;2017.133.svn37413-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225618" version="1" comment="texlive-context-visualcounter is &lt;2017.133.svn36190-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225619" version="1" comment="texlive-continue is &lt;2017.133.0.0.1svn39308-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225620" version="1" comment="texlive-contour is &lt;2017.133.2.14svn18950-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225621" version="1" comment="texlive-contracard is &lt;2017.133.1.0.1svn31745-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225622" version="1" comment="texlive-conv-xkv is &lt;2017.133.svn43558-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225623" version="1" comment="texlive-convbkmk is &lt;2017.133.0.0.10asvn35923-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225624" version="1" comment="texlive-convbkmk-bin is &lt;2017.20170520.svn30408-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225625" version="1" comment="texlive-cooking is &lt;2017.133.0.0.9bsvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225626" version="1" comment="texlive-cooking-units is &lt;2017.133.1.10svn42507-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225627" version="1" comment="texlive-cookingsymbols is &lt;2017.133.1.1svn35929-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225628" version="1" comment="texlive-cool is &lt;2017.133.1.35svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225629" version="1" comment="texlive-coollist is &lt;2017.133.1.4svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225630" version="1" comment="texlive-coolstr is &lt;2017.133.2.2svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225631" version="1" comment="texlive-coolthms is &lt;2017.133.1.2svn29062-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225632" version="1" comment="texlive-cooltooltips is &lt;2017.133.1.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225633" version="1" comment="texlive-coordsys is &lt;2017.133.1.4svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225634" version="1" comment="texlive-copyedit is &lt;2017.133.1.6svn37928-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225635" version="1" comment="texlive-copyrightbox is &lt;2017.133.0.0.1svn24829-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225636" version="1" comment="texlive-cormorantgaramond is &lt;2017.133.3.00svn41865-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225637" version="1" comment="texlive-cormorantgaramond-fonts is &lt;2017.133.3.00svn41865-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225638" version="1" comment="texlive-correctmathalign is &lt;2017.133.1.1svn44131-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225639" version="1" comment="texlive-coseoul is &lt;2017.133.1.1svn23862-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225640" version="1" comment="texlive-countriesofeurope is &lt;2017.133.0.0.21svn26042-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225641" version="1" comment="texlive-countriesofeurope-fonts is &lt;2017.133.0.0.21svn26042-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225642" version="1" comment="texlive-counttexruns is &lt;2017.133.1.00asvn27576-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225643" version="1" comment="texlive-courier is &lt;2017.133.svn35058-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225644" version="1" comment="texlive-courier-fonts is &lt;2017.133.svn35058-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225645" version="1" comment="texlive-courier-scaled is &lt;2017.133.svn24940-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225646" version="1" comment="texlive-courseoutline is &lt;2017.133.1.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225647" version="1" comment="texlive-coursepaper is &lt;2017.133.2.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225648" version="1" comment="texlive-coverpage is &lt;2017.133.1.01svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225649" version="1" comment="texlive-covington is &lt;2017.133.1.4svn44501-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225650" version="1" comment="texlive-cprotect is &lt;2017.133.1.0esvn21209-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225651" version="1" comment="texlive-cquthesis is &lt;2017.133.1.20svn44476-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225652" version="1" comment="texlive-crbox is &lt;2017.133.0.0.1svn29803-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225653" version="1" comment="texlive-crimson is &lt;2017.133.svn43525-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225654" version="1" comment="texlive-crimson-fonts is &lt;2017.133.svn43525-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225655" version="1" comment="texlive-crop is &lt;2017.133.1.5svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225656" version="1" comment="texlive-crossreference is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225657" version="1" comment="texlive-crossrefware is &lt;2017.133.2.1asvn43993-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225658" version="1" comment="texlive-crossrefware-bin is &lt;2017.20170520.svn43866-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225659" version="1" comment="texlive-crossword is &lt;2017.133.1.9svn32657-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225660" version="1" comment="texlive-crosswrd is &lt;2017.133.3.0svn16896-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225661" version="1" comment="texlive-cryptocode is &lt;2017.133.0.0.1svn37019-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225662" version="1" comment="texlive-cryst is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225663" version="1" comment="texlive-cryst-fonts is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225664" version="1" comment="texlive-cs is &lt;2017.133.svn41553-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225665" version="1" comment="texlive-cs-fonts is &lt;2017.133.svn41553-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225666" version="1" comment="texlive-csbulletin is &lt;2017.133.1.1svn43277-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225667" version="1" comment="texlive-cslatex is &lt;2017.133.svn40855-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225668" version="1" comment="texlive-cslatex-bin is &lt;2017.20170520.svn3006-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225669" version="1" comment="texlive-csplain is &lt;2017.133.svn44321-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225670" version="1" comment="texlive-csplain-bin is &lt;2017.20170520.svn33902-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225671" version="1" comment="texlive-csquotes is &lt;2017.133.5.2bsvn43469-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225672" version="1" comment="texlive-csquotes-de is &lt;2017.133.1.01svn23371-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225673" version="1" comment="texlive-css-colors is &lt;2017.133.1.02svn43961-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225674" version="1" comment="texlive-cstex is &lt;2017.133.svn41301-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225675" version="1" comment="texlive-cstypo is &lt;2017.133.0.0.03svn41986-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225676" version="1" comment="texlive-csvsimple is &lt;2017.133.1.20svn41597-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225677" version="1" comment="texlive-ctable is &lt;2017.133.1.31svn38672-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225678" version="1" comment="texlive-ctablestack is &lt;2017.133.1.0svn38514-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225679" version="1" comment="texlive-ctan_chk is &lt;2017.133.1.0svn36304-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225680" version="1" comment="texlive-ctanify is &lt;2017.133.1.9.1svn44129-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225681" version="1" comment="texlive-ctanify-bin is &lt;2017.20170520.svn24061-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225682" version="1" comment="texlive-ctanupload is &lt;2017.133.1.2csvn26313-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225683" version="1" comment="texlive-ctanupload-bin is &lt;2017.20170520.svn23866-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225684" version="1" comment="texlive-ctex is &lt;2017.133.2.4.9svn43669-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225685" version="1" comment="texlive-ctex-faq is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225686" version="1" comment="texlive-ctib is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225687" version="1" comment="texlive-ctie is &lt;2017.133.1.1svn44166-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225688" version="1" comment="texlive-ctie-bin is &lt;2017.20170520.svn44143-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225689" version="1" comment="texlive-cuisine is &lt;2017.133.0.0.7svn34453-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225690" version="1" comment="texlive-currency is &lt;2017.133.0.0.1svn44489-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225691" version="1" comment="texlive-currfile is &lt;2017.133.0.0.7csvn40725-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225692" version="1" comment="texlive-currvita is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225693" version="1" comment="texlive-cursolatex is &lt;2017.133.svn24139-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225694" version="1" comment="texlive-curve is &lt;2017.133.1.16svn20745-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225695" version="1" comment="texlive-curve2e is &lt;2017.133.1.60svn37839-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225696" version="1" comment="texlive-curves is &lt;2017.133.1.53svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225697" version="1" comment="texlive-custom-bib is &lt;2017.133.4.33svn24729-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225698" version="1" comment="texlive-cutwin is &lt;2017.133.0.0.1svn29803-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225699" version="1" comment="texlive-cv is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225700" version="1" comment="texlive-cv4tw is &lt;2017.133.0.0.2svn34577-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225701" version="1" comment="texlive-cweb is &lt;2017.133.3.64bsvn44166-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225702" version="1" comment="texlive-cweb-bin is &lt;2017.20170520.svn44143-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225703" version="1" comment="texlive-cweb-latex is &lt;2017.133.svn28878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225704" version="1" comment="texlive-cyber is &lt;2017.133.2.1svn37658-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225705" version="1" comment="texlive-cybercic is &lt;2017.133.2.1svn37659-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225706" version="1" comment="texlive-cyklop is &lt;2017.133.0.0.915svn18651-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225707" version="1" comment="texlive-cyklop-fonts is &lt;2017.133.0.0.915svn18651-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225708" version="1" comment="texlive-cyrillic is &lt;2017.133.svn42428-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225709" version="1" comment="texlive-cyrillic-bin is &lt;2017.133.svn44166-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225710" version="1" comment="texlive-cyrillic-bin-bin is &lt;2017.20170520.svn29741-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225711" version="1" comment="texlive-cyrplain is &lt;2017.133.svn29349-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225712" version="1" comment="texlive-dad is &lt;2017.133.1.1svn35362-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225713" version="1" comment="texlive-dad-fonts is &lt;2017.133.1.1svn35362-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225714" version="1" comment="texlive-dancers is &lt;2017.133.svn13293-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225715" version="1" comment="texlive-dantelogo is &lt;2017.133.0.0.03svn38599-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225716" version="1" comment="texlive-dantelogo-fonts is &lt;2017.133.0.0.03svn38599-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225717" version="1" comment="texlive-dashbox is &lt;2017.133.1.14svn23425-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225718" version="1" comment="texlive-dashrule is &lt;2017.133.1.3svn29579-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225719" version="1" comment="texlive-dashundergaps is &lt;2017.133.1.2svn23373-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225720" version="1" comment="texlive-dataref is &lt;2017.133.0.0.6svn42883-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225721" version="1" comment="texlive-datatool is &lt;2017.133.2.27svn41772-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225722" version="1" comment="texlive-dateiliste is &lt;2017.133.0.0.6svn27974-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225723" version="1" comment="texlive-datenumber is &lt;2017.133.0.0.02svn18951-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225724" version="1" comment="texlive-datetime is &lt;2017.133.2.60svn36650-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225725" version="1" comment="texlive-datetime2 is &lt;2017.133.1.5.2svn41686-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225726" version="1" comment="texlive-datetime2-bahasai is &lt;2017.133.1.0svn36682-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225727" version="1" comment="texlive-datetime2-basque is &lt;2017.133.1.2svn38287-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225728" version="1" comment="texlive-datetime2-breton is &lt;2017.133.1.0svn36682-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225729" version="1" comment="texlive-datetime2-bulgarian is &lt;2017.133.1.0svn36682-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225730" version="1" comment="texlive-datetime2-catalan is &lt;2017.133.1.0svn36682-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225731" version="1" comment="texlive-datetime2-croatian is &lt;2017.133.1.0svn36682-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225732" version="1" comment="texlive-datetime2-czech is &lt;2017.133.1.0svn36682-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225733" version="1" comment="texlive-datetime2-danish is &lt;2017.133.1.0svn36682-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225734" version="1" comment="texlive-datetime2-dutch is &lt;2017.133.1.0svn36682-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225735" version="1" comment="texlive-datetime2-en-fulltext is &lt;2017.133.1.0svn36705-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225736" version="1" comment="texlive-datetime2-english is &lt;2017.133.1.04svn39991-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225737" version="1" comment="texlive-datetime2-esperanto is &lt;2017.133.1.0svn36682-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225738" version="1" comment="texlive-datetime2-estonian is &lt;2017.133.1.0svn36682-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225739" version="1" comment="texlive-datetime2-finnish is &lt;2017.133.1.1svn40237-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225740" version="1" comment="texlive-datetime2-french is &lt;2017.133.1.02svn43742-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225741" version="1" comment="texlive-datetime2-galician is &lt;2017.133.1.0svn36692-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225742" version="1" comment="texlive-datetime2-german is &lt;2017.133.1.1svn43452-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225743" version="1" comment="texlive-datetime2-greek is &lt;2017.133.1.0svn36692-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225744" version="1" comment="texlive-datetime2-hebrew is &lt;2017.133.1.0svn36692-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225745" version="1" comment="texlive-datetime2-icelandic is &lt;2017.133.1.0svn36692-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225746" version="1" comment="texlive-datetime2-irish is &lt;2017.133.1.0svn36635-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225747" version="1" comment="texlive-datetime2-it-fulltext is &lt;2017.133.1.6svn38093-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225748" version="1" comment="texlive-datetime2-italian is &lt;2017.133.1.3svn37146-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225749" version="1" comment="texlive-datetime2-latin is &lt;2017.133.1.0svn36692-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225750" version="1" comment="texlive-datetime2-lsorbian is &lt;2017.133.1.0svn36692-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225751" version="1" comment="texlive-datetime2-magyar is &lt;2017.133.1.0svn36692-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225752" version="1" comment="texlive-datetime2-norsk is &lt;2017.133.1.0svn36692-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225753" version="1" comment="texlive-datetime2-polish is &lt;2017.133.1.0svn36692-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225754" version="1" comment="texlive-datetime2-portuges is &lt;2017.133.1.0svn36670-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225755" version="1" comment="texlive-datetime2-romanian is &lt;2017.133.1.01svn43743-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225756" version="1" comment="texlive-datetime2-russian is &lt;2017.133.1.0svn36692-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225757" version="1" comment="texlive-datetime2-samin is &lt;2017.133.1.0svn36692-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225758" version="1" comment="texlive-datetime2-scottish is &lt;2017.133.1.0svn36625-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225759" version="1" comment="texlive-datetime2-serbian is &lt;2017.133.1.0svn36699-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225760" version="1" comment="texlive-datetime2-slovak is &lt;2017.133.1.0svn36700-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225761" version="1" comment="texlive-datetime2-slovene is &lt;2017.133.1.0svn36700-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225762" version="1" comment="texlive-datetime2-spanish is &lt;2017.133.1.0svn36661-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225763" version="1" comment="texlive-datetime2-swedish is &lt;2017.133.1.0svn36700-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225764" version="1" comment="texlive-datetime2-turkish is &lt;2017.133.1.0svn36700-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225765" version="1" comment="texlive-datetime2-ukrainian is &lt;2017.133.1.1svn44562-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225766" version="1" comment="texlive-datetime2-usorbian is &lt;2017.133.1.0svn36700-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225767" version="1" comment="texlive-datetime2-welsh is &lt;2017.133.1.0svn36636-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225768" version="1" comment="texlive-dblfloatfix is &lt;2017.133.1.0asvn28983-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225769" version="1" comment="texlive-dccpaper is &lt;2017.133.1.5svn41804-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225770" version="1" comment="texlive-dcpic is &lt;2017.133.5.0.0svn30206-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225771" version="1" comment="texlive-de-macro is &lt;2017.133.1.3svn26355-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225772" version="1" comment="texlive-de-macro-bin is &lt;2017.20170520.svn17399-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225773" version="1" comment="texlive-decimal is &lt;2017.133.svn23374-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225774" version="1" comment="texlive-decorule is &lt;2017.133.0.0.6svn23487-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225775" version="1" comment="texlive-dehyph-exptl is &lt;2017.133.0.0.41svn43666-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225776" version="1" comment="texlive-dejavu is &lt;2017.133.2.34svn31771-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225777" version="1" comment="texlive-dejavu-fonts is &lt;2017.133.2.34svn31771-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225778" version="1" comment="texlive-delim is &lt;2017.133.1.0svn23974-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225779" version="1" comment="texlive-delimseasy is &lt;2017.133.2.0svn39589-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225780" version="1" comment="texlive-delimset is &lt;2017.133.1.0svn42415-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225781" version="1" comment="texlive-delimtxt is &lt;2017.133.svn16549-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225782" version="1" comment="texlive-denisbdoc is &lt;2017.133.0.0.7svn42829-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225783" version="1" comment="texlive-detex is &lt;2017.133.svn44166-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225784" version="1" comment="texlive-detex-bin is &lt;2017.20170520.svn44143-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225785" version="1" comment="texlive-dhua is &lt;2017.133.0.0.11svn24035-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225786" version="1" comment="texlive-diadia is &lt;2017.133.1.1svn37656-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225787" version="1" comment="texlive-diadia-bin is &lt;2017.20170520.svn37645-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225788" version="1" comment="texlive-diagbox is &lt;2017.133.2.2svn42843-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225789" version="1" comment="texlive-diagmac2 is &lt;2017.133.2.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225790" version="1" comment="texlive-diagnose is &lt;2017.133.0.0.2svn19387-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225791" version="1" comment="texlive-dialogl is &lt;2017.133.svn28946-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225792" version="1" comment="texlive-dice is &lt;2017.133.svn28501-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225793" version="1" comment="texlive-dichokey is &lt;2017.133.svn17192-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225794" version="1" comment="texlive-dickimaw is &lt;2017.133.svn32925-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225795" version="1" comment="texlive-dictsym is &lt;2017.133.svn20031-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225796" version="1" comment="texlive-dictsym-fonts is &lt;2017.133.svn20031-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225797" version="1" comment="texlive-diffcoeff is &lt;2017.133.1.0svn41554-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225798" version="1" comment="texlive-digiconfigs is &lt;2017.133.0.0.5svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225799" version="1" comment="texlive-din1505 is &lt;2017.133.svn19441-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225800" version="1" comment="texlive-dinat is &lt;2017.133.2.5svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225801" version="1" comment="texlive-dinbrief is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225802" version="1" comment="texlive-dingbat is &lt;2017.133.1.0svn27918-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225803" version="1" comment="texlive-directory is &lt;2017.133.1.20svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225804" version="1" comment="texlive-dirtree is &lt;2017.133.0.0.32svn42428-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225805" version="1" comment="texlive-dirtytalk is &lt;2017.133.1.0svn20520-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225806" version="1" comment="texlive-disser is &lt;2017.133.1.5.0svn43417-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225807" version="1" comment="texlive-dithesis is &lt;2017.133.0.0.2svn34295-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225808" version="1" comment="texlive-dk-bib is &lt;2017.133.0.0.6svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225809" version="1" comment="texlive-dlfltxb is &lt;2017.133.svn17337-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225810" version="1" comment="texlive-dnaseq is &lt;2017.133.0.0.01svn17194-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225811" version="1" comment="texlive-dnp is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225812" version="1" comment="texlive-doc-pictex is &lt;2017.133.svn24927-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225813" version="1" comment="texlive-docbytex is &lt;2017.133.svn34294-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225814" version="1" comment="texlive-doclicense is &lt;2017.133.1.5.0svn40723-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225815" version="1" comment="texlive-docmfp is &lt;2017.133.1.2dsvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225816" version="1" comment="texlive-docmute is &lt;2017.133.1.4svn25741-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225817" version="1" comment="texlive-docsurvey is &lt;2017.133.svn44131-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225818" version="1" comment="texlive-doctools is &lt;2017.133.0.0.1svn34474-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225819" version="1" comment="texlive-documentation is &lt;2017.133.0.0.1svn34521-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225820" version="1" comment="texlive-doi is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225821" version="1" comment="texlive-doipubmed is &lt;2017.133.1.01svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225822" version="1" comment="texlive-dosepsbin is &lt;2017.133.1.2svn29752-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225823" version="1" comment="texlive-dosepsbin-bin is &lt;2017.20170520.svn24759-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225824" version="1" comment="texlive-dot2texi is &lt;2017.133.3.0svn26237-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225825" version="1" comment="texlive-dotarrow is &lt;2017.133.0.0.01asvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225826" version="1" comment="texlive-dotseqn is &lt;2017.133.1.1svn17195-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225827" version="1" comment="texlive-dottex is &lt;2017.133.0.0.6svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225828" version="1" comment="texlive-doublestroke is &lt;2017.133.1.111svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225829" version="1" comment="texlive-doublestroke-fonts is &lt;2017.133.1.111svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225830" version="1" comment="texlive-dowith is &lt;2017.133.r0.32svn38860-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225831" version="1" comment="texlive-download is &lt;2017.133.1.1svn30695-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225832" version="1" comment="texlive-dox is &lt;2017.133.2.3svn43060-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225833" version="1" comment="texlive-dozenal is &lt;2017.133.7.0svn42608-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225834" version="1" comment="texlive-dozenal-fonts is &lt;2017.133.7.0svn42608-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225835" version="1" comment="texlive-dpfloat is &lt;2017.133.svn17196-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225836" version="1" comment="texlive-dprogress is &lt;2017.133.0.0.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225837" version="1" comment="texlive-drac is &lt;2017.133.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225838" version="1" comment="texlive-draftcopy is &lt;2017.133.2.16svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225839" version="1" comment="texlive-draftfigure is &lt;2017.133.0.0.1svn44269-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225840" version="1" comment="texlive-draftwatermark is &lt;2017.133.1.2svn37498-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225841" version="1" comment="texlive-dramatist is &lt;2017.133.1.2esvn35866-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225842" version="1" comment="texlive-dratex is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225843" version="1" comment="texlive-drawmatrix is &lt;2017.133.1.5.0svn44471-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225844" version="1" comment="texlive-drawstack is &lt;2017.133.svn28582-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225845" version="1" comment="texlive-drm is &lt;2017.133.4.4svn38157-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225846" version="1" comment="texlive-drm-fonts is &lt;2017.133.4.4svn38157-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225847" version="1" comment="texlive-droid is &lt;2017.133.2.1svn23912-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225848" version="1" comment="texlive-droid-fonts is &lt;2017.133.2.1svn23912-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225849" version="1" comment="texlive-droit-fr is &lt;2017.133.1.2svn39802-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225850" version="1" comment="texlive-drs is &lt;2017.133.1.1bsvn19232-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225851" version="1" comment="texlive-drv is &lt;2017.133.0.0.97svn29349-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225852" version="1" comment="texlive-dsptricks is &lt;2017.133.1.0svn34724-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225853" version="1" comment="texlive-dtk is &lt;2017.133.2.07asvn44524-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225854" version="1" comment="texlive-dtl is &lt;2017.133.0.0.6.1svn44166-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225855" version="1" comment="texlive-dtl-bin is &lt;2017.20170520.svn44143-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225856" version="1" comment="texlive-dtxdescribe is &lt;2017.133.0.0.10svn42661-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225857" version="1" comment="texlive-dtxgallery is &lt;2017.133.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225858" version="1" comment="texlive-dtxgen is &lt;2017.133.1.07svn38419-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225859" version="1" comment="texlive-dtxgen-bin is &lt;2017.20170520.svn29031-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225860" version="1" comment="texlive-dtxtut is &lt;2017.133.2.1svn38375-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225861" version="1" comment="texlive-duerer is &lt;2017.133.svn20741-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225862" version="1" comment="texlive-duerer-latex is &lt;2017.133.1.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225863" version="1" comment="texlive-duotenzor is &lt;2017.133.1.00svn18728-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225864" version="1" comment="texlive-dutchcal is &lt;2017.133.1.0svn23448-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225865" version="1" comment="texlive-dutchcal-fonts is &lt;2017.133.1.0svn23448-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225866" version="1" comment="texlive-dvdcoll is &lt;2017.133.1.1asvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225867" version="1" comment="texlive-dvgloss is &lt;2017.133.0.0.1svn29103-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225868" version="1" comment="texlive-dviasm is &lt;2017.133.svn36814-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225869" version="1" comment="texlive-dviasm-bin is &lt;2017.20170520.svn8329-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225870" version="1" comment="texlive-dvicopy is &lt;2017.133.1.5svn44166-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225871" version="1" comment="texlive-dvicopy-bin is &lt;2017.20170520.svn44143-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225872" version="1" comment="texlive-dvidvi is &lt;2017.133.svn44166-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225873" version="1" comment="texlive-dvidvi-bin is &lt;2017.20170520.svn44143-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225874" version="1" comment="texlive-dviincl is &lt;2017.133.1.00svn29349-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225875" version="1" comment="texlive-dviinfox is &lt;2017.133.1.04svn44515-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225876" version="1" comment="texlive-dviinfox-bin is &lt;2017.20170520.svn44515-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225877" version="1" comment="texlive-dviljk is &lt;2017.133.svn44166-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225878" version="1" comment="texlive-dviljk-bin is &lt;2017.20170520.svn44143-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225879" version="1" comment="texlive-dvipdfmx is &lt;2017.133.svn44224-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225880" version="1" comment="texlive-dvipdfmx-bin is &lt;2017.20170520.svn40273-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225881" version="1" comment="texlive-dvipng is &lt;2017.133.1.15svn44167-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225882" version="1" comment="texlive-dvipng-bin is &lt;2017.20170520.svn44143-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225883" version="1" comment="texlive-dvipos is &lt;2017.133.svn44166-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225884" version="1" comment="texlive-dvipos-bin is &lt;2017.20170520.svn44143-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225885" version="1" comment="texlive-dvips is &lt;2017.133.svn44167-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225886" version="1" comment="texlive-dvips-bin is &lt;2017.20170520.svn44143-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225887" version="1" comment="texlive-dvipsconfig is &lt;2017.133.1.6svn13293-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225888" version="1" comment="texlive-dvisvgm is &lt;2017.133.2.1.3svn40768-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225889" version="1" comment="texlive-dvisvgm-bin is &lt;2017.20170520.svn40987-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225890" version="1" comment="texlive-dynamicnumber is &lt;2017.133.0.0.1.3svn38726-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225891" version="1" comment="texlive-dynblocks is &lt;2017.133.0.0.2bsvn35193-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225892" version="1" comment="texlive-dyntree is &lt;2017.133.1.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225893" version="1" comment="texlive-e-french is &lt;2017.133.6.0svn38742-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225894" version="1" comment="texlive-ean is &lt;2017.133.svn20851-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225895" version="1" comment="texlive-ean13isbn is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225896" version="1" comment="texlive-easy is &lt;2017.133.0.0.99svn19440-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225897" version="1" comment="texlive-easy-todo is &lt;2017.133.svn32677-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225898" version="1" comment="texlive-easyfig is &lt;2017.133.1.2svn26424-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225899" version="1" comment="texlive-easyformat is &lt;2017.133.1.4.0svn44543-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225900" version="1" comment="texlive-easylist is &lt;2017.133.1.3svn32661-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225901" version="1" comment="texlive-easyreview is &lt;2017.133.1.0svn38352-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225902" version="1" comment="texlive-ebezier is &lt;2017.133.4svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225903" version="1" comment="texlive-ebgaramond is &lt;2017.133.0.0.16svn35662-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225904" version="1" comment="texlive-ebgaramond-fonts is &lt;2017.133.0.0.16svn35662-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225905" version="1" comment="texlive-ebgaramond-maths is &lt;2017.133.1.1svn35701-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225906" version="1" comment="texlive-ebong is &lt;2017.133.svn26313-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225907" version="1" comment="texlive-ebong-bin is &lt;2017.20170520.svn21000-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225908" version="1" comment="texlive-ebook is &lt;2017.133.svn29466-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225909" version="1" comment="texlive-ebproof is &lt;2017.133.2.0svn44392-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225910" version="1" comment="texlive-ebsthesis is &lt;2017.133.1.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225911" version="1" comment="texlive-ec is &lt;2017.133.1.0svn25033-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225912" version="1" comment="texlive-ecc is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225913" version="1" comment="texlive-ecclesiastic is &lt;2017.133.0.0.3svn38172-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225914" version="1" comment="texlive-ecgdraw is &lt;2017.133.0.0.1svn41617-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225915" version="1" comment="texlive-ecltree is &lt;2017.133.1.1asvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225916" version="1" comment="texlive-eco is &lt;2017.133.1.3svn29349-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225917" version="1" comment="texlive-ecobiblatex is &lt;2017.133.1.0svn39233-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225918" version="1" comment="texlive-econometrics is &lt;2017.133.1.0svn39396-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225919" version="1" comment="texlive-economic is &lt;2017.133.svn32639-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225920" version="1" comment="texlive-ecv is &lt;2017.133.0.0.3svn24928-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225921" version="1" comment="texlive-ed is &lt;2017.133.1.8svn25231-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225922" version="1" comment="texlive-edfnotes is &lt;2017.133.0.0.6bsvn21540-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225923" version="1" comment="texlive-edmac is &lt;2017.133.3.17svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225924" version="1" comment="texlive-edmargin is &lt;2017.133.1.2svn27599-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225925" version="1" comment="texlive-ednotes is &lt;2017.133.1.3asvn35829-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225926" version="1" comment="texlive-eemeir is &lt;2017.133.1.1bsvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225927" version="1" comment="texlive-eepic is &lt;2017.133.1.1esvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225928" version="1" comment="texlive-efbox is &lt;2017.133.1.0svn33236-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225929" version="1" comment="texlive-egameps is &lt;2017.133.1.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225930" version="1" comment="texlive-egplot is &lt;2017.133.1.02asvn20617-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225931" version="1" comment="texlive-eiad is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225932" version="1" comment="texlive-eiad-ltx is &lt;2017.133.1.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225933" version="1" comment="texlive-eijkhout is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225934" version="1" comment="texlive-einfuehrung is &lt;2017.133.svn29349-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225935" version="1" comment="texlive-einfuehrung2 is &lt;2017.133.svn39153-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225936" version="1" comment="texlive-ejpecp is &lt;2017.133.1.5svn42003-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225937" version="1" comment="texlive-ekaia is &lt;2017.133.1.04svn42578-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225938" version="1" comment="texlive-elbioimp is &lt;2017.133.1.2svn21758-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225939" version="1" comment="texlive-electrum is &lt;2017.133.1.005_bsvn19705-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225940" version="1" comment="texlive-electrum-fonts is &lt;2017.133.1.005_bsvn19705-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225941" version="1" comment="texlive-eledform is &lt;2017.133.1.1asvn38114-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225942" version="1" comment="texlive-eledmac is &lt;2017.133.1.24.11svn38639-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225943" version="1" comment="texlive-elements is &lt;2017.133.0.0.2svn41161-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225944" version="1" comment="texlive-ellipse is &lt;2017.133.1.0svn39025-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225945" version="1" comment="texlive-ellipsis is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225946" version="1" comment="texlive-elmath is &lt;2017.133.1.2svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225947" version="1" comment="texlive-elocalloc is &lt;2017.133.0.0.03svn42712-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225948" version="1" comment="texlive-elpres is &lt;2017.133.0.0.3svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225949" version="1" comment="texlive-elsarticle is &lt;2017.133.1.20svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225950" version="1" comment="texlive-elteikthesis is &lt;2017.133.1.2svn22513-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225951" version="1" comment="texlive-eltex is &lt;2017.133.2.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225952" version="1" comment="texlive-elvish is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225953" version="1" comment="texlive-elzcards is &lt;2017.133.1.20svn37063-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225954" version="1" comment="texlive-emarks is &lt;2017.133.1.0svn24504-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225955" version="1" comment="texlive-embedall is &lt;2017.133.1.0svn31903-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225956" version="1" comment="texlive-embrac is &lt;2017.133.0.0.6dsvn39334-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225957" version="1" comment="texlive-emf is &lt;2017.133.1svn42023-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225958" version="1" comment="texlive-emisa is &lt;2017.133.2.1.1svn41731-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225959" version="1" comment="texlive-emp is &lt;2017.133.svn23483-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225960" version="1" comment="texlive-emptypage is &lt;2017.133.1.2svn18064-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225961" version="1" comment="texlive-emulateapj is &lt;2017.133.svn28469-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225962" version="1" comment="texlive-enctex is &lt;2017.133.svn34957-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225963" version="1" comment="texlive-encxvlna is &lt;2017.133.1.1svn34087-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225964" version="1" comment="texlive-endfloat is &lt;2017.133.2.5dsvn24962-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225965" version="1" comment="texlive-endheads is &lt;2017.133.1.6svn43750-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225966" version="1" comment="texlive-endiagram is &lt;2017.133.0.0.1dsvn34486-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225967" version="1" comment="texlive-endnotes is &lt;2017.133.svn17197-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225968" version="1" comment="texlive-engpron is &lt;2017.133.2svn16558-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225969" version="1" comment="texlive-engrec is &lt;2017.133.1.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225970" version="1" comment="texlive-engtlc is &lt;2017.133.3.2svn28571-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225971" version="1" comment="texlive-enigma is &lt;2017.133.0.0.1svn29802-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225972" version="1" comment="texlive-enotez is &lt;2017.133.0.0.9asvn44024-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225973" version="1" comment="texlive-enumitem is &lt;2017.133.3.5.2svn24146-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225974" version="1" comment="texlive-enumitem-zref is &lt;2017.133.1.8svn21472-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225975" version="1" comment="texlive-envbig is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225976" version="1" comment="texlive-environ is &lt;2017.133.0.0.3svn33821-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225977" version="1" comment="texlive-envlab is &lt;2017.133.1.2svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225978" version="1" comment="texlive-epigrafica is &lt;2017.133.1.01svn17210-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225979" version="1" comment="texlive-epigrafica-fonts is &lt;2017.133.1.01svn17210-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225980" version="1" comment="texlive-epigram is &lt;2017.133.svn20513-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225981" version="1" comment="texlive-epigraph is &lt;2017.133.1.5csvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225982" version="1" comment="texlive-epiolmec is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225983" version="1" comment="texlive-epiolmec-fonts is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225984" version="1" comment="texlive-eplain is &lt;2017.133.3.8svn41154-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225985" version="1" comment="texlive-eplain-bin is &lt;2017.20170520.svn3006-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225986" version="1" comment="texlive-epsdice is &lt;2017.133.2.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225987" version="1" comment="texlive-epsf is &lt;2017.133.2.7.4svn21461-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225988" version="1" comment="texlive-epsf-dvipdfmx is &lt;2017.133.2014svn35575-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225989" version="1" comment="texlive-epsincl is &lt;2017.133.0.0.2svn29349-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225990" version="1" comment="texlive-epslatex-fr is &lt;2017.133.svn19440-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225991" version="1" comment="texlive-epspdf is &lt;2017.133.0.0.6.3svn40917-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225992" version="1" comment="texlive-epspdf-bin is &lt;2017.20170520.svn29050-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225993" version="1" comment="texlive-epspdfconversion is &lt;2017.133.0.0.61svn18703-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225994" version="1" comment="texlive-epstopdf is &lt;2017.133.2.26svn42905-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225995" version="1" comment="texlive-epstopdf-bin is &lt;2017.20170520.svn18336-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225996" version="1" comment="texlive-eqell is &lt;2017.133.svn22931-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225997" version="1" comment="texlive-eqlist is &lt;2017.133.2.1svn32257-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225998" version="1" comment="texlive-eqnalign is &lt;2017.133.1.0asvn43278-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009225999" version="1" comment="texlive-eqname is &lt;2017.133.svn20678-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226000" version="1" comment="texlive-eqnarray is &lt;2017.133.1.3svn20641-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226001" version="1" comment="texlive-eqparbox is &lt;2017.133.4.0svn29419-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226002" version="1" comment="texlive-erdc is &lt;2017.133.1.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226003" version="1" comment="texlive-erewhon is &lt;2017.133.1.08svn43506-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226004" version="1" comment="texlive-erewhon-fonts is &lt;2017.133.1.08svn43506-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226005" version="1" comment="texlive-errata is &lt;2017.133.0.0.3svn42428-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226006" version="1" comment="texlive-es-tex-faq is &lt;2017.133.1.97svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226007" version="1" comment="texlive-esami is &lt;2017.133.2.1svn41774-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226008" version="1" comment="texlive-esdiff is &lt;2017.133.1.2svn21385-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226009" version="1" comment="texlive-esint is &lt;2017.133.1.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226010" version="1" comment="texlive-esint-type1 is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226011" version="1" comment="texlive-esint-type1-fonts is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226012" version="1" comment="texlive-esk is &lt;2017.133.1.0svn18115-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226013" version="1" comment="texlive-eskd is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226014" version="1" comment="texlive-eskdx is &lt;2017.133.0.0.98svn29235-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226015" version="1" comment="texlive-eso-pic is &lt;2017.133.2.0gsvn37925-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226016" version="1" comment="texlive-esrelation is &lt;2017.133.svn37236-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226017" version="1" comment="texlive-esrelation-fonts is &lt;2017.133.svn37236-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226018" version="1" comment="texlive-esstix is &lt;2017.133.1.0svn22426-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226019" version="1" comment="texlive-esstix-fonts is &lt;2017.133.1.0svn22426-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226020" version="1" comment="texlive-estcpmm is &lt;2017.133.0.0.4svn17335-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226021" version="1" comment="texlive-esvect is &lt;2017.133.1.3svn32098-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226022" version="1" comment="texlive-esvect-fonts is &lt;2017.133.1.3svn32098-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226023" version="1" comment="texlive-etaremune is &lt;2017.133.1.2svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226024" version="1" comment="texlive-etdipa is &lt;2017.133.2.6svn36354-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226025" version="1" comment="texlive-etex is &lt;2017.133.svn37057-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226026" version="1" comment="texlive-etex-pkg is &lt;2017.133.2.7svn41784-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226027" version="1" comment="texlive-etextools is &lt;2017.133.3.1415926svn20694-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226028" version="1" comment="texlive-ethiop is &lt;2017.133.0.0.7svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226029" version="1" comment="texlive-ethiop-t1 is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226030" version="1" comment="texlive-ethiop-t1-fonts is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226031" version="1" comment="texlive-etoc is &lt;2017.133.1.08isvn42182-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226032" version="1" comment="texlive-etoolbox is &lt;2017.133.2.4svn42855-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226033" version="1" comment="texlive-etoolbox-de is &lt;2017.133.1svn21906-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226034" version="1" comment="texlive-euenc is &lt;2017.133.0.0.1hsvn19795-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226035" version="1" comment="texlive-eukdate is &lt;2017.133.1.04svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226036" version="1" comment="texlive-euler is &lt;2017.133.2.5svn42428-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226037" version="1" comment="texlive-eulerpx is &lt;2017.133.0.0.2.1svn43735-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226038" version="1" comment="texlive-eulervm is &lt;2017.133.4.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226039" version="1" comment="texlive-euro is &lt;2017.133.1.1svn22191-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226040" version="1" comment="texlive-euro-ce is &lt;2017.133.3.0bsvn25714-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226041" version="1" comment="texlive-europasscv is &lt;2017.133.svn43033-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226042" version="1" comment="texlive-europecv is &lt;2017.133.svn34454-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226043" version="1" comment="texlive-eurosym is &lt;2017.133.1.4_subrfixsvn17265-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226044" version="1" comment="texlive-eurosym-fonts is &lt;2017.133.1.4_subrfixsvn17265-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226045" version="1" comment="texlive-euxm is &lt;2017.133.svn20202-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226046" version="1" comment="texlive-everyhook is &lt;2017.133.1.2svn35675-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226047" version="1" comment="texlive-everypage is &lt;2017.133.1.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226048" version="1" comment="texlive-exam is &lt;2017.133.2.5svn37279-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226049" version="1" comment="texlive-exam-n is &lt;2017.133.1.1.4svn42755-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226050" version="1" comment="texlive-examdesign is &lt;2017.133.1.101svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226051" version="1" comment="texlive-example is &lt;2017.133.svn33398-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226052" version="1" comment="texlive-examplep is &lt;2017.133.0.0.04svn16916-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226053" version="1" comment="texlive-exceltex is &lt;2017.133.0.0.5.1svn26313-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226054" version="1" comment="texlive-exceltex-bin is &lt;2017.20170520.svn25860-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226055" version="1" comment="texlive-excludeonly is &lt;2017.133.1.0svn17262-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226056" version="1" comment="texlive-exercise is &lt;2017.133.1.6svn35417-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226057" version="1" comment="texlive-exercises is &lt;2017.133.1.0svn42428-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226058" version="1" comment="texlive-exp-testopt is &lt;2017.133.0.0.3svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226059" version="1" comment="texlive-expdlist is &lt;2017.133.2.4svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226060" version="1" comment="texlive-expex is &lt;2017.133.5.1bsvn44499-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226061" version="1" comment="texlive-export is &lt;2017.133.1.8svn27206-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226062" version="1" comment="texlive-expressg is &lt;2017.133.1.5svn29349-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226063" version="1" comment="texlive-exsheets is &lt;2017.133.0.0.21isvn43188-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226064" version="1" comment="texlive-exsol is &lt;2017.133.1.2svn41377-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226065" version="1" comment="texlive-extarrows is &lt;2017.133.1.0bsvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226066" version="1" comment="texlive-exteps is &lt;2017.133.0.0.41svn19859-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226067" version="1" comment="texlive-extpfeil is &lt;2017.133.0.0.4svn16243-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226068" version="1" comment="texlive-extract is &lt;2017.133.1.8svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226069" version="1" comment="texlive-extsizes is &lt;2017.133.1.4asvn17263-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226070" version="1" comment="texlive-facsimile is &lt;2017.133.1.0svn21328-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226071" version="1" comment="texlive-factura is &lt;2017.133.3.00svn43470-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226072" version="1" comment="texlive-facture is &lt;2017.133.1.2.2svn43865-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226073" version="1" comment="texlive-faktor is &lt;2017.133.0.0.1bsvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226074" version="1" comment="texlive-fancybox is &lt;2017.133.1.4svn18304-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226075" version="1" comment="texlive-fancyhdr is &lt;2017.133.3.9svn44479-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226076" version="1" comment="texlive-fancyhdr-it is &lt;2017.133.svn21912-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226077" version="1" comment="texlive-fancylabel is &lt;2017.133.1.0svn34684-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226078" version="1" comment="texlive-fancynum is &lt;2017.133.0.0.92svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226079" version="1" comment="texlive-fancypar is &lt;2017.133.1.1svn18018-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226080" version="1" comment="texlive-fancyref is &lt;2017.133.0.0.9csvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226081" version="1" comment="texlive-fancyslides is &lt;2017.133.1.0svn36263-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226082" version="1" comment="texlive-fancytabs is &lt;2017.133.1.9svn41549-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226083" version="1" comment="texlive-fancytooltips is &lt;2017.133.1.8svn27129-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226084" version="1" comment="texlive-fancyvrb is &lt;2017.133.2.8svn18492-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226085" version="1" comment="texlive-fandol is &lt;2017.133.0.0.3svn37889-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226086" version="1" comment="texlive-fandol-fonts is &lt;2017.133.0.0.3svn37889-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226087" version="1" comment="texlive-fast-diagram is &lt;2017.133.1.1svn29264-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226088" version="1" comment="texlive-fbb is &lt;2017.133.1.12svn43464-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226089" version="1" comment="texlive-fbb-fonts is &lt;2017.133.1.12svn43464-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226090" version="1" comment="texlive-fbithesis is &lt;2017.133.1.2msvn21340-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226091" version="1" comment="texlive-fbs is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226092" version="1" comment="texlive-fc is &lt;2017.133.1.4svn32796-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226093" version="1" comment="texlive-fcavtex is &lt;2017.133.1.1svn38074-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226094" version="1" comment="texlive-fcltxdoc is &lt;2017.133.1.0svn24500-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226095" version="1" comment="texlive-fcolumn is &lt;2017.133.1.1.1svn38489-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226096" version="1" comment="texlive-fdsymbol is &lt;2017.133.0.0.8svn26722-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226097" version="1" comment="texlive-fdsymbol-fonts is &lt;2017.133.0.0.8svn26722-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226098" version="1" comment="texlive-featpost is &lt;2017.133.0.0.8.8svn35346-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226099" version="1" comment="texlive-fei is &lt;2017.133.3.0.6svn43630-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226100" version="1" comment="texlive-fenixpar is &lt;2017.133.0.0.92svn24730-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226101" version="1" comment="texlive-fetamont is &lt;2017.133.svn43812-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226102" version="1" comment="texlive-fetamont-fonts is &lt;2017.133.svn43812-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226103" version="1" comment="texlive-feupphdteses is &lt;2017.133.4.0svn30962-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226104" version="1" comment="texlive-feyn is &lt;2017.133.0.0.3.3svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226105" version="1" comment="texlive-feynmf is &lt;2017.133.1.08svn17259-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226106" version="1" comment="texlive-feynmp-auto is &lt;2017.133.1.1svn30223-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226107" version="1" comment="texlive-ffslides is &lt;2017.133.svn38895-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226108" version="1" comment="texlive-fge is &lt;2017.133.1.25svn37628-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226109" version="1" comment="texlive-fge-fonts is &lt;2017.133.1.25svn37628-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226110" version="1" comment="texlive-fgruler is &lt;2017.133.1.0svn42966-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226111" version="1" comment="texlive-fibeamer is &lt;2017.133.1.1.7svn44239-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226112" version="1" comment="texlive-fifinddo-info is &lt;2017.133.1.1bsvn29349-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226113" version="1" comment="texlive-fifo-stack is &lt;2017.133.1.0svn33288-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226114" version="1" comment="texlive-fig4latex is &lt;2017.133.0.0.2svn26313-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226115" version="1" comment="texlive-fig4latex-bin is &lt;2017.20170520.svn14752-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226116" version="1" comment="texlive-figbas is &lt;2017.133.1.0.3svn28943-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226117" version="1" comment="texlive-figbas-fonts is &lt;2017.133.1.0.3svn28943-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226118" version="1" comment="texlive-figbib is &lt;2017.133.svn19388-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226119" version="1" comment="texlive-figflow is &lt;2017.133.svn21462-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226120" version="1" comment="texlive-figsize is &lt;2017.133.0.0.1svn18784-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226121" version="1" comment="texlive-filecontents is &lt;2017.133.1.3svn24250-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226122" version="1" comment="texlive-filecontentsdef is &lt;2017.133.1.2svn42107-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226123" version="1" comment="texlive-filedate is &lt;2017.133.svn29529-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226124" version="1" comment="texlive-filehook is &lt;2017.133.0.0.5dsvn24280-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226125" version="1" comment="texlive-fileinfo is &lt;2017.133.0.0.81asvn28421-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226126" version="1" comment="texlive-filemod is &lt;2017.133.1.2svn24042-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226127" version="1" comment="texlive-finbib is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226128" version="1" comment="texlive-findhyph is &lt;2017.133.3.4svn38674-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226129" version="1" comment="texlive-findhyph-bin is &lt;2017.20170520.svn14758-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226130" version="1" comment="texlive-fink is &lt;2017.133.2.2.1svn24329-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226131" version="1" comment="texlive-finstrut is &lt;2017.133.0.0.5svn21719-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226132" version="1" comment="texlive-fira is &lt;2017.133.4.2svn42501-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226133" version="1" comment="texlive-fira-fonts is &lt;2017.133.4.2svn42501-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226134" version="1" comment="texlive-first-latex-doc is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226135" version="1" comment="texlive-fitbox is &lt;2017.133.1.00svn38139-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226136" version="1" comment="texlive-fithesis is &lt;2017.133.0.0.3.46svn44472-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226137" version="1" comment="texlive-fix2col is &lt;2017.133.0.0.04svn38770-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226138" version="1" comment="texlive-fixcmex is &lt;2017.133.1.0svn38816-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226139" version="1" comment="texlive-fixfoot is &lt;2017.133.0.0.3asvn17131-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226140" version="1" comment="texlive-fixlatvian is &lt;2017.133.1asvn21631-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226141" version="1" comment="texlive-fixltxhyph is &lt;2017.133.0.0.4svn25832-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226142" version="1" comment="texlive-fixme is &lt;2017.133.4.4svn43413-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226143" version="1" comment="texlive-fixmetodonotes is &lt;2017.133.0.0.2.2svn30168-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226144" version="1" comment="texlive-fixpdfmag is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226145" version="1" comment="texlive-fjodor is &lt;2017.133.svn20220-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226146" version="1" comment="texlive-flabels is &lt;2017.133.1.0svn17272-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226147" version="1" comment="texlive-flacards is &lt;2017.133.0.0.1.1bsvn19440-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226148" version="1" comment="texlive-flagderiv is &lt;2017.133.0.0.10svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226149" version="1" comment="texlive-flashcards is &lt;2017.133.1.0.1svn19667-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226150" version="1" comment="texlive-flashmovie is &lt;2017.133.0.0.4svn25768-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226151" version="1" comment="texlive-flipbook is &lt;2017.133.0.0.2svn25584-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226152" version="1" comment="texlive-flippdf is &lt;2017.133.1.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226153" version="1" comment="texlive-float is &lt;2017.133.1.3dsvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226154" version="1" comment="texlive-floatrow is &lt;2017.133.0.0.3bsvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226155" version="1" comment="texlive-flowchart is &lt;2017.133.3.3svn36572-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226156" version="1" comment="texlive-flowfram is &lt;2017.133.1.17svn35291-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226157" version="1" comment="texlive-fltpoint is &lt;2017.133.1.1bsvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226158" version="1" comment="texlive-fmp is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226159" version="1" comment="texlive-fmtcount is &lt;2017.133.3.01svn37298-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226160" version="1" comment="texlive-fn2end is &lt;2017.133.1.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226161" version="1" comment="texlive-fnbreak is &lt;2017.133.1.30svn25003-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226162" version="1" comment="texlive-fncychap is &lt;2017.133.1.34svn20710-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226163" version="1" comment="texlive-fncylab is &lt;2017.133.1.0svn17382-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226164" version="1" comment="texlive-fnpara is &lt;2017.133.svn25607-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226165" version="1" comment="texlive-fnpct is &lt;2017.133.0.0.4esvn40535-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226166" version="1" comment="texlive-fnspe is &lt;2017.133.1.1bsvn43380-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226167" version="1" comment="texlive-fntproof is &lt;2017.133.svn20638-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226168" version="1" comment="texlive-fnumprint is &lt;2017.133.1.1asvn29173-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226169" version="1" comment="texlive-foekfont is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226170" version="1" comment="texlive-foekfont-fonts is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226171" version="1" comment="texlive-foilhtml is &lt;2017.133.1.2svn21855-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226172" version="1" comment="texlive-fonetika is &lt;2017.133.svn21326-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226173" version="1" comment="texlive-fonetika-fonts is &lt;2017.133.svn21326-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226174" version="1" comment="texlive-font-change is &lt;2017.133.2015.2svn40403-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226175" version="1" comment="texlive-font-change-xetex is &lt;2017.133.2016.1svn40404-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226176" version="1" comment="texlive-fontawesome is &lt;2017.133.4.6.3.2svn41412-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226177" version="1" comment="texlive-fontawesome-fonts is &lt;2017.133.4.6.3.2svn41412-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226178" version="1" comment="texlive-fontaxes is &lt;2017.133.1.0dsvn33276-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226179" version="1" comment="texlive-fontbook is &lt;2017.133.0.0.2svn23608-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226180" version="1" comment="texlive-fontch is &lt;2017.133.2.2svn17859-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226181" version="1" comment="texlive-fontinst is &lt;2017.133.1.933svn44166-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226182" version="1" comment="texlive-fontinst-bin is &lt;2017.20170520.svn29741-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226183" version="1" comment="texlive-fontmfizz is &lt;2017.133.svn43546-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226184" version="1" comment="texlive-fontmfizz-fonts is &lt;2017.133.svn43546-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226185" version="1" comment="texlive-fontname is &lt;2017.133.svn38345-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226186" version="1" comment="texlive-fontools is &lt;2017.133.svn43573-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226187" version="1" comment="texlive-fontools-bin is &lt;2017.20170520.svn25997-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226188" version="1" comment="texlive-fonts-churchslavonic is &lt;2017.133.1.1svn43121-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226189" version="1" comment="texlive-fonts-churchslavonic-fonts is &lt;2017.133.1.1svn43121-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226190" version="1" comment="texlive-fonts-tlwg is &lt;2017.133.0.0.6.3svn41366-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226191" version="1" comment="texlive-fonts-tlwg-fonts is &lt;2017.133.0.0.6.3svn41366-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226192" version="1" comment="texlive-fontspec is &lt;2017.133.2.6asvn43661-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226193" version="1" comment="texlive-fonttable is &lt;2017.133.1.6bsvn21399-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226194" version="1" comment="texlive-fontware is &lt;2017.133.svn44166-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226195" version="1" comment="texlive-fontware-bin is &lt;2017.20170520.svn44143-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226196" version="1" comment="texlive-fontwrap is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226197" version="1" comment="texlive-footbib is &lt;2017.133.2.0.7svn17115-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226198" version="1" comment="texlive-footmisc is &lt;2017.133.5.5bsvn23330-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226199" version="1" comment="texlive-footmisx is &lt;2017.133.20161201svn42621-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226200" version="1" comment="texlive-footnotebackref is &lt;2017.133.1.0svn27034-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226201" version="1" comment="texlive-footnotehyper is &lt;2017.133.1.0svn43424-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226202" version="1" comment="texlive-footnoterange is &lt;2017.133.1.0asvn25430-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226203" version="1" comment="texlive-footnpag is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226204" version="1" comment="texlive-forarray is &lt;2017.133.1.01svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226205" version="1" comment="texlive-foreign is &lt;2017.133.2.7svn27819-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226206" version="1" comment="texlive-forest is &lt;2017.133.2.1.4svn43129-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226207" version="1" comment="texlive-forest-quickstart is &lt;2017.133.svn42503-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226208" version="1" comment="texlive-forloop is &lt;2017.133.3.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226209" version="1" comment="texlive-formation-latex-ul is &lt;2017.133.2016.11_3svn43005-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226210" version="1" comment="texlive-formlett is &lt;2017.133.2.3svn21480-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226211" version="1" comment="texlive-formular is &lt;2017.133.1.0asvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226212" version="1" comment="texlive-fouridx is &lt;2017.133.2.00svn32214-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226213" version="1" comment="texlive-fourier is &lt;2017.133.1.3svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226214" version="1" comment="texlive-fourier-fonts is &lt;2017.133.1.3svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226215" version="1" comment="texlive-fouriernc is &lt;2017.133.svn29646-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226216" version="1" comment="texlive-fp is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226217" version="1" comment="texlive-fpl is &lt;2017.133.1.002svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226218" version="1" comment="texlive-fpl-fonts is &lt;2017.133.1.002svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226219" version="1" comment="texlive-fragmaster is &lt;2017.133.1.6svn26313-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226220" version="1" comment="texlive-fragmaster-bin is &lt;2017.20170520.svn13663-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226221" version="1" comment="texlive-fragments is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226222" version="1" comment="texlive-frame is &lt;2017.133.1.0svn18312-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226223" version="1" comment="texlive-framed is &lt;2017.133.0.0.96svn26789-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226224" version="1" comment="texlive-francais-bst is &lt;2017.133.1.1svn38922-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226225" version="1" comment="texlive-frankenstein is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226226" version="1" comment="texlive-frcursive is &lt;2017.133.svn24559-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226227" version="1" comment="texlive-frcursive-fonts is &lt;2017.133.svn24559-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226228" version="1" comment="texlive-frederika2016 is &lt;2017.133.1.000_2016_initial_releasesvn42157-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226229" version="1" comment="texlive-frederika2016-fonts is &lt;2017.133.1.000_2016_initial_releasesvn42157-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226230" version="1" comment="texlive-frege is &lt;2017.133.1.3svn27417-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226231" version="1" comment="texlive-frletter is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226232" version="1" comment="texlive-frontespizio is &lt;2017.133.1.4asvn24054-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226233" version="1" comment="texlive-ftcap is &lt;2017.133.1.4svn17275-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226234" version="1" comment="texlive-ftnxtra is &lt;2017.133.0.0.1svn29652-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226235" version="1" comment="texlive-fullblck is &lt;2017.133.1.03svn25434-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226236" version="1" comment="texlive-fullminipage is &lt;2017.133.0.0.1.1svn34545-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226237" version="1" comment="texlive-fullwidth is &lt;2017.133.0.0.1svn24684-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226238" version="1" comment="texlive-functan is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226239" version="1" comment="texlive-fundus-calligra is &lt;2017.133.1.2svn26018-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226240" version="1" comment="texlive-fundus-cyr is &lt;2017.133.svn26019-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226241" version="1" comment="texlive-fundus-sueterlin is &lt;2017.133.1.2svn26030-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226242" version="1" comment="texlive-fvextra is &lt;2017.133.1.2.1svn41984-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226243" version="1" comment="texlive-fwlw is &lt;2017.133.svn29803-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226244" version="1" comment="texlive-g-brief is &lt;2017.133.4.0.2svn21140-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226245" version="1" comment="texlive-gaceta is &lt;2017.133.1.06svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226246" version="1" comment="texlive-galois is &lt;2017.133.1.5svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226247" version="1" comment="texlive-gamebook is &lt;2017.133.1.0svn24714-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226248" version="1" comment="texlive-garrigues is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226249" version="1" comment="texlive-garuda-c90 is &lt;2017.133.svn37677-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226250" version="1" comment="texlive-gastex is &lt;2017.133.2.8svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226251" version="1" comment="texlive-gatech-thesis is &lt;2017.133.1.8svn19886-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226252" version="1" comment="texlive-gates is &lt;2017.133.0.0.2svn29803-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226253" version="1" comment="texlive-gauss is &lt;2017.133.svn32934-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226254" version="1" comment="texlive-gb4e is &lt;2017.133.svn19216-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226255" version="1" comment="texlive-gcard is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226256" version="1" comment="texlive-gchords is &lt;2017.133.1.20svn29803-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226257" version="1" comment="texlive-gcite is &lt;2017.133.1.0.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226258" version="1" comment="texlive-gender is &lt;2017.133.1.0svn36464-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226259" version="1" comment="texlive-gene-logic is &lt;2017.133.1.4svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226260" version="1" comment="texlive-genealogy is &lt;2017.133.svn25112-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226261" version="1" comment="texlive-genealogytree is &lt;2017.133.1.10svn43086-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226262" version="1" comment="texlive-genmisc is &lt;2017.133.svn27208-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226263" version="1" comment="texlive-genmpage is &lt;2017.133.0.0.3.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226264" version="1" comment="texlive-gentium-tug is &lt;2017.133.1.1svn37378-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226265" version="1" comment="texlive-gentium-tug-fonts is &lt;2017.133.1.1svn37378-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226266" version="1" comment="texlive-gentle is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226267" version="1" comment="texlive-geometry is &lt;2017.133.5.6svn19716-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226268" version="1" comment="texlive-geometry-de is &lt;2017.133.1.1svn21882-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226269" version="1" comment="texlive-german is &lt;2017.133.2.5esvn42428-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226270" version="1" comment="texlive-germbib is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226271" version="1" comment="texlive-germkorr is &lt;2017.133.1.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226272" version="1" comment="texlive-geschichtsfrkl is &lt;2017.133.1.4svn42121-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226273" version="1" comment="texlive-getfiledate is &lt;2017.133.1.2svn16189-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226274" version="1" comment="texlive-getitems is &lt;2017.133.1.0svn39365-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226275" version="1" comment="texlive-getmap is &lt;2017.133.1.9svn41503-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226276" version="1" comment="texlive-getmap-bin is &lt;2017.20170520.svn34971-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226277" version="1" comment="texlive-getoptk is &lt;2017.133.1.0svn23567-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226278" version="1" comment="texlive-gfnotation is &lt;2017.133.2.9svn37156-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226279" version="1" comment="texlive-gfsartemisia is &lt;2017.133.1.0svn19469-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226280" version="1" comment="texlive-gfsartemisia-fonts is &lt;2017.133.1.0svn19469-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226281" version="1" comment="texlive-gfsbaskerville is &lt;2017.133.1.0svn19440-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226282" version="1" comment="texlive-gfsbaskerville-fonts is &lt;2017.133.1.0svn19440-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226283" version="1" comment="texlive-gfsbodoni is &lt;2017.133.1.01svn28484-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226284" version="1" comment="texlive-gfsbodoni-fonts is &lt;2017.133.1.01svn28484-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226285" version="1" comment="texlive-gfscomplutum is &lt;2017.133.1.0svn19469-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226286" version="1" comment="texlive-gfscomplutum-fonts is &lt;2017.133.1.0svn19469-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226287" version="1" comment="texlive-gfsdidot is &lt;2017.133.svn31978-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226288" version="1" comment="texlive-gfsdidot-fonts is &lt;2017.133.svn31978-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226289" version="1" comment="texlive-gfsneohellenic is &lt;2017.133.svn31979-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226290" version="1" comment="texlive-gfsneohellenic-fonts is &lt;2017.133.svn31979-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226291" version="1" comment="texlive-gfsporson is &lt;2017.133.1.01svn18651-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226292" version="1" comment="texlive-gfsporson-fonts is &lt;2017.133.1.01svn18651-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226293" version="1" comment="texlive-gfssolomos is &lt;2017.133.1.0svn18651-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226294" version="1" comment="texlive-gfssolomos-fonts is &lt;2017.133.1.0svn18651-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226295" version="1" comment="texlive-ghab is &lt;2017.133.0.0.5svn29803-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226296" version="1" comment="texlive-ghsystem is &lt;2017.133.4.8svn41714-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226297" version="1" comment="texlive-gillcm is &lt;2017.133.1.1svn19878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226298" version="1" comment="texlive-gillius is &lt;2017.133.svn32068-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226299" version="1" comment="texlive-gillius-fonts is &lt;2017.133.svn32068-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226300" version="1" comment="texlive-gincltex is &lt;2017.133.0.0.3svn23835-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226301" version="1" comment="texlive-ginpenc is &lt;2017.133.1.0svn24980-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226302" version="1" comment="texlive-gitfile-info is &lt;2017.133.0.0.3svn41693-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226303" version="1" comment="texlive-gitinfo is &lt;2017.133.1.0svn34049-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226304" version="1" comment="texlive-gitinfo2 is &lt;2017.133.2.0.7svn38913-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226305" version="1" comment="texlive-gitlog is &lt;2017.133.0.0.0.betasvn38932-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226306" version="1" comment="texlive-gloss is &lt;2017.133.1.5.2svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226307" version="1" comment="texlive-gloss-occitan is &lt;2017.133.0.0.1svn39609-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226308" version="1" comment="texlive-glossaries is &lt;2017.133.4.30svn44564-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226309" version="1" comment="texlive-glossaries-bin is &lt;2017.20170520.svn37813-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226310" version="1" comment="texlive-glossaries-danish is &lt;2017.133.1.0svn35665-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226311" version="1" comment="texlive-glossaries-dutch is &lt;2017.133.1.1svn35685-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226312" version="1" comment="texlive-glossaries-english is &lt;2017.133.1.0svn35665-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226313" version="1" comment="texlive-glossaries-extra is &lt;2017.133.1.15svn44284-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226314" version="1" comment="texlive-glossaries-french is &lt;2017.133.1.1svn42873-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226315" version="1" comment="texlive-glossaries-german is &lt;2017.133.1.0svn35665-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226316" version="1" comment="texlive-glossaries-irish is &lt;2017.133.1.0svn35665-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226317" version="1" comment="texlive-glossaries-italian is &lt;2017.133.1.0svn35665-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226318" version="1" comment="texlive-glossaries-magyar is &lt;2017.133.1.0svn35665-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226319" version="1" comment="texlive-glossaries-polish is &lt;2017.133.1.0svn35665-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226320" version="1" comment="texlive-glossaries-portuges is &lt;2017.133.1.1svn36064-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226321" version="1" comment="texlive-glossaries-serbian is &lt;2017.133.1.0svn35665-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226322" version="1" comment="texlive-glossaries-spanish is &lt;2017.133.1.0svn35665-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226323" version="1" comment="texlive-glyphlist is &lt;2017.133.svn41545-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226324" version="1" comment="texlive-gmdoc is &lt;2017.133.0.0.993svn21292-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226325" version="1" comment="texlive-gmdoc-enhance is &lt;2017.133.0.0.2svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226326" version="1" comment="texlive-gmiflink is &lt;2017.133.0.0.97svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226327" version="1" comment="texlive-gmp is &lt;2017.133.1.0svn21691-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226328" version="1" comment="texlive-gmutils is &lt;2017.133.0.0.996svn24287-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226329" version="1" comment="texlive-gmverb is &lt;2017.133.0.0.98svn24288-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226330" version="1" comment="texlive-gmverse is &lt;2017.133.0.0.73svn29803-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226331" version="1" comment="texlive-gnu-freefont is &lt;2017.133.svn29349-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226332" version="1" comment="texlive-gnu-freefont-fonts is &lt;2017.133.svn29349-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226333" version="1" comment="texlive-gnuplottex is &lt;2017.133.0.0.9.2svn41904-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226334" version="1" comment="texlive-go is &lt;2017.133.svn28628-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226335" version="1" comment="texlive-gobble is &lt;2017.133.0.0.1svn40936-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226336" version="1" comment="texlive-gofonts is &lt;2017.133.svn43726-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226337" version="1" comment="texlive-gofonts-fonts is &lt;2017.133.svn43726-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226338" version="1" comment="texlive-gost is &lt;2017.133.1.2isvn44131-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226339" version="1" comment="texlive-gothic is &lt;2017.133.svn38263-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226340" version="1" comment="texlive-gotoh is &lt;2017.133.1.0svn44211-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226341" version="1" comment="texlive-gradientframe is &lt;2017.133.0.0.2svn21387-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226342" version="1" comment="texlive-gradstudentresume is &lt;2017.133.svn38832-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226343" version="1" comment="texlive-grafcet is &lt;2017.133.1.3.5svn22509-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226344" version="1" comment="texlive-grant is &lt;2017.133.0.0.0.3svn41905-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226345" version="1" comment="texlive-graphbox is &lt;2017.133.1.0svn35075-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226346" version="1" comment="texlive-graphics is &lt;2017.133.svn43813-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226347" version="1" comment="texlive-graphics-cfg is &lt;2017.133.svn41448-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226348" version="1" comment="texlive-graphics-def is &lt;2017.133.svn43025-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226349" version="1" comment="texlive-graphics-pln is &lt;2017.133.svn44567-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226350" version="1" comment="texlive-graphicx-psmin is &lt;2017.133.1.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226351" version="1" comment="texlive-graphicxbox is &lt;2017.133.1.0svn32630-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226352" version="1" comment="texlive-graphviz is &lt;2017.133.0.0.94svn31517-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226353" version="1" comment="texlive-grayhints is &lt;2017.133.svn43561-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226354" version="1" comment="texlive-greek-fontenc is &lt;2017.133.0.0.13.2svn39606-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226355" version="1" comment="texlive-greek-inputenc is &lt;2017.133.1.6svn40613-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226356" version="1" comment="texlive-greekdates is &lt;2017.133.1.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226357" version="1" comment="texlive-greektex is &lt;2017.133.svn28327-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226358" version="1" comment="texlive-greektonoi is &lt;2017.133.svn39419-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226359" version="1" comment="texlive-greenpoint is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226360" version="1" comment="texlive-gregoriotex is &lt;2017.133.5.0.2svn44502-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226361" version="1" comment="texlive-gregoriotex-bin is &lt;2017.20170520.svn44143-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226362" version="1" comment="texlive-gregoriotex-fonts is &lt;2017.133.5.0.2svn44502-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226363" version="1" comment="texlive-grfpaste is &lt;2017.133.0.0.2svn17354-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226364" version="1" comment="texlive-grid is &lt;2017.133.1.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226365" version="1" comment="texlive-grid-system is &lt;2017.133.0.0.3.0svn32981-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226366" version="1" comment="texlive-gridset is &lt;2017.133.0.0.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226367" version="1" comment="texlive-grotesq is &lt;2017.133.svn35859-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226368" version="1" comment="texlive-grotesq-fonts is &lt;2017.133.svn35859-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226369" version="1" comment="texlive-grundgesetze is &lt;2017.133.1.02svn34439-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226370" version="1" comment="texlive-gsemthesis is &lt;2017.133.0.0.9.4svn36244-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226371" version="1" comment="texlive-gsftopk is &lt;2017.133.1.19.2svn44166-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226372" version="1" comment="texlive-gsftopk-bin is &lt;2017.20170520.svn44143-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226373" version="1" comment="texlive-gtl is &lt;2017.133.0.0.2svn38503-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226374" version="1" comment="texlive-gtrcrd is &lt;2017.133.1.1svn32484-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226375" version="1" comment="texlive-gtrlib-largetrees is &lt;2017.133.svn43279-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226376" version="1" comment="texlive-gu is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226377" version="1" comment="texlive-guide-to-latex is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226378" version="1" comment="texlive-guitar is &lt;2017.133.1.6svn32258-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226379" version="1" comment="texlive-guitarchordschemes is &lt;2017.133.0.0.7svn41880-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226380" version="1" comment="texlive-guitlogo is &lt;2017.133.0.0.9.2svn27458-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226381" version="1" comment="texlive-gustlib is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226382" version="1" comment="texlive-gustprog is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226383" version="1" comment="texlive-gzt is &lt;2017.133.0.0.97svn43254-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226384" version="1" comment="texlive-h2020proposal is &lt;2017.133.1.0svn38428-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226385" version="1" comment="texlive-hacm is &lt;2017.133.0.0.1svn27671-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226386" version="1" comment="texlive-hacm-fonts is &lt;2017.133.0.0.1svn27671-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226387" version="1" comment="texlive-halloweenmath is &lt;2017.133.0.0.10asvn44043-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226388" version="1" comment="texlive-handout is &lt;2017.133.1.6.0svn43962-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226389" version="1" comment="texlive-hands is &lt;2017.133.svn13293-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226390" version="1" comment="texlive-hang is &lt;2017.133.2.1svn43280-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226391" version="1" comment="texlive-hanging is &lt;2017.133.1.2bsvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226392" version="1" comment="texlive-hanoi is &lt;2017.133.20120101svn25019-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226393" version="1" comment="texlive-happy4th is &lt;2017.133.20120102svn25020-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226394" version="1" comment="texlive-har2nat is &lt;2017.133.1.0svn17356-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226395" version="1" comment="texlive-hardwrap is &lt;2017.133.0.0.2svn21396-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226396" version="1" comment="texlive-harmony is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226397" version="1" comment="texlive-harnon-cv is &lt;2017.133.1.0svn26543-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226398" version="1" comment="texlive-harpoon is &lt;2017.133.1.0svn21327-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226399" version="1" comment="texlive-harvard is &lt;2017.133.2.0.5svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226400" version="1" comment="texlive-harveyballs is &lt;2017.133.1.1svn32003-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226401" version="1" comment="texlive-harvmac is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226402" version="1" comment="texlive-hatching is &lt;2017.133.0.0.11svn23818-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226403" version="1" comment="texlive-hausarbeit-jura is &lt;2017.133.1.5svn42054-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226404" version="1" comment="texlive-havannah is &lt;2017.133.svn36348-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226405" version="1" comment="texlive-hc is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226406" version="1" comment="texlive-he-she is &lt;2017.133.1.3svn41359-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226407" version="1" comment="texlive-helvetic is &lt;2017.133.svn31835-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226408" version="1" comment="texlive-helvetic-fonts is &lt;2017.133.svn31835-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226409" version="1" comment="texlive-hep is &lt;2017.133.1.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226410" version="1" comment="texlive-hepnames is &lt;2017.133.2.0svn35722-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226411" version="1" comment="texlive-hepparticles is &lt;2017.133.2.0svn35723-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226412" version="1" comment="texlive-hepthesis is &lt;2017.133.1.5.0svn35720-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226413" version="1" comment="texlive-hepunits is &lt;2017.133.1.1.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226414" version="1" comment="texlive-here is &lt;2017.133.svn16135-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226415" version="1" comment="texlive-heuristica is &lt;2017.133.1.09svn43507-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226416" version="1" comment="texlive-heuristica-fonts is &lt;2017.133.1.09svn43507-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226417" version="1" comment="texlive-hexgame is &lt;2017.133.1.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226418" version="1" comment="texlive-hf-tikz is &lt;2017.133.0.0.3asvn34733-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226419" version="1" comment="texlive-hfbright is &lt;2017.133.svn29349-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226420" version="1" comment="texlive-hfbright-fonts is &lt;2017.133.svn29349-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226421" version="1" comment="texlive-hfoldsty is &lt;2017.133.1.15svn29349-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226422" version="1" comment="texlive-hhtensor is &lt;2017.133.0.0.61svn24981-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226423" version="1" comment="texlive-histogr is &lt;2017.133.1.01svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226424" version="1" comment="texlive-historische-zeitschrift is &lt;2017.133.1.2svn42635-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226425" version="1" comment="texlive-hitec is &lt;2017.133.0.0.0betasvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226426" version="1" comment="texlive-hletter is &lt;2017.133.4.2svn30002-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226427" version="1" comment="texlive-hlist is &lt;2017.133.0.0.1svn44158-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226428" version="1" comment="texlive-hobby is &lt;2017.133.1.8svn44474-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226429" version="1" comment="texlive-hobete is &lt;2017.133.svn27036-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226430" version="1" comment="texlive-hook-pre-commit-pkg is &lt;2017.133.1.1.2svn41378-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226431" version="1" comment="texlive-horoscop is &lt;2017.133.0.0.92svn30530-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226432" version="1" comment="texlive-hpsdiss is &lt;2017.133.1.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226433" version="1" comment="texlive-hrefhide is &lt;2017.133.1.0fsvn22255-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226434" version="1" comment="texlive-hrlatex is &lt;2017.133.0.0.23svn18020-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226435" version="1" comment="texlive-hustthesis is &lt;2017.133.1.4svn42547-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226436" version="1" comment="texlive-hvfloat is &lt;2017.133.1.2svn43732-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226437" version="1" comment="texlive-hvindex is &lt;2017.133.0.0.02svn16136-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226438" version="1" comment="texlive-hypdvips is &lt;2017.133.3.02svn34364-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226439" version="1" comment="texlive-hyper is &lt;2017.133.4.2dsvn17357-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226440" version="1" comment="texlive-hypernat is &lt;2017.133.1.0bsvn17358-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226441" version="1" comment="texlive-hyperref is &lt;2017.133.6.85asvn43547-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226442" version="1" comment="texlive-hyperref-docsrc is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226443" version="1" comment="texlive-hyperxmp is &lt;2017.133.3.2svn43316-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226444" version="1" comment="texlive-hyph-utf8 is &lt;2017.133.svn44401-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226445" version="1" comment="texlive-hyphen-afrikaans is &lt;2017.133.svn40340-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226446" version="1" comment="texlive-hyphen-ancientgreek is &lt;2017.133.svn41189-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226447" version="1" comment="texlive-hyphen-arabic is &lt;2017.133.svn40340-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226448" version="1" comment="texlive-hyphen-armenian is &lt;2017.133.svn40340-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226449" version="1" comment="texlive-hyphen-base is &lt;2017.133.svn44419-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226450" version="1" comment="texlive-hyphen-basque is &lt;2017.133.svn41113-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226451" version="1" comment="texlive-hyphen-belarusian is &lt;2017.133.svn44401-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226452" version="1" comment="texlive-hyphen-bulgarian is &lt;2017.133.svn41113-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226453" version="1" comment="texlive-hyphen-catalan is &lt;2017.133.svn40340-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226454" version="1" comment="texlive-hyphen-chinese is &lt;2017.133.svn40340-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226455" version="1" comment="texlive-hyphen-churchslavonic is &lt;2017.133.svn44401-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226456" version="1" comment="texlive-hyphen-coptic is &lt;2017.133.svn40340-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226457" version="1" comment="texlive-hyphen-croatian is &lt;2017.133.svn41113-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226458" version="1" comment="texlive-hyphen-czech is &lt;2017.133.svn40340-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226459" version="1" comment="texlive-hyphen-danish is &lt;2017.133.svn41113-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226460" version="1" comment="texlive-hyphen-dutch is &lt;2017.133.svn40340-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226461" version="1" comment="texlive-hyphen-english is &lt;2017.133.svn40340-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226462" version="1" comment="texlive-hyphen-esperanto is &lt;2017.133.svn40340-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226463" version="1" comment="texlive-hyphen-estonian is &lt;2017.133.svn40340-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226464" version="1" comment="texlive-hyphen-ethiopic is &lt;2017.133.svn40340-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226465" version="1" comment="texlive-hyphen-farsi is &lt;2017.133.svn40340-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226466" version="1" comment="texlive-hyphen-finnish is &lt;2017.133.svn40340-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226467" version="1" comment="texlive-hyphen-french is &lt;2017.133.svn41113-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226468" version="1" comment="texlive-hyphen-friulan is &lt;2017.133.svn40340-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226469" version="1" comment="texlive-hyphen-galician is &lt;2017.133.svn40340-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226470" version="1" comment="texlive-hyphen-georgian is &lt;2017.133.svn40340-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226471" version="1" comment="texlive-hyphen-german is &lt;2017.133.svn44401-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226472" version="1" comment="texlive-hyphen-greek is &lt;2017.133.5svn40340-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226473" version="1" comment="texlive-hyphen-hungarian is &lt;2017.133.svn40340-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226474" version="1" comment="texlive-hyphen-icelandic is &lt;2017.133.svn40340-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226475" version="1" comment="texlive-hyphen-indic is &lt;2017.133.svn40340-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226476" version="1" comment="texlive-hyphen-indonesian is &lt;2017.133.svn40340-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226477" version="1" comment="texlive-hyphen-interlingua is &lt;2017.133.svn40340-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226478" version="1" comment="texlive-hyphen-irish is &lt;2017.133.svn41113-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226479" version="1" comment="texlive-hyphen-italian is &lt;2017.133.4.8gsvn40340-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226480" version="1" comment="texlive-hyphen-kurmanji is &lt;2017.133.svn40340-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226481" version="1" comment="texlive-hyphen-latin is &lt;2017.133.3.1svn44401-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226482" version="1" comment="texlive-hyphen-latvian is &lt;2017.133.svn40340-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226483" version="1" comment="texlive-hyphen-lithuanian is &lt;2017.133.svn40340-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226484" version="1" comment="texlive-hyphen-mongolian is &lt;2017.133.svn41113-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226485" version="1" comment="texlive-hyphen-norwegian is &lt;2017.133.svn40340-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226486" version="1" comment="texlive-hyphen-occitan is &lt;2017.133.svn40340-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226487" version="1" comment="texlive-hyphen-piedmontese is &lt;2017.133.svn40340-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226488" version="1" comment="texlive-hyphen-polish is &lt;2017.133.3.0asvn41113-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226489" version="1" comment="texlive-hyphen-portuguese is &lt;2017.133.svn40340-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226490" version="1" comment="texlive-hyphen-romanian is &lt;2017.133.svn40340-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226491" version="1" comment="texlive-hyphen-romansh is &lt;2017.133.svn40340-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226492" version="1" comment="texlive-hyphen-russian is &lt;2017.133.svn40340-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226493" version="1" comment="texlive-hyphen-sanskrit is &lt;2017.133.svn40340-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226494" version="1" comment="texlive-hyphen-serbian is &lt;2017.133.1.0asvn40340-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226495" version="1" comment="texlive-hyphen-slovak is &lt;2017.133.svn40340-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226496" version="1" comment="texlive-hyphen-slovenian is &lt;2017.133.svn41113-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226497" version="1" comment="texlive-hyphen-spanish is &lt;2017.133.4.5svn40340-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226498" version="1" comment="texlive-hyphen-swedish is &lt;2017.133.svn40340-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226499" version="1" comment="texlive-hyphen-thai is &lt;2017.133.svn40340-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226500" version="1" comment="texlive-hyphen-turkish is &lt;2017.133.svn40340-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226501" version="1" comment="texlive-hyphen-turkmen is &lt;2017.133.svn41113-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226502" version="1" comment="texlive-hyphen-ukrainian is &lt;2017.133.svn40340-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226503" version="1" comment="texlive-hyphen-uppersorbian is &lt;2017.133.svn40340-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226504" version="1" comment="texlive-hyphen-welsh is &lt;2017.133.svn41113-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226505" version="1" comment="texlive-hyphenat is &lt;2017.133.2.3csvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226506" version="1" comment="texlive-hyphenex is &lt;2017.133.svn37354-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226507" version="1" comment="texlive-hyplain is &lt;2017.133.1.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226508" version="1" comment="texlive-ibycus-babel is &lt;2017.133.3.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226509" version="1" comment="texlive-ibygrk is &lt;2017.133.4.5svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226510" version="1" comment="texlive-ibygrk-fonts is &lt;2017.133.4.5svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226511" version="1" comment="texlive-icsv is &lt;2017.133.0.0.2svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226512" version="1" comment="texlive-idxcmds is &lt;2017.133.0.0.2csvn38115-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226513" version="1" comment="texlive-idxlayout is &lt;2017.133.0.0.4dsvn25821-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226514" version="1" comment="texlive-ieeepes is &lt;2017.133.4.0svn17359-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226515" version="1" comment="texlive-ietfbibs is &lt;2017.133.1.0.0svn41332-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226516" version="1" comment="texlive-ifetex is &lt;2017.133.1.2svn24853-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226517" version="1" comment="texlive-iffont is &lt;2017.133.1.0.0svn38823-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226518" version="1" comment="texlive-ifluatex is &lt;2017.133.1.4svn43610-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226519" version="1" comment="texlive-ifmslide is &lt;2017.133.0.0.47svn20727-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226520" version="1" comment="texlive-ifmtarg is &lt;2017.133.1.2asvn19363-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226521" version="1" comment="texlive-ifnextok is &lt;2017.133.0.0.3svn23379-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226522" version="1" comment="texlive-ifoddpage is &lt;2017.133.1.1svn40726-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226523" version="1" comment="texlive-ifplatform is &lt;2017.133.0.0.4svn21156-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226524" version="1" comment="texlive-ifptex is &lt;2017.133.1.1svn44194-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226525" version="1" comment="texlive-ifsym is &lt;2017.133.svn24868-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226526" version="1" comment="texlive-iftex is &lt;2017.133.0.0.2svn29654-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226527" version="1" comment="texlive-ifthenx is &lt;2017.133.0.0.1asvn25819-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226528" version="1" comment="texlive-ifxetex is &lt;2017.133.0.0.6svn19685-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226529" version="1" comment="texlive-iitem is &lt;2017.133.1.0svn29613-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226530" version="1" comment="texlive-ijmart is &lt;2017.133.1.7svn30958-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226531" version="1" comment="texlive-ijqc is &lt;2017.133.1.2svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226532" version="1" comment="texlive-ijsra is &lt;2017.133.1.0svn44551-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226533" version="1" comment="texlive-imac is &lt;2017.133.svn17347-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226534" version="1" comment="texlive-image-gallery is &lt;2017.133.1.0jsvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226535" version="1" comment="texlive-imakeidx is &lt;2017.133.1.3esvn42287-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226536" version="1" comment="texlive-imfellenglish is &lt;2017.133.svn38547-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226537" version="1" comment="texlive-imfellenglish-fonts is &lt;2017.133.svn38547-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226538" version="1" comment="texlive-impatient is &lt;2017.133.svn35573-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226539" version="1" comment="texlive-impatient-cn is &lt;2017.133.svn35576-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226540" version="1" comment="texlive-impatient-fr is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226541" version="1" comment="texlive-impnattypo is &lt;2017.133.1.4svn36448-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226542" version="1" comment="texlive-import is &lt;2017.133.5.1svn17361-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226543" version="1" comment="texlive-imsproc is &lt;2017.133.0.0.1svn29803-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226544" version="1" comment="texlive-imtekda is &lt;2017.133.1.7svn17667-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226545" version="1" comment="texlive-incgraph is &lt;2017.133.1.12svn36500-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226546" version="1" comment="texlive-inconsolata is &lt;2017.133.1.112svn42871-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226547" version="1" comment="texlive-inconsolata-fonts is &lt;2017.133.1.112svn42871-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226548" version="1" comment="texlive-index is &lt;2017.133.4.1betasvn24099-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226549" version="1" comment="texlive-indextools is &lt;2017.133.1.5.1svn38931-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226550" version="1" comment="texlive-initials is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226551" version="1" comment="texlive-initials-fonts is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226552" version="1" comment="texlive-inlinebib is &lt;2017.133.svn22018-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226553" version="1" comment="texlive-inlinedef is &lt;2017.133.1.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226554" version="1" comment="texlive-inputtrc is &lt;2017.133.0.0.3svn28019-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226555" version="1" comment="texlive-insbox is &lt;2017.133.2.2svn34299-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226556" version="1" comment="texlive-interactiveworkbook is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226557" version="1" comment="texlive-interchar is &lt;2017.133.0.0.2svn36312-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226558" version="1" comment="texlive-interfaces is &lt;2017.133.3.1svn21474-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226559" version="1" comment="texlive-interpreter is &lt;2017.133.1.2svn27232-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226560" version="1" comment="texlive-interval is &lt;2017.133.0.0.3svn34840-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226561" version="1" comment="texlive-intro-scientific is &lt;2017.133.5th_editionsvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226562" version="1" comment="texlive-inversepath is &lt;2017.133.0.0.2svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226563" version="1" comment="texlive-invoice is &lt;2017.133.svn39397-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226564" version="1" comment="texlive-ionumbers is &lt;2017.133.0.0.3.3svn33457-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226565" version="1" comment="texlive-iopart-num is &lt;2017.133.2.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226566" version="1" comment="texlive-ipaex is &lt;2017.133.svn42428-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226567" version="1" comment="texlive-ipaex-fonts is &lt;2017.133.svn42428-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226568" version="1" comment="texlive-ipaex-type1 is &lt;2017.133.0.0.4asvn42403-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226569" version="1" comment="texlive-ipaex-type1-fonts is &lt;2017.133.0.0.4asvn42403-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226570" version="1" comment="texlive-iscram is &lt;2017.133.1.0.2svn42604-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226571" version="1" comment="texlive-iso is &lt;2017.133.2.4svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226572" version="1" comment="texlive-iso10303 is &lt;2017.133.1.5svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226573" version="1" comment="texlive-isodate is &lt;2017.133.2.28svn16613-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226574" version="1" comment="texlive-isodoc is &lt;2017.133.1.09svn39520-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226575" version="1" comment="texlive-isomath is &lt;2017.133.0.0.6.1svn27654-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226576" version="1" comment="texlive-isonums is &lt;2017.133.1.0svn17362-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226577" version="1" comment="texlive-isorot is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226578" version="1" comment="texlive-isotope is &lt;2017.133.0.0.3svn23711-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226579" version="1" comment="texlive-issuulinks is &lt;2017.133.1.1svn25742-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226580" version="1" comment="texlive-itnumpar is &lt;2017.133.1.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226581" version="1" comment="texlive-iwhdp is &lt;2017.133.0.0.50svn37552-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226582" version="1" comment="texlive-iwona is &lt;2017.133.0.0.995bsvn19611-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226583" version="1" comment="texlive-iwona-fonts is &lt;2017.133.0.0.995bsvn19611-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226584" version="1" comment="texlive-jablantile is &lt;2017.133.svn16364-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226585" version="1" comment="texlive-jacow is &lt;2017.133.1.95svn40523-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226586" version="1" comment="texlive-jadetex is &lt;2017.133.3.13svn41718-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226587" version="1" comment="texlive-jadetex-bin is &lt;2017.20170520.svn3006-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226588" version="1" comment="texlive-jamtimes is &lt;2017.133.1.12svn20408-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226589" version="1" comment="texlive-japanese-otf is &lt;2017.133.1.7b6svn42950-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226590" version="1" comment="texlive-japanese-otf-uptex is &lt;2017.133.0.0.18svn43395-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226591" version="1" comment="texlive-jknapltx is &lt;2017.133.svn19440-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226592" version="1" comment="texlive-jlabels is &lt;2017.133.svn24858-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226593" version="1" comment="texlive-jlreq is &lt;2017.133.svn44563-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226594" version="1" comment="texlive-jmlr is &lt;2017.133.1.23svn43458-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226595" version="1" comment="texlive-jmn is &lt;2017.133.svn22719-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226596" version="1" comment="texlive-jmn-fonts is &lt;2017.133.svn22719-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226597" version="1" comment="texlive-jneurosci is &lt;2017.133.1.00svn17346-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226598" version="1" comment="texlive-jpsj is &lt;2017.133.1.2.2svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226599" version="1" comment="texlive-js-misc is &lt;2017.133.svn16211-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226600" version="1" comment="texlive-jsclasses is &lt;2017.133.svn43403-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226601" version="1" comment="texlive-jslectureplanner is &lt;2017.133.1.5svn43476-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226602" version="1" comment="texlive-jumplines is &lt;2017.133.0.0.2svn37553-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226603" version="1" comment="texlive-junicode is &lt;2017.133.0.0.7.7svn28286-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226604" version="1" comment="texlive-junicode-fonts is &lt;2017.133.0.0.7.7svn28286-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226605" version="1" comment="texlive-jura is &lt;2017.133.4.3svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226606" version="1" comment="texlive-juraabbrev is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226607" version="1" comment="texlive-jurabib is &lt;2017.133.0.0.6svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226608" version="1" comment="texlive-juramisc is &lt;2017.133.0.0.91svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226609" version="1" comment="texlive-jurarsp is &lt;2017.133.0.0.52svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226610" version="1" comment="texlive-jvlisting is &lt;2017.133.0.0.7svn24638-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226611" version="1" comment="texlive-kantlipsum is &lt;2017.133.0.0.6svn27994-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226612" version="1" comment="texlive-karnaugh is &lt;2017.133.svn21338-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226613" version="1" comment="texlive-karnaugh-map is &lt;2017.133.1.1svn44131-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226614" version="1" comment="texlive-karnaughmap is &lt;2017.133.2.0svn36989-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226615" version="1" comment="texlive-kastrup is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226616" version="1" comment="texlive-kdgdocs is &lt;2017.133.1.0svn24498-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226617" version="1" comment="texlive-kerkis is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226618" version="1" comment="texlive-kerkis-fonts is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226619" version="1" comment="texlive-kerntest is &lt;2017.133.1.32svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226620" version="1" comment="texlive-keycommand is &lt;2017.133.3.1415svn18042-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226621" version="1" comment="texlive-keyfloat is &lt;2017.133.0.0.15svn44306-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226622" version="1" comment="texlive-keyreader is &lt;2017.133.0.0.5bsvn28195-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226623" version="1" comment="texlive-keystroke is &lt;2017.133.1.6svn17992-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226624" version="1" comment="texlive-keyval2e is &lt;2017.133.0.0.0.2svn23698-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226625" version="1" comment="texlive-keyvaltable is &lt;2017.133.0.0.2svn41414-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226626" version="1" comment="texlive-kix is &lt;2017.133.svn21606-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226627" version="1" comment="texlive-kixfont is &lt;2017.133.svn18488-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226628" version="1" comment="texlive-kluwer is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226629" version="1" comment="texlive-knitting is &lt;2017.133.2.0svn19595-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226630" version="1" comment="texlive-knitting-fonts is &lt;2017.133.2.0svn19595-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226631" version="1" comment="texlive-knittingpattern is &lt;2017.133.svn17205-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226632" version="1" comment="texlive-knowledge is &lt;2017.133.1.01svn44565-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226633" version="1" comment="texlive-knuth is &lt;2017.133.svn32899-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226634" version="1" comment="texlive-knuth-lib is &lt;2017.133.svn35820-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226635" version="1" comment="texlive-knuth-local is &lt;2017.133.svn38627-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226636" version="1" comment="texlive-knuthotherfonts is &lt;2017.133.svn13293-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226637" version="1" comment="texlive-koma-moderncvclassic is &lt;2017.133.0.0.5svn25025-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226638" version="1" comment="texlive-koma-script is &lt;2017.133.3.23svn44226-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226639" version="1" comment="texlive-koma-script-examples is &lt;2017.133.svn34243-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226640" version="1" comment="texlive-koma-script-sfs is &lt;2017.133.1.0svn26137-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226641" version="1" comment="texlive-komacv is &lt;2017.133.1.1.1svn43902-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226642" version="1" comment="texlive-kotex-oblivoir is &lt;2017.133.2.1.8svn43130-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226643" version="1" comment="texlive-kotex-plain is &lt;2017.133.2.1.1asvn38630-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226644" version="1" comment="texlive-kotex-utf is &lt;2017.133.2.1.2svn38558-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226645" version="1" comment="texlive-kotex-utils is &lt;2017.133.2.1.0svn38727-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226646" version="1" comment="texlive-kotex-utils-bin is &lt;2017.20170520.svn32101-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226647" version="1" comment="texlive-kpathsea is &lt;2017.133.svn44223-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226648" version="1" comment="texlive-kpathsea-bin is &lt;2017.20170520.svn44143-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226649" version="1" comment="texlive-kpathsea-devel is &lt;6.2.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226650" version="1" comment="texlive-kpfonts is &lt;2017.133.3.31svn29803-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226651" version="1" comment="texlive-kpfonts-fonts is &lt;2017.133.3.31svn29803-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226652" version="1" comment="texlive-ksfh_nat is &lt;2017.133.1.1svn24825-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226653" version="1" comment="texlive-ksp-thesis is &lt;2017.133.1.0.2svn39080-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226654" version="1" comment="texlive-ktv-texdata is &lt;2017.133.05.34svn27369-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226655" version="1" comment="texlive-kurier is &lt;2017.133.0.0.995bsvn19612-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226656" version="1" comment="texlive-kurier-fonts is &lt;2017.133.0.0.995bsvn19612-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226657" version="1" comment="texlive-l2picfaq is &lt;2017.133.1.50svn19601-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226658" version="1" comment="texlive-l2tabu is &lt;2017.133.2.4svn39597-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226659" version="1" comment="texlive-l2tabu-english is &lt;2017.133.1.8.5.7svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226660" version="1" comment="texlive-l2tabu-french is &lt;2017.133.2.3svn31315-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226661" version="1" comment="texlive-l2tabu-italian is &lt;2017.133.2.3svn25218-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226662" version="1" comment="texlive-l2tabu-spanish is &lt;2017.133.1.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226663" version="1" comment="texlive-l3build is &lt;2017.133.svn44483-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226664" version="1" comment="texlive-l3experimental is &lt;2017.133.svn44483-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226665" version="1" comment="texlive-l3kernel is &lt;2017.133.svn44483-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226666" version="1" comment="texlive-l3packages is &lt;2017.133.svn44483-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226667" version="1" comment="texlive-labbook is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226668" version="1" comment="texlive-labels is &lt;2017.133.0.0.13svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226669" version="1" comment="texlive-labyrinth is &lt;2017.133.1.0svn33454-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226670" version="1" comment="texlive-lacheck is &lt;2017.133.svn44166-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226671" version="1" comment="texlive-lacheck-bin is &lt;2017.20170520.svn44143-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226672" version="1" comment="texlive-ladder is &lt;2017.133.svn44394-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226673" version="1" comment="texlive-lambda is &lt;2017.133.svn28669-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226674" version="1" comment="texlive-lambda-lists is &lt;2017.133.svn31402-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226675" version="1" comment="texlive-langcode is &lt;2017.133.0.0.2svn27764-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226676" version="1" comment="texlive-langsci is &lt;2017.133.svn44096-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226677" version="1" comment="texlive-lapdf is &lt;2017.133.1.1svn23806-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226678" version="1" comment="texlive-lastpackage is &lt;2017.133.0.0.1svn34481-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226679" version="1" comment="texlive-lastpage is &lt;2017.133.1.2msvn36680-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226680" version="1" comment="texlive-latex is &lt;2017.133.20170101_pl1svn43813-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226681" version="1" comment="texlive-latex-bib-ex is &lt;2017.133.svn25831-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226682" version="1" comment="texlive-latex-bib2-ex is &lt;2017.133.svn40098-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226683" version="1" comment="texlive-latex-bin is &lt;2017.133.svn44166-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226684" version="1" comment="texlive-latex-bin-bin is &lt;2017.20170520.svn14050-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226685" version="1" comment="texlive-latex-brochure is &lt;2017.133.svn40612-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226686" version="1" comment="texlive-latex-course is &lt;2017.133.2svn25505-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226687" version="1" comment="texlive-latex-doc-ptr is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226688" version="1" comment="texlive-latex-fonts is &lt;2017.133.svn28888-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226689" version="1" comment="texlive-latex-git-log is &lt;2017.133.0.0.9svn30983-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226690" version="1" comment="texlive-latex-git-log-bin is &lt;2017.20170520.svn30983-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226691" version="1" comment="texlive-latex-graphics-companion is &lt;2017.133.svn29235-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226692" version="1" comment="texlive-latex-make is &lt;2017.133.2.2.3svn42914-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226693" version="1" comment="texlive-latex-notes-zh-cn is &lt;2017.133.1.20svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226694" version="1" comment="texlive-latex-papersize is &lt;2017.133.1.62svn42296-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226695" version="1" comment="texlive-latex-papersize-bin is &lt;2017.20170520.svn42296-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226696" version="1" comment="texlive-latex-referenz is &lt;2017.133.2svn36671-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226697" version="1" comment="texlive-latex-tabellen is &lt;2017.133.svn16979-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226698" version="1" comment="texlive-latex-tds is &lt;2017.133.svn40613-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226699" version="1" comment="texlive-latex-veryshortguide is &lt;2017.133.svn41844-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226700" version="1" comment="texlive-latex-web-companion is &lt;2017.133.svn29349-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226701" version="1" comment="texlive-latex2e-help-texinfo is &lt;2017.133.svn38709-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226702" version="1" comment="texlive-latex2e-help-texinfo-fr is &lt;2017.133.svn42541-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226703" version="1" comment="texlive-latex2e-help-texinfo-spanish is &lt;2017.133.svn37356-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226704" version="1" comment="texlive-latex2man is &lt;2017.133.1.25svn43855-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226705" version="1" comment="texlive-latex2man-bin is &lt;2017.20170520.svn13663-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226706" version="1" comment="texlive-latex2nemeth is &lt;2017.133.1.0svn42300-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226707" version="1" comment="texlive-latex2nemeth-bin is &lt;2017.20170520.svn42300-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226708" version="1" comment="texlive-latex4wp is &lt;2017.133.1.0.10svn35999-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226709" version="1" comment="texlive-latex4wp-it is &lt;2017.133.1.0.10svn36000-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226710" version="1" comment="texlive-latexbangla is &lt;2017.133.0.0.2svn42409-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226711" version="1" comment="texlive-latexbug is &lt;2017.133.1.0asvn44566-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226712" version="1" comment="texlive-latexcheat is &lt;2017.133.1.13svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226713" version="1" comment="texlive-latexcheat-de is &lt;2017.133.svn35702-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226714" version="1" comment="texlive-latexcheat-esmx is &lt;2017.133.2.00svn36866-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226715" version="1" comment="texlive-latexcheat-ptbr is &lt;2017.133.1.13svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226716" version="1" comment="texlive-latexconfig is &lt;2017.133.svn40274-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226717" version="1" comment="texlive-latexcourse-rug is &lt;2017.133.1.1svn39026-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226718" version="1" comment="texlive-latexdemo is &lt;2017.133.0.0.1svn34481-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226719" version="1" comment="texlive-latexdiff is &lt;2017.133.1.2.0svn41892-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226720" version="1" comment="texlive-latexdiff-bin is &lt;2017.20170520.svn16420-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226721" version="1" comment="texlive-latexfileinfo-pkgs is &lt;2017.133.0.0.22svn26760-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226722" version="1" comment="texlive-latexfileversion is &lt;2017.133.0.0.3svn29349-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226723" version="1" comment="texlive-latexfileversion-bin is &lt;2017.20170520.svn25012-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226724" version="1" comment="texlive-latexgit is &lt;2017.133.svn41920-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226725" version="1" comment="texlive-latexindent is &lt;2017.133.3.1svn44492-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226726" version="1" comment="texlive-latexindent-bin is &lt;2017.20170520.svn32150-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226727" version="1" comment="texlive-latexmk is &lt;2017.133.4.52csvn43099-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226728" version="1" comment="texlive-latexmk-bin is &lt;2017.20170520.svn10937-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226729" version="1" comment="texlive-latexmp is &lt;2017.133.1.2.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226730" version="1" comment="texlive-latexpand is &lt;2017.133.1.3svn41873-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226731" version="1" comment="texlive-latexpand-bin is &lt;2017.20170520.svn27025-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226732" version="1" comment="texlive-lato is &lt;2017.133.2.2svn24986-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226733" version="1" comment="texlive-lato-fonts is &lt;2017.133.2.2svn24986-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226734" version="1" comment="texlive-layaureo is &lt;2017.133.0.0.2svn19087-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226735" version="1" comment="texlive-layouts is &lt;2017.133.2.6dsvn42428-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226736" version="1" comment="texlive-lazylist is &lt;2017.133.1.0asvn17691-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226737" version="1" comment="texlive-lcd is &lt;2017.133.0.0.3svn16549-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226738" version="1" comment="texlive-lcdftypetools is &lt;2017.133.svn44166-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226739" version="1" comment="texlive-lcdftypetools-bin is &lt;2017.20170520.svn44143-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226740" version="1" comment="texlive-lcg is &lt;2017.133.1.3svn31474-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226741" version="1" comment="texlive-lcyw is &lt;2017.133.1.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226742" version="1" comment="texlive-leading is &lt;2017.133.0.0.3svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226743" version="1" comment="texlive-leadsheets is &lt;2017.133.0.0.5asvn43034-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226744" version="1" comment="texlive-leaflet is &lt;2017.133.1.1bsvn43523-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226745" version="1" comment="texlive-lecturer is &lt;2017.133.svn23916-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226746" version="1" comment="texlive-ledmac is &lt;2017.133.0.0.19.4svn41811-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226747" version="1" comment="texlive-leftidx is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226748" version="1" comment="texlive-leipzig is &lt;2017.133.1.1svn34902-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226749" version="1" comment="texlive-lengthconvert is &lt;2017.133.1.0asvn30867-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226750" version="1" comment="texlive-lettre is &lt;2017.133.2.353svn35145-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226751" version="1" comment="texlive-lettrine is &lt;2017.133.1.9svn38268-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226752" version="1" comment="texlive-levy is &lt;2017.133.svn21750-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226753" version="1" comment="texlive-lewis is &lt;2017.133.0.0.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226754" version="1" comment="texlive-lexikon is &lt;2017.133.1.0csvn17364-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226755" version="1" comment="texlive-lexref is &lt;2017.133.1.1asvn36026-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226756" version="1" comment="texlive-lfb is &lt;2017.133.1.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226757" version="1" comment="texlive-lgreek is &lt;2017.133.svn21818-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226758" version="1" comment="texlive-lh is &lt;2017.133.3.5gsvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226759" version="1" comment="texlive-lhcyr is &lt;2017.133.svn31795-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226760" version="1" comment="texlive-lhelp is &lt;2017.133.2.0svn23638-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226761" version="1" comment="texlive-libertine is &lt;2017.133.5.3.0svn43603-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226762" version="1" comment="texlive-libertine-fonts is &lt;2017.133.5.3.0svn43603-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226763" version="1" comment="texlive-libertinegc is &lt;2017.133.1.00svn39746-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226764" version="1" comment="texlive-libertinus is &lt;2017.133.6.4svn44409-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226765" version="1" comment="texlive-libertinus-fonts is &lt;2017.133.6.4svn44409-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226766" version="1" comment="texlive-libertinust1math is &lt;2017.133.1.0.4svn44542-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226767" version="1" comment="texlive-libertinust1math-fonts is &lt;2017.133.1.0.4svn44542-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226768" version="1" comment="texlive-libgreek is &lt;2017.133.1.0svn27789-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226769" version="1" comment="texlive-librarian is &lt;2017.133.1.0svn19880-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226770" version="1" comment="texlive-librebaskerville is &lt;2017.133.svn31741-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226771" version="1" comment="texlive-librebaskerville-fonts is &lt;2017.133.svn31741-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226772" version="1" comment="texlive-librebodoni is &lt;2017.133.svn39375-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226773" version="1" comment="texlive-librebodoni-fonts is &lt;2017.133.svn39375-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226774" version="1" comment="texlive-librecaslon is &lt;2017.133.svn31929-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226775" version="1" comment="texlive-librecaslon-fonts is &lt;2017.133.svn31929-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226776" version="1" comment="texlive-libris is &lt;2017.133.1.007svn19409-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226777" version="1" comment="texlive-libris-fonts is &lt;2017.133.1.007svn19409-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226778" version="1" comment="texlive-lilyglyphs is &lt;2017.133.0.0.2.3svn33164-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226779" version="1" comment="texlive-lilyglyphs-bin is &lt;2017.20170520.svn31696-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226780" version="1" comment="texlive-lilyglyphs-fonts is &lt;2017.133.0.0.2.3svn33164-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226781" version="1" comment="texlive-limap is &lt;2017.133.2.1svn41390-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226782" version="1" comment="texlive-linearA is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226783" version="1" comment="texlive-linearA-fonts is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226784" version="1" comment="texlive-linegoal is &lt;2017.133.2.9svn21523-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226785" version="1" comment="texlive-lineno is &lt;2017.133.4.41svn21442-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226786" version="1" comment="texlive-ling-macros is &lt;2017.133.svn42268-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226787" version="1" comment="texlive-linguex is &lt;2017.133.4.3svn30815-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226788" version="1" comment="texlive-linop is &lt;2017.133.0.0.1svn41304-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226789" version="1" comment="texlive-lion-msc is &lt;2017.133.0.0.27svn44131-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226790" version="1" comment="texlive-lipsum is &lt;2017.133.1.3svn34800-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226791" version="1" comment="texlive-lisp-on-tex is &lt;2017.133.2.0svn38722-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226792" version="1" comment="texlive-listbib is &lt;2017.133.2.2svn29349-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226793" version="1" comment="texlive-listbib-bin is &lt;2017.20170520.svn26126-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226794" version="1" comment="texlive-listing is &lt;2017.133.1.2svn17373-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226795" version="1" comment="texlive-listings is &lt;2017.133.1.6svn37534-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226796" version="1" comment="texlive-listings-ext is &lt;2017.133.67svn29349-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226797" version="1" comment="texlive-listings-ext-bin is &lt;2017.20170520.svn15093-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226798" version="1" comment="texlive-listlbls is &lt;2017.133.1.03svn34893-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226799" version="1" comment="texlive-listliketab is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226800" version="1" comment="texlive-listofitems is &lt;2017.133.1.3svn42530-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226801" version="1" comment="texlive-listofsymbols is &lt;2017.133.0.0.2svn16134-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226802" version="1" comment="texlive-lithuanian is &lt;2017.133.svn22722-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226803" version="1" comment="texlive-liturg is &lt;2017.133.1.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226804" version="1" comment="texlive-lkproof is &lt;2017.133.3.1svn20021-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226805" version="1" comment="texlive-lm is &lt;2017.133.2.004svn28119-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226806" version="1" comment="texlive-lm-fonts is &lt;2017.133.2.004svn28119-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226807" version="1" comment="texlive-lm-math is &lt;2017.133.1.959svn36915-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226808" version="1" comment="texlive-lm-math-fonts is &lt;2017.133.1.959svn36915-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226809" version="1" comment="texlive-lmake is &lt;2017.133.1.0svn25552-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226810" version="1" comment="texlive-lni is &lt;2017.133.1.3svn44368-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226811" version="1" comment="texlive-lobster2 is &lt;2017.133.svn32617-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226812" version="1" comment="texlive-lobster2-fonts is &lt;2017.133.svn32617-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226813" version="1" comment="texlive-locality is &lt;2017.133.0.0.2svn20422-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226814" version="1" comment="texlive-localloc is &lt;2017.133.svn21934-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226815" version="1" comment="texlive-logbox is &lt;2017.133.1.0svn24499-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226816" version="1" comment="texlive-logical-markup-utils is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226817" version="1" comment="texlive-logicproof is &lt;2017.133.svn33254-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226818" version="1" comment="texlive-logicpuzzle is &lt;2017.133.2.5svn34491-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226819" version="1" comment="texlive-logpap is &lt;2017.133.0.0.6svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226820" version="1" comment="texlive-logreq is &lt;2017.133.1.0svn19640-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226821" version="1" comment="texlive-lollipop is &lt;2017.133.1.07svn41438-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226822" version="1" comment="texlive-lollipop-bin is &lt;2017.20170520.svn41465-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226823" version="1" comment="texlive-longdivision is &lt;2017.133.1.0svn43159-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226824" version="1" comment="texlive-longfbox is &lt;2017.133.1.0svn39028-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226825" version="1" comment="texlive-longfigure is &lt;2017.133.1.0svn34302-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226826" version="1" comment="texlive-longnamefilelist is &lt;2017.133.0.0.2svn27889-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226827" version="1" comment="texlive-loops is &lt;2017.133.1.3svn30704-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226828" version="1" comment="texlive-lpform is &lt;2017.133.svn36918-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226829" version="1" comment="texlive-lpic is &lt;2017.133.0.0.8svn20843-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226830" version="1" comment="texlive-lplfitch is &lt;2017.133.0.0.9svn31077-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226831" version="1" comment="texlive-lps is &lt;2017.133.0.0.7svn21322-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226832" version="1" comment="texlive-lroundrect is &lt;2017.133.1.0svn39804-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226833" version="1" comment="texlive-lsc is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226834" version="1" comment="texlive-lshort-bulgarian is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226835" version="1" comment="texlive-lshort-chinese is &lt;2017.133.5.10svn43606-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226836" version="1" comment="texlive-lshort-czech is &lt;2017.133.4.27svn29803-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226837" version="1" comment="texlive-lshort-dutch is &lt;2017.133.1.3svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226838" version="1" comment="texlive-lshort-english is &lt;2017.133.5.0.5svn37892-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226839" version="1" comment="texlive-lshort-estonian is &lt;2017.133.5.05svn39323-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226840" version="1" comment="texlive-lshort-finnish is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226841" version="1" comment="texlive-lshort-french is &lt;2017.133.5.01fr_0svn23332-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226842" version="1" comment="texlive-lshort-german is &lt;2017.133.3.0bsvn42434-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226843" version="1" comment="texlive-lshort-italian is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226844" version="1" comment="texlive-lshort-japanese is &lt;2017.133.svn36207-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226845" version="1" comment="texlive-lshort-korean is &lt;2017.133.4.17svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226846" version="1" comment="texlive-lshort-mongol is &lt;2017.133.4.26svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226847" version="1" comment="texlive-lshort-persian is &lt;2017.133.5.01svn31296-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226848" version="1" comment="texlive-lshort-polish is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226849" version="1" comment="texlive-lshort-portuguese is &lt;2017.133.5.01.0svn22569-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226850" version="1" comment="texlive-lshort-russian is &lt;2017.133.svn18906-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226851" version="1" comment="texlive-lshort-slovak is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226852" version="1" comment="texlive-lshort-slovenian is &lt;2017.133.4.20svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226853" version="1" comment="texlive-lshort-spanish is &lt;2017.133.0.0.5svn35050-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226854" version="1" comment="texlive-lshort-thai is &lt;2017.133.1.32svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226855" version="1" comment="texlive-lshort-turkish is &lt;2017.133.4.20svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226856" version="1" comment="texlive-lshort-ukr is &lt;2017.133.4.00svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226857" version="1" comment="texlive-lshort-vietnamese is &lt;2017.133.4.00svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226858" version="1" comment="texlive-lstaddons is &lt;2017.133.0.0.1svn26196-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226859" version="1" comment="texlive-lstbayes is &lt;2017.133.svn41550-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226860" version="1" comment="texlive-lt3graph is &lt;2017.133.0.0.1.8svn42874-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226861" version="1" comment="texlive-ltablex is &lt;2017.133.1.1svn34923-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226862" version="1" comment="texlive-ltabptch is &lt;2017.133.1.74dsvn17533-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226863" version="1" comment="texlive-ltb2bib is &lt;2017.133.0.0.01svn43746-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226864" version="1" comment="texlive-ltxdockit is &lt;2017.133.1.2dsvn21869-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226865" version="1" comment="texlive-ltxfileinfo is &lt;2017.133.2.04svn38663-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226866" version="1" comment="texlive-ltxfileinfo-bin is &lt;2017.20170520.svn29005-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226867" version="1" comment="texlive-ltximg is &lt;2017.133.1.2svn37006-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226868" version="1" comment="texlive-ltximg-bin is &lt;2017.20170520.svn32346-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226869" version="1" comment="texlive-ltxindex is &lt;2017.133.0.0.1csvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226870" version="1" comment="texlive-ltxkeys is &lt;2017.133.0.0.0.3csvn28332-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226871" version="1" comment="texlive-ltxmisc is &lt;2017.133.svn21927-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226872" version="1" comment="texlive-ltxnew is &lt;2017.133.1.3svn21586-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226873" version="1" comment="texlive-ltxtools is &lt;2017.133.0.0.0.1asvn24897-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226874" version="1" comment="texlive-lua-alt-getopt is &lt;2017.133.0.0.7.0svn29349-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226875" version="1" comment="texlive-lua-check-hyphen is &lt;2017.133.0.0.4svn40229-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226876" version="1" comment="texlive-lua-visual-debug is &lt;2017.133.0.0.5svn41387-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226877" version="1" comment="texlive-lua2dox is &lt;2017.133.0.0.2svn29349-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226878" version="1" comment="texlive-lua2dox-bin is &lt;2017.20170520.svn29053-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226879" version="1" comment="texlive-luabibentry is &lt;2017.133.0.0.1asvn31783-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226880" version="1" comment="texlive-luabidi is &lt;2017.133.0.0.2svn30790-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226881" version="1" comment="texlive-luacode is &lt;2017.133.1.2asvn25193-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226882" version="1" comment="texlive-luahyphenrules is &lt;2017.133.1.0svn42670-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226883" version="1" comment="texlive-luaindex is &lt;2017.133.0.0.1bsvn25882-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226884" version="1" comment="texlive-luainputenc is &lt;2017.133.0.0.973svn20491-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226885" version="1" comment="texlive-luaintro is &lt;2017.133.0.0.03svn35490-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226886" version="1" comment="texlive-lualatex-doc is &lt;2017.133.svn30473-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226887" version="1" comment="texlive-lualatex-doc-de is &lt;2017.133.1.0svn30474-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226888" version="1" comment="texlive-lualatex-math is &lt;2017.133.1.6svn40621-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226889" version="1" comment="texlive-lualibs is &lt;2017.133.2.5svn43153-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226890" version="1" comment="texlive-luamesh is &lt;2017.133.0.0.51svn43814-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226891" version="1" comment="texlive-luamplib is &lt;2017.133.2.12.1svn44496-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226892" version="1" comment="texlive-luaotfload is &lt;2017.133.2.8_fix_2svn43194-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226893" version="1" comment="texlive-luaotfload-bin is &lt;2017.20170520.svn34647-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226894" version="1" comment="texlive-luapackageloader is &lt;2017.133.0.0.1svn44500-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226895" version="1" comment="texlive-luasseq is &lt;2017.133.svn37877-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226896" version="1" comment="texlive-luatex is &lt;2017.133.svn44166-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226897" version="1" comment="texlive-luatex-bin is &lt;2017.20170520.svn44549-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226898" version="1" comment="texlive-luatex85 is &lt;2017.133.1.4svn41456-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226899" version="1" comment="texlive-luatexbase is &lt;2017.133.1.3svn38550-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226900" version="1" comment="texlive-luatexja is &lt;2017.133.20170505.0svn44217-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226901" version="1" comment="texlive-luatexko is &lt;2017.133.1.17svn44141-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226902" version="1" comment="texlive-luatextra is &lt;2017.133.1.0.1svn20747-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226903" version="1" comment="texlive-luatodonotes is &lt;2017.133.0.0.3svn39019-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226904" version="1" comment="texlive-luaxml is &lt;2017.133.0.0.0.2svn32741-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226905" version="1" comment="texlive-lwarp is &lt;2017.133.0.0.32svn44552-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226906" version="1" comment="texlive-lwarp-bin is &lt;2017.20170520.svn43292-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226907" version="1" comment="texlive-lxfonts is &lt;2017.133.2.0bsvn32354-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226908" version="1" comment="texlive-lxfonts-fonts is &lt;2017.133.2.0bsvn32354-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226909" version="1" comment="texlive-ly1 is &lt;2017.133.svn21086-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226910" version="1" comment="texlive-m-tx is &lt;2017.133.0.0.62asvn44166-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226911" version="1" comment="texlive-m-tx-bin is &lt;2017.20170520.svn44143-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226912" version="1" comment="texlive-macros2e is &lt;2017.133.0.0.4svn23236-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226913" version="1" comment="texlive-macroswap is &lt;2017.133.1.1svn31498-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226914" version="1" comment="texlive-mafr is &lt;2017.133.1.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226915" version="1" comment="texlive-magaz is &lt;2017.133.0.0.4svn24694-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226916" version="1" comment="texlive-mailing is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226917" version="1" comment="texlive-mailmerge is &lt;2017.133.1.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226918" version="1" comment="texlive-make4ht is &lt;2017.133.0.0.1csvn44079-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226919" version="1" comment="texlive-make4ht-bin is &lt;2017.20170520.svn37750-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226920" version="1" comment="texlive-makebarcode is &lt;2017.133.1.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226921" version="1" comment="texlive-makebase is &lt;2017.133.0.0.2svn41012-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226922" version="1" comment="texlive-makebox is &lt;2017.133.0.0.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226923" version="1" comment="texlive-makecell is &lt;2017.133.0.0.1esvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226924" version="1" comment="texlive-makecirc is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226925" version="1" comment="texlive-makecmds is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226926" version="1" comment="texlive-makedtx is &lt;2017.133.0.0.94bsvn38769-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226927" version="1" comment="texlive-makedtx-bin is &lt;2017.20170520.svn38769-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226928" version="1" comment="texlive-makeglos is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226929" version="1" comment="texlive-makeindex is &lt;2017.133.svn44166-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226930" version="1" comment="texlive-makeindex-bin is &lt;2017.20170520.svn44143-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226931" version="1" comment="texlive-makeplot is &lt;2017.133.1.0.6svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226932" version="1" comment="texlive-makeshape is &lt;2017.133.2.1svn28973-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226933" version="1" comment="texlive-mandi is &lt;2017.133.2.6.1svn41598-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226934" version="1" comment="texlive-manfnt is &lt;2017.133.svn42428-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226935" version="1" comment="texlive-manfnt-font is &lt;2017.133.svn35799-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226936" version="1" comment="texlive-manfnt-font-fonts is &lt;2017.133.svn35799-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226937" version="1" comment="texlive-manuscript is &lt;2017.133.1.7svn36110-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226938" version="1" comment="texlive-margbib is &lt;2017.133.1.0csvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226939" version="1" comment="texlive-marginfix is &lt;2017.133.1.1svn31598-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226940" version="1" comment="texlive-marginnote is &lt;2017.133.1.2bsvn43979-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226941" version="1" comment="texlive-markdown is &lt;2017.133.2.5.3svn44237-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226942" version="1" comment="texlive-marvosym is &lt;2017.133.2.2asvn29349-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226943" version="1" comment="texlive-marvosym-fonts is &lt;2017.133.2.2asvn29349-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226944" version="1" comment="texlive-matc3 is &lt;2017.133.1.0.1svn29845-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226945" version="1" comment="texlive-matc3mem is &lt;2017.133.1.1svn35773-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226946" version="1" comment="texlive-match_parens is &lt;2017.133.1.43svn36270-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226947" version="1" comment="texlive-match_parens-bin is &lt;2017.20170520.svn23500-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226948" version="1" comment="texlive-math-e is &lt;2017.133.svn20062-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226949" version="1" comment="texlive-math-into-latex-4 is &lt;2017.133.svn44131-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226950" version="1" comment="texlive-mathabx is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226951" version="1" comment="texlive-mathabx-type1 is &lt;2017.133.svn21129-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226952" version="1" comment="texlive-mathabx-type1-fonts is &lt;2017.133.svn21129-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226953" version="1" comment="texlive-mathalfa is &lt;2017.133.1.09svn43332-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226954" version="1" comment="texlive-mathastext is &lt;2017.133.1.3rsvn42447-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226955" version="1" comment="texlive-mathcomp is &lt;2017.133.0.0.1fsvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226956" version="1" comment="texlive-mathdesign is &lt;2017.133.2.31svn31639-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226957" version="1" comment="texlive-mathdesign-fonts is &lt;2017.133.2.31svn31639-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226958" version="1" comment="texlive-mathdots is &lt;2017.133.0.0.9svn34301-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226959" version="1" comment="texlive-mathexam is &lt;2017.133.1.00svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226960" version="1" comment="texlive-mathpartir is &lt;2017.133.1.3.2svn39864-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226961" version="1" comment="texlive-mathpazo is &lt;2017.133.1.003svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226962" version="1" comment="texlive-mathpazo-fonts is &lt;2017.133.1.003svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226963" version="1" comment="texlive-mathpunctspace is &lt;2017.133.1.0svn44131-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226964" version="1" comment="texlive-maths-symbols is &lt;2017.133.3.4svn37763-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226965" version="1" comment="texlive-mathspec is &lt;2017.133.0.0.2bsvn42773-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226966" version="1" comment="texlive-mathspic is &lt;2017.133.1.13svn31957-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226967" version="1" comment="texlive-mathspic-bin is &lt;2017.20170520.svn23661-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226968" version="1" comment="texlive-mathtools is &lt;2017.133.1.19svn44504-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226969" version="1" comment="texlive-matlab-prettifier is &lt;2017.133.0.0.3svn34323-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226970" version="1" comment="texlive-mattens is &lt;2017.133.1.3svn17582-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226971" version="1" comment="texlive-maybemath is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226972" version="1" comment="texlive-mbenotes is &lt;2017.133.2svn31813-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226973" version="1" comment="texlive-mcaption is &lt;2017.133.3.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226974" version="1" comment="texlive-mceinleger is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226975" version="1" comment="texlive-mcexam is &lt;2017.133.0.0.3svn44171-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226976" version="1" comment="texlive-mcf2graph is &lt;2017.133.4.23svn44468-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226977" version="1" comment="texlive-mcite is &lt;2017.133.1.6svn18173-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226978" version="1" comment="texlive-mciteplus is &lt;2017.133.1.2svn31648-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226979" version="1" comment="texlive-mcmthesis is &lt;2017.133.6.2svn39515-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226980" version="1" comment="texlive-mdframed is &lt;2017.133.1.9bsvn31075-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226981" version="1" comment="texlive-mdputu is &lt;2017.133.1.2svn20298-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226982" version="1" comment="texlive-mdsymbol is &lt;2017.133.0.0.5svn28399-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226983" version="1" comment="texlive-mdsymbol-fonts is &lt;2017.133.0.0.5svn28399-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226984" version="1" comment="texlive-mdwtools is &lt;2017.133.1.05.4svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226985" version="1" comment="texlive-media9 is &lt;2017.133.0.0.79svn44045-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226986" version="1" comment="texlive-medstarbeamer is &lt;2017.133.svn38828-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226987" version="1" comment="texlive-meetingmins is &lt;2017.133.1.6svn31878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226988" version="1" comment="texlive-memdesign is &lt;2017.133.svn34157-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226989" version="1" comment="texlive-memexsupp is &lt;2017.133.0.0.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226990" version="1" comment="texlive-memoir is &lt;2017.133.3.7fsvn41203-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226991" version="1" comment="texlive-memory is &lt;2017.133.1.2svn30452-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226992" version="1" comment="texlive-mendex-doc is &lt;2017.133.svn42767-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226993" version="1" comment="texlive-mentis is &lt;2017.133.1.5svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226994" version="1" comment="texlive-menu is &lt;2017.133.0.0.994svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226995" version="1" comment="texlive-menukeys is &lt;2017.133.1.5svn41823-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226996" version="1" comment="texlive-merriweather is &lt;2017.133.svn34315-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226997" version="1" comment="texlive-merriweather-fonts is &lt;2017.133.svn34315-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226998" version="1" comment="texlive-metafont is &lt;2017.133.2.7182818svn44166-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009226999" version="1" comment="texlive-metafont-beginners is &lt;2017.133.svn29803-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227000" version="1" comment="texlive-metafont-bin is &lt;2017.20170520.svn44143-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227001" version="1" comment="texlive-metago is &lt;2017.133.0.0.9svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227002" version="1" comment="texlive-metalogo is &lt;2017.133.0.0.12svn18611-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227003" version="1" comment="texlive-metaobj is &lt;2017.133.0.0.93svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227004" version="1" comment="texlive-metaplot is &lt;2017.133.0.0.91svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227005" version="1" comment="texlive-metapost is &lt;2017.133.svn44166-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227006" version="1" comment="texlive-metapost-bin is &lt;2017.20170520.svn44143-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227007" version="1" comment="texlive-metapost-examples is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227008" version="1" comment="texlive-metapost-fonts is &lt;2017.133.svn44166-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227009" version="1" comment="texlive-metatex is &lt;2017.133.1.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227010" version="1" comment="texlive-metatype1 is &lt;2017.133.0.0.56svn37105-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227011" version="1" comment="texlive-metauml is &lt;2017.133.0.0.2.5svn19692-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227012" version="1" comment="texlive-method is &lt;2017.133.2.0bsvn17485-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227013" version="1" comment="texlive-metre is &lt;2017.133.1.0svn18489-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227014" version="1" comment="texlive-metrix is &lt;2017.133.1.3svn40099-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227015" version="1" comment="texlive-mex is &lt;2017.133.1.05svn40855-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227016" version="1" comment="texlive-mex-bin is &lt;2017.20170520.svn3006-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227017" version="1" comment="texlive-mf2pt1 is &lt;2017.133.2.5asvn33802-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227018" version="1" comment="texlive-mf2pt1-bin is &lt;2017.20170520.svn23406-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227019" version="1" comment="texlive-mfirstuc is &lt;2017.133.2.04svn41785-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227020" version="1" comment="texlive-mflogo is &lt;2017.133.2.0svn42428-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227021" version="1" comment="texlive-mflogo-font is &lt;2017.133.1.002svn36898-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227022" version="1" comment="texlive-mflogo-font-fonts is &lt;2017.133.1.002svn36898-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227023" version="1" comment="texlive-mflua is &lt;2017.133.svn43947-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227024" version="1" comment="texlive-mflua-bin is &lt;2017.20170520.svn44143-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227025" version="1" comment="texlive-mfnfss is &lt;2017.133.svn19410-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227026" version="1" comment="texlive-mfpic is &lt;2017.133.1.10svn28444-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227027" version="1" comment="texlive-mfpic4ode is &lt;2017.133.0.0.4svn17745-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227028" version="1" comment="texlive-mftinc is &lt;2017.133.1.0asvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227029" version="1" comment="texlive-mfware is &lt;2017.133.svn44166-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227030" version="1" comment="texlive-mfware-bin is &lt;2017.20170520.svn44143-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227031" version="1" comment="texlive-mgltex is &lt;2017.133.4.2svn41676-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227032" version="1" comment="texlive-mhchem is &lt;2017.133.svn44451-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227033" version="1" comment="texlive-mhequ is &lt;2017.133.1.7svn38224-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227034" version="1" comment="texlive-miama is &lt;2017.133.1.0svn39837-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227035" version="1" comment="texlive-miama-fonts is &lt;2017.133.1.0svn39837-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227036" version="1" comment="texlive-microtype is &lt;2017.133.2.6asvn41127-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227037" version="1" comment="texlive-microtype-de is &lt;2017.133.2.4svn24549-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227038" version="1" comment="texlive-midnight is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227039" version="1" comment="texlive-midpage is &lt;2017.133.1.1asvn17484-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227040" version="1" comment="texlive-miller is &lt;2017.133.1.2svn18789-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227041" version="1" comment="texlive-milog is &lt;2017.133.1.0svn41610-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227042" version="1" comment="texlive-minibox is &lt;2017.133.0.0.2asvn30914-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227043" version="1" comment="texlive-minidocument is &lt;2017.133.1.0svn43752-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227044" version="1" comment="texlive-minifp is &lt;2017.133.0.0.96svn32559-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227045" version="1" comment="texlive-minipage-marginpar is &lt;2017.133.0.0.2svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227046" version="1" comment="texlive-miniplot is &lt;2017.133.svn17483-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227047" version="1" comment="texlive-minitoc is &lt;2017.133.61svn37852-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227048" version="1" comment="texlive-minorrevision is &lt;2017.133.1.1svn32165-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227049" version="1" comment="texlive-minted is &lt;2017.133.2.4.1svn42418-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227050" version="1" comment="texlive-mintspirit is &lt;2017.133.svn32069-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227051" version="1" comment="texlive-mintspirit-fonts is &lt;2017.133.svn32069-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227052" version="1" comment="texlive-minutes is &lt;2017.133.1.8fsvn42186-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227053" version="1" comment="texlive-missaali is &lt;2017.133.1.004svn42810-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227054" version="1" comment="texlive-missaali-fonts is &lt;2017.133.1.004svn42810-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227055" version="1" comment="texlive-mkgrkindex is &lt;2017.133.2.0svn26313-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227056" version="1" comment="texlive-mkgrkindex-bin is &lt;2017.20170520.svn14428-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227057" version="1" comment="texlive-mkjobtexmf is &lt;2017.133.0.0.8svn29725-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227058" version="1" comment="texlive-mkjobtexmf-bin is &lt;2017.20170520.svn8457-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227059" version="1" comment="texlive-mkpattern is &lt;2017.133.1.2svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227060" version="1" comment="texlive-mkpic is &lt;2017.133.1.02svn33700-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227061" version="1" comment="texlive-mkpic-bin is &lt;2017.20170520.svn33688-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227062" version="1" comment="texlive-mla-paper is &lt;2017.133.svn20885-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227063" version="1" comment="texlive-mlist is &lt;2017.133.0.0.6asvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227064" version="1" comment="texlive-mltex is &lt;2017.133.2.2svn39057-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227065" version="1" comment="texlive-mltex-bin is &lt;2017.20170520.svn3006-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227066" version="1" comment="texlive-mmap is &lt;2017.133.1.03svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227067" version="1" comment="texlive-mnotes is &lt;2017.133.0.0.8svn35521-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227068" version="1" comment="texlive-mnras is &lt;2017.133.3.0svn37579-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227069" version="1" comment="texlive-mnsymbol is &lt;2017.133.1.4svn18651-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227070" version="1" comment="texlive-mnsymbol-fonts is &lt;2017.133.1.4svn18651-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227071" version="1" comment="texlive-moderncv is &lt;2017.133.2.0.0svn37992-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227072" version="1" comment="texlive-moderntimeline is &lt;2017.133.0.0.9svn38254-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227073" version="1" comment="texlive-modiagram is &lt;2017.133.0.0.2gsvn38448-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227074" version="1" comment="texlive-modref is &lt;2017.133.1.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227075" version="1" comment="texlive-modroman is &lt;2017.133.1svn29803-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227076" version="1" comment="texlive-modular is &lt;2017.133.svn44142-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227077" version="1" comment="texlive-mongolian-babel is &lt;2017.133.1.2svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227078" version="1" comment="texlive-monofill is &lt;2017.133.0.0.2svn28140-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227079" version="1" comment="texlive-montex is &lt;2017.133.ivu.04.092svn29349-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227080" version="1" comment="texlive-montex-fonts is &lt;2017.133.ivu.04.092svn29349-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227081" version="1" comment="texlive-montserrat is &lt;2017.133.1.01svn43347-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227082" version="1" comment="texlive-montserrat-fonts is &lt;2017.133.1.01svn43347-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227083" version="1" comment="texlive-moodle is &lt;2017.133.0.0.5svn39367-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227084" version="1" comment="texlive-moreenum is &lt;2017.133.1.03svn24479-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227085" version="1" comment="texlive-morefloats is &lt;2017.133.1.0hsvn37927-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227086" version="1" comment="texlive-morehype is &lt;2017.133.r0.83svn38815-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227087" version="1" comment="texlive-moresize is &lt;2017.133.1.9svn17513-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227088" version="1" comment="texlive-moreverb is &lt;2017.133.2.3asvn22126-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227089" version="1" comment="texlive-morewrites is &lt;2017.133.svn43945-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227090" version="1" comment="texlive-movie15 is &lt;2017.133.svn26473-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227091" version="1" comment="texlive-mp3d is &lt;2017.133.1.34svn29349-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227092" version="1" comment="texlive-mparhack is &lt;2017.133.1.4svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227093" version="1" comment="texlive-mparrows is &lt;2017.133.0.0.1svn39729-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227094" version="1" comment="texlive-mpattern is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227095" version="1" comment="texlive-mpcolornames is &lt;2017.133.0.0.20svn23252-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227096" version="1" comment="texlive-mpgraphics is &lt;2017.133.0.0.3svn29776-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227097" version="1" comment="texlive-mpman-ru is &lt;2017.133.1.004svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227098" version="1" comment="texlive-mpostinl is &lt;2017.133.1.11svn43670-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227099" version="1" comment="texlive-mptopdf is &lt;2017.133.svn41282-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227100" version="1" comment="texlive-mptopdf-bin is &lt;2017.20170520.svn18674-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227101" version="1" comment="texlive-mptrees is &lt;2017.133.17.06svn44453-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227102" version="1" comment="texlive-ms is &lt;2017.133.svn42428-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227103" version="1" comment="texlive-msc is &lt;2017.133.1.16svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227104" version="1" comment="texlive-msg is &lt;2017.133.0.0.40svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227105" version="1" comment="texlive-mslapa is &lt;2017.133.svn17514-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227106" version="1" comment="texlive-msu-thesis is &lt;2017.133.2.6bsvn41345-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227107" version="1" comment="texlive-mtgreek is &lt;2017.133.1.1+svn17967-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227108" version="1" comment="texlive-mucproc is &lt;2017.133.1.02svn43445-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227109" version="1" comment="texlive-mugsthesis is &lt;2017.133.svn34878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227110" version="1" comment="texlive-multenum is &lt;2017.133.svn21775-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227111" version="1" comment="texlive-multiaudience is &lt;2017.133.1.03svn38035-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227112" version="1" comment="texlive-multibbl is &lt;2017.133.1.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227113" version="1" comment="texlive-multibib is &lt;2017.133.1.4svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227114" version="1" comment="texlive-multibibliography is &lt;2017.133.1.03svn30939-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227115" version="1" comment="texlive-multibibliography-bin is &lt;2017.20170520.svn30534-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227116" version="1" comment="texlive-multicap is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227117" version="1" comment="texlive-multidef is &lt;2017.133.1.10svn40637-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227118" version="1" comment="texlive-multido is &lt;2017.133.1.42svn18302-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227119" version="1" comment="texlive-multienv is &lt;2017.133.1.0svn26544-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227120" version="1" comment="texlive-multiexpand is &lt;2017.133.1.4svn38416-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227121" version="1" comment="texlive-multiobjective is &lt;2017.133.1.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227122" version="1" comment="texlive-multirow is &lt;2017.133.2.2svn42588-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227123" version="1" comment="texlive-munich is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227124" version="1" comment="texlive-musixguit is &lt;2017.133.1.2.2svn21649-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227125" version="1" comment="texlive-musixtex is &lt;2017.133.1.24svn43375-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227126" version="1" comment="texlive-musixtex-bin is &lt;2017.20170520.svn37026-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227127" version="1" comment="texlive-musixtex-fonts is &lt;2017.133.svn37762-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227128" version="1" comment="texlive-musixtex-fonts-fonts is &lt;2017.133.svn37762-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227129" version="1" comment="texlive-musixtnt is &lt;2017.133.svn40307-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227130" version="1" comment="texlive-musixtnt-bin is &lt;2017.20170520.svn44143-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227131" version="1" comment="texlive-musuos is &lt;2017.133.1.1dsvn24857-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227132" version="1" comment="texlive-muthesis is &lt;2017.133.svn23861-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227133" version="1" comment="texlive-mversion is &lt;2017.133.1.0.1svn29370-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227134" version="1" comment="texlive-mwcls is &lt;2017.133.0.0.75svn44352-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227135" version="1" comment="texlive-mwe is &lt;2017.133.0.0.3svn26422-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227136" version="1" comment="texlive-mweights is &lt;2017.133.svn43647-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227137" version="1" comment="texlive-mxedruli is &lt;2017.133.3.3csvn30021-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227138" version="1" comment="texlive-mxedruli-fonts is &lt;2017.133.3.3csvn30021-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227139" version="1" comment="texlive-mychemistry is &lt;2017.133.1.99bsvn28611-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227140" version="1" comment="texlive-mycv is &lt;2017.133.1.5.6svn26807-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227141" version="1" comment="texlive-mylatexformat is &lt;2017.133.3.4svn21392-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227142" version="1" comment="texlive-mynsfc is &lt;2017.133.1.01svn41996-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227143" version="1" comment="texlive-nag is &lt;2017.133.0.0.7svn24741-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227144" version="1" comment="texlive-nameauth is &lt;2017.133.3.2svn43586-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227145" version="1" comment="texlive-namespc is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227146" version="1" comment="texlive-nanumtype1 is &lt;2017.133.3.0svn29558-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227147" version="1" comment="texlive-nanumtype1-fonts is &lt;2017.133.3.0svn29558-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227148" version="1" comment="texlive-nar is &lt;2017.133.3.19svn38100-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227149" version="1" comment="texlive-natbib is &lt;2017.133.8.31bsvn20668-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227150" version="1" comment="texlive-natded is &lt;2017.133.0.0.1svn32693-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227151" version="1" comment="texlive-nath is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227152" version="1" comment="texlive-nature is &lt;2017.133.1.0svn21819-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227153" version="1" comment="texlive-navigator is &lt;2017.133.1.1svn41413-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227154" version="1" comment="texlive-navydocs is &lt;2017.133.1.1svn41643-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227155" version="1" comment="texlive-ncclatex is &lt;2017.133.1.5svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227156" version="1" comment="texlive-ncctools is &lt;2017.133.3.5svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227157" version="1" comment="texlive-ncntrsbk is &lt;2017.133.svn31835-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227158" version="1" comment="texlive-ncntrsbk-fonts is &lt;2017.133.svn31835-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227159" version="1" comment="texlive-nddiss is &lt;2017.133.3.0svn29349-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227160" version="1" comment="texlive-ndsu-thesis is &lt;2017.133.svn40536-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227161" version="1" comment="texlive-needspace is &lt;2017.133.1.3dsvn29601-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227162" version="1" comment="texlive-nestquot is &lt;2017.133.svn27323-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227163" version="1" comment="texlive-neuralnetwork is &lt;2017.133.1.0svn31500-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227164" version="1" comment="texlive-nevelok is &lt;2017.133.1.03svn39029-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227165" version="1" comment="texlive-newcommand is &lt;2017.133.2.0svn18704-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227166" version="1" comment="texlive-newenviron is &lt;2017.133.1.0svn29331-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227167" version="1" comment="texlive-newfile is &lt;2017.133.1.0csvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227168" version="1" comment="texlive-newlfm is &lt;2017.133.9.4svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227169" version="1" comment="texlive-newpx is &lt;2017.133.1.32svn44457-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227170" version="1" comment="texlive-newpx-fonts is &lt;2017.133.1.32svn44457-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227171" version="1" comment="texlive-newsletr is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227172" version="1" comment="texlive-newspaper is &lt;2017.133.1.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227173" version="1" comment="texlive-newtx is &lt;2017.133.1.525svn44520-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227174" version="1" comment="texlive-newtx-fonts is &lt;2017.133.1.525svn44520-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227175" version="1" comment="texlive-newtxsf is &lt;2017.133.1.05svn41918-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227176" version="1" comment="texlive-newtxsf-fonts is &lt;2017.133.1.05svn41918-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227177" version="1" comment="texlive-newtxtt is &lt;2017.133.1.055svn44510-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227178" version="1" comment="texlive-newtxtt-fonts is &lt;2017.133.1.055svn44510-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227179" version="1" comment="texlive-newunicodechar is &lt;2017.133.1.1svn28253-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227180" version="1" comment="texlive-newvbtm is &lt;2017.133.1.1svn23996-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227181" version="1" comment="texlive-newverbs is &lt;2017.133.1.3asvn26258-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227182" version="1" comment="texlive-nextpage is &lt;2017.133.1.1asvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227183" version="1" comment="texlive-nfssext-cfr is &lt;2017.133.svn43640-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227184" version="1" comment="texlive-nicefilelist is &lt;2017.133.0.0.7asvn28527-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227185" version="1" comment="texlive-niceframe is &lt;2017.133.1.1csvn36086-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227186" version="1" comment="texlive-nicetext is &lt;2017.133.r0.67svn38914-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227187" version="1" comment="texlive-nih is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227188" version="1" comment="texlive-nihbiosketch is &lt;2017.133.svn39460-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227189" version="1" comment="texlive-nimbus15 is &lt;2017.133.1.00svn39343-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227190" version="1" comment="texlive-nimbus15-fonts is &lt;2017.133.1.00svn39343-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227191" version="1" comment="texlive-nkarta is &lt;2017.133.0.0.2svn16437-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227192" version="1" comment="texlive-nlctdoc is &lt;2017.133.1.06svn44353-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227193" version="1" comment="texlive-nmbib is &lt;2017.133.1.04svn37984-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227194" version="1" comment="texlive-noconflict is &lt;2017.133.1.0svn30140-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227195" version="1" comment="texlive-nodetree is &lt;2017.133.1.2svn43011-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227196" version="1" comment="texlive-noindentafter is &lt;2017.133.0.0.2.2svn35709-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227197" version="1" comment="texlive-noitcrul is &lt;2017.133.0.0.2svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227198" version="1" comment="texlive-nolbreaks is &lt;2017.133.1.2svn26786-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227199" version="1" comment="texlive-nomencl is &lt;2017.133.3.1asvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227200" version="1" comment="texlive-nomentbl is &lt;2017.133.0.0.4svn16549-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227201" version="1" comment="texlive-nonfloat is &lt;2017.133.1.0svn17598-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227202" version="1" comment="texlive-nonumonpart is &lt;2017.133.1svn22114-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227203" version="1" comment="texlive-nopageno is &lt;2017.133.svn18128-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227204" version="1" comment="texlive-norasi-c90 is &lt;2017.133.svn37675-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227205" version="1" comment="texlive-normalcolor is &lt;2017.133.r11svn40125-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227206" version="1" comment="texlive-nostarch is &lt;2017.133.1.3svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227207" version="1" comment="texlive-notes is &lt;2017.133.1.0.1svn42428-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227208" version="1" comment="texlive-notes2bib is &lt;2017.133.2.0ksvn31162-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227209" version="1" comment="texlive-notespages is &lt;2017.133.0.0.8.1svn41906-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227210" version="1" comment="texlive-notex-bst is &lt;2017.133.svn42361-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227211" version="1" comment="texlive-noto is &lt;2017.133.svn42881-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227212" version="1" comment="texlive-noto-fonts is &lt;2017.133.svn42881-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227213" version="1" comment="texlive-notoccite is &lt;2017.133.svn18129-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227214" version="1" comment="texlive-novel is &lt;2017.133.1.2svn44529-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227215" version="1" comment="texlive-novel-fonts is &lt;2017.133.1.2svn44529-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227216" version="1" comment="texlive-nowidow is &lt;2017.133.1.0svn24066-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227217" version="1" comment="texlive-nox is &lt;2017.133.1.0svn30991-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227218" version="1" comment="texlive-nrc is &lt;2017.133.2.01asvn29027-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227219" version="1" comment="texlive-ntgclass is &lt;2017.133.2.1asvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227220" version="1" comment="texlive-ntheorem is &lt;2017.133.1.33svn27609-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227221" version="1" comment="texlive-ntheorem-vn is &lt;2017.133.1.203svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227222" version="1" comment="texlive-nuc is &lt;2017.133.0.0.1svn22256-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227223" version="1" comment="texlive-nucleardata is &lt;2017.133.1.01dsvn42307-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227224" version="1" comment="texlive-numberedblock is &lt;2017.133.1.10svn33109-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227225" version="1" comment="texlive-numericplots is &lt;2017.133.2.0.2svn31729-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227226" version="1" comment="texlive-numname is &lt;2017.133.svn18130-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227227" version="1" comment="texlive-numprint is &lt;2017.133.1.39svn27498-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227228" version="1" comment="texlive-numspell is &lt;2017.133.1.0svn43189-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227229" version="1" comment="texlive-nwejm is &lt;2017.133.0.0.98dsvn44131-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227230" version="1" comment="texlive-oberdiek is &lt;2017.133.svn43610-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227231" version="1" comment="texlive-objectz is &lt;2017.133.svn19389-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227232" version="1" comment="texlive-obnov is &lt;2017.133.0.0.11svn33355-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227233" version="1" comment="texlive-ocg-p is &lt;2017.133.0.0.4svn28803-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227234" version="1" comment="texlive-ocgx is &lt;2017.133.0.0.5svn28492-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227235" version="1" comment="texlive-ocgx2 is &lt;2017.133.0.0.29svn44528-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227236" version="1" comment="texlive-ocherokee is &lt;2017.133.svn25689-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227237" version="1" comment="texlive-ocherokee-fonts is &lt;2017.133.svn25689-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227238" version="1" comment="texlive-ocr-b is &lt;2017.133.svn20852-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227239" version="1" comment="texlive-ocr-b-outline is &lt;2017.133.svn20969-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227240" version="1" comment="texlive-ocr-b-outline-fonts is &lt;2017.133.svn20969-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227241" version="1" comment="texlive-ocr-latex is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227242" version="1" comment="texlive-octavo is &lt;2017.133.1.2svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227243" version="1" comment="texlive-odsfile is &lt;2017.133.0.0.6svn38449-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227244" version="1" comment="texlive-ofs is &lt;2017.133.svn16991-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227245" version="1" comment="texlive-ogham is &lt;2017.133.svn24876-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227246" version="1" comment="texlive-oinuit is &lt;2017.133.svn28668-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227247" version="1" comment="texlive-oinuit-fonts is &lt;2017.133.svn28668-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227248" version="1" comment="texlive-old-arrows is &lt;2017.133.2.0svn42872-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227249" version="1" comment="texlive-old-arrows-fonts is &lt;2017.133.2.0svn42872-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227250" version="1" comment="texlive-oldlatin is &lt;2017.133.1.00svn17932-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227251" version="1" comment="texlive-oldstandard is &lt;2017.133.2.2svn41735-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227252" version="1" comment="texlive-oldstandard-fonts is &lt;2017.133.2.2svn41735-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227253" version="1" comment="texlive-oldstyle is &lt;2017.133.0.0.2svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227254" version="1" comment="texlive-olsak-misc is &lt;2017.133.svn41526-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227255" version="1" comment="texlive-omega is &lt;2017.133.svn33046-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227256" version="1" comment="texlive-omega-fonts is &lt;2017.133.svn33046-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227257" version="1" comment="texlive-omegaware is &lt;2017.133.svn44166-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227258" version="1" comment="texlive-omegaware-bin is &lt;2017.20170520.svn44143-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227259" version="1" comment="texlive-onlyamsmath is &lt;2017.133.0.0.20svn42927-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227260" version="1" comment="texlive-onrannual is &lt;2017.133.1.1svn17474-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227261" version="1" comment="texlive-opcit is &lt;2017.133.1.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227262" version="1" comment="texlive-opensans is &lt;2017.133.1.2svn24706-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227263" version="1" comment="texlive-opensans-fonts is &lt;2017.133.1.2svn24706-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227264" version="1" comment="texlive-oplotsymbl is &lt;2017.133.1.2svn43091-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227265" version="1" comment="texlive-opteng is &lt;2017.133.1.0svn27331-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227266" version="1" comment="texlive-optidef is &lt;2017.133.2.4svn44505-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227267" version="1" comment="texlive-optional is &lt;2017.133.2.2bsvn18131-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227268" version="1" comment="texlive-options is &lt;2017.133.1.0svn39030-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227269" version="1" comment="texlive-ordinalpt is &lt;2017.133.2.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227270" version="1" comment="texlive-orkhun is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227271" version="1" comment="texlive-oscola is &lt;2017.133.1.5svn43599-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227272" version="1" comment="texlive-ot-tableau is &lt;2017.133.svn35095-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227273" version="1" comment="texlive-othello is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227274" version="1" comment="texlive-othelloboard is &lt;2017.133.1.2svn23714-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227275" version="1" comment="texlive-otibet is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227276" version="1" comment="texlive-oubraces is &lt;2017.133.svn21833-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227277" version="1" comment="texlive-outline is &lt;2017.133.svn18360-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227278" version="1" comment="texlive-outliner is &lt;2017.133.0.0.94svn21095-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227279" version="1" comment="texlive-outlines is &lt;2017.133.1.1svn25192-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227280" version="1" comment="texlive-overlays is &lt;2017.133.2.7svn43431-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227281" version="1" comment="texlive-overlock is &lt;2017.133.svn34409-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227282" version="1" comment="texlive-overlock-fonts is &lt;2017.133.svn34409-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227283" version="1" comment="texlive-overpic is &lt;2017.133.0.0.53svn19712-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227284" version="1" comment="texlive-pacioli is &lt;2017.133.svn24947-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227285" version="1" comment="texlive-padauk is &lt;2017.133.3.002svn42617-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227286" version="1" comment="texlive-padauk-fonts is &lt;2017.133.3.002svn42617-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227287" version="1" comment="texlive-pagecolor is &lt;2017.133.1.0isvn44487-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227288" version="1" comment="texlive-pagecont is &lt;2017.133.1.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227289" version="1" comment="texlive-pagenote is &lt;2017.133.1.1asvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227290" version="1" comment="texlive-pagerange is &lt;2017.133.0.0.5svn16915-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227291" version="1" comment="texlive-pageslts is &lt;2017.133.1.2fsvn39164-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227292" version="1" comment="texlive-palatino is &lt;2017.133.svn31835-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227293" version="1" comment="texlive-palatino-fonts is &lt;2017.133.svn31835-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227294" version="1" comment="texlive-paper is &lt;2017.133.1.0lsvn34521-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227295" version="1" comment="texlive-papercdcase is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227296" version="1" comment="texlive-papermas is &lt;2017.133.1.0hsvn23667-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227297" version="1" comment="texlive-papertex is &lt;2017.133.1.2bsvn19230-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227298" version="1" comment="texlive-paracol is &lt;2017.133.1.32svn38621-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227299" version="1" comment="texlive-parades is &lt;2017.133.svn40042-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227300" version="1" comment="texlive-paralist is &lt;2017.133.2.7svn43021-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227301" version="1" comment="texlive-parallel is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227302" version="1" comment="texlive-paratype is &lt;2017.133.svn32859-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227303" version="1" comment="texlive-paratype-fonts is &lt;2017.133.svn32859-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227304" version="1" comment="texlive-paresse is &lt;2017.133.4.1svn29803-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227305" version="1" comment="texlive-parnotes is &lt;2017.133.3svn41868-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227306" version="1" comment="texlive-parrun is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227307" version="1" comment="texlive-parselines is &lt;2017.133.1.4svn21475-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227308" version="1" comment="texlive-parskip is &lt;2017.133.2.0svn19963-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227309" version="1" comment="texlive-pas-cours is &lt;2017.133.1.6svn42036-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227310" version="1" comment="texlive-pas-crosswords is &lt;2017.133.1.03svn32313-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227311" version="1" comment="texlive-pas-cv is &lt;2017.133.2.01svn32263-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227312" version="1" comment="texlive-pas-tableur is &lt;2017.133.2.01svn39542-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227313" version="1" comment="texlive-passivetex is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227314" version="1" comment="texlive-patch is &lt;2017.133.svn42428-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227315" version="1" comment="texlive-patchcmd is &lt;2017.133.1.05svn41379-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227316" version="1" comment="texlive-patgen is &lt;2017.133.2.3svn44166-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227317" version="1" comment="texlive-patgen-bin is &lt;2017.20170520.svn44143-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227318" version="1" comment="texlive-patgen2-tutorial is &lt;2017.133.svn16490-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227319" version="1" comment="texlive-path is &lt;2017.133.3.05svn22045-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227320" version="1" comment="texlive-pauldoc is &lt;2017.133.0.0.5svn16005-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227321" version="1" comment="texlive-pawpict is &lt;2017.133.1.0svn21629-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227322" version="1" comment="texlive-pax is &lt;2017.133.0.0.1lsvn26112-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227323" version="1" comment="texlive-pax-bin is &lt;2017.20170520.svn10843-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227324" version="1" comment="texlive-pb-diagram is &lt;2017.133.5.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227325" version="1" comment="texlive-pbibtex-base is &lt;2017.133.svn40986-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227326" version="1" comment="texlive-pbox is &lt;2017.133.1.2svn24807-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227327" version="1" comment="texlive-pbsheet is &lt;2017.133.0.0.1svn24830-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227328" version="1" comment="texlive-pdf-trans is &lt;2017.133.2.4svn32809-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227329" version="1" comment="texlive-pdf14 is &lt;2017.133.0.0.1svn17583-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227330" version="1" comment="texlive-pdfbook2 is &lt;2017.133.1.2svn37537-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227331" version="1" comment="texlive-pdfbook2-bin is &lt;2017.20170520.svn37537-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227332" version="1" comment="texlive-pdfcomment is &lt;2017.133.2.4svn41484-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227333" version="1" comment="texlive-pdfcprot is &lt;2017.133.1.7asvn18735-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227334" version="1" comment="texlive-pdfcrop is &lt;2017.133.1.37svn29348-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227335" version="1" comment="texlive-pdfcrop-bin is &lt;2017.20170520.svn14387-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227336" version="1" comment="texlive-pdfjam is &lt;2017.133.2.02svn29752-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227337" version="1" comment="texlive-pdfjam-bin is &lt;2017.20170520.svn17868-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227338" version="1" comment="texlive-pdflatexpicscale is &lt;2017.133.0.0.31svn43117-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227339" version="1" comment="texlive-pdflatexpicscale-bin is &lt;2017.20170520.svn41779-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227340" version="1" comment="texlive-pdfmarginpar is &lt;2017.133.0.0.92svn23492-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227341" version="1" comment="texlive-pdfpagediff is &lt;2017.133.1.4svn37946-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227342" version="1" comment="texlive-pdfpages is &lt;2017.133.0.0.5hsvn42973-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227343" version="1" comment="texlive-pdfscreen is &lt;2017.133.1.5svn42428-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227344" version="1" comment="texlive-pdfslide is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227345" version="1" comment="texlive-pdfsync is &lt;2017.133.svn20373-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227346" version="1" comment="texlive-pdftex is &lt;2017.133.svn44166-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227347" version="1" comment="texlive-pdftex-bin is &lt;2017.20170520.svn44143-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227348" version="1" comment="texlive-pdftex-fonts is &lt;2017.133.svn44166-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227349" version="1" comment="texlive-pdftools is &lt;2017.133.0.0.86svn44166-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227350" version="1" comment="texlive-pdftools-bin is &lt;2017.20170520.svn44143-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227351" version="1" comment="texlive-pdftricks is &lt;2017.133.1.16svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227352" version="1" comment="texlive-pdftricks2 is &lt;2017.133.1.01svn31016-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227353" version="1" comment="texlive-pdfwin is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227354" version="1" comment="texlive-pdfx is &lt;2017.133.1.5.84svn44412-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227355" version="1" comment="texlive-pdfxup is &lt;2017.133.1.30svn40690-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227356" version="1" comment="texlive-pdfxup-bin is &lt;2017.20170520.svn40690-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227357" version="1" comment="texlive-pecha is &lt;2017.133.0.0.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227358" version="1" comment="texlive-pedigree-perl is &lt;2017.133.1.0svn31990-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227359" version="1" comment="texlive-pedigree-perl-bin is &lt;2017.20170520.svn25962-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227360" version="1" comment="texlive-perception is &lt;2017.133.svn42683-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227361" version="1" comment="texlive-perfectcut is &lt;2017.133.2.2svn44175-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227362" version="1" comment="texlive-perltex is &lt;2017.133.2.1svn38719-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227363" version="1" comment="texlive-perltex-bin is &lt;2017.20170520.svn16181-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227364" version="1" comment="texlive-permute is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227365" version="1" comment="texlive-persian-bib is &lt;2017.133.0.0.9svn37297-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227366" version="1" comment="texlive-petiteannonce is &lt;2017.133.1.0001svn25915-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227367" version="1" comment="texlive-petri-nets is &lt;2017.133.svn39165-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227368" version="1" comment="texlive-petri-nets-bin is &lt;2017.20170520.svn39165-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227369" version="1" comment="texlive-pfarrei is &lt;2017.133.r36svn31934-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227370" version="1" comment="texlive-pfarrei-bin is &lt;2017.20170520.svn29348-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227371" version="1" comment="texlive-pgf is &lt;2017.133.3.0.1asvn44231-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227372" version="1" comment="texlive-pgf-blur is &lt;2017.133.1.01svn31693-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227373" version="1" comment="texlive-pgf-soroban is &lt;2017.133.1.1svn32269-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227374" version="1" comment="texlive-pgf-spectra is &lt;2017.133.1.0svn42986-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227375" version="1" comment="texlive-pgf-umlcd is &lt;2017.133.0.0.2.1.1svn33307-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227376" version="1" comment="texlive-pgf-umlsd is &lt;2017.133.0.0.7svn33045-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227377" version="1" comment="texlive-pgfgantt is &lt;2017.133.4.0svn31037-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227378" version="1" comment="texlive-pgfkeyx is &lt;2017.133.0.0.0.1svn26093-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227379" version="1" comment="texlive-pgfmolbio is &lt;2017.133.0.0.21svn35152-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227380" version="1" comment="texlive-pgfopts is &lt;2017.133.2.1asvn34573-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227381" version="1" comment="texlive-pgfornament is &lt;2017.133.0.0.21svn39988-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227382" version="1" comment="texlive-pgfplots is &lt;2017.133.1.15svn44469-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227383" version="1" comment="texlive-phaistos is &lt;2017.133.1.0svn18651-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227384" version="1" comment="texlive-phaistos-fonts is &lt;2017.133.1.0svn18651-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227385" version="1" comment="texlive-phffullpagefigure is &lt;2017.133.1.0svn41857-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227386" version="1" comment="texlive-phfnote is &lt;2017.133.1.0svn41858-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227387" version="1" comment="texlive-phfparen is &lt;2017.133.1.0svn41859-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227388" version="1" comment="texlive-phfqit is &lt;2017.133.1.0svn41860-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227389" version="1" comment="texlive-phfquotetext is &lt;2017.133.1.0svn41869-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227390" version="1" comment="texlive-phfsvnwatermark is &lt;2017.133.1.0svn41870-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227391" version="1" comment="texlive-phfthm is &lt;2017.133.1.0svn41871-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227392" version="1" comment="texlive-philex is &lt;2017.133.1.3svn36396-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227393" version="1" comment="texlive-philokalia is &lt;2017.133.1.1svn18651-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227394" version="1" comment="texlive-philokalia-fonts is &lt;2017.133.1.1svn18651-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227395" version="1" comment="texlive-philosophersimprint is &lt;2017.133.1.4svn41788-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227396" version="1" comment="texlive-phonenumbers is &lt;2017.133.1.2.1svn43482-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227397" version="1" comment="texlive-phonetic is &lt;2017.133.svn21871-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227398" version="1" comment="texlive-phonrule is &lt;2017.133.1.3.2svn43963-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227399" version="1" comment="texlive-photo is &lt;2017.133.svn18739-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227400" version="1" comment="texlive-physics is &lt;2017.133.1.3svn28590-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227401" version="1" comment="texlive-piano is &lt;2017.133.1.0svn21574-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227402" version="1" comment="texlive-picinpar is &lt;2017.133.1.2asvn20374-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227403" version="1" comment="texlive-pict2e is &lt;2017.133.0.0.3bsvn39591-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227404" version="1" comment="texlive-pictex is &lt;2017.133.1.1svn21943-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227405" version="1" comment="texlive-pictex2 is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227406" version="1" comment="texlive-pictexsum is &lt;2017.133.svn24965-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227407" version="1" comment="texlive-piechartmp is &lt;2017.133.0.0.3.0svn19440-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227408" version="1" comment="texlive-piff is &lt;2017.133.svn21894-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227409" version="1" comment="texlive-pigpen is &lt;2017.133.0.0.2svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227410" version="1" comment="texlive-pigpen-fonts is &lt;2017.133.0.0.2svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227411" version="1" comment="texlive-pinlabel is &lt;2017.133.1.2svn24769-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227412" version="1" comment="texlive-pitex is &lt;2017.133.svn24731-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227413" version="1" comment="texlive-pittetd is &lt;2017.133.1.618svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227414" version="1" comment="texlive-pkfix is &lt;2017.133.1.7svn26032-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227415" version="1" comment="texlive-pkfix-bin is &lt;2017.20170520.svn13364-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227416" version="1" comment="texlive-pkfix-helper is &lt;2017.133.1.4svn29725-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227417" version="1" comment="texlive-pkfix-helper-bin is &lt;2017.20170520.svn13663-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227418" version="1" comment="texlive-pkgloader is &lt;2017.133.0.0.5.0svn35711-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227419" version="1" comment="texlive-pkuthss is &lt;2017.133.1.7.4svn43374-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227420" version="1" comment="texlive-pl is &lt;2017.133.1.09svn36012-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227421" version="1" comment="texlive-pl-fonts is &lt;2017.133.1.09svn36012-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227422" version="1" comment="texlive-placeat is &lt;2017.133.0.0.1svn33526-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227423" version="1" comment="texlive-placeins is &lt;2017.133.2.2svn19848-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227424" version="1" comment="texlive-placeins-plain is &lt;2017.133.2.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227425" version="1" comment="texlive-plain is &lt;2017.133.3.141592653svn43076-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227426" version="1" comment="texlive-plain-doc is &lt;2017.133.svn28424-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227427" version="1" comment="texlive-plainpkg is &lt;2017.133.0.0.4asvn27765-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227428" version="1" comment="texlive-plantslabels is &lt;2017.133.1.0svn29803-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227429" version="1" comment="texlive-plari is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227430" version="1" comment="texlive-plates is &lt;2017.133.0.0.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227431" version="1" comment="texlive-platex is &lt;2017.133.svn44209-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227432" version="1" comment="texlive-platex-bin is &lt;2017.20170520.svn22859-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227433" version="1" comment="texlive-platex-tools is &lt;2017.133.svn44208-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227434" version="1" comment="texlive-platexcheat is &lt;2017.133.2.0svn42918-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227435" version="1" comment="texlive-play is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227436" version="1" comment="texlive-playfair is &lt;2017.133.svn34236-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227437" version="1" comment="texlive-playfair-fonts is &lt;2017.133.svn34236-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227438" version="1" comment="texlive-plipsum is &lt;2017.133.4.3svn30353-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227439" version="1" comment="texlive-plnfss is &lt;2017.133.1.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227440" version="1" comment="texlive-plstmary is &lt;2017.133.0.0.5csvn31088-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227441" version="1" comment="texlive-plweb is &lt;2017.133.3.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227442" version="1" comment="texlive-pmgraph is &lt;2017.133.1.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227443" version="1" comment="texlive-pmx is &lt;2017.133.2.76svn43869-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227444" version="1" comment="texlive-pmx-bin is &lt;2017.20170520.svn44143-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227445" version="1" comment="texlive-pmxchords is &lt;2017.133.2.0.2svn39249-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227446" version="1" comment="texlive-pmxchords-bin is &lt;2017.20170520.svn32405-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227447" version="1" comment="texlive-pnas2009 is &lt;2017.133.1.0svn16287-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227448" version="1" comment="texlive-poemscol is &lt;2017.133.2.72svn40613-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227449" version="1" comment="texlive-poetrytex is &lt;2017.133.3.0.1svn39921-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227450" version="1" comment="texlive-polski is &lt;2017.133.1.3.4svn44213-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227451" version="1" comment="texlive-poltawski is &lt;2017.133.1.101svn20075-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227452" version="1" comment="texlive-poltawski-fonts is &lt;2017.133.1.101svn20075-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227453" version="1" comment="texlive-polyglossia is &lt;2017.133.1.42.4svn40138-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227454" version="1" comment="texlive-polynom is &lt;2017.133.0.0.18svn42664-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227455" version="1" comment="texlive-polynomial is &lt;2017.133.1.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227456" version="1" comment="texlive-polytable is &lt;2017.133.0.0.8.2svn31235-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227457" version="1" comment="texlive-postcards is &lt;2017.133.svn21641-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227458" version="1" comment="texlive-poster-mac is &lt;2017.133.1.1svn18305-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227459" version="1" comment="texlive-powerdot is &lt;2017.133.1.5asvn38984-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227460" version="1" comment="texlive-powerdot-FUBerlin is &lt;2017.133.0.0.01svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227461" version="1" comment="texlive-ppr-prv is &lt;2017.133.0.0.13csvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227462" version="1" comment="texlive-pracjourn is &lt;2017.133.0.0.4nsvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227463" version="1" comment="texlive-preprint is &lt;2017.133.2011svn30447-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227464" version="1" comment="texlive-prerex is &lt;2017.133.svn40613-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227465" version="1" comment="texlive-present is &lt;2017.133.2.2svn25953-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227466" version="1" comment="texlive-presentations is &lt;2017.133.svn43949-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227467" version="1" comment="texlive-presentations-en is &lt;2017.133.svn29803-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227468" version="1" comment="texlive-pressrelease is &lt;2017.133.1.0svn35147-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227469" version="1" comment="texlive-prettyref is &lt;2017.133.3.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227470" version="1" comment="texlive-preview is &lt;2017.133.11.90svn44227-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227471" version="1" comment="texlive-prftree is &lt;2017.133.1.5svn41985-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227472" version="1" comment="texlive-printlen is &lt;2017.133.1.1asvn19847-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227473" version="1" comment="texlive-proba is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227474" version="1" comment="texlive-probsoln is &lt;2017.133.3.04svn29371-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227475" version="1" comment="texlive-procIAGssymp is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227476" version="1" comment="texlive-prodint is &lt;2017.133.svn21893-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227477" version="1" comment="texlive-prodint-fonts is &lt;2017.133.svn21893-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227478" version="1" comment="texlive-productbox is &lt;2017.133.1.1svn20886-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227479" version="1" comment="texlive-program is &lt;2017.133.3.3.14svn44214-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227480" version="1" comment="texlive-progress is &lt;2017.133.1.10svn19519-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227481" version="1" comment="texlive-progressbar is &lt;2017.133.1.0b_4svn33822-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227482" version="1" comment="texlive-proofread is &lt;2017.133.1.02svn43370-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227483" version="1" comment="texlive-prooftrees is &lt;2017.133.0.0.6svn43184-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227484" version="1" comment="texlive-properties is &lt;2017.133.0.0.2svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227485" version="1" comment="texlive-proposal is &lt;2017.133.svn40538-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227486" version="1" comment="texlive-prosper is &lt;2017.133.1.0hsvn33033-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227487" version="1" comment="texlive-protex is &lt;2017.133.svn41633-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227488" version="1" comment="texlive-protocol is &lt;2017.133.1.13svn25562-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227489" version="1" comment="texlive-przechlewski-book is &lt;2017.133.svn23552-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227490" version="1" comment="texlive-ps2pk is &lt;2017.133.svn44166-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227491" version="1" comment="texlive-ps2pk-bin is &lt;2017.20170520.svn44143-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227492" version="1" comment="texlive-psbao is &lt;2017.133.0.0.17svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227493" version="1" comment="texlive-pseudocode is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227494" version="1" comment="texlive-psfrag is &lt;2017.133.3.04svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227495" version="1" comment="texlive-psfrag-italian is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227496" version="1" comment="texlive-psfragx is &lt;2017.133.1.1svn26243-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227497" version="1" comment="texlive-psgo is &lt;2017.133.0.0.17svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227498" version="1" comment="texlive-psizzl is &lt;2017.133.0.0.35svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227499" version="1" comment="texlive-pslatex is &lt;2017.133.svn16416-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227500" version="1" comment="texlive-psnfss is &lt;2017.133.9.2asvn33946-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227501" version="1" comment="texlive-pspicture is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227502" version="1" comment="texlive-pst-2dplot is &lt;2017.133.1.5svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227503" version="1" comment="texlive-pst-3d is &lt;2017.133.1.10svn17257-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227504" version="1" comment="texlive-pst-3dplot is &lt;2017.133.2.04svn43703-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227505" version="1" comment="texlive-pst-abspos is &lt;2017.133.0.0.2svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227506" version="1" comment="texlive-pst-am is &lt;2017.133.1.02svn19591-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227507" version="1" comment="texlive-pst-arrow is &lt;2017.133.0.0.01svn41980-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227508" version="1" comment="texlive-pst-asr is &lt;2017.133.1.3svn22138-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227509" version="1" comment="texlive-pst-bar is &lt;2017.133.0.0.92svn18734-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227510" version="1" comment="texlive-pst-barcode is &lt;2017.133.0.0.16asvn43996-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227511" version="1" comment="texlive-pst-bezier is &lt;2017.133.0.0.03svn41981-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227512" version="1" comment="texlive-pst-blur is &lt;2017.133.2.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227513" version="1" comment="texlive-pst-bspline is &lt;2017.133.1.62svn40685-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227514" version="1" comment="texlive-pst-calendar is &lt;2017.133.0.0.47svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227515" version="1" comment="texlive-pst-cie is &lt;2017.133.1.05svn41223-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227516" version="1" comment="texlive-pst-circ is &lt;2017.133.2.14svn41901-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227517" version="1" comment="texlive-pst-coil is &lt;2017.133.1.07svn37377-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227518" version="1" comment="texlive-pst-cox is &lt;2017.133.0.0.98_betasvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227519" version="1" comment="texlive-pst-dbicons is &lt;2017.133.0.0.16svn17556-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227520" version="1" comment="texlive-pst-diffraction is &lt;2017.133.2.03svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227521" version="1" comment="texlive-pst-electricfield is &lt;2017.133.0.0.14svn29803-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227522" version="1" comment="texlive-pst-eps is &lt;2017.133.1.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227523" version="1" comment="texlive-pst-eucl is &lt;2017.133.1.56svn43911-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227524" version="1" comment="texlive-pst-eucl-translation-bg is &lt;2017.133.1.3.2svn19296-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227525" version="1" comment="texlive-pst-exa is &lt;2017.133.0.0.05svn35248-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227526" version="1" comment="texlive-pst-fill is &lt;2017.133.1.01svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227527" version="1" comment="texlive-pst-fit is &lt;2017.133.0.0.01svn28155-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227528" version="1" comment="texlive-pst-fr3d is &lt;2017.133.1.10svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227529" version="1" comment="texlive-pst-fractal is &lt;2017.133.0.0.06svn16958-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227530" version="1" comment="texlive-pst-fun is &lt;2017.133.0.0.04svn17909-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227531" version="1" comment="texlive-pst-func is &lt;2017.133.0.0.85svn43912-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227532" version="1" comment="texlive-pst-gantt is &lt;2017.133.0.0.22asvn35832-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227533" version="1" comment="texlive-pst-geo is &lt;2017.133.0.0.06svn44131-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227534" version="1" comment="texlive-pst-ghsb is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227535" version="1" comment="texlive-pst-gr3d is &lt;2017.133.1.34svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227536" version="1" comment="texlive-pst-grad is &lt;2017.133.1.06svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227537" version="1" comment="texlive-pst-graphicx is &lt;2017.133.0.0.02svn21717-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227538" version="1" comment="texlive-pst-infixplot is &lt;2017.133.0.0.11svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227539" version="1" comment="texlive-pst-intersect is &lt;2017.133.0.0.4svn33210-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227540" version="1" comment="texlive-pst-jtree is &lt;2017.133.2.6svn20946-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227541" version="1" comment="texlive-pst-knot is &lt;2017.133.0.0.2svn16033-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227542" version="1" comment="texlive-pst-labo is &lt;2017.133.2.04svn39077-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227543" version="1" comment="texlive-pst-layout is &lt;2017.133.0.0.95svn29803-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227544" version="1" comment="texlive-pst-lens is &lt;2017.133.1.02svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227545" version="1" comment="texlive-pst-light3d is &lt;2017.133.0.0.12svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227546" version="1" comment="texlive-pst-magneticfield is &lt;2017.133.1.13svn18922-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227547" version="1" comment="texlive-pst-math is &lt;2017.133.0.0.63svn34786-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227548" version="1" comment="texlive-pst-mirror is &lt;2017.133.1.01svn32997-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227549" version="1" comment="texlive-pst-node is &lt;2017.133.1.39svn43015-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227550" version="1" comment="texlive-pst-ob3d is &lt;2017.133.0.0.21svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227551" version="1" comment="texlive-pst-ode is &lt;2017.133.0.0.7svn35418-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227552" version="1" comment="texlive-pst-optexp is &lt;2017.133.5.2svn35673-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227553" version="1" comment="texlive-pst-optic is &lt;2017.133.1.02svn41999-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227554" version="1" comment="texlive-pst-osci is &lt;2017.133.2.82svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227555" version="1" comment="texlive-pst-ovl is &lt;2017.133.0.0.07svn40873-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227556" version="1" comment="texlive-pst-pad is &lt;2017.133.0.0.3bsvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227557" version="1" comment="texlive-pst-pdf is &lt;2017.133.1.2csvn44047-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227558" version="1" comment="texlive-pst-pdf-bin is &lt;2017.20170520.svn7838-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227559" version="1" comment="texlive-pst-pdgr is &lt;2017.133.0.0.3svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227560" version="1" comment="texlive-pst-perspective is &lt;2017.133.1.05svn39585-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227561" version="1" comment="texlive-pst-platon is &lt;2017.133.0.0.01svn16538-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227562" version="1" comment="texlive-pst-plot is &lt;2017.133.1.79svn44511-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227563" version="1" comment="texlive-pst-poly is &lt;2017.133.1.63svn35062-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227564" version="1" comment="texlive-pst-pulley is &lt;2017.133.0.0.01svn25142-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227565" version="1" comment="texlive-pst-qtree is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227566" version="1" comment="texlive-pst-rubans is &lt;2017.133.1.2svn23464-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227567" version="1" comment="texlive-pst-shell is &lt;2017.133.0.0.03svn42840-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227568" version="1" comment="texlive-pst-sigsys is &lt;2017.133.1.4svn21667-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227569" version="1" comment="texlive-pst-slpe is &lt;2017.133.1.31svn24391-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227570" version="1" comment="texlive-pst-solarsystem is &lt;2017.133.0.0.12svn24995-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227571" version="1" comment="texlive-pst-solides3d is &lt;2017.133.4.32asvn43401-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227572" version="1" comment="texlive-pst-soroban is &lt;2017.133.1.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227573" version="1" comment="texlive-pst-spectra is &lt;2017.133.0.0.91svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227574" version="1" comment="texlive-pst-spinner is &lt;2017.133.1.02svn44507-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227575" version="1" comment="texlive-pst-spirograph is &lt;2017.133.0.0.41svn35026-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227576" version="1" comment="texlive-pst-stru is &lt;2017.133.0.0.13svn38613-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227577" version="1" comment="texlive-pst-support is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227578" version="1" comment="texlive-pst-text is &lt;2017.133.1.00svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227579" version="1" comment="texlive-pst-thick is &lt;2017.133.1.0svn16369-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227580" version="1" comment="texlive-pst-tools is &lt;2017.133.0.0.06svn44320-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227581" version="1" comment="texlive-pst-tree is &lt;2017.133.1.13svn43272-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227582" version="1" comment="texlive-pst-tvz is &lt;2017.133.1.01svn23451-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227583" version="1" comment="texlive-pst-uml is &lt;2017.133.0.0.83svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227584" version="1" comment="texlive-pst-vectorian is &lt;2017.133.0.0.4svn28801-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227585" version="1" comment="texlive-pst-vehicle is &lt;2017.133.1.1svn44466-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227586" version="1" comment="texlive-pst-vowel is &lt;2017.133.1.0svn25228-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227587" version="1" comment="texlive-pst-vue3d is &lt;2017.133.1.24svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227588" version="1" comment="texlive-pst2pdf is &lt;2017.133.0.0.16svn35247-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227589" version="1" comment="texlive-pst2pdf-bin is &lt;2017.20170520.svn29333-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227590" version="1" comment="texlive-pstool is &lt;2017.133.1.5csvn34015-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227591" version="1" comment="texlive-pstools is &lt;2017.133.1.68svn44166-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227592" version="1" comment="texlive-pstools-bin is &lt;2017.20170520.svn44143-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227593" version="1" comment="texlive-pstricks is &lt;2017.133.2.73asvn44506-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227594" version="1" comment="texlive-pstricks-add is &lt;2017.133.3.83svn44281-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227595" version="1" comment="texlive-pstricks_calcnotes is &lt;2017.133.1.2svn34363-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227596" version="1" comment="texlive-pstring is &lt;2017.133.svn42857-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227597" version="1" comment="texlive-psu-thesis is &lt;2017.133.1.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227598" version="1" comment="texlive-ptex is &lt;2017.133.svn44166-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227599" version="1" comment="texlive-ptex-base is &lt;2017.133.svn43899-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227600" version="1" comment="texlive-ptex-bin is &lt;2017.20170520.svn44143-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227601" version="1" comment="texlive-ptex-fontmaps is &lt;2017.133.20170114.0svn44206-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227602" version="1" comment="texlive-ptex-fontmaps-bin is &lt;2017.20170520.svn44206-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227603" version="1" comment="texlive-ptex-fonts is &lt;2017.133.svn42950-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227604" version="1" comment="texlive-ptex-fonts-fonts is &lt;2017.133.svn42950-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227605" version="1" comment="texlive-ptex2pdf is &lt;2017.133.20170604.0svn44470-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227606" version="1" comment="texlive-ptex2pdf-bin is &lt;2017.20170520.svn29335-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227607" version="1" comment="texlive-ptexenc-devel is &lt;1.3.5-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227608" version="1" comment="texlive-ptext is &lt;2017.133.1.1svn30171-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227609" version="1" comment="texlive-ptptex is &lt;2017.133.0.0.91svn19440-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227610" version="1" comment="texlive-punk is &lt;2017.133.svn27388-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227611" version="1" comment="texlive-punk-latex is &lt;2017.133.1.1svn27389-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227612" version="1" comment="texlive-punknova is &lt;2017.133.1.003svn24649-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227613" version="1" comment="texlive-punknova-fonts is &lt;2017.133.1.003svn24649-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227614" version="1" comment="texlive-purifyeps is &lt;2017.133.1.1svn29725-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227615" version="1" comment="texlive-purifyeps-bin is &lt;2017.20170520.svn13663-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227616" version="1" comment="texlive-pxbase is &lt;2017.133.1.1svn44482-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227617" version="1" comment="texlive-pxchfon is &lt;2017.133.1.0svn44459-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227618" version="1" comment="texlive-pxcjkcat is &lt;2017.133.1.0svn27780-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227619" version="1" comment="texlive-pxfonts is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227620" version="1" comment="texlive-pxfonts-fonts is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227621" version="1" comment="texlive-pxgreeks is &lt;2017.133.1.0svn21838-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227622" version="1" comment="texlive-pxjahyper is &lt;2017.133.0.0.3svn40612-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227623" version="1" comment="texlive-pxpgfmark is &lt;2017.133.0.0.2svn30212-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227624" version="1" comment="texlive-pxrubrica is &lt;2017.133.1.3asvn44225-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227625" version="1" comment="texlive-pxtatescale is &lt;2017.133.0.0.4svn43009-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227626" version="1" comment="texlive-pxtxalfa is &lt;2017.133.1svn23682-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227627" version="1" comment="texlive-pygmentex is &lt;2017.133.0.0.8svn34996-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227628" version="1" comment="texlive-pygmentex-bin is &lt;2017.20170520.svn34996-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227629" version="1" comment="texlive-python is &lt;2017.133.0.0.21svn27064-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227630" version="1" comment="texlive-pythonhighlight is &lt;2017.133.svn43191-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227631" version="1" comment="texlive-pythontex is &lt;2017.133.0.0.15svn41746-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227632" version="1" comment="texlive-pythontex-bin is &lt;2017.20170520.svn31638-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227633" version="1" comment="texlive-qcircuit is &lt;2017.133.2.5.3svn42816-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227634" version="1" comment="texlive-qcm is &lt;2017.133.2.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227635" version="1" comment="texlive-qobitree is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227636" version="1" comment="texlive-qpxqtx is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227637" version="1" comment="texlive-qrcode is &lt;2017.133.1.51svn36065-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227638" version="1" comment="texlive-qstest is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227639" version="1" comment="texlive-qsymbols is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227640" version="1" comment="texlive-qtree is &lt;2017.133.3.1bsvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227641" version="1" comment="texlive-quattrocento is &lt;2017.133.svn31763-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227642" version="1" comment="texlive-quattrocento-fonts is &lt;2017.133.svn31763-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227643" version="1" comment="texlive-quicktype is &lt;2017.133.0.0.1svn42183-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227644" version="1" comment="texlive-quotchap is &lt;2017.133.1.1svn28046-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227645" version="1" comment="texlive-quoting is &lt;2017.133.0.0.1csvn32818-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227646" version="1" comment="texlive-quotmark is &lt;2017.133.1.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227647" version="1" comment="texlive-quran is &lt;2017.133.1.252svn43360-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227648" version="1" comment="texlive-r_und_s is &lt;2017.133.1.3isvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227649" version="1" comment="texlive-raleway is &lt;2017.133.1.4svn42629-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227650" version="1" comment="texlive-raleway-fonts is &lt;2017.133.1.4svn42629-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227651" version="1" comment="texlive-ran_toks is &lt;2017.133.1.1svn44429-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227652" version="1" comment="texlive-randbild is &lt;2017.133.0.0.2svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227653" version="1" comment="texlive-randomlist is &lt;2017.133.1.2svn41727-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227654" version="1" comment="texlive-randomwalk is &lt;2017.133.0.0.4svn38418-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227655" version="1" comment="texlive-randtext is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227656" version="1" comment="texlive-rccol is &lt;2017.133.1.2csvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227657" version="1" comment="texlive-rcs is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227658" version="1" comment="texlive-rcs-multi is &lt;2017.133.0.0.1asvn21939-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227659" version="1" comment="texlive-rcsinfo is &lt;2017.133.1.11svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227660" version="1" comment="texlive-readarray is &lt;2017.133.2.0svn42467-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227661" version="1" comment="texlive-realboxes is &lt;2017.133.0.0.2svn23581-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227662" version="1" comment="texlive-realscripts is &lt;2017.133.0.0.3dsvn39706-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227663" version="1" comment="texlive-rec-thy is &lt;2017.133.1.3svn27225-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227664" version="1" comment="texlive-recipe is &lt;2017.133.0.0.9svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227665" version="1" comment="texlive-recipebook is &lt;2017.133.svn37026-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227666" version="1" comment="texlive-recipecard is &lt;2017.133.2.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227667" version="1" comment="texlive-rectopma is &lt;2017.133.svn19980-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227668" version="1" comment="texlive-recycle is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227669" version="1" comment="texlive-recycle-fonts is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227670" version="1" comment="texlive-refcheck is &lt;2017.133.1.9.1svn29128-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227671" version="1" comment="texlive-refenums is &lt;2017.133.1.1.2svn44131-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227672" version="1" comment="texlive-reflectgraphics is &lt;2017.133.0.0.2csvn40612-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227673" version="1" comment="texlive-refman is &lt;2017.133.2.0esvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227674" version="1" comment="texlive-refstyle is &lt;2017.133.0.0.5svn20318-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227675" version="1" comment="texlive-regcount is &lt;2017.133.1.0svn19979-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227676" version="1" comment="texlive-regexpatch is &lt;2017.133.0.0.2bsvn41204-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227677" version="1" comment="texlive-register is &lt;2017.133.1.6svn21127-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227678" version="1" comment="texlive-regstats is &lt;2017.133.1.0hsvn25050-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227679" version="1" comment="texlive-reledmac is &lt;2017.133.2.22.0svn44545-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227680" version="1" comment="texlive-relenc is &lt;2017.133.svn22050-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227681" version="1" comment="texlive-relsize is &lt;2017.133.4.1svn30707-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227682" version="1" comment="texlive-reotex is &lt;2017.133.1.1svn34924-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227683" version="1" comment="texlive-repeatindex is &lt;2017.133.0.0.01svn24305-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227684" version="1" comment="texlive-repere is &lt;2017.133.17.05svn44298-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227685" version="1" comment="texlive-repltext is &lt;2017.133.1.0svn33442-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227686" version="1" comment="texlive-resphilosophica is &lt;2017.133.1.31svn43631-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227687" version="1" comment="texlive-resumecls is &lt;2017.133.0.0.3.2svn38427-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227688" version="1" comment="texlive-resumemac is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227689" version="1" comment="texlive-reverxii is &lt;2017.133.svn24976-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227690" version="1" comment="texlive-revquantum is &lt;2017.133.0.0.11svn43505-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227691" version="1" comment="texlive-revtex is &lt;2017.133.4.1rsvn19652-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227692" version="1" comment="texlive-revtex4 is &lt;2017.133.svn16488-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227693" version="1" comment="texlive-ribbonproofs is &lt;2017.133.1.0svn31137-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227694" version="1" comment="texlive-rjlparshap is &lt;2017.133.1.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227695" version="1" comment="texlive-rlepsf is &lt;2017.133.svn19082-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227696" version="1" comment="texlive-rmathbr is &lt;2017.133.1.0.3svn40415-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227697" version="1" comment="texlive-rmpage is &lt;2017.133.0.0.92svn20002-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227698" version="1" comment="texlive-roboto is &lt;2017.133.svn38386-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227699" version="1" comment="texlive-roboto-fonts is &lt;2017.133.svn38386-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227700" version="1" comment="texlive-robustcommand is &lt;2017.133.0.0.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227701" version="1" comment="texlive-robustindex is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227702" version="1" comment="texlive-roex is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227703" version="1" comment="texlive-romanbar is &lt;2017.133.1.0fsvn25005-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227704" version="1" comment="texlive-romanbarpagenumber is &lt;2017.133.1.0svn36236-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227705" version="1" comment="texlive-romande is &lt;2017.133.1.008_v7_scsvn19537-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227706" version="1" comment="texlive-romande-fonts is &lt;2017.133.1.008_v7_scsvn19537-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227707" version="1" comment="texlive-romanneg is &lt;2017.133.svn20087-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227708" version="1" comment="texlive-romannum is &lt;2017.133.1.0bsvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227709" version="1" comment="texlive-rosario is &lt;2017.133.1.0svn40843-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227710" version="1" comment="texlive-rosario-fonts is &lt;2017.133.1.0svn40843-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227711" version="1" comment="texlive-rotfloat is &lt;2017.133.1.2svn18292-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227712" version="1" comment="texlive-rotpages is &lt;2017.133.3.0svn18740-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227713" version="1" comment="texlive-roundbox is &lt;2017.133.0.0.2svn29675-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227714" version="1" comment="texlive-roundrect is &lt;2017.133.2.2svn39796-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227715" version="1" comment="texlive-rputover is &lt;2017.133.1.0svn43624-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227716" version="1" comment="texlive-rrgtrees is &lt;2017.133.1.1svn27322-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227717" version="1" comment="texlive-rsc is &lt;2017.133.3.1fsvn41923-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227718" version="1" comment="texlive-rsfs is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227719" version="1" comment="texlive-rsfs-fonts is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227720" version="1" comment="texlive-rsfso is &lt;2017.133.1.02svn37965-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227721" version="1" comment="texlive-rterface is &lt;2017.133.svn30084-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227722" version="1" comment="texlive-rtkinenc is &lt;2017.133.1.0svn20003-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227723" version="1" comment="texlive-rtklage is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227724" version="1" comment="texlive-rubik is &lt;2017.133.4.0svn44131-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227725" version="1" comment="texlive-rubik-bin is &lt;2017.20170520.svn32919-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227726" version="1" comment="texlive-ruhyphen is &lt;2017.133.1.6svn21081-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227727" version="1" comment="texlive-rulercompass is &lt;2017.133.1svn32392-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227728" version="1" comment="texlive-russ is &lt;2017.133.svn25209-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227729" version="1" comment="texlive-rutitlepage is &lt;2017.133.1.0svn44485-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227730" version="1" comment="texlive-rviewport is &lt;2017.133.1.0svn23739-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227731" version="1" comment="texlive-rvwrite is &lt;2017.133.1.2svn19614-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227732" version="1" comment="texlive-ryethesis is &lt;2017.133.1.36svn33945-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227733" version="1" comment="texlive-sa-tikz is &lt;2017.133.0.0.7asvn32815-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227734" version="1" comment="texlive-sageep is &lt;2017.133.1.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227735" version="1" comment="texlive-sanitize-umlaut is &lt;2017.133.1.00svn41365-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227736" version="1" comment="texlive-sanskrit is &lt;2017.133.2.2.1svn42925-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227737" version="1" comment="texlive-sanskrit-t1 is &lt;2017.133.svn35737-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227738" version="1" comment="texlive-sanskrit-t1-fonts is &lt;2017.133.svn35737-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227739" version="1" comment="texlive-sansmath is &lt;2017.133.1.1svn17997-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227740" version="1" comment="texlive-sansmathaccent is &lt;2017.133.svn30187-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227741" version="1" comment="texlive-sansmathfonts is &lt;2017.133.svn43252-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227742" version="1" comment="texlive-sansmathfonts-fonts is &lt;2017.133.svn43252-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227743" version="1" comment="texlive-sapthesis is &lt;2017.133.3.8svn39014-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227744" version="1" comment="texlive-sasnrdisplay is &lt;2017.133.0.0.93svn33120-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227745" version="1" comment="texlive-sauerj is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227746" version="1" comment="texlive-sauter is &lt;2017.133.2.4svn13293-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227747" version="1" comment="texlive-sauterfonts is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227748" version="1" comment="texlive-savefnmark is &lt;2017.133.1.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227749" version="1" comment="texlive-savesym is &lt;2017.133.1.2svn31565-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227750" version="1" comment="texlive-savetrees is &lt;2017.133.2.4svn40525-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227751" version="1" comment="texlive-scale is &lt;2017.133.1.1.2svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227752" version="1" comment="texlive-scalebar is &lt;2017.133.1.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227753" version="1" comment="texlive-scalerel is &lt;2017.133.1.8svn42809-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227754" version="1" comment="texlive-scanpages is &lt;2017.133.1.05asvn42633-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227755" version="1" comment="texlive-scanpages-fonts is &lt;2017.133.1.05asvn42633-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227756" version="1" comment="texlive-schemabloc is &lt;2017.133.1.5svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227757" version="1" comment="texlive-schemata is &lt;2017.133.0.0.8svn39510-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227758" version="1" comment="texlive-schule is &lt;2017.133.0.0.6svn37277-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227759" version="1" comment="texlive-schulschriften is &lt;2017.133.4svn35730-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227760" version="1" comment="texlive-schwalbe-chess is &lt;2017.133.2.1svn39318-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227761" version="1" comment="texlive-sciposter is &lt;2017.133.1.18svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227762" version="1" comment="texlive-sclang-prettifier is &lt;2017.133.0.0.1svn35087-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227763" version="1" comment="texlive-scratch is &lt;2017.133.0.0.2svn44490-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227764" version="1" comment="texlive-screenplay is &lt;2017.133.1.6svn27223-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227765" version="1" comment="texlive-screenplay-pkg is &lt;2017.133.1.0svn37893-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227766" version="1" comment="texlive-scrjrnl is &lt;2017.133.0.0.1svn27810-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227767" version="1" comment="texlive-scrlttr2copy is &lt;2017.133.0.0.1dsvn39734-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227768" version="1" comment="texlive-scsnowman is &lt;2017.133.1.1svn43017-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227769" version="1" comment="texlive-sdrt is &lt;2017.133.1.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227770" version="1" comment="texlive-sduthesis is &lt;2017.133.1.2.1svn41401-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227771" version="1" comment="texlive-secdot is &lt;2017.133.1.0svn20208-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227772" version="1" comment="texlive-section is &lt;2017.133.svn20180-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227773" version="1" comment="texlive-sectionbox is &lt;2017.133.1.01svn37749-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227774" version="1" comment="texlive-sectsty is &lt;2017.133.2.0.2svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227775" version="1" comment="texlive-seealso is &lt;2017.133.1.2svn43595-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227776" version="1" comment="texlive-seetexk is &lt;2017.133.svn44166-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227777" version="1" comment="texlive-seetexk-bin is &lt;2017.20170520.svn44143-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227778" version="1" comment="texlive-selectp is &lt;2017.133.1.0svn20185-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227779" version="1" comment="texlive-selnolig is &lt;2017.133.0.0.302svn38721-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227780" version="1" comment="texlive-semantic is &lt;2017.133.2.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227781" version="1" comment="texlive-semantic-markup is &lt;2017.133.svn42374-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227782" version="1" comment="texlive-semaphor is &lt;2017.133.svn18651-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227783" version="1" comment="texlive-semaphor-fonts is &lt;2017.133.svn18651-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227784" version="1" comment="texlive-seminar is &lt;2017.133.1.62svn34011-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227785" version="1" comment="texlive-semioneside is &lt;2017.133.0.0.41svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227786" version="1" comment="texlive-semproc is &lt;2017.133.0.0.1svn37568-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227787" version="1" comment="texlive-sepfootnotes is &lt;2017.133.0.0.3csvn41732-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227788" version="1" comment="texlive-sepnum is &lt;2017.133.2.0svn20186-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227789" version="1" comment="texlive-seqsplit is &lt;2017.133.0.0.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227790" version="1" comment="texlive-serbian-apostrophe is &lt;2017.133.svn23799-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227791" version="1" comment="texlive-serbian-date-lat is &lt;2017.133.svn23446-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227792" version="1" comment="texlive-serbian-def-cyr is &lt;2017.133.svn23734-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227793" version="1" comment="texlive-serbian-lig is &lt;2017.133.svn39096-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227794" version="1" comment="texlive-sesamanuel is &lt;2017.133.0.0.6svn36613-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227795" version="1" comment="texlive-sesstime is &lt;2017.133.1.0svn44157-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227796" version="1" comment="texlive-setdeck is &lt;2017.133.0.0.1svn40613-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227797" version="1" comment="texlive-setspace is &lt;2017.133.6.7asvn24881-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227798" version="1" comment="texlive-seuthesis is &lt;2017.133.2.1.2svn33042-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227799" version="1" comment="texlive-seuthesix is &lt;2017.133.1.0.1svn40088-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227800" version="1" comment="texlive-sf298 is &lt;2017.133.1.3svn41653-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227801" version="1" comment="texlive-sffms is &lt;2017.133.2.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227802" version="1" comment="texlive-sfg is &lt;2017.133.0.0.91svn20209-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227803" version="1" comment="texlive-sfmath is &lt;2017.133.0.0.8svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227804" version="1" comment="texlive-sgame is &lt;2017.133.2.15svn30959-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227805" version="1" comment="texlive-shade is &lt;2017.133.1svn22212-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227806" version="1" comment="texlive-shadethm is &lt;2017.133.svn20319-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227807" version="1" comment="texlive-shadow is &lt;2017.133.svn20312-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227808" version="1" comment="texlive-shadowtext is &lt;2017.133.0.0.3svn26522-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227809" version="1" comment="texlive-shapepar is &lt;2017.133.2.2svn30708-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227810" version="1" comment="texlive-shapes is &lt;2017.133.1.1svn42428-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227811" version="1" comment="texlive-shdoc is &lt;2017.133.2.1bsvn41991-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227812" version="1" comment="texlive-shipunov is &lt;2017.133.1.1svn29349-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227813" version="1" comment="texlive-shorttoc is &lt;2017.133.1.3svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227814" version="1" comment="texlive-show2e is &lt;2017.133.1.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227815" version="1" comment="texlive-showcharinbox is &lt;2017.133.0.0.1svn29803-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227816" version="1" comment="texlive-showdim is &lt;2017.133.1.2svn28918-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227817" version="1" comment="texlive-showexpl is &lt;2017.133.0.0.3osvn42677-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227818" version="1" comment="texlive-showhyphens is &lt;2017.133.0.0.5csvn39787-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227819" version="1" comment="texlive-showlabels is &lt;2017.133.1.8svn41322-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227820" version="1" comment="texlive-showtags is &lt;2017.133.1.05svn20336-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227821" version="1" comment="texlive-shuffle is &lt;2017.133.1.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227822" version="1" comment="texlive-sidecap is &lt;2017.133.1.6fsvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227823" version="1" comment="texlive-sidenotes is &lt;2017.133.1.00svn40658-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227824" version="1" comment="texlive-sides is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227825" version="1" comment="texlive-signchart is &lt;2017.133.1.01svn39707-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227826" version="1" comment="texlive-silence is &lt;2017.133.1.5bsvn27028-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227827" version="1" comment="texlive-simple-resume-cv is &lt;2017.133.svn43057-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227828" version="1" comment="texlive-simple-thesis-dissertation is &lt;2017.133.svn43058-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227829" version="1" comment="texlive-simplecd is &lt;2017.133.1.4svn29260-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227830" version="1" comment="texlive-simplecv is &lt;2017.133.1.6asvn35537-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227831" version="1" comment="texlive-simpler-wick is &lt;2017.133.1.0.0svn39074-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227832" version="1" comment="texlive-simplewick is &lt;2017.133.1.2asvn15878-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227833" version="1" comment="texlive-simplified-latex is &lt;2017.133.svn20620-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227834" version="1" comment="texlive-simurgh is &lt;2017.133.0.0.01bsvn31719-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227835" version="1" comment="texlive-sitem is &lt;2017.133.1.0svn22136-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227836" version="1" comment="texlive-siunitx is &lt;2017.133.2.7gsvn44428-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227837" version="1" comment="texlive-skak is &lt;2017.133.1.5.2svn32758-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227838" version="1" comment="texlive-skaknew is &lt;2017.133.svn20031-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227839" version="1" comment="texlive-skaknew-fonts is &lt;2017.133.svn20031-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227840" version="1" comment="texlive-skb is &lt;2017.133.0.0.52svn22781-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227841" version="1" comment="texlive-skdoc is &lt;2017.133.1.5svn43170-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227842" version="1" comment="texlive-skeycommand is &lt;2017.133.0.0.4svn24652-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227843" version="1" comment="texlive-skeyval is &lt;2017.133.1.3svn30560-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227844" version="1" comment="texlive-skmath is &lt;2017.133.0.0.4bsvn42902-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227845" version="1" comment="texlive-skrapport is &lt;2017.133.0.0.12gsvn42903-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227846" version="1" comment="texlive-skull is &lt;2017.133.0.0.1svn25608-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227847" version="1" comment="texlive-slantsc is &lt;2017.133.2.11svn25007-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227848" version="1" comment="texlive-slideshow is &lt;2017.133.1.0svn15878-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227849" version="1" comment="texlive-smalltableof is &lt;2017.133.svn20333-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227850" version="1" comment="texlive-smartdiagram is &lt;2017.133.0.0.3bsvn42781-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227851" version="1" comment="texlive-smartref is &lt;2017.133.1.9svn20311-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227852" version="1" comment="texlive-smartunits is &lt;2017.133.1.2svn39592-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227853" version="1" comment="texlive-snapshot is &lt;2017.133.1.14svn15878-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227854" version="1" comment="texlive-snotez is &lt;2017.133.0.0.3svn30355-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227855" version="1" comment="texlive-songbook is &lt;2017.133.4.5svn18136-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227856" version="1" comment="texlive-songs is &lt;2017.133.3.0svn44553-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227857" version="1" comment="texlive-sort-by-letters is &lt;2017.133.svn27128-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227858" version="1" comment="texlive-soton is &lt;2017.133.0.0.1svn16215-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227859" version="1" comment="texlive-soul is &lt;2017.133.2.4svn15878-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227860" version="1" comment="texlive-soup is &lt;2017.133.1.0svn42992-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227861" version="1" comment="texlive-sourcecodepro is &lt;2017.133.2.6svn40597-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227862" version="1" comment="texlive-sourcecodepro-fonts is &lt;2017.133.2.6svn40597-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227863" version="1" comment="texlive-sourcesanspro is &lt;2017.133.2.6svn42852-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227864" version="1" comment="texlive-sourcesanspro-fonts is &lt;2017.133.2.6svn42852-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227865" version="1" comment="texlive-sourceserifpro is &lt;2017.133.1.2svn40598-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227866" version="1" comment="texlive-sourceserifpro-fonts is &lt;2017.133.1.2svn40598-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227867" version="1" comment="texlive-spalign is &lt;2017.133.svn42225-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227868" version="1" comment="texlive-spanish-mx is &lt;2017.133.1.1asvn15878-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227869" version="1" comment="texlive-sparklines is &lt;2017.133.1.7svn42821-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227870" version="1" comment="texlive-spath3 is &lt;2017.133.1.1svn39794-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227871" version="1" comment="texlive-spelling is &lt;2017.133.0.0.41svn30715-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227872" version="1" comment="texlive-sphdthesis is &lt;2017.133.1.0svn34374-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227873" version="1" comment="texlive-spie is &lt;2017.133.3.25svn15878-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227874" version="1" comment="texlive-splines is &lt;2017.133.0.0.2svn15878-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227875" version="1" comment="texlive-splitbib is &lt;2017.133.1.17svn15878-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227876" version="1" comment="texlive-splitindex is &lt;2017.133.1.2csvn39766-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227877" version="1" comment="texlive-splitindex-bin is &lt;2017.20170520.svn29688-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227878" version="1" comment="texlive-spot is &lt;2017.133.1.1svn22408-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227879" version="1" comment="texlive-spotcolor is &lt;2017.133.1.2svn15878-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227880" version="1" comment="texlive-spreadtab is &lt;2017.133.0.0.4csvn35531-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227881" version="1" comment="texlive-spverbatim is &lt;2017.133.1.0svn15878-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227882" version="1" comment="texlive-sr-vorl is &lt;2017.133.1.1svn39529-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227883" version="1" comment="texlive-srbook-mem is &lt;2017.133.svn23454-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227884" version="1" comment="texlive-srcltx is &lt;2017.133.1.6svn15878-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227885" version="1" comment="texlive-srcredact is &lt;2017.133.1.0svn38710-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227886" version="1" comment="texlive-srcredact-bin is &lt;2017.20170520.svn38710-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227887" version="1" comment="texlive-sseq is &lt;2017.133.2.01svn31585-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227888" version="1" comment="texlive-sslides is &lt;2017.133.svn32293-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227889" version="1" comment="texlive-stack is &lt;2017.133.1.00svn15878-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227890" version="1" comment="texlive-stackengine is &lt;2017.133.4.01svn43221-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227891" version="1" comment="texlive-stage is &lt;2017.133.1.00svn44100-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227892" version="1" comment="texlive-standalone is &lt;2017.133.1.2svn37875-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227893" version="1" comment="texlive-stanli is &lt;2017.133.3.0svn42765-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227894" version="1" comment="texlive-starfont is &lt;2017.133.1.2svn19982-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227895" version="1" comment="texlive-starfont-fonts is &lt;2017.133.1.2svn19982-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227896" version="1" comment="texlive-startex is &lt;2017.133.1.04svn35718-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227897" version="1" comment="texlive-statex is &lt;2017.133.1.6svn20306-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227898" version="1" comment="texlive-statex2 is &lt;2017.133.2.1svn23961-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227899" version="1" comment="texlive-statistik is &lt;2017.133.0.0.03svn20334-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227900" version="1" comment="texlive-staves is &lt;2017.133.svn15878-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227901" version="1" comment="texlive-staves-fonts is &lt;2017.133.svn15878-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227902" version="1" comment="texlive-stdclsdv is &lt;2017.133.1.1asvn15878-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227903" version="1" comment="texlive-stdpage is &lt;2017.133.0.0.6svn15878-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227904" version="1" comment="texlive-steinmetz is &lt;2017.133.1.0svn15878-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227905" version="1" comment="texlive-stellenbosch is &lt;2017.133.11asvn36696-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227906" version="1" comment="texlive-stex is &lt;2017.133.svn40320-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227907" version="1" comment="texlive-stix is &lt;2017.133.1.1.2svn36914-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227908" version="1" comment="texlive-stix-fonts is &lt;2017.133.1.1.2svn36914-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227909" version="1" comment="texlive-stmaryrd is &lt;2017.133.svn22027-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227910" version="1" comment="texlive-stmaryrd-fonts is &lt;2017.133.svn22027-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227911" version="1" comment="texlive-storebox is &lt;2017.133.1.3asvn24895-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227912" version="1" comment="texlive-storecmd is &lt;2017.133.0.0.0.2svn24431-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227913" version="1" comment="texlive-stringstrings is &lt;2017.133.1.23svn36203-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227914" version="1" comment="texlive-struktex is &lt;2017.133.141svn25916-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227915" version="1" comment="texlive-sttools is &lt;2017.133.2.0svn43684-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227916" version="1" comment="texlive-stubs is &lt;2017.133.0.0.1.1svn19440-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227917" version="1" comment="texlive-studenthandouts is &lt;2017.133.1.0svn43516-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227918" version="1" comment="texlive-sty2dtx is &lt;2017.133.2.3svn29743-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227919" version="1" comment="texlive-sty2dtx-bin is &lt;2017.20170520.svn21215-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227920" version="1" comment="texlive-suanpan is &lt;2017.133.svn15878-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227921" version="1" comment="texlive-subdepth is &lt;2017.133.0.0.1svn15878-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227922" version="1" comment="texlive-subeqn is &lt;2017.133.2.0bsvn15878-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227923" version="1" comment="texlive-subeqnarray is &lt;2017.133.2.1csvn15878-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227924" version="1" comment="texlive-subfig is &lt;2017.133.1.3svn15878-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227925" version="1" comment="texlive-subfigmat is &lt;2017.133.1.0svn20308-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227926" version="1" comment="texlive-subfigure is &lt;2017.133.2.1.5svn15878-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227927" version="1" comment="texlive-subfiles is &lt;2017.133.1.1svn26645-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227928" version="1" comment="texlive-subfloat is &lt;2017.133.2.14svn29349-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227929" version="1" comment="texlive-substances is &lt;2017.133.0.0.2asvn40989-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227930" version="1" comment="texlive-substitutefont is &lt;2017.133.0.0.1.4svn32066-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227931" version="1" comment="texlive-substr is &lt;2017.133.1.2svn16117-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227932" version="1" comment="texlive-subsupscripts is &lt;2017.133.1.0svn16080-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227933" version="1" comment="texlive-sudoku is &lt;2017.133.1.0svn15878-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227934" version="1" comment="texlive-sudokubundle is &lt;2017.133.1.0asvn15878-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227935" version="1" comment="texlive-suftesi is &lt;2017.133.2.9svn40238-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227936" version="1" comment="texlive-sugconf is &lt;2017.133.svn15878-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227937" version="1" comment="texlive-superiors is &lt;2017.133.1.05svn36422-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227938" version="1" comment="texlive-superiors-fonts is &lt;2017.133.1.05svn36422-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227939" version="1" comment="texlive-supertabular is &lt;2017.133.4.1asvn15878-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227940" version="1" comment="texlive-susy is &lt;2017.133.svn19440-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227941" version="1" comment="texlive-svg is &lt;2017.133.2.00bsvn44503-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227942" version="1" comment="texlive-svg-inkscape is &lt;2017.133.svn32199-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227943" version="1" comment="texlive-svgcolor is &lt;2017.133.1.0svn15878-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227944" version="1" comment="texlive-svn is &lt;2017.133.43svn15878-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227945" version="1" comment="texlive-svn-multi is &lt;2017.133.2.4dsvn26313-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227946" version="1" comment="texlive-svn-multi-bin is &lt;2017.20170520.svn13663-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227947" version="1" comment="texlive-svn-prov is &lt;2017.133.3.1862svn18017-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227948" version="1" comment="texlive-svninfo is &lt;2017.133.0.0.7.4svn17554-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227949" version="1" comment="texlive-svrsymbols is &lt;2017.133.2.0asvn40371-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227950" version="1" comment="texlive-svrsymbols-fonts is &lt;2017.133.2.0asvn40371-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227951" version="1" comment="texlive-swebib is &lt;2017.133.svn15878-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227952" version="1" comment="texlive-swimgraf is &lt;2017.133.svn25446-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227953" version="1" comment="texlive-syllogism is &lt;2017.133.1.2svn15878-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227954" version="1" comment="texlive-symbol is &lt;2017.133.svn31835-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227955" version="1" comment="texlive-symbol-fonts is &lt;2017.133.svn31835-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227956" version="1" comment="texlive-sympytexpackage is &lt;2017.133.svn41190-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227957" version="1" comment="texlive-synctex is &lt;2017.133.svn44166-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227958" version="1" comment="texlive-synctex-bin is &lt;2017.20170520.svn44143-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227959" version="1" comment="texlive-synctex-devel is &lt;1.18-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227960" version="1" comment="texlive-synproof is &lt;2017.133.1.0svn15878-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227961" version="1" comment="texlive-syntax is &lt;2017.133.svn15878-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227962" version="1" comment="texlive-syntrace is &lt;2017.133.1.1svn15878-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227963" version="1" comment="texlive-synttree is &lt;2017.133.1.4.2svn16252-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227964" version="1" comment="texlive-systeme is &lt;2017.133.0.0.3svn32473-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227965" version="1" comment="texlive-t-angles is &lt;2017.133.svn15878-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227966" version="1" comment="texlive-t2 is &lt;2017.133.svn39024-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227967" version="1" comment="texlive-tabfigures is &lt;2017.133.1.1svn25202-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227968" version="1" comment="texlive-table-fct is &lt;2017.133.1.1svn41849-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227969" version="1" comment="texlive-tableaux is &lt;2017.133.svn42413-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227970" version="1" comment="texlive-tablefootnote is &lt;2017.134.1.1csvn32804-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227971" version="1" comment="texlive-tableof is &lt;2017.134.1.4asvn36489-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227972" version="1" comment="texlive-tablestyles is &lt;2017.134.svn34495-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227973" version="1" comment="texlive-tablists is &lt;2017.134.0.0.0esvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227974" version="1" comment="texlive-tablor is &lt;2017.134.4.07_gsvn31855-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227975" version="1" comment="texlive-tabls is &lt;2017.134.3.5svn17255-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227976" version="1" comment="texlive-tabriz-thesis is &lt;2017.134.1.1svn29421-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227977" version="1" comment="texlive-tabstackengine is &lt;2017.134.2.01svn42610-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227978" version="1" comment="texlive-tabto-generic is &lt;2017.134.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227979" version="1" comment="texlive-tabto-ltx is &lt;2017.134.1.3svn30710-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227980" version="1" comment="texlive-tabu is &lt;2017.134.2.8svn21534-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227981" version="1" comment="texlive-tabularborder is &lt;2017.134.1.0asvn17885-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227982" version="1" comment="texlive-tabularcalc is &lt;2017.134.0.0.2svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227983" version="1" comment="texlive-tabularew is &lt;2017.134.0.0.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227984" version="1" comment="texlive-tabulars-e is &lt;2017.134.1.0svn21191-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227985" version="1" comment="texlive-tabulary is &lt;2017.134.0.0.10svn34368-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227986" version="1" comment="texlive-tabvar is &lt;2017.134.1.7svn28908-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227987" version="1" comment="texlive-tabvar-fonts is &lt;2017.134.1.7svn28908-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227988" version="1" comment="texlive-tagging is &lt;2017.134.svn23761-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227989" version="1" comment="texlive-tagpair is &lt;2017.134.1.1svn42138-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227990" version="1" comment="texlive-talk is &lt;2017.134.1.1svn42428-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227991" version="1" comment="texlive-tamefloats is &lt;2017.134.0.0.42svn27345-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227992" version="1" comment="texlive-tamethebeast is &lt;2017.134.1.4svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227993" version="1" comment="texlive-tap is &lt;2017.134.0.0.77svn31731-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227994" version="1" comment="texlive-tapir is &lt;2017.134.0.0.2svn20484-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227995" version="1" comment="texlive-tapir-fonts is &lt;2017.134.0.0.2svn20484-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227996" version="1" comment="texlive-tasks is &lt;2017.134.0.0.12svn41851-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227997" version="1" comment="texlive-tcldoc is &lt;2017.134.2.40svn22018-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227998" version="1" comment="texlive-tcolorbox is &lt;2017.134.4.03svn44046-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009227999" version="1" comment="texlive-tdclock is &lt;2017.134.2.5svn33043-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228000" version="1" comment="texlive-tds is &lt;2017.134.1.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228001" version="1" comment="texlive-tdsfrmath is &lt;2017.134.1.3svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228002" version="1" comment="texlive-technics is &lt;2017.134.1.0svn29349-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228003" version="1" comment="texlive-ted is &lt;2017.134.1.06svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228004" version="1" comment="texlive-templates-fenn is &lt;2017.134.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228005" version="1" comment="texlive-templates-sommer is &lt;2017.134.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228006" version="1" comment="texlive-templatetools is &lt;2017.134.svn34495-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228007" version="1" comment="texlive-tempora is &lt;2017.134.1.05svn39596-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228008" version="1" comment="texlive-tempora-fonts is &lt;2017.134.1.05svn39596-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228009" version="1" comment="texlive-tengwarscript is &lt;2017.134.1.3.1svn34594-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228010" version="1" comment="texlive-tensor is &lt;2017.134.2.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228011" version="1" comment="texlive-termcal is &lt;2017.134.1.8svn22514-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228012" version="1" comment="texlive-termlist is &lt;2017.134.1.1svn18923-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228013" version="1" comment="texlive-termmenu is &lt;2017.134.svn37700-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228014" version="1" comment="texlive-testhyphens is &lt;2017.134.0.0.7svn38928-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228015" version="1" comment="texlive-testidx is &lt;2017.134.1.0svn42294-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228016" version="1" comment="texlive-tetex is &lt;2017.134.3.0svn44331-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228017" version="1" comment="texlive-tetex-bin is &lt;2017.20170520.svn43957-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228018" version="1" comment="texlive-teubner is &lt;2017.134.4.8svn40197-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228019" version="1" comment="texlive-tex is &lt;2017.134.3.14159265svn44166-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228020" version="1" comment="texlive-tex-bin is &lt;2017.20170520.svn44143-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228021" version="1" comment="texlive-tex-ewd is &lt;2017.134.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228022" version="1" comment="texlive-tex-font-errors-cheatsheet is &lt;2017.134.0.0.1svn18314-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228023" version="1" comment="texlive-tex-gyre is &lt;2017.134.2.004svn18651-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228024" version="1" comment="texlive-tex-gyre-fonts is &lt;2017.134.2.004svn18651-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228025" version="1" comment="texlive-tex-gyre-math is &lt;2017.134.svn41264-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228026" version="1" comment="texlive-tex-gyre-math-fonts is &lt;2017.134.svn41264-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228027" version="1" comment="texlive-tex-ini-files is &lt;2017.134.svn40533-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228028" version="1" comment="texlive-tex-label is &lt;2017.134.svn16372-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228029" version="1" comment="texlive-tex-overview is &lt;2017.134.0.0.2svn41403-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228030" version="1" comment="texlive-tex-ps is &lt;2017.134.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228031" version="1" comment="texlive-tex-refs is &lt;2017.134.0.0.4.8svn44131-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228032" version="1" comment="texlive-tex-virtual-academy-pl is &lt;2017.134.svn34177-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228033" version="1" comment="texlive-tex4ebook is &lt;2017.134.0.0.1esvn44103-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228034" version="1" comment="texlive-tex4ebook-bin is &lt;2017.20170520.svn37771-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228035" version="1" comment="texlive-tex4ht is &lt;2017.134.svn44379-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228036" version="1" comment="texlive-tex4ht-bin is &lt;2017.20170520.svn44143-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228037" version="1" comment="texlive-texapi is &lt;2017.134.1.04svn24237-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228038" version="1" comment="texlive-texbytopic is &lt;2017.134.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228039" version="1" comment="texlive-texconfig is &lt;2017.134.svn44166-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228040" version="1" comment="texlive-texconfig-bin is &lt;2017.20170520.svn29741-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228041" version="1" comment="texlive-texcount is &lt;2017.134.3.0svn31323-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228042" version="1" comment="texlive-texcount-bin is &lt;2017.20170520.svn13013-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228043" version="1" comment="texlive-texdef is &lt;2017.134.1.7bsvn26420-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228044" version="1" comment="texlive-texdef-bin is &lt;2017.20170520.svn21802-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228045" version="1" comment="texlive-texdiff is &lt;2017.134.0.0.4svn29752-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228046" version="1" comment="texlive-texdiff-bin is &lt;2017.20170520.svn15506-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228047" version="1" comment="texlive-texdirflatten is &lt;2017.134.1.1svn29725-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228048" version="1" comment="texlive-texdirflatten-bin is &lt;2017.20170520.svn12782-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228049" version="1" comment="texlive-texdoc is &lt;2017.134.svn44432-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228050" version="1" comment="texlive-texdoc-bin is &lt;2017.20170520.svn29741-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228051" version="1" comment="texlive-texdraw is &lt;2017.134.svn31894-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228052" version="1" comment="texlive-texfot is &lt;2017.134.1.32svn39660-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228053" version="1" comment="texlive-texfot-bin is &lt;2017.20170520.svn33155-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228054" version="1" comment="texlive-texilikechaps is &lt;2017.134.1.0asvn28553-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228055" version="1" comment="texlive-texilikecover is &lt;2017.134.0.0.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228056" version="1" comment="texlive-texinfo is &lt;2017.134.5.1svn43137-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228057" version="1" comment="texlive-texlive-common is &lt;2017.134.svn44191-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228058" version="1" comment="texlive-texlive-cz is &lt;2017.134.svn44347-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228059" version="1" comment="texlive-texlive-de is &lt;2017.134.svn44366-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228060" version="1" comment="texlive-texlive-en is &lt;2017.134.svn44424-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228061" version="1" comment="texlive-texlive-es is &lt;2017.134.svn44356-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228062" version="1" comment="texlive-texlive-fr is &lt;2017.134.svn44342-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228063" version="1" comment="texlive-texlive-it is &lt;2017.134.svn44357-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228064" version="1" comment="texlive-texlive-pl is &lt;2017.134.svn44343-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228065" version="1" comment="texlive-texlive-ru is &lt;2017.134.svn44444-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228066" version="1" comment="texlive-texlive-sr is &lt;2017.134.svn44341-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228067" version="1" comment="texlive-texlive-zh-cn is &lt;2017.134.svn44333-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228068" version="1" comment="texlive-texlive.infra is &lt;2017.134.svn44462-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228069" version="1" comment="texlive-texliveonfly is &lt;2017.134.svn26313-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228070" version="1" comment="texlive-texliveonfly-bin is &lt;2017.20170520.svn24062-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228071" version="1" comment="texlive-texloganalyser is &lt;2017.134.0.0.9svn35584-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228072" version="1" comment="texlive-texloganalyser-bin is &lt;2017.20170520.svn13663-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228073" version="1" comment="texlive-texlogos is &lt;2017.134.1.3.1svn19083-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228074" version="1" comment="texlive-texlua-devel is &lt;5.2.4-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228075" version="1" comment="texlive-texluajit-devel is &lt;2.1.0beta2-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228076" version="1" comment="texlive-texmate is &lt;2017.134.2svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228077" version="1" comment="texlive-texments is &lt;2017.134.0.0.2.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228078" version="1" comment="texlive-texosquery is &lt;2017.134.1.5svn44509-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228079" version="1" comment="texlive-texosquery-bin is &lt;2017.20170520.svn43596-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228080" version="1" comment="texlive-texpower is &lt;2017.134.0.0.2svn29349-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228081" version="1" comment="texlive-texproposal is &lt;2017.134.1.4svn43151-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228082" version="1" comment="texlive-texshade is &lt;2017.134.1.24svn24716-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228083" version="1" comment="texlive-texsis is &lt;2017.134.2.18svn39057-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228084" version="1" comment="texlive-texsis-bin is &lt;2017.20170520.svn3006-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228085" version="1" comment="texlive-textcase is &lt;2017.134.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228086" version="1" comment="texlive-textfit is &lt;2017.134.5svn20591-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228087" version="1" comment="texlive-textglos is &lt;2017.134.1.0svn30788-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228088" version="1" comment="texlive-textgreek is &lt;2017.134.0.0.7svn44192-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228089" version="1" comment="texlive-textmerg is &lt;2017.134.2.01svn20677-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228090" version="1" comment="texlive-textopo is &lt;2017.134.1.5svn23796-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228091" version="1" comment="texlive-textpath is &lt;2017.134.1.6svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228092" version="1" comment="texlive-textpos is &lt;2017.134.1.8svn41331-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228093" version="1" comment="texlive-texvc is &lt;2017.134.1.0svn38809-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228094" version="1" comment="texlive-texware is &lt;2017.134.svn44166-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228095" version="1" comment="texlive-texware-bin is &lt;2017.20170520.svn44143-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228096" version="1" comment="texlive-tfrupee is &lt;2017.134.1.02svn20770-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228097" version="1" comment="texlive-tfrupee-fonts is &lt;2017.134.1.02svn20770-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228098" version="1" comment="texlive-thaienum is &lt;2017.134.0.0.2svn44140-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228099" version="1" comment="texlive-thalie is &lt;2017.134.0.0.9bsvn44048-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228100" version="1" comment="texlive-theoremref is &lt;2017.134.svn30640-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228101" version="1" comment="texlive-thesis-ekf is &lt;2017.134.2.1svn43745-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228102" version="1" comment="texlive-thesis-titlepage-fhac is &lt;2017.134.0.0.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228103" version="1" comment="texlive-thinsp is &lt;2017.134.0.0.2svn39669-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228104" version="1" comment="texlive-thmbox is &lt;2017.134.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228105" version="1" comment="texlive-thmtools is &lt;2017.134.66svn33624-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228106" version="1" comment="texlive-threadcol is &lt;2017.134.1.0svn28754-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228107" version="1" comment="texlive-threeddice is &lt;2017.134.1.0svn20675-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228108" version="1" comment="texlive-threeparttable is &lt;2017.134.svn17383-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228109" version="1" comment="texlive-threeparttablex is &lt;2017.134.0.0.3svn34206-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228110" version="1" comment="texlive-thumb is &lt;2017.134.1.0svn16549-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228111" version="1" comment="texlive-thumbpdf is &lt;2017.134.3.16svn34621-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228112" version="1" comment="texlive-thumbpdf-bin is &lt;2017.20170520.svn6898-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228113" version="1" comment="texlive-thumbs is &lt;2017.134.1.0qsvn33134-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228114" version="1" comment="texlive-thumby is &lt;2017.134.0.0.1svn16736-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228115" version="1" comment="texlive-thuthesis is &lt;2017.134.5.3.2svn43609-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228116" version="1" comment="texlive-ticket is &lt;2017.134.0.0.4dsvn42280-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228117" version="1" comment="texlive-ticollege is &lt;2017.134.1.0svn36306-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228118" version="1" comment="texlive-tie is &lt;2017.134.2.4svn44166-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228119" version="1" comment="texlive-tie-bin is &lt;2017.20170520.svn44143-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228120" version="1" comment="texlive-tikz-3dplot is &lt;2017.133.svn25087-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228121" version="1" comment="texlive-tikz-bayesnet is &lt;2017.133.0.0.1svn38295-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228122" version="1" comment="texlive-tikz-cd is &lt;2017.133.0.0.9esvn35485-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228123" version="1" comment="texlive-tikz-dependency is &lt;2017.133.1.2svn42454-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228124" version="1" comment="texlive-tikz-dimline is &lt;2017.133.1.0svn35805-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228125" version="1" comment="texlive-tikz-feynman is &lt;2017.133.1.1.0svn39582-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228126" version="1" comment="texlive-tikz-inet is &lt;2017.133.0.0.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228127" version="1" comment="texlive-tikz-kalender is &lt;2017.133.0.0.4asvn44393-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228128" version="1" comment="texlive-tikz-opm is &lt;2017.133.0.0.1.1svn32769-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228129" version="1" comment="texlive-tikz-optics is &lt;2017.133.0.0.2.3svn43466-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228130" version="1" comment="texlive-tikz-page is &lt;2017.133.1.0svn42039-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228131" version="1" comment="texlive-tikz-palattice is &lt;2017.133.2.3svn43442-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228132" version="1" comment="texlive-tikz-qtree is &lt;2017.133.1.2svn26108-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228133" version="1" comment="texlive-tikz-timing is &lt;2017.133.0.0.7dsvn21013-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228134" version="1" comment="texlive-tikzinclude is &lt;2017.133.1.0svn28715-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228135" version="1" comment="texlive-tikzmark is &lt;2017.133.1.3svn44475-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228136" version="1" comment="texlive-tikzorbital is &lt;2017.133.svn36439-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228137" version="1" comment="texlive-tikzpagenodes is &lt;2017.133.1.1svn27723-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228138" version="1" comment="texlive-tikzpeople is &lt;2017.133.0.0.4svn43978-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228139" version="1" comment="texlive-tikzpfeile is &lt;2017.133.1.0svn25777-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228140" version="1" comment="texlive-tikzposter is &lt;2017.133.2.0svn32732-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228141" version="1" comment="texlive-tikzscale is &lt;2017.133.0.0.2.6svn30637-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228142" version="1" comment="texlive-tikzsymbols is &lt;2017.133.4.02svn44350-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228143" version="1" comment="texlive-times is &lt;2017.133.svn35058-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228144" version="1" comment="texlive-times-fonts is &lt;2017.133.svn35058-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228145" version="1" comment="texlive-timetable is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228146" version="1" comment="texlive-timing-diagrams is &lt;2017.133.svn31491-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228147" version="1" comment="texlive-tinos is &lt;2017.133.svn42882-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228148" version="1" comment="texlive-tinos-fonts is &lt;2017.133.svn42882-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228149" version="1" comment="texlive-tipa is &lt;2017.133.1.3svn29349-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228150" version="1" comment="texlive-tipa-de is &lt;2017.133.1.3svn22005-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228151" version="1" comment="texlive-tipa-fonts is &lt;2017.133.1.3svn29349-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228152" version="1" comment="texlive-tipfr is &lt;2017.133.1.5svn38646-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228153" version="1" comment="texlive-titlecaps is &lt;2017.133.1.2svn36170-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228154" version="1" comment="texlive-titlefoot is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228155" version="1" comment="texlive-titlepages is &lt;2017.133.svn19457-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228156" version="1" comment="texlive-titlepic is &lt;2017.133.1.2svn43497-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228157" version="1" comment="texlive-titleref is &lt;2017.133.3.1svn18729-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228158" version="1" comment="texlive-titlesec is &lt;2017.133.2.10.2svn40129-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228159" version="1" comment="texlive-titling is &lt;2017.133.2.1dsvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228160" version="1" comment="texlive-tkz-base is &lt;2017.133.1.16svn22961-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228161" version="1" comment="texlive-tkz-berge is &lt;2017.133.1.00csvn22891-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228162" version="1" comment="texlive-tkz-doc is &lt;2017.133.1.1csvn22959-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228163" version="1" comment="texlive-tkz-euclide is &lt;2017.133.1.16csvn22830-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228164" version="1" comment="texlive-tkz-fct is &lt;2017.133.1.16csvn22831-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228165" version="1" comment="texlive-tkz-graph is &lt;2017.133.1.00svn22832-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228166" version="1" comment="texlive-tkz-kiviat is &lt;2017.133.0.0.1svn22857-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228167" version="1" comment="texlive-tkz-linknodes is &lt;2017.133.1.0csvn22833-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228168" version="1" comment="texlive-tkz-orm is &lt;2017.133.0.0.1.4svn39408-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228169" version="1" comment="texlive-tkz-tab is &lt;2017.133.1.3csvn22834-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228170" version="1" comment="texlive-tlc2 is &lt;2017.133.svn26096-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228171" version="1" comment="texlive-tocbibind is &lt;2017.133.1.5ksvn20085-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228172" version="1" comment="texlive-tocdata is &lt;2017.133.0.0.12svn42623-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228173" version="1" comment="texlive-tocloft is &lt;2017.133.2.3fsvn30209-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228174" version="1" comment="texlive-tocvsec2 is &lt;2017.133.1.3asvn33146-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228175" version="1" comment="texlive-todo is &lt;2017.133.2.142svn17746-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228176" version="1" comment="texlive-todonotes is &lt;2017.133.1.0.5svn42423-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228177" version="1" comment="texlive-tokenizer is &lt;2017.133.1.1.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228178" version="1" comment="texlive-toolbox is &lt;2017.133.5.1svn32260-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228179" version="1" comment="texlive-tools is &lt;2017.133.svn43813-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228180" version="1" comment="texlive-topfloat is &lt;2017.133.svn19084-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228181" version="1" comment="texlive-toptesi is &lt;2017.133.5.9.06svn42586-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228182" version="1" comment="texlive-totcount is &lt;2017.133.1.2svn21178-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228183" version="1" comment="texlive-totpages is &lt;2017.133.2.00svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228184" version="1" comment="texlive-tpic2pdftex is &lt;2017.133.svn44166-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228185" version="1" comment="texlive-tpic2pdftex-bin is &lt;2017.20170520.svn29741-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228186" version="1" comment="texlive-tpslifonts is &lt;2017.133.0.0.6svn42428-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228187" version="1" comment="texlive-tqft is &lt;2017.133.2.1svn44455-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228188" version="1" comment="texlive-tracklang is &lt;2017.133.1.3.4svn43605-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228189" version="1" comment="texlive-trajan is &lt;2017.133.1.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228190" version="1" comment="texlive-trajan-fonts is &lt;2017.133.1.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228191" version="1" comment="texlive-tram is &lt;2017.133.0.0.2svn29803-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228192" version="1" comment="texlive-translation-array-fr is &lt;2017.133.svn24344-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228193" version="1" comment="texlive-translation-arsclassica-de is &lt;2017.133.svn23803-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228194" version="1" comment="texlive-translation-biblatex-de is &lt;2017.133.2.0svn42198-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228195" version="1" comment="texlive-translation-chemsym-de is &lt;2017.133.svn23804-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228196" version="1" comment="texlive-translation-dcolumn-fr is &lt;2017.133.svn24345-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228197" version="1" comment="texlive-translation-ecv-de is &lt;2017.133.svn24754-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228198" version="1" comment="texlive-translation-enumitem-de is &lt;2017.133.svn24196-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228199" version="1" comment="texlive-translation-europecv-de is &lt;2017.133.svn23840-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228200" version="1" comment="texlive-translation-filecontents-de is &lt;2017.133.svn24010-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228201" version="1" comment="texlive-translation-moreverb-de is &lt;2017.133.svn23957-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228202" version="1" comment="texlive-translation-natbib-fr is &lt;2017.133.svn25105-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228203" version="1" comment="texlive-translation-tabbing-fr is &lt;2017.133.svn24228-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228204" version="1" comment="texlive-translations is &lt;2017.133.1.6svn44381-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228205" version="1" comment="texlive-tree-dvips is &lt;2017.133.0.0.91svn21751-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228206" version="1" comment="texlive-treetex is &lt;2017.133.svn28176-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228207" version="1" comment="texlive-trfsigns is &lt;2017.133.1.01svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228208" version="1" comment="texlive-trigonometry is &lt;2017.133.svn43006-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228209" version="1" comment="texlive-trimspaces is &lt;2017.133.1.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228210" version="1" comment="texlive-trivfloat is &lt;2017.133.1.3bsvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228211" version="1" comment="texlive-trsym is &lt;2017.133.1.0svn18732-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228212" version="1" comment="texlive-truncate is &lt;2017.133.3.6svn18921-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228213" version="1" comment="texlive-tsemlines is &lt;2017.133.1.0svn23440-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228214" version="1" comment="texlive-ttfutils is &lt;2017.133.svn44166-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228215" version="1" comment="texlive-ttfutils-bin is &lt;2017.20170520.svn44143-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228216" version="1" comment="texlive-tucv is &lt;2017.133.1.0svn20680-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228217" version="1" comment="texlive-tudscr is &lt;2017.133.2.05msvn44480-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228218" version="1" comment="texlive-tufte-latex is &lt;2017.133.3.5.2svn37649-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228219" version="1" comment="texlive-tugboat is &lt;2017.133.2.18svn42465-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228220" version="1" comment="texlive-tugboat-plain is &lt;2017.133.1.23svn43560-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228221" version="1" comment="texlive-tui is &lt;2017.133.1.9svn27253-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228222" version="1" comment="texlive-turabian is &lt;2017.133.0.0.1.0svn36298-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228223" version="1" comment="texlive-turabian-formatting is &lt;2017.133.svn43537-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228224" version="1" comment="texlive-turkmen is &lt;2017.133.0.0.2svn17748-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228225" version="1" comment="texlive-turnstile is &lt;2017.133.1.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228226" version="1" comment="texlive-turnthepage is &lt;2017.133.1.3asvn29803-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228227" version="1" comment="texlive-twoinone is &lt;2017.133.svn17024-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228228" version="1" comment="texlive-twoup is &lt;2017.133.1.3svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228229" version="1" comment="texlive-txfonts is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228230" version="1" comment="texlive-txfonts-fonts is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228231" version="1" comment="texlive-txfontsb is &lt;2017.133.1.1svn21578-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228232" version="1" comment="texlive-txfontsb-fonts is &lt;2017.133.1.1svn21578-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228233" version="1" comment="texlive-txgreeks is &lt;2017.133.1.0svn21839-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228234" version="1" comment="texlive-txuprcal is &lt;2017.133.1.00svn43327-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228235" version="1" comment="texlive-txuprcal-fonts is &lt;2017.133.1.00svn43327-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228236" version="1" comment="texlive-type1cm is &lt;2017.133.svn21820-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228237" version="1" comment="texlive-typed-checklist is &lt;2017.133.1.4svn40389-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228238" version="1" comment="texlive-typeface is &lt;2017.133.0.0.1svn27046-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228239" version="1" comment="texlive-typehtml is &lt;2017.133.svn17134-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228240" version="1" comment="texlive-typeoutfileinfo is &lt;2017.133.0.0.31svn29349-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228241" version="1" comment="texlive-typeoutfileinfo-bin is &lt;2017.20170520.svn25648-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228242" version="1" comment="texlive-typicons is &lt;2017.133.2.0.7svn37623-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228243" version="1" comment="texlive-typicons-fonts is &lt;2017.133.2.0.7svn37623-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228244" version="1" comment="texlive-typoaid is &lt;2017.133.0.0.4.7svn44238-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228245" version="1" comment="texlive-typogrid is &lt;2017.133.0.0.21svn24994-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228246" version="1" comment="texlive-uaclasses is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228247" version="1" comment="texlive-uafthesis is &lt;2017.133.12.12svn29349-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228248" version="1" comment="texlive-uantwerpendocs is &lt;2017.133.1.8svn42912-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228249" version="1" comment="texlive-uassign is &lt;2017.133.1.01svn38459-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228250" version="1" comment="texlive-ucbthesis is &lt;2017.133.3.5svn37776-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228251" version="1" comment="texlive-ucdavisthesis is &lt;2017.133.1.3svn40772-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228252" version="1" comment="texlive-ucharcat is &lt;2017.133.0.0.03svn38907-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228253" version="1" comment="texlive-ucharclasses is &lt;2017.133.2.2.1svn40854-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228254" version="1" comment="texlive-ucs is &lt;2017.133.2.2svn35853-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228255" version="1" comment="texlive-ucthesis is &lt;2017.133.3.2svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228256" version="1" comment="texlive-udesoftec is &lt;2017.133.1.6.0svn44308-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228257" version="1" comment="texlive-uebungsblatt is &lt;2017.133.1.5.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228258" version="1" comment="texlive-uestcthesis is &lt;2017.133.1.1.0svn36371-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228259" version="1" comment="texlive-uhc is &lt;2017.133.svn16791-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228260" version="1" comment="texlive-uhc-fonts is &lt;2017.133.svn16791-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228261" version="1" comment="texlive-uhhassignment is &lt;2017.133.1.0svn44026-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228262" version="1" comment="texlive-uhrzeit is &lt;2017.133.0.0.2csvn39570-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228263" version="1" comment="texlive-uiucredborder is &lt;2017.133.1.00svn29974-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228264" version="1" comment="texlive-uiucthesis is &lt;2017.133.2.25svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228265" version="1" comment="texlive-ukrhyph is &lt;2017.133.svn21081-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228266" version="1" comment="texlive-ulem is &lt;2017.133.svn26785-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228267" version="1" comment="texlive-ulqda is &lt;2017.133.1.1svn26313-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228268" version="1" comment="texlive-ulqda-bin is &lt;2017.20170520.svn13663-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228269" version="1" comment="texlive-ulthese is &lt;2017.133.4.4svn44456-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228270" version="1" comment="texlive-umbclegislation is &lt;2017.133.2016_6_8svn41348-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228271" version="1" comment="texlive-umich-thesis is &lt;2017.133.1.20svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228272" version="1" comment="texlive-uml is &lt;2017.133.0.0.11svn17476-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228273" version="1" comment="texlive-umlaute is &lt;2017.133.2.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228274" version="1" comment="texlive-umoline is &lt;2017.133.svn19085-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228275" version="1" comment="texlive-umthesis is &lt;2017.133.0.0.2svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228276" version="1" comment="texlive-umtypewriter is &lt;2017.133.001.002svn18651-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228277" version="1" comment="texlive-umtypewriter-fonts is &lt;2017.133.001.002svn18651-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228278" version="1" comment="texlive-unamth-template is &lt;2017.133.2.0svn33625-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228279" version="1" comment="texlive-unamthesis is &lt;2017.133.2.1svn43639-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228280" version="1" comment="texlive-undergradmath is &lt;2017.133.svn42926-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228281" version="1" comment="texlive-underlin is &lt;2017.133.1.01svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228282" version="1" comment="texlive-underoverlap is &lt;2017.133.0.0.0.1_r1svn29019-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228283" version="1" comment="texlive-underscore is &lt;2017.133.svn18261-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228284" version="1" comment="texlive-undolabl is &lt;2017.133.1.0lsvn36681-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228285" version="1" comment="texlive-unfonts-core is &lt;2017.133.svn44467-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228286" version="1" comment="texlive-unfonts-core-fonts is &lt;2017.133.svn44467-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228287" version="1" comment="texlive-unfonts-extra is &lt;2017.133.svn44465-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228288" version="1" comment="texlive-unfonts-extra-fonts is &lt;2017.133.svn44465-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228289" version="1" comment="texlive-uni-wtal-ger is &lt;2017.133.0.0.2svn31541-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228290" version="1" comment="texlive-uni-wtal-lin is &lt;2017.133.0.0.2svn31409-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228291" version="1" comment="texlive-unicode-bidi is &lt;2017.133.0.0.01svn42482-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228292" version="1" comment="texlive-unicode-data is &lt;2017.133.1.5svn41521-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228293" version="1" comment="texlive-unicode-math is &lt;2017.133.0.0.8dsvn43068-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228294" version="1" comment="texlive-unisugar is &lt;2017.133.0.0.92svn22357-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228295" version="1" comment="texlive-units is &lt;2017.133.0.0.9bsvn42428-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228296" version="1" comment="texlive-unitsdef is &lt;2017.133.0.0.2svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228297" version="1" comment="texlive-universa is &lt;2017.133.2.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228298" version="1" comment="texlive-universalis is &lt;2017.133.svn33860-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228299" version="1" comment="texlive-universalis-fonts is &lt;2017.133.svn33860-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228300" version="1" comment="texlive-unravel is &lt;2017.133.0.0.2svn38506-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228301" version="1" comment="texlive-unswcover is &lt;2017.133.1.0svn29476-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228302" version="1" comment="texlive-uothesis is &lt;2017.133.2.5.6svn25355-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228303" version="1" comment="texlive-uowthesis is &lt;2017.133.1.0asvn19700-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228304" version="1" comment="texlive-uowthesistitlepage is &lt;2017.133.2.0svn32626-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228305" version="1" comment="texlive-upca is &lt;2017.133.svn22511-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228306" version="1" comment="texlive-updmap-map is &lt;2017.133.svn43366-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228307" version="1" comment="texlive-uplatex is &lt;2017.133.svn44210-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228308" version="1" comment="texlive-uplatex-bin is &lt;2017.20170520.svn26326-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228309" version="1" comment="texlive-upmethodology is &lt;2017.133.svn43453-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228310" version="1" comment="texlive-uppunctlm is &lt;2017.133.0.0.1svn42334-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228311" version="1" comment="texlive-upquote is &lt;2017.133.1.3svn26059-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228312" version="1" comment="texlive-uptex is &lt;2017.133.1.20svn42950-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228313" version="1" comment="texlive-uptex-base is &lt;2017.133.svn43900-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228314" version="1" comment="texlive-uptex-bin is &lt;2017.20170520.svn44143-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228315" version="1" comment="texlive-uptex-fonts is &lt;2017.133.svn42853-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228316" version="1" comment="texlive-urcls is &lt;2017.133.2.0svn43734-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228317" version="1" comment="texlive-uri is &lt;2017.133.1.0asvn21608-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228318" version="1" comment="texlive-url is &lt;2017.133.3.4svn32528-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228319" version="1" comment="texlive-urlbst is &lt;2017.133.0.0.7svn29803-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228320" version="1" comment="texlive-urlbst-bin is &lt;2017.20170520.svn23262-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228321" version="1" comment="texlive-urwchancal is &lt;2017.133.1svn21701-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228322" version="1" comment="texlive-usebib is &lt;2017.133.1.0asvn25969-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228323" version="1" comment="texlive-ushort is &lt;2017.133.2.2svn32261-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228324" version="1" comment="texlive-uspace is &lt;2017.133.0.0.04svn42456-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228325" version="1" comment="texlive-uspatent is &lt;2017.133.1.0svn27744-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228326" version="1" comment="texlive-ut-thesis is &lt;2017.133.2.1svn38269-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228327" version="1" comment="texlive-utf8mex is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228328" version="1" comment="texlive-utopia is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228329" version="1" comment="texlive-utopia-fonts is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228330" version="1" comment="texlive-uwmslide is &lt;2017.133.svn27354-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228331" version="1" comment="texlive-uwthesis is &lt;2017.133.6.13svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228332" version="1" comment="texlive-vak is &lt;2017.133.svn23431-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228333" version="1" comment="texlive-vancouver is &lt;2017.133.svn34470-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228334" version="1" comment="texlive-variablelm is &lt;2017.133.1.1.1svn43686-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228335" version="1" comment="texlive-variations is &lt;2017.133.0.0.3svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228336" version="1" comment="texlive-varindex is &lt;2017.133.2.3svn32262-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228337" version="1" comment="texlive-varisize is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228338" version="1" comment="texlive-varsfromjobname is &lt;2017.133.1.0svn44154-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228339" version="1" comment="texlive-varwidth is &lt;2017.133.0.0.92svn24104-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228340" version="1" comment="texlive-vaucanson-g is &lt;2017.133.0.0.4svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228341" version="1" comment="texlive-vdmlisting is &lt;2017.133.1.0svn29944-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228342" version="1" comment="texlive-velthuis is &lt;2017.133.2.17svn44166-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228343" version="1" comment="texlive-velthuis-bin is &lt;2017.20170520.svn44143-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228344" version="1" comment="texlive-velthuis-fonts is &lt;2017.133.2.17svn44166-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228345" version="1" comment="texlive-venn is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228346" version="1" comment="texlive-venndiagram is &lt;2017.133.1.1svn40058-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228347" version="1" comment="texlive-venturisadf is &lt;2017.133.1.005svn19444-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228348" version="1" comment="texlive-venturisadf-fonts is &lt;2017.133.1.005svn19444-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228349" version="1" comment="texlive-verbasef is &lt;2017.133.1.1svn21922-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228350" version="1" comment="texlive-verbatimbox is &lt;2017.133.3.13svn33197-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228351" version="1" comment="texlive-verbatimcopy is &lt;2017.133.0.0.06svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228352" version="1" comment="texlive-verbdef is &lt;2017.133.0.0.2svn17177-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228353" version="1" comment="texlive-verbments is &lt;2017.133.1.2svn23670-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228354" version="1" comment="texlive-verse is &lt;2017.133.2.4bsvn34017-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228355" version="1" comment="texlive-version is &lt;2017.133.2.0svn21920-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228356" version="1" comment="texlive-versions is &lt;2017.133.0.0.55svn21921-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228357" version="1" comment="texlive-versonotes is &lt;2017.133.0.0.3svn39084-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228358" version="1" comment="texlive-vertbars is &lt;2017.133.1.0bsvn20589-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228359" version="1" comment="texlive-vgrid is &lt;2017.133.0.0.1svn32457-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228360" version="1" comment="texlive-vhistory is &lt;2017.133.1.6.1svn30080-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228361" version="1" comment="texlive-visualfaq is &lt;2017.133.svn38647-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228362" version="1" comment="texlive-visualpstricks is &lt;2017.133.2.3svn39799-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228363" version="1" comment="texlive-visualtikz is &lt;2017.133.0.0.64svn43239-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228364" version="1" comment="texlive-vlna is &lt;2017.133.svn44166-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228365" version="1" comment="texlive-vlna-bin is &lt;2017.20170520.svn44143-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228366" version="1" comment="texlive-vmargin is &lt;2017.133.2.5svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228367" version="1" comment="texlive-vntex is &lt;2017.133.3.2svn30579-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228368" version="1" comment="texlive-vntex-fonts is &lt;2017.133.3.2svn30579-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228369" version="1" comment="texlive-vocaltract is &lt;2017.133.1svn25629-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228370" version="1" comment="texlive-volumes is &lt;2017.133.1.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228371" version="1" comment="texlive-voss-mathcol is &lt;2017.133.0.0.1svn32954-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228372" version="1" comment="texlive-vpe is &lt;2017.133.0.0.2svn26039-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228373" version="1" comment="texlive-vpe-bin is &lt;2017.20170520.svn6897-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228374" version="1" comment="texlive-vruler is &lt;2017.133.2.3svn21598-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228375" version="1" comment="texlive-vwcol is &lt;2017.133.0.0.2svn36254-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228376" version="1" comment="texlive-wadalab is &lt;2017.133.svn42428-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228377" version="1" comment="texlive-wadalab-fonts is &lt;2017.133.svn42428-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228378" version="1" comment="texlive-wallpaper is &lt;2017.133.1.10svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228379" version="1" comment="texlive-warning is &lt;2017.133.0.0.01svn22028-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228380" version="1" comment="texlive-warpcol is &lt;2017.133.1.0csvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228381" version="1" comment="texlive-was is &lt;2017.133.svn21439-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228382" version="1" comment="texlive-wasy is &lt;2017.133.svn35831-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228383" version="1" comment="texlive-wasy2-ps is &lt;2017.133.svn35830-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228384" version="1" comment="texlive-wasy2-ps-fonts is &lt;2017.133.svn35830-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228385" version="1" comment="texlive-wasysym is &lt;2017.133.2.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228386" version="1" comment="texlive-web is &lt;2017.133.4.5svn44166-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228387" version="1" comment="texlive-web-bin is &lt;2017.20170520.svn44143-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228388" version="1" comment="texlive-webguide is &lt;2017.133.svn25813-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228389" version="1" comment="texlive-widetable is &lt;2017.133.1.1svn16082-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228390" version="1" comment="texlive-williams is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228391" version="1" comment="texlive-withargs is &lt;2017.133.0.0.2.0svn42756-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228392" version="1" comment="texlive-wnri is &lt;2017.133.svn22459-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228393" version="1" comment="texlive-wnri-latex is &lt;2017.133.1.0bsvn22338-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228394" version="1" comment="texlive-wordcount is &lt;2017.133.1.7svn41381-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228395" version="1" comment="texlive-wordlike is &lt;2017.133.1.2bsvn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228396" version="1" comment="texlive-wrapfig is &lt;2017.133.3.6svn22048-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228397" version="1" comment="texlive-wsemclassic is &lt;2017.133.1.0.1svn31532-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228398" version="1" comment="texlive-wsuipa is &lt;2017.133.svn25469-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228399" version="1" comment="texlive-wtref is &lt;2017.133.0.0.3.2svn42981-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228400" version="1" comment="texlive-xargs is &lt;2017.133.1.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228401" version="1" comment="texlive-xassoccnt is &lt;2017.133.1.4svn44127-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228402" version="1" comment="texlive-xcharter is &lt;2017.133.1.08svn43465-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228403" version="1" comment="texlive-xcharter-fonts is &lt;2017.133.1.08svn43465-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228404" version="1" comment="texlive-xcite is &lt;2017.133.1.0svn23783-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228405" version="1" comment="texlive-xcjk2uni is &lt;2017.133.0.0.6svn41121-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228406" version="1" comment="texlive-xcntperchap is &lt;2017.133.0.0.4svn44128-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228407" version="1" comment="texlive-xcolor is &lt;2017.133.2.12svn41044-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228408" version="1" comment="texlive-xcolor-material is &lt;2017.133.0.0.1svn42289-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228409" version="1" comment="texlive-xcolor-solarized is &lt;2017.133.0.0.4svn41809-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228410" version="1" comment="texlive-xcomment is &lt;2017.133.1.3svn20031-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228411" version="1" comment="texlive-xcookybooky is &lt;2017.133.1.5svn36435-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228412" version="1" comment="texlive-xdoc is &lt;2017.133.prot2.5svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228413" version="1" comment="texlive-xduthesis is &lt;2017.133.1.00svn39694-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228414" version="1" comment="texlive-xdvi is &lt;2017.133.22.87.03svn44166-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228415" version="1" comment="texlive-xdvi-bin is &lt;2017.20170520.svn44143-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228416" version="1" comment="texlive-xebaposter is &lt;2017.133.2.51svn42046-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228417" version="1" comment="texlive-xecjk is &lt;2017.133.3.4.8svn44370-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228418" version="1" comment="texlive-xecolor is &lt;2017.133.0.0.1svn29660-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228419" version="1" comment="texlive-xecyr is &lt;2017.133.1.1svn20221-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228420" version="1" comment="texlive-xeindex is &lt;2017.133.0.0.3svn35756-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228421" version="1" comment="texlive-xellipsis is &lt;2017.133.1.2svn42764-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228422" version="1" comment="texlive-xepersian is &lt;2017.133.18.7svn44547-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228423" version="1" comment="texlive-xesearch is &lt;2017.133.svn16041-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228424" version="1" comment="texlive-xespotcolor is &lt;2017.133.2.0asvn40118-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228425" version="1" comment="texlive-xetex is &lt;2017.133.svn41438-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228426" version="1" comment="texlive-xetex-bin is &lt;2017.20170520.svn44361-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228427" version="1" comment="texlive-xetex-devanagari is &lt;2017.133.0.0.5svn34296-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228428" version="1" comment="texlive-xetex-itrans is &lt;2017.133.4.2svn35088-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228429" version="1" comment="texlive-xetex-pstricks is &lt;2017.133.svn17055-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228430" version="1" comment="texlive-xetex-tibetan is &lt;2017.133.0.0.1svn28847-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228431" version="1" comment="texlive-xetexconfig is &lt;2017.133.svn41133-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228432" version="1" comment="texlive-xetexfontinfo is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228433" version="1" comment="texlive-xetexko is &lt;2017.133.2.16svn43173-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228434" version="1" comment="texlive-xetexref is &lt;2017.133.svn30636-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228435" version="1" comment="texlive-xevlna is &lt;2017.133.1.1svn43864-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228436" version="1" comment="texlive-xfor is &lt;2017.133.1.05svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228437" version="1" comment="texlive-xgreek is &lt;2017.133.3.0svn43222-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228438" version="1" comment="texlive-xhfill is &lt;2017.133.1.01svn22575-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228439" version="1" comment="texlive-xifthen is &lt;2017.133.1.4.0svn38929-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228440" version="1" comment="texlive-xii is &lt;2017.133.svn31683-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228441" version="1" comment="texlive-xint is &lt;2017.133.1.2ksvn42892-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228442" version="1" comment="texlive-xits is &lt;2017.133.1.108svn32763-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228443" version="1" comment="texlive-xits-fonts is &lt;2017.133.1.108svn32763-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228444" version="1" comment="texlive-xkeyval is &lt;2017.133.2.7asvn35741-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228445" version="1" comment="texlive-xlop is &lt;2017.133.0.0.26svn42899-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228446" version="1" comment="texlive-xltxtra is &lt;2017.133.0.0.6svn39453-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228447" version="1" comment="texlive-xmltex is &lt;2017.133.0.0.8svn40855-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228448" version="1" comment="texlive-xmltex-bin is &lt;2017.20170520.svn3006-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228449" version="1" comment="texlive-xmltexconfig is &lt;2017.133.svn35743-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228450" version="1" comment="texlive-xmpincl is &lt;2017.133.2.2svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228451" version="1" comment="texlive-xnewcommand is &lt;2017.133.1.2svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228452" version="1" comment="texlive-xoptarg is &lt;2017.133.1.0svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228453" version="1" comment="texlive-xpatch is &lt;2017.133.0.0.2svn27897-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228454" version="1" comment="texlive-xpeek is &lt;2017.133.0.0.2svn27442-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228455" version="1" comment="texlive-xpiano is &lt;2017.133.1.0svn37604-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228456" version="1" comment="texlive-xpicture is &lt;2017.133.1.2asvn28770-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228457" version="1" comment="texlive-xpinyin is &lt;2017.133.2.4svn41940-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228458" version="1" comment="texlive-xprintlen is &lt;2017.133.1.0svn35928-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228459" version="1" comment="texlive-xpunctuate is &lt;2017.133.1.0svn26641-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228460" version="1" comment="texlive-xq is &lt;2017.133.0.0.4svn35211-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228461" version="1" comment="texlive-xsavebox is &lt;2017.133.0.0.6svn43589-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228462" version="1" comment="texlive-xsim is &lt;2017.133.0.0.8asvn44430-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228463" version="1" comment="texlive-xskak is &lt;2017.133.1.4svn35945-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228464" version="1" comment="texlive-xstring is &lt;2017.133.1.7csvn31900-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228465" version="1" comment="texlive-xtab is &lt;2017.133.2.3fsvn23347-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228466" version="1" comment="texlive-xunicode is &lt;2017.133.0.0.981svn30466-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228467" version="1" comment="texlive-xwatermark is &lt;2017.133.1.5.2dsvn28090-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228468" version="1" comment="texlive-xyling is &lt;2017.133.1.1svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228469" version="1" comment="texlive-xymtex is &lt;2017.133.5.06svn32182-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228470" version="1" comment="texlive-xypic is &lt;2017.133.3.8.9svn31859-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228471" version="1" comment="texlive-xypic-fonts is &lt;2017.133.3.8.9svn31859-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228472" version="1" comment="texlive-xypic-tut-pt is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228473" version="1" comment="texlive-xytree is &lt;2017.133.1.5svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228474" version="1" comment="texlive-yafoot is &lt;2017.133.svn19086-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228475" version="1" comment="texlive-yagusylo is &lt;2017.133.1.2svn29803-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228476" version="1" comment="texlive-yaletter is &lt;2017.133.1.1svn42830-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228477" version="1" comment="texlive-yannisgr is &lt;2017.133.svn22613-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228478" version="1" comment="texlive-yathesis is &lt;2017.133.0.0.99psvn42671-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228479" version="1" comment="texlive-yax is &lt;2017.133.1.03svn21183-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228480" version="1" comment="texlive-ycbook is &lt;2017.133.svn43171-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228481" version="1" comment="texlive-ydoc is &lt;2017.133.0.0.6alphasvn26202-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228482" version="1" comment="texlive-yfonts is &lt;2017.133.1.3svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009063153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228483" version="1" comment="texlive-yfonts-t1 is &lt;2017.133.1.0svn36013-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228484" version="1" comment="texlive-yfonts-t1-fonts is &lt;2017.133.1.0svn36013-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228485" version="1" comment="texlive-yhmath is &lt;2017.133.1.1svn31155-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228486" version="1" comment="texlive-yhmath-fonts is &lt;2017.133.1.1svn31155-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228487" version="1" comment="texlive-yinit-otf is &lt;2017.133.1.0svn40207-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228488" version="1" comment="texlive-yinit-otf-fonts is &lt;2017.133.1.0svn40207-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228489" version="1" comment="texlive-york-thesis is &lt;2017.133.3.6svn23348-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228490" version="1" comment="texlive-youngtab is &lt;2017.133.1.1svn17635-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228491" version="1" comment="texlive-yplan is &lt;2017.133.svn34398-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228492" version="1" comment="texlive-yplan-bin is &lt;2017.20170520.svn34398-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228493" version="1" comment="texlive-ytableau is &lt;2017.133.1.3svn27430-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228494" version="1" comment="texlive-zapfchan is &lt;2017.133.svn31835-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228495" version="1" comment="texlive-zapfchan-fonts is &lt;2017.133.svn31835-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228496" version="1" comment="texlive-zapfding is &lt;2017.133.svn31835-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228497" version="1" comment="texlive-zapfding-fonts is &lt;2017.133.svn31835-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228498" version="1" comment="texlive-zed-csp is &lt;2017.133.svn17258-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228499" version="1" comment="texlive-zhmetrics is &lt;2017.133.r206svn22207-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228500" version="1" comment="texlive-zhmetrics-uptex is &lt;2017.133.1.0svn40728-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228501" version="1" comment="texlive-zhnumber is &lt;2017.133.2.4svn41123-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228502" version="1" comment="texlive-zhspacing is &lt;2017.133.svn41145-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228503" version="1" comment="texlive-ziffer is &lt;2017.133.2.1svn32279-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228504" version="1" comment="texlive-zlmtt is &lt;2017.133.1.01svn34485-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228505" version="1" comment="texlive-zwgetfdate is &lt;2017.133.svn15878-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228506" version="1" comment="texlive-zwpagelayout is &lt;2017.133.1.4dsvn28846-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228507" version="1" comment="texlive-zxjafbfont is &lt;2017.133.0.0.2svn28539-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228508" version="1" comment="texlive-zxjafont is &lt;2017.133.0.0.3svn37281-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228509" version="1" comment="texlive-zxjatype is &lt;2017.133.0.0.6svn28541-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228510" version="1" comment="liblouis-data is &lt;3.3.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228511" version="1" comment="liblouis-devel is &lt;3.3.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228512" version="1" comment="liblouis14 is &lt;3.3.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228513" version="1" comment="python3-louis is &lt;3.3.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228514" version="1" comment="libmad-devel is &lt;0.15.1b-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228515" version="1" comment="libmad0 is &lt;0.15.1b-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228516" version="1" comment="libmicrohttpd-devel is &lt;0.9.57-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228517" version="1" comment="libmicrohttpd12 is &lt;0.9.57-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228518" version="1" comment="libmms-devel is &lt;0.6.4-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228519" version="1" comment="libmms0 is &lt;0.6.4-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228520" version="1" comment="libmodplug-devel is &lt;0.3.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228521" version="1" comment="libmodplug1 is &lt;0.3.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228522" version="1" comment="libopenmpt-devel is &lt;0.3.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228523" version="1" comment="libopenmpt0 is &lt;0.3.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228524" version="1" comment="libopenmpt_modplug1 is &lt;0.3.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228525" version="1" comment="libmp3lame-devel is &lt;3.100-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228526" version="1" comment="libmp3lame0 is &lt;3.100-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228527" version="1" comment="libmpg123-0 is &lt;1.25.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228528" version="1" comment="libout123-0 is &lt;1.25.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228529" version="1" comment="mpg123 is &lt;1.25.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228530" version="1" comment="mpg123-devel is &lt;1.25.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228531" version="1" comment="mpg123-pulse is &lt;1.25.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228532" version="1" comment="libndp-devel is &lt;1.6-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228533" version="1" comment="libndp0 is &lt;1.6-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228534" version="1" comment="libnm-gtk-devel is &lt;1.8.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228535" version="1" comment="libnm-gtk0 is &lt;1.8.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228536" version="1" comment="libnma-devel is &lt;1.8.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228537" version="1" comment="libnma0 is &lt;1.8.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228538" version="1" comment="nma-data is &lt;1.8.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228539" version="1" comment="typelib-1_0-NMA-1_0 is &lt;1.8.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228540" version="1" comment="typelib-1_0-NMGtk-1_0 is &lt;1.8.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228541" version="1" comment="libopenjpeg1 is &lt;1.5.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228542" version="1" comment="openjpeg-devel is &lt;1.5.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228543" version="1" comment="libopus-devel is &lt;1.2.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228544" version="1" comment="libpango-1_0-0-32bit is &lt;1.40.14-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228545" version="1" comment="libpcre2-posix2 is &lt;10.31-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228546" version="1" comment="pcre2-devel is &lt;10.31-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228547" version="1" comment="libplist++-devel is &lt;2.0.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228548" version="1" comment="libplist++3 is &lt;2.0.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228549" version="1" comment="libplist-devel is &lt;2.0.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228550" version="1" comment="libplist3 is &lt;2.0.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228551" version="1" comment="libpotrace0 is &lt;1.15-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228552" version="1" comment="libquicktime is &lt;1.2.4cvs20150223-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228553" version="1" comment="libquicktime-devel is &lt;1.2.4cvs20150223-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228554" version="1" comment="libquicktime0 is &lt;1.2.4cvs20150223-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228555" version="1" comment="libraptor-devel is &lt;2.0.15-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228556" version="1" comment="libraptor2-0 is &lt;2.0.15-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228557" version="1" comment="raptor is &lt;2.0.15-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228558" version="1" comment="librsvg-devel is &lt;2.42.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228559" version="1" comment="typelib-1_0-Rsvg-2_0 is &lt;2.42.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228560" version="1" comment="libsmi-devel is &lt;0.4.8-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228561" version="1" comment="libsoup-devel is &lt;2.62.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228562" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.62.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228563" version="1" comment="libsrtp-devel is &lt;1.6.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228564" version="1" comment="libsrtp1 is &lt;1.6.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228565" version="1" comment="libtag-devel is &lt;1.11.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228566" version="1" comment="libtag_c0 is &lt;1.11.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228567" version="1" comment="libtasn1-6-32bit is &lt;4.13-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228568" version="1" comment="libthai-devel is &lt;0.1.27-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228569" version="1" comment="libthai0-32bit is &lt;0.1.27-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228570" version="1" comment="libtiff5-32bit is &lt;4.0.9-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228571" version="1" comment="libusbmuxd-devel is &lt;1.0.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228572" version="1" comment="libusbmuxd4 is &lt;1.0.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228573" version="1" comment="libvdpau-devel is &lt;1.1.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228574" version="1" comment="libvdpau1 is &lt;1.1.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228575" version="1" comment="libvpx-devel is &lt;1.6.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228576" version="1" comment="libxcb-render0-32bit is &lt;1.13-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228577" version="1" comment="libxcb-shm0-32bit is &lt;1.13-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228578" version="1" comment="libyaml-cpp0_6 is &lt;0.6.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228579" version="1" comment="yaml-cpp-devel is &lt;0.6.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228580" version="1" comment="newt-devel is &lt;0.52.20-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228581" version="1" comment="open-vm-tools-desktop is &lt;10.2.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228582" version="1" comment="perl-CGI is &lt;4.38-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228583" version="1" comment="perl-File-Path is &lt;2.150000-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228584" version="1" comment="perl-MIME-Charset is &lt;1.012.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228585" version="1" comment="perl-Tk is &lt;804.034-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180997" version="1" comment="ppp is &lt;2.4.7-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182796" version="1" comment="ppp-devel is &lt;2.4.7-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228586" version="1" comment="pulseaudio is &lt;11.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228587" version="1" comment="pulseaudio-bash-completion is &lt;11.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228588" version="1" comment="pulseaudio-esound-compat is &lt;11.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228589" version="1" comment="pulseaudio-gdm-hooks is &lt;11.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228590" version="1" comment="pulseaudio-lang is &lt;11.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228591" version="1" comment="pulseaudio-module-gconf is &lt;11.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228592" version="1" comment="pulseaudio-module-x11 is &lt;11.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228593" version="1" comment="pulseaudio-module-zeroconf is &lt;11.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228594" version="1" comment="pulseaudio-utils is &lt;11.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228595" version="1" comment="pulseaudio-zsh-completion is &lt;11.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228596" version="1" comment="python-tk is &lt;2.7.14-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228597" version="1" comment="python3-bottle is &lt;0.12.13-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228598" version="1" comment="python3-cupshelpers is &lt;1.5.7-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228599" version="1" comment="system-config-printer-common is &lt;1.5.7-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228600" version="1" comment="system-config-printer-common-lang is &lt;1.5.7-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228601" version="1" comment="system-config-printer-dbus-service is &lt;1.5.7-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228602" version="1" comment="udev-configure-printer is &lt;1.5.7-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228603" version="1" comment="rtkit is &lt;0.11+git.20130926-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228604" version="1" comment="sane-backends is &lt;1.0.27-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228605" version="1" comment="sane-backends-autoconfig is &lt;1.0.27-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228606" version="1" comment="sane-backends-devel is &lt;1.0.27-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228607" version="1" comment="spice-vdagent is &lt;0.17.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228608" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.20.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228609" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.20.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228610" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.20.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228611" version="1" comment="webkit2gtk3-devel is &lt;2.20.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228612" version="1" comment="vino is &lt;3.22.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228613" version="1" comment="vino-lang is &lt;3.22.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228614" version="1" comment="vorbis-tools is &lt;1.4.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228615" version="1" comment="vorbis-tools-lang is &lt;1.4.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228616" version="1" comment="wavpack is &lt;5.1.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228617" version="1" comment="wavpack-devel is &lt;5.1.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228618" version="1" comment="wireshark-devel is &lt;2.4.6-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228619" version="1" comment="wireshark-ui-qt is &lt;2.4.6-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251786" version="1" comment="ImageMagick is &lt;7.0.7.34-3.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251787" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.0.7.34-3.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251789" version="1" comment="ImageMagick-devel is &lt;7.0.7.34-3.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251790" version="1" comment="libMagick++-7_Q16HDRI4 is &lt;7.0.7.34-3.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251791" version="1" comment="libMagick++-devel is &lt;7.0.7.34-3.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251792" version="1" comment="libMagickCore-7_Q16HDRI6 is &lt;7.0.7.34-3.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251793" version="1" comment="libMagickWand-7_Q16HDRI6 is &lt;7.0.7.34-3.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255099" version="1" comment="sle-module-desktop-applications-release is ==15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255100" version="1" comment="MozillaFirefox is &lt;60.6.2-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255101" version="1" comment="MozillaFirefox-devel is &lt;60.6.2-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255102" version="1" comment="MozillaFirefox-translations-common is &lt;60.6.2-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255103" version="1" comment="MozillaFirefox-translations-other is &lt;60.6.2-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255104" version="1" comment="NetworkManager is &lt;1.10.6-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255105" version="1" comment="NetworkManager-devel is &lt;1.10.6-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255106" version="1" comment="libnm-glib-vpn1 is &lt;1.10.6-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255107" version="1" comment="libnm-glib4 is &lt;1.10.6-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255108" version="1" comment="libnm-util2 is &lt;1.10.6-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255109" version="1" comment="typelib-1_0-NMClient-1_0 is &lt;1.10.6-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255110" version="1" comment="typelib-1_0-NetworkManager-1_0 is &lt;1.10.6-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255111" version="1" comment="PackageKit is &lt;1.1.10-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255112" version="1" comment="PackageKit-backend-zypp is &lt;1.1.10-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255113" version="1" comment="PackageKit-devel is &lt;1.1.10-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255114" version="1" comment="PackageKit-lang is &lt;1.1.10-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255115" version="1" comment="libpackagekit-glib2-18 is &lt;1.1.10-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255116" version="1" comment="libpackagekit-glib2-devel is &lt;1.1.10-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255117" version="1" comment="typelib-1_0-PackageKitGlib-1_0 is &lt;1.1.10-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255118" version="1" comment="accountsservice is &lt;0.6.45-6.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255119" version="1" comment="accountsservice-devel is &lt;0.6.45-6.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255120" version="1" comment="accountsservice-lang is &lt;0.6.45-6.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255121" version="1" comment="libaccountsservice0 is &lt;0.6.45-6.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255122" version="1" comment="typelib-1_0-AccountsService-1_0 is &lt;0.6.45-6.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247638" version="1" comment="audiofile-devel is &lt;0.3.6-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247639" version="1" comment="libaudiofile1 is &lt;0.3.6-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255123" version="1" comment="avahi-autoipd is &lt;0.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246761" version="1" comment="bluez is &lt;5.48-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246763" version="1" comment="bluez-devel is &lt;5.48-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255124" version="1" comment="bubblewrap is &lt;0.3.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255125" version="1" comment="emacs-x11 is &lt;25.3-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255126" version="1" comment="firewall-applet is &lt;0.5.5-4.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255127" version="1" comment="firewall-config is &lt;0.5.5-4.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255128" version="1" comment="flatpak is &lt;1.2.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255129" version="1" comment="flatpak-devel is &lt;1.2.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255130" version="1" comment="flatpak-zsh-completion is &lt;1.2.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255131" version="1" comment="libflatpak0 is &lt;1.2.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255132" version="1" comment="typelib-1_0-Flatpak-1_0 is &lt;1.2.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246316" version="1" comment="gd is &lt;2.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246320" version="1" comment="gd-devel is &lt;2.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245377" version="1" comment="gdm is &lt;3.26.2.1-13.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245378" version="1" comment="gdm-devel is &lt;3.26.2.1-13.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245379" version="1" comment="gdm-lang is &lt;3.26.2.1-13.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245380" version="1" comment="gdmflexiserver is &lt;3.26.2.1-13.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245381" version="1" comment="libgdm1 is &lt;3.26.2.1-13.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245382" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.26.2.1-13.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255133" version="1" comment="gnome-shell is &lt;3.26.2+20180130.0d9c74212-4.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255134" version="1" comment="gnome-shell-devel is &lt;3.26.2+20180130.0d9c74212-4.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255135" version="1" comment="gnome-shell-lang is &lt;3.26.2+20180130.0d9c74212-4.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255136" version="1" comment="gstreamer-plugins-bad is &lt;1.12.5-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255137" version="1" comment="gstreamer-plugins-bad-devel is &lt;1.12.5-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255138" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.12.5-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255139" version="1" comment="libgstadaptivedemux-1_0-0 is &lt;1.12.5-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255140" version="1" comment="libgstbadallocators-1_0-0 is &lt;1.12.5-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255141" version="1" comment="libgstbadaudio-1_0-0 is &lt;1.12.5-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255142" version="1" comment="libgstbadbase-1_0-0 is &lt;1.12.5-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255143" version="1" comment="libgstbadvideo-1_0-0 is &lt;1.12.5-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255144" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.12.5-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255145" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.12.5-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255146" version="1" comment="libgstinsertbin-1_0-0 is &lt;1.12.5-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255147" version="1" comment="libgstmpegts-1_0-0 is &lt;1.12.5-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255148" version="1" comment="libgstplayer-1_0-0 is &lt;1.12.5-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255149" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.12.5-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255150" version="1" comment="libgstwayland-1_0-0 is &lt;1.12.5-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255151" version="1" comment="typelib-1_0-GstBadAllocators-1_0 is &lt;1.12.5-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255152" version="1" comment="typelib-1_0-GstGL-1_0 is &lt;1.12.5-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255153" version="1" comment="typelib-1_0-GstInsertBin-1_0 is &lt;1.12.5-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255154" version="1" comment="typelib-1_0-GstMpegts-1_0 is &lt;1.12.5-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255155" version="1" comment="typelib-1_0-GstPlayer-1_0 is &lt;1.12.5-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244626" version="1" comment="gvfs is &lt;1.34.2.1-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244627" version="1" comment="gvfs-backend-afc is &lt;1.34.2.1-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244628" version="1" comment="gvfs-backend-samba is &lt;1.34.2.1-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244629" version="1" comment="gvfs-backends is &lt;1.34.2.1-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244630" version="1" comment="gvfs-devel is &lt;1.34.2.1-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244631" version="1" comment="gvfs-fuse is &lt;1.34.2.1-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244632" version="1" comment="gvfs-lang is &lt;1.34.2.1-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255156" version="1" comment="hplip is &lt;3.18.6-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179907" version="1" comment="ibus-chewing is &lt;1.4.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255157" version="1" comment="ibus-pinyin is &lt;1.5.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251227" version="1" comment="libIlmImf-2_2-23 is &lt;2.2.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251228" version="1" comment="libIlmImfUtil-2_2-23 is &lt;2.2.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251230" version="1" comment="openexr-devel is &lt;2.2.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255158" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.9.7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255159" version="1" comment="libQt5Sql5-mysql is &lt;5.9.7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255160" version="1" comment="libQt5Sql5-postgresql is &lt;5.9.7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255161" version="1" comment="libQt5Sql5-unixODBC is &lt;5.9.7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255162" version="1" comment="libqt5-qtbase-platformtheme-gtk3 is &lt;5.9.7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247184" version="1" comment="libSDL-1_2-0 is &lt;1.2.15-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247185" version="1" comment="libSDL-devel is &lt;1.2.15-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251151" version="1" comment="libSDL2-2_0-0 is &lt;2.0.8-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251152" version="1" comment="libSDL2-devel is &lt;2.0.8-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243054" version="1" comment="libSoundTouch0 is &lt;1.8.0-3.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243056" version="1" comment="soundtouch-devel is &lt;1.8.0-3.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255163" version="1" comment="libXvnc-devel is &lt;1.9.0-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238528" version="1" comment="libavcodec57 is &lt;3.4.2-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238529" version="1" comment="libavutil-devel is &lt;3.4.2-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238530" version="1" comment="libavutil55 is &lt;3.4.2-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238531" version="1" comment="libpostproc-devel is &lt;3.4.2-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238532" version="1" comment="libpostproc54 is &lt;3.4.2-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238533" version="1" comment="libswresample-devel is &lt;3.4.2-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238534" version="1" comment="libswresample2 is &lt;3.4.2-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238535" version="1" comment="libswscale-devel is &lt;3.4.2-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238536" version="1" comment="libswscale4 is &lt;3.4.2-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229712" version="1" comment="libcairo2-32bit is &lt;1.15.10-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255164" version="1" comment="libcdio++0 is &lt;0.94-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255165" version="1" comment="libcdio-devel is &lt;0.94-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255166" version="1" comment="libcdio16 is &lt;0.94-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255167" version="1" comment="libiso9660-10 is &lt;0.94-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255168" version="1" comment="libudf0 is &lt;0.94-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229739" version="1" comment="libexiv2-26 is &lt;0.26-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229740" version="1" comment="libexiv2-devel is &lt;0.26-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246135" version="1" comment="libgxps-devel is &lt;0.3.0-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246136" version="1" comment="libgxps2 is &lt;0.3.0-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246137" version="1" comment="typelib-1_0-GXPS-0_1 is &lt;0.3.0-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251785" version="1" comment="libjasper-devel is &lt;2.0.14-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246133" version="1" comment="libjpeg8-32bit is &lt;8.1.2-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236914" version="1" comment="libkpathsea6 is &lt;6.2.3-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236915" version="1" comment="libptexenc1 is &lt;1.3.5-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236916" version="1" comment="libsynctex1 is &lt;1.18-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236917" version="1" comment="libtexlua52-5 is &lt;5.2.4-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236918" version="1" comment="libtexluajit2 is &lt;2.1.0beta2-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236919" version="1" comment="perl-biber is &lt;2017.20170520.svn30357-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236920" version="1" comment="texlive is &lt;2017.20170520-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236921" version="1" comment="texlive-a2ping-bin is &lt;2017.20170520.svn27321-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236922" version="1" comment="texlive-accfonts-bin is &lt;2017.20170520.svn12688-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236923" version="1" comment="texlive-adhocfilelist-bin is &lt;2017.20170520.svn28038-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236924" version="1" comment="texlive-afm2pl-bin is &lt;2017.20170520.svn44143-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236925" version="1" comment="texlive-aleph-bin is &lt;2017.20170520.svn44143-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236926" version="1" comment="texlive-amstex-bin is &lt;2017.20170520.svn3006-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236927" version="1" comment="texlive-arara-bin is &lt;2017.20170520.svn29036-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236928" version="1" comment="texlive-asymptote-bin is &lt;2017.20170520.svn43843-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236929" version="1" comment="texlive-authorindex-bin is &lt;2017.20170520.svn18790-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236930" version="1" comment="texlive-autosp-bin is &lt;2017.20170520.svn44143-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236931" version="1" comment="texlive-biber-bin is &lt;2017.20170520.svn42679-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236932" version="1" comment="texlive-bibexport-bin is &lt;2017.20170520.svn16219-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236933" version="1" comment="texlive-bibtex-bin is &lt;2017.20170520.svn44143-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236934" version="1" comment="texlive-bibtex8-bin is &lt;2017.20170520.svn44143-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236935" version="1" comment="texlive-bibtexu-bin is &lt;2017.20170520.svn44143-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236936" version="1" comment="texlive-bin-devel is &lt;2017.20170520-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236937" version="1" comment="texlive-bundledoc-bin is &lt;2017.20170520.svn17794-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236938" version="1" comment="texlive-cachepic-bin is &lt;2017.20170520.svn15543-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236939" version="1" comment="texlive-checkcites-bin is &lt;2017.20170520.svn25623-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236940" version="1" comment="texlive-checklistings-bin is &lt;2017.20170520.svn38300-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236941" version="1" comment="texlive-chktex-bin is &lt;2017.20170520.svn44143-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236942" version="1" comment="texlive-cjk-gs-integrate-bin is &lt;2017.20170520.svn37223-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236943" version="1" comment="texlive-cjkutils-bin is &lt;2017.20170520.svn44143-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236944" version="1" comment="texlive-context-bin is &lt;2017.20170520.svn34112-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236945" version="1" comment="texlive-convbkmk-bin is &lt;2017.20170520.svn30408-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236946" version="1" comment="texlive-crossrefware-bin is &lt;2017.20170520.svn43866-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236947" version="1" comment="texlive-cslatex-bin is &lt;2017.20170520.svn3006-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236948" version="1" comment="texlive-csplain-bin is &lt;2017.20170520.svn33902-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236949" version="1" comment="texlive-ctanify-bin is &lt;2017.20170520.svn24061-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236950" version="1" comment="texlive-ctanupload-bin is &lt;2017.20170520.svn23866-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236951" version="1" comment="texlive-ctie-bin is &lt;2017.20170520.svn44143-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236952" version="1" comment="texlive-cweb-bin is &lt;2017.20170520.svn44143-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236953" version="1" comment="texlive-cyrillic-bin-bin is &lt;2017.20170520.svn29741-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236954" version="1" comment="texlive-de-macro-bin is &lt;2017.20170520.svn17399-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236955" version="1" comment="texlive-detex-bin is &lt;2017.20170520.svn44143-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236956" version="1" comment="texlive-diadia-bin is &lt;2017.20170520.svn37645-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236957" version="1" comment="texlive-dosepsbin-bin is &lt;2017.20170520.svn24759-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236958" version="1" comment="texlive-dtl-bin is &lt;2017.20170520.svn44143-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236959" version="1" comment="texlive-dtxgen-bin is &lt;2017.20170520.svn29031-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236960" version="1" comment="texlive-dviasm-bin is &lt;2017.20170520.svn8329-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236961" version="1" comment="texlive-dvicopy-bin is &lt;2017.20170520.svn44143-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236962" version="1" comment="texlive-dvidvi-bin is &lt;2017.20170520.svn44143-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236963" version="1" comment="texlive-dviinfox-bin is &lt;2017.20170520.svn44515-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236964" version="1" comment="texlive-dviljk-bin is &lt;2017.20170520.svn44143-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236965" version="1" comment="texlive-dvipdfmx-bin is &lt;2017.20170520.svn40273-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236966" version="1" comment="texlive-dvipng-bin is &lt;2017.20170520.svn44143-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236967" version="1" comment="texlive-dvipos-bin is &lt;2017.20170520.svn44143-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236968" version="1" comment="texlive-dvips-bin is &lt;2017.20170520.svn44143-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236969" version="1" comment="texlive-dvisvgm-bin is &lt;2017.20170520.svn40987-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236970" version="1" comment="texlive-ebong-bin is &lt;2017.20170520.svn21000-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236971" version="1" comment="texlive-eplain-bin is &lt;2017.20170520.svn3006-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236972" version="1" comment="texlive-epspdf-bin is &lt;2017.20170520.svn29050-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236973" version="1" comment="texlive-epstopdf-bin is &lt;2017.20170520.svn18336-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236974" version="1" comment="texlive-exceltex-bin is &lt;2017.20170520.svn25860-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236975" version="1" comment="texlive-fig4latex-bin is &lt;2017.20170520.svn14752-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236976" version="1" comment="texlive-findhyph-bin is &lt;2017.20170520.svn14758-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236977" version="1" comment="texlive-fontinst-bin is &lt;2017.20170520.svn29741-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236978" version="1" comment="texlive-fontools-bin is &lt;2017.20170520.svn25997-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236979" version="1" comment="texlive-fontware-bin is &lt;2017.20170520.svn44143-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236980" version="1" comment="texlive-fragmaster-bin is &lt;2017.20170520.svn13663-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236981" version="1" comment="texlive-getmap-bin is &lt;2017.20170520.svn34971-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236982" version="1" comment="texlive-glossaries-bin is &lt;2017.20170520.svn37813-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236983" version="1" comment="texlive-gregoriotex-bin is &lt;2017.20170520.svn44143-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236984" version="1" comment="texlive-gsftopk-bin is &lt;2017.20170520.svn44143-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236985" version="1" comment="texlive-jadetex-bin is &lt;2017.20170520.svn3006-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236986" version="1" comment="texlive-kotex-utils-bin is &lt;2017.20170520.svn32101-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236987" version="1" comment="texlive-kpathsea-bin is &lt;2017.20170520.svn44143-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236988" version="1" comment="texlive-kpathsea-devel is &lt;6.2.3-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236989" version="1" comment="texlive-lacheck-bin is &lt;2017.20170520.svn44143-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236990" version="1" comment="texlive-latex-bin-bin is &lt;2017.20170520.svn14050-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236991" version="1" comment="texlive-latex-git-log-bin is &lt;2017.20170520.svn30983-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236992" version="1" comment="texlive-latex-papersize-bin is &lt;2017.20170520.svn42296-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236993" version="1" comment="texlive-latex2man-bin is &lt;2017.20170520.svn13663-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236994" version="1" comment="texlive-latex2nemeth-bin is &lt;2017.20170520.svn42300-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236995" version="1" comment="texlive-latexdiff-bin is &lt;2017.20170520.svn16420-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236996" version="1" comment="texlive-latexfileversion-bin is &lt;2017.20170520.svn25012-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236997" version="1" comment="texlive-latexindent-bin is &lt;2017.20170520.svn32150-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236998" version="1" comment="texlive-latexmk-bin is &lt;2017.20170520.svn10937-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236999" version="1" comment="texlive-latexpand-bin is &lt;2017.20170520.svn27025-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237000" version="1" comment="texlive-lcdftypetools-bin is &lt;2017.20170520.svn44143-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237001" version="1" comment="texlive-lilyglyphs-bin is &lt;2017.20170520.svn31696-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237002" version="1" comment="texlive-listbib-bin is &lt;2017.20170520.svn26126-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237003" version="1" comment="texlive-listings-ext-bin is &lt;2017.20170520.svn15093-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237004" version="1" comment="texlive-lollipop-bin is &lt;2017.20170520.svn41465-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237005" version="1" comment="texlive-ltxfileinfo-bin is &lt;2017.20170520.svn29005-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237006" version="1" comment="texlive-ltximg-bin is &lt;2017.20170520.svn32346-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237007" version="1" comment="texlive-lua2dox-bin is &lt;2017.20170520.svn29053-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237008" version="1" comment="texlive-luaotfload-bin is &lt;2017.20170520.svn34647-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237009" version="1" comment="texlive-luatex-bin is &lt;2017.20170520.svn44549-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237010" version="1" comment="texlive-lwarp-bin is &lt;2017.20170520.svn43292-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237011" version="1" comment="texlive-m-tx-bin is &lt;2017.20170520.svn44143-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237012" version="1" comment="texlive-make4ht-bin is &lt;2017.20170520.svn37750-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237013" version="1" comment="texlive-makedtx-bin is &lt;2017.20170520.svn38769-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237014" version="1" comment="texlive-makeindex-bin is &lt;2017.20170520.svn44143-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237015" version="1" comment="texlive-match_parens-bin is &lt;2017.20170520.svn23500-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237016" version="1" comment="texlive-mathspic-bin is &lt;2017.20170520.svn23661-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237017" version="1" comment="texlive-metafont-bin is &lt;2017.20170520.svn44143-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237018" version="1" comment="texlive-metapost-bin is &lt;2017.20170520.svn44143-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237019" version="1" comment="texlive-mex-bin is &lt;2017.20170520.svn3006-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237020" version="1" comment="texlive-mf2pt1-bin is &lt;2017.20170520.svn23406-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237021" version="1" comment="texlive-mflua-bin is &lt;2017.20170520.svn44143-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237022" version="1" comment="texlive-mfware-bin is &lt;2017.20170520.svn44143-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237023" version="1" comment="texlive-mkgrkindex-bin is &lt;2017.20170520.svn14428-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237024" version="1" comment="texlive-mkjobtexmf-bin is &lt;2017.20170520.svn8457-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237025" version="1" comment="texlive-mkpic-bin is &lt;2017.20170520.svn33688-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237026" version="1" comment="texlive-mltex-bin is &lt;2017.20170520.svn3006-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237027" version="1" comment="texlive-mptopdf-bin is &lt;2017.20170520.svn18674-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237028" version="1" comment="texlive-multibibliography-bin is &lt;2017.20170520.svn30534-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237029" version="1" comment="texlive-musixtex-bin is &lt;2017.20170520.svn37026-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237030" version="1" comment="texlive-musixtnt-bin is &lt;2017.20170520.svn44143-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237031" version="1" comment="texlive-omegaware-bin is &lt;2017.20170520.svn44143-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237032" version="1" comment="texlive-patgen-bin is &lt;2017.20170520.svn44143-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237033" version="1" comment="texlive-pax-bin is &lt;2017.20170520.svn10843-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237034" version="1" comment="texlive-pdfbook2-bin is &lt;2017.20170520.svn37537-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237035" version="1" comment="texlive-pdfcrop-bin is &lt;2017.20170520.svn14387-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237036" version="1" comment="texlive-pdfjam-bin is &lt;2017.20170520.svn17868-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237037" version="1" comment="texlive-pdflatexpicscale-bin is &lt;2017.20170520.svn41779-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237038" version="1" comment="texlive-pdftex-bin is &lt;2017.20170520.svn44143-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237039" version="1" comment="texlive-pdftools-bin is &lt;2017.20170520.svn44143-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237040" version="1" comment="texlive-pdfxup-bin is &lt;2017.20170520.svn40690-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237041" version="1" comment="texlive-pedigree-perl-bin is &lt;2017.20170520.svn25962-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237042" version="1" comment="texlive-perltex-bin is &lt;2017.20170520.svn16181-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237043" version="1" comment="texlive-petri-nets-bin is &lt;2017.20170520.svn39165-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237044" version="1" comment="texlive-pfarrei-bin is &lt;2017.20170520.svn29348-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237045" version="1" comment="texlive-pkfix-bin is &lt;2017.20170520.svn13364-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237046" version="1" comment="texlive-pkfix-helper-bin is &lt;2017.20170520.svn13663-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237047" version="1" comment="texlive-platex-bin is &lt;2017.20170520.svn22859-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237048" version="1" comment="texlive-pmx-bin is &lt;2017.20170520.svn44143-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237049" version="1" comment="texlive-pmxchords-bin is &lt;2017.20170520.svn32405-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237050" version="1" comment="texlive-ps2pk-bin is &lt;2017.20170520.svn44143-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237051" version="1" comment="texlive-pst-pdf-bin is &lt;2017.20170520.svn7838-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237052" version="1" comment="texlive-pst2pdf-bin is &lt;2017.20170520.svn29333-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237053" version="1" comment="texlive-pstools-bin is &lt;2017.20170520.svn44143-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237054" version="1" comment="texlive-ptex-bin is &lt;2017.20170520.svn44143-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237055" version="1" comment="texlive-ptex-fontmaps-bin is &lt;2017.20170520.svn44206-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237056" version="1" comment="texlive-ptex2pdf-bin is &lt;2017.20170520.svn29335-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237057" version="1" comment="texlive-ptexenc-devel is &lt;1.3.5-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237058" version="1" comment="texlive-purifyeps-bin is &lt;2017.20170520.svn13663-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237059" version="1" comment="texlive-pygmentex-bin is &lt;2017.20170520.svn34996-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237060" version="1" comment="texlive-pythontex-bin is &lt;2017.20170520.svn31638-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237061" version="1" comment="texlive-rubik-bin is &lt;2017.20170520.svn32919-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237062" version="1" comment="texlive-seetexk-bin is &lt;2017.20170520.svn44143-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237063" version="1" comment="texlive-splitindex-bin is &lt;2017.20170520.svn29688-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237064" version="1" comment="texlive-srcredact-bin is &lt;2017.20170520.svn38710-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237065" version="1" comment="texlive-sty2dtx-bin is &lt;2017.20170520.svn21215-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237066" version="1" comment="texlive-svn-multi-bin is &lt;2017.20170520.svn13663-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237067" version="1" comment="texlive-synctex-bin is &lt;2017.20170520.svn44143-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237068" version="1" comment="texlive-synctex-devel is &lt;1.18-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237069" version="1" comment="texlive-tetex-bin is &lt;2017.20170520.svn43957-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237070" version="1" comment="texlive-tex-bin is &lt;2017.20170520.svn44143-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237071" version="1" comment="texlive-tex4ebook-bin is &lt;2017.20170520.svn37771-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237072" version="1" comment="texlive-tex4ht-bin is &lt;2017.20170520.svn44143-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237073" version="1" comment="texlive-texconfig-bin is &lt;2017.20170520.svn29741-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237074" version="1" comment="texlive-texcount-bin is &lt;2017.20170520.svn13013-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237075" version="1" comment="texlive-texdef-bin is &lt;2017.20170520.svn21802-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237076" version="1" comment="texlive-texdiff-bin is &lt;2017.20170520.svn15506-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237077" version="1" comment="texlive-texdirflatten-bin is &lt;2017.20170520.svn12782-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237078" version="1" comment="texlive-texdoc-bin is &lt;2017.20170520.svn29741-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237079" version="1" comment="texlive-texfot-bin is &lt;2017.20170520.svn33155-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237080" version="1" comment="texlive-texliveonfly-bin is &lt;2017.20170520.svn24062-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237081" version="1" comment="texlive-texloganalyser-bin is &lt;2017.20170520.svn13663-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237082" version="1" comment="texlive-texlua-devel is &lt;5.2.4-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237083" version="1" comment="texlive-texluajit-devel is &lt;2.1.0beta2-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237084" version="1" comment="texlive-texosquery-bin is &lt;2017.20170520.svn43596-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237085" version="1" comment="texlive-texsis-bin is &lt;2017.20170520.svn3006-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237086" version="1" comment="texlive-texware-bin is &lt;2017.20170520.svn44143-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237087" version="1" comment="texlive-thumbpdf-bin is &lt;2017.20170520.svn6898-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237088" version="1" comment="texlive-tie-bin is &lt;2017.20170520.svn44143-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237089" version="1" comment="texlive-tpic2pdftex-bin is &lt;2017.20170520.svn29741-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237090" version="1" comment="texlive-ttfutils-bin is &lt;2017.20170520.svn44143-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237091" version="1" comment="texlive-typeoutfileinfo-bin is &lt;2017.20170520.svn25648-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237092" version="1" comment="texlive-ulqda-bin is &lt;2017.20170520.svn13663-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237093" version="1" comment="texlive-uplatex-bin is &lt;2017.20170520.svn26326-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237094" version="1" comment="texlive-uptex-bin is &lt;2017.20170520.svn44143-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237095" version="1" comment="texlive-urlbst-bin is &lt;2017.20170520.svn23262-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237096" version="1" comment="texlive-velthuis-bin is &lt;2017.20170520.svn44143-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237097" version="1" comment="texlive-vlna-bin is &lt;2017.20170520.svn44143-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237098" version="1" comment="texlive-vpe-bin is &lt;2017.20170520.svn6897-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237099" version="1" comment="texlive-web-bin is &lt;2017.20170520.svn44143-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237100" version="1" comment="texlive-xdvi-bin is &lt;2017.20170520.svn44143-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237101" version="1" comment="texlive-xetex-bin is &lt;2017.20170520.svn44361-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237102" version="1" comment="texlive-xmltex-bin is &lt;2017.20170520.svn3006-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237103" version="1" comment="texlive-yplan-bin is &lt;2017.20170520.svn34398-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246396" version="1" comment="liblouis-data is &lt;3.3.0-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246397" version="1" comment="liblouis-devel is &lt;3.3.0-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246398" version="1" comment="liblouis14 is &lt;3.3.0-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246399" version="1" comment="python3-louis is &lt;3.3.0-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230132" version="1" comment="libmodplug-devel is &lt;0.3.9-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230133" version="1" comment="libmodplug1 is &lt;0.3.9-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230135" version="1" comment="libopenmpt-devel is &lt;0.3.9-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230136" version="1" comment="libopenmpt0 is &lt;0.3.9-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230137" version="1" comment="libopenmpt_modplug1 is &lt;0.3.9-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246925" version="1" comment="libnetpbm-devel is &lt;10.80.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234747" version="1" comment="libpango-1_0-0-32bit is &lt;1.40.14-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251617" version="1" comment="libsoup-devel is &lt;2.62.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251618" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.62.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246394" version="1" comment="libtiff5-32bit is &lt;4.0.9-5.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255169" version="1" comment="libxcb-render0-32bit is &lt;1.13-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255170" version="1" comment="libxcb-shm0-32bit is &lt;1.13-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255171" version="1" comment="open-vm-tools-desktop is &lt;10.3.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251365" version="1" comment="python-tk is &lt;2.7.14-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255172" version="1" comment="texlive-latex-notes-zh-cn is &lt;2017.137.1.20svn15878-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255173" version="1" comment="texlive-latex-papersize is &lt;2017.137.1.62svn42296-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255174" version="1" comment="texlive-latex-referenz is &lt;2017.137.2svn36671-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255175" version="1" comment="texlive-latex-tabellen is &lt;2017.137.svn16979-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255176" version="1" comment="texlive-latex-tds is &lt;2017.137.svn40613-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255177" version="1" comment="texlive-latex-veryshortguide is &lt;2017.137.svn41844-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255178" version="1" comment="texlive-latex-web-companion is &lt;2017.137.svn29349-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255179" version="1" comment="texlive-latex2e-help-texinfo is &lt;2017.137.svn38709-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255180" version="1" comment="texlive-latex2e-help-texinfo-fr is &lt;2017.137.svn42541-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255181" version="1" comment="texlive-latex2e-help-texinfo-spanish is &lt;2017.137.svn37356-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255182" version="1" comment="texlive-latex2man is &lt;2017.137.1.25svn43855-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255183" version="1" comment="texlive-latex2nemeth is &lt;2017.137.1.0svn42300-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255184" version="1" comment="texlive-latex4wp is &lt;2017.137.1.0.10svn35999-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255185" version="1" comment="texlive-latex4wp-it is &lt;2017.137.1.0.10svn36000-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255186" version="1" comment="texlive-latexbangla is &lt;2017.137.0.0.2svn42409-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255187" version="1" comment="texlive-latexbug is &lt;2017.137.1.0asvn44566-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255188" version="1" comment="texlive-latexcheat is &lt;2017.137.1.13svn15878-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255189" version="1" comment="texlive-latexcheat-de is &lt;2017.137.svn35702-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255190" version="1" comment="texlive-latexcheat-esmx is &lt;2017.137.2.00svn36866-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255191" version="1" comment="texlive-latexcheat-ptbr is &lt;2017.137.1.13svn15878-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255192" version="1" comment="texlive-latexconfig is &lt;2017.137.svn40274-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255193" version="1" comment="texlive-latexcourse-rug is &lt;2017.137.1.1svn39026-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255194" version="1" comment="texlive-latexdemo is &lt;2017.137.0.0.1svn34481-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255195" version="1" comment="texlive-latexdiff is &lt;2017.137.1.2.0svn41892-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255196" version="1" comment="texlive-latexfileinfo-pkgs is &lt;2017.137.0.0.22svn26760-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255197" version="1" comment="texlive-latexfileversion is &lt;2017.137.0.0.3svn29349-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255198" version="1" comment="texlive-latexgit is &lt;2017.137.svn41920-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255199" version="1" comment="texlive-latexindent is &lt;2017.137.3.1svn44492-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255200" version="1" comment="texlive-latexmk is &lt;2017.137.4.52csvn43099-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255201" version="1" comment="texlive-latexmp is &lt;2017.137.1.2.1svn15878-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255202" version="1" comment="texlive-latexpand is &lt;2017.137.1.3svn41873-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255203" version="1" comment="texlive-lato is &lt;2017.137.2.2svn24986-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255204" version="1" comment="texlive-lato-fonts is &lt;2017.137.2.2svn24986-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255205" version="1" comment="texlive-layaureo is &lt;2017.137.0.0.2svn19087-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255206" version="1" comment="texlive-layouts is &lt;2017.137.2.6dsvn42428-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255207" version="1" comment="texlive-lazylist is &lt;2017.137.1.0asvn17691-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255208" version="1" comment="texlive-lcd is &lt;2017.137.0.0.3svn16549-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255209" version="1" comment="texlive-lcdftypetools is &lt;2017.137.svn44166-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255210" version="1" comment="texlive-lcg is &lt;2017.137.1.3svn31474-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255211" version="1" comment="texlive-lcyw is &lt;2017.137.1.1svn15878-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255212" version="1" comment="texlive-leading is &lt;2017.137.0.0.3svn15878-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255213" version="1" comment="texlive-leadsheets is &lt;2017.137.0.0.5asvn43034-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255214" version="1" comment="texlive-leaflet is &lt;2017.137.1.1bsvn43523-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255215" version="1" comment="texlive-lecturer is &lt;2017.137.svn23916-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255216" version="1" comment="texlive-ledmac is &lt;2017.137.0.0.19.4svn41811-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255217" version="1" comment="texlive-leftidx is &lt;2017.137.svn15878-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255218" version="1" comment="texlive-leipzig is &lt;2017.137.1.1svn34902-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255219" version="1" comment="texlive-lengthconvert is &lt;2017.137.1.0asvn30867-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255220" version="1" comment="texlive-lettre is &lt;2017.137.2.353svn35145-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255221" version="1" comment="texlive-lettrine is &lt;2017.137.1.9svn38268-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255222" version="1" comment="texlive-levy is &lt;2017.137.svn21750-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255223" version="1" comment="texlive-lewis is &lt;2017.137.0.0.1svn15878-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255224" version="1" comment="texlive-lexikon is &lt;2017.137.1.0csvn17364-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255225" version="1" comment="texlive-lexref is &lt;2017.137.1.1asvn36026-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255226" version="1" comment="texlive-lfb is &lt;2017.137.1.0svn15878-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255227" version="1" comment="texlive-lgreek is &lt;2017.137.svn21818-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255228" version="1" comment="texlive-lh is &lt;2017.137.3.5gsvn15878-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255229" version="1" comment="texlive-lhcyr is &lt;2017.137.svn31795-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255230" version="1" comment="texlive-lhelp is &lt;2017.137.2.0svn23638-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255231" version="1" comment="texlive-libertine is &lt;2017.137.5.3.0svn43603-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255232" version="1" comment="texlive-libertine-fonts is &lt;2017.137.5.3.0svn43603-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255233" version="1" comment="texlive-libertinegc is &lt;2017.137.1.00svn39746-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255234" version="1" comment="texlive-libertinus is &lt;2017.137.6.4svn44409-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255235" version="1" comment="texlive-libertinus-fonts is &lt;2017.137.6.4svn44409-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255236" version="1" comment="texlive-libertinust1math is &lt;2017.137.1.0.4svn44542-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255237" version="1" comment="texlive-libertinust1math-fonts is &lt;2017.137.1.0.4svn44542-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255238" version="1" comment="texlive-libgreek is &lt;2017.137.1.0svn27789-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255239" version="1" comment="texlive-librarian is &lt;2017.137.1.0svn19880-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255240" version="1" comment="texlive-librebaskerville is &lt;2017.137.svn31741-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255241" version="1" comment="texlive-librebaskerville-fonts is &lt;2017.137.svn31741-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255242" version="1" comment="texlive-librebodoni is &lt;2017.137.svn39375-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255243" version="1" comment="texlive-librebodoni-fonts is &lt;2017.137.svn39375-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255244" version="1" comment="texlive-librecaslon is &lt;2017.137.svn31929-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255245" version="1" comment="texlive-librecaslon-fonts is &lt;2017.137.svn31929-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255246" version="1" comment="texlive-libris is &lt;2017.137.1.007svn19409-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255247" version="1" comment="texlive-libris-fonts is &lt;2017.137.1.007svn19409-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255248" version="1" comment="texlive-lilyglyphs is &lt;2017.137.0.0.2.3svn33164-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255249" version="1" comment="texlive-lilyglyphs-fonts is &lt;2017.137.0.0.2.3svn33164-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255250" version="1" comment="texlive-limap is &lt;2017.137.2.1svn41390-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255251" version="1" comment="texlive-linearA is &lt;2017.137.svn15878-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255252" version="1" comment="texlive-linearA-fonts is &lt;2017.137.svn15878-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255253" version="1" comment="texlive-linegoal is &lt;2017.137.2.9svn21523-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255254" version="1" comment="texlive-lineno is &lt;2017.137.4.41svn21442-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255255" version="1" comment="texlive-ling-macros is &lt;2017.137.svn42268-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255256" version="1" comment="texlive-linguex is &lt;2017.137.4.3svn30815-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255257" version="1" comment="texlive-linop is &lt;2017.137.0.0.1svn41304-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255258" version="1" comment="texlive-lion-msc is &lt;2017.137.0.0.27svn44131-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255259" version="1" comment="texlive-lipsum is &lt;2017.137.1.3svn34800-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255260" version="1" comment="texlive-lisp-on-tex is &lt;2017.137.2.0svn38722-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255261" version="1" comment="texlive-listbib is &lt;2017.137.2.2svn29349-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255262" version="1" comment="texlive-listing is &lt;2017.137.1.2svn17373-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255263" version="1" comment="texlive-listings is &lt;2017.137.1.6svn37534-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255264" version="1" comment="texlive-listings-ext is &lt;2017.137.67svn29349-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255265" version="1" comment="texlive-listlbls is &lt;2017.137.1.03svn34893-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255266" version="1" comment="texlive-listliketab is &lt;2017.137.svn15878-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255267" version="1" comment="texlive-listofitems is &lt;2017.137.1.3svn42530-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255268" version="1" comment="texlive-listofsymbols is &lt;2017.137.0.0.2svn16134-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255269" version="1" comment="texlive-lithuanian is &lt;2017.137.svn22722-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255270" version="1" comment="texlive-liturg is &lt;2017.137.1.0svn15878-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255271" version="1" comment="texlive-lkproof is &lt;2017.137.3.1svn20021-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255272" version="1" comment="texlive-lm is &lt;2017.137.2.004svn28119-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255273" version="1" comment="texlive-lm-fonts is &lt;2017.137.2.004svn28119-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255274" version="1" comment="texlive-lm-math is &lt;2017.137.1.959svn36915-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255275" version="1" comment="texlive-lm-math-fonts is &lt;2017.137.1.959svn36915-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255276" version="1" comment="texlive-lmake is &lt;2017.137.1.0svn25552-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255277" version="1" comment="texlive-lni is &lt;2017.137.1.3svn44368-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255278" version="1" comment="texlive-lobster2 is &lt;2017.137.svn32617-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255279" version="1" comment="texlive-lobster2-fonts is &lt;2017.137.svn32617-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255280" version="1" comment="texlive-locality is &lt;2017.137.0.0.2svn20422-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255281" version="1" comment="texlive-localloc is &lt;2017.137.svn21934-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255282" version="1" comment="texlive-logbox is &lt;2017.137.1.0svn24499-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255283" version="1" comment="texlive-logical-markup-utils is &lt;2017.137.svn15878-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255284" version="1" comment="texlive-logicproof is &lt;2017.137.svn33254-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255285" version="1" comment="texlive-logicpuzzle is &lt;2017.137.2.5svn34491-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255286" version="1" comment="texlive-logpap is &lt;2017.137.0.0.6svn15878-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255287" version="1" comment="texlive-logreq is &lt;2017.137.1.0svn19640-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255288" version="1" comment="texlive-lollipop is &lt;2017.137.1.07svn41438-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255289" version="1" comment="texlive-longdivision is &lt;2017.137.1.0svn43159-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255290" version="1" comment="texlive-longfbox is &lt;2017.137.1.0svn39028-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255291" version="1" comment="texlive-longfigure is &lt;2017.137.1.0svn34302-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255292" version="1" comment="texlive-longnamefilelist is &lt;2017.137.0.0.2svn27889-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255293" version="1" comment="texlive-loops is &lt;2017.137.1.3svn30704-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255294" version="1" comment="texlive-lpform is &lt;2017.137.svn36918-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255295" version="1" comment="texlive-lpic is &lt;2017.137.0.0.8svn20843-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255296" version="1" comment="texlive-lplfitch is &lt;2017.137.0.0.9svn31077-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255297" version="1" comment="texlive-lps is &lt;2017.137.0.0.7svn21322-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255298" version="1" comment="texlive-lroundrect is &lt;2017.137.1.0svn39804-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255299" version="1" comment="texlive-lsc is &lt;2017.137.svn15878-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255300" version="1" comment="texlive-lshort-bulgarian is &lt;2017.137.svn15878-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255301" version="1" comment="texlive-lshort-chinese is &lt;2017.137.5.10svn43606-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255302" version="1" comment="texlive-lshort-czech is &lt;2017.137.4.27svn29803-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255303" version="1" comment="texlive-lshort-dutch is &lt;2017.137.1.3svn15878-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255304" version="1" comment="texlive-lshort-english is &lt;2017.137.5.0.5svn37892-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255305" version="1" comment="texlive-lshort-estonian is &lt;2017.137.5.05svn39323-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255306" version="1" comment="texlive-lshort-finnish is &lt;2017.137.svn15878-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255307" version="1" comment="texlive-lshort-french is &lt;2017.137.5.01fr_0svn23332-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255308" version="1" comment="texlive-lshort-german is &lt;2017.137.3.0bsvn42434-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255309" version="1" comment="texlive-ucthesis is &lt;2017.136.3.2svn15878-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255310" version="1" comment="texlive-udesoftec is &lt;2017.136.1.6.0svn44308-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255311" version="1" comment="texlive-uebungsblatt is &lt;2017.136.1.5.0svn15878-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255312" version="1" comment="texlive-uestcthesis is &lt;2017.136.1.1.0svn36371-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255313" version="1" comment="texlive-uhc is &lt;2017.136.svn16791-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255314" version="1" comment="texlive-uhc-fonts is &lt;2017.136.svn16791-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255315" version="1" comment="texlive-uhhassignment is &lt;2017.136.1.0svn44026-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255316" version="1" comment="texlive-uhrzeit is &lt;2017.136.0.0.2csvn39570-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255317" version="1" comment="texlive-uiucredborder is &lt;2017.136.1.00svn29974-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255318" version="1" comment="texlive-uiucthesis is &lt;2017.136.2.25svn15878-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255319" version="1" comment="texlive-ukrhyph is &lt;2017.136.svn21081-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255320" version="1" comment="texlive-ulem is &lt;2017.136.svn26785-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255321" version="1" comment="texlive-ulqda is &lt;2017.136.1.1svn26313-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255322" version="1" comment="texlive-ulthese is &lt;2017.136.4.4svn44456-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255323" version="1" comment="texlive-umbclegislation is &lt;2017.136.2016_6_8svn41348-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255324" version="1" comment="texlive-umich-thesis is &lt;2017.136.1.20svn15878-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255325" version="1" comment="texlive-uml is &lt;2017.136.0.0.11svn17476-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255326" version="1" comment="texlive-umlaute is &lt;2017.136.2.1svn15878-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255327" version="1" comment="texlive-umoline is &lt;2017.136.svn19085-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255328" version="1" comment="texlive-umthesis is &lt;2017.136.0.0.2svn15878-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255329" version="1" comment="texlive-umtypewriter is &lt;2017.136.001.002svn18651-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255330" version="1" comment="texlive-umtypewriter-fonts is &lt;2017.136.001.002svn18651-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255331" version="1" comment="texlive-unamth-template is &lt;2017.136.2.0svn33625-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255332" version="1" comment="texlive-unamthesis is &lt;2017.136.2.1svn43639-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255333" version="1" comment="texlive-undergradmath is &lt;2017.136.svn42926-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255334" version="1" comment="texlive-underlin is &lt;2017.136.1.01svn15878-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255335" version="1" comment="texlive-underoverlap is &lt;2017.136.0.0.0.1_r1svn29019-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255336" version="1" comment="texlive-underscore is &lt;2017.136.svn18261-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255337" version="1" comment="texlive-undolabl is &lt;2017.136.1.0lsvn36681-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255338" version="1" comment="texlive-unfonts-core is &lt;2017.136.svn44467-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255339" version="1" comment="texlive-unfonts-core-fonts is &lt;2017.136.svn44467-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255340" version="1" comment="texlive-unfonts-extra is &lt;2017.136.svn44465-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255341" version="1" comment="texlive-unfonts-extra-fonts is &lt;2017.136.svn44465-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255342" version="1" comment="texlive-uni-wtal-ger is &lt;2017.136.0.0.2svn31541-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255343" version="1" comment="texlive-uni-wtal-lin is &lt;2017.136.0.0.2svn31409-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255344" version="1" comment="texlive-unicode-bidi is &lt;2017.136.0.0.01svn42482-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255345" version="1" comment="texlive-unicode-data is &lt;2017.136.1.5svn41521-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255346" version="1" comment="texlive-unicode-math is &lt;2017.136.0.0.8dsvn43068-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255347" version="1" comment="texlive-unisugar is &lt;2017.136.0.0.92svn22357-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255348" version="1" comment="texlive-units is &lt;2017.136.0.0.9bsvn42428-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255349" version="1" comment="texlive-unitsdef is &lt;2017.136.0.0.2svn15878-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255350" version="1" comment="texlive-universa is &lt;2017.136.2.0svn15878-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255351" version="1" comment="texlive-universalis is &lt;2017.136.svn33860-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255352" version="1" comment="texlive-universalis-fonts is &lt;2017.136.svn33860-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255353" version="1" comment="texlive-unravel is &lt;2017.136.0.0.2svn38506-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255354" version="1" comment="texlive-unswcover is &lt;2017.136.1.0svn29476-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255355" version="1" comment="texlive-uothesis is &lt;2017.136.2.5.6svn25355-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255356" version="1" comment="texlive-uowthesis is &lt;2017.136.1.0asvn19700-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255357" version="1" comment="texlive-uowthesistitlepage is &lt;2017.136.2.0svn32626-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255358" version="1" comment="texlive-upca is &lt;2017.136.svn22511-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255359" version="1" comment="texlive-updmap-map is &lt;2017.136.svn43366-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255360" version="1" comment="texlive-uplatex is &lt;2017.136.svn44210-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255361" version="1" comment="texlive-upmethodology is &lt;2017.136.svn43453-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255362" version="1" comment="texlive-uppunctlm is &lt;2017.136.0.0.1svn42334-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255363" version="1" comment="texlive-upquote is &lt;2017.136.1.3svn26059-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255364" version="1" comment="texlive-uptex is &lt;2017.136.1.20svn42950-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255365" version="1" comment="texlive-uptex-base is &lt;2017.136.svn43900-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255366" version="1" comment="texlive-uptex-fonts is &lt;2017.136.svn42853-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255367" version="1" comment="texlive-urcls is &lt;2017.136.2.0svn43734-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255368" version="1" comment="texlive-uri is &lt;2017.136.1.0asvn21608-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255369" version="1" comment="texlive-url is &lt;2017.136.3.4svn32528-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255370" version="1" comment="texlive-urlbst is &lt;2017.136.0.0.7svn29803-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255371" version="1" comment="texlive-urwchancal is &lt;2017.136.1svn21701-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255372" version="1" comment="texlive-usebib is &lt;2017.136.1.0asvn25969-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255373" version="1" comment="texlive-ushort is &lt;2017.136.2.2svn32261-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255374" version="1" comment="texlive-uspace is &lt;2017.136.0.0.04svn42456-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255375" version="1" comment="texlive-uspatent is &lt;2017.136.1.0svn27744-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255376" version="1" comment="texlive-ut-thesis is &lt;2017.136.2.1svn38269-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255377" version="1" comment="texlive-utf8mex is &lt;2017.136.svn15878-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255378" version="1" comment="texlive-utopia is &lt;2017.136.svn15878-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255379" version="1" comment="texlive-utopia-fonts is &lt;2017.136.svn15878-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255380" version="1" comment="texlive-uwmslide is &lt;2017.136.svn27354-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255381" version="1" comment="texlive-uwthesis is &lt;2017.136.6.13svn15878-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255382" version="1" comment="texlive-vak is &lt;2017.136.svn23431-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255383" version="1" comment="texlive-vancouver is &lt;2017.136.svn34470-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255384" version="1" comment="texlive-variablelm is &lt;2017.136.1.1.1svn43686-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255385" version="1" comment="texlive-variations is &lt;2017.136.0.0.3svn15878-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255386" version="1" comment="texlive-varindex is &lt;2017.136.2.3svn32262-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255387" version="1" comment="texlive-varisize is &lt;2017.136.svn15878-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255388" version="1" comment="texlive-varsfromjobname is &lt;2017.136.1.0svn44154-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255389" version="1" comment="texlive-varwidth is &lt;2017.136.0.0.92svn24104-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255390" version="1" comment="texlive-vaucanson-g is &lt;2017.136.0.0.4svn15878-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255391" version="1" comment="texlive-vdmlisting is &lt;2017.136.1.0svn29944-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255392" version="1" comment="texlive-velthuis is &lt;2017.136.2.17svn44166-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255393" version="1" comment="texlive-velthuis-fonts is &lt;2017.136.2.17svn44166-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255394" version="1" comment="texlive-venn is &lt;2017.136.svn15878-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255395" version="1" comment="texlive-venndiagram is &lt;2017.136.1.1svn40058-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255396" version="1" comment="texlive-venturisadf is &lt;2017.136.1.005svn19444-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255397" version="1" comment="texlive-venturisadf-fonts is &lt;2017.136.1.005svn19444-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255398" version="1" comment="texlive-verbasef is &lt;2017.136.1.1svn21922-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255399" version="1" comment="texlive-verbatimbox is &lt;2017.136.3.13svn33197-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255400" version="1" comment="texlive-verbatimcopy is &lt;2017.136.0.0.06svn15878-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255401" version="1" comment="texlive-verbdef is &lt;2017.136.0.0.2svn17177-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255402" version="1" comment="texlive-verbments is &lt;2017.136.1.2svn23670-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255403" version="1" comment="texlive-verse is &lt;2017.136.2.4bsvn34017-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255404" version="1" comment="texlive-version is &lt;2017.136.2.0svn21920-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255405" version="1" comment="texlive-versions is &lt;2017.136.0.0.55svn21921-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255406" version="1" comment="texlive-versonotes is &lt;2017.136.0.0.3svn39084-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255407" version="1" comment="texlive-vertbars is &lt;2017.136.1.0bsvn20589-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255408" version="1" comment="texlive-vgrid is &lt;2017.136.0.0.1svn32457-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255409" version="1" comment="texlive-vhistory is &lt;2017.136.1.6.1svn30080-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255410" version="1" comment="texlive-visualfaq is &lt;2017.136.svn38647-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255411" version="1" comment="texlive-visualpstricks is &lt;2017.136.2.3svn39799-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255412" version="1" comment="texlive-visualtikz is &lt;2017.136.0.0.64svn43239-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255413" version="1" comment="texlive-vlna is &lt;2017.136.svn44166-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255414" version="1" comment="texlive-vmargin is &lt;2017.136.2.5svn15878-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255415" version="1" comment="texlive-vntex is &lt;2017.136.3.2svn30579-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255416" version="1" comment="texlive-vntex-fonts is &lt;2017.136.3.2svn30579-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255417" version="1" comment="texlive-vocaltract is &lt;2017.136.1svn25629-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255418" version="1" comment="texlive-volumes is &lt;2017.136.1.0svn15878-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255419" version="1" comment="texlive-voss-mathcol is &lt;2017.136.0.0.1svn32954-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255420" version="1" comment="texlive-vpe is &lt;2017.136.0.0.2svn26039-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255421" version="1" comment="texlive-vruler is &lt;2017.136.2.3svn21598-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255422" version="1" comment="texlive-vwcol is &lt;2017.136.0.0.2svn36254-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255423" version="1" comment="texlive-wadalab is &lt;2017.136.svn42428-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255424" version="1" comment="texlive-wadalab-fonts is &lt;2017.136.svn42428-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255425" version="1" comment="texlive-wallpaper is &lt;2017.136.1.10svn15878-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255426" version="1" comment="texlive-warning is &lt;2017.136.0.0.01svn22028-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255427" version="1" comment="texlive-warpcol is &lt;2017.136.1.0csvn15878-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255428" version="1" comment="texlive-was is &lt;2017.136.svn21439-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255429" version="1" comment="texlive-wasy is &lt;2017.136.svn35831-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255430" version="1" comment="texlive-wasy2-ps is &lt;2017.136.svn35830-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255431" version="1" comment="texlive-wasy2-ps-fonts is &lt;2017.136.svn35830-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255432" version="1" comment="texlive-wasysym is &lt;2017.136.2.0svn15878-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255433" version="1" comment="texlive-web is &lt;2017.136.4.5svn44166-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255434" version="1" comment="texlive-webguide is &lt;2017.136.svn25813-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255435" version="1" comment="texlive-widetable is &lt;2017.136.1.1svn16082-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255436" version="1" comment="texlive-williams is &lt;2017.136.svn15878-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255437" version="1" comment="texlive-withargs is &lt;2017.136.0.0.2.0svn42756-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255438" version="1" comment="texlive-wnri is &lt;2017.136.svn22459-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255439" version="1" comment="texlive-wnri-latex is &lt;2017.136.1.0bsvn22338-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255440" version="1" comment="texlive-wordcount is &lt;2017.136.1.7svn41381-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255441" version="1" comment="texlive-wordlike is &lt;2017.136.1.2bsvn15878-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255442" version="1" comment="texlive-wrapfig is &lt;2017.136.3.6svn22048-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255443" version="1" comment="texlive-wsemclassic is &lt;2017.136.1.0.1svn31532-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252850" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.24.1-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252851" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.24.1-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252852" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.24.1-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252853" version="1" comment="webkit2gtk3-devel is &lt;2.24.1-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255444" version="1" comment="vino is &lt;3.22.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255445" version="1" comment="vino-lang is &lt;3.22.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246319" version="1" comment="wavpack is &lt;5.1.0-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246321" version="1" comment="wavpack-devel is &lt;5.1.0-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252151" version="1" comment="wireshark-devel is &lt;2.4.14-3.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252152" version="1" comment="wireshark-ui-qt is &lt;2.4.14-3.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228620" version="1" comment="FastCGI is &lt;2.4.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228621" version="1" comment="FastCGI-devel is &lt;2.4.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228622" version="1" comment="libfcgi0 is &lt;2.4.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228623" version="1" comment="perl-FastCGI is &lt;2.4.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228624" version="1" comment="sle-module-development-tools-release is ==15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228625" version="1" comment="aaa_base-malloccheck is &lt;84.87+git20180409.04c9dae-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228626" version="1" comment="ant is &lt;1.9.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228627" version="1" comment="ant-antlr is &lt;1.9.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228628" version="1" comment="ant-apache-bcel is &lt;1.9.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228629" version="1" comment="ant-apache-bsf is &lt;1.9.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228630" version="1" comment="ant-apache-log4j is &lt;1.9.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228631" version="1" comment="ant-apache-oro is &lt;1.9.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228632" version="1" comment="ant-apache-regexp is &lt;1.9.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228633" version="1" comment="ant-apache-resolver is &lt;1.9.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228634" version="1" comment="ant-commons-logging is &lt;1.9.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228635" version="1" comment="ant-javamail is &lt;1.9.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228636" version="1" comment="ant-jdepend is &lt;1.9.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228637" version="1" comment="ant-jmf is &lt;1.9.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228638" version="1" comment="ant-junit is &lt;1.9.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228639" version="1" comment="ant-manual is &lt;1.9.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228640" version="1" comment="ant-scripts is &lt;1.9.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228641" version="1" comment="ant-swing is &lt;1.9.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009216409" version="1" comment="apache-pdfbox is &lt;1.8.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228642" version="1" comment="binutils-devel-32bit is &lt;2.29.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228643" version="1" comment="bsdtar is &lt;3.3.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228644" version="1" comment="bsh2 is &lt;2.0.0.b6-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228645" version="1" comment="bsh2-classgen is &lt;2.0.0.b6-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228646" version="1" comment="bsh2-javadoc is &lt;2.0.0.b6-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228647" version="1" comment="build is &lt;20180329-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228648" version="1" comment="build-mkbaselibs is &lt;20180329-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228649" version="1" comment="checkbashisms is &lt;2.15.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228650" version="1" comment="crash is &lt;7.2.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228651" version="1" comment="crash-devel is &lt;7.2.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228652" version="1" comment="crash-kmp-default is &lt;7.2.1_k4.12.14_23-1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228653" version="1" comment="ctags is &lt;5.8-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228654" version="1" comment="cups-ddk is &lt;2.2.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228655" version="1" comment="cvs is &lt;1.12.12-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228656" version="1" comment="dpkg is &lt;1.19.0.4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228657" version="1" comment="dpkg-devel is &lt;1.19.0.4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228658" version="1" comment="git is &lt;2.16.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228659" version="1" comment="git-arch is &lt;2.16.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228660" version="1" comment="git-cvs is &lt;2.16.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228661" version="1" comment="git-daemon is &lt;2.16.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228662" version="1" comment="git-doc is &lt;2.16.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228663" version="1" comment="git-email is &lt;2.16.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228664" version="1" comment="git-gui is &lt;2.16.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228665" version="1" comment="git-svn is &lt;2.16.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228666" version="1" comment="git-web is &lt;2.16.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228667" version="1" comment="gitk is &lt;2.16.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228668" version="1" comment="glibc-devel-32bit is &lt;2.26-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228669" version="1" comment="glibc-devel-static is &lt;2.26-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228670" version="1" comment="glibc-utils is &lt;2.26-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228671" version="1" comment="guile is &lt;2.0.14-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228672" version="1" comment="guile-devel is &lt;2.0.14-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228673" version="1" comment="guile-modules-2_0 is &lt;2.0.14-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228674" version="1" comment="libguile-2_0-22 is &lt;2.0.14-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228675" version="1" comment="libguilereadline-v-18-18 is &lt;2.0.14-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228676" version="1" comment="jython is &lt;2.2.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228677" version="1" comment="kernel-docs is &lt;4.12.14-23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228678" version="1" comment="kernel-obs-build is &lt;4.12.14-23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228679" version="1" comment="kernel-source is &lt;4.12.14-23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228680" version="1" comment="kernel-syms is &lt;4.12.14-23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228681" version="1" comment="kernel-vanilla-base is &lt;4.12.14-23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228682" version="1" comment="libgit2-26 is &lt;0.26.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228683" version="1" comment="libgit2-devel is &lt;0.26.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228684" version="1" comment="libpcp-devel is &lt;3.11.9-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228685" version="1" comment="libpcp3 is &lt;3.11.9-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228686" version="1" comment="libpcp_gui2 is &lt;3.11.9-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228687" version="1" comment="libpcp_import1 is &lt;3.11.9-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228688" version="1" comment="libpcp_mmv1 is &lt;3.11.9-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228689" version="1" comment="libpcp_trace2 is &lt;3.11.9-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228690" version="1" comment="libpcp_web1 is &lt;3.11.9-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228691" version="1" comment="pcp is &lt;3.11.9-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228692" version="1" comment="pcp-conf is &lt;3.11.9-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228693" version="1" comment="pcp-devel is &lt;3.11.9-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228694" version="1" comment="pcp-doc is &lt;3.11.9-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228695" version="1" comment="pcp-import-iostat2pcp is &lt;3.11.9-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228696" version="1" comment="pcp-import-mrtg2pcp is &lt;3.11.9-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228697" version="1" comment="pcp-import-sar2pcp is &lt;3.11.9-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228698" version="1" comment="perl-PCP-LogImport is &lt;3.11.9-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228699" version="1" comment="perl-PCP-LogSummary is &lt;3.11.9-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228700" version="1" comment="perl-PCP-MMV is &lt;3.11.9-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228701" version="1" comment="perl-PCP-PMDA is &lt;3.11.9-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228702" version="1" comment="python-pcp is &lt;3.11.9-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228703" version="1" comment="libtidy-devel is &lt;5.4.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228704" version="1" comment="libtidy5 is &lt;5.4.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228705" version="1" comment="tidy is &lt;5.4.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228706" version="1" comment="libtool-32bit is &lt;2.4.6-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228707" version="1" comment="mercurial is &lt;4.5.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228708" version="1" comment="nasm is &lt;2.13.02-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228709" version="1" comment="ocaml is &lt;4.05.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228710" version="1" comment="ocaml-compiler-libs is &lt;4.05.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228711" version="1" comment="ocaml-compiler-libs-devel is &lt;4.05.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228712" version="1" comment="ocaml-rpm-macros is &lt;4.05.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228713" version="1" comment="ocaml-runtime is &lt;4.05.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228714" version="1" comment="ocaml-libguestfs-devel is &lt;1.38.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228715" version="1" comment="openldap2-devel-32bit is &lt;2.4.46-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228716" version="1" comment="pam-devel-32bit is &lt;1.3.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228718" version="1" comment="perl-Archive-Extract is &lt;0.80-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228719" version="1" comment="perl-ExtUtils-MakeMaker is &lt;7.30-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228720" version="1" comment="perl-Module-Load-Conditional is &lt;0.68-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228721" version="1" comment="perl-Config-IniFiles is &lt;2.94-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228722" version="1" comment="perl-DNS-LDNS is &lt;1.7.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228723" version="1" comment="perl-Net-Libproxy is &lt;0.4.15-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228724" version="1" comment="perl-PerlMagick is &lt;7.0.7.34-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228725" version="1" comment="perl-Tk-devel is &lt;804.034-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228726" version="1" comment="perl-YAML-LibYAML is &lt;0.59-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228727" version="1" comment="perl-doc is &lt;5.26.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228728" version="1" comment="python3-tools is &lt;3.6.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228729" version="1" comment="subversion-bash-completion is &lt;1.10.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228730" version="1" comment="subversion-perl is &lt;1.10.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228731" version="1" comment="subversion-python is &lt;1.10.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228732" version="1" comment="subversion-tools is &lt;1.10.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228733" version="1" comment="systemtap is &lt;3.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228734" version="1" comment="systemtap-runtime is &lt;3.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228735" version="1" comment="systemtap-sdt-devel is &lt;3.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228736" version="1" comment="systemtap-server is &lt;3.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228737" version="1" comment="xorg-x11-server-sdk is &lt;1.19.6-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228738" version="1" comment="zlib-devel-32bit is &lt;1.2.11-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255446" version="1" comment="sle-module-development-tools-release is ==15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255447" version="1" comment="aaa_base-malloccheck is &lt;84.87+git20180409.04c9dae-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235366" version="1" comment="ant is &lt;1.9.10-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235377" version="1" comment="ant-jmf is &lt;1.9.10-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235380" version="1" comment="ant-scripts is &lt;1.9.10-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235381" version="1" comment="ant-swing is &lt;1.9.10-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235367" version="1" comment="ant-antlr is &lt;1.9.10-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235368" version="1" comment="ant-apache-bcel is &lt;1.9.10-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235369" version="1" comment="ant-apache-bsf is &lt;1.9.10-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235370" version="1" comment="ant-apache-log4j is &lt;1.9.10-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235371" version="1" comment="ant-apache-oro is &lt;1.9.10-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235372" version="1" comment="ant-apache-regexp is &lt;1.9.10-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235373" version="1" comment="ant-apache-resolver is &lt;1.9.10-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235374" version="1" comment="ant-commons-logging is &lt;1.9.10-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235375" version="1" comment="ant-javamail is &lt;1.9.10-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235376" version="1" comment="ant-jdepend is &lt;1.9.10-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235378" version="1" comment="ant-junit is &lt;1.9.10-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235379" version="1" comment="ant-manual is &lt;1.9.10-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239143" version="1" comment="apache-pdfbox is &lt;1.8.12-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255448" version="1" comment="binutils-devel-32bit is &lt;2.31-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247195" version="1" comment="blktrace is &lt;1.1.0+git.20170126-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246708" version="1" comment="bsdtar is &lt;3.3.2-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244260" version="1" comment="build is &lt;20190128-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244261" version="1" comment="build-mkbaselibs is &lt;20190128-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255449" version="1" comment="cargo is &lt;1.33.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255450" version="1" comment="clippy is &lt;1.33.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255451" version="1" comment="rls is &lt;1.33.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255452" version="1" comment="rust is &lt;1.33.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255453" version="1" comment="rust-analysis is &lt;1.33.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255454" version="1" comment="rust-src is &lt;1.33.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255455" version="1" comment="rust-std-static is &lt;1.33.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255456" version="1" comment="rustfmt is &lt;1.33.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255457" version="1" comment="crash is &lt;7.2.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255458" version="1" comment="crash-devel is &lt;7.2.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255459" version="1" comment="crash-kmp-default is &lt;7.2.1_k4.12.14_195-7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252156" version="1" comment="cups-ddk is &lt;2.2.7-3.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242041" version="1" comment="git is &lt;2.16.4-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242047" version="1" comment="git-arch is &lt;2.16.4-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242048" version="1" comment="git-cvs is &lt;2.16.4-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242049" version="1" comment="git-daemon is &lt;2.16.4-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242050" version="1" comment="git-doc is &lt;2.16.4-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242051" version="1" comment="git-email is &lt;2.16.4-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242052" version="1" comment="git-gui is &lt;2.16.4-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242053" version="1" comment="git-svn is &lt;2.16.4-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242054" version="1" comment="git-web is &lt;2.16.4-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242055" version="1" comment="gitk is &lt;2.16.4-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255460" version="1" comment="glibc-devel-32bit is &lt;2.26-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247192" version="1" comment="glibc-devel-static is &lt;2.26-13.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247193" version="1" comment="glibc-utils is &lt;2.26-13.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255461" version="1" comment="guile is &lt;2.0.14-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255462" version="1" comment="guile-devel is &lt;2.0.14-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255463" version="1" comment="guile-modules-2_0 is &lt;2.0.14-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255464" version="1" comment="libguile-2_0-22 is &lt;2.0.14-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255465" version="1" comment="libguilereadline-v-18-18 is &lt;2.0.14-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255466" version="1" comment="kernel-docs is &lt;4.12.14-195" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255467" version="1" comment="kernel-obs-build is &lt;4.12.14-195" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255468" version="1" comment="kernel-source is &lt;4.12.14-195" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255469" version="1" comment="kernel-syms is &lt;4.12.14-195" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241276" version="1" comment="libgit2-26 is &lt;0.26.8-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241277" version="1" comment="libgit2-devel is &lt;0.26.8-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241127" version="1" comment="ncurses-devel-32bit is &lt;6.1-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255470" version="1" comment="ocaml-ocamldoc is &lt;4.05.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255471" version="1" comment="openldap2-devel-32bit is &lt;2.4.46-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255472" version="1" comment="osc is &lt;0.165.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240925" version="1" comment="pam-devel-32bit is &lt;1.3.0-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255473" version="1" comment="perl-Mail-SpamAssassin-Plugin-iXhash2 is &lt;2.05-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251794" version="1" comment="perl-PerlMagick is &lt;7.0.7.34-3.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242046" version="1" comment="perl-doc is &lt;5.26.1-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251366" version="1" comment="python3-tools is &lt;3.6.5-3.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255474" version="1" comment="rpm-build is &lt;4.14.1-10.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243350" version="1" comment="subversion-bash-completion is &lt;1.10.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243351" version="1" comment="subversion-perl is &lt;1.10.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243352" version="1" comment="subversion-python is &lt;1.10.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243353" version="1" comment="subversion-tools is &lt;1.10.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255475" version="1" comment="systemtap is &lt;3.2-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255476" version="1" comment="systemtap-runtime is &lt;3.2-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255477" version="1" comment="systemtap-sdt-devel is &lt;3.2-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255478" version="1" comment="systemtap-server is &lt;3.2-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255479" version="1" comment="xorg-x11-server-sdk is &lt;1.20.3-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255480" version="1" comment="zlib-devel-32bit is &lt;1.2.11-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228739" version="1" comment="libpmi0 is &lt;17.11.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228740" version="1" comment="libslurm32 is &lt;17.11.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228741" version="1" comment="perl-slurm is &lt;17.11.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228742" version="1" comment="slurm is &lt;17.11.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228743" version="1" comment="slurm-auth-none is &lt;17.11.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228744" version="1" comment="slurm-config is &lt;17.11.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228745" version="1" comment="slurm-devel is &lt;17.11.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228746" version="1" comment="slurm-doc is &lt;17.11.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228747" version="1" comment="slurm-lua is &lt;17.11.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228748" version="1" comment="slurm-munge is &lt;17.11.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228749" version="1" comment="slurm-node is &lt;17.11.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228750" version="1" comment="slurm-pam_slurm is &lt;17.11.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228751" version="1" comment="slurm-plugins is &lt;17.11.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228752" version="1" comment="slurm-slurmdbd is &lt;17.11.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228753" version="1" comment="slurm-sql is &lt;17.11.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228754" version="1" comment="slurm-torque is &lt;17.11.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228755" version="1" comment="sle-module-hpc-release is ==15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228756" version="1" comment="python2-numpy-gnu-hpc is &lt;1.14.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228757" version="1" comment="python2-numpy-gnu-hpc-devel is &lt;1.14.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228758" version="1" comment="python2-numpy_1_14_0-gnu-hpc is &lt;1.14.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228759" version="1" comment="python2-numpy_1_14_0-gnu-hpc-devel is &lt;1.14.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228760" version="1" comment="python3-numpy-gnu-hpc is &lt;1.14.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228761" version="1" comment="python3-numpy-gnu-hpc-devel is &lt;1.14.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228762" version="1" comment="python3-numpy_1_14_0-gnu-hpc is &lt;1.14.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228763" version="1" comment="python3-numpy_1_14_0-gnu-hpc-devel is &lt;1.14.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255481" version="1" comment="libpmi0 is &lt;18.08.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251238" version="1" comment="libslurm32 is &lt;17.11.13-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255482" version="1" comment="libslurm33 is &lt;18.08.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255483" version="1" comment="perl-slurm is &lt;18.08.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255484" version="1" comment="slurm is &lt;18.08.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255485" version="1" comment="slurm-auth-none is &lt;18.08.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255486" version="1" comment="slurm-config is &lt;18.08.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255487" version="1" comment="slurm-config-man is &lt;18.08.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255488" version="1" comment="slurm-devel is &lt;18.08.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255489" version="1" comment="slurm-doc is &lt;18.08.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255490" version="1" comment="slurm-lua is &lt;18.08.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255491" version="1" comment="slurm-munge is &lt;18.08.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255492" version="1" comment="slurm-node is &lt;18.08.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255493" version="1" comment="slurm-pam_slurm is &lt;18.08.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255494" version="1" comment="slurm-plugins is &lt;18.08.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255495" version="1" comment="slurm-slurmdbd is &lt;18.08.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255496" version="1" comment="slurm-sql is &lt;18.08.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255497" version="1" comment="slurm-torque is &lt;18.08.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255498" version="1" comment="sle-module-hpc-release is ==15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244425" version="1" comment="python2-numpy-gnu-hpc is &lt;1.14.0-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244426" version="1" comment="python2-numpy-gnu-hpc-devel is &lt;1.14.0-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244427" version="1" comment="python2-numpy_1_14_0-gnu-hpc is &lt;1.14.0-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244428" version="1" comment="python2-numpy_1_14_0-gnu-hpc-devel is &lt;1.14.0-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244429" version="1" comment="python3-numpy-gnu-hpc is &lt;1.14.0-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244430" version="1" comment="python3-numpy-gnu-hpc-devel is &lt;1.14.0-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244431" version="1" comment="python3-numpy_1_14_0-gnu-hpc is &lt;1.14.0-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244432" version="1" comment="python3-numpy_1_14_0-gnu-hpc-devel is &lt;1.14.0-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181266" version="1" comment="gv is &lt;3.7.4-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228764" version="1" comment="sle-module-legacy-release is ==15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228765" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.11-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228766" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr5.11-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228767" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.11-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228768" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr5.11-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228769" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.161-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228770" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.161-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228771" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.161-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228772" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.161-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228773" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2n-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228774" version="1" comment="libopenssl1_0_0 is &lt;1.0.2n-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228775" version="1" comment="openssl-1_0_0 is &lt;1.0.2n-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228776" version="1" comment="ntp is &lt;4.2.8p11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228777" version="1" comment="openldap2 is &lt;2.4.46-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228778" version="1" comment="openldap2-back-meta is &lt;2.4.46-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228779" version="1" comment="openldap2-back-perl is &lt;2.4.46-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228780" version="1" comment="osc is &lt;0.162.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228781" version="1" comment="pam-modules is &lt;12.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228782" version="1" comment="pam-modules-32bit is &lt;12.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228783" version="1" comment="reiserfs-kmp-default is &lt;4.12.14-23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255499" version="1" comment="sle-module-legacy-release is ==15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230780" version="1" comment="java-10-openjdk is &lt;10.0.2.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230781" version="1" comment="java-10-openjdk-demo is &lt;10.0.2.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230782" version="1" comment="java-10-openjdk-devel is &lt;10.0.2.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230783" version="1" comment="java-10-openjdk-headless is &lt;10.0.2.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245774" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.30-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245775" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr5.30-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245776" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.30-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245777" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr5.30-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245638" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.201-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245642" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.201-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245643" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.201-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245644" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.201-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241135" version="1" comment="libncurses5 is &lt;6.1-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241136" version="1" comment="libncurses5-32bit is &lt;6.1-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241137" version="1" comment="ncurses5-devel is &lt;6.1-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245778" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2p-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245779" version="1" comment="libopenssl1_0_0 is &lt;1.0.2p-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245771" version="1" comment="openssl-1_0_0 is &lt;1.0.2p-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246326" version="1" comment="ntp is &lt;4.2.8p13-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255500" version="1" comment="openldap2 is &lt;2.4.46-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255501" version="1" comment="openldap2-back-meta is &lt;2.4.46-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255502" version="1" comment="openldap2-back-perl is &lt;2.4.46-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255503" version="1" comment="reiserfs-kmp-default is &lt;4.12.14-195" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228784" version="1" comment="kernel-default-livepatch is &lt;4.12.14-23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228785" version="1" comment="sle-module-live-patching-release is ==15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228786" version="1" comment="apache2-mod_wsgi is &lt;4.5.18-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228787" version="1" comment="apache2-mod_wsgi-python3 is &lt;4.5.18-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228788" version="1" comment="sle-module-public-cloud-release is ==15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228789" version="1" comment="python3-keystoneclient is &lt;3.15.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228790" version="1" comment="python3-paramiko is &lt;2.4.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255504" version="1" comment="sle-module-public-cloud-release is ==15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255505" version="1" comment="aws-cli is &lt;1.16.61-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255506" version="1" comment="rmt-server-pubcloud is &lt;1.2.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228791" version="1" comment="clamsap is &lt;0.99.25-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228792" version="1" comment="sle-module-sap-applications-release is ==15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255507" version="1" comment="sle-module-sap-applications-release is ==15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228793" version="1" comment="389-ds is &lt;1.4.0.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228794" version="1" comment="389-ds-devel is &lt;1.4.0.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228795" version="1" comment="sle-module-server-applications-release is ==15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228796" version="1" comment="apache2 is &lt;2.4.33-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228797" version="1" comment="apache2-devel is &lt;2.4.33-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228798" version="1" comment="apache2-doc is &lt;2.4.33-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228799" version="1" comment="apache2-prefork is &lt;2.4.33-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228800" version="1" comment="apache2-utils is &lt;2.4.33-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228801" version="1" comment="apache2-worker is &lt;2.4.33-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228802" version="1" comment="apache2-mod_apparmor is &lt;2.12-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228803" version="1" comment="apache2-mod_jk is &lt;1.2.43-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228804" version="1" comment="apache2-mod_nss is &lt;1.0.17-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228805" version="1" comment="apache2-mod_security2 is &lt;2.9.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228806" version="1" comment="bind is &lt;9.11.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228807" version="1" comment="bind-chrootenv is &lt;9.11.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228808" version="1" comment="bind-doc is &lt;9.11.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228809" version="1" comment="cyrus-sasl-sqlauxprop is &lt;2.1.26-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228810" version="1" comment="davfs2 is &lt;1.5.4-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228811" version="1" comment="dhcp-relay is &lt;4.3.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228812" version="1" comment="dhcp-server is &lt;4.3.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228813" version="1" comment="dovecot23 is &lt;2.3.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228814" version="1" comment="dovecot23-backend-mysql is &lt;2.3.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228815" version="1" comment="dovecot23-backend-pgsql is &lt;2.3.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228816" version="1" comment="dovecot23-backend-sqlite is &lt;2.3.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228817" version="1" comment="dovecot23-devel is &lt;2.3.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228818" version="1" comment="dovecot23-fts is &lt;2.3.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228819" version="1" comment="dovecot23-fts-lucene is &lt;2.3.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228820" version="1" comment="dovecot23-fts-solr is &lt;2.3.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228821" version="1" comment="dovecot23-fts-squat is &lt;2.3.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228822" version="1" comment="dpdk is &lt;17.11.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228823" version="1" comment="dpdk-devel is &lt;17.11.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228824" version="1" comment="dpdk-kmp-default is &lt;17.11.2_k4.12.14_23-1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228825" version="1" comment="dpdk-tools is &lt;17.11.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228826" version="1" comment="libdpdk-17_11-0 is &lt;17.11.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228827" version="1" comment="freeradius-server is &lt;3.0.16-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228828" version="1" comment="freeradius-server-devel is &lt;3.0.16-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228829" version="1" comment="freeradius-server-krb5 is &lt;3.0.16-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228830" version="1" comment="freeradius-server-ldap is &lt;3.0.16-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228831" version="1" comment="freeradius-server-libs is &lt;3.0.16-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228832" version="1" comment="freeradius-server-mysql is &lt;3.0.16-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228833" version="1" comment="freeradius-server-perl is &lt;3.0.16-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228834" version="1" comment="freeradius-server-postgresql is &lt;3.0.16-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228835" version="1" comment="freeradius-server-python is &lt;3.0.16-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228836" version="1" comment="freeradius-server-sqlite is &lt;3.0.16-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228837" version="1" comment="freeradius-server-utils is &lt;3.0.16-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228838" version="1" comment="gnuplot is &lt;5.2.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228839" version="1" comment="gnuplot-doc is &lt;5.2.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228840" version="1" comment="grub2-x86_64-xen is &lt;2.02-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228841" version="1" comment="gtk-vnc-devel is &lt;0.7.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228842" version="1" comment="libgvncpulse-1_0-0 is &lt;0.7.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228843" version="1" comment="typelib-1_0-GVnc-1_0 is &lt;0.7.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228844" version="1" comment="typelib-1_0-GVncPulse-1_0 is &lt;0.7.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228845" version="1" comment="typelib-1_0-GtkVnc-1_0 is &lt;0.7.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228846" version="1" comment="typelib-1_0-GtkVnc-2_0 is &lt;0.7.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228847" version="1" comment="guestfs-data is &lt;1.38.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228848" version="1" comment="guestfs-tools is &lt;1.38.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228849" version="1" comment="guestfs-winsupport is &lt;1.38.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228850" version="1" comment="guestfsd is &lt;1.38.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228851" version="1" comment="libguestfs-devel is &lt;1.38.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228852" version="1" comment="libguestfs0 is &lt;1.38.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228853" version="1" comment="perl-Sys-Guestfs is &lt;1.38.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228854" version="1" comment="python3-libguestfs is &lt;1.38.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228855" version="1" comment="virt-v2v is &lt;1.38.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228856" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.15.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228857" version="1" comment="krb5-server is &lt;1.15.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228858" version="1" comment="libapr-util1-dbd-mysql is &lt;1.6.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228859" version="1" comment="libapr-util1-dbd-pgsql is &lt;1.6.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228860" version="1" comment="libapr-util1-dbd-sqlite3 is &lt;1.6.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228861" version="1" comment="libcacard-devel is &lt;2.5.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228862" version="1" comment="libcacard0 is &lt;2.5.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228863" version="1" comment="libecpg6 is &lt;10.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228864" version="1" comment="postgresql10-contrib is &lt;10.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228865" version="1" comment="postgresql10-devel is &lt;10.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228866" version="1" comment="postgresql10-docs is &lt;10.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228867" version="1" comment="postgresql10-plperl is &lt;10.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228868" version="1" comment="postgresql10-plpython is &lt;10.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228869" version="1" comment="postgresql10-pltcl is &lt;10.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228870" version="1" comment="postgresql10-server is &lt;10.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228871" version="1" comment="libfpm_pb0 is &lt;1.1.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228872" version="1" comment="libospf0 is &lt;1.1.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228873" version="1" comment="libospfapiclient0 is &lt;1.1.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228874" version="1" comment="libquagga_pb0 is &lt;1.1.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228875" version="1" comment="libzebra1 is &lt;1.1.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228876" version="1" comment="quagga is &lt;1.1.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228877" version="1" comment="quagga-devel is &lt;1.1.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228878" version="1" comment="libmysqld-devel is &lt;10.2.15-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228879" version="1" comment="libmysqld19 is &lt;10.2.15-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228880" version="1" comment="mariadb is &lt;10.2.15-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228881" version="1" comment="mariadb-client is &lt;10.2.15-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228882" version="1" comment="mariadb-errormessages is &lt;10.2.15-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228883" version="1" comment="mariadb-tools is &lt;10.2.15-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228884" version="1" comment="libopenvswitch-2_8-0 is &lt;2.8.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228885" version="1" comment="openvswitch is &lt;2.8.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228886" version="1" comment="openvswitch-devel is &lt;2.8.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228887" version="1" comment="librelp-devel is &lt;1.2.15-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228888" version="1" comment="librelp0 is &lt;1.2.15-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228889" version="1" comment="libsaml-devel is &lt;2.6.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228890" version="1" comment="libsaml9 is &lt;2.6.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228891" version="1" comment="opensaml-schemas is &lt;2.6.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228892" version="1" comment="libshibsp-lite7 is &lt;2.6.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228893" version="1" comment="libshibsp7 is &lt;2.6.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228894" version="1" comment="shibboleth-sp is &lt;2.6.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228895" version="1" comment="shibboleth-sp-devel is &lt;2.6.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228896" version="1" comment="libspice-server-devel is &lt;0.14.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228897" version="1" comment="libspice-server1 is &lt;0.14.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228898" version="1" comment="libupsclient1 is &lt;2.7.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228899" version="1" comment="nut is &lt;2.7.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228900" version="1" comment="nut-devel is &lt;2.7.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228901" version="1" comment="nut-drivers-net is &lt;2.7.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228902" version="1" comment="libvirglrenderer0 is &lt;0.6.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228903" version="1" comment="virglrenderer-devel is &lt;0.6.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228904" version="1" comment="libvirt is &lt;4.0.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228905" version="1" comment="libvirt-admin is &lt;4.0.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228906" version="1" comment="libvirt-client is &lt;4.0.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228907" version="1" comment="libvirt-daemon is &lt;4.0.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228908" version="1" comment="libvirt-daemon-config-network is &lt;4.0.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228909" version="1" comment="libvirt-daemon-config-nwfilter is &lt;4.0.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228910" version="1" comment="libvirt-daemon-driver-interface is &lt;4.0.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228911" version="1" comment="libvirt-daemon-driver-libxl is &lt;4.0.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228912" version="1" comment="libvirt-daemon-driver-lxc is &lt;4.0.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228913" version="1" comment="libvirt-daemon-driver-network is &lt;4.0.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228914" version="1" comment="libvirt-daemon-driver-nodedev is &lt;4.0.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228915" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;4.0.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228916" version="1" comment="libvirt-daemon-driver-qemu is &lt;4.0.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228917" version="1" comment="libvirt-daemon-driver-secret is &lt;4.0.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228918" version="1" comment="libvirt-daemon-driver-storage is &lt;4.0.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228919" version="1" comment="libvirt-daemon-driver-storage-core is &lt;4.0.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228920" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;4.0.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228921" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;4.0.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228922" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;4.0.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228923" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;4.0.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228924" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;4.0.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228925" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;4.0.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228926" version="1" comment="libvirt-daemon-hooks is &lt;4.0.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228927" version="1" comment="libvirt-daemon-lxc is &lt;4.0.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228928" version="1" comment="libvirt-daemon-qemu is &lt;4.0.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228929" version="1" comment="libvirt-daemon-xen is &lt;4.0.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228930" version="1" comment="libvirt-devel is &lt;4.0.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228931" version="1" comment="libvirt-doc is &lt;4.0.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228932" version="1" comment="libvirt-lock-sanlock is &lt;4.0.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228933" version="1" comment="libvirt-nss is &lt;4.0.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228934" version="1" comment="libwsman-devel is &lt;2.6.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228935" version="1" comment="libwsman3 is &lt;2.6.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228936" version="1" comment="openwsman-server is &lt;2.6.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228937" version="1" comment="libxmltooling-devel is &lt;1.6.4-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228938" version="1" comment="libxmltooling7 is &lt;1.6.4-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228939" version="1" comment="xmltooling-schemas is &lt;1.6.4-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228940" version="1" comment="memcached is &lt;1.5.6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228941" version="1" comment="memcached-devel is &lt;1.5.6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228942" version="1" comment="nginx is &lt;1.14.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228943" version="1" comment="openslp-server is &lt;2.0.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228944" version="1" comment="openssh-fips is &lt;7.6p1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228945" version="1" comment="postgresql-contrib is &lt;10-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228946" version="1" comment="postgresql-devel is &lt;10-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228947" version="1" comment="postgresql-docs is &lt;10-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228948" version="1" comment="postgresql-plperl is &lt;10-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228949" version="1" comment="postgresql-plpython is &lt;10-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228950" version="1" comment="postgresql-pltcl is &lt;10-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228951" version="1" comment="postgresql-server is &lt;10-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228952" version="1" comment="python3-pywbem is &lt;0.11.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228953" version="1" comment="qemu is &lt;2.11.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228954" version="1" comment="qemu-block-curl is &lt;2.11.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228955" version="1" comment="qemu-block-iscsi is &lt;2.11.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228956" version="1" comment="qemu-block-rbd is &lt;2.11.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228957" version="1" comment="qemu-block-ssh is &lt;2.11.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228958" version="1" comment="qemu-guest-agent is &lt;2.11.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185175" version="1" comment="qemu-ipxe is &lt;1.0.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228959" version="1" comment="qemu-kvm is &lt;2.11.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228960" version="1" comment="qemu-lang is &lt;2.11.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228961" version="1" comment="qemu-seabios is &lt;1.11.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185178" version="1" comment="qemu-sgabios is &lt;8-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228962" version="1" comment="qemu-vgabios is &lt;1.11.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228963" version="1" comment="qemu-x86 is &lt;2.11.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228964" version="1" comment="rarpd is &lt;s20161105-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228965" version="1" comment="rsyslog-module-gssapi is &lt;8.33.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228966" version="1" comment="rsyslog-module-mysql is &lt;8.33.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228967" version="1" comment="rsyslog-module-pgsql is &lt;8.33.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228968" version="1" comment="rsyslog-module-relp is &lt;8.33.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228969" version="1" comment="rsyslog-module-snmp is &lt;8.33.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228970" version="1" comment="rsyslog-module-udpspoof is &lt;8.33.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228971" version="1" comment="salt-api is &lt;2018.3.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228972" version="1" comment="salt-cloud is &lt;2018.3.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228973" version="1" comment="salt-fish-completion is &lt;2018.3.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228974" version="1" comment="salt-master is &lt;2018.3.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228975" version="1" comment="salt-proxy is &lt;2018.3.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228976" version="1" comment="salt-ssh is &lt;2018.3.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228977" version="1" comment="salt-syndic is &lt;2018.3.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228978" version="1" comment="sblim-sfcb is &lt;1.4.9-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228979" version="1" comment="skopeo is &lt;0.1.26-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228981" version="1" comment="spice-gtk-devel is &lt;0.34-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228982" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.34-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228983" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.34-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228984" version="1" comment="squid is &lt;4.0.23-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228985" version="1" comment="stunnel is &lt;5.44-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228986" version="1" comment="subversion-server is &lt;1.10.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228987" version="1" comment="uuidd is &lt;2.31.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228988" version="1" comment="vsftpd is &lt;3.0.3-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228989" version="1" comment="xen is &lt;4.10.1_04-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228990" version="1" comment="xen-devel is &lt;4.10.1_04-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228991" version="1" comment="xen-tools is &lt;4.10.1_04-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255508" version="1" comment="sle-module-server-applications-release is ==15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246983" version="1" comment="apache2 is &lt;2.4.33-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246986" version="1" comment="apache2-devel is &lt;2.4.33-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246987" version="1" comment="apache2-doc is &lt;2.4.33-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246988" version="1" comment="apache2-prefork is &lt;2.4.33-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246989" version="1" comment="apache2-utils is &lt;2.4.33-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246990" version="1" comment="apache2-worker is &lt;2.4.33-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255509" version="1" comment="apache2-mod_apparmor is &lt;2.12.2-7.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240931" version="1" comment="apache2-mod_jk is &lt;1.2.43-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255510" version="1" comment="bind is &lt;9.11.2-12.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255511" version="1" comment="bind-chrootenv is &lt;9.11.2-12.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255512" version="1" comment="bind-doc is &lt;9.11.2-12.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255513" version="1" comment="cyrus-sasl-sqlauxprop is &lt;2.1.26-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255514" version="1" comment="dovecot23 is &lt;2.3.3-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255515" version="1" comment="dovecot23-backend-mysql is &lt;2.3.3-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255516" version="1" comment="dovecot23-backend-pgsql is &lt;2.3.3-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255517" version="1" comment="dovecot23-backend-sqlite is &lt;2.3.3-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255518" version="1" comment="dovecot23-devel is &lt;2.3.3-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255519" version="1" comment="dovecot23-fts is &lt;2.3.3-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255520" version="1" comment="dovecot23-fts-lucene is &lt;2.3.3-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255521" version="1" comment="dovecot23-fts-solr is &lt;2.3.3-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255522" version="1" comment="dovecot23-fts-squat is &lt;2.3.3-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255523" version="1" comment="dpdk is &lt;18.11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255524" version="1" comment="dpdk-devel is &lt;18.11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255525" version="1" comment="dpdk-kmp-default is &lt;18.11_k4.12.14_195-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255526" version="1" comment="dpdk-tools is &lt;18.11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255527" version="1" comment="libdpdk-18_11 is &lt;18.11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252516" version="1" comment="freeradius-server is &lt;3.0.16-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252520" version="1" comment="freeradius-server-devel is &lt;3.0.16-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252521" version="1" comment="freeradius-server-krb5 is &lt;3.0.16-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252522" version="1" comment="freeradius-server-ldap is &lt;3.0.16-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252523" version="1" comment="freeradius-server-libs is &lt;3.0.16-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252524" version="1" comment="freeradius-server-mysql is &lt;3.0.16-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252525" version="1" comment="freeradius-server-perl is &lt;3.0.16-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252526" version="1" comment="freeradius-server-postgresql is &lt;3.0.16-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252527" version="1" comment="freeradius-server-python is &lt;3.0.16-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252528" version="1" comment="freeradius-server-sqlite is &lt;3.0.16-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252529" version="1" comment="freeradius-server-utils is &lt;3.0.16-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247204" version="1" comment="gnuplot is &lt;5.2.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247205" version="1" comment="gnuplot-doc is &lt;5.2.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255528" version="1" comment="grub2-x86_64-xen is &lt;2.02-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255529" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.16.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255530" version="1" comment="krb5-server is &lt;1.16.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255531" version="1" comment="libapr-util1-dbd-mysql is &lt;1.6.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255532" version="1" comment="libapr-util1-dbd-pgsql is &lt;1.6.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255533" version="1" comment="libapr-util1-dbd-sqlite3 is &lt;1.6.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255534" version="1" comment="libecpg6 is &lt;10.6-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255535" version="1" comment="postgresql10-contrib is &lt;10.6-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255536" version="1" comment="postgresql10-devel is &lt;10.6-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255537" version="1" comment="postgresql10-docs is &lt;10.6-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255538" version="1" comment="postgresql10-plperl is &lt;10.6-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255539" version="1" comment="postgresql10-plpython is &lt;10.6-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255540" version="1" comment="postgresql10-pltcl is &lt;10.6-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255541" version="1" comment="postgresql10-server is &lt;10.6-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243837" version="1" comment="libfreebl3-hmac is &lt;3.41.1-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243841" version="1" comment="libsoftokn3-hmac is &lt;3.41.1-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245552" version="1" comment="libmysqld-devel is &lt;10.2.22-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245553" version="1" comment="libmysqld19 is &lt;10.2.22-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245548" version="1" comment="mariadb is &lt;10.2.22-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245554" version="1" comment="mariadb-client is &lt;10.2.22-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245555" version="1" comment="mariadb-errormessages is &lt;10.2.22-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245556" version="1" comment="mariadb-tools is &lt;10.2.22-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255542" version="1" comment="libspice-server-devel is &lt;0.14.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255543" version="1" comment="libspice-server1 is &lt;0.14.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255544" version="1" comment="libvirt is &lt;5.1.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255545" version="1" comment="libvirt-admin is &lt;5.1.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255546" version="1" comment="libvirt-bash-completion is &lt;5.1.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255547" version="1" comment="libvirt-client is &lt;5.1.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255548" version="1" comment="libvirt-daemon is &lt;5.1.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255549" version="1" comment="libvirt-daemon-config-network is &lt;5.1.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255550" version="1" comment="libvirt-daemon-config-nwfilter is &lt;5.1.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255551" version="1" comment="libvirt-daemon-driver-interface is &lt;5.1.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255552" version="1" comment="libvirt-daemon-driver-libxl is &lt;5.1.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255553" version="1" comment="libvirt-daemon-driver-lxc is &lt;5.1.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255554" version="1" comment="libvirt-daemon-driver-network is &lt;5.1.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255555" version="1" comment="libvirt-daemon-driver-nodedev is &lt;5.1.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255556" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;5.1.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255557" version="1" comment="libvirt-daemon-driver-qemu is &lt;5.1.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255558" version="1" comment="libvirt-daemon-driver-secret is &lt;5.1.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255559" version="1" comment="libvirt-daemon-driver-storage is &lt;5.1.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255560" version="1" comment="libvirt-daemon-driver-storage-core is &lt;5.1.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255561" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;5.1.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255562" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;5.1.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255563" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;5.1.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255564" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;5.1.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255565" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;5.1.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255566" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;5.1.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255567" version="1" comment="libvirt-daemon-hooks is &lt;5.1.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255568" version="1" comment="libvirt-daemon-lxc is &lt;5.1.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255569" version="1" comment="libvirt-daemon-qemu is &lt;5.1.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255570" version="1" comment="libvirt-daemon-xen is &lt;5.1.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255571" version="1" comment="libvirt-devel is &lt;5.1.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255572" version="1" comment="libvirt-doc is &lt;5.1.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255573" version="1" comment="libvirt-lock-sanlock is &lt;5.1.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255574" version="1" comment="libvirt-nss is &lt;5.1.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246037" version="1" comment="libwsman-devel is &lt;2.6.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246038" version="1" comment="libwsman3 is &lt;2.6.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246039" version="1" comment="openwsman-server is &lt;2.6.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247206" version="1" comment="libxmltooling-devel is &lt;1.6.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247207" version="1" comment="libxmltooling7 is &lt;1.6.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247209" version="1" comment="xmltooling-schemas is &lt;1.6.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255575" version="1" comment="nginx is &lt;1.14.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255576" version="1" comment="nginx-source is &lt;1.14.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229992" version="1" comment="openslp-server is &lt;2.0.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255577" version="1" comment="openssh-fips is &lt;7.9p1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252729" version="1" comment="ovmf is &lt;2017+git1510945757.b2662641d5-5.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252730" version="1" comment="ovmf-tools is &lt;2017+git1510945757.b2662641d5-5.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252731" version="1" comment="qemu-ovmf-x86_64 is &lt;2017+git1510945757.b2662641d5-5.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255578" version="1" comment="qemu is &lt;3.1.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255579" version="1" comment="qemu-audio-alsa is &lt;3.1.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255580" version="1" comment="qemu-audio-oss is &lt;3.1.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255581" version="1" comment="qemu-audio-pa is &lt;3.1.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255582" version="1" comment="qemu-block-curl is &lt;3.1.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255583" version="1" comment="qemu-block-iscsi is &lt;3.1.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255584" version="1" comment="qemu-block-rbd is &lt;3.1.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255585" version="1" comment="qemu-block-ssh is &lt;3.1.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255586" version="1" comment="qemu-guest-agent is &lt;3.1.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255587" version="1" comment="qemu-ipxe is &lt;1.0.0+-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255588" version="1" comment="qemu-kvm is &lt;3.1.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255589" version="1" comment="qemu-lang is &lt;3.1.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255590" version="1" comment="qemu-ppc is &lt;3.1.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255591" version="1" comment="qemu-s390 is &lt;3.1.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255592" version="1" comment="qemu-seabios is &lt;1.12.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255593" version="1" comment="qemu-ui-curses is &lt;3.1.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255594" version="1" comment="qemu-ui-gtk is &lt;3.1.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255595" version="1" comment="qemu-vgabios is &lt;1.12.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255596" version="1" comment="qemu-x86 is &lt;3.1.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255597" version="1" comment="rmt-server is &lt;1.2.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255598" version="1" comment="rsyslog-module-gssapi is &lt;8.33.1-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255599" version="1" comment="rsyslog-module-gtls is &lt;8.33.1-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255600" version="1" comment="rsyslog-module-mysql is &lt;8.33.1-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255601" version="1" comment="rsyslog-module-pgsql is &lt;8.33.1-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255602" version="1" comment="rsyslog-module-relp is &lt;8.33.1-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255603" version="1" comment="rsyslog-module-snmp is &lt;8.33.1-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255604" version="1" comment="rsyslog-module-udpspoof is &lt;8.33.1-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255605" version="1" comment="salt-api is &lt;2019.2.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255606" version="1" comment="salt-cloud is &lt;2019.2.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255607" version="1" comment="salt-fish-completion is &lt;2019.2.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255608" version="1" comment="salt-master is &lt;2019.2.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255609" version="1" comment="salt-proxy is &lt;2019.2.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255610" version="1" comment="salt-ssh is &lt;2019.2.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255611" version="1" comment="salt-syndic is &lt;2019.2.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255612" version="1" comment="skopeo is &lt;0.1.32-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255613" version="1" comment="spice-gtk-devel is &lt;0.35-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255614" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.35-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255615" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.35-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239270" version="1" comment="squid is &lt;4.4-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243365" version="1" comment="subversion-server is &lt;1.10.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246520" version="1" comment="sysstat-isag is &lt;12.0.2-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255616" version="1" comment="uuidd is &lt;2.33.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255617" version="1" comment="vsftpd is &lt;3.0.3-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255618" version="1" comment="xen is &lt;4.12.0_12-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255619" version="1" comment="xen-devel is &lt;4.12.0_12-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255620" version="1" comment="xen-tools is &lt;4.12.0_12-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255621" version="1" comment="yast2-rmt is &lt;1.2.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228992" version="1" comment="apache-commons-beanutils is &lt;1.9.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228993" version="1" comment="sle-module-web-scripting-release is ==15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228994" version="1" comment="apache-commons-daemon is &lt;1.0.15-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228995" version="1" comment="apache2-mod_php7 is &lt;7.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228996" version="1" comment="php7 is &lt;7.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228997" version="1" comment="php7-bcmath is &lt;7.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228998" version="1" comment="php7-bz2 is &lt;7.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009228999" version="1" comment="php7-calendar is &lt;7.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229000" version="1" comment="php7-ctype is &lt;7.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229001" version="1" comment="php7-curl is &lt;7.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229002" version="1" comment="php7-dba is &lt;7.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229003" version="1" comment="php7-devel is &lt;7.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229004" version="1" comment="php7-dom is &lt;7.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229005" version="1" comment="php7-enchant is &lt;7.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229006" version="1" comment="php7-exif is &lt;7.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229007" version="1" comment="php7-fastcgi is &lt;7.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229008" version="1" comment="php7-fileinfo is &lt;7.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229009" version="1" comment="php7-fpm is &lt;7.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229010" version="1" comment="php7-ftp is &lt;7.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229011" version="1" comment="php7-gd is &lt;7.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229012" version="1" comment="php7-gettext is &lt;7.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229013" version="1" comment="php7-gmp is &lt;7.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229014" version="1" comment="php7-iconv is &lt;7.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229015" version="1" comment="php7-intl is &lt;7.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229016" version="1" comment="php7-json is &lt;7.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229017" version="1" comment="php7-ldap is &lt;7.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229018" version="1" comment="php7-mbstring is &lt;7.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229019" version="1" comment="php7-mysql is &lt;7.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229020" version="1" comment="php7-odbc is &lt;7.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229021" version="1" comment="php7-opcache is &lt;7.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229022" version="1" comment="php7-openssl is &lt;7.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229023" version="1" comment="php7-pcntl is &lt;7.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229024" version="1" comment="php7-pdo is &lt;7.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229025" version="1" comment="php7-pear is &lt;7.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229026" version="1" comment="php7-pear-Archive_Tar is &lt;7.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229027" version="1" comment="php7-pgsql is &lt;7.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229028" version="1" comment="php7-phar is &lt;7.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229029" version="1" comment="php7-posix is &lt;7.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229030" version="1" comment="php7-shmop is &lt;7.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229031" version="1" comment="php7-snmp is &lt;7.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229032" version="1" comment="php7-soap is &lt;7.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229033" version="1" comment="php7-sockets is &lt;7.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229034" version="1" comment="php7-sqlite is &lt;7.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229035" version="1" comment="php7-sysvmsg is &lt;7.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229036" version="1" comment="php7-sysvsem is &lt;7.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229037" version="1" comment="php7-sysvshm is &lt;7.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229038" version="1" comment="php7-tokenizer is &lt;7.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229039" version="1" comment="php7-wddx is &lt;7.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229040" version="1" comment="php7-xmlreader is &lt;7.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229041" version="1" comment="php7-xmlrpc is &lt;7.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229042" version="1" comment="php7-xmlwriter is &lt;7.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229043" version="1" comment="php7-xsl is &lt;7.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229044" version="1" comment="php7-zip is &lt;7.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229045" version="1" comment="php7-zlib is &lt;7.2.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229046" version="1" comment="jakarta-commons-fileupload is &lt;1.1.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229047" version="1" comment="jakarta-taglibs-standard is &lt;1.1.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229048" version="1" comment="nodejs8 is &lt;8.11.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229049" version="1" comment="nodejs8-devel is &lt;8.11.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229050" version="1" comment="nodejs8-docs is &lt;8.11.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229051" version="1" comment="npm8 is &lt;8.11.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229052" version="1" comment="tomcat is &lt;9.0.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229053" version="1" comment="tomcat-admin-webapps is &lt;9.0.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229054" version="1" comment="tomcat-el-3_0-api is &lt;9.0.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229055" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229056" version="1" comment="tomcat-lib is &lt;9.0.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229057" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229058" version="1" comment="tomcat-webapps is &lt;9.0.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229059" version="1" comment="xalan-j2 is &lt;2.7.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255622" version="1" comment="sle-module-web-scripting-release is ==15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236249" version="1" comment="apache2-mod_php7 is &lt;7.2.5-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236250" version="1" comment="php7 is &lt;7.2.5-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236251" version="1" comment="php7-bcmath is &lt;7.2.5-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236252" version="1" comment="php7-bz2 is &lt;7.2.5-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236253" version="1" comment="php7-calendar is &lt;7.2.5-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236254" version="1" comment="php7-ctype is &lt;7.2.5-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236255" version="1" comment="php7-curl is &lt;7.2.5-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236256" version="1" comment="php7-dba is &lt;7.2.5-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236257" version="1" comment="php7-devel is &lt;7.2.5-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236258" version="1" comment="php7-dom is &lt;7.2.5-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236259" version="1" comment="php7-enchant is &lt;7.2.5-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236260" version="1" comment="php7-exif is &lt;7.2.5-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236261" version="1" comment="php7-fastcgi is &lt;7.2.5-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236262" version="1" comment="php7-fileinfo is &lt;7.2.5-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236263" version="1" comment="php7-fpm is &lt;7.2.5-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236264" version="1" comment="php7-ftp is &lt;7.2.5-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236265" version="1" comment="php7-gd is &lt;7.2.5-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236266" version="1" comment="php7-gettext is &lt;7.2.5-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236267" version="1" comment="php7-gmp is &lt;7.2.5-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236268" version="1" comment="php7-iconv is &lt;7.2.5-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236269" version="1" comment="php7-intl is &lt;7.2.5-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236270" version="1" comment="php7-json is &lt;7.2.5-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236271" version="1" comment="php7-ldap is &lt;7.2.5-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236272" version="1" comment="php7-mbstring is &lt;7.2.5-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236273" version="1" comment="php7-mysql is &lt;7.2.5-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236274" version="1" comment="php7-odbc is &lt;7.2.5-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236275" version="1" comment="php7-opcache is &lt;7.2.5-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236276" version="1" comment="php7-openssl is &lt;7.2.5-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236277" version="1" comment="php7-pcntl is &lt;7.2.5-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236278" version="1" comment="php7-pdo is &lt;7.2.5-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236279" version="1" comment="php7-pear is &lt;7.2.5-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236280" version="1" comment="php7-pear-Archive_Tar is &lt;7.2.5-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236281" version="1" comment="php7-pgsql is &lt;7.2.5-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236282" version="1" comment="php7-phar is &lt;7.2.5-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236283" version="1" comment="php7-posix is &lt;7.2.5-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236284" version="1" comment="php7-shmop is &lt;7.2.5-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236285" version="1" comment="php7-snmp is &lt;7.2.5-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236286" version="1" comment="php7-soap is &lt;7.2.5-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236287" version="1" comment="php7-sockets is &lt;7.2.5-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236288" version="1" comment="php7-sqlite is &lt;7.2.5-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236289" version="1" comment="php7-sysvmsg is &lt;7.2.5-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236290" version="1" comment="php7-sysvsem is &lt;7.2.5-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236291" version="1" comment="php7-sysvshm is &lt;7.2.5-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236292" version="1" comment="php7-tokenizer is &lt;7.2.5-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236293" version="1" comment="php7-wddx is &lt;7.2.5-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236294" version="1" comment="php7-xmlreader is &lt;7.2.5-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236295" version="1" comment="php7-xmlrpc is &lt;7.2.5-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236296" version="1" comment="php7-xmlwriter is &lt;7.2.5-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236297" version="1" comment="php7-xsl is &lt;7.2.5-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236298" version="1" comment="php7-zip is &lt;7.2.5-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236299" version="1" comment="php7-zlib is &lt;7.2.5-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245938" version="1" comment="nodejs10 is &lt;10.15.2-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245939" version="1" comment="nodejs10-devel is &lt;10.15.2-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245940" version="1" comment="nodejs10-docs is &lt;10.15.2-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245941" version="1" comment="npm10 is &lt;10.15.2-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246040" version="1" comment="nodejs8 is &lt;8.15.1-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246041" version="1" comment="nodejs8-devel is &lt;8.15.1-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246042" version="1" comment="nodejs8-docs is &lt;8.15.1-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246043" version="1" comment="npm8 is &lt;8.15.1-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255623" version="1" comment="tomcat is &lt;9.0.14-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255624" version="1" comment="tomcat-admin-webapps is &lt;9.0.14-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255625" version="1" comment="tomcat-el-3_0-api is &lt;9.0.14-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255626" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.14-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255627" version="1" comment="tomcat-lib is &lt;9.0.14-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255628" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.14-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255629" version="1" comment="tomcat-webapps is &lt;9.0.14-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229060" version="1" comment="MozillaThunderbird is &lt;52.8-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229061" version="1" comment="MozillaThunderbird-devel is &lt;52.8-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229062" version="1" comment="MozillaThunderbird-translations-common is &lt;52.8-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229063" version="1" comment="MozillaThunderbird-translations-other is &lt;52.8-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229064" version="1" comment="sle-we-release is ==15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229065" version="1" comment="NetworkManager-applet is &lt;1.8.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229066" version="1" comment="NetworkManager-applet-lang is &lt;1.8.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229067" version="1" comment="NetworkManager-connection-editor is &lt;1.8.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229068" version="1" comment="NetworkManager-lang is &lt;1.10.6-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229069" version="1" comment="PackageKit-gstreamer-plugin is &lt;1.1.10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229070" version="1" comment="PackageKit-gtk3-module is &lt;1.1.10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229071" version="1" comment="argyllcms is &lt;1.9.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229072" version="1" comment="bluez-cups is &lt;5.48-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229073" version="1" comment="bogofilter-common is &lt;1.2.4-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229074" version="1" comment="bogofilter-db is &lt;1.2.4-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229075" version="1" comment="colord is &lt;1.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229076" version="1" comment="colord-gtk-lang is &lt;0.1.26-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229077" version="1" comment="colord-lang is &lt;1.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229078" version="1" comment="dia is &lt;0.97.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229079" version="1" comment="dia-lang is &lt;0.97.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229080" version="1" comment="enigmail is &lt;2.0.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229081" version="1" comment="freerdp is &lt;2.0.0~rc2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229082" version="1" comment="freerdp-devel is &lt;2.0.0~rc2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229083" version="1" comment="libfreerdp2 is &lt;2.0.0~rc2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229084" version="1" comment="libwinpr2 is &lt;2.0.0~rc2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229085" version="1" comment="winpr2-devel is &lt;2.0.0~rc2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229086" version="1" comment="gegl-0_3 is &lt;0.3.34-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229087" version="1" comment="gegl-0_3-lang is &lt;0.3.34-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229088" version="1" comment="gegl-devel is &lt;0.3.34-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229089" version="1" comment="libgegl-0_3-0 is &lt;0.3.34-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229090" version="1" comment="typelib-1_0-Gegl-0_3 is &lt;0.3.34-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229091" version="1" comment="gimp is &lt;2.8.22-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229092" version="1" comment="gimp-devel is &lt;2.8.22-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229093" version="1" comment="gimp-lang is &lt;2.8.22-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229094" version="1" comment="gimp-plugins-python is &lt;2.8.22-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229095" version="1" comment="libgimp-2_0-0 is &lt;2.8.22-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229096" version="1" comment="libgimpui-2_0-0 is &lt;2.8.22-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229097" version="1" comment="gnome-online-accounts is &lt;3.26.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229098" version="1" comment="gnome-online-accounts-lang is &lt;3.26.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229099" version="1" comment="gnome-photos is &lt;3.26.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229100" version="1" comment="gnome-photos-lang is &lt;3.26.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229101" version="1" comment="gnome-shell-search-provider-gnome-photos is &lt;3.26.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229102" version="1" comment="gnome-shell-calendar is &lt;3.26.2+20180130.0d9c74212-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229103" version="1" comment="gstreamer-plugins-ugly is &lt;1.12.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229104" version="1" comment="gstreamer-plugins-ugly-lang is &lt;1.12.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229105" version="1" comment="icedtea-web is &lt;1.7.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229106" version="1" comment="imobiledevice-tools is &lt;1.2.0+git20170122.45fda81-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229107" version="1" comment="kernel-default-extra is &lt;4.12.14-23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229108" version="1" comment="libavcodec-devel is &lt;3.4.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229109" version="1" comment="libavformat-devel is &lt;3.4.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229110" version="1" comment="libavformat57 is &lt;3.4.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229111" version="1" comment="libavresample-devel is &lt;3.4.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229112" version="1" comment="libavresample3 is &lt;3.4.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229113" version="1" comment="libgadu-devel is &lt;1.12.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229114" version="1" comment="libgadu3 is &lt;1.12.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229115" version="1" comment="libmwaw-0_3-3 is &lt;0.3.13-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229116" version="1" comment="libopencv3_3 is &lt;3.3.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229117" version="1" comment="opencv is &lt;3.3.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229118" version="1" comment="opencv-devel is &lt;3.3.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229119" version="1" comment="libotr-devel is &lt;4.1.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229120" version="1" comment="libotr5 is &lt;4.1.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229121" version="1" comment="libproxy1-config-gnome3 is &lt;0.4.15-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229122" version="1" comment="libproxy1-networkmanager is &lt;0.4.15-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229123" version="1" comment="libpskc-devel is &lt;2.6.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229124" version="1" comment="libpskc0 is &lt;2.6.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229125" version="1" comment="libpurple is &lt;2.13.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229126" version="1" comment="libpurple-branding-upstream is &lt;2.13.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229127" version="1" comment="libpurple-devel is &lt;2.13.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229128" version="1" comment="libpurple-lang is &lt;2.13.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229129" version="1" comment="libpurple-plugin-sametime is &lt;2.13.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229130" version="1" comment="pidgin is &lt;2.13.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229131" version="1" comment="pidgin-devel is &lt;2.13.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229132" version="1" comment="libraw-devel is &lt;0.18.9-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229133" version="1" comment="libraw16 is &lt;0.18.9-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229134" version="1" comment="libreoffice is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229135" version="1" comment="libreoffice-base is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229136" version="1" comment="libreoffice-base-drivers-mysql is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229137" version="1" comment="libreoffice-base-drivers-postgresql is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229138" version="1" comment="libreoffice-branding-upstream is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229139" version="1" comment="libreoffice-calc is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229140" version="1" comment="libreoffice-calc-extensions is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229141" version="1" comment="libreoffice-draw is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229142" version="1" comment="libreoffice-filters-optional is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229143" version="1" comment="libreoffice-gnome is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229144" version="1" comment="libreoffice-gtk3 is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229145" version="1" comment="libreoffice-icon-themes is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229146" version="1" comment="libreoffice-impress is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229147" version="1" comment="libreoffice-l10n-af is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229148" version="1" comment="libreoffice-l10n-ar is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229149" version="1" comment="libreoffice-l10n-as is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229150" version="1" comment="libreoffice-l10n-bg is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229151" version="1" comment="libreoffice-l10n-bn is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229152" version="1" comment="libreoffice-l10n-br is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229153" version="1" comment="libreoffice-l10n-ca is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229154" version="1" comment="libreoffice-l10n-cs is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229155" version="1" comment="libreoffice-l10n-cy is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229156" version="1" comment="libreoffice-l10n-da is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229157" version="1" comment="libreoffice-l10n-de is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229158" version="1" comment="libreoffice-l10n-dz is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229159" version="1" comment="libreoffice-l10n-el is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229160" version="1" comment="libreoffice-l10n-en is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229161" version="1" comment="libreoffice-l10n-eo is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229162" version="1" comment="libreoffice-l10n-es is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229163" version="1" comment="libreoffice-l10n-et is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229164" version="1" comment="libreoffice-l10n-eu is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229165" version="1" comment="libreoffice-l10n-fa is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229166" version="1" comment="libreoffice-l10n-fi is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229167" version="1" comment="libreoffice-l10n-fr is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229168" version="1" comment="libreoffice-l10n-ga is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229169" version="1" comment="libreoffice-l10n-gl is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229170" version="1" comment="libreoffice-l10n-gu is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229171" version="1" comment="libreoffice-l10n-he is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229172" version="1" comment="libreoffice-l10n-hi is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229173" version="1" comment="libreoffice-l10n-hr is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229174" version="1" comment="libreoffice-l10n-hu is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229175" version="1" comment="libreoffice-l10n-it is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229176" version="1" comment="libreoffice-l10n-ja is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229177" version="1" comment="libreoffice-l10n-kk is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229178" version="1" comment="libreoffice-l10n-kn is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229179" version="1" comment="libreoffice-l10n-ko is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229180" version="1" comment="libreoffice-l10n-lt is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229181" version="1" comment="libreoffice-l10n-lv is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229182" version="1" comment="libreoffice-l10n-mai is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229183" version="1" comment="libreoffice-l10n-ml is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229184" version="1" comment="libreoffice-l10n-mr is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229185" version="1" comment="libreoffice-l10n-nb is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229186" version="1" comment="libreoffice-l10n-nl is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229187" version="1" comment="libreoffice-l10n-nn is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229188" version="1" comment="libreoffice-l10n-nr is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229189" version="1" comment="libreoffice-l10n-nso is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229190" version="1" comment="libreoffice-l10n-or is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229191" version="1" comment="libreoffice-l10n-pa is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229192" version="1" comment="libreoffice-l10n-pl is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229193" version="1" comment="libreoffice-l10n-pt_BR is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229194" version="1" comment="libreoffice-l10n-pt_PT is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229195" version="1" comment="libreoffice-l10n-ro is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229196" version="1" comment="libreoffice-l10n-ru is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229197" version="1" comment="libreoffice-l10n-si is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229198" version="1" comment="libreoffice-l10n-sk is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229199" version="1" comment="libreoffice-l10n-sl is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229200" version="1" comment="libreoffice-l10n-sr is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229201" version="1" comment="libreoffice-l10n-ss is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229202" version="1" comment="libreoffice-l10n-st is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229203" version="1" comment="libreoffice-l10n-sv is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229204" version="1" comment="libreoffice-l10n-ta is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229205" version="1" comment="libreoffice-l10n-te is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229206" version="1" comment="libreoffice-l10n-th is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229207" version="1" comment="libreoffice-l10n-tn is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229208" version="1" comment="libreoffice-l10n-tr is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229209" version="1" comment="libreoffice-l10n-ts is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229210" version="1" comment="libreoffice-l10n-uk is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229211" version="1" comment="libreoffice-l10n-ve is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229212" version="1" comment="libreoffice-l10n-xh is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229213" version="1" comment="libreoffice-l10n-zh_CN is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229214" version="1" comment="libreoffice-l10n-zh_TW is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229215" version="1" comment="libreoffice-l10n-zu is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229216" version="1" comment="libreoffice-mailmerge is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229217" version="1" comment="libreoffice-math is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229218" version="1" comment="libreoffice-officebean is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229219" version="1" comment="libreoffice-pyuno is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229220" version="1" comment="libreoffice-writer is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229221" version="1" comment="libreoffice-writer-extensions is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229222" version="1" comment="libreofficekit is &lt;6.0.4.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229223" version="1" comment="libstaroffice-0_0-0 is &lt;0.0.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229224" version="1" comment="libvncclient0 is &lt;0.9.10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229225" version="1" comment="libwmf-0_2-7 is &lt;0.2.8.4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229226" version="1" comment="libwmf-devel is &lt;0.2.8.4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229227" version="1" comment="libwmf-gnome is &lt;0.2.8.4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229228" version="1" comment="libwpd-0_10-10 is &lt;0.10.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229229" version="1" comment="libwpd-devel is &lt;0.10.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229230" version="1" comment="openconnect is &lt;7.08-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229231" version="1" comment="openconnect-devel is &lt;7.08-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229232" version="1" comment="openconnect-lang is &lt;7.08-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180996" version="1" comment="pidgin-plugin-otr is &lt;4.0.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229233" version="1" comment="pidgin-plugin-otr-lang is &lt;4.0.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229234" version="1" comment="pulseaudio-module-bluetooth is &lt;11.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229235" version="1" comment="pulseaudio-module-lirc is &lt;11.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229236" version="1" comment="transfig is &lt;3.2.6a-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229237" version="1" comment="xorg-x11-server-wayland is &lt;1.19.6-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009062055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246926" version="1" comment="MozillaThunderbird is &lt;60.6.1-3.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246927" version="1" comment="MozillaThunderbird-translations-common is &lt;60.6.1-3.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246928" version="1" comment="MozillaThunderbird-translations-other is &lt;60.6.1-3.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255630" version="1" comment="sle-we-release is ==15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255631" version="1" comment="NetworkManager-lang is &lt;1.10.6-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255632" version="1" comment="PackageKit-gstreamer-plugin is &lt;1.1.10-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255633" version="1" comment="PackageKit-gtk3-module is &lt;1.1.10-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246770" version="1" comment="bluez-cups is &lt;5.48-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242216" version="1" comment="enigmail is &lt;2.0.9-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255634" version="1" comment="freerdp is &lt;2.0.0~rc4-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255635" version="1" comment="freerdp-devel is &lt;2.0.0~rc4-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255636" version="1" comment="libfreerdp2 is &lt;2.0.0~rc4-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255637" version="1" comment="libwinpr2 is &lt;2.0.0~rc4-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255638" version="1" comment="winpr2-devel is &lt;2.0.0~rc4-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255639" version="1" comment="gnome-photos is &lt;3.26.3-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255640" version="1" comment="gnome-photos-lang is &lt;3.26.3-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255641" version="1" comment="gnome-shell-search-provider-gnome-photos is &lt;3.26.3-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255642" version="1" comment="gnome-shell-calendar is &lt;3.26.2+20180130.0d9c74212-4.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255643" version="1" comment="icedtea-web is &lt;1.7.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255644" version="1" comment="kernel-default-extra is &lt;4.12.14-195" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238543" version="1" comment="libavcodec-devel is &lt;3.4.2-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238544" version="1" comment="libavformat-devel is &lt;3.4.2-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238545" version="1" comment="libavformat57 is &lt;3.4.2-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238546" version="1" comment="libavresample-devel is &lt;3.4.2-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238547" version="1" comment="libavresample3 is &lt;3.4.2-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238832" version="1" comment="libmwaw-0_3-3 is &lt;0.3.14-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251800" version="1" comment="libntfs-3g87 is &lt;2016.2.22-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251801" version="1" comment="ntfs-3g is &lt;2016.2.22-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251802" version="1" comment="ntfsprogs is &lt;2016.2.22-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243227" version="1" comment="libraw-devel is &lt;0.18.9-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243228" version="1" comment="libraw16 is &lt;0.18.9-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255645" version="1" comment="libreoffice is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255646" version="1" comment="libreoffice-base is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255647" version="1" comment="libreoffice-base-drivers-postgresql is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255648" version="1" comment="libreoffice-branding-upstream is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255649" version="1" comment="libreoffice-calc is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255650" version="1" comment="libreoffice-calc-extensions is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255651" version="1" comment="libreoffice-draw is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255652" version="1" comment="libreoffice-filters-optional is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255653" version="1" comment="libreoffice-gnome is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255654" version="1" comment="libreoffice-gtk3 is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255655" version="1" comment="libreoffice-icon-themes is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255656" version="1" comment="libreoffice-impress is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255657" version="1" comment="libreoffice-l10n-af is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255658" version="1" comment="libreoffice-l10n-ar is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255659" version="1" comment="libreoffice-l10n-as is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255660" version="1" comment="libreoffice-l10n-bg is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255661" version="1" comment="libreoffice-l10n-bn is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255662" version="1" comment="libreoffice-l10n-br is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255663" version="1" comment="libreoffice-l10n-ca is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255664" version="1" comment="libreoffice-l10n-cs is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255665" version="1" comment="libreoffice-l10n-cy is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255666" version="1" comment="libreoffice-l10n-da is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255667" version="1" comment="libreoffice-l10n-de is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255668" version="1" comment="libreoffice-l10n-dz is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255669" version="1" comment="libreoffice-l10n-el is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255670" version="1" comment="libreoffice-l10n-en is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255671" version="1" comment="libreoffice-l10n-eo is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255672" version="1" comment="libreoffice-l10n-es is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255673" version="1" comment="libreoffice-l10n-et is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255674" version="1" comment="libreoffice-l10n-eu is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255675" version="1" comment="libreoffice-l10n-fa is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255676" version="1" comment="libreoffice-l10n-fi is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255677" version="1" comment="libreoffice-l10n-fr is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255678" version="1" comment="libreoffice-l10n-ga is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255679" version="1" comment="libreoffice-l10n-gl is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255680" version="1" comment="libreoffice-l10n-gu is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255681" version="1" comment="libreoffice-l10n-he is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255682" version="1" comment="libreoffice-l10n-hi is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255683" version="1" comment="libreoffice-l10n-hr is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255684" version="1" comment="libreoffice-l10n-hu is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255685" version="1" comment="libreoffice-l10n-it is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255686" version="1" comment="libreoffice-l10n-ja is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255687" version="1" comment="libreoffice-l10n-kk is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255688" version="1" comment="libreoffice-l10n-kn is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255689" version="1" comment="libreoffice-l10n-ko is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255690" version="1" comment="libreoffice-l10n-lt is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255691" version="1" comment="libreoffice-l10n-lv is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255692" version="1" comment="libreoffice-l10n-mai is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255693" version="1" comment="libreoffice-l10n-ml is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255694" version="1" comment="libreoffice-l10n-mr is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255695" version="1" comment="libreoffice-l10n-nb is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255696" version="1" comment="libreoffice-l10n-nl is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255697" version="1" comment="libreoffice-l10n-nn is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255698" version="1" comment="libreoffice-l10n-nr is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255699" version="1" comment="libreoffice-l10n-nso is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255700" version="1" comment="libreoffice-l10n-or is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255701" version="1" comment="libreoffice-l10n-pa is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255702" version="1" comment="libreoffice-l10n-pl is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255703" version="1" comment="libreoffice-l10n-pt_BR is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255704" version="1" comment="libreoffice-l10n-pt_PT is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255705" version="1" comment="libreoffice-l10n-ro is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255706" version="1" comment="libreoffice-l10n-ru is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255707" version="1" comment="libreoffice-l10n-si is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255708" version="1" comment="libreoffice-l10n-sk is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255709" version="1" comment="libreoffice-l10n-sl is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255710" version="1" comment="libreoffice-l10n-sr is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255711" version="1" comment="libreoffice-l10n-ss is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255712" version="1" comment="libreoffice-l10n-st is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255713" version="1" comment="libreoffice-l10n-sv is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255714" version="1" comment="libreoffice-l10n-ta is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255715" version="1" comment="libreoffice-l10n-te is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255716" version="1" comment="libreoffice-l10n-th is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255717" version="1" comment="libreoffice-l10n-tn is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255718" version="1" comment="libreoffice-l10n-tr is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255719" version="1" comment="libreoffice-l10n-ts is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255720" version="1" comment="libreoffice-l10n-uk is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255721" version="1" comment="libreoffice-l10n-ve is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255722" version="1" comment="libreoffice-l10n-xh is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255723" version="1" comment="libreoffice-l10n-zh_CN is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255724" version="1" comment="libreoffice-l10n-zh_TW is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255725" version="1" comment="libreoffice-l10n-zu is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255726" version="1" comment="libreoffice-mailmerge is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255727" version="1" comment="libreoffice-math is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255728" version="1" comment="libreoffice-officebean is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255729" version="1" comment="libreoffice-pyuno is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255730" version="1" comment="libreoffice-writer is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255731" version="1" comment="libreoffice-writer-extensions is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255732" version="1" comment="libreofficekit is &lt;6.1.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255733" version="1" comment="libstaroffice-0_0-0 is &lt;0.0.6-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255734" version="1" comment="libvncclient0 is &lt;0.9.10-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240573" version="1" comment="libwpd-0_10-10 is &lt;0.10.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240574" version="1" comment="libwpd-devel is &lt;0.10.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255735" version="1" comment="xorg-x11-server-wayland is &lt;1.20.3-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260948" version="1" comment="libsolv is &lt;0.7.5-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260949" version="1" comment="libsolv-tools is &lt;0.7.5-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260950" version="1" comment="libyui-ncurses-pkg is &lt;2.48.5.2-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260951" version="1" comment="libyui-ncurses-pkg8 is &lt;2.48.5.2-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260952" version="1" comment="libyui-qt-pkg is &lt;2.45.15.2-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260953" version="1" comment="libyui-qt-pkg8 is &lt;2.45.15.2-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260954" version="1" comment="libzypp is &lt;17.12.0-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260955" version="1" comment="yast2-pkg-bindings is &lt;4.0.13-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260956" version="1" comment="zypper is &lt;1.14.28-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229493" version="1" comment="gpg2 is &lt;2.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229494" version="1" comment="gpg2-lang is &lt;2.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229704" version="1" comment="cairo is &lt;1.15.10-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229709" version="1" comment="git is &lt;2.16.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229710" version="1" comment="git-core is &lt;2.16.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251777" version="1" comment="zsh is &lt;5.5-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229722" version="1" comment="unzip is &lt;6.00-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229723" version="1" comment="libtiff-devel is &lt;4.0.9-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229724" version="1" comment="libtiff5 is &lt;4.0.9-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229725" version="1" comment="tiff is &lt;4.0.9-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229726" version="1" comment="ghostscript is &lt;9.23-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229727" version="1" comment="ghostscript-devel is &lt;9.23-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229728" version="1" comment="ghostscript-x11 is &lt;9.23-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229729" version="1" comment="libvorbis is &lt;1.3.6-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230004" version="1" comment="ucode-intel is &lt;20180703-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230023" version="1" comment="rsyslog is &lt;8.33.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230312" version="1" comment="perl is &lt;5.26.1-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230313" version="1" comment="perl-base is &lt;5.26.1-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230314" version="1" comment="perl-base-32bit is &lt;5.26.1-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230315" version="1" comment="xen is &lt;4.10.1_06-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230316" version="1" comment="xen-libs is &lt;4.10.1_06-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230317" version="1" comment="xen-tools-domU is &lt;4.10.1_06-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230326" version="1" comment="glibc is &lt;2.26-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230327" version="1" comment="glibc-32bit is &lt;2.26-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230328" version="1" comment="glibc-devel is &lt;2.26-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230329" version="1" comment="glibc-extra is &lt;2.26-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230330" version="1" comment="glibc-i18ndata is &lt;2.26-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230331" version="1" comment="glibc-info is &lt;2.26-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230332" version="1" comment="glibc-locale is &lt;2.26-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230333" version="1" comment="glibc-locale-32bit is &lt;2.26-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230334" version="1" comment="glibc-profile is &lt;2.26-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230335" version="1" comment="nscd is &lt;2.26-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230336" version="1" comment="libgcrypt is &lt;1.8.2-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230337" version="1" comment="libgcrypt-devel is &lt;1.8.2-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230338" version="1" comment="libgcrypt20 is &lt;1.8.2-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230339" version="1" comment="libgcrypt20-32bit is &lt;1.8.2-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230340" version="1" comment="libgcrypt20-hmac is &lt;1.8.2-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230341" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.8.2-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230342" version="1" comment="libwireshark9 is &lt;2.4.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230343" version="1" comment="libwiretap7 is &lt;2.4.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230344" version="1" comment="libwscodecs1 is &lt;2.4.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230345" version="1" comment="libwsutil8 is &lt;2.4.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230346" version="1" comment="wireshark is &lt;2.4.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230511" version="1" comment="libopenssl-1_1-devel is &lt;1.1.0h-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230512" version="1" comment="libopenssl1_1 is &lt;1.1.0h-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230513" version="1" comment="libopenssl1_1-32bit is &lt;1.1.0h-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230514" version="1" comment="libopenssl1_1-hmac is &lt;1.1.0h-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230515" version="1" comment="libopenssl1_1-hmac-32bit is &lt;1.1.0h-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230516" version="1" comment="openssl-1_1 is &lt;1.1.0h-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230668" version="1" comment="python-rpm is &lt;4.14.1-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230669" version="1" comment="python2-rpm is &lt;4.14.1-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230670" version="1" comment="python3-rpm is &lt;4.14.1-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230671" version="1" comment="rpm is &lt;4.14.1-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230672" version="1" comment="rpm-32bit is &lt;4.14.1-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230673" version="1" comment="rpm-devel is &lt;4.14.1-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230674" version="1" comment="libblkid-devel is &lt;2.31.1-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230675" version="1" comment="libblkid-devel-static is &lt;2.31.1-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230676" version="1" comment="libblkid1 is &lt;2.31.1-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230677" version="1" comment="libblkid1-32bit is &lt;2.31.1-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230678" version="1" comment="libfdisk-devel is &lt;2.31.1-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230679" version="1" comment="libfdisk1 is &lt;2.31.1-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230680" version="1" comment="libmount-devel is &lt;2.31.1-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230681" version="1" comment="libmount1 is &lt;2.31.1-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230682" version="1" comment="libmount1-32bit is &lt;2.31.1-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230683" version="1" comment="libsmartcols-devel is &lt;2.31.1-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230684" version="1" comment="libsmartcols1 is &lt;2.31.1-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230685" version="1" comment="libuuid-devel is &lt;2.31.1-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230686" version="1" comment="libuuid-devel-static is &lt;2.31.1-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230687" version="1" comment="libuuid1 is &lt;2.31.1-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230688" version="1" comment="libuuid1-32bit is &lt;2.31.1-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230689" version="1" comment="util-linux is &lt;2.31.1-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230690" version="1" comment="util-linux-lang is &lt;2.31.1-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230691" version="1" comment="util-linux-systemd is &lt;2.31.1-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230692" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.20.3-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230693" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.20.3-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230694" version="1" comment="libwebkit2gtk3-lang is &lt;2.20.3-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230695" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.20.3-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230696" version="1" comment="webkit2gtk3 is &lt;2.20.3-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230697" version="1" comment="libsndfile is &lt;1.0.28-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230784" version="1" comment="kernel-default is &lt;4.12.14-25.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230785" version="1" comment="kernel-default-devel is &lt;4.12.14-25.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230786" version="1" comment="kernel-default-man is &lt;4.12.14-25.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230787" version="1" comment="kernel-devel is &lt;4.12.14-25.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230788" version="1" comment="kernel-macros is &lt;4.12.14-25.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230789" version="1" comment="kernel-source is &lt;4.12.14-25.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230790" version="1" comment="kernel-zfcpdump is &lt;4.12.14-25.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231087" version="1" comment="libipa_hbac-devel is &lt;1.16.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231088" version="1" comment="libipa_hbac0 is &lt;1.16.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231089" version="1" comment="libsss_certmap-devel is &lt;1.16.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231090" version="1" comment="libsss_certmap0 is &lt;1.16.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231091" version="1" comment="libsss_idmap-devel is &lt;1.16.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231092" version="1" comment="libsss_idmap0 is &lt;1.16.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231093" version="1" comment="libsss_nss_idmap-devel is &lt;1.16.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231094" version="1" comment="libsss_nss_idmap0 is &lt;1.16.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231095" version="1" comment="libsss_simpleifp-devel is &lt;1.16.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231096" version="1" comment="libsss_simpleifp0 is &lt;1.16.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231097" version="1" comment="python3-sssd-config is &lt;1.16.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231098" version="1" comment="sssd is &lt;1.16.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231099" version="1" comment="sssd-32bit is &lt;1.16.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231100" version="1" comment="sssd-ad is &lt;1.16.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231101" version="1" comment="sssd-ipa is &lt;1.16.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231102" version="1" comment="sssd-krb5 is &lt;1.16.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231103" version="1" comment="sssd-krb5-common is &lt;1.16.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231104" version="1" comment="sssd-ldap is &lt;1.16.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231105" version="1" comment="sssd-proxy is &lt;1.16.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231106" version="1" comment="sssd-tools is &lt;1.16.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231107" version="1" comment="sssd-wbclient is &lt;1.16.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231108" version="1" comment="sssd-wbclient-devel is &lt;1.16.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231154" version="1" comment="libpolkit0 is &lt;0.114-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231155" version="1" comment="polkit is &lt;0.114-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231156" version="1" comment="polkit-devel is &lt;0.114-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231157" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.114-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231211" version="1" comment="cups is &lt;2.2.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231212" version="1" comment="cups-client is &lt;2.2.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231213" version="1" comment="cups-config is &lt;2.2.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231214" version="1" comment="cups-devel is &lt;2.2.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231215" version="1" comment="libcups2 is &lt;2.2.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231216" version="1" comment="libcupscgi1 is &lt;2.2.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231217" version="1" comment="libcupsimage2 is &lt;2.2.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231218" version="1" comment="libcupsmime1 is &lt;2.2.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231219" version="1" comment="libcupsppdc1 is &lt;2.2.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231241" version="1" comment="kernel-firmware is &lt;20180525-3.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231242" version="1" comment="ucode-amd is &lt;20180525-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231243" version="1" comment="yast2-ftp-server is &lt;4.0.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231303" version="1" comment="kernel-default is &lt;4.12.14-25.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231304" version="1" comment="kernel-default-devel is &lt;4.12.14-25.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231305" version="1" comment="kernel-default-man is &lt;4.12.14-25.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231306" version="1" comment="kernel-devel is &lt;4.12.14-25.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231307" version="1" comment="kernel-macros is &lt;4.12.14-25.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231308" version="1" comment="kernel-source is &lt;4.12.14-25.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231309" version="1" comment="kernel-zfcpdump is &lt;4.12.14-25.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231468" version="1" comment="clamav is &lt;0.100.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231469" version="1" comment="clamav-devel is &lt;0.100.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231470" version="1" comment="libclamav7 is &lt;0.100.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231471" version="1" comment="libclammspack0 is &lt;0.100.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231810" version="1" comment="libwireshark9 is &lt;2.4.8-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231811" version="1" comment="libwiretap7 is &lt;2.4.8-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231812" version="1" comment="libwscodecs1 is &lt;2.4.8-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231813" version="1" comment="libwsutil8 is &lt;2.4.8-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231814" version="1" comment="wireshark is &lt;2.4.8-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231934" version="1" comment="libdcerpc-binding0 is &lt;4.7.8+git.86.94b6d10f7dd-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231935" version="1" comment="libdcerpc-devel is &lt;4.7.8+git.86.94b6d10f7dd-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231936" version="1" comment="libdcerpc-samr-devel is &lt;4.7.8+git.86.94b6d10f7dd-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231937" version="1" comment="libdcerpc-samr0 is &lt;4.7.8+git.86.94b6d10f7dd-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231938" version="1" comment="libdcerpc0 is &lt;4.7.8+git.86.94b6d10f7dd-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231939" version="1" comment="libndr-devel is &lt;4.7.8+git.86.94b6d10f7dd-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231940" version="1" comment="libndr-krb5pac-devel is &lt;4.7.8+git.86.94b6d10f7dd-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231941" version="1" comment="libndr-krb5pac0 is &lt;4.7.8+git.86.94b6d10f7dd-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231942" version="1" comment="libndr-nbt-devel is &lt;4.7.8+git.86.94b6d10f7dd-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231943" version="1" comment="libndr-nbt0 is &lt;4.7.8+git.86.94b6d10f7dd-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231944" version="1" comment="libndr-standard-devel is &lt;4.7.8+git.86.94b6d10f7dd-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231945" version="1" comment="libndr-standard0 is &lt;4.7.8+git.86.94b6d10f7dd-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231946" version="1" comment="libndr0 is &lt;4.7.8+git.86.94b6d10f7dd-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231947" version="1" comment="libnetapi-devel is &lt;4.7.8+git.86.94b6d10f7dd-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231948" version="1" comment="libnetapi0 is &lt;4.7.8+git.86.94b6d10f7dd-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231949" version="1" comment="libsamba-credentials-devel is &lt;4.7.8+git.86.94b6d10f7dd-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231950" version="1" comment="libsamba-credentials0 is &lt;4.7.8+git.86.94b6d10f7dd-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231951" version="1" comment="libsamba-errors-devel is &lt;4.7.8+git.86.94b6d10f7dd-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231952" version="1" comment="libsamba-errors0 is &lt;4.7.8+git.86.94b6d10f7dd-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231953" version="1" comment="libsamba-hostconfig-devel is &lt;4.7.8+git.86.94b6d10f7dd-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231954" version="1" comment="libsamba-hostconfig0 is &lt;4.7.8+git.86.94b6d10f7dd-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231955" version="1" comment="libsamba-passdb-devel is &lt;4.7.8+git.86.94b6d10f7dd-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231956" version="1" comment="libsamba-passdb0 is &lt;4.7.8+git.86.94b6d10f7dd-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231957" version="1" comment="libsamba-policy-devel is &lt;4.7.8+git.86.94b6d10f7dd-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231958" version="1" comment="libsamba-policy0 is &lt;4.7.8+git.86.94b6d10f7dd-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231959" version="1" comment="libsamba-util-devel is &lt;4.7.8+git.86.94b6d10f7dd-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231960" version="1" comment="libsamba-util0 is &lt;4.7.8+git.86.94b6d10f7dd-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231961" version="1" comment="libsamdb-devel is &lt;4.7.8+git.86.94b6d10f7dd-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231962" version="1" comment="libsamdb0 is &lt;4.7.8+git.86.94b6d10f7dd-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231963" version="1" comment="libsmbclient-devel is &lt;4.7.8+git.86.94b6d10f7dd-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231964" version="1" comment="libsmbclient0 is &lt;4.7.8+git.86.94b6d10f7dd-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231965" version="1" comment="libsmbconf-devel is &lt;4.7.8+git.86.94b6d10f7dd-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231966" version="1" comment="libsmbconf0 is &lt;4.7.8+git.86.94b6d10f7dd-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231967" version="1" comment="libsmbldap-devel is &lt;4.7.8+git.86.94b6d10f7dd-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231968" version="1" comment="libsmbldap2 is &lt;4.7.8+git.86.94b6d10f7dd-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231969" version="1" comment="libtevent-util-devel is &lt;4.7.8+git.86.94b6d10f7dd-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231970" version="1" comment="libtevent-util0 is &lt;4.7.8+git.86.94b6d10f7dd-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231971" version="1" comment="libwbclient-devel is &lt;4.7.8+git.86.94b6d10f7dd-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231972" version="1" comment="libwbclient0 is &lt;4.7.8+git.86.94b6d10f7dd-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231973" version="1" comment="samba is &lt;4.7.8+git.86.94b6d10f7dd-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231974" version="1" comment="samba-client is &lt;4.7.8+git.86.94b6d10f7dd-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231975" version="1" comment="samba-core-devel is &lt;4.7.8+git.86.94b6d10f7dd-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231976" version="1" comment="samba-libs is &lt;4.7.8+git.86.94b6d10f7dd-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231977" version="1" comment="samba-winbind is &lt;4.7.8+git.86.94b6d10f7dd-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232211" version="1" comment="qemu is &lt;2.11.2-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232212" version="1" comment="qemu-tools is &lt;2.11.2-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232213" version="1" comment="ucode-intel is &lt;20180807-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232424" version="1" comment="kernel-default is &lt;4.12.14-25.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232425" version="1" comment="kernel-default-devel is &lt;4.12.14-25.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232426" version="1" comment="kernel-default-man is &lt;4.12.14-25.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232427" version="1" comment="kernel-devel is &lt;4.12.14-25.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232428" version="1" comment="kernel-macros is &lt;4.12.14-25.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232429" version="1" comment="kernel-source is &lt;4.12.14-25.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232430" version="1" comment="kernel-zfcpdump is &lt;4.12.14-25.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232651" version="1" comment="xen is &lt;4.10.1_08-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232652" version="1" comment="xen-libs is &lt;4.10.1_08-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232653" version="1" comment="xen-tools-domU is &lt;4.10.1_08-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232654" version="1" comment="curl is &lt;7.60.0-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232655" version="1" comment="libcurl-devel is &lt;7.60.0-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232656" version="1" comment="libcurl4 is &lt;7.60.0-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232657" version="1" comment="libcurl4-32bit is &lt;7.60.0-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233579" version="1" comment="kernel-default is &lt;4.12.14-25.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233580" version="1" comment="kernel-default-devel is &lt;4.12.14-25.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233581" version="1" comment="kernel-default-man is &lt;4.12.14-25.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233582" version="1" comment="kernel-devel is &lt;4.12.14-25.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233583" version="1" comment="kernel-macros is &lt;4.12.14-25.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233584" version="1" comment="kernel-source is &lt;4.12.14-25.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233585" version="1" comment="kernel-zfcpdump is &lt;4.12.14-25.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233743" version="1" comment="libpq5 is &lt;10.5-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233744" version="1" comment="postgresql10 is &lt;10.5-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234221" version="1" comment="qemu is &lt;2.11.2-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234222" version="1" comment="qemu-tools is &lt;2.11.2-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251778" version="1" comment="zsh is &lt;5.6-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234224" version="1" comment="libsolv is &lt;0.6.35-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234225" version="1" comment="libsolv-devel is &lt;0.6.35-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234226" version="1" comment="libsolv-tools is &lt;0.6.35-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234227" version="1" comment="libzypp is &lt;17.6.4-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234228" version="1" comment="libzypp-devel is &lt;17.6.4-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234229" version="1" comment="python-solv is &lt;0.6.35-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251779" version="1" comment="zypper is &lt;1.14.10-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251780" version="1" comment="zypper-log is &lt;1.14.10-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234386" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.34-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234387" version="1" comment="libspice-client-glib-helper is &lt;0.34-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234388" version="1" comment="libspice-client-gtk-3_0-5 is &lt;0.34-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234389" version="1" comment="libspice-controller0 is &lt;0.34-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234390" version="1" comment="spice-gtk is &lt;0.34-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234511" version="1" comment="curl is &lt;7.60.0-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234512" version="1" comment="libcurl-devel is &lt;7.60.0-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234513" version="1" comment="libcurl4 is &lt;7.60.0-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234514" version="1" comment="libcurl4-32bit is &lt;7.60.0-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234732" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.20.5-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234733" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.20.5-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234734" version="1" comment="libwebkit2gtk3-lang is &lt;2.20.5-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234735" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.20.5-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234736" version="1" comment="webkit2gtk3 is &lt;2.20.5-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234744" version="1" comment="pango is &lt;1.40.14-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235065" version="1" comment="shadow is &lt;4.5-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235495" version="1" comment="gd is &lt;2.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235496" version="1" comment="libgd3 is &lt;2.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235497" version="1" comment="libwireshark9 is &lt;2.4.9-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235498" version="1" comment="libwiretap7 is &lt;2.4.9-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235499" version="1" comment="libwscodecs1 is &lt;2.4.9-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235500" version="1" comment="libwsutil8 is &lt;2.4.9-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235501" version="1" comment="wireshark is &lt;2.4.9-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235597" version="1" comment="gnutls is &lt;3.6.2-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235598" version="1" comment="libgnutls-devel is &lt;3.6.2-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235599" version="1" comment="libgnutls30 is &lt;3.6.2-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235600" version="1" comment="libgnutlsxx-devel is &lt;3.6.2-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235601" version="1" comment="libgnutlsxx28 is &lt;3.6.2-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235648" version="1" comment="libX11 is &lt;1.6.5-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235655" version="1" comment="libopenssl-1_1-devel is &lt;1.1.0i-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235657" version="1" comment="libopenssl1_1 is &lt;1.1.0i-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235658" version="1" comment="libopenssl1_1-32bit is &lt;1.1.0i-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235659" version="1" comment="libopenssl1_1-hmac is &lt;1.1.0i-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235660" version="1" comment="libopenssl1_1-hmac-32bit is &lt;1.1.0i-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235662" version="1" comment="openssl-1_1 is &lt;1.1.0i-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235746" version="1" comment="ghostscript is &lt;9.25-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235747" version="1" comment="ghostscript-devel is &lt;9.25-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235748" version="1" comment="ghostscript-x11 is &lt;9.25-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235749" version="1" comment="kernel-default is &lt;4.12.14-25.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235750" version="1" comment="kernel-default-devel is &lt;4.12.14-25.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235751" version="1" comment="kernel-default-man is &lt;4.12.14-25.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235752" version="1" comment="kernel-devel is &lt;4.12.14-25.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235753" version="1" comment="kernel-macros is &lt;4.12.14-25.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235754" version="1" comment="kernel-source is &lt;4.12.14-25.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235755" version="1" comment="kernel-zfcpdump is &lt;4.12.14-25.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235805" version="1" comment="libpython2_7-1_0 is &lt;2.7.14-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235806" version="1" comment="python is &lt;2.7.14-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235807" version="1" comment="python-base is &lt;2.7.14-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235808" version="1" comment="python-curses is &lt;2.7.14-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235809" version="1" comment="python-devel is &lt;2.7.14-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235810" version="1" comment="python-gdbm is &lt;2.7.14-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235811" version="1" comment="python-xml is &lt;2.7.14-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236754" version="1" comment="libxml2 is &lt;2.9.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236755" version="1" comment="libxml2-2 is &lt;2.9.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236756" version="1" comment="libxml2-2-32bit is &lt;2.9.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236757" version="1" comment="libxml2-devel is &lt;2.9.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236758" version="1" comment="libxml2-tools is &lt;2.9.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236759" version="1" comment="python-libxml2-python is &lt;2.9.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236760" version="1" comment="python2-libxml2-python is &lt;2.9.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236761" version="1" comment="python3-libxml2-python is &lt;2.9.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237174" version="1" comment="git is &lt;2.16.4-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237175" version="1" comment="git-core is &lt;2.16.4-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237188" version="1" comment="kernel-default is &lt;4.12.14-25.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237189" version="1" comment="kernel-default-devel is &lt;4.12.14-25.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237190" version="1" comment="kernel-default-man is &lt;4.12.14-25.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237191" version="1" comment="kernel-devel is &lt;4.12.14-25.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237192" version="1" comment="kernel-macros is &lt;4.12.14-25.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237193" version="1" comment="kernel-source is &lt;4.12.14-25.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237194" version="1" comment="kernel-zfcpdump is &lt;4.12.14-25.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237195" version="1" comment="libssh is &lt;0.7.5-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237196" version="1" comment="libssh-devel is &lt;0.7.5-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237197" version="1" comment="libssh4 is &lt;0.7.5-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237198" version="1" comment="libssh4-32bit is &lt;0.7.5-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237199" version="1" comment="binutils is &lt;2.31-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237200" version="1" comment="binutils-devel is &lt;2.31-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251781" version="1" comment="zziplib is &lt;0.13.69-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237392" version="1" comment="clamav is &lt;0.100.2-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237393" version="1" comment="clamav-devel is &lt;0.100.2-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237394" version="1" comment="libclamav7 is &lt;0.100.2-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237395" version="1" comment="libclammspack0 is &lt;0.100.2-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237853" version="1" comment="libwireshark9 is &lt;2.4.10-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237854" version="1" comment="libwiretap7 is &lt;2.4.10-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237855" version="1" comment="libwscodecs1 is &lt;2.4.10-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237856" version="1" comment="libwsutil8 is &lt;2.4.10-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237857" version="1" comment="wireshark is &lt;2.4.10-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237858" version="1" comment="pam_pkcs11 is &lt;0.6.9-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237859" version="1" comment="pam_pkcs11-32bit is &lt;0.6.9-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237906" version="1" comment="libtiff-devel is &lt;4.0.9-5.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237907" version="1" comment="libtiff5 is &lt;4.0.9-5.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237908" version="1" comment="tiff is &lt;4.0.9-5.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237909" version="1" comment="libsnmp30 is &lt;5.7.3-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237910" version="1" comment="net-snmp is &lt;5.7.3-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237911" version="1" comment="net-snmp-devel is &lt;5.7.3-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237912" version="1" comment="perl-SNMP is &lt;5.7.3-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237913" version="1" comment="snmp-mibs is &lt;5.7.3-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238042" version="1" comment="python-cryptography is &lt;2.1.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238043" version="1" comment="python2-cryptography is &lt;2.1.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238253" version="1" comment="lcms2 is &lt;2.9-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238403" version="1" comment="libarchive is &lt;3.3.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238404" version="1" comment="libarchive-devel is &lt;3.3.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238405" version="1" comment="libarchive13 is &lt;3.3.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238459" version="1" comment="kernel-default is &lt;4.12.14-25.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238460" version="1" comment="kernel-default-devel is &lt;4.12.14-25.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238461" version="1" comment="kernel-default-man is &lt;4.12.14-25.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238462" version="1" comment="kernel-devel is &lt;4.12.14-25.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238463" version="1" comment="kernel-macros is &lt;4.12.14-25.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238464" version="1" comment="kernel-source is &lt;4.12.14-25.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238465" version="1" comment="kernel-zfcpdump is &lt;4.12.14-25.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238556" version="1" comment="curl is &lt;7.60.0-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238557" version="1" comment="libcurl-devel is &lt;7.60.0-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238558" version="1" comment="libcurl4 is &lt;7.60.0-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238559" version="1" comment="libcurl4-32bit is &lt;7.60.0-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238560" version="1" comment="opensc is &lt;0.18.0-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238598" version="1" comment="libsystemd0 is &lt;234-24.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238599" version="1" comment="libsystemd0-32bit is &lt;234-24.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238600" version="1" comment="libudev-devel is &lt;234-24.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238601" version="1" comment="libudev1 is &lt;234-24.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238602" version="1" comment="libudev1-32bit is &lt;234-24.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238603" version="1" comment="systemd is &lt;234-24.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238604" version="1" comment="systemd-32bit is &lt;234-24.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238605" version="1" comment="systemd-bash-completion is &lt;234-24.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238606" version="1" comment="systemd-container is &lt;234-24.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238607" version="1" comment="systemd-coredump is &lt;234-24.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238608" version="1" comment="systemd-devel is &lt;234-24.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238609" version="1" comment="systemd-sysvinit is &lt;234-24.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238610" version="1" comment="udev is &lt;234-24.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238676" version="1" comment="myspell-de is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238677" version="1" comment="myspell-de_DE is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238678" version="1" comment="myspell-dictionaries is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238679" version="1" comment="myspell-en is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238680" version="1" comment="myspell-en_US is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238681" version="1" comment="myspell-es is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238682" version="1" comment="myspell-es_ES is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238683" version="1" comment="myspell-hu_HU is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238684" version="1" comment="myspell-lightproof-en is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238685" version="1" comment="myspell-lightproof-hu_HU is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238686" version="1" comment="myspell-lightproof-pt_BR is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238687" version="1" comment="myspell-lightproof-ru_RU is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238688" version="1" comment="myspell-nb_NO is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238689" version="1" comment="myspell-no is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238690" version="1" comment="myspell-pt_BR is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238691" version="1" comment="myspell-ro is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238692" version="1" comment="myspell-ro_RO is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238693" version="1" comment="myspell-ru_RU is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238694" version="1" comment="xorg-x11-server is &lt;1.19.6-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238695" version="1" comment="xorg-x11-server-extra is &lt;1.19.6-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238696" version="1" comment="openssh is &lt;7.6p1-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238697" version="1" comment="openssh-helpers is &lt;7.6p1-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238698" version="1" comment="libxkbcommon is &lt;0.8.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239805" version="1" comment="python2-salt is &lt;2018.3.0-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239806" version="1" comment="python3-salt is &lt;2018.3.0-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239807" version="1" comment="salt is &lt;2018.3.0-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239808" version="1" comment="salt-bash-completion is &lt;2018.3.0-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239809" version="1" comment="salt-doc is &lt;2018.3.0-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239810" version="1" comment="salt-minion is &lt;2018.3.0-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239811" version="1" comment="salt-zsh-completion is &lt;2018.3.0-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240559" version="1" comment="libopenssl-1_1-devel is &lt;1.1.0i-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240560" version="1" comment="libopenssl1_1 is &lt;1.1.0i-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240561" version="1" comment="libopenssl1_1-32bit is &lt;1.1.0i-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240562" version="1" comment="libopenssl1_1-hmac is &lt;1.1.0i-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240563" version="1" comment="libopenssl1_1-hmac-32bit is &lt;1.1.0i-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240564" version="1" comment="openssl-1_1 is &lt;1.1.0i-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240723" version="1" comment="glib2 is &lt;2.54.3-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240724" version="1" comment="glib2-devel is &lt;2.54.3-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240725" version="1" comment="glib2-lang is &lt;2.54.3-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240726" version="1" comment="glib2-tools is &lt;2.54.3-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240727" version="1" comment="libgio-2_0-0 is &lt;2.54.3-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240728" version="1" comment="libgio-2_0-0-32bit is &lt;2.54.3-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240729" version="1" comment="libglib-2_0-0 is &lt;2.54.3-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240730" version="1" comment="libglib-2_0-0-32bit is &lt;2.54.3-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240731" version="1" comment="libgmodule-2_0-0 is &lt;2.54.3-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240732" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.54.3-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240733" version="1" comment="libgobject-2_0-0 is &lt;2.54.3-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240734" version="1" comment="libgobject-2_0-0-32bit is &lt;2.54.3-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240735" version="1" comment="libgthread-2_0-0 is &lt;2.54.3-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240772" version="1" comment="libtiff-devel is &lt;4.0.9-5.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240773" version="1" comment="libtiff5 is &lt;4.0.9-5.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240774" version="1" comment="tiff is &lt;4.0.9-5.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240775" version="1" comment="qemu is &lt;2.11.2-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240776" version="1" comment="qemu-tools is &lt;2.11.2-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240876" version="1" comment="libpq5 is &lt;10.6-4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240877" version="1" comment="postgresql10 is &lt;10.6-4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241119" version="1" comment="ncurses is &lt;6.1-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241271" version="1" comment="libtiff-devel is &lt;4.0.9-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241272" version="1" comment="libtiff5 is &lt;4.0.9-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241273" version="1" comment="tiff is &lt;4.0.9-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241513" version="1" comment="cups is &lt;2.2.7-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241514" version="1" comment="cups-client is &lt;2.2.7-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241515" version="1" comment="cups-config is &lt;2.2.7-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241516" version="1" comment="cups-devel is &lt;2.2.7-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241517" version="1" comment="libcups2 is &lt;2.2.7-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241518" version="1" comment="libcupscgi1 is &lt;2.2.7-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241519" version="1" comment="libcupsimage2 is &lt;2.2.7-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241520" version="1" comment="libcupsmime1 is &lt;2.2.7-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241521" version="1" comment="libcupsppdc1 is &lt;2.2.7-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241522" version="1" comment="libdcerpc-binding0 is &lt;4.7.11+git.140.6bd0e5b30d8-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241523" version="1" comment="libdcerpc-devel is &lt;4.7.11+git.140.6bd0e5b30d8-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241524" version="1" comment="libdcerpc-samr-devel is &lt;4.7.11+git.140.6bd0e5b30d8-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241525" version="1" comment="libdcerpc-samr0 is &lt;4.7.11+git.140.6bd0e5b30d8-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241526" version="1" comment="libdcerpc0 is &lt;4.7.11+git.140.6bd0e5b30d8-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241527" version="1" comment="libndr-devel is &lt;4.7.11+git.140.6bd0e5b30d8-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241528" version="1" comment="libndr-krb5pac-devel is &lt;4.7.11+git.140.6bd0e5b30d8-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241529" version="1" comment="libndr-krb5pac0 is &lt;4.7.11+git.140.6bd0e5b30d8-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241530" version="1" comment="libndr-nbt-devel is &lt;4.7.11+git.140.6bd0e5b30d8-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241531" version="1" comment="libndr-nbt0 is &lt;4.7.11+git.140.6bd0e5b30d8-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241532" version="1" comment="libndr-standard-devel is &lt;4.7.11+git.140.6bd0e5b30d8-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241533" version="1" comment="libndr-standard0 is &lt;4.7.11+git.140.6bd0e5b30d8-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241534" version="1" comment="libndr0 is &lt;4.7.11+git.140.6bd0e5b30d8-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241535" version="1" comment="libnetapi-devel is &lt;4.7.11+git.140.6bd0e5b30d8-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241536" version="1" comment="libnetapi0 is &lt;4.7.11+git.140.6bd0e5b30d8-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241537" version="1" comment="libsamba-credentials-devel is &lt;4.7.11+git.140.6bd0e5b30d8-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241538" version="1" comment="libsamba-credentials0 is &lt;4.7.11+git.140.6bd0e5b30d8-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241539" version="1" comment="libsamba-errors-devel is &lt;4.7.11+git.140.6bd0e5b30d8-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241540" version="1" comment="libsamba-errors0 is &lt;4.7.11+git.140.6bd0e5b30d8-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241541" version="1" comment="libsamba-hostconfig-devel is &lt;4.7.11+git.140.6bd0e5b30d8-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241542" version="1" comment="libsamba-hostconfig0 is &lt;4.7.11+git.140.6bd0e5b30d8-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241543" version="1" comment="libsamba-passdb-devel is &lt;4.7.11+git.140.6bd0e5b30d8-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241544" version="1" comment="libsamba-passdb0 is &lt;4.7.11+git.140.6bd0e5b30d8-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241545" version="1" comment="libsamba-policy-devel is &lt;4.7.11+git.140.6bd0e5b30d8-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241546" version="1" comment="libsamba-policy0 is &lt;4.7.11+git.140.6bd0e5b30d8-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241547" version="1" comment="libsamba-util-devel is &lt;4.7.11+git.140.6bd0e5b30d8-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241548" version="1" comment="libsamba-util0 is &lt;4.7.11+git.140.6bd0e5b30d8-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241549" version="1" comment="libsamdb-devel is &lt;4.7.11+git.140.6bd0e5b30d8-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241550" version="1" comment="libsamdb0 is &lt;4.7.11+git.140.6bd0e5b30d8-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241551" version="1" comment="libsmbclient-devel is &lt;4.7.11+git.140.6bd0e5b30d8-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241552" version="1" comment="libsmbclient0 is &lt;4.7.11+git.140.6bd0e5b30d8-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241553" version="1" comment="libsmbconf-devel is &lt;4.7.11+git.140.6bd0e5b30d8-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241554" version="1" comment="libsmbconf0 is &lt;4.7.11+git.140.6bd0e5b30d8-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241555" version="1" comment="libsmbldap-devel is &lt;4.7.11+git.140.6bd0e5b30d8-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241556" version="1" comment="libsmbldap2 is &lt;4.7.11+git.140.6bd0e5b30d8-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241557" version="1" comment="libtevent-util-devel is &lt;4.7.11+git.140.6bd0e5b30d8-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241558" version="1" comment="libtevent-util0 is &lt;4.7.11+git.140.6bd0e5b30d8-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241559" version="1" comment="libwbclient-devel is &lt;4.7.11+git.140.6bd0e5b30d8-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241560" version="1" comment="libwbclient0 is &lt;4.7.11+git.140.6bd0e5b30d8-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241561" version="1" comment="samba is &lt;4.7.11+git.140.6bd0e5b30d8-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241562" version="1" comment="samba-client is &lt;4.7.11+git.140.6bd0e5b30d8-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241563" version="1" comment="samba-core-devel is &lt;4.7.11+git.140.6bd0e5b30d8-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241564" version="1" comment="samba-libs is &lt;4.7.11+git.140.6bd0e5b30d8-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241565" version="1" comment="samba-winbind is &lt;4.7.11+git.140.6bd0e5b30d8-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241638" version="1" comment="qemu is &lt;2.11.2-9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241639" version="1" comment="qemu-tools is &lt;2.11.2-9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241640" version="1" comment="ghostscript is &lt;9.26-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241641" version="1" comment="ghostscript-devel is &lt;9.26-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241642" version="1" comment="ghostscript-x11 is &lt;9.26-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242035" version="1" comment="libhogweed4 is &lt;3.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242036" version="1" comment="libnettle is &lt;3.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242037" version="1" comment="libnettle-devel is &lt;3.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242038" version="1" comment="libnettle6 is &lt;3.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242039" version="1" comment="bluez is &lt;5.48-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242040" version="1" comment="libbluetooth3 is &lt;5.48-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242197" version="1" comment="libfreebl3 is &lt;3.40.1-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242198" version="1" comment="libfreebl3-32bit is &lt;3.40.1-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242199" version="1" comment="libsoftokn3 is &lt;3.40.1-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242200" version="1" comment="libsoftokn3-32bit is &lt;3.40.1-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242204" version="1" comment="mozilla-nss is &lt;3.40.1-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242205" version="1" comment="mozilla-nss-32bit is &lt;3.40.1-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242206" version="1" comment="mozilla-nss-certs is &lt;3.40.1-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242207" version="1" comment="mozilla-nss-certs-32bit is &lt;3.40.1-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242208" version="1" comment="mozilla-nss-devel is &lt;3.40.1-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242209" version="1" comment="mozilla-nss-sysinit is &lt;3.40.1-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242210" version="1" comment="mozilla-nss-tools is &lt;3.40.1-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242437" version="1" comment="xen is &lt;4.10.2_04-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242438" version="1" comment="xen-libs is &lt;4.10.2_04-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242439" version="1" comment="xen-tools-domU is &lt;4.10.2_04-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242440" version="1" comment="libwireshark9 is &lt;2.4.11-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242441" version="1" comment="libwiretap7 is &lt;2.4.11-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242442" version="1" comment="libwscodecs1 is &lt;2.4.11-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242443" version="1" comment="libwsutil8 is &lt;2.4.11-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242444" version="1" comment="wireshark is &lt;2.4.11-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251783" version="1" comment="jasper is &lt;2.0.14-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252003" version="1" comment="avahi is &lt;0.6.32-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252004" version="1" comment="avahi-compat-howl-devel is &lt;0.6.32-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252005" version="1" comment="avahi-compat-mDNSResponder-devel is &lt;0.6.32-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252006" version="1" comment="avahi-glib2 is &lt;0.6.32-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252007" version="1" comment="avahi-lang is &lt;0.6.32-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252008" version="1" comment="avahi-utils is &lt;0.6.32-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252013" version="1" comment="gamin-devel is &lt;0.1.10-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252014" version="1" comment="gnutls is &lt;3.6.2-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252015" version="1" comment="ldb is &lt;1.2.4-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252016" version="1" comment="libavahi-client3 is &lt;0.6.32-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252017" version="1" comment="libavahi-client3-32bit is &lt;0.6.32-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252018" version="1" comment="libavahi-common3 is &lt;0.6.32-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252019" version="1" comment="libavahi-common3-32bit is &lt;0.6.32-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252020" version="1" comment="libavahi-core7 is &lt;0.6.32-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252021" version="1" comment="libavahi-devel is &lt;0.6.32-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252022" version="1" comment="libavahi-glib-devel is &lt;0.6.32-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252023" version="1" comment="libavahi-glib1 is &lt;0.6.32-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252024" version="1" comment="libavahi-gobject0 is &lt;0.6.32-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252025" version="1" comment="libavahi-ui-gtk3-0 is &lt;0.6.32-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252026" version="1" comment="libavahi-ui0 is &lt;0.6.32-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252033" version="1" comment="libdcerpc-binding0 is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252034" version="1" comment="libdcerpc-binding0-32bit is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252035" version="1" comment="libdcerpc-devel is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252036" version="1" comment="libdcerpc-samr-devel is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252037" version="1" comment="libdcerpc-samr0 is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252038" version="1" comment="libdcerpc0 is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252039" version="1" comment="libdcerpc0-32bit is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252040" version="1" comment="libdns_sd is &lt;0.6.32-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252041" version="1" comment="libfam0-gamin is &lt;0.1.10-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252042" version="1" comment="libfam0-gamin-32bit is &lt;0.1.10-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252043" version="1" comment="libgamin-1-0 is &lt;0.1.10-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252044" version="1" comment="libgnutls-devel is &lt;3.6.2-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252045" version="1" comment="libgnutls30 is &lt;3.6.2-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252046" version="1" comment="libgnutls30-32bit is &lt;3.6.2-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252047" version="1" comment="libgnutlsxx-devel is &lt;3.6.2-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252048" version="1" comment="libgnutlsxx28 is &lt;3.6.2-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252051" version="1" comment="libhowl0 is &lt;0.6.32-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252052" version="1" comment="libldb-devel is &lt;1.2.4-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252053" version="1" comment="libldb1 is &lt;1.2.4-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252054" version="1" comment="libldb1-32bit is &lt;1.2.4-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252055" version="1" comment="libndr-devel is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252056" version="1" comment="libndr-krb5pac-devel is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252057" version="1" comment="libndr-krb5pac0 is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252058" version="1" comment="libndr-krb5pac0-32bit is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252059" version="1" comment="libndr-nbt-devel is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252060" version="1" comment="libndr-nbt0 is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252061" version="1" comment="libndr-nbt0-32bit is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252062" version="1" comment="libndr-standard-devel is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252063" version="1" comment="libndr-standard0 is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252064" version="1" comment="libndr-standard0-32bit is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252065" version="1" comment="libndr0 is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252066" version="1" comment="libndr0-32bit is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252067" version="1" comment="libnetapi-devel is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252068" version="1" comment="libnetapi0 is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252069" version="1" comment="libnetapi0-32bit is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252070" version="1" comment="libnettle is &lt;3.4.1-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252074" version="1" comment="libp11-kit0 is &lt;0.23.2-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252075" version="1" comment="libp11-kit0-32bit is &lt;0.23.2-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252076" version="1" comment="libsamba-credentials-devel is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252077" version="1" comment="libsamba-credentials0 is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252078" version="1" comment="libsamba-credentials0-32bit is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252079" version="1" comment="libsamba-errors-devel is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252080" version="1" comment="libsamba-errors0 is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252081" version="1" comment="libsamba-errors0-32bit is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252082" version="1" comment="libsamba-hostconfig-devel is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252083" version="1" comment="libsamba-hostconfig0 is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252084" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252085" version="1" comment="libsamba-passdb-devel is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252086" version="1" comment="libsamba-passdb0 is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252087" version="1" comment="libsamba-passdb0-32bit is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252088" version="1" comment="libsamba-policy-devel is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252089" version="1" comment="libsamba-policy0 is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252090" version="1" comment="libsamba-util-devel is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252091" version="1" comment="libsamba-util0 is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252092" version="1" comment="libsamba-util0-32bit is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252093" version="1" comment="libsamdb-devel is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252094" version="1" comment="libsamdb0 is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252095" version="1" comment="libsamdb0-32bit is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252096" version="1" comment="libsmbclient-devel is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252097" version="1" comment="libsmbclient0 is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252098" version="1" comment="libsmbclient0-32bit is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252099" version="1" comment="libsmbconf-devel is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252100" version="1" comment="libsmbconf0 is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252101" version="1" comment="libsmbconf0-32bit is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252102" version="1" comment="libsmbldap-devel is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252103" version="1" comment="libsmbldap2 is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252104" version="1" comment="libsmbldap2-32bit is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252105" version="1" comment="libtalloc-devel is &lt;2.1.11-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252106" version="1" comment="libtalloc2 is &lt;2.1.11-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252107" version="1" comment="libtalloc2-32bit is &lt;2.1.11-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252112" version="1" comment="libtdb-devel is &lt;1.3.15-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252113" version="1" comment="libtdb1 is &lt;1.3.15-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252114" version="1" comment="libtdb1-32bit is &lt;1.3.15-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252115" version="1" comment="libtevent-devel is &lt;0.9.36-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252116" version="1" comment="libtevent-util-devel is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252117" version="1" comment="libtevent-util0 is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252118" version="1" comment="libtevent-util0-32bit is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252119" version="1" comment="libtevent0 is &lt;0.9.36-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252120" version="1" comment="libtevent0-32bit is &lt;0.9.36-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252121" version="1" comment="libwbclient-devel is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252122" version="1" comment="libwbclient0 is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252123" version="1" comment="libwbclient0-32bit is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252124" version="1" comment="p11-kit is &lt;0.23.2-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252125" version="1" comment="p11-kit-devel is &lt;0.23.2-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252126" version="1" comment="p11-kit-nss-trust is &lt;0.23.2-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252127" version="1" comment="p11-kit-tools is &lt;0.23.2-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252128" version="1" comment="python-ldb is &lt;1.2.4-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252129" version="1" comment="python-ldb-devel is &lt;1.2.4-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252130" version="1" comment="python-talloc is &lt;2.1.11-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252131" version="1" comment="python-talloc-devel is &lt;2.1.11-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252132" version="1" comment="python3-ldb is &lt;1.2.4-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252133" version="1" comment="python3-ldb-devel is &lt;1.2.4-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252134" version="1" comment="python3-talloc is &lt;2.1.11-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252135" version="1" comment="python3-talloc-devel is &lt;2.1.11-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252136" version="1" comment="samba is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252137" version="1" comment="samba-client is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252138" version="1" comment="samba-client-32bit is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252139" version="1" comment="samba-core-devel is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252140" version="1" comment="samba-libs is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252141" version="1" comment="samba-libs-32bit is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252142" version="1" comment="samba-winbind is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252143" version="1" comment="samba-winbind-32bit is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252144" version="1" comment="talloc is &lt;2.1.11-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252145" version="1" comment="talloc-man is &lt;2.1.11-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252146" version="1" comment="tdb is &lt;1.3.15-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252147" version="1" comment="tdb-tools is &lt;1.3.15-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252148" version="1" comment="tevent is &lt;0.9.36-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252149" version="1" comment="tevent-man is &lt;0.9.36-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252150" version="1" comment="typelib-1_0-Avahi-0_6 is &lt;0.6.32-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252438" version="1" comment="libssh2_org is &lt;1.8.0-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243052" version="1" comment="zeromq is &lt;4.2.3-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252723" version="1" comment="libykcs11-1 is &lt;1.5.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252724" version="1" comment="libykcs11-devel is &lt;1.5.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252725" version="1" comment="libykpiv-devel is &lt;1.5.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252726" version="1" comment="libykpiv1 is &lt;1.5.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252727" version="1" comment="yubico-piv-tool is &lt;1.5.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252849" version="1" comment="webkit2gtk3 is &lt;2.24.1-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252943" version="1" comment="python-Jinja2 is &lt;2.10.1-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252944" version="1" comment="python2-Jinja2 is &lt;2.10.1-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253176" version="1" comment="bzip2 is &lt;1.0.6-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253177" version="1" comment="libbz2-1 is &lt;1.0.6-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253178" version="1" comment="libbz2-1-32bit is &lt;1.0.6-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253179" version="1" comment="libbz2-devel is &lt;1.0.6-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253320" version="1" comment="libxslt is &lt;1.1.32-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253321" version="1" comment="libxslt-devel is &lt;1.1.32-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253322" version="1" comment="libxslt-tools is &lt;1.1.32-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253323" version="1" comment="libxslt1 is &lt;1.1.32-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253532" version="1" comment="ucode-intel is &lt;20190507-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253390" version="1" comment="qemu is &lt;2.11.2-9.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253391" version="1" comment="qemu-tools is &lt;2.11.2-9.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253392" version="1" comment="kernel-default is &lt;4.12.14-150.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253393" version="1" comment="kernel-default-base is &lt;4.12.14-150.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253394" version="1" comment="kernel-default-devel is &lt;4.12.14-150.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253395" version="1" comment="kernel-default-man is &lt;4.12.14-150.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253396" version="1" comment="kernel-devel is &lt;4.12.14-150.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253397" version="1" comment="kernel-macros is &lt;4.12.14-150.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253398" version="1" comment="kernel-source is &lt;4.12.14-150.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253399" version="1" comment="kernel-zfcpdump is &lt;4.12.14-150.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253533" version="1" comment="xen is &lt;4.10.3_04-3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253534" version="1" comment="xen-libs is &lt;4.10.3_04-3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253535" version="1" comment="xen-tools-domU is &lt;4.10.3_04-3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243143" version="1" comment="openssh is &lt;7.6p1-9.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243144" version="1" comment="openssh-helpers is &lt;7.6p1-9.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253607" version="1" comment="graphviz is &lt;2.40.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253608" version="1" comment="graphviz-devel is &lt;2.40.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253609" version="1" comment="graphviz-plugins-core is &lt;2.40.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253610" version="1" comment="libgraphviz6 is &lt;2.40.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253752" version="1" comment="libvirt is &lt;4.0.0-9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253753" version="1" comment="libvirt-libs is &lt;4.0.0-9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253855" version="1" comment="nmap is &lt;7.70-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243145" version="1" comment="libwireshark9 is &lt;2.4.12-3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243146" version="1" comment="libwiretap7 is &lt;2.4.12-3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243147" version="1" comment="libwscodecs1 is &lt;2.4.12-3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243148" version="1" comment="libwsutil8 is &lt;2.4.12-3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243149" version="1" comment="wireshark is &lt;2.4.12-3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254004" version="1" comment="ucode-intel is &lt;20190514-3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254127" version="1" comment="libu2f-host is &lt;1.1.6-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254128" version="1" comment="libu2f-host-devel is &lt;1.1.6-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254129" version="1" comment="libu2f-host0 is &lt;1.1.6-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254130" version="1" comment="gnutls is &lt;3.6.7-6.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254131" version="1" comment="libgnutls-devel is &lt;3.6.7-6.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254132" version="1" comment="libgnutls30 is &lt;3.6.7-6.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254133" version="1" comment="libgnutls30-32bit is &lt;3.6.7-6.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254134" version="1" comment="libgnutlsxx-devel is &lt;3.6.7-6.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254135" version="1" comment="libgnutlsxx28 is &lt;3.6.7-6.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254136" version="1" comment="libpython3_6m1_0 is &lt;3.6.8-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254137" version="1" comment="python3 is &lt;3.6.8-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254138" version="1" comment="python3-base is &lt;3.6.8-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254139" version="1" comment="python3-curses is &lt;3.6.8-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254140" version="1" comment="python3-dbm is &lt;3.6.8-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254141" version="1" comment="python3-devel is &lt;3.6.8-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254142" version="1" comment="python3-idle is &lt;3.6.8-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254143" version="1" comment="python3-tk is &lt;3.6.8-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254144" version="1" comment="bluez is &lt;5.48-5.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254145" version="1" comment="libbluetooth3 is &lt;5.48-5.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254272" version="1" comment="libvirt is &lt;4.0.0-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254273" version="1" comment="libvirt-libs is &lt;4.0.0-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254274" version="1" comment="curl is &lt;7.60.0-3.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254275" version="1" comment="libcurl-devel is &lt;7.60.0-3.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254276" version="1" comment="libcurl4 is &lt;7.60.0-3.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254277" version="1" comment="libcurl4-32bit is &lt;7.60.0-3.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254411" version="1" comment="libsystemd0 is &lt;234-24.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254412" version="1" comment="libsystemd0-32bit is &lt;234-24.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254413" version="1" comment="libudev-devel is &lt;234-24.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254414" version="1" comment="libudev1 is &lt;234-24.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254415" version="1" comment="libudev1-32bit is &lt;234-24.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254416" version="1" comment="systemd is &lt;234-24.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254417" version="1" comment="systemd-32bit is &lt;234-24.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254418" version="1" comment="systemd-bash-completion is &lt;234-24.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254419" version="1" comment="systemd-container is &lt;234-24.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254420" version="1" comment="systemd-coredump is &lt;234-24.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254421" version="1" comment="systemd-devel is &lt;234-24.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254422" version="1" comment="systemd-sysvinit is &lt;234-24.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254423" version="1" comment="udev is &lt;234-24.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254424" version="1" comment="system-user-root is &lt;20190513-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254425" version="1" comment="NetworkManager is &lt;1.10.6-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254426" version="1" comment="libnm0 is &lt;1.10.6-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254427" version="1" comment="typelib-1_0-NM-1_0 is &lt;1.10.6-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243197" version="1" comment="libsystemd0 is &lt;234-24.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243198" version="1" comment="libsystemd0-32bit is &lt;234-24.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243199" version="1" comment="libudev-devel is &lt;234-24.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243200" version="1" comment="libudev1 is &lt;234-24.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243201" version="1" comment="libudev1-32bit is &lt;234-24.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243202" version="1" comment="systemd is &lt;234-24.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243203" version="1" comment="systemd-32bit is &lt;234-24.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243204" version="1" comment="systemd-bash-completion is &lt;234-24.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243205" version="1" comment="systemd-container is &lt;234-24.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243206" version="1" comment="systemd-coredump is &lt;234-24.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243207" version="1" comment="systemd-devel is &lt;234-24.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243208" version="1" comment="systemd-sysvinit is &lt;234-24.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243209" version="1" comment="udev is &lt;234-24.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254428" version="1" comment="libtasn1 is &lt;4.13-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254429" version="1" comment="libtasn1-6 is &lt;4.13-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254430" version="1" comment="libtasn1-6-32bit is &lt;4.13-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254431" version="1" comment="libtasn1-devel is &lt;4.13-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254432" version="1" comment="axis is &lt;1.4-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254562" version="1" comment="libtag1 is &lt;1.11.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254563" version="1" comment="taglib is &lt;1.11.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255736" version="1" comment="cron is &lt;4.2-6.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255737" version="1" comment="cronie is &lt;1.5.1-6.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255738" version="1" comment="libpng16 is &lt;1.6.34-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255739" version="1" comment="libpng16-16 is &lt;1.6.34-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255740" version="1" comment="libpng16-16-32bit is &lt;1.6.34-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255741" version="1" comment="libpng16-compat-devel is &lt;1.6.34-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255742" version="1" comment="libpng16-devel is &lt;1.6.34-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255805" version="1" comment="bind is &lt;9.11.2-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255806" version="1" comment="bind-devel is &lt;9.11.2-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255807" version="1" comment="bind-utils is &lt;9.11.2-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255808" version="1" comment="libbind9-160 is &lt;9.11.2-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255809" version="1" comment="libdns169 is &lt;9.11.2-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255810" version="1" comment="libirs-devel is &lt;9.11.2-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255811" version="1" comment="libirs160 is &lt;9.11.2-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255812" version="1" comment="libisc166 is &lt;9.11.2-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255813" version="1" comment="libisccc160 is &lt;9.11.2-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255814" version="1" comment="libisccfg160 is &lt;9.11.2-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255815" version="1" comment="liblwres160 is &lt;9.11.2-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255816" version="1" comment="python3-bind is &lt;9.11.2-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243275" version="1" comment="ghostscript is &lt;9.26a-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243276" version="1" comment="ghostscript-devel is &lt;9.26a-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243277" version="1" comment="ghostscript-x11 is &lt;9.26a-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256567" version="1" comment="vim is &lt;8.0.1568-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256568" version="1" comment="vim-data is &lt;8.0.1568-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256569" version="1" comment="vim-data-common is &lt;8.0.1568-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256675" version="1" comment="libipa_hbac-devel is &lt;1.16.1-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256676" version="1" comment="libipa_hbac0 is &lt;1.16.1-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256677" version="1" comment="libsss_certmap-devel is &lt;1.16.1-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256678" version="1" comment="libsss_certmap0 is &lt;1.16.1-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256679" version="1" comment="libsss_idmap-devel is &lt;1.16.1-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256680" version="1" comment="libsss_idmap0 is &lt;1.16.1-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256681" version="1" comment="libsss_nss_idmap-devel is &lt;1.16.1-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256682" version="1" comment="libsss_nss_idmap0 is &lt;1.16.1-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256683" version="1" comment="libsss_simpleifp-devel is &lt;1.16.1-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256684" version="1" comment="libsss_simpleifp0 is &lt;1.16.1-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256685" version="1" comment="python3-sssd-config is &lt;1.16.1-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256686" version="1" comment="sssd is &lt;1.16.1-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256688" version="1" comment="sssd-ad is &lt;1.16.1-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256689" version="1" comment="sssd-dbus is &lt;1.16.1-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256690" version="1" comment="sssd-ipa is &lt;1.16.1-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256691" version="1" comment="sssd-krb5 is &lt;1.16.1-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256692" version="1" comment="sssd-krb5-common is &lt;1.16.1-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256693" version="1" comment="sssd-ldap is &lt;1.16.1-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256694" version="1" comment="sssd-proxy is &lt;1.16.1-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256695" version="1" comment="sssd-tools is &lt;1.16.1-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256696" version="1" comment="sssd-wbclient is &lt;1.16.1-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256697" version="1" comment="sssd-wbclient-devel is &lt;1.16.1-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256741" version="1" comment="elfutils is &lt;0.168-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256742" version="1" comment="elfutils-lang is &lt;0.168-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256743" version="1" comment="libasm-devel is &lt;0.168-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256744" version="1" comment="libasm1 is &lt;0.168-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256745" version="1" comment="libdw-devel is &lt;0.168-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256746" version="1" comment="libdw1 is &lt;0.168-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256747" version="1" comment="libdw1-32bit is &lt;0.168-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256748" version="1" comment="libebl-devel is &lt;0.168-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256749" version="1" comment="libebl-plugins is &lt;0.168-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256750" version="1" comment="libebl-plugins-32bit is &lt;0.168-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256751" version="1" comment="libelf-devel is &lt;0.168-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256752" version="1" comment="libelf1 is &lt;0.168-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256753" version="1" comment="libelf1-32bit is &lt;0.168-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256900" version="1" comment="dbus-1 is &lt;1.12.2-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256901" version="1" comment="dbus-1-devel is &lt;1.12.2-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256902" version="1" comment="dbus-1-x11 is &lt;1.12.2-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256903" version="1" comment="libdbus-1-3 is &lt;1.12.2-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256904" version="1" comment="libdbus-1-3-32bit is &lt;1.12.2-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256905" version="1" comment="libnetpbm11 is &lt;10.80.1-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256906" version="1" comment="netpbm is &lt;10.80.1-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256907" version="1" comment="kernel-default is &lt;4.12.14-150.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256908" version="1" comment="kernel-default-base is &lt;4.12.14-150.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256909" version="1" comment="kernel-default-devel is &lt;4.12.14-150.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256910" version="1" comment="kernel-default-man is &lt;4.12.14-150.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256911" version="1" comment="kernel-devel is &lt;4.12.14-150.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256912" version="1" comment="kernel-macros is &lt;4.12.14-150.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256913" version="1" comment="kernel-source is &lt;4.12.14-150.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256914" version="1" comment="kernel-zfcpdump is &lt;4.12.14-150.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257625" version="1" comment="glib2 is &lt;2.54.3-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257626" version="1" comment="glib2-devel is &lt;2.54.3-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257627" version="1" comment="glib2-lang is &lt;2.54.3-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257628" version="1" comment="glib2-tools is &lt;2.54.3-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257629" version="1" comment="libgio-2_0-0 is &lt;2.54.3-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257630" version="1" comment="libgio-2_0-0-32bit is &lt;2.54.3-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257631" version="1" comment="libglib-2_0-0 is &lt;2.54.3-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257632" version="1" comment="libglib-2_0-0-32bit is &lt;2.54.3-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257633" version="1" comment="libgmodule-2_0-0 is &lt;2.54.3-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257634" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.54.3-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257635" version="1" comment="libgobject-2_0-0 is &lt;2.54.3-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257636" version="1" comment="libgobject-2_0-0-32bit is &lt;2.54.3-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257637" version="1" comment="libgthread-2_0-0 is &lt;2.54.3-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257638" version="1" comment="dbus-1 is &lt;1.12.2-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257639" version="1" comment="dbus-1-devel is &lt;1.12.2-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257640" version="1" comment="dbus-1-x11 is &lt;1.12.2-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257641" version="1" comment="libdbus-1-3 is &lt;1.12.2-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257642" version="1" comment="libdbus-1-3-32bit is &lt;1.12.2-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257643" version="1" comment="libwireshark9 is &lt;2.4.15-3.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257644" version="1" comment="libwiretap7 is &lt;2.4.15-3.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257645" version="1" comment="libwscodecs1 is &lt;2.4.15-3.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257646" version="1" comment="libwsutil8 is &lt;2.4.15-3.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257647" version="1" comment="wireshark is &lt;2.4.15-3.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257648" version="1" comment="libvirt is &lt;4.0.0-9.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257649" version="1" comment="libvirt-libs is &lt;4.0.0-9.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243334" version="1" comment="python-paramiko is &lt;2.4.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243335" version="1" comment="python2-paramiko is &lt;2.4.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243336" version="1" comment="krb5 is &lt;1.15.2-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243337" version="1" comment="krb5-32bit is &lt;1.15.2-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243338" version="1" comment="krb5-client is &lt;1.15.2-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243339" version="1" comment="krb5-devel is &lt;1.15.2-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243340" version="1" comment="krb5-plugin-preauth-otp is &lt;1.15.2-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243341" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.15.2-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258924" version="1" comment="libu2f-host is &lt;1.1.6-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258925" version="1" comment="libu2f-host-devel is &lt;1.1.6-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258926" version="1" comment="libu2f-host0 is &lt;1.1.6-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258927" version="1" comment="pam_u2f is &lt;1.0.8-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258942" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.24.2-3.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258943" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.24.2-3.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258944" version="1" comment="libwebkit2gtk3-lang is &lt;2.24.2-3.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258945" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.24.2-3.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258946" version="1" comment="webkit2gtk3 is &lt;2.24.2-3.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258947" version="1" comment="libzmq5 is &lt;4.2.3-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258948" version="1" comment="zeromq is &lt;4.2.3-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258949" version="1" comment="zeromq-devel is &lt;4.2.3-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259016" version="1" comment="kernel-firmware is &lt;20190618-3.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259017" version="1" comment="ucode-amd is &lt;20190618-3.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259018" version="1" comment="libruby2_5-2_5 is &lt;2.5.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259019" version="1" comment="ruby2.5 is &lt;2.5.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259020" version="1" comment="ruby2.5-devel is &lt;2.5.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259021" version="1" comment="ruby2.5-devel-extra is &lt;2.5.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259022" version="1" comment="ruby2.5-stdlib is &lt;2.5.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259023" version="1" comment="libpq5 is &lt;10.9-4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259024" version="1" comment="postgresql10 is &lt;10.9-4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259058" version="1" comment="glib2 is &lt;2.54.3-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259059" version="1" comment="glib2-devel is &lt;2.54.3-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259060" version="1" comment="glib2-lang is &lt;2.54.3-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259061" version="1" comment="glib2-tools is &lt;2.54.3-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259062" version="1" comment="libgio-2_0-0 is &lt;2.54.3-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259063" version="1" comment="libgio-2_0-0-32bit is &lt;2.54.3-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259064" version="1" comment="libglib-2_0-0 is &lt;2.54.3-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259065" version="1" comment="libglib-2_0-0-32bit is &lt;2.54.3-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259066" version="1" comment="libgmodule-2_0-0 is &lt;2.54.3-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259067" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.54.3-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259068" version="1" comment="libgobject-2_0-0 is &lt;2.54.3-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259069" version="1" comment="libgobject-2_0-0-32bit is &lt;2.54.3-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259070" version="1" comment="libgthread-2_0-0 is &lt;2.54.3-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259071" version="1" comment="expat is &lt;2.2.5-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259072" version="1" comment="libexpat-devel is &lt;2.2.5-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259073" version="1" comment="libexpat1 is &lt;2.2.5-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259074" version="1" comment="libexpat1-32bit is &lt;2.2.5-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259214" version="1" comment="bzip2 is &lt;1.0.6-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259215" version="1" comment="libbz2-1 is &lt;1.0.6-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259216" version="1" comment="libbz2-1-32bit is &lt;1.0.6-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259217" version="1" comment="libbz2-devel is &lt;1.0.6-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259218" version="1" comment="kernel-default is &lt;4.12.14-150.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259219" version="1" comment="kernel-default-base is &lt;4.12.14-150.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259220" version="1" comment="kernel-default-devel is &lt;4.12.14-150.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259221" version="1" comment="kernel-default-man is &lt;4.12.14-150.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259222" version="1" comment="kernel-devel is &lt;4.12.14-150.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259223" version="1" comment="kernel-macros is &lt;4.12.14-150.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259224" version="1" comment="kernel-source is &lt;4.12.14-150.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259225" version="1" comment="kernel-zfcpdump is &lt;4.12.14-150.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259226" version="1" comment="libgcrypt is &lt;1.8.2-6.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259227" version="1" comment="libgcrypt-devel is &lt;1.8.2-6.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259228" version="1" comment="libgcrypt20 is &lt;1.8.2-6.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259229" version="1" comment="libgcrypt20-32bit is &lt;1.8.2-6.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259230" version="1" comment="libgcrypt20-hmac is &lt;1.8.2-6.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259231" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.8.2-6.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259378" version="1" comment="libfreebl3 is &lt;3.44.1-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259379" version="1" comment="libfreebl3-32bit is &lt;3.44.1-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259380" version="1" comment="libfreebl3-hmac is &lt;3.44.1-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259381" version="1" comment="libfreebl3-hmac-32bit is &lt;3.44.1-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259382" version="1" comment="libsoftokn3 is &lt;3.44.1-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259383" version="1" comment="libsoftokn3-32bit is &lt;3.44.1-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259384" version="1" comment="libsoftokn3-hmac is &lt;3.44.1-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259385" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.44.1-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259386" version="1" comment="mozilla-nss is &lt;3.44.1-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259387" version="1" comment="mozilla-nss-32bit is &lt;3.44.1-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259388" version="1" comment="mozilla-nss-certs is &lt;3.44.1-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259389" version="1" comment="mozilla-nss-certs-32bit is &lt;3.44.1-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259390" version="1" comment="mozilla-nss-devel is &lt;3.44.1-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259391" version="1" comment="mozilla-nss-sysinit is &lt;3.44.1-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259392" version="1" comment="mozilla-nss-tools is &lt;3.44.1-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259711" version="1" comment="glibc is &lt;2.26-13.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259712" version="1" comment="glibc-32bit is &lt;2.26-13.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259713" version="1" comment="glibc-devel is &lt;2.26-13.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259714" version="1" comment="glibc-extra is &lt;2.26-13.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259715" version="1" comment="glibc-i18ndata is &lt;2.26-13.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259716" version="1" comment="glibc-info is &lt;2.26-13.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259717" version="1" comment="glibc-locale is &lt;2.26-13.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259718" version="1" comment="glibc-locale-base is &lt;2.26-13.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259719" version="1" comment="glibc-profile is &lt;2.26-13.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259720" version="1" comment="nscd is &lt;2.26-13.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259721" version="1" comment="myspell-de is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259722" version="1" comment="myspell-de_DE is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259723" version="1" comment="myspell-dictionaries is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259724" version="1" comment="myspell-en is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259725" version="1" comment="myspell-en_US is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259726" version="1" comment="myspell-es is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259727" version="1" comment="myspell-es_ES is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259728" version="1" comment="myspell-hu_HU is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259729" version="1" comment="myspell-lightproof-en is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259730" version="1" comment="myspell-lightproof-hu_HU is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259731" version="1" comment="myspell-lightproof-pt_BR is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259732" version="1" comment="myspell-lightproof-ru_RU is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259733" version="1" comment="myspell-nb_NO is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259734" version="1" comment="myspell-no is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259735" version="1" comment="myspell-pt_BR is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259736" version="1" comment="myspell-ro is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259737" version="1" comment="myspell-ro_RO is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259738" version="1" comment="myspell-ru_RU is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260056" version="1" comment="ucode-intel is &lt;20190618-3.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243344" version="1" comment="libopenssl-1_1-devel is &lt;1.1.0i-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243345" version="1" comment="libopenssl1_1 is &lt;1.1.0i-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243346" version="1" comment="libopenssl1_1-32bit is &lt;1.1.0i-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243347" version="1" comment="libopenssl1_1-hmac is &lt;1.1.0i-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243348" version="1" comment="libopenssl1_1-hmac-32bit is &lt;1.1.0i-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243349" version="1" comment="openssl-1_1 is &lt;1.1.0i-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260652" version="1" comment="java-11-openjdk is &lt;11.0.4.0-3.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260653" version="1" comment="java-11-openjdk-demo is &lt;11.0.4.0-3.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260654" version="1" comment="java-11-openjdk-devel is &lt;11.0.4.0-3.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260655" version="1" comment="java-11-openjdk-headless is &lt;11.0.4.0-3.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260656" version="1" comment="bzip2 is &lt;1.0.6-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260657" version="1" comment="libbz2-1 is &lt;1.0.6-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260658" version="1" comment="libbz2-1-32bit is &lt;1.0.6-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260659" version="1" comment="libbz2-devel is &lt;1.0.6-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260660" version="1" comment="gpg2 is &lt;2.2.5-4.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260661" version="1" comment="gpg2-lang is &lt;2.2.5-4.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260662" version="1" comment="perl-Mail-SpamAssassin is &lt;3.4.2-7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260663" version="1" comment="spamassassin is &lt;3.4.2-7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260866" version="1" comment="libpolkit0 is &lt;0.114-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260867" version="1" comment="polkit is &lt;0.114-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260868" version="1" comment="polkit-devel is &lt;0.114-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260869" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.114-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260870" version="1" comment="libmariadb3 is &lt;3.1.2-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260871" version="1" comment="libmariadbprivate is &lt;3.1.2-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260872" version="1" comment="mariadb-connector-c is &lt;3.1.2-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260957" version="1" comment="libsolv-devel is &lt;0.7.5-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260958" version="1" comment="libyui-ncurses-pkg-devel is &lt;2.48.5.2-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260959" version="1" comment="libyui-ncurses-pkg-doc is &lt;2.48.5.2-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260960" version="1" comment="libyui-qt-pkg-doc is &lt;2.45.15.2-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260961" version="1" comment="libzypp-devel is &lt;17.12.0-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260962" version="1" comment="python-solv is &lt;0.7.5-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260963" version="1" comment="zypper-log is &lt;1.14.28-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260964" version="1" comment="subversion is &lt;1.10.6-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260965" version="1" comment="subversion-devel is &lt;1.10.6-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260966" version="1" comment="libpython3_6m1_0 is &lt;3.6.8-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260967" version="1" comment="python3 is &lt;3.6.8-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260968" version="1" comment="python3-base is &lt;3.6.8-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260969" version="1" comment="python3-curses is &lt;3.6.8-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260970" version="1" comment="python3-dbm is &lt;3.6.8-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260971" version="1" comment="python3-devel is &lt;3.6.8-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260972" version="1" comment="python3-idle is &lt;3.6.8-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260973" version="1" comment="python3-tk is &lt;3.6.8-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260974" version="1" comment="libpython2_7-1_0 is &lt;2.7.14-7.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260975" version="1" comment="python is &lt;2.7.14-7.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260976" version="1" comment="python-base is &lt;2.7.14-7.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260977" version="1" comment="python-curses is &lt;2.7.14-7.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260978" version="1" comment="python-devel is &lt;2.7.14-7.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260979" version="1" comment="python-gdbm is &lt;2.7.14-7.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260980" version="1" comment="python-xml is &lt;2.7.14-7.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260981" version="1" comment="kernel-default is &lt;4.12.14-150.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260982" version="1" comment="kernel-default-base is &lt;4.12.14-150.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260983" version="1" comment="kernel-default-devel is &lt;4.12.14-150.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260984" version="1" comment="kernel-default-man is &lt;4.12.14-150.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260985" version="1" comment="kernel-devel is &lt;4.12.14-150.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260986" version="1" comment="kernel-macros is &lt;4.12.14-150.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260987" version="1" comment="kernel-source is &lt;4.12.14-150.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260988" version="1" comment="kernel-zfcpdump is &lt;4.12.14-150.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260989" version="1" comment="tcpdump is &lt;4.9.2-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260990" version="1" comment="libwireshark9 is &lt;2.4.16-3.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260991" version="1" comment="libwiretap7 is &lt;2.4.16-3.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260992" version="1" comment="libwscodecs1 is &lt;2.4.16-3.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260993" version="1" comment="libwsutil8 is &lt;2.4.16-3.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260994" version="1" comment="wireshark is &lt;2.4.16-3.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261419" version="1" comment="libpython2_7-1_0 is &lt;2.7.14-7.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261420" version="1" comment="python is &lt;2.7.14-7.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261421" version="1" comment="python-base is &lt;2.7.14-7.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261422" version="1" comment="python-curses is &lt;2.7.14-7.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261423" version="1" comment="python-devel is &lt;2.7.14-7.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261424" version="1" comment="python-gdbm is &lt;2.7.14-7.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261425" version="1" comment="python-xml is &lt;2.7.14-7.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243564" version="1" comment="libpython3_6m1_0 is &lt;3.6.5-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243565" version="1" comment="python3 is &lt;3.6.5-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243566" version="1" comment="python3-base is &lt;3.6.5-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243567" version="1" comment="python3-curses is &lt;3.6.5-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243568" version="1" comment="python3-dbm is &lt;3.6.5-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243569" version="1" comment="python3-devel is &lt;3.6.5-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243570" version="1" comment="python3-idle is &lt;3.6.5-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243571" version="1" comment="python3-tk is &lt;3.6.5-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262577" version="1" comment="libwavpack1 is &lt;5.1.0-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262578" version="1" comment="wavpack is &lt;5.1.0-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262814" version="1" comment="libpq5 is &lt;10.10-4.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262815" version="1" comment="postgresql10 is &lt;10.10-4.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243572" version="1" comment="kernel-default is &lt;4.12.14-25.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243573" version="1" comment="kernel-default-base is &lt;4.12.14-25.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243574" version="1" comment="kernel-default-devel is &lt;4.12.14-25.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243575" version="1" comment="kernel-default-man is &lt;4.12.14-25.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243576" version="1" comment="kernel-devel is &lt;4.12.14-25.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243577" version="1" comment="kernel-macros is &lt;4.12.14-25.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243578" version="1" comment="kernel-source is &lt;4.12.14-25.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243579" version="1" comment="kernel-zfcpdump is &lt;4.12.14-25.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262816" version="1" comment="qemu is &lt;2.11.2-9.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262817" version="1" comment="qemu-tools is &lt;2.11.2-9.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263709" version="1" comment="python-Werkzeug is &lt;0.12.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263710" version="1" comment="python3-Werkzeug is &lt;0.12.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263896" version="1" comment="python-urllib3 is &lt;1.22-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263897" version="1" comment="python2-urllib3 is &lt;1.22-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263898" version="1" comment="python3-urllib3 is &lt;1.22-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263908" version="1" comment="ghostscript is &lt;9.26a-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263909" version="1" comment="ghostscript-devel is &lt;9.26a-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263910" version="1" comment="ghostscript-x11 is &lt;9.26a-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263911" version="1" comment="libgcrypt is &lt;1.8.2-6.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263912" version="1" comment="libgcrypt-devel is &lt;1.8.2-6.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263913" version="1" comment="libgcrypt20 is &lt;1.8.2-6.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263914" version="1" comment="libgcrypt20-32bit is &lt;1.8.2-6.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263915" version="1" comment="libgcrypt20-hmac is &lt;1.8.2-6.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263916" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.8.2-6.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264535" version="1" comment="curl is &lt;7.60.0-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264536" version="1" comment="libcurl-devel is &lt;7.60.0-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264537" version="1" comment="libcurl4 is &lt;7.60.0-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264538" version="1" comment="libcurl4-32bit is &lt;7.60.0-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264585" version="1" comment="libblkid-devel is &lt;2.31.1-9.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264586" version="1" comment="libblkid-devel-static is &lt;2.31.1-9.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264587" version="1" comment="libblkid1 is &lt;2.31.1-9.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264588" version="1" comment="libblkid1-32bit is &lt;2.31.1-9.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264589" version="1" comment="libfdisk-devel is &lt;2.31.1-9.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264590" version="1" comment="libfdisk1 is &lt;2.31.1-9.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264591" version="1" comment="libmount-devel is &lt;2.31.1-9.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264592" version="1" comment="libmount1 is &lt;2.31.1-9.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264593" version="1" comment="libmount1-32bit is &lt;2.31.1-9.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264594" version="1" comment="libsmartcols-devel is &lt;2.31.1-9.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264595" version="1" comment="libsmartcols1 is &lt;2.31.1-9.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264596" version="1" comment="libuuid-devel is &lt;2.31.1-9.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264597" version="1" comment="libuuid-devel-static is &lt;2.31.1-9.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264598" version="1" comment="libuuid1 is &lt;2.31.1-9.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264599" version="1" comment="libuuid1-32bit is &lt;2.31.1-9.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264600" version="1" comment="shadow is &lt;4.5-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264601" version="1" comment="util-linux is &lt;2.31.1-9.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264602" version="1" comment="util-linux-lang is &lt;2.31.1-9.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264603" version="1" comment="util-linux-systemd is &lt;2.31.1-9.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264683" version="1" comment="libldap-2_4-2 is &lt;2.4.46-9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264684" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.46-9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264685" version="1" comment="openldap2 is &lt;2.4.46-9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264686" version="1" comment="openldap2-client is &lt;2.4.46-9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264687" version="1" comment="openldap2-devel is &lt;2.4.46-9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264688" version="1" comment="openldap2-devel-static is &lt;2.4.46-9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264926" version="1" comment="libopenssl-1_1-devel is &lt;1.1.0i-4.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264927" version="1" comment="libopenssl1_1 is &lt;1.1.0i-4.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264928" version="1" comment="libopenssl1_1-32bit is &lt;1.1.0i-4.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264929" version="1" comment="libopenssl1_1-hmac is &lt;1.1.0i-4.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264930" version="1" comment="libopenssl1_1-hmac-32bit is &lt;1.1.0i-4.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264931" version="1" comment="openssl-1_1 is &lt;1.1.0i-4.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264932" version="1" comment="kernel-default is &lt;4.12.14-150.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264933" version="1" comment="kernel-default-base is &lt;4.12.14-150.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264934" version="1" comment="kernel-default-devel is &lt;4.12.14-150.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264935" version="1" comment="kernel-default-man is &lt;4.12.14-150.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264936" version="1" comment="kernel-devel is &lt;4.12.14-150.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264937" version="1" comment="kernel-macros is &lt;4.12.14-150.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264938" version="1" comment="kernel-source is &lt;4.12.14-150.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264939" version="1" comment="kernel-zfcpdump is &lt;4.12.14-150.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264940" version="1" comment="nmap is &lt;7.70-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265064" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.24.4-3.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265065" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.24.4-3.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265066" version="1" comment="libwebkit2gtk3-lang is &lt;2.24.4-3.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265067" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.24.4-3.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265068" version="1" comment="webkit2gtk3 is &lt;2.24.4-3.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265069" version="1" comment="expat is &lt;2.2.5-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265070" version="1" comment="libexpat-devel is &lt;2.2.5-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265071" version="1" comment="libexpat1 is &lt;2.2.5-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265072" version="1" comment="libexpat1-32bit is &lt;2.2.5-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265073" version="1" comment="ghostscript is &lt;9.27-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265074" version="1" comment="ghostscript-devel is &lt;9.27-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265075" version="1" comment="ghostscript-x11 is &lt;9.27-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265076" version="1" comment="python-numpy is &lt;1.16.1-4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265077" version="1" comment="python2-numpy is &lt;1.16.1-4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265078" version="1" comment="python2-numpy-devel is &lt;1.16.1-4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265079" version="1" comment="python3-numpy is &lt;1.16.1-4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265080" version="1" comment="python3-numpy-devel is &lt;1.16.1-4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265202" version="1" comment="libnghttp2-14 is &lt;1.39.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265203" version="1" comment="libnghttp2-14-32bit is &lt;1.39.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265204" version="1" comment="libnghttp2-devel is &lt;1.39.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265205" version="1" comment="libnghttp2_asio-devel is &lt;1.39.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265206" version="1" comment="libnghttp2_asio1 is &lt;1.39.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265207" version="1" comment="nghttp2 is &lt;1.39.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265208" version="1" comment="u-boot is &lt;2018.03-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265209" version="1" comment="u-boot-rpi3 is &lt;2018.03-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265210" version="1" comment="u-boot-tools is &lt;2018.03-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243828" version="1" comment="libpython2_7-1_0 is &lt;2.7.14-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243829" version="1" comment="python is &lt;2.7.14-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243830" version="1" comment="python-base is &lt;2.7.14-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243831" version="1" comment="python-curses is &lt;2.7.14-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243832" version="1" comment="python-devel is &lt;2.7.14-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243833" version="1" comment="python-gdbm is &lt;2.7.14-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243834" version="1" comment="python-xml is &lt;2.7.14-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243838" version="1" comment="libfreebl3-hmac-32bit is &lt;3.41.1-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243842" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.41.1-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243891" version="1" comment="avahi is &lt;0.6.32-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243892" version="1" comment="avahi-compat-howl-devel is &lt;0.6.32-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243893" version="1" comment="avahi-compat-mDNSResponder-devel is &lt;0.6.32-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243894" version="1" comment="avahi-glib2 is &lt;0.6.32-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243895" version="1" comment="avahi-lang is &lt;0.6.32-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243896" version="1" comment="avahi-utils is &lt;0.6.32-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243897" version="1" comment="libavahi-client3 is &lt;0.6.32-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243898" version="1" comment="libavahi-common3 is &lt;0.6.32-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243899" version="1" comment="libavahi-core7 is &lt;0.6.32-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243900" version="1" comment="libavahi-devel is &lt;0.6.32-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243901" version="1" comment="libavahi-glib-devel is &lt;0.6.32-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243902" version="1" comment="libavahi-glib1 is &lt;0.6.32-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243903" version="1" comment="libavahi-gobject0 is &lt;0.6.32-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243904" version="1" comment="libavahi-ui-gtk3-0 is &lt;0.6.32-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243905" version="1" comment="libavahi-ui0 is &lt;0.6.32-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243906" version="1" comment="libdns_sd is &lt;0.6.32-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243907" version="1" comment="libhowl0 is &lt;0.6.32-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243908" version="1" comment="typelib-1_0-Avahi-0_6 is &lt;0.6.32-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244419" version="1" comment="python-numpy is &lt;1.14.0-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244420" version="1" comment="python2-numpy is &lt;1.14.0-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244421" version="1" comment="python2-numpy-devel is &lt;1.14.0-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244444" version="1" comment="qemu is &lt;2.11.2-9.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244445" version="1" comment="qemu-tools is &lt;2.11.2-9.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244765" version="1" comment="libQt5Concurrent-devel is &lt;5.9.4-8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244766" version="1" comment="libQt5Concurrent5 is &lt;5.9.4-8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244767" version="1" comment="libQt5Core-devel is &lt;5.9.4-8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244768" version="1" comment="libQt5Core-private-headers-devel is &lt;5.9.4-8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244769" version="1" comment="libQt5Core5 is &lt;5.9.4-8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244770" version="1" comment="libQt5DBus-devel is &lt;5.9.4-8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244771" version="1" comment="libQt5DBus-private-headers-devel is &lt;5.9.4-8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244772" version="1" comment="libQt5DBus5 is &lt;5.9.4-8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244773" version="1" comment="libQt5Gui-devel is &lt;5.9.4-8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244774" version="1" comment="libQt5Gui-private-headers-devel is &lt;5.9.4-8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244775" version="1" comment="libQt5Gui5 is &lt;5.9.4-8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244776" version="1" comment="libQt5KmsSupport-devel-static is &lt;5.9.4-8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244777" version="1" comment="libQt5KmsSupport-private-headers-devel is &lt;5.9.4-8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244778" version="1" comment="libQt5Network-devel is &lt;5.9.4-8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244779" version="1" comment="libQt5Network-private-headers-devel is &lt;5.9.4-8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244780" version="1" comment="libQt5Network5 is &lt;5.9.4-8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244781" version="1" comment="libQt5OpenGL-devel is &lt;5.9.4-8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244782" version="1" comment="libQt5OpenGL-private-headers-devel is &lt;5.9.4-8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244783" version="1" comment="libQt5OpenGL5 is &lt;5.9.4-8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244784" version="1" comment="libQt5PlatformHeaders-devel is &lt;5.9.4-8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244785" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.9.4-8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244786" version="1" comment="libQt5PlatformSupport-private-headers-devel is &lt;5.9.4-8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244787" version="1" comment="libQt5PrintSupport-devel is &lt;5.9.4-8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244788" version="1" comment="libQt5PrintSupport-private-headers-devel is &lt;5.9.4-8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244789" version="1" comment="libQt5PrintSupport5 is &lt;5.9.4-8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244790" version="1" comment="libQt5Sql-devel is &lt;5.9.4-8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244791" version="1" comment="libQt5Sql-private-headers-devel is &lt;5.9.4-8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244792" version="1" comment="libQt5Sql5 is &lt;5.9.4-8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244793" version="1" comment="libQt5Sql5-sqlite is &lt;5.9.4-8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244794" version="1" comment="libQt5Test-devel is &lt;5.9.4-8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244795" version="1" comment="libQt5Test-private-headers-devel is &lt;5.9.4-8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244796" version="1" comment="libQt5Test5 is &lt;5.9.4-8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244797" version="1" comment="libQt5Widgets-devel is &lt;5.9.4-8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244798" version="1" comment="libQt5Widgets-private-headers-devel is &lt;5.9.4-8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244799" version="1" comment="libQt5Widgets5 is &lt;5.9.4-8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244800" version="1" comment="libQt5Xml-devel is &lt;5.9.4-8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244801" version="1" comment="libQt5Xml5 is &lt;5.9.4-8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244802" version="1" comment="libqt5-qtbase is &lt;5.9.4-8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244803" version="1" comment="libqt5-qtbase-common-devel is &lt;5.9.4-8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244804" version="1" comment="libqt5-qtbase-devel is &lt;5.9.4-8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244805" version="1" comment="libqt5-qtbase-private-headers-devel is &lt;5.9.4-8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244964" version="1" comment="supportutils is &lt;3.1-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244965" version="1" comment="openssh is &lt;7.6p1-9.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244966" version="1" comment="openssh-helpers is &lt;7.6p1-9.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244967" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.22.6-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244968" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.22.6-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244969" version="1" comment="libwebkit2gtk3-lang is &lt;2.22.6-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244970" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.22.6-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244971" version="1" comment="webkit2gtk3 is &lt;2.22.6-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245499" version="1" comment="libipa_hbac-devel is &lt;1.16.1-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245500" version="1" comment="libipa_hbac0 is &lt;1.16.1-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245501" version="1" comment="libsss_certmap-devel is &lt;1.16.1-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245502" version="1" comment="libsss_certmap0 is &lt;1.16.1-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245503" version="1" comment="libsss_idmap-devel is &lt;1.16.1-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245504" version="1" comment="libsss_idmap0 is &lt;1.16.1-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245505" version="1" comment="libsss_nss_idmap-devel is &lt;1.16.1-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245506" version="1" comment="libsss_nss_idmap0 is &lt;1.16.1-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245507" version="1" comment="libsss_simpleifp-devel is &lt;1.16.1-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245508" version="1" comment="libsss_simpleifp0 is &lt;1.16.1-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245509" version="1" comment="python3-sssd-config is &lt;1.16.1-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245510" version="1" comment="sssd is &lt;1.16.1-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245511" version="1" comment="sssd-32bit is &lt;1.16.1-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245512" version="1" comment="sssd-ad is &lt;1.16.1-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245513" version="1" comment="sssd-dbus is &lt;1.16.1-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245514" version="1" comment="sssd-ipa is &lt;1.16.1-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245515" version="1" comment="sssd-krb5 is &lt;1.16.1-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245516" version="1" comment="sssd-krb5-common is &lt;1.16.1-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245517" version="1" comment="sssd-ldap is &lt;1.16.1-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245518" version="1" comment="sssd-proxy is &lt;1.16.1-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245519" version="1" comment="sssd-tools is &lt;1.16.1-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245520" version="1" comment="sssd-wbclient is &lt;1.16.1-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245521" version="1" comment="sssd-wbclient-devel is &lt;1.16.1-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245627" version="1" comment="python-magic is &lt;5.32-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245628" version="1" comment="python2-magic is &lt;5.32-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245742" version="1" comment="ceph is &lt;13.2.4.125+gad802694f5-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245743" version="1" comment="ceph-common is &lt;13.2.4.125+gad802694f5-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245744" version="1" comment="libcephfs-devel is &lt;13.2.4.125+gad802694f5-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245745" version="1" comment="libcephfs2 is &lt;13.2.4.125+gad802694f5-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245746" version="1" comment="librados-devel is &lt;13.2.4.125+gad802694f5-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245747" version="1" comment="librados2 is &lt;13.2.4.125+gad802694f5-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245748" version="1" comment="libradosstriper-devel is &lt;13.2.4.125+gad802694f5-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245749" version="1" comment="libradosstriper1 is &lt;13.2.4.125+gad802694f5-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245750" version="1" comment="librbd-devel is &lt;13.2.4.125+gad802694f5-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245751" version="1" comment="librbd1 is &lt;13.2.4.125+gad802694f5-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245752" version="1" comment="librgw-devel is &lt;13.2.4.125+gad802694f5-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245753" version="1" comment="librgw2 is &lt;13.2.4.125+gad802694f5-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245754" version="1" comment="python3-cephfs is &lt;13.2.4.125+gad802694f5-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245755" version="1" comment="python3-rados is &lt;13.2.4.125+gad802694f5-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245756" version="1" comment="python3-rbd is &lt;13.2.4.125+gad802694f5-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245757" version="1" comment="python3-rgw is &lt;13.2.4.125+gad802694f5-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245758" version="1" comment="rados-objclass-devel is &lt;13.2.4.125+gad802694f5-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245877" version="1" comment="libwireshark9 is &lt;2.4.13-3.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245878" version="1" comment="libwiretap7 is &lt;2.4.13-3.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245879" version="1" comment="libwscodecs1 is &lt;2.4.13-3.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245880" version="1" comment="libwsutil8 is &lt;2.4.13-3.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245881" version="1" comment="wireshark is &lt;2.4.13-3.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246008" version="1" comment="libssh2-1 is &lt;1.8.0-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246009" version="1" comment="libssh2-devel is &lt;1.8.0-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246010" version="1" comment="libssh2_org is &lt;1.8.0-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246011" version="1" comment="ldb is &lt;1.2.3-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246012" version="1" comment="libldb-devel is &lt;1.2.3-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246013" version="1" comment="libldb1 is &lt;1.2.3-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246014" version="1" comment="python-ldb is &lt;1.2.3-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246015" version="1" comment="python-ldb-devel is &lt;1.2.3-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246016" version="1" comment="python3-ldb is &lt;1.2.3-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246017" version="1" comment="python3-ldb-devel is &lt;1.2.3-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246018" version="1" comment="lftp is &lt;4.8.3-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246019" version="1" comment="python-Flask is &lt;0.12.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246020" version="1" comment="python3-Flask is &lt;0.12.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246109" version="1" comment="libopenssl-1_1-devel is &lt;1.1.0i-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246110" version="1" comment="libopenssl1_1 is &lt;1.1.0i-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246111" version="1" comment="libopenssl1_1-32bit is &lt;1.1.0i-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246112" version="1" comment="libopenssl1_1-hmac is &lt;1.1.0i-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246113" version="1" comment="libopenssl1_1-hmac-32bit is &lt;1.1.0i-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246114" version="1" comment="openssl-1_1 is &lt;1.1.0i-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246115" version="1" comment="libQt5Svg5 is &lt;5.9.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246116" version="1" comment="libqt5-qtsvg is &lt;5.9.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246117" version="1" comment="libqt5-qtsvg-devel is &lt;5.9.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246119" version="1" comment="libjpeg-turbo is &lt;1.5.3-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246122" version="1" comment="libjpeg62-turbo is &lt;1.5.3-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246126" version="1" comment="ucode-intel is &lt;20190312-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246236" version="1" comment="libmspack is &lt;0.6-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246379" version="1" comment="kernel-default is &lt;4.12.14-150.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246380" version="1" comment="kernel-default-base is &lt;4.12.14-150.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246381" version="1" comment="kernel-default-devel is &lt;4.12.14-150.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246382" version="1" comment="kernel-default-man is &lt;4.12.14-150.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246383" version="1" comment="kernel-devel is &lt;4.12.14-150.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246384" version="1" comment="kernel-macros is &lt;4.12.14-150.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246385" version="1" comment="kernel-source is &lt;4.12.14-150.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246386" version="1" comment="kernel-zfcpdump is &lt;4.12.14-150.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246389" version="1" comment="tiff is &lt;4.0.9-5.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246390" version="1" comment="libsqlite3-0 is &lt;3.27.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246391" version="1" comment="libsqlite3-0-32bit is &lt;3.27.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246392" version="1" comment="sqlite3 is &lt;3.27.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246393" version="1" comment="sqlite3-devel is &lt;3.27.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246705" version="1" comment="libarchive is &lt;3.3.2-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247019" version="1" comment="xen is &lt;4.10.3_02-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247020" version="1" comment="xen-libs is &lt;4.10.3_02-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247021" version="1" comment="xen-tools-domU is &lt;4.10.3_02-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247115" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.24.0-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247116" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.24.0-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247117" version="1" comment="libwebkit2gtk3-lang is &lt;2.24.0-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247118" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.24.0-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247119" version="1" comment="webkit2gtk3 is &lt;2.24.0-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243020" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.22.5-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243021" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.22.5-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243022" version="1" comment="libwebkit2gtk3-lang is &lt;2.22.5-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243023" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.22.5-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243024" version="1" comment="webkit2gtk3 is &lt;2.22.5-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247130" version="1" comment="flac is &lt;1.3.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247138" version="1" comment="libQt5Concurrent-devel is &lt;5.9.4-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247139" version="1" comment="libQt5Concurrent5 is &lt;5.9.4-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247140" version="1" comment="libQt5Core-devel is &lt;5.9.4-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247141" version="1" comment="libQt5Core-private-headers-devel is &lt;5.9.4-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247142" version="1" comment="libQt5Core5 is &lt;5.9.4-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247143" version="1" comment="libQt5DBus-devel is &lt;5.9.4-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247144" version="1" comment="libQt5DBus-private-headers-devel is &lt;5.9.4-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247145" version="1" comment="libQt5DBus5 is &lt;5.9.4-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247146" version="1" comment="libQt5Gui-devel is &lt;5.9.4-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247147" version="1" comment="libQt5Gui-private-headers-devel is &lt;5.9.4-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247148" version="1" comment="libQt5Gui5 is &lt;5.9.4-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247149" version="1" comment="libQt5KmsSupport-devel-static is &lt;5.9.4-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247150" version="1" comment="libQt5KmsSupport-private-headers-devel is &lt;5.9.4-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247151" version="1" comment="libQt5Network-devel is &lt;5.9.4-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247152" version="1" comment="libQt5Network-private-headers-devel is &lt;5.9.4-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247153" version="1" comment="libQt5Network5 is &lt;5.9.4-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247154" version="1" comment="libQt5OpenGL-devel is &lt;5.9.4-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247155" version="1" comment="libQt5OpenGL-private-headers-devel is &lt;5.9.4-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247156" version="1" comment="libQt5OpenGL5 is &lt;5.9.4-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247157" version="1" comment="libQt5PlatformHeaders-devel is &lt;5.9.4-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247158" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.9.4-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247159" version="1" comment="libQt5PlatformSupport-private-headers-devel is &lt;5.9.4-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247160" version="1" comment="libQt5PrintSupport-devel is &lt;5.9.4-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247161" version="1" comment="libQt5PrintSupport-private-headers-devel is &lt;5.9.4-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247162" version="1" comment="libQt5PrintSupport5 is &lt;5.9.4-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247163" version="1" comment="libQt5Sql-devel is &lt;5.9.4-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247164" version="1" comment="libQt5Sql-private-headers-devel is &lt;5.9.4-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247165" version="1" comment="libQt5Sql5 is &lt;5.9.4-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247166" version="1" comment="libQt5Sql5-sqlite is &lt;5.9.4-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247167" version="1" comment="libQt5Test-devel is &lt;5.9.4-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247168" version="1" comment="libQt5Test-private-headers-devel is &lt;5.9.4-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247169" version="1" comment="libQt5Test5 is &lt;5.9.4-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247170" version="1" comment="libQt5Widgets-devel is &lt;5.9.4-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247171" version="1" comment="libQt5Widgets-private-headers-devel is &lt;5.9.4-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247172" version="1" comment="libQt5Widgets5 is &lt;5.9.4-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247173" version="1" comment="libQt5Xml-devel is &lt;5.9.4-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247174" version="1" comment="libQt5Xml5 is &lt;5.9.4-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247175" version="1" comment="libqt5-qtbase is &lt;5.9.4-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247176" version="1" comment="libqt5-qtbase-common-devel is &lt;5.9.4-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247177" version="1" comment="libqt5-qtbase-devel is &lt;5.9.4-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247178" version="1" comment="libqt5-qtbase-private-headers-devel is &lt;5.9.4-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243025" version="1" comment="wget is &lt;1.19.5-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247635" version="1" comment="libvirt is &lt;4.0.0-9.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247636" version="1" comment="libvirt-libs is &lt;4.0.0-9.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243026" version="1" comment="krb5 is &lt;1.15.2-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243027" version="1" comment="krb5-32bit is &lt;1.15.2-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243028" version="1" comment="krb5-client is &lt;1.15.2-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243029" version="1" comment="krb5-devel is &lt;1.15.2-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243030" version="1" comment="krb5-plugin-preauth-otp is &lt;1.15.2-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243031" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.15.2-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251358" version="1" comment="python-curses is &lt;2.7.14-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251359" version="1" comment="python-devel is &lt;2.7.14-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251360" version="1" comment="python-gdbm is &lt;2.7.14-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251361" version="1" comment="python-xml is &lt;2.7.14-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251364" version="1" comment="xerces-c is &lt;3.1.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251614" version="1" comment="libsoup is &lt;2.62.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256754" version="1" comment="python-requests is &lt;2.20.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256755" version="1" comment="python3-requests is &lt;2.20.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256756" version="1" comment="libvirt is &lt;5.1.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256757" version="1" comment="libvirt-libs is &lt;5.1.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257076" version="1" comment="kernel-default is &lt;4.12.14-197.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257077" version="1" comment="kernel-default-base is &lt;4.12.14-197.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257078" version="1" comment="kernel-default-devel is &lt;4.12.14-197.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257079" version="1" comment="kernel-default-man is &lt;4.12.14-197.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257080" version="1" comment="kernel-devel is &lt;4.12.14-197.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257081" version="1" comment="kernel-macros is &lt;4.12.14-197.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257082" version="1" comment="kernel-source is &lt;4.12.14-197.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257083" version="1" comment="kernel-zfcpdump is &lt;4.12.14-197.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257411" version="1" comment="libdcerpc-binding0 is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257412" version="1" comment="libdcerpc-binding0-32bit is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257413" version="1" comment="libdcerpc-devel is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257414" version="1" comment="libdcerpc-samr-devel is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257415" version="1" comment="libdcerpc-samr0 is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257416" version="1" comment="libdcerpc0 is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257417" version="1" comment="libdcerpc0-32bit is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257418" version="1" comment="libndr-devel is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257419" version="1" comment="libndr-krb5pac-devel is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257420" version="1" comment="libndr-krb5pac0 is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257421" version="1" comment="libndr-krb5pac0-32bit is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257422" version="1" comment="libndr-nbt-devel is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257423" version="1" comment="libndr-nbt0 is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257424" version="1" comment="libndr-nbt0-32bit is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257425" version="1" comment="libndr-standard-devel is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257426" version="1" comment="libndr-standard0 is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257427" version="1" comment="libndr-standard0-32bit is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257428" version="1" comment="libndr0 is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257429" version="1" comment="libndr0-32bit is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257430" version="1" comment="libnetapi-devel is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257431" version="1" comment="libnetapi0 is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257432" version="1" comment="libnetapi0-32bit is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257433" version="1" comment="libsamba-credentials-devel is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257434" version="1" comment="libsamba-credentials0 is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257435" version="1" comment="libsamba-credentials0-32bit is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257436" version="1" comment="libsamba-errors-devel is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257437" version="1" comment="libsamba-errors0 is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257438" version="1" comment="libsamba-errors0-32bit is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257439" version="1" comment="libsamba-hostconfig-devel is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257440" version="1" comment="libsamba-hostconfig0 is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257441" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257442" version="1" comment="libsamba-passdb-devel is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257443" version="1" comment="libsamba-passdb0 is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257444" version="1" comment="libsamba-passdb0-32bit is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257445" version="1" comment="libsamba-policy-devel is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257446" version="1" comment="libsamba-policy-python3-devel is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257447" version="1" comment="libsamba-policy0-python3 is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257448" version="1" comment="libsamba-util-devel is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257449" version="1" comment="libsamba-util0 is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257450" version="1" comment="libsamba-util0-32bit is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257451" version="1" comment="libsamdb-devel is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257452" version="1" comment="libsamdb0 is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257453" version="1" comment="libsamdb0-32bit is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257454" version="1" comment="libsmbclient-devel is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257455" version="1" comment="libsmbclient0 is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257456" version="1" comment="libsmbconf-devel is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257457" version="1" comment="libsmbconf0 is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257458" version="1" comment="libsmbconf0-32bit is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257459" version="1" comment="libsmbldap-devel is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257460" version="1" comment="libsmbldap2 is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257461" version="1" comment="libsmbldap2-32bit is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257462" version="1" comment="libtevent-util-devel is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257463" version="1" comment="libtevent-util0 is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257464" version="1" comment="libtevent-util0-32bit is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257465" version="1" comment="libwbclient-devel is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257466" version="1" comment="libwbclient0 is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257467" version="1" comment="libwbclient0-32bit is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257468" version="1" comment="samba is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257469" version="1" comment="samba-client is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257470" version="1" comment="samba-core-devel is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257471" version="1" comment="samba-libs is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257472" version="1" comment="samba-libs-32bit is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257473" version="1" comment="samba-libs-python3 is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257474" version="1" comment="samba-python3 is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257475" version="1" comment="samba-winbind is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257476" version="1" comment="samba-winbind-32bit is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257650" version="1" comment="dbus-1 is &lt;1.12.2-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257651" version="1" comment="dbus-1-devel is &lt;1.12.2-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257652" version="1" comment="dbus-1-x11 is &lt;1.12.2-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257653" version="1" comment="libdbus-1-3 is &lt;1.12.2-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257654" version="1" comment="libdbus-1-3-32bit is &lt;1.12.2-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257655" version="1" comment="libvirt is &lt;5.1.0-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257656" version="1" comment="libvirt-libs is &lt;5.1.0-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258685" version="1" comment="kernel-default is &lt;4.12.14-197.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258686" version="1" comment="kernel-default-base is &lt;4.12.14-197.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258687" version="1" comment="kernel-default-devel is &lt;4.12.14-197.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258688" version="1" comment="kernel-default-man is &lt;4.12.14-197.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258689" version="1" comment="kernel-devel is &lt;4.12.14-197.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258690" version="1" comment="kernel-macros is &lt;4.12.14-197.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258691" version="1" comment="kernel-source is &lt;4.12.14-197.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258692" version="1" comment="kernel-zfcpdump is &lt;4.12.14-197.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258992" version="1" comment="kernel-firmware is &lt;20190618-3.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258993" version="1" comment="ucode-amd is &lt;20190618-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259232" version="1" comment="kernel-default is &lt;4.12.14-197.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259233" version="1" comment="kernel-default-base is &lt;4.12.14-197.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259234" version="1" comment="kernel-default-devel is &lt;4.12.14-197.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259235" version="1" comment="kernel-default-man is &lt;4.12.14-197.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259236" version="1" comment="kernel-devel is &lt;4.12.14-197.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259237" version="1" comment="kernel-macros is &lt;4.12.14-197.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259238" version="1" comment="kernel-source is &lt;4.12.14-197.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259239" version="1" comment="kernel-zfcpdump is &lt;4.12.14-197.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260057" version="1" comment="ucode-intel is &lt;20190618-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260626" version="1" comment="libgcrypt is &lt;1.8.2-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260627" version="1" comment="libgcrypt-devel is &lt;1.8.2-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260628" version="1" comment="libgcrypt20 is &lt;1.8.2-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260629" version="1" comment="libgcrypt20-32bit is &lt;1.8.2-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260630" version="1" comment="libgcrypt20-hmac is &lt;1.8.2-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260631" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.8.2-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260664" version="1" comment="libpq5 is &lt;10.9-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260665" version="1" comment="postgresql10 is &lt;10.9-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260995" version="1" comment="ceph is &lt;14.2.1.468+g994fd9e0cc-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260996" version="1" comment="ceph-common is &lt;14.2.1.468+g994fd9e0cc-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260997" version="1" comment="libcephfs-devel is &lt;14.2.1.468+g994fd9e0cc-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260998" version="1" comment="libcephfs2 is &lt;14.2.1.468+g994fd9e0cc-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260999" version="1" comment="librados-devel is &lt;14.2.1.468+g994fd9e0cc-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261000" version="1" comment="librados2 is &lt;14.2.1.468+g994fd9e0cc-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261001" version="1" comment="libradospp-devel is &lt;14.2.1.468+g994fd9e0cc-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261002" version="1" comment="librbd-devel is &lt;14.2.1.468+g994fd9e0cc-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261003" version="1" comment="librbd1 is &lt;14.2.1.468+g994fd9e0cc-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261004" version="1" comment="librgw-devel is &lt;14.2.1.468+g994fd9e0cc-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261005" version="1" comment="librgw2 is &lt;14.2.1.468+g994fd9e0cc-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261006" version="1" comment="python3-ceph-argparse is &lt;14.2.1.468+g994fd9e0cc-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261007" version="1" comment="python3-cephfs is &lt;14.2.1.468+g994fd9e0cc-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261008" version="1" comment="python3-rados is &lt;14.2.1.468+g994fd9e0cc-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261009" version="1" comment="python3-rbd is &lt;14.2.1.468+g994fd9e0cc-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261010" version="1" comment="python3-rgw is &lt;14.2.1.468+g994fd9e0cc-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261011" version="1" comment="rados-objclass-devel is &lt;14.2.1.468+g994fd9e0cc-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261012" version="1" comment="kernel-default is &lt;4.12.14-197.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261013" version="1" comment="kernel-default-base is &lt;4.12.14-197.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261014" version="1" comment="kernel-default-devel is &lt;4.12.14-197.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261015" version="1" comment="kernel-default-man is &lt;4.12.14-197.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261016" version="1" comment="kernel-devel is &lt;4.12.14-197.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261017" version="1" comment="kernel-macros is &lt;4.12.14-197.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261018" version="1" comment="kernel-source is &lt;4.12.14-197.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261019" version="1" comment="kernel-zfcpdump is &lt;4.12.14-197.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262579" version="1" comment="qemu is &lt;3.1.1-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262580" version="1" comment="qemu-tools is &lt;3.1.1-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262790" version="1" comment="libcontainers-common is &lt;20190401-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262818" version="1" comment="ceph is &lt;14.2.2.349+g6716a1e448-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262819" version="1" comment="ceph-common is &lt;14.2.2.349+g6716a1e448-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262820" version="1" comment="libcephfs-devel is &lt;14.2.2.349+g6716a1e448-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262821" version="1" comment="libcephfs2 is &lt;14.2.2.349+g6716a1e448-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262822" version="1" comment="librados-devel is &lt;14.2.2.349+g6716a1e448-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262823" version="1" comment="librados2 is &lt;14.2.2.349+g6716a1e448-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262824" version="1" comment="libradospp-devel is &lt;14.2.2.349+g6716a1e448-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262825" version="1" comment="librbd-devel is &lt;14.2.2.349+g6716a1e448-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262826" version="1" comment="librbd1 is &lt;14.2.2.349+g6716a1e448-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262827" version="1" comment="librgw-devel is &lt;14.2.2.349+g6716a1e448-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262828" version="1" comment="librgw2 is &lt;14.2.2.349+g6716a1e448-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262829" version="1" comment="python3-ceph-argparse is &lt;14.2.2.349+g6716a1e448-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262830" version="1" comment="python3-cephfs is &lt;14.2.2.349+g6716a1e448-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262831" version="1" comment="python3-rados is &lt;14.2.2.349+g6716a1e448-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262832" version="1" comment="python3-rbd is &lt;14.2.2.349+g6716a1e448-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262833" version="1" comment="python3-rgw is &lt;14.2.2.349+g6716a1e448-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262834" version="1" comment="rados-objclass-devel is &lt;14.2.2.349+g6716a1e448-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263148" version="1" comment="python-SQLAlchemy is &lt;1.2.14-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263149" version="1" comment="python3-SQLAlchemy is &lt;1.2.14-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263711" version="1" comment="libblkid-devel is &lt;2.33.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263712" version="1" comment="libblkid-devel-static is &lt;2.33.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263713" version="1" comment="libblkid1 is &lt;2.33.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263714" version="1" comment="libblkid1-32bit is &lt;2.33.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263715" version="1" comment="libfdisk-devel is &lt;2.33.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263716" version="1" comment="libfdisk1 is &lt;2.33.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263717" version="1" comment="libmount-devel is &lt;2.33.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263718" version="1" comment="libmount1 is &lt;2.33.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263719" version="1" comment="libmount1-32bit is &lt;2.33.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263720" version="1" comment="libsmartcols-devel is &lt;2.33.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263721" version="1" comment="libsmartcols1 is &lt;2.33.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263722" version="1" comment="libuuid-devel is &lt;2.33.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263723" version="1" comment="libuuid-devel-static is &lt;2.33.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263724" version="1" comment="libuuid1 is &lt;2.33.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263725" version="1" comment="libuuid1-32bit is &lt;2.33.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263726" version="1" comment="shadow is &lt;4.6-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263727" version="1" comment="util-linux is &lt;2.33.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263728" version="1" comment="util-linux-lang is &lt;2.33.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263729" version="1" comment="util-linux-systemd is &lt;2.33.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263899" version="1" comment="python-urllib3 is &lt;1.24-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263900" version="1" comment="python3-urllib3 is &lt;1.24-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263964" version="1" comment="libdcerpc-binding0 is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263965" version="1" comment="libdcerpc-binding0-32bit is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263966" version="1" comment="libdcerpc-devel is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263967" version="1" comment="libdcerpc-samr-devel is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263968" version="1" comment="libdcerpc-samr0 is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263969" version="1" comment="libdcerpc0 is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263970" version="1" comment="libdcerpc0-32bit is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263971" version="1" comment="libndr-devel is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263972" version="1" comment="libndr-krb5pac-devel is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263973" version="1" comment="libndr-krb5pac0 is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263974" version="1" comment="libndr-krb5pac0-32bit is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263975" version="1" comment="libndr-nbt-devel is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263976" version="1" comment="libndr-nbt0 is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263977" version="1" comment="libndr-nbt0-32bit is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263978" version="1" comment="libndr-standard-devel is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263979" version="1" comment="libndr-standard0 is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263980" version="1" comment="libndr-standard0-32bit is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263981" version="1" comment="libndr0 is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263982" version="1" comment="libndr0-32bit is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263983" version="1" comment="libnetapi-devel is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263984" version="1" comment="libnetapi0 is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263985" version="1" comment="libnetapi0-32bit is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263986" version="1" comment="libsamba-credentials-devel is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263987" version="1" comment="libsamba-credentials0 is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263988" version="1" comment="libsamba-credentials0-32bit is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263989" version="1" comment="libsamba-errors-devel is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263990" version="1" comment="libsamba-errors0 is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263991" version="1" comment="libsamba-errors0-32bit is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263992" version="1" comment="libsamba-hostconfig-devel is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263993" version="1" comment="libsamba-hostconfig0 is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263994" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263995" version="1" comment="libsamba-passdb-devel is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263996" version="1" comment="libsamba-passdb0 is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263997" version="1" comment="libsamba-passdb0-32bit is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263998" version="1" comment="libsamba-policy-devel is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263999" version="1" comment="libsamba-policy-python3-devel is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264000" version="1" comment="libsamba-policy0-python3 is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264001" version="1" comment="libsamba-util-devel is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264002" version="1" comment="libsamba-util0 is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264003" version="1" comment="libsamba-util0-32bit is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264004" version="1" comment="libsamdb-devel is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264005" version="1" comment="libsamdb0 is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264006" version="1" comment="libsamdb0-32bit is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264007" version="1" comment="libsmbclient-devel is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264008" version="1" comment="libsmbclient0 is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264009" version="1" comment="libsmbconf-devel is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264010" version="1" comment="libsmbconf0 is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264011" version="1" comment="libsmbconf0-32bit is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264012" version="1" comment="libsmbldap-devel is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264013" version="1" comment="libsmbldap2 is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264014" version="1" comment="libsmbldap2-32bit is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264015" version="1" comment="libtevent-util-devel is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264016" version="1" comment="libtevent-util0 is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264017" version="1" comment="libtevent-util0-32bit is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264018" version="1" comment="libwbclient-devel is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264019" version="1" comment="libwbclient0 is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264020" version="1" comment="libwbclient0-32bit is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264021" version="1" comment="samba is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264022" version="1" comment="samba-client is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264023" version="1" comment="samba-core-devel is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264024" version="1" comment="samba-libs is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264025" version="1" comment="samba-libs-32bit is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264026" version="1" comment="samba-libs-python3 is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264027" version="1" comment="samba-python3 is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264028" version="1" comment="samba-winbind is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264029" version="1" comment="samba-winbind-32bit is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264539" version="1" comment="python-Werkzeug is &lt;0.14.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264540" version="1" comment="python3-Werkzeug is &lt;0.14.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264689" version="1" comment="libopenssl-1_1-devel is &lt;1.1.0i-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264690" version="1" comment="libopenssl1_1 is &lt;1.1.0i-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264691" version="1" comment="libopenssl1_1-32bit is &lt;1.1.0i-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264692" version="1" comment="libopenssl1_1-hmac is &lt;1.1.0i-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264693" version="1" comment="libopenssl1_1-hmac-32bit is &lt;1.1.0i-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264694" version="1" comment="openssl-1_1 is &lt;1.1.0i-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264941" version="1" comment="kernel-default is &lt;4.12.14-197.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264942" version="1" comment="kernel-default-base is &lt;4.12.14-197.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264943" version="1" comment="kernel-default-devel is &lt;4.12.14-197.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264944" version="1" comment="kernel-default-man is &lt;4.12.14-197.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264945" version="1" comment="kernel-devel is &lt;4.12.14-197.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264946" version="1" comment="kernel-macros is &lt;4.12.14-197.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264947" version="1" comment="kernel-source is &lt;4.12.14-197.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264948" version="1" comment="kernel-zfcpdump is &lt;4.12.14-197.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265211" version="1" comment="u-boot is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265212" version="1" comment="u-boot-rpi3 is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265213" version="1" comment="u-boot-tools is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253324" version="1" comment="cf-cli is &lt;6.43.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253325" version="1" comment="sle-module-cap-tools-release is ==15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258519" version="1" comment="sle-module-cap-tools-release is ==15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242445" version="1" comment="containerd is &lt;1.1.2-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242446" version="1" comment="docker is &lt;18.06.1_ce-6.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242447" version="1" comment="docker-bash-completion is &lt;18.06.1_ce-6.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242448" version="1" comment="docker-libnetwork is &lt;0.7.0.1+gitr2664_3ac297bc7fd0-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242449" version="1" comment="docker-runc is &lt;1.0.0rc5+gitr3562_69663f0bd4b6-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242450" version="1" comment="golang-github-docker-libnetwork is &lt;0.7.0.1+gitr2664_3ac297bc7fd0-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253400" version="1" comment="containerd is &lt;1.2.5-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253401" version="1" comment="docker is &lt;18.09.6_ce-6.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253402" version="1" comment="docker-bash-completion is &lt;18.09.6_ce-6.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253403" version="1" comment="docker-libnetwork is &lt;0.7.0.1+gitr2726_872f0a83c98a-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253404" version="1" comment="docker-runc is &lt;1.0.0rc6+gitr3804_2b18fe1d885e-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253405" version="1" comment="golang-github-docker-libnetwork is &lt;0.7.0.1+gitr2726_872f0a83c98a-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257477" version="1" comment="docker is &lt;18.09.6_ce-6.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257478" version="1" comment="docker-bash-completion is &lt;18.09.6_ce-6.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261436" version="1" comment="containerd is &lt;1.2.6-5.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261437" version="1" comment="docker is &lt;19.03.1_ce-6.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261438" version="1" comment="docker-bash-completion is &lt;19.03.1_ce-6.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261439" version="1" comment="docker-libnetwork is &lt;0.7.0.1+gitr2800_fc5a7d91d54c-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261440" version="1" comment="docker-runc is &lt;1.0.0rc8+gitr3826_425e105d5a03-6.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261441" version="1" comment="golang-github-docker-libnetwork is &lt;0.7.0.1+gitr2800_fc5a7d91d54c-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243909" version="1" comment="containerd is &lt;1.1.2-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243910" version="1" comment="docker is &lt;18.09.0_ce-6.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243911" version="1" comment="docker-bash-completion is &lt;18.09.0_ce-6.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243912" version="1" comment="docker-libnetwork is &lt;0.7.0.1+gitr2704_6da50d197830-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243913" version="1" comment="docker-runc is &lt;1.0.0rc5+gitr3562_69663f0bd4b6-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243914" version="1" comment="golang-github-docker-libnetwork is &lt;0.7.0.1+gitr2704_6da50d197830-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244187" version="1" comment="docker-runc is &lt;1.0.0rc5+gitr3562_69663f0bd4b6-6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242816" version="1" comment="helm-mirror is &lt;0.2.1-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244978" version="1" comment="docker-runc is &lt;1.0.0rc6+gitr3748_96ec2177ae84-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244979" version="1" comment="golang-github-docker-libnetwork is &lt;0.7.0.1+gitr2711_2cfbf9b1f981-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262791" version="1" comment="fuse-overlayfs is &lt;0.4.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262792" version="1" comment="fuse3 is &lt;3.6.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262793" version="1" comment="libfuse3-3 is &lt;3.6.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262794" version="1" comment="podman is &lt;1.4.4-4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262795" version="1" comment="podman-cni-config is &lt;1.4.4-4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262796" version="1" comment="slirp4netns is &lt;0.3.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263917" version="1" comment="buildah is &lt;1.7.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263918" version="1" comment="podman is &lt;1.4.4-4.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263919" version="1" comment="podman-cni-config is &lt;1.4.4-4.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229737" version="1" comment="libtiff5-32bit is &lt;4.0.9-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229738" version="1" comment="exiv2 is &lt;0.26-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230134" version="1" comment="libopenmpt is &lt;0.3.9-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230356" version="1" comment="wireshark-devel is &lt;2.4.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230357" version="1" comment="wireshark-ui-qt is &lt;2.4.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230517" version="1" comment="ImageMagick is &lt;7.0.7.34-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230518" version="1" comment="ImageMagick-devel is &lt;7.0.7.34-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230519" version="1" comment="libMagick++-7_Q16HDRI4 is &lt;7.0.7.34-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230520" version="1" comment="libMagick++-devel is &lt;7.0.7.34-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230521" version="1" comment="libMagickCore-7_Q16HDRI6 is &lt;7.0.7.34-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230522" version="1" comment="libMagickWand-7_Q16HDRI6 is &lt;7.0.7.34-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230700" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.20.3-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230701" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.20.3-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230702" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.20.3-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230703" version="1" comment="webkit2gtk3-devel is &lt;2.20.3-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231220" version="1" comment="libcups2-32bit is &lt;2.2.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231472" version="1" comment="libcdio is &lt;0.94-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231473" version="1" comment="libcdio++0 is &lt;0.94-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231474" version="1" comment="libcdio-devel is &lt;0.94-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231475" version="1" comment="libcdio16 is &lt;0.94-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231476" version="1" comment="libiso9660-10 is &lt;0.94-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231477" version="1" comment="libudf0 is &lt;0.94-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231815" version="1" comment="MozillaFirefox is &lt;52.9.0esr-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231816" version="1" comment="MozillaFirefox-devel is &lt;52.9.0esr-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231817" version="1" comment="MozillaFirefox-translations-common is &lt;52.9.0esr-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231818" version="1" comment="MozillaFirefox-translations-other is &lt;52.9.0esr-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231819" version="1" comment="wireshark-devel is &lt;2.4.8-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231820" version="1" comment="wireshark-ui-qt is &lt;2.4.8-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231821" version="1" comment="ffmpeg is &lt;3.4.2-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231822" version="1" comment="libavcodec57 is &lt;3.4.2-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231823" version="1" comment="libavutil-devel is &lt;3.4.2-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231824" version="1" comment="libavutil55 is &lt;3.4.2-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231825" version="1" comment="libpostproc-devel is &lt;3.4.2-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231826" version="1" comment="libpostproc54 is &lt;3.4.2-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231827" version="1" comment="libswresample-devel is &lt;3.4.2-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231828" version="1" comment="libswresample2 is &lt;3.4.2-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231829" version="1" comment="libswscale-devel is &lt;3.4.2-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231830" version="1" comment="libswscale4 is &lt;3.4.2-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233208" version="1" comment="ImageMagick is &lt;7.0.7.34-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233209" version="1" comment="ImageMagick-devel is &lt;7.0.7.34-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233210" version="1" comment="libMagick++-7_Q16HDRI4 is &lt;7.0.7.34-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233211" version="1" comment="libMagick++-devel is &lt;7.0.7.34-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233212" version="1" comment="libMagickCore-7_Q16HDRI6 is &lt;7.0.7.34-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233213" version="1" comment="libMagickWand-7_Q16HDRI6 is &lt;7.0.7.34-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233745" version="1" comment="ImageMagick is &lt;7.0.7.34-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233746" version="1" comment="ImageMagick-devel is &lt;7.0.7.34-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233747" version="1" comment="libMagick++-7_Q16HDRI4 is &lt;7.0.7.34-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233748" version="1" comment="libMagick++-devel is &lt;7.0.7.34-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233749" version="1" comment="libMagickCore-7_Q16HDRI6 is &lt;7.0.7.34-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233750" version="1" comment="libMagickWand-7_Q16HDRI6 is &lt;7.0.7.34-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234737" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.20.5-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234738" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.20.5-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234739" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.20.5-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234740" version="1" comment="webkit2gtk3-devel is &lt;2.20.5-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234748" version="1" comment="gdm is &lt;3.26.2.1-13.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234749" version="1" comment="gdm-devel is &lt;3.26.2.1-13.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234750" version="1" comment="gdm-lang is &lt;3.26.2.1-13.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234751" version="1" comment="gdmflexiserver is &lt;3.26.2.1-13.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234752" version="1" comment="libgdm1 is &lt;3.26.2.1-13.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234753" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.26.2.1-13.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235504" version="1" comment="gd-devel is &lt;2.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235505" version="1" comment="wireshark-devel is &lt;2.4.9-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235506" version="1" comment="wireshark-ui-qt is &lt;2.4.9-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235507" version="1" comment="MozillaFirefox is &lt;60.2.0-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235508" version="1" comment="MozillaFirefox-branding-SLE is &lt;60-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235509" version="1" comment="MozillaFirefox-devel is &lt;60.2.0-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235510" version="1" comment="MozillaFirefox-translations-common is &lt;60.2.0-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235511" version="1" comment="MozillaFirefox-translations-other is &lt;60.2.0-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235602" version="1" comment="libgnutls30-32bit is &lt;3.6.2-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235756" version="1" comment="ImageMagick is &lt;7.0.7.34-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235757" version="1" comment="ImageMagick-devel is &lt;7.0.7.34-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235758" version="1" comment="libMagick++-7_Q16HDRI4 is &lt;7.0.7.34-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235759" version="1" comment="libMagick++-devel is &lt;7.0.7.34-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235760" version="1" comment="libMagickCore-7_Q16HDRI6 is &lt;7.0.7.34-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235761" version="1" comment="libMagickWand-7_Q16HDRI6 is &lt;7.0.7.34-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235762" version="1" comment="libspectre is &lt;0.2.8-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235763" version="1" comment="libspectre-devel is &lt;0.2.8-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235764" version="1" comment="libspectre1 is &lt;0.2.8-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235812" version="1" comment="python-tk is &lt;2.7.14-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236694" version="1" comment="libSoundTouch0 is &lt;1.8.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236695" version="1" comment="soundtouch is &lt;1.8.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236696" version="1" comment="soundtouch-devel is &lt;1.8.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236697" version="1" comment="ImageMagick is &lt;7.0.7.34-3.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236698" version="1" comment="ImageMagick-devel is &lt;7.0.7.34-3.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236699" version="1" comment="libMagick++-7_Q16HDRI4 is &lt;7.0.7.34-3.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236700" version="1" comment="libMagick++-devel is &lt;7.0.7.34-3.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236701" version="1" comment="libMagickCore-7_Q16HDRI6 is &lt;7.0.7.34-3.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236702" version="1" comment="libMagickWand-7_Q16HDRI6 is &lt;7.0.7.34-3.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237860" version="1" comment="wireshark-devel is &lt;2.4.10-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237861" version="1" comment="wireshark-ui-qt is &lt;2.4.10-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237914" version="1" comment="libtiff5-32bit is &lt;4.0.9-5.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238136" version="1" comment="MozillaFirefox is &lt;60.2.2-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238137" version="1" comment="MozillaFirefox-branding-SLE is &lt;60-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238138" version="1" comment="MozillaFirefox-devel is &lt;60.2.2-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238139" version="1" comment="MozillaFirefox-translations-common is &lt;60.2.2-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238140" version="1" comment="MozillaFirefox-translations-other is &lt;60.2.2-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238256" version="1" comment="audiofile is &lt;0.3.6-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238257" version="1" comment="audiofile-devel is &lt;0.3.6-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238258" version="1" comment="libaudiofile1 is &lt;0.3.6-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238524" version="1" comment="libSoundTouch0 is &lt;1.8.0-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238525" version="1" comment="soundtouch is &lt;1.8.0-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238526" version="1" comment="soundtouch-devel is &lt;1.8.0-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238527" version="1" comment="ffmpeg is &lt;3.4.2-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238561" version="1" comment="accountsservice is &lt;0.6.45-6.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238562" version="1" comment="accountsservice-devel is &lt;0.6.45-6.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238563" version="1" comment="accountsservice-lang is &lt;0.6.45-6.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238564" version="1" comment="libaccountsservice0 is &lt;0.6.45-6.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238565" version="1" comment="typelib-1_0-AccountsService-1_0 is &lt;0.6.45-6.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238611" version="1" comment="MozillaFirefox is &lt;60.3.0-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238612" version="1" comment="MozillaFirefox-devel is &lt;60.3.0-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238613" version="1" comment="MozillaFirefox-translations-common is &lt;60.3.0-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238614" version="1" comment="MozillaFirefox-translations-other is &lt;60.3.0-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238703" version="1" comment="openssh-askpass-gnome is &lt;7.6p1-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239137" version="1" comment="ImageMagick is &lt;7.0.7.34-3.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239138" version="1" comment="ImageMagick-devel is &lt;7.0.7.34-3.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239139" version="1" comment="libMagick++-7_Q16HDRI4 is &lt;7.0.7.34-3.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239140" version="1" comment="libMagick++-devel is &lt;7.0.7.34-3.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239141" version="1" comment="libMagickCore-7_Q16HDRI6 is &lt;7.0.7.34-3.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239142" version="1" comment="libMagickWand-7_Q16HDRI6 is &lt;7.0.7.34-3.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240777" version="1" comment="libtiff5-32bit is &lt;4.0.9-5.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241274" version="1" comment="libtiff5-32bit is &lt;4.0.9-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241566" version="1" comment="libcups2-32bit is &lt;2.2.7-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241643" version="1" comment="libspectre is &lt;0.2.8-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241644" version="1" comment="libspectre-devel is &lt;0.2.8-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241645" version="1" comment="libspectre1 is &lt;0.2.8-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242043" version="1" comment="libhogweed4-32bit is &lt;3.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242044" version="1" comment="libnettle6-32bit is &lt;3.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242045" version="1" comment="bluez-devel is &lt;5.48-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242211" version="1" comment="MozillaFirefox is &lt;60.4.0-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242212" version="1" comment="MozillaFirefox-devel is &lt;60.4.0-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242213" version="1" comment="MozillaFirefox-translations-common is &lt;60.4.0-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242214" version="1" comment="MozillaFirefox-translations-other is &lt;60.4.0-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242451" version="1" comment="wireshark-devel is &lt;2.4.11-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242452" version="1" comment="wireshark-ui-qt is &lt;2.4.11-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251788" version="1" comment="ImageMagick-config-7-upstream is &lt;7.0.7.34-3.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252153" version="1" comment="avahi-autoipd is &lt;0.6.32-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252154" version="1" comment="avahi-utils-gtk is &lt;0.6.32-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252155" version="1" comment="libavahi-gobject-devel is &lt;0.6.32-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243055" version="1" comment="soundtouch is &lt;1.8.0-3.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243150" version="1" comment="openssh-askpass-gnome is &lt;7.6p1-9.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253911" version="1" comment="ffmpeg is &lt;3.4.2-4.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253912" version="1" comment="libavcodec57 is &lt;3.4.2-4.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253913" version="1" comment="libavutil-devel is &lt;3.4.2-4.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253914" version="1" comment="libavutil55 is &lt;3.4.2-4.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253915" version="1" comment="libpostproc-devel is &lt;3.4.2-4.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253916" version="1" comment="libpostproc54 is &lt;3.4.2-4.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253917" version="1" comment="libswresample-devel is &lt;3.4.2-4.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253918" version="1" comment="libswresample2 is &lt;3.4.2-4.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253919" version="1" comment="libswscale-devel is &lt;3.4.2-4.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253920" version="1" comment="libswscale4 is &lt;3.4.2-4.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243151" version="1" comment="wireshark-devel is &lt;2.4.12-3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243152" version="1" comment="wireshark-ui-qt is &lt;2.4.12-3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254146" version="1" comment="bluez-devel is &lt;5.48-5.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254433" version="1" comment="NetworkManager-devel is &lt;1.10.6-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254434" version="1" comment="libnm-glib-vpn1 is &lt;1.10.6-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254435" version="1" comment="libnm-glib4 is &lt;1.10.6-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254436" version="1" comment="libnm-util2 is &lt;1.10.6-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254437" version="1" comment="typelib-1_0-NMClient-1_0 is &lt;1.10.6-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254438" version="1" comment="typelib-1_0-NetworkManager-1_0 is &lt;1.10.6-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254564" version="1" comment="libtag-devel is &lt;1.11.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254565" version="1" comment="libtag_c0 is &lt;1.11.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255817" version="1" comment="MozillaFirefox is &lt;60.7.0-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255818" version="1" comment="MozillaFirefox-devel is &lt;60.7.0-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255819" version="1" comment="MozillaFirefox-translations-common is &lt;60.7.0-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255820" version="1" comment="MozillaFirefox-translations-other is &lt;60.7.0-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243278" version="1" comment="libspectre is &lt;0.2.8-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243279" version="1" comment="libspectre-devel is &lt;0.2.8-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243280" version="1" comment="libspectre1 is &lt;0.2.8-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256570" version="1" comment="gvim is &lt;8.0.1568-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256571" version="1" comment="gnome-shell is &lt;3.26.2+20180130.0d9c74212-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256572" version="1" comment="gnome-shell-devel is &lt;3.26.2+20180130.0d9c74212-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256573" version="1" comment="gnome-shell-lang is &lt;3.26.2+20180130.0d9c74212-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256915" version="1" comment="ImageMagick is &lt;7.0.7.34-3.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256916" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.0.7.34-3.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256917" version="1" comment="ImageMagick-config-7-upstream is &lt;7.0.7.34-3.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256918" version="1" comment="ImageMagick-devel is &lt;7.0.7.34-3.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256919" version="1" comment="libMagick++-7_Q16HDRI4 is &lt;7.0.7.34-3.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256920" version="1" comment="libMagick++-devel is &lt;7.0.7.34-3.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256921" version="1" comment="libMagickCore-7_Q16HDRI6 is &lt;7.0.7.34-3.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256922" version="1" comment="libMagickWand-7_Q16HDRI6 is &lt;7.0.7.34-3.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256923" version="1" comment="libnetpbm-devel is &lt;10.80.1-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257657" version="1" comment="exempi is &lt;2.4.5-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257658" version="1" comment="libexempi-devel is &lt;2.4.5-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257659" version="1" comment="libexempi3 is &lt;2.4.5-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257660" version="1" comment="SDL2 is &lt;2.0.8-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257661" version="1" comment="libSDL2-2_0-0 is &lt;2.0.8-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257662" version="1" comment="libSDL2-devel is &lt;2.0.8-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257663" version="1" comment="wireshark-devel is &lt;2.4.15-3.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257664" version="1" comment="wireshark-ui-qt is &lt;2.4.15-3.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257665" version="1" comment="MozillaFirefox is &lt;60.7.1-3.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257666" version="1" comment="MozillaFirefox-devel is &lt;60.7.1-3.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257667" version="1" comment="MozillaFirefox-translations-common is &lt;60.7.1-3.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257668" version="1" comment="MozillaFirefox-translations-other is &lt;60.7.1-3.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257669" version="1" comment="evince is &lt;3.26.0+20180128.1bd86963-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257670" version="1" comment="evince-devel is &lt;3.26.0+20180128.1bd86963-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257671" version="1" comment="evince-lang is &lt;3.26.0+20180128.1bd86963-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257672" version="1" comment="evince-plugin-djvudocument is &lt;3.26.0+20180128.1bd86963-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257673" version="1" comment="evince-plugin-dvidocument is &lt;3.26.0+20180128.1bd86963-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257674" version="1" comment="evince-plugin-pdfdocument is &lt;3.26.0+20180128.1bd86963-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257675" version="1" comment="evince-plugin-psdocument is &lt;3.26.0+20180128.1bd86963-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257676" version="1" comment="evince-plugin-tiffdocument is &lt;3.26.0+20180128.1bd86963-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257677" version="1" comment="evince-plugin-xpsdocument is &lt;3.26.0+20180128.1bd86963-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257678" version="1" comment="libevdocument3-4 is &lt;3.26.0+20180128.1bd86963-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257679" version="1" comment="libevview3-3 is &lt;3.26.0+20180128.1bd86963-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257680" version="1" comment="nautilus-evince is &lt;3.26.0+20180128.1bd86963-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257681" version="1" comment="typelib-1_0-EvinceDocument-3_0 is &lt;3.26.0+20180128.1bd86963-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257682" version="1" comment="typelib-1_0-EvinceView-3_0 is &lt;3.26.0+20180128.1bd86963-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258019" version="1" comment="MozillaFirefox is &lt;60.7.2-3.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258020" version="1" comment="MozillaFirefox-devel is &lt;60.7.2-3.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258021" version="1" comment="MozillaFirefox-translations-common is &lt;60.7.2-3.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258022" version="1" comment="MozillaFirefox-translations-other is &lt;60.7.2-3.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258485" version="1" comment="gvfs is &lt;1.34.2.1-4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258486" version="1" comment="gvfs-backend-afc is &lt;1.34.2.1-4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258487" version="1" comment="gvfs-backend-samba is &lt;1.34.2.1-4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258488" version="1" comment="gvfs-backends is &lt;1.34.2.1-4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258489" version="1" comment="gvfs-devel is &lt;1.34.2.1-4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258490" version="1" comment="gvfs-fuse is &lt;1.34.2.1-4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258491" version="1" comment="gvfs-lang is &lt;1.34.2.1-4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258950" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.24.2-3.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258951" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.24.2-3.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258952" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.24.2-3.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258953" version="1" comment="webkit2gtk3-devel is &lt;2.24.2-3.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258954" version="1" comment="ImageMagick is &lt;7.0.7.34-3.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258955" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.0.7.34-3.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258956" version="1" comment="ImageMagick-config-7-upstream is &lt;7.0.7.34-3.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258957" version="1" comment="ImageMagick-devel is &lt;7.0.7.34-3.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258958" version="1" comment="libMagick++-7_Q16HDRI4 is &lt;7.0.7.34-3.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258959" version="1" comment="libMagick++-devel is &lt;7.0.7.34-3.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258960" version="1" comment="libMagickCore-7_Q16HDRI6 is &lt;7.0.7.34-3.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258961" version="1" comment="libMagickWand-7_Q16HDRI6 is &lt;7.0.7.34-3.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259075" version="1" comment="bubblewrap is &lt;0.2.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259393" version="1" comment="MozillaFirefox is &lt;60.8.0-3.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259394" version="1" comment="MozillaFirefox-devel is &lt;60.8.0-3.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259395" version="1" comment="MozillaFirefox-translations-common is &lt;60.8.0-3.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259396" version="1" comment="MozillaFirefox-translations-other is &lt;60.8.0-3.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260583" version="1" comment="libIlmImf-2_2-23 is &lt;2.2.1-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260584" version="1" comment="libIlmImfUtil-2_2-23 is &lt;2.2.1-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260585" version="1" comment="openexr is &lt;2.2.1-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260586" version="1" comment="openexr-devel is &lt;2.2.1-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261020" version="1" comment="PackageKit is &lt;1.1.10-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261021" version="1" comment="PackageKit-backend-zypp is &lt;1.1.10-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261022" version="1" comment="PackageKit-devel is &lt;1.1.10-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261023" version="1" comment="PackageKit-lang is &lt;1.1.10-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261024" version="1" comment="libpackagekit-glib2-18 is &lt;1.1.10-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261025" version="1" comment="libpackagekit-glib2-devel is &lt;1.1.10-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261026" version="1" comment="libyui-qt-pkg-devel is &lt;2.45.15.2-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261027" version="1" comment="typelib-1_0-PackageKitGlib-1_0 is &lt;1.1.10-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261028" version="1" comment="libIlmImf-2_2-23 is &lt;2.2.1-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261029" version="1" comment="libIlmImfUtil-2_2-23 is &lt;2.2.1-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261030" version="1" comment="openexr is &lt;2.2.1-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261031" version="1" comment="openexr-devel is &lt;2.2.1-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261032" version="1" comment="evince is &lt;3.26.0+20180128.1bd86963-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261033" version="1" comment="evince-devel is &lt;3.26.0+20180128.1bd86963-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261034" version="1" comment="evince-lang is &lt;3.26.0+20180128.1bd86963-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261035" version="1" comment="evince-plugin-djvudocument is &lt;3.26.0+20180128.1bd86963-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261036" version="1" comment="evince-plugin-dvidocument is &lt;3.26.0+20180128.1bd86963-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261037" version="1" comment="evince-plugin-pdfdocument is &lt;3.26.0+20180128.1bd86963-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261038" version="1" comment="evince-plugin-psdocument is &lt;3.26.0+20180128.1bd86963-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261039" version="1" comment="evince-plugin-tiffdocument is &lt;3.26.0+20180128.1bd86963-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261040" version="1" comment="evince-plugin-xpsdocument is &lt;3.26.0+20180128.1bd86963-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261041" version="1" comment="libevdocument3-4 is &lt;3.26.0+20180128.1bd86963-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261042" version="1" comment="libevview3-3 is &lt;3.26.0+20180128.1bd86963-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261043" version="1" comment="nautilus-evince is &lt;3.26.0+20180128.1bd86963-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261044" version="1" comment="typelib-1_0-EvinceDocument-3_0 is &lt;3.26.0+20180128.1bd86963-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261045" version="1" comment="typelib-1_0-EvinceView-3_0 is &lt;3.26.0+20180128.1bd86963-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261046" version="1" comment="python-tk is &lt;2.7.14-7.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261047" version="1" comment="wireshark-devel is &lt;2.4.16-3.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261048" version="1" comment="wireshark-ui-qt is &lt;2.4.16-3.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261049" version="1" comment="ImageMagick is &lt;7.0.7.34-3.67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261050" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.0.7.34-3.67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261051" version="1" comment="ImageMagick-config-7-upstream is &lt;7.0.7.34-3.67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261052" version="1" comment="ImageMagick-devel is &lt;7.0.7.34-3.67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261053" version="1" comment="libMagick++-7_Q16HDRI4 is &lt;7.0.7.34-3.67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261054" version="1" comment="libMagick++-devel is &lt;7.0.7.34-3.67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261055" version="1" comment="libMagickCore-7_Q16HDRI6 is &lt;7.0.7.34-3.67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261056" version="1" comment="libMagickWand-7_Q16HDRI6 is &lt;7.0.7.34-3.67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261426" version="1" comment="python-tk is &lt;2.7.14-7.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262527" version="1" comment="flatpak is &lt;0.10.4-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262528" version="1" comment="flatpak-devel is &lt;0.10.4-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262529" version="1" comment="libflatpak0 is &lt;0.10.4-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262530" version="1" comment="typelib-1_0-Flatpak-1_0 is &lt;0.10.4-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262581" version="1" comment="wavpack-devel is &lt;5.1.0-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264604" version="1" comment="ibus is &lt;1.5.17-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264605" version="1" comment="ibus-devel is &lt;1.5.17-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264606" version="1" comment="ibus-gtk is &lt;1.5.17-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264607" version="1" comment="ibus-gtk3 is &lt;1.5.17-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264608" version="1" comment="ibus-lang is &lt;1.5.17-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264609" version="1" comment="libibus-1_0-5 is &lt;1.5.17-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264610" version="1" comment="python-ibus is &lt;1.5.17-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264611" version="1" comment="typelib-1_0-IBus-1_0 is &lt;1.5.17-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265081" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.24.4-3.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265082" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.24.4-3.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265083" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.24.4-3.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265084" version="1" comment="webkit2gtk3-devel is &lt;2.24.4-3.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265085" version="1" comment="libmodplug-devel is &lt;0.3.17-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265086" version="1" comment="libmodplug1 is &lt;0.3.17-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265087" version="1" comment="libopenmpt is &lt;0.3.17-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265088" version="1" comment="libopenmpt-devel is &lt;0.3.17-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265089" version="1" comment="libopenmpt0 is &lt;0.3.17-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265090" version="1" comment="libopenmpt_modplug1 is &lt;0.3.17-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265091" version="1" comment="djvulibre is &lt;3.5.27-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265092" version="1" comment="libdjvulibre-devel is &lt;3.5.27-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265093" version="1" comment="libdjvulibre21 is &lt;3.5.27-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265094" version="1" comment="SDL2 is &lt;2.0.8-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265095" version="1" comment="libSDL2-2_0-0 is &lt;2.0.8-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265096" version="1" comment="libSDL2-devel is &lt;2.0.8-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243850" version="1" comment="python-tk is &lt;2.7.14-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243851" version="1" comment="MozillaFirefox is &lt;60.5.0-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243852" version="1" comment="MozillaFirefox-devel is &lt;60.5.0-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243853" version="1" comment="MozillaFirefox-translations-common is &lt;60.5.0-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243854" version="1" comment="MozillaFirefox-translations-other is &lt;60.5.0-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243915" version="1" comment="avahi-autoipd is &lt;0.6.32-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243916" version="1" comment="avahi-utils-gtk is &lt;0.6.32-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243917" version="1" comment="libavahi-client3-32bit is &lt;0.6.32-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243918" version="1" comment="libavahi-common3-32bit is &lt;0.6.32-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243919" version="1" comment="libavahi-gobject-devel is &lt;0.6.32-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244806" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.9.4-8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244807" version="1" comment="libQt5Sql5-mysql is &lt;5.9.4-8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244808" version="1" comment="libQt5Sql5-postgresql is &lt;5.9.4-8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244809" version="1" comment="libQt5Sql5-unixODBC is &lt;5.9.4-8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244810" version="1" comment="libqt5-qtbase-platformtheme-gtk3 is &lt;5.9.4-8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244980" version="1" comment="openssh-askpass-gnome is &lt;7.6p1-9.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244981" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.22.6-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244982" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.22.6-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244983" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.22.6-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244984" version="1" comment="webkit2gtk3-devel is &lt;2.22.6-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245882" version="1" comment="wireshark-devel is &lt;2.4.13-3.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245883" version="1" comment="wireshark-ui-qt is &lt;2.4.13-3.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246130" version="1" comment="libqt5-qtimageformats is &lt;5.9.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246131" version="1" comment="libqt5-qtimageformats-devel is &lt;5.9.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246132" version="1" comment="libqt5-qtsvg-private-headers-devel is &lt;5.9.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246134" version="1" comment="libgxps is &lt;0.3.0-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246239" version="1" comment="ImageMagick is &lt;7.0.7.34-3.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246240" version="1" comment="ImageMagick-devel is &lt;7.0.7.34-3.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246241" version="1" comment="libMagick++-7_Q16HDRI4 is &lt;7.0.7.34-3.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246242" version="1" comment="libMagick++-devel is &lt;7.0.7.34-3.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246243" version="1" comment="libMagickCore-7_Q16HDRI6 is &lt;7.0.7.34-3.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246244" version="1" comment="libMagickWand-7_Q16HDRI6 is &lt;7.0.7.34-3.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246395" version="1" comment="liblouis is &lt;3.3.0-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246978" version="1" comment="MozillaFirefox is &lt;60.6.1-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246979" version="1" comment="MozillaFirefox-devel is &lt;60.6.1-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246980" version="1" comment="MozillaFirefox-translations-common is &lt;60.6.1-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246981" version="1" comment="MozillaFirefox-translations-other is &lt;60.6.1-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247179" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.24.0-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247180" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.24.0-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247181" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.24.0-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247182" version="1" comment="webkit2gtk3-devel is &lt;2.24.0-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247183" version="1" comment="SDL is &lt;1.2.15-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243032" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.22.5-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243033" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.22.5-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243034" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.22.5-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243035" version="1" comment="webkit2gtk3-devel is &lt;2.22.5-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247186" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.9.4-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247187" version="1" comment="libQt5Sql5-mysql is &lt;5.9.4-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247188" version="1" comment="libQt5Sql5-postgresql is &lt;5.9.4-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247189" version="1" comment="libQt5Sql5-unixODBC is &lt;5.9.4-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247190" version="1" comment="libqt5-qtbase-platformtheme-gtk3 is &lt;5.9.4-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247637" version="1" comment="audiofile is &lt;0.3.6-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251150" version="1" comment="SDL2 is &lt;2.0.8-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251229" version="1" comment="openexr is &lt;2.2.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264949" version="1" comment="ibus is &lt;1.5.19-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264950" version="1" comment="ibus-devel is &lt;1.5.19-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264951" version="1" comment="ibus-gtk is &lt;1.5.19-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264952" version="1" comment="ibus-gtk3 is &lt;1.5.19-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264953" version="1" comment="ibus-lang is &lt;1.5.19-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264954" version="1" comment="libibus-1_0-5 is &lt;1.5.19-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264955" version="1" comment="typelib-1_0-IBus-1_0 is &lt;1.5.19-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229713" version="1" comment="git-arch is &lt;2.16.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229714" version="1" comment="git-cvs is &lt;2.16.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229715" version="1" comment="git-daemon is &lt;2.16.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229716" version="1" comment="git-doc is &lt;2.16.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229717" version="1" comment="git-email is &lt;2.16.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229718" version="1" comment="git-gui is &lt;2.16.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229719" version="1" comment="git-svn is &lt;2.16.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229720" version="1" comment="git-web is &lt;2.16.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229721" version="1" comment="gitk is &lt;2.16.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230138" version="1" comment="crash is &lt;7.2.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230139" version="1" comment="crash-devel is &lt;7.2.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230140" version="1" comment="crash-kmp-default is &lt;7.2.1_k4.12.14_23-3.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230141" version="1" comment="lttng-modules is &lt;2.10.0-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230142" version="1" comment="lttng-modules-kmp-default is &lt;2.10.0_k4.12.14_23-5.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230318" version="1" comment="perl-doc is &lt;5.26.1-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230358" version="1" comment="glibc-devel-32bit is &lt;2.26-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230359" version="1" comment="glibc-devel-static is &lt;2.26-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230360" version="1" comment="glibc-utils is &lt;2.26-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230361" version="1" comment="glibc-utils-src is &lt;2.26-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230362" version="1" comment="mercurial is &lt;4.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230523" version="1" comment="perl-PerlMagick is &lt;7.0.7.34-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230704" version="1" comment="rpm-build is &lt;4.14.1-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230791" version="1" comment="kernel-docs is &lt;4.12.14-25.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230792" version="1" comment="kernel-obs-build is &lt;4.12.14-25.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230793" version="1" comment="kernel-syms is &lt;4.12.14-25.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230794" version="1" comment="kernel-vanilla is &lt;4.12.14-25.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230795" version="1" comment="kernel-vanilla-base is &lt;4.12.14-25.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231221" version="1" comment="cups-ddk is &lt;2.2.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231310" version="1" comment="kernel-docs is &lt;4.12.14-25.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231311" version="1" comment="kernel-obs-build is &lt;4.12.14-25.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231312" version="1" comment="kernel-syms is &lt;4.12.14-25.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231313" version="1" comment="kernel-vanilla is &lt;4.12.14-25.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231314" version="1" comment="kernel-vanilla-base is &lt;4.12.14-25.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232432" version="1" comment="kernel-docs is &lt;4.12.14-25.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232433" version="1" comment="kernel-obs-build is &lt;4.12.14-25.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232434" version="1" comment="kernel-syms is &lt;4.12.14-25.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232435" version="1" comment="kernel-vanilla is &lt;4.12.14-25.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232436" version="1" comment="kernel-vanilla-base is &lt;4.12.14-25.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232437" version="1" comment="lttng-modules is &lt;2.10.0-5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232438" version="1" comment="lttng-modules-kmp-default is &lt;2.10.0_k4.12.14_25.13-5.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233137" version="1" comment="libgit2 is &lt;0.26.6-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233138" version="1" comment="libgit2-26 is &lt;0.26.6-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233139" version="1" comment="libgit2-devel is &lt;0.26.6-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233214" version="1" comment="perl-PerlMagick is &lt;7.0.7.34-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233586" version="1" comment="kernel-docs is &lt;4.12.14-25.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233587" version="1" comment="kernel-obs-build is &lt;4.12.14-25.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233588" version="1" comment="kernel-syms is &lt;4.12.14-25.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233589" version="1" comment="kernel-vanilla is &lt;4.12.14-25.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233590" version="1" comment="kernel-vanilla-base is &lt;4.12.14-25.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233591" version="1" comment="lttng-modules is &lt;2.10.0-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233592" version="1" comment="lttng-modules-kmp-default is &lt;2.10.0_k4.12.14_25.16-5.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233751" version="1" comment="perl-PerlMagick is &lt;7.0.7.34-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234003" version="1" comment="apache-pdfbox is &lt;1.8.12-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234232" version="1" comment="perl-solv is &lt;0.6.35-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234233" version="1" comment="python3-solv is &lt;0.6.35-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234234" version="1" comment="ruby-solv is &lt;0.6.35-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235765" version="1" comment="perl-PerlMagick is &lt;7.0.7.34-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235766" version="1" comment="kernel-docs is &lt;4.12.14-25.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235767" version="1" comment="kernel-obs-build is &lt;4.12.14-25.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235768" version="1" comment="kernel-syms is &lt;4.12.14-25.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235769" version="1" comment="kernel-vanilla is &lt;4.12.14-25.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235770" version="1" comment="kernel-vanilla-base is &lt;4.12.14-25.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236703" version="1" comment="perl-PerlMagick is &lt;7.0.7.34-3.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237176" version="1" comment="git-arch is &lt;2.16.4-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237177" version="1" comment="git-cvs is &lt;2.16.4-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237178" version="1" comment="git-daemon is &lt;2.16.4-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237179" version="1" comment="git-doc is &lt;2.16.4-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237180" version="1" comment="git-email is &lt;2.16.4-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237181" version="1" comment="git-gui is &lt;2.16.4-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237182" version="1" comment="git-svn is &lt;2.16.4-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237183" version="1" comment="git-web is &lt;2.16.4-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237184" version="1" comment="gitk is &lt;2.16.4-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237201" version="1" comment="kernel-docs is &lt;4.12.14-25.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237202" version="1" comment="kernel-obs-build is &lt;4.12.14-25.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237203" version="1" comment="kernel-syms is &lt;4.12.14-25.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237204" version="1" comment="kernel-vanilla is &lt;4.12.14-25.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237205" version="1" comment="kernel-vanilla-base is &lt;4.12.14-25.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237206" version="1" comment="binutils-devel-32bit is &lt;2.31-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237915" version="1" comment="rust is &lt;1.24.1-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237916" version="1" comment="rust-std is &lt;1.24.1-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238141" version="1" comment="mercurial is &lt;4.5.2-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238406" version="1" comment="bsdtar is &lt;3.3.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238466" version="1" comment="kernel-docs is &lt;4.12.14-25.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238467" version="1" comment="kernel-obs-build is &lt;4.12.14-25.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238468" version="1" comment="kernel-syms is &lt;4.12.14-25.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238469" version="1" comment="kernel-vanilla is &lt;4.12.14-25.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238470" version="1" comment="kernel-vanilla-base is &lt;4.12.14-25.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238704" version="1" comment="xorg-x11-server-sdk is &lt;1.19.6-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239144" version="1" comment="perl-PerlMagick is &lt;7.0.7.34-3.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241275" version="1" comment="libgit2 is &lt;0.26.8-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241567" version="1" comment="cups-ddk is &lt;2.2.7-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253406" version="1" comment="kernel-docs is &lt;4.12.14-150.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253407" version="1" comment="kernel-obs-build is &lt;4.12.14-150.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253408" version="1" comment="kernel-syms is &lt;4.12.14-150.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253409" version="1" comment="kernel-vanilla is &lt;4.12.14-150.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253410" version="1" comment="kernel-vanilla-base is &lt;4.12.14-150.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253611" version="1" comment="graphviz-addons is &lt;2.40.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253612" version="1" comment="graphviz-perl is &lt;2.40.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254147" version="1" comment="python3-tools is &lt;3.6.8-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256924" version="1" comment="perl-PerlMagick is &lt;7.0.7.34-3.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256925" version="1" comment="kernel-docs is &lt;4.12.14-150.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256926" version="1" comment="kernel-obs-build is &lt;4.12.14-150.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256927" version="1" comment="kernel-syms is &lt;4.12.14-150.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256928" version="1" comment="kernel-vanilla is &lt;4.12.14-150.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256929" version="1" comment="kernel-vanilla-base is &lt;4.12.14-150.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258962" version="1" comment="perl-PerlMagick is &lt;7.0.7.34-3.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259240" version="1" comment="kernel-docs is &lt;4.12.14-150.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259241" version="1" comment="kernel-obs-build is &lt;4.12.14-150.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259242" version="1" comment="kernel-syms is &lt;4.12.14-150.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259243" version="1" comment="kernel-vanilla is &lt;4.12.14-150.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259244" version="1" comment="kernel-vanilla-base is &lt;4.12.14-150.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259739" version="1" comment="glibc-devel-32bit is &lt;2.26-13.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259740" version="1" comment="glibc-devel-static is &lt;2.26-13.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259741" version="1" comment="glibc-utils is &lt;2.26-13.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259742" version="1" comment="glibc-utils-src is &lt;2.26-13.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260666" version="1" comment="perl-Mail-SpamAssassin-Plugin-iXhash2 is &lt;2.05-7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261057" version="1" comment="perl-solv is &lt;0.7.5-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261058" version="1" comment="python3-solv is &lt;0.7.5-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261059" version="1" comment="ruby-solv is &lt;0.7.5-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261060" version="1" comment="subversion-bash-completion is &lt;1.10.6-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261061" version="1" comment="subversion-perl is &lt;1.10.6-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261062" version="1" comment="subversion-python is &lt;1.10.6-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261063" version="1" comment="subversion-tools is &lt;1.10.6-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261064" version="1" comment="python3-tools is &lt;3.6.8-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261065" version="1" comment="kernel-docs is &lt;4.12.14-150.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261066" version="1" comment="kernel-obs-build is &lt;4.12.14-150.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261067" version="1" comment="kernel-syms is &lt;4.12.14-150.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261068" version="1" comment="kernel-vanilla is &lt;4.12.14-150.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261069" version="1" comment="kernel-vanilla-base is &lt;4.12.14-150.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261070" version="1" comment="perl-PerlMagick is &lt;7.0.7.34-3.67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243580" version="1" comment="python3-tools is &lt;3.6.5-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262835" version="1" comment="perl-Switch is &lt;2.17-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243581" version="1" comment="kernel-docs is &lt;4.12.14-25.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243582" version="1" comment="kernel-obs-build is &lt;4.12.14-25.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243583" version="1" comment="kernel-syms is &lt;4.12.14-25.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243584" version="1" comment="kernel-vanilla is &lt;4.12.14-25.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243585" version="1" comment="kernel-vanilla-base is &lt;4.12.14-25.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264695" version="1" comment="openldap2-devel-32bit is &lt;2.4.46-9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264956" version="1" comment="kernel-docs is &lt;4.12.14-150.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264957" version="1" comment="kernel-obs-build is &lt;4.12.14-150.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264958" version="1" comment="kernel-syms is &lt;4.12.14-150.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264959" version="1" comment="kernel-vanilla is &lt;4.12.14-150.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264960" version="1" comment="kernel-vanilla-base is &lt;4.12.14-150.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265097" version="1" comment="cargo is &lt;1.36.0-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265098" version="1" comment="clippy is &lt;1.36.0-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265099" version="1" comment="rls is &lt;1.36.0-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265100" version="1" comment="rust is &lt;1.36.0-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265101" version="1" comment="rust-analysis is &lt;1.36.0-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265102" version="1" comment="rust-gdb is &lt;1.36.0-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265103" version="1" comment="rust-src is &lt;1.36.0-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265104" version="1" comment="rust-std-static is &lt;1.36.0-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265105" version="1" comment="rustfmt is &lt;1.36.0-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245629" version="1" comment="python3-magic is &lt;5.32-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246245" version="1" comment="perl-PerlMagick is &lt;7.0.7.34-3.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246400" version="1" comment="kernel-docs is &lt;4.12.14-150.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246401" version="1" comment="kernel-obs-build is &lt;4.12.14-150.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246402" version="1" comment="kernel-syms is &lt;4.12.14-150.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246403" version="1" comment="kernel-vanilla is &lt;4.12.14-150.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246404" version="1" comment="kernel-vanilla-base is &lt;4.12.14-150.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247191" version="1" comment="glibc-devel-32bit is &lt;2.26-13.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247194" version="1" comment="glibc-utils-src is &lt;2.26-13.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257084" version="1" comment="kernel-docs is &lt;4.12.14-197.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257085" version="1" comment="kernel-obs-build is &lt;4.12.14-197.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257086" version="1" comment="kernel-syms is &lt;4.12.14-197.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258693" version="1" comment="kernel-docs is &lt;4.12.14-197.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258694" version="1" comment="kernel-obs-build is &lt;4.12.14-197.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258695" version="1" comment="kernel-syms is &lt;4.12.14-197.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259245" version="1" comment="kernel-docs is &lt;4.12.14-197.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259246" version="1" comment="kernel-obs-build is &lt;4.12.14-197.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259247" version="1" comment="kernel-syms is &lt;4.12.14-197.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261071" version="1" comment="osc is &lt;0.165.4-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261072" version="1" comment="kernel-docs is &lt;4.12.14-197.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261073" version="1" comment="kernel-obs-build is &lt;4.12.14-197.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261074" version="1" comment="kernel-syms is &lt;4.12.14-197.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264961" version="1" comment="kernel-docs is &lt;4.12.14-197.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264962" version="1" comment="kernel-obs-build is &lt;4.12.14-197.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264963" version="1" comment="kernel-syms is &lt;4.12.14-197.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240846" version="1" comment="tomcat is &lt;9.0.10-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240847" version="1" comment="tomcat-docs-webapp is &lt;9.0.10-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240848" version="1" comment="tomcat-embed is &lt;9.0.10-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240849" version="1" comment="tomcat-javadoc is &lt;9.0.10-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240850" version="1" comment="tomcat-jsvc is &lt;9.0.10-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238277" version="1" comment="sle-module-development-tools-obs-release is ==15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238259" version="1" comment="binutils-gold is &lt;2.31-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238260" version="1" comment="cross-arm-binutils is &lt;2.31-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238261" version="1" comment="cross-avr-binutils is &lt;2.31-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238262" version="1" comment="cross-epiphany-binutils is &lt;2.31-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238263" version="1" comment="cross-hppa-binutils is &lt;2.31-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238264" version="1" comment="cross-hppa64-binutils is &lt;2.31-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238265" version="1" comment="cross-i386-binutils is &lt;2.31-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238266" version="1" comment="cross-ia64-binutils is &lt;2.31-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238267" version="1" comment="cross-m68k-binutils is &lt;2.31-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238268" version="1" comment="cross-mips-binutils is &lt;2.31-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238269" version="1" comment="cross-ppc-binutils is &lt;2.31-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238270" version="1" comment="cross-ppc64-binutils is &lt;2.31-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238271" version="1" comment="cross-riscv64-binutils is &lt;2.31-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238272" version="1" comment="cross-rx-binutils is &lt;2.31-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238273" version="1" comment="cross-s390-binutils is &lt;2.31-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238274" version="1" comment="cross-sparc-binutils is &lt;2.31-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238275" version="1" comment="cross-sparc64-binutils is &lt;2.31-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238276" version="1" comment="cross-spu-binutils is &lt;2.31-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238471" version="1" comment="kernel-default-base is &lt;4.12.14-25.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238472" version="1" comment="kernel-docs-html is &lt;4.12.14-25.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238473" version="1" comment="kernel-obs-qa is &lt;4.12.14-25.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238474" version="1" comment="kselftests-kmp-default is &lt;4.12.14-25.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238537" version="1" comment="ffmpeg-private-devel is &lt;3.4.2-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238538" version="1" comment="libavdevice-devel is &lt;3.4.2-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238539" version="1" comment="libavdevice57 is &lt;3.4.2-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238540" version="1" comment="libavfilter-devel is &lt;3.4.2-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238541" version="1" comment="libavfilter6 is &lt;3.4.2-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238566" version="1" comment="curl-mini is &lt;7.60.0-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238567" version="1" comment="libcurl-mini-devel is &lt;7.60.0-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238568" version="1" comment="libcurl4-mini is &lt;7.60.0-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238615" version="1" comment="libsystemd0-mini is &lt;234-24.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238616" version="1" comment="libudev-mini-devel is &lt;234-24.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238617" version="1" comment="libudev-mini1 is &lt;234-24.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238618" version="1" comment="nss-myhostname is &lt;234-24.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238619" version="1" comment="nss-mymachines is &lt;234-24.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238620" version="1" comment="nss-systemd is &lt;234-24.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238621" version="1" comment="systemd-logger is &lt;234-24.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238622" version="1" comment="systemd-mini is &lt;234-24.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238623" version="1" comment="systemd-mini-bash-completion is &lt;234-24.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238624" version="1" comment="systemd-mini-container-mini is &lt;234-24.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238625" version="1" comment="systemd-mini-coredump-mini is &lt;234-24.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238626" version="1" comment="systemd-mini-devel is &lt;234-24.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238627" version="1" comment="systemd-mini-sysvinit is &lt;234-24.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238628" version="1" comment="udev-mini is &lt;234-24.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238629" version="1" comment="MozillaFirefox-branding-upstream is &lt;60.3.0-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238705" version="1" comment="libepubgen is &lt;0.1.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238706" version="1" comment="libepubgen-devel-doc is &lt;0.1.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238707" version="1" comment="liblangtag is &lt;0.6.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238708" version="1" comment="liblangtag-doc is &lt;0.6.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238709" version="1" comment="libmwaw is &lt;0.3.14-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238710" version="1" comment="libmwaw-devel is &lt;0.3.14-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238711" version="1" comment="libmwaw-devel-doc is &lt;0.3.14-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238712" version="1" comment="libmwaw-tools is &lt;0.3.14-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238713" version="1" comment="libstaroffice is &lt;0.0.6-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238714" version="1" comment="libstaroffice-devel is &lt;0.0.6-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238715" version="1" comment="libstaroffice-devel-doc is &lt;0.0.6-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238716" version="1" comment="libstaroffice-tools is &lt;0.0.6-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238717" version="1" comment="libwps is &lt;0.4.9-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238718" version="1" comment="libwps-tools is &lt;0.4.9-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238719" version="1" comment="libxmlsec1-gcrypt1 is &lt;1.2.26-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238720" version="1" comment="libxmlsec1-gnutls1 is &lt;1.2.26-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238721" version="1" comment="libxmlsec1-openssl1 is &lt;1.2.26-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238722" version="1" comment="myspell-af_NA is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238723" version="1" comment="myspell-an is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238724" version="1" comment="myspell-an_ES is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238725" version="1" comment="myspell-ar_AE is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238726" version="1" comment="myspell-ar_BH is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238727" version="1" comment="myspell-ar_DZ is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238728" version="1" comment="myspell-ar_EG is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238729" version="1" comment="myspell-ar_IQ is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238730" version="1" comment="myspell-ar_JO is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238731" version="1" comment="myspell-ar_KW is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238732" version="1" comment="myspell-ar_LB is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238733" version="1" comment="myspell-ar_LY is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238734" version="1" comment="myspell-ar_MA is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238735" version="1" comment="myspell-ar_OM is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238736" version="1" comment="myspell-ar_QA is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238737" version="1" comment="myspell-ar_SA is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238738" version="1" comment="myspell-ar_SD is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238739" version="1" comment="myspell-ar_SY is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238740" version="1" comment="myspell-ar_TN is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238741" version="1" comment="myspell-ar_YE is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238742" version="1" comment="myspell-be_BY is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238743" version="1" comment="myspell-bn_IN is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238744" version="1" comment="myspell-bo is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238745" version="1" comment="myspell-bo_CN is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238746" version="1" comment="myspell-bo_IN is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238747" version="1" comment="myspell-bs is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238748" version="1" comment="myspell-bs_BA is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238749" version="1" comment="myspell-ca_AD is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238750" version="1" comment="myspell-ca_ES is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238751" version="1" comment="myspell-ca_ES_valencia is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238752" version="1" comment="myspell-ca_FR is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238753" version="1" comment="myspell-ca_IT is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238754" version="1" comment="myspell-de_AT is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238755" version="1" comment="myspell-de_CH is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238756" version="1" comment="myspell-en_AU is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238757" version="1" comment="myspell-en_BS is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238758" version="1" comment="myspell-en_BZ is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238759" version="1" comment="myspell-en_CA is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238760" version="1" comment="myspell-en_GB is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238761" version="1" comment="myspell-en_GH is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238762" version="1" comment="myspell-en_IE is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238763" version="1" comment="myspell-en_IN is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238764" version="1" comment="myspell-en_JM is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238765" version="1" comment="myspell-en_MW is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238766" version="1" comment="myspell-en_NA is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238767" version="1" comment="myspell-en_NZ is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238768" version="1" comment="myspell-en_PH is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238769" version="1" comment="myspell-en_TT is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238770" version="1" comment="myspell-en_ZA is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238771" version="1" comment="myspell-en_ZW is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238772" version="1" comment="myspell-es_AR is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238773" version="1" comment="myspell-es_BO is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238774" version="1" comment="myspell-es_CL is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238775" version="1" comment="myspell-es_CO is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238776" version="1" comment="myspell-es_CR is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238777" version="1" comment="myspell-es_CU is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238778" version="1" comment="myspell-es_DO is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238779" version="1" comment="myspell-es_EC is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238780" version="1" comment="myspell-es_GT is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238781" version="1" comment="myspell-es_HN is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238782" version="1" comment="myspell-es_MX is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238783" version="1" comment="myspell-es_NI is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238784" version="1" comment="myspell-es_PA is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238785" version="1" comment="myspell-es_PE is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238786" version="1" comment="myspell-es_PR is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238787" version="1" comment="myspell-es_PY is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238788" version="1" comment="myspell-es_SV is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238789" version="1" comment="myspell-es_UY is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238790" version="1" comment="myspell-es_VE is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238791" version="1" comment="myspell-fr_BE is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238792" version="1" comment="myspell-fr_CA is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238793" version="1" comment="myspell-fr_CH is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238794" version="1" comment="myspell-fr_LU is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238795" version="1" comment="myspell-fr_MC is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238796" version="1" comment="myspell-gd_GB is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238797" version="1" comment="myspell-gl_ES is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238798" version="1" comment="myspell-gug is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238799" version="1" comment="myspell-gug_PY is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238800" version="1" comment="myspell-is is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238801" version="1" comment="myspell-is_IS is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238802" version="1" comment="myspell-kmr_Latn is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238803" version="1" comment="myspell-kmr_Latn_SY is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238804" version="1" comment="myspell-kmr_Latn_TR is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238805" version="1" comment="myspell-lo_LA is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238806" version="1" comment="myspell-ne_NP is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238807" version="1" comment="myspell-nl_BE is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238808" version="1" comment="myspell-nn_NO is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238809" version="1" comment="myspell-oc_FR is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238810" version="1" comment="myspell-pt_AO is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238811" version="1" comment="myspell-sq_AL is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238812" version="1" comment="myspell-sr_CS is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238813" version="1" comment="myspell-sr_Latn_CS is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238814" version="1" comment="myspell-sr_Latn_RS is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238815" version="1" comment="myspell-sr_RS is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238816" version="1" comment="myspell-sv_FI is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238817" version="1" comment="myspell-sw_TZ is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238818" version="1" comment="myspell-te is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238819" version="1" comment="myspell-vi is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238820" version="1" comment="myspell-vi_VN is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238821" version="1" comment="xmlsec1 is &lt;1.2.26-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238822" version="1" comment="xmlsec1-gcrypt-devel is &lt;1.2.26-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238823" version="1" comment="xmlsec1-gnutls-devel is &lt;1.2.26-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238824" version="1" comment="xmlsec1-openssl-devel is &lt;1.2.26-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238825" version="1" comment="xorg-x11-server-source is &lt;1.19.6-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238826" version="1" comment="openssh-cavs is &lt;7.6p1-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240565" version="1" comment="openssl-1_1-doc is &lt;1.1.0i-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240566" version="1" comment="libwpd is &lt;0.10.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240567" version="1" comment="libwpd-devel-doc is &lt;0.10.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240568" version="1" comment="libwpd-tools is &lt;0.10.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240736" version="1" comment="gio-branding-upstream is &lt;2.54.3-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240737" version="1" comment="glib2-devel-static is &lt;2.54.3-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240738" version="1" comment="libgio-fam is &lt;2.54.3-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240778" version="1" comment="qemu-block-dmg is &lt;2.11.2-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240779" version="1" comment="qemu-extra is &lt;2.11.2-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240780" version="1" comment="qemu-linux-user is &lt;2.11.2-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240781" version="1" comment="ruby2.5-rubygem-loofah-doc is &lt;2.2.2-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240782" version="1" comment="ruby2.5-rubygem-loofah-testsuite is &lt;2.2.2-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240783" version="1" comment="rubygem-loofah is &lt;2.2.2-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240878" version="1" comment="postgresql10-test is &lt;10.6-4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240926" version="1" comment="tomcat is &lt;9.0.12-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240927" version="1" comment="tomcat-docs-webapp is &lt;9.0.12-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240928" version="1" comment="tomcat-embed is &lt;9.0.12-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240929" version="1" comment="tomcat-javadoc is &lt;9.0.12-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240930" version="1" comment="tomcat-jsvc is &lt;9.0.12-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241128" version="1" comment="ruby2.5-rubygem-activejob-doc-5_1 is &lt;5.1.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241129" version="1" comment="rubygem-activejob-5_1 is &lt;5.1.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241130" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2p-3.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241131" version="1" comment="libopenssl1_0_0-steam is &lt;1.0.2p-3.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241132" version="1" comment="openssl-1_0_0 is &lt;1.0.2p-3.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241133" version="1" comment="openssl-1_0_0-cavs is &lt;1.0.2p-3.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241134" version="1" comment="openssl-1_0_0-doc is &lt;1.0.2p-3.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241568" version="1" comment="ctdb-pcp-pmda is &lt;4.7.11+git.140.6bd0e5b30d8-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241569" version="1" comment="ctdb-tests is &lt;4.7.11+git.140.6bd0e5b30d8-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241570" version="1" comment="samba-doc is &lt;4.7.11+git.140.6bd0e5b30d8-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241571" version="1" comment="samba-python is &lt;4.7.11+git.140.6bd0e5b30d8-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241572" version="1" comment="samba-test is &lt;4.7.11+git.140.6bd0e5b30d8-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241646" version="1" comment="qemu-block-dmg is &lt;2.11.2-9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241647" version="1" comment="qemu-extra is &lt;2.11.2-9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241648" version="1" comment="qemu-linux-user is &lt;2.11.2-9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241649" version="1" comment="ghostscript-mini is &lt;9.26-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241650" version="1" comment="ghostscript-mini-devel is &lt;9.26-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242056" version="1" comment="nettle is &lt;3.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242057" version="1" comment="bluez-auto-enable-devices is &lt;5.48-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242058" version="1" comment="bluez-test is &lt;5.48-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242059" version="1" comment="git-credential-gnome-keyring is &lt;2.16.4-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242060" version="1" comment="git-credential-libsecret is &lt;2.16.4-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242061" version="1" comment="git-p4 is &lt;2.16.4-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242215" version="1" comment="MozillaFirefox-branding-upstream is &lt;60.4.0-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242453" version="1" comment="containerd-ctr is &lt;1.1.2-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242454" version="1" comment="containerd-test is &lt;1.1.2-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242455" version="1" comment="docker-runc-test is &lt;1.0.0rc5+gitr3562_69663f0bd4b6-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242456" version="1" comment="docker-test is &lt;18.06.1_ce-6.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242457" version="1" comment="docker-zsh-completion is &lt;18.06.1_ce-6.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242458" version="1" comment="go is &lt;1.10.4-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242459" version="1" comment="go-doc is &lt;1.10.4-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242460" version="1" comment="go1.10 is &lt;1.10.7-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242461" version="1" comment="go1.10-doc is &lt;1.10.7-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242462" version="1" comment="golang-packaging is &lt;15.0.11-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240739" version="1" comment="dom4j is &lt;1.6.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240740" version="1" comment="dom4j-demo is &lt;1.6.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240741" version="1" comment="dom4j-javadoc is &lt;1.6.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240742" version="1" comment="dom4j-manual is &lt;1.6.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251795" version="1" comment="libntfs-3g-devel is &lt;2016.2.22-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251796" version="1" comment="ntfs-3g_ntfsprogs is &lt;2016.2.22-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251797" version="1" comment="ntfsprogs-extra is &lt;2016.2.22-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251798" version="1" comment="ImageMagick-doc is &lt;7.0.7.34-3.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251799" version="1" comment="ImageMagick-extra is &lt;7.0.7.34-3.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252157" version="1" comment="ctdb-pcp-pmda is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252158" version="1" comment="ctdb-tests is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252159" version="1" comment="gnutls-guile is &lt;3.6.2-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252160" version="1" comment="ldb-tools is &lt;1.2.4-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252161" version="1" comment="libnettle-devel-32bit is &lt;3.4.1-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252162" version="1" comment="nettle is &lt;3.4.1-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252163" version="1" comment="python-avahi is &lt;0.6.32-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252164" version="1" comment="python-avahi-gtk is &lt;0.6.32-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252165" version="1" comment="python-tdb is &lt;1.3.15-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252166" version="1" comment="python-tevent is &lt;0.9.36-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252167" version="1" comment="python3-tdb is &lt;1.3.15-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252168" version="1" comment="python3-tevent is &lt;0.9.36-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252169" version="1" comment="samba-doc is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252170" version="1" comment="samba-python is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252171" version="1" comment="samba-test is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252368" version="1" comment="java-11-openjdk is &lt;11.0.3.0-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252369" version="1" comment="java-11-openjdk-accessibility is &lt;11.0.3.0-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252370" version="1" comment="java-11-openjdk-demo is &lt;11.0.3.0-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252371" version="1" comment="java-11-openjdk-devel is &lt;11.0.3.0-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252372" version="1" comment="java-11-openjdk-headless is &lt;11.0.3.0-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252373" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.3.0-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252374" version="1" comment="java-11-openjdk-jmods is &lt;11.0.3.0-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252375" version="1" comment="java-11-openjdk-src is &lt;11.0.3.0-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252517" version="1" comment="freeradius-server-doc is &lt;3.0.16-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252518" version="1" comment="ruby2.5-rubygem-actionpack-doc-5_1 is &lt;5.1.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252519" version="1" comment="rubygem-actionpack-5_1 is &lt;5.1.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243057" version="1" comment="zeromq-tools is &lt;4.2.3-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252728" version="1" comment="gnutls-guile is &lt;3.6.7-6.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252791" version="1" comment="sqlite3-doc is &lt;3.28.0-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252854" version="1" comment="webkit-jsc-4 is &lt;2.24.1-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252855" version="1" comment="go1.10 is &lt;1.10.8-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252856" version="1" comment="go1.10-doc is &lt;1.10.8-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252946" version="1" comment="python-Jinja2-emacs is &lt;2.10.1-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252947" version="1" comment="python-Jinja2-vim is &lt;2.10.1-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253180" version="1" comment="bzip2-doc is &lt;1.0.6-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253181" version="1" comment="389-ds is &lt;1.4.0.3-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253182" version="1" comment="389-ds-snmp is &lt;1.4.0.3-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253183" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.212-3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253184" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.212-3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253185" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.212-3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253186" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.212-3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253187" version="1" comment="jakarta-commons-fileupload is &lt;1.1.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253188" version="1" comment="jakarta-commons-fileupload-javadoc is &lt;1.1.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253326" version="1" comment="libxslt-python is &lt;1.1.32-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253411" version="1" comment="containerd-ctr is &lt;1.2.5-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253412" version="1" comment="containerd-test is &lt;1.2.5-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253413" version="1" comment="docker-runc-test is &lt;1.0.0rc6+gitr3804_2b18fe1d885e-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253414" version="1" comment="docker-test is &lt;18.09.6_ce-6.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253415" version="1" comment="docker-zsh-completion is &lt;18.09.6_ce-6.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253416" version="1" comment="go is &lt;1.12-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253417" version="1" comment="go-doc is &lt;1.12-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253418" version="1" comment="go1.11 is &lt;1.11.9-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253419" version="1" comment="go1.11-doc is &lt;1.11.9-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253420" version="1" comment="go1.12 is &lt;1.12.4-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253421" version="1" comment="go1.12-doc is &lt;1.12.4-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253422" version="1" comment="qemu-block-dmg is &lt;2.11.2-9.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253423" version="1" comment="qemu-extra is &lt;2.11.2-9.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253424" version="1" comment="qemu-linux-user is &lt;2.11.2-9.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253425" version="1" comment="kernel-docs-html is &lt;4.12.14-150.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253426" version="1" comment="kernel-obs-qa is &lt;4.12.14-150.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253427" version="1" comment="kselftests-kmp-default is &lt;4.12.14-150.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243153" version="1" comment="openssh-cavs is &lt;7.6p1-9.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253613" version="1" comment="evolution is &lt;3.26.6-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253614" version="1" comment="glade-catalog-evolution is &lt;3.26.6-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253615" version="1" comment="graphviz-doc is &lt;2.40.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253616" version="1" comment="graphviz-gnome is &lt;2.40.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253617" version="1" comment="graphviz-guile is &lt;2.40.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253618" version="1" comment="graphviz-gvedit is &lt;2.40.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253619" version="1" comment="graphviz-java is &lt;2.40.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253620" version="1" comment="graphviz-lua is &lt;2.40.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253621" version="1" comment="graphviz-php is &lt;2.40.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253622" version="1" comment="graphviz-ruby is &lt;2.40.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253623" version="1" comment="graphviz-smyrna is &lt;2.40.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253754" version="1" comment="wireshark-plugin-libvirt is &lt;4.0.0-9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253856" version="1" comment="ncat is &lt;7.70-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253857" version="1" comment="ndiff is &lt;7.70-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253858" version="1" comment="nping is &lt;7.70-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253859" version="1" comment="zenmap is &lt;7.70-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253921" version="1" comment="ffmpeg-private-devel is &lt;3.4.2-4.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253922" version="1" comment="libavdevice-devel is &lt;3.4.2-4.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253923" version="1" comment="libavdevice57 is &lt;3.4.2-4.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253924" version="1" comment="libavfilter-devel is &lt;3.4.2-4.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253925" version="1" comment="libavfilter6 is &lt;3.4.2-4.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243210" version="1" comment="libraw is &lt;0.18.9-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243211" version="1" comment="libraw-devel-static is &lt;0.18.9-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243212" version="1" comment="libraw-tools is &lt;0.18.9-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254148" version="1" comment="libu2f-host-doc is &lt;1.1.6-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254149" version="1" comment="u2f-host is &lt;1.1.6-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254150" version="1" comment="gnutls-guile is &lt;3.6.7-6.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254151" version="1" comment="python3-doc is &lt;3.6.8-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254152" version="1" comment="python3-testsuite is &lt;3.6.8-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254153" version="1" comment="bluez-auto-enable-devices is &lt;5.48-5.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254154" version="1" comment="bluez-test is &lt;5.48-5.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254278" version="1" comment="wireshark-plugin-libvirt is &lt;4.0.0-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254279" version="1" comment="curl-mini is &lt;7.60.0-3.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254280" version="1" comment="libcurl-mini-devel is &lt;7.60.0-3.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254281" version="1" comment="libcurl4-mini is &lt;7.60.0-3.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254439" version="1" comment="libsystemd0-mini is &lt;234-24.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254440" version="1" comment="libudev-mini-devel is &lt;234-24.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254441" version="1" comment="libudev-mini1 is &lt;234-24.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254442" version="1" comment="nss-myhostname is &lt;234-24.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254443" version="1" comment="nss-mymachines is &lt;234-24.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254444" version="1" comment="nss-systemd is &lt;234-24.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254445" version="1" comment="systemd-logger is &lt;234-24.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254446" version="1" comment="systemd-mini is &lt;234-24.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254447" version="1" comment="systemd-mini-bash-completion is &lt;234-24.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254448" version="1" comment="systemd-mini-container-mini is &lt;234-24.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254449" version="1" comment="systemd-mini-coredump-mini is &lt;234-24.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254450" version="1" comment="systemd-mini-devel is &lt;234-24.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254451" version="1" comment="systemd-mini-sysvinit is &lt;234-24.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254452" version="1" comment="udev-mini is &lt;234-24.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254453" version="1" comment="NetworkManager-branding-upstream is &lt;1.10.6-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243213" version="1" comment="libsystemd0-mini is &lt;234-24.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243214" version="1" comment="libudev-mini-devel is &lt;234-24.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243215" version="1" comment="libudev-mini1 is &lt;234-24.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243216" version="1" comment="nss-myhostname is &lt;234-24.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243217" version="1" comment="nss-mymachines is &lt;234-24.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243218" version="1" comment="nss-systemd is &lt;234-24.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243219" version="1" comment="systemd-logger is &lt;234-24.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243220" version="1" comment="systemd-mini is &lt;234-24.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243221" version="1" comment="systemd-mini-bash-completion is &lt;234-24.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243222" version="1" comment="systemd-mini-container-mini is &lt;234-24.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243223" version="1" comment="systemd-mini-coredump-mini is &lt;234-24.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243224" version="1" comment="systemd-mini-devel is &lt;234-24.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243225" version="1" comment="systemd-mini-sysvinit is &lt;234-24.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243226" version="1" comment="udev-mini is &lt;234-24.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254454" version="1" comment="axis-manual is &lt;1.4-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255743" version="1" comment="cronie-anacron is &lt;1.5.1-6.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255744" version="1" comment="libpng16-tools is &lt;1.6.34-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255821" version="1" comment="MozillaFirefox-branding-upstream is &lt;60.7.0-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255822" version="1" comment="bind-lwresd is &lt;9.11.2-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243281" version="1" comment="ghostscript-mini is &lt;9.26a-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243282" version="1" comment="ghostscript-mini-devel is &lt;9.26a-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256574" version="1" comment="gnome-shell-browser-plugin is &lt;3.26.2+20180130.0d9c74212-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256575" version="1" comment="php7 is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256576" version="1" comment="php7-embed is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256577" version="1" comment="php7-readline is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256578" version="1" comment="php7-sodium is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256579" version="1" comment="php7-tidy is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256698" version="1" comment="libnfsidmap-sss is &lt;1.16.1-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256699" version="1" comment="python3-ipa_hbac is &lt;1.16.1-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256700" version="1" comment="python3-sss-murmur is &lt;1.16.1-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256701" version="1" comment="python3-sss_nss_idmap is &lt;1.16.1-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256702" version="1" comment="sssd-winbind-idmap is &lt;1.16.1-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242610" version="1" comment="polkit-doc is &lt;0.114-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256930" version="1" comment="dbus-1-devel-doc is &lt;1.12.2-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256931" version="1" comment="ImageMagick-doc is &lt;7.0.7.34-3.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256932" version="1" comment="ImageMagick-extra is &lt;7.0.7.34-3.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256933" version="1" comment="kernel-docs-html is &lt;4.12.14-150.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256934" version="1" comment="kernel-obs-qa is &lt;4.12.14-150.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256935" version="1" comment="kselftests-kmp-default is &lt;4.12.14-150.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257479" version="1" comment="docker-test is &lt;18.09.6_ce-6.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257480" version="1" comment="docker-zsh-completion is &lt;18.09.6_ce-6.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257683" version="1" comment="gio-branding-upstream is &lt;2.54.3-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257684" version="1" comment="glib2-devel-static is &lt;2.54.3-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257685" version="1" comment="libgio-fam is &lt;2.54.3-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257686" version="1" comment="dbus-1-devel-doc is &lt;1.12.2-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257687" version="1" comment="exempi-tools is &lt;2.4.5-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257688" version="1" comment="MozillaFirefox-branding-upstream is &lt;60.7.1-3.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257689" version="1" comment="wireshark-plugin-libvirt is &lt;4.0.0-9.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257690" version="1" comment="evince-plugin-comicsdocument is &lt;3.26.0+20180128.1bd86963-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258023" version="1" comment="MozillaFirefox-branding-upstream is &lt;60.7.2-3.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258224" version="1" comment="tomcat is &lt;9.0.20-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258225" version="1" comment="tomcat-docs-webapp is &lt;9.0.20-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258226" version="1" comment="tomcat-embed is &lt;9.0.20-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258227" version="1" comment="tomcat-javadoc is &lt;9.0.20-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258228" version="1" comment="tomcat-jsvc is &lt;9.0.20-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258661" version="1" comment="python-Twisted is &lt;17.9.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258662" version="1" comment="python-Twisted-doc is &lt;17.9.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258663" version="1" comment="python2-Twisted is &lt;17.9.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258664" version="1" comment="python3-Twisted is &lt;17.9.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243354" version="1" comment="python-paramiko-doc is &lt;2.4.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243355" version="1" comment="krb5-mini is &lt;1.15.2-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243356" version="1" comment="krb5-mini-devel is &lt;1.15.2-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258928" version="1" comment="libu2f-host-doc is &lt;1.1.6-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258929" version="1" comment="u2f-host is &lt;1.1.6-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258963" version="1" comment="webkit-jsc-4 is &lt;2.24.2-3.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258964" version="1" comment="ImageMagick-doc is &lt;7.0.7.34-3.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258965" version="1" comment="ImageMagick-extra is &lt;7.0.7.34-3.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258966" version="1" comment="zeromq-tools is &lt;4.2.3-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259025" version="1" comment="ruby2.5-doc is &lt;2.5.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259026" version="1" comment="ruby2.5-doc-ri is &lt;2.5.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259027" version="1" comment="libpq5-32bit is &lt;10.9-4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259028" version="1" comment="postgresql10-test is &lt;10.9-4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259076" version="1" comment="tomcat is &lt;9.0.21-3.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259077" version="1" comment="tomcat-docs-webapp is &lt;9.0.21-3.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259078" version="1" comment="tomcat-embed is &lt;9.0.21-3.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259079" version="1" comment="tomcat-javadoc is &lt;9.0.21-3.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259080" version="1" comment="tomcat-jsvc is &lt;9.0.21-3.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259081" version="1" comment="php7 is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259082" version="1" comment="php7-embed is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259083" version="1" comment="php7-readline is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259084" version="1" comment="php7-sodium is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259085" version="1" comment="php7-tidy is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259086" version="1" comment="gio-branding-upstream is &lt;2.54.3-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259087" version="1" comment="glib2-devel-static is &lt;2.54.3-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259088" version="1" comment="libgio-fam is &lt;2.54.3-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259248" version="1" comment="bzip2-doc is &lt;1.0.6-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259249" version="1" comment="kernel-docs-html is &lt;4.12.14-150.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259250" version="1" comment="kernel-obs-qa is &lt;4.12.14-150.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259251" version="1" comment="kselftests-kmp-default is &lt;4.12.14-150.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259252" version="1" comment="libgcrypt-cavs is &lt;1.8.2-6.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259397" version="1" comment="MozillaFirefox-branding-upstream is &lt;60.8.0-3.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259743" version="1" comment="glibc-html is &lt;2.26-13.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259744" version="1" comment="libixion is &lt;0.14.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259745" version="1" comment="libixion-devel is &lt;0.14.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259746" version="1" comment="libixion-tools is &lt;0.14.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259747" version="1" comment="liborcus is &lt;0.14.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259748" version="1" comment="liborcus-tools is &lt;0.14.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259749" version="1" comment="libwps is &lt;0.4.10-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259750" version="1" comment="libwps-tools is &lt;0.4.10-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259751" version="1" comment="mdds-1_4 is &lt;1.4.3-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259752" version="1" comment="mdds-1_4-devel is &lt;1.4.3-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259753" version="1" comment="myspell-af_NA is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259754" version="1" comment="myspell-an is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259755" version="1" comment="myspell-an_ES is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259756" version="1" comment="myspell-ar_AE is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259757" version="1" comment="myspell-ar_BH is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259758" version="1" comment="myspell-ar_DZ is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259759" version="1" comment="myspell-ar_EG is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259760" version="1" comment="myspell-ar_IQ is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259761" version="1" comment="myspell-ar_JO is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259762" version="1" comment="myspell-ar_KW is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259763" version="1" comment="myspell-ar_LB is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259764" version="1" comment="myspell-ar_LY is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259765" version="1" comment="myspell-ar_MA is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259766" version="1" comment="myspell-ar_OM is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259767" version="1" comment="myspell-ar_QA is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259768" version="1" comment="myspell-ar_SA is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259769" version="1" comment="myspell-ar_SD is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259770" version="1" comment="myspell-ar_SY is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259771" version="1" comment="myspell-ar_TN is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259772" version="1" comment="myspell-ar_YE is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259773" version="1" comment="myspell-be_BY is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259774" version="1" comment="myspell-bn_IN is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259775" version="1" comment="myspell-bo is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259776" version="1" comment="myspell-bo_CN is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259777" version="1" comment="myspell-bo_IN is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259778" version="1" comment="myspell-bs is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259779" version="1" comment="myspell-bs_BA is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259780" version="1" comment="myspell-ca_AD is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259781" version="1" comment="myspell-ca_ES is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259782" version="1" comment="myspell-ca_ES_valencia is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259783" version="1" comment="myspell-ca_FR is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259784" version="1" comment="myspell-ca_IT is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259785" version="1" comment="myspell-de_AT is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259786" version="1" comment="myspell-de_CH is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259787" version="1" comment="myspell-en_AU is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259788" version="1" comment="myspell-en_BS is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259789" version="1" comment="myspell-en_BZ is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259790" version="1" comment="myspell-en_CA is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259791" version="1" comment="myspell-en_GB is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259792" version="1" comment="myspell-en_GH is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259793" version="1" comment="myspell-en_IE is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259794" version="1" comment="myspell-en_IN is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259795" version="1" comment="myspell-en_JM is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259796" version="1" comment="myspell-en_MW is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259797" version="1" comment="myspell-en_NA is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259798" version="1" comment="myspell-en_NZ is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259799" version="1" comment="myspell-en_PH is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259800" version="1" comment="myspell-en_TT is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259801" version="1" comment="myspell-en_ZA is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259802" version="1" comment="myspell-en_ZW is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259803" version="1" comment="myspell-es_AR is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259804" version="1" comment="myspell-es_BO is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259805" version="1" comment="myspell-es_CL is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259806" version="1" comment="myspell-es_CO is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259807" version="1" comment="myspell-es_CR is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259808" version="1" comment="myspell-es_CU is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259809" version="1" comment="myspell-es_DO is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259810" version="1" comment="myspell-es_EC is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259811" version="1" comment="myspell-es_GT is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259812" version="1" comment="myspell-es_HN is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259813" version="1" comment="myspell-es_MX is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259814" version="1" comment="myspell-es_NI is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259815" version="1" comment="myspell-es_PA is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259816" version="1" comment="myspell-es_PE is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259817" version="1" comment="myspell-es_PR is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259818" version="1" comment="myspell-es_PY is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259819" version="1" comment="myspell-es_SV is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259820" version="1" comment="myspell-es_UY is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259821" version="1" comment="myspell-es_VE is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259822" version="1" comment="myspell-fr_BE is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259823" version="1" comment="myspell-fr_CA is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259824" version="1" comment="myspell-fr_CH is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259825" version="1" comment="myspell-fr_LU is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259826" version="1" comment="myspell-fr_MC is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259827" version="1" comment="myspell-gd_GB is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259828" version="1" comment="myspell-gl_ES is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259829" version="1" comment="myspell-gug is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259830" version="1" comment="myspell-gug_PY is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259831" version="1" comment="myspell-is is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259832" version="1" comment="myspell-is_IS is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259833" version="1" comment="myspell-kmr_Latn is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259834" version="1" comment="myspell-kmr_Latn_SY is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259835" version="1" comment="myspell-kmr_Latn_TR is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259836" version="1" comment="myspell-lo_LA is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259837" version="1" comment="myspell-ne_NP is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259838" version="1" comment="myspell-nl_BE is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259839" version="1" comment="myspell-nn_NO is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259840" version="1" comment="myspell-oc_FR is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259841" version="1" comment="myspell-pt_AO is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259842" version="1" comment="myspell-sq_AL is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259843" version="1" comment="myspell-sr_CS is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259844" version="1" comment="myspell-sr_Latn_CS is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259845" version="1" comment="myspell-sr_Latn_RS is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259846" version="1" comment="myspell-sr_RS is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259847" version="1" comment="myspell-sv_FI is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259848" version="1" comment="myspell-sw_TZ is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259849" version="1" comment="myspell-te is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259850" version="1" comment="myspell-vi is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259851" version="1" comment="myspell-vi_VN is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259852" version="1" comment="python3-libixion is &lt;0.14.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259853" version="1" comment="python3-liborcus is &lt;0.14.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243357" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.10.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243358" version="1" comment="subversion-python-ctypes is &lt;1.10.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243359" version="1" comment="subversion-ruby is &lt;1.10.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260587" version="1" comment="openexr-doc is &lt;2.2.1-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243360" version="1" comment="libopenssl-1_1-devel-32bit is &lt;1.1.0i-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243361" version="1" comment="openssl-1_1-doc is &lt;1.1.0i-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260667" version="1" comment="java-11-openjdk-accessibility is &lt;11.0.4.0-3.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260668" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.4.0-3.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260669" version="1" comment="java-11-openjdk-jmods is &lt;11.0.4.0-3.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260670" version="1" comment="java-11-openjdk-src is &lt;11.0.4.0-3.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260671" version="1" comment="bzip2-doc is &lt;1.0.6-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260873" version="1" comment="polkit-doc is &lt;0.114-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260874" version="1" comment="mariadb is &lt;10.2.25-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260875" version="1" comment="mariadb-bench is &lt;10.2.25-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260876" version="1" comment="mariadb-galera is &lt;10.2.25-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260877" version="1" comment="mariadb-test is &lt;10.2.25-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260878" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.222-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260879" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.222-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260880" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.222-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260881" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.222-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261075" version="1" comment="PackageKit-branding-upstream is &lt;1.1.10-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261076" version="1" comment="libsolv-demo is &lt;0.7.5-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261077" version="1" comment="libzypp-devel-doc is &lt;17.12.0-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261078" version="1" comment="yast2-pkg-bindings-devel-doc is &lt;4.0.13-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261079" version="1" comment="zypper-aptitude is &lt;1.14.28-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261080" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.10.6-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261081" version="1" comment="subversion-python-ctypes is &lt;1.10.6-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261082" version="1" comment="subversion-ruby is &lt;1.10.6-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261083" version="1" comment="icedtea-web is &lt;1.7.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261084" version="1" comment="icedtea-web-javadoc is &lt;1.7.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261085" version="1" comment="openexr-doc is &lt;2.2.1-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261086" version="1" comment="python3-doc is &lt;3.6.8-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261087" version="1" comment="python3-testsuite is &lt;3.6.8-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261088" version="1" comment="evince-plugin-comicsdocument is &lt;3.26.0+20180128.1bd86963-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261089" version="1" comment="python-demo is &lt;2.7.14-7.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261090" version="1" comment="python-doc is &lt;2.7.14-7.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261091" version="1" comment="python-doc-pdf is &lt;2.7.14-7.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261092" version="1" comment="python-idle is &lt;2.7.14-7.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261093" version="1" comment="kernel-docs-html is &lt;4.12.14-150.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261094" version="1" comment="kernel-obs-qa is &lt;4.12.14-150.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261095" version="1" comment="kselftests-kmp-default is &lt;4.12.14-150.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261096" version="1" comment="ImageMagick-doc is &lt;7.0.7.34-3.67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261097" version="1" comment="ImageMagick-extra is &lt;7.0.7.34-3.67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261427" version="1" comment="python-demo is &lt;2.7.14-7.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261428" version="1" comment="python-doc is &lt;2.7.14-7.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261429" version="1" comment="python-doc-pdf is &lt;2.7.14-7.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261430" version="1" comment="python-idle is &lt;2.7.14-7.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261442" version="1" comment="containerd-ctr is &lt;1.2.6-5.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261443" version="1" comment="docker-test is &lt;19.03.1_ce-6.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261444" version="1" comment="docker-zsh-completion is &lt;19.03.1_ce-6.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243586" version="1" comment="python3-doc is &lt;3.6.5-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243587" version="1" comment="python3-testsuite is &lt;3.6.5-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261564" version="1" comment="389-ds is &lt;1.4.0.26~git0.8a2d3de6f-4.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261565" version="1" comment="389-ds-snmp is &lt;1.4.0.26~git0.8a2d3de6f-4.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243588" version="1" comment="java-11-openjdk is &lt;11.0.2.0-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243589" version="1" comment="java-11-openjdk-accessibility is &lt;11.0.2.0-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243590" version="1" comment="java-11-openjdk-demo is &lt;11.0.2.0-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243591" version="1" comment="java-11-openjdk-devel is &lt;11.0.2.0-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243592" version="1" comment="java-11-openjdk-headless is &lt;11.0.2.0-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243593" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.2.0-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243594" version="1" comment="java-11-openjdk-jmods is &lt;11.0.2.0-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243595" version="1" comment="java-11-openjdk-src is &lt;11.0.2.0-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262626" version="1" comment="python-SQLAlchemy is &lt;1.2.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262627" version="1" comment="python-SQLAlchemy-doc is &lt;1.2.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262628" version="1" comment="python2-SQLAlchemy is &lt;1.2.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262629" version="1" comment="python3-SQLAlchemy is &lt;1.2.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262630" version="1" comment="python-Twisted is &lt;17.9.0-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262631" version="1" comment="python-Twisted-doc is &lt;17.9.0-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262632" version="1" comment="python2-Twisted is &lt;17.9.0-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262633" version="1" comment="python3-Twisted is &lt;17.9.0-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262634" version="1" comment="go1.11 is &lt;1.11.13-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262635" version="1" comment="go1.11-doc is &lt;1.11.13-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262636" version="1" comment="go1.12 is &lt;1.12.9-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262637" version="1" comment="go1.12-doc is &lt;1.12.9-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262836" version="1" comment="libpq5-32bit is &lt;10.10-4.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262837" version="1" comment="postgresql10-test is &lt;10.10-4.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262838" version="1" comment="apache2 is &lt;2.4.33-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262839" version="1" comment="apache2-event is &lt;2.4.33-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262840" version="1" comment="apache2-example-pages is &lt;2.4.33-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243596" version="1" comment="kernel-docs-html is &lt;4.12.14-25.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243597" version="1" comment="kernel-obs-qa is &lt;4.12.14-25.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243598" version="1" comment="kselftests-kmp-default is &lt;4.12.14-25.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262841" version="1" comment="apache-commons-beanutils is &lt;1.9.2-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262842" version="1" comment="apache-commons-beanutils-javadoc is &lt;1.9.2-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262843" version="1" comment="qemu-block-dmg is &lt;2.11.2-9.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262844" version="1" comment="qemu-extra is &lt;2.11.2-9.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262845" version="1" comment="qemu-linux-user is &lt;2.11.2-9.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243761" version="1" comment="liburiparser1 is &lt;0.8.5-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243762" version="1" comment="uriparser is &lt;0.8.5-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243763" version="1" comment="uriparser-devel is &lt;0.8.5-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263730" version="1" comment="python-Werkzeug-doc is &lt;0.12.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263731" version="1" comment="python2-Werkzeug is &lt;0.12.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263823" version="1" comment="golang-github-prometheus-alertmanager is &lt;0.16.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263824" version="1" comment="golang-github-prometheus-prometheus is &lt;2.11.1-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263825" version="1" comment="python2-rhnlib is &lt;4.0.11-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263826" version="1" comment="rhnlib is &lt;4.0.11-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263827" version="1" comment="spacecmd is &lt;4.0.14-3.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263828" version="1" comment="spacewalk-backend is &lt;4.0.25-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263829" version="1" comment="spacewalk-backend-app is &lt;4.0.25-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263830" version="1" comment="spacewalk-backend-applet is &lt;4.0.25-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263831" version="1" comment="spacewalk-backend-cdn is &lt;4.0.25-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263832" version="1" comment="spacewalk-backend-config-files is &lt;4.0.25-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263833" version="1" comment="spacewalk-backend-config-files-common is &lt;4.0.25-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263834" version="1" comment="spacewalk-backend-config-files-tool is &lt;4.0.25-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263835" version="1" comment="spacewalk-backend-iss is &lt;4.0.25-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263836" version="1" comment="spacewalk-backend-iss-export is &lt;4.0.25-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263837" version="1" comment="spacewalk-backend-libs is &lt;4.0.25-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263838" version="1" comment="spacewalk-backend-package-push-server is &lt;4.0.25-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263839" version="1" comment="spacewalk-backend-server is &lt;4.0.25-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263840" version="1" comment="spacewalk-backend-sql is &lt;4.0.25-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263841" version="1" comment="spacewalk-backend-sql-oracle is &lt;4.0.25-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263842" version="1" comment="spacewalk-backend-sql-postgresql is &lt;4.0.25-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263843" version="1" comment="spacewalk-backend-tools is &lt;4.0.25-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263844" version="1" comment="spacewalk-backend-xml-export-libs is &lt;4.0.25-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263845" version="1" comment="spacewalk-backend-xmlrpc is &lt;4.0.25-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263920" version="1" comment="ghostscript-mini is &lt;9.26a-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263921" version="1" comment="ghostscript-mini-devel is &lt;9.26a-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263922" version="1" comment="libgcrypt-cavs is &lt;1.8.2-6.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264541" version="1" comment="curl-mini is &lt;7.60.0-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264542" version="1" comment="libcurl-mini-devel is &lt;7.60.0-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264543" version="1" comment="libcurl4-mini is &lt;7.60.0-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264612" version="1" comment="python3-ibus is &lt;1.5.17-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264613" version="1" comment="libfdisk-devel-static is &lt;2.31.1-9.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264614" version="1" comment="libmount-devel-static is &lt;2.31.1-9.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264615" version="1" comment="libsmartcols-devel-static is &lt;2.31.1-9.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264616" version="1" comment="python-libmount is &lt;2.31.1-9.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264696" version="1" comment="libldap-data is &lt;2.4.46-9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264697" version="1" comment="openldap2-back-sock is &lt;2.4.46-9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264698" version="1" comment="openldap2-back-sql is &lt;2.4.46-9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264699" version="1" comment="openldap2-contrib is &lt;2.4.46-9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264700" version="1" comment="openldap2-doc is &lt;2.4.46-9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264701" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264964" version="1" comment="libopenssl-1_1-devel-32bit is &lt;1.1.0i-4.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264965" version="1" comment="openssl-1_1-doc is &lt;1.1.0i-4.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264966" version="1" comment="kernel-docs-html is &lt;4.12.14-150.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264967" version="1" comment="kernel-obs-qa is &lt;4.12.14-150.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264968" version="1" comment="kselftests-kmp-default is &lt;4.12.14-150.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264969" version="1" comment="ncat is &lt;7.70-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264970" version="1" comment="ndiff is &lt;7.70-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264971" version="1" comment="nping is &lt;7.70-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264972" version="1" comment="zenmap is &lt;7.70-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265106" version="1" comment="webkit-jsc-4 is &lt;2.24.4-3.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265107" version="1" comment="openmpt123 is &lt;0.3.17-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265108" version="1" comment="rust-cbindgen is &lt;0.8.7-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265109" version="1" comment="rust-doc is &lt;1.36.0-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265110" version="1" comment="djvulibre-doc is &lt;3.5.27-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265111" version="1" comment="ghostscript-mini is &lt;9.27-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265112" version="1" comment="ghostscript-mini-devel is &lt;9.27-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243855" version="1" comment="lua53-doc is &lt;5.3.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265214" version="1" comment="nghttp2-python is &lt;1.39.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265215" version="1" comment="python3-nghttp2 is &lt;1.39.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243856" version="1" comment="curl-mini is &lt;7.60.0-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243857" version="1" comment="libcurl-mini-devel is &lt;7.60.0-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243858" version="1" comment="libcurl4-mini is &lt;7.60.0-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243859" version="1" comment="python-demo is &lt;2.7.14-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243860" version="1" comment="python-doc is &lt;2.7.14-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243861" version="1" comment="python-doc-pdf is &lt;2.7.14-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243862" version="1" comment="python-idle is &lt;2.7.14-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243863" version="1" comment="MozillaFirefox-branding-upstream is &lt;60.5.0-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243920" version="1" comment="LibVNCServer is &lt;0.9.10-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243921" version="1" comment="LibVNCServer-devel is &lt;0.9.10-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243922" version="1" comment="libvncserver0 is &lt;0.9.10-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243923" version="1" comment="python-avahi is &lt;0.6.32-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243924" version="1" comment="python-avahi-gtk is &lt;0.6.32-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243925" version="1" comment="containerd-ctr is &lt;1.1.2-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243926" version="1" comment="containerd-test is &lt;1.1.2-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243927" version="1" comment="docker-runc-test is &lt;1.0.0rc5+gitr3562_69663f0bd4b6-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243928" version="1" comment="docker-test is &lt;18.09.0_ce-6.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243929" version="1" comment="docker-zsh-completion is &lt;18.09.0_ce-6.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244093" version="1" comment="nginx is &lt;1.14.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244094" version="1" comment="vim-plugin-nginx is &lt;1.14.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244188" version="1" comment="docker-runc-test is &lt;1.0.0rc5+gitr3562_69663f0bd4b6-6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244262" version="1" comment="build-mkdrpms is &lt;20190128-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244459" version="1" comment="qemu-block-dmg is &lt;2.11.2-9.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244460" version="1" comment="qemu-extra is &lt;2.11.2-9.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244461" version="1" comment="qemu-linux-user is &lt;2.11.2-9.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244462" version="1" comment="libsystemd0-mini is &lt;234-24.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244463" version="1" comment="libudev-mini-devel is &lt;234-24.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244464" version="1" comment="libudev-mini1 is &lt;234-24.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244465" version="1" comment="nss-myhostname is &lt;234-24.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244466" version="1" comment="nss-mymachines is &lt;234-24.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244467" version="1" comment="nss-systemd is &lt;234-24.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244468" version="1" comment="systemd-logger is &lt;234-24.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244469" version="1" comment="systemd-mini is &lt;234-24.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244470" version="1" comment="systemd-mini-bash-completion is &lt;234-24.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244471" version="1" comment="systemd-mini-container-mini is &lt;234-24.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244472" version="1" comment="systemd-mini-coredump-mini is &lt;234-24.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244473" version="1" comment="systemd-mini-devel is &lt;234-24.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244474" version="1" comment="systemd-mini-sysvinit is &lt;234-24.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244475" version="1" comment="udev-mini is &lt;234-24.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244811" version="1" comment="libQt5Bootstrap-devel-static is &lt;5.9.4-8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244812" version="1" comment="libqt5-qtbase-examples is &lt;5.9.4-8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244985" version="1" comment="containerd-ctr is &lt;1.2.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244986" version="1" comment="containerd-test is &lt;1.2.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244987" version="1" comment="docker-runc-test is &lt;1.0.0rc6+gitr3748_96ec2177ae84-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244988" version="1" comment="docker-test is &lt;18.09.1_ce-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244989" version="1" comment="docker-zsh-completion is &lt;18.09.1_ce-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244990" version="1" comment="openssh-cavs is &lt;7.6p1-9.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244991" version="1" comment="webkit-jsc-4 is &lt;2.22.6-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242581" version="1" comment="libraw is &lt;0.18.9-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242582" version="1" comment="libraw-devel-static is &lt;0.18.9-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242583" version="1" comment="libraw-tools is &lt;0.18.9-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244992" version="1" comment="apache2 is &lt;2.4.33-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244993" version="1" comment="apache2-event is &lt;2.4.33-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244994" version="1" comment="apache2-example-pages is &lt;2.4.33-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245383" version="1" comment="gdm-branding-upstream is &lt;3.26.2.1-13.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245463" version="1" comment="freerdp is &lt;2.0.0~rc4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245464" version="1" comment="freerdp-server is &lt;2.0.0~rc4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245465" version="1" comment="freerdp-wayland is &lt;2.0.0~rc4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245466" version="1" comment="libuwac0-0 is &lt;2.0.0~rc4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245467" version="1" comment="uwac0-0-devel is &lt;2.0.0~rc4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245468" version="1" comment="obs-service-appimage is &lt;0.10.5.1551309990.79898c7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245469" version="1" comment="obs-service-obs_scm is &lt;0.10.5.1551309990.79898c7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245470" version="1" comment="obs-service-obs_scm-common is &lt;0.10.5.1551309990.79898c7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245471" version="1" comment="obs-service-snapcraft is &lt;0.10.5.1551309990.79898c7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245472" version="1" comment="obs-service-tar is &lt;0.10.5.1551309990.79898c7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245473" version="1" comment="obs-service-tar_scm is &lt;0.10.5.1551309990.79898c7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245522" version="1" comment="libnfsidmap-sss is &lt;1.16.1-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245523" version="1" comment="python3-ipa_hbac is &lt;1.16.1-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245524" version="1" comment="python3-sss-murmur is &lt;1.16.1-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245525" version="1" comment="python3-sss_nss_idmap is &lt;1.16.1-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245526" version="1" comment="sssd-winbind-idmap is &lt;1.16.1-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245549" version="1" comment="mariadb-bench is &lt;10.2.22-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245550" version="1" comment="mariadb-galera is &lt;10.2.22-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245551" version="1" comment="mariadb-test is &lt;10.2.22-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245639" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.201-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245640" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.201-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245641" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.201-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242847" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.191-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242848" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.191-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242849" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.191-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242850" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.191-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245759" version="1" comment="ceph-base is &lt;13.2.4.125+gad802694f5-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245760" version="1" comment="ceph-fuse is &lt;13.2.4.125+gad802694f5-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245761" version="1" comment="ceph-mds is &lt;13.2.4.125+gad802694f5-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245762" version="1" comment="ceph-mgr is &lt;13.2.4.125+gad802694f5-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245763" version="1" comment="ceph-mon is &lt;13.2.4.125+gad802694f5-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245764" version="1" comment="ceph-osd is &lt;13.2.4.125+gad802694f5-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245765" version="1" comment="ceph-radosgw is &lt;13.2.4.125+gad802694f5-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245766" version="1" comment="ceph-resource-agents is &lt;13.2.4.125+gad802694f5-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245767" version="1" comment="rbd-fuse is &lt;13.2.4.125+gad802694f5-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245768" version="1" comment="rbd-mirror is &lt;13.2.4.125+gad802694f5-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245769" version="1" comment="rbd-nbd is &lt;13.2.4.125+gad802694f5-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245770" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2p-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245772" version="1" comment="openssl-1_0_0-cavs is &lt;1.0.2p-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245773" version="1" comment="openssl-1_0_0-doc is &lt;1.0.2p-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245830" version="1" comment="python-azure-agent is &lt;2.2.36-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245831" version="1" comment="python-azure-agent-test is &lt;2.2.36-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246021" version="1" comment="ldb-tools is &lt;1.2.3-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246022" version="1" comment="go1.11 is &lt;1.11.5-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246023" version="1" comment="go1.11-doc is &lt;1.11.5-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246024" version="1" comment="libwsman_clientpp-devel is &lt;2.6.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246025" version="1" comment="libwsman_clientpp1 is &lt;2.6.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246026" version="1" comment="openwsman is &lt;2.6.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246027" version="1" comment="openwsman-java is &lt;2.6.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246028" version="1" comment="openwsman-perl is &lt;2.6.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246029" version="1" comment="openwsman-ruby is &lt;2.6.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246030" version="1" comment="openwsman-ruby-docs is &lt;2.6.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246031" version="1" comment="openwsman-server-plugin-ruby is &lt;2.6.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246032" version="1" comment="python3-openwsman is &lt;2.6.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246033" version="1" comment="winrs is &lt;2.6.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246034" version="1" comment="python2-Flask is &lt;0.12.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246035" version="1" comment="python2-Flask-doc is &lt;0.12.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246036" version="1" comment="python3-Flask-doc is &lt;0.12.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246138" version="1" comment="libopenssl-1_1-devel-32bit is &lt;1.1.0i-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246139" version="1" comment="openssl-1_1-doc is &lt;1.1.0i-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246140" version="1" comment="libqt5-qtsvg-examples is &lt;5.9.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246141" version="1" comment="unzip-doc is &lt;6.00-4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246142" version="1" comment="ghostscript-mini is &lt;9.26a-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246143" version="1" comment="ghostscript-mini-devel is &lt;9.26a-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246144" version="1" comment="libgxps-tools is &lt;0.3.0-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246246" version="1" comment="ImageMagick-doc is &lt;7.0.7.34-3.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246247" version="1" comment="ImageMagick-extra is &lt;7.0.7.34-3.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246248" version="1" comment="mspack-tools is &lt;0.6-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246322" version="1" comment="caca-utils is &lt;0.99.beta19.git20171003-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246323" version="1" comment="libcaca is &lt;0.99.beta19.git20171003-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246324" version="1" comment="libcaca-ruby is &lt;0.99.beta19.git20171003-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246325" version="1" comment="python3-caca is &lt;0.99.beta19.git20171003-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246327" version="1" comment="ntp-doc is &lt;4.2.8p13-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246405" version="1" comment="kernel-docs-html is &lt;4.12.14-150.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246406" version="1" comment="kernel-obs-qa is &lt;4.12.14-150.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246407" version="1" comment="kselftests-kmp-default is &lt;4.12.14-150.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246408" version="1" comment="sqlite3-doc is &lt;3.27.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246409" version="1" comment="liblouis-doc is &lt;3.3.0-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246410" version="1" comment="liblouis-tools is &lt;3.3.0-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242889" version="1" comment="LibVNCServer is &lt;0.9.10-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242890" version="1" comment="LibVNCServer-devel is &lt;0.9.10-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242891" version="1" comment="libvncserver0 is &lt;0.9.10-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246764" version="1" comment="bluez-auto-enable-devices is &lt;5.48-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246765" version="1" comment="bluez-test is &lt;5.48-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246982" version="1" comment="MozillaFirefox-branding-upstream is &lt;60.6.1-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246984" version="1" comment="apache2-event is &lt;2.4.33-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246985" version="1" comment="apache2-example-pages is &lt;2.4.33-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247196" version="1" comment="webkit-jsc-4 is &lt;2.24.0-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247197" version="1" comment="glibc-html is &lt;2.26-13.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243036" version="1" comment="webkit-jsc-4 is &lt;2.22.5-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247198" version="1" comment="flac-doc is &lt;1.3.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247199" version="1" comment="tar-backup-scripts is &lt;1.30-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247200" version="1" comment="tar-doc is &lt;1.30-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247201" version="1" comment="tar-tests is &lt;1.30-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247202" version="1" comment="libQt5Bootstrap-devel-static is &lt;5.9.4-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247203" version="1" comment="libqt5-qtbase-examples is &lt;5.9.4-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247640" version="1" comment="wireshark-plugin-libvirt is &lt;4.0.0-9.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243037" version="1" comment="krb5-mini is &lt;1.15.2-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243038" version="1" comment="krb5-mini-devel is &lt;1.15.2-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247641" version="1" comment="audiofile-doc is &lt;0.3.6-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251231" version="1" comment="openexr-doc is &lt;2.2.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251232" version="1" comment="slurm is &lt;17.11.13-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251233" version="1" comment="slurm-openlava is &lt;17.11.13-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251234" version="1" comment="slurm-seff is &lt;17.11.13-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251235" version="1" comment="slurm-sjstat is &lt;17.11.13-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251236" version="1" comment="slurm-sview is &lt;17.11.13-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251367" version="1" comment="python3-doc is &lt;3.6.5-3.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251368" version="1" comment="python3-testsuite is &lt;3.6.5-3.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251369" version="1" comment="python-demo is &lt;2.7.14-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251370" version="1" comment="python-doc is &lt;2.7.14-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251371" version="1" comment="python-doc-pdf is &lt;2.7.14-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251372" version="1" comment="python-idle is &lt;2.7.14-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251373" version="1" comment="xerces-c-doc is &lt;3.1.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258665" version="1" comment="libbz2-devel-32bit is &lt;1.0.6-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255824" version="1" comment="sle-module-development-tools-obs-release is ==15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258492" version="1" comment="libxslt-devel-32bit is &lt;1.1.32-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258493" version="1" comment="libxslt1-32bit is &lt;1.1.32-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256758" version="1" comment="go-race is &lt;1.12-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256759" version="1" comment="go1.11-race is &lt;1.11.9-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256760" version="1" comment="go1.12-race is &lt;1.12.4-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253926" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.35-3.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258265" version="1" comment="java-1_8_0-ibm-32bit is &lt;1.8.0_sr5.35-3.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258266" version="1" comment="java-1_8_0-ibm-demo is &lt;1.8.0_sr5.35-3.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258267" version="1" comment="java-1_8_0-ibm-devel-32bit is &lt;1.8.0_sr5.35-3.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258268" version="1" comment="java-1_8_0-ibm-src is &lt;1.8.0_sr5.35-3.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258494" version="1" comment="libgnutls-devel-32bit is &lt;3.6.7-6.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259089" version="1" comment="libpython3_6m1_0-32bit is &lt;3.6.8-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259090" version="1" comment="python3-32bit is &lt;3.6.8-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259091" version="1" comment="python3-base-32bit is &lt;3.6.8-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258495" version="1" comment="libcurl-devel-32bit is &lt;7.60.0-3.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259253" version="1" comment="libudev-devel-32bit is &lt;234-24.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259254" version="1" comment="nss-myhostname-32bit is &lt;234-24.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259255" version="1" comment="nss-mymachines-32bit is &lt;234-24.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258666" version="1" comment="libtasn1-devel-32bit is &lt;4.13-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258520" version="1" comment="libtag1-32bit is &lt;1.11.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258521" version="1" comment="libtag_c0-32bit is &lt;1.11.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258932" version="1" comment="libpng16-compat-devel-32bit is &lt;1.6.34-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258933" version="1" comment="libpng16-devel-32bit is &lt;1.6.34-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255823" version="1" comment="MozillaFirefox-buildsymbols is &lt;60.7.0-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256761" version="1" comment="libasm1-32bit is &lt;0.168-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256762" version="1" comment="libelf-devel-32bit is &lt;0.168-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256763" version="1" comment="wireshark-plugin-libvirt is &lt;5.1.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256936" version="1" comment="ImageMagick-devel-32bit is &lt;7.0.7.34-3.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256937" version="1" comment="libMagick++-7_Q16HDRI4-32bit is &lt;7.0.7.34-3.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256938" version="1" comment="libMagick++-devel-32bit is &lt;7.0.7.34-3.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256939" version="1" comment="libMagickCore-7_Q16HDRI6-32bit is &lt;7.0.7.34-3.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256940" version="1" comment="libMagickWand-7_Q16HDRI6-32bit is &lt;7.0.7.34-3.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256941" version="1" comment="libnetpbm11-32bit is &lt;10.80.1-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256942" version="1" comment="cluster-md-kmp-azure is &lt;4.12.14-5.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256943" version="1" comment="dlm-kmp-azure is &lt;4.12.14-5.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256944" version="1" comment="gfs2-kmp-azure is &lt;4.12.14-5.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256945" version="1" comment="kernel-azure is &lt;4.12.14-5.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256946" version="1" comment="kernel-azure-base is &lt;4.12.14-5.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256947" version="1" comment="kernel-azure-devel is &lt;4.12.14-5.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256948" version="1" comment="kernel-azure-extra is &lt;4.12.14-5.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256949" version="1" comment="kernel-azure-livepatch is &lt;4.12.14-5.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256950" version="1" comment="kernel-devel-azure is &lt;4.12.14-5.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256951" version="1" comment="kernel-source-azure is &lt;4.12.14-5.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256952" version="1" comment="kernel-syms-azure is &lt;4.12.14-5.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256953" version="1" comment="kselftests-kmp-azure is &lt;4.12.14-5.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256954" version="1" comment="ocfs2-kmp-azure is &lt;4.12.14-5.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256955" version="1" comment="reiserfs-kmp-azure is &lt;4.12.14-5.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257087" version="1" comment="dtb-aarch64 is &lt;4.12.14-197.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257088" version="1" comment="dtb-al is &lt;4.12.14-197.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257089" version="1" comment="dtb-allwinner is &lt;4.12.14-197.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257090" version="1" comment="dtb-altera is &lt;4.12.14-197.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257091" version="1" comment="dtb-amd is &lt;4.12.14-197.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257092" version="1" comment="dtb-amlogic is &lt;4.12.14-197.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257093" version="1" comment="dtb-apm is &lt;4.12.14-197.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257094" version="1" comment="dtb-arm is &lt;4.12.14-197.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257095" version="1" comment="dtb-broadcom is &lt;4.12.14-197.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257096" version="1" comment="dtb-cavium is &lt;4.12.14-197.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257097" version="1" comment="dtb-exynos is &lt;4.12.14-197.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257098" version="1" comment="dtb-freescale is &lt;4.12.14-197.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257099" version="1" comment="dtb-hisilicon is &lt;4.12.14-197.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257100" version="1" comment="dtb-lg is &lt;4.12.14-197.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257101" version="1" comment="dtb-marvell is &lt;4.12.14-197.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257102" version="1" comment="dtb-mediatek is &lt;4.12.14-197.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257103" version="1" comment="dtb-nvidia is &lt;4.12.14-197.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257104" version="1" comment="dtb-qcom is &lt;4.12.14-197.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257105" version="1" comment="dtb-renesas is &lt;4.12.14-197.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257106" version="1" comment="dtb-rockchip is &lt;4.12.14-197.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257107" version="1" comment="dtb-socionext is &lt;4.12.14-197.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257108" version="1" comment="dtb-sprd is &lt;4.12.14-197.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257109" version="1" comment="dtb-xilinx is &lt;4.12.14-197.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257110" version="1" comment="dtb-zte is &lt;4.12.14-197.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257111" version="1" comment="kernel-debug is &lt;4.12.14-197.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257112" version="1" comment="kernel-debug-base is &lt;4.12.14-197.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257113" version="1" comment="kernel-debug-devel is &lt;4.12.14-197.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257114" version="1" comment="kernel-debug-livepatch-devel is &lt;4.12.14-197.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257115" version="1" comment="kernel-default-livepatch is &lt;4.12.14-197.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257116" version="1" comment="kernel-docs-html is &lt;4.12.14-197.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257117" version="1" comment="kernel-kvmsmall is &lt;4.12.14-197.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257118" version="1" comment="kernel-kvmsmall-base is &lt;4.12.14-197.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257119" version="1" comment="kernel-kvmsmall-devel is &lt;4.12.14-197.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257120" version="1" comment="kernel-kvmsmall-livepatch-devel is &lt;4.12.14-197.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257121" version="1" comment="kernel-obs-qa is &lt;4.12.14-197.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257122" version="1" comment="kernel-source-vanilla is &lt;4.12.14-197.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257123" version="1" comment="kernel-vanilla is &lt;4.12.14-197.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257124" version="1" comment="kernel-vanilla-base is &lt;4.12.14-197.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257125" version="1" comment="kernel-vanilla-devel is &lt;4.12.14-197.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257126" version="1" comment="kernel-vanilla-livepatch-devel is &lt;4.12.14-197.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257127" version="1" comment="kernel-zfcpdump-man is &lt;4.12.14-197.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257128" version="1" comment="kselftests-kmp-default is &lt;4.12.14-197.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257481" version="1" comment="ctdb-pcp-pmda is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257482" version="1" comment="ctdb-tests is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257483" version="1" comment="libdcerpc-samr0-32bit is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257484" version="1" comment="libsamba-policy-python-devel is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257485" version="1" comment="libsamba-policy0-32bit is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257486" version="1" comment="libsamba-policy0-python3-32bit is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257487" version="1" comment="libsmbclient0-32bit is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257488" version="1" comment="samba-ad-dc-32bit is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257489" version="1" comment="samba-ceph is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257490" version="1" comment="samba-client-32bit is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257491" version="1" comment="samba-doc is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257492" version="1" comment="samba-libs-python-32bit is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257493" version="1" comment="samba-libs-python3-32bit is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257494" version="1" comment="samba-test is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257691" version="1" comment="glib2-devel-32bit is &lt;2.54.3-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257692" version="1" comment="glib2-tools-32bit is &lt;2.54.3-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257693" version="1" comment="libgio-fam-32bit is &lt;2.54.3-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257694" version="1" comment="libgthread-2_0-0-32bit is &lt;2.54.3-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257695" version="1" comment="dbus-1-devel-32bit is &lt;1.12.2-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257696" version="1" comment="dbus-1-devel-doc is &lt;1.12.2-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257697" version="1" comment="MozillaFirefox-buildsymbols is &lt;60.7.1-3.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257698" version="1" comment="libvirt-devel-32bit is &lt;5.1.0-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257699" version="1" comment="wireshark-plugin-libvirt is &lt;5.1.0-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258024" version="1" comment="MozillaFirefox-buildsymbols is &lt;60.7.2-3.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258496" version="1" comment="gvfs-32bit is &lt;1.34.2.1-4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258696" version="1" comment="dtb-aarch64 is &lt;4.12.14-197.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258697" version="1" comment="dtb-al is &lt;4.12.14-197.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258698" version="1" comment="dtb-allwinner is &lt;4.12.14-197.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258699" version="1" comment="dtb-altera is &lt;4.12.14-197.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258700" version="1" comment="dtb-amd is &lt;4.12.14-197.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258701" version="1" comment="dtb-amlogic is &lt;4.12.14-197.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258702" version="1" comment="dtb-apm is &lt;4.12.14-197.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258703" version="1" comment="dtb-arm is &lt;4.12.14-197.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258704" version="1" comment="dtb-broadcom is &lt;4.12.14-197.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258705" version="1" comment="dtb-cavium is &lt;4.12.14-197.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258706" version="1" comment="dtb-exynos is &lt;4.12.14-197.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258707" version="1" comment="dtb-freescale is &lt;4.12.14-197.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258708" version="1" comment="dtb-hisilicon is &lt;4.12.14-197.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258709" version="1" comment="dtb-lg is &lt;4.12.14-197.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258710" version="1" comment="dtb-marvell is &lt;4.12.14-197.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258711" version="1" comment="dtb-mediatek is &lt;4.12.14-197.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258712" version="1" comment="dtb-nvidia is &lt;4.12.14-197.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258713" version="1" comment="dtb-qcom is &lt;4.12.14-197.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258714" version="1" comment="dtb-renesas is &lt;4.12.14-197.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258715" version="1" comment="dtb-rockchip is &lt;4.12.14-197.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258716" version="1" comment="dtb-socionext is &lt;4.12.14-197.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258717" version="1" comment="dtb-sprd is &lt;4.12.14-197.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258718" version="1" comment="dtb-xilinx is &lt;4.12.14-197.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258719" version="1" comment="dtb-zte is &lt;4.12.14-197.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258720" version="1" comment="kernel-debug is &lt;4.12.14-197.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258721" version="1" comment="kernel-debug-base is &lt;4.12.14-197.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258722" version="1" comment="kernel-debug-devel is &lt;4.12.14-197.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258723" version="1" comment="kernel-debug-livepatch-devel is &lt;4.12.14-197.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258724" version="1" comment="kernel-default-livepatch is &lt;4.12.14-197.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258725" version="1" comment="kernel-docs-html is &lt;4.12.14-197.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258726" version="1" comment="kernel-kvmsmall is &lt;4.12.14-197.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258727" version="1" comment="kernel-kvmsmall-base is &lt;4.12.14-197.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258728" version="1" comment="kernel-kvmsmall-devel is &lt;4.12.14-197.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258729" version="1" comment="kernel-kvmsmall-livepatch-devel is &lt;4.12.14-197.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258730" version="1" comment="kernel-obs-qa is &lt;4.12.14-197.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258731" version="1" comment="kernel-source-vanilla is &lt;4.12.14-197.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258732" version="1" comment="kernel-vanilla is &lt;4.12.14-197.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258733" version="1" comment="kernel-vanilla-base is &lt;4.12.14-197.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258734" version="1" comment="kernel-vanilla-devel is &lt;4.12.14-197.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258735" version="1" comment="kernel-vanilla-livepatch-devel is &lt;4.12.14-197.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258736" version="1" comment="kernel-zfcpdump-man is &lt;4.12.14-197.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258737" version="1" comment="kselftests-kmp-default is &lt;4.12.14-197.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258967" version="1" comment="libjavascriptcoregtk-4_0-18-32bit is &lt;2.24.2-3.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258968" version="1" comment="libwebkit2gtk-4_0-37-32bit is &lt;2.24.2-3.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258969" version="1" comment="webkit2gtk3-minibrowser is &lt;2.24.2-3.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258970" version="1" comment="ImageMagick-devel-32bit is &lt;7.0.7.34-3.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258971" version="1" comment="libMagick++-7_Q16HDRI4-32bit is &lt;7.0.7.34-3.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258972" version="1" comment="libMagick++-devel-32bit is &lt;7.0.7.34-3.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258973" version="1" comment="libMagickCore-7_Q16HDRI6-32bit is &lt;7.0.7.34-3.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258974" version="1" comment="libMagickWand-7_Q16HDRI6-32bit is &lt;7.0.7.34-3.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258994" version="1" comment="libqb is &lt;1.0.3+20190326.a521604-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258995" version="1" comment="libqb-devel-32bit is &lt;1.0.3+20190326.a521604-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258996" version="1" comment="libqb20-32bit is &lt;1.0.3+20190326.a521604-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259029" version="1" comment="libqb is &lt;1.0.3+20171226.6d62b64-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259030" version="1" comment="libqb0 is &lt;1.0.3+20171226.6d62b64-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259031" version="1" comment="libqb0-32bit is &lt;1.0.3+20171226.6d62b64-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259092" version="1" comment="cluster-md-kmp-azure is &lt;4.12.14-5.33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259093" version="1" comment="dlm-kmp-azure is &lt;4.12.14-5.33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259094" version="1" comment="gfs2-kmp-azure is &lt;4.12.14-5.33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259095" version="1" comment="kernel-azure is &lt;4.12.14-5.33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259096" version="1" comment="kernel-azure-base is &lt;4.12.14-5.33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259097" version="1" comment="kernel-azure-devel is &lt;4.12.14-5.33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259098" version="1" comment="kernel-azure-extra is &lt;4.12.14-5.33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259099" version="1" comment="kernel-azure-livepatch is &lt;4.12.14-5.33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259100" version="1" comment="kernel-devel-azure is &lt;4.12.14-5.33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259101" version="1" comment="kernel-source-azure is &lt;4.12.14-5.33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259102" version="1" comment="kernel-syms-azure is &lt;4.12.14-5.33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259103" version="1" comment="kselftests-kmp-azure is &lt;4.12.14-5.33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259104" version="1" comment="ocfs2-kmp-azure is &lt;4.12.14-5.33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259105" version="1" comment="reiserfs-kmp-azure is &lt;4.12.14-5.33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259106" version="1" comment="glib2-devel-32bit is &lt;2.54.3-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259107" version="1" comment="glib2-tools-32bit is &lt;2.54.3-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259108" version="1" comment="libgio-fam-32bit is &lt;2.54.3-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259109" version="1" comment="libgthread-2_0-0-32bit is &lt;2.54.3-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259110" version="1" comment="libexpat-devel-32bit is &lt;2.2.5-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259256" version="1" comment="libbz2-devel-32bit is &lt;1.0.6-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259257" version="1" comment="dtb-aarch64 is &lt;4.12.14-197.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259258" version="1" comment="dtb-al is &lt;4.12.14-197.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259259" version="1" comment="dtb-allwinner is &lt;4.12.14-197.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259260" version="1" comment="dtb-altera is &lt;4.12.14-197.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259261" version="1" comment="dtb-amd is &lt;4.12.14-197.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259262" version="1" comment="dtb-amlogic is &lt;4.12.14-197.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259263" version="1" comment="dtb-apm is &lt;4.12.14-197.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259264" version="1" comment="dtb-arm is &lt;4.12.14-197.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259265" version="1" comment="dtb-broadcom is &lt;4.12.14-197.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259266" version="1" comment="dtb-cavium is &lt;4.12.14-197.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259267" version="1" comment="dtb-exynos is &lt;4.12.14-197.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259268" version="1" comment="dtb-freescale is &lt;4.12.14-197.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259269" version="1" comment="dtb-hisilicon is &lt;4.12.14-197.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259270" version="1" comment="dtb-lg is &lt;4.12.14-197.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259271" version="1" comment="dtb-marvell is &lt;4.12.14-197.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259272" version="1" comment="dtb-mediatek is &lt;4.12.14-197.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259273" version="1" comment="dtb-nvidia is &lt;4.12.14-197.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259274" version="1" comment="dtb-qcom is &lt;4.12.14-197.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259275" version="1" comment="dtb-renesas is &lt;4.12.14-197.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259276" version="1" comment="dtb-rockchip is &lt;4.12.14-197.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259277" version="1" comment="dtb-socionext is &lt;4.12.14-197.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259278" version="1" comment="dtb-sprd is &lt;4.12.14-197.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259279" version="1" comment="dtb-xilinx is &lt;4.12.14-197.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259280" version="1" comment="dtb-zte is &lt;4.12.14-197.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259281" version="1" comment="kernel-debug is &lt;4.12.14-197.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259282" version="1" comment="kernel-debug-base is &lt;4.12.14-197.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259283" version="1" comment="kernel-debug-devel is &lt;4.12.14-197.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259284" version="1" comment="kernel-debug-livepatch-devel is &lt;4.12.14-197.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259285" version="1" comment="kernel-default-livepatch is &lt;4.12.14-197.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259286" version="1" comment="kernel-docs-html is &lt;4.12.14-197.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259287" version="1" comment="kernel-kvmsmall is &lt;4.12.14-197.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259288" version="1" comment="kernel-kvmsmall-base is &lt;4.12.14-197.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259289" version="1" comment="kernel-kvmsmall-devel is &lt;4.12.14-197.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259290" version="1" comment="kernel-kvmsmall-livepatch-devel is &lt;4.12.14-197.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259291" version="1" comment="kernel-obs-qa is &lt;4.12.14-197.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259292" version="1" comment="kernel-source-vanilla is &lt;4.12.14-197.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259293" version="1" comment="kernel-vanilla is &lt;4.12.14-197.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259294" version="1" comment="kernel-vanilla-base is &lt;4.12.14-197.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259295" version="1" comment="kernel-vanilla-devel is &lt;4.12.14-197.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259296" version="1" comment="kernel-vanilla-livepatch-devel is &lt;4.12.14-197.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259297" version="1" comment="kernel-zfcpdump-man is &lt;4.12.14-197.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259298" version="1" comment="kselftests-kmp-default is &lt;4.12.14-197.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259398" version="1" comment="MozillaFirefox-buildsymbols is &lt;60.8.0-3.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259399" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.44.1-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259854" version="1" comment="glibc-devel-static-32bit is &lt;2.26-13.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259855" version="1" comment="glibc-locale-base-32bit is &lt;2.26-13.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259856" version="1" comment="glibc-profile-32bit is &lt;2.26-13.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259857" version="1" comment="glibc-utils-32bit is &lt;2.26-13.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259858" version="1" comment="myspell-af_ZA is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259859" version="1" comment="myspell-ar is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259860" version="1" comment="myspell-bg_BG is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259861" version="1" comment="myspell-bn_BD is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259862" version="1" comment="myspell-br_FR is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259863" version="1" comment="myspell-ca is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259864" version="1" comment="myspell-cs_CZ is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259865" version="1" comment="myspell-da_DK is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259866" version="1" comment="myspell-el_GR is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259867" version="1" comment="myspell-et_EE is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259868" version="1" comment="myspell-fr_FR is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259869" version="1" comment="myspell-gl is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259870" version="1" comment="myspell-gu_IN is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259871" version="1" comment="myspell-he_IL is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259872" version="1" comment="myspell-hi_IN is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259873" version="1" comment="myspell-hr_HR is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259874" version="1" comment="myspell-id is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259875" version="1" comment="myspell-id_ID is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259876" version="1" comment="myspell-it_IT is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259877" version="1" comment="myspell-lt_LT is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259878" version="1" comment="myspell-lv_LV is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259879" version="1" comment="myspell-nl_NL is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259880" version="1" comment="myspell-pl_PL is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259881" version="1" comment="myspell-pt_PT is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259882" version="1" comment="myspell-si_LK is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259883" version="1" comment="myspell-sk_SK is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259884" version="1" comment="myspell-sl_SI is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259885" version="1" comment="myspell-sr is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259886" version="1" comment="myspell-sv_SE is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259887" version="1" comment="myspell-te_IN is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259888" version="1" comment="myspell-th_TH is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259889" version="1" comment="myspell-tr is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259890" version="1" comment="myspell-tr_TR is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259891" version="1" comment="myspell-uk_UA is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259892" version="1" comment="myspell-zu_ZA is &lt;20190423-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259893" version="1" comment="tomcat is &lt;9.0.21-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259894" version="1" comment="tomcat-docs-webapp is &lt;9.0.21-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259895" version="1" comment="tomcat-embed is &lt;9.0.21-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259896" version="1" comment="tomcat-javadoc is &lt;9.0.21-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259897" version="1" comment="tomcat-jsvc is &lt;9.0.21-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260588" version="1" comment="libIlmImf-2_2-23-32bit is &lt;2.2.1-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260589" version="1" comment="libIlmImfUtil-2_2-23-32bit is &lt;2.2.1-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260632" version="1" comment="libgcrypt-cavs is &lt;1.8.2-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260633" version="1" comment="libgcrypt-devel-32bit is &lt;1.8.2-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260672" version="1" comment="libreoffice is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260673" version="1" comment="libreoffice-gdb-pretty-printers is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260674" version="1" comment="libreoffice-glade is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260675" version="1" comment="libreoffice-gtk2 is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260676" version="1" comment="libreoffice-l10n-am is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260677" version="1" comment="libreoffice-l10n-ast is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260678" version="1" comment="libreoffice-l10n-be is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260679" version="1" comment="libreoffice-l10n-bn_IN is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260680" version="1" comment="libreoffice-l10n-bo is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260681" version="1" comment="libreoffice-l10n-brx is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260682" version="1" comment="libreoffice-l10n-bs is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260683" version="1" comment="libreoffice-l10n-ca_valencia is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260684" version="1" comment="libreoffice-l10n-dgo is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260685" version="1" comment="libreoffice-l10n-en_GB is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260686" version="1" comment="libreoffice-l10n-en_ZA is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260687" version="1" comment="libreoffice-l10n-fy is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260688" version="1" comment="libreoffice-l10n-gd is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260689" version="1" comment="libreoffice-l10n-gug is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260690" version="1" comment="libreoffice-l10n-hsb is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260691" version="1" comment="libreoffice-l10n-id is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260692" version="1" comment="libreoffice-l10n-is is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260693" version="1" comment="libreoffice-l10n-ka is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260694" version="1" comment="libreoffice-l10n-kab is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260695" version="1" comment="libreoffice-l10n-km is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260696" version="1" comment="libreoffice-l10n-kmr_Latn is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260697" version="1" comment="libreoffice-l10n-kok is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260698" version="1" comment="libreoffice-l10n-ks is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260699" version="1" comment="libreoffice-l10n-lb is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260700" version="1" comment="libreoffice-l10n-lo is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260701" version="1" comment="libreoffice-l10n-mk is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260702" version="1" comment="libreoffice-l10n-mn is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260703" version="1" comment="libreoffice-l10n-mni is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260704" version="1" comment="libreoffice-l10n-my is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260705" version="1" comment="libreoffice-l10n-ne is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260706" version="1" comment="libreoffice-l10n-oc is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260707" version="1" comment="libreoffice-l10n-om is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260708" version="1" comment="libreoffice-l10n-rw is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260709" version="1" comment="libreoffice-l10n-sa_IN is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260710" version="1" comment="libreoffice-l10n-sat is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260711" version="1" comment="libreoffice-l10n-sd is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260712" version="1" comment="libreoffice-l10n-sid is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260713" version="1" comment="libreoffice-l10n-sq is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260714" version="1" comment="libreoffice-l10n-sw_TZ is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260715" version="1" comment="libreoffice-l10n-tg is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260716" version="1" comment="libreoffice-l10n-tt is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260717" version="1" comment="libreoffice-l10n-ug is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260718" version="1" comment="libreoffice-l10n-uz is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260719" version="1" comment="libreoffice-l10n-vec is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260720" version="1" comment="libreoffice-l10n-vi is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260721" version="1" comment="libreoffice-sdk is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260722" version="1" comment="libreoffice-sdk-doc is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260723" version="1" comment="libreofficekit-devel is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260724" version="1" comment="libwps is &lt;0.4.10-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260725" version="1" comment="libwps-0_4-4 is &lt;0.4.10-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260726" version="1" comment="libwps-devel is &lt;0.4.10-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260727" version="1" comment="libwps-tools is &lt;0.4.10-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260728" version="1" comment="libbz2-devel-32bit is &lt;1.0.6-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260729" version="1" comment="libecpg6-32bit is &lt;10.9-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260730" version="1" comment="libpq5-32bit is &lt;10.9-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260731" version="1" comment="postgresql10-test is &lt;10.9-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260882" version="1" comment="libpolkit0-32bit is &lt;0.114-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260883" version="1" comment="libmariadb3-32bit is &lt;3.1.2-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261098" version="1" comment="libIlmImf-2_2-23-32bit is &lt;2.2.1-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261099" version="1" comment="libIlmImfUtil-2_2-23-32bit is &lt;2.2.1-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261100" version="1" comment="ceph-base is &lt;14.2.1.468+g994fd9e0cc-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261101" version="1" comment="ceph-fuse is &lt;14.2.1.468+g994fd9e0cc-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261102" version="1" comment="ceph-grafana-dashboards is &lt;14.2.1.468+g994fd9e0cc-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261103" version="1" comment="ceph-mds is &lt;14.2.1.468+g994fd9e0cc-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261104" version="1" comment="ceph-mgr is &lt;14.2.1.468+g994fd9e0cc-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261105" version="1" comment="ceph-mgr-dashboard is &lt;14.2.1.468+g994fd9e0cc-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261106" version="1" comment="ceph-mgr-diskprediction-cloud is &lt;14.2.1.468+g994fd9e0cc-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261107" version="1" comment="ceph-mgr-diskprediction-local is &lt;14.2.1.468+g994fd9e0cc-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261108" version="1" comment="ceph-mgr-rook is &lt;14.2.1.468+g994fd9e0cc-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261109" version="1" comment="ceph-mgr-ssh is &lt;14.2.1.468+g994fd9e0cc-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261110" version="1" comment="ceph-mon is &lt;14.2.1.468+g994fd9e0cc-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261111" version="1" comment="ceph-osd is &lt;14.2.1.468+g994fd9e0cc-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261112" version="1" comment="ceph-radosgw is &lt;14.2.1.468+g994fd9e0cc-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261113" version="1" comment="ceph-test is &lt;14.2.1.468+g994fd9e0cc-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261114" version="1" comment="cephfs-shell is &lt;14.2.1.468+g994fd9e0cc-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261115" version="1" comment="rbd-fuse is &lt;14.2.1.468+g994fd9e0cc-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261116" version="1" comment="rbd-mirror is &lt;14.2.1.468+g994fd9e0cc-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261117" version="1" comment="rbd-nbd is &lt;14.2.1.468+g994fd9e0cc-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261118" version="1" comment="libpython3_6m1_0-32bit is &lt;3.6.8-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261119" version="1" comment="python3-32bit is &lt;3.6.8-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261120" version="1" comment="python3-base-32bit is &lt;3.6.8-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261121" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.14-7.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261122" version="1" comment="python-32bit is &lt;2.7.14-7.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261123" version="1" comment="python-base-32bit is &lt;2.7.14-7.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261124" version="1" comment="cluster-md-kmp-azure is &lt;4.12.14-5.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261125" version="1" comment="dlm-kmp-azure is &lt;4.12.14-5.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261126" version="1" comment="gfs2-kmp-azure is &lt;4.12.14-5.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261127" version="1" comment="kernel-azure is &lt;4.12.14-5.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261128" version="1" comment="kernel-azure-base is &lt;4.12.14-5.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261129" version="1" comment="kernel-azure-devel is &lt;4.12.14-5.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261130" version="1" comment="kernel-azure-extra is &lt;4.12.14-5.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261131" version="1" comment="kernel-azure-livepatch is &lt;4.12.14-5.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261132" version="1" comment="kernel-devel-azure is &lt;4.12.14-5.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261133" version="1" comment="kernel-source-azure is &lt;4.12.14-5.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261134" version="1" comment="kernel-syms-azure is &lt;4.12.14-5.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261135" version="1" comment="kselftests-kmp-azure is &lt;4.12.14-5.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261136" version="1" comment="ocfs2-kmp-azure is &lt;4.12.14-5.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261137" version="1" comment="reiserfs-kmp-azure is &lt;4.12.14-5.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261138" version="1" comment="dtb-aarch64 is &lt;4.12.14-197.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261139" version="1" comment="dtb-al is &lt;4.12.14-197.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261140" version="1" comment="dtb-allwinner is &lt;4.12.14-197.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261141" version="1" comment="dtb-altera is &lt;4.12.14-197.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261142" version="1" comment="dtb-amd is &lt;4.12.14-197.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261143" version="1" comment="dtb-amlogic is &lt;4.12.14-197.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261144" version="1" comment="dtb-apm is &lt;4.12.14-197.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261145" version="1" comment="dtb-arm is &lt;4.12.14-197.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261146" version="1" comment="dtb-broadcom is &lt;4.12.14-197.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261147" version="1" comment="dtb-cavium is &lt;4.12.14-197.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261148" version="1" comment="dtb-exynos is &lt;4.12.14-197.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261149" version="1" comment="dtb-freescale is &lt;4.12.14-197.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261150" version="1" comment="dtb-hisilicon is &lt;4.12.14-197.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261151" version="1" comment="dtb-lg is &lt;4.12.14-197.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261152" version="1" comment="dtb-marvell is &lt;4.12.14-197.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261153" version="1" comment="dtb-mediatek is &lt;4.12.14-197.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261154" version="1" comment="dtb-nvidia is &lt;4.12.14-197.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261155" version="1" comment="dtb-qcom is &lt;4.12.14-197.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261156" version="1" comment="dtb-renesas is &lt;4.12.14-197.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261157" version="1" comment="dtb-rockchip is &lt;4.12.14-197.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261158" version="1" comment="dtb-socionext is &lt;4.12.14-197.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261159" version="1" comment="dtb-sprd is &lt;4.12.14-197.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261160" version="1" comment="dtb-xilinx is &lt;4.12.14-197.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261161" version="1" comment="dtb-zte is &lt;4.12.14-197.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261162" version="1" comment="kernel-debug is &lt;4.12.14-197.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261163" version="1" comment="kernel-debug-base is &lt;4.12.14-197.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261164" version="1" comment="kernel-debug-devel is &lt;4.12.14-197.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261165" version="1" comment="kernel-debug-livepatch-devel is &lt;4.12.14-197.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261166" version="1" comment="kernel-default-livepatch is &lt;4.12.14-197.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261167" version="1" comment="kernel-docs-html is &lt;4.12.14-197.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261168" version="1" comment="kernel-kvmsmall is &lt;4.12.14-197.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261169" version="1" comment="kernel-kvmsmall-base is &lt;4.12.14-197.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261170" version="1" comment="kernel-kvmsmall-devel is &lt;4.12.14-197.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261171" version="1" comment="kernel-kvmsmall-livepatch-devel is &lt;4.12.14-197.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261172" version="1" comment="kernel-obs-qa is &lt;4.12.14-197.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261173" version="1" comment="kernel-source-vanilla is &lt;4.12.14-197.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261174" version="1" comment="kernel-vanilla is &lt;4.12.14-197.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261175" version="1" comment="kernel-vanilla-base is &lt;4.12.14-197.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261176" version="1" comment="kernel-vanilla-devel is &lt;4.12.14-197.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261177" version="1" comment="kernel-vanilla-livepatch-devel is &lt;4.12.14-197.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261178" version="1" comment="kernel-zfcpdump-man is &lt;4.12.14-197.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261179" version="1" comment="kselftests-kmp-default is &lt;4.12.14-197.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261180" version="1" comment="ImageMagick-devel-32bit is &lt;7.0.7.34-3.67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261181" version="1" comment="libMagick++-7_Q16HDRI4-32bit is &lt;7.0.7.34-3.67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261182" version="1" comment="libMagick++-devel-32bit is &lt;7.0.7.34-3.67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261183" version="1" comment="libMagickCore-7_Q16HDRI6-32bit is &lt;7.0.7.34-3.67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261184" version="1" comment="libMagickWand-7_Q16HDRI6-32bit is &lt;7.0.7.34-3.67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261431" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.14-7.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261432" version="1" comment="python-32bit is &lt;2.7.14-7.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261433" version="1" comment="python-base-32bit is &lt;2.7.14-7.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261445" version="1" comment="containerd-kubic is &lt;1.2.6-5.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261446" version="1" comment="containerd-kubic-ctr is &lt;1.2.6-5.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261447" version="1" comment="docker-kubic is &lt;19.03.1_ce-6.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261448" version="1" comment="docker-kubic-bash-completion is &lt;19.03.1_ce-6.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261449" version="1" comment="docker-kubic-kubeadm-criconfig is &lt;19.03.1_ce-6.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261450" version="1" comment="docker-kubic-test is &lt;19.03.1_ce-6.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261451" version="1" comment="docker-kubic-zsh-completion is &lt;19.03.1_ce-6.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261452" version="1" comment="docker-libnetwork-kubic is &lt;0.7.0.1+gitr2800_fc5a7d91d54c-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261453" version="1" comment="docker-runc-kubic is &lt;1.0.0rc8+gitr3826_425e105d5a03-6.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261454" version="1" comment="golang-github-docker-libnetwork-kubic is &lt;0.7.0.1+gitr2800_fc5a7d91d54c-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262582" version="1" comment="libwavpack1-32bit is &lt;5.1.0-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262583" version="1" comment="qemu-arm is &lt;3.1.1-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262584" version="1" comment="qemu-audio-alsa is &lt;3.1.1-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262585" version="1" comment="qemu-audio-oss is &lt;3.1.1-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262586" version="1" comment="qemu-audio-pa is &lt;3.1.1-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262587" version="1" comment="qemu-block-dmg is &lt;3.1.1-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262588" version="1" comment="qemu-extra is &lt;3.1.1-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262589" version="1" comment="qemu-linux-user is &lt;3.1.1-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262590" version="1" comment="qemu-ppc is &lt;3.1.1-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262591" version="1" comment="qemu-s390 is &lt;3.1.1-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262592" version="1" comment="qemu-seabios is &lt;1.12.0-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262593" version="1" comment="qemu-sgabios is &lt;8-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262594" version="1" comment="qemu-testsuite is &lt;3.1.1-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262595" version="1" comment="qemu-ui-curses is &lt;3.1.1-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262596" version="1" comment="qemu-ui-gtk is &lt;3.1.1-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262597" version="1" comment="qemu-x86 is &lt;3.1.1-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262638" version="1" comment="go1.11-race is &lt;1.11.13-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262639" version="1" comment="go1.12-race is &lt;1.12.9-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262846" version="1" comment="libpmi0 is &lt;18.08.8-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262847" version="1" comment="libslurm33 is &lt;18.08.8-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262848" version="1" comment="perl-slurm is &lt;18.08.8-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262849" version="1" comment="slurm is &lt;18.08.8-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262850" version="1" comment="slurm-auth-none is &lt;18.08.8-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262851" version="1" comment="slurm-config is &lt;18.08.8-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262852" version="1" comment="slurm-config-man is &lt;18.08.8-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262853" version="1" comment="slurm-devel is &lt;18.08.8-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262854" version="1" comment="slurm-doc is &lt;18.08.8-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262855" version="1" comment="slurm-lua is &lt;18.08.8-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262856" version="1" comment="slurm-munge is &lt;18.08.8-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262857" version="1" comment="slurm-node is &lt;18.08.8-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262858" version="1" comment="slurm-openlava is &lt;18.08.8-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262859" version="1" comment="slurm-pam_slurm is &lt;18.08.8-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262860" version="1" comment="slurm-plugins is &lt;18.08.8-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262861" version="1" comment="slurm-seff is &lt;18.08.8-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262862" version="1" comment="slurm-sjstat is &lt;18.08.8-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262863" version="1" comment="slurm-slurmdbd is &lt;18.08.8-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262864" version="1" comment="slurm-sql is &lt;18.08.8-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262865" version="1" comment="slurm-sview is &lt;18.08.8-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262866" version="1" comment="slurm-torque is &lt;18.08.8-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262867" version="1" comment="ceph-base is &lt;14.2.2.349+g6716a1e448-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262868" version="1" comment="ceph-fuse is &lt;14.2.2.349+g6716a1e448-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262869" version="1" comment="ceph-grafana-dashboards is &lt;14.2.2.349+g6716a1e448-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262870" version="1" comment="ceph-mds is &lt;14.2.2.349+g6716a1e448-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262871" version="1" comment="ceph-mgr is &lt;14.2.2.349+g6716a1e448-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262872" version="1" comment="ceph-mgr-dashboard is &lt;14.2.2.349+g6716a1e448-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262873" version="1" comment="ceph-mgr-diskprediction-cloud is &lt;14.2.2.349+g6716a1e448-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262874" version="1" comment="ceph-mgr-diskprediction-local is &lt;14.2.2.349+g6716a1e448-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262875" version="1" comment="ceph-mgr-rook is &lt;14.2.2.349+g6716a1e448-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262876" version="1" comment="ceph-mgr-ssh is &lt;14.2.2.349+g6716a1e448-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262877" version="1" comment="ceph-mon is &lt;14.2.2.349+g6716a1e448-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262878" version="1" comment="ceph-osd is &lt;14.2.2.349+g6716a1e448-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262879" version="1" comment="ceph-radosgw is &lt;14.2.2.349+g6716a1e448-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262880" version="1" comment="ceph-test is &lt;14.2.2.349+g6716a1e448-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262881" version="1" comment="cephfs-shell is &lt;14.2.2.349+g6716a1e448-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262882" version="1" comment="rbd-fuse is &lt;14.2.2.349+g6716a1e448-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262883" version="1" comment="rbd-mirror is &lt;14.2.2.349+g6716a1e448-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262884" version="1" comment="rbd-nbd is &lt;14.2.2.349+g6716a1e448-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263150" version="1" comment="python-SQLAlchemy-doc is &lt;1.2.14-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263151" version="1" comment="python2-SQLAlchemy is &lt;1.2.14-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263682" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.40-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263683" version="1" comment="java-1_8_0-ibm-32bit is &lt;1.8.0_sr5.40-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263684" version="1" comment="java-1_8_0-ibm-demo is &lt;1.8.0_sr5.40-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263685" version="1" comment="java-1_8_0-ibm-devel-32bit is &lt;1.8.0_sr5.40-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263686" version="1" comment="java-1_8_0-ibm-src is &lt;1.8.0_sr5.40-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263732" version="1" comment="libblkid-devel-32bit is &lt;2.33.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263733" version="1" comment="libfdisk-devel-static is &lt;2.33.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263734" version="1" comment="libmount-devel-32bit is &lt;2.33.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263735" version="1" comment="libmount-devel-static is &lt;2.33.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263736" version="1" comment="libsmartcols-devel-static is &lt;2.33.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263737" version="1" comment="libuuid-devel-32bit is &lt;2.33.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263738" version="1" comment="python3-libmount is &lt;2.33.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263739" version="1" comment="nginx is &lt;1.14.2-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263740" version="1" comment="vim-plugin-nginx is &lt;1.14.2-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264030" version="1" comment="ctdb-pcp-pmda is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264031" version="1" comment="ctdb-tests is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264032" version="1" comment="libdcerpc-samr0-32bit is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264033" version="1" comment="libsamba-policy-python-devel is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264034" version="1" comment="libsamba-policy0-32bit is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264035" version="1" comment="libsamba-policy0-python3-32bit is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264036" version="1" comment="libsmbclient0-32bit is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264037" version="1" comment="samba-ad-dc-32bit is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264038" version="1" comment="samba-ceph is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264039" version="1" comment="samba-client-32bit is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264040" version="1" comment="samba-doc is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264041" version="1" comment="samba-libs-python-32bit is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264042" version="1" comment="samba-libs-python3-32bit is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264043" version="1" comment="samba-test is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264544" version="1" comment="python-Werkzeug-doc is &lt;0.14.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264545" version="1" comment="python2-Werkzeug is &lt;0.14.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264546" version="1" comment="libcurl-devel-32bit is &lt;7.60.0-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264702" version="1" comment="libreoffice is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264703" version="1" comment="libreoffice-gdb-pretty-printers is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264704" version="1" comment="libreoffice-glade is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264705" version="1" comment="libreoffice-gtk2 is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264706" version="1" comment="libreoffice-l10n-am is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264707" version="1" comment="libreoffice-l10n-ast is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264708" version="1" comment="libreoffice-l10n-be is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264709" version="1" comment="libreoffice-l10n-bn_IN is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264710" version="1" comment="libreoffice-l10n-bo is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264711" version="1" comment="libreoffice-l10n-brx is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264712" version="1" comment="libreoffice-l10n-bs is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264713" version="1" comment="libreoffice-l10n-ca_valencia is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264714" version="1" comment="libreoffice-l10n-dgo is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264715" version="1" comment="libreoffice-l10n-en_GB is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264716" version="1" comment="libreoffice-l10n-en_ZA is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264717" version="1" comment="libreoffice-l10n-fy is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264718" version="1" comment="libreoffice-l10n-gd is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264719" version="1" comment="libreoffice-l10n-gug is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264720" version="1" comment="libreoffice-l10n-hsb is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264721" version="1" comment="libreoffice-l10n-id is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264722" version="1" comment="libreoffice-l10n-is is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264723" version="1" comment="libreoffice-l10n-ka is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264724" version="1" comment="libreoffice-l10n-kab is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264725" version="1" comment="libreoffice-l10n-km is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264726" version="1" comment="libreoffice-l10n-kmr_Latn is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264727" version="1" comment="libreoffice-l10n-kok is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264728" version="1" comment="libreoffice-l10n-ks is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264729" version="1" comment="libreoffice-l10n-lb is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264730" version="1" comment="libreoffice-l10n-lo is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264731" version="1" comment="libreoffice-l10n-mk is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264732" version="1" comment="libreoffice-l10n-mn is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264733" version="1" comment="libreoffice-l10n-mni is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264734" version="1" comment="libreoffice-l10n-my is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264735" version="1" comment="libreoffice-l10n-ne is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264736" version="1" comment="libreoffice-l10n-oc is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264737" version="1" comment="libreoffice-l10n-om is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264738" version="1" comment="libreoffice-l10n-rw is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264739" version="1" comment="libreoffice-l10n-sa_IN is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264740" version="1" comment="libreoffice-l10n-sat is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264741" version="1" comment="libreoffice-l10n-sd is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264742" version="1" comment="libreoffice-l10n-sid is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264743" version="1" comment="libreoffice-l10n-sq is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264744" version="1" comment="libreoffice-l10n-sw_TZ is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264745" version="1" comment="libreoffice-l10n-tg is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264746" version="1" comment="libreoffice-l10n-tt is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264747" version="1" comment="libreoffice-l10n-ug is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264748" version="1" comment="libreoffice-l10n-uz is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264749" version="1" comment="libreoffice-l10n-vec is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264750" version="1" comment="libreoffice-l10n-vi is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264751" version="1" comment="libreoffice-sdk is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264752" version="1" comment="libreoffice-sdk-doc is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264753" version="1" comment="libreofficekit-devel is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264754" version="1" comment="libopenssl-1_1-devel-32bit is &lt;1.1.0i-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264755" version="1" comment="openssl-1_1-doc is &lt;1.1.0i-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264973" version="1" comment="dtb-aarch64 is &lt;4.12.14-197.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264974" version="1" comment="dtb-al is &lt;4.12.14-197.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264975" version="1" comment="dtb-allwinner is &lt;4.12.14-197.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264976" version="1" comment="dtb-altera is &lt;4.12.14-197.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264977" version="1" comment="dtb-amd is &lt;4.12.14-197.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264978" version="1" comment="dtb-amlogic is &lt;4.12.14-197.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264979" version="1" comment="dtb-apm is &lt;4.12.14-197.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264980" version="1" comment="dtb-arm is &lt;4.12.14-197.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264981" version="1" comment="dtb-broadcom is &lt;4.12.14-197.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264982" version="1" comment="dtb-cavium is &lt;4.12.14-197.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264983" version="1" comment="dtb-exynos is &lt;4.12.14-197.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264984" version="1" comment="dtb-freescale is &lt;4.12.14-197.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264985" version="1" comment="dtb-hisilicon is &lt;4.12.14-197.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264986" version="1" comment="dtb-lg is &lt;4.12.14-197.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264987" version="1" comment="dtb-marvell is &lt;4.12.14-197.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264988" version="1" comment="dtb-mediatek is &lt;4.12.14-197.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264989" version="1" comment="dtb-nvidia is &lt;4.12.14-197.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264990" version="1" comment="dtb-qcom is &lt;4.12.14-197.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264991" version="1" comment="dtb-renesas is &lt;4.12.14-197.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264992" version="1" comment="dtb-rockchip is &lt;4.12.14-197.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264993" version="1" comment="dtb-socionext is &lt;4.12.14-197.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264994" version="1" comment="dtb-sprd is &lt;4.12.14-197.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264995" version="1" comment="dtb-xilinx is &lt;4.12.14-197.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264996" version="1" comment="dtb-zte is &lt;4.12.14-197.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264997" version="1" comment="kernel-debug is &lt;4.12.14-197.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264998" version="1" comment="kernel-debug-base is &lt;4.12.14-197.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264999" version="1" comment="kernel-debug-devel is &lt;4.12.14-197.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265000" version="1" comment="kernel-debug-livepatch-devel is &lt;4.12.14-197.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265001" version="1" comment="kernel-default-livepatch is &lt;4.12.14-197.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265002" version="1" comment="kernel-docs-html is &lt;4.12.14-197.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265003" version="1" comment="kernel-kvmsmall is &lt;4.12.14-197.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265004" version="1" comment="kernel-kvmsmall-base is &lt;4.12.14-197.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265005" version="1" comment="kernel-kvmsmall-devel is &lt;4.12.14-197.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265006" version="1" comment="kernel-kvmsmall-livepatch-devel is &lt;4.12.14-197.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265007" version="1" comment="kernel-obs-qa is &lt;4.12.14-197.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265008" version="1" comment="kernel-source-vanilla is &lt;4.12.14-197.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265009" version="1" comment="kernel-vanilla is &lt;4.12.14-197.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265010" version="1" comment="kernel-vanilla-base is &lt;4.12.14-197.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265011" version="1" comment="kernel-vanilla-devel is &lt;4.12.14-197.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265012" version="1" comment="kernel-vanilla-livepatch-devel is &lt;4.12.14-197.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265013" version="1" comment="kernel-zfcpdump-man is &lt;4.12.14-197.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265014" version="1" comment="kselftests-kmp-default is &lt;4.12.14-197.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265015" version="1" comment="ibus-gtk-32bit is &lt;1.5.19-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265016" version="1" comment="ibus-gtk3-32bit is &lt;1.5.19-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265017" version="1" comment="libibus-1_0-5-32bit is &lt;1.5.19-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265018" version="1" comment="python-ibus is &lt;1.5.19-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265113" version="1" comment="libjavascriptcoregtk-4_0-18-32bit is &lt;2.24.4-3.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265114" version="1" comment="libwebkit2gtk-4_0-37-32bit is &lt;2.24.4-3.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265115" version="1" comment="webkit2gtk3-minibrowser is &lt;2.24.4-3.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265116" version="1" comment="libexpat-devel-32bit is &lt;2.2.5-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265117" version="1" comment="cluster-md-kmp-rt_debug is &lt;4.12.14-14.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265118" version="1" comment="dlm-kmp-rt_debug is &lt;4.12.14-14.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265119" version="1" comment="gfs2-kmp-rt_debug is &lt;4.12.14-14.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265120" version="1" comment="kernel-rt is &lt;4.12.14-14.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265121" version="1" comment="kernel-rt-extra is &lt;4.12.14-14.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265122" version="1" comment="kernel-rt-livepatch is &lt;4.12.14-14.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265123" version="1" comment="kernel-rt-livepatch-devel is &lt;4.12.14-14.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265124" version="1" comment="kernel-rt_debug is &lt;4.12.14-14.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265125" version="1" comment="kernel-rt_debug-base is &lt;4.12.14-14.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265126" version="1" comment="kernel-rt_debug-extra is &lt;4.12.14-14.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265127" version="1" comment="kernel-rt_debug-livepatch is &lt;4.12.14-14.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265128" version="1" comment="kernel-rt_debug-livepatch-devel is &lt;4.12.14-14.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265129" version="1" comment="kselftests-kmp-rt is &lt;4.12.14-14.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265130" version="1" comment="kselftests-kmp-rt_debug is &lt;4.12.14-14.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265131" version="1" comment="ocfs2-kmp-rt_debug is &lt;4.12.14-14.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265132" version="1" comment="reiserfs-kmp-rt is &lt;4.12.14-14.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265133" version="1" comment="reiserfs-kmp-rt_debug is &lt;4.12.14-14.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265134" version="1" comment="libmodplug1-32bit is &lt;0.3.17-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265135" version="1" comment="libopenmpt0-32bit is &lt;0.3.17-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265136" version="1" comment="libopenmpt_modplug1-32bit is &lt;0.3.17-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265137" version="1" comment="libSDL2-2_0-0-32bit is &lt;2.0.8-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265138" version="1" comment="libSDL2-devel-32bit is &lt;2.0.8-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265216" version="1" comment="libnghttp2_asio1-32bit is &lt;1.39.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265217" version="1" comment="u-boot-bananapim64 is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265218" version="1" comment="u-boot-bananapim64-doc is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265219" version="1" comment="u-boot-dragonboard410c is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265220" version="1" comment="u-boot-dragonboard410c-doc is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265221" version="1" comment="u-boot-dragonboard820c is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265222" version="1" comment="u-boot-dragonboard820c-doc is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265223" version="1" comment="u-boot-evb-rk3399 is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265224" version="1" comment="u-boot-evb-rk3399-doc is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265225" version="1" comment="u-boot-firefly-rk3399 is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265226" version="1" comment="u-boot-firefly-rk3399-doc is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265227" version="1" comment="u-boot-geekbox is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265228" version="1" comment="u-boot-geekbox-doc is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265229" version="1" comment="u-boot-hikey is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265230" version="1" comment="u-boot-hikey-doc is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265231" version="1" comment="u-boot-khadas-vim is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265232" version="1" comment="u-boot-khadas-vim-doc is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265233" version="1" comment="u-boot-khadas-vim2 is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265234" version="1" comment="u-boot-khadas-vim2-doc is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265235" version="1" comment="u-boot-ls1012afrdmqspi is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265236" version="1" comment="u-boot-ls1012afrdmqspi-doc is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265237" version="1" comment="u-boot-mvebudb-88f3720 is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265238" version="1" comment="u-boot-mvebudb-88f3720-doc is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265239" version="1" comment="u-boot-mvebudbarmada8k is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265240" version="1" comment="u-boot-mvebudbarmada8k-doc is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265241" version="1" comment="u-boot-mvebuespressobin-88f3720 is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265242" version="1" comment="u-boot-mvebuespressobin-88f3720-doc is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265243" version="1" comment="u-boot-mvebumcbin-88f8040 is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265244" version="1" comment="u-boot-mvebumcbin-88f8040-doc is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265245" version="1" comment="u-boot-nanopia64 is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265246" version="1" comment="u-boot-nanopia64-doc is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265247" version="1" comment="u-boot-odroid-c2 is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265248" version="1" comment="u-boot-odroid-c2-doc is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265249" version="1" comment="u-boot-orangepipc2 is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265250" version="1" comment="u-boot-orangepipc2-doc is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265251" version="1" comment="u-boot-p2371-2180 is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265252" version="1" comment="u-boot-p2371-2180-doc is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265253" version="1" comment="u-boot-p2771-0000-500 is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265254" version="1" comment="u-boot-p2771-0000-500-doc is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265255" version="1" comment="u-boot-pine64plus is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265256" version="1" comment="u-boot-pine64plus-doc is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265257" version="1" comment="u-boot-pinebook is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265258" version="1" comment="u-boot-pinebook-doc is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265259" version="1" comment="u-boot-pineh64 is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265260" version="1" comment="u-boot-pineh64-doc is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265261" version="1" comment="u-boot-poplar is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265262" version="1" comment="u-boot-poplar-doc is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265263" version="1" comment="u-boot-rock960-rk3399 is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265264" version="1" comment="u-boot-rock960-rk3399-doc is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265265" version="1" comment="u-boot-rpi3-doc is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265266" version="1" comment="u-boot-xilinxzynqmpgeneric is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265267" version="1" comment="u-boot-xilinxzynqmpgeneric-doc is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265268" version="1" comment="u-boot-xilinxzynqmpzcu102rev10 is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265269" version="1" comment="u-boot-xilinxzynqmpzcu102rev10-doc is &lt;2019.01-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230005" version="1" comment="libpmi0 is &lt;17.11.7-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230006" version="1" comment="libslurm32 is &lt;17.11.7-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230007" version="1" comment="perl-slurm is &lt;17.11.7-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230008" version="1" comment="slurm is &lt;17.11.7-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230009" version="1" comment="slurm-auth-none is &lt;17.11.7-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230010" version="1" comment="slurm-config is &lt;17.11.7-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230011" version="1" comment="slurm-devel is &lt;17.11.7-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230012" version="1" comment="slurm-doc is &lt;17.11.7-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230013" version="1" comment="slurm-lua is &lt;17.11.7-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230014" version="1" comment="slurm-munge is &lt;17.11.7-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230015" version="1" comment="slurm-node is &lt;17.11.7-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230016" version="1" comment="slurm-pam_slurm is &lt;17.11.7-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230017" version="1" comment="slurm-plugins is &lt;17.11.7-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230018" version="1" comment="slurm-slurmdbd is &lt;17.11.7-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230019" version="1" comment="slurm-sql is &lt;17.11.7-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230020" version="1" comment="slurm-torque is &lt;17.11.7-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265139" version="1" comment="python-numpy_1_16_1-gnu-hpc is &lt;1.16.1-4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265140" version="1" comment="python2-numpy-gnu-hpc is &lt;1.16.1-4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265141" version="1" comment="python2-numpy-gnu-hpc-devel is &lt;1.16.1-4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265142" version="1" comment="python3-numpy-gnu-hpc is &lt;1.16.1-4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265143" version="1" comment="python3-numpy-gnu-hpc-devel is &lt;1.16.1-4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244424" version="1" comment="python-numpy_1_14_0-gnu-hpc is &lt;1.14.0-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251237" version="1" comment="libpmi0 is &lt;17.11.13-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251239" version="1" comment="perl-slurm is &lt;17.11.13-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251240" version="1" comment="slurm-auth-none is &lt;17.11.13-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251241" version="1" comment="slurm-config is &lt;17.11.13-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251242" version="1" comment="slurm-devel is &lt;17.11.13-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251243" version="1" comment="slurm-doc is &lt;17.11.13-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251244" version="1" comment="slurm-lua is &lt;17.11.13-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251245" version="1" comment="slurm-munge is &lt;17.11.13-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251246" version="1" comment="slurm-node is &lt;17.11.13-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251247" version="1" comment="slurm-pam_slurm is &lt;17.11.13-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251248" version="1" comment="slurm-plugins is &lt;17.11.13-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251249" version="1" comment="slurm-slurmdbd is &lt;17.11.13-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251250" version="1" comment="slurm-sql is &lt;17.11.13-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251251" version="1" comment="slurm-torque is &lt;17.11.13-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230024" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.171-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230025" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.171-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230026" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.171-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230027" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.171-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230524" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2n-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230525" version="1" comment="libopenssl1_0_0 is &lt;1.0.2n-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230526" version="1" comment="openssl-1_0_0 is &lt;1.0.2n-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230705" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.15-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230706" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr5.15-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230707" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.15-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230708" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr5.15-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230796" version="1" comment="reiserfs-kmp-default is &lt;4.12.14-25.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231315" version="1" comment="reiserfs-kmp-default is &lt;4.12.14-25.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232439" version="1" comment="reiserfs-kmp-default is &lt;4.12.14-25.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233593" version="1" comment="reiserfs-kmp-default is &lt;4.12.14-25.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235672" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2p-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235673" version="1" comment="libopenssl1_0_0 is &lt;1.0.2p-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235674" version="1" comment="openssl-1_0_0 is &lt;1.0.2p-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235771" version="1" comment="reiserfs-kmp-default is &lt;4.12.14-25.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236245" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.181-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236246" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.181-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236247" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.181-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236248" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.181-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236762" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.20-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236763" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr5.20-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236764" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.20-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236765" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr5.20-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237207" version="1" comment="reiserfs-kmp-default is &lt;4.12.14-25.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238045" version="1" comment="ntp is &lt;4.2.8p12-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238475" version="1" comment="reiserfs-kmp-default is &lt;4.12.14-25.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240569" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.25-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240570" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr5.25-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240571" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.25-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240572" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr5.25-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241138" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2p-3.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241139" version="1" comment="libopenssl1_0_0 is &lt;1.0.2p-3.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253189" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.212-3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253190" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.212-3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253191" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.212-3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253428" version="1" comment="reiserfs-kmp-default is &lt;4.12.14-150.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253927" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr5.35-3.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253928" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.35-3.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253929" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr5.35-3.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256956" version="1" comment="reiserfs-kmp-default is &lt;4.12.14-150.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259299" version="1" comment="reiserfs-kmp-default is &lt;4.12.14-150.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260884" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.222-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260885" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.222-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260886" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.222-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261185" version="1" comment="reiserfs-kmp-default is &lt;4.12.14-150.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243599" version="1" comment="reiserfs-kmp-default is &lt;4.12.14-25.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263687" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr5.40-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263688" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.40-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263689" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr5.40-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264756" version="1" comment="openldap2-back-meta is &lt;2.4.46-9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264757" version="1" comment="openldap2-back-perl is &lt;2.4.46-9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265019" version="1" comment="reiserfs-kmp-default is &lt;4.12.14-150.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242851" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.191-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242852" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.191-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242853" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.191-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246411" version="1" comment="reiserfs-kmp-default is &lt;4.12.14-150.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257129" version="1" comment="reiserfs-kmp-default is &lt;4.12.14-197.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258738" version="1" comment="reiserfs-kmp-default is &lt;4.12.14-197.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259300" version="1" comment="reiserfs-kmp-default is &lt;4.12.14-197.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261186" version="1" comment="reiserfs-kmp-default is &lt;4.12.14-197.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265020" version="1" comment="reiserfs-kmp-default is &lt;4.12.14-197.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230797" version="1" comment="kernel-default-livepatch is &lt;4.12.14-25.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230798" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &lt;1-1.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230799" version="1" comment="kernel-livepatch-SLE15_Update_1 is &lt;1-1.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231316" version="1" comment="kernel-default-livepatch is &lt;4.12.14-25.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231317" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &lt;1-1.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231318" version="1" comment="kernel-livepatch-SLE15_Update_2 is &lt;1-1.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232440" version="1" comment="kernel-default-livepatch is &lt;4.12.14-25.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232658" version="1" comment="kernel-livepatch-tools is &lt;1.1-5.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233140" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &lt;2-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233141" version="1" comment="kernel-livepatch-SLE15_Update_1 is &lt;2-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233142" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &lt;2-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233143" version="1" comment="kernel-livepatch-SLE15_Update_2 is &lt;2-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233144" version="1" comment="kernel-livepatch-4_12_14-23-default is &lt;2-4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233145" version="1" comment="kernel-livepatch-SLE15_Update_0 is &lt;2-4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233594" version="1" comment="kernel-default-livepatch is &lt;4.12.14-25.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233595" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &lt;1-1.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233596" version="1" comment="kernel-livepatch-SLE15_Update_4 is &lt;1-1.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234235" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &lt;3-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234236" version="1" comment="kernel-livepatch-SLE15_Update_1 is &lt;3-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234237" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &lt;3-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234238" version="1" comment="kernel-livepatch-SLE15_Update_2 is &lt;3-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234239" version="1" comment="kernel-livepatch-4_12_14-23-default is &lt;3-7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234240" version="1" comment="kernel-livepatch-SLE15_Update_0 is &lt;3-7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235603" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &lt;2-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235604" version="1" comment="kernel-livepatch-SLE15_Update_3 is &lt;2-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235605" version="1" comment="kernel-livepatch-4_12_14-23-default is &lt;4-10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235606" version="1" comment="kernel-livepatch-SLE15_Update_0 is &lt;4-10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235607" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &lt;4-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235608" version="1" comment="kernel-livepatch-SLE15_Update_1 is &lt;4-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235609" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &lt;4-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235610" version="1" comment="kernel-livepatch-SLE15_Update_2 is &lt;4-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235611" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &lt;3-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235612" version="1" comment="kernel-livepatch-SLE15_Update_3 is &lt;3-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235675" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &lt;2-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235676" version="1" comment="kernel-livepatch-SLE15_Update_4 is &lt;2-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235772" version="1" comment="kernel-default-livepatch is &lt;4.12.14-25.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235773" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &lt;1-1.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235774" version="1" comment="kernel-livepatch-SLE15_Update_5 is &lt;1-1.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237208" version="1" comment="kernel-default-livepatch is &lt;4.12.14-25.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237209" version="1" comment="kernel-livepatch-4_12_14-25_22-default is &lt;1-1.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237210" version="1" comment="kernel-livepatch-SLE15_Update_6 is &lt;1-1.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237862" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &lt;5-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237863" version="1" comment="kernel-livepatch-SLE15_Update_1 is &lt;5-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237864" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &lt;5-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237865" version="1" comment="kernel-livepatch-SLE15_Update_2 is &lt;5-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237866" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &lt;2-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237867" version="1" comment="kernel-livepatch-SLE15_Update_5 is &lt;2-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237868" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &lt;3-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237869" version="1" comment="kernel-livepatch-SLE15_Update_4 is &lt;3-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237870" version="1" comment="kernel-livepatch-4_12_14-23-default is &lt;5-13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237871" version="1" comment="kernel-livepatch-SLE15_Update_0 is &lt;5-13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237917" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &lt;4-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237918" version="1" comment="kernel-livepatch-SLE15_Update_3 is &lt;4-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238476" version="1" comment="kernel-default-livepatch is &lt;4.12.14-25.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238477" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &lt;1-1.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238478" version="1" comment="kernel-livepatch-SLE15_Update_7 is &lt;1-1.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240634" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &lt;6-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240635" version="1" comment="kernel-livepatch-SLE15_Update_1 is &lt;6-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240636" version="1" comment="kernel-livepatch-4_12_14-23-default is &lt;6-16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240637" version="1" comment="kernel-livepatch-SLE15_Update_0 is &lt;6-16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240638" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &lt;6-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240639" version="1" comment="kernel-livepatch-SLE15_Update_2 is &lt;6-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242243" version="1" comment="kernel-livepatch-4_12_14-23-default is &lt;7-19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242244" version="1" comment="kernel-livepatch-SLE15_Update_0 is &lt;7-19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253429" version="1" comment="kernel-default-livepatch is &lt;4.12.14-150.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253430" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &lt;1-1.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253431" version="1" comment="kernel-livepatch-SLE15_Update_10 is &lt;1-1.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256138" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &lt;9-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256139" version="1" comment="kernel-livepatch-SLE15_Update_1 is &lt;9-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256764" version="1" comment="kernel-livepatch-4_12_14-23-default is &lt;10-28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256765" version="1" comment="kernel-livepatch-SLE15_Update_0 is &lt;10-28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256957" version="1" comment="kernel-default-livepatch is &lt;4.12.14-150.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256958" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &lt;1-1.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256959" version="1" comment="kernel-livepatch-SLE15_Update_11 is &lt;1-1.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257602" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &lt;2-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257603" version="1" comment="kernel-livepatch-SLE15_Update_10 is &lt;2-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257604" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &lt;3-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257605" version="1" comment="kernel-livepatch-SLE15_Update_8 is &lt;3-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257606" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &lt;2-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257607" version="1" comment="kernel-livepatch-SLE15_Update_9 is &lt;2-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257608" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &lt;10-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257609" version="1" comment="kernel-livepatch-SLE15_Update_1 is &lt;10-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257610" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &lt;9-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257611" version="1" comment="kernel-livepatch-SLE15_Update_2 is &lt;9-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257612" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &lt;7-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257613" version="1" comment="kernel-livepatch-SLE15_Update_3 is &lt;7-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257614" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &lt;6-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257615" version="1" comment="kernel-livepatch-SLE15_Update_4 is &lt;6-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257616" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &lt;6-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257617" version="1" comment="kernel-livepatch-SLE15_Update_5 is &lt;6-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257618" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &lt;4-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257619" version="1" comment="kernel-livepatch-SLE15_Update_7 is &lt;4-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257620" version="1" comment="kernel-livepatch-4_12_14-25_22-default is &lt;5-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257621" version="1" comment="kernel-livepatch-SLE15_Update_6 is &lt;5-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259301" version="1" comment="kernel-default-livepatch is &lt;4.12.14-150.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259302" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &lt;1-1.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259303" version="1" comment="kernel-livepatch-SLE15_Update_12 is &lt;1-1.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259898" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &lt;11-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259899" version="1" comment="kernel-livepatch-SLE15_Update_1 is &lt;11-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259900" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &lt;10-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259901" version="1" comment="kernel-livepatch-SLE15_Update_2 is &lt;10-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259902" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &lt;8-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259903" version="1" comment="kernel-livepatch-SLE15_Update_3 is &lt;8-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259904" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &lt;7-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259905" version="1" comment="kernel-livepatch-SLE15_Update_4 is &lt;7-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259906" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &lt;7-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259907" version="1" comment="kernel-livepatch-SLE15_Update_5 is &lt;7-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259908" version="1" comment="kernel-livepatch-4_12_14-25_22-default is &lt;6-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259909" version="1" comment="kernel-livepatch-SLE15_Update_6 is &lt;6-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259910" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &lt;5-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259911" version="1" comment="kernel-livepatch-SLE15_Update_7 is &lt;5-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259912" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &lt;4-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259913" version="1" comment="kernel-livepatch-SLE15_Update_8 is &lt;4-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259914" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &lt;3-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259915" version="1" comment="kernel-livepatch-SLE15_Update_9 is &lt;3-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259916" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &lt;3-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259917" version="1" comment="kernel-livepatch-SLE15_Update_10 is &lt;3-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259918" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &lt;2-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259919" version="1" comment="kernel-livepatch-SLE15_Update_11 is &lt;2-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261187" version="1" comment="kernel-default-livepatch is &lt;4.12.14-150.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261188" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &lt;1-1.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261189" version="1" comment="kernel-livepatch-SLE15_Update_13 is &lt;1-1.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243600" version="1" comment="kernel-default-livepatch is &lt;4.12.14-25.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243601" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &lt;1-1.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243602" version="1" comment="kernel-livepatch-SLE15_Update_8 is &lt;1-1.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243764" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &lt;7-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243765" version="1" comment="kernel-livepatch-SLE15_Update_2 is &lt;7-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243766" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &lt;5-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243767" version="1" comment="kernel-livepatch-SLE15_Update_3 is &lt;5-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243768" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &lt;4-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243769" version="1" comment="kernel-livepatch-SLE15_Update_4 is &lt;4-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243770" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &lt;2-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243771" version="1" comment="kernel-livepatch-SLE15_Update_7 is &lt;2-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243772" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &lt;4-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243773" version="1" comment="kernel-livepatch-SLE15_Update_5 is &lt;4-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243774" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &lt;7-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243775" version="1" comment="kernel-livepatch-SLE15_Update_1 is &lt;7-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243776" version="1" comment="kernel-livepatch-4_12_14-25_22-default is &lt;3-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243777" version="1" comment="kernel-livepatch-SLE15_Update_6 is &lt;3-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243778" version="1" comment="kernel-livepatch-4_12_14-23-default is &lt;8-22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243779" version="1" comment="kernel-livepatch-SLE15_Update_0 is &lt;8-22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265021" version="1" comment="kernel-default-livepatch is &lt;4.12.14-150.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265022" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &lt;1-1.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265023" version="1" comment="kernel-livepatch-SLE15_Update_14 is &lt;1-1.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246249" version="1" comment="kernel-livepatch-4_12_14-23-default is &lt;9-25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246250" version="1" comment="kernel-livepatch-SLE15_Update_0 is &lt;9-25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246251" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &lt;6-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246252" version="1" comment="kernel-livepatch-SLE15_Update_3 is &lt;6-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246253" version="1" comment="kernel-livepatch-4_12_14-25_22-default is &lt;4-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246254" version="1" comment="kernel-livepatch-SLE15_Update_6 is &lt;4-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246255" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &lt;5-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246256" version="1" comment="kernel-livepatch-SLE15_Update_5 is &lt;5-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246257" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &lt;5-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246258" version="1" comment="kernel-livepatch-SLE15_Update_4 is &lt;5-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246259" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &lt;8-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246260" version="1" comment="kernel-livepatch-SLE15_Update_2 is &lt;8-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246261" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &lt;8-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246262" version="1" comment="kernel-livepatch-SLE15_Update_1 is &lt;8-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246412" version="1" comment="kernel-default-livepatch is &lt;4.12.14-150.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246413" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &lt;1-1.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246414" version="1" comment="kernel-livepatch-SLE15_Update_9 is &lt;1-1.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246766" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &lt;3-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246767" version="1" comment="kernel-livepatch-SLE15_Update_7 is &lt;3-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246768" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &lt;2-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246769" version="1" comment="kernel-livepatch-SLE15_Update_8 is &lt;2-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257130" version="1" comment="kernel-default-livepatch-devel is &lt;4.12.14-197.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257131" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &lt;1-3.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257132" version="1" comment="kernel-livepatch-SLE15-SP1_Update_1 is &lt;1-3.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257133" version="1" comment="sle-module-live-patching-release is ==15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257622" version="1" comment="kernel-livepatch-4_12_14-195-default is &lt;2-4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257623" version="1" comment="kernel-livepatch-SLE15-SP1_Update_0 is &lt;2-4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258739" version="1" comment="kernel-default-livepatch-devel is &lt;4.12.14-197.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258740" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &lt;1-3.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258741" version="1" comment="kernel-livepatch-SLE15-SP1_Update_2 is &lt;1-3.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258975" version="1" comment="kernel-livepatch-4_12_14-195-default is &lt;3-7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258976" version="1" comment="kernel-livepatch-SLE15-SP1_Update_0 is &lt;3-7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258977" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &lt;2-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258978" version="1" comment="kernel-livepatch-SLE15-SP1_Update_1 is &lt;2-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259304" version="1" comment="kernel-default-livepatch-devel is &lt;4.12.14-197.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259305" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &lt;1-3.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259306" version="1" comment="kernel-livepatch-SLE15-SP1_Update_3 is &lt;1-3.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259920" version="1" comment="kernel-livepatch-4_12_14-195-default is &lt;4-10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259921" version="1" comment="kernel-livepatch-SLE15-SP1_Update_0 is &lt;4-10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259922" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &lt;3-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259923" version="1" comment="kernel-livepatch-SLE15-SP1_Update_1 is &lt;3-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259924" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &lt;2-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259925" version="1" comment="kernel-livepatch-SLE15-SP1_Update_2 is &lt;2-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261190" version="1" comment="kernel-default-livepatch-devel is &lt;4.12.14-197.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262885" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &lt;3-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262886" version="1" comment="kernel-livepatch-SLE15-SP1_Update_2 is &lt;3-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262887" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &lt;4-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262888" version="1" comment="kernel-livepatch-SLE15-SP1_Update_1 is &lt;4-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262889" version="1" comment="kernel-livepatch-4_12_14-195-default is &lt;5-13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262890" version="1" comment="kernel-livepatch-SLE15-SP1_Update_0 is &lt;5-13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265024" version="1" comment="kernel-default-livepatch-devel is &lt;4.12.14-197.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265025" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &lt;1-3.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265026" version="1" comment="kernel-livepatch-SLE15-SP1_Update_5 is &lt;1-3.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238542" version="1" comment="sle-module-packagehub-subpackages-release is ==15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240743" version="1" comment="glib2-devel-32bit is &lt;2.54.3-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240744" version="1" comment="glib2-tools-32bit is &lt;2.54.3-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240745" version="1" comment="libgthread-2_0-0-32bit is &lt;2.54.3-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264916" version="1" comment="sle-module-packagehub-subpackages-release is ==15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230143" version="1" comment="kernel-azure is &lt;4.12.14-5.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230144" version="1" comment="kernel-azure-base is &lt;4.12.14-5.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230145" version="1" comment="kernel-azure-devel is &lt;4.12.14-5.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230146" version="1" comment="kernel-devel-azure is &lt;4.12.14-5.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230147" version="1" comment="kernel-source-azure is &lt;4.12.14-5.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230148" version="1" comment="kernel-syms-azure is &lt;4.12.14-5.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231319" version="1" comment="kernel-azure is &lt;4.12.14-5.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231320" version="1" comment="kernel-azure-base is &lt;4.12.14-5.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231321" version="1" comment="kernel-azure-devel is &lt;4.12.14-5.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231322" version="1" comment="kernel-devel-azure is &lt;4.12.14-5.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231323" version="1" comment="kernel-source-azure is &lt;4.12.14-5.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231324" version="1" comment="kernel-syms-azure is &lt;4.12.14-5.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233131" version="1" comment="kernel-azure is &lt;4.12.14-5.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233132" version="1" comment="kernel-azure-base is &lt;4.12.14-5.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233133" version="1" comment="kernel-azure-devel is &lt;4.12.14-5.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233134" version="1" comment="kernel-devel-azure is &lt;4.12.14-5.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233135" version="1" comment="kernel-source-azure is &lt;4.12.14-5.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233136" version="1" comment="kernel-syms-azure is &lt;4.12.14-5.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240915" version="1" comment="kernel-azure is &lt;4.12.14-5.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240916" version="1" comment="kernel-azure-base is &lt;4.12.14-5.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240917" version="1" comment="kernel-azure-devel is &lt;4.12.14-5.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240918" version="1" comment="kernel-devel-azure is &lt;4.12.14-5.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240919" version="1" comment="kernel-source-azure is &lt;4.12.14-5.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240920" version="1" comment="kernel-syms-azure is &lt;4.12.14-5.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253536" version="1" comment="kernel-azure is &lt;4.12.14-5.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253537" version="1" comment="kernel-azure-base is &lt;4.12.14-5.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253538" version="1" comment="kernel-azure-devel is &lt;4.12.14-5.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253539" version="1" comment="kernel-devel-azure is &lt;4.12.14-5.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253540" version="1" comment="kernel-source-azure is &lt;4.12.14-5.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253541" version="1" comment="kernel-syms-azure is &lt;4.12.14-5.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243283" version="1" comment="kernel-azure is &lt;4.12.14-5.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243284" version="1" comment="kernel-azure-base is &lt;4.12.14-5.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243285" version="1" comment="kernel-azure-devel is &lt;4.12.14-5.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243286" version="1" comment="kernel-devel-azure is &lt;4.12.14-5.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243287" version="1" comment="kernel-source-azure is &lt;4.12.14-5.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243288" version="1" comment="kernel-syms-azure is &lt;4.12.14-5.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243362" version="1" comment="python3-paramiko is &lt;2.4.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246415" version="1" comment="kernel-azure is &lt;4.12.14-5.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246416" version="1" comment="kernel-azure-base is &lt;4.12.14-5.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246417" version="1" comment="kernel-azure-devel is &lt;4.12.14-5.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246418" version="1" comment="kernel-devel-azure is &lt;4.12.14-5.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246419" version="1" comment="kernel-source-azure is &lt;4.12.14-5.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246420" version="1" comment="kernel-syms-azure is &lt;4.12.14-5.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260634" version="1" comment="rmt-server is &lt;2.3.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260635" version="1" comment="rmt-server-pubcloud is &lt;2.3.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261191" version="1" comment="kernel-azure is &lt;4.12.14-8.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261192" version="1" comment="kernel-azure-base is &lt;4.12.14-8.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261193" version="1" comment="kernel-azure-devel is &lt;4.12.14-8.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261194" version="1" comment="kernel-devel-azure is &lt;4.12.14-8.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261195" version="1" comment="kernel-source-azure is &lt;4.12.14-8.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261196" version="1" comment="kernel-syms-azure is &lt;4.12.14-8.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256766" version="1" comment="python2-requests is &lt;2.20.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256767" version="1" comment="sle-module-python2-release is ==15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257495" version="1" comment="libsamba-policy0 is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257496" version="1" comment="samba-ad-dc is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257497" version="1" comment="samba-dsdb-modules is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257498" version="1" comment="samba-libs-python is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257499" version="1" comment="samba-python is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263901" version="1" comment="python2-urllib3 is &lt;1.24-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264044" version="1" comment="libsamba-policy0 is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264045" version="1" comment="samba-ad-dc is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264046" version="1" comment="samba-dsdb-modules is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264047" version="1" comment="samba-libs-python is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264048" version="1" comment="samba-python is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265144" version="1" comment="cluster-md-kmp-rt is &lt;4.12.14-14.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265145" version="1" comment="dlm-kmp-rt is &lt;4.12.14-14.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265146" version="1" comment="gfs2-kmp-rt is &lt;4.12.14-14.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265147" version="1" comment="kernel-devel-rt is &lt;4.12.14-14.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265148" version="1" comment="kernel-rt-base is &lt;4.12.14-14.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265149" version="1" comment="kernel-rt-devel is &lt;4.12.14-14.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265150" version="1" comment="kernel-rt_debug-devel is &lt;4.12.14-14.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265151" version="1" comment="kernel-source-rt is &lt;4.12.14-14.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265152" version="1" comment="kernel-syms-rt is &lt;4.12.14-14.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265153" version="1" comment="ocfs2-kmp-rt is &lt;4.12.14-14.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265154" version="1" comment="sle-module-rt-release is ==15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230028" version="1" comment="rsyslog-module-gssapi is &lt;8.33.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230029" version="1" comment="rsyslog-module-mysql is &lt;8.33.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230030" version="1" comment="rsyslog-module-pgsql is &lt;8.33.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230031" version="1" comment="rsyslog-module-relp is &lt;8.33.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230032" version="1" comment="rsyslog-module-snmp is &lt;8.33.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230033" version="1" comment="rsyslog-module-udpspoof is &lt;8.33.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230149" version="1" comment="dpdk is &lt;17.11.2-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230150" version="1" comment="dpdk-devel is &lt;17.11.2-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230151" version="1" comment="dpdk-kmp-default is &lt;17.11.2_k4.12.14_23-3.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230152" version="1" comment="dpdk-thunderx is &lt;17.11.2-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230153" version="1" comment="dpdk-thunderx-devel is &lt;17.11.2-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230154" version="1" comment="dpdk-thunderx-kmp-default is &lt;17.11.2_k4.12.14_23-3.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230155" version="1" comment="dpdk-tools is &lt;17.11.2-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230156" version="1" comment="libdpdk-17_11-0 is &lt;17.11.2-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230319" version="1" comment="xen-devel is &lt;4.10.1_06-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230320" version="1" comment="xen-tools is &lt;4.10.1_06-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230709" version="1" comment="uuidd is &lt;2.31.1-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230710" version="1" comment="ovmf is &lt;2017+git1510945757.b2662641d5-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230711" version="1" comment="ovmf-tools is &lt;2017+git1510945757.b2662641d5-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230712" version="1" comment="qemu-ovmf-x86_64 is &lt;2017+git1510945757.b2662641d5-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230713" version="1" comment="qemu-uefi-aarch64 is &lt;2017+git1510945757.b2662641d5-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232214" version="1" comment="qemu-arm is &lt;2.11.2-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232215" version="1" comment="qemu-block-curl is &lt;2.11.2-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232216" version="1" comment="qemu-block-iscsi is &lt;2.11.2-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232217" version="1" comment="qemu-block-rbd is &lt;2.11.2-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232218" version="1" comment="qemu-block-ssh is &lt;2.11.2-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232219" version="1" comment="qemu-guest-agent is &lt;2.11.2-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232220" version="1" comment="qemu-ipxe is &lt;1.0.0-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232221" version="1" comment="qemu-kvm is &lt;2.11.2-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232222" version="1" comment="qemu-lang is &lt;2.11.2-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232223" version="1" comment="qemu-ppc is &lt;2.11.2-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232224" version="1" comment="qemu-s390 is &lt;2.11.2-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232225" version="1" comment="qemu-seabios is &lt;1.11.0-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232226" version="1" comment="qemu-sgabios is &lt;8-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232227" version="1" comment="qemu-vgabios is &lt;1.11.0-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232228" version="1" comment="qemu-x86 is &lt;2.11.2-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232659" version="1" comment="xen-devel is &lt;4.10.1_08-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232660" version="1" comment="xen-tools is &lt;4.10.1_08-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232661" version="1" comment="apache2 is &lt;2.4.33-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232662" version="1" comment="apache2-devel is &lt;2.4.33-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232663" version="1" comment="apache2-doc is &lt;2.4.33-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232664" version="1" comment="apache2-prefork is &lt;2.4.33-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232665" version="1" comment="apache2-utils is &lt;2.4.33-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232666" version="1" comment="apache2-worker is &lt;2.4.33-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233752" version="1" comment="libecpg6 is &lt;10.5-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233753" version="1" comment="postgresql10-contrib is &lt;10.5-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233754" version="1" comment="postgresql10-devel is &lt;10.5-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233755" version="1" comment="postgresql10-docs is &lt;10.5-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233756" version="1" comment="postgresql10-plperl is &lt;10.5-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233757" version="1" comment="postgresql10-plpython is &lt;10.5-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233758" version="1" comment="postgresql10-pltcl is &lt;10.5-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233759" version="1" comment="postgresql10-server is &lt;10.5-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233760" version="1" comment="libspice-server-devel is &lt;0.14.0-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233761" version="1" comment="libspice-server1 is &lt;0.14.0-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233762" version="1" comment="spice is &lt;0.14.0-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234241" version="1" comment="qemu-arm is &lt;2.11.2-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234242" version="1" comment="qemu-block-curl is &lt;2.11.2-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234243" version="1" comment="qemu-block-iscsi is &lt;2.11.2-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234244" version="1" comment="qemu-block-rbd is &lt;2.11.2-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234245" version="1" comment="qemu-block-ssh is &lt;2.11.2-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234246" version="1" comment="qemu-guest-agent is &lt;2.11.2-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234247" version="1" comment="qemu-ipxe is &lt;1.0.0-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234248" version="1" comment="qemu-kvm is &lt;2.11.2-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234249" version="1" comment="qemu-lang is &lt;2.11.2-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234250" version="1" comment="qemu-ppc is &lt;2.11.2-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234251" version="1" comment="qemu-s390 is &lt;2.11.2-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234252" version="1" comment="qemu-seabios is &lt;1.11.0-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234253" version="1" comment="qemu-sgabios is &lt;8-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234254" version="1" comment="qemu-vgabios is &lt;1.11.0-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234255" version="1" comment="qemu-x86 is &lt;2.11.2-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234391" version="1" comment="spice-gtk-devel is &lt;0.34-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234392" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.34-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234393" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.34-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236837" version="1" comment="apache2 is &lt;2.4.33-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236838" version="1" comment="apache2-devel is &lt;2.4.33-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236839" version="1" comment="apache2-doc is &lt;2.4.33-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236840" version="1" comment="apache2-prefork is &lt;2.4.33-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236841" version="1" comment="apache2-utils is &lt;2.4.33-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236842" version="1" comment="apache2-worker is &lt;2.4.33-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238827" version="1" comment="openssh-fips is &lt;7.6p1-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239812" version="1" comment="salt-api is &lt;2018.3.0-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239813" version="1" comment="salt-cloud is &lt;2018.3.0-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239814" version="1" comment="salt-fish-completion is &lt;2018.3.0-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239815" version="1" comment="salt-master is &lt;2018.3.0-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239816" version="1" comment="salt-proxy is &lt;2018.3.0-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239817" version="1" comment="salt-ssh is &lt;2018.3.0-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239818" version="1" comment="salt-syndic is &lt;2018.3.0-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240784" version="1" comment="qemu-arm is &lt;2.11.2-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240785" version="1" comment="qemu-block-curl is &lt;2.11.2-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240786" version="1" comment="qemu-block-iscsi is &lt;2.11.2-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240787" version="1" comment="qemu-block-rbd is &lt;2.11.2-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240788" version="1" comment="qemu-block-ssh is &lt;2.11.2-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240789" version="1" comment="qemu-guest-agent is &lt;2.11.2-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240790" version="1" comment="qemu-ipxe is &lt;1.0.0+-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240791" version="1" comment="qemu-kvm is &lt;2.11.2-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240792" version="1" comment="qemu-lang is &lt;2.11.2-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240793" version="1" comment="qemu-ppc is &lt;2.11.2-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240794" version="1" comment="qemu-s390 is &lt;2.11.2-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240795" version="1" comment="qemu-seabios is &lt;1.11.0-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240796" version="1" comment="qemu-sgabios is &lt;8-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240797" version="1" comment="qemu-vgabios is &lt;1.11.0-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240798" version="1" comment="qemu-x86 is &lt;2.11.2-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240879" version="1" comment="libecpg6 is &lt;10.6-4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240880" version="1" comment="postgresql10-contrib is &lt;10.6-4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240881" version="1" comment="postgresql10-devel is &lt;10.6-4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240882" version="1" comment="postgresql10-docs is &lt;10.6-4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240883" version="1" comment="postgresql10-plperl is &lt;10.6-4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240884" version="1" comment="postgresql10-plpython is &lt;10.6-4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240885" version="1" comment="postgresql10-pltcl is &lt;10.6-4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240886" version="1" comment="postgresql10-server is &lt;10.6-4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241651" version="1" comment="qemu-arm is &lt;2.11.2-9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241652" version="1" comment="qemu-block-curl is &lt;2.11.2-9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241653" version="1" comment="qemu-block-iscsi is &lt;2.11.2-9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241654" version="1" comment="qemu-block-rbd is &lt;2.11.2-9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241655" version="1" comment="qemu-block-ssh is &lt;2.11.2-9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241656" version="1" comment="qemu-guest-agent is &lt;2.11.2-9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241657" version="1" comment="qemu-ipxe is &lt;1.0.0+-9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241658" version="1" comment="qemu-kvm is &lt;2.11.2-9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241659" version="1" comment="qemu-lang is &lt;2.11.2-9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241660" version="1" comment="qemu-ppc is &lt;2.11.2-9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241661" version="1" comment="qemu-s390 is &lt;2.11.2-9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241662" version="1" comment="qemu-seabios is &lt;1.11.0-9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241663" version="1" comment="qemu-sgabios is &lt;8-9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241664" version="1" comment="qemu-vgabios is &lt;1.11.0-9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241665" version="1" comment="qemu-x86 is &lt;2.11.2-9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241931" version="1" comment="ovmf is &lt;2017+git1510945757.b2662641d5-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241932" version="1" comment="ovmf-tools is &lt;2017+git1510945757.b2662641d5-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241933" version="1" comment="qemu-ovmf-x86_64 is &lt;2017+git1510945757.b2662641d5-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241934" version="1" comment="qemu-uefi-aarch64 is &lt;2017+git1510945757.b2662641d5-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242161" version="1" comment="yast2-rmt is &lt;1.1.2-3.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242463" version="1" comment="xen-devel is &lt;4.10.2_04-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242464" version="1" comment="xen-tools is &lt;4.10.2_04-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252732" version="1" comment="qemu-uefi-aarch64 is &lt;2017+git1510945757.b2662641d5-5.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253192" version="1" comment="389-ds-devel is &lt;1.4.0.3-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253432" version="1" comment="qemu-arm is &lt;2.11.2-9.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253433" version="1" comment="qemu-block-curl is &lt;2.11.2-9.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253434" version="1" comment="qemu-block-iscsi is &lt;2.11.2-9.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253435" version="1" comment="qemu-block-rbd is &lt;2.11.2-9.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253436" version="1" comment="qemu-block-ssh is &lt;2.11.2-9.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253437" version="1" comment="qemu-guest-agent is &lt;2.11.2-9.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253438" version="1" comment="qemu-ipxe is &lt;1.0.0+-9.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253439" version="1" comment="qemu-kvm is &lt;2.11.2-9.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253440" version="1" comment="qemu-lang is &lt;2.11.2-9.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253441" version="1" comment="qemu-ppc is &lt;2.11.2-9.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253442" version="1" comment="qemu-s390 is &lt;2.11.2-9.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253542" version="1" comment="qemu-seabios is &lt;1.11.0-9.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253543" version="1" comment="qemu-sgabios is &lt;8-9.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253443" version="1" comment="qemu-vgabios is &lt;1.11.0-9.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253544" version="1" comment="qemu-x86 is &lt;2.11.2-9.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253545" version="1" comment="xen-devel is &lt;4.10.3_04-3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253546" version="1" comment="xen-tools is &lt;4.10.3_04-3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243154" version="1" comment="openssh-fips is &lt;7.6p1-9.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253624" version="1" comment="graphviz-tcl is &lt;2.40.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253755" version="1" comment="libvirt-admin is &lt;4.0.0-9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253756" version="1" comment="libvirt-client is &lt;4.0.0-9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253757" version="1" comment="libvirt-daemon is &lt;4.0.0-9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253758" version="1" comment="libvirt-daemon-config-network is &lt;4.0.0-9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253759" version="1" comment="libvirt-daemon-config-nwfilter is &lt;4.0.0-9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253760" version="1" comment="libvirt-daemon-driver-interface is &lt;4.0.0-9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253761" version="1" comment="libvirt-daemon-driver-libxl is &lt;4.0.0-9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253762" version="1" comment="libvirt-daemon-driver-lxc is &lt;4.0.0-9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253763" version="1" comment="libvirt-daemon-driver-network is &lt;4.0.0-9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253764" version="1" comment="libvirt-daemon-driver-nodedev is &lt;4.0.0-9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253765" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;4.0.0-9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253766" version="1" comment="libvirt-daemon-driver-qemu is &lt;4.0.0-9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253767" version="1" comment="libvirt-daemon-driver-secret is &lt;4.0.0-9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253768" version="1" comment="libvirt-daemon-driver-storage is &lt;4.0.0-9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253769" version="1" comment="libvirt-daemon-driver-storage-core is &lt;4.0.0-9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253770" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;4.0.0-9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253771" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;4.0.0-9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253772" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;4.0.0-9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253773" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;4.0.0-9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253774" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;4.0.0-9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253775" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;4.0.0-9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253776" version="1" comment="libvirt-daemon-hooks is &lt;4.0.0-9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253777" version="1" comment="libvirt-daemon-lxc is &lt;4.0.0-9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253778" version="1" comment="libvirt-daemon-qemu is &lt;4.0.0-9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253779" version="1" comment="libvirt-daemon-xen is &lt;4.0.0-9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253780" version="1" comment="libvirt-devel is &lt;4.0.0-9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253781" version="1" comment="libvirt-doc is &lt;4.0.0-9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253782" version="1" comment="libvirt-lock-sanlock is &lt;4.0.0-9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253783" version="1" comment="libvirt-nss is &lt;4.0.0-9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254282" version="1" comment="libvirt-admin is &lt;4.0.0-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254283" version="1" comment="libvirt-client is &lt;4.0.0-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254284" version="1" comment="libvirt-daemon is &lt;4.0.0-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254285" version="1" comment="libvirt-daemon-config-network is &lt;4.0.0-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254286" version="1" comment="libvirt-daemon-config-nwfilter is &lt;4.0.0-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254287" version="1" comment="libvirt-daemon-driver-interface is &lt;4.0.0-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254288" version="1" comment="libvirt-daemon-driver-libxl is &lt;4.0.0-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254289" version="1" comment="libvirt-daemon-driver-lxc is &lt;4.0.0-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254290" version="1" comment="libvirt-daemon-driver-network is &lt;4.0.0-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254291" version="1" comment="libvirt-daemon-driver-nodedev is &lt;4.0.0-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254292" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;4.0.0-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254293" version="1" comment="libvirt-daemon-driver-qemu is &lt;4.0.0-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254294" version="1" comment="libvirt-daemon-driver-secret is &lt;4.0.0-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254295" version="1" comment="libvirt-daemon-driver-storage is &lt;4.0.0-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254296" version="1" comment="libvirt-daemon-driver-storage-core is &lt;4.0.0-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254297" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;4.0.0-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254298" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;4.0.0-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254299" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;4.0.0-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254300" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;4.0.0-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254301" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;4.0.0-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254302" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;4.0.0-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254303" version="1" comment="libvirt-daemon-hooks is &lt;4.0.0-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254304" version="1" comment="libvirt-daemon-lxc is &lt;4.0.0-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254305" version="1" comment="libvirt-daemon-qemu is &lt;4.0.0-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254306" version="1" comment="libvirt-daemon-xen is &lt;4.0.0-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254307" version="1" comment="libvirt-devel is &lt;4.0.0-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254308" version="1" comment="libvirt-doc is &lt;4.0.0-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254309" version="1" comment="libvirt-lock-sanlock is &lt;4.0.0-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254310" version="1" comment="libvirt-nss is &lt;4.0.0-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254574" version="1" comment="rmt-server is &lt;2.1.4-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255825" version="1" comment="bind-chrootenv is &lt;9.11.2-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255826" version="1" comment="bind-doc is &lt;9.11.2-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257700" version="1" comment="libvirt-admin is &lt;4.0.0-9.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257701" version="1" comment="libvirt-client is &lt;4.0.0-9.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257702" version="1" comment="libvirt-daemon is &lt;4.0.0-9.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257703" version="1" comment="libvirt-daemon-config-network is &lt;4.0.0-9.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257704" version="1" comment="libvirt-daemon-config-nwfilter is &lt;4.0.0-9.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257705" version="1" comment="libvirt-daemon-driver-interface is &lt;4.0.0-9.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257706" version="1" comment="libvirt-daemon-driver-libxl is &lt;4.0.0-9.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257707" version="1" comment="libvirt-daemon-driver-lxc is &lt;4.0.0-9.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257708" version="1" comment="libvirt-daemon-driver-network is &lt;4.0.0-9.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257709" version="1" comment="libvirt-daemon-driver-nodedev is &lt;4.0.0-9.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257710" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;4.0.0-9.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257711" version="1" comment="libvirt-daemon-driver-qemu is &lt;4.0.0-9.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257712" version="1" comment="libvirt-daemon-driver-secret is &lt;4.0.0-9.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257713" version="1" comment="libvirt-daemon-driver-storage is &lt;4.0.0-9.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257714" version="1" comment="libvirt-daemon-driver-storage-core is &lt;4.0.0-9.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257715" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;4.0.0-9.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257716" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;4.0.0-9.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257717" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;4.0.0-9.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257718" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;4.0.0-9.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257719" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;4.0.0-9.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257720" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;4.0.0-9.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257721" version="1" comment="libvirt-daemon-hooks is &lt;4.0.0-9.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257722" version="1" comment="libvirt-daemon-lxc is &lt;4.0.0-9.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257723" version="1" comment="libvirt-daemon-qemu is &lt;4.0.0-9.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257724" version="1" comment="libvirt-daemon-xen is &lt;4.0.0-9.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257725" version="1" comment="libvirt-devel is &lt;4.0.0-9.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257726" version="1" comment="libvirt-doc is &lt;4.0.0-9.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257727" version="1" comment="libvirt-lock-sanlock is &lt;4.0.0-9.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257728" version="1" comment="libvirt-nss is &lt;4.0.0-9.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243363" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.15.2-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243364" version="1" comment="krb5-server is &lt;1.15.2-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259032" version="1" comment="libecpg6 is &lt;10.9-4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259033" version="1" comment="postgresql10-contrib is &lt;10.9-4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259034" version="1" comment="postgresql10-devel is &lt;10.9-4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259035" version="1" comment="postgresql10-docs is &lt;10.9-4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259036" version="1" comment="postgresql10-plperl is &lt;10.9-4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259037" version="1" comment="postgresql10-plpython is &lt;10.9-4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259038" version="1" comment="postgresql10-pltcl is &lt;10.9-4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259039" version="1" comment="postgresql10-server is &lt;10.9-4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260887" version="1" comment="libmariadb-devel is &lt;3.1.2-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260888" version="1" comment="libmariadb_plugins is &lt;3.1.2-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260889" version="1" comment="libmysqld-devel is &lt;10.2.25-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260890" version="1" comment="libmysqld19 is &lt;10.2.25-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260891" version="1" comment="mariadb-client is &lt;10.2.25-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260892" version="1" comment="mariadb-errormessages is &lt;10.2.25-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260893" version="1" comment="mariadb-tools is &lt;10.2.25-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261197" version="1" comment="subversion-server is &lt;1.10.6-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261198" version="1" comment="squid is &lt;4.8-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261566" version="1" comment="389-ds-devel is &lt;1.4.0.26~git0.8a2d3de6f-4.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262891" version="1" comment="libecpg6 is &lt;10.10-4.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262892" version="1" comment="postgresql10-contrib is &lt;10.10-4.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262893" version="1" comment="postgresql10-devel is &lt;10.10-4.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262894" version="1" comment="postgresql10-docs is &lt;10.10-4.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262895" version="1" comment="postgresql10-plperl is &lt;10.10-4.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262896" version="1" comment="postgresql10-plpython is &lt;10.10-4.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262897" version="1" comment="postgresql10-pltcl is &lt;10.10-4.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262898" version="1" comment="postgresql10-server is &lt;10.10-4.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262899" version="1" comment="apache2-devel is &lt;2.4.33-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262900" version="1" comment="apache2-doc is &lt;2.4.33-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262901" version="1" comment="apache2-prefork is &lt;2.4.33-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262902" version="1" comment="apache2-utils is &lt;2.4.33-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262903" version="1" comment="apache2-worker is &lt;2.4.33-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262904" version="1" comment="qemu-arm is &lt;2.11.2-9.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262905" version="1" comment="qemu-block-curl is &lt;2.11.2-9.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262906" version="1" comment="qemu-block-iscsi is &lt;2.11.2-9.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262907" version="1" comment="qemu-block-rbd is &lt;2.11.2-9.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262908" version="1" comment="qemu-block-ssh is &lt;2.11.2-9.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262909" version="1" comment="qemu-guest-agent is &lt;2.11.2-9.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262910" version="1" comment="qemu-ipxe is &lt;1.0.0+-9.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262911" version="1" comment="qemu-kvm is &lt;2.11.2-9.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262912" version="1" comment="qemu-lang is &lt;2.11.2-9.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262913" version="1" comment="qemu-ppc is &lt;2.11.2-9.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262914" version="1" comment="qemu-s390 is &lt;2.11.2-9.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262915" version="1" comment="qemu-seabios is &lt;1.11.0-9.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262916" version="1" comment="qemu-sgabios is &lt;8-9.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262917" version="1" comment="qemu-vgabios is &lt;1.11.0-9.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262918" version="1" comment="qemu-x86 is &lt;2.11.2-9.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263923" version="1" comment="skopeo is &lt;0.1.32-4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264617" version="1" comment="uuidd is &lt;2.31.1-9.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243780" version="1" comment="libspice-server-devel is &lt;0.14.0-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243781" version="1" comment="libspice-server1 is &lt;0.14.0-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243782" version="1" comment="spice is &lt;0.14.0-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243864" version="1" comment="rmt-server is &lt;1.1.1-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244263" version="1" comment="dovecot23 is &lt;2.3.3-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244264" version="1" comment="dovecot23-backend-mysql is &lt;2.3.3-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244265" version="1" comment="dovecot23-backend-pgsql is &lt;2.3.3-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244266" version="1" comment="dovecot23-backend-sqlite is &lt;2.3.3-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244267" version="1" comment="dovecot23-devel is &lt;2.3.3-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244268" version="1" comment="dovecot23-fts is &lt;2.3.3-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244269" version="1" comment="dovecot23-fts-lucene is &lt;2.3.3-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244270" version="1" comment="dovecot23-fts-solr is &lt;2.3.3-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244271" version="1" comment="dovecot23-fts-squat is &lt;2.3.3-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244476" version="1" comment="qemu-arm is &lt;2.11.2-9.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244477" version="1" comment="qemu-block-curl is &lt;2.11.2-9.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244478" version="1" comment="qemu-block-iscsi is &lt;2.11.2-9.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244479" version="1" comment="qemu-block-rbd is &lt;2.11.2-9.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244480" version="1" comment="qemu-block-ssh is &lt;2.11.2-9.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244481" version="1" comment="qemu-guest-agent is &lt;2.11.2-9.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244482" version="1" comment="qemu-ipxe is &lt;1.0.0+-9.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244483" version="1" comment="qemu-kvm is &lt;2.11.2-9.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244484" version="1" comment="qemu-lang is &lt;2.11.2-9.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244485" version="1" comment="qemu-ppc is &lt;2.11.2-9.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244486" version="1" comment="qemu-s390 is &lt;2.11.2-9.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244487" version="1" comment="qemu-seabios is &lt;1.11.0-9.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244488" version="1" comment="qemu-sgabios is &lt;8-9.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244489" version="1" comment="qemu-vgabios is &lt;1.11.0-9.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244490" version="1" comment="qemu-x86 is &lt;2.11.2-9.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244995" version="1" comment="openssh-fips is &lt;7.6p1-9.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244996" version="1" comment="apache2-devel is &lt;2.4.33-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244997" version="1" comment="apache2-doc is &lt;2.4.33-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244998" version="1" comment="apache2-prefork is &lt;2.4.33-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244999" version="1" comment="apache2-utils is &lt;2.4.33-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245000" version="1" comment="apache2-worker is &lt;2.4.33-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245780" version="1" comment="ovmf is &lt;2017+git1510945757.b2662641d5-5.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245781" version="1" comment="ovmf-tools is &lt;2017+git1510945757.b2662641d5-5.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245782" version="1" comment="qemu-ovmf-x86_64 is &lt;2017+git1510945757.b2662641d5-5.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245783" version="1" comment="qemu-uefi-aarch64 is &lt;2017+git1510945757.b2662641d5-5.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245937" version="1" comment="yast2-rmt is &lt;1.2.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246516" version="1" comment="ovmf is &lt;2017+git1510945757.b2662641d5-5.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246517" version="1" comment="ovmf-tools is &lt;2017+git1510945757.b2662641d5-5.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246518" version="1" comment="qemu-ovmf-x86_64 is &lt;2017+git1510945757.b2662641d5-5.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246519" version="1" comment="qemu-uefi-aarch64 is &lt;2017+git1510945757.b2662641d5-5.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247022" version="1" comment="xen-devel is &lt;4.10.3_02-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247023" version="1" comment="xen-tools is &lt;4.10.3_02-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247024" version="1" comment="dovecot23 is &lt;2.3.3-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247025" version="1" comment="dovecot23-backend-mysql is &lt;2.3.3-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247026" version="1" comment="dovecot23-backend-pgsql is &lt;2.3.3-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247027" version="1" comment="dovecot23-backend-sqlite is &lt;2.3.3-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247028" version="1" comment="dovecot23-devel is &lt;2.3.3-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247029" version="1" comment="dovecot23-fts is &lt;2.3.3-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247030" version="1" comment="dovecot23-fts-lucene is &lt;2.3.3-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247031" version="1" comment="dovecot23-fts-solr is &lt;2.3.3-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247032" version="1" comment="dovecot23-fts-squat is &lt;2.3.3-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247208" version="1" comment="xmltooling is &lt;1.6.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247642" version="1" comment="libvirt-admin is &lt;4.0.0-9.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247643" version="1" comment="libvirt-client is &lt;4.0.0-9.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247644" version="1" comment="libvirt-daemon is &lt;4.0.0-9.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247645" version="1" comment="libvirt-daemon-config-network is &lt;4.0.0-9.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247646" version="1" comment="libvirt-daemon-config-nwfilter is &lt;4.0.0-9.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247647" version="1" comment="libvirt-daemon-driver-interface is &lt;4.0.0-9.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247648" version="1" comment="libvirt-daemon-driver-libxl is &lt;4.0.0-9.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247649" version="1" comment="libvirt-daemon-driver-lxc is &lt;4.0.0-9.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247650" version="1" comment="libvirt-daemon-driver-network is &lt;4.0.0-9.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247651" version="1" comment="libvirt-daemon-driver-nodedev is &lt;4.0.0-9.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247652" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;4.0.0-9.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247653" version="1" comment="libvirt-daemon-driver-qemu is &lt;4.0.0-9.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247654" version="1" comment="libvirt-daemon-driver-secret is &lt;4.0.0-9.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247655" version="1" comment="libvirt-daemon-driver-storage is &lt;4.0.0-9.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247656" version="1" comment="libvirt-daemon-driver-storage-core is &lt;4.0.0-9.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247657" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;4.0.0-9.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247658" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;4.0.0-9.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247659" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;4.0.0-9.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247660" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;4.0.0-9.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247661" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;4.0.0-9.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247662" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;4.0.0-9.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247663" version="1" comment="libvirt-daemon-hooks is &lt;4.0.0-9.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247664" version="1" comment="libvirt-daemon-lxc is &lt;4.0.0-9.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247665" version="1" comment="libvirt-daemon-qemu is &lt;4.0.0-9.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247666" version="1" comment="libvirt-daemon-xen is &lt;4.0.0-9.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247667" version="1" comment="libvirt-devel is &lt;4.0.0-9.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247668" version="1" comment="libvirt-doc is &lt;4.0.0-9.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247669" version="1" comment="libvirt-lock-sanlock is &lt;4.0.0-9.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247670" version="1" comment="libvirt-nss is &lt;4.0.0-9.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243039" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.15.2-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243040" version="1" comment="krb5-server is &lt;1.15.2-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251619" version="1" comment="dovecot23 is &lt;2.3.3-4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251620" version="1" comment="dovecot23-backend-mysql is &lt;2.3.3-4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251621" version="1" comment="dovecot23-backend-pgsql is &lt;2.3.3-4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251622" version="1" comment="dovecot23-backend-sqlite is &lt;2.3.3-4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251623" version="1" comment="dovecot23-devel is &lt;2.3.3-4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251624" version="1" comment="dovecot23-fts is &lt;2.3.3-4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251625" version="1" comment="dovecot23-fts-lucene is &lt;2.3.3-4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251626" version="1" comment="dovecot23-fts-solr is &lt;2.3.3-4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251627" version="1" comment="dovecot23-fts-squat is &lt;2.3.3-4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256768" version="1" comment="libvirt-admin is &lt;5.1.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256769" version="1" comment="libvirt-bash-completion is &lt;5.1.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256770" version="1" comment="libvirt-client is &lt;5.1.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256771" version="1" comment="libvirt-daemon is &lt;5.1.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256772" version="1" comment="libvirt-daemon-config-network is &lt;5.1.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256773" version="1" comment="libvirt-daemon-config-nwfilter is &lt;5.1.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256774" version="1" comment="libvirt-daemon-driver-interface is &lt;5.1.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256775" version="1" comment="libvirt-daemon-driver-libxl is &lt;5.1.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256776" version="1" comment="libvirt-daemon-driver-lxc is &lt;5.1.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256777" version="1" comment="libvirt-daemon-driver-network is &lt;5.1.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256778" version="1" comment="libvirt-daemon-driver-nodedev is &lt;5.1.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256779" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;5.1.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256780" version="1" comment="libvirt-daemon-driver-qemu is &lt;5.1.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256781" version="1" comment="libvirt-daemon-driver-secret is &lt;5.1.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256782" version="1" comment="libvirt-daemon-driver-storage is &lt;5.1.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256783" version="1" comment="libvirt-daemon-driver-storage-core is &lt;5.1.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256784" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;5.1.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256785" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;5.1.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256786" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;5.1.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256787" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;5.1.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256788" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;5.1.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256789" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;5.1.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256790" version="1" comment="libvirt-daemon-hooks is &lt;5.1.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256791" version="1" comment="libvirt-daemon-lxc is &lt;5.1.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256792" version="1" comment="libvirt-daemon-qemu is &lt;5.1.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256793" version="1" comment="libvirt-daemon-xen is &lt;5.1.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256794" version="1" comment="libvirt-devel is &lt;5.1.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256795" version="1" comment="libvirt-doc is &lt;5.1.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256796" version="1" comment="libvirt-lock-sanlock is &lt;5.1.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256797" version="1" comment="libvirt-nss is &lt;5.1.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257729" version="1" comment="libvirt-admin is &lt;5.1.0-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257730" version="1" comment="libvirt-bash-completion is &lt;5.1.0-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257731" version="1" comment="libvirt-client is &lt;5.1.0-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257732" version="1" comment="libvirt-daemon is &lt;5.1.0-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257733" version="1" comment="libvirt-daemon-config-network is &lt;5.1.0-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257734" version="1" comment="libvirt-daemon-config-nwfilter is &lt;5.1.0-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257735" version="1" comment="libvirt-daemon-driver-interface is &lt;5.1.0-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257736" version="1" comment="libvirt-daemon-driver-libxl is &lt;5.1.0-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257737" version="1" comment="libvirt-daemon-driver-lxc is &lt;5.1.0-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257738" version="1" comment="libvirt-daemon-driver-network is &lt;5.1.0-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257739" version="1" comment="libvirt-daemon-driver-nodedev is &lt;5.1.0-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257740" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;5.1.0-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257741" version="1" comment="libvirt-daemon-driver-qemu is &lt;5.1.0-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257742" version="1" comment="libvirt-daemon-driver-secret is &lt;5.1.0-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257743" version="1" comment="libvirt-daemon-driver-storage is &lt;5.1.0-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257744" version="1" comment="libvirt-daemon-driver-storage-core is &lt;5.1.0-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257745" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;5.1.0-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257746" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;5.1.0-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257747" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;5.1.0-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257748" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;5.1.0-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257749" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;5.1.0-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257750" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;5.1.0-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257751" version="1" comment="libvirt-daemon-hooks is &lt;5.1.0-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257752" version="1" comment="libvirt-daemon-lxc is &lt;5.1.0-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257753" version="1" comment="libvirt-daemon-qemu is &lt;5.1.0-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257754" version="1" comment="libvirt-daemon-xen is &lt;5.1.0-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257755" version="1" comment="libvirt-devel is &lt;5.1.0-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257756" version="1" comment="libvirt-doc is &lt;5.1.0-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257757" version="1" comment="libvirt-lock-sanlock is &lt;5.1.0-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257758" version="1" comment="libvirt-nss is &lt;5.1.0-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260636" version="1" comment="rmt-server-config is &lt;2.3.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260732" version="1" comment="libecpg6 is &lt;10.9-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260733" version="1" comment="postgresql10-contrib is &lt;10.9-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260734" version="1" comment="postgresql10-devel is &lt;10.9-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260735" version="1" comment="postgresql10-docs is &lt;10.9-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260736" version="1" comment="postgresql10-plperl is &lt;10.9-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260737" version="1" comment="postgresql10-plpython is &lt;10.9-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260738" version="1" comment="postgresql10-pltcl is &lt;10.9-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260739" version="1" comment="postgresql10-server is &lt;10.9-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262598" version="1" comment="qemu-block-curl is &lt;3.1.1-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262599" version="1" comment="qemu-block-iscsi is &lt;3.1.1-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262600" version="1" comment="qemu-block-rbd is &lt;3.1.1-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262601" version="1" comment="qemu-block-ssh is &lt;3.1.1-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262602" version="1" comment="qemu-guest-agent is &lt;3.1.1-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262603" version="1" comment="qemu-ipxe is &lt;1.0.0+-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262604" version="1" comment="qemu-kvm is &lt;3.1.1-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262605" version="1" comment="qemu-lang is &lt;3.1.1-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262606" version="1" comment="qemu-vgabios is &lt;1.12.0-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263741" version="1" comment="uuidd is &lt;2.33.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263742" version="1" comment="nginx-source is &lt;1.14.2-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229993" version="1" comment="nodejs8 is &lt;8.11.3-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229994" version="1" comment="nodejs8-devel is &lt;8.11.3-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229995" version="1" comment="nodejs8-docs is &lt;8.11.3-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229996" version="1" comment="npm8 is &lt;8.11.3-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230034" version="1" comment="apache2-mod_php7 is &lt;7.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230035" version="1" comment="php7 is &lt;7.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230036" version="1" comment="php7-bcmath is &lt;7.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230037" version="1" comment="php7-bz2 is &lt;7.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230038" version="1" comment="php7-calendar is &lt;7.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230039" version="1" comment="php7-ctype is &lt;7.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230040" version="1" comment="php7-curl is &lt;7.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230041" version="1" comment="php7-dba is &lt;7.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230042" version="1" comment="php7-devel is &lt;7.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230043" version="1" comment="php7-dom is &lt;7.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230044" version="1" comment="php7-enchant is &lt;7.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230045" version="1" comment="php7-exif is &lt;7.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230046" version="1" comment="php7-fastcgi is &lt;7.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230047" version="1" comment="php7-fileinfo is &lt;7.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230048" version="1" comment="php7-fpm is &lt;7.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230049" version="1" comment="php7-ftp is &lt;7.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230050" version="1" comment="php7-gd is &lt;7.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230051" version="1" comment="php7-gettext is &lt;7.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230052" version="1" comment="php7-gmp is &lt;7.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230053" version="1" comment="php7-iconv is &lt;7.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230054" version="1" comment="php7-intl is &lt;7.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230055" version="1" comment="php7-json is &lt;7.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230056" version="1" comment="php7-ldap is &lt;7.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230057" version="1" comment="php7-mbstring is &lt;7.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230058" version="1" comment="php7-mysql is &lt;7.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230059" version="1" comment="php7-odbc is &lt;7.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230060" version="1" comment="php7-opcache is &lt;7.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230061" version="1" comment="php7-openssl is &lt;7.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230062" version="1" comment="php7-pcntl is &lt;7.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230063" version="1" comment="php7-pdo is &lt;7.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230064" version="1" comment="php7-pear is &lt;7.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230065" version="1" comment="php7-pear-Archive_Tar is &lt;7.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230066" version="1" comment="php7-pgsql is &lt;7.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230067" version="1" comment="php7-phar is &lt;7.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230068" version="1" comment="php7-posix is &lt;7.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230069" version="1" comment="php7-shmop is &lt;7.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230070" version="1" comment="php7-snmp is &lt;7.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230071" version="1" comment="php7-soap is &lt;7.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230072" version="1" comment="php7-sockets is &lt;7.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230073" version="1" comment="php7-sqlite is &lt;7.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230074" version="1" comment="php7-sysvmsg is &lt;7.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230075" version="1" comment="php7-sysvsem is &lt;7.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230076" version="1" comment="php7-sysvshm is &lt;7.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230077" version="1" comment="php7-tokenizer is &lt;7.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230078" version="1" comment="php7-wddx is &lt;7.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230079" version="1" comment="php7-xmlreader is &lt;7.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230080" version="1" comment="php7-xmlrpc is &lt;7.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230081" version="1" comment="php7-xmlwriter is &lt;7.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230082" version="1" comment="php7-xsl is &lt;7.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230083" version="1" comment="php7-zip is &lt;7.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230084" version="1" comment="php7-zlib is &lt;7.2.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232229" version="1" comment="apache2-mod_php7 is &lt;7.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232230" version="1" comment="php7 is &lt;7.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232231" version="1" comment="php7-bcmath is &lt;7.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232232" version="1" comment="php7-bz2 is &lt;7.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232233" version="1" comment="php7-calendar is &lt;7.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232234" version="1" comment="php7-ctype is &lt;7.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232235" version="1" comment="php7-curl is &lt;7.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232236" version="1" comment="php7-dba is &lt;7.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232237" version="1" comment="php7-devel is &lt;7.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232238" version="1" comment="php7-dom is &lt;7.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232239" version="1" comment="php7-enchant is &lt;7.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232240" version="1" comment="php7-exif is &lt;7.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232241" version="1" comment="php7-fastcgi is &lt;7.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232242" version="1" comment="php7-fileinfo is &lt;7.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232243" version="1" comment="php7-fpm is &lt;7.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232244" version="1" comment="php7-ftp is &lt;7.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232245" version="1" comment="php7-gd is &lt;7.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232246" version="1" comment="php7-gettext is &lt;7.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232247" version="1" comment="php7-gmp is &lt;7.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232248" version="1" comment="php7-iconv is &lt;7.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232249" version="1" comment="php7-intl is &lt;7.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232250" version="1" comment="php7-json is &lt;7.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232251" version="1" comment="php7-ldap is &lt;7.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232252" version="1" comment="php7-mbstring is &lt;7.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232253" version="1" comment="php7-mysql is &lt;7.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232254" version="1" comment="php7-odbc is &lt;7.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232255" version="1" comment="php7-opcache is &lt;7.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232256" version="1" comment="php7-openssl is &lt;7.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232257" version="1" comment="php7-pcntl is &lt;7.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232258" version="1" comment="php7-pdo is &lt;7.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232259" version="1" comment="php7-pear is &lt;7.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232260" version="1" comment="php7-pear-Archive_Tar is &lt;7.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232261" version="1" comment="php7-pgsql is &lt;7.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232262" version="1" comment="php7-phar is &lt;7.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232263" version="1" comment="php7-posix is &lt;7.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232264" version="1" comment="php7-shmop is &lt;7.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232265" version="1" comment="php7-snmp is &lt;7.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232266" version="1" comment="php7-soap is &lt;7.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232267" version="1" comment="php7-sockets is &lt;7.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232268" version="1" comment="php7-sqlite is &lt;7.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232269" version="1" comment="php7-sysvmsg is &lt;7.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232270" version="1" comment="php7-sysvsem is &lt;7.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232271" version="1" comment="php7-sysvshm is &lt;7.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232272" version="1" comment="php7-tokenizer is &lt;7.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232273" version="1" comment="php7-wddx is &lt;7.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232274" version="1" comment="php7-xmlreader is &lt;7.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232275" version="1" comment="php7-xmlrpc is &lt;7.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232276" version="1" comment="php7-xmlwriter is &lt;7.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232277" version="1" comment="php7-xsl is &lt;7.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232278" version="1" comment="php7-zip is &lt;7.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232279" version="1" comment="php7-zlib is &lt;7.2.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235066" version="1" comment="nodejs8 is &lt;8.11.4-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235067" version="1" comment="nodejs8-devel is &lt;8.11.4-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235068" version="1" comment="nodejs8-docs is &lt;8.11.4-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235069" version="1" comment="npm8 is &lt;8.11.4-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235070" version="1" comment="apache2-mod_php7 is &lt;7.2.5-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235071" version="1" comment="php7 is &lt;7.2.5-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235072" version="1" comment="php7-bcmath is &lt;7.2.5-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235073" version="1" comment="php7-bz2 is &lt;7.2.5-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235074" version="1" comment="php7-calendar is &lt;7.2.5-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235075" version="1" comment="php7-ctype is &lt;7.2.5-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235076" version="1" comment="php7-curl is &lt;7.2.5-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235077" version="1" comment="php7-dba is &lt;7.2.5-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235078" version="1" comment="php7-devel is &lt;7.2.5-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235079" version="1" comment="php7-dom is &lt;7.2.5-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235080" version="1" comment="php7-enchant is &lt;7.2.5-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235081" version="1" comment="php7-exif is &lt;7.2.5-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235082" version="1" comment="php7-fastcgi is &lt;7.2.5-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235083" version="1" comment="php7-fileinfo is &lt;7.2.5-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235084" version="1" comment="php7-fpm is &lt;7.2.5-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235085" version="1" comment="php7-ftp is &lt;7.2.5-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235086" version="1" comment="php7-gd is &lt;7.2.5-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235087" version="1" comment="php7-gettext is &lt;7.2.5-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235088" version="1" comment="php7-gmp is &lt;7.2.5-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235089" version="1" comment="php7-iconv is &lt;7.2.5-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235090" version="1" comment="php7-intl is &lt;7.2.5-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235091" version="1" comment="php7-json is &lt;7.2.5-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235092" version="1" comment="php7-ldap is &lt;7.2.5-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235093" version="1" comment="php7-mbstring is &lt;7.2.5-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235094" version="1" comment="php7-mysql is &lt;7.2.5-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235095" version="1" comment="php7-odbc is &lt;7.2.5-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235096" version="1" comment="php7-opcache is &lt;7.2.5-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235097" version="1" comment="php7-openssl is &lt;7.2.5-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235098" version="1" comment="php7-pcntl is &lt;7.2.5-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235099" version="1" comment="php7-pdo is &lt;7.2.5-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235100" version="1" comment="php7-pear is &lt;7.2.5-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235101" version="1" comment="php7-pear-Archive_Tar is &lt;7.2.5-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235102" version="1" comment="php7-pgsql is &lt;7.2.5-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235103" version="1" comment="php7-phar is &lt;7.2.5-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235104" version="1" comment="php7-posix is &lt;7.2.5-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235105" version="1" comment="php7-shmop is &lt;7.2.5-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235106" version="1" comment="php7-snmp is &lt;7.2.5-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235107" version="1" comment="php7-soap is &lt;7.2.5-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235108" version="1" comment="php7-sockets is &lt;7.2.5-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235109" version="1" comment="php7-sqlite is &lt;7.2.5-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235110" version="1" comment="php7-sysvmsg is &lt;7.2.5-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235111" version="1" comment="php7-sysvsem is &lt;7.2.5-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235112" version="1" comment="php7-sysvshm is &lt;7.2.5-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235113" version="1" comment="php7-tokenizer is &lt;7.2.5-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235114" version="1" comment="php7-wddx is &lt;7.2.5-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235115" version="1" comment="php7-xmlreader is &lt;7.2.5-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235116" version="1" comment="php7-xmlrpc is &lt;7.2.5-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235117" version="1" comment="php7-xmlwriter is &lt;7.2.5-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235118" version="1" comment="php7-xsl is &lt;7.2.5-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235119" version="1" comment="php7-zip is &lt;7.2.5-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235120" version="1" comment="php7-zlib is &lt;7.2.5-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240851" version="1" comment="tomcat-admin-webapps is &lt;9.0.10-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240852" version="1" comment="tomcat-el-3_0-api is &lt;9.0.10-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240853" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.10-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240854" version="1" comment="tomcat-lib is &lt;9.0.10-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240855" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.10-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240856" version="1" comment="tomcat-webapps is &lt;9.0.10-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240932" version="1" comment="tomcat-admin-webapps is &lt;9.0.12-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240933" version="1" comment="tomcat-el-3_0-api is &lt;9.0.12-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240934" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.12-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240935" version="1" comment="tomcat-lib is &lt;9.0.12-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240936" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.12-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240937" version="1" comment="tomcat-webapps is &lt;9.0.12-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243155" version="1" comment="nodejs8 is &lt;8.15.0-3.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243156" version="1" comment="nodejs8-devel is &lt;8.15.0-3.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243157" version="1" comment="nodejs8-docs is &lt;8.15.0-3.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243158" version="1" comment="npm8 is &lt;8.15.0-3.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256580" version="1" comment="apache2-mod_php7 is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256581" version="1" comment="php7-bcmath is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256582" version="1" comment="php7-bz2 is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256583" version="1" comment="php7-calendar is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256584" version="1" comment="php7-ctype is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256585" version="1" comment="php7-curl is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256586" version="1" comment="php7-dba is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256587" version="1" comment="php7-devel is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256588" version="1" comment="php7-dom is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256589" version="1" comment="php7-enchant is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256590" version="1" comment="php7-exif is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256591" version="1" comment="php7-fastcgi is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256592" version="1" comment="php7-fileinfo is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256593" version="1" comment="php7-fpm is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256594" version="1" comment="php7-ftp is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256595" version="1" comment="php7-gd is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256596" version="1" comment="php7-gettext is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256597" version="1" comment="php7-gmp is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256598" version="1" comment="php7-iconv is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256599" version="1" comment="php7-intl is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256600" version="1" comment="php7-json is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256601" version="1" comment="php7-ldap is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256602" version="1" comment="php7-mbstring is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256603" version="1" comment="php7-mysql is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256604" version="1" comment="php7-odbc is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256605" version="1" comment="php7-opcache is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256606" version="1" comment="php7-openssl is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256607" version="1" comment="php7-pcntl is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256608" version="1" comment="php7-pdo is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256609" version="1" comment="php7-pear is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256610" version="1" comment="php7-pear-Archive_Tar is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256611" version="1" comment="php7-pgsql is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256612" version="1" comment="php7-phar is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256613" version="1" comment="php7-posix is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256614" version="1" comment="php7-shmop is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256615" version="1" comment="php7-snmp is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256616" version="1" comment="php7-soap is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256617" version="1" comment="php7-sockets is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256618" version="1" comment="php7-sqlite is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256619" version="1" comment="php7-sysvmsg is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256620" version="1" comment="php7-sysvsem is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256621" version="1" comment="php7-sysvshm is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256622" version="1" comment="php7-tokenizer is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256623" version="1" comment="php7-wddx is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256624" version="1" comment="php7-xmlreader is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256625" version="1" comment="php7-xmlrpc is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256626" version="1" comment="php7-xmlwriter is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256627" version="1" comment="php7-xsl is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256628" version="1" comment="php7-zip is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256629" version="1" comment="php7-zlib is &lt;7.2.5-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258229" version="1" comment="tomcat-admin-webapps is &lt;9.0.20-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258230" version="1" comment="tomcat-el-3_0-api is &lt;9.0.20-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258231" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.20-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258232" version="1" comment="tomcat-lib is &lt;9.0.20-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258233" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.20-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258234" version="1" comment="tomcat-webapps is &lt;9.0.20-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259111" version="1" comment="tomcat-admin-webapps is &lt;9.0.21-3.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259112" version="1" comment="tomcat-el-3_0-api is &lt;9.0.21-3.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259113" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.21-3.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259114" version="1" comment="tomcat-lib is &lt;9.0.21-3.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259115" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.21-3.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259116" version="1" comment="tomcat-webapps is &lt;9.0.21-3.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259117" version="1" comment="apache2-mod_php7 is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259118" version="1" comment="php7-bcmath is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259119" version="1" comment="php7-bz2 is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259120" version="1" comment="php7-calendar is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259121" version="1" comment="php7-ctype is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259122" version="1" comment="php7-curl is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259123" version="1" comment="php7-dba is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259124" version="1" comment="php7-devel is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259125" version="1" comment="php7-dom is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259126" version="1" comment="php7-enchant is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259127" version="1" comment="php7-exif is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259128" version="1" comment="php7-fastcgi is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259129" version="1" comment="php7-fileinfo is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259130" version="1" comment="php7-fpm is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259131" version="1" comment="php7-ftp is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259132" version="1" comment="php7-gd is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259133" version="1" comment="php7-gettext is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259134" version="1" comment="php7-gmp is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259135" version="1" comment="php7-iconv is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259136" version="1" comment="php7-intl is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259137" version="1" comment="php7-json is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259138" version="1" comment="php7-ldap is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259139" version="1" comment="php7-mbstring is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259140" version="1" comment="php7-mysql is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259141" version="1" comment="php7-odbc is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259142" version="1" comment="php7-opcache is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259143" version="1" comment="php7-openssl is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259144" version="1" comment="php7-pcntl is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259145" version="1" comment="php7-pdo is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259146" version="1" comment="php7-pear is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259147" version="1" comment="php7-pear-Archive_Tar is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259148" version="1" comment="php7-pgsql is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259149" version="1" comment="php7-phar is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259150" version="1" comment="php7-posix is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259151" version="1" comment="php7-shmop is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259152" version="1" comment="php7-snmp is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259153" version="1" comment="php7-soap is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259154" version="1" comment="php7-sockets is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259155" version="1" comment="php7-sqlite is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259156" version="1" comment="php7-sysvmsg is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259157" version="1" comment="php7-sysvsem is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259158" version="1" comment="php7-sysvshm is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259159" version="1" comment="php7-tokenizer is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259160" version="1" comment="php7-wddx is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259161" version="1" comment="php7-xmlreader is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259162" version="1" comment="php7-xmlrpc is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259163" version="1" comment="php7-xmlwriter is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259164" version="1" comment="php7-xsl is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259165" version="1" comment="php7-zip is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259166" version="1" comment="php7-zlib is &lt;7.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261199" version="1" comment="nodejs8 is &lt;8.15.1-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261200" version="1" comment="nodejs8-devel is &lt;8.15.1-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261201" version="1" comment="nodejs8-docs is &lt;8.15.1-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261202" version="1" comment="npm8 is &lt;8.15.1-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261203" version="1" comment="nodejs10 is &lt;10.16.0-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261204" version="1" comment="nodejs10-devel is &lt;10.16.0-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261205" version="1" comment="nodejs10-docs is &lt;10.16.0-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261206" version="1" comment="npm10 is &lt;10.16.0-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263152" version="1" comment="nodejs10 is &lt;10.16.3-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263153" version="1" comment="nodejs10-devel is &lt;10.16.3-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263154" version="1" comment="nodejs10-docs is &lt;10.16.3-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263155" version="1" comment="npm10 is &lt;10.16.3-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263224" version="1" comment="nodejs8 is &lt;8.16.1-3.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263225" version="1" comment="nodejs8-devel is &lt;8.16.1-3.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263226" version="1" comment="nodejs8-docs is &lt;8.16.1-3.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263227" version="1" comment="npm8 is &lt;8.16.1-3.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259926" version="1" comment="tomcat-admin-webapps is &lt;9.0.21-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259927" version="1" comment="tomcat-el-3_0-api is &lt;9.0.21-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259928" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.21-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259929" version="1" comment="tomcat-lib is &lt;9.0.21-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259930" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.21-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259931" version="1" comment="tomcat-webapps is &lt;9.0.21-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230157" version="1" comment="drbd is &lt;9.0.13+git.b83ade31-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230158" version="1" comment="drbd-kmp-default is &lt;9.0.13+git.b83ade31_k4.12.14_23-3.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230364" version="1" comment="rubygem-sprockets is &lt;3.7.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230800" version="1" comment="cluster-md-kmp-default is &lt;4.12.14-25.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230801" version="1" comment="dlm-kmp-default is &lt;4.12.14-25.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230802" version="1" comment="gfs2-kmp-default is &lt;4.12.14-25.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230803" version="1" comment="ocfs2-kmp-default is &lt;4.12.14-25.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231325" version="1" comment="cluster-md-kmp-default is &lt;4.12.14-25.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231326" version="1" comment="dlm-kmp-default is &lt;4.12.14-25.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231327" version="1" comment="gfs2-kmp-default is &lt;4.12.14-25.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231328" version="1" comment="ocfs2-kmp-default is &lt;4.12.14-25.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231978" version="1" comment="ctdb is &lt;4.7.8+git.86.94b6d10f7dd-4.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232441" version="1" comment="cluster-md-kmp-default is &lt;4.12.14-25.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232442" version="1" comment="dlm-kmp-default is &lt;4.12.14-25.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232443" version="1" comment="gfs2-kmp-default is &lt;4.12.14-25.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232444" version="1" comment="ocfs2-kmp-default is &lt;4.12.14-25.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233597" version="1" comment="cluster-md-kmp-default is &lt;4.12.14-25.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233598" version="1" comment="dlm-kmp-default is &lt;4.12.14-25.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233599" version="1" comment="gfs2-kmp-default is &lt;4.12.14-25.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233600" version="1" comment="ocfs2-kmp-default is &lt;4.12.14-25.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235775" version="1" comment="cluster-md-kmp-default is &lt;4.12.14-25.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235776" version="1" comment="dlm-kmp-default is &lt;4.12.14-25.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235777" version="1" comment="gfs2-kmp-default is &lt;4.12.14-25.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235778" version="1" comment="ocfs2-kmp-default is &lt;4.12.14-25.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237211" version="1" comment="cluster-md-kmp-default is &lt;4.12.14-25.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237212" version="1" comment="dlm-kmp-default is &lt;4.12.14-25.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237213" version="1" comment="gfs2-kmp-default is &lt;4.12.14-25.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237214" version="1" comment="ocfs2-kmp-default is &lt;4.12.14-25.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237401" version="1" comment="haproxy is &lt;1.8.14~git0.52e4d43b-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238479" version="1" comment="cluster-md-kmp-default is &lt;4.12.14-25.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238480" version="1" comment="dlm-kmp-default is &lt;4.12.14-25.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238481" version="1" comment="gfs2-kmp-default is &lt;4.12.14-25.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238482" version="1" comment="ocfs2-kmp-default is &lt;4.12.14-25.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241573" version="1" comment="ctdb is &lt;4.7.11+git.140.6bd0e5b30d8-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252172" version="1" comment="ctdb is &lt;4.7.11+git.153.b36ceaf2235-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253193" version="1" comment="libpacemaker-devel is &lt;1.1.18+20180430.b12c320f5-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253194" version="1" comment="libpacemaker3 is &lt;1.1.18+20180430.b12c320f5-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253195" version="1" comment="pacemaker is &lt;1.1.18+20180430.b12c320f5-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253196" version="1" comment="pacemaker-cli is &lt;1.1.18+20180430.b12c320f5-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253197" version="1" comment="pacemaker-cts is &lt;1.1.18+20180430.b12c320f5-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253198" version="1" comment="pacemaker-remote is &lt;1.1.18+20180430.b12c320f5-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253444" version="1" comment="cluster-md-kmp-default is &lt;4.12.14-150.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253445" version="1" comment="dlm-kmp-default is &lt;4.12.14-150.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253446" version="1" comment="gfs2-kmp-default is &lt;4.12.14-150.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253447" version="1" comment="ocfs2-kmp-default is &lt;4.12.14-150.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253625" version="1" comment="graphviz-gd is &lt;2.40.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253626" version="1" comment="graphviz-python is &lt;2.40.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256960" version="1" comment="cluster-md-kmp-default is &lt;4.12.14-150.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256961" version="1" comment="dlm-kmp-default is &lt;4.12.14-150.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256962" version="1" comment="gfs2-kmp-default is &lt;4.12.14-150.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256963" version="1" comment="ocfs2-kmp-default is &lt;4.12.14-150.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259040" version="1" comment="libqb-devel is &lt;1.0.3+20171226.6d62b64-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259041" version="1" comment="fence-agents is &lt;4.4.0+git.1558595666.5f79f9e9-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259042" version="1" comment="fence-agents-devel is &lt;4.4.0+git.1558595666.5f79f9e9-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259307" version="1" comment="cluster-md-kmp-default is &lt;4.12.14-150.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259308" version="1" comment="dlm-kmp-default is &lt;4.12.14-150.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259309" version="1" comment="gfs2-kmp-default is &lt;4.12.14-150.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259310" version="1" comment="ocfs2-kmp-default is &lt;4.12.14-150.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261207" version="1" comment="cluster-md-kmp-default is &lt;4.12.14-150.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261208" version="1" comment="dlm-kmp-default is &lt;4.12.14-150.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261209" version="1" comment="gfs2-kmp-default is &lt;4.12.14-150.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261210" version="1" comment="ocfs2-kmp-default is &lt;4.12.14-150.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243603" version="1" comment="cluster-md-kmp-default is &lt;4.12.14-25.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243604" version="1" comment="dlm-kmp-default is &lt;4.12.14-25.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243605" version="1" comment="gfs2-kmp-default is &lt;4.12.14-25.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243606" version="1" comment="ocfs2-kmp-default is &lt;4.12.14-25.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243783" version="1" comment="haproxy is &lt;1.8.17~git0.e89d25b2-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265027" version="1" comment="cluster-md-kmp-default is &lt;4.12.14-150.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265028" version="1" comment="dlm-kmp-default is &lt;4.12.14-150.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265029" version="1" comment="gfs2-kmp-default is &lt;4.12.14-150.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265030" version="1" comment="ocfs2-kmp-default is &lt;4.12.14-150.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242854" version="1" comment="haproxy is &lt;1.8.15~git0.6b6a350a-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246421" version="1" comment="cluster-md-kmp-default is &lt;4.12.14-150.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246422" version="1" comment="dlm-kmp-default is &lt;4.12.14-150.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246423" version="1" comment="gfs2-kmp-default is &lt;4.12.14-150.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246424" version="1" comment="ocfs2-kmp-default is &lt;4.12.14-150.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257134" version="1" comment="cluster-md-kmp-default is &lt;4.12.14-197.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257135" version="1" comment="dlm-kmp-default is &lt;4.12.14-197.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257136" version="1" comment="gfs2-kmp-default is &lt;4.12.14-197.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257137" version="1" comment="ocfs2-kmp-default is &lt;4.12.14-197.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257500" version="1" comment="ctdb is &lt;4.9.5+git.176.375e1f05788-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258742" version="1" comment="cluster-md-kmp-default is &lt;4.12.14-197.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258743" version="1" comment="dlm-kmp-default is &lt;4.12.14-197.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258744" version="1" comment="gfs2-kmp-default is &lt;4.12.14-197.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258745" version="1" comment="ocfs2-kmp-default is &lt;4.12.14-197.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258997" version="1" comment="libqb-devel is &lt;1.0.3+20190326.a521604-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258998" version="1" comment="libqb-tests is &lt;1.0.3+20190326.a521604-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258999" version="1" comment="libqb-tools is &lt;1.0.3+20190326.a521604-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259000" version="1" comment="libqb20 is &lt;1.0.3+20190326.a521604-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259055" version="1" comment="fence-agents is &lt;4.4.0+git.1558595666.5f79f9e9-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259056" version="1" comment="fence-agents-devel is &lt;4.4.0+git.1558595666.5f79f9e9-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259311" version="1" comment="cluster-md-kmp-default is &lt;4.12.14-197.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259312" version="1" comment="dlm-kmp-default is &lt;4.12.14-197.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259313" version="1" comment="gfs2-kmp-default is &lt;4.12.14-197.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259314" version="1" comment="ocfs2-kmp-default is &lt;4.12.14-197.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261211" version="1" comment="cluster-md-kmp-default is &lt;4.12.14-197.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261212" version="1" comment="dlm-kmp-default is &lt;4.12.14-197.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261213" version="1" comment="gfs2-kmp-default is &lt;4.12.14-197.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261214" version="1" comment="ocfs2-kmp-default is &lt;4.12.14-197.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264049" version="1" comment="ctdb is &lt;4.9.5+git.187.71edee57d5a-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265031" version="1" comment="cluster-md-kmp-default is &lt;4.12.14-197.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265032" version="1" comment="dlm-kmp-default is &lt;4.12.14-197.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265033" version="1" comment="gfs2-kmp-default is &lt;4.12.14-197.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265034" version="1" comment="ocfs2-kmp-default is &lt;4.12.14-197.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230804" version="1" comment="kernel-default-extra is &lt;4.12.14-25.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231222" version="1" comment="MozillaThunderbird is &lt;52.9.1-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231223" version="1" comment="MozillaThunderbird-devel is &lt;52.9.1-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231224" version="1" comment="MozillaThunderbird-translations-common is &lt;52.9.1-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231225" version="1" comment="MozillaThunderbird-translations-other is &lt;52.9.1-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231329" version="1" comment="kernel-default-extra is &lt;4.12.14-25.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231478" version="1" comment="enigmail is &lt;2.0.7-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231831" version="1" comment="libavcodec-devel is &lt;3.4.2-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231832" version="1" comment="libavformat-devel is &lt;3.4.2-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231833" version="1" comment="libavformat57 is &lt;3.4.2-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231834" version="1" comment="libavresample-devel is &lt;3.4.2-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231835" version="1" comment="libavresample3 is &lt;3.4.2-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232445" version="1" comment="kernel-default-extra is &lt;4.12.14-25.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233601" version="1" comment="libreoffice is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233602" version="1" comment="libreoffice-base is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233603" version="1" comment="libreoffice-base-drivers-mysql is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233604" version="1" comment="libreoffice-base-drivers-postgresql is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233605" version="1" comment="libreoffice-branding-upstream is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233606" version="1" comment="libreoffice-calc is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233607" version="1" comment="libreoffice-calc-extensions is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233608" version="1" comment="libreoffice-draw is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233609" version="1" comment="libreoffice-filters-optional is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233610" version="1" comment="libreoffice-gnome is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233611" version="1" comment="libreoffice-gtk3 is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233612" version="1" comment="libreoffice-icon-themes is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233613" version="1" comment="libreoffice-impress is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233614" version="1" comment="libreoffice-l10n-af is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233615" version="1" comment="libreoffice-l10n-ar is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233616" version="1" comment="libreoffice-l10n-as is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233617" version="1" comment="libreoffice-l10n-bg is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233618" version="1" comment="libreoffice-l10n-bn is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233619" version="1" comment="libreoffice-l10n-br is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233620" version="1" comment="libreoffice-l10n-ca is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233621" version="1" comment="libreoffice-l10n-cs is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233622" version="1" comment="libreoffice-l10n-cy is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233623" version="1" comment="libreoffice-l10n-da is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233624" version="1" comment="libreoffice-l10n-de is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233625" version="1" comment="libreoffice-l10n-dz is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233626" version="1" comment="libreoffice-l10n-el is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233627" version="1" comment="libreoffice-l10n-en is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233628" version="1" comment="libreoffice-l10n-eo is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233629" version="1" comment="libreoffice-l10n-es is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233630" version="1" comment="libreoffice-l10n-et is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233631" version="1" comment="libreoffice-l10n-eu is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233632" version="1" comment="libreoffice-l10n-fa is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233633" version="1" comment="libreoffice-l10n-fi is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233634" version="1" comment="libreoffice-l10n-fr is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233635" version="1" comment="libreoffice-l10n-ga is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233636" version="1" comment="libreoffice-l10n-gl is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233637" version="1" comment="libreoffice-l10n-gu is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233638" version="1" comment="libreoffice-l10n-he is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233639" version="1" comment="libreoffice-l10n-hi is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233640" version="1" comment="libreoffice-l10n-hr is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233641" version="1" comment="libreoffice-l10n-hu is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233642" version="1" comment="libreoffice-l10n-it is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233643" version="1" comment="libreoffice-l10n-ja is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233644" version="1" comment="libreoffice-l10n-kk is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233645" version="1" comment="libreoffice-l10n-kn is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233646" version="1" comment="libreoffice-l10n-ko is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233647" version="1" comment="libreoffice-l10n-lt is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233648" version="1" comment="libreoffice-l10n-lv is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233649" version="1" comment="libreoffice-l10n-mai is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233650" version="1" comment="libreoffice-l10n-ml is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233651" version="1" comment="libreoffice-l10n-mr is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233652" version="1" comment="libreoffice-l10n-nb is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233653" version="1" comment="libreoffice-l10n-nl is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233654" version="1" comment="libreoffice-l10n-nn is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233655" version="1" comment="libreoffice-l10n-nr is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233656" version="1" comment="libreoffice-l10n-nso is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233657" version="1" comment="libreoffice-l10n-or is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233658" version="1" comment="libreoffice-l10n-pa is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233659" version="1" comment="libreoffice-l10n-pl is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233660" version="1" comment="libreoffice-l10n-pt_BR is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233661" version="1" comment="libreoffice-l10n-pt_PT is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233662" version="1" comment="libreoffice-l10n-ro is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233663" version="1" comment="libreoffice-l10n-ru is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233664" version="1" comment="libreoffice-l10n-si is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233665" version="1" comment="libreoffice-l10n-sk is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233666" version="1" comment="libreoffice-l10n-sl is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233667" version="1" comment="libreoffice-l10n-sr is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233668" version="1" comment="libreoffice-l10n-ss is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233669" version="1" comment="libreoffice-l10n-st is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233670" version="1" comment="libreoffice-l10n-sv is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233671" version="1" comment="libreoffice-l10n-ta is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233672" version="1" comment="libreoffice-l10n-te is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233673" version="1" comment="libreoffice-l10n-th is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233674" version="1" comment="libreoffice-l10n-tn is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233675" version="1" comment="libreoffice-l10n-tr is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233676" version="1" comment="libreoffice-l10n-ts is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233677" version="1" comment="libreoffice-l10n-uk is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233678" version="1" comment="libreoffice-l10n-ve is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233679" version="1" comment="libreoffice-l10n-xh is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233680" version="1" comment="libreoffice-l10n-zh_CN is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233681" version="1" comment="libreoffice-l10n-zh_TW is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233682" version="1" comment="libreoffice-l10n-zu is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233683" version="1" comment="libreoffice-mailmerge is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233684" version="1" comment="libreoffice-math is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233685" version="1" comment="libreoffice-officebean is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233686" version="1" comment="libreoffice-pyuno is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233687" version="1" comment="libreoffice-writer is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233688" version="1" comment="libreoffice-writer-extensions is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233689" version="1" comment="libreofficekit is &lt;6.0.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233690" version="1" comment="kernel-default-extra is &lt;4.12.14-25.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234004" version="1" comment="enigmail is &lt;2.0.8-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235779" version="1" comment="kernel-default-extra is &lt;4.12.14-25.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237215" version="1" comment="kernel-default-extra is &lt;4.12.14-25.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237402" version="1" comment="MozillaThunderbird is &lt;60.2.1-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237403" version="1" comment="MozillaThunderbird-translations-common is &lt;60.2.1-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237404" version="1" comment="MozillaThunderbird-translations-other is &lt;60.2.1-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238483" version="1" comment="kernel-default-extra is &lt;4.12.14-25.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238828" version="1" comment="libepubgen-0_1-1 is &lt;0.1.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238829" version="1" comment="libepubgen-devel is &lt;0.1.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238830" version="1" comment="liblangtag-devel is &lt;0.6.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238831" version="1" comment="liblangtag1 is &lt;0.6.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238833" version="1" comment="libnumbertext is &lt;1.0.5-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238834" version="1" comment="libnumbertext-1_0-0 is &lt;1.0.5-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238835" version="1" comment="libnumbertext-data is &lt;1.0.5-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238836" version="1" comment="libreoffice is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238837" version="1" comment="libreoffice-base is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238838" version="1" comment="libreoffice-base-drivers-postgresql is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238839" version="1" comment="libreoffice-branding-upstream is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238840" version="1" comment="libreoffice-calc is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238841" version="1" comment="libreoffice-calc-extensions is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238842" version="1" comment="libreoffice-draw is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238843" version="1" comment="libreoffice-filters-optional is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238844" version="1" comment="libreoffice-gnome is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238845" version="1" comment="libreoffice-gtk3 is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238846" version="1" comment="libreoffice-icon-themes is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238847" version="1" comment="libreoffice-impress is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238848" version="1" comment="libreoffice-l10n-af is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238849" version="1" comment="libreoffice-l10n-ar is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238850" version="1" comment="libreoffice-l10n-as is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238851" version="1" comment="libreoffice-l10n-bg is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238852" version="1" comment="libreoffice-l10n-bn is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238853" version="1" comment="libreoffice-l10n-br is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238854" version="1" comment="libreoffice-l10n-ca is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238855" version="1" comment="libreoffice-l10n-cs is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238856" version="1" comment="libreoffice-l10n-cy is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238857" version="1" comment="libreoffice-l10n-da is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238858" version="1" comment="libreoffice-l10n-de is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238859" version="1" comment="libreoffice-l10n-dz is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238860" version="1" comment="libreoffice-l10n-el is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238861" version="1" comment="libreoffice-l10n-en is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238862" version="1" comment="libreoffice-l10n-eo is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238863" version="1" comment="libreoffice-l10n-es is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238864" version="1" comment="libreoffice-l10n-et is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238865" version="1" comment="libreoffice-l10n-eu is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238866" version="1" comment="libreoffice-l10n-fa is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238867" version="1" comment="libreoffice-l10n-fi is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238868" version="1" comment="libreoffice-l10n-fr is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238869" version="1" comment="libreoffice-l10n-ga is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238870" version="1" comment="libreoffice-l10n-gl is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238871" version="1" comment="libreoffice-l10n-gu is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238872" version="1" comment="libreoffice-l10n-he is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238873" version="1" comment="libreoffice-l10n-hi is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238874" version="1" comment="libreoffice-l10n-hr is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238875" version="1" comment="libreoffice-l10n-hu is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238876" version="1" comment="libreoffice-l10n-it is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238877" version="1" comment="libreoffice-l10n-ja is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238878" version="1" comment="libreoffice-l10n-kk is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238879" version="1" comment="libreoffice-l10n-kn is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238880" version="1" comment="libreoffice-l10n-ko is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238881" version="1" comment="libreoffice-l10n-lt is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238882" version="1" comment="libreoffice-l10n-lv is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238883" version="1" comment="libreoffice-l10n-mai is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238884" version="1" comment="libreoffice-l10n-ml is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238885" version="1" comment="libreoffice-l10n-mr is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238886" version="1" comment="libreoffice-l10n-nb is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238887" version="1" comment="libreoffice-l10n-nl is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238888" version="1" comment="libreoffice-l10n-nn is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238889" version="1" comment="libreoffice-l10n-nr is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238890" version="1" comment="libreoffice-l10n-nso is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238891" version="1" comment="libreoffice-l10n-or is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238892" version="1" comment="libreoffice-l10n-pa is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238893" version="1" comment="libreoffice-l10n-pl is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238894" version="1" comment="libreoffice-l10n-pt_BR is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238895" version="1" comment="libreoffice-l10n-pt_PT is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238896" version="1" comment="libreoffice-l10n-ro is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238897" version="1" comment="libreoffice-l10n-ru is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238898" version="1" comment="libreoffice-l10n-si is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238899" version="1" comment="libreoffice-l10n-sk is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238900" version="1" comment="libreoffice-l10n-sl is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238901" version="1" comment="libreoffice-l10n-sr is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238902" version="1" comment="libreoffice-l10n-ss is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238903" version="1" comment="libreoffice-l10n-st is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238904" version="1" comment="libreoffice-l10n-sv is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238905" version="1" comment="libreoffice-l10n-ta is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238906" version="1" comment="libreoffice-l10n-te is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238907" version="1" comment="libreoffice-l10n-th is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238908" version="1" comment="libreoffice-l10n-tn is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238909" version="1" comment="libreoffice-l10n-tr is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238910" version="1" comment="libreoffice-l10n-ts is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238911" version="1" comment="libreoffice-l10n-uk is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238912" version="1" comment="libreoffice-l10n-ve is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238913" version="1" comment="libreoffice-l10n-xh is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238914" version="1" comment="libreoffice-l10n-zh_CN is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238915" version="1" comment="libreoffice-l10n-zh_TW is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238916" version="1" comment="libreoffice-l10n-zu is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238917" version="1" comment="libreoffice-mailmerge is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238918" version="1" comment="libreoffice-math is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238919" version="1" comment="libreoffice-officebean is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238920" version="1" comment="libreoffice-pyuno is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238921" version="1" comment="libreoffice-writer is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238922" version="1" comment="libreoffice-writer-extensions is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238923" version="1" comment="libreofficekit is &lt;6.1.3.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238924" version="1" comment="libstaroffice-0_0-0 is &lt;0.0.6-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238925" version="1" comment="libwps-0_4-4 is &lt;0.4.9-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238926" version="1" comment="libwps-devel is &lt;0.4.9-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238927" version="1" comment="libxmlsec1-1 is &lt;1.2.26-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238928" version="1" comment="libxmlsec1-nss1 is &lt;1.2.26-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238929" version="1" comment="myspell-af_ZA is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238930" version="1" comment="myspell-ar is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238931" version="1" comment="myspell-bg_BG is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238932" version="1" comment="myspell-bn_BD is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238933" version="1" comment="myspell-br_FR is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238934" version="1" comment="myspell-ca is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238935" version="1" comment="myspell-cs_CZ is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238936" version="1" comment="myspell-da_DK is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238937" version="1" comment="myspell-el_GR is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238938" version="1" comment="myspell-et_EE is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238939" version="1" comment="myspell-fr_FR is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238940" version="1" comment="myspell-gl is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238941" version="1" comment="myspell-gu_IN is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238942" version="1" comment="myspell-he_IL is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238943" version="1" comment="myspell-hi_IN is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238944" version="1" comment="myspell-hr_HR is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238945" version="1" comment="myspell-it_IT is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238946" version="1" comment="myspell-lt_LT is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238947" version="1" comment="myspell-lv_LV is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238948" version="1" comment="myspell-nl_NL is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238949" version="1" comment="myspell-pl_PL is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238950" version="1" comment="myspell-pt_PT is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238951" version="1" comment="myspell-si_LK is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238952" version="1" comment="myspell-sk_SK is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238953" version="1" comment="myspell-sl_SI is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238954" version="1" comment="myspell-sr is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238955" version="1" comment="myspell-sv_SE is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238956" version="1" comment="myspell-te_IN is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238957" version="1" comment="myspell-th_TH is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238958" version="1" comment="myspell-tr_TR is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238959" version="1" comment="myspell-uk_UA is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238960" version="1" comment="myspell-zu_ZA is &lt;20181025-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238961" version="1" comment="xmlsec1-devel is &lt;1.2.26-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238962" version="1" comment="xmlsec1-nss-devel is &lt;1.2.26-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238963" version="1" comment="xorg-x11-server-wayland is &lt;1.19.6-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239179" version="1" comment="MozillaThunderbird is &lt;60.3.0-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239180" version="1" comment="MozillaThunderbird-translations-common is &lt;60.3.0-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239181" version="1" comment="MozillaThunderbird-translations-other is &lt;60.3.0-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242062" version="1" comment="bluez-cups is &lt;5.48-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253547" version="1" comment="kernel-default-extra is &lt;4.12.14-150.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253627" version="1" comment="evolution-devel is &lt;3.26.6-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253628" version="1" comment="evolution-lang is &lt;3.26.6-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253629" version="1" comment="evolution-plugin-bogofilter is &lt;3.26.6-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253630" version="1" comment="evolution-plugin-pst-import is &lt;3.26.6-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253631" version="1" comment="evolution-plugin-spamassassin is &lt;3.26.6-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253860" version="1" comment="transfig is &lt;3.2.6a-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253930" version="1" comment="libavcodec-devel is &lt;3.4.2-4.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253931" version="1" comment="libavformat-devel is &lt;3.4.2-4.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253932" version="1" comment="libavformat57 is &lt;3.4.2-4.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253933" version="1" comment="libavresample-devel is &lt;3.4.2-4.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253934" version="1" comment="libavresample3 is &lt;3.4.2-4.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254155" version="1" comment="bluez-cups is &lt;5.48-5.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254455" version="1" comment="NetworkManager-lang is &lt;1.10.6-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256630" version="1" comment="MozillaThunderbird is &lt;60.7.0-3.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256631" version="1" comment="MozillaThunderbird-translations-common is &lt;60.7.0-3.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256632" version="1" comment="MozillaThunderbird-translations-other is &lt;60.7.0-3.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256633" version="1" comment="gnome-shell-calendar is &lt;3.26.2+20180130.0d9c74212-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256798" version="1" comment="MozillaThunderbird is &lt;60.7.0-3.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256799" version="1" comment="MozillaThunderbird-translations-common is &lt;60.7.0-3.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256800" version="1" comment="MozillaThunderbird-translations-other is &lt;60.7.0-3.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256964" version="1" comment="kernel-default-extra is &lt;4.12.14-150.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257624" version="1" comment="enigmail is &lt;2.0.11-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258025" version="1" comment="MozillaThunderbird is &lt;60.7.2-3.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258026" version="1" comment="MozillaThunderbird-translations-common is &lt;60.7.2-3.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258027" version="1" comment="MozillaThunderbird-translations-other is &lt;60.7.2-3.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259315" version="1" comment="kernel-default-extra is &lt;4.12.14-150.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259932" version="1" comment="libixion-0_14-0 is &lt;0.14.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259933" version="1" comment="liborcus-0_14-0 is &lt;0.14.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259934" version="1" comment="liborcus-devel is &lt;0.14.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259935" version="1" comment="libreoffice is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259936" version="1" comment="libreoffice-base is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259937" version="1" comment="libreoffice-base-drivers-postgresql is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259938" version="1" comment="libreoffice-branding-upstream is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259939" version="1" comment="libreoffice-calc is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259940" version="1" comment="libreoffice-calc-extensions is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259941" version="1" comment="libreoffice-draw is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259942" version="1" comment="libreoffice-filters-optional is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259943" version="1" comment="libreoffice-gnome is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259944" version="1" comment="libreoffice-gtk3 is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259945" version="1" comment="libreoffice-icon-themes is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259946" version="1" comment="libreoffice-impress is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259947" version="1" comment="libreoffice-l10n-af is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259948" version="1" comment="libreoffice-l10n-ar is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259949" version="1" comment="libreoffice-l10n-as is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259950" version="1" comment="libreoffice-l10n-bg is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259951" version="1" comment="libreoffice-l10n-bn is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259952" version="1" comment="libreoffice-l10n-br is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259953" version="1" comment="libreoffice-l10n-ca is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259954" version="1" comment="libreoffice-l10n-cs is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259955" version="1" comment="libreoffice-l10n-cy is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259956" version="1" comment="libreoffice-l10n-da is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259957" version="1" comment="libreoffice-l10n-de is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259958" version="1" comment="libreoffice-l10n-dz is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259959" version="1" comment="libreoffice-l10n-el is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259960" version="1" comment="libreoffice-l10n-en is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259961" version="1" comment="libreoffice-l10n-eo is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259962" version="1" comment="libreoffice-l10n-es is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259963" version="1" comment="libreoffice-l10n-et is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259964" version="1" comment="libreoffice-l10n-eu is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259965" version="1" comment="libreoffice-l10n-fa is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259966" version="1" comment="libreoffice-l10n-fi is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259967" version="1" comment="libreoffice-l10n-fr is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259968" version="1" comment="libreoffice-l10n-ga is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259969" version="1" comment="libreoffice-l10n-gl is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259970" version="1" comment="libreoffice-l10n-gu is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259971" version="1" comment="libreoffice-l10n-he is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259972" version="1" comment="libreoffice-l10n-hi is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259973" version="1" comment="libreoffice-l10n-hr is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259974" version="1" comment="libreoffice-l10n-hu is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259975" version="1" comment="libreoffice-l10n-it is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259976" version="1" comment="libreoffice-l10n-ja is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259977" version="1" comment="libreoffice-l10n-kk is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259978" version="1" comment="libreoffice-l10n-kn is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259979" version="1" comment="libreoffice-l10n-ko is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259980" version="1" comment="libreoffice-l10n-lt is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259981" version="1" comment="libreoffice-l10n-lv is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259982" version="1" comment="libreoffice-l10n-mai is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259983" version="1" comment="libreoffice-l10n-ml is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259984" version="1" comment="libreoffice-l10n-mr is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259985" version="1" comment="libreoffice-l10n-nb is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259986" version="1" comment="libreoffice-l10n-nl is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259987" version="1" comment="libreoffice-l10n-nn is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259988" version="1" comment="libreoffice-l10n-nr is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259989" version="1" comment="libreoffice-l10n-nso is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259990" version="1" comment="libreoffice-l10n-or is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259991" version="1" comment="libreoffice-l10n-pa is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259992" version="1" comment="libreoffice-l10n-pl is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259993" version="1" comment="libreoffice-l10n-pt_BR is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259994" version="1" comment="libreoffice-l10n-pt_PT is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259995" version="1" comment="libreoffice-l10n-ro is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259996" version="1" comment="libreoffice-l10n-ru is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259997" version="1" comment="libreoffice-l10n-si is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259998" version="1" comment="libreoffice-l10n-sk is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259999" version="1" comment="libreoffice-l10n-sl is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260000" version="1" comment="libreoffice-l10n-sr is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260001" version="1" comment="libreoffice-l10n-ss is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260002" version="1" comment="libreoffice-l10n-st is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260003" version="1" comment="libreoffice-l10n-sv is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260004" version="1" comment="libreoffice-l10n-ta is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260005" version="1" comment="libreoffice-l10n-te is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260006" version="1" comment="libreoffice-l10n-th is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260007" version="1" comment="libreoffice-l10n-tn is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260008" version="1" comment="libreoffice-l10n-tr is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260009" version="1" comment="libreoffice-l10n-ts is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260010" version="1" comment="libreoffice-l10n-uk is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260011" version="1" comment="libreoffice-l10n-ve is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260012" version="1" comment="libreoffice-l10n-xh is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260013" version="1" comment="libreoffice-l10n-zh_CN is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260014" version="1" comment="libreoffice-l10n-zh_TW is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260015" version="1" comment="libreoffice-l10n-zu is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260016" version="1" comment="libreoffice-mailmerge is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260017" version="1" comment="libreoffice-math is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260018" version="1" comment="libreoffice-officebean is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260019" version="1" comment="libreoffice-pyuno is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260020" version="1" comment="libreoffice-writer is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260021" version="1" comment="libreoffice-writer-extensions is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260022" version="1" comment="libreofficekit is &lt;6.2.5.2-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260023" version="1" comment="libwps-0_4-4 is &lt;0.4.10-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260024" version="1" comment="libwps-devel is &lt;0.4.10-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260590" version="1" comment="MozillaThunderbird is &lt;60.8.0-3.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260591" version="1" comment="MozillaThunderbird-translations-common is &lt;60.8.0-3.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260592" version="1" comment="MozillaThunderbird-translations-other is &lt;60.8.0-3.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261215" version="1" comment="PackageKit-gstreamer-plugin is &lt;1.1.10-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261216" version="1" comment="PackageKit-gtk3-module is &lt;1.1.10-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261217" version="1" comment="kernel-default-extra is &lt;4.12.14-150.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262919" version="1" comment="libreoffice is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262920" version="1" comment="libreoffice-base is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262921" version="1" comment="libreoffice-base-drivers-postgresql is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262922" version="1" comment="libreoffice-branding-upstream is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262923" version="1" comment="libreoffice-calc is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262924" version="1" comment="libreoffice-calc-extensions is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262925" version="1" comment="libreoffice-draw is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262926" version="1" comment="libreoffice-filters-optional is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262927" version="1" comment="libreoffice-gnome is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262928" version="1" comment="libreoffice-gtk3 is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262929" version="1" comment="libreoffice-icon-themes is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262930" version="1" comment="libreoffice-impress is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262931" version="1" comment="libreoffice-l10n-af is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262932" version="1" comment="libreoffice-l10n-ar is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262933" version="1" comment="libreoffice-l10n-as is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262934" version="1" comment="libreoffice-l10n-bg is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262935" version="1" comment="libreoffice-l10n-bn is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262936" version="1" comment="libreoffice-l10n-br is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262937" version="1" comment="libreoffice-l10n-ca is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262938" version="1" comment="libreoffice-l10n-cs is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262939" version="1" comment="libreoffice-l10n-cy is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262940" version="1" comment="libreoffice-l10n-da is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262941" version="1" comment="libreoffice-l10n-de is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262942" version="1" comment="libreoffice-l10n-dz is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262943" version="1" comment="libreoffice-l10n-el is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262944" version="1" comment="libreoffice-l10n-en is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262945" version="1" comment="libreoffice-l10n-eo is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262946" version="1" comment="libreoffice-l10n-es is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262947" version="1" comment="libreoffice-l10n-et is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262948" version="1" comment="libreoffice-l10n-eu is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262949" version="1" comment="libreoffice-l10n-fa is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262950" version="1" comment="libreoffice-l10n-fi is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262951" version="1" comment="libreoffice-l10n-fr is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262952" version="1" comment="libreoffice-l10n-ga is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262953" version="1" comment="libreoffice-l10n-gl is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262954" version="1" comment="libreoffice-l10n-gu is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262955" version="1" comment="libreoffice-l10n-he is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262956" version="1" comment="libreoffice-l10n-hi is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262957" version="1" comment="libreoffice-l10n-hr is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262958" version="1" comment="libreoffice-l10n-hu is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262959" version="1" comment="libreoffice-l10n-it is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262960" version="1" comment="libreoffice-l10n-ja is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262961" version="1" comment="libreoffice-l10n-kk is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262962" version="1" comment="libreoffice-l10n-kn is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262963" version="1" comment="libreoffice-l10n-ko is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262964" version="1" comment="libreoffice-l10n-lt is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262965" version="1" comment="libreoffice-l10n-lv is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262966" version="1" comment="libreoffice-l10n-mai is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262967" version="1" comment="libreoffice-l10n-ml is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262968" version="1" comment="libreoffice-l10n-mr is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262969" version="1" comment="libreoffice-l10n-nb is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262970" version="1" comment="libreoffice-l10n-nl is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262971" version="1" comment="libreoffice-l10n-nn is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262972" version="1" comment="libreoffice-l10n-nr is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262973" version="1" comment="libreoffice-l10n-nso is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262974" version="1" comment="libreoffice-l10n-or is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262975" version="1" comment="libreoffice-l10n-pa is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262976" version="1" comment="libreoffice-l10n-pl is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262977" version="1" comment="libreoffice-l10n-pt_BR is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262978" version="1" comment="libreoffice-l10n-pt_PT is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262979" version="1" comment="libreoffice-l10n-ro is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262980" version="1" comment="libreoffice-l10n-ru is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262981" version="1" comment="libreoffice-l10n-si is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262982" version="1" comment="libreoffice-l10n-sk is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262983" version="1" comment="libreoffice-l10n-sl is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262984" version="1" comment="libreoffice-l10n-sr is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262985" version="1" comment="libreoffice-l10n-ss is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262986" version="1" comment="libreoffice-l10n-st is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262987" version="1" comment="libreoffice-l10n-sv is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262988" version="1" comment="libreoffice-l10n-ta is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262989" version="1" comment="libreoffice-l10n-te is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262990" version="1" comment="libreoffice-l10n-th is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262991" version="1" comment="libreoffice-l10n-tn is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262992" version="1" comment="libreoffice-l10n-tr is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262993" version="1" comment="libreoffice-l10n-ts is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262994" version="1" comment="libreoffice-l10n-uk is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262995" version="1" comment="libreoffice-l10n-ve is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262996" version="1" comment="libreoffice-l10n-xh is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262997" version="1" comment="libreoffice-l10n-zh_CN is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262998" version="1" comment="libreoffice-l10n-zh_TW is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262999" version="1" comment="libreoffice-l10n-zu is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263000" version="1" comment="libreoffice-mailmerge is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263001" version="1" comment="libreoffice-math is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263002" version="1" comment="libreoffice-officebean is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263003" version="1" comment="libreoffice-pyuno is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263004" version="1" comment="libreoffice-writer is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263005" version="1" comment="libreoffice-writer-extensions is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263006" version="1" comment="libreofficekit is &lt;6.2.6.2-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243607" version="1" comment="kernel-default-extra is &lt;4.12.14-25.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265035" version="1" comment="kernel-default-extra is &lt;4.12.14-150.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243930" version="1" comment="libvncclient0 is &lt;0.9.10-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244095" version="1" comment="MozillaThunderbird is &lt;60.5.0-3.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244096" version="1" comment="MozillaThunderbird-translations-common is &lt;60.5.0-3.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244097" version="1" comment="MozillaThunderbird-translations-other is &lt;60.5.0-3.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244892" version="1" comment="MozillaThunderbird is &lt;60.5.1-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244893" version="1" comment="MozillaThunderbird-translations-common is &lt;60.5.1-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244894" version="1" comment="MozillaThunderbird-translations-other is &lt;60.5.1-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242584" version="1" comment="libraw-devel is &lt;0.18.9-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242585" version="1" comment="libraw16 is &lt;0.18.9-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245474" version="1" comment="freerdp-devel is &lt;2.0.0~rc4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245475" version="1" comment="libfreerdp2 is &lt;2.0.0~rc4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245476" version="1" comment="libwinpr2 is &lt;2.0.0~rc4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245477" version="1" comment="winpr2-devel is &lt;2.0.0~rc4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246425" version="1" comment="kernel-default-extra is &lt;4.12.14-150.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242892" version="1" comment="libvncclient0 is &lt;0.9.10-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257138" version="1" comment="kernel-default-extra is &lt;4.12.14-197.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258746" version="1" comment="kernel-default-extra is &lt;4.12.14-197.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259316" version="1" comment="kernel-default-extra is &lt;4.12.14-197.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260740" version="1" comment="libreoffice-base is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260741" version="1" comment="libreoffice-base-drivers-postgresql is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260742" version="1" comment="libreoffice-branding-upstream is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260743" version="1" comment="libreoffice-calc is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260744" version="1" comment="libreoffice-calc-extensions is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260745" version="1" comment="libreoffice-draw is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260746" version="1" comment="libreoffice-filters-optional is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260747" version="1" comment="libreoffice-gnome is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260748" version="1" comment="libreoffice-gtk3 is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260749" version="1" comment="libreoffice-icon-themes is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260750" version="1" comment="libreoffice-impress is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260751" version="1" comment="libreoffice-l10n-af is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260752" version="1" comment="libreoffice-l10n-ar is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260753" version="1" comment="libreoffice-l10n-as is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260754" version="1" comment="libreoffice-l10n-bg is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260755" version="1" comment="libreoffice-l10n-bn is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260756" version="1" comment="libreoffice-l10n-br is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260757" version="1" comment="libreoffice-l10n-ca is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260758" version="1" comment="libreoffice-l10n-cs is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260759" version="1" comment="libreoffice-l10n-cy is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260760" version="1" comment="libreoffice-l10n-da is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260761" version="1" comment="libreoffice-l10n-de is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260762" version="1" comment="libreoffice-l10n-dz is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260763" version="1" comment="libreoffice-l10n-el is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260764" version="1" comment="libreoffice-l10n-en is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260765" version="1" comment="libreoffice-l10n-eo is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260766" version="1" comment="libreoffice-l10n-es is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260767" version="1" comment="libreoffice-l10n-et is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260768" version="1" comment="libreoffice-l10n-eu is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260769" version="1" comment="libreoffice-l10n-fa is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260770" version="1" comment="libreoffice-l10n-fi is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260771" version="1" comment="libreoffice-l10n-fr is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260772" version="1" comment="libreoffice-l10n-ga is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260773" version="1" comment="libreoffice-l10n-gl is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260774" version="1" comment="libreoffice-l10n-gu is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260775" version="1" comment="libreoffice-l10n-he is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260776" version="1" comment="libreoffice-l10n-hi is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260777" version="1" comment="libreoffice-l10n-hr is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260778" version="1" comment="libreoffice-l10n-hu is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260779" version="1" comment="libreoffice-l10n-it is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260780" version="1" comment="libreoffice-l10n-ja is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260781" version="1" comment="libreoffice-l10n-kk is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260782" version="1" comment="libreoffice-l10n-kn is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260783" version="1" comment="libreoffice-l10n-ko is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260784" version="1" comment="libreoffice-l10n-lt is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260785" version="1" comment="libreoffice-l10n-lv is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260786" version="1" comment="libreoffice-l10n-mai is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260787" version="1" comment="libreoffice-l10n-ml is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260788" version="1" comment="libreoffice-l10n-mr is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260789" version="1" comment="libreoffice-l10n-nb is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260790" version="1" comment="libreoffice-l10n-nl is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260791" version="1" comment="libreoffice-l10n-nn is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260792" version="1" comment="libreoffice-l10n-nr is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260793" version="1" comment="libreoffice-l10n-nso is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260794" version="1" comment="libreoffice-l10n-or is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260795" version="1" comment="libreoffice-l10n-pa is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260796" version="1" comment="libreoffice-l10n-pl is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260797" version="1" comment="libreoffice-l10n-pt_BR is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260798" version="1" comment="libreoffice-l10n-pt_PT is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260799" version="1" comment="libreoffice-l10n-ro is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260800" version="1" comment="libreoffice-l10n-ru is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260801" version="1" comment="libreoffice-l10n-si is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260802" version="1" comment="libreoffice-l10n-sk is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260803" version="1" comment="libreoffice-l10n-sl is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260804" version="1" comment="libreoffice-l10n-sr is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260805" version="1" comment="libreoffice-l10n-ss is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260806" version="1" comment="libreoffice-l10n-st is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260807" version="1" comment="libreoffice-l10n-sv is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260808" version="1" comment="libreoffice-l10n-ta is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260809" version="1" comment="libreoffice-l10n-te is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260810" version="1" comment="libreoffice-l10n-th is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260811" version="1" comment="libreoffice-l10n-tn is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260812" version="1" comment="libreoffice-l10n-tr is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260813" version="1" comment="libreoffice-l10n-ts is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260814" version="1" comment="libreoffice-l10n-uk is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260815" version="1" comment="libreoffice-l10n-ve is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260816" version="1" comment="libreoffice-l10n-xh is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260817" version="1" comment="libreoffice-l10n-zh_CN is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260818" version="1" comment="libreoffice-l10n-zh_TW is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260819" version="1" comment="libreoffice-l10n-zu is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260820" version="1" comment="libreoffice-mailmerge is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260821" version="1" comment="libreoffice-math is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260822" version="1" comment="libreoffice-officebean is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260823" version="1" comment="libreoffice-pyuno is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260824" version="1" comment="libreoffice-writer is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260825" version="1" comment="libreoffice-writer-extensions is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260826" version="1" comment="libreofficekit is &lt;6.2.5.2-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261218" version="1" comment="kernel-default-extra is &lt;4.12.14-197.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264758" version="1" comment="libreoffice-base is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264759" version="1" comment="libreoffice-base-drivers-postgresql is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264760" version="1" comment="libreoffice-branding-upstream is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264761" version="1" comment="libreoffice-calc is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264762" version="1" comment="libreoffice-calc-extensions is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264763" version="1" comment="libreoffice-draw is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264764" version="1" comment="libreoffice-filters-optional is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264765" version="1" comment="libreoffice-gnome is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264766" version="1" comment="libreoffice-gtk3 is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264767" version="1" comment="libreoffice-icon-themes is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264768" version="1" comment="libreoffice-impress is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264769" version="1" comment="libreoffice-l10n-af is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264770" version="1" comment="libreoffice-l10n-ar is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264771" version="1" comment="libreoffice-l10n-as is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264772" version="1" comment="libreoffice-l10n-bg is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264773" version="1" comment="libreoffice-l10n-bn is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264774" version="1" comment="libreoffice-l10n-br is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264775" version="1" comment="libreoffice-l10n-ca is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264776" version="1" comment="libreoffice-l10n-cs is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264777" version="1" comment="libreoffice-l10n-cy is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264778" version="1" comment="libreoffice-l10n-da is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264779" version="1" comment="libreoffice-l10n-de is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264780" version="1" comment="libreoffice-l10n-dz is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264781" version="1" comment="libreoffice-l10n-el is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264782" version="1" comment="libreoffice-l10n-en is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264783" version="1" comment="libreoffice-l10n-eo is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264784" version="1" comment="libreoffice-l10n-es is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264785" version="1" comment="libreoffice-l10n-et is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264786" version="1" comment="libreoffice-l10n-eu is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264787" version="1" comment="libreoffice-l10n-fa is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264788" version="1" comment="libreoffice-l10n-fi is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264789" version="1" comment="libreoffice-l10n-fr is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264790" version="1" comment="libreoffice-l10n-ga is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264791" version="1" comment="libreoffice-l10n-gl is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264792" version="1" comment="libreoffice-l10n-gu is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264793" version="1" comment="libreoffice-l10n-he is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264794" version="1" comment="libreoffice-l10n-hi is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264795" version="1" comment="libreoffice-l10n-hr is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264796" version="1" comment="libreoffice-l10n-hu is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264797" version="1" comment="libreoffice-l10n-it is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264798" version="1" comment="libreoffice-l10n-ja is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264799" version="1" comment="libreoffice-l10n-kk is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264800" version="1" comment="libreoffice-l10n-kn is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264801" version="1" comment="libreoffice-l10n-ko is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264802" version="1" comment="libreoffice-l10n-lt is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264803" version="1" comment="libreoffice-l10n-lv is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264804" version="1" comment="libreoffice-l10n-mai is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264805" version="1" comment="libreoffice-l10n-ml is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264806" version="1" comment="libreoffice-l10n-mr is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264807" version="1" comment="libreoffice-l10n-nb is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264808" version="1" comment="libreoffice-l10n-nl is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264809" version="1" comment="libreoffice-l10n-nn is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264810" version="1" comment="libreoffice-l10n-nr is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264811" version="1" comment="libreoffice-l10n-nso is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264812" version="1" comment="libreoffice-l10n-or is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264813" version="1" comment="libreoffice-l10n-pa is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264814" version="1" comment="libreoffice-l10n-pl is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264815" version="1" comment="libreoffice-l10n-pt_BR is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264816" version="1" comment="libreoffice-l10n-pt_PT is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264817" version="1" comment="libreoffice-l10n-ro is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264818" version="1" comment="libreoffice-l10n-ru is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264819" version="1" comment="libreoffice-l10n-si is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264820" version="1" comment="libreoffice-l10n-sk is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264821" version="1" comment="libreoffice-l10n-sl is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264822" version="1" comment="libreoffice-l10n-sr is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264823" version="1" comment="libreoffice-l10n-ss is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264824" version="1" comment="libreoffice-l10n-st is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264825" version="1" comment="libreoffice-l10n-sv is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264826" version="1" comment="libreoffice-l10n-ta is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264827" version="1" comment="libreoffice-l10n-te is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264828" version="1" comment="libreoffice-l10n-th is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264829" version="1" comment="libreoffice-l10n-tn is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264830" version="1" comment="libreoffice-l10n-tr is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264831" version="1" comment="libreoffice-l10n-ts is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264832" version="1" comment="libreoffice-l10n-uk is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264833" version="1" comment="libreoffice-l10n-ve is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264834" version="1" comment="libreoffice-l10n-xh is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264835" version="1" comment="libreoffice-l10n-zh_CN is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264836" version="1" comment="libreoffice-l10n-zh_TW is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264837" version="1" comment="libreoffice-l10n-zu is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264838" version="1" comment="libreoffice-mailmerge is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264839" version="1" comment="libreoffice-math is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264840" version="1" comment="libreoffice-officebean is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264841" version="1" comment="libreoffice-pyuno is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264842" version="1" comment="libreoffice-writer is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264843" version="1" comment="libreoffice-writer-extensions is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264844" version="1" comment="libreofficekit is &lt;6.2.7.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265036" version="1" comment="kernel-default-extra is &lt;4.12.14-197.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260649" version="1" comment="kinit is &lt;5.20.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260650" version="1" comment="kinit-devel is &lt;5.20.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260651" version="1" comment="kinit-lang is &lt;5.20.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118803" version="1" comment="sles-release is ==12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178327" version="1" comment="chromedriver is &lt;53.0.2785.89-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178328" version="1" comment="chromium is &lt;53.0.2785.89-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178329" version="1" comment="chromium-desktop-gnome is &lt;53.0.2785.89-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178330" version="1" comment="chromium-desktop-kde is &lt;53.0.2785.89-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178331" version="1" comment="chromium-ffmpegsumo is &lt;53.0.2785.89-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116126" version="1" comment="sles-release is ==12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178332" version="1" comment="irssi is &lt;0.8.20-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178333" version="1" comment="irssi-devel is &lt;0.8.20-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178334" version="1" comment="chromedriver is &lt;54.0.2840.59-109" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178335" version="1" comment="chromium is &lt;54.0.2840.59-109" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178336" version="1" comment="chromium-ffmpegsumo is &lt;54.0.2840.59-109" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178337" version="1" comment="haproxy is &lt;1.5.4-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117479" version="1" comment="suse-sle12-cloud-compute-release is ==5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178338" version="1" comment="openstack-cinder is &lt;2014.2.3.dev13-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178339" version="1" comment="openstack-cinder-volume is &lt;2014.2.3.dev13-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178340" version="1" comment="python-cinder is &lt;2014.2.3.dev13-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178341" version="1" comment="openstack-neutron is &lt;2014.2.2.dev26-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178342" version="1" comment="openstack-neutron-dhcp-agent is &lt;2014.2.2.dev26-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178343" version="1" comment="openstack-neutron-ha-tool is &lt;2014.2.2.dev26-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178344" version="1" comment="openstack-neutron-l3-agent is &lt;2014.2.2.dev26-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178345" version="1" comment="openstack-neutron-lbaas-agent is &lt;2014.2.2.dev26-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178346" version="1" comment="openstack-neutron-linuxbridge-agent is &lt;2014.2.2.dev26-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178347" version="1" comment="openstack-neutron-metadata-agent is &lt;2014.2.2.dev26-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178348" version="1" comment="openstack-neutron-metering-agent is &lt;2014.2.2.dev26-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178349" version="1" comment="openstack-neutron-openvswitch-agent is &lt;2014.2.2.dev26-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178350" version="1" comment="openstack-neutron-vpn-agent is &lt;2014.2.2.dev26-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178351" version="1" comment="python-neutron is &lt;2014.2.2.dev26-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178352" version="1" comment="python-Beaker is &lt;1.6.4-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178353" version="1" comment="python-keystoneclient is &lt;1.0.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178354" version="1" comment="python-keystoneclient-doc is &lt;1.0.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178355" version="1" comment="python-pycrypto is &lt;2.6.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178356" version="1" comment="python-pymongo is &lt;2.6.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178357" version="1" comment="python-requests is &lt;2.3.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178358" version="1" comment="ruby2.1-rubygem-chef is &lt;10.32.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178359" version="1" comment="rubygem-chef is &lt;10.32.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178360" version="1" comment="ImageMagick is &lt;6.8.8.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178361" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178362" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178363" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178364" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116183" version="1" comment="sled-release is ==12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178365" version="1" comment="MozillaFirefox is &lt;31.1.0esr-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178366" version="1" comment="MozillaFirefox-translations is &lt;31.1.0esr-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178367" version="1" comment="aaa_base is &lt;13.2+git20140911.61c1681-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178368" version="1" comment="aaa_base-extras is &lt;13.2+git20140911.61c1681-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178369" version="1" comment="accountsservice is &lt;0.6.35-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178370" version="1" comment="accountsservice-lang is &lt;0.6.35-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178371" version="1" comment="libaccountsservice0 is &lt;0.6.35-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178372" version="1" comment="typelib-1_0-AccountsService-1_0 is &lt;0.6.35-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178373" version="1" comment="alsa is &lt;1.0.27.2-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178374" version="1" comment="libasound2 is &lt;1.0.27.2-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178375" version="1" comment="libasound2-32bit is &lt;1.0.27.2-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178376" version="1" comment="argyllcms is &lt;1.6.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178377" version="1" comment="avahi is &lt;0.6.31-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178378" version="1" comment="avahi-lang is &lt;0.6.31-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178379" version="1" comment="libavahi-client3 is &lt;0.6.31-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178380" version="1" comment="libavahi-client3-32bit is &lt;0.6.31-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178381" version="1" comment="libavahi-common3 is &lt;0.6.31-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178382" version="1" comment="libavahi-common3-32bit is &lt;0.6.31-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178383" version="1" comment="libavahi-core7 is &lt;0.6.31-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178384" version="1" comment="libdns_sd is &lt;0.6.31-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178385" version="1" comment="libdns_sd-32bit is &lt;0.6.31-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178386" version="1" comment="bash is &lt;4.2-75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178387" version="1" comment="bash-doc is &lt;4.2-75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178388" version="1" comment="bash-lang is &lt;4.2-75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178389" version="1" comment="libreadline6 is &lt;6.2-75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178390" version="1" comment="libreadline6-32bit is &lt;6.2-75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178391" version="1" comment="readline-doc is &lt;6.2-75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178392" version="1" comment="bind-libs is &lt;9.9.5P1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178393" version="1" comment="bind-libs-32bit is &lt;9.9.5P1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178394" version="1" comment="bind-utils is &lt;9.9.5P1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178395" version="1" comment="bogofilter is &lt;1.2.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178396" version="1" comment="bzip2 is &lt;1.0.6-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178397" version="1" comment="libbz2-1 is &lt;1.0.6-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178398" version="1" comment="libbz2-1-32bit is &lt;1.0.6-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178399" version="1" comment="cifs-utils is &lt;6.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178400" version="1" comment="clamav is &lt;0.98.4-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178401" version="1" comment="colord is &lt;1.1.7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178402" version="1" comment="colord-gtk-lang is &lt;0.1.25-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178403" version="1" comment="colord-lang is &lt;1.1.7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178404" version="1" comment="libcolord-gtk1 is &lt;0.1.25-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178405" version="1" comment="libcolord2 is &lt;1.1.7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178406" version="1" comment="libcolord2-32bit is &lt;1.1.7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178407" version="1" comment="libcolorhug2 is &lt;1.1.7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178408" version="1" comment="coolkey is &lt;1.1.0-147" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178409" version="1" comment="coreutils is &lt;8.22-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178410" version="1" comment="coreutils-lang is &lt;8.22-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178411" version="1" comment="cpio is &lt;2.11-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178412" version="1" comment="cpio-lang is &lt;2.11-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178413" version="1" comment="tar is &lt;1.27.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178414" version="1" comment="tar-lang is &lt;1.27.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178415" version="1" comment="cpp48 is &lt;4.8.3+r212056-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178416" version="1" comment="gcc48 is &lt;4.8.3+r212056-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178417" version="1" comment="gcc48-32bit is &lt;4.8.3+r212056-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178418" version="1" comment="gcc48-c++ is &lt;4.8.3+r212056-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178419" version="1" comment="gcc48-gij is &lt;4.8.3+r212056-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178420" version="1" comment="gcc48-gij-32bit is &lt;4.8.3+r212056-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178421" version="1" comment="gcc48-info is &lt;4.8.3+r212056-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178422" version="1" comment="libasan0 is &lt;4.8.3+r212056-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178423" version="1" comment="libasan0-32bit is &lt;4.8.3+r212056-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178424" version="1" comment="libatomic1 is &lt;4.8.3+r212056-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178425" version="1" comment="libatomic1-32bit is &lt;4.8.3+r212056-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178426" version="1" comment="libffi4 is &lt;4.8.3+r212056-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178427" version="1" comment="libffi4-32bit is &lt;4.8.3+r212056-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178428" version="1" comment="libgcc_s1 is &lt;4.8.3+r212056-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178429" version="1" comment="libgcc_s1-32bit is &lt;4.8.3+r212056-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178430" version="1" comment="libgcj48 is &lt;4.8.3+r212056-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178431" version="1" comment="libgcj48-32bit is &lt;4.8.3+r212056-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178432" version="1" comment="libgcj48-jar is &lt;4.8.3+r212056-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178433" version="1" comment="libgcj_bc1 is &lt;4.8.3+r212056-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178434" version="1" comment="libgfortran3 is &lt;4.8.3+r212056-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178435" version="1" comment="libgomp1 is &lt;4.8.3+r212056-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178436" version="1" comment="libgomp1-32bit is &lt;4.8.3+r212056-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178437" version="1" comment="libitm1 is &lt;4.8.3+r212056-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178438" version="1" comment="libitm1-32bit is &lt;4.8.3+r212056-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178439" version="1" comment="libquadmath0 is &lt;4.8.3+r212056-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178440" version="1" comment="libstdc++48-devel is &lt;4.8.3+r212056-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178441" version="1" comment="libstdc++48-devel-32bit is &lt;4.8.3+r212056-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178442" version="1" comment="libstdc++6 is &lt;4.8.3+r212056-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178443" version="1" comment="libstdc++6-32bit is &lt;4.8.3+r212056-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178444" version="1" comment="libtsan0 is &lt;4.8.3+r212056-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178445" version="1" comment="cron is &lt;4.2-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178446" version="1" comment="cronie is &lt;1.4.11-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178447" version="1" comment="cups is &lt;1.7.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178448" version="1" comment="cups-client is &lt;1.7.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178449" version="1" comment="cups-libs is &lt;1.7.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178450" version="1" comment="cups-libs-32bit is &lt;1.7.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178451" version="1" comment="cups-filters is &lt;1.0.58-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178452" version="1" comment="cups-filters-cups-browsed is &lt;1.0.58-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178453" version="1" comment="cups-filters-foomatic-rip is &lt;1.0.58-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178454" version="1" comment="cups-filters-ghostscript is &lt;1.0.58-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178455" version="1" comment="cups-pk-helper is &lt;0.2.5-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178456" version="1" comment="cups-pk-helper-lang is &lt;0.2.5-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178457" version="1" comment="curl is &lt;7.37.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178458" version="1" comment="libcurl4 is &lt;7.37.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178459" version="1" comment="libcurl4-32bit is &lt;7.37.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178460" version="1" comment="cvs is &lt;1.12.12-181" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178461" version="1" comment="cyrus-sasl is &lt;2.1.26-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178462" version="1" comment="cyrus-sasl-32bit is &lt;2.1.26-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178463" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.26-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178464" version="1" comment="cyrus-sasl-crammd5-32bit is &lt;2.1.26-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178465" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.26-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178466" version="1" comment="cyrus-sasl-digestmd5-32bit is &lt;2.1.26-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178467" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.26-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178468" version="1" comment="cyrus-sasl-gssapi-32bit is &lt;2.1.26-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178469" version="1" comment="cyrus-sasl-plain is &lt;2.1.26-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178470" version="1" comment="cyrus-sasl-plain-32bit is &lt;2.1.26-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178471" version="1" comment="cyrus-sasl-saslauthd is &lt;2.1.26-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178472" version="1" comment="libsasl2-3 is &lt;2.1.26-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178473" version="1" comment="libsasl2-3-32bit is &lt;2.1.26-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178474" version="1" comment="dbus-1 is &lt;1.8.8-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178475" version="1" comment="dbus-1-x11 is &lt;1.8.8-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178476" version="1" comment="libdbus-1-3 is &lt;1.8.8-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178477" version="1" comment="libdbus-1-3-32bit is &lt;1.8.8-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178478" version="1" comment="dbus-1-glib is &lt;0.100.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178479" version="1" comment="dbus-1-glib-32bit is &lt;0.100.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178480" version="1" comment="dhcp is &lt;4.2.6-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178481" version="1" comment="dhcp-client is &lt;4.2.6-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178482" version="1" comment="dia is &lt;0.97.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178483" version="1" comment="dia-lang is &lt;0.97.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178484" version="1" comment="dracut is &lt;037-34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178485" version="1" comment="ecryptfs-utils is &lt;103-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178486" version="1" comment="ecryptfs-utils-32bit is &lt;103-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178487" version="1" comment="elfutils is &lt;0.158-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178488" version="1" comment="libasm1 is &lt;0.158-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178489" version="1" comment="libdw1 is &lt;0.158-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178490" version="1" comment="libdw1-32bit is &lt;0.158-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178491" version="1" comment="libebl1 is &lt;0.158-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178492" version="1" comment="libebl1-32bit is &lt;0.158-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178493" version="1" comment="libelf1 is &lt;0.158-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178494" version="1" comment="libelf1-32bit is &lt;0.158-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178495" version="1" comment="emacs is &lt;24.3-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178496" version="1" comment="emacs-info is &lt;24.3-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178497" version="1" comment="emacs-x11 is &lt;24.3-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178498" version="1" comment="etags is &lt;24.3-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178499" version="1" comment="empathy is &lt;3.10.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178500" version="1" comment="empathy-lang is &lt;3.10.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178501" version="1" comment="telepathy-mission-control-plugin-goa is &lt;3.10.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178502" version="1" comment="evince is &lt;3.10.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178503" version="1" comment="evince-lang is &lt;3.10.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178504" version="1" comment="libevdocument3-4 is &lt;3.10.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178505" version="1" comment="libevview3-3 is &lt;3.10.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178506" version="1" comment="typelib-1_0-EvinceDocument-3_0 is &lt;3.10.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178507" version="1" comment="typelib-1_0-EvinceView-3_0 is &lt;3.10.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178508" version="1" comment="expat is &lt;2.1.0-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178509" version="1" comment="libexpat1 is &lt;2.1.0-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178510" version="1" comment="libexpat1-32bit is &lt;2.1.0-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178511" version="1" comment="facter is &lt;2.0.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178512" version="1" comment="fetchmail is &lt;6.3.26-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178513" version="1" comment="file is &lt;5.19-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178514" version="1" comment="file-magic is &lt;5.19-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178515" version="1" comment="libmagic1 is &lt;5.19-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178516" version="1" comment="libmagic1-32bit is &lt;5.19-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178517" version="1" comment="finch is &lt;2.10.9-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178518" version="1" comment="libpurple is &lt;2.10.9-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178519" version="1" comment="libpurple-lang is &lt;2.10.9-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178520" version="1" comment="libpurple-meanwhile is &lt;2.10.9-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178521" version="1" comment="libpurple-tcl is &lt;2.10.9-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178522" version="1" comment="pidgin is &lt;2.10.9-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178523" version="1" comment="flash-player is &lt;11.2.202.406-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178524" version="1" comment="flash-player-gnome is &lt;11.2.202.406-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178525" version="1" comment="freerdp is &lt;1.0.2-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178526" version="1" comment="libfreerdp-1_0 is &lt;1.0.2-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178527" version="1" comment="libfreerdp-1_0-plugins is &lt;1.0.2-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178528" version="1" comment="ft2demos is &lt;2.5.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178529" version="1" comment="fuse is &lt;2.9.3-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178530" version="1" comment="libfuse2 is &lt;2.9.3-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178531" version="1" comment="g3utils is &lt;1.1.36-54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178532" version="1" comment="mgetty is &lt;1.1.36-54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178533" version="1" comment="gd is &lt;2.1.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178534" version="1" comment="gd-32bit is &lt;2.1.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178535" version="1" comment="gdk-pixbuf-lang is &lt;2.30.6-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178536" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.30.6-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178537" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.30.6-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178538" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.30.6-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178539" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.30.6-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178540" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.30.6-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178541" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.40.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178542" version="1" comment="librsvg-2-2 is &lt;2.40.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178543" version="1" comment="librsvg-2-2-32bit is &lt;2.40.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178544" version="1" comment="rsvg-view is &lt;2.40.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178545" version="1" comment="gdm is &lt;3.10.0.1-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178546" version="1" comment="gdm-branding-upstream is &lt;3.10.0.1-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178547" version="1" comment="gdm-lang is &lt;3.10.0.1-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178548" version="1" comment="gdmflexiserver is &lt;3.10.0.1-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178549" version="1" comment="libgdm1 is &lt;3.10.0.1-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178550" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.10.0.1-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178551" version="1" comment="gimp is &lt;2.8.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178552" version="1" comment="gimp-lang is &lt;2.8.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178553" version="1" comment="gimp-plugins-python is &lt;2.8.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178554" version="1" comment="libgimp-2_0-0 is &lt;2.8.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178555" version="1" comment="libgimpui-2_0-0 is &lt;2.8.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178556" version="1" comment="glib2-lang is &lt;2.38.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178557" version="1" comment="glib2-tools is &lt;2.38.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178558" version="1" comment="libgio-2_0-0 is &lt;2.38.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178559" version="1" comment="libgio-2_0-0-32bit is &lt;2.38.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178560" version="1" comment="libgio-fam is &lt;2.38.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178561" version="1" comment="libglib-2_0-0 is &lt;2.38.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178562" version="1" comment="libglib-2_0-0-32bit is &lt;2.38.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178563" version="1" comment="libgmodule-2_0-0 is &lt;2.38.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178564" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.38.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178565" version="1" comment="libgobject-2_0-0 is &lt;2.38.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178566" version="1" comment="libgobject-2_0-0-32bit is &lt;2.38.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178567" version="1" comment="libgthread-2_0-0 is &lt;2.38.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178568" version="1" comment="libgthread-2_0-0-32bit is &lt;2.38.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178569" version="1" comment="glibc is &lt;2.19-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178570" version="1" comment="glibc-32bit is &lt;2.19-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178571" version="1" comment="glibc-devel is &lt;2.19-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178572" version="1" comment="glibc-devel-32bit is &lt;2.19-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178573" version="1" comment="glibc-i18ndata is &lt;2.19-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178574" version="1" comment="glibc-locale is &lt;2.19-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178575" version="1" comment="glibc-locale-32bit is &lt;2.19-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178576" version="1" comment="nscd is &lt;2.19-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178577" version="1" comment="gnome-keyring is &lt;3.10.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178578" version="1" comment="gnome-keyring-32bit is &lt;3.10.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178579" version="1" comment="gnome-keyring-lang is &lt;3.10.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178580" version="1" comment="gnome-keyring-pam is &lt;3.10.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178581" version="1" comment="gnome-keyring-pam-32bit is &lt;3.10.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178582" version="1" comment="libgck-modules-gnome-keyring is &lt;3.10.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178583" version="1" comment="gnome-online-accounts is &lt;3.10.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178584" version="1" comment="gnome-online-accounts-lang is &lt;3.10.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178585" version="1" comment="libgoa-1_0-0 is &lt;3.10.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178586" version="1" comment="libgoa-backend-1_0-1 is &lt;3.10.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178587" version="1" comment="typelib-1_0-Goa-1_0 is &lt;3.10.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178588" version="1" comment="gnome-shell is &lt;3.10.4-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178589" version="1" comment="gnome-shell-browser-plugin is &lt;3.10.4-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178590" version="1" comment="gnome-shell-calendar is &lt;3.10.4-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178591" version="1" comment="gnome-shell-lang is &lt;3.10.4-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178592" version="1" comment="gnutls is &lt;3.2.15-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178593" version="1" comment="libgnutls28 is &lt;3.2.15-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178594" version="1" comment="libgnutls28-32bit is &lt;3.2.15-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178595" version="1" comment="gpg2 is &lt;2.0.24-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178596" version="1" comment="gpg2-lang is &lt;2.0.24-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178597" version="1" comment="gpgme is &lt;1.5.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178598" version="1" comment="libgpgme11 is &lt;1.5.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178599" version="1" comment="groff is &lt;1.22.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178600" version="1" comment="gvim is &lt;7.4.326-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178601" version="1" comment="vim is &lt;7.4.326-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178602" version="1" comment="vim-data is &lt;7.4.326-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178603" version="1" comment="gzip is &lt;1.6-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178604" version="1" comment="hardlink is &lt;1.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178605" version="1" comment="hplip is &lt;3.14.6-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178606" version="1" comment="hplip-hpijs is &lt;3.14.6-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178607" version="1" comment="hplip-sane is &lt;3.14.6-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178608" version="1" comment="ibus-chewing is &lt;1.4.10.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178609" version="1" comment="ibus-pinyin is &lt;1.5.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178610" version="1" comment="iputils is &lt;s20121221-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178611" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.65-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178612" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.65-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178613" version="1" comment="java-1_7_0-openjdk-plugin is &lt;1.5.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178614" version="1" comment="kbd is &lt;1.15.5-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178615" version="1" comment="kernel-default is &lt;3.12.28-4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178616" version="1" comment="kernel-default-devel is &lt;3.12.28-4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178617" version="1" comment="kernel-default-extra is &lt;3.12.28-4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178618" version="1" comment="kernel-devel is &lt;3.12.28-4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178619" version="1" comment="kernel-macros is &lt;3.12.28-4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178620" version="1" comment="kernel-source is &lt;3.12.28-4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178621" version="1" comment="kernel-syms is &lt;3.12.28-4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178622" version="1" comment="kernel-xen is &lt;3.12.28-4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178623" version="1" comment="kernel-xen-devel is &lt;3.12.28-4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178624" version="1" comment="krb5 is &lt;1.12.1-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178625" version="1" comment="krb5-32bit is &lt;1.12.1-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178626" version="1" comment="krb5-client is &lt;1.12.1-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178627" version="1" comment="krb5-appl-clients is &lt;1.0.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178628" version="1" comment="lcms is &lt;1.19-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178629" version="1" comment="liblcms1 is &lt;1.19-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178630" version="1" comment="liblcms1-32bit is &lt;1.19-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178631" version="1" comment="libHX28 is &lt;3.18-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178632" version="1" comment="libHX28-32bit is &lt;3.18-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178633" version="1" comment="libIlmImf-Imf_2_1-21 is &lt;2.1.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178634" version="1" comment="libIlmImf-Imf_2_1-21-32bit is &lt;2.1.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178635" version="1" comment="openexr is &lt;2.1.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178636" version="1" comment="libX11-6 is &lt;1.6.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178637" version="1" comment="libX11-6-32bit is &lt;1.6.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178638" version="1" comment="libX11-data is &lt;1.6.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178639" version="1" comment="libX11-xcb1 is &lt;1.6.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178640" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178641" version="1" comment="libXRes1 is &lt;1.0.7-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178642" version="1" comment="libXRes1-32bit is &lt;1.0.7-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178643" version="1" comment="libXcursor1 is &lt;1.1.14-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178644" version="1" comment="libXcursor1-32bit is &lt;1.1.14-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178645" version="1" comment="libXext6 is &lt;1.3.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178646" version="1" comment="libXext6-32bit is &lt;1.3.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178647" version="1" comment="libXfixes3 is &lt;5.0.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178648" version="1" comment="libXfixes3-32bit is &lt;5.0.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178649" version="1" comment="libXfont1 is &lt;1.4.7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178650" version="1" comment="libXi6 is &lt;1.7.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178651" version="1" comment="libXi6-32bit is &lt;1.7.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178652" version="1" comment="libXinerama1 is &lt;1.1.3-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178653" version="1" comment="libXinerama1-32bit is &lt;1.1.3-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178654" version="1" comment="libXp6 is &lt;1.0.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178655" version="1" comment="libXp6-32bit is &lt;1.0.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178656" version="1" comment="libXrandr2 is &lt;1.4.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178657" version="1" comment="libXrandr2-32bit is &lt;1.4.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178658" version="1" comment="libXrender1 is &lt;0.9.8-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178659" version="1" comment="libXrender1-32bit is &lt;0.9.8-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178660" version="1" comment="libXt6 is &lt;1.1.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178661" version="1" comment="libXt6-32bit is &lt;1.1.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178662" version="1" comment="libXtst6 is &lt;1.2.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178663" version="1" comment="libXtst6-32bit is &lt;1.2.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178664" version="1" comment="libXv1 is &lt;1.0.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178665" version="1" comment="libXv1-32bit is &lt;1.0.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178666" version="1" comment="libXvMC1 is &lt;1.0.8-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178667" version="1" comment="libXxf86dga1 is &lt;1.1.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178668" version="1" comment="libXxf86vm1 is &lt;1.1.3-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178669" version="1" comment="libXxf86vm1-32bit is &lt;1.1.3-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178670" version="1" comment="libaugeas0 is &lt;1.2.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178671" version="1" comment="libblkid1 is &lt;2.25-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178672" version="1" comment="libblkid1-32bit is &lt;2.25-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178673" version="1" comment="libmount1 is &lt;2.25-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178674" version="1" comment="libmount1-32bit is &lt;2.25-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178675" version="1" comment="libsmartcols1 is &lt;2.25-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178676" version="1" comment="libuuid-devel is &lt;2.25-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178677" version="1" comment="libuuid1 is &lt;2.25-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178678" version="1" comment="libuuid1-32bit is &lt;2.25-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178679" version="1" comment="python-libmount is &lt;2.25-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178680" version="1" comment="util-linux is &lt;2.25-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178681" version="1" comment="util-linux-lang is &lt;2.25-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178682" version="1" comment="util-linux-systemd is &lt;2.25-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178683" version="1" comment="uuidd is &lt;2.25-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178684" version="1" comment="libcgroup1 is &lt;0.41.rc1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178685" version="1" comment="libdcerpc-binding0 is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178686" version="1" comment="libdcerpc-binding0-32bit is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178687" version="1" comment="libdcerpc0 is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178688" version="1" comment="libdcerpc0-32bit is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178689" version="1" comment="libgensec0 is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178690" version="1" comment="libgensec0-32bit is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178691" version="1" comment="libndr-krb5pac0 is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178692" version="1" comment="libndr-krb5pac0-32bit is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178693" version="1" comment="libndr-nbt0 is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178694" version="1" comment="libndr-nbt0-32bit is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178695" version="1" comment="libndr-standard0 is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178696" version="1" comment="libndr-standard0-32bit is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178697" version="1" comment="libndr0 is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178698" version="1" comment="libndr0-32bit is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178699" version="1" comment="libnetapi0 is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178700" version="1" comment="libnetapi0-32bit is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178701" version="1" comment="libpdb0 is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178702" version="1" comment="libpdb0-32bit is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178703" version="1" comment="libregistry0 is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178704" version="1" comment="libsamba-credentials0 is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178705" version="1" comment="libsamba-credentials0-32bit is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178706" version="1" comment="libsamba-hostconfig0 is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178707" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178708" version="1" comment="libsamba-util0 is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178709" version="1" comment="libsamba-util0-32bit is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178710" version="1" comment="libsamdb0 is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178711" version="1" comment="libsamdb0-32bit is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178712" version="1" comment="libsmbclient-raw0 is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178713" version="1" comment="libsmbclient-raw0-32bit is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178714" version="1" comment="libsmbclient0 is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178715" version="1" comment="libsmbclient0-32bit is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178716" version="1" comment="libsmbconf0 is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178717" version="1" comment="libsmbconf0-32bit is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178718" version="1" comment="libsmbldap0 is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178719" version="1" comment="libsmbldap0-32bit is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178720" version="1" comment="libtevent-util0 is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178721" version="1" comment="libtevent-util0-32bit is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178722" version="1" comment="libwbclient0 is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178723" version="1" comment="libwbclient0-32bit is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178724" version="1" comment="samba is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178725" version="1" comment="samba-32bit is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178726" version="1" comment="samba-client is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178727" version="1" comment="samba-client-32bit is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178728" version="1" comment="samba-doc is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178729" version="1" comment="samba-libs is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178730" version="1" comment="samba-libs-32bit is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178731" version="1" comment="samba-winbind is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178732" version="1" comment="samba-winbind-32bit is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178733" version="1" comment="libdmx1 is &lt;1.1.3-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178734" version="1" comment="libecpg6 is &lt;9.3.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178735" version="1" comment="libpq5 is &lt;9.3.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178736" version="1" comment="libpq5-32bit is &lt;9.3.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178737" version="1" comment="postgresql93 is &lt;9.3.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178738" version="1" comment="libevent-2_0-5 is &lt;2.0.21-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178739" version="1" comment="libexif12 is &lt;0.6.21-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178740" version="1" comment="libexif12-32bit is &lt;0.6.21-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178741" version="1" comment="libfbembed2_5 is &lt;2.5.2.26539-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178742" version="1" comment="libfreebl3 is &lt;3.16.4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178743" version="1" comment="libfreebl3-32bit is &lt;3.16.4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178744" version="1" comment="libsoftokn3 is &lt;3.16.4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178745" version="1" comment="libsoftokn3-32bit is &lt;3.16.4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178746" version="1" comment="mozilla-nss is &lt;3.16.4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178747" version="1" comment="mozilla-nss-32bit is &lt;3.16.4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178748" version="1" comment="mozilla-nss-certs is &lt;3.16.4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178749" version="1" comment="mozilla-nss-certs-32bit is &lt;3.16.4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178750" version="1" comment="mozilla-nss-tools is &lt;3.16.4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178751" version="1" comment="libfreetype6 is &lt;2.5.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178752" version="1" comment="libfreetype6-32bit is &lt;2.5.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178753" version="1" comment="libgadu3 is &lt;1.11.4-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178754" version="1" comment="libgc1 is &lt;7.2d-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178755" version="1" comment="libgcrypt20 is &lt;1.6.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178756" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178757" version="1" comment="libgnomesu is &lt;1.0.0-352" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178758" version="1" comment="libgnomesu-lang is &lt;1.0.0-352" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178759" version="1" comment="libgnomesu0 is &lt;1.0.0-352" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178760" version="1" comment="libgssglue1 is &lt;0.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178761" version="1" comment="libgssglue1-32bit is &lt;0.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178762" version="1" comment="libgudev-1_0-0 is &lt;210-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178763" version="1" comment="libgudev-1_0-0-32bit is &lt;210-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178764" version="1" comment="libudev1 is &lt;210-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178765" version="1" comment="libudev1-32bit is &lt;210-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178766" version="1" comment="systemd is &lt;210-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178767" version="1" comment="systemd-32bit is &lt;210-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178768" version="1" comment="systemd-bash-completion is &lt;210-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178769" version="1" comment="systemd-sysvinit is &lt;210-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178770" version="1" comment="udev is &lt;210-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178771" version="1" comment="libid3tag0 is &lt;0.15.1b-182" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178772" version="1" comment="libipa_hbac0 is &lt;1.11.5.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178773" version="1" comment="libsss_idmap0 is &lt;1.11.5.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178774" version="1" comment="python-sssd-config is &lt;1.11.5.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178775" version="1" comment="sssd is &lt;1.11.5.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178776" version="1" comment="sssd-32bit is &lt;1.11.5.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178777" version="1" comment="sssd-ad is &lt;1.11.5.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178778" version="1" comment="sssd-ipa is &lt;1.11.5.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178779" version="1" comment="sssd-krb5 is &lt;1.11.5.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178780" version="1" comment="sssd-krb5-common is &lt;1.11.5.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178781" version="1" comment="sssd-ldap is &lt;1.11.5.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178782" version="1" comment="sssd-proxy is &lt;1.11.5.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178783" version="1" comment="sssd-tools is &lt;1.11.5.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178784" version="1" comment="libjavascriptcoregtk-1_0-0 is &lt;2.2.7-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178785" version="1" comment="libjavascriptcoregtk-1_0-0-32bit is &lt;2.2.7-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178786" version="1" comment="libjavascriptcoregtk-3_0-0 is &lt;2.2.7-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178787" version="1" comment="libwebkit2gtk-3_0-25 is &lt;2.2.7-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178788" version="1" comment="libwebkitgtk-1_0-0 is &lt;2.2.7-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178789" version="1" comment="libwebkitgtk-1_0-0-32bit is &lt;2.2.7-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178790" version="1" comment="libwebkitgtk-3_0-0 is &lt;2.2.7-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178791" version="1" comment="libwebkitgtk2-lang is &lt;2.2.7-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178792" version="1" comment="libwebkitgtk3-lang is &lt;2.2.7-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178793" version="1" comment="typelib-1_0-JavaScriptCore-3_0 is &lt;2.2.7-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178794" version="1" comment="typelib-1_0-WebKit-3_0 is &lt;2.2.7-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178795" version="1" comment="libjbig2 is &lt;2.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178796" version="1" comment="libjbig2-32bit is &lt;2.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178797" version="1" comment="libjson-c2 is &lt;0.11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178798" version="1" comment="libjson-c2-32bit is &lt;0.11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178799" version="1" comment="libltdl7 is &lt;2.4.2-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178800" version="1" comment="libltdl7-32bit is &lt;2.4.2-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178801" version="1" comment="liblua5_2 is &lt;5.2.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178802" version="1" comment="lua is &lt;5.2.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178803" version="1" comment="liblzo2-2 is &lt;2.08-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178804" version="1" comment="liblzo2-2-32bit is &lt;2.08-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178805" version="1" comment="libmikmod3 is &lt;3.2.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178806" version="1" comment="libmikmod3-32bit is &lt;3.2.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178807" version="1" comment="libmms0 is &lt;0.6.2-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178808" version="1" comment="libmodplug1 is &lt;0.8.8.4-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178809" version="1" comment="libmspack0 is &lt;0.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178810" version="1" comment="libmusicbrainz4 is &lt;2.1.5-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178811" version="1" comment="libmysqlclient18 is &lt;10.0.11-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178812" version="1" comment="libmysqlclient18-32bit is &lt;10.0.11-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178813" version="1" comment="libmysqlclient_r18 is &lt;10.0.11-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178814" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.11-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178815" version="1" comment="mariadb is &lt;10.0.11-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178816" version="1" comment="mariadb-client is &lt;10.0.11-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178817" version="1" comment="mariadb-errormessages is &lt;10.0.11-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178818" version="1" comment="libneon27 is &lt;0.30.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178819" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178820" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178821" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178822" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178823" version="1" comment="openssl is &lt;1.0.1i-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178824" version="1" comment="libpango-1_0-0 is &lt;1.36.3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178825" version="1" comment="libpango-1_0-0-32bit is &lt;1.36.3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178826" version="1" comment="pango-modules is &lt;1.36.3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178827" version="1" comment="pango-modules-32bit is &lt;1.36.3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178828" version="1" comment="typelib-1_0-Pango-1_0 is &lt;1.36.3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178829" version="1" comment="libpcsclite1 is &lt;1.8.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178830" version="1" comment="libpcsclite1-32bit is &lt;1.8.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178831" version="1" comment="pcsc-lite is &lt;1.8.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178832" version="1" comment="libpng12-0 is &lt;1.2.50-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178833" version="1" comment="libpng12-0-32bit is &lt;1.2.50-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178834" version="1" comment="libpng16-16 is &lt;1.6.8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178835" version="1" comment="libpng16-16-32bit is &lt;1.6.8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178836" version="1" comment="libpolkit0 is &lt;0.112-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178837" version="1" comment="libpolkit0-32bit is &lt;0.112-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178838" version="1" comment="polkit is &lt;0.112-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178839" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.112-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178840" version="1" comment="libpoppler-glib8 is &lt;0.24.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178841" version="1" comment="libpoppler-qt4-4 is &lt;0.24.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178842" version="1" comment="libpoppler44 is &lt;0.24.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178843" version="1" comment="poppler-tools is &lt;0.24.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178844" version="1" comment="libproxy1 is &lt;0.4.11-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178845" version="1" comment="libproxy1-32bit is &lt;0.4.11-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178846" version="1" comment="libproxy1-config-gnome3 is &lt;0.4.11-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178847" version="1" comment="libproxy1-config-gnome3-32bit is &lt;0.4.11-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178848" version="1" comment="libproxy1-networkmanager is &lt;0.4.11-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178849" version="1" comment="libproxy1-networkmanager-32bit is &lt;0.4.11-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178850" version="1" comment="libpulse-mainloop-glib0 is &lt;5.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178851" version="1" comment="libpulse-mainloop-glib0-32bit is &lt;5.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178852" version="1" comment="libpulse0 is &lt;5.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178853" version="1" comment="libpulse0-32bit is &lt;5.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178854" version="1" comment="pulseaudio is &lt;5.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178855" version="1" comment="pulseaudio-esound-compat is &lt;5.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178856" version="1" comment="pulseaudio-gdm-hooks is &lt;5.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178857" version="1" comment="pulseaudio-lang is &lt;5.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178858" version="1" comment="pulseaudio-module-bluetooth is &lt;5.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178859" version="1" comment="pulseaudio-module-gconf is &lt;5.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178860" version="1" comment="pulseaudio-module-jack is &lt;5.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178861" version="1" comment="pulseaudio-module-lirc is &lt;5.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178862" version="1" comment="pulseaudio-module-x11 is &lt;5.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178863" version="1" comment="pulseaudio-module-zeroconf is &lt;5.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178864" version="1" comment="pulseaudio-utils is &lt;5.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178865" version="1" comment="libpython2_7-1_0 is &lt;2.7.7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178866" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178867" version="1" comment="python-base is &lt;2.7.7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178868" version="1" comment="python-devel is &lt;2.7.7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178869" version="1" comment="python-xml is &lt;2.7.7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178870" version="1" comment="libpython3_4m1_0 is &lt;3.4.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178871" version="1" comment="python3-base is &lt;3.4.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178872" version="1" comment="libqt4 is &lt;4.8.6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178873" version="1" comment="libqt4-32bit is &lt;4.8.6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178874" version="1" comment="libqt4-qt3support is &lt;4.8.6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178875" version="1" comment="libqt4-qt3support-32bit is &lt;4.8.6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178876" version="1" comment="libqt4-sql is &lt;4.8.6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178877" version="1" comment="libqt4-sql-32bit is &lt;4.8.6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178878" version="1" comment="libqt4-sql-mysql is &lt;4.8.6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178879" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.8.6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178880" version="1" comment="libqt4-sql-postgresql is &lt;4.8.6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178881" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.8.6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178882" version="1" comment="libqt4-sql-sqlite is &lt;4.8.6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178883" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.8.6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178884" version="1" comment="libqt4-sql-unixODBC is &lt;4.8.6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178885" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.8.6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178886" version="1" comment="libqt4-x11 is &lt;4.8.6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178887" version="1" comment="libqt4-x11-32bit is &lt;4.8.6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178888" version="1" comment="libraptor2-0 is &lt;2.0.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178889" version="1" comment="raptor is &lt;2.0.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178890" version="1" comment="libraw9 is &lt;0.15.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178891" version="1" comment="libreoffice is &lt;4.3.1.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178892" version="1" comment="libreoffice-base is &lt;4.3.1.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178893" version="1" comment="libreoffice-base-drivers-mysql is &lt;4.3.1.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178894" version="1" comment="libreoffice-base-drivers-postgresql is &lt;4.3.1.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178895" version="1" comment="libreoffice-calc is &lt;4.3.1.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178896" version="1" comment="libreoffice-calc-extensions is &lt;4.3.1.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178897" version="1" comment="libreoffice-draw is &lt;4.3.1.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178898" version="1" comment="libreoffice-filters-optional is &lt;4.3.1.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178899" version="1" comment="libreoffice-gnome is &lt;4.3.1.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178900" version="1" comment="libreoffice-icon-theme-tango is &lt;4.3.1.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178901" version="1" comment="libreoffice-impress is &lt;4.3.1.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178902" version="1" comment="libreoffice-l10n-af is &lt;4.3.1.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178903" version="1" comment="libreoffice-l10n-ar is &lt;4.3.1.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178904" version="1" comment="libreoffice-l10n-ca is &lt;4.3.1.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178905" version="1" comment="libreoffice-l10n-cs is &lt;4.3.1.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178906" version="1" comment="libreoffice-l10n-da is &lt;4.3.1.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178907" version="1" comment="libreoffice-l10n-de is &lt;4.3.1.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178908" version="1" comment="libreoffice-l10n-en is &lt;4.3.1.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178909" version="1" comment="libreoffice-l10n-es is &lt;4.3.1.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178910" version="1" comment="libreoffice-l10n-fi is &lt;4.3.1.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178911" version="1" comment="libreoffice-l10n-fr is &lt;4.3.1.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178912" version="1" comment="libreoffice-l10n-gu is &lt;4.3.1.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178913" version="1" comment="libreoffice-l10n-hi is &lt;4.3.1.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178914" version="1" comment="libreoffice-l10n-hu is &lt;4.3.1.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178915" version="1" comment="libreoffice-l10n-it is &lt;4.3.1.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178916" version="1" comment="libreoffice-l10n-ja is &lt;4.3.1.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178917" version="1" comment="libreoffice-l10n-ko is &lt;4.3.1.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178918" version="1" comment="libreoffice-l10n-nb is &lt;4.3.1.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178919" version="1" comment="libreoffice-l10n-nl is &lt;4.3.1.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178920" version="1" comment="libreoffice-l10n-nn is &lt;4.3.1.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178921" version="1" comment="libreoffice-l10n-pl is &lt;4.3.1.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178922" version="1" comment="libreoffice-l10n-pt-BR is &lt;4.3.1.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178923" version="1" comment="libreoffice-l10n-pt-PT is &lt;4.3.1.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178924" version="1" comment="libreoffice-l10n-ru is &lt;4.3.1.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178925" version="1" comment="libreoffice-l10n-sk is &lt;4.3.1.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178926" version="1" comment="libreoffice-l10n-sv is &lt;4.3.1.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178927" version="1" comment="libreoffice-l10n-xh is &lt;4.3.1.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178928" version="1" comment="libreoffice-l10n-zh-Hans is &lt;4.3.1.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178929" version="1" comment="libreoffice-l10n-zh-Hant is &lt;4.3.1.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178930" version="1" comment="libreoffice-l10n-zu is &lt;4.3.1.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178931" version="1" comment="libreoffice-mailmerge is &lt;4.3.1.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178932" version="1" comment="libreoffice-math is &lt;4.3.1.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178933" version="1" comment="libreoffice-officebean is &lt;4.3.1.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178934" version="1" comment="libreoffice-pyuno is &lt;4.3.1.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178935" version="1" comment="libreoffice-writer is &lt;4.3.1.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178936" version="1" comment="libreoffice-writer-extensions is &lt;4.3.1.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178937" version="1" comment="librpcsecgss3 is &lt;0.19-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178938" version="1" comment="libsilc-1_1-2 is &lt;1.1.10-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178939" version="1" comment="libsilcclient-1_1-3 is &lt;1.1.10-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178940" version="1" comment="silc-toolkit is &lt;1.1.10-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178941" version="1" comment="libsmi is &lt;0.4.8-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178942" version="1" comment="libsmi2 is &lt;0.4.8-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178943" version="1" comment="libsndfile1 is &lt;1.0.25-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178944" version="1" comment="libsndfile1-32bit is &lt;1.0.25-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178945" version="1" comment="libsnmp30 is &lt;5.7.2.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178946" version="1" comment="libsnmp30-32bit is &lt;5.7.2.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178947" version="1" comment="net-snmp is &lt;5.7.2.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178948" version="1" comment="perl-SNMP is &lt;5.7.2.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178949" version="1" comment="snmp-mibs is &lt;5.7.2.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178950" version="1" comment="libsoup-2_4-1 is &lt;2.44.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178951" version="1" comment="libsoup-2_4-1-32bit is &lt;2.44.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178952" version="1" comment="libsoup-lang is &lt;2.44.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178953" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.44.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178954" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.25-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178955" version="1" comment="libspice-client-gtk-2_0-4 is &lt;0.25-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178956" version="1" comment="libspice-client-gtk-3_0-4 is &lt;0.25-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178957" version="1" comment="libspice-controller0 is &lt;0.25-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178958" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.25-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178959" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.25-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178960" version="1" comment="libssh4 is &lt;0.6.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178961" version="1" comment="libtag1 is &lt;1.9.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178962" version="1" comment="libtag1-32bit is &lt;1.9.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178963" version="1" comment="libtag_c0 is &lt;1.9.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178964" version="1" comment="libtag_c0-32bit is &lt;1.9.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178965" version="1" comment="taglib is &lt;1.9.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178966" version="1" comment="libtasn1 is &lt;3.7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178967" version="1" comment="libtasn1-6 is &lt;3.7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178968" version="1" comment="libtasn1-6-32bit is &lt;3.7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178969" version="1" comment="libtiff5 is &lt;4.0.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178970" version="1" comment="libtiff5-32bit is &lt;4.0.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178971" version="1" comment="libudisks2-0 is &lt;2.1.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178972" version="1" comment="udisks2 is &lt;2.1.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178973" version="1" comment="udisks2-lang is &lt;2.1.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178974" version="1" comment="libvirt is &lt;1.2.5-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178975" version="1" comment="libvirt-client is &lt;1.2.5-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178976" version="1" comment="libvirt-client-32bit is &lt;1.2.5-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178977" version="1" comment="libvirt-daemon is &lt;1.2.5-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178978" version="1" comment="libvirt-daemon-config-network is &lt;1.2.5-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178979" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.2.5-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178980" version="1" comment="libvirt-daemon-driver-interface is &lt;1.2.5-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178981" version="1" comment="libvirt-daemon-driver-libxl is &lt;1.2.5-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178982" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.2.5-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178983" version="1" comment="libvirt-daemon-driver-network is &lt;1.2.5-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178984" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.2.5-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178985" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.2.5-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178986" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.2.5-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178987" version="1" comment="libvirt-daemon-driver-secret is &lt;1.2.5-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178988" version="1" comment="libvirt-daemon-driver-storage is &lt;1.2.5-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178989" version="1" comment="libvirt-daemon-lxc is &lt;1.2.5-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178990" version="1" comment="libvirt-daemon-qemu is &lt;1.2.5-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178991" version="1" comment="libvirt-daemon-xen is &lt;1.2.5-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178992" version="1" comment="libvirt-doc is &lt;1.2.5-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178993" version="1" comment="libvorbis0 is &lt;1.3.3-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178994" version="1" comment="libvorbis0-32bit is &lt;1.3.3-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178995" version="1" comment="libvorbisenc2 is &lt;1.3.3-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178996" version="1" comment="libvorbisenc2-32bit is &lt;1.3.3-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178997" version="1" comment="libvorbisfile3 is &lt;1.3.3-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178998" version="1" comment="libvorbisfile3-32bit is &lt;1.3.3-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178999" version="1" comment="libvte9 is &lt;0.28.2-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179000" version="1" comment="libxcb-dri2-0 is &lt;1.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179001" version="1" comment="libxcb-dri2-0-32bit is &lt;1.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179002" version="1" comment="libxcb-glx0 is &lt;1.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179003" version="1" comment="libxcb-glx0-32bit is &lt;1.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179004" version="1" comment="libxcb-randr0 is &lt;1.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179005" version="1" comment="libxcb-render0 is &lt;1.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179006" version="1" comment="libxcb-render0-32bit is &lt;1.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179007" version="1" comment="libxcb-shape0 is &lt;1.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179008" version="1" comment="libxcb-shm0 is &lt;1.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179009" version="1" comment="libxcb-shm0-32bit is &lt;1.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179010" version="1" comment="libxcb-sync1 is &lt;1.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179011" version="1" comment="libxcb-xf86dri0 is &lt;1.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179012" version="1" comment="libxcb-xfixes0 is &lt;1.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179013" version="1" comment="libxcb-xfixes0-32bit is &lt;1.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179014" version="1" comment="libxcb-xkb1 is &lt;1.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179015" version="1" comment="libxcb-xkb1-32bit is &lt;1.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179016" version="1" comment="libxcb-xv0 is &lt;1.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179017" version="1" comment="libxcb1 is &lt;1.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179018" version="1" comment="libxcb1-32bit is &lt;1.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179019" version="1" comment="libxerces-c-3_1 is &lt;3.1.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179020" version="1" comment="libxerces-c-3_1-32bit is &lt;3.1.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179021" version="1" comment="libxml2-2 is &lt;2.9.1-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179022" version="1" comment="libxml2-2-32bit is &lt;2.9.1-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179023" version="1" comment="libxml2-tools is &lt;2.9.1-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179024" version="1" comment="libyaml-0-2 is &lt;0.1.6-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179025" version="1" comment="libzip2 is &lt;0.11.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179026" version="1" comment="libzmq3 is &lt;4.0.4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179027" version="1" comment="logrotate is &lt;3.8.7-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179028" version="1" comment="m4 is &lt;1.4.16-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179029" version="1" comment="mipv6d is &lt;2.0.2.umip.0.4-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179030" version="1" comment="mozilla-nspr is &lt;4.10.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179031" version="1" comment="mozilla-nspr-32bit is &lt;4.10.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179032" version="1" comment="mutt is &lt;1.5.21-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179033" version="1" comment="ntp is &lt;4.2.6p5-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179034" version="1" comment="ntp-doc is &lt;4.2.6p5-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179035" version="1" comment="opensc is &lt;0.13.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179036" version="1" comment="openslp is &lt;2.0.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179037" version="1" comment="openslp-32bit is &lt;2.0.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179038" version="1" comment="openssh is &lt;6.6p1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179039" version="1" comment="openssh-helpers is &lt;6.6p1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179040" version="1" comment="pam is &lt;1.1.8-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179041" version="1" comment="pam-32bit is &lt;1.1.8-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179042" version="1" comment="pam-doc is &lt;1.1.8-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179043" version="1" comment="pam-modules is &lt;12.1-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179044" version="1" comment="pam-modules-32bit is &lt;12.1-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179045" version="1" comment="pam_krb5 is &lt;2.4.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179046" version="1" comment="pam_krb5-32bit is &lt;2.4.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179047" version="1" comment="pam_ssh is &lt;2.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179048" version="1" comment="pam_ssh-32bit is &lt;2.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179049" version="1" comment="patch is &lt;2.7.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179050" version="1" comment="pcsc-ccid is &lt;1.4.14-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179051" version="1" comment="perl is &lt;5.18.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179052" version="1" comment="perl-32bit is &lt;5.18.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179053" version="1" comment="perl-base is &lt;5.18.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179054" version="1" comment="perl-doc is &lt;5.18.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179055" version="1" comment="perl-Config-IniFiles is &lt;2.82-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179056" version="1" comment="perl-HTML-Parser is &lt;3.71-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179057" version="1" comment="perl-LWP-Protocol-https is &lt;6.04-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179058" version="1" comment="perl-Tk is &lt;804.031-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179059" version="1" comment="perl-YAML-LibYAML is &lt;0.38-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179060" version="1" comment="pidgin-otr is &lt;4.0.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179061" version="1" comment="ppp is &lt;2.4.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179062" version="1" comment="procmail is &lt;3.22-267" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179063" version="1" comment="puppet is &lt;3.6.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179064" version="1" comment="python is &lt;2.7.7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179065" version="1" comment="python-curses is &lt;2.7.7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179066" version="1" comment="python-tk is &lt;2.7.7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179067" version="1" comment="python3 is &lt;3.4.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179068" version="1" comment="python-cupshelpers is &lt;1.4.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179069" version="1" comment="system-config-printer is &lt;1.4.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179070" version="1" comment="system-config-printer-common is &lt;1.4.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179071" version="1" comment="system-config-printer-common-lang is &lt;1.4.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179072" version="1" comment="system-config-printer-dbus-service is &lt;1.4.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179073" version="1" comment="udev-configure-printer is &lt;1.4.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179074" version="1" comment="python-imaging is &lt;1.1.7-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179075" version="1" comment="python-libxml2 is &lt;2.9.1-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179076" version="1" comment="python-pyOpenSSL is &lt;0.14-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179077" version="1" comment="python-pywbem is &lt;0.7.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179078" version="1" comment="qemu is &lt;2.0.0-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179079" version="1" comment="qemu-block-curl is &lt;2.0.0-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179080" version="1" comment="qemu-ipxe is &lt;1.0.0-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179081" version="1" comment="qemu-kvm is &lt;2.0.0-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179082" version="1" comment="qemu-seabios is &lt;1.7.4-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179083" version="1" comment="qemu-sgabios is &lt;8-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179084" version="1" comment="qemu-tools is &lt;2.0.0-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179085" version="1" comment="qemu-vgabios is &lt;1.7.4-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179086" version="1" comment="qemu-x86 is &lt;2.0.0-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179087" version="1" comment="radvd is &lt;1.9.7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179088" version="1" comment="rhythmbox is &lt;3.0.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179089" version="1" comment="rhythmbox-lang is &lt;3.0.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179090" version="1" comment="rsync is &lt;3.1.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179091" version="1" comment="rsyslog is &lt;8.4.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179092" version="1" comment="rtkit is &lt;0.11_git201205151338-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179093" version="1" comment="ruby is &lt;2.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179094" version="1" comment="shim is &lt;0.7-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179095" version="1" comment="socat is &lt;1.7.2.4-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179097" version="1" comment="strongswan is &lt;5.1.3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179098" version="1" comment="strongswan-doc is &lt;5.1.3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179099" version="1" comment="strongswan-ipsec is &lt;5.1.3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179100" version="1" comment="strongswan-libs0 is &lt;5.1.3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179101" version="1" comment="sudo is &lt;1.8.10p3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179102" version="1" comment="sysconfig is &lt;0.83.7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179103" version="1" comment="sysconfig-netconfig is &lt;0.83.7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179104" version="1" comment="syslog-service is &lt;2.0-778" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179105" version="1" comment="sysvinit-tools is &lt;2.88+-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179106" version="1" comment="whois is &lt;5.1.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179107" version="1" comment="telepathy-gabble is &lt;0.18.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179108" version="1" comment="telepathy-idle is &lt;0.2.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179109" version="1" comment="tftp is &lt;5.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179110" version="1" comment="tigervnc is &lt;1.3.0-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179111" version="1" comment="xorg-x11-Xvnc is &lt;1.3.0-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179112" version="1" comment="unixODBC is &lt;2.3.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179113" version="1" comment="unixODBC-32bit is &lt;2.3.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179114" version="1" comment="vino is &lt;3.10.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179115" version="1" comment="vino-lang is &lt;3.10.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179116" version="1" comment="vorbis-tools is &lt;1.4.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179117" version="1" comment="vorbis-tools-lang is &lt;1.4.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179118" version="1" comment="w3m is &lt;0.5.3-153" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179119" version="1" comment="wdiff is &lt;1.2.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179120" version="1" comment="wget is &lt;1.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179121" version="1" comment="wireshark is &lt;1.10.9-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179122" version="1" comment="xalan-j2 is &lt;2.7.0-264" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179123" version="1" comment="xen is &lt;4.4.1_06-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179124" version="1" comment="xen-kmp-default is &lt;4.4.1_06_k3.12.28_4-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179125" version="1" comment="xen-libs is &lt;4.4.1_06-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179126" version="1" comment="xen-libs-32bit is &lt;4.4.1_06-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179127" version="1" comment="xf86-video-intel is &lt;2.99.914-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179128" version="1" comment="xinetd is &lt;2.3.15-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179129" version="1" comment="xlockmore is &lt;5.43-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179130" version="1" comment="xorg-x11 is &lt;7.6_1-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179131" version="1" comment="xorg-x11-essentials is &lt;7.6_1-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179132" version="1" comment="xrdb is &lt;1.1.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179133" version="1" comment="xorg-x11-libs is &lt;7.6-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179134" version="1" comment="xorg-x11-server is &lt;7.6_1.15.2-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179135" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.15.2-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179136" version="1" comment="yast2 is &lt;3.1.108-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179137" version="1" comment="yast2-core is &lt;3.1.11-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251809" version="1" comment="zoo is &lt;2.10-1020" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179139" version="1" comment="DirectFB is &lt;1.7.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179140" version="1" comment="lib++dfb-1_7-1 is &lt;1.7.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179141" version="1" comment="libdirectfb-1_7-1 is &lt;1.7.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179142" version="1" comment="libdirectfb-1_7-1-32bit is &lt;1.7.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118774" version="1" comment="sled-release is ==12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179143" version="1" comment="ImageMagick is &lt;6.8.8.1-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179144" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179145" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179146" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179147" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179148" version="1" comment="MozillaFirefox is &lt;38.4.0esr-51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179149" version="1" comment="MozillaFirefox-translations is &lt;38.4.0esr-51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179150" version="1" comment="aaa_base is &lt;13.2+git20140911.61c1681-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179151" version="1" comment="aaa_base-extras is &lt;13.2+git20140911.61c1681-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179152" version="1" comment="accountsservice is &lt;0.6.35-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179153" version="1" comment="accountsservice-lang is &lt;0.6.35-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179154" version="1" comment="libaccountsservice0 is &lt;0.6.35-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179155" version="1" comment="typelib-1_0-AccountsService-1_0 is &lt;0.6.35-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179156" version="1" comment="autofs is &lt;5.0.9-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179157" version="1" comment="bind-libs is &lt;9.9.6P1-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179158" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179159" version="1" comment="bind-utils is &lt;9.9.6P1-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179160" version="1" comment="binutils is &lt;2.25.0-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179161" version="1" comment="busybox is &lt;1.21.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179162" version="1" comment="cifs-utils is &lt;6.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179163" version="1" comment="clamav is &lt;0.98.7-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179164" version="1" comment="colord is &lt;1.1.7-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179165" version="1" comment="colord-lang is &lt;1.1.7-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179166" version="1" comment="libcolord2 is &lt;1.1.7-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179167" version="1" comment="libcolord2-32bit is &lt;1.1.7-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179168" version="1" comment="libcolorhug2 is &lt;1.1.7-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179169" version="1" comment="coreutils is &lt;8.22-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179170" version="1" comment="coreutils-lang is &lt;8.22-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179171" version="1" comment="cpio is &lt;2.11-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179172" version="1" comment="cpio-lang is &lt;2.11-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179173" version="1" comment="cpp48 is &lt;4.8.5-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179174" version="1" comment="gcc48 is &lt;4.8.5-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179175" version="1" comment="gcc48-32bit is &lt;4.8.5-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179176" version="1" comment="gcc48-c++ is &lt;4.8.5-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179177" version="1" comment="gcc48-gij is &lt;4.8.5-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179178" version="1" comment="gcc48-gij-32bit is &lt;4.8.5-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179179" version="1" comment="gcc48-info is &lt;4.8.5-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179180" version="1" comment="libasan0 is &lt;4.8.5-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179181" version="1" comment="libasan0-32bit is &lt;4.8.5-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179182" version="1" comment="libgcj48 is &lt;4.8.5-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179183" version="1" comment="libgcj48-32bit is &lt;4.8.5-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179184" version="1" comment="libgcj48-jar is &lt;4.8.5-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179185" version="1" comment="libgcj_bc1 is &lt;4.8.5-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179186" version="1" comment="libstdc++48-devel is &lt;4.8.5-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179187" version="1" comment="libstdc++48-devel-32bit is &lt;4.8.5-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179188" version="1" comment="cron is &lt;4.2-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179189" version="1" comment="cronie is &lt;1.4.11-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179190" version="1" comment="cups is &lt;1.7.5-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179191" version="1" comment="cups-client is &lt;1.7.5-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179192" version="1" comment="cups-libs is &lt;1.7.5-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179193" version="1" comment="cups-libs-32bit is &lt;1.7.5-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179194" version="1" comment="cups-filters is &lt;1.0.58-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179195" version="1" comment="cups-filters-cups-browsed is &lt;1.0.58-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179196" version="1" comment="cups-filters-foomatic-rip is &lt;1.0.58-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179197" version="1" comment="cups-filters-ghostscript is &lt;1.0.58-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179198" version="1" comment="curl is &lt;7.37.0-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179199" version="1" comment="libcurl4 is &lt;7.37.0-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179200" version="1" comment="libcurl4-32bit is &lt;7.37.0-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179201" version="1" comment="dbus-1 is &lt;1.8.16-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179202" version="1" comment="dbus-1-x11 is &lt;1.8.16-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179203" version="1" comment="libdbus-1-3 is &lt;1.8.16-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179204" version="1" comment="libdbus-1-3-32bit is &lt;1.8.16-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179205" version="1" comment="dhcp is &lt;4.3.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179206" version="1" comment="dhcp-client is &lt;4.3.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179207" version="1" comment="dnsmasq is &lt;2.71-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179208" version="1" comment="dracut is &lt;037-66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179209" version="1" comment="e2fsprogs is &lt;1.42.11-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179210" version="1" comment="libcom_err2 is &lt;1.42.11-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179211" version="1" comment="libcom_err2-32bit is &lt;1.42.11-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179212" version="1" comment="libext2fs2 is &lt;1.42.11-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179213" version="1" comment="elfutils is &lt;0.158-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179214" version="1" comment="libasm1 is &lt;0.158-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179215" version="1" comment="libdw1 is &lt;0.158-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179216" version="1" comment="libdw1-32bit is &lt;0.158-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179217" version="1" comment="libebl1 is &lt;0.158-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179218" version="1" comment="libebl1-32bit is &lt;0.158-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179219" version="1" comment="libelf1 is &lt;0.158-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179220" version="1" comment="libelf1-32bit is &lt;0.158-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179221" version="1" comment="facter is &lt;2.0.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179222" version="1" comment="file is &lt;5.19-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179223" version="1" comment="file-magic is &lt;5.19-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179224" version="1" comment="libmagic1 is &lt;5.19-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179225" version="1" comment="libmagic1-32bit is &lt;5.19-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179226" version="1" comment="finch is &lt;2.10.9-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179227" version="1" comment="libpurple is &lt;2.10.9-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179228" version="1" comment="libpurple-lang is &lt;2.10.9-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179229" version="1" comment="libpurple-meanwhile is &lt;2.10.9-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179230" version="1" comment="libpurple-tcl is &lt;2.10.9-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179231" version="1" comment="pidgin is &lt;2.10.9-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179232" version="1" comment="flash-player is &lt;11.2.202.548-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179233" version="1" comment="flash-player-gnome is &lt;11.2.202.548-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179234" version="1" comment="ft2demos is &lt;2.5.5-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179235" version="1" comment="fuse is &lt;2.9.3-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179236" version="1" comment="libfuse2 is &lt;2.9.3-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179237" version="1" comment="gd is &lt;2.1.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179238" version="1" comment="gd-32bit is &lt;2.1.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179239" version="1" comment="gdm is &lt;3.10.0.1-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179240" version="1" comment="gdm-branding-upstream is &lt;3.10.0.1-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179241" version="1" comment="gdm-lang is &lt;3.10.0.1-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179242" version="1" comment="gdmflexiserver is &lt;3.10.0.1-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179243" version="1" comment="libgdm1 is &lt;3.10.0.1-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179244" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.10.0.1-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179245" version="1" comment="glibc is &lt;2.19-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179246" version="1" comment="glibc-32bit is &lt;2.19-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179247" version="1" comment="glibc-devel is &lt;2.19-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179248" version="1" comment="glibc-devel-32bit is &lt;2.19-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179249" version="1" comment="glibc-i18ndata is &lt;2.19-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179250" version="1" comment="glibc-locale is &lt;2.19-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179251" version="1" comment="glibc-locale-32bit is &lt;2.19-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179252" version="1" comment="nscd is &lt;2.19-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179253" version="1" comment="gnome-keyring is &lt;3.10.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179254" version="1" comment="gnome-keyring-32bit is &lt;3.10.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179255" version="1" comment="gnome-keyring-lang is &lt;3.10.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179256" version="1" comment="gnome-keyring-pam is &lt;3.10.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179257" version="1" comment="gnome-keyring-pam-32bit is &lt;3.10.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179258" version="1" comment="libgck-modules-gnome-keyring is &lt;3.10.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179259" version="1" comment="gnome-settings-daemon is &lt;3.10.2-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179260" version="1" comment="gnome-settings-daemon-lang is &lt;3.10.2-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179261" version="1" comment="gnome-shell is &lt;3.10.4-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179262" version="1" comment="gnome-shell-browser-plugin is &lt;3.10.4-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179263" version="1" comment="gnome-shell-calendar is &lt;3.10.4-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179264" version="1" comment="gnome-shell-lang is &lt;3.10.4-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179265" version="1" comment="gnutls is &lt;3.2.15-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179266" version="1" comment="libgnutls28 is &lt;3.2.15-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179267" version="1" comment="libgnutls28-32bit is &lt;3.2.15-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179268" version="1" comment="gstreamer-0_10-plugins-bad is &lt;0.10.23-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179269" version="1" comment="gstreamer-0_10-plugins-bad-lang is &lt;0.10.23-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179270" version="1" comment="libgstbasecamerabinsrc-0_10-23 is &lt;0.10.23-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179271" version="1" comment="libgstbasecamerabinsrc-0_10-23-32bit is &lt;0.10.23-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179272" version="1" comment="libgstbasevideo-0_10-23 is &lt;0.10.23-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179273" version="1" comment="libgstbasevideo-0_10-23-32bit is &lt;0.10.23-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179274" version="1" comment="libgstcodecparsers-0_10-23 is &lt;0.10.23-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179275" version="1" comment="libgstphotography-0_10-23 is &lt;0.10.23-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179276" version="1" comment="libgstphotography-0_10-23-32bit is &lt;0.10.23-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179277" version="1" comment="libgstsignalprocessor-0_10-23 is &lt;0.10.23-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179278" version="1" comment="libgstsignalprocessor-0_10-23-32bit is &lt;0.10.23-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179279" version="1" comment="libgstvdp-0_10-23 is &lt;0.10.23-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179280" version="1" comment="libgstvdp-0_10-23-32bit is &lt;0.10.23-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179281" version="1" comment="hyper-v is &lt;6-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179282" version="1" comment="icu is &lt;52.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179283" version="1" comment="libicu52_1 is &lt;52.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179284" version="1" comment="libicu52_1-32bit is &lt;52.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179285" version="1" comment="libicu52_1-data is &lt;52.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179286" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.91-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179287" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.91-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179288" version="1" comment="java-1_7_0-openjdk-plugin is &lt;1.6.1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179289" version="1" comment="java-1_8_0-openjdk-plugin is &lt;1.6.1-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179290" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.65-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179291" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.65-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179292" version="1" comment="kbd is &lt;1.15.5-8.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179293" version="1" comment="kernel-default is &lt;3.12.49-11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179294" version="1" comment="kernel-default-devel is &lt;3.12.49-11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179295" version="1" comment="kernel-default-extra is &lt;3.12.49-11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179296" version="1" comment="kernel-devel is &lt;3.12.49-11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179297" version="1" comment="kernel-macros is &lt;3.12.49-11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179298" version="1" comment="kernel-source is &lt;3.12.49-11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179299" version="1" comment="kernel-syms is &lt;3.12.49-11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179300" version="1" comment="kernel-xen is &lt;3.12.49-11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179301" version="1" comment="kernel-xen-devel is &lt;3.12.49-11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179302" version="1" comment="krb5 is &lt;1.12.1-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179303" version="1" comment="krb5-32bit is &lt;1.12.1-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179304" version="1" comment="krb5-client is &lt;1.12.1-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179305" version="1" comment="libFLAC8 is &lt;1.3.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179306" version="1" comment="libFLAC8-32bit is &lt;1.3.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179307" version="1" comment="libQt5Core5 is &lt;5.3.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179308" version="1" comment="libQt5DBus5 is &lt;5.3.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179309" version="1" comment="libQt5Gui5 is &lt;5.3.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179310" version="1" comment="libQt5Widgets5 is &lt;5.3.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179311" version="1" comment="libXfont1 is &lt;1.4.7-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179312" version="1" comment="libXi6 is &lt;1.7.4-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179313" version="1" comment="libXi6-32bit is &lt;1.7.4-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179314" version="1" comment="libarchive13 is &lt;3.1.2-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179315" version="1" comment="libaugeas0 is &lt;1.2.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179316" version="1" comment="libblkid1 is &lt;2.25-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179317" version="1" comment="libblkid1-32bit is &lt;2.25-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179318" version="1" comment="libmount1 is &lt;2.25-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179319" version="1" comment="libmount1-32bit is &lt;2.25-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179320" version="1" comment="libsmartcols1 is &lt;2.25-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179321" version="1" comment="libuuid-devel is &lt;2.25-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179322" version="1" comment="libuuid1 is &lt;2.25-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179323" version="1" comment="libuuid1-32bit is &lt;2.25-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179324" version="1" comment="python-libmount is &lt;2.25-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179325" version="1" comment="util-linux is &lt;2.25-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179326" version="1" comment="util-linux-lang is &lt;2.25-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179327" version="1" comment="util-linux-systemd is &lt;2.25-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179328" version="1" comment="uuidd is &lt;2.25-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179329" version="1" comment="libcgroup1 is &lt;0.41.rc1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179330" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179331" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179332" version="1" comment="libdcerpc0 is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179333" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179334" version="1" comment="libgensec0 is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179335" version="1" comment="libgensec0-32bit is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179336" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179337" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179338" version="1" comment="libndr-nbt0 is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179339" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179340" version="1" comment="libndr-standard0 is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179341" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179342" version="1" comment="libndr0 is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179343" version="1" comment="libndr0-32bit is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179344" version="1" comment="libnetapi0 is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179345" version="1" comment="libnetapi0-32bit is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179346" version="1" comment="libregistry0 is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179347" version="1" comment="libsamba-credentials0 is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179348" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179349" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179350" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179351" version="1" comment="libsamba-passdb0 is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179352" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179353" version="1" comment="libsamba-util0 is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179354" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179355" version="1" comment="libsamdb0 is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179356" version="1" comment="libsamdb0-32bit is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179357" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179358" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179359" version="1" comment="libsmbclient0 is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179360" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179361" version="1" comment="libsmbconf0 is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179362" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179363" version="1" comment="libsmbldap0 is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179364" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179365" version="1" comment="libtevent-util0 is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179366" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179367" version="1" comment="libwbclient0 is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179368" version="1" comment="libwbclient0-32bit is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179369" version="1" comment="samba is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179370" version="1" comment="samba-32bit is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179371" version="1" comment="samba-client is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179372" version="1" comment="samba-client-32bit is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179373" version="1" comment="samba-doc is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179374" version="1" comment="samba-libs is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179375" version="1" comment="samba-libs-32bit is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179376" version="1" comment="samba-winbind is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179377" version="1" comment="samba-winbind-32bit is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179378" version="1" comment="libecpg6 is &lt;9.4.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179379" version="1" comment="libpq5 is &lt;9.4.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179380" version="1" comment="libpq5-32bit is &lt;9.4.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179381" version="1" comment="postgresql94 is &lt;9.4.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179382" version="1" comment="libfreebl3 is &lt;3.19.2.1-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179383" version="1" comment="libfreebl3-32bit is &lt;3.19.2.1-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179384" version="1" comment="libsoftokn3 is &lt;3.19.2.1-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179385" version="1" comment="libsoftokn3-32bit is &lt;3.19.2.1-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179386" version="1" comment="mozilla-nss is &lt;3.19.2.1-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179387" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.1-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179388" version="1" comment="mozilla-nss-certs is &lt;3.19.2.1-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179389" version="1" comment="mozilla-nss-certs-32bit is &lt;3.19.2.1-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179390" version="1" comment="mozilla-nss-sysinit is &lt;3.19.2.1-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179391" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.19.2.1-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179392" version="1" comment="mozilla-nss-tools is &lt;3.19.2.1-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179393" version="1" comment="libfreetype6 is &lt;2.5.5-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179394" version="1" comment="libfreetype6-32bit is &lt;2.5.5-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179395" version="1" comment="libgcrypt20 is &lt;1.6.1-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179396" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179397" version="1" comment="libgudev-1_0-0 is &lt;210-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179398" version="1" comment="libgudev-1_0-0-32bit is &lt;210-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179399" version="1" comment="libudev1 is &lt;210-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179400" version="1" comment="libudev1-32bit is &lt;210-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179401" version="1" comment="systemd is &lt;210-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179402" version="1" comment="systemd-32bit is &lt;210-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179403" version="1" comment="systemd-bash-completion is &lt;210-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179404" version="1" comment="systemd-sysvinit is &lt;210-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179405" version="1" comment="udev is &lt;210-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179406" version="1" comment="libipa_hbac0 is &lt;1.11.5.1-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179407" version="1" comment="libsss_idmap0 is &lt;1.11.5.1-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179408" version="1" comment="libsss_sudo is &lt;1.11.5.1-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179409" version="1" comment="python-sssd-config is &lt;1.11.5.1-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179410" version="1" comment="sssd is &lt;1.11.5.1-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179411" version="1" comment="sssd-32bit is &lt;1.11.5.1-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179412" version="1" comment="sssd-ad is &lt;1.11.5.1-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179413" version="1" comment="sssd-ipa is &lt;1.11.5.1-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179414" version="1" comment="sssd-krb5 is &lt;1.11.5.1-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179415" version="1" comment="sssd-krb5-common is &lt;1.11.5.1-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179416" version="1" comment="sssd-ldap is &lt;1.11.5.1-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179417" version="1" comment="sssd-proxy is &lt;1.11.5.1-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179418" version="1" comment="sssd-tools is &lt;1.11.5.1-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179419" version="1" comment="libjasper1 is &lt;1.900.1-170" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179420" version="1" comment="libjasper1-32bit is &lt;1.900.1-170" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179421" version="1" comment="libjavascriptcoregtk-1_0-0 is &lt;2.4.8-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179422" version="1" comment="libjavascriptcoregtk-1_0-0-32bit is &lt;2.4.8-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179423" version="1" comment="libjavascriptcoregtk-3_0-0 is &lt;2.4.8-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179424" version="1" comment="libwebkit2gtk-3_0-25 is &lt;2.4.8-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179425" version="1" comment="libwebkitgtk-1_0-0 is &lt;2.4.8-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179426" version="1" comment="libwebkitgtk-1_0-0-32bit is &lt;2.4.8-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179427" version="1" comment="libwebkitgtk-3_0-0 is &lt;2.4.8-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179428" version="1" comment="libwebkitgtk2-lang is &lt;2.4.8-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179429" version="1" comment="libwebkitgtk3-lang is &lt;2.4.8-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179430" version="1" comment="typelib-1_0-JavaScriptCore-3_0 is &lt;2.4.8-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179431" version="1" comment="typelib-1_0-WebKit-3_0 is &lt;2.4.8-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179432" version="1" comment="libjpeg-turbo is &lt;1.3.1-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179433" version="1" comment="libjpeg62 is &lt;62.1.0-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179434" version="1" comment="libjpeg62-32bit is &lt;62.1.0-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179435" version="1" comment="libjpeg62-turbo is &lt;1.3.1-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179436" version="1" comment="libjpeg8 is &lt;8.0.2-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179437" version="1" comment="libjpeg8-32bit is &lt;8.0.2-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179438" version="1" comment="libturbojpeg0 is &lt;8.0.2-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179439" version="1" comment="libksba8 is &lt;1.3.0-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179440" version="1" comment="libmpfr4 is &lt;3.1.2-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179441" version="1" comment="libmspack0 is &lt;0.4-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179442" version="1" comment="libmysqlclient18 is &lt;10.0.21-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179443" version="1" comment="libmysqlclient18-32bit is &lt;10.0.21-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179444" version="1" comment="libmysqlclient_r18 is &lt;10.0.21-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179445" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.21-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179446" version="1" comment="mariadb is &lt;10.0.21-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179447" version="1" comment="mariadb-client is &lt;10.0.21-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179448" version="1" comment="mariadb-errormessages is &lt;10.0.21-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179449" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179450" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179451" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179452" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179453" version="1" comment="openssl is &lt;1.0.1i-34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179454" version="1" comment="libpng15-15 is &lt;1.5.22-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179455" version="1" comment="libpng16-16 is &lt;1.6.8-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179456" version="1" comment="libpng16-16-32bit is &lt;1.6.8-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179457" version="1" comment="libpolkit0 is &lt;0.113-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179458" version="1" comment="libpolkit0-32bit is &lt;0.113-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179459" version="1" comment="polkit is &lt;0.113-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179460" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179461" version="1" comment="libpython2_7-1_0 is &lt;2.7.9-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179462" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.9-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179463" version="1" comment="python-base is &lt;2.7.9-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179464" version="1" comment="python-devel is &lt;2.7.9-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179465" version="1" comment="python-xml is &lt;2.7.9-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179466" version="1" comment="libpython3_4m1_0 is &lt;3.4.1-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179467" version="1" comment="python3-base is &lt;3.4.1-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179468" version="1" comment="libqt4 is &lt;4.8.6-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179469" version="1" comment="libqt4-32bit is &lt;4.8.6-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179470" version="1" comment="libqt4-qt3support is &lt;4.8.6-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179471" version="1" comment="libqt4-qt3support-32bit is &lt;4.8.6-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179472" version="1" comment="libqt4-sql is &lt;4.8.6-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179473" version="1" comment="libqt4-sql-32bit is &lt;4.8.6-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179474" version="1" comment="libqt4-sql-mysql is &lt;4.8.6-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179475" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.8.6-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179476" version="1" comment="libqt4-sql-postgresql is &lt;4.8.6-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179477" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.8.6-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179478" version="1" comment="libqt4-sql-sqlite is &lt;4.8.6-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179479" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.8.6-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179480" version="1" comment="libqt4-sql-unixODBC is &lt;4.8.6-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179481" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.8.6-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179482" version="1" comment="libqt4-x11 is &lt;4.8.6-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179483" version="1" comment="libqt4-x11-32bit is &lt;4.8.6-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179484" version="1" comment="libreoffice is &lt;5.0.2.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179485" version="1" comment="libreoffice-base is &lt;5.0.2.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179486" version="1" comment="libreoffice-base-drivers-mysql is &lt;5.0.2.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179487" version="1" comment="libreoffice-base-drivers-postgresql is &lt;5.0.2.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179488" version="1" comment="libreoffice-calc is &lt;5.0.2.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179489" version="1" comment="libreoffice-calc-extensions is &lt;5.0.2.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179490" version="1" comment="libreoffice-draw is &lt;5.0.2.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179491" version="1" comment="libreoffice-filters-optional is &lt;5.0.2.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179492" version="1" comment="libreoffice-gnome is &lt;5.0.2.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179493" version="1" comment="libreoffice-icon-theme-tango is &lt;5.0.2.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179494" version="1" comment="libreoffice-impress is &lt;5.0.2.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179495" version="1" comment="libreoffice-l10n-af is &lt;5.0.2.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179496" version="1" comment="libreoffice-l10n-ar is &lt;5.0.2.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179497" version="1" comment="libreoffice-l10n-ca is &lt;5.0.2.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179498" version="1" comment="libreoffice-l10n-cs is &lt;5.0.2.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179499" version="1" comment="libreoffice-l10n-da is &lt;5.0.2.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179500" version="1" comment="libreoffice-l10n-de is &lt;5.0.2.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179501" version="1" comment="libreoffice-l10n-en is &lt;5.0.2.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179502" version="1" comment="libreoffice-l10n-es is &lt;5.0.2.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179503" version="1" comment="libreoffice-l10n-fi is &lt;5.0.2.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179504" version="1" comment="libreoffice-l10n-fr is &lt;5.0.2.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179505" version="1" comment="libreoffice-l10n-gu is &lt;5.0.2.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179506" version="1" comment="libreoffice-l10n-hi is &lt;5.0.2.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179507" version="1" comment="libreoffice-l10n-hu is &lt;5.0.2.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179508" version="1" comment="libreoffice-l10n-it is &lt;5.0.2.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179509" version="1" comment="libreoffice-l10n-ja is &lt;5.0.2.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179510" version="1" comment="libreoffice-l10n-ko is &lt;5.0.2.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179511" version="1" comment="libreoffice-l10n-nb is &lt;5.0.2.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179512" version="1" comment="libreoffice-l10n-nl is &lt;5.0.2.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179513" version="1" comment="libreoffice-l10n-nn is &lt;5.0.2.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179514" version="1" comment="libreoffice-l10n-pl is &lt;5.0.2.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179515" version="1" comment="libreoffice-l10n-pt-BR is &lt;5.0.2.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179516" version="1" comment="libreoffice-l10n-pt-PT is &lt;5.0.2.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179517" version="1" comment="libreoffice-l10n-ru is &lt;5.0.2.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179518" version="1" comment="libreoffice-l10n-sk is &lt;5.0.2.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179519" version="1" comment="libreoffice-l10n-sv is &lt;5.0.2.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179520" version="1" comment="libreoffice-l10n-xh is &lt;5.0.2.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179521" version="1" comment="libreoffice-l10n-zh-Hans is &lt;5.0.2.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179522" version="1" comment="libreoffice-l10n-zh-Hant is &lt;5.0.2.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179523" version="1" comment="libreoffice-l10n-zu is &lt;5.0.2.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179524" version="1" comment="libreoffice-mailmerge is &lt;5.0.2.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179525" version="1" comment="libreoffice-math is &lt;5.0.2.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179526" version="1" comment="libreoffice-officebean is &lt;5.0.2.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179527" version="1" comment="libreoffice-pyuno is &lt;5.0.2.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179528" version="1" comment="libreoffice-writer is &lt;5.0.2.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179529" version="1" comment="libreoffice-writer-extensions is &lt;5.0.2.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179530" version="1" comment="libruby2_1-2_1 is &lt;2.1.2-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179531" version="1" comment="ruby2.1 is &lt;2.1.2-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179532" version="1" comment="ruby2.1-stdlib is &lt;2.1.2-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179533" version="1" comment="libsndfile1 is &lt;1.0.25-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179534" version="1" comment="libsndfile1-32bit is &lt;1.0.25-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179535" version="1" comment="libsnmp30 is &lt;5.7.3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179536" version="1" comment="libsnmp30-32bit is &lt;5.7.3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179537" version="1" comment="net-snmp is &lt;5.7.3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179538" version="1" comment="perl-SNMP is &lt;5.7.3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179539" version="1" comment="snmp-mibs is &lt;5.7.3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179540" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.29-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179541" version="1" comment="libspice-client-gtk-2_0-4 is &lt;0.29-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179542" version="1" comment="libspice-client-gtk-3_0-4 is &lt;0.29-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179543" version="1" comment="libspice-controller0 is &lt;0.29-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179544" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.29-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179545" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.29-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179546" version="1" comment="libspice-server1 is &lt;0.12.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179547" version="1" comment="libssh2-1 is &lt;1.4.3-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179548" version="1" comment="libssh2-1-32bit is &lt;1.4.3-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179549" version="1" comment="libssh4 is &lt;0.6.3-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179550" version="1" comment="libtasn1 is &lt;3.7-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179551" version="1" comment="libtasn1-6 is &lt;3.7-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179552" version="1" comment="libtasn1-6-32bit is &lt;3.7-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179553" version="1" comment="libtiff5 is &lt;4.0.4-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179554" version="1" comment="libtiff5-32bit is &lt;4.0.4-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179555" version="1" comment="libvdpau1 is &lt;0.8-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179556" version="1" comment="libvdpau1-32bit is &lt;0.8-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179557" version="1" comment="libvirt is &lt;1.2.18.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179558" version="1" comment="libvirt-client is &lt;1.2.18.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179559" version="1" comment="libvirt-client-32bit is &lt;1.2.18.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179560" version="1" comment="libvirt-daemon is &lt;1.2.18.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179561" version="1" comment="libvirt-daemon-config-network is &lt;1.2.18.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179562" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.2.18.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179563" version="1" comment="libvirt-daemon-driver-interface is &lt;1.2.18.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179564" version="1" comment="libvirt-daemon-driver-libxl is &lt;1.2.18.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179565" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.2.18.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179566" version="1" comment="libvirt-daemon-driver-network is &lt;1.2.18.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179567" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.2.18.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179568" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.2.18.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179569" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.2.18.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179570" version="1" comment="libvirt-daemon-driver-secret is &lt;1.2.18.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179571" version="1" comment="libvirt-daemon-driver-storage is &lt;1.2.18.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179572" version="1" comment="libvirt-daemon-lxc is &lt;1.2.18.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179573" version="1" comment="libvirt-daemon-qemu is &lt;1.2.18.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179574" version="1" comment="libvirt-daemon-xen is &lt;1.2.18.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179575" version="1" comment="libvirt-doc is &lt;1.2.18.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179576" version="1" comment="libwmf-0_2-7 is &lt;0.2.8.4-242" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179577" version="1" comment="libxerces-c-3_1 is &lt;3.1.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179578" version="1" comment="libxerces-c-3_1-32bit is &lt;3.1.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179579" version="1" comment="libxml2-2 is &lt;2.9.1-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179580" version="1" comment="libxml2-2-32bit is &lt;2.9.1-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179581" version="1" comment="libxml2-tools is &lt;2.9.1-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179582" version="1" comment="libyaml-0-2 is &lt;0.1.6-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179583" version="1" comment="libzip2 is &lt;0.11.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179584" version="1" comment="libzmq3 is &lt;4.0.4-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179585" version="1" comment="mailx is &lt;12.5-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179586" version="1" comment="mozilla-nspr is &lt;4.10.10-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179587" version="1" comment="mozilla-nspr-32bit is &lt;4.10.10-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179588" version="1" comment="mutt is &lt;1.5.21-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179589" version="1" comment="ntp is &lt;4.2.8p4-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179590" version="1" comment="ntp-doc is &lt;4.2.8p4-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179591" version="1" comment="openslp is &lt;2.0.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179592" version="1" comment="openslp-32bit is &lt;2.0.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179593" version="1" comment="openssh is &lt;6.6p1-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179594" version="1" comment="openssh-helpers is &lt;6.6p1-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179595" version="1" comment="openvpn is &lt;2.3.8-16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179596" version="1" comment="p7zip is &lt;9.20.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179597" version="1" comment="pam is &lt;1.1.8-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179598" version="1" comment="pam-32bit is &lt;1.1.8-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179599" version="1" comment="pam-doc is &lt;1.1.8-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179600" version="1" comment="patch is &lt;2.7.5-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179601" version="1" comment="perl-XML-LibXML is &lt;2.0019-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179602" version="1" comment="perl-YAML-LibYAML is &lt;0.38-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179603" version="1" comment="pigz is &lt;2.3-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179604" version="1" comment="python is &lt;2.7.9-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179605" version="1" comment="python-curses is &lt;2.7.9-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179606" version="1" comment="python-tk is &lt;2.7.9-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179607" version="1" comment="python3 is &lt;3.4.1-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179608" version="1" comment="python-libxml2 is &lt;2.9.1-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179609" version="1" comment="python-requests is &lt;2.3.0-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179610" version="1" comment="qemu is &lt;2.3.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179611" version="1" comment="qemu-block-curl is &lt;2.3.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179612" version="1" comment="qemu-ipxe is &lt;1.0.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179613" version="1" comment="qemu-kvm is &lt;2.3.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179614" version="1" comment="qemu-seabios is &lt;1.8.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179615" version="1" comment="qemu-sgabios is &lt;8-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179616" version="1" comment="qemu-tools is &lt;2.3.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179617" version="1" comment="qemu-vgabios is &lt;1.8.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179618" version="1" comment="qemu-x86 is &lt;2.3.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179619" version="1" comment="rpcbind is &lt;0.2.1_rc4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179620" version="1" comment="rpm is &lt;4.11.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179621" version="1" comment="rpm-32bit is &lt;4.11.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179622" version="1" comment="rpm-build is &lt;4.11.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179623" version="1" comment="rsyslog is &lt;8.4.0-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179624" version="1" comment="sblim-sfcb is &lt;1.4.8-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179625" version="1" comment="shim is &lt;0.9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179626" version="1" comment="strongswan is &lt;5.1.3-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179627" version="1" comment="strongswan-doc is &lt;5.1.3-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179628" version="1" comment="strongswan-ipsec is &lt;5.1.3-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179629" version="1" comment="strongswan-libs0 is &lt;5.1.3-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179630" version="1" comment="sysconfig is &lt;0.83.8-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179631" version="1" comment="sysconfig-netconfig is &lt;0.83.8-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179632" version="1" comment="tar is &lt;1.27.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179633" version="1" comment="tar-lang is &lt;1.27.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179634" version="1" comment="tcpdump is &lt;4.5.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179635" version="1" comment="tftp is &lt;5.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179636" version="1" comment="tigervnc is &lt;1.4.3-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179637" version="1" comment="xorg-x11-Xvnc is &lt;1.4.3-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179638" version="1" comment="unzip is &lt;6.00-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179639" version="1" comment="vorbis-tools is &lt;1.4.0-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179640" version="1" comment="vorbis-tools-lang is &lt;1.4.0-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179641" version="1" comment="wget is &lt;1.14-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179642" version="1" comment="wireshark is &lt;1.12.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179643" version="1" comment="wpa_supplicant is &lt;2.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179644" version="1" comment="xdg-utils is &lt;20140630-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179645" version="1" comment="xen is &lt;4.5.1_12-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179646" version="1" comment="xen-kmp-default is &lt;4.5.1_12_k3.12.49_11-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179647" version="1" comment="xen-libs is &lt;4.5.1_12-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179648" version="1" comment="xen-libs-32bit is &lt;4.5.1_12-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179649" version="1" comment="xf86-video-intel is &lt;2.99.914-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179650" version="1" comment="xorg-x11-server is &lt;7.6_1.15.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179651" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.15.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179652" version="1" comment="yast2 is &lt;3.1.155-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179653" version="1" comment="yast2-core is &lt;3.1.18-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179654" version="1" comment="DirectFB is &lt;1.7.1-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179655" version="1" comment="lib++dfb-1_7-1 is &lt;1.7.1-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179656" version="1" comment="libdirectfb-1_7-1 is &lt;1.7.1-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179657" version="1" comment="libdirectfb-1_7-1-32bit is &lt;1.7.1-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128016" version="1" comment="sled-release is ==12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179658" version="1" comment="ImageMagick is &lt;6.8.8.1-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179659" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179660" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179661" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179662" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179663" version="1" comment="MozillaFirefox is &lt;45.4.0esr-81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179664" version="1" comment="MozillaFirefox-translations is &lt;45.4.0esr-81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179665" version="1" comment="NetworkManager is &lt;1.0.12-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179666" version="1" comment="NetworkManager-lang is &lt;1.0.12-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179667" version="1" comment="libnm-glib-vpn1 is &lt;1.0.12-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179668" version="1" comment="libnm-glib4 is &lt;1.0.12-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179669" version="1" comment="libnm-util2 is &lt;1.0.12-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179670" version="1" comment="libnm0 is &lt;1.0.12-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179671" version="1" comment="typelib-1_0-NM-1_0 is &lt;1.0.12-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179672" version="1" comment="typelib-1_0-NMClient-1_0 is &lt;1.0.12-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179673" version="1" comment="typelib-1_0-NetworkManager-1_0 is &lt;1.0.12-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179674" version="1" comment="aaa_base is &lt;13.2+git20140911.61c1681-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179675" version="1" comment="aaa_base-extras is &lt;13.2+git20140911.61c1681-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179676" version="1" comment="accountsservice is &lt;0.6.42-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179677" version="1" comment="accountsservice-lang is &lt;0.6.42-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179678" version="1" comment="libaccountsservice0 is &lt;0.6.42-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179679" version="1" comment="typelib-1_0-AccountsService-1_0 is &lt;0.6.42-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179680" version="1" comment="argyllcms is &lt;1.6.3-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179681" version="1" comment="at is &lt;3.1.14-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179682" version="1" comment="libQtWebKit4 is &lt;4.8.6+2.3.3-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179683" version="1" comment="libQtWebKit4-32bit is &lt;4.8.6+2.3.3-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179684" version="1" comment="libbonobo is &lt;2.32.1-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179685" version="1" comment="libbonobo-32bit is &lt;2.32.1-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179686" version="1" comment="libbonobo-lang is &lt;2.32.1-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179687" version="1" comment="libkde4 is &lt;4.12.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179688" version="1" comment="libkde4-32bit is &lt;4.12.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179689" version="1" comment="libkdecore4 is &lt;4.12.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179690" version="1" comment="libkdecore4-32bit is &lt;4.12.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179691" version="1" comment="libksuseinstall1 is &lt;4.12.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179692" version="1" comment="libksuseinstall1-32bit is &lt;4.12.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179693" version="1" comment="libnetpbm11 is &lt;10.66.3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179694" version="1" comment="libnetpbm11-32bit is &lt;10.66.3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179695" version="1" comment="netpbm is &lt;10.66.3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179696" version="1" comment="augeas is &lt;1.2.0-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179697" version="1" comment="augeas-lenses is &lt;1.2.0-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179698" version="1" comment="libaugeas0 is &lt;1.2.0-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179699" version="1" comment="autofs is &lt;5.0.9-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179700" version="1" comment="avahi is &lt;0.6.32-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179701" version="1" comment="avahi-lang is &lt;0.6.32-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179702" version="1" comment="libavahi-client3 is &lt;0.6.32-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179703" version="1" comment="libavahi-client3-32bit is &lt;0.6.32-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179704" version="1" comment="libavahi-common3 is &lt;0.6.32-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179705" version="1" comment="libavahi-common3-32bit is &lt;0.6.32-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179706" version="1" comment="libavahi-core7 is &lt;0.6.32-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179707" version="1" comment="libdns_sd is &lt;0.6.32-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179708" version="1" comment="libdns_sd-32bit is &lt;0.6.32-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179709" version="1" comment="bash is &lt;4.3-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179710" version="1" comment="bash-doc is &lt;4.3-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179711" version="1" comment="bash-lang is &lt;4.3-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179712" version="1" comment="libreadline6 is &lt;6.3-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179713" version="1" comment="libreadline6-32bit is &lt;6.3-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179714" version="1" comment="readline-doc is &lt;6.3-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179715" version="1" comment="bind-libs is &lt;9.9.9P1-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179716" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179717" version="1" comment="bind-utils is &lt;9.9.9P1-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179718" version="1" comment="binutils is &lt;2.26.1-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179719" version="1" comment="bogofilter is &lt;1.2.4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179720" version="1" comment="bzip2 is &lt;1.0.6-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179721" version="1" comment="libbz2-1 is &lt;1.0.6-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179722" version="1" comment="libbz2-1-32bit is &lt;1.0.6-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179723" version="1" comment="cifs-utils is &lt;6.5-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179724" version="1" comment="clamav is &lt;0.99.2-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179725" version="1" comment="colord is &lt;1.3.3-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179726" version="1" comment="colord-gtk-lang is &lt;0.1.26-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179727" version="1" comment="colord-lang is &lt;1.3.3-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179728" version="1" comment="libcolord-gtk1 is &lt;0.1.26-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179729" version="1" comment="libcolord2 is &lt;1.3.3-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179730" version="1" comment="libcolord2-32bit is &lt;1.3.3-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179731" version="1" comment="libcolorhug2 is &lt;1.3.3-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179732" version="1" comment="coreutils is &lt;8.25-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179733" version="1" comment="coreutils-lang is &lt;8.25-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179734" version="1" comment="cpp48 is &lt;4.8.5-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179735" version="1" comment="gcc48 is &lt;4.8.5-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179736" version="1" comment="gcc48-32bit is &lt;4.8.5-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179737" version="1" comment="gcc48-c++ is &lt;4.8.5-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179738" version="1" comment="gcc48-gij is &lt;4.8.5-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179739" version="1" comment="gcc48-gij-32bit is &lt;4.8.5-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179740" version="1" comment="gcc48-info is &lt;4.8.5-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179741" version="1" comment="libasan0 is &lt;4.8.5-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179742" version="1" comment="libasan0-32bit is &lt;4.8.5-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179743" version="1" comment="libgcj48 is &lt;4.8.5-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179744" version="1" comment="libgcj48-32bit is &lt;4.8.5-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179745" version="1" comment="libgcj48-jar is &lt;4.8.5-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179746" version="1" comment="libgcj_bc1 is &lt;4.8.5-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179747" version="1" comment="libstdc++48-devel is &lt;4.8.5-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179748" version="1" comment="libstdc++48-devel-32bit is &lt;4.8.5-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179749" version="1" comment="cracklib is &lt;2.9.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179750" version="1" comment="libcrack2 is &lt;2.9.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179751" version="1" comment="libcrack2-32bit is &lt;2.9.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179752" version="1" comment="ctags is &lt;5.8-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179753" version="1" comment="cups is &lt;1.7.5-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179754" version="1" comment="cups-client is &lt;1.7.5-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179755" version="1" comment="cups-libs is &lt;1.7.5-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179756" version="1" comment="cups-libs-32bit is &lt;1.7.5-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179757" version="1" comment="cups-filters is &lt;1.0.58-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179758" version="1" comment="cups-filters-cups-browsed is &lt;1.0.58-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179759" version="1" comment="cups-filters-foomatic-rip is &lt;1.0.58-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179760" version="1" comment="cups-filters-ghostscript is &lt;1.0.58-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179761" version="1" comment="curl is &lt;7.37.0-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179762" version="1" comment="libcurl4 is &lt;7.37.0-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179763" version="1" comment="libcurl4-32bit is &lt;7.37.0-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179764" version="1" comment="dbus-1 is &lt;1.8.16-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179765" version="1" comment="dbus-1-x11 is &lt;1.8.16-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179766" version="1" comment="libdbus-1-3 is &lt;1.8.16-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179767" version="1" comment="libdbus-1-3-32bit is &lt;1.8.16-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179768" version="1" comment="dhcp is &lt;4.3.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179769" version="1" comment="dhcp-client is &lt;4.3.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179770" version="1" comment="dia is &lt;0.97.3-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179771" version="1" comment="dia-lang is &lt;0.97.3-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179772" version="1" comment="dnsmasq is &lt;2.71-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179773" version="1" comment="dosfstools is &lt;3.0.26-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179774" version="1" comment="dracut is &lt;044-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179775" version="1" comment="ecryptfs-utils is &lt;103-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179776" version="1" comment="ecryptfs-utils-32bit is &lt;103-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179777" version="1" comment="emacs is &lt;24.3-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179778" version="1" comment="emacs-info is &lt;24.3-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179779" version="1" comment="emacs-x11 is &lt;24.3-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179780" version="1" comment="etags is &lt;24.3-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179781" version="1" comment="empathy is &lt;3.12.12-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179782" version="1" comment="empathy-lang is &lt;3.12.12-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179783" version="1" comment="telepathy-mission-control-plugin-goa is &lt;3.12.12-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179784" version="1" comment="eog is &lt;3.20.4-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179785" version="1" comment="eog-lang is &lt;3.20.4-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179786" version="1" comment="evince is &lt;3.20.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179787" version="1" comment="evince-browser-plugin is &lt;3.20.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179788" version="1" comment="evince-lang is &lt;3.20.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179789" version="1" comment="evince-plugin-djvudocument is &lt;3.20.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179790" version="1" comment="evince-plugin-dvidocument is &lt;3.20.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179791" version="1" comment="evince-plugin-pdfdocument is &lt;3.20.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179792" version="1" comment="evince-plugin-psdocument is &lt;3.20.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179793" version="1" comment="evince-plugin-tiffdocument is &lt;3.20.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179794" version="1" comment="evince-plugin-xpsdocument is &lt;3.20.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179795" version="1" comment="libevdocument3-4 is &lt;3.20.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179796" version="1" comment="libevview3-3 is &lt;3.20.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179797" version="1" comment="nautilus-evince is &lt;3.20.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179798" version="1" comment="typelib-1_0-EvinceDocument-3_0 is &lt;3.20.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179799" version="1" comment="typelib-1_0-EvinceView-3_0 is &lt;3.20.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179800" version="1" comment="expat is &lt;2.1.0-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179801" version="1" comment="libexpat1 is &lt;2.1.0-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179802" version="1" comment="libexpat1-32bit is &lt;2.1.0-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179803" version="1" comment="fetchmail is &lt;6.3.26-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179804" version="1" comment="finch is &lt;2.11.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179805" version="1" comment="libpurple is &lt;2.11.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179806" version="1" comment="libpurple-lang is &lt;2.11.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179807" version="1" comment="libpurple-meanwhile is &lt;2.11.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179808" version="1" comment="libpurple-tcl is &lt;2.11.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179809" version="1" comment="pidgin is &lt;2.11.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179810" version="1" comment="fontconfig is &lt;2.11.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179811" version="1" comment="fontconfig-32bit is &lt;2.11.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179812" version="1" comment="freerdp is &lt;2.0.0~git.1463131968.4e66df7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179813" version="1" comment="libfreerdp2 is &lt;2.0.0~git.1463131968.4e66df7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179814" version="1" comment="ft2demos is &lt;2.6.3-7.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179815" version="1" comment="gd is &lt;2.1.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179816" version="1" comment="gd-32bit is &lt;2.1.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179817" version="1" comment="gdk-pixbuf-lang is &lt;2.34.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179818" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.34.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179819" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.34.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179820" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.34.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179821" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.34.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179822" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.34.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179823" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.40.15-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179824" version="1" comment="librsvg-2-2 is &lt;2.40.15-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179825" version="1" comment="librsvg-2-2-32bit is &lt;2.40.15-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179826" version="1" comment="rsvg-view is &lt;2.40.15-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179827" version="1" comment="gdm is &lt;3.10.0.1-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179828" version="1" comment="gdm-lang is &lt;3.10.0.1-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179829" version="1" comment="gdmflexiserver is &lt;3.10.0.1-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179830" version="1" comment="libgdm1 is &lt;3.10.0.1-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179831" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.10.0.1-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179832" version="1" comment="ghostscript is &lt;9.15-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179833" version="1" comment="ghostscript-x11 is &lt;9.15-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179834" version="1" comment="gimp is &lt;2.8.18-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179835" version="1" comment="gimp-lang is &lt;2.8.18-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179836" version="1" comment="gimp-plugins-python is &lt;2.8.18-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179837" version="1" comment="libgimp-2_0-0 is &lt;2.8.18-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179838" version="1" comment="libgimpui-2_0-0 is &lt;2.8.18-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179839" version="1" comment="glib2-lang is &lt;2.48.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179840" version="1" comment="glib2-tools is &lt;2.48.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179841" version="1" comment="libgio-2_0-0 is &lt;2.48.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179842" version="1" comment="libgio-2_0-0-32bit is &lt;2.48.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179843" version="1" comment="libgio-fam is &lt;2.48.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179844" version="1" comment="libglib-2_0-0 is &lt;2.48.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179845" version="1" comment="libglib-2_0-0-32bit is &lt;2.48.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179846" version="1" comment="libgmodule-2_0-0 is &lt;2.48.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179847" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.48.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179848" version="1" comment="libgobject-2_0-0 is &lt;2.48.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179849" version="1" comment="libgobject-2_0-0-32bit is &lt;2.48.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179850" version="1" comment="libgthread-2_0-0 is &lt;2.48.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179851" version="1" comment="libgthread-2_0-0-32bit is &lt;2.48.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179852" version="1" comment="glibc is &lt;2.22-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179853" version="1" comment="glibc-32bit is &lt;2.22-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179854" version="1" comment="glibc-devel is &lt;2.22-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179855" version="1" comment="glibc-devel-32bit is &lt;2.22-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179856" version="1" comment="glibc-i18ndata is &lt;2.22-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179857" version="1" comment="glibc-locale is &lt;2.22-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179858" version="1" comment="glibc-locale-32bit is &lt;2.22-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179859" version="1" comment="nscd is &lt;2.22-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179860" version="1" comment="gnome-keyring is &lt;3.20.0-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179861" version="1" comment="gnome-keyring-32bit is &lt;3.20.0-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179862" version="1" comment="gnome-keyring-lang is &lt;3.20.0-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179863" version="1" comment="gnome-keyring-pam is &lt;3.20.0-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179864" version="1" comment="gnome-keyring-pam-32bit is &lt;3.20.0-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179865" version="1" comment="libgck-modules-gnome-keyring is &lt;3.20.0-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179866" version="1" comment="gnome-online-accounts is &lt;3.20.4-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179867" version="1" comment="gnome-online-accounts-lang is &lt;3.20.4-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179868" version="1" comment="libgoa-1_0-0 is &lt;3.20.4-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179869" version="1" comment="libgoa-1_0-0-32bit is &lt;3.20.4-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179870" version="1" comment="libgoa-backend-1_0-1 is &lt;3.20.4-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179871" version="1" comment="typelib-1_0-Goa-1_0 is &lt;3.20.4-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179872" version="1" comment="gnome-settings-daemon is &lt;3.20.1-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179873" version="1" comment="gnome-settings-daemon-lang is &lt;3.20.1-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179874" version="1" comment="gnome-shell is &lt;3.20.4-70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179875" version="1" comment="gnome-shell-browser-plugin is &lt;3.20.4-70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179876" version="1" comment="gnome-shell-calendar is &lt;3.20.4-70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179877" version="1" comment="gnome-shell-lang is &lt;3.20.4-70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179878" version="1" comment="gpg2 is &lt;2.0.24-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179879" version="1" comment="gpg2-lang is &lt;2.0.24-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179880" version="1" comment="grub2 is &lt;2.02~beta2-104" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179881" version="1" comment="grub2-i386-pc is &lt;2.02~beta2-104" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179882" version="1" comment="grub2-snapper-plugin is &lt;2.02~beta2-104" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179883" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.02~beta2-104" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179884" version="1" comment="grub2-x86_64-efi is &lt;2.02~beta2-104" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179885" version="1" comment="grub2-x86_64-xen is &lt;2.02~beta2-104" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179886" version="1" comment="gstreamer-0_10-plugins-bad is &lt;0.10.23-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179887" version="1" comment="gstreamer-0_10-plugins-bad-lang is &lt;0.10.23-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179888" version="1" comment="libgstbasecamerabinsrc-0_10-23 is &lt;0.10.23-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179889" version="1" comment="libgstbasecamerabinsrc-0_10-23-32bit is &lt;0.10.23-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179890" version="1" comment="libgstbasevideo-0_10-23 is &lt;0.10.23-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179891" version="1" comment="libgstbasevideo-0_10-23-32bit is &lt;0.10.23-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179892" version="1" comment="libgstcodecparsers-0_10-23 is &lt;0.10.23-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179893" version="1" comment="libgstphotography-0_10-23 is &lt;0.10.23-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179894" version="1" comment="libgstphotography-0_10-23-32bit is &lt;0.10.23-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179895" version="1" comment="libgstsignalprocessor-0_10-23 is &lt;0.10.23-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179896" version="1" comment="libgstsignalprocessor-0_10-23-32bit is &lt;0.10.23-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179897" version="1" comment="libgstvdp-0_10-23 is &lt;0.10.23-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179898" version="1" comment="libgstvdp-0_10-23-32bit is &lt;0.10.23-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179899" version="1" comment="gtk2-data is &lt;2.24.31-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179900" version="1" comment="gtk2-lang is &lt;2.24.31-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179901" version="1" comment="gtk2-tools is &lt;2.24.31-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179902" version="1" comment="gtk2-tools-32bit is &lt;2.24.31-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179903" version="1" comment="libgtk-2_0-0 is &lt;2.24.31-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179904" version="1" comment="libgtk-2_0-0-32bit is &lt;2.24.31-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179905" version="1" comment="typelib-1_0-Gtk-2_0 is &lt;2.24.31-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179906" version="1" comment="hyper-v is &lt;7-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179908" version="1" comment="ibus-pinyin is &lt;1.5.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179909" version="1" comment="imobiledevice-tools is &lt;1.2.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179910" version="1" comment="libimobiledevice6 is &lt;1.2.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179911" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.111-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179912" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.111-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179913" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.101-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179914" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.101-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179915" version="1" comment="kbd is &lt;1.15.5-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179916" version="1" comment="kdump is &lt;0.8.15-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179917" version="1" comment="kernel-default is &lt;4.4.21-69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179918" version="1" comment="kernel-default-devel is &lt;4.4.21-69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179919" version="1" comment="kernel-default-extra is &lt;4.4.21-69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179920" version="1" comment="kernel-devel is &lt;4.4.21-69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179921" version="1" comment="kernel-macros is &lt;4.4.21-69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179922" version="1" comment="kernel-source is &lt;4.4.21-69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179923" version="1" comment="kernel-syms is &lt;4.4.21-69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179924" version="1" comment="krb5 is &lt;1.12.5-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179925" version="1" comment="krb5-32bit is &lt;1.12.5-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179926" version="1" comment="krb5-client is &lt;1.12.5-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179927" version="1" comment="lhasa is &lt;0.2.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179928" version="1" comment="liblhasa0 is &lt;0.2.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179929" version="1" comment="libFLAC++6 is &lt;1.3.0-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179930" version="1" comment="libFLAC++6-32bit is &lt;1.3.0-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179931" version="1" comment="libFLAC8 is &lt;1.3.0-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179932" version="1" comment="libFLAC8-32bit is &lt;1.3.0-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179933" version="1" comment="libQt5Concurrent5 is &lt;5.6.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179934" version="1" comment="libQt5Core5 is &lt;5.6.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179935" version="1" comment="libQt5DBus5 is &lt;5.6.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179936" version="1" comment="libQt5Gui5 is &lt;5.6.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179937" version="1" comment="libQt5Network5 is &lt;5.6.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179938" version="1" comment="libQt5OpenGL5 is &lt;5.6.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179939" version="1" comment="libQt5PrintSupport5 is &lt;5.6.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179940" version="1" comment="libQt5Sql5 is &lt;5.6.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179941" version="1" comment="libQt5Sql5-mysql is &lt;5.6.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179942" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179943" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179944" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179945" version="1" comment="libQt5Test5 is &lt;5.6.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179946" version="1" comment="libQt5Widgets5 is &lt;5.6.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179947" version="1" comment="libQt5Xml5 is &lt;5.6.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179948" version="1" comment="libQt5WebKit5 is &lt;5.6.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179949" version="1" comment="libQt5WebKit5-imports is &lt;5.6.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179950" version="1" comment="libQt5WebKitWidgets5 is &lt;5.6.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179951" version="1" comment="libXfont1 is &lt;1.5.1-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179952" version="1" comment="libXrandr2 is &lt;1.5.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179953" version="1" comment="libXrandr2-32bit is &lt;1.5.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179954" version="1" comment="libXvnc1 is &lt;1.6.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179955" version="1" comment="tigervnc is &lt;1.6.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179956" version="1" comment="xorg-x11-Xvnc is &lt;1.6.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179957" version="1" comment="libarchive13 is &lt;3.1.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179958" version="1" comment="libasan2 is &lt;5.3.1+r233831-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179959" version="1" comment="libasan2-32bit is &lt;5.3.1+r233831-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179960" version="1" comment="libffi4 is &lt;5.3.1+r233831-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179961" version="1" comment="libffi4-32bit is &lt;5.3.1+r233831-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179962" version="1" comment="libmpx0 is &lt;5.3.1+r233831-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179963" version="1" comment="libmpx0-32bit is &lt;5.3.1+r233831-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179964" version="1" comment="libmpxwrappers0 is &lt;5.3.1+r233831-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179965" version="1" comment="libmpxwrappers0-32bit is &lt;5.3.1+r233831-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179966" version="1" comment="libblkid1 is &lt;2.28-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179967" version="1" comment="libblkid1-32bit is &lt;2.28-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179968" version="1" comment="libfdisk1 is &lt;2.28-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179969" version="1" comment="libmount1 is &lt;2.28-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179970" version="1" comment="libmount1-32bit is &lt;2.28-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179971" version="1" comment="libsmartcols1 is &lt;2.28-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179972" version="1" comment="libuuid-devel is &lt;2.28-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179973" version="1" comment="libuuid1 is &lt;2.28-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179974" version="1" comment="libuuid1-32bit is &lt;2.28-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179975" version="1" comment="python-libmount is &lt;2.28-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179976" version="1" comment="util-linux is &lt;2.28-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179977" version="1" comment="util-linux-lang is &lt;2.28-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179978" version="1" comment="util-linux-systemd is &lt;2.28-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179979" version="1" comment="uuidd is &lt;2.28-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179980" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179981" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179982" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179983" version="1" comment="libdcerpc0 is &lt;4.4.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179984" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179985" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179986" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179987" version="1" comment="libndr-nbt0 is &lt;4.4.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179988" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179989" version="1" comment="libndr-standard0 is &lt;4.4.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179990" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179991" version="1" comment="libndr0 is &lt;4.4.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179992" version="1" comment="libndr0-32bit is &lt;4.4.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179993" version="1" comment="libnetapi0 is &lt;4.4.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179994" version="1" comment="libnetapi0-32bit is &lt;4.4.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179995" version="1" comment="libsamba-credentials0 is &lt;4.4.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179996" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179997" version="1" comment="libsamba-errors0 is &lt;4.4.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179998" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009179999" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180000" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180001" version="1" comment="libsamba-passdb0 is &lt;4.4.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180002" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180003" version="1" comment="libsamba-util0 is &lt;4.4.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180004" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180005" version="1" comment="libsamdb0 is &lt;4.4.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180006" version="1" comment="libsamdb0-32bit is &lt;4.4.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180007" version="1" comment="libsmbclient0 is &lt;4.4.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180008" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180009" version="1" comment="libsmbconf0 is &lt;4.4.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180010" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180011" version="1" comment="libsmbldap0 is &lt;4.4.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180012" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180013" version="1" comment="libtevent-util0 is &lt;4.4.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180014" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180015" version="1" comment="libwbclient0 is &lt;4.4.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180016" version="1" comment="libwbclient0-32bit is &lt;4.4.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180017" version="1" comment="samba is &lt;4.4.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180018" version="1" comment="samba-client is &lt;4.4.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180019" version="1" comment="samba-client-32bit is &lt;4.4.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180020" version="1" comment="samba-doc is &lt;4.4.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180021" version="1" comment="samba-libs is &lt;4.4.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180022" version="1" comment="samba-libs-32bit is &lt;4.4.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180023" version="1" comment="samba-winbind is &lt;4.4.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180024" version="1" comment="samba-winbind-32bit is &lt;4.4.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180025" version="1" comment="libecpg6 is &lt;9.4.9-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180026" version="1" comment="libpq5 is &lt;9.4.9-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180027" version="1" comment="libpq5-32bit is &lt;9.4.9-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180028" version="1" comment="postgresql94 is &lt;9.4.9-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180029" version="1" comment="libfreebl3 is &lt;3.21.1-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180030" version="1" comment="libfreebl3-32bit is &lt;3.21.1-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180031" version="1" comment="libsoftokn3 is &lt;3.21.1-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180032" version="1" comment="libsoftokn3-32bit is &lt;3.21.1-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180033" version="1" comment="mozilla-nss is &lt;3.21.1-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180034" version="1" comment="mozilla-nss-32bit is &lt;3.21.1-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180035" version="1" comment="mozilla-nss-certs is &lt;3.21.1-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180036" version="1" comment="mozilla-nss-certs-32bit is &lt;3.21.1-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180037" version="1" comment="mozilla-nss-sysinit is &lt;3.21.1-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180038" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.21.1-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180039" version="1" comment="mozilla-nss-tools is &lt;3.21.1-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180040" version="1" comment="libfreetype6 is &lt;2.6.3-7.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180041" version="1" comment="libfreetype6-32bit is &lt;2.6.3-7.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180042" version="1" comment="libgcrypt20 is &lt;1.6.1-16.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180043" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180044" version="1" comment="libgif6 is &lt;5.0.5-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180045" version="1" comment="libgif6-32bit is &lt;5.0.5-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180046" version="1" comment="libgnomesu is &lt;2.0.0-353.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180047" version="1" comment="libgnomesu-lang is &lt;2.0.0-353.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180048" version="1" comment="libgnomesu0 is &lt;2.0.0-353.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180049" version="1" comment="libgraphite2-3 is &lt;1.3.1-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180050" version="1" comment="libgraphite2-3-32bit is &lt;1.3.1-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180051" version="1" comment="libgypsy0 is &lt;0.9-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180052" version="1" comment="libhogweed2 is &lt;2.7.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180053" version="1" comment="libhogweed2-32bit is &lt;2.7.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180054" version="1" comment="libnettle4 is &lt;2.7.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180055" version="1" comment="libnettle4-32bit is &lt;2.7.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180056" version="1" comment="libidn11 is &lt;1.28-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180057" version="1" comment="libidn11-32bit is &lt;1.28-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180058" version="1" comment="libipa_hbac0 is &lt;1.13.4-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180059" version="1" comment="libsss_idmap0 is &lt;1.13.4-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180060" version="1" comment="libsss_sudo is &lt;1.13.4-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180061" version="1" comment="python-sssd-config is &lt;1.13.4-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180062" version="1" comment="sssd is &lt;1.13.4-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180063" version="1" comment="sssd-32bit is &lt;1.13.4-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180064" version="1" comment="sssd-ad is &lt;1.13.4-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180065" version="1" comment="sssd-ipa is &lt;1.13.4-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180066" version="1" comment="sssd-krb5 is &lt;1.13.4-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180067" version="1" comment="sssd-krb5-common is &lt;1.13.4-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180068" version="1" comment="sssd-ldap is &lt;1.13.4-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180069" version="1" comment="sssd-proxy is &lt;1.13.4-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180070" version="1" comment="sssd-tools is &lt;1.13.4-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180071" version="1" comment="libjavascriptcoregtk-1_0-0 is &lt;2.4.11-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180072" version="1" comment="libjavascriptcoregtk-1_0-0-32bit is &lt;2.4.11-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180073" version="1" comment="libjavascriptcoregtk-3_0-0 is &lt;2.4.11-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180074" version="1" comment="libwebkitgtk-1_0-0 is &lt;2.4.11-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180075" version="1" comment="libwebkitgtk-1_0-0-32bit is &lt;2.4.11-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180076" version="1" comment="libwebkitgtk-3_0-0 is &lt;2.4.11-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180077" version="1" comment="libwebkitgtk2-lang is &lt;2.4.11-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180078" version="1" comment="libwebkitgtk3-lang is &lt;2.4.11-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180079" version="1" comment="typelib-1_0-JavaScriptCore-3_0 is &lt;2.4.11-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180080" version="1" comment="typelib-1_0-WebKit-3_0 is &lt;2.4.11-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180081" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.12.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180082" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.12.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180083" version="1" comment="libwebkit2gtk3-lang is &lt;2.12.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180084" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.12.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180085" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.12.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180086" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.12.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180087" version="1" comment="libksba8 is &lt;1.3.0-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180088" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180089" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180090" version="1" comment="openldap2-client is &lt;2.4.41-18.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180091" version="1" comment="libldb1 is &lt;1.1.26-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180092" version="1" comment="libldb1-32bit is &lt;1.1.26-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180093" version="1" comment="libmspack0 is &lt;0.4-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180094" version="1" comment="libmysqlclient18 is &lt;10.0.27-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180095" version="1" comment="libmysqlclient18-32bit is &lt;10.0.27-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180096" version="1" comment="libmysqlclient_r18 is &lt;10.0.27-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180097" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.27-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180098" version="1" comment="mariadb is &lt;10.0.27-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180099" version="1" comment="mariadb-client is &lt;10.0.27-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180100" version="1" comment="mariadb-errormessages is &lt;10.0.27-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180101" version="1" comment="libndp0 is &lt;1.6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180102" version="1" comment="libnewt0_52 is &lt;0.52.16-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180103" version="1" comment="libopenssl-devel is &lt;1.0.2j-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180104" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180105" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180106" version="1" comment="openssl is &lt;1.0.2j-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180107" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-102" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180108" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-102" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180109" version="1" comment="libotr5 is &lt;4.0.0-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180110" version="1" comment="libpango-1_0-0 is &lt;1.40.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180111" version="1" comment="libpango-1_0-0-32bit is &lt;1.40.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180112" version="1" comment="typelib-1_0-Pango-1_0 is &lt;1.40.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180113" version="1" comment="libpng12-0 is &lt;1.2.50-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180114" version="1" comment="libpng12-0-32bit is &lt;1.2.50-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180115" version="1" comment="libpng15-15 is &lt;1.5.22-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180116" version="1" comment="libpng16-16 is &lt;1.6.8-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180117" version="1" comment="libpng16-16-32bit is &lt;1.6.8-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180118" version="1" comment="libpolkit0 is &lt;0.113-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180119" version="1" comment="libpolkit0-32bit is &lt;0.113-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180120" version="1" comment="polkit is &lt;0.113-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180121" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180122" version="1" comment="libpoppler-glib8 is &lt;0.43.0-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180123" version="1" comment="libpoppler-qt4-4 is &lt;0.43.0-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180124" version="1" comment="libpoppler60 is &lt;0.43.0-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180125" version="1" comment="poppler-tools is &lt;0.43.0-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180126" version="1" comment="libpoppler44 is &lt;0.24.4-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180127" version="1" comment="libproxy1 is &lt;0.4.13-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180128" version="1" comment="libproxy1-32bit is &lt;0.4.13-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180129" version="1" comment="libproxy1-config-gnome3 is &lt;0.4.13-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180130" version="1" comment="libproxy1-config-gnome3-32bit is &lt;0.4.13-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180131" version="1" comment="libproxy1-networkmanager is &lt;0.4.13-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180132" version="1" comment="libproxy1-networkmanager-32bit is &lt;0.4.13-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180133" version="1" comment="libproxy1-pacrunner-webkit is &lt;0.4.13-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180134" version="1" comment="libpython2_7-1_0 is &lt;2.7.9-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180135" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.9-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180136" version="1" comment="python-base is &lt;2.7.9-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180137" version="1" comment="python-devel is &lt;2.7.9-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180138" version="1" comment="python-xml is &lt;2.7.9-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180139" version="1" comment="libqt4 is &lt;4.8.6-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180140" version="1" comment="libqt4-32bit is &lt;4.8.6-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180141" version="1" comment="libqt4-qt3support is &lt;4.8.6-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180142" version="1" comment="libqt4-qt3support-32bit is &lt;4.8.6-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180143" version="1" comment="libqt4-sql is &lt;4.8.6-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180144" version="1" comment="libqt4-sql-32bit is &lt;4.8.6-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180145" version="1" comment="libqt4-sql-mysql is &lt;4.8.6-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180146" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.8.6-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180147" version="1" comment="libqt4-sql-postgresql is &lt;4.8.6-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180148" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.8.6-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180149" version="1" comment="libqt4-sql-sqlite is &lt;4.8.6-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180150" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.8.6-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180151" version="1" comment="libqt4-sql-unixODBC is &lt;4.8.6-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180152" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.8.6-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180153" version="1" comment="libqt4-x11 is &lt;4.8.6-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180154" version="1" comment="libqt4-x11-32bit is &lt;4.8.6-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180155" version="1" comment="libreoffice is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180156" version="1" comment="libreoffice-base is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180157" version="1" comment="libreoffice-base-drivers-mysql is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180158" version="1" comment="libreoffice-base-drivers-postgresql is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180159" version="1" comment="libreoffice-calc is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180160" version="1" comment="libreoffice-calc-extensions is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180161" version="1" comment="libreoffice-draw is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180162" version="1" comment="libreoffice-filters-optional is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180163" version="1" comment="libreoffice-gnome is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180164" version="1" comment="libreoffice-icon-theme-galaxy is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180165" version="1" comment="libreoffice-icon-theme-tango is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180166" version="1" comment="libreoffice-impress is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180167" version="1" comment="libreoffice-l10n-af is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180168" version="1" comment="libreoffice-l10n-ar is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180169" version="1" comment="libreoffice-l10n-ca is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180170" version="1" comment="libreoffice-l10n-cs is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180171" version="1" comment="libreoffice-l10n-da is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180172" version="1" comment="libreoffice-l10n-de is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180173" version="1" comment="libreoffice-l10n-en is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180174" version="1" comment="libreoffice-l10n-es is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180175" version="1" comment="libreoffice-l10n-fi is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180176" version="1" comment="libreoffice-l10n-fr is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180177" version="1" comment="libreoffice-l10n-gu is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180178" version="1" comment="libreoffice-l10n-hi is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180179" version="1" comment="libreoffice-l10n-hu is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180180" version="1" comment="libreoffice-l10n-it is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180181" version="1" comment="libreoffice-l10n-ja is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180182" version="1" comment="libreoffice-l10n-ko is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180183" version="1" comment="libreoffice-l10n-nb is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180184" version="1" comment="libreoffice-l10n-nl is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180185" version="1" comment="libreoffice-l10n-nn is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180186" version="1" comment="libreoffice-l10n-pl is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180187" version="1" comment="libreoffice-l10n-pt-BR is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180188" version="1" comment="libreoffice-l10n-pt-PT is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180189" version="1" comment="libreoffice-l10n-ro is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180190" version="1" comment="libreoffice-l10n-ru is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180191" version="1" comment="libreoffice-l10n-sk is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180192" version="1" comment="libreoffice-l10n-sv is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180193" version="1" comment="libreoffice-l10n-xh is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180194" version="1" comment="libreoffice-l10n-zh-Hans is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180195" version="1" comment="libreoffice-l10n-zh-Hant is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180196" version="1" comment="libreoffice-l10n-zu is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180197" version="1" comment="libreoffice-mailmerge is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180198" version="1" comment="libreoffice-math is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180199" version="1" comment="libreoffice-officebean is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180200" version="1" comment="libreoffice-pyuno is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180201" version="1" comment="libreoffice-writer is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180202" version="1" comment="libreoffice-writer-extensions is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180203" version="1" comment="libreofficekit is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180204" version="1" comment="libruby2_1-2_1 is &lt;2.1.2-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180205" version="1" comment="ruby2.1 is &lt;2.1.2-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180206" version="1" comment="ruby2.1-stdlib is &lt;2.1.2-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180207" version="1" comment="libsndfile1 is &lt;1.0.25-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180208" version="1" comment="libsndfile1-32bit is &lt;1.0.25-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180209" version="1" comment="libsoup-2_4-1 is &lt;2.54.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180210" version="1" comment="libsoup-2_4-1-32bit is &lt;2.54.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180211" version="1" comment="libsoup-lang is &lt;2.54.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180212" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.54.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180213" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.31-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180214" version="1" comment="libspice-client-glib-helper is &lt;0.31-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180215" version="1" comment="libspice-client-gtk-2_0-4 is &lt;0.31-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180216" version="1" comment="libspice-client-gtk-3_0-4 is &lt;0.31-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180217" version="1" comment="libspice-controller0 is &lt;0.31-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180218" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.31-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180219" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.31-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180220" version="1" comment="libspice-server1 is &lt;0.12.7-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180221" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180222" version="1" comment="libsqlite3-0-32bit is &lt;3.8.10.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180223" version="1" comment="sqlite3 is &lt;3.8.10.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180224" version="1" comment="libsrtp1 is &lt;1.5.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180225" version="1" comment="libssh2-1 is &lt;1.4.3-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180226" version="1" comment="libssh2-1-32bit is &lt;1.4.3-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180227" version="1" comment="libssh4 is &lt;0.6.3-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180228" version="1" comment="libsystemd0 is &lt;228-117" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180229" version="1" comment="libsystemd0-32bit is &lt;228-117" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180230" version="1" comment="libudev1 is &lt;228-117" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180231" version="1" comment="libudev1-32bit is &lt;228-117" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180232" version="1" comment="systemd is &lt;228-117" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180233" version="1" comment="systemd-32bit is &lt;228-117" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180234" version="1" comment="systemd-bash-completion is &lt;228-117" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180235" version="1" comment="systemd-sysvinit is &lt;228-117" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180236" version="1" comment="udev is &lt;228-117" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180237" version="1" comment="libtasn1 is &lt;3.7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180238" version="1" comment="libtasn1-6 is &lt;3.7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180239" version="1" comment="libtasn1-6-32bit is &lt;3.7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180240" version="1" comment="libthai-data is &lt;0.1.25-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180241" version="1" comment="libthai0 is &lt;0.1.25-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180242" version="1" comment="libthai0-32bit is &lt;0.1.25-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180243" version="1" comment="libtiff5 is &lt;4.0.6-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180244" version="1" comment="libtiff5-32bit is &lt;4.0.6-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180245" version="1" comment="libusbmuxd4 is &lt;1.0.10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180246" version="1" comment="libvdpau1 is &lt;1.1.1-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180247" version="1" comment="libvdpau1-32bit is &lt;1.1.1-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180248" version="1" comment="libvirt is &lt;2.0.0-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180249" version="1" comment="libvirt-client is &lt;2.0.0-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180250" version="1" comment="libvirt-client-32bit is &lt;2.0.0-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180251" version="1" comment="libvirt-daemon is &lt;2.0.0-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180252" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180253" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180254" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180255" version="1" comment="libvirt-daemon-driver-libxl is &lt;2.0.0-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180256" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180257" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180258" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180259" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180260" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180261" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180262" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180263" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180264" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180265" version="1" comment="libvirt-daemon-xen is &lt;2.0.0-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180266" version="1" comment="libvirt-doc is &lt;2.0.0-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180267" version="1" comment="libvte9 is &lt;0.28.2-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180268" version="1" comment="libxcb-dri2-0 is &lt;1.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180269" version="1" comment="libxcb-dri2-0-32bit is &lt;1.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180270" version="1" comment="libxcb-dri3-0 is &lt;1.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180271" version="1" comment="libxcb-dri3-0-32bit is &lt;1.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180272" version="1" comment="libxcb-glx0 is &lt;1.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180273" version="1" comment="libxcb-glx0-32bit is &lt;1.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180274" version="1" comment="libxcb-present0 is &lt;1.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180275" version="1" comment="libxcb-present0-32bit is &lt;1.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180276" version="1" comment="libxcb-randr0 is &lt;1.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180277" version="1" comment="libxcb-render0 is &lt;1.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180278" version="1" comment="libxcb-render0-32bit is &lt;1.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180279" version="1" comment="libxcb-shape0 is &lt;1.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180280" version="1" comment="libxcb-shm0 is &lt;1.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180281" version="1" comment="libxcb-shm0-32bit is &lt;1.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180282" version="1" comment="libxcb-sync1 is &lt;1.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180283" version="1" comment="libxcb-sync1-32bit is &lt;1.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180284" version="1" comment="libxcb-xf86dri0 is &lt;1.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180285" version="1" comment="libxcb-xfixes0 is &lt;1.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180286" version="1" comment="libxcb-xfixes0-32bit is &lt;1.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180287" version="1" comment="libxcb-xinerama0 is &lt;1.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180288" version="1" comment="libxcb-xkb1 is &lt;1.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180289" version="1" comment="libxcb-xkb1-32bit is &lt;1.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180290" version="1" comment="libxcb-xv0 is &lt;1.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180291" version="1" comment="libxcb1 is &lt;1.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180292" version="1" comment="libxcb1-32bit is &lt;1.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180293" version="1" comment="libxerces-c-3_1 is &lt;3.1.1-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180294" version="1" comment="libxerces-c-3_1-32bit is &lt;3.1.1-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180295" version="1" comment="libxml2-2 is &lt;2.9.4-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180296" version="1" comment="libxml2-2-32bit is &lt;2.9.4-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180297" version="1" comment="libxml2-tools is &lt;2.9.4-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180298" version="1" comment="libzip2 is &lt;0.11.1-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180299" version="1" comment="libzmq3 is &lt;4.0.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180300" version="1" comment="mailx is &lt;12.5-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180301" version="1" comment="mozilla-nspr is &lt;4.12-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180302" version="1" comment="mozilla-nspr-32bit is &lt;4.12-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180303" version="1" comment="mutt is &lt;1.6.0-54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180304" version="1" comment="ntp is &lt;4.2.8p8-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180305" version="1" comment="ntp-doc is &lt;4.2.8p8-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180306" version="1" comment="openslp is &lt;2.0.0-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180307" version="1" comment="openslp-32bit is &lt;2.0.0-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180308" version="1" comment="openssh is &lt;7.2p2-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180309" version="1" comment="openssh-helpers is &lt;7.2p2-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180310" version="1" comment="openvpn is &lt;2.3.8-16.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180311" version="1" comment="p7zip is &lt;9.20.1-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180312" version="1" comment="perl is &lt;5.18.2-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180313" version="1" comment="perl-32bit is &lt;5.18.2-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180314" version="1" comment="perl-base is &lt;5.18.2-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180315" version="1" comment="perl-doc is &lt;5.18.2-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180316" version="1" comment="pidgin-otr is &lt;4.0.0-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180317" version="1" comment="puppet is &lt;3.8.5-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180318" version="1" comment="python is &lt;2.7.9-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180319" version="1" comment="python-curses is &lt;2.7.9-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180320" version="1" comment="python-tk is &lt;2.7.9-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180321" version="1" comment="python3-curses is &lt;3.4.1-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180322" version="1" comment="python-cupshelpers is &lt;1.5.7-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180323" version="1" comment="system-config-printer is &lt;1.5.7-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180324" version="1" comment="system-config-printer-common is &lt;1.5.7-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180325" version="1" comment="system-config-printer-common-lang is &lt;1.5.7-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180326" version="1" comment="system-config-printer-dbus-service is &lt;1.5.7-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180327" version="1" comment="udev-configure-printer is &lt;1.5.7-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180328" version="1" comment="python-libxml2 is &lt;2.9.4-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180329" version="1" comment="python-pyOpenSSL is &lt;16.0.0-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180330" version="1" comment="python-requests is &lt;2.8.1-6.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180331" version="1" comment="qemu is &lt;2.6.1-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180332" version="1" comment="qemu-block-curl is &lt;2.6.1-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180333" version="1" comment="qemu-ipxe is &lt;1.0.0-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180334" version="1" comment="qemu-kvm is &lt;2.6.1-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180335" version="1" comment="qemu-seabios is &lt;1.9.1-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180336" version="1" comment="qemu-sgabios is &lt;8-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180337" version="1" comment="qemu-tools is &lt;2.6.1-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180338" version="1" comment="qemu-vgabios is &lt;1.9.1-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180339" version="1" comment="qemu-x86 is &lt;2.6.1-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180340" version="1" comment="rhythmbox is &lt;3.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180341" version="1" comment="rhythmbox-lang is &lt;3.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180342" version="1" comment="rpcbind is &lt;0.2.3-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180343" version="1" comment="rpm is &lt;4.11.2-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180344" version="1" comment="rpm-32bit is &lt;4.11.2-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180345" version="1" comment="rpm-build is &lt;4.11.2-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180346" version="1" comment="rsync is &lt;3.1.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180347" version="1" comment="rsyslog is &lt;8.4.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180348" version="1" comment="shim is &lt;0.9-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180349" version="1" comment="socat is &lt;1.7.2.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180350" version="1" comment="squashfs is &lt;4.3-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180351" version="1" comment="strongswan is &lt;5.1.3-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180352" version="1" comment="strongswan-doc is &lt;5.1.3-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180353" version="1" comment="strongswan-ipsec is &lt;5.1.3-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180354" version="1" comment="strongswan-libs0 is &lt;5.1.3-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180355" version="1" comment="sudo is &lt;1.8.10p3-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180356" version="1" comment="supportutils is &lt;3.0-85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180357" version="1" comment="sysconfig is &lt;0.84.0-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180358" version="1" comment="sysconfig-netconfig is &lt;0.84.0-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180359" version="1" comment="sysvinit-tools is &lt;2.88+-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180360" version="1" comment="tar is &lt;1.27.1-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180361" version="1" comment="tar-lang is &lt;1.27.1-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180362" version="1" comment="tcpdump is &lt;4.5.1-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180363" version="1" comment="telepathy-gabble is &lt;0.18.3-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180364" version="1" comment="unixODBC is &lt;2.3.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180365" version="1" comment="unixODBC-32bit is &lt;2.3.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180366" version="1" comment="update-alternatives is &lt;1.18.4-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180367" version="1" comment="vino is &lt;3.20.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180368" version="1" comment="vino-lang is &lt;3.20.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180369" version="1" comment="w3m is &lt;0.5.3-157" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180370" version="1" comment="wget is &lt;1.14-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180371" version="1" comment="wireshark is &lt;1.12.13-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180372" version="1" comment="wpa_supplicant is &lt;2.2-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180373" version="1" comment="xen is &lt;4.7.0_12-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180374" version="1" comment="xen-libs is &lt;4.7.0_12-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180375" version="1" comment="xen-libs-32bit is &lt;4.7.0_12-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180376" version="1" comment="xf86-video-intel is &lt;2.99.917.641_ge4ef6e9-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180377" version="1" comment="xfsprogs is &lt;4.3.0-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180378" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180379" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180380" version="1" comment="xscreensaver is &lt;5.22-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180381" version="1" comment="xscreensaver-data is &lt;5.22-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180382" version="1" comment="yast2 is &lt;3.1.206-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180383" version="1" comment="yast2-core is &lt;3.1.23-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180384" version="1" comment="yast2-users is &lt;3.1.57-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159517" version="1" comment="sled-release is ==12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180385" version="1" comment="ImageMagick is &lt;6.8.8.1-70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180386" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180387" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180388" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180389" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180390" version="1" comment="MozillaFirefox is &lt;52.2.0esr-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180391" version="1" comment="MozillaFirefox-translations is &lt;52.2.0esr-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180392" version="1" comment="NetworkManager is &lt;1.0.12-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180393" version="1" comment="NetworkManager-lang is &lt;1.0.12-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180394" version="1" comment="libnm-glib-vpn1 is &lt;1.0.12-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180395" version="1" comment="libnm-glib4 is &lt;1.0.12-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180396" version="1" comment="libnm-util2 is &lt;1.0.12-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180397" version="1" comment="libnm0 is &lt;1.0.12-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180398" version="1" comment="typelib-1_0-NM-1_0 is &lt;1.0.12-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180399" version="1" comment="typelib-1_0-NMClient-1_0 is &lt;1.0.12-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180400" version="1" comment="typelib-1_0-NetworkManager-1_0 is &lt;1.0.12-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180401" version="1" comment="aaa_base is &lt;13.2+git20140911.61c1681-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180402" version="1" comment="aaa_base-extras is &lt;13.2+git20140911.61c1681-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180403" version="1" comment="alsa is &lt;1.0.27.2-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180404" version="1" comment="libasound2 is &lt;1.0.27.2-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180405" version="1" comment="libasound2-32bit is &lt;1.0.27.2-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180406" version="1" comment="apparmor-docs is &lt;2.8.2-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180407" version="1" comment="apparmor-parser is &lt;2.8.2-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180408" version="1" comment="apparmor-profiles is &lt;2.8.2-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180409" version="1" comment="apparmor-utils is &lt;2.8.2-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180410" version="1" comment="libapparmor1 is &lt;2.8.2-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180411" version="1" comment="libapparmor1-32bit is &lt;2.8.2-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180412" version="1" comment="pam_apparmor is &lt;2.8.2-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180413" version="1" comment="pam_apparmor-32bit is &lt;2.8.2-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180414" version="1" comment="perl-apparmor is &lt;2.8.2-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180415" version="1" comment="audiofile is &lt;0.3.6-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180416" version="1" comment="libaudiofile1 is &lt;0.3.6-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180417" version="1" comment="libaudiofile1-32bit is &lt;0.3.6-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180418" version="1" comment="augeas is &lt;1.2.0-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180419" version="1" comment="augeas-lenses is &lt;1.2.0-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180420" version="1" comment="libaugeas0 is &lt;1.2.0-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180421" version="1" comment="autofs is &lt;5.0.9-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180422" version="1" comment="bash is &lt;4.3-82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180423" version="1" comment="bash-doc is &lt;4.3-82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180424" version="1" comment="bash-lang is &lt;4.3-82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180425" version="1" comment="libreadline6 is &lt;6.3-82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180426" version="1" comment="libreadline6-32bit is &lt;6.3-82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180427" version="1" comment="readline-doc is &lt;6.3-82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180428" version="1" comment="bind-libs is &lt;9.9.9P1-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180429" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180430" version="1" comment="bind-utils is &lt;9.9.9P1-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180431" version="1" comment="clamav is &lt;0.99.2-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180432" version="1" comment="colord is &lt;1.3.3-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180433" version="1" comment="colord-lang is &lt;1.3.3-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180434" version="1" comment="libcolord2 is &lt;1.3.3-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180435" version="1" comment="libcolord2-32bit is &lt;1.3.3-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180436" version="1" comment="libcolorhug2 is &lt;1.3.3-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180437" version="1" comment="cpio is &lt;2.11-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180438" version="1" comment="cpio-lang is &lt;2.11-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180439" version="1" comment="cups is &lt;1.7.5-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180440" version="1" comment="cups-client is &lt;1.7.5-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180441" version="1" comment="cups-libs is &lt;1.7.5-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180442" version="1" comment="cups-libs-32bit is &lt;1.7.5-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180443" version="1" comment="cups-filters is &lt;1.0.58-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180444" version="1" comment="cups-filters-cups-browsed is &lt;1.0.58-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180445" version="1" comment="cups-filters-foomatic-rip is &lt;1.0.58-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180446" version="1" comment="cups-filters-ghostscript is &lt;1.0.58-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180447" version="1" comment="cups-pk-helper is &lt;0.2.5-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180448" version="1" comment="cups-pk-helper-lang is &lt;0.2.5-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180449" version="1" comment="curl is &lt;7.37.0-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180450" version="1" comment="libcurl4 is &lt;7.37.0-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180451" version="1" comment="libcurl4-32bit is &lt;7.37.0-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180452" version="1" comment="dbus-1 is &lt;1.8.22-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180453" version="1" comment="dbus-1-x11 is &lt;1.8.22-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180454" version="1" comment="libdbus-1-3 is &lt;1.8.22-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180455" version="1" comment="libdbus-1-3-32bit is &lt;1.8.22-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180456" version="1" comment="dnsmasq is &lt;2.76-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180457" version="1" comment="dracut is &lt;044-113" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180458" version="1" comment="drm-kmp-default is &lt;4.9.33_k4.4.73_5-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180459" version="1" comment="e2fsprogs is &lt;1.42.11-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180460" version="1" comment="libcom_err2 is &lt;1.42.11-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180461" version="1" comment="libcom_err2-32bit is &lt;1.42.11-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180462" version="1" comment="libext2fs2 is &lt;1.42.11-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180463" version="1" comment="emacs is &lt;24.3-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180464" version="1" comment="emacs-info is &lt;24.3-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180465" version="1" comment="emacs-x11 is &lt;24.3-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180466" version="1" comment="etags is &lt;24.3-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180467" version="1" comment="empathy is &lt;3.12.12-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180468" version="1" comment="empathy-lang is &lt;3.12.12-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180469" version="1" comment="telepathy-mission-control-plugin-goa is &lt;3.12.12-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180470" version="1" comment="expat is &lt;2.1.0-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180471" version="1" comment="libexpat1 is &lt;2.1.0-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180472" version="1" comment="libexpat1-32bit is &lt;2.1.0-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180473" version="1" comment="facter is &lt;2.4.6-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180474" version="1" comment="finch is &lt;2.12.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180475" version="1" comment="libpurple is &lt;2.12.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180476" version="1" comment="libpurple-branding-upstream is &lt;2.12.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180477" version="1" comment="libpurple-lang is &lt;2.12.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180478" version="1" comment="libpurple-plugin-sametime is &lt;2.12.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180479" version="1" comment="libpurple-tcl is &lt;2.12.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180480" version="1" comment="pidgin is &lt;2.12.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180481" version="1" comment="ft2demos is &lt;2.6.3-7.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180482" version="1" comment="gd is &lt;2.1.0-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180483" version="1" comment="gd-32bit is &lt;2.1.0-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180484" version="1" comment="gdk-pixbuf-lang is &lt;2.34.0-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180485" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.34.0-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180486" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.34.0-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180487" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.34.0-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180488" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.34.0-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180489" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.34.0-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180490" version="1" comment="gegl-0_2 is &lt;0.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180491" version="1" comment="gegl-0_2-lang is &lt;0.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180492" version="1" comment="libgegl-0_2-0 is &lt;0.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180493" version="1" comment="ghostscript is &lt;9.15-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180494" version="1" comment="ghostscript-x11 is &lt;9.15-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180495" version="1" comment="gimp is &lt;2.8.18-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180496" version="1" comment="gimp-lang is &lt;2.8.18-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180497" version="1" comment="gimp-plugins-python is &lt;2.8.18-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180498" version="1" comment="libgimp-2_0-0 is &lt;2.8.18-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180499" version="1" comment="libgimpui-2_0-0 is &lt;2.8.18-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180500" version="1" comment="glibc is &lt;2.22-61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180501" version="1" comment="glibc-32bit is &lt;2.22-61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180502" version="1" comment="glibc-devel is &lt;2.22-61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180503" version="1" comment="glibc-devel-32bit is &lt;2.22-61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180504" version="1" comment="glibc-i18ndata is &lt;2.22-61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180505" version="1" comment="glibc-locale is &lt;2.22-61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180506" version="1" comment="glibc-locale-32bit is &lt;2.22-61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180507" version="1" comment="nscd is &lt;2.22-61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180508" version="1" comment="gnome-online-accounts is &lt;3.20.5-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180509" version="1" comment="gnome-online-accounts-lang is &lt;3.20.5-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180510" version="1" comment="libgoa-1_0-0 is &lt;3.20.5-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180511" version="1" comment="libgoa-1_0-0-32bit is &lt;3.20.5-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180512" version="1" comment="libgoa-backend-1_0-1 is &lt;3.20.5-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180513" version="1" comment="typelib-1_0-Goa-1_0 is &lt;3.20.5-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180514" version="1" comment="gnome-settings-daemon is &lt;3.20.1-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180515" version="1" comment="gnome-settings-daemon-lang is &lt;3.20.1-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180516" version="1" comment="gnome-shell is &lt;3.20.4-76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180517" version="1" comment="gnome-shell-browser-plugin is &lt;3.20.4-76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180518" version="1" comment="gnome-shell-calendar is &lt;3.20.4-76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180519" version="1" comment="gnome-shell-lang is &lt;3.20.4-76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180520" version="1" comment="gnutls is &lt;3.3.27-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180521" version="1" comment="libgnutls28 is &lt;3.3.27-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180522" version="1" comment="libgnutls28-32bit is &lt;3.3.27-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180523" version="1" comment="gpg2 is &lt;2.0.24-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180524" version="1" comment="gpg2-lang is &lt;2.0.24-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180525" version="1" comment="grub2 is &lt;2.02-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180526" version="1" comment="grub2-i386-pc is &lt;2.02-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180527" version="1" comment="grub2-snapper-plugin is &lt;2.02-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180528" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.02-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180529" version="1" comment="grub2-x86_64-efi is &lt;2.02-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180530" version="1" comment="grub2-x86_64-xen is &lt;2.02-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180531" version="1" comment="gstreamer is &lt;1.8.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180532" version="1" comment="gstreamer-lang is &lt;1.8.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180533" version="1" comment="gstreamer-utils is &lt;1.8.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180534" version="1" comment="libgstreamer-1_0-0 is &lt;1.8.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180535" version="1" comment="libgstreamer-1_0-0-32bit is &lt;1.8.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180536" version="1" comment="typelib-1_0-Gst-1_0 is &lt;1.8.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180537" version="1" comment="gstreamer-0_10-plugins-bad is &lt;0.10.23-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180538" version="1" comment="gstreamer-0_10-plugins-bad-lang is &lt;0.10.23-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180539" version="1" comment="libgstbasecamerabinsrc-0_10-23 is &lt;0.10.23-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180540" version="1" comment="libgstbasecamerabinsrc-0_10-23-32bit is &lt;0.10.23-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180541" version="1" comment="libgstbasevideo-0_10-23 is &lt;0.10.23-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180542" version="1" comment="libgstbasevideo-0_10-23-32bit is &lt;0.10.23-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180543" version="1" comment="libgstcodecparsers-0_10-23 is &lt;0.10.23-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180544" version="1" comment="libgstphotography-0_10-23 is &lt;0.10.23-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180545" version="1" comment="libgstphotography-0_10-23-32bit is &lt;0.10.23-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180546" version="1" comment="libgstsignalprocessor-0_10-23 is &lt;0.10.23-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180547" version="1" comment="libgstsignalprocessor-0_10-23-32bit is &lt;0.10.23-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180548" version="1" comment="libgstvdp-0_10-23 is &lt;0.10.23-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180549" version="1" comment="libgstvdp-0_10-23-32bit is &lt;0.10.23-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180550" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.36-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180551" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.36-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180552" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.36-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180553" version="1" comment="libgstapp-0_10-0 is &lt;0.10.36-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180554" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.36-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180555" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.36-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180556" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.36-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180557" version="1" comment="gstreamer-0_10-plugins-good is &lt;0.10.31-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180558" version="1" comment="gstreamer-0_10-plugins-good-lang is &lt;0.10.31-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180559" version="1" comment="gstreamer-plugins-bad is &lt;1.8.3-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180560" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.8.3-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180561" version="1" comment="libgstadaptivedemux-1_0-0 is &lt;1.8.3-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180562" version="1" comment="libgstbadaudio-1_0-0 is &lt;1.8.3-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180563" version="1" comment="libgstbadbase-1_0-0 is &lt;1.8.3-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180564" version="1" comment="libgstbadvideo-1_0-0 is &lt;1.8.3-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180565" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.8.3-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180566" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.8.3-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180567" version="1" comment="libgstgl-1_0-0 is &lt;1.8.3-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180568" version="1" comment="libgstmpegts-1_0-0 is &lt;1.8.3-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180569" version="1" comment="libgstphotography-1_0-0 is &lt;1.8.3-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180570" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.8.3-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180571" version="1" comment="gstreamer-plugins-base is &lt;1.8.3-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180572" version="1" comment="gstreamer-plugins-base-lang is &lt;1.8.3-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180573" version="1" comment="libgstallocators-1_0-0 is &lt;1.8.3-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180574" version="1" comment="libgstapp-1_0-0 is &lt;1.8.3-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180575" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.8.3-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180576" version="1" comment="libgstaudio-1_0-0 is &lt;1.8.3-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180577" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.8.3-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180578" version="1" comment="libgstfft-1_0-0 is &lt;1.8.3-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180579" version="1" comment="libgstfft-1_0-0-32bit is &lt;1.8.3-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180580" version="1" comment="libgstpbutils-1_0-0 is &lt;1.8.3-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180581" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.8.3-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180582" version="1" comment="libgstriff-1_0-0 is &lt;1.8.3-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180583" version="1" comment="libgstrtp-1_0-0 is &lt;1.8.3-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180584" version="1" comment="libgstrtsp-1_0-0 is &lt;1.8.3-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180585" version="1" comment="libgstsdp-1_0-0 is &lt;1.8.3-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180586" version="1" comment="libgsttag-1_0-0 is &lt;1.8.3-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180587" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.8.3-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180588" version="1" comment="libgstvideo-1_0-0 is &lt;1.8.3-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180589" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.8.3-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180590" version="1" comment="typelib-1_0-GstAudio-1_0 is &lt;1.8.3-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180591" version="1" comment="typelib-1_0-GstPbutils-1_0 is &lt;1.8.3-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180592" version="1" comment="typelib-1_0-GstTag-1_0 is &lt;1.8.3-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180593" version="1" comment="typelib-1_0-GstVideo-1_0 is &lt;1.8.3-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180594" version="1" comment="gstreamer-plugins-good is &lt;1.8.3-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180595" version="1" comment="gstreamer-plugins-good-lang is &lt;1.8.3-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180596" version="1" comment="guile is &lt;2.0.9-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180597" version="1" comment="guile-modules-2_0 is &lt;2.0.9-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180598" version="1" comment="libguile-2_0-22 is &lt;2.0.9-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180599" version="1" comment="gvim is &lt;7.4.326-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180600" version="1" comment="vim is &lt;7.4.326-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180601" version="1" comment="vim-data is &lt;7.4.326-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180602" version="1" comment="hplip is &lt;3.16.11-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180603" version="1" comment="hplip-hpijs is &lt;3.16.11-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180604" version="1" comment="hplip-sane is &lt;3.16.11-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180605" version="1" comment="ibus-pinyin is &lt;1.5.0-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180606" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.141-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180607" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.141-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180608" version="1" comment="java-1_7_0-openjdk-plugin is &lt;1.6.2-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180609" version="1" comment="java-1_8_0-openjdk-plugin is &lt;1.6.2-2.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180610" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.131-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180611" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.131-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180612" version="1" comment="kdump is &lt;0.8.16-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180613" version="1" comment="kernel-default is &lt;4.4.73-5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180614" version="1" comment="kernel-default-devel is &lt;4.4.73-5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180615" version="1" comment="kernel-default-extra is &lt;4.4.73-5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180616" version="1" comment="kernel-devel is &lt;4.4.73-5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180617" version="1" comment="kernel-macros is &lt;4.4.73-5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180618" version="1" comment="kernel-source is &lt;4.4.73-5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180619" version="1" comment="kernel-syms is &lt;4.4.73-5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180620" version="1" comment="lftp is &lt;4.7.4-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180621" version="1" comment="libQt5Concurrent5 is &lt;5.6.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180622" version="1" comment="libQt5Core5 is &lt;5.6.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180623" version="1" comment="libQt5DBus5 is &lt;5.6.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180624" version="1" comment="libQt5Gui5 is &lt;5.6.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180625" version="1" comment="libQt5Network5 is &lt;5.6.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180626" version="1" comment="libQt5OpenGL5 is &lt;5.6.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180627" version="1" comment="libQt5PrintSupport5 is &lt;5.6.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180628" version="1" comment="libQt5Sql5 is &lt;5.6.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180629" version="1" comment="libQt5Sql5-mysql is &lt;5.6.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180630" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180631" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180632" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180633" version="1" comment="libQt5Test5 is &lt;5.6.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180634" version="1" comment="libQt5Widgets5 is &lt;5.6.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180635" version="1" comment="libQt5Xml5 is &lt;5.6.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180636" version="1" comment="libQt5WebKit5 is &lt;5.6.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180637" version="1" comment="libQt5WebKit5-imports is &lt;5.6.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180638" version="1" comment="libQt5WebKitWidgets5 is &lt;5.6.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180639" version="1" comment="libX11-6 is &lt;1.6.2-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180640" version="1" comment="libX11-6-32bit is &lt;1.6.2-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180641" version="1" comment="libX11-data is &lt;1.6.2-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180642" version="1" comment="libX11-xcb1 is &lt;1.6.2-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180643" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180644" version="1" comment="libXfixes3 is &lt;5.0.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180645" version="1" comment="libXfixes3-32bit is &lt;5.0.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180646" version="1" comment="libXi6 is &lt;1.7.4-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180647" version="1" comment="libXi6-32bit is &lt;1.7.4-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180648" version="1" comment="libXpm4 is &lt;3.5.11-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180649" version="1" comment="libXpm4-32bit is &lt;3.5.11-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180650" version="1" comment="libXrender1 is &lt;0.9.8-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180651" version="1" comment="libXrender1-32bit is &lt;0.9.8-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180652" version="1" comment="libXtst6 is &lt;1.2.2-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180653" version="1" comment="libXtst6-32bit is &lt;1.2.2-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180654" version="1" comment="libXv1 is &lt;1.0.10-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180655" version="1" comment="libXv1-32bit is &lt;1.0.10-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180656" version="1" comment="libXvMC1 is &lt;1.0.8-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180657" version="1" comment="libXvnc1 is &lt;1.6.0-18.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180658" version="1" comment="tigervnc is &lt;1.6.0-18.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180659" version="1" comment="xorg-x11-Xvnc is &lt;1.6.0-18.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180660" version="1" comment="libarchive13 is &lt;3.1.2-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180661" version="1" comment="libasan2 is &lt;5.3.1+r233831-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180662" version="1" comment="libasan2-32bit is &lt;5.3.1+r233831-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180663" version="1" comment="libffi4 is &lt;5.3.1+r233831-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180664" version="1" comment="libffi4-32bit is &lt;5.3.1+r233831-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180665" version="1" comment="libmpx0 is &lt;5.3.1+r233831-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180666" version="1" comment="libmpx0-32bit is &lt;5.3.1+r233831-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180667" version="1" comment="libmpxwrappers0 is &lt;5.3.1+r233831-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180668" version="1" comment="libmpxwrappers0-32bit is &lt;5.3.1+r233831-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180669" version="1" comment="libass5 is &lt;0.10.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180670" version="1" comment="libblkid1 is &lt;2.29.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180671" version="1" comment="libblkid1-32bit is &lt;2.29.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180672" version="1" comment="libfdisk1 is &lt;2.29.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180673" version="1" comment="libmount1 is &lt;2.29.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180674" version="1" comment="libmount1-32bit is &lt;2.29.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180675" version="1" comment="libsmartcols1 is &lt;2.29.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180676" version="1" comment="libuuid-devel is &lt;2.29.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180677" version="1" comment="libuuid1 is &lt;2.29.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180678" version="1" comment="libuuid1-32bit is &lt;2.29.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180679" version="1" comment="python-libmount is &lt;2.29.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180680" version="1" comment="util-linux is &lt;2.29.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180681" version="1" comment="util-linux-lang is &lt;2.29.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180682" version="1" comment="util-linux-systemd is &lt;2.29.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180683" version="1" comment="uuidd is &lt;2.29.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180684" version="1" comment="libcairo-gobject2 is &lt;1.15.2-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180685" version="1" comment="libcairo-gobject2-32bit is &lt;1.15.2-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180686" version="1" comment="libcairo-script-interpreter2 is &lt;1.15.2-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180687" version="1" comment="libcairo2 is &lt;1.15.2-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180688" version="1" comment="libcairo2-32bit is &lt;1.15.2-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180689" version="1" comment="libcares2 is &lt;1.9.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180690" version="1" comment="libcares2-32bit is &lt;1.9.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180691" version="1" comment="libcgroup1 is &lt;0.41.rc1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180692" version="1" comment="libdcerpc-binding0 is &lt;4.6.5+git.27.6afd48b1083-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180693" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.5+git.27.6afd48b1083-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180694" version="1" comment="libdcerpc0 is &lt;4.6.5+git.27.6afd48b1083-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180695" version="1" comment="libdcerpc0-32bit is &lt;4.6.5+git.27.6afd48b1083-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180696" version="1" comment="libndr-krb5pac0 is &lt;4.6.5+git.27.6afd48b1083-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180697" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.5+git.27.6afd48b1083-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180698" version="1" comment="libndr-nbt0 is &lt;4.6.5+git.27.6afd48b1083-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180699" version="1" comment="libndr-nbt0-32bit is &lt;4.6.5+git.27.6afd48b1083-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180700" version="1" comment="libndr-standard0 is &lt;4.6.5+git.27.6afd48b1083-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180701" version="1" comment="libndr-standard0-32bit is &lt;4.6.5+git.27.6afd48b1083-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180702" version="1" comment="libndr0 is &lt;4.6.5+git.27.6afd48b1083-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180703" version="1" comment="libndr0-32bit is &lt;4.6.5+git.27.6afd48b1083-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180704" version="1" comment="libnetapi0 is &lt;4.6.5+git.27.6afd48b1083-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180705" version="1" comment="libnetapi0-32bit is &lt;4.6.5+git.27.6afd48b1083-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180706" version="1" comment="libsamba-credentials0 is &lt;4.6.5+git.27.6afd48b1083-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180707" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.5+git.27.6afd48b1083-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180708" version="1" comment="libsamba-errors0 is &lt;4.6.5+git.27.6afd48b1083-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180709" version="1" comment="libsamba-errors0-32bit is &lt;4.6.5+git.27.6afd48b1083-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180710" version="1" comment="libsamba-hostconfig0 is &lt;4.6.5+git.27.6afd48b1083-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180711" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.5+git.27.6afd48b1083-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180712" version="1" comment="libsamba-passdb0 is &lt;4.6.5+git.27.6afd48b1083-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180713" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.5+git.27.6afd48b1083-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180714" version="1" comment="libsamba-util0 is &lt;4.6.5+git.27.6afd48b1083-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180715" version="1" comment="libsamba-util0-32bit is &lt;4.6.5+git.27.6afd48b1083-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180716" version="1" comment="libsamdb0 is &lt;4.6.5+git.27.6afd48b1083-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180717" version="1" comment="libsamdb0-32bit is &lt;4.6.5+git.27.6afd48b1083-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180718" version="1" comment="libsmbclient0 is &lt;4.6.5+git.27.6afd48b1083-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180719" version="1" comment="libsmbclient0-32bit is &lt;4.6.5+git.27.6afd48b1083-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180720" version="1" comment="libsmbconf0 is &lt;4.6.5+git.27.6afd48b1083-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180721" version="1" comment="libsmbconf0-32bit is &lt;4.6.5+git.27.6afd48b1083-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180722" version="1" comment="libsmbldap0 is &lt;4.6.5+git.27.6afd48b1083-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180723" version="1" comment="libsmbldap0-32bit is &lt;4.6.5+git.27.6afd48b1083-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180724" version="1" comment="libtevent-util0 is &lt;4.6.5+git.27.6afd48b1083-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180725" version="1" comment="libtevent-util0-32bit is &lt;4.6.5+git.27.6afd48b1083-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180726" version="1" comment="libwbclient0 is &lt;4.6.5+git.27.6afd48b1083-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180727" version="1" comment="libwbclient0-32bit is &lt;4.6.5+git.27.6afd48b1083-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180728" version="1" comment="samba is &lt;4.6.5+git.27.6afd48b1083-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180729" version="1" comment="samba-client is &lt;4.6.5+git.27.6afd48b1083-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180730" version="1" comment="samba-client-32bit is &lt;4.6.5+git.27.6afd48b1083-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180731" version="1" comment="samba-doc is &lt;4.6.5+git.27.6afd48b1083-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180732" version="1" comment="samba-libs is &lt;4.6.5+git.27.6afd48b1083-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180733" version="1" comment="samba-libs-32bit is &lt;4.6.5+git.27.6afd48b1083-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180734" version="1" comment="samba-winbind is &lt;4.6.5+git.27.6afd48b1083-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180735" version="1" comment="samba-winbind-32bit is &lt;4.6.5+git.27.6afd48b1083-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180736" version="1" comment="libecpg6 is &lt;9.6.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180737" version="1" comment="libpq5 is &lt;9.6.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180738" version="1" comment="libpq5-32bit is &lt;9.6.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180739" version="1" comment="postgresql96 is &lt;9.6.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180740" version="1" comment="libfbembed2_5 is &lt;2.5.2.26539-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180741" version="1" comment="libfreebl3 is &lt;3.29.5-57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180742" version="1" comment="libfreebl3-32bit is &lt;3.29.5-57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180743" version="1" comment="libsoftokn3 is &lt;3.29.5-57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180744" version="1" comment="libsoftokn3-32bit is &lt;3.29.5-57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180745" version="1" comment="mozilla-nss is &lt;3.29.5-57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180746" version="1" comment="mozilla-nss-32bit is &lt;3.29.5-57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180747" version="1" comment="mozilla-nss-certs is &lt;3.29.5-57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180748" version="1" comment="mozilla-nss-certs-32bit is &lt;3.29.5-57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180749" version="1" comment="mozilla-nss-sysinit is &lt;3.29.5-57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180750" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.29.5-57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180751" version="1" comment="mozilla-nss-tools is &lt;3.29.5-57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180752" version="1" comment="libfreetype6 is &lt;2.6.3-7.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180753" version="1" comment="libfreetype6-32bit is &lt;2.6.3-7.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180754" version="1" comment="libgc1 is &lt;7.2d-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180755" version="1" comment="libgcrypt20 is &lt;1.6.1-16.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180756" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180757" version="1" comment="libgme0 is &lt;0.6.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180758" version="1" comment="libgraphite2-3 is &lt;1.3.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180759" version="1" comment="libgraphite2-3-32bit is &lt;1.3.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180760" version="1" comment="libhogweed2 is &lt;2.7.1-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180761" version="1" comment="libhogweed2-32bit is &lt;2.7.1-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180762" version="1" comment="libnettle4 is &lt;2.7.1-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180763" version="1" comment="libnettle4-32bit is &lt;2.7.1-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180764" version="1" comment="libipa_hbac0 is &lt;1.13.4-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180765" version="1" comment="libsss_idmap0 is &lt;1.13.4-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180766" version="1" comment="libsss_nss_idmap0 is &lt;1.13.4-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180767" version="1" comment="libsss_sudo is &lt;1.13.4-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180768" version="1" comment="python-sssd-config is &lt;1.13.4-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180769" version="1" comment="sssd is &lt;1.13.4-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180770" version="1" comment="sssd-32bit is &lt;1.13.4-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180771" version="1" comment="sssd-ad is &lt;1.13.4-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180772" version="1" comment="sssd-ipa is &lt;1.13.4-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180773" version="1" comment="sssd-krb5 is &lt;1.13.4-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180774" version="1" comment="sssd-krb5-common is &lt;1.13.4-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180775" version="1" comment="sssd-ldap is &lt;1.13.4-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180776" version="1" comment="sssd-proxy is &lt;1.13.4-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180777" version="1" comment="sssd-tools is &lt;1.13.4-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180778" version="1" comment="libjasper1 is &lt;1.900.14-194" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180779" version="1" comment="libjasper1-32bit is &lt;1.900.14-194" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180780" version="1" comment="libkde4 is &lt;4.12.0-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180781" version="1" comment="libkde4-32bit is &lt;4.12.0-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180782" version="1" comment="libkdecore4 is &lt;4.12.0-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180783" version="1" comment="libkdecore4-32bit is &lt;4.12.0-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180784" version="1" comment="libksuseinstall1 is &lt;4.12.0-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180785" version="1" comment="libksuseinstall1-32bit is &lt;4.12.0-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180786" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180787" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180788" version="1" comment="openldap2-client is &lt;2.4.41-18.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180789" version="1" comment="libldb1 is &lt;1.1.29-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180790" version="1" comment="libldb1-32bit is &lt;1.1.29-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180791" version="1" comment="libltdl7 is &lt;2.4.2-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180792" version="1" comment="libltdl7-32bit is &lt;2.4.2-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180793" version="1" comment="liblua5_2 is &lt;5.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180794" version="1" comment="lua is &lt;5.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180795" version="1" comment="libmysqlclient18 is &lt;10.0.30-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180796" version="1" comment="libmysqlclient18-32bit is &lt;10.0.30-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180797" version="1" comment="libmysqlclient_r18 is &lt;10.0.30-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180798" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.30-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180799" version="1" comment="mariadb is &lt;10.0.30-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180800" version="1" comment="mariadb-client is &lt;10.0.30-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180801" version="1" comment="mariadb-errormessages is &lt;10.0.30-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180802" version="1" comment="libnetpbm11 is &lt;10.66.3-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180803" version="1" comment="libnetpbm11-32bit is &lt;10.66.3-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180804" version="1" comment="netpbm is &lt;10.66.3-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180805" version="1" comment="libopenjp2-7 is &lt;2.1.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180806" version="1" comment="libopenssl-devel is &lt;1.0.2j-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180807" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180808" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180809" version="1" comment="openssl is &lt;1.0.2j-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180810" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180811" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180812" version="1" comment="libopus0 is &lt;1.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180813" version="1" comment="libosip2 is &lt;3.5.0-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180814" version="1" comment="libpcre1 is &lt;8.39-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180815" version="1" comment="libpcre1-32bit is &lt;8.39-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180816" version="1" comment="libpcre16-0 is &lt;8.39-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180817" version="1" comment="libpcrecpp0 is &lt;8.39-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180818" version="1" comment="libpcrecpp0-32bit is &lt;8.39-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180819" version="1" comment="libpcsclite1 is &lt;1.8.10-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180820" version="1" comment="libpcsclite1-32bit is &lt;1.8.10-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180821" version="1" comment="pcsc-lite is &lt;1.8.10-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180822" version="1" comment="libplist++3 is &lt;1.12-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180823" version="1" comment="libplist3 is &lt;1.12-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180824" version="1" comment="libpng12-0 is &lt;1.2.50-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180825" version="1" comment="libpng12-0-32bit is &lt;1.2.50-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180826" version="1" comment="libpng15-15 is &lt;1.5.22-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180827" version="1" comment="libpng16-16 is &lt;1.6.8-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180828" version="1" comment="libpng16-16-32bit is &lt;1.6.8-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180829" version="1" comment="libpulse-mainloop-glib0 is &lt;5.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180830" version="1" comment="libpulse-mainloop-glib0-32bit is &lt;5.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180831" version="1" comment="libpulse0 is &lt;5.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180832" version="1" comment="libpulse0-32bit is &lt;5.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180833" version="1" comment="pulseaudio is &lt;5.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180834" version="1" comment="pulseaudio-esound-compat is &lt;5.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180835" version="1" comment="pulseaudio-gdm-hooks is &lt;5.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180836" version="1" comment="pulseaudio-lang is &lt;5.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180837" version="1" comment="pulseaudio-module-bluetooth is &lt;5.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180838" version="1" comment="pulseaudio-module-gconf is &lt;5.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180839" version="1" comment="pulseaudio-module-jack is &lt;5.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180840" version="1" comment="pulseaudio-module-lirc is &lt;5.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180841" version="1" comment="pulseaudio-module-x11 is &lt;5.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180842" version="1" comment="pulseaudio-module-zeroconf is &lt;5.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180843" version="1" comment="pulseaudio-utils is &lt;5.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180844" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180845" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180846" version="1" comment="python-base is &lt;2.7.13-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180847" version="1" comment="python-devel is &lt;2.7.13-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180848" version="1" comment="python-xml is &lt;2.7.13-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180849" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180850" version="1" comment="python3-base is &lt;3.4.6-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180851" version="1" comment="libquicktime0 is &lt;1.2.4-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180852" version="1" comment="libreoffice is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180853" version="1" comment="libreoffice-base is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180854" version="1" comment="libreoffice-base-drivers-mysql is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180855" version="1" comment="libreoffice-base-drivers-postgresql is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180856" version="1" comment="libreoffice-calc is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180857" version="1" comment="libreoffice-calc-extensions is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180858" version="1" comment="libreoffice-draw is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180859" version="1" comment="libreoffice-filters-optional is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180860" version="1" comment="libreoffice-gnome is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180861" version="1" comment="libreoffice-icon-theme-galaxy is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180862" version="1" comment="libreoffice-icon-theme-tango is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180863" version="1" comment="libreoffice-impress is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180864" version="1" comment="libreoffice-l10n-af is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180865" version="1" comment="libreoffice-l10n-ar is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180866" version="1" comment="libreoffice-l10n-ca is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180867" version="1" comment="libreoffice-l10n-cs is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180868" version="1" comment="libreoffice-l10n-da is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180869" version="1" comment="libreoffice-l10n-de is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180870" version="1" comment="libreoffice-l10n-en is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180871" version="1" comment="libreoffice-l10n-es is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180872" version="1" comment="libreoffice-l10n-fi is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180873" version="1" comment="libreoffice-l10n-fr is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180874" version="1" comment="libreoffice-l10n-gu is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180875" version="1" comment="libreoffice-l10n-hi is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180876" version="1" comment="libreoffice-l10n-hu is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180877" version="1" comment="libreoffice-l10n-it is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180878" version="1" comment="libreoffice-l10n-ja is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180879" version="1" comment="libreoffice-l10n-ko is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180880" version="1" comment="libreoffice-l10n-nb is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180881" version="1" comment="libreoffice-l10n-nl is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180882" version="1" comment="libreoffice-l10n-nn is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180883" version="1" comment="libreoffice-l10n-pl is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180884" version="1" comment="libreoffice-l10n-pt_BR is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180885" version="1" comment="libreoffice-l10n-pt_PT is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180886" version="1" comment="libreoffice-l10n-ro is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180887" version="1" comment="libreoffice-l10n-ru is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180888" version="1" comment="libreoffice-l10n-sk is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180889" version="1" comment="libreoffice-l10n-sv is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180890" version="1" comment="libreoffice-l10n-xh is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180891" version="1" comment="libreoffice-l10n-zh_CN is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180892" version="1" comment="libreoffice-l10n-zh_TW is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180893" version="1" comment="libreoffice-l10n-zu is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180894" version="1" comment="libreoffice-mailmerge is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180895" version="1" comment="libreoffice-math is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180896" version="1" comment="libreoffice-officebean is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180897" version="1" comment="libreoffice-pyuno is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180898" version="1" comment="libreoffice-writer is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180899" version="1" comment="libreoffice-writer-extensions is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180900" version="1" comment="libreofficekit is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180901" version="1" comment="libruby2_1-2_1 is &lt;2.1.9-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180902" version="1" comment="ruby2.1 is &lt;2.1.9-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180903" version="1" comment="ruby2.1-stdlib is &lt;2.1.9-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180904" version="1" comment="libsndfile1 is &lt;1.0.25-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180905" version="1" comment="libsndfile1-32bit is &lt;1.0.25-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180906" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.33-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180907" version="1" comment="libspice-client-glib-helper is &lt;0.33-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180908" version="1" comment="libspice-client-gtk-3_0-5 is &lt;0.33-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180909" version="1" comment="libspice-controller0 is &lt;0.33-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180910" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.33-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180911" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.33-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180912" version="1" comment="libspice-server1 is &lt;0.12.8-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180913" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180914" version="1" comment="libsqlite3-0-32bit is &lt;3.8.10.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180915" version="1" comment="sqlite3 is &lt;3.8.10.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180916" version="1" comment="libsystemd0 is &lt;228-142" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180917" version="1" comment="libsystemd0-32bit is &lt;228-142" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180918" version="1" comment="libudev1 is &lt;228-142" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180919" version="1" comment="libudev1-32bit is &lt;228-142" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180920" version="1" comment="systemd is &lt;228-142" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180921" version="1" comment="systemd-32bit is &lt;228-142" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180922" version="1" comment="systemd-bash-completion is &lt;228-142" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180923" version="1" comment="systemd-sysvinit is &lt;228-142" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180924" version="1" comment="udev is &lt;228-142" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180925" version="1" comment="libtasn1 is &lt;4.9-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180926" version="1" comment="libtasn1-6 is &lt;4.9-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180927" version="1" comment="libtasn1-6-32bit is &lt;4.9-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180928" version="1" comment="libtiff5 is &lt;4.0.7-43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180929" version="1" comment="libtiff5-32bit is &lt;4.0.7-43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180930" version="1" comment="libtirpc-netconfig is &lt;1.0.1-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180931" version="1" comment="libtirpc3 is &lt;1.0.1-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180932" version="1" comment="libtirpc3-32bit is &lt;1.0.1-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180933" version="1" comment="libvirglrenderer0 is &lt;0.5.0-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180934" version="1" comment="libvirt is &lt;3.3.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180935" version="1" comment="libvirt-admin is &lt;3.3.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180936" version="1" comment="libvirt-client is &lt;3.3.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180937" version="1" comment="libvirt-daemon is &lt;3.3.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180938" version="1" comment="libvirt-daemon-config-network is &lt;3.3.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180939" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.3.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180940" version="1" comment="libvirt-daemon-driver-interface is &lt;3.3.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180941" version="1" comment="libvirt-daemon-driver-libxl is &lt;3.3.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180942" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.3.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180943" version="1" comment="libvirt-daemon-driver-network is &lt;3.3.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180944" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.3.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180945" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.3.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180946" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.3.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180947" version="1" comment="libvirt-daemon-driver-secret is &lt;3.3.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180948" version="1" comment="libvirt-daemon-driver-storage is &lt;3.3.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180949" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.3.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180950" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.3.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180951" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.3.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180952" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.3.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180953" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.3.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180954" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;3.3.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180955" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.3.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180956" version="1" comment="libvirt-daemon-lxc is &lt;3.3.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180957" version="1" comment="libvirt-daemon-qemu is &lt;3.3.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180958" version="1" comment="libvirt-daemon-xen is &lt;3.3.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180959" version="1" comment="libvirt-doc is &lt;3.3.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180960" version="1" comment="libvirt-libs is &lt;3.3.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180961" version="1" comment="libvmtools0 is &lt;10.1.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180962" version="1" comment="open-vm-tools is &lt;10.1.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180963" version="1" comment="open-vm-tools-desktop is &lt;10.1.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180964" version="1" comment="libwireshark8 is &lt;2.2.7-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180965" version="1" comment="libwiretap6 is &lt;2.2.7-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180966" version="1" comment="libwscodecs1 is &lt;2.2.7-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180967" version="1" comment="libwsutil7 is &lt;2.2.7-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180968" version="1" comment="wireshark is &lt;2.2.7-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180969" version="1" comment="wireshark-gtk is &lt;2.2.7-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180970" version="1" comment="libxml2-2 is &lt;2.9.4-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180971" version="1" comment="libxml2-2-32bit is &lt;2.9.4-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180972" version="1" comment="libxml2-tools is &lt;2.9.4-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180973" version="1" comment="libxslt-tools is &lt;1.1.28-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180974" version="1" comment="libxslt1 is &lt;1.1.28-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180975" version="1" comment="libxslt1-32bit is &lt;1.1.28-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180976" version="1" comment="libz1 is &lt;1.2.8-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180977" version="1" comment="libz1-32bit is &lt;1.2.8-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:200918" version="1" comment="zlib-devel is &lt;1.2.8-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180979" version="1" comment="libzmq3 is &lt;4.0.4-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180980" version="1" comment="libzzip-0-13 is &lt;0.13.62-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180981" version="1" comment="logrotate is &lt;3.11.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180982" version="1" comment="minicom is &lt;2.7-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180983" version="1" comment="mozilla-nspr is &lt;4.13.1-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180984" version="1" comment="mozilla-nspr-32bit is &lt;4.13.1-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180985" version="1" comment="ntp is &lt;4.2.8p10-63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180986" version="1" comment="ntp-doc is &lt;4.2.8p10-63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180987" version="1" comment="openslp is &lt;2.0.0-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180988" version="1" comment="openslp-32bit is &lt;2.0.0-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180989" version="1" comment="openssh is &lt;7.2p2-69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180990" version="1" comment="openssh-helpers is &lt;7.2p2-69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180991" version="1" comment="openvpn is &lt;2.3.8-16.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180992" version="1" comment="pam is &lt;1.1.8-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180993" version="1" comment="pam-32bit is &lt;1.1.8-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180994" version="1" comment="pam-doc is &lt;1.1.8-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180995" version="1" comment="pcsc-ccid is &lt;1.4.25-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180998" version="1" comment="puppet is &lt;3.8.5-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009180999" version="1" comment="python is &lt;2.7.13-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181000" version="1" comment="python-curses is &lt;2.7.13-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181001" version="1" comment="python-tk is &lt;2.7.13-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181002" version="1" comment="python-libxml2 is &lt;2.9.4-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181003" version="1" comment="python-requests is &lt;2.8.1-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181004" version="1" comment="python3 is &lt;3.4.6-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181005" version="1" comment="python3-curses is &lt;3.4.6-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181006" version="1" comment="qemu is &lt;2.9.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181007" version="1" comment="qemu-block-curl is &lt;2.9.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181008" version="1" comment="qemu-kvm is &lt;2.9.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181009" version="1" comment="qemu-seabios is &lt;1.10.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181010" version="1" comment="qemu-tools is &lt;2.9.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181011" version="1" comment="qemu-vgabios is &lt;1.10.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181012" version="1" comment="qemu-x86 is &lt;2.9.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181013" version="1" comment="rpcbind is &lt;0.2.3-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181014" version="1" comment="rrdtool is &lt;1.4.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181015" version="1" comment="rrdtool-cached is &lt;1.4.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181016" version="1" comment="rsyslog is &lt;8.24.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181017" version="1" comment="sane-backends is &lt;1.0.24-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181018" version="1" comment="sane-backends-32bit is &lt;1.0.24-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181019" version="1" comment="sane-backends-autoconfig is &lt;1.0.24-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181020" version="1" comment="sblim-sfcb is &lt;1.4.8-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181021" version="1" comment="shim is &lt;0.9-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181022" version="1" comment="strongswan is &lt;5.1.3-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181023" version="1" comment="strongswan-doc is &lt;5.1.3-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181024" version="1" comment="strongswan-ipsec is &lt;5.1.3-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181025" version="1" comment="strongswan-libs0 is &lt;5.1.3-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181026" version="1" comment="sudo is &lt;1.8.20p2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181027" version="1" comment="supportutils is &lt;3.0-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181028" version="1" comment="sysvinit-tools is &lt;2.88+-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181029" version="1" comment="tar is &lt;1.27.1-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181030" version="1" comment="tar-lang is &lt;1.27.1-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181031" version="1" comment="tcpdump is &lt;4.9.0-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181032" version="1" comment="unrar is &lt;5.0.14-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181033" version="1" comment="w3m is &lt;0.5.3.git20161120-160" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181034" version="1" comment="wget is &lt;1.14-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181035" version="1" comment="xen is &lt;4.9.0_08-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181036" version="1" comment="xen-libs is &lt;4.9.0_08-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181037" version="1" comment="xen-libs-32bit is &lt;4.9.0_08-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181038" version="1" comment="xf86-video-intel is &lt;2.99.917.770_gcb6ba2da-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181039" version="1" comment="xfsprogs is &lt;4.3.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181040" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181041" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181042" version="1" comment="yast2 is &lt;3.2.36-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181043" version="1" comment="yast2-core is &lt;3.2.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181044" version="1" comment="yast2-users is &lt;3.2.11-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239879" version="1" comment="sled-release is ==12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238148" version="1" comment="ImageMagick is &lt;6.8.8.1-71.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238149" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238150" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238151" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238152" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232024" version="1" comment="MozillaFirefox is &lt;52.9.0esr-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232025" version="1" comment="MozillaFirefox-translations is &lt;52.9.0esr-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239880" version="1" comment="NetworkManager is &lt;1.0.12-13.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239881" version="1" comment="NetworkManager-lang is &lt;1.0.12-13.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239882" version="1" comment="libnm-glib-vpn1 is &lt;1.0.12-13.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239883" version="1" comment="libnm-glib4 is &lt;1.0.12-13.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239884" version="1" comment="libnm-util2 is &lt;1.0.12-13.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239885" version="1" comment="libnm0 is &lt;1.0.12-13.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239886" version="1" comment="typelib-1_0-NM-1_0 is &lt;1.0.12-13.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239887" version="1" comment="typelib-1_0-NMClient-1_0 is &lt;1.0.12-13.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239888" version="1" comment="typelib-1_0-NetworkManager-1_0 is &lt;1.0.12-13.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239889" version="1" comment="SuSEfirewall2 is &lt;3.6.312.333-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239890" version="1" comment="aaa_base is &lt;13.2+git20140911.61c1681-38.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239891" version="1" comment="aaa_base-extras is &lt;13.2+git20140911.61c1681-38.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239892" version="1" comment="accountsservice is &lt;0.6.42-16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239893" version="1" comment="accountsservice-lang is &lt;0.6.42-16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239894" version="1" comment="libaccountsservice0 is &lt;0.6.42-16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239895" version="1" comment="typelib-1_0-AccountsService-1_0 is &lt;0.6.42-16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239896" version="1" comment="at is &lt;3.1.14-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239897" version="1" comment="libQtWebKit4 is &lt;4.8.7+2.3.4-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239898" version="1" comment="libQtWebKit4-32bit is &lt;4.8.7+2.3.4-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187983" version="1" comment="augeas is &lt;1.2.0-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187984" version="1" comment="augeas-lenses is &lt;1.2.0-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187985" version="1" comment="libaugeas0 is &lt;1.2.0-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239899" version="1" comment="autofs is &lt;5.0.9-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239900" version="1" comment="bash is &lt;4.3-83.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239901" version="1" comment="bash-doc is &lt;4.3-83.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239902" version="1" comment="bash-lang is &lt;4.3-83.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239903" version="1" comment="libreadline6 is &lt;6.3-83.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239904" version="1" comment="libreadline6-32bit is &lt;6.3-83.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239905" version="1" comment="readline-doc is &lt;6.3-83.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239906" version="1" comment="bind-utils is &lt;9.11.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239907" version="1" comment="libbind9-160 is &lt;9.11.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239908" version="1" comment="libdns169 is &lt;9.11.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239909" version="1" comment="libirs160 is &lt;9.11.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239910" version="1" comment="libisc166 is &lt;9.11.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239911" version="1" comment="libisc166-32bit is &lt;9.11.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239912" version="1" comment="libisccc160 is &lt;9.11.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239913" version="1" comment="libisccfg160 is &lt;9.11.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239914" version="1" comment="liblwres160 is &lt;9.11.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239915" version="1" comment="python-bind is &lt;9.11.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237410" version="1" comment="binutils is &lt;2.31-9.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229253" version="1" comment="bluez is &lt;5.13-5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229254" version="1" comment="bluez-cups is &lt;5.13-5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229255" version="1" comment="libbluetooth3 is &lt;5.13-5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239916" version="1" comment="ceph-common is &lt;12.2.8+git.1536505967.080f2248ff-2.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239917" version="1" comment="libcephfs2 is &lt;12.2.8+git.1536505967.080f2248ff-2.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239918" version="1" comment="librados2 is &lt;12.2.8+git.1536505967.080f2248ff-2.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239919" version="1" comment="libradosstriper1 is &lt;12.2.8+git.1536505967.080f2248ff-2.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239920" version="1" comment="librbd1 is &lt;12.2.8+git.1536505967.080f2248ff-2.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239921" version="1" comment="librgw2 is &lt;12.2.8+git.1536505967.080f2248ff-2.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239922" version="1" comment="python-cephfs is &lt;12.2.8+git.1536505967.080f2248ff-2.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239923" version="1" comment="python-rados is &lt;12.2.8+git.1536505967.080f2248ff-2.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239924" version="1" comment="python-rbd is &lt;12.2.8+git.1536505967.080f2248ff-2.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239925" version="1" comment="python-rgw is &lt;12.2.8+git.1536505967.080f2248ff-2.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239926" version="1" comment="cifs-utils is &lt;6.5-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238142" version="1" comment="clamav is &lt;0.100.2-33.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239927" version="1" comment="coolkey is &lt;1.1.0-148.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239928" version="1" comment="coreutils is &lt;8.25-13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239929" version="1" comment="coreutils-lang is &lt;8.25-13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239930" version="1" comment="cpio is &lt;2.11-36.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239931" version="1" comment="cpio-lang is &lt;2.11-36.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239932" version="1" comment="cpp48 is &lt;4.8.5-31.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239933" version="1" comment="gcc48 is &lt;4.8.5-31.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239934" version="1" comment="gcc48-32bit is &lt;4.8.5-31.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239935" version="1" comment="gcc48-c++ is &lt;4.8.5-31.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239936" version="1" comment="gcc48-gij is &lt;4.8.5-31.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239937" version="1" comment="gcc48-gij-32bit is &lt;4.8.5-31.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239938" version="1" comment="gcc48-info is &lt;4.8.5-31.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239939" version="1" comment="libasan0 is &lt;4.8.5-31.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239940" version="1" comment="libasan0-32bit is &lt;4.8.5-31.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239941" version="1" comment="libgcj48 is &lt;4.8.5-31.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239942" version="1" comment="libgcj48-32bit is &lt;4.8.5-31.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239943" version="1" comment="libgcj48-jar is &lt;4.8.5-31.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239944" version="1" comment="libgcj_bc1 is &lt;4.8.5-31.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239945" version="1" comment="libstdc++48-devel is &lt;4.8.5-31.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239946" version="1" comment="libstdc++48-devel-32bit is &lt;4.8.5-31.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239947" version="1" comment="cups is &lt;1.7.5-20.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239948" version="1" comment="cups-client is &lt;1.7.5-20.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239949" version="1" comment="cups-libs is &lt;1.7.5-20.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239950" version="1" comment="cups-libs-32bit is &lt;1.7.5-20.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236706" version="1" comment="cups-filters is &lt;1.0.58-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236707" version="1" comment="cups-filters-cups-browsed is &lt;1.0.58-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236708" version="1" comment="cups-filters-foomatic-rip is &lt;1.0.58-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236709" version="1" comment="cups-filters-ghostscript is &lt;1.0.58-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239951" version="1" comment="curl is &lt;7.60.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239952" version="1" comment="libcurl4 is &lt;7.60.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239953" version="1" comment="libcurl4-32bit is &lt;7.60.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186373" version="1" comment="cvs is &lt;1.12.12-182.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239954" version="1" comment="cyrus-sasl is &lt;2.1.26-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239955" version="1" comment="cyrus-sasl-32bit is &lt;2.1.26-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239956" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.26-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239957" version="1" comment="cyrus-sasl-crammd5-32bit is &lt;2.1.26-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239958" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.26-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239959" version="1" comment="cyrus-sasl-digestmd5-32bit is &lt;2.1.26-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239960" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.26-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239961" version="1" comment="cyrus-sasl-gssapi-32bit is &lt;2.1.26-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239962" version="1" comment="cyrus-sasl-plain is &lt;2.1.26-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239963" version="1" comment="cyrus-sasl-plain-32bit is &lt;2.1.26-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239964" version="1" comment="cyrus-sasl-saslauthd is &lt;2.1.26-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239965" version="1" comment="libsasl2-3 is &lt;2.1.26-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239966" version="1" comment="libsasl2-3-32bit is &lt;2.1.26-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239967" version="1" comment="dbus-1 is &lt;1.8.22-29.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239968" version="1" comment="dbus-1-x11 is &lt;1.8.22-29.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239969" version="1" comment="libdbus-1-3 is &lt;1.8.22-29.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239970" version="1" comment="libdbus-1-3-32bit is &lt;1.8.22-29.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187251" version="1" comment="dhcp is &lt;4.3.3-10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187252" version="1" comment="dhcp-client is &lt;4.3.3-10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186424" version="1" comment="dnsmasq is &lt;2.78-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239971" version="1" comment="dracut is &lt;044.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239972" version="1" comment="e2fsprogs is &lt;1.43.8-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239973" version="1" comment="libcom_err2 is &lt;1.43.8-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239974" version="1" comment="libcom_err2-32bit is &lt;1.43.8-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239975" version="1" comment="libext2fs2 is &lt;1.43.8-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187018" version="1" comment="ecryptfs-utils is &lt;103-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187019" version="1" comment="ecryptfs-utils-32bit is &lt;103-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182211" version="1" comment="libelf-devel is &lt;0.158-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186403" version="1" comment="emacs is &lt;24.3-25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186404" version="1" comment="emacs-info is &lt;24.3-25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186405" version="1" comment="emacs-x11 is &lt;24.3-25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186406" version="1" comment="etags is &lt;24.3-25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239976" version="1" comment="empathy is &lt;3.12.13-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239977" version="1" comment="empathy-lang is &lt;3.12.13-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239978" version="1" comment="telepathy-mission-control-plugin-goa is &lt;3.12.13-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188099" version="1" comment="evince is &lt;3.20.2-6.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188100" version="1" comment="evince-browser-plugin is &lt;3.20.2-6.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188101" version="1" comment="evince-lang is &lt;3.20.2-6.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188102" version="1" comment="evince-plugin-djvudocument is &lt;3.20.2-6.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188103" version="1" comment="evince-plugin-dvidocument is &lt;3.20.2-6.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188104" version="1" comment="evince-plugin-pdfdocument is &lt;3.20.2-6.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188105" version="1" comment="evince-plugin-psdocument is &lt;3.20.2-6.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188106" version="1" comment="evince-plugin-tiffdocument is &lt;3.20.2-6.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188107" version="1" comment="evince-plugin-xpsdocument is &lt;3.20.2-6.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188108" version="1" comment="libevdocument3-4 is &lt;3.20.2-6.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188109" version="1" comment="libevview3-3 is &lt;3.20.2-6.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188110" version="1" comment="nautilus-evince is &lt;3.20.2-6.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188111" version="1" comment="typelib-1_0-EvinceDocument-3_0 is &lt;3.20.2-6.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188112" version="1" comment="typelib-1_0-EvinceView-3_0 is &lt;3.20.2-6.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186327" version="1" comment="expat is &lt;2.1.0-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186328" version="1" comment="libexpat1 is &lt;2.1.0-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186329" version="1" comment="libexpat1-32bit is &lt;2.1.0-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239979" version="1" comment="facter is &lt;2.4.6-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239980" version="1" comment="file is &lt;5.22-10.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239981" version="1" comment="file-magic is &lt;5.22-10.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239982" version="1" comment="libmagic1 is &lt;5.22-10.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239983" version="1" comment="libmagic1-32bit is &lt;5.22-10.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239984" version="1" comment="finch is &lt;2.12.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239985" version="1" comment="libpurple is &lt;2.12.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239986" version="1" comment="libpurple-branding-upstream is &lt;2.12.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239987" version="1" comment="libpurple-lang is &lt;2.12.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239988" version="1" comment="libpurple-plugin-sametime is &lt;2.12.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239989" version="1" comment="libpurple-tcl is &lt;2.12.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239990" version="1" comment="pidgin is &lt;2.12.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186320" version="1" comment="freerdp is &lt;2.0.0~git.1463131968.4e66df7-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186321" version="1" comment="libfreerdp2 is &lt;2.0.0~git.1463131968.4e66df7-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187088" version="1" comment="ft2demos is &lt;2.6.3-7.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237411" version="1" comment="fuse is &lt;2.9.3-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237412" version="1" comment="libfuse2 is &lt;2.9.3-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235785" version="1" comment="g3utils is &lt;1.1.36-58.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235786" version="1" comment="mgetty is &lt;1.1.36-58.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235133" version="1" comment="gd is &lt;2.1.0-24.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235134" version="1" comment="gd-32bit is &lt;2.1.0-24.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239991" version="1" comment="gdk-pixbuf-lang is &lt;2.34.0-19.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239992" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.34.0-19.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239993" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.34.0-19.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239994" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.34.0-19.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239995" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.34.0-19.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239996" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.34.0-19.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188375" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.40.20-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188377" version="1" comment="librsvg-2-2 is &lt;2.40.20-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188378" version="1" comment="librsvg-2-2-32bit is &lt;2.40.20-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188379" version="1" comment="rsvg-view is &lt;2.40.20-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233366" version="1" comment="gdm is &lt;3.10.0.1-54.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233367" version="1" comment="gdm-lang is &lt;3.10.0.1-54.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233368" version="1" comment="gdmflexiserver is &lt;3.10.0.1-54.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233369" version="1" comment="libgdm1 is &lt;3.10.0.1-54.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233370" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.10.0.1-54.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235783" version="1" comment="ghostscript is &lt;9.25-23.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235784" version="1" comment="ghostscript-x11 is &lt;9.25-23.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186592" version="1" comment="gimp is &lt;2.8.18-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186593" version="1" comment="gimp-lang is &lt;2.8.18-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186594" version="1" comment="gimp-plugins-python is &lt;2.8.18-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186595" version="1" comment="libgimp-2_0-0 is &lt;2.8.18-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186596" version="1" comment="libgimpui-2_0-0 is &lt;2.8.18-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239997" version="1" comment="glibc is &lt;2.22-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239998" version="1" comment="glibc-32bit is &lt;2.22-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239999" version="1" comment="glibc-devel is &lt;2.22-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240000" version="1" comment="glibc-devel-32bit is &lt;2.22-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240001" version="1" comment="glibc-i18ndata is &lt;2.22-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240002" version="1" comment="glibc-locale is &lt;2.22-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240003" version="1" comment="glibc-locale-32bit is &lt;2.22-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240004" version="1" comment="nscd is &lt;2.22-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240005" version="1" comment="gnome-keyring is &lt;3.20.0-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240006" version="1" comment="gnome-keyring-32bit is &lt;3.20.0-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240007" version="1" comment="gnome-keyring-lang is &lt;3.20.0-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240008" version="1" comment="gnome-keyring-pam is &lt;3.20.0-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240009" version="1" comment="gnome-keyring-pam-32bit is &lt;3.20.0-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240010" version="1" comment="libgck-modules-gnome-keyring is &lt;3.20.0-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240011" version="1" comment="gnome-settings-daemon is &lt;3.20.1-50.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240012" version="1" comment="gnome-settings-daemon-lang is &lt;3.20.1-50.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240013" version="1" comment="gnome-shell is &lt;3.20.4-77.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240014" version="1" comment="gnome-shell-browser-plugin is &lt;3.20.4-77.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240015" version="1" comment="gnome-shell-calendar is &lt;3.20.4-77.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240016" version="1" comment="gnome-shell-lang is &lt;3.20.4-77.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240017" version="1" comment="gnome-shell-search-provider-nautilus is &lt;3.20.3-23.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240018" version="1" comment="libnautilus-extension1 is &lt;3.20.3-23.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240019" version="1" comment="libnautilus-extension1-32bit is &lt;3.20.3-23.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240020" version="1" comment="nautilus is &lt;3.20.3-23.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240021" version="1" comment="nautilus-lang is &lt;3.20.3-23.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235130" version="1" comment="gnutls is &lt;3.3.27-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235131" version="1" comment="libgnutls28 is &lt;3.3.27-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235132" version="1" comment="libgnutls28-32bit is &lt;3.3.27-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223538" version="1" comment="gpg2 is &lt;2.0.24-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223539" version="1" comment="gpg2-lang is &lt;2.0.24-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240022" version="1" comment="grub2 is &lt;2.02-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240023" version="1" comment="grub2-i386-pc is &lt;2.02-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240024" version="1" comment="grub2-snapper-plugin is &lt;2.02-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240025" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.02-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240026" version="1" comment="grub2-x86_64-efi is &lt;2.02-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240027" version="1" comment="grub2-x86_64-xen is &lt;2.02-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187359" version="1" comment="gwenhywfar-lang is &lt;4.9.0beta-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187360" version="1" comment="gwenhywfar-tools is &lt;4.9.0beta-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187361" version="1" comment="libgwengui-gtk2-0 is &lt;4.9.0beta-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187362" version="1" comment="libgwenhywfar60 is &lt;4.9.0beta-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187363" version="1" comment="libgwenhywfar60-plugins is &lt;4.9.0beta-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240028" version="1" comment="gzip is &lt;1.6-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240029" version="1" comment="hyper-v is &lt;7-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188475" version="1" comment="icu is &lt;52.1-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188476" version="1" comment="libicu52_1 is &lt;52.1-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188477" version="1" comment="libicu52_1-32bit is &lt;52.1-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188478" version="1" comment="libicu52_1-data is &lt;52.1-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223506" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.181-43.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223507" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.181-43.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236704" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.181-27.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236705" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.181-27.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240030" version="1" comment="kbd is &lt;2.0.4-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240031" version="1" comment="kbd-legacy is &lt;2.0.4-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240032" version="1" comment="kdump is &lt;0.8.16-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240033" version="1" comment="kernel-default is &lt;4.12.14-94.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240034" version="1" comment="kernel-default-devel is &lt;4.12.14-94.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240035" version="1" comment="kernel-default-extra is &lt;4.12.14-94.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240036" version="1" comment="kernel-devel is &lt;4.12.14-94.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240037" version="1" comment="kernel-macros is &lt;4.12.14-94.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240038" version="1" comment="kernel-source is &lt;4.12.14-94.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240039" version="1" comment="kernel-syms is &lt;4.12.14-94.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240040" version="1" comment="kernel-firmware is &lt;20180525-3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240041" version="1" comment="ucode-amd is &lt;20180525-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240042" version="1" comment="krb5 is &lt;1.12.5-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240043" version="1" comment="krb5-32bit is &lt;1.12.5-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240044" version="1" comment="krb5-client is &lt;1.12.5-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238353" version="1" comment="lcms2 is &lt;2.7-9.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238354" version="1" comment="liblcms2-2 is &lt;2.7-9.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238355" version="1" comment="liblcms2-2-32bit is &lt;2.7-9.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240045" version="1" comment="lftp is &lt;4.7.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187918" version="1" comment="libICE6 is &lt;1.0.8-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187919" version="1" comment="libICE6-32bit is &lt;1.0.8-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187178" version="1" comment="libIlmImf-Imf_2_1-21 is &lt;2.1.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187179" version="1" comment="libIlmImf-Imf_2_1-21-32bit is &lt;2.1.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187180" version="1" comment="openexr is &lt;2.1.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240046" version="1" comment="libQt5Concurrent5 is &lt;5.6.2-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240047" version="1" comment="libQt5Core5 is &lt;5.6.2-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240048" version="1" comment="libQt5DBus5 is &lt;5.6.2-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240049" version="1" comment="libQt5Gui5 is &lt;5.6.2-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240050" version="1" comment="libQt5Network5 is &lt;5.6.2-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240051" version="1" comment="libQt5OpenGL5 is &lt;5.6.2-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240052" version="1" comment="libQt5PrintSupport5 is &lt;5.6.2-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240053" version="1" comment="libQt5Sql5 is &lt;5.6.2-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240054" version="1" comment="libQt5Sql5-mysql is &lt;5.6.2-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240055" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.2-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240056" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.2-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240057" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.2-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240058" version="1" comment="libQt5Test5 is &lt;5.6.2-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240059" version="1" comment="libQt5Widgets5 is &lt;5.6.2-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240060" version="1" comment="libQt5Xml5 is &lt;5.6.2-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236712" version="1" comment="libSoundTouch0 is &lt;1.7.1-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236713" version="1" comment="libSoundTouch0-32bit is &lt;1.7.1-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236714" version="1" comment="soundtouch is &lt;1.7.1-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236844" version="1" comment="libX11-6 is &lt;1.6.2-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236845" version="1" comment="libX11-6-32bit is &lt;1.6.2-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236846" version="1" comment="libX11-data is &lt;1.6.2-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236847" version="1" comment="libX11-xcb1 is &lt;1.6.2-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236848" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235125" version="1" comment="libXcursor1 is &lt;1.1.14-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235126" version="1" comment="libXcursor1-32bit is &lt;1.1.14-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187915" version="1" comment="libXdmcp6 is &lt;1.1.1-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187916" version="1" comment="libXdmcp6-32bit is &lt;1.1.1-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240061" version="1" comment="libXext6 is &lt;1.3.2-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240062" version="1" comment="libXext6-32bit is &lt;1.3.2-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187017" version="1" comment="libXfont1 is &lt;1.5.1-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240063" version="1" comment="libXvnc1 is &lt;1.6.0-18.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240064" version="1" comment="tigervnc is &lt;1.6.0-18.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240065" version="1" comment="xorg-x11-Xvnc is &lt;1.6.0-18.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240066" version="1" comment="libblkid1 is &lt;2.29.2-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240067" version="1" comment="libblkid1-32bit is &lt;2.29.2-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240068" version="1" comment="libfdisk1 is &lt;2.29.2-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240069" version="1" comment="libmount1 is &lt;2.29.2-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240070" version="1" comment="libmount1-32bit is &lt;2.29.2-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240071" version="1" comment="libsmartcols1 is &lt;2.29.2-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240072" version="1" comment="libuuid-devel is &lt;2.29.2-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240073" version="1" comment="libuuid1 is &lt;2.29.2-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240074" version="1" comment="libuuid1-32bit is &lt;2.29.2-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240075" version="1" comment="python-libmount is &lt;2.29.2-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240076" version="1" comment="util-linux is &lt;2.29.2-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240077" version="1" comment="util-linux-lang is &lt;2.29.2-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240078" version="1" comment="util-linux-systemd is &lt;2.29.2-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240079" version="1" comment="uuidd is &lt;2.29.2-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188361" version="1" comment="libcairo-gobject2 is &lt;1.15.2-25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188362" version="1" comment="libcairo-gobject2-32bit is &lt;1.15.2-25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188363" version="1" comment="libcairo-script-interpreter2 is &lt;1.15.2-25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188364" version="1" comment="libcairo2 is &lt;1.15.2-25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188365" version="1" comment="libcairo2-32bit is &lt;1.15.2-25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240080" version="1" comment="libcares2 is &lt;1.9.1-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240081" version="1" comment="libcares2-32bit is &lt;1.9.1-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187215" version="1" comment="libcdio14 is &lt;0.90-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187216" version="1" comment="libcdio14-32bit is &lt;0.90-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187217" version="1" comment="libiso9660-8 is &lt;0.90-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237216" version="1" comment="libdcerpc-binding0 is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237217" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237218" version="1" comment="libdcerpc0 is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237219" version="1" comment="libdcerpc0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237220" version="1" comment="libndr-krb5pac0 is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237221" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237222" version="1" comment="libndr-nbt0 is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237223" version="1" comment="libndr-nbt0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237224" version="1" comment="libndr-standard0 is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237225" version="1" comment="libndr-standard0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237226" version="1" comment="libndr0 is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237227" version="1" comment="libndr0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237228" version="1" comment="libnetapi0 is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237229" version="1" comment="libnetapi0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237230" version="1" comment="libsamba-credentials0 is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237231" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237232" version="1" comment="libsamba-errors0 is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237233" version="1" comment="libsamba-errors0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237234" version="1" comment="libsamba-hostconfig0 is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237235" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237236" version="1" comment="libsamba-passdb0 is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237237" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237238" version="1" comment="libsamba-util0 is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237239" version="1" comment="libsamba-util0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237240" version="1" comment="libsamdb0 is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237241" version="1" comment="libsamdb0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237242" version="1" comment="libsmbclient0 is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237243" version="1" comment="libsmbclient0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237244" version="1" comment="libsmbconf0 is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237245" version="1" comment="libsmbconf0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237246" version="1" comment="libsmbldap0 is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237247" version="1" comment="libsmbldap0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237248" version="1" comment="libtevent-util0 is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237249" version="1" comment="libtevent-util0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237250" version="1" comment="libwbclient0 is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237251" version="1" comment="libwbclient0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237252" version="1" comment="samba is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237253" version="1" comment="samba-client is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237254" version="1" comment="samba-client-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237255" version="1" comment="samba-doc is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237256" version="1" comment="samba-libs is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237257" version="1" comment="samba-libs-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237258" version="1" comment="samba-winbind is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237259" version="1" comment="samba-winbind-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236715" version="1" comment="libecpg6 is &lt;10.5-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236716" version="1" comment="libpq5 is &lt;10.5-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236717" version="1" comment="libpq5-32bit is &lt;10.5-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236718" version="1" comment="postgresql10 is &lt;10.5-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186971" version="1" comment="libevent-2_0-5 is &lt;2.0.21-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238058" version="1" comment="libexempi3 is &lt;2.2.1-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186963" version="1" comment="libexif12 is &lt;0.6.21-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186964" version="1" comment="libexif12-32bit is &lt;0.6.21-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240082" version="1" comment="libfreebl3 is &lt;3.29.5-58.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240083" version="1" comment="libfreebl3-32bit is &lt;3.29.5-58.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240084" version="1" comment="libsoftokn3 is &lt;3.29.5-58.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240085" version="1" comment="libsoftokn3-32bit is &lt;3.29.5-58.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240086" version="1" comment="mozilla-nss is &lt;3.29.5-58.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240087" version="1" comment="mozilla-nss-32bit is &lt;3.29.5-58.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240088" version="1" comment="mozilla-nss-certs is &lt;3.29.5-58.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240089" version="1" comment="mozilla-nss-certs-32bit is &lt;3.29.5-58.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240090" version="1" comment="mozilla-nss-sysinit is &lt;3.29.5-58.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240091" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.29.5-58.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240092" version="1" comment="mozilla-nss-tools is &lt;3.29.5-58.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187089" version="1" comment="libfreetype6 is &lt;2.6.3-7.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187090" version="1" comment="libfreetype6-32bit is &lt;2.6.3-7.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240093" version="1" comment="libgcrypt20 is &lt;1.6.1-16.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240094" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187331" version="1" comment="libgraphite2-3 is &lt;1.3.1-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187332" version="1" comment="libgraphite2-3-32bit is &lt;1.3.1-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186212" version="1" comment="libical1 is &lt;1.0.1-16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186213" version="1" comment="libical1-32bit is &lt;1.0.1-16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187227" version="1" comment="libid3tag0 is &lt;0.15.1b-184.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188061" version="1" comment="libidn11 is &lt;1.28-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188062" version="1" comment="libidn11-32bit is &lt;1.28-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240095" version="1" comment="libipa_hbac0 is &lt;1.16.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240096" version="1" comment="libsss_certmap0 is &lt;1.16.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240097" version="1" comment="libsss_idmap0 is &lt;1.16.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240098" version="1" comment="libsss_nss_idmap0 is &lt;1.16.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240099" version="1" comment="libsss_simpleifp0 is &lt;1.16.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186551" version="1" comment="libsss_sudo is &lt;1.13.4-34.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240100" version="1" comment="python-sssd-config is &lt;1.16.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240101" version="1" comment="sssd is &lt;1.16.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240102" version="1" comment="sssd-32bit is &lt;1.16.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240103" version="1" comment="sssd-ad is &lt;1.16.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240104" version="1" comment="sssd-ipa is &lt;1.16.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240105" version="1" comment="sssd-krb5 is &lt;1.16.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240106" version="1" comment="sssd-krb5-common is &lt;1.16.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240107" version="1" comment="sssd-ldap is &lt;1.16.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240108" version="1" comment="sssd-proxy is &lt;1.16.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240109" version="1" comment="sssd-tools is &lt;1.16.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188491" version="1" comment="libjasper1 is &lt;1.900.14-195.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188492" version="1" comment="libjasper1-32bit is &lt;1.900.14-195.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238050" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.20.3-2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238051" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.20.3-2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238052" version="1" comment="libwebkit2gtk3-lang is &lt;2.20.3-2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238053" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.20.3-2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238054" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.20.3-2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238055" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.20.3-2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187028" version="1" comment="libjpeg-turbo is &lt;1.5.3-31.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187029" version="1" comment="libjpeg62 is &lt;62.2.0-31.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187030" version="1" comment="libjpeg62-32bit is &lt;62.2.0-31.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187031" version="1" comment="libjpeg62-turbo is &lt;1.5.3-31.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187032" version="1" comment="libjpeg8 is &lt;8.1.2-31.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187033" version="1" comment="libjpeg8-32bit is &lt;8.1.2-31.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187034" version="1" comment="libturbojpeg0 is &lt;8.1.2-31.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236303" version="1" comment="libkpathsea6 is &lt;6.2.0dev-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240110" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240111" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240112" version="1" comment="openldap2-client is &lt;2.4.41-18.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240113" version="1" comment="libldb1 is &lt;1.1.29-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240114" version="1" comment="libldb1-32bit is &lt;1.1.29-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234962" version="1" comment="liblouis-data is &lt;2.6.4-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234963" version="1" comment="liblouis9 is &lt;2.6.4-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234964" version="1" comment="python3-louis is &lt;2.6.4-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240115" version="1" comment="libltdl7 is &lt;2.4.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240116" version="1" comment="libltdl7-32bit is &lt;2.4.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188494" version="1" comment="libmodplug1 is &lt;0.8.9.0+git20170610.f6dd59a-15.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188162" version="1" comment="libmwaw-0_3-3 is &lt;0.3.13-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240117" version="1" comment="libmysqlclient18 is &lt;10.0.35-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240118" version="1" comment="libmysqlclient18-32bit is &lt;10.0.35-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240119" version="1" comment="libmysqlclient_r18 is &lt;10.0.35-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240120" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.35-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240121" version="1" comment="mariadb-100-errormessages is &lt;10.0.35-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186993" version="1" comment="libncurses5 is &lt;5.9-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186994" version="1" comment="libncurses5-32bit is &lt;5.9-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186995" version="1" comment="libncurses6 is &lt;5.9-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186996" version="1" comment="libncurses6-32bit is &lt;5.9-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186998" version="1" comment="ncurses-devel is &lt;5.9-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186999" version="1" comment="ncurses-utils is &lt;5.9-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187000" version="1" comment="tack is &lt;5.9-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187001" version="1" comment="terminfo is &lt;5.9-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187002" version="1" comment="terminfo-base is &lt;5.9-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181577" version="1" comment="libnghttp2-14 is &lt;1.7.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240122" version="1" comment="libnghttp2-14-32bit is &lt;1.7.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230731" version="1" comment="libofx is &lt;0.9.9-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230732" version="1" comment="libofx6 is &lt;0.9.9-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188442" version="1" comment="libopenjp2-7 is &lt;2.1.0-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240123" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2p-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240124" version="1" comment="libopenssl1_0_0 is &lt;1.0.2p-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240125" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2p-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240126" version="1" comment="openssl-1_0_0 is &lt;1.0.2p-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240127" version="1" comment="libopenssl-devel is &lt;1.0.2p-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240128" version="1" comment="openssl is &lt;1.0.2p-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234257" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-106.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234258" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-106.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240129" version="1" comment="libopenssl1_1 is &lt;1.1.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240130" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240131" version="1" comment="libpcre1 is &lt;8.39-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240132" version="1" comment="libpcre1-32bit is &lt;8.39-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240133" version="1" comment="libpcre16-0 is &lt;8.39-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240134" version="1" comment="libpcrecpp0 is &lt;8.39-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240135" version="1" comment="libpcrecpp0-32bit is &lt;8.39-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240136" version="1" comment="libpcsclite1 is &lt;1.8.10-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240137" version="1" comment="libpcsclite1-32bit is &lt;1.8.10-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240138" version="1" comment="pcsc-lite is &lt;1.8.10-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186309" version="1" comment="libplist++3 is &lt;1.12-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186310" version="1" comment="libplist3 is &lt;1.12-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233217" version="1" comment="libpodofo0_9_2 is &lt;0.9.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240139" version="1" comment="libpolkit0 is &lt;0.113-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240140" version="1" comment="libpolkit0-32bit is &lt;0.113-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240141" version="1" comment="polkit is &lt;0.113-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240142" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223419" version="1" comment="libpoppler-glib8 is &lt;0.43.0-16.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223420" version="1" comment="libpoppler-qt4-4 is &lt;0.43.0-16.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223421" version="1" comment="libpoppler60 is &lt;0.43.0-16.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223423" version="1" comment="poppler-tools is &lt;0.43.0-16.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240143" version="1" comment="libprocps3 is &lt;3.3.9-11.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240144" version="1" comment="procps is &lt;3.3.9-11.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240145" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240146" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-28.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240147" version="1" comment="python-base is &lt;2.7.13-28.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240148" version="1" comment="python-devel is &lt;2.7.13-28.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240149" version="1" comment="python-xml is &lt;2.7.13-28.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234394" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-25.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234396" version="1" comment="python3-base is &lt;3.4.6-25.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236710" version="1" comment="libqpdf18 is &lt;7.1.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240150" version="1" comment="libqt4 is &lt;4.8.7-8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240151" version="1" comment="libqt4-32bit is &lt;4.8.7-8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240152" version="1" comment="libqt4-qt3support is &lt;4.8.7-8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240153" version="1" comment="libqt4-qt3support-32bit is &lt;4.8.7-8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240154" version="1" comment="libqt4-sql is &lt;4.8.7-8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240155" version="1" comment="libqt4-sql-32bit is &lt;4.8.7-8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240156" version="1" comment="libqt4-sql-mysql is &lt;4.8.7-8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240157" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.8.7-8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240158" version="1" comment="libqt4-sql-postgresql is &lt;4.8.7-8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240159" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.8.7-8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240160" version="1" comment="libqt4-sql-sqlite is &lt;4.8.7-8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240161" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.8.7-8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240162" version="1" comment="libqt4-sql-unixODBC is &lt;4.8.7-8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240163" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.8.7-8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240164" version="1" comment="libqt4-x11 is &lt;4.8.7-8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240165" version="1" comment="libqt4-x11-32bit is &lt;4.8.7-8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186210" version="1" comment="libquicktime0 is &lt;1.2.4-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237922" version="1" comment="libraw9 is &lt;0.15.4-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233234" version="1" comment="libreoffice is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233236" version="1" comment="libreoffice-base is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233237" version="1" comment="libreoffice-base-drivers-mysql is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233238" version="1" comment="libreoffice-base-drivers-postgresql is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233239" version="1" comment="libreoffice-branding-upstream is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233240" version="1" comment="libreoffice-calc is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233241" version="1" comment="libreoffice-calc-extensions is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233242" version="1" comment="libreoffice-draw is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233243" version="1" comment="libreoffice-filters-optional is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233244" version="1" comment="libreoffice-gnome is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233245" version="1" comment="libreoffice-gtk2 is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233246" version="1" comment="libreoffice-icon-themes is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233247" version="1" comment="libreoffice-impress is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233248" version="1" comment="libreoffice-l10n-af is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233249" version="1" comment="libreoffice-l10n-ar is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233250" version="1" comment="libreoffice-l10n-ca is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233251" version="1" comment="libreoffice-l10n-cs is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233252" version="1" comment="libreoffice-l10n-da is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233253" version="1" comment="libreoffice-l10n-de is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233254" version="1" comment="libreoffice-l10n-en is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233255" version="1" comment="libreoffice-l10n-es is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233256" version="1" comment="libreoffice-l10n-fi is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233257" version="1" comment="libreoffice-l10n-fr is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233258" version="1" comment="libreoffice-l10n-gu is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233259" version="1" comment="libreoffice-l10n-hi is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233260" version="1" comment="libreoffice-l10n-hu is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233261" version="1" comment="libreoffice-l10n-it is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233262" version="1" comment="libreoffice-l10n-ja is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233263" version="1" comment="libreoffice-l10n-ko is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233264" version="1" comment="libreoffice-l10n-nb is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233265" version="1" comment="libreoffice-l10n-nl is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233266" version="1" comment="libreoffice-l10n-nn is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233267" version="1" comment="libreoffice-l10n-pl is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233268" version="1" comment="libreoffice-l10n-pt_BR is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233269" version="1" comment="libreoffice-l10n-pt_PT is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233270" version="1" comment="libreoffice-l10n-ro is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233271" version="1" comment="libreoffice-l10n-ru is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233272" version="1" comment="libreoffice-l10n-sk is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233273" version="1" comment="libreoffice-l10n-sv is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233274" version="1" comment="libreoffice-l10n-xh is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233275" version="1" comment="libreoffice-l10n-zh_CN is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233276" version="1" comment="libreoffice-l10n-zh_TW is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233277" version="1" comment="libreoffice-l10n-zu is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233278" version="1" comment="libreoffice-mailmerge is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233279" version="1" comment="libreoffice-math is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233280" version="1" comment="libreoffice-officebean is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233281" version="1" comment="libreoffice-pyuno is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233282" version="1" comment="libreoffice-writer is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233283" version="1" comment="libreoffice-writer-extensions is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240166" version="1" comment="libsndfile1 is &lt;1.0.25-36.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240167" version="1" comment="libsndfile1-32bit is &lt;1.0.25-36.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238143" version="1" comment="libsnmp30 is &lt;5.7.3-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238144" version="1" comment="libsnmp30-32bit is &lt;5.7.3-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238145" version="1" comment="net-snmp is &lt;5.7.3-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238146" version="1" comment="perl-SNMP is &lt;5.7.3-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238147" version="1" comment="snmp-mibs is &lt;5.7.3-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231331" version="1" comment="libsoup-2_4-1 is &lt;2.62.2-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231332" version="1" comment="libsoup-2_4-1-32bit is &lt;2.62.2-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231333" version="1" comment="libsoup-lang is &lt;2.62.2-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231334" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.62.2-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233870" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.33-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233871" version="1" comment="libspice-client-glib-helper is &lt;0.33-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233872" version="1" comment="libspice-client-gtk-3_0-5 is &lt;0.33-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233873" version="1" comment="libspice-controller0 is &lt;0.33-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233875" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.33-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233876" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.33-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233877" version="1" comment="libspice-server1 is &lt;0.12.8-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240168" version="1" comment="libsrtp1 is &lt;1.5.2-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237414" version="1" comment="libssh4 is &lt;0.6.3-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240169" version="1" comment="libssh4-32bit is &lt;0.6.3-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188216" version="1" comment="libstaroffice-0_0-0 is &lt;0.0.5-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240170" version="1" comment="libsystemd0 is &lt;228-150.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240171" version="1" comment="libsystemd0-32bit is &lt;228-150.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240172" version="1" comment="libudev1 is &lt;228-150.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240173" version="1" comment="libudev1-32bit is &lt;228-150.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240174" version="1" comment="systemd is &lt;228-150.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240175" version="1" comment="systemd-32bit is &lt;228-150.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240176" version="1" comment="systemd-bash-completion is &lt;228-150.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240177" version="1" comment="systemd-sysvinit is &lt;228-150.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240178" version="1" comment="udev is &lt;228-150.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187911" version="1" comment="libtasn1 is &lt;4.9-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187912" version="1" comment="libtasn1-6 is &lt;4.9-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187913" version="1" comment="libtasn1-6-32bit is &lt;4.9-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237876" version="1" comment="libtiff5 is &lt;4.0.9-44.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237877" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240179" version="1" comment="libtirpc-netconfig is &lt;1.0.1-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240180" version="1" comment="libtirpc3 is &lt;1.0.1-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240181" version="1" comment="libtirpc3-32bit is &lt;1.0.1-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240182" version="1" comment="libvirt is &lt;4.0.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240183" version="1" comment="libvirt-admin is &lt;4.0.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240184" version="1" comment="libvirt-client is &lt;4.0.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240185" version="1" comment="libvirt-daemon is &lt;4.0.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240186" version="1" comment="libvirt-daemon-config-network is &lt;4.0.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240187" version="1" comment="libvirt-daemon-config-nwfilter is &lt;4.0.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240188" version="1" comment="libvirt-daemon-driver-interface is &lt;4.0.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240189" version="1" comment="libvirt-daemon-driver-libxl is &lt;4.0.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240190" version="1" comment="libvirt-daemon-driver-lxc is &lt;4.0.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240191" version="1" comment="libvirt-daemon-driver-network is &lt;4.0.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240192" version="1" comment="libvirt-daemon-driver-nodedev is &lt;4.0.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240193" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;4.0.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240194" version="1" comment="libvirt-daemon-driver-qemu is &lt;4.0.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240195" version="1" comment="libvirt-daemon-driver-secret is &lt;4.0.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240196" version="1" comment="libvirt-daemon-driver-storage is &lt;4.0.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240197" version="1" comment="libvirt-daemon-driver-storage-core is &lt;4.0.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240198" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;4.0.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240199" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;4.0.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240200" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;4.0.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240201" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;4.0.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240202" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;4.0.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240203" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;4.0.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240204" version="1" comment="libvirt-daemon-lxc is &lt;4.0.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240205" version="1" comment="libvirt-daemon-qemu is &lt;4.0.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240206" version="1" comment="libvirt-daemon-xen is &lt;4.0.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240207" version="1" comment="libvirt-doc is &lt;4.0.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240208" version="1" comment="libvirt-libs is &lt;4.0.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240209" version="1" comment="libvmtools0 is &lt;10.3.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240210" version="1" comment="open-vm-tools is &lt;10.3.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240211" version="1" comment="open-vm-tools-desktop is &lt;10.3.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187869" version="1" comment="libvorbis0 is &lt;1.3.3-10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187870" version="1" comment="libvorbis0-32bit is &lt;1.3.3-10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187871" version="1" comment="libvorbisenc2 is &lt;1.3.3-10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187872" version="1" comment="libvorbisenc2-32bit is &lt;1.3.3-10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187873" version="1" comment="libvorbisfile3 is &lt;1.3.3-10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187874" version="1" comment="libvorbisfile3-32bit is &lt;1.3.3-10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186953" version="1" comment="libvpx1 is &lt;1.3.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186954" version="1" comment="libvpx1-32bit is &lt;1.3.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186955" version="1" comment="vpx-tools is &lt;1.3.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187189" version="1" comment="libwavpack1 is &lt;4.60.99-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235512" version="1" comment="libwireshark9 is &lt;2.4.9-48.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235513" version="1" comment="libwiretap7 is &lt;2.4.9-48.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235514" version="1" comment="libwscodecs1 is &lt;2.4.9-48.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235515" version="1" comment="libwsutil8 is &lt;2.4.9-48.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235516" version="1" comment="wireshark is &lt;2.4.9-48.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235517" version="1" comment="wireshark-gtk is &lt;2.4.9-48.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186539" version="1" comment="libwpd-0_10-10 is &lt;0.10.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236850" version="1" comment="libxcb-dri2-0 is &lt;1.10-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236851" version="1" comment="libxcb-dri2-0-32bit is &lt;1.10-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236852" version="1" comment="libxcb-dri3-0 is &lt;1.10-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236853" version="1" comment="libxcb-dri3-0-32bit is &lt;1.10-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236854" version="1" comment="libxcb-glx0 is &lt;1.10-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236855" version="1" comment="libxcb-glx0-32bit is &lt;1.10-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236856" version="1" comment="libxcb-present0 is &lt;1.10-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236857" version="1" comment="libxcb-present0-32bit is &lt;1.10-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236858" version="1" comment="libxcb-randr0 is &lt;1.10-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236859" version="1" comment="libxcb-render0 is &lt;1.10-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236860" version="1" comment="libxcb-render0-32bit is &lt;1.10-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236861" version="1" comment="libxcb-shape0 is &lt;1.10-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236862" version="1" comment="libxcb-shm0 is &lt;1.10-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236863" version="1" comment="libxcb-shm0-32bit is &lt;1.10-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236864" version="1" comment="libxcb-sync1 is &lt;1.10-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236865" version="1" comment="libxcb-sync1-32bit is &lt;1.10-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236866" version="1" comment="libxcb-xf86dri0 is &lt;1.10-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236867" version="1" comment="libxcb-xfixes0 is &lt;1.10-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236868" version="1" comment="libxcb-xfixes0-32bit is &lt;1.10-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236869" version="1" comment="libxcb-xinerama0 is &lt;1.10-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236870" version="1" comment="libxcb-xkb1 is &lt;1.10-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236871" version="1" comment="libxcb-xkb1-32bit is &lt;1.10-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236872" version="1" comment="libxcb-xv0 is &lt;1.10-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236873" version="1" comment="libxcb1 is &lt;1.10-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236874" version="1" comment="libxcb1-32bit is &lt;1.10-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236767" version="1" comment="libxml2-2 is &lt;2.9.4-46.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236768" version="1" comment="libxml2-2-32bit is &lt;2.9.4-46.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236769" version="1" comment="libxml2-tools is &lt;2.9.4-46.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187191" version="1" comment="libyaml-cpp0_5 is &lt;0.5.3-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240212" version="1" comment="libykcs11-1 is &lt;1.5.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240213" version="1" comment="libykpiv1 is &lt;1.5.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240214" version="1" comment="yubico-piv-tool is &lt;1.5.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186408" version="1" comment="libzip2 is &lt;0.11.1-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240215" version="1" comment="libzypp is &lt;16.19.0-2.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238046" version="1" comment="libzzip-0-13 is &lt;0.13.67-10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240216" version="1" comment="logrotate is &lt;3.11.0-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240217" version="1" comment="mariadb is &lt;10.2.18-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240218" version="1" comment="mariadb-client is &lt;10.2.18-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240219" version="1" comment="mariadb-errormessages is &lt;10.2.18-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240220" version="1" comment="mutt is &lt;1.10.1-55.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237923" version="1" comment="ntp is &lt;4.2.8p12-64.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237924" version="1" comment="ntp-doc is &lt;4.2.8p12-64.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240221" version="1" comment="openconnect is &lt;7.08-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240222" version="1" comment="openconnect-lang is &lt;7.08-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235821" version="1" comment="openslp is &lt;2.0.0-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235822" version="1" comment="openslp-32bit is &lt;2.0.0-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233371" version="1" comment="openssh is &lt;7.2p2-74.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233374" version="1" comment="openssh-helpers is &lt;7.2p2-74.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186511" version="1" comment="openvpn is &lt;2.3.8-16.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187147" version="1" comment="p7zip is &lt;9.20.1-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240223" version="1" comment="pam is &lt;1.1.8-24.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240224" version="1" comment="pam-32bit is &lt;1.1.8-24.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240225" version="1" comment="pam-doc is &lt;1.1.8-24.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188348" version="1" comment="patch is &lt;2.7.5-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240226" version="1" comment="perl is &lt;5.18.2-12.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240227" version="1" comment="perl-32bit is &lt;5.18.2-12.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240228" version="1" comment="perl-base is &lt;5.18.2-12.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240229" version="1" comment="perl-doc is &lt;5.18.2-12.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232446" version="1" comment="perl-Archive-Zip is &lt;1.34-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187397" version="1" comment="perl-XML-LibXML is &lt;2.0019-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186951" version="1" comment="procmail is &lt;3.22-269.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187172" version="1" comment="puppet is &lt;3.8.5-15.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240230" version="1" comment="python is &lt;2.7.13-28.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240231" version="1" comment="python-curses is &lt;2.7.13-28.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240232" version="1" comment="python-tk is &lt;2.7.13-28.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236770" version="1" comment="python-libxml2 is &lt;2.9.4-46.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240233" version="1" comment="python-pyOpenSSL is &lt;16.0.0-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240234" version="1" comment="python3-pyOpenSSL is &lt;16.0.0-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240235" version="1" comment="python-requests is &lt;2.11.1-6.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234395" version="1" comment="python3 is &lt;3.4.6-25.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234397" version="1" comment="python3-curses is &lt;3.4.6-25.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240236" version="1" comment="python3-requests is &lt;2.7.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240237" version="1" comment="qemu is &lt;2.11.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240238" version="1" comment="qemu-block-curl is &lt;2.11.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240239" version="1" comment="qemu-ipxe is &lt;1.0.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240240" version="1" comment="qemu-kvm is &lt;2.11.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240241" version="1" comment="qemu-seabios is &lt;1.11.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240242" version="1" comment="qemu-sgabios is &lt;8-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240243" version="1" comment="qemu-tools is &lt;2.11.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240244" version="1" comment="qemu-vgabios is &lt;1.11.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240245" version="1" comment="qemu-x86 is &lt;2.11.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240246" version="1" comment="qemu-ovmf-x86_64 is &lt;2017+git1510945757.b2662641d5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237872" version="1" comment="rpm is &lt;4.11.2-16.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237873" version="1" comment="rpm-32bit is &lt;4.11.2-16.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237874" version="1" comment="rpm-build is &lt;4.11.2-16.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240247" version="1" comment="rsync is &lt;3.1.0-13.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240248" version="1" comment="rsyslog is &lt;8.24.0-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188134" version="1" comment="rzsz is &lt;0.12.21~rc-1001.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240249" version="1" comment="sblim-sfcb is &lt;1.4.8-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235135" version="1" comment="shadow is &lt;4.2.1-27.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187193" version="1" comment="shotwell is &lt;0.22.0+git.20160103-15.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187194" version="1" comment="shotwell-lang is &lt;0.22.0+git.20160103-15.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187035" version="1" comment="spice-vdagent is &lt;0.16.0-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186292" version="1" comment="strongswan is &lt;5.1.3-26.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186293" version="1" comment="strongswan-doc is &lt;5.1.3-26.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186294" version="1" comment="strongswan-ipsec is &lt;5.1.3-26.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186295" version="1" comment="strongswan-libs0 is &lt;5.1.3-26.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240250" version="1" comment="sudo is &lt;1.8.20p2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240251" version="1" comment="supportutils is &lt;3.0-95.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240252" version="1" comment="tar is &lt;1.27.1-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240253" version="1" comment="tar-lang is &lt;1.27.1-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186512" version="1" comment="tcpdump is &lt;4.9.2-14.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240254" version="1" comment="tftp is &lt;5.2-11.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186989" version="1" comment="transfig is &lt;3.2.5e-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240255" version="1" comment="ucode-intel is &lt;20180807a-13.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229510" version="1" comment="unixODBC is &lt;2.3.6-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229511" version="1" comment="unixODBC-32bit is &lt;2.3.6-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235782" version="1" comment="unzip is &lt;6.00-33.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188460" version="1" comment="wget is &lt;1.14-21.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186507" version="1" comment="wpa_supplicant is &lt;2.2-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187857" version="1" comment="xdg-utils is &lt;20140630-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240256" version="1" comment="xen is &lt;4.11.0_08-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240257" version="1" comment="xen-libs is &lt;4.11.0_08-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240258" version="1" comment="xen-libs-32bit is &lt;4.11.0_08-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240259" version="1" comment="xfsprogs is &lt;4.15.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240260" version="1" comment="xinetd is &lt;2.3.15-8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240261" version="1" comment="xorg-x11-server is &lt;1.19.6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240262" version="1" comment="xorg-x11-server-extra is &lt;1.19.6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240263" version="1" comment="yast2 is &lt;3.2.48-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240264" version="1" comment="yast2-core is &lt;3.3.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240265" version="1" comment="yast2-users is &lt;3.2.17-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251810" version="1" comment="zsh is &lt;5.0.5-6.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251811" version="1" comment="zypper is &lt;1.13.45-21.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251812" version="1" comment="zypper-log is &lt;1.13.45-21.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181045" version="1" comment="cluster-md-kmp-default is &lt;4.4.21-69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181046" version="1" comment="cluster-network-kmp-default is &lt;4.4.21-69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181047" version="1" comment="dlm-kmp-default is &lt;4.4.21-69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181048" version="1" comment="gfs2-kmp-default is &lt;4.4.21-69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181049" version="1" comment="ocfs2-kmp-default is &lt;4.4.21-69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135880" version="1" comment="sle-ha-release is ==12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181050" version="1" comment="conntrack-tools is &lt;1.4.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181051" version="1" comment="ctdb is &lt;4.4.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181052" version="1" comment="fence-agents is &lt;4.0.22+git.1455008135.15c5e92-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181053" version="1" comment="haproxy is &lt;1.6.5-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181054" version="1" comment="libpacemaker3 is &lt;1.1.15-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181055" version="1" comment="pacemaker is &lt;1.1.15-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181056" version="1" comment="pacemaker-cli is &lt;1.1.15-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181057" version="1" comment="pacemaker-cts is &lt;1.1.15-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181058" version="1" comment="pacemaker-remote is &lt;1.1.15-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181059" version="1" comment="lighttpd is &lt;1.4.35-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181060" version="1" comment="python-PyYAML is &lt;3.10-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181061" version="1" comment="ruby2.1-rubygem-bundler is &lt;1.7.3-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181062" version="1" comment="cluster-md-kmp-default is &lt;4.4.73-5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181063" version="1" comment="dlm-kmp-default is &lt;4.4.73-5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181064" version="1" comment="gfs2-kmp-default is &lt;4.4.73-5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181065" version="1" comment="ocfs2-kmp-default is &lt;4.4.73-5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159727" version="1" comment="sle-ha-release is ==12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181066" version="1" comment="ctdb is &lt;4.6.5+git.27.6afd48b1083-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181067" version="1" comment="fence-agents is &lt;4.0.25+git.1485179354.eb43835-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181068" version="1" comment="haproxy is &lt;1.6.11-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181069" version="1" comment="libpacemaker3 is &lt;1.1.16-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181070" version="1" comment="pacemaker is &lt;1.1.16-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181071" version="1" comment="pacemaker-cli is &lt;1.1.16-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181072" version="1" comment="pacemaker-cts is &lt;1.1.16-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181073" version="1" comment="pacemaker-remote is &lt;1.1.16-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181074" version="1" comment="libpcreposix0 is &lt;8.39-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181075" version="1" comment="lighttpd is &lt;1.4.35-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240268" version="1" comment="cluster-md-kmp-default is &lt;4.12.14-94.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240269" version="1" comment="dlm-kmp-default is &lt;4.12.14-94.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240270" version="1" comment="gfs2-kmp-default is &lt;4.12.14-94.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240271" version="1" comment="ocfs2-kmp-default is &lt;4.12.14-94.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240272" version="1" comment="sle-ha-release is ==12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188711" version="1" comment="corosync is &lt;2.3.6-9.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188712" version="1" comment="libcorosync4 is &lt;2.3.6-9.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237260" version="1" comment="ctdb is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240273" version="1" comment="fence-agents is &lt;4.2.1+git.1537269352.7b1fd536-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240274" version="1" comment="libpacemaker3 is &lt;1.1.19+20180928.0d2680780-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240275" version="1" comment="pacemaker is &lt;1.1.19+20180928.0d2680780-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240276" version="1" comment="pacemaker-cli is &lt;1.1.19+20180928.0d2680780-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240277" version="1" comment="pacemaker-cts is &lt;1.1.19+20180928.0d2680780-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240278" version="1" comment="pacemaker-remote is &lt;1.1.19+20180928.0d2680780-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240279" version="1" comment="libpcreposix0 is &lt;8.39-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147499" version="1" comment="sle-module-adv-systems-management-release is &gt;=12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181076" version="1" comment="puppet-server is &lt;3.6.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181077" version="1" comment="docker is &lt;1.6.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117868" version="1" comment="sle-module-containers-release is &gt;=12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181078" version="1" comment="python-PyYAML is &lt;3.10-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229238" version="1" comment="libslurm29 is &lt;16.05.8.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229239" version="1" comment="perl-slurm is &lt;16.05.8.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229240" version="1" comment="slurm is &lt;16.05.8.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229241" version="1" comment="slurm-auth-none is &lt;16.05.8.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229242" version="1" comment="slurm-devel is &lt;16.05.8.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229243" version="1" comment="slurm-doc is &lt;16.05.8.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229244" version="1" comment="slurm-lua is &lt;16.05.8.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229245" version="1" comment="slurm-munge is &lt;16.05.8.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229246" version="1" comment="slurm-pam_slurm is &lt;16.05.8.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229247" version="1" comment="slurm-plugins is &lt;16.05.8.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229248" version="1" comment="slurm-sched-wiki is &lt;16.05.8.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229249" version="1" comment="slurm-slurmdbd is &lt;16.05.8.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168338" version="1" comment="sle-module-hpc-release is &gt;=12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181079" version="1" comment="cups154 is &lt;1.5.4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181080" version="1" comment="cups154-client is &lt;1.5.4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181081" version="1" comment="cups154-filters is &lt;1.5.4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181082" version="1" comment="cups154-libs is &lt;1.5.4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117869" version="1" comment="sle-module-legacy-release is &gt;=12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181083" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181084" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181085" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181086" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181087" version="1" comment="syslog-ng is &lt;3.4.5-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178199" version="1" comment="sle-module-public-cloud-release is &gt;=12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181088" version="1" comment="cpp5 is &lt;5.3.1+r233831-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181089" version="1" comment="gcc5 is &lt;5.3.1+r233831-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181090" version="1" comment="gcc5-c++ is &lt;5.3.1+r233831-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181091" version="1" comment="gcc5-fortran is &lt;5.3.1+r233831-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181092" version="1" comment="gcc5-info is &lt;5.3.1+r233831-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181093" version="1" comment="gcc5-locale is &lt;5.3.1+r233831-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181094" version="1" comment="libffi-devel-gcc5 is &lt;5.3.1+r233831-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181095" version="1" comment="libstdc++6-devel-gcc5 is &lt;5.3.1+r233831-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125881" version="1" comment="sle-module-toolchain-release is &gt;=12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181096" version="1" comment="apache2-mod_php5 is &lt;5.5.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181097" version="1" comment="php5 is &lt;5.5.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181098" version="1" comment="php5-bcmath is &lt;5.5.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181099" version="1" comment="php5-bz2 is &lt;5.5.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181100" version="1" comment="php5-calendar is &lt;5.5.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181101" version="1" comment="php5-ctype is &lt;5.5.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181102" version="1" comment="php5-curl is &lt;5.5.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181103" version="1" comment="php5-dba is &lt;5.5.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181104" version="1" comment="php5-dom is &lt;5.5.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181105" version="1" comment="php5-enchant is &lt;5.5.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181106" version="1" comment="php5-exif is &lt;5.5.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181107" version="1" comment="php5-fastcgi is &lt;5.5.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181108" version="1" comment="php5-fileinfo is &lt;5.5.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181109" version="1" comment="php5-fpm is &lt;5.5.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181110" version="1" comment="php5-ftp is &lt;5.5.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181111" version="1" comment="php5-gd is &lt;5.5.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181112" version="1" comment="php5-gettext is &lt;5.5.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181113" version="1" comment="php5-gmp is &lt;5.5.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181114" version="1" comment="php5-iconv is &lt;5.5.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181115" version="1" comment="php5-intl is &lt;5.5.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181116" version="1" comment="php5-json is &lt;5.5.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181117" version="1" comment="php5-ldap is &lt;5.5.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181118" version="1" comment="php5-mbstring is &lt;5.5.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181119" version="1" comment="php5-mcrypt is &lt;5.5.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181120" version="1" comment="php5-mysql is &lt;5.5.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181121" version="1" comment="php5-odbc is &lt;5.5.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181122" version="1" comment="php5-openssl is &lt;5.5.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181123" version="1" comment="php5-pcntl is &lt;5.5.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181124" version="1" comment="php5-pdo is &lt;5.5.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181125" version="1" comment="php5-pear is &lt;5.5.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181126" version="1" comment="php5-pgsql is &lt;5.5.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181127" version="1" comment="php5-pspell is &lt;5.5.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181128" version="1" comment="php5-shmop is &lt;5.5.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181129" version="1" comment="php5-snmp is &lt;5.5.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181130" version="1" comment="php5-soap is &lt;5.5.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181131" version="1" comment="php5-sockets is &lt;5.5.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181132" version="1" comment="php5-sqlite is &lt;5.5.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181133" version="1" comment="php5-suhosin is &lt;5.5.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181134" version="1" comment="php5-sysvmsg is &lt;5.5.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181135" version="1" comment="php5-sysvsem is &lt;5.5.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181136" version="1" comment="php5-sysvshm is &lt;5.5.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181137" version="1" comment="php5-tokenizer is &lt;5.5.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181138" version="1" comment="php5-wddx is &lt;5.5.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181139" version="1" comment="php5-xmlreader is &lt;5.5.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181140" version="1" comment="php5-xmlrpc is &lt;5.5.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181141" version="1" comment="php5-xmlwriter is &lt;5.5.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181142" version="1" comment="php5-xsl is &lt;5.5.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181143" version="1" comment="php5-zip is &lt;5.5.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181144" version="1" comment="php5-zlib is &lt;5.5.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178200" version="1" comment="sle-module-web-scripting-release is &gt;=12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181145" version="1" comment="apache2-mod_php7 is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181146" version="1" comment="php7 is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181147" version="1" comment="php7-bcmath is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181148" version="1" comment="php7-bz2 is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181149" version="1" comment="php7-calendar is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181150" version="1" comment="php7-ctype is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181151" version="1" comment="php7-curl is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181152" version="1" comment="php7-dba is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181153" version="1" comment="php7-dom is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181154" version="1" comment="php7-enchant is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181155" version="1" comment="php7-exif is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181156" version="1" comment="php7-fastcgi is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181157" version="1" comment="php7-fileinfo is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181158" version="1" comment="php7-fpm is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181159" version="1" comment="php7-ftp is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181160" version="1" comment="php7-gd is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181161" version="1" comment="php7-gettext is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181162" version="1" comment="php7-gmp is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181163" version="1" comment="php7-iconv is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181164" version="1" comment="php7-imap is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181165" version="1" comment="php7-intl is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181166" version="1" comment="php7-json is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181167" version="1" comment="php7-ldap is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181168" version="1" comment="php7-mbstring is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181169" version="1" comment="php7-mcrypt is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181170" version="1" comment="php7-mysql is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181171" version="1" comment="php7-odbc is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181172" version="1" comment="php7-opcache is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181173" version="1" comment="php7-openssl is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181174" version="1" comment="php7-pcntl is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181175" version="1" comment="php7-pdo is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181176" version="1" comment="php7-pear is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181177" version="1" comment="php7-pear-Archive_Tar is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181178" version="1" comment="php7-pgsql is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181179" version="1" comment="php7-phar is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181180" version="1" comment="php7-posix is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181181" version="1" comment="php7-pspell is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181182" version="1" comment="php7-shmop is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181183" version="1" comment="php7-snmp is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181184" version="1" comment="php7-soap is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181185" version="1" comment="php7-sockets is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181186" version="1" comment="php7-sqlite is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181187" version="1" comment="php7-sysvmsg is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181188" version="1" comment="php7-sysvsem is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181189" version="1" comment="php7-sysvshm is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181190" version="1" comment="php7-tokenizer is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181191" version="1" comment="php7-wddx is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181192" version="1" comment="php7-xmlreader is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181193" version="1" comment="php7-xmlrpc is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181194" version="1" comment="php7-xmlwriter is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181195" version="1" comment="php7-xsl is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181196" version="1" comment="php7-zip is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181197" version="1" comment="php7-zlib is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181198" version="1" comment="apache2-mod_wsgi is &lt;4.4.13-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181199" version="1" comment="nodejs4 is &lt;4.5.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181200" version="1" comment="nodejs4-devel is &lt;4.5.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181201" version="1" comment="nodejs4-docs is &lt;4.5.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181202" version="1" comment="npm4 is &lt;4.5.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181203" version="1" comment="nodejs6 is &lt;6.9.5-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181204" version="1" comment="nodejs6-devel is &lt;6.9.5-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181205" version="1" comment="nodejs6-docs is &lt;6.9.5-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181206" version="1" comment="npm6 is &lt;6.9.5-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181207" version="1" comment="alsa-docs is &lt;1.0.27.2-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181208" version="1" comment="ant is &lt;1.9.4-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181209" version="1" comment="apache-commons-beanutils is &lt;1.9.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181210" version="1" comment="apache-commons-beanutils-javadoc is &lt;1.9.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181211" version="1" comment="apache-commons-daemon is &lt;1.0.15-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181212" version="1" comment="apache-commons-daemon-javadoc is &lt;1.0.15-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181213" version="1" comment="apache-commons-httpclient is &lt;3.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181214" version="1" comment="apache2 is &lt;2.4.10-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181215" version="1" comment="apache2-doc is &lt;2.4.10-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181216" version="1" comment="apache2-example-pages is &lt;2.4.10-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181217" version="1" comment="apache2-prefork is &lt;2.4.10-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181218" version="1" comment="apache2-utils is &lt;2.4.10-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181219" version="1" comment="apache2-worker is &lt;2.4.10-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181220" version="1" comment="apache2-mod_jk is &lt;1.2.40-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181221" version="1" comment="apache2-mod_nss is &lt;1.0.8-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181222" version="1" comment="apache2-mod_perl is &lt;2.0.8-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181223" version="1" comment="augeas is &lt;1.2.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181224" version="1" comment="augeas-lenses is &lt;1.2.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181225" version="1" comment="automake is &lt;1.13.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181226" version="1" comment="avahi-utils is &lt;0.6.31-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181227" version="1" comment="bind is &lt;9.9.5P1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181228" version="1" comment="bind-chrootenv is &lt;9.9.5P1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181229" version="1" comment="bind-doc is &lt;9.9.5P1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181230" version="1" comment="bzip2-doc is &lt;1.0.6-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181231" version="1" comment="gcc48-locale is &lt;4.8.3+r212056-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181232" version="1" comment="cvs-doc is &lt;1.12.12-181" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181233" version="1" comment="cyrus-sasl-otp is &lt;2.1.26-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181234" version="1" comment="cyrus-sasl-otp-32bit is &lt;2.1.26-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181235" version="1" comment="cyrus-sasl-sqlauxprop is &lt;2.1.26-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181236" version="1" comment="cyrus-sasl-sqlauxprop-32bit is &lt;2.1.26-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181237" version="1" comment="dhcp-relay is &lt;4.2.6-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181238" version="1" comment="dhcp-server is &lt;4.2.6-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181239" version="1" comment="docker is &lt;1.2.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181240" version="1" comment="dovecot22 is &lt;2.2.13-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181241" version="1" comment="dovecot22-backend-mysql is &lt;2.2.13-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181242" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.13-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181243" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.13-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181244" version="1" comment="dracut-fips is &lt;037-34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181245" version="1" comment="libasm1-32bit is &lt;0.158-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181246" version="1" comment="emacs-el is &lt;24.3-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181247" version="1" comment="emacs-nox is &lt;24.3-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181248" version="1" comment="fetchmailconf is &lt;6.3.26-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181249" version="1" comment="freeradius-server is &lt;3.0.3-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181250" version="1" comment="freeradius-server-doc is &lt;3.0.3-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181251" version="1" comment="freeradius-server-libs is &lt;3.0.3-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181252" version="1" comment="freeradius-server-utils is &lt;3.0.3-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181253" version="1" comment="git-core is &lt;1.8.5.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181254" version="1" comment="glibc-html is &lt;2.19-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181255" version="1" comment="glibc-info is &lt;2.19-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181256" version="1" comment="glibc-profile is &lt;2.19-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181257" version="1" comment="glibc-profile-32bit is &lt;2.19-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181258" version="1" comment="libgnutls-openssl27 is &lt;3.2.15-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181259" version="1" comment="groff-full is &lt;1.22.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181260" version="1" comment="gxditview is &lt;1.22.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181261" version="1" comment="guestfs-data is &lt;1.26.9-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181262" version="1" comment="guestfs-tools is &lt;1.26.9-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181263" version="1" comment="guestfsd is &lt;1.26.9-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181264" version="1" comment="libguestfs0 is &lt;1.26.9-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181265" version="1" comment="perl-Sys-Guestfs is &lt;1.26.9-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181267" version="1" comment="hyper-v is &lt;6-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181268" version="1" comment="jakarta-commons-fileupload is &lt;1.1.1-120" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181269" version="1" comment="jakarta-commons-fileupload-javadoc is &lt;1.1.1-120" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181270" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.6-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181271" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.6-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181272" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.6-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181273" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.6-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181274" version="1" comment="kernel-default-base is &lt;3.12.28-4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181275" version="1" comment="kernel-default-man is &lt;3.12.28-4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181276" version="1" comment="kernel-xen-base is &lt;3.12.28-4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181277" version="1" comment="krb5-doc is &lt;1.12.1-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181278" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.1-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181279" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.1-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181280" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.1-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181281" version="1" comment="krb5-server is &lt;1.12.1-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181282" version="1" comment="krb5-appl-servers is &lt;1.0.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181283" version="1" comment="libapr-util1 is &lt;1.5.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181284" version="1" comment="libapr-util1-dbd-sqlite3 is &lt;1.5.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181285" version="1" comment="libapr1 is &lt;1.5.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181286" version="1" comment="libcgroup-tools is &lt;0.41.rc1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181287" version="1" comment="postgresql93-contrib is &lt;9.3.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181288" version="1" comment="postgresql93-docs is &lt;9.3.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181289" version="1" comment="postgresql93-server is &lt;9.3.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181290" version="1" comment="libfreebl3-hmac is &lt;3.16.4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181291" version="1" comment="libfreebl3-hmac-32bit is &lt;3.16.4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181292" version="1" comment="libsoftokn3-hmac is &lt;3.16.4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181293" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.16.4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181294" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181295" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.6.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181296" version="1" comment="libtool is &lt;2.4.2-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181297" version="1" comment="libtool-32bit is &lt;2.4.2-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181298" version="1" comment="liblua5_2-32bit is &lt;5.2.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181299" version="1" comment="mariadb-tools is &lt;10.0.11-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181300" version="1" comment="libneon27-32bit is &lt;0.30.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181301" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181302" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181303" version="1" comment="openssl-doc is &lt;1.0.1i-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181304" version="1" comment="python-base-32bit is &lt;2.7.7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181305" version="1" comment="qt4-x11-tools is &lt;4.8.6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181306" version="1" comment="tiff is &lt;4.0.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181307" version="1" comment="libupsclient1 is &lt;2.7.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181308" version="1" comment="nut is &lt;2.7.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181309" version="1" comment="nut-drivers-net is &lt;2.7.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181310" version="1" comment="libvirt-lock-sanlock is &lt;1.2.5-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181311" version="1" comment="libvorbis-doc is &lt;1.3.3-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181312" version="1" comment="python-vte is &lt;0.28.2-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181313" version="1" comment="vte2-lang is &lt;0.28.2-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181314" version="1" comment="libxml2-doc is &lt;2.9.1-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181315" version="1" comment="logwatch is &lt;7.4.0-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181316" version="1" comment="mailman is &lt;2.1.17-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181317" version="1" comment="openslp-server is &lt;2.0.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181318" version="1" comment="openssh-fips is &lt;6.6p1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181319" version="1" comment="openvswitch is &lt;2.1.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181320" version="1" comment="openvswitch-kmp-default is &lt;2.1.2_k3.12.28_4-8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181321" version="1" comment="openvswitch-kmp-xen is &lt;2.1.2_k3.12.28_4-8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181322" version="1" comment="openvswitch-switch is &lt;2.1.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181323" version="1" comment="opie is &lt;2.4-724" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181324" version="1" comment="opie-32bit is &lt;2.4-724" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181325" version="1" comment="perl-Cyrus-IMAP is &lt;2.3.18-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181326" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.3.18-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181327" version="1" comment="ppc64-diag is &lt;2.6.7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181328" version="1" comment="python-32bit is &lt;2.7.7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181329" version="1" comment="python-demo is &lt;2.7.7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181330" version="1" comment="python-gdbm is &lt;2.7.7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181331" version="1" comment="python-idle is &lt;2.7.7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181332" version="1" comment="qemu-guest-agent is &lt;2.0.0-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181333" version="1" comment="qemu-lang is &lt;2.0.0-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181334" version="1" comment="qemu-ppc is &lt;2.0.0-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181335" version="1" comment="qemu-s390 is &lt;2.0.0-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181336" version="1" comment="quagga is &lt;0.99.22.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181337" version="1" comment="rsyslog-diag-tools is &lt;8.4.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181338" version="1" comment="rsyslog-doc is &lt;8.4.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181339" version="1" comment="rsyslog-module-gssapi is &lt;8.4.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181340" version="1" comment="rsyslog-module-gtls is &lt;8.4.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181341" version="1" comment="rsyslog-module-mysql is &lt;8.4.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181342" version="1" comment="rsyslog-module-pgsql is &lt;8.4.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181343" version="1" comment="rsyslog-module-relp is &lt;8.4.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181344" version="1" comment="rsyslog-module-snmp is &lt;8.4.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181345" version="1" comment="rsyslog-module-udpspoof is &lt;8.4.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181346" version="1" comment="squid is &lt;3.3.13-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181347" version="1" comment="squidGuard is &lt;1.4-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181348" version="1" comment="squidGuard-doc is &lt;1.4-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181349" version="1" comment="stunnel is &lt;5.00-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181350" version="1" comment="systemtap is &lt;2.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181351" version="1" comment="systemtap-runtime is &lt;2.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181352" version="1" comment="systemtap-server is &lt;2.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181353" version="1" comment="tomcat is &lt;7.0.55-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181354" version="1" comment="tomcat-admin-webapps is &lt;7.0.55-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181355" version="1" comment="tomcat-docs-webapp is &lt;7.0.55-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181356" version="1" comment="tomcat-el-2_2-api is &lt;7.0.55-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181357" version="1" comment="tomcat-javadoc is &lt;7.0.55-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181358" version="1" comment="tomcat-jsp-2_2-api is &lt;7.0.55-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181359" version="1" comment="tomcat-lib is &lt;7.0.55-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181360" version="1" comment="tomcat-servlet-3_0-api is &lt;7.0.55-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181361" version="1" comment="tomcat-webapps is &lt;7.0.55-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181362" version="1" comment="xen-doc-html is &lt;4.4.1_06-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181363" version="1" comment="xen-tools is &lt;4.4.1_06-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181364" version="1" comment="xen-tools-domU is &lt;4.4.1_06-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181365" version="1" comment="apache2 is &lt;2.4.16-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181366" version="1" comment="apache2-doc is &lt;2.4.16-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181367" version="1" comment="apache2-example-pages is &lt;2.4.16-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181368" version="1" comment="apache2-prefork is &lt;2.4.16-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181369" version="1" comment="apache2-utils is &lt;2.4.16-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181370" version="1" comment="apache2-worker is &lt;2.4.16-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181371" version="1" comment="apache2-mod_jk is &lt;1.2.40-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181372" version="1" comment="apache2-mod_nss is &lt;1.0.8-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181373" version="1" comment="apache2-mod_perl is &lt;2.0.8-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181374" version="1" comment="augeas is &lt;1.2.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181375" version="1" comment="augeas-lenses is &lt;1.2.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181376" version="1" comment="bind is &lt;9.9.6P1-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181377" version="1" comment="bind-chrootenv is &lt;9.9.6P1-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181378" version="1" comment="bind-doc is &lt;9.9.6P1-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181379" version="1" comment="gcc48-locale is &lt;4.8.5-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181380" version="1" comment="davfs2 is &lt;1.5.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181381" version="1" comment="dhcp-relay is &lt;4.3.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181382" version="1" comment="dhcp-server is &lt;4.3.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181383" version="1" comment="dracut-fips is &lt;037-66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181384" version="1" comment="libasm1-32bit is &lt;0.158-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181385" version="1" comment="freeradius-server is &lt;3.0.3-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181386" version="1" comment="freeradius-server-doc is &lt;3.0.3-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181387" version="1" comment="freeradius-server-krb5 is &lt;3.0.3-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181388" version="1" comment="freeradius-server-ldap is &lt;3.0.3-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181389" version="1" comment="freeradius-server-libs is &lt;3.0.3-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181390" version="1" comment="freeradius-server-mysql is &lt;3.0.3-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181391" version="1" comment="freeradius-server-perl is &lt;3.0.3-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181392" version="1" comment="freeradius-server-postgresql is &lt;3.0.3-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181393" version="1" comment="freeradius-server-python is &lt;3.0.3-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181394" version="1" comment="freeradius-server-sqlite is &lt;3.0.3-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181395" version="1" comment="freeradius-server-utils is &lt;3.0.3-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181396" version="1" comment="git-core is &lt;1.8.5.6-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181397" version="1" comment="glibc-html is &lt;2.19-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181398" version="1" comment="glibc-info is &lt;2.19-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181399" version="1" comment="glibc-profile is &lt;2.19-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181400" version="1" comment="glibc-profile-32bit is &lt;2.19-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181401" version="1" comment="libgnutls-openssl27 is &lt;3.2.15-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181402" version="1" comment="guestfs-data is &lt;1.26.10-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181403" version="1" comment="guestfs-tools is &lt;1.26.10-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181404" version="1" comment="guestfsd is &lt;1.26.10-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181405" version="1" comment="libguestfs0 is &lt;1.26.10-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181406" version="1" comment="perl-Sys-Guestfs is &lt;1.26.10-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181407" version="1" comment="python-libguestfs is &lt;1.26.10-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181408" version="1" comment="ipsec-tools is &lt;0.8.0-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181409" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.91-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181410" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.91-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181411" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.10-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181412" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.10-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181413" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.10-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181414" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.10-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181415" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr1.10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181416" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr1.10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181417" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr1.10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181418" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.65-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181419" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.65-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181420" version="1" comment="kernel-default-base is &lt;3.12.49-11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181421" version="1" comment="kernel-default-man is &lt;3.12.49-11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181422" version="1" comment="kernel-xen-base is &lt;3.12.49-11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181423" version="1" comment="krb5-doc is &lt;1.12.1-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181424" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.1-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181425" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.1-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181426" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.1-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181427" version="1" comment="krb5-server is &lt;1.12.1-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181428" version="1" comment="libFLAC++6 is &lt;1.3.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181429" version="1" comment="libcgroup-tools is &lt;0.41.rc1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181430" version="1" comment="postgresql94-contrib is &lt;9.4.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181431" version="1" comment="postgresql94-docs is &lt;9.4.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181432" version="1" comment="postgresql94-server is &lt;9.4.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181433" version="1" comment="libfreebl3-hmac is &lt;3.19.2.1-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181434" version="1" comment="libfreebl3-hmac-32bit is &lt;3.19.2.1-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181435" version="1" comment="libsoftokn3-hmac is &lt;3.19.2.1-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181436" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.19.2.1-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181437" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181438" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.6.1-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181439" version="1" comment="libhivex0 is &lt;1.3.10-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181440" version="1" comment="perl-Win-Hivex is &lt;1.3.10-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181441" version="1" comment="libicu-doc is &lt;52.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181442" version="1" comment="libjansson4 is &lt;2.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181443" version="1" comment="libmpfr4-32bit is &lt;3.1.2-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181444" version="1" comment="mariadb-tools is &lt;10.0.21-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181445" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181446" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181447" version="1" comment="openssl-doc is &lt;1.0.1i-34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181448" version="1" comment="python-base-32bit is &lt;2.7.9-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181449" version="1" comment="qt4-x11-tools is &lt;4.8.6-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181450" version="1" comment="tiff is &lt;4.0.4-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181451" version="1" comment="libvirt-lock-sanlock is &lt;1.2.18.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181452" version="1" comment="libxml2-doc is &lt;2.9.1-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181453" version="1" comment="openldap2 is &lt;2.4.41-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181454" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181455" version="1" comment="openslp-server is &lt;2.0.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181456" version="1" comment="openssh-fips is &lt;6.6p1-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181457" version="1" comment="openvpn-auth-pam-plugin is &lt;2.3.8-16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181458" version="1" comment="openvswitch is &lt;2.1.2-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181459" version="1" comment="openvswitch-kmp-default is &lt;2.1.2_k3.12.49_11-4.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181460" version="1" comment="openvswitch-kmp-xen is &lt;2.1.2_k3.12.49_11-4.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181461" version="1" comment="openvswitch-switch is &lt;2.1.2-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181462" version="1" comment="powerpc-utils is &lt;1.2.26-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181463" version="1" comment="ppc64-diag is &lt;2.6.9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181464" version="1" comment="python-32bit is &lt;2.7.9-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181465" version="1" comment="python-demo is &lt;2.7.9-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181466" version="1" comment="python-gdbm is &lt;2.7.9-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181467" version="1" comment="python-idle is &lt;2.7.9-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181468" version="1" comment="qemu-block-rbd is &lt;2.3.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181469" version="1" comment="qemu-guest-agent is &lt;2.3.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181470" version="1" comment="qemu-lang is &lt;2.3.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181471" version="1" comment="qemu-ppc is &lt;2.3.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181472" version="1" comment="qemu-s390 is &lt;2.3.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181473" version="1" comment="rsyslog-diag-tools is &lt;8.4.0-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181474" version="1" comment="rsyslog-doc is &lt;8.4.0-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181475" version="1" comment="rsyslog-module-gssapi is &lt;8.4.0-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181476" version="1" comment="rsyslog-module-gtls is &lt;8.4.0-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181477" version="1" comment="rsyslog-module-mysql is &lt;8.4.0-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181478" version="1" comment="rsyslog-module-pgsql is &lt;8.4.0-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181479" version="1" comment="rsyslog-module-relp is &lt;8.4.0-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181480" version="1" comment="rsyslog-module-snmp is &lt;8.4.0-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181481" version="1" comment="rsyslog-module-udpspoof is &lt;8.4.0-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181482" version="1" comment="smt is &lt;3.0.8-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181483" version="1" comment="smt-support is &lt;3.0.8-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181484" version="1" comment="squid is &lt;3.3.13-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181485" version="1" comment="strongswan-hmac is &lt;5.1.3-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181486" version="1" comment="stunnel is &lt;5.00-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181487" version="1" comment="systemtap is &lt;2.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181488" version="1" comment="systemtap-runtime is &lt;2.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181489" version="1" comment="systemtap-server is &lt;2.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181490" version="1" comment="tomcat is &lt;8.0.23-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181491" version="1" comment="tomcat-admin-webapps is &lt;8.0.23-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181492" version="1" comment="tomcat-docs-webapp is &lt;8.0.23-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181493" version="1" comment="tomcat-el-3_0-api is &lt;8.0.23-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181494" version="1" comment="tomcat-javadoc is &lt;8.0.23-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181495" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.23-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181496" version="1" comment="tomcat-lib is &lt;8.0.23-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181497" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.23-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181498" version="1" comment="tomcat-webapps is &lt;8.0.23-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181499" version="1" comment="vsftpd is &lt;3.0.2-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181500" version="1" comment="xen-doc-html is &lt;4.5.1_12-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181501" version="1" comment="xen-tools is &lt;4.5.1_12-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181502" version="1" comment="xen-tools-domU is &lt;4.5.1_12-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128018" version="1" comment="sles-release is ==12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181503" version="1" comment="apache2 is &lt;2.4.23-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181504" version="1" comment="apache2-doc is &lt;2.4.23-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181505" version="1" comment="apache2-example-pages is &lt;2.4.23-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181506" version="1" comment="apache2-prefork is &lt;2.4.23-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181507" version="1" comment="apache2-utils is &lt;2.4.23-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181508" version="1" comment="apache2-worker is &lt;2.4.23-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181509" version="1" comment="apache2-mod_nss is &lt;1.0.14-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181510" version="1" comment="flex is &lt;2.5.37-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181511" version="1" comment="flex-32bit is &lt;2.5.37-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181512" version="1" comment="libbonobo-doc is &lt;2.32.1-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181513" version="1" comment="automake is &lt;1.13.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181514" version="1" comment="avahi-utils is &lt;0.6.32-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181515" version="1" comment="bind is &lt;9.9.9P1-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181516" version="1" comment="bind-chrootenv is &lt;9.9.9P1-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181517" version="1" comment="bind-doc is &lt;9.9.9P1-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181518" version="1" comment="bzip2-doc is &lt;1.0.6-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181519" version="1" comment="chrony is &lt;2.3-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181520" version="1" comment="gcc48-locale is &lt;4.8.5-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184962" version="1" comment="curl is &lt;7.37.0-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184963" version="1" comment="libcurl4 is &lt;7.37.0-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184964" version="1" comment="libcurl4-32bit is &lt;7.37.0-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181521" version="1" comment="dhcp-relay is &lt;4.3.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181522" version="1" comment="dhcp-server is &lt;4.3.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181523" version="1" comment="dracut-fips is &lt;044-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181524" version="1" comment="dstat is &lt;0.7.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181525" version="1" comment="emacs-el is &lt;24.3-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181526" version="1" comment="emacs-nox is &lt;24.3-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181527" version="1" comment="fetchmailconf is &lt;6.3.26-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181528" version="1" comment="giflib-progs is &lt;5.0.5-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181529" version="1" comment="git-core is &lt;1.8.5.6-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181530" version="1" comment="glibc-html is &lt;2.22-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181531" version="1" comment="glibc-info is &lt;2.22-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181532" version="1" comment="glibc-profile is &lt;2.22-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181533" version="1" comment="glibc-profile-32bit is &lt;2.22-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181534" version="1" comment="grub2-arm64-efi is &lt;2.02~beta2-104" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181535" version="1" comment="grub2-powerpc-ieee1275 is &lt;2.02~beta2-104" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181536" version="1" comment="grub2-s390x-emu is &lt;2.02~beta2-104" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181537" version="1" comment="guestfs-data is &lt;1.32.4-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181538" version="1" comment="guestfs-tools is &lt;1.32.4-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181539" version="1" comment="guestfsd is &lt;1.32.4-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181540" version="1" comment="libguestfs0 is &lt;1.32.4-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181541" version="1" comment="perl-Sys-Guestfs is &lt;1.32.4-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181542" version="1" comment="python-libguestfs is &lt;1.32.4-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181543" version="1" comment="virt-p2v is &lt;1.32.4-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181544" version="1" comment="virt-v2v is &lt;1.32.4-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181545" version="1" comment="ipsec-tools is &lt;0.8.0-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181546" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.111-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181547" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.111-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181548" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.50-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181549" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.50-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181550" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.50-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181551" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.50-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181552" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr3.0-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181553" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr3.0-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181554" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr3.0-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181555" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.101-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181556" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.101-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181557" version="1" comment="kernel-default-base is &lt;4.4.21-69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181558" version="1" comment="kernel-default-man is &lt;4.4.21-69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181559" version="1" comment="krb5-doc is &lt;1.12.5-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181560" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.5-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181561" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.5-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181562" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.5-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181563" version="1" comment="krb5-server is &lt;1.12.5-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181564" version="1" comment="postgresql94-contrib is &lt;9.4.9-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181565" version="1" comment="postgresql94-docs is &lt;9.4.9-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181566" version="1" comment="postgresql94-server is &lt;9.4.9-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181567" version="1" comment="libfreebl3-hmac is &lt;3.21.1-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181568" version="1" comment="libfreebl3-hmac-32bit is &lt;3.21.1-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181569" version="1" comment="libsoftokn3-hmac is &lt;3.21.1-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181570" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.21.1-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181571" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-16.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181572" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.6.1-16.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181573" version="1" comment="libidn-tools is &lt;1.28-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181574" version="1" comment="openldap2 is &lt;2.4.41-18.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181575" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181576" version="1" comment="mariadb-tools is &lt;10.0.27-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181578" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181579" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181580" version="1" comment="openssl-doc is &lt;1.0.2j-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181581" version="1" comment="python-base-32bit is &lt;2.7.9-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181582" version="1" comment="qt4-x11-tools is &lt;4.8.6-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181583" version="1" comment="libtcnative-1-0 is &lt;1.1.32-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181584" version="1" comment="tiff is &lt;4.0.6-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181585" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181586" version="1" comment="libvirt-nss is &lt;2.0.0-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181587" version="1" comment="libvncclient0 is &lt;0.9.9-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181588" version="1" comment="libvncserver0 is &lt;0.9.9-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181589" version="1" comment="python-vte is &lt;0.28.2-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181590" version="1" comment="vte2-lang is &lt;0.28.2-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181591" version="1" comment="libxml2-doc is &lt;2.9.4-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181592" version="1" comment="logwatch is &lt;7.4.3-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181593" version="1" comment="openslp-server is &lt;2.0.0-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181594" version="1" comment="openssh-fips is &lt;7.2p2-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181595" version="1" comment="openvpn-auth-pam-plugin is &lt;2.3.8-16.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181596" version="1" comment="openvswitch is &lt;2.5.1-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181597" version="1" comment="openvswitch-dpdk is &lt;2.5.1-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181598" version="1" comment="openvswitch-dpdk-switch is &lt;2.5.1-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181599" version="1" comment="openvswitch-switch is &lt;2.5.1-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181600" version="1" comment="powerpc-utils is &lt;1.3.2-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181601" version="1" comment="ppc64-diag is &lt;2.7.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181602" version="1" comment="python-32bit is &lt;2.7.9-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181603" version="1" comment="python-demo is &lt;2.7.9-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181604" version="1" comment="python-gdbm is &lt;2.7.9-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181605" version="1" comment="python-idle is &lt;2.7.9-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181606" version="1" comment="qemu-arm is &lt;2.6.1-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181607" version="1" comment="qemu-block-rbd is &lt;2.6.1-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181608" version="1" comment="qemu-block-ssh is &lt;2.6.1-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181609" version="1" comment="qemu-guest-agent is &lt;2.6.1-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181610" version="1" comment="qemu-lang is &lt;2.6.1-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181611" version="1" comment="qemu-ppc is &lt;2.6.1-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181612" version="1" comment="qemu-s390 is &lt;2.6.1-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181613" version="1" comment="quagga is &lt;0.99.22.1-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181614" version="1" comment="res-signingkeys is &lt;3.0.18-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181615" version="1" comment="smt is &lt;3.0.18-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181616" version="1" comment="smt-support is &lt;3.0.18-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181617" version="1" comment="rsyslog-diag-tools is &lt;8.4.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181618" version="1" comment="rsyslog-doc is &lt;8.4.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181619" version="1" comment="rsyslog-module-gssapi is &lt;8.4.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181620" version="1" comment="rsyslog-module-gtls is &lt;8.4.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181621" version="1" comment="rsyslog-module-mysql is &lt;8.4.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181622" version="1" comment="rsyslog-module-pgsql is &lt;8.4.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181623" version="1" comment="rsyslog-module-relp is &lt;8.4.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181624" version="1" comment="rsyslog-module-snmp is &lt;8.4.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181625" version="1" comment="rsyslog-module-udpspoof is &lt;8.4.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181626" version="1" comment="squid is &lt;3.5.21-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181627" version="1" comment="strongswan-hmac is &lt;5.1.3-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181628" version="1" comment="systemtap is &lt;3.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181629" version="1" comment="systemtap-runtime is &lt;3.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181630" version="1" comment="systemtap-server is &lt;3.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181631" version="1" comment="tomcat is &lt;8.0.36-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181632" version="1" comment="tomcat-admin-webapps is &lt;8.0.36-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181633" version="1" comment="tomcat-docs-webapp is &lt;8.0.36-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181634" version="1" comment="tomcat-el-3_0-api is &lt;8.0.36-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181635" version="1" comment="tomcat-javadoc is &lt;8.0.36-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181636" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.36-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181637" version="1" comment="tomcat-lib is &lt;8.0.36-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181638" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.36-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181639" version="1" comment="tomcat-webapps is &lt;8.0.36-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181640" version="1" comment="vsftpd is &lt;3.0.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181641" version="1" comment="xen-doc-html is &lt;4.7.0_12-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181642" version="1" comment="xen-tools is &lt;4.7.0_12-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181643" version="1" comment="xen-tools-domU is &lt;4.7.0_12-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158922" version="1" comment="sles-release is ==12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181644" version="1" comment="alsa-docs is &lt;1.0.27.2-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181645" version="1" comment="apache-commons-daemon is &lt;1.0.15-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181646" version="1" comment="apache-commons-daemon-javadoc is &lt;1.0.15-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181647" version="1" comment="apache2 is &lt;2.4.23-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181648" version="1" comment="apache2-doc is &lt;2.4.23-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181649" version="1" comment="apache2-example-pages is &lt;2.4.23-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181650" version="1" comment="apache2-prefork is &lt;2.4.23-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181651" version="1" comment="apache2-utils is &lt;2.4.23-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181652" version="1" comment="apache2-worker is &lt;2.4.23-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181653" version="1" comment="apache2-mod_apparmor is &lt;2.8.2-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181654" version="1" comment="bind is &lt;9.9.9P1-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181655" version="1" comment="bind-chrootenv is &lt;9.9.9P1-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181656" version="1" comment="bind-doc is &lt;9.9.9P1-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181657" version="1" comment="crash is &lt;7.1.8-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181658" version="1" comment="crash-kmp-default is &lt;7.1.8_k4.4.73_5-3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181659" version="1" comment="dovecot22 is &lt;2.2.30.2-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181660" version="1" comment="dovecot22-backend-mysql is &lt;2.2.30.2-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181661" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.30.2-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181662" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.30.2-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181663" version="1" comment="dracut-fips is &lt;044-113" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181664" version="1" comment="emacs-el is &lt;24.3-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181665" version="1" comment="emacs-nox is &lt;24.3-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181666" version="1" comment="freeradius-server is &lt;3.0.14-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181667" version="1" comment="freeradius-server-doc is &lt;3.0.14-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181668" version="1" comment="freeradius-server-krb5 is &lt;3.0.14-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181669" version="1" comment="freeradius-server-ldap is &lt;3.0.14-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181670" version="1" comment="freeradius-server-libs is &lt;3.0.14-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181671" version="1" comment="freeradius-server-mysql is &lt;3.0.14-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181672" version="1" comment="freeradius-server-perl is &lt;3.0.14-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181673" version="1" comment="freeradius-server-postgresql is &lt;3.0.14-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181674" version="1" comment="freeradius-server-python is &lt;3.0.14-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181675" version="1" comment="freeradius-server-sqlite is &lt;3.0.14-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181676" version="1" comment="freeradius-server-utils is &lt;3.0.14-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181677" version="1" comment="git-core is &lt;2.12.3-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181678" version="1" comment="glibc-html is &lt;2.22-61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181679" version="1" comment="glibc-info is &lt;2.22-61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181680" version="1" comment="glibc-profile is &lt;2.22-61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181681" version="1" comment="glibc-profile-32bit is &lt;2.22-61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181682" version="1" comment="libgnutls-openssl27 is &lt;3.3.27-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181683" version="1" comment="grub2-arm64-efi is &lt;2.02-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181684" version="1" comment="grub2-powerpc-ieee1275 is &lt;2.02-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181685" version="1" comment="grub2-s390x-emu is &lt;2.02-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181686" version="1" comment="guestfs-data is &lt;1.32.4-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181687" version="1" comment="guestfs-tools is &lt;1.32.4-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181688" version="1" comment="guestfsd is &lt;1.32.4-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181689" version="1" comment="libguestfs0 is &lt;1.32.4-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181690" version="1" comment="perl-Sys-Guestfs is &lt;1.32.4-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181691" version="1" comment="python-libguestfs is &lt;1.32.4-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181692" version="1" comment="virt-p2v is &lt;1.32.4-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181693" version="1" comment="virt-v2v is &lt;1.32.4-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181694" version="1" comment="ipsec-tools is &lt;0.8.0-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181695" version="1" comment="jakarta-taglibs-standard is &lt;1.1.1-255" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181696" version="1" comment="jakarta-taglibs-standard-javadoc is &lt;1.1.1-255" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181697" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.141-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181698" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.141-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181699" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.5-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181700" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.5-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181701" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.5-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181702" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.5-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181703" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr4.5-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181704" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr4.5-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181705" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr4.5-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181706" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.131-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181707" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.131-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181708" version="1" comment="kernel-default-base is &lt;4.4.73-5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181709" version="1" comment="kernel-default-man is &lt;4.4.73-5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181710" version="1" comment="libcgroup-tools is &lt;0.41.rc1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181711" version="1" comment="postgresql96-contrib is &lt;9.6.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181712" version="1" comment="postgresql96-docs is &lt;9.6.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181713" version="1" comment="postgresql96-server is &lt;9.6.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181714" version="1" comment="libfreebl3-hmac is &lt;3.29.5-57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181715" version="1" comment="libfreebl3-hmac-32bit is &lt;3.29.5-57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181716" version="1" comment="libsoftokn3-hmac is &lt;3.29.5-57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181717" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.29.5-57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181718" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-16.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181719" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.6.1-16.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181720" version="1" comment="openldap2 is &lt;2.4.41-18.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181721" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181722" version="1" comment="libtool is &lt;2.4.2-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181723" version="1" comment="libtool-32bit is &lt;2.4.2-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181724" version="1" comment="liblua5_2-32bit is &lt;5.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181725" version="1" comment="libmicrohttpd10 is &lt;0.9.30-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181726" version="1" comment="mariadb-tools is &lt;10.0.30-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181727" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181728" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181729" version="1" comment="openssl-doc is &lt;1.0.2j-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181730" version="1" comment="python-base-32bit is &lt;2.7.13-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181731" version="1" comment="libtcnative-1-0 is &lt;1.1.34-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181732" version="1" comment="tiff is &lt;4.0.7-43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181733" version="1" comment="libvirt-lock-sanlock is &lt;3.3.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181734" version="1" comment="libvirt-nss is &lt;3.3.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181735" version="1" comment="libxml2-doc is &lt;2.9.4-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181736" version="1" comment="memcached is &lt;1.4.33-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181737" version="1" comment="openslp-server is &lt;2.0.0-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181738" version="1" comment="openssh-fips is &lt;7.2p2-69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181739" version="1" comment="openvpn-auth-pam-plugin is &lt;2.3.8-16.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181740" version="1" comment="openvswitch is &lt;2.7.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181741" version="1" comment="perl-DBD-mysql is &lt;4.021-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181742" version="1" comment="policycoreutils is &lt;2.5-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181743" version="1" comment="policycoreutils-python is &lt;2.5-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181744" version="1" comment="powerpc-utils is &lt;1.3.3-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181745" version="1" comment="ppc64-diag is &lt;2.7.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181746" version="1" comment="python-32bit is &lt;2.7.13-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181747" version="1" comment="python-demo is &lt;2.7.13-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181748" version="1" comment="python-gdbm is &lt;2.7.13-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181749" version="1" comment="python-idle is &lt;2.7.13-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181750" version="1" comment="python-PyYAML is &lt;3.12-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181751" version="1" comment="python-doc is &lt;2.7.13-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181752" version="1" comment="python-doc-pdf is &lt;2.7.13-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181753" version="1" comment="qemu-arm is &lt;2.9.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181754" version="1" comment="qemu-block-rbd is &lt;2.9.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181755" version="1" comment="qemu-block-ssh is &lt;2.9.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181756" version="1" comment="qemu-guest-agent is &lt;2.9.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181757" version="1" comment="qemu-lang is &lt;2.9.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181758" version="1" comment="qemu-ppc is &lt;2.9.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181759" version="1" comment="qemu-s390 is &lt;2.9.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181760" version="1" comment="quagga is &lt;0.99.22.1-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181761" version="1" comment="res-signingkeys is &lt;3.0.25-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181762" version="1" comment="smt is &lt;3.0.25-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181763" version="1" comment="smt-support is &lt;3.0.25-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181764" version="1" comment="rsyslog-diag-tools is &lt;8.24.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181765" version="1" comment="rsyslog-doc is &lt;8.24.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181766" version="1" comment="rsyslog-module-gssapi is &lt;8.24.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181767" version="1" comment="rsyslog-module-gtls is &lt;8.24.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181768" version="1" comment="rsyslog-module-mysql is &lt;8.24.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181769" version="1" comment="rsyslog-module-pgsql is &lt;8.24.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181770" version="1" comment="rsyslog-module-relp is &lt;8.24.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181771" version="1" comment="rsyslog-module-snmp is &lt;8.24.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181772" version="1" comment="rsyslog-module-udpspoof is &lt;8.24.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181773" version="1" comment="squid is &lt;3.5.21-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181774" version="1" comment="squidGuard is &lt;1.4-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181775" version="1" comment="squidGuard-doc is &lt;1.4-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181776" version="1" comment="strongswan-hmac is &lt;5.1.3-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181777" version="1" comment="systemtap is &lt;3.0-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181778" version="1" comment="systemtap-runtime is &lt;3.0-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181779" version="1" comment="systemtap-server is &lt;3.0-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181780" version="1" comment="tomcat is &lt;8.0.43-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181781" version="1" comment="tomcat-admin-webapps is &lt;8.0.43-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181782" version="1" comment="tomcat-docs-webapp is &lt;8.0.43-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181783" version="1" comment="tomcat-el-3_0-api is &lt;8.0.43-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181784" version="1" comment="tomcat-javadoc is &lt;8.0.43-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181785" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.43-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181786" version="1" comment="tomcat-lib is &lt;8.0.43-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181787" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.43-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181788" version="1" comment="tomcat-webapps is &lt;8.0.43-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181789" version="1" comment="tpm2.0-tools is &lt;2.0.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181790" version="1" comment="vsftpd is &lt;3.0.2-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181791" version="1" comment="xen-doc-html is &lt;4.9.0_08-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181792" version="1" comment="xen-tools is &lt;4.9.0_08-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181793" version="1" comment="xen-tools-domU is &lt;4.9.0_08-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240280" version="1" comment="sles-release is ==12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235154" version="1" comment="ant is &lt;1.9.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235136" version="1" comment="apache2 is &lt;2.4.23-29.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235137" version="1" comment="apache2-doc is &lt;2.4.23-29.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235138" version="1" comment="apache2-example-pages is &lt;2.4.23-29.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235139" version="1" comment="apache2-prefork is &lt;2.4.23-29.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235140" version="1" comment="apache2-utils is &lt;2.4.23-29.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235141" version="1" comment="apache2-worker is &lt;2.4.23-29.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240281" version="1" comment="apache2-mod_nss is &lt;1.0.14-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237104" version="1" comment="axis is &lt;1.4-290.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240282" version="1" comment="bind is &lt;9.11.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240283" version="1" comment="bind-chrootenv is &lt;9.11.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240284" version="1" comment="bind-doc is &lt;9.11.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240285" version="1" comment="gcc48-locale is &lt;4.8.5-31.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240286" version="1" comment="crash is &lt;7.2.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240287" version="1" comment="crash-kmp-default is &lt;7.2.1_k4.12.14_94.41-2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192208" version="1" comment="cvs-doc is &lt;1.12.12-182.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240288" version="1" comment="cyrus-sasl-otp is &lt;2.1.26-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240289" version="1" comment="cyrus-sasl-otp-32bit is &lt;2.1.26-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240290" version="1" comment="cyrus-sasl-sqlauxprop is &lt;2.1.26-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240291" version="1" comment="cyrus-sasl-sqlauxprop-32bit is &lt;2.1.26-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192409" version="1" comment="dhcp-relay is &lt;4.3.3-10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192410" version="1" comment="dhcp-server is &lt;4.3.3-10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234083" version="1" comment="dovecot22 is &lt;2.2.31-19.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234084" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234085" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234086" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240292" version="1" comment="dpdk is &lt;17.11.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240293" version="1" comment="dpdk-kmp-default is &lt;17.11.4_k4.12.14_94.41-3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240294" version="1" comment="dpdk-thunderx is &lt;17.11.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240295" version="1" comment="dpdk-thunderx-kmp-default is &lt;17.11.4_k4.12.14_94.41-3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240296" version="1" comment="dpdk-tools is &lt;17.11.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240297" version="1" comment="libdpdk-17_11 is &lt;17.11.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240298" version="1" comment="dracut-fips is &lt;044.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240299" version="1" comment="dstat is &lt;0.7.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192210" version="1" comment="emacs-el is &lt;24.3-25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192211" version="1" comment="emacs-nox is &lt;24.3-25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240300" version="1" comment="freeradius-server is &lt;3.0.15-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240301" version="1" comment="freeradius-server-doc is &lt;3.0.15-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240302" version="1" comment="freeradius-server-krb5 is &lt;3.0.15-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240303" version="1" comment="freeradius-server-ldap is &lt;3.0.15-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240304" version="1" comment="freeradius-server-libs is &lt;3.0.15-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240305" version="1" comment="freeradius-server-mysql is &lt;3.0.15-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240306" version="1" comment="freeradius-server-perl is &lt;3.0.15-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240307" version="1" comment="freeradius-server-postgresql is &lt;3.0.15-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240308" version="1" comment="freeradius-server-python is &lt;3.0.15-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240309" version="1" comment="freeradius-server-sqlite is &lt;3.0.15-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240310" version="1" comment="freeradius-server-utils is &lt;3.0.15-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192052" version="1" comment="git-core is &lt;2.12.3-27.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240311" version="1" comment="glibc-html is &lt;2.22-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240312" version="1" comment="glibc-info is &lt;2.22-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240313" version="1" comment="glibc-profile is &lt;2.22-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240314" version="1" comment="glibc-profile-32bit is &lt;2.22-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235177" version="1" comment="libgnutls-openssl27 is &lt;3.3.27-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240315" version="1" comment="grub2-arm64-efi is &lt;2.02-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240316" version="1" comment="grub2-powerpc-ieee1275 is &lt;2.02-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240317" version="1" comment="grub2-s390x-emu is &lt;2.02-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240318" version="1" comment="guestfs-data is &lt;1.32.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240319" version="1" comment="guestfs-tools is &lt;1.32.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240320" version="1" comment="guestfsd is &lt;1.32.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240321" version="1" comment="libguestfs0 is &lt;1.32.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240322" version="1" comment="perl-Sys-Guestfs is &lt;1.32.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240323" version="1" comment="python-libguestfs is &lt;1.32.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240324" version="1" comment="virt-p2v is &lt;1.32.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240325" version="1" comment="virt-v2v is &lt;1.32.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192368" version="1" comment="ipsec-tools is &lt;0.8.0-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223515" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.181-43.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223516" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.181-43.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234087" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.30-38.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234088" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.30-38.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234090" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.30-38.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234091" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.30-38.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235146" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.20-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235147" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr5.20-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235149" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr5.20-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236720" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.181-27.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236721" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.181-27.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240326" version="1" comment="kernel-default-base is &lt;4.12.14-94.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240327" version="1" comment="kernel-default-man is &lt;4.12.14-94.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240328" version="1" comment="krb5-doc is &lt;1.12.5-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240329" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.5-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240330" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.5-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240331" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.5-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240332" version="1" comment="krb5-server is &lt;1.12.5-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192274" version="1" comment="libapr-util1 is &lt;1.5.3-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192275" version="1" comment="libapr-util1-dbd-sqlite3 is &lt;1.5.3-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195850" version="1" comment="libapr1 is &lt;1.5.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236727" version="1" comment="postgresql10-contrib is &lt;10.5-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236728" version="1" comment="postgresql10-docs is &lt;10.5-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236729" version="1" comment="postgresql10-server is &lt;10.5-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240333" version="1" comment="libfreebl3-hmac is &lt;3.29.5-58.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240334" version="1" comment="libfreebl3-hmac-32bit is &lt;3.29.5-58.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240335" version="1" comment="libsoftokn3-hmac is &lt;3.29.5-58.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240336" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.29.5-58.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240337" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-16.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240338" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.6.1-16.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192112" version="1" comment="libicu-doc is &lt;52.1-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197309" version="1" comment="libidn-tools is &lt;1.28-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240339" version="1" comment="openldap2 is &lt;2.4.41-18.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240340" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235009" version="1" comment="python-louis is &lt;2.6.4-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240341" version="1" comment="libtool is &lt;2.4.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240342" version="1" comment="libtool-32bit is &lt;2.4.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197192" version="1" comment="ncurses-devel-32bit is &lt;5.9-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240343" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2p-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240344" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2p-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240345" version="1" comment="openssl-1_0_0-doc is &lt;1.0.2p-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240346" version="1" comment="libopenvswitch-2_8-0 is &lt;2.8.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240347" version="1" comment="openvswitch is &lt;2.8.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192373" version="1" comment="libospf0 is &lt;1.1.1-17.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192374" version="1" comment="libospfapiclient0 is &lt;1.1.1-17.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192375" version="1" comment="libquagga_pb0 is &lt;1.1.1-17.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192376" version="1" comment="libzebra1 is &lt;1.1.1-17.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192377" version="1" comment="quagga is &lt;1.1.1-17.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240348" version="1" comment="python-base-32bit is &lt;2.7.13-28.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236711" version="1" comment="qpdf is &lt;7.1.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240349" version="1" comment="qt4-x11-tools is &lt;4.8.7-8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197308" version="1" comment="librelp0 is &lt;1.2.12-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192270" version="1" comment="libsaml8 is &lt;2.5.5-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192272" version="1" comment="opensaml-bin is &lt;2.5.5-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192273" version="1" comment="opensaml-schemas is &lt;2.5.5-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192265" version="1" comment="libshibsp-lite6 is &lt;2.5.5-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192266" version="1" comment="libshibsp6 is &lt;2.5.5-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192267" version="1" comment="shibboleth-sp is &lt;2.5.5-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240350" version="1" comment="libtcnative-1-0 is &lt;1.2.17-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237878" version="1" comment="tiff is &lt;4.0.9-44.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240351" version="1" comment="libupsclient1 is &lt;2.7.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240352" version="1" comment="nut is &lt;2.7.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240353" version="1" comment="nut-drivers-net is &lt;2.7.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240354" version="1" comment="libvirt-daemon-hooks is &lt;4.0.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240355" version="1" comment="libvirt-lock-sanlock is &lt;4.0.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240356" version="1" comment="libvirt-nss is &lt;4.0.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192426" version="1" comment="libvncclient0 is &lt;0.9.9-17.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192427" version="1" comment="libvncserver0 is &lt;0.9.9-17.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197288" version="1" comment="libvorbis-doc is &lt;1.3.3-10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236806" version="1" comment="libxml2-doc is &lt;2.9.4-46.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192399" version="1" comment="libxmltooling6 is &lt;1.5.6-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192401" version="1" comment="xmltooling-schemas is &lt;1.5.6-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240357" version="1" comment="mariadb-tools is &lt;10.2.18-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197313" version="1" comment="memcached is &lt;1.4.39-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235836" version="1" comment="openslp-server is &lt;2.0.0-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233373" version="1" comment="openssh-fips is &lt;7.2p2-74.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192238" version="1" comment="openvpn-auth-pam-plugin is &lt;2.3.8-16.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240358" version="1" comment="ovmf is &lt;2017+git1510945757.b2662641d5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240359" version="1" comment="ovmf-tools is &lt;2017+git1510945757.b2662641d5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240360" version="1" comment="qemu-uefi-aarch64 is &lt;2017+git1510945757.b2662641d5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197356" version="1" comment="perl-DBD-mysql is &lt;4.021-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192446" version="1" comment="policycoreutils is &lt;2.5-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192447" version="1" comment="policycoreutils-python is &lt;2.5-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240361" version="1" comment="powerpc-utils is &lt;1.3.5-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240362" version="1" comment="ppc64-diag is &lt;2.7.4-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240363" version="1" comment="python-32bit is &lt;2.7.13-28.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240364" version="1" comment="python-demo is &lt;2.7.13-28.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240365" version="1" comment="python-gdbm is &lt;2.7.13-28.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240366" version="1" comment="python-idle is &lt;2.7.13-28.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240367" version="1" comment="python-PyYAML is &lt;3.12-26.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240368" version="1" comment="python-doc is &lt;2.7.13-28.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240369" version="1" comment="python-doc-pdf is &lt;2.7.13-28.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240370" version="1" comment="qemu-arm is &lt;2.11.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240371" version="1" comment="qemu-block-iscsi is &lt;2.11.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240372" version="1" comment="qemu-block-rbd is &lt;2.11.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240373" version="1" comment="qemu-block-ssh is &lt;2.11.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240374" version="1" comment="qemu-guest-agent is &lt;2.11.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240375" version="1" comment="qemu-lang is &lt;2.11.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240376" version="1" comment="qemu-ppc is &lt;2.11.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240377" version="1" comment="qemu-s390 is &lt;2.11.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238155" version="1" comment="res-signingkeys is &lt;3.0.38-52.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238153" version="1" comment="smt is &lt;3.0.38-52.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238156" version="1" comment="smt-support is &lt;3.0.38-52.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240378" version="1" comment="rsyslog-diag-tools is &lt;8.24.0-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240379" version="1" comment="rsyslog-doc is &lt;8.24.0-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240380" version="1" comment="rsyslog-module-gssapi is &lt;8.24.0-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240381" version="1" comment="rsyslog-module-gtls is &lt;8.24.0-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240382" version="1" comment="rsyslog-module-mysql is &lt;8.24.0-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240383" version="1" comment="rsyslog-module-pgsql is &lt;8.24.0-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240384" version="1" comment="rsyslog-module-relp is &lt;8.24.0-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240385" version="1" comment="rsyslog-module-snmp is &lt;8.24.0-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240386" version="1" comment="rsyslog-module-udpspoof is &lt;8.24.0-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197316" version="1" comment="squid is &lt;3.5.21-26.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240387" version="1" comment="squidGuard is &lt;1.4-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240388" version="1" comment="squidGuard-doc is &lt;1.4-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192176" version="1" comment="strongswan-hmac is &lt;5.1.3-26.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240389" version="1" comment="stunnel is &lt;5.00-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240390" version="1" comment="systemtap is &lt;3.0-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240391" version="1" comment="systemtap-runtime is &lt;3.0-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240392" version="1" comment="systemtap-server is &lt;3.0-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240393" version="1" comment="tboot is &lt;20170711_1.9.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240394" version="1" comment="tomcat is &lt;9.0.12-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240395" version="1" comment="tomcat-admin-webapps is &lt;9.0.12-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240396" version="1" comment="tomcat-docs-webapp is &lt;9.0.12-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240397" version="1" comment="tomcat-el-3_0-api is &lt;9.0.12-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240398" version="1" comment="tomcat-javadoc is &lt;9.0.12-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240399" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.12-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240400" version="1" comment="tomcat-lib is &lt;9.0.12-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240401" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.12-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240402" version="1" comment="tomcat-webapps is &lt;9.0.12-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240403" version="1" comment="tpm2.0-tools is &lt;3.1.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240404" version="1" comment="vsftpd is &lt;3.0.2-40.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240405" version="1" comment="xen-doc-html is &lt;4.11.0_08-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240406" version="1" comment="xen-tools is &lt;4.11.0_08-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240407" version="1" comment="xen-tools-domU is &lt;4.11.0_08-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181794" version="1" comment="yast2 is &lt;3.1.206-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181795" version="1" comment="FastCGI is &lt;2.4.0-167" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181796" version="1" comment="perl-FastCGI is &lt;2.4.0-167" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117457" version="1" comment="sle-sdk-release is ==12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181797" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181798" version="1" comment="libMagick++-devel is &lt;6.8.8.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181799" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181800" version="1" comment="MozillaFirefox-devel is &lt;31.1.0esr-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181801" version="1" comment="aaa_base-malloccheck is &lt;13.2+git20140911.61c1681-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181802" version="1" comment="accountsservice-devel is &lt;0.6.35-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181803" version="1" comment="alsa-devel is &lt;1.0.27.2-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181804" version="1" comment="ant-jmf is &lt;1.9.4-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181805" version="1" comment="ant-scripts is &lt;1.9.4-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181806" version="1" comment="ant-swing is &lt;1.9.4-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181807" version="1" comment="apache2-devel is &lt;2.4.10-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181808" version="1" comment="augeas-devel is &lt;1.2.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181809" version="1" comment="avahi-compat-howl-devel is &lt;0.6.31-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181810" version="1" comment="avahi-compat-mDNSResponder-devel is &lt;0.6.31-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181811" version="1" comment="libavahi-devel is &lt;0.6.31-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181812" version="1" comment="libhowl0 is &lt;0.6.31-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181813" version="1" comment="bash-devel is &lt;4.2-75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181814" version="1" comment="readline-devel is &lt;6.2-75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181815" version="1" comment="bind-devel is &lt;9.9.5P1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181816" version="1" comment="checkbashisms is &lt;2.12.6-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181817" version="1" comment="cifs-utils-devel is &lt;6.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181818" version="1" comment="coolkey-devel is &lt;1.1.0-147" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181819" version="1" comment="ctdb-devel is &lt;2.5.3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181820" version="1" comment="cups-devel is &lt;1.7.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181821" version="1" comment="cyrus-sasl-devel is &lt;2.1.26-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181822" version="1" comment="dbus-1-devel is &lt;1.8.8-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181823" version="1" comment="dbus-1-devel-doc is &lt;1.8.8-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181824" version="1" comment="dbus-1-glib-devel is &lt;0.100.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181825" version="1" comment="dhcp-devel is &lt;4.2.6-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181826" version="1" comment="dovecot22-devel is &lt;2.2.13-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181827" version="1" comment="evince-devel is &lt;3.10.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181828" version="1" comment="file-devel is &lt;5.19-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181829" version="1" comment="finch-devel is &lt;2.10.9-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181830" version="1" comment="libpurple-devel is &lt;2.10.9-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181831" version="1" comment="pidgin-devel is &lt;2.10.9-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181832" version="1" comment="firebird-devel is &lt;2.5.2.26539-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181833" version="1" comment="libfbembed-devel is &lt;2.5.2.26539-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181834" version="1" comment="freeradius-server-devel is &lt;3.0.3-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181835" version="1" comment="freerdp-devel is &lt;1.0.2-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181836" version="1" comment="freetype2-devel is &lt;2.5.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181837" version="1" comment="fuse-devel is &lt;2.9.3-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181838" version="1" comment="fuse-devel-static is &lt;2.9.3-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181839" version="1" comment="libulockmgr1 is &lt;2.9.3-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181840" version="1" comment="gc-devel is &lt;7.2d-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181841" version="1" comment="gcc48-ada is &lt;4.8.3+r212056-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181842" version="1" comment="gcc48-fortran is &lt;4.8.3+r212056-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181843" version="1" comment="gcc48-java is &lt;4.8.3+r212056-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181844" version="1" comment="gcc48-obj-c++ is &lt;4.8.3+r212056-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181845" version="1" comment="gcc48-objc is &lt;4.8.3+r212056-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181846" version="1" comment="gcc48-objc-32bit is &lt;4.8.3+r212056-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181847" version="1" comment="libada48 is &lt;4.8.3+r212056-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181848" version="1" comment="libffi48-devel is &lt;4.8.3+r212056-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181849" version="1" comment="libgcj48-devel is &lt;4.8.3+r212056-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181850" version="1" comment="libgfortran3-32bit is &lt;4.8.3+r212056-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181851" version="1" comment="libobjc4 is &lt;4.8.3+r212056-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181852" version="1" comment="libobjc4-32bit is &lt;4.8.3+r212056-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181853" version="1" comment="libquadmath0-32bit is &lt;4.8.3+r212056-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181854" version="1" comment="gd-devel is &lt;2.1.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181855" version="1" comment="gdk-pixbuf-devel is &lt;2.30.6-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181856" version="1" comment="gdm-devel is &lt;3.10.0.1-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181857" version="1" comment="gimp-devel is &lt;2.8.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181858" version="1" comment="git is &lt;1.8.5.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181859" version="1" comment="git-arch is &lt;1.8.5.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181860" version="1" comment="git-cvs is &lt;1.8.5.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181861" version="1" comment="git-daemon is &lt;1.8.5.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181862" version="1" comment="git-email is &lt;1.8.5.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181863" version="1" comment="git-gui is &lt;1.8.5.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181864" version="1" comment="git-svn is &lt;1.8.5.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181865" version="1" comment="git-web is &lt;1.8.5.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181866" version="1" comment="gitk is &lt;1.8.5.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181867" version="1" comment="glib2-devel is &lt;2.38.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181868" version="1" comment="glib2-devel-static is &lt;2.38.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181869" version="1" comment="glibc-devel-static is &lt;2.19-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181870" version="1" comment="gnome-online-accounts-devel is &lt;3.10.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181871" version="1" comment="gnome-shell-devel is &lt;3.10.4-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181872" version="1" comment="hplip-devel is &lt;3.14.6-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181873" version="1" comment="icecream is &lt;1.0.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181874" version="1" comment="lzo-devel is &lt;2.08-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181875" version="1" comment="id3lib is &lt;3.8.3-261" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181876" version="1" comment="kernel-docs is &lt;3.12.28-4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181877" version="1" comment="kernel-obs-build is &lt;3.12.28-4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181878" version="1" comment="kernel-zfcpdump is &lt;3.12.28-4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181879" version="1" comment="krb5-devel is &lt;1.12.1-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181880" version="1" comment="lib3ds-1-3 is &lt;1.3.0-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181881" version="1" comment="libHX-devel is &lt;3.18-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181882" version="1" comment="libX11-devel is &lt;1.6.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181883" version="1" comment="libXcursor-devel is &lt;1.1.14-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181884" version="1" comment="libXext-devel is &lt;1.3.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181885" version="1" comment="libXfixes-devel is &lt;5.0.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181886" version="1" comment="libXfont-devel is &lt;1.4.7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181887" version="1" comment="libXi-devel is &lt;1.7.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181888" version="1" comment="libXinerama-devel is &lt;1.1.3-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181889" version="1" comment="libXp-devel is &lt;1.0.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181890" version="1" comment="libXrandr-devel is &lt;1.4.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181891" version="1" comment="libXrender-devel is &lt;0.9.8-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181892" version="1" comment="libXres-devel is &lt;1.0.7-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181893" version="1" comment="libXt-devel is &lt;1.1.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181894" version="1" comment="libXtst-devel is &lt;1.2.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181895" version="1" comment="libXv-devel is &lt;1.0.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181896" version="1" comment="libXvMC-devel is &lt;1.0.8-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181897" version="1" comment="libXxf86dga-devel is &lt;1.1.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181898" version="1" comment="libXxf86vm-devel is &lt;1.1.3-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181899" version="1" comment="libapr-util1-devel is &lt;1.5.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181900" version="1" comment="libapr1-devel is &lt;1.5.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181901" version="1" comment="libasm-devel is &lt;0.158-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181902" version="1" comment="libdw-devel is &lt;0.158-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181903" version="1" comment="libebl-devel is &lt;0.158-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181904" version="1" comment="libelf-devel is &lt;0.158-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181905" version="1" comment="libblkid-devel is &lt;2.25-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181906" version="1" comment="libmount-devel is &lt;2.25-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181907" version="1" comment="libsmartcols-devel is &lt;2.25-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181908" version="1" comment="libbz2-devel is &lt;1.0.6-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181909" version="1" comment="libcgroup-devel is &lt;0.41.rc1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181910" version="1" comment="libcolord-devel is &lt;1.1.7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181911" version="1" comment="libcolord-gtk-devel is &lt;0.1.25-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181912" version="1" comment="typelib-1_0-ColorHug-1_0 is &lt;1.1.7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181913" version="1" comment="typelib-1_0-Colord-1_0 is &lt;1.1.7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181914" version="1" comment="typelib-1_0-ColordGtk-1_0 is &lt;0.1.25-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181915" version="1" comment="libcurl-devel is &lt;7.37.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181916" version="1" comment="libdcerpc-atsvc-devel is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181917" version="1" comment="libdcerpc-atsvc0 is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181918" version="1" comment="libdcerpc-devel is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181919" version="1" comment="libdcerpc-samr-devel is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181920" version="1" comment="libdcerpc-samr0 is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181921" version="1" comment="libgensec-devel is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181922" version="1" comment="libndr-devel is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181923" version="1" comment="libndr-krb5pac-devel is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181924" version="1" comment="libndr-nbt-devel is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181925" version="1" comment="libndr-standard-devel is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181926" version="1" comment="libnetapi-devel is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181927" version="1" comment="libpdb-devel is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181928" version="1" comment="libregistry-devel is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181929" version="1" comment="libsamba-credentials-devel is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181930" version="1" comment="libsamba-hostconfig-devel is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181931" version="1" comment="libsamba-policy-devel is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181932" version="1" comment="libsamba-policy0 is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181933" version="1" comment="libsamba-util-devel is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181934" version="1" comment="libsamdb-devel is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181935" version="1" comment="libsmbclient-devel is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181936" version="1" comment="libsmbclient-raw-devel is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181937" version="1" comment="libsmbconf-devel is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181938" version="1" comment="libsmbldap-devel is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181939" version="1" comment="libsmbsharemodes-devel is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181940" version="1" comment="libsmbsharemodes0 is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181941" version="1" comment="libtevent-util-devel is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181942" version="1" comment="libwbclient-devel is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181943" version="1" comment="samba-core-devel is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181944" version="1" comment="samba-test-devel is &lt;4.1.12-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181945" version="1" comment="libdmx-devel is &lt;1.1.3-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181946" version="1" comment="libevent-devel is &lt;2.0.21-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181947" version="1" comment="libexif-devel is &lt;0.6.21-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181948" version="1" comment="libexpat-devel is &lt;2.1.0-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181949" version="1" comment="libgadu-devel is &lt;1.11.4-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181950" version="1" comment="libgcrypt-devel is &lt;1.6.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181951" version="1" comment="libgnomesu-devel is &lt;1.0.0-352" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181952" version="1" comment="libgnutls-devel is &lt;3.2.15-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181953" version="1" comment="libgnutls-openssl-devel is &lt;3.2.15-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181954" version="1" comment="libgnutlsxx-devel is &lt;3.2.15-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181955" version="1" comment="libgnutlsxx28 is &lt;3.2.15-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181956" version="1" comment="libgpgme-devel is &lt;1.5.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181957" version="1" comment="libgssglue-devel is &lt;0.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181958" version="1" comment="libgudev-1_0-devel is &lt;210-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181959" version="1" comment="libudev-devel is &lt;210-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181960" version="1" comment="systemd-devel is &lt;210-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181961" version="1" comment="typelib-1_0-GUdev-1_0 is &lt;210-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181962" version="1" comment="libguestfs-devel is &lt;1.26.9-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181963" version="1" comment="ocaml-libguestfs-devel is &lt;1.26.9-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181964" version="1" comment="libid3tag-devel is &lt;0.15.1b-182" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181965" version="1" comment="libipa_hbac-devel is &lt;1.11.5.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181966" version="1" comment="libsss_idmap-devel is &lt;1.11.5.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181967" version="1" comment="libsss_nss_idmap-devel is &lt;1.11.5.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181968" version="1" comment="libsss_nss_idmap0 is &lt;1.11.5.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181969" version="1" comment="libwebkitgtk-devel is &lt;2.2.7-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181970" version="1" comment="libwebkitgtk3-devel is &lt;2.2.7-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181971" version="1" comment="typelib-1_0-JavaScriptCore-1_0 is &lt;2.2.7-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181972" version="1" comment="typelib-1_0-WebKit-1_0 is &lt;2.2.7-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181973" version="1" comment="libjbig-devel is &lt;2.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181974" version="1" comment="libjson-c-devel is &lt;0.11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181975" version="1" comment="liblcms-devel is &lt;1.19-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181976" version="1" comment="libmikmod-devel is &lt;3.2.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181977" version="1" comment="libmms-devel is &lt;0.6.2-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181978" version="1" comment="libmodplug-devel is &lt;0.8.8.4-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181979" version="1" comment="libmspack-devel is &lt;0.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181980" version="1" comment="libmusicbrainz-devel is &lt;2.1.5-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181981" version="1" comment="libmysqlclient-devel is &lt;10.0.11-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181982" version="1" comment="libmysqld-devel is &lt;10.0.11-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181983" version="1" comment="libmysqld18 is &lt;10.0.11-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181984" version="1" comment="libneon-devel is &lt;0.30.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181985" version="1" comment="libopenssl-devel is &lt;1.0.1i-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181986" version="1" comment="libpacemaker-devel is &lt;1.1.12-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181987" version="1" comment="pacemaker-cts is &lt;1.1.12-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181988" version="1" comment="libpcp3 is &lt;3.6.10-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181989" version="1" comment="pcp is &lt;3.6.10-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181990" version="1" comment="pcp-import-iostat2pcp is &lt;3.6.10-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181991" version="1" comment="pcp-import-mrtg2pcp is &lt;3.6.10-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181992" version="1" comment="pcp-import-sar2pcp is &lt;3.6.10-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181993" version="1" comment="pcp-import-sheet2pcp is &lt;3.6.10-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181994" version="1" comment="perl-PCP-LogImport is &lt;3.6.10-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181995" version="1" comment="perl-PCP-LogSummary is &lt;3.6.10-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181996" version="1" comment="perl-PCP-MMV is &lt;3.6.10-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181997" version="1" comment="perl-PCP-PMDA is &lt;3.6.10-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181998" version="1" comment="libpcscspy0 is &lt;1.8.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009181999" version="1" comment="pcsc-lite-devel is &lt;1.8.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182000" version="1" comment="libpng12-compat-devel is &lt;1.2.50-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182001" version="1" comment="libpng12-devel is &lt;1.2.50-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182002" version="1" comment="libpng16-compat-devel is &lt;1.6.8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182003" version="1" comment="libpng16-devel is &lt;1.6.8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182004" version="1" comment="libpoppler-devel is &lt;0.24.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182005" version="1" comment="libpoppler-glib-devel is &lt;0.24.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182006" version="1" comment="libpoppler-qt4-devel is &lt;0.24.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182007" version="1" comment="typelib-1_0-Poppler-0_18 is &lt;0.24.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182008" version="1" comment="libproxy-devel is &lt;0.4.11-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182009" version="1" comment="libpulse-devel is &lt;5.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182010" version="1" comment="libqt4-devel is &lt;4.8.6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182011" version="1" comment="libqt4-devel-doc is &lt;4.8.6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182012" version="1" comment="libqt4-devel-doc-data is &lt;4.8.6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182013" version="1" comment="libqt4-linguist is &lt;4.8.6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182014" version="1" comment="libqt4-private-headers-devel is &lt;4.8.6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182015" version="1" comment="libraptor-devel is &lt;2.0.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182016" version="1" comment="libraw-devel is &lt;0.15.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182017" version="1" comment="libraw-devel-static is &lt;0.15.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182018" version="1" comment="librpcsecgss-devel is &lt;0.19-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182019" version="1" comment="librsvg-devel is &lt;2.40.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182020" version="1" comment="typelib-1_0-Rsvg-2_0 is &lt;2.40.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182021" version="1" comment="libserf-1-1 is &lt;1.3.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182022" version="1" comment="silc-toolkit-devel is &lt;1.1.10-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182023" version="1" comment="libsmi-devel is &lt;0.4.8-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182024" version="1" comment="libsndfile-devel is &lt;1.0.25-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182025" version="1" comment="libsoup-devel is &lt;2.44.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182026" version="1" comment="libssh-devel is &lt;0.6.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182027" version="1" comment="libssh-devel-doc is &lt;0.6.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182028" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.8.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182029" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.8.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182030" version="1" comment="subversion is &lt;1.8.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182031" version="1" comment="subversion-bash-completion is &lt;1.8.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182032" version="1" comment="subversion-devel is &lt;1.8.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182033" version="1" comment="subversion-perl is &lt;1.8.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182034" version="1" comment="subversion-python is &lt;1.8.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182035" version="1" comment="subversion-server is &lt;1.8.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182036" version="1" comment="subversion-tools is &lt;1.8.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182037" version="1" comment="libtag-devel is &lt;1.9.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182038" version="1" comment="libtasn1-devel is &lt;3.7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182039" version="1" comment="libtiff-devel is &lt;4.0.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182040" version="1" comment="libvirt-devel is &lt;1.2.5-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182041" version="1" comment="libvorbis-devel is &lt;1.3.3-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182042" version="1" comment="libxcb-composite0 is &lt;1.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182043" version="1" comment="libxcb-damage0 is &lt;1.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182044" version="1" comment="libxcb-devel is &lt;1.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182045" version="1" comment="libxcb-devel-doc is &lt;1.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182046" version="1" comment="libxcb-dpms0 is &lt;1.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182047" version="1" comment="libxcb-dri3-0 is &lt;1.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182048" version="1" comment="libxcb-present0 is &lt;1.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182049" version="1" comment="libxcb-record0 is &lt;1.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182050" version="1" comment="libxcb-res0 is &lt;1.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182051" version="1" comment="libxcb-screensaver0 is &lt;1.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182052" version="1" comment="libxcb-xevie0 is &lt;1.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182053" version="1" comment="libxcb-xinerama0 is &lt;1.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182054" version="1" comment="libxcb-xprint0 is &lt;1.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182055" version="1" comment="libxcb-xtest0 is &lt;1.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182056" version="1" comment="libxcb-xvmc0 is &lt;1.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182057" version="1" comment="libxml2-devel is &lt;2.9.1-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182058" version="1" comment="libyaml-devel is &lt;0.1.6-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182059" version="1" comment="libzip-devel is &lt;0.11.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182060" version="1" comment="zeromq-devel is &lt;4.0.4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182061" version="1" comment="lua-devel is &lt;5.2.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182062" version="1" comment="mozilla-nspr-devel is &lt;4.10.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182063" version="1" comment="mozilla-nss-devel is &lt;3.16.4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182064" version="1" comment="net-snmp-devel is &lt;5.7.2.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182065" version="1" comment="newt-devel is &lt;0.52.16-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182066" version="1" comment="newt-static is &lt;0.52.16-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182067" version="1" comment="nut-cgi is &lt;2.7.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182068" version="1" comment="nut-devel is &lt;2.7.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182069" version="1" comment="openexr-devel is &lt;2.1.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182070" version="1" comment="openslp-devel is &lt;2.0.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182071" version="1" comment="osc is &lt;0.148.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182072" version="1" comment="pam-devel is &lt;1.1.8-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182073" version="1" comment="pango-devel is &lt;1.36.3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182074" version="1" comment="perl-Tk-devel is &lt;804.031-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182075" version="1" comment="php5-devel is &lt;5.5.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182076" version="1" comment="polkit-devel is &lt;0.112-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182077" version="1" comment="postgresql93-devel is &lt;9.3.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182078" version="1" comment="ppp-devel is &lt;2.4.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182079" version="1" comment="python3-devel is &lt;3.4.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182080" version="1" comment="quagga-devel is &lt;0.99.22.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182081" version="1" comment="rhythmbox-devel is &lt;3.0.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182082" version="1" comment="ruby-devel is &lt;2.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182083" version="1" comment="ruby2.1-rubygem-bundler is &lt;1.7.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182084" version="1" comment="spice-gtk-devel is &lt;0.25-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182085" version="1" comment="typelib-1_0-SpiceClientGtk-2_0 is &lt;0.25-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182086" version="1" comment="sudo-devel is &lt;1.8.10p3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182087" version="1" comment="systemtap-sdt-devel is &lt;2.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182088" version="1" comment="udisks2-devel is &lt;2.1.3-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182089" version="1" comment="unixODBC-devel is &lt;2.3.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182090" version="1" comment="vte2-devel is &lt;0.28.2-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182091" version="1" comment="wireshark-devel is &lt;1.10.9-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182092" version="1" comment="xalan-j2-demo is &lt;2.7.0-264" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182093" version="1" comment="xalan-j2-manual is &lt;2.7.0-264" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182094" version="1" comment="xen-devel is &lt;4.4.1_06-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182095" version="1" comment="xfig is &lt;3.2.5c-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182096" version="1" comment="xorg-x11-devel is &lt;7.6-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182097" version="1" comment="xorg-x11-server-sdk is &lt;7.6_1.15.2-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182098" version="1" comment="yast2-core-devel is &lt;3.1.11-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182099" version="1" comment="yast2-devel-doc is &lt;3.1.108-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182100" version="1" comment="DirectFB-devel is &lt;1.7.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182101" version="1" comment="lib++dfb-devel is &lt;1.7.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118658" version="1" comment="sle-sdk-release is ==12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182102" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182103" version="1" comment="libMagick++-devel is &lt;6.8.8.1-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182104" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182105" version="1" comment="MozillaFirefox-devel is &lt;38.4.0esr-51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182106" version="1" comment="aaa_base-malloccheck is &lt;13.2+git20140911.61c1681-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182107" version="1" comment="accountsservice-devel is &lt;0.6.35-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182108" version="1" comment="apache2-devel is &lt;2.4.16-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182109" version="1" comment="augeas-devel is &lt;1.2.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182110" version="1" comment="bind-devel is &lt;9.9.6P1-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182111" version="1" comment="binutils-devel is &lt;2.25.0-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182112" version="1" comment="binutils-gold is &lt;2.25.0-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182113" version="1" comment="cross-ppc-binutils is &lt;2.25.0-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182114" version="1" comment="cross-spu-binutils is &lt;2.25.0-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182115" version="1" comment="cifs-utils-devel is &lt;6.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182116" version="1" comment="ctdb-devel is &lt;2.5.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182117" version="1" comment="cups-devel is &lt;1.7.5-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182118" version="1" comment="dbus-1-devel is &lt;1.8.16-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182119" version="1" comment="dbus-1-devel-doc is &lt;1.8.16-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182120" version="1" comment="dhcp-devel is &lt;4.3.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182121" version="1" comment="e2fsprogs-devel is &lt;1.42.11-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182122" version="1" comment="libcom_err-devel is &lt;1.42.11-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182123" version="1" comment="libext2fs-devel is &lt;1.42.11-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182124" version="1" comment="file-devel is &lt;5.19-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182125" version="1" comment="finch-devel is &lt;2.10.9-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182126" version="1" comment="libpurple-devel is &lt;2.10.9-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182127" version="1" comment="pidgin-devel is &lt;2.10.9-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182128" version="1" comment="flac-devel is &lt;1.3.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182129" version="1" comment="freeradius-server-devel is &lt;3.0.3-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182130" version="1" comment="freetype2-devel is &lt;2.5.5-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182131" version="1" comment="fuse-devel is &lt;2.9.3-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182132" version="1" comment="fuse-devel-static is &lt;2.9.3-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182133" version="1" comment="libulockmgr1 is &lt;2.9.3-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182134" version="1" comment="gcc48-ada is &lt;4.8.5-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182135" version="1" comment="gcc48-fortran is &lt;4.8.5-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182136" version="1" comment="gcc48-java is &lt;4.8.5-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182137" version="1" comment="gcc48-obj-c++ is &lt;4.8.5-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182138" version="1" comment="gcc48-objc is &lt;4.8.5-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182139" version="1" comment="gcc48-objc-32bit is &lt;4.8.5-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182140" version="1" comment="libada48 is &lt;4.8.5-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182141" version="1" comment="libffi48-devel is &lt;4.8.5-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182142" version="1" comment="libgcj48-devel is &lt;4.8.5-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182143" version="1" comment="libobjc4 is &lt;4.8.5-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182144" version="1" comment="libobjc4-32bit is &lt;4.8.5-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182145" version="1" comment="gd-devel is &lt;2.1.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182146" version="1" comment="gdm-devel is &lt;3.10.0.1-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182147" version="1" comment="git is &lt;1.8.5.6-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182148" version="1" comment="git-arch is &lt;1.8.5.6-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182149" version="1" comment="git-cvs is &lt;1.8.5.6-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182150" version="1" comment="git-daemon is &lt;1.8.5.6-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182151" version="1" comment="git-email is &lt;1.8.5.6-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182152" version="1" comment="git-gui is &lt;1.8.5.6-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182153" version="1" comment="git-svn is &lt;1.8.5.6-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182154" version="1" comment="git-web is &lt;1.8.5.6-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182155" version="1" comment="gitk is &lt;1.8.5.6-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182156" version="1" comment="glibc-devel-static is &lt;2.19-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182157" version="1" comment="gnome-settings-daemon-devel is &lt;3.10.2-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182158" version="1" comment="gnome-shell-devel is &lt;3.10.4-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182159" version="1" comment="gstreamer-0_10-plugins-bad-devel is &lt;0.10.23-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182160" version="1" comment="hivex-devel is &lt;1.3.10-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182161" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr3.10-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182162" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr1.10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182163" version="1" comment="kernel-docs is &lt;3.12.49-11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182164" version="1" comment="kernel-obs-build is &lt;3.12.49-11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182165" version="1" comment="krb5-devel is &lt;1.12.1-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182166" version="1" comment="libQt5Bootstrap-devel-static is &lt;5.3.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182167" version="1" comment="libQt5Concurrent-devel is &lt;5.3.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182168" version="1" comment="libQt5Concurrent5 is &lt;5.3.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182169" version="1" comment="libQt5Core-devel is &lt;5.3.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182170" version="1" comment="libQt5Core-private-headers-devel is &lt;5.3.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182171" version="1" comment="libQt5DBus-devel is &lt;5.3.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182172" version="1" comment="libQt5DBus-private-headers-devel is &lt;5.3.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182173" version="1" comment="libQt5Gui-devel is &lt;5.3.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182174" version="1" comment="libQt5Gui-private-headers-devel is &lt;5.3.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182175" version="1" comment="libQt5Network-devel is &lt;5.3.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182176" version="1" comment="libQt5Network-private-headers-devel is &lt;5.3.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182177" version="1" comment="libQt5Network5 is &lt;5.3.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182178" version="1" comment="libQt5OpenGL-devel is &lt;5.3.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182179" version="1" comment="libQt5OpenGL-private-headers-devel is &lt;5.3.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182180" version="1" comment="libQt5OpenGL5 is &lt;5.3.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182181" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.3.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182182" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.3.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182183" version="1" comment="libQt5PlatformSupport-private-headers-devel is &lt;5.3.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182184" version="1" comment="libQt5PrintSupport-devel is &lt;5.3.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182185" version="1" comment="libQt5PrintSupport-private-headers-devel is &lt;5.3.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182186" version="1" comment="libQt5PrintSupport5 is &lt;5.3.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182187" version="1" comment="libQt5Sql-devel is &lt;5.3.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182188" version="1" comment="libQt5Sql-private-headers-devel is &lt;5.3.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182189" version="1" comment="libQt5Sql5 is &lt;5.3.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182190" version="1" comment="libQt5Sql5-mysql is &lt;5.3.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182191" version="1" comment="libQt5Sql5-postgresql is &lt;5.3.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182192" version="1" comment="libQt5Sql5-sqlite is &lt;5.3.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182193" version="1" comment="libQt5Sql5-unixODBC is &lt;5.3.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182194" version="1" comment="libQt5Test-devel is &lt;5.3.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182195" version="1" comment="libQt5Test-private-headers-devel is &lt;5.3.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182196" version="1" comment="libQt5Test5 is &lt;5.3.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182197" version="1" comment="libQt5Widgets-devel is &lt;5.3.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182198" version="1" comment="libQt5Widgets-private-headers-devel is &lt;5.3.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182199" version="1" comment="libQt5Xml-devel is &lt;5.3.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182200" version="1" comment="libQt5Xml5 is &lt;5.3.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182201" version="1" comment="libqt5-qtbase-common-devel is &lt;5.3.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182202" version="1" comment="libqt5-qtbase-devel is &lt;5.3.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182203" version="1" comment="libqt5-qtbase-doc is &lt;5.3.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182204" version="1" comment="libqt5-qtbase-private-headers-devel is &lt;5.3.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182205" version="1" comment="libXfont-devel is &lt;1.4.7-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182206" version="1" comment="libXi-devel is &lt;1.7.4-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182207" version="1" comment="libarchive-devel is &lt;3.1.2-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182208" version="1" comment="libasm-devel is &lt;0.158-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182209" version="1" comment="libdw-devel is &lt;0.158-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182210" version="1" comment="libebl-devel is &lt;0.158-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182212" version="1" comment="libblkid-devel is &lt;2.25-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182213" version="1" comment="libmount-devel is &lt;2.25-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182214" version="1" comment="libsmartcols-devel is &lt;2.25-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182215" version="1" comment="libcgroup-devel is &lt;0.41.rc1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182216" version="1" comment="libcolord-devel is &lt;1.1.7-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182217" version="1" comment="typelib-1_0-ColorHug-1_0 is &lt;1.1.7-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182218" version="1" comment="typelib-1_0-Colord-1_0 is &lt;1.1.7-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182219" version="1" comment="libcurl-devel is &lt;7.37.0-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182220" version="1" comment="libdcerpc-atsvc-devel is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182221" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182222" version="1" comment="libdcerpc-devel is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182223" version="1" comment="libdcerpc-samr-devel is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182224" version="1" comment="libdcerpc-samr0 is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182225" version="1" comment="libgensec-devel is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182226" version="1" comment="libndr-devel is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182227" version="1" comment="libndr-krb5pac-devel is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182228" version="1" comment="libndr-nbt-devel is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182229" version="1" comment="libndr-standard-devel is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182230" version="1" comment="libnetapi-devel is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182231" version="1" comment="libregistry-devel is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182232" version="1" comment="libsamba-credentials-devel is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182233" version="1" comment="libsamba-hostconfig-devel is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182234" version="1" comment="libsamba-passdb-devel is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182235" version="1" comment="libsamba-policy-devel is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182236" version="1" comment="libsamba-policy0 is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182237" version="1" comment="libsamba-util-devel is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182238" version="1" comment="libsamdb-devel is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182239" version="1" comment="libsmbclient-devel is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182240" version="1" comment="libsmbclient-raw-devel is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182241" version="1" comment="libsmbconf-devel is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182242" version="1" comment="libsmbldap-devel is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182243" version="1" comment="libtevent-util-devel is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182244" version="1" comment="libwbclient-devel is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182245" version="1" comment="samba-core-devel is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182246" version="1" comment="samba-test-devel is &lt;4.2.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182247" version="1" comment="libgcrypt-devel is &lt;1.6.1-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182248" version="1" comment="libgnutls-devel is &lt;3.2.15-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182249" version="1" comment="libgnutls-openssl-devel is &lt;3.2.15-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182250" version="1" comment="libgnutlsxx-devel is &lt;3.2.15-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182251" version="1" comment="libgnutlsxx28 is &lt;3.2.15-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182252" version="1" comment="libgudev-1_0-devel is &lt;210-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182253" version="1" comment="libudev-devel is &lt;210-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182254" version="1" comment="systemd-devel is &lt;210-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182255" version="1" comment="typelib-1_0-GUdev-1_0 is &lt;210-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182256" version="1" comment="libguestfs-devel is &lt;1.26.10-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182257" version="1" comment="ocaml-libguestfs-devel is &lt;1.26.10-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182258" version="1" comment="libgypsy-devel is &lt;0.9-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182259" version="1" comment="libicu-devel is &lt;52.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182260" version="1" comment="libipa_hbac-devel is &lt;1.11.5.1-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182261" version="1" comment="libsss_idmap-devel is &lt;1.11.5.1-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182262" version="1" comment="libsss_nss_idmap-devel is &lt;1.11.5.1-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182263" version="1" comment="libsss_nss_idmap0 is &lt;1.11.5.1-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182264" version="1" comment="libjasper-devel is &lt;1.900.1-170" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182265" version="1" comment="libwebkitgtk-devel is &lt;2.4.8-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182266" version="1" comment="libwebkitgtk3-devel is &lt;2.4.8-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182267" version="1" comment="typelib-1_0-JavaScriptCore-1_0 is &lt;2.4.8-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182268" version="1" comment="typelib-1_0-WebKit-1_0 is &lt;2.4.8-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182269" version="1" comment="libjpeg62-devel is &lt;62.1.0-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182270" version="1" comment="libjpeg8-devel is &lt;8.0.2-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182271" version="1" comment="libksba-devel is &lt;1.3.0-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182272" version="1" comment="libmspack-devel is &lt;0.4-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182273" version="1" comment="libmysqlclient-devel is &lt;10.0.21-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182274" version="1" comment="libmysqld-devel is &lt;10.0.21-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182275" version="1" comment="libmysqld18 is &lt;10.0.21-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182276" version="1" comment="libopenssl-devel is &lt;1.0.1i-34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182277" version="1" comment="libpacemaker-devel is &lt;1.1.13-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182278" version="1" comment="pacemaker-cts is &lt;1.1.13-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182279" version="1" comment="libpcp-devel is &lt;3.6.10-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182280" version="1" comment="libpng16-compat-devel is &lt;1.6.8-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182281" version="1" comment="libpng16-devel is &lt;1.6.8-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182282" version="1" comment="libqt4-devel is &lt;4.8.6-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182283" version="1" comment="libqt4-devel-doc is &lt;4.8.6-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182284" version="1" comment="libqt4-devel-doc-data is &lt;4.8.6-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182285" version="1" comment="libqt4-linguist is &lt;4.8.6-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182286" version="1" comment="libqt4-private-headers-devel is &lt;4.8.6-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182287" version="1" comment="libsndfile-devel is &lt;1.0.25-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182288" version="1" comment="libspice-server-devel is &lt;0.12.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182289" version="1" comment="libssh-devel is &lt;0.6.3-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182290" version="1" comment="libssh-devel-doc is &lt;0.6.3-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182291" version="1" comment="libssh2-devel is &lt;1.4.3-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182292" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.8.10-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182293" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.8.10-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182294" version="1" comment="subversion is &lt;1.8.10-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182295" version="1" comment="subversion-bash-completion is &lt;1.8.10-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182296" version="1" comment="subversion-devel is &lt;1.8.10-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182297" version="1" comment="subversion-perl is &lt;1.8.10-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182298" version="1" comment="subversion-python is &lt;1.8.10-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182299" version="1" comment="subversion-server is &lt;1.8.10-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182300" version="1" comment="subversion-tools is &lt;1.8.10-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182301" version="1" comment="libtasn1-devel is &lt;3.7-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182302" version="1" comment="libtidy-0_99-0 is &lt;1.0.20100204cvs-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182303" version="1" comment="libtidy-0_99-0-devel is &lt;1.0.20100204cvs-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182304" version="1" comment="tidy is &lt;1.0.20100204cvs-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182305" version="1" comment="libtiff-devel is &lt;4.0.4-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182306" version="1" comment="libvdpau-devel is &lt;0.8-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182307" version="1" comment="libvirt-devel is &lt;1.2.18.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182308" version="1" comment="libwmf-devel is &lt;0.2.8.4-242" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182309" version="1" comment="libwmf-gnome is &lt;0.2.8.4-242" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182310" version="1" comment="libxerces-c-devel is &lt;3.1.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182311" version="1" comment="libxml2-devel is &lt;2.9.1-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182312" version="1" comment="libyaml-devel is &lt;0.1.6-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182313" version="1" comment="libzip-devel is &lt;0.11.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182314" version="1" comment="zeromq-devel is &lt;4.0.4-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182315" version="1" comment="mercurial is &lt;2.8.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182316" version="1" comment="mozilla-nspr-devel is &lt;4.10.10-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182317" version="1" comment="mozilla-nss-devel is &lt;3.19.2.1-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182318" version="1" comment="mpfr-devel is &lt;3.1.2-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182319" version="1" comment="net-snmp-devel is &lt;5.7.3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182320" version="1" comment="openldap2-back-perl is &lt;2.4.41-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182321" version="1" comment="openslp-devel is &lt;2.0.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182322" version="1" comment="osc is &lt;0.152.0-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182323" version="1" comment="pam-devel is &lt;1.1.8-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182324" version="1" comment="php5-devel is &lt;5.5.14-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182325" version="1" comment="polkit-devel is &lt;0.113-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182326" version="1" comment="postgresql94-devel is &lt;9.4.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182327" version="1" comment="python3-devel is &lt;3.4.1-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182328" version="1" comment="rpm-devel is &lt;4.11.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182329" version="1" comment="ruby2.1-devel is &lt;2.1.2-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182330" version="1" comment="spice-gtk-devel is &lt;0.29-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182331" version="1" comment="typelib-1_0-SpiceClientGtk-2_0 is &lt;0.29-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182332" version="1" comment="systemtap-sdt-devel is &lt;2.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182333" version="1" comment="wireshark-devel is &lt;1.12.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182334" version="1" comment="xen-devel is &lt;4.5.1_12-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182335" version="1" comment="xorg-x11-server-sdk is &lt;7.6_1.15.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182336" version="1" comment="yast2-core-devel is &lt;3.1.18-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182337" version="1" comment="yast2-devel-doc is &lt;3.1.155-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182338" version="1" comment="DirectFB-devel is &lt;1.7.1-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182339" version="1" comment="lib++dfb-devel is &lt;1.7.1-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135224" version="1" comment="sle-sdk-release is ==12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182340" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182341" version="1" comment="libMagick++-devel is &lt;6.8.8.1-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182342" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182343" version="1" comment="LibVNCServer-devel is &lt;0.9.9-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182344" version="1" comment="MozillaFirefox-devel is &lt;45.4.0esr-81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182345" version="1" comment="NetworkManager-devel is &lt;1.0.12-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182346" version="1" comment="aaa_base-malloccheck is &lt;13.2+git20140911.61c1681-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182347" version="1" comment="accountsservice-devel is &lt;0.6.42-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182348" version="1" comment="apache2-devel is &lt;2.4.23-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182349" version="1" comment="augeas-devel is &lt;1.2.0-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182350" version="1" comment="avahi-compat-howl-devel is &lt;0.6.32-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182351" version="1" comment="avahi-compat-mDNSResponder-devel is &lt;0.6.32-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182352" version="1" comment="libavahi-devel is &lt;0.6.32-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182353" version="1" comment="libhowl0 is &lt;0.6.32-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182354" version="1" comment="python-avahi is &lt;0.6.32-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182355" version="1" comment="bash-devel is &lt;4.3-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182356" version="1" comment="readline-devel is &lt;6.3-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182357" version="1" comment="bind-devel is &lt;9.9.9P1-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182358" version="1" comment="binutils-devel is &lt;2.26.1-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182359" version="1" comment="binutils-gold is &lt;2.26.1-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182360" version="1" comment="cross-ppc-binutils is &lt;2.26.1-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182361" version="1" comment="cross-spu-binutils is &lt;2.26.1-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182362" version="1" comment="bsh2 is &lt;2.0.0.b5-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182363" version="1" comment="bsh2-classgen is &lt;2.0.0.b5-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182364" version="1" comment="bsh2-javadoc is &lt;2.0.0.b5-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182365" version="1" comment="cifs-utils-devel is &lt;6.5-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182366" version="1" comment="cracklib-devel is &lt;2.9.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182367" version="1" comment="cups-ddk is &lt;1.7.5-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182368" version="1" comment="cups-devel is &lt;1.7.5-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182369" version="1" comment="dbus-1-devel is &lt;1.8.16-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182370" version="1" comment="dbus-1-devel-doc is &lt;1.8.16-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182371" version="1" comment="dhcp-devel is &lt;4.3.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182372" version="1" comment="eog-devel is &lt;3.20.4-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182373" version="1" comment="evince-devel is &lt;3.20.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182374" version="1" comment="finch-devel is &lt;2.11.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182375" version="1" comment="libpurple-devel is &lt;2.11.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182376" version="1" comment="pidgin-devel is &lt;2.11.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182377" version="1" comment="flac-devel is &lt;1.3.0-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182378" version="1" comment="libQtWebKit-devel is &lt;4.8.6+2.3.3-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182379" version="1" comment="libbonobo-devel is &lt;2.32.1-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182380" version="1" comment="libnetpbm-devel is &lt;10.66.3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182381" version="1" comment="mdbtools is &lt;0.7-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182382" version="1" comment="sgmltool is &lt;1.0.9-1075" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182383" version="1" comment="fontconfig-devel is &lt;2.11.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182384" version="1" comment="freerdp-devel is &lt;2.0.0~git.1463131968.4e66df7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182385" version="1" comment="freetype2-devel is &lt;2.6.3-7.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182386" version="1" comment="gcc48-ada is &lt;4.8.5-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182387" version="1" comment="gcc48-fortran is &lt;4.8.5-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182388" version="1" comment="gcc48-java is &lt;4.8.5-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182389" version="1" comment="gcc48-obj-c++ is &lt;4.8.5-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182390" version="1" comment="gcc48-objc is &lt;4.8.5-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182391" version="1" comment="gcc48-objc-32bit is &lt;4.8.5-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182392" version="1" comment="libada48 is &lt;4.8.5-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182393" version="1" comment="libffi48-devel is &lt;4.8.5-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182394" version="1" comment="libgcj48-devel is &lt;4.8.5-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182395" version="1" comment="libobjc4 is &lt;4.8.5-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182396" version="1" comment="libobjc4-32bit is &lt;4.8.5-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182397" version="1" comment="gd-devel is &lt;2.1.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182398" version="1" comment="gdk-pixbuf-devel is &lt;2.34.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182399" version="1" comment="gdm-devel is &lt;3.10.0.1-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182400" version="1" comment="ghostscript-devel is &lt;9.15-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182401" version="1" comment="giflib-devel is &lt;5.0.5-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182402" version="1" comment="gimp-devel is &lt;2.8.18-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182403" version="1" comment="git is &lt;1.8.5.6-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182404" version="1" comment="git-arch is &lt;1.8.5.6-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182405" version="1" comment="git-cvs is &lt;1.8.5.6-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182406" version="1" comment="git-daemon is &lt;1.8.5.6-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182407" version="1" comment="git-email is &lt;1.8.5.6-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182408" version="1" comment="git-gui is &lt;1.8.5.6-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182409" version="1" comment="git-svn is &lt;1.8.5.6-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182410" version="1" comment="git-web is &lt;1.8.5.6-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182411" version="1" comment="gitk is &lt;1.8.5.6-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182412" version="1" comment="glib2-devel is &lt;2.48.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182413" version="1" comment="glib2-devel-static is &lt;2.48.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182414" version="1" comment="glibc-devel-static is &lt;2.22-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182415" version="1" comment="gnome-online-accounts-devel is &lt;3.20.4-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182416" version="1" comment="gnome-settings-daemon-devel is &lt;3.20.1-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182417" version="1" comment="gnome-shell-devel is &lt;3.20.4-70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182418" version="1" comment="graphite2-devel is &lt;1.3.1-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182419" version="1" comment="gstreamer-0_10-plugins-bad-devel is &lt;0.10.23-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182420" version="1" comment="gtk2-devel is &lt;2.24.31-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182421" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr3.50-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182422" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr3.0-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182423" version="1" comment="kernel-docs is &lt;4.4.21-69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182424" version="1" comment="kernel-obs-build is &lt;4.4.21-69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182425" version="1" comment="krb5-devel is &lt;1.12.5-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182426" version="1" comment="lhasa-devel is &lt;0.2.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182427" version="1" comment="libQt5Bootstrap-devel-static is &lt;5.6.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182428" version="1" comment="libQt5Concurrent-devel is &lt;5.6.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182429" version="1" comment="libQt5Core-devel is &lt;5.6.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182430" version="1" comment="libQt5Core-private-headers-devel is &lt;5.6.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182431" version="1" comment="libQt5DBus-devel is &lt;5.6.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182432" version="1" comment="libQt5DBus-private-headers-devel is &lt;5.6.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182433" version="1" comment="libQt5Gui-devel is &lt;5.6.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182434" version="1" comment="libQt5Gui-private-headers-devel is &lt;5.6.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182435" version="1" comment="libQt5Network-devel is &lt;5.6.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182436" version="1" comment="libQt5Network-private-headers-devel is &lt;5.6.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182437" version="1" comment="libQt5OpenGL-devel is &lt;5.6.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182438" version="1" comment="libQt5OpenGL-private-headers-devel is &lt;5.6.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182439" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.6.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182440" version="1" comment="libQt5PlatformHeaders-devel is &lt;5.6.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182441" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.6.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182442" version="1" comment="libQt5PlatformSupport-private-headers-devel is &lt;5.6.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182443" version="1" comment="libQt5PrintSupport-devel is &lt;5.6.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182444" version="1" comment="libQt5PrintSupport-private-headers-devel is &lt;5.6.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182445" version="1" comment="libQt5Sql-devel is &lt;5.6.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182446" version="1" comment="libQt5Sql-private-headers-devel is &lt;5.6.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182447" version="1" comment="libQt5Test-devel is &lt;5.6.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182448" version="1" comment="libQt5Test-private-headers-devel is &lt;5.6.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182449" version="1" comment="libQt5Widgets-devel is &lt;5.6.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182450" version="1" comment="libQt5Widgets-private-headers-devel is &lt;5.6.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182451" version="1" comment="libQt5Xml-devel is &lt;5.6.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182452" version="1" comment="libqt5-qtbase-common-devel is &lt;5.6.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182453" version="1" comment="libqt5-qtbase-devel is &lt;5.6.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182454" version="1" comment="libqt5-qtbase-private-headers-devel is &lt;5.6.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182455" version="1" comment="libQt5WebKit-private-headers-devel is &lt;5.6.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182456" version="1" comment="libQt5WebKit5-devel is &lt;5.6.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182457" version="1" comment="libQt5WebKitWidgets-devel is &lt;5.6.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182458" version="1" comment="libQt5WebKitWidgets-private-headers-devel is &lt;5.6.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182459" version="1" comment="libXfont-devel is &lt;1.5.1-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182460" version="1" comment="libXrandr-devel is &lt;1.5.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182461" version="1" comment="libarchive-devel is &lt;3.1.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182462" version="1" comment="libblkid-devel is &lt;2.28-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182463" version="1" comment="libmount-devel is &lt;2.28-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182464" version="1" comment="libsmartcols-devel is &lt;2.28-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182465" version="1" comment="libbz2-devel is &lt;1.0.6-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182466" version="1" comment="libcolord-devel is &lt;1.3.3-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182467" version="1" comment="libcolord-gtk-devel is &lt;0.1.26-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182468" version="1" comment="typelib-1_0-ColorHug-1_0 is &lt;1.3.3-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182469" version="1" comment="typelib-1_0-Colord-1_0 is &lt;1.3.3-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182470" version="1" comment="typelib-1_0-ColordGtk-1_0 is &lt;0.1.26-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182471" version="1" comment="libcurl-devel is &lt;7.37.0-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182472" version="1" comment="libexpat-devel is &lt;2.1.0-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182473" version="1" comment="libgcrypt-devel is &lt;1.6.1-16.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182474" version="1" comment="libgnomesu-devel is &lt;2.0.0-353.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182475" version="1" comment="libguestfs-devel is &lt;1.32.4-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182476" version="1" comment="ocaml-libguestfs-devel is &lt;1.32.4-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182477" version="1" comment="libidn-devel is &lt;1.28-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182478" version="1" comment="libimobiledevice-devel is &lt;1.2.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182479" version="1" comment="libipa_hbac-devel is &lt;1.13.4-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182480" version="1" comment="libsss_idmap-devel is &lt;1.13.4-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182481" version="1" comment="libsss_nss_idmap-devel is &lt;1.13.4-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182482" version="1" comment="libsss_nss_idmap0 is &lt;1.13.4-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182483" version="1" comment="libwebkitgtk-devel is &lt;2.4.11-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182484" version="1" comment="libwebkitgtk3-devel is &lt;2.4.11-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182485" version="1" comment="typelib-1_0-JavaScriptCore-1_0 is &lt;2.4.11-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182486" version="1" comment="typelib-1_0-WebKit-1_0 is &lt;2.4.11-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182487" version="1" comment="libksba-devel is &lt;1.3.0-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182488" version="1" comment="libldb-devel is &lt;1.1.26-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182489" version="1" comment="pyldb is &lt;1.1.26-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182490" version="1" comment="pyldb-devel is &lt;1.1.26-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182491" version="1" comment="libmspack-devel is &lt;0.4-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182492" version="1" comment="libmysqlclient-devel is &lt;10.0.27-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182493" version="1" comment="libmysqld-devel is &lt;10.0.27-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182494" version="1" comment="libmysqld18 is &lt;10.0.27-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182495" version="1" comment="libnettle-devel is &lt;2.7.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182496" version="1" comment="libotr-devel is &lt;4.0.0-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182497" version="1" comment="libpacemaker-devel is &lt;1.1.15-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182498" version="1" comment="libpng12-compat-devel is &lt;1.2.50-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182499" version="1" comment="libpng12-devel is &lt;1.2.50-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182500" version="1" comment="libpng16-compat-devel is &lt;1.6.8-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182501" version="1" comment="libpng16-devel is &lt;1.6.8-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182502" version="1" comment="libpoppler-cpp0 is &lt;0.43.0-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182503" version="1" comment="libpoppler-devel is &lt;0.43.0-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182504" version="1" comment="libpoppler-glib-devel is &lt;0.43.0-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182505" version="1" comment="libpoppler-qt4-devel is &lt;0.43.0-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182506" version="1" comment="typelib-1_0-Poppler-0_18 is &lt;0.43.0-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182507" version="1" comment="libproxy-devel is &lt;0.4.13-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182508" version="1" comment="libqt4-devel is &lt;4.8.6-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182509" version="1" comment="libqt4-devel-doc is &lt;4.8.6-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182510" version="1" comment="libqt4-devel-doc-data is &lt;4.8.6-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182511" version="1" comment="libqt4-linguist is &lt;4.8.6-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182512" version="1" comment="libqt4-private-headers-devel is &lt;4.8.6-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182513" version="1" comment="libreoffice-sdk is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182514" version="1" comment="librsvg-devel is &lt;2.40.15-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182515" version="1" comment="typelib-1_0-Rsvg-2_0 is &lt;2.40.15-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182516" version="1" comment="libsmbclient-devel is &lt;4.4.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182517" version="1" comment="libwbclient-devel is &lt;4.4.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182518" version="1" comment="libsndfile-devel is &lt;1.0.25-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182519" version="1" comment="libsoup-devel is &lt;2.54.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182520" version="1" comment="libspice-server-devel is &lt;0.12.7-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182521" version="1" comment="libssh-devel is &lt;0.6.3-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182522" version="1" comment="libssh-devel-doc is &lt;0.6.3-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182523" version="1" comment="libssh2-devel is &lt;1.4.3-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182524" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.8.10-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182525" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.8.10-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182526" version="1" comment="subversion is &lt;1.8.10-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182527" version="1" comment="subversion-bash-completion is &lt;1.8.10-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182528" version="1" comment="subversion-devel is &lt;1.8.10-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182529" version="1" comment="subversion-perl is &lt;1.8.10-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182530" version="1" comment="subversion-python is &lt;1.8.10-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182531" version="1" comment="subversion-server is &lt;1.8.10-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182532" version="1" comment="subversion-tools is &lt;1.8.10-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182533" version="1" comment="libtasn1-devel is &lt;3.7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182534" version="1" comment="libtcnative-1-0-devel is &lt;1.1.32-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182535" version="1" comment="libtiff-devel is &lt;4.0.6-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182536" version="1" comment="libudev-devel is &lt;228-117" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182537" version="1" comment="systemd-devel is &lt;228-117" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182538" version="1" comment="libusbmuxd-devel is &lt;1.0.10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182539" version="1" comment="libvdpau-devel is &lt;1.1.1-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182540" version="1" comment="libvirt-devel is &lt;2.0.0-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182541" version="1" comment="libwmf-tools is &lt;0.2.8.4-242" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182542" version="1" comment="libxcb-composite0 is &lt;1.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182543" version="1" comment="libxcb-damage0 is &lt;1.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182544" version="1" comment="libxcb-devel is &lt;1.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182545" version="1" comment="libxcb-devel-doc is &lt;1.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182546" version="1" comment="libxcb-dpms0 is &lt;1.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182547" version="1" comment="libxcb-record0 is &lt;1.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182548" version="1" comment="libxcb-res0 is &lt;1.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182549" version="1" comment="libxcb-screensaver0 is &lt;1.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182550" version="1" comment="libxcb-xevie0 is &lt;1.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182551" version="1" comment="libxcb-xprint0 is &lt;1.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182552" version="1" comment="libxcb-xtest0 is &lt;1.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182553" version="1" comment="libxcb-xvmc0 is &lt;1.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182554" version="1" comment="libxerces-c-devel is &lt;3.1.1-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182555" version="1" comment="libxml2-devel is &lt;2.9.4-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182556" version="1" comment="libzip-devel is &lt;0.11.1-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182557" version="1" comment="zeromq-devel is &lt;4.0.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182558" version="1" comment="mercurial is &lt;2.8.2-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182559" version="1" comment="mozilla-nspr-devel is &lt;4.12-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182560" version="1" comment="mozilla-nss-devel is &lt;3.21.1-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182561" version="1" comment="mysql-connector-java is &lt;5.1.35-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182562" version="1" comment="ocaml is &lt;4.03.0-6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182563" version="1" comment="ocaml-compiler-libs is &lt;4.03.0-6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182564" version="1" comment="ocaml-rpm-macros is &lt;4.03.0-6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182565" version="1" comment="ocaml-runtime is &lt;4.03.0-6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182566" version="1" comment="openldap2-back-perl is &lt;2.4.41-18.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182567" version="1" comment="openldap2-devel is &lt;2.4.41-18.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182568" version="1" comment="openldap2-devel-static is &lt;2.4.41-18.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182569" version="1" comment="openslp-devel is &lt;2.0.0-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182570" version="1" comment="pango-devel is &lt;1.40.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182571" version="1" comment="php5-devel is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182572" version="1" comment="php7-devel is &lt;7.0.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182573" version="1" comment="polkit-devel is &lt;0.113-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182574" version="1" comment="postgresql94-devel is &lt;9.4.9-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182575" version="1" comment="quagga-devel is &lt;0.99.22.1-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182576" version="1" comment="rhythmbox-devel is &lt;3.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182577" version="1" comment="rpm-devel is &lt;4.11.2-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182578" version="1" comment="ruby2.1-devel is &lt;2.1.2-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182579" version="1" comment="samba-test-devel is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182580" version="1" comment="spice-gtk-devel is &lt;0.31-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182581" version="1" comment="typelib-1_0-SpiceClientGtk-2_0 is &lt;0.31-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182582" version="1" comment="sqlite3-devel is &lt;3.8.10.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182583" version="1" comment="sudo-devel is &lt;1.8.10p3-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182584" version="1" comment="systemtap-sdt-devel is &lt;3.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182585" version="1" comment="unixODBC-devel is &lt;2.3.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182586" version="1" comment="vte2-devel is &lt;0.28.2-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182587" version="1" comment="webkit2gtk3-devel is &lt;2.12.5-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182588" version="1" comment="wireshark-devel is &lt;1.12.13-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182589" version="1" comment="xen-devel is &lt;4.7.0_12-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182590" version="1" comment="xfsprogs-devel is &lt;4.3.0-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182591" version="1" comment="xorg-x11-server-sdk is &lt;7.6_1.18.3-57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182592" version="1" comment="yast2-core-devel is &lt;3.1.23-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159484" version="1" comment="sle-sdk-release is ==12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182593" version="1" comment="FastCGI is &lt;2.4.0-168" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182594" version="1" comment="FastCGI-devel is &lt;2.4.0-168" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182595" version="1" comment="perl-FastCGI is &lt;2.4.0-168" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182596" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182597" version="1" comment="libMagick++-devel is &lt;6.8.8.1-70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182598" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182599" version="1" comment="MozillaFirefox-devel is &lt;52.2.0esr-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182600" version="1" comment="NetworkManager-devel is &lt;1.0.12-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182601" version="1" comment="aaa_base-malloccheck is &lt;13.2+git20140911.61c1681-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182602" version="1" comment="alsa-devel is &lt;1.0.27.2-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182603" version="1" comment="apache-pdfbox is &lt;1.8.12-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182604" version="1" comment="apache2-devel is &lt;2.4.23-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182605" version="1" comment="apache2-mod_perl-devel is &lt;2.0.8-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182606" version="1" comment="audiofile-devel is &lt;0.3.6-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182607" version="1" comment="augeas-devel is &lt;1.2.0-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182608" version="1" comment="bash-devel is &lt;4.3-82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182609" version="1" comment="readline-devel is &lt;6.3-82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182610" version="1" comment="bind-devel is &lt;9.9.9P1-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182611" version="1" comment="cairo-devel is &lt;1.15.2-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182612" version="1" comment="crash-devel is &lt;7.1.8-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182613" version="1" comment="cups-ddk is &lt;1.7.5-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182614" version="1" comment="cups-devel is &lt;1.7.5-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182615" version="1" comment="dbus-1-devel is &lt;1.8.22-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182616" version="1" comment="dbus-1-devel-doc is &lt;1.8.22-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182617" version="1" comment="dovecot22-devel is &lt;2.2.30.2-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182618" version="1" comment="e2fsprogs-devel is &lt;1.42.11-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182619" version="1" comment="libcom_err-devel is &lt;1.42.11-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182620" version="1" comment="libext2fs-devel is &lt;1.42.11-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182621" version="1" comment="finch-devel is &lt;2.12.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182622" version="1" comment="libpurple-devel is &lt;2.12.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182623" version="1" comment="pidgin-devel is &lt;2.12.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182624" version="1" comment="freeradius-server-devel is &lt;3.0.14-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182625" version="1" comment="freetype2-devel is &lt;2.6.3-7.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182626" version="1" comment="gc-devel is &lt;7.2d-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182627" version="1" comment="gd-devel is &lt;2.1.0-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182628" version="1" comment="gdk-pixbuf-devel is &lt;2.34.0-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182629" version="1" comment="gegl-devel is &lt;0.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182630" version="1" comment="ghostscript-devel is &lt;9.15-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182631" version="1" comment="gimp-devel is &lt;2.8.18-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182632" version="1" comment="git is &lt;2.12.3-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182633" version="1" comment="git-arch is &lt;2.12.3-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182634" version="1" comment="git-cvs is &lt;2.12.3-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182635" version="1" comment="git-daemon is &lt;2.12.3-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182636" version="1" comment="git-doc is &lt;2.12.3-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182637" version="1" comment="git-email is &lt;2.12.3-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182638" version="1" comment="git-gui is &lt;2.12.3-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182639" version="1" comment="git-svn is &lt;2.12.3-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182640" version="1" comment="git-web is &lt;2.12.3-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182641" version="1" comment="gitk is &lt;2.12.3-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182642" version="1" comment="glibc-devel-static is &lt;2.22-61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182643" version="1" comment="gnome-online-accounts-devel is &lt;3.20.5-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182644" version="1" comment="gnome-settings-daemon-devel is &lt;3.20.1-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182645" version="1" comment="gnome-shell-devel is &lt;3.20.4-76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182646" version="1" comment="graphite2-devel is &lt;1.3.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182647" version="1" comment="gstreamer-0_10-plugins-bad-devel is &lt;0.10.23-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182648" version="1" comment="gstreamer-0_10-plugins-base-devel is &lt;0.10.36-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182649" version="1" comment="typelib-1_0-GstApp-0_10 is &lt;0.10.36-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182650" version="1" comment="typelib-1_0-GstInterfaces-0_10 is &lt;0.10.36-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182651" version="1" comment="gstreamer-devel is &lt;1.8.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182652" version="1" comment="gstreamer-plugins-bad-devel is &lt;1.8.3-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182653" version="1" comment="libgstinsertbin-1_0-0 is &lt;1.8.3-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182654" version="1" comment="gstreamer-plugins-base-devel is &lt;1.8.3-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182655" version="1" comment="typelib-1_0-GstAllocators-1_0 is &lt;1.8.3-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182656" version="1" comment="typelib-1_0-GstApp-1_0 is &lt;1.8.3-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182657" version="1" comment="typelib-1_0-GstFft-1_0 is &lt;1.8.3-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182658" version="1" comment="typelib-1_0-GstRtp-1_0 is &lt;1.8.3-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182659" version="1" comment="typelib-1_0-GstRtsp-1_0 is &lt;1.8.3-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182660" version="1" comment="typelib-1_0-GstSdp-1_0 is &lt;1.8.3-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182661" version="1" comment="guile-devel is &lt;2.0.9-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182662" version="1" comment="libguilereadline-v-18-18 is &lt;2.0.9-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182663" version="1" comment="hplip-devel is &lt;3.16.11-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182664" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.5-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182665" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr4.5-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182666" version="1" comment="kernel-docs is &lt;4.4.73-5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182667" version="1" comment="kernel-obs-build is &lt;4.4.73-5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182668" version="1" comment="libQt5Bootstrap-devel-static is &lt;5.6.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182669" version="1" comment="libQt5Concurrent-devel is &lt;5.6.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182670" version="1" comment="libQt5Core-devel is &lt;5.6.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182671" version="1" comment="libQt5Core-private-headers-devel is &lt;5.6.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182672" version="1" comment="libQt5DBus-devel is &lt;5.6.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182673" version="1" comment="libQt5DBus-private-headers-devel is &lt;5.6.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182674" version="1" comment="libQt5Gui-devel is &lt;5.6.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182675" version="1" comment="libQt5Gui-private-headers-devel is &lt;5.6.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182676" version="1" comment="libQt5Network-devel is &lt;5.6.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182677" version="1" comment="libQt5Network-private-headers-devel is &lt;5.6.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182678" version="1" comment="libQt5OpenGL-devel is &lt;5.6.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182679" version="1" comment="libQt5OpenGL-private-headers-devel is &lt;5.6.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182680" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.6.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182681" version="1" comment="libQt5PlatformHeaders-devel is &lt;5.6.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182682" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.6.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182683" version="1" comment="libQt5PlatformSupport-private-headers-devel is &lt;5.6.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182684" version="1" comment="libQt5PrintSupport-devel is &lt;5.6.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182685" version="1" comment="libQt5PrintSupport-private-headers-devel is &lt;5.6.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182686" version="1" comment="libQt5Sql-devel is &lt;5.6.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182687" version="1" comment="libQt5Sql-private-headers-devel is &lt;5.6.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182688" version="1" comment="libQt5Test-devel is &lt;5.6.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182689" version="1" comment="libQt5Test-private-headers-devel is &lt;5.6.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182690" version="1" comment="libQt5Widgets-devel is &lt;5.6.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182691" version="1" comment="libQt5Widgets-private-headers-devel is &lt;5.6.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182692" version="1" comment="libQt5Xml-devel is &lt;5.6.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182693" version="1" comment="libqt5-qtbase-common-devel is &lt;5.6.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182694" version="1" comment="libqt5-qtbase-devel is &lt;5.6.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182695" version="1" comment="libqt5-qtbase-private-headers-devel is &lt;5.6.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182696" version="1" comment="libQt5WebKit-private-headers-devel is &lt;5.6.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182697" version="1" comment="libQt5WebKit5-devel is &lt;5.6.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182698" version="1" comment="libQt5WebKitWidgets-devel is &lt;5.6.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182699" version="1" comment="libQt5WebKitWidgets-private-headers-devel is &lt;5.6.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182700" version="1" comment="libX11-devel is &lt;1.6.2-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182701" version="1" comment="libXfixes-devel is &lt;5.0.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182702" version="1" comment="libXi-devel is &lt;1.7.4-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182703" version="1" comment="libXpm-devel is &lt;3.5.11-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182704" version="1" comment="libXpm-tools is &lt;3.5.11-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182705" version="1" comment="libXrender-devel is &lt;0.9.8-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182706" version="1" comment="libXtst-devel is &lt;1.2.2-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182707" version="1" comment="libXv-devel is &lt;1.0.10-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182708" version="1" comment="libXvMC-devel is &lt;1.0.8-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182709" version="1" comment="libapparmor-devel is &lt;2.8.2-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182710" version="1" comment="libarchive-devel is &lt;3.1.2-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182711" version="1" comment="libass-devel is &lt;0.10.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182712" version="1" comment="libblkid-devel is &lt;2.29.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182713" version="1" comment="libmount-devel is &lt;2.29.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182714" version="1" comment="libsmartcols-devel is &lt;2.29.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182715" version="1" comment="libbotan-1_10-0 is &lt;1.10.9-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182716" version="1" comment="libbotan-devel is &lt;1.10.9-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182717" version="1" comment="libcares-devel is &lt;1.9.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182718" version="1" comment="libcgroup-devel is &lt;0.41.rc1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182719" version="1" comment="libcolord-devel is &lt;1.3.3-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182720" version="1" comment="typelib-1_0-ColorHug-1_0 is &lt;1.3.3-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182721" version="1" comment="typelib-1_0-Colord-1_0 is &lt;1.3.3-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182722" version="1" comment="libcurl-devel is &lt;7.37.0-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182723" version="1" comment="libexpat-devel is &lt;2.1.0-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182724" version="1" comment="libfbembed-devel is &lt;2.5.2.26539-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182725" version="1" comment="libgcrypt-devel is &lt;1.6.1-16.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182726" version="1" comment="libgit2-24 is &lt;0.24.1-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182727" version="1" comment="libgme-devel is &lt;0.6.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182728" version="1" comment="libgnutls-devel is &lt;3.3.27-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182729" version="1" comment="libgnutls-openssl-devel is &lt;3.3.27-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182730" version="1" comment="libgnutlsxx-devel is &lt;3.3.27-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182731" version="1" comment="libgnutlsxx28 is &lt;3.3.27-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182732" version="1" comment="libguestfs-devel is &lt;1.32.4-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182733" version="1" comment="ocaml-libguestfs-devel is &lt;1.32.4-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182734" version="1" comment="libipa_hbac-devel is &lt;1.13.4-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182735" version="1" comment="libsss_idmap-devel is &lt;1.13.4-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182736" version="1" comment="libsss_nss_idmap-devel is &lt;1.13.4-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182737" version="1" comment="libjasper-devel is &lt;1.900.14-194" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182738" version="1" comment="libldb-devel is &lt;1.1.29-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182739" version="1" comment="python-ldb is &lt;1.1.29-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182740" version="1" comment="python-ldb-devel is &lt;1.1.29-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182741" version="1" comment="libmicrohttpd-devel is &lt;0.9.30-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182742" version="1" comment="libmysqlclient-devel is &lt;10.0.30-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182743" version="1" comment="libmysqld-devel is &lt;10.0.30-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182744" version="1" comment="libmysqld18 is &lt;10.0.30-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182745" version="1" comment="libnetpbm-devel is &lt;10.66.3-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182746" version="1" comment="libnettle-devel is &lt;2.7.1-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182747" version="1" comment="libopus-devel is &lt;1.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182748" version="1" comment="libopus-devel-static is &lt;1.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182749" version="1" comment="libosip2-devel is &lt;3.5.0-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182750" version="1" comment="libpacemaker-devel is &lt;1.1.16-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182751" version="1" comment="pcre-devel is &lt;8.39-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182752" version="1" comment="pcre-devel-static is &lt;8.39-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182753" version="1" comment="pcre-tools is &lt;8.39-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182754" version="1" comment="libpcscspy0 is &lt;1.8.10-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182755" version="1" comment="pcsc-lite-devel is &lt;1.8.10-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182756" version="1" comment="libplist++-devel is &lt;1.12-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182757" version="1" comment="libplist-devel is &lt;1.12-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182758" version="1" comment="libpng12-compat-devel is &lt;1.2.50-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182759" version="1" comment="libpng12-devel is &lt;1.2.50-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182760" version="1" comment="libpng16-compat-devel is &lt;1.6.8-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182761" version="1" comment="libpng16-devel is &lt;1.6.8-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182762" version="1" comment="libpoppler44 is &lt;0.24.4-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182763" version="1" comment="libpulse-devel is &lt;5.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182764" version="1" comment="libquicktime-devel is &lt;1.2.4-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182765" version="1" comment="libreoffice-sdk is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182766" version="1" comment="libsmbclient-devel is &lt;4.6.5+git.27.6afd48b1083-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182767" version="1" comment="libwbclient-devel is &lt;4.6.5+git.27.6afd48b1083-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182768" version="1" comment="libsndfile-devel is &lt;1.0.25-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182769" version="1" comment="libspice-server-devel is &lt;0.12.8-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182770" version="1" comment="libtasn1-devel is &lt;4.9-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182771" version="1" comment="libtcnative-1-0-devel is &lt;1.1.34-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182772" version="1" comment="libtiff-devel is &lt;4.0.7-43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182773" version="1" comment="libtirpc-devel is &lt;1.0.1-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182774" version="1" comment="libudev-devel is &lt;228-142" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182775" version="1" comment="systemd-devel is &lt;228-142" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182776" version="1" comment="libunrar-devel is &lt;5.0.14-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182777" version="1" comment="libunrar5_0_14 is &lt;5.0.14-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182778" version="1" comment="libvirt-devel is &lt;3.3.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182779" version="1" comment="libxml2-devel is &lt;2.9.4-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182780" version="1" comment="libxslt-devel is &lt;1.1.28-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182781" version="1" comment="zeromq-devel is &lt;4.0.4-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251813" version="1" comment="zziplib-devel is &lt;0.13.62-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182783" version="1" comment="lua-devel is &lt;5.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182784" version="1" comment="mercurial is &lt;2.8.2-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182785" version="1" comment="mozilla-nspr-devel is &lt;4.13.1-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182786" version="1" comment="mozilla-nss-devel is &lt;3.29.5-57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182787" version="1" comment="openldap2-back-perl is &lt;2.4.41-18.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182788" version="1" comment="openldap2-devel is &lt;2.4.41-18.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182789" version="1" comment="openldap2-devel-static is &lt;2.4.41-18.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182790" version="1" comment="openslp-devel is &lt;2.0.0-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182791" version="1" comment="osc is &lt;0.158.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182792" version="1" comment="pam-devel is &lt;1.1.8-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182793" version="1" comment="php5-devel is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182794" version="1" comment="php7-devel is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182795" version="1" comment="postgresql96-devel is &lt;9.6.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182797" version="1" comment="python3-devel is &lt;3.4.6-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182798" version="1" comment="quagga-devel is &lt;0.99.22.1-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182799" version="1" comment="rrdtool-devel is &lt;1.4.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182800" version="1" comment="ruby2.1-devel is &lt;2.1.9-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182801" version="1" comment="sane-backends-devel is &lt;1.0.24-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182802" version="1" comment="spice-gtk-devel is &lt;0.33-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182803" version="1" comment="sqlite3-devel is &lt;3.8.10.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182804" version="1" comment="sudo-devel is &lt;1.8.20p2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182805" version="1" comment="systemtap-sdt-devel is &lt;3.0-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182806" version="1" comment="virglrenderer-devel is &lt;0.5.0-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182807" version="1" comment="wireshark-devel is &lt;2.2.7-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182808" version="1" comment="xen-devel is &lt;4.9.0_08-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182809" version="1" comment="xfsprogs-devel is &lt;4.3.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182810" version="1" comment="xorg-x11-server-sdk is &lt;7.6_1.18.3-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182811" version="1" comment="yast2-core-devel is &lt;3.2.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182812" version="1" comment="yodl is &lt;3.03.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182813" version="1" comment="zlib-devel-32bit is &lt;1.2.8-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182814" version="1" comment="zlib-devel-static is &lt;1.2.8-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240408" version="1" comment="sle-sdk-release is ==12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238162" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-71.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238163" version="1" comment="libMagick++-devel is &lt;6.8.8.1-71.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238164" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-71.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195695" version="1" comment="LibVNCServer-devel is &lt;0.9.9-17.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232088" version="1" comment="MozillaFirefox-devel is &lt;52.9.0esr-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240409" version="1" comment="NetworkManager-devel is &lt;1.0.12-13.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240410" version="1" comment="aaa_base-malloccheck is &lt;13.2+git20140911.61c1681-38.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240411" version="1" comment="accountsservice-devel is &lt;0.6.42-16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235166" version="1" comment="ant-jmf is &lt;1.9.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235169" version="1" comment="ant-scripts is &lt;1.9.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235170" version="1" comment="ant-swing is &lt;1.9.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237931" version="1" comment="apache-pdfbox is &lt;1.8.12-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235152" version="1" comment="apache2-devel is &lt;2.4.23-29.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195791" version="1" comment="augeas-devel is &lt;1.2.0-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240412" version="1" comment="bash-devel is &lt;4.3-83.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240413" version="1" comment="readline-devel is &lt;6.3-83.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240414" version="1" comment="bind-devel is &lt;9.11.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237418" version="1" comment="binutils-devel is &lt;2.31-9.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237419" version="1" comment="binutils-gold is &lt;2.31-9.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237420" version="1" comment="cross-ppc-binutils is &lt;2.31-9.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237421" version="1" comment="cross-spu-binutils is &lt;2.31-9.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229324" version="1" comment="bluez-devel is &lt;5.13-5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195538" version="1" comment="build is &lt;20171128-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195540" version="1" comment="build-initvm-x86_64 is &lt;20171128-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195541" version="1" comment="build-mkbaselibs is &lt;20171128-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195852" version="1" comment="cairo-devel is &lt;1.15.2-25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240415" version="1" comment="cifs-utils-devel is &lt;6.5-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240416" version="1" comment="coolkey-devel is &lt;1.1.0-148.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240417" version="1" comment="crash-devel is &lt;7.2.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240418" version="1" comment="cups-ddk is &lt;1.7.5-20.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240419" version="1" comment="cups-devel is &lt;1.7.5-20.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240420" version="1" comment="cyrus-sasl-devel is &lt;2.1.26-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240421" version="1" comment="dbus-1-devel is &lt;1.8.22-29.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240422" version="1" comment="dbus-1-devel-doc is &lt;1.8.22-29.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195691" version="1" comment="dhcp-devel is &lt;4.3.3-10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234092" version="1" comment="dovecot22-devel is &lt;2.2.31-19.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240423" version="1" comment="dpdk-devel is &lt;17.11.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240424" version="1" comment="dpdk-thunderx-devel is &lt;17.11.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240425" version="1" comment="e2fsprogs-devel is &lt;1.43.8-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240426" version="1" comment="libcom_err-devel is &lt;1.43.8-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240427" version="1" comment="libext2fs-devel is &lt;1.43.8-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195807" version="1" comment="evince-devel is &lt;3.20.2-6.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240428" version="1" comment="file-devel is &lt;5.22-10.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240429" version="1" comment="finch-devel is &lt;2.12.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240430" version="1" comment="libpurple-devel is &lt;2.12.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240431" version="1" comment="pidgin-devel is &lt;2.12.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240432" version="1" comment="libQtWebKit-devel is &lt;4.8.7+2.3.4-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240433" version="1" comment="freeradius-server-devel is &lt;3.0.15-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195429" version="1" comment="freerdp-devel is &lt;2.0.0~git.1463131968.4e66df7-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195649" version="1" comment="freetype2-devel is &lt;2.6.3-7.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237422" version="1" comment="fuse-devel is &lt;2.9.3-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237423" version="1" comment="fuse-devel-static is &lt;2.9.3-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237424" version="1" comment="libulockmgr1 is &lt;2.9.3-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240434" version="1" comment="gcc48-ada is &lt;4.8.5-31.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240435" version="1" comment="gcc48-fortran is &lt;4.8.5-31.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240436" version="1" comment="gcc48-java is &lt;4.8.5-31.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240437" version="1" comment="gcc48-obj-c++ is &lt;4.8.5-31.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240438" version="1" comment="gcc48-objc is &lt;4.8.5-31.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240439" version="1" comment="gcc48-objc-32bit is &lt;4.8.5-31.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240440" version="1" comment="libada48 is &lt;4.8.5-31.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240441" version="1" comment="libffi48-devel is &lt;4.8.5-31.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240442" version="1" comment="libgcj48-devel is &lt;4.8.5-31.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240443" version="1" comment="libobjc4 is &lt;4.8.5-31.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240444" version="1" comment="libobjc4-32bit is &lt;4.8.5-31.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235176" version="1" comment="gd-devel is &lt;2.1.0-24.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240445" version="1" comment="gdk-pixbuf-devel is &lt;2.34.0-19.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233375" version="1" comment="gdm-devel is &lt;3.10.0.1-54.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235801" version="1" comment="ghostscript-devel is &lt;9.25-23.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195521" version="1" comment="gimp-devel is &lt;2.8.18-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192051" version="1" comment="git is &lt;2.12.3-27.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195772" version="1" comment="git-arch is &lt;2.12.3-27.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195773" version="1" comment="git-cvs is &lt;2.12.3-27.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195774" version="1" comment="git-daemon is &lt;2.12.3-27.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192053" version="1" comment="git-doc is &lt;2.12.3-27.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195775" version="1" comment="git-email is &lt;2.12.3-27.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195776" version="1" comment="git-gui is &lt;2.12.3-27.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195777" version="1" comment="git-svn is &lt;2.12.3-27.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195778" version="1" comment="git-web is &lt;2.12.3-27.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195779" version="1" comment="gitk is &lt;2.12.3-27.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240446" version="1" comment="glibc-devel-static is &lt;2.22-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240447" version="1" comment="gnome-settings-daemon-devel is &lt;3.20.1-50.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240448" version="1" comment="gnome-shell-devel is &lt;3.20.4-77.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195704" version="1" comment="graphite2-devel is &lt;1.3.1-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195709" version="1" comment="gwenhywfar-devel is &lt;4.9.0beta-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195710" version="1" comment="libgwengui-qt4-0 is &lt;4.9.0beta-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234089" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.30-38.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235148" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.20-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240449" version="1" comment="kernel-docs is &lt;4.12.14-94.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240450" version="1" comment="kernel-obs-build is &lt;4.12.14-94.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240451" version="1" comment="krb5-devel is &lt;1.12.5-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195786" version="1" comment="libICE-devel is &lt;1.0.8-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240452" version="1" comment="libQt5Bootstrap-devel-static is &lt;5.6.2-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240453" version="1" comment="libQt5Concurrent-devel is &lt;5.6.2-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240454" version="1" comment="libQt5Core-devel is &lt;5.6.2-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240455" version="1" comment="libQt5Core-private-headers-devel is &lt;5.6.2-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240456" version="1" comment="libQt5DBus-devel is &lt;5.6.2-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240457" version="1" comment="libQt5DBus-private-headers-devel is &lt;5.6.2-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240458" version="1" comment="libQt5Gui-devel is &lt;5.6.2-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240459" version="1" comment="libQt5Gui-private-headers-devel is &lt;5.6.2-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240460" version="1" comment="libQt5Network-devel is &lt;5.6.2-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240461" version="1" comment="libQt5Network-private-headers-devel is &lt;5.6.2-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240462" version="1" comment="libQt5OpenGL-devel is &lt;5.6.2-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240463" version="1" comment="libQt5OpenGL-private-headers-devel is &lt;5.6.2-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240464" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.6.2-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240465" version="1" comment="libQt5PlatformHeaders-devel is &lt;5.6.2-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240466" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.6.2-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240467" version="1" comment="libQt5PlatformSupport-private-headers-devel is &lt;5.6.2-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240468" version="1" comment="libQt5PrintSupport-devel is &lt;5.6.2-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240469" version="1" comment="libQt5PrintSupport-private-headers-devel is &lt;5.6.2-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240470" version="1" comment="libQt5Sql-devel is &lt;5.6.2-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240471" version="1" comment="libQt5Sql-private-headers-devel is &lt;5.6.2-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240472" version="1" comment="libQt5Test-devel is &lt;5.6.2-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240473" version="1" comment="libQt5Test-private-headers-devel is &lt;5.6.2-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240474" version="1" comment="libQt5Widgets-devel is &lt;5.6.2-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240475" version="1" comment="libQt5Widgets-private-headers-devel is &lt;5.6.2-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240476" version="1" comment="libQt5Xml-devel is &lt;5.6.2-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240477" version="1" comment="libqt5-qtbase-common-devel is &lt;5.6.2-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240478" version="1" comment="libqt5-qtbase-devel is &lt;5.6.2-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240479" version="1" comment="libqt5-qtbase-private-headers-devel is &lt;5.6.2-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236875" version="1" comment="libX11-devel is &lt;1.6.2-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235153" version="1" comment="libXcursor-devel is &lt;1.1.14-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195785" version="1" comment="libXdmcp-devel is &lt;1.1.1-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240480" version="1" comment="libXext-devel is &lt;1.3.2-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195634" version="1" comment="libXfont-devel is &lt;1.5.1-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195544" version="1" comment="libapr-util1-devel is &lt;1.5.3-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195851" version="1" comment="libapr1-devel is &lt;1.5.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240481" version="1" comment="libblkid-devel is &lt;2.29.2-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240482" version="1" comment="libmount-devel is &lt;2.29.2-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240483" version="1" comment="libsmartcols-devel is &lt;2.29.2-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195497" version="1" comment="libbotan-1_10-0 is &lt;1.10.9-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195498" version="1" comment="libbotan-devel is &lt;1.10.9-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240484" version="1" comment="libcares-devel is &lt;1.9.1-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195675" version="1" comment="libcdio++0 is &lt;0.90-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195676" version="1" comment="libcdio-devel is &lt;0.90-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195677" version="1" comment="libudf0 is &lt;0.90-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240485" version="1" comment="libcephfs-devel is &lt;12.2.8+git.1536505967.080f2248ff-2.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240486" version="1" comment="librados-devel is &lt;12.2.8+git.1536505967.080f2248ff-2.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240487" version="1" comment="librbd-devel is &lt;12.2.8+git.1536505967.080f2248ff-2.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195838" version="1" comment="libcorosync-devel is &lt;2.3.6-9.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240488" version="1" comment="libcurl-devel is &lt;7.60.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195624" version="1" comment="libevent-devel is &lt;2.0.21-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238075" version="1" comment="libexempi-devel is &lt;2.2.1-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195620" version="1" comment="libexif-devel is &lt;0.6.21-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195436" version="1" comment="libexpat-devel is &lt;2.1.0-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240489" version="1" comment="libgcrypt-devel is &lt;1.6.1-16.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238160" version="1" comment="libgit2-24 is &lt;0.24.1-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235172" version="1" comment="libgnutls-devel is &lt;3.3.27-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235173" version="1" comment="libgnutls-openssl-devel is &lt;3.3.27-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235174" version="1" comment="libgnutlsxx-devel is &lt;3.3.27-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235175" version="1" comment="libgnutlsxx28 is &lt;3.3.27-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240490" version="1" comment="libguestfs-devel is &lt;1.32.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240491" version="1" comment="ocaml-libguestfs-devel is &lt;1.32.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195392" version="1" comment="libical-devel is &lt;1.0.1-16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195393" version="1" comment="libical-devel-static is &lt;1.0.1-16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195863" version="1" comment="libicu-devel is &lt;52.1-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195684" version="1" comment="libid3tag-devel is &lt;0.15.1b-184.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195802" version="1" comment="libidn-devel is &lt;1.28-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240492" version="1" comment="libipa_hbac-devel is &lt;1.16.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240493" version="1" comment="libsss_idmap-devel is &lt;1.16.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240494" version="1" comment="libsss_nss_idmap-devel is &lt;1.16.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195867" version="1" comment="libjasper-devel is &lt;1.900.14-195.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195639" version="1" comment="libjpeg62-devel is &lt;62.2.0-31.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195640" version="1" comment="libjpeg8-devel is &lt;8.1.2-31.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238373" version="1" comment="liblcms2-devel is &lt;2.7-9.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240495" version="1" comment="libldb-devel is &lt;1.1.29-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240496" version="1" comment="python-ldb is &lt;1.1.29-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240497" version="1" comment="python-ldb-devel is &lt;1.1.29-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234975" version="1" comment="liblouis-devel is &lt;2.6.4-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195868" version="1" comment="libmodplug-devel is &lt;0.8.9.0+git20170610.f6dd59a-15.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195831" version="1" comment="libmwaw-devel is &lt;0.3.13-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195832" version="1" comment="libmwaw-devel-doc is &lt;0.3.13-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240498" version="1" comment="libmysqlclient-devel is &lt;10.0.35-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240499" version="1" comment="libmysqld-devel is &lt;10.0.35-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240500" version="1" comment="libmysqld18 is &lt;10.0.35-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237311" version="1" comment="libndr-devel is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237312" version="1" comment="libndr-krb5pac-devel is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237313" version="1" comment="libndr-nbt-devel is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237314" version="1" comment="libndr-standard-devel is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237315" version="1" comment="libsamba-util-devel is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237316" version="1" comment="libsmbclient-devel is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237317" version="1" comment="libwbclient-devel is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237318" version="1" comment="samba-core-devel is &lt;4.6.16+git.124.aee309c5c18-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230744" version="1" comment="libofx-devel is &lt;0.9.9-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240501" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240502" version="1" comment="libopenssl-1_1-devel-32bit is &lt;1.1.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240503" version="1" comment="libpacemaker-devel is &lt;1.1.19+20180928.0d2680780-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240504" version="1" comment="libpcp-devel is &lt;3.11.9-6.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240505" version="1" comment="libpcp3 is &lt;3.11.9-6.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240506" version="1" comment="pcp is &lt;3.11.9-6.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240507" version="1" comment="pcp-import-iostat2pcp is &lt;3.11.9-6.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240508" version="1" comment="pcp-import-mrtg2pcp is &lt;3.11.9-6.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240509" version="1" comment="pcp-import-sar2pcp is &lt;3.11.9-6.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240510" version="1" comment="perl-PCP-LogImport is &lt;3.11.9-6.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240511" version="1" comment="perl-PCP-LogSummary is &lt;3.11.9-6.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240512" version="1" comment="perl-PCP-MMV is &lt;3.11.9-6.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240513" version="1" comment="perl-PCP-PMDA is &lt;3.11.9-6.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240514" version="1" comment="pcre-devel is &lt;8.39-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240515" version="1" comment="pcre-devel-static is &lt;8.39-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240516" version="1" comment="pcre-tools is &lt;8.39-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240517" version="1" comment="libpcscspy0 is &lt;1.8.10-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240518" version="1" comment="pcsc-lite-devel is &lt;1.8.10-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195423" version="1" comment="libplist++-devel is &lt;1.12-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195424" version="1" comment="libplist-devel is &lt;1.12-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233215" version="1" comment="libpodofo-devel is &lt;0.9.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223417" version="1" comment="libpoppler-cpp0 is &lt;0.43.0-16.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223425" version="1" comment="libpoppler-devel is &lt;0.43.0-16.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223426" version="1" comment="libpoppler-glib-devel is &lt;0.43.0-16.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223427" version="1" comment="libpoppler-qt4-devel is &lt;0.43.0-16.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223428" version="1" comment="typelib-1_0-Poppler-0_18 is &lt;0.43.0-16.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186571" version="1" comment="libpoppler44 is &lt;0.24.4-14.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236365" version="1" comment="libptexenc1 is &lt;1.3.2dev-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236300" version="1" comment="texlive is &lt;2013.20130620-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236366" version="1" comment="texlive-bibtex-bin is &lt;2013.20130620.svn30088-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236367" version="1" comment="texlive-bin-devel is &lt;2013.20130620-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236368" version="1" comment="texlive-checkcites-bin is &lt;2013.20130620.svn25623-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236369" version="1" comment="texlive-context-bin is &lt;2013.20130620.svn29741-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236370" version="1" comment="texlive-cweb-bin is &lt;2013.20130620.svn30088-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236371" version="1" comment="texlive-dviasm-bin is &lt;2013.20130620.svn8329-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236372" version="1" comment="texlive-dvidvi-bin is &lt;2013.20130620.svn30088-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236373" version="1" comment="texlive-dviljk-bin is &lt;2013.20130620.svn30088-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236374" version="1" comment="texlive-dvipdfmx-bin is &lt;2013.20130620.svn30845-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236375" version="1" comment="texlive-dvipng-bin is &lt;2013.20130620.svn30845-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236376" version="1" comment="texlive-dvips-bin is &lt;2013.20130620.svn30088-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236377" version="1" comment="texlive-dvisvgm-bin is &lt;2013.20130620.svn30613-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236378" version="1" comment="texlive-gsftopk-bin is &lt;2013.20130620.svn30088-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236379" version="1" comment="texlive-jadetex-bin is &lt;2013.20130620.svn3006-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236380" version="1" comment="texlive-kpathsea-bin is &lt;2013.20130620.svn30088-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236381" version="1" comment="texlive-kpathsea-devel is &lt;6.2.0dev-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236382" version="1" comment="texlive-lacheck-bin is &lt;2013.20130620.svn30088-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236383" version="1" comment="texlive-latex-bin-bin is &lt;2013.20130620.svn14050-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236384" version="1" comment="texlive-lua2dox-bin is &lt;2013.20130620.svn29053-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236385" version="1" comment="texlive-luaotfload-bin is &lt;2013.20130620.svn30313-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236386" version="1" comment="texlive-luatex-bin is &lt;2013.20130620.svn30845-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236387" version="1" comment="texlive-makeindex-bin is &lt;2013.20130620.svn30088-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236388" version="1" comment="texlive-metafont-bin is &lt;2013.20130620.svn30088-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236389" version="1" comment="texlive-metapost-bin is &lt;2013.20130620.svn30845-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236390" version="1" comment="texlive-mfware-bin is &lt;2013.20130620.svn30088-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236391" version="1" comment="texlive-mptopdf-bin is &lt;2013.20130620.svn18674-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236392" version="1" comment="texlive-pdftex-bin is &lt;2013.20130620.svn30845-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236393" version="1" comment="texlive-pstools-bin is &lt;2013.20130620.svn30088-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236394" version="1" comment="texlive-ptexenc-devel is &lt;1.3.2dev-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236395" version="1" comment="texlive-seetexk-bin is &lt;2013.20130620.svn30088-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236396" version="1" comment="texlive-splitindex-bin is &lt;2013.20130620.svn29688-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236397" version="1" comment="texlive-tetex-bin is &lt;2013.20130620.svn29741-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236398" version="1" comment="texlive-tex-bin is &lt;2013.20130620.svn30088-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236399" version="1" comment="texlive-tex4ht-bin is &lt;2013.20130620.svn30088-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236400" version="1" comment="texlive-texconfig-bin is &lt;2013.20130620.svn29741-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236401" version="1" comment="texlive-thumbpdf-bin is &lt;2013.20130620.svn6898-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236402" version="1" comment="texlive-vlna-bin is &lt;2013.20130620.svn30088-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236403" version="1" comment="texlive-web-bin is &lt;2013.20130620.svn30088-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236404" version="1" comment="texlive-xdvi-bin is &lt;2013.20130620.svn30088-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236405" version="1" comment="texlive-xetex-bin is &lt;2013.20130620.svn30845-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236406" version="1" comment="texlive-xmltex-bin is &lt;2013.20130620.svn3006-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240519" version="1" comment="libqt4-devel is &lt;4.8.7-8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240520" version="1" comment="libqt4-devel-doc is &lt;4.8.7-8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240521" version="1" comment="libqt4-devel-doc-data is &lt;4.8.7-8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240522" version="1" comment="libqt4-linguist is &lt;4.8.7-8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240523" version="1" comment="libqt4-private-headers-devel is &lt;4.8.7-8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195391" version="1" comment="libquicktime-devel is &lt;1.2.4-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237932" version="1" comment="libraw-devel is &lt;0.15.4-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237933" version="1" comment="libraw-devel-static is &lt;0.15.4-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195800" version="1" comment="librelp-devel is &lt;1.2.12-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233235" version="1" comment="libreoffice-sdk is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195853" version="1" comment="librsvg-devel is &lt;2.40.20-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195854" version="1" comment="typelib-1_0-Rsvg-2_0 is &lt;2.40.20-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195536" version="1" comment="libsaml-devel is &lt;2.5.5-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240524" version="1" comment="libsndfile-devel is &lt;1.0.25-36.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231335" version="1" comment="libsoup-devel is &lt;2.62.2-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233892" version="1" comment="libspice-server-devel is &lt;0.12.8-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240525" version="1" comment="libsrtp-devel is &lt;1.5.2-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237425" version="1" comment="libssh-devel is &lt;0.6.3-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237426" version="1" comment="libssh-devel-doc is &lt;0.6.3-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195415" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.8.19-25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195416" version="1" comment="subversion is &lt;1.8.19-25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195417" version="1" comment="subversion-bash-completion is &lt;1.8.19-25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195418" version="1" comment="subversion-devel is &lt;1.8.19-25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195419" version="1" comment="subversion-perl is &lt;1.8.19-25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195420" version="1" comment="subversion-python is &lt;1.8.19-25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195421" version="1" comment="subversion-server is &lt;1.8.19-25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195422" version="1" comment="subversion-tools is &lt;1.8.19-25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195784" version="1" comment="libtasn1-devel is &lt;4.9-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240526" version="1" comment="libtcnative-1-0-devel is &lt;1.2.17-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237884" version="1" comment="libtiff-devel is &lt;4.0.9-44.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240527" version="1" comment="libtirpc-devel is &lt;1.0.1-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240528" version="1" comment="libudev-devel is &lt;228-150.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240529" version="1" comment="systemd-devel is &lt;228-150.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240530" version="1" comment="libvirt-devel is &lt;4.0.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195780" version="1" comment="libvorbis-devel is &lt;1.3.3-10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195618" version="1" comment="libvpx-devel is &lt;1.3.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195504" version="1" comment="libwpd-devel is &lt;0.10.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195505" version="1" comment="libwpd-devel-doc is &lt;0.10.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236876" version="1" comment="libxcb-composite0 is &lt;1.10-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236877" version="1" comment="libxcb-damage0 is &lt;1.10-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236878" version="1" comment="libxcb-devel is &lt;1.10-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236879" version="1" comment="libxcb-devel-doc is &lt;1.10-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236880" version="1" comment="libxcb-dpms0 is &lt;1.10-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236881" version="1" comment="libxcb-record0 is &lt;1.10-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236882" version="1" comment="libxcb-res0 is &lt;1.10-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236883" version="1" comment="libxcb-screensaver0 is &lt;1.10-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236884" version="1" comment="libxcb-xevie0 is &lt;1.10-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236885" version="1" comment="libxcb-xprint0 is &lt;1.10-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236886" version="1" comment="libxcb-xtest0 is &lt;1.10-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236887" version="1" comment="libxcb-xvmc0 is &lt;1.10-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236790" version="1" comment="libxml2-devel is &lt;2.9.4-46.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195683" version="1" comment="libxmltooling-devel is &lt;1.5.6-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195474" version="1" comment="libzip-devel is &lt;0.11.1-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240531" version="1" comment="libzypp-devel is &lt;16.19.0-2.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240532" version="1" comment="libzypp-devel-doc is &lt;16.19.0-2.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251814" version="1" comment="zziplib-devel is &lt;0.13.67-10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240533" version="1" comment="memcached-devel is &lt;1.4.39-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230370" version="1" comment="mercurial is &lt;2.8.2-15.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240534" version="1" comment="mozilla-nss-devel is &lt;3.29.5-58.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195479" version="1" comment="mysql-connector-java is &lt;5.1.42-5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195406" version="1" comment="nasm is &lt;2.10.09-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240535" version="1" comment="nautilus-devel is &lt;3.20.3-23.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240536" version="1" comment="typelib-1_0-Nautilus-3_0 is &lt;3.20.3-23.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238161" version="1" comment="net-snmp-devel is &lt;5.7.3-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240537" version="1" comment="nut-cgi is &lt;2.7.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240538" version="1" comment="nut-devel is &lt;2.7.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195542" version="1" comment="obs-service-source_validator is &lt;0.7-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183041" version="1" comment="ocaml is &lt;4.03.0-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195765" version="1" comment="ocaml-compiler-libs is &lt;4.03.0-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195766" version="1" comment="ocaml-rpm-macros is &lt;4.03.0-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195767" version="1" comment="ocaml-runtime is &lt;4.03.0-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195664" version="1" comment="openexr-devel is &lt;2.1.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240539" version="1" comment="openldap2-back-perl is &lt;2.4.41-18.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240540" version="1" comment="openldap2-devel is &lt;2.4.41-18.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240541" version="1" comment="openldap2-devel-static is &lt;2.4.41-18.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235837" version="1" comment="openslp-devel is &lt;2.0.0-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240542" version="1" comment="osc is &lt;0.162.1-15.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240543" version="1" comment="pam-devel is &lt;1.1.8-24.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236364" version="1" comment="php5-devel is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235435" version="1" comment="php7-devel is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240544" version="1" comment="polkit-devel is &lt;0.113-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236732" version="1" comment="postgresql10-devel is &lt;10.5-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240545" version="1" comment="procps-devel is &lt;3.3.9-11.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240546" version="1" comment="python3-dbm is &lt;3.4.6-25.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234398" version="1" comment="python3-devel is &lt;3.4.6-25.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236730" version="1" comment="qpdf-devel is &lt;7.1.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195651" version="1" comment="quagga-devel is &lt;1.1.1-17.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237883" version="1" comment="rpm-devel is &lt;4.11.2-16.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229806" version="1" comment="ruby2.1-rubygem-yard is &lt;0.8.7.3-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195533" version="1" comment="shibboleth-sp-devel is &lt;2.5.5-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229323" version="1" comment="slf4j is &lt;1.7.12-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236731" version="1" comment="soundtouch-devel is &lt;1.7.1-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233891" version="1" comment="spice-gtk-devel is &lt;0.33-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240547" version="1" comment="sudo-devel is &lt;1.8.20p2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240548" version="1" comment="systemtap-sdt-devel is &lt;3.0-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238073" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.20.3-2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238074" version="1" comment="webkit2gtk3-devel is &lt;2.20.3-2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229513" version="1" comment="unixODBC-devel is &lt;2.3.6-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187190" version="1" comment="wavpack is &lt;4.60.99-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195669" version="1" comment="wavpack-devel is &lt;4.60.99-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235528" version="1" comment="wireshark-devel is &lt;2.4.9-48.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240549" version="1" comment="xen-devel is &lt;4.11.0_08-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240550" version="1" comment="xfsprogs-devel is &lt;4.15.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240551" version="1" comment="xorg-x11-server-sdk is &lt;1.19.6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240552" version="1" comment="yast2-core-devel is &lt;3.3.1-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117478" version="1" comment="sle-we-release is ==12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118890" version="1" comment="sle-we-release is ==12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136016" version="1" comment="sle-we-release is ==12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182815" version="1" comment="libreoffice-l10n-bg is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182816" version="1" comment="libreoffice-l10n-hr is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182817" version="1" comment="libreoffice-l10n-lt is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182818" version="1" comment="libreoffice-l10n-uk is &lt;5.1.5.2-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159844" version="1" comment="sle-we-release is ==12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182819" version="1" comment="libreoffice-l10n-bg is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182820" version="1" comment="libreoffice-l10n-hr is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182821" version="1" comment="libreoffice-l10n-lt is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182822" version="1" comment="libreoffice-l10n-uk is &lt;5.2.5.1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240553" version="1" comment="sle-we-release is ==12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233291" version="1" comment="libreoffice-l10n-bg is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233292" version="1" comment="libreoffice-l10n-hr is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233293" version="1" comment="libreoffice-l10n-lt is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233294" version="1" comment="libreoffice-l10n-uk is &lt;6.0.5.2-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182823" version="1" comment="libreoffice is &lt;4.3.5.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182824" version="1" comment="libreoffice-sdk is &lt;4.3.5.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117415" version="1" comment="sle-bsk-release is ==12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182825" version="1" comment="libreoffice is &lt;4.3.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182826" version="1" comment="libreoffice-sdk is &lt;4.3.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182827" version="1" comment="cups is &lt;1.7.5-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182828" version="1" comment="cups-ddk is &lt;1.7.5-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182829" version="1" comment="kernel-zfcpdump is &lt;3.12.38-44" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182830" version="1" comment="kernel-zfcpdump is &lt;3.12.39-47" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182831" version="1" comment="kernel-zfcpdump is &lt;3.12.32-33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182832" version="1" comment="cups-ddk is &lt;1.7.5-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182833" version="1" comment="kernel-zfcpdump is &lt;3.12.43-52.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182834" version="1" comment="krb5-mini is &lt;1.12.1-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182835" version="1" comment="krb5-mini-devel is &lt;1.12.1-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182836" version="1" comment="kernel-zfcpdump is &lt;3.12.44-52.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182837" version="1" comment="python-Jinja2 is &lt;2.7.3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182838" version="1" comment="kernel-zfcpdump is &lt;3.12.36-38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182839" version="1" comment="libwmf is &lt;0.2.8.4-242" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182840" version="1" comment="kernel-zfcpdump is &lt;3.12.44-52.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182841" version="1" comment="kernel-zfcpdump is &lt;3.12.48-52.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182842" version="1" comment="krb5-mini is &lt;1.12.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182843" version="1" comment="krb5-mini-devel is &lt;1.12.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182844" version="1" comment="krb5-mini is &lt;1.12.1-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182845" version="1" comment="krb5-mini-devel is &lt;1.12.1-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182846" version="1" comment="flute is &lt;1.3.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182847" version="1" comment="libbase is &lt;1.1.3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182848" version="1" comment="libfonts is &lt;1.1.3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182849" version="1" comment="libformula is &lt;1.1.3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182850" version="1" comment="liblayout is &lt;0.2.10-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182851" version="1" comment="libloader is &lt;1.1.3-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182852" version="1" comment="libreoffice-sdk is &lt;5.0.2.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182853" version="1" comment="librepository is &lt;1.1.3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182854" version="1" comment="librevenge is &lt;0.0.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182855" version="1" comment="librevenge-devel is &lt;0.0.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182856" version="1" comment="librevenge-generators-0_0-0 is &lt;0.0.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182857" version="1" comment="libserializer is &lt;1.1.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182858" version="1" comment="mdds is &lt;0.12.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182859" version="1" comment="mdds-devel is &lt;0.12.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182860" version="1" comment="pentaho-libxml is &lt;1.1.3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182861" version="1" comment="pentaho-reporting-flow-engine is &lt;0.9.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182862" version="1" comment="sac is &lt;1.3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182863" version="1" comment="perl-Capture-Tiny is &lt;0.23-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182864" version="1" comment="kernel-zfcpdump is &lt;3.12.51-52.31" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182865" version="1" comment="krb5-mini is &lt;1.12.1-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182866" version="1" comment="krb5-mini-devel is &lt;1.12.1-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182867" version="1" comment="python-tdb is &lt;1.3.8-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182868" version="1" comment="python-tevent is &lt;0.9.26-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182869" version="1" comment="tdb is &lt;1.3.8-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182870" version="1" comment="tevent is &lt;0.9.26-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182871" version="1" comment="kernel-zfcpdump is &lt;3.12.60-52.49" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182872" version="1" comment="kernel-zfcpdump is &lt;3.12.60-52.54" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182873" version="1" comment="libreoffice is &lt;5.1.3.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182874" version="1" comment="libreoffice-sdk is &lt;5.1.3.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182875" version="1" comment="kernel-zfcpdump is &lt;3.12.51-52.34" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182876" version="1" comment="kernel-zfcpdump is &lt;3.12.51-52.39" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182877" version="1" comment="krb5-mini is &lt;1.12.1-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182878" version="1" comment="krb5-mini-devel is &lt;1.12.1-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182879" version="1" comment="kernel-zfcpdump is &lt;3.12.55-52.42" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182880" version="1" comment="ghostscript-mini is &lt;9.15-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182881" version="1" comment="ghostscript-mini-devel is &lt;9.15-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182882" version="1" comment="go is &lt;1.5.3-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182883" version="1" comment="go-doc is &lt;1.5.3-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182884" version="1" comment="gcc5-go is &lt;5.3.1+r233831-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182885" version="1" comment="libgo7 is &lt;5.3.1+r233831-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182886" version="1" comment="krb5-mini is &lt;1.12.1-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182887" version="1" comment="krb5-mini-devel is &lt;1.12.1-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182888" version="1" comment="go is &lt;1.5.4-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182889" version="1" comment="go-doc is &lt;1.5.4-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182890" version="1" comment="go is &lt;1.6.1-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182891" version="1" comment="go-doc is &lt;1.6.1-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182892" version="1" comment="libudev-mini-devel is &lt;210-70.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182893" version="1" comment="libudev-mini1 is &lt;210-70.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182894" version="1" comment="systemd-mini is &lt;210-70.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182895" version="1" comment="systemd-mini-devel is &lt;210-70.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182896" version="1" comment="udev-mini is &lt;210-70.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182897" version="1" comment="libpoppler-cpp0 is &lt;0.24.4-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182898" version="1" comment="poppler is &lt;0.24.4-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182899" version="1" comment="kernel-zfcpdump is &lt;3.12.55-52.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182900" version="1" comment="kernel-zfcpdump is &lt;3.12.51-60.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118772" version="1" comment="sle-bsk-release is ==12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182901" version="1" comment="python-tdb is &lt;1.3.8-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182902" version="1" comment="python-tevent is &lt;0.9.26-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182903" version="1" comment="tdb is &lt;1.3.8-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182904" version="1" comment="tevent is &lt;0.9.26-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182905" version="1" comment="kernel-zfcpdump is &lt;3.12.59-60.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182906" version="1" comment="kernel-zfcpdump is &lt;3.12.59-60.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182907" version="1" comment="kernel-zfcpdump is &lt;3.12.51-60.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182908" version="1" comment="kernel-zfcpdump is &lt;3.12.62-60.62" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182909" version="1" comment="cracklib-dict-small is &lt;2.9.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182910" version="1" comment="krb5-mini is &lt;1.12.1-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182911" version="1" comment="krb5-mini-devel is &lt;1.12.1-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182912" version="1" comment="ocaml is &lt;4.02.3-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182913" version="1" comment="ocaml-ocamldoc is &lt;4.02.3-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182914" version="1" comment="kdelibs4 is &lt;4.12.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182915" version="1" comment="kdelibs4-branding-upstream is &lt;4.12.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182916" version="1" comment="kdelibs4-core is &lt;4.12.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182917" version="1" comment="kdelibs4-doc is &lt;4.12.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182918" version="1" comment="libkde4-devel is &lt;4.12.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182919" version="1" comment="libkdecore4-devel is &lt;4.12.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182920" version="1" comment="libmdbodbc1 is &lt;0.7-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182921" version="1" comment="mdbtools-devel is &lt;0.7-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182922" version="1" comment="virtuoso is &lt;6.1.6-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182923" version="1" comment="virtuoso-drivers is &lt;6.1.6-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182924" version="1" comment="virtuoso-server is &lt;6.1.6-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182925" version="1" comment="libudev-mini-devel is &lt;210-114" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182926" version="1" comment="libudev-mini1 is &lt;210-114" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182927" version="1" comment="systemd-mini is &lt;210-114" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182928" version="1" comment="systemd-mini-devel is &lt;210-114" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182929" version="1" comment="udev-mini is &lt;210-114" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182930" version="1" comment="ghostscript-mini is &lt;9.15-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182931" version="1" comment="ghostscript-mini-devel is &lt;9.15-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182932" version="1" comment="kernel-zfcpdump is &lt;3.12.62-60.64.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182933" version="1" comment="ghostscript-mini is &lt;9.15-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182934" version="1" comment="ghostscript-mini-devel is &lt;9.15-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182935" version="1" comment="ghostscript-mini is &lt;9.15-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182936" version="1" comment="ghostscript-mini-devel is &lt;9.15-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182937" version="1" comment="kernel-zfcpdump is &lt;3.12.67-60.64.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182938" version="1" comment="kernel-zfcpdump is &lt;3.12.67-60.64.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182939" version="1" comment="kernel-zfcpdump is &lt;3.12.67-60.64.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182940" version="1" comment="kernel-zfcpdump is &lt;3.12.53-60.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182941" version="1" comment="kernel-zfcpdump is &lt;3.12.57-60.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182942" version="1" comment="libudev-mini-devel is &lt;210-104" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182943" version="1" comment="libudev-mini1 is &lt;210-104" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182944" version="1" comment="systemd-mini is &lt;210-104" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182945" version="1" comment="systemd-mini-devel is &lt;210-104" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182946" version="1" comment="udev-mini is &lt;210-104" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182947" version="1" comment="kernel-zfcpdump is &lt;3.12.69-60.64.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182948" version="1" comment="kernel-zfcpdump is &lt;3.12.69-60.64.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182949" version="1" comment="lynx is &lt;2.8.7-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182950" version="1" comment="kernel-zfcpdump is &lt;3.12.69-60.64.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182951" version="1" comment="python-Twisted is &lt;15.2.1-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182952" version="1" comment="dpkg is &lt;1.16.10-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182953" version="1" comment="ghostscript-mini is &lt;9.15-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182954" version="1" comment="ghostscript-mini-devel is &lt;9.15-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182955" version="1" comment="firebird is &lt;2.5.2.26539-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182956" version="1" comment="libfbclient2 is &lt;2.5.2.26539-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182957" version="1" comment="libfbclient2-devel is &lt;2.5.2.26539-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182958" version="1" comment="kdelibs4 is &lt;4.12.0-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182959" version="1" comment="kdelibs4-branding-upstream is &lt;4.12.0-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182960" version="1" comment="kdelibs4-core is &lt;4.12.0-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182961" version="1" comment="kdelibs4-doc is &lt;4.12.0-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182962" version="1" comment="libkde4-devel is &lt;4.12.0-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182963" version="1" comment="libkdecore4-devel is &lt;4.12.0-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182964" version="1" comment="kernel-zfcpdump is &lt;3.12.74-60.64.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182965" version="1" comment="ghostscript-mini is &lt;9.15-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182966" version="1" comment="ghostscript-mini-devel is &lt;9.15-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135537" version="1" comment="sle-bsk-release is ==12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182967" version="1" comment="kernel-zfcpdump is &lt;4.4.21-84" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182968" version="1" comment="kernel-zfcpdump is &lt;4.4.21-90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182969" version="1" comment="kernel-zfcpdump is &lt;4.4.59-92.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182970" version="1" comment="libudev-mini-devel is &lt;228-149" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182971" version="1" comment="libudev-mini1 is &lt;228-149" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182972" version="1" comment="systemd-mini is &lt;228-149" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182973" version="1" comment="systemd-mini-devel is &lt;228-149" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182974" version="1" comment="udev-mini is &lt;228-149" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182975" version="1" comment="libreoffice is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182976" version="1" comment="libreoffice-sdk is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182977" version="1" comment="kernel-zfcpdump is &lt;4.4.74-92.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182978" version="1" comment="libudev-mini-devel is &lt;228-150.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182979" version="1" comment="libudev-mini1 is &lt;228-150.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182980" version="1" comment="systemd-mini is &lt;228-150.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182981" version="1" comment="systemd-mini-devel is &lt;228-150.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182982" version="1" comment="udev-mini is &lt;228-150.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182983" version="1" comment="libpoppler-cpp0 is &lt;0.43.0-16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182984" version="1" comment="poppler is &lt;0.43.0-16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182985" version="1" comment="kernel-zfcpdump is &lt;4.4.74-92.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182986" version="1" comment="kernel-zfcpdump is &lt;4.4.74-92.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182987" version="1" comment="python-pycrypto is &lt;2.6.1-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182988" version="1" comment="libudev-mini-devel is &lt;228-132" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182989" version="1" comment="libudev-mini1 is &lt;228-132" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182990" version="1" comment="systemd-mini is &lt;228-132" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182991" version="1" comment="systemd-mini-devel is &lt;228-132" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182992" version="1" comment="udev-mini is &lt;228-132" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182993" version="1" comment="kernel-zfcpdump is &lt;4.4.74-92.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182994" version="1" comment="krb5-mini is &lt;1.12.5-40.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182995" version="1" comment="krb5-mini-devel is &lt;1.12.5-40.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182996" version="1" comment="kernel-zfcpdump is &lt;4.4.90-92.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182997" version="1" comment="krb5-mini is &lt;1.12.5-40.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182998" version="1" comment="krb5-mini-devel is &lt;1.12.5-40.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009182999" version="1" comment="lynx is &lt;2.8.7-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183000" version="1" comment="kernel-zfcpdump is &lt;4.4.90-92.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183001" version="1" comment="kernel-zfcpdump is &lt;4.4.103-92.53" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183002" version="1" comment="kernel-zfcpdump is &lt;4.4.49-92.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183003" version="1" comment="kernel-zfcpdump is &lt;4.4.49-92.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183004" version="1" comment="kernel-zfcpdump is &lt;4.4.59-92.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183005" version="1" comment="kernel-zfcpdump is &lt;4.4.38-93" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183006" version="1" comment="kernel-zfcpdump is &lt;4.4.59-92.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183007" version="1" comment="kernel-zfcpdump is &lt;4.4.103-92.56" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183008" version="1" comment="libudev-mini-devel is &lt;228-150.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183009" version="1" comment="libudev-mini1 is &lt;228-150.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183010" version="1" comment="systemd-mini is &lt;228-150.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183011" version="1" comment="systemd-mini-devel is &lt;228-150.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183012" version="1" comment="udev-mini is &lt;228-150.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183013" version="1" comment="ghostscript-mini is &lt;9.15-23.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183014" version="1" comment="ghostscript-mini-devel is &lt;9.15-23.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183015" version="1" comment="kernel-zfcpdump is &lt;4.4.114-92.64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183016" version="1" comment="libreoffice is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183017" version="1" comment="libreoffice-sdk is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183018" version="1" comment="libudev-mini-devel is &lt;228-150.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183019" version="1" comment="libudev-mini1 is &lt;228-150.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183020" version="1" comment="systemd-mini is &lt;228-150.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183021" version="1" comment="systemd-mini-devel is &lt;228-150.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183022" version="1" comment="udev-mini is &lt;228-150.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183023" version="1" comment="cups is &lt;1.7.5-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183024" version="1" comment="cups-ddk is &lt;1.7.5-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183025" version="1" comment="kernel-zfcpdump is &lt;4.4.103-92.59" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183026" version="1" comment="kernel-zfcpdump is &lt;4.4.120-92.70" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183027" version="1" comment="krb5-mini is &lt;1.12.5-40.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183028" version="1" comment="krb5-mini-devel is &lt;1.12.5-40.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159504" version="1" comment="sle-bsk-release is ==12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183029" version="1" comment="libudev-mini-devel is &lt;228-150.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183030" version="1" comment="libudev-mini1 is &lt;228-150.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183031" version="1" comment="systemd-mini is &lt;228-150.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183032" version="1" comment="systemd-mini-devel is &lt;228-150.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183033" version="1" comment="udev-mini is &lt;228-150.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183034" version="1" comment="kernel-zfcpdump is &lt;4.4.82-6.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183035" version="1" comment="libreoffice is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183036" version="1" comment="libreoffice-sdk is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183037" version="1" comment="kernel-zfcpdump is &lt;4.4.82-6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183038" version="1" comment="kernel-zfcpdump is &lt;4.4.92-6.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183039" version="1" comment="kernel-zfcpdump is &lt;4.4.92-6.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183040" version="1" comment="kernel-zfcpdump is &lt;4.4.103-6.33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183042" version="1" comment="ocaml-ocamldoc is &lt;4.03.0-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223418" version="1" comment="poppler is &lt;0.43.0-16.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229250" version="1" comment="kernel-zfcpdump is &lt;4.4.138-94.39" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183043" version="1" comment="kernel-zfcpdump is &lt;4.4.103-6.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230617" version="1" comment="kernel-zfcpdump is &lt;4.4.140-94.42" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231158" version="1" comment="cups is &lt;1.7.5-20.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231159" version="1" comment="cups-ddk is &lt;1.7.5-20.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231979" version="1" comment="kernel-zfcpdump is &lt;4.4.143-94.47" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233216" version="1" comment="podofo is &lt;0.9.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234754" version="1" comment="kernel-zfcpdump is &lt;4.4.155-94.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235780" version="1" comment="ghostscript-mini is &lt;9.25-23.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235781" version="1" comment="ghostscript-mini-devel is &lt;9.25-23.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235820" version="1" comment="kernel-zfcpdump is &lt;4.4.156-94.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236301" version="1" comment="texlive-cyrillic-bin-bin is &lt;2013.20130620.svn29741-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236302" version="1" comment="texlive-epstopdf-bin is &lt;2013.20130620.svn18336-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238973" version="1" comment="kernel-zfcpdump is &lt;4.4.162-94.69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239182" version="1" comment="libudev-mini-devel is &lt;228-150.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239183" version="1" comment="libudev-mini1 is &lt;228-150.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239184" version="1" comment="systemd-mini is &lt;228-150.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239185" version="1" comment="systemd-mini-devel is &lt;228-150.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239186" version="1" comment="udev-mini is &lt;228-150.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183044" version="1" comment="kernel-zfcpdump is &lt;4.4.114-94.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241666" version="1" comment="ghostscript-mini is &lt;9.26-23.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241667" version="1" comment="ghostscript-mini-devel is &lt;9.26-23.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241668" version="1" comment="cups is &lt;1.7.5-20.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241669" version="1" comment="cups-ddk is &lt;1.7.5-20.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183045" version="1" comment="libreoffice is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183046" version="1" comment="libreoffice-sdk is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183047" version="1" comment="python-tevent is &lt;0.9.34-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183048" version="1" comment="tevent is &lt;0.9.34-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183049" version="1" comment="kernel-zfcpdump is &lt;4.4.120-94.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183050" version="1" comment="ocaml is &lt;4.03.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183051" version="1" comment="ocaml-ocamldoc is &lt;4.03.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183052" version="1" comment="kernel-zfcpdump is &lt;4.4.126-94.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183053" version="1" comment="PackageKit is &lt;1.1.3-24.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183054" version="1" comment="PackageKit-branding-upstream is &lt;1.1.3-24.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183055" version="1" comment="libreoffice is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183056" version="1" comment="libreoffice-sdk is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183057" version="1" comment="kernel-zfcpdump is &lt;4.4.103-94.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183058" version="1" comment="libreoffice is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183059" version="1" comment="libreoffice-sdk is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183060" version="1" comment="ghostscript-mini is &lt;9.15-23.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183061" version="1" comment="ghostscript-mini-devel is &lt;9.15-23.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183062" version="1" comment="kernel-zfcpdump is &lt;4.4.131-94.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243061" version="1" comment="krb5-mini is &lt;1.12.5-40.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243062" version="1" comment="krb5-mini-devel is &lt;1.12.5-40.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253448" version="1" comment="kernel-zfcpdump is &lt;4.4.178-94.91" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253632" version="1" comment="libudev-mini-devel is &lt;228-150.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253633" version="1" comment="libudev-mini1 is &lt;228-150.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253634" version="1" comment="systemd-mini is &lt;228-150.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253635" version="1" comment="systemd-mini-devel is &lt;228-150.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253636" version="1" comment="udev-mini is &lt;228-150.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243159" version="1" comment="PackageKit is &lt;1.1.3-24.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243160" version="1" comment="PackageKit-branding-upstream is &lt;1.1.3-24.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243229" version="1" comment="libudev-mini-devel is &lt;228-150.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243230" version="1" comment="libudev-mini1 is &lt;228-150.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243231" version="1" comment="systemd-mini is &lt;228-150.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243232" version="1" comment="systemd-mini-devel is &lt;228-150.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243233" version="1" comment="udev-mini is &lt;228-150.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243289" version="1" comment="ghostscript-mini is &lt;9.26a-23.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243290" version="1" comment="ghostscript-mini-devel is &lt;9.26a-23.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256198" version="1" comment="libreoffice is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256199" version="1" comment="libreoffice-sdk is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256965" version="1" comment="kernel-zfcpdump is &lt;4.4.180-94.97" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257139" version="1" comment="python-Jinja2 is &lt;2.8-22.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258522" version="1" comment="gio-branding-upstream is &lt;2.48.2-12.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258523" version="1" comment="glib2 is &lt;2.48.2-12.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243366" version="1" comment="avahi is &lt;0.6.32-32.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243367" version="1" comment="python-avahi is &lt;0.6.32-32.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260593" version="1" comment="kernel-zfcpdump is &lt;4.4.180-94.100" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244272" version="1" comment="libpodofo-devel is &lt;0.9.2-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244273" version="1" comment="podofo is &lt;0.9.2-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244635" version="1" comment="libudev-mini-devel is &lt;228-150.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244636" version="1" comment="libudev-mini1 is &lt;228-150.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244637" version="1" comment="systemd-mini is &lt;228-150.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244638" version="1" comment="systemd-mini-devel is &lt;228-150.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244639" version="1" comment="udev-mini is &lt;228-150.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245478" version="1" comment="kernel-zfcpdump is &lt;4.4.175-94.79" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246145" version="1" comment="ghostscript-mini is &lt;9.26a-23.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246146" version="1" comment="ghostscript-mini-devel is &lt;9.26a-23.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246521" version="1" comment="kernel-zfcpdump is &lt;4.4.176-94.88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241141" version="1" comment="sle-bsk-release is ==12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241600" version="1" comment="kernel-zfcpdump is &lt;4.12.14-95.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243161" version="1" comment="mariadb is &lt;10.2.21-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243162" version="1" comment="mariadb-bench is &lt;10.2.21-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243163" version="1" comment="mariadb-test is &lt;10.2.21-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253449" version="1" comment="kernel-zfcpdump is &lt;4.12.14-95.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256966" version="1" comment="kernel-zfcpdump is &lt;4.12.14-95.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259167" version="1" comment="gio-branding-upstream is &lt;2.48.2-12.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259168" version="1" comment="glib2 is &lt;2.48.2-12.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259317" version="1" comment="libpodofo-devel is &lt;0.9.2-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259318" version="1" comment="podofo is &lt;0.9.2-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259319" version="1" comment="kernel-zfcpdump is &lt;4.12.14-95.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243368" version="1" comment="kernel-zfcpdump is &lt;4.12.14-95.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261219" version="1" comment="python-Twisted is &lt;15.2.1-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261220" version="1" comment="kernel-zfcpdump is &lt;4.12.14-95.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263846" version="1" comment="mariadb is &lt;10.2.25-3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263847" version="1" comment="mariadb-bench is &lt;10.2.25-3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263848" version="1" comment="mariadb-test is &lt;10.2.25-3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263924" version="1" comment="ghostscript-mini is &lt;9.26a-23.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263925" version="1" comment="ghostscript-mini-devel is &lt;9.26a-23.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264845" version="1" comment="libreoffice is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264846" version="1" comment="libreoffice-sdk is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265037" version="1" comment="kernel-zfcpdump is &lt;4.12.14-95.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265155" version="1" comment="python-Twisted is &lt;15.2.1-9.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265270" version="1" comment="ghostscript-mini is &lt;9.27-23.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265271" version="1" comment="ghostscript-mini-devel is &lt;9.27-23.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246263" version="1" comment="kernel-zfcpdump is &lt;4.12.14-95.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183063" version="1" comment="tigervnc is &lt;1.3.0-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183064" version="1" comment="xorg-x11-Xvnc is &lt;1.3.0-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183065" version="1" comment="gnutls is &lt;3.2.15-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183066" version="1" comment="libgnutls28 is &lt;3.2.15-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183067" version="1" comment="libgnutls28-32bit is &lt;3.2.15-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183068" version="1" comment="flash-player is &lt;11.2.202.425-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183069" version="1" comment="flash-player-gnome is &lt;11.2.202.425-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183070" version="1" comment="mailx is &lt;12.5-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183071" version="1" comment="flac is &lt;1.3.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183072" version="1" comment="ntp is &lt;4.2.6p5-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183073" version="1" comment="ntp-doc is &lt;4.2.6p5-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183074" version="1" comment="openvpn is &lt;2.3.2-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183075" version="1" comment="dbus-1 is &lt;1.8.12-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183076" version="1" comment="dbus-1-x11 is &lt;1.8.12-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183077" version="1" comment="libdbus-1-3 is &lt;1.8.12-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183078" version="1" comment="libdbus-1-3-32bit is &lt;1.8.12-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183079" version="1" comment="tcpdump is &lt;4.5.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183080" version="1" comment="libssh is &lt;0.6.3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183081" version="1" comment="libssh4 is &lt;0.6.3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183082" version="1" comment="libreoffice-base is &lt;4.3.5.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183083" version="1" comment="libreoffice-base-drivers-mysql is &lt;4.3.5.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183084" version="1" comment="libreoffice-base-drivers-postgresql is &lt;4.3.5.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183085" version="1" comment="libreoffice-calc is &lt;4.3.5.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183086" version="1" comment="libreoffice-calc-extensions is &lt;4.3.5.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183087" version="1" comment="libreoffice-draw is &lt;4.3.5.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183088" version="1" comment="libreoffice-filters-optional is &lt;4.3.5.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183089" version="1" comment="libreoffice-gnome is &lt;4.3.5.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183090" version="1" comment="libreoffice-icon-theme-tango is &lt;4.3.5.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183091" version="1" comment="libreoffice-impress is &lt;4.3.5.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183092" version="1" comment="libreoffice-l10n-af is &lt;4.3.5.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183093" version="1" comment="libreoffice-l10n-ar is &lt;4.3.5.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183094" version="1" comment="libreoffice-l10n-ca is &lt;4.3.5.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183095" version="1" comment="libreoffice-l10n-cs is &lt;4.3.5.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183096" version="1" comment="libreoffice-l10n-da is &lt;4.3.5.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183097" version="1" comment="libreoffice-l10n-de is &lt;4.3.5.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183098" version="1" comment="libreoffice-l10n-en is &lt;4.3.5.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183099" version="1" comment="libreoffice-l10n-es is &lt;4.3.5.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183100" version="1" comment="libreoffice-l10n-fi is &lt;4.3.5.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183101" version="1" comment="libreoffice-l10n-fr is &lt;4.3.5.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183102" version="1" comment="libreoffice-l10n-gu is &lt;4.3.5.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183103" version="1" comment="libreoffice-l10n-hi is &lt;4.3.5.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183104" version="1" comment="libreoffice-l10n-hu is &lt;4.3.5.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183105" version="1" comment="libreoffice-l10n-it is &lt;4.3.5.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183106" version="1" comment="libreoffice-l10n-ja is &lt;4.3.5.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183107" version="1" comment="libreoffice-l10n-ko is &lt;4.3.5.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183108" version="1" comment="libreoffice-l10n-nb is &lt;4.3.5.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183109" version="1" comment="libreoffice-l10n-nl is &lt;4.3.5.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183110" version="1" comment="libreoffice-l10n-nn is &lt;4.3.5.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183111" version="1" comment="libreoffice-l10n-pl is &lt;4.3.5.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183112" version="1" comment="libreoffice-l10n-pt-BR is &lt;4.3.5.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183113" version="1" comment="libreoffice-l10n-pt-PT is &lt;4.3.5.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183114" version="1" comment="libreoffice-l10n-ru is &lt;4.3.5.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183115" version="1" comment="libreoffice-l10n-sk is &lt;4.3.5.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183116" version="1" comment="libreoffice-l10n-sv is &lt;4.3.5.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183117" version="1" comment="libreoffice-l10n-xh is &lt;4.3.5.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183118" version="1" comment="libreoffice-l10n-zh-Hans is &lt;4.3.5.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183119" version="1" comment="libreoffice-l10n-zh-Hant is &lt;4.3.5.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183120" version="1" comment="libreoffice-l10n-zu is &lt;4.3.5.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183121" version="1" comment="libreoffice-mailmerge is &lt;4.3.5.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183122" version="1" comment="libreoffice-math is &lt;4.3.5.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183123" version="1" comment="libreoffice-officebean is &lt;4.3.5.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183124" version="1" comment="libreoffice-pyuno is &lt;4.3.5.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183125" version="1" comment="libreoffice-writer is &lt;4.3.5.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183126" version="1" comment="libreoffice-writer-extensions is &lt;4.3.5.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183127" version="1" comment="flash-player is &lt;11.2.202.411-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183128" version="1" comment="flash-player-gnome is &lt;11.2.202.411-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183129" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.71-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183130" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.71-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183131" version="1" comment="rsyslog is &lt;8.4.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183132" version="1" comment="flash-player is &lt;11.2.202.418-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183133" version="1" comment="flash-player-gnome is &lt;11.2.202.418-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183134" version="1" comment="libreoffice-base is &lt;4.3.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183135" version="1" comment="libreoffice-base-drivers-mysql is &lt;4.3.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183136" version="1" comment="libreoffice-base-drivers-postgresql is &lt;4.3.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183137" version="1" comment="libreoffice-calc is &lt;4.3.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183138" version="1" comment="libreoffice-calc-extensions is &lt;4.3.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183139" version="1" comment="libreoffice-draw is &lt;4.3.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183140" version="1" comment="libreoffice-filters-optional is &lt;4.3.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183141" version="1" comment="libreoffice-gnome is &lt;4.3.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183142" version="1" comment="libreoffice-icon-theme-tango is &lt;4.3.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183143" version="1" comment="libreoffice-impress is &lt;4.3.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183144" version="1" comment="libreoffice-l10n-af is &lt;4.3.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183145" version="1" comment="libreoffice-l10n-ar is &lt;4.3.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183146" version="1" comment="libreoffice-l10n-ca is &lt;4.3.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183147" version="1" comment="libreoffice-l10n-cs is &lt;4.3.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183148" version="1" comment="libreoffice-l10n-da is &lt;4.3.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183149" version="1" comment="libreoffice-l10n-de is &lt;4.3.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183150" version="1" comment="libreoffice-l10n-en is &lt;4.3.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183151" version="1" comment="libreoffice-l10n-es is &lt;4.3.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183152" version="1" comment="libreoffice-l10n-fi is &lt;4.3.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183153" version="1" comment="libreoffice-l10n-fr is &lt;4.3.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183154" version="1" comment="libreoffice-l10n-gu is &lt;4.3.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183155" version="1" comment="libreoffice-l10n-hi is &lt;4.3.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183156" version="1" comment="libreoffice-l10n-hu is &lt;4.3.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183157" version="1" comment="libreoffice-l10n-it is &lt;4.3.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183158" version="1" comment="libreoffice-l10n-ja is &lt;4.3.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183159" version="1" comment="libreoffice-l10n-ko is &lt;4.3.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183160" version="1" comment="libreoffice-l10n-nb is &lt;4.3.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183161" version="1" comment="libreoffice-l10n-nl is &lt;4.3.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183162" version="1" comment="libreoffice-l10n-nn is &lt;4.3.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183163" version="1" comment="libreoffice-l10n-pl is &lt;4.3.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183164" version="1" comment="libreoffice-l10n-pt-BR is &lt;4.3.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183165" version="1" comment="libreoffice-l10n-pt-PT is &lt;4.3.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183166" version="1" comment="libreoffice-l10n-ru is &lt;4.3.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183167" version="1" comment="libreoffice-l10n-sk is &lt;4.3.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183168" version="1" comment="libreoffice-l10n-sv is &lt;4.3.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183169" version="1" comment="libreoffice-l10n-xh is &lt;4.3.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183170" version="1" comment="libreoffice-l10n-zh-Hans is &lt;4.3.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183171" version="1" comment="libreoffice-l10n-zh-Hant is &lt;4.3.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183172" version="1" comment="libreoffice-l10n-zu is &lt;4.3.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183173" version="1" comment="libreoffice-mailmerge is &lt;4.3.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183174" version="1" comment="libreoffice-math is &lt;4.3.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183175" version="1" comment="libreoffice-officebean is &lt;4.3.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183176" version="1" comment="libreoffice-pyuno is &lt;4.3.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183177" version="1" comment="libreoffice-writer is &lt;4.3.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183178" version="1" comment="libreoffice-writer-extensions is &lt;4.3.3.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183179" version="1" comment="MozillaFirefox is &lt;31.3.0esr-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183180" version="1" comment="MozillaFirefox-branding-SLE is &lt;31.0-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183181" version="1" comment="MozillaFirefox-translations is &lt;31.3.0esr-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183182" version="1" comment="libfreebl3 is &lt;3.17.2-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183183" version="1" comment="libfreebl3-32bit is &lt;3.17.2-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183184" version="1" comment="libsoftokn3 is &lt;3.17.2-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183185" version="1" comment="libsoftokn3-32bit is &lt;3.17.2-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183186" version="1" comment="mozilla-nss is &lt;3.17.2-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183187" version="1" comment="mozilla-nss-32bit is &lt;3.17.2-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183188" version="1" comment="mozilla-nss-certs is &lt;3.17.2-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183189" version="1" comment="mozilla-nss-certs-32bit is &lt;3.17.2-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183190" version="1" comment="mozilla-nss-tools is &lt;3.17.2-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183191" version="1" comment="libpython2_7-1_0 is &lt;2.7.7-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183192" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.7-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183193" version="1" comment="python is &lt;2.7.7-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183194" version="1" comment="python-base is &lt;2.7.7-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183195" version="1" comment="python-curses is &lt;2.7.7-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183196" version="1" comment="python-devel is &lt;2.7.7-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183197" version="1" comment="python-tk is &lt;2.7.7-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183198" version="1" comment="python-xml is &lt;2.7.7-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183199" version="1" comment="compat-openssl098 is &lt;0.9.8j-66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183200" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183201" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183202" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183203" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183204" version="1" comment="openssl is &lt;1.0.1i-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183205" version="1" comment="flash-player is &lt;11.2.202.424-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183206" version="1" comment="flash-player-gnome is &lt;11.2.202.424-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183207" version="1" comment="file is &lt;5.19-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183208" version="1" comment="file-magic is &lt;5.19-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183209" version="1" comment="libmagic1 is &lt;5.19-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183210" version="1" comment="libmagic1-32bit is &lt;5.19-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183211" version="1" comment="libxml2 is &lt;2.9.1-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183212" version="1" comment="xen is &lt;4.4.3_06-22.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183213" version="1" comment="xen-kmp-default is &lt;4.4.3_06_k3.12.48_52.27-22.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183214" version="1" comment="xen-libs is &lt;4.4.3_06-22.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183215" version="1" comment="xen-libs-32bit is &lt;4.4.3_06-22.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183216" version="1" comment="MozillaFirefox is &lt;38.5.0esr-54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183217" version="1" comment="MozillaFirefox-translations is &lt;38.5.0esr-54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183218" version="1" comment="bind is &lt;9.9.6P1-28.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183219" version="1" comment="bind-libs is &lt;9.9.6P1-28.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183220" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-28.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183221" version="1" comment="bind-utils is &lt;9.9.6P1-28.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183222" version="1" comment="compat-openssl098 is &lt;0.9.8j-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183223" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183224" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183225" version="1" comment="xorg-x11-server is &lt;7.6_1.15.2-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183226" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.15.2-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183227" version="1" comment="xfsprogs is &lt;3.2.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183228" version="1" comment="grub2 is &lt;2.02~beta2-56.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183229" version="1" comment="grub2-i386-pc is &lt;2.02~beta2-56.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183230" version="1" comment="grub2-snapper-plugin is &lt;2.02~beta2-56.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183231" version="1" comment="grub2-x86_64-efi is &lt;2.02~beta2-56.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183232" version="1" comment="grub2-x86_64-xen is &lt;2.02~beta2-56.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183233" version="1" comment="flash-player is &lt;11.2.202.559-117" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183234" version="1" comment="flash-player-gnome is &lt;11.2.202.559-117" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183235" version="1" comment="MozillaFirefox is &lt;31.5.0esr-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183236" version="1" comment="MozillaFirefox-translations is &lt;31.5.0esr-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183237" version="1" comment="freetype2 is &lt;2.5.3-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183238" version="1" comment="ft2demos is &lt;2.5.3-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183239" version="1" comment="libfreetype6 is &lt;2.5.3-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183240" version="1" comment="libfreetype6-32bit is &lt;2.5.3-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183241" version="1" comment="cups-client is &lt;1.7.5-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183242" version="1" comment="cups-libs is &lt;1.7.5-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183243" version="1" comment="cups-libs-32bit is &lt;1.7.5-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183244" version="1" comment="libecpg6 is &lt;9.3.6-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183245" version="1" comment="libpq5 is &lt;9.3.6-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183246" version="1" comment="libpq5-32bit is &lt;9.3.6-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183247" version="1" comment="postgresql93 is &lt;9.3.6-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183248" version="1" comment="postgresql93-libs is &lt;9.3.6-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183249" version="1" comment="unzip is &lt;6.00-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183250" version="1" comment="flash-player is &lt;11.2.202.451-77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183251" version="1" comment="flash-player-gnome is &lt;11.2.202.451-77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183252" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.75-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183253" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.75-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183254" version="1" comment="libmspack is &lt;0.4-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183255" version="1" comment="glibc is &lt;2.19-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183256" version="1" comment="glibc-32bit is &lt;2.19-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183257" version="1" comment="glibc-devel is &lt;2.19-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183258" version="1" comment="glibc-devel-32bit is &lt;2.19-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183259" version="1" comment="glibc-i18ndata is &lt;2.19-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183260" version="1" comment="glibc-locale is &lt;2.19-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183261" version="1" comment="glibc-locale-32bit is &lt;2.19-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183262" version="1" comment="nscd is &lt;2.19-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183263" version="1" comment="kernel-default is &lt;3.12.38-44" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183264" version="1" comment="kernel-default-devel is &lt;3.12.38-44" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183265" version="1" comment="kernel-default-extra is &lt;3.12.38-44" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183266" version="1" comment="kernel-devel is &lt;3.12.38-44" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183267" version="1" comment="kernel-macros is &lt;3.12.38-44" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183268" version="1" comment="kernel-source is &lt;3.12.38-44" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183269" version="1" comment="kernel-syms is &lt;3.12.38-44" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183270" version="1" comment="kernel-xen is &lt;3.12.38-44" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183271" version="1" comment="kernel-xen-devel is &lt;3.12.38-44" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183272" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183273" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183274" version="1" comment="openssl is &lt;1.0.1i-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183275" version="1" comment="compat-openssl098 is &lt;0.9.8j-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183276" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183277" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183278" version="1" comment="xerces-c is &lt;3.1.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183279" version="1" comment="xen is &lt;4.4.1_10-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183280" version="1" comment="xen-kmp-default is &lt;4.4.1_10_k3.12.36_38-9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183281" version="1" comment="xen-libs is &lt;4.4.1_10-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183282" version="1" comment="xen-libs-32bit is &lt;4.4.1_10-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183283" version="1" comment="MozillaFirefox is &lt;31.5.3esr-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183284" version="1" comment="MozillaFirefox-translations is &lt;31.5.3esr-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183285" version="1" comment="wireshark is &lt;1.10.13-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183286" version="1" comment="kernel-default is &lt;3.12.39-47" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183287" version="1" comment="kernel-default-devel is &lt;3.12.39-47" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183288" version="1" comment="kernel-default-extra is &lt;3.12.39-47" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183289" version="1" comment="kernel-devel is &lt;3.12.39-47" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183290" version="1" comment="kernel-macros is &lt;3.12.39-47" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183291" version="1" comment="kernel-source is &lt;3.12.39-47" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183292" version="1" comment="kernel-syms is &lt;3.12.39-47" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183293" version="1" comment="kernel-xen is &lt;3.12.39-47" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183294" version="1" comment="kernel-xen-devel is &lt;3.12.39-47" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183295" version="1" comment="libzip is &lt;0.11.1-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183296" version="1" comment="libzip2 is &lt;0.11.1-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183297" version="1" comment="libarchive is &lt;3.1.2-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183298" version="1" comment="libssh2_org is &lt;1.4.3-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183299" version="1" comment="libksba is &lt;1.3.0-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183300" version="1" comment="webkitgtk is &lt;2.4.8-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183301" version="1" comment="webkitgtk3 is &lt;2.4.8-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183302" version="1" comment="libXfont is &lt;1.4.7-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183303" version="1" comment="xen is &lt;4.4.2_02-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183304" version="1" comment="xen-kmp-default is &lt;4.4.2_02_k3.12.38_44-15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183305" version="1" comment="xen-libs is &lt;4.4.2_02-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183306" version="1" comment="xen-libs-32bit is &lt;4.4.2_02-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183307" version="1" comment="MozillaFirefox is &lt;31.6.0esr-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183308" version="1" comment="MozillaFirefox-translations is &lt;31.6.0esr-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183309" version="1" comment="flash-player is &lt;11.2.202.457-80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183310" version="1" comment="flash-player-gnome is &lt;11.2.202.457-80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183311" version="1" comment="gnutls is &lt;3.2.15-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183312" version="1" comment="libgnutls28 is &lt;3.2.15-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183313" version="1" comment="libgnutls28-32bit is &lt;3.2.15-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183314" version="1" comment="libmysqlclient18 is &lt;10.0.16-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183315" version="1" comment="libmysqlclient18-32bit is &lt;10.0.16-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183316" version="1" comment="libmysqlclient_r18 is &lt;10.0.16-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183317" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.16-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183318" version="1" comment="mariadb is &lt;10.0.16-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183319" version="1" comment="mariadb-client is &lt;10.0.16-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183320" version="1" comment="mariadb-errormessages is &lt;10.0.16-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183321" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.79-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183322" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.79-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183323" version="1" comment="cups-filters is &lt;1.0.58-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183324" version="1" comment="cups-filters-cups-browsed is &lt;1.0.58-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183325" version="1" comment="cups-filters-foomatic-rip is &lt;1.0.58-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183326" version="1" comment="cups-filters-ghostscript is &lt;1.0.58-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183327" version="1" comment="gdm is &lt;3.10.0.1-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183328" version="1" comment="gdm-branding-upstream is &lt;3.10.0.1-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183329" version="1" comment="gdm-lang is &lt;3.10.0.1-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183330" version="1" comment="gdmflexiserver is &lt;3.10.0.1-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183331" version="1" comment="libgdm1 is &lt;3.10.0.1-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183332" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.10.0.1-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183333" version="1" comment="xorg-x11-server is &lt;7.6_1.15.2-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183334" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.15.2-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183335" version="1" comment="flash-player is &lt;11.2.202.429-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183336" version="1" comment="flash-player-gnome is &lt;11.2.202.429-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183337" version="1" comment="ntp is &lt;4.2.6p5-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183338" version="1" comment="ntp-doc is &lt;4.2.6p5-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183339" version="1" comment="flash-player is &lt;11.2.202.460-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183340" version="1" comment="flash-player-gnome is &lt;11.2.202.460-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183341" version="1" comment="libspice-server1 is &lt;0.12.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183342" version="1" comment="spice is &lt;0.12.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183343" version="1" comment="qemu is &lt;2.0.2-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183344" version="1" comment="qemu-block-curl is &lt;2.0.2-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183345" version="1" comment="qemu-ipxe is &lt;1.0.0-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183346" version="1" comment="qemu-kvm is &lt;2.0.2-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183347" version="1" comment="qemu-seabios is &lt;1.7.4-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183348" version="1" comment="qemu-sgabios is &lt;8-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183349" version="1" comment="qemu-tools is &lt;2.0.2-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183350" version="1" comment="qemu-vgabios is &lt;1.7.4-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183351" version="1" comment="qemu-x86 is &lt;2.0.2-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183352" version="1" comment="xen is &lt;4.4.2_04-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183353" version="1" comment="xen-kmp-default is &lt;4.4.2_04_k3.12.39_47-18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183354" version="1" comment="xen-libs is &lt;4.4.2_04-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183355" version="1" comment="xen-libs-32bit is &lt;4.4.2_04-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183356" version="1" comment="kernel-default is &lt;3.12.32-33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183357" version="1" comment="kernel-default-devel is &lt;3.12.32-33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183358" version="1" comment="kernel-default-extra is &lt;3.12.32-33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183359" version="1" comment="kernel-devel is &lt;3.12.32-33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183360" version="1" comment="kernel-macros is &lt;3.12.32-33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183361" version="1" comment="kernel-source is &lt;3.12.32-33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183362" version="1" comment="kernel-syms is &lt;3.12.32-33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183363" version="1" comment="kernel-xen is &lt;3.12.32-33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183364" version="1" comment="kernel-xen-devel is &lt;3.12.32-33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183365" version="1" comment="fltk is &lt;1.3.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183366" version="1" comment="libfltk1 is &lt;1.3.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183367" version="1" comment="tigervnc is &lt;1.4.1-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183368" version="1" comment="xorg-x11-Xvnc is &lt;1.4.1-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183369" version="1" comment="MozillaFirefox is &lt;31.7.0esr-34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183370" version="1" comment="MozillaFirefox-translations is &lt;31.7.0esr-34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183371" version="1" comment="dnsmasq is &lt;2.71-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183372" version="1" comment="vorbis-tools is &lt;1.4.0-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183373" version="1" comment="vorbis-tools-lang is &lt;1.4.0-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183374" version="1" comment="MozillaFirefox is &lt;31.4.0esr-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183375" version="1" comment="MozillaFirefox-translations is &lt;31.4.0esr-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183376" version="1" comment="libfreebl3 is &lt;3.17.3-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183377" version="1" comment="libfreebl3-32bit is &lt;3.17.3-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183378" version="1" comment="libsoftokn3 is &lt;3.17.3-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183379" version="1" comment="libsoftokn3-32bit is &lt;3.17.3-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183380" version="1" comment="mozilla-nss is &lt;3.17.3-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183381" version="1" comment="mozilla-nss-32bit is &lt;3.17.3-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183382" version="1" comment="mozilla-nss-certs is &lt;3.17.3-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183383" version="1" comment="mozilla-nss-certs-32bit is &lt;3.17.3-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183384" version="1" comment="mozilla-nss-tools is &lt;3.17.3-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183385" version="1" comment="xen is &lt;4.4.2_06-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183386" version="1" comment="xen-kmp-default is &lt;4.4.2_06_k3.12.39_47-21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183387" version="1" comment="xen-libs is &lt;4.4.2_06-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183388" version="1" comment="xen-libs-32bit is &lt;4.4.2_06-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183389" version="1" comment="flash-player is &lt;11.2.202.466-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183390" version="1" comment="flash-player-gnome is &lt;11.2.202.466-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183391" version="1" comment="wireshark is &lt;1.10.14-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183392" version="1" comment="kernel-default is &lt;3.12.43-52.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183393" version="1" comment="kernel-default-devel is &lt;3.12.43-52.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183394" version="1" comment="kernel-default-extra is &lt;3.12.43-52.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183395" version="1" comment="kernel-devel is &lt;3.12.43-52.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183396" version="1" comment="kernel-macros is &lt;3.12.43-52.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183397" version="1" comment="kernel-source is &lt;3.12.43-52.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183398" version="1" comment="kernel-syms is &lt;3.12.43-52.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183399" version="1" comment="kernel-xen is &lt;3.12.43-52.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183400" version="1" comment="kernel-xen-devel is &lt;3.12.43-52.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183401" version="1" comment="libldap-2_4-2 is &lt;2.4.39-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183402" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.39-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183403" version="1" comment="openldap2-client is &lt;2.4.39-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183404" version="1" comment="xorg-x11-server is &lt;7.6_1.15.2-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183405" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.15.2-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183406" version="1" comment="flash-player is &lt;11.2.202.468-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183407" version="1" comment="flash-player-gnome is &lt;11.2.202.468-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183408" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183409" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183410" version="1" comment="openssl is &lt;1.0.1i-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183411" version="1" comment="compat-openssl098 is &lt;0.9.8j-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183412" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183413" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183414" version="1" comment="curl is &lt;7.37.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183415" version="1" comment="libcurl4 is &lt;7.37.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183416" version="1" comment="libcurl4-32bit is &lt;7.37.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183417" version="1" comment="libgcrypt is &lt;1.6.1-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183418" version="1" comment="libgcrypt20 is &lt;1.6.1-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183419" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183420" version="1" comment="bind is &lt;9.9.6P1-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183421" version="1" comment="bind-libs is &lt;9.9.6P1-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183422" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183423" version="1" comment="bind-utils is &lt;9.9.6P1-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183424" version="1" comment="flash-player is &lt;11.2.202.481-93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183425" version="1" comment="flash-player-gnome is &lt;11.2.202.481-93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183426" version="1" comment="flash-player is &lt;11.2.202.491-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183427" version="1" comment="flash-player-gnome is &lt;11.2.202.491-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183428" version="1" comment="libecpg6 is &lt;9.3.8-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183429" version="1" comment="libpq5 is &lt;9.3.8-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183430" version="1" comment="libpq5-32bit is &lt;9.3.8-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183431" version="1" comment="postgresql93 is &lt;9.3.8-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183432" version="1" comment="postgresql93-libs is &lt;9.3.8-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183433" version="1" comment="libpng16 is &lt;1.6.8-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183434" version="1" comment="MozillaFirefox is &lt;31.8.0esr-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183435" version="1" comment="MozillaFirefox-translations is &lt;31.8.0esr-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183436" version="1" comment="libfreebl3 is &lt;3.19.2_CKBI_1.98-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183437" version="1" comment="libfreebl3-32bit is &lt;3.19.2_CKBI_1.98-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183438" version="1" comment="libsoftokn3 is &lt;3.19.2_CKBI_1.98-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183439" version="1" comment="libsoftokn3-32bit is &lt;3.19.2_CKBI_1.98-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183440" version="1" comment="mozilla-nspr is &lt;4.10.8-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183441" version="1" comment="mozilla-nspr-32bit is &lt;4.10.8-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183442" version="1" comment="mozilla-nss is &lt;3.19.2_CKBI_1.98-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183443" version="1" comment="mozilla-nss-32bit is &lt;3.19.2_CKBI_1.98-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183444" version="1" comment="mozilla-nss-certs is &lt;3.19.2_CKBI_1.98-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183445" version="1" comment="mozilla-nss-certs-32bit is &lt;3.19.2_CKBI_1.98-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183446" version="1" comment="mozilla-nss-tools is &lt;3.19.2_CKBI_1.98-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183447" version="1" comment="libmysqlclient18 is &lt;10.0.20-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183448" version="1" comment="libmysqlclient18-32bit is &lt;10.0.20-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183449" version="1" comment="libmysqlclient_r18 is &lt;10.0.20-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183450" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.20-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183451" version="1" comment="mariadb is &lt;10.0.20-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183452" version="1" comment="mariadb-client is &lt;10.0.20-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183453" version="1" comment="mariadb-errormessages is &lt;10.0.20-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183454" version="1" comment="xen is &lt;4.4.2_08-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183455" version="1" comment="xen-kmp-default is &lt;4.4.2_08_k3.12.43_52.6-22.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183456" version="1" comment="xen-libs is &lt;4.4.2_08-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183457" version="1" comment="xen-libs-32bit is &lt;4.4.2_08-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183458" version="1" comment="bind is &lt;9.9.6P1-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183459" version="1" comment="bind-libs is &lt;9.9.6P1-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183460" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183461" version="1" comment="bind-utils is &lt;9.9.6P1-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183462" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.85-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183463" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.85-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183464" version="1" comment="kernel-default is &lt;3.12.44-52.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183465" version="1" comment="kernel-default-devel is &lt;3.12.44-52.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183466" version="1" comment="kernel-default-extra is &lt;3.12.44-52.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183467" version="1" comment="kernel-devel is &lt;3.12.44-52.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183468" version="1" comment="kernel-macros is &lt;3.12.44-52.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183469" version="1" comment="kernel-source is &lt;3.12.44-52.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183470" version="1" comment="kernel-syms is &lt;3.12.44-52.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183471" version="1" comment="kernel-xen is &lt;3.12.44-52.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183472" version="1" comment="kernel-xen-devel is &lt;3.12.44-52.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183473" version="1" comment="bind is &lt;9.9.5P1-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183474" version="1" comment="bind-libs is &lt;9.9.5P1-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183475" version="1" comment="bind-libs-32bit is &lt;9.9.5P1-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183476" version="1" comment="bind-utils is &lt;9.9.5P1-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183477" version="1" comment="libpython2_7-1_0 is &lt;2.7.9-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183478" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.9-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183479" version="1" comment="python is &lt;2.7.9-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183480" version="1" comment="python-base is &lt;2.7.9-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183481" version="1" comment="python-curses is &lt;2.7.9-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183482" version="1" comment="python-devel is &lt;2.7.9-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183483" version="1" comment="python-tk is &lt;2.7.9-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183484" version="1" comment="python-xml is &lt;2.7.9-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183485" version="1" comment="libqt4-sql-plugins is &lt;4.8.6-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183486" version="1" comment="evolution-data-server is &lt;3.10.4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183487" version="1" comment="evolution-data-server-lang is &lt;3.10.4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183488" version="1" comment="libcamel-1_2-45 is &lt;3.10.4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183489" version="1" comment="libcamel-1_2-45-32bit is &lt;3.10.4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183490" version="1" comment="libebackend-1_2-7 is &lt;3.10.4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183491" version="1" comment="libebackend-1_2-7-32bit is &lt;3.10.4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183492" version="1" comment="libebook-1_2-14 is &lt;3.10.4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183493" version="1" comment="libebook-1_2-14-32bit is &lt;3.10.4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183494" version="1" comment="libebook-contacts-1_2-0 is &lt;3.10.4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183495" version="1" comment="libebook-contacts-1_2-0-32bit is &lt;3.10.4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183496" version="1" comment="libecal-1_2-16 is &lt;3.10.4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183497" version="1" comment="libecal-1_2-16-32bit is &lt;3.10.4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183498" version="1" comment="libedata-book-1_2-20 is &lt;3.10.4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183499" version="1" comment="libedata-book-1_2-20-32bit is &lt;3.10.4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183500" version="1" comment="libedata-cal-1_2-23 is &lt;3.10.4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183501" version="1" comment="libedata-cal-1_2-23-32bit is &lt;3.10.4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183502" version="1" comment="libedataserver-1_2-18 is &lt;3.10.4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183503" version="1" comment="libedataserver-1_2-18-32bit is &lt;3.10.4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183504" version="1" comment="flash-player is &lt;11.2.202.508-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183505" version="1" comment="flash-player-gnome is &lt;11.2.202.508-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183506" version="1" comment="MozillaFirefox is &lt;31.8.0esr-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183507" version="1" comment="MozillaFirefox-translations is &lt;31.8.0esr-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183508" version="1" comment="xen is &lt;4.4.2_10-22.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183509" version="1" comment="xen-kmp-default is &lt;4.4.2_10_k3.12.44_52.10-22.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183510" version="1" comment="xen-libs is &lt;4.4.2_10-22.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183511" version="1" comment="xen-libs-32bit is &lt;4.4.2_10-22.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183512" version="1" comment="libQt5Core5 is &lt;5.3.1-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183513" version="1" comment="libQt5DBus5 is &lt;5.3.1-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183514" version="1" comment="libQt5Gui5 is &lt;5.3.1-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183515" version="1" comment="libQt5Widgets5 is &lt;5.3.1-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183516" version="1" comment="libqt5-qtbase is &lt;5.3.1-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183517" version="1" comment="libyaml is &lt;0.1.6-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183518" version="1" comment="libyaml-0-2 is &lt;0.1.6-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183519" version="1" comment="rpm-python is &lt;4.11.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183520" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-27.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183521" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-27.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183522" version="1" comment="openssl is &lt;1.0.1i-27.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183523" version="1" comment="flash-player is &lt;11.2.202.438-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183524" version="1" comment="flash-player-gnome is &lt;11.2.202.438-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183525" version="1" comment="flash-player is &lt;11.2.202.440-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183526" version="1" comment="flash-player-gnome is &lt;11.2.202.440-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183527" version="1" comment="binutils is &lt;2.24-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183528" version="1" comment="libsndfile is &lt;1.0.25-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183529" version="1" comment="MozillaFirefox is &lt;38.2.1esr-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183530" version="1" comment="MozillaFirefox-branding-SLE is &lt;31.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183531" version="1" comment="MozillaFirefox-translations is &lt;38.2.1esr-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183532" version="1" comment="libfreebl3 is &lt;3.19.2.0-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183533" version="1" comment="libfreebl3-32bit is &lt;3.19.2.0-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183534" version="1" comment="libsoftokn3 is &lt;3.19.2.0-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183535" version="1" comment="libsoftokn3-32bit is &lt;3.19.2.0-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183536" version="1" comment="mozilla-nss is &lt;3.19.2.0-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183537" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.0-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183538" version="1" comment="mozilla-nss-certs is &lt;3.19.2.0-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183539" version="1" comment="mozilla-nss-certs-32bit is &lt;3.19.2.0-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183540" version="1" comment="mozilla-nss-tools is &lt;3.19.2.0-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183541" version="1" comment="bind is &lt;9.9.6P1-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183542" version="1" comment="bind-libs is &lt;9.9.6P1-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183543" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183544" version="1" comment="bind-utils is &lt;9.9.6P1-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183545" version="1" comment="kernel-default is &lt;3.12.36-38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183546" version="1" comment="kernel-default-devel is &lt;3.12.36-38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183547" version="1" comment="kernel-default-extra is &lt;3.12.36-38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183548" version="1" comment="kernel-devel is &lt;3.12.36-38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183549" version="1" comment="kernel-macros is &lt;3.12.36-38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183550" version="1" comment="kernel-source is &lt;3.12.36-38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183551" version="1" comment="kernel-syms is &lt;3.12.36-38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183552" version="1" comment="kernel-xen is &lt;3.12.36-38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183553" version="1" comment="kernel-xen-devel is &lt;3.12.36-38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183554" version="1" comment="clamav is &lt;0.98.5-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183555" version="1" comment="zeromq is &lt;4.0.4-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183556" version="1" comment="jasper is &lt;1.900.1-166" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183557" version="1" comment="libjasper1 is &lt;1.900.1-166" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183558" version="1" comment="libjasper1-32bit is &lt;1.900.1-166" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183559" version="1" comment="libgcrypt is &lt;1.6.1-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183560" version="1" comment="qemu is &lt;2.0.2-48.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183561" version="1" comment="qemu-block-curl is &lt;2.0.2-48.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183562" version="1" comment="qemu-ipxe is &lt;1.0.0-48.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183563" version="1" comment="qemu-kvm is &lt;2.0.2-48.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183564" version="1" comment="qemu-seabios is &lt;1.7.4-48.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183565" version="1" comment="qemu-sgabios is &lt;8-48.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183566" version="1" comment="qemu-tools is &lt;2.0.2-48.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183567" version="1" comment="qemu-vgabios is &lt;1.7.4-48.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183568" version="1" comment="qemu-x86 is &lt;2.0.2-48.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183569" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183570" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183571" version="1" comment="openssl is &lt;1.0.1i-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183572" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183573" version="1" comment="mpfr is &lt;3.1.2-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183574" version="1" comment="libsnmp30 is &lt;5.7.2.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183575" version="1" comment="libsnmp30-32bit is &lt;5.7.2.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183576" version="1" comment="net-snmp is &lt;5.7.2.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183577" version="1" comment="perl-SNMP is &lt;5.7.2.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183578" version="1" comment="snmp-mibs is &lt;5.7.2.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183579" version="1" comment="flash-player is &lt;11.2.202.442-67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183580" version="1" comment="flash-player-gnome is &lt;11.2.202.442-67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183581" version="1" comment="flash-player is &lt;11.2.202.521-102" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183582" version="1" comment="flash-player-gnome is &lt;11.2.202.521-102" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183583" version="1" comment="kernel-default is &lt;3.12.44-52.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183584" version="1" comment="kernel-default-devel is &lt;3.12.44-52.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183585" version="1" comment="kernel-default-extra is &lt;3.12.44-52.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183586" version="1" comment="kernel-devel is &lt;3.12.44-52.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183587" version="1" comment="kernel-macros is &lt;3.12.44-52.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183588" version="1" comment="kernel-source is &lt;3.12.44-52.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183589" version="1" comment="kernel-syms is &lt;3.12.44-52.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183590" version="1" comment="kernel-xen is &lt;3.12.44-52.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183591" version="1" comment="kernel-xen-devel is &lt;3.12.44-52.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183592" version="1" comment="libvirt is &lt;1.2.5-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183593" version="1" comment="libvirt-client is &lt;1.2.5-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183594" version="1" comment="libvirt-client-32bit is &lt;1.2.5-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183595" version="1" comment="libvirt-daemon is &lt;1.2.5-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183596" version="1" comment="libvirt-daemon-config-network is &lt;1.2.5-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183597" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.2.5-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183598" version="1" comment="libvirt-daemon-driver-interface is &lt;1.2.5-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183599" version="1" comment="libvirt-daemon-driver-libxl is &lt;1.2.5-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183600" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.2.5-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183601" version="1" comment="libvirt-daemon-driver-network is &lt;1.2.5-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183602" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.2.5-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183603" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.2.5-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183604" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.2.5-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183605" version="1" comment="libvirt-daemon-driver-secret is &lt;1.2.5-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183606" version="1" comment="libvirt-daemon-driver-storage is &lt;1.2.5-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183607" version="1" comment="libvirt-daemon-lxc is &lt;1.2.5-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183608" version="1" comment="libvirt-daemon-qemu is &lt;1.2.5-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183609" version="1" comment="libvirt-daemon-xen is &lt;1.2.5-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183610" version="1" comment="libvirt-doc is &lt;1.2.5-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183611" version="1" comment="MozillaFirefox is &lt;38.3.0esr-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183612" version="1" comment="MozillaFirefox-translations is &lt;38.3.0esr-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183613" version="1" comment="mozilla-nspr is &lt;4.10.9-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183614" version="1" comment="mozilla-nspr-32bit is &lt;4.10.9-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183615" version="1" comment="rpcbind is &lt;0.2.1_rc4-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183616" version="1" comment="libssh is &lt;0.6.3-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183617" version="1" comment="kernel-default is &lt;3.12.48-52.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183618" version="1" comment="kernel-default-devel is &lt;3.12.48-52.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183619" version="1" comment="kernel-default-extra is &lt;3.12.48-52.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183620" version="1" comment="kernel-devel is &lt;3.12.48-52.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183621" version="1" comment="kernel-macros is &lt;3.12.48-52.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183622" version="1" comment="kernel-source is &lt;3.12.48-52.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183623" version="1" comment="kernel-syms is &lt;3.12.48-52.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183624" version="1" comment="kernel-xen is &lt;3.12.48-52.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183625" version="1" comment="kernel-xen-devel is &lt;3.12.48-52.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183626" version="1" comment="libblkid1 is &lt;2.25-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183627" version="1" comment="libblkid1-32bit is &lt;2.25-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183628" version="1" comment="libmount1 is &lt;2.25-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183629" version="1" comment="libmount1-32bit is &lt;2.25-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183630" version="1" comment="libsmartcols1 is &lt;2.25-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183631" version="1" comment="libuuid-devel is &lt;2.25-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183632" version="1" comment="libuuid1 is &lt;2.25-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183633" version="1" comment="libuuid1-32bit is &lt;2.25-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183634" version="1" comment="python-libmount is &lt;2.25-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183635" version="1" comment="util-linux is &lt;2.25-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183636" version="1" comment="util-linux-lang is &lt;2.25-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183637" version="1" comment="util-linux-systemd is &lt;2.25-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183638" version="1" comment="uuidd is &lt;2.25-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183639" version="1" comment="libspice-server1 is &lt;0.12.4-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183640" version="1" comment="spice is &lt;0.12.4-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183641" version="1" comment="flash-player is &lt;11.2.202.535-105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183642" version="1" comment="flash-player-gnome is &lt;11.2.202.535-105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183643" version="1" comment="ntp is &lt;4.2.6p5-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183644" version="1" comment="ntp-doc is &lt;4.2.6p5-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183645" version="1" comment="flash-player is &lt;11.2.202.540-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183646" version="1" comment="flash-player-gnome is &lt;11.2.202.540-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183647" version="1" comment="strongswan is &lt;5.1.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183648" version="1" comment="strongswan-doc is &lt;5.1.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183649" version="1" comment="strongswan-ipsec is &lt;5.1.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183650" version="1" comment="strongswan-libs0 is &lt;5.1.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183651" version="1" comment="qemu is &lt;2.0.2-48.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183652" version="1" comment="qemu-block-curl is &lt;2.0.2-48.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183653" version="1" comment="qemu-ipxe is &lt;1.0.0-48.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183654" version="1" comment="qemu-kvm is &lt;2.0.2-48.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183655" version="1" comment="qemu-seabios is &lt;1.7.4-48.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183656" version="1" comment="qemu-sgabios is &lt;8-48.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183657" version="1" comment="qemu-tools is &lt;2.0.2-48.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183658" version="1" comment="qemu-vgabios is &lt;1.7.4-48.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183659" version="1" comment="qemu-x86 is &lt;2.0.2-48.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183660" version="1" comment="jasper is &lt;1.900.1-170" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183661" version="1" comment="krb5 is &lt;1.12.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183662" version="1" comment="krb5-32bit is &lt;1.12.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183663" version="1" comment="krb5-client is &lt;1.12.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183664" version="1" comment="postgresql93 is &lt;9.3.10-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183665" version="1" comment="postgresql93-libs is &lt;9.3.10-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183666" version="1" comment="clamav is &lt;0.98.6-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183667" version="1" comment="glibc is &lt;2.19-22.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183668" version="1" comment="glibc-32bit is &lt;2.19-22.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183669" version="1" comment="glibc-devel is &lt;2.19-22.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183670" version="1" comment="glibc-devel-32bit is &lt;2.19-22.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183671" version="1" comment="glibc-i18ndata is &lt;2.19-22.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183672" version="1" comment="glibc-locale is &lt;2.19-22.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183673" version="1" comment="glibc-locale-32bit is &lt;2.19-22.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183674" version="1" comment="nscd is &lt;2.19-22.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183675" version="1" comment="compat-openssl098 is &lt;0.9.8j-70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183676" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183677" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183678" version="1" comment="libvdpau is &lt;0.8-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183679" version="1" comment="xen is &lt;4.4.3_02-22.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183680" version="1" comment="xen-kmp-default is &lt;4.4.3_02_k3.12.48_52.27-22.12" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183681" version="1" comment="xen-libs is &lt;4.4.3_02-22.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183682" version="1" comment="xen-libs-32bit is &lt;4.4.3_02-22.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183683" version="1" comment="apache-commons-logging is &lt;1.1.3-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183684" version="1" comment="cmis-client is &lt;0.5.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183685" version="1" comment="graphite2 is &lt;1.3.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183686" version="1" comment="hyphen is &lt;2.8.8-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183687" version="1" comment="libabw is &lt;0.1.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183688" version="1" comment="libabw-0_1-1 is &lt;0.1.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183689" version="1" comment="libcdr is &lt;0.1.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183690" version="1" comment="libcdr-0_1-1 is &lt;0.1.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183691" version="1" comment="libcmis-0_5-5 is &lt;0.5.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183692" version="1" comment="libe-book is &lt;0.1.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183693" version="1" comment="libe-book-0_1-1 is &lt;0.1.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183694" version="1" comment="libetonyek is &lt;0.1.3-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183695" version="1" comment="libetonyek-0_1-1 is &lt;0.1.3-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183696" version="1" comment="libfreehand is &lt;0.1.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183697" version="1" comment="libfreehand-0_1-1 is &lt;0.1.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183698" version="1" comment="libgltf is &lt;0.0.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183699" version="1" comment="libgltf-0_0-0 is &lt;0.0.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183700" version="1" comment="libgraphite2-3 is &lt;1.3.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183701" version="1" comment="libgraphite2-3-32bit is &lt;1.3.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183702" version="1" comment="libhyphen0 is &lt;2.8.8-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183703" version="1" comment="libixion is &lt;0.9.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183704" version="1" comment="libixion-0_10-0 is &lt;0.9.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183705" version="1" comment="liblangtag is &lt;0.5.7-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183706" version="1" comment="liblangtag1 is &lt;0.5.7-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183707" version="1" comment="libmspub is &lt;0.1.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183708" version="1" comment="libmspub-0_1-1 is &lt;0.1.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183709" version="1" comment="libmwaw is &lt;0.3.6-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183710" version="1" comment="libmwaw-0_3-3 is &lt;0.3.6-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183711" version="1" comment="libodfgen is &lt;0.1.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183712" version="1" comment="libodfgen-0_1-1 is &lt;0.1.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183713" version="1" comment="liborcus is &lt;0.7.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183714" version="1" comment="liborcus-0_8-0 is &lt;0.7.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183715" version="1" comment="libpagemaker is &lt;0.0.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183716" version="1" comment="libpagemaker-0_0-0 is &lt;0.0.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183717" version="1" comment="libreoffice-share-linker is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183718" version="1" comment="libreoffice-voikko is &lt;4.1-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183719" version="1" comment="librevenge-0_0-0 is &lt;0.0.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183720" version="1" comment="librevenge-stream-0_0-0 is &lt;0.0.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183721" version="1" comment="libvisio is &lt;0.1.3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183722" version="1" comment="libvisio-0_1-1 is &lt;0.1.3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183723" version="1" comment="libvoikko is &lt;3.7.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183724" version="1" comment="libvoikko1 is &lt;3.7.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183725" version="1" comment="libwps is &lt;0.4.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183726" version="1" comment="libwps-0_4-4 is &lt;0.4.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183727" version="1" comment="malaga-suomi is &lt;1.18-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183728" version="1" comment="myspell-af_ZA is &lt;20150827-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183729" version="1" comment="myspell-ar is &lt;20150827-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183730" version="1" comment="myspell-be_BY is &lt;20150827-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183731" version="1" comment="myspell-bg_BG is &lt;20150827-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183732" version="1" comment="myspell-bn_BD is &lt;20150827-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183733" version="1" comment="myspell-bs_BA is &lt;20150827-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183734" version="1" comment="myspell-ca is &lt;20150827-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183735" version="1" comment="myspell-cs_CZ is &lt;20150827-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183736" version="1" comment="myspell-da_DK is &lt;20150827-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183737" version="1" comment="myspell-de is &lt;20150827-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183738" version="1" comment="myspell-dictionaries is &lt;20150827-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183739" version="1" comment="myspell-el_GR is &lt;20150827-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183740" version="1" comment="myspell-en is &lt;20150827-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183741" version="1" comment="myspell-es is &lt;20150827-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183742" version="1" comment="myspell-et_EE is &lt;20150827-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183743" version="1" comment="myspell-fr_FR is &lt;20150827-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183744" version="1" comment="myspell-gu_IN is &lt;20150827-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183745" version="1" comment="myspell-he_IL is &lt;20150827-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183746" version="1" comment="myspell-hi_IN is &lt;20150827-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183747" version="1" comment="myspell-hr_HR is &lt;20150827-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183748" version="1" comment="myspell-hu_HU is &lt;20150827-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183749" version="1" comment="myspell-it_IT is &lt;20150827-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183750" version="1" comment="myspell-lo_LA is &lt;20150827-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183751" version="1" comment="myspell-lt_LT is &lt;20150827-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183752" version="1" comment="myspell-lv_LV is &lt;20150827-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183753" version="1" comment="myspell-nl_NL is &lt;20150827-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183754" version="1" comment="myspell-no is &lt;20150827-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183755" version="1" comment="myspell-pl_PL is &lt;20150827-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183756" version="1" comment="myspell-pt_BR is &lt;20150827-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183757" version="1" comment="myspell-pt_PT is &lt;20150827-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183758" version="1" comment="myspell-ro is &lt;20150827-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183759" version="1" comment="myspell-ru_RU is &lt;20150827-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183760" version="1" comment="myspell-sk_SK is &lt;20150827-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183761" version="1" comment="myspell-sl_SI is &lt;20150827-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183762" version="1" comment="myspell-sr is &lt;20150827-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183763" version="1" comment="myspell-sv_SE is &lt;20150827-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183764" version="1" comment="myspell-te_IN is &lt;20150827-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183765" version="1" comment="myspell-th_TH is &lt;20150827-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183766" version="1" comment="myspell-vi is &lt;20150827-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183767" version="1" comment="myspell-zu_ZA is &lt;20150827-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183768" version="1" comment="xen is &lt;4.4.1_08-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183769" version="1" comment="xen-kmp-default is &lt;4.4.1_08_k3.12.28_4-5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183770" version="1" comment="xen-libs is &lt;4.4.1_08-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183771" version="1" comment="xen-libs-32bit is &lt;4.4.1_08-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183772" version="1" comment="MozillaFirefox-branding-SLE is &lt;31.0-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183773" version="1" comment="wireshark is &lt;1.10.12-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183774" version="1" comment="libsndfile is &lt;1.0.25-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183775" version="1" comment="libpng12 is &lt;1.2.50-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183776" version="1" comment="libpng12-0 is &lt;1.2.50-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183777" version="1" comment="libpng12-0-32bit is &lt;1.2.50-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183778" version="1" comment="libpng16 is &lt;1.6.8-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183779" version="1" comment="libpng16-16 is &lt;1.6.8-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183780" version="1" comment="libpng16-16-32bit is &lt;1.6.8-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183781" version="1" comment="libksba is &lt;1.3.0-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183782" version="1" comment="libksba8 is &lt;1.3.0-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183783" version="1" comment="dracut is &lt;037-51.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183784" version="1" comment="qemu is &lt;2.0.2-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183785" version="1" comment="qemu-block-curl is &lt;2.0.2-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183786" version="1" comment="qemu-ipxe is &lt;1.0.0-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183787" version="1" comment="qemu-kvm is &lt;2.0.2-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183788" version="1" comment="qemu-seabios is &lt;1.7.4-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183789" version="1" comment="qemu-sgabios is &lt;8-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183790" version="1" comment="qemu-tools is &lt;2.0.2-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183791" version="1" comment="qemu-vgabios is &lt;1.7.4-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183792" version="1" comment="qemu-x86 is &lt;2.0.2-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183793" version="1" comment="LibVNCServer is &lt;0.9.9-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183794" version="1" comment="sblim-sfcb is &lt;1.4.8-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183795" version="1" comment="libdcerpc-binding0 is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183796" version="1" comment="libdcerpc-binding0-32bit is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183797" version="1" comment="libdcerpc0 is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183798" version="1" comment="libdcerpc0-32bit is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183799" version="1" comment="libgensec0 is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183800" version="1" comment="libgensec0-32bit is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183801" version="1" comment="libndr-krb5pac0 is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183802" version="1" comment="libndr-krb5pac0-32bit is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183803" version="1" comment="libndr-nbt0 is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183804" version="1" comment="libndr-nbt0-32bit is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183805" version="1" comment="libndr-standard0 is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183806" version="1" comment="libndr-standard0-32bit is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183807" version="1" comment="libndr0 is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183808" version="1" comment="libndr0-32bit is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183809" version="1" comment="libnetapi0 is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183810" version="1" comment="libnetapi0-32bit is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183811" version="1" comment="libpdb0 is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183812" version="1" comment="libpdb0-32bit is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183813" version="1" comment="libregistry0 is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183814" version="1" comment="libsamba-credentials0 is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183815" version="1" comment="libsamba-credentials0-32bit is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183816" version="1" comment="libsamba-hostconfig0 is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183817" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183818" version="1" comment="libsamba-util0 is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183819" version="1" comment="libsamba-util0-32bit is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183820" version="1" comment="libsamdb0 is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183821" version="1" comment="libsamdb0-32bit is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183822" version="1" comment="libsmbclient-raw0 is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183823" version="1" comment="libsmbclient-raw0-32bit is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183824" version="1" comment="libsmbclient0 is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183825" version="1" comment="libsmbclient0-32bit is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183826" version="1" comment="libsmbconf0 is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183827" version="1" comment="libsmbconf0-32bit is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183828" version="1" comment="libsmbldap0 is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183829" version="1" comment="libsmbldap0-32bit is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183830" version="1" comment="libtevent-util0 is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183831" version="1" comment="libtevent-util0-32bit is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183832" version="1" comment="libwbclient0 is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183833" version="1" comment="libwbclient0-32bit is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183834" version="1" comment="samba is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183835" version="1" comment="samba-32bit is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183836" version="1" comment="samba-client is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183837" version="1" comment="samba-client-32bit is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183838" version="1" comment="samba-doc is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183839" version="1" comment="samba-libs is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183840" version="1" comment="samba-libs-32bit is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183841" version="1" comment="samba-winbind is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183842" version="1" comment="samba-winbind-32bit is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183843" version="1" comment="kernel-default is &lt;3.12.51-52.31" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183844" version="1" comment="kernel-default-devel is &lt;3.12.51-52.31" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183845" version="1" comment="kernel-default-extra is &lt;3.12.51-52.31" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183846" version="1" comment="kernel-devel is &lt;3.12.51-52.31" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183847" version="1" comment="kernel-macros is &lt;3.12.51-52.31" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183848" version="1" comment="kernel-source is &lt;3.12.51-52.31" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183849" version="1" comment="kernel-syms is &lt;3.12.51-52.31" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183850" version="1" comment="kernel-xen is &lt;3.12.51-52.31" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183851" version="1" comment="kernel-xen-devel is &lt;3.12.51-52.31" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183852" version="1" comment="gdk-pixbuf is &lt;2.30.6-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183853" version="1" comment="gdk-pixbuf-lang is &lt;2.30.6-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183854" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.30.6-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183855" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.30.6-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183856" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.30.6-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183857" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.30.6-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183858" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.30.6-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183859" version="1" comment="libmspack is &lt;0.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183860" version="1" comment="libmspack0 is &lt;0.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183861" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-27.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183862" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-27.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183863" version="1" comment="openssl is &lt;1.0.1i-27.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183864" version="1" comment="flash-player is &lt;11.2.202.554-114" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183865" version="1" comment="flash-player-gnome is &lt;11.2.202.554-114" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183866" version="1" comment="vorbis-tools is &lt;1.4.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183867" version="1" comment="vorbis-tools-lang is &lt;1.4.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183868" version="1" comment="krb5 is &lt;1.12.1-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183869" version="1" comment="krb5-32bit is &lt;1.12.1-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183870" version="1" comment="krb5-client is &lt;1.12.1-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183871" version="1" comment="ldb is &lt;1.1.24-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183872" version="1" comment="libdcerpc-binding0 is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183873" version="1" comment="libdcerpc-binding0-32bit is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183874" version="1" comment="libdcerpc0 is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183875" version="1" comment="libdcerpc0-32bit is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183876" version="1" comment="libgensec0 is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183877" version="1" comment="libgensec0-32bit is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183878" version="1" comment="libldb1 is &lt;1.1.24-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183879" version="1" comment="libldb1-32bit is &lt;1.1.24-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183880" version="1" comment="libndr-krb5pac0 is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183881" version="1" comment="libndr-krb5pac0-32bit is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183882" version="1" comment="libndr-nbt0 is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183883" version="1" comment="libndr-nbt0-32bit is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183884" version="1" comment="libndr-standard0 is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183885" version="1" comment="libndr-standard0-32bit is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183886" version="1" comment="libndr0 is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183887" version="1" comment="libndr0-32bit is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183888" version="1" comment="libnetapi0 is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183889" version="1" comment="libnetapi0-32bit is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183890" version="1" comment="libpdb0 is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183891" version="1" comment="libpdb0-32bit is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183892" version="1" comment="libregistry0 is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183893" version="1" comment="libsamba-credentials0 is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183894" version="1" comment="libsamba-credentials0-32bit is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183895" version="1" comment="libsamba-hostconfig0 is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183896" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183897" version="1" comment="libsamba-util0 is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183898" version="1" comment="libsamba-util0-32bit is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183899" version="1" comment="libsamdb0 is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183900" version="1" comment="libsamdb0-32bit is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183901" version="1" comment="libsmbclient-raw0 is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183902" version="1" comment="libsmbclient-raw0-32bit is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183903" version="1" comment="libsmbclient0 is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183904" version="1" comment="libsmbclient0-32bit is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183905" version="1" comment="libsmbconf0 is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183906" version="1" comment="libsmbconf0-32bit is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183907" version="1" comment="libsmbldap0 is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183908" version="1" comment="libsmbldap0-32bit is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183909" version="1" comment="libtalloc2 is &lt;2.1.5-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183910" version="1" comment="libtalloc2-32bit is &lt;2.1.5-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183911" version="1" comment="libtdb1 is &lt;1.3.8-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183912" version="1" comment="libtdb1-32bit is &lt;1.3.8-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183913" version="1" comment="libtevent-util0 is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183914" version="1" comment="libtevent-util0-32bit is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183915" version="1" comment="libtevent0 is &lt;0.9.26-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183916" version="1" comment="libtevent0-32bit is &lt;0.9.26-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183917" version="1" comment="libwbclient0 is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183918" version="1" comment="libwbclient0-32bit is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183919" version="1" comment="pytalloc is &lt;2.1.5-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183920" version="1" comment="pytalloc-32bit is &lt;2.1.5-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183921" version="1" comment="samba is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183922" version="1" comment="samba-32bit is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183923" version="1" comment="samba-client is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183924" version="1" comment="samba-client-32bit is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183925" version="1" comment="samba-doc is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183926" version="1" comment="samba-libs is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183927" version="1" comment="samba-libs-32bit is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183928" version="1" comment="samba-winbind is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183929" version="1" comment="samba-winbind-32bit is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183930" version="1" comment="talloc is &lt;2.1.5-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183931" version="1" comment="kernel-default is &lt;3.12.60-52.49" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183932" version="1" comment="kernel-default-devel is &lt;3.12.60-52.49" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183933" version="1" comment="kernel-default-extra is &lt;3.12.60-52.49" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183934" version="1" comment="kernel-devel is &lt;3.12.60-52.49" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183935" version="1" comment="kernel-macros is &lt;3.12.60-52.49" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183936" version="1" comment="kernel-source is &lt;3.12.60-52.49" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183937" version="1" comment="kernel-syms is &lt;3.12.60-52.49" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183938" version="1" comment="kernel-xen is &lt;3.12.60-52.49" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183939" version="1" comment="kernel-xen-devel is &lt;3.12.60-52.49" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183940" version="1" comment="dhcp is &lt;4.2.6-14.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183941" version="1" comment="dhcp-client is &lt;4.2.6-14.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183942" version="1" comment="MozillaFirefox is &lt;45.2.0esr-75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183943" version="1" comment="MozillaFirefox-branding-SLE is &lt;45.0-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183944" version="1" comment="MozillaFirefox-translations is &lt;45.2.0esr-75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183945" version="1" comment="kernel-default is &lt;3.12.60-52.54" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183946" version="1" comment="kernel-default-devel is &lt;3.12.60-52.54" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183947" version="1" comment="kernel-default-extra is &lt;3.12.60-52.54" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183948" version="1" comment="kernel-devel is &lt;3.12.60-52.54" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183949" version="1" comment="kernel-macros is &lt;3.12.60-52.54" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183950" version="1" comment="kernel-source is &lt;3.12.60-52.54" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183951" version="1" comment="kernel-syms is &lt;3.12.60-52.54" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183952" version="1" comment="kernel-xen is &lt;3.12.60-52.54" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183953" version="1" comment="kernel-xen-devel is &lt;3.12.60-52.54" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183954" version="1" comment="glibc is &lt;2.19-22.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183955" version="1" comment="glibc-32bit is &lt;2.19-22.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183956" version="1" comment="glibc-devel is &lt;2.19-22.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183957" version="1" comment="glibc-devel-32bit is &lt;2.19-22.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183958" version="1" comment="glibc-i18ndata is &lt;2.19-22.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183959" version="1" comment="glibc-locale is &lt;2.19-22.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183960" version="1" comment="glibc-locale-32bit is &lt;2.19-22.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183961" version="1" comment="nscd is &lt;2.19-22.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183962" version="1" comment="boost is &lt;1.54.0-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183963" version="1" comment="boost-license1_54_0 is &lt;1.54.0-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183964" version="1" comment="cmis-client is &lt;0.5.1-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183965" version="1" comment="hunspell is &lt;1.3.2-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183966" version="1" comment="hunspell-32bit is &lt;1.3.2-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183967" version="1" comment="hunspell-tools is &lt;1.3.2-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183968" version="1" comment="hyphen is &lt;2.8.8-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183969" version="1" comment="libOpenCOLLADA0 is &lt;1_3335ac1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183970" version="1" comment="libboost_atomic1_54_0 is &lt;1.54.0-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183971" version="1" comment="libboost_date_time1_54_0 is &lt;1.54.0-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183972" version="1" comment="libboost_filesystem1_54_0 is &lt;1.54.0-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183973" version="1" comment="libboost_iostreams1_54_0 is &lt;1.54.0-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183974" version="1" comment="libboost_program_options1_54_0 is &lt;1.54.0-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183975" version="1" comment="libboost_regex1_54_0 is &lt;1.54.0-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183976" version="1" comment="libboost_signals1_54_0 is &lt;1.54.0-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183977" version="1" comment="libboost_system1_54_0 is &lt;1.54.0-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183978" version="1" comment="libboost_thread1_54_0 is &lt;1.54.0-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183979" version="1" comment="libcmis-0_5-5 is &lt;0.5.1-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183980" version="1" comment="libetonyek is &lt;0.1.6-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183981" version="1" comment="libetonyek-0_1-1 is &lt;0.1.6-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183982" version="1" comment="libhyphen0 is &lt;2.8.8-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183983" version="1" comment="libixion is &lt;0.11.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183984" version="1" comment="libixion-0_11-0 is &lt;0.11.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183985" version="1" comment="liborcus is &lt;0.11.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183986" version="1" comment="liborcus-0_11-0 is &lt;0.11.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183987" version="1" comment="libreoffice-base is &lt;5.1.3.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183988" version="1" comment="libreoffice-base-drivers-mysql is &lt;5.1.3.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183989" version="1" comment="libreoffice-base-drivers-postgresql is &lt;5.1.3.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183990" version="1" comment="libreoffice-calc is &lt;5.1.3.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183991" version="1" comment="libreoffice-calc-extensions is &lt;5.1.3.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183992" version="1" comment="libreoffice-draw is &lt;5.1.3.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183993" version="1" comment="libreoffice-filters-optional is &lt;5.1.3.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183994" version="1" comment="libreoffice-gnome is &lt;5.1.3.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183995" version="1" comment="libreoffice-icon-theme-galaxy is &lt;5.1.3.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183996" version="1" comment="libreoffice-icon-theme-tango is &lt;5.1.3.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183997" version="1" comment="libreoffice-impress is &lt;5.1.3.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183998" version="1" comment="libreoffice-l10n-af is &lt;5.1.3.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009183999" version="1" comment="libreoffice-l10n-ar is &lt;5.1.3.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184000" version="1" comment="libreoffice-l10n-ca is &lt;5.1.3.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184001" version="1" comment="libreoffice-l10n-cs is &lt;5.1.3.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184002" version="1" comment="libreoffice-l10n-da is &lt;5.1.3.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184003" version="1" comment="libreoffice-l10n-de is &lt;5.1.3.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184004" version="1" comment="libreoffice-l10n-en is &lt;5.1.3.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184005" version="1" comment="libreoffice-l10n-es is &lt;5.1.3.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184006" version="1" comment="libreoffice-l10n-fi is &lt;5.1.3.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184007" version="1" comment="libreoffice-l10n-fr is &lt;5.1.3.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184008" version="1" comment="libreoffice-l10n-gu is &lt;5.1.3.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184009" version="1" comment="libreoffice-l10n-hi is &lt;5.1.3.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184010" version="1" comment="libreoffice-l10n-hu is &lt;5.1.3.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184011" version="1" comment="libreoffice-l10n-it is &lt;5.1.3.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184012" version="1" comment="libreoffice-l10n-ja is &lt;5.1.3.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184013" version="1" comment="libreoffice-l10n-ko is &lt;5.1.3.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184014" version="1" comment="libreoffice-l10n-nb is &lt;5.1.3.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184015" version="1" comment="libreoffice-l10n-nl is &lt;5.1.3.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184016" version="1" comment="libreoffice-l10n-nn is &lt;5.1.3.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184017" version="1" comment="libreoffice-l10n-pl is &lt;5.1.3.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184018" version="1" comment="libreoffice-l10n-pt-BR is &lt;5.1.3.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184019" version="1" comment="libreoffice-l10n-pt-PT is &lt;5.1.3.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184020" version="1" comment="libreoffice-l10n-ru is &lt;5.1.3.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184021" version="1" comment="libreoffice-l10n-sk is &lt;5.1.3.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184022" version="1" comment="libreoffice-l10n-sv is &lt;5.1.3.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184023" version="1" comment="libreoffice-l10n-xh is &lt;5.1.3.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184024" version="1" comment="libreoffice-l10n-zh-Hans is &lt;5.1.3.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184025" version="1" comment="libreoffice-l10n-zh-Hant is &lt;5.1.3.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184026" version="1" comment="libreoffice-l10n-zu is &lt;5.1.3.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184027" version="1" comment="libreoffice-mailmerge is &lt;5.1.3.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184028" version="1" comment="libreoffice-math is &lt;5.1.3.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184029" version="1" comment="libreoffice-officebean is &lt;5.1.3.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184030" version="1" comment="libreoffice-pyuno is &lt;5.1.3.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184031" version="1" comment="libreoffice-writer is &lt;5.1.3.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184032" version="1" comment="libreoffice-writer-extensions is &lt;5.1.3.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184033" version="1" comment="libvisio is &lt;0.1.5-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184034" version="1" comment="libvisio-0_1-1 is &lt;0.1.5-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184035" version="1" comment="libwps is &lt;0.4.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184036" version="1" comment="libwps-0_4-4 is &lt;0.4.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184037" version="1" comment="myspell-af_NA is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184038" version="1" comment="myspell-af_ZA is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184039" version="1" comment="myspell-ar is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184040" version="1" comment="myspell-ar_AE is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184041" version="1" comment="myspell-ar_BH is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184042" version="1" comment="myspell-ar_DZ is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184043" version="1" comment="myspell-ar_EG is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184044" version="1" comment="myspell-ar_IQ is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184045" version="1" comment="myspell-ar_JO is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184046" version="1" comment="myspell-ar_KW is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184047" version="1" comment="myspell-ar_LB is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184048" version="1" comment="myspell-ar_LY is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184049" version="1" comment="myspell-ar_MA is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184050" version="1" comment="myspell-ar_OM is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184051" version="1" comment="myspell-ar_QA is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184052" version="1" comment="myspell-ar_SA is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184053" version="1" comment="myspell-ar_SD is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184054" version="1" comment="myspell-ar_SY is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184055" version="1" comment="myspell-ar_TN is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184056" version="1" comment="myspell-ar_YE is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184057" version="1" comment="myspell-be_BY is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184058" version="1" comment="myspell-bg_BG is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184059" version="1" comment="myspell-bn_BD is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184060" version="1" comment="myspell-bn_IN is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184061" version="1" comment="myspell-bs is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184062" version="1" comment="myspell-bs_BA is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184063" version="1" comment="myspell-ca is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184064" version="1" comment="myspell-ca_AD is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184065" version="1" comment="myspell-ca_ES is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184066" version="1" comment="myspell-ca_ES_valencia is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184067" version="1" comment="myspell-ca_FR is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184068" version="1" comment="myspell-ca_IT is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184069" version="1" comment="myspell-cs_CZ is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184070" version="1" comment="myspell-da_DK is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184071" version="1" comment="myspell-de is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184072" version="1" comment="myspell-de_AT is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184073" version="1" comment="myspell-de_CH is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184074" version="1" comment="myspell-de_DE is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184075" version="1" comment="myspell-dictionaries is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184076" version="1" comment="myspell-el_GR is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184077" version="1" comment="myspell-en is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184078" version="1" comment="myspell-en_AU is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184079" version="1" comment="myspell-en_BS is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184080" version="1" comment="myspell-en_BZ is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184081" version="1" comment="myspell-en_CA is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184082" version="1" comment="myspell-en_GB is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184083" version="1" comment="myspell-en_GH is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184084" version="1" comment="myspell-en_IE is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184085" version="1" comment="myspell-en_IN is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184086" version="1" comment="myspell-en_JM is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184087" version="1" comment="myspell-en_MW is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184088" version="1" comment="myspell-en_NA is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184089" version="1" comment="myspell-en_NZ is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184090" version="1" comment="myspell-en_PH is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184091" version="1" comment="myspell-en_TT is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184092" version="1" comment="myspell-en_US is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184093" version="1" comment="myspell-en_ZA is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184094" version="1" comment="myspell-en_ZW is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184095" version="1" comment="myspell-es is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184096" version="1" comment="myspell-es_AR is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184097" version="1" comment="myspell-es_BO is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184098" version="1" comment="myspell-es_CL is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184099" version="1" comment="myspell-es_CO is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184100" version="1" comment="myspell-es_CR is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184101" version="1" comment="myspell-es_CU is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184102" version="1" comment="myspell-es_DO is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184103" version="1" comment="myspell-es_EC is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184104" version="1" comment="myspell-es_ES is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184105" version="1" comment="myspell-es_GT is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184106" version="1" comment="myspell-es_HN is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184107" version="1" comment="myspell-es_MX is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184108" version="1" comment="myspell-es_NI is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184109" version="1" comment="myspell-es_PA is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184110" version="1" comment="myspell-es_PE is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184111" version="1" comment="myspell-es_PR is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184112" version="1" comment="myspell-es_PY is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184113" version="1" comment="myspell-es_SV is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184114" version="1" comment="myspell-es_UY is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184115" version="1" comment="myspell-es_VE is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184116" version="1" comment="myspell-et_EE is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184117" version="1" comment="myspell-fr_BE is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184118" version="1" comment="myspell-fr_CA is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184119" version="1" comment="myspell-fr_CH is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184120" version="1" comment="myspell-fr_FR is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184121" version="1" comment="myspell-fr_LU is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184122" version="1" comment="myspell-fr_MC is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184123" version="1" comment="myspell-gu_IN is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184124" version="1" comment="myspell-he_IL is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184125" version="1" comment="myspell-hi_IN is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184126" version="1" comment="myspell-hr_HR is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184127" version="1" comment="myspell-hu_HU is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184128" version="1" comment="myspell-it_IT is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184129" version="1" comment="myspell-lightproof-en is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184130" version="1" comment="myspell-lightproof-hu_HU is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184131" version="1" comment="myspell-lightproof-pt_BR is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184132" version="1" comment="myspell-lightproof-ru_RU is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184133" version="1" comment="myspell-lo_LA is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184134" version="1" comment="myspell-lt_LT is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184135" version="1" comment="myspell-lv_LV is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184136" version="1" comment="myspell-nb_NO is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184137" version="1" comment="myspell-nl_BE is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184138" version="1" comment="myspell-nl_NL is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184139" version="1" comment="myspell-nn_NO is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184140" version="1" comment="myspell-no is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184141" version="1" comment="myspell-pl_PL is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184142" version="1" comment="myspell-pt_AO is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184143" version="1" comment="myspell-pt_BR is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184144" version="1" comment="myspell-pt_PT is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184145" version="1" comment="myspell-ro is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184146" version="1" comment="myspell-ro_RO is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184147" version="1" comment="myspell-ru_RU is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184148" version="1" comment="myspell-sk_SK is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184149" version="1" comment="myspell-sl_SI is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184150" version="1" comment="myspell-sr is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184151" version="1" comment="myspell-sr_CS is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184152" version="1" comment="myspell-sr_Latn_CS is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184153" version="1" comment="myspell-sr_Latn_RS is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184154" version="1" comment="myspell-sr_RS is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184155" version="1" comment="myspell-sv_FI is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184156" version="1" comment="myspell-sv_SE is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184157" version="1" comment="myspell-te is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184158" version="1" comment="myspell-te_IN is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184159" version="1" comment="myspell-th_TH is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184160" version="1" comment="myspell-vi is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184161" version="1" comment="myspell-vi_VN is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184162" version="1" comment="myspell-zu_ZA is &lt;20160511-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184163" version="1" comment="openCOLLADA is &lt;1_3335ac1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184164" version="1" comment="libtiff5 is &lt;4.0.6-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184165" version="1" comment="libtiff5-32bit is &lt;4.0.6-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184166" version="1" comment="tiff is &lt;4.0.6-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184167" version="1" comment="kernel-default is &lt;3.12.51-52.34" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184168" version="1" comment="kernel-default-devel is &lt;3.12.51-52.34" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184169" version="1" comment="kernel-default-extra is &lt;3.12.51-52.34" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184170" version="1" comment="kernel-devel is &lt;3.12.51-52.34" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184171" version="1" comment="kernel-macros is &lt;3.12.51-52.34" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184172" version="1" comment="kernel-source is &lt;3.12.51-52.34" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184173" version="1" comment="kernel-syms is &lt;3.12.51-52.34" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184174" version="1" comment="kernel-xen is &lt;3.12.51-52.34" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184175" version="1" comment="kernel-xen-devel is &lt;3.12.51-52.34" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184176" version="1" comment="qemu is &lt;2.0.2-48.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184177" version="1" comment="qemu-block-curl is &lt;2.0.2-48.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184178" version="1" comment="qemu-ipxe is &lt;1.0.0-48.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184179" version="1" comment="qemu-kvm is &lt;2.0.2-48.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184180" version="1" comment="qemu-seabios is &lt;1.7.4-48.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184181" version="1" comment="qemu-sgabios is &lt;8-48.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184182" version="1" comment="qemu-tools is &lt;2.0.2-48.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184183" version="1" comment="qemu-vgabios is &lt;1.7.4-48.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184184" version="1" comment="qemu-x86 is &lt;2.0.2-48.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184185" version="1" comment="rsync is &lt;3.1.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184186" version="1" comment="libxml2 is &lt;2.9.1-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184187" version="1" comment="libxml2-2 is &lt;2.9.1-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184188" version="1" comment="libxml2-2-32bit is &lt;2.9.1-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184189" version="1" comment="libxml2-tools is &lt;2.9.1-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184190" version="1" comment="python-libxml2 is &lt;2.9.1-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184191" version="1" comment="bind is &lt;9.9.6P1-28.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184192" version="1" comment="bind-libs is &lt;9.9.6P1-28.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184193" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-28.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184194" version="1" comment="bind-utils is &lt;9.9.6P1-28.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184195" version="1" comment="giflib is &lt;5.0.5-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184196" version="1" comment="libgif6 is &lt;5.0.5-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184197" version="1" comment="libgif6-32bit is &lt;5.0.5-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184198" version="1" comment="kernel-default is &lt;3.12.51-52.39" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184199" version="1" comment="kernel-default-devel is &lt;3.12.51-52.39" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184200" version="1" comment="kernel-default-extra is &lt;3.12.51-52.39" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184201" version="1" comment="kernel-devel is &lt;3.12.51-52.39" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184202" version="1" comment="kernel-macros is &lt;3.12.51-52.39" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184203" version="1" comment="kernel-source is &lt;3.12.51-52.39" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184204" version="1" comment="kernel-syms is &lt;3.12.51-52.39" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184205" version="1" comment="kernel-xen is &lt;3.12.51-52.39" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184206" version="1" comment="kernel-xen-devel is &lt;3.12.51-52.39" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184207" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184208" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184209" version="1" comment="openldap2-client is &lt;2.4.41-18.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184210" version="1" comment="gdk-pixbuf is &lt;2.30.6-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184211" version="1" comment="gdk-pixbuf-lang is &lt;2.30.6-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184212" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.30.6-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184213" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.30.6-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184214" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.30.6-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184215" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.30.6-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184216" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.30.6-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184217" version="1" comment="libpng16 is &lt;1.6.8-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184218" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.95-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184219" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.95-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184220" version="1" comment="libvirt is &lt;1.2.5-27.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184221" version="1" comment="libvirt-client is &lt;1.2.5-27.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184222" version="1" comment="libvirt-client-32bit is &lt;1.2.5-27.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184223" version="1" comment="libvirt-daemon is &lt;1.2.5-27.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184224" version="1" comment="libvirt-daemon-config-network is &lt;1.2.5-27.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184225" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.2.5-27.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184226" version="1" comment="libvirt-daemon-driver-interface is &lt;1.2.5-27.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184227" version="1" comment="libvirt-daemon-driver-libxl is &lt;1.2.5-27.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184228" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.2.5-27.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184229" version="1" comment="libvirt-daemon-driver-network is &lt;1.2.5-27.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184230" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.2.5-27.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184231" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.2.5-27.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184232" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.2.5-27.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184233" version="1" comment="libvirt-daemon-driver-secret is &lt;1.2.5-27.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184234" version="1" comment="libvirt-daemon-driver-storage is &lt;1.2.5-27.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184235" version="1" comment="libvirt-daemon-lxc is &lt;1.2.5-27.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184236" version="1" comment="libvirt-daemon-qemu is &lt;1.2.5-27.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184237" version="1" comment="libvirt-daemon-xen is &lt;1.2.5-27.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184238" version="1" comment="libvirt-doc is &lt;1.2.5-27.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184239" version="1" comment="MozillaFirefox is &lt;38.6.0esr-57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184240" version="1" comment="MozillaFirefox-branding-SLE is &lt;31.0-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184241" version="1" comment="MozillaFirefox-translations is &lt;38.6.0esr-57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184242" version="1" comment="libfreebl3 is &lt;3.20.2-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184243" version="1" comment="libfreebl3-32bit is &lt;3.20.2-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184244" version="1" comment="libsoftokn3 is &lt;3.20.2-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184245" version="1" comment="libsoftokn3-32bit is &lt;3.20.2-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184246" version="1" comment="mozilla-nss is &lt;3.20.2-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184247" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184248" version="1" comment="mozilla-nss-certs is &lt;3.20.2-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184249" version="1" comment="mozilla-nss-certs-32bit is &lt;3.20.2-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184250" version="1" comment="mozilla-nss-sysinit is &lt;3.20.2-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184251" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.20.2-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184252" version="1" comment="mozilla-nss-tools is &lt;3.20.2-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184253" version="1" comment="libmspack is &lt;0.4-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184254" version="1" comment="curl is &lt;7.37.0-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184255" version="1" comment="libcurl4 is &lt;7.37.0-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184256" version="1" comment="libcurl4-32bit is &lt;7.37.0-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184257" version="1" comment="flash-player is &lt;11.2.202.569-120" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184258" version="1" comment="flash-player-gnome is &lt;11.2.202.569-120" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184259" version="1" comment="krb5 is &lt;1.12.1-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184260" version="1" comment="krb5-32bit is &lt;1.12.1-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184261" version="1" comment="krb5-client is &lt;1.12.1-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184262" version="1" comment="libnettle is &lt;2.7.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184263" version="1" comment="glibc is &lt;2.19-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184264" version="1" comment="glibc-32bit is &lt;2.19-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184265" version="1" comment="glibc-devel is &lt;2.19-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184266" version="1" comment="glibc-devel-32bit is &lt;2.19-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184267" version="1" comment="glibc-i18ndata is &lt;2.19-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184268" version="1" comment="glibc-locale is &lt;2.19-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184269" version="1" comment="glibc-locale-32bit is &lt;2.19-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184270" version="1" comment="nscd is &lt;2.19-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184271" version="1" comment="postgresql93 is &lt;9.3.11-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184272" version="1" comment="dhcp is &lt;4.2.6-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184273" version="1" comment="dhcp-client is &lt;4.2.6-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184274" version="1" comment="libecpg6 is &lt;9.4.6-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184275" version="1" comment="libpq5 is &lt;9.4.6-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184276" version="1" comment="libpq5-32bit is &lt;9.4.6-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184277" version="1" comment="postgresql94 is &lt;9.4.6-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184278" version="1" comment="postgresql94-libs is &lt;9.4.6-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184279" version="1" comment="MozillaFirefox is &lt;38.6.1esr-60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184280" version="1" comment="MozillaFirefox-translations is &lt;38.6.1esr-60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184281" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-27.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184282" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-27.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184283" version="1" comment="openssl is &lt;1.0.1i-27.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184284" version="1" comment="libssh is &lt;0.6.3-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184285" version="1" comment="compat-openssl098 is &lt;0.9.8j-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184286" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184287" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184288" version="1" comment="libpng12 is &lt;1.2.50-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184289" version="1" comment="libxml2 is &lt;2.9.1-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184290" version="1" comment="libxml2-2 is &lt;2.9.1-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184291" version="1" comment="libxml2-2-32bit is &lt;2.9.1-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184292" version="1" comment="libxml2-tools is &lt;2.9.1-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184293" version="1" comment="python-libxml2 is &lt;2.9.1-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184294" version="1" comment="libotr is &lt;4.0.0-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184295" version="1" comment="flash-player is &lt;11.2.202.577-123" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184296" version="1" comment="flash-player-gnome is &lt;11.2.202.577-123" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184297" version="1" comment="libssh2-1 is &lt;1.4.3-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184298" version="1" comment="libssh2-1-32bit is &lt;1.4.3-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184299" version="1" comment="libssh2_org is &lt;1.4.3-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184300" version="1" comment="MozillaFirefox is &lt;38.7.0esr-63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184301" version="1" comment="MozillaFirefox-translations is &lt;38.7.0esr-63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184302" version="1" comment="libfreebl3 is &lt;3.20.2-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184303" version="1" comment="libfreebl3-32bit is &lt;3.20.2-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184304" version="1" comment="libsoftokn3 is &lt;3.20.2-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184305" version="1" comment="libsoftokn3-32bit is &lt;3.20.2-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184306" version="1" comment="mozilla-nspr is &lt;4.12-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184307" version="1" comment="mozilla-nspr-32bit is &lt;4.12-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184308" version="1" comment="mozilla-nss is &lt;3.20.2-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184309" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184310" version="1" comment="mozilla-nss-certs is &lt;3.20.2-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184311" version="1" comment="mozilla-nss-certs-32bit is &lt;3.20.2-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184312" version="1" comment="mozilla-nss-sysinit is &lt;3.20.2-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184313" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.20.2-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184314" version="1" comment="mozilla-nss-tools is &lt;3.20.2-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184315" version="1" comment="graphite2 is &lt;1.3.1-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184316" version="1" comment="bind is &lt;9.9.6P1-28.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184317" version="1" comment="bind-libs is &lt;9.9.6P1-28.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184318" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-28.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184319" version="1" comment="bind-utils is &lt;9.9.6P1-28.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184320" version="1" comment="kernel-default is &lt;3.12.55-52.42" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184321" version="1" comment="kernel-default-devel is &lt;3.12.55-52.42" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184322" version="1" comment="kernel-default-extra is &lt;3.12.55-52.42" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184323" version="1" comment="kernel-devel is &lt;3.12.55-52.42" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184324" version="1" comment="kernel-macros is &lt;3.12.55-52.42" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184325" version="1" comment="kernel-source is &lt;3.12.55-52.42" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184326" version="1" comment="kernel-syms is &lt;3.12.55-52.42" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184327" version="1" comment="kernel-xen is &lt;3.12.55-52.42" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184328" version="1" comment="kernel-xen-devel is &lt;3.12.55-52.42" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184329" version="1" comment="libdcerpc-binding0 is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184330" version="1" comment="libdcerpc-binding0-32bit is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184331" version="1" comment="libdcerpc0 is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184332" version="1" comment="libdcerpc0-32bit is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184333" version="1" comment="libgensec0 is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184334" version="1" comment="libgensec0-32bit is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184335" version="1" comment="libndr-krb5pac0 is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184336" version="1" comment="libndr-krb5pac0-32bit is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184337" version="1" comment="libndr-nbt0 is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184338" version="1" comment="libndr-nbt0-32bit is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184339" version="1" comment="libndr-standard0 is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184340" version="1" comment="libndr-standard0-32bit is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184341" version="1" comment="libndr0 is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184342" version="1" comment="libndr0-32bit is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184343" version="1" comment="libnetapi0 is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184344" version="1" comment="libnetapi0-32bit is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184345" version="1" comment="libpdb0 is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184346" version="1" comment="libpdb0-32bit is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184347" version="1" comment="libregistry0 is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184348" version="1" comment="libsamba-credentials0 is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184349" version="1" comment="libsamba-credentials0-32bit is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184350" version="1" comment="libsamba-hostconfig0 is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184351" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184352" version="1" comment="libsamba-util0 is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184353" version="1" comment="libsamba-util0-32bit is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184354" version="1" comment="libsamdb0 is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184355" version="1" comment="libsamdb0-32bit is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184356" version="1" comment="libsmbclient-raw0 is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184357" version="1" comment="libsmbclient-raw0-32bit is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184358" version="1" comment="libsmbclient0 is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184359" version="1" comment="libsmbclient0-32bit is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184360" version="1" comment="libsmbconf0 is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184361" version="1" comment="libsmbconf0-32bit is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184362" version="1" comment="libsmbldap0 is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184363" version="1" comment="libsmbldap0-32bit is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184364" version="1" comment="libtevent-util0 is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184365" version="1" comment="libtevent-util0-32bit is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184366" version="1" comment="libwbclient0 is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184367" version="1" comment="libwbclient0-32bit is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184368" version="1" comment="samba is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184369" version="1" comment="samba-32bit is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184370" version="1" comment="samba-client is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184371" version="1" comment="samba-client-32bit is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184372" version="1" comment="samba-doc is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184373" version="1" comment="samba-libs is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184374" version="1" comment="samba-libs-32bit is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184375" version="1" comment="samba-winbind is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184376" version="1" comment="samba-winbind-32bit is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184377" version="1" comment="libqt4-sql-plugins is &lt;4.8.6-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184378" version="1" comment="pidgin-otr is &lt;4.0.0-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184379" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.99-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184380" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.99-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184381" version="1" comment="libatomic1 is &lt;5.3.1+r233831-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184382" version="1" comment="libatomic1-32bit is &lt;5.3.1+r233831-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184383" version="1" comment="libcilkrts5 is &lt;5.3.1+r233831-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184384" version="1" comment="libcilkrts5-32bit is &lt;5.3.1+r233831-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184385" version="1" comment="libffi-gcc5 is &lt;5.3.1+r233831-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184386" version="1" comment="libgcc_s1 is &lt;5.3.1+r233831-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184387" version="1" comment="libgcc_s1-32bit is &lt;5.3.1+r233831-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184388" version="1" comment="libgfortran3 is &lt;5.3.1+r233831-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184389" version="1" comment="libgfortran3-32bit is &lt;5.3.1+r233831-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184390" version="1" comment="libgomp1 is &lt;5.3.1+r233831-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184391" version="1" comment="libgomp1-32bit is &lt;5.3.1+r233831-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184392" version="1" comment="libitm1 is &lt;5.3.1+r233831-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184393" version="1" comment="libitm1-32bit is &lt;5.3.1+r233831-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184394" version="1" comment="liblsan0 is &lt;5.3.1+r233831-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184395" version="1" comment="libquadmath0 is &lt;5.3.1+r233831-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184396" version="1" comment="libquadmath0-32bit is &lt;5.3.1+r233831-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184397" version="1" comment="libstdc++6 is &lt;5.3.1+r233831-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184398" version="1" comment="libstdc++6-32bit is &lt;5.3.1+r233831-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184399" version="1" comment="libstdc++6-locale is &lt;5.3.1+r233831-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184400" version="1" comment="libtsan0 is &lt;5.3.1+r233831-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184401" version="1" comment="libubsan0 is &lt;5.3.1+r233831-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184402" version="1" comment="libubsan0-32bit is &lt;5.3.1+r233831-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184403" version="1" comment="flash-player is &lt;11.2.202.616-126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184404" version="1" comment="flash-player-gnome is &lt;11.2.202.616-126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184405" version="1" comment="krb5 is &lt;1.12.1-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184406" version="1" comment="krb5-32bit is &lt;1.12.1-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184407" version="1" comment="krb5-client is &lt;1.12.1-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184408" version="1" comment="python-backports.ssl_match_hostname is &lt;3.4.0.2-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184409" version="1" comment="python-tornado is &lt;4.2.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184410" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184411" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184412" version="1" comment="libdcerpc0 is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184413" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184414" version="1" comment="libgensec0 is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184415" version="1" comment="libgensec0-32bit is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184416" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184417" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184418" version="1" comment="libndr-nbt0 is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184419" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184420" version="1" comment="libndr-standard0 is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184421" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184422" version="1" comment="libndr0 is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184423" version="1" comment="libndr0-32bit is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184424" version="1" comment="libnetapi0 is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184425" version="1" comment="libnetapi0-32bit is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184426" version="1" comment="libregistry0 is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184427" version="1" comment="libsamba-credentials0 is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184428" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184429" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184430" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184431" version="1" comment="libsamba-passdb0 is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184432" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184433" version="1" comment="libsamba-util0 is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184434" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184435" version="1" comment="libsamdb0 is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184436" version="1" comment="libsamdb0-32bit is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184437" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184438" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184439" version="1" comment="libsmbclient0 is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184440" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184441" version="1" comment="libsmbconf0 is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184442" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184443" version="1" comment="libsmbldap0 is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184444" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184445" version="1" comment="libtevent-util0 is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184446" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184447" version="1" comment="libwbclient0 is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184448" version="1" comment="libwbclient0-32bit is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184449" version="1" comment="samba is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184450" version="1" comment="samba-32bit is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184451" version="1" comment="samba-client is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184452" version="1" comment="samba-client-32bit is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184453" version="1" comment="samba-doc is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184454" version="1" comment="samba-libs is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184455" version="1" comment="samba-libs-32bit is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184456" version="1" comment="samba-winbind is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184457" version="1" comment="samba-winbind-32bit is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184458" version="1" comment="libxerces-c-3_1 is &lt;3.1.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184459" version="1" comment="libxerces-c-3_1-32bit is &lt;3.1.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184460" version="1" comment="xerces-c is &lt;3.1.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184461" version="1" comment="libgcrypt is &lt;1.6.1-16.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184462" version="1" comment="libgcrypt20 is &lt;1.6.1-16.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184463" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184464" version="1" comment="cairo is &lt;1.12.16-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184465" version="1" comment="libcairo-gobject2 is &lt;1.12.16-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184466" version="1" comment="libcairo-gobject2-32bit is &lt;1.12.16-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184467" version="1" comment="libcairo2 is &lt;1.12.16-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184468" version="1" comment="libcairo2-32bit is &lt;1.12.16-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184469" version="1" comment="giflib is &lt;5.0.5-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184470" version="1" comment="libxml2 is &lt;2.9.1-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184471" version="1" comment="libxml2-2 is &lt;2.9.1-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184472" version="1" comment="libxml2-2-32bit is &lt;2.9.1-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184473" version="1" comment="libxml2-tools is &lt;2.9.1-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184474" version="1" comment="python-libxml2 is &lt;2.9.1-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184475" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-27.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184476" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-27.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184477" version="1" comment="openssl is &lt;1.0.1i-27.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184478" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.101-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184479" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.101-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184480" version="1" comment="ntp is &lt;4.2.8p6-46.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184481" version="1" comment="ntp-doc is &lt;4.2.8p6-46.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184482" version="1" comment="yast2-ntp-client is &lt;3.1.12.4-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184483" version="1" comment="MozillaFirefox is &lt;38.8.0esr-66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184484" version="1" comment="MozillaFirefox-translations is &lt;38.8.0esr-66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184485" version="1" comment="ImageMagick is &lt;6.8.8.1-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184486" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184487" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184488" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184489" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184490" version="1" comment="compat-openssl098 is &lt;0.9.8j-97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184491" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184492" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184493" version="1" comment="wireshark is &lt;1.12.9-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184494" version="1" comment="flash-player is &lt;11.2.202.621-130" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184495" version="1" comment="flash-player-gnome is &lt;11.2.202.621-130" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184496" version="1" comment="xen is &lt;4.4.4_02-22.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184497" version="1" comment="xen-kmp-default is &lt;4.4.4_02_k3.12.55_52.42-22.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184498" version="1" comment="xen-libs is &lt;4.4.4_02-22.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184499" version="1" comment="xen-libs-32bit is &lt;4.4.4_02-22.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184500" version="1" comment="wireshark is &lt;1.12.11-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184501" version="1" comment="libgudev-1_0-0 is &lt;210-70.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184502" version="1" comment="libgudev-1_0-0-32bit is &lt;210-70.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184503" version="1" comment="libudev1 is &lt;210-70.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184504" version="1" comment="libudev1-32bit is &lt;210-70.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184505" version="1" comment="systemd is &lt;210-70.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184506" version="1" comment="systemd-32bit is &lt;210-70.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184507" version="1" comment="systemd-bash-completion is &lt;210-70.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184508" version="1" comment="systemd-sysvinit is &lt;210-70.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184509" version="1" comment="udev is &lt;210-70.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184510" version="1" comment="openssh is &lt;6.6p1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184511" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184512" version="1" comment="openssh-helpers is &lt;6.6p1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184513" version="1" comment="openssh is &lt;6.6p1-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184514" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184515" version="1" comment="openssh-helpers is &lt;6.6p1-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184516" version="1" comment="libmysqlclient18 is &lt;10.0.22-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184517" version="1" comment="libmysqlclient18-32bit is &lt;10.0.22-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184518" version="1" comment="libmysqlclient_r18 is &lt;10.0.22-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184519" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.22-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184520" version="1" comment="mariadb is &lt;10.0.22-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184521" version="1" comment="mariadb-client is &lt;10.0.22-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184522" version="1" comment="mariadb-errormessages is &lt;10.0.22-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184523" version="1" comment="supportutils is &lt;3.0-82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184524" version="1" comment="libksba is &lt;1.3.0-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184525" version="1" comment="libxml2 is &lt;2.9.1-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184526" version="1" comment="libxml2-2 is &lt;2.9.1-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184527" version="1" comment="libxml2-2-32bit is &lt;2.9.1-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184528" version="1" comment="libxml2-tools is &lt;2.9.1-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184529" version="1" comment="python-libxml2 is &lt;2.9.1-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184530" version="1" comment="libpoppler-glib8 is &lt;0.24.4-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184531" version="1" comment="libpoppler-qt4-4 is &lt;0.24.4-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184532" version="1" comment="poppler-qt is &lt;0.24.4-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184533" version="1" comment="poppler-tools is &lt;0.24.4-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184534" version="1" comment="qemu is &lt;2.0.2-48.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184535" version="1" comment="qemu-block-curl is &lt;2.0.2-48.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184536" version="1" comment="qemu-ipxe is &lt;1.0.0-48.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184537" version="1" comment="qemu-kvm is &lt;2.0.2-48.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184538" version="1" comment="qemu-seabios is &lt;1.7.4-48.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184539" version="1" comment="qemu-sgabios is &lt;8-48.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184540" version="1" comment="qemu-tools is &lt;2.0.2-48.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184541" version="1" comment="qemu-vgabios is &lt;1.7.4-48.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184542" version="1" comment="qemu-x86 is &lt;2.0.2-48.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184543" version="1" comment="libspice-server1 is &lt;0.12.4-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184544" version="1" comment="spice is &lt;0.12.4-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184545" version="1" comment="ntp is &lt;4.2.8p8-46.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184546" version="1" comment="ntp-doc is &lt;4.2.8p8-46.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184547" version="1" comment="ImageMagick is &lt;6.8.8.1-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184548" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184549" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184550" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184551" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184552" version="1" comment="libarchive is &lt;3.1.2-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184553" version="1" comment="libarchive13 is &lt;3.1.2-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184554" version="1" comment="kernel-default is &lt;3.12.55-52.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184555" version="1" comment="kernel-default-devel is &lt;3.12.55-52.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184556" version="1" comment="kernel-default-extra is &lt;3.12.55-52.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184557" version="1" comment="kernel-devel is &lt;3.12.55-52.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184558" version="1" comment="kernel-macros is &lt;3.12.55-52.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184559" version="1" comment="kernel-source is &lt;3.12.55-52.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184560" version="1" comment="kernel-syms is &lt;3.12.55-52.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184561" version="1" comment="kernel-xen is &lt;3.12.55-52.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184562" version="1" comment="kernel-xen-devel is &lt;3.12.55-52.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184563" version="1" comment="flash-player is &lt;11.2.202.626-133" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184564" version="1" comment="flash-player-gnome is &lt;11.2.202.626-133" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184565" version="1" comment="libmysqlclient18 is &lt;10.0.25-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184566" version="1" comment="libmysqlclient18-32bit is &lt;10.0.25-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184567" version="1" comment="libmysqlclient_r18 is &lt;10.0.25-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184568" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.25-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184569" version="1" comment="mariadb is &lt;10.0.25-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184570" version="1" comment="mariadb-client is &lt;10.0.25-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184571" version="1" comment="mariadb-errormessages is &lt;10.0.25-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184572" version="1" comment="imap is &lt;2007e_suse-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184573" version="1" comment="libc-client2007e_suse is &lt;2007e_suse-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184574" version="1" comment="libimobiledevice is &lt;1.1.5-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184575" version="1" comment="libimobiledevice-tools is &lt;1.1.5-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184576" version="1" comment="libimobiledevice4 is &lt;1.1.5-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184577" version="1" comment="libusbmuxd2 is &lt;1.0.8-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184578" version="1" comment="usbmuxd is &lt;1.0.8-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184579" version="1" comment="libfreebl3 is &lt;3.19.2.2-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184580" version="1" comment="libfreebl3-32bit is &lt;3.19.2.2-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184581" version="1" comment="libsoftokn3 is &lt;3.19.2.2-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184582" version="1" comment="libsoftokn3-32bit is &lt;3.19.2.2-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184583" version="1" comment="mozilla-nss is &lt;3.19.2.2-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184584" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.2-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184585" version="1" comment="mozilla-nss-certs is &lt;3.19.2.2-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184586" version="1" comment="mozilla-nss-certs-32bit is &lt;3.19.2.2-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184587" version="1" comment="mozilla-nss-sysinit is &lt;3.19.2.2-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184588" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.19.2.2-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184589" version="1" comment="mozilla-nss-tools is &lt;3.19.2.2-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184590" version="1" comment="bind is &lt;9.9.6P1-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184591" version="1" comment="bind-libs is &lt;9.9.6P1-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184592" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184593" version="1" comment="bind-utils is &lt;9.9.6P1-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184594" version="1" comment="grub2 is &lt;2.02~beta2-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184595" version="1" comment="grub2-i386-pc is &lt;2.02~beta2-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184596" version="1" comment="grub2-snapper-plugin is &lt;2.02~beta2-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184597" version="1" comment="grub2-x86_64-efi is &lt;2.02~beta2-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184598" version="1" comment="grub2-x86_64-xen is &lt;2.02~beta2-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184599" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184600" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184601" version="1" comment="openssl is &lt;1.0.1i-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184602" version="1" comment="kernel-default is &lt;3.12.51-60.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184603" version="1" comment="kernel-default-devel is &lt;3.12.51-60.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184604" version="1" comment="kernel-default-extra is &lt;3.12.51-60.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184605" version="1" comment="kernel-devel is &lt;3.12.51-60.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184606" version="1" comment="kernel-macros is &lt;3.12.51-60.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184607" version="1" comment="kernel-source is &lt;3.12.51-60.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184608" version="1" comment="kernel-syms is &lt;3.12.51-60.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184609" version="1" comment="kernel-xen is &lt;3.12.51-60.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184610" version="1" comment="kernel-xen-devel is &lt;3.12.51-60.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184611" version="1" comment="ldb is &lt;1.1.24-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184612" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184613" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184614" version="1" comment="libdcerpc0 is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184615" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184616" version="1" comment="libgensec0 is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184617" version="1" comment="libgensec0-32bit is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184618" version="1" comment="libldb1 is &lt;1.1.24-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184619" version="1" comment="libldb1-32bit is &lt;1.1.24-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184620" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184621" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184622" version="1" comment="libndr-nbt0 is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184623" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184624" version="1" comment="libndr-standard0 is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184625" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184626" version="1" comment="libndr0 is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184627" version="1" comment="libndr0-32bit is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184628" version="1" comment="libnetapi0 is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184629" version="1" comment="libnetapi0-32bit is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184630" version="1" comment="libregistry0 is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184631" version="1" comment="libsamba-credentials0 is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184632" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184633" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184634" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184635" version="1" comment="libsamba-passdb0 is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184636" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184637" version="1" comment="libsamba-util0 is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184638" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184639" version="1" comment="libsamdb0 is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184640" version="1" comment="libsamdb0-32bit is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184641" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184642" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184643" version="1" comment="libsmbclient0 is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184644" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184645" version="1" comment="libsmbconf0 is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184646" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184647" version="1" comment="libsmbldap0 is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184648" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184649" version="1" comment="libtalloc2 is &lt;2.1.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184650" version="1" comment="libtalloc2-32bit is &lt;2.1.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184651" version="1" comment="libtdb1 is &lt;1.3.8-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184652" version="1" comment="libtdb1-32bit is &lt;1.3.8-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184653" version="1" comment="libtevent-util0 is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184654" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184655" version="1" comment="libtevent0 is &lt;0.9.26-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184656" version="1" comment="libtevent0-32bit is &lt;0.9.26-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184657" version="1" comment="libwbclient0 is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184658" version="1" comment="libwbclient0-32bit is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184659" version="1" comment="pytalloc is &lt;2.1.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184660" version="1" comment="pytalloc-32bit is &lt;2.1.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184661" version="1" comment="samba is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184662" version="1" comment="samba-32bit is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184663" version="1" comment="samba-client is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184664" version="1" comment="samba-client-32bit is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184665" version="1" comment="samba-doc is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184666" version="1" comment="samba-libs is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184667" version="1" comment="samba-libs-32bit is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184668" version="1" comment="samba-winbind is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184669" version="1" comment="samba-winbind-32bit is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184670" version="1" comment="talloc is &lt;2.1.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184671" version="1" comment="xen is &lt;4.5.2_02-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184672" version="1" comment="xen-kmp-default is &lt;4.5.2_02_k3.12.49_11-4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184673" version="1" comment="xen-libs is &lt;4.5.2_02-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184674" version="1" comment="xen-libs-32bit is &lt;4.5.2_02-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184675" version="1" comment="kernel-default is &lt;3.12.59-60.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184676" version="1" comment="kernel-default-devel is &lt;3.12.59-60.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184677" version="1" comment="kernel-default-extra is &lt;3.12.59-60.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184678" version="1" comment="kernel-devel is &lt;3.12.59-60.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184679" version="1" comment="kernel-macros is &lt;3.12.59-60.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184680" version="1" comment="kernel-source is &lt;3.12.59-60.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184681" version="1" comment="kernel-syms is &lt;3.12.59-60.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184682" version="1" comment="kernel-xen is &lt;3.12.59-60.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184683" version="1" comment="kernel-xen-devel is &lt;3.12.59-60.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184684" version="1" comment="qemu is &lt;2.3.1-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184685" version="1" comment="qemu-block-curl is &lt;2.3.1-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184686" version="1" comment="qemu-ipxe is &lt;1.0.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184687" version="1" comment="qemu-kvm is &lt;2.3.1-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184688" version="1" comment="qemu-seabios is &lt;1.8.1-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184689" version="1" comment="qemu-sgabios is &lt;8-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184690" version="1" comment="qemu-tools is &lt;2.3.1-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184691" version="1" comment="qemu-vgabios is &lt;1.8.1-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184692" version="1" comment="qemu-x86 is &lt;2.3.1-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184693" version="1" comment="kernel-default is &lt;3.12.59-60.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184694" version="1" comment="kernel-default-devel is &lt;3.12.59-60.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184695" version="1" comment="kernel-default-extra is &lt;3.12.59-60.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184696" version="1" comment="kernel-devel is &lt;3.12.59-60.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184697" version="1" comment="kernel-macros is &lt;3.12.59-60.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184698" version="1" comment="kernel-source is &lt;3.12.59-60.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184699" version="1" comment="kernel-syms is &lt;3.12.59-60.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184700" version="1" comment="kernel-xen is &lt;3.12.59-60.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184701" version="1" comment="kernel-xen-devel is &lt;3.12.59-60.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184702" version="1" comment="glibc is &lt;2.19-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184703" version="1" comment="glibc-32bit is &lt;2.19-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184704" version="1" comment="glibc-devel is &lt;2.19-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184705" version="1" comment="glibc-devel-32bit is &lt;2.19-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184706" version="1" comment="glibc-i18ndata is &lt;2.19-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184707" version="1" comment="glibc-locale is &lt;2.19-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184708" version="1" comment="glibc-locale-32bit is &lt;2.19-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184709" version="1" comment="nscd is &lt;2.19-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184710" version="1" comment="ImageMagick is &lt;6.8.8.1-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184711" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184712" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184713" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184714" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184715" version="1" comment="flash-player is &lt;11.2.202.632-137" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184716" version="1" comment="flash-player-gnome is &lt;11.2.202.632-137" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184717" version="1" comment="libarchive is &lt;3.1.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184718" version="1" comment="bind is &lt;9.9.6P1-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184719" version="1" comment="bind-libs is &lt;9.9.6P1-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184720" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184721" version="1" comment="bind-utils is &lt;9.9.6P1-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184722" version="1" comment="gimp is &lt;2.8.10-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184723" version="1" comment="gimp-lang is &lt;2.8.10-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184724" version="1" comment="gimp-plugins-python is &lt;2.8.10-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184725" version="1" comment="libgimp-2_0-0 is &lt;2.8.10-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184726" version="1" comment="libgimpui-2_0-0 is &lt;2.8.10-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184727" version="1" comment="libvirt is &lt;1.2.18.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184728" version="1" comment="libvirt-client is &lt;1.2.18.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184729" version="1" comment="libvirt-client-32bit is &lt;1.2.18.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184730" version="1" comment="libvirt-daemon is &lt;1.2.18.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184731" version="1" comment="libvirt-daemon-config-network is &lt;1.2.18.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184732" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.2.18.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184733" version="1" comment="libvirt-daemon-driver-interface is &lt;1.2.18.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184734" version="1" comment="libvirt-daemon-driver-libxl is &lt;1.2.18.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184735" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.2.18.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184736" version="1" comment="libvirt-daemon-driver-network is &lt;1.2.18.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184737" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.2.18.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184738" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.2.18.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184739" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.2.18.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184740" version="1" comment="libvirt-daemon-driver-secret is &lt;1.2.18.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184741" version="1" comment="libvirt-daemon-driver-storage is &lt;1.2.18.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184742" version="1" comment="libvirt-daemon-lxc is &lt;1.2.18.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184743" version="1" comment="libvirt-daemon-qemu is &lt;1.2.18.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184744" version="1" comment="libvirt-daemon-xen is &lt;1.2.18.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184745" version="1" comment="libvirt-doc is &lt;1.2.18.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184746" version="1" comment="libidn is &lt;1.28-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184747" version="1" comment="xen is &lt;4.5.3_08-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184748" version="1" comment="xen-kmp-default is &lt;4.5.3_08_k3.12.59_60.45-17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184749" version="1" comment="xen-libs is &lt;4.5.3_08-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184750" version="1" comment="xen-libs-32bit is &lt;4.5.3_08-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184751" version="1" comment="kernel-default is &lt;3.12.51-60.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184752" version="1" comment="kernel-default-devel is &lt;3.12.51-60.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184753" version="1" comment="kernel-default-extra is &lt;3.12.51-60.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184754" version="1" comment="kernel-devel is &lt;3.12.51-60.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184755" version="1" comment="kernel-macros is &lt;3.12.51-60.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184756" version="1" comment="kernel-source is &lt;3.12.51-60.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184757" version="1" comment="kernel-syms is &lt;3.12.51-60.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184758" version="1" comment="kernel-xen is &lt;3.12.51-60.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184759" version="1" comment="kernel-xen-devel is &lt;3.12.51-60.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184760" version="1" comment="kernel-default is &lt;3.12.62-60.62" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184761" version="1" comment="kernel-default-devel is &lt;3.12.62-60.62" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184762" version="1" comment="kernel-default-extra is &lt;3.12.62-60.62" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184763" version="1" comment="kernel-devel is &lt;3.12.62-60.62" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184764" version="1" comment="kernel-macros is &lt;3.12.62-60.62" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184765" version="1" comment="kernel-source is &lt;3.12.62-60.62" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184766" version="1" comment="kernel-syms is &lt;3.12.62-60.62" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184767" version="1" comment="kernel-xen is &lt;3.12.62-60.62" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184768" version="1" comment="kernel-xen-devel is &lt;3.12.62-60.62" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184769" version="1" comment="MozillaFirefox is &lt;45.3.0esr-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184770" version="1" comment="MozillaFirefox-translations is &lt;45.3.0esr-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184771" version="1" comment="krb5 is &lt;1.12.1-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184772" version="1" comment="krb5-32bit is &lt;1.12.1-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184773" version="1" comment="krb5-client is &lt;1.12.1-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184774" version="1" comment="rsync is &lt;3.1.0-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184775" version="1" comment="xerces-c is &lt;3.1.1-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184776" version="1" comment="libstorage is &lt;2.25.35.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184777" version="1" comment="libstorage-ruby is &lt;2.25.35.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184778" version="1" comment="libstorage6 is &lt;2.25.35.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184779" version="1" comment="fontconfig is &lt;2.11.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184780" version="1" comment="fontconfig-32bit is &lt;2.11.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184781" version="1" comment="libmysqlclient18 is &lt;10.0.26-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184782" version="1" comment="libmysqlclient18-32bit is &lt;10.0.26-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184783" version="1" comment="libmysqlclient_r18 is &lt;10.0.26-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184784" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.26-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184785" version="1" comment="mariadb is &lt;10.0.26-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184786" version="1" comment="mariadb-client is &lt;10.0.26-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184787" version="1" comment="mariadb-errormessages is &lt;10.0.26-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184788" version="1" comment="openssh is &lt;6.6p1-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184789" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184790" version="1" comment="openssh-helpers is &lt;6.6p1-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184791" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184792" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184793" version="1" comment="libdcerpc0 is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184794" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184795" version="1" comment="libgensec0 is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184796" version="1" comment="libgensec0-32bit is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184797" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184798" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184799" version="1" comment="libndr-nbt0 is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184800" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184801" version="1" comment="libndr-standard0 is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184802" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184803" version="1" comment="libndr0 is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184804" version="1" comment="libndr0-32bit is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184805" version="1" comment="libnetapi0 is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184806" version="1" comment="libnetapi0-32bit is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184807" version="1" comment="libregistry0 is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184808" version="1" comment="libsamba-credentials0 is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184809" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184810" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184811" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184812" version="1" comment="libsamba-passdb0 is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184813" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184814" version="1" comment="libsamba-util0 is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184815" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184816" version="1" comment="libsamdb0 is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184817" version="1" comment="libsamdb0-32bit is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184818" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184819" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184820" version="1" comment="libsmbclient0 is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184821" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184822" version="1" comment="libsmbconf0 is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184823" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184824" version="1" comment="libsmbldap0 is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184825" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184826" version="1" comment="libtevent-util0 is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184827" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184828" version="1" comment="libwbclient0 is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184829" version="1" comment="libwbclient0-32bit is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184830" version="1" comment="samba is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184831" version="1" comment="samba-32bit is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184832" version="1" comment="samba-client is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184833" version="1" comment="samba-client-32bit is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184834" version="1" comment="samba-doc is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184835" version="1" comment="samba-libs is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184836" version="1" comment="samba-libs-32bit is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184837" version="1" comment="samba-winbind is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184838" version="1" comment="samba-winbind-32bit is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184839" version="1" comment="flash-player is &lt;11.2.202.635-140" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184840" version="1" comment="flash-player-gnome is &lt;11.2.202.635-140" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184841" version="1" comment="libgcrypt is &lt;1.6.1-16.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184842" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184843" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184844" version="1" comment="openssl is &lt;1.0.1i-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184845" version="1" comment="postgresql94-libs is &lt;9.4.9-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184846" version="1" comment="compat-openssl098 is &lt;0.9.8j-102" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184847" version="1" comment="xen is &lt;4.5.3_10-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184848" version="1" comment="xen-kmp-default is &lt;4.5.3_10_k3.12.62_60.62-20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184849" version="1" comment="xen-libs is &lt;4.5.3_10-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184850" version="1" comment="xen-libs-32bit is &lt;4.5.3_10-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184851" version="1" comment="libgudev-1_0-0 is &lt;210-114" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184852" version="1" comment="libgudev-1_0-0-32bit is &lt;210-114" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184853" version="1" comment="libudev1 is &lt;210-114" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184854" version="1" comment="libudev1-32bit is &lt;210-114" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184855" version="1" comment="systemd is &lt;210-114" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184856" version="1" comment="systemd-32bit is &lt;210-114" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184857" version="1" comment="systemd-bash-completion is &lt;210-114" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184858" version="1" comment="systemd-sysvinit is &lt;210-114" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184859" version="1" comment="udev is &lt;210-114" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184860" version="1" comment="ghostscript is &lt;9.15-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184861" version="1" comment="ghostscript-x11 is &lt;9.15-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184862" version="1" comment="libtiff5 is &lt;4.0.6-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184863" version="1" comment="libtiff5-32bit is &lt;4.0.6-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184864" version="1" comment="tiff is &lt;4.0.6-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184865" version="1" comment="freerdp is &lt;1.0.2-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184866" version="1" comment="libfreerdp-1_0 is &lt;1.0.2-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184867" version="1" comment="libfreerdp-1_0-plugins is &lt;1.0.2-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184868" version="1" comment="libX11 is &lt;1.6.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184869" version="1" comment="libX11-6 is &lt;1.6.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184870" version="1" comment="libX11-6-32bit is &lt;1.6.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184871" version="1" comment="libX11-data is &lt;1.6.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184872" version="1" comment="libX11-xcb1 is &lt;1.6.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184873" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184874" version="1" comment="libXfixes is &lt;5.0.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184875" version="1" comment="libXfixes3 is &lt;5.0.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184876" version="1" comment="libXfixes3-32bit is &lt;5.0.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184877" version="1" comment="libXi is &lt;1.7.4-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184878" version="1" comment="libXi6 is &lt;1.7.4-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184879" version="1" comment="libXi6-32bit is &lt;1.7.4-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184880" version="1" comment="libXrandr is &lt;1.4.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184881" version="1" comment="libXrandr2 is &lt;1.4.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184882" version="1" comment="libXrandr2-32bit is &lt;1.4.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184883" version="1" comment="libXrender is &lt;0.9.8-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184884" version="1" comment="libXrender1 is &lt;0.9.8-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184885" version="1" comment="libXrender1-32bit is &lt;0.9.8-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184886" version="1" comment="libXtst is &lt;1.2.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184887" version="1" comment="libXtst6 is &lt;1.2.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184888" version="1" comment="libXtst6-32bit is &lt;1.2.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184889" version="1" comment="libXv is &lt;1.0.10-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184890" version="1" comment="libXv1 is &lt;1.0.10-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184891" version="1" comment="libXv1-32bit is &lt;1.0.10-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184892" version="1" comment="libXvMC is &lt;1.0.8-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184893" version="1" comment="libXvMC1 is &lt;1.0.8-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184894" version="1" comment="flash-player is &lt;11.2.202.637-143" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184895" version="1" comment="flash-player-gnome is &lt;11.2.202.637-143" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184896" version="1" comment="gtk2 is &lt;2.24.24-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184897" version="1" comment="gtk2-lang is &lt;2.24.24-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184898" version="1" comment="gtk2-tools is &lt;2.24.24-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184899" version="1" comment="gtk2-tools-32bit is &lt;2.24.24-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184900" version="1" comment="libgtk-2_0-0 is &lt;2.24.24-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184901" version="1" comment="libgtk-2_0-0-32bit is &lt;2.24.24-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184902" version="1" comment="typelib-1_0-Gtk-2_0 is &lt;2.24.24-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184903" version="1" comment="kdump is &lt;0.8.15-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184904" version="1" comment="dbus-1 is &lt;1.8.22-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184905" version="1" comment="dbus-1-x11 is &lt;1.8.22-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184906" version="1" comment="libdbus-1-3 is &lt;1.8.22-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184907" version="1" comment="libdbus-1-3-32bit is &lt;1.8.22-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184908" version="1" comment="libipa_hbac0 is &lt;1.11.5.1-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184909" version="1" comment="libsss_idmap0 is &lt;1.11.5.1-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184910" version="1" comment="libsss_sudo is &lt;1.11.5.1-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184911" version="1" comment="python-sssd-config is &lt;1.11.5.1-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184912" version="1" comment="sssd is &lt;1.11.5.1-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184913" version="1" comment="sssd-32bit is &lt;1.11.5.1-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184914" version="1" comment="sssd-ad is &lt;1.11.5.1-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184915" version="1" comment="sssd-ipa is &lt;1.11.5.1-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184916" version="1" comment="sssd-krb5 is &lt;1.11.5.1-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184917" version="1" comment="sssd-krb5-common is &lt;1.11.5.1-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184918" version="1" comment="sssd-ldap is &lt;1.11.5.1-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184919" version="1" comment="sssd-proxy is &lt;1.11.5.1-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184920" version="1" comment="sssd-tools is &lt;1.11.5.1-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184921" version="1" comment="kernel-default is &lt;3.12.62-60.64.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184922" version="1" comment="kernel-default-devel is &lt;3.12.62-60.64.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184923" version="1" comment="kernel-default-extra is &lt;3.12.62-60.64.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184924" version="1" comment="kernel-devel is &lt;3.12.62-60.64.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184925" version="1" comment="kernel-macros is &lt;3.12.62-60.64.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184926" version="1" comment="kernel-source is &lt;3.12.62-60.64.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184927" version="1" comment="kernel-syms is &lt;3.12.62-60.64.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184928" version="1" comment="kernel-xen is &lt;3.12.62-60.64.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184929" version="1" comment="kernel-xen-devel is &lt;3.12.62-60.64.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184930" version="1" comment="qemu is &lt;2.3.1-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184931" version="1" comment="qemu-block-curl is &lt;2.3.1-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184932" version="1" comment="qemu-ipxe is &lt;1.0.0-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184933" version="1" comment="qemu-kvm is &lt;2.3.1-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184934" version="1" comment="qemu-seabios is &lt;1.8.1-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184935" version="1" comment="qemu-sgabios is &lt;8-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184936" version="1" comment="qemu-tools is &lt;2.3.1-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184937" version="1" comment="qemu-vgabios is &lt;1.8.1-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184938" version="1" comment="qemu-x86 is &lt;2.3.1-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184939" version="1" comment="libxml2 is &lt;2.9.1-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184940" version="1" comment="libxml2-2 is &lt;2.9.1-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184941" version="1" comment="libxml2-2-32bit is &lt;2.9.1-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184942" version="1" comment="libxml2-tools is &lt;2.9.1-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184943" version="1" comment="python-libxml2 is &lt;2.9.1-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184944" version="1" comment="ghostscript is &lt;9.15-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184945" version="1" comment="ghostscript-x11 is &lt;9.15-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184946" version="1" comment="libpython3_4m1_0 is &lt;3.4.5-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184947" version="1" comment="python3 is &lt;3.4.5-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184948" version="1" comment="python3-base is &lt;3.4.5-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184949" version="1" comment="flash-player is &lt;11.2.202.643-146" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184950" version="1" comment="flash-player-gnome is &lt;11.2.202.643-146" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184951" version="1" comment="gd is &lt;2.1.0-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184952" version="1" comment="gd-32bit is &lt;2.1.0-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184953" version="1" comment="ImageMagick is &lt;6.8.8.1-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184954" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184955" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184956" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184957" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184958" version="1" comment="bind is &lt;9.9.9P1-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184959" version="1" comment="bind-libs is &lt;9.9.9P1-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184960" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184961" version="1" comment="bind-utils is &lt;9.9.9P1-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184965" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.72-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184966" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.72-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184967" version="1" comment="libblkid1 is &lt;2.25-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184968" version="1" comment="libblkid1-32bit is &lt;2.25-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184969" version="1" comment="libmount1 is &lt;2.25-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184970" version="1" comment="libmount1-32bit is &lt;2.25-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184971" version="1" comment="libsmartcols1 is &lt;2.25-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184972" version="1" comment="libuuid-devel is &lt;2.25-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184973" version="1" comment="libuuid1 is &lt;2.25-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184974" version="1" comment="libuuid1-32bit is &lt;2.25-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184975" version="1" comment="python-libmount is &lt;2.25-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184976" version="1" comment="util-linux is &lt;2.25-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184977" version="1" comment="util-linux-lang is &lt;2.25-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184978" version="1" comment="util-linux-systemd is &lt;2.25-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184979" version="1" comment="uuidd is &lt;2.25-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184980" version="1" comment="jasper is &lt;1.900.14-181" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184981" version="1" comment="libjasper1 is &lt;1.900.14-181" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184982" version="1" comment="libjasper1-32bit is &lt;1.900.14-181" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184983" version="1" comment="flash-player is &lt;11.2.202.644-149" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184984" version="1" comment="flash-player-gnome is &lt;11.2.202.644-149" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184985" version="1" comment="ghostscript is &lt;9.15-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184986" version="1" comment="ghostscript-x11 is &lt;9.15-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184987" version="1" comment="eog is &lt;3.10.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184988" version="1" comment="eog-lang is &lt;3.10.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184989" version="1" comment="bash is &lt;4.2-82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184990" version="1" comment="bash-doc is &lt;4.2-82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184991" version="1" comment="bash-lang is &lt;4.2-82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184992" version="1" comment="libreadline6 is &lt;6.2-82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184993" version="1" comment="libreadline6-32bit is &lt;6.2-82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184994" version="1" comment="readline-doc is &lt;6.2-82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184995" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.111-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184996" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.111-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184997" version="1" comment="tar is &lt;1.27.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184998" version="1" comment="tar-lang is &lt;1.27.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009184999" version="1" comment="sudo is &lt;1.8.10p3-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185000" version="1" comment="libarchive is &lt;3.1.2-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185001" version="1" comment="kernel-default is &lt;3.12.67-60.64.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185002" version="1" comment="kernel-default-devel is &lt;3.12.67-60.64.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185003" version="1" comment="kernel-default-extra is &lt;3.12.67-60.64.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185004" version="1" comment="kernel-devel is &lt;3.12.67-60.64.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185005" version="1" comment="kernel-macros is &lt;3.12.67-60.64.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185006" version="1" comment="kernel-source is &lt;3.12.67-60.64.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185007" version="1" comment="kernel-syms is &lt;3.12.67-60.64.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185008" version="1" comment="kernel-xen is &lt;3.12.67-60.64.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185009" version="1" comment="kernel-xen-devel is &lt;3.12.67-60.64.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185010" version="1" comment="libmysqlclient18 is &lt;10.0.28-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185011" version="1" comment="libmysqlclient18-32bit is &lt;10.0.28-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185012" version="1" comment="libmysqlclient_r18 is &lt;10.0.28-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185013" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.28-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185014" version="1" comment="mariadb is &lt;10.0.28-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185015" version="1" comment="mariadb-client is &lt;10.0.28-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185016" version="1" comment="mariadb-errormessages is &lt;10.0.28-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185017" version="1" comment="gvim is &lt;7.4.326-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185018" version="1" comment="vim is &lt;7.4.326-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185019" version="1" comment="vim-data is &lt;7.4.326-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185020" version="1" comment="ImageMagick is &lt;6.8.8.1-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185021" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185022" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185023" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185024" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185025" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.121-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185026" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.121-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185027" version="1" comment="imap is &lt;2007e_suse-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185028" version="1" comment="libc-client2007e_suse is &lt;2007e_suse-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185029" version="1" comment="libpcre1 is &lt;8.39-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185030" version="1" comment="libpcre1-32bit is &lt;8.39-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185031" version="1" comment="libpcre16-0 is &lt;8.39-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185032" version="1" comment="libpcrecpp0 is &lt;8.39-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185033" version="1" comment="libpcrecpp0-32bit is &lt;8.39-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185034" version="1" comment="pcre is &lt;8.39-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185035" version="1" comment="qemu is &lt;2.3.1-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185036" version="1" comment="qemu-block-curl is &lt;2.3.1-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185037" version="1" comment="qemu-ipxe is &lt;1.0.0-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185038" version="1" comment="qemu-kvm is &lt;2.3.1-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185039" version="1" comment="qemu-seabios is &lt;1.8.1-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185040" version="1" comment="qemu-sgabios is &lt;8-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185041" version="1" comment="qemu-tools is &lt;2.3.1-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185042" version="1" comment="qemu-vgabios is &lt;1.8.1-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185043" version="1" comment="qemu-x86 is &lt;2.3.1-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185044" version="1" comment="libX11 is &lt;1.6.2-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185045" version="1" comment="MozillaFirefox is &lt;45.5.0esr-88" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185046" version="1" comment="MozillaFirefox-translations is &lt;45.5.0esr-88" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185047" version="1" comment="libfreebl3 is &lt;3.21.3-50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185048" version="1" comment="libfreebl3-32bit is &lt;3.21.3-50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185049" version="1" comment="libsoftokn3 is &lt;3.21.3-50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185050" version="1" comment="libsoftokn3-32bit is &lt;3.21.3-50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185051" version="1" comment="mozilla-nss is &lt;3.21.3-50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185052" version="1" comment="mozilla-nss-32bit is &lt;3.21.3-50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185053" version="1" comment="mozilla-nss-certs is &lt;3.21.3-50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185054" version="1" comment="mozilla-nss-certs-32bit is &lt;3.21.3-50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185055" version="1" comment="mozilla-nss-sysinit is &lt;3.21.3-50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185056" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.21.3-50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185057" version="1" comment="mozilla-nss-tools is &lt;3.21.3-50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185058" version="1" comment="kernel-default is &lt;3.12.67-60.64.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185059" version="1" comment="kernel-default-devel is &lt;3.12.67-60.64.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185060" version="1" comment="kernel-default-extra is &lt;3.12.67-60.64.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185061" version="1" comment="kernel-devel is &lt;3.12.67-60.64.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185062" version="1" comment="kernel-macros is &lt;3.12.67-60.64.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185063" version="1" comment="kernel-source is &lt;3.12.67-60.64.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185064" version="1" comment="kernel-syms is &lt;3.12.67-60.64.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185065" version="1" comment="kernel-xen is &lt;3.12.67-60.64.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185066" version="1" comment="kernel-xen-devel is &lt;3.12.67-60.64.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185067" version="1" comment="libXi is &lt;1.7.4-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185068" version="1" comment="MozillaFirefox is &lt;45.5.1esr-93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185069" version="1" comment="MozillaFirefox-translations is &lt;45.5.1esr-93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185070" version="1" comment="gc is &lt;7.2d-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185071" version="1" comment="xen is &lt;4.5.5_02-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185072" version="1" comment="xen-kmp-default is &lt;4.5.5_02_k3.12.67_60.64.18-22.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185073" version="1" comment="xen-libs is &lt;4.5.5_02-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185074" version="1" comment="xen-libs-32bit is &lt;4.5.5_02-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185075" version="1" comment="libass is &lt;0.10.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185076" version="1" comment="flash-player is &lt;24.0.0.186-152" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185077" version="1" comment="flash-player-gnome is &lt;24.0.0.186-152" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185078" version="1" comment="pcre is &lt;8.39-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185079" version="1" comment="libmysqlclient18 is &lt;10.0.22-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185080" version="1" comment="libmysqlclient18-32bit is &lt;10.0.22-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185081" version="1" comment="libmysqlclient_r18 is &lt;10.0.22-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185082" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.22-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185083" version="1" comment="mariadb is &lt;10.0.22-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185084" version="1" comment="mariadb-client is &lt;10.0.22-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185085" version="1" comment="mariadb-errormessages is &lt;10.0.22-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185086" version="1" comment="kernel-default is &lt;3.12.67-60.64.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185087" version="1" comment="kernel-default-devel is &lt;3.12.67-60.64.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185088" version="1" comment="kernel-default-extra is &lt;3.12.67-60.64.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185089" version="1" comment="kernel-devel is &lt;3.12.67-60.64.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185090" version="1" comment="kernel-macros is &lt;3.12.67-60.64.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185091" version="1" comment="kernel-source is &lt;3.12.67-60.64.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185092" version="1" comment="kernel-syms is &lt;3.12.67-60.64.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185093" version="1" comment="kernel-xen is &lt;3.12.67-60.64.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185094" version="1" comment="kernel-xen-devel is &lt;3.12.67-60.64.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185095" version="1" comment="ntp is &lt;4.2.8p9-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185096" version="1" comment="ntp-doc is &lt;4.2.8p9-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185097" version="1" comment="xen is &lt;4.5.5_04-22.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185098" version="1" comment="xen-kmp-default is &lt;4.5.5_04_k3.12.67_60.64.24-22.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185099" version="1" comment="xen-libs is &lt;4.5.5_04-22.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185100" version="1" comment="xen-libs-32bit is &lt;4.5.5_04-22.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185101" version="1" comment="gd is &lt;2.1.0-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185102" version="1" comment="gd-32bit is &lt;2.1.0-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185103" version="1" comment="MozillaFirefox is &lt;45.6.0esr-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185104" version="1" comment="MozillaFirefox-translations is &lt;45.6.0esr-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185105" version="1" comment="libgme is &lt;0.6.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185106" version="1" comment="ImageMagick is &lt;6.8.8.1-54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185107" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185108" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185109" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185110" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185111" version="1" comment="wget is &lt;1.14-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185112" version="1" comment="dnsmasq is &lt;2.71-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185113" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185114" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185115" version="1" comment="libdcerpc0 is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185116" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185117" version="1" comment="libgensec0 is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185118" version="1" comment="libgensec0-32bit is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185119" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185120" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185121" version="1" comment="libndr-nbt0 is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185122" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185123" version="1" comment="libndr-standard0 is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185124" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185125" version="1" comment="libndr0 is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185126" version="1" comment="libndr0-32bit is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185127" version="1" comment="libnetapi0 is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185128" version="1" comment="libnetapi0-32bit is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185129" version="1" comment="libregistry0 is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185130" version="1" comment="libsamba-credentials0 is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185131" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185132" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185133" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185134" version="1" comment="libsamba-passdb0 is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185135" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185136" version="1" comment="libsamba-util0 is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185137" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185138" version="1" comment="libsamdb0 is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185139" version="1" comment="libsamdb0-32bit is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185140" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185141" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185142" version="1" comment="libsmbclient0 is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185143" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185144" version="1" comment="libsmbconf0 is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185145" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185146" version="1" comment="libsmbldap0 is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185147" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185148" version="1" comment="libtevent-util0 is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185149" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185150" version="1" comment="libwbclient0 is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185151" version="1" comment="libwbclient0-32bit is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185152" version="1" comment="samba is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185153" version="1" comment="samba-32bit is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185154" version="1" comment="samba-client is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185155" version="1" comment="samba-client-32bit is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185156" version="1" comment="samba-doc is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185157" version="1" comment="samba-libs is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185158" version="1" comment="samba-libs-32bit is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185159" version="1" comment="samba-winbind is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185160" version="1" comment="samba-winbind-32bit is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185161" version="1" comment="gstreamer-plugins-good is &lt;1.2.4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185162" version="1" comment="gstreamer-plugins-good-lang is &lt;1.2.4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185163" version="1" comment="gstreamer-plugins-bad is &lt;1.2.4-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185164" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.2.4-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185165" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.2.4-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185166" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.2.4-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185167" version="1" comment="libgstegl-1_0-0 is &lt;1.2.4-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185168" version="1" comment="libgstmpegts-1_0-0 is &lt;1.2.4-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185169" version="1" comment="libgstphotography-1_0-0 is &lt;1.2.4-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185170" version="1" comment="libtiff5 is &lt;4.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185171" version="1" comment="libtiff5-32bit is &lt;4.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185172" version="1" comment="tiff is &lt;4.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185173" version="1" comment="qemu is &lt;2.3.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185174" version="1" comment="qemu-block-curl is &lt;2.3.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185176" version="1" comment="qemu-kvm is &lt;2.3.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185177" version="1" comment="qemu-seabios is &lt;1.8.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185179" version="1" comment="qemu-tools is &lt;2.3.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185180" version="1" comment="qemu-vgabios is &lt;1.8.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185181" version="1" comment="qemu-x86 is &lt;2.3.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185182" version="1" comment="glibc is &lt;2.19-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185183" version="1" comment="glibc-32bit is &lt;2.19-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185184" version="1" comment="glibc-devel is &lt;2.19-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185185" version="1" comment="glibc-devel-32bit is &lt;2.19-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185186" version="1" comment="glibc-i18ndata is &lt;2.19-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185187" version="1" comment="glibc-locale is &lt;2.19-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185188" version="1" comment="glibc-locale-32bit is &lt;2.19-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185189" version="1" comment="nscd is &lt;2.19-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185190" version="1" comment="dhcp is &lt;4.3.3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185191" version="1" comment="dhcp-client is &lt;4.3.3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185192" version="1" comment="kernel-default is &lt;3.12.53-60.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185193" version="1" comment="kernel-default-devel is &lt;3.12.53-60.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185194" version="1" comment="kernel-default-extra is &lt;3.12.53-60.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185195" version="1" comment="kernel-devel is &lt;3.12.53-60.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185196" version="1" comment="kernel-macros is &lt;3.12.53-60.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185197" version="1" comment="kernel-source is &lt;3.12.53-60.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185198" version="1" comment="kernel-syms is &lt;3.12.53-60.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185199" version="1" comment="kernel-xen is &lt;3.12.53-60.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185200" version="1" comment="kernel-xen-devel is &lt;3.12.53-60.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185201" version="1" comment="libpng15 is &lt;1.5.22-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185202" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185203" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185204" version="1" comment="openssl is &lt;1.0.1i-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185205" version="1" comment="bind is &lt;9.9.6P1-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185206" version="1" comment="bind-libs is &lt;9.9.6P1-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185207" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185208" version="1" comment="bind-utils is &lt;9.9.6P1-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185209" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185210" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185211" version="1" comment="libdcerpc0 is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185212" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185213" version="1" comment="libgensec0 is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185214" version="1" comment="libgensec0-32bit is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185215" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185216" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185217" version="1" comment="libndr-nbt0 is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185218" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185219" version="1" comment="libndr-standard0 is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185220" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185221" version="1" comment="libndr0 is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185222" version="1" comment="libndr0-32bit is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185223" version="1" comment="libnetapi0 is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185224" version="1" comment="libnetapi0-32bit is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185225" version="1" comment="libregistry0 is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185226" version="1" comment="libsamba-credentials0 is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185227" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185228" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185229" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185230" version="1" comment="libsamba-passdb0 is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185231" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185232" version="1" comment="libsamba-util0 is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185233" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185234" version="1" comment="libsamdb0 is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185235" version="1" comment="libsamdb0-32bit is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185236" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185237" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185238" version="1" comment="libsmbclient0 is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185239" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185240" version="1" comment="libsmbconf0 is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185241" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185242" version="1" comment="libsmbldap0 is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185243" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185244" version="1" comment="libtevent-util0 is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185245" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185246" version="1" comment="libwbclient0 is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185247" version="1" comment="libwbclient0-32bit is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185248" version="1" comment="samba is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185249" version="1" comment="samba-32bit is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185250" version="1" comment="samba-client is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185251" version="1" comment="samba-client-32bit is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185252" version="1" comment="samba-doc is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185253" version="1" comment="samba-libs is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185254" version="1" comment="samba-libs-32bit is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185255" version="1" comment="samba-winbind is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185256" version="1" comment="samba-winbind-32bit is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185257" version="1" comment="xen is &lt;4.5.2_06-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185258" version="1" comment="xen-kmp-default is &lt;4.5.2_06_k3.12.53_60.30-7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185259" version="1" comment="xen-libs is &lt;4.5.2_06-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185260" version="1" comment="xen-libs-32bit is &lt;4.5.2_06-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185261" version="1" comment="libvirt is &lt;1.2.18.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185262" version="1" comment="libvirt-client is &lt;1.2.18.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185263" version="1" comment="libvirt-client-32bit is &lt;1.2.18.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185264" version="1" comment="libvirt-daemon is &lt;1.2.18.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185265" version="1" comment="libvirt-daemon-config-network is &lt;1.2.18.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185266" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.2.18.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185267" version="1" comment="libvirt-daemon-driver-interface is &lt;1.2.18.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185268" version="1" comment="libvirt-daemon-driver-libxl is &lt;1.2.18.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185269" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.2.18.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185270" version="1" comment="libvirt-daemon-driver-network is &lt;1.2.18.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185271" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.2.18.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185272" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.2.18.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185273" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.2.18.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185274" version="1" comment="libvirt-daemon-driver-secret is &lt;1.2.18.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185275" version="1" comment="libvirt-daemon-driver-storage is &lt;1.2.18.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185276" version="1" comment="libvirt-daemon-lxc is &lt;1.2.18.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185277" version="1" comment="libvirt-daemon-qemu is &lt;1.2.18.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185278" version="1" comment="libvirt-daemon-xen is &lt;1.2.18.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185279" version="1" comment="libvirt-doc is &lt;1.2.18.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185280" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.77-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185281" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.77-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185282" version="1" comment="kernel-default is &lt;3.12.57-60.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185283" version="1" comment="kernel-default-devel is &lt;3.12.57-60.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185284" version="1" comment="kernel-default-extra is &lt;3.12.57-60.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185285" version="1" comment="kernel-devel is &lt;3.12.57-60.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185286" version="1" comment="kernel-macros is &lt;3.12.57-60.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185287" version="1" comment="kernel-source is &lt;3.12.57-60.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185288" version="1" comment="kernel-syms is &lt;3.12.57-60.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185289" version="1" comment="kernel-xen is &lt;3.12.57-60.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185290" version="1" comment="kernel-xen-devel is &lt;3.12.57-60.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185291" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185292" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185293" version="1" comment="libdcerpc0 is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185294" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185295" version="1" comment="libgensec0 is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185296" version="1" comment="libgensec0-32bit is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185297" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185298" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185299" version="1" comment="libndr-nbt0 is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185300" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185301" version="1" comment="libndr-standard0 is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185302" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185303" version="1" comment="libndr0 is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185304" version="1" comment="libndr0-32bit is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185305" version="1" comment="libnetapi0 is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185306" version="1" comment="libnetapi0-32bit is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185307" version="1" comment="libregistry0 is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185308" version="1" comment="libsamba-credentials0 is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185309" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185310" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185311" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185312" version="1" comment="libsamba-passdb0 is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185313" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185314" version="1" comment="libsamba-util0 is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185315" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185316" version="1" comment="libsamdb0 is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185317" version="1" comment="libsamdb0-32bit is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185318" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185319" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185320" version="1" comment="libsmbclient0 is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185321" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185322" version="1" comment="libsmbconf0 is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185323" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185324" version="1" comment="libsmbldap0 is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185325" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185326" version="1" comment="libtevent-util0 is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185327" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185328" version="1" comment="libwbclient0 is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185329" version="1" comment="libwbclient0-32bit is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185330" version="1" comment="samba is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185331" version="1" comment="samba-32bit is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185332" version="1" comment="samba-client is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185333" version="1" comment="samba-client-32bit is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185334" version="1" comment="samba-doc is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185335" version="1" comment="samba-libs is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185336" version="1" comment="samba-libs-32bit is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185337" version="1" comment="samba-winbind is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185338" version="1" comment="samba-winbind-32bit is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185339" version="1" comment="libcairo-script-interpreter2 is &lt;1.12.16-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185340" version="1" comment="yast2-users is &lt;3.1.41.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185341" version="1" comment="ntp is &lt;4.2.8p6-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185342" version="1" comment="ntp-doc is &lt;4.2.8p6-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185343" version="1" comment="yast2-ntp-client is &lt;3.1.22-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185344" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185345" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185346" version="1" comment="openssl is &lt;1.0.1i-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185347" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.91-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185348" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.91-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185349" version="1" comment="ntp is &lt;4.2.8p7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185350" version="1" comment="ntp-doc is &lt;4.2.8p7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185351" version="1" comment="libgudev-1_0-0 is &lt;210-104" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185352" version="1" comment="libgudev-1_0-0-32bit is &lt;210-104" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185353" version="1" comment="libudev1 is &lt;210-104" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185354" version="1" comment="libudev1-32bit is &lt;210-104" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185355" version="1" comment="systemd is &lt;210-104" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185356" version="1" comment="systemd-32bit is &lt;210-104" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185357" version="1" comment="systemd-bash-completion is &lt;210-104" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185358" version="1" comment="systemd-sysvinit is &lt;210-104" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185359" version="1" comment="udev is &lt;210-104" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185360" version="1" comment="python-requests is &lt;2.8.1-6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185361" version="1" comment="libspice-server1 is &lt;0.12.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185362" version="1" comment="spice is &lt;0.12.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185363" version="1" comment="libmysqlclient18 is &lt;10.0.25-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185364" version="1" comment="libmysqlclient18-32bit is &lt;10.0.25-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185365" version="1" comment="libmysqlclient_r18 is &lt;10.0.25-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185366" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.25-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185367" version="1" comment="mariadb is &lt;10.0.25-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185368" version="1" comment="mariadb-client is &lt;10.0.25-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185369" version="1" comment="mariadb-errormessages is &lt;10.0.25-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185370" version="1" comment="gstreamer-0_10-plugins-good is &lt;0.10.31-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185371" version="1" comment="gstreamer-0_10-plugins-good-lang is &lt;0.10.31-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185372" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.36-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185373" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.36-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185374" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.36-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185375" version="1" comment="libgstapp-0_10-0 is &lt;0.10.36-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185376" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.36-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185377" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.36-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185378" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.36-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185379" version="1" comment="gstreamer-0_10-plugins-bad is &lt;0.10.23-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185380" version="1" comment="gstreamer-0_10-plugins-bad-lang is &lt;0.10.23-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185381" version="1" comment="libgstbasecamerabinsrc-0_10-23 is &lt;0.10.23-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185382" version="1" comment="libgstbasecamerabinsrc-0_10-23-32bit is &lt;0.10.23-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185383" version="1" comment="libgstbasevideo-0_10-23 is &lt;0.10.23-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185384" version="1" comment="libgstbasevideo-0_10-23-32bit is &lt;0.10.23-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185385" version="1" comment="libgstcodecparsers-0_10-23 is &lt;0.10.23-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185386" version="1" comment="libgstphotography-0_10-23 is &lt;0.10.23-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185387" version="1" comment="libgstphotography-0_10-23-32bit is &lt;0.10.23-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185388" version="1" comment="libgstsignalprocessor-0_10-23 is &lt;0.10.23-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185389" version="1" comment="libgstsignalprocessor-0_10-23-32bit is &lt;0.10.23-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185390" version="1" comment="libgstvdp-0_10-23 is &lt;0.10.23-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185391" version="1" comment="libgstvdp-0_10-23-32bit is &lt;0.10.23-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185392" version="1" comment="gstreamer-0_10-plugins-bad is &lt;0.10.23-19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185393" version="1" comment="gstreamer-0_10-plugins-bad-lang is &lt;0.10.23-19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185394" version="1" comment="libgstbasecamerabinsrc-0_10-23 is &lt;0.10.23-19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185395" version="1" comment="libgstbasecamerabinsrc-0_10-23-32bit is &lt;0.10.23-19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185396" version="1" comment="libgstbasevideo-0_10-23 is &lt;0.10.23-19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185397" version="1" comment="libgstbasevideo-0_10-23-32bit is &lt;0.10.23-19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185398" version="1" comment="libgstcodecparsers-0_10-23 is &lt;0.10.23-19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185399" version="1" comment="libgstphotography-0_10-23 is &lt;0.10.23-19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185400" version="1" comment="libgstphotography-0_10-23-32bit is &lt;0.10.23-19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185401" version="1" comment="libgstsignalprocessor-0_10-23 is &lt;0.10.23-19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185402" version="1" comment="libgstsignalprocessor-0_10-23-32bit is &lt;0.10.23-19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185403" version="1" comment="libgstvdp-0_10-23 is &lt;0.10.23-19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185404" version="1" comment="libgstvdp-0_10-23-32bit is &lt;0.10.23-19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185405" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.121-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185406" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.121-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185407" version="1" comment="gnutls is &lt;3.2.15-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185408" version="1" comment="libgnutls28 is &lt;3.2.15-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185409" version="1" comment="libgnutls28-32bit is &lt;3.2.15-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185410" version="1" comment="cpio is &lt;2.11-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185411" version="1" comment="cpio-lang is &lt;2.11-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185412" version="1" comment="libspice-server1 is &lt;0.12.5-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185413" version="1" comment="spice is &lt;0.12.5-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185414" version="1" comment="libmysqlclient18 is &lt;10.0.29-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185415" version="1" comment="libmysqlclient18-32bit is &lt;10.0.29-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185416" version="1" comment="libmysqlclient_r18 is &lt;10.0.29-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185417" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.29-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185418" version="1" comment="mariadb is &lt;10.0.29-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185419" version="1" comment="mariadb-client is &lt;10.0.29-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185420" version="1" comment="mariadb-errormessages is &lt;10.0.29-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185421" version="1" comment="MozillaFirefox is &lt;45.7.0esr-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185422" version="1" comment="MozillaFirefox-translations is &lt;45.7.0esr-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185423" version="1" comment="opus is &lt;1.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185424" version="1" comment="libtiff5 is &lt;4.0.7-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185425" version="1" comment="libtiff5-32bit is &lt;4.0.7-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185426" version="1" comment="tiff is &lt;4.0.7-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185427" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-54.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185428" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-54.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185429" version="1" comment="openssl is &lt;1.0.1i-54.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185430" version="1" comment="kernel-default is &lt;3.12.69-60.64.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185431" version="1" comment="kernel-default-devel is &lt;3.12.69-60.64.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185432" version="1" comment="kernel-default-extra is &lt;3.12.69-60.64.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185433" version="1" comment="kernel-devel is &lt;3.12.69-60.64.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185434" version="1" comment="kernel-macros is &lt;3.12.69-60.64.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185435" version="1" comment="kernel-source is &lt;3.12.69-60.64.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185436" version="1" comment="kernel-syms is &lt;3.12.69-60.64.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185437" version="1" comment="kernel-xen is &lt;3.12.69-60.64.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185438" version="1" comment="kernel-xen-devel is &lt;3.12.69-60.64.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185439" version="1" comment="libXpm is &lt;3.5.11-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185440" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.131-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185441" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.131-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185442" version="1" comment="tigervnc is &lt;1.4.3-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185443" version="1" comment="xorg-x11-Xvnc is &lt;1.4.3-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185444" version="1" comment="kernel-default is &lt;3.12.69-60.64.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185445" version="1" comment="kernel-default-devel is &lt;3.12.69-60.64.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185446" version="1" comment="kernel-default-extra is &lt;3.12.69-60.64.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185447" version="1" comment="kernel-devel is &lt;3.12.69-60.64.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185448" version="1" comment="kernel-macros is &lt;3.12.69-60.64.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185449" version="1" comment="kernel-source is &lt;3.12.69-60.64.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185450" version="1" comment="kernel-syms is &lt;3.12.69-60.64.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185451" version="1" comment="kernel-xen is &lt;3.12.69-60.64.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185452" version="1" comment="kernel-xen-devel is &lt;3.12.69-60.64.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185453" version="1" comment="flash-player is &lt;24.0.0.221-158" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185454" version="1" comment="flash-player-gnome is &lt;24.0.0.221-158" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185455" version="1" comment="jasper is &lt;1.900.14-184" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185456" version="1" comment="libjasper1 is &lt;1.900.14-184" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185457" version="1" comment="libjasper1-32bit is &lt;1.900.14-184" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185458" version="1" comment="ImageMagick is &lt;6.8.8.1-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185459" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185460" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185461" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185462" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185463" version="1" comment="libblkid1 is &lt;2.25-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185464" version="1" comment="libblkid1-32bit is &lt;2.25-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185465" version="1" comment="libmount1 is &lt;2.25-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185466" version="1" comment="libmount1-32bit is &lt;2.25-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185467" version="1" comment="libsmartcols1 is &lt;2.25-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185468" version="1" comment="libuuid-devel is &lt;2.25-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185469" version="1" comment="libuuid1 is &lt;2.25-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185470" version="1" comment="libuuid1-32bit is &lt;2.25-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185471" version="1" comment="python-libmount is &lt;2.25-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185472" version="1" comment="util-linux is &lt;2.25-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185473" version="1" comment="util-linux-lang is &lt;2.25-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185474" version="1" comment="util-linux-systemd is &lt;2.25-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185475" version="1" comment="uuidd is &lt;2.25-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185476" version="1" comment="xen is &lt;4.5.5_06-22.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185477" version="1" comment="xen-kmp-default is &lt;4.5.5_06_k3.12.69_60.64.32-22.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185478" version="1" comment="xen-libs is &lt;4.5.5_06-22.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185479" version="1" comment="xen-libs-32bit is &lt;4.5.5_06-22.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185480" version="1" comment="libz1 is &lt;1.2.8-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185481" version="1" comment="libz1-32bit is &lt;1.2.8-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251815" version="1" comment="zlib is &lt;1.2.8-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185483" version="1" comment="bind is &lt;9.9.9P1-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185484" version="1" comment="bind-libs is &lt;9.9.9P1-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185485" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185486" version="1" comment="bind-utils is &lt;9.9.9P1-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185487" version="1" comment="compat-openssl098 is &lt;0.9.8j-105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185488" version="1" comment="openssh is &lt;6.6p1-54.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185489" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-54.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185490" version="1" comment="openssh-helpers is &lt;6.6p1-54.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185491" version="1" comment="libquicktime is &lt;1.2.4-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185492" version="1" comment="dracut is &lt;037-91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185493" version="1" comment="dbus-1 is &lt;1.8.22-24.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185494" version="1" comment="dbus-1-x11 is &lt;1.8.22-24.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185495" version="1" comment="libdbus-1-3 is &lt;1.8.22-24.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185496" version="1" comment="libdbus-1-3-32bit is &lt;1.8.22-24.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185497" version="1" comment="gegl is &lt;0.2.0-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185498" version="1" comment="gegl-0_2 is &lt;0.2.0-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185499" version="1" comment="gegl-0_2-lang is &lt;0.2.0-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185500" version="1" comment="libgegl-0_2-0 is &lt;0.2.0-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185501" version="1" comment="libvmtools0 is &lt;10.1.0-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185502" version="1" comment="open-vm-tools is &lt;10.1.0-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185503" version="1" comment="open-vm-tools-desktop is &lt;10.1.0-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185504" version="1" comment="flash-player is &lt;25.0.0.127-162" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185505" version="1" comment="flash-player-gnome is &lt;25.0.0.127-162" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185506" version="1" comment="MozillaFirefox is &lt;45.8.0esr-102" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185507" version="1" comment="MozillaFirefox-translations is &lt;45.8.0esr-102" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185508" version="1" comment="libpng16 is &lt;1.6.8-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185509" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185510" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185511" version="1" comment="libdcerpc0 is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185512" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185513" version="1" comment="libgensec0 is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185514" version="1" comment="libgensec0-32bit is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185515" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185516" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185517" version="1" comment="libndr-nbt0 is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185518" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185519" version="1" comment="libndr-standard0 is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185520" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185521" version="1" comment="libndr0 is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185522" version="1" comment="libndr0-32bit is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185523" version="1" comment="libnetapi0 is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185524" version="1" comment="libnetapi0-32bit is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185525" version="1" comment="libregistry0 is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185526" version="1" comment="libsamba-credentials0 is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185527" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185528" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185529" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185530" version="1" comment="libsamba-passdb0 is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185531" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185532" version="1" comment="libsamba-util0 is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185533" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185534" version="1" comment="libsamdb0 is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185535" version="1" comment="libsamdb0-32bit is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185536" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185537" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185538" version="1" comment="libsmbclient0 is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185539" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185540" version="1" comment="libsmbconf0 is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185541" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185542" version="1" comment="libsmbldap0 is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185543" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185544" version="1" comment="libtevent-util0 is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185545" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185546" version="1" comment="libwbclient0 is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185547" version="1" comment="libwbclient0-32bit is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185548" version="1" comment="samba is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185549" version="1" comment="samba-32bit is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185550" version="1" comment="samba-client is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185551" version="1" comment="samba-client-32bit is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185552" version="1" comment="samba-doc is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185553" version="1" comment="samba-libs is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185554" version="1" comment="samba-libs-32bit is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185555" version="1" comment="samba-winbind is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185556" version="1" comment="samba-winbind-32bit is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185557" version="1" comment="libpng12 is &lt;1.2.50-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185558" version="1" comment="kernel-default is &lt;3.12.69-60.64.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185559" version="1" comment="kernel-default-devel is &lt;3.12.69-60.64.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185560" version="1" comment="kernel-default-extra is &lt;3.12.69-60.64.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185561" version="1" comment="kernel-devel is &lt;3.12.69-60.64.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185562" version="1" comment="kernel-macros is &lt;3.12.69-60.64.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185563" version="1" comment="kernel-source is &lt;3.12.69-60.64.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185564" version="1" comment="kernel-syms is &lt;3.12.69-60.64.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185565" version="1" comment="kernel-xen is &lt;3.12.69-60.64.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185566" version="1" comment="kernel-xen-devel is &lt;3.12.69-60.64.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185567" version="1" comment="flash-player is &lt;24.0.0.194-155" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185568" version="1" comment="flash-player-gnome is &lt;24.0.0.194-155" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185569" version="1" comment="bind is &lt;9.9.9P1-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185570" version="1" comment="bind-libs is &lt;9.9.9P1-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185571" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185572" version="1" comment="bind-utils is &lt;9.9.9P1-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185573" version="1" comment="libpng15 is &lt;1.5.22-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185574" version="1" comment="jasper is &lt;1.900.14-194" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185575" version="1" comment="gstreamer is &lt;1.2.4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185576" version="1" comment="gstreamer-lang is &lt;1.2.4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185577" version="1" comment="gstreamer-utils is &lt;1.2.4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185578" version="1" comment="libgstreamer-1_0-0 is &lt;1.2.4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185579" version="1" comment="libgstreamer-1_0-0-32bit is &lt;1.2.4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185580" version="1" comment="typelib-1_0-Gst-1_0 is &lt;1.2.4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185581" version="1" comment="flash-player is &lt;25.0.0.148-165" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185582" version="1" comment="flash-player-gnome is &lt;25.0.0.148-165" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185583" version="1" comment="bind is &lt;9.9.9P1-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185584" version="1" comment="bind-libs is &lt;9.9.9P1-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185585" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185586" version="1" comment="bind-utils is &lt;9.9.9P1-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185587" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.36-11.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185588" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.36-11.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185589" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.36-11.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185590" version="1" comment="libgstapp-0_10-0 is &lt;0.10.36-11.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185591" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.36-11.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185592" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.36-11.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185593" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.36-11.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185594" version="1" comment="gstreamer-plugins-good is &lt;1.2.4-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185595" version="1" comment="gstreamer-plugins-good-lang is &lt;1.2.4-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185596" version="1" comment="gstreamer-plugins-base is &lt;1.2.4-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185597" version="1" comment="gstreamer-plugins-base-lang is &lt;1.2.4-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185598" version="1" comment="libgstallocators-1_0-0 is &lt;1.2.4-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185599" version="1" comment="libgstapp-1_0-0 is &lt;1.2.4-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185600" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.2.4-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185601" version="1" comment="libgstaudio-1_0-0 is &lt;1.2.4-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185602" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.2.4-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185603" version="1" comment="libgstfft-1_0-0 is &lt;1.2.4-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185604" version="1" comment="libgstfft-1_0-0-32bit is &lt;1.2.4-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185605" version="1" comment="libgstpbutils-1_0-0 is &lt;1.2.4-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185606" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.2.4-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185607" version="1" comment="libgstriff-1_0-0 is &lt;1.2.4-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185608" version="1" comment="libgstrtp-1_0-0 is &lt;1.2.4-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185609" version="1" comment="libgstrtsp-1_0-0 is &lt;1.2.4-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185610" version="1" comment="libgstsdp-1_0-0 is &lt;1.2.4-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185611" version="1" comment="libgsttag-1_0-0 is &lt;1.2.4-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185612" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.2.4-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185613" version="1" comment="libgstvideo-1_0-0 is &lt;1.2.4-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185614" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.2.4-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185615" version="1" comment="typelib-1_0-GstAudio-1_0 is &lt;1.2.4-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185616" version="1" comment="typelib-1_0-GstPbutils-1_0 is &lt;1.2.4-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185617" version="1" comment="typelib-1_0-GstTag-1_0 is &lt;1.2.4-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185618" version="1" comment="typelib-1_0-GstVideo-1_0 is &lt;1.2.4-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185619" version="1" comment="libsndfile is &lt;1.0.25-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185620" version="1" comment="libsndfile1 is &lt;1.0.25-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185621" version="1" comment="libsndfile1-32bit is &lt;1.0.25-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185622" version="1" comment="ntp is &lt;4.2.8p10-60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185623" version="1" comment="ntp-doc is &lt;4.2.8p10-60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185624" version="1" comment="libruby2_1-2_1 is &lt;2.1.9-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185625" version="1" comment="ruby2.1 is &lt;2.1.9-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185626" version="1" comment="ruby2.1-stdlib is &lt;2.1.9-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185627" version="1" comment="tigervnc is &lt;1.4.3-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185628" version="1" comment="xorg-x11-Xvnc is &lt;1.4.3-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251816" version="1" comment="zziplib is &lt;0.13.62-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185630" version="1" comment="update-alternatives is &lt;1.16.10-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185631" version="1" comment="libpcap is &lt;1.8.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185632" version="1" comment="libpcap1 is &lt;1.8.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185633" version="1" comment="libpcap1-32bit is &lt;1.8.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185634" version="1" comment="ghostscript is &lt;9.15-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185635" version="1" comment="ghostscript-x11 is &lt;9.15-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185636" version="1" comment="xen is &lt;4.5.5_10-22.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185637" version="1" comment="xen-kmp-default is &lt;4.5.5_10_k3.12.69_60.64.35-22.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185638" version="1" comment="xen-libs is &lt;4.5.5_10-22.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185639" version="1" comment="xen-libs-32bit is &lt;4.5.5_10-22.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185640" version="1" comment="graphite2 is &lt;1.3.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185641" version="1" comment="apparmor is &lt;2.8.2-54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185642" version="1" comment="apparmor-docs is &lt;2.8.2-54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185643" version="1" comment="apparmor-parser is &lt;2.8.2-54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185644" version="1" comment="apparmor-profiles is &lt;2.8.2-54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185645" version="1" comment="apparmor-utils is &lt;2.8.2-54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185646" version="1" comment="libapparmor1 is &lt;2.8.2-54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185647" version="1" comment="libapparmor1-32bit is &lt;2.8.2-54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185648" version="1" comment="pam_apparmor is &lt;2.8.2-54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185649" version="1" comment="pam_apparmor-32bit is &lt;2.8.2-54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185650" version="1" comment="perl-apparmor is &lt;2.8.2-54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185651" version="1" comment="firebird-classic is &lt;2.5.2.26539-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185652" version="1" comment="flash-player is &lt;25.0.0.171-168" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185653" version="1" comment="flash-player-gnome is &lt;25.0.0.171-168" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185654" version="1" comment="qemu is &lt;2.3.1-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185655" version="1" comment="qemu-block-curl is &lt;2.3.1-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185656" version="1" comment="qemu-ipxe is &lt;1.0.0-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185657" version="1" comment="qemu-kvm is &lt;2.3.1-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185658" version="1" comment="qemu-seabios is &lt;1.8.1-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185659" version="1" comment="qemu-sgabios is &lt;8-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185660" version="1" comment="qemu-tools is &lt;2.3.1-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185661" version="1" comment="qemu-vgabios is &lt;1.8.1-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185662" version="1" comment="qemu-x86 is &lt;2.3.1-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185663" version="1" comment="MozillaFirefox is &lt;45.9.0esr-105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185664" version="1" comment="MozillaFirefox-translations is &lt;45.9.0esr-105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185665" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.121-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185666" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.121-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185667" version="1" comment="libtirpc is &lt;0.2.3-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185668" version="1" comment="libtirpc1 is &lt;0.2.3-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185669" version="1" comment="libtirpc1-32bit is &lt;0.2.3-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185670" version="1" comment="libxslt is &lt;1.1.28-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185671" version="1" comment="libmysqlclient18 is &lt;10.0.30-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185672" version="1" comment="libmysqlclient18-32bit is &lt;10.0.30-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185673" version="1" comment="libmysqlclient_r18 is &lt;10.0.30-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185674" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.30-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185675" version="1" comment="mariadb is &lt;10.0.30-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185676" version="1" comment="mariadb-client is &lt;10.0.30-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185677" version="1" comment="mariadb-errormessages is &lt;10.0.30-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185678" version="1" comment="rpcbind is &lt;0.2.1_rc4-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185679" version="1" comment="kernel-default is &lt;3.12.74-60.64.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185680" version="1" comment="kernel-default-devel is &lt;3.12.74-60.64.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185681" version="1" comment="kernel-default-extra is &lt;3.12.74-60.64.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185682" version="1" comment="kernel-devel is &lt;3.12.74-60.64.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185683" version="1" comment="kernel-macros is &lt;3.12.74-60.64.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185684" version="1" comment="kernel-source is &lt;3.12.74-60.64.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185685" version="1" comment="kernel-syms is &lt;3.12.74-60.64.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185686" version="1" comment="kernel-xen is &lt;3.12.74-60.64.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185687" version="1" comment="kernel-xen-devel is &lt;3.12.74-60.64.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185688" version="1" comment="libxml2 is &lt;2.9.1-26.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185689" version="1" comment="libxml2-2 is &lt;2.9.1-26.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185690" version="1" comment="libxml2-2-32bit is &lt;2.9.1-26.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185691" version="1" comment="libxml2-tools is &lt;2.9.1-26.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185692" version="1" comment="python-libxml2 is &lt;2.9.1-26.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185693" version="1" comment="libsndfile is &lt;1.0.25-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185694" version="1" comment="libplist is &lt;1.8-10.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185695" version="1" comment="libplist++1 is &lt;1.8-10.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185696" version="1" comment="libplist1 is &lt;1.8-10.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185697" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185698" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185699" version="1" comment="libdcerpc0 is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185700" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185701" version="1" comment="libgensec0 is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185702" version="1" comment="libgensec0-32bit is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185703" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185704" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185705" version="1" comment="libndr-nbt0 is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185706" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185707" version="1" comment="libndr-standard0 is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185708" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185709" version="1" comment="libndr0 is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185710" version="1" comment="libndr0-32bit is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185711" version="1" comment="libnetapi0 is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185712" version="1" comment="libnetapi0-32bit is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185713" version="1" comment="libregistry0 is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185714" version="1" comment="libsamba-credentials0 is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185715" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185716" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185717" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185718" version="1" comment="libsamba-passdb0 is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185719" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185720" version="1" comment="libsamba-util0 is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185721" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185722" version="1" comment="libsamdb0 is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185723" version="1" comment="libsamdb0-32bit is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185724" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185725" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185726" version="1" comment="libsmbclient0 is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185727" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185728" version="1" comment="libsmbconf0 is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185729" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185730" version="1" comment="libsmbldap0 is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185731" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185732" version="1" comment="libtevent-util0 is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185733" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185734" version="1" comment="libwbclient0 is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185735" version="1" comment="libwbclient0-32bit is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185736" version="1" comment="samba is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185737" version="1" comment="samba-32bit is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185738" version="1" comment="samba-client is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185739" version="1" comment="samba-client-32bit is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185740" version="1" comment="samba-doc is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185741" version="1" comment="samba-libs is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185742" version="1" comment="samba-libs-32bit is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185743" version="1" comment="samba-winbind is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185744" version="1" comment="samba-winbind-32bit is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185745" version="1" comment="libwireshark8 is &lt;2.2.6-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185746" version="1" comment="libwiretap6 is &lt;2.2.6-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185747" version="1" comment="libwscodecs1 is &lt;2.2.6-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185748" version="1" comment="libwsutil7 is &lt;2.2.6-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185749" version="1" comment="wireshark is &lt;2.2.6-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185750" version="1" comment="wireshark-gtk is &lt;2.2.6-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185751" version="1" comment="sudo is &lt;1.8.10p3-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185752" version="1" comment="gstreamer-plugins-base is &lt;1.2.4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185753" version="1" comment="gstreamer-plugins-base-lang is &lt;1.2.4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185754" version="1" comment="libgstallocators-1_0-0 is &lt;1.2.4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185755" version="1" comment="libgstapp-1_0-0 is &lt;1.2.4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185756" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.2.4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185757" version="1" comment="libgstaudio-1_0-0 is &lt;1.2.4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185758" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.2.4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185759" version="1" comment="libgstfft-1_0-0 is &lt;1.2.4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185760" version="1" comment="libgstfft-1_0-0-32bit is &lt;1.2.4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185761" version="1" comment="libgstpbutils-1_0-0 is &lt;1.2.4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185762" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.2.4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185763" version="1" comment="libgstriff-1_0-0 is &lt;1.2.4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185764" version="1" comment="libgstrtp-1_0-0 is &lt;1.2.4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185765" version="1" comment="libgstrtsp-1_0-0 is &lt;1.2.4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185766" version="1" comment="libgstsdp-1_0-0 is &lt;1.2.4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185767" version="1" comment="libgsttag-1_0-0 is &lt;1.2.4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185768" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.2.4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185769" version="1" comment="libgstvideo-1_0-0 is &lt;1.2.4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185770" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.2.4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185771" version="1" comment="typelib-1_0-GstAudio-1_0 is &lt;1.2.4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185772" version="1" comment="typelib-1_0-GstPbutils-1_0 is &lt;1.2.4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185773" version="1" comment="typelib-1_0-GstTag-1_0 is &lt;1.2.4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185774" version="1" comment="typelib-1_0-GstVideo-1_0 is &lt;1.2.4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185775" version="1" comment="libX11 is &lt;1.6.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185776" version="1" comment="libX11-6 is &lt;1.6.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185777" version="1" comment="libX11-6-32bit is &lt;1.6.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185778" version="1" comment="libX11-data is &lt;1.6.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185779" version="1" comment="libX11-xcb1 is &lt;1.6.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185780" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185781" version="1" comment="libXfixes is &lt;5.0.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185782" version="1" comment="libXi is &lt;1.7.4-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185783" version="1" comment="libXi6 is &lt;1.7.4-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185784" version="1" comment="libXi6-32bit is &lt;1.7.4-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185785" version="1" comment="libXrender is &lt;0.9.8-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185786" version="1" comment="libXtst is &lt;1.2.2-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185787" version="1" comment="libXv is &lt;1.0.10-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185788" version="1" comment="libXvMC is &lt;1.0.8-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185789" version="1" comment="libpython3_4m1_0 is &lt;3.4.5-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185790" version="1" comment="python3 is &lt;3.4.5-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185791" version="1" comment="python3-base is &lt;3.4.5-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185792" version="1" comment="python3-curses is &lt;3.4.5-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185793" version="1" comment="qemu is &lt;2.6.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185794" version="1" comment="qemu-block-curl is &lt;2.6.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185795" version="1" comment="qemu-ipxe is &lt;1.0.0-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185796" version="1" comment="qemu-kvm is &lt;2.6.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185797" version="1" comment="qemu-seabios is &lt;1.9.1-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185798" version="1" comment="qemu-sgabios is &lt;8-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185799" version="1" comment="qemu-tools is &lt;2.6.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185800" version="1" comment="qemu-vgabios is &lt;1.9.1-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185801" version="1" comment="qemu-x86 is &lt;2.6.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185802" version="1" comment="sudo is &lt;1.8.10p3-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185803" version="1" comment="libblkid1 is &lt;2.28-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185804" version="1" comment="libblkid1-32bit is &lt;2.28-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185805" version="1" comment="libfdisk1 is &lt;2.28-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185806" version="1" comment="libmount1 is &lt;2.28-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185807" version="1" comment="libmount1-32bit is &lt;2.28-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185808" version="1" comment="libsmartcols1 is &lt;2.28-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185809" version="1" comment="libuuid-devel is &lt;2.28-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185810" version="1" comment="libuuid1 is &lt;2.28-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185811" version="1" comment="libuuid1-32bit is &lt;2.28-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185812" version="1" comment="python-libmount is &lt;2.28-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185813" version="1" comment="util-linux is &lt;2.28-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185814" version="1" comment="util-linux-lang is &lt;2.28-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185815" version="1" comment="util-linux-systemd is &lt;2.28-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185816" version="1" comment="uuidd is &lt;2.28-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185817" version="1" comment="kernel-default is &lt;4.4.21-84" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185818" version="1" comment="kernel-default-devel is &lt;4.4.21-84" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185819" version="1" comment="kernel-default-extra is &lt;4.4.21-84" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185820" version="1" comment="kernel-devel is &lt;4.4.21-84" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185821" version="1" comment="kernel-macros is &lt;4.4.21-84" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185822" version="1" comment="kernel-source is &lt;4.4.21-84" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185823" version="1" comment="kernel-syms is &lt;4.4.21-84" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185824" version="1" comment="xen is &lt;4.7.1_02-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185825" version="1" comment="xen-libs is &lt;4.7.1_02-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185826" version="1" comment="xen-libs-32bit is &lt;4.7.1_02-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185827" version="1" comment="kernel-default is &lt;4.4.21-90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185828" version="1" comment="kernel-default-devel is &lt;4.4.21-90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185829" version="1" comment="kernel-default-extra is &lt;4.4.21-90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185830" version="1" comment="kernel-devel is &lt;4.4.21-90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185831" version="1" comment="kernel-macros is &lt;4.4.21-90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185832" version="1" comment="kernel-source is &lt;4.4.21-90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185833" version="1" comment="kernel-syms is &lt;4.4.21-90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185834" version="1" comment="xen is &lt;4.7.1_04-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185835" version="1" comment="xen-libs is &lt;4.7.1_04-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185836" version="1" comment="xen-libs-32bit is &lt;4.7.1_04-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185837" version="1" comment="openjpeg2 is &lt;2.1.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185838" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185839" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185840" version="1" comment="libdcerpc0 is &lt;4.4.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185841" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185842" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185843" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185844" version="1" comment="libndr-nbt0 is &lt;4.4.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185845" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185846" version="1" comment="libndr-standard0 is &lt;4.4.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185847" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185848" version="1" comment="libndr0 is &lt;4.4.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185849" version="1" comment="libndr0-32bit is &lt;4.4.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185850" version="1" comment="libnetapi0 is &lt;4.4.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185851" version="1" comment="libnetapi0-32bit is &lt;4.4.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185852" version="1" comment="libsamba-credentials0 is &lt;4.4.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185853" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185854" version="1" comment="libsamba-errors0 is &lt;4.4.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185855" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185856" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185857" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185858" version="1" comment="libsamba-passdb0 is &lt;4.4.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185859" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185860" version="1" comment="libsamba-util0 is &lt;4.4.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185861" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185862" version="1" comment="libsamdb0 is &lt;4.4.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185863" version="1" comment="libsamdb0-32bit is &lt;4.4.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185864" version="1" comment="libsmbclient0 is &lt;4.4.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185865" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185866" version="1" comment="libsmbconf0 is &lt;4.4.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185867" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185868" version="1" comment="libsmbldap0 is &lt;4.4.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185869" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185870" version="1" comment="libtevent-util0 is &lt;4.4.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185871" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185872" version="1" comment="libwbclient0 is &lt;4.4.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185873" version="1" comment="libwbclient0-32bit is &lt;4.4.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185874" version="1" comment="samba is &lt;4.4.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185875" version="1" comment="samba-client is &lt;4.4.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185876" version="1" comment="samba-client-32bit is &lt;4.4.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185877" version="1" comment="samba-doc is &lt;4.4.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185878" version="1" comment="samba-libs is &lt;4.4.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185879" version="1" comment="samba-libs-32bit is &lt;4.4.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185880" version="1" comment="samba-winbind is &lt;4.4.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185881" version="1" comment="samba-winbind-32bit is &lt;4.4.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185882" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185883" version="1" comment="gstreamer-plugins-bad is &lt;1.8.3-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185884" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.8.3-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185885" version="1" comment="libgstadaptivedemux-1_0-0 is &lt;1.8.3-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185886" version="1" comment="libgstbadaudio-1_0-0 is &lt;1.8.3-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185887" version="1" comment="libgstbadbase-1_0-0 is &lt;1.8.3-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185888" version="1" comment="libgstbadvideo-1_0-0 is &lt;1.8.3-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185889" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.8.3-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185890" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.8.3-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185891" version="1" comment="libgstgl-1_0-0 is &lt;1.8.3-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185892" version="1" comment="libgstmpegts-1_0-0 is &lt;1.8.3-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185893" version="1" comment="libgstphotography-1_0-0 is &lt;1.8.3-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185894" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.8.3-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185895" version="1" comment="gstreamer-plugins-good is &lt;1.8.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185896" version="1" comment="gstreamer-plugins-good-lang is &lt;1.8.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185897" version="1" comment="sudo is &lt;1.8.10p3-10.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185898" version="1" comment="gstreamer-plugins-base is &lt;1.8.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185899" version="1" comment="gstreamer-plugins-base-lang is &lt;1.8.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185900" version="1" comment="libgstallocators-1_0-0 is &lt;1.8.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185901" version="1" comment="libgstapp-1_0-0 is &lt;1.8.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185902" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.8.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185903" version="1" comment="libgstaudio-1_0-0 is &lt;1.8.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185904" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.8.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185905" version="1" comment="libgstfft-1_0-0 is &lt;1.8.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185906" version="1" comment="libgstfft-1_0-0-32bit is &lt;1.8.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185907" version="1" comment="libgstpbutils-1_0-0 is &lt;1.8.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185908" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.8.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185909" version="1" comment="libgstriff-1_0-0 is &lt;1.8.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185910" version="1" comment="libgstrtp-1_0-0 is &lt;1.8.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185911" version="1" comment="libgstrtsp-1_0-0 is &lt;1.8.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185912" version="1" comment="libgstsdp-1_0-0 is &lt;1.8.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185913" version="1" comment="libgsttag-1_0-0 is &lt;1.8.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185914" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.8.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185915" version="1" comment="libgstvideo-1_0-0 is &lt;1.8.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185916" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.8.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185917" version="1" comment="typelib-1_0-GstAudio-1_0 is &lt;1.8.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185918" version="1" comment="typelib-1_0-GstPbutils-1_0 is &lt;1.8.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185919" version="1" comment="typelib-1_0-GstTag-1_0 is &lt;1.8.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185920" version="1" comment="typelib-1_0-GstVideo-1_0 is &lt;1.8.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185921" version="1" comment="cairo is &lt;1.15.2-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185922" version="1" comment="MozillaFirefox-branding-SLE is &lt;52-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185923" version="1" comment="libxml2 is &lt;2.9.4-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185924" version="1" comment="libxml2-2 is &lt;2.9.4-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185925" version="1" comment="libxml2-2-32bit is &lt;2.9.4-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185926" version="1" comment="libxml2-tools is &lt;2.9.4-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185927" version="1" comment="python-libxml2 is &lt;2.9.4-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185928" version="1" comment="poppler is &lt;0.24.4-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185929" version="1" comment="postgresql94 is &lt;9.4.12-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185930" version="1" comment="kernel-default is &lt;4.4.59-92.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185931" version="1" comment="kernel-default-devel is &lt;4.4.59-92.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185932" version="1" comment="kernel-default-extra is &lt;4.4.59-92.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185933" version="1" comment="kernel-devel is &lt;4.4.59-92.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185934" version="1" comment="kernel-macros is &lt;4.4.59-92.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185935" version="1" comment="kernel-source is &lt;4.4.59-92.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185936" version="1" comment="kernel-syms is &lt;4.4.59-92.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185937" version="1" comment="libxml2 is &lt;2.9.4-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185938" version="1" comment="xen is &lt;4.7.2_06-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185939" version="1" comment="xen-libs is &lt;4.7.2_06-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185940" version="1" comment="xen-libs-32bit is &lt;4.7.2_06-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185941" version="1" comment="qemu is &lt;2.6.2-41.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185942" version="1" comment="qemu-block-curl is &lt;2.6.2-41.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185943" version="1" comment="qemu-ipxe is &lt;1.0.0-41.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185944" version="1" comment="qemu-kvm is &lt;2.6.2-41.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185945" version="1" comment="qemu-seabios is &lt;1.9.1-41.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185946" version="1" comment="qemu-sgabios is &lt;8-41.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185947" version="1" comment="qemu-tools is &lt;2.6.2-41.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185948" version="1" comment="qemu-vgabios is &lt;1.9.1-41.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185949" version="1" comment="qemu-x86 is &lt;2.6.2-41.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185950" version="1" comment="libsystemd0 is &lt;228-149" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185951" version="1" comment="libsystemd0-32bit is &lt;228-149" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185952" version="1" comment="libudev1 is &lt;228-149" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185953" version="1" comment="libudev1-32bit is &lt;228-149" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185954" version="1" comment="systemd is &lt;228-149" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185955" version="1" comment="systemd-32bit is &lt;228-149" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185956" version="1" comment="systemd-bash-completion is &lt;228-149" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185957" version="1" comment="systemd-sysvinit is &lt;228-149" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185958" version="1" comment="udev is &lt;228-149" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185959" version="1" comment="sudo is &lt;1.8.10p3-10.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185960" version="1" comment="libquicktime is &lt;1.2.4-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185961" version="1" comment="libquicktime0 is &lt;1.2.4-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185962" version="1" comment="libgcrypt is &lt;1.6.1-16.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185963" version="1" comment="libgcrypt20 is &lt;1.6.1-16.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185964" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185965" version="1" comment="libcares2 is &lt;1.9.1-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185966" version="1" comment="libcares2-32bit is &lt;1.9.1-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185967" version="1" comment="libncurses5 is &lt;5.9-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185968" version="1" comment="libncurses5-32bit is &lt;5.9-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185969" version="1" comment="libncurses6 is &lt;5.9-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185970" version="1" comment="libncurses6-32bit is &lt;5.9-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185971" version="1" comment="ncurses is &lt;5.9-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185972" version="1" comment="ncurses-devel is &lt;5.9-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185973" version="1" comment="ncurses-utils is &lt;5.9-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185974" version="1" comment="tack is &lt;5.9-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185975" version="1" comment="terminfo is &lt;5.9-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185976" version="1" comment="terminfo-base is &lt;5.9-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185977" version="1" comment="libixion is &lt;0.12.1-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185978" version="1" comment="libixion-0_12-0 is &lt;0.12.1-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185979" version="1" comment="libmwaw is &lt;0.3.11-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185980" version="1" comment="libmwaw-0_3-3 is &lt;0.3.11-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185981" version="1" comment="liborcus is &lt;0.12.1-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185982" version="1" comment="liborcus-0_12-0 is &lt;0.12.1-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185983" version="1" comment="libreoffice-base is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185984" version="1" comment="libreoffice-base-drivers-mysql is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185985" version="1" comment="libreoffice-base-drivers-postgresql is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185986" version="1" comment="libreoffice-calc is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185987" version="1" comment="libreoffice-calc-extensions is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185988" version="1" comment="libreoffice-draw is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185989" version="1" comment="libreoffice-filters-optional is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185990" version="1" comment="libreoffice-gnome is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185991" version="1" comment="libreoffice-icon-theme-galaxy is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185992" version="1" comment="libreoffice-icon-theme-tango is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185993" version="1" comment="libreoffice-impress is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185994" version="1" comment="libreoffice-l10n-af is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185995" version="1" comment="libreoffice-l10n-ar is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185996" version="1" comment="libreoffice-l10n-ca is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185997" version="1" comment="libreoffice-l10n-cs is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185998" version="1" comment="libreoffice-l10n-da is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009185999" version="1" comment="libreoffice-l10n-de is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186000" version="1" comment="libreoffice-l10n-en is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186001" version="1" comment="libreoffice-l10n-es is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186002" version="1" comment="libreoffice-l10n-fi is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186003" version="1" comment="libreoffice-l10n-fr is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186004" version="1" comment="libreoffice-l10n-gu is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186005" version="1" comment="libreoffice-l10n-hi is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186006" version="1" comment="libreoffice-l10n-hu is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186007" version="1" comment="libreoffice-l10n-it is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186008" version="1" comment="libreoffice-l10n-ja is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186009" version="1" comment="libreoffice-l10n-ko is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186010" version="1" comment="libreoffice-l10n-nb is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186011" version="1" comment="libreoffice-l10n-nl is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186012" version="1" comment="libreoffice-l10n-nn is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186013" version="1" comment="libreoffice-l10n-pl is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186014" version="1" comment="libreoffice-l10n-pt_BR is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186015" version="1" comment="libreoffice-l10n-pt_PT is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186016" version="1" comment="libreoffice-l10n-ro is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186017" version="1" comment="libreoffice-l10n-ru is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186018" version="1" comment="libreoffice-l10n-sk is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186019" version="1" comment="libreoffice-l10n-sv is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186020" version="1" comment="libreoffice-l10n-xh is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186021" version="1" comment="libreoffice-l10n-zh_CN is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186022" version="1" comment="libreoffice-l10n-zh_TW is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186023" version="1" comment="libreoffice-l10n-zu is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186024" version="1" comment="libreoffice-mailmerge is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186025" version="1" comment="libreoffice-math is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186026" version="1" comment="libreoffice-officebean is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186027" version="1" comment="libreoffice-pyuno is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186028" version="1" comment="libreoffice-writer is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186029" version="1" comment="libreoffice-writer-extensions is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186030" version="1" comment="libreofficekit is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186031" version="1" comment="libstaroffice is &lt;0.0.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186032" version="1" comment="libstaroffice-0_0-0 is &lt;0.0.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186033" version="1" comment="libzmf is &lt;0.0.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186034" version="1" comment="libzmf-0_0-0 is &lt;0.0.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186035" version="1" comment="myspell-af_NA is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186036" version="1" comment="myspell-af_ZA is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186037" version="1" comment="myspell-ar is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186038" version="1" comment="myspell-ar_AE is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186039" version="1" comment="myspell-ar_BH is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186040" version="1" comment="myspell-ar_DZ is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186041" version="1" comment="myspell-ar_EG is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186042" version="1" comment="myspell-ar_IQ is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186043" version="1" comment="myspell-ar_JO is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186044" version="1" comment="myspell-ar_KW is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186045" version="1" comment="myspell-ar_LB is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186046" version="1" comment="myspell-ar_LY is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186047" version="1" comment="myspell-ar_MA is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186048" version="1" comment="myspell-ar_OM is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186049" version="1" comment="myspell-ar_QA is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186050" version="1" comment="myspell-ar_SA is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186051" version="1" comment="myspell-ar_SD is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186052" version="1" comment="myspell-ar_SY is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186053" version="1" comment="myspell-ar_TN is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186054" version="1" comment="myspell-ar_YE is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186055" version="1" comment="myspell-be_BY is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186056" version="1" comment="myspell-bg_BG is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186057" version="1" comment="myspell-bn_BD is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186058" version="1" comment="myspell-bn_IN is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186059" version="1" comment="myspell-bs is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186060" version="1" comment="myspell-bs_BA is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186061" version="1" comment="myspell-ca is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186062" version="1" comment="myspell-ca_AD is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186063" version="1" comment="myspell-ca_ES is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186064" version="1" comment="myspell-ca_ES_valencia is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186065" version="1" comment="myspell-ca_FR is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186066" version="1" comment="myspell-ca_IT is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186067" version="1" comment="myspell-cs_CZ is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186068" version="1" comment="myspell-da_DK is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186069" version="1" comment="myspell-de is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186070" version="1" comment="myspell-de_AT is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186071" version="1" comment="myspell-de_CH is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186072" version="1" comment="myspell-de_DE is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186073" version="1" comment="myspell-dictionaries is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186074" version="1" comment="myspell-el_GR is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186075" version="1" comment="myspell-en is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186076" version="1" comment="myspell-en_AU is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186077" version="1" comment="myspell-en_BS is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186078" version="1" comment="myspell-en_BZ is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186079" version="1" comment="myspell-en_CA is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186080" version="1" comment="myspell-en_GB is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186081" version="1" comment="myspell-en_GH is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186082" version="1" comment="myspell-en_IE is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186083" version="1" comment="myspell-en_IN is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186084" version="1" comment="myspell-en_JM is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186085" version="1" comment="myspell-en_MW is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186086" version="1" comment="myspell-en_NA is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186087" version="1" comment="myspell-en_NZ is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186088" version="1" comment="myspell-en_PH is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186089" version="1" comment="myspell-en_TT is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186090" version="1" comment="myspell-en_US is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186091" version="1" comment="myspell-en_ZA is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186092" version="1" comment="myspell-en_ZW is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186093" version="1" comment="myspell-es is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186094" version="1" comment="myspell-es_AR is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186095" version="1" comment="myspell-es_BO is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186096" version="1" comment="myspell-es_CL is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186097" version="1" comment="myspell-es_CO is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186098" version="1" comment="myspell-es_CR is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186099" version="1" comment="myspell-es_CU is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186100" version="1" comment="myspell-es_DO is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186101" version="1" comment="myspell-es_EC is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186102" version="1" comment="myspell-es_ES is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186103" version="1" comment="myspell-es_GT is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186104" version="1" comment="myspell-es_HN is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186105" version="1" comment="myspell-es_MX is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186106" version="1" comment="myspell-es_NI is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186107" version="1" comment="myspell-es_PA is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186108" version="1" comment="myspell-es_PE is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186109" version="1" comment="myspell-es_PR is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186110" version="1" comment="myspell-es_PY is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186111" version="1" comment="myspell-es_SV is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186112" version="1" comment="myspell-es_UY is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186113" version="1" comment="myspell-es_VE is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186114" version="1" comment="myspell-et_EE is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186115" version="1" comment="myspell-fr_BE is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186116" version="1" comment="myspell-fr_CA is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186117" version="1" comment="myspell-fr_CH is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186118" version="1" comment="myspell-fr_FR is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186119" version="1" comment="myspell-fr_LU is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186120" version="1" comment="myspell-fr_MC is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186121" version="1" comment="myspell-gu_IN is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186122" version="1" comment="myspell-he_IL is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186123" version="1" comment="myspell-hi_IN is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186124" version="1" comment="myspell-hr_HR is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186125" version="1" comment="myspell-hu_HU is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186126" version="1" comment="myspell-it_IT is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186127" version="1" comment="myspell-lightproof-en is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186128" version="1" comment="myspell-lightproof-hu_HU is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186129" version="1" comment="myspell-lightproof-pt_BR is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186130" version="1" comment="myspell-lightproof-ru_RU is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186131" version="1" comment="myspell-lo_LA is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186132" version="1" comment="myspell-lt_LT is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186133" version="1" comment="myspell-lv_LV is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186134" version="1" comment="myspell-nb_NO is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186135" version="1" comment="myspell-nl_BE is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186136" version="1" comment="myspell-nl_NL is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186137" version="1" comment="myspell-nn_NO is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186138" version="1" comment="myspell-no is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186139" version="1" comment="myspell-pl_PL is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186140" version="1" comment="myspell-pt_AO is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186141" version="1" comment="myspell-pt_BR is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186142" version="1" comment="myspell-pt_PT is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186143" version="1" comment="myspell-ro is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186144" version="1" comment="myspell-ro_RO is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186145" version="1" comment="myspell-ru_RU is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186146" version="1" comment="myspell-sk_SK is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186147" version="1" comment="myspell-sl_SI is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186148" version="1" comment="myspell-sr is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186149" version="1" comment="myspell-sr_CS is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186150" version="1" comment="myspell-sr_Latn_CS is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186151" version="1" comment="myspell-sr_Latn_RS is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186152" version="1" comment="myspell-sr_RS is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186153" version="1" comment="myspell-sv_FI is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186154" version="1" comment="myspell-sv_SE is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186155" version="1" comment="myspell-te is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186156" version="1" comment="myspell-te_IN is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186157" version="1" comment="myspell-th_TH is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186158" version="1" comment="myspell-uk_UA is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186159" version="1" comment="myspell-vi is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186160" version="1" comment="myspell-vi_VN is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186161" version="1" comment="myspell-zu_ZA is &lt;20170511-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186162" version="1" comment="gnutls is &lt;3.2.15-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186163" version="1" comment="libgnutls28 is &lt;3.2.15-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186164" version="1" comment="libgnutls28-32bit is &lt;3.2.15-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186165" version="1" comment="libICE is &lt;1.0.8-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186166" version="1" comment="libICE6 is &lt;1.0.8-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186167" version="1" comment="libICE6-32bit is &lt;1.0.8-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186168" version="1" comment="libspice-server1 is &lt;0.12.7-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186169" version="1" comment="spice is &lt;0.12.7-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186170" version="1" comment="kernel-default is &lt;4.4.74-92.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186171" version="1" comment="kernel-default-devel is &lt;4.4.74-92.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186172" version="1" comment="kernel-default-extra is &lt;4.4.74-92.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186173" version="1" comment="kernel-devel is &lt;4.4.74-92.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186174" version="1" comment="kernel-macros is &lt;4.4.74-92.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186175" version="1" comment="kernel-source is &lt;4.4.74-92.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186176" version="1" comment="kernel-syms is &lt;4.4.74-92.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186177" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186178" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186179" version="1" comment="libXdmcp is &lt;1.1.1-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186180" version="1" comment="libXdmcp6 is &lt;1.1.1-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186181" version="1" comment="libXdmcp6-32bit is &lt;1.1.1-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186182" version="1" comment="evince is &lt;3.20.1-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186183" version="1" comment="evince-browser-plugin is &lt;3.20.1-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186184" version="1" comment="evince-lang is &lt;3.20.1-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186185" version="1" comment="evince-plugin-djvudocument is &lt;3.20.1-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186186" version="1" comment="evince-plugin-dvidocument is &lt;3.20.1-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186187" version="1" comment="evince-plugin-pdfdocument is &lt;3.20.1-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186188" version="1" comment="evince-plugin-psdocument is &lt;3.20.1-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186189" version="1" comment="evince-plugin-tiffdocument is &lt;3.20.1-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186190" version="1" comment="evince-plugin-xpsdocument is &lt;3.20.1-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186191" version="1" comment="libevdocument3-4 is &lt;3.20.1-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186192" version="1" comment="libevview3-3 is &lt;3.20.1-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186193" version="1" comment="nautilus-evince is &lt;3.20.1-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186194" version="1" comment="typelib-1_0-EvinceDocument-3_0 is &lt;3.20.1-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186195" version="1" comment="typelib-1_0-EvinceView-3_0 is &lt;3.20.1-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186196" version="1" comment="dracut is &lt;044.1-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186197" version="1" comment="libsystemd0 is &lt;228-150.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186198" version="1" comment="libsystemd0-32bit is &lt;228-150.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186199" version="1" comment="libudev1 is &lt;228-150.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186200" version="1" comment="libudev1-32bit is &lt;228-150.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186201" version="1" comment="systemd is &lt;228-150.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186202" version="1" comment="systemd-32bit is &lt;228-150.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186203" version="1" comment="systemd-bash-completion is &lt;228-150.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186204" version="1" comment="systemd-sysvinit is &lt;228-150.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186205" version="1" comment="udev is &lt;228-150.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186206" version="1" comment="jasper is &lt;1.900.14-195.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186207" version="1" comment="libjasper1 is &lt;1.900.14-195.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186208" version="1" comment="libjasper1-32bit is &lt;1.900.14-195.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186209" version="1" comment="libquicktime is &lt;1.2.4-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186211" version="1" comment="libical is &lt;1.0.1-16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186214" version="1" comment="libpoppler44 is &lt;0.24.4-14.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186215" version="1" comment="poppler is &lt;0.24.4-14.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186216" version="1" comment="libpoppler-glib8 is &lt;0.43.0-16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186217" version="1" comment="libpoppler-qt4-4 is &lt;0.43.0-16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186218" version="1" comment="libpoppler60 is &lt;0.43.0-16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186219" version="1" comment="poppler-qt is &lt;0.43.0-16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186220" version="1" comment="poppler-tools is &lt;0.43.0-16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186221" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.36-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186222" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.36-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186223" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.36-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186224" version="1" comment="libgstapp-0_10-0 is &lt;0.10.36-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186225" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.36-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186226" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.36-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186227" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.36-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186228" version="1" comment="libmysqlclient18 is &lt;10.0.31-29.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186229" version="1" comment="libmysqlclient18-32bit is &lt;10.0.31-29.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186230" version="1" comment="libmysqlclient_r18 is &lt;10.0.31-29.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186231" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.31-29.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186232" version="1" comment="mariadb is &lt;10.0.31-29.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186233" version="1" comment="mariadb-client is &lt;10.0.31-29.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186234" version="1" comment="mariadb-errormessages is &lt;10.0.31-29.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186235" version="1" comment="libwireshark8 is &lt;2.2.8-48.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186236" version="1" comment="libwiretap6 is &lt;2.2.8-48.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186237" version="1" comment="libwscodecs1 is &lt;2.2.8-48.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186238" version="1" comment="libwsutil7 is &lt;2.2.8-48.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186239" version="1" comment="wireshark is &lt;2.2.8-48.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186240" version="1" comment="wireshark-gtk is &lt;2.2.8-48.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186241" version="1" comment="kernel-default is &lt;4.4.74-92.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186242" version="1" comment="kernel-default-devel is &lt;4.4.74-92.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186243" version="1" comment="kernel-default-extra is &lt;4.4.74-92.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186244" version="1" comment="kernel-devel is &lt;4.4.74-92.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186245" version="1" comment="kernel-macros is &lt;4.4.74-92.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186246" version="1" comment="kernel-source is &lt;4.4.74-92.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186247" version="1" comment="kernel-syms is &lt;4.4.74-92.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186248" version="1" comment="libzypp is &lt;16.15.2-27.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251817" version="1" comment="zypper is &lt;1.13.30-18.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251818" version="1" comment="zypper-log is &lt;1.13.30-18.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186251" version="1" comment="libncurses5 is &lt;5.9-50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186252" version="1" comment="libncurses5-32bit is &lt;5.9-50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186253" version="1" comment="libncurses6 is &lt;5.9-50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186254" version="1" comment="libncurses6-32bit is &lt;5.9-50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186255" version="1" comment="ncurses is &lt;5.9-50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186256" version="1" comment="ncurses-devel is &lt;5.9-50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186257" version="1" comment="ncurses-utils is &lt;5.9-50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186258" version="1" comment="tack is &lt;5.9-50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186259" version="1" comment="terminfo is &lt;5.9-50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186260" version="1" comment="terminfo-base is &lt;5.9-50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186261" version="1" comment="gstreamer-0_10-plugins-bad is &lt;0.10.23-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186262" version="1" comment="gstreamer-0_10-plugins-bad-lang is &lt;0.10.23-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186263" version="1" comment="libgstbasecamerabinsrc-0_10-23 is &lt;0.10.23-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186264" version="1" comment="libgstbasecamerabinsrc-0_10-23-32bit is &lt;0.10.23-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186265" version="1" comment="libgstbasevideo-0_10-23 is &lt;0.10.23-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186266" version="1" comment="libgstbasevideo-0_10-23-32bit is &lt;0.10.23-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186267" version="1" comment="libgstcodecparsers-0_10-23 is &lt;0.10.23-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186268" version="1" comment="libgstphotography-0_10-23 is &lt;0.10.23-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186269" version="1" comment="libgstphotography-0_10-23-32bit is &lt;0.10.23-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186270" version="1" comment="libgstsignalprocessor-0_10-23 is &lt;0.10.23-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186271" version="1" comment="libgstsignalprocessor-0_10-23-32bit is &lt;0.10.23-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186272" version="1" comment="libgstvdp-0_10-23 is &lt;0.10.23-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186273" version="1" comment="libgstvdp-0_10-23-32bit is &lt;0.10.23-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186274" version="1" comment="puppet is &lt;3.8.5-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186275" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.40.18-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186276" version="1" comment="librsvg is &lt;2.40.18-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186277" version="1" comment="librsvg-2-2 is &lt;2.40.18-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186278" version="1" comment="librsvg-2-2-32bit is &lt;2.40.18-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186279" version="1" comment="rsvg-view is &lt;2.40.18-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186280" version="1" comment="libsoup is &lt;2.54.1-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186281" version="1" comment="libsoup-2_4-1 is &lt;2.54.1-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186282" version="1" comment="libsoup-2_4-1-32bit is &lt;2.54.1-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186283" version="1" comment="libsoup-lang is &lt;2.54.1-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186284" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.54.1-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186285" version="1" comment="kernel-default is &lt;4.4.74-92.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186286" version="1" comment="kernel-default-devel is &lt;4.4.74-92.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186287" version="1" comment="kernel-default-extra is &lt;4.4.74-92.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186288" version="1" comment="kernel-devel is &lt;4.4.74-92.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186289" version="1" comment="kernel-macros is &lt;4.4.74-92.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186290" version="1" comment="kernel-source is &lt;4.4.74-92.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186291" version="1" comment="kernel-syms is &lt;4.4.74-92.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186296" version="1" comment="libopenjp2-7 is &lt;2.1.0-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186297" version="1" comment="openjpeg2 is &lt;2.1.0-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186298" version="1" comment="libxml2 is &lt;2.9.4-46.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186299" version="1" comment="libxml2-2 is &lt;2.9.4-46.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186300" version="1" comment="libxml2-2-32bit is &lt;2.9.4-46.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186301" version="1" comment="libxml2-tools is &lt;2.9.4-46.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186302" version="1" comment="python-libxml2 is &lt;2.9.4-46.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186303" version="1" comment="curl is &lt;7.37.0-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186304" version="1" comment="libcurl4 is &lt;7.37.0-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186305" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186306" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.144-27.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186307" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.144-27.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186308" version="1" comment="libplist is &lt;1.12-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186311" version="1" comment="ImageMagick is &lt;6.8.8.1-71.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186312" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186313" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186314" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186315" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186316" version="1" comment="gnome-shell is &lt;3.20.4-77.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186317" version="1" comment="gnome-shell-browser-plugin is &lt;3.20.4-77.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186318" version="1" comment="gnome-shell-calendar is &lt;3.20.4-77.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186319" version="1" comment="gnome-shell-lang is &lt;3.20.4-77.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186322" version="1" comment="openssh is &lt;7.2p2-66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186323" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186324" version="1" comment="openssh-helpers is &lt;7.2p2-66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186325" version="1" comment="libraw is &lt;0.15.4-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186326" version="1" comment="libraw9 is &lt;0.15.4-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186330" version="1" comment="icu is &lt;52.1-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186331" version="1" comment="libicu52_1 is &lt;52.1-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186332" version="1" comment="libicu52_1-32bit is &lt;52.1-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186333" version="1" comment="libicu52_1-data is &lt;52.1-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186334" version="1" comment="xen is &lt;4.7.3_03-43.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186335" version="1" comment="xen-libs is &lt;4.7.3_03-43.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186336" version="1" comment="xen-libs-32bit is &lt;4.7.3_03-43.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186337" version="1" comment="postgresql94 is &lt;9.4.13-21.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186338" version="1" comment="libecpg6 is &lt;9.6.4-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186339" version="1" comment="libpq5 is &lt;9.6.4-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186340" version="1" comment="libpq5-32bit is &lt;9.6.4-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186341" version="1" comment="postgresql96 is &lt;9.6.4-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186342" version="1" comment="postgresql96-libs is &lt;9.6.4-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186343" version="1" comment="gdk-pixbuf is &lt;2.34.0-19.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186344" version="1" comment="gdk-pixbuf-lang is &lt;2.34.0-19.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186345" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.34.0-19.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186346" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.34.0-19.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186347" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.34.0-19.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186348" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.34.0-19.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186349" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.34.0-19.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186350" version="1" comment="evince is &lt;3.20.1-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186351" version="1" comment="evince-browser-plugin is &lt;3.20.1-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186352" version="1" comment="evince-lang is &lt;3.20.1-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186353" version="1" comment="evince-plugin-djvudocument is &lt;3.20.1-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186354" version="1" comment="evince-plugin-dvidocument is &lt;3.20.1-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186355" version="1" comment="evince-plugin-pdfdocument is &lt;3.20.1-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186356" version="1" comment="evince-plugin-psdocument is &lt;3.20.1-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186357" version="1" comment="evince-plugin-tiffdocument is &lt;3.20.1-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186358" version="1" comment="evince-plugin-xpsdocument is &lt;3.20.1-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186359" version="1" comment="libevdocument3-4 is &lt;3.20.1-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186360" version="1" comment="libevview3-3 is &lt;3.20.1-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186361" version="1" comment="nautilus-evince is &lt;3.20.1-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186362" version="1" comment="typelib-1_0-EvinceDocument-3_0 is &lt;3.20.1-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186363" version="1" comment="typelib-1_0-EvinceView-3_0 is &lt;3.20.1-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186364" version="1" comment="libsystemd0 is &lt;228-132" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186365" version="1" comment="libsystemd0-32bit is &lt;228-132" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186366" version="1" comment="libudev1 is &lt;228-132" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186367" version="1" comment="libudev1-32bit is &lt;228-132" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186368" version="1" comment="systemd is &lt;228-132" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186369" version="1" comment="systemd-32bit is &lt;228-132" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186370" version="1" comment="systemd-bash-completion is &lt;228-132" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186371" version="1" comment="systemd-sysvinit is &lt;228-132" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186372" version="1" comment="udev is &lt;228-132" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186374" version="1" comment="dbus-1 is &lt;1.8.22-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186375" version="1" comment="dbus-1-x11 is &lt;1.8.22-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186376" version="1" comment="libdbus-1-3 is &lt;1.8.22-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186377" version="1" comment="libdbus-1-3-32bit is &lt;1.8.22-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186378" version="1" comment="xen is &lt;4.7.3_04-43.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186379" version="1" comment="xen-libs is &lt;4.7.3_04-43.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186380" version="1" comment="xen-libs-32bit is &lt;4.7.3_04-43.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186381" version="1" comment="kernel-default is &lt;4.4.74-92.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186382" version="1" comment="kernel-default-devel is &lt;4.4.74-92.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186383" version="1" comment="kernel-default-extra is &lt;4.4.74-92.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186384" version="1" comment="kernel-devel is &lt;4.4.74-92.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186385" version="1" comment="kernel-macros is &lt;4.4.74-92.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186386" version="1" comment="kernel-source is &lt;4.4.74-92.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186387" version="1" comment="kernel-syms is &lt;4.4.74-92.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186388" version="1" comment="cpp48 is &lt;4.8.5-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186389" version="1" comment="gcc48 is &lt;4.8.5-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186390" version="1" comment="gcc48-32bit is &lt;4.8.5-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186391" version="1" comment="gcc48-c++ is &lt;4.8.5-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186392" version="1" comment="gcc48-gij is &lt;4.8.5-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186393" version="1" comment="gcc48-gij-32bit is &lt;4.8.5-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186394" version="1" comment="gcc48-info is &lt;4.8.5-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186395" version="1" comment="libasan0 is &lt;4.8.5-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186396" version="1" comment="libasan0-32bit is &lt;4.8.5-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186397" version="1" comment="libgcj48 is &lt;4.8.5-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186398" version="1" comment="libgcj48-32bit is &lt;4.8.5-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186399" version="1" comment="libgcj48-jar is &lt;4.8.5-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186400" version="1" comment="libgcj_bc1 is &lt;4.8.5-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186401" version="1" comment="libstdc++48-devel is &lt;4.8.5-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186402" version="1" comment="libstdc++48-devel-32bit is &lt;4.8.5-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186407" version="1" comment="libzip is &lt;0.11.1-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186409" version="1" comment="libwireshark8 is &lt;2.2.9-48.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186410" version="1" comment="libwiretap6 is &lt;2.2.9-48.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186411" version="1" comment="libwscodecs1 is &lt;2.2.9-48.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186412" version="1" comment="libwsutil7 is &lt;2.2.9-48.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186413" version="1" comment="wireshark is &lt;2.2.9-48.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186414" version="1" comment="wireshark-gtk is &lt;2.2.9-48.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186415" version="1" comment="libtiff5 is &lt;4.0.8-44.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186416" version="1" comment="libtiff5-32bit is &lt;4.0.8-44.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186417" version="1" comment="tiff is &lt;4.0.8-44.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186418" version="1" comment="liblouis is &lt;2.6.4-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186419" version="1" comment="liblouis-data is &lt;2.6.4-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186420" version="1" comment="liblouis9 is &lt;2.6.4-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186421" version="1" comment="python3-louis is &lt;2.6.4-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186422" version="1" comment="MozillaFirefox is &lt;52.3.0esr-109.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186423" version="1" comment="MozillaFirefox-translations is &lt;52.3.0esr-109.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186425" version="1" comment="libopenjp2-7 is &lt;2.1.0-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186426" version="1" comment="openjpeg2 is &lt;2.1.0-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186427" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186428" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186429" version="1" comment="libdcerpc0 is &lt;4.4.2-38.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186430" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186431" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186432" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186433" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186434" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186435" version="1" comment="libndr-standard0 is &lt;4.4.2-38.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186436" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186437" version="1" comment="libndr0 is &lt;4.4.2-38.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186438" version="1" comment="libndr0-32bit is &lt;4.4.2-38.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186439" version="1" comment="libnetapi0 is &lt;4.4.2-38.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186440" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186441" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186442" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186443" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186444" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186445" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186446" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186447" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186448" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186449" version="1" comment="libsamba-util0 is &lt;4.4.2-38.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186450" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186451" version="1" comment="libsamdb0 is &lt;4.4.2-38.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186452" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186453" version="1" comment="libsmbclient0 is &lt;4.4.2-38.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186454" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186455" version="1" comment="libsmbconf0 is &lt;4.4.2-38.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186456" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186457" version="1" comment="libsmbldap0 is &lt;4.4.2-38.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186458" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186459" version="1" comment="libtevent-util0 is &lt;4.4.2-38.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186460" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186461" version="1" comment="libwbclient0 is &lt;4.4.2-38.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186462" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186463" version="1" comment="samba is &lt;4.4.2-38.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186464" version="1" comment="samba-client is &lt;4.4.2-38.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186465" version="1" comment="samba-client-32bit is &lt;4.4.2-38.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186466" version="1" comment="samba-doc is &lt;4.4.2-38.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186467" version="1" comment="samba-libs is &lt;4.4.2-38.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186468" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186469" version="1" comment="samba-winbind is &lt;4.4.2-38.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186470" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186471" version="1" comment="krb5 is &lt;1.12.5-40.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186472" version="1" comment="krb5-32bit is &lt;1.12.5-40.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186473" version="1" comment="krb5-client is &lt;1.12.5-40.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186474" version="1" comment="MozillaFirefox is &lt;52.4.0esr-109.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186475" version="1" comment="MozillaFirefox-translations is &lt;52.4.0esr-109.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186476" version="1" comment="libfreebl3 is &lt;3.29.5-58.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186477" version="1" comment="libfreebl3-32bit is &lt;3.29.5-58.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186478" version="1" comment="libsoftokn3 is &lt;3.29.5-58.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186479" version="1" comment="libsoftokn3-32bit is &lt;3.29.5-58.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186480" version="1" comment="mozilla-nss is &lt;3.29.5-58.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186481" version="1" comment="mozilla-nss-32bit is &lt;3.29.5-58.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186482" version="1" comment="mozilla-nss-certs is &lt;3.29.5-58.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186483" version="1" comment="mozilla-nss-certs-32bit is &lt;3.29.5-58.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186484" version="1" comment="mozilla-nss-sysinit is &lt;3.29.5-58.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186485" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.29.5-58.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186486" version="1" comment="mozilla-nss-tools is &lt;3.29.5-58.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186487" version="1" comment="libvirt is &lt;2.0.0-27.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186488" version="1" comment="libvirt-client is &lt;2.0.0-27.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186489" version="1" comment="libvirt-client-32bit is &lt;2.0.0-27.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186490" version="1" comment="libvirt-daemon is &lt;2.0.0-27.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186491" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186492" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186493" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186494" version="1" comment="libvirt-daemon-driver-libxl is &lt;2.0.0-27.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186495" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186496" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186497" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186498" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186499" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186500" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186501" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186502" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186503" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186504" version="1" comment="libvirt-daemon-xen is &lt;2.0.0-27.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186505" version="1" comment="libvirt-doc is &lt;2.0.0-27.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186506" version="1" comment="xerces-j2 is &lt;2.8.1-268.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186508" version="1" comment="curl is &lt;7.37.0-37.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186509" version="1" comment="libcurl4 is &lt;7.37.0-37.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186510" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186513" version="1" comment="libwireshark8 is &lt;2.2.10-48.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186514" version="1" comment="libwiretap6 is &lt;2.2.10-48.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186515" version="1" comment="libwscodecs1 is &lt;2.2.10-48.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186516" version="1" comment="libwsutil7 is &lt;2.2.10-48.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186517" version="1" comment="wireshark is &lt;2.2.10-48.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186518" version="1" comment="wireshark-gtk is &lt;2.2.10-48.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186519" version="1" comment="xen is &lt;4.7.3_06-43.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186520" version="1" comment="xen-libs is &lt;4.7.3_06-43.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186521" version="1" comment="xen-libs-32bit is &lt;4.7.3_06-43.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186522" version="1" comment="kernel-default is &lt;4.4.90-92.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186523" version="1" comment="kernel-default-devel is &lt;4.4.90-92.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186524" version="1" comment="kernel-default-extra is &lt;4.4.90-92.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186525" version="1" comment="kernel-devel is &lt;4.4.90-92.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186526" version="1" comment="kernel-macros is &lt;4.4.90-92.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186527" version="1" comment="kernel-source is &lt;4.4.90-92.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186528" version="1" comment="kernel-syms is &lt;4.4.90-92.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186529" version="1" comment="wget is &lt;1.14-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186530" version="1" comment="SuSEfirewall2 is &lt;3.6.312-2.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186531" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.18.0-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186532" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.18.0-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186533" version="1" comment="libwebkit2gtk3-lang is &lt;2.18.0-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186534" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.18.0-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186535" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.18.0-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186536" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.18.0-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186537" version="1" comment="webkit2gtk3 is &lt;2.18.0-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186538" version="1" comment="libwpd is &lt;0.10.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186540" version="1" comment="qemu is &lt;2.6.2-41.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186541" version="1" comment="qemu-block-curl is &lt;2.6.2-41.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186542" version="1" comment="qemu-ipxe is &lt;1.0.0-41.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186543" version="1" comment="qemu-kvm is &lt;2.6.2-41.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186544" version="1" comment="qemu-seabios is &lt;1.9.1-41.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186545" version="1" comment="qemu-sgabios is &lt;8-41.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186546" version="1" comment="qemu-tools is &lt;2.6.2-41.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186547" version="1" comment="qemu-vgabios is &lt;1.9.1-41.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186548" version="1" comment="qemu-x86 is &lt;2.6.2-41.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186549" version="1" comment="libipa_hbac0 is &lt;1.13.4-34.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186550" version="1" comment="libsss_idmap0 is &lt;1.13.4-34.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186552" version="1" comment="python-sssd-config is &lt;1.13.4-34.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186553" version="1" comment="sssd is &lt;1.13.4-34.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186554" version="1" comment="sssd-32bit is &lt;1.13.4-34.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186555" version="1" comment="sssd-ad is &lt;1.13.4-34.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186556" version="1" comment="sssd-ipa is &lt;1.13.4-34.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186557" version="1" comment="sssd-krb5 is &lt;1.13.4-34.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186558" version="1" comment="sssd-krb5-common is &lt;1.13.4-34.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186559" version="1" comment="sssd-ldap is &lt;1.13.4-34.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186560" version="1" comment="sssd-proxy is &lt;1.13.4-34.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186561" version="1" comment="sssd-tools is &lt;1.13.4-34.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186562" version="1" comment="krb5 is &lt;1.12.5-40.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186563" version="1" comment="krb5-32bit is &lt;1.12.5-40.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186564" version="1" comment="krb5-client is &lt;1.12.5-40.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186565" version="1" comment="ImageMagick is &lt;6.8.8.1-71.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186566" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186567" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186568" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186569" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186570" version="1" comment="shadow is &lt;4.2.1-27.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186572" version="1" comment="poppler is &lt;0.24.4-14.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186573" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186574" version="1" comment="samba is &lt;4.2.4-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186575" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.151-27.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186576" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.151-27.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186577" version="1" comment="ceph is &lt;10.2.4+git.1481215985.12b091b-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186578" version="1" comment="ceph-common is &lt;10.2.4+git.1481215985.12b091b-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186579" version="1" comment="libcephfs1 is &lt;10.2.4+git.1481215985.12b091b-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186580" version="1" comment="librados2 is &lt;10.2.4+git.1481215985.12b091b-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186581" version="1" comment="libradosstriper1 is &lt;10.2.4+git.1481215985.12b091b-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186582" version="1" comment="librbd1 is &lt;10.2.4+git.1481215985.12b091b-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186583" version="1" comment="python-cephfs is &lt;10.2.4+git.1481215985.12b091b-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186584" version="1" comment="python-rados is &lt;10.2.4+git.1481215985.12b091b-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186585" version="1" comment="python-rbd is &lt;10.2.4+git.1481215985.12b091b-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186586" version="1" comment="file is &lt;5.22-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186587" version="1" comment="file-magic is &lt;5.22-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186588" version="1" comment="libmagic1 is &lt;5.22-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186589" version="1" comment="libmagic1-32bit is &lt;5.22-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186590" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186591" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186597" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186598" version="1" comment="samba is &lt;4.2.4-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186599" version="1" comment="perl is &lt;5.18.2-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186600" version="1" comment="perl-32bit is &lt;5.18.2-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186601" version="1" comment="perl-base is &lt;5.18.2-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186602" version="1" comment="perl-doc is &lt;5.18.2-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186603" version="1" comment="kernel-firmware is &lt;20170530-21.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186604" version="1" comment="ucode-amd is &lt;20170530-21.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186605" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186606" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186607" version="1" comment="libdcerpc0 is &lt;4.4.2-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186608" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186609" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186610" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186611" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186612" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186613" version="1" comment="libndr-standard0 is &lt;4.4.2-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186614" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186615" version="1" comment="libndr0 is &lt;4.4.2-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186616" version="1" comment="libndr0-32bit is &lt;4.4.2-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186617" version="1" comment="libnetapi0 is &lt;4.4.2-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186618" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186619" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186620" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186621" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186622" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186623" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186624" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186625" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186626" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186627" version="1" comment="libsamba-util0 is &lt;4.4.2-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186628" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186629" version="1" comment="libsamdb0 is &lt;4.4.2-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186630" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186631" version="1" comment="libsmbclient0 is &lt;4.4.2-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186632" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186633" version="1" comment="libsmbconf0 is &lt;4.4.2-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186634" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186635" version="1" comment="libsmbldap0 is &lt;4.4.2-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186636" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186637" version="1" comment="libtevent-util0 is &lt;4.4.2-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186638" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186639" version="1" comment="libwbclient0 is &lt;4.4.2-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186640" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186641" version="1" comment="samba is &lt;4.4.2-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186642" version="1" comment="samba-client is &lt;4.4.2-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186643" version="1" comment="samba-client-32bit is &lt;4.4.2-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186644" version="1" comment="samba-doc is &lt;4.4.2-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186645" version="1" comment="samba-libs is &lt;4.4.2-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186646" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186647" version="1" comment="samba-winbind is &lt;4.4.2-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186648" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186649" version="1" comment="libxml2 is &lt;2.9.4-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186650" version="1" comment="libxml2-2 is &lt;2.9.4-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186651" version="1" comment="libxml2-2-32bit is &lt;2.9.4-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186652" version="1" comment="libxml2-tools is &lt;2.9.4-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186653" version="1" comment="python-libxml2 is &lt;2.9.4-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186654" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186655" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186656" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186657" version="1" comment="openssl is &lt;1.0.2j-60.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186658" version="1" comment="binutils is &lt;2.29.1-9.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186659" version="1" comment="xen is &lt;4.7.4_02-43.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186660" version="1" comment="xen-libs is &lt;4.7.4_02-43.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186661" version="1" comment="xen-libs-32bit is &lt;4.7.4_02-43.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186662" version="1" comment="MozillaFirefox is &lt;52.5.0esr-109.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186663" version="1" comment="MozillaFirefox-translations is &lt;52.5.0esr-109.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251819" version="1" comment="zlib is &lt;1.2.8-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186665" version="1" comment="libspice-server1 is &lt;0.12.7-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186666" version="1" comment="spice is &lt;0.12.7-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186667" version="1" comment="libXcursor is &lt;1.1.14-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186668" version="1" comment="libXcursor1 is &lt;1.1.14-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186669" version="1" comment="libXcursor1-32bit is &lt;1.1.14-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186670" version="1" comment="kernel-default is &lt;4.4.90-92.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186671" version="1" comment="kernel-default-devel is &lt;4.4.90-92.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186672" version="1" comment="kernel-default-extra is &lt;4.4.90-92.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186673" version="1" comment="kernel-devel is &lt;4.4.90-92.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186674" version="1" comment="kernel-macros is &lt;4.4.90-92.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186675" version="1" comment="kernel-source is &lt;4.4.90-92.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186676" version="1" comment="kernel-syms is &lt;4.4.90-92.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186677" version="1" comment="openssh is &lt;7.2p2-74.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186678" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186679" version="1" comment="openssh-helpers is &lt;7.2p2-74.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186680" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186681" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186682" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186683" version="1" comment="openssl is &lt;1.0.2j-60.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186684" version="1" comment="ImageMagick is &lt;6.8.8.1-71.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186685" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186686" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186687" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186688" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186689" version="1" comment="libraw is &lt;0.15.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186690" version="1" comment="libraw9 is &lt;0.15.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186691" version="1" comment="libecpg6 is &lt;9.6.6-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186692" version="1" comment="libpq5 is &lt;9.6.6-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186693" version="1" comment="libpq5-32bit is &lt;9.6.6-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186694" version="1" comment="postgresql96 is &lt;9.6.6-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186695" version="1" comment="postgresql96-libs is &lt;9.6.6-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186696" version="1" comment="kernel-default is &lt;4.4.103-92.53" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186697" version="1" comment="kernel-default-devel is &lt;4.4.103-92.53" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186698" version="1" comment="kernel-default-extra is &lt;4.4.103-92.53" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186699" version="1" comment="kernel-devel is &lt;4.4.103-92.53" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186700" version="1" comment="kernel-macros is &lt;4.4.103-92.53" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186701" version="1" comment="kernel-source is &lt;4.4.103-92.53" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186702" version="1" comment="kernel-syms is &lt;4.4.103-92.53" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186703" version="1" comment="evince is &lt;3.20.2-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186704" version="1" comment="evince-browser-plugin is &lt;3.20.2-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186705" version="1" comment="evince-lang is &lt;3.20.2-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186706" version="1" comment="evince-plugin-djvudocument is &lt;3.20.2-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186707" version="1" comment="evince-plugin-dvidocument is &lt;3.20.2-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186708" version="1" comment="evince-plugin-pdfdocument is &lt;3.20.2-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186709" version="1" comment="evince-plugin-psdocument is &lt;3.20.2-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186710" version="1" comment="evince-plugin-tiffdocument is &lt;3.20.2-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186711" version="1" comment="evince-plugin-xpsdocument is &lt;3.20.2-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186712" version="1" comment="libevdocument3-4 is &lt;3.20.2-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186713" version="1" comment="libevview3-3 is &lt;3.20.2-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186714" version="1" comment="nautilus-evince is &lt;3.20.2-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186715" version="1" comment="typelib-1_0-EvinceDocument-3_0 is &lt;3.20.2-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186716" version="1" comment="typelib-1_0-EvinceView-3_0 is &lt;3.20.2-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186717" version="1" comment="libwireshark8 is &lt;2.2.11-48.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186718" version="1" comment="libwiretap6 is &lt;2.2.11-48.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186719" version="1" comment="libwscodecs1 is &lt;2.2.11-48.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186720" version="1" comment="libwsutil7 is &lt;2.2.11-48.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186721" version="1" comment="wireshark is &lt;2.2.11-48.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186722" version="1" comment="wireshark-gtk is &lt;2.2.11-48.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186723" version="1" comment="gdk-pixbuf is &lt;2.34.0-19.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186724" version="1" comment="gdk-pixbuf-lang is &lt;2.34.0-19.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186725" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.34.0-19.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186726" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.34.0-19.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186727" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.34.0-19.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186728" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.34.0-19.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186729" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.34.0-19.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186730" version="1" comment="libblkid1 is &lt;2.28-44.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186731" version="1" comment="libblkid1-32bit is &lt;2.28-44.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186732" version="1" comment="libfdisk1 is &lt;2.28-44.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186733" version="1" comment="libmount1 is &lt;2.28-44.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186734" version="1" comment="libmount1-32bit is &lt;2.28-44.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186735" version="1" comment="libsmartcols1 is &lt;2.28-44.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186736" version="1" comment="libuuid-devel is &lt;2.28-44.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186737" version="1" comment="libuuid1 is &lt;2.28-44.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186738" version="1" comment="libuuid1-32bit is &lt;2.28-44.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186739" version="1" comment="python-libmount is &lt;2.28-44.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186740" version="1" comment="util-linux is &lt;2.28-44.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186741" version="1" comment="util-linux-lang is &lt;2.28-44.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186742" version="1" comment="util-linux-systemd is &lt;2.28-44.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186743" version="1" comment="uuidd is &lt;2.28-44.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186744" version="1" comment="xen is &lt;4.7.1_06-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186745" version="1" comment="xen-libs is &lt;4.7.1_06-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186746" version="1" comment="xen-libs-32bit is &lt;4.7.1_06-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186747" version="1" comment="kernel-default is &lt;4.4.49-92.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186748" version="1" comment="kernel-default-devel is &lt;4.4.49-92.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186749" version="1" comment="kernel-default-extra is &lt;4.4.49-92.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186750" version="1" comment="kernel-devel is &lt;4.4.49-92.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186751" version="1" comment="kernel-macros is &lt;4.4.49-92.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186752" version="1" comment="kernel-source is &lt;4.4.49-92.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186753" version="1" comment="kernel-syms is &lt;4.4.49-92.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186754" version="1" comment="libXvnc1 is &lt;1.6.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186755" version="1" comment="tigervnc is &lt;1.6.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186756" version="1" comment="xorg-x11-Xvnc is &lt;1.6.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186757" version="1" comment="qemu is &lt;2.6.2-41.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186758" version="1" comment="qemu-block-curl is &lt;2.6.2-41.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186759" version="1" comment="qemu-ipxe is &lt;1.0.0-41.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186760" version="1" comment="qemu-kvm is &lt;2.6.2-41.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186761" version="1" comment="qemu-seabios is &lt;1.9.1-41.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186762" version="1" comment="qemu-sgabios is &lt;8-41.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186763" version="1" comment="qemu-tools is &lt;2.6.2-41.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186764" version="1" comment="qemu-vgabios is &lt;1.9.1-41.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186765" version="1" comment="qemu-x86 is &lt;2.6.2-41.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186766" version="1" comment="gegl is &lt;0.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186767" version="1" comment="libvmtools0 is &lt;10.1.0-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186768" version="1" comment="open-vm-tools is &lt;10.1.0-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186769" version="1" comment="open-vm-tools-desktop is &lt;10.1.0-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186770" version="1" comment="virglrenderer is &lt;0.5.0-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186771" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186772" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186773" version="1" comment="libdcerpc0 is &lt;4.4.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186774" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186775" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186776" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186777" version="1" comment="libndr-nbt0 is &lt;4.4.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186778" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186779" version="1" comment="libndr-standard0 is &lt;4.4.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186780" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186781" version="1" comment="libndr0 is &lt;4.4.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186782" version="1" comment="libndr0-32bit is &lt;4.4.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186783" version="1" comment="libnetapi0 is &lt;4.4.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186784" version="1" comment="libnetapi0-32bit is &lt;4.4.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186785" version="1" comment="libsamba-credentials0 is &lt;4.4.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186786" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186787" version="1" comment="libsamba-errors0 is &lt;4.4.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186788" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186789" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186790" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186791" version="1" comment="libsamba-passdb0 is &lt;4.4.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186792" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186793" version="1" comment="libsamba-util0 is &lt;4.4.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186794" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186795" version="1" comment="libsamdb0 is &lt;4.4.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186796" version="1" comment="libsamdb0-32bit is &lt;4.4.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186797" version="1" comment="libsmbclient0 is &lt;4.4.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186798" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186799" version="1" comment="libsmbconf0 is &lt;4.4.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186800" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186801" version="1" comment="libsmbldap0 is &lt;4.4.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186802" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186803" version="1" comment="libtevent-util0 is &lt;4.4.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186804" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186805" version="1" comment="libwbclient0 is &lt;4.4.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186806" version="1" comment="libwbclient0-32bit is &lt;4.4.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186807" version="1" comment="samba is &lt;4.4.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186808" version="1" comment="samba-client is &lt;4.4.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186809" version="1" comment="samba-client-32bit is &lt;4.4.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186810" version="1" comment="samba-doc is &lt;4.4.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186811" version="1" comment="samba-libs is &lt;4.4.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186812" version="1" comment="samba-libs-32bit is &lt;4.4.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186813" version="1" comment="samba-winbind is &lt;4.4.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186814" version="1" comment="samba-winbind-32bit is &lt;4.4.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186815" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186816" version="1" comment="kernel-default is &lt;4.4.49-92.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186817" version="1" comment="kernel-default-devel is &lt;4.4.49-92.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186818" version="1" comment="kernel-default-extra is &lt;4.4.49-92.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186819" version="1" comment="kernel-devel is &lt;4.4.49-92.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186820" version="1" comment="kernel-macros is &lt;4.4.49-92.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186821" version="1" comment="kernel-source is &lt;4.4.49-92.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186822" version="1" comment="kernel-syms is &lt;4.4.49-92.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186823" version="1" comment="dracut is &lt;044-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186824" version="1" comment="xen is &lt;4.7.2_02-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186825" version="1" comment="xen-libs is &lt;4.7.2_02-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186826" version="1" comment="xen-libs-32bit is &lt;4.7.2_02-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186827" version="1" comment="gstreamer-plugins-good is &lt;1.8.3-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186828" version="1" comment="gstreamer-plugins-good-lang is &lt;1.8.3-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186829" version="1" comment="xen is &lt;4.7.2_04-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186830" version="1" comment="xen-libs is &lt;4.7.2_04-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186831" version="1" comment="xen-libs-32bit is &lt;4.7.2_04-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186832" version="1" comment="qemu is &lt;2.6.2-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186833" version="1" comment="qemu-block-curl is &lt;2.6.2-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186834" version="1" comment="qemu-ipxe is &lt;1.0.0-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186835" version="1" comment="qemu-kvm is &lt;2.6.2-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186836" version="1" comment="qemu-seabios is &lt;1.9.1-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186837" version="1" comment="qemu-sgabios is &lt;8-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186838" version="1" comment="qemu-tools is &lt;2.6.2-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186839" version="1" comment="qemu-vgabios is &lt;1.9.1-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186840" version="1" comment="qemu-x86 is &lt;2.6.2-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186841" version="1" comment="kernel-default is &lt;4.4.59-92.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186842" version="1" comment="kernel-default-devel is &lt;4.4.59-92.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186843" version="1" comment="kernel-default-extra is &lt;4.4.59-92.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186844" version="1" comment="kernel-devel is &lt;4.4.59-92.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186845" version="1" comment="kernel-macros is &lt;4.4.59-92.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186846" version="1" comment="kernel-source is &lt;4.4.59-92.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186847" version="1" comment="kernel-syms is &lt;4.4.59-92.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186848" version="1" comment="libtirpc is &lt;1.0.1-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186849" version="1" comment="libplist is &lt;1.12-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186850" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186851" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186852" version="1" comment="libdcerpc0 is &lt;4.4.2-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186853" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186854" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186855" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186856" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186857" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186858" version="1" comment="libndr-standard0 is &lt;4.4.2-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186859" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186860" version="1" comment="libndr0 is &lt;4.4.2-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186861" version="1" comment="libndr0-32bit is &lt;4.4.2-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186862" version="1" comment="libnetapi0 is &lt;4.4.2-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186863" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186864" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186865" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186866" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186867" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186868" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186869" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186870" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186871" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186872" version="1" comment="libsamba-util0 is &lt;4.4.2-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186873" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186874" version="1" comment="libsamdb0 is &lt;4.4.2-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186875" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186876" version="1" comment="libsmbclient0 is &lt;4.4.2-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186877" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186878" version="1" comment="libsmbconf0 is &lt;4.4.2-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186879" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186880" version="1" comment="libsmbldap0 is &lt;4.4.2-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186881" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186882" version="1" comment="libtevent-util0 is &lt;4.4.2-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186883" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186884" version="1" comment="libwbclient0 is &lt;4.4.2-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186885" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186886" version="1" comment="samba is &lt;4.4.2-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186887" version="1" comment="samba-client is &lt;4.4.2-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186888" version="1" comment="samba-client-32bit is &lt;4.4.2-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186889" version="1" comment="samba-doc is &lt;4.4.2-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186890" version="1" comment="samba-libs is &lt;4.4.2-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186891" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186892" version="1" comment="samba-winbind is &lt;4.4.2-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186893" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186894" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186895" version="1" comment="kernel-default is &lt;4.4.38-93" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186896" version="1" comment="kernel-default-devel is &lt;4.4.38-93" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186897" version="1" comment="kernel-default-extra is &lt;4.4.38-93" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186898" version="1" comment="kernel-devel is &lt;4.4.38-93" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186899" version="1" comment="kernel-macros is &lt;4.4.38-93" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186900" version="1" comment="kernel-source is &lt;4.4.38-93" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186901" version="1" comment="kernel-syms is &lt;4.4.38-93" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186902" version="1" comment="sudo is &lt;1.8.10p3-10.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186903" version="1" comment="libxml2 is &lt;2.9.4-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186904" version="1" comment="libxml2-2 is &lt;2.9.4-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186905" version="1" comment="libxml2-2-32bit is &lt;2.9.4-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186906" version="1" comment="libxml2-tools is &lt;2.9.4-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186907" version="1" comment="python-libxml2 is &lt;2.9.4-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186908" version="1" comment="libnettle is &lt;2.7.1-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186909" version="1" comment="libxml2 is &lt;2.9.4-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186910" version="1" comment="libxml2-2 is &lt;2.9.4-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186911" version="1" comment="libxml2-2-32bit is &lt;2.9.4-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186912" version="1" comment="libxml2-tools is &lt;2.9.4-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186913" version="1" comment="python-libxml2 is &lt;2.9.4-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186914" version="1" comment="libQt5Concurrent5 is &lt;5.6.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186915" version="1" comment="libQt5Core5 is &lt;5.6.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186916" version="1" comment="libQt5DBus5 is &lt;5.6.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186917" version="1" comment="libQt5Gui5 is &lt;5.6.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186918" version="1" comment="libQt5Network5 is &lt;5.6.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186919" version="1" comment="libQt5OpenGL5 is &lt;5.6.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186920" version="1" comment="libQt5PrintSupport5 is &lt;5.6.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186921" version="1" comment="libQt5Sql5 is &lt;5.6.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186922" version="1" comment="libQt5Sql5-mysql is &lt;5.6.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186923" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186924" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186925" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186926" version="1" comment="libQt5Test5 is &lt;5.6.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186927" version="1" comment="libQt5Widgets5 is &lt;5.6.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186928" version="1" comment="libQt5Xml5 is &lt;5.6.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186929" version="1" comment="libQtQuick5 is &lt;5.6.1-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186930" version="1" comment="libqt5-qtbase is &lt;5.6.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186931" version="1" comment="libqt5-qtdeclarative is &lt;5.6.1-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186932" version="1" comment="libgcrypt is &lt;1.6.1-16.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186933" version="1" comment="kernel-default is &lt;4.4.59-92.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186934" version="1" comment="kernel-default-devel is &lt;4.4.59-92.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186935" version="1" comment="kernel-default-extra is &lt;4.4.59-92.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186936" version="1" comment="kernel-devel is &lt;4.4.59-92.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186937" version="1" comment="kernel-macros is &lt;4.4.59-92.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186938" version="1" comment="kernel-source is &lt;4.4.59-92.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186939" version="1" comment="kernel-syms is &lt;4.4.59-92.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186940" version="1" comment="openvpn is &lt;2.3.8-16.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186941" version="1" comment="gd is &lt;2.1.0-24.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186942" version="1" comment="gd-32bit is &lt;2.1.0-24.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186943" version="1" comment="kernel-default is &lt;4.4.103-92.56" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186944" version="1" comment="kernel-default-devel is &lt;4.4.103-92.56" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186945" version="1" comment="kernel-default-extra is &lt;4.4.103-92.56" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186946" version="1" comment="kernel-devel is &lt;4.4.103-92.56" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186947" version="1" comment="kernel-macros is &lt;4.4.103-92.56" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186948" version="1" comment="kernel-source is &lt;4.4.103-92.56" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186949" version="1" comment="kernel-syms is &lt;4.4.103-92.56" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186950" version="1" comment="rsync is &lt;3.1.0-13.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186952" version="1" comment="libvpx is &lt;1.3.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186956" version="1" comment="libwireshark8 is &lt;2.2.12-48.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186957" version="1" comment="libwiretap6 is &lt;2.2.12-48.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186958" version="1" comment="libwscodecs1 is &lt;2.2.12-48.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186959" version="1" comment="libwsutil7 is &lt;2.2.12-48.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186960" version="1" comment="wireshark is &lt;2.2.12-48.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186961" version="1" comment="wireshark-gtk is &lt;2.2.12-48.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186962" version="1" comment="libexif is &lt;0.6.21-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186965" version="1" comment="ImageMagick is &lt;6.8.8.1-71.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186966" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186967" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186968" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186969" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186970" version="1" comment="libevent is &lt;2.0.21-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186972" version="1" comment="curl is &lt;7.37.0-37.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186973" version="1" comment="libcurl4 is &lt;7.37.0-37.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186974" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186975" version="1" comment="libvorbis is &lt;1.3.3-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186976" version="1" comment="libvorbis0 is &lt;1.3.3-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186977" version="1" comment="libvorbis0-32bit is &lt;1.3.3-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186978" version="1" comment="libvorbisenc2 is &lt;1.3.3-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186979" version="1" comment="libvorbisenc2-32bit is &lt;1.3.3-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186980" version="1" comment="libvorbisfile3 is &lt;1.3.3-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186981" version="1" comment="libvorbisfile3-32bit is &lt;1.3.3-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186982" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.18.5-2.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186983" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.18.5-2.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186984" version="1" comment="libwebkit2gtk3-lang is &lt;2.18.5-2.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186985" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.18.5-2.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186986" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.18.5-2.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186987" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.18.5-2.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186988" version="1" comment="webkit2gtk3 is &lt;2.18.5-2.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186990" version="1" comment="clamav is &lt;0.99.3-33.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186991" version="1" comment="gd is &lt;2.1.0-24.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186992" version="1" comment="gd-32bit is &lt;2.1.0-24.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009186997" version="1" comment="ncurses is &lt;5.9-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187003" version="1" comment="libsystemd0 is &lt;228-150.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187004" version="1" comment="libsystemd0-32bit is &lt;228-150.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187005" version="1" comment="libudev1 is &lt;228-150.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187006" version="1" comment="libudev1-32bit is &lt;228-150.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187007" version="1" comment="systemd is &lt;228-150.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187008" version="1" comment="systemd-32bit is &lt;228-150.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187009" version="1" comment="systemd-bash-completion is &lt;228-150.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187010" version="1" comment="systemd-sysvinit is &lt;228-150.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187011" version="1" comment="udev is &lt;228-150.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187012" version="1" comment="bind is &lt;9.9.9P1-63.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187013" version="1" comment="bind-libs is &lt;9.9.9P1-63.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187014" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-63.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187015" version="1" comment="bind-utils is &lt;9.9.9P1-63.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187016" version="1" comment="libXfont is &lt;1.5.1-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187020" version="1" comment="ImageMagick is &lt;6.8.8.1-71.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187021" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187022" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187023" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187024" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187025" version="1" comment="libsndfile is &lt;1.0.25-36.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187026" version="1" comment="libsndfile1 is &lt;1.0.25-36.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187027" version="1" comment="libsndfile1-32bit is &lt;1.0.25-36.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187036" version="1" comment="MozillaFirefox is &lt;52.6.0esr-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187037" version="1" comment="MozillaFirefox-translations is &lt;52.6.0esr-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187038" version="1" comment="qemu is &lt;2.6.2-41.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187039" version="1" comment="qemu-block-curl is &lt;2.6.2-41.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187040" version="1" comment="qemu-ipxe is &lt;1.0.0-41.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187041" version="1" comment="qemu-kvm is &lt;2.6.2-41.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187042" version="1" comment="qemu-seabios is &lt;1.9.1-41.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187043" version="1" comment="qemu-sgabios is &lt;8-41.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187044" version="1" comment="qemu-tools is &lt;2.6.2-41.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187045" version="1" comment="qemu-vgabios is &lt;1.9.1-41.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187046" version="1" comment="qemu-x86 is &lt;2.6.2-41.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187047" version="1" comment="libmysqlclient18 is &lt;10.0.33-29.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187048" version="1" comment="libmysqlclient18-32bit is &lt;10.0.33-29.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187049" version="1" comment="libmysqlclient_r18 is &lt;10.0.33-29.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187050" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.33-29.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187051" version="1" comment="mariadb is &lt;10.0.33-29.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187052" version="1" comment="mariadb-client is &lt;10.0.33-29.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187053" version="1" comment="mariadb-errormessages is &lt;10.0.33-29.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187054" version="1" comment="libvirt is &lt;2.0.0-27.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187055" version="1" comment="libvirt-client is &lt;2.0.0-27.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187056" version="1" comment="libvirt-client-32bit is &lt;2.0.0-27.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187057" version="1" comment="libvirt-daemon is &lt;2.0.0-27.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187058" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187059" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187060" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187061" version="1" comment="libvirt-daemon-driver-libxl is &lt;2.0.0-27.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187062" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187063" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187064" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187065" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187066" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187067" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187068" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187069" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187070" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187071" version="1" comment="libvirt-daemon-xen is &lt;2.0.0-27.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187072" version="1" comment="libvirt-doc is &lt;2.0.0-27.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187073" version="1" comment="libxml2 is &lt;2.9.4-46.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187074" version="1" comment="libxml2-2 is &lt;2.9.4-46.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187075" version="1" comment="libxml2-2-32bit is &lt;2.9.4-46.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187076" version="1" comment="libxml2-tools is &lt;2.9.4-46.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187077" version="1" comment="python-libxml2 is &lt;2.9.4-46.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187078" version="1" comment="ghostscript is &lt;9.15-23.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187079" version="1" comment="ghostscript-x11 is &lt;9.15-23.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187080" version="1" comment="kernel-default is &lt;4.4.114-92.64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187081" version="1" comment="kernel-default-devel is &lt;4.4.114-92.64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187082" version="1" comment="kernel-default-extra is &lt;4.4.114-92.64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187083" version="1" comment="kernel-devel is &lt;4.4.114-92.64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187084" version="1" comment="kernel-macros is &lt;4.4.114-92.64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187085" version="1" comment="kernel-source is &lt;4.4.114-92.64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187086" version="1" comment="kernel-syms is &lt;4.4.114-92.64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187087" version="1" comment="freetype2 is &lt;2.6.3-7.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187091" version="1" comment="libreoffice-base is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187092" version="1" comment="libreoffice-base-drivers-mysql is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187093" version="1" comment="libreoffice-base-drivers-postgresql is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187094" version="1" comment="libreoffice-calc is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187095" version="1" comment="libreoffice-calc-extensions is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187096" version="1" comment="libreoffice-draw is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187097" version="1" comment="libreoffice-filters-optional is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187098" version="1" comment="libreoffice-gnome is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187099" version="1" comment="libreoffice-icon-theme-galaxy is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187100" version="1" comment="libreoffice-icon-theme-tango is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187101" version="1" comment="libreoffice-impress is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187102" version="1" comment="libreoffice-l10n-af is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187103" version="1" comment="libreoffice-l10n-ar is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187104" version="1" comment="libreoffice-l10n-ca is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187105" version="1" comment="libreoffice-l10n-cs is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187106" version="1" comment="libreoffice-l10n-da is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187107" version="1" comment="libreoffice-l10n-de is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187108" version="1" comment="libreoffice-l10n-en is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187109" version="1" comment="libreoffice-l10n-es is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187110" version="1" comment="libreoffice-l10n-fi is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187111" version="1" comment="libreoffice-l10n-fr is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187112" version="1" comment="libreoffice-l10n-gu is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187113" version="1" comment="libreoffice-l10n-hi is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187114" version="1" comment="libreoffice-l10n-hu is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187115" version="1" comment="libreoffice-l10n-it is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187116" version="1" comment="libreoffice-l10n-ja is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187117" version="1" comment="libreoffice-l10n-ko is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187118" version="1" comment="libreoffice-l10n-nb is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187119" version="1" comment="libreoffice-l10n-nl is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187120" version="1" comment="libreoffice-l10n-nn is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187121" version="1" comment="libreoffice-l10n-pl is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187122" version="1" comment="libreoffice-l10n-pt_BR is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187123" version="1" comment="libreoffice-l10n-pt_PT is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187124" version="1" comment="libreoffice-l10n-ro is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187125" version="1" comment="libreoffice-l10n-ru is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187126" version="1" comment="libreoffice-l10n-sk is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187127" version="1" comment="libreoffice-l10n-sv is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187128" version="1" comment="libreoffice-l10n-xh is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187129" version="1" comment="libreoffice-l10n-zh_CN is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187130" version="1" comment="libreoffice-l10n-zh_TW is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187131" version="1" comment="libreoffice-l10n-zu is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187132" version="1" comment="libreoffice-mailmerge is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187133" version="1" comment="libreoffice-math is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187134" version="1" comment="libreoffice-officebean is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187135" version="1" comment="libreoffice-pyuno is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187136" version="1" comment="libreoffice-writer is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187137" version="1" comment="libreoffice-writer-extensions is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187138" version="1" comment="libreofficekit is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187139" version="1" comment="glibc is &lt;2.22-62.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187140" version="1" comment="glibc-32bit is &lt;2.22-62.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187141" version="1" comment="glibc-devel is &lt;2.22-62.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187142" version="1" comment="glibc-devel-32bit is &lt;2.22-62.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187143" version="1" comment="glibc-i18ndata is &lt;2.22-62.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187144" version="1" comment="glibc-locale is &lt;2.22-62.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187145" version="1" comment="glibc-locale-32bit is &lt;2.22-62.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187146" version="1" comment="nscd is &lt;2.22-62.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187148" version="1" comment="xen is &lt;4.7.4_06-43.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187149" version="1" comment="xen-libs is &lt;4.7.4_06-43.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187150" version="1" comment="xen-libs-32bit is &lt;4.7.4_06-43.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187151" version="1" comment="libecpg6 is &lt;9.6.7-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187152" version="1" comment="libpq5 is &lt;9.6.7-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187153" version="1" comment="libpq5-32bit is &lt;9.6.7-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187154" version="1" comment="postgresql96 is &lt;9.6.7-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187155" version="1" comment="postgresql96-libs is &lt;9.6.7-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187156" version="1" comment="db48-utils is &lt;4.8.30-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187157" version="1" comment="libdb-4_8 is &lt;4.8.30-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187158" version="1" comment="libdb-4_8-32bit is &lt;4.8.30-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187159" version="1" comment="dhcp is &lt;4.3.3-10.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187160" version="1" comment="dhcp-client is &lt;4.3.3-10.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187161" version="1" comment="libsystemd0 is &lt;228-150.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187162" version="1" comment="libsystemd0-32bit is &lt;228-150.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187163" version="1" comment="libudev1 is &lt;228-150.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187164" version="1" comment="libudev1-32bit is &lt;228-150.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187165" version="1" comment="systemd is &lt;228-150.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187166" version="1" comment="systemd-32bit is &lt;228-150.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187167" version="1" comment="systemd-bash-completion is &lt;228-150.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187168" version="1" comment="systemd-sysvinit is &lt;228-150.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187169" version="1" comment="udev is &lt;228-150.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187170" version="1" comment="libzzip-0-13 is &lt;0.13.67-10.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251820" version="1" comment="zziplib is &lt;0.13.67-10.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187173" version="1" comment="ImageMagick is &lt;6.8.8.1-71.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187174" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187175" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187176" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187177" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187181" version="1" comment="ImageMagick is &lt;6.8.8.1-71.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187182" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187183" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187184" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187185" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187186" version="1" comment="cups-client is &lt;1.7.5-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187187" version="1" comment="cups-libs is &lt;1.7.5-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187188" version="1" comment="cups-libs-32bit is &lt;1.7.5-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187192" version="1" comment="yaml-cpp is &lt;0.5.3-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187195" version="1" comment="augeas is &lt;1.2.0-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187196" version="1" comment="augeas-lenses is &lt;1.2.0-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187197" version="1" comment="libaugeas0 is &lt;1.2.0-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187198" version="1" comment="glibc is &lt;2.22-62.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187199" version="1" comment="glibc-32bit is &lt;2.22-62.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187200" version="1" comment="glibc-devel is &lt;2.22-62.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187201" version="1" comment="glibc-devel-32bit is &lt;2.22-62.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187202" version="1" comment="glibc-i18ndata is &lt;2.22-62.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187203" version="1" comment="glibc-locale is &lt;2.22-62.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187204" version="1" comment="glibc-locale-32bit is &lt;2.22-62.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187205" version="1" comment="nscd is &lt;2.22-62.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187206" version="1" comment="shadow is &lt;4.2.1-27.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187207" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.171-43.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187208" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.171-43.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187209" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.161-27.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187210" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.161-27.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187211" version="1" comment="postgresql94 is &lt;9.4.16-21.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187212" version="1" comment="kernel-firmware is &lt;20170530-21.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187213" version="1" comment="ucode-amd is &lt;20170530-21.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187214" version="1" comment="libcdio is &lt;0.90-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187218" version="1" comment="libmysqlclient18 is &lt;10.0.34-29.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187219" version="1" comment="libmysqlclient18-32bit is &lt;10.0.34-29.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187220" version="1" comment="libmysqlclient_r18 is &lt;10.0.34-29.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187221" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.34-29.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187222" version="1" comment="mariadb is &lt;10.0.34-29.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187223" version="1" comment="mariadb-client is &lt;10.0.34-29.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187224" version="1" comment="mariadb-errormessages is &lt;10.0.34-29.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187225" version="1" comment="ucode-intel is &lt;20180312-13.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187226" version="1" comment="libid3tag is &lt;0.15.1b-184.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187228" version="1" comment="libecpg6 is &lt;9.6.8-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187229" version="1" comment="libpq5 is &lt;9.6.8-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187230" version="1" comment="libpq5-32bit is &lt;9.6.8-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187231" version="1" comment="postgresql96 is &lt;9.6.8-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187232" version="1" comment="postgresql96-libs is &lt;9.6.8-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187233" version="1" comment="curl is &lt;7.37.0-37.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187234" version="1" comment="libcurl4 is &lt;7.37.0-37.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187235" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187236" version="1" comment="libvorbis is &lt;1.3.3-10.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187237" version="1" comment="libvorbis0 is &lt;1.3.3-10.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187238" version="1" comment="libvorbis0-32bit is &lt;1.3.3-10.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187239" version="1" comment="libvorbisenc2 is &lt;1.3.3-10.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187240" version="1" comment="libvorbisenc2-32bit is &lt;1.3.3-10.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187241" version="1" comment="libvorbisfile3 is &lt;1.3.3-10.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187242" version="1" comment="libvorbisfile3-32bit is &lt;1.3.3-10.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187243" version="1" comment="kernel-default is &lt;4.4.120-92.70" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187244" version="1" comment="kernel-default-devel is &lt;4.4.120-92.70" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187245" version="1" comment="kernel-default-extra is &lt;4.4.120-92.70" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187246" version="1" comment="kernel-devel is &lt;4.4.120-92.70" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187247" version="1" comment="kernel-macros is &lt;4.4.120-92.70" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187248" version="1" comment="kernel-source is &lt;4.4.120-92.70" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187249" version="1" comment="kernel-syms is &lt;4.4.120-92.70" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187250" version="1" comment="clamav is &lt;0.99.4-33.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187253" version="1" comment="libwireshark8 is &lt;2.2.13-48.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187254" version="1" comment="libwiretap6 is &lt;2.2.13-48.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187255" version="1" comment="libwscodecs1 is &lt;2.2.13-48.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187256" version="1" comment="libwsutil7 is &lt;2.2.13-48.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187257" version="1" comment="wireshark is &lt;2.2.13-48.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187258" version="1" comment="wireshark-gtk is &lt;2.2.13-48.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187259" version="1" comment="glibc is &lt;2.22-62.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187260" version="1" comment="glibc-32bit is &lt;2.22-62.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187261" version="1" comment="glibc-devel is &lt;2.22-62.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187262" version="1" comment="glibc-devel-32bit is &lt;2.22-62.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187263" version="1" comment="glibc-i18ndata is &lt;2.22-62.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187264" version="1" comment="glibc-locale is &lt;2.22-62.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187265" version="1" comment="glibc-locale-32bit is &lt;2.22-62.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187266" version="1" comment="nscd is &lt;2.22-62.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187267" version="1" comment="qemu is &lt;2.6.2-41.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187268" version="1" comment="qemu-block-curl is &lt;2.6.2-41.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187269" version="1" comment="qemu-ipxe is &lt;1.0.0-41.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187270" version="1" comment="qemu-kvm is &lt;2.6.2-41.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187271" version="1" comment="qemu-seabios is &lt;1.9.1-41.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187272" version="1" comment="qemu-sgabios is &lt;8-41.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187273" version="1" comment="qemu-tools is &lt;2.6.2-41.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187274" version="1" comment="qemu-vgabios is &lt;1.9.1-41.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187275" version="1" comment="qemu-x86 is &lt;2.6.2-41.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187276" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187277" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187278" version="1" comment="libdcerpc0 is &lt;4.4.2-38.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187279" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187280" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187281" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187282" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187283" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187284" version="1" comment="libndr-standard0 is &lt;4.4.2-38.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187285" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187286" version="1" comment="libndr0 is &lt;4.4.2-38.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187287" version="1" comment="libndr0-32bit is &lt;4.4.2-38.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187288" version="1" comment="libnetapi0 is &lt;4.4.2-38.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187289" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187290" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187291" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187292" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187293" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187294" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187295" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187296" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187297" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187298" version="1" comment="libsamba-util0 is &lt;4.4.2-38.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187299" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187300" version="1" comment="libsamdb0 is &lt;4.4.2-38.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187301" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187302" version="1" comment="libsmbclient0 is &lt;4.4.2-38.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187303" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187304" version="1" comment="libsmbconf0 is &lt;4.4.2-38.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187305" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187306" version="1" comment="libsmbldap0 is &lt;4.4.2-38.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187307" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187308" version="1" comment="libtevent-util0 is &lt;4.4.2-38.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187309" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187310" version="1" comment="libwbclient0 is &lt;4.4.2-38.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187311" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187312" version="1" comment="samba is &lt;4.4.2-38.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187313" version="1" comment="samba-client is &lt;4.4.2-38.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187314" version="1" comment="samba-client-32bit is &lt;4.4.2-38.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187315" version="1" comment="samba-doc is &lt;4.4.2-38.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187316" version="1" comment="samba-libs is &lt;4.4.2-38.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187317" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187318" version="1" comment="samba-winbind is &lt;4.4.2-38.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187319" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187320" version="1" comment="krb5 is &lt;1.12.5-40.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187321" version="1" comment="krb5-32bit is &lt;1.12.5-40.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187322" version="1" comment="krb5-client is &lt;1.12.5-40.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187323" version="1" comment="MozillaFirefox is &lt;52.7.3esr-109.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187324" version="1" comment="MozillaFirefox-translations is &lt;52.7.3esr-109.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187325" version="1" comment="ImageMagick is &lt;6.8.8.1-71.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187326" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187327" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187328" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187329" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187330" version="1" comment="graphite2 is &lt;1.3.1-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187333" version="1" comment="libvirt is &lt;2.0.0-27.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187334" version="1" comment="libvirt-client is &lt;2.0.0-27.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187335" version="1" comment="libvirt-client-32bit is &lt;2.0.0-27.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187336" version="1" comment="libvirt-daemon is &lt;2.0.0-27.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187337" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187338" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187339" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187340" version="1" comment="libvirt-daemon-driver-libxl is &lt;2.0.0-27.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187341" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187342" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187343" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187344" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187345" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187346" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187347" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187348" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187349" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187350" version="1" comment="libvirt-daemon-xen is &lt;2.0.0-27.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187351" version="1" comment="libvirt-doc is &lt;2.0.0-27.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187352" version="1" comment="libtiff5 is &lt;4.0.9-44.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187353" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187354" version="1" comment="tiff is &lt;4.0.9-44.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187355" version="1" comment="postgresql94 is &lt;9.4.17-21.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187356" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.161-43.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187357" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.161-43.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187358" version="1" comment="gwenhywfar is &lt;4.9.0beta-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187364" version="1" comment="xen is &lt;4.7.5_02-43.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187365" version="1" comment="xen-libs is &lt;4.7.5_02-43.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187366" version="1" comment="xen-libs-32bit is &lt;4.7.5_02-43.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187367" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187368" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187369" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187370" version="1" comment="openssl is &lt;1.0.2j-60.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187371" version="1" comment="postgresql94 is &lt;9.4.15-21.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187372" version="1" comment="libmysqlclient18 is &lt;10.0.32-29.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187373" version="1" comment="libmysqlclient18-32bit is &lt;10.0.32-29.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187374" version="1" comment="libmysqlclient_r18 is &lt;10.0.32-29.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187375" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.32-29.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187376" version="1" comment="mariadb is &lt;10.0.32-29.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187377" version="1" comment="mariadb-client is &lt;10.0.32-29.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187378" version="1" comment="mariadb-errormessages is &lt;10.0.32-29.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187379" version="1" comment="openslp is &lt;2.0.0-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187380" version="1" comment="openslp-32bit is &lt;2.0.0-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187381" version="1" comment="kernel-firmware is &lt;20170530-21.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187382" version="1" comment="ucode-amd is &lt;20170530-21.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187383" version="1" comment="rsync is &lt;3.1.0-13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187384" version="1" comment="libncurses5 is &lt;5.9-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187385" version="1" comment="libncurses5-32bit is &lt;5.9-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187386" version="1" comment="libncurses6 is &lt;5.9-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187387" version="1" comment="libncurses6-32bit is &lt;5.9-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187388" version="1" comment="ncurses is &lt;5.9-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187389" version="1" comment="ncurses-devel is &lt;5.9-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187390" version="1" comment="ncurses-utils is &lt;5.9-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187391" version="1" comment="tack is &lt;5.9-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187392" version="1" comment="terminfo is &lt;5.9-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187393" version="1" comment="terminfo-base is &lt;5.9-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187394" version="1" comment="curl is &lt;7.37.0-37.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187395" version="1" comment="libcurl4 is &lt;7.37.0-37.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187396" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187398" version="1" comment="ImageMagick is &lt;6.8.8.1-71.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187399" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187400" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187401" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187402" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187403" version="1" comment="libsystemd0 is &lt;228-150.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187404" version="1" comment="libsystemd0-32bit is &lt;228-150.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187405" version="1" comment="libudev1 is &lt;228-150.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187406" version="1" comment="libudev1-32bit is &lt;228-150.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187407" version="1" comment="systemd is &lt;228-150.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187408" version="1" comment="systemd-32bit is &lt;228-150.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187409" version="1" comment="systemd-bash-completion is &lt;228-150.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187410" version="1" comment="systemd-sysvinit is &lt;228-150.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187411" version="1" comment="udev is &lt;228-150.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187412" version="1" comment="libdcerpc-binding0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187413" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187414" version="1" comment="libdcerpc0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187415" version="1" comment="libdcerpc0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187416" version="1" comment="libndr-krb5pac0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187417" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187418" version="1" comment="libndr-nbt0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187419" version="1" comment="libndr-nbt0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187420" version="1" comment="libndr-standard0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187421" version="1" comment="libndr-standard0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187422" version="1" comment="libndr0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187423" version="1" comment="libndr0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187424" version="1" comment="libnetapi0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187425" version="1" comment="libnetapi0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187426" version="1" comment="libsamba-credentials0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187427" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187428" version="1" comment="libsamba-errors0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187429" version="1" comment="libsamba-errors0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187430" version="1" comment="libsamba-hostconfig0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187431" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187432" version="1" comment="libsamba-passdb0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187433" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187434" version="1" comment="libsamba-util0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187435" version="1" comment="libsamba-util0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187436" version="1" comment="libsamdb0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187437" version="1" comment="libsamdb0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187438" version="1" comment="libsmbclient0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187439" version="1" comment="libsmbclient0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187440" version="1" comment="libsmbconf0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187441" version="1" comment="libsmbconf0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187442" version="1" comment="libsmbldap0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187443" version="1" comment="libsmbldap0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187444" version="1" comment="libtevent-util0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187445" version="1" comment="libtevent-util0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187446" version="1" comment="libwbclient0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187447" version="1" comment="libwbclient0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187448" version="1" comment="samba is &lt;4.6.7+git.38.90b2cdb4f22-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187449" version="1" comment="samba-client is &lt;4.6.7+git.38.90b2cdb4f22-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187450" version="1" comment="samba-client-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187451" version="1" comment="samba-doc is &lt;4.6.7+git.38.90b2cdb4f22-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187452" version="1" comment="samba-libs is &lt;4.6.7+git.38.90b2cdb4f22-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187453" version="1" comment="samba-libs-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187454" version="1" comment="samba-winbind is &lt;4.6.7+git.38.90b2cdb4f22-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187455" version="1" comment="samba-winbind-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187456" version="1" comment="libzypp is &lt;16.15.3-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187457" version="1" comment="yast2-pkg-bindings is &lt;3.2.4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187458" version="1" comment="kernel-default is &lt;4.4.82-6.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187459" version="1" comment="kernel-default-devel is &lt;4.4.82-6.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187460" version="1" comment="kernel-default-extra is &lt;4.4.82-6.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187461" version="1" comment="kernel-devel is &lt;4.4.82-6.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187462" version="1" comment="kernel-macros is &lt;4.4.82-6.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187463" version="1" comment="kernel-source is &lt;4.4.82-6.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187464" version="1" comment="kernel-syms is &lt;4.4.82-6.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187465" version="1" comment="libixion is &lt;0.12.1-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187466" version="1" comment="libixion-0_12-0 is &lt;0.12.1-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187467" version="1" comment="libmwaw is &lt;0.3.11-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187468" version="1" comment="libmwaw-0_3-3 is &lt;0.3.11-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187469" version="1" comment="liborcus is &lt;0.12.1-10.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187470" version="1" comment="liborcus-0_12-0 is &lt;0.12.1-10.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187471" version="1" comment="libreoffice-base is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187472" version="1" comment="libreoffice-base-drivers-mysql is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187473" version="1" comment="libreoffice-base-drivers-postgresql is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187474" version="1" comment="libreoffice-calc is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187475" version="1" comment="libreoffice-calc-extensions is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187476" version="1" comment="libreoffice-draw is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187477" version="1" comment="libreoffice-filters-optional is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187478" version="1" comment="libreoffice-gnome is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187479" version="1" comment="libreoffice-icon-theme-galaxy is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187480" version="1" comment="libreoffice-icon-theme-tango is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187481" version="1" comment="libreoffice-impress is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187482" version="1" comment="libreoffice-l10n-af is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187483" version="1" comment="libreoffice-l10n-ar is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187484" version="1" comment="libreoffice-l10n-ca is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187485" version="1" comment="libreoffice-l10n-cs is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187486" version="1" comment="libreoffice-l10n-da is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187487" version="1" comment="libreoffice-l10n-de is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187488" version="1" comment="libreoffice-l10n-en is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187489" version="1" comment="libreoffice-l10n-es is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187490" version="1" comment="libreoffice-l10n-fi is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187491" version="1" comment="libreoffice-l10n-fr is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187492" version="1" comment="libreoffice-l10n-gu is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187493" version="1" comment="libreoffice-l10n-hi is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187494" version="1" comment="libreoffice-l10n-hu is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187495" version="1" comment="libreoffice-l10n-it is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187496" version="1" comment="libreoffice-l10n-ja is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187497" version="1" comment="libreoffice-l10n-ko is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187498" version="1" comment="libreoffice-l10n-nb is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187499" version="1" comment="libreoffice-l10n-nl is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187500" version="1" comment="libreoffice-l10n-nn is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187501" version="1" comment="libreoffice-l10n-pl is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187502" version="1" comment="libreoffice-l10n-pt_BR is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187503" version="1" comment="libreoffice-l10n-pt_PT is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187504" version="1" comment="libreoffice-l10n-ro is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187505" version="1" comment="libreoffice-l10n-ru is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187506" version="1" comment="libreoffice-l10n-sk is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187507" version="1" comment="libreoffice-l10n-sv is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187508" version="1" comment="libreoffice-l10n-xh is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187509" version="1" comment="libreoffice-l10n-zh_CN is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187510" version="1" comment="libreoffice-l10n-zh_TW is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187511" version="1" comment="libreoffice-l10n-zu is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187512" version="1" comment="libreoffice-mailmerge is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187513" version="1" comment="libreoffice-math is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187514" version="1" comment="libreoffice-officebean is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187515" version="1" comment="libreoffice-pyuno is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187516" version="1" comment="libreoffice-writer is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187517" version="1" comment="libreoffice-writer-extensions is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187518" version="1" comment="libreofficekit is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187519" version="1" comment="libstaroffice is &lt;0.0.3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187520" version="1" comment="libstaroffice-0_0-0 is &lt;0.0.3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187521" version="1" comment="libzmf is &lt;0.0.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187522" version="1" comment="libzmf-0_0-0 is &lt;0.0.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187523" version="1" comment="myspell-af_NA is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187524" version="1" comment="myspell-af_ZA is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187525" version="1" comment="myspell-ar is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187526" version="1" comment="myspell-ar_AE is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187527" version="1" comment="myspell-ar_BH is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187528" version="1" comment="myspell-ar_DZ is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187529" version="1" comment="myspell-ar_EG is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187530" version="1" comment="myspell-ar_IQ is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187531" version="1" comment="myspell-ar_JO is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187532" version="1" comment="myspell-ar_KW is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187533" version="1" comment="myspell-ar_LB is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187534" version="1" comment="myspell-ar_LY is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187535" version="1" comment="myspell-ar_MA is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187536" version="1" comment="myspell-ar_OM is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187537" version="1" comment="myspell-ar_QA is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187538" version="1" comment="myspell-ar_SA is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187539" version="1" comment="myspell-ar_SD is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187540" version="1" comment="myspell-ar_SY is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187541" version="1" comment="myspell-ar_TN is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187542" version="1" comment="myspell-ar_YE is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187543" version="1" comment="myspell-be_BY is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187544" version="1" comment="myspell-bg_BG is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187545" version="1" comment="myspell-bn_BD is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187546" version="1" comment="myspell-bn_IN is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187547" version="1" comment="myspell-bs is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187548" version="1" comment="myspell-bs_BA is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187549" version="1" comment="myspell-ca is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187550" version="1" comment="myspell-ca_AD is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187551" version="1" comment="myspell-ca_ES is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187552" version="1" comment="myspell-ca_ES_valencia is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187553" version="1" comment="myspell-ca_FR is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187554" version="1" comment="myspell-ca_IT is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187555" version="1" comment="myspell-cs_CZ is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187556" version="1" comment="myspell-da_DK is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187557" version="1" comment="myspell-de is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187558" version="1" comment="myspell-de_AT is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187559" version="1" comment="myspell-de_CH is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187560" version="1" comment="myspell-de_DE is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187561" version="1" comment="myspell-dictionaries is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187562" version="1" comment="myspell-el_GR is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187563" version="1" comment="myspell-en is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187564" version="1" comment="myspell-en_AU is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187565" version="1" comment="myspell-en_BS is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187566" version="1" comment="myspell-en_BZ is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187567" version="1" comment="myspell-en_CA is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187568" version="1" comment="myspell-en_GB is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187569" version="1" comment="myspell-en_GH is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187570" version="1" comment="myspell-en_IE is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187571" version="1" comment="myspell-en_IN is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187572" version="1" comment="myspell-en_JM is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187573" version="1" comment="myspell-en_MW is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187574" version="1" comment="myspell-en_NA is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187575" version="1" comment="myspell-en_NZ is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187576" version="1" comment="myspell-en_PH is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187577" version="1" comment="myspell-en_TT is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187578" version="1" comment="myspell-en_US is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187579" version="1" comment="myspell-en_ZA is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187580" version="1" comment="myspell-en_ZW is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187581" version="1" comment="myspell-es is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187582" version="1" comment="myspell-es_AR is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187583" version="1" comment="myspell-es_BO is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187584" version="1" comment="myspell-es_CL is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187585" version="1" comment="myspell-es_CO is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187586" version="1" comment="myspell-es_CR is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187587" version="1" comment="myspell-es_CU is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187588" version="1" comment="myspell-es_DO is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187589" version="1" comment="myspell-es_EC is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187590" version="1" comment="myspell-es_ES is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187591" version="1" comment="myspell-es_GT is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187592" version="1" comment="myspell-es_HN is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187593" version="1" comment="myspell-es_MX is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187594" version="1" comment="myspell-es_NI is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187595" version="1" comment="myspell-es_PA is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187596" version="1" comment="myspell-es_PE is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187597" version="1" comment="myspell-es_PR is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187598" version="1" comment="myspell-es_PY is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187599" version="1" comment="myspell-es_SV is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187600" version="1" comment="myspell-es_UY is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187601" version="1" comment="myspell-es_VE is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187602" version="1" comment="myspell-et_EE is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187603" version="1" comment="myspell-fr_BE is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187604" version="1" comment="myspell-fr_CA is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187605" version="1" comment="myspell-fr_CH is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187606" version="1" comment="myspell-fr_FR is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187607" version="1" comment="myspell-fr_LU is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187608" version="1" comment="myspell-fr_MC is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187609" version="1" comment="myspell-gu_IN is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187610" version="1" comment="myspell-he_IL is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187611" version="1" comment="myspell-hi_IN is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187612" version="1" comment="myspell-hr_HR is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187613" version="1" comment="myspell-hu_HU is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187614" version="1" comment="myspell-it_IT is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187615" version="1" comment="myspell-lightproof-en is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187616" version="1" comment="myspell-lightproof-hu_HU is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187617" version="1" comment="myspell-lightproof-pt_BR is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187618" version="1" comment="myspell-lightproof-ru_RU is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187619" version="1" comment="myspell-lo_LA is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187620" version="1" comment="myspell-lt_LT is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187621" version="1" comment="myspell-lv_LV is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187622" version="1" comment="myspell-nb_NO is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187623" version="1" comment="myspell-nl_BE is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187624" version="1" comment="myspell-nl_NL is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187625" version="1" comment="myspell-nn_NO is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187626" version="1" comment="myspell-no is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187627" version="1" comment="myspell-pl_PL is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187628" version="1" comment="myspell-pt_AO is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187629" version="1" comment="myspell-pt_BR is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187630" version="1" comment="myspell-pt_PT is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187631" version="1" comment="myspell-ro is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187632" version="1" comment="myspell-ro_RO is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187633" version="1" comment="myspell-ru_RU is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187634" version="1" comment="myspell-sk_SK is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187635" version="1" comment="myspell-sl_SI is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187636" version="1" comment="myspell-sr is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187637" version="1" comment="myspell-sr_CS is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187638" version="1" comment="myspell-sr_Latn_CS is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187639" version="1" comment="myspell-sr_Latn_RS is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187640" version="1" comment="myspell-sr_RS is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187641" version="1" comment="myspell-sv_FI is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187642" version="1" comment="myspell-sv_SE is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187643" version="1" comment="myspell-te is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187644" version="1" comment="myspell-te_IN is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187645" version="1" comment="myspell-th_TH is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187646" version="1" comment="myspell-uk_UA is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187647" version="1" comment="myspell-vi is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187648" version="1" comment="myspell-vi_VN is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187649" version="1" comment="myspell-zu_ZA is &lt;20170511-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187650" version="1" comment="xen is &lt;4.9.0_11-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187651" version="1" comment="xen-libs is &lt;4.9.0_11-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187652" version="1" comment="xen-libs-32bit is &lt;4.9.0_11-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187653" version="1" comment="libzypp is &lt;16.15.6-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251821" version="1" comment="zypper is &lt;1.13.32-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251822" version="1" comment="zypper-log is &lt;1.13.32-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187656" version="1" comment="qemu is &lt;2.9.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187657" version="1" comment="qemu-block-curl is &lt;2.9.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187658" version="1" comment="qemu-ipxe is &lt;1.0.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187659" version="1" comment="qemu-kvm is &lt;2.9.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187660" version="1" comment="qemu-seabios is &lt;1.10.2-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187661" version="1" comment="qemu-sgabios is &lt;8-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187662" version="1" comment="qemu-tools is &lt;2.9.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187663" version="1" comment="qemu-vgabios is &lt;1.10.2-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187664" version="1" comment="qemu-x86 is &lt;2.9.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187665" version="1" comment="xen is &lt;4.9.0_12-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187666" version="1" comment="xen-libs is &lt;4.9.0_12-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187667" version="1" comment="xen-libs-32bit is &lt;4.9.0_12-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187668" version="1" comment="kernel-default is &lt;4.4.82-6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187669" version="1" comment="kernel-default-devel is &lt;4.4.82-6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187670" version="1" comment="kernel-default-extra is &lt;4.4.82-6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187671" version="1" comment="kernel-devel is &lt;4.4.82-6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187672" version="1" comment="kernel-macros is &lt;4.4.82-6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187673" version="1" comment="kernel-source is &lt;4.4.82-6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187674" version="1" comment="kernel-syms is &lt;4.4.82-6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187675" version="1" comment="libspice-server1 is &lt;0.12.8-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187676" version="1" comment="spice is &lt;0.12.8-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187677" version="1" comment="libvirt is &lt;3.3.0-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187678" version="1" comment="libvirt-admin is &lt;3.3.0-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187679" version="1" comment="libvirt-client is &lt;3.3.0-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187680" version="1" comment="libvirt-daemon is &lt;3.3.0-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187681" version="1" comment="libvirt-daemon-config-network is &lt;3.3.0-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187682" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.3.0-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187683" version="1" comment="libvirt-daemon-driver-interface is &lt;3.3.0-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187684" version="1" comment="libvirt-daemon-driver-libxl is &lt;3.3.0-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187685" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.3.0-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187686" version="1" comment="libvirt-daemon-driver-network is &lt;3.3.0-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187687" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.3.0-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187688" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.3.0-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187689" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.3.0-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187690" version="1" comment="libvirt-daemon-driver-secret is &lt;3.3.0-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187691" version="1" comment="libvirt-daemon-driver-storage is &lt;3.3.0-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187692" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.3.0-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187693" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.3.0-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187694" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.3.0-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187695" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.3.0-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187696" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.3.0-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187697" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;3.3.0-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187698" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.3.0-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187699" version="1" comment="libvirt-daemon-lxc is &lt;3.3.0-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187700" version="1" comment="libvirt-daemon-qemu is &lt;3.3.0-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187701" version="1" comment="libvirt-daemon-xen is &lt;3.3.0-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187702" version="1" comment="libvirt-doc is &lt;3.3.0-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187703" version="1" comment="libvirt-libs is &lt;3.3.0-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187704" version="1" comment="libdcerpc-binding0 is &lt;4.6.7+git.51.327af8d0a11-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187705" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187706" version="1" comment="libdcerpc0 is &lt;4.6.7+git.51.327af8d0a11-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187707" version="1" comment="libdcerpc0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187708" version="1" comment="libndr-krb5pac0 is &lt;4.6.7+git.51.327af8d0a11-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187709" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187710" version="1" comment="libndr-nbt0 is &lt;4.6.7+git.51.327af8d0a11-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187711" version="1" comment="libndr-nbt0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187712" version="1" comment="libndr-standard0 is &lt;4.6.7+git.51.327af8d0a11-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187713" version="1" comment="libndr-standard0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187714" version="1" comment="libndr0 is &lt;4.6.7+git.51.327af8d0a11-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187715" version="1" comment="libndr0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187716" version="1" comment="libnetapi0 is &lt;4.6.7+git.51.327af8d0a11-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187717" version="1" comment="libnetapi0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187718" version="1" comment="libsamba-credentials0 is &lt;4.6.7+git.51.327af8d0a11-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187719" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187720" version="1" comment="libsamba-errors0 is &lt;4.6.7+git.51.327af8d0a11-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187721" version="1" comment="libsamba-errors0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187722" version="1" comment="libsamba-hostconfig0 is &lt;4.6.7+git.51.327af8d0a11-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187723" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187724" version="1" comment="libsamba-passdb0 is &lt;4.6.7+git.51.327af8d0a11-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187725" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187726" version="1" comment="libsamba-util0 is &lt;4.6.7+git.51.327af8d0a11-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187727" version="1" comment="libsamba-util0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187728" version="1" comment="libsamdb0 is &lt;4.6.7+git.51.327af8d0a11-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187729" version="1" comment="libsamdb0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187730" version="1" comment="libsmbclient0 is &lt;4.6.7+git.51.327af8d0a11-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187731" version="1" comment="libsmbclient0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187732" version="1" comment="libsmbconf0 is &lt;4.6.7+git.51.327af8d0a11-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187733" version="1" comment="libsmbconf0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187734" version="1" comment="libsmbldap0 is &lt;4.6.7+git.51.327af8d0a11-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187735" version="1" comment="libsmbldap0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187736" version="1" comment="libtevent-util0 is &lt;4.6.7+git.51.327af8d0a11-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187737" version="1" comment="libtevent-util0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187738" version="1" comment="libwbclient0 is &lt;4.6.7+git.51.327af8d0a11-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187739" version="1" comment="libwbclient0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187740" version="1" comment="samba is &lt;4.6.7+git.51.327af8d0a11-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187741" version="1" comment="samba-client is &lt;4.6.7+git.51.327af8d0a11-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187742" version="1" comment="samba-client-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187743" version="1" comment="samba-doc is &lt;4.6.7+git.51.327af8d0a11-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187744" version="1" comment="samba-libs is &lt;4.6.7+git.51.327af8d0a11-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187745" version="1" comment="samba-libs-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187746" version="1" comment="samba-winbind is &lt;4.6.7+git.51.327af8d0a11-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187747" version="1" comment="samba-winbind-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187748" version="1" comment="xen is &lt;4.9.0_14-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187749" version="1" comment="xen-libs is &lt;4.9.0_14-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187750" version="1" comment="xen-libs-32bit is &lt;4.9.0_14-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187751" version="1" comment="kernel-default is &lt;4.4.92-6.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187752" version="1" comment="kernel-default-devel is &lt;4.4.92-6.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187753" version="1" comment="kernel-default-extra is &lt;4.4.92-6.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187754" version="1" comment="kernel-devel is &lt;4.4.92-6.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187755" version="1" comment="kernel-macros is &lt;4.4.92-6.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187756" version="1" comment="kernel-source is &lt;4.4.92-6.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187757" version="1" comment="kernel-syms is &lt;4.4.92-6.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187758" version="1" comment="libvirt is &lt;3.3.0-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187759" version="1" comment="libvirt-admin is &lt;3.3.0-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187760" version="1" comment="libvirt-client is &lt;3.3.0-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187761" version="1" comment="libvirt-daemon is &lt;3.3.0-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187762" version="1" comment="libvirt-daemon-config-network is &lt;3.3.0-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187763" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.3.0-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187764" version="1" comment="libvirt-daemon-driver-interface is &lt;3.3.0-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187765" version="1" comment="libvirt-daemon-driver-libxl is &lt;3.3.0-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187766" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.3.0-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187767" version="1" comment="libvirt-daemon-driver-network is &lt;3.3.0-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187768" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.3.0-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187769" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.3.0-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187770" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.3.0-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187771" version="1" comment="libvirt-daemon-driver-secret is &lt;3.3.0-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187772" version="1" comment="libvirt-daemon-driver-storage is &lt;3.3.0-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187773" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.3.0-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187774" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.3.0-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187775" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.3.0-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187776" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.3.0-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187777" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.3.0-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187778" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;3.3.0-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187779" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.3.0-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187780" version="1" comment="libvirt-daemon-lxc is &lt;3.3.0-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187781" version="1" comment="libvirt-daemon-qemu is &lt;3.3.0-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187782" version="1" comment="libvirt-daemon-xen is &lt;3.3.0-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187783" version="1" comment="libvirt-doc is &lt;3.3.0-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187784" version="1" comment="libvirt-libs is &lt;3.3.0-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187785" version="1" comment="qemu is &lt;2.9.1-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187786" version="1" comment="qemu-block-curl is &lt;2.9.1-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187787" version="1" comment="qemu-ipxe is &lt;1.0.0-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187788" version="1" comment="qemu-kvm is &lt;2.9.1-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187789" version="1" comment="qemu-seabios is &lt;1.10.2-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187790" version="1" comment="qemu-sgabios is &lt;8-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187791" version="1" comment="qemu-tools is &lt;2.9.1-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187792" version="1" comment="qemu-vgabios is &lt;1.10.2-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187793" version="1" comment="qemu-x86 is &lt;2.9.1-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187794" version="1" comment="SuSEfirewall2 is &lt;3.6.312.333-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187795" version="1" comment="libsss_nss_idmap0 is &lt;1.13.4-34.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187796" version="1" comment="xen is &lt;4.9.1_02-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187797" version="1" comment="xen-libs is &lt;4.9.1_02-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187798" version="1" comment="xen-libs-32bit is &lt;4.9.1_02-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187799" version="1" comment="libdcerpc-binding0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187800" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187801" version="1" comment="libdcerpc0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187802" version="1" comment="libdcerpc0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187803" version="1" comment="libndr-krb5pac0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187804" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187805" version="1" comment="libndr-nbt0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187806" version="1" comment="libndr-nbt0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187807" version="1" comment="libndr-standard0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187808" version="1" comment="libndr-standard0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187809" version="1" comment="libndr0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187810" version="1" comment="libndr0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187811" version="1" comment="libnetapi0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187812" version="1" comment="libnetapi0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187813" version="1" comment="libsamba-credentials0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187814" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187815" version="1" comment="libsamba-errors0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187816" version="1" comment="libsamba-errors0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187817" version="1" comment="libsamba-hostconfig0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187818" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187819" version="1" comment="libsamba-passdb0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187820" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187821" version="1" comment="libsamba-util0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187822" version="1" comment="libsamba-util0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187823" version="1" comment="libsamdb0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187824" version="1" comment="libsamdb0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187825" version="1" comment="libsmbclient0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187826" version="1" comment="libsmbclient0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187827" version="1" comment="libsmbconf0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187828" version="1" comment="libsmbconf0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187829" version="1" comment="libsmbldap0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187830" version="1" comment="libsmbldap0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187831" version="1" comment="libtevent-util0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187832" version="1" comment="libtevent-util0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187833" version="1" comment="libwbclient0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187834" version="1" comment="libwbclient0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187835" version="1" comment="samba is &lt;4.6.9+git.59.c2cff9cea4c-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187836" version="1" comment="samba-client is &lt;4.6.9+git.59.c2cff9cea4c-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187837" version="1" comment="samba-client-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187838" version="1" comment="samba-doc is &lt;4.6.9+git.59.c2cff9cea4c-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187839" version="1" comment="samba-libs is &lt;4.6.9+git.59.c2cff9cea4c-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187840" version="1" comment="samba-libs-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187841" version="1" comment="samba-winbind is &lt;4.6.9+git.59.c2cff9cea4c-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187842" version="1" comment="samba-winbind-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187843" version="1" comment="kernel-default is &lt;4.4.92-6.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187844" version="1" comment="kernel-default-devel is &lt;4.4.92-6.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187845" version="1" comment="kernel-default-extra is &lt;4.4.92-6.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187846" version="1" comment="kernel-devel is &lt;4.4.92-6.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187847" version="1" comment="kernel-macros is &lt;4.4.92-6.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187848" version="1" comment="kernel-source is &lt;4.4.92-6.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187849" version="1" comment="kernel-syms is &lt;4.4.92-6.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187850" version="1" comment="kernel-default is &lt;4.4.103-6.33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187851" version="1" comment="kernel-default-devel is &lt;4.4.103-6.33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187852" version="1" comment="kernel-default-extra is &lt;4.4.103-6.33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187853" version="1" comment="kernel-devel is &lt;4.4.103-6.33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187854" version="1" comment="kernel-macros is &lt;4.4.103-6.33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187855" version="1" comment="kernel-source is &lt;4.4.103-6.33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187856" version="1" comment="kernel-syms is &lt;4.4.103-6.33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187858" version="1" comment="libzzip-0-13 is &lt;0.13.67-10.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251823" version="1" comment="zziplib is &lt;0.13.67-10.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187860" version="1" comment="glibc is &lt;2.22-62.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187861" version="1" comment="glibc-32bit is &lt;2.22-62.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187862" version="1" comment="glibc-devel is &lt;2.22-62.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187863" version="1" comment="glibc-devel-32bit is &lt;2.22-62.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187864" version="1" comment="glibc-i18ndata is &lt;2.22-62.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187865" version="1" comment="glibc-locale is &lt;2.22-62.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187866" version="1" comment="glibc-locale-32bit is &lt;2.22-62.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187867" version="1" comment="nscd is &lt;2.22-62.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187868" version="1" comment="libvorbis is &lt;1.3.3-10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187875" version="1" comment="kernel-firmware is &lt;20170530-21.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187876" version="1" comment="ucode-amd is &lt;20170530-21.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223422" version="1" comment="poppler-qt is &lt;0.43.0-16.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223424" version="1" comment="ucode-intel is &lt;20180425-13.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223439" version="1" comment="libdcerpc-binding0 is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223440" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223441" version="1" comment="libdcerpc0 is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223442" version="1" comment="libdcerpc0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223443" version="1" comment="libndr-krb5pac0 is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223444" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223445" version="1" comment="libndr-nbt0 is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223446" version="1" comment="libndr-nbt0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223447" version="1" comment="libndr-standard0 is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223448" version="1" comment="libndr-standard0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223449" version="1" comment="libndr0 is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223450" version="1" comment="libndr0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223451" version="1" comment="libnetapi0 is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223452" version="1" comment="libnetapi0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223453" version="1" comment="libsamba-credentials0 is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223454" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223455" version="1" comment="libsamba-errors0 is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223456" version="1" comment="libsamba-errors0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223457" version="1" comment="libsamba-hostconfig0 is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223458" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223459" version="1" comment="libsamba-passdb0 is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223460" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223461" version="1" comment="libsamba-util0 is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223462" version="1" comment="libsamba-util0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223463" version="1" comment="libsamdb0 is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223464" version="1" comment="libsamdb0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223465" version="1" comment="libsmbclient0 is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223466" version="1" comment="libsmbclient0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223467" version="1" comment="libsmbconf0 is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223468" version="1" comment="libsmbconf0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223469" version="1" comment="libsmbldap0 is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223470" version="1" comment="libsmbldap0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223471" version="1" comment="libtevent-util0 is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223472" version="1" comment="libtevent-util0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223473" version="1" comment="libwbclient0 is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223474" version="1" comment="libwbclient0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223475" version="1" comment="samba is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223476" version="1" comment="samba-client is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223477" version="1" comment="samba-client-32bit is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223478" version="1" comment="samba-doc is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223479" version="1" comment="samba-libs is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223480" version="1" comment="samba-libs-32bit is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223481" version="1" comment="samba-winbind is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223482" version="1" comment="samba-winbind-32bit is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223504" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.171-27.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223505" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.171-27.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223508" version="1" comment="libecpg6 is &lt;9.6.9-3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223509" version="1" comment="libpq5 is &lt;9.6.9-3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223510" version="1" comment="libpq5-32bit is &lt;9.6.9-3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223511" version="1" comment="postgresql96 is &lt;9.6.9-3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223512" version="1" comment="postgresql96-libs is &lt;9.6.9-3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229251" version="1" comment="ntp is &lt;4.2.8p11-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229252" version="1" comment="ntp-doc is &lt;4.2.8p11-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229256" version="1" comment="kernel-default is &lt;4.4.138-94.39" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229257" version="1" comment="kernel-default-devel is &lt;4.4.138-94.39" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229258" version="1" comment="kernel-default-extra is &lt;4.4.138-94.39" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229259" version="1" comment="kernel-devel is &lt;4.4.138-94.39" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229260" version="1" comment="kernel-macros is &lt;4.4.138-94.39" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229261" version="1" comment="kernel-source is &lt;4.4.138-94.39" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229262" version="1" comment="kernel-syms is &lt;4.4.138-94.39" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187877" version="1" comment="kernel-default is &lt;4.4.103-6.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187878" version="1" comment="kernel-default-devel is &lt;4.4.103-6.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187879" version="1" comment="kernel-default-extra is &lt;4.4.103-6.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187880" version="1" comment="kernel-devel is &lt;4.4.103-6.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187881" version="1" comment="kernel-macros is &lt;4.4.103-6.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187882" version="1" comment="kernel-source is &lt;4.4.103-6.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187883" version="1" comment="kernel-syms is &lt;4.4.103-6.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229263" version="1" comment="libmysqlclient18 is &lt;10.0.35-29.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229264" version="1" comment="libmysqlclient18-32bit is &lt;10.0.35-29.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229265" version="1" comment="libmysqlclient_r18 is &lt;10.0.35-29.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229266" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.35-29.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229267" version="1" comment="mariadb is &lt;10.0.35-29.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229268" version="1" comment="mariadb-client is &lt;10.0.35-29.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229269" version="1" comment="mariadb-errormessages is &lt;10.0.35-29.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229270" version="1" comment="MozillaFirefox is &lt;52.8.1esr-109.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229271" version="1" comment="MozillaFirefox-translations is &lt;52.8.1esr-109.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229507" version="1" comment="libtiff5 is &lt;4.0.9-44.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229508" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229509" version="1" comment="tiff is &lt;4.0.9-44.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229565" version="1" comment="libprocps3 is &lt;3.3.9-11.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229566" version="1" comment="procps is &lt;3.3.9-11.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229574" version="1" comment="ImageMagick is &lt;6.8.8.1-71.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229575" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229576" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229577" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229578" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229741" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229742" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229743" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229744" version="1" comment="openssl is &lt;1.0.2j-60.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229822" version="1" comment="libQtWebKit4 is &lt;4.8.7+2.3.4-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229823" version="1" comment="libQtWebKit4-32bit is &lt;4.8.7+2.3.4-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229824" version="1" comment="libqca2 is &lt;2.0.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229825" version="1" comment="libqca2-32bit is &lt;2.0.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229826" version="1" comment="libqt4 is &lt;4.8.7-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229827" version="1" comment="libqt4-32bit is &lt;4.8.7-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229828" version="1" comment="libqt4-qt3support is &lt;4.8.7-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229829" version="1" comment="libqt4-qt3support-32bit is &lt;4.8.7-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229830" version="1" comment="libqt4-sql is &lt;4.8.7-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229831" version="1" comment="libqt4-sql-32bit is &lt;4.8.7-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229832" version="1" comment="libqt4-sql-mysql is &lt;4.8.7-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229833" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.8.7-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229834" version="1" comment="libqt4-sql-plugins is &lt;4.8.7-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229835" version="1" comment="libqt4-sql-postgresql is &lt;4.8.7-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229836" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.8.7-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229837" version="1" comment="libqt4-sql-sqlite is &lt;4.8.7-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229838" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.8.7-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229839" version="1" comment="libqt4-sql-unixODBC is &lt;4.8.7-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229840" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.8.7-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229841" version="1" comment="libqt4-x11 is &lt;4.8.7-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229842" version="1" comment="libqt4-x11-32bit is &lt;4.8.7-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229843" version="1" comment="qt4-qtscript is &lt;0.2.0-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230085" version="1" comment="ucode-intel is &lt;20180703-13.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230159" version="1" comment="gdk-pixbuf is &lt;2.34.0-19.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230160" version="1" comment="gdk-pixbuf-lang is &lt;2.34.0-19.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230161" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.34.0-19.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230162" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.34.0-19.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230163" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.34.0-19.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230164" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.34.0-19.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230165" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.34.0-19.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230321" version="1" comment="perl is &lt;5.18.2-12.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230322" version="1" comment="perl-32bit is &lt;5.18.2-12.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230323" version="1" comment="perl-base is &lt;5.18.2-12.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230324" version="1" comment="perl-doc is &lt;5.18.2-12.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230365" version="1" comment="shadow is &lt;4.2.1-27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230366" version="1" comment="openssh is &lt;7.2p2-74.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230367" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230368" version="1" comment="openssh-helpers is &lt;7.2p2-74.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230527" version="1" comment="rsyslog is &lt;8.24.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230528" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230529" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-28.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230530" version="1" comment="python is &lt;2.7.13-28.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230531" version="1" comment="python-base is &lt;2.7.13-28.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230532" version="1" comment="python-curses is &lt;2.7.13-28.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230533" version="1" comment="python-devel is &lt;2.7.13-28.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230534" version="1" comment="python-tk is &lt;2.7.13-28.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230535" version="1" comment="python-xml is &lt;2.7.13-28.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230618" version="1" comment="kernel-default is &lt;4.4.140-94.42" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230619" version="1" comment="kernel-default-devel is &lt;4.4.140-94.42" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230620" version="1" comment="kernel-default-extra is &lt;4.4.140-94.42" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230621" version="1" comment="kernel-devel is &lt;4.4.140-94.42" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230622" version="1" comment="kernel-macros is &lt;4.4.140-94.42" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230623" version="1" comment="kernel-source is &lt;4.4.140-94.42" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230624" version="1" comment="kernel-syms is &lt;4.4.140-94.42" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230641" version="1" comment="gnome-shell-search-provider-nautilus is &lt;3.20.3-23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230642" version="1" comment="libnautilus-extension1 is &lt;3.20.3-23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230643" version="1" comment="libnautilus-extension1-32bit is &lt;3.20.3-23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230644" version="1" comment="nautilus is &lt;3.20.3-23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230645" version="1" comment="nautilus-lang is &lt;3.20.3-23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230646" version="1" comment="xen is &lt;4.9.2_08-3.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230647" version="1" comment="xen-libs is &lt;4.9.2_08-3.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230648" version="1" comment="xen-libs-32bit is &lt;4.9.2_08-3.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230714" version="1" comment="libblkid1 is &lt;2.29.2-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230715" version="1" comment="libblkid1-32bit is &lt;2.29.2-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230716" version="1" comment="libfdisk1 is &lt;2.29.2-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230717" version="1" comment="libmount1 is &lt;2.29.2-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230718" version="1" comment="libmount1-32bit is &lt;2.29.2-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230719" version="1" comment="libsmartcols1 is &lt;2.29.2-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230720" version="1" comment="libuuid-devel is &lt;2.29.2-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230721" version="1" comment="libuuid1 is &lt;2.29.2-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230722" version="1" comment="libuuid1-32bit is &lt;2.29.2-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230723" version="1" comment="python-libmount is &lt;2.29.2-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230724" version="1" comment="util-linux is &lt;2.29.2-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230725" version="1" comment="util-linux-lang is &lt;2.29.2-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230726" version="1" comment="util-linux-systemd is &lt;2.29.2-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230727" version="1" comment="uuidd is &lt;2.29.2-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230728" version="1" comment="libsndfile is &lt;1.0.25-36.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230729" version="1" comment="libsndfile1 is &lt;1.0.25-36.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230730" version="1" comment="libsndfile1-32bit is &lt;1.0.25-36.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230805" version="1" comment="libgcrypt is &lt;1.6.1-16.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230806" version="1" comment="libgcrypt20 is &lt;1.6.1-16.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230807" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230808" version="1" comment="mutt is &lt;1.10.1-55.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231109" version="1" comment="gdk-pixbuf is &lt;2.34.0-19.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231110" version="1" comment="gdk-pixbuf-lang is &lt;2.34.0-19.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231111" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.34.0-19.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231112" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.34.0-19.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231113" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.34.0-19.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231114" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.34.0-19.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231115" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.34.0-19.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231116" version="1" comment="libcgroup is &lt;0.41.rc1-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231117" version="1" comment="libcgroup1 is &lt;0.41.rc1-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231160" version="1" comment="libpolkit0 is &lt;0.113-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231161" version="1" comment="libpolkit0-32bit is &lt;0.113-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231162" version="1" comment="polkit is &lt;0.113-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231163" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231164" version="1" comment="cups-client is &lt;1.7.5-20.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231165" version="1" comment="cups-libs is &lt;1.7.5-20.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231166" version="1" comment="cups-libs-32bit is &lt;1.7.5-20.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231226" version="1" comment="libtirpc is &lt;1.0.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231227" version="1" comment="libtirpc-netconfig is &lt;1.0.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231228" version="1" comment="libtirpc3 is &lt;1.0.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231229" version="1" comment="libtirpc3-32bit is &lt;1.0.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231244" version="1" comment="ceph is &lt;12.2.7+git.1531910353.c0ef85b854-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231245" version="1" comment="ceph-common is &lt;12.2.7+git.1531910353.c0ef85b854-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231246" version="1" comment="libcephfs2 is &lt;12.2.7+git.1531910353.c0ef85b854-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231247" version="1" comment="librados2 is &lt;12.2.7+git.1531910353.c0ef85b854-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231248" version="1" comment="libradosstriper1 is &lt;12.2.7+git.1531910353.c0ef85b854-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231249" version="1" comment="librbd1 is &lt;12.2.7+git.1531910353.c0ef85b854-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231250" version="1" comment="librgw2 is &lt;12.2.7+git.1531910353.c0ef85b854-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231251" version="1" comment="python-cephfs is &lt;12.2.7+git.1531910353.c0ef85b854-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231252" version="1" comment="python-rados is &lt;12.2.7+git.1531910353.c0ef85b854-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231253" version="1" comment="python-rbd is &lt;12.2.7+git.1531910353.c0ef85b854-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231254" version="1" comment="python-rgw is &lt;12.2.7+git.1531910353.c0ef85b854-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231330" version="1" comment="libsoup is &lt;2.62.2-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231836" version="1" comment="NetworkManager-vpnc is &lt;1.0.8-8.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231837" version="1" comment="NetworkManager-vpnc-gnome is &lt;1.0.8-8.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231838" version="1" comment="NetworkManager-vpnc-lang is &lt;1.0.8-8.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231839" version="1" comment="libvirt is &lt;3.3.0-5.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231840" version="1" comment="libvirt-admin is &lt;3.3.0-5.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231841" version="1" comment="libvirt-client is &lt;3.3.0-5.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231842" version="1" comment="libvirt-daemon is &lt;3.3.0-5.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231843" version="1" comment="libvirt-daemon-config-network is &lt;3.3.0-5.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231844" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.3.0-5.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231845" version="1" comment="libvirt-daemon-driver-interface is &lt;3.3.0-5.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231846" version="1" comment="libvirt-daemon-driver-libxl is &lt;3.3.0-5.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231847" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.3.0-5.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231848" version="1" comment="libvirt-daemon-driver-network is &lt;3.3.0-5.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231849" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.3.0-5.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231850" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.3.0-5.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231851" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.3.0-5.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231852" version="1" comment="libvirt-daemon-driver-secret is &lt;3.3.0-5.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231853" version="1" comment="libvirt-daemon-driver-storage is &lt;3.3.0-5.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231854" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.3.0-5.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231855" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.3.0-5.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231856" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.3.0-5.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231857" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.3.0-5.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231858" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.3.0-5.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231859" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;3.3.0-5.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231860" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.3.0-5.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231861" version="1" comment="libvirt-daemon-lxc is &lt;3.3.0-5.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231862" version="1" comment="libvirt-daemon-qemu is &lt;3.3.0-5.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231863" version="1" comment="libvirt-daemon-xen is &lt;3.3.0-5.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231864" version="1" comment="libvirt-doc is &lt;3.3.0-5.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231865" version="1" comment="libvirt-libs is &lt;3.3.0-5.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231980" version="1" comment="libdcerpc-binding0 is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231981" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231982" version="1" comment="libdcerpc0 is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231983" version="1" comment="libdcerpc0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231984" version="1" comment="libndr-krb5pac0 is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231985" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231986" version="1" comment="libndr-nbt0 is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231987" version="1" comment="libndr-nbt0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231988" version="1" comment="libndr-standard0 is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231989" version="1" comment="libndr-standard0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231990" version="1" comment="libndr0 is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231991" version="1" comment="libndr0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231992" version="1" comment="libnetapi0 is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231993" version="1" comment="libnetapi0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231994" version="1" comment="libsamba-credentials0 is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231995" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231996" version="1" comment="libsamba-errors0 is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231997" version="1" comment="libsamba-errors0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231998" version="1" comment="libsamba-hostconfig0 is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231999" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232000" version="1" comment="libsamba-passdb0 is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232001" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232002" version="1" comment="libsamba-util0 is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232003" version="1" comment="libsamba-util0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232004" version="1" comment="libsamdb0 is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232005" version="1" comment="libsamdb0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232006" version="1" comment="libsmbclient0 is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232007" version="1" comment="libsmbclient0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232008" version="1" comment="libsmbconf0 is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232009" version="1" comment="libsmbconf0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232010" version="1" comment="libsmbldap0 is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232011" version="1" comment="libsmbldap0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232012" version="1" comment="libtevent-util0 is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232013" version="1" comment="libtevent-util0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232014" version="1" comment="libwbclient0 is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232015" version="1" comment="libwbclient0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232016" version="1" comment="samba is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232017" version="1" comment="samba-client is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232018" version="1" comment="samba-client-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232019" version="1" comment="samba-doc is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232020" version="1" comment="samba-libs is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232021" version="1" comment="samba-libs-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232022" version="1" comment="samba-winbind is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232023" version="1" comment="samba-winbind-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232026" version="1" comment="clamav is &lt;0.100.1-33.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232027" version="1" comment="kernel-default is &lt;4.4.143-94.47" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232028" version="1" comment="kernel-default-devel is &lt;4.4.143-94.47" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232029" version="1" comment="kernel-default-extra is &lt;4.4.143-94.47" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232030" version="1" comment="kernel-devel is &lt;4.4.143-94.47" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232031" version="1" comment="kernel-macros is &lt;4.4.143-94.47" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232032" version="1" comment="kernel-source is &lt;4.4.143-94.47" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232033" version="1" comment="kernel-syms is &lt;4.4.143-94.47" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232280" version="1" comment="ucode-intel is &lt;20180807-13.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240800" version="1" comment="libblkid1 is &lt;2.29.2-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240801" version="1" comment="libblkid1-32bit is &lt;2.29.2-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240802" version="1" comment="libfdisk1 is &lt;2.29.2-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240803" version="1" comment="libmount1 is &lt;2.29.2-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240804" version="1" comment="libmount1-32bit is &lt;2.29.2-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240805" version="1" comment="libsmartcols1 is &lt;2.29.2-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240806" version="1" comment="libuuid-devel is &lt;2.29.2-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240807" version="1" comment="libuuid1 is &lt;2.29.2-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240808" version="1" comment="libuuid1-32bit is &lt;2.29.2-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240809" version="1" comment="python-libmount is &lt;2.29.2-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240810" version="1" comment="util-linux is &lt;2.29.2-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240811" version="1" comment="util-linux-lang is &lt;2.29.2-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240812" version="1" comment="util-linux-systemd is &lt;2.29.2-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240813" version="1" comment="uuidd is &lt;2.29.2-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232667" version="1" comment="xen is &lt;4.9.2_10-3.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232668" version="1" comment="xen-libs is &lt;4.9.2_10-3.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232669" version="1" comment="xen-libs-32bit is &lt;4.9.2_10-3.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240640" version="1" comment="libgcrypt is &lt;1.6.1-16.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240641" version="1" comment="libgcrypt20 is &lt;1.6.1-16.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240642" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233146" version="1" comment="libcgroup is &lt;0.41.rc1-10.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233147" version="1" comment="libcgroup1 is &lt;0.41.rc1-10.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233874" version="1" comment="spice-gtk is &lt;0.33-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233878" version="1" comment="spice is &lt;0.12.8-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234256" version="1" comment="compat-openssl098 is &lt;0.9.8j-106.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234515" version="1" comment="curl is &lt;7.37.0-37.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234516" version="1" comment="libcurl4 is &lt;7.37.0-37.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234517" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234755" version="1" comment="kernel-default is &lt;4.4.155-94.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234756" version="1" comment="kernel-default-devel is &lt;4.4.155-94.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234757" version="1" comment="kernel-default-extra is &lt;4.4.155-94.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234758" version="1" comment="kernel-devel is &lt;4.4.155-94.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234759" version="1" comment="kernel-macros is &lt;4.4.155-94.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234760" version="1" comment="kernel-source is &lt;4.4.155-94.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234761" version="1" comment="kernel-syms is &lt;4.4.155-94.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234954" version="1" comment="openslp is &lt;2.0.0-18.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234955" version="1" comment="openslp-32bit is &lt;2.0.0-18.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234956" version="1" comment="ImageMagick is &lt;6.8.8.1-71.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234957" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234958" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234959" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234960" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234961" version="1" comment="liblouis is &lt;2.6.4-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235121" version="1" comment="libzypp is &lt;16.17.20-2.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251824" version="1" comment="zypper is &lt;1.13.45-21.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251825" version="1" comment="zypper-log is &lt;1.13.45-21.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235124" version="1" comment="libXcursor is &lt;1.1.14-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235127" version="1" comment="libtiff5 is &lt;4.0.9-44.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235128" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235129" version="1" comment="tiff is &lt;4.0.9-44.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187884" version="1" comment="libvirt is &lt;3.3.0-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187885" version="1" comment="libvirt-admin is &lt;3.3.0-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187886" version="1" comment="libvirt-client is &lt;3.3.0-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187887" version="1" comment="libvirt-daemon is &lt;3.3.0-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187888" version="1" comment="libvirt-daemon-config-network is &lt;3.3.0-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187889" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.3.0-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187890" version="1" comment="libvirt-daemon-driver-interface is &lt;3.3.0-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187891" version="1" comment="libvirt-daemon-driver-libxl is &lt;3.3.0-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187892" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.3.0-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187893" version="1" comment="libvirt-daemon-driver-network is &lt;3.3.0-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187894" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.3.0-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187895" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.3.0-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187896" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.3.0-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187897" version="1" comment="libvirt-daemon-driver-secret is &lt;3.3.0-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187898" version="1" comment="libvirt-daemon-driver-storage is &lt;3.3.0-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187899" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.3.0-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187900" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.3.0-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187901" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.3.0-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187902" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.3.0-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187903" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.3.0-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187904" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;3.3.0-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187905" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.3.0-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187906" version="1" comment="libvirt-daemon-lxc is &lt;3.3.0-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187907" version="1" comment="libvirt-daemon-qemu is &lt;3.3.0-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187908" version="1" comment="libvirt-daemon-xen is &lt;3.3.0-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187909" version="1" comment="libvirt-doc is &lt;3.3.0-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187910" version="1" comment="libvirt-libs is &lt;3.3.0-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235613" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235614" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235615" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235616" version="1" comment="openssl is &lt;1.0.2j-60.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235823" version="1" comment="kernel-default is &lt;4.4.156-94.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235824" version="1" comment="kernel-default-devel is &lt;4.4.156-94.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235825" version="1" comment="kernel-default-extra is &lt;4.4.156-94.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235826" version="1" comment="kernel-devel is &lt;4.4.156-94.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235827" version="1" comment="kernel-macros is &lt;4.4.156-94.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235828" version="1" comment="kernel-source is &lt;4.4.156-94.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235829" version="1" comment="kernel-syms is &lt;4.4.156-94.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236719" version="1" comment="postgresql10-libs is &lt;10.5-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236766" version="1" comment="libxml2 is &lt;2.9.4-46.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236815" version="1" comment="ImageMagick is &lt;6.8.8.1-71.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236816" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236817" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236818" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236819" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236843" version="1" comment="libX11 is &lt;1.6.2-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236849" version="1" comment="libxcb is &lt;1.10-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237405" version="1" comment="ImageMagick is &lt;6.8.8.1-71.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237406" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237407" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237408" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237409" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237413" version="1" comment="libssh is &lt;0.6.3-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187914" version="1" comment="libXdmcp is &lt;1.1.1-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187917" version="1" comment="libICE is &lt;1.0.8-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237875" version="1" comment="rpm-python is &lt;4.11.2-16.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237919" version="1" comment="pam_pkcs11 is &lt;0.6.8-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237920" version="1" comment="pam_pkcs11-32bit is &lt;0.6.8-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187920" version="1" comment="jasper is &lt;1.900.14-195.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187921" version="1" comment="libjasper1 is &lt;1.900.14-195.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187922" version="1" comment="libjasper1-32bit is &lt;1.900.14-195.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237921" version="1" comment="libraw is &lt;0.15.4-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251826" version="1" comment="zziplib is &lt;0.13.67-10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238048" version="1" comment="postgresql96 is &lt;9.6.10-3.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238049" version="1" comment="postgresql96-libs is &lt;9.6.10-3.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238056" version="1" comment="webkit2gtk3 is &lt;2.20.3-2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238057" version="1" comment="exempi is &lt;2.2.1-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238278" version="1" comment="xen is &lt;4.9.3_03-3.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238279" version="1" comment="xen-libs is &lt;4.9.3_03-3.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238280" version="1" comment="xen-libs-32bit is &lt;4.9.3_03-3.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238356" version="1" comment="qemu is &lt;2.9.1-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238357" version="1" comment="qemu-block-curl is &lt;2.9.1-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238358" version="1" comment="qemu-ipxe is &lt;1.0.0-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238359" version="1" comment="qemu-kvm is &lt;2.9.1-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238360" version="1" comment="qemu-seabios is &lt;1.10.2-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238361" version="1" comment="qemu-sgabios is &lt;8-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238362" version="1" comment="qemu-tools is &lt;2.9.1-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238363" version="1" comment="qemu-vgabios is &lt;1.10.2-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238364" version="1" comment="qemu-x86 is &lt;2.9.1-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238365" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238366" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-28.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238367" version="1" comment="python is &lt;2.7.13-28.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238368" version="1" comment="python-base is &lt;2.7.13-28.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238369" version="1" comment="python-curses is &lt;2.7.13-28.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238370" version="1" comment="python-devel is &lt;2.7.13-28.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238371" version="1" comment="python-tk is &lt;2.7.13-28.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238372" version="1" comment="python-xml is &lt;2.7.13-28.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238484" version="1" comment="audiofile is &lt;0.3.6-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238485" version="1" comment="libaudiofile1 is &lt;0.3.6-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238486" version="1" comment="libaudiofile1-32bit is &lt;0.3.6-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238487" version="1" comment="libntfs-3g84 is &lt;2013.1.13-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238488" version="1" comment="ntfs-3g is &lt;2013.1.13-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238489" version="1" comment="ntfs-3g_ntfsprogs is &lt;2013.1.13-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238490" version="1" comment="ntfsprogs is &lt;2013.1.13-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238491" version="1" comment="libwireshark9 is &lt;2.4.10-48.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238492" version="1" comment="libwiretap7 is &lt;2.4.10-48.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238493" version="1" comment="libwscodecs1 is &lt;2.4.10-48.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238494" version="1" comment="libwsutil8 is &lt;2.4.10-48.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238495" version="1" comment="wireshark is &lt;2.4.10-48.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238496" version="1" comment="wireshark-gtk is &lt;2.4.10-48.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238497" version="1" comment="MozillaFirefox is &lt;60.2.2esr-109.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238498" version="1" comment="MozillaFirefox-branding-SLE is &lt;60-32.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238499" version="1" comment="MozillaFirefox-translations-common is &lt;60.2.2esr-109.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238500" version="1" comment="libfreebl3 is &lt;3.36.4-58.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238501" version="1" comment="libfreebl3-32bit is &lt;3.36.4-58.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238502" version="1" comment="libsoftokn3 is &lt;3.36.4-58.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238503" version="1" comment="libsoftokn3-32bit is &lt;3.36.4-58.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238504" version="1" comment="mozilla-nspr is &lt;4.19-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238505" version="1" comment="mozilla-nspr-32bit is &lt;4.19-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238506" version="1" comment="mozilla-nss is &lt;3.36.4-58.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238507" version="1" comment="mozilla-nss-32bit is &lt;3.36.4-58.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238508" version="1" comment="mozilla-nss-certs is &lt;3.36.4-58.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238509" version="1" comment="mozilla-nss-certs-32bit is &lt;3.36.4-58.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238510" version="1" comment="mozilla-nss-sysinit is &lt;3.36.4-58.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238511" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.36.4-58.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238512" version="1" comment="mozilla-nss-tools is &lt;3.36.4-58.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238548" version="1" comment="curl is &lt;7.37.0-37.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238549" version="1" comment="libcurl4 is &lt;7.37.0-37.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238550" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238551" version="1" comment="libSoundTouch0 is &lt;1.7.1-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238552" version="1" comment="libSoundTouch0-32bit is &lt;1.7.1-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238553" version="1" comment="soundtouch is &lt;1.7.1-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238569" version="1" comment="opensc is &lt;0.13.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238630" version="1" comment="libarchive is &lt;3.1.2-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238631" version="1" comment="libarchive13 is &lt;3.1.2-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238974" version="1" comment="kernel-default is &lt;4.4.162-94.69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238975" version="1" comment="kernel-default-devel is &lt;4.4.162-94.69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238976" version="1" comment="kernel-default-extra is &lt;4.4.162-94.69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238977" version="1" comment="kernel-devel is &lt;4.4.162-94.69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238978" version="1" comment="kernel-macros is &lt;4.4.162-94.69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238979" version="1" comment="kernel-source is &lt;4.4.162-94.69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238980" version="1" comment="kernel-syms is &lt;4.4.162-94.69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239145" version="1" comment="MozillaFirefox is &lt;60.3.0-109.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239146" version="1" comment="MozillaFirefox-translations-common is &lt;60.3.0-109.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239187" version="1" comment="libsystemd0 is &lt;228-150.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239188" version="1" comment="libsystemd0-32bit is &lt;228-150.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239189" version="1" comment="libudev1 is &lt;228-150.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239190" version="1" comment="libudev1-32bit is &lt;228-150.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239191" version="1" comment="systemd is &lt;228-150.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239192" version="1" comment="systemd-32bit is &lt;228-150.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239193" version="1" comment="systemd-bash-completion is &lt;228-150.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239194" version="1" comment="systemd-sysvinit is &lt;228-150.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239195" version="1" comment="udev is &lt;228-150.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239200" version="1" comment="libecpg6 is &lt;10.6-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239201" version="1" comment="libpq5 is &lt;10.6-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239202" version="1" comment="libpq5-32bit is &lt;10.6-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239203" version="1" comment="postgresql10 is &lt;10.6-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239204" version="1" comment="postgresql10-libs is &lt;10.6-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239789" version="1" comment="libwpd is &lt;0.10.2-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239790" version="1" comment="libwpd-0_10-10 is &lt;0.10.2-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187923" version="1" comment="kernel-default is &lt;4.4.114-94.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187924" version="1" comment="kernel-default-devel is &lt;4.4.114-94.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187925" version="1" comment="kernel-default-extra is &lt;4.4.114-94.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187926" version="1" comment="kernel-devel is &lt;4.4.114-94.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187927" version="1" comment="kernel-macros is &lt;4.4.114-94.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187928" version="1" comment="kernel-source is &lt;4.4.114-94.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187929" version="1" comment="kernel-syms is &lt;4.4.114-94.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240575" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240576" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240577" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240578" version="1" comment="openssl is &lt;1.0.2j-60.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240643" version="1" comment="rpm is &lt;4.11.2-16.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240644" version="1" comment="rpm-32bit is &lt;4.11.2-16.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240645" version="1" comment="rpm-build is &lt;4.11.2-16.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240646" version="1" comment="rpm-python is &lt;4.11.2-16.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240647" version="1" comment="exiv2 is &lt;0.23-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240648" version="1" comment="libexiv2-12 is &lt;0.23-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240746" version="1" comment="libtiff5 is &lt;4.0.9-44.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240747" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240748" version="1" comment="tiff is &lt;4.0.9-44.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240749" version="1" comment="openssh is &lt;7.2p2-74.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240750" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240751" version="1" comment="openssh-helpers is &lt;7.2p2-74.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240938" version="1" comment="libncurses5 is &lt;5.9-61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240939" version="1" comment="libncurses5-32bit is &lt;5.9-61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240940" version="1" comment="libncurses6 is &lt;5.9-61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240941" version="1" comment="libncurses6-32bit is &lt;5.9-61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240942" version="1" comment="ncurses is &lt;5.9-61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240943" version="1" comment="ncurses-devel is &lt;5.9-61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240944" version="1" comment="ncurses-utils is &lt;5.9-61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240945" version="1" comment="tack is &lt;5.9-61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240946" version="1" comment="terminfo is &lt;5.9-61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240947" version="1" comment="terminfo-base is &lt;5.9-61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241278" version="1" comment="ImageMagick is &lt;6.8.8.1-71.93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241279" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241280" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241281" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241282" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241574" version="1" comment="python-cryptography is &lt;1.3.1-7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241575" version="1" comment="python-pyOpenSSL is &lt;16.0.0-4.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241576" version="1" comment="python-setuptools is &lt;18.0.1-4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241577" version="1" comment="python3-setuptools is &lt;18.0.1-4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241601" version="1" comment="compat-openssl098 is &lt;0.9.8j-106.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241602" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-106.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241603" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-106.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241604" version="1" comment="xen is &lt;4.9.3_03-3.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241605" version="1" comment="xen-libs is &lt;4.9.3_03-3.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241606" version="1" comment="xen-libs-32bit is &lt;4.9.3_03-3.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241670" version="1" comment="ghostscript is &lt;9.26-23.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241671" version="1" comment="ghostscript-x11 is &lt;9.26-23.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241672" version="1" comment="libspectre is &lt;0.2.7-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241673" version="1" comment="libspectre1 is &lt;0.2.7-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241674" version="1" comment="cups-client is &lt;1.7.5-20.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241675" version="1" comment="cups-libs is &lt;1.7.5-20.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241676" version="1" comment="cups-libs-32bit is &lt;1.7.5-20.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241753" version="1" comment="qemu is &lt;2.9.1-6.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241754" version="1" comment="qemu-block-curl is &lt;2.9.1-6.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241755" version="1" comment="qemu-ipxe is &lt;1.0.0+-6.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241756" version="1" comment="qemu-kvm is &lt;2.9.1-6.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241757" version="1" comment="qemu-seabios is &lt;1.10.2-6.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241758" version="1" comment="qemu-sgabios is &lt;8-6.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241759" version="1" comment="qemu-tools is &lt;2.9.1-6.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241760" version="1" comment="qemu-vgabios is &lt;1.10.2-6.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241761" version="1" comment="qemu-x86 is &lt;2.9.1-6.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241922" version="1" comment="tcpdump is &lt;4.9.2-14.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241923" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241924" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241925" version="1" comment="openldap2 is &lt;2.4.41-18.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241926" version="1" comment="openldap2-client is &lt;2.4.41-18.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241974" version="1" comment="libQt5Concurrent5 is &lt;5.6.2-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241975" version="1" comment="libQt5Core5 is &lt;5.6.2-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241976" version="1" comment="libQt5DBus5 is &lt;5.6.2-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241977" version="1" comment="libQt5Gui5 is &lt;5.6.2-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241978" version="1" comment="libQt5Network5 is &lt;5.6.2-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241979" version="1" comment="libQt5OpenGL5 is &lt;5.6.2-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241980" version="1" comment="libQt5PrintSupport5 is &lt;5.6.2-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241981" version="1" comment="libQt5Sql5 is &lt;5.6.2-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241982" version="1" comment="libQt5Sql5-mysql is &lt;5.6.2-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241983" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.2-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241984" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.2-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241985" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.2-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241986" version="1" comment="libQt5Test5 is &lt;5.6.2-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241987" version="1" comment="libQt5Widgets5 is &lt;5.6.2-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241988" version="1" comment="libQt5Xml5 is &lt;5.6.2-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241989" version="1" comment="libqt5-qtbase is &lt;5.6.2-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242063" version="1" comment="bluez is &lt;5.13-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242064" version="1" comment="bluez-cups is &lt;5.13-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242065" version="1" comment="libbluetooth3 is &lt;5.13-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242066" version="1" comment="libtiff5 is &lt;4.0.9-44.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242067" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242068" version="1" comment="tiff is &lt;4.0.9-44.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187930" version="1" comment="xen is &lt;4.9.1_08-3.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187931" version="1" comment="xen-libs is &lt;4.9.1_08-3.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187932" version="1" comment="xen-libs-32bit is &lt;4.9.1_08-3.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242217" version="1" comment="libatalk12 is &lt;3.1.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242218" version="1" comment="netatalk is &lt;3.1.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242219" version="1" comment="MozillaFirefox is &lt;60.4.0esr-109.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242220" version="1" comment="MozillaFirefox-translations-common is &lt;60.4.0esr-109.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242221" version="1" comment="libfreebl3 is &lt;3.40.1-58.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242222" version="1" comment="libfreebl3-32bit is &lt;3.40.1-58.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242223" version="1" comment="libsoftokn3 is &lt;3.40.1-58.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242224" version="1" comment="libsoftokn3-32bit is &lt;3.40.1-58.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242225" version="1" comment="mozilla-nspr is &lt;4.20-19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242226" version="1" comment="mozilla-nspr-32bit is &lt;4.20-19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242227" version="1" comment="mozilla-nss is &lt;3.40.1-58.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242228" version="1" comment="mozilla-nss-32bit is &lt;3.40.1-58.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242229" version="1" comment="mozilla-nss-certs is &lt;3.40.1-58.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242230" version="1" comment="mozilla-nss-certs-32bit is &lt;3.40.1-58.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242231" version="1" comment="mozilla-nss-sysinit is &lt;3.40.1-58.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242232" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.40.1-58.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242233" version="1" comment="mozilla-nss-tools is &lt;3.40.1-58.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187933" version="1" comment="libreoffice-base is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187934" version="1" comment="libreoffice-base-drivers-mysql is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187935" version="1" comment="libreoffice-base-drivers-postgresql is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187936" version="1" comment="libreoffice-calc is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187937" version="1" comment="libreoffice-calc-extensions is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187938" version="1" comment="libreoffice-draw is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187939" version="1" comment="libreoffice-filters-optional is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187940" version="1" comment="libreoffice-gnome is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187941" version="1" comment="libreoffice-icon-theme-galaxy is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187942" version="1" comment="libreoffice-icon-theme-tango is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187943" version="1" comment="libreoffice-impress is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187944" version="1" comment="libreoffice-l10n-af is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187945" version="1" comment="libreoffice-l10n-ar is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187946" version="1" comment="libreoffice-l10n-ca is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187947" version="1" comment="libreoffice-l10n-cs is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187948" version="1" comment="libreoffice-l10n-da is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187949" version="1" comment="libreoffice-l10n-de is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187950" version="1" comment="libreoffice-l10n-en is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187951" version="1" comment="libreoffice-l10n-es is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187952" version="1" comment="libreoffice-l10n-fi is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187953" version="1" comment="libreoffice-l10n-fr is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187954" version="1" comment="libreoffice-l10n-gu is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187955" version="1" comment="libreoffice-l10n-hi is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187956" version="1" comment="libreoffice-l10n-hu is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187957" version="1" comment="libreoffice-l10n-it is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187958" version="1" comment="libreoffice-l10n-ja is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187959" version="1" comment="libreoffice-l10n-ko is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187960" version="1" comment="libreoffice-l10n-nb is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187961" version="1" comment="libreoffice-l10n-nl is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187962" version="1" comment="libreoffice-l10n-nn is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187963" version="1" comment="libreoffice-l10n-pl is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187964" version="1" comment="libreoffice-l10n-pt_BR is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187965" version="1" comment="libreoffice-l10n-pt_PT is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187966" version="1" comment="libreoffice-l10n-ro is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187967" version="1" comment="libreoffice-l10n-ru is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187968" version="1" comment="libreoffice-l10n-sk is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187969" version="1" comment="libreoffice-l10n-sv is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187970" version="1" comment="libreoffice-l10n-xh is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187971" version="1" comment="libreoffice-l10n-zh_CN is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187972" version="1" comment="libreoffice-l10n-zh_TW is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187973" version="1" comment="libreoffice-l10n-zu is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187974" version="1" comment="libreoffice-mailmerge is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187975" version="1" comment="libreoffice-math is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187976" version="1" comment="libreoffice-officebean is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187977" version="1" comment="libreoffice-pyuno is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187978" version="1" comment="libreoffice-writer is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187979" version="1" comment="libreoffice-writer-extensions is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187980" version="1" comment="libreofficekit is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242465" version="1" comment="libwireshark9 is &lt;2.4.11-48.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242466" version="1" comment="libwiretap7 is &lt;2.4.11-48.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242467" version="1" comment="libwscodecs1 is &lt;2.4.11-48.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242468" version="1" comment="libwsutil8 is &lt;2.4.11-48.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242469" version="1" comment="wireshark is &lt;2.4.11-48.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242470" version="1" comment="wireshark-gtk is &lt;2.4.11-48.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187981" version="1" comment="drm is &lt;4.9.33-4.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187982" version="1" comment="drm-kmp-default is &lt;4.9.33_k4.4.114_94.11-4.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187986" version="1" comment="libdcerpc-binding0 is &lt;4.6.13+git.72.2a684235f41-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187987" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187988" version="1" comment="libdcerpc0 is &lt;4.6.13+git.72.2a684235f41-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187989" version="1" comment="libdcerpc0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187990" version="1" comment="libndr-krb5pac0 is &lt;4.6.13+git.72.2a684235f41-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187991" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187992" version="1" comment="libndr-nbt0 is &lt;4.6.13+git.72.2a684235f41-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187993" version="1" comment="libndr-nbt0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187994" version="1" comment="libndr-standard0 is &lt;4.6.13+git.72.2a684235f41-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187995" version="1" comment="libndr-standard0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187996" version="1" comment="libndr0 is &lt;4.6.13+git.72.2a684235f41-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187997" version="1" comment="libndr0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187998" version="1" comment="libnetapi0 is &lt;4.6.13+git.72.2a684235f41-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009187999" version="1" comment="libnetapi0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188000" version="1" comment="libsamba-credentials0 is &lt;4.6.13+git.72.2a684235f41-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188001" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188002" version="1" comment="libsamba-errors0 is &lt;4.6.13+git.72.2a684235f41-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188003" version="1" comment="libsamba-errors0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188004" version="1" comment="libsamba-hostconfig0 is &lt;4.6.13+git.72.2a684235f41-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188005" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188006" version="1" comment="libsamba-passdb0 is &lt;4.6.13+git.72.2a684235f41-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188007" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188008" version="1" comment="libsamba-util0 is &lt;4.6.13+git.72.2a684235f41-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188009" version="1" comment="libsamba-util0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188010" version="1" comment="libsamdb0 is &lt;4.6.13+git.72.2a684235f41-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188011" version="1" comment="libsamdb0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188012" version="1" comment="libsmbclient0 is &lt;4.6.13+git.72.2a684235f41-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188013" version="1" comment="libsmbclient0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188014" version="1" comment="libsmbconf0 is &lt;4.6.13+git.72.2a684235f41-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188015" version="1" comment="libsmbconf0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188016" version="1" comment="libsmbldap0 is &lt;4.6.13+git.72.2a684235f41-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188017" version="1" comment="libsmbldap0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188018" version="1" comment="libtalloc2 is &lt;2.1.10-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188019" version="1" comment="libtalloc2-32bit is &lt;2.1.10-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188020" version="1" comment="libtevent-util0 is &lt;4.6.13+git.72.2a684235f41-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188021" version="1" comment="libtevent-util0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188022" version="1" comment="libtevent0 is &lt;0.9.34-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188023" version="1" comment="libtevent0-32bit is &lt;0.9.34-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188024" version="1" comment="libwbclient0 is &lt;4.6.13+git.72.2a684235f41-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188025" version="1" comment="libwbclient0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188026" version="1" comment="python-talloc is &lt;2.1.10-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188027" version="1" comment="python-talloc-32bit is &lt;2.1.10-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188028" version="1" comment="samba is &lt;4.6.13+git.72.2a684235f41-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188029" version="1" comment="samba-client is &lt;4.6.13+git.72.2a684235f41-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188030" version="1" comment="samba-client-32bit is &lt;4.6.13+git.72.2a684235f41-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188031" version="1" comment="samba-doc is &lt;4.6.13+git.72.2a684235f41-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188032" version="1" comment="samba-libs is &lt;4.6.13+git.72.2a684235f41-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188033" version="1" comment="samba-libs-32bit is &lt;4.6.13+git.72.2a684235f41-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188034" version="1" comment="samba-winbind is &lt;4.6.13+git.72.2a684235f41-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188035" version="1" comment="samba-winbind-32bit is &lt;4.6.13+git.72.2a684235f41-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188036" version="1" comment="talloc is &lt;2.1.10-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188037" version="1" comment="qemu is &lt;2.9.1-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188038" version="1" comment="qemu-block-curl is &lt;2.9.1-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188039" version="1" comment="qemu-ipxe is &lt;1.0.0-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188040" version="1" comment="qemu-kvm is &lt;2.9.1-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188041" version="1" comment="qemu-seabios is &lt;1.10.2-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188042" version="1" comment="qemu-sgabios is &lt;8-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188043" version="1" comment="qemu-tools is &lt;2.9.1-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188044" version="1" comment="qemu-vgabios is &lt;1.10.2-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188045" version="1" comment="qemu-x86 is &lt;2.9.1-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188046" version="1" comment="kernel-default is &lt;4.4.120-94.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188047" version="1" comment="kernel-default-devel is &lt;4.4.120-94.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188048" version="1" comment="kernel-default-extra is &lt;4.4.120-94.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188049" version="1" comment="kernel-devel is &lt;4.4.120-94.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188050" version="1" comment="kernel-macros is &lt;4.4.120-94.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188051" version="1" comment="kernel-source is &lt;4.4.120-94.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188052" version="1" comment="kernel-syms is &lt;4.4.120-94.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188053" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.33-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188054" version="1" comment="libspice-client-glib-helper is &lt;0.33-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188055" version="1" comment="libspice-client-gtk-3_0-5 is &lt;0.33-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188056" version="1" comment="libspice-controller0 is &lt;0.33-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188057" version="1" comment="spice-gtk is &lt;0.33-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188058" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.33-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188059" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.33-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188060" version="1" comment="libidn is &lt;1.28-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188063" version="1" comment="libvirt is &lt;3.3.0-5.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188064" version="1" comment="libvirt-admin is &lt;3.3.0-5.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188065" version="1" comment="libvirt-client is &lt;3.3.0-5.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188066" version="1" comment="libvirt-daemon is &lt;3.3.0-5.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188067" version="1" comment="libvirt-daemon-config-network is &lt;3.3.0-5.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188068" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.3.0-5.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188069" version="1" comment="libvirt-daemon-driver-interface is &lt;3.3.0-5.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188070" version="1" comment="libvirt-daemon-driver-libxl is &lt;3.3.0-5.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188071" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.3.0-5.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188072" version="1" comment="libvirt-daemon-driver-network is &lt;3.3.0-5.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188073" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.3.0-5.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188074" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.3.0-5.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188075" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.3.0-5.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188076" version="1" comment="libvirt-daemon-driver-secret is &lt;3.3.0-5.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188077" version="1" comment="libvirt-daemon-driver-storage is &lt;3.3.0-5.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188078" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.3.0-5.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188079" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.3.0-5.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188080" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.3.0-5.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188081" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.3.0-5.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188082" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.3.0-5.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188083" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;3.3.0-5.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188084" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.3.0-5.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188085" version="1" comment="libvirt-daemon-lxc is &lt;3.3.0-5.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188086" version="1" comment="libvirt-daemon-qemu is &lt;3.3.0-5.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188087" version="1" comment="libvirt-daemon-xen is &lt;3.3.0-5.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188088" version="1" comment="libvirt-doc is &lt;3.3.0-5.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188089" version="1" comment="libvirt-libs is &lt;3.3.0-5.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188090" version="1" comment="virt-install is &lt;1.4.1-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188091" version="1" comment="virt-manager is &lt;1.4.1-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188092" version="1" comment="virt-manager-common is &lt;1.4.1-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188093" version="1" comment="libzzip-0-13 is &lt;0.13.67-10.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251827" version="1" comment="zziplib is &lt;0.13.67-10.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188095" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-25.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188096" version="1" comment="python3 is &lt;3.4.6-25.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188097" version="1" comment="python3-base is &lt;3.4.6-25.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188098" version="1" comment="python3-curses is &lt;3.4.6-25.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188113" version="1" comment="ntp is &lt;4.2.8p11-64.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188114" version="1" comment="ntp-doc is &lt;4.2.8p11-64.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188115" version="1" comment="libwireshark8 is &lt;2.2.14-48.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188116" version="1" comment="libwiretap6 is &lt;2.2.14-48.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188117" version="1" comment="libwscodecs1 is &lt;2.2.14-48.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188118" version="1" comment="libwsutil7 is &lt;2.2.14-48.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188119" version="1" comment="wireshark is &lt;2.2.14-48.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188120" version="1" comment="wireshark-gtk is &lt;2.2.14-48.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188121" version="1" comment="kernel-default is &lt;4.4.126-94.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188122" version="1" comment="kernel-default-devel is &lt;4.4.126-94.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188123" version="1" comment="kernel-default-extra is &lt;4.4.126-94.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188124" version="1" comment="kernel-devel is &lt;4.4.126-94.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188125" version="1" comment="kernel-macros is &lt;4.4.126-94.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188126" version="1" comment="kernel-source is &lt;4.4.126-94.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188127" version="1" comment="kernel-syms is &lt;4.4.126-94.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188128" version="1" comment="PackageKit-backend-zypp is &lt;1.1.3-24.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188129" version="1" comment="PackageKit-gstreamer-plugin is &lt;1.1.3-24.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188130" version="1" comment="PackageKit-gtk3-module is &lt;1.1.3-24.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188131" version="1" comment="PackageKit-lang is &lt;1.1.3-24.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188132" version="1" comment="libpackagekit-glib2-18 is &lt;1.1.3-24.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188133" version="1" comment="typelib-1_0-PackageKitGlib-1_0 is &lt;1.1.3-24.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188135" version="1" comment="perl is &lt;5.18.2-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188136" version="1" comment="perl-32bit is &lt;5.18.2-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188137" version="1" comment="perl-base is &lt;5.18.2-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188138" version="1" comment="perl-doc is &lt;5.18.2-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188140" version="1" comment="boost is &lt;1.54.0-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188141" version="1" comment="boost-license1_54_0 is &lt;1.54.0-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188142" version="1" comment="gnome-documents is &lt;3.20.1-10.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188143" version="1" comment="gnome-documents-lang is &lt;3.20.1-10.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188144" version="1" comment="gnome-documents_books-common is &lt;3.20.1-10.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188145" version="1" comment="gnome-shell-search-provider-documents is &lt;3.20.1-10.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188146" version="1" comment="libboost_atomic1_54_0 is &lt;1.54.0-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188147" version="1" comment="libboost_date_time1_54_0 is &lt;1.54.0-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188148" version="1" comment="libboost_filesystem1_54_0 is &lt;1.54.0-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188149" version="1" comment="libboost_iostreams1_54_0 is &lt;1.54.0-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188150" version="1" comment="libboost_locale1_54_0 is &lt;1.54.0-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188151" version="1" comment="libboost_program_options1_54_0 is &lt;1.54.0-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188152" version="1" comment="libboost_random1_54_0 is &lt;1.54.0-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188153" version="1" comment="libboost_regex1_54_0 is &lt;1.54.0-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188154" version="1" comment="libboost_signals1_54_0 is &lt;1.54.0-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188155" version="1" comment="libboost_system1_54_0 is &lt;1.54.0-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188156" version="1" comment="libboost_thread1_54_0 is &lt;1.54.0-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188157" version="1" comment="libepubgen is &lt;0.1.0-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188158" version="1" comment="libepubgen-0_1-1 is &lt;0.1.0-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188159" version="1" comment="libixion is &lt;0.13.0-13.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188160" version="1" comment="libixion-0_13-0 is &lt;0.13.0-13.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188161" version="1" comment="libmwaw is &lt;0.3.13-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188163" version="1" comment="liborcus is &lt;0.13.4-10.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188164" version="1" comment="liborcus-0_13-0 is &lt;0.13.4-10.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188165" version="1" comment="libqxp is &lt;0.0.1-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188166" version="1" comment="libqxp-0_0-0 is &lt;0.0.1-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188167" version="1" comment="libreoffice-base is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188168" version="1" comment="libreoffice-base-drivers-mysql is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188169" version="1" comment="libreoffice-base-drivers-postgresql is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188170" version="1" comment="libreoffice-branding-upstream is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188171" version="1" comment="libreoffice-calc is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188172" version="1" comment="libreoffice-calc-extensions is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188173" version="1" comment="libreoffice-draw is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188174" version="1" comment="libreoffice-filters-optional is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188175" version="1" comment="libreoffice-gnome is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188176" version="1" comment="libreoffice-gtk2 is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188177" version="1" comment="libreoffice-icon-themes is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188178" version="1" comment="libreoffice-impress is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188179" version="1" comment="libreoffice-l10n-af is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188180" version="1" comment="libreoffice-l10n-ar is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188181" version="1" comment="libreoffice-l10n-ca is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188182" version="1" comment="libreoffice-l10n-cs is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188183" version="1" comment="libreoffice-l10n-da is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188184" version="1" comment="libreoffice-l10n-de is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188185" version="1" comment="libreoffice-l10n-en is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188186" version="1" comment="libreoffice-l10n-es is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188187" version="1" comment="libreoffice-l10n-fi is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188188" version="1" comment="libreoffice-l10n-fr is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188189" version="1" comment="libreoffice-l10n-gu is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188190" version="1" comment="libreoffice-l10n-hi is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188191" version="1" comment="libreoffice-l10n-hu is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188192" version="1" comment="libreoffice-l10n-it is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188193" version="1" comment="libreoffice-l10n-ja is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188194" version="1" comment="libreoffice-l10n-ko is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188195" version="1" comment="libreoffice-l10n-nb is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188196" version="1" comment="libreoffice-l10n-nl is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188197" version="1" comment="libreoffice-l10n-nn is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188198" version="1" comment="libreoffice-l10n-pl is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188199" version="1" comment="libreoffice-l10n-pt_BR is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188200" version="1" comment="libreoffice-l10n-pt_PT is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188201" version="1" comment="libreoffice-l10n-ro is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188202" version="1" comment="libreoffice-l10n-ru is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188203" version="1" comment="libreoffice-l10n-sk is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188204" version="1" comment="libreoffice-l10n-sv is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188205" version="1" comment="libreoffice-l10n-xh is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188206" version="1" comment="libreoffice-l10n-zh_CN is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188207" version="1" comment="libreoffice-l10n-zh_TW is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188208" version="1" comment="libreoffice-l10n-zu is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188209" version="1" comment="libreoffice-mailmerge is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188210" version="1" comment="libreoffice-math is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188211" version="1" comment="libreoffice-officebean is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188212" version="1" comment="libreoffice-pyuno is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188213" version="1" comment="libreoffice-writer is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188214" version="1" comment="libreoffice-writer-extensions is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188215" version="1" comment="libstaroffice is &lt;0.0.5-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188217" version="1" comment="libwps is &lt;0.4.7-10.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188218" version="1" comment="libwps-0_4-4 is &lt;0.4.7-10.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188219" version="1" comment="myspell-af_NA is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188220" version="1" comment="myspell-af_ZA is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188221" version="1" comment="myspell-ar is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188222" version="1" comment="myspell-ar_AE is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188223" version="1" comment="myspell-ar_BH is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188224" version="1" comment="myspell-ar_DZ is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188225" version="1" comment="myspell-ar_EG is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188226" version="1" comment="myspell-ar_IQ is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188227" version="1" comment="myspell-ar_JO is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188228" version="1" comment="myspell-ar_KW is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188229" version="1" comment="myspell-ar_LB is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188230" version="1" comment="myspell-ar_LY is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188231" version="1" comment="myspell-ar_MA is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188232" version="1" comment="myspell-ar_OM is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188233" version="1" comment="myspell-ar_QA is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188234" version="1" comment="myspell-ar_SA is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188235" version="1" comment="myspell-ar_SD is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188236" version="1" comment="myspell-ar_SY is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188237" version="1" comment="myspell-ar_TN is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188238" version="1" comment="myspell-ar_YE is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188239" version="1" comment="myspell-be_BY is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188240" version="1" comment="myspell-bg_BG is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188241" version="1" comment="myspell-bn_BD is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188242" version="1" comment="myspell-bn_IN is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188243" version="1" comment="myspell-bs is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188244" version="1" comment="myspell-bs_BA is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188245" version="1" comment="myspell-ca is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188246" version="1" comment="myspell-ca_AD is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188247" version="1" comment="myspell-ca_ES is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188248" version="1" comment="myspell-ca_ES_valencia is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188249" version="1" comment="myspell-ca_FR is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188250" version="1" comment="myspell-ca_IT is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188251" version="1" comment="myspell-cs_CZ is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188252" version="1" comment="myspell-da_DK is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188253" version="1" comment="myspell-de is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188254" version="1" comment="myspell-de_AT is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188255" version="1" comment="myspell-de_CH is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188256" version="1" comment="myspell-de_DE is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188257" version="1" comment="myspell-dictionaries is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188258" version="1" comment="myspell-el_GR is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188259" version="1" comment="myspell-en is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188260" version="1" comment="myspell-en_AU is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188261" version="1" comment="myspell-en_BS is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188262" version="1" comment="myspell-en_BZ is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188263" version="1" comment="myspell-en_CA is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188264" version="1" comment="myspell-en_GB is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188265" version="1" comment="myspell-en_GH is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188266" version="1" comment="myspell-en_IE is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188267" version="1" comment="myspell-en_IN is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188268" version="1" comment="myspell-en_JM is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188269" version="1" comment="myspell-en_MW is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188270" version="1" comment="myspell-en_NA is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188271" version="1" comment="myspell-en_NZ is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188272" version="1" comment="myspell-en_PH is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188273" version="1" comment="myspell-en_TT is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188274" version="1" comment="myspell-en_US is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188275" version="1" comment="myspell-en_ZA is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188276" version="1" comment="myspell-en_ZW is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188277" version="1" comment="myspell-es is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188278" version="1" comment="myspell-es_AR is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188279" version="1" comment="myspell-es_BO is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188280" version="1" comment="myspell-es_CL is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188281" version="1" comment="myspell-es_CO is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188282" version="1" comment="myspell-es_CR is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188283" version="1" comment="myspell-es_CU is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188284" version="1" comment="myspell-es_DO is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188285" version="1" comment="myspell-es_EC is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188286" version="1" comment="myspell-es_ES is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188287" version="1" comment="myspell-es_GT is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188288" version="1" comment="myspell-es_HN is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188289" version="1" comment="myspell-es_MX is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188290" version="1" comment="myspell-es_NI is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188291" version="1" comment="myspell-es_PA is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188292" version="1" comment="myspell-es_PE is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188293" version="1" comment="myspell-es_PR is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188294" version="1" comment="myspell-es_PY is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188295" version="1" comment="myspell-es_SV is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188296" version="1" comment="myspell-es_UY is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188297" version="1" comment="myspell-es_VE is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188298" version="1" comment="myspell-et_EE is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188299" version="1" comment="myspell-fr_BE is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188300" version="1" comment="myspell-fr_CA is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188301" version="1" comment="myspell-fr_CH is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188302" version="1" comment="myspell-fr_FR is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188303" version="1" comment="myspell-fr_LU is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188304" version="1" comment="myspell-fr_MC is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188305" version="1" comment="myspell-gu_IN is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188306" version="1" comment="myspell-he_IL is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188307" version="1" comment="myspell-hi_IN is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188308" version="1" comment="myspell-hr_HR is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188309" version="1" comment="myspell-hu_HU is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188310" version="1" comment="myspell-id is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188311" version="1" comment="myspell-id_ID is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188312" version="1" comment="myspell-it_IT is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188313" version="1" comment="myspell-lightproof-en is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188314" version="1" comment="myspell-lightproof-hu_HU is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188315" version="1" comment="myspell-lightproof-pt_BR is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188316" version="1" comment="myspell-lightproof-ru_RU is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188317" version="1" comment="myspell-lo_LA is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188318" version="1" comment="myspell-lt_LT is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188319" version="1" comment="myspell-lv_LV is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188320" version="1" comment="myspell-nb_NO is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188321" version="1" comment="myspell-nl_BE is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188322" version="1" comment="myspell-nl_NL is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188323" version="1" comment="myspell-nn_NO is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188324" version="1" comment="myspell-no is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188325" version="1" comment="myspell-pl_PL is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188326" version="1" comment="myspell-pt_AO is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188327" version="1" comment="myspell-pt_BR is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188328" version="1" comment="myspell-pt_PT is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188329" version="1" comment="myspell-ro is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188330" version="1" comment="myspell-ro_RO is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188331" version="1" comment="myspell-ru_RU is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188332" version="1" comment="myspell-sk_SK is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188333" version="1" comment="myspell-sl_SI is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188334" version="1" comment="myspell-sr is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188335" version="1" comment="myspell-sr_CS is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188336" version="1" comment="myspell-sr_Latn_CS is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188337" version="1" comment="myspell-sr_Latn_RS is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188338" version="1" comment="myspell-sr_RS is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188339" version="1" comment="myspell-sv_FI is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188340" version="1" comment="myspell-sv_SE is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188341" version="1" comment="myspell-te is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188342" version="1" comment="myspell-te_IN is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188343" version="1" comment="myspell-th_TH is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188344" version="1" comment="myspell-uk_UA is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188345" version="1" comment="myspell-vi is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188346" version="1" comment="myspell-vi_VN is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188347" version="1" comment="myspell-zu_ZA is &lt;20180403-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188349" version="1" comment="ImageMagick is &lt;6.8.8.1-71.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188350" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188351" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188352" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188353" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188354" version="1" comment="libtiff5 is &lt;4.0.9-44.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188355" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188356" version="1" comment="tiff is &lt;4.0.9-44.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188357" version="1" comment="xen is &lt;4.9.2_04-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188358" version="1" comment="xen-libs is &lt;4.9.2_04-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188359" version="1" comment="xen-libs-32bit is &lt;4.9.2_04-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188360" version="1" comment="cairo is &lt;1.15.2-25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188366" version="1" comment="qemu is &lt;2.9.1-6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188367" version="1" comment="qemu-block-curl is &lt;2.9.1-6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188368" version="1" comment="qemu-ipxe is &lt;1.0.0-6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188369" version="1" comment="qemu-kvm is &lt;2.9.1-6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188370" version="1" comment="qemu-seabios is &lt;1.10.2-6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188371" version="1" comment="qemu-sgabios is &lt;8-6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188372" version="1" comment="qemu-tools is &lt;2.9.1-6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188373" version="1" comment="qemu-vgabios is &lt;1.10.2-6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188374" version="1" comment="qemu-x86 is &lt;2.9.1-6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188376" version="1" comment="librsvg is &lt;2.40.20-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188380" version="1" comment="libreoffice-base is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188381" version="1" comment="libreoffice-base-drivers-mysql is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188382" version="1" comment="libreoffice-base-drivers-postgresql is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188383" version="1" comment="libreoffice-branding-upstream is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188384" version="1" comment="libreoffice-calc is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188385" version="1" comment="libreoffice-calc-extensions is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188386" version="1" comment="libreoffice-draw is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188387" version="1" comment="libreoffice-filters-optional is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188388" version="1" comment="libreoffice-gnome is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188389" version="1" comment="libreoffice-gtk2 is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188390" version="1" comment="libreoffice-icon-themes is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188391" version="1" comment="libreoffice-impress is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188392" version="1" comment="libreoffice-l10n-af is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188393" version="1" comment="libreoffice-l10n-ar is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188394" version="1" comment="libreoffice-l10n-ca is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188395" version="1" comment="libreoffice-l10n-cs is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188396" version="1" comment="libreoffice-l10n-da is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188397" version="1" comment="libreoffice-l10n-de is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188398" version="1" comment="libreoffice-l10n-en is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188399" version="1" comment="libreoffice-l10n-es is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188400" version="1" comment="libreoffice-l10n-fi is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188401" version="1" comment="libreoffice-l10n-fr is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188402" version="1" comment="libreoffice-l10n-gu is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188403" version="1" comment="libreoffice-l10n-hi is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188404" version="1" comment="libreoffice-l10n-hu is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188405" version="1" comment="libreoffice-l10n-it is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188406" version="1" comment="libreoffice-l10n-ja is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188407" version="1" comment="libreoffice-l10n-ko is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188408" version="1" comment="libreoffice-l10n-nb is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188409" version="1" comment="libreoffice-l10n-nl is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188410" version="1" comment="libreoffice-l10n-nn is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188411" version="1" comment="libreoffice-l10n-pl is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188412" version="1" comment="libreoffice-l10n-pt_BR is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188413" version="1" comment="libreoffice-l10n-pt_PT is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188414" version="1" comment="libreoffice-l10n-ro is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188415" version="1" comment="libreoffice-l10n-ru is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188416" version="1" comment="libreoffice-l10n-sk is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188417" version="1" comment="libreoffice-l10n-sv is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188418" version="1" comment="libreoffice-l10n-xh is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188419" version="1" comment="libreoffice-l10n-zh_CN is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188420" version="1" comment="libreoffice-l10n-zh_TW is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188421" version="1" comment="libreoffice-l10n-zu is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188422" version="1" comment="libreoffice-mailmerge is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188423" version="1" comment="libreoffice-math is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188424" version="1" comment="libreoffice-officebean is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188425" version="1" comment="libreoffice-pyuno is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188426" version="1" comment="libreoffice-writer is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188427" version="1" comment="libreoffice-writer-extensions is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188428" version="1" comment="libvorbis is &lt;1.3.3-10.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188429" version="1" comment="libvorbis0 is &lt;1.3.3-10.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188430" version="1" comment="libvorbis0-32bit is &lt;1.3.3-10.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188431" version="1" comment="libvorbisenc2 is &lt;1.3.3-10.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188432" version="1" comment="libvorbisenc2-32bit is &lt;1.3.3-10.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188433" version="1" comment="libvorbisfile3 is &lt;1.3.3-10.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188434" version="1" comment="libvorbisfile3-32bit is &lt;1.3.3-10.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188435" version="1" comment="curl is &lt;7.37.0-37.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188436" version="1" comment="libcurl4 is &lt;7.37.0-37.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188437" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188438" version="1" comment="ghostscript is &lt;9.15-23.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188439" version="1" comment="ghostscript-x11 is &lt;9.15-23.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188440" version="1" comment="MozillaFirefox is &lt;52.8.0esr-109.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188441" version="1" comment="MozillaFirefox-translations is &lt;52.8.0esr-109.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188443" version="1" comment="openjpeg2 is &lt;2.1.0-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188444" version="1" comment="qemu is &lt;2.9.1-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188445" version="1" comment="qemu-block-curl is &lt;2.9.1-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188446" version="1" comment="qemu-ipxe is &lt;1.0.0-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188447" version="1" comment="qemu-kvm is &lt;2.9.1-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188448" version="1" comment="qemu-seabios is &lt;1.10.2-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188449" version="1" comment="qemu-sgabios is &lt;8-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188450" version="1" comment="qemu-tools is &lt;2.9.1-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188451" version="1" comment="qemu-vgabios is &lt;1.10.2-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188452" version="1" comment="qemu-x86 is &lt;2.9.1-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188453" version="1" comment="kernel-default is &lt;4.4.131-94.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188454" version="1" comment="kernel-default-devel is &lt;4.4.131-94.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188455" version="1" comment="kernel-default-extra is &lt;4.4.131-94.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188456" version="1" comment="kernel-devel is &lt;4.4.131-94.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188457" version="1" comment="kernel-macros is &lt;4.4.131-94.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188458" version="1" comment="kernel-source is &lt;4.4.131-94.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188459" version="1" comment="kernel-syms is &lt;4.4.131-94.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188461" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188462" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188463" version="1" comment="python is &lt;2.7.13-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188464" version="1" comment="python-base is &lt;2.7.13-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188465" version="1" comment="python-curses is &lt;2.7.13-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188466" version="1" comment="python-devel is &lt;2.7.13-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188467" version="1" comment="python-tk is &lt;2.7.13-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188468" version="1" comment="python-xml is &lt;2.7.13-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188469" version="1" comment="bash is &lt;4.3-83.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188470" version="1" comment="bash-doc is &lt;4.3-83.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188471" version="1" comment="bash-lang is &lt;4.3-83.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188472" version="1" comment="libreadline6 is &lt;6.3-83.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188473" version="1" comment="libreadline6-32bit is &lt;6.3-83.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188474" version="1" comment="readline-doc is &lt;6.3-83.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188479" version="1" comment="ceph is &lt;12.2.5+git.1524775272.5e7ea8cf03-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188480" version="1" comment="ceph-common is &lt;12.2.5+git.1524775272.5e7ea8cf03-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188481" version="1" comment="libcephfs2 is &lt;12.2.5+git.1524775272.5e7ea8cf03-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188482" version="1" comment="librados2 is &lt;12.2.5+git.1524775272.5e7ea8cf03-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188483" version="1" comment="libradosstriper1 is &lt;12.2.5+git.1524775272.5e7ea8cf03-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188484" version="1" comment="librbd1 is &lt;12.2.5+git.1524775272.5e7ea8cf03-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188485" version="1" comment="librgw2 is &lt;12.2.5+git.1524775272.5e7ea8cf03-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188486" version="1" comment="python-cephfs is &lt;12.2.5+git.1524775272.5e7ea8cf03-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188487" version="1" comment="python-rados is &lt;12.2.5+git.1524775272.5e7ea8cf03-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188488" version="1" comment="python-rbd is &lt;12.2.5+git.1524775272.5e7ea8cf03-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188489" version="1" comment="python-rgw is &lt;12.2.5+git.1524775272.5e7ea8cf03-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188490" version="1" comment="jasper is &lt;1.900.14-195.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188493" version="1" comment="libmodplug is &lt;0.8.9.0+git20170610.f6dd59a-15.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188495" version="1" comment="xen is &lt;4.9.2_06-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188496" version="1" comment="xen-libs is &lt;4.9.2_06-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188497" version="1" comment="xen-libs-32bit is &lt;4.9.2_06-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251828" version="1" comment="libntfs-3g84 is &lt;2013.1.13-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251829" version="1" comment="ntfs-3g is &lt;2013.1.13-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251830" version="1" comment="ntfs-3g_ntfsprogs is &lt;2013.1.13-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251831" version="1" comment="ntfsprogs is &lt;2013.1.13-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251985" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.24.0-2.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251986" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.24.0-2.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251987" version="1" comment="libwebkit2gtk3-lang is &lt;2.24.0-2.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251988" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.24.0-2.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251989" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.24.0-2.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251990" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.24.0-2.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251991" version="1" comment="webkit2gtk3 is &lt;2.24.0-2.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252173" version="1" comment="ImageMagick is &lt;6.8.8.1-71.108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252174" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252175" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252176" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252177" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252178" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252179" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252180" version="1" comment="libdcerpc-binding0 is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252181" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252182" version="1" comment="libdcerpc0 is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252183" version="1" comment="libdcerpc0-32bit is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252184" version="1" comment="libndr-krb5pac0 is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252185" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252186" version="1" comment="libndr-nbt0 is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252187" version="1" comment="libndr-nbt0-32bit is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252188" version="1" comment="libndr-standard0 is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252189" version="1" comment="libndr-standard0-32bit is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252190" version="1" comment="libndr0 is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252191" version="1" comment="libndr0-32bit is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252192" version="1" comment="libnetapi0 is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252193" version="1" comment="libnetapi0-32bit is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252194" version="1" comment="libsamba-credentials0 is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252195" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252196" version="1" comment="libsamba-errors0 is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252197" version="1" comment="libsamba-errors0-32bit is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252198" version="1" comment="libsamba-hostconfig0 is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252199" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252200" version="1" comment="libsamba-passdb0 is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252201" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252202" version="1" comment="libsamba-util0 is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252203" version="1" comment="libsamba-util0-32bit is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252204" version="1" comment="libsamdb0 is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252205" version="1" comment="libsamdb0-32bit is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252206" version="1" comment="libsmbclient0 is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252207" version="1" comment="libsmbclient0-32bit is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252208" version="1" comment="libsmbconf0 is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252209" version="1" comment="libsmbconf0-32bit is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252210" version="1" comment="libsmbldap0 is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252211" version="1" comment="libsmbldap0-32bit is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252212" version="1" comment="libtevent-util0 is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252213" version="1" comment="libtevent-util0-32bit is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252214" version="1" comment="libwbclient0 is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252215" version="1" comment="libwbclient0-32bit is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252216" version="1" comment="samba is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252217" version="1" comment="samba-client is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252218" version="1" comment="samba-client-32bit is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252219" version="1" comment="samba-doc is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252220" version="1" comment="samba-libs is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252221" version="1" comment="samba-libs-32bit is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252222" version="1" comment="samba-winbind is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252223" version="1" comment="samba-winbind-32bit is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252224" version="1" comment="libwireshark9 is &lt;2.4.14-48.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252225" version="1" comment="libwiretap7 is &lt;2.4.14-48.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252226" version="1" comment="libwscodecs1 is &lt;2.4.14-48.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252227" version="1" comment="libwsutil8 is &lt;2.4.14-48.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252228" version="1" comment="wireshark is &lt;2.4.14-48.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252229" version="1" comment="wireshark-gtk is &lt;2.4.14-48.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252387" version="1" comment="libvirt is &lt;3.3.0-5.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252388" version="1" comment="libvirt-admin is &lt;3.3.0-5.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252389" version="1" comment="libvirt-client is &lt;3.3.0-5.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252390" version="1" comment="libvirt-daemon is &lt;3.3.0-5.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252391" version="1" comment="libvirt-daemon-config-network is &lt;3.3.0-5.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252392" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.3.0-5.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252393" version="1" comment="libvirt-daemon-driver-interface is &lt;3.3.0-5.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252394" version="1" comment="libvirt-daemon-driver-libxl is &lt;3.3.0-5.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252395" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.3.0-5.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252396" version="1" comment="libvirt-daemon-driver-network is &lt;3.3.0-5.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252397" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.3.0-5.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252398" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.3.0-5.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252399" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.3.0-5.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252400" version="1" comment="libvirt-daemon-driver-secret is &lt;3.3.0-5.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252401" version="1" comment="libvirt-daemon-driver-storage is &lt;3.3.0-5.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252402" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.3.0-5.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252403" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.3.0-5.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252404" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.3.0-5.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252405" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.3.0-5.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252406" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.3.0-5.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252407" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;3.3.0-5.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252408" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.3.0-5.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252409" version="1" comment="libvirt-daemon-lxc is &lt;3.3.0-5.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252410" version="1" comment="libvirt-daemon-qemu is &lt;3.3.0-5.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252411" version="1" comment="libvirt-daemon-xen is &lt;3.3.0-5.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252412" version="1" comment="libvirt-doc is &lt;3.3.0-5.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252413" version="1" comment="libvirt-libs is &lt;3.3.0-5.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252439" version="1" comment="libssh2-1 is &lt;1.4.3-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252440" version="1" comment="libssh2-1-32bit is &lt;1.4.3-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252441" version="1" comment="libssh2_org is &lt;1.4.3-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252539" version="1" comment="wpa_supplicant is &lt;2.6-15.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252540" version="1" comment="atftp is &lt;0.7.0-160.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243063" version="1" comment="krb5 is &lt;1.12.5-40.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243064" version="1" comment="krb5-32bit is &lt;1.12.5-40.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243065" version="1" comment="krb5-client is &lt;1.12.5-40.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252733" version="1" comment="libjpeg-turbo is &lt;1.5.3-31.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252734" version="1" comment="libjpeg62 is &lt;62.2.0-31.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252735" version="1" comment="libjpeg62-32bit is &lt;62.2.0-31.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252736" version="1" comment="libjpeg62-turbo is &lt;1.5.3-31.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252737" version="1" comment="libjpeg8 is &lt;8.1.2-31.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252738" version="1" comment="libjpeg8-32bit is &lt;8.1.2-31.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252739" version="1" comment="libturbojpeg0 is &lt;8.1.2-31.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252740" version="1" comment="supportutils is &lt;3.0-95.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252860" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252861" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252862" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252863" version="1" comment="openssl is &lt;1.0.2j-60.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252948" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.24.1-2.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252949" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.24.1-2.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252950" version="1" comment="libwebkit2gtk3-lang is &lt;2.24.1-2.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252951" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.24.1-2.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252952" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.24.1-2.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252953" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.24.1-2.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252954" version="1" comment="webkit2gtk3 is &lt;2.24.1-2.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252966" version="1" comment="audit is &lt;2.8.1-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252967" version="1" comment="audit-secondary is &lt;2.8.1-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252968" version="1" comment="libaudit1 is &lt;2.8.1-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252969" version="1" comment="libaudit1-32bit is &lt;2.8.1-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252970" version="1" comment="libauparse0 is &lt;2.8.1-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253199" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253200" version="1" comment="libsqlite3-0-32bit is &lt;3.8.10.2-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253201" version="1" comment="sqlite3 is &lt;3.8.10.2-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253327" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.212-27.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253328" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.212-27.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253450" version="1" comment="libxslt is &lt;1.1.28-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253451" version="1" comment="libxslt-tools is &lt;1.1.28-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253452" version="1" comment="libxslt1 is &lt;1.1.28-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253453" version="1" comment="libxslt1-32bit is &lt;1.1.28-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253548" version="1" comment="ucode-intel is &lt;20190507-13.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253477" version="1" comment="qemu is &lt;2.9.1-6.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253479" version="1" comment="qemu-block-curl is &lt;2.9.1-6.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253484" version="1" comment="qemu-ipxe is &lt;1.0.0+-6.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253485" version="1" comment="qemu-kvm is &lt;2.9.1-6.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253549" version="1" comment="qemu-seabios is &lt;1.10.2-6.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253550" version="1" comment="qemu-sgabios is &lt;8-6.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253489" version="1" comment="qemu-tools is &lt;2.9.1-6.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253490" version="1" comment="qemu-vgabios is &lt;1.10.2-6.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253551" version="1" comment="qemu-x86 is &lt;2.9.1-6.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253457" version="1" comment="kernel-default is &lt;4.4.178-94.91" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253492" version="1" comment="kernel-default-devel is &lt;4.4.178-94.91" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253552" version="1" comment="kernel-default-extra is &lt;4.4.178-94.91" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253494" version="1" comment="kernel-devel is &lt;4.4.178-94.91" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253495" version="1" comment="kernel-macros is &lt;4.4.178-94.91" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253496" version="1" comment="kernel-source is &lt;4.4.178-94.91" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253497" version="1" comment="kernel-syms is &lt;4.4.178-94.91" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253471" version="1" comment="xen is &lt;4.9.4_04-3.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253553" version="1" comment="xen-libs is &lt;4.9.4_04-3.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253554" version="1" comment="xen-libs-32bit is &lt;4.9.4_04-3.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253637" version="1" comment="libsystemd0 is &lt;228-150.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253638" version="1" comment="libsystemd0-32bit is &lt;228-150.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253639" version="1" comment="libudev1 is &lt;228-150.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253640" version="1" comment="libudev1-32bit is &lt;228-150.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253641" version="1" comment="systemd is &lt;228-150.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253642" version="1" comment="systemd-32bit is &lt;228-150.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253643" version="1" comment="systemd-bash-completion is &lt;228-150.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253644" version="1" comment="systemd-sysvinit is &lt;228-150.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253645" version="1" comment="udev is &lt;228-150.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243164" version="1" comment="libraw is &lt;0.15.4-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243165" version="1" comment="libraw9 is &lt;0.15.4-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243166" version="1" comment="PackageKit-backend-zypp is &lt;1.1.3-24.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243167" version="1" comment="PackageKit-gstreamer-plugin is &lt;1.1.3-24.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243168" version="1" comment="PackageKit-gtk3-module is &lt;1.1.3-24.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243169" version="1" comment="PackageKit-lang is &lt;1.1.3-24.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243170" version="1" comment="libpackagekit-glib2-18 is &lt;1.1.3-24.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243171" version="1" comment="typelib-1_0-PackageKitGlib-1_0 is &lt;1.1.3-24.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253935" version="1" comment="ucode-intel is &lt;20190514-13.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243234" version="1" comment="openssh is &lt;7.2p2-74.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243235" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243236" version="1" comment="openssh-helpers is &lt;7.2p2-74.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254050" version="1" comment="sysstat is &lt;12.0.2-10.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254156" version="1" comment="bluez is &lt;5.13-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254157" version="1" comment="bluez-cups is &lt;5.13-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254158" version="1" comment="libbluetooth3 is &lt;5.13-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243237" version="1" comment="freerdp is &lt;2.0.0~git.1463131968.4e66df7-12.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243238" version="1" comment="libfreerdp2 is &lt;2.0.0~git.1463131968.4e66df7-12.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243239" version="1" comment="libsystemd0 is &lt;228-150.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243240" version="1" comment="libsystemd0-32bit is &lt;228-150.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243241" version="1" comment="libudev1 is &lt;228-150.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243242" version="1" comment="libudev1-32bit is &lt;228-150.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243243" version="1" comment="systemd is &lt;228-150.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243244" version="1" comment="systemd-32bit is &lt;228-150.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243245" version="1" comment="systemd-bash-completion is &lt;228-150.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243246" version="1" comment="systemd-sysvinit is &lt;228-150.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243247" version="1" comment="udev is &lt;228-150.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254159" version="1" comment="screen is &lt;4.0.4-23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254456" version="1" comment="curl is &lt;7.37.0-37.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254457" version="1" comment="libcurl4 is &lt;7.37.0-37.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254458" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254566" version="1" comment="libtasn1 is &lt;4.9-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254567" version="1" comment="libtasn1-6 is &lt;4.9-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254568" version="1" comment="libtasn1-6-32bit is &lt;4.9-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243248" version="1" comment="libwireshark9 is &lt;2.4.12-48.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243249" version="1" comment="libwiretap7 is &lt;2.4.12-48.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243250" version="1" comment="libwscodecs1 is &lt;2.4.12-48.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243251" version="1" comment="libwsutil8 is &lt;2.4.12-48.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243252" version="1" comment="wireshark is &lt;2.4.12-48.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243253" version="1" comment="wireshark-gtk is &lt;2.4.12-48.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255745" version="1" comment="MozillaFirefox is &lt;60.7.0-109.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255746" version="1" comment="MozillaFirefox-translations-common is &lt;60.7.0-109.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255747" version="1" comment="gnome-shell is &lt;3.20.4-77.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255748" version="1" comment="gnome-shell-browser-plugin is &lt;3.20.4-77.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255749" version="1" comment="gnome-shell-calendar is &lt;3.20.4-77.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255750" version="1" comment="gnome-shell-lang is &lt;3.20.4-77.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255751" version="1" comment="evolution is &lt;3.22.6-19.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255752" version="1" comment="evolution-lang is &lt;3.22.6-19.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255753" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.221-43.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255754" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.221-43.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255827" version="1" comment="bind is &lt;9.9.9P1-63.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255828" version="1" comment="bind-libs is &lt;9.9.9P1-63.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255829" version="1" comment="bind-utils is &lt;9.9.9P1-63.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256140" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256141" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-28.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256142" version="1" comment="python is &lt;2.7.13-28.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256143" version="1" comment="python-base is &lt;2.7.13-28.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256144" version="1" comment="python-curses is &lt;2.7.13-28.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256145" version="1" comment="python-devel is &lt;2.7.13-28.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256146" version="1" comment="python-tk is &lt;2.7.13-28.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256147" version="1" comment="python-xml is &lt;2.7.13-28.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243291" version="1" comment="ghostscript is &lt;9.26a-23.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243292" version="1" comment="ghostscript-x11 is &lt;9.26a-23.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243293" version="1" comment="libspectre is &lt;0.2.7-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243294" version="1" comment="libspectre1 is &lt;0.2.7-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256200" version="1" comment="libixion is &lt;0.14.1-13.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256201" version="1" comment="libixion-0_14-0 is &lt;0.14.1-13.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256202" version="1" comment="liborcus is &lt;0.14.1-10.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256203" version="1" comment="liborcus-0_14-0 is &lt;0.14.1-10.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256204" version="1" comment="libreoffice-base is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256205" version="1" comment="libreoffice-base-drivers-postgresql is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256206" version="1" comment="libreoffice-branding-upstream is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256207" version="1" comment="libreoffice-calc is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256208" version="1" comment="libreoffice-calc-extensions is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256209" version="1" comment="libreoffice-draw is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256210" version="1" comment="libreoffice-filters-optional is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256211" version="1" comment="libreoffice-gnome is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256212" version="1" comment="libreoffice-gtk2 is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256213" version="1" comment="libreoffice-icon-themes is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256214" version="1" comment="libreoffice-impress is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256215" version="1" comment="libreoffice-l10n-af is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256216" version="1" comment="libreoffice-l10n-ar is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256217" version="1" comment="libreoffice-l10n-ca is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256218" version="1" comment="libreoffice-l10n-cs is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256219" version="1" comment="libreoffice-l10n-da is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256220" version="1" comment="libreoffice-l10n-de is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256221" version="1" comment="libreoffice-l10n-en is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256222" version="1" comment="libreoffice-l10n-es is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256223" version="1" comment="libreoffice-l10n-fi is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256224" version="1" comment="libreoffice-l10n-fr is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256225" version="1" comment="libreoffice-l10n-gu is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256226" version="1" comment="libreoffice-l10n-hi is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256227" version="1" comment="libreoffice-l10n-hu is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256228" version="1" comment="libreoffice-l10n-it is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256229" version="1" comment="libreoffice-l10n-ja is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256230" version="1" comment="libreoffice-l10n-ko is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256231" version="1" comment="libreoffice-l10n-nb is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256232" version="1" comment="libreoffice-l10n-nl is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256233" version="1" comment="libreoffice-l10n-nn is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256234" version="1" comment="libreoffice-l10n-pl is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256235" version="1" comment="libreoffice-l10n-pt_BR is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256236" version="1" comment="libreoffice-l10n-pt_PT is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256237" version="1" comment="libreoffice-l10n-ro is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256238" version="1" comment="libreoffice-l10n-ru is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256239" version="1" comment="libreoffice-l10n-sk is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256240" version="1" comment="libreoffice-l10n-sv is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256241" version="1" comment="libreoffice-l10n-xh is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256242" version="1" comment="libreoffice-l10n-zh_CN is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256243" version="1" comment="libreoffice-l10n-zh_TW is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256244" version="1" comment="libreoffice-l10n-zu is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256245" version="1" comment="libreoffice-mailmerge is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256246" version="1" comment="libreoffice-math is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256247" version="1" comment="libreoffice-officebean is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256248" version="1" comment="libreoffice-pyuno is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256249" version="1" comment="libreoffice-writer is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256250" version="1" comment="libreoffice-writer-extensions is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256251" version="1" comment="libwps is &lt;0.4.10-10.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256252" version="1" comment="libwps-0_4-4 is &lt;0.4.10-10.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256253" version="1" comment="myspell-af_NA is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256254" version="1" comment="myspell-af_ZA is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256255" version="1" comment="myspell-ar is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256256" version="1" comment="myspell-ar_AE is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256257" version="1" comment="myspell-ar_BH is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256258" version="1" comment="myspell-ar_DZ is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256259" version="1" comment="myspell-ar_EG is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256260" version="1" comment="myspell-ar_IQ is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256261" version="1" comment="myspell-ar_JO is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256262" version="1" comment="myspell-ar_KW is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256263" version="1" comment="myspell-ar_LB is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256264" version="1" comment="myspell-ar_LY is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256265" version="1" comment="myspell-ar_MA is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256266" version="1" comment="myspell-ar_OM is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256267" version="1" comment="myspell-ar_QA is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256268" version="1" comment="myspell-ar_SA is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256269" version="1" comment="myspell-ar_SD is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256270" version="1" comment="myspell-ar_SY is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256271" version="1" comment="myspell-ar_TN is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256272" version="1" comment="myspell-ar_YE is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256273" version="1" comment="myspell-be_BY is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256274" version="1" comment="myspell-bg_BG is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256275" version="1" comment="myspell-bn_BD is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256276" version="1" comment="myspell-bn_IN is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256277" version="1" comment="myspell-bs is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256278" version="1" comment="myspell-bs_BA is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256279" version="1" comment="myspell-ca is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256280" version="1" comment="myspell-ca_AD is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256281" version="1" comment="myspell-ca_ES is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256282" version="1" comment="myspell-ca_ES_valencia is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256283" version="1" comment="myspell-ca_FR is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256284" version="1" comment="myspell-ca_IT is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256285" version="1" comment="myspell-cs_CZ is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256286" version="1" comment="myspell-da_DK is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256287" version="1" comment="myspell-de is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256288" version="1" comment="myspell-de_AT is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256289" version="1" comment="myspell-de_CH is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256290" version="1" comment="myspell-de_DE is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256291" version="1" comment="myspell-dictionaries is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256292" version="1" comment="myspell-el_GR is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256293" version="1" comment="myspell-en is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256294" version="1" comment="myspell-en_AU is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256295" version="1" comment="myspell-en_BS is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256296" version="1" comment="myspell-en_BZ is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256297" version="1" comment="myspell-en_CA is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256298" version="1" comment="myspell-en_GB is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256299" version="1" comment="myspell-en_GH is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256300" version="1" comment="myspell-en_IE is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256301" version="1" comment="myspell-en_IN is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256302" version="1" comment="myspell-en_JM is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256303" version="1" comment="myspell-en_MW is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256304" version="1" comment="myspell-en_NA is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256305" version="1" comment="myspell-en_NZ is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256306" version="1" comment="myspell-en_PH is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256307" version="1" comment="myspell-en_TT is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256308" version="1" comment="myspell-en_US is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256309" version="1" comment="myspell-en_ZA is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256310" version="1" comment="myspell-en_ZW is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256311" version="1" comment="myspell-es is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256312" version="1" comment="myspell-es_AR is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256313" version="1" comment="myspell-es_BO is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256314" version="1" comment="myspell-es_CL is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256315" version="1" comment="myspell-es_CO is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256316" version="1" comment="myspell-es_CR is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256317" version="1" comment="myspell-es_CU is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256318" version="1" comment="myspell-es_DO is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256319" version="1" comment="myspell-es_EC is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256320" version="1" comment="myspell-es_ES is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256321" version="1" comment="myspell-es_GT is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256322" version="1" comment="myspell-es_HN is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256323" version="1" comment="myspell-es_MX is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256324" version="1" comment="myspell-es_NI is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256325" version="1" comment="myspell-es_PA is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256326" version="1" comment="myspell-es_PE is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256327" version="1" comment="myspell-es_PR is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256328" version="1" comment="myspell-es_PY is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256329" version="1" comment="myspell-es_SV is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256330" version="1" comment="myspell-es_UY is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256331" version="1" comment="myspell-es_VE is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256332" version="1" comment="myspell-et_EE is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256333" version="1" comment="myspell-fr_BE is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256334" version="1" comment="myspell-fr_CA is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256335" version="1" comment="myspell-fr_CH is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256336" version="1" comment="myspell-fr_FR is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256337" version="1" comment="myspell-fr_LU is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256338" version="1" comment="myspell-fr_MC is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256339" version="1" comment="myspell-gu_IN is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256340" version="1" comment="myspell-he_IL is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256341" version="1" comment="myspell-hi_IN is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256342" version="1" comment="myspell-hr_HR is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256343" version="1" comment="myspell-hu_HU is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256344" version="1" comment="myspell-id is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256345" version="1" comment="myspell-id_ID is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256346" version="1" comment="myspell-it_IT is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256347" version="1" comment="myspell-lightproof-en is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256348" version="1" comment="myspell-lightproof-hu_HU is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256349" version="1" comment="myspell-lightproof-pt_BR is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256350" version="1" comment="myspell-lightproof-ru_RU is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256351" version="1" comment="myspell-lo_LA is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256352" version="1" comment="myspell-lt_LT is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256353" version="1" comment="myspell-lv_LV is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256354" version="1" comment="myspell-nb_NO is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256355" version="1" comment="myspell-nl_BE is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256356" version="1" comment="myspell-nl_NL is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256357" version="1" comment="myspell-nn_NO is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256358" version="1" comment="myspell-no is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256359" version="1" comment="myspell-pl_PL is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256360" version="1" comment="myspell-pt_AO is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256361" version="1" comment="myspell-pt_BR is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256362" version="1" comment="myspell-pt_PT is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256363" version="1" comment="myspell-ro is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256364" version="1" comment="myspell-ro_RO is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256365" version="1" comment="myspell-ru_RU is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256366" version="1" comment="myspell-sk_SK is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256367" version="1" comment="myspell-sl_SI is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256368" version="1" comment="myspell-sr is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256369" version="1" comment="myspell-sr_CS is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256370" version="1" comment="myspell-sr_Latn_CS is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256371" version="1" comment="myspell-sr_Latn_RS is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256372" version="1" comment="myspell-sr_RS is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256373" version="1" comment="myspell-sv_FI is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256374" version="1" comment="myspell-sv_SE is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256375" version="1" comment="myspell-te is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256376" version="1" comment="myspell-te_IN is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256377" version="1" comment="myspell-th_TH is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256378" version="1" comment="myspell-uk_UA is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256379" version="1" comment="myspell-vi is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256380" version="1" comment="myspell-vi_VN is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256381" version="1" comment="myspell-zu_ZA is &lt;20190423-16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256634" version="1" comment="gvim is &lt;7.4.326-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256635" version="1" comment="vim is &lt;7.4.326-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256636" version="1" comment="vim-data is &lt;7.4.326-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243295" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.22.5-2.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243296" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.22.5-2.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243297" version="1" comment="libwebkit2gtk3-lang is &lt;2.22.5-2.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243298" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.22.5-2.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243299" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.22.5-2.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243300" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.22.5-2.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243301" version="1" comment="webkit2gtk3 is &lt;2.22.5-2.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256703" version="1" comment="libcroco is &lt;0.6.11-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256704" version="1" comment="libcroco-0_6-3 is &lt;0.6.11-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256705" version="1" comment="libcroco-0_6-3-32bit is &lt;0.6.11-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256706" version="1" comment="libipa_hbac0 is &lt;1.13.4-34.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256707" version="1" comment="libsss_idmap0 is &lt;1.13.4-34.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256708" version="1" comment="libsss_nss_idmap0 is &lt;1.13.4-34.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256709" version="1" comment="libsss_sudo is &lt;1.13.4-34.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256710" version="1" comment="python-sssd-config is &lt;1.13.4-34.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256711" version="1" comment="sssd is &lt;1.13.4-34.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256712" version="1" comment="sssd-ad is &lt;1.13.4-34.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256713" version="1" comment="sssd-ipa is &lt;1.13.4-34.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256714" version="1" comment="sssd-krb5 is &lt;1.13.4-34.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256715" version="1" comment="sssd-krb5-common is &lt;1.13.4-34.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256716" version="1" comment="sssd-ldap is &lt;1.13.4-34.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256717" version="1" comment="sssd-proxy is &lt;1.13.4-34.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256718" version="1" comment="sssd-tools is &lt;1.13.4-34.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256801" version="1" comment="libecpg6 is &lt;10.8-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256802" version="1" comment="libpq5 is &lt;10.8-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256803" version="1" comment="libpq5-32bit is &lt;10.8-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256804" version="1" comment="postgresql10 is &lt;10.8-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256805" version="1" comment="postgresql10-libs is &lt;10.8-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256967" version="1" comment="openssh is &lt;7.2p2-74.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256968" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256969" version="1" comment="openssh-helpers is &lt;7.2p2-74.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256970" version="1" comment="kernel-default is &lt;4.4.180-94.97" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256971" version="1" comment="kernel-default-devel is &lt;4.4.180-94.97" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256972" version="1" comment="kernel-default-extra is &lt;4.4.180-94.97" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256973" version="1" comment="kernel-devel is &lt;4.4.180-94.97" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256974" version="1" comment="kernel-macros is &lt;4.4.180-94.97" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256975" version="1" comment="kernel-source is &lt;4.4.180-94.97" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256976" version="1" comment="kernel-syms is &lt;4.4.180-94.97" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257140" version="1" comment="libvirt is &lt;3.3.0-5.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257141" version="1" comment="libvirt-admin is &lt;3.3.0-5.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257142" version="1" comment="libvirt-client is &lt;3.3.0-5.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257143" version="1" comment="libvirt-daemon is &lt;3.3.0-5.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257144" version="1" comment="libvirt-daemon-config-network is &lt;3.3.0-5.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257145" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.3.0-5.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257146" version="1" comment="libvirt-daemon-driver-interface is &lt;3.3.0-5.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257147" version="1" comment="libvirt-daemon-driver-libxl is &lt;3.3.0-5.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257148" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.3.0-5.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257149" version="1" comment="libvirt-daemon-driver-network is &lt;3.3.0-5.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257150" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.3.0-5.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257151" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.3.0-5.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257152" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.3.0-5.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257153" version="1" comment="libvirt-daemon-driver-secret is &lt;3.3.0-5.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257154" version="1" comment="libvirt-daemon-driver-storage is &lt;3.3.0-5.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257155" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.3.0-5.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257156" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.3.0-5.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257157" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.3.0-5.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257158" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.3.0-5.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257159" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.3.0-5.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257160" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;3.3.0-5.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257161" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.3.0-5.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257162" version="1" comment="libvirt-daemon-lxc is &lt;3.3.0-5.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257163" version="1" comment="libvirt-daemon-qemu is &lt;3.3.0-5.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257164" version="1" comment="libvirt-daemon-xen is &lt;3.3.0-5.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257165" version="1" comment="libvirt-doc is &lt;3.3.0-5.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257166" version="1" comment="libvirt-libs is &lt;3.3.0-5.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257501" version="1" comment="doxygen is &lt;1.8.6-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257759" version="1" comment="gstreamer-plugins-base is &lt;1.8.3-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257760" version="1" comment="gstreamer-plugins-base-lang is &lt;1.8.3-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257761" version="1" comment="libgstallocators-1_0-0 is &lt;1.8.3-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257762" version="1" comment="libgstapp-1_0-0 is &lt;1.8.3-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257763" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.8.3-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257764" version="1" comment="libgstaudio-1_0-0 is &lt;1.8.3-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257765" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.8.3-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257766" version="1" comment="libgstfft-1_0-0 is &lt;1.8.3-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257767" version="1" comment="libgstfft-1_0-0-32bit is &lt;1.8.3-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257768" version="1" comment="libgstpbutils-1_0-0 is &lt;1.8.3-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257769" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.8.3-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257770" version="1" comment="libgstriff-1_0-0 is &lt;1.8.3-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257771" version="1" comment="libgstrtp-1_0-0 is &lt;1.8.3-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257772" version="1" comment="libgstrtsp-1_0-0 is &lt;1.8.3-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257773" version="1" comment="libgstsdp-1_0-0 is &lt;1.8.3-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257774" version="1" comment="libgsttag-1_0-0 is &lt;1.8.3-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257775" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.8.3-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257776" version="1" comment="libgstvideo-1_0-0 is &lt;1.8.3-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257777" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.8.3-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257778" version="1" comment="typelib-1_0-GstAudio-1_0 is &lt;1.8.3-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257779" version="1" comment="typelib-1_0-GstPbutils-1_0 is &lt;1.8.3-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257780" version="1" comment="typelib-1_0-GstTag-1_0 is &lt;1.8.3-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257781" version="1" comment="typelib-1_0-GstVideo-1_0 is &lt;1.8.3-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257782" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257783" version="1" comment="libsqlite3-0-32bit is &lt;3.8.10.2-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257784" version="1" comment="sqlite3 is &lt;3.8.10.2-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257785" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.36-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257786" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.36-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257787" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.36-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257788" version="1" comment="libgstapp-0_10-0 is &lt;0.10.36-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257789" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.36-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257790" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.36-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257791" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.36-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257792" version="1" comment="libssh2-1 is &lt;1.4.3-20.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257793" version="1" comment="libssh2_org is &lt;1.4.3-20.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257794" version="1" comment="compat-openssl098 is &lt;0.9.8j-106.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257795" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-106.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257796" version="1" comment="libwireshark9 is &lt;2.4.15-48.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257797" version="1" comment="libwiretap7 is &lt;2.4.15-48.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257798" version="1" comment="libwscodecs1 is &lt;2.4.15-48.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257799" version="1" comment="libwsutil8 is &lt;2.4.15-48.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257800" version="1" comment="wireshark is &lt;2.4.15-48.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257801" version="1" comment="wireshark-gtk is &lt;2.4.15-48.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257802" version="1" comment="libnetpbm11 is &lt;10.66.3-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257803" version="1" comment="libnetpbm11-32bit is &lt;10.66.3-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257804" version="1" comment="netpbm is &lt;10.66.3-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258028" version="1" comment="MozillaFirefox is &lt;60.7.2-109.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258029" version="1" comment="MozillaFirefox-translations-common is &lt;60.7.2-109.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258050" version="1" comment="postgresql96 is &lt;9.6.13-3.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258051" version="1" comment="postgresql96-libs is &lt;9.6.13-3.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258235" version="1" comment="ImageMagick is &lt;6.8.8.1-71.123" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258236" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.123" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258237" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.123" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258238" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.123" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258239" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.123" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258240" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.123" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258241" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.123" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258525" version="1" comment="dnsmasq is &lt;2.78-18.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258526" version="1" comment="glib2-lang is &lt;2.48.2-12.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258527" version="1" comment="glib2-tools is &lt;2.48.2-12.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258528" version="1" comment="libgio-2_0-0 is &lt;2.48.2-12.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258529" version="1" comment="libgio-2_0-0-32bit is &lt;2.48.2-12.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258530" version="1" comment="libgio-fam is &lt;2.48.2-12.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258531" version="1" comment="libglib-2_0-0 is &lt;2.48.2-12.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258532" version="1" comment="libglib-2_0-0-32bit is &lt;2.48.2-12.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258533" version="1" comment="libgmodule-2_0-0 is &lt;2.48.2-12.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258534" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.48.2-12.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258535" version="1" comment="libgobject-2_0-0 is &lt;2.48.2-12.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258536" version="1" comment="libgobject-2_0-0-32bit is &lt;2.48.2-12.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258537" version="1" comment="libgthread-2_0-0 is &lt;2.48.2-12.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258538" version="1" comment="libgthread-2_0-0-32bit is &lt;2.48.2-12.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258667" version="1" comment="elfutils is &lt;0.158-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258668" version="1" comment="libasm1 is &lt;0.158-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258669" version="1" comment="libdw1 is &lt;0.158-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258670" version="1" comment="libdw1-32bit is &lt;0.158-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258671" version="1" comment="libebl1 is &lt;0.158-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258672" version="1" comment="libebl1-32bit is &lt;0.158-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258673" version="1" comment="libelf1 is &lt;0.158-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258674" version="1" comment="libelf1-32bit is &lt;0.158-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243369" version="1" comment="avahi-glib2 is &lt;0.6.32-32.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243370" version="1" comment="avahi-lang is &lt;0.6.32-32.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243371" version="1" comment="libavahi-client3 is &lt;0.6.32-32.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243372" version="1" comment="libavahi-client3-32bit is &lt;0.6.32-32.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243373" version="1" comment="libavahi-common3 is &lt;0.6.32-32.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243374" version="1" comment="libavahi-common3-32bit is &lt;0.6.32-32.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243375" version="1" comment="libavahi-core7 is &lt;0.6.32-32.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243376" version="1" comment="libavahi-glib1 is &lt;0.6.32-32.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243377" version="1" comment="libavahi-glib1-32bit is &lt;0.6.32-32.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243378" version="1" comment="libavahi-gobject0 is &lt;0.6.32-32.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243379" version="1" comment="libavahi-ui-gtk3-0 is &lt;0.6.32-32.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243380" version="1" comment="libavahi-ui0 is &lt;0.6.32-32.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243381" version="1" comment="libdns_sd is &lt;0.6.32-32.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243382" version="1" comment="libdns_sd-32bit is &lt;0.6.32-32.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259344" version="1" comment="kernel-default is &lt;4.4.180-94.100" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259354" version="1" comment="kernel-default-devel is &lt;4.4.180-94.100" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260594" version="1" comment="kernel-default-extra is &lt;4.4.180-94.100" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259355" version="1" comment="kernel-devel is &lt;4.4.180-94.100" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259356" version="1" comment="kernel-macros is &lt;4.4.180-94.100" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259357" version="1" comment="kernel-source is &lt;4.4.180-94.100" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259358" version="1" comment="kernel-syms is &lt;4.4.180-94.100" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242797" version="1" comment="libpolkit0 is &lt;0.113-5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242798" version="1" comment="libpolkit0-32bit is &lt;0.113-5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242799" version="1" comment="polkit is &lt;0.113-5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242800" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242586" version="1" comment="libraw is &lt;0.15.4-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242587" version="1" comment="libraw9 is &lt;0.15.4-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243609" version="1" comment="rsyslog is &lt;8.24.0-3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243784" version="1" comment="libspice-server1 is &lt;0.12.8-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243785" version="1" comment="spice is &lt;0.12.8-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243786" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-25.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243787" version="1" comment="python3 is &lt;3.4.6-25.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243788" version="1" comment="python3-base is &lt;3.4.6-25.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243789" version="1" comment="python3-curses is &lt;3.4.6-25.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243865" version="1" comment="curl is &lt;7.37.0-37.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243866" version="1" comment="libcurl4 is &lt;7.37.0-37.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243867" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243931" version="1" comment="libunwind is &lt;1.1-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244098" version="1" comment="MozillaFirefox is &lt;60.5.0esr-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244099" version="1" comment="MozillaFirefox-branding-SLE is &lt;60-32.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244100" version="1" comment="MozillaFirefox-translations-common is &lt;60.5.0esr-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244101" version="1" comment="libfreebl3 is &lt;3.41.1-58.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244102" version="1" comment="libfreebl3-32bit is &lt;3.41.1-58.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244103" version="1" comment="libsoftokn3 is &lt;3.41.1-58.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244104" version="1" comment="libsoftokn3-32bit is &lt;3.41.1-58.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244105" version="1" comment="mozilla-nss is &lt;3.41.1-58.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244106" version="1" comment="mozilla-nss-32bit is &lt;3.41.1-58.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244107" version="1" comment="mozilla-nss-certs is &lt;3.41.1-58.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244108" version="1" comment="mozilla-nss-certs-32bit is &lt;3.41.1-58.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244109" version="1" comment="mozilla-nss-sysinit is &lt;3.41.1-58.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244110" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.41.1-58.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244111" version="1" comment="mozilla-nss-tools is &lt;3.41.1-58.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244274" version="1" comment="libpodofo0_9_2 is &lt;0.9.2-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244492" version="1" comment="python-numpy is &lt;1.8.0-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244640" version="1" comment="libsystemd0 is &lt;228-150.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244641" version="1" comment="libsystemd0-32bit is &lt;228-150.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244642" version="1" comment="libudev1 is &lt;228-150.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244643" version="1" comment="libudev1-32bit is &lt;228-150.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244644" version="1" comment="systemd is &lt;228-150.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244645" version="1" comment="systemd-32bit is &lt;228-150.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244646" version="1" comment="systemd-bash-completion is &lt;228-150.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244647" version="1" comment="systemd-sysvinit is &lt;228-150.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244648" version="1" comment="udev is &lt;228-150.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244813" version="1" comment="libprocps3 is &lt;3.3.9-11.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244814" version="1" comment="procps is &lt;3.3.9-11.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244903" version="1" comment="kernel-firmware is &lt;20170530-21.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244904" version="1" comment="ucode-amd is &lt;20170530-21.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245026" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245027" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245028" version="1" comment="python is &lt;2.7.13-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245029" version="1" comment="python-base is &lt;2.7.13-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245030" version="1" comment="python-curses is &lt;2.7.13-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245031" version="1" comment="python-devel is &lt;2.7.13-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245032" version="1" comment="python-tk is &lt;2.7.13-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245033" version="1" comment="python-xml is &lt;2.7.13-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242817" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.201-43.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242818" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.201-43.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245034" version="1" comment="ceph is &lt;12.2.10+git.1549630712.bb089269ea-2.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245035" version="1" comment="ceph-common is &lt;12.2.10+git.1549630712.bb089269ea-2.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245036" version="1" comment="libcephfs2 is &lt;12.2.10+git.1549630712.bb089269ea-2.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245037" version="1" comment="librados2 is &lt;12.2.10+git.1549630712.bb089269ea-2.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245038" version="1" comment="libradosstriper1 is &lt;12.2.10+git.1549630712.bb089269ea-2.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245039" version="1" comment="librbd1 is &lt;12.2.10+git.1549630712.bb089269ea-2.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245040" version="1" comment="librgw2 is &lt;12.2.10+git.1549630712.bb089269ea-2.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245041" version="1" comment="python-cephfs is &lt;12.2.10+git.1549630712.bb089269ea-2.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245042" version="1" comment="python-rados is &lt;12.2.10+git.1549630712.bb089269ea-2.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245043" version="1" comment="python-rbd is &lt;12.2.10+git.1549630712.bb089269ea-2.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245044" version="1" comment="python-rgw is &lt;12.2.10+git.1549630712.bb089269ea-2.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245338" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.22.6-2.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245339" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.22.6-2.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245340" version="1" comment="libwebkit2gtk3-lang is &lt;2.22.6-2.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245341" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.22.6-2.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245342" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.22.6-2.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245343" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.22.6-2.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245344" version="1" comment="webkit2gtk3 is &lt;2.22.6-2.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245479" version="1" comment="kernel-default is &lt;4.4.175-94.79" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245480" version="1" comment="kernel-default-devel is &lt;4.4.175-94.79" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245481" version="1" comment="kernel-default-extra is &lt;4.4.175-94.79" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245482" version="1" comment="kernel-devel is &lt;4.4.175-94.79" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245483" version="1" comment="kernel-macros is &lt;4.4.175-94.79" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245484" version="1" comment="kernel-source is &lt;4.4.175-94.79" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245485" version="1" comment="kernel-syms is &lt;4.4.175-94.79" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242858" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.191-27.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242859" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.191-27.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245784" version="1" comment="qemu is &lt;2.9.1-6.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245785" version="1" comment="qemu-block-curl is &lt;2.9.1-6.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245786" version="1" comment="qemu-ipxe is &lt;1.0.0+-6.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245787" version="1" comment="qemu-kvm is &lt;2.9.1-6.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245788" version="1" comment="qemu-seabios is &lt;1.10.2-6.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245789" version="1" comment="qemu-sgabios is &lt;8-6.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245790" version="1" comment="qemu-tools is &lt;2.9.1-6.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245791" version="1" comment="qemu-vgabios is &lt;1.10.2-6.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245792" version="1" comment="qemu-x86 is &lt;2.9.1-6.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242860" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.22.4-2.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242861" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.22.4-2.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242862" version="1" comment="libwebkit2gtk3-lang is &lt;2.22.4-2.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242863" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.22.4-2.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242864" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.22.4-2.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242865" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.22.4-2.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242866" version="1" comment="webkit2gtk3 is &lt;2.22.4-2.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246044" version="1" comment="lftp is &lt;4.7.4-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246045" version="1" comment="libssh2-1 is &lt;1.4.3-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246046" version="1" comment="libssh2-1-32bit is &lt;1.4.3-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246047" version="1" comment="libssh2_org is &lt;1.4.3-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246048" version="1" comment="libwsman1 is &lt;2.4.11-21.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246049" version="1" comment="libwsman_clientpp1 is &lt;2.4.11-21.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246050" version="1" comment="openwsman is &lt;2.4.11-21.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246051" version="1" comment="openwsman-server is &lt;2.4.11-21.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246147" version="1" comment="libwireshark9 is &lt;2.4.13-48.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246148" version="1" comment="libwiretap7 is &lt;2.4.13-48.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246149" version="1" comment="libwscodecs1 is &lt;2.4.13-48.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246150" version="1" comment="libwsutil8 is &lt;2.4.13-48.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246151" version="1" comment="wireshark is &lt;2.4.13-48.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246152" version="1" comment="wireshark-gtk is &lt;2.4.13-48.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246153" version="1" comment="ghostscript is &lt;9.26a-23.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246154" version="1" comment="ghostscript-x11 is &lt;9.26a-23.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246227" version="1" comment="ucode-intel is &lt;20190312-13.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246264" version="1" comment="gd is &lt;2.1.0-24.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246265" version="1" comment="gd-32bit is &lt;2.1.0-24.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246331" version="1" comment="w3m is &lt;0.5.3.git20161120-161.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246455" version="1" comment="ntp is &lt;4.2.8p13-85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246456" version="1" comment="ntp-doc is &lt;4.2.8p13-85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246522" version="1" comment="kernel-default is &lt;4.4.176-94.88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246523" version="1" comment="kernel-default-devel is &lt;4.4.176-94.88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246524" version="1" comment="kernel-default-extra is &lt;4.4.176-94.88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246525" version="1" comment="kernel-devel is &lt;4.4.176-94.88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246526" version="1" comment="kernel-macros is &lt;4.4.176-94.88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246527" version="1" comment="kernel-source is &lt;4.4.176-94.88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246528" version="1" comment="kernel-syms is &lt;4.4.176-94.88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246529" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246530" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246531" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246532" version="1" comment="openssl is &lt;1.0.2j-60.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246533" version="1" comment="adcli is &lt;0.8.2-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246534" version="1" comment="libipa_hbac0 is &lt;1.13.4-34.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246535" version="1" comment="libsss_idmap0 is &lt;1.13.4-34.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246536" version="1" comment="libsss_nss_idmap0 is &lt;1.13.4-34.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246537" version="1" comment="libsss_sudo is &lt;1.13.4-34.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246538" version="1" comment="python-sssd-config is &lt;1.13.4-34.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246539" version="1" comment="sssd is &lt;1.13.4-34.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246540" version="1" comment="sssd-32bit is &lt;1.13.4-34.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246541" version="1" comment="sssd-ad is &lt;1.13.4-34.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246542" version="1" comment="sssd-ipa is &lt;1.13.4-34.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246543" version="1" comment="sssd-krb5 is &lt;1.13.4-34.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246544" version="1" comment="sssd-krb5-common is &lt;1.13.4-34.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246545" version="1" comment="sssd-ldap is &lt;1.13.4-34.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246546" version="1" comment="sssd-proxy is &lt;1.13.4-34.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246547" version="1" comment="sssd-tools is &lt;1.13.4-34.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242899" version="1" comment="libipa_hbac0 is &lt;1.13.4-34.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242900" version="1" comment="libsss_idmap0 is &lt;1.13.4-34.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242901" version="1" comment="libsss_nss_idmap0 is &lt;1.13.4-34.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242902" version="1" comment="libsss_sudo is &lt;1.13.4-34.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242903" version="1" comment="python-sssd-config is &lt;1.13.4-34.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242904" version="1" comment="sssd is &lt;1.13.4-34.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242905" version="1" comment="sssd-32bit is &lt;1.13.4-34.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242906" version="1" comment="sssd-ad is &lt;1.13.4-34.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242907" version="1" comment="sssd-ipa is &lt;1.13.4-34.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242908" version="1" comment="sssd-krb5 is &lt;1.13.4-34.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242909" version="1" comment="sssd-krb5-common is &lt;1.13.4-34.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242910" version="1" comment="sssd-ldap is &lt;1.13.4-34.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242911" version="1" comment="sssd-proxy is &lt;1.13.4-34.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242912" version="1" comment="sssd-tools is &lt;1.13.4-34.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246774" version="1" comment="bash is &lt;4.3-83.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246775" version="1" comment="bash-doc is &lt;4.3-83.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246776" version="1" comment="bash-lang is &lt;4.3-83.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246777" version="1" comment="libreadline6 is &lt;6.3-83.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246778" version="1" comment="libreadline6-32bit is &lt;6.3-83.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246779" version="1" comment="readline-doc is &lt;6.3-83.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246780" version="1" comment="file is &lt;5.22-10.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246781" version="1" comment="file-magic is &lt;5.22-10.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246782" version="1" comment="libmagic1 is &lt;5.22-10.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246783" version="1" comment="libmagic1-32bit is &lt;5.22-10.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246940" version="1" comment="MozillaFirefox is &lt;60.6.1esr-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246941" version="1" comment="MozillaFirefox-translations-common is &lt;60.6.1esr-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247216" version="1" comment="clamav is &lt;0.100.3-33.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247217" version="1" comment="SDL is &lt;1.2.15-15.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247218" version="1" comment="libSDL-1_2-0 is &lt;1.2.15-15.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247219" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247220" version="1" comment="libsqlite3-0-32bit is &lt;3.8.10.2-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247221" version="1" comment="sqlite3 is &lt;3.8.10.2-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247222" version="1" comment="xen is &lt;4.9.4_02-3.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247223" version="1" comment="xen-libs is &lt;4.9.4_02-3.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247224" version="1" comment="xen-libs-32bit is &lt;4.9.4_02-3.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251252" version="1" comment="wget is &lt;1.14-21.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251253" version="1" comment="qemu is &lt;2.9.1-6.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251254" version="1" comment="qemu-block-curl is &lt;2.9.1-6.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251255" version="1" comment="qemu-ipxe is &lt;1.0.0+-6.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251256" version="1" comment="qemu-kvm is &lt;2.9.1-6.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251257" version="1" comment="qemu-seabios is &lt;1.10.2-6.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251258" version="1" comment="qemu-sgabios is &lt;8-6.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251259" version="1" comment="qemu-tools is &lt;2.9.1-6.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251260" version="1" comment="qemu-vgabios is &lt;1.10.2-6.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251261" version="1" comment="qemu-x86 is &lt;2.9.1-6.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243041" version="1" comment="libSoundTouch0 is &lt;1.7.1-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243042" version="1" comment="libSoundTouch0-32bit is &lt;1.7.1-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243043" version="1" comment="soundtouch is &lt;1.7.1-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251262" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-25.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251263" version="1" comment="python3 is &lt;3.4.6-25.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251264" version="1" comment="python3-base is &lt;3.4.6-25.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251265" version="1" comment="python3-curses is &lt;3.4.6-25.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251631" version="1" comment="curl is &lt;7.37.0-37.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251632" version="1" comment="libcurl4 is &lt;7.37.0-37.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251633" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240649" version="1" comment="python3-rpm is &lt;4.11.2-16.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240887" version="1" comment="libopenssl1_1 is &lt;1.1.1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240888" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240889" version="1" comment="openssl-1_1 is &lt;1.1.1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241003" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2p-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241004" version="1" comment="libopenssl1_0_0 is &lt;1.0.2p-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241005" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2p-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241006" version="1" comment="openssl-1_0_0 is &lt;1.0.2p-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241578" version="1" comment="python3-cryptography is &lt;1.3.1-7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241579" version="1" comment="python3-pyOpenSSL is &lt;16.0.0-4.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241607" version="1" comment="kernel-default is &lt;4.12.14-95.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241608" version="1" comment="kernel-default-devel is &lt;4.12.14-95.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241609" version="1" comment="kernel-default-extra is &lt;4.12.14-95.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241610" version="1" comment="kernel-devel is &lt;4.12.14-95.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241611" version="1" comment="kernel-macros is &lt;4.12.14-95.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241612" version="1" comment="kernel-source is &lt;4.12.14-95.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241613" version="1" comment="kernel-syms is &lt;4.12.14-95.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242069" version="1" comment="qemu is &lt;2.11.2-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242070" version="1" comment="qemu-block-curl is &lt;2.11.2-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242071" version="1" comment="qemu-ipxe is &lt;1.0.0+-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242072" version="1" comment="qemu-kvm is &lt;2.11.2-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242073" version="1" comment="qemu-seabios is &lt;1.11.0-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242074" version="1" comment="qemu-sgabios is &lt;8-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242075" version="1" comment="qemu-tools is &lt;2.11.2-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242076" version="1" comment="qemu-vgabios is &lt;1.11.0-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242077" version="1" comment="qemu-x86 is &lt;2.11.2-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242078" version="1" comment="ovmf is &lt;2017+git1510945757.b2662641d5-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242079" version="1" comment="qemu-ovmf-x86_64 is &lt;2017+git1510945757.b2662641d5-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242162" version="1" comment="libmysqlclient18 is &lt;10.0.37-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242163" version="1" comment="libmysqlclient18-32bit is &lt;10.0.37-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242164" version="1" comment="libmysqlclient_r18 is &lt;10.0.37-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242165" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.37-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242166" version="1" comment="mariadb-100 is &lt;10.0.37-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242167" version="1" comment="mariadb-100-errormessages is &lt;10.0.37-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252741" version="1" comment="glibc is &lt;2.22-100.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252742" version="1" comment="glibc-32bit is &lt;2.22-100.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252743" version="1" comment="glibc-devel is &lt;2.22-100.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252744" version="1" comment="glibc-devel-32bit is &lt;2.22-100.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252745" version="1" comment="glibc-i18ndata is &lt;2.22-100.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252746" version="1" comment="glibc-locale is &lt;2.22-100.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252747" version="1" comment="glibc-locale-32bit is &lt;2.22-100.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252748" version="1" comment="nscd is &lt;2.22-100.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252864" version="1" comment="libopenssl1_1 is &lt;1.1.1b-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252865" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1b-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252866" version="1" comment="openssl-1_1 is &lt;1.1.1b-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252955" version="1" comment="ovmf is &lt;2017+git1510945757.b2662641d5-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252956" version="1" comment="qemu-ovmf-x86_64 is &lt;2017+git1510945757.b2662641d5-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243172" version="1" comment="mariadb-client is &lt;10.2.21-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243173" version="1" comment="mariadb-errormessages is &lt;10.2.21-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253498" version="1" comment="qemu is &lt;2.11.2-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253500" version="1" comment="qemu-block-curl is &lt;2.11.2-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253505" version="1" comment="qemu-ipxe is &lt;1.0.0+-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253506" version="1" comment="qemu-kvm is &lt;2.11.2-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253555" version="1" comment="qemu-seabios is &lt;1.11.0-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253556" version="1" comment="qemu-sgabios is &lt;8-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253510" version="1" comment="qemu-tools is &lt;2.11.2-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253511" version="1" comment="qemu-vgabios is &lt;1.11.0-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253557" version="1" comment="qemu-x86 is &lt;2.11.2-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253462" version="1" comment="kernel-default is &lt;4.12.14-95.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253513" version="1" comment="kernel-default-devel is &lt;4.12.14-95.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253558" version="1" comment="kernel-default-extra is &lt;4.12.14-95.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253515" version="1" comment="kernel-devel is &lt;4.12.14-95.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253516" version="1" comment="kernel-macros is &lt;4.12.14-95.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253517" version="1" comment="kernel-source is &lt;4.12.14-95.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253518" version="1" comment="kernel-syms is &lt;4.12.14-95.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253475" version="1" comment="xen is &lt;4.11.1_06-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253559" version="1" comment="xen-libs is &lt;4.11.1_06-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253560" version="1" comment="xen-libs-32bit is &lt;4.11.1_06-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254160" version="1" comment="libvirt is &lt;4.0.0-8.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254161" version="1" comment="libvirt-admin is &lt;4.0.0-8.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254162" version="1" comment="libvirt-client is &lt;4.0.0-8.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254163" version="1" comment="libvirt-daemon is &lt;4.0.0-8.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254164" version="1" comment="libvirt-daemon-config-network is &lt;4.0.0-8.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254165" version="1" comment="libvirt-daemon-config-nwfilter is &lt;4.0.0-8.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254166" version="1" comment="libvirt-daemon-driver-interface is &lt;4.0.0-8.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254167" version="1" comment="libvirt-daemon-driver-libxl is &lt;4.0.0-8.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254168" version="1" comment="libvirt-daemon-driver-lxc is &lt;4.0.0-8.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254169" version="1" comment="libvirt-daemon-driver-network is &lt;4.0.0-8.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254170" version="1" comment="libvirt-daemon-driver-nodedev is &lt;4.0.0-8.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254171" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;4.0.0-8.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254172" version="1" comment="libvirt-daemon-driver-qemu is &lt;4.0.0-8.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254173" version="1" comment="libvirt-daemon-driver-secret is &lt;4.0.0-8.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254174" version="1" comment="libvirt-daemon-driver-storage is &lt;4.0.0-8.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254175" version="1" comment="libvirt-daemon-driver-storage-core is &lt;4.0.0-8.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254176" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;4.0.0-8.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254177" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;4.0.0-8.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254178" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;4.0.0-8.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254179" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;4.0.0-8.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254180" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;4.0.0-8.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254181" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;4.0.0-8.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254182" version="1" comment="libvirt-daemon-lxc is &lt;4.0.0-8.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254183" version="1" comment="libvirt-daemon-qemu is &lt;4.0.0-8.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254184" version="1" comment="libvirt-daemon-xen is &lt;4.0.0-8.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254185" version="1" comment="libvirt-doc is &lt;4.0.0-8.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254186" version="1" comment="libvirt-libs is &lt;4.0.0-8.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256719" version="1" comment="libipa_hbac0 is &lt;1.16.1-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256720" version="1" comment="libsss_certmap0 is &lt;1.16.1-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256721" version="1" comment="libsss_idmap0 is &lt;1.16.1-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256722" version="1" comment="libsss_nss_idmap0 is &lt;1.16.1-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256723" version="1" comment="libsss_simpleifp0 is &lt;1.16.1-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256724" version="1" comment="python-sssd-config is &lt;1.16.1-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256725" version="1" comment="sssd is &lt;1.16.1-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256726" version="1" comment="sssd-32bit is &lt;1.16.1-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256727" version="1" comment="sssd-ad is &lt;1.16.1-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256728" version="1" comment="sssd-ipa is &lt;1.16.1-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256729" version="1" comment="sssd-krb5 is &lt;1.16.1-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256730" version="1" comment="sssd-krb5-common is &lt;1.16.1-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256731" version="1" comment="sssd-ldap is &lt;1.16.1-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256732" version="1" comment="sssd-proxy is &lt;1.16.1-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256733" version="1" comment="sssd-tools is &lt;1.16.1-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256977" version="1" comment="kernel-default is &lt;4.12.14-95.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256978" version="1" comment="kernel-default-devel is &lt;4.12.14-95.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256979" version="1" comment="kernel-default-extra is &lt;4.12.14-95.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256980" version="1" comment="kernel-devel is &lt;4.12.14-95.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256981" version="1" comment="kernel-macros is &lt;4.12.14-95.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256982" version="1" comment="kernel-source is &lt;4.12.14-95.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256983" version="1" comment="kernel-syms is &lt;4.12.14-95.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257805" version="1" comment="libvirt is &lt;4.0.0-8.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257806" version="1" comment="libvirt-admin is &lt;4.0.0-8.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257807" version="1" comment="libvirt-client is &lt;4.0.0-8.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257808" version="1" comment="libvirt-daemon is &lt;4.0.0-8.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257809" version="1" comment="libvirt-daemon-config-network is &lt;4.0.0-8.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257810" version="1" comment="libvirt-daemon-config-nwfilter is &lt;4.0.0-8.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257811" version="1" comment="libvirt-daemon-driver-interface is &lt;4.0.0-8.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257812" version="1" comment="libvirt-daemon-driver-libxl is &lt;4.0.0-8.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257813" version="1" comment="libvirt-daemon-driver-lxc is &lt;4.0.0-8.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257814" version="1" comment="libvirt-daemon-driver-network is &lt;4.0.0-8.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257815" version="1" comment="libvirt-daemon-driver-nodedev is &lt;4.0.0-8.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257816" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;4.0.0-8.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257817" version="1" comment="libvirt-daemon-driver-qemu is &lt;4.0.0-8.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257818" version="1" comment="libvirt-daemon-driver-secret is &lt;4.0.0-8.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257819" version="1" comment="libvirt-daemon-driver-storage is &lt;4.0.0-8.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257820" version="1" comment="libvirt-daemon-driver-storage-core is &lt;4.0.0-8.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257821" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;4.0.0-8.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257822" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;4.0.0-8.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257823" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;4.0.0-8.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257824" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;4.0.0-8.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257825" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;4.0.0-8.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257826" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;4.0.0-8.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257827" version="1" comment="libvirt-daemon-lxc is &lt;4.0.0-8.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257828" version="1" comment="libvirt-daemon-qemu is &lt;4.0.0-8.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257829" version="1" comment="libvirt-daemon-xen is &lt;4.0.0-8.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257830" version="1" comment="libvirt-doc is &lt;4.0.0-8.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257831" version="1" comment="libvirt-libs is &lt;4.0.0-8.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257932" version="1" comment="libssh2-1-32bit is &lt;1.4.3-20.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258269" version="1" comment="glibc is &lt;2.22-100.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258270" version="1" comment="glibc-32bit is &lt;2.22-100.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258271" version="1" comment="glibc-devel is &lt;2.22-100.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258272" version="1" comment="glibc-devel-32bit is &lt;2.22-100.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258273" version="1" comment="glibc-i18ndata is &lt;2.22-100.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258274" version="1" comment="glibc-locale is &lt;2.22-100.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258275" version="1" comment="glibc-locale-32bit is &lt;2.22-100.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258276" version="1" comment="nscd is &lt;2.22-100.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258675" version="1" comment="libelf-devel is &lt;0.158-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258930" version="1" comment="libu2f-host is &lt;1.1.6-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258931" version="1" comment="libu2f-host0 is &lt;1.1.6-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259001" version="1" comment="libecpg6 is &lt;10.9-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259002" version="1" comment="libpq5 is &lt;10.9-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259003" version="1" comment="libpq5-32bit is &lt;10.9-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259004" version="1" comment="postgresql10 is &lt;10.9-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259005" version="1" comment="postgresql10-libs is &lt;10.9-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259006" version="1" comment="libzmq3 is &lt;4.0.4-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259007" version="1" comment="zeromq is &lt;4.0.4-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259043" version="1" comment="kernel-firmware is &lt;20190618-5.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259044" version="1" comment="ucode-amd is &lt;20190618-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259169" version="1" comment="glib2-lang is &lt;2.48.2-12.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259170" version="1" comment="glib2-tools is &lt;2.48.2-12.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259171" version="1" comment="libgio-2_0-0 is &lt;2.48.2-12.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259172" version="1" comment="libgio-2_0-0-32bit is &lt;2.48.2-12.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259173" version="1" comment="libgio-fam is &lt;2.48.2-12.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259174" version="1" comment="libglib-2_0-0 is &lt;2.48.2-12.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259175" version="1" comment="libglib-2_0-0-32bit is &lt;2.48.2-12.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259176" version="1" comment="libgmodule-2_0-0 is &lt;2.48.2-12.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259177" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.48.2-12.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259178" version="1" comment="libgobject-2_0-0 is &lt;2.48.2-12.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259179" version="1" comment="libgobject-2_0-0-32bit is &lt;2.48.2-12.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259180" version="1" comment="libgthread-2_0-0 is &lt;2.48.2-12.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259181" version="1" comment="libgthread-2_0-0-32bit is &lt;2.48.2-12.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259182" version="1" comment="expat is &lt;2.1.0-21.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259183" version="1" comment="libexpat1 is &lt;2.1.0-21.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259184" version="1" comment="libexpat1-32bit is &lt;2.1.0-21.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259320" version="1" comment="xrdp is &lt;0.9.0~git.1456906198.f422461-21.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259321" version="1" comment="libpodofo0_9_2 is &lt;0.9.2-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259322" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.24.2-2.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259323" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.24.2-2.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259324" version="1" comment="libwebkit2gtk3-lang is &lt;2.24.2-2.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259325" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.24.2-2.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259326" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.24.2-2.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259327" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.24.2-2.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259328" version="1" comment="webkit2gtk3 is &lt;2.24.2-2.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259329" version="1" comment="kernel-default is &lt;4.12.14-95.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259330" version="1" comment="kernel-default-devel is &lt;4.12.14-95.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259331" version="1" comment="kernel-default-extra is &lt;4.12.14-95.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259332" version="1" comment="kernel-devel is &lt;4.12.14-95.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259333" version="1" comment="kernel-macros is &lt;4.12.14-95.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259334" version="1" comment="kernel-source is &lt;4.12.14-95.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259335" version="1" comment="kernel-syms is &lt;4.12.14-95.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259400" version="1" comment="MozillaFirefox is &lt;60.8.0-109.83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259401" version="1" comment="MozillaFirefox-translations-common is &lt;60.8.0-109.83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259402" version="1" comment="libfreebl3 is &lt;3.44.1-58.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259403" version="1" comment="libfreebl3-32bit is &lt;3.44.1-58.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259404" version="1" comment="libsoftokn3 is &lt;3.44.1-58.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259405" version="1" comment="libsoftokn3-32bit is &lt;3.44.1-58.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259406" version="1" comment="mozilla-nss is &lt;3.44.1-58.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259407" version="1" comment="mozilla-nss-32bit is &lt;3.44.1-58.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259408" version="1" comment="mozilla-nss-certs is &lt;3.44.1-58.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259409" version="1" comment="mozilla-nss-certs-32bit is &lt;3.44.1-58.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259410" version="1" comment="mozilla-nss-sysinit is &lt;3.44.1-58.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259411" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.44.1-58.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259412" version="1" comment="mozilla-nss-tools is &lt;3.44.1-58.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259413" version="1" comment="libxslt is &lt;1.1.28-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259414" version="1" comment="libxslt-tools is &lt;1.1.28-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259415" version="1" comment="libxslt1 is &lt;1.1.28-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259416" version="1" comment="libxslt1-32bit is &lt;1.1.28-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260025" version="1" comment="libxml2 is &lt;2.9.4-46.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260026" version="1" comment="libxml2-2 is &lt;2.9.4-46.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260027" version="1" comment="libxml2-2-32bit is &lt;2.9.4-46.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260028" version="1" comment="libxml2-tools is &lt;2.9.4-46.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260029" version="1" comment="python-libxml2 is &lt;2.9.4-46.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260414" version="1" comment="ucode-intel is &lt;20190618-13.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260415" version="1" comment="bzip2 is &lt;1.0.6-30.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260416" version="1" comment="libbz2-1 is &lt;1.0.6-30.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260417" version="1" comment="libbz2-1-32bit is &lt;1.0.6-30.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243383" version="1" comment="kernel-default is &lt;4.12.14-95.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243384" version="1" comment="kernel-default-devel is &lt;4.12.14-95.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243385" version="1" comment="kernel-default-extra is &lt;4.12.14-95.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243386" version="1" comment="kernel-devel is &lt;4.12.14-95.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243387" version="1" comment="kernel-macros is &lt;4.12.14-95.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243388" version="1" comment="kernel-source is &lt;4.12.14-95.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243389" version="1" comment="kernel-syms is &lt;4.12.14-95.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260595" version="1" comment="perl-Mail-SpamAssassin is &lt;3.4.2-44.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260596" version="1" comment="spamassassin is &lt;3.4.2-44.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260597" version="1" comment="libIlmImf-Imf_2_1-21 is &lt;2.1.0-6.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260598" version="1" comment="libIlmImf-Imf_2_1-21-32bit is &lt;2.1.0-6.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260599" version="1" comment="openexr is &lt;2.1.0-6.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260637" version="1" comment="libsolv is &lt;0.6.36-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260638" version="1" comment="libsolv-tools is &lt;0.6.36-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260639" version="1" comment="libzypp is &lt;16.20.0-2.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260640" version="1" comment="python-solv is &lt;0.6.36-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260641" version="1" comment="zypper is &lt;1.13.51-21.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260642" version="1" comment="zypper-log is &lt;1.13.51-21.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260647" version="1" comment="cron is &lt;4.2-59.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260648" version="1" comment="cronie is &lt;1.4.11-59.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260827" version="1" comment="curl is &lt;7.60.0-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260828" version="1" comment="libcurl4 is &lt;7.60.0-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260829" version="1" comment="libcurl4-32bit is &lt;7.60.0-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260830" version="1" comment="ImageMagick is &lt;6.8.8.1-71.126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260831" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260832" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260833" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260834" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260835" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260836" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260837" version="1" comment="bzip2 is &lt;1.0.6-30.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260838" version="1" comment="libbz2-1 is &lt;1.0.6-30.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260839" version="1" comment="libbz2-1-32bit is &lt;1.0.6-30.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260840" version="1" comment="libIlmImf-Imf_2_1-21 is &lt;2.1.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260841" version="1" comment="libIlmImf-Imf_2_1-21-32bit is &lt;2.1.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260842" version="1" comment="openexr is &lt;2.1.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261221" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.231-43.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261222" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.231-43.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261223" version="1" comment="libpolkit0 is &lt;0.113-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261224" version="1" comment="libpolkit0-32bit is &lt;0.113-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261225" version="1" comment="polkit is &lt;0.113-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261226" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261227" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.222-27.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261228" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.222-27.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261229" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-25.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261230" version="1" comment="python3 is &lt;3.4.6-25.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261231" version="1" comment="python3-base is &lt;3.4.6-25.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261232" version="1" comment="python3-curses is &lt;3.4.6-25.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261233" version="1" comment="kernel-default is &lt;4.12.14-95.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261234" version="1" comment="kernel-default-devel is &lt;4.12.14-95.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261235" version="1" comment="kernel-default-extra is &lt;4.12.14-95.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261236" version="1" comment="kernel-devel is &lt;4.12.14-95.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261237" version="1" comment="kernel-macros is &lt;4.12.14-95.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261238" version="1" comment="kernel-source is &lt;4.12.14-95.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261239" version="1" comment="kernel-syms is &lt;4.12.14-95.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261240" version="1" comment="evince is &lt;3.20.2-6.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261241" version="1" comment="evince-browser-plugin is &lt;3.20.2-6.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261242" version="1" comment="evince-lang is &lt;3.20.2-6.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261243" version="1" comment="evince-plugin-djvudocument is &lt;3.20.2-6.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261244" version="1" comment="evince-plugin-dvidocument is &lt;3.20.2-6.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261245" version="1" comment="evince-plugin-pdfdocument is &lt;3.20.2-6.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261246" version="1" comment="evince-plugin-psdocument is &lt;3.20.2-6.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261247" version="1" comment="evince-plugin-tiffdocument is &lt;3.20.2-6.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261248" version="1" comment="evince-plugin-xpsdocument is &lt;3.20.2-6.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261249" version="1" comment="libevdocument3-4 is &lt;3.20.2-6.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261250" version="1" comment="libevview3-3 is &lt;3.20.2-6.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261251" version="1" comment="nautilus-evince is &lt;3.20.2-6.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261252" version="1" comment="typelib-1_0-EvinceDocument-3_0 is &lt;3.20.2-6.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261253" version="1" comment="typelib-1_0-EvinceView-3_0 is &lt;3.20.2-6.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261254" version="1" comment="tcpdump is &lt;4.9.2-14.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261255" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261256" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-28.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261257" version="1" comment="python is &lt;2.7.13-28.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261258" version="1" comment="python-base is &lt;2.7.13-28.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261259" version="1" comment="python-curses is &lt;2.7.13-28.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261260" version="1" comment="python-devel is &lt;2.7.13-28.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261261" version="1" comment="python-tk is &lt;2.7.13-28.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261262" version="1" comment="python-xml is &lt;2.7.13-28.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261263" version="1" comment="libwireshark9 is &lt;2.4.16-48.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261264" version="1" comment="libwiretap7 is &lt;2.4.16-48.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261265" version="1" comment="libwscodecs1 is &lt;2.4.16-48.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261266" version="1" comment="libwsutil8 is &lt;2.4.16-48.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261267" version="1" comment="wireshark is &lt;2.4.16-48.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261268" version="1" comment="wireshark-gtk is &lt;2.4.16-48.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261455" version="1" comment="libmysqlclient18 is &lt;10.0.38-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261456" version="1" comment="libmysqlclient18-32bit is &lt;10.0.38-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261457" version="1" comment="libmysqlclient_r18 is &lt;10.0.38-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261458" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.38-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261459" version="1" comment="mariadb-100 is &lt;10.0.38-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261460" version="1" comment="mariadb-100-errormessages is &lt;10.0.38-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261567" version="1" comment="libopenjp2-7 is &lt;2.1.0-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261568" version="1" comment="openjpeg2 is &lt;2.1.0-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263228" version="1" comment="NetworkManager is &lt;1.0.12-13.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263229" version="1" comment="NetworkManager-lang is &lt;1.0.12-13.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263230" version="1" comment="libnm-glib-vpn1 is &lt;1.0.12-13.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263231" version="1" comment="libnm-glib4 is &lt;1.0.12-13.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263232" version="1" comment="libnm-util2 is &lt;1.0.12-13.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263233" version="1" comment="libnm0 is &lt;1.0.12-13.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263234" version="1" comment="typelib-1_0-NM-1_0 is &lt;1.0.12-13.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263235" version="1" comment="typelib-1_0-NMClient-1_0 is &lt;1.0.12-13.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263236" version="1" comment="typelib-1_0-NetworkManager-1_0 is &lt;1.0.12-13.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263237" version="1" comment="perl is &lt;5.18.2-12.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263238" version="1" comment="perl-32bit is &lt;5.18.2-12.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263239" version="1" comment="perl-base is &lt;5.18.2-12.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263240" version="1" comment="perl-doc is &lt;5.18.2-12.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263241" version="1" comment="libsolv is &lt;0.6.36-2.27.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263242" version="1" comment="libsolv-tools is &lt;0.6.36-2.27.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263243" version="1" comment="libzypp is &lt;16.20.2-27.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263244" version="1" comment="python-solv is &lt;0.6.36-2.27.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263245" version="1" comment="zypper is &lt;1.13.54-18.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263246" version="1" comment="zypper-log is &lt;1.13.54-18.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263247" version="1" comment="libecpg6 is &lt;10.10-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263248" version="1" comment="libpq5 is &lt;10.10-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263249" version="1" comment="libpq5-32bit is &lt;10.10-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263250" version="1" comment="postgresql10 is &lt;10.10-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263251" version="1" comment="postgresql10-libs is &lt;10.10-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263849" version="1" comment="libmariadb3 is &lt;3.1.2-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263850" version="1" comment="libmariadb_plugins is &lt;3.1.2-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263851" version="1" comment="mariadb-client is &lt;10.2.25-3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263852" version="1" comment="mariadb-connector-c is &lt;3.1.2-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263853" version="1" comment="mariadb-errormessages is &lt;10.2.25-3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263926" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.24.4-2.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263927" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.24.4-2.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263928" version="1" comment="libwebkit2gtk3-lang is &lt;2.24.4-2.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263929" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.24.4-2.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263930" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.24.4-2.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263931" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.24.4-2.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263932" version="1" comment="webkit2gtk3 is &lt;2.24.4-2.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263933" version="1" comment="ghostscript is &lt;9.26a-23.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263934" version="1" comment="ghostscript-x11 is &lt;9.26a-23.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264050" version="1" comment="qemu is &lt;2.11.2-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264051" version="1" comment="qemu-block-curl is &lt;2.11.2-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264052" version="1" comment="qemu-ipxe is &lt;1.0.0+-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264053" version="1" comment="qemu-kvm is &lt;2.11.2-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264054" version="1" comment="qemu-seabios is &lt;1.11.0-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264055" version="1" comment="qemu-sgabios is &lt;8-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264056" version="1" comment="qemu-tools is &lt;2.11.2-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264057" version="1" comment="qemu-vgabios is &lt;1.11.0-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264058" version="1" comment="qemu-x86 is &lt;2.11.2-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264547" version="1" comment="ceph is &lt;12.2.12+git.1568024032.02236657ca-2.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264548" version="1" comment="ceph-common is &lt;12.2.12+git.1568024032.02236657ca-2.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264549" version="1" comment="libcephfs2 is &lt;12.2.12+git.1568024032.02236657ca-2.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264550" version="1" comment="librados2 is &lt;12.2.12+git.1568024032.02236657ca-2.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264551" version="1" comment="libradosstriper1 is &lt;12.2.12+git.1568024032.02236657ca-2.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264552" version="1" comment="librbd1 is &lt;12.2.12+git.1568024032.02236657ca-2.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264553" version="1" comment="librgw2 is &lt;12.2.12+git.1568024032.02236657ca-2.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264554" version="1" comment="python-cephfs is &lt;12.2.12+git.1568024032.02236657ca-2.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264555" version="1" comment="python-rados is &lt;12.2.12+git.1568024032.02236657ca-2.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264556" version="1" comment="python-rbd is &lt;12.2.12+git.1568024032.02236657ca-2.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264557" version="1" comment="python-rgw is &lt;12.2.12+git.1568024032.02236657ca-2.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264574" version="1" comment="curl is &lt;7.60.0-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264575" version="1" comment="libcurl4 is &lt;7.60.0-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264576" version="1" comment="libcurl4-32bit is &lt;7.60.0-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264618" version="1" comment="ibus is &lt;1.5.13-15.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264619" version="1" comment="ibus-gtk is &lt;1.5.13-15.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264620" version="1" comment="ibus-gtk3 is &lt;1.5.13-15.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264621" version="1" comment="ibus-gtk3-32bit is &lt;1.5.13-15.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264622" version="1" comment="ibus-lang is &lt;1.5.13-15.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264623" version="1" comment="libibus-1_0-5 is &lt;1.5.13-15.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264624" version="1" comment="libibus-1_0-5-32bit is &lt;1.5.13-15.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264625" version="1" comment="python-ibus is &lt;1.5.13-15.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264626" version="1" comment="typelib-1_0-IBus-1_0 is &lt;1.5.13-15.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264627" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264628" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264629" version="1" comment="openldap2 is &lt;2.4.41-18.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264630" version="1" comment="openldap2-client is &lt;2.4.41-18.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264631" version="1" comment="openldap2-doc is &lt;2.4.41-18.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264847" version="1" comment="libreoffice-base is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264848" version="1" comment="libreoffice-base-drivers-postgresql is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264849" version="1" comment="libreoffice-branding-upstream is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264850" version="1" comment="libreoffice-calc is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264851" version="1" comment="libreoffice-calc-extensions is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264852" version="1" comment="libreoffice-draw is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264853" version="1" comment="libreoffice-filters-optional is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264854" version="1" comment="libreoffice-gnome is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264855" version="1" comment="libreoffice-gtk2 is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264856" version="1" comment="libreoffice-icon-themes is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264857" version="1" comment="libreoffice-impress is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264858" version="1" comment="libreoffice-l10n-af is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264859" version="1" comment="libreoffice-l10n-ar is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264860" version="1" comment="libreoffice-l10n-ca is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264861" version="1" comment="libreoffice-l10n-cs is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264862" version="1" comment="libreoffice-l10n-da is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264863" version="1" comment="libreoffice-l10n-de is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264864" version="1" comment="libreoffice-l10n-en is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264865" version="1" comment="libreoffice-l10n-es is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264866" version="1" comment="libreoffice-l10n-fi is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264867" version="1" comment="libreoffice-l10n-fr is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264868" version="1" comment="libreoffice-l10n-gu is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264869" version="1" comment="libreoffice-l10n-hi is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264870" version="1" comment="libreoffice-l10n-hu is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264871" version="1" comment="libreoffice-l10n-it is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264872" version="1" comment="libreoffice-l10n-ja is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264873" version="1" comment="libreoffice-l10n-ko is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264874" version="1" comment="libreoffice-l10n-nb is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264875" version="1" comment="libreoffice-l10n-nl is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264876" version="1" comment="libreoffice-l10n-nn is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264877" version="1" comment="libreoffice-l10n-pl is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264878" version="1" comment="libreoffice-l10n-pt_BR is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264879" version="1" comment="libreoffice-l10n-pt_PT is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264880" version="1" comment="libreoffice-l10n-ro is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264881" version="1" comment="libreoffice-l10n-ru is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264882" version="1" comment="libreoffice-l10n-sk is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264883" version="1" comment="libreoffice-l10n-sv is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264884" version="1" comment="libreoffice-l10n-xh is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264885" version="1" comment="libreoffice-l10n-zh_CN is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264886" version="1" comment="libreoffice-l10n-zh_TW is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264887" version="1" comment="libreoffice-l10n-zu is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264888" version="1" comment="libreoffice-mailmerge is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264889" version="1" comment="libreoffice-math is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264890" version="1" comment="libreoffice-officebean is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264891" version="1" comment="libreoffice-pyuno is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264892" version="1" comment="libreoffice-writer is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264893" version="1" comment="libreoffice-writer-extensions is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265038" version="1" comment="kernel-default is &lt;4.12.14-95.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265039" version="1" comment="kernel-default-devel is &lt;4.12.14-95.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265040" version="1" comment="kernel-default-extra is &lt;4.12.14-95.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265041" version="1" comment="kernel-devel is &lt;4.12.14-95.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265042" version="1" comment="kernel-macros is &lt;4.12.14-95.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265043" version="1" comment="kernel-source is &lt;4.12.14-95.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265044" version="1" comment="kernel-syms is &lt;4.12.14-95.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265156" version="1" comment="MozillaFirefox is &lt;60.9.0-109.86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265157" version="1" comment="MozillaFirefox-translations-common is &lt;60.9.0-109.86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265158" version="1" comment="expat is &lt;2.1.0-21.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265159" version="1" comment="libexpat1 is &lt;2.1.0-21.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265160" version="1" comment="libexpat1-32bit is &lt;2.1.0-21.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265161" version="1" comment="djvulibre is &lt;3.5.25.3-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265162" version="1" comment="libdjvulibre21 is &lt;3.5.25.3-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265272" version="1" comment="ghostscript is &lt;9.27-23.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265273" version="1" comment="ghostscript-x11 is &lt;9.27-23.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242588" version="1" comment="xen is &lt;4.11.1_02-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242589" version="1" comment="xen-libs is &lt;4.11.1_02-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242590" version="1" comment="xen-libs-32bit is &lt;4.11.1_02-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244197" version="1" comment="curl is &lt;7.60.0-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244198" version="1" comment="libcurl4 is &lt;7.60.0-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244199" version="1" comment="libcurl4-32bit is &lt;7.60.0-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244649" version="1" comment="qemu is &lt;2.11.2-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244650" version="1" comment="qemu-block-curl is &lt;2.11.2-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244651" version="1" comment="qemu-ipxe is &lt;1.0.0+-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244652" version="1" comment="qemu-kvm is &lt;2.11.2-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244653" version="1" comment="qemu-seabios is &lt;1.11.0-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244654" version="1" comment="qemu-sgabios is &lt;8-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244655" version="1" comment="qemu-tools is &lt;2.11.2-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244656" version="1" comment="qemu-vgabios is &lt;1.11.0-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244657" version="1" comment="qemu-x86 is &lt;2.11.2-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245345" version="1" comment="libopenssl1_1 is &lt;1.1.1-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245346" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245347" version="1" comment="openssl-1_1 is &lt;1.1.1-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245557" version="1" comment="libipa_hbac0 is &lt;1.16.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245558" version="1" comment="libsss_certmap0 is &lt;1.16.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245559" version="1" comment="libsss_idmap0 is &lt;1.16.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245560" version="1" comment="libsss_nss_idmap0 is &lt;1.16.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245561" version="1" comment="libsss_simpleifp0 is &lt;1.16.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245562" version="1" comment="python-sssd-config is &lt;1.16.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245563" version="1" comment="sssd is &lt;1.16.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245564" version="1" comment="sssd-32bit is &lt;1.16.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245565" version="1" comment="sssd-ad is &lt;1.16.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245566" version="1" comment="sssd-ipa is &lt;1.16.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245567" version="1" comment="sssd-krb5 is &lt;1.16.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245568" version="1" comment="sssd-krb5-common is &lt;1.16.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245569" version="1" comment="sssd-ldap is &lt;1.16.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245570" version="1" comment="sssd-proxy is &lt;1.16.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245571" version="1" comment="sssd-tools is &lt;1.16.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245572" version="1" comment="audit is &lt;2.8.1-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245573" version="1" comment="audit-secondary is &lt;2.8.1-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245574" version="1" comment="libaudit1 is &lt;2.8.1-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245575" version="1" comment="libaudit1-32bit is &lt;2.8.1-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245576" version="1" comment="libauparse0 is &lt;2.8.1-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245645" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2p-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245646" version="1" comment="libopenssl1_0_0 is &lt;1.0.2p-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245647" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2p-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245648" version="1" comment="openssl-1_0_0 is &lt;1.0.2p-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245793" version="1" comment="ovmf is &lt;2017+git1510945757.b2662641d5-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245794" version="1" comment="qemu-ovmf-x86_64 is &lt;2017+git1510945757.b2662641d5-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246266" version="1" comment="kernel-default is &lt;4.12.14-95.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246267" version="1" comment="kernel-default-devel is &lt;4.12.14-95.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246268" version="1" comment="kernel-default-extra is &lt;4.12.14-95.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246269" version="1" comment="kernel-devel is &lt;4.12.14-95.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246270" version="1" comment="kernel-macros is &lt;4.12.14-95.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246271" version="1" comment="kernel-source is &lt;4.12.14-95.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246272" version="1" comment="kernel-syms is &lt;4.12.14-95.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246332" version="1" comment="ovmf is &lt;2017+git1510945757.b2662641d5-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246333" version="1" comment="qemu-ovmf-x86_64 is &lt;2017+git1510945757.b2662641d5-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246457" version="1" comment="libopenssl1_1 is &lt;1.1.1-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246458" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246459" version="1" comment="openssl-1_1 is &lt;1.1.1-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247225" version="1" comment="xen is &lt;4.11.1_04-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247226" version="1" comment="xen-libs is &lt;4.11.1_04-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247227" version="1" comment="xen-libs-32bit is &lt;4.11.1_04-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251153" version="1" comment="libvirt is &lt;4.0.0-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251154" version="1" comment="libvirt-admin is &lt;4.0.0-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251155" version="1" comment="libvirt-client is &lt;4.0.0-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251156" version="1" comment="libvirt-daemon is &lt;4.0.0-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251157" version="1" comment="libvirt-daemon-config-network is &lt;4.0.0-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251158" version="1" comment="libvirt-daemon-config-nwfilter is &lt;4.0.0-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251159" version="1" comment="libvirt-daemon-driver-interface is &lt;4.0.0-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251160" version="1" comment="libvirt-daemon-driver-libxl is &lt;4.0.0-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251161" version="1" comment="libvirt-daemon-driver-lxc is &lt;4.0.0-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251162" version="1" comment="libvirt-daemon-driver-network is &lt;4.0.0-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251163" version="1" comment="libvirt-daemon-driver-nodedev is &lt;4.0.0-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251164" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;4.0.0-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251165" version="1" comment="libvirt-daemon-driver-qemu is &lt;4.0.0-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251166" version="1" comment="libvirt-daemon-driver-secret is &lt;4.0.0-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251167" version="1" comment="libvirt-daemon-driver-storage is &lt;4.0.0-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251168" version="1" comment="libvirt-daemon-driver-storage-core is &lt;4.0.0-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251169" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;4.0.0-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251170" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;4.0.0-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251171" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;4.0.0-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251172" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;4.0.0-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251173" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;4.0.0-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251174" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;4.0.0-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251175" version="1" comment="libvirt-daemon-lxc is &lt;4.0.0-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251176" version="1" comment="libvirt-daemon-qemu is &lt;4.0.0-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251177" version="1" comment="libvirt-daemon-xen is &lt;4.0.0-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251178" version="1" comment="libvirt-doc is &lt;4.0.0-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251179" version="1" comment="libvirt-libs is &lt;4.0.0-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258030" version="1" comment="sled-release is ==12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117426" version="1" comment="sle-ha-release is ==12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188498" version="1" comment="libnetfilter_cthelper is &lt;1.0.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188499" version="1" comment="libnetfilter_cthelper0 is &lt;1.0.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188500" version="1" comment="libnetfilter_cttimeout is &lt;1.0.0-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188501" version="1" comment="libnetfilter_cttimeout1 is &lt;1.0.0-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188502" version="1" comment="haproxy is &lt;1.5.4-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188503" version="1" comment="ctdb is &lt;4.2.4-18.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188504" version="1" comment="samba is &lt;4.2.4-18.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188505" version="1" comment="ctdb is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188506" version="1" comment="ctdb is &lt;4.2.4-18.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188507" version="1" comment="samba is &lt;4.2.4-18.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188508" version="1" comment="ctdb is &lt;4.2.4-18.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188509" version="1" comment="samba is &lt;4.2.4-18.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188510" version="1" comment="cluster-fs is &lt;1.0-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188511" version="1" comment="cluster-network is &lt;1.4-26.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188512" version="1" comment="cluster-network-kmp-default is &lt;1.4_k3.12.61_52.133-26.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188513" version="1" comment="cluster-network-kmp-xen is &lt;1.4_k3.12.61_52.133-26.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188514" version="1" comment="dlm-kmp-default is &lt;4.0.2_k3.12.61_52.133-22.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188515" version="1" comment="dlm-kmp-xen is &lt;4.0.2_k3.12.61_52.133-22.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188516" version="1" comment="drbd is &lt;8.4.4.7-9.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188517" version="1" comment="drbd-kmp-default is &lt;8.4.4.7_k3.12.61_52.133-9.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188518" version="1" comment="drbd-kmp-xen is &lt;8.4.4.7_k3.12.61_52.133-9.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188519" version="1" comment="gfs2-kmp-default is &lt;3.1.6_k3.12.61_52.133-22.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188520" version="1" comment="gfs2-kmp-xen is &lt;3.1.6_k3.12.61_52.133-22.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188521" version="1" comment="ocfs2-kmp-default is &lt;1.8.2_k3.12.61_52.133-22.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188522" version="1" comment="ocfs2-kmp-xen is &lt;1.8.2_k3.12.61_52.133-22.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232034" version="1" comment="ctdb is &lt;4.2.4-18.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232035" version="1" comment="samba is &lt;4.2.4-18.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252991" version="1" comment="ctdb is &lt;4.2.4-18.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252992" version="1" comment="samba is &lt;4.2.4-18.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188523" version="1" comment="hawk2 is &lt;1.0.1+git.1456406635.49e230d-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125858" version="1" comment="sle-ha-release is ==12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188524" version="1" comment="ctdb is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188525" version="1" comment="libpacemaker3 is &lt;1.1.13-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188526" version="1" comment="pacemaker is &lt;1.1.13-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188527" version="1" comment="pacemaker-cli is &lt;1.1.13-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188528" version="1" comment="pacemaker-cts is &lt;1.1.13-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188529" version="1" comment="pacemaker-remote is &lt;1.1.13-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188530" version="1" comment="libpcreposix0 is &lt;8.39-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188531" version="1" comment="ctdb is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188532" version="1" comment="ctdb is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188533" version="1" comment="ctdb is &lt;4.2.4-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188534" version="1" comment="ctdb is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188535" version="1" comment="ctdb is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188536" version="1" comment="cluster-fs is &lt;1.0-35.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188537" version="1" comment="cluster-network is &lt;1.4-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188538" version="1" comment="cluster-network-kmp-default is &lt;1.4_k3.12.74_60.64.93-27.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188539" version="1" comment="cluster-network-kmp-xen is &lt;1.4_k3.12.74_60.64.93-27.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188540" version="1" comment="dlm-kmp-default is &lt;4.0.2_k3.12.74_60.64.93-35.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188541" version="1" comment="dlm-kmp-xen is &lt;4.0.2_k3.12.74_60.64.93-35.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188542" version="1" comment="drbd is &lt;8.4.6-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188543" version="1" comment="drbd-kmp-default is &lt;8.4.6_k3.12.74_60.64.93-7.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188544" version="1" comment="drbd-kmp-xen is &lt;8.4.6_k3.12.74_60.64.93-7.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188545" version="1" comment="gfs2-kmp-default is &lt;3.1.6_k3.12.74_60.64.93-35.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188546" version="1" comment="gfs2-kmp-xen is &lt;3.1.6_k3.12.74_60.64.93-35.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188547" version="1" comment="ocfs2-kmp-default is &lt;1.8.2_k3.12.74_60.64.93-35.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188548" version="1" comment="ocfs2-kmp-xen is &lt;1.8.2_k3.12.74_60.64.93-35.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232281" version="1" comment="ctdb is &lt;4.2.4-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232282" version="1" comment="samba is &lt;4.2.4-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252993" version="1" comment="ctdb is &lt;4.2.4-28.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252994" version="1" comment="samba is &lt;4.2.4-28.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188549" version="1" comment="libpacemaker3 is &lt;1.1.15-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188550" version="1" comment="pacemaker is &lt;1.1.15-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188551" version="1" comment="pacemaker-cli is &lt;1.1.15-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188552" version="1" comment="pacemaker-cts is &lt;1.1.15-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188553" version="1" comment="pacemaker-remote is &lt;1.1.15-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188554" version="1" comment="cluster-md-kmp-default is &lt;4.4.21-84" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188555" version="1" comment="cluster-network-kmp-default is &lt;4.4.21-84" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188556" version="1" comment="dlm-kmp-default is &lt;4.4.21-84" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188557" version="1" comment="gfs2-kmp-default is &lt;4.4.21-84" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188558" version="1" comment="ocfs2-kmp-default is &lt;4.4.21-84" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188559" version="1" comment="cluster-md-kmp-default is &lt;4.4.21-90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188560" version="1" comment="cluster-network-kmp-default is &lt;4.4.21-90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188561" version="1" comment="dlm-kmp-default is &lt;4.4.21-90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188562" version="1" comment="gfs2-kmp-default is &lt;4.4.21-90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188563" version="1" comment="ocfs2-kmp-default is &lt;4.4.21-90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188564" version="1" comment="ctdb is &lt;4.4.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188565" version="1" comment="cluster-md-kmp-default is &lt;4.4.59-92.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188566" version="1" comment="cluster-network-kmp-default is &lt;4.4.59-92.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188567" version="1" comment="dlm-kmp-default is &lt;4.4.59-92.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188568" version="1" comment="gfs2-kmp-default is &lt;4.4.59-92.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188569" version="1" comment="ocfs2-kmp-default is &lt;4.4.59-92.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188570" version="1" comment="cluster-md-kmp-default is &lt;4.4.74-92.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188571" version="1" comment="cluster-network-kmp-default is &lt;4.4.74-92.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188572" version="1" comment="dlm-kmp-default is &lt;4.4.74-92.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188573" version="1" comment="gfs2-kmp-default is &lt;4.4.74-92.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188574" version="1" comment="ocfs2-kmp-default is &lt;4.4.74-92.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188575" version="1" comment="cluster-md-kmp-default is &lt;4.4.74-92.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188576" version="1" comment="cluster-network-kmp-default is &lt;4.4.74-92.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188577" version="1" comment="dlm-kmp-default is &lt;4.4.74-92.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188578" version="1" comment="gfs2-kmp-default is &lt;4.4.74-92.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188579" version="1" comment="ocfs2-kmp-default is &lt;4.4.74-92.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188580" version="1" comment="hawk is &lt;1.0.0+git.1448981395.15fb8b9-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188581" version="1" comment="hawk-templates is &lt;1.0.0+git.1448981395.15fb8b9-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188582" version="1" comment="cluster-md-kmp-default is &lt;4.4.74-92.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188583" version="1" comment="cluster-network-kmp-default is &lt;4.4.74-92.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188584" version="1" comment="dlm-kmp-default is &lt;4.4.74-92.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188585" version="1" comment="gfs2-kmp-default is &lt;4.4.74-92.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188586" version="1" comment="ocfs2-kmp-default is &lt;4.4.74-92.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188587" version="1" comment="cluster-md-kmp-default is &lt;4.4.74-92.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188588" version="1" comment="cluster-network-kmp-default is &lt;4.4.74-92.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188589" version="1" comment="dlm-kmp-default is &lt;4.4.74-92.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188590" version="1" comment="gfs2-kmp-default is &lt;4.4.74-92.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188591" version="1" comment="ocfs2-kmp-default is &lt;4.4.74-92.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188592" version="1" comment="ctdb is &lt;4.4.2-38.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188593" version="1" comment="cluster-md-kmp-default is &lt;4.4.90-92.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188594" version="1" comment="cluster-network-kmp-default is &lt;4.4.90-92.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188595" version="1" comment="dlm-kmp-default is &lt;4.4.90-92.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188596" version="1" comment="gfs2-kmp-default is &lt;4.4.90-92.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188597" version="1" comment="ocfs2-kmp-default is &lt;4.4.90-92.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188598" version="1" comment="ctdb is &lt;4.4.2-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188599" version="1" comment="cluster-md-kmp-default is &lt;4.4.90-92.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188600" version="1" comment="cluster-network-kmp-default is &lt;4.4.90-92.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188601" version="1" comment="dlm-kmp-default is &lt;4.4.90-92.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188602" version="1" comment="gfs2-kmp-default is &lt;4.4.90-92.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188603" version="1" comment="ocfs2-kmp-default is &lt;4.4.90-92.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188604" version="1" comment="cluster-md-kmp-default is &lt;4.4.103-92.53" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188605" version="1" comment="cluster-network-kmp-default is &lt;4.4.103-92.53" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188606" version="1" comment="dlm-kmp-default is &lt;4.4.103-92.53" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188607" version="1" comment="gfs2-kmp-default is &lt;4.4.103-92.53" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188608" version="1" comment="ocfs2-kmp-default is &lt;4.4.103-92.53" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188609" version="1" comment="cluster-md-kmp-default is &lt;4.4.49-92.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188610" version="1" comment="cluster-network-kmp-default is &lt;4.4.49-92.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188611" version="1" comment="dlm-kmp-default is &lt;4.4.49-92.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188612" version="1" comment="gfs2-kmp-default is &lt;4.4.49-92.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188613" version="1" comment="ocfs2-kmp-default is &lt;4.4.49-92.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188614" version="1" comment="ctdb is &lt;4.4.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188615" version="1" comment="cluster-md-kmp-default is &lt;4.4.49-92.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188616" version="1" comment="cluster-network-kmp-default is &lt;4.4.49-92.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188617" version="1" comment="dlm-kmp-default is &lt;4.4.49-92.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188618" version="1" comment="gfs2-kmp-default is &lt;4.4.49-92.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188619" version="1" comment="ocfs2-kmp-default is &lt;4.4.49-92.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188620" version="1" comment="cluster-md-kmp-default is &lt;4.4.59-92.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188621" version="1" comment="cluster-network-kmp-default is &lt;4.4.59-92.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188622" version="1" comment="dlm-kmp-default is &lt;4.4.59-92.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188623" version="1" comment="gfs2-kmp-default is &lt;4.4.59-92.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188624" version="1" comment="ocfs2-kmp-default is &lt;4.4.59-92.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188625" version="1" comment="ctdb is &lt;4.4.2-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188626" version="1" comment="cluster-md-kmp-default is &lt;4.4.38-93" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188627" version="1" comment="cluster-network-kmp-default is &lt;4.4.38-93" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188628" version="1" comment="dlm-kmp-default is &lt;4.4.38-93" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188629" version="1" comment="gfs2-kmp-default is &lt;4.4.38-93" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188630" version="1" comment="ocfs2-kmp-default is &lt;4.4.38-93" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188631" version="1" comment="cluster-md-kmp-default is &lt;4.4.59-92.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188632" version="1" comment="cluster-network-kmp-default is &lt;4.4.59-92.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188633" version="1" comment="dlm-kmp-default is &lt;4.4.59-92.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188634" version="1" comment="gfs2-kmp-default is &lt;4.4.59-92.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188635" version="1" comment="ocfs2-kmp-default is &lt;4.4.59-92.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188636" version="1" comment="cluster-md-kmp-default is &lt;4.4.103-92.56" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188637" version="1" comment="cluster-network-kmp-default is &lt;4.4.103-92.56" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188638" version="1" comment="dlm-kmp-default is &lt;4.4.103-92.56" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188639" version="1" comment="gfs2-kmp-default is &lt;4.4.103-92.56" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188640" version="1" comment="ocfs2-kmp-default is &lt;4.4.103-92.56" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232036" version="1" comment="ctdb is &lt;4.4.2-38.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232037" version="1" comment="samba is &lt;4.4.2-38.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232447" version="1" comment="cluster-md-kmp-default is &lt;4.4.121-92.92" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232448" version="1" comment="cluster-network-kmp-default is &lt;4.4.121-92.92" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232449" version="1" comment="dlm-kmp-default is &lt;4.4.121-92.92" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232450" version="1" comment="gfs2-kmp-default is &lt;4.4.121-92.92" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232451" version="1" comment="kernel-default is &lt;4.4.121-92.92" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232452" version="1" comment="ocfs2-kmp-default is &lt;4.4.121-92.92" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236771" version="1" comment="cluster-md-kmp-default is &lt;4.4.121-92.95" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236772" version="1" comment="cluster-network-kmp-default is &lt;4.4.121-92.95" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236773" version="1" comment="dlm-kmp-default is &lt;4.4.121-92.95" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236774" version="1" comment="gfs2-kmp-default is &lt;4.4.121-92.95" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236775" version="1" comment="kernel-default is &lt;4.4.121-92.95" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236776" version="1" comment="ocfs2-kmp-default is &lt;4.4.121-92.95" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188641" version="1" comment="cluster-md-kmp-default is &lt;4.4.114-92.64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188642" version="1" comment="cluster-network-kmp-default is &lt;4.4.114-92.64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188643" version="1" comment="dlm-kmp-default is &lt;4.4.114-92.64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188644" version="1" comment="gfs2-kmp-default is &lt;4.4.114-92.64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188645" version="1" comment="ocfs2-kmp-default is &lt;4.4.114-92.64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188646" version="1" comment="cluster-md-kmp-default is &lt;4.4.103-92.59" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188647" version="1" comment="cluster-network-kmp-default is &lt;4.4.103-92.59" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188648" version="1" comment="dlm-kmp-default is &lt;4.4.103-92.59" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188649" version="1" comment="gfs2-kmp-default is &lt;4.4.103-92.59" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188650" version="1" comment="kernel-default is &lt;4.4.103-92.59" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188651" version="1" comment="ocfs2-kmp-default is &lt;4.4.103-92.59" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188652" version="1" comment="cluster-md-kmp-default is &lt;4.4.120-92.70" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188653" version="1" comment="cluster-network-kmp-default is &lt;4.4.120-92.70" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188654" version="1" comment="dlm-kmp-default is &lt;4.4.120-92.70" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188655" version="1" comment="gfs2-kmp-default is &lt;4.4.120-92.70" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188656" version="1" comment="ocfs2-kmp-default is &lt;4.4.120-92.70" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188657" version="1" comment="ctdb is &lt;4.4.2-38.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188658" version="1" comment="corosync is &lt;2.3.5-6.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188659" version="1" comment="libcorosync4 is &lt;2.3.5-6.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188660" version="1" comment="cluster-md-kmp-default is &lt;4.4.121-92.80" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188661" version="1" comment="cluster-network-kmp-default is &lt;4.4.121-92.80" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188662" version="1" comment="dlm-kmp-default is &lt;4.4.121-92.80" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188663" version="1" comment="gfs2-kmp-default is &lt;4.4.121-92.80" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188664" version="1" comment="kernel-default is &lt;4.4.121-92.80" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188665" version="1" comment="ocfs2-kmp-default is &lt;4.4.121-92.80" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253202" version="1" comment="ctdb is &lt;4.4.2-38.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253203" version="1" comment="samba is &lt;4.4.2-38.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253784" version="1" comment="cluster-md-kmp-default is &lt;4.4.121-92.109" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253785" version="1" comment="cluster-network-kmp-default is &lt;4.4.121-92.109" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253786" version="1" comment="dlm-kmp-default is &lt;4.4.121-92.109" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253787" version="1" comment="gfs2-kmp-default is &lt;4.4.121-92.109" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253788" version="1" comment="kernel-default is &lt;4.4.121-92.109" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253789" version="1" comment="ocfs2-kmp-default is &lt;4.4.121-92.109" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256984" version="1" comment="cluster-md-kmp-default is &lt;4.4.121-92.114" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256985" version="1" comment="cluster-network-kmp-default is &lt;4.4.121-92.114" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256986" version="1" comment="dlm-kmp-default is &lt;4.4.121-92.114" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256987" version="1" comment="gfs2-kmp-default is &lt;4.4.121-92.114" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256988" version="1" comment="kernel-default is &lt;4.4.121-92.114" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256989" version="1" comment="ocfs2-kmp-default is &lt;4.4.121-92.114" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259336" version="1" comment="cluster-md-kmp-default is &lt;4.4.121-92.117" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259337" version="1" comment="cluster-network-kmp-default is &lt;4.4.121-92.117" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259338" version="1" comment="dlm-kmp-default is &lt;4.4.121-92.117" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259339" version="1" comment="gfs2-kmp-default is &lt;4.4.121-92.117" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259185" version="1" comment="kernel-default is &lt;4.4.121-92.117" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259340" version="1" comment="ocfs2-kmp-default is &lt;4.4.121-92.117" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263743" version="1" comment="cluster-md-kmp-default is &lt;4.4.121-92.120" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263744" version="1" comment="cluster-network-kmp-default is &lt;4.4.121-92.120" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263745" version="1" comment="dlm-kmp-default is &lt;4.4.121-92.120" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263746" version="1" comment="gfs2-kmp-default is &lt;4.4.121-92.120" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263747" version="1" comment="kernel-default is &lt;4.4.121-92.120" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263748" version="1" comment="ocfs2-kmp-default is &lt;4.4.121-92.120" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244658" version="1" comment="cluster-md-kmp-default is &lt;4.4.121-92.101" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244659" version="1" comment="cluster-network-kmp-default is &lt;4.4.121-92.101" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244660" version="1" comment="dlm-kmp-default is &lt;4.4.121-92.101" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244661" version="1" comment="gfs2-kmp-default is &lt;4.4.121-92.101" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244662" version="1" comment="kernel-default is &lt;4.4.121-92.101" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244663" version="1" comment="ocfs2-kmp-default is &lt;4.4.121-92.101" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246709" version="1" comment="cluster-md-kmp-default is &lt;4.4.121-92.104" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246710" version="1" comment="cluster-network-kmp-default is &lt;4.4.121-92.104" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246711" version="1" comment="dlm-kmp-default is &lt;4.4.121-92.104" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246712" version="1" comment="gfs2-kmp-default is &lt;4.4.121-92.104" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246713" version="1" comment="kernel-default is &lt;4.4.121-92.104" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246714" version="1" comment="ocfs2-kmp-default is &lt;4.4.121-92.104" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188666" version="1" comment="ctdb is &lt;4.6.7+git.38.90b2cdb4f22-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188667" version="1" comment="ldirectord is &lt;4.0.1+git.1495055229.643177f1-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188668" version="1" comment="monitoring-plugins-metadata is &lt;4.0.1+git.1495055229.643177f1-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188669" version="1" comment="resource-agents is &lt;4.0.1+git.1495055229.643177f1-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188670" version="1" comment="cluster-md-kmp-default is &lt;4.4.82-6.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188671" version="1" comment="dlm-kmp-default is &lt;4.4.82-6.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188672" version="1" comment="gfs2-kmp-default is &lt;4.4.82-6.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188673" version="1" comment="ocfs2-kmp-default is &lt;4.4.82-6.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188674" version="1" comment="cluster-md-kmp-default is &lt;4.4.82-6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188675" version="1" comment="dlm-kmp-default is &lt;4.4.82-6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188676" version="1" comment="gfs2-kmp-default is &lt;4.4.82-6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188677" version="1" comment="ocfs2-kmp-default is &lt;4.4.82-6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188678" version="1" comment="ctdb is &lt;4.6.7+git.51.327af8d0a11-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188679" version="1" comment="cluster-md-kmp-default is &lt;4.4.92-6.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188680" version="1" comment="dlm-kmp-default is &lt;4.4.92-6.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188681" version="1" comment="gfs2-kmp-default is &lt;4.4.92-6.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188682" version="1" comment="ocfs2-kmp-default is &lt;4.4.92-6.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188683" version="1" comment="ctdb is &lt;4.6.9+git.59.c2cff9cea4c-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188684" version="1" comment="cluster-md-kmp-default is &lt;4.4.92-6.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188685" version="1" comment="dlm-kmp-default is &lt;4.4.92-6.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188686" version="1" comment="gfs2-kmp-default is &lt;4.4.92-6.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188687" version="1" comment="ocfs2-kmp-default is &lt;4.4.92-6.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188688" version="1" comment="cluster-md-kmp-default is &lt;4.4.103-6.33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188689" version="1" comment="dlm-kmp-default is &lt;4.4.103-6.33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188690" version="1" comment="gfs2-kmp-default is &lt;4.4.103-6.33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188691" version="1" comment="ocfs2-kmp-default is &lt;4.4.103-6.33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188692" version="1" comment="drbd is &lt;9.0.8+git.c8bc3670-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188693" version="1" comment="drbd-kmp-default is &lt;9.0.8+git.c8bc3670_k4.4.131_94.29-3.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223483" version="1" comment="ctdb is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229272" version="1" comment="cluster-md-kmp-default is &lt;4.4.138-94.39" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229273" version="1" comment="dlm-kmp-default is &lt;4.4.138-94.39" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229274" version="1" comment="gfs2-kmp-default is &lt;4.4.138-94.39" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229275" version="1" comment="ocfs2-kmp-default is &lt;4.4.138-94.39" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188694" version="1" comment="cluster-md-kmp-default is &lt;4.4.103-6.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188695" version="1" comment="dlm-kmp-default is &lt;4.4.103-6.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188696" version="1" comment="gfs2-kmp-default is &lt;4.4.103-6.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188697" version="1" comment="ocfs2-kmp-default is &lt;4.4.103-6.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230625" version="1" comment="cluster-md-kmp-default is &lt;4.4.140-94.42" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230626" version="1" comment="dlm-kmp-default is &lt;4.4.140-94.42" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230627" version="1" comment="gfs2-kmp-default is &lt;4.4.140-94.42" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230628" version="1" comment="ocfs2-kmp-default is &lt;4.4.140-94.42" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232038" version="1" comment="ctdb is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232039" version="1" comment="cluster-md-kmp-default is &lt;4.4.143-94.47" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232040" version="1" comment="dlm-kmp-default is &lt;4.4.143-94.47" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232041" version="1" comment="gfs2-kmp-default is &lt;4.4.143-94.47" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232042" version="1" comment="ocfs2-kmp-default is &lt;4.4.143-94.47" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234762" version="1" comment="cluster-md-kmp-default is &lt;4.4.155-94.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234763" version="1" comment="dlm-kmp-default is &lt;4.4.155-94.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234764" version="1" comment="gfs2-kmp-default is &lt;4.4.155-94.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234765" version="1" comment="ocfs2-kmp-default is &lt;4.4.155-94.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235830" version="1" comment="cluster-md-kmp-default is &lt;4.4.156-94.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235831" version="1" comment="dlm-kmp-default is &lt;4.4.156-94.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235832" version="1" comment="gfs2-kmp-default is &lt;4.4.156-94.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235833" version="1" comment="ocfs2-kmp-default is &lt;4.4.156-94.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238981" version="1" comment="cluster-md-kmp-default is &lt;4.4.162-94.69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238982" version="1" comment="dlm-kmp-default is &lt;4.4.162-94.69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238983" version="1" comment="gfs2-kmp-default is &lt;4.4.162-94.69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238984" version="1" comment="ocfs2-kmp-default is &lt;4.4.162-94.69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188698" version="1" comment="cluster-md-kmp-default is &lt;4.4.114-94.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188699" version="1" comment="dlm-kmp-default is &lt;4.4.114-94.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188700" version="1" comment="gfs2-kmp-default is &lt;4.4.114-94.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188701" version="1" comment="ocfs2-kmp-default is &lt;4.4.114-94.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188702" version="1" comment="ctdb is &lt;4.6.13+git.72.2a684235f41-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188703" version="1" comment="cluster-md-kmp-default is &lt;4.4.120-94.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188704" version="1" comment="dlm-kmp-default is &lt;4.4.120-94.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188705" version="1" comment="gfs2-kmp-default is &lt;4.4.120-94.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188706" version="1" comment="ocfs2-kmp-default is &lt;4.4.120-94.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188707" version="1" comment="cluster-md-kmp-default is &lt;4.4.126-94.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188708" version="1" comment="dlm-kmp-default is &lt;4.4.126-94.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188709" version="1" comment="gfs2-kmp-default is &lt;4.4.126-94.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188710" version="1" comment="ocfs2-kmp-default is &lt;4.4.126-94.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188713" version="1" comment="cluster-md-kmp-default is &lt;4.4.103-94.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188714" version="1" comment="dlm-kmp-default is &lt;4.4.103-94.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188715" version="1" comment="gfs2-kmp-default is &lt;4.4.103-94.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188716" version="1" comment="kernel-default is &lt;4.4.103-94.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188717" version="1" comment="ocfs2-kmp-default is &lt;4.4.103-94.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188718" version="1" comment="cluster-md-kmp-default is &lt;4.4.131-94.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188719" version="1" comment="dlm-kmp-default is &lt;4.4.131-94.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188720" version="1" comment="gfs2-kmp-default is &lt;4.4.131-94.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188721" version="1" comment="ocfs2-kmp-default is &lt;4.4.131-94.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252230" version="1" comment="ctdb is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252749" version="1" comment="libpacemaker3 is &lt;1.1.16-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252750" version="1" comment="pacemaker is &lt;1.1.16-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252751" version="1" comment="pacemaker-cli is &lt;1.1.16-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252752" version="1" comment="pacemaker-cts is &lt;1.1.16-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252753" version="1" comment="pacemaker-remote is &lt;1.1.16-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253454" version="1" comment="cluster-md-kmp-default is &lt;4.4.178-94.91" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253455" version="1" comment="dlm-kmp-default is &lt;4.4.178-94.91" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253456" version="1" comment="gfs2-kmp-default is &lt;4.4.178-94.91" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253458" version="1" comment="ocfs2-kmp-default is &lt;4.4.178-94.91" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256990" version="1" comment="cluster-md-kmp-default is &lt;4.4.180-94.97" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256991" version="1" comment="dlm-kmp-default is &lt;4.4.180-94.97" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256992" version="1" comment="gfs2-kmp-default is &lt;4.4.180-94.97" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256993" version="1" comment="ocfs2-kmp-default is &lt;4.4.180-94.97" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259045" version="1" comment="libdlm is &lt;4.0.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259046" version="1" comment="libdlm3 is &lt;4.0.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259047" version="1" comment="libqb is &lt;1.0.3+20171226.6d62b64-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259048" version="1" comment="libqb0 is &lt;1.0.3+20171226.6d62b64-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259341" version="1" comment="cluster-md-kmp-default is &lt;4.4.180-94.100" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259342" version="1" comment="dlm-kmp-default is &lt;4.4.180-94.100" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259343" version="1" comment="gfs2-kmp-default is &lt;4.4.180-94.100" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259345" version="1" comment="ocfs2-kmp-default is &lt;4.4.180-94.100" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263252" version="1" comment="cluster-md-kmp-default is &lt;4.4.180-94.103" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263253" version="1" comment="dlm-kmp-default is &lt;4.4.180-94.103" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263254" version="1" comment="gfs2-kmp-default is &lt;4.4.180-94.103" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263255" version="1" comment="kernel-default is &lt;4.4.180-94.103" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263256" version="1" comment="ocfs2-kmp-default is &lt;4.4.180-94.103" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245486" version="1" comment="cluster-md-kmp-default is &lt;4.4.175-94.79" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245487" version="1" comment="dlm-kmp-default is &lt;4.4.175-94.79" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245488" version="1" comment="gfs2-kmp-default is &lt;4.4.175-94.79" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245489" version="1" comment="ocfs2-kmp-default is &lt;4.4.175-94.79" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246548" version="1" comment="cluster-md-kmp-default is &lt;4.4.176-94.88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246549" version="1" comment="dlm-kmp-default is &lt;4.4.176-94.88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246550" version="1" comment="gfs2-kmp-default is &lt;4.4.176-94.88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246551" version="1" comment="ocfs2-kmp-default is &lt;4.4.176-94.88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241614" version="1" comment="cluster-md-kmp-default is &lt;4.12.14-95.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241615" version="1" comment="dlm-kmp-default is &lt;4.12.14-95.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241616" version="1" comment="gfs2-kmp-default is &lt;4.12.14-95.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241617" version="1" comment="ocfs2-kmp-default is &lt;4.12.14-95.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252414" version="1" comment="libpacemaker3 is &lt;1.1.19+20181105.ccd6b5b10-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252415" version="1" comment="pacemaker is &lt;1.1.19+20181105.ccd6b5b10-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252416" version="1" comment="pacemaker-cli is &lt;1.1.19+20181105.ccd6b5b10-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252417" version="1" comment="pacemaker-cts is &lt;1.1.19+20181105.ccd6b5b10-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252418" version="1" comment="pacemaker-remote is &lt;1.1.19+20181105.ccd6b5b10-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253459" version="1" comment="cluster-md-kmp-default is &lt;4.12.14-95.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253460" version="1" comment="dlm-kmp-default is &lt;4.12.14-95.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253461" version="1" comment="gfs2-kmp-default is &lt;4.12.14-95.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253463" version="1" comment="ocfs2-kmp-default is &lt;4.12.14-95.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256994" version="1" comment="cluster-md-kmp-default is &lt;4.12.14-95.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256995" version="1" comment="dlm-kmp-default is &lt;4.12.14-95.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256996" version="1" comment="gfs2-kmp-default is &lt;4.12.14-95.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256997" version="1" comment="ocfs2-kmp-default is &lt;4.12.14-95.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259049" version="1" comment="fence-agents is &lt;4.4.0+git.1558595666.5f79f9e9-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259346" version="1" comment="cluster-md-kmp-default is &lt;4.12.14-95.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259347" version="1" comment="dlm-kmp-default is &lt;4.12.14-95.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259348" version="1" comment="gfs2-kmp-default is &lt;4.12.14-95.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259349" version="1" comment="ocfs2-kmp-default is &lt;4.12.14-95.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243390" version="1" comment="cluster-md-kmp-default is &lt;4.12.14-95.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243391" version="1" comment="dlm-kmp-default is &lt;4.12.14-95.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243392" version="1" comment="gfs2-kmp-default is &lt;4.12.14-95.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243393" version="1" comment="ocfs2-kmp-default is &lt;4.12.14-95.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261271" version="1" comment="cluster-md-kmp-default is &lt;4.12.14-95.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261272" version="1" comment="dlm-kmp-default is &lt;4.12.14-95.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261273" version="1" comment="gfs2-kmp-default is &lt;4.12.14-95.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261274" version="1" comment="ocfs2-kmp-default is &lt;4.12.14-95.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263257" version="1" comment="libpacemaker3 is &lt;1.1.19+20181105.ccd6b5b10-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263258" version="1" comment="pacemaker is &lt;1.1.19+20181105.ccd6b5b10-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263259" version="1" comment="pacemaker-cli is &lt;1.1.19+20181105.ccd6b5b10-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263260" version="1" comment="pacemaker-cts is &lt;1.1.19+20181105.ccd6b5b10-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263261" version="1" comment="pacemaker-remote is &lt;1.1.19+20181105.ccd6b5b10-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265045" version="1" comment="cluster-md-kmp-default is &lt;4.12.14-95.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265046" version="1" comment="dlm-kmp-default is &lt;4.12.14-95.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265047" version="1" comment="gfs2-kmp-default is &lt;4.12.14-95.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265048" version="1" comment="ocfs2-kmp-default is &lt;4.12.14-95.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246273" version="1" comment="cluster-md-kmp-default is &lt;4.12.14-95.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246274" version="1" comment="dlm-kmp-default is &lt;4.12.14-95.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246275" version="1" comment="gfs2-kmp-default is &lt;4.12.14-95.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246276" version="1" comment="ocfs2-kmp-default is &lt;4.12.14-95.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188722" version="1" comment="kgraft-patch-3_12_38-44-default is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188723" version="1" comment="kgraft-patch-3_12_38-44-xen is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188724" version="1" comment="kgraft-patch-SLE12_Update_3 is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117427" version="1" comment="sle-live-patching-release is &gt;=12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188725" version="1" comment="kgraft-patch-3_12_39-47-default is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188726" version="1" comment="kgraft-patch-3_12_39-47-xen is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188727" version="1" comment="kgraft-patch-SLE12_Update_4 is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188728" version="1" comment="kgraft-patch-3_12_32-33-default is &lt;2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188729" version="1" comment="kgraft-patch-3_12_32-33-xen is &lt;2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188730" version="1" comment="kgraft-patch-3_12_36-38-default is &lt;2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188731" version="1" comment="kgraft-patch-3_12_36-38-xen is &lt;2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188732" version="1" comment="kgraft-patch-SLE12_Update_1 is &lt;2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188733" version="1" comment="kgraft-patch-SLE12_Update_2 is &lt;2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188734" version="1" comment="kgraft-patch-3_12_43-52_6-default is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188735" version="1" comment="kgraft-patch-3_12_43-52_6-xen is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188736" version="1" comment="kgraft-patch-SLE12_Update_5 is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188737" version="1" comment="kgraft-patch-3_12_44-52_10-default is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188738" version="1" comment="kgraft-patch-3_12_44-52_10-xen is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188739" version="1" comment="kgraft-patch-SLE12_Update_6 is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188740" version="1" comment="kgraft-patch-3_12_32-33-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188741" version="1" comment="kgraft-patch-3_12_32-33-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188742" version="1" comment="kgraft-patch-SLE12_Update_1 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188743" version="1" comment="kgraft-patch-3_12_36-38-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188744" version="1" comment="kgraft-patch-3_12_36-38-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188745" version="1" comment="kgraft-patch-SLE12_Update_2 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188746" version="1" comment="kgraft-patch-3_12_38-44-default is &lt;2-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188747" version="1" comment="kgraft-patch-3_12_38-44-xen is &lt;2-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188748" version="1" comment="kgraft-patch-SLE12_Update_3 is &lt;2-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188749" version="1" comment="kgraft-patch-3_12_39-47-default is &lt;2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188750" version="1" comment="kgraft-patch-3_12_39-47-xen is &lt;2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188751" version="1" comment="kgraft-patch-SLE12_Update_4 is &lt;2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188752" version="1" comment="kgraft-patch-3_12_43-52_6-default is &lt;2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188753" version="1" comment="kgraft-patch-3_12_43-52_6-xen is &lt;2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188754" version="1" comment="kgraft-patch-SLE12_Update_5 is &lt;2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188755" version="1" comment="kgraft-patch-3_12_44-52_18-default is &lt;1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188756" version="1" comment="kgraft-patch-3_12_44-52_18-xen is &lt;1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188757" version="1" comment="kgraft-patch-SLE12_Update_7 is &lt;1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188758" version="1" comment="kgraft-patch-3_12_48-52_27-default is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188759" version="1" comment="kgraft-patch-3_12_48-52_27-xen is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188760" version="1" comment="kgraft-patch-SLE12_Update_8 is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188761" version="1" comment="kgraft-patch-3_12_32-33-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188762" version="1" comment="kgraft-patch-3_12_32-33-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188763" version="1" comment="kgraft-patch-SLE12_Update_1 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188764" version="1" comment="kgraft-patch-3_12_36-38-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188765" version="1" comment="kgraft-patch-3_12_36-38-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188766" version="1" comment="kgraft-patch-SLE12_Update_2 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188767" version="1" comment="kgraft-patch-3_12_38-44-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188768" version="1" comment="kgraft-patch-3_12_38-44-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188769" version="1" comment="kgraft-patch-SLE12_Update_3 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188770" version="1" comment="kgraft-patch-3_12_39-47-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188771" version="1" comment="kgraft-patch-3_12_39-47-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188772" version="1" comment="kgraft-patch-SLE12_Update_4 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188773" version="1" comment="kgraft-patch-3_12_43-52_6-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188774" version="1" comment="kgraft-patch-3_12_43-52_6-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188775" version="1" comment="kgraft-patch-SLE12_Update_5 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188776" version="1" comment="kgraft-patch-3_12_44-52_10-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188777" version="1" comment="kgraft-patch-3_12_44-52_10-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188778" version="1" comment="kgraft-patch-SLE12_Update_6 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188779" version="1" comment="kgraft-patch-3_12_44-52_18-default is &lt;2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188780" version="1" comment="kgraft-patch-3_12_44-52_18-xen is &lt;2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188781" version="1" comment="kgraft-patch-SLE12_Update_7 is &lt;2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188782" version="1" comment="kgraft-patch-3_12_51-52_31-default is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188783" version="1" comment="kgraft-patch-3_12_51-52_31-xen is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188784" version="1" comment="kgraft-patch-SLE12_Update_9 is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188785" version="1" comment="kgraft-patch-3_12_51-60_20-default is &lt;1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188786" version="1" comment="kgraft-patch-3_12_51-60_20-xen is &lt;1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188787" version="1" comment="kgraft-patch-SLE12-SP1_Update_1 is &lt;1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188788" version="1" comment="kgraft-patch-3_12_60-52_49-default is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188789" version="1" comment="kgraft-patch-3_12_60-52_49-xen is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188790" version="1" comment="kgraft-patch-SLE12_Update_14 is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188791" version="1" comment="kgraft-patch-3_12_59-60_41-default is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188792" version="1" comment="kgraft-patch-3_12_59-60_41-xen is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188793" version="1" comment="kgraft-patch-SLE12-SP1_Update_5 is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188794" version="1" comment="kgraft-patch-3_12_59-60_45-default is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188795" version="1" comment="kgraft-patch-3_12_59-60_45-xen is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188796" version="1" comment="kgraft-patch-SLE12-SP1_Update_6 is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188797" version="1" comment="kgraft-patch-3_12_60-52_54-default is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188798" version="1" comment="kgraft-patch-3_12_60-52_54-xen is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188799" version="1" comment="kgraft-patch-SLE12_Update_15 is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188800" version="1" comment="kgraft-patch-3_12_51-52_34-default is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188801" version="1" comment="kgraft-patch-3_12_51-52_34-xen is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188802" version="1" comment="kgraft-patch-SLE12_Update_10 is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188803" version="1" comment="kgraft-patch-3_12_49-11-default is &lt;5-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188804" version="1" comment="kgraft-patch-3_12_49-11-xen is &lt;5-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188805" version="1" comment="kgraft-patch-SLE12-SP1_Update_0 is &lt;5-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188806" version="1" comment="kgraft-patch-3_12_59-60_45-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188807" version="1" comment="kgraft-patch-3_12_59-60_45-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188808" version="1" comment="kgraft-patch-SLE12-SP1_Update_6 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188809" version="1" comment="kgraft-patch-3_12_57-60_35-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188810" version="1" comment="kgraft-patch-3_12_57-60_35-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188811" version="1" comment="kgraft-patch-SLE12-SP1_Update_4 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188812" version="1" comment="kgraft-patch-3_12_59-60_41-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188813" version="1" comment="kgraft-patch-3_12_59-60_41-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188814" version="1" comment="kgraft-patch-SLE12-SP1_Update_5 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188815" version="1" comment="kgraft-patch-3_12_53-60_30-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188816" version="1" comment="kgraft-patch-3_12_53-60_30-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188817" version="1" comment="kgraft-patch-SLE12-SP1_Update_3 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188818" version="1" comment="kgraft-patch-3_12_51-60_25-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188819" version="1" comment="kgraft-patch-3_12_51-60_25-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188820" version="1" comment="kgraft-patch-SLE12-SP1_Update_2 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188821" version="1" comment="kgraft-patch-3_12_51-60_20-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188822" version="1" comment="kgraft-patch-3_12_51-60_20-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188823" version="1" comment="kgraft-patch-SLE12-SP1_Update_1 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188824" version="1" comment="kgraft-patch-3_12_51-60_25-default is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188825" version="1" comment="kgraft-patch-3_12_51-60_25-xen is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188826" version="1" comment="kgraft-patch-SLE12-SP1_Update_2 is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188827" version="1" comment="kgraft-patch-3_12_62-60_62-default is &lt;1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188828" version="1" comment="kgraft-patch-3_12_62-60_62-xen is &lt;1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188829" version="1" comment="kgraft-patch-SLE12-SP1_Update_7 is &lt;1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188830" version="1" comment="kgraft-patch-3_12_59-60_45-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188831" version="1" comment="kgraft-patch-3_12_59-60_45-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188832" version="1" comment="kgraft-patch-SLE12-SP1_Update_6 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188833" version="1" comment="kgraft-patch-3_12_59-60_41-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188834" version="1" comment="kgraft-patch-3_12_59-60_41-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188835" version="1" comment="kgraft-patch-SLE12-SP1_Update_5 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188836" version="1" comment="kgraft-patch-3_12_57-60_35-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188837" version="1" comment="kgraft-patch-3_12_57-60_35-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188838" version="1" comment="kgraft-patch-SLE12-SP1_Update_4 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188839" version="1" comment="kgraft-patch-3_12_53-60_30-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188840" version="1" comment="kgraft-patch-3_12_53-60_30-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188841" version="1" comment="kgraft-patch-SLE12-SP1_Update_3 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188842" version="1" comment="kgraft-patch-3_12_51-60_25-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188843" version="1" comment="kgraft-patch-3_12_51-60_25-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188844" version="1" comment="kgraft-patch-SLE12-SP1_Update_2 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188845" version="1" comment="kgraft-patch-3_12_49-11-default is &lt;6-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188846" version="1" comment="kgraft-patch-3_12_49-11-xen is &lt;6-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188847" version="1" comment="kgraft-patch-SLE12-SP1_Update_0 is &lt;6-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188848" version="1" comment="kgraft-patch-3_12_51-60_20-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188849" version="1" comment="kgraft-patch-3_12_51-60_20-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188850" version="1" comment="kgraft-patch-SLE12-SP1_Update_1 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188851" version="1" comment="kgraft-patch-3_12_62-60_62-default is &lt;2-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188852" version="1" comment="kgraft-patch-3_12_62-60_62-xen is &lt;2-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188853" version="1" comment="kgraft-patch-SLE12-SP1_Update_7 is &lt;2-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188854" version="1" comment="kgraft-patch-3_12_51-52_39-default is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188855" version="1" comment="kgraft-patch-3_12_51-52_39-xen is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188856" version="1" comment="kgraft-patch-SLE12_Update_11 is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188857" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188858" version="1" comment="kgraft-patch-3_12_62-60_64_8-xen is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188859" version="1" comment="kgraft-patch-SLE12-SP1_Update_8 is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188860" version="1" comment="kgraft-patch-3_12_49-11-default is &lt;7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188861" version="1" comment="kgraft-patch-3_12_49-11-xen is &lt;7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188862" version="1" comment="kgraft-patch-SLE12-SP1_Update_0 is &lt;7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188863" version="1" comment="kgraft-patch-3_12_51-60_25-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188864" version="1" comment="kgraft-patch-3_12_51-60_25-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188865" version="1" comment="kgraft-patch-SLE12-SP1_Update_2 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188866" version="1" comment="kgraft-patch-3_12_51-60_20-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188867" version="1" comment="kgraft-patch-3_12_51-60_20-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188868" version="1" comment="kgraft-patch-SLE12-SP1_Update_1 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188869" version="1" comment="kgraft-patch-3_12_59-60_41-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188870" version="1" comment="kgraft-patch-3_12_59-60_41-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188871" version="1" comment="kgraft-patch-SLE12-SP1_Update_5 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188872" version="1" comment="kgraft-patch-3_12_53-60_30-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188873" version="1" comment="kgraft-patch-3_12_53-60_30-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188874" version="1" comment="kgraft-patch-SLE12-SP1_Update_3 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188875" version="1" comment="kgraft-patch-3_12_57-60_35-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188876" version="1" comment="kgraft-patch-3_12_57-60_35-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188877" version="1" comment="kgraft-patch-SLE12-SP1_Update_4 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188878" version="1" comment="kgraft-patch-3_12_59-60_45-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188879" version="1" comment="kgraft-patch-3_12_59-60_45-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188880" version="1" comment="kgraft-patch-SLE12-SP1_Update_6 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188881" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188882" version="1" comment="kgraft-patch-3_12_62-60_64_8-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188883" version="1" comment="kgraft-patch-SLE12-SP1_Update_8 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188884" version="1" comment="kgraft-patch-3_12_62-60_62-default is &lt;3-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188885" version="1" comment="kgraft-patch-3_12_62-60_62-xen is &lt;3-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188886" version="1" comment="kgraft-patch-SLE12-SP1_Update_7 is &lt;3-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188887" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &lt;1-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188888" version="1" comment="kgraft-patch-3_12_67-60_64_18-xen is &lt;1-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188889" version="1" comment="kgraft-patch-SLE12-SP1_Update_9 is &lt;1-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188890" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188891" version="1" comment="kgraft-patch-3_12_67-60_64_21-xen is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188892" version="1" comment="kgraft-patch-SLE12-SP1_Update_10 is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188893" version="1" comment="kgraft-patch-4_4_21-84-default is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188894" version="1" comment="kgraft-patch-SLE12-SP2_Update_2 is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188895" version="1" comment="kgraft-patch-3_12_49-11-default is &lt;8-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188896" version="1" comment="kgraft-patch-3_12_49-11-xen is &lt;8-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188897" version="1" comment="kgraft-patch-SLE12-SP1_Update_0 is &lt;8-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188898" version="1" comment="kgraft-patch-3_12_51-60_20-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188899" version="1" comment="kgraft-patch-3_12_51-60_20-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188900" version="1" comment="kgraft-patch-SLE12-SP1_Update_1 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188901" version="1" comment="kgraft-patch-3_12_51-60_25-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188902" version="1" comment="kgraft-patch-3_12_51-60_25-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188903" version="1" comment="kgraft-patch-SLE12-SP1_Update_2 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188904" version="1" comment="kgraft-patch-3_12_53-60_30-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188905" version="1" comment="kgraft-patch-3_12_53-60_30-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188906" version="1" comment="kgraft-patch-SLE12-SP1_Update_3 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188907" version="1" comment="kgraft-patch-3_12_57-60_35-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188908" version="1" comment="kgraft-patch-3_12_57-60_35-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188909" version="1" comment="kgraft-patch-SLE12-SP1_Update_4 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188910" version="1" comment="kgraft-patch-3_12_59-60_45-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188911" version="1" comment="kgraft-patch-3_12_59-60_45-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188912" version="1" comment="kgraft-patch-SLE12-SP1_Update_6 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188913" version="1" comment="kgraft-patch-3_12_59-60_41-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188914" version="1" comment="kgraft-patch-3_12_59-60_41-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188915" version="1" comment="kgraft-patch-SLE12-SP1_Update_5 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188916" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188917" version="1" comment="kgraft-patch-3_12_62-60_64_8-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188918" version="1" comment="kgraft-patch-SLE12-SP1_Update_8 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188919" version="1" comment="kgraft-patch-4_4_21-90-default is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188920" version="1" comment="kgraft-patch-SLE12-SP2_Update_3 is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188921" version="1" comment="kgraft-patch-4_4_21-69-default is &lt;2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188922" version="1" comment="kgraft-patch-SLE12-SP2_Update_0 is &lt;2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188923" version="1" comment="kgraft-patch-3_12_62-60_62-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188924" version="1" comment="kgraft-patch-3_12_62-60_62-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188925" version="1" comment="kgraft-patch-SLE12-SP1_Update_7 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188926" version="1" comment="kgraft-patch-3_12_67-60_64_24-default is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188927" version="1" comment="kgraft-patch-3_12_67-60_64_24-xen is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188928" version="1" comment="kgraft-patch-SLE12-SP1_Update_11 is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188929" version="1" comment="kgraft-patch-4_4_21-81-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188930" version="1" comment="kgraft-patch-SLE12-SP2_Update_1 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188931" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188932" version="1" comment="kgraft-patch-3_12_67-60_64_18-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188933" version="1" comment="kgraft-patch-SLE12-SP1_Update_9 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188934" version="1" comment="kgraft-patch-3_12_51-52_34-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188935" version="1" comment="kgraft-patch-3_12_51-52_34-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188936" version="1" comment="kgraft-patch-SLE12_Update_10 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188937" version="1" comment="kgraft-patch-3_12_49-11-default is &lt;2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188938" version="1" comment="kgraft-patch-3_12_49-11-xen is &lt;2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188939" version="1" comment="kgraft-patch-SLE12-SP1_Update_0 is &lt;2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188940" version="1" comment="kgraft-patch-3_12_51-52_31-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188941" version="1" comment="kgraft-patch-3_12_51-52_31-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188942" version="1" comment="kgraft-patch-SLE12_Update_9 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188943" version="1" comment="kgraft-patch-3_12_51-60_20-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188944" version="1" comment="kgraft-patch-3_12_51-60_20-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188945" version="1" comment="kgraft-patch-SLE12-SP1_Update_1 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188946" version="1" comment="kgraft-patch-3_12_48-52_27-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188947" version="1" comment="kgraft-patch-3_12_48-52_27-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188948" version="1" comment="kgraft-patch-SLE12_Update_8 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188949" version="1" comment="kgraft-patch-3_12_43-52_6-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188950" version="1" comment="kgraft-patch-3_12_43-52_6-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188951" version="1" comment="kgraft-patch-SLE12_Update_5 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188952" version="1" comment="kgraft-patch-3_12_39-47-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188953" version="1" comment="kgraft-patch-3_12_39-47-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188954" version="1" comment="kgraft-patch-SLE12_Update_4 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188955" version="1" comment="kgraft-patch-3_12_38-44-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188956" version="1" comment="kgraft-patch-3_12_38-44-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188957" version="1" comment="kgraft-patch-SLE12_Update_3 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188958" version="1" comment="kgraft-patch-3_12_44-52_10-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188959" version="1" comment="kgraft-patch-3_12_44-52_10-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188960" version="1" comment="kgraft-patch-SLE12_Update_6 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188961" version="1" comment="kgraft-patch-3_12_44-52_18-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188962" version="1" comment="kgraft-patch-3_12_44-52_18-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188963" version="1" comment="kgraft-patch-SLE12_Update_7 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188964" version="1" comment="kgraft-patch-3_12_36-38-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188965" version="1" comment="kgraft-patch-3_12_36-38-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188966" version="1" comment="kgraft-patch-SLE12_Update_2 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188967" version="1" comment="kgraft-patch-3_12_32-33-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188968" version="1" comment="kgraft-patch-3_12_32-33-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188969" version="1" comment="kgraft-patch-SLE12_Update_1 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188970" version="1" comment="kgraft-patch-3_12_53-60_30-default is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188971" version="1" comment="kgraft-patch-3_12_53-60_30-xen is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188972" version="1" comment="kgraft-patch-SLE12-SP1_Update_3 is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188973" version="1" comment="kgraft-patch-3_12_38-44-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188974" version="1" comment="kgraft-patch-3_12_38-44-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188975" version="1" comment="kgraft-patch-SLE12_Update_3 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188976" version="1" comment="kgraft-patch-3_12_39-47-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188977" version="1" comment="kgraft-patch-3_12_39-47-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188978" version="1" comment="kgraft-patch-SLE12_Update_4 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188979" version="1" comment="kgraft-patch-3_12_43-52_6-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188980" version="1" comment="kgraft-patch-3_12_43-52_6-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188981" version="1" comment="kgraft-patch-SLE12_Update_5 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188982" version="1" comment="kgraft-patch-3_12_44-52_10-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188983" version="1" comment="kgraft-patch-3_12_44-52_10-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188984" version="1" comment="kgraft-patch-SLE12_Update_6 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188985" version="1" comment="kgraft-patch-3_12_44-52_18-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188986" version="1" comment="kgraft-patch-3_12_44-52_18-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188987" version="1" comment="kgraft-patch-SLE12_Update_7 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188988" version="1" comment="kgraft-patch-3_12_48-52_27-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188989" version="1" comment="kgraft-patch-3_12_48-52_27-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188990" version="1" comment="kgraft-patch-SLE12_Update_8 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188991" version="1" comment="kgraft-patch-3_12_51-52_31-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188992" version="1" comment="kgraft-patch-3_12_51-52_31-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188993" version="1" comment="kgraft-patch-SLE12_Update_9 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188994" version="1" comment="kgraft-patch-3_12_51-52_34-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188995" version="1" comment="kgraft-patch-3_12_51-52_34-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188996" version="1" comment="kgraft-patch-SLE12_Update_10 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188997" version="1" comment="kgraft-patch-3_12_51-52_39-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188998" version="1" comment="kgraft-patch-3_12_51-52_39-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009188999" version="1" comment="kgraft-patch-SLE12_Update_11 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189000" version="1" comment="kgraft-patch-3_12_49-11-default is &lt;3-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189001" version="1" comment="kgraft-patch-3_12_49-11-xen is &lt;3-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189002" version="1" comment="kgraft-patch-SLE12-SP1_Update_0 is &lt;3-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189003" version="1" comment="kgraft-patch-3_12_51-60_20-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189004" version="1" comment="kgraft-patch-3_12_51-60_20-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189005" version="1" comment="kgraft-patch-SLE12-SP1_Update_1 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189006" version="1" comment="kgraft-patch-3_12_51-60_25-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189007" version="1" comment="kgraft-patch-3_12_51-60_25-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189008" version="1" comment="kgraft-patch-SLE12-SP1_Update_2 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189009" version="1" comment="kgraft-patch-3_12_55-52_42-default is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189010" version="1" comment="kgraft-patch-3_12_55-52_42-xen is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189011" version="1" comment="kgraft-patch-SLE12_Update_12 is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189012" version="1" comment="kgraft-patch-3_12_57-60_35-default is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189013" version="1" comment="kgraft-patch-3_12_57-60_35-xen is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189014" version="1" comment="kgraft-patch-SLE12-SP1_Update_4 is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189015" version="1" comment="kgraft-patch-3_12_51-52_39-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189016" version="1" comment="kgraft-patch-3_12_51-52_39-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189017" version="1" comment="kgraft-patch-SLE12_Update_11 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189018" version="1" comment="kgraft-patch-3_12_49-11-default is &lt;4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189019" version="1" comment="kgraft-patch-3_12_49-11-xen is &lt;4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189020" version="1" comment="kgraft-patch-SLE12-SP1_Update_0 is &lt;4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189021" version="1" comment="kgraft-patch-3_12_51-60_20-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189022" version="1" comment="kgraft-patch-3_12_51-60_20-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189023" version="1" comment="kgraft-patch-SLE12-SP1_Update_1 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189024" version="1" comment="kgraft-patch-3_12_51-60_25-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189025" version="1" comment="kgraft-patch-3_12_51-60_25-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189026" version="1" comment="kgraft-patch-SLE12-SP1_Update_2 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189027" version="1" comment="kgraft-patch-3_12_53-60_30-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189028" version="1" comment="kgraft-patch-3_12_53-60_30-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189029" version="1" comment="kgraft-patch-SLE12-SP1_Update_3 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189030" version="1" comment="kgraft-patch-3_12_39-47-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189031" version="1" comment="kgraft-patch-3_12_39-47-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189032" version="1" comment="kgraft-patch-SLE12_Update_4 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189033" version="1" comment="kgraft-patch-3_12_44-52_10-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189034" version="1" comment="kgraft-patch-3_12_44-52_10-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189035" version="1" comment="kgraft-patch-SLE12_Update_6 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189036" version="1" comment="kgraft-patch-3_12_44-52_18-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189037" version="1" comment="kgraft-patch-3_12_44-52_18-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189038" version="1" comment="kgraft-patch-SLE12_Update_7 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189039" version="1" comment="kgraft-patch-3_12_48-52_27-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189040" version="1" comment="kgraft-patch-3_12_48-52_27-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189041" version="1" comment="kgraft-patch-SLE12_Update_8 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189042" version="1" comment="kgraft-patch-3_12_51-52_31-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189043" version="1" comment="kgraft-patch-3_12_51-52_31-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189044" version="1" comment="kgraft-patch-SLE12_Update_9 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189045" version="1" comment="kgraft-patch-3_12_51-52_34-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189046" version="1" comment="kgraft-patch-3_12_51-52_34-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189047" version="1" comment="kgraft-patch-SLE12_Update_10 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189048" version="1" comment="kgraft-patch-3_12_43-52_6-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189049" version="1" comment="kgraft-patch-3_12_43-52_6-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189050" version="1" comment="kgraft-patch-SLE12_Update_5 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189051" version="1" comment="kgraft-patch-3_12_55-52_45-default is &lt;1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189052" version="1" comment="kgraft-patch-3_12_55-52_45-xen is &lt;1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189053" version="1" comment="kgraft-patch-SLE12_Update_13 is &lt;1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189054" version="1" comment="kgraft-patch-4_4_59-92_24-default is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189055" version="1" comment="kgraft-patch-SLE12-SP2_Update_9 is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189056" version="1" comment="kgraft-patch-4_4_21-69-default is &lt;3-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189057" version="1" comment="kgraft-patch-SLE12-SP2_Update_0 is &lt;3-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189058" version="1" comment="kgraft-patch-4_4_21-90-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189059" version="1" comment="kgraft-patch-SLE12-SP2_Update_3 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189060" version="1" comment="kgraft-patch-4_4_21-81-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189061" version="1" comment="kgraft-patch-SLE12-SP2_Update_1 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189062" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189063" version="1" comment="kgraft-patch-3_12_67-60_64_18-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189064" version="1" comment="kgraft-patch-SLE12-SP1_Update_9 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189065" version="1" comment="kgraft-patch-3_12_62-60_62-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189066" version="1" comment="kgraft-patch-3_12_62-60_62-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189067" version="1" comment="kgraft-patch-SLE12-SP1_Update_7 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189068" version="1" comment="kgraft-patch-3_12_59-60_45-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189069" version="1" comment="kgraft-patch-3_12_59-60_45-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189070" version="1" comment="kgraft-patch-SLE12-SP1_Update_6 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189071" version="1" comment="kgraft-patch-3_12_59-60_41-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189072" version="1" comment="kgraft-patch-3_12_59-60_41-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189073" version="1" comment="kgraft-patch-SLE12-SP1_Update_5 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189074" version="1" comment="kgraft-patch-4_4_74-92_29-default is &lt;1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189075" version="1" comment="kgraft-patch-SLE12-SP2_Update_10 is &lt;1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189076" version="1" comment="kgraft-patch-3_12_57-60_35-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189077" version="1" comment="kgraft-patch-3_12_57-60_35-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189078" version="1" comment="kgraft-patch-SLE12-SP1_Update_4 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189079" version="1" comment="kgraft-patch-3_12_51-60_25-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189080" version="1" comment="kgraft-patch-3_12_51-60_25-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189081" version="1" comment="kgraft-patch-SLE12-SP1_Update_2 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189082" version="1" comment="kgraft-patch-3_12_53-60_30-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189083" version="1" comment="kgraft-patch-3_12_53-60_30-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189084" version="1" comment="kgraft-patch-SLE12-SP1_Update_3 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189085" version="1" comment="kgraft-patch-4_4_59-92_17-default is &lt;2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189086" version="1" comment="kgraft-patch-SLE12-SP2_Update_7 is &lt;2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189087" version="1" comment="kgraft-patch-4_4_59-92_20-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189088" version="1" comment="kgraft-patch-SLE12-SP2_Update_8 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189089" version="1" comment="kgraft-patch-4_4_21-69-default is &lt;7-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189090" version="1" comment="kgraft-patch-SLE12-SP2_Update_0 is &lt;7-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189091" version="1" comment="kgraft-patch-4_4_21-81-default is &lt;7-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189092" version="1" comment="kgraft-patch-SLE12-SP2_Update_1 is &lt;7-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189093" version="1" comment="kgraft-patch-4_4_21-84-default is &lt;6-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189094" version="1" comment="kgraft-patch-SLE12-SP2_Update_2 is &lt;6-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189095" version="1" comment="kgraft-patch-4_4_21-90-default is &lt;6-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189096" version="1" comment="kgraft-patch-SLE12-SP2_Update_3 is &lt;6-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189097" version="1" comment="kgraft-patch-4_4_49-92_11-default is &lt;4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189098" version="1" comment="kgraft-patch-SLE12-SP2_Update_5 is &lt;4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189099" version="1" comment="kgraft-patch-4_4_49-92_14-default is &lt;3-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189100" version="1" comment="kgraft-patch-SLE12-SP2_Update_6 is &lt;3-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189101" version="1" comment="kgraft-patch-4_4_38-93-default is &lt;6-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189102" version="1" comment="kgraft-patch-SLE12-SP2_Update_4 is &lt;6-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189103" version="1" comment="kgraft-patch-4_4_74-92_32-default is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189104" version="1" comment="kgraft-patch-SLE12-SP2_Update_11 is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189105" version="1" comment="kgraft-patch-4_4_21-90-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189106" version="1" comment="kgraft-patch-SLE12-SP2_Update_3 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189107" version="1" comment="kgraft-patch-4_4_59-92_20-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189108" version="1" comment="kgraft-patch-SLE12-SP2_Update_8 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189109" version="1" comment="kgraft-patch-4_4_74-92_29-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189110" version="1" comment="kgraft-patch-SLE12-SP2_Update_10 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189111" version="1" comment="kgraft-patch-4_4_21-69-default is &lt;8-18.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189112" version="1" comment="kgraft-patch-SLE12-SP2_Update_0 is &lt;8-18.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189113" version="1" comment="kgraft-patch-4_4_59-92_24-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189114" version="1" comment="kgraft-patch-SLE12-SP2_Update_9 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189115" version="1" comment="kgraft-patch-4_4_49-92_14-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189116" version="1" comment="kgraft-patch-SLE12-SP2_Update_6 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189117" version="1" comment="kgraft-patch-4_4_59-92_17-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189118" version="1" comment="kgraft-patch-SLE12-SP2_Update_7 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189119" version="1" comment="kgraft-patch-4_4_38-93-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189120" version="1" comment="kgraft-patch-SLE12-SP2_Update_4 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189121" version="1" comment="kgraft-patch-4_4_49-92_11-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189122" version="1" comment="kgraft-patch-SLE12-SP2_Update_5 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189123" version="1" comment="kgraft-patch-4_4_21-81-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189124" version="1" comment="kgraft-patch-SLE12-SP2_Update_1 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189125" version="1" comment="kgraft-patch-4_4_21-84-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189126" version="1" comment="kgraft-patch-SLE12-SP2_Update_2 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189127" version="1" comment="kgraft-patch-4_4_74-92_35-default is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189128" version="1" comment="kgraft-patch-SLE12-SP2_Update_12 is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189129" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189130" version="1" comment="kgraft-patch-3_12_62-60_64_8-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189131" version="1" comment="kgraft-patch-SLE12-SP1_Update_8 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189132" version="1" comment="kgraft-patch-4_4_21-81-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189133" version="1" comment="kgraft-patch-SLE12-SP2_Update_1 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189134" version="1" comment="kgraft-patch-4_4_21-84-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189135" version="1" comment="kgraft-patch-SLE12-SP2_Update_2 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189136" version="1" comment="kgraft-patch-4_4_49-92_11-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189137" version="1" comment="kgraft-patch-SLE12-SP2_Update_5 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189138" version="1" comment="kgraft-patch-4_4_59-92_17-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189139" version="1" comment="kgraft-patch-SLE12-SP2_Update_7 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189140" version="1" comment="kgraft-patch-4_4_74-92_35-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189141" version="1" comment="kgraft-patch-SLE12-SP2_Update_12 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189142" version="1" comment="kgraft-patch-4_4_21-90-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189143" version="1" comment="kgraft-patch-SLE12-SP2_Update_3 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189144" version="1" comment="kgraft-patch-4_4_38-93-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189145" version="1" comment="kgraft-patch-SLE12-SP2_Update_4 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189146" version="1" comment="kgraft-patch-4_4_49-92_14-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189147" version="1" comment="kgraft-patch-SLE12-SP2_Update_6 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189148" version="1" comment="kgraft-patch-4_4_59-92_20-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189149" version="1" comment="kgraft-patch-SLE12-SP2_Update_8 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189150" version="1" comment="kgraft-patch-4_4_59-92_24-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189151" version="1" comment="kgraft-patch-SLE12-SP2_Update_9 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189152" version="1" comment="kgraft-patch-4_4_74-92_29-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189153" version="1" comment="kgraft-patch-SLE12-SP2_Update_10 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189154" version="1" comment="kgraft-patch-4_4_21-84-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189155" version="1" comment="kgraft-patch-SLE12-SP2_Update_2 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189156" version="1" comment="kgraft-patch-4_4_74-92_32-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189157" version="1" comment="kgraft-patch-SLE12-SP2_Update_11 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189158" version="1" comment="kgraft-patch-4_4_21-69-default is &lt;9-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189159" version="1" comment="kgraft-patch-SLE12-SP2_Update_0 is &lt;9-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189160" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189161" version="1" comment="kgraft-patch-3_12_67-60_64_21-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189162" version="1" comment="kgraft-patch-SLE12-SP1_Update_10 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189163" version="1" comment="kgraft-patch-4_4_74-92_38-default is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189164" version="1" comment="kgraft-patch-SLE12-SP2_Update_13 is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189165" version="1" comment="kgraft-patch-4_4_38-93-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189166" version="1" comment="kgraft-patch-SLE12-SP2_Update_4 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189167" version="1" comment="kgraft-patch-4_4_21-81-default is &lt;10-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189168" version="1" comment="kgraft-patch-SLE12-SP2_Update_1 is &lt;10-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189169" version="1" comment="kgraft-patch-4_4_21-84-default is &lt;9-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189170" version="1" comment="kgraft-patch-SLE12-SP2_Update_2 is &lt;9-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189171" version="1" comment="kgraft-patch-4_4_21-90-default is &lt;9-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189172" version="1" comment="kgraft-patch-SLE12-SP2_Update_3 is &lt;9-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189173" version="1" comment="kgraft-patch-4_4_49-92_11-default is &lt;7-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189174" version="1" comment="kgraft-patch-SLE12-SP2_Update_5 is &lt;7-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189175" version="1" comment="kgraft-patch-4_4_59-92_17-default is &lt;5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189176" version="1" comment="kgraft-patch-SLE12-SP2_Update_7 is &lt;5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189177" version="1" comment="kgraft-patch-4_4_49-92_14-default is &lt;6-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189178" version="1" comment="kgraft-patch-SLE12-SP2_Update_6 is &lt;6-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189179" version="1" comment="kgraft-patch-4_4_21-69-default is &lt;10-18.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189180" version="1" comment="kgraft-patch-SLE12-SP2_Update_0 is &lt;10-18.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189181" version="1" comment="kgraft-patch-4_4_59-92_20-default is &lt;5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189182" version="1" comment="kgraft-patch-SLE12-SP2_Update_8 is &lt;5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189183" version="1" comment="kgraft-patch-4_4_74-92_29-default is &lt;4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189184" version="1" comment="kgraft-patch-SLE12-SP2_Update_10 is &lt;4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189185" version="1" comment="kgraft-patch-4_4_59-92_24-default is &lt;4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189186" version="1" comment="kgraft-patch-SLE12-SP2_Update_9 is &lt;4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189187" version="1" comment="kgraft-patch-4_4_74-92_32-default is &lt;3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189188" version="1" comment="kgraft-patch-SLE12-SP2_Update_11 is &lt;3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189189" version="1" comment="kgraft-patch-4_4_74-92_35-default is &lt;3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189190" version="1" comment="kgraft-patch-SLE12-SP2_Update_12 is &lt;3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189191" version="1" comment="kgraft-patch-4_4_74-92_38-default is &lt;2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189192" version="1" comment="kgraft-patch-SLE12-SP2_Update_13 is &lt;2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189193" version="1" comment="kgraft-patch-4_4_38-93-default is &lt;9-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189194" version="1" comment="kgraft-patch-SLE12-SP2_Update_4 is &lt;9-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189195" version="1" comment="kgraft-patch-4_4_90-92_45-default is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189196" version="1" comment="kgraft-patch-SLE12-SP2_Update_14 is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189197" version="1" comment="kgraft-patch-4_4_74-92_38-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189198" version="1" comment="kgraft-patch-SLE12-SP2_Update_13 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189199" version="1" comment="kgraft-patch-4_4_74-92_35-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189200" version="1" comment="kgraft-patch-SLE12-SP2_Update_12 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189201" version="1" comment="kgraft-patch-4_4_74-92_32-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189202" version="1" comment="kgraft-patch-SLE12-SP2_Update_11 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189203" version="1" comment="kgraft-patch-4_4_74-92_29-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189204" version="1" comment="kgraft-patch-SLE12-SP2_Update_10 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189205" version="1" comment="kgraft-patch-4_4_59-92_24-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189206" version="1" comment="kgraft-patch-SLE12-SP2_Update_9 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189207" version="1" comment="kgraft-patch-4_4_59-92_20-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189208" version="1" comment="kgraft-patch-SLE12-SP2_Update_8 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189209" version="1" comment="kgraft-patch-4_4_59-92_17-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189210" version="1" comment="kgraft-patch-SLE12-SP2_Update_7 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189211" version="1" comment="kgraft-patch-4_4_49-92_14-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189212" version="1" comment="kgraft-patch-SLE12-SP2_Update_6 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189213" version="1" comment="kgraft-patch-4_4_38-93-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189214" version="1" comment="kgraft-patch-SLE12-SP2_Update_4 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189215" version="1" comment="kgraft-patch-4_4_21-90-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189216" version="1" comment="kgraft-patch-SLE12-SP2_Update_3 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189217" version="1" comment="kgraft-patch-4_4_49-92_11-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189218" version="1" comment="kgraft-patch-SLE12-SP2_Update_5 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189219" version="1" comment="kgraft-patch-4_4_21-84-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189220" version="1" comment="kgraft-patch-SLE12-SP2_Update_2 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189221" version="1" comment="kgraft-patch-4_4_90-92_50-default is &lt;1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189222" version="1" comment="kgraft-patch-SLE12-SP2_Update_15 is &lt;1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189223" version="1" comment="kgraft-patch-4_4_59-92_24-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189224" version="1" comment="kgraft-patch-SLE12-SP2_Update_9 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189225" version="1" comment="kgraft-patch-4_4_59-92_20-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189226" version="1" comment="kgraft-patch-SLE12-SP2_Update_8 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189227" version="1" comment="kgraft-patch-4_4_21-90-default is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189228" version="1" comment="kgraft-patch-SLE12-SP2_Update_3 is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189229" version="1" comment="kgraft-patch-4_4_21-84-default is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189230" version="1" comment="kgraft-patch-SLE12-SP2_Update_2 is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189231" version="1" comment="kgraft-patch-4_4_38-93-default is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189232" version="1" comment="kgraft-patch-SLE12-SP2_Update_4 is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189233" version="1" comment="kgraft-patch-4_4_59-92_17-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189234" version="1" comment="kgraft-patch-SLE12-SP2_Update_7 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189235" version="1" comment="kgraft-patch-4_4_49-92_14-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189236" version="1" comment="kgraft-patch-SLE12-SP2_Update_6 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189237" version="1" comment="kgraft-patch-4_4_74-92_35-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189238" version="1" comment="kgraft-patch-SLE12-SP2_Update_12 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189239" version="1" comment="kgraft-patch-4_4_74-92_38-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189240" version="1" comment="kgraft-patch-SLE12-SP2_Update_13 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189241" version="1" comment="kgraft-patch-4_4_74-92_32-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189242" version="1" comment="kgraft-patch-SLE12-SP2_Update_11 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189243" version="1" comment="kgraft-patch-4_4_90-92_45-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189244" version="1" comment="kgraft-patch-SLE12-SP2_Update_14 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189245" version="1" comment="kgraft-patch-4_4_49-92_11-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189246" version="1" comment="kgraft-patch-SLE12-SP2_Update_5 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189247" version="1" comment="kgraft-patch-4_4_74-92_29-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189248" version="1" comment="kgraft-patch-SLE12-SP2_Update_10 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189249" version="1" comment="kgraft-patch-4_4_103-92_53-default is &lt;1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189250" version="1" comment="kgraft-patch-SLE12-SP2_Update_16 is &lt;1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189251" version="1" comment="kgraft-patch-3_12_69-60_64_29-default is &lt;1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189252" version="1" comment="kgraft-patch-3_12_69-60_64_29-xen is &lt;1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189253" version="1" comment="kgraft-patch-SLE12-SP1_Update_12 is &lt;1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189254" version="1" comment="kgraft-patch-3_12_69-60_64_32-default is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189255" version="1" comment="kgraft-patch-3_12_69-60_64_32-xen is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189256" version="1" comment="kgraft-patch-SLE12-SP1_Update_13 is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189257" version="1" comment="kgraft-patch-4_4_49-92_11-default is &lt;1-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189258" version="1" comment="kgraft-patch-SLE12-SP2_Update_5 is &lt;1-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189259" version="1" comment="kgraft-patch-3_12_57-60_35-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189260" version="1" comment="kgraft-patch-3_12_57-60_35-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189261" version="1" comment="kgraft-patch-SLE12-SP1_Update_4 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189262" version="1" comment="kgraft-patch-3_12_59-60_41-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189263" version="1" comment="kgraft-patch-3_12_59-60_41-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189264" version="1" comment="kgraft-patch-SLE12-SP1_Update_5 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189265" version="1" comment="kgraft-patch-3_12_59-60_45-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189266" version="1" comment="kgraft-patch-3_12_59-60_45-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189267" version="1" comment="kgraft-patch-SLE12-SP1_Update_6 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189268" version="1" comment="kgraft-patch-3_12_62-60_62-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189269" version="1" comment="kgraft-patch-3_12_62-60_62-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189270" version="1" comment="kgraft-patch-SLE12-SP1_Update_7 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189271" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189272" version="1" comment="kgraft-patch-3_12_62-60_64_8-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189273" version="1" comment="kgraft-patch-SLE12-SP1_Update_8 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189274" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189275" version="1" comment="kgraft-patch-3_12_67-60_64_18-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189276" version="1" comment="kgraft-patch-SLE12-SP1_Update_9 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189277" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189278" version="1" comment="kgraft-patch-3_12_67-60_64_21-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189279" version="1" comment="kgraft-patch-SLE12-SP1_Update_10 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189280" version="1" comment="kgraft-patch-4_4_21-69-default is &lt;4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189281" version="1" comment="kgraft-patch-SLE12-SP2_Update_0 is &lt;4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189282" version="1" comment="kgraft-patch-4_4_21-90-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189283" version="1" comment="kgraft-patch-SLE12-SP2_Update_3 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189284" version="1" comment="kgraft-patch-4_4_21-84-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189285" version="1" comment="kgraft-patch-SLE12-SP2_Update_2 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189286" version="1" comment="kgraft-patch-4_4_21-81-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189287" version="1" comment="kgraft-patch-SLE12-SP2_Update_1 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189288" version="1" comment="kgraft-patch-3_12_67-60_64_24-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189289" version="1" comment="kgraft-patch-3_12_67-60_64_24-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189290" version="1" comment="kgraft-patch-SLE12-SP1_Update_11 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189291" version="1" comment="kgraft-patch-4_4_38-93-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189292" version="1" comment="kgraft-patch-SLE12-SP2_Update_4 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189293" version="1" comment="kgraft-patch-3_12_69-60_64_29-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189294" version="1" comment="kgraft-patch-3_12_69-60_64_29-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189295" version="1" comment="kgraft-patch-SLE12-SP1_Update_12 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189296" version="1" comment="kgraft-patch-3_12_69-60_64_35-default is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189297" version="1" comment="kgraft-patch-3_12_69-60_64_35-xen is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189298" version="1" comment="kgraft-patch-SLE12-SP1_Update_14 is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189299" version="1" comment="kgraft-patch-4_4_49-92_14-default is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189300" version="1" comment="kgraft-patch-SLE12-SP2_Update_6 is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189301" version="1" comment="kgraft-patch-4_4_21-69-default is &lt;5-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189302" version="1" comment="kgraft-patch-SLE12-SP2_Update_0 is &lt;5-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189303" version="1" comment="kgraft-patch-3_12_67-60_64_24-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189304" version="1" comment="kgraft-patch-3_12_67-60_64_24-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189305" version="1" comment="kgraft-patch-SLE12-SP1_Update_11 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189306" version="1" comment="kgraft-patch-4_4_49-92_11-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189307" version="1" comment="kgraft-patch-SLE12-SP2_Update_5 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189308" version="1" comment="kgraft-patch-4_4_38-93-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189309" version="1" comment="kgraft-patch-SLE12-SP2_Update_4 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189310" version="1" comment="kgraft-patch-4_4_21-90-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189311" version="1" comment="kgraft-patch-SLE12-SP2_Update_3 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189312" version="1" comment="kgraft-patch-4_4_21-84-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189313" version="1" comment="kgraft-patch-SLE12-SP2_Update_2 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189314" version="1" comment="kgraft-patch-4_4_21-81-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189315" version="1" comment="kgraft-patch-SLE12-SP2_Update_1 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189316" version="1" comment="kgraft-patch-3_12_69-60_64_32-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189317" version="1" comment="kgraft-patch-3_12_69-60_64_32-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189318" version="1" comment="kgraft-patch-SLE12-SP1_Update_13 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189319" version="1" comment="kgraft-patch-3_12_69-60_64_29-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189320" version="1" comment="kgraft-patch-3_12_69-60_64_29-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189321" version="1" comment="kgraft-patch-SLE12-SP1_Update_12 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189322" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189323" version="1" comment="kgraft-patch-3_12_67-60_64_21-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189324" version="1" comment="kgraft-patch-SLE12-SP1_Update_10 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189325" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189326" version="1" comment="kgraft-patch-3_12_67-60_64_18-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189327" version="1" comment="kgraft-patch-SLE12-SP1_Update_9 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189328" version="1" comment="kgraft-patch-3_12_62-60_62-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189329" version="1" comment="kgraft-patch-3_12_62-60_62-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189330" version="1" comment="kgraft-patch-SLE12-SP1_Update_7 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189331" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189332" version="1" comment="kgraft-patch-3_12_62-60_64_8-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189333" version="1" comment="kgraft-patch-SLE12-SP1_Update_8 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189334" version="1" comment="kgraft-patch-3_12_59-60_45-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189335" version="1" comment="kgraft-patch-3_12_59-60_45-xen is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189336" version="1" comment="kgraft-patch-SLE12-SP1_Update_6 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189337" version="1" comment="kgraft-patch-3_12_59-60_41-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189338" version="1" comment="kgraft-patch-3_12_59-60_41-xen is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189339" version="1" comment="kgraft-patch-SLE12-SP1_Update_5 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189340" version="1" comment="kgraft-patch-3_12_57-60_35-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189341" version="1" comment="kgraft-patch-3_12_57-60_35-xen is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189342" version="1" comment="kgraft-patch-SLE12-SP1_Update_4 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189343" version="1" comment="kgraft-patch-3_12_69-60_64_35-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189344" version="1" comment="kgraft-patch-3_12_69-60_64_35-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189345" version="1" comment="kgraft-patch-SLE12-SP1_Update_14 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189346" version="1" comment="kgraft-patch-4_4_21-90-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189347" version="1" comment="kgraft-patch-SLE12-SP2_Update_3 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189348" version="1" comment="kgraft-patch-3_12_59-60_41-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189349" version="1" comment="kgraft-patch-3_12_59-60_41-xen is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189350" version="1" comment="kgraft-patch-SLE12-SP1_Update_5 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189351" version="1" comment="kgraft-patch-4_4_59-92_17-default is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189352" version="1" comment="kgraft-patch-SLE12-SP2_Update_7 is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189353" version="1" comment="kgraft-patch-4_4_49-92_11-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189354" version="1" comment="kgraft-patch-SLE12-SP2_Update_5 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189355" version="1" comment="kgraft-patch-4_4_38-93-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189356" version="1" comment="kgraft-patch-SLE12-SP2_Update_4 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189357" version="1" comment="kgraft-patch-4_4_21-84-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189358" version="1" comment="kgraft-patch-SLE12-SP2_Update_2 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189359" version="1" comment="kgraft-patch-4_4_21-81-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189360" version="1" comment="kgraft-patch-SLE12-SP2_Update_1 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189361" version="1" comment="kgraft-patch-3_12_69-60_64_32-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189362" version="1" comment="kgraft-patch-3_12_69-60_64_32-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189363" version="1" comment="kgraft-patch-SLE12-SP1_Update_13 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189364" version="1" comment="kgraft-patch-3_12_69-60_64_29-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189365" version="1" comment="kgraft-patch-3_12_69-60_64_29-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189366" version="1" comment="kgraft-patch-SLE12-SP1_Update_12 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189367" version="1" comment="kgraft-patch-3_12_67-60_64_24-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189368" version="1" comment="kgraft-patch-3_12_67-60_64_24-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189369" version="1" comment="kgraft-patch-SLE12-SP1_Update_11 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189370" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189371" version="1" comment="kgraft-patch-3_12_67-60_64_21-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189372" version="1" comment="kgraft-patch-SLE12-SP1_Update_10 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189373" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189374" version="1" comment="kgraft-patch-3_12_67-60_64_18-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189375" version="1" comment="kgraft-patch-SLE12-SP1_Update_9 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189376" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189377" version="1" comment="kgraft-patch-3_12_62-60_64_8-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189378" version="1" comment="kgraft-patch-SLE12-SP1_Update_8 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189379" version="1" comment="kgraft-patch-3_12_62-60_62-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189380" version="1" comment="kgraft-patch-3_12_62-60_62-xen is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189381" version="1" comment="kgraft-patch-SLE12-SP1_Update_7 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189382" version="1" comment="kgraft-patch-3_12_59-60_45-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189383" version="1" comment="kgraft-patch-3_12_59-60_45-xen is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189384" version="1" comment="kgraft-patch-SLE12-SP1_Update_6 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189385" version="1" comment="kgraft-patch-4_4_21-69-default is &lt;6-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189386" version="1" comment="kgraft-patch-SLE12-SP2_Update_0 is &lt;6-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189387" version="1" comment="kgraft-patch-4_4_49-92_14-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189388" version="1" comment="kgraft-patch-SLE12-SP2_Update_6 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189389" version="1" comment="kgraft-patch-3_12_74-60_64_40-default is &lt;1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189390" version="1" comment="kgraft-patch-3_12_74-60_64_40-xen is &lt;1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189391" version="1" comment="kgraft-patch-SLE12-SP1_Update_15 is &lt;1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189392" version="1" comment="kgraft-patch-4_4_38-93-default is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189393" version="1" comment="kgraft-patch-SLE12-SP2_Update_4 is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189394" version="1" comment="kgraft-patch-4_4_59-92_20-default is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189395" version="1" comment="kgraft-patch-SLE12-SP2_Update_8 is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189396" version="1" comment="kgraft-patch-4_4_103-92_56-default is &lt;1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189397" version="1" comment="kgraft-patch-SLE12-SP2_Update_17 is &lt;1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232453" version="1" comment="kgraft is &lt;1.0-23.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232454" version="1" comment="kgraft-devel is &lt;1.0-23.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189398" version="1" comment="kgraft-patch-4_4_74-92_38-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189399" version="1" comment="kgraft-patch-SLE12-SP2_Update_13 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189400" version="1" comment="kgraft-patch-4_4_74-92_35-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189401" version="1" comment="kgraft-patch-SLE12-SP2_Update_12 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189402" version="1" comment="kgraft-patch-4_4_59-92_17-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189403" version="1" comment="kgraft-patch-SLE12-SP2_Update_7 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189404" version="1" comment="kgraft-patch-4_4_59-92_20-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189405" version="1" comment="kgraft-patch-SLE12-SP2_Update_8 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189406" version="1" comment="kgraft-patch-4_4_90-92_45-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189407" version="1" comment="kgraft-patch-SLE12-SP2_Update_14 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189408" version="1" comment="kgraft-patch-4_4_74-92_32-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189409" version="1" comment="kgraft-patch-SLE12-SP2_Update_11 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189410" version="1" comment="kgraft-patch-4_4_74-92_29-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189411" version="1" comment="kgraft-patch-SLE12-SP2_Update_10 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189412" version="1" comment="kgraft-patch-4_4_59-92_24-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189413" version="1" comment="kgraft-patch-SLE12-SP2_Update_9 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189414" version="1" comment="kgraft-patch-4_4_90-92_50-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189415" version="1" comment="kgraft-patch-SLE12-SP2_Update_15 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189416" version="1" comment="kgraft-patch-4_4_103-92_56-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189417" version="1" comment="kgraft-patch-SLE12-SP2_Update_17 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189418" version="1" comment="kgraft-patch-4_4_103-92_53-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189419" version="1" comment="kgraft-patch-SLE12-SP2_Update_16 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189420" version="1" comment="kgraft-patch-4_4_49-92_14-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189421" version="1" comment="kgraft-patch-SLE12-SP2_Update_6 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189422" version="1" comment="kgraft-patch-4_4_49-92_11-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189423" version="1" comment="kgraft-patch-SLE12-SP2_Update_5 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189424" version="1" comment="kgraft-patch-4_4_114-92_64-default is &lt;1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189425" version="1" comment="kgraft-patch-SLE12-SP2_Update_18 is &lt;1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189426" version="1" comment="kgraft-patch-4_4_49-92_11-default is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189427" version="1" comment="kgraft-patch-SLE12-SP2_Update_5 is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189428" version="1" comment="kgraft-patch-4_4_59-92_24-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189429" version="1" comment="kgraft-patch-SLE12-SP2_Update_9 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189430" version="1" comment="kgraft-patch-4_4_59-92_20-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189431" version="1" comment="kgraft-patch-SLE12-SP2_Update_8 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189432" version="1" comment="kgraft-patch-4_4_59-92_17-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189433" version="1" comment="kgraft-patch-SLE12-SP2_Update_7 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189434" version="1" comment="kgraft-patch-4_4_49-92_14-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189435" version="1" comment="kgraft-patch-SLE12-SP2_Update_6 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189436" version="1" comment="kgraft-patch-4_4_74-92_29-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189437" version="1" comment="kgraft-patch-SLE12-SP2_Update_10 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189438" version="1" comment="kgraft-patch-4_4_74-92_32-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189439" version="1" comment="kgraft-patch-SLE12-SP2_Update_11 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189440" version="1" comment="kgraft-patch-4_4_74-92_38-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189441" version="1" comment="kgraft-patch-SLE12-SP2_Update_13 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189442" version="1" comment="kgraft-patch-4_4_103-92_53-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189443" version="1" comment="kgraft-patch-SLE12-SP2_Update_16 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189444" version="1" comment="kgraft-patch-4_4_103-92_56-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189445" version="1" comment="kgraft-patch-SLE12-SP2_Update_17 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189446" version="1" comment="kgraft-patch-4_4_90-92_45-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189447" version="1" comment="kgraft-patch-SLE12-SP2_Update_14 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189448" version="1" comment="kgraft-patch-4_4_74-92_35-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189449" version="1" comment="kgraft-patch-SLE12-SP2_Update_12 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189450" version="1" comment="kgraft-patch-4_4_90-92_50-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189451" version="1" comment="kgraft-patch-SLE12-SP2_Update_15 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189452" version="1" comment="kgraft-patch-4_4_120-92_70-default is &lt;1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189453" version="1" comment="kgraft-patch-SLE12-SP2_Update_20 is &lt;1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189454" version="1" comment="kgraft-patch-4_4_73-5-default is &lt;2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189455" version="1" comment="kgraft-patch-SLE12-SP3_Update_0 is &lt;2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161624" version="1" comment="sle-live-patching-release is ==12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189456" version="1" comment="kgraft-patch-4_4_82-6_3-default is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189457" version="1" comment="kgraft-patch-SLE12-SP3_Update_1 is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189458" version="1" comment="kgraft-patch-4_4_82-6_6-default is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189459" version="1" comment="kgraft-patch-SLE12-SP3_Update_2 is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189460" version="1" comment="kgraft-patch-4_4_82-6_3-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189461" version="1" comment="kgraft-patch-SLE12-SP3_Update_1 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189462" version="1" comment="kgraft-patch-4_4_92-6_18-default is &lt;1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189463" version="1" comment="kgraft-patch-SLE12-SP3_Update_4 is &lt;1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189464" version="1" comment="kgraft-patch-4_4_82-6_3-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189465" version="1" comment="kgraft-patch-SLE12-SP3_Update_1 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189466" version="1" comment="kgraft-patch-4_4_82-6_9-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189467" version="1" comment="kgraft-patch-SLE12-SP3_Update_3 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189468" version="1" comment="kgraft-patch-4_4_82-6_6-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189469" version="1" comment="kgraft-patch-SLE12-SP3_Update_2 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189470" version="1" comment="kgraft-patch-4_4_92-6_30-default is &lt;1-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189471" version="1" comment="kgraft-patch-SLE12-SP3_Update_5 is &lt;1-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189472" version="1" comment="kgraft-patch-4_4_92-6_18-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189473" version="1" comment="kgraft-patch-SLE12-SP3_Update_4 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189474" version="1" comment="kgraft-patch-4_4_82-6_6-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189475" version="1" comment="kgraft-patch-SLE12-SP3_Update_2 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189476" version="1" comment="kgraft-patch-4_4_82-6_9-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189477" version="1" comment="kgraft-patch-SLE12-SP3_Update_3 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189478" version="1" comment="kgraft-patch-4_4_82-6_3-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189479" version="1" comment="kgraft-patch-SLE12-SP3_Update_1 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189480" version="1" comment="kgraft-patch-4_4_103-6_33-default is &lt;1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189481" version="1" comment="kgraft-patch-SLE12-SP3_Update_6 is &lt;1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223349" version="1" comment="kgraft-patch-4_4_82-6_3-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223350" version="1" comment="kgraft-patch-SLE12-SP3_Update_1 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223351" version="1" comment="kgraft-patch-4_4_82-6_9-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223352" version="1" comment="kgraft-patch-SLE12-SP3_Update_3 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223353" version="1" comment="kgraft-patch-4_4_82-6_6-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223354" version="1" comment="kgraft-patch-SLE12-SP3_Update_2 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223355" version="1" comment="kgraft-patch-4_4_92-6_18-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223356" version="1" comment="kgraft-patch-SLE12-SP3_Update_4 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223357" version="1" comment="kgraft-patch-4_4_92-6_30-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223358" version="1" comment="kgraft-patch-SLE12-SP3_Update_5 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223359" version="1" comment="kgraft-patch-4_4_103-6_38-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223360" version="1" comment="kgraft-patch-SLE12-SP3_Update_7 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223361" version="1" comment="kgraft-patch-4_4_103-6_33-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223362" version="1" comment="kgraft-patch-SLE12-SP3_Update_6 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223363" version="1" comment="kgraft-patch-4_4_114-94_14-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223364" version="1" comment="kgraft-patch-SLE12-SP3_Update_9 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223365" version="1" comment="kgraft-patch-4_4_114-94_11-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223366" version="1" comment="kgraft-patch-SLE12-SP3_Update_8 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223367" version="1" comment="kgraft-patch-4_4_120-94_17-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223368" version="1" comment="kgraft-patch-SLE12-SP3_Update_10 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229276" version="1" comment="kgraft-patch-4_4_138-94_39-default is &lt;1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229277" version="1" comment="kgraft-patch-SLE12-SP3_Update_14 is &lt;1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189482" version="1" comment="kgraft-patch-4_4_103-6_38-default is &lt;1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189483" version="1" comment="kgraft-patch-SLE12-SP3_Update_7 is &lt;1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230629" version="1" comment="kgraft-patch-4_4_140-94_42-default is &lt;1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230630" version="1" comment="kgraft-patch-SLE12-SP3_Update_15 is &lt;1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231562" version="1" comment="kgraft-patch-4_4_103-6_33-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231563" version="1" comment="kgraft-patch-SLE12-SP3_Update_6 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231564" version="1" comment="kgraft-patch-4_4_114-94_11-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231565" version="1" comment="kgraft-patch-SLE12-SP3_Update_8 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231566" version="1" comment="kgraft-patch-4_4_103-6_38-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231567" version="1" comment="kgraft-patch-SLE12-SP3_Update_7 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231568" version="1" comment="kgraft-patch-4_4_92-6_30-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231569" version="1" comment="kgraft-patch-SLE12-SP3_Update_5 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231570" version="1" comment="kgraft-patch-4_4_82-6_6-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231571" version="1" comment="kgraft-patch-SLE12-SP3_Update_2 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231572" version="1" comment="kgraft-patch-4_4_82-6_9-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231573" version="1" comment="kgraft-patch-SLE12-SP3_Update_3 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231574" version="1" comment="kgraft-patch-4_4_82-6_3-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231575" version="1" comment="kgraft-patch-SLE12-SP3_Update_1 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231600" version="1" comment="kgraft-patch-4_4_132-94_33-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231601" version="1" comment="kgraft-patch-SLE12-SP3_Update_13 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231602" version="1" comment="kgraft-patch-4_4_126-94_22-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231603" version="1" comment="kgraft-patch-SLE12-SP3_Update_11 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231604" version="1" comment="kgraft-patch-4_4_120-94_17-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231605" version="1" comment="kgraft-patch-SLE12-SP3_Update_10 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231606" version="1" comment="kgraft-patch-4_4_114-94_14-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231607" version="1" comment="kgraft-patch-SLE12-SP3_Update_9 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231608" version="1" comment="kgraft-patch-4_4_92-6_18-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231609" version="1" comment="kgraft-patch-SLE12-SP3_Update_4 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231610" version="1" comment="kgraft-patch-4_4_131-94_29-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231611" version="1" comment="kgraft-patch-SLE12-SP3_Update_12 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232043" version="1" comment="kgraft-patch-4_4_143-94_47-default is &lt;1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232044" version="1" comment="kgraft-patch-SLE12-SP3_Update_16 is &lt;1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232670" version="1" comment="kgraft-patch-4_4_82-6_3-default is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232671" version="1" comment="kgraft-patch-SLE12-SP3_Update_1 is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232672" version="1" comment="kgraft-patch-4_4_82-6_9-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232673" version="1" comment="kgraft-patch-SLE12-SP3_Update_3 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232674" version="1" comment="kgraft-patch-4_4_82-6_6-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232675" version="1" comment="kgraft-patch-SLE12-SP3_Update_2 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232676" version="1" comment="kgraft-patch-4_4_92-6_18-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232677" version="1" comment="kgraft-patch-SLE12-SP3_Update_4 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232678" version="1" comment="kgraft-patch-4_4_92-6_30-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232679" version="1" comment="kgraft-patch-SLE12-SP3_Update_5 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232680" version="1" comment="kgraft-patch-4_4_103-6_38-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232681" version="1" comment="kgraft-patch-SLE12-SP3_Update_7 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232682" version="1" comment="kgraft-patch-4_4_103-6_33-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232683" version="1" comment="kgraft-patch-SLE12-SP3_Update_6 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232684" version="1" comment="kgraft-patch-4_4_114-94_14-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232685" version="1" comment="kgraft-patch-SLE12-SP3_Update_9 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232686" version="1" comment="kgraft-patch-4_4_114-94_11-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232687" version="1" comment="kgraft-patch-SLE12-SP3_Update_8 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232688" version="1" comment="kgraft-patch-4_4_120-94_17-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232689" version="1" comment="kgraft-patch-SLE12-SP3_Update_10 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232690" version="1" comment="kgraft-patch-4_4_126-94_22-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232691" version="1" comment="kgraft-patch-SLE12-SP3_Update_11 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232692" version="1" comment="kgraft-patch-4_4_131-94_29-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232693" version="1" comment="kgraft-patch-SLE12-SP3_Update_12 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232694" version="1" comment="kgraft-patch-4_4_132-94_33-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232695" version="1" comment="kgraft-patch-SLE12-SP3_Update_13 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232696" version="1" comment="kgraft-patch-4_4_138-94_39-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232697" version="1" comment="kgraft-patch-SLE12-SP3_Update_14 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232698" version="1" comment="kgraft-patch-4_4_140-94_42-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232699" version="1" comment="kgraft-patch-SLE12-SP3_Update_15 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234766" version="1" comment="kgraft-patch-4_4_155-94_50-default is &lt;1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234767" version="1" comment="kgraft-patch-SLE12-SP3_Update_17 is &lt;1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235677" version="1" comment="kgraft-patch-4_4_92-6_18-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235678" version="1" comment="kgraft-patch-SLE12-SP3_Update_4 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235679" version="1" comment="kgraft-patch-4_4_92-6_30-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235680" version="1" comment="kgraft-patch-SLE12-SP3_Update_5 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235681" version="1" comment="kgraft-patch-4_4_103-6_38-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235682" version="1" comment="kgraft-patch-SLE12-SP3_Update_7 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235683" version="1" comment="kgraft-patch-4_4_103-6_33-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235684" version="1" comment="kgraft-patch-SLE12-SP3_Update_6 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235685" version="1" comment="kgraft-patch-4_4_114-94_14-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235686" version="1" comment="kgraft-patch-SLE12-SP3_Update_9 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235687" version="1" comment="kgraft-patch-4_4_120-94_17-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235688" version="1" comment="kgraft-patch-SLE12-SP3_Update_10 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235689" version="1" comment="kgraft-patch-4_4_114-94_11-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235690" version="1" comment="kgraft-patch-SLE12-SP3_Update_8 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235691" version="1" comment="kgraft-patch-4_4_126-94_22-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235692" version="1" comment="kgraft-patch-SLE12-SP3_Update_11 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235693" version="1" comment="kgraft-patch-4_4_131-94_29-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235694" version="1" comment="kgraft-patch-SLE12-SP3_Update_12 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235695" version="1" comment="kgraft-patch-4_4_132-94_33-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235696" version="1" comment="kgraft-patch-SLE12-SP3_Update_13 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235697" version="1" comment="kgraft-patch-4_4_138-94_39-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235698" version="1" comment="kgraft-patch-SLE12-SP3_Update_14 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235699" version="1" comment="kgraft-patch-4_4_140-94_42-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235700" version="1" comment="kgraft-patch-SLE12-SP3_Update_15 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235701" version="1" comment="kgraft-patch-4_4_143-94_47-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235702" version="1" comment="kgraft-patch-SLE12-SP3_Update_16 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235834" version="1" comment="kgraft-patch-4_4_156-94_57-default is &lt;1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235835" version="1" comment="kgraft-patch-SLE12-SP3_Update_18 is &lt;1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236304" version="1" comment="kgraft-patch-4_4_82-6_9-default is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236305" version="1" comment="kgraft-patch-SLE12-SP3_Update_3 is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236306" version="1" comment="kgraft-patch-4_4_82-6_6-default is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236307" version="1" comment="kgraft-patch-SLE12-SP3_Update_2 is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237261" version="1" comment="kgraft-patch-4_4_92-6_18-default is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237262" version="1" comment="kgraft-patch-SLE12-SP3_Update_4 is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237263" version="1" comment="kgraft-patch-4_4_92-6_30-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237264" version="1" comment="kgraft-patch-SLE12-SP3_Update_5 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237265" version="1" comment="kgraft-patch-4_4_103-6_38-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237266" version="1" comment="kgraft-patch-SLE12-SP3_Update_7 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237267" version="1" comment="kgraft-patch-4_4_103-6_33-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237268" version="1" comment="kgraft-patch-SLE12-SP3_Update_6 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237269" version="1" comment="kgraft-patch-4_4_114-94_14-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237270" version="1" comment="kgraft-patch-SLE12-SP3_Update_9 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237271" version="1" comment="kgraft-patch-4_4_120-94_17-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237272" version="1" comment="kgraft-patch-SLE12-SP3_Update_10 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237273" version="1" comment="kgraft-patch-4_4_114-94_11-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237274" version="1" comment="kgraft-patch-SLE12-SP3_Update_8 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237275" version="1" comment="kgraft-patch-4_4_126-94_22-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237276" version="1" comment="kgraft-patch-SLE12-SP3_Update_11 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237277" version="1" comment="kgraft-patch-4_4_131-94_29-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237278" version="1" comment="kgraft-patch-SLE12-SP3_Update_12 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237279" version="1" comment="kgraft-patch-4_4_132-94_33-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237280" version="1" comment="kgraft-patch-SLE12-SP3_Update_13 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237281" version="1" comment="kgraft-patch-4_4_138-94_39-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237282" version="1" comment="kgraft-patch-SLE12-SP3_Update_14 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237283" version="1" comment="kgraft-patch-4_4_140-94_42-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237284" version="1" comment="kgraft-patch-SLE12-SP3_Update_15 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237285" version="1" comment="kgraft-patch-4_4_143-94_47-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237286" version="1" comment="kgraft-patch-SLE12-SP3_Update_16 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237287" version="1" comment="kgraft-patch-4_4_155-94_50-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237288" version="1" comment="kgraft-patch-SLE12-SP3_Update_17 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237879" version="1" comment="kgraft-patch-4_4_156-94_57-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237880" version="1" comment="kgraft-patch-SLE12-SP3_Update_18 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237881" version="1" comment="kgraft-patch-4_4_156-94_61-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237882" version="1" comment="kgraft-patch-SLE12-SP3_Update_19 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189484" version="1" comment="kgraft-patch-4_4_82-6_3-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189485" version="1" comment="kgraft-patch-SLE12-SP3_Update_1 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189486" version="1" comment="kgraft-patch-4_4_82-6_9-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189487" version="1" comment="kgraft-patch-SLE12-SP3_Update_3 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189488" version="1" comment="kgraft-patch-4_4_82-6_6-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189489" version="1" comment="kgraft-patch-SLE12-SP3_Update_2 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189490" version="1" comment="kgraft-patch-4_4_92-6_18-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189491" version="1" comment="kgraft-patch-SLE12-SP3_Update_4 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238985" version="1" comment="kgraft-patch-4_4_162-94_69-default is &lt;1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238986" version="1" comment="kgraft-patch-SLE12-SP3_Update_21 is &lt;1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189492" version="1" comment="kgraft-patch-4_4_114-94_11-default is &lt;1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189493" version="1" comment="kgraft-patch-SLE12-SP3_Update_8 is &lt;1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240579" version="1" comment="kgraft-patch-4_4_156-94_64-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240580" version="1" comment="kgraft-patch-SLE12-SP3_Update_20 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240581" version="1" comment="kgraft-patch-4_4_103-6_33-default is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240582" version="1" comment="kgraft-patch-SLE12-SP3_Update_6 is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240583" version="1" comment="kgraft-patch-4_4_103-6_38-default is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240584" version="1" comment="kgraft-patch-SLE12-SP3_Update_7 is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240585" version="1" comment="kgraft-patch-4_4_92-6_30-default is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240586" version="1" comment="kgraft-patch-SLE12-SP3_Update_5 is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240587" version="1" comment="kgraft-patch-4_4_140-94_42-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240588" version="1" comment="kgraft-patch-SLE12-SP3_Update_15 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240589" version="1" comment="kgraft-patch-4_4_126-94_22-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240590" version="1" comment="kgraft-patch-SLE12-SP3_Update_11 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240591" version="1" comment="kgraft-patch-4_4_120-94_17-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240592" version="1" comment="kgraft-patch-SLE12-SP3_Update_10 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240593" version="1" comment="kgraft-patch-4_4_114-94_11-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240594" version="1" comment="kgraft-patch-SLE12-SP3_Update_8 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240595" version="1" comment="kgraft-patch-4_4_138-94_39-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240596" version="1" comment="kgraft-patch-SLE12-SP3_Update_14 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240597" version="1" comment="kgraft-patch-4_4_132-94_33-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240598" version="1" comment="kgraft-patch-SLE12-SP3_Update_13 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240599" version="1" comment="kgraft-patch-4_4_131-94_29-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240600" version="1" comment="kgraft-patch-SLE12-SP3_Update_12 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240601" version="1" comment="kgraft-patch-4_4_114-94_14-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240602" version="1" comment="kgraft-patch-SLE12-SP3_Update_9 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189494" version="1" comment="kgraft-patch-4_4_92-6_30-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189495" version="1" comment="kgraft-patch-SLE12-SP3_Update_5 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189496" version="1" comment="kgraft-patch-4_4_103-6_33-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189497" version="1" comment="kgraft-patch-SLE12-SP3_Update_6 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189498" version="1" comment="kgraft-patch-4_4_103-6_38-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189499" version="1" comment="kgraft-patch-SLE12-SP3_Update_7 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242168" version="1" comment="kgraft-patch-4_4_126-94_22-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242169" version="1" comment="kgraft-patch-SLE12-SP3_Update_11 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242170" version="1" comment="kgraft-patch-4_4_120-94_17-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242171" version="1" comment="kgraft-patch-SLE12-SP3_Update_10 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242172" version="1" comment="kgraft-patch-4_4_114-94_11-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242173" version="1" comment="kgraft-patch-SLE12-SP3_Update_8 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242174" version="1" comment="kgraft-patch-4_4_103-6_33-default is &lt;12-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242175" version="1" comment="kgraft-patch-SLE12-SP3_Update_6 is &lt;12-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242176" version="1" comment="kgraft-patch-4_4_131-94_29-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242177" version="1" comment="kgraft-patch-SLE12-SP3_Update_12 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242178" version="1" comment="kgraft-patch-4_4_132-94_33-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242179" version="1" comment="kgraft-patch-SLE12-SP3_Update_13 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242180" version="1" comment="kgraft-patch-4_4_114-94_14-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242181" version="1" comment="kgraft-patch-SLE12-SP3_Update_9 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242182" version="1" comment="kgraft-patch-4_4_103-6_38-default is &lt;12-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242183" version="1" comment="kgraft-patch-SLE12-SP3_Update_7 is &lt;12-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189500" version="1" comment="kgraft-patch-4_4_103-6_33-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189501" version="1" comment="kgraft-patch-SLE12-SP3_Update_6 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189502" version="1" comment="kgraft-patch-4_4_103-6_38-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189503" version="1" comment="kgraft-patch-SLE12-SP3_Update_7 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189504" version="1" comment="kgraft-patch-4_4_92-6_30-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189505" version="1" comment="kgraft-patch-SLE12-SP3_Update_5 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189506" version="1" comment="kgraft-patch-4_4_92-6_18-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189507" version="1" comment="kgraft-patch-SLE12-SP3_Update_4 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189508" version="1" comment="kgraft-patch-4_4_82-6_6-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189509" version="1" comment="kgraft-patch-SLE12-SP3_Update_2 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189510" version="1" comment="kgraft-patch-4_4_82-6_9-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189511" version="1" comment="kgraft-patch-SLE12-SP3_Update_3 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189512" version="1" comment="kgraft-patch-4_4_82-6_3-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189513" version="1" comment="kgraft-patch-SLE12-SP3_Update_1 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189514" version="1" comment="kgraft-patch-4_4_120-94_17-default is &lt;1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189515" version="1" comment="kgraft-patch-SLE12-SP3_Update_10 is &lt;1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189516" version="1" comment="kgraft-patch-4_4_114-94_11-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189517" version="1" comment="kgraft-patch-SLE12-SP3_Update_8 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189518" version="1" comment="kgraft-patch-4_4_114-94_14-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189519" version="1" comment="kgraft-patch-SLE12-SP3_Update_9 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189520" version="1" comment="kgraft-patch-4_4_103-6_33-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189521" version="1" comment="kgraft-patch-SLE12-SP3_Update_6 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189522" version="1" comment="kgraft-patch-4_4_103-6_38-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189523" version="1" comment="kgraft-patch-SLE12-SP3_Update_7 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189524" version="1" comment="kgraft-patch-4_4_92-6_30-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189525" version="1" comment="kgraft-patch-SLE12-SP3_Update_5 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189526" version="1" comment="kgraft-patch-4_4_92-6_18-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189527" version="1" comment="kgraft-patch-SLE12-SP3_Update_4 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189528" version="1" comment="kgraft-patch-4_4_82-6_6-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189529" version="1" comment="kgraft-patch-SLE12-SP3_Update_2 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189530" version="1" comment="kgraft-patch-4_4_82-6_9-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189531" version="1" comment="kgraft-patch-SLE12-SP3_Update_3 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189532" version="1" comment="kgraft-patch-4_4_82-6_3-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189533" version="1" comment="kgraft-patch-SLE12-SP3_Update_1 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189534" version="1" comment="kgraft-patch-4_4_126-94_22-default is &lt;1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189535" version="1" comment="kgraft-patch-SLE12-SP3_Update_11 is &lt;1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189536" version="1" comment="kgraft-patch-4_4_82-6_3-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189537" version="1" comment="kgraft-patch-SLE12-SP3_Update_1 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189538" version="1" comment="kgraft-patch-4_4_82-6_9-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189539" version="1" comment="kgraft-patch-SLE12-SP3_Update_3 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189540" version="1" comment="kgraft-patch-4_4_82-6_6-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189541" version="1" comment="kgraft-patch-SLE12-SP3_Update_2 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189542" version="1" comment="kgraft-patch-4_4_92-6_18-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189543" version="1" comment="kgraft-patch-SLE12-SP3_Update_4 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189544" version="1" comment="kgraft-patch-4_4_92-6_30-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189545" version="1" comment="kgraft-patch-SLE12-SP3_Update_5 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189546" version="1" comment="kgraft-patch-4_4_103-6_38-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189547" version="1" comment="kgraft-patch-SLE12-SP3_Update_7 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189548" version="1" comment="kgraft-patch-4_4_103-6_33-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189549" version="1" comment="kgraft-patch-SLE12-SP3_Update_6 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189550" version="1" comment="kgraft-patch-4_4_114-94_14-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189551" version="1" comment="kgraft-patch-SLE12-SP3_Update_9 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189552" version="1" comment="kgraft-patch-4_4_114-94_11-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189553" version="1" comment="kgraft-patch-SLE12-SP3_Update_8 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189554" version="1" comment="kgraft-patch-4_4_120-94_17-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189555" version="1" comment="kgraft-patch-SLE12-SP3_Update_10 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189556" version="1" comment="kgraft-patch-4_4_126-94_22-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189557" version="1" comment="kgraft-patch-SLE12-SP3_Update_11 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189558" version="1" comment="kgraft-patch-4_4_131-94_29-default is &lt;1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189559" version="1" comment="kgraft-patch-SLE12-SP3_Update_12 is &lt;1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253464" version="1" comment="kgraft-patch-4_4_178-94_91-default is &lt;1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253465" version="1" comment="kgraft-patch-SLE12-SP3_Update_25 is &lt;1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256085" version="1" comment="kgraft-patch-4_4_132-94_33-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256086" version="1" comment="kgraft-patch-SLE12-SP3_Update_13 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256087" version="1" comment="kgraft-patch-4_4_138-94_39-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256088" version="1" comment="kgraft-patch-SLE12-SP3_Update_14 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256089" version="1" comment="kgraft-patch-4_4_140-94_42-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256090" version="1" comment="kgraft-patch-SLE12-SP3_Update_15 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256998" version="1" comment="kgraft-patch-4_4_180-94_97-default is &lt;1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256999" version="1" comment="kgraft-patch-SLE12-SP3_Update_26 is &lt;1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257832" version="1" comment="kgraft-patch-4_4_176-94_88-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257833" version="1" comment="kgraft-patch-SLE12-SP3_Update_24 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257834" version="1" comment="kgraft-patch-4_4_162-94_72-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257835" version="1" comment="kgraft-patch-SLE12-SP3_Update_22 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257836" version="1" comment="kgraft-patch-4_4_178-94_91-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257837" version="1" comment="kgraft-patch-SLE12-SP3_Update_25 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257838" version="1" comment="kgraft-patch-4_4_156-94_64-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257839" version="1" comment="kgraft-patch-SLE12-SP3_Update_20 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257840" version="1" comment="kgraft-patch-4_4_175-94_79-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257841" version="1" comment="kgraft-patch-SLE12-SP3_Update_23 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257842" version="1" comment="kgraft-patch-4_4_156-94_61-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257843" version="1" comment="kgraft-patch-SLE12-SP3_Update_19 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257844" version="1" comment="kgraft-patch-4_4_162-94_69-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257845" version="1" comment="kgraft-patch-SLE12-SP3_Update_21 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257846" version="1" comment="kgraft-patch-4_4_143-94_47-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257847" version="1" comment="kgraft-patch-SLE12-SP3_Update_16 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257848" version="1" comment="kgraft-patch-4_4_156-94_57-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257849" version="1" comment="kgraft-patch-SLE12-SP3_Update_18 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257850" version="1" comment="kgraft-patch-4_4_140-94_42-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257851" version="1" comment="kgraft-patch-SLE12-SP3_Update_15 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257852" version="1" comment="kgraft-patch-4_4_155-94_50-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257853" version="1" comment="kgraft-patch-SLE12-SP3_Update_17 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257854" version="1" comment="kgraft-patch-4_4_138-94_39-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257855" version="1" comment="kgraft-patch-SLE12-SP3_Update_14 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258979" version="1" comment="kgraft-patch-4_4_180-94_97-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258980" version="1" comment="kgraft-patch-SLE12-SP3_Update_26 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243936" version="1" comment="kgraft-patch-4_4_162-94_69-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243937" version="1" comment="kgraft-patch-SLE12-SP3_Update_21 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243938" version="1" comment="kgraft-patch-4_4_156-94_64-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243939" version="1" comment="kgraft-patch-SLE12-SP3_Update_20 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243940" version="1" comment="kgraft-patch-4_4_162-94_72-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243941" version="1" comment="kgraft-patch-SLE12-SP3_Update_22 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243942" version="1" comment="kgraft-patch-4_4_114-94_11-default is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243943" version="1" comment="kgraft-patch-SLE12-SP3_Update_8 is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243944" version="1" comment="kgraft-patch-4_4_126-94_22-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243945" version="1" comment="kgraft-patch-SLE12-SP3_Update_11 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243946" version="1" comment="kgraft-patch-4_4_120-94_17-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243947" version="1" comment="kgraft-patch-SLE12-SP3_Update_10 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243948" version="1" comment="kgraft-patch-4_4_132-94_33-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243949" version="1" comment="kgraft-patch-SLE12-SP3_Update_13 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243950" version="1" comment="kgraft-patch-4_4_114-94_14-default is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243951" version="1" comment="kgraft-patch-SLE12-SP3_Update_9 is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243952" version="1" comment="kgraft-patch-4_4_131-94_29-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243953" version="1" comment="kgraft-patch-SLE12-SP3_Update_12 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243954" version="1" comment="kgraft-patch-4_4_140-94_42-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243955" version="1" comment="kgraft-patch-SLE12-SP3_Update_15 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243956" version="1" comment="kgraft-patch-4_4_138-94_39-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243957" version="1" comment="kgraft-patch-SLE12-SP3_Update_14 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243958" version="1" comment="kgraft-patch-4_4_156-94_57-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243959" version="1" comment="kgraft-patch-SLE12-SP3_Update_18 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243960" version="1" comment="kgraft-patch-4_4_156-94_61-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243961" version="1" comment="kgraft-patch-SLE12-SP3_Update_19 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243962" version="1" comment="kgraft-patch-4_4_143-94_47-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243963" version="1" comment="kgraft-patch-SLE12-SP3_Update_16 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243964" version="1" comment="kgraft-patch-4_4_155-94_50-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243965" version="1" comment="kgraft-patch-SLE12-SP3_Update_17 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245490" version="1" comment="kgraft-patch-4_4_175-94_79-default is &lt;1-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245491" version="1" comment="kgraft-patch-SLE12-SP3_Update_23 is &lt;1-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246277" version="1" comment="kgraft-patch-4_4_140-94_42-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246278" version="1" comment="kgraft-patch-SLE12-SP3_Update_15 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246279" version="1" comment="kgraft-patch-4_4_138-94_39-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246280" version="1" comment="kgraft-patch-SLE12-SP3_Update_14 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246281" version="1" comment="kgraft-patch-4_4_155-94_50-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246282" version="1" comment="kgraft-patch-SLE12-SP3_Update_17 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246283" version="1" comment="kgraft-patch-4_4_143-94_47-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246284" version="1" comment="kgraft-patch-SLE12-SP3_Update_16 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246285" version="1" comment="kgraft-patch-4_4_156-94_64-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246286" version="1" comment="kgraft-patch-SLE12-SP3_Update_20 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246287" version="1" comment="kgraft-patch-4_4_132-94_33-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246288" version="1" comment="kgraft-patch-SLE12-SP3_Update_13 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246289" version="1" comment="kgraft-patch-4_4_120-94_17-default is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246290" version="1" comment="kgraft-patch-SLE12-SP3_Update_10 is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246291" version="1" comment="kgraft-patch-4_4_126-94_22-default is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246292" version="1" comment="kgraft-patch-SLE12-SP3_Update_11 is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246293" version="1" comment="kgraft-patch-4_4_156-94_57-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246294" version="1" comment="kgraft-patch-SLE12-SP3_Update_18 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246295" version="1" comment="kgraft-patch-4_4_131-94_29-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246296" version="1" comment="kgraft-patch-SLE12-SP3_Update_12 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246297" version="1" comment="kgraft-patch-4_4_175-94_79-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246298" version="1" comment="kgraft-patch-SLE12-SP3_Update_23 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246299" version="1" comment="kgraft-patch-4_4_162-94_72-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246300" version="1" comment="kgraft-patch-SLE12-SP3_Update_22 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246301" version="1" comment="kgraft-patch-4_4_162-94_69-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246302" version="1" comment="kgraft-patch-SLE12-SP3_Update_21 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246303" version="1" comment="kgraft-patch-4_4_156-94_61-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246304" version="1" comment="kgraft-patch-SLE12-SP3_Update_19 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246552" version="1" comment="kgraft-patch-4_4_176-94_88-default is &lt;1-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246553" version="1" comment="kgraft-patch-SLE12-SP3_Update_24 is &lt;1-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241618" version="1" comment="kgraft-patch-4_12_14-95_3-default is &lt;1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241619" version="1" comment="kgraft-patch-SLE12-SP4_Update_1 is &lt;1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241620" version="1" comment="sle-live-patching-release is ==12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253466" version="1" comment="kgraft-patch-4_12_14-95_16-default is &lt;1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253467" version="1" comment="kgraft-patch-SLE12-SP4_Update_4 is &lt;1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257000" version="1" comment="kgraft-patch-4_12_14-95_19-default is &lt;1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257001" version="1" comment="kgraft-patch-SLE12-SP4_Update_5 is &lt;1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257856" version="1" comment="kgraft-patch-4_12_14-95_16-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257857" version="1" comment="kgraft-patch-SLE12-SP4_Update_4 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257858" version="1" comment="kgraft-patch-4_12_14-94_41-default is &lt;5-2.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257859" version="1" comment="kgraft-patch-SLE12-SP4_Update_0 is &lt;5-2.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257860" version="1" comment="kgraft-patch-4_12_14-95_3-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257861" version="1" comment="kgraft-patch-SLE12-SP4_Update_1 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257862" version="1" comment="kgraft-patch-4_12_14-95_13-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257863" version="1" comment="kgraft-patch-SLE12-SP4_Update_3 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257864" version="1" comment="kgraft-patch-4_12_14-95_6-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257865" version="1" comment="kgraft-patch-SLE12-SP4_Update_2 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259350" version="1" comment="kgraft-patch-4_12_14-95_24-default is &lt;1-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259351" version="1" comment="kgraft-patch-SLE12-SP4_Update_6 is &lt;1-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260418" version="1" comment="kgraft-patch-4_12_14-94_41-default is &lt;6-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260419" version="1" comment="kgraft-patch-SLE12-SP4_Update_0 is &lt;6-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260420" version="1" comment="kgraft-patch-4_12_14-95_3-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260421" version="1" comment="kgraft-patch-SLE12-SP4_Update_1 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260422" version="1" comment="kgraft-patch-4_12_14-95_6-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260423" version="1" comment="kgraft-patch-SLE12-SP4_Update_2 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260424" version="1" comment="kgraft-patch-4_12_14-95_13-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260425" version="1" comment="kgraft-patch-SLE12-SP4_Update_3 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260426" version="1" comment="kgraft-patch-4_12_14-95_16-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260427" version="1" comment="kgraft-patch-SLE12-SP4_Update_4 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260428" version="1" comment="kgraft-patch-4_12_14-95_19-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260429" version="1" comment="kgraft-patch-SLE12-SP4_Update_5 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243394" version="1" comment="kgraft-patch-4_12_14-95_6-default is &lt;1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243395" version="1" comment="kgraft-patch-SLE12-SP4_Update_2 is &lt;1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261275" version="1" comment="kgraft-patch-4_12_14-95_29-default is &lt;1-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261276" version="1" comment="kgraft-patch-SLE12-SP4_Update_7 is &lt;1-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265049" version="1" comment="kgraft-patch-4_12_14-95_32-default is &lt;1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265050" version="1" comment="kgraft-patch-SLE12-SP4_Update_8 is &lt;1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243966" version="1" comment="kgraft-patch-4_12_14-95_3-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243967" version="1" comment="kgraft-patch-SLE12-SP4_Update_1 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243968" version="1" comment="kgraft-patch-4_12_14-94_41-default is &lt;3-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243969" version="1" comment="kgraft-patch-SLE12-SP4_Update_0 is &lt;3-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246228" version="1" comment="kgraft-patch-4_12_14-94_41-default is &lt;4-2.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246229" version="1" comment="kgraft-patch-SLE12-SP4_Update_0 is &lt;4-2.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246230" version="1" comment="kgraft-patch-4_12_14-95_3-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246231" version="1" comment="kgraft-patch-SLE12-SP4_Update_1 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246232" version="1" comment="kgraft-patch-4_12_14-95_6-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246233" version="1" comment="kgraft-patch-SLE12-SP4_Update_2 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246305" version="1" comment="kgraft-patch-4_12_14-95_13-default is &lt;1-6.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246306" version="1" comment="kgraft-patch-SLE12-SP4_Update_3 is &lt;1-6.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189560" version="1" comment="puppet-server is &lt;3.8.5-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189561" version="1" comment="salt is &lt;2016.11.4-46.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189562" version="1" comment="salt-api is &lt;2016.11.4-46.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189563" version="1" comment="salt-bash-completion is &lt;2016.11.4-46.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189564" version="1" comment="salt-cloud is &lt;2016.11.4-46.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189565" version="1" comment="salt-doc is &lt;2016.11.4-46.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189566" version="1" comment="salt-master is &lt;2016.11.4-46.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189567" version="1" comment="salt-minion is &lt;2016.11.4-46.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189568" version="1" comment="salt-proxy is &lt;2016.11.4-46.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189569" version="1" comment="salt-ssh is &lt;2016.11.4-46.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189570" version="1" comment="salt-syndic is &lt;2016.11.4-46.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189571" version="1" comment="salt-zsh-completion is &lt;2016.11.4-46.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189572" version="1" comment="salt is &lt;2016.11.4-46.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189573" version="1" comment="salt-api is &lt;2016.11.4-46.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189574" version="1" comment="salt-bash-completion is &lt;2016.11.4-46.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189575" version="1" comment="salt-cloud is &lt;2016.11.4-46.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189576" version="1" comment="salt-doc is &lt;2016.11.4-46.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189577" version="1" comment="salt-master is &lt;2016.11.4-46.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189578" version="1" comment="salt-minion is &lt;2016.11.4-46.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189579" version="1" comment="salt-proxy is &lt;2016.11.4-46.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189580" version="1" comment="salt-ssh is &lt;2016.11.4-46.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189581" version="1" comment="salt-syndic is &lt;2016.11.4-46.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189582" version="1" comment="salt-zsh-completion is &lt;2016.11.4-46.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189583" version="1" comment="salt is &lt;2016.11.4-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189584" version="1" comment="salt-api is &lt;2016.11.4-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189585" version="1" comment="salt-bash-completion is &lt;2016.11.4-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189586" version="1" comment="salt-cloud is &lt;2016.11.4-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189587" version="1" comment="salt-doc is &lt;2016.11.4-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189588" version="1" comment="salt-master is &lt;2016.11.4-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189589" version="1" comment="salt-minion is &lt;2016.11.4-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189590" version="1" comment="salt-proxy is &lt;2016.11.4-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189591" version="1" comment="salt-ssh is &lt;2016.11.4-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189592" version="1" comment="salt-syndic is &lt;2016.11.4-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189593" version="1" comment="salt-zsh-completion is &lt;2016.11.4-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229278" version="1" comment="python2-salt is &lt;2018.3.0-46.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229279" version="1" comment="salt is &lt;2018.3.0-46.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229280" version="1" comment="salt-api is &lt;2018.3.0-46.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229281" version="1" comment="salt-bash-completion is &lt;2018.3.0-46.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229282" version="1" comment="salt-cloud is &lt;2018.3.0-46.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229283" version="1" comment="salt-doc is &lt;2018.3.0-46.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229284" version="1" comment="salt-master is &lt;2018.3.0-46.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229285" version="1" comment="salt-minion is &lt;2018.3.0-46.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229286" version="1" comment="salt-proxy is &lt;2018.3.0-46.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229287" version="1" comment="salt-ssh is &lt;2018.3.0-46.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229288" version="1" comment="salt-syndic is &lt;2018.3.0-46.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229289" version="1" comment="salt-zsh-completion is &lt;2018.3.0-46.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240603" version="1" comment="python2-salt is &lt;2018.3.0-46.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240604" version="1" comment="salt is &lt;2018.3.0-46.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240605" version="1" comment="salt-api is &lt;2018.3.0-46.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240606" version="1" comment="salt-bash-completion is &lt;2018.3.0-46.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240607" version="1" comment="salt-cloud is &lt;2018.3.0-46.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240608" version="1" comment="salt-doc is &lt;2018.3.0-46.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240609" version="1" comment="salt-master is &lt;2018.3.0-46.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240610" version="1" comment="salt-minion is &lt;2018.3.0-46.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240611" version="1" comment="salt-proxy is &lt;2018.3.0-46.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240612" version="1" comment="salt-ssh is &lt;2018.3.0-46.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240613" version="1" comment="salt-syndic is &lt;2018.3.0-46.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240614" version="1" comment="salt-zsh-completion is &lt;2018.3.0-46.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189594" version="1" comment="puppet-server is &lt;3.8.5-15.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189595" version="1" comment="ruby2.1-rubygem-puppet is &lt;4.8.1-32.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189596" version="1" comment="rubygem-puppet is &lt;4.8.1-32.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254051" version="1" comment="python-Jinja2 is &lt;2.8-19.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254052" version="1" comment="python3-Jinja2 is &lt;2.8-19.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189597" version="1" comment="ruby2.1-rubygem-passenger is &lt;5.0.18-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189598" version="1" comment="rubygem-passenger is &lt;5.0.18-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189599" version="1" comment="rubygem-passenger-apache2 is &lt;5.0.18-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189600" version="1" comment="python-setuptools is &lt;1.1.7-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189601" version="1" comment="docker is &lt;1.8.3-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189602" version="1" comment="ruby2.1-rubygem-rack-1_4 is &lt;1.4.5-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189603" version="1" comment="rubygem-rack-1_4 is &lt;1.4.5-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130756" version="1" comment="sles12-docker-image is &lt;1.1.2-20160727" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130757" version="1" comment="sles12sp1-docker-image is &lt;1.0.5-20160727" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189604" version="1" comment="containerd is &lt;0.2.4+gitr565_0366d7e-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189605" version="1" comment="docker is &lt;1.12.3-81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189606" version="1" comment="ruby2.1-rubygem-docker-api is &lt;1.31.0-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189607" version="1" comment="ruby2.1-rubygem-excon is &lt;0.52.0-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189608" version="1" comment="rubygem-docker-api is &lt;1.31.0-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189609" version="1" comment="rubygem-excon is &lt;0.52.0-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189610" version="1" comment="runc is &lt;0.1.1+gitr2816_02f8fa7-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124724" version="1" comment="sles12sp1-docker-image is &lt;1.0.4-20160308170633" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124735" version="1" comment="sles11sp4-docker-image is &lt;1.1.1-20160304104123" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124812" version="1" comment="sles12-docker-image is &lt;1.1.1-20160307082632" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189611" version="1" comment="portus is &lt;2.0.3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189612" version="1" comment="docker is &lt;1.10.3-66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189613" version="1" comment="portus is &lt;2.2.0-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165174" version="1" comment="sles12-docker-image is &lt;1.1.4-20171002" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165175" version="1" comment="sles12sp1-docker-image is &lt;1.0.7-20171002" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189614" version="1" comment="containerd is &lt;0.2.5+gitr569_2a5e70c-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189615" version="1" comment="docker is &lt;1.12.6-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189616" version="1" comment="runc is &lt;0.1.1+gitr2819_50a19c6-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230536" version="1" comment="ruby2.1-rubygem-passenger is &lt;5.0.18-12.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230537" version="1" comment="rubygem-passenger is &lt;5.0.18-12.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230538" version="1" comment="rubygem-passenger-apache2 is &lt;5.0.18-12.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233304" version="1" comment="sles12sp2-docker-image is &lt;1.0.2-20180821" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189617" version="1" comment="ruby2.1-rubygem-passenger is &lt;5.0.18-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189618" version="1" comment="rubygem-passenger is &lt;5.0.18-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189619" version="1" comment="rubygem-passenger-apache2 is &lt;5.0.18-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189620" version="1" comment="containerd is &lt;0.2.9+gitr706_06b9cb351610-16.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189621" version="1" comment="docker is &lt;17.09.1_ce-98.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189622" version="1" comment="docker-libnetwork is &lt;0.7.0.1+gitr2066_7b2b1feb1de4-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189623" version="1" comment="docker-runc is &lt;1.0.0rc4+gitr3338_3f2f8b84a77f-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189624" version="1" comment="golang-github-docker-libnetwork is &lt;0.7.0.1+gitr2066_7b2b1feb1de4-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189625" version="1" comment="docker-distribution is &lt;2.6.2-13.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189626" version="1" comment="docker-distribution-registry is &lt;2.6.2-13.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253646" version="1" comment="containerd is &lt;1.2.5-16.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253647" version="1" comment="docker is &lt;18.09.6_ce-98.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253648" version="1" comment="docker-libnetwork is &lt;0.7.0.1+gitr2726_872f0a83c98a-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253649" version="1" comment="docker-runc is &lt;1.0.0rc6+gitr3804_2b18fe1d885e-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253650" version="1" comment="golang-github-docker-libnetwork is &lt;0.7.0.1+gitr2726_872f0a83c98a-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254459" version="1" comment="suse-sles12sp3-image is &lt;2.0.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256806" version="1" comment="docker is &lt;18.09.6_ce-98.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261461" version="1" comment="containerd is &lt;1.2.6-16.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261462" version="1" comment="docker is &lt;19.03.1_ce-98.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261463" version="1" comment="docker-libnetwork is &lt;0.7.0.1+gitr2800_fc5a7d91d54c-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261464" version="1" comment="docker-runc is &lt;1.0.0rc8+gitr3826_425e105d5a03-1.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261465" version="1" comment="golang-github-docker-libnetwork is &lt;0.7.0.1+gitr2800_fc5a7d91d54c-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244200" version="1" comment="docker-runc is &lt;1.0.0rc5+gitr3562_69663f0bd4b6-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245649" version="1" comment="containerd is &lt;1.2.2-16.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245650" version="1" comment="docker is &lt;18.09.1_ce-98.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245651" version="1" comment="docker-libnetwork is &lt;0.7.0.1+gitr2711_2cfbf9b1f981-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245652" version="1" comment="docker-runc is &lt;1.0.0rc6+gitr3748_96ec2177ae84-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245653" version="1" comment="golang-github-docker-libnetwork is &lt;0.7.0.1+gitr2711_2cfbf9b1f981-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189627" version="1" comment="libpmi0 is &lt;17.02.9-6.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189628" version="1" comment="libslurm29 is &lt;16.05.8.1-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189629" version="1" comment="libslurm31 is &lt;17.02.9-6.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189630" version="1" comment="pdsh is &lt;2.33-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189631" version="1" comment="perl-slurm is &lt;17.02.9-6.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189632" version="1" comment="slurm is &lt;17.02.9-6.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189633" version="1" comment="slurm-auth-none is &lt;17.02.9-6.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189634" version="1" comment="slurm-devel is &lt;17.02.9-6.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189635" version="1" comment="slurm-doc is &lt;17.02.9-6.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189636" version="1" comment="slurm-lua is &lt;17.02.9-6.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189637" version="1" comment="slurm-munge is &lt;17.02.9-6.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189638" version="1" comment="slurm-pam_slurm is &lt;17.02.9-6.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189639" version="1" comment="slurm-plugins is &lt;17.02.9-6.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189640" version="1" comment="slurm-sched-wiki is &lt;17.02.9-6.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189641" version="1" comment="slurm-slurmdb-direct is &lt;17.02.9-6.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189642" version="1" comment="slurm-slurmdbd is &lt;17.02.9-6.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189643" version="1" comment="slurm-sql is &lt;17.02.9-6.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189644" version="1" comment="slurm-torque is &lt;17.02.9-6.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189645" version="1" comment="slurmlibs is &lt;16.05.8.1-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223369" version="1" comment="libpmi0 is &lt;17.02.11-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223370" version="1" comment="libslurm31 is &lt;17.02.11-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223371" version="1" comment="perl-slurm is &lt;17.02.11-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223372" version="1" comment="slurm is &lt;17.02.11-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223373" version="1" comment="slurm-auth-none is &lt;17.02.11-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223374" version="1" comment="slurm-config is &lt;17.02.11-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223375" version="1" comment="slurm-devel is &lt;17.02.11-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223376" version="1" comment="slurm-doc is &lt;17.02.11-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223377" version="1" comment="slurm-lua is &lt;17.02.11-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223378" version="1" comment="slurm-munge is &lt;17.02.11-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223379" version="1" comment="slurm-pam_slurm is &lt;17.02.11-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223380" version="1" comment="slurm-plugins is &lt;17.02.11-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223381" version="1" comment="slurm-sched-wiki is &lt;17.02.11-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223382" version="1" comment="slurm-slurmdb-direct is &lt;17.02.11-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223383" version="1" comment="slurm-slurmdbd is &lt;17.02.11-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223384" version="1" comment="slurm-sql is &lt;17.02.11-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223385" version="1" comment="slurm-torque is &lt;17.02.11-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189646" version="1" comment="libpmi0 is &lt;17.02.10-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189647" version="1" comment="libslurm31 is &lt;17.02.10-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189648" version="1" comment="perl-slurm is &lt;17.02.10-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189649" version="1" comment="slurm is &lt;17.02.10-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189650" version="1" comment="slurm-auth-none is &lt;17.02.10-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189651" version="1" comment="slurm-devel is &lt;17.02.10-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189652" version="1" comment="slurm-doc is &lt;17.02.10-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189653" version="1" comment="slurm-lua is &lt;17.02.10-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189654" version="1" comment="slurm-munge is &lt;17.02.10-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189655" version="1" comment="slurm-pam_slurm is &lt;17.02.10-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189656" version="1" comment="slurm-plugins is &lt;17.02.10-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189657" version="1" comment="slurm-sched-wiki is &lt;17.02.10-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189658" version="1" comment="slurm-slurmdb-direct is &lt;17.02.10-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189659" version="1" comment="slurm-slurmdbd is &lt;17.02.10-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189660" version="1" comment="slurm-sql is &lt;17.02.10-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189661" version="1" comment="slurm-torque is &lt;17.02.10-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244815" version="1" comment="python-numpy_1_13_3-gnu-hpc is &lt;1.13.3-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244816" version="1" comment="python-numpy_1_13_3-gnu-hpc-devel is &lt;1.13.3-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244817" version="1" comment="python2-numpy-gnu-hpc is &lt;1.13.3-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244818" version="1" comment="python2-numpy-gnu-hpc-devel is &lt;1.13.3-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244819" version="1" comment="python3-numpy-gnu-hpc is &lt;1.13.3-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244820" version="1" comment="python3-numpy-gnu-hpc-devel is &lt;1.13.3-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244821" version="1" comment="python3-numpy_1_13_3-gnu-hpc is &lt;1.13.3-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244822" version="1" comment="python3-numpy_1_13_3-gnu-hpc-devel is &lt;1.13.3-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189662" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189663" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189664" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189665" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189666" version="1" comment="cups154 is &lt;1.5.4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189667" version="1" comment="cups154-client is &lt;1.5.4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189668" version="1" comment="cups154-filters is &lt;1.5.4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189669" version="1" comment="cups154-libs is &lt;1.5.4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189670" version="1" comment="cups154 is &lt;1.5.4-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189671" version="1" comment="cups154-client is &lt;1.5.4-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189672" version="1" comment="cups154-filters is &lt;1.5.4-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189673" version="1" comment="cups154-libs is &lt;1.5.4-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189674" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189675" version="1" comment="openldap2 is &lt;2.4.39-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189676" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.4-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189677" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.4-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189678" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.4-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189679" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.4-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189680" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.7-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189681" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.7-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189682" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.7-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189683" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.7-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189684" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.3-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189685" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.3-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189686" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.3-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189687" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.3-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189688" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.15-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189689" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.15-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189690" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.15-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189691" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.15-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189692" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-18.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189693" version="1" comment="openldap2 is &lt;2.4.41-18.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189694" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.30-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189695" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.30-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189696" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.30-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189697" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.30-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189698" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.35-43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189699" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.35-43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189700" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.35-43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189701" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.35-43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189702" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.20-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189703" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.20-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189704" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.20-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189705" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.20-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189706" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.25-34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189707" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.25-34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189708" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.25-34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189709" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.25-34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189710" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.26-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189711" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.26-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189712" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.26-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189713" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.26-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189714" version="1" comment="compat-libgcrypt11 is &lt;1.5.0-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189715" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.50-50.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189716" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.50-50.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189717" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.50-50.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189718" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.50-50.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189719" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.41-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189720" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.41-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189721" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.41-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189722" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.41-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189723" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.45-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189724" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.45-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189725" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.45-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189726" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.45-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257866" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-106.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247546" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-18.24.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247547" version="1" comment="openldap2 is &lt;2.4.41-18.24.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189727" version="1" comment="kernel-ec2 is &lt;3.12.38-44" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189728" version="1" comment="kernel-ec2-devel is &lt;3.12.38-44" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189729" version="1" comment="kernel-ec2-extra is &lt;3.12.38-44" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189730" version="1" comment="kernel-ec2 is &lt;3.12.39-47" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189731" version="1" comment="kernel-ec2-devel is &lt;3.12.39-47" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189732" version="1" comment="kernel-ec2-extra is &lt;3.12.39-47" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189733" version="1" comment="kernel-ec2 is &lt;3.12.32-33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189734" version="1" comment="kernel-ec2-devel is &lt;3.12.32-33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189735" version="1" comment="kernel-ec2-extra is &lt;3.12.32-33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189736" version="1" comment="kernel-ec2 is &lt;3.12.43-52.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189737" version="1" comment="kernel-ec2-devel is &lt;3.12.43-52.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189738" version="1" comment="kernel-ec2-extra is &lt;3.12.43-52.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189739" version="1" comment="kernel-ec2 is &lt;3.12.44-52.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189740" version="1" comment="kernel-ec2-devel is &lt;3.12.44-52.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189741" version="1" comment="kernel-ec2-extra is &lt;3.12.44-52.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189742" version="1" comment="kernel-ec2 is &lt;3.12.36-38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189743" version="1" comment="kernel-ec2-devel is &lt;3.12.36-38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189744" version="1" comment="kernel-ec2-extra is &lt;3.12.36-38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189745" version="1" comment="kernel-ec2 is &lt;3.12.44-52.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189746" version="1" comment="kernel-ec2-devel is &lt;3.12.44-52.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189747" version="1" comment="kernel-ec2-extra is &lt;3.12.44-52.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189748" version="1" comment="kernel-ec2 is &lt;3.12.48-52.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189749" version="1" comment="kernel-ec2-devel is &lt;3.12.48-52.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189750" version="1" comment="kernel-ec2-extra is &lt;3.12.48-52.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189751" version="1" comment="kernel-ec2 is &lt;3.12.51-52.31" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189752" version="1" comment="kernel-ec2-devel is &lt;3.12.51-52.31" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189753" version="1" comment="kernel-ec2-extra is &lt;3.12.51-52.31" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189754" version="1" comment="kernel-ec2 is &lt;3.12.51-60.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189755" version="1" comment="kernel-ec2-devel is &lt;3.12.51-60.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189756" version="1" comment="kernel-ec2-extra is &lt;3.12.51-60.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189757" version="1" comment="kernel-ec2 is &lt;3.12.60-52.49" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189758" version="1" comment="kernel-ec2-devel is &lt;3.12.60-52.49" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189759" version="1" comment="kernel-ec2-extra is &lt;3.12.60-52.49" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189760" version="1" comment="kernel-ec2 is &lt;3.12.59-60.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189761" version="1" comment="kernel-ec2-devel is &lt;3.12.59-60.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189762" version="1" comment="kernel-ec2-extra is &lt;3.12.59-60.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189763" version="1" comment="kernel-ec2 is &lt;3.12.59-60.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189764" version="1" comment="kernel-ec2-devel is &lt;3.12.59-60.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189765" version="1" comment="kernel-ec2-extra is &lt;3.12.59-60.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189766" version="1" comment="kernel-ec2 is &lt;3.12.60-52.54" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189767" version="1" comment="kernel-ec2-devel is &lt;3.12.60-52.54" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189768" version="1" comment="kernel-ec2-extra is &lt;3.12.60-52.54" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189769" version="1" comment="kernel-ec2 is &lt;3.12.51-52.34" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189770" version="1" comment="kernel-ec2-devel is &lt;3.12.51-52.34" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189771" version="1" comment="kernel-ec2-extra is &lt;3.12.51-52.34" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189772" version="1" comment="kernel-ec2 is &lt;3.12.51-60.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189773" version="1" comment="kernel-ec2-devel is &lt;3.12.51-60.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189774" version="1" comment="kernel-ec2-extra is &lt;3.12.51-60.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189775" version="1" comment="kernel-ec2 is &lt;3.12.62-60.62" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189776" version="1" comment="kernel-ec2-devel is &lt;3.12.62-60.62" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189777" version="1" comment="kernel-ec2-extra is &lt;3.12.62-60.62" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189778" version="1" comment="kernel-ec2 is &lt;3.12.51-52.39" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189779" version="1" comment="kernel-ec2-devel is &lt;3.12.51-52.39" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189780" version="1" comment="kernel-ec2-extra is &lt;3.12.51-52.39" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189781" version="1" comment="kernel-ec2 is &lt;3.12.62-60.64.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189782" version="1" comment="kernel-ec2-devel is &lt;3.12.62-60.64.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189783" version="1" comment="kernel-ec2-extra is &lt;3.12.62-60.64.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189784" version="1" comment="kernel-ec2 is &lt;3.12.60-52.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189785" version="1" comment="kernel-ec2-devel is &lt;3.12.60-52.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189786" version="1" comment="kernel-ec2-extra is &lt;3.12.60-52.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189787" version="1" comment="kernel-ec2 is &lt;3.12.67-60.64.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189788" version="1" comment="kernel-ec2-devel is &lt;3.12.67-60.64.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189789" version="1" comment="kernel-ec2-extra is &lt;3.12.67-60.64.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189790" version="1" comment="kernel-ec2 is &lt;3.12.67-60.64.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189791" version="1" comment="kernel-ec2-devel is &lt;3.12.67-60.64.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189792" version="1" comment="kernel-ec2-extra is &lt;3.12.67-60.64.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189793" version="1" comment="kernel-ec2 is &lt;3.12.60-52.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189794" version="1" comment="kernel-ec2-devel is &lt;3.12.60-52.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189795" version="1" comment="kernel-ec2-extra is &lt;3.12.60-52.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189796" version="1" comment="kernel-ec2 is &lt;3.12.67-60.64.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189797" version="1" comment="kernel-ec2-devel is &lt;3.12.67-60.64.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189798" version="1" comment="kernel-ec2-extra is &lt;3.12.67-60.64.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189799" version="1" comment="kernel-ec2 is &lt;3.12.60-52.63" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189800" version="1" comment="kernel-ec2-devel is &lt;3.12.60-52.63" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189801" version="1" comment="kernel-ec2-extra is &lt;3.12.60-52.63" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189802" version="1" comment="kernel-ec2 is &lt;3.12.53-60.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189803" version="1" comment="kernel-ec2-devel is &lt;3.12.53-60.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189804" version="1" comment="kernel-ec2-extra is &lt;3.12.53-60.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189805" version="1" comment="kernel-ec2 is &lt;3.12.55-52.42" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189806" version="1" comment="kernel-ec2-devel is &lt;3.12.55-52.42" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189807" version="1" comment="kernel-ec2-extra is &lt;3.12.55-52.42" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189808" version="1" comment="kernel-ec2 is &lt;3.12.57-60.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189809" version="1" comment="kernel-ec2-devel is &lt;3.12.57-60.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189810" version="1" comment="kernel-ec2-extra is &lt;3.12.57-60.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189811" version="1" comment="python-rsa is &lt;3.1.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189812" version="1" comment="kernel-ec2 is &lt;3.12.55-52.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189813" version="1" comment="kernel-ec2-devel is &lt;3.12.55-52.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189814" version="1" comment="kernel-ec2-extra is &lt;3.12.55-52.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189815" version="1" comment="kernel-ec2 is &lt;3.12.74-60.64.48" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189816" version="1" comment="kernel-ec2-devel is &lt;3.12.74-60.64.48" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189817" version="1" comment="kernel-ec2-extra is &lt;3.12.74-60.64.48" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189818" version="1" comment="kernel-ec2 is &lt;3.12.61-52.80" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189819" version="1" comment="kernel-ec2-devel is &lt;3.12.61-52.80" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189820" version="1" comment="kernel-ec2-extra is &lt;3.12.61-52.80" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189821" version="1" comment="kernel-ec2 is &lt;3.12.74-60.64.51" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189822" version="1" comment="kernel-ec2-devel is &lt;3.12.74-60.64.51" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189823" version="1" comment="kernel-ec2-extra is &lt;3.12.74-60.64.51" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189824" version="1" comment="kernel-ec2 is &lt;3.12.61-52.83" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189825" version="1" comment="kernel-ec2-devel is &lt;3.12.61-52.83" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189826" version="1" comment="kernel-ec2-extra is &lt;3.12.61-52.83" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189827" version="1" comment="python-tablib is &lt;0.9.11-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189828" version="1" comment="kernel-ec2 is &lt;3.12.61-52.86" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189829" version="1" comment="kernel-ec2-devel is &lt;3.12.61-52.86" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189830" version="1" comment="kernel-ec2-extra is &lt;3.12.61-52.86" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189831" version="1" comment="kernel-ec2 is &lt;3.12.74-60.64.54" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189832" version="1" comment="kernel-ec2-devel is &lt;3.12.74-60.64.54" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189833" version="1" comment="kernel-ec2-extra is &lt;3.12.74-60.64.54" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189834" version="1" comment="python-paramiko is &lt;1.15.2-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189835" version="1" comment="kernel-ec2 is &lt;3.12.74-60.64.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189836" version="1" comment="kernel-ec2-devel is &lt;3.12.74-60.64.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189837" version="1" comment="kernel-ec2-extra is &lt;3.12.74-60.64.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189838" version="1" comment="kernel-ec2 is &lt;3.12.61-52.92" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189839" version="1" comment="kernel-ec2-devel is &lt;3.12.61-52.92" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189840" version="1" comment="kernel-ec2-extra is &lt;3.12.61-52.92" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189841" version="1" comment="kernel-ec2 is &lt;3.12.74-60.64.63" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189842" version="1" comment="kernel-ec2-devel is &lt;3.12.74-60.64.63" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189843" version="1" comment="kernel-ec2-extra is &lt;3.12.74-60.64.63" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189844" version="1" comment="kernel-ec2 is &lt;3.12.61-52.101" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189845" version="1" comment="kernel-ec2-devel is &lt;3.12.61-52.101" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189846" version="1" comment="kernel-ec2-extra is &lt;3.12.61-52.101" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189847" version="1" comment="kernel-ec2 is &lt;3.12.74-60.64.66" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189848" version="1" comment="kernel-ec2-devel is &lt;3.12.74-60.64.66" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189849" version="1" comment="kernel-ec2-extra is &lt;3.12.74-60.64.66" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189850" version="1" comment="kernel-ec2 is &lt;3.12.61-52.106" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189851" version="1" comment="kernel-ec2-devel is &lt;3.12.61-52.106" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189852" version="1" comment="kernel-ec2-extra is &lt;3.12.61-52.106" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189853" version="1" comment="python-PyJWT is &lt;1.4.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189854" version="1" comment="kernel-ec2 is &lt;3.12.69-60.64.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189855" version="1" comment="kernel-ec2-devel is &lt;3.12.69-60.64.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189856" version="1" comment="kernel-ec2-extra is &lt;3.12.69-60.64.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189857" version="1" comment="kernel-ec2 is &lt;3.12.61-52.66" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189858" version="1" comment="kernel-ec2-devel is &lt;3.12.61-52.66" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189859" version="1" comment="kernel-ec2-extra is &lt;3.12.61-52.66" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189860" version="1" comment="kernel-ec2 is &lt;3.12.69-60.64.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189861" version="1" comment="kernel-ec2-devel is &lt;3.12.69-60.64.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189862" version="1" comment="kernel-ec2-extra is &lt;3.12.69-60.64.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189863" version="1" comment="kernel-ec2 is &lt;3.12.69-60.64.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189864" version="1" comment="kernel-ec2-devel is &lt;3.12.69-60.64.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189865" version="1" comment="kernel-ec2-extra is &lt;3.12.69-60.64.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189866" version="1" comment="kernel-ec2 is &lt;3.12.61-52.69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189867" version="1" comment="kernel-ec2-devel is &lt;3.12.61-52.69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189868" version="1" comment="kernel-ec2-extra is &lt;3.12.61-52.69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189869" version="1" comment="kernel-ec2 is &lt;3.12.61-52.72" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189870" version="1" comment="kernel-ec2-devel is &lt;3.12.61-52.72" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189871" version="1" comment="kernel-ec2-extra is &lt;3.12.61-52.72" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189872" version="1" comment="kernel-ec2 is &lt;3.12.74-60.64.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189873" version="1" comment="kernel-ec2-devel is &lt;3.12.74-60.64.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189874" version="1" comment="kernel-ec2-extra is &lt;3.12.74-60.64.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189875" version="1" comment="kernel-ec2 is &lt;3.12.61-52.77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189876" version="1" comment="kernel-ec2-devel is &lt;3.12.61-52.77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189877" version="1" comment="kernel-ec2-extra is &lt;3.12.61-52.77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189878" version="1" comment="kernel-ec2 is &lt;3.12.74-60.64.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189879" version="1" comment="kernel-ec2-devel is &lt;3.12.74-60.64.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189880" version="1" comment="kernel-ec2-extra is &lt;3.12.74-60.64.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229290" version="1" comment="kernel-ec2 is &lt;3.12.74-60.64.96" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229291" version="1" comment="kernel-ec2-devel is &lt;3.12.74-60.64.96" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229292" version="1" comment="kernel-ec2-extra is &lt;3.12.74-60.64.96" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229293" version="1" comment="kernel-ec2 is &lt;3.12.61-52.136" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229294" version="1" comment="kernel-ec2-devel is &lt;3.12.61-52.136" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229295" version="1" comment="kernel-ec2-extra is &lt;3.12.61-52.136" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230325" version="1" comment="python-paramiko is &lt;1.15.2-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230631" version="1" comment="python-dulwich is &lt;0.18.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232455" version="1" comment="kernel-ec2 is &lt;3.12.61-52.141" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232456" version="1" comment="kernel-ec2-devel is &lt;3.12.61-52.141" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232457" version="1" comment="kernel-ec2-extra is &lt;3.12.61-52.141" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232458" version="1" comment="kernel-ec2 is &lt;3.12.74-60.64.99" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232459" version="1" comment="kernel-ec2-devel is &lt;3.12.74-60.64.99" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232460" version="1" comment="kernel-ec2-extra is &lt;3.12.74-60.64.99" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234965" version="1" comment="python-paramiko is &lt;1.18.5-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235518" version="1" comment="perl-File-Touch is &lt;0.11-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235519" version="1" comment="smt is &lt;3.0.37-52.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235520" version="1" comment="smt-ha is &lt;3.0.37-52.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235521" version="1" comment="kernel-ec2 is &lt;3.12.74-60.64.104" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235522" version="1" comment="kernel-ec2-devel is &lt;3.12.74-60.64.104" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235523" version="1" comment="kernel-ec2-extra is &lt;3.12.74-60.64.104" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236308" version="1" comment="kernel-ec2 is &lt;3.12.74-60.64.107" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236309" version="1" comment="kernel-ec2-devel is &lt;3.12.74-60.64.107" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236310" version="1" comment="kernel-ec2-extra is &lt;3.12.74-60.64.107" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236777" version="1" comment="kernel-ec2 is &lt;3.12.61-52.146" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236778" version="1" comment="kernel-ec2-devel is &lt;3.12.61-52.146" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236779" version="1" comment="kernel-ec2-extra is &lt;3.12.61-52.146" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189881" version="1" comment="kernel-ec2 is &lt;3.12.74-60.64.69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189882" version="1" comment="kernel-ec2-devel is &lt;3.12.74-60.64.69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189883" version="1" comment="kernel-ec2-extra is &lt;3.12.74-60.64.69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238154" version="1" comment="smt-ha is &lt;3.0.38-52.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189884" version="1" comment="kernel-ec2 is &lt;3.12.61-52.119" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189885" version="1" comment="kernel-ec2-devel is &lt;3.12.61-52.119" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189886" version="1" comment="kernel-ec2-extra is &lt;3.12.61-52.119" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189887" version="1" comment="kernel-ec2 is &lt;3.12.74-60.64.82" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189888" version="1" comment="kernel-ec2-devel is &lt;3.12.74-60.64.82" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189889" version="1" comment="kernel-ec2-extra is &lt;3.12.74-60.64.82" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189890" version="1" comment="kernel-ec2 is &lt;3.12.61-52.125" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189891" version="1" comment="kernel-ec2-devel is &lt;3.12.61-52.125" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189892" version="1" comment="kernel-ec2-extra is &lt;3.12.61-52.125" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189893" version="1" comment="kernel-ec2 is &lt;3.12.74-60.64.85" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189894" version="1" comment="kernel-ec2-devel is &lt;3.12.74-60.64.85" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189895" version="1" comment="kernel-ec2-extra is &lt;3.12.74-60.64.85" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189896" version="1" comment="kernel-ec2 is &lt;3.12.61-52.111" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189897" version="1" comment="kernel-ec2-devel is &lt;3.12.61-52.111" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189898" version="1" comment="kernel-ec2-extra is &lt;3.12.61-52.111" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189899" version="1" comment="kernel-ec2 is &lt;3.12.61-52.128" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189900" version="1" comment="kernel-ec2-devel is &lt;3.12.61-52.128" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189901" version="1" comment="kernel-ec2-extra is &lt;3.12.61-52.128" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189902" version="1" comment="kernel-ec2 is &lt;3.12.74-60.64.88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189903" version="1" comment="kernel-ec2-devel is &lt;3.12.74-60.64.88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189904" version="1" comment="kernel-ec2-extra is &lt;3.12.74-60.64.88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189905" version="1" comment="kernel-ec2 is &lt;3.12.74-60.64.93" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189906" version="1" comment="kernel-ec2-devel is &lt;3.12.74-60.64.93" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189907" version="1" comment="kernel-ec2-extra is &lt;3.12.74-60.64.93" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189908" version="1" comment="kernel-ec2 is &lt;3.12.61-52.133" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189909" version="1" comment="kernel-ec2-devel is &lt;3.12.61-52.133" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189910" version="1" comment="kernel-ec2-extra is &lt;3.12.61-52.133" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253790" version="1" comment="kernel-ec2 is &lt;3.12.61-52.149" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253791" version="1" comment="kernel-ec2-devel is &lt;3.12.61-52.149" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253792" version="1" comment="kernel-ec2-extra is &lt;3.12.61-52.149" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253793" version="1" comment="kernel-ec2 is &lt;3.12.74-60.64.110" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253794" version="1" comment="kernel-ec2-devel is &lt;3.12.74-60.64.110" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253795" version="1" comment="kernel-ec2-extra is &lt;3.12.74-60.64.110" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243254" version="1" comment="python-urllib3 is &lt;1.22-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253152" version="1" comment="python3-urllib3 is &lt;1.22-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257002" version="1" comment="kernel-ec2 is &lt;3.12.74-60.64.115" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257003" version="1" comment="kernel-ec2-devel is &lt;3.12.74-60.64.115" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257004" version="1" comment="kernel-ec2-extra is &lt;3.12.74-60.64.115" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258052" version="1" comment="kernel-ec2 is &lt;3.12.61-52.154" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258053" version="1" comment="kernel-ec2-devel is &lt;3.12.61-52.154" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258054" version="1" comment="kernel-ec2-extra is &lt;3.12.61-52.154" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259417" version="1" comment="kernel-ec2 is &lt;3.12.74-60.64.118" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259418" version="1" comment="kernel-ec2-devel is &lt;3.12.74-60.64.118" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259419" version="1" comment="kernel-ec2-extra is &lt;3.12.74-60.64.118" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263262" version="1" comment="kernel-ec2 is &lt;3.12.74-60.64.121" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263263" version="1" comment="kernel-ec2-devel is &lt;3.12.74-60.64.121" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263264" version="1" comment="kernel-ec2-extra is &lt;3.12.74-60.64.121" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264558" version="1" comment="python-urllib3 is &lt;1.22-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264559" version="1" comment="python3-urllib3 is &lt;1.22-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189911" version="1" comment="gcc5-32bit is &lt;5.3.1+r233831-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189912" version="1" comment="gcc5-ada is &lt;5.3.1+r233831-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189913" version="1" comment="gcc5-ada-32bit is &lt;5.3.1+r233831-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189914" version="1" comment="gcc5-c++-32bit is &lt;5.3.1+r233831-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189915" version="1" comment="gcc5-fortran-32bit is &lt;5.3.1+r233831-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189916" version="1" comment="libada5 is &lt;5.3.1+r233831-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189917" version="1" comment="libada5-32bit is &lt;5.3.1+r233831-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189918" version="1" comment="libffi-devel-gcc5-32bit is &lt;5.3.1+r233831-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189919" version="1" comment="libstdc++6-devel-gcc5-32bit is &lt;5.3.1+r233831-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189920" version="1" comment="apache2-mod_php5 is &lt;5.5.14-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189921" version="1" comment="php5 is &lt;5.5.14-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189922" version="1" comment="php5-bcmath is &lt;5.5.14-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189923" version="1" comment="php5-bz2 is &lt;5.5.14-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189924" version="1" comment="php5-calendar is &lt;5.5.14-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189925" version="1" comment="php5-ctype is &lt;5.5.14-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189926" version="1" comment="php5-curl is &lt;5.5.14-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189927" version="1" comment="php5-dba is &lt;5.5.14-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189928" version="1" comment="php5-dom is &lt;5.5.14-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189929" version="1" comment="php5-enchant is &lt;5.5.14-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189930" version="1" comment="php5-exif is &lt;5.5.14-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189931" version="1" comment="php5-fastcgi is &lt;5.5.14-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189932" version="1" comment="php5-fileinfo is &lt;5.5.14-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189933" version="1" comment="php5-fpm is &lt;5.5.14-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189934" version="1" comment="php5-ftp is &lt;5.5.14-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189935" version="1" comment="php5-gd is &lt;5.5.14-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189936" version="1" comment="php5-gettext is &lt;5.5.14-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189937" version="1" comment="php5-gmp is &lt;5.5.14-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189938" version="1" comment="php5-iconv is &lt;5.5.14-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189939" version="1" comment="php5-intl is &lt;5.5.14-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189940" version="1" comment="php5-json is &lt;5.5.14-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189941" version="1" comment="php5-ldap is &lt;5.5.14-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189942" version="1" comment="php5-mbstring is &lt;5.5.14-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189943" version="1" comment="php5-mcrypt is &lt;5.5.14-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189944" version="1" comment="php5-mysql is &lt;5.5.14-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189945" version="1" comment="php5-odbc is &lt;5.5.14-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189946" version="1" comment="php5-openssl is &lt;5.5.14-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189947" version="1" comment="php5-pcntl is &lt;5.5.14-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189948" version="1" comment="php5-pdo is &lt;5.5.14-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189949" version="1" comment="php5-pear is &lt;5.5.14-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189950" version="1" comment="php5-pgsql is &lt;5.5.14-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189951" version="1" comment="php5-pspell is &lt;5.5.14-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189952" version="1" comment="php5-shmop is &lt;5.5.14-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189953" version="1" comment="php5-snmp is &lt;5.5.14-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189954" version="1" comment="php5-soap is &lt;5.5.14-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189955" version="1" comment="php5-sockets is &lt;5.5.14-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189956" version="1" comment="php5-sqlite is &lt;5.5.14-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189957" version="1" comment="php5-suhosin is &lt;5.5.14-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189958" version="1" comment="php5-sysvmsg is &lt;5.5.14-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189959" version="1" comment="php5-sysvsem is &lt;5.5.14-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189960" version="1" comment="php5-sysvshm is &lt;5.5.14-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189961" version="1" comment="php5-tokenizer is &lt;5.5.14-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189962" version="1" comment="php5-wddx is &lt;5.5.14-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189963" version="1" comment="php5-xmlreader is &lt;5.5.14-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189964" version="1" comment="php5-xmlrpc is &lt;5.5.14-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189965" version="1" comment="php5-xmlwriter is &lt;5.5.14-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189966" version="1" comment="php5-xsl is &lt;5.5.14-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189967" version="1" comment="php5-zip is &lt;5.5.14-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189968" version="1" comment="php5-zlib is &lt;5.5.14-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189969" version="1" comment="apache2-mod_php5 is &lt;5.5.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189970" version="1" comment="php5 is &lt;5.5.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189971" version="1" comment="php5-bcmath is &lt;5.5.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189972" version="1" comment="php5-bz2 is &lt;5.5.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189973" version="1" comment="php5-calendar is &lt;5.5.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189974" version="1" comment="php5-ctype is &lt;5.5.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189975" version="1" comment="php5-curl is &lt;5.5.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189976" version="1" comment="php5-dba is &lt;5.5.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189977" version="1" comment="php5-dom is &lt;5.5.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189978" version="1" comment="php5-enchant is &lt;5.5.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189979" version="1" comment="php5-exif is &lt;5.5.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189980" version="1" comment="php5-fastcgi is &lt;5.5.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189981" version="1" comment="php5-fileinfo is &lt;5.5.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189982" version="1" comment="php5-fpm is &lt;5.5.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189983" version="1" comment="php5-ftp is &lt;5.5.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189984" version="1" comment="php5-gd is &lt;5.5.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189985" version="1" comment="php5-gettext is &lt;5.5.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189986" version="1" comment="php5-gmp is &lt;5.5.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189987" version="1" comment="php5-iconv is &lt;5.5.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189988" version="1" comment="php5-intl is &lt;5.5.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189989" version="1" comment="php5-json is &lt;5.5.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189990" version="1" comment="php5-ldap is &lt;5.5.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189991" version="1" comment="php5-mbstring is &lt;5.5.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189992" version="1" comment="php5-mcrypt is &lt;5.5.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189993" version="1" comment="php5-mysql is &lt;5.5.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189994" version="1" comment="php5-odbc is &lt;5.5.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189995" version="1" comment="php5-openssl is &lt;5.5.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189996" version="1" comment="php5-pcntl is &lt;5.5.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189997" version="1" comment="php5-pdo is &lt;5.5.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189998" version="1" comment="php5-pear is &lt;5.5.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009189999" version="1" comment="php5-pgsql is &lt;5.5.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190000" version="1" comment="php5-pspell is &lt;5.5.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190001" version="1" comment="php5-shmop is &lt;5.5.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190002" version="1" comment="php5-snmp is &lt;5.5.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190003" version="1" comment="php5-soap is &lt;5.5.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190004" version="1" comment="php5-sockets is &lt;5.5.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190005" version="1" comment="php5-sqlite is &lt;5.5.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190006" version="1" comment="php5-suhosin is &lt;5.5.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190007" version="1" comment="php5-sysvmsg is &lt;5.5.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190008" version="1" comment="php5-sysvsem is &lt;5.5.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190009" version="1" comment="php5-sysvshm is &lt;5.5.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190010" version="1" comment="php5-tokenizer is &lt;5.5.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190011" version="1" comment="php5-wddx is &lt;5.5.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190012" version="1" comment="php5-xmlreader is &lt;5.5.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190013" version="1" comment="php5-xmlrpc is &lt;5.5.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190014" version="1" comment="php5-xmlwriter is &lt;5.5.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190015" version="1" comment="php5-xsl is &lt;5.5.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190016" version="1" comment="php5-zip is &lt;5.5.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190017" version="1" comment="php5-zlib is &lt;5.5.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190018" version="1" comment="apache2-mod_php5 is &lt;5.5.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190019" version="1" comment="php5 is &lt;5.5.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190020" version="1" comment="php5-bcmath is &lt;5.5.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190021" version="1" comment="php5-bz2 is &lt;5.5.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190022" version="1" comment="php5-calendar is &lt;5.5.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190023" version="1" comment="php5-ctype is &lt;5.5.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190024" version="1" comment="php5-curl is &lt;5.5.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190025" version="1" comment="php5-dba is &lt;5.5.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190026" version="1" comment="php5-dom is &lt;5.5.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190027" version="1" comment="php5-enchant is &lt;5.5.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190028" version="1" comment="php5-exif is &lt;5.5.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190029" version="1" comment="php5-fastcgi is &lt;5.5.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190030" version="1" comment="php5-fileinfo is &lt;5.5.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190031" version="1" comment="php5-fpm is &lt;5.5.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190032" version="1" comment="php5-ftp is &lt;5.5.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190033" version="1" comment="php5-gd is &lt;5.5.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190034" version="1" comment="php5-gettext is &lt;5.5.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190035" version="1" comment="php5-gmp is &lt;5.5.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190036" version="1" comment="php5-iconv is &lt;5.5.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190037" version="1" comment="php5-intl is &lt;5.5.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190038" version="1" comment="php5-json is &lt;5.5.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190039" version="1" comment="php5-ldap is &lt;5.5.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190040" version="1" comment="php5-mbstring is &lt;5.5.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190041" version="1" comment="php5-mcrypt is &lt;5.5.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190042" version="1" comment="php5-mysql is &lt;5.5.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190043" version="1" comment="php5-odbc is &lt;5.5.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190044" version="1" comment="php5-openssl is &lt;5.5.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190045" version="1" comment="php5-pcntl is &lt;5.5.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190046" version="1" comment="php5-pdo is &lt;5.5.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190047" version="1" comment="php5-pear is &lt;5.5.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190048" version="1" comment="php5-pgsql is &lt;5.5.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190049" version="1" comment="php5-pspell is &lt;5.5.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190050" version="1" comment="php5-shmop is &lt;5.5.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190051" version="1" comment="php5-snmp is &lt;5.5.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190052" version="1" comment="php5-soap is &lt;5.5.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190053" version="1" comment="php5-sockets is &lt;5.5.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190054" version="1" comment="php5-sqlite is &lt;5.5.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190055" version="1" comment="php5-suhosin is &lt;5.5.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190056" version="1" comment="php5-sysvmsg is &lt;5.5.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190057" version="1" comment="php5-sysvsem is &lt;5.5.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190058" version="1" comment="php5-sysvshm is &lt;5.5.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190059" version="1" comment="php5-tokenizer is &lt;5.5.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190060" version="1" comment="php5-wddx is &lt;5.5.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190061" version="1" comment="php5-xmlreader is &lt;5.5.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190062" version="1" comment="php5-xmlrpc is &lt;5.5.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190063" version="1" comment="php5-xmlwriter is &lt;5.5.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190064" version="1" comment="php5-xsl is &lt;5.5.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190065" version="1" comment="php5-zip is &lt;5.5.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190066" version="1" comment="php5-zlib is &lt;5.5.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190067" version="1" comment="apache2-mod_php5 is &lt;5.5.14-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190068" version="1" comment="php5 is &lt;5.5.14-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190069" version="1" comment="php5-bcmath is &lt;5.5.14-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190070" version="1" comment="php5-bz2 is &lt;5.5.14-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190071" version="1" comment="php5-calendar is &lt;5.5.14-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190072" version="1" comment="php5-ctype is &lt;5.5.14-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190073" version="1" comment="php5-curl is &lt;5.5.14-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190074" version="1" comment="php5-dba is &lt;5.5.14-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190075" version="1" comment="php5-dom is &lt;5.5.14-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190076" version="1" comment="php5-enchant is &lt;5.5.14-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190077" version="1" comment="php5-exif is &lt;5.5.14-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190078" version="1" comment="php5-fastcgi is &lt;5.5.14-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190079" version="1" comment="php5-fileinfo is &lt;5.5.14-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190080" version="1" comment="php5-fpm is &lt;5.5.14-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190081" version="1" comment="php5-ftp is &lt;5.5.14-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190082" version="1" comment="php5-gd is &lt;5.5.14-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190083" version="1" comment="php5-gettext is &lt;5.5.14-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190084" version="1" comment="php5-gmp is &lt;5.5.14-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190085" version="1" comment="php5-iconv is &lt;5.5.14-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190086" version="1" comment="php5-intl is &lt;5.5.14-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190087" version="1" comment="php5-json is &lt;5.5.14-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190088" version="1" comment="php5-ldap is &lt;5.5.14-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190089" version="1" comment="php5-mbstring is &lt;5.5.14-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190090" version="1" comment="php5-mcrypt is &lt;5.5.14-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190091" version="1" comment="php5-mysql is &lt;5.5.14-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190092" version="1" comment="php5-odbc is &lt;5.5.14-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190093" version="1" comment="php5-openssl is &lt;5.5.14-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190094" version="1" comment="php5-pcntl is &lt;5.5.14-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190095" version="1" comment="php5-pdo is &lt;5.5.14-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190096" version="1" comment="php5-pear is &lt;5.5.14-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190097" version="1" comment="php5-pgsql is &lt;5.5.14-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190098" version="1" comment="php5-pspell is &lt;5.5.14-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190099" version="1" comment="php5-shmop is &lt;5.5.14-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190100" version="1" comment="php5-snmp is &lt;5.5.14-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190101" version="1" comment="php5-soap is &lt;5.5.14-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190102" version="1" comment="php5-sockets is &lt;5.5.14-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190103" version="1" comment="php5-sqlite is &lt;5.5.14-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190104" version="1" comment="php5-suhosin is &lt;5.5.14-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190105" version="1" comment="php5-sysvmsg is &lt;5.5.14-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190106" version="1" comment="php5-sysvsem is &lt;5.5.14-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190107" version="1" comment="php5-sysvshm is &lt;5.5.14-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190108" version="1" comment="php5-tokenizer is &lt;5.5.14-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190109" version="1" comment="php5-wddx is &lt;5.5.14-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190110" version="1" comment="php5-xmlreader is &lt;5.5.14-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190111" version="1" comment="php5-xmlrpc is &lt;5.5.14-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190112" version="1" comment="php5-xmlwriter is &lt;5.5.14-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190113" version="1" comment="php5-xsl is &lt;5.5.14-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190114" version="1" comment="php5-zip is &lt;5.5.14-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190115" version="1" comment="php5-zlib is &lt;5.5.14-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190116" version="1" comment="apache2-mod_php5 is &lt;5.5.14-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190117" version="1" comment="php5 is &lt;5.5.14-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190118" version="1" comment="php5-bcmath is &lt;5.5.14-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190119" version="1" comment="php5-bz2 is &lt;5.5.14-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190120" version="1" comment="php5-calendar is &lt;5.5.14-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190121" version="1" comment="php5-ctype is &lt;5.5.14-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190122" version="1" comment="php5-curl is &lt;5.5.14-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190123" version="1" comment="php5-dba is &lt;5.5.14-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190124" version="1" comment="php5-dom is &lt;5.5.14-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190125" version="1" comment="php5-enchant is &lt;5.5.14-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190126" version="1" comment="php5-exif is &lt;5.5.14-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190127" version="1" comment="php5-fastcgi is &lt;5.5.14-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190128" version="1" comment="php5-fileinfo is &lt;5.5.14-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190129" version="1" comment="php5-fpm is &lt;5.5.14-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190130" version="1" comment="php5-ftp is &lt;5.5.14-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190131" version="1" comment="php5-gd is &lt;5.5.14-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190132" version="1" comment="php5-gettext is &lt;5.5.14-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190133" version="1" comment="php5-gmp is &lt;5.5.14-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190134" version="1" comment="php5-iconv is &lt;5.5.14-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190135" version="1" comment="php5-intl is &lt;5.5.14-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190136" version="1" comment="php5-json is &lt;5.5.14-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190137" version="1" comment="php5-ldap is &lt;5.5.14-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190138" version="1" comment="php5-mbstring is &lt;5.5.14-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190139" version="1" comment="php5-mcrypt is &lt;5.5.14-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190140" version="1" comment="php5-mysql is &lt;5.5.14-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190141" version="1" comment="php5-odbc is &lt;5.5.14-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190142" version="1" comment="php5-opcache is &lt;5.5.14-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190143" version="1" comment="php5-openssl is &lt;5.5.14-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190144" version="1" comment="php5-pcntl is &lt;5.5.14-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190145" version="1" comment="php5-pdo is &lt;5.5.14-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190146" version="1" comment="php5-pear is &lt;5.5.14-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190147" version="1" comment="php5-pgsql is &lt;5.5.14-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190148" version="1" comment="php5-posix is &lt;5.5.14-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190149" version="1" comment="php5-pspell is &lt;5.5.14-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190150" version="1" comment="php5-shmop is &lt;5.5.14-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190151" version="1" comment="php5-snmp is &lt;5.5.14-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190152" version="1" comment="php5-soap is &lt;5.5.14-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190153" version="1" comment="php5-sockets is &lt;5.5.14-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190154" version="1" comment="php5-sqlite is &lt;5.5.14-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190155" version="1" comment="php5-suhosin is &lt;5.5.14-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190156" version="1" comment="php5-sysvmsg is &lt;5.5.14-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190157" version="1" comment="php5-sysvsem is &lt;5.5.14-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190158" version="1" comment="php5-sysvshm is &lt;5.5.14-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190159" version="1" comment="php5-tokenizer is &lt;5.5.14-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190160" version="1" comment="php5-wddx is &lt;5.5.14-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190161" version="1" comment="php5-xmlreader is &lt;5.5.14-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190162" version="1" comment="php5-xmlrpc is &lt;5.5.14-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190163" version="1" comment="php5-xmlwriter is &lt;5.5.14-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190164" version="1" comment="php5-xsl is &lt;5.5.14-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190165" version="1" comment="php5-zip is &lt;5.5.14-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190166" version="1" comment="php5-zlib is &lt;5.5.14-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190167" version="1" comment="apache2-mod_php5 is &lt;5.5.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190168" version="1" comment="php5 is &lt;5.5.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190169" version="1" comment="php5-bcmath is &lt;5.5.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190170" version="1" comment="php5-bz2 is &lt;5.5.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190171" version="1" comment="php5-calendar is &lt;5.5.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190172" version="1" comment="php5-ctype is &lt;5.5.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190173" version="1" comment="php5-curl is &lt;5.5.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190174" version="1" comment="php5-dba is &lt;5.5.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190175" version="1" comment="php5-dom is &lt;5.5.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190176" version="1" comment="php5-enchant is &lt;5.5.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190177" version="1" comment="php5-exif is &lt;5.5.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190178" version="1" comment="php5-fastcgi is &lt;5.5.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190179" version="1" comment="php5-fileinfo is &lt;5.5.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190180" version="1" comment="php5-fpm is &lt;5.5.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190181" version="1" comment="php5-ftp is &lt;5.5.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190182" version="1" comment="php5-gd is &lt;5.5.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190183" version="1" comment="php5-gettext is &lt;5.5.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190184" version="1" comment="php5-gmp is &lt;5.5.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190185" version="1" comment="php5-iconv is &lt;5.5.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190186" version="1" comment="php5-intl is &lt;5.5.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190187" version="1" comment="php5-json is &lt;5.5.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190188" version="1" comment="php5-ldap is &lt;5.5.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190189" version="1" comment="php5-mbstring is &lt;5.5.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190190" version="1" comment="php5-mcrypt is &lt;5.5.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190191" version="1" comment="php5-mysql is &lt;5.5.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190192" version="1" comment="php5-odbc is &lt;5.5.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190193" version="1" comment="php5-opcache is &lt;5.5.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190194" version="1" comment="php5-openssl is &lt;5.5.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190195" version="1" comment="php5-pcntl is &lt;5.5.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190196" version="1" comment="php5-pdo is &lt;5.5.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190197" version="1" comment="php5-pear is &lt;5.5.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190198" version="1" comment="php5-pgsql is &lt;5.5.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190199" version="1" comment="php5-posix is &lt;5.5.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190200" version="1" comment="php5-pspell is &lt;5.5.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190201" version="1" comment="php5-shmop is &lt;5.5.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190202" version="1" comment="php5-snmp is &lt;5.5.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190203" version="1" comment="php5-soap is &lt;5.5.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190204" version="1" comment="php5-sockets is &lt;5.5.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190205" version="1" comment="php5-sqlite is &lt;5.5.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190206" version="1" comment="php5-suhosin is &lt;5.5.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190207" version="1" comment="php5-sysvmsg is &lt;5.5.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190208" version="1" comment="php5-sysvsem is &lt;5.5.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190209" version="1" comment="php5-sysvshm is &lt;5.5.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190210" version="1" comment="php5-tokenizer is &lt;5.5.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190211" version="1" comment="php5-wddx is &lt;5.5.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190212" version="1" comment="php5-xmlreader is &lt;5.5.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190213" version="1" comment="php5-xmlrpc is &lt;5.5.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190214" version="1" comment="php5-xmlwriter is &lt;5.5.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190215" version="1" comment="php5-xsl is &lt;5.5.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190216" version="1" comment="php5-zip is &lt;5.5.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190217" version="1" comment="php5-zlib is &lt;5.5.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190218" version="1" comment="apache2-mod_php5 is &lt;5.5.14-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190219" version="1" comment="php5 is &lt;5.5.14-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190220" version="1" comment="php5-bcmath is &lt;5.5.14-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190221" version="1" comment="php5-bz2 is &lt;5.5.14-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190222" version="1" comment="php5-calendar is &lt;5.5.14-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190223" version="1" comment="php5-ctype is &lt;5.5.14-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190224" version="1" comment="php5-curl is &lt;5.5.14-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190225" version="1" comment="php5-dba is &lt;5.5.14-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190226" version="1" comment="php5-dom is &lt;5.5.14-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190227" version="1" comment="php5-enchant is &lt;5.5.14-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190228" version="1" comment="php5-exif is &lt;5.5.14-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190229" version="1" comment="php5-fastcgi is &lt;5.5.14-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190230" version="1" comment="php5-fileinfo is &lt;5.5.14-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190231" version="1" comment="php5-fpm is &lt;5.5.14-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190232" version="1" comment="php5-ftp is &lt;5.5.14-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190233" version="1" comment="php5-gd is &lt;5.5.14-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190234" version="1" comment="php5-gettext is &lt;5.5.14-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190235" version="1" comment="php5-gmp is &lt;5.5.14-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190236" version="1" comment="php5-iconv is &lt;5.5.14-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190237" version="1" comment="php5-intl is &lt;5.5.14-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190238" version="1" comment="php5-json is &lt;5.5.14-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190239" version="1" comment="php5-ldap is &lt;5.5.14-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190240" version="1" comment="php5-mbstring is &lt;5.5.14-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190241" version="1" comment="php5-mcrypt is &lt;5.5.14-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190242" version="1" comment="php5-mysql is &lt;5.5.14-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190243" version="1" comment="php5-odbc is &lt;5.5.14-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190244" version="1" comment="php5-openssl is &lt;5.5.14-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190245" version="1" comment="php5-pcntl is &lt;5.5.14-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190246" version="1" comment="php5-pdo is &lt;5.5.14-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190247" version="1" comment="php5-pear is &lt;5.5.14-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190248" version="1" comment="php5-pgsql is &lt;5.5.14-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190249" version="1" comment="php5-pspell is &lt;5.5.14-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190250" version="1" comment="php5-shmop is &lt;5.5.14-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190251" version="1" comment="php5-snmp is &lt;5.5.14-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190252" version="1" comment="php5-soap is &lt;5.5.14-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190253" version="1" comment="php5-sockets is &lt;5.5.14-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190254" version="1" comment="php5-sqlite is &lt;5.5.14-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190255" version="1" comment="php5-suhosin is &lt;5.5.14-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190256" version="1" comment="php5-sysvmsg is &lt;5.5.14-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190257" version="1" comment="php5-sysvsem is &lt;5.5.14-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190258" version="1" comment="php5-sysvshm is &lt;5.5.14-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190259" version="1" comment="php5-tokenizer is &lt;5.5.14-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190260" version="1" comment="php5-wddx is &lt;5.5.14-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190261" version="1" comment="php5-xmlreader is &lt;5.5.14-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190262" version="1" comment="php5-xmlrpc is &lt;5.5.14-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190263" version="1" comment="php5-xmlwriter is &lt;5.5.14-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190264" version="1" comment="php5-xsl is &lt;5.5.14-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190265" version="1" comment="php5-zip is &lt;5.5.14-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190266" version="1" comment="php5-zlib is &lt;5.5.14-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190267" version="1" comment="apache2-mod_php5 is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190268" version="1" comment="php5 is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190269" version="1" comment="php5-bcmath is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190270" version="1" comment="php5-bz2 is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190271" version="1" comment="php5-calendar is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190272" version="1" comment="php5-ctype is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190273" version="1" comment="php5-curl is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190274" version="1" comment="php5-dba is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190275" version="1" comment="php5-dom is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190276" version="1" comment="php5-enchant is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190277" version="1" comment="php5-exif is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190278" version="1" comment="php5-fastcgi is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190279" version="1" comment="php5-fileinfo is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190280" version="1" comment="php5-fpm is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190281" version="1" comment="php5-ftp is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190282" version="1" comment="php5-gd is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190283" version="1" comment="php5-gettext is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190284" version="1" comment="php5-gmp is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190285" version="1" comment="php5-iconv is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190286" version="1" comment="php5-imap is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190287" version="1" comment="php5-intl is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190288" version="1" comment="php5-json is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190289" version="1" comment="php5-ldap is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190290" version="1" comment="php5-mbstring is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190291" version="1" comment="php5-mcrypt is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190292" version="1" comment="php5-mysql is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190293" version="1" comment="php5-odbc is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190294" version="1" comment="php5-opcache is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190295" version="1" comment="php5-openssl is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190296" version="1" comment="php5-pcntl is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190297" version="1" comment="php5-pdo is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190298" version="1" comment="php5-pear is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190299" version="1" comment="php5-pgsql is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190300" version="1" comment="php5-phar is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190301" version="1" comment="php5-posix is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190302" version="1" comment="php5-pspell is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190303" version="1" comment="php5-shmop is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190304" version="1" comment="php5-snmp is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190305" version="1" comment="php5-soap is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190306" version="1" comment="php5-sockets is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190307" version="1" comment="php5-sqlite is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190308" version="1" comment="php5-suhosin is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190309" version="1" comment="php5-sysvmsg is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190310" version="1" comment="php5-sysvsem is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190311" version="1" comment="php5-sysvshm is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190312" version="1" comment="php5-tokenizer is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190313" version="1" comment="php5-wddx is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190314" version="1" comment="php5-xmlreader is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190315" version="1" comment="php5-xmlrpc is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190316" version="1" comment="php5-xmlwriter is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190317" version="1" comment="php5-xsl is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190318" version="1" comment="php5-zip is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190319" version="1" comment="php5-zlib is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190320" version="1" comment="apache2-mod_php5 is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190321" version="1" comment="php5 is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190322" version="1" comment="php5-bcmath is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190323" version="1" comment="php5-bz2 is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190324" version="1" comment="php5-calendar is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190325" version="1" comment="php5-ctype is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190326" version="1" comment="php5-curl is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190327" version="1" comment="php5-dba is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190328" version="1" comment="php5-dom is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190329" version="1" comment="php5-enchant is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190330" version="1" comment="php5-exif is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190331" version="1" comment="php5-fastcgi is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190332" version="1" comment="php5-fileinfo is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190333" version="1" comment="php5-fpm is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190334" version="1" comment="php5-ftp is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190335" version="1" comment="php5-gd is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190336" version="1" comment="php5-gettext is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190337" version="1" comment="php5-gmp is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190338" version="1" comment="php5-iconv is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190339" version="1" comment="php5-imap is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190340" version="1" comment="php5-intl is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190341" version="1" comment="php5-json is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190342" version="1" comment="php5-ldap is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190343" version="1" comment="php5-mbstring is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190344" version="1" comment="php5-mcrypt is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190345" version="1" comment="php5-mysql is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190346" version="1" comment="php5-odbc is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190347" version="1" comment="php5-opcache is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190348" version="1" comment="php5-openssl is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190349" version="1" comment="php5-pcntl is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190350" version="1" comment="php5-pdo is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190351" version="1" comment="php5-pear is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190352" version="1" comment="php5-pgsql is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190353" version="1" comment="php5-phar is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190354" version="1" comment="php5-posix is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190355" version="1" comment="php5-pspell is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190356" version="1" comment="php5-shmop is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190357" version="1" comment="php5-snmp is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190358" version="1" comment="php5-soap is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190359" version="1" comment="php5-sockets is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190360" version="1" comment="php5-sqlite is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190361" version="1" comment="php5-suhosin is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190362" version="1" comment="php5-sysvmsg is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190363" version="1" comment="php5-sysvsem is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190364" version="1" comment="php5-sysvshm is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190365" version="1" comment="php5-tokenizer is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190366" version="1" comment="php5-wddx is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190367" version="1" comment="php5-xmlreader is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190368" version="1" comment="php5-xmlrpc is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190369" version="1" comment="php5-xmlwriter is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190370" version="1" comment="php5-xsl is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190371" version="1" comment="php5-zip is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190372" version="1" comment="php5-zlib is &lt;5.5.14-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190373" version="1" comment="nodejs4 is &lt;4.6.0-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190374" version="1" comment="nodejs4-devel is &lt;4.6.0-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190375" version="1" comment="nodejs4-docs is &lt;4.6.0-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190376" version="1" comment="npm4 is &lt;4.6.0-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190377" version="1" comment="apache2-mod_php5 is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190378" version="1" comment="php5 is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190379" version="1" comment="php5-bcmath is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190380" version="1" comment="php5-bz2 is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190381" version="1" comment="php5-calendar is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190382" version="1" comment="php5-ctype is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190383" version="1" comment="php5-curl is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190384" version="1" comment="php5-dba is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190385" version="1" comment="php5-dom is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190386" version="1" comment="php5-enchant is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190387" version="1" comment="php5-exif is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190388" version="1" comment="php5-fastcgi is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190389" version="1" comment="php5-fileinfo is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190390" version="1" comment="php5-fpm is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190391" version="1" comment="php5-ftp is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190392" version="1" comment="php5-gd is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190393" version="1" comment="php5-gettext is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190394" version="1" comment="php5-gmp is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190395" version="1" comment="php5-iconv is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190396" version="1" comment="php5-imap is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190397" version="1" comment="php5-intl is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190398" version="1" comment="php5-json is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190399" version="1" comment="php5-ldap is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190400" version="1" comment="php5-mbstring is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190401" version="1" comment="php5-mcrypt is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190402" version="1" comment="php5-mysql is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190403" version="1" comment="php5-odbc is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190404" version="1" comment="php5-opcache is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190405" version="1" comment="php5-openssl is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190406" version="1" comment="php5-pcntl is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190407" version="1" comment="php5-pdo is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190408" version="1" comment="php5-pear is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190409" version="1" comment="php5-pgsql is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190410" version="1" comment="php5-phar is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190411" version="1" comment="php5-posix is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190412" version="1" comment="php5-pspell is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190413" version="1" comment="php5-shmop is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190414" version="1" comment="php5-snmp is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190415" version="1" comment="php5-soap is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190416" version="1" comment="php5-sockets is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190417" version="1" comment="php5-sqlite is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190418" version="1" comment="php5-suhosin is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190419" version="1" comment="php5-sysvmsg is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190420" version="1" comment="php5-sysvsem is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190421" version="1" comment="php5-sysvshm is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190422" version="1" comment="php5-tokenizer is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190423" version="1" comment="php5-wddx is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190424" version="1" comment="php5-xmlreader is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190425" version="1" comment="php5-xmlrpc is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190426" version="1" comment="php5-xmlwriter is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190427" version="1" comment="php5-xsl is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190428" version="1" comment="php5-zip is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190429" version="1" comment="php5-zlib is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190430" version="1" comment="apache2-mod_php7 is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190431" version="1" comment="php7 is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190432" version="1" comment="php7-bcmath is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190433" version="1" comment="php7-bz2 is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190434" version="1" comment="php7-calendar is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190435" version="1" comment="php7-ctype is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190436" version="1" comment="php7-curl is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190437" version="1" comment="php7-dba is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190438" version="1" comment="php7-dom is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190439" version="1" comment="php7-enchant is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190440" version="1" comment="php7-exif is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190441" version="1" comment="php7-fastcgi is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190442" version="1" comment="php7-fileinfo is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190443" version="1" comment="php7-fpm is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190444" version="1" comment="php7-ftp is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190445" version="1" comment="php7-gd is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190446" version="1" comment="php7-gettext is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190447" version="1" comment="php7-gmp is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190448" version="1" comment="php7-iconv is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190449" version="1" comment="php7-imap is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190450" version="1" comment="php7-intl is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190451" version="1" comment="php7-json is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190452" version="1" comment="php7-ldap is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190453" version="1" comment="php7-mbstring is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190454" version="1" comment="php7-mcrypt is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190455" version="1" comment="php7-mysql is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190456" version="1" comment="php7-odbc is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190457" version="1" comment="php7-opcache is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190458" version="1" comment="php7-openssl is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190459" version="1" comment="php7-pcntl is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190460" version="1" comment="php7-pdo is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190461" version="1" comment="php7-pear is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190462" version="1" comment="php7-pear-Archive_Tar is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190463" version="1" comment="php7-pgsql is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190464" version="1" comment="php7-phar is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190465" version="1" comment="php7-posix is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190466" version="1" comment="php7-pspell is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190467" version="1" comment="php7-shmop is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190468" version="1" comment="php7-snmp is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190469" version="1" comment="php7-soap is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190470" version="1" comment="php7-sockets is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190471" version="1" comment="php7-sqlite is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190472" version="1" comment="php7-sysvmsg is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190473" version="1" comment="php7-sysvsem is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190474" version="1" comment="php7-sysvshm is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190475" version="1" comment="php7-tokenizer is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190476" version="1" comment="php7-wddx is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190477" version="1" comment="php7-xmlreader is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190478" version="1" comment="php7-xmlrpc is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190479" version="1" comment="php7-xmlwriter is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190480" version="1" comment="php7-xsl is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190481" version="1" comment="php7-zip is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190482" version="1" comment="php7-zlib is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190483" version="1" comment="apache2-mod_php5 is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190484" version="1" comment="php5 is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190485" version="1" comment="php5-bcmath is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190486" version="1" comment="php5-bz2 is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190487" version="1" comment="php5-calendar is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190488" version="1" comment="php5-ctype is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190489" version="1" comment="php5-curl is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190490" version="1" comment="php5-dba is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190491" version="1" comment="php5-dom is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190492" version="1" comment="php5-enchant is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190493" version="1" comment="php5-exif is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190494" version="1" comment="php5-fastcgi is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190495" version="1" comment="php5-fileinfo is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190496" version="1" comment="php5-fpm is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190497" version="1" comment="php5-ftp is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190498" version="1" comment="php5-gd is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190499" version="1" comment="php5-gettext is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190500" version="1" comment="php5-gmp is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190501" version="1" comment="php5-iconv is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190502" version="1" comment="php5-imap is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190503" version="1" comment="php5-intl is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190504" version="1" comment="php5-json is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190505" version="1" comment="php5-ldap is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190506" version="1" comment="php5-mbstring is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190507" version="1" comment="php5-mcrypt is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190508" version="1" comment="php5-mysql is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190509" version="1" comment="php5-odbc is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190510" version="1" comment="php5-opcache is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190511" version="1" comment="php5-openssl is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190512" version="1" comment="php5-pcntl is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190513" version="1" comment="php5-pdo is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190514" version="1" comment="php5-pear is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190515" version="1" comment="php5-pgsql is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190516" version="1" comment="php5-phar is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190517" version="1" comment="php5-posix is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190518" version="1" comment="php5-pspell is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190519" version="1" comment="php5-shmop is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190520" version="1" comment="php5-snmp is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190521" version="1" comment="php5-soap is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190522" version="1" comment="php5-sockets is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190523" version="1" comment="php5-sqlite is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190524" version="1" comment="php5-suhosin is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190525" version="1" comment="php5-sysvmsg is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190526" version="1" comment="php5-sysvsem is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190527" version="1" comment="php5-sysvshm is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190528" version="1" comment="php5-tokenizer is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190529" version="1" comment="php5-wddx is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190530" version="1" comment="php5-xmlreader is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190531" version="1" comment="php5-xmlrpc is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190532" version="1" comment="php5-xmlwriter is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190533" version="1" comment="php5-xsl is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190534" version="1" comment="php5-zip is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190535" version="1" comment="php5-zlib is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190536" version="1" comment="nodejs4 is &lt;4.6.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190537" version="1" comment="nodejs4-devel is &lt;4.6.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190538" version="1" comment="nodejs4-docs is &lt;4.6.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190539" version="1" comment="npm4 is &lt;4.6.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190540" version="1" comment="apache2-mod_php7 is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190541" version="1" comment="php7 is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190542" version="1" comment="php7-bcmath is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190543" version="1" comment="php7-bz2 is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190544" version="1" comment="php7-calendar is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190545" version="1" comment="php7-ctype is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190546" version="1" comment="php7-curl is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190547" version="1" comment="php7-dba is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190548" version="1" comment="php7-dom is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190549" version="1" comment="php7-enchant is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190550" version="1" comment="php7-exif is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190551" version="1" comment="php7-fastcgi is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190552" version="1" comment="php7-fileinfo is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190553" version="1" comment="php7-fpm is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190554" version="1" comment="php7-ftp is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190555" version="1" comment="php7-gd is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190556" version="1" comment="php7-gettext is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190557" version="1" comment="php7-gmp is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190558" version="1" comment="php7-iconv is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190559" version="1" comment="php7-imap is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190560" version="1" comment="php7-intl is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190561" version="1" comment="php7-json is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190562" version="1" comment="php7-ldap is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190563" version="1" comment="php7-mbstring is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190564" version="1" comment="php7-mcrypt is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190565" version="1" comment="php7-mysql is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190566" version="1" comment="php7-odbc is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190567" version="1" comment="php7-opcache is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190568" version="1" comment="php7-openssl is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190569" version="1" comment="php7-pcntl is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190570" version="1" comment="php7-pdo is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190571" version="1" comment="php7-pear is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190572" version="1" comment="php7-pear-Archive_Tar is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190573" version="1" comment="php7-pgsql is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190574" version="1" comment="php7-phar is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190575" version="1" comment="php7-posix is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190576" version="1" comment="php7-pspell is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190577" version="1" comment="php7-shmop is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190578" version="1" comment="php7-snmp is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190579" version="1" comment="php7-soap is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190580" version="1" comment="php7-sockets is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190581" version="1" comment="php7-sqlite is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190582" version="1" comment="php7-sysvmsg is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190583" version="1" comment="php7-sysvsem is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190584" version="1" comment="php7-sysvshm is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190585" version="1" comment="php7-tokenizer is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190586" version="1" comment="php7-wddx is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190587" version="1" comment="php7-xmlreader is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190588" version="1" comment="php7-xmlrpc is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190589" version="1" comment="php7-xmlwriter is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190590" version="1" comment="php7-xsl is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190591" version="1" comment="php7-zip is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190592" version="1" comment="php7-zlib is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190593" version="1" comment="apache2-mod_php5 is &lt;5.5.14-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190594" version="1" comment="php5 is &lt;5.5.14-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190595" version="1" comment="php5-bcmath is &lt;5.5.14-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190596" version="1" comment="php5-bz2 is &lt;5.5.14-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190597" version="1" comment="php5-calendar is &lt;5.5.14-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190598" version="1" comment="php5-ctype is &lt;5.5.14-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190599" version="1" comment="php5-curl is &lt;5.5.14-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190600" version="1" comment="php5-dba is &lt;5.5.14-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190601" version="1" comment="php5-dom is &lt;5.5.14-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190602" version="1" comment="php5-enchant is &lt;5.5.14-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190603" version="1" comment="php5-exif is &lt;5.5.14-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190604" version="1" comment="php5-fastcgi is &lt;5.5.14-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190605" version="1" comment="php5-fileinfo is &lt;5.5.14-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190606" version="1" comment="php5-fpm is &lt;5.5.14-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190607" version="1" comment="php5-ftp is &lt;5.5.14-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190608" version="1" comment="php5-gd is &lt;5.5.14-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190609" version="1" comment="php5-gettext is &lt;5.5.14-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190610" version="1" comment="php5-gmp is &lt;5.5.14-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190611" version="1" comment="php5-iconv is &lt;5.5.14-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190612" version="1" comment="php5-intl is &lt;5.5.14-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190613" version="1" comment="php5-json is &lt;5.5.14-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190614" version="1" comment="php5-ldap is &lt;5.5.14-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190615" version="1" comment="php5-mbstring is &lt;5.5.14-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190616" version="1" comment="php5-mcrypt is &lt;5.5.14-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190617" version="1" comment="php5-mysql is &lt;5.5.14-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190618" version="1" comment="php5-odbc is &lt;5.5.14-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190619" version="1" comment="php5-opcache is &lt;5.5.14-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190620" version="1" comment="php5-openssl is &lt;5.5.14-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190621" version="1" comment="php5-pcntl is &lt;5.5.14-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190622" version="1" comment="php5-pdo is &lt;5.5.14-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190623" version="1" comment="php5-pear is &lt;5.5.14-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190624" version="1" comment="php5-pgsql is &lt;5.5.14-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190625" version="1" comment="php5-posix is &lt;5.5.14-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190626" version="1" comment="php5-pspell is &lt;5.5.14-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190627" version="1" comment="php5-shmop is &lt;5.5.14-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190628" version="1" comment="php5-snmp is &lt;5.5.14-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190629" version="1" comment="php5-soap is &lt;5.5.14-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190630" version="1" comment="php5-sockets is &lt;5.5.14-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190631" version="1" comment="php5-sqlite is &lt;5.5.14-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190632" version="1" comment="php5-suhosin is &lt;5.5.14-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190633" version="1" comment="php5-sysvmsg is &lt;5.5.14-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190634" version="1" comment="php5-sysvsem is &lt;5.5.14-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190635" version="1" comment="php5-sysvshm is &lt;5.5.14-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190636" version="1" comment="php5-tokenizer is &lt;5.5.14-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190637" version="1" comment="php5-wddx is &lt;5.5.14-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190638" version="1" comment="php5-xmlreader is &lt;5.5.14-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190639" version="1" comment="php5-xmlrpc is &lt;5.5.14-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190640" version="1" comment="php5-xmlwriter is &lt;5.5.14-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190641" version="1" comment="php5-xsl is &lt;5.5.14-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190642" version="1" comment="php5-zip is &lt;5.5.14-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190643" version="1" comment="php5-zlib is &lt;5.5.14-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190644" version="1" comment="apache2-mod_php5 is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190645" version="1" comment="php5 is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190646" version="1" comment="php5-bcmath is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190647" version="1" comment="php5-bz2 is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190648" version="1" comment="php5-calendar is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190649" version="1" comment="php5-ctype is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190650" version="1" comment="php5-curl is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190651" version="1" comment="php5-dba is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190652" version="1" comment="php5-dom is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190653" version="1" comment="php5-enchant is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190654" version="1" comment="php5-exif is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190655" version="1" comment="php5-fastcgi is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190656" version="1" comment="php5-fileinfo is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190657" version="1" comment="php5-fpm is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190658" version="1" comment="php5-ftp is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190659" version="1" comment="php5-gd is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190660" version="1" comment="php5-gettext is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190661" version="1" comment="php5-gmp is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190662" version="1" comment="php5-iconv is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190663" version="1" comment="php5-imap is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190664" version="1" comment="php5-intl is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190665" version="1" comment="php5-json is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190666" version="1" comment="php5-ldap is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190667" version="1" comment="php5-mbstring is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190668" version="1" comment="php5-mcrypt is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190669" version="1" comment="php5-mysql is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190670" version="1" comment="php5-odbc is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190671" version="1" comment="php5-opcache is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190672" version="1" comment="php5-openssl is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190673" version="1" comment="php5-pcntl is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190674" version="1" comment="php5-pdo is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190675" version="1" comment="php5-pear is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190676" version="1" comment="php5-pgsql is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190677" version="1" comment="php5-phar is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190678" version="1" comment="php5-posix is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190679" version="1" comment="php5-pspell is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190680" version="1" comment="php5-shmop is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190681" version="1" comment="php5-snmp is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190682" version="1" comment="php5-soap is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190683" version="1" comment="php5-sockets is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190684" version="1" comment="php5-sqlite is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190685" version="1" comment="php5-suhosin is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190686" version="1" comment="php5-sysvmsg is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190687" version="1" comment="php5-sysvsem is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190688" version="1" comment="php5-sysvshm is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190689" version="1" comment="php5-tokenizer is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190690" version="1" comment="php5-wddx is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190691" version="1" comment="php5-xmlreader is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190692" version="1" comment="php5-xmlrpc is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190693" version="1" comment="php5-xmlwriter is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190694" version="1" comment="php5-xsl is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190695" version="1" comment="php5-zip is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190696" version="1" comment="php5-zlib is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190697" version="1" comment="apache2-mod_php5 is &lt;5.5.14-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190698" version="1" comment="php5 is &lt;5.5.14-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190699" version="1" comment="php5-bcmath is &lt;5.5.14-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190700" version="1" comment="php5-bz2 is &lt;5.5.14-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190701" version="1" comment="php5-calendar is &lt;5.5.14-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190702" version="1" comment="php5-ctype is &lt;5.5.14-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190703" version="1" comment="php5-curl is &lt;5.5.14-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190704" version="1" comment="php5-dba is &lt;5.5.14-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190705" version="1" comment="php5-dom is &lt;5.5.14-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190706" version="1" comment="php5-enchant is &lt;5.5.14-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190707" version="1" comment="php5-exif is &lt;5.5.14-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190708" version="1" comment="php5-fastcgi is &lt;5.5.14-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190709" version="1" comment="php5-fileinfo is &lt;5.5.14-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190710" version="1" comment="php5-fpm is &lt;5.5.14-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190711" version="1" comment="php5-ftp is &lt;5.5.14-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190712" version="1" comment="php5-gd is &lt;5.5.14-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190713" version="1" comment="php5-gettext is &lt;5.5.14-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190714" version="1" comment="php5-gmp is &lt;5.5.14-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190715" version="1" comment="php5-iconv is &lt;5.5.14-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190716" version="1" comment="php5-intl is &lt;5.5.14-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190717" version="1" comment="php5-json is &lt;5.5.14-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190718" version="1" comment="php5-ldap is &lt;5.5.14-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190719" version="1" comment="php5-mbstring is &lt;5.5.14-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190720" version="1" comment="php5-mcrypt is &lt;5.5.14-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190721" version="1" comment="php5-mysql is &lt;5.5.14-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190722" version="1" comment="php5-odbc is &lt;5.5.14-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190723" version="1" comment="php5-opcache is &lt;5.5.14-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190724" version="1" comment="php5-openssl is &lt;5.5.14-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190725" version="1" comment="php5-pcntl is &lt;5.5.14-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190726" version="1" comment="php5-pdo is &lt;5.5.14-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190727" version="1" comment="php5-pear is &lt;5.5.14-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190728" version="1" comment="php5-pgsql is &lt;5.5.14-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190729" version="1" comment="php5-posix is &lt;5.5.14-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190730" version="1" comment="php5-pspell is &lt;5.5.14-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190731" version="1" comment="php5-shmop is &lt;5.5.14-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190732" version="1" comment="php5-snmp is &lt;5.5.14-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190733" version="1" comment="php5-soap is &lt;5.5.14-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190734" version="1" comment="php5-sockets is &lt;5.5.14-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190735" version="1" comment="php5-sqlite is &lt;5.5.14-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190736" version="1" comment="php5-suhosin is &lt;5.5.14-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190737" version="1" comment="php5-sysvmsg is &lt;5.5.14-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190738" version="1" comment="php5-sysvsem is &lt;5.5.14-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190739" version="1" comment="php5-sysvshm is &lt;5.5.14-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190740" version="1" comment="php5-tokenizer is &lt;5.5.14-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190741" version="1" comment="php5-wddx is &lt;5.5.14-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190742" version="1" comment="php5-xmlreader is &lt;5.5.14-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190743" version="1" comment="php5-xmlrpc is &lt;5.5.14-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190744" version="1" comment="php5-xmlwriter is &lt;5.5.14-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190745" version="1" comment="php5-xsl is &lt;5.5.14-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190746" version="1" comment="php5-zip is &lt;5.5.14-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190747" version="1" comment="php5-zlib is &lt;5.5.14-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190748" version="1" comment="apache2-mod_php5 is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190749" version="1" comment="php5 is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190750" version="1" comment="php5-bcmath is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190751" version="1" comment="php5-bz2 is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190752" version="1" comment="php5-calendar is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190753" version="1" comment="php5-ctype is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190754" version="1" comment="php5-curl is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190755" version="1" comment="php5-dba is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190756" version="1" comment="php5-dom is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190757" version="1" comment="php5-enchant is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190758" version="1" comment="php5-exif is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190759" version="1" comment="php5-fastcgi is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190760" version="1" comment="php5-fileinfo is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190761" version="1" comment="php5-fpm is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190762" version="1" comment="php5-ftp is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190763" version="1" comment="php5-gd is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190764" version="1" comment="php5-gettext is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190765" version="1" comment="php5-gmp is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190766" version="1" comment="php5-iconv is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190767" version="1" comment="php5-intl is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190768" version="1" comment="php5-json is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190769" version="1" comment="php5-ldap is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190770" version="1" comment="php5-mbstring is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190771" version="1" comment="php5-mcrypt is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190772" version="1" comment="php5-mysql is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190773" version="1" comment="php5-odbc is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190774" version="1" comment="php5-opcache is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190775" version="1" comment="php5-openssl is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190776" version="1" comment="php5-pcntl is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190777" version="1" comment="php5-pdo is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190778" version="1" comment="php5-pear is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190779" version="1" comment="php5-pgsql is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190780" version="1" comment="php5-phar is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190781" version="1" comment="php5-posix is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190782" version="1" comment="php5-pspell is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190783" version="1" comment="php5-shmop is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190784" version="1" comment="php5-snmp is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190785" version="1" comment="php5-soap is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190786" version="1" comment="php5-sockets is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190787" version="1" comment="php5-sqlite is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190788" version="1" comment="php5-suhosin is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190789" version="1" comment="php5-sysvmsg is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190790" version="1" comment="php5-sysvsem is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190791" version="1" comment="php5-sysvshm is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190792" version="1" comment="php5-tokenizer is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190793" version="1" comment="php5-wddx is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190794" version="1" comment="php5-xmlreader is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190795" version="1" comment="php5-xmlrpc is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190796" version="1" comment="php5-xmlwriter is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190797" version="1" comment="php5-xsl is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190798" version="1" comment="php5-zip is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190799" version="1" comment="php5-zlib is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190800" version="1" comment="apache2-mod_php5 is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190801" version="1" comment="php5 is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190802" version="1" comment="php5-bcmath is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190803" version="1" comment="php5-bz2 is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190804" version="1" comment="php5-calendar is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190805" version="1" comment="php5-ctype is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190806" version="1" comment="php5-curl is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190807" version="1" comment="php5-dba is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190808" version="1" comment="php5-dom is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190809" version="1" comment="php5-enchant is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190810" version="1" comment="php5-exif is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190811" version="1" comment="php5-fastcgi is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190812" version="1" comment="php5-fileinfo is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190813" version="1" comment="php5-fpm is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190814" version="1" comment="php5-ftp is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190815" version="1" comment="php5-gd is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190816" version="1" comment="php5-gettext is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190817" version="1" comment="php5-gmp is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190818" version="1" comment="php5-iconv is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190819" version="1" comment="php5-intl is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190820" version="1" comment="php5-json is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190821" version="1" comment="php5-ldap is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190822" version="1" comment="php5-mbstring is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190823" version="1" comment="php5-mcrypt is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190824" version="1" comment="php5-mysql is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190825" version="1" comment="php5-odbc is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190826" version="1" comment="php5-opcache is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190827" version="1" comment="php5-openssl is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190828" version="1" comment="php5-pcntl is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190829" version="1" comment="php5-pdo is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190830" version="1" comment="php5-pear is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190831" version="1" comment="php5-pgsql is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190832" version="1" comment="php5-phar is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190833" version="1" comment="php5-posix is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190834" version="1" comment="php5-pspell is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190835" version="1" comment="php5-shmop is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190836" version="1" comment="php5-snmp is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190837" version="1" comment="php5-soap is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190838" version="1" comment="php5-sockets is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190839" version="1" comment="php5-sqlite is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190840" version="1" comment="php5-suhosin is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190841" version="1" comment="php5-sysvmsg is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190842" version="1" comment="php5-sysvsem is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190843" version="1" comment="php5-sysvshm is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190844" version="1" comment="php5-tokenizer is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190845" version="1" comment="php5-wddx is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190846" version="1" comment="php5-xmlreader is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190847" version="1" comment="php5-xmlrpc is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190848" version="1" comment="php5-xmlwriter is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190849" version="1" comment="php5-xsl is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190850" version="1" comment="php5-zip is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190851" version="1" comment="php5-zlib is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190852" version="1" comment="apache2-mod_php5 is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190853" version="1" comment="php5 is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190854" version="1" comment="php5-bcmath is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190855" version="1" comment="php5-bz2 is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190856" version="1" comment="php5-calendar is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190857" version="1" comment="php5-ctype is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190858" version="1" comment="php5-curl is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190859" version="1" comment="php5-dba is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190860" version="1" comment="php5-dom is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190861" version="1" comment="php5-enchant is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190862" version="1" comment="php5-exif is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190863" version="1" comment="php5-fastcgi is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190864" version="1" comment="php5-fileinfo is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190865" version="1" comment="php5-fpm is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190866" version="1" comment="php5-ftp is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190867" version="1" comment="php5-gd is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190868" version="1" comment="php5-gettext is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190869" version="1" comment="php5-gmp is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190870" version="1" comment="php5-iconv is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190871" version="1" comment="php5-imap is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190872" version="1" comment="php5-intl is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190873" version="1" comment="php5-json is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190874" version="1" comment="php5-ldap is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190875" version="1" comment="php5-mbstring is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190876" version="1" comment="php5-mcrypt is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190877" version="1" comment="php5-mysql is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190878" version="1" comment="php5-odbc is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190879" version="1" comment="php5-opcache is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190880" version="1" comment="php5-openssl is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190881" version="1" comment="php5-pcntl is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190882" version="1" comment="php5-pdo is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190883" version="1" comment="php5-pear is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190884" version="1" comment="php5-pgsql is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190885" version="1" comment="php5-phar is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190886" version="1" comment="php5-posix is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190887" version="1" comment="php5-pspell is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190888" version="1" comment="php5-shmop is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190889" version="1" comment="php5-snmp is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190890" version="1" comment="php5-soap is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190891" version="1" comment="php5-sockets is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190892" version="1" comment="php5-sqlite is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190893" version="1" comment="php5-suhosin is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190894" version="1" comment="php5-sysvmsg is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190895" version="1" comment="php5-sysvsem is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190896" version="1" comment="php5-sysvshm is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190897" version="1" comment="php5-tokenizer is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190898" version="1" comment="php5-wddx is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190899" version="1" comment="php5-xmlreader is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190900" version="1" comment="php5-xmlrpc is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190901" version="1" comment="php5-xmlwriter is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190902" version="1" comment="php5-xsl is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190903" version="1" comment="php5-zip is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190904" version="1" comment="php5-zlib is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190905" version="1" comment="apache2-mod_php5 is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190906" version="1" comment="php5 is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190907" version="1" comment="php5-bcmath is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190908" version="1" comment="php5-bz2 is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190909" version="1" comment="php5-calendar is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190910" version="1" comment="php5-ctype is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190911" version="1" comment="php5-curl is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190912" version="1" comment="php5-dba is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190913" version="1" comment="php5-dom is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190914" version="1" comment="php5-enchant is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190915" version="1" comment="php5-exif is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190916" version="1" comment="php5-fastcgi is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190917" version="1" comment="php5-fileinfo is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190918" version="1" comment="php5-fpm is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190919" version="1" comment="php5-ftp is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190920" version="1" comment="php5-gd is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190921" version="1" comment="php5-gettext is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190922" version="1" comment="php5-gmp is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190923" version="1" comment="php5-iconv is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190924" version="1" comment="php5-imap is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190925" version="1" comment="php5-intl is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190926" version="1" comment="php5-json is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190927" version="1" comment="php5-ldap is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190928" version="1" comment="php5-mbstring is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190929" version="1" comment="php5-mcrypt is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190930" version="1" comment="php5-mysql is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190931" version="1" comment="php5-odbc is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190932" version="1" comment="php5-opcache is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190933" version="1" comment="php5-openssl is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190934" version="1" comment="php5-pcntl is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190935" version="1" comment="php5-pdo is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190936" version="1" comment="php5-pear is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190937" version="1" comment="php5-pgsql is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190938" version="1" comment="php5-phar is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190939" version="1" comment="php5-posix is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190940" version="1" comment="php5-pspell is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190941" version="1" comment="php5-shmop is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190942" version="1" comment="php5-snmp is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190943" version="1" comment="php5-soap is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190944" version="1" comment="php5-sockets is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190945" version="1" comment="php5-sqlite is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190946" version="1" comment="php5-suhosin is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190947" version="1" comment="php5-sysvmsg is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190948" version="1" comment="php5-sysvsem is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190949" version="1" comment="php5-sysvshm is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190950" version="1" comment="php5-tokenizer is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190951" version="1" comment="php5-wddx is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190952" version="1" comment="php5-xmlreader is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190953" version="1" comment="php5-xmlrpc is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190954" version="1" comment="php5-xmlwriter is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190955" version="1" comment="php5-xsl is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190956" version="1" comment="php5-zip is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190957" version="1" comment="php5-zlib is &lt;5.5.14-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190958" version="1" comment="apache2-mod_php7 is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190959" version="1" comment="php7 is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190960" version="1" comment="php7-bcmath is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190961" version="1" comment="php7-bz2 is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190962" version="1" comment="php7-calendar is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190963" version="1" comment="php7-ctype is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190964" version="1" comment="php7-curl is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190965" version="1" comment="php7-dba is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190966" version="1" comment="php7-dom is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190967" version="1" comment="php7-enchant is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190968" version="1" comment="php7-exif is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190969" version="1" comment="php7-fastcgi is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190970" version="1" comment="php7-fileinfo is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190971" version="1" comment="php7-fpm is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190972" version="1" comment="php7-ftp is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190973" version="1" comment="php7-gd is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190974" version="1" comment="php7-gettext is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190975" version="1" comment="php7-gmp is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190976" version="1" comment="php7-iconv is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190977" version="1" comment="php7-imap is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190978" version="1" comment="php7-intl is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190979" version="1" comment="php7-json is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190980" version="1" comment="php7-ldap is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190981" version="1" comment="php7-mbstring is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190982" version="1" comment="php7-mcrypt is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190983" version="1" comment="php7-mysql is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190984" version="1" comment="php7-odbc is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190985" version="1" comment="php7-opcache is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190986" version="1" comment="php7-openssl is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190987" version="1" comment="php7-pcntl is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190988" version="1" comment="php7-pdo is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190989" version="1" comment="php7-pear is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190990" version="1" comment="php7-pear-Archive_Tar is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190991" version="1" comment="php7-pgsql is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190992" version="1" comment="php7-phar is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190993" version="1" comment="php7-posix is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190994" version="1" comment="php7-pspell is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190995" version="1" comment="php7-shmop is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190996" version="1" comment="php7-snmp is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190997" version="1" comment="php7-soap is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190998" version="1" comment="php7-sockets is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009190999" version="1" comment="php7-sqlite is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191000" version="1" comment="php7-sysvmsg is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191001" version="1" comment="php7-sysvsem is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191002" version="1" comment="php7-sysvshm is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191003" version="1" comment="php7-tokenizer is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191004" version="1" comment="php7-wddx is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191005" version="1" comment="php7-xmlreader is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191006" version="1" comment="php7-xmlrpc is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191007" version="1" comment="php7-xmlwriter is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191008" version="1" comment="php7-xsl is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191009" version="1" comment="php7-zip is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191010" version="1" comment="php7-zlib is &lt;7.0.7-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191011" version="1" comment="nodejs-common is &lt;1.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191012" version="1" comment="nodejs4 is &lt;4.8.4-15.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191013" version="1" comment="nodejs4-devel is &lt;4.8.4-15.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191014" version="1" comment="nodejs4-docs is &lt;4.8.4-15.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191015" version="1" comment="nodejs6 is &lt;6.11.1-11.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191016" version="1" comment="nodejs6-devel is &lt;6.11.1-11.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191017" version="1" comment="nodejs6-docs is &lt;6.11.1-11.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191018" version="1" comment="npm4 is &lt;4.8.4-15.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191019" version="1" comment="npm6 is &lt;6.11.1-11.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191020" version="1" comment="apache2-mod_php7 is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191021" version="1" comment="php7 is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191022" version="1" comment="php7-bcmath is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191023" version="1" comment="php7-bz2 is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191024" version="1" comment="php7-calendar is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191025" version="1" comment="php7-ctype is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191026" version="1" comment="php7-curl is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191027" version="1" comment="php7-dba is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191028" version="1" comment="php7-dom is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191029" version="1" comment="php7-enchant is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191030" version="1" comment="php7-exif is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191031" version="1" comment="php7-fastcgi is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191032" version="1" comment="php7-fileinfo is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191033" version="1" comment="php7-fpm is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191034" version="1" comment="php7-ftp is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191035" version="1" comment="php7-gd is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191036" version="1" comment="php7-gettext is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191037" version="1" comment="php7-gmp is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191038" version="1" comment="php7-iconv is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191039" version="1" comment="php7-imap is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191040" version="1" comment="php7-intl is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191041" version="1" comment="php7-json is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191042" version="1" comment="php7-ldap is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191043" version="1" comment="php7-mbstring is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191044" version="1" comment="php7-mcrypt is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191045" version="1" comment="php7-mysql is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191046" version="1" comment="php7-odbc is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191047" version="1" comment="php7-opcache is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191048" version="1" comment="php7-openssl is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191049" version="1" comment="php7-pcntl is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191050" version="1" comment="php7-pdo is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191051" version="1" comment="php7-pear is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191052" version="1" comment="php7-pear-Archive_Tar is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191053" version="1" comment="php7-pgsql is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191054" version="1" comment="php7-phar is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191055" version="1" comment="php7-posix is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191056" version="1" comment="php7-pspell is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191057" version="1" comment="php7-shmop is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191058" version="1" comment="php7-snmp is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191059" version="1" comment="php7-soap is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191060" version="1" comment="php7-sockets is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191061" version="1" comment="php7-sqlite is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191062" version="1" comment="php7-sysvmsg is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191063" version="1" comment="php7-sysvsem is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191064" version="1" comment="php7-sysvshm is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191065" version="1" comment="php7-tokenizer is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191066" version="1" comment="php7-wddx is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191067" version="1" comment="php7-xmlreader is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191068" version="1" comment="php7-xmlrpc is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191069" version="1" comment="php7-xmlwriter is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191070" version="1" comment="php7-xsl is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191071" version="1" comment="php7-zip is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191072" version="1" comment="php7-zlib is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191073" version="1" comment="apache2-mod_php5 is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191074" version="1" comment="php5 is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191075" version="1" comment="php5-bcmath is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191076" version="1" comment="php5-bz2 is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191077" version="1" comment="php5-calendar is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191078" version="1" comment="php5-ctype is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191079" version="1" comment="php5-curl is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191080" version="1" comment="php5-dba is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191081" version="1" comment="php5-dom is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191082" version="1" comment="php5-enchant is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191083" version="1" comment="php5-exif is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191084" version="1" comment="php5-fastcgi is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191085" version="1" comment="php5-fileinfo is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191086" version="1" comment="php5-fpm is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191087" version="1" comment="php5-ftp is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191088" version="1" comment="php5-gd is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191089" version="1" comment="php5-gettext is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191090" version="1" comment="php5-gmp is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191091" version="1" comment="php5-iconv is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191092" version="1" comment="php5-imap is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191093" version="1" comment="php5-intl is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191094" version="1" comment="php5-json is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191095" version="1" comment="php5-ldap is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191096" version="1" comment="php5-mbstring is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191097" version="1" comment="php5-mcrypt is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191098" version="1" comment="php5-mysql is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191099" version="1" comment="php5-odbc is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191100" version="1" comment="php5-opcache is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191101" version="1" comment="php5-openssl is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191102" version="1" comment="php5-pcntl is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191103" version="1" comment="php5-pdo is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191104" version="1" comment="php5-pear is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191105" version="1" comment="php5-pgsql is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191106" version="1" comment="php5-phar is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191107" version="1" comment="php5-posix is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191108" version="1" comment="php5-pspell is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191109" version="1" comment="php5-shmop is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191110" version="1" comment="php5-snmp is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191111" version="1" comment="php5-soap is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191112" version="1" comment="php5-sockets is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191113" version="1" comment="php5-sqlite is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191114" version="1" comment="php5-suhosin is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191115" version="1" comment="php5-sysvmsg is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191116" version="1" comment="php5-sysvsem is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191117" version="1" comment="php5-sysvshm is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191118" version="1" comment="php5-tokenizer is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191119" version="1" comment="php5-wddx is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191120" version="1" comment="php5-xmlreader is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191121" version="1" comment="php5-xmlrpc is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191122" version="1" comment="php5-xmlwriter is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191123" version="1" comment="php5-xsl is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191124" version="1" comment="php5-zip is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191125" version="1" comment="php5-zlib is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191126" version="1" comment="apache2-mod_php7 is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191127" version="1" comment="php7 is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191128" version="1" comment="php7-bcmath is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191129" version="1" comment="php7-bz2 is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191130" version="1" comment="php7-calendar is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191131" version="1" comment="php7-ctype is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191132" version="1" comment="php7-curl is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191133" version="1" comment="php7-dba is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191134" version="1" comment="php7-dom is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191135" version="1" comment="php7-enchant is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191136" version="1" comment="php7-exif is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191137" version="1" comment="php7-fastcgi is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191138" version="1" comment="php7-fileinfo is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191139" version="1" comment="php7-fpm is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191140" version="1" comment="php7-ftp is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191141" version="1" comment="php7-gd is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191142" version="1" comment="php7-gettext is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191143" version="1" comment="php7-gmp is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191144" version="1" comment="php7-iconv is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191145" version="1" comment="php7-imap is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191146" version="1" comment="php7-intl is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191147" version="1" comment="php7-json is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191148" version="1" comment="php7-ldap is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191149" version="1" comment="php7-mbstring is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191150" version="1" comment="php7-mcrypt is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191151" version="1" comment="php7-mysql is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191152" version="1" comment="php7-odbc is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191153" version="1" comment="php7-opcache is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191154" version="1" comment="php7-openssl is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191155" version="1" comment="php7-pcntl is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191156" version="1" comment="php7-pdo is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191157" version="1" comment="php7-pear is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191158" version="1" comment="php7-pear-Archive_Tar is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191159" version="1" comment="php7-pgsql is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191160" version="1" comment="php7-phar is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191161" version="1" comment="php7-posix is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191162" version="1" comment="php7-pspell is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191163" version="1" comment="php7-shmop is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191164" version="1" comment="php7-snmp is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191165" version="1" comment="php7-soap is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191166" version="1" comment="php7-sockets is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191167" version="1" comment="php7-sqlite is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191168" version="1" comment="php7-sysvmsg is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191169" version="1" comment="php7-sysvsem is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191170" version="1" comment="php7-sysvshm is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191171" version="1" comment="php7-tokenizer is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191172" version="1" comment="php7-wddx is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191173" version="1" comment="php7-xmlreader is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191174" version="1" comment="php7-xmlrpc is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191175" version="1" comment="php7-xmlwriter is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191176" version="1" comment="php7-xsl is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191177" version="1" comment="php7-zip is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191178" version="1" comment="php7-zlib is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191179" version="1" comment="apache2-mod_php5 is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191180" version="1" comment="php5 is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191181" version="1" comment="php5-bcmath is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191182" version="1" comment="php5-bz2 is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191183" version="1" comment="php5-calendar is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191184" version="1" comment="php5-ctype is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191185" version="1" comment="php5-curl is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191186" version="1" comment="php5-dba is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191187" version="1" comment="php5-dom is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191188" version="1" comment="php5-enchant is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191189" version="1" comment="php5-exif is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191190" version="1" comment="php5-fastcgi is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191191" version="1" comment="php5-fileinfo is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191192" version="1" comment="php5-fpm is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191193" version="1" comment="php5-ftp is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191194" version="1" comment="php5-gd is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191195" version="1" comment="php5-gettext is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191196" version="1" comment="php5-gmp is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191197" version="1" comment="php5-iconv is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191198" version="1" comment="php5-imap is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191199" version="1" comment="php5-intl is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191200" version="1" comment="php5-json is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191201" version="1" comment="php5-ldap is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191202" version="1" comment="php5-mbstring is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191203" version="1" comment="php5-mcrypt is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191204" version="1" comment="php5-mysql is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191205" version="1" comment="php5-odbc is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191206" version="1" comment="php5-opcache is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191207" version="1" comment="php5-openssl is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191208" version="1" comment="php5-pcntl is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191209" version="1" comment="php5-pdo is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191210" version="1" comment="php5-pear is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191211" version="1" comment="php5-pgsql is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191212" version="1" comment="php5-phar is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191213" version="1" comment="php5-posix is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191214" version="1" comment="php5-pspell is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191215" version="1" comment="php5-shmop is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191216" version="1" comment="php5-snmp is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191217" version="1" comment="php5-soap is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191218" version="1" comment="php5-sockets is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191219" version="1" comment="php5-sqlite is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191220" version="1" comment="php5-suhosin is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191221" version="1" comment="php5-sysvmsg is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191222" version="1" comment="php5-sysvsem is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191223" version="1" comment="php5-sysvshm is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191224" version="1" comment="php5-tokenizer is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191225" version="1" comment="php5-wddx is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191226" version="1" comment="php5-xmlreader is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191227" version="1" comment="php5-xmlrpc is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191228" version="1" comment="php5-xmlwriter is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191229" version="1" comment="php5-xsl is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191230" version="1" comment="php5-zip is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191231" version="1" comment="php5-zlib is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191232" version="1" comment="apache2-mod_php7 is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191233" version="1" comment="php7 is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191234" version="1" comment="php7-bcmath is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191235" version="1" comment="php7-bz2 is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191236" version="1" comment="php7-calendar is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191237" version="1" comment="php7-ctype is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191238" version="1" comment="php7-curl is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191239" version="1" comment="php7-dba is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191240" version="1" comment="php7-dom is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191241" version="1" comment="php7-enchant is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191242" version="1" comment="php7-exif is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191243" version="1" comment="php7-fastcgi is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191244" version="1" comment="php7-fileinfo is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191245" version="1" comment="php7-fpm is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191246" version="1" comment="php7-ftp is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191247" version="1" comment="php7-gd is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191248" version="1" comment="php7-gettext is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191249" version="1" comment="php7-gmp is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191250" version="1" comment="php7-iconv is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191251" version="1" comment="php7-imap is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191252" version="1" comment="php7-intl is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191253" version="1" comment="php7-json is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191254" version="1" comment="php7-ldap is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191255" version="1" comment="php7-mbstring is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191256" version="1" comment="php7-mcrypt is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191257" version="1" comment="php7-mysql is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191258" version="1" comment="php7-odbc is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191259" version="1" comment="php7-opcache is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191260" version="1" comment="php7-openssl is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191261" version="1" comment="php7-pcntl is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191262" version="1" comment="php7-pdo is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191263" version="1" comment="php7-pear is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191264" version="1" comment="php7-pear-Archive_Tar is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191265" version="1" comment="php7-pgsql is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191266" version="1" comment="php7-phar is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191267" version="1" comment="php7-posix is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191268" version="1" comment="php7-pspell is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191269" version="1" comment="php7-shmop is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191270" version="1" comment="php7-snmp is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191271" version="1" comment="php7-soap is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191272" version="1" comment="php7-sockets is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191273" version="1" comment="php7-sqlite is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191274" version="1" comment="php7-sysvmsg is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191275" version="1" comment="php7-sysvsem is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191276" version="1" comment="php7-sysvshm is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191277" version="1" comment="php7-tokenizer is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191278" version="1" comment="php7-wddx is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191279" version="1" comment="php7-xmlreader is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191280" version="1" comment="php7-xmlrpc is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191281" version="1" comment="php7-xmlwriter is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191282" version="1" comment="php7-xsl is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191283" version="1" comment="php7-zip is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191284" version="1" comment="php7-zlib is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191285" version="1" comment="apache2-mod_php5 is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191286" version="1" comment="php5 is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191287" version="1" comment="php5-bcmath is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191288" version="1" comment="php5-bz2 is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191289" version="1" comment="php5-calendar is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191290" version="1" comment="php5-ctype is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191291" version="1" comment="php5-curl is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191292" version="1" comment="php5-dba is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191293" version="1" comment="php5-dom is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191294" version="1" comment="php5-enchant is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191295" version="1" comment="php5-exif is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191296" version="1" comment="php5-fastcgi is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191297" version="1" comment="php5-fileinfo is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191298" version="1" comment="php5-fpm is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191299" version="1" comment="php5-ftp is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191300" version="1" comment="php5-gd is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191301" version="1" comment="php5-gettext is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191302" version="1" comment="php5-gmp is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191303" version="1" comment="php5-iconv is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191304" version="1" comment="php5-imap is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191305" version="1" comment="php5-intl is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191306" version="1" comment="php5-json is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191307" version="1" comment="php5-ldap is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191308" version="1" comment="php5-mbstring is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191309" version="1" comment="php5-mcrypt is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191310" version="1" comment="php5-mysql is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191311" version="1" comment="php5-odbc is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191312" version="1" comment="php5-opcache is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191313" version="1" comment="php5-openssl is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191314" version="1" comment="php5-pcntl is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191315" version="1" comment="php5-pdo is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191316" version="1" comment="php5-pear is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191317" version="1" comment="php5-pgsql is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191318" version="1" comment="php5-phar is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191319" version="1" comment="php5-posix is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191320" version="1" comment="php5-pspell is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191321" version="1" comment="php5-shmop is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191322" version="1" comment="php5-snmp is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191323" version="1" comment="php5-soap is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191324" version="1" comment="php5-sockets is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191325" version="1" comment="php5-sqlite is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191326" version="1" comment="php5-suhosin is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191327" version="1" comment="php5-sysvmsg is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191328" version="1" comment="php5-sysvsem is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191329" version="1" comment="php5-sysvshm is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191330" version="1" comment="php5-tokenizer is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191331" version="1" comment="php5-wddx is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191332" version="1" comment="php5-xmlreader is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191333" version="1" comment="php5-xmlrpc is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191334" version="1" comment="php5-xmlwriter is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191335" version="1" comment="php5-xsl is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191336" version="1" comment="php5-zip is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191337" version="1" comment="php5-zlib is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191338" version="1" comment="apache2-mod_php5 is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191339" version="1" comment="php5 is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191340" version="1" comment="php5-bcmath is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191341" version="1" comment="php5-bz2 is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191342" version="1" comment="php5-calendar is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191343" version="1" comment="php5-ctype is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191344" version="1" comment="php5-curl is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191345" version="1" comment="php5-dba is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191346" version="1" comment="php5-dom is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191347" version="1" comment="php5-enchant is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191348" version="1" comment="php5-exif is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191349" version="1" comment="php5-fastcgi is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191350" version="1" comment="php5-fileinfo is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191351" version="1" comment="php5-fpm is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191352" version="1" comment="php5-ftp is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191353" version="1" comment="php5-gd is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191354" version="1" comment="php5-gettext is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191355" version="1" comment="php5-gmp is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191356" version="1" comment="php5-iconv is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191357" version="1" comment="php5-imap is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191358" version="1" comment="php5-intl is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191359" version="1" comment="php5-json is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191360" version="1" comment="php5-ldap is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191361" version="1" comment="php5-mbstring is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191362" version="1" comment="php5-mcrypt is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191363" version="1" comment="php5-mysql is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191364" version="1" comment="php5-odbc is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191365" version="1" comment="php5-opcache is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191366" version="1" comment="php5-openssl is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191367" version="1" comment="php5-pcntl is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191368" version="1" comment="php5-pdo is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191369" version="1" comment="php5-pear is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191370" version="1" comment="php5-pgsql is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191371" version="1" comment="php5-phar is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191372" version="1" comment="php5-posix is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191373" version="1" comment="php5-pspell is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191374" version="1" comment="php5-shmop is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191375" version="1" comment="php5-snmp is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191376" version="1" comment="php5-soap is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191377" version="1" comment="php5-sockets is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191378" version="1" comment="php5-sqlite is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191379" version="1" comment="php5-suhosin is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191380" version="1" comment="php5-sysvmsg is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191381" version="1" comment="php5-sysvsem is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191382" version="1" comment="php5-sysvshm is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191383" version="1" comment="php5-tokenizer is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191384" version="1" comment="php5-wddx is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191385" version="1" comment="php5-xmlreader is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191386" version="1" comment="php5-xmlrpc is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191387" version="1" comment="php5-xmlwriter is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191388" version="1" comment="php5-xsl is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191389" version="1" comment="php5-zip is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191390" version="1" comment="php5-zlib is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191391" version="1" comment="apache2-mod_php7 is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191392" version="1" comment="php7 is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191393" version="1" comment="php7-bcmath is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191394" version="1" comment="php7-bz2 is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191395" version="1" comment="php7-calendar is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191396" version="1" comment="php7-ctype is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191397" version="1" comment="php7-curl is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191398" version="1" comment="php7-dba is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191399" version="1" comment="php7-dom is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191400" version="1" comment="php7-enchant is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191401" version="1" comment="php7-exif is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191402" version="1" comment="php7-fastcgi is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191403" version="1" comment="php7-fileinfo is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191404" version="1" comment="php7-fpm is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191405" version="1" comment="php7-ftp is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191406" version="1" comment="php7-gd is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191407" version="1" comment="php7-gettext is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191408" version="1" comment="php7-gmp is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191409" version="1" comment="php7-iconv is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191410" version="1" comment="php7-imap is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191411" version="1" comment="php7-intl is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191412" version="1" comment="php7-json is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191413" version="1" comment="php7-ldap is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191414" version="1" comment="php7-mbstring is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191415" version="1" comment="php7-mcrypt is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191416" version="1" comment="php7-mysql is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191417" version="1" comment="php7-odbc is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191418" version="1" comment="php7-opcache is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191419" version="1" comment="php7-openssl is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191420" version="1" comment="php7-pcntl is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191421" version="1" comment="php7-pdo is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191422" version="1" comment="php7-pear is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191423" version="1" comment="php7-pear-Archive_Tar is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191424" version="1" comment="php7-pgsql is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191425" version="1" comment="php7-phar is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191426" version="1" comment="php7-posix is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191427" version="1" comment="php7-pspell is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191428" version="1" comment="php7-shmop is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191429" version="1" comment="php7-snmp is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191430" version="1" comment="php7-soap is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191431" version="1" comment="php7-sockets is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191432" version="1" comment="php7-sqlite is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191433" version="1" comment="php7-sysvmsg is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191434" version="1" comment="php7-sysvsem is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191435" version="1" comment="php7-sysvshm is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191436" version="1" comment="php7-tokenizer is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191437" version="1" comment="php7-wddx is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191438" version="1" comment="php7-xmlreader is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191439" version="1" comment="php7-xmlrpc is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191440" version="1" comment="php7-xmlwriter is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191441" version="1" comment="php7-xsl is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191442" version="1" comment="php7-zip is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191443" version="1" comment="php7-zlib is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191444" version="1" comment="apache2-mod_php5 is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191445" version="1" comment="php5 is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191446" version="1" comment="php5-bcmath is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191447" version="1" comment="php5-bz2 is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191448" version="1" comment="php5-calendar is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191449" version="1" comment="php5-ctype is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191450" version="1" comment="php5-curl is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191451" version="1" comment="php5-dba is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191452" version="1" comment="php5-dom is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191453" version="1" comment="php5-enchant is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191454" version="1" comment="php5-exif is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191455" version="1" comment="php5-fastcgi is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191456" version="1" comment="php5-fileinfo is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191457" version="1" comment="php5-fpm is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191458" version="1" comment="php5-ftp is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191459" version="1" comment="php5-gd is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191460" version="1" comment="php5-gettext is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191461" version="1" comment="php5-gmp is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191462" version="1" comment="php5-iconv is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191463" version="1" comment="php5-imap is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191464" version="1" comment="php5-intl is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191465" version="1" comment="php5-json is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191466" version="1" comment="php5-ldap is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191467" version="1" comment="php5-mbstring is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191468" version="1" comment="php5-mcrypt is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191469" version="1" comment="php5-mysql is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191470" version="1" comment="php5-odbc is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191471" version="1" comment="php5-opcache is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191472" version="1" comment="php5-openssl is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191473" version="1" comment="php5-pcntl is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191474" version="1" comment="php5-pdo is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191475" version="1" comment="php5-pear is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191476" version="1" comment="php5-pgsql is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191477" version="1" comment="php5-phar is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191478" version="1" comment="php5-posix is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191479" version="1" comment="php5-pspell is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191480" version="1" comment="php5-shmop is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191481" version="1" comment="php5-snmp is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191482" version="1" comment="php5-soap is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191483" version="1" comment="php5-sockets is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191484" version="1" comment="php5-sqlite is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191485" version="1" comment="php5-suhosin is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191486" version="1" comment="php5-sysvmsg is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191487" version="1" comment="php5-sysvsem is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191488" version="1" comment="php5-sysvshm is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191489" version="1" comment="php5-tokenizer is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191490" version="1" comment="php5-wddx is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191491" version="1" comment="php5-xmlreader is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191492" version="1" comment="php5-xmlrpc is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191493" version="1" comment="php5-xmlwriter is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191494" version="1" comment="php5-xsl is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191495" version="1" comment="php5-zip is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191496" version="1" comment="php5-zlib is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191497" version="1" comment="apache2-mod_php5 is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191498" version="1" comment="php5 is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191499" version="1" comment="php5-bcmath is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191500" version="1" comment="php5-bz2 is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191501" version="1" comment="php5-calendar is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191502" version="1" comment="php5-ctype is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191503" version="1" comment="php5-curl is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191504" version="1" comment="php5-dba is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191505" version="1" comment="php5-dom is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191506" version="1" comment="php5-enchant is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191507" version="1" comment="php5-exif is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191508" version="1" comment="php5-fastcgi is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191509" version="1" comment="php5-fileinfo is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191510" version="1" comment="php5-fpm is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191511" version="1" comment="php5-ftp is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191512" version="1" comment="php5-gd is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191513" version="1" comment="php5-gettext is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191514" version="1" comment="php5-gmp is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191515" version="1" comment="php5-iconv is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191516" version="1" comment="php5-imap is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191517" version="1" comment="php5-intl is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191518" version="1" comment="php5-json is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191519" version="1" comment="php5-ldap is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191520" version="1" comment="php5-mbstring is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191521" version="1" comment="php5-mcrypt is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191522" version="1" comment="php5-mysql is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191523" version="1" comment="php5-odbc is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191524" version="1" comment="php5-opcache is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191525" version="1" comment="php5-openssl is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191526" version="1" comment="php5-pcntl is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191527" version="1" comment="php5-pdo is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191528" version="1" comment="php5-pear is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191529" version="1" comment="php5-pgsql is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191530" version="1" comment="php5-phar is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191531" version="1" comment="php5-posix is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191532" version="1" comment="php5-pspell is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191533" version="1" comment="php5-shmop is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191534" version="1" comment="php5-snmp is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191535" version="1" comment="php5-soap is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191536" version="1" comment="php5-sockets is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191537" version="1" comment="php5-sqlite is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191538" version="1" comment="php5-suhosin is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191539" version="1" comment="php5-sysvmsg is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191540" version="1" comment="php5-sysvsem is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191541" version="1" comment="php5-sysvshm is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191542" version="1" comment="php5-tokenizer is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191543" version="1" comment="php5-wddx is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191544" version="1" comment="php5-xmlreader is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191545" version="1" comment="php5-xmlrpc is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191546" version="1" comment="php5-xmlwriter is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191547" version="1" comment="php5-xsl is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191548" version="1" comment="php5-zip is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191549" version="1" comment="php5-zlib is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191550" version="1" comment="nodejs4 is &lt;4.7.3-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191551" version="1" comment="nodejs4-devel is &lt;4.7.3-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191552" version="1" comment="nodejs4-docs is &lt;4.7.3-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191553" version="1" comment="npm4 is &lt;4.7.3-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191554" version="1" comment="apache2-mod_php7 is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191555" version="1" comment="php7 is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191556" version="1" comment="php7-bcmath is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191557" version="1" comment="php7-bz2 is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191558" version="1" comment="php7-calendar is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191559" version="1" comment="php7-ctype is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191560" version="1" comment="php7-curl is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191561" version="1" comment="php7-dba is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191562" version="1" comment="php7-dom is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191563" version="1" comment="php7-enchant is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191564" version="1" comment="php7-exif is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191565" version="1" comment="php7-fastcgi is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191566" version="1" comment="php7-fileinfo is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191567" version="1" comment="php7-fpm is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191568" version="1" comment="php7-ftp is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191569" version="1" comment="php7-gd is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191570" version="1" comment="php7-gettext is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191571" version="1" comment="php7-gmp is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191572" version="1" comment="php7-iconv is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191573" version="1" comment="php7-imap is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191574" version="1" comment="php7-intl is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191575" version="1" comment="php7-json is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191576" version="1" comment="php7-ldap is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191577" version="1" comment="php7-mbstring is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191578" version="1" comment="php7-mcrypt is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191579" version="1" comment="php7-mysql is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191580" version="1" comment="php7-odbc is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191581" version="1" comment="php7-opcache is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191582" version="1" comment="php7-openssl is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191583" version="1" comment="php7-pcntl is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191584" version="1" comment="php7-pdo is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191585" version="1" comment="php7-pear is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191586" version="1" comment="php7-pear-Archive_Tar is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191587" version="1" comment="php7-pgsql is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191588" version="1" comment="php7-phar is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191589" version="1" comment="php7-posix is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191590" version="1" comment="php7-pspell is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191591" version="1" comment="php7-shmop is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191592" version="1" comment="php7-snmp is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191593" version="1" comment="php7-soap is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191594" version="1" comment="php7-sockets is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191595" version="1" comment="php7-sqlite is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191596" version="1" comment="php7-sysvmsg is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191597" version="1" comment="php7-sysvsem is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191598" version="1" comment="php7-sysvshm is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191599" version="1" comment="php7-tokenizer is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191600" version="1" comment="php7-wddx is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191601" version="1" comment="php7-xmlreader is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191602" version="1" comment="php7-xmlrpc is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191603" version="1" comment="php7-xmlwriter is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191604" version="1" comment="php7-xsl is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191605" version="1" comment="php7-zip is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191606" version="1" comment="php7-zlib is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191607" version="1" comment="apache2-mod_php7 is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191608" version="1" comment="php7 is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191609" version="1" comment="php7-bcmath is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191610" version="1" comment="php7-bz2 is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191611" version="1" comment="php7-calendar is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191612" version="1" comment="php7-ctype is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191613" version="1" comment="php7-curl is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191614" version="1" comment="php7-dba is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191615" version="1" comment="php7-dom is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191616" version="1" comment="php7-enchant is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191617" version="1" comment="php7-exif is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191618" version="1" comment="php7-fastcgi is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191619" version="1" comment="php7-fileinfo is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191620" version="1" comment="php7-fpm is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191621" version="1" comment="php7-ftp is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191622" version="1" comment="php7-gd is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191623" version="1" comment="php7-gettext is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191624" version="1" comment="php7-gmp is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191625" version="1" comment="php7-iconv is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191626" version="1" comment="php7-imap is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191627" version="1" comment="php7-intl is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191628" version="1" comment="php7-json is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191629" version="1" comment="php7-ldap is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191630" version="1" comment="php7-mbstring is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191631" version="1" comment="php7-mcrypt is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191632" version="1" comment="php7-mysql is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191633" version="1" comment="php7-odbc is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191634" version="1" comment="php7-opcache is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191635" version="1" comment="php7-openssl is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191636" version="1" comment="php7-pcntl is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191637" version="1" comment="php7-pdo is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191638" version="1" comment="php7-pear is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191639" version="1" comment="php7-pear-Archive_Tar is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191640" version="1" comment="php7-pgsql is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191641" version="1" comment="php7-phar is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191642" version="1" comment="php7-posix is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191643" version="1" comment="php7-pspell is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191644" version="1" comment="php7-shmop is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191645" version="1" comment="php7-snmp is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191646" version="1" comment="php7-soap is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191647" version="1" comment="php7-sockets is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191648" version="1" comment="php7-sqlite is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191649" version="1" comment="php7-sysvmsg is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191650" version="1" comment="php7-sysvsem is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191651" version="1" comment="php7-sysvshm is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191652" version="1" comment="php7-tokenizer is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191653" version="1" comment="php7-wddx is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191654" version="1" comment="php7-xmlreader is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191655" version="1" comment="php7-xmlrpc is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191656" version="1" comment="php7-xmlwriter is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191657" version="1" comment="php7-xsl is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191658" version="1" comment="php7-zip is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191659" version="1" comment="php7-zlib is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229745" version="1" comment="apache2-mod_php7 is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229746" version="1" comment="php7 is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229747" version="1" comment="php7-bcmath is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229748" version="1" comment="php7-bz2 is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229749" version="1" comment="php7-calendar is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229750" version="1" comment="php7-ctype is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229751" version="1" comment="php7-curl is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229752" version="1" comment="php7-dba is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229753" version="1" comment="php7-dom is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229754" version="1" comment="php7-enchant is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229755" version="1" comment="php7-exif is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229756" version="1" comment="php7-fastcgi is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229757" version="1" comment="php7-fileinfo is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229758" version="1" comment="php7-fpm is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229759" version="1" comment="php7-ftp is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229760" version="1" comment="php7-gd is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229761" version="1" comment="php7-gettext is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229762" version="1" comment="php7-gmp is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229763" version="1" comment="php7-iconv is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229764" version="1" comment="php7-imap is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229765" version="1" comment="php7-intl is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229766" version="1" comment="php7-json is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229767" version="1" comment="php7-ldap is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229768" version="1" comment="php7-mbstring is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229769" version="1" comment="php7-mcrypt is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229770" version="1" comment="php7-mysql is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229771" version="1" comment="php7-odbc is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229772" version="1" comment="php7-opcache is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229773" version="1" comment="php7-openssl is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229774" version="1" comment="php7-pcntl is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229775" version="1" comment="php7-pdo is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229776" version="1" comment="php7-pear is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229777" version="1" comment="php7-pear-Archive_Tar is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229778" version="1" comment="php7-pgsql is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229779" version="1" comment="php7-phar is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229780" version="1" comment="php7-posix is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229781" version="1" comment="php7-pspell is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229782" version="1" comment="php7-shmop is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229783" version="1" comment="php7-snmp is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229784" version="1" comment="php7-soap is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229785" version="1" comment="php7-sockets is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229786" version="1" comment="php7-sqlite is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229787" version="1" comment="php7-sysvmsg is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229788" version="1" comment="php7-sysvsem is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229789" version="1" comment="php7-sysvshm is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229790" version="1" comment="php7-tokenizer is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229791" version="1" comment="php7-wddx is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229792" version="1" comment="php7-xmlreader is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229793" version="1" comment="php7-xmlrpc is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229794" version="1" comment="php7-xmlwriter is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229795" version="1" comment="php7-xsl is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229796" version="1" comment="php7-zip is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229797" version="1" comment="php7-zlib is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229798" version="1" comment="nodejs6 is &lt;6.14.3-11.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229799" version="1" comment="nodejs6-devel is &lt;6.14.3-11.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229800" version="1" comment="nodejs6-docs is &lt;6.14.3-11.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229801" version="1" comment="npm6 is &lt;6.14.3-11.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191660" version="1" comment="apache2-mod_php5 is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191661" version="1" comment="php5 is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191662" version="1" comment="php5-bcmath is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191663" version="1" comment="php5-bz2 is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191664" version="1" comment="php5-calendar is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191665" version="1" comment="php5-ctype is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191666" version="1" comment="php5-curl is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191667" version="1" comment="php5-dba is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191668" version="1" comment="php5-dom is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191669" version="1" comment="php5-enchant is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191670" version="1" comment="php5-exif is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191671" version="1" comment="php5-fastcgi is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191672" version="1" comment="php5-fileinfo is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191673" version="1" comment="php5-fpm is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191674" version="1" comment="php5-ftp is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191675" version="1" comment="php5-gd is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191676" version="1" comment="php5-gettext is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191677" version="1" comment="php5-gmp is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191678" version="1" comment="php5-iconv is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191679" version="1" comment="php5-imap is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191680" version="1" comment="php5-intl is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191681" version="1" comment="php5-json is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191682" version="1" comment="php5-ldap is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191683" version="1" comment="php5-mbstring is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191684" version="1" comment="php5-mcrypt is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191685" version="1" comment="php5-mysql is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191686" version="1" comment="php5-odbc is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191687" version="1" comment="php5-opcache is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191688" version="1" comment="php5-openssl is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191689" version="1" comment="php5-pcntl is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191690" version="1" comment="php5-pdo is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191691" version="1" comment="php5-pear is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191692" version="1" comment="php5-pgsql is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191693" version="1" comment="php5-phar is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191694" version="1" comment="php5-posix is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191695" version="1" comment="php5-pspell is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191696" version="1" comment="php5-shmop is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191697" version="1" comment="php5-snmp is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191698" version="1" comment="php5-soap is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191699" version="1" comment="php5-sockets is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191700" version="1" comment="php5-sqlite is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191701" version="1" comment="php5-suhosin is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191702" version="1" comment="php5-sysvmsg is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191703" version="1" comment="php5-sysvsem is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191704" version="1" comment="php5-sysvshm is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191705" version="1" comment="php5-tokenizer is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191706" version="1" comment="php5-wddx is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191707" version="1" comment="php5-xmlreader is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191708" version="1" comment="php5-xmlrpc is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191709" version="1" comment="php5-xmlwriter is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191710" version="1" comment="php5-xsl is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191711" version="1" comment="php5-zip is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191712" version="1" comment="php5-zlib is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232283" version="1" comment="apache2-mod_php7 is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232284" version="1" comment="php7 is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232285" version="1" comment="php7-bcmath is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232286" version="1" comment="php7-bz2 is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232287" version="1" comment="php7-calendar is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232288" version="1" comment="php7-ctype is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232289" version="1" comment="php7-curl is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232290" version="1" comment="php7-dba is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232291" version="1" comment="php7-dom is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232292" version="1" comment="php7-enchant is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232293" version="1" comment="php7-exif is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232294" version="1" comment="php7-fastcgi is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232295" version="1" comment="php7-fileinfo is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232296" version="1" comment="php7-fpm is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232297" version="1" comment="php7-ftp is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232298" version="1" comment="php7-gd is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232299" version="1" comment="php7-gettext is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232300" version="1" comment="php7-gmp is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232301" version="1" comment="php7-iconv is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232302" version="1" comment="php7-imap is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232303" version="1" comment="php7-intl is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232304" version="1" comment="php7-json is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232305" version="1" comment="php7-ldap is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232306" version="1" comment="php7-mbstring is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232307" version="1" comment="php7-mcrypt is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232308" version="1" comment="php7-mysql is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232309" version="1" comment="php7-odbc is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232310" version="1" comment="php7-opcache is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232311" version="1" comment="php7-openssl is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232312" version="1" comment="php7-pcntl is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232313" version="1" comment="php7-pdo is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232314" version="1" comment="php7-pear is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232315" version="1" comment="php7-pear-Archive_Tar is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232316" version="1" comment="php7-pgsql is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232317" version="1" comment="php7-phar is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232318" version="1" comment="php7-posix is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232319" version="1" comment="php7-pspell is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232320" version="1" comment="php7-shmop is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232321" version="1" comment="php7-snmp is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232322" version="1" comment="php7-soap is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232323" version="1" comment="php7-sockets is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232324" version="1" comment="php7-sqlite is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232325" version="1" comment="php7-sysvmsg is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232326" version="1" comment="php7-sysvsem is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232327" version="1" comment="php7-sysvshm is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232328" version="1" comment="php7-tokenizer is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232329" version="1" comment="php7-wddx is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232330" version="1" comment="php7-xmlreader is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232331" version="1" comment="php7-xmlrpc is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232332" version="1" comment="php7-xmlwriter is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232333" version="1" comment="php7-xsl is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232334" version="1" comment="php7-zip is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232335" version="1" comment="php7-zlib is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234005" version="1" comment="apache2-mod_php7 is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234006" version="1" comment="php7 is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234007" version="1" comment="php7-bcmath is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234008" version="1" comment="php7-bz2 is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234009" version="1" comment="php7-calendar is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234010" version="1" comment="php7-ctype is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234011" version="1" comment="php7-curl is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234012" version="1" comment="php7-dba is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234013" version="1" comment="php7-dom is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234014" version="1" comment="php7-enchant is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234015" version="1" comment="php7-exif is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234016" version="1" comment="php7-fastcgi is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234017" version="1" comment="php7-fileinfo is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234018" version="1" comment="php7-fpm is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234019" version="1" comment="php7-ftp is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234020" version="1" comment="php7-gd is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234021" version="1" comment="php7-gettext is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234022" version="1" comment="php7-gmp is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234023" version="1" comment="php7-iconv is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234024" version="1" comment="php7-imap is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234025" version="1" comment="php7-intl is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234026" version="1" comment="php7-json is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234027" version="1" comment="php7-ldap is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234028" version="1" comment="php7-mbstring is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234029" version="1" comment="php7-mcrypt is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234030" version="1" comment="php7-mysql is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234031" version="1" comment="php7-odbc is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234032" version="1" comment="php7-opcache is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234033" version="1" comment="php7-openssl is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234034" version="1" comment="php7-pcntl is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234035" version="1" comment="php7-pdo is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234036" version="1" comment="php7-pear is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234037" version="1" comment="php7-pear-Archive_Tar is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234038" version="1" comment="php7-pgsql is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234039" version="1" comment="php7-phar is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234040" version="1" comment="php7-posix is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234041" version="1" comment="php7-pspell is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234042" version="1" comment="php7-shmop is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234043" version="1" comment="php7-snmp is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234044" version="1" comment="php7-soap is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234045" version="1" comment="php7-sockets is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234046" version="1" comment="php7-sqlite is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234047" version="1" comment="php7-sysvmsg is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234048" version="1" comment="php7-sysvsem is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234049" version="1" comment="php7-sysvshm is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234050" version="1" comment="php7-tokenizer is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234051" version="1" comment="php7-wddx is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234052" version="1" comment="php7-xmlreader is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234053" version="1" comment="php7-xmlrpc is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234054" version="1" comment="php7-xmlwriter is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234055" version="1" comment="php7-xsl is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234056" version="1" comment="php7-zip is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234057" version="1" comment="php7-zlib is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234058" version="1" comment="nodejs4 is &lt;4.9.1-15.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234059" version="1" comment="nodejs4-devel is &lt;4.9.1-15.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234060" version="1" comment="nodejs4-docs is &lt;4.9.1-15.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234061" version="1" comment="npm4 is &lt;4.9.1-15.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234259" version="1" comment="apache2-mod_php5 is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234260" version="1" comment="php5 is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234261" version="1" comment="php5-bcmath is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234262" version="1" comment="php5-bz2 is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234263" version="1" comment="php5-calendar is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234264" version="1" comment="php5-ctype is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234265" version="1" comment="php5-curl is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234266" version="1" comment="php5-dba is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234267" version="1" comment="php5-dom is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234268" version="1" comment="php5-enchant is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234269" version="1" comment="php5-exif is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234270" version="1" comment="php5-fastcgi is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234271" version="1" comment="php5-fileinfo is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234272" version="1" comment="php5-fpm is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234273" version="1" comment="php5-ftp is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234274" version="1" comment="php5-gd is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234275" version="1" comment="php5-gettext is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234276" version="1" comment="php5-gmp is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234277" version="1" comment="php5-iconv is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234278" version="1" comment="php5-imap is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234279" version="1" comment="php5-intl is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234280" version="1" comment="php5-json is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234281" version="1" comment="php5-ldap is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234282" version="1" comment="php5-mbstring is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234283" version="1" comment="php5-mcrypt is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234284" version="1" comment="php5-mysql is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234285" version="1" comment="php5-odbc is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234286" version="1" comment="php5-opcache is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234287" version="1" comment="php5-openssl is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234288" version="1" comment="php5-pcntl is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234289" version="1" comment="php5-pdo is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234290" version="1" comment="php5-pear is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234291" version="1" comment="php5-pgsql is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234292" version="1" comment="php5-phar is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234293" version="1" comment="php5-posix is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234294" version="1" comment="php5-pspell is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234295" version="1" comment="php5-shmop is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234296" version="1" comment="php5-snmp is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234297" version="1" comment="php5-soap is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234298" version="1" comment="php5-sockets is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234299" version="1" comment="php5-sqlite is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234300" version="1" comment="php5-suhosin is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234301" version="1" comment="php5-sysvmsg is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234302" version="1" comment="php5-sysvsem is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234303" version="1" comment="php5-sysvshm is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234304" version="1" comment="php5-tokenizer is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234305" version="1" comment="php5-wddx is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234306" version="1" comment="php5-xmlreader is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234307" version="1" comment="php5-xmlrpc is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234308" version="1" comment="php5-xmlwriter is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234309" version="1" comment="php5-xsl is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234310" version="1" comment="php5-zip is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234311" version="1" comment="php5-zlib is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234966" version="1" comment="nodejs6 is &lt;6.14.4-11.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234967" version="1" comment="nodejs6-devel is &lt;6.14.4-11.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234968" version="1" comment="nodejs6-docs is &lt;6.14.4-11.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234969" version="1" comment="npm6 is &lt;6.14.4-11.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191713" version="1" comment="nodejs4 is &lt;4.8.7-15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191714" version="1" comment="nodejs4-devel is &lt;4.8.7-15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191715" version="1" comment="nodejs4-docs is &lt;4.8.7-15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191716" version="1" comment="npm4 is &lt;4.8.7-15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191717" version="1" comment="nodejs6 is &lt;6.12.2-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191718" version="1" comment="nodejs6-devel is &lt;6.12.2-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191719" version="1" comment="nodejs6-docs is &lt;6.12.2-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191720" version="1" comment="npm6 is &lt;6.12.2-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235382" version="1" comment="apache2-mod_php7 is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235383" version="1" comment="php7 is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235384" version="1" comment="php7-bcmath is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235385" version="1" comment="php7-bz2 is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235386" version="1" comment="php7-calendar is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235387" version="1" comment="php7-ctype is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235388" version="1" comment="php7-curl is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235389" version="1" comment="php7-dba is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235390" version="1" comment="php7-dom is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235391" version="1" comment="php7-enchant is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235392" version="1" comment="php7-exif is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235393" version="1" comment="php7-fastcgi is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235394" version="1" comment="php7-fileinfo is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235395" version="1" comment="php7-fpm is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235396" version="1" comment="php7-ftp is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235397" version="1" comment="php7-gd is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235398" version="1" comment="php7-gettext is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235399" version="1" comment="php7-gmp is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235400" version="1" comment="php7-iconv is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235401" version="1" comment="php7-imap is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235402" version="1" comment="php7-intl is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235403" version="1" comment="php7-json is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235404" version="1" comment="php7-ldap is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235405" version="1" comment="php7-mbstring is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235406" version="1" comment="php7-mcrypt is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235407" version="1" comment="php7-mysql is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235408" version="1" comment="php7-odbc is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235409" version="1" comment="php7-opcache is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235410" version="1" comment="php7-openssl is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235411" version="1" comment="php7-pcntl is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235412" version="1" comment="php7-pdo is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235413" version="1" comment="php7-pear is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235414" version="1" comment="php7-pear-Archive_Tar is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235415" version="1" comment="php7-pgsql is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235416" version="1" comment="php7-phar is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235417" version="1" comment="php7-posix is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235418" version="1" comment="php7-pspell is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235419" version="1" comment="php7-shmop is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235420" version="1" comment="php7-snmp is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235421" version="1" comment="php7-soap is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235422" version="1" comment="php7-sockets is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235423" version="1" comment="php7-sqlite is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235424" version="1" comment="php7-sysvmsg is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235425" version="1" comment="php7-sysvsem is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235426" version="1" comment="php7-sysvshm is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235427" version="1" comment="php7-tokenizer is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235428" version="1" comment="php7-wddx is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235429" version="1" comment="php7-xmlreader is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235430" version="1" comment="php7-xmlrpc is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235431" version="1" comment="php7-xmlwriter is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235432" version="1" comment="php7-xsl is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235433" version="1" comment="php7-zip is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235434" version="1" comment="php7-zlib is &lt;7.0.7-50.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236311" version="1" comment="apache2-mod_php5 is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236312" version="1" comment="php5 is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236313" version="1" comment="php5-bcmath is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236314" version="1" comment="php5-bz2 is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236315" version="1" comment="php5-calendar is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236316" version="1" comment="php5-ctype is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236317" version="1" comment="php5-curl is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236318" version="1" comment="php5-dba is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236319" version="1" comment="php5-dom is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236320" version="1" comment="php5-enchant is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236321" version="1" comment="php5-exif is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236322" version="1" comment="php5-fastcgi is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236323" version="1" comment="php5-fileinfo is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236324" version="1" comment="php5-fpm is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236325" version="1" comment="php5-ftp is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236326" version="1" comment="php5-gd is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236327" version="1" comment="php5-gettext is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236328" version="1" comment="php5-gmp is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236329" version="1" comment="php5-iconv is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236330" version="1" comment="php5-imap is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236331" version="1" comment="php5-intl is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236332" version="1" comment="php5-json is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236333" version="1" comment="php5-ldap is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236334" version="1" comment="php5-mbstring is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236335" version="1" comment="php5-mcrypt is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236336" version="1" comment="php5-mysql is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236337" version="1" comment="php5-odbc is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236338" version="1" comment="php5-opcache is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236339" version="1" comment="php5-openssl is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236340" version="1" comment="php5-pcntl is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236341" version="1" comment="php5-pdo is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236342" version="1" comment="php5-pear is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236343" version="1" comment="php5-pgsql is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236344" version="1" comment="php5-phar is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236345" version="1" comment="php5-posix is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236346" version="1" comment="php5-pspell is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236347" version="1" comment="php5-shmop is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236348" version="1" comment="php5-snmp is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236349" version="1" comment="php5-soap is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236350" version="1" comment="php5-sockets is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236351" version="1" comment="php5-sqlite is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236352" version="1" comment="php5-suhosin is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236353" version="1" comment="php5-sysvmsg is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236354" version="1" comment="php5-sysvsem is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236355" version="1" comment="php5-sysvshm is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236356" version="1" comment="php5-tokenizer is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236357" version="1" comment="php5-wddx is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236358" version="1" comment="php5-xmlreader is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236359" version="1" comment="php5-xmlrpc is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236360" version="1" comment="php5-xmlwriter is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236361" version="1" comment="php5-xsl is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236362" version="1" comment="php5-zip is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236363" version="1" comment="php5-zlib is &lt;5.5.14-109.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191721" version="1" comment="apache2-mod_php7 is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191722" version="1" comment="php7 is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191723" version="1" comment="php7-bcmath is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191724" version="1" comment="php7-bz2 is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191725" version="1" comment="php7-calendar is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191726" version="1" comment="php7-ctype is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191727" version="1" comment="php7-curl is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191728" version="1" comment="php7-dba is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191729" version="1" comment="php7-dom is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191730" version="1" comment="php7-enchant is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191731" version="1" comment="php7-exif is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191732" version="1" comment="php7-fastcgi is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191733" version="1" comment="php7-fileinfo is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191734" version="1" comment="php7-fpm is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191735" version="1" comment="php7-ftp is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191736" version="1" comment="php7-gd is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191737" version="1" comment="php7-gettext is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191738" version="1" comment="php7-gmp is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191739" version="1" comment="php7-iconv is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191740" version="1" comment="php7-imap is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191741" version="1" comment="php7-intl is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191742" version="1" comment="php7-json is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191743" version="1" comment="php7-ldap is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191744" version="1" comment="php7-mbstring is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191745" version="1" comment="php7-mcrypt is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191746" version="1" comment="php7-mysql is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191747" version="1" comment="php7-odbc is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191748" version="1" comment="php7-opcache is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191749" version="1" comment="php7-openssl is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191750" version="1" comment="php7-pcntl is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191751" version="1" comment="php7-pdo is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191752" version="1" comment="php7-pear is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191753" version="1" comment="php7-pear-Archive_Tar is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191754" version="1" comment="php7-pgsql is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191755" version="1" comment="php7-phar is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191756" version="1" comment="php7-posix is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191757" version="1" comment="php7-pspell is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191758" version="1" comment="php7-shmop is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191759" version="1" comment="php7-snmp is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191760" version="1" comment="php7-soap is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191761" version="1" comment="php7-sockets is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191762" version="1" comment="php7-sqlite is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191763" version="1" comment="php7-sysvmsg is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191764" version="1" comment="php7-sysvsem is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191765" version="1" comment="php7-sysvshm is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191766" version="1" comment="php7-tokenizer is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191767" version="1" comment="php7-wddx is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191768" version="1" comment="php7-xmlreader is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191769" version="1" comment="php7-xmlrpc is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191770" version="1" comment="php7-xmlwriter is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191771" version="1" comment="php7-xsl is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191772" version="1" comment="php7-zip is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191773" version="1" comment="php7-zlib is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241007" version="1" comment="apache2-mod_php7 is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241008" version="1" comment="php7 is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241009" version="1" comment="php7-bcmath is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241010" version="1" comment="php7-bz2 is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241011" version="1" comment="php7-calendar is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241012" version="1" comment="php7-ctype is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241013" version="1" comment="php7-curl is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241014" version="1" comment="php7-dba is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241015" version="1" comment="php7-dom is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241016" version="1" comment="php7-enchant is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241017" version="1" comment="php7-exif is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241018" version="1" comment="php7-fastcgi is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241019" version="1" comment="php7-fileinfo is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241020" version="1" comment="php7-fpm is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241021" version="1" comment="php7-ftp is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241022" version="1" comment="php7-gd is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241023" version="1" comment="php7-gettext is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241024" version="1" comment="php7-gmp is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241025" version="1" comment="php7-iconv is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241026" version="1" comment="php7-imap is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241027" version="1" comment="php7-intl is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241028" version="1" comment="php7-json is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241029" version="1" comment="php7-ldap is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241030" version="1" comment="php7-mbstring is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241031" version="1" comment="php7-mcrypt is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241032" version="1" comment="php7-mysql is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241033" version="1" comment="php7-odbc is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241034" version="1" comment="php7-opcache is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241035" version="1" comment="php7-openssl is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241036" version="1" comment="php7-pcntl is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241037" version="1" comment="php7-pdo is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241038" version="1" comment="php7-pear is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241039" version="1" comment="php7-pear-Archive_Tar is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241040" version="1" comment="php7-pgsql is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241041" version="1" comment="php7-phar is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241042" version="1" comment="php7-posix is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241043" version="1" comment="php7-pspell is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241044" version="1" comment="php7-shmop is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241045" version="1" comment="php7-snmp is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241046" version="1" comment="php7-soap is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241047" version="1" comment="php7-sockets is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241048" version="1" comment="php7-sqlite is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241049" version="1" comment="php7-sysvmsg is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241050" version="1" comment="php7-sysvsem is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241051" version="1" comment="php7-sysvshm is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241052" version="1" comment="php7-tokenizer is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241053" version="1" comment="php7-wddx is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241054" version="1" comment="php7-xmlreader is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241055" version="1" comment="php7-xmlrpc is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241056" version="1" comment="php7-xmlwriter is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241057" version="1" comment="php7-xsl is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241058" version="1" comment="php7-zip is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241059" version="1" comment="php7-zlib is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241142" version="1" comment="apache2-mod_php5 is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241143" version="1" comment="php5 is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241144" version="1" comment="php5-bcmath is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241145" version="1" comment="php5-bz2 is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241146" version="1" comment="php5-calendar is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241147" version="1" comment="php5-ctype is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241148" version="1" comment="php5-curl is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241149" version="1" comment="php5-dba is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241150" version="1" comment="php5-dom is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241151" version="1" comment="php5-enchant is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241152" version="1" comment="php5-exif is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241153" version="1" comment="php5-fastcgi is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241154" version="1" comment="php5-fileinfo is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241155" version="1" comment="php5-fpm is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241156" version="1" comment="php5-ftp is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241157" version="1" comment="php5-gd is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241158" version="1" comment="php5-gettext is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241159" version="1" comment="php5-gmp is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241160" version="1" comment="php5-iconv is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241161" version="1" comment="php5-imap is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241162" version="1" comment="php5-intl is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241163" version="1" comment="php5-json is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241164" version="1" comment="php5-ldap is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241165" version="1" comment="php5-mbstring is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241166" version="1" comment="php5-mcrypt is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241167" version="1" comment="php5-mysql is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241168" version="1" comment="php5-odbc is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241169" version="1" comment="php5-opcache is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241170" version="1" comment="php5-openssl is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241171" version="1" comment="php5-pcntl is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241172" version="1" comment="php5-pdo is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241173" version="1" comment="php5-pear is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241174" version="1" comment="php5-pgsql is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241175" version="1" comment="php5-phar is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241176" version="1" comment="php5-posix is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241177" version="1" comment="php5-pspell is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241178" version="1" comment="php5-shmop is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241179" version="1" comment="php5-snmp is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241180" version="1" comment="php5-soap is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241181" version="1" comment="php5-sockets is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241182" version="1" comment="php5-sqlite is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241183" version="1" comment="php5-suhosin is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241184" version="1" comment="php5-sysvmsg is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241185" version="1" comment="php5-sysvsem is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241186" version="1" comment="php5-sysvshm is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241187" version="1" comment="php5-tokenizer is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241188" version="1" comment="php5-wddx is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241189" version="1" comment="php5-xmlreader is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241190" version="1" comment="php5-xmlrpc is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241191" version="1" comment="php5-xmlwriter is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241192" version="1" comment="php5-xsl is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241193" version="1" comment="php5-zip is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241194" version="1" comment="php5-zlib is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191774" version="1" comment="apache2-mod_php5 is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191775" version="1" comment="php5 is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191776" version="1" comment="php5-bcmath is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191777" version="1" comment="php5-bz2 is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191778" version="1" comment="php5-calendar is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191779" version="1" comment="php5-ctype is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191780" version="1" comment="php5-curl is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191781" version="1" comment="php5-dba is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191782" version="1" comment="php5-dom is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191783" version="1" comment="php5-enchant is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191784" version="1" comment="php5-exif is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191785" version="1" comment="php5-fastcgi is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191786" version="1" comment="php5-fileinfo is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191787" version="1" comment="php5-fpm is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191788" version="1" comment="php5-ftp is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191789" version="1" comment="php5-gd is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191790" version="1" comment="php5-gettext is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191791" version="1" comment="php5-gmp is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191792" version="1" comment="php5-iconv is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191793" version="1" comment="php5-imap is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191794" version="1" comment="php5-intl is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191795" version="1" comment="php5-json is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191796" version="1" comment="php5-ldap is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191797" version="1" comment="php5-mbstring is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191798" version="1" comment="php5-mcrypt is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191799" version="1" comment="php5-mysql is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191800" version="1" comment="php5-odbc is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191801" version="1" comment="php5-opcache is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191802" version="1" comment="php5-openssl is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191803" version="1" comment="php5-pcntl is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191804" version="1" comment="php5-pdo is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191805" version="1" comment="php5-pear is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191806" version="1" comment="php5-pgsql is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191807" version="1" comment="php5-phar is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191808" version="1" comment="php5-posix is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191809" version="1" comment="php5-pspell is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191810" version="1" comment="php5-shmop is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191811" version="1" comment="php5-snmp is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191812" version="1" comment="php5-soap is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191813" version="1" comment="php5-sockets is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191814" version="1" comment="php5-sqlite is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191815" version="1" comment="php5-suhosin is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191816" version="1" comment="php5-sysvmsg is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191817" version="1" comment="php5-sysvsem is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191818" version="1" comment="php5-sysvshm is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191819" version="1" comment="php5-tokenizer is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191820" version="1" comment="php5-wddx is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191821" version="1" comment="php5-xmlreader is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191822" version="1" comment="php5-xmlrpc is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191823" version="1" comment="php5-xmlwriter is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191824" version="1" comment="php5-xsl is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191825" version="1" comment="php5-zip is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191826" version="1" comment="php5-zlib is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191827" version="1" comment="apache2-mod_php7 is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191828" version="1" comment="php7 is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191829" version="1" comment="php7-bcmath is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191830" version="1" comment="php7-bz2 is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191831" version="1" comment="php7-calendar is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191832" version="1" comment="php7-ctype is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191833" version="1" comment="php7-curl is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191834" version="1" comment="php7-dba is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191835" version="1" comment="php7-dom is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191836" version="1" comment="php7-enchant is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191837" version="1" comment="php7-exif is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191838" version="1" comment="php7-fastcgi is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191839" version="1" comment="php7-fileinfo is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191840" version="1" comment="php7-fpm is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191841" version="1" comment="php7-ftp is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191842" version="1" comment="php7-gd is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191843" version="1" comment="php7-gettext is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191844" version="1" comment="php7-gmp is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191845" version="1" comment="php7-iconv is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191846" version="1" comment="php7-imap is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191847" version="1" comment="php7-intl is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191848" version="1" comment="php7-json is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191849" version="1" comment="php7-ldap is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191850" version="1" comment="php7-mbstring is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191851" version="1" comment="php7-mcrypt is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191852" version="1" comment="php7-mysql is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191853" version="1" comment="php7-odbc is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191854" version="1" comment="php7-opcache is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191855" version="1" comment="php7-openssl is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191856" version="1" comment="php7-pcntl is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191857" version="1" comment="php7-pdo is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191858" version="1" comment="php7-pear is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191859" version="1" comment="php7-pear-Archive_Tar is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191860" version="1" comment="php7-pgsql is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191861" version="1" comment="php7-phar is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191862" version="1" comment="php7-posix is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191863" version="1" comment="php7-pspell is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191864" version="1" comment="php7-shmop is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191865" version="1" comment="php7-snmp is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191866" version="1" comment="php7-soap is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191867" version="1" comment="php7-sockets is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191868" version="1" comment="php7-sqlite is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191869" version="1" comment="php7-sysvmsg is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191870" version="1" comment="php7-sysvsem is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191871" version="1" comment="php7-sysvshm is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191872" version="1" comment="php7-tokenizer is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191873" version="1" comment="php7-wddx is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191874" version="1" comment="php7-xmlreader is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191875" version="1" comment="php7-xmlrpc is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191876" version="1" comment="php7-xmlwriter is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191877" version="1" comment="php7-xsl is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191878" version="1" comment="php7-zip is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191879" version="1" comment="php7-zlib is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191880" version="1" comment="apache2-mod_php5 is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191881" version="1" comment="php5 is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191882" version="1" comment="php5-bcmath is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191883" version="1" comment="php5-bz2 is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191884" version="1" comment="php5-calendar is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191885" version="1" comment="php5-ctype is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191886" version="1" comment="php5-curl is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191887" version="1" comment="php5-dba is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191888" version="1" comment="php5-dom is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191889" version="1" comment="php5-enchant is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191890" version="1" comment="php5-exif is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191891" version="1" comment="php5-fastcgi is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191892" version="1" comment="php5-fileinfo is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191893" version="1" comment="php5-fpm is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191894" version="1" comment="php5-ftp is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191895" version="1" comment="php5-gd is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191896" version="1" comment="php5-gettext is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191897" version="1" comment="php5-gmp is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191898" version="1" comment="php5-iconv is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191899" version="1" comment="php5-imap is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191900" version="1" comment="php5-intl is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191901" version="1" comment="php5-json is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191902" version="1" comment="php5-ldap is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191903" version="1" comment="php5-mbstring is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191904" version="1" comment="php5-mcrypt is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191905" version="1" comment="php5-mysql is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191906" version="1" comment="php5-odbc is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191907" version="1" comment="php5-opcache is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191908" version="1" comment="php5-openssl is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191909" version="1" comment="php5-pcntl is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191910" version="1" comment="php5-pdo is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191911" version="1" comment="php5-pear is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191912" version="1" comment="php5-pgsql is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191913" version="1" comment="php5-phar is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191914" version="1" comment="php5-posix is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191915" version="1" comment="php5-pspell is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191916" version="1" comment="php5-shmop is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191917" version="1" comment="php5-snmp is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191918" version="1" comment="php5-soap is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191919" version="1" comment="php5-sockets is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191920" version="1" comment="php5-sqlite is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191921" version="1" comment="php5-suhosin is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191922" version="1" comment="php5-sysvmsg is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191923" version="1" comment="php5-sysvsem is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191924" version="1" comment="php5-sysvshm is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191925" version="1" comment="php5-tokenizer is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191926" version="1" comment="php5-wddx is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191927" version="1" comment="php5-xmlreader is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191928" version="1" comment="php5-xmlrpc is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191929" version="1" comment="php5-xmlwriter is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191930" version="1" comment="php5-xsl is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191931" version="1" comment="php5-zip is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191932" version="1" comment="php5-zlib is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191933" version="1" comment="nodejs4 is &lt;4.9.1-15.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191934" version="1" comment="nodejs4-devel is &lt;4.9.1-15.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191935" version="1" comment="nodejs4-docs is &lt;4.9.1-15.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191936" version="1" comment="npm4 is &lt;4.9.1-15.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191937" version="1" comment="apache2-mod_php7 is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191938" version="1" comment="php7 is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191939" version="1" comment="php7-bcmath is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191940" version="1" comment="php7-bz2 is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191941" version="1" comment="php7-calendar is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191942" version="1" comment="php7-ctype is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191943" version="1" comment="php7-curl is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191944" version="1" comment="php7-dba is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191945" version="1" comment="php7-dom is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191946" version="1" comment="php7-enchant is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191947" version="1" comment="php7-exif is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191948" version="1" comment="php7-fastcgi is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191949" version="1" comment="php7-fileinfo is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191950" version="1" comment="php7-fpm is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191951" version="1" comment="php7-ftp is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191952" version="1" comment="php7-gd is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191953" version="1" comment="php7-gettext is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191954" version="1" comment="php7-gmp is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191955" version="1" comment="php7-iconv is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191956" version="1" comment="php7-imap is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191957" version="1" comment="php7-intl is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191958" version="1" comment="php7-json is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191959" version="1" comment="php7-ldap is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191960" version="1" comment="php7-mbstring is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191961" version="1" comment="php7-mcrypt is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191962" version="1" comment="php7-mysql is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191963" version="1" comment="php7-odbc is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191964" version="1" comment="php7-opcache is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191965" version="1" comment="php7-openssl is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191966" version="1" comment="php7-pcntl is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191967" version="1" comment="php7-pdo is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191968" version="1" comment="php7-pear is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191969" version="1" comment="php7-pear-Archive_Tar is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191970" version="1" comment="php7-pgsql is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191971" version="1" comment="php7-phar is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191972" version="1" comment="php7-posix is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191973" version="1" comment="php7-pspell is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191974" version="1" comment="php7-shmop is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191975" version="1" comment="php7-snmp is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191976" version="1" comment="php7-soap is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191977" version="1" comment="php7-sockets is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191978" version="1" comment="php7-sqlite is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191979" version="1" comment="php7-sysvmsg is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191980" version="1" comment="php7-sysvsem is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191981" version="1" comment="php7-sysvshm is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191982" version="1" comment="php7-tokenizer is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191983" version="1" comment="php7-wddx is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191984" version="1" comment="php7-xmlreader is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191985" version="1" comment="php7-xmlrpc is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191986" version="1" comment="php7-xmlwriter is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191987" version="1" comment="php7-xsl is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191988" version="1" comment="php7-zip is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191989" version="1" comment="php7-zlib is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191990" version="1" comment="nodejs6 is &lt;6.14.1-11.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191991" version="1" comment="nodejs6-devel is &lt;6.14.1-11.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191992" version="1" comment="nodejs6-docs is &lt;6.14.1-11.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191993" version="1" comment="npm6 is &lt;6.14.1-11.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191994" version="1" comment="apache2-mod_php5 is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191995" version="1" comment="php5 is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191996" version="1" comment="php5-bcmath is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191997" version="1" comment="php5-bz2 is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191998" version="1" comment="php5-calendar is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009191999" version="1" comment="php5-ctype is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192000" version="1" comment="php5-curl is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192001" version="1" comment="php5-dba is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192002" version="1" comment="php5-dom is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192003" version="1" comment="php5-enchant is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192004" version="1" comment="php5-exif is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192005" version="1" comment="php5-fastcgi is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192006" version="1" comment="php5-fileinfo is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192007" version="1" comment="php5-fpm is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192008" version="1" comment="php5-ftp is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192009" version="1" comment="php5-gd is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192010" version="1" comment="php5-gettext is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192011" version="1" comment="php5-gmp is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192012" version="1" comment="php5-iconv is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192013" version="1" comment="php5-imap is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192014" version="1" comment="php5-intl is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192015" version="1" comment="php5-json is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192016" version="1" comment="php5-ldap is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192017" version="1" comment="php5-mbstring is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192018" version="1" comment="php5-mcrypt is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192019" version="1" comment="php5-mysql is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192020" version="1" comment="php5-odbc is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192021" version="1" comment="php5-opcache is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192022" version="1" comment="php5-openssl is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192023" version="1" comment="php5-pcntl is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192024" version="1" comment="php5-pdo is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192025" version="1" comment="php5-pear is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192026" version="1" comment="php5-pgsql is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192027" version="1" comment="php5-phar is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192028" version="1" comment="php5-posix is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192029" version="1" comment="php5-pspell is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192030" version="1" comment="php5-shmop is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192031" version="1" comment="php5-snmp is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192032" version="1" comment="php5-soap is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192033" version="1" comment="php5-sockets is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192034" version="1" comment="php5-sqlite is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192035" version="1" comment="php5-suhosin is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192036" version="1" comment="php5-sysvmsg is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192037" version="1" comment="php5-sysvsem is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192038" version="1" comment="php5-sysvshm is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192039" version="1" comment="php5-tokenizer is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192040" version="1" comment="php5-wddx is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192041" version="1" comment="php5-xmlreader is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192042" version="1" comment="php5-xmlrpc is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192043" version="1" comment="php5-xmlwriter is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192044" version="1" comment="php5-xsl is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192045" version="1" comment="php5-zip is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192046" version="1" comment="php5-zlib is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252231" version="1" comment="apache2-mod_php7 is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252232" version="1" comment="php7 is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252233" version="1" comment="php7-bcmath is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252234" version="1" comment="php7-bz2 is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252235" version="1" comment="php7-calendar is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252236" version="1" comment="php7-ctype is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252237" version="1" comment="php7-curl is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252238" version="1" comment="php7-dba is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252239" version="1" comment="php7-dom is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252240" version="1" comment="php7-enchant is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252241" version="1" comment="php7-exif is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252242" version="1" comment="php7-fastcgi is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252243" version="1" comment="php7-fileinfo is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252244" version="1" comment="php7-fpm is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252245" version="1" comment="php7-ftp is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252246" version="1" comment="php7-gd is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252247" version="1" comment="php7-gettext is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252248" version="1" comment="php7-gmp is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252249" version="1" comment="php7-iconv is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252250" version="1" comment="php7-imap is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252251" version="1" comment="php7-intl is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252252" version="1" comment="php7-json is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252253" version="1" comment="php7-ldap is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252254" version="1" comment="php7-mbstring is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252255" version="1" comment="php7-mcrypt is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252256" version="1" comment="php7-mysql is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252257" version="1" comment="php7-odbc is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252258" version="1" comment="php7-opcache is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252259" version="1" comment="php7-openssl is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252260" version="1" comment="php7-pcntl is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252261" version="1" comment="php7-pdo is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252262" version="1" comment="php7-pear is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252263" version="1" comment="php7-pear-Archive_Tar is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252264" version="1" comment="php7-pgsql is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252265" version="1" comment="php7-phar is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252266" version="1" comment="php7-posix is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252267" version="1" comment="php7-pspell is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252268" version="1" comment="php7-shmop is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252269" version="1" comment="php7-snmp is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252270" version="1" comment="php7-soap is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252271" version="1" comment="php7-sockets is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252272" version="1" comment="php7-sqlite is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252273" version="1" comment="php7-sysvmsg is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252274" version="1" comment="php7-sysvsem is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252275" version="1" comment="php7-sysvshm is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252276" version="1" comment="php7-tokenizer is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252277" version="1" comment="php7-wddx is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252278" version="1" comment="php7-xmlreader is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252279" version="1" comment="php7-xmlrpc is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252280" version="1" comment="php7-xmlwriter is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252281" version="1" comment="php7-xsl is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252282" version="1" comment="php7-zip is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252283" version="1" comment="php7-zlib is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243174" version="1" comment="nodejs4 is &lt;4.9.1-15.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243175" version="1" comment="nodejs4-devel is &lt;4.9.1-15.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243176" version="1" comment="nodejs4-docs is &lt;4.9.1-15.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243177" version="1" comment="npm4 is &lt;4.9.1-15.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254053" version="1" comment="apache2-mod_php5 is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254054" version="1" comment="php5 is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254055" version="1" comment="php5-bcmath is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254056" version="1" comment="php5-bz2 is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254057" version="1" comment="php5-calendar is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254058" version="1" comment="php5-ctype is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254059" version="1" comment="php5-curl is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254060" version="1" comment="php5-dba is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254061" version="1" comment="php5-dom is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254062" version="1" comment="php5-enchant is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254063" version="1" comment="php5-exif is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254064" version="1" comment="php5-fastcgi is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254065" version="1" comment="php5-fileinfo is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254066" version="1" comment="php5-fpm is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254067" version="1" comment="php5-ftp is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254068" version="1" comment="php5-gd is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254069" version="1" comment="php5-gettext is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254070" version="1" comment="php5-gmp is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254071" version="1" comment="php5-iconv is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254072" version="1" comment="php5-imap is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254073" version="1" comment="php5-intl is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254074" version="1" comment="php5-json is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254075" version="1" comment="php5-ldap is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254076" version="1" comment="php5-mbstring is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254077" version="1" comment="php5-mcrypt is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254078" version="1" comment="php5-mysql is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254079" version="1" comment="php5-odbc is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254080" version="1" comment="php5-opcache is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254081" version="1" comment="php5-openssl is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254082" version="1" comment="php5-pcntl is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254083" version="1" comment="php5-pdo is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254084" version="1" comment="php5-pear is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254085" version="1" comment="php5-pgsql is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254086" version="1" comment="php5-phar is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254087" version="1" comment="php5-posix is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254088" version="1" comment="php5-pspell is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254089" version="1" comment="php5-shmop is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254090" version="1" comment="php5-snmp is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254091" version="1" comment="php5-soap is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254092" version="1" comment="php5-sockets is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254093" version="1" comment="php5-sqlite is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254094" version="1" comment="php5-suhosin is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254095" version="1" comment="php5-sysvmsg is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254096" version="1" comment="php5-sysvsem is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254097" version="1" comment="php5-sysvshm is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254098" version="1" comment="php5-tokenizer is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254099" version="1" comment="php5-wddx is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254100" version="1" comment="php5-xmlreader is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254101" version="1" comment="php5-xmlrpc is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254102" version="1" comment="php5-xmlwriter is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254103" version="1" comment="php5-xsl is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254104" version="1" comment="php5-zip is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254105" version="1" comment="php5-zlib is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254311" version="1" comment="apache2-mod_php72 is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254312" version="1" comment="php72 is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254313" version="1" comment="php72-bcmath is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254314" version="1" comment="php72-bz2 is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254315" version="1" comment="php72-calendar is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254316" version="1" comment="php72-ctype is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254317" version="1" comment="php72-curl is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254318" version="1" comment="php72-dba is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254319" version="1" comment="php72-dom is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254320" version="1" comment="php72-enchant is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254321" version="1" comment="php72-exif is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254322" version="1" comment="php72-fastcgi is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254323" version="1" comment="php72-fileinfo is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254324" version="1" comment="php72-fpm is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254325" version="1" comment="php72-ftp is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254326" version="1" comment="php72-gd is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254327" version="1" comment="php72-gettext is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254328" version="1" comment="php72-gmp is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254329" version="1" comment="php72-iconv is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254330" version="1" comment="php72-imap is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254331" version="1" comment="php72-intl is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254332" version="1" comment="php72-json is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254333" version="1" comment="php72-ldap is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254334" version="1" comment="php72-mbstring is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254335" version="1" comment="php72-mysql is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254336" version="1" comment="php72-odbc is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254337" version="1" comment="php72-opcache is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254338" version="1" comment="php72-openssl is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254339" version="1" comment="php72-pcntl is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254340" version="1" comment="php72-pdo is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254341" version="1" comment="php72-pear is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254342" version="1" comment="php72-pear-Archive_Tar is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254343" version="1" comment="php72-pgsql is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254344" version="1" comment="php72-phar is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254345" version="1" comment="php72-posix is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254346" version="1" comment="php72-pspell is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254347" version="1" comment="php72-readline is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254348" version="1" comment="php72-shmop is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254349" version="1" comment="php72-snmp is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254350" version="1" comment="php72-soap is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254351" version="1" comment="php72-sockets is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254352" version="1" comment="php72-sqlite is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254353" version="1" comment="php72-sysvmsg is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254354" version="1" comment="php72-sysvsem is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254355" version="1" comment="php72-sysvshm is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254356" version="1" comment="php72-tidy is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254357" version="1" comment="php72-tokenizer is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254358" version="1" comment="php72-wddx is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254359" version="1" comment="php72-xmlreader is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254360" version="1" comment="php72-xmlrpc is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254361" version="1" comment="php72-xmlwriter is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254362" version="1" comment="php72-xsl is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254363" version="1" comment="php72-zip is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254364" version="1" comment="php72-zlib is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254460" version="1" comment="apache2-mod_php7 is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254461" version="1" comment="php7 is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254462" version="1" comment="php7-bcmath is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254463" version="1" comment="php7-bz2 is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254464" version="1" comment="php7-calendar is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254465" version="1" comment="php7-ctype is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254466" version="1" comment="php7-curl is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254467" version="1" comment="php7-dba is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254468" version="1" comment="php7-dom is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254469" version="1" comment="php7-enchant is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254470" version="1" comment="php7-exif is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254471" version="1" comment="php7-fastcgi is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254472" version="1" comment="php7-fileinfo is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254473" version="1" comment="php7-fpm is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254474" version="1" comment="php7-ftp is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254475" version="1" comment="php7-gd is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254476" version="1" comment="php7-gettext is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254477" version="1" comment="php7-gmp is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254478" version="1" comment="php7-iconv is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254479" version="1" comment="php7-imap is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254480" version="1" comment="php7-intl is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254481" version="1" comment="php7-json is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254482" version="1" comment="php7-ldap is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254483" version="1" comment="php7-mbstring is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254484" version="1" comment="php7-mcrypt is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254485" version="1" comment="php7-mysql is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254486" version="1" comment="php7-odbc is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254487" version="1" comment="php7-opcache is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254488" version="1" comment="php7-openssl is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254489" version="1" comment="php7-pcntl is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254490" version="1" comment="php7-pdo is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254491" version="1" comment="php7-pear is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254492" version="1" comment="php7-pear-Archive_Tar is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254493" version="1" comment="php7-pgsql is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254494" version="1" comment="php7-phar is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254495" version="1" comment="php7-posix is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254496" version="1" comment="php7-pspell is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254497" version="1" comment="php7-shmop is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254498" version="1" comment="php7-snmp is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254499" version="1" comment="php7-soap is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254500" version="1" comment="php7-sockets is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254501" version="1" comment="php7-sqlite is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254502" version="1" comment="php7-sysvmsg is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254503" version="1" comment="php7-sysvsem is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254504" version="1" comment="php7-sysvshm is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254505" version="1" comment="php7-tokenizer is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254506" version="1" comment="php7-wddx is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254507" version="1" comment="php7-xmlreader is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254508" version="1" comment="php7-xmlrpc is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254509" version="1" comment="php7-xmlwriter is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254510" version="1" comment="php7-xsl is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254511" version="1" comment="php7-zip is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254512" version="1" comment="php7-zlib is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258539" version="1" comment="apache2-mod_php72 is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258540" version="1" comment="php72 is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258541" version="1" comment="php72-bcmath is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258542" version="1" comment="php72-bz2 is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258543" version="1" comment="php72-calendar is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258544" version="1" comment="php72-ctype is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258545" version="1" comment="php72-curl is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258546" version="1" comment="php72-dba is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258547" version="1" comment="php72-dom is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258548" version="1" comment="php72-enchant is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258549" version="1" comment="php72-exif is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258550" version="1" comment="php72-fastcgi is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258551" version="1" comment="php72-fileinfo is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258552" version="1" comment="php72-fpm is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258553" version="1" comment="php72-ftp is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258554" version="1" comment="php72-gd is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258555" version="1" comment="php72-gettext is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258556" version="1" comment="php72-gmp is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258557" version="1" comment="php72-iconv is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258558" version="1" comment="php72-imap is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258559" version="1" comment="php72-intl is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258560" version="1" comment="php72-json is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258561" version="1" comment="php72-ldap is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258562" version="1" comment="php72-mbstring is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258563" version="1" comment="php72-mysql is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258564" version="1" comment="php72-odbc is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258565" version="1" comment="php72-opcache is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258566" version="1" comment="php72-openssl is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258567" version="1" comment="php72-pcntl is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258568" version="1" comment="php72-pdo is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258569" version="1" comment="php72-pear is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258570" version="1" comment="php72-pear-Archive_Tar is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258571" version="1" comment="php72-pgsql is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258572" version="1" comment="php72-phar is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258573" version="1" comment="php72-posix is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258574" version="1" comment="php72-pspell is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258575" version="1" comment="php72-readline is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258576" version="1" comment="php72-shmop is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258577" version="1" comment="php72-snmp is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258578" version="1" comment="php72-soap is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258579" version="1" comment="php72-sockets is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258580" version="1" comment="php72-sqlite is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258581" version="1" comment="php72-sysvmsg is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258582" version="1" comment="php72-sysvsem is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258583" version="1" comment="php72-sysvshm is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258584" version="1" comment="php72-tidy is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258585" version="1" comment="php72-tokenizer is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258586" version="1" comment="php72-wddx is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258587" version="1" comment="php72-xmlreader is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258588" version="1" comment="php72-xmlrpc is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258589" version="1" comment="php72-xmlwriter is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258590" version="1" comment="php72-xsl is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258591" version="1" comment="php72-zip is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258592" version="1" comment="php72-zlib is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258593" version="1" comment="apache2-mod_php7 is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258594" version="1" comment="php7 is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258595" version="1" comment="php7-bcmath is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258596" version="1" comment="php7-bz2 is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258597" version="1" comment="php7-calendar is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258598" version="1" comment="php7-ctype is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258599" version="1" comment="php7-curl is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258600" version="1" comment="php7-dba is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258601" version="1" comment="php7-dom is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258602" version="1" comment="php7-enchant is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258603" version="1" comment="php7-exif is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258604" version="1" comment="php7-fastcgi is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258605" version="1" comment="php7-fileinfo is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258606" version="1" comment="php7-fpm is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258607" version="1" comment="php7-ftp is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258608" version="1" comment="php7-gd is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258609" version="1" comment="php7-gettext is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258610" version="1" comment="php7-gmp is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258611" version="1" comment="php7-iconv is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258612" version="1" comment="php7-imap is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258613" version="1" comment="php7-intl is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258614" version="1" comment="php7-json is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258615" version="1" comment="php7-ldap is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258616" version="1" comment="php7-mbstring is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258617" version="1" comment="php7-mcrypt is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258618" version="1" comment="php7-mysql is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258619" version="1" comment="php7-odbc is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258620" version="1" comment="php7-opcache is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258621" version="1" comment="php7-openssl is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258622" version="1" comment="php7-pcntl is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258623" version="1" comment="php7-pdo is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258624" version="1" comment="php7-pear is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258625" version="1" comment="php7-pear-Archive_Tar is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258626" version="1" comment="php7-pgsql is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258627" version="1" comment="php7-phar is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258628" version="1" comment="php7-posix is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258629" version="1" comment="php7-pspell is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258630" version="1" comment="php7-shmop is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258631" version="1" comment="php7-snmp is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258632" version="1" comment="php7-soap is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258633" version="1" comment="php7-sockets is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258634" version="1" comment="php7-sqlite is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258635" version="1" comment="php7-sysvmsg is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258636" version="1" comment="php7-sysvsem is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258637" version="1" comment="php7-sysvshm is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258638" version="1" comment="php7-tokenizer is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258639" version="1" comment="php7-wddx is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258640" version="1" comment="php7-xmlreader is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258641" version="1" comment="php7-xmlrpc is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258642" version="1" comment="php7-xmlwriter is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258643" version="1" comment="php7-xsl is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258644" version="1" comment="php7-zip is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258645" version="1" comment="php7-zlib is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258747" version="1" comment="apache2-mod_php5 is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258748" version="1" comment="php5 is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258749" version="1" comment="php5-bcmath is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258750" version="1" comment="php5-bz2 is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258751" version="1" comment="php5-calendar is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258752" version="1" comment="php5-ctype is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258753" version="1" comment="php5-curl is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258754" version="1" comment="php5-dba is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258755" version="1" comment="php5-dom is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258756" version="1" comment="php5-enchant is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258757" version="1" comment="php5-exif is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258758" version="1" comment="php5-fastcgi is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258759" version="1" comment="php5-fileinfo is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258760" version="1" comment="php5-fpm is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258761" version="1" comment="php5-ftp is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258762" version="1" comment="php5-gd is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258763" version="1" comment="php5-gettext is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258764" version="1" comment="php5-gmp is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258765" version="1" comment="php5-iconv is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258766" version="1" comment="php5-imap is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258767" version="1" comment="php5-intl is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258768" version="1" comment="php5-json is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258769" version="1" comment="php5-ldap is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258770" version="1" comment="php5-mbstring is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258771" version="1" comment="php5-mcrypt is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258772" version="1" comment="php5-mysql is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258773" version="1" comment="php5-odbc is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258774" version="1" comment="php5-opcache is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258775" version="1" comment="php5-openssl is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258776" version="1" comment="php5-pcntl is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258777" version="1" comment="php5-pdo is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258778" version="1" comment="php5-pear is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258779" version="1" comment="php5-pgsql is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258780" version="1" comment="php5-phar is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258781" version="1" comment="php5-posix is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258782" version="1" comment="php5-pspell is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258783" version="1" comment="php5-shmop is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258784" version="1" comment="php5-snmp is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258785" version="1" comment="php5-soap is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258786" version="1" comment="php5-sockets is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258787" version="1" comment="php5-sqlite is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258788" version="1" comment="php5-suhosin is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258789" version="1" comment="php5-sysvmsg is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258790" version="1" comment="php5-sysvsem is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258791" version="1" comment="php5-sysvshm is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258792" version="1" comment="php5-tokenizer is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258793" version="1" comment="php5-wddx is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258794" version="1" comment="php5-xmlreader is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258795" version="1" comment="php5-xmlrpc is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258796" version="1" comment="php5-xmlwriter is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258797" version="1" comment="php5-xsl is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258798" version="1" comment="php5-zip is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258799" version="1" comment="php5-zlib is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261277" version="1" comment="nodejs4 is &lt;4.9.1-15.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261278" version="1" comment="nodejs4-devel is &lt;4.9.1-15.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261279" version="1" comment="nodejs4-docs is &lt;4.9.1-15.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261280" version="1" comment="npm4 is &lt;4.9.1-15.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262481" version="1" comment="nodejs6 is &lt;6.17.0-11.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262482" version="1" comment="nodejs6-devel is &lt;6.17.0-11.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262483" version="1" comment="nodejs6-docs is &lt;6.17.0-11.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262484" version="1" comment="npm6 is &lt;6.17.0-11.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263007" version="1" comment="apache2-mod_php7 is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263008" version="1" comment="php7 is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263009" version="1" comment="php7-bcmath is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263010" version="1" comment="php7-bz2 is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263011" version="1" comment="php7-calendar is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263012" version="1" comment="php7-ctype is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263013" version="1" comment="php7-curl is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263014" version="1" comment="php7-dba is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263015" version="1" comment="php7-dom is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263016" version="1" comment="php7-enchant is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263017" version="1" comment="php7-exif is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263018" version="1" comment="php7-fastcgi is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263019" version="1" comment="php7-fileinfo is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263020" version="1" comment="php7-fpm is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263021" version="1" comment="php7-ftp is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263022" version="1" comment="php7-gd is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263023" version="1" comment="php7-gettext is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263024" version="1" comment="php7-gmp is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263025" version="1" comment="php7-iconv is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263026" version="1" comment="php7-imap is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263027" version="1" comment="php7-intl is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263028" version="1" comment="php7-json is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263029" version="1" comment="php7-ldap is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263030" version="1" comment="php7-mbstring is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263031" version="1" comment="php7-mcrypt is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263032" version="1" comment="php7-mysql is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263033" version="1" comment="php7-odbc is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263034" version="1" comment="php7-opcache is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263035" version="1" comment="php7-openssl is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263036" version="1" comment="php7-pcntl is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263037" version="1" comment="php7-pdo is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263038" version="1" comment="php7-pear is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263039" version="1" comment="php7-pear-Archive_Tar is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263040" version="1" comment="php7-pgsql is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263041" version="1" comment="php7-phar is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263042" version="1" comment="php7-posix is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263043" version="1" comment="php7-pspell is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263044" version="1" comment="php7-shmop is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263045" version="1" comment="php7-snmp is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263046" version="1" comment="php7-soap is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263047" version="1" comment="php7-sockets is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263048" version="1" comment="php7-sqlite is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263049" version="1" comment="php7-sysvmsg is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263050" version="1" comment="php7-sysvsem is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263051" version="1" comment="php7-sysvshm is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263052" version="1" comment="php7-tokenizer is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263053" version="1" comment="php7-wddx is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263054" version="1" comment="php7-xmlreader is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263055" version="1" comment="php7-xmlrpc is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263056" version="1" comment="php7-xmlwriter is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263057" version="1" comment="php7-xsl is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263058" version="1" comment="php7-zip is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263059" version="1" comment="php7-zlib is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263265" version="1" comment="apache2-mod_php72 is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263266" version="1" comment="php72 is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263267" version="1" comment="php72-bcmath is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263268" version="1" comment="php72-bz2 is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263269" version="1" comment="php72-calendar is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263270" version="1" comment="php72-ctype is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263271" version="1" comment="php72-curl is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263272" version="1" comment="php72-dba is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263273" version="1" comment="php72-dom is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263274" version="1" comment="php72-enchant is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263275" version="1" comment="php72-exif is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263276" version="1" comment="php72-fastcgi is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263277" version="1" comment="php72-fileinfo is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263278" version="1" comment="php72-fpm is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263279" version="1" comment="php72-ftp is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263280" version="1" comment="php72-gd is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263281" version="1" comment="php72-gettext is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263282" version="1" comment="php72-gmp is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263283" version="1" comment="php72-iconv is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263284" version="1" comment="php72-imap is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263285" version="1" comment="php72-intl is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263286" version="1" comment="php72-json is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263287" version="1" comment="php72-ldap is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263288" version="1" comment="php72-mbstring is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263289" version="1" comment="php72-mysql is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263290" version="1" comment="php72-odbc is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263291" version="1" comment="php72-opcache is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263292" version="1" comment="php72-openssl is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263293" version="1" comment="php72-pcntl is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263294" version="1" comment="php72-pdo is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263295" version="1" comment="php72-pear is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263296" version="1" comment="php72-pear-Archive_Tar is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263297" version="1" comment="php72-pgsql is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263298" version="1" comment="php72-phar is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263299" version="1" comment="php72-posix is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263300" version="1" comment="php72-pspell is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263301" version="1" comment="php72-readline is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263302" version="1" comment="php72-shmop is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263303" version="1" comment="php72-snmp is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263304" version="1" comment="php72-soap is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263305" version="1" comment="php72-sockets is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263306" version="1" comment="php72-sqlite is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263307" version="1" comment="php72-sysvmsg is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263308" version="1" comment="php72-sysvsem is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263309" version="1" comment="php72-sysvshm is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263310" version="1" comment="php72-tidy is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263311" version="1" comment="php72-tokenizer is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263312" version="1" comment="php72-wddx is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263313" version="1" comment="php72-xmlreader is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263314" version="1" comment="php72-xmlrpc is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263315" version="1" comment="php72-xmlwriter is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263316" version="1" comment="php72-xsl is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263317" version="1" comment="php72-zip is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263318" version="1" comment="php72-zlib is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244112" version="1" comment="apache2-mod_php7 is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244113" version="1" comment="php7 is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244114" version="1" comment="php7-bcmath is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244115" version="1" comment="php7-bz2 is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244116" version="1" comment="php7-calendar is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244117" version="1" comment="php7-ctype is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244118" version="1" comment="php7-curl is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244119" version="1" comment="php7-dba is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244120" version="1" comment="php7-dom is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244121" version="1" comment="php7-enchant is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244122" version="1" comment="php7-exif is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244123" version="1" comment="php7-fastcgi is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244124" version="1" comment="php7-fileinfo is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244125" version="1" comment="php7-fpm is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244126" version="1" comment="php7-ftp is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244127" version="1" comment="php7-gd is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244128" version="1" comment="php7-gettext is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244129" version="1" comment="php7-gmp is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244130" version="1" comment="php7-iconv is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244131" version="1" comment="php7-imap is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244132" version="1" comment="php7-intl is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244133" version="1" comment="php7-json is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244134" version="1" comment="php7-ldap is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244135" version="1" comment="php7-mbstring is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244136" version="1" comment="php7-mcrypt is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244137" version="1" comment="php7-mysql is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244138" version="1" comment="php7-odbc is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244139" version="1" comment="php7-opcache is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244140" version="1" comment="php7-openssl is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244141" version="1" comment="php7-pcntl is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244142" version="1" comment="php7-pdo is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244143" version="1" comment="php7-pear is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244144" version="1" comment="php7-pear-Archive_Tar is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244145" version="1" comment="php7-pgsql is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244146" version="1" comment="php7-phar is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244147" version="1" comment="php7-posix is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244148" version="1" comment="php7-pspell is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244149" version="1" comment="php7-shmop is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244150" version="1" comment="php7-snmp is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244151" version="1" comment="php7-soap is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244152" version="1" comment="php7-sockets is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244153" version="1" comment="php7-sqlite is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244154" version="1" comment="php7-sysvmsg is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244155" version="1" comment="php7-sysvsem is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244156" version="1" comment="php7-sysvshm is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244157" version="1" comment="php7-tokenizer is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244158" version="1" comment="php7-wddx is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244159" version="1" comment="php7-xmlreader is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244160" version="1" comment="php7-xmlrpc is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244161" version="1" comment="php7-xmlwriter is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244162" version="1" comment="php7-xsl is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244163" version="1" comment="php7-zip is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244164" version="1" comment="php7-zlib is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244275" version="1" comment="nodejs6 is &lt;6.16.0-11.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244276" version="1" comment="nodejs6-devel is &lt;6.16.0-11.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244277" version="1" comment="nodejs6-docs is &lt;6.16.0-11.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244278" version="1" comment="npm6 is &lt;6.16.0-11.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244823" version="1" comment="apache2-mod_php5 is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244824" version="1" comment="php5 is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244825" version="1" comment="php5-bcmath is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244826" version="1" comment="php5-bz2 is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244827" version="1" comment="php5-calendar is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244828" version="1" comment="php5-ctype is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244829" version="1" comment="php5-curl is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244830" version="1" comment="php5-dba is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244831" version="1" comment="php5-dom is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244832" version="1" comment="php5-enchant is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244833" version="1" comment="php5-exif is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244834" version="1" comment="php5-fastcgi is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244835" version="1" comment="php5-fileinfo is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244836" version="1" comment="php5-fpm is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244837" version="1" comment="php5-ftp is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244838" version="1" comment="php5-gd is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244839" version="1" comment="php5-gettext is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244840" version="1" comment="php5-gmp is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244841" version="1" comment="php5-iconv is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244842" version="1" comment="php5-imap is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244843" version="1" comment="php5-intl is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244844" version="1" comment="php5-json is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244845" version="1" comment="php5-ldap is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244846" version="1" comment="php5-mbstring is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244847" version="1" comment="php5-mcrypt is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244848" version="1" comment="php5-mysql is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244849" version="1" comment="php5-odbc is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244850" version="1" comment="php5-opcache is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244851" version="1" comment="php5-openssl is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244852" version="1" comment="php5-pcntl is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244853" version="1" comment="php5-pdo is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244854" version="1" comment="php5-pear is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244855" version="1" comment="php5-pgsql is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244856" version="1" comment="php5-phar is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244857" version="1" comment="php5-posix is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244858" version="1" comment="php5-pspell is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244859" version="1" comment="php5-shmop is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244860" version="1" comment="php5-snmp is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244861" version="1" comment="php5-soap is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244862" version="1" comment="php5-sockets is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244863" version="1" comment="php5-sqlite is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244864" version="1" comment="php5-suhosin is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244865" version="1" comment="php5-sysvmsg is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244866" version="1" comment="php5-sysvsem is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244867" version="1" comment="php5-sysvshm is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244868" version="1" comment="php5-tokenizer is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244869" version="1" comment="php5-wddx is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244870" version="1" comment="php5-xmlreader is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244871" version="1" comment="php5-xmlrpc is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244872" version="1" comment="php5-xmlwriter is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244873" version="1" comment="php5-xsl is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244874" version="1" comment="php5-zip is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244875" version="1" comment="php5-zlib is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246052" version="1" comment="nodejs4 is &lt;4.9.1-15.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246053" version="1" comment="nodejs4-devel is &lt;4.9.1-15.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246054" version="1" comment="nodejs4-docs is &lt;4.9.1-15.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246055" version="1" comment="npm4 is &lt;4.9.1-15.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246554" version="1" comment="nodejs6 is &lt;6.17.0-11.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246555" version="1" comment="nodejs6-devel is &lt;6.17.0-11.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246556" version="1" comment="nodejs6-docs is &lt;6.17.0-11.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246557" version="1" comment="npm6 is &lt;6.17.0-11.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251432" version="1" comment="apache2-mod_php5 is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251433" version="1" comment="php5 is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251434" version="1" comment="php5-bcmath is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251435" version="1" comment="php5-bz2 is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251436" version="1" comment="php5-calendar is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251437" version="1" comment="php5-ctype is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251438" version="1" comment="php5-curl is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251439" version="1" comment="php5-dba is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251440" version="1" comment="php5-dom is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251441" version="1" comment="php5-enchant is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251442" version="1" comment="php5-exif is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251443" version="1" comment="php5-fastcgi is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251444" version="1" comment="php5-fileinfo is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251445" version="1" comment="php5-fpm is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251446" version="1" comment="php5-ftp is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251447" version="1" comment="php5-gd is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251448" version="1" comment="php5-gettext is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251449" version="1" comment="php5-gmp is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251450" version="1" comment="php5-iconv is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251451" version="1" comment="php5-imap is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251452" version="1" comment="php5-intl is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251453" version="1" comment="php5-json is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251454" version="1" comment="php5-ldap is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251455" version="1" comment="php5-mbstring is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251456" version="1" comment="php5-mcrypt is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251457" version="1" comment="php5-mysql is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251458" version="1" comment="php5-odbc is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251459" version="1" comment="php5-opcache is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251460" version="1" comment="php5-openssl is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251461" version="1" comment="php5-pcntl is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251462" version="1" comment="php5-pdo is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251463" version="1" comment="php5-pear is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251464" version="1" comment="php5-pgsql is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251465" version="1" comment="php5-phar is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251466" version="1" comment="php5-posix is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251467" version="1" comment="php5-pspell is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251468" version="1" comment="php5-shmop is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251469" version="1" comment="php5-snmp is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251470" version="1" comment="php5-soap is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251471" version="1" comment="php5-sockets is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251472" version="1" comment="php5-sqlite is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251473" version="1" comment="php5-suhosin is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251474" version="1" comment="php5-sysvmsg is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251475" version="1" comment="php5-sysvsem is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251476" version="1" comment="php5-sysvshm is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251477" version="1" comment="php5-tokenizer is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251478" version="1" comment="php5-wddx is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251479" version="1" comment="php5-xmlreader is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251480" version="1" comment="php5-xmlrpc is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251481" version="1" comment="php5-xmlwriter is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251482" version="1" comment="php5-xsl is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251483" version="1" comment="php5-zip is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251484" version="1" comment="php5-zlib is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251634" version="1" comment="apache2-mod_php72 is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251635" version="1" comment="php72 is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251636" version="1" comment="php72-bcmath is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251637" version="1" comment="php72-bz2 is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251638" version="1" comment="php72-calendar is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251639" version="1" comment="php72-ctype is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251640" version="1" comment="php72-curl is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251641" version="1" comment="php72-dba is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251642" version="1" comment="php72-dom is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251643" version="1" comment="php72-enchant is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251644" version="1" comment="php72-exif is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251645" version="1" comment="php72-fastcgi is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251646" version="1" comment="php72-fileinfo is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251647" version="1" comment="php72-fpm is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251648" version="1" comment="php72-ftp is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251649" version="1" comment="php72-gd is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251650" version="1" comment="php72-gettext is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251651" version="1" comment="php72-gmp is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251652" version="1" comment="php72-iconv is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251653" version="1" comment="php72-imap is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251654" version="1" comment="php72-intl is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251655" version="1" comment="php72-json is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251656" version="1" comment="php72-ldap is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251657" version="1" comment="php72-mbstring is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251658" version="1" comment="php72-mysql is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251659" version="1" comment="php72-odbc is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251660" version="1" comment="php72-opcache is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251661" version="1" comment="php72-openssl is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251662" version="1" comment="php72-pcntl is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251663" version="1" comment="php72-pdo is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251664" version="1" comment="php72-pear is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251665" version="1" comment="php72-pear-Archive_Tar is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251666" version="1" comment="php72-pgsql is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251667" version="1" comment="php72-phar is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251668" version="1" comment="php72-posix is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251669" version="1" comment="php72-pspell is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251670" version="1" comment="php72-readline is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251671" version="1" comment="php72-shmop is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251672" version="1" comment="php72-snmp is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251673" version="1" comment="php72-soap is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251674" version="1" comment="php72-sockets is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251675" version="1" comment="php72-sqlite is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251676" version="1" comment="php72-sysvmsg is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251677" version="1" comment="php72-sysvsem is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251678" version="1" comment="php72-sysvshm is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251679" version="1" comment="php72-tidy is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251680" version="1" comment="php72-tokenizer is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251681" version="1" comment="php72-wddx is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251682" version="1" comment="php72-xmlreader is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251683" version="1" comment="php72-xmlrpc is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251684" version="1" comment="php72-xmlwriter is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251685" version="1" comment="php72-xsl is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251686" version="1" comment="php72-zip is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251687" version="1" comment="php72-zlib is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156852" version="1" comment="sle-pos-release is ==12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257167" version="1" comment="python3-Jinja2 is &lt;2.8-22.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192047" version="1" comment="glibc-html is &lt;2.22-62.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192048" version="1" comment="glibc-info is &lt;2.22-62.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192049" version="1" comment="glibc-profile is &lt;2.22-62.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192050" version="1" comment="glibc-profile-32bit is &lt;2.22-62.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192054" version="1" comment="libvirt is &lt;2.0.0-27.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192055" version="1" comment="libvirt-client is &lt;2.0.0-27.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192056" version="1" comment="libvirt-daemon is &lt;2.0.0-27.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192057" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192058" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192059" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192060" version="1" comment="libvirt-daemon-driver-libxl is &lt;2.0.0-27.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192061" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192062" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192063" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192064" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192065" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192066" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192067" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192068" version="1" comment="libvirt-daemon-hooks is &lt;2.0.0-27.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192069" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192070" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192071" version="1" comment="libvirt-daemon-xen is &lt;2.0.0-27.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192072" version="1" comment="libvirt-doc is &lt;2.0.0-27.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192073" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-27.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192074" version="1" comment="libvirt-nss is &lt;2.0.0-27.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223513" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.171-27.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223514" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.171-27.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223540" version="1" comment="xen is &lt;4.7.5_04-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223541" version="1" comment="xen-doc-html is &lt;4.7.5_04-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223542" version="1" comment="xen-libs is &lt;4.7.5_04-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223543" version="1" comment="xen-libs-32bit is &lt;4.7.5_04-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223544" version="1" comment="xen-tools is &lt;4.7.5_04-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223545" version="1" comment="xen-tools-domU is &lt;4.7.5_04-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229296" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.15-30.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229297" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr5.15-30.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229298" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.15-30.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229299" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr5.15-30.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229300" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.25-38.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229301" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.25-38.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229302" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.25-38.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229303" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.25-38.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229304" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.25-38.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229305" version="1" comment="mariadb-tools is &lt;10.0.35-29.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229306" version="1" comment="MozillaFirefox-devel is &lt;52.8.1esr-109.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229579" version="1" comment="kernel-default is &lt;4.4.121-92.85" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229580" version="1" comment="kernel-default-base is &lt;4.4.121-92.85" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229581" version="1" comment="kernel-default-devel is &lt;4.4.121-92.85" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229582" version="1" comment="kernel-devel is &lt;4.4.121-92.85" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229583" version="1" comment="kernel-macros is &lt;4.4.121-92.85" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229584" version="1" comment="kernel-source is &lt;4.4.121-92.85" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229585" version="1" comment="kernel-syms is &lt;4.4.121-92.85" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229586" version="1" comment="kgraft-patch-4_4_121-92_85-default is &lt;1-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229587" version="1" comment="kgraft-patch-SLE12-SP2_Update_23 is &lt;1-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229802" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229803" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229804" version="1" comment="openssl-doc is &lt;1.0.2j-60.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230809" version="1" comment="xen is &lt;4.7.6_02-43.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230810" version="1" comment="xen-doc-html is &lt;4.7.6_02-43.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230811" version="1" comment="xen-libs is &lt;4.7.6_02-43.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230812" version="1" comment="xen-libs-32bit is &lt;4.7.6_02-43.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230813" version="1" comment="xen-tools is &lt;4.7.6_02-43.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230814" version="1" comment="xen-tools-domU is &lt;4.7.6_02-43.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232045" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232046" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232047" version="1" comment="libdcerpc0 is &lt;4.4.2-38.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232048" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232049" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232050" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232051" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232052" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232053" version="1" comment="libndr-standard0 is &lt;4.4.2-38.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232054" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232055" version="1" comment="libndr0 is &lt;4.4.2-38.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232056" version="1" comment="libndr0-32bit is &lt;4.4.2-38.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232057" version="1" comment="libnetapi0 is &lt;4.4.2-38.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232058" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232059" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232060" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232061" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232062" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232063" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232064" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232065" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232066" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232067" version="1" comment="libsamba-util0 is &lt;4.4.2-38.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232068" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232069" version="1" comment="libsamdb0 is &lt;4.4.2-38.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232070" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232071" version="1" comment="libsmbclient0 is &lt;4.4.2-38.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232072" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232073" version="1" comment="libsmbconf0 is &lt;4.4.2-38.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232074" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232075" version="1" comment="libsmbldap0 is &lt;4.4.2-38.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232076" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232077" version="1" comment="libtevent-util0 is &lt;4.4.2-38.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232078" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232079" version="1" comment="libwbclient0 is &lt;4.4.2-38.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232080" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232081" version="1" comment="samba-client is &lt;4.4.2-38.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232082" version="1" comment="samba-client-32bit is &lt;4.4.2-38.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232083" version="1" comment="samba-doc is &lt;4.4.2-38.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232084" version="1" comment="samba-libs is &lt;4.4.2-38.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232085" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232086" version="1" comment="samba-winbind is &lt;4.4.2-38.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232087" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232336" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232461" version="1" comment="kernel-default-base is &lt;4.4.121-92.92" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232462" version="1" comment="kernel-default-devel is &lt;4.4.121-92.92" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232463" version="1" comment="kernel-devel is &lt;4.4.121-92.92" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232464" version="1" comment="kernel-macros is &lt;4.4.121-92.92" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232465" version="1" comment="kernel-source is &lt;4.4.121-92.92" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232466" version="1" comment="kernel-syms is &lt;4.4.121-92.92" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232467" version="1" comment="kgraft-patch-4_4_121-92_92-default is &lt;1-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232468" version="1" comment="kgraft-patch-SLE12-SP2_Update_24 is &lt;1-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232469" version="1" comment="lttng-modules is &lt;2.7.1-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232470" version="1" comment="lttng-modules-kmp-default is &lt;2.7.1_k4.4.121_92.92-9.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232700" version="1" comment="xen is &lt;4.7.6_04-43.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232701" version="1" comment="xen-doc-html is &lt;4.7.6_04-43.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232702" version="1" comment="xen-libs is &lt;4.7.6_04-43.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232703" version="1" comment="xen-libs-32bit is &lt;4.7.6_04-43.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232704" version="1" comment="xen-tools is &lt;4.7.6_04-43.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232705" version="1" comment="xen-tools-domU is &lt;4.7.6_04-43.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233372" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234062" version="1" comment="libvirt is &lt;2.0.0-27.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234063" version="1" comment="libvirt-client is &lt;2.0.0-27.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234064" version="1" comment="libvirt-daemon is &lt;2.0.0-27.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234065" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234066" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234067" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234068" version="1" comment="libvirt-daemon-driver-libxl is &lt;2.0.0-27.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234069" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234070" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234071" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234072" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234073" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234074" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234075" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234076" version="1" comment="libvirt-daemon-hooks is &lt;2.0.0-27.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234077" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234078" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234079" version="1" comment="libvirt-daemon-xen is &lt;2.0.0-27.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234080" version="1" comment="libvirt-doc is &lt;2.0.0-27.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234081" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-27.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234082" version="1" comment="libvirt-nss is &lt;2.0.0-27.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234518" version="1" comment="libzypp is &lt;16.17.20-27.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251832" version="1" comment="zypper is &lt;1.13.45-18.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251833" version="1" comment="zypper-log is &lt;1.13.45-18.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234970" version="1" comment="openslp-server is &lt;2.0.0-18.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235142" version="1" comment="gnutls is &lt;3.2.15-18.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235143" version="1" comment="libgnutls-openssl27 is &lt;3.2.15-18.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235144" version="1" comment="libgnutls28 is &lt;3.2.15-18.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235145" version="1" comment="libgnutls28-32bit is &lt;3.2.15-18.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235524" version="1" comment="res-signingkeys is &lt;3.0.37-52.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235525" version="1" comment="smt-support is &lt;3.0.37-52.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235526" version="1" comment="yast2-smt is &lt;3.0.14-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235617" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235618" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235619" version="1" comment="openssl-doc is &lt;1.0.2j-60.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235787" version="1" comment="qemu is &lt;2.6.2-41.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235788" version="1" comment="qemu-block-curl is &lt;2.6.2-41.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235789" version="1" comment="qemu-block-rbd is &lt;2.6.2-41.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235790" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235791" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235792" version="1" comment="qemu-ipxe is &lt;1.0.0-41.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235793" version="1" comment="qemu-kvm is &lt;2.6.2-41.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235794" version="1" comment="qemu-lang is &lt;2.6.2-41.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235795" version="1" comment="qemu-seabios is &lt;1.9.1-41.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235796" version="1" comment="qemu-sgabios is &lt;8-41.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235797" version="1" comment="qemu-tools is &lt;2.6.2-41.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235798" version="1" comment="qemu-vgabios is &lt;1.9.1-41.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235799" version="1" comment="qemu-x86 is &lt;2.6.2-41.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236722" version="1" comment="cups-filters is &lt;1.0.58-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236723" version="1" comment="cups-filters-cups-browsed is &lt;1.0.58-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236724" version="1" comment="cups-filters-foomatic-rip is &lt;1.0.58-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236725" version="1" comment="cups-filters-ghostscript is &lt;1.0.58-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236726" version="1" comment="postgresql-init is &lt;10-17.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236780" version="1" comment="kernel-default-base is &lt;4.4.121-92.95" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236781" version="1" comment="kernel-default-devel is &lt;4.4.121-92.95" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236782" version="1" comment="kernel-devel is &lt;4.4.121-92.95" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236783" version="1" comment="kernel-macros is &lt;4.4.121-92.95" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236784" version="1" comment="kernel-source is &lt;4.4.121-92.95" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236785" version="1" comment="kernel-syms is &lt;4.4.121-92.95" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236786" version="1" comment="kgraft-patch-4_4_121-92_95-default is &lt;1-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236787" version="1" comment="kgraft-patch-SLE12-SP2_Update_25 is &lt;1-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236788" version="1" comment="lttng-modules is &lt;2.7.1-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236789" version="1" comment="lttng-modules-kmp-default is &lt;2.7.1_k4.4.121_92.95-9.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237925" version="1" comment="xen is &lt;4.7.6_05-43.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237926" version="1" comment="xen-doc-html is &lt;4.7.6_05-43.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237927" version="1" comment="xen-libs is &lt;4.7.6_05-43.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237928" version="1" comment="xen-libs-32bit is &lt;4.7.6_05-43.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237929" version="1" comment="xen-tools is &lt;4.7.6_05-43.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237930" version="1" comment="xen-tools-domU is &lt;4.7.6_05-43.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238059" version="1" comment="postgresql96-contrib is &lt;9.6.10-3.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238060" version="1" comment="postgresql96-docs is &lt;9.6.10-3.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238061" version="1" comment="postgresql96-server is &lt;9.6.10-3.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238407" version="1" comment="apache2 is &lt;2.4.23-29.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238408" version="1" comment="apache2-doc is &lt;2.4.23-29.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238409" version="1" comment="apache2-example-pages is &lt;2.4.23-29.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238410" version="1" comment="apache2-prefork is &lt;2.4.23-29.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238411" version="1" comment="apache2-utils is &lt;2.4.23-29.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238412" version="1" comment="apache2-worker is &lt;2.4.23-29.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238513" version="1" comment="MozillaFirefox-devel is &lt;60.2.2esr-109.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238514" version="1" comment="apache2-mod_nss is &lt;1.0.14-19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238515" version="1" comment="libfreebl3-hmac is &lt;3.36.4-58.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238516" version="1" comment="libfreebl3-hmac-32bit is &lt;3.36.4-58.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238517" version="1" comment="libsoftokn3-hmac is &lt;3.36.4-58.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238518" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.36.4-58.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239147" version="1" comment="MozillaFirefox-devel is &lt;60.3.0-109.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240615" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240616" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240617" version="1" comment="openssl-doc is &lt;1.0.2j-60.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240752" version="1" comment="postgresql94 is &lt;9.4.19-21.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240753" version="1" comment="postgresql94-contrib is &lt;9.4.19-21.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240754" version="1" comment="postgresql94-docs is &lt;9.4.19-21.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240755" version="1" comment="postgresql94-server is &lt;9.4.19-21.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240756" version="1" comment="openssh-fips is &lt;7.2p2-74.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240857" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.35-38.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240858" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.35-38.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240859" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.35-38.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240860" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.35-38.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240861" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.35-38.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241580" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.25-30.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241581" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr5.25-30.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241582" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.25-30.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241583" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr5.25-30.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241677" version="1" comment="git is &lt;2.12.3-27.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241678" version="1" comment="git-core is &lt;2.12.3-27.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241679" version="1" comment="git-doc is &lt;2.12.3-27.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242080" version="1" comment="libQt5Concurrent5 is &lt;5.6.1-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242081" version="1" comment="libQt5Core5 is &lt;5.6.1-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242082" version="1" comment="libQt5DBus5 is &lt;5.6.1-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242083" version="1" comment="libQt5Gui5 is &lt;5.6.1-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242084" version="1" comment="libQt5Network5 is &lt;5.6.1-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242085" version="1" comment="libQt5OpenGL5 is &lt;5.6.1-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242086" version="1" comment="libQt5PrintSupport5 is &lt;5.6.1-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242087" version="1" comment="libQt5Sql5 is &lt;5.6.1-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242088" version="1" comment="libQt5Sql5-mysql is &lt;5.6.1-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242089" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.1-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242090" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.1-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242091" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.1-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242092" version="1" comment="libQt5Test5 is &lt;5.6.1-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242093" version="1" comment="libQt5Widgets5 is &lt;5.6.1-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242094" version="1" comment="libQt5Xml5 is &lt;5.6.1-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242095" version="1" comment="libqt5-qtbase is &lt;5.6.1-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242234" version="1" comment="MozillaFirefox-devel is &lt;60.4.0esr-109.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242245" version="1" comment="qemu is &lt;2.6.2-41.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242246" version="1" comment="qemu-block-curl is &lt;2.6.2-41.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242247" version="1" comment="qemu-block-rbd is &lt;2.6.2-41.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242248" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242249" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242250" version="1" comment="qemu-ipxe is &lt;1.0.0-41.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242251" version="1" comment="qemu-kvm is &lt;2.6.2-41.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242252" version="1" comment="qemu-lang is &lt;2.6.2-41.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242253" version="1" comment="qemu-seabios is &lt;1.9.1-41.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242254" version="1" comment="qemu-sgabios is &lt;8-41.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242255" version="1" comment="qemu-tools is &lt;2.6.2-41.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242256" version="1" comment="qemu-vgabios is &lt;1.9.1-41.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242257" version="1" comment="qemu-x86 is &lt;2.6.2-41.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242471" version="1" comment="mailman is &lt;2.1.17-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192075" version="1" comment="kernel-default is &lt;4.4.121-92.73" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192076" version="1" comment="kernel-default-base is &lt;4.4.121-92.73" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192077" version="1" comment="kernel-default-devel is &lt;4.4.121-92.73" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192078" version="1" comment="kernel-devel is &lt;4.4.121-92.73" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192079" version="1" comment="kernel-macros is &lt;4.4.121-92.73" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192080" version="1" comment="kernel-source is &lt;4.4.121-92.73" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192081" version="1" comment="kernel-syms is &lt;4.4.121-92.73" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192082" version="1" comment="kgraft-patch-4_4_121-92_73-default is &lt;1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192083" version="1" comment="kgraft-patch-SLE12-SP2_Update_21 is &lt;1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192084" version="1" comment="xen is &lt;4.7.5_02-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192085" version="1" comment="xen-doc-html is &lt;4.7.5_02-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192086" version="1" comment="xen-libs is &lt;4.7.5_02-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192087" version="1" comment="xen-libs-32bit is &lt;4.7.5_02-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192088" version="1" comment="xen-tools is &lt;4.7.5_02-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192089" version="1" comment="xen-tools-domU is &lt;4.7.5_02-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192090" version="1" comment="MozillaFirefox-devel is &lt;52.8.0esr-109.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192091" version="1" comment="qemu is &lt;2.6.2-41.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192092" version="1" comment="qemu-block-curl is &lt;2.6.2-41.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192093" version="1" comment="qemu-block-rbd is &lt;2.6.2-41.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192094" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192095" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192096" version="1" comment="qemu-ipxe is &lt;1.0.0-41.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192097" version="1" comment="qemu-kvm is &lt;2.6.2-41.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192098" version="1" comment="qemu-lang is &lt;2.6.2-41.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192099" version="1" comment="qemu-seabios is &lt;1.9.1-41.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192100" version="1" comment="qemu-sgabios is &lt;8-41.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192101" version="1" comment="qemu-tools is &lt;2.6.2-41.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192102" version="1" comment="qemu-vgabios is &lt;1.9.1-41.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192103" version="1" comment="qemu-x86 is &lt;2.6.2-41.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192104" version="1" comment="kernel-default-base is &lt;4.4.121-92.80" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192105" version="1" comment="kernel-default-devel is &lt;4.4.121-92.80" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192106" version="1" comment="kernel-devel is &lt;4.4.121-92.80" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192107" version="1" comment="kernel-macros is &lt;4.4.121-92.80" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192108" version="1" comment="kernel-source is &lt;4.4.121-92.80" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192109" version="1" comment="kernel-syms is &lt;4.4.121-92.80" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192110" version="1" comment="kgraft-patch-4_4_121-92_80-default is &lt;1-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192111" version="1" comment="kgraft-patch-SLE12-SP2_Update_22 is &lt;1-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252284" version="1" comment="freeradius-server is &lt;3.0.3-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252285" version="1" comment="freeradius-server-doc is &lt;3.0.3-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252286" version="1" comment="freeradius-server-krb5 is &lt;3.0.3-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252287" version="1" comment="freeradius-server-ldap is &lt;3.0.3-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252288" version="1" comment="freeradius-server-libs is &lt;3.0.3-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252289" version="1" comment="freeradius-server-mysql is &lt;3.0.3-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252290" version="1" comment="freeradius-server-perl is &lt;3.0.3-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252291" version="1" comment="freeradius-server-postgresql is &lt;3.0.3-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252292" version="1" comment="freeradius-server-python is &lt;3.0.3-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252293" version="1" comment="freeradius-server-sqlite is &lt;3.0.3-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252294" version="1" comment="freeradius-server-utils is &lt;3.0.3-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243066" version="1" comment="krb5-doc is &lt;1.12.5-40.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243067" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.5-40.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243068" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.5-40.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243069" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.5-40.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243070" version="1" comment="krb5-server is &lt;1.12.5-40.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252754" version="1" comment="hostinfo is &lt;1.0.1-19.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252867" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252868" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252869" version="1" comment="openssl-doc is &lt;1.0.2j-60.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252957" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.24.1-2.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252958" version="1" comment="webkit2gtk3-devel is &lt;2.24.1-2.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252995" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253204" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253205" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253206" version="1" comment="libdcerpc0 is &lt;4.4.2-38.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253207" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253208" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253209" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253210" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253211" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253212" version="1" comment="libndr-standard0 is &lt;4.4.2-38.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253213" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253214" version="1" comment="libndr0 is &lt;4.4.2-38.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253215" version="1" comment="libndr0-32bit is &lt;4.4.2-38.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253216" version="1" comment="libnetapi0 is &lt;4.4.2-38.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253217" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253218" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253219" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253220" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253221" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253222" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253223" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253224" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253225" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253226" version="1" comment="libsamba-util0 is &lt;4.4.2-38.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253227" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253228" version="1" comment="libsamdb0 is &lt;4.4.2-38.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253229" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253230" version="1" comment="libsmbclient0 is &lt;4.4.2-38.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253231" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253232" version="1" comment="libsmbconf0 is &lt;4.4.2-38.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253233" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253234" version="1" comment="libsmbldap0 is &lt;4.4.2-38.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253235" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253236" version="1" comment="libtevent-util0 is &lt;4.4.2-38.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253237" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253238" version="1" comment="libwbclient0 is &lt;4.4.2-38.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253239" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253240" version="1" comment="samba-client is &lt;4.4.2-38.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253241" version="1" comment="samba-client-32bit is &lt;4.4.2-38.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253242" version="1" comment="samba-doc is &lt;4.4.2-38.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253243" version="1" comment="samba-libs is &lt;4.4.2-38.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253244" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253245" version="1" comment="samba-winbind is &lt;4.4.2-38.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253246" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253247" version="1" comment="jakarta-commons-fileupload is &lt;1.1.1-122.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253248" version="1" comment="jakarta-commons-fileupload-javadoc is &lt;1.1.1-122.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253329" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.212-27.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253330" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.212-27.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253651" version="1" comment="libudev-devel is &lt;228-150.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253652" version="1" comment="qemu is &lt;2.6.2-41.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253653" version="1" comment="qemu-block-curl is &lt;2.6.2-41.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253654" version="1" comment="qemu-block-rbd is &lt;2.6.2-41.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253655" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253656" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253657" version="1" comment="qemu-ipxe is &lt;1.0.0-41.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253658" version="1" comment="qemu-kvm is &lt;2.6.2-41.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253659" version="1" comment="qemu-lang is &lt;2.6.2-41.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253660" version="1" comment="qemu-seabios is &lt;1.9.1-41.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253661" version="1" comment="qemu-sgabios is &lt;8-41.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253662" version="1" comment="qemu-tools is &lt;2.6.2-41.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253663" version="1" comment="qemu-vgabios is &lt;1.9.1-41.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253664" version="1" comment="qemu-x86 is &lt;2.6.2-41.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253796" version="1" comment="kernel-default-base is &lt;4.4.121-92.109" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253797" version="1" comment="kernel-default-devel is &lt;4.4.121-92.109" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253798" version="1" comment="kernel-devel is &lt;4.4.121-92.109" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253799" version="1" comment="kernel-macros is &lt;4.4.121-92.109" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253800" version="1" comment="kernel-source is &lt;4.4.121-92.109" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253801" version="1" comment="kernel-syms is &lt;4.4.121-92.109" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253802" version="1" comment="kgraft-patch-4_4_121-92_109-default is &lt;1-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253803" version="1" comment="kgraft-patch-SLE12-SP2_Update_29 is &lt;1-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243255" version="1" comment="openssh-fips is &lt;7.2p2-74.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254187" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.45-38.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254188" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.45-38.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254189" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.45-38.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254190" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.45-38.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254191" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.45-38.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254513" version="1" comment="xen is &lt;4.7.6_06-43.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254514" version="1" comment="xen-doc-html is &lt;4.7.6_06-43.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254515" version="1" comment="xen-libs is &lt;4.7.6_06-43.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254516" version="1" comment="xen-libs-32bit is &lt;4.7.6_06-43.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254517" version="1" comment="xen-tools is &lt;4.7.6_06-43.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254518" version="1" comment="xen-tools-domU is &lt;4.7.6_06-43.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255755" version="1" comment="MozillaFirefox-devel is &lt;60.7.0-109.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255756" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.221-43.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255757" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.221-43.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255830" version="1" comment="bind-chrootenv is &lt;9.9.9P1-63.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255831" version="1" comment="bind-doc is &lt;9.9.9P1-63.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256148" version="1" comment="libvirt is &lt;2.0.0-27.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256149" version="1" comment="libvirt-client is &lt;2.0.0-27.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256150" version="1" comment="libvirt-daemon is &lt;2.0.0-27.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256151" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256152" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256153" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256154" version="1" comment="libvirt-daemon-driver-libxl is &lt;2.0.0-27.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256155" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256156" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256157" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256158" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256159" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256160" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256161" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256162" version="1" comment="libvirt-daemon-hooks is &lt;2.0.0-27.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256163" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256164" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256165" version="1" comment="libvirt-daemon-xen is &lt;2.0.0-27.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256166" version="1" comment="libvirt-doc is &lt;2.0.0-27.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256167" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-27.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256168" version="1" comment="libvirt-nss is &lt;2.0.0-27.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256169" version="1" comment="python-32bit is &lt;2.7.13-28.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256170" version="1" comment="python-base-32bit is &lt;2.7.13-28.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256171" version="1" comment="python-demo is &lt;2.7.13-28.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256172" version="1" comment="python-doc is &lt;2.7.13-28.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256173" version="1" comment="python-doc-pdf is &lt;2.7.13-28.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256174" version="1" comment="python-gdbm is &lt;2.7.13-28.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256175" version="1" comment="python-idle is &lt;2.7.13-28.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243302" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.22.5-2.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243303" version="1" comment="webkit2gtk3-devel is &lt;2.22.5-2.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257005" version="1" comment="openssh-fips is &lt;7.2p2-74.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257006" version="1" comment="kernel-default-base is &lt;4.4.121-92.114" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257007" version="1" comment="kernel-default-devel is &lt;4.4.121-92.114" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257008" version="1" comment="kernel-devel is &lt;4.4.121-92.114" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257009" version="1" comment="kernel-macros is &lt;4.4.121-92.114" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257010" version="1" comment="kernel-source is &lt;4.4.121-92.114" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257011" version="1" comment="kernel-syms is &lt;4.4.121-92.114" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257012" version="1" comment="kgraft-patch-4_4_121-92_114-default is &lt;1-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257013" version="1" comment="kgraft-patch-SLE12-SP2_Update_30 is &lt;1-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257867" version="1" comment="dbus-1 is &lt;1.8.22-24.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257868" version="1" comment="dbus-1-x11 is &lt;1.8.22-24.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257869" version="1" comment="libdbus-1-3 is &lt;1.8.22-24.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257870" version="1" comment="libdbus-1-3-32bit is &lt;1.8.22-24.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257871" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.35-30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257872" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr5.35-30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257873" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.35-30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257874" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr5.35-30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258031" version="1" comment="MozillaFirefox-devel is &lt;60.7.2-109.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259008" version="1" comment="postgresql10-contrib is &lt;10.9-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259009" version="1" comment="postgresql10-docs is &lt;10.9-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259010" version="1" comment="postgresql10-plperl is &lt;10.9-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259011" version="1" comment="postgresql10-plpython is &lt;10.9-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259012" version="1" comment="postgresql10-pltcl is &lt;10.9-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259013" version="1" comment="postgresql10-server is &lt;10.9-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259186" version="1" comment="kernel-default-base is &lt;4.4.121-92.117" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259187" version="1" comment="kernel-default-devel is &lt;4.4.121-92.117" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259188" version="1" comment="kernel-devel is &lt;4.4.121-92.117" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259189" version="1" comment="kernel-macros is &lt;4.4.121-92.117" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259190" version="1" comment="kernel-source is &lt;4.4.121-92.117" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259191" version="1" comment="kernel-syms is &lt;4.4.121-92.117" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259192" version="1" comment="kgraft-patch-4_4_121-92_117-default is &lt;1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259193" version="1" comment="kgraft-patch-SLE12-SP2_Update_31 is &lt;1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259420" version="1" comment="MozillaFirefox-devel is &lt;60.8.0-109.83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259421" version="1" comment="libfreebl3-hmac is &lt;3.44.1-58.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259422" version="1" comment="libfreebl3-hmac-32bit is &lt;3.44.1-58.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259423" version="1" comment="libsoftokn3-hmac is &lt;3.44.1-58.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259424" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.44.1-58.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260430" version="1" comment="bzip2-doc is &lt;1.0.6-30.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260431" version="1" comment="glibc is &lt;2.22-62.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260432" version="1" comment="glibc-32bit is &lt;2.22-62.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260433" version="1" comment="glibc-devel is &lt;2.22-62.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260434" version="1" comment="glibc-devel-32bit is &lt;2.22-62.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260435" version="1" comment="glibc-html is &lt;2.22-62.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260436" version="1" comment="glibc-i18ndata is &lt;2.22-62.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260437" version="1" comment="glibc-info is &lt;2.22-62.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260438" version="1" comment="glibc-locale is &lt;2.22-62.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260439" version="1" comment="glibc-locale-32bit is &lt;2.22-62.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260440" version="1" comment="glibc-profile is &lt;2.22-62.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260441" version="1" comment="glibc-profile-32bit is &lt;2.22-62.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260442" version="1" comment="nscd is &lt;2.22-62.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242801" version="1" comment="xen is &lt;4.7.6_05-43.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242802" version="1" comment="xen-doc-html is &lt;4.7.6_05-43.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242803" version="1" comment="xen-libs is &lt;4.7.6_05-43.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242804" version="1" comment="xen-libs-32bit is &lt;4.7.6_05-43.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242805" version="1" comment="xen-tools is &lt;4.7.6_05-43.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242806" version="1" comment="xen-tools-domU is &lt;4.7.6_05-43.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260843" version="1" comment="bzip2-doc is &lt;1.0.6-30.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261281" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.222-27.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261282" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.222-27.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261283" version="1" comment="libmysqlclient18 is &lt;10.0.38-29.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261284" version="1" comment="libmysqlclient18-32bit is &lt;10.0.38-29.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261285" version="1" comment="mariadb is &lt;10.0.38-29.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261286" version="1" comment="mariadb-client is &lt;10.0.38-29.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261287" version="1" comment="mariadb-errormessages is &lt;10.0.38-29.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261288" version="1" comment="mariadb-tools is &lt;10.0.38-29.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261289" version="1" comment="squid is &lt;3.5.21-26.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261290" version="1" comment="python-32bit is &lt;2.7.13-28.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261291" version="1" comment="python-base-32bit is &lt;2.7.13-28.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261292" version="1" comment="python-demo is &lt;2.7.13-28.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261293" version="1" comment="python-doc is &lt;2.7.13-28.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261294" version="1" comment="python-doc-pdf is &lt;2.7.13-28.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261295" version="1" comment="python-gdbm is &lt;2.7.13-28.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261296" version="1" comment="python-idle is &lt;2.7.13-28.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261297" version="1" comment="libvirt is &lt;2.0.0-27.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261298" version="1" comment="libvirt-client is &lt;2.0.0-27.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261299" version="1" comment="libvirt-daemon is &lt;2.0.0-27.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261300" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261301" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261302" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261303" version="1" comment="libvirt-daemon-driver-libxl is &lt;2.0.0-27.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261304" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261305" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261306" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261307" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261308" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261309" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261310" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261311" version="1" comment="libvirt-daemon-hooks is &lt;2.0.0-27.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261312" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261313" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261314" version="1" comment="libvirt-daemon-xen is &lt;2.0.0-27.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261315" version="1" comment="libvirt-doc is &lt;2.0.0-27.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261316" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-27.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261317" version="1" comment="libvirt-nss is &lt;2.0.0-27.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263854" version="1" comment="qemu is &lt;2.6.2-41.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263855" version="1" comment="qemu-block-curl is &lt;2.6.2-41.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263856" version="1" comment="qemu-block-rbd is &lt;2.6.2-41.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263857" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263858" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263859" version="1" comment="qemu-ipxe is &lt;1.0.0-41.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263860" version="1" comment="qemu-kvm is &lt;2.6.2-41.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263861" version="1" comment="qemu-lang is &lt;2.6.2-41.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263862" version="1" comment="qemu-seabios is &lt;1.9.1-41.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263863" version="1" comment="qemu-sgabios is &lt;8-41.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263864" version="1" comment="qemu-tools is &lt;2.6.2-41.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263865" version="1" comment="qemu-vgabios is &lt;1.9.1-41.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263866" version="1" comment="qemu-x86 is &lt;2.6.2-41.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263867" version="1" comment="postgresql94 is &lt;9.4.24-21.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263868" version="1" comment="postgresql94-contrib is &lt;9.4.24-21.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263869" version="1" comment="postgresql94-docs is &lt;9.4.24-21.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263870" version="1" comment="postgresql94-server is &lt;9.4.24-21.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261569" version="1" comment="postgresql96 is &lt;9.6.15-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261570" version="1" comment="postgresql96-contrib is &lt;9.6.15-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261571" version="1" comment="postgresql96-docs is &lt;9.6.15-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261572" version="1" comment="postgresql96-libs is &lt;9.6.15-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261573" version="1" comment="postgresql96-server is &lt;9.6.15-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263319" version="1" comment="perl-solv is &lt;0.6.36-2.27.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263749" version="1" comment="kernel-default-base is &lt;4.4.121-92.120" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263750" version="1" comment="kernel-default-devel is &lt;4.4.121-92.120" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263751" version="1" comment="kernel-devel is &lt;4.4.121-92.120" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263752" version="1" comment="kernel-macros is &lt;4.4.121-92.120" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263753" version="1" comment="kernel-source is &lt;4.4.121-92.120" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263754" version="1" comment="kernel-syms is &lt;4.4.121-92.120" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263755" version="1" comment="kgraft-patch-4_4_121-92_120-default is &lt;1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263756" version="1" comment="kgraft-patch-SLE12-SP2_Update_32 is &lt;1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243790" version="1" comment="libspice-server1 is &lt;0.12.7-10.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243791" version="1" comment="spice is &lt;0.12.7-10.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263902" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.50-38.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263903" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.50-38.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263904" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.50-38.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263905" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.50-38.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263906" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.50-38.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264560" version="1" comment="curl is &lt;7.37.0-37.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264561" version="1" comment="libcurl4 is &lt;7.37.0-37.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264562" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264563" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.40-30.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264564" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr5.40-30.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264565" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.40-30.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264566" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr5.40-30.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265051" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265052" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265053" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265054" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265055" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265056" version="1" comment="openssl is &lt;1.0.2j-60.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265057" version="1" comment="openssl-doc is &lt;1.0.2j-60.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265163" version="1" comment="MozillaFirefox-devel is &lt;60.9.0-109.86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265164" version="1" comment="dovecot22 is &lt;2.2.31-19.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265165" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265166" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265167" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244053" version="1" comment="LibVNCServer is &lt;0.9.9-17.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244054" version="1" comment="libvncclient0 is &lt;0.9.9-17.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244055" version="1" comment="libvncserver0 is &lt;0.9.9-17.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244165" version="1" comment="MozillaFirefox-devel is &lt;60.5.0esr-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244166" version="1" comment="libfreebl3-hmac is &lt;3.41.1-58.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244167" version="1" comment="libfreebl3-hmac-32bit is &lt;3.41.1-58.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244168" version="1" comment="libsoftokn3-hmac is &lt;3.41.1-58.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244169" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.41.1-58.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244279" version="1" comment="libblkid1 is &lt;2.28-44.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244280" version="1" comment="libblkid1-32bit is &lt;2.28-44.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244281" version="1" comment="libfdisk1 is &lt;2.28-44.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244282" version="1" comment="libmount1 is &lt;2.28-44.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244283" version="1" comment="libmount1-32bit is &lt;2.28-44.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244284" version="1" comment="libsmartcols1 is &lt;2.28-44.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244285" version="1" comment="libuuid1 is &lt;2.28-44.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244286" version="1" comment="libuuid1-32bit is &lt;2.28-44.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244287" version="1" comment="python-libmount is &lt;2.28-44.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244288" version="1" comment="util-linux is &lt;2.28-44.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244289" version="1" comment="util-linux-lang is &lt;2.28-44.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244290" version="1" comment="util-linux-systemd is &lt;2.28-44.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244291" version="1" comment="uuidd is &lt;2.28-44.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244664" version="1" comment="kernel-default-base is &lt;4.4.121-92.101" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244665" version="1" comment="kernel-default-devel is &lt;4.4.121-92.101" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244666" version="1" comment="kernel-devel is &lt;4.4.121-92.101" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244667" version="1" comment="kernel-macros is &lt;4.4.121-92.101" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244668" version="1" comment="kernel-source is &lt;4.4.121-92.101" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244669" version="1" comment="kernel-syms is &lt;4.4.121-92.101" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244670" version="1" comment="kgraft-patch-4_4_121-92_101-default is &lt;1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244671" version="1" comment="kgraft-patch-SLE12-SP2_Update_27 is &lt;1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245045" version="1" comment="python-32bit is &lt;2.7.13-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245046" version="1" comment="python-base-32bit is &lt;2.7.13-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245047" version="1" comment="python-demo is &lt;2.7.13-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245048" version="1" comment="python-doc is &lt;2.7.13-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245049" version="1" comment="python-doc-pdf is &lt;2.7.13-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245050" version="1" comment="python-gdbm is &lt;2.7.13-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245051" version="1" comment="python-idle is &lt;2.7.13-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245052" version="1" comment="qemu is &lt;2.6.2-41.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245053" version="1" comment="qemu-block-curl is &lt;2.6.2-41.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245054" version="1" comment="qemu-block-rbd is &lt;2.6.2-41.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245055" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245056" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245057" version="1" comment="qemu-ipxe is &lt;1.0.0-41.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245058" version="1" comment="qemu-kvm is &lt;2.6.2-41.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245059" version="1" comment="qemu-lang is &lt;2.6.2-41.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245060" version="1" comment="qemu-seabios is &lt;1.9.1-41.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245061" version="1" comment="qemu-sgabios is &lt;8-41.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245062" version="1" comment="qemu-tools is &lt;2.6.2-41.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245063" version="1" comment="qemu-vgabios is &lt;1.9.1-41.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245064" version="1" comment="qemu-x86 is &lt;2.6.2-41.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242819" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.201-43.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242820" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.201-43.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245348" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.22.6-2.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245349" version="1" comment="webkit2gtk3-devel is &lt;2.22.6-2.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246991" version="1" comment="libvirt is &lt;2.0.0-27.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246992" version="1" comment="libvirt-client is &lt;2.0.0-27.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246993" version="1" comment="libvirt-daemon is &lt;2.0.0-27.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246994" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246995" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246996" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246997" version="1" comment="libvirt-daemon-driver-libxl is &lt;2.0.0-27.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246998" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246999" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247000" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247001" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247002" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247003" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247004" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247005" version="1" comment="libvirt-daemon-hooks is &lt;2.0.0-27.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247006" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247007" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247008" version="1" comment="libvirt-daemon-xen is &lt;2.0.0-27.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247009" version="1" comment="libvirt-doc is &lt;2.0.0-27.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247010" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-27.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247011" version="1" comment="libvirt-nss is &lt;2.0.0-27.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242867" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.191-27.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242868" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.191-27.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242869" version="1" comment="LibVNCServer is &lt;0.9.9-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242870" version="1" comment="libvncclient0 is &lt;0.9.9-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242871" version="1" comment="libvncserver0 is &lt;0.9.9-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245832" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.40-38.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245833" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.40-38.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245834" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.40-38.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245835" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.40-38.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245836" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.40-38.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245897" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.30-30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245898" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr5.30-30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245899" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.30-30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245900" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr5.30-30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246558" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246559" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246560" version="1" comment="openssl-doc is &lt;1.0.2j-60.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246715" version="1" comment="kernel-default-base is &lt;4.4.121-92.104" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246716" version="1" comment="kernel-default-devel is &lt;4.4.121-92.104" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246717" version="1" comment="kernel-devel is &lt;4.4.121-92.104" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246718" version="1" comment="kernel-macros is &lt;4.4.121-92.104" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246719" version="1" comment="kernel-source is &lt;4.4.121-92.104" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246720" version="1" comment="kernel-syms is &lt;4.4.121-92.104" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246721" version="1" comment="kgraft-patch-4_4_121-92_104-default is &lt;1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246722" version="1" comment="kgraft-patch-SLE12-SP2_Update_28 is &lt;1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246942" version="1" comment="MozillaFirefox-devel is &lt;60.6.1esr-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247033" version="1" comment="apache2 is &lt;2.4.23-29.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247034" version="1" comment="apache2-doc is &lt;2.4.23-29.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247035" version="1" comment="apache2-example-pages is &lt;2.4.23-29.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247036" version="1" comment="apache2-prefork is &lt;2.4.23-29.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247037" version="1" comment="apache2-utils is &lt;2.4.23-29.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247038" version="1" comment="apache2-worker is &lt;2.4.23-29.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247228" version="1" comment="dovecot22 is &lt;2.2.31-19.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247229" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247230" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247231" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247232" version="1" comment="xen is &lt;4.7.6_06-43.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247233" version="1" comment="xen-doc-html is &lt;4.7.6_06-43.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247234" version="1" comment="xen-libs is &lt;4.7.6_06-43.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247235" version="1" comment="xen-libs-32bit is &lt;4.7.6_06-43.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247236" version="1" comment="xen-tools is &lt;4.7.6_06-43.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247237" version="1" comment="xen-tools-domU is &lt;4.7.6_06-43.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192113" version="1" comment="bind-chrootenv is &lt;9.9.9P1-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192114" version="1" comment="bind-doc is &lt;9.9.9P1-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192115" version="1" comment="qemu-arm is &lt;2.6.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192116" version="1" comment="qemu-block-rbd is &lt;2.6.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192117" version="1" comment="qemu-block-ssh is &lt;2.6.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192118" version="1" comment="qemu-guest-agent is &lt;2.6.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192119" version="1" comment="qemu-lang is &lt;2.6.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192120" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.111-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192121" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.111-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192122" version="1" comment="dovecot22 is &lt;2.2.13-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192123" version="1" comment="dovecot22-backend-mysql is &lt;2.2.13-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192124" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.13-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192125" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.13-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192126" version="1" comment="mariadb-tools is &lt;10.0.28-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192127" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.121-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192128" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.121-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192129" version="1" comment="libfreebl3-hmac is &lt;3.21.3-50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192130" version="1" comment="libsoftokn3-hmac is &lt;3.21.3-50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192131" version="1" comment="kernel-default-base is &lt;4.4.21-84" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192132" version="1" comment="tomcat is &lt;8.0.36-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192133" version="1" comment="tomcat-admin-webapps is &lt;8.0.36-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192134" version="1" comment="tomcat-docs-webapp is &lt;8.0.36-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192135" version="1" comment="tomcat-el-3_0-api is &lt;8.0.36-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192136" version="1" comment="tomcat-javadoc is &lt;8.0.36-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192137" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.36-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192138" version="1" comment="tomcat-lib is &lt;8.0.36-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192139" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.36-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192140" version="1" comment="tomcat-webapps is &lt;8.0.36-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192141" version="1" comment="kernel-default-base is &lt;4.4.21-90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192142" version="1" comment="libxml2-doc is &lt;2.9.4-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192143" version="1" comment="postgresql94-contrib is &lt;9.4.12-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192144" version="1" comment="postgresql94-docs is &lt;9.4.12-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192145" version="1" comment="postgresql94-server is &lt;9.4.12-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192146" version="1" comment="freeradius-server is &lt;3.0.3-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192147" version="1" comment="freeradius-server-doc is &lt;3.0.3-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192148" version="1" comment="freeradius-server-krb5 is &lt;3.0.3-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192149" version="1" comment="freeradius-server-ldap is &lt;3.0.3-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192150" version="1" comment="freeradius-server-libs is &lt;3.0.3-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192151" version="1" comment="freeradius-server-mysql is &lt;3.0.3-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192152" version="1" comment="freeradius-server-perl is &lt;3.0.3-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192153" version="1" comment="freeradius-server-postgresql is &lt;3.0.3-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192154" version="1" comment="freeradius-server-python is &lt;3.0.3-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192155" version="1" comment="freeradius-server-sqlite is &lt;3.0.3-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192156" version="1" comment="freeradius-server-utils is &lt;3.0.3-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192157" version="1" comment="kernel-default-base is &lt;4.4.59-92.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192158" version="1" comment="qemu-arm is &lt;2.6.2-41.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192159" version="1" comment="qemu-block-rbd is &lt;2.6.2-41.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192160" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192161" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192162" version="1" comment="qemu-lang is &lt;2.6.2-41.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192163" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-16.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192164" version="1" comment="libgnutls-openssl27 is &lt;3.2.15-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192165" version="1" comment="kernel-default-base is &lt;4.4.74-92.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192166" version="1" comment="dracut-fips is &lt;044.1-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192167" version="1" comment="apache2 is &lt;2.4.23-29.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192168" version="1" comment="apache2-doc is &lt;2.4.23-29.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192169" version="1" comment="apache2-example-pages is &lt;2.4.23-29.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192170" version="1" comment="apache2-prefork is &lt;2.4.23-29.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192171" version="1" comment="apache2-utils is &lt;2.4.23-29.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192172" version="1" comment="apache2-worker is &lt;2.4.23-29.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192173" version="1" comment="mariadb-tools is &lt;10.0.31-29.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192174" version="1" comment="kernel-default-base is &lt;4.4.74-92.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192175" version="1" comment="kernel-default-base is &lt;4.4.74-92.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192177" version="1" comment="libxml2-doc is &lt;2.9.4-46.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192178" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.144-27.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192179" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.144-27.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192180" version="1" comment="freeradius-server is &lt;3.0.3-17.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192181" version="1" comment="freeradius-server-doc is &lt;3.0.3-17.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192182" version="1" comment="freeradius-server-krb5 is &lt;3.0.3-17.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192183" version="1" comment="freeradius-server-ldap is &lt;3.0.3-17.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192184" version="1" comment="freeradius-server-libs is &lt;3.0.3-17.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192185" version="1" comment="freeradius-server-mysql is &lt;3.0.3-17.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192186" version="1" comment="freeradius-server-perl is &lt;3.0.3-17.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192187" version="1" comment="freeradius-server-postgresql is &lt;3.0.3-17.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192188" version="1" comment="freeradius-server-python is &lt;3.0.3-17.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192189" version="1" comment="freeradius-server-sqlite is &lt;3.0.3-17.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192190" version="1" comment="freeradius-server-utils is &lt;3.0.3-17.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192191" version="1" comment="openssh-fips is &lt;7.2p2-66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192192" version="1" comment="libfpm_pb0 is &lt;1.1.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192193" version="1" comment="libospf0 is &lt;1.1.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192194" version="1" comment="libospfapiclient0 is &lt;1.1.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192195" version="1" comment="libquagga_pb0 is &lt;1.1.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192196" version="1" comment="libzebra1 is &lt;1.1.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192197" version="1" comment="quagga is &lt;1.1.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192198" version="1" comment="git is &lt;2.12.3-27.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192199" version="1" comment="git-core is &lt;2.12.3-27.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192200" version="1" comment="git-doc is &lt;2.12.3-27.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192201" version="1" comment="libicu-doc is &lt;52.1-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192202" version="1" comment="postgresql94-contrib is &lt;9.4.13-21.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192203" version="1" comment="postgresql94-docs is &lt;9.4.13-21.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192204" version="1" comment="postgresql94-server is &lt;9.4.13-21.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192205" version="1" comment="postgresql96-contrib is &lt;9.6.4-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192206" version="1" comment="postgresql96-docs is &lt;9.6.4-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192207" version="1" comment="postgresql96-server is &lt;9.6.4-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192209" version="1" comment="kernel-default-base is &lt;4.4.74-92.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192212" version="1" comment="apache2 is &lt;2.4.23-29.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192213" version="1" comment="apache2-doc is &lt;2.4.23-29.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192214" version="1" comment="apache2-example-pages is &lt;2.4.23-29.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192215" version="1" comment="apache2-prefork is &lt;2.4.23-29.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192216" version="1" comment="apache2-utils is &lt;2.4.23-29.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192217" version="1" comment="apache2-worker is &lt;2.4.23-29.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192218" version="1" comment="python-louis is &lt;2.6.4-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192219" version="1" comment="tcmu-runner is &lt;1.0.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192220" version="1" comment="krb5-doc is &lt;1.12.5-40.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192221" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.5-40.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192222" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.5-40.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192223" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.5-40.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192224" version="1" comment="krb5-server is &lt;1.12.5-40.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192225" version="1" comment="libfreebl3-hmac is &lt;3.29.5-58.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192226" version="1" comment="libsoftokn3-hmac is &lt;3.29.5-58.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192227" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-27.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192228" version="1" comment="libvirt-nss is &lt;2.0.0-27.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192229" version="1" comment="xerces-j2-xml-apis is &lt;2.8.1-268.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192230" version="1" comment="xerces-j2-xml-resolver is &lt;2.8.1-268.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192231" version="1" comment="git is &lt;2.12.3-27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192232" version="1" comment="git-core is &lt;2.12.3-27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192233" version="1" comment="git-doc is &lt;2.12.3-27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192234" version="1" comment="policycoreutils is &lt;2.5-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192235" version="1" comment="policycoreutils-python is &lt;2.5-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192236" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.121-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192237" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.121-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192239" version="1" comment="libgnutls-openssl27 is &lt;3.2.15-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192240" version="1" comment="kernel-default-base is &lt;4.4.90-92.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192241" version="1" comment="qemu-arm is &lt;2.6.2-41.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192242" version="1" comment="qemu-block-rbd is &lt;2.6.2-41.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192243" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192244" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192245" version="1" comment="qemu-lang is &lt;2.6.2-41.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192246" version="1" comment="krb5-doc is &lt;1.12.5-40.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192247" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.5-40.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192248" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.5-40.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192249" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.5-40.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192250" version="1" comment="krb5-server is &lt;1.12.5-40.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192251" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.151-27.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192252" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.151-27.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192253" version="1" comment="tomcat is &lt;8.0.43-29.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192254" version="1" comment="tomcat-admin-webapps is &lt;8.0.43-29.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192255" version="1" comment="tomcat-docs-webapp is &lt;8.0.43-29.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192256" version="1" comment="tomcat-el-3_0-api is &lt;8.0.43-29.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192257" version="1" comment="tomcat-javadoc is &lt;8.0.43-29.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192258" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.43-29.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192259" version="1" comment="tomcat-lib is &lt;8.0.43-29.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192260" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.43-29.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192261" version="1" comment="tomcat-webapps is &lt;8.0.43-29.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192262" version="1" comment="libxml2-doc is &lt;2.9.4-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192263" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192264" version="1" comment="openssl-doc is &lt;1.0.2j-60.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192268" version="1" comment="kernel-default-base is &lt;4.4.90-92.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192269" version="1" comment="openssh-fips is &lt;7.2p2-74.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192271" version="1" comment="opensaml is &lt;2.5.5-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192276" version="1" comment="mariadb-tools is &lt;10.0.29-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192277" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192278" version="1" comment="openssl-doc is &lt;1.0.2j-60.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192279" version="1" comment="postgresql96-contrib is &lt;9.6.6-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192280" version="1" comment="postgresql96-docs is &lt;9.6.6-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192281" version="1" comment="postgresql96-server is &lt;9.6.6-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192282" version="1" comment="kernel-default-base is &lt;4.4.103-92.53" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192283" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.131-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192284" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.131-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192285" version="1" comment="kernel-default-base is &lt;4.4.49-92.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192286" version="1" comment="bind-chrootenv is &lt;9.9.9P1-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192287" version="1" comment="bind-doc is &lt;9.9.9P1-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192288" version="1" comment="qemu-arm is &lt;2.6.2-41.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192289" version="1" comment="qemu-block-rbd is &lt;2.6.2-41.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192290" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192291" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192292" version="1" comment="qemu-lang is &lt;2.6.2-41.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192293" version="1" comment="freeradius-server is &lt;3.0.3-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192294" version="1" comment="freeradius-server-doc is &lt;3.0.3-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192295" version="1" comment="freeradius-server-krb5 is &lt;3.0.3-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192296" version="1" comment="freeradius-server-ldap is &lt;3.0.3-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192297" version="1" comment="freeradius-server-libs is &lt;3.0.3-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192298" version="1" comment="freeradius-server-mysql is &lt;3.0.3-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192299" version="1" comment="freeradius-server-perl is &lt;3.0.3-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192300" version="1" comment="freeradius-server-postgresql is &lt;3.0.3-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192301" version="1" comment="freeradius-server-python is &lt;3.0.3-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192302" version="1" comment="freeradius-server-sqlite is &lt;3.0.3-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192303" version="1" comment="freeradius-server-utils is &lt;3.0.3-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192304" version="1" comment="apache2 is &lt;2.4.23-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192305" version="1" comment="apache2-doc is &lt;2.4.23-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192306" version="1" comment="apache2-example-pages is &lt;2.4.23-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192307" version="1" comment="apache2-prefork is &lt;2.4.23-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192308" version="1" comment="apache2-utils is &lt;2.4.23-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192309" version="1" comment="apache2-worker is &lt;2.4.23-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192310" version="1" comment="kernel-default-base is &lt;4.4.49-92.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192311" version="1" comment="bind-chrootenv is &lt;9.9.9P1-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192312" version="1" comment="bind-doc is &lt;9.9.9P1-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192313" version="1" comment="dracut-fips is &lt;044-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192314" version="1" comment="bind-chrootenv is &lt;9.9.9P1-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192315" version="1" comment="bind-doc is &lt;9.9.9P1-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192316" version="1" comment="apache2-mod_apparmor is &lt;2.8.2-54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192317" version="1" comment="qemu-arm is &lt;2.6.2-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192318" version="1" comment="qemu-block-rbd is &lt;2.6.2-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192319" version="1" comment="qemu-block-ssh is &lt;2.6.2-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192320" version="1" comment="qemu-guest-agent is &lt;2.6.2-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192321" version="1" comment="qemu-lang is &lt;2.6.2-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192322" version="1" comment="kernel-default-base is &lt;4.4.59-92.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192323" version="1" comment="dovecot is &lt;2.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192324" version="1" comment="dovecot22 is &lt;2.2.29.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192325" version="1" comment="dovecot22-backend-mysql is &lt;2.2.29.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192326" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.29.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192327" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.29.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192328" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.121-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192329" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.121-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192330" version="1" comment="mariadb-tools is &lt;10.0.30-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192331" version="1" comment="kernel-default-base is &lt;4.4.38-93" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192332" version="1" comment="libxml2-doc is &lt;2.9.4-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192333" version="1" comment="libxml2-doc is &lt;2.9.4-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192334" version="1" comment="libmicrohttpd is &lt;0.9.30-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192335" version="1" comment="apache2 is &lt;2.4.23-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192336" version="1" comment="apache2-doc is &lt;2.4.23-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192337" version="1" comment="apache2-example-pages is &lt;2.4.23-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192338" version="1" comment="apache2-prefork is &lt;2.4.23-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192339" version="1" comment="apache2-utils is &lt;2.4.23-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192340" version="1" comment="apache2-worker is &lt;2.4.23-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192341" version="1" comment="kernel-default-base is &lt;4.4.59-92.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192342" version="1" comment="openvpn-auth-pam-plugin is &lt;2.3.8-16.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192343" version="1" comment="libxmltooling6 is &lt;1.5.6-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192344" version="1" comment="xmltooling is &lt;1.5.6-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192345" version="1" comment="xmltooling-schemas is &lt;1.5.6-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192346" version="1" comment="kernel-default-base is &lt;4.4.103-92.56" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192347" version="1" comment="libvorbis-doc is &lt;1.3.3-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192348" version="1" comment="apache2 is &lt;2.4.23-29.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192349" version="1" comment="apache2-doc is &lt;2.4.23-29.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192350" version="1" comment="apache2-example-pages is &lt;2.4.23-29.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192351" version="1" comment="apache2-prefork is &lt;2.4.23-29.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192352" version="1" comment="apache2-utils is &lt;2.4.23-29.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192353" version="1" comment="apache2-worker is &lt;2.4.23-29.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192354" version="1" comment="bind-chrootenv is &lt;9.9.9P1-63.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192355" version="1" comment="bind-doc is &lt;9.9.9P1-63.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192356" version="1" comment="openvswitch is &lt;2.5.1-25.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192357" version="1" comment="openvswitch-switch is &lt;2.5.1-25.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192358" version="1" comment="qemu-arm is &lt;2.6.2-41.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192359" version="1" comment="qemu-block-rbd is &lt;2.6.2-41.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192360" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192361" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192362" version="1" comment="qemu-lang is &lt;2.6.2-41.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192363" version="1" comment="mariadb-tools is &lt;10.0.33-29.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192364" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-27.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192365" version="1" comment="libvirt-nss is &lt;2.0.0-27.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192366" version="1" comment="libxml2-doc is &lt;2.9.4-46.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192367" version="1" comment="kernel-default-base is &lt;4.4.114-92.64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192369" version="1" comment="glibc-html is &lt;2.22-62.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192370" version="1" comment="glibc-info is &lt;2.22-62.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192371" version="1" comment="glibc-profile is &lt;2.22-62.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192372" version="1" comment="libfpm_pb0 is &lt;1.1.1-17.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192378" version="1" comment="dovecot22 is &lt;2.2.31-19.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192379" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192380" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192381" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192382" version="1" comment="postgresql96-contrib is &lt;9.6.7-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192383" version="1" comment="postgresql96-docs is &lt;9.6.7-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192384" version="1" comment="postgresql96-server is &lt;9.6.7-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192385" version="1" comment="dhcp-relay is &lt;4.3.3-10.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192386" version="1" comment="dhcp-server is &lt;4.3.3-10.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192387" version="1" comment="squid is &lt;3.5.21-26.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192388" version="1" comment="glibc-html is &lt;2.22-62.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192389" version="1" comment="glibc-info is &lt;2.22-62.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192390" version="1" comment="glibc-profile is &lt;2.22-62.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192391" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.171-43.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192392" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.171-43.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192393" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.161-27.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192394" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.161-27.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192395" version="1" comment="postgresql94-contrib is &lt;9.4.16-21.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192396" version="1" comment="postgresql94-docs is &lt;9.4.16-21.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192397" version="1" comment="postgresql94-server is &lt;9.4.16-21.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192398" version="1" comment="mariadb-tools is &lt;10.0.34-29.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192400" version="1" comment="xmltooling is &lt;1.5.6-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192402" version="1" comment="crash is &lt;7.1.5-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192403" version="1" comment="crash-kmp-default is &lt;7.1.5_k4.4.114_92.67-15.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192404" version="1" comment="postgresql96-contrib is &lt;9.6.8-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192405" version="1" comment="postgresql96-docs is &lt;9.6.8-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192406" version="1" comment="postgresql96-server is &lt;9.6.8-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192407" version="1" comment="libvorbis-doc is &lt;1.3.3-10.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192408" version="1" comment="kernel-default-base is &lt;4.4.120-92.70" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192411" version="1" comment="tomcat is &lt;8.0.50-29.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192412" version="1" comment="tomcat-admin-webapps is &lt;8.0.50-29.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192413" version="1" comment="tomcat-docs-webapp is &lt;8.0.50-29.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192414" version="1" comment="tomcat-el-3_0-api is &lt;8.0.50-29.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192415" version="1" comment="tomcat-javadoc is &lt;8.0.50-29.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192416" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.50-29.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192417" version="1" comment="tomcat-lib is &lt;8.0.50-29.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192418" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.50-29.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192419" version="1" comment="tomcat-webapps is &lt;8.0.50-29.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192420" version="1" comment="glibc-html is &lt;2.22-62.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192421" version="1" comment="glibc-info is &lt;2.22-62.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192422" version="1" comment="glibc-profile is &lt;2.22-62.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192423" version="1" comment="librelp is &lt;1.2.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192424" version="1" comment="librelp0 is &lt;1.2.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192425" version="1" comment="LibVNCServer is &lt;0.9.9-17.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192428" version="1" comment="qemu-arm is &lt;2.6.2-41.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192429" version="1" comment="qemu-block-rbd is &lt;2.6.2-41.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192430" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192431" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192432" version="1" comment="qemu-lang is &lt;2.6.2-41.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192433" version="1" comment="memcached is &lt;1.4.39-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192434" version="1" comment="krb5-doc is &lt;1.12.5-40.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192435" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.5-40.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192436" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.5-40.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192437" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.5-40.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192438" version="1" comment="krb5-server is &lt;1.12.5-40.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192439" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-27.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192440" version="1" comment="libvirt-nss is &lt;2.0.0-27.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192441" version="1" comment="postgresql94-contrib is &lt;9.4.17-21.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192442" version="1" comment="postgresql94-docs is &lt;9.4.17-21.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192443" version="1" comment="postgresql94-server is &lt;9.4.17-21.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192444" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.161-43.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192445" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.161-43.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192448" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192449" version="1" comment="openssl-doc is &lt;1.0.2j-60.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192450" version="1" comment="postgresql94-contrib is &lt;9.4.15-21.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192451" version="1" comment="postgresql94-docs is &lt;9.4.15-21.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192452" version="1" comment="postgresql94-server is &lt;9.4.15-21.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192453" version="1" comment="mariadb-tools is &lt;10.0.32-29.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192454" version="1" comment="openslp-server is &lt;2.0.0-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192455" version="1" comment="kernel-compute is &lt;3.12.58-14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192456" version="1" comment="kernel-compute-base is &lt;3.12.58-14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192457" version="1" comment="kernel-compute-devel is &lt;3.12.58-14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192458" version="1" comment="kernel-compute_debug is &lt;3.12.58-14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192459" version="1" comment="kernel-compute_debug-devel is &lt;3.12.58-14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192460" version="1" comment="kernel-devel-rt is &lt;3.12.58-14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192461" version="1" comment="kernel-rt is &lt;3.12.58-14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192462" version="1" comment="kernel-rt-base is &lt;3.12.58-14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192463" version="1" comment="kernel-rt-devel is &lt;3.12.58-14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192464" version="1" comment="kernel-rt_debug is &lt;3.12.58-14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192465" version="1" comment="kernel-rt_debug-devel is &lt;3.12.58-14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192466" version="1" comment="kernel-source-rt is &lt;3.12.58-14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192467" version="1" comment="kernel-syms-rt is &lt;3.12.58-14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129865" version="1" comment="SUSE-Linux-Enterprise-RT-release is ==12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192468" version="1" comment="kernel-compute is &lt;3.12.61-60.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192469" version="1" comment="kernel-compute-base is &lt;3.12.61-60.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192470" version="1" comment="kernel-compute-devel is &lt;3.12.61-60.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192471" version="1" comment="kernel-compute_debug is &lt;3.12.61-60.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192472" version="1" comment="kernel-compute_debug-devel is &lt;3.12.61-60.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192473" version="1" comment="kernel-devel-rt is &lt;3.12.61-60.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192474" version="1" comment="kernel-rt is &lt;3.12.61-60.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192475" version="1" comment="kernel-rt-base is &lt;3.12.61-60.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192476" version="1" comment="kernel-rt-devel is &lt;3.12.61-60.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192477" version="1" comment="kernel-rt_debug is &lt;3.12.61-60.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192478" version="1" comment="kernel-rt_debug-devel is &lt;3.12.61-60.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192479" version="1" comment="kernel-source-rt is &lt;3.12.61-60.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192480" version="1" comment="kernel-syms-rt is &lt;3.12.61-60.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192481" version="1" comment="kernel-compute is &lt;3.12.67-60.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192482" version="1" comment="kernel-compute-base is &lt;3.12.67-60.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192483" version="1" comment="kernel-compute-devel is &lt;3.12.67-60.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192484" version="1" comment="kernel-compute_debug is &lt;3.12.67-60.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192485" version="1" comment="kernel-compute_debug-devel is &lt;3.12.67-60.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192486" version="1" comment="kernel-devel-rt is &lt;3.12.67-60.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192487" version="1" comment="kernel-rt is &lt;3.12.67-60.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192488" version="1" comment="kernel-rt-base is &lt;3.12.67-60.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192489" version="1" comment="kernel-rt-devel is &lt;3.12.67-60.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192490" version="1" comment="kernel-rt_debug is &lt;3.12.67-60.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192491" version="1" comment="kernel-rt_debug-devel is &lt;3.12.67-60.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192492" version="1" comment="kernel-source-rt is &lt;3.12.67-60.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192493" version="1" comment="kernel-syms-rt is &lt;3.12.67-60.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192494" version="1" comment="kernel-compute is &lt;3.12.69-60.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192495" version="1" comment="kernel-compute-base is &lt;3.12.69-60.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192496" version="1" comment="kernel-compute-devel is &lt;3.12.69-60.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192497" version="1" comment="kernel-compute_debug is &lt;3.12.69-60.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192498" version="1" comment="kernel-compute_debug-devel is &lt;3.12.69-60.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192499" version="1" comment="kernel-devel-rt is &lt;3.12.69-60.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192500" version="1" comment="kernel-rt is &lt;3.12.69-60.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192501" version="1" comment="kernel-rt-base is &lt;3.12.69-60.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192502" version="1" comment="kernel-rt-devel is &lt;3.12.69-60.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192503" version="1" comment="kernel-rt_debug is &lt;3.12.69-60.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192504" version="1" comment="kernel-rt_debug-devel is &lt;3.12.69-60.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192505" version="1" comment="kernel-source-rt is &lt;3.12.69-60.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192506" version="1" comment="kernel-syms-rt is &lt;3.12.69-60.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192507" version="1" comment="cluster-md-kmp-rt is &lt;4.4.74-7.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192508" version="1" comment="cluster-network-kmp-rt is &lt;4.4.74-7.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192509" version="1" comment="dlm-kmp-rt is &lt;4.4.74-7.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192510" version="1" comment="gfs2-kmp-rt is &lt;4.4.74-7.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192511" version="1" comment="kernel-devel-rt is &lt;4.4.74-7.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192512" version="1" comment="kernel-rt is &lt;4.4.74-7.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192513" version="1" comment="kernel-rt-base is &lt;4.4.74-7.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192514" version="1" comment="kernel-rt-devel is &lt;4.4.74-7.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192515" version="1" comment="kernel-rt_debug is &lt;4.4.74-7.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192516" version="1" comment="kernel-rt_debug-devel is &lt;4.4.74-7.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192517" version="1" comment="kernel-source-rt is &lt;4.4.74-7.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192518" version="1" comment="kernel-syms-rt is &lt;4.4.74-7.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192519" version="1" comment="ocfs2-kmp-rt is &lt;4.4.74-7.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159531" version="1" comment="SUSE-Linux-Enterprise-RT-release is ==12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192520" version="1" comment="cluster-md-kmp-rt is &lt;4.4.88-18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192521" version="1" comment="cluster-network-kmp-rt is &lt;4.4.88-18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192522" version="1" comment="dlm-kmp-rt is &lt;4.4.88-18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192523" version="1" comment="gfs2-kmp-rt is &lt;4.4.88-18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192524" version="1" comment="kernel-devel-rt is &lt;4.4.88-18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192525" version="1" comment="kernel-rt is &lt;4.4.88-18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192526" version="1" comment="kernel-rt-base is &lt;4.4.88-18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192527" version="1" comment="kernel-rt-devel is &lt;4.4.88-18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192528" version="1" comment="kernel-rt_debug is &lt;4.4.88-18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192529" version="1" comment="kernel-rt_debug-devel is &lt;4.4.88-18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192530" version="1" comment="kernel-source-rt is &lt;4.4.88-18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192531" version="1" comment="kernel-syms-rt is &lt;4.4.88-18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192532" version="1" comment="ocfs2-kmp-rt is &lt;4.4.88-18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192533" version="1" comment="cluster-md-kmp-rt is &lt;4.4.95-21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192534" version="1" comment="cluster-network-kmp-rt is &lt;4.4.95-21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192535" version="1" comment="dlm-kmp-rt is &lt;4.4.95-21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192536" version="1" comment="gfs2-kmp-rt is &lt;4.4.95-21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192537" version="1" comment="kernel-devel-rt is &lt;4.4.95-21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192538" version="1" comment="kernel-rt is &lt;4.4.95-21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192539" version="1" comment="kernel-rt-base is &lt;4.4.95-21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192540" version="1" comment="kernel-rt-devel is &lt;4.4.95-21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192541" version="1" comment="kernel-rt_debug is &lt;4.4.95-21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192542" version="1" comment="kernel-rt_debug-devel is &lt;4.4.95-21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192543" version="1" comment="kernel-source-rt is &lt;4.4.95-21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192544" version="1" comment="kernel-syms-rt is &lt;4.4.95-21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192545" version="1" comment="ocfs2-kmp-rt is &lt;4.4.95-21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192546" version="1" comment="cluster-md-kmp-rt is &lt;4.4.104-24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192547" version="1" comment="cluster-network-kmp-rt is &lt;4.4.104-24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192548" version="1" comment="dlm-kmp-rt is &lt;4.4.104-24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192549" version="1" comment="gfs2-kmp-rt is &lt;4.4.104-24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192550" version="1" comment="kernel-devel-rt is &lt;4.4.104-24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192551" version="1" comment="kernel-rt is &lt;4.4.104-24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192552" version="1" comment="kernel-rt-base is &lt;4.4.104-24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192553" version="1" comment="kernel-rt-devel is &lt;4.4.104-24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192554" version="1" comment="kernel-rt_debug is &lt;4.4.104-24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192555" version="1" comment="kernel-rt_debug-devel is &lt;4.4.104-24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192556" version="1" comment="kernel-source-rt is &lt;4.4.104-24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192557" version="1" comment="kernel-syms-rt is &lt;4.4.104-24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192558" version="1" comment="ocfs2-kmp-rt is &lt;4.4.104-24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192559" version="1" comment="cluster-md-kmp-rt is &lt;4.4.114-27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192560" version="1" comment="cluster-network-kmp-rt is &lt;4.4.114-27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192561" version="1" comment="dlm-kmp-rt is &lt;4.4.114-27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192562" version="1" comment="gfs2-kmp-rt is &lt;4.4.114-27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192563" version="1" comment="kernel-devel-rt is &lt;4.4.114-27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192564" version="1" comment="kernel-rt is &lt;4.4.114-27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192565" version="1" comment="kernel-rt-base is &lt;4.4.114-27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192566" version="1" comment="kernel-rt-devel is &lt;4.4.114-27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192567" version="1" comment="kernel-rt_debug is &lt;4.4.114-27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192568" version="1" comment="kernel-rt_debug-devel is &lt;4.4.114-27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192569" version="1" comment="kernel-source-rt is &lt;4.4.114-27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192570" version="1" comment="kernel-syms-rt is &lt;4.4.114-27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192571" version="1" comment="ocfs2-kmp-rt is &lt;4.4.114-27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192572" version="1" comment="crash-kmp-rt is &lt;7.1.5_k4.4.21_6-15.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229495" version="1" comment="cluster-md-kmp-rt is &lt;4.4.138-3.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229496" version="1" comment="dlm-kmp-rt is &lt;4.4.138-3.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229497" version="1" comment="gfs2-kmp-rt is &lt;4.4.138-3.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229498" version="1" comment="kernel-devel-rt is &lt;4.4.138-3.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229499" version="1" comment="kernel-rt is &lt;4.4.138-3.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229500" version="1" comment="kernel-rt-base is &lt;4.4.138-3.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229501" version="1" comment="kernel-rt-devel is &lt;4.4.138-3.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229502" version="1" comment="kernel-rt_debug is &lt;4.4.138-3.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229503" version="1" comment="kernel-rt_debug-devel is &lt;4.4.138-3.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229504" version="1" comment="kernel-source-rt is &lt;4.4.138-3.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229505" version="1" comment="kernel-syms-rt is &lt;4.4.138-3.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229506" version="1" comment="ocfs2-kmp-rt is &lt;4.4.138-3.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174586" version="1" comment="SUSE-Linux-Enterprise-RT-release is ==12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231142" version="1" comment="cluster-md-kmp-rt is &lt;4.4.139-3.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231143" version="1" comment="dlm-kmp-rt is &lt;4.4.139-3.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231144" version="1" comment="gfs2-kmp-rt is &lt;4.4.139-3.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231145" version="1" comment="kernel-devel-rt is &lt;4.4.139-3.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231146" version="1" comment="kernel-rt is &lt;4.4.139-3.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231147" version="1" comment="kernel-rt-base is &lt;4.4.139-3.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231148" version="1" comment="kernel-rt-devel is &lt;4.4.139-3.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231149" version="1" comment="kernel-rt_debug is &lt;4.4.139-3.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231150" version="1" comment="kernel-rt_debug-devel is &lt;4.4.139-3.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231151" version="1" comment="kernel-source-rt is &lt;4.4.139-3.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231152" version="1" comment="kernel-syms-rt is &lt;4.4.139-3.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231153" version="1" comment="ocfs2-kmp-rt is &lt;4.4.139-3.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233879" version="1" comment="cluster-md-kmp-rt is &lt;4.4.147-3.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233880" version="1" comment="dlm-kmp-rt is &lt;4.4.147-3.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233881" version="1" comment="gfs2-kmp-rt is &lt;4.4.147-3.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233882" version="1" comment="kernel-devel-rt is &lt;4.4.147-3.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233883" version="1" comment="kernel-rt is &lt;4.4.147-3.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233884" version="1" comment="kernel-rt-base is &lt;4.4.147-3.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233885" version="1" comment="kernel-rt-devel is &lt;4.4.147-3.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233886" version="1" comment="kernel-rt_debug is &lt;4.4.147-3.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233887" version="1" comment="kernel-rt_debug-devel is &lt;4.4.147-3.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233888" version="1" comment="kernel-source-rt is &lt;4.4.147-3.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233889" version="1" comment="kernel-syms-rt is &lt;4.4.147-3.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233890" version="1" comment="ocfs2-kmp-rt is &lt;4.4.147-3.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235243" version="1" comment="cluster-md-kmp-rt is &lt;4.4.155-3.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235244" version="1" comment="dlm-kmp-rt is &lt;4.4.155-3.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235245" version="1" comment="gfs2-kmp-rt is &lt;4.4.155-3.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235246" version="1" comment="kernel-devel-rt is &lt;4.4.155-3.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235247" version="1" comment="kernel-rt is &lt;4.4.155-3.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235248" version="1" comment="kernel-rt-base is &lt;4.4.155-3.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235249" version="1" comment="kernel-rt-devel is &lt;4.4.155-3.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235250" version="1" comment="kernel-rt_debug is &lt;4.4.155-3.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235251" version="1" comment="kernel-rt_debug-devel is &lt;4.4.155-3.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235252" version="1" comment="kernel-source-rt is &lt;4.4.155-3.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235253" version="1" comment="kernel-syms-rt is &lt;4.4.155-3.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235254" version="1" comment="ocfs2-kmp-rt is &lt;4.4.155-3.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238632" version="1" comment="cluster-md-kmp-rt is &lt;4.4.162-3.26" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238633" version="1" comment="dlm-kmp-rt is &lt;4.4.162-3.26" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238634" version="1" comment="gfs2-kmp-rt is &lt;4.4.162-3.26" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238635" version="1" comment="kernel-devel-rt is &lt;4.4.162-3.26" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238636" version="1" comment="kernel-rt is &lt;4.4.162-3.26" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238637" version="1" comment="kernel-rt-base is &lt;4.4.162-3.26" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238638" version="1" comment="kernel-rt-devel is &lt;4.4.162-3.26" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238639" version="1" comment="kernel-rt_debug is &lt;4.4.162-3.26" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238640" version="1" comment="kernel-rt_debug-devel is &lt;4.4.162-3.26" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238641" version="1" comment="kernel-source-rt is &lt;4.4.162-3.26" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238642" version="1" comment="kernel-syms-rt is &lt;4.4.162-3.26" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238643" version="1" comment="ocfs2-kmp-rt is &lt;4.4.162-3.26" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239271" version="1" comment="cluster-md-kmp-rt is &lt;4.4.162-3.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239272" version="1" comment="dlm-kmp-rt is &lt;4.4.162-3.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239273" version="1" comment="gfs2-kmp-rt is &lt;4.4.162-3.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239274" version="1" comment="kernel-devel-rt is &lt;4.4.162-3.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239275" version="1" comment="kernel-rt is &lt;4.4.162-3.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239276" version="1" comment="kernel-rt-base is &lt;4.4.162-3.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239277" version="1" comment="kernel-rt-devel is &lt;4.4.162-3.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239278" version="1" comment="kernel-rt_debug is &lt;4.4.162-3.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239279" version="1" comment="kernel-rt_debug-devel is &lt;4.4.162-3.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239280" version="1" comment="kernel-source-rt is &lt;4.4.162-3.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239281" version="1" comment="kernel-syms-rt is &lt;4.4.162-3.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239282" version="1" comment="ocfs2-kmp-rt is &lt;4.4.162-3.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192573" version="1" comment="cluster-md-kmp-rt is &lt;4.4.120-3.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192574" version="1" comment="dlm-kmp-rt is &lt;4.4.120-3.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192575" version="1" comment="gfs2-kmp-rt is &lt;4.4.120-3.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192576" version="1" comment="kernel-devel-rt is &lt;4.4.120-3.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192577" version="1" comment="kernel-rt is &lt;4.4.120-3.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192578" version="1" comment="kernel-rt-base is &lt;4.4.120-3.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192579" version="1" comment="kernel-rt-devel is &lt;4.4.120-3.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192580" version="1" comment="kernel-rt_debug is &lt;4.4.120-3.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192581" version="1" comment="kernel-rt_debug-devel is &lt;4.4.120-3.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192582" version="1" comment="kernel-source-rt is &lt;4.4.120-3.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192583" version="1" comment="kernel-syms-rt is &lt;4.4.120-3.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192584" version="1" comment="ocfs2-kmp-rt is &lt;4.4.120-3.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192585" version="1" comment="cluster-md-kmp-rt is &lt;4.4.128-3.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192586" version="1" comment="dlm-kmp-rt is &lt;4.4.128-3.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192587" version="1" comment="gfs2-kmp-rt is &lt;4.4.128-3.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192588" version="1" comment="kernel-devel-rt is &lt;4.4.128-3.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192589" version="1" comment="kernel-rt is &lt;4.4.128-3.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192590" version="1" comment="kernel-rt-base is &lt;4.4.128-3.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192591" version="1" comment="kernel-rt-devel is &lt;4.4.128-3.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192592" version="1" comment="kernel-rt_debug is &lt;4.4.128-3.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192593" version="1" comment="kernel-rt_debug-devel is &lt;4.4.128-3.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192594" version="1" comment="kernel-source-rt is &lt;4.4.128-3.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192595" version="1" comment="kernel-syms-rt is &lt;4.4.128-3.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192596" version="1" comment="ocfs2-kmp-rt is &lt;4.4.128-3.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244057" version="1" comment="cluster-md-kmp-rt is &lt;4.4.170-3.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244058" version="1" comment="dlm-kmp-rt is &lt;4.4.170-3.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244059" version="1" comment="gfs2-kmp-rt is &lt;4.4.170-3.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244060" version="1" comment="kernel-devel-rt is &lt;4.4.170-3.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244061" version="1" comment="kernel-rt is &lt;4.4.170-3.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244062" version="1" comment="kernel-rt-base is &lt;4.4.170-3.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244063" version="1" comment="kernel-rt-devel is &lt;4.4.170-3.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244064" version="1" comment="kernel-rt_debug is &lt;4.4.170-3.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244065" version="1" comment="kernel-rt_debug-devel is &lt;4.4.170-3.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244066" version="1" comment="kernel-source-rt is &lt;4.4.170-3.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244067" version="1" comment="kernel-syms-rt is &lt;4.4.170-3.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244068" version="1" comment="ocfs2-kmp-rt is &lt;4.4.170-3.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244905" version="1" comment="cluster-md-kmp-rt is &lt;4.4.172-3.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244906" version="1" comment="dlm-kmp-rt is &lt;4.4.172-3.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244907" version="1" comment="gfs2-kmp-rt is &lt;4.4.172-3.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244908" version="1" comment="kernel-devel-rt is &lt;4.4.172-3.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244909" version="1" comment="kernel-rt is &lt;4.4.172-3.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244910" version="1" comment="kernel-rt-base is &lt;4.4.172-3.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244911" version="1" comment="kernel-rt-devel is &lt;4.4.172-3.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244912" version="1" comment="kernel-rt_debug is &lt;4.4.172-3.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244913" version="1" comment="kernel-rt_debug-devel is &lt;4.4.172-3.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244914" version="1" comment="kernel-source-rt is &lt;4.4.172-3.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244915" version="1" comment="kernel-syms-rt is &lt;4.4.172-3.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244916" version="1" comment="ocfs2-kmp-rt is &lt;4.4.172-3.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265168" version="1" comment="cluster-md-kmp-rt is &lt;4.12.14-8.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265169" version="1" comment="dlm-kmp-rt is &lt;4.12.14-8.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265170" version="1" comment="gfs2-kmp-rt is &lt;4.12.14-8.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265171" version="1" comment="kernel-devel-rt is &lt;4.12.14-8.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265172" version="1" comment="kernel-rt is &lt;4.12.14-8.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265173" version="1" comment="kernel-rt-base is &lt;4.12.14-8.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265174" version="1" comment="kernel-rt-devel is &lt;4.12.14-8.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265175" version="1" comment="kernel-rt_debug is &lt;4.12.14-8.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265176" version="1" comment="kernel-rt_debug-devel is &lt;4.12.14-8.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265177" version="1" comment="kernel-source-rt is &lt;4.12.14-8.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265178" version="1" comment="kernel-syms-rt is &lt;4.12.14-8.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265179" version="1" comment="ocfs2-kmp-rt is &lt;4.12.14-8.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265180" version="1" comment="SUSE-Linux-Enterprise-RT-release is ==12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258800" version="1" comment="SLES_SAP-release is ==12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192597" version="1" comment="kgraft-patch-3_12_60-52_54-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192598" version="1" comment="kgraft-patch-3_12_60-52_54-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192599" version="1" comment="kgraft-patch-SLE12_Update_15 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192600" version="1" comment="kgraft-patch-3_12_60-52_49-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192601" version="1" comment="kgraft-patch-3_12_60-52_49-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192602" version="1" comment="kgraft-patch-SLE12_Update_14 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192603" version="1" comment="kgraft-patch-3_12_55-52_45-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192604" version="1" comment="kgraft-patch-3_12_55-52_45-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192605" version="1" comment="kgraft-patch-SLE12_Update_13 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192606" version="1" comment="kgraft-patch-3_12_55-52_42-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192607" version="1" comment="kgraft-patch-3_12_55-52_42-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192608" version="1" comment="kgraft-patch-SLE12_Update_12 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192609" version="1" comment="kgraft-patch-3_12_51-52_39-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192610" version="1" comment="kgraft-patch-3_12_51-52_39-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192611" version="1" comment="kgraft-patch-SLE12_Update_11 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192612" version="1" comment="kgraft-patch-3_12_51-52_31-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192613" version="1" comment="kgraft-patch-3_12_51-52_31-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192614" version="1" comment="kgraft-patch-SLE12_Update_9 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192615" version="1" comment="kgraft-patch-3_12_48-52_27-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192616" version="1" comment="kgraft-patch-3_12_48-52_27-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192617" version="1" comment="kgraft-patch-SLE12_Update_8 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192618" version="1" comment="kgraft-patch-3_12_44-52_18-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192619" version="1" comment="kgraft-patch-3_12_44-52_18-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192620" version="1" comment="kgraft-patch-SLE12_Update_7 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192621" version="1" comment="kgraft-patch-3_12_51-52_34-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192622" version="1" comment="kgraft-patch-3_12_51-52_34-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192623" version="1" comment="kgraft-patch-SLE12_Update_10 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192624" version="1" comment="libmysqlclient-devel is &lt;10.0.26-20.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192625" version="1" comment="libmysqlclient18 is &lt;10.0.26-20.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192626" version="1" comment="libmysqlclient18-32bit is &lt;10.0.26-20.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192627" version="1" comment="libmysqlclient_r18 is &lt;10.0.26-20.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192628" version="1" comment="libmysqld-devel is &lt;10.0.26-20.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192629" version="1" comment="libmysqld18 is &lt;10.0.26-20.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192630" version="1" comment="mariadb is &lt;10.0.26-20.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192631" version="1" comment="mariadb-client is &lt;10.0.26-20.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192632" version="1" comment="mariadb-errormessages is &lt;10.0.26-20.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192633" version="1" comment="mariadb-tools is &lt;10.0.26-20.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192634" version="1" comment="apache2 is &lt;2.4.10-14.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192635" version="1" comment="apache2-doc is &lt;2.4.10-14.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192636" version="1" comment="apache2-example-pages is &lt;2.4.10-14.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192637" version="1" comment="apache2-prefork is &lt;2.4.10-14.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192638" version="1" comment="apache2-utils is &lt;2.4.10-14.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192639" version="1" comment="apache2-worker is &lt;2.4.10-14.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192640" version="1" comment="openssh-fips is &lt;6.6p1-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192641" version="1" comment="libstorage is &lt;2.25.16.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192642" version="1" comment="libstorage-ruby is &lt;2.25.16.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192643" version="1" comment="libstorage5 is &lt;2.25.16.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192644" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-27.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192645" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-27.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192646" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-27.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192647" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-27.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192648" version="1" comment="openssl is &lt;1.0.1i-27.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192649" version="1" comment="openssl-doc is &lt;1.0.1i-27.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192650" version="1" comment="apache2-mod_nss is &lt;1.0.14-10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192651" version="1" comment="libmysqlclient-devel is &lt;10.0.27-20.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192652" version="1" comment="libmysqlclient18 is &lt;10.0.27-20.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192653" version="1" comment="libmysqlclient18-32bit is &lt;10.0.27-20.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192654" version="1" comment="libmysqlclient_r18 is &lt;10.0.27-20.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192655" version="1" comment="libmysqld-devel is &lt;10.0.27-20.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192656" version="1" comment="libmysqld18 is &lt;10.0.27-20.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192657" version="1" comment="mariadb is &lt;10.0.27-20.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192658" version="1" comment="mariadb-client is &lt;10.0.27-20.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192659" version="1" comment="mariadb-errormessages is &lt;10.0.27-20.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192660" version="1" comment="mariadb-tools is &lt;10.0.27-20.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192661" version="1" comment="bind is &lt;9.9.9P1-28.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192662" version="1" comment="bind-chrootenv is &lt;9.9.9P1-28.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192663" version="1" comment="bind-doc is &lt;9.9.9P1-28.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192664" version="1" comment="bind-libs is &lt;9.9.9P1-28.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192665" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-28.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192666" version="1" comment="bind-utils is &lt;9.9.9P1-28.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192667" version="1" comment="postgresql93 is &lt;9.3.14-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192668" version="1" comment="postgresql93-contrib is &lt;9.3.14-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192669" version="1" comment="postgresql93-docs is &lt;9.3.14-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192670" version="1" comment="postgresql93-server is &lt;9.3.14-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192671" version="1" comment="libgudev-1_0-0 is &lt;210-70.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192672" version="1" comment="libgudev-1_0-0-32bit is &lt;210-70.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192673" version="1" comment="libudev1 is &lt;210-70.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192674" version="1" comment="libudev1-32bit is &lt;210-70.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192675" version="1" comment="systemd is &lt;210-70.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192676" version="1" comment="systemd-32bit is &lt;210-70.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192677" version="1" comment="systemd-bash-completion is &lt;210-70.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192678" version="1" comment="systemd-sysvinit is &lt;210-70.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192679" version="1" comment="udev is &lt;210-70.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192680" version="1" comment="xen is &lt;4.4.4_04-22.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192681" version="1" comment="xen-doc-html is &lt;4.4.4_04-22.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192682" version="1" comment="xen-kmp-default is &lt;4.4.4_04_k3.12.60_52.54-22.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192683" version="1" comment="xen-libs is &lt;4.4.4_04-22.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192684" version="1" comment="xen-libs-32bit is &lt;4.4.4_04-22.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192685" version="1" comment="xen-tools is &lt;4.4.4_04-22.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192686" version="1" comment="xen-tools-domU is &lt;4.4.4_04-22.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192687" version="1" comment="kernel-default is &lt;3.12.60-52.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192688" version="1" comment="kernel-default-base is &lt;3.12.60-52.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192689" version="1" comment="kernel-default-devel is &lt;3.12.60-52.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192690" version="1" comment="kernel-devel is &lt;3.12.60-52.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192691" version="1" comment="kernel-macros is &lt;3.12.60-52.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192692" version="1" comment="kernel-source is &lt;3.12.60-52.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192693" version="1" comment="kernel-syms is &lt;3.12.60-52.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192694" version="1" comment="kernel-xen is &lt;3.12.60-52.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192695" version="1" comment="kernel-xen-base is &lt;3.12.60-52.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192696" version="1" comment="kernel-xen-devel is &lt;3.12.60-52.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192697" version="1" comment="kgraft-patch-3_12_60-52_57-default is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192698" version="1" comment="kgraft-patch-3_12_60-52_57-xen is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192699" version="1" comment="kgraft-patch-SLE12_Update_16 is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192700" version="1" comment="kgraft-patch-3_12_51-52_39-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192701" version="1" comment="kgraft-patch-3_12_51-52_39-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192702" version="1" comment="kgraft-patch-SLE12_Update_11 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192703" version="1" comment="kgraft-patch-3_12_51-52_31-default is &lt;6-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192704" version="1" comment="kgraft-patch-3_12_51-52_31-xen is &lt;6-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192705" version="1" comment="kgraft-patch-SLE12_Update_9 is &lt;6-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192706" version="1" comment="kgraft-patch-3_12_51-52_34-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192707" version="1" comment="kgraft-patch-3_12_51-52_34-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192708" version="1" comment="kgraft-patch-SLE12_Update_10 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192709" version="1" comment="kgraft-patch-3_12_55-52_42-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192710" version="1" comment="kgraft-patch-3_12_55-52_42-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192711" version="1" comment="kgraft-patch-SLE12_Update_12 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192712" version="1" comment="kgraft-patch-3_12_60-52_49-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192713" version="1" comment="kgraft-patch-3_12_60-52_49-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192714" version="1" comment="kgraft-patch-SLE12_Update_14 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192715" version="1" comment="kgraft-patch-3_12_60-52_54-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192716" version="1" comment="kgraft-patch-3_12_60-52_54-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192717" version="1" comment="kgraft-patch-SLE12_Update_15 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192718" version="1" comment="kgraft-patch-3_12_55-52_45-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192719" version="1" comment="kgraft-patch-3_12_55-52_45-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192720" version="1" comment="kgraft-patch-SLE12_Update_13 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192721" version="1" comment="bind is &lt;9.9.9P1-28.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192722" version="1" comment="bind-chrootenv is &lt;9.9.9P1-28.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192723" version="1" comment="bind-doc is &lt;9.9.9P1-28.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192724" version="1" comment="bind-libs is &lt;9.9.9P1-28.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192725" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-28.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192726" version="1" comment="bind-utils is &lt;9.9.9P1-28.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192727" version="1" comment="qemu is &lt;2.0.2-48.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192728" version="1" comment="qemu-block-curl is &lt;2.0.2-48.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192729" version="1" comment="qemu-block-rbd is &lt;2.0.2-48.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192730" version="1" comment="qemu-guest-agent is &lt;2.0.2-48.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192731" version="1" comment="qemu-ipxe is &lt;1.0.0-48.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192732" version="1" comment="qemu-kvm is &lt;2.0.2-48.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192733" version="1" comment="qemu-lang is &lt;2.0.2-48.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192734" version="1" comment="qemu-seabios is &lt;1.7.4-48.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192735" version="1" comment="qemu-sgabios is &lt;8-48.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192736" version="1" comment="qemu-tools is &lt;2.0.2-48.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192737" version="1" comment="qemu-vgabios is &lt;1.7.4-48.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192738" version="1" comment="qemu-x86 is &lt;2.0.2-48.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192739" version="1" comment="libmysqlclient-devel is &lt;10.0.28-20.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192740" version="1" comment="libmysqlclient18 is &lt;10.0.28-20.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192741" version="1" comment="libmysqlclient18-32bit is &lt;10.0.28-20.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192742" version="1" comment="libmysqlclient_r18 is &lt;10.0.28-20.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192743" version="1" comment="libmysqld-devel is &lt;10.0.28-20.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192744" version="1" comment="libmysqld18 is &lt;10.0.28-20.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192745" version="1" comment="mariadb is &lt;10.0.28-20.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192746" version="1" comment="mariadb-client is &lt;10.0.28-20.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192747" version="1" comment="mariadb-errormessages is &lt;10.0.28-20.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192748" version="1" comment="mariadb-tools is &lt;10.0.28-20.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192749" version="1" comment="qemu is &lt;2.0.2-48.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192750" version="1" comment="qemu-block-curl is &lt;2.0.2-48.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192751" version="1" comment="qemu-block-rbd is &lt;2.0.2-48.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192752" version="1" comment="qemu-guest-agent is &lt;2.0.2-48.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192753" version="1" comment="qemu-ipxe is &lt;1.0.0-48.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192754" version="1" comment="qemu-kvm is &lt;2.0.2-48.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192755" version="1" comment="qemu-lang is &lt;2.0.2-48.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192756" version="1" comment="qemu-seabios is &lt;1.7.4-48.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192757" version="1" comment="qemu-sgabios is &lt;8-48.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192758" version="1" comment="qemu-tools is &lt;2.0.2-48.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192759" version="1" comment="qemu-vgabios is &lt;1.7.4-48.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192760" version="1" comment="qemu-x86 is &lt;2.0.2-48.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192761" version="1" comment="libfreebl3-hmac-32bit is &lt;3.21.3-50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192762" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.21.3-50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192763" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.60-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192764" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.60-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192765" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr3.60-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192766" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.60-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192767" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.60-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192768" version="1" comment="kernel-default is &lt;3.12.60-52.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192769" version="1" comment="kernel-default-base is &lt;3.12.60-52.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192770" version="1" comment="kernel-default-devel is &lt;3.12.60-52.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192771" version="1" comment="kernel-devel is &lt;3.12.60-52.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192772" version="1" comment="kernel-macros is &lt;3.12.60-52.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192773" version="1" comment="kernel-source is &lt;3.12.60-52.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192774" version="1" comment="kernel-syms is &lt;3.12.60-52.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192775" version="1" comment="kernel-xen is &lt;3.12.60-52.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192776" version="1" comment="kernel-xen-base is &lt;3.12.60-52.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192777" version="1" comment="kernel-xen-devel is &lt;3.12.60-52.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192778" version="1" comment="kgraft-patch-3_12_60-52_60-default is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192779" version="1" comment="kgraft-patch-3_12_60-52_60-xen is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192780" version="1" comment="kgraft-patch-SLE12_Update_17 is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192781" version="1" comment="kgraft-patch-3_12_51-52_31-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192782" version="1" comment="kgraft-patch-3_12_51-52_31-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192783" version="1" comment="kgraft-patch-SLE12_Update_9 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192784" version="1" comment="kgraft-patch-3_12_55-52_42-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192785" version="1" comment="kgraft-patch-3_12_55-52_42-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192786" version="1" comment="kgraft-patch-SLE12_Update_12 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192787" version="1" comment="kgraft-patch-3_12_60-52_49-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192788" version="1" comment="kgraft-patch-3_12_60-52_49-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192789" version="1" comment="kgraft-patch-SLE12_Update_14 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192790" version="1" comment="kgraft-patch-3_12_55-52_45-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192791" version="1" comment="kgraft-patch-3_12_55-52_45-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192792" version="1" comment="kgraft-patch-SLE12_Update_13 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192793" version="1" comment="kgraft-patch-3_12_51-52_39-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192794" version="1" comment="kgraft-patch-3_12_51-52_39-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192795" version="1" comment="kgraft-patch-SLE12_Update_11 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192796" version="1" comment="xen is &lt;4.4.4_05-22.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192797" version="1" comment="xen-doc-html is &lt;4.4.4_05-22.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192798" version="1" comment="xen-kmp-default is &lt;4.4.4_05_k3.12.60_52.57-22.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192799" version="1" comment="xen-libs is &lt;4.4.4_05-22.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192800" version="1" comment="xen-libs-32bit is &lt;4.4.4_05-22.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192801" version="1" comment="xen-tools is &lt;4.4.4_05-22.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192802" version="1" comment="xen-tools-domU is &lt;4.4.4_05-22.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192803" version="1" comment="ntp is &lt;4.2.8p9-46.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192804" version="1" comment="ntp-doc is &lt;4.2.8p9-46.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192805" version="1" comment="kgraft-patch-3_12_60-52_54-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192806" version="1" comment="kgraft-patch-3_12_60-52_54-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192807" version="1" comment="kgraft-patch-SLE12_Update_15 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192808" version="1" comment="kernel-default is &lt;3.12.60-52.63" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192809" version="1" comment="kernel-default-base is &lt;3.12.60-52.63" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192810" version="1" comment="kernel-default-devel is &lt;3.12.60-52.63" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192811" version="1" comment="kernel-devel is &lt;3.12.60-52.63" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192812" version="1" comment="kernel-macros is &lt;3.12.60-52.63" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192813" version="1" comment="kernel-source is &lt;3.12.60-52.63" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192814" version="1" comment="kernel-syms is &lt;3.12.60-52.63" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192815" version="1" comment="kernel-xen is &lt;3.12.60-52.63" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192816" version="1" comment="kernel-xen-base is &lt;3.12.60-52.63" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192817" version="1" comment="kernel-xen-devel is &lt;3.12.60-52.63" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192818" version="1" comment="kgraft-patch-3_12_60-52_63-default is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192819" version="1" comment="kgraft-patch-3_12_60-52_63-xen is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192820" version="1" comment="kgraft-patch-SLE12_Update_18 is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192821" version="1" comment="xen is &lt;4.4.4_05-22.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192822" version="1" comment="xen-doc-html is &lt;4.4.4_05-22.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192823" version="1" comment="xen-kmp-default is &lt;4.4.4_05_k3.12.60_52.63-22.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192824" version="1" comment="xen-libs is &lt;4.4.4_05-22.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192825" version="1" comment="xen-libs-32bit is &lt;4.4.4_05-22.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192826" version="1" comment="xen-tools is &lt;4.4.4_05-22.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192827" version="1" comment="xen-tools-domU is &lt;4.4.4_05-22.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192828" version="1" comment="kgraft-patch-3_12_60-52_57-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192829" version="1" comment="kgraft-patch-3_12_60-52_57-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192830" version="1" comment="kgraft-patch-SLE12_Update_16 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192831" version="1" comment="kgraft-patch-3_12_51-52_34-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192832" version="1" comment="kgraft-patch-3_12_51-52_34-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192833" version="1" comment="kgraft-patch-SLE12_Update_10 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192834" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-18.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192835" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-18.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192836" version="1" comment="libdcerpc0 is &lt;4.2.4-18.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192837" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-18.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192838" version="1" comment="libgensec0 is &lt;4.2.4-18.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192839" version="1" comment="libgensec0-32bit is &lt;4.2.4-18.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192840" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-18.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192841" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-18.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192842" version="1" comment="libndr-nbt0 is &lt;4.2.4-18.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192843" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-18.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192844" version="1" comment="libndr-standard0 is &lt;4.2.4-18.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192845" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-18.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192846" version="1" comment="libndr0 is &lt;4.2.4-18.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192847" version="1" comment="libndr0-32bit is &lt;4.2.4-18.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192848" version="1" comment="libnetapi0 is &lt;4.2.4-18.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192849" version="1" comment="libnetapi0-32bit is &lt;4.2.4-18.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192850" version="1" comment="libregistry0 is &lt;4.2.4-18.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192851" version="1" comment="libsamba-credentials0 is &lt;4.2.4-18.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192852" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-18.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192853" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-18.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192854" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-18.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192855" version="1" comment="libsamba-passdb0 is &lt;4.2.4-18.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192856" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-18.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192857" version="1" comment="libsamba-util0 is &lt;4.2.4-18.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192858" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-18.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192859" version="1" comment="libsamdb0 is &lt;4.2.4-18.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192860" version="1" comment="libsamdb0-32bit is &lt;4.2.4-18.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192861" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-18.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192862" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-18.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192863" version="1" comment="libsmbclient0 is &lt;4.2.4-18.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192864" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-18.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192865" version="1" comment="libsmbconf0 is &lt;4.2.4-18.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192866" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-18.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192867" version="1" comment="libsmbldap0 is &lt;4.2.4-18.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192868" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-18.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192869" version="1" comment="libtevent-util0 is &lt;4.2.4-18.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192870" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-18.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192871" version="1" comment="libwbclient0 is &lt;4.2.4-18.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192872" version="1" comment="libwbclient0-32bit is &lt;4.2.4-18.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192873" version="1" comment="samba-32bit is &lt;4.2.4-18.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192874" version="1" comment="samba-client is &lt;4.2.4-18.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192875" version="1" comment="samba-client-32bit is &lt;4.2.4-18.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192876" version="1" comment="samba-doc is &lt;4.2.4-18.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192877" version="1" comment="samba-libs is &lt;4.2.4-18.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192878" version="1" comment="samba-libs-32bit is &lt;4.2.4-18.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192879" version="1" comment="samba-winbind is &lt;4.2.4-18.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192880" version="1" comment="samba-winbind-32bit is &lt;4.2.4-18.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192881" version="1" comment="clamsap is &lt;0.98.9-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192882" version="1" comment="sudo is &lt;1.8.10p3-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192883" version="1" comment="tomcat is &lt;7.0.78-7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192884" version="1" comment="tomcat-admin-webapps is &lt;7.0.78-7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192885" version="1" comment="tomcat-docs-webapp is &lt;7.0.78-7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192886" version="1" comment="tomcat-el-2_2-api is &lt;7.0.78-7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192887" version="1" comment="tomcat-javadoc is &lt;7.0.78-7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192888" version="1" comment="tomcat-jsp-2_2-api is &lt;7.0.78-7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192889" version="1" comment="tomcat-lib is &lt;7.0.78-7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192890" version="1" comment="tomcat-servlet-3_0-api is &lt;7.0.78-7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192891" version="1" comment="tomcat-webapps is &lt;7.0.78-7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192892" version="1" comment="kernel-default is &lt;3.12.61-52.80" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192893" version="1" comment="kernel-default-base is &lt;3.12.61-52.80" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192894" version="1" comment="kernel-default-devel is &lt;3.12.61-52.80" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192895" version="1" comment="kernel-devel is &lt;3.12.61-52.80" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192896" version="1" comment="kernel-macros is &lt;3.12.61-52.80" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192897" version="1" comment="kernel-source is &lt;3.12.61-52.80" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192898" version="1" comment="kernel-syms is &lt;3.12.61-52.80" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192899" version="1" comment="kernel-xen is &lt;3.12.61-52.80" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192900" version="1" comment="kernel-xen-base is &lt;3.12.61-52.80" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192901" version="1" comment="kernel-xen-devel is &lt;3.12.61-52.80" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192902" version="1" comment="kgraft-patch-3_12_61-52_80-default is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192903" version="1" comment="kgraft-patch-3_12_61-52_80-xen is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192904" version="1" comment="kgraft-patch-SLE12_Update_23 is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192905" version="1" comment="bind is &lt;9.9.9P1-28.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192906" version="1" comment="bind-chrootenv is &lt;9.9.9P1-28.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192907" version="1" comment="bind-devel is &lt;9.9.9P1-28.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192908" version="1" comment="bind-doc is &lt;9.9.9P1-28.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192909" version="1" comment="bind-libs is &lt;9.9.9P1-28.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192910" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-28.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192911" version="1" comment="bind-utils is &lt;9.9.9P1-28.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192912" version="1" comment="sudo is &lt;1.8.10p3-2.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192913" version="1" comment="xen is &lt;4.4.4_21-22.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192914" version="1" comment="xen-doc-html is &lt;4.4.4_21-22.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192915" version="1" comment="xen-kmp-default is &lt;4.4.4_21_k3.12.61_52.77-22.42" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192916" version="1" comment="xen-libs is &lt;4.4.4_21-22.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192917" version="1" comment="xen-libs-32bit is &lt;4.4.4_21-22.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192918" version="1" comment="xen-tools is &lt;4.4.4_21-22.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192919" version="1" comment="xen-tools-domU is &lt;4.4.4_21-22.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192920" version="1" comment="libspice-server1 is &lt;0.12.4-8.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192921" version="1" comment="spice is &lt;0.12.4-8.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192922" version="1" comment="xorg-x11-server is &lt;7.6_1.15.2-30.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192923" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.15.2-30.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192924" version="1" comment="evince is &lt;3.10.3-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192925" version="1" comment="evince-lang is &lt;3.10.3-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192926" version="1" comment="libevdocument3-4 is &lt;3.10.3-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192927" version="1" comment="libevview3-3 is &lt;3.10.3-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192928" version="1" comment="kgraft-patch-3_12_60-52_57-default is &lt;7-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192929" version="1" comment="kgraft-patch-3_12_60-52_57-xen is &lt;7-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192930" version="1" comment="kgraft-patch-SLE12_Update_16 is &lt;7-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192931" version="1" comment="kgraft-patch-3_12_60-52_60-default is &lt;6-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192932" version="1" comment="kgraft-patch-3_12_60-52_60-xen is &lt;6-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192933" version="1" comment="kgraft-patch-SLE12_Update_17 is &lt;6-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192934" version="1" comment="kgraft-patch-3_12_61-52_77-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192935" version="1" comment="kgraft-patch-3_12_61-52_77-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192936" version="1" comment="kgraft-patch-SLE12_Update_22 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192937" version="1" comment="kgraft-patch-3_12_60-52_63-default is &lt;6-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192938" version="1" comment="kgraft-patch-3_12_60-52_63-xen is &lt;6-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192939" version="1" comment="kgraft-patch-SLE12_Update_18 is &lt;6-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192940" version="1" comment="kgraft-patch-3_12_61-52_66-default is &lt;5-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192941" version="1" comment="kgraft-patch-3_12_61-52_66-xen is &lt;5-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192942" version="1" comment="kgraft-patch-SLE12_Update_19 is &lt;5-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192943" version="1" comment="kgraft-patch-3_12_61-52_69-default is &lt;3-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192944" version="1" comment="kgraft-patch-3_12_61-52_69-xen is &lt;3-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192945" version="1" comment="kgraft-patch-SLE12_Update_20 is &lt;3-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192946" version="1" comment="kgraft-patch-3_12_61-52_72-default is &lt;2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192947" version="1" comment="kgraft-patch-3_12_61-52_72-xen is &lt;2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192948" version="1" comment="kgraft-patch-SLE12_Update_21 is &lt;2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192949" version="1" comment="libmysqlclient-devel is &lt;10.0.31-20.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192950" version="1" comment="libmysqlclient18 is &lt;10.0.31-20.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192951" version="1" comment="libmysqlclient18-32bit is &lt;10.0.31-20.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192952" version="1" comment="libmysqlclient_r18 is &lt;10.0.31-20.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192953" version="1" comment="libmysqld-devel is &lt;10.0.31-20.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192954" version="1" comment="libmysqld18 is &lt;10.0.31-20.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192955" version="1" comment="mariadb is &lt;10.0.31-20.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192956" version="1" comment="mariadb-client is &lt;10.0.31-20.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192957" version="1" comment="mariadb-errormessages is &lt;10.0.31-20.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192958" version="1" comment="mariadb-tools is &lt;10.0.31-20.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192959" version="1" comment="kgraft-patch-3_12_60-52_57-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192960" version="1" comment="kgraft-patch-3_12_60-52_57-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192961" version="1" comment="kgraft-patch-SLE12_Update_16 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192962" version="1" comment="kgraft-patch-3_12_60-52_54-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192963" version="1" comment="kgraft-patch-3_12_60-52_54-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192964" version="1" comment="kgraft-patch-SLE12_Update_15 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192965" version="1" comment="kernel-default is &lt;3.12.61-52.83" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192966" version="1" comment="kernel-default-base is &lt;3.12.61-52.83" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192967" version="1" comment="kernel-default-devel is &lt;3.12.61-52.83" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192968" version="1" comment="kernel-devel is &lt;3.12.61-52.83" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192969" version="1" comment="kernel-macros is &lt;3.12.61-52.83" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192970" version="1" comment="kernel-source is &lt;3.12.61-52.83" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192971" version="1" comment="kernel-syms is &lt;3.12.61-52.83" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192972" version="1" comment="kernel-xen is &lt;3.12.61-52.83" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192973" version="1" comment="kernel-xen-base is &lt;3.12.61-52.83" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192974" version="1" comment="kernel-xen-devel is &lt;3.12.61-52.83" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192975" version="1" comment="kgraft-patch-3_12_61-52_83-default is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192976" version="1" comment="kgraft-patch-3_12_61-52_83-xen is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192977" version="1" comment="kgraft-patch-SLE12_Update_24 is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192978" version="1" comment="kgraft-patch-3_12_60-52_49-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192979" version="1" comment="kgraft-patch-3_12_60-52_49-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192980" version="1" comment="kgraft-patch-SLE12_Update_14 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192981" version="1" comment="kgraft-patch-3_12_55-52_45-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192982" version="1" comment="kgraft-patch-3_12_55-52_45-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192983" version="1" comment="kgraft-patch-SLE12_Update_13 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192984" version="1" comment="kgraft-patch-3_12_60-52_60-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192985" version="1" comment="kgraft-patch-3_12_60-52_60-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192986" version="1" comment="kgraft-patch-SLE12_Update_17 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192987" version="1" comment="kgraft-patch-3_12_60-52_63-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192988" version="1" comment="kgraft-patch-3_12_60-52_63-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192989" version="1" comment="kgraft-patch-SLE12_Update_18 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192990" version="1" comment="kgraft-patch-3_12_61-52_66-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192991" version="1" comment="kgraft-patch-3_12_61-52_66-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192992" version="1" comment="kgraft-patch-SLE12_Update_19 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192993" version="1" comment="kgraft-patch-3_12_55-52_42-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192994" version="1" comment="kgraft-patch-3_12_55-52_42-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192995" version="1" comment="kgraft-patch-SLE12_Update_12 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192996" version="1" comment="kgraft-patch-3_12_61-52_80-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192997" version="1" comment="kgraft-patch-3_12_61-52_80-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192998" version="1" comment="kgraft-patch-SLE12_Update_23 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009192999" version="1" comment="kgraft-patch-3_12_61-52_77-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193000" version="1" comment="kgraft-patch-3_12_61-52_77-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193001" version="1" comment="kgraft-patch-SLE12_Update_22 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193002" version="1" comment="kgraft-patch-3_12_61-52_72-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193003" version="1" comment="kgraft-patch-3_12_61-52_72-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193004" version="1" comment="kgraft-patch-SLE12_Update_21 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193005" version="1" comment="kgraft-patch-3_12_61-52_69-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193006" version="1" comment="kgraft-patch-3_12_61-52_69-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193007" version="1" comment="kgraft-patch-SLE12_Update_20 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193008" version="1" comment="kgraft-patch-3_12_60-52_57-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193009" version="1" comment="kgraft-patch-3_12_60-52_57-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193010" version="1" comment="kgraft-patch-SLE12_Update_16 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193011" version="1" comment="kgraft-patch-3_12_51-52_34-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193012" version="1" comment="kgraft-patch-3_12_51-52_34-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193013" version="1" comment="kgraft-patch-SLE12_Update_10 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193014" version="1" comment="libsoup is &lt;2.44.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193015" version="1" comment="libsoup-2_4-1 is &lt;2.44.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193016" version="1" comment="libsoup-2_4-1-32bit is &lt;2.44.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193017" version="1" comment="libsoup-lang is &lt;2.44.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193018" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.44.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193019" version="1" comment="kernel-default is &lt;3.12.61-52.86" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193020" version="1" comment="kernel-default-base is &lt;3.12.61-52.86" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193021" version="1" comment="kernel-default-devel is &lt;3.12.61-52.86" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193022" version="1" comment="kernel-devel is &lt;3.12.61-52.86" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193023" version="1" comment="kernel-macros is &lt;3.12.61-52.86" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193024" version="1" comment="kernel-source is &lt;3.12.61-52.86" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193025" version="1" comment="kernel-syms is &lt;3.12.61-52.86" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193026" version="1" comment="kernel-xen is &lt;3.12.61-52.86" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193027" version="1" comment="kernel-xen-base is &lt;3.12.61-52.86" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193028" version="1" comment="kernel-xen-devel is &lt;3.12.61-52.86" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193029" version="1" comment="kgraft-patch-3_12_61-52_86-default is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193030" version="1" comment="kgraft-patch-3_12_61-52_86-xen is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193031" version="1" comment="kgraft-patch-SLE12_Update_25 is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193032" version="1" comment="postgresql93 is &lt;9.3.18-25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193033" version="1" comment="postgresql93-contrib is &lt;9.3.18-25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193034" version="1" comment="postgresql93-docs is &lt;9.3.18-25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193035" version="1" comment="postgresql93-server is &lt;9.3.18-25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193036" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.10-38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193037" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.10-38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193038" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.10-38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193039" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.10-38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193040" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.10-38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193041" version="1" comment="kgraft-patch-3_12_51-52_39-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193042" version="1" comment="kgraft-patch-3_12_51-52_39-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193043" version="1" comment="kgraft-patch-SLE12_Update_11 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193044" version="1" comment="kgraft-patch-3_12_60-52_60-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193045" version="1" comment="kgraft-patch-3_12_60-52_60-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193046" version="1" comment="kgraft-patch-SLE12_Update_17 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193047" version="1" comment="xen is &lt;4.4.4_22-22.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193048" version="1" comment="xen-doc-html is &lt;4.4.4_22-22.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193049" version="1" comment="xen-kmp-default is &lt;4.4.4_22_k3.12.61_52.89-22.51" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193050" version="1" comment="xen-libs is &lt;4.4.4_22-22.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193051" version="1" comment="xen-libs-32bit is &lt;4.4.4_22-22.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193052" version="1" comment="xen-tools is &lt;4.4.4_22-22.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193053" version="1" comment="xen-tools-domU is &lt;4.4.4_22-22.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193054" version="1" comment="kgraft-patch-3_12_60-52_63-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193055" version="1" comment="kgraft-patch-3_12_60-52_63-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193056" version="1" comment="kgraft-patch-SLE12_Update_18 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193057" version="1" comment="libmysqlclient-devel is &lt;10.0.32-20.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193058" version="1" comment="libmysqlclient18 is &lt;10.0.32-20.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193059" version="1" comment="libmysqlclient18-32bit is &lt;10.0.32-20.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193060" version="1" comment="libmysqlclient_r18 is &lt;10.0.32-20.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193061" version="1" comment="libmysqld-devel is &lt;10.0.32-20.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193062" version="1" comment="libmysqld18 is &lt;10.0.32-20.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193063" version="1" comment="mariadb is &lt;10.0.32-20.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193064" version="1" comment="mariadb-client is &lt;10.0.32-20.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193065" version="1" comment="mariadb-errormessages is &lt;10.0.32-20.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193066" version="1" comment="mariadb-tools is &lt;10.0.32-20.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193067" version="1" comment="libspice-server1 is &lt;0.12.4-8.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193068" version="1" comment="spice is &lt;0.12.4-8.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193069" version="1" comment="libmysqlclient-devel is &lt;10.0.29-20.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193070" version="1" comment="libmysqlclient18 is &lt;10.0.29-20.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193071" version="1" comment="libmysqlclient18-32bit is &lt;10.0.29-20.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193072" version="1" comment="libmysqlclient_r18 is &lt;10.0.29-20.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193073" version="1" comment="libmysqld-devel is &lt;10.0.29-20.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193074" version="1" comment="libmysqld18 is &lt;10.0.29-20.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193075" version="1" comment="mariadb is &lt;10.0.29-20.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193076" version="1" comment="mariadb-client is &lt;10.0.29-20.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193077" version="1" comment="mariadb-errormessages is &lt;10.0.29-20.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193078" version="1" comment="mariadb-tools is &lt;10.0.29-20.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193079" version="1" comment="kernel-default is &lt;3.12.61-52.66" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193080" version="1" comment="kernel-default-base is &lt;3.12.61-52.66" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193081" version="1" comment="kernel-default-devel is &lt;3.12.61-52.66" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193082" version="1" comment="kernel-devel is &lt;3.12.61-52.66" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193083" version="1" comment="kernel-macros is &lt;3.12.61-52.66" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193084" version="1" comment="kernel-source is &lt;3.12.61-52.66" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193085" version="1" comment="kernel-syms is &lt;3.12.61-52.66" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193086" version="1" comment="kernel-xen is &lt;3.12.61-52.66" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193087" version="1" comment="kernel-xen-base is &lt;3.12.61-52.66" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193088" version="1" comment="kernel-xen-devel is &lt;3.12.61-52.66" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193089" version="1" comment="kgraft-patch-3_12_61-52_66-default is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193090" version="1" comment="kgraft-patch-3_12_61-52_66-xen is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193091" version="1" comment="kgraft-patch-SLE12_Update_19 is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193092" version="1" comment="libblkid1 is &lt;2.25-24.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193093" version="1" comment="libblkid1-32bit is &lt;2.25-24.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193094" version="1" comment="libmount1 is &lt;2.25-24.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193095" version="1" comment="libmount1-32bit is &lt;2.25-24.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193096" version="1" comment="libsmartcols1 is &lt;2.25-24.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193097" version="1" comment="libuuid1 is &lt;2.25-24.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193098" version="1" comment="libuuid1-32bit is &lt;2.25-24.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193099" version="1" comment="python-libmount is &lt;2.25-24.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193100" version="1" comment="util-linux is &lt;2.25-24.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193101" version="1" comment="util-linux-lang is &lt;2.25-24.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193102" version="1" comment="util-linux-systemd is &lt;2.25-24.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193103" version="1" comment="uuidd is &lt;2.25-24.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193104" version="1" comment="xen is &lt;4.4.4_14-22.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193105" version="1" comment="xen-doc-html is &lt;4.4.4_14-22.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193106" version="1" comment="xen-kmp-default is &lt;4.4.4_14_k3.12.61_52.66-22.33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193107" version="1" comment="xen-libs is &lt;4.4.4_14-22.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193108" version="1" comment="xen-libs-32bit is &lt;4.4.4_14-22.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193109" version="1" comment="xen-tools is &lt;4.4.4_14-22.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193110" version="1" comment="xen-tools-domU is &lt;4.4.4_14-22.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193111" version="1" comment="bind is &lt;9.9.9P1-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193112" version="1" comment="bind-chrootenv is &lt;9.9.9P1-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193113" version="1" comment="bind-doc is &lt;9.9.9P1-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193114" version="1" comment="bind-libs is &lt;9.9.9P1-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193115" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193116" version="1" comment="bind-utils is &lt;9.9.9P1-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193117" version="1" comment="openssh-fips is &lt;6.6p1-54.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193118" version="1" comment="qemu is &lt;2.0.2-48.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193119" version="1" comment="qemu-block-curl is &lt;2.0.2-48.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193120" version="1" comment="qemu-block-rbd is &lt;2.0.2-48.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193121" version="1" comment="qemu-guest-agent is &lt;2.0.2-48.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193122" version="1" comment="qemu-ipxe is &lt;1.0.0-48.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193123" version="1" comment="qemu-kvm is &lt;2.0.2-48.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193124" version="1" comment="qemu-lang is &lt;2.0.2-48.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193125" version="1" comment="qemu-seabios is &lt;1.7.4-48.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193126" version="1" comment="qemu-sgabios is &lt;8-48.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193127" version="1" comment="qemu-tools is &lt;2.0.2-48.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193128" version="1" comment="qemu-vgabios is &lt;1.7.4-48.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193129" version="1" comment="qemu-x86 is &lt;2.0.2-48.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193130" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.1-34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193131" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.1-34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193132" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.1-34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193133" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.1-34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193134" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.1-34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193135" version="1" comment="lighttpd-mod_cml is &lt;1.4.35-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193136" version="1" comment="lighttpd-mod_magnet is &lt;1.4.35-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193137" version="1" comment="lighttpd-mod_mysql_vhost is &lt;1.4.35-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193138" version="1" comment="lighttpd-mod_rrdtool is &lt;1.4.35-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193139" version="1" comment="lighttpd-mod_trigger_b4_dl is &lt;1.4.35-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193140" version="1" comment="lighttpd-mod_webdav is &lt;1.4.35-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193141" version="1" comment="kgraft-patch-3_12_55-52_42-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193142" version="1" comment="kgraft-patch-3_12_55-52_42-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193143" version="1" comment="kgraft-patch-SLE12_Update_12 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193144" version="1" comment="kgraft-patch-3_12_55-52_45-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193145" version="1" comment="kgraft-patch-3_12_55-52_45-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193146" version="1" comment="kgraft-patch-SLE12_Update_13 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193147" version="1" comment="kgraft-patch-3_12_60-52_49-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193148" version="1" comment="kgraft-patch-3_12_60-52_49-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193149" version="1" comment="kgraft-patch-SLE12_Update_14 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193150" version="1" comment="kgraft-patch-3_12_60-52_54-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193151" version="1" comment="kgraft-patch-3_12_60-52_54-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193152" version="1" comment="kgraft-patch-SLE12_Update_15 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193153" version="1" comment="kgraft-patch-3_12_60-52_57-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193154" version="1" comment="kgraft-patch-3_12_60-52_57-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193155" version="1" comment="kgraft-patch-SLE12_Update_16 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193156" version="1" comment="kgraft-patch-3_12_60-52_60-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193157" version="1" comment="kgraft-patch-3_12_60-52_60-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193158" version="1" comment="kgraft-patch-SLE12_Update_17 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193159" version="1" comment="kgraft-patch-3_12_60-52_63-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193160" version="1" comment="kgraft-patch-3_12_60-52_63-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193161" version="1" comment="kgraft-patch-SLE12_Update_18 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193162" version="1" comment="kgraft-patch-3_12_61-52_66-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193163" version="1" comment="kgraft-patch-3_12_61-52_66-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193164" version="1" comment="kgraft-patch-SLE12_Update_19 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193165" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-18.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193166" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-18.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193167" version="1" comment="libdcerpc0 is &lt;4.2.4-18.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193168" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-18.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193169" version="1" comment="libgensec0 is &lt;4.2.4-18.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193170" version="1" comment="libgensec0-32bit is &lt;4.2.4-18.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193171" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-18.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193172" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-18.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193173" version="1" comment="libndr-nbt0 is &lt;4.2.4-18.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193174" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-18.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193175" version="1" comment="libndr-standard0 is &lt;4.2.4-18.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193176" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-18.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193177" version="1" comment="libndr0 is &lt;4.2.4-18.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193178" version="1" comment="libndr0-32bit is &lt;4.2.4-18.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193179" version="1" comment="libnetapi0 is &lt;4.2.4-18.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193180" version="1" comment="libnetapi0-32bit is &lt;4.2.4-18.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193181" version="1" comment="libregistry0 is &lt;4.2.4-18.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193182" version="1" comment="libsamba-credentials0 is &lt;4.2.4-18.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193183" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-18.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193184" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-18.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193185" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-18.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193186" version="1" comment="libsamba-passdb0 is &lt;4.2.4-18.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193187" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-18.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193188" version="1" comment="libsamba-util0 is &lt;4.2.4-18.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193189" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-18.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193190" version="1" comment="libsamdb0 is &lt;4.2.4-18.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193191" version="1" comment="libsamdb0-32bit is &lt;4.2.4-18.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193192" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-18.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193193" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-18.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193194" version="1" comment="libsmbclient0 is &lt;4.2.4-18.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193195" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-18.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193196" version="1" comment="libsmbconf0 is &lt;4.2.4-18.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193197" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-18.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193198" version="1" comment="libsmbldap0 is &lt;4.2.4-18.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193199" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-18.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193200" version="1" comment="libtevent-util0 is &lt;4.2.4-18.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193201" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-18.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193202" version="1" comment="libwbclient0 is &lt;4.2.4-18.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193203" version="1" comment="libwbclient0-32bit is &lt;4.2.4-18.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193204" version="1" comment="samba-32bit is &lt;4.2.4-18.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193205" version="1" comment="samba-client is &lt;4.2.4-18.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193206" version="1" comment="samba-client-32bit is &lt;4.2.4-18.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193207" version="1" comment="samba-doc is &lt;4.2.4-18.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193208" version="1" comment="samba-libs is &lt;4.2.4-18.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193209" version="1" comment="samba-libs-32bit is &lt;4.2.4-18.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193210" version="1" comment="samba-winbind is &lt;4.2.4-18.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193211" version="1" comment="samba-winbind-32bit is &lt;4.2.4-18.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193212" version="1" comment="kernel-default is &lt;3.12.61-52.69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193213" version="1" comment="kernel-default-base is &lt;3.12.61-52.69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193214" version="1" comment="kernel-default-devel is &lt;3.12.61-52.69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193215" version="1" comment="kernel-devel is &lt;3.12.61-52.69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193216" version="1" comment="kernel-macros is &lt;3.12.61-52.69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193217" version="1" comment="kernel-source is &lt;3.12.61-52.69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193218" version="1" comment="kernel-syms is &lt;3.12.61-52.69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193219" version="1" comment="kernel-xen is &lt;3.12.61-52.69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193220" version="1" comment="kernel-xen-base is &lt;3.12.61-52.69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193221" version="1" comment="kernel-xen-devel is &lt;3.12.61-52.69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193222" version="1" comment="kgraft-patch-3_12_61-52_69-default is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193223" version="1" comment="kgraft-patch-3_12_61-52_69-xen is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193224" version="1" comment="kgraft-patch-SLE12_Update_20 is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193225" version="1" comment="kgraft-patch-3_12_61-52_66-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193226" version="1" comment="kgraft-patch-3_12_61-52_66-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193227" version="1" comment="kgraft-patch-SLE12_Update_19 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193228" version="1" comment="kgraft-patch-3_12_60-52_63-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193229" version="1" comment="kgraft-patch-3_12_60-52_63-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193230" version="1" comment="kgraft-patch-SLE12_Update_18 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193231" version="1" comment="kgraft-patch-3_12_60-52_60-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193232" version="1" comment="kgraft-patch-3_12_60-52_60-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193233" version="1" comment="kgraft-patch-SLE12_Update_17 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193234" version="1" comment="kgraft-patch-3_12_60-52_57-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193235" version="1" comment="kgraft-patch-3_12_60-52_57-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193236" version="1" comment="kgraft-patch-SLE12_Update_16 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193237" version="1" comment="kgraft-patch-3_12_60-52_54-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193238" version="1" comment="kgraft-patch-3_12_60-52_54-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193239" version="1" comment="kgraft-patch-SLE12_Update_15 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193240" version="1" comment="kgraft-patch-3_12_60-52_49-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193241" version="1" comment="kgraft-patch-3_12_60-52_49-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193242" version="1" comment="kgraft-patch-SLE12_Update_14 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193243" version="1" comment="kgraft-patch-3_12_55-52_45-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193244" version="1" comment="kgraft-patch-3_12_55-52_45-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193245" version="1" comment="kgraft-patch-SLE12_Update_13 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193246" version="1" comment="bind is &lt;9.9.9P1-28.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193247" version="1" comment="bind-chrootenv is &lt;9.9.9P1-28.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193248" version="1" comment="bind-doc is &lt;9.9.9P1-28.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193249" version="1" comment="bind-libs is &lt;9.9.9P1-28.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193250" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-28.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193251" version="1" comment="bind-utils is &lt;9.9.9P1-28.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193252" version="1" comment="bind is &lt;9.9.9P1-28.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193253" version="1" comment="bind-chrootenv is &lt;9.9.9P1-28.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193254" version="1" comment="bind-devel is &lt;9.9.9P1-28.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193255" version="1" comment="bind-doc is &lt;9.9.9P1-28.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193256" version="1" comment="bind-libs is &lt;9.9.9P1-28.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193257" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-28.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193258" version="1" comment="bind-utils is &lt;9.9.9P1-28.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193259" version="1" comment="ntp is &lt;4.2.8p10-46.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193260" version="1" comment="ntp-doc is &lt;4.2.8p10-46.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193261" version="1" comment="xen is &lt;4.4.4_16-22.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193262" version="1" comment="xen-doc-html is &lt;4.4.4_16-22.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193263" version="1" comment="xen-kmp-default is &lt;4.4.4_16_k3.12.61_52.69-22.36" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193264" version="1" comment="xen-libs is &lt;4.4.4_16-22.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193265" version="1" comment="xen-libs-32bit is &lt;4.4.4_16-22.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193266" version="1" comment="xen-tools is &lt;4.4.4_16-22.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193267" version="1" comment="xen-tools-domU is &lt;4.4.4_16-22.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193268" version="1" comment="xen is &lt;4.4.4_18-22.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193269" version="1" comment="xen-doc-html is &lt;4.4.4_18-22.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193270" version="1" comment="xen-kmp-default is &lt;4.4.4_18_k3.12.61_52.69-22.39" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193271" version="1" comment="xen-libs is &lt;4.4.4_18-22.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193272" version="1" comment="xen-libs-32bit is &lt;4.4.4_18-22.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193273" version="1" comment="xen-tools is &lt;4.4.4_18-22.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193274" version="1" comment="xen-tools-domU is &lt;4.4.4_18-22.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193275" version="1" comment="MozillaFirefox-devel is &lt;45.9.0esr-105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193276" version="1" comment="kernel-default is &lt;3.12.61-52.72" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193277" version="1" comment="kernel-default-base is &lt;3.12.61-52.72" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193278" version="1" comment="kernel-default-devel is &lt;3.12.61-52.72" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193279" version="1" comment="kernel-devel is &lt;3.12.61-52.72" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193280" version="1" comment="kernel-macros is &lt;3.12.61-52.72" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193281" version="1" comment="kernel-source is &lt;3.12.61-52.72" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193282" version="1" comment="kernel-syms is &lt;3.12.61-52.72" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193283" version="1" comment="kernel-xen is &lt;3.12.61-52.72" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193284" version="1" comment="kernel-xen-base is &lt;3.12.61-52.72" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193285" version="1" comment="kernel-xen-devel is &lt;3.12.61-52.72" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193286" version="1" comment="kgraft-patch-3_12_61-52_72-default is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193287" version="1" comment="kgraft-patch-3_12_61-52_72-xen is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193288" version="1" comment="kgraft-patch-SLE12_Update_21 is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193289" version="1" comment="kgraft-patch-3_12_61-52_69-default is &lt;2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193290" version="1" comment="kgraft-patch-3_12_61-52_69-xen is &lt;2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193291" version="1" comment="kgraft-patch-SLE12_Update_20 is &lt;2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193292" version="1" comment="kgraft-patch-3_12_61-52_66-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193293" version="1" comment="kgraft-patch-3_12_61-52_66-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193294" version="1" comment="kgraft-patch-SLE12_Update_19 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193295" version="1" comment="kgraft-patch-3_12_60-52_63-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193296" version="1" comment="kgraft-patch-3_12_60-52_63-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193297" version="1" comment="kgraft-patch-SLE12_Update_18 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193298" version="1" comment="kgraft-patch-3_12_60-52_60-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193299" version="1" comment="kgraft-patch-3_12_60-52_60-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193300" version="1" comment="kgraft-patch-SLE12_Update_17 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193301" version="1" comment="kgraft-patch-3_12_60-52_57-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193302" version="1" comment="kgraft-patch-3_12_60-52_57-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193303" version="1" comment="kgraft-patch-SLE12_Update_16 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193304" version="1" comment="kgraft-patch-3_12_60-52_54-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193305" version="1" comment="kgraft-patch-3_12_60-52_54-xen is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193306" version="1" comment="kgraft-patch-SLE12_Update_15 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193307" version="1" comment="kgraft-patch-3_12_60-52_49-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193308" version="1" comment="kgraft-patch-3_12_60-52_49-xen is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193309" version="1" comment="kgraft-patch-SLE12_Update_14 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193310" version="1" comment="kgraft-patch-3_12_55-52_45-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193311" version="1" comment="kgraft-patch-3_12_55-52_45-xen is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193312" version="1" comment="kgraft-patch-SLE12_Update_13 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193313" version="1" comment="libmysqlclient-devel is &lt;10.0.30-20.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193314" version="1" comment="libmysqlclient18 is &lt;10.0.30-20.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193315" version="1" comment="libmysqlclient18-32bit is &lt;10.0.30-20.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193316" version="1" comment="libmysqlclient_r18 is &lt;10.0.30-20.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193317" version="1" comment="libmysqld-devel is &lt;10.0.30-20.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193318" version="1" comment="libmysqld18 is &lt;10.0.30-20.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193319" version="1" comment="mariadb is &lt;10.0.30-20.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193320" version="1" comment="mariadb-client is &lt;10.0.30-20.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193321" version="1" comment="mariadb-errormessages is &lt;10.0.30-20.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193322" version="1" comment="mariadb-tools is &lt;10.0.30-20.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193323" version="1" comment="ctdb is &lt;4.2.4-18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193324" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193325" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193326" version="1" comment="libdcerpc0 is &lt;4.2.4-18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193327" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193328" version="1" comment="libgensec0 is &lt;4.2.4-18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193329" version="1" comment="libgensec0-32bit is &lt;4.2.4-18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193330" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193331" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193332" version="1" comment="libndr-nbt0 is &lt;4.2.4-18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193333" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193334" version="1" comment="libndr-standard0 is &lt;4.2.4-18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193335" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193336" version="1" comment="libndr0 is &lt;4.2.4-18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193337" version="1" comment="libndr0-32bit is &lt;4.2.4-18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193338" version="1" comment="libnetapi0 is &lt;4.2.4-18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193339" version="1" comment="libnetapi0-32bit is &lt;4.2.4-18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193340" version="1" comment="libregistry0 is &lt;4.2.4-18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193341" version="1" comment="libsamba-credentials0 is &lt;4.2.4-18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193342" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193343" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193344" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193345" version="1" comment="libsamba-passdb0 is &lt;4.2.4-18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193346" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193347" version="1" comment="libsamba-util0 is &lt;4.2.4-18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193348" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193349" version="1" comment="libsamdb0 is &lt;4.2.4-18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193350" version="1" comment="libsamdb0-32bit is &lt;4.2.4-18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193351" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193352" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193353" version="1" comment="libsmbclient0 is &lt;4.2.4-18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193354" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193355" version="1" comment="libsmbconf0 is &lt;4.2.4-18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193356" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193357" version="1" comment="libsmbldap0 is &lt;4.2.4-18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193358" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193359" version="1" comment="libtevent-util0 is &lt;4.2.4-18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193360" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193361" version="1" comment="libwbclient0 is &lt;4.2.4-18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193362" version="1" comment="libwbclient0-32bit is &lt;4.2.4-18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193363" version="1" comment="samba is &lt;4.2.4-18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193364" version="1" comment="samba-32bit is &lt;4.2.4-18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193365" version="1" comment="samba-client is &lt;4.2.4-18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193366" version="1" comment="samba-client-32bit is &lt;4.2.4-18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193367" version="1" comment="samba-doc is &lt;4.2.4-18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193368" version="1" comment="samba-libs is &lt;4.2.4-18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193369" version="1" comment="samba-libs-32bit is &lt;4.2.4-18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193370" version="1" comment="samba-winbind is &lt;4.2.4-18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193371" version="1" comment="samba-winbind-32bit is &lt;4.2.4-18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193372" version="1" comment="postgresql93 is &lt;9.3.17-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193373" version="1" comment="postgresql93-contrib is &lt;9.3.17-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193374" version="1" comment="postgresql93-docs is &lt;9.3.17-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193375" version="1" comment="postgresql93-server is &lt;9.3.17-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193376" version="1" comment="libxml2 is &lt;2.9.1-26.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193377" version="1" comment="libxml2-2 is &lt;2.9.1-26.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193378" version="1" comment="libxml2-2-32bit is &lt;2.9.1-26.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193379" version="1" comment="libxml2-doc is &lt;2.9.1-26.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193380" version="1" comment="libxml2-tools is &lt;2.9.1-26.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193381" version="1" comment="python-libxml2 is &lt;2.9.1-26.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193382" version="1" comment="glibc is &lt;2.19-22.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193383" version="1" comment="glibc-32bit is &lt;2.19-22.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193384" version="1" comment="glibc-devel is &lt;2.19-22.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193385" version="1" comment="glibc-devel-32bit is &lt;2.19-22.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193386" version="1" comment="glibc-html is &lt;2.19-22.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193387" version="1" comment="glibc-i18ndata is &lt;2.19-22.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193388" version="1" comment="glibc-info is &lt;2.19-22.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193389" version="1" comment="glibc-locale is &lt;2.19-22.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193390" version="1" comment="glibc-locale-32bit is &lt;2.19-22.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193391" version="1" comment="glibc-profile is &lt;2.19-22.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193392" version="1" comment="glibc-profile-32bit is &lt;2.19-22.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193393" version="1" comment="nscd is &lt;2.19-22.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193394" version="1" comment="kernel-default is &lt;3.12.61-52.77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193395" version="1" comment="kernel-default-base is &lt;3.12.61-52.77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193396" version="1" comment="kernel-default-devel is &lt;3.12.61-52.77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193397" version="1" comment="kernel-devel is &lt;3.12.61-52.77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193398" version="1" comment="kernel-macros is &lt;3.12.61-52.77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193399" version="1" comment="kernel-source is &lt;3.12.61-52.77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193400" version="1" comment="kernel-syms is &lt;3.12.61-52.77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193401" version="1" comment="kernel-xen is &lt;3.12.61-52.77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193402" version="1" comment="kernel-xen-base is &lt;3.12.61-52.77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193403" version="1" comment="kernel-xen-devel is &lt;3.12.61-52.77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193404" version="1" comment="kgraft-patch-3_12_61-52_77-default is &lt;1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193405" version="1" comment="kgraft-patch-3_12_61-52_77-xen is &lt;1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193406" version="1" comment="kgraft-patch-SLE12_Update_22 is &lt;1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247548" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.24.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247549" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.24.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247550" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.24.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247551" version="1" comment="openldap2-client is &lt;2.4.41-18.24.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258801" version="1" comment="SLES_SAP-release is ==12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193407" version="1" comment="kernel-default is &lt;3.12.74-60.64.48" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193408" version="1" comment="kernel-default-base is &lt;3.12.74-60.64.48" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193409" version="1" comment="kernel-default-devel is &lt;3.12.74-60.64.48" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193410" version="1" comment="kernel-devel is &lt;3.12.74-60.64.48" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193411" version="1" comment="kernel-macros is &lt;3.12.74-60.64.48" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193412" version="1" comment="kernel-source is &lt;3.12.74-60.64.48" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193413" version="1" comment="kernel-syms is &lt;3.12.74-60.64.48" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193414" version="1" comment="kernel-xen is &lt;3.12.74-60.64.48" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193415" version="1" comment="kernel-xen-base is &lt;3.12.74-60.64.48" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193416" version="1" comment="kernel-xen-devel is &lt;3.12.74-60.64.48" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193417" version="1" comment="kgraft-patch-3_12_74-60_64_48-default is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193418" version="1" comment="kgraft-patch-3_12_74-60_64_48-xen is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193419" version="1" comment="kgraft-patch-SLE12-SP1_Update_17 is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193420" version="1" comment="xen is &lt;4.5.5_12-22.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193421" version="1" comment="xen-doc-html is &lt;4.5.5_12-22.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193422" version="1" comment="xen-kmp-default is &lt;4.5.5_12_k3.12.74_60.64.45-22.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193423" version="1" comment="xen-libs is &lt;4.5.5_12-22.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193424" version="1" comment="xen-libs-32bit is &lt;4.5.5_12-22.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193425" version="1" comment="xen-tools is &lt;4.5.5_12-22.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193426" version="1" comment="xen-tools-domU is &lt;4.5.5_12-22.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193427" version="1" comment="libspice-server1 is &lt;0.12.5-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193428" version="1" comment="spice is &lt;0.12.5-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193429" version="1" comment="xorg-x11-server is &lt;7.6_1.15.2-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193430" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.15.2-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193431" version="1" comment="kgraft-patch-3_12_74-60_64_45-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193432" version="1" comment="kgraft-patch-3_12_74-60_64_45-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193433" version="1" comment="kgraft-patch-SLE12-SP1_Update_16 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193434" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &lt;9-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193435" version="1" comment="kgraft-patch-3_12_62-60_64_8-xen is &lt;9-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193436" version="1" comment="kgraft-patch-SLE12-SP1_Update_8 is &lt;9-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193437" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &lt;8-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193438" version="1" comment="kgraft-patch-3_12_67-60_64_18-xen is &lt;8-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193439" version="1" comment="kgraft-patch-SLE12-SP1_Update_9 is &lt;8-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193440" version="1" comment="kgraft-patch-3_12_69-60_64_29-default is &lt;5-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193441" version="1" comment="kgraft-patch-3_12_69-60_64_29-xen is &lt;5-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193442" version="1" comment="kgraft-patch-SLE12-SP1_Update_12 is &lt;5-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193443" version="1" comment="kgraft-patch-3_12_69-60_64_32-default is &lt;4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193444" version="1" comment="kgraft-patch-3_12_69-60_64_32-xen is &lt;4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193445" version="1" comment="kgraft-patch-SLE12-SP1_Update_13 is &lt;4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193446" version="1" comment="kgraft-patch-3_12_74-60_64_40-default is &lt;2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193447" version="1" comment="kgraft-patch-3_12_74-60_64_40-xen is &lt;2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193448" version="1" comment="kgraft-patch-SLE12-SP1_Update_15 is &lt;2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193449" version="1" comment="kgraft-patch-3_12_69-60_64_35-default is &lt;3-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193450" version="1" comment="kgraft-patch-3_12_69-60_64_35-xen is &lt;3-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193451" version="1" comment="kgraft-patch-SLE12-SP1_Update_14 is &lt;3-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193452" version="1" comment="kgraft-patch-3_12_67-60_64_24-default is &lt;6-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193453" version="1" comment="kgraft-patch-3_12_67-60_64_24-xen is &lt;6-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193454" version="1" comment="kgraft-patch-SLE12-SP1_Update_11 is &lt;6-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193455" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &lt;7-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193456" version="1" comment="kgraft-patch-3_12_67-60_64_21-xen is &lt;7-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193457" version="1" comment="kgraft-patch-SLE12-SP1_Update_10 is &lt;7-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193458" version="1" comment="libmysqlclient-devel is &lt;10.0.31-29.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193459" version="1" comment="libmysqld-devel is &lt;10.0.31-29.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193460" version="1" comment="libmysqld18 is &lt;10.0.31-29.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193461" version="1" comment="kernel-default is &lt;3.12.74-60.64.51" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193462" version="1" comment="kernel-default-base is &lt;3.12.74-60.64.51" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193463" version="1" comment="kernel-default-devel is &lt;3.12.74-60.64.51" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193464" version="1" comment="kernel-devel is &lt;3.12.74-60.64.51" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193465" version="1" comment="kernel-macros is &lt;3.12.74-60.64.51" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193466" version="1" comment="kernel-source is &lt;3.12.74-60.64.51" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193467" version="1" comment="kernel-syms is &lt;3.12.74-60.64.51" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193468" version="1" comment="kernel-xen is &lt;3.12.74-60.64.51" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193469" version="1" comment="kernel-xen-base is &lt;3.12.74-60.64.51" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193470" version="1" comment="kernel-xen-devel is &lt;3.12.74-60.64.51" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193471" version="1" comment="kgraft-patch-3_12_74-60_64_51-default is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193472" version="1" comment="kgraft-patch-3_12_74-60_64_51-xen is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193473" version="1" comment="kgraft-patch-SLE12-SP1_Update_18 is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193474" version="1" comment="kgraft-patch-3_12_69-60_64_29-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193475" version="1" comment="kgraft-patch-3_12_69-60_64_29-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193476" version="1" comment="kgraft-patch-SLE12-SP1_Update_12 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193477" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193478" version="1" comment="kgraft-patch-3_12_67-60_64_18-xen is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193479" version="1" comment="kgraft-patch-SLE12-SP1_Update_9 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193480" version="1" comment="kgraft-patch-3_12_62-60_62-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193481" version="1" comment="kgraft-patch-3_12_62-60_62-xen is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193482" version="1" comment="kgraft-patch-SLE12-SP1_Update_7 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193483" version="1" comment="kgraft-patch-3_12_67-60_64_24-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193484" version="1" comment="kgraft-patch-3_12_67-60_64_24-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193485" version="1" comment="kgraft-patch-SLE12-SP1_Update_11 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193486" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193487" version="1" comment="kgraft-patch-3_12_67-60_64_21-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193488" version="1" comment="kgraft-patch-SLE12-SP1_Update_10 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193489" version="1" comment="kgraft-patch-3_12_74-60_64_48-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193490" version="1" comment="kgraft-patch-3_12_74-60_64_48-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193491" version="1" comment="kgraft-patch-SLE12-SP1_Update_17 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193492" version="1" comment="kgraft-patch-3_12_74-60_64_40-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193493" version="1" comment="kgraft-patch-3_12_74-60_64_40-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193494" version="1" comment="kgraft-patch-SLE12-SP1_Update_15 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193495" version="1" comment="kgraft-patch-3_12_74-60_64_45-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193496" version="1" comment="kgraft-patch-3_12_74-60_64_45-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193497" version="1" comment="kgraft-patch-SLE12-SP1_Update_16 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193498" version="1" comment="kgraft-patch-3_12_69-60_64_32-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193499" version="1" comment="kgraft-patch-3_12_69-60_64_32-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193500" version="1" comment="kgraft-patch-SLE12-SP1_Update_13 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193501" version="1" comment="kgraft-patch-3_12_69-60_64_35-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193502" version="1" comment="kgraft-patch-3_12_69-60_64_35-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193503" version="1" comment="kgraft-patch-SLE12-SP1_Update_14 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193504" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193505" version="1" comment="kgraft-patch-3_12_62-60_64_8-xen is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193506" version="1" comment="kgraft-patch-SLE12-SP1_Update_8 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193507" version="1" comment="kernel-default is &lt;3.12.74-60.64.54" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193508" version="1" comment="kernel-default-base is &lt;3.12.74-60.64.54" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193509" version="1" comment="kernel-default-devel is &lt;3.12.74-60.64.54" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193510" version="1" comment="kernel-devel is &lt;3.12.74-60.64.54" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193511" version="1" comment="kernel-macros is &lt;3.12.74-60.64.54" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193512" version="1" comment="kernel-source is &lt;3.12.74-60.64.54" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193513" version="1" comment="kernel-syms is &lt;3.12.74-60.64.54" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193514" version="1" comment="kernel-xen is &lt;3.12.74-60.64.54" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193515" version="1" comment="kernel-xen-base is &lt;3.12.74-60.64.54" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193516" version="1" comment="kernel-xen-devel is &lt;3.12.74-60.64.54" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193517" version="1" comment="kgraft-patch-3_12_74-60_64_54-default is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193518" version="1" comment="kgraft-patch-3_12_74-60_64_54-xen is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193519" version="1" comment="kgraft-patch-SLE12-SP1_Update_19 is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193520" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr4.10-30.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193521" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr4.10-30.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193522" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr4.10-30.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193523" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr4.10-30.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193524" version="1" comment="xen is &lt;4.5.5_14-22.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193525" version="1" comment="xen-doc-html is &lt;4.5.5_14-22.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193526" version="1" comment="xen-kmp-default is &lt;4.5.5_14_k3.12.74_60.64.54-22.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193527" version="1" comment="xen-libs is &lt;4.5.5_14-22.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193528" version="1" comment="xen-libs-32bit is &lt;4.5.5_14-22.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193529" version="1" comment="xen-tools is &lt;4.5.5_14-22.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193530" version="1" comment="xen-tools-domU is &lt;4.5.5_14-22.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193531" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193532" version="1" comment="kgraft-patch-3_12_67-60_64_21-xen is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193533" version="1" comment="kgraft-patch-SLE12-SP1_Update_10 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193534" version="1" comment="kgraft-patch-3_12_67-60_64_24-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193535" version="1" comment="kgraft-patch-3_12_67-60_64_24-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193536" version="1" comment="kgraft-patch-SLE12-SP1_Update_11 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193537" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193538" version="1" comment="kgraft-patch-3_12_62-60_64_8-xen is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193539" version="1" comment="kgraft-patch-SLE12-SP1_Update_8 is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193540" version="1" comment="kgraft-patch-3_12_69-60_64_29-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193541" version="1" comment="kgraft-patch-3_12_69-60_64_29-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193542" version="1" comment="kgraft-patch-SLE12-SP1_Update_12 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193543" version="1" comment="kgraft-patch-3_12_69-60_64_32-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193544" version="1" comment="kgraft-patch-3_12_69-60_64_32-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193545" version="1" comment="kgraft-patch-SLE12-SP1_Update_13 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193546" version="1" comment="kgraft-patch-3_12_74-60_64_40-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193547" version="1" comment="kgraft-patch-3_12_74-60_64_40-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193548" version="1" comment="kgraft-patch-SLE12-SP1_Update_15 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193549" version="1" comment="kgraft-patch-3_12_74-60_64_45-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193550" version="1" comment="kgraft-patch-3_12_74-60_64_45-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193551" version="1" comment="kgraft-patch-SLE12-SP1_Update_16 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193552" version="1" comment="kgraft-patch-3_12_74-60_64_48-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193553" version="1" comment="kgraft-patch-3_12_74-60_64_48-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193554" version="1" comment="kgraft-patch-SLE12-SP1_Update_17 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193555" version="1" comment="apache2 is &lt;2.4.16-20.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193556" version="1" comment="apache2-doc is &lt;2.4.16-20.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193557" version="1" comment="apache2-example-pages is &lt;2.4.16-20.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193558" version="1" comment="apache2-prefork is &lt;2.4.16-20.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193559" version="1" comment="apache2-utils is &lt;2.4.16-20.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193560" version="1" comment="apache2-worker is &lt;2.4.16-20.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193561" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193562" version="1" comment="kgraft-patch-3_12_67-60_64_18-xen is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193563" version="1" comment="kgraft-patch-SLE12-SP1_Update_9 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193564" version="1" comment="kgraft-patch-3_12_69-60_64_35-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193565" version="1" comment="kgraft-patch-3_12_69-60_64_35-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193566" version="1" comment="kgraft-patch-SLE12-SP1_Update_14 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193567" version="1" comment="kgraft-patch-3_12_74-60_64_51-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193568" version="1" comment="kgraft-patch-3_12_74-60_64_51-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193569" version="1" comment="kgraft-patch-SLE12-SP1_Update_18 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193570" version="1" comment="kgraft-patch-3_12_74-60_64_54-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193571" version="1" comment="kgraft-patch-3_12_74-60_64_54-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193572" version="1" comment="kgraft-patch-SLE12-SP1_Update_19 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193573" version="1" comment="kgraft-patch-3_12_74-60_64_57-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193574" version="1" comment="kgraft-patch-3_12_74-60_64_57-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193575" version="1" comment="kgraft-patch-SLE12-SP1_Update_20 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193576" version="1" comment="kernel-default is &lt;3.12.74-60.64.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193577" version="1" comment="kernel-default-base is &lt;3.12.74-60.64.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193578" version="1" comment="kernel-default-devel is &lt;3.12.74-60.64.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193579" version="1" comment="kernel-devel is &lt;3.12.74-60.64.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193580" version="1" comment="kernel-macros is &lt;3.12.74-60.64.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193581" version="1" comment="kernel-source is &lt;3.12.74-60.64.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193582" version="1" comment="kernel-syms is &lt;3.12.74-60.64.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193583" version="1" comment="kernel-xen is &lt;3.12.74-60.64.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193584" version="1" comment="kernel-xen-base is &lt;3.12.74-60.64.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193585" version="1" comment="kernel-xen-devel is &lt;3.12.74-60.64.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193586" version="1" comment="kgraft-patch-3_12_74-60_64_60-default is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193587" version="1" comment="kgraft-patch-3_12_74-60_64_60-xen is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193588" version="1" comment="kgraft-patch-SLE12-SP1_Update_21 is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193589" version="1" comment="xen is &lt;4.5.5_16-22.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193590" version="1" comment="xen-doc-html is &lt;4.5.5_16-22.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193591" version="1" comment="xen-kmp-default is &lt;4.5.5_16_k3.12.74_60.64.57-22.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193592" version="1" comment="xen-libs is &lt;4.5.5_16-22.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193593" version="1" comment="xen-libs-32bit is &lt;4.5.5_16-22.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193594" version="1" comment="xen-tools is &lt;4.5.5_16-22.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193595" version="1" comment="xen-tools-domU is &lt;4.5.5_16-22.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193596" version="1" comment="gcc48-locale is &lt;4.8.5-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193597" version="1" comment="MozillaFirefox-devel is &lt;52.3.0esr-109.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193598" version="1" comment="MozillaFirefox-devel is &lt;52.4.0esr-109.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193599" version="1" comment="libfreebl3-hmac-32bit is &lt;3.29.5-58.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193600" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.29.5-58.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193601" version="1" comment="mozilla-nss-devel is &lt;3.29.5-58.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193602" version="1" comment="apache2 is &lt;2.4.16-20.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193603" version="1" comment="apache2-doc is &lt;2.4.16-20.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193604" version="1" comment="apache2-example-pages is &lt;2.4.16-20.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193605" version="1" comment="apache2-prefork is &lt;2.4.16-20.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193606" version="1" comment="apache2-utils is &lt;2.4.16-20.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193607" version="1" comment="apache2-worker is &lt;2.4.16-20.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193608" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193609" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193610" version="1" comment="libdcerpc0 is &lt;4.2.4-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193611" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193612" version="1" comment="libgensec0 is &lt;4.2.4-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193613" version="1" comment="libgensec0-32bit is &lt;4.2.4-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193614" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193615" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193616" version="1" comment="libndr-nbt0 is &lt;4.2.4-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193617" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193618" version="1" comment="libndr-standard0 is &lt;4.2.4-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193619" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193620" version="1" comment="libndr0 is &lt;4.2.4-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193621" version="1" comment="libndr0-32bit is &lt;4.2.4-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193622" version="1" comment="libnetapi0 is &lt;4.2.4-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193623" version="1" comment="libnetapi0-32bit is &lt;4.2.4-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193624" version="1" comment="libregistry0 is &lt;4.2.4-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193625" version="1" comment="libsamba-credentials0 is &lt;4.2.4-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193626" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193627" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193628" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193629" version="1" comment="libsamba-passdb0 is &lt;4.2.4-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193630" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193631" version="1" comment="libsamba-util0 is &lt;4.2.4-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193632" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193633" version="1" comment="libsamdb0 is &lt;4.2.4-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193634" version="1" comment="libsamdb0-32bit is &lt;4.2.4-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193635" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193636" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193637" version="1" comment="libsmbclient0 is &lt;4.2.4-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193638" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193639" version="1" comment="libsmbconf0 is &lt;4.2.4-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193640" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193641" version="1" comment="libsmbldap0 is &lt;4.2.4-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193642" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193643" version="1" comment="libtevent-util0 is &lt;4.2.4-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193644" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193645" version="1" comment="libwbclient0 is &lt;4.2.4-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193646" version="1" comment="libwbclient0-32bit is &lt;4.2.4-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193647" version="1" comment="samba is &lt;4.2.4-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193648" version="1" comment="samba-32bit is &lt;4.2.4-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193649" version="1" comment="samba-client is &lt;4.2.4-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193650" version="1" comment="samba-client-32bit is &lt;4.2.4-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193651" version="1" comment="samba-doc is &lt;4.2.4-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193652" version="1" comment="samba-libs is &lt;4.2.4-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193653" version="1" comment="samba-libs-32bit is &lt;4.2.4-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193654" version="1" comment="samba-winbind is &lt;4.2.4-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193655" version="1" comment="samba-winbind-32bit is &lt;4.2.4-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193656" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &lt;12-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193657" version="1" comment="kgraft-patch-3_12_62-60_64_8-xen is &lt;12-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193658" version="1" comment="kgraft-patch-SLE12-SP1_Update_8 is &lt;12-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193659" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &lt;10-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193660" version="1" comment="kgraft-patch-3_12_67-60_64_21-xen is &lt;10-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193661" version="1" comment="kgraft-patch-SLE12-SP1_Update_10 is &lt;10-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193662" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &lt;11-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193663" version="1" comment="kgraft-patch-3_12_67-60_64_18-xen is &lt;11-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193664" version="1" comment="kgraft-patch-SLE12-SP1_Update_9 is &lt;11-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193665" version="1" comment="kgraft-patch-3_12_69-60_64_29-default is &lt;8-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193666" version="1" comment="kgraft-patch-3_12_69-60_64_29-xen is &lt;8-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193667" version="1" comment="kgraft-patch-SLE12-SP1_Update_12 is &lt;8-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193668" version="1" comment="kgraft-patch-3_12_69-60_64_32-default is &lt;7-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193669" version="1" comment="kgraft-patch-3_12_69-60_64_32-xen is &lt;7-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193670" version="1" comment="kgraft-patch-SLE12-SP1_Update_13 is &lt;7-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193671" version="1" comment="kgraft-patch-3_12_67-60_64_24-default is &lt;9-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193672" version="1" comment="kgraft-patch-3_12_67-60_64_24-xen is &lt;9-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193673" version="1" comment="kgraft-patch-SLE12-SP1_Update_11 is &lt;9-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193674" version="1" comment="kgraft-patch-3_12_74-60_64_45-default is &lt;5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193675" version="1" comment="kgraft-patch-3_12_74-60_64_45-xen is &lt;5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193676" version="1" comment="kgraft-patch-SLE12-SP1_Update_16 is &lt;5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193677" version="1" comment="kgraft-patch-3_12_74-60_64_40-default is &lt;5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193678" version="1" comment="kgraft-patch-3_12_74-60_64_40-xen is &lt;5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193679" version="1" comment="kgraft-patch-SLE12-SP1_Update_15 is &lt;5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193680" version="1" comment="kgraft-patch-3_12_69-60_64_35-default is &lt;6-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193681" version="1" comment="kgraft-patch-3_12_69-60_64_35-xen is &lt;6-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193682" version="1" comment="kgraft-patch-SLE12-SP1_Update_14 is &lt;6-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193683" version="1" comment="kgraft-patch-3_12_74-60_64_60-default is &lt;2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193684" version="1" comment="kgraft-patch-3_12_74-60_64_60-xen is &lt;2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193685" version="1" comment="kgraft-patch-SLE12-SP1_Update_21 is &lt;2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193686" version="1" comment="kgraft-patch-3_12_74-60_64_51-default is &lt;3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193687" version="1" comment="kgraft-patch-3_12_74-60_64_51-xen is &lt;3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193688" version="1" comment="kgraft-patch-SLE12-SP1_Update_18 is &lt;3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193689" version="1" comment="kgraft-patch-3_12_74-60_64_57-default is &lt;3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193690" version="1" comment="kgraft-patch-3_12_74-60_64_57-xen is &lt;3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193691" version="1" comment="kgraft-patch-SLE12-SP1_Update_20 is &lt;3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193692" version="1" comment="kgraft-patch-3_12_74-60_64_48-default is &lt;4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193693" version="1" comment="kgraft-patch-3_12_74-60_64_48-xen is &lt;4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193694" version="1" comment="kgraft-patch-SLE12-SP1_Update_17 is &lt;4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193695" version="1" comment="kgraft-patch-3_12_74-60_64_54-default is &lt;3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193696" version="1" comment="kgraft-patch-3_12_74-60_64_54-xen is &lt;3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193697" version="1" comment="kgraft-patch-SLE12-SP1_Update_19 is &lt;3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193698" version="1" comment="xen is &lt;4.5.5_18-22.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193699" version="1" comment="xen-doc-html is &lt;4.5.5_18-22.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193700" version="1" comment="xen-kmp-default is &lt;4.5.5_18_k3.12.74_60.64.60-22.31" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193701" version="1" comment="xen-libs is &lt;4.5.5_18-22.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193702" version="1" comment="xen-libs-32bit is &lt;4.5.5_18-22.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193703" version="1" comment="xen-tools is &lt;4.5.5_18-22.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193704" version="1" comment="xen-tools-domU is &lt;4.5.5_18-22.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193705" version="1" comment="kernel-default is &lt;3.12.74-60.64.63" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193706" version="1" comment="kernel-default-base is &lt;3.12.74-60.64.63" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193707" version="1" comment="kernel-default-devel is &lt;3.12.74-60.64.63" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193708" version="1" comment="kernel-devel is &lt;3.12.74-60.64.63" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193709" version="1" comment="kernel-macros is &lt;3.12.74-60.64.63" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193710" version="1" comment="kernel-source is &lt;3.12.74-60.64.63" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193711" version="1" comment="kernel-syms is &lt;3.12.74-60.64.63" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193712" version="1" comment="kernel-xen is &lt;3.12.74-60.64.63" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193713" version="1" comment="kernel-xen-base is &lt;3.12.74-60.64.63" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193714" version="1" comment="kernel-xen-devel is &lt;3.12.74-60.64.63" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193715" version="1" comment="kgraft-patch-3_12_74-60_64_63-default is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193716" version="1" comment="kgraft-patch-3_12_74-60_64_63-xen is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193717" version="1" comment="kgraft-patch-SLE12-SP1_Update_22 is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193718" version="1" comment="qemu is &lt;2.3.1-33.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193719" version="1" comment="qemu-block-curl is &lt;2.3.1-33.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193720" version="1" comment="qemu-block-rbd is &lt;2.3.1-33.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193721" version="1" comment="qemu-guest-agent is &lt;2.3.1-33.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193722" version="1" comment="qemu-ipxe is &lt;1.0.0-33.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193723" version="1" comment="qemu-kvm is &lt;2.3.1-33.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193724" version="1" comment="qemu-lang is &lt;2.3.1-33.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193725" version="1" comment="qemu-ppc is &lt;2.3.1-33.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193726" version="1" comment="qemu-seabios is &lt;1.8.1-33.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193727" version="1" comment="qemu-sgabios is &lt;8-33.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193728" version="1" comment="qemu-tools is &lt;2.3.1-33.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193729" version="1" comment="qemu-vgabios is &lt;1.8.1-33.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193730" version="1" comment="qemu-x86 is &lt;2.3.1-33.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193731" version="1" comment="ctdb is &lt;4.2.4-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193732" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193733" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193734" version="1" comment="libdcerpc0 is &lt;4.2.4-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193735" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193736" version="1" comment="libgensec0 is &lt;4.2.4-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193737" version="1" comment="libgensec0-32bit is &lt;4.2.4-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193738" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193739" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193740" version="1" comment="libndr-nbt0 is &lt;4.2.4-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193741" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193742" version="1" comment="libndr-standard0 is &lt;4.2.4-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193743" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193744" version="1" comment="libndr0 is &lt;4.2.4-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193745" version="1" comment="libndr0-32bit is &lt;4.2.4-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193746" version="1" comment="libnetapi0 is &lt;4.2.4-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193747" version="1" comment="libnetapi0-32bit is &lt;4.2.4-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193748" version="1" comment="libregistry0 is &lt;4.2.4-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193749" version="1" comment="libsamba-credentials0 is &lt;4.2.4-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193750" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193751" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193752" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193753" version="1" comment="libsamba-passdb0 is &lt;4.2.4-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193754" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193755" version="1" comment="libsamba-util0 is &lt;4.2.4-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193756" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193757" version="1" comment="libsamdb0 is &lt;4.2.4-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193758" version="1" comment="libsamdb0-32bit is &lt;4.2.4-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193759" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193760" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193761" version="1" comment="libsmbclient0 is &lt;4.2.4-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193762" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193763" version="1" comment="libsmbconf0 is &lt;4.2.4-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193764" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193765" version="1" comment="libsmbldap0 is &lt;4.2.4-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193766" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193767" version="1" comment="libtevent-util0 is &lt;4.2.4-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193768" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193769" version="1" comment="libwbclient0 is &lt;4.2.4-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193770" version="1" comment="libwbclient0-32bit is &lt;4.2.4-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193771" version="1" comment="samba-32bit is &lt;4.2.4-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193772" version="1" comment="samba-client is &lt;4.2.4-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193773" version="1" comment="samba-client-32bit is &lt;4.2.4-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193774" version="1" comment="samba-doc is &lt;4.2.4-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193775" version="1" comment="samba-libs is &lt;4.2.4-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193776" version="1" comment="samba-libs-32bit is &lt;4.2.4-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193777" version="1" comment="samba-winbind is &lt;4.2.4-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193778" version="1" comment="samba-winbind-32bit is &lt;4.2.4-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193779" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-54.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193780" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-54.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193781" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-54.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193782" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-54.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193783" version="1" comment="openssl is &lt;1.0.1i-54.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193784" version="1" comment="openssl-doc is &lt;1.0.1i-54.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193785" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193786" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193787" version="1" comment="libdcerpc0 is &lt;4.2.4-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193788" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193789" version="1" comment="libgensec0 is &lt;4.2.4-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193790" version="1" comment="libgensec0-32bit is &lt;4.2.4-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193791" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193792" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193793" version="1" comment="libndr-nbt0 is &lt;4.2.4-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193794" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193795" version="1" comment="libndr-standard0 is &lt;4.2.4-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193796" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193797" version="1" comment="libndr0 is &lt;4.2.4-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193798" version="1" comment="libndr0-32bit is &lt;4.2.4-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193799" version="1" comment="libnetapi0 is &lt;4.2.4-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193800" version="1" comment="libnetapi0-32bit is &lt;4.2.4-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193801" version="1" comment="libregistry0 is &lt;4.2.4-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193802" version="1" comment="libsamba-credentials0 is &lt;4.2.4-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193803" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193804" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193805" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193806" version="1" comment="libsamba-passdb0 is &lt;4.2.4-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193807" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193808" version="1" comment="libsamba-util0 is &lt;4.2.4-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193809" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193810" version="1" comment="libsamdb0 is &lt;4.2.4-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193811" version="1" comment="libsamdb0-32bit is &lt;4.2.4-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193812" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193813" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193814" version="1" comment="libsmbclient0 is &lt;4.2.4-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193815" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193816" version="1" comment="libsmbconf0 is &lt;4.2.4-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193817" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193818" version="1" comment="libsmbldap0 is &lt;4.2.4-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193819" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193820" version="1" comment="libtevent-util0 is &lt;4.2.4-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193821" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193822" version="1" comment="libwbclient0 is &lt;4.2.4-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193823" version="1" comment="libwbclient0-32bit is &lt;4.2.4-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193824" version="1" comment="samba-32bit is &lt;4.2.4-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193825" version="1" comment="samba-client is &lt;4.2.4-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193826" version="1" comment="samba-client-32bit is &lt;4.2.4-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193827" version="1" comment="samba-doc is &lt;4.2.4-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193828" version="1" comment="samba-libs is &lt;4.2.4-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193829" version="1" comment="samba-libs-32bit is &lt;4.2.4-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193830" version="1" comment="samba-winbind is &lt;4.2.4-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193831" version="1" comment="samba-winbind-32bit is &lt;4.2.4-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193832" version="1" comment="kgraft-patch-3_12_69-60_64_35-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193833" version="1" comment="kgraft-patch-3_12_69-60_64_35-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193834" version="1" comment="kgraft-patch-SLE12-SP1_Update_14 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193835" version="1" comment="kgraft-patch-3_12_69-60_64_32-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193836" version="1" comment="kgraft-patch-3_12_69-60_64_32-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193837" version="1" comment="kgraft-patch-SLE12-SP1_Update_13 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193838" version="1" comment="kgraft-patch-3_12_69-60_64_29-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193839" version="1" comment="kgraft-patch-3_12_69-60_64_29-xen is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193840" version="1" comment="kgraft-patch-SLE12-SP1_Update_12 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193841" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193842" version="1" comment="kgraft-patch-3_12_67-60_64_21-xen is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193843" version="1" comment="kgraft-patch-SLE12-SP1_Update_10 is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193844" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &lt;12-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193845" version="1" comment="kgraft-patch-3_12_67-60_64_18-xen is &lt;12-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193846" version="1" comment="kgraft-patch-SLE12-SP1_Update_9 is &lt;12-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193847" version="1" comment="kgraft-patch-3_12_74-60_64_60-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193848" version="1" comment="kgraft-patch-3_12_74-60_64_60-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193849" version="1" comment="kgraft-patch-SLE12-SP1_Update_21 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193850" version="1" comment="kgraft-patch-3_12_74-60_64_57-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193851" version="1" comment="kgraft-patch-3_12_74-60_64_57-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193852" version="1" comment="kgraft-patch-SLE12-SP1_Update_20 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193853" version="1" comment="kgraft-patch-3_12_74-60_64_54-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193854" version="1" comment="kgraft-patch-3_12_74-60_64_54-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193855" version="1" comment="kgraft-patch-SLE12-SP1_Update_19 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193856" version="1" comment="kgraft-patch-3_12_74-60_64_51-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193857" version="1" comment="kgraft-patch-3_12_74-60_64_51-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193858" version="1" comment="kgraft-patch-SLE12-SP1_Update_18 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193859" version="1" comment="kgraft-patch-3_12_74-60_64_48-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193860" version="1" comment="kgraft-patch-3_12_74-60_64_48-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193861" version="1" comment="kgraft-patch-SLE12-SP1_Update_17 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193862" version="1" comment="kgraft-patch-3_12_74-60_64_45-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193863" version="1" comment="kgraft-patch-3_12_74-60_64_45-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193864" version="1" comment="kgraft-patch-SLE12-SP1_Update_16 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193865" version="1" comment="kgraft-patch-3_12_74-60_64_40-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193866" version="1" comment="kgraft-patch-3_12_74-60_64_40-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193867" version="1" comment="kgraft-patch-SLE12-SP1_Update_15 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193868" version="1" comment="kgraft-patch-3_12_67-60_64_24-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193869" version="1" comment="kgraft-patch-3_12_67-60_64_24-xen is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193870" version="1" comment="kgraft-patch-SLE12-SP1_Update_11 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193871" version="1" comment="kernel-default is &lt;3.12.74-60.64.66" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193872" version="1" comment="kernel-default-base is &lt;3.12.74-60.64.66" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193873" version="1" comment="kernel-default-devel is &lt;3.12.74-60.64.66" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193874" version="1" comment="kernel-devel is &lt;3.12.74-60.64.66" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193875" version="1" comment="kernel-macros is &lt;3.12.74-60.64.66" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193876" version="1" comment="kernel-source is &lt;3.12.74-60.64.66" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193877" version="1" comment="kernel-syms is &lt;3.12.74-60.64.66" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193878" version="1" comment="kernel-xen is &lt;3.12.74-60.64.66" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193879" version="1" comment="kernel-xen-base is &lt;3.12.74-60.64.66" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193880" version="1" comment="kernel-xen-devel is &lt;3.12.74-60.64.66" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193881" version="1" comment="kgraft-patch-3_12_74-60_64_66-default is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193882" version="1" comment="kgraft-patch-3_12_74-60_64_66-xen is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193883" version="1" comment="kgraft-patch-SLE12-SP1_Update_23 is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193884" version="1" comment="MozillaFirefox-devel is &lt;52.5.0esr-109.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193885" version="1" comment="xen is &lt;4.5.5_20-22.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193886" version="1" comment="xen-doc-html is &lt;4.5.5_20-22.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193887" version="1" comment="xen-kmp-default is &lt;4.5.5_20_k3.12.74_60.64.63-22.36" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193888" version="1" comment="xen-libs is &lt;4.5.5_20-22.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193889" version="1" comment="xen-libs-32bit is &lt;4.5.5_20-22.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193890" version="1" comment="xen-tools is &lt;4.5.5_20-22.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193891" version="1" comment="xen-tools-domU is &lt;4.5.5_20-22.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193892" version="1" comment="tomcat is &lt;8.0.43-10.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193893" version="1" comment="tomcat-admin-webapps is &lt;8.0.43-10.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193894" version="1" comment="tomcat-docs-webapp is &lt;8.0.43-10.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193895" version="1" comment="tomcat-el-3_0-api is &lt;8.0.43-10.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193896" version="1" comment="tomcat-javadoc is &lt;8.0.43-10.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193897" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.43-10.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193898" version="1" comment="tomcat-lib is &lt;8.0.43-10.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193899" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.43-10.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193900" version="1" comment="tomcat-webapps is &lt;8.0.43-10.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193901" version="1" comment="kgraft-patch-3_12_74-60_64_54-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193902" version="1" comment="kgraft-patch-3_12_74-60_64_54-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193903" version="1" comment="kgraft-patch-SLE12-SP1_Update_19 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193904" version="1" comment="kgraft-patch-3_12_74-60_64_51-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193905" version="1" comment="kgraft-patch-3_12_74-60_64_51-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193906" version="1" comment="kgraft-patch-SLE12-SP1_Update_18 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193907" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &lt;12-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193908" version="1" comment="kgraft-patch-3_12_67-60_64_21-xen is &lt;12-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193909" version="1" comment="kgraft-patch-SLE12-SP1_Update_10 is &lt;12-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193910" version="1" comment="kgraft-patch-3_12_69-60_64_29-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193911" version="1" comment="kgraft-patch-3_12_69-60_64_29-xen is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193912" version="1" comment="kgraft-patch-SLE12-SP1_Update_12 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193913" version="1" comment="kgraft-patch-3_12_74-60_64_60-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193914" version="1" comment="kgraft-patch-3_12_74-60_64_60-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193915" version="1" comment="kgraft-patch-SLE12-SP1_Update_21 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193916" version="1" comment="kgraft-patch-3_12_74-60_64_45-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193917" version="1" comment="kgraft-patch-3_12_74-60_64_45-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193918" version="1" comment="kgraft-patch-SLE12-SP1_Update_16 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193919" version="1" comment="kgraft-patch-3_12_74-60_64_57-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193920" version="1" comment="kgraft-patch-3_12_74-60_64_57-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193921" version="1" comment="kgraft-patch-SLE12-SP1_Update_20 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193922" version="1" comment="kgraft-patch-3_12_67-60_64_24-default is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193923" version="1" comment="kgraft-patch-3_12_67-60_64_24-xen is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193924" version="1" comment="kgraft-patch-SLE12-SP1_Update_11 is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193925" version="1" comment="kgraft-patch-3_12_69-60_64_35-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193926" version="1" comment="kgraft-patch-3_12_69-60_64_35-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193927" version="1" comment="kgraft-patch-SLE12-SP1_Update_14 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193928" version="1" comment="kgraft-patch-3_12_74-60_64_48-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193929" version="1" comment="kgraft-patch-3_12_74-60_64_48-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193930" version="1" comment="kgraft-patch-SLE12-SP1_Update_17 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193931" version="1" comment="kgraft-patch-3_12_74-60_64_63-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193932" version="1" comment="kgraft-patch-3_12_74-60_64_63-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193933" version="1" comment="kgraft-patch-SLE12-SP1_Update_22 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193934" version="1" comment="kgraft-patch-3_12_74-60_64_40-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193935" version="1" comment="kgraft-patch-3_12_74-60_64_40-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193936" version="1" comment="kgraft-patch-SLE12-SP1_Update_15 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193937" version="1" comment="kgraft-patch-3_12_69-60_64_32-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193938" version="1" comment="kgraft-patch-3_12_69-60_64_32-xen is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193939" version="1" comment="kgraft-patch-SLE12-SP1_Update_13 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193940" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.5-30.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193941" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr5.5-30.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193942" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.5-30.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193943" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr5.5-30.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193944" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.15-38.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193945" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.15-38.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193946" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.15-38.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193947" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.15-38.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193948" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.15-38.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193949" version="1" comment="glibc is &lt;2.19-40.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193950" version="1" comment="glibc-32bit is &lt;2.19-40.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193951" version="1" comment="glibc-devel is &lt;2.19-40.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193952" version="1" comment="glibc-devel-32bit is &lt;2.19-40.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193953" version="1" comment="glibc-html is &lt;2.19-40.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193954" version="1" comment="glibc-i18ndata is &lt;2.19-40.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193955" version="1" comment="glibc-info is &lt;2.19-40.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193956" version="1" comment="glibc-locale is &lt;2.19-40.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193957" version="1" comment="glibc-locale-32bit is &lt;2.19-40.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193958" version="1" comment="glibc-profile is &lt;2.19-40.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193959" version="1" comment="glibc-profile-32bit is &lt;2.19-40.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193960" version="1" comment="nscd is &lt;2.19-40.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193961" version="1" comment="kernel-default is &lt;3.12.74-60.64.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193962" version="1" comment="kernel-default-base is &lt;3.12.74-60.64.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193963" version="1" comment="kernel-default-devel is &lt;3.12.74-60.64.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193964" version="1" comment="kernel-devel is &lt;3.12.74-60.64.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193965" version="1" comment="kernel-macros is &lt;3.12.74-60.64.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193966" version="1" comment="kernel-source is &lt;3.12.74-60.64.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193967" version="1" comment="kernel-syms is &lt;3.12.74-60.64.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193968" version="1" comment="kernel-xen is &lt;3.12.74-60.64.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193969" version="1" comment="kernel-xen-base is &lt;3.12.74-60.64.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193970" version="1" comment="kernel-xen-devel is &lt;3.12.74-60.64.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193971" version="1" comment="kgraft-patch-3_12_74-60_64_45-default is &lt;1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193972" version="1" comment="kgraft-patch-3_12_74-60_64_45-xen is &lt;1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193973" version="1" comment="kgraft-patch-SLE12-SP1_Update_16 is &lt;1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193974" version="1" comment="kgraft-patch-3_12_74-60_64_85-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193975" version="1" comment="kgraft-patch-3_12_74-60_64_85-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193976" version="1" comment="kgraft-patch-SLE12-SP1_Update_26 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193977" version="1" comment="kgraft-patch-3_12_74-60_64_82-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193978" version="1" comment="kgraft-patch-3_12_74-60_64_82-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193979" version="1" comment="kgraft-patch-SLE12-SP1_Update_25 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193980" version="1" comment="kgraft-patch-3_12_74-60_64_69-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193981" version="1" comment="kgraft-patch-3_12_74-60_64_69-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193982" version="1" comment="kgraft-patch-SLE12-SP1_Update_24 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193983" version="1" comment="kgraft-patch-3_12_74-60_64_66-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193984" version="1" comment="kgraft-patch-3_12_74-60_64_66-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193985" version="1" comment="kgraft-patch-SLE12-SP1_Update_23 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193986" version="1" comment="kgraft-patch-3_12_74-60_64_63-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193987" version="1" comment="kgraft-patch-3_12_74-60_64_63-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193988" version="1" comment="kgraft-patch-SLE12-SP1_Update_22 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193989" version="1" comment="kgraft-patch-3_12_74-60_64_60-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193990" version="1" comment="kgraft-patch-3_12_74-60_64_60-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193991" version="1" comment="kgraft-patch-SLE12-SP1_Update_21 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193992" version="1" comment="kgraft-patch-3_12_74-60_64_57-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193993" version="1" comment="kgraft-patch-3_12_74-60_64_57-xen is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193994" version="1" comment="kgraft-patch-SLE12-SP1_Update_20 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193995" version="1" comment="kgraft-patch-3_12_74-60_64_45-default is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193996" version="1" comment="kgraft-patch-3_12_74-60_64_45-xen is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193997" version="1" comment="kgraft-patch-SLE12-SP1_Update_16 is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193998" version="1" comment="kgraft-patch-3_12_74-60_64_48-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009193999" version="1" comment="kgraft-patch-3_12_74-60_64_48-xen is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194000" version="1" comment="kgraft-patch-SLE12-SP1_Update_17 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194001" version="1" comment="kgraft-patch-3_12_74-60_64_40-default is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194002" version="1" comment="kgraft-patch-3_12_74-60_64_40-xen is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194003" version="1" comment="kgraft-patch-SLE12-SP1_Update_15 is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194004" version="1" comment="kgraft-patch-3_12_74-60_64_51-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194005" version="1" comment="kgraft-patch-3_12_74-60_64_51-xen is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194006" version="1" comment="kgraft-patch-SLE12-SP1_Update_18 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194007" version="1" comment="kgraft-patch-3_12_74-60_64_54-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194008" version="1" comment="kgraft-patch-3_12_74-60_64_54-xen is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194009" version="1" comment="kgraft-patch-SLE12-SP1_Update_19 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194010" version="1" comment="kgraft-patch-3_12_74-60_64_88-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194011" version="1" comment="kgraft-patch-3_12_74-60_64_88-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194012" version="1" comment="kgraft-patch-SLE12-SP1_Update_27 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194013" version="1" comment="kernel-firmware is &lt;20160516git-10.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194014" version="1" comment="ucode-amd is &lt;20160516git-10.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194015" version="1" comment="xen is &lt;4.5.5_24-22.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194016" version="1" comment="xen-doc-html is &lt;4.5.5_24-22.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194017" version="1" comment="xen-kmp-default is &lt;4.5.5_24_k3.12.74_60.64.93-22.49" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194018" version="1" comment="xen-libs is &lt;4.5.5_24-22.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194019" version="1" comment="xen-libs-32bit is &lt;4.5.5_24-22.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194020" version="1" comment="xen-tools is &lt;4.5.5_24-22.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194021" version="1" comment="xen-tools-domU is &lt;4.5.5_24-22.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229307" version="1" comment="kernel-default is &lt;3.12.74-60.64.96" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229308" version="1" comment="kernel-default-base is &lt;3.12.74-60.64.96" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229309" version="1" comment="kernel-default-devel is &lt;3.12.74-60.64.96" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229310" version="1" comment="kernel-devel is &lt;3.12.74-60.64.96" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229311" version="1" comment="kernel-macros is &lt;3.12.74-60.64.96" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229312" version="1" comment="kernel-source is &lt;3.12.74-60.64.96" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229313" version="1" comment="kernel-syms is &lt;3.12.74-60.64.96" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229314" version="1" comment="kernel-xen is &lt;3.12.74-60.64.96" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229315" version="1" comment="kernel-xen-base is &lt;3.12.74-60.64.96" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229316" version="1" comment="kernel-xen-devel is &lt;3.12.74-60.64.96" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229317" version="1" comment="kgraft-patch-3_12_74-60_64_96-default is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229318" version="1" comment="kgraft-patch-3_12_74-60_64_96-xen is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229319" version="1" comment="kgraft-patch-SLE12-SP1_Update_29 is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229320" version="1" comment="libmysqlclient-devel is &lt;10.0.35-29.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229321" version="1" comment="libmysqld-devel is &lt;10.0.35-29.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229322" version="1" comment="libmysqld18 is &lt;10.0.35-29.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230303" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-54.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230304" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-54.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230305" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-54.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230306" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-54.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230307" version="1" comment="openssl is &lt;1.0.1i-54.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230308" version="1" comment="openssl-doc is &lt;1.0.1i-54.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230369" version="1" comment="shadow is &lt;4.1.5.1-19.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230733" version="1" comment="xen is &lt;4.5.5_24-22.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230734" version="1" comment="xen-doc-html is &lt;4.5.5_24-22.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230735" version="1" comment="xen-kmp-default is &lt;4.5.5_24_k3.12.74_60.64.96-22.52" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230736" version="1" comment="xen-libs is &lt;4.5.5_24-22.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230737" version="1" comment="xen-libs-32bit is &lt;4.5.5_24-22.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230738" version="1" comment="xen-tools is &lt;4.5.5_24-22.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230739" version="1" comment="xen-tools-domU is &lt;4.5.5_24-22.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230815" version="1" comment="libvirt is &lt;1.2.18.4-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230816" version="1" comment="libvirt-client is &lt;1.2.18.4-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230817" version="1" comment="libvirt-daemon is &lt;1.2.18.4-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230818" version="1" comment="libvirt-daemon-config-network is &lt;1.2.18.4-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230819" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.2.18.4-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230820" version="1" comment="libvirt-daemon-driver-interface is &lt;1.2.18.4-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230821" version="1" comment="libvirt-daemon-driver-libxl is &lt;1.2.18.4-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230822" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.2.18.4-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230823" version="1" comment="libvirt-daemon-driver-network is &lt;1.2.18.4-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230824" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.2.18.4-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230825" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.2.18.4-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230826" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.2.18.4-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230827" version="1" comment="libvirt-daemon-driver-secret is &lt;1.2.18.4-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230828" version="1" comment="libvirt-daemon-driver-storage is &lt;1.2.18.4-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230829" version="1" comment="libvirt-daemon-lxc is &lt;1.2.18.4-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230830" version="1" comment="libvirt-daemon-qemu is &lt;1.2.18.4-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230831" version="1" comment="libvirt-daemon-xen is &lt;1.2.18.4-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230832" version="1" comment="libvirt-doc is &lt;1.2.18.4-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230833" version="1" comment="libvirt-lock-sanlock is &lt;1.2.18.4-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230834" version="1" comment="kgraft-patch-3_12_74-60_64_96-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230835" version="1" comment="kgraft-patch-3_12_74-60_64_96-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230836" version="1" comment="kgraft-patch-SLE12-SP1_Update_29 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230837" version="1" comment="kgraft-patch-3_12_74-60_64_93-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230838" version="1" comment="kgraft-patch-3_12_74-60_64_93-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230839" version="1" comment="kgraft-patch-SLE12-SP1_Update_28 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230840" version="1" comment="kgraft-patch-3_12_74-60_64_88-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230841" version="1" comment="kgraft-patch-3_12_74-60_64_88-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230842" version="1" comment="kgraft-patch-SLE12-SP1_Update_27 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230843" version="1" comment="kgraft-patch-3_12_74-60_64_85-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230844" version="1" comment="kgraft-patch-3_12_74-60_64_85-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230845" version="1" comment="kgraft-patch-SLE12-SP1_Update_26 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230846" version="1" comment="kgraft-patch-3_12_74-60_64_82-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230847" version="1" comment="kgraft-patch-3_12_74-60_64_82-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230848" version="1" comment="kgraft-patch-SLE12-SP1_Update_25 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230849" version="1" comment="kgraft-patch-3_12_74-60_64_69-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230850" version="1" comment="kgraft-patch-3_12_74-60_64_69-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230851" version="1" comment="kgraft-patch-SLE12-SP1_Update_24 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230852" version="1" comment="kgraft-patch-3_12_74-60_64_66-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230853" version="1" comment="kgraft-patch-3_12_74-60_64_66-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230854" version="1" comment="kgraft-patch-SLE12-SP1_Update_23 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230855" version="1" comment="kgraft-patch-3_12_74-60_64_63-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230856" version="1" comment="kgraft-patch-3_12_74-60_64_63-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230857" version="1" comment="kgraft-patch-SLE12-SP1_Update_22 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230858" version="1" comment="kgraft-patch-3_12_74-60_64_60-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230859" version="1" comment="kgraft-patch-3_12_74-60_64_60-xen is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230860" version="1" comment="kgraft-patch-SLE12-SP1_Update_21 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230861" version="1" comment="kgraft-patch-3_12_74-60_64_57-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230862" version="1" comment="kgraft-patch-3_12_74-60_64_57-xen is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230863" version="1" comment="kgraft-patch-SLE12-SP1_Update_20 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230864" version="1" comment="kgraft-patch-3_12_74-60_64_51-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230865" version="1" comment="kgraft-patch-3_12_74-60_64_51-xen is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230866" version="1" comment="kgraft-patch-SLE12-SP1_Update_18 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230867" version="1" comment="kgraft-patch-3_12_74-60_64_54-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230868" version="1" comment="kgraft-patch-3_12_74-60_64_54-xen is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230869" version="1" comment="kgraft-patch-SLE12-SP1_Update_19 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231255" version="1" comment="glibc is &lt;2.19-40.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231256" version="1" comment="glibc-32bit is &lt;2.19-40.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231257" version="1" comment="glibc-devel is &lt;2.19-40.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231258" version="1" comment="glibc-devel-32bit is &lt;2.19-40.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231259" version="1" comment="glibc-html is &lt;2.19-40.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231260" version="1" comment="glibc-i18ndata is &lt;2.19-40.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231261" version="1" comment="glibc-info is &lt;2.19-40.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231262" version="1" comment="glibc-locale is &lt;2.19-40.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231263" version="1" comment="glibc-locale-32bit is &lt;2.19-40.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231264" version="1" comment="glibc-profile is &lt;2.19-40.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231265" version="1" comment="glibc-profile-32bit is &lt;2.19-40.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231266" version="1" comment="nscd is &lt;2.19-40.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232337" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232338" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232339" version="1" comment="libdcerpc0 is &lt;4.2.4-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232340" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232341" version="1" comment="libgensec0 is &lt;4.2.4-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232342" version="1" comment="libgensec0-32bit is &lt;4.2.4-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232343" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232344" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232345" version="1" comment="libndr-nbt0 is &lt;4.2.4-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232346" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232347" version="1" comment="libndr-standard0 is &lt;4.2.4-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232348" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232349" version="1" comment="libndr0 is &lt;4.2.4-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232350" version="1" comment="libndr0-32bit is &lt;4.2.4-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232351" version="1" comment="libnetapi0 is &lt;4.2.4-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232352" version="1" comment="libnetapi0-32bit is &lt;4.2.4-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232353" version="1" comment="libregistry0 is &lt;4.2.4-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232354" version="1" comment="libsamba-credentials0 is &lt;4.2.4-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232355" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232356" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232357" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232358" version="1" comment="libsamba-passdb0 is &lt;4.2.4-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232359" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232360" version="1" comment="libsamba-util0 is &lt;4.2.4-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232361" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232362" version="1" comment="libsamdb0 is &lt;4.2.4-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232363" version="1" comment="libsamdb0-32bit is &lt;4.2.4-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232364" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232365" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232366" version="1" comment="libsmbclient0 is &lt;4.2.4-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232367" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232368" version="1" comment="libsmbconf0 is &lt;4.2.4-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232369" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232370" version="1" comment="libsmbldap0 is &lt;4.2.4-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232371" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232372" version="1" comment="libtevent-util0 is &lt;4.2.4-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232373" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232374" version="1" comment="libwbclient0 is &lt;4.2.4-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232375" version="1" comment="libwbclient0-32bit is &lt;4.2.4-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232376" version="1" comment="samba-32bit is &lt;4.2.4-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232377" version="1" comment="samba-client is &lt;4.2.4-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232378" version="1" comment="samba-client-32bit is &lt;4.2.4-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232379" version="1" comment="samba-doc is &lt;4.2.4-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232380" version="1" comment="samba-libs is &lt;4.2.4-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232381" version="1" comment="samba-libs-32bit is &lt;4.2.4-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232382" version="1" comment="samba-winbind is &lt;4.2.4-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232383" version="1" comment="samba-winbind-32bit is &lt;4.2.4-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232471" version="1" comment="kgraft-patch-3_12_74-60_64_96-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232472" version="1" comment="kgraft-patch-3_12_74-60_64_96-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232473" version="1" comment="kgraft-patch-SLE12-SP1_Update_29 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232474" version="1" comment="kgraft-patch-3_12_74-60_64_93-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232475" version="1" comment="kgraft-patch-3_12_74-60_64_93-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232476" version="1" comment="kgraft-patch-SLE12-SP1_Update_28 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232477" version="1" comment="kgraft-patch-3_12_74-60_64_88-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232478" version="1" comment="kgraft-patch-3_12_74-60_64_88-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232479" version="1" comment="kgraft-patch-SLE12-SP1_Update_27 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232480" version="1" comment="kgraft-patch-3_12_74-60_64_85-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232481" version="1" comment="kgraft-patch-3_12_74-60_64_85-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232482" version="1" comment="kgraft-patch-SLE12-SP1_Update_26 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232483" version="1" comment="kgraft-patch-3_12_74-60_64_82-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232484" version="1" comment="kgraft-patch-3_12_74-60_64_82-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232485" version="1" comment="kgraft-patch-SLE12-SP1_Update_25 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232486" version="1" comment="kgraft-patch-3_12_74-60_64_69-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232487" version="1" comment="kgraft-patch-3_12_74-60_64_69-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232488" version="1" comment="kgraft-patch-SLE12-SP1_Update_24 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232489" version="1" comment="kgraft-patch-3_12_74-60_64_66-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232490" version="1" comment="kgraft-patch-3_12_74-60_64_66-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232491" version="1" comment="kgraft-patch-SLE12-SP1_Update_23 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232492" version="1" comment="kgraft-patch-3_12_74-60_64_63-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232493" version="1" comment="kgraft-patch-3_12_74-60_64_63-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232494" version="1" comment="kgraft-patch-SLE12-SP1_Update_22 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232495" version="1" comment="kgraft-patch-3_12_74-60_64_60-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232496" version="1" comment="kgraft-patch-3_12_74-60_64_60-xen is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232497" version="1" comment="kgraft-patch-SLE12-SP1_Update_21 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232498" version="1" comment="kgraft-patch-3_12_74-60_64_57-default is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232499" version="1" comment="kgraft-patch-3_12_74-60_64_57-xen is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232500" version="1" comment="kgraft-patch-SLE12-SP1_Update_20 is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232501" version="1" comment="kernel-default is &lt;3.12.74-60.64.99" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232502" version="1" comment="kernel-default-base is &lt;3.12.74-60.64.99" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232503" version="1" comment="kernel-default-devel is &lt;3.12.74-60.64.99" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232504" version="1" comment="kernel-devel is &lt;3.12.74-60.64.99" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232505" version="1" comment="kernel-macros is &lt;3.12.74-60.64.99" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232506" version="1" comment="kernel-source is &lt;3.12.74-60.64.99" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232507" version="1" comment="kernel-syms is &lt;3.12.74-60.64.99" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232508" version="1" comment="kernel-xen is &lt;3.12.74-60.64.99" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232509" version="1" comment="kernel-xen-base is &lt;3.12.74-60.64.99" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232510" version="1" comment="kernel-xen-devel is &lt;3.12.74-60.64.99" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232511" version="1" comment="kgraft-patch-3_12_74-60_64_99-default is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232512" version="1" comment="kgraft-patch-3_12_74-60_64_99-xen is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232513" version="1" comment="kgraft-patch-SLE12-SP1_Update_30 is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232514" version="1" comment="lttng-modules is &lt;2.7.0-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232515" version="1" comment="lttng-modules-kmp-default is &lt;2.7.0_k3.12.74_60.64.99-4.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194022" version="1" comment="kgraft-patch-3_12_74-60_64_45-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194023" version="1" comment="kgraft-patch-3_12_74-60_64_45-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194024" version="1" comment="kgraft-patch-SLE12-SP1_Update_16 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194025" version="1" comment="kgraft-patch-3_12_74-60_64_40-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194026" version="1" comment="kgraft-patch-3_12_74-60_64_40-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194027" version="1" comment="kgraft-patch-SLE12-SP1_Update_15 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194028" version="1" comment="kgraft-patch-3_12_74-60_64_54-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194029" version="1" comment="kgraft-patch-3_12_74-60_64_54-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194030" version="1" comment="kgraft-patch-SLE12-SP1_Update_19 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194031" version="1" comment="kgraft-patch-3_12_74-60_64_48-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194032" version="1" comment="kgraft-patch-3_12_74-60_64_48-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194033" version="1" comment="kgraft-patch-SLE12-SP1_Update_17 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233218" version="1" comment="xen is &lt;4.5.5_26-22.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233219" version="1" comment="xen-doc-html is &lt;4.5.5_26-22.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233220" version="1" comment="xen-kmp-default is &lt;4.5.5_26_k3.12.74_60.64.99-22.55" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233221" version="1" comment="xen-libs is &lt;4.5.5_26-22.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233222" version="1" comment="xen-libs-32bit is &lt;4.5.5_26-22.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233223" version="1" comment="xen-tools is &lt;4.5.5_26-22.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233224" version="1" comment="xen-tools-domU is &lt;4.5.5_26-22.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233305" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-54.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233306" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-54.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233307" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-54.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233308" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-54.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233309" version="1" comment="openssl is &lt;1.0.1i-54.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233310" version="1" comment="openssl-doc is &lt;1.0.1i-54.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233763" version="1" comment="apache2 is &lt;2.4.16-20.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233764" version="1" comment="apache2-doc is &lt;2.4.16-20.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233765" version="1" comment="apache2-example-pages is &lt;2.4.16-20.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233766" version="1" comment="apache2-prefork is &lt;2.4.16-20.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233767" version="1" comment="apache2-utils is &lt;2.4.16-20.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233768" version="1" comment="apache2-worker is &lt;2.4.16-20.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233769" version="1" comment="libzypp is &lt;15.25.17-46.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251834" version="1" comment="zypper is &lt;1.12.59-46.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251835" version="1" comment="zypper-log is &lt;1.12.59-46.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233772" version="1" comment="qemu is &lt;2.3.1-33.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233773" version="1" comment="qemu-block-curl is &lt;2.3.1-33.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233774" version="1" comment="qemu-block-rbd is &lt;2.3.1-33.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233775" version="1" comment="qemu-guest-agent is &lt;2.3.1-33.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233776" version="1" comment="qemu-ipxe is &lt;1.0.0-33.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233777" version="1" comment="qemu-kvm is &lt;2.3.1-33.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233778" version="1" comment="qemu-lang is &lt;2.3.1-33.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233779" version="1" comment="qemu-ppc is &lt;2.3.1-33.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233780" version="1" comment="qemu-seabios is &lt;1.8.1-33.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233781" version="1" comment="qemu-sgabios is &lt;8-33.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233782" version="1" comment="qemu-tools is &lt;2.3.1-33.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233783" version="1" comment="qemu-vgabios is &lt;1.8.1-33.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233784" version="1" comment="qemu-x86 is &lt;2.3.1-33.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194034" version="1" comment="kgraft-patch-3_12_74-60_64_66-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194035" version="1" comment="kgraft-patch-3_12_74-60_64_66-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194036" version="1" comment="kgraft-patch-SLE12-SP1_Update_23 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194037" version="1" comment="kgraft-patch-3_12_74-60_64_63-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194038" version="1" comment="kgraft-patch-3_12_74-60_64_63-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194039" version="1" comment="kgraft-patch-SLE12-SP1_Update_22 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234312" version="1" comment="kgraft-patch-3_12_74-60_64_99-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234313" version="1" comment="kgraft-patch-3_12_74-60_64_99-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234314" version="1" comment="kgraft-patch-SLE12-SP1_Update_30 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234315" version="1" comment="openssh is &lt;6.6p1-54.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234316" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-54.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234317" version="1" comment="openssh-fips is &lt;6.6p1-54.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234318" version="1" comment="openssh-helpers is &lt;6.6p1-54.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194040" version="1" comment="kgraft-patch-3_12_74-60_64_60-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194041" version="1" comment="kgraft-patch-3_12_74-60_64_60-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194042" version="1" comment="kgraft-patch-SLE12-SP1_Update_21 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194043" version="1" comment="kgraft-patch-3_12_74-60_64_57-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194044" version="1" comment="kgraft-patch-3_12_74-60_64_57-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194045" version="1" comment="kgraft-patch-SLE12-SP1_Update_20 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194046" version="1" comment="kgraft-patch-3_12_69-60_64_29-default is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194047" version="1" comment="kgraft-patch-3_12_69-60_64_29-xen is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194048" version="1" comment="kgraft-patch-SLE12-SP1_Update_12 is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194049" version="1" comment="kgraft-patch-3_12_69-60_64_32-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194050" version="1" comment="kgraft-patch-3_12_69-60_64_32-xen is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194051" version="1" comment="kgraft-patch-SLE12-SP1_Update_13 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194052" version="1" comment="kgraft-patch-3_12_69-60_64_35-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194053" version="1" comment="kgraft-patch-3_12_69-60_64_35-xen is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194054" version="1" comment="kgraft-patch-SLE12-SP1_Update_14 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194055" version="1" comment="kgraft-patch-3_12_74-60_64_51-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194056" version="1" comment="kgraft-patch-3_12_74-60_64_51-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194057" version="1" comment="kgraft-patch-SLE12-SP1_Update_18 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235527" version="1" comment="yast2-smt is &lt;3.0.14-10.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235703" version="1" comment="kgraft-patch-3_12_74-60_64_96-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235704" version="1" comment="kgraft-patch-3_12_74-60_64_96-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235705" version="1" comment="kgraft-patch-SLE12-SP1_Update_29 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235706" version="1" comment="kgraft-patch-3_12_74-60_64_93-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235707" version="1" comment="kgraft-patch-3_12_74-60_64_93-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235708" version="1" comment="kgraft-patch-SLE12-SP1_Update_28 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235709" version="1" comment="kgraft-patch-3_12_74-60_64_88-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235710" version="1" comment="kgraft-patch-3_12_74-60_64_88-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235711" version="1" comment="kgraft-patch-SLE12-SP1_Update_27 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235712" version="1" comment="kgraft-patch-3_12_74-60_64_82-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235713" version="1" comment="kgraft-patch-3_12_74-60_64_82-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235714" version="1" comment="kgraft-patch-SLE12-SP1_Update_25 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235715" version="1" comment="kgraft-patch-3_12_74-60_64_85-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235716" version="1" comment="kgraft-patch-3_12_74-60_64_85-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235717" version="1" comment="kgraft-patch-SLE12-SP1_Update_26 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235718" version="1" comment="kgraft-patch-3_12_74-60_64_69-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235719" version="1" comment="kgraft-patch-3_12_74-60_64_69-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235720" version="1" comment="kgraft-patch-SLE12-SP1_Update_24 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235721" version="1" comment="kgraft-patch-3_12_74-60_64_99-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235722" version="1" comment="kgraft-patch-3_12_74-60_64_99-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235723" version="1" comment="kgraft-patch-SLE12-SP1_Update_30 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235724" version="1" comment="kgraft-patch-3_12_74-60_64_60-default is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235725" version="1" comment="kgraft-patch-3_12_74-60_64_60-xen is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235726" version="1" comment="kgraft-patch-SLE12-SP1_Update_21 is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235727" version="1" comment="kgraft-patch-3_12_74-60_64_66-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235728" version="1" comment="kgraft-patch-3_12_74-60_64_66-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235729" version="1" comment="kgraft-patch-SLE12-SP1_Update_23 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235730" version="1" comment="kgraft-patch-3_12_74-60_64_63-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235731" version="1" comment="kgraft-patch-3_12_74-60_64_63-xen is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235732" version="1" comment="kgraft-patch-SLE12-SP1_Update_22 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194058" version="1" comment="bind-devel is &lt;9.9.9P1-63.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194059" version="1" comment="kernel-default is &lt;3.12.74-60.64.69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194060" version="1" comment="kernel-default-base is &lt;3.12.74-60.64.69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194061" version="1" comment="kernel-default-devel is &lt;3.12.74-60.64.69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194062" version="1" comment="kernel-devel is &lt;3.12.74-60.64.69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194063" version="1" comment="kernel-macros is &lt;3.12.74-60.64.69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194064" version="1" comment="kernel-source is &lt;3.12.74-60.64.69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194065" version="1" comment="kernel-syms is &lt;3.12.74-60.64.69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194066" version="1" comment="kernel-xen is &lt;3.12.74-60.64.69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194067" version="1" comment="kernel-xen-base is &lt;3.12.74-60.64.69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194068" version="1" comment="kernel-xen-devel is &lt;3.12.74-60.64.69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194069" version="1" comment="kgraft-patch-3_12_74-60_64_69-default is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194070" version="1" comment="kgraft-patch-3_12_74-60_64_69-xen is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194071" version="1" comment="kgraft-patch-SLE12-SP1_Update_24 is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238062" version="1" comment="tomcat is &lt;8.0.53-10.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238063" version="1" comment="tomcat-admin-webapps is &lt;8.0.53-10.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238064" version="1" comment="tomcat-docs-webapp is &lt;8.0.53-10.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238065" version="1" comment="tomcat-el-3_0-api is &lt;8.0.53-10.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238066" version="1" comment="tomcat-javadoc is &lt;8.0.53-10.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238067" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.53-10.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238068" version="1" comment="tomcat-lib is &lt;8.0.53-10.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238069" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.53-10.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238070" version="1" comment="tomcat-webapps is &lt;8.0.53-10.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238519" version="1" comment="mozilla-nspr-devel is &lt;4.19-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238520" version="1" comment="mozilla-nss-devel is &lt;3.36.4-58.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194072" version="1" comment="MozillaFirefox-devel is &lt;52.6.0esr-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194073" version="1" comment="kernel-firmware is &lt;20160516git-10.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194074" version="1" comment="ucode-amd is &lt;20160516git-10.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194075" version="1" comment="quagga is &lt;0.99.22.1-16.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194076" version="1" comment="kernel-default is &lt;3.12.74-60.64.82" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194077" version="1" comment="kernel-default-base is &lt;3.12.74-60.64.82" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194078" version="1" comment="kernel-default-devel is &lt;3.12.74-60.64.82" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194079" version="1" comment="kernel-devel is &lt;3.12.74-60.64.82" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194080" version="1" comment="kernel-macros is &lt;3.12.74-60.64.82" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194081" version="1" comment="kernel-source is &lt;3.12.74-60.64.82" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194082" version="1" comment="kernel-syms is &lt;3.12.74-60.64.82" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194083" version="1" comment="kernel-xen is &lt;3.12.74-60.64.82" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194084" version="1" comment="kernel-xen-base is &lt;3.12.74-60.64.82" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194085" version="1" comment="kernel-xen-devel is &lt;3.12.74-60.64.82" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194086" version="1" comment="kgraft-patch-3_12_74-60_64_82-default is &lt;1-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194087" version="1" comment="kgraft-patch-3_12_74-60_64_82-xen is &lt;1-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194088" version="1" comment="kgraft-patch-SLE12-SP1_Update_25 is &lt;1-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194089" version="1" comment="qemu is &lt;2.3.1-33.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194090" version="1" comment="qemu-block-curl is &lt;2.3.1-33.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194091" version="1" comment="qemu-block-rbd is &lt;2.3.1-33.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194092" version="1" comment="qemu-guest-agent is &lt;2.3.1-33.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194093" version="1" comment="qemu-ipxe is &lt;1.0.0-33.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194094" version="1" comment="qemu-kvm is &lt;2.3.1-33.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194095" version="1" comment="qemu-lang is &lt;2.3.1-33.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194096" version="1" comment="qemu-ppc is &lt;2.3.1-33.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194097" version="1" comment="qemu-seabios is &lt;1.8.1-33.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194098" version="1" comment="qemu-sgabios is &lt;8-33.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194099" version="1" comment="qemu-tools is &lt;2.3.1-33.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194100" version="1" comment="qemu-vgabios is &lt;1.8.1-33.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194101" version="1" comment="qemu-x86 is &lt;2.3.1-33.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194102" version="1" comment="xen is &lt;4.5.5_24-22.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194103" version="1" comment="xen-doc-html is &lt;4.5.5_24-22.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194104" version="1" comment="xen-kmp-default is &lt;4.5.5_24_k3.12.74_60.64.82-22.43" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194105" version="1" comment="xen-libs is &lt;4.5.5_24-22.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194106" version="1" comment="xen-libs-32bit is &lt;4.5.5_24-22.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194107" version="1" comment="xen-tools is &lt;4.5.5_24-22.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194108" version="1" comment="xen-tools-domU is &lt;4.5.5_24-22.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194109" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.10-30.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194110" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr5.10-30.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194111" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.10-30.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194112" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr5.10-30.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194113" version="1" comment="libmysqlclient-devel is &lt;10.0.34-29.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194114" version="1" comment="libmysqld-devel is &lt;10.0.34-29.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194115" version="1" comment="libmysqld18 is &lt;10.0.34-29.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194116" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.20-38.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194117" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.20-38.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194118" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.20-38.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194119" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.20-38.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194120" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.20-38.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194121" version="1" comment="glibc is &lt;2.19-40.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194122" version="1" comment="glibc-32bit is &lt;2.19-40.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194123" version="1" comment="glibc-devel is &lt;2.19-40.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194124" version="1" comment="glibc-devel-32bit is &lt;2.19-40.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194125" version="1" comment="glibc-html is &lt;2.19-40.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194126" version="1" comment="glibc-i18ndata is &lt;2.19-40.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194127" version="1" comment="glibc-info is &lt;2.19-40.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194128" version="1" comment="glibc-locale is &lt;2.19-40.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194129" version="1" comment="glibc-locale-32bit is &lt;2.19-40.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194130" version="1" comment="glibc-profile is &lt;2.19-40.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194131" version="1" comment="glibc-profile-32bit is &lt;2.19-40.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194132" version="1" comment="nscd is &lt;2.19-40.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194133" version="1" comment="kernel-default is &lt;3.12.74-60.64.85" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194134" version="1" comment="kernel-default-base is &lt;3.12.74-60.64.85" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194135" version="1" comment="kernel-default-devel is &lt;3.12.74-60.64.85" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194136" version="1" comment="kernel-devel is &lt;3.12.74-60.64.85" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194137" version="1" comment="kernel-macros is &lt;3.12.74-60.64.85" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194138" version="1" comment="kernel-source is &lt;3.12.74-60.64.85" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194139" version="1" comment="kernel-syms is &lt;3.12.74-60.64.85" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194140" version="1" comment="kernel-xen is &lt;3.12.74-60.64.85" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194141" version="1" comment="kernel-xen-base is &lt;3.12.74-60.64.85" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194142" version="1" comment="kernel-xen-devel is &lt;3.12.74-60.64.85" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194143" version="1" comment="kgraft-patch-3_12_74-60_64_85-default is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194144" version="1" comment="kgraft-patch-3_12_74-60_64_85-xen is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194145" version="1" comment="kgraft-patch-SLE12-SP1_Update_26 is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194146" version="1" comment="apache2 is &lt;2.4.16-20.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194147" version="1" comment="apache2-doc is &lt;2.4.16-20.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194148" version="1" comment="apache2-example-pages is &lt;2.4.16-20.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194149" version="1" comment="apache2-prefork is &lt;2.4.16-20.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194150" version="1" comment="apache2-utils is &lt;2.4.16-20.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194151" version="1" comment="apache2-worker is &lt;2.4.16-20.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194152" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-54.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194153" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-54.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194154" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-54.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194155" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-54.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194156" version="1" comment="openssl is &lt;1.0.1i-54.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194157" version="1" comment="openssl-doc is &lt;1.0.1i-54.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194158" version="1" comment="kgraft-patch-3_12_74-60_64_54-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194159" version="1" comment="kgraft-patch-3_12_74-60_64_54-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194160" version="1" comment="kgraft-patch-SLE12-SP1_Update_19 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194161" version="1" comment="kgraft-patch-3_12_74-60_64_51-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194162" version="1" comment="kgraft-patch-3_12_74-60_64_51-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194163" version="1" comment="kgraft-patch-SLE12-SP1_Update_18 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194164" version="1" comment="kgraft-patch-3_12_74-60_64_40-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194165" version="1" comment="kgraft-patch-3_12_74-60_64_40-xen is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194166" version="1" comment="kgraft-patch-SLE12-SP1_Update_15 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194167" version="1" comment="kgraft-patch-3_12_74-60_64_48-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194168" version="1" comment="kgraft-patch-3_12_74-60_64_48-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194169" version="1" comment="kgraft-patch-SLE12-SP1_Update_17 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194170" version="1" comment="kgraft-patch-3_12_74-60_64_45-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194171" version="1" comment="kgraft-patch-3_12_74-60_64_45-xen is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194172" version="1" comment="kgraft-patch-SLE12-SP1_Update_16 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194173" version="1" comment="kgraft-patch-3_12_74-60_64_57-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194174" version="1" comment="kgraft-patch-3_12_74-60_64_57-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194175" version="1" comment="kgraft-patch-SLE12-SP1_Update_20 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194176" version="1" comment="kgraft-patch-3_12_74-60_64_60-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194177" version="1" comment="kgraft-patch-3_12_74-60_64_60-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194178" version="1" comment="kgraft-patch-SLE12-SP1_Update_21 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194179" version="1" comment="kgraft-patch-3_12_74-60_64_63-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194180" version="1" comment="kgraft-patch-3_12_74-60_64_63-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194181" version="1" comment="kgraft-patch-SLE12-SP1_Update_22 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194182" version="1" comment="kgraft-patch-3_12_74-60_64_66-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194183" version="1" comment="kgraft-patch-3_12_74-60_64_66-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194184" version="1" comment="kgraft-patch-SLE12-SP1_Update_23 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194185" version="1" comment="kgraft-patch-3_12_74-60_64_69-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194186" version="1" comment="kgraft-patch-3_12_74-60_64_69-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194187" version="1" comment="kgraft-patch-SLE12-SP1_Update_24 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194188" version="1" comment="kgraft-patch-3_12_74-60_64_82-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194189" version="1" comment="kgraft-patch-3_12_74-60_64_82-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194190" version="1" comment="kgraft-patch-SLE12-SP1_Update_25 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194191" version="1" comment="kgraft-patch-3_12_74-60_64_85-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194192" version="1" comment="kgraft-patch-3_12_74-60_64_85-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194193" version="1" comment="kgraft-patch-SLE12-SP1_Update_26 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194194" version="1" comment="xen is &lt;4.5.5_24-22.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194195" version="1" comment="xen-doc-html is &lt;4.5.5_24-22.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194196" version="1" comment="xen-kmp-default is &lt;4.5.5_24_k3.12.74_60.64.85-22.46" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194197" version="1" comment="xen-libs is &lt;4.5.5_24-22.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194198" version="1" comment="xen-libs-32bit is &lt;4.5.5_24-22.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194199" version="1" comment="xen-tools is &lt;4.5.5_24-22.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194200" version="1" comment="xen-tools-domU is &lt;4.5.5_24-22.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194201" version="1" comment="kernel-default is &lt;3.12.74-60.64.88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194202" version="1" comment="kernel-default-base is &lt;3.12.74-60.64.88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194203" version="1" comment="kernel-default-devel is &lt;3.12.74-60.64.88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194204" version="1" comment="kernel-devel is &lt;3.12.74-60.64.88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194205" version="1" comment="kernel-macros is &lt;3.12.74-60.64.88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194206" version="1" comment="kernel-source is &lt;3.12.74-60.64.88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194207" version="1" comment="kernel-syms is &lt;3.12.74-60.64.88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194208" version="1" comment="kernel-xen is &lt;3.12.74-60.64.88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194209" version="1" comment="kernel-xen-base is &lt;3.12.74-60.64.88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194210" version="1" comment="kernel-xen-devel is &lt;3.12.74-60.64.88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194211" version="1" comment="kgraft-patch-3_12_74-60_64_88-default is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194212" version="1" comment="kgraft-patch-3_12_74-60_64_88-xen is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194213" version="1" comment="kgraft-patch-SLE12-SP1_Update_27 is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194214" version="1" comment="kgraft-patch-3_12_74-60_64_85-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194215" version="1" comment="kgraft-patch-3_12_74-60_64_85-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194216" version="1" comment="kgraft-patch-SLE12-SP1_Update_26 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194217" version="1" comment="kgraft-patch-3_12_74-60_64_82-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194218" version="1" comment="kgraft-patch-3_12_74-60_64_82-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194219" version="1" comment="kgraft-patch-SLE12-SP1_Update_25 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194220" version="1" comment="kgraft-patch-3_12_74-60_64_69-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194221" version="1" comment="kgraft-patch-3_12_74-60_64_69-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194222" version="1" comment="kgraft-patch-SLE12-SP1_Update_24 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194223" version="1" comment="kgraft-patch-3_12_74-60_64_66-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194224" version="1" comment="kgraft-patch-3_12_74-60_64_66-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194225" version="1" comment="kgraft-patch-SLE12-SP1_Update_23 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194226" version="1" comment="kgraft-patch-3_12_74-60_64_63-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194227" version="1" comment="kgraft-patch-3_12_74-60_64_63-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194228" version="1" comment="kgraft-patch-SLE12-SP1_Update_22 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194229" version="1" comment="kgraft-patch-3_12_74-60_64_60-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194230" version="1" comment="kgraft-patch-3_12_74-60_64_60-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194231" version="1" comment="kgraft-patch-SLE12-SP1_Update_21 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194232" version="1" comment="kgraft-patch-3_12_74-60_64_57-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194233" version="1" comment="kgraft-patch-3_12_74-60_64_57-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194234" version="1" comment="kgraft-patch-SLE12-SP1_Update_20 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194235" version="1" comment="kgraft-patch-3_12_74-60_64_45-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194236" version="1" comment="kgraft-patch-3_12_74-60_64_45-xen is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194237" version="1" comment="kgraft-patch-SLE12-SP1_Update_16 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194238" version="1" comment="kgraft-patch-3_12_74-60_64_48-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194239" version="1" comment="kgraft-patch-3_12_74-60_64_48-xen is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194240" version="1" comment="kgraft-patch-SLE12-SP1_Update_17 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194241" version="1" comment="kgraft-patch-3_12_74-60_64_40-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194242" version="1" comment="kgraft-patch-3_12_74-60_64_40-xen is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194243" version="1" comment="kgraft-patch-SLE12-SP1_Update_15 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194244" version="1" comment="kgraft-patch-3_12_74-60_64_51-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194245" version="1" comment="kgraft-patch-3_12_74-60_64_51-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194246" version="1" comment="kgraft-patch-SLE12-SP1_Update_18 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194247" version="1" comment="kgraft-patch-3_12_74-60_64_54-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194248" version="1" comment="kgraft-patch-3_12_74-60_64_54-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194249" version="1" comment="kgraft-patch-SLE12-SP1_Update_19 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194250" version="1" comment="qemu is &lt;2.3.1-33.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194251" version="1" comment="qemu-block-curl is &lt;2.3.1-33.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194252" version="1" comment="qemu-block-rbd is &lt;2.3.1-33.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194253" version="1" comment="qemu-guest-agent is &lt;2.3.1-33.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194254" version="1" comment="qemu-ipxe is &lt;1.0.0-33.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194255" version="1" comment="qemu-kvm is &lt;2.3.1-33.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194256" version="1" comment="qemu-lang is &lt;2.3.1-33.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194257" version="1" comment="qemu-ppc is &lt;2.3.1-33.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194258" version="1" comment="qemu-seabios is &lt;1.8.1-33.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194259" version="1" comment="qemu-sgabios is &lt;8-33.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194260" version="1" comment="qemu-tools is &lt;2.3.1-33.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194261" version="1" comment="qemu-vgabios is &lt;1.8.1-33.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194262" version="1" comment="qemu-x86 is &lt;2.3.1-33.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194263" version="1" comment="kernel-default is &lt;3.12.74-60.64.93" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194264" version="1" comment="kernel-default-base is &lt;3.12.74-60.64.93" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194265" version="1" comment="kernel-default-devel is &lt;3.12.74-60.64.93" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194266" version="1" comment="kernel-devel is &lt;3.12.74-60.64.93" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194267" version="1" comment="kernel-macros is &lt;3.12.74-60.64.93" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194268" version="1" comment="kernel-source is &lt;3.12.74-60.64.93" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194269" version="1" comment="kernel-syms is &lt;3.12.74-60.64.93" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194270" version="1" comment="kernel-xen is &lt;3.12.74-60.64.93" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194271" version="1" comment="kernel-xen-base is &lt;3.12.74-60.64.93" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194272" version="1" comment="kernel-xen-devel is &lt;3.12.74-60.64.93" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194273" version="1" comment="kgraft-patch-3_12_74-60_64_93-default is &lt;1-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194274" version="1" comment="kgraft-patch-3_12_74-60_64_93-xen is &lt;1-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194275" version="1" comment="kgraft-patch-SLE12-SP1_Update_28 is &lt;1-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194276" version="1" comment="krb5 is &lt;1.12.1-38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194277" version="1" comment="krb5-32bit is &lt;1.12.1-38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194278" version="1" comment="krb5-client is &lt;1.12.1-38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194279" version="1" comment="krb5-doc is &lt;1.12.1-38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194280" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.1-38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194281" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.1-38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194282" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.1-38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194283" version="1" comment="krb5-server is &lt;1.12.1-38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242187" version="1" comment="libQt5Core5 is &lt;5.5.1-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242188" version="1" comment="libQt5DBus5 is &lt;5.5.1-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242189" version="1" comment="libQt5Gui5 is &lt;5.5.1-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242190" version="1" comment="libQt5Network5 is &lt;5.5.1-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242191" version="1" comment="libQt5Widgets5 is &lt;5.5.1-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242192" version="1" comment="libqt5-qtbase is &lt;5.5.1-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240618" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-54.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240619" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-54.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240620" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-54.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240621" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-54.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240622" version="1" comment="openssl is &lt;1.0.1i-54.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240623" version="1" comment="openssl-doc is &lt;1.0.1i-54.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235529" version="1" comment="kernel-default is &lt;3.12.74-60.64.104" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235530" version="1" comment="kernel-default-base is &lt;3.12.74-60.64.104" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235531" version="1" comment="kernel-default-devel is &lt;3.12.74-60.64.104" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235533" version="1" comment="kernel-devel is &lt;3.12.74-60.64.104" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235534" version="1" comment="kernel-macros is &lt;3.12.74-60.64.104" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235535" version="1" comment="kernel-source is &lt;3.12.74-60.64.104" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235536" version="1" comment="kernel-syms is &lt;3.12.74-60.64.104" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235537" version="1" comment="kernel-xen is &lt;3.12.74-60.64.104" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235538" version="1" comment="kernel-xen-base is &lt;3.12.74-60.64.104" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235539" version="1" comment="kernel-xen-devel is &lt;3.12.74-60.64.104" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252442" version="1" comment="kgraft-patch-3_12_74-60_64_104-default is &lt;1-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252443" version="1" comment="kgraft-patch-3_12_74-60_64_104-xen is &lt;1-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252444" version="1" comment="kgraft-patch-SLE12-SP1_Update_31 is &lt;1-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240988" version="1" comment="qemu is &lt;2.3.1-33.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240989" version="1" comment="qemu-block-curl is &lt;2.3.1-33.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240990" version="1" comment="qemu-block-rbd is &lt;2.3.1-33.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240991" version="1" comment="qemu-guest-agent is &lt;2.3.1-33.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240992" version="1" comment="qemu-ipxe is &lt;1.0.0-33.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240993" version="1" comment="qemu-kvm is &lt;2.3.1-33.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240994" version="1" comment="qemu-lang is &lt;2.3.1-33.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240997" version="1" comment="qemu-seabios is &lt;1.8.1-33.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240998" version="1" comment="qemu-sgabios is &lt;8-33.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240999" version="1" comment="qemu-tools is &lt;2.3.1-33.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241000" version="1" comment="qemu-vgabios is &lt;1.8.1-33.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241001" version="1" comment="qemu-x86 is &lt;2.3.1-33.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239303" version="1" comment="openssh is &lt;6.6p1-54.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239304" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-54.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239305" version="1" comment="openssh-fips is &lt;6.6p1-54.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239306" version="1" comment="openssh-helpers is &lt;6.6p1-54.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252755" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-54.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252756" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-54.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252757" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-54.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252758" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-54.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252759" version="1" comment="openssl is &lt;1.0.1i-54.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252760" version="1" comment="openssl-doc is &lt;1.0.1i-54.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243072" version="1" comment="krb5 is &lt;1.12.1-38.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243073" version="1" comment="krb5-32bit is &lt;1.12.1-38.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243074" version="1" comment="krb5-client is &lt;1.12.1-38.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243075" version="1" comment="krb5-doc is &lt;1.12.1-38.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243076" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.1-38.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243077" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.1-38.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243078" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.1-38.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243079" version="1" comment="krb5-server is &lt;1.12.1-38.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252996" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-28.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252997" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-28.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252998" version="1" comment="libdcerpc0 is &lt;4.2.4-28.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252999" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-28.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253000" version="1" comment="libgensec0 is &lt;4.2.4-28.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253001" version="1" comment="libgensec0-32bit is &lt;4.2.4-28.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253002" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-28.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253003" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-28.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253004" version="1" comment="libndr-nbt0 is &lt;4.2.4-28.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253005" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-28.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253006" version="1" comment="libndr-standard0 is &lt;4.2.4-28.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253007" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-28.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253008" version="1" comment="libndr0 is &lt;4.2.4-28.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253009" version="1" comment="libndr0-32bit is &lt;4.2.4-28.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253010" version="1" comment="libnetapi0 is &lt;4.2.4-28.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253011" version="1" comment="libnetapi0-32bit is &lt;4.2.4-28.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253012" version="1" comment="libregistry0 is &lt;4.2.4-28.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253013" version="1" comment="libsamba-credentials0 is &lt;4.2.4-28.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253014" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-28.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253015" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-28.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253016" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-28.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253017" version="1" comment="libsamba-passdb0 is &lt;4.2.4-28.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253018" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-28.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253019" version="1" comment="libsamba-util0 is &lt;4.2.4-28.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253020" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-28.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253021" version="1" comment="libsamdb0 is &lt;4.2.4-28.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253022" version="1" comment="libsamdb0-32bit is &lt;4.2.4-28.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253023" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-28.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253024" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-28.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253025" version="1" comment="libsmbclient0 is &lt;4.2.4-28.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253026" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-28.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253027" version="1" comment="libsmbconf0 is &lt;4.2.4-28.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253028" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-28.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253029" version="1" comment="libsmbldap0 is &lt;4.2.4-28.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253030" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-28.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253031" version="1" comment="libtevent-util0 is &lt;4.2.4-28.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253032" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-28.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253033" version="1" comment="libwbclient0 is &lt;4.2.4-28.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253034" version="1" comment="libwbclient0-32bit is &lt;4.2.4-28.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253035" version="1" comment="samba-32bit is &lt;4.2.4-28.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253036" version="1" comment="samba-client is &lt;4.2.4-28.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253037" version="1" comment="samba-client-32bit is &lt;4.2.4-28.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253038" version="1" comment="samba-doc is &lt;4.2.4-28.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253039" version="1" comment="samba-libs is &lt;4.2.4-28.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253040" version="1" comment="samba-libs-32bit is &lt;4.2.4-28.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253041" version="1" comment="samba-winbind is &lt;4.2.4-28.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253042" version="1" comment="samba-winbind-32bit is &lt;4.2.4-28.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243182" version="1" comment="openssh is &lt;6.6p1-54.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243183" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-54.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243184" version="1" comment="openssh-fips is &lt;6.6p1-54.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243185" version="1" comment="openssh-helpers is &lt;6.6p1-54.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253665" version="1" comment="qemu is &lt;2.3.1-33.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253666" version="1" comment="qemu-block-curl is &lt;2.3.1-33.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253667" version="1" comment="qemu-block-rbd is &lt;2.3.1-33.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253668" version="1" comment="qemu-guest-agent is &lt;2.3.1-33.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253669" version="1" comment="qemu-ipxe is &lt;1.0.0-33.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253670" version="1" comment="qemu-kvm is &lt;2.3.1-33.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253671" version="1" comment="qemu-lang is &lt;2.3.1-33.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253672" version="1" comment="qemu-seabios is &lt;1.8.1-33.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253673" version="1" comment="qemu-sgabios is &lt;8-33.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253674" version="1" comment="qemu-tools is &lt;2.3.1-33.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253675" version="1" comment="qemu-vgabios is &lt;1.8.1-33.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253676" version="1" comment="qemu-x86 is &lt;2.3.1-33.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253804" version="1" comment="kernel-default is &lt;3.12.74-60.64.110" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253805" version="1" comment="kernel-default-base is &lt;3.12.74-60.64.110" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253806" version="1" comment="kernel-default-devel is &lt;3.12.74-60.64.110" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253807" version="1" comment="kernel-devel is &lt;3.12.74-60.64.110" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253808" version="1" comment="kernel-macros is &lt;3.12.74-60.64.110" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253809" version="1" comment="kernel-source is &lt;3.12.74-60.64.110" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253810" version="1" comment="kernel-syms is &lt;3.12.74-60.64.110" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253811" version="1" comment="kernel-xen is &lt;3.12.74-60.64.110" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253812" version="1" comment="kernel-xen-base is &lt;3.12.74-60.64.110" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253813" version="1" comment="kernel-xen-devel is &lt;3.12.74-60.64.110" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254519" version="1" comment="kgraft-patch-3_12_74-60_64_110-default is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254520" version="1" comment="kgraft-patch-3_12_74-60_64_110-xen is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254521" version="1" comment="kgraft-patch-SLE12-SP1_Update_33 is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253814" version="1" comment="lttng-modules is &lt;2.7.0-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253815" version="1" comment="lttng-modules-kmp-default is &lt;2.7.0_k3.12.74_60.64.110-4.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254192" version="1" comment="xen is &lt;4.5.5_28-22.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254193" version="1" comment="xen-doc-html is &lt;4.5.5_28-22.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254194" version="1" comment="xen-kmp-default is &lt;4.5.5_28_k3.12.74_60.64.110-22.61" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254195" version="1" comment="xen-libs is &lt;4.5.5_28-22.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254196" version="1" comment="xen-libs-32bit is &lt;4.5.5_28-22.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254197" version="1" comment="xen-tools is &lt;4.5.5_28-22.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254198" version="1" comment="xen-tools-domU is &lt;4.5.5_28-22.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254522" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-54.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254523" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-54.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254524" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-54.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254525" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-54.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254526" version="1" comment="openssl is &lt;1.0.1i-54.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254527" version="1" comment="openssl-doc is &lt;1.0.1i-54.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255832" version="1" comment="bind-devel is &lt;9.9.9P1-63.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256091" version="1" comment="kgraft-patch-3_12_74-60_64_96-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256092" version="1" comment="kgraft-patch-3_12_74-60_64_96-xen is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256093" version="1" comment="kgraft-patch-SLE12-SP1_Update_29 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256094" version="1" comment="kgraft-patch-3_12_74-60_64_110-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256095" version="1" comment="kgraft-patch-3_12_74-60_64_110-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256096" version="1" comment="kgraft-patch-SLE12-SP1_Update_33 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256382" version="1" comment="libvirt is &lt;1.2.18.4-22.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256383" version="1" comment="libvirt-client is &lt;1.2.18.4-22.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256384" version="1" comment="libvirt-daemon is &lt;1.2.18.4-22.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256385" version="1" comment="libvirt-daemon-config-network is &lt;1.2.18.4-22.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256386" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.2.18.4-22.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256387" version="1" comment="libvirt-daemon-driver-interface is &lt;1.2.18.4-22.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256388" version="1" comment="libvirt-daemon-driver-libxl is &lt;1.2.18.4-22.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256389" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.2.18.4-22.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256390" version="1" comment="libvirt-daemon-driver-network is &lt;1.2.18.4-22.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256391" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.2.18.4-22.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256392" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.2.18.4-22.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256393" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.2.18.4-22.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256394" version="1" comment="libvirt-daemon-driver-secret is &lt;1.2.18.4-22.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256395" version="1" comment="libvirt-daemon-driver-storage is &lt;1.2.18.4-22.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256396" version="1" comment="libvirt-daemon-lxc is &lt;1.2.18.4-22.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256397" version="1" comment="libvirt-daemon-qemu is &lt;1.2.18.4-22.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256398" version="1" comment="libvirt-daemon-xen is &lt;1.2.18.4-22.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256399" version="1" comment="libvirt-doc is &lt;1.2.18.4-22.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256400" version="1" comment="libvirt-lock-sanlock is &lt;1.2.18.4-22.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256807" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.36-11.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256808" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.36-11.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256809" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.36-11.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256810" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.36-11.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256811" version="1" comment="gstreamer-plugins-base is &lt;1.2.4-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256812" version="1" comment="gstreamer-plugins-base-lang is &lt;1.2.4-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256813" version="1" comment="libgstallocators-1_0-0 is &lt;1.2.4-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256814" version="1" comment="libgstapp-1_0-0 is &lt;1.2.4-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256815" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.2.4-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256816" version="1" comment="libgstaudio-1_0-0 is &lt;1.2.4-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256817" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.2.4-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256818" version="1" comment="libgstfft-1_0-0 is &lt;1.2.4-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256819" version="1" comment="libgstpbutils-1_0-0 is &lt;1.2.4-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256820" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.2.4-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256821" version="1" comment="libgstriff-1_0-0 is &lt;1.2.4-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256822" version="1" comment="libgstrtp-1_0-0 is &lt;1.2.4-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256823" version="1" comment="libgstrtsp-1_0-0 is &lt;1.2.4-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256824" version="1" comment="libgstsdp-1_0-0 is &lt;1.2.4-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256825" version="1" comment="libgsttag-1_0-0 is &lt;1.2.4-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256826" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.2.4-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256827" version="1" comment="libgstvideo-1_0-0 is &lt;1.2.4-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256828" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.2.4-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257014" version="1" comment="kernel-default is &lt;3.12.74-60.64.115" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257015" version="1" comment="kernel-default-base is &lt;3.12.74-60.64.115" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257016" version="1" comment="kernel-default-devel is &lt;3.12.74-60.64.115" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257017" version="1" comment="kernel-devel is &lt;3.12.74-60.64.115" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257018" version="1" comment="kernel-macros is &lt;3.12.74-60.64.115" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257019" version="1" comment="kernel-source is &lt;3.12.74-60.64.115" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257020" version="1" comment="kernel-syms is &lt;3.12.74-60.64.115" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257021" version="1" comment="kernel-xen is &lt;3.12.74-60.64.115" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257022" version="1" comment="kernel-xen-base is &lt;3.12.74-60.64.115" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257023" version="1" comment="kernel-xen-devel is &lt;3.12.74-60.64.115" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257024" version="1" comment="kgraft-patch-3_12_74-60_64_115-default is &lt;1-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257025" version="1" comment="kgraft-patch-3_12_74-60_64_115-xen is &lt;1-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257026" version="1" comment="kgraft-patch-SLE12-SP1_Update_34 is &lt;1-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257875" version="1" comment="kgraft-patch-3_12_74-60_64_96-default is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257876" version="1" comment="kgraft-patch-3_12_74-60_64_96-xen is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257877" version="1" comment="kgraft-patch-SLE12-SP1_Update_29 is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257878" version="1" comment="kgraft-patch-3_12_74-60_64_99-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257879" version="1" comment="kgraft-patch-3_12_74-60_64_99-xen is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257880" version="1" comment="kgraft-patch-SLE12-SP1_Update_30 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257881" version="1" comment="kgraft-patch-3_12_74-60_64_104-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257882" version="1" comment="kgraft-patch-3_12_74-60_64_104-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257883" version="1" comment="kgraft-patch-SLE12-SP1_Update_31 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257884" version="1" comment="kgraft-patch-3_12_74-60_64_110-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257885" version="1" comment="kgraft-patch-3_12_74-60_64_110-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257886" version="1" comment="kgraft-patch-SLE12-SP1_Update_33 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257887" version="1" comment="kgraft-patch-3_12_74-60_64_107-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257888" version="1" comment="kgraft-patch-3_12_74-60_64_107-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257889" version="1" comment="kgraft-patch-SLE12-SP1_Update_32 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258055" version="1" comment="libvirt is &lt;1.2.18.4-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258056" version="1" comment="libvirt-client is &lt;1.2.18.4-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258057" version="1" comment="libvirt-daemon is &lt;1.2.18.4-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258058" version="1" comment="libvirt-daemon-config-network is &lt;1.2.18.4-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258059" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.2.18.4-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258060" version="1" comment="libvirt-daemon-driver-interface is &lt;1.2.18.4-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258061" version="1" comment="libvirt-daemon-driver-libxl is &lt;1.2.18.4-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258062" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.2.18.4-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258063" version="1" comment="libvirt-daemon-driver-network is &lt;1.2.18.4-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258064" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.2.18.4-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258065" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.2.18.4-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258066" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.2.18.4-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258067" version="1" comment="libvirt-daemon-driver-secret is &lt;1.2.18.4-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258068" version="1" comment="libvirt-daemon-driver-storage is &lt;1.2.18.4-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258069" version="1" comment="libvirt-daemon-lxc is &lt;1.2.18.4-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258070" version="1" comment="libvirt-daemon-qemu is &lt;1.2.18.4-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258071" version="1" comment="libvirt-daemon-xen is &lt;1.2.18.4-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258072" version="1" comment="libvirt-doc is &lt;1.2.18.4-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258073" version="1" comment="libvirt-lock-sanlock is &lt;1.2.18.4-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258981" version="1" comment="kgraft-patch-3_12_74-60_64_115-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258982" version="1" comment="kgraft-patch-3_12_74-60_64_115-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258983" version="1" comment="kgraft-patch-SLE12-SP1_Update_34 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259194" version="1" comment="glib2 is &lt;2.38.2-7.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259195" version="1" comment="glib2-lang is &lt;2.38.2-7.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259196" version="1" comment="glib2-tools is &lt;2.38.2-7.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259197" version="1" comment="libgio-2_0-0 is &lt;2.38.2-7.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259198" version="1" comment="libgio-2_0-0-32bit is &lt;2.38.2-7.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259199" version="1" comment="libglib-2_0-0 is &lt;2.38.2-7.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259200" version="1" comment="libglib-2_0-0-32bit is &lt;2.38.2-7.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259201" version="1" comment="libgmodule-2_0-0 is &lt;2.38.2-7.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259202" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.38.2-7.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259203" version="1" comment="libgobject-2_0-0 is &lt;2.38.2-7.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259204" version="1" comment="libgobject-2_0-0-32bit is &lt;2.38.2-7.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259205" version="1" comment="libgthread-2_0-0 is &lt;2.38.2-7.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259206" version="1" comment="libgthread-2_0-0-32bit is &lt;2.38.2-7.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259425" version="1" comment="mozilla-nss-devel is &lt;3.44.1-58.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259426" version="1" comment="kernel-default is &lt;3.12.74-60.64.118" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259427" version="1" comment="kernel-default-base is &lt;3.12.74-60.64.118" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259428" version="1" comment="kernel-default-devel is &lt;3.12.74-60.64.118" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259429" version="1" comment="kernel-devel is &lt;3.12.74-60.64.118" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259430" version="1" comment="kernel-macros is &lt;3.12.74-60.64.118" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259431" version="1" comment="kernel-source is &lt;3.12.74-60.64.118" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259432" version="1" comment="kernel-syms is &lt;3.12.74-60.64.118" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259433" version="1" comment="kernel-xen is &lt;3.12.74-60.64.118" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259434" version="1" comment="kernel-xen-base is &lt;3.12.74-60.64.118" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259435" version="1" comment="kernel-xen-devel is &lt;3.12.74-60.64.118" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259436" version="1" comment="kgraft-patch-3_12_74-60_64_118-default is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259437" version="1" comment="kgraft-patch-3_12_74-60_64_118-xen is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259438" version="1" comment="kgraft-patch-SLE12-SP1_Update_35 is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260443" version="1" comment="kgraft-patch-3_12_74-60_64_99-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260444" version="1" comment="kgraft-patch-3_12_74-60_64_99-xen is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260445" version="1" comment="kgraft-patch-SLE12-SP1_Update_30 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260446" version="1" comment="kgraft-patch-3_12_74-60_64_104-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260447" version="1" comment="kgraft-patch-3_12_74-60_64_104-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260448" version="1" comment="kgraft-patch-SLE12-SP1_Update_31 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260449" version="1" comment="kgraft-patch-3_12_74-60_64_107-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260450" version="1" comment="kgraft-patch-3_12_74-60_64_107-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260451" version="1" comment="kgraft-patch-SLE12-SP1_Update_32 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260452" version="1" comment="kgraft-patch-3_12_74-60_64_110-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260453" version="1" comment="kgraft-patch-3_12_74-60_64_110-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260454" version="1" comment="kgraft-patch-SLE12-SP1_Update_33 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260455" version="1" comment="kgraft-patch-3_12_74-60_64_115-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260456" version="1" comment="kgraft-patch-3_12_74-60_64_115-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260457" version="1" comment="kgraft-patch-SLE12-SP1_Update_34 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261318" version="1" comment="evince is &lt;3.10.3-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261319" version="1" comment="evince-lang is &lt;3.10.3-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261320" version="1" comment="libevdocument3-4 is &lt;3.10.3-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261321" version="1" comment="libevview3-3 is &lt;3.10.3-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262797" version="1" comment="qemu is &lt;2.3.1-33.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262798" version="1" comment="qemu-block-curl is &lt;2.3.1-33.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262799" version="1" comment="qemu-block-rbd is &lt;2.3.1-33.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262800" version="1" comment="qemu-guest-agent is &lt;2.3.1-33.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262801" version="1" comment="qemu-ipxe is &lt;1.0.0-33.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262802" version="1" comment="qemu-kvm is &lt;2.3.1-33.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262803" version="1" comment="qemu-lang is &lt;2.3.1-33.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262804" version="1" comment="qemu-seabios is &lt;1.8.1-33.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262805" version="1" comment="qemu-sgabios is &lt;8-33.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262806" version="1" comment="qemu-tools is &lt;2.3.1-33.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262807" version="1" comment="qemu-vgabios is &lt;1.8.1-33.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262808" version="1" comment="qemu-x86 is &lt;2.3.1-33.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263320" version="1" comment="kernel-default is &lt;3.12.74-60.64.121" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263321" version="1" comment="kernel-default-base is &lt;3.12.74-60.64.121" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263322" version="1" comment="kernel-default-devel is &lt;3.12.74-60.64.121" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263323" version="1" comment="kernel-devel is &lt;3.12.74-60.64.121" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263324" version="1" comment="kernel-macros is &lt;3.12.74-60.64.121" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263325" version="1" comment="kernel-source is &lt;3.12.74-60.64.121" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263326" version="1" comment="kernel-syms is &lt;3.12.74-60.64.121" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263327" version="1" comment="kernel-xen is &lt;3.12.74-60.64.121" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263328" version="1" comment="kernel-xen-base is &lt;3.12.74-60.64.121" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263329" version="1" comment="kernel-xen-devel is &lt;3.12.74-60.64.121" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263330" version="1" comment="kgraft-patch-3_12_74-60_64_121-default is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263331" version="1" comment="kgraft-patch-3_12_74-60_64_121-xen is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263332" version="1" comment="kgraft-patch-SLE12-SP1_Update_36 is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263524" version="1" comment="libosinfo is &lt;0.2.12-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263525" version="1" comment="libosinfo-1_0-0 is &lt;0.2.12-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263526" version="1" comment="libosinfo-lang is &lt;0.2.12-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263527" version="1" comment="typelib-1_0-Libosinfo-1_0 is &lt;0.2.12-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243797" version="1" comment="libspice-server1 is &lt;0.12.5-10.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243798" version="1" comment="spice is &lt;0.12.5-10.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264632" version="1" comment="ibus is &lt;1.5.8-10.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264633" version="1" comment="ibus-gtk is &lt;1.5.8-10.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264634" version="1" comment="ibus-gtk3 is &lt;1.5.8-10.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264635" version="1" comment="ibus-lang is &lt;1.5.8-10.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264636" version="1" comment="libibus-1_0-5 is &lt;1.5.8-10.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264637" version="1" comment="typelib-1_0-IBus-1_0 is &lt;1.5.8-10.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264894" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-54.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264895" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-54.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264896" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-54.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264897" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-54.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264898" version="1" comment="openssl is &lt;1.0.1i-54.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264899" version="1" comment="openssl-doc is &lt;1.0.1i-54.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244171" version="1" comment="mozilla-nss-devel is &lt;3.41.1-58.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244509" version="1" comment="libgudev-1_0-0 is &lt;210-116.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244510" version="1" comment="libgudev-1_0-0-32bit is &lt;210-116.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244511" version="1" comment="libgudev-1_0-devel is &lt;210-116.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244512" version="1" comment="libudev-devel is &lt;210-116.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244513" version="1" comment="libudev1 is &lt;210-116.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244514" version="1" comment="libudev1-32bit is &lt;210-116.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244515" version="1" comment="systemd is &lt;210-116.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244516" version="1" comment="systemd-32bit is &lt;210-116.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244517" version="1" comment="systemd-bash-completion is &lt;210-116.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244518" version="1" comment="systemd-devel is &lt;210-116.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244519" version="1" comment="systemd-sysvinit is &lt;210-116.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244520" version="1" comment="typelib-1_0-GUdev-1_0 is &lt;210-116.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244521" version="1" comment="udev is &lt;210-116.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244674" version="1" comment="kernel-firmware is &lt;20160516git-10.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244675" version="1" comment="ucode-amd is &lt;20160516git-10.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244917" version="1" comment="qemu is &lt;2.3.1-33.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244918" version="1" comment="qemu-block-curl is &lt;2.3.1-33.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244919" version="1" comment="qemu-block-rbd is &lt;2.3.1-33.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244920" version="1" comment="qemu-guest-agent is &lt;2.3.1-33.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244921" version="1" comment="qemu-ipxe is &lt;1.0.0-33.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244922" version="1" comment="qemu-kvm is &lt;2.3.1-33.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244923" version="1" comment="qemu-lang is &lt;2.3.1-33.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244926" version="1" comment="qemu-seabios is &lt;1.8.1-33.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244927" version="1" comment="qemu-sgabios is &lt;8-33.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244928" version="1" comment="qemu-tools is &lt;2.3.1-33.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244929" version="1" comment="qemu-vgabios is &lt;1.8.1-33.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244930" version="1" comment="qemu-x86 is &lt;2.3.1-33.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245350" version="1" comment="bluez is &lt;5.13-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245351" version="1" comment="libbluetooth3 is &lt;5.13-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236407" version="1" comment="kernel-default is &lt;3.12.74-60.64.107" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236408" version="1" comment="kernel-default-base is &lt;3.12.74-60.64.107" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236409" version="1" comment="kernel-default-devel is &lt;3.12.74-60.64.107" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236411" version="1" comment="kernel-devel is &lt;3.12.74-60.64.107" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236412" version="1" comment="kernel-macros is &lt;3.12.74-60.64.107" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236413" version="1" comment="kernel-source is &lt;3.12.74-60.64.107" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236414" version="1" comment="kernel-syms is &lt;3.12.74-60.64.107" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236415" version="1" comment="kernel-xen is &lt;3.12.74-60.64.107" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236416" version="1" comment="kernel-xen-base is &lt;3.12.74-60.64.107" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236417" version="1" comment="kernel-xen-devel is &lt;3.12.74-60.64.107" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236418" version="1" comment="kgraft-patch-3_12_74-60_64_107-default is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236419" version="1" comment="kgraft-patch-3_12_74-60_64_107-xen is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236420" version="1" comment="kgraft-patch-SLE12-SP1_Update_32 is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242834" version="1" comment="libgudev-1_0-0 is &lt;210-116.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242835" version="1" comment="libgudev-1_0-0-32bit is &lt;210-116.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242836" version="1" comment="libgudev-1_0-devel is &lt;210-116.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242837" version="1" comment="libudev-devel is &lt;210-116.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242838" version="1" comment="libudev1 is &lt;210-116.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242839" version="1" comment="libudev1-32bit is &lt;210-116.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242840" version="1" comment="systemd is &lt;210-116.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242841" version="1" comment="systemd-32bit is &lt;210-116.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242842" version="1" comment="systemd-bash-completion is &lt;210-116.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242843" version="1" comment="systemd-devel is &lt;210-116.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242844" version="1" comment="systemd-sysvinit is &lt;210-116.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242845" version="1" comment="typelib-1_0-GUdev-1_0 is &lt;210-116.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242846" version="1" comment="udev is &lt;210-116.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246460" version="1" comment="libvirt is &lt;1.2.18.4-22.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246461" version="1" comment="libvirt-client is &lt;1.2.18.4-22.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246462" version="1" comment="libvirt-daemon is &lt;1.2.18.4-22.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246463" version="1" comment="libvirt-daemon-config-network is &lt;1.2.18.4-22.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246464" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.2.18.4-22.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246465" version="1" comment="libvirt-daemon-driver-interface is &lt;1.2.18.4-22.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246466" version="1" comment="libvirt-daemon-driver-libxl is &lt;1.2.18.4-22.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246467" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.2.18.4-22.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246468" version="1" comment="libvirt-daemon-driver-network is &lt;1.2.18.4-22.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246469" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.2.18.4-22.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246470" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.2.18.4-22.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246471" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.2.18.4-22.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246472" version="1" comment="libvirt-daemon-driver-secret is &lt;1.2.18.4-22.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246473" version="1" comment="libvirt-daemon-driver-storage is &lt;1.2.18.4-22.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246474" version="1" comment="libvirt-daemon-lxc is &lt;1.2.18.4-22.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246475" version="1" comment="libvirt-daemon-qemu is &lt;1.2.18.4-22.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246476" version="1" comment="libvirt-daemon-xen is &lt;1.2.18.4-22.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246477" version="1" comment="libvirt-doc is &lt;1.2.18.4-22.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246478" version="1" comment="libvirt-lock-sanlock is &lt;1.2.18.4-22.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246056" version="1" comment="kgraft-patch-3_12_74-60_64_88-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246057" version="1" comment="kgraft-patch-3_12_74-60_64_88-xen is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246058" version="1" comment="kgraft-patch-SLE12-SP1_Update_27 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246059" version="1" comment="kgraft-patch-3_12_74-60_64_99-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246060" version="1" comment="kgraft-patch-3_12_74-60_64_99-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246061" version="1" comment="kgraft-patch-SLE12-SP1_Update_30 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246062" version="1" comment="kgraft-patch-3_12_74-60_64_104-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246063" version="1" comment="kgraft-patch-3_12_74-60_64_104-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246064" version="1" comment="kgraft-patch-SLE12-SP1_Update_31 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246065" version="1" comment="kgraft-patch-3_12_74-60_64_85-default is &lt;12-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246066" version="1" comment="kgraft-patch-3_12_74-60_64_85-xen is &lt;12-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246067" version="1" comment="kgraft-patch-SLE12-SP1_Update_26 is &lt;12-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246068" version="1" comment="kgraft-patch-3_12_74-60_64_96-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246069" version="1" comment="kgraft-patch-3_12_74-60_64_96-xen is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246070" version="1" comment="kgraft-patch-SLE12-SP1_Update_29 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246071" version="1" comment="kgraft-patch-3_12_74-60_64_93-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246072" version="1" comment="kgraft-patch-3_12_74-60_64_93-xen is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246073" version="1" comment="kgraft-patch-SLE12-SP1_Update_28 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246074" version="1" comment="kgraft-patch-3_12_74-60_64_107-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246075" version="1" comment="kgraft-patch-3_12_74-60_64_107-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246076" version="1" comment="kgraft-patch-SLE12-SP1_Update_32 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246723" version="1" comment="xen is &lt;4.5.5_28-22.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246724" version="1" comment="xen-doc-html is &lt;4.5.5_28-22.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246725" version="1" comment="xen-kmp-default is &lt;4.5.5_28_k3.12.74_60.64.107-22.58" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246726" version="1" comment="xen-libs is &lt;4.5.5_28-22.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246727" version="1" comment="xen-libs-32bit is &lt;4.5.5_28-22.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246728" version="1" comment="xen-tools is &lt;4.5.5_28-22.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246729" version="1" comment="xen-tools-domU is &lt;4.5.5_28-22.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247256" version="1" comment="apache2 is &lt;2.4.16-20.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247257" version="1" comment="apache2-doc is &lt;2.4.16-20.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247258" version="1" comment="apache2-example-pages is &lt;2.4.16-20.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247259" version="1" comment="apache2-prefork is &lt;2.4.16-20.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247260" version="1" comment="apache2-utils is &lt;2.4.16-20.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247261" version="1" comment="apache2-worker is &lt;2.4.16-20.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247238" version="1" comment="bash is &lt;4.2-83.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247239" version="1" comment="bash-doc is &lt;4.2-83.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247240" version="1" comment="libreadline6 is &lt;6.2-83.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247241" version="1" comment="libreadline6-32bit is &lt;6.2-83.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247242" version="1" comment="readline-doc is &lt;6.2-83.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247671" version="1" comment="openssh is &lt;6.6p1-54.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247672" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-54.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247673" version="1" comment="openssh-fips is &lt;6.6p1-54.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247674" version="1" comment="openssh-helpers is &lt;6.6p1-54.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242236" version="1" comment="mozilla-nspr-devel is &lt;4.20-19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242237" version="1" comment="mozilla-nss-devel is &lt;3.40.1-58.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194284" version="1" comment="cryptctl is &lt;1.2.6-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258802" version="1" comment="SLES_SAP-release is ==12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194285" version="1" comment="kgraft-patch-4_4_120-92_70-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194286" version="1" comment="kgraft-patch-SLE12-SP2_Update_20 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194287" version="1" comment="kgraft-patch-4_4_90-92_50-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194288" version="1" comment="kgraft-patch-SLE12-SP2_Update_15 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194289" version="1" comment="kgraft-patch-4_4_90-92_45-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194290" version="1" comment="kgraft-patch-SLE12-SP2_Update_14 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194291" version="1" comment="kgraft-patch-4_4_103-92_56-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194292" version="1" comment="kgraft-patch-SLE12-SP2_Update_17 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194293" version="1" comment="kgraft-patch-4_4_103-92_53-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194294" version="1" comment="kgraft-patch-SLE12-SP2_Update_16 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194295" version="1" comment="kgraft-patch-4_4_74-92_32-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194296" version="1" comment="kgraft-patch-SLE12-SP2_Update_11 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194297" version="1" comment="kgraft-patch-4_4_74-92_29-default is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194298" version="1" comment="kgraft-patch-SLE12-SP2_Update_10 is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194299" version="1" comment="kgraft-patch-4_4_74-92_38-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194300" version="1" comment="kgraft-patch-SLE12-SP2_Update_13 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194301" version="1" comment="kgraft-patch-4_4_74-92_35-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194302" version="1" comment="kgraft-patch-SLE12-SP2_Update_12 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194303" version="1" comment="kgraft-patch-4_4_114-92_67-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194304" version="1" comment="kgraft-patch-SLE12-SP2_Update_19 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194305" version="1" comment="kgraft-patch-4_4_114-92_64-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194306" version="1" comment="kgraft-patch-SLE12-SP2_Update_18 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194307" version="1" comment="kgraft-patch-4_4_59-92_20-default is &lt;12-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194308" version="1" comment="kgraft-patch-SLE12-SP2_Update_8 is &lt;12-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194309" version="1" comment="kgraft-patch-4_4_59-92_24-default is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194310" version="1" comment="kgraft-patch-SLE12-SP2_Update_9 is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194311" version="1" comment="kgraft-patch-4_4_121-92_73-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194312" version="1" comment="kgraft-patch-SLE12-SP2_Update_21 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194313" version="1" comment="kgraft-patch-4_4_121-92_80-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194314" version="1" comment="kgraft-patch-SLE12-SP2_Update_22 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230086" version="1" comment="kgraft-patch-4_4_114-92_64-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230087" version="1" comment="kgraft-patch-SLE12-SP2_Update_18 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230088" version="1" comment="kgraft-patch-4_4_114-92_67-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230089" version="1" comment="kgraft-patch-SLE12-SP2_Update_19 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230090" version="1" comment="kgraft-patch-4_4_103-92_53-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230091" version="1" comment="kgraft-patch-SLE12-SP2_Update_16 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230092" version="1" comment="kgraft-patch-4_4_103-92_56-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230093" version="1" comment="kgraft-patch-SLE12-SP2_Update_17 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230094" version="1" comment="kgraft-patch-4_4_90-92_45-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230095" version="1" comment="kgraft-patch-SLE12-SP2_Update_14 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230096" version="1" comment="kgraft-patch-4_4_90-92_50-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230097" version="1" comment="kgraft-patch-SLE12-SP2_Update_15 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230098" version="1" comment="kgraft-patch-4_4_121-92_80-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230099" version="1" comment="kgraft-patch-SLE12-SP2_Update_22 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230100" version="1" comment="kgraft-patch-4_4_120-92_70-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230101" version="1" comment="kgraft-patch-SLE12-SP2_Update_20 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230166" version="1" comment="kgraft-patch-4_4_121-92_73-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230167" version="1" comment="kgraft-patch-SLE12-SP2_Update_21 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230632" version="1" comment="kgraft-patch-4_4_74-92_32-default is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230633" version="1" comment="kgraft-patch-SLE12-SP2_Update_11 is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230870" version="1" comment="kgraft-patch-4_4_74-92_29-default is &lt;12-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230871" version="1" comment="kgraft-patch-SLE12-SP2_Update_10 is &lt;12-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230872" version="1" comment="kgraft-patch-4_4_74-92_38-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230873" version="1" comment="kgraft-patch-SLE12-SP2_Update_13 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230874" version="1" comment="kgraft-patch-4_4_74-92_35-default is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230875" version="1" comment="kgraft-patch-SLE12-SP2_Update_12 is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232516" version="1" comment="kgraft-patch-4_4_120-92_70-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232517" version="1" comment="kgraft-patch-SLE12-SP2_Update_20 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232518" version="1" comment="kgraft-patch-4_4_121-92_73-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232519" version="1" comment="kgraft-patch-SLE12-SP2_Update_21 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232520" version="1" comment="kgraft-patch-4_4_121-92_80-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232521" version="1" comment="kgraft-patch-SLE12-SP2_Update_22 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232522" version="1" comment="kgraft-patch-4_4_121-92_85-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232523" version="1" comment="kgraft-patch-SLE12-SP2_Update_23 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232524" version="1" comment="kgraft-patch-4_4_90-92_50-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232525" version="1" comment="kgraft-patch-SLE12-SP2_Update_15 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232526" version="1" comment="kgraft-patch-4_4_90-92_45-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232527" version="1" comment="kgraft-patch-SLE12-SP2_Update_14 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232528" version="1" comment="kgraft-patch-4_4_74-92_38-default is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232529" version="1" comment="kgraft-patch-SLE12-SP2_Update_13 is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232530" version="1" comment="kgraft-patch-4_4_114-92_67-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232531" version="1" comment="kgraft-patch-SLE12-SP2_Update_19 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232532" version="1" comment="kgraft-patch-4_4_114-92_64-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232533" version="1" comment="kgraft-patch-SLE12-SP2_Update_18 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232706" version="1" comment="kgraft-patch-4_4_103-92_56-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232707" version="1" comment="kgraft-patch-SLE12-SP2_Update_17 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232708" version="1" comment="kgraft-patch-4_4_103-92_53-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232709" version="1" comment="kgraft-patch-SLE12-SP2_Update_16 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234319" version="1" comment="kgraft-patch-4_4_121-92_92-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234320" version="1" comment="kgraft-patch-SLE12-SP2_Update_24 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235255" version="1" comment="kgraft-patch-4_4_121-92_92-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235256" version="1" comment="kgraft-patch-SLE12-SP2_Update_24 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235257" version="1" comment="kgraft-patch-4_4_120-92_70-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235258" version="1" comment="kgraft-patch-SLE12-SP2_Update_20 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235259" version="1" comment="kgraft-patch-4_4_121-92_73-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235260" version="1" comment="kgraft-patch-SLE12-SP2_Update_21 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235261" version="1" comment="kgraft-patch-4_4_121-92_80-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235262" version="1" comment="kgraft-patch-SLE12-SP2_Update_22 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235263" version="1" comment="kgraft-patch-4_4_121-92_85-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235264" version="1" comment="kgraft-patch-SLE12-SP2_Update_23 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235265" version="1" comment="kgraft-patch-4_4_90-92_50-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235266" version="1" comment="kgraft-patch-SLE12-SP2_Update_15 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235267" version="1" comment="kgraft-patch-4_4_90-92_45-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235268" version="1" comment="kgraft-patch-SLE12-SP2_Update_14 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235269" version="1" comment="kgraft-patch-4_4_103-92_56-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235270" version="1" comment="kgraft-patch-SLE12-SP2_Update_17 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235271" version="1" comment="kgraft-patch-4_4_103-92_53-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235272" version="1" comment="kgraft-patch-SLE12-SP2_Update_16 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235273" version="1" comment="kgraft-patch-4_4_74-92_38-default is &lt;12-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235274" version="1" comment="kgraft-patch-SLE12-SP2_Update_13 is &lt;12-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235275" version="1" comment="kgraft-patch-4_4_114-92_67-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235276" version="1" comment="kgraft-patch-SLE12-SP2_Update_19 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235277" version="1" comment="kgraft-patch-4_4_114-92_64-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235278" version="1" comment="kgraft-patch-SLE12-SP2_Update_18 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235800" version="1" comment="qemu-ppc is &lt;2.6.2-41.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237289" version="1" comment="kgraft-patch-4_4_121-92_92-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237290" version="1" comment="kgraft-patch-SLE12-SP2_Update_24 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237291" version="1" comment="kgraft-patch-4_4_121-92_73-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237292" version="1" comment="kgraft-patch-SLE12-SP2_Update_21 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237293" version="1" comment="kgraft-patch-4_4_120-92_70-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237294" version="1" comment="kgraft-patch-SLE12-SP2_Update_20 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237295" version="1" comment="kgraft-patch-4_4_121-92_80-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237296" version="1" comment="kgraft-patch-SLE12-SP2_Update_22 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237297" version="1" comment="kgraft-patch-4_4_121-92_85-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237298" version="1" comment="kgraft-patch-SLE12-SP2_Update_23 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237299" version="1" comment="kgraft-patch-4_4_90-92_45-default is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237300" version="1" comment="kgraft-patch-SLE12-SP2_Update_14 is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237301" version="1" comment="kgraft-patch-4_4_90-92_50-default is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237302" version="1" comment="kgraft-patch-SLE12-SP2_Update_15 is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237303" version="1" comment="kgraft-patch-4_4_103-92_56-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237304" version="1" comment="kgraft-patch-SLE12-SP2_Update_17 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237305" version="1" comment="kgraft-patch-4_4_103-92_53-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237306" version="1" comment="kgraft-patch-SLE12-SP2_Update_16 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237307" version="1" comment="kgraft-patch-4_4_114-92_67-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237308" version="1" comment="kgraft-patch-SLE12-SP2_Update_19 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237309" version="1" comment="kgraft-patch-4_4_114-92_64-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237310" version="1" comment="kgraft-patch-SLE12-SP2_Update_18 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238157" version="1" comment="kgraft-patch-4_4_121-92_95-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238158" version="1" comment="kgraft-patch-SLE12-SP2_Update_25 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239283" version="1" comment="kgraft-patch-4_4_121-92_98-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239284" version="1" comment="kgraft-patch-SLE12-SP2_Update_26 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239285" version="1" comment="kgraft-patch-4_4_114-92_64-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239286" version="1" comment="kgraft-patch-SLE12-SP2_Update_18 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239287" version="1" comment="kgraft-patch-4_4_114-92_67-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239288" version="1" comment="kgraft-patch-SLE12-SP2_Update_19 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239289" version="1" comment="kgraft-patch-4_4_121-92_80-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239290" version="1" comment="kgraft-patch-SLE12-SP2_Update_22 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239291" version="1" comment="kgraft-patch-4_4_121-92_73-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239292" version="1" comment="kgraft-patch-SLE12-SP2_Update_21 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239293" version="1" comment="kgraft-patch-4_4_120-92_70-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239294" version="1" comment="kgraft-patch-SLE12-SP2_Update_20 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239295" version="1" comment="kgraft-patch-4_4_103-92_53-default is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239296" version="1" comment="kgraft-patch-SLE12-SP2_Update_16 is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239297" version="1" comment="kgraft-patch-4_4_103-92_56-default is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239298" version="1" comment="kgraft-patch-SLE12-SP2_Update_17 is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239299" version="1" comment="kgraft-patch-4_4_90-92_50-default is &lt;12-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239300" version="1" comment="kgraft-patch-SLE12-SP2_Update_15 is &lt;12-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239301" version="1" comment="kgraft-patch-4_4_121-92_85-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239302" version="1" comment="kgraft-patch-SLE12-SP2_Update_23 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241762" version="1" comment="kgraft-patch-4_4_120-92_70-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241763" version="1" comment="kgraft-patch-SLE12-SP2_Update_20 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241764" version="1" comment="kgraft-patch-4_4_121-92_73-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241765" version="1" comment="kgraft-patch-SLE12-SP2_Update_21 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241766" version="1" comment="kgraft-patch-4_4_121-92_80-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241767" version="1" comment="kgraft-patch-SLE12-SP2_Update_22 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241768" version="1" comment="kgraft-patch-4_4_103-92_56-default is &lt;12-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241769" version="1" comment="kgraft-patch-SLE12-SP2_Update_17 is &lt;12-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241770" version="1" comment="kgraft-patch-4_4_103-92_53-default is &lt;12-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241771" version="1" comment="kgraft-patch-SLE12-SP2_Update_16 is &lt;12-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241772" version="1" comment="kgraft-patch-4_4_114-92_67-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241773" version="1" comment="kgraft-patch-SLE12-SP2_Update_19 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241774" version="1" comment="kgraft-patch-4_4_114-92_64-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241775" version="1" comment="kgraft-patch-SLE12-SP2_Update_18 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242258" version="1" comment="qemu-ppc is &lt;2.6.2-41.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194315" version="1" comment="kgraft-patch-4_4_59-92_24-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194316" version="1" comment="kgraft-patch-SLE12-SP2_Update_9 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194317" version="1" comment="kgraft-patch-4_4_59-92_17-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194318" version="1" comment="kgraft-patch-SLE12-SP2_Update_7 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194319" version="1" comment="kgraft-patch-4_4_114-92_64-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194320" version="1" comment="kgraft-patch-SLE12-SP2_Update_18 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194321" version="1" comment="kgraft-patch-4_4_74-92_35-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194322" version="1" comment="kgraft-patch-SLE12-SP2_Update_12 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194323" version="1" comment="kgraft-patch-4_4_74-92_29-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194324" version="1" comment="kgraft-patch-SLE12-SP2_Update_10 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194325" version="1" comment="kgraft-patch-4_4_74-92_32-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194326" version="1" comment="kgraft-patch-SLE12-SP2_Update_11 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194327" version="1" comment="kgraft-patch-4_4_103-92_56-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194328" version="1" comment="kgraft-patch-SLE12-SP2_Update_17 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194329" version="1" comment="kgraft-patch-4_4_103-92_53-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194330" version="1" comment="kgraft-patch-SLE12-SP2_Update_16 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194331" version="1" comment="kgraft-patch-4_4_114-92_67-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194332" version="1" comment="kgraft-patch-SLE12-SP2_Update_19 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194333" version="1" comment="kgraft-patch-4_4_90-92_45-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194334" version="1" comment="kgraft-patch-SLE12-SP2_Update_14 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194335" version="1" comment="kgraft-patch-4_4_90-92_50-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194336" version="1" comment="kgraft-patch-SLE12-SP2_Update_15 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194337" version="1" comment="kgraft-patch-4_4_59-92_20-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194338" version="1" comment="kgraft-patch-SLE12-SP2_Update_8 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194339" version="1" comment="kgraft-patch-4_4_74-92_38-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194340" version="1" comment="kgraft-patch-SLE12-SP2_Update_13 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194341" version="1" comment="apache2 is &lt;2.4.23-29.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194342" version="1" comment="apache2-doc is &lt;2.4.23-29.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194343" version="1" comment="apache2-example-pages is &lt;2.4.23-29.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194344" version="1" comment="apache2-prefork is &lt;2.4.23-29.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194345" version="1" comment="apache2-utils is &lt;2.4.23-29.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194346" version="1" comment="apache2-worker is &lt;2.4.23-29.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194347" version="1" comment="kgraft-patch-4_4_120-92_70-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194348" version="1" comment="kgraft-patch-SLE12-SP2_Update_20 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194349" version="1" comment="kgraft-patch-4_4_90-92_50-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194350" version="1" comment="kgraft-patch-SLE12-SP2_Update_15 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194351" version="1" comment="kgraft-patch-4_4_90-92_45-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194352" version="1" comment="kgraft-patch-SLE12-SP2_Update_14 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194353" version="1" comment="kgraft-patch-4_4_103-92_56-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194354" version="1" comment="kgraft-patch-SLE12-SP2_Update_17 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194355" version="1" comment="kgraft-patch-4_4_103-92_53-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194356" version="1" comment="kgraft-patch-SLE12-SP2_Update_16 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194357" version="1" comment="kgraft-patch-4_4_74-92_32-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194358" version="1" comment="kgraft-patch-SLE12-SP2_Update_11 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194359" version="1" comment="kgraft-patch-4_4_74-92_29-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194360" version="1" comment="kgraft-patch-SLE12-SP2_Update_10 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194361" version="1" comment="kgraft-patch-4_4_74-92_38-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194362" version="1" comment="kgraft-patch-SLE12-SP2_Update_13 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194363" version="1" comment="kgraft-patch-4_4_74-92_35-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194364" version="1" comment="kgraft-patch-SLE12-SP2_Update_12 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194365" version="1" comment="kgraft-patch-4_4_114-92_67-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194366" version="1" comment="kgraft-patch-SLE12-SP2_Update_19 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194367" version="1" comment="kgraft-patch-4_4_114-92_64-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194368" version="1" comment="kgraft-patch-SLE12-SP2_Update_18 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194369" version="1" comment="kgraft-patch-4_4_59-92_17-default is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194370" version="1" comment="kgraft-patch-SLE12-SP2_Update_7 is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194371" version="1" comment="kgraft-patch-4_4_59-92_20-default is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194372" version="1" comment="kgraft-patch-SLE12-SP2_Update_8 is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194373" version="1" comment="kgraft-patch-4_4_59-92_24-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194374" version="1" comment="kgraft-patch-SLE12-SP2_Update_9 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194375" version="1" comment="qemu-ppc is &lt;2.6.2-41.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253677" version="1" comment="qemu-ppc is &lt;2.6.2-41.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256097" version="1" comment="kgraft-patch-4_4_121-92_109-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256098" version="1" comment="kgraft-patch-SLE12-SP2_Update_29 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256099" version="1" comment="kgraft-patch-4_4_121-92_85-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256100" version="1" comment="kgraft-patch-SLE12-SP2_Update_23 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257890" version="1" comment="kgraft-patch-4_4_121-92_92-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257891" version="1" comment="kgraft-patch-SLE12-SP2_Update_24 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257892" version="1" comment="kgraft-patch-4_4_121-92_85-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257893" version="1" comment="kgraft-patch-SLE12-SP2_Update_23 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257894" version="1" comment="kgraft-patch-4_4_121-92_95-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257895" version="1" comment="kgraft-patch-SLE12-SP2_Update_25 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257896" version="1" comment="kgraft-patch-4_4_121-92_98-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257897" version="1" comment="kgraft-patch-SLE12-SP2_Update_26 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257898" version="1" comment="kgraft-patch-4_4_121-92_109-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257899" version="1" comment="kgraft-patch-SLE12-SP2_Update_29 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257900" version="1" comment="kgraft-patch-4_4_121-92_104-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257901" version="1" comment="kgraft-patch-SLE12-SP2_Update_28 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257902" version="1" comment="kgraft-patch-4_4_121-92_101-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257903" version="1" comment="kgraft-patch-SLE12-SP2_Update_27 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258984" version="1" comment="kgraft-patch-4_4_121-92_114-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258985" version="1" comment="kgraft-patch-SLE12-SP2_Update_30 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259352" version="1" comment="xrdp is &lt;0.9.0~git.1456906198.f422461-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260458" version="1" comment="kgraft-patch-4_4_121-92_92-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260459" version="1" comment="kgraft-patch-SLE12-SP2_Update_24 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260460" version="1" comment="kgraft-patch-4_4_121-92_95-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260461" version="1" comment="kgraft-patch-SLE12-SP2_Update_25 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260462" version="1" comment="kgraft-patch-4_4_121-92_98-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260463" version="1" comment="kgraft-patch-SLE12-SP2_Update_26 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260464" version="1" comment="kgraft-patch-4_4_121-92_101-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260465" version="1" comment="kgraft-patch-SLE12-SP2_Update_27 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260466" version="1" comment="kgraft-patch-4_4_121-92_104-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260467" version="1" comment="kgraft-patch-SLE12-SP2_Update_28 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260468" version="1" comment="kgraft-patch-4_4_121-92_109-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260469" version="1" comment="kgraft-patch-SLE12-SP2_Update_29 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260470" version="1" comment="kgraft-patch-4_4_121-92_114-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260471" version="1" comment="kgraft-patch-SLE12-SP2_Update_30 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263871" version="1" comment="qemu-ppc is &lt;2.6.2-41.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263060" version="1" comment="kgraft-patch-4_4_121-92_117-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263061" version="1" comment="kgraft-patch-SLE12-SP2_Update_31 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244201" version="1" comment="kgraft-patch-4_4_121-92_80-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244202" version="1" comment="kgraft-patch-SLE12-SP2_Update_22 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244203" version="1" comment="kgraft-patch-4_4_121-92_85-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244204" version="1" comment="kgraft-patch-SLE12-SP2_Update_23 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244205" version="1" comment="kgraft-patch-4_4_120-92_70-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244206" version="1" comment="kgraft-patch-SLE12-SP2_Update_20 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244207" version="1" comment="kgraft-patch-4_4_121-92_73-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244208" version="1" comment="kgraft-patch-SLE12-SP2_Update_21 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244209" version="1" comment="kgraft-patch-4_4_121-92_92-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244210" version="1" comment="kgraft-patch-SLE12-SP2_Update_24 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244211" version="1" comment="kgraft-patch-4_4_114-92_64-default is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244212" version="1" comment="kgraft-patch-SLE12-SP2_Update_18 is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244213" version="1" comment="kgraft-patch-4_4_114-92_67-default is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244214" version="1" comment="kgraft-patch-SLE12-SP2_Update_19 is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244215" version="1" comment="kgraft-patch-4_4_121-92_98-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244216" version="1" comment="kgraft-patch-SLE12-SP2_Update_26 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244217" version="1" comment="kgraft-patch-4_4_121-92_95-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244218" version="1" comment="kgraft-patch-SLE12-SP2_Update_25 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245065" version="1" comment="qemu-ppc is &lt;2.6.2-41.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246155" version="1" comment="kgraft-patch-4_4_121-92_85-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246156" version="1" comment="kgraft-patch-SLE12-SP2_Update_23 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246157" version="1" comment="kgraft-patch-4_4_121-92_73-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246158" version="1" comment="kgraft-patch-SLE12-SP2_Update_21 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246159" version="1" comment="kgraft-patch-4_4_120-92_70-default is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246160" version="1" comment="kgraft-patch-SLE12-SP2_Update_20 is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246161" version="1" comment="kgraft-patch-4_4_121-92_80-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246162" version="1" comment="kgraft-patch-SLE12-SP2_Update_22 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246163" version="1" comment="kgraft-patch-4_4_121-92_98-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246164" version="1" comment="kgraft-patch-SLE12-SP2_Update_26 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246165" version="1" comment="kgraft-patch-4_4_121-92_92-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246166" version="1" comment="kgraft-patch-SLE12-SP2_Update_24 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246234" version="1" comment="kgraft-patch-4_4_121-92_95-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246235" version="1" comment="kgraft-patch-SLE12-SP2_Update_25 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246479" version="1" comment="kgraft-patch-4_4_121-92_101-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246480" version="1" comment="kgraft-patch-SLE12-SP2_Update_27 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251266" version="1" comment="kgraft-patch-4_4_121-92_104-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251267" version="1" comment="kgraft-patch-SLE12-SP2_Update_28 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258803" version="1" comment="SLES_SAP-release is ==12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259353" version="1" comment="kernel-default-base is &lt;4.4.180-94.100" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259359" version="1" comment="kgraft-patch-4_4_180-94_100-default is &lt;1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259360" version="1" comment="kgraft-patch-SLE12-SP3_Update_27 is &lt;1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260472" version="1" comment="kgraft-patch-4_4_140-94_42-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260473" version="1" comment="kgraft-patch-SLE12-SP3_Update_15 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260474" version="1" comment="kgraft-patch-4_4_143-94_47-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260475" version="1" comment="kgraft-patch-SLE12-SP3_Update_16 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260476" version="1" comment="kgraft-patch-4_4_155-94_50-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260477" version="1" comment="kgraft-patch-SLE12-SP3_Update_17 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260478" version="1" comment="kgraft-patch-4_4_156-94_57-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260479" version="1" comment="kgraft-patch-SLE12-SP3_Update_18 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260480" version="1" comment="kgraft-patch-4_4_156-94_61-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260481" version="1" comment="kgraft-patch-SLE12-SP3_Update_19 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260482" version="1" comment="kgraft-patch-4_4_156-94_64-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260483" version="1" comment="kgraft-patch-SLE12-SP3_Update_20 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260484" version="1" comment="kgraft-patch-4_4_162-94_69-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260485" version="1" comment="kgraft-patch-SLE12-SP3_Update_21 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260486" version="1" comment="kgraft-patch-4_4_162-94_72-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260487" version="1" comment="kgraft-patch-SLE12-SP3_Update_22 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260488" version="1" comment="kgraft-patch-4_4_175-94_79-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260489" version="1" comment="kgraft-patch-SLE12-SP3_Update_23 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260490" version="1" comment="kgraft-patch-4_4_176-94_88-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260491" version="1" comment="kgraft-patch-SLE12-SP3_Update_24 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260492" version="1" comment="kgraft-patch-4_4_178-94_91-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260493" version="1" comment="kgraft-patch-SLE12-SP3_Update_25 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260494" version="1" comment="kgraft-patch-4_4_180-94_97-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260495" version="1" comment="kgraft-patch-SLE12-SP3_Update_26 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260643" version="1" comment="perl-solv is &lt;0.6.36-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263062" version="1" comment="libvirt is &lt;3.3.0-5.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263063" version="1" comment="libvirt-admin is &lt;3.3.0-5.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263064" version="1" comment="libvirt-client is &lt;3.3.0-5.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263065" version="1" comment="libvirt-daemon is &lt;3.3.0-5.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263066" version="1" comment="libvirt-daemon-config-network is &lt;3.3.0-5.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263067" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.3.0-5.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263068" version="1" comment="libvirt-daemon-driver-interface is &lt;3.3.0-5.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263069" version="1" comment="libvirt-daemon-driver-libxl is &lt;3.3.0-5.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263070" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.3.0-5.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263071" version="1" comment="libvirt-daemon-driver-network is &lt;3.3.0-5.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263072" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.3.0-5.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263073" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.3.0-5.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263074" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.3.0-5.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263075" version="1" comment="libvirt-daemon-driver-secret is &lt;3.3.0-5.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263076" version="1" comment="libvirt-daemon-driver-storage is &lt;3.3.0-5.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263077" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.3.0-5.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263078" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.3.0-5.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263079" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.3.0-5.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263080" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.3.0-5.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263081" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.3.0-5.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263082" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;3.3.0-5.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263083" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.3.0-5.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263084" version="1" comment="libvirt-daemon-hooks is &lt;3.3.0-5.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263085" version="1" comment="libvirt-daemon-lxc is &lt;3.3.0-5.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263086" version="1" comment="libvirt-daemon-qemu is &lt;3.3.0-5.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263087" version="1" comment="libvirt-daemon-xen is &lt;3.3.0-5.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263088" version="1" comment="libvirt-doc is &lt;3.3.0-5.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263089" version="1" comment="libvirt-libs is &lt;3.3.0-5.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263090" version="1" comment="libvirt-lock-sanlock is &lt;3.3.0-5.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263091" version="1" comment="libvirt-nss is &lt;3.3.0-5.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263333" version="1" comment="kernel-default-base is &lt;4.4.180-94.103" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263334" version="1" comment="kernel-default-devel is &lt;4.4.180-94.103" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263335" version="1" comment="kernel-devel is &lt;4.4.180-94.103" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263336" version="1" comment="kernel-macros is &lt;4.4.180-94.103" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263337" version="1" comment="kernel-source is &lt;4.4.180-94.103" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263338" version="1" comment="kernel-syms is &lt;4.4.180-94.103" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263339" version="1" comment="kgraft-patch-4_4_180-94_103-default is &lt;1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263340" version="1" comment="kgraft-patch-SLE12-SP3_Update_28 is &lt;1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258804" version="1" comment="SLES_SAP-release is ==12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194376" version="1" comment="libgnutls-devel is &lt;3.2.15-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194377" version="1" comment="libgnutls-openssl-devel is &lt;3.2.15-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194378" version="1" comment="libgnutlsxx-devel is &lt;3.2.15-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194379" version="1" comment="libgnutlsxx28 is &lt;3.2.15-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194380" version="1" comment="dbus-1-devel is &lt;1.8.12-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194381" version="1" comment="dbus-1-devel-doc is &lt;1.8.12-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194382" version="1" comment="libssh-devel is &lt;0.6.3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194383" version="1" comment="libssh-devel-doc is &lt;0.6.3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194384" version="1" comment="python-magic is &lt;5.19-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194385" version="1" comment="php5-devel is &lt;5.5.14-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194386" version="1" comment="MozillaFirefox-devel is &lt;31.3.0esr-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194387" version="1" comment="mozilla-nss-devel is &lt;3.17.2-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194388" version="1" comment="libopenssl-devel is &lt;1.0.1i-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194389" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr2.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194390" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr2.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194391" version="1" comment="file-devel is &lt;5.19-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194392" version="1" comment="python-magic is &lt;5.19-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194393" version="1" comment="xen-devel is &lt;4.4.3_06-22.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194394" version="1" comment="MozillaFirefox-devel is &lt;38.5.0esr-54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194395" version="1" comment="bind-devel is &lt;9.9.6P1-28.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194396" version="1" comment="xorg-x11-server-sdk is &lt;7.6_1.15.2-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194397" version="1" comment="xfsprogs-devel is &lt;3.2.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194398" version="1" comment="MozillaFirefox-devel is &lt;31.5.0esr-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194399" version="1" comment="php5-devel is &lt;5.5.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194400" version="1" comment="freetype2-devel is &lt;2.5.3-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194401" version="1" comment="cups-devel is &lt;1.7.5-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194402" version="1" comment="postgresql93-devel is &lt;9.3.6-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194403" version="1" comment="osc is &lt;0.151.0-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194404" version="1" comment="glibc-devel-static is &lt;2.19-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194405" version="1" comment="kernel-docs is &lt;3.12.38-44" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194406" version="1" comment="kernel-obs-build is &lt;3.12.38-44" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194407" version="1" comment="libopenssl-devel is &lt;1.0.1i-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194408" version="1" comment="xen-devel is &lt;4.4.1_10-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194409" version="1" comment="MozillaFirefox-devel is &lt;31.5.3esr-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194410" version="1" comment="wireshark-devel is &lt;1.10.13-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194411" version="1" comment="kernel-docs is &lt;3.12.39-47" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194412" version="1" comment="kernel-obs-build is &lt;3.12.39-47" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194413" version="1" comment="libzip-devel is &lt;0.11.1-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194414" version="1" comment="xen-devel is &lt;4.4.2_02-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194415" version="1" comment="MozillaFirefox-devel is &lt;31.6.0esr-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194416" version="1" comment="libgnutls-devel is &lt;3.2.15-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194417" version="1" comment="libgnutls-openssl-devel is &lt;3.2.15-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194418" version="1" comment="libgnutlsxx-devel is &lt;3.2.15-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194419" version="1" comment="libgnutlsxx28 is &lt;3.2.15-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194420" version="1" comment="libmysqlclient-devel is &lt;10.0.16-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194421" version="1" comment="libmysqld-devel is &lt;10.0.16-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194422" version="1" comment="libmysqld18 is &lt;10.0.16-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194423" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.8.10-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194424" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.8.10-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194425" version="1" comment="subversion is &lt;1.8.10-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194426" version="1" comment="subversion-bash-completion is &lt;1.8.10-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194427" version="1" comment="subversion-devel is &lt;1.8.10-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194428" version="1" comment="subversion-perl is &lt;1.8.10-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194429" version="1" comment="subversion-python is &lt;1.8.10-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194430" version="1" comment="subversion-server is &lt;1.8.10-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194431" version="1" comment="subversion-tools is &lt;1.8.10-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194432" version="1" comment="gdm-devel is &lt;3.10.0.1-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194433" version="1" comment="xorg-x11-server-sdk is &lt;7.6_1.15.2-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194434" version="1" comment="php5-devel is &lt;5.5.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194435" version="1" comment="libspice-server-devel is &lt;0.12.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194436" version="1" comment="xen-devel is &lt;4.4.2_04-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194437" version="1" comment="kernel-docs is &lt;3.12.32-33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194438" version="1" comment="kernel-obs-build is &lt;3.12.32-33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194439" version="1" comment="fltk-devel is &lt;1.3.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194440" version="1" comment="fltk-devel-static is &lt;1.3.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194441" version="1" comment="MozillaFirefox-devel is &lt;31.7.0esr-34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194442" version="1" comment="apache2 is &lt;2.4.10-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194443" version="1" comment="apache2-devel is &lt;2.4.10-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194444" version="1" comment="MozillaFirefox-devel is &lt;31.4.0esr-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194445" version="1" comment="mozilla-nss-devel is &lt;3.17.3-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194446" version="1" comment="xen-devel is &lt;4.4.2_06-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194447" version="1" comment="wireshark-devel is &lt;1.10.14-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194448" version="1" comment="kernel-docs is &lt;3.12.43-52.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194449" version="1" comment="kernel-obs-build is &lt;3.12.43-52.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194450" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.0-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194451" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr3.0-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194452" version="1" comment="openldap2-back-perl is &lt;2.4.39-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194453" version="1" comment="openldap2-devel is &lt;2.4.39-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194454" version="1" comment="openldap2-devel-static is &lt;2.4.39-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194455" version="1" comment="xorg-x11-server-sdk is &lt;7.6_1.15.2-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194456" version="1" comment="libopenssl-devel is &lt;1.0.1i-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194457" version="1" comment="libcurl-devel is &lt;7.37.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194458" version="1" comment="libgcrypt-devel is &lt;1.6.1-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194459" version="1" comment="bind-devel is &lt;9.9.6P1-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194460" version="1" comment="php5-devel is &lt;5.5.14-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194461" version="1" comment="postgresql93-devel is &lt;9.3.8-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194462" version="1" comment="MozillaFirefox-devel is &lt;31.8.0esr-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194463" version="1" comment="mozilla-nspr-devel is &lt;4.10.8-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194464" version="1" comment="mozilla-nss-devel is &lt;3.19.2_CKBI_1.98-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194465" version="1" comment="libmysqlclient-devel is &lt;10.0.20-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194466" version="1" comment="libmysqld-devel is &lt;10.0.20-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194467" version="1" comment="libmysqld18 is &lt;10.0.20-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194468" version="1" comment="krb5 is &lt;1.12.1-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194469" version="1" comment="krb5-devel is &lt;1.12.1-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194470" version="1" comment="xen-devel is &lt;4.4.2_08-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194471" version="1" comment="bind-devel is &lt;9.9.6P1-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194472" version="1" comment="kernel-docs is &lt;3.12.44-52.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194473" version="1" comment="kernel-obs-build is &lt;3.12.44-52.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194474" version="1" comment="bind-devel is &lt;9.9.5P1-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194475" version="1" comment="git is &lt;1.8.5.6-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194476" version="1" comment="git-arch is &lt;1.8.5.6-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194477" version="1" comment="git-core is &lt;1.8.5.6-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194478" version="1" comment="git-cvs is &lt;1.8.5.6-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194479" version="1" comment="git-daemon is &lt;1.8.5.6-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194480" version="1" comment="git-email is &lt;1.8.5.6-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194481" version="1" comment="git-gui is &lt;1.8.5.6-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194482" version="1" comment="git-svn is &lt;1.8.5.6-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194483" version="1" comment="git-web is &lt;1.8.5.6-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194484" version="1" comment="gitk is &lt;1.8.5.6-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194485" version="1" comment="evolution-data-server-devel is &lt;3.10.4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194486" version="1" comment="typelib-1_0-EBook-1_2 is &lt;3.10.4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194487" version="1" comment="typelib-1_0-EBookContacts-1_2 is &lt;3.10.4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194488" version="1" comment="typelib-1_0-EDataServer-1_2 is &lt;3.10.4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194489" version="1" comment="MozillaFirefox-devel is &lt;31.8.0esr-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194490" version="1" comment="xen-devel is &lt;4.4.2_10-22.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194491" version="1" comment="libQt5Bootstrap-devel-static is &lt;5.3.1-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194492" version="1" comment="libQt5Concurrent-devel is &lt;5.3.1-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194493" version="1" comment="libQt5Concurrent5 is &lt;5.3.1-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194494" version="1" comment="libQt5Core-devel is &lt;5.3.1-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194495" version="1" comment="libQt5Core-private-headers-devel is &lt;5.3.1-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194496" version="1" comment="libQt5DBus-devel is &lt;5.3.1-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194497" version="1" comment="libQt5DBus-private-headers-devel is &lt;5.3.1-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194498" version="1" comment="libQt5Gui-devel is &lt;5.3.1-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194499" version="1" comment="libQt5Gui-private-headers-devel is &lt;5.3.1-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194500" version="1" comment="libQt5Network-devel is &lt;5.3.1-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194501" version="1" comment="libQt5Network-private-headers-devel is &lt;5.3.1-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194502" version="1" comment="libQt5Network5 is &lt;5.3.1-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194503" version="1" comment="libQt5OpenGL-devel is &lt;5.3.1-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194504" version="1" comment="libQt5OpenGL-private-headers-devel is &lt;5.3.1-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194505" version="1" comment="libQt5OpenGL5 is &lt;5.3.1-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194506" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.3.1-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194507" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.3.1-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194508" version="1" comment="libQt5PlatformSupport-private-headers-devel is &lt;5.3.1-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194509" version="1" comment="libQt5PrintSupport-devel is &lt;5.3.1-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194510" version="1" comment="libQt5PrintSupport-private-headers-devel is &lt;5.3.1-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194511" version="1" comment="libQt5PrintSupport5 is &lt;5.3.1-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194512" version="1" comment="libQt5Sql-devel is &lt;5.3.1-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194513" version="1" comment="libQt5Sql-private-headers-devel is &lt;5.3.1-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194514" version="1" comment="libQt5Sql5 is &lt;5.3.1-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194515" version="1" comment="libQt5Sql5-mysql is &lt;5.3.1-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194516" version="1" comment="libQt5Sql5-postgresql is &lt;5.3.1-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194517" version="1" comment="libQt5Sql5-sqlite is &lt;5.3.1-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194518" version="1" comment="libQt5Sql5-unixODBC is &lt;5.3.1-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194519" version="1" comment="libQt5Test-devel is &lt;5.3.1-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194520" version="1" comment="libQt5Test-private-headers-devel is &lt;5.3.1-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194521" version="1" comment="libQt5Test5 is &lt;5.3.1-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194522" version="1" comment="libQt5Widgets-devel is &lt;5.3.1-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194523" version="1" comment="libQt5Widgets-private-headers-devel is &lt;5.3.1-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194524" version="1" comment="libQt5Xml-devel is &lt;5.3.1-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194525" version="1" comment="libQt5Xml5 is &lt;5.3.1-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194526" version="1" comment="libqt5-qtbase-common-devel is &lt;5.3.1-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194527" version="1" comment="libqt5-qtbase-devel is &lt;5.3.1-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194528" version="1" comment="libqt5-qtbase-doc is &lt;5.3.1-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194529" version="1" comment="libqt5-qtbase-private-headers-devel is &lt;5.3.1-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194530" version="1" comment="libyaml-devel is &lt;0.1.6-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194531" version="1" comment="libopenssl-devel is &lt;1.0.1i-27.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194532" version="1" comment="php5-devel is &lt;5.5.14-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194533" version="1" comment="binutils-devel is &lt;2.24-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194534" version="1" comment="binutils-gold is &lt;2.24-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194535" version="1" comment="cross-ppc-binutils is &lt;2.24-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194536" version="1" comment="cross-spu-binutils is &lt;2.24-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194537" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.8.10-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194538" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.8.10-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194539" version="1" comment="subversion is &lt;1.8.10-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194540" version="1" comment="subversion-bash-completion is &lt;1.8.10-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194541" version="1" comment="subversion-devel is &lt;1.8.10-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194542" version="1" comment="subversion-perl is &lt;1.8.10-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194543" version="1" comment="subversion-python is &lt;1.8.10-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194544" version="1" comment="subversion-server is &lt;1.8.10-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194545" version="1" comment="subversion-tools is &lt;1.8.10-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194546" version="1" comment="MozillaFirefox-devel is &lt;38.2.1esr-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194547" version="1" comment="mozilla-nss-devel is &lt;3.19.2.0-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194548" version="1" comment="bind-devel is &lt;9.9.6P1-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194549" version="1" comment="kernel-docs is &lt;3.12.36-38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194550" version="1" comment="kernel-obs-build is &lt;3.12.36-38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194551" version="1" comment="libjasper-devel is &lt;1.900.1-166" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194552" version="1" comment="libopenssl-devel is &lt;1.0.1i-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194553" version="1" comment="libnetfilter_cthelper-devel is &lt;1.0.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194554" version="1" comment="libnetfilter_cttimeout-devel is &lt;1.0.0-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194555" version="1" comment="net-snmp-devel is &lt;5.7.2.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194556" version="1" comment="kernel-docs is &lt;3.12.44-52.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194557" version="1" comment="kernel-obs-build is &lt;3.12.44-52.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194558" version="1" comment="libvirt-devel is &lt;1.2.5-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194559" version="1" comment="php5-devel is &lt;5.5.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194560" version="1" comment="MozillaFirefox-devel is &lt;38.3.0esr-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194561" version="1" comment="mozilla-nspr-devel is &lt;4.10.9-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194562" version="1" comment="kernel-docs is &lt;3.12.48-52.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194563" version="1" comment="kernel-obs-build is &lt;3.12.48-52.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194564" version="1" comment="libblkid-devel is &lt;2.25-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194565" version="1" comment="libmount-devel is &lt;2.25-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194566" version="1" comment="libsmartcols-devel is &lt;2.25-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194567" version="1" comment="libspice-server-devel is &lt;0.12.4-8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194568" version="1" comment="krb5-devel is &lt;1.12.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194569" version="1" comment="postgresql93-devel is &lt;9.3.10-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194570" version="1" comment="libffi48 is &lt;4.8.5-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194571" version="1" comment="glibc-devel-static is &lt;2.19-22.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194572" version="1" comment="apache2 is &lt;2.4.10-14.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194573" version="1" comment="apache2-devel is &lt;2.4.10-14.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194574" version="1" comment="xen-devel is &lt;4.4.3_02-22.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194575" version="1" comment="graphite2-devel is &lt;1.3.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194576" version="1" comment="hyphen-devel is &lt;2.8.8-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194577" version="1" comment="libabw-devel is &lt;0.1.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194578" version="1" comment="libabw-devel-doc is &lt;0.1.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194579" version="1" comment="libcdr-devel is &lt;0.1.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194580" version="1" comment="libcdr-devel-doc is &lt;0.1.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194581" version="1" comment="libcmis-c-0_5-5 is &lt;0.5.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194582" version="1" comment="libcmis-c-devel is &lt;0.5.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194583" version="1" comment="libcmis-devel is &lt;0.5.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194584" version="1" comment="libe-book-devel is &lt;0.1.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194585" version="1" comment="libe-book-devel-doc is &lt;0.1.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194586" version="1" comment="libetonyek-devel is &lt;0.1.3-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194587" version="1" comment="libetonyek-devel-doc is &lt;0.1.3-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194588" version="1" comment="libfreehand-devel is &lt;0.1.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194589" version="1" comment="libfreehand-devel-doc is &lt;0.1.1-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194590" version="1" comment="libixion-devel is &lt;0.9.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194591" version="1" comment="liblangtag-devel is &lt;0.5.7-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194592" version="1" comment="libmspub-devel is &lt;0.1.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194593" version="1" comment="libmspub-devel-doc is &lt;0.1.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194594" version="1" comment="libmwaw-devel is &lt;0.3.6-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194595" version="1" comment="libmwaw-devel-doc is &lt;0.3.6-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194596" version="1" comment="libodfgen-devel is &lt;0.1.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194597" version="1" comment="libodfgen-devel-doc is &lt;0.1.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194598" version="1" comment="liborcus-devel is &lt;0.7.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194599" version="1" comment="libvisio-devel is &lt;0.1.3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194600" version="1" comment="libvisio-devel-doc is &lt;0.1.3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194601" version="1" comment="libvoikko-devel is &lt;3.7.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194602" version="1" comment="libwps-devel is &lt;0.4.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194603" version="1" comment="xen-devel is &lt;4.4.1_08-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194604" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr2.10-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194605" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr2.10-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194606" version="1" comment="wireshark-devel is &lt;1.10.12-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194607" version="1" comment="hivex is &lt;1.3.10-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194608" version="1" comment="libpng12-compat-devel is &lt;1.2.50-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194609" version="1" comment="libpng12-devel is &lt;1.2.50-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194610" version="1" comment="libpng16-compat-devel is &lt;1.6.8-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194611" version="1" comment="libpng16-devel is &lt;1.6.8-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194612" version="1" comment="git is &lt;1.8.5.6-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194613" version="1" comment="git-arch is &lt;1.8.5.6-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194614" version="1" comment="git-core is &lt;1.8.5.6-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194615" version="1" comment="git-cvs is &lt;1.8.5.6-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194616" version="1" comment="git-daemon is &lt;1.8.5.6-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194617" version="1" comment="git-email is &lt;1.8.5.6-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194618" version="1" comment="git-gui is &lt;1.8.5.6-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194619" version="1" comment="git-svn is &lt;1.8.5.6-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194620" version="1" comment="git-web is &lt;1.8.5.6-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194621" version="1" comment="gitk is &lt;1.8.5.6-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194622" version="1" comment="libksba-devel is &lt;1.3.0-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194623" version="1" comment="libdcerpc-atsvc-devel is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194624" version="1" comment="libdcerpc-atsvc0 is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194625" version="1" comment="libdcerpc-devel is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194626" version="1" comment="libdcerpc-samr-devel is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194627" version="1" comment="libdcerpc-samr0 is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194628" version="1" comment="libgensec-devel is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194629" version="1" comment="libndr-devel is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194630" version="1" comment="libndr-krb5pac-devel is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194631" version="1" comment="libndr-nbt-devel is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194632" version="1" comment="libndr-standard-devel is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194633" version="1" comment="libnetapi-devel is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194634" version="1" comment="libpdb-devel is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194635" version="1" comment="libregistry-devel is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194636" version="1" comment="libsamba-credentials-devel is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194637" version="1" comment="libsamba-hostconfig-devel is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194638" version="1" comment="libsamba-policy-devel is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194639" version="1" comment="libsamba-policy0 is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194640" version="1" comment="libsamba-util-devel is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194641" version="1" comment="libsamdb-devel is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194642" version="1" comment="libsmbclient-devel is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194643" version="1" comment="libsmbclient-raw-devel is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194644" version="1" comment="libsmbconf-devel is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194645" version="1" comment="libsmbldap-devel is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194646" version="1" comment="libsmbsharemodes-devel is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194647" version="1" comment="libsmbsharemodes0 is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194648" version="1" comment="libtevent-util-devel is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194649" version="1" comment="libwbclient-devel is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194650" version="1" comment="samba-core-devel is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194651" version="1" comment="samba-test-devel is &lt;4.1.12-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194652" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.20-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194653" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr3.20-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194654" version="1" comment="php5-devel is &lt;5.5.14-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194655" version="1" comment="kernel-docs is &lt;3.12.51-52.31" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194656" version="1" comment="kernel-obs-build is &lt;3.12.51-52.31" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194657" version="1" comment="gdk-pixbuf-devel is &lt;2.30.6-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194658" version="1" comment="libmspack-devel is &lt;0.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194659" version="1" comment="libopenssl-devel is &lt;1.0.1i-27.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194660" version="1" comment="krb5-devel is &lt;1.12.1-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194661" version="1" comment="libdcerpc-atsvc-devel is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194662" version="1" comment="libdcerpc-atsvc0 is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194663" version="1" comment="libdcerpc-devel is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194664" version="1" comment="libdcerpc-samr-devel is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194665" version="1" comment="libdcerpc-samr0 is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194666" version="1" comment="libgensec-devel is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194667" version="1" comment="libldb-devel is &lt;1.1.24-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194668" version="1" comment="libndr-devel is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194669" version="1" comment="libndr-krb5pac-devel is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194670" version="1" comment="libndr-nbt-devel is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194671" version="1" comment="libndr-standard-devel is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194672" version="1" comment="libnetapi-devel is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194673" version="1" comment="libpdb-devel is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194674" version="1" comment="libregistry-devel is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194675" version="1" comment="libsamba-credentials-devel is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194676" version="1" comment="libsamba-hostconfig-devel is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194677" version="1" comment="libsamba-policy-devel is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194678" version="1" comment="libsamba-policy0 is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194679" version="1" comment="libsamba-util-devel is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194680" version="1" comment="libsamdb-devel is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194681" version="1" comment="libsmbclient-devel is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194682" version="1" comment="libsmbclient-raw-devel is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194683" version="1" comment="libsmbconf-devel is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194684" version="1" comment="libsmbldap-devel is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194685" version="1" comment="libsmbsharemodes-devel is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194686" version="1" comment="libsmbsharemodes0 is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194687" version="1" comment="libtalloc-devel is &lt;2.1.5-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194688" version="1" comment="libtdb-devel is &lt;1.3.8-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194689" version="1" comment="libtevent-devel is &lt;0.9.26-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194690" version="1" comment="libtevent-util-devel is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194691" version="1" comment="libwbclient-devel is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194692" version="1" comment="pyldb is &lt;1.1.24-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194693" version="1" comment="pyldb-devel is &lt;1.1.24-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194694" version="1" comment="pytalloc-devel is &lt;2.1.5-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194695" version="1" comment="samba-core-devel is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194696" version="1" comment="samba-test-devel is &lt;4.1.12-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194697" version="1" comment="kernel-docs is &lt;3.12.60-52.49" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194698" version="1" comment="kernel-obs-build is &lt;3.12.60-52.49" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194699" version="1" comment="dhcp-devel is &lt;4.2.6-14.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194700" version="1" comment="MozillaFirefox-devel is &lt;45.2.0esr-75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194701" version="1" comment="kernel-docs is &lt;3.12.60-52.54" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194702" version="1" comment="kernel-obs-build is &lt;3.12.60-52.54" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194703" version="1" comment="glibc-devel-static is &lt;2.19-22.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194704" version="1" comment="boost-devel is &lt;1.54.0-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194705" version="1" comment="hunspell-devel is &lt;1.3.2-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194706" version="1" comment="hunspell-devel-32bit is &lt;1.3.2-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194707" version="1" comment="hyphen-devel is &lt;2.8.8-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194708" version="1" comment="libboost_chrono1_54_0 is &lt;1.54.0-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194709" version="1" comment="libboost_graph1_54_0 is &lt;1.54.0-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194710" version="1" comment="libboost_graph_parallel1_54_0 is &lt;1.54.0-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194711" version="1" comment="libboost_locale1_54_0 is &lt;1.54.0-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194712" version="1" comment="libboost_log1_54_0 is &lt;1.54.0-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194713" version="1" comment="libboost_math1_54_0 is &lt;1.54.0-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194714" version="1" comment="libboost_mpi1_54_0 is &lt;1.54.0-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194715" version="1" comment="libboost_python1_54_0 is &lt;1.54.0-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194716" version="1" comment="libboost_random1_54_0 is &lt;1.54.0-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194717" version="1" comment="libboost_serialization1_54_0 is &lt;1.54.0-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194718" version="1" comment="libboost_test1_54_0 is &lt;1.54.0-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194719" version="1" comment="libboost_timer1_54_0 is &lt;1.54.0-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194720" version="1" comment="libboost_wave1_54_0 is &lt;1.54.0-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194721" version="1" comment="libcmis-c-0_5-5 is &lt;0.5.1-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194722" version="1" comment="libcmis-c-devel is &lt;0.5.1-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194723" version="1" comment="libcmis-devel is &lt;0.5.1-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194724" version="1" comment="libetonyek-devel is &lt;0.1.6-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194725" version="1" comment="libetonyek-devel-doc is &lt;0.1.6-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194726" version="1" comment="libhyphen0-32bit is &lt;2.8.8-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194727" version="1" comment="libixion-devel is &lt;0.11.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194728" version="1" comment="liborcus-devel is &lt;0.11.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194729" version="1" comment="libvisio-devel is &lt;0.1.5-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194730" version="1" comment="libvisio-devel-doc is &lt;0.1.5-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194731" version="1" comment="libwps-devel is &lt;0.4.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194732" version="1" comment="libtiff-devel is &lt;4.0.6-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194733" version="1" comment="kernel-docs is &lt;3.12.51-52.34" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194734" version="1" comment="kernel-obs-build is &lt;3.12.51-52.34" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194735" version="1" comment="libxml2-devel is &lt;2.9.1-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194736" version="1" comment="bind-devel is &lt;9.9.6P1-28.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194737" version="1" comment="giflib-devel is &lt;5.0.5-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194738" version="1" comment="kernel-docs is &lt;3.12.51-52.39" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194739" version="1" comment="kernel-obs-build is &lt;3.12.51-52.39" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194740" version="1" comment="openldap2-back-perl is &lt;2.4.41-18.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194741" version="1" comment="openldap2-devel is &lt;2.4.41-18.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194742" version="1" comment="openldap2-devel-static is &lt;2.4.41-18.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194743" version="1" comment="gdk-pixbuf-devel is &lt;2.30.6-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194744" version="1" comment="php5-devel is &lt;5.5.14-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194745" version="1" comment="libvirt-devel is &lt;1.2.5-27.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194746" version="1" comment="MozillaFirefox-devel is &lt;38.6.0esr-57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194747" version="1" comment="mozilla-nss-devel is &lt;3.20.2-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194748" version="1" comment="libcurl-devel is &lt;7.37.0-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194749" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.30-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194750" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr3.30-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194751" version="1" comment="krb5-devel is &lt;1.12.1-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194752" version="1" comment="glibc-devel-static is &lt;2.19-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194753" version="1" comment="postgresql93-devel is &lt;9.3.11-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194754" version="1" comment="postgresql93-libs is &lt;9.3.11-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194755" version="1" comment="dhcp-devel is &lt;4.2.6-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194756" version="1" comment="postgresql94-devel is &lt;9.4.6-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194757" version="1" comment="MozillaFirefox-devel is &lt;38.6.1esr-60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194758" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.8.10-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194759" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.8.10-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194760" version="1" comment="subversion is &lt;1.8.10-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194761" version="1" comment="subversion-bash-completion is &lt;1.8.10-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194762" version="1" comment="subversion-devel is &lt;1.8.10-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194763" version="1" comment="subversion-perl is &lt;1.8.10-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194764" version="1" comment="subversion-python is &lt;1.8.10-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194765" version="1" comment="subversion-server is &lt;1.8.10-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194766" version="1" comment="subversion-tools is &lt;1.8.10-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194767" version="1" comment="libopenssl-devel is &lt;1.0.1i-27.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194768" version="1" comment="libxml2-devel is &lt;2.9.1-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194769" version="1" comment="libssh2-devel is &lt;1.4.3-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194770" version="1" comment="MozillaFirefox-devel is &lt;38.7.0esr-63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194771" version="1" comment="mozilla-nspr-devel is &lt;4.12-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194772" version="1" comment="mozilla-nss-devel is &lt;3.20.2-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194773" version="1" comment="bind-devel is &lt;9.9.6P1-28.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194774" version="1" comment="kernel-docs is &lt;3.12.55-52.42" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194775" version="1" comment="kernel-obs-build is &lt;3.12.55-52.42" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194776" version="1" comment="libdcerpc-atsvc-devel is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194777" version="1" comment="libdcerpc-atsvc0 is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194778" version="1" comment="libdcerpc-devel is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194779" version="1" comment="libdcerpc-samr-devel is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194780" version="1" comment="libdcerpc-samr0 is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194781" version="1" comment="libgensec-devel is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194782" version="1" comment="libndr-devel is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194783" version="1" comment="libndr-krb5pac-devel is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194784" version="1" comment="libndr-nbt-devel is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194785" version="1" comment="libndr-standard-devel is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194786" version="1" comment="libnetapi-devel is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194787" version="1" comment="libpdb-devel is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194788" version="1" comment="libregistry-devel is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194789" version="1" comment="libsamba-credentials-devel is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194790" version="1" comment="libsamba-hostconfig-devel is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194791" version="1" comment="libsamba-policy-devel is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194792" version="1" comment="libsamba-policy0 is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194793" version="1" comment="libsamba-util-devel is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194794" version="1" comment="libsamdb-devel is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194795" version="1" comment="libsmbclient-devel is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194796" version="1" comment="libsmbclient-raw-devel is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194797" version="1" comment="libsmbconf-devel is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194798" version="1" comment="libsmbldap-devel is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194799" version="1" comment="libsmbsharemodes-devel is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194800" version="1" comment="libsmbsharemodes0 is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194801" version="1" comment="libtevent-util-devel is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194802" version="1" comment="libwbclient-devel is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194803" version="1" comment="samba-core-devel is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194804" version="1" comment="samba-test-devel is &lt;4.1.12-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194805" version="1" comment="quagga is &lt;0.99.22.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194806" version="1" comment="quagga-devel is &lt;0.99.22.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194807" version="1" comment="quagga is &lt;0.99.22.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194808" version="1" comment="quagga-devel is &lt;0.99.22.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194809" version="1" comment="krb5-devel is &lt;1.12.1-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194810" version="1" comment="mercurial is &lt;2.8.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194811" version="1" comment="ctdb-devel is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194812" version="1" comment="libdcerpc-atsvc-devel is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194813" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194814" version="1" comment="libdcerpc-devel is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194815" version="1" comment="libdcerpc-samr-devel is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194816" version="1" comment="libdcerpc-samr0 is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194817" version="1" comment="libgensec-devel is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194818" version="1" comment="libndr-devel is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194819" version="1" comment="libndr-krb5pac-devel is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194820" version="1" comment="libndr-nbt-devel is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194821" version="1" comment="libndr-standard-devel is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194822" version="1" comment="libnetapi-devel is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194823" version="1" comment="libregistry-devel is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194824" version="1" comment="libsamba-credentials-devel is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194825" version="1" comment="libsamba-hostconfig-devel is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194826" version="1" comment="libsamba-passdb-devel is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194827" version="1" comment="libsamba-policy-devel is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194828" version="1" comment="libsamba-policy0 is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194829" version="1" comment="libsamba-util-devel is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194830" version="1" comment="libsamdb-devel is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194831" version="1" comment="libsmbclient-devel is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194832" version="1" comment="libsmbclient-raw-devel is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194833" version="1" comment="libsmbconf-devel is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194834" version="1" comment="libsmbldap-devel is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194835" version="1" comment="libtevent-util-devel is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194836" version="1" comment="libwbclient-devel is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194837" version="1" comment="samba-core-devel is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194838" version="1" comment="samba-test-devel is &lt;4.2.4-18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194839" version="1" comment="libgcrypt-devel is &lt;1.6.1-16.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194840" version="1" comment="cairo-devel is &lt;1.12.16-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194841" version="1" comment="php5-devel is &lt;5.5.14-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194842" version="1" comment="libxml2-devel is &lt;2.9.1-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194843" version="1" comment="libopenssl-devel is &lt;1.0.1i-27.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194844" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.8.10-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194845" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.8.10-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194846" version="1" comment="subversion is &lt;1.8.10-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194847" version="1" comment="subversion-bash-completion is &lt;1.8.10-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194848" version="1" comment="subversion-devel is &lt;1.8.10-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194849" version="1" comment="subversion-perl is &lt;1.8.10-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194850" version="1" comment="subversion-python is &lt;1.8.10-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194851" version="1" comment="subversion-server is &lt;1.8.10-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194852" version="1" comment="subversion-tools is &lt;1.8.10-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194853" version="1" comment="yast2-ntp-client-devel-doc is &lt;3.1.12.4-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194854" version="1" comment="MozillaFirefox-devel is &lt;38.8.0esr-66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194855" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194856" version="1" comment="libMagick++-devel is &lt;6.8.8.1-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194857" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194858" version="1" comment="php5-devel is &lt;5.5.14-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194859" version="1" comment="wireshark-devel is &lt;1.12.9-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194860" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.40-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194861" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr3.40-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194862" version="1" comment="xen-devel is &lt;4.4.4_02-22.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194863" version="1" comment="wireshark-devel is &lt;1.12.11-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194864" version="1" comment="libgudev-1_0-devel is &lt;210-70.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194865" version="1" comment="libudev-devel is &lt;210-70.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194866" version="1" comment="systemd-devel is &lt;210-70.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194867" version="1" comment="typelib-1_0-GUdev-1_0 is &lt;210-70.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194868" version="1" comment="libmysqlclient-devel is &lt;10.0.22-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194869" version="1" comment="libmysqld-devel is &lt;10.0.22-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194870" version="1" comment="libmysqld18 is &lt;10.0.22-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194871" version="1" comment="php5-devel is &lt;5.5.14-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194872" version="1" comment="libxml2-devel is &lt;2.9.1-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194873" version="1" comment="libpoppler-devel is &lt;0.24.4-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194874" version="1" comment="libpoppler-glib-devel is &lt;0.24.4-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194875" version="1" comment="libpoppler-qt4-devel is &lt;0.24.4-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194876" version="1" comment="typelib-1_0-Poppler-0_18 is &lt;0.24.4-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194877" version="1" comment="libspice-server-devel is &lt;0.12.4-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194878" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194879" version="1" comment="libMagick++-devel is &lt;6.8.8.1-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194880" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194881" version="1" comment="libarchive-devel is &lt;3.1.2-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194882" version="1" comment="kernel-docs is &lt;3.12.55-52.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194883" version="1" comment="kernel-obs-build is &lt;3.12.55-52.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194884" version="1" comment="libmysqlclient-devel is &lt;10.0.25-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194885" version="1" comment="libmysqld-devel is &lt;10.0.25-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194886" version="1" comment="libmysqld18 is &lt;10.0.25-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194887" version="1" comment="imap-devel is &lt;2007e_suse-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194888" version="1" comment="php5-devel is &lt;5.5.14-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194889" version="1" comment="libimobiledevice-devel is &lt;1.1.5-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194890" version="1" comment="libusbmuxd-devel is &lt;1.0.8-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194891" version="1" comment="mozilla-nss-devel is &lt;3.19.2.2-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194892" version="1" comment="bind-devel is &lt;9.9.6P1-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194893" version="1" comment="libopenssl-devel is &lt;1.0.1i-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194894" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr2.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194895" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr2.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194896" version="1" comment="kernel-docs is &lt;3.12.51-60.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194897" version="1" comment="kernel-obs-build is &lt;3.12.51-60.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194898" version="1" comment="libdcerpc-atsvc-devel is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194899" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194900" version="1" comment="libdcerpc-devel is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194901" version="1" comment="libdcerpc-samr-devel is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194902" version="1" comment="libdcerpc-samr0 is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194903" version="1" comment="libgensec-devel is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194904" version="1" comment="libldb-devel is &lt;1.1.24-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194905" version="1" comment="libndr-devel is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194906" version="1" comment="libndr-krb5pac-devel is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194907" version="1" comment="libndr-nbt-devel is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194908" version="1" comment="libndr-standard-devel is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194909" version="1" comment="libnetapi-devel is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194910" version="1" comment="libregistry-devel is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194911" version="1" comment="libsamba-credentials-devel is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194912" version="1" comment="libsamba-hostconfig-devel is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194913" version="1" comment="libsamba-passdb-devel is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194914" version="1" comment="libsamba-policy-devel is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194915" version="1" comment="libsamba-policy0 is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194916" version="1" comment="libsamba-util-devel is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194917" version="1" comment="libsamdb-devel is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194918" version="1" comment="libsmbclient-devel is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194919" version="1" comment="libsmbclient-raw-devel is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194920" version="1" comment="libsmbconf-devel is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194921" version="1" comment="libsmbldap-devel is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194922" version="1" comment="libtalloc-devel is &lt;2.1.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194923" version="1" comment="libtdb-devel is &lt;1.3.8-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194924" version="1" comment="libtevent-devel is &lt;0.9.26-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194925" version="1" comment="libtevent-util-devel is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194926" version="1" comment="libwbclient-devel is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194927" version="1" comment="pyldb is &lt;1.1.24-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194928" version="1" comment="pyldb-devel is &lt;1.1.24-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194929" version="1" comment="pytalloc-devel is &lt;2.1.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194930" version="1" comment="samba-core-devel is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194931" version="1" comment="samba-test-devel is &lt;4.2.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194932" version="1" comment="xen-devel is &lt;4.5.2_02-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194933" version="1" comment="kernel-docs is &lt;3.12.59-60.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194934" version="1" comment="kernel-obs-build is &lt;3.12.59-60.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194935" version="1" comment="kernel-docs is &lt;3.12.59-60.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194936" version="1" comment="kernel-obs-build is &lt;3.12.59-60.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194937" version="1" comment="glibc-devel-static is &lt;2.19-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194938" version="1" comment="glibc-info is &lt;2.19-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194939" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194940" version="1" comment="libMagick++-devel is &lt;6.8.8.1-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194941" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194942" version="1" comment="apache2 is &lt;2.4.16-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194943" version="1" comment="apache2-devel is &lt;2.4.16-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194944" version="1" comment="obs-service-source_validator is &lt;0.6+git20160531.fbfe336-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194945" version="1" comment="php5-devel is &lt;5.5.14-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194946" version="1" comment="bind-devel is &lt;9.9.6P1-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194947" version="1" comment="gimp-devel is &lt;2.8.10-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194948" version="1" comment="libvirt-devel is &lt;1.2.18.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194949" version="1" comment="xen-devel is &lt;4.5.3_08-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194950" version="1" comment="kernel-docs is &lt;3.12.51-60.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194951" version="1" comment="kernel-obs-build is &lt;3.12.51-60.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194952" version="1" comment="kernel-docs is &lt;3.12.62-60.62" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194953" version="1" comment="kernel-obs-build is &lt;3.12.62-60.62" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194954" version="1" comment="MozillaFirefox-devel is &lt;45.3.0esr-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194955" version="1" comment="krb5-devel is &lt;1.12.1-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194956" version="1" comment="libstorage-devel is &lt;2.25.35.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194957" version="1" comment="fontconfig-devel is &lt;2.11.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194958" version="1" comment="ocaml-compiler-libs is &lt;4.02.3-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194959" version="1" comment="ocaml-runtime is &lt;4.02.3-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194960" version="1" comment="libmysqlclient-devel is &lt;10.0.26-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194961" version="1" comment="libmysqld-devel is &lt;10.0.26-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194962" version="1" comment="libmysqld18 is &lt;10.0.26-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194963" version="1" comment="ctdb-devel is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194964" version="1" comment="libdcerpc-atsvc-devel is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194965" version="1" comment="libdcerpc-devel is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194966" version="1" comment="libdcerpc-samr-devel is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194967" version="1" comment="libdcerpc-samr0 is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194968" version="1" comment="libgensec-devel is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194969" version="1" comment="libndr-devel is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194970" version="1" comment="libndr-krb5pac-devel is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194971" version="1" comment="libndr-nbt-devel is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194972" version="1" comment="libndr-standard-devel is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194973" version="1" comment="libnetapi-devel is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194974" version="1" comment="libregistry-devel is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194975" version="1" comment="libsamba-credentials-devel is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194976" version="1" comment="libsamba-hostconfig-devel is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194977" version="1" comment="libsamba-passdb-devel is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194978" version="1" comment="libsamba-policy-devel is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194979" version="1" comment="libsamba-policy0 is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194980" version="1" comment="libsamba-util-devel is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194981" version="1" comment="libsamdb-devel is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194982" version="1" comment="libsmbclient-devel is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194983" version="1" comment="libsmbclient-raw-devel is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194984" version="1" comment="libsmbconf-devel is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194985" version="1" comment="libsmbldap-devel is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194986" version="1" comment="libtevent-util-devel is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194987" version="1" comment="libwbclient-devel is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194988" version="1" comment="samba-core-devel is &lt;4.2.4-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194989" version="1" comment="libopenssl-devel is &lt;1.0.1i-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194990" version="1" comment="xen-devel is &lt;4.5.3_10-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194991" version="1" comment="php5-devel is &lt;5.5.14-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194992" version="1" comment="libgudev-1_0-devel is &lt;210-114" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194993" version="1" comment="libudev-devel is &lt;210-114" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194994" version="1" comment="systemd-devel is &lt;210-114" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194995" version="1" comment="typelib-1_0-GUdev-1_0 is &lt;210-114" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194996" version="1" comment="ghostscript-devel is &lt;9.15-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194997" version="1" comment="libtiff-devel is &lt;4.0.6-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194998" version="1" comment="freerdp-devel is &lt;1.0.2-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009194999" version="1" comment="libX11-devel is &lt;1.6.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195000" version="1" comment="libXfixes-devel is &lt;5.0.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195001" version="1" comment="libXi-devel is &lt;1.7.4-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195002" version="1" comment="libXrandr-devel is &lt;1.4.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195003" version="1" comment="libXrender-devel is &lt;0.9.8-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195004" version="1" comment="libXtst-devel is &lt;1.2.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195005" version="1" comment="libXv-devel is &lt;1.0.10-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195006" version="1" comment="libXvMC-devel is &lt;1.0.8-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195007" version="1" comment="gtk2-devel is &lt;2.24.24-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195008" version="1" comment="dbus-1-devel is &lt;1.8.22-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195009" version="1" comment="dbus-1-devel-doc is &lt;1.8.22-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195010" version="1" comment="libipa_hbac-devel is &lt;1.11.5.1-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195011" version="1" comment="libsss_idmap-devel is &lt;1.11.5.1-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195012" version="1" comment="libsss_nss_idmap-devel is &lt;1.11.5.1-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195013" version="1" comment="libsss_nss_idmap0 is &lt;1.11.5.1-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195014" version="1" comment="kernel-docs is &lt;3.12.62-60.64.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195015" version="1" comment="kernel-obs-build is &lt;3.12.62-60.64.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195016" version="1" comment="libxml2-devel is &lt;2.9.1-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195017" version="1" comment="ghostscript-devel is &lt;9.15-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195018" version="1" comment="python3-devel is &lt;3.4.5-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195019" version="1" comment="gd-devel is &lt;2.1.0-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195020" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195021" version="1" comment="libMagick++-devel is &lt;6.8.8.1-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195022" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195023" version="1" comment="php7-devel is &lt;7.0.7-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195024" version="1" comment="bind-devel is &lt;9.9.9P1-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195025" version="1" comment="libcurl-devel is &lt;7.37.0-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195026" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr3.10-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195027" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr3.10-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195028" version="1" comment="php5-devel is &lt;5.5.14-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195029" version="1" comment="libblkid-devel is &lt;2.25-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195030" version="1" comment="libmount-devel is &lt;2.25-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195031" version="1" comment="libsmartcols-devel is &lt;2.25-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195032" version="1" comment="libjasper-devel is &lt;1.900.14-181" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195033" version="1" comment="ghostscript-devel is &lt;9.15-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195034" version="1" comment="eog-devel is &lt;3.10.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195035" version="1" comment="bash-devel is &lt;4.2-82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195036" version="1" comment="readline-devel is &lt;6.2-82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195037" version="1" comment="sudo-devel is &lt;1.8.10p3-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195038" version="1" comment="kernel-docs is &lt;3.12.67-60.64.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195039" version="1" comment="kernel-obs-build is &lt;3.12.67-60.64.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195040" version="1" comment="dovecot22-devel is &lt;2.2.13-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195041" version="1" comment="libmysqlclient-devel is &lt;10.0.28-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195042" version="1" comment="libmysqld-devel is &lt;10.0.28-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195043" version="1" comment="libmysqld18 is &lt;10.0.28-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195044" version="1" comment="php7-devel is &lt;7.0.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195045" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195046" version="1" comment="libMagick++-devel is &lt;6.8.8.1-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195047" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195048" version="1" comment="imap-devel is &lt;2007e_suse-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195049" version="1" comment="php5-devel is &lt;5.5.14-86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195050" version="1" comment="libpacemaker-devel is &lt;1.1.13-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195051" version="1" comment="pcre-devel is &lt;8.39-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195052" version="1" comment="pcre-devel-static is &lt;8.39-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195053" version="1" comment="pcre-tools is &lt;8.39-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195054" version="1" comment="MozillaFirefox-devel is &lt;45.5.0esr-88" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195055" version="1" comment="mozilla-nss-devel is &lt;3.21.3-50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195056" version="1" comment="kernel-docs is &lt;3.12.67-60.64.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195057" version="1" comment="kernel-obs-build is &lt;3.12.67-60.64.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195058" version="1" comment="MozillaFirefox-devel is &lt;45.5.1esr-93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195059" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr3.21-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195060" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr3.21-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195061" version="1" comment="xen-devel is &lt;4.5.5_02-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195062" version="1" comment="libmysqlclient-devel is &lt;10.0.22-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195063" version="1" comment="libmysqld-devel is &lt;10.0.22-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195064" version="1" comment="libmysqld18 is &lt;10.0.22-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195065" version="1" comment="kernel-docs is &lt;3.12.67-60.64.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195066" version="1" comment="kernel-obs-build is &lt;3.12.67-60.64.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195067" version="1" comment="xen-devel is &lt;4.5.5_04-22.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195068" version="1" comment="gd-devel is &lt;2.1.0-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195069" version="1" comment="MozillaFirefox-devel is &lt;45.6.0esr-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195070" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195071" version="1" comment="libMagick++-devel is &lt;6.8.8.1-54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195072" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195073" version="1" comment="ctdb-devel is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195074" version="1" comment="libdcerpc-atsvc-devel is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195075" version="1" comment="libdcerpc-devel is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195076" version="1" comment="libdcerpc-samr-devel is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195077" version="1" comment="libdcerpc-samr0 is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195078" version="1" comment="libgensec-devel is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195079" version="1" comment="libndr-devel is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195080" version="1" comment="libndr-krb5pac-devel is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195081" version="1" comment="libndr-nbt-devel is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195082" version="1" comment="libndr-standard-devel is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195083" version="1" comment="libnetapi-devel is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195084" version="1" comment="libregistry-devel is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195085" version="1" comment="libsamba-credentials-devel is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195086" version="1" comment="libsamba-hostconfig-devel is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195087" version="1" comment="libsamba-passdb-devel is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195088" version="1" comment="libsamba-policy-devel is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195089" version="1" comment="libsamba-policy0 is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195090" version="1" comment="libsamba-util-devel is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195091" version="1" comment="libsamdb-devel is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195092" version="1" comment="libsmbclient-devel is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195093" version="1" comment="libsmbclient-raw-devel is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195094" version="1" comment="libsmbconf-devel is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195095" version="1" comment="libsmbldap-devel is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195096" version="1" comment="libtevent-util-devel is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195097" version="1" comment="libwbclient-devel is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195098" version="1" comment="samba-core-devel is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195099" version="1" comment="samba-test-devel is &lt;4.2.4-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195100" version="1" comment="gstreamer-plugins-bad-devel is &lt;1.2.4-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195101" version="1" comment="libgstinsertbin-1_0-0 is &lt;1.2.4-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195102" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.2.4-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195103" version="1" comment="libtiff-devel is &lt;4.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195104" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr2.10-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195105" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr2.10-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195106" version="1" comment="glibc-devel-static is &lt;2.19-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195107" version="1" comment="glibc-info is &lt;2.19-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195108" version="1" comment="dhcp-devel is &lt;4.3.3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195109" version="1" comment="kernel-docs is &lt;3.12.53-60.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195110" version="1" comment="kernel-obs-build is &lt;3.12.53-60.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195111" version="1" comment="libopenssl-devel is &lt;1.0.1i-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195112" version="1" comment="bind-devel is &lt;9.9.6P1-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195113" version="1" comment="libdcerpc-atsvc-devel is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195114" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195115" version="1" comment="libdcerpc-devel is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195116" version="1" comment="libdcerpc-samr-devel is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195117" version="1" comment="libdcerpc-samr0 is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195118" version="1" comment="libgensec-devel is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195119" version="1" comment="libndr-devel is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195120" version="1" comment="libndr-krb5pac-devel is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195121" version="1" comment="libndr-nbt-devel is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195122" version="1" comment="libndr-standard-devel is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195123" version="1" comment="libnetapi-devel is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195124" version="1" comment="libregistry-devel is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195125" version="1" comment="libsamba-credentials-devel is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195126" version="1" comment="libsamba-hostconfig-devel is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195127" version="1" comment="libsamba-passdb-devel is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195128" version="1" comment="libsamba-policy-devel is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195129" version="1" comment="libsamba-policy0 is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195130" version="1" comment="libsamba-util-devel is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195131" version="1" comment="libsamdb-devel is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195132" version="1" comment="libsmbclient-devel is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195133" version="1" comment="libsmbclient-raw-devel is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195134" version="1" comment="libsmbconf-devel is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195135" version="1" comment="libsmbldap-devel is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195136" version="1" comment="libtevent-util-devel is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195137" version="1" comment="libwbclient-devel is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195138" version="1" comment="samba-core-devel is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195139" version="1" comment="samba-test-devel is &lt;4.2.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195140" version="1" comment="xen-devel is &lt;4.5.2_06-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195141" version="1" comment="libvirt-devel is &lt;1.2.18.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195142" version="1" comment="kernel-docs is &lt;3.12.57-60.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195143" version="1" comment="kernel-obs-build is &lt;3.12.57-60.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195144" version="1" comment="ctdb-devel is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195145" version="1" comment="libdcerpc-atsvc-devel is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195146" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195147" version="1" comment="libdcerpc-devel is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195148" version="1" comment="libdcerpc-samr-devel is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195149" version="1" comment="libdcerpc-samr0 is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195150" version="1" comment="libgensec-devel is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195151" version="1" comment="libndr-devel is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195152" version="1" comment="libndr-krb5pac-devel is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195153" version="1" comment="libndr-nbt-devel is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195154" version="1" comment="libndr-standard-devel is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195155" version="1" comment="libnetapi-devel is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195156" version="1" comment="libregistry-devel is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195157" version="1" comment="libsamba-credentials-devel is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195158" version="1" comment="libsamba-hostconfig-devel is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195159" version="1" comment="libsamba-passdb-devel is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195160" version="1" comment="libsamba-policy-devel is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195161" version="1" comment="libsamba-policy0 is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195162" version="1" comment="libsamba-util-devel is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195163" version="1" comment="libsamdb-devel is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195164" version="1" comment="libsmbclient-devel is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195165" version="1" comment="libsmbclient-raw-devel is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195166" version="1" comment="libsmbconf-devel is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195167" version="1" comment="libsmbldap-devel is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195168" version="1" comment="libtevent-util-devel is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195169" version="1" comment="libwbclient-devel is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195170" version="1" comment="samba-core-devel is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195171" version="1" comment="samba-test-devel is &lt;4.2.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195172" version="1" comment="libxerces-c-devel is &lt;3.1.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195173" version="1" comment="yast2-users-devel-doc is &lt;3.1.41.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195174" version="1" comment="yast2-ntp-client-devel-doc is &lt;3.1.22-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195175" version="1" comment="libopenssl-devel is &lt;1.0.1i-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195176" version="1" comment="libgudev-1_0-devel is &lt;210-104" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195177" version="1" comment="libudev-devel is &lt;210-104" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195178" version="1" comment="systemd-devel is &lt;210-104" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195179" version="1" comment="typelib-1_0-GUdev-1_0 is &lt;210-104" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195180" version="1" comment="libspice-server-devel is &lt;0.12.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195181" version="1" comment="libmysqlclient-devel is &lt;10.0.25-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195182" version="1" comment="libmysqld-devel is &lt;10.0.25-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195183" version="1" comment="libmysqld18 is &lt;10.0.25-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195184" version="1" comment="gstreamer-0_10-plugins-base-devel is &lt;0.10.36-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195185" version="1" comment="typelib-1_0-GstApp-0_10 is &lt;0.10.36-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195186" version="1" comment="typelib-1_0-GstInterfaces-0_10 is &lt;0.10.36-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195187" version="1" comment="gstreamer-0_10-plugins-bad-devel is &lt;0.10.23-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195188" version="1" comment="gstreamer-0_10-plugins-bad-devel is &lt;0.10.23-19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195189" version="1" comment="libgnutls-devel is &lt;3.2.15-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195190" version="1" comment="libgnutls-openssl-devel is &lt;3.2.15-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195191" version="1" comment="libgnutlsxx-devel is &lt;3.2.15-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195192" version="1" comment="libgnutlsxx28 is &lt;3.2.15-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195193" version="1" comment="libspice-server-devel is &lt;0.12.5-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195194" version="1" comment="libmysqlclient-devel is &lt;10.0.29-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195195" version="1" comment="libmysqld-devel is &lt;10.0.29-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195196" version="1" comment="libmysqld18 is &lt;10.0.29-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195197" version="1" comment="php5-devel is &lt;5.5.14-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195198" version="1" comment="MozillaFirefox-devel is &lt;45.7.0esr-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195199" version="1" comment="libtiff-devel is &lt;4.0.7-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195200" version="1" comment="libopenssl-devel is &lt;1.0.1i-54.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195201" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr4.0-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195202" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr4.0-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195203" version="1" comment="kernel-docs is &lt;3.12.69-60.64.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195204" version="1" comment="kernel-obs-build is &lt;3.12.69-60.64.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195205" version="1" comment="kernel-docs is &lt;3.12.69-60.64.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195206" version="1" comment="kernel-obs-build is &lt;3.12.69-60.64.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195207" version="1" comment="libjasper-devel is &lt;1.900.14-184" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195208" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195209" version="1" comment="libMagick++-devel is &lt;6.8.8.1-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195210" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195211" version="1" comment="php7-devel is &lt;7.0.7-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195212" version="1" comment="libblkid-devel is &lt;2.25-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195213" version="1" comment="libmount-devel is &lt;2.25-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195214" version="1" comment="libsmartcols-devel is &lt;2.25-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195215" version="1" comment="php5-devel is &lt;5.5.14-96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195216" version="1" comment="xen-devel is &lt;4.5.5_06-22.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251836" version="1" comment="zlib-devel is &lt;1.2.8-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195218" version="1" comment="zlib-devel-32bit is &lt;1.2.8-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195219" version="1" comment="zlib-devel-static is &lt;1.2.8-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195220" version="1" comment="bind-devel is &lt;9.9.9P1-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195221" version="1" comment="dbus-1-devel is &lt;1.8.22-24.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195222" version="1" comment="dbus-1-devel-doc is &lt;1.8.22-24.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195223" version="1" comment="gegl-devel is &lt;0.2.0-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195224" version="1" comment="MozillaFirefox-devel is &lt;45.8.0esr-102" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195225" version="1" comment="php5-devel is &lt;5.5.14-99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195226" version="1" comment="freeradius-server-devel is &lt;3.0.3-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195227" version="1" comment="apache2 is &lt;2.4.16-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195228" version="1" comment="apache2-devel is &lt;2.4.16-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195229" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr4.1-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195230" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr4.1-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195231" version="1" comment="ctdb-devel is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195232" version="1" comment="libdcerpc-atsvc-devel is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195233" version="1" comment="libdcerpc-devel is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195234" version="1" comment="libdcerpc-samr-devel is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195235" version="1" comment="libdcerpc-samr0 is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195236" version="1" comment="libgensec-devel is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195237" version="1" comment="libndr-devel is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195238" version="1" comment="libndr-krb5pac-devel is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195239" version="1" comment="libndr-nbt-devel is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195240" version="1" comment="libndr-standard-devel is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195241" version="1" comment="libnetapi-devel is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195242" version="1" comment="libregistry-devel is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195243" version="1" comment="libsamba-credentials-devel is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195244" version="1" comment="libsamba-hostconfig-devel is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195245" version="1" comment="libsamba-passdb-devel is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195246" version="1" comment="libsamba-policy-devel is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195247" version="1" comment="libsamba-policy0 is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195248" version="1" comment="libsamba-util-devel is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195249" version="1" comment="libsamdb-devel is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195250" version="1" comment="libsmbclient-devel is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195251" version="1" comment="libsmbclient-raw-devel is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195252" version="1" comment="libsmbconf-devel is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195253" version="1" comment="libsmbldap-devel is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195254" version="1" comment="libtevent-util-devel is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195255" version="1" comment="libwbclient-devel is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195256" version="1" comment="samba-core-devel is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195257" version="1" comment="samba-test-devel is &lt;4.2.4-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195258" version="1" comment="kernel-docs is &lt;3.12.69-60.64.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195259" version="1" comment="kernel-obs-build is &lt;3.12.69-60.64.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195260" version="1" comment="php7-devel is &lt;7.0.7-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195261" version="1" comment="bind-devel is &lt;9.9.9P1-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195262" version="1" comment="gstreamer-devel is &lt;1.2.4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195263" version="1" comment="bind-devel is &lt;9.9.9P1-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195264" version="1" comment="gstreamer-0_10-plugins-base-devel is &lt;0.10.36-11.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195265" version="1" comment="typelib-1_0-GstApp-0_10 is &lt;0.10.36-11.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195266" version="1" comment="typelib-1_0-GstInterfaces-0_10 is &lt;0.10.36-11.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195267" version="1" comment="gstreamer-plugins-base-devel is &lt;1.2.4-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195268" version="1" comment="typelib-1_0-GstAllocators-1_0 is &lt;1.2.4-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195269" version="1" comment="typelib-1_0-GstApp-1_0 is &lt;1.2.4-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195270" version="1" comment="typelib-1_0-GstFft-1_0 is &lt;1.2.4-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195271" version="1" comment="typelib-1_0-GstRiff-1_0 is &lt;1.2.4-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195272" version="1" comment="typelib-1_0-GstRtp-1_0 is &lt;1.2.4-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195273" version="1" comment="typelib-1_0-GstRtsp-1_0 is &lt;1.2.4-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195274" version="1" comment="typelib-1_0-GstSdp-1_0 is &lt;1.2.4-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195275" version="1" comment="libsndfile-devel is &lt;1.0.25-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195276" version="1" comment="ruby2.1-devel is &lt;2.1.9-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195277" version="1" comment="libpcap-devel is &lt;1.8.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195278" version="1" comment="ghostscript-devel is &lt;9.15-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195279" version="1" comment="xen-devel is &lt;4.5.5_10-22.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195280" version="1" comment="libapparmor-devel is &lt;2.8.2-54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195281" version="1" comment="firebird-devel is &lt;2.5.2.26539-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195282" version="1" comment="Botan is &lt;1.10.9-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195283" version="1" comment="dovecot22-devel is &lt;2.2.29.1-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195284" version="1" comment="libtirpc-devel is &lt;0.2.3-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195285" version="1" comment="libmysqlclient-devel is &lt;10.0.30-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195286" version="1" comment="libmysqld-devel is &lt;10.0.30-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195287" version="1" comment="libmysqld18 is &lt;10.0.30-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195288" version="1" comment="php7-devel is &lt;7.0.7-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195289" version="1" comment="kernel-docs is &lt;3.12.74-60.64.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195290" version="1" comment="kernel-obs-build is &lt;3.12.74-60.64.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195291" version="1" comment="libxml2-devel is &lt;2.9.1-26.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195292" version="1" comment="libplist++-devel is &lt;1.8-10.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195293" version="1" comment="libplist-devel is &lt;1.8-10.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195294" version="1" comment="ctdb-devel is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195295" version="1" comment="libdcerpc-atsvc-devel is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195296" version="1" comment="libdcerpc-devel is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195297" version="1" comment="libdcerpc-samr-devel is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195298" version="1" comment="libdcerpc-samr0 is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195299" version="1" comment="libgensec-devel is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195300" version="1" comment="libndr-devel is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195301" version="1" comment="libndr-krb5pac-devel is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195302" version="1" comment="libndr-nbt-devel is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195303" version="1" comment="libndr-standard-devel is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195304" version="1" comment="libnetapi-devel is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195305" version="1" comment="libregistry-devel is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195306" version="1" comment="libsamba-credentials-devel is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195307" version="1" comment="libsamba-hostconfig-devel is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195308" version="1" comment="libsamba-passdb-devel is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195309" version="1" comment="libsamba-policy-devel is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195310" version="1" comment="libsamba-policy0 is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195311" version="1" comment="libsamba-util-devel is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195312" version="1" comment="libsamdb-devel is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195313" version="1" comment="libsmbclient-devel is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195314" version="1" comment="libsmbclient-raw-devel is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195315" version="1" comment="libsmbconf-devel is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195316" version="1" comment="libsmbldap-devel is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195317" version="1" comment="libtevent-util-devel is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195318" version="1" comment="libwbclient-devel is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195319" version="1" comment="samba-core-devel is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195320" version="1" comment="samba-test-devel is &lt;4.2.4-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195321" version="1" comment="wireshark-devel is &lt;2.2.6-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195322" version="1" comment="sudo-devel is &lt;1.8.10p3-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195323" version="1" comment="gstreamer-plugins-base-devel is &lt;1.2.4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195324" version="1" comment="typelib-1_0-GstAllocators-1_0 is &lt;1.2.4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195325" version="1" comment="typelib-1_0-GstApp-1_0 is &lt;1.2.4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195326" version="1" comment="typelib-1_0-GstFft-1_0 is &lt;1.2.4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195327" version="1" comment="typelib-1_0-GstRiff-1_0 is &lt;1.2.4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195328" version="1" comment="typelib-1_0-GstRtp-1_0 is &lt;1.2.4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195329" version="1" comment="typelib-1_0-GstRtsp-1_0 is &lt;1.2.4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195330" version="1" comment="typelib-1_0-GstSdp-1_0 is &lt;1.2.4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195331" version="1" comment="libX11-devel is &lt;1.6.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195332" version="1" comment="libXi-devel is &lt;1.7.4-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195333" version="1" comment="python3-devel is &lt;3.4.5-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195334" version="1" comment="libpacemaker-devel is &lt;1.1.15-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195335" version="1" comment="sudo-devel is &lt;1.8.10p3-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195336" version="1" comment="libblkid-devel is &lt;2.28-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195337" version="1" comment="libmount-devel is &lt;2.28-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195338" version="1" comment="libsmartcols-devel is &lt;2.28-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195339" version="1" comment="libgit2 is &lt;0.24.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195340" version="1" comment="libgit2-24 is &lt;0.24.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195341" version="1" comment="kernel-docs is &lt;4.4.21-84" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195342" version="1" comment="kernel-obs-build is &lt;4.4.21-84" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195343" version="1" comment="xen-devel is &lt;4.7.1_02-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195344" version="1" comment="kernel-docs is &lt;4.4.21-90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195345" version="1" comment="kernel-obs-build is &lt;4.4.21-90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195346" version="1" comment="xen-devel is &lt;4.7.1_04-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195347" version="1" comment="libsmbclient-devel is &lt;4.4.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195348" version="1" comment="libwbclient-devel is &lt;4.4.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195349" version="1" comment="gstreamer-plugins-bad-devel is &lt;1.8.3-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195350" version="1" comment="libgstinsertbin-1_0-0 is &lt;1.8.3-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195351" version="1" comment="sudo-devel is &lt;1.8.10p3-10.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195352" version="1" comment="gstreamer-plugins-base-devel is &lt;1.8.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195353" version="1" comment="typelib-1_0-GstAllocators-1_0 is &lt;1.8.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195354" version="1" comment="typelib-1_0-GstApp-1_0 is &lt;1.8.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195355" version="1" comment="typelib-1_0-GstFft-1_0 is &lt;1.8.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195356" version="1" comment="typelib-1_0-GstRtp-1_0 is &lt;1.8.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195357" version="1" comment="typelib-1_0-GstRtsp-1_0 is &lt;1.8.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195358" version="1" comment="typelib-1_0-GstSdp-1_0 is &lt;1.8.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195359" version="1" comment="libxml2-devel is &lt;2.9.4-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195360" version="1" comment="postgresql94-devel is &lt;9.4.12-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195361" version="1" comment="postgresql94-libs is &lt;9.4.12-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195362" version="1" comment="freeradius-server-devel is &lt;3.0.3-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195363" version="1" comment="kernel-docs is &lt;4.4.59-92.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195364" version="1" comment="kernel-obs-build is &lt;4.4.59-92.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195365" version="1" comment="xen-devel is &lt;4.7.2_06-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195366" version="1" comment="libudev-devel is &lt;228-149" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195367" version="1" comment="systemd-devel is &lt;228-149" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195368" version="1" comment="sudo-devel is &lt;1.8.10p3-10.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195369" version="1" comment="libquicktime-devel is &lt;1.2.4-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195370" version="1" comment="libgcrypt-devel is &lt;1.6.1-16.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195371" version="1" comment="libcares-devel is &lt;1.9.1-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195372" version="1" comment="libixion-devel is &lt;0.12.1-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195373" version="1" comment="libmwaw-devel is &lt;0.3.11-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195374" version="1" comment="libmwaw-devel-doc is &lt;0.3.11-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195375" version="1" comment="liborcus-devel is &lt;0.12.1-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195376" version="1" comment="libgnutls-devel is &lt;3.2.15-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195377" version="1" comment="libgnutls-openssl-devel is &lt;3.2.15-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195378" version="1" comment="libgnutlsxx-devel is &lt;3.2.15-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195379" version="1" comment="libgnutlsxx28 is &lt;3.2.15-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195380" version="1" comment="libICE-devel is &lt;1.0.8-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195381" version="1" comment="libspice-server-devel is &lt;0.12.7-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195382" version="1" comment="kernel-docs is &lt;4.4.74-92.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195383" version="1" comment="kernel-obs-build is &lt;4.4.74-92.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195384" version="1" comment="xorg-x11-server-sdk is &lt;7.6_1.18.3-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195385" version="1" comment="libXdmcp-devel is &lt;1.1.1-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195386" version="1" comment="evince-devel is &lt;3.20.1-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195387" version="1" comment="libudev-devel is &lt;228-150.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195388" version="1" comment="systemd-devel is &lt;228-150.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195389" version="1" comment="libjasper-devel is &lt;1.900.14-195.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195390" version="1" comment="apache2-devel is &lt;2.4.23-29.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195394" version="1" comment="libpoppler-devel is &lt;0.43.0-16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195395" version="1" comment="libpoppler-glib-devel is &lt;0.43.0-16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195396" version="1" comment="libpoppler-qt4-devel is &lt;0.43.0-16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195397" version="1" comment="typelib-1_0-Poppler-0_18 is &lt;0.43.0-16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195398" version="1" comment="gstreamer-0_10-plugins-base-devel is &lt;0.10.36-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195399" version="1" comment="typelib-1_0-GstApp-0_10 is &lt;0.10.36-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195400" version="1" comment="typelib-1_0-GstInterfaces-0_10 is &lt;0.10.36-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195401" version="1" comment="wireshark-devel is &lt;2.2.8-48.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195402" version="1" comment="kernel-docs is &lt;4.4.74-92.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195403" version="1" comment="kernel-obs-build is &lt;4.4.74-92.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195404" version="1" comment="libzypp-devel is &lt;16.15.2-27.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195405" version="1" comment="libzypp-devel-doc is &lt;16.15.2-27.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195407" version="1" comment="gstreamer-0_10-plugins-bad-devel is &lt;0.10.23-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195408" version="1" comment="librsvg-devel is &lt;2.40.18-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195409" version="1" comment="typelib-1_0-Rsvg-2_0 is &lt;2.40.18-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195410" version="1" comment="libsoup-devel is &lt;2.54.1-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195411" version="1" comment="kernel-docs is &lt;4.4.74-92.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195412" version="1" comment="kernel-obs-build is &lt;4.4.74-92.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195413" version="1" comment="libxml2-devel is &lt;2.9.4-46.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195414" version="1" comment="libcurl-devel is &lt;7.37.0-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195425" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-71.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195426" version="1" comment="libMagick++-devel is &lt;6.8.8.1-71.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195427" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-71.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195428" version="1" comment="gnome-shell-devel is &lt;3.20.4-77.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195430" version="1" comment="freeradius-server-devel is &lt;3.0.3-17.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195431" version="1" comment="mercurial is &lt;2.8.2-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195432" version="1" comment="quagga-devel is &lt;1.1.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195433" version="1" comment="libraw-devel is &lt;0.15.4-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195434" version="1" comment="libraw-devel-static is &lt;0.15.4-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195435" version="1" comment="php7-devel is &lt;7.0.7-50.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195437" version="1" comment="git-arch is &lt;2.12.3-27.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195438" version="1" comment="git-cvs is &lt;2.12.3-27.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195439" version="1" comment="git-daemon is &lt;2.12.3-27.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195440" version="1" comment="git-email is &lt;2.12.3-27.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195441" version="1" comment="git-gui is &lt;2.12.3-27.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195442" version="1" comment="git-svn is &lt;2.12.3-27.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195443" version="1" comment="git-web is &lt;2.12.3-27.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195444" version="1" comment="gitk is &lt;2.12.3-27.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195445" version="1" comment="libicu-devel is &lt;52.1-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195446" version="1" comment="php5-devel is &lt;5.5.14-109.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195447" version="1" comment="xen-devel is &lt;4.7.3_03-43.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195448" version="1" comment="postgresql94-devel is &lt;9.4.13-21.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195449" version="1" comment="postgresql94-libs is &lt;9.4.13-21.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195450" version="1" comment="postgresql96-devel is &lt;9.6.4-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195451" version="1" comment="gdk-pixbuf-devel is &lt;2.34.0-19.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195452" version="1" comment="evince-devel is &lt;3.20.1-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195453" version="1" comment="libudev-devel is &lt;228-132" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195454" version="1" comment="systemd-devel is &lt;228-132" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195455" version="1" comment="dbus-1-devel is &lt;1.8.22-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195456" version="1" comment="dbus-1-devel-doc is &lt;1.8.22-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195457" version="1" comment="php7-devel is &lt;7.0.7-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195458" version="1" comment="php5-devel is &lt;5.5.14-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195459" version="1" comment="xen-devel is &lt;4.7.3_04-43.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195460" version="1" comment="kernel-docs is &lt;4.4.74-92.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195461" version="1" comment="kernel-obs-build is &lt;4.4.74-92.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195462" version="1" comment="gcc48-ada is &lt;4.8.5-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195463" version="1" comment="gcc48-fortran is &lt;4.8.5-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195464" version="1" comment="gcc48-java is &lt;4.8.5-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195465" version="1" comment="gcc48-obj-c++ is &lt;4.8.5-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195466" version="1" comment="gcc48-objc is &lt;4.8.5-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195467" version="1" comment="gcc48-objc-32bit is &lt;4.8.5-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195468" version="1" comment="libada48 is &lt;4.8.5-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195469" version="1" comment="libffi48 is &lt;4.8.5-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195470" version="1" comment="libffi48-devel is &lt;4.8.5-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195471" version="1" comment="libgcj48-devel is &lt;4.8.5-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195472" version="1" comment="libobjc4 is &lt;4.8.5-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195473" version="1" comment="libobjc4-32bit is &lt;4.8.5-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195475" version="1" comment="apache2-devel is &lt;2.4.23-29.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195476" version="1" comment="wireshark-devel is &lt;2.2.9-48.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195477" version="1" comment="libtiff-devel is &lt;4.0.8-44.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195478" version="1" comment="liblouis-devel is &lt;2.6.4-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195480" version="1" comment="tcmu-runner-devel is &lt;1.0.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195481" version="1" comment="libsmbclient-devel is &lt;4.4.2-38.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195482" version="1" comment="libwbclient-devel is &lt;4.4.2-38.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195483" version="1" comment="krb5-devel is &lt;1.12.5-40.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195484" version="1" comment="libvirt-devel is &lt;2.0.0-27.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195485" version="1" comment="xerces-j2-demo is &lt;2.8.1-268.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195486" version="1" comment="xerces-j2-scripts is &lt;2.8.1-268.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195487" version="1" comment="git-arch is &lt;2.12.3-27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195488" version="1" comment="git-cvs is &lt;2.12.3-27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195489" version="1" comment="git-daemon is &lt;2.12.3-27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195490" version="1" comment="git-email is &lt;2.12.3-27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195491" version="1" comment="git-gui is &lt;2.12.3-27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195492" version="1" comment="git-svn is &lt;2.12.3-27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195493" version="1" comment="git-web is &lt;2.12.3-27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195494" version="1" comment="gitk is &lt;2.12.3-27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195495" version="1" comment="libcurl-devel is &lt;7.37.0-37.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195496" version="1" comment="Botan is &lt;1.10.9-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195499" version="1" comment="wireshark-devel is &lt;2.2.10-48.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195500" version="1" comment="xen-devel is &lt;4.7.3_06-43.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195501" version="1" comment="kernel-docs is &lt;4.4.90-92.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195502" version="1" comment="kernel-obs-build is &lt;4.4.90-92.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195503" version="1" comment="webkit2gtk3-devel is &lt;2.18.0-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195506" version="1" comment="libipa_hbac-devel is &lt;1.13.4-34.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195507" version="1" comment="libsss_idmap-devel is &lt;1.13.4-34.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195508" version="1" comment="libsss_nss_idmap-devel is &lt;1.13.4-34.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195509" version="1" comment="krb5-devel is &lt;1.12.5-40.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195510" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-71.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195511" version="1" comment="libMagick++-devel is &lt;6.8.8.1-71.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195512" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-71.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195513" version="1" comment="samba-test-devel is &lt;4.2.4-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195514" version="1" comment="libcephfs-devel is &lt;10.2.4+git.1481215985.12b091b-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195515" version="1" comment="librados-devel is &lt;10.2.4+git.1481215985.12b091b-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195516" version="1" comment="libradosstriper-devel is &lt;10.2.4+git.1481215985.12b091b-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195517" version="1" comment="librbd-devel is &lt;10.2.4+git.1481215985.12b091b-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195518" version="1" comment="file-devel is &lt;5.22-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195519" version="1" comment="python-magic is &lt;5.22-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195520" version="1" comment="xorg-x11-server-sdk is &lt;7.6_1.18.3-76.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195522" version="1" comment="samba-test-devel is &lt;4.2.4-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195523" version="1" comment="libsmbclient-devel is &lt;4.4.2-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195524" version="1" comment="libwbclient-devel is &lt;4.4.2-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195525" version="1" comment="libxml2-devel is &lt;2.9.4-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195526" version="1" comment="binutils-devel is &lt;2.29.1-9.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195527" version="1" comment="binutils-gold is &lt;2.29.1-9.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195528" version="1" comment="cross-ppc-binutils is &lt;2.29.1-9.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195529" version="1" comment="cross-spu-binutils is &lt;2.29.1-9.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195530" version="1" comment="xen-devel is &lt;4.7.4_02-43.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195531" version="1" comment="libspice-server-devel is &lt;0.12.7-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195532" version="1" comment="libXcursor-devel is &lt;1.1.14-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195534" version="1" comment="kernel-docs is &lt;4.4.90-92.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195535" version="1" comment="kernel-obs-build is &lt;4.4.90-92.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195537" version="1" comment="php7-devel is &lt;7.0.7-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195539" version="1" comment="build-initvm-s390 is &lt;20171128-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195543" version="1" comment="osc is &lt;0.162.0-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195545" version="1" comment="php5-devel is &lt;5.5.14-109.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195546" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-71.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195547" version="1" comment="libMagick++-devel is &lt;6.8.8.1-71.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195548" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-71.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195549" version="1" comment="libraw-devel is &lt;0.15.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195550" version="1" comment="libraw-devel-static is &lt;0.15.4-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195551" version="1" comment="postgresql96-devel is &lt;9.6.6-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195552" version="1" comment="kernel-docs is &lt;4.4.103-92.53" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195553" version="1" comment="kernel-obs-build is &lt;4.4.103-92.53" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195554" version="1" comment="evince-devel is &lt;3.20.2-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195555" version="1" comment="wireshark-devel is &lt;2.2.11-48.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195556" version="1" comment="gdk-pixbuf-devel is &lt;2.34.0-19.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195557" version="1" comment="libgit2 is &lt;0.24.1-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195558" version="1" comment="libblkid-devel is &lt;2.28-44.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195559" version="1" comment="libmount-devel is &lt;2.28-44.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195560" version="1" comment="libsmartcols-devel is &lt;2.28-44.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195561" version="1" comment="xen-devel is &lt;4.7.1_06-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195562" version="1" comment="kernel-docs is &lt;4.4.49-92.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195563" version="1" comment="kernel-obs-build is &lt;4.4.49-92.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195564" version="1" comment="apache2-devel is &lt;2.4.23-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195565" version="1" comment="libsmbclient-devel is &lt;4.4.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195566" version="1" comment="libwbclient-devel is &lt;4.4.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195567" version="1" comment="kernel-docs is &lt;4.4.49-92.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195568" version="1" comment="kernel-obs-build is &lt;4.4.49-92.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195569" version="1" comment="xen-devel is &lt;4.7.2_02-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195570" version="1" comment="xen-devel is &lt;4.7.2_04-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195571" version="1" comment="kernel-docs is &lt;4.4.59-92.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195572" version="1" comment="kernel-obs-build is &lt;4.4.59-92.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195573" version="1" comment="libsmbclient-devel is &lt;4.4.2-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195574" version="1" comment="libwbclient-devel is &lt;4.4.2-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195575" version="1" comment="kernel-docs is &lt;4.4.38-93" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195576" version="1" comment="kernel-obs-build is &lt;4.4.38-93" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195577" version="1" comment="sudo-devel is &lt;1.8.10p3-10.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195578" version="1" comment="libxml2-devel is &lt;2.9.4-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195579" version="1" comment="libxml2-devel is &lt;2.9.4-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195580" version="1" comment="libQt5Bootstrap-devel-static is &lt;5.6.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195581" version="1" comment="libQt5Concurrent-devel is &lt;5.6.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195582" version="1" comment="libQt5Core-devel is &lt;5.6.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195583" version="1" comment="libQt5Core-private-headers-devel is &lt;5.6.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195584" version="1" comment="libQt5DBus-devel is &lt;5.6.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195585" version="1" comment="libQt5DBus-private-headers-devel is &lt;5.6.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195586" version="1" comment="libQt5Gui-devel is &lt;5.6.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195587" version="1" comment="libQt5Gui-private-headers-devel is &lt;5.6.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195588" version="1" comment="libQt5Network-devel is &lt;5.6.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195589" version="1" comment="libQt5Network-private-headers-devel is &lt;5.6.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195590" version="1" comment="libQt5OpenGL-devel is &lt;5.6.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195591" version="1" comment="libQt5OpenGL-private-headers-devel is &lt;5.6.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195592" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.6.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195593" version="1" comment="libQt5PlatformHeaders-devel is &lt;5.6.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195594" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.6.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195595" version="1" comment="libQt5PlatformSupport-private-headers-devel is &lt;5.6.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195596" version="1" comment="libQt5PrintSupport-devel is &lt;5.6.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195597" version="1" comment="libQt5PrintSupport-private-headers-devel is &lt;5.6.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195598" version="1" comment="libQt5Sql-devel is &lt;5.6.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195599" version="1" comment="libQt5Sql-private-headers-devel is &lt;5.6.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195600" version="1" comment="libQt5Test-devel is &lt;5.6.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195601" version="1" comment="libQt5Test-private-headers-devel is &lt;5.6.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195602" version="1" comment="libQt5Widgets-devel is &lt;5.6.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195603" version="1" comment="libQt5Widgets-private-headers-devel is &lt;5.6.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195604" version="1" comment="libQt5Xml-devel is &lt;5.6.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195605" version="1" comment="libqt5-qtbase-common-devel is &lt;5.6.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195606" version="1" comment="libqt5-qtbase-devel is &lt;5.6.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195607" version="1" comment="libqt5-qtbase-private-headers-devel is &lt;5.6.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195608" version="1" comment="libqt5-qtdeclarative-devel is &lt;5.6.1-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195609" version="1" comment="libqt5-qtdeclarative-private-headers-devel is &lt;5.6.1-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195610" version="1" comment="libqt5-qtdeclarative-tools is &lt;5.6.1-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195611" version="1" comment="apache2-devel is &lt;2.4.23-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195612" version="1" comment="kernel-docs is &lt;4.4.59-92.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195613" version="1" comment="kernel-obs-build is &lt;4.4.59-92.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195614" version="1" comment="gd-devel is &lt;2.1.0-24.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195615" version="1" comment="libxmltooling-devel is &lt;1.5.6-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195616" version="1" comment="kernel-docs is &lt;4.4.103-92.56" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195617" version="1" comment="kernel-obs-build is &lt;4.4.103-92.56" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195619" version="1" comment="wireshark-devel is &lt;2.2.12-48.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195621" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-71.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195622" version="1" comment="libMagick++-devel is &lt;6.8.8.1-71.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195623" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-71.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195625" version="1" comment="php5-devel is &lt;5.5.14-109.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195626" version="1" comment="libcurl-devel is &lt;7.37.0-37.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195627" version="1" comment="libvorbis-devel is &lt;1.3.3-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195628" version="1" comment="webkit2gtk3-devel is &lt;2.18.5-2.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195629" version="1" comment="gd-devel is &lt;2.1.0-24.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195630" version="1" comment="apache2-devel is &lt;2.4.23-29.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195631" version="1" comment="libudev-devel is &lt;228-150.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195632" version="1" comment="systemd-devel is &lt;228-150.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195633" version="1" comment="php7-devel is &lt;7.0.7-50.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195635" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-71.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195636" version="1" comment="libMagick++-devel is &lt;6.8.8.1-71.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195637" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-71.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195638" version="1" comment="libsndfile-devel is &lt;1.0.25-36.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195641" version="1" comment="libmysqlclient-devel is &lt;10.0.33-29.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195642" version="1" comment="libmysqld-devel is &lt;10.0.33-29.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195643" version="1" comment="libmysqld18 is &lt;10.0.33-29.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195644" version="1" comment="libvirt-devel is &lt;2.0.0-27.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195645" version="1" comment="libxml2-devel is &lt;2.9.4-46.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195646" version="1" comment="ghostscript-devel is &lt;9.15-23.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195647" version="1" comment="kernel-docs is &lt;4.4.114-92.64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195648" version="1" comment="kernel-obs-build is &lt;4.4.114-92.64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195650" version="1" comment="glibc-devel-static is &lt;2.22-62.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195652" version="1" comment="dovecot22-devel is &lt;2.2.31-19.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195653" version="1" comment="xen-devel is &lt;4.7.4_06-43.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195654" version="1" comment="postgresql96-devel is &lt;9.6.7-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195655" version="1" comment="libdb-4_8-devel is &lt;4.8.30-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195656" version="1" comment="php5-devel is &lt;5.5.14-109.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195657" version="1" comment="dhcp-devel is &lt;4.3.3-10.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195658" version="1" comment="libudev-devel is &lt;228-150.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195659" version="1" comment="systemd-devel is &lt;228-150.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251837" version="1" comment="zziplib-devel is &lt;0.13.67-10.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195661" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-71.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195662" version="1" comment="libMagick++-devel is &lt;6.8.8.1-71.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195663" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-71.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195665" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-71.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195666" version="1" comment="libMagick++-devel is &lt;6.8.8.1-71.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195667" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-71.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195668" version="1" comment="cups-devel is &lt;1.7.5-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195670" version="1" comment="php7-devel is &lt;7.0.7-50.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195671" version="1" comment="augeas-devel is &lt;1.2.0-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195672" version="1" comment="glibc-devel-static is &lt;2.22-62.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195673" version="1" comment="postgresql94-devel is &lt;9.4.16-21.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195674" version="1" comment="postgresql94-libs is &lt;9.4.16-21.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195678" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.20-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195679" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.20-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195680" version="1" comment="kernel-docs is &lt;4.4.103-92.59" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195681" version="1" comment="kernel-obs-build is &lt;4.4.103-92.59" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195682" version="1" comment="php5-devel is &lt;5.5.14-109.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195685" version="1" comment="crash-devel is &lt;7.1.5-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195686" version="1" comment="postgresql96-devel is &lt;9.6.8-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195687" version="1" comment="libcurl-devel is &lt;7.37.0-37.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195688" version="1" comment="libvorbis-devel is &lt;1.3.3-10.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195689" version="1" comment="kernel-docs is &lt;4.4.120-92.70" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195690" version="1" comment="kernel-obs-build is &lt;4.4.120-92.70" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195692" version="1" comment="wireshark-devel is &lt;2.2.13-48.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195693" version="1" comment="glibc-devel-static is &lt;2.22-62.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195694" version="1" comment="librelp-devel is &lt;1.2.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195696" version="1" comment="libsmbclient-devel is &lt;4.4.2-38.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195697" version="1" comment="libwbclient-devel is &lt;4.4.2-38.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195698" version="1" comment="memcached-devel is &lt;1.4.39-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195699" version="1" comment="krb5-devel is &lt;1.12.5-40.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195700" version="1" comment="MozillaFirefox-devel is &lt;52.7.3esr-109.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195701" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-71.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195702" version="1" comment="libMagick++-devel is &lt;6.8.8.1-71.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195703" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-71.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195705" version="1" comment="libvirt-devel is &lt;2.0.0-27.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195706" version="1" comment="libtiff-devel is &lt;4.0.9-44.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195707" version="1" comment="postgresql94-devel is &lt;9.4.17-21.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195708" version="1" comment="postgresql94-libs is &lt;9.4.17-21.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195711" version="1" comment="xen-devel is &lt;4.7.5_02-43.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195712" version="1" comment="postgresql94-devel is &lt;9.4.15-21.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195713" version="1" comment="postgresql94-libs is &lt;9.4.15-21.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195714" version="1" comment="libmysqlclient-devel is &lt;10.0.32-29.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195715" version="1" comment="libmysqld-devel is &lt;10.0.32-29.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195716" version="1" comment="libmysqld18 is &lt;10.0.32-29.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195717" version="1" comment="openslp-devel is &lt;2.0.0-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195718" version="1" comment="libcurl-devel is &lt;7.37.0-37.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195719" version="1" comment="mercurial is &lt;2.8.2-15.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195720" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-71.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195721" version="1" comment="libMagick++-devel is &lt;6.8.8.1-71.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195722" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-71.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195723" version="1" comment="libudev-devel is &lt;228-150.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195724" version="1" comment="systemd-devel is &lt;228-150.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195725" version="1" comment="tcmu-runner is &lt;1.2.0-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195726" version="1" comment="tcmu-runner-devel is &lt;1.2.0-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195727" version="1" comment="freeradius-server is &lt;3.0.15-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195728" version="1" comment="freeradius-server-devel is &lt;3.0.15-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195729" version="1" comment="libsmbclient-devel is &lt;4.6.7+git.38.90b2cdb4f22-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195730" version="1" comment="libwbclient-devel is &lt;4.6.7+git.38.90b2cdb4f22-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195731" version="1" comment="libzypp-devel is &lt;16.15.3-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195732" version="1" comment="libzypp-devel-doc is &lt;16.15.3-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195733" version="1" comment="yast2-pkg-bindings-devel-doc is &lt;3.2.4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195734" version="1" comment="kernel-docs is &lt;4.4.82-6.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195735" version="1" comment="kernel-obs-build is &lt;4.4.82-6.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195736" version="1" comment="libixion-devel is &lt;0.12.1-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195737" version="1" comment="libmwaw-devel is &lt;0.3.11-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195738" version="1" comment="libmwaw-devel-doc is &lt;0.3.11-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195739" version="1" comment="liborcus-devel is &lt;0.12.1-10.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195740" version="1" comment="xen-devel is &lt;4.9.0_11-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195741" version="1" comment="libzypp-devel is &lt;16.15.6-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195742" version="1" comment="libzypp-devel-doc is &lt;16.15.6-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195743" version="1" comment="xen-devel is &lt;4.9.0_12-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195744" version="1" comment="kernel-docs is &lt;4.4.82-6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195745" version="1" comment="kernel-obs-build is &lt;4.4.82-6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195746" version="1" comment="libspice-server-devel is &lt;0.12.8-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195747" version="1" comment="libvirt-devel is &lt;3.3.0-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195748" version="1" comment="libsmbclient-devel is &lt;4.6.7+git.51.327af8d0a11-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195749" version="1" comment="libwbclient-devel is &lt;4.6.7+git.51.327af8d0a11-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195750" version="1" comment="xen-devel is &lt;4.9.0_14-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195751" version="1" comment="kernel-docs is &lt;4.4.92-6.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195752" version="1" comment="kernel-obs-build is &lt;4.4.92-6.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195753" version="1" comment="libvirt-devel is &lt;3.3.0-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195754" version="1" comment="xen-devel is &lt;4.9.1_02-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195755" version="1" comment="libsmbclient-devel is &lt;4.6.9+git.59.c2cff9cea4c-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195756" version="1" comment="libwbclient-devel is &lt;4.6.9+git.59.c2cff9cea4c-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195757" version="1" comment="kernel-docs is &lt;4.4.92-6.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195758" version="1" comment="kernel-obs-build is &lt;4.4.92-6.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195759" version="1" comment="kernel-docs is &lt;4.4.103-6.33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195760" version="1" comment="kernel-obs-build is &lt;4.4.103-6.33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195761" version="1" comment="dpdk is &lt;16.11.6-8.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195762" version="1" comment="dpdk-devel is &lt;16.11.6-8.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195763" version="1" comment="dpdk-thunderx is &lt;16.11.6-8.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195764" version="1" comment="dpdk-thunderx-devel is &lt;16.11.6-8.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195768" version="1" comment="crash is &lt;7.1.8-4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195769" version="1" comment="crash-devel is &lt;7.1.8-4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251838" version="1" comment="zziplib-devel is &lt;0.13.67-10.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195771" version="1" comment="glibc-devel-static is &lt;2.22-62.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223484" version="1" comment="libndr-devel is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223485" version="1" comment="libndr-krb5pac-devel is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223486" version="1" comment="libndr-nbt-devel is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223487" version="1" comment="libndr-standard-devel is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223488" version="1" comment="libsamba-util-devel is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223489" version="1" comment="libsmbclient-devel is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223490" version="1" comment="libwbclient-devel is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223491" version="1" comment="samba-core-devel is &lt;4.6.14+git.150.1540e575faf-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223517" version="1" comment="postgresql96-devel is &lt;9.6.9-3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229325" version="1" comment="kernel-docs is &lt;4.4.138-94.39" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229326" version="1" comment="kernel-obs-build is &lt;4.4.138-94.39" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195781" version="1" comment="kernel-docs is &lt;4.4.103-6.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195782" version="1" comment="kernel-obs-build is &lt;4.4.103-6.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229512" version="1" comment="libtiff-devel is &lt;4.0.9-44.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229567" version="1" comment="procps-devel is &lt;3.3.9-11.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229588" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-71.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229589" version="1" comment="libMagick++-devel is &lt;6.8.8.1-71.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229590" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-71.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229805" version="1" comment="php7-devel is &lt;7.0.7-50.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229807" version="1" comment="rubygem-yard is &lt;0.8.7.3-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229844" version="1" comment="libQtWebKit-devel is &lt;4.8.7+2.3.4-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229845" version="1" comment="libqca2-devel is &lt;2.0.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229846" version="1" comment="libqt4-devel is &lt;4.8.7-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229847" version="1" comment="libqt4-devel-doc is &lt;4.8.7-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229848" version="1" comment="libqt4-devel-doc-data is &lt;4.8.7-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229849" version="1" comment="libqt4-linguist is &lt;4.8.7-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229850" version="1" comment="libqt4-private-headers-devel is &lt;4.8.7-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230168" version="1" comment="gdk-pixbuf-devel is &lt;2.34.0-19.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230634" version="1" comment="kernel-docs is &lt;4.4.140-94.42" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230635" version="1" comment="kernel-obs-build is &lt;4.4.140-94.42" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230649" version="1" comment="nautilus-devel is &lt;3.20.3-23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230650" version="1" comment="typelib-1_0-Nautilus-3_0 is &lt;3.20.3-23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230651" version="1" comment="xen-devel is &lt;4.9.2_08-3.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230740" version="1" comment="libblkid-devel is &lt;2.29.2-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230741" version="1" comment="libmount-devel is &lt;2.29.2-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230742" version="1" comment="libsmartcols-devel is &lt;2.29.2-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230743" version="1" comment="libsndfile-devel is &lt;1.0.25-36.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230876" version="1" comment="libgcrypt-devel is &lt;1.6.1-16.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231118" version="1" comment="gdk-pixbuf-devel is &lt;2.34.0-19.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231119" version="1" comment="libcgroup-devel is &lt;0.41.rc1-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231167" version="1" comment="polkit-devel is &lt;0.113-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231168" version="1" comment="cups-devel is &lt;1.7.5-20.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231230" version="1" comment="libtirpc-devel is &lt;1.0.1-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231267" version="1" comment="libcephfs-devel is &lt;12.2.7+git.1531910353.c0ef85b854-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231268" version="1" comment="librados-devel is &lt;12.2.7+git.1531910353.c0ef85b854-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231269" version="1" comment="librbd-devel is &lt;12.2.7+git.1531910353.c0ef85b854-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231866" version="1" comment="libvirt-devel is &lt;3.3.0-5.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232089" version="1" comment="libndr-devel is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232090" version="1" comment="libndr-krb5pac-devel is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232091" version="1" comment="libndr-nbt-devel is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232092" version="1" comment="libndr-standard-devel is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232093" version="1" comment="libsamba-util-devel is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232094" version="1" comment="libsmbclient-devel is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232095" version="1" comment="libwbclient-devel is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232096" version="1" comment="samba-core-devel is &lt;4.6.14+git.157.c2d53c2b191-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232097" version="1" comment="dpdk is &lt;16.11.6-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232098" version="1" comment="dpdk-devel is &lt;16.11.6-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232099" version="1" comment="dpdk-thunderx is &lt;16.11.6-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232100" version="1" comment="dpdk-thunderx-devel is &lt;16.11.6-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232101" version="1" comment="kernel-docs is &lt;4.4.143-94.47" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232102" version="1" comment="kernel-obs-build is &lt;4.4.143-94.47" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232384" version="1" comment="php7-devel is &lt;7.0.7-50.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232385" version="1" comment="apache2 is &lt;2.4.23-29.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232386" version="1" comment="apache2-devel is &lt;2.4.23-29.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232534" version="1" comment="kernel-docs-azure is &lt;4.4.143-4.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240814" version="1" comment="libblkid-devel is &lt;2.29.2-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240815" version="1" comment="libmount-devel is &lt;2.29.2-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240816" version="1" comment="libsmartcols-devel is &lt;2.29.2-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232710" version="1" comment="xen-devel is &lt;4.9.2_10-3.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240650" version="1" comment="libgcrypt-devel is &lt;1.6.1-16.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233148" version="1" comment="libcgroup-devel is &lt;0.41.rc1-10.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234093" version="1" comment="php7-devel is &lt;7.0.7-50.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234321" version="1" comment="php5-devel is &lt;5.5.14-109.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234521" version="1" comment="libcurl-devel is &lt;7.37.0-37.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234768" version="1" comment="kernel-docs is &lt;4.4.155-94.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234769" version="1" comment="kernel-obs-build is &lt;4.4.155-94.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234971" version="1" comment="openslp-devel is &lt;2.0.0-18.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234972" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-71.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234973" version="1" comment="libMagick++-devel is &lt;6.8.8.1-71.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234974" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-71.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235150" version="1" comment="libzypp-devel is &lt;16.17.20-2.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235151" version="1" comment="libzypp-devel-doc is &lt;16.17.20-2.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235155" version="1" comment="ant-antlr is &lt;1.9.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235156" version="1" comment="ant-apache-bcel is &lt;1.9.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235157" version="1" comment="ant-apache-bsf is &lt;1.9.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235158" version="1" comment="ant-apache-log4j is &lt;1.9.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235159" version="1" comment="ant-apache-oro is &lt;1.9.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235160" version="1" comment="ant-apache-regexp is &lt;1.9.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235161" version="1" comment="ant-apache-resolver is &lt;1.9.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235162" version="1" comment="ant-commons-logging is &lt;1.9.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235163" version="1" comment="ant-javadoc is &lt;1.9.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235164" version="1" comment="ant-javamail is &lt;1.9.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235165" version="1" comment="ant-jdepend is &lt;1.9.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235167" version="1" comment="ant-junit is &lt;1.9.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235168" version="1" comment="ant-manual is &lt;1.9.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235171" version="1" comment="libtiff-devel is &lt;4.0.9-44.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235279" version="1" comment="kernel-docs-azure is &lt;4.4.155-4.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195783" version="1" comment="libvirt-devel is &lt;3.3.0-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235838" version="1" comment="kernel-docs is &lt;4.4.156-94.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235839" version="1" comment="kernel-obs-build is &lt;4.4.156-94.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236820" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-71.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236821" version="1" comment="libMagick++-devel is &lt;6.8.8.1-71.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236822" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-71.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237415" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-71.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237416" version="1" comment="libMagick++-devel is &lt;6.8.8.1-71.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237417" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-71.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195787" version="1" comment="libjasper-devel is &lt;1.900.14-195.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238072" version="1" comment="postgresql96-devel is &lt;9.6.10-3.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238159" version="1" comment="libgit2 is &lt;0.24.1-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238281" version="1" comment="xen-devel is &lt;4.9.3_03-3.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238413" version="1" comment="apache2-devel is &lt;2.4.23-29.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238521" version="1" comment="audiofile-devel is &lt;0.3.6-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238522" version="1" comment="libntfs-3g-devel is &lt;2013.1.13-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238523" version="1" comment="wireshark-devel is &lt;2.4.10-48.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238554" version="1" comment="libcurl-devel is &lt;7.37.0-37.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238555" version="1" comment="soundtouch-devel is &lt;1.7.1-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238644" version="1" comment="libarchive-devel is &lt;3.1.2-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238987" version="1" comment="kernel-docs is &lt;4.4.162-94.69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238988" version="1" comment="kernel-obs-build is &lt;4.4.162-94.69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239196" version="1" comment="libudev-devel is &lt;228-150.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239197" version="1" comment="systemd-devel is &lt;228-150.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239205" version="1" comment="postgresql10-devel is &lt;10.6-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239791" version="1" comment="libwpd-devel is &lt;0.10.2-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239792" version="1" comment="libwpd-devel-doc is &lt;0.10.2-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195788" version="1" comment="kernel-docs is &lt;4.4.114-94.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195789" version="1" comment="kernel-obs-build is &lt;4.4.114-94.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240651" version="1" comment="rpm-devel is &lt;4.11.2-16.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240652" version="1" comment="libexiv2-devel is &lt;0.23-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240757" version="1" comment="libtiff-devel is &lt;4.0.9-44.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240817" version="1" comment="dpdk is &lt;16.11.8-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240818" version="1" comment="dpdk-devel is &lt;16.11.8-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240819" version="1" comment="dpdk-thunderx is &lt;16.11.8-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240820" version="1" comment="dpdk-thunderx-devel is &lt;16.11.8-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241060" version="1" comment="php7-devel is &lt;7.0.7-50.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241195" version="1" comment="php5-devel is &lt;5.5.14-109.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241283" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-71.93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241284" version="1" comment="libMagick++-devel is &lt;6.8.8.1-71.93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241285" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-71.93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241621" version="1" comment="xen-devel is &lt;4.9.3_03-3.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241680" version="1" comment="ghostscript-devel is &lt;9.26-23.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241681" version="1" comment="libspectre-devel is &lt;0.2.7-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241682" version="1" comment="cups-devel is &lt;1.7.5-20.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241683" version="1" comment="git-arch is &lt;2.12.3-27.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241684" version="1" comment="git-cvs is &lt;2.12.3-27.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241685" version="1" comment="git-daemon is &lt;2.12.3-27.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241686" version="1" comment="git-email is &lt;2.12.3-27.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241687" version="1" comment="git-gui is &lt;2.12.3-27.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241688" version="1" comment="git-svn is &lt;2.12.3-27.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241689" version="1" comment="git-web is &lt;2.12.3-27.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241690" version="1" comment="gitk is &lt;2.12.3-27.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241927" version="1" comment="openldap2-back-perl is &lt;2.4.41-18.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241928" version="1" comment="openldap2-devel is &lt;2.4.41-18.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241929" version="1" comment="openldap2-devel-static is &lt;2.4.41-18.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241990" version="1" comment="libQt5Bootstrap-devel-static is &lt;5.6.2-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241991" version="1" comment="libQt5Concurrent-devel is &lt;5.6.2-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241992" version="1" comment="libQt5Core-devel is &lt;5.6.2-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241993" version="1" comment="libQt5Core-private-headers-devel is &lt;5.6.2-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241994" version="1" comment="libQt5DBus-devel is &lt;5.6.2-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241995" version="1" comment="libQt5DBus-private-headers-devel is &lt;5.6.2-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241996" version="1" comment="libQt5Gui-devel is &lt;5.6.2-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241997" version="1" comment="libQt5Gui-private-headers-devel is &lt;5.6.2-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241998" version="1" comment="libQt5Network-devel is &lt;5.6.2-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241999" version="1" comment="libQt5Network-private-headers-devel is &lt;5.6.2-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242000" version="1" comment="libQt5OpenGL-devel is &lt;5.6.2-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242001" version="1" comment="libQt5OpenGL-private-headers-devel is &lt;5.6.2-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242002" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.6.2-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242003" version="1" comment="libQt5PlatformHeaders-devel is &lt;5.6.2-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242004" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.6.2-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242005" version="1" comment="libQt5PlatformSupport-private-headers-devel is &lt;5.6.2-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242006" version="1" comment="libQt5PrintSupport-devel is &lt;5.6.2-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242007" version="1" comment="libQt5PrintSupport-private-headers-devel is &lt;5.6.2-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242008" version="1" comment="libQt5Sql-devel is &lt;5.6.2-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242009" version="1" comment="libQt5Sql-private-headers-devel is &lt;5.6.2-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242010" version="1" comment="libQt5Test-devel is &lt;5.6.2-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242011" version="1" comment="libQt5Test-private-headers-devel is &lt;5.6.2-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242012" version="1" comment="libQt5Widgets-devel is &lt;5.6.2-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242013" version="1" comment="libQt5Widgets-private-headers-devel is &lt;5.6.2-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242014" version="1" comment="libQt5Xml-devel is &lt;5.6.2-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242015" version="1" comment="libqt5-qtbase-common-devel is &lt;5.6.2-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242016" version="1" comment="libqt5-qtbase-devel is &lt;5.6.2-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242017" version="1" comment="libqt5-qtbase-private-headers-devel is &lt;5.6.2-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242096" version="1" comment="bluez-devel is &lt;5.13-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242097" version="1" comment="libtiff-devel is &lt;4.0.9-44.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195790" version="1" comment="xen-devel is &lt;4.9.1_08-3.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242235" version="1" comment="netatalk-devel is &lt;3.1.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242472" version="1" comment="wireshark-devel is &lt;2.4.11-48.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195792" version="1" comment="libsmbclient-devel is &lt;4.6.13+git.72.2a684235f41-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195793" version="1" comment="libtalloc-devel is &lt;2.1.10-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195794" version="1" comment="libtevent-devel is &lt;0.9.34-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195795" version="1" comment="libwbclient-devel is &lt;4.6.13+git.72.2a684235f41-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195796" version="1" comment="python-talloc-devel is &lt;2.1.10-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195797" version="1" comment="kernel-docs is &lt;4.4.120-94.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195798" version="1" comment="kernel-obs-build is &lt;4.4.120-94.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195799" version="1" comment="librelp is &lt;1.2.12-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195801" version="1" comment="spice-gtk-devel is &lt;0.33-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195803" version="1" comment="libvirt-devel is &lt;3.3.0-5.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251839" version="1" comment="zziplib-devel is &lt;0.13.67-10.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195805" version="1" comment="mercurial is &lt;2.8.2-15.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195806" version="1" comment="python3-devel is &lt;3.4.6-25.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195808" version="1" comment="ocaml-compiler-libs is &lt;4.03.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195809" version="1" comment="ocaml-rpm-macros is &lt;4.03.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195810" version="1" comment="ocaml-runtime is &lt;4.03.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195811" version="1" comment="wireshark-devel is &lt;2.2.14-48.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195812" version="1" comment="kernel-docs is &lt;4.4.126-94.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195813" version="1" comment="kernel-obs-build is &lt;4.4.126-94.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195814" version="1" comment="PackageKit-devel is &lt;1.1.3-24.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195815" version="1" comment="libpackagekit-glib2-devel is &lt;1.1.3-24.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195816" version="1" comment="boost-devel is &lt;1.54.0-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195817" version="1" comment="libboost_chrono1_54_0 is &lt;1.54.0-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195818" version="1" comment="libboost_context1_54_0 is &lt;1.54.0-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195819" version="1" comment="libboost_graph1_54_0 is &lt;1.54.0-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195820" version="1" comment="libboost_graph_parallel1_54_0 is &lt;1.54.0-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195821" version="1" comment="libboost_log1_54_0 is &lt;1.54.0-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195822" version="1" comment="libboost_math1_54_0 is &lt;1.54.0-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195823" version="1" comment="libboost_mpi1_54_0 is &lt;1.54.0-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195824" version="1" comment="libboost_python1_54_0 is &lt;1.54.0-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195825" version="1" comment="libboost_serialization1_54_0 is &lt;1.54.0-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195826" version="1" comment="libboost_test1_54_0 is &lt;1.54.0-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195827" version="1" comment="libboost_timer1_54_0 is &lt;1.54.0-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195828" version="1" comment="libboost_wave1_54_0 is &lt;1.54.0-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195829" version="1" comment="libepubgen-devel is &lt;0.1.0-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195830" version="1" comment="libixion-devel is &lt;0.13.0-13.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195833" version="1" comment="liborcus-devel is &lt;0.13.4-10.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195834" version="1" comment="libqxp-devel is &lt;0.0.1-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195835" version="1" comment="libqxp-doc is &lt;0.0.1-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195836" version="1" comment="libqxp-tools is &lt;0.0.1-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195837" version="1" comment="libwps-devel is &lt;0.4.7-10.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195839" version="1" comment="dovecot22 is &lt;2.2.31-19.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195840" version="1" comment="dovecot22-devel is &lt;2.2.31-19.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195841" version="1" comment="kernel-docs is &lt;4.4.103-94.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195842" version="1" comment="kernel-obs-build is &lt;4.4.103-94.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195843" version="1" comment="apache2-devel is &lt;2.4.23-29.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195844" version="1" comment="php7-devel is &lt;7.0.7-50.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195845" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-71.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195846" version="1" comment="libMagick++-devel is &lt;6.8.8.1-71.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195847" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-71.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195848" version="1" comment="libtiff-devel is &lt;4.0.9-44.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195849" version="1" comment="xen-devel is &lt;4.9.2_04-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195855" version="1" comment="php5-devel is &lt;5.5.14-109.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195856" version="1" comment="libvorbis-devel is &lt;1.3.3-10.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195857" version="1" comment="libcurl-devel is &lt;7.37.0-37.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195858" version="1" comment="ghostscript-devel is &lt;9.15-23.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195859" version="1" comment="kernel-docs is &lt;4.4.131-94.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195860" version="1" comment="kernel-obs-build is &lt;4.4.131-94.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195861" version="1" comment="bash-devel is &lt;4.3-83.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195862" version="1" comment="readline-devel is &lt;6.3-83.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195864" version="1" comment="libcephfs-devel is &lt;12.2.5+git.1524775272.5e7ea8cf03-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195865" version="1" comment="librados-devel is &lt;12.2.5+git.1524775272.5e7ea8cf03-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195866" version="1" comment="librbd-devel is &lt;12.2.5+git.1524775272.5e7ea8cf03-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195869" version="1" comment="xen-devel is &lt;4.9.2_06-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251840" version="1" comment="libntfs-3g-devel is &lt;2013.1.13-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251992" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.24.0-2.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251993" version="1" comment="webkit2gtk3-devel is &lt;2.24.0-2.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252295" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-71.108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252296" version="1" comment="libMagick++-devel is &lt;6.8.8.1-71.108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252297" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-71.108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252298" version="1" comment="libndr-devel is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252299" version="1" comment="libndr-krb5pac-devel is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252300" version="1" comment="libndr-nbt-devel is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252301" version="1" comment="libndr-standard-devel is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252302" version="1" comment="libsamba-util-devel is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252303" version="1" comment="libsmbclient-devel is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252304" version="1" comment="libwbclient-devel is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252305" version="1" comment="samba-core-devel is &lt;4.6.16+git.154.2998451b912-3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252306" version="1" comment="wireshark-devel is &lt;2.4.14-48.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252307" version="1" comment="php7-devel is &lt;7.0.7-50.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252419" version="1" comment="libvirt-devel is &lt;3.3.0-5.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252445" version="1" comment="libssh2-devel is &lt;1.4.3-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252761" version="1" comment="libpacemaker-devel is &lt;1.1.16-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243071" version="1" comment="krb5-devel is &lt;1.12.5-40.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252762" version="1" comment="libjpeg62-devel is &lt;62.2.0-31.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252763" version="1" comment="libjpeg8-devel is &lt;8.1.2-31.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252971" version="1" comment="audit-devel is &lt;2.8.1-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252972" version="1" comment="freeradius-server is &lt;3.0.15-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252973" version="1" comment="freeradius-server-devel is &lt;3.0.15-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253249" version="1" comment="sqlite3-devel is &lt;3.8.10.2-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253468" version="1" comment="libxslt-devel is &lt;1.1.28-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253469" version="1" comment="kernel-docs is &lt;4.4.178-94.91" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253470" version="1" comment="kernel-obs-build is &lt;4.4.178-94.91" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253472" version="1" comment="xen-devel is &lt;4.9.4_04-3.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253678" version="1" comment="systemd-devel is &lt;228-150.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243178" version="1" comment="libraw-devel is &lt;0.15.4-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243179" version="1" comment="libraw-devel-static is &lt;0.15.4-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243180" version="1" comment="PackageKit-devel is &lt;1.1.3-24.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243181" version="1" comment="libpackagekit-glib2-devel is &lt;1.1.3-24.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254106" version="1" comment="php5-devel is &lt;5.5.14-109.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254199" version="1" comment="bluez-devel is &lt;5.13-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243256" version="1" comment="freerdp-devel is &lt;2.0.0~git.1463131968.4e66df7-12.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243257" version="1" comment="libudev-devel is &lt;228-150.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243258" version="1" comment="systemd-devel is &lt;228-150.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254365" version="1" comment="php72-devel is &lt;7.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254528" version="1" comment="libcurl-devel is &lt;7.37.0-37.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254529" version="1" comment="php7-devel is &lt;7.0.7-50.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254569" version="1" comment="libtasn1-devel is &lt;4.9-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243259" version="1" comment="wireshark-devel is &lt;2.4.12-48.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255758" version="1" comment="gnome-shell-devel is &lt;3.20.4-77.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255759" version="1" comment="evolution-devel is &lt;3.22.6-19.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243304" version="1" comment="ghostscript-devel is &lt;9.26a-23.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243305" version="1" comment="libspectre-devel is &lt;0.2.7-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256401" version="1" comment="libixion-devel is &lt;0.14.1-13.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256402" version="1" comment="liborcus-devel is &lt;0.14.1-10.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256403" version="1" comment="libwps-devel is &lt;0.4.10-10.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256734" version="1" comment="libcroco-devel is &lt;0.6.11-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256735" version="1" comment="libipa_hbac-devel is &lt;1.13.4-34.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256736" version="1" comment="libsss_idmap-devel is &lt;1.13.4-34.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256737" version="1" comment="libsss_nss_idmap-devel is &lt;1.13.4-34.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256829" version="1" comment="postgresql10-devel is &lt;10.8-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257027" version="1" comment="kernel-docs is &lt;4.4.180-94.97" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257028" version="1" comment="kernel-obs-build is &lt;4.4.180-94.97" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257168" version="1" comment="libvirt-devel is &lt;3.3.0-5.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257904" version="1" comment="gstreamer-plugins-base-devel is &lt;1.8.3-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257905" version="1" comment="typelib-1_0-GstAllocators-1_0 is &lt;1.8.3-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257906" version="1" comment="typelib-1_0-GstApp-1_0 is &lt;1.8.3-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257907" version="1" comment="typelib-1_0-GstFft-1_0 is &lt;1.8.3-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257908" version="1" comment="typelib-1_0-GstRtp-1_0 is &lt;1.8.3-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257909" version="1" comment="typelib-1_0-GstRtsp-1_0 is &lt;1.8.3-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257910" version="1" comment="typelib-1_0-GstSdp-1_0 is &lt;1.8.3-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257911" version="1" comment="sqlite3-devel is &lt;3.8.10.2-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257912" version="1" comment="gstreamer-0_10-plugins-base-devel is &lt;0.10.36-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257913" version="1" comment="typelib-1_0-GstApp-0_10 is &lt;0.10.36-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257914" version="1" comment="typelib-1_0-GstInterfaces-0_10 is &lt;0.10.36-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257915" version="1" comment="libssh2-devel is &lt;1.4.3-20.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257916" version="1" comment="wireshark-devel is &lt;2.4.15-48.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257917" version="1" comment="libnetpbm-devel is &lt;10.66.3-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258074" version="1" comment="postgresql96-devel is &lt;9.6.13-3.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258242" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-71.123" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258243" version="1" comment="libMagick++-devel is &lt;6.8.8.1-71.123" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258244" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-71.123" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258646" version="1" comment="glib2-devel is &lt;2.48.2-12.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258647" version="1" comment="glib2-devel-static is &lt;2.48.2-12.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258648" version="1" comment="php72-devel is &lt;7.2.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258649" version="1" comment="php7-devel is &lt;7.0.7-50.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258678" version="1" comment="libasm-devel is &lt;0.158-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258679" version="1" comment="libdw-devel is &lt;0.158-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258680" version="1" comment="libebl-devel is &lt;0.158-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258805" version="1" comment="php5-devel is &lt;5.5.14-109.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243396" version="1" comment="avahi-compat-howl-devel is &lt;0.6.32-32.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243397" version="1" comment="avahi-compat-mDNSResponder-devel is &lt;0.6.32-32.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243398" version="1" comment="libavahi-devel is &lt;0.6.32-32.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243399" version="1" comment="libavahi-glib-devel is &lt;0.6.32-32.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243400" version="1" comment="libavahi-gobject-devel is &lt;0.6.32-32.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243401" version="1" comment="libhowl0 is &lt;0.6.32-32.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243402" version="1" comment="typelib-1_0-Avahi-0_6 is &lt;0.6.32-32.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260600" version="1" comment="kernel-docs is &lt;4.4.180-94.100" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260601" version="1" comment="kernel-obs-build is &lt;4.4.180-94.100" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242807" version="1" comment="polkit-devel is &lt;0.113-5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242591" version="1" comment="libraw-devel is &lt;0.15.4-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242592" version="1" comment="libraw-devel-static is &lt;0.15.4-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242814" version="1" comment="libgit2 is &lt;0.24.1-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242815" version="1" comment="libgit2-24 is &lt;0.24.1-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243792" version="1" comment="libspice-server-devel is &lt;0.12.8-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243793" version="1" comment="python3-devel is &lt;3.4.6-25.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243868" version="1" comment="libcurl-devel is &lt;7.37.0-37.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243932" version="1" comment="libunwind-devel is &lt;1.1-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244056" version="1" comment="LibVNCServer-devel is &lt;0.9.9-17.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244170" version="1" comment="php7-devel is &lt;7.0.7-50.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244493" version="1" comment="python-numpy-devel is &lt;1.8.0-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244672" version="1" comment="libudev-devel is &lt;228-150.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244673" version="1" comment="systemd-devel is &lt;228-150.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244876" version="1" comment="php5-devel is &lt;5.5.14-109.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244877" version="1" comment="procps-devel is &lt;3.3.9-11.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245066" version="1" comment="apache2 is &lt;2.4.23-29.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245067" version="1" comment="apache2-devel is &lt;2.4.23-29.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245068" version="1" comment="libcephfs-devel is &lt;12.2.10+git.1549630712.bb089269ea-2.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245069" version="1" comment="librados-devel is &lt;12.2.10+git.1549630712.bb089269ea-2.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245070" version="1" comment="librbd-devel is &lt;12.2.10+git.1549630712.bb089269ea-2.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245492" version="1" comment="kernel-docs is &lt;4.4.175-94.79" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245493" version="1" comment="kernel-obs-build is &lt;4.4.175-94.79" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242872" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.22.4-2.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242873" version="1" comment="webkit2gtk3-devel is &lt;2.22.4-2.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242874" version="1" comment="LibVNCServer-devel is &lt;0.9.9-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246077" version="1" comment="libssh2-devel is &lt;1.4.3-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246078" version="1" comment="libwsman-devel is &lt;2.4.11-21.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246079" version="1" comment="libwsman_clientpp-devel is &lt;2.4.11-21.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246080" version="1" comment="openwsman-python is &lt;2.4.11-21.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246167" version="1" comment="wireshark-devel is &lt;2.4.13-48.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246168" version="1" comment="ghostscript-devel is &lt;9.26a-23.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246307" version="1" comment="gd-devel is &lt;2.1.0-24.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246561" version="1" comment="kernel-docs is &lt;4.4.176-94.88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246562" version="1" comment="kernel-obs-build is &lt;4.4.176-94.88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246563" version="1" comment="libipa_hbac-devel is &lt;1.13.4-34.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246564" version="1" comment="libsss_idmap-devel is &lt;1.13.4-34.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246565" version="1" comment="libsss_nss_idmap-devel is &lt;1.13.4-34.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242913" version="1" comment="libipa_hbac-devel is &lt;1.13.4-34.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242914" version="1" comment="libsss_idmap-devel is &lt;1.13.4-34.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242915" version="1" comment="libsss_nss_idmap-devel is &lt;1.13.4-34.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246784" version="1" comment="bash-devel is &lt;4.3-83.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246785" version="1" comment="readline-devel is &lt;6.3-83.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246786" version="1" comment="file-devel is &lt;5.22-10.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246787" version="1" comment="python-magic is &lt;5.22-10.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247039" version="1" comment="apache2-devel is &lt;2.4.23-29.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247243" version="1" comment="libSDL-devel is &lt;1.2.15-15.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247244" version="1" comment="dovecot22-devel is &lt;2.2.31-19.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247245" version="1" comment="sqlite3-devel is &lt;3.8.10.2-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247246" version="1" comment="xen-devel is &lt;4.9.4_02-3.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247247" version="1" comment="libxmltooling-devel is &lt;1.5.6-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247248" version="1" comment="xmltooling is &lt;1.5.6-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243044" version="1" comment="soundtouch-devel is &lt;1.7.1-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251268" version="1" comment="python3-devel is &lt;3.4.6-25.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251485" version="1" comment="php5-devel is &lt;5.5.14-109.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251688" version="1" comment="php72-devel is &lt;7.2.5-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251689" version="1" comment="libcurl-devel is &lt;7.37.0-37.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240890" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240891" version="1" comment="libopenssl-1_1-devel-32bit is &lt;1.1.1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241622" version="1" comment="kernel-docs is &lt;4.12.14-95.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241623" version="1" comment="kernel-obs-build is &lt;4.12.14-95.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242184" version="1" comment="libmysqlclient-devel is &lt;10.0.37-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242185" version="1" comment="libmysqld-devel is &lt;10.0.37-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242186" version="1" comment="libmysqld18 is &lt;10.0.37-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252420" version="1" comment="libpacemaker-devel is &lt;1.1.19+20181105.ccd6b5b10-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252764" version="1" comment="glibc-devel-static is &lt;2.22-100.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252765" version="1" comment="glibc-info is &lt;2.22-100.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252870" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1b-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252871" version="1" comment="libopenssl-1_1-devel-32bit is &lt;1.1.1b-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253473" version="1" comment="kernel-docs is &lt;4.12.14-95.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253474" version="1" comment="kernel-obs-build is &lt;4.12.14-95.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253476" version="1" comment="xen-devel is &lt;4.11.1_06-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254200" version="1" comment="libvirt-devel is &lt;4.0.0-8.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256738" version="1" comment="libipa_hbac-devel is &lt;1.16.1-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256739" version="1" comment="libsss_idmap-devel is &lt;1.16.1-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256740" version="1" comment="libsss_nss_idmap-devel is &lt;1.16.1-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257029" version="1" comment="kernel-docs is &lt;4.12.14-95.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257030" version="1" comment="kernel-obs-build is &lt;4.12.14-95.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257918" version="1" comment="libvirt-devel is &lt;4.0.0-8.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258277" version="1" comment="glibc-devel-static is &lt;2.22-100.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258278" version="1" comment="glibc-info is &lt;2.22-100.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259014" version="1" comment="postgresql10-devel is &lt;10.9-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259015" version="1" comment="zeromq-devel is &lt;4.0.4-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259050" version="1" comment="libdlm-devel is &lt;4.0.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259051" version="1" comment="libqb-devel is &lt;1.0.3+20171226.6d62b64-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259207" version="1" comment="glib2-devel is &lt;2.48.2-12.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259208" version="1" comment="glib2-devel-static is &lt;2.48.2-12.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259209" version="1" comment="libexpat-devel is &lt;2.1.0-21.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259361" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.24.2-2.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259362" version="1" comment="webkit2gtk3-devel is &lt;2.24.2-2.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259363" version="1" comment="kernel-docs is &lt;4.12.14-95.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259364" version="1" comment="kernel-obs-build is &lt;4.12.14-95.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259439" version="1" comment="libxslt-devel is &lt;1.1.28-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260030" version="1" comment="libxml2-devel is &lt;2.9.4-46.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260496" version="1" comment="libbz2-devel is &lt;1.0.6-30.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243403" version="1" comment="kernel-docs is &lt;4.12.14-95.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243404" version="1" comment="kernel-obs-build is &lt;4.12.14-95.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260602" version="1" comment="openexr-devel is &lt;2.1.0-6.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260644" version="1" comment="libsolv-devel is &lt;0.6.36-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260645" version="1" comment="libzypp-devel is &lt;16.20.0-2.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260646" version="1" comment="libzypp-devel-doc is &lt;16.20.0-2.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260844" version="1" comment="libcurl-devel is &lt;7.60.0-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260845" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-71.126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260846" version="1" comment="libMagick++-devel is &lt;6.8.8.1-71.126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260847" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-71.126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260848" version="1" comment="libbz2-devel is &lt;1.0.6-30.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260849" version="1" comment="openexr-devel is &lt;2.1.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261322" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.8.19-25.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261323" version="1" comment="subversion is &lt;1.8.19-25.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261324" version="1" comment="subversion-bash-completion is &lt;1.8.19-25.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261325" version="1" comment="subversion-devel is &lt;1.8.19-25.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261326" version="1" comment="subversion-perl is &lt;1.8.19-25.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261327" version="1" comment="subversion-python is &lt;1.8.19-25.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261328" version="1" comment="subversion-server is &lt;1.8.19-25.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261329" version="1" comment="subversion-tools is &lt;1.8.19-25.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261330" version="1" comment="polkit-devel is &lt;0.113-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261331" version="1" comment="python3-dbm is &lt;3.4.6-25.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261332" version="1" comment="python3-devel is &lt;3.4.6-25.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261333" version="1" comment="kernel-docs is &lt;4.12.14-95.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261334" version="1" comment="kernel-obs-build is &lt;4.12.14-95.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261335" version="1" comment="evince-devel is &lt;3.20.2-6.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261336" version="1" comment="wireshark-devel is &lt;2.4.16-48.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261466" version="1" comment="libmysqlclient-devel is &lt;10.0.38-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261467" version="1" comment="libmysqld-devel is &lt;10.0.38-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261468" version="1" comment="libmysqld18 is &lt;10.0.38-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263092" version="1" comment="fontforge is &lt;20170731-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263093" version="1" comment="php7-devel is &lt;7.0.7-50.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263341" version="1" comment="NetworkManager-devel is &lt;1.0.12-13.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263342" version="1" comment="libpacemaker-devel is &lt;1.1.19+20181105.ccd6b5b10-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263343" version="1" comment="postgresql10-devel is &lt;10.10-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263344" version="1" comment="php72-devel is &lt;7.2.5-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263872" version="1" comment="apache2 is &lt;2.4.23-29.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263873" version="1" comment="apache2-devel is &lt;2.4.23-29.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263935" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.24.4-2.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263936" version="1" comment="webkit2gtk3-devel is &lt;2.24.4-2.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263937" version="1" comment="ghostscript-devel is &lt;9.26a-23.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264567" version="1" comment="libcephfs-devel is &lt;12.2.12+git.1568024032.02236657ca-2.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264568" version="1" comment="librados-devel is &lt;12.2.12+git.1568024032.02236657ca-2.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264569" version="1" comment="librbd-devel is &lt;12.2.12+git.1568024032.02236657ca-2.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264577" version="1" comment="libcurl-devel is &lt;7.60.0-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264638" version="1" comment="ibus-devel is &lt;1.5.13-15.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264639" version="1" comment="openldap2-back-perl is &lt;2.4.41-18.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264640" version="1" comment="openldap2-devel is &lt;2.4.41-18.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264641" version="1" comment="openldap2-devel-static is &lt;2.4.41-18.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265058" version="1" comment="kernel-docs is &lt;4.12.14-95.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265059" version="1" comment="kernel-obs-build is &lt;4.12.14-95.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243794" version="1" comment="python3-dbm is &lt;3.4.6-25.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265181" version="1" comment="libexpat-devel is &lt;2.1.0-21.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265182" version="1" comment="libdjvulibre-devel is &lt;3.5.25.3-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265183" version="1" comment="dovecot22-devel is &lt;2.2.31-19.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265274" version="1" comment="ghostscript-devel is &lt;9.27-23.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242593" version="1" comment="xen-devel is &lt;4.11.1_02-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244219" version="1" comment="libcurl-devel is &lt;7.60.0-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245352" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245353" version="1" comment="libopenssl-1_1-devel-32bit is &lt;1.1.1-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245577" version="1" comment="libipa_hbac-devel is &lt;1.16.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245578" version="1" comment="libsss_idmap-devel is &lt;1.16.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245579" version="1" comment="libsss_nss_idmap-devel is &lt;1.16.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245580" version="1" comment="audit-devel is &lt;2.8.1-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246308" version="1" comment="kernel-docs is &lt;4.12.14-95.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246309" version="1" comment="kernel-obs-build is &lt;4.12.14-95.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246481" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246482" version="1" comment="libopenssl-1_1-devel-32bit is &lt;1.1.1-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247249" version="1" comment="xen-devel is &lt;4.11.1_04-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251180" version="1" comment="libvirt-devel is &lt;4.0.0-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251269" version="1" comment="python3-dbm is &lt;3.4.6-25.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258032" version="1" comment="sle-sdk-release is ==12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195870" version="1" comment="libgnutls-openssl27 is &lt;3.2.15-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195871" version="1" comment="docker is &lt;1.3.2-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195872" version="1" comment="ruby2.1-rubygem-sle2docker is &lt;0.2.3-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195873" version="1" comment="sle2docker is &lt;0.2.3-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195874" version="1" comment="openvpn-auth-pam-plugin is &lt;2.3.2-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195875" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.71-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195876" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.71-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195877" version="1" comment="rsyslog-diag-tools is &lt;8.4.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195878" version="1" comment="rsyslog-doc is &lt;8.4.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195879" version="1" comment="rsyslog-module-gssapi is &lt;8.4.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195880" version="1" comment="rsyslog-module-gtls is &lt;8.4.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195881" version="1" comment="rsyslog-module-mysql is &lt;8.4.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195882" version="1" comment="rsyslog-module-pgsql is &lt;8.4.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195883" version="1" comment="rsyslog-module-relp is &lt;8.4.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195884" version="1" comment="rsyslog-module-snmp is &lt;8.4.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195885" version="1" comment="rsyslog-module-udpspoof is &lt;8.4.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195886" version="1" comment="libfreebl3-hmac is &lt;3.17.2-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195887" version="1" comment="libfreebl3-hmac-32bit is &lt;3.17.2-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195888" version="1" comment="libsoftokn3-hmac is &lt;3.17.2-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195889" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.17.2-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195890" version="1" comment="python-32bit is &lt;2.7.7-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195891" version="1" comment="python-base-32bit is &lt;2.7.7-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195892" version="1" comment="python-demo is &lt;2.7.7-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195893" version="1" comment="python-doc is &lt;2.7.7-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195894" version="1" comment="python-doc-pdf is &lt;2.7.7-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195895" version="1" comment="python-gdbm is &lt;2.7.7-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195896" version="1" comment="python-idle is &lt;2.7.7-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195897" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195898" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195899" version="1" comment="openssl-doc is &lt;1.0.1i-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195900" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr2.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195901" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr2.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195902" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr2.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195903" version="1" comment="xen-doc-html is &lt;4.4.3_06-22.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195904" version="1" comment="xen-tools is &lt;4.4.3_06-22.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195905" version="1" comment="xen-tools-domU is &lt;4.4.3_06-22.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195906" version="1" comment="bind-chrootenv is &lt;9.9.6P1-28.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195907" version="1" comment="bind-doc is &lt;9.9.6P1-28.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195908" version="1" comment="grub2-powerpc-ieee1275 is &lt;2.02~beta2-56.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195909" version="1" comment="grub2-s390x-emu is &lt;2.02~beta2-56.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195910" version="1" comment="postgresql93-contrib is &lt;9.3.6-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195911" version="1" comment="postgresql93-docs is &lt;9.3.6-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195912" version="1" comment="postgresql93-server is &lt;9.3.6-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195913" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.75-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195914" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.75-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195915" version="1" comment="vsftpd is &lt;3.0.2-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195916" version="1" comment="glibc-html is &lt;2.19-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195917" version="1" comment="glibc-info is &lt;2.19-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195918" version="1" comment="glibc-profile is &lt;2.19-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195919" version="1" comment="glibc-profile-32bit is &lt;2.19-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195920" version="1" comment="kernel-default-base is &lt;3.12.38-44" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195921" version="1" comment="kernel-default-man is &lt;3.12.38-44" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195922" version="1" comment="kernel-xen-base is &lt;3.12.38-44" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195923" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195924" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195925" version="1" comment="openssl-doc is &lt;1.0.1i-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195926" version="1" comment="xen-doc-html is &lt;4.4.1_10-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195927" version="1" comment="xen-tools is &lt;4.4.1_10-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195928" version="1" comment="xen-tools-domU is &lt;4.4.1_10-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195929" version="1" comment="kernel-default-base is &lt;3.12.39-47" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195930" version="1" comment="kernel-default-man is &lt;3.12.39-47" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195931" version="1" comment="kernel-xen-base is &lt;3.12.39-47" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195932" version="1" comment="xen-doc-html is &lt;4.4.2_02-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195933" version="1" comment="xen-tools is &lt;4.4.2_02-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195934" version="1" comment="xen-tools-domU is &lt;4.4.2_02-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195935" version="1" comment="libgnutls-openssl27 is &lt;3.2.15-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195936" version="1" comment="mariadb-tools is &lt;10.0.16-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195937" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.79-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195938" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.79-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195939" version="1" comment="qemu-block-rbd is &lt;2.0.2-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195940" version="1" comment="qemu-guest-agent is &lt;2.0.2-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195941" version="1" comment="qemu-lang is &lt;2.0.2-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195942" version="1" comment="qemu-ppc is &lt;2.0.2-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195943" version="1" comment="qemu-s390 is &lt;2.0.2-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195944" version="1" comment="xen-doc-html is &lt;4.4.2_04-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195945" version="1" comment="xen-tools is &lt;4.4.2_04-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195946" version="1" comment="xen-tools-domU is &lt;4.4.2_04-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195947" version="1" comment="kernel-default-base is &lt;3.12.32-33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195948" version="1" comment="kernel-default-man is &lt;3.12.32-33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195949" version="1" comment="kernel-xen-base is &lt;3.12.32-33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195950" version="1" comment="apache2-doc is &lt;2.4.10-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195951" version="1" comment="apache2-example-pages is &lt;2.4.10-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195952" version="1" comment="apache2-prefork is &lt;2.4.10-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195953" version="1" comment="apache2-utils is &lt;2.4.10-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195954" version="1" comment="apache2-worker is &lt;2.4.10-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195955" version="1" comment="libfreebl3-hmac is &lt;3.17.3-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195956" version="1" comment="libfreebl3-hmac-32bit is &lt;3.17.3-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195957" version="1" comment="libsoftokn3-hmac is &lt;3.17.3-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195958" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.17.3-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195959" version="1" comment="xen-doc-html is &lt;4.4.2_06-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195960" version="1" comment="xen-tools is &lt;4.4.2_06-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195961" version="1" comment="xen-tools-domU is &lt;4.4.2_06-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195962" version="1" comment="kernel-default-base is &lt;3.12.43-52.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195963" version="1" comment="kernel-default-man is &lt;3.12.43-52.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195964" version="1" comment="kernel-xen-base is &lt;3.12.43-52.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195965" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.0-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195966" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.0-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195967" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.0-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195968" version="1" comment="openldap2-back-meta is &lt;2.4.39-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195969" version="1" comment="docker is &lt;1.4.1-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195970" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195971" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195972" version="1" comment="openssl-doc is &lt;1.0.1i-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195973" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195974" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.6.1-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195975" version="1" comment="bind-chrootenv is &lt;9.9.6P1-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195976" version="1" comment="bind-doc is &lt;9.9.6P1-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195977" version="1" comment="postgresql93-contrib is &lt;9.3.8-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195978" version="1" comment="postgresql93-docs is &lt;9.3.8-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195979" version="1" comment="postgresql93-server is &lt;9.3.8-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195980" version="1" comment="libfreebl3-hmac is &lt;3.19.2_CKBI_1.98-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195981" version="1" comment="libfreebl3-hmac-32bit is &lt;3.19.2_CKBI_1.98-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195982" version="1" comment="libsoftokn3-hmac is &lt;3.19.2_CKBI_1.98-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195983" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.19.2_CKBI_1.98-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195984" version="1" comment="mariadb-tools is &lt;10.0.20-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195985" version="1" comment="krb5-32bit is &lt;1.12.1-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195986" version="1" comment="krb5-client is &lt;1.12.1-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195987" version="1" comment="krb5-doc is &lt;1.12.1-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195988" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.1-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195989" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.1-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195990" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.1-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195991" version="1" comment="krb5-server is &lt;1.12.1-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195992" version="1" comment="tomcat is &lt;7.0.55-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195993" version="1" comment="tomcat-admin-webapps is &lt;7.0.55-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195994" version="1" comment="tomcat-docs-webapp is &lt;7.0.55-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195995" version="1" comment="tomcat-el-2_2-api is &lt;7.0.55-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195996" version="1" comment="tomcat-javadoc is &lt;7.0.55-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195997" version="1" comment="tomcat-jsp-2_2-api is &lt;7.0.55-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195998" version="1" comment="tomcat-lib is &lt;7.0.55-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009195999" version="1" comment="tomcat-servlet-3_0-api is &lt;7.0.55-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196000" version="1" comment="tomcat-webapps is &lt;7.0.55-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196001" version="1" comment="xen-doc-html is &lt;4.4.2_08-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196002" version="1" comment="xen-tools is &lt;4.4.2_08-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196003" version="1" comment="xen-tools-domU is &lt;4.4.2_08-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196004" version="1" comment="bind-chrootenv is &lt;9.9.6P1-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196005" version="1" comment="bind-doc is &lt;9.9.6P1-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196006" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.85-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196007" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.85-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196008" version="1" comment="kernel-default-base is &lt;3.12.44-52.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196009" version="1" comment="kernel-default-man is &lt;3.12.44-52.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196010" version="1" comment="kernel-xen-base is &lt;3.12.44-52.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196011" version="1" comment="bind-chrootenv is &lt;9.9.5P1-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196012" version="1" comment="bind-doc is &lt;9.9.5P1-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196013" version="1" comment="python-32bit is &lt;2.7.9-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196014" version="1" comment="python-base-32bit is &lt;2.7.9-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196015" version="1" comment="python-demo is &lt;2.7.9-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196016" version="1" comment="python-doc is &lt;2.7.9-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196017" version="1" comment="python-doc-pdf is &lt;2.7.9-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196018" version="1" comment="python-gdbm is &lt;2.7.9-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196019" version="1" comment="python-idle is &lt;2.7.9-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196020" version="1" comment="xen-doc-html is &lt;4.4.2_10-22.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196021" version="1" comment="xen-tools is &lt;4.4.2_10-22.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196022" version="1" comment="xen-tools-domU is &lt;4.4.2_10-22.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196023" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-27.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196024" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-27.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196025" version="1" comment="openssl-doc is &lt;1.0.1i-27.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196026" version="1" comment="libfreebl3-hmac is &lt;3.19.2.0-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196027" version="1" comment="libfreebl3-hmac-32bit is &lt;3.19.2.0-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196028" version="1" comment="libsoftokn3-hmac is &lt;3.19.2.0-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196029" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.19.2.0-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196030" version="1" comment="bind-chrootenv is &lt;9.9.6P1-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196031" version="1" comment="bind-doc is &lt;9.9.6P1-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196032" version="1" comment="kernel-default-base is &lt;3.12.36-38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196033" version="1" comment="kernel-default-man is &lt;3.12.36-38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196034" version="1" comment="kernel-xen-base is &lt;3.12.36-38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196035" version="1" comment="qemu-block-rbd is &lt;2.0.2-48.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196036" version="1" comment="qemu-guest-agent is &lt;2.0.2-48.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196037" version="1" comment="qemu-lang is &lt;2.0.2-48.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196038" version="1" comment="qemu-ppc is &lt;2.0.2-48.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196039" version="1" comment="qemu-s390 is &lt;2.0.2-48.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196040" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196041" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196042" version="1" comment="openssl-doc is &lt;1.0.1i-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196043" version="1" comment="powerpc-utils is &lt;1.2.22-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196044" version="1" comment="kernel-default-base is &lt;3.12.44-52.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196045" version="1" comment="kernel-default-man is &lt;3.12.44-52.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196046" version="1" comment="kernel-xen-base is &lt;3.12.44-52.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196047" version="1" comment="libvirt-lock-sanlock is &lt;1.2.5-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196048" version="1" comment="kernel-default-base is &lt;3.12.48-52.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196049" version="1" comment="kernel-default-man is &lt;3.12.48-52.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196050" version="1" comment="kernel-xen-base is &lt;3.12.48-52.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196051" version="1" comment="strongswan-hmac is &lt;5.1.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196052" version="1" comment="qemu-block-rbd is &lt;2.0.2-48.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196053" version="1" comment="qemu-guest-agent is &lt;2.0.2-48.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196054" version="1" comment="qemu-lang is &lt;2.0.2-48.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196055" version="1" comment="qemu-ppc is &lt;2.0.2-48.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196056" version="1" comment="qemu-s390 is &lt;2.0.2-48.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196057" version="1" comment="krb5-doc is &lt;1.12.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196058" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196059" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196060" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196061" version="1" comment="krb5-server is &lt;1.12.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196062" version="1" comment="postgresql93-contrib is &lt;9.3.10-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196063" version="1" comment="postgresql93-docs is &lt;9.3.10-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196064" version="1" comment="postgresql93-server is &lt;9.3.10-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196065" version="1" comment="glibc-html is &lt;2.19-22.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196066" version="1" comment="glibc-info is &lt;2.19-22.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196067" version="1" comment="glibc-profile is &lt;2.19-22.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196068" version="1" comment="glibc-profile-32bit is &lt;2.19-22.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196069" version="1" comment="apache2-doc is &lt;2.4.10-14.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196070" version="1" comment="apache2-example-pages is &lt;2.4.10-14.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196071" version="1" comment="apache2-mod_auth_kerb is &lt;5.4-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196072" version="1" comment="apache2-mod_jk is &lt;1.2.40-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196073" version="1" comment="apache2-mod_security2 is &lt;2.8.0-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196074" version="1" comment="apache2-prefork is &lt;2.4.10-14.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196075" version="1" comment="apache2-utils is &lt;2.4.10-14.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196076" version="1" comment="apache2-worker is &lt;2.4.10-14.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196077" version="1" comment="xen-doc-html is &lt;4.4.3_02-22.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196078" version="1" comment="xen-tools is &lt;4.4.3_02-22.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196079" version="1" comment="xen-tools-domU is &lt;4.4.3_02-22.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196080" version="1" comment="xen-doc-html is &lt;4.4.1_08-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196081" version="1" comment="xen-tools is &lt;4.4.1_08-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196082" version="1" comment="xen-tools-domU is &lt;4.4.1_08-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196083" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr2.10-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196084" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr2.10-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196085" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr2.10-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196086" version="1" comment="dracut-fips is &lt;037-51.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196087" version="1" comment="qemu-guest-agent is &lt;2.0.2-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196088" version="1" comment="qemu-lang is &lt;2.0.2-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196089" version="1" comment="qemu-ppc is &lt;2.0.2-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196090" version="1" comment="qemu-s390 is &lt;2.0.2-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196091" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.20-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196092" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.20-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196093" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.20-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196094" version="1" comment="kernel-default-base is &lt;3.12.51-52.31" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196095" version="1" comment="kernel-default-man is &lt;3.12.51-52.31" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196096" version="1" comment="kernel-xen-base is &lt;3.12.51-52.31" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196097" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-27.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196098" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-27.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196099" version="1" comment="openssl-doc is &lt;1.0.1i-27.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196100" version="1" comment="krb5-doc is &lt;1.12.1-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196101" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.1-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196102" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.1-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196103" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.1-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196104" version="1" comment="krb5-server is &lt;1.12.1-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196105" version="1" comment="tdb-tools is &lt;1.3.8-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196106" version="1" comment="kernel-default-base is &lt;3.12.60-52.49" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196107" version="1" comment="kernel-default-man is &lt;3.12.60-52.49" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196108" version="1" comment="kernel-xen-base is &lt;3.12.60-52.49" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196109" version="1" comment="dhcp-relay is &lt;4.2.6-14.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196110" version="1" comment="dhcp-server is &lt;4.2.6-14.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196111" version="1" comment="kernel-default-base is &lt;3.12.60-52.54" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196112" version="1" comment="kernel-default-man is &lt;3.12.60-52.54" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196113" version="1" comment="kernel-xen-base is &lt;3.12.60-52.54" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196114" version="1" comment="glibc-html is &lt;2.19-22.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196115" version="1" comment="glibc-info is &lt;2.19-22.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196116" version="1" comment="glibc-profile is &lt;2.19-22.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196117" version="1" comment="glibc-profile-32bit is &lt;2.19-22.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196118" version="1" comment="kernel-default-base is &lt;3.12.51-52.34" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196119" version="1" comment="kernel-default-man is &lt;3.12.51-52.34" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196120" version="1" comment="kernel-xen-base is &lt;3.12.51-52.34" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196121" version="1" comment="qemu-block-rbd is &lt;2.0.2-48.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196122" version="1" comment="qemu-guest-agent is &lt;2.0.2-48.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196123" version="1" comment="qemu-lang is &lt;2.0.2-48.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196124" version="1" comment="qemu-ppc is &lt;2.0.2-48.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196125" version="1" comment="qemu-s390 is &lt;2.0.2-48.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196126" version="1" comment="libxml2-doc is &lt;2.9.1-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196127" version="1" comment="bind-chrootenv is &lt;9.9.6P1-28.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196128" version="1" comment="bind-doc is &lt;9.9.6P1-28.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196129" version="1" comment="giflib-progs is &lt;5.0.5-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196130" version="1" comment="kernel-default-base is &lt;3.12.51-52.39" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196131" version="1" comment="kernel-default-man is &lt;3.12.51-52.39" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196132" version="1" comment="kernel-xen-base is &lt;3.12.51-52.39" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196133" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196134" version="1" comment="apache-commons-collections is &lt;3.2.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196135" version="1" comment="apache-commons-collections-javadoc is &lt;3.2.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196136" version="1" comment="ctdb is &lt;4.2.4-18.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196137" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-18.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196138" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-18.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196139" version="1" comment="libdcerpc0 is &lt;4.2.4-18.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196140" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-18.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196141" version="1" comment="libgensec0 is &lt;4.2.4-18.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196142" version="1" comment="libgensec0-32bit is &lt;4.2.4-18.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196143" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-18.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196144" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-18.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196145" version="1" comment="libndr-nbt0 is &lt;4.2.4-18.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196146" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-18.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196147" version="1" comment="libndr-standard0 is &lt;4.2.4-18.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196148" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-18.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196149" version="1" comment="libndr0 is &lt;4.2.4-18.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196150" version="1" comment="libndr0-32bit is &lt;4.2.4-18.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196151" version="1" comment="libnetapi0 is &lt;4.2.4-18.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196152" version="1" comment="libnetapi0-32bit is &lt;4.2.4-18.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196153" version="1" comment="libregistry0 is &lt;4.2.4-18.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196154" version="1" comment="libsamba-credentials0 is &lt;4.2.4-18.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196155" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-18.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196156" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-18.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196157" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-18.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196158" version="1" comment="libsamba-passdb0 is &lt;4.2.4-18.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196159" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-18.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196160" version="1" comment="libsamba-util0 is &lt;4.2.4-18.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196161" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-18.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196162" version="1" comment="libsamdb0 is &lt;4.2.4-18.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196163" version="1" comment="libsamdb0-32bit is &lt;4.2.4-18.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196164" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-18.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196165" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-18.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196166" version="1" comment="libsmbclient0 is &lt;4.2.4-18.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196167" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-18.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196168" version="1" comment="libsmbconf0 is &lt;4.2.4-18.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196169" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-18.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196170" version="1" comment="libsmbldap0 is &lt;4.2.4-18.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196171" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-18.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196172" version="1" comment="libtevent-util0 is &lt;4.2.4-18.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196173" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-18.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196174" version="1" comment="libwbclient0 is &lt;4.2.4-18.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196175" version="1" comment="libwbclient0-32bit is &lt;4.2.4-18.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196176" version="1" comment="samba is &lt;4.2.4-18.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196177" version="1" comment="samba-32bit is &lt;4.2.4-18.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196178" version="1" comment="samba-client is &lt;4.2.4-18.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196179" version="1" comment="samba-client-32bit is &lt;4.2.4-18.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196180" version="1" comment="samba-doc is &lt;4.2.4-18.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196181" version="1" comment="samba-libs is &lt;4.2.4-18.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196182" version="1" comment="samba-libs-32bit is &lt;4.2.4-18.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196183" version="1" comment="samba-winbind is &lt;4.2.4-18.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196184" version="1" comment="samba-winbind-32bit is &lt;4.2.4-18.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196185" version="1" comment="kernel-default-man is &lt;3.12.60-52.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196186" version="1" comment="qemu-ppc is &lt;2.0.2-48.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196187" version="1" comment="qemu-s390 is &lt;2.0.2-48.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196188" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.95-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196189" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.95-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196190" version="1" comment="qemu-ppc is &lt;2.0.2-48.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196191" version="1" comment="qemu-s390 is &lt;2.0.2-48.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196192" version="1" comment="kernel-default-man is &lt;3.12.60-52.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196193" version="1" comment="kernel-default-man is &lt;3.12.60-52.63" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196194" version="1" comment="libvirt-lock-sanlock is &lt;1.2.5-27.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196195" version="1" comment="libfreebl3-hmac is &lt;3.20.2-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196196" version="1" comment="libfreebl3-hmac-32bit is &lt;3.20.2-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196197" version="1" comment="libsoftokn3-hmac is &lt;3.20.2-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196198" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.20.2-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196199" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.30-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196200" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.30-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196201" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.30-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196202" version="1" comment="krb5-doc is &lt;1.12.1-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196203" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.1-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196204" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.1-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196205" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.1-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196206" version="1" comment="krb5-server is &lt;1.12.1-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196207" version="1" comment="glibc-html is &lt;2.19-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196208" version="1" comment="glibc-info is &lt;2.19-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196209" version="1" comment="glibc-profile is &lt;2.19-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196210" version="1" comment="glibc-profile-32bit is &lt;2.19-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196211" version="1" comment="postgresql93-contrib is &lt;9.3.11-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196212" version="1" comment="postgresql93-docs is &lt;9.3.11-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196213" version="1" comment="postgresql93-server is &lt;9.3.11-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196214" version="1" comment="dhcp-relay is &lt;4.2.6-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196215" version="1" comment="dhcp-server is &lt;4.2.6-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196216" version="1" comment="postgresql94-contrib is &lt;9.4.6-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196217" version="1" comment="postgresql94-docs is &lt;9.4.6-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196218" version="1" comment="postgresql94-server is &lt;9.4.6-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196219" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-27.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196220" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-27.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196221" version="1" comment="openssl-doc is &lt;1.0.1i-27.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196222" version="1" comment="libxml2-doc is &lt;2.9.1-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196223" version="1" comment="libfreebl3-hmac is &lt;3.20.2-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196224" version="1" comment="libfreebl3-hmac-32bit is &lt;3.20.2-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196225" version="1" comment="libsoftokn3-hmac is &lt;3.20.2-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196226" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.20.2-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196227" version="1" comment="bind-chrootenv is &lt;9.9.6P1-28.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196228" version="1" comment="bind-doc is &lt;9.9.6P1-28.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196229" version="1" comment="kernel-default-base is &lt;3.12.55-52.42" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196230" version="1" comment="kernel-default-man is &lt;3.12.55-52.42" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196231" version="1" comment="kernel-xen-base is &lt;3.12.55-52.42" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196232" version="1" comment="tomcat is &lt;7.0.68-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196233" version="1" comment="tomcat-admin-webapps is &lt;7.0.68-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196234" version="1" comment="tomcat-docs-webapp is &lt;7.0.68-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196235" version="1" comment="tomcat-el-2_2-api is &lt;7.0.68-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196236" version="1" comment="tomcat-javadoc is &lt;7.0.68-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196237" version="1" comment="tomcat-jsp-2_2-api is &lt;7.0.68-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196238" version="1" comment="tomcat-lib is &lt;7.0.68-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196239" version="1" comment="tomcat-servlet-3_0-api is &lt;7.0.68-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196240" version="1" comment="tomcat-webapps is &lt;7.0.68-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196241" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.99-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196242" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.99-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196243" version="1" comment="krb5-doc is &lt;1.12.1-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196244" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.1-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196245" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.1-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196246" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.1-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196247" version="1" comment="krb5-server is &lt;1.12.1-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196248" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-16.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196249" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.6.1-16.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196250" version="1" comment="libxml2-doc is &lt;2.9.1-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196251" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-27.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196252" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-27.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196253" version="1" comment="openssl-doc is &lt;1.0.1i-27.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196254" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.101-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196255" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.101-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196256" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.40-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196257" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.40-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196258" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.40-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196259" version="1" comment="xen-doc-html is &lt;4.4.4_02-22.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196260" version="1" comment="xen-tools is &lt;4.4.4_02-22.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196261" version="1" comment="xen-tools-domU is &lt;4.4.4_02-22.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196262" version="1" comment="openssh-fips is &lt;6.6p1-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196263" version="1" comment="openssh-fips is &lt;6.6p1-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196264" version="1" comment="cyrus-imapd is &lt;2.3.18-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196265" version="1" comment="perl-Cyrus-IMAP is &lt;2.3.18-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196266" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.3.18-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196267" version="1" comment="mariadb-tools is &lt;10.0.22-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196268" version="1" comment="libxml2-doc is &lt;2.9.1-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196269" version="1" comment="qemu-block-rbd is &lt;2.0.2-48.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196270" version="1" comment="qemu-guest-agent is &lt;2.0.2-48.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196271" version="1" comment="qemu-lang is &lt;2.0.2-48.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196272" version="1" comment="qemu-ppc is &lt;2.0.2-48.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196273" version="1" comment="qemu-s390 is &lt;2.0.2-48.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196274" version="1" comment="kernel-default-base is &lt;3.12.55-52.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196275" version="1" comment="kernel-default-man is &lt;3.12.55-52.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196276" version="1" comment="kernel-xen-base is &lt;3.12.55-52.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196277" version="1" comment="mariadb-tools is &lt;10.0.25-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196278" version="1" comment="libfreebl3-hmac is &lt;3.19.2.2-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196279" version="1" comment="libfreebl3-hmac-32bit is &lt;3.19.2.2-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196280" version="1" comment="libsoftokn3-hmac is &lt;3.19.2.2-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196281" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.19.2.2-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196282" version="1" comment="kernel-default-man is &lt;3.12.61-52.80" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196283" version="1" comment="kernel-default-man is &lt;3.12.61-52.83" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196284" version="1" comment="kernel-default-man is &lt;3.12.61-52.86" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196285" version="1" comment="kgraft-patch-3_12_61-52_86-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196286" version="1" comment="kgraft-patch-3_12_61-52_86-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196287" version="1" comment="kgraft-patch-SLE12_Update_25 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196288" version="1" comment="kgraft-patch-3_12_61-52_89-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196289" version="1" comment="kgraft-patch-3_12_61-52_89-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196290" version="1" comment="kgraft-patch-SLE12_Update_26 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196291" version="1" comment="kgraft-patch-3_12_61-52_69-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196292" version="1" comment="kgraft-patch-3_12_61-52_69-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196293" version="1" comment="kgraft-patch-SLE12_Update_20 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196294" version="1" comment="kgraft-patch-3_12_61-52_77-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196295" version="1" comment="kgraft-patch-3_12_61-52_77-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196296" version="1" comment="kgraft-patch-SLE12_Update_22 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196297" version="1" comment="kgraft-patch-3_12_61-52_80-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196298" version="1" comment="kgraft-patch-3_12_61-52_80-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196299" version="1" comment="kgraft-patch-SLE12_Update_23 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196300" version="1" comment="kgraft-patch-3_12_61-52_83-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196301" version="1" comment="kgraft-patch-3_12_61-52_83-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196302" version="1" comment="kgraft-patch-SLE12_Update_24 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196303" version="1" comment="kgraft-patch-3_12_60-52_57-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196304" version="1" comment="kgraft-patch-3_12_60-52_57-xen is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196305" version="1" comment="kgraft-patch-SLE12_Update_16 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196306" version="1" comment="kgraft-patch-3_12_60-52_60-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196307" version="1" comment="kgraft-patch-3_12_60-52_60-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196308" version="1" comment="kgraft-patch-SLE12_Update_17 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196309" version="1" comment="kgraft-patch-3_12_60-52_63-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196310" version="1" comment="kgraft-patch-3_12_60-52_63-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196311" version="1" comment="kgraft-patch-SLE12_Update_18 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196312" version="1" comment="kgraft-patch-3_12_61-52_66-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196313" version="1" comment="kgraft-patch-3_12_61-52_66-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196314" version="1" comment="kgraft-patch-SLE12_Update_19 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196315" version="1" comment="kgraft-patch-3_12_61-52_72-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196316" version="1" comment="kgraft-patch-3_12_61-52_72-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196317" version="1" comment="kgraft-patch-SLE12_Update_21 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196318" version="1" comment="kernel-default is &lt;3.12.61-52.92" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196319" version="1" comment="kernel-default-base is &lt;3.12.61-52.92" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196320" version="1" comment="kernel-default-devel is &lt;3.12.61-52.92" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196321" version="1" comment="kernel-default-man is &lt;3.12.61-52.92" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196322" version="1" comment="kernel-devel is &lt;3.12.61-52.92" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196323" version="1" comment="kernel-macros is &lt;3.12.61-52.92" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196324" version="1" comment="kernel-source is &lt;3.12.61-52.92" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196325" version="1" comment="kernel-syms is &lt;3.12.61-52.92" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196326" version="1" comment="kernel-xen is &lt;3.12.61-52.92" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196327" version="1" comment="kernel-xen-base is &lt;3.12.61-52.92" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196328" version="1" comment="kernel-xen-devel is &lt;3.12.61-52.92" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196329" version="1" comment="kgraft-patch-3_12_61-52_92-default is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196330" version="1" comment="kgraft-patch-3_12_61-52_92-xen is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196331" version="1" comment="kgraft-patch-SLE12_Update_27 is &lt;1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196332" version="1" comment="dnsmasq is &lt;2.78-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196333" version="1" comment="dracut is &lt;037-51.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196334" version="1" comment="dracut-fips is &lt;037-51.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196335" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-18.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196336" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-18.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196337" version="1" comment="libdcerpc0 is &lt;4.2.4-18.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196338" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-18.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196339" version="1" comment="libgensec0 is &lt;4.2.4-18.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196340" version="1" comment="libgensec0-32bit is &lt;4.2.4-18.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196341" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-18.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196342" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-18.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196343" version="1" comment="libndr-nbt0 is &lt;4.2.4-18.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196344" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-18.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196345" version="1" comment="libndr-standard0 is &lt;4.2.4-18.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196346" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-18.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196347" version="1" comment="libndr0 is &lt;4.2.4-18.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196348" version="1" comment="libndr0-32bit is &lt;4.2.4-18.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196349" version="1" comment="libnetapi0 is &lt;4.2.4-18.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196350" version="1" comment="libnetapi0-32bit is &lt;4.2.4-18.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196351" version="1" comment="libregistry0 is &lt;4.2.4-18.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196352" version="1" comment="libsamba-credentials0 is &lt;4.2.4-18.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196353" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-18.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196354" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-18.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196355" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-18.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196356" version="1" comment="libsamba-passdb0 is &lt;4.2.4-18.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196357" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-18.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196358" version="1" comment="libsamba-util0 is &lt;4.2.4-18.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196359" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-18.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196360" version="1" comment="libsamdb0 is &lt;4.2.4-18.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196361" version="1" comment="libsamdb0-32bit is &lt;4.2.4-18.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196362" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-18.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196363" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-18.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196364" version="1" comment="libsmbclient0 is &lt;4.2.4-18.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196365" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-18.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196366" version="1" comment="libsmbconf0 is &lt;4.2.4-18.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196367" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-18.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196368" version="1" comment="libsmbldap0 is &lt;4.2.4-18.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196369" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-18.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196370" version="1" comment="libtevent-util0 is &lt;4.2.4-18.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196371" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-18.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196372" version="1" comment="libwbclient0 is &lt;4.2.4-18.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196373" version="1" comment="libwbclient0-32bit is &lt;4.2.4-18.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196374" version="1" comment="samba-32bit is &lt;4.2.4-18.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196375" version="1" comment="samba-client is &lt;4.2.4-18.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196376" version="1" comment="samba-client-32bit is &lt;4.2.4-18.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196377" version="1" comment="samba-doc is &lt;4.2.4-18.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196378" version="1" comment="samba-libs is &lt;4.2.4-18.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196379" version="1" comment="samba-libs-32bit is &lt;4.2.4-18.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196380" version="1" comment="samba-winbind is &lt;4.2.4-18.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196381" version="1" comment="samba-winbind-32bit is &lt;4.2.4-18.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196382" version="1" comment="apache2 is &lt;2.4.10-14.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196383" version="1" comment="apache2-doc is &lt;2.4.10-14.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196384" version="1" comment="apache2-example-pages is &lt;2.4.10-14.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196385" version="1" comment="apache2-prefork is &lt;2.4.10-14.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196386" version="1" comment="apache2-utils is &lt;2.4.10-14.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196387" version="1" comment="apache2-worker is &lt;2.4.10-14.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196388" version="1" comment="kgraft-patch-3_12_61-52_89-default is &lt;3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196389" version="1" comment="kgraft-patch-3_12_61-52_89-xen is &lt;3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196390" version="1" comment="kgraft-patch-SLE12_Update_26 is &lt;3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196391" version="1" comment="kgraft-patch-3_12_61-52_86-default is &lt;3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196392" version="1" comment="kgraft-patch-3_12_61-52_86-xen is &lt;3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196393" version="1" comment="kgraft-patch-SLE12_Update_25 is &lt;3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196394" version="1" comment="kgraft-patch-3_12_61-52_80-default is &lt;4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196395" version="1" comment="kgraft-patch-3_12_61-52_80-xen is &lt;4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196396" version="1" comment="kgraft-patch-SLE12_Update_23 is &lt;4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196397" version="1" comment="kgraft-patch-3_12_61-52_77-default is &lt;5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196398" version="1" comment="kgraft-patch-3_12_61-52_77-xen is &lt;5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196399" version="1" comment="kgraft-patch-SLE12_Update_22 is &lt;5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196400" version="1" comment="kgraft-patch-3_12_61-52_69-default is &lt;6-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196401" version="1" comment="kgraft-patch-3_12_61-52_69-xen is &lt;6-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196402" version="1" comment="kgraft-patch-SLE12_Update_20 is &lt;6-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196403" version="1" comment="kgraft-patch-3_12_61-52_66-default is &lt;8-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196404" version="1" comment="kgraft-patch-3_12_61-52_66-xen is &lt;8-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196405" version="1" comment="kgraft-patch-SLE12_Update_19 is &lt;8-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196406" version="1" comment="kgraft-patch-3_12_61-52_92-default is &lt;2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196407" version="1" comment="kgraft-patch-3_12_61-52_92-xen is &lt;2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196408" version="1" comment="kgraft-patch-SLE12_Update_27 is &lt;2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196409" version="1" comment="kgraft-patch-3_12_60-52_57-default is &lt;10-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196410" version="1" comment="kgraft-patch-3_12_60-52_57-xen is &lt;10-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196411" version="1" comment="kgraft-patch-SLE12_Update_16 is &lt;10-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196412" version="1" comment="kgraft-patch-3_12_60-52_60-default is &lt;9-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196413" version="1" comment="kgraft-patch-3_12_60-52_60-xen is &lt;9-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196414" version="1" comment="kgraft-patch-SLE12_Update_17 is &lt;9-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196415" version="1" comment="kgraft-patch-3_12_61-52_83-default is &lt;3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196416" version="1" comment="kgraft-patch-3_12_61-52_83-xen is &lt;3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196417" version="1" comment="kgraft-patch-SLE12_Update_24 is &lt;3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196418" version="1" comment="kgraft-patch-3_12_61-52_72-default is &lt;5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196419" version="1" comment="kgraft-patch-3_12_61-52_72-xen is &lt;5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196420" version="1" comment="kgraft-patch-SLE12_Update_21 is &lt;5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196421" version="1" comment="kgraft-patch-3_12_60-52_63-default is &lt;9-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196422" version="1" comment="kgraft-patch-3_12_60-52_63-xen is &lt;9-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196423" version="1" comment="kgraft-patch-SLE12_Update_18 is &lt;9-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196424" version="1" comment="xen is &lt;4.4.4_24-22.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196425" version="1" comment="xen-doc-html is &lt;4.4.4_24-22.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196426" version="1" comment="xen-kmp-default is &lt;4.4.4_24_k3.12.61_52.92-22.54" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196427" version="1" comment="xen-libs is &lt;4.4.4_24-22.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196428" version="1" comment="xen-libs-32bit is &lt;4.4.4_24-22.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196429" version="1" comment="xen-tools is &lt;4.4.4_24-22.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196430" version="1" comment="xen-tools-domU is &lt;4.4.4_24-22.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196431" version="1" comment="kernel-default is &lt;3.12.61-52.101" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196432" version="1" comment="kernel-default-base is &lt;3.12.61-52.101" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196433" version="1" comment="kernel-default-devel is &lt;3.12.61-52.101" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196434" version="1" comment="kernel-default-man is &lt;3.12.61-52.101" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196435" version="1" comment="kernel-devel is &lt;3.12.61-52.101" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196436" version="1" comment="kernel-macros is &lt;3.12.61-52.101" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196437" version="1" comment="kernel-source is &lt;3.12.61-52.101" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196438" version="1" comment="kernel-syms is &lt;3.12.61-52.101" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196439" version="1" comment="kernel-xen is &lt;3.12.61-52.101" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196440" version="1" comment="kernel-xen-base is &lt;3.12.61-52.101" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196441" version="1" comment="kernel-xen-devel is &lt;3.12.61-52.101" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196442" version="1" comment="kgraft-patch-3_12_61-52_101-default is &lt;1-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196443" version="1" comment="kgraft-patch-3_12_61-52_101-xen is &lt;1-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196444" version="1" comment="kgraft-patch-SLE12_Update_28 is &lt;1-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196445" version="1" comment="qemu is &lt;2.0.2-48.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196446" version="1" comment="qemu-block-curl is &lt;2.0.2-48.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196447" version="1" comment="qemu-block-rbd is &lt;2.0.2-48.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196448" version="1" comment="qemu-guest-agent is &lt;2.0.2-48.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196449" version="1" comment="qemu-ipxe is &lt;1.0.0-48.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196450" version="1" comment="qemu-kvm is &lt;2.0.2-48.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196451" version="1" comment="qemu-lang is &lt;2.0.2-48.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196452" version="1" comment="qemu-ppc is &lt;2.0.2-48.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196453" version="1" comment="qemu-s390 is &lt;2.0.2-48.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196454" version="1" comment="qemu-seabios is &lt;1.7.4-48.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196455" version="1" comment="qemu-sgabios is &lt;8-48.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196456" version="1" comment="qemu-tools is &lt;2.0.2-48.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196457" version="1" comment="qemu-vgabios is &lt;1.7.4-48.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196458" version="1" comment="qemu-x86 is &lt;2.0.2-48.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196459" version="1" comment="tomcat is &lt;7.0.82-7.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196460" version="1" comment="tomcat-admin-webapps is &lt;7.0.82-7.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196461" version="1" comment="tomcat-docs-webapp is &lt;7.0.82-7.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196462" version="1" comment="tomcat-el-2_2-api is &lt;7.0.82-7.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196463" version="1" comment="tomcat-javadoc is &lt;7.0.82-7.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196464" version="1" comment="tomcat-jsp-2_2-api is &lt;7.0.82-7.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196465" version="1" comment="tomcat-lib is &lt;7.0.82-7.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196466" version="1" comment="tomcat-servlet-3_0-api is &lt;7.0.82-7.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196467" version="1" comment="tomcat-webapps is &lt;7.0.82-7.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196468" version="1" comment="kgraft-patch-3_12_61-52_80-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196469" version="1" comment="kgraft-patch-3_12_61-52_80-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196470" version="1" comment="kgraft-patch-SLE12_Update_23 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196471" version="1" comment="kgraft-patch-3_12_61-52_92-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196472" version="1" comment="kgraft-patch-3_12_61-52_92-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196473" version="1" comment="kgraft-patch-SLE12_Update_27 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196474" version="1" comment="kgraft-patch-3_12_61-52_89-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196475" version="1" comment="kgraft-patch-3_12_61-52_89-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196476" version="1" comment="kgraft-patch-SLE12_Update_26 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196477" version="1" comment="kgraft-patch-3_12_61-52_86-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196478" version="1" comment="kgraft-patch-3_12_61-52_86-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196479" version="1" comment="kgraft-patch-SLE12_Update_25 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196480" version="1" comment="kgraft-patch-3_12_61-52_83-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196481" version="1" comment="kgraft-patch-3_12_61-52_83-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196482" version="1" comment="kgraft-patch-SLE12_Update_24 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196483" version="1" comment="kgraft-patch-3_12_60-52_60-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196484" version="1" comment="kgraft-patch-3_12_60-52_60-xen is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196485" version="1" comment="kgraft-patch-SLE12_Update_17 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196486" version="1" comment="kgraft-patch-3_12_61-52_77-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196487" version="1" comment="kgraft-patch-3_12_61-52_77-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196488" version="1" comment="kgraft-patch-SLE12_Update_22 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196489" version="1" comment="kgraft-patch-3_12_61-52_72-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196490" version="1" comment="kgraft-patch-3_12_61-52_72-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196491" version="1" comment="kgraft-patch-SLE12_Update_21 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196492" version="1" comment="kgraft-patch-3_12_61-52_69-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196493" version="1" comment="kgraft-patch-3_12_61-52_69-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196494" version="1" comment="kgraft-patch-SLE12_Update_20 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196495" version="1" comment="kgraft-patch-3_12_61-52_66-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196496" version="1" comment="kgraft-patch-3_12_61-52_66-xen is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196497" version="1" comment="kgraft-patch-SLE12_Update_19 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196498" version="1" comment="kgraft-patch-3_12_60-52_63-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196499" version="1" comment="kgraft-patch-3_12_60-52_63-xen is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196500" version="1" comment="kgraft-patch-SLE12_Update_18 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196501" version="1" comment="xen is &lt;4.4.4_26-22.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196502" version="1" comment="xen-doc-html is &lt;4.4.4_26-22.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196503" version="1" comment="xen-kmp-default is &lt;4.4.4_26_k3.12.61_52.101-22.59" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196504" version="1" comment="xen-libs is &lt;4.4.4_26-22.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196505" version="1" comment="xen-libs-32bit is &lt;4.4.4_26-22.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196506" version="1" comment="xen-tools is &lt;4.4.4_26-22.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196507" version="1" comment="xen-tools-domU is &lt;4.4.4_26-22.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196508" version="1" comment="kernel-default is &lt;3.12.61-52.106" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196509" version="1" comment="kernel-default-base is &lt;3.12.61-52.106" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196510" version="1" comment="kernel-default-devel is &lt;3.12.61-52.106" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196511" version="1" comment="kernel-default-man is &lt;3.12.61-52.106" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196512" version="1" comment="kernel-devel is &lt;3.12.61-52.106" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196513" version="1" comment="kernel-macros is &lt;3.12.61-52.106" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196514" version="1" comment="kernel-source is &lt;3.12.61-52.106" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196515" version="1" comment="kernel-syms is &lt;3.12.61-52.106" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196516" version="1" comment="kernel-xen is &lt;3.12.61-52.106" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196517" version="1" comment="kernel-xen-base is &lt;3.12.61-52.106" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196518" version="1" comment="kernel-xen-devel is &lt;3.12.61-52.106" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196519" version="1" comment="kgraft-patch-3_12_61-52_106-default is &lt;1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196520" version="1" comment="kgraft-patch-3_12_61-52_106-xen is &lt;1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196521" version="1" comment="kgraft-patch-SLE12_Update_29 is &lt;1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196522" version="1" comment="kgraft-patch-3_12_60-52_63-default is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196523" version="1" comment="kgraft-patch-3_12_60-52_63-xen is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196524" version="1" comment="kgraft-patch-SLE12_Update_18 is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196525" version="1" comment="kgraft-patch-3_12_61-52_66-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196526" version="1" comment="kgraft-patch-3_12_61-52_66-xen is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196527" version="1" comment="kgraft-patch-SLE12_Update_19 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196528" version="1" comment="kgraft-patch-3_12_60-52_60-default is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196529" version="1" comment="kgraft-patch-3_12_60-52_60-xen is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196530" version="1" comment="kgraft-patch-SLE12_Update_17 is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196531" version="1" comment="kgraft-patch-3_12_61-52_101-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196532" version="1" comment="kgraft-patch-3_12_61-52_101-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196533" version="1" comment="kgraft-patch-SLE12_Update_28 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196534" version="1" comment="kgraft-patch-3_12_61-52_72-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196535" version="1" comment="kgraft-patch-3_12_61-52_72-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196536" version="1" comment="kgraft-patch-SLE12_Update_21 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196537" version="1" comment="kgraft-patch-3_12_61-52_69-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196538" version="1" comment="kgraft-patch-3_12_61-52_69-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196539" version="1" comment="kgraft-patch-SLE12_Update_20 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196540" version="1" comment="kgraft-patch-3_12_61-52_80-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196541" version="1" comment="kgraft-patch-3_12_61-52_80-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196542" version="1" comment="kgraft-patch-SLE12_Update_23 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196543" version="1" comment="kgraft-patch-3_12_61-52_77-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196544" version="1" comment="kgraft-patch-3_12_61-52_77-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196545" version="1" comment="kgraft-patch-SLE12_Update_22 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196546" version="1" comment="kgraft-patch-3_12_61-52_86-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196547" version="1" comment="kgraft-patch-3_12_61-52_86-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196548" version="1" comment="kgraft-patch-SLE12_Update_25 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196549" version="1" comment="kgraft-patch-3_12_61-52_83-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196550" version="1" comment="kgraft-patch-3_12_61-52_83-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196551" version="1" comment="kgraft-patch-SLE12_Update_24 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196552" version="1" comment="kgraft-patch-3_12_61-52_92-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196553" version="1" comment="kgraft-patch-3_12_61-52_92-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196554" version="1" comment="kgraft-patch-SLE12_Update_27 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196555" version="1" comment="kgraft-patch-3_12_61-52_89-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196556" version="1" comment="kgraft-patch-3_12_61-52_89-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196557" version="1" comment="kgraft-patch-SLE12_Update_26 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196558" version="1" comment="kgraft-patch-3_12_61-52_106-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196559" version="1" comment="kgraft-patch-3_12_61-52_106-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196560" version="1" comment="kgraft-patch-SLE12_Update_29 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196561" version="1" comment="kernel-default-man is &lt;3.12.61-52.66" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196562" version="1" comment="qemu-ppc is &lt;2.0.2-48.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196563" version="1" comment="qemu-s390 is &lt;2.0.2-48.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196564" version="1" comment="kernel-default-man is &lt;3.12.61-52.69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196565" version="1" comment="kernel-default-man is &lt;3.12.61-52.72" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196566" version="1" comment="kernel-default-man is &lt;3.12.61-52.77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196567" version="1" comment="ntp is &lt;4.2.8p11-46.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196568" version="1" comment="ntp-doc is &lt;4.2.8p11-46.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196569" version="1" comment="kgraft-patch-3_12_61-52_119-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196570" version="1" comment="kgraft-patch-3_12_61-52_119-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196571" version="1" comment="kgraft-patch-SLE12_Update_31 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196572" version="1" comment="kgraft-patch-3_12_61-52_111-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196573" version="1" comment="kgraft-patch-3_12_61-52_111-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196574" version="1" comment="kgraft-patch-SLE12_Update_30 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196575" version="1" comment="kgraft-patch-3_12_61-52_125-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196576" version="1" comment="kgraft-patch-3_12_61-52_125-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196577" version="1" comment="kgraft-patch-SLE12_Update_33 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196578" version="1" comment="kgraft-patch-3_12_61-52_122-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196579" version="1" comment="kgraft-patch-3_12_61-52_122-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196580" version="1" comment="kgraft-patch-SLE12_Update_32 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196581" version="1" comment="kgraft-patch-3_12_61-52_89-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196582" version="1" comment="kgraft-patch-3_12_61-52_89-xen is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196583" version="1" comment="kgraft-patch-SLE12_Update_26 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196584" version="1" comment="kgraft-patch-3_12_61-52_92-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196585" version="1" comment="kgraft-patch-3_12_61-52_92-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196586" version="1" comment="kgraft-patch-SLE12_Update_27 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196587" version="1" comment="kgraft-patch-3_12_61-52_83-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196588" version="1" comment="kgraft-patch-3_12_61-52_83-xen is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196589" version="1" comment="kgraft-patch-SLE12_Update_24 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196590" version="1" comment="kgraft-patch-3_12_61-52_86-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196591" version="1" comment="kgraft-patch-3_12_61-52_86-xen is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196592" version="1" comment="kgraft-patch-SLE12_Update_25 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196593" version="1" comment="kgraft-patch-3_12_61-52_77-default is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196594" version="1" comment="kgraft-patch-3_12_61-52_77-xen is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196595" version="1" comment="kgraft-patch-SLE12_Update_22 is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196596" version="1" comment="kgraft-patch-3_12_61-52_80-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196597" version="1" comment="kgraft-patch-3_12_61-52_80-xen is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196598" version="1" comment="kgraft-patch-SLE12_Update_23 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196599" version="1" comment="kgraft-patch-3_12_61-52_101-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196600" version="1" comment="kgraft-patch-3_12_61-52_101-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196601" version="1" comment="kgraft-patch-SLE12_Update_28 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196602" version="1" comment="kgraft-patch-3_12_61-52_106-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196603" version="1" comment="kgraft-patch-3_12_61-52_106-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196604" version="1" comment="kgraft-patch-SLE12_Update_29 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196605" version="1" comment="kgraft-patch-3_12_61-52_128-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196606" version="1" comment="kgraft-patch-3_12_61-52_128-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196607" version="1" comment="kgraft-patch-SLE12_Update_34 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196608" version="1" comment="kernel-firmware is &lt;20140807git-5.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196609" version="1" comment="ucode-amd is &lt;20140807git-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223429" version="1" comment="xen is &lt;4.4.4_32-22.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223430" version="1" comment="xen-doc-html is &lt;4.4.4_32-22.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223431" version="1" comment="xen-kmp-default is &lt;4.4.4_32_k3.12.61_52.133-22.68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223432" version="1" comment="xen-libs is &lt;4.4.4_32-22.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223433" version="1" comment="xen-libs-32bit is &lt;4.4.4_32-22.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223434" version="1" comment="xen-tools is &lt;4.4.4_32-22.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223435" version="1" comment="xen-tools-domU is &lt;4.4.4_32-22.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229327" version="1" comment="kernel-default is &lt;3.12.61-52.136" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229328" version="1" comment="kernel-default-base is &lt;3.12.61-52.136" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229329" version="1" comment="kernel-default-devel is &lt;3.12.61-52.136" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229330" version="1" comment="kernel-default-man is &lt;3.12.61-52.136" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229331" version="1" comment="kernel-devel is &lt;3.12.61-52.136" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229332" version="1" comment="kernel-macros is &lt;3.12.61-52.136" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229333" version="1" comment="kernel-source is &lt;3.12.61-52.136" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229334" version="1" comment="kernel-syms is &lt;3.12.61-52.136" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229335" version="1" comment="kernel-xen is &lt;3.12.61-52.136" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229336" version="1" comment="kernel-xen-base is &lt;3.12.61-52.136" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229337" version="1" comment="kernel-xen-devel is &lt;3.12.61-52.136" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229338" version="1" comment="kgraft-patch-3_12_61-52_136-default is &lt;1-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229339" version="1" comment="kgraft-patch-3_12_61-52_136-xen is &lt;1-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229340" version="1" comment="kgraft-patch-SLE12_Update_36 is &lt;1-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230652" version="1" comment="xen is &lt;4.4.4_34-22.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230653" version="1" comment="xen-doc-html is &lt;4.4.4_34-22.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230654" version="1" comment="xen-kmp-default is &lt;4.4.4_34_k3.12.61_52.136-22.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230655" version="1" comment="xen-libs is &lt;4.4.4_34-22.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230656" version="1" comment="xen-libs-32bit is &lt;4.4.4_34-22.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230657" version="1" comment="xen-tools is &lt;4.4.4_34-22.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230658" version="1" comment="xen-tools-domU is &lt;4.4.4_34-22.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230877" version="1" comment="kgraft-patch-3_12_61-52_119-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230878" version="1" comment="kgraft-patch-3_12_61-52_119-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230879" version="1" comment="kgraft-patch-SLE12_Update_31 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230880" version="1" comment="kgraft-patch-3_12_61-52_111-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230881" version="1" comment="kgraft-patch-3_12_61-52_111-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230882" version="1" comment="kgraft-patch-SLE12_Update_30 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230883" version="1" comment="kgraft-patch-3_12_61-52_125-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230884" version="1" comment="kgraft-patch-3_12_61-52_125-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230885" version="1" comment="kgraft-patch-SLE12_Update_33 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230886" version="1" comment="kgraft-patch-3_12_61-52_122-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230887" version="1" comment="kgraft-patch-3_12_61-52_122-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230888" version="1" comment="kgraft-patch-SLE12_Update_32 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230889" version="1" comment="kgraft-patch-3_12_61-52_133-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230890" version="1" comment="kgraft-patch-3_12_61-52_133-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230891" version="1" comment="kgraft-patch-SLE12_Update_35 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230892" version="1" comment="kgraft-patch-3_12_61-52_128-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230893" version="1" comment="kgraft-patch-3_12_61-52_128-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230894" version="1" comment="kgraft-patch-SLE12_Update_34 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230895" version="1" comment="kgraft-patch-3_12_61-52_136-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230896" version="1" comment="kgraft-patch-3_12_61-52_136-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230897" version="1" comment="kgraft-patch-SLE12_Update_36 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230898" version="1" comment="kgraft-patch-3_12_61-52_89-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230899" version="1" comment="kgraft-patch-3_12_61-52_89-xen is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230900" version="1" comment="kgraft-patch-SLE12_Update_26 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230901" version="1" comment="kgraft-patch-3_12_61-52_92-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230902" version="1" comment="kgraft-patch-3_12_61-52_92-xen is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230903" version="1" comment="kgraft-patch-SLE12_Update_27 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230904" version="1" comment="kgraft-patch-3_12_61-52_83-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230905" version="1" comment="kgraft-patch-3_12_61-52_83-xen is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230906" version="1" comment="kgraft-patch-SLE12_Update_24 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230907" version="1" comment="kgraft-patch-3_12_61-52_86-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230908" version="1" comment="kgraft-patch-3_12_61-52_86-xen is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230909" version="1" comment="kgraft-patch-SLE12_Update_25 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230910" version="1" comment="kgraft-patch-3_12_61-52_101-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230911" version="1" comment="kgraft-patch-3_12_61-52_101-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230912" version="1" comment="kgraft-patch-SLE12_Update_28 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230913" version="1" comment="kgraft-patch-3_12_61-52_106-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230914" version="1" comment="kgraft-patch-3_12_61-52_106-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230915" version="1" comment="kgraft-patch-SLE12_Update_29 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231120" version="1" comment="libvirt is &lt;1.2.5-27.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231121" version="1" comment="libvirt-client is &lt;1.2.5-27.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231122" version="1" comment="libvirt-daemon is &lt;1.2.5-27.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231123" version="1" comment="libvirt-daemon-config-network is &lt;1.2.5-27.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231124" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.2.5-27.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231125" version="1" comment="libvirt-daemon-driver-interface is &lt;1.2.5-27.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231126" version="1" comment="libvirt-daemon-driver-libxl is &lt;1.2.5-27.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231127" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.2.5-27.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231128" version="1" comment="libvirt-daemon-driver-network is &lt;1.2.5-27.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231129" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.2.5-27.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231130" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.2.5-27.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231131" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.2.5-27.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231132" version="1" comment="libvirt-daemon-driver-secret is &lt;1.2.5-27.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231133" version="1" comment="libvirt-daemon-driver-storage is &lt;1.2.5-27.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231134" version="1" comment="libvirt-daemon-lxc is &lt;1.2.5-27.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231135" version="1" comment="libvirt-daemon-qemu is &lt;1.2.5-27.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231136" version="1" comment="libvirt-daemon-xen is &lt;1.2.5-27.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231137" version="1" comment="libvirt-doc is &lt;1.2.5-27.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231138" version="1" comment="libvirt-lock-sanlock is &lt;1.2.5-27.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231270" version="1" comment="glibc is &lt;2.19-22.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231271" version="1" comment="glibc-32bit is &lt;2.19-22.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231272" version="1" comment="glibc-devel is &lt;2.19-22.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231273" version="1" comment="glibc-devel-32bit is &lt;2.19-22.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231274" version="1" comment="glibc-html is &lt;2.19-22.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231275" version="1" comment="glibc-i18ndata is &lt;2.19-22.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231276" version="1" comment="glibc-info is &lt;2.19-22.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231277" version="1" comment="glibc-locale is &lt;2.19-22.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231278" version="1" comment="glibc-locale-32bit is &lt;2.19-22.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231279" version="1" comment="glibc-profile is &lt;2.19-22.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231280" version="1" comment="glibc-profile-32bit is &lt;2.19-22.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231281" version="1" comment="nscd is &lt;2.19-22.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196610" version="1" comment="kgraft-patch-3_12_61-52_111-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196611" version="1" comment="kgraft-patch-3_12_61-52_111-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196612" version="1" comment="kgraft-patch-SLE12_Update_30 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232103" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-18.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232104" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-18.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232105" version="1" comment="libdcerpc0 is &lt;4.2.4-18.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232106" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-18.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232107" version="1" comment="libgensec0 is &lt;4.2.4-18.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232108" version="1" comment="libgensec0-32bit is &lt;4.2.4-18.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232109" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-18.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232110" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-18.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232111" version="1" comment="libndr-nbt0 is &lt;4.2.4-18.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232112" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-18.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232113" version="1" comment="libndr-standard0 is &lt;4.2.4-18.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232114" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-18.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232115" version="1" comment="libndr0 is &lt;4.2.4-18.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232116" version="1" comment="libndr0-32bit is &lt;4.2.4-18.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232117" version="1" comment="libnetapi0 is &lt;4.2.4-18.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232118" version="1" comment="libnetapi0-32bit is &lt;4.2.4-18.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232119" version="1" comment="libregistry0 is &lt;4.2.4-18.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232120" version="1" comment="libsamba-credentials0 is &lt;4.2.4-18.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232121" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-18.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232122" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-18.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232123" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-18.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232124" version="1" comment="libsamba-passdb0 is &lt;4.2.4-18.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232125" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-18.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232126" version="1" comment="libsamba-util0 is &lt;4.2.4-18.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232127" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-18.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232128" version="1" comment="libsamdb0 is &lt;4.2.4-18.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232129" version="1" comment="libsamdb0-32bit is &lt;4.2.4-18.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232130" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-18.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232131" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-18.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232132" version="1" comment="libsmbclient0 is &lt;4.2.4-18.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232133" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-18.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232134" version="1" comment="libsmbconf0 is &lt;4.2.4-18.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232135" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-18.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232136" version="1" comment="libsmbldap0 is &lt;4.2.4-18.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232137" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-18.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232138" version="1" comment="libtevent-util0 is &lt;4.2.4-18.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232139" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-18.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232140" version="1" comment="libwbclient0 is &lt;4.2.4-18.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232141" version="1" comment="libwbclient0-32bit is &lt;4.2.4-18.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232142" version="1" comment="samba-32bit is &lt;4.2.4-18.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232143" version="1" comment="samba-client is &lt;4.2.4-18.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232144" version="1" comment="samba-client-32bit is &lt;4.2.4-18.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232145" version="1" comment="samba-doc is &lt;4.2.4-18.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232146" version="1" comment="samba-libs is &lt;4.2.4-18.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232147" version="1" comment="samba-libs-32bit is &lt;4.2.4-18.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232148" version="1" comment="samba-winbind is &lt;4.2.4-18.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232149" version="1" comment="samba-winbind-32bit is &lt;4.2.4-18.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232535" version="1" comment="kgraft-patch-3_12_61-52_119-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232536" version="1" comment="kgraft-patch-3_12_61-52_119-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232537" version="1" comment="kgraft-patch-SLE12_Update_31 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232538" version="1" comment="kgraft-patch-3_12_61-52_111-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232539" version="1" comment="kgraft-patch-3_12_61-52_111-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232540" version="1" comment="kgraft-patch-SLE12_Update_30 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232541" version="1" comment="kgraft-patch-3_12_61-52_125-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232542" version="1" comment="kgraft-patch-3_12_61-52_125-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232543" version="1" comment="kgraft-patch-SLE12_Update_33 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232544" version="1" comment="kgraft-patch-3_12_61-52_122-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232545" version="1" comment="kgraft-patch-3_12_61-52_122-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232546" version="1" comment="kgraft-patch-SLE12_Update_32 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232547" version="1" comment="kgraft-patch-3_12_61-52_133-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232548" version="1" comment="kgraft-patch-3_12_61-52_133-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232549" version="1" comment="kgraft-patch-SLE12_Update_35 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232550" version="1" comment="kgraft-patch-3_12_61-52_128-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232551" version="1" comment="kgraft-patch-3_12_61-52_128-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232552" version="1" comment="kgraft-patch-SLE12_Update_34 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232553" version="1" comment="kgraft-patch-3_12_61-52_136-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232554" version="1" comment="kgraft-patch-3_12_61-52_136-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232555" version="1" comment="kgraft-patch-SLE12_Update_36 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232556" version="1" comment="kgraft-patch-3_12_61-52_89-default is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232557" version="1" comment="kgraft-patch-3_12_61-52_89-xen is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232558" version="1" comment="kgraft-patch-SLE12_Update_26 is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232559" version="1" comment="kgraft-patch-3_12_61-52_92-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232560" version="1" comment="kgraft-patch-3_12_61-52_92-xen is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232561" version="1" comment="kgraft-patch-SLE12_Update_27 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196613" version="1" comment="kgraft-patch-3_12_61-52_89-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196614" version="1" comment="kgraft-patch-3_12_61-52_89-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196615" version="1" comment="kgraft-patch-SLE12_Update_26 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232562" version="1" comment="kgraft-patch-3_12_61-52_101-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232563" version="1" comment="kgraft-patch-3_12_61-52_101-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232564" version="1" comment="kgraft-patch-SLE12_Update_28 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232565" version="1" comment="kgraft-patch-3_12_61-52_106-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232566" version="1" comment="kgraft-patch-3_12_61-52_106-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232567" version="1" comment="kgraft-patch-SLE12_Update_29 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196616" version="1" comment="kgraft-patch-3_12_61-52_92-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196617" version="1" comment="kgraft-patch-3_12_61-52_92-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196618" version="1" comment="kgraft-patch-SLE12_Update_27 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232568" version="1" comment="kernel-default is &lt;3.12.61-52.141" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232569" version="1" comment="kernel-default-base is &lt;3.12.61-52.141" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232570" version="1" comment="kernel-default-devel is &lt;3.12.61-52.141" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232571" version="1" comment="kernel-default-man is &lt;3.12.61-52.141" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232572" version="1" comment="kernel-devel is &lt;3.12.61-52.141" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232573" version="1" comment="kernel-macros is &lt;3.12.61-52.141" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232574" version="1" comment="kernel-source is &lt;3.12.61-52.141" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232575" version="1" comment="kernel-syms is &lt;3.12.61-52.141" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232576" version="1" comment="kernel-xen is &lt;3.12.61-52.141" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232577" version="1" comment="kernel-xen-base is &lt;3.12.61-52.141" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232578" version="1" comment="kernel-xen-devel is &lt;3.12.61-52.141" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232579" version="1" comment="kgraft-patch-3_12_61-52_141-default is &lt;1-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232580" version="1" comment="kgraft-patch-3_12_61-52_141-xen is &lt;1-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232581" version="1" comment="kgraft-patch-SLE12_Update_37 is &lt;1-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232582" version="1" comment="lttng-modules is &lt;2.4.1-16.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232583" version="1" comment="lttng-modules-kmp-default is &lt;2.4.1_k3.12.61_52.141-16.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196619" version="1" comment="kgraft-patch-3_12_61-52_83-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196620" version="1" comment="kgraft-patch-3_12_61-52_83-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196621" version="1" comment="kgraft-patch-SLE12_Update_24 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196622" version="1" comment="kgraft-patch-3_12_61-52_86-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196623" version="1" comment="kgraft-patch-3_12_61-52_86-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196624" version="1" comment="kgraft-patch-SLE12_Update_25 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196625" version="1" comment="kgraft-patch-3_12_61-52_77-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196626" version="1" comment="kgraft-patch-3_12_61-52_77-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196627" version="1" comment="kgraft-patch-SLE12_Update_22 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196628" version="1" comment="kgraft-patch-3_12_61-52_69-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196629" version="1" comment="kgraft-patch-3_12_61-52_69-xen is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196630" version="1" comment="kgraft-patch-SLE12_Update_20 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196631" version="1" comment="kgraft-patch-3_12_61-52_101-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196632" version="1" comment="kgraft-patch-3_12_61-52_101-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196633" version="1" comment="kgraft-patch-SLE12_Update_28 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196634" version="1" comment="kgraft-patch-3_12_61-52_106-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196635" version="1" comment="kgraft-patch-3_12_61-52_106-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196636" version="1" comment="kgraft-patch-SLE12_Update_29 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196637" version="1" comment="kgraft-patch-3_12_61-52_80-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196638" version="1" comment="kgraft-patch-3_12_61-52_80-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196639" version="1" comment="kgraft-patch-SLE12_Update_23 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196640" version="1" comment="kgraft-patch-3_12_61-52_72-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196641" version="1" comment="kgraft-patch-3_12_61-52_72-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196642" version="1" comment="kgraft-patch-SLE12_Update_21 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233284" version="1" comment="xen is &lt;4.4.4_36-22.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233285" version="1" comment="xen-doc-html is &lt;4.4.4_36-22.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233286" version="1" comment="xen-kmp-default is &lt;4.4.4_36_k3.12.61_52.141-22.74" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233287" version="1" comment="xen-libs is &lt;4.4.4_36-22.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233288" version="1" comment="xen-libs-32bit is &lt;4.4.4_36-22.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233289" version="1" comment="xen-tools is &lt;4.4.4_36-22.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233290" version="1" comment="xen-tools-domU is &lt;4.4.4_36-22.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233785" version="1" comment="qemu is &lt;2.0.2-48.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233786" version="1" comment="qemu-block-curl is &lt;2.0.2-48.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233787" version="1" comment="qemu-block-rbd is &lt;2.0.2-48.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233788" version="1" comment="qemu-guest-agent is &lt;2.0.2-48.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233789" version="1" comment="qemu-ipxe is &lt;1.0.0-48.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233790" version="1" comment="qemu-kvm is &lt;2.0.2-48.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233791" version="1" comment="qemu-lang is &lt;2.0.2-48.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233792" version="1" comment="qemu-ppc is &lt;2.0.2-48.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233793" version="1" comment="qemu-s390 is &lt;2.0.2-48.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233794" version="1" comment="qemu-seabios is &lt;1.7.4-48.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233795" version="1" comment="qemu-sgabios is &lt;8-48.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233796" version="1" comment="qemu-tools is &lt;2.0.2-48.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233797" version="1" comment="qemu-vgabios is &lt;1.7.4-48.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233798" version="1" comment="qemu-x86 is &lt;2.0.2-48.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233810" version="1" comment="libspice-server1 is &lt;0.12.4-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233811" version="1" comment="spice is &lt;0.12.4-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233893" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.25-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233894" version="1" comment="libspice-client-gtk-2_0-4 is &lt;0.25-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233895" version="1" comment="libspice-client-gtk-3_0-4 is &lt;0.25-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233896" version="1" comment="libspice-controller0 is &lt;0.25-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233897" version="1" comment="spice-gtk is &lt;0.25-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233898" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.25-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233899" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.25-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196643" version="1" comment="kgraft-patch-3_12_61-52_66-default is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196644" version="1" comment="kgraft-patch-3_12_61-52_66-xen is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196645" version="1" comment="kgraft-patch-SLE12_Update_19 is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234322" version="1" comment="kgraft-patch-3_12_61-52_141-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234323" version="1" comment="kgraft-patch-3_12_61-52_141-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234324" version="1" comment="kgraft-patch-SLE12_Update_37 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234325" version="1" comment="libzypp is &lt;14.45.17-2.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251841" version="1" comment="zypper is &lt;1.11.70-2.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251842" version="1" comment="zypper-log is &lt;1.11.70-2.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196646" version="1" comment="qemu is &lt;2.0.2-48.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196647" version="1" comment="qemu-block-curl is &lt;2.0.2-48.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196648" version="1" comment="qemu-block-rbd is &lt;2.0.2-48.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196649" version="1" comment="qemu-guest-agent is &lt;2.0.2-48.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196650" version="1" comment="qemu-ipxe is &lt;1.0.0-48.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196651" version="1" comment="qemu-kvm is &lt;2.0.2-48.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196652" version="1" comment="qemu-lang is &lt;2.0.2-48.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196653" version="1" comment="qemu-ppc is &lt;2.0.2-48.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196654" version="1" comment="qemu-s390 is &lt;2.0.2-48.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196655" version="1" comment="qemu-seabios is &lt;1.7.4-48.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196656" version="1" comment="qemu-sgabios is &lt;8-48.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196657" version="1" comment="qemu-tools is &lt;2.0.2-48.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196658" version="1" comment="qemu-vgabios is &lt;1.7.4-48.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196659" version="1" comment="qemu-x86 is &lt;2.0.2-48.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234976" version="1" comment="kgraft-patch-3_12_61-52_119-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234977" version="1" comment="kgraft-patch-3_12_61-52_119-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234978" version="1" comment="kgraft-patch-SLE12_Update_31 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234979" version="1" comment="kgraft-patch-3_12_61-52_111-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234980" version="1" comment="kgraft-patch-3_12_61-52_111-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234981" version="1" comment="kgraft-patch-SLE12_Update_30 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234982" version="1" comment="kgraft-patch-3_12_61-52_125-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234983" version="1" comment="kgraft-patch-3_12_61-52_125-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234984" version="1" comment="kgraft-patch-SLE12_Update_33 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234985" version="1" comment="kgraft-patch-3_12_61-52_122-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234986" version="1" comment="kgraft-patch-3_12_61-52_122-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234987" version="1" comment="kgraft-patch-SLE12_Update_32 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234988" version="1" comment="kgraft-patch-3_12_61-52_133-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234989" version="1" comment="kgraft-patch-3_12_61-52_133-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234990" version="1" comment="kgraft-patch-SLE12_Update_35 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234991" version="1" comment="kgraft-patch-3_12_61-52_128-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234992" version="1" comment="kgraft-patch-3_12_61-52_128-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234993" version="1" comment="kgraft-patch-SLE12_Update_34 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234994" version="1" comment="kgraft-patch-3_12_61-52_141-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234995" version="1" comment="kgraft-patch-3_12_61-52_141-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234996" version="1" comment="kgraft-patch-SLE12_Update_37 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234997" version="1" comment="kgraft-patch-3_12_61-52_136-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234998" version="1" comment="kgraft-patch-3_12_61-52_136-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234999" version="1" comment="kgraft-patch-SLE12_Update_36 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235000" version="1" comment="kgraft-patch-3_12_61-52_92-default is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235001" version="1" comment="kgraft-patch-3_12_61-52_92-xen is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235002" version="1" comment="kgraft-patch-SLE12_Update_27 is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235003" version="1" comment="kgraft-patch-3_12_61-52_101-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235004" version="1" comment="kgraft-patch-3_12_61-52_101-xen is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235005" version="1" comment="kgraft-patch-SLE12_Update_28 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235006" version="1" comment="kgraft-patch-3_12_61-52_106-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235007" version="1" comment="kgraft-patch-3_12_61-52_106-xen is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235008" version="1" comment="kgraft-patch-SLE12_Update_29 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236791" version="1" comment="kernel-default is &lt;3.12.61-52.146" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236792" version="1" comment="kernel-default-base is &lt;3.12.61-52.146" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236793" version="1" comment="kernel-default-devel is &lt;3.12.61-52.146" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236794" version="1" comment="kernel-default-man is &lt;3.12.61-52.146" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236795" version="1" comment="kernel-devel is &lt;3.12.61-52.146" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236796" version="1" comment="kernel-macros is &lt;3.12.61-52.146" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236797" version="1" comment="kernel-source is &lt;3.12.61-52.146" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236798" version="1" comment="kernel-syms is &lt;3.12.61-52.146" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236799" version="1" comment="kernel-xen is &lt;3.12.61-52.146" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236800" version="1" comment="kernel-xen-base is &lt;3.12.61-52.146" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236801" version="1" comment="kernel-xen-devel is &lt;3.12.61-52.146" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236802" version="1" comment="kgraft-patch-3_12_61-52_146-default is &lt;1-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236803" version="1" comment="kgraft-patch-3_12_61-52_146-xen is &lt;1-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236804" version="1" comment="kgraft-patch-SLE12_Update_38 is &lt;1-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237427" version="1" comment="kgraft-patch-3_12_61-52_119-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237428" version="1" comment="kgraft-patch-3_12_61-52_119-xen is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237429" version="1" comment="kgraft-patch-SLE12_Update_31 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237430" version="1" comment="kgraft-patch-3_12_61-52_111-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237431" version="1" comment="kgraft-patch-3_12_61-52_111-xen is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237432" version="1" comment="kgraft-patch-SLE12_Update_30 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237433" version="1" comment="kgraft-patch-3_12_61-52_125-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237434" version="1" comment="kgraft-patch-3_12_61-52_125-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237435" version="1" comment="kgraft-patch-SLE12_Update_33 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237436" version="1" comment="kgraft-patch-3_12_61-52_122-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237437" version="1" comment="kgraft-patch-3_12_61-52_122-xen is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237438" version="1" comment="kgraft-patch-SLE12_Update_32 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237439" version="1" comment="kgraft-patch-3_12_61-52_133-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237440" version="1" comment="kgraft-patch-3_12_61-52_133-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237441" version="1" comment="kgraft-patch-SLE12_Update_35 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237442" version="1" comment="kgraft-patch-3_12_61-52_128-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237443" version="1" comment="kgraft-patch-3_12_61-52_128-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237444" version="1" comment="kgraft-patch-SLE12_Update_34 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237445" version="1" comment="kgraft-patch-3_12_61-52_141-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237446" version="1" comment="kgraft-patch-3_12_61-52_141-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237447" version="1" comment="kgraft-patch-SLE12_Update_37 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237448" version="1" comment="kgraft-patch-3_12_61-52_136-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237449" version="1" comment="kgraft-patch-3_12_61-52_136-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237450" version="1" comment="kgraft-patch-SLE12_Update_36 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237451" version="1" comment="kgraft-patch-3_12_61-52_101-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237452" version="1" comment="kgraft-patch-3_12_61-52_101-xen is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237453" version="1" comment="kgraft-patch-SLE12_Update_28 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237454" version="1" comment="kgraft-patch-3_12_61-52_106-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237455" version="1" comment="kgraft-patch-3_12_61-52_106-xen is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237456" version="1" comment="kgraft-patch-SLE12_Update_29 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237457" version="1" comment="tomcat is &lt;7.0.90-7.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237458" version="1" comment="tomcat-admin-webapps is &lt;7.0.90-7.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237459" version="1" comment="tomcat-docs-webapp is &lt;7.0.90-7.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237460" version="1" comment="tomcat-el-2_2-api is &lt;7.0.90-7.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237461" version="1" comment="tomcat-javadoc is &lt;7.0.90-7.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237462" version="1" comment="tomcat-jsp-2_2-api is &lt;7.0.90-7.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237463" version="1" comment="tomcat-lib is &lt;7.0.90-7.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237464" version="1" comment="tomcat-servlet-3_0-api is &lt;7.0.90-7.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237465" version="1" comment="tomcat-webapps is &lt;7.0.90-7.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237885" version="1" comment="kgraft-patch-3_12_61-52_146-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237886" version="1" comment="kgraft-patch-3_12_61-52_146-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237887" version="1" comment="kgraft-patch-SLE12_Update_38 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237934" version="1" comment="libsnmp30 is &lt;5.7.2.1-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237935" version="1" comment="libsnmp30-32bit is &lt;5.7.2.1-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237936" version="1" comment="net-snmp is &lt;5.7.2.1-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237937" version="1" comment="perl-SNMP is &lt;5.7.2.1-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237938" version="1" comment="snmp-mibs is &lt;5.7.2.1-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237939" version="1" comment="ntp is &lt;4.2.8p12-46.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237940" version="1" comment="ntp-doc is &lt;4.2.8p12-46.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238414" version="1" comment="apache2-mod_nss is &lt;1.0.14-10.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239206" version="1" comment="kgraft-patch-3_12_61-52_136-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239207" version="1" comment="kgraft-patch-3_12_61-52_136-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239208" version="1" comment="kgraft-patch-SLE12_Update_36 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239209" version="1" comment="kgraft-patch-3_12_61-52_128-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239210" version="1" comment="kgraft-patch-3_12_61-52_128-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239211" version="1" comment="kgraft-patch-SLE12_Update_34 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239212" version="1" comment="kgraft-patch-3_12_61-52_141-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239213" version="1" comment="kgraft-patch-3_12_61-52_141-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239214" version="1" comment="kgraft-patch-SLE12_Update_37 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239215" version="1" comment="kgraft-patch-3_12_61-52_106-default is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239216" version="1" comment="kgraft-patch-3_12_61-52_106-xen is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239217" version="1" comment="kgraft-patch-SLE12_Update_29 is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239218" version="1" comment="kgraft-patch-3_12_61-52_133-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239219" version="1" comment="kgraft-patch-3_12_61-52_133-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239220" version="1" comment="kgraft-patch-SLE12_Update_35 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239221" version="1" comment="kgraft-patch-3_12_61-52_122-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239222" version="1" comment="kgraft-patch-3_12_61-52_122-xen is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239223" version="1" comment="kgraft-patch-SLE12_Update_32 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239224" version="1" comment="kgraft-patch-3_12_61-52_125-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239225" version="1" comment="kgraft-patch-3_12_61-52_125-xen is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239226" version="1" comment="kgraft-patch-SLE12_Update_33 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239227" version="1" comment="kgraft-patch-3_12_61-52_111-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239228" version="1" comment="kgraft-patch-3_12_61-52_111-xen is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239229" version="1" comment="kgraft-patch-SLE12_Update_30 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239230" version="1" comment="kgraft-patch-3_12_61-52_119-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239231" version="1" comment="kgraft-patch-3_12_61-52_119-xen is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239232" version="1" comment="kgraft-patch-SLE12_Update_31 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239233" version="1" comment="kgraft-patch-3_12_61-52_146-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239234" version="1" comment="kgraft-patch-3_12_61-52_146-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239235" version="1" comment="kgraft-patch-SLE12_Update_38 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240758" version="1" comment="qemu is &lt;2.0.2-48.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240759" version="1" comment="qemu-block-curl is &lt;2.0.2-48.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240760" version="1" comment="qemu-block-rbd is &lt;2.0.2-48.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240761" version="1" comment="qemu-guest-agent is &lt;2.0.2-48.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240762" version="1" comment="qemu-ipxe is &lt;1.0.0-48.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240763" version="1" comment="qemu-kvm is &lt;2.0.2-48.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240764" version="1" comment="qemu-lang is &lt;2.0.2-48.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240765" version="1" comment="qemu-ppc is &lt;2.0.2-48.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240766" version="1" comment="qemu-s390 is &lt;2.0.2-48.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240767" version="1" comment="qemu-seabios is &lt;1.7.4-48.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240768" version="1" comment="qemu-sgabios is &lt;8-48.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240769" version="1" comment="qemu-tools is &lt;2.0.2-48.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240770" version="1" comment="qemu-vgabios is &lt;1.7.4-48.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240771" version="1" comment="qemu-x86 is &lt;2.0.2-48.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240978" version="1" comment="libmysqlclient-devel is &lt;10.0.37-20.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240979" version="1" comment="libmysqlclient18 is &lt;10.0.37-20.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240980" version="1" comment="libmysqlclient18-32bit is &lt;10.0.37-20.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240981" version="1" comment="libmysqlclient_r18 is &lt;10.0.37-20.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240982" version="1" comment="libmysqld-devel is &lt;10.0.37-20.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240983" version="1" comment="libmysqld18 is &lt;10.0.37-20.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240984" version="1" comment="mariadb is &lt;10.0.37-20.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240985" version="1" comment="mariadb-client is &lt;10.0.37-20.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240986" version="1" comment="mariadb-errormessages is &lt;10.0.37-20.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240987" version="1" comment="mariadb-tools is &lt;10.0.37-20.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242098" version="1" comment="kgraft-patch-3_12_61-52_141-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242099" version="1" comment="kgraft-patch-3_12_61-52_141-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242100" version="1" comment="kgraft-patch-SLE12_Update_37 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242101" version="1" comment="kgraft-patch-3_12_61-52_136-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242102" version="1" comment="kgraft-patch-3_12_61-52_136-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242103" version="1" comment="kgraft-patch-SLE12_Update_36 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242104" version="1" comment="kgraft-patch-3_12_61-52_122-default is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242105" version="1" comment="kgraft-patch-3_12_61-52_122-xen is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242106" version="1" comment="kgraft-patch-SLE12_Update_32 is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242107" version="1" comment="kgraft-patch-3_12_61-52_128-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242108" version="1" comment="kgraft-patch-3_12_61-52_128-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242109" version="1" comment="kgraft-patch-SLE12_Update_34 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242110" version="1" comment="kgraft-patch-3_12_61-52_111-default is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242111" version="1" comment="kgraft-patch-3_12_61-52_111-xen is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242112" version="1" comment="kgraft-patch-SLE12_Update_30 is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242113" version="1" comment="kgraft-patch-3_12_61-52_125-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242114" version="1" comment="kgraft-patch-3_12_61-52_125-xen is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242115" version="1" comment="kgraft-patch-SLE12_Update_33 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242116" version="1" comment="kgraft-patch-3_12_61-52_119-default is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242117" version="1" comment="kgraft-patch-3_12_61-52_119-xen is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242118" version="1" comment="kgraft-patch-SLE12_Update_31 is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242119" version="1" comment="kgraft-patch-3_12_61-52_146-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242120" version="1" comment="kgraft-patch-3_12_61-52_146-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242121" version="1" comment="kgraft-patch-SLE12_Update_38 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242122" version="1" comment="kgraft-patch-3_12_61-52_133-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242123" version="1" comment="kgraft-patch-3_12_61-52_133-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242124" version="1" comment="kgraft-patch-SLE12_Update_35 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196660" version="1" comment="kernel-default is &lt;3.12.61-52.119" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196661" version="1" comment="kernel-default-base is &lt;3.12.61-52.119" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196662" version="1" comment="kernel-default-devel is &lt;3.12.61-52.119" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196663" version="1" comment="kernel-default-man is &lt;3.12.61-52.119" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196664" version="1" comment="kernel-devel is &lt;3.12.61-52.119" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196665" version="1" comment="kernel-macros is &lt;3.12.61-52.119" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196666" version="1" comment="kernel-source is &lt;3.12.61-52.119" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196667" version="1" comment="kernel-syms is &lt;3.12.61-52.119" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196668" version="1" comment="kernel-xen is &lt;3.12.61-52.119" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196669" version="1" comment="kernel-xen-base is &lt;3.12.61-52.119" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196670" version="1" comment="kernel-xen-devel is &lt;3.12.61-52.119" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196671" version="1" comment="kgraft-patch-3_12_61-52_119-default is &lt;1-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196672" version="1" comment="kgraft-patch-3_12_61-52_119-xen is &lt;1-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196673" version="1" comment="kgraft-patch-SLE12_Update_31 is &lt;1-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242473" version="1" comment="libQt5Core5 is &lt;5.3.1-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242474" version="1" comment="libQt5DBus5 is &lt;5.3.1-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242475" version="1" comment="libQt5Gui5 is &lt;5.3.1-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242476" version="1" comment="libQt5Widgets5 is &lt;5.3.1-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242477" version="1" comment="libqt5-qtbase is &lt;5.3.1-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196674" version="1" comment="kernel-firmware is &lt;20140807git-5.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196675" version="1" comment="ucode-amd is &lt;20140807git-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196676" version="1" comment="kgraft-patch-3_12_61-52_119-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196677" version="1" comment="kgraft-patch-3_12_61-52_119-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196678" version="1" comment="kgraft-patch-SLE12_Update_31 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196679" version="1" comment="xen is &lt;4.4.4_28-22.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196680" version="1" comment="xen-doc-html is &lt;4.4.4_28-22.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196681" version="1" comment="xen-kmp-default is &lt;4.4.4_28_k3.12.61_52.119-22.62" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196682" version="1" comment="xen-libs is &lt;4.4.4_28-22.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196683" version="1" comment="xen-libs-32bit is &lt;4.4.4_28-22.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196684" version="1" comment="xen-tools is &lt;4.4.4_28-22.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196685" version="1" comment="xen-tools-domU is &lt;4.4.4_28-22.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196686" version="1" comment="kgraft-patch-3_12_61-52_122-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196687" version="1" comment="kgraft-patch-3_12_61-52_122-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196688" version="1" comment="kgraft-patch-SLE12_Update_32 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196689" version="1" comment="libmysqlclient-devel is &lt;10.0.34-20.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196690" version="1" comment="libmysqlclient18 is &lt;10.0.34-20.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196691" version="1" comment="libmysqlclient18-32bit is &lt;10.0.34-20.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196692" version="1" comment="libmysqlclient_r18 is &lt;10.0.34-20.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196693" version="1" comment="libmysqld-devel is &lt;10.0.34-20.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196694" version="1" comment="libmysqld18 is &lt;10.0.34-20.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196695" version="1" comment="mariadb is &lt;10.0.34-20.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196696" version="1" comment="mariadb-client is &lt;10.0.34-20.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196697" version="1" comment="mariadb-errormessages is &lt;10.0.34-20.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196698" version="1" comment="mariadb-tools is &lt;10.0.34-20.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196699" version="1" comment="glibc is &lt;2.19-22.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196700" version="1" comment="glibc-32bit is &lt;2.19-22.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196701" version="1" comment="glibc-devel is &lt;2.19-22.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196702" version="1" comment="glibc-devel-32bit is &lt;2.19-22.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196703" version="1" comment="glibc-html is &lt;2.19-22.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196704" version="1" comment="glibc-i18ndata is &lt;2.19-22.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196705" version="1" comment="glibc-info is &lt;2.19-22.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196706" version="1" comment="glibc-locale is &lt;2.19-22.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196707" version="1" comment="glibc-locale-32bit is &lt;2.19-22.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196708" version="1" comment="glibc-profile is &lt;2.19-22.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196709" version="1" comment="glibc-profile-32bit is &lt;2.19-22.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196710" version="1" comment="nscd is &lt;2.19-22.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196711" version="1" comment="kernel-default is &lt;3.12.61-52.125" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196712" version="1" comment="kernel-default-base is &lt;3.12.61-52.125" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196713" version="1" comment="kernel-default-devel is &lt;3.12.61-52.125" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196714" version="1" comment="kernel-default-man is &lt;3.12.61-52.125" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196715" version="1" comment="kernel-devel is &lt;3.12.61-52.125" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196716" version="1" comment="kernel-macros is &lt;3.12.61-52.125" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196717" version="1" comment="kernel-source is &lt;3.12.61-52.125" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196718" version="1" comment="kernel-syms is &lt;3.12.61-52.125" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196719" version="1" comment="kernel-xen is &lt;3.12.61-52.125" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196720" version="1" comment="kernel-xen-base is &lt;3.12.61-52.125" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196721" version="1" comment="kernel-xen-devel is &lt;3.12.61-52.125" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196722" version="1" comment="kgraft-patch-3_12_61-52_125-default is &lt;1-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196723" version="1" comment="kgraft-patch-3_12_61-52_125-xen is &lt;1-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196724" version="1" comment="kgraft-patch-SLE12_Update_33 is &lt;1-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196725" version="1" comment="apache2 is &lt;2.4.10-14.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196726" version="1" comment="apache2-doc is &lt;2.4.10-14.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196727" version="1" comment="apache2-example-pages is &lt;2.4.10-14.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196728" version="1" comment="apache2-prefork is &lt;2.4.10-14.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196729" version="1" comment="apache2-utils is &lt;2.4.10-14.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196730" version="1" comment="apache2-worker is &lt;2.4.10-14.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196731" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-27.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196732" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-27.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196733" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-27.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196734" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-27.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196735" version="1" comment="openssl is &lt;1.0.1i-27.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196736" version="1" comment="openssl-doc is &lt;1.0.1i-27.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196737" version="1" comment="kgraft-patch-3_12_61-52_106-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196738" version="1" comment="kgraft-patch-3_12_61-52_106-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196739" version="1" comment="kgraft-patch-SLE12_Update_29 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196740" version="1" comment="kgraft-patch-3_12_61-52_101-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196741" version="1" comment="kgraft-patch-3_12_61-52_101-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196742" version="1" comment="kgraft-patch-SLE12_Update_28 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196743" version="1" comment="kgraft-patch-3_12_61-52_72-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196744" version="1" comment="kgraft-patch-3_12_61-52_72-xen is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196745" version="1" comment="kgraft-patch-SLE12_Update_21 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196746" version="1" comment="kgraft-patch-3_12_61-52_80-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196747" version="1" comment="kgraft-patch-3_12_61-52_80-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196748" version="1" comment="kgraft-patch-SLE12_Update_23 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196749" version="1" comment="kgraft-patch-3_12_61-52_77-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196750" version="1" comment="kgraft-patch-3_12_61-52_77-xen is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196751" version="1" comment="kgraft-patch-SLE12_Update_22 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196752" version="1" comment="kgraft-patch-3_12_61-52_86-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196753" version="1" comment="kgraft-patch-3_12_61-52_86-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196754" version="1" comment="kgraft-patch-SLE12_Update_25 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196755" version="1" comment="kgraft-patch-3_12_61-52_83-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196756" version="1" comment="kgraft-patch-3_12_61-52_83-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196757" version="1" comment="kgraft-patch-SLE12_Update_24 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196758" version="1" comment="kgraft-patch-3_12_61-52_92-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196759" version="1" comment="kgraft-patch-3_12_61-52_92-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196760" version="1" comment="kgraft-patch-SLE12_Update_27 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196761" version="1" comment="kgraft-patch-3_12_61-52_89-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196762" version="1" comment="kgraft-patch-3_12_61-52_89-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196763" version="1" comment="kgraft-patch-SLE12_Update_26 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196764" version="1" comment="kgraft-patch-3_12_61-52_122-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196765" version="1" comment="kgraft-patch-3_12_61-52_122-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196766" version="1" comment="kgraft-patch-SLE12_Update_32 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196767" version="1" comment="kgraft-patch-3_12_61-52_125-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196768" version="1" comment="kgraft-patch-3_12_61-52_125-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196769" version="1" comment="kgraft-patch-SLE12_Update_33 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196770" version="1" comment="kgraft-patch-3_12_61-52_111-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196771" version="1" comment="kgraft-patch-3_12_61-52_111-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196772" version="1" comment="kgraft-patch-SLE12_Update_30 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196773" version="1" comment="kgraft-patch-3_12_61-52_119-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196774" version="1" comment="kgraft-patch-3_12_61-52_119-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196775" version="1" comment="kgraft-patch-SLE12_Update_31 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196776" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-27.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196777" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-27.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196778" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-27.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196779" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-27.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196780" version="1" comment="openssl is &lt;1.0.1i-27.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196781" version="1" comment="openssl-doc is &lt;1.0.1i-27.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196782" version="1" comment="xen is &lt;4.4.4_30-22.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196783" version="1" comment="xen-doc-html is &lt;4.4.4_30-22.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196784" version="1" comment="xen-kmp-default is &lt;4.4.4_30_k3.12.61_52.125-22.65" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196785" version="1" comment="xen-libs is &lt;4.4.4_30-22.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196786" version="1" comment="xen-libs-32bit is &lt;4.4.4_30-22.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196787" version="1" comment="xen-tools is &lt;4.4.4_30-22.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196788" version="1" comment="xen-tools-domU is &lt;4.4.4_30-22.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196789" version="1" comment="kernel-default is &lt;3.12.61-52.111" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196790" version="1" comment="kernel-default-base is &lt;3.12.61-52.111" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196791" version="1" comment="kernel-default-devel is &lt;3.12.61-52.111" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196792" version="1" comment="kernel-default-man is &lt;3.12.61-52.111" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196793" version="1" comment="kernel-devel is &lt;3.12.61-52.111" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196794" version="1" comment="kernel-macros is &lt;3.12.61-52.111" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196795" version="1" comment="kernel-source is &lt;3.12.61-52.111" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196796" version="1" comment="kernel-syms is &lt;3.12.61-52.111" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196797" version="1" comment="kernel-xen is &lt;3.12.61-52.111" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196798" version="1" comment="kernel-xen-base is &lt;3.12.61-52.111" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196799" version="1" comment="kernel-xen-devel is &lt;3.12.61-52.111" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196800" version="1" comment="kernel-default is &lt;3.12.61-52.128" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196801" version="1" comment="kernel-default-base is &lt;3.12.61-52.128" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196802" version="1" comment="kernel-default-devel is &lt;3.12.61-52.128" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196803" version="1" comment="kernel-default-man is &lt;3.12.61-52.128" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196804" version="1" comment="kernel-devel is &lt;3.12.61-52.128" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196805" version="1" comment="kernel-macros is &lt;3.12.61-52.128" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196806" version="1" comment="kernel-source is &lt;3.12.61-52.128" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196807" version="1" comment="kernel-syms is &lt;3.12.61-52.128" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196808" version="1" comment="kernel-xen is &lt;3.12.61-52.128" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196809" version="1" comment="kernel-xen-base is &lt;3.12.61-52.128" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196810" version="1" comment="kernel-xen-devel is &lt;3.12.61-52.128" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196811" version="1" comment="kgraft-patch-3_12_61-52_128-default is &lt;1-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196812" version="1" comment="kgraft-patch-3_12_61-52_128-xen is &lt;1-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196813" version="1" comment="kgraft-patch-SLE12_Update_34 is &lt;1-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196814" version="1" comment="kgraft-patch-3_12_61-52_119-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196815" version="1" comment="kgraft-patch-3_12_61-52_119-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196816" version="1" comment="kgraft-patch-SLE12_Update_31 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196817" version="1" comment="kgraft-patch-3_12_61-52_111-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196818" version="1" comment="kgraft-patch-3_12_61-52_111-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196819" version="1" comment="kgraft-patch-SLE12_Update_30 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196820" version="1" comment="kgraft-patch-3_12_61-52_125-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196821" version="1" comment="kgraft-patch-3_12_61-52_125-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196822" version="1" comment="kgraft-patch-SLE12_Update_33 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196823" version="1" comment="kgraft-patch-3_12_61-52_122-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196824" version="1" comment="kgraft-patch-3_12_61-52_122-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196825" version="1" comment="kgraft-patch-SLE12_Update_32 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196826" version="1" comment="kgraft-patch-3_12_61-52_89-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196827" version="1" comment="kgraft-patch-3_12_61-52_89-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196828" version="1" comment="kgraft-patch-SLE12_Update_26 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196829" version="1" comment="kgraft-patch-3_12_61-52_92-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196830" version="1" comment="kgraft-patch-3_12_61-52_92-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196831" version="1" comment="kgraft-patch-SLE12_Update_27 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196832" version="1" comment="kgraft-patch-3_12_61-52_83-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196833" version="1" comment="kgraft-patch-3_12_61-52_83-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196834" version="1" comment="kgraft-patch-SLE12_Update_24 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196835" version="1" comment="kgraft-patch-3_12_61-52_86-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196836" version="1" comment="kgraft-patch-3_12_61-52_86-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196837" version="1" comment="kgraft-patch-SLE12_Update_25 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196838" version="1" comment="kgraft-patch-3_12_61-52_77-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196839" version="1" comment="kgraft-patch-3_12_61-52_77-xen is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196840" version="1" comment="kgraft-patch-SLE12_Update_22 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196841" version="1" comment="kgraft-patch-3_12_61-52_80-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196842" version="1" comment="kgraft-patch-3_12_61-52_80-xen is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196843" version="1" comment="kgraft-patch-SLE12_Update_23 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196844" version="1" comment="kgraft-patch-3_12_61-52_101-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196845" version="1" comment="kgraft-patch-3_12_61-52_101-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196846" version="1" comment="kgraft-patch-SLE12_Update_28 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196847" version="1" comment="kgraft-patch-3_12_61-52_72-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196848" version="1" comment="kgraft-patch-3_12_61-52_72-xen is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196849" version="1" comment="kgraft-patch-SLE12_Update_21 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196850" version="1" comment="kgraft-patch-3_12_61-52_106-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196851" version="1" comment="kgraft-patch-3_12_61-52_106-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196852" version="1" comment="kgraft-patch-SLE12_Update_29 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196853" version="1" comment="kernel-default is &lt;3.12.61-52.133" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196854" version="1" comment="kernel-default-base is &lt;3.12.61-52.133" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196855" version="1" comment="kernel-default-devel is &lt;3.12.61-52.133" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196856" version="1" comment="kernel-default-man is &lt;3.12.61-52.133" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196857" version="1" comment="kernel-devel is &lt;3.12.61-52.133" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196858" version="1" comment="kernel-macros is &lt;3.12.61-52.133" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196859" version="1" comment="kernel-source is &lt;3.12.61-52.133" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196860" version="1" comment="kernel-syms is &lt;3.12.61-52.133" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196861" version="1" comment="kernel-xen is &lt;3.12.61-52.133" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196862" version="1" comment="kernel-xen-base is &lt;3.12.61-52.133" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196863" version="1" comment="kernel-xen-devel is &lt;3.12.61-52.133" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196864" version="1" comment="kgraft-patch-3_12_61-52_133-default is &lt;1-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196865" version="1" comment="kgraft-patch-3_12_61-52_133-xen is &lt;1-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196866" version="1" comment="kgraft-patch-SLE12_Update_35 is &lt;1-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196867" version="1" comment="libmysqlclient-devel is &lt;10.0.35-20.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196868" version="1" comment="libmysqlclient18 is &lt;10.0.35-20.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196869" version="1" comment="libmysqlclient18-32bit is &lt;10.0.35-20.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196870" version="1" comment="libmysqlclient_r18 is &lt;10.0.35-20.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196871" version="1" comment="libmysqld-devel is &lt;10.0.35-20.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196872" version="1" comment="libmysqld18 is &lt;10.0.35-20.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196873" version="1" comment="mariadb is &lt;10.0.35-20.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196874" version="1" comment="mariadb-client is &lt;10.0.35-20.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196875" version="1" comment="mariadb-errormessages is &lt;10.0.35-20.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196876" version="1" comment="mariadb-tools is &lt;10.0.35-20.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196877" version="1" comment="qemu is &lt;2.0.2-48.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196878" version="1" comment="qemu-block-curl is &lt;2.0.2-48.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196879" version="1" comment="qemu-block-rbd is &lt;2.0.2-48.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196880" version="1" comment="qemu-guest-agent is &lt;2.0.2-48.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196881" version="1" comment="qemu-ipxe is &lt;1.0.0-48.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196882" version="1" comment="qemu-kvm is &lt;2.0.2-48.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196883" version="1" comment="qemu-lang is &lt;2.0.2-48.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196884" version="1" comment="qemu-ppc is &lt;2.0.2-48.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196885" version="1" comment="qemu-s390 is &lt;2.0.2-48.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196886" version="1" comment="qemu-seabios is &lt;1.7.4-48.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196887" version="1" comment="qemu-sgabios is &lt;8-48.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196888" version="1" comment="qemu-tools is &lt;2.0.2-48.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196889" version="1" comment="qemu-vgabios is &lt;1.7.4-48.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196890" version="1" comment="qemu-x86 is &lt;2.0.2-48.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253043" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-18.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253044" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-18.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253045" version="1" comment="libdcerpc0 is &lt;4.2.4-18.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253046" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-18.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253047" version="1" comment="libgensec0 is &lt;4.2.4-18.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253048" version="1" comment="libgensec0-32bit is &lt;4.2.4-18.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253049" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-18.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253050" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-18.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253051" version="1" comment="libndr-nbt0 is &lt;4.2.4-18.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253052" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-18.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253053" version="1" comment="libndr-standard0 is &lt;4.2.4-18.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253054" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-18.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253055" version="1" comment="libndr0 is &lt;4.2.4-18.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253056" version="1" comment="libndr0-32bit is &lt;4.2.4-18.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253057" version="1" comment="libnetapi0 is &lt;4.2.4-18.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253058" version="1" comment="libnetapi0-32bit is &lt;4.2.4-18.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253059" version="1" comment="libregistry0 is &lt;4.2.4-18.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253060" version="1" comment="libsamba-credentials0 is &lt;4.2.4-18.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253061" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-18.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253062" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-18.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253063" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-18.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253064" version="1" comment="libsamba-passdb0 is &lt;4.2.4-18.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253065" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-18.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253066" version="1" comment="libsamba-util0 is &lt;4.2.4-18.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253067" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-18.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253068" version="1" comment="libsamdb0 is &lt;4.2.4-18.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253069" version="1" comment="libsamdb0-32bit is &lt;4.2.4-18.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253070" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-18.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253071" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-18.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253072" version="1" comment="libsmbclient0 is &lt;4.2.4-18.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253073" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-18.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253074" version="1" comment="libsmbconf0 is &lt;4.2.4-18.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253075" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-18.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253076" version="1" comment="libsmbldap0 is &lt;4.2.4-18.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253077" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-18.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253078" version="1" comment="libtevent-util0 is &lt;4.2.4-18.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253079" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-18.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253080" version="1" comment="libwbclient0 is &lt;4.2.4-18.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253081" version="1" comment="libwbclient0-32bit is &lt;4.2.4-18.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253082" version="1" comment="samba-32bit is &lt;4.2.4-18.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253083" version="1" comment="samba-client is &lt;4.2.4-18.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253084" version="1" comment="samba-client-32bit is &lt;4.2.4-18.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253085" version="1" comment="samba-doc is &lt;4.2.4-18.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253086" version="1" comment="samba-libs is &lt;4.2.4-18.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253087" version="1" comment="samba-libs-32bit is &lt;4.2.4-18.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253088" version="1" comment="samba-winbind is &lt;4.2.4-18.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253089" version="1" comment="samba-winbind-32bit is &lt;4.2.4-18.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253679" version="1" comment="qemu is &lt;2.0.2-48.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253680" version="1" comment="qemu-block-curl is &lt;2.0.2-48.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253681" version="1" comment="qemu-block-rbd is &lt;2.0.2-48.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253682" version="1" comment="qemu-guest-agent is &lt;2.0.2-48.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253683" version="1" comment="qemu-ipxe is &lt;1.0.0-48.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253684" version="1" comment="qemu-kvm is &lt;2.0.2-48.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253685" version="1" comment="qemu-lang is &lt;2.0.2-48.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253686" version="1" comment="qemu-ppc is &lt;2.0.2-48.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253687" version="1" comment="qemu-s390 is &lt;2.0.2-48.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253688" version="1" comment="qemu-seabios is &lt;1.7.4-48.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253689" version="1" comment="qemu-sgabios is &lt;8-48.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253690" version="1" comment="qemu-tools is &lt;2.0.2-48.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253691" version="1" comment="qemu-vgabios is &lt;1.7.4-48.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253692" version="1" comment="qemu-x86 is &lt;2.0.2-48.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253816" version="1" comment="kernel-default is &lt;3.12.61-52.149" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253817" version="1" comment="kernel-default-base is &lt;3.12.61-52.149" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253818" version="1" comment="kernel-default-devel is &lt;3.12.61-52.149" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253819" version="1" comment="kernel-default-man is &lt;3.12.61-52.149" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253820" version="1" comment="kernel-devel is &lt;3.12.61-52.149" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253821" version="1" comment="kernel-macros is &lt;3.12.61-52.149" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253822" version="1" comment="kernel-source is &lt;3.12.61-52.149" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253823" version="1" comment="kernel-syms is &lt;3.12.61-52.149" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253824" version="1" comment="kernel-xen is &lt;3.12.61-52.149" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253825" version="1" comment="kernel-xen-base is &lt;3.12.61-52.149" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253826" version="1" comment="kernel-xen-devel is &lt;3.12.61-52.149" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253827" version="1" comment="kgraft-patch-3_12_61-52_149-default is &lt;1-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253828" version="1" comment="kgraft-patch-3_12_61-52_149-xen is &lt;1-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253829" version="1" comment="kgraft-patch-SLE12_Update_39 is &lt;1-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254201" version="1" comment="xen is &lt;4.4.4_40-22.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254202" version="1" comment="xen-doc-html is &lt;4.4.4_40-22.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254203" version="1" comment="xen-kmp-default is &lt;4.4.4_40_k3.12.61_52.149-22.80" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254204" version="1" comment="xen-libs is &lt;4.4.4_40-22.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254205" version="1" comment="xen-libs-32bit is &lt;4.4.4_40-22.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254206" version="1" comment="xen-tools is &lt;4.4.4_40-22.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254207" version="1" comment="xen-tools-domU is &lt;4.4.4_40-22.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256101" version="1" comment="kgraft-patch-3_12_61-52_136-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256102" version="1" comment="kgraft-patch-3_12_61-52_136-xen is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256103" version="1" comment="kgraft-patch-SLE12_Update_36 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256104" version="1" comment="kgraft-patch-3_12_61-52_149-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256105" version="1" comment="kgraft-patch-3_12_61-52_149-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256106" version="1" comment="kgraft-patch-SLE12_Update_39 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256107" version="1" comment="libvirt is &lt;1.2.5-27.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256108" version="1" comment="libvirt-client is &lt;1.2.5-27.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256109" version="1" comment="libvirt-daemon is &lt;1.2.5-27.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256110" version="1" comment="libvirt-daemon-config-network is &lt;1.2.5-27.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256111" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.2.5-27.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256112" version="1" comment="libvirt-daemon-driver-interface is &lt;1.2.5-27.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256113" version="1" comment="libvirt-daemon-driver-libxl is &lt;1.2.5-27.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256114" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.2.5-27.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256115" version="1" comment="libvirt-daemon-driver-network is &lt;1.2.5-27.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256116" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.2.5-27.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256117" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.2.5-27.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256118" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.2.5-27.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256119" version="1" comment="libvirt-daemon-driver-secret is &lt;1.2.5-27.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256120" version="1" comment="libvirt-daemon-driver-storage is &lt;1.2.5-27.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256121" version="1" comment="libvirt-daemon-lxc is &lt;1.2.5-27.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256122" version="1" comment="libvirt-daemon-qemu is &lt;1.2.5-27.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256123" version="1" comment="libvirt-daemon-xen is &lt;1.2.5-27.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256124" version="1" comment="libvirt-doc is &lt;1.2.5-27.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256125" version="1" comment="libvirt-lock-sanlock is &lt;1.2.5-27.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256404" version="1" comment="bind is &lt;9.9.9P1-28.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256405" version="1" comment="bind-chrootenv is &lt;9.9.9P1-28.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256406" version="1" comment="bind-devel is &lt;9.9.9P1-28.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256407" version="1" comment="bind-doc is &lt;9.9.9P1-28.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256408" version="1" comment="bind-libs is &lt;9.9.9P1-28.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256409" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-28.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256410" version="1" comment="bind-utils is &lt;9.9.9P1-28.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257031" version="1" comment="libsqlite3-0 is &lt;3.8.3.1-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257032" version="1" comment="libsqlite3-0-32bit is &lt;3.8.3.1-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257033" version="1" comment="sqlite3 is &lt;3.8.3.1-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257169" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-27.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257170" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-27.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257171" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-27.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257172" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-27.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257173" version="1" comment="openssl is &lt;1.0.1i-27.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257174" version="1" comment="openssl-doc is &lt;1.0.1i-27.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257919" version="1" comment="glib2 is &lt;2.38.2-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257920" version="1" comment="glib2-lang is &lt;2.38.2-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257921" version="1" comment="glib2-tools is &lt;2.38.2-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257922" version="1" comment="libgio-2_0-0 is &lt;2.38.2-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257923" version="1" comment="libgio-2_0-0-32bit is &lt;2.38.2-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257924" version="1" comment="libglib-2_0-0 is &lt;2.38.2-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257925" version="1" comment="libglib-2_0-0-32bit is &lt;2.38.2-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257926" version="1" comment="libgmodule-2_0-0 is &lt;2.38.2-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257927" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.38.2-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257928" version="1" comment="libgobject-2_0-0 is &lt;2.38.2-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257929" version="1" comment="libgobject-2_0-0-32bit is &lt;2.38.2-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257930" version="1" comment="libgthread-2_0-0 is &lt;2.38.2-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257931" version="1" comment="libgthread-2_0-0-32bit is &lt;2.38.2-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257933" version="1" comment="kgraft-patch-3_12_61-52_136-default is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257934" version="1" comment="kgraft-patch-3_12_61-52_136-xen is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257935" version="1" comment="kgraft-patch-SLE12_Update_36 is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257936" version="1" comment="kgraft-patch-3_12_61-52_146-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257937" version="1" comment="kgraft-patch-3_12_61-52_146-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257938" version="1" comment="kgraft-patch-SLE12_Update_38 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257939" version="1" comment="kgraft-patch-3_12_61-52_141-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257940" version="1" comment="kgraft-patch-3_12_61-52_141-xen is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257941" version="1" comment="kgraft-patch-SLE12_Update_37 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257942" version="1" comment="kgraft-patch-3_12_61-52_149-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257943" version="1" comment="kgraft-patch-3_12_61-52_149-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257944" version="1" comment="kgraft-patch-SLE12_Update_39 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258075" version="1" comment="libvirt is &lt;1.2.5-27.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258076" version="1" comment="libvirt-client is &lt;1.2.5-27.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258077" version="1" comment="libvirt-daemon is &lt;1.2.5-27.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258078" version="1" comment="libvirt-daemon-config-network is &lt;1.2.5-27.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258079" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.2.5-27.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258080" version="1" comment="libvirt-daemon-driver-interface is &lt;1.2.5-27.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258081" version="1" comment="libvirt-daemon-driver-libxl is &lt;1.2.5-27.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258082" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.2.5-27.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258083" version="1" comment="libvirt-daemon-driver-network is &lt;1.2.5-27.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258084" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.2.5-27.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258085" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.2.5-27.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258086" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.2.5-27.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258087" version="1" comment="libvirt-daemon-driver-secret is &lt;1.2.5-27.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258088" version="1" comment="libvirt-daemon-driver-storage is &lt;1.2.5-27.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258089" version="1" comment="libvirt-daemon-lxc is &lt;1.2.5-27.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258090" version="1" comment="libvirt-daemon-qemu is &lt;1.2.5-27.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258091" version="1" comment="libvirt-daemon-xen is &lt;1.2.5-27.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258092" version="1" comment="libvirt-doc is &lt;1.2.5-27.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258093" version="1" comment="libvirt-lock-sanlock is &lt;1.2.5-27.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258094" version="1" comment="kernel-default is &lt;3.12.61-52.154" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258095" version="1" comment="kernel-default-base is &lt;3.12.61-52.154" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258096" version="1" comment="kernel-default-devel is &lt;3.12.61-52.154" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258097" version="1" comment="kernel-default-man is &lt;3.12.61-52.154" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258098" version="1" comment="kernel-devel is &lt;3.12.61-52.154" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258099" version="1" comment="kernel-macros is &lt;3.12.61-52.154" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258100" version="1" comment="kernel-source is &lt;3.12.61-52.154" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258101" version="1" comment="kernel-syms is &lt;3.12.61-52.154" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258102" version="1" comment="kernel-xen is &lt;3.12.61-52.154" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258103" version="1" comment="kernel-xen-base is &lt;3.12.61-52.154" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258104" version="1" comment="kernel-xen-devel is &lt;3.12.61-52.154" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258105" version="1" comment="kgraft-patch-3_12_61-52_154-default is &lt;1-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258106" version="1" comment="kgraft-patch-3_12_61-52_154-xen is &lt;1-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258107" version="1" comment="kgraft-patch-SLE12_Update_40 is &lt;1-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243610" version="1" comment="libpython2_7-1_0 is &lt;2.7.9-16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243611" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.9-16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243612" version="1" comment="python is &lt;2.7.9-16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243613" version="1" comment="python-32bit is &lt;2.7.9-16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243614" version="1" comment="python-base is &lt;2.7.9-16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243615" version="1" comment="python-base-32bit is &lt;2.7.9-16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243616" version="1" comment="python-curses is &lt;2.7.9-16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243617" version="1" comment="python-demo is &lt;2.7.9-16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243618" version="1" comment="python-doc is &lt;2.7.9-16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243619" version="1" comment="python-doc-pdf is &lt;2.7.9-16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243620" version="1" comment="python-gdbm is &lt;2.7.9-16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243621" version="1" comment="python-idle is &lt;2.7.9-16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243622" version="1" comment="python-tk is &lt;2.7.9-16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243623" version="1" comment="python-xml is &lt;2.7.9-16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243795" version="1" comment="libspice-server1 is &lt;0.12.4-8.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243796" version="1" comment="spice is &lt;0.12.4-8.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244069" version="1" comment="kgraft-patch-3_12_61-52_141-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244070" version="1" comment="kgraft-patch-3_12_61-52_141-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244071" version="1" comment="kgraft-patch-SLE12_Update_37 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244072" version="1" comment="kgraft-patch-3_12_61-52_136-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244073" version="1" comment="kgraft-patch-3_12_61-52_136-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244074" version="1" comment="kgraft-patch-SLE12_Update_36 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244075" version="1" comment="kgraft-patch-3_12_61-52_119-default is &lt;12-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244076" version="1" comment="kgraft-patch-3_12_61-52_119-xen is &lt;12-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244077" version="1" comment="kgraft-patch-SLE12_Update_31 is &lt;12-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244078" version="1" comment="kgraft-patch-3_12_61-52_146-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244079" version="1" comment="kgraft-patch-3_12_61-52_146-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244080" version="1" comment="kgraft-patch-SLE12_Update_38 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244081" version="1" comment="kgraft-patch-3_12_61-52_125-default is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244082" version="1" comment="kgraft-patch-3_12_61-52_125-xen is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244083" version="1" comment="kgraft-patch-SLE12_Update_33 is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244084" version="1" comment="kgraft-patch-3_12_61-52_128-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244085" version="1" comment="kgraft-patch-3_12_61-52_128-xen is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244086" version="1" comment="kgraft-patch-SLE12_Update_34 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244087" version="1" comment="kgraft-patch-3_12_61-52_122-default is &lt;12-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244088" version="1" comment="kgraft-patch-3_12_61-52_122-xen is &lt;12-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244089" version="1" comment="kgraft-patch-SLE12_Update_32 is &lt;12-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244090" version="1" comment="kgraft-patch-3_12_61-52_133-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244091" version="1" comment="kgraft-patch-3_12_61-52_133-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244092" version="1" comment="kgraft-patch-SLE12_Update_35 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244494" version="1" comment="kernel-firmware is &lt;20140807git-5.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244495" version="1" comment="ucode-amd is &lt;20140807git-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244496" version="1" comment="libgudev-1_0-0 is &lt;210-70.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244497" version="1" comment="libgudev-1_0-0-32bit is &lt;210-70.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244498" version="1" comment="libgudev-1_0-devel is &lt;210-70.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244499" version="1" comment="libudev-devel is &lt;210-70.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244500" version="1" comment="libudev1 is &lt;210-70.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244501" version="1" comment="libudev1-32bit is &lt;210-70.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244502" version="1" comment="systemd is &lt;210-70.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244503" version="1" comment="systemd-32bit is &lt;210-70.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244504" version="1" comment="systemd-bash-completion is &lt;210-70.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244505" version="1" comment="systemd-devel is &lt;210-70.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244506" version="1" comment="systemd-sysvinit is &lt;210-70.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244507" version="1" comment="typelib-1_0-GUdev-1_0 is &lt;210-70.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244508" version="1" comment="udev is &lt;210-70.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244878" version="1" comment="qemu is &lt;2.0.2-48.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244879" version="1" comment="qemu-block-curl is &lt;2.0.2-48.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244880" version="1" comment="qemu-block-rbd is &lt;2.0.2-48.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244881" version="1" comment="qemu-guest-agent is &lt;2.0.2-48.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244882" version="1" comment="qemu-ipxe is &lt;1.0.0-48.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244883" version="1" comment="qemu-kvm is &lt;2.0.2-48.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244884" version="1" comment="qemu-lang is &lt;2.0.2-48.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244885" version="1" comment="qemu-ppc is &lt;2.0.2-48.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244886" version="1" comment="qemu-s390 is &lt;2.0.2-48.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244887" version="1" comment="qemu-seabios is &lt;1.7.4-48.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244888" version="1" comment="qemu-sgabios is &lt;8-48.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244889" version="1" comment="qemu-tools is &lt;2.0.2-48.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244890" version="1" comment="qemu-vgabios is &lt;1.7.4-48.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244891" version="1" comment="qemu-x86 is &lt;2.0.2-48.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242821" version="1" comment="libgudev-1_0-0 is &lt;210-70.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242822" version="1" comment="libgudev-1_0-0-32bit is &lt;210-70.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242823" version="1" comment="libgudev-1_0-devel is &lt;210-70.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242824" version="1" comment="libudev-devel is &lt;210-70.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242825" version="1" comment="libudev1 is &lt;210-70.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242826" version="1" comment="libudev1-32bit is &lt;210-70.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242827" version="1" comment="systemd is &lt;210-70.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242828" version="1" comment="systemd-32bit is &lt;210-70.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242829" version="1" comment="systemd-bash-completion is &lt;210-70.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242830" version="1" comment="systemd-devel is &lt;210-70.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242831" version="1" comment="systemd-sysvinit is &lt;210-70.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242832" version="1" comment="typelib-1_0-GUdev-1_0 is &lt;210-70.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242833" version="1" comment="udev is &lt;210-70.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245581" version="1" comment="libipa_hbac0 is &lt;1.11.5.1-10.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245582" version="1" comment="libsss_idmap0 is &lt;1.11.5.1-10.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245583" version="1" comment="libsss_sudo is &lt;1.11.5.1-10.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245584" version="1" comment="python-sssd-config is &lt;1.11.5.1-10.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245585" version="1" comment="sssd is &lt;1.11.5.1-10.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245586" version="1" comment="sssd-32bit is &lt;1.11.5.1-10.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245587" version="1" comment="sssd-ad is &lt;1.11.5.1-10.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245588" version="1" comment="sssd-ipa is &lt;1.11.5.1-10.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245589" version="1" comment="sssd-krb5 is &lt;1.11.5.1-10.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245590" version="1" comment="sssd-krb5-common is &lt;1.11.5.1-10.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245591" version="1" comment="sssd-ldap is &lt;1.11.5.1-10.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245592" version="1" comment="sssd-proxy is &lt;1.11.5.1-10.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245593" version="1" comment="sssd-tools is &lt;1.11.5.1-10.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246081" version="1" comment="kgraft-patch-3_12_61-52_125-default is &lt;12-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246082" version="1" comment="kgraft-patch-3_12_61-52_125-xen is &lt;12-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246083" version="1" comment="kgraft-patch-SLE12_Update_33 is &lt;12-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246084" version="1" comment="kgraft-patch-3_12_61-52_141-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246085" version="1" comment="kgraft-patch-3_12_61-52_141-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246086" version="1" comment="kgraft-patch-SLE12_Update_37 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246087" version="1" comment="kgraft-patch-3_12_61-52_146-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246088" version="1" comment="kgraft-patch-3_12_61-52_146-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246089" version="1" comment="kgraft-patch-SLE12_Update_38 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246090" version="1" comment="kgraft-patch-3_12_61-52_136-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246091" version="1" comment="kgraft-patch-3_12_61-52_136-xen is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246092" version="1" comment="kgraft-patch-SLE12_Update_36 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246093" version="1" comment="kgraft-patch-3_12_61-52_133-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246094" version="1" comment="kgraft-patch-3_12_61-52_133-xen is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246095" version="1" comment="kgraft-patch-SLE12_Update_35 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246096" version="1" comment="kgraft-patch-3_12_61-52_128-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246097" version="1" comment="kgraft-patch-3_12_61-52_128-xen is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246098" version="1" comment="kgraft-patch-SLE12_Update_34 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246334" version="1" comment="ntp is &lt;4.2.8p13-46.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246335" version="1" comment="ntp-doc is &lt;4.2.8p13-46.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246730" version="1" comment="xen is &lt;4.4.4_40-22.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246731" version="1" comment="xen-doc-html is &lt;4.4.4_40-22.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246732" version="1" comment="xen-kmp-default is &lt;4.4.4_40_k3.12.61_52.146-22.77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246733" version="1" comment="xen-libs is &lt;4.4.4_40-22.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246734" version="1" comment="xen-libs-32bit is &lt;4.4.4_40-22.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246735" version="1" comment="xen-tools is &lt;4.4.4_40-22.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246736" version="1" comment="xen-tools-domU is &lt;4.4.4_40-22.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247250" version="1" comment="apache2 is &lt;2.4.10-14.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247251" version="1" comment="apache2-doc is &lt;2.4.10-14.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247252" version="1" comment="apache2-example-pages is &lt;2.4.10-14.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247253" version="1" comment="apache2-prefork is &lt;2.4.10-14.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247254" version="1" comment="apache2-utils is &lt;2.4.10-14.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247255" version="1" comment="apache2-worker is &lt;2.4.10-14.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251390" version="1" comment="libsqlite3-0 is &lt;3.8.3.1-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251391" version="1" comment="libsqlite3-0-32bit is &lt;3.8.3.1-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251392" version="1" comment="sqlite3 is &lt;3.8.3.1-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196891" version="1" comment="bind-chrootenv is &lt;9.9.6P1-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196892" version="1" comment="bind-doc is &lt;9.9.6P1-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196893" version="1" comment="grub2-powerpc-ieee1275 is &lt;2.02~beta2-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196894" version="1" comment="grub2-s390x-emu is &lt;2.02~beta2-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196895" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196896" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196897" version="1" comment="openssl-doc is &lt;1.0.1i-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196898" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr2.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196899" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr2.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196900" version="1" comment="kernel-default-base is &lt;3.12.51-60.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196901" version="1" comment="kernel-default-man is &lt;3.12.51-60.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196902" version="1" comment="kernel-xen-base is &lt;3.12.51-60.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196903" version="1" comment="tdb-tools is &lt;1.3.8-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196904" version="1" comment="xen-doc-html is &lt;4.5.2_02-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196905" version="1" comment="xen-tools is &lt;4.5.2_02-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196906" version="1" comment="xen-tools-domU is &lt;4.5.2_02-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196907" version="1" comment="kernel-default-base is &lt;3.12.59-60.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196908" version="1" comment="kernel-default-man is &lt;3.12.59-60.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196909" version="1" comment="kernel-xen-base is &lt;3.12.59-60.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196910" version="1" comment="qemu-block-rbd is &lt;2.3.1-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196911" version="1" comment="qemu-guest-agent is &lt;2.3.1-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196912" version="1" comment="qemu-lang is &lt;2.3.1-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196913" version="1" comment="qemu-ppc is &lt;2.3.1-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196914" version="1" comment="qemu-s390 is &lt;2.3.1-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196915" version="1" comment="kernel-default-base is &lt;3.12.59-60.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196916" version="1" comment="kernel-default-man is &lt;3.12.59-60.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196917" version="1" comment="kernel-xen-base is &lt;3.12.59-60.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196918" version="1" comment="glibc-html is &lt;2.19-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196919" version="1" comment="glibc-profile is &lt;2.19-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196920" version="1" comment="glibc-profile-32bit is &lt;2.19-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196921" version="1" comment="apache2-doc is &lt;2.4.16-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196922" version="1" comment="apache2-example-pages is &lt;2.4.16-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196923" version="1" comment="apache2-prefork is &lt;2.4.16-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196924" version="1" comment="apache2-utils is &lt;2.4.16-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196925" version="1" comment="apache2-worker is &lt;2.4.16-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196926" version="1" comment="bind-chrootenv is &lt;9.9.6P1-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196927" version="1" comment="bind-doc is &lt;9.9.6P1-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196928" version="1" comment="squid is &lt;3.3.14-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196929" version="1" comment="libvirt-lock-sanlock is &lt;1.2.18.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196930" version="1" comment="xen-doc-html is &lt;4.5.3_08-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196931" version="1" comment="xen-tools is &lt;4.5.3_08-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196932" version="1" comment="xen-tools-domU is &lt;4.5.3_08-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196933" version="1" comment="kernel-default-base is &lt;3.12.51-60.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196934" version="1" comment="kernel-default-man is &lt;3.12.51-60.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196935" version="1" comment="kernel-xen-base is &lt;3.12.51-60.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196936" version="1" comment="python-doc is &lt;2.7.9-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196937" version="1" comment="python-doc-pdf is &lt;2.7.9-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196938" version="1" comment="kernel-default-base is &lt;3.12.62-60.62" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196939" version="1" comment="kernel-default-man is &lt;3.12.62-60.62" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196940" version="1" comment="kernel-xen-base is &lt;3.12.62-60.62" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196941" version="1" comment="krb5-doc is &lt;1.12.1-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196942" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.1-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196943" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.1-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196944" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.1-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196945" version="1" comment="krb5-server is &lt;1.12.1-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196946" version="1" comment="tomcat is &lt;8.0.32-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196947" version="1" comment="tomcat-admin-webapps is &lt;8.0.32-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196948" version="1" comment="tomcat-docs-webapp is &lt;8.0.32-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196949" version="1" comment="tomcat-el-3_0-api is &lt;8.0.32-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196950" version="1" comment="tomcat-javadoc is &lt;8.0.32-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196951" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.32-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196952" version="1" comment="tomcat-lib is &lt;8.0.32-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196953" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.32-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196954" version="1" comment="tomcat-webapps is &lt;8.0.32-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196955" version="1" comment="mariadb-tools is &lt;10.0.26-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196956" version="1" comment="cyrus-imapd is &lt;2.3.18-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196957" version="1" comment="perl-Cyrus-IMAP is &lt;2.3.18-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196958" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.3.18-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196959" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196960" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196961" version="1" comment="openssl-doc is &lt;1.0.1i-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196962" version="1" comment="xen-doc-html is &lt;4.5.3_10-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196963" version="1" comment="xen-tools is &lt;4.5.3_10-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196964" version="1" comment="xen-tools-domU is &lt;4.5.3_10-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196965" version="1" comment="squidGuard is &lt;1.4-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196966" version="1" comment="squidGuard-doc is &lt;1.4-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196967" version="1" comment="kernel-default-base is &lt;3.12.62-60.64.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196968" version="1" comment="kernel-default-man is &lt;3.12.62-60.64.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196969" version="1" comment="kernel-xen-base is &lt;3.12.62-60.64.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196970" version="1" comment="qemu-block-rbd is &lt;2.3.1-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196971" version="1" comment="qemu-guest-agent is &lt;2.3.1-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196972" version="1" comment="qemu-lang is &lt;2.3.1-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196973" version="1" comment="qemu-ppc is &lt;2.3.1-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196974" version="1" comment="qemu-s390 is &lt;2.3.1-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196975" version="1" comment="libxml2-doc is &lt;2.9.1-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196976" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.72-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196977" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.72-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196978" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr3.10-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196979" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr3.10-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196980" version="1" comment="kernel-default-base is &lt;3.12.67-60.64.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196981" version="1" comment="kernel-default-man is &lt;3.12.67-60.64.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196982" version="1" comment="kernel-xen-base is &lt;3.12.67-60.64.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196983" version="1" comment="qemu-block-rbd is &lt;2.3.1-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196984" version="1" comment="qemu-guest-agent is &lt;2.3.1-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196985" version="1" comment="qemu-lang is &lt;2.3.1-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196986" version="1" comment="qemu-ppc is &lt;2.3.1-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196987" version="1" comment="qemu-s390 is &lt;2.3.1-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196988" version="1" comment="kernel-default-base is &lt;3.12.67-60.64.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196989" version="1" comment="kernel-default-man is &lt;3.12.67-60.64.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196990" version="1" comment="kernel-xen-base is &lt;3.12.67-60.64.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196991" version="1" comment="tomcat is &lt;8.0.32-10.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196992" version="1" comment="tomcat-admin-webapps is &lt;8.0.32-10.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196993" version="1" comment="tomcat-docs-webapp is &lt;8.0.32-10.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196994" version="1" comment="tomcat-el-3_0-api is &lt;8.0.32-10.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196995" version="1" comment="tomcat-javadoc is &lt;8.0.32-10.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196996" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.32-10.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196997" version="1" comment="tomcat-lib is &lt;8.0.32-10.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196998" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.32-10.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009196999" version="1" comment="tomcat-webapps is &lt;8.0.32-10.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197000" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr3.21-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197001" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr3.21-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197002" version="1" comment="xen-doc-html is &lt;4.5.5_02-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197003" version="1" comment="xen-tools is &lt;4.5.5_02-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197004" version="1" comment="xen-tools-domU is &lt;4.5.5_02-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197005" version="1" comment="mariadb-tools is &lt;10.0.22-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197006" version="1" comment="kernel-default-base is &lt;3.12.67-60.64.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197007" version="1" comment="kernel-default-man is &lt;3.12.67-60.64.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197008" version="1" comment="kernel-xen-base is &lt;3.12.67-60.64.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197009" version="1" comment="xen-doc-html is &lt;4.5.5_04-22.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197010" version="1" comment="xen-tools is &lt;4.5.5_04-22.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197011" version="1" comment="xen-tools-domU is &lt;4.5.5_04-22.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197012" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr2.10-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197013" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr2.10-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197014" version="1" comment="qemu-block-rbd is &lt;2.3.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197015" version="1" comment="qemu-guest-agent is &lt;2.3.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197016" version="1" comment="qemu-lang is &lt;2.3.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197017" version="1" comment="qemu-ppc is &lt;2.3.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197018" version="1" comment="qemu-s390 is &lt;2.3.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197019" version="1" comment="glibc-html is &lt;2.19-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197020" version="1" comment="glibc-profile is &lt;2.19-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197021" version="1" comment="glibc-profile-32bit is &lt;2.19-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197022" version="1" comment="dhcp-relay is &lt;4.3.3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197023" version="1" comment="dhcp-server is &lt;4.3.3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197024" version="1" comment="kernel-default-base is &lt;3.12.53-60.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197025" version="1" comment="kernel-default-man is &lt;3.12.53-60.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197026" version="1" comment="kernel-xen-base is &lt;3.12.53-60.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197027" version="1" comment="lttng-modules is &lt;2.7.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197028" version="1" comment="lttng-modules-kmp-default is &lt;2.7.0_k3.12.53_60.30-3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197029" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197030" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197031" version="1" comment="openssl-doc is &lt;1.0.1i-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197032" version="1" comment="bind-chrootenv is &lt;9.9.6P1-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197033" version="1" comment="bind-doc is &lt;9.9.6P1-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197034" version="1" comment="tomcat is &lt;8.0.32-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197035" version="1" comment="tomcat-admin-webapps is &lt;8.0.32-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197036" version="1" comment="tomcat-docs-webapp is &lt;8.0.32-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197037" version="1" comment="tomcat-el-3_0-api is &lt;8.0.32-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197038" version="1" comment="tomcat-javadoc is &lt;8.0.32-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197039" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.32-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197040" version="1" comment="tomcat-lib is &lt;8.0.32-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197041" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.32-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197042" version="1" comment="tomcat-webapps is &lt;8.0.32-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197043" version="1" comment="xen-doc-html is &lt;4.5.2_06-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197044" version="1" comment="xen-tools is &lt;4.5.2_06-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197045" version="1" comment="xen-tools-domU is &lt;4.5.2_06-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197046" version="1" comment="libvirt-lock-sanlock is &lt;1.2.18.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197047" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.77-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197048" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.77-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197049" version="1" comment="kernel-default-base is &lt;3.12.57-60.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197050" version="1" comment="kernel-default-man is &lt;3.12.57-60.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197051" version="1" comment="kernel-xen-base is &lt;3.12.57-60.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197052" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197053" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197054" version="1" comment="openssl-doc is &lt;1.0.1i-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197055" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.91-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197056" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.91-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197057" version="1" comment="mariadb-tools is &lt;10.0.25-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197058" version="1" comment="kernel-default-man is &lt;3.12.74-60.64.48" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197059" version="1" comment="kernel-default-man is &lt;3.12.74-60.64.51" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197060" version="1" comment="kernel-default-man is &lt;3.12.74-60.64.54" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197061" version="1" comment="kernel-default-man is &lt;3.12.74-60.64.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197062" version="1" comment="policycoreutils is &lt;2.3-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197063" version="1" comment="policycoreutils-python is &lt;2.3-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197064" version="1" comment="kernel-default-man is &lt;3.12.74-60.64.63" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197065" version="1" comment="qemu-s390 is &lt;2.3.1-33.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197066" version="1" comment="kernel-default-man is &lt;3.12.74-60.64.66" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197067" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-54.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197068" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-54.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197069" version="1" comment="openssl-doc is &lt;1.0.1i-54.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197070" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr4.0-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197071" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr4.0-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197072" version="1" comment="kernel-default-base is &lt;3.12.69-60.64.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197073" version="1" comment="kernel-default-man is &lt;3.12.69-60.64.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197074" version="1" comment="kernel-xen-base is &lt;3.12.69-60.64.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197075" version="1" comment="kernel-default-base is &lt;3.12.69-60.64.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197076" version="1" comment="kernel-default-man is &lt;3.12.69-60.64.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197077" version="1" comment="kernel-xen-base is &lt;3.12.69-60.64.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197078" version="1" comment="xen-doc-html is &lt;4.5.5_06-22.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197079" version="1" comment="xen-tools is &lt;4.5.5_06-22.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197080" version="1" comment="xen-tools-domU is &lt;4.5.5_06-22.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197081" version="1" comment="dracut-fips is &lt;037-91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197082" version="1" comment="apache2-doc is &lt;2.4.16-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197083" version="1" comment="apache2-example-pages is &lt;2.4.16-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197084" version="1" comment="apache2-prefork is &lt;2.4.16-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197085" version="1" comment="apache2-utils is &lt;2.4.16-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197086" version="1" comment="apache2-worker is &lt;2.4.16-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197087" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr4.1-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197088" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr4.1-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197089" version="1" comment="kernel-default-base is &lt;3.12.69-60.64.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197090" version="1" comment="kernel-default-man is &lt;3.12.69-60.64.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197091" version="1" comment="kernel-xen-base is &lt;3.12.69-60.64.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197092" version="1" comment="squid is &lt;3.3.14-22.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197093" version="1" comment="xen-doc-html is &lt;4.5.5_10-22.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197094" version="1" comment="xen-tools is &lt;4.5.5_10-22.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197095" version="1" comment="xen-tools-domU is &lt;4.5.5_10-22.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197096" version="1" comment="qemu-block-rbd is &lt;2.3.1-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197097" version="1" comment="qemu-guest-agent is &lt;2.3.1-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197098" version="1" comment="qemu-lang is &lt;2.3.1-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197099" version="1" comment="qemu-ppc is &lt;2.3.1-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197100" version="1" comment="qemu-s390 is &lt;2.3.1-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197101" version="1" comment="kernel-default-base is &lt;3.12.74-60.64.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197102" version="1" comment="kernel-default-man is &lt;3.12.74-60.64.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197103" version="1" comment="kernel-xen-base is &lt;3.12.74-60.64.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197104" version="1" comment="libxml2-doc is &lt;2.9.1-26.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197105" version="1" comment="tomcat is &lt;8.0.43-10.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197106" version="1" comment="tomcat-admin-webapps is &lt;8.0.43-10.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197107" version="1" comment="tomcat-docs-webapp is &lt;8.0.43-10.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197108" version="1" comment="tomcat-el-3_0-api is &lt;8.0.43-10.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197109" version="1" comment="tomcat-javadoc is &lt;8.0.43-10.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197110" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.43-10.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197111" version="1" comment="tomcat-lib is &lt;8.0.43-10.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197112" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.43-10.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197113" version="1" comment="tomcat-webapps is &lt;8.0.43-10.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197114" version="1" comment="kernel-default-man is &lt;3.12.74-60.64.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229341" version="1" comment="kernel-default-man is &lt;3.12.74-60.64.96" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232584" version="1" comment="kernel-default-man is &lt;3.12.74-60.64.99" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233799" version="1" comment="qemu-s390 is &lt;2.3.1-33.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235532" version="1" comment="kernel-default-man is &lt;3.12.74-60.64.104" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236410" version="1" comment="kernel-default-man is &lt;3.12.74-60.64.107" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237319" version="1" comment="kgraft-patch-3_12_74-60_64_96-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237320" version="1" comment="kgraft-patch-3_12_74-60_64_96-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237321" version="1" comment="kgraft-patch-SLE12-SP1_Update_29 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237322" version="1" comment="kgraft-patch-3_12_74-60_64_93-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237323" version="1" comment="kgraft-patch-3_12_74-60_64_93-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237324" version="1" comment="kgraft-patch-SLE12-SP1_Update_28 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237325" version="1" comment="kgraft-patch-3_12_74-60_64_88-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237326" version="1" comment="kgraft-patch-3_12_74-60_64_88-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237327" version="1" comment="kgraft-patch-SLE12-SP1_Update_27 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237328" version="1" comment="kgraft-patch-3_12_74-60_64_85-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237329" version="1" comment="kgraft-patch-3_12_74-60_64_85-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237330" version="1" comment="kgraft-patch-SLE12-SP1_Update_26 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237331" version="1" comment="kgraft-patch-3_12_74-60_64_82-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237332" version="1" comment="kgraft-patch-3_12_74-60_64_82-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237333" version="1" comment="kgraft-patch-SLE12-SP1_Update_25 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237334" version="1" comment="kgraft-patch-3_12_74-60_64_69-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237335" version="1" comment="kgraft-patch-3_12_74-60_64_69-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237336" version="1" comment="kgraft-patch-SLE12-SP1_Update_24 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237337" version="1" comment="kgraft-patch-3_12_74-60_64_66-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237338" version="1" comment="kgraft-patch-3_12_74-60_64_66-xen is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237339" version="1" comment="kgraft-patch-SLE12-SP1_Update_23 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237340" version="1" comment="kgraft-patch-3_12_74-60_64_63-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237341" version="1" comment="kgraft-patch-3_12_74-60_64_63-xen is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237342" version="1" comment="kgraft-patch-SLE12-SP1_Update_22 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237343" version="1" comment="kgraft-patch-3_12_74-60_64_104-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237344" version="1" comment="kgraft-patch-3_12_74-60_64_104-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237345" version="1" comment="kgraft-patch-SLE12-SP1_Update_31 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237346" version="1" comment="kgraft-patch-3_12_74-60_64_99-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237347" version="1" comment="kgraft-patch-3_12_74-60_64_99-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237348" version="1" comment="kgraft-patch-SLE12-SP1_Update_30 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237941" version="1" comment="kgraft-patch-3_12_74-60_64_107-default is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237942" version="1" comment="kgraft-patch-3_12_74-60_64_107-xen is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237943" version="1" comment="kgraft-patch-SLE12-SP1_Update_32 is &lt;2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197115" version="1" comment="kernel-default-man is &lt;3.12.74-60.64.69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239236" version="1" comment="kgraft-patch-3_12_74-60_64_88-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239237" version="1" comment="kgraft-patch-3_12_74-60_64_88-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239238" version="1" comment="kgraft-patch-SLE12-SP1_Update_27 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239239" version="1" comment="kgraft-patch-3_12_74-60_64_85-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239240" version="1" comment="kgraft-patch-3_12_74-60_64_85-xen is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239241" version="1" comment="kgraft-patch-SLE12-SP1_Update_26 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239242" version="1" comment="kgraft-patch-3_12_74-60_64_96-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239243" version="1" comment="kgraft-patch-3_12_74-60_64_96-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239244" version="1" comment="kgraft-patch-SLE12-SP1_Update_29 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239245" version="1" comment="kgraft-patch-3_12_74-60_64_93-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239246" version="1" comment="kgraft-patch-3_12_74-60_64_93-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239247" version="1" comment="kgraft-patch-SLE12-SP1_Update_28 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239248" version="1" comment="kgraft-patch-3_12_74-60_64_82-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239249" version="1" comment="kgraft-patch-3_12_74-60_64_82-xen is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239250" version="1" comment="kgraft-patch-SLE12-SP1_Update_25 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239251" version="1" comment="kgraft-patch-3_12_74-60_64_99-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239252" version="1" comment="kgraft-patch-3_12_74-60_64_99-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239253" version="1" comment="kgraft-patch-SLE12-SP1_Update_30 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239254" version="1" comment="kgraft-patch-3_12_74-60_64_66-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239255" version="1" comment="kgraft-patch-3_12_74-60_64_66-xen is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239256" version="1" comment="kgraft-patch-SLE12-SP1_Update_23 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239257" version="1" comment="kgraft-patch-3_12_74-60_64_69-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239258" version="1" comment="kgraft-patch-3_12_74-60_64_69-xen is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239259" version="1" comment="kgraft-patch-SLE12-SP1_Update_24 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239260" version="1" comment="kgraft-patch-3_12_74-60_64_107-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239261" version="1" comment="kgraft-patch-3_12_74-60_64_107-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239262" version="1" comment="kgraft-patch-SLE12-SP1_Update_32 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239263" version="1" comment="kgraft-patch-3_12_74-60_64_104-default is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239264" version="1" comment="kgraft-patch-3_12_74-60_64_104-xen is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239265" version="1" comment="kgraft-patch-SLE12-SP1_Update_31 is &lt;3-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240995" version="1" comment="qemu-ppc is &lt;2.3.1-33.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240996" version="1" comment="qemu-s390 is &lt;2.3.1-33.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241935" version="1" comment="kgraft-patch-3_12_74-60_64_99-default is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241936" version="1" comment="kgraft-patch-3_12_74-60_64_99-xen is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241937" version="1" comment="kgraft-patch-SLE12-SP1_Update_30 is &lt;6-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241938" version="1" comment="kgraft-patch-3_12_74-60_64_82-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241939" version="1" comment="kgraft-patch-3_12_74-60_64_82-xen is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241940" version="1" comment="kgraft-patch-SLE12-SP1_Update_25 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241941" version="1" comment="kgraft-patch-3_12_74-60_64_107-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241942" version="1" comment="kgraft-patch-3_12_74-60_64_107-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241943" version="1" comment="kgraft-patch-SLE12-SP1_Update_32 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241944" version="1" comment="kgraft-patch-3_12_74-60_64_69-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241945" version="1" comment="kgraft-patch-3_12_74-60_64_69-xen is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241946" version="1" comment="kgraft-patch-SLE12-SP1_Update_24 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241947" version="1" comment="kgraft-patch-3_12_74-60_64_85-default is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241948" version="1" comment="kgraft-patch-3_12_74-60_64_85-xen is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241949" version="1" comment="kgraft-patch-SLE12-SP1_Update_26 is &lt;10-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241950" version="1" comment="kgraft-patch-3_12_74-60_64_104-default is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241951" version="1" comment="kgraft-patch-3_12_74-60_64_104-xen is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241952" version="1" comment="kgraft-patch-SLE12-SP1_Update_31 is &lt;4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241953" version="1" comment="kgraft-patch-3_12_74-60_64_96-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241954" version="1" comment="kgraft-patch-3_12_74-60_64_96-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241955" version="1" comment="kgraft-patch-SLE12-SP1_Update_29 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241956" version="1" comment="kgraft-patch-3_12_74-60_64_88-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241957" version="1" comment="kgraft-patch-3_12_74-60_64_88-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241958" version="1" comment="kgraft-patch-SLE12-SP1_Update_27 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241959" version="1" comment="kgraft-patch-3_12_74-60_64_93-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241960" version="1" comment="kgraft-patch-3_12_74-60_64_93-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241961" version="1" comment="kgraft-patch-SLE12-SP1_Update_28 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197116" version="1" comment="kernel-default-man is &lt;3.12.74-60.64.82" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197117" version="1" comment="qemu-s390 is &lt;2.3.1-33.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197118" version="1" comment="kernel-default-man is &lt;3.12.74-60.64.85" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197119" version="1" comment="kernel-default is &lt;3.12.74-60.64.72" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197120" version="1" comment="kernel-default-base is &lt;3.12.74-60.64.72" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197121" version="1" comment="kernel-default-devel is &lt;3.12.74-60.64.72" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197122" version="1" comment="kernel-default-man is &lt;3.12.74-60.64.72" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197123" version="1" comment="kernel-devel is &lt;3.12.74-60.64.72" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197124" version="1" comment="kernel-macros is &lt;3.12.74-60.64.72" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197125" version="1" comment="kernel-source is &lt;3.12.74-60.64.72" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197126" version="1" comment="kernel-syms is &lt;3.12.74-60.64.72" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197127" version="1" comment="kernel-default-man is &lt;3.12.74-60.64.88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197128" version="1" comment="qemu-s390 is &lt;2.3.1-33.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197129" version="1" comment="kernel-default-man is &lt;3.12.74-60.64.93" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253693" version="1" comment="qemu-ppc is &lt;2.3.1-33.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253694" version="1" comment="qemu-s390 is &lt;2.3.1-33.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253830" version="1" comment="kernel-default-man is &lt;3.12.74-60.64.110" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257034" version="1" comment="kernel-default-man is &lt;3.12.74-60.64.115" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259440" version="1" comment="kernel-default-man is &lt;3.12.74-60.64.118" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261337" version="1" comment="libmysqlclient-devel is &lt;10.0.38-29.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261338" version="1" comment="libmysqlclient_r18 is &lt;10.0.38-29.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261339" version="1" comment="libmysqld-devel is &lt;10.0.38-29.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261340" version="1" comment="libmysqld18 is &lt;10.0.38-29.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262809" version="1" comment="qemu-ppc is &lt;2.3.1-33.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262810" version="1" comment="qemu-s390 is &lt;2.3.1-33.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263345" version="1" comment="kernel-default-man is &lt;3.12.74-60.64.121" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244220" version="1" comment="kgraft-patch-3_12_74-60_64_93-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244221" version="1" comment="kgraft-patch-3_12_74-60_64_93-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244222" version="1" comment="kgraft-patch-SLE12-SP1_Update_28 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244223" version="1" comment="kgraft-patch-3_12_74-60_64_85-default is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244224" version="1" comment="kgraft-patch-3_12_74-60_64_85-xen is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244225" version="1" comment="kgraft-patch-SLE12-SP1_Update_26 is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244226" version="1" comment="kgraft-patch-3_12_74-60_64_82-default is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244227" version="1" comment="kgraft-patch-3_12_74-60_64_82-xen is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244228" version="1" comment="kgraft-patch-SLE12-SP1_Update_25 is &lt;11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244229" version="1" comment="kgraft-patch-3_12_74-60_64_104-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244230" version="1" comment="kgraft-patch-3_12_74-60_64_104-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244231" version="1" comment="kgraft-patch-SLE12-SP1_Update_31 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244232" version="1" comment="kgraft-patch-3_12_74-60_64_107-default is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244233" version="1" comment="kgraft-patch-3_12_74-60_64_107-xen is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244234" version="1" comment="kgraft-patch-SLE12-SP1_Update_32 is &lt;5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244235" version="1" comment="kgraft-patch-3_12_74-60_64_96-default is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244236" version="1" comment="kgraft-patch-3_12_74-60_64_96-xen is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244237" version="1" comment="kgraft-patch-SLE12-SP1_Update_29 is &lt;8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244238" version="1" comment="kgraft-patch-3_12_74-60_64_88-default is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244239" version="1" comment="kgraft-patch-3_12_74-60_64_88-xen is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244240" version="1" comment="kgraft-patch-SLE12-SP1_Update_27 is &lt;9-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244241" version="1" comment="kgraft-patch-3_12_74-60_64_99-default is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244242" version="1" comment="kgraft-patch-3_12_74-60_64_99-xen is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244243" version="1" comment="kgraft-patch-SLE12-SP1_Update_30 is &lt;7-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244924" version="1" comment="qemu-ppc is &lt;2.3.1-33.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244925" version="1" comment="qemu-s390 is &lt;2.3.1-33.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197130" version="1" comment="qemu-ppc is &lt;2.6.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197131" version="1" comment="qemu-s390 is &lt;2.6.2-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197132" version="1" comment="kernel-default-man is &lt;4.4.21-84" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197133" version="1" comment="xen-doc-html is &lt;4.7.1_02-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197134" version="1" comment="xen-tools is &lt;4.7.1_02-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197135" version="1" comment="xen-tools-domU is &lt;4.7.1_02-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197136" version="1" comment="kernel-default-man is &lt;4.4.21-90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197137" version="1" comment="xen-doc-html is &lt;4.7.1_04-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197138" version="1" comment="xen-tools is &lt;4.7.1_04-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197139" version="1" comment="xen-tools-domU is &lt;4.7.1_04-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197140" version="1" comment="kernel-default-man is &lt;4.4.59-92.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197141" version="1" comment="xen-doc-html is &lt;4.7.2_06-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197142" version="1" comment="xen-tools is &lt;4.7.2_06-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197143" version="1" comment="xen-tools-domU is &lt;4.7.2_06-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197144" version="1" comment="qemu-ppc is &lt;2.6.2-41.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197145" version="1" comment="qemu-s390 is &lt;2.6.2-41.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197146" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.6.1-16.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197147" version="1" comment="ncurses-devel-32bit is &lt;5.9-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197148" version="1" comment="kernel-default-man is &lt;4.4.74-92.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197149" version="1" comment="kernel-default-man is &lt;4.4.74-92.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197150" version="1" comment="ncurses-devel-32bit is &lt;5.9-50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197151" version="1" comment="kernel-default-man is &lt;4.4.74-92.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197152" version="1" comment="xen-doc-html is &lt;4.7.3_03-43.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197153" version="1" comment="xen-tools is &lt;4.7.3_03-43.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197154" version="1" comment="xen-tools-domU is &lt;4.7.3_03-43.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197155" version="1" comment="xen-doc-html is &lt;4.7.3_04-43.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197156" version="1" comment="xen-tools is &lt;4.7.3_04-43.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197157" version="1" comment="xen-tools-domU is &lt;4.7.3_04-43.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197158" version="1" comment="kernel-default-man is &lt;4.4.74-92.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197159" version="1" comment="xen-doc-html is &lt;4.7.3_06-43.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197160" version="1" comment="xen-tools is &lt;4.7.3_06-43.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197161" version="1" comment="xen-tools-domU is &lt;4.7.3_06-43.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197162" version="1" comment="kernel-default-man is &lt;4.4.90-92.45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197163" version="1" comment="qemu-ppc is &lt;2.6.2-41.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197164" version="1" comment="qemu-s390 is &lt;2.6.2-41.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197165" version="1" comment="tboot is &lt;20160518_1.9.4-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197166" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197167" version="1" comment="xen-doc-html is &lt;4.7.4_02-43.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197168" version="1" comment="xen-tools is &lt;4.7.4_02-43.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197169" version="1" comment="xen-tools-domU is &lt;4.7.4_02-43.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197170" version="1" comment="kernel-default-man is &lt;4.4.90-92.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197171" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197172" version="1" comment="kernel-default-man is &lt;4.4.103-92.53" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197173" version="1" comment="xen-doc-html is &lt;4.7.1_06-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197174" version="1" comment="xen-tools is &lt;4.7.1_06-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197175" version="1" comment="xen-tools-domU is &lt;4.7.1_06-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197176" version="1" comment="kernel-default-man is &lt;4.4.49-92.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197177" version="1" comment="qemu-ppc is &lt;2.6.2-41.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197178" version="1" comment="qemu-s390 is &lt;2.6.2-41.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197179" version="1" comment="kernel-default-man is &lt;4.4.49-92.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197180" version="1" comment="xen-doc-html is &lt;4.7.2_02-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197181" version="1" comment="xen-tools is &lt;4.7.2_02-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197182" version="1" comment="xen-tools-domU is &lt;4.7.2_02-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197183" version="1" comment="xen-doc-html is &lt;4.7.2_04-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197184" version="1" comment="xen-tools is &lt;4.7.2_04-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197185" version="1" comment="xen-tools-domU is &lt;4.7.2_04-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197186" version="1" comment="qemu-ppc is &lt;2.6.2-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197187" version="1" comment="qemu-s390 is &lt;2.6.2-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197188" version="1" comment="kernel-default-man is &lt;4.4.59-92.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197189" version="1" comment="kernel-default-man is &lt;4.4.38-93" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197190" version="1" comment="kernel-default-man is &lt;4.4.59-92.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197191" version="1" comment="kernel-default-man is &lt;4.4.103-92.56" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229591" version="1" comment="kernel-default-man is &lt;4.4.121-92.85" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232585" version="1" comment="kernel-default-man is &lt;4.4.121-92.92" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235802" version="1" comment="qemu-s390 is &lt;2.6.2-41.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236805" version="1" comment="kernel-default-man is &lt;4.4.121-92.95" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197193" version="1" comment="openvswitch-dpdk is &lt;2.5.1-25.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197194" version="1" comment="openvswitch-dpdk-switch is &lt;2.5.1-25.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197195" version="1" comment="qemu-ppc is &lt;2.6.2-41.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197196" version="1" comment="qemu-s390 is &lt;2.6.2-41.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197197" version="1" comment="kernel-default-man is &lt;4.4.114-92.64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242259" version="1" comment="qemu-s390 is &lt;2.6.2-41.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197198" version="1" comment="glibc-profile-32bit is &lt;2.22-62.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197199" version="1" comment="xen-doc-html is &lt;4.7.4_06-43.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197200" version="1" comment="xen-tools is &lt;4.7.4_06-43.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197201" version="1" comment="xen-tools-domU is &lt;4.7.4_06-43.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197202" version="1" comment="glibc-profile-32bit is &lt;2.22-62.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197203" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.20-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197204" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.20-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197205" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.20-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197206" version="1" comment="kernel-default-base is &lt;4.4.103-92.59" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197207" version="1" comment="kernel-default-devel is &lt;4.4.103-92.59" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197208" version="1" comment="kernel-default-man is &lt;4.4.103-92.59" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197209" version="1" comment="kernel-devel is &lt;4.4.103-92.59" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197210" version="1" comment="kernel-macros is &lt;4.4.103-92.59" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197211" version="1" comment="kernel-source is &lt;4.4.103-92.59" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197212" version="1" comment="kernel-syms is &lt;4.4.103-92.59" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197213" version="1" comment="kernel-default-man is &lt;4.4.120-92.70" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197214" version="1" comment="glibc-profile-32bit is &lt;2.22-62.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197215" version="1" comment="qemu-ppc is &lt;2.6.2-41.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197216" version="1" comment="qemu-s390 is &lt;2.6.2-41.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197217" version="1" comment="libvirt-daemon-hooks is &lt;2.0.0-27.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197218" version="1" comment="xen-doc-html is &lt;4.7.5_02-43.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197219" version="1" comment="xen-tools is &lt;4.7.5_02-43.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197220" version="1" comment="xen-tools-domU is &lt;4.7.5_02-43.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197221" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197222" version="1" comment="kernel-default-man is &lt;4.4.121-92.73" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197223" version="1" comment="ncurses-devel-32bit is &lt;5.9-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197224" version="1" comment="qemu-s390 is &lt;2.6.2-41.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197225" version="1" comment="kernel-default-man is &lt;4.4.121-92.80" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253695" version="1" comment="qemu-s390 is &lt;2.6.2-41.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253831" version="1" comment="kernel-default-man is &lt;4.4.121-92.109" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257035" version="1" comment="kernel-default-man is &lt;4.4.121-92.114" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259210" version="1" comment="kernel-default-man is &lt;4.4.121-92.117" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263874" version="1" comment="qemu-s390 is &lt;2.6.2-41.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263757" version="1" comment="kernel-default-man is &lt;4.4.121-92.120" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244676" version="1" comment="kernel-default-man is &lt;4.4.121-92.101" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245071" version="1" comment="qemu-s390 is &lt;2.6.2-41.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246737" version="1" comment="kernel-default-man is &lt;4.4.121-92.104" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197226" version="1" comment="libtcmu1 is &lt;1.2.0-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197227" version="1" comment="freeradius-server-doc is &lt;3.0.15-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197228" version="1" comment="freeradius-server-krb5 is &lt;3.0.15-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197229" version="1" comment="freeradius-server-ldap is &lt;3.0.15-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197230" version="1" comment="freeradius-server-libs is &lt;3.0.15-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197231" version="1" comment="freeradius-server-mysql is &lt;3.0.15-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197232" version="1" comment="freeradius-server-perl is &lt;3.0.15-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197233" version="1" comment="freeradius-server-postgresql is &lt;3.0.15-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197234" version="1" comment="freeradius-server-python is &lt;3.0.15-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197235" version="1" comment="freeradius-server-sqlite is &lt;3.0.15-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197236" version="1" comment="freeradius-server-utils is &lt;3.0.15-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197237" version="1" comment="openvswitch is &lt;2.7.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197238" version="1" comment="kernel-default-base is &lt;4.4.82-6.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197239" version="1" comment="kernel-default-man is &lt;4.4.82-6.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197240" version="1" comment="xen-doc-html is &lt;4.9.0_11-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197241" version="1" comment="xen-tools is &lt;4.9.0_11-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197242" version="1" comment="xen-tools-domU is &lt;4.9.0_11-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197243" version="1" comment="qemu-arm is &lt;2.9.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197244" version="1" comment="qemu-block-rbd is &lt;2.9.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197245" version="1" comment="qemu-block-ssh is &lt;2.9.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197246" version="1" comment="qemu-guest-agent is &lt;2.9.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197247" version="1" comment="qemu-lang is &lt;2.9.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197248" version="1" comment="qemu-ppc is &lt;2.9.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197249" version="1" comment="qemu-s390 is &lt;2.9.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197250" version="1" comment="xen-doc-html is &lt;4.9.0_12-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197251" version="1" comment="xen-tools is &lt;4.9.0_12-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197252" version="1" comment="xen-tools-domU is &lt;4.9.0_12-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197253" version="1" comment="kernel-default-base is &lt;4.4.82-6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197254" version="1" comment="kernel-default-man is &lt;4.4.82-6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197255" version="1" comment="libvirt-lock-sanlock is &lt;3.3.0-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197256" version="1" comment="libvirt-nss is &lt;3.3.0-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197257" version="1" comment="xen-doc-html is &lt;4.9.0_14-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197258" version="1" comment="xen-tools is &lt;4.9.0_14-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197259" version="1" comment="xen-tools-domU is &lt;4.9.0_14-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197260" version="1" comment="kernel-default-base is &lt;4.4.92-6.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197261" version="1" comment="kernel-default-man is &lt;4.4.92-6.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197262" version="1" comment="libvirt-lock-sanlock is &lt;3.3.0-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197263" version="1" comment="libvirt-nss is &lt;3.3.0-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197264" version="1" comment="qemu-arm is &lt;2.9.1-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197265" version="1" comment="qemu-block-iscsi is &lt;2.9.1-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197266" version="1" comment="qemu-block-rbd is &lt;2.9.1-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197267" version="1" comment="qemu-block-ssh is &lt;2.9.1-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197268" version="1" comment="qemu-guest-agent is &lt;2.9.1-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197269" version="1" comment="qemu-lang is &lt;2.9.1-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197270" version="1" comment="qemu-ppc is &lt;2.9.1-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197271" version="1" comment="qemu-s390 is &lt;2.9.1-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197272" version="1" comment="xen-doc-html is &lt;4.9.1_02-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197273" version="1" comment="xen-tools is &lt;4.9.1_02-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197274" version="1" comment="xen-tools-domU is &lt;4.9.1_02-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197275" version="1" comment="kernel-default-base is &lt;4.4.92-6.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197276" version="1" comment="kernel-default-man is &lt;4.4.92-6.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197277" version="1" comment="openvswitch is &lt;2.7.0-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197278" version="1" comment="kernel-default-base is &lt;4.4.103-6.33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197279" version="1" comment="kernel-default-man is &lt;4.4.103-6.33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197280" version="1" comment="dpdk-kmp-default is &lt;16.11.6_k4.4.126_94.22-8.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197281" version="1" comment="dpdk-thunderx-kmp-default is &lt;16.11.6_k4.4.126_94.22-8.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197282" version="1" comment="dpdk-tools is &lt;16.11.6-8.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197283" version="1" comment="crash-kmp-default is &lt;7.1.8_k4.4.131_94.29-4.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197284" version="1" comment="lttng-modules is &lt;2.7.1-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197285" version="1" comment="lttng-modules-kmp-default is &lt;2.7.1_k4.4.131_94.29-8.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197286" version="1" comment="oracleasm is &lt;2.0.8-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197287" version="1" comment="oracleasm-kmp-default is &lt;2.0.8_k4.4.131_94.29-3.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223518" version="1" comment="postgresql96-contrib is &lt;9.6.9-3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223519" version="1" comment="postgresql96-docs is &lt;9.6.9-3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223520" version="1" comment="postgresql96-server is &lt;9.6.9-3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229342" version="1" comment="kernel-default-base is &lt;4.4.138-94.39" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229343" version="1" comment="kernel-default-man is &lt;4.4.138-94.39" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197289" version="1" comment="kernel-default-base is &lt;4.4.103-6.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197290" version="1" comment="kernel-default-man is &lt;4.4.103-6.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229851" version="1" comment="qt4-x11-tools is &lt;4.8.7-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230371" version="1" comment="openssh-fips is &lt;7.2p2-74.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230539" version="1" comment="rsyslog-diag-tools is &lt;8.24.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230540" version="1" comment="rsyslog-doc is &lt;8.24.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230541" version="1" comment="rsyslog-module-gssapi is &lt;8.24.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230542" version="1" comment="rsyslog-module-gtls is &lt;8.24.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230543" version="1" comment="rsyslog-module-mysql is &lt;8.24.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230544" version="1" comment="rsyslog-module-pgsql is &lt;8.24.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230545" version="1" comment="rsyslog-module-relp is &lt;8.24.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230546" version="1" comment="rsyslog-module-snmp is &lt;8.24.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230547" version="1" comment="rsyslog-module-udpspoof is &lt;8.24.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230548" version="1" comment="python-32bit is &lt;2.7.13-28.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230549" version="1" comment="python-base-32bit is &lt;2.7.13-28.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230550" version="1" comment="python-demo is &lt;2.7.13-28.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230551" version="1" comment="python-doc is &lt;2.7.13-28.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230552" version="1" comment="python-doc-pdf is &lt;2.7.13-28.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230553" version="1" comment="python-gdbm is &lt;2.7.13-28.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230554" version="1" comment="python-idle is &lt;2.7.13-28.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230636" version="1" comment="kernel-default-base is &lt;4.4.140-94.42" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230637" version="1" comment="kernel-default-man is &lt;4.4.140-94.42" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230659" version="1" comment="xen-doc-html is &lt;4.9.2_08-3.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230660" version="1" comment="xen-tools is &lt;4.9.2_08-3.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230661" version="1" comment="xen-tools-domU is &lt;4.9.2_08-3.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230916" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-16.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230917" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.6.1-16.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231139" version="1" comment="libcgroup-tools is &lt;0.41.rc1-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231169" version="1" comment="ovmf is &lt;2017+git1492060560.b6d11d7c46-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231170" version="1" comment="ovmf-tools is &lt;2017+git1492060560.b6d11d7c46-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231171" version="1" comment="qemu-ovmf-x86_64 is &lt;2017+git1492060560.b6d11d7c46-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231172" version="1" comment="qemu-uefi-aarch64 is &lt;2017+git1492060560.b6d11d7c46-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231867" version="1" comment="libvirt-daemon-hooks is &lt;3.3.0-5.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231868" version="1" comment="libvirt-lock-sanlock is &lt;3.3.0-5.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231869" version="1" comment="libvirt-nss is &lt;3.3.0-5.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232150" version="1" comment="dpdk-kmp-default is &lt;16.11.6_k4.4.143_94.47-8.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232151" version="1" comment="dpdk-thunderx-kmp-default is &lt;16.11.6_k4.4.143_94.47-8.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232152" version="1" comment="dpdk-tools is &lt;16.11.6-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232153" version="1" comment="kernel-default-base is &lt;4.4.143-94.47" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232154" version="1" comment="kernel-default-man is &lt;4.4.143-94.47" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232155" version="1" comment="lttng-modules is &lt;2.7.1-8.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232156" version="1" comment="lttng-modules-kmp-default is &lt;2.7.1_k4.4.143_94.47-8.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232387" version="1" comment="apache2-doc is &lt;2.4.23-29.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232388" version="1" comment="apache2-example-pages is &lt;2.4.23-29.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232389" version="1" comment="apache2-prefork is &lt;2.4.23-29.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232390" version="1" comment="apache2-utils is &lt;2.4.23-29.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232391" version="1" comment="apache2-worker is &lt;2.4.23-29.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232586" version="1" comment="kernel-azure is &lt;4.4.143-4.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232587" version="1" comment="kernel-azure-base is &lt;4.4.143-4.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232588" version="1" comment="kernel-azure-devel is &lt;4.4.143-4.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232589" version="1" comment="kernel-devel-azure is &lt;4.4.143-4.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232590" version="1" comment="kernel-source-azure is &lt;4.4.143-4.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232711" version="1" comment="xen-doc-html is &lt;4.9.2_10-3.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232712" version="1" comment="xen-tools is &lt;4.9.2_10-3.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232713" version="1" comment="xen-tools-domU is &lt;4.9.2_10-3.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240653" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-16.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240654" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.6.1-16.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233149" version="1" comment="libcgroup-tools is &lt;0.41.rc1-10.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234399" version="1" comment="tomcat is &lt;8.0.53-29.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234400" version="1" comment="tomcat-admin-webapps is &lt;8.0.53-29.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234401" version="1" comment="tomcat-docs-webapp is &lt;8.0.53-29.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234402" version="1" comment="tomcat-el-3_0-api is &lt;8.0.53-29.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234403" version="1" comment="tomcat-javadoc is &lt;8.0.53-29.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234404" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.53-29.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234405" version="1" comment="tomcat-lib is &lt;8.0.53-29.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234406" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.53-29.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234407" version="1" comment="tomcat-webapps is &lt;8.0.53-29.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234770" version="1" comment="kernel-default-base is &lt;4.4.155-94.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234771" version="1" comment="kernel-default-man is &lt;4.4.155-94.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235280" version="1" comment="kernel-azure is &lt;4.4.155-4.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235281" version="1" comment="kernel-azure-base is &lt;4.4.155-4.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235282" version="1" comment="kernel-azure-devel is &lt;4.4.155-4.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235283" version="1" comment="kernel-devel-azure is &lt;4.4.155-4.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235284" version="1" comment="kernel-source-azure is &lt;4.4.155-4.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235285" version="1" comment="kernel-syms-azure is &lt;4.4.155-4.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197291" version="1" comment="libvirt-lock-sanlock is &lt;3.3.0-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197292" version="1" comment="libvirt-nss is &lt;3.3.0-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235540" version="1" comment="yast2-smt is &lt;3.0.14-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235840" version="1" comment="kernel-default-base is &lt;4.4.156-94.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235841" version="1" comment="kernel-default-man is &lt;4.4.156-94.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237888" version="1" comment="python3-rpm is &lt;4.11.2-16.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238076" version="1" comment="tomcat is &lt;8.0.53-29.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238077" version="1" comment="tomcat-admin-webapps is &lt;8.0.53-29.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238078" version="1" comment="tomcat-docs-webapp is &lt;8.0.53-29.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238079" version="1" comment="tomcat-el-3_0-api is &lt;8.0.53-29.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238080" version="1" comment="tomcat-javadoc is &lt;8.0.53-29.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238081" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.53-29.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238082" version="1" comment="tomcat-lib is &lt;8.0.53-29.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238083" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.53-29.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238084" version="1" comment="tomcat-webapps is &lt;8.0.53-29.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238282" version="1" comment="xen-doc-html is &lt;4.9.3_03-3.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238283" version="1" comment="xen-tools is &lt;4.9.3_03-3.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238284" version="1" comment="xen-tools-domU is &lt;4.9.3_03-3.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238374" version="1" comment="qemu-arm is &lt;2.9.1-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238375" version="1" comment="qemu-block-iscsi is &lt;2.9.1-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238376" version="1" comment="qemu-block-rbd is &lt;2.9.1-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238377" version="1" comment="qemu-block-ssh is &lt;2.9.1-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238378" version="1" comment="qemu-guest-agent is &lt;2.9.1-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238379" version="1" comment="qemu-lang is &lt;2.9.1-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238380" version="1" comment="qemu-ppc is &lt;2.9.1-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238381" version="1" comment="qemu-s390 is &lt;2.9.1-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238382" version="1" comment="python-32bit is &lt;2.7.13-28.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238383" version="1" comment="python-base-32bit is &lt;2.7.13-28.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238384" version="1" comment="python-demo is &lt;2.7.13-28.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238385" version="1" comment="python-doc is &lt;2.7.13-28.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238386" version="1" comment="python-doc-pdf is &lt;2.7.13-28.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238387" version="1" comment="python-gdbm is &lt;2.7.13-28.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238388" version="1" comment="python-idle is &lt;2.7.13-28.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238989" version="1" comment="kernel-default-base is &lt;4.4.162-94.69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238990" version="1" comment="kernel-default-man is &lt;4.4.162-94.69" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238991" version="1" comment="lttng-modules is &lt;2.7.1-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238992" version="1" comment="lttng-modules-kmp-default is &lt;2.7.1_k4.4.162_94.69-8.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239266" version="1" comment="postgresql10-contrib is &lt;10.6-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239267" version="1" comment="postgresql10-docs is &lt;10.6-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239268" version="1" comment="postgresql10-server is &lt;10.6-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239269" version="1" comment="squid is &lt;3.5.21-26.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197293" version="1" comment="kernel-default-base is &lt;4.4.114-94.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197294" version="1" comment="kernel-default-man is &lt;4.4.114-94.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240821" version="1" comment="dpdk-kmp-default is &lt;16.11.8_k4.4.156_94.64-8.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240822" version="1" comment="dpdk-thunderx-kmp-default is &lt;16.11.8_k4.4.156_94.64-8.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240823" version="1" comment="dpdk-tools is &lt;16.11.8-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240948" version="1" comment="ncurses-devel-32bit is &lt;5.9-61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241624" version="1" comment="xen-doc-html is &lt;4.9.3_03-3.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241625" version="1" comment="xen-tools is &lt;4.9.3_03-3.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241626" version="1" comment="xen-tools-domU is &lt;4.9.3_03-3.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241776" version="1" comment="openvswitch is &lt;2.7.6-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241777" version="1" comment="qemu-arm is &lt;2.9.1-6.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241778" version="1" comment="qemu-block-iscsi is &lt;2.9.1-6.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241779" version="1" comment="qemu-block-rbd is &lt;2.9.1-6.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241780" version="1" comment="qemu-block-ssh is &lt;2.9.1-6.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241781" version="1" comment="qemu-guest-agent is &lt;2.9.1-6.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241782" version="1" comment="qemu-lang is &lt;2.9.1-6.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241783" version="1" comment="qemu-ppc is &lt;2.9.1-6.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241784" version="1" comment="qemu-s390 is &lt;2.9.1-6.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241930" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242193" version="1" comment="ovmf is &lt;2017+git1492060560.b6d11d7c46-4.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242194" version="1" comment="ovmf-tools is &lt;2017+git1492060560.b6d11d7c46-4.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242195" version="1" comment="qemu-ovmf-x86_64 is &lt;2017+git1492060560.b6d11d7c46-4.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242196" version="1" comment="qemu-uefi-aarch64 is &lt;2017+git1492060560.b6d11d7c46-4.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197295" version="1" comment="xen-doc-html is &lt;4.9.1_08-3.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197296" version="1" comment="xen-tools is &lt;4.9.1_08-3.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197297" version="1" comment="xen-tools-domU is &lt;4.9.1_08-3.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197298" version="1" comment="qemu-arm is &lt;2.9.1-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197299" version="1" comment="qemu-block-iscsi is &lt;2.9.1-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197300" version="1" comment="qemu-block-rbd is &lt;2.9.1-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197301" version="1" comment="qemu-block-ssh is &lt;2.9.1-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197302" version="1" comment="qemu-guest-agent is &lt;2.9.1-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197303" version="1" comment="qemu-lang is &lt;2.9.1-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197304" version="1" comment="qemu-ppc is &lt;2.9.1-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197305" version="1" comment="qemu-s390 is &lt;2.9.1-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197306" version="1" comment="kernel-default-base is &lt;4.4.120-94.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197307" version="1" comment="kernel-default-man is &lt;4.4.120-94.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197310" version="1" comment="libvirt-daemon-hooks is &lt;3.3.0-5.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197311" version="1" comment="libvirt-lock-sanlock is &lt;3.3.0-5.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197312" version="1" comment="libvirt-nss is &lt;3.3.0-5.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197314" version="1" comment="kernel-default-base is &lt;4.4.126-94.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197315" version="1" comment="kernel-default-man is &lt;4.4.126-94.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197317" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197318" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197319" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197320" version="1" comment="kernel-default-base is &lt;4.4.103-94.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197321" version="1" comment="kernel-default-devel is &lt;4.4.103-94.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197322" version="1" comment="kernel-default-man is &lt;4.4.103-94.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197323" version="1" comment="kernel-devel is &lt;4.4.103-94.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197324" version="1" comment="kernel-macros is &lt;4.4.103-94.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197325" version="1" comment="kernel-source is &lt;4.4.103-94.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197326" version="1" comment="kernel-syms is &lt;4.4.103-94.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197327" version="1" comment="xen-doc-html is &lt;4.9.2_04-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197328" version="1" comment="xen-tools is &lt;4.9.2_04-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197329" version="1" comment="xen-tools-domU is &lt;4.9.2_04-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197330" version="1" comment="qemu-arm is &lt;2.9.1-6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197331" version="1" comment="qemu-block-iscsi is &lt;2.9.1-6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197332" version="1" comment="qemu-block-rbd is &lt;2.9.1-6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197333" version="1" comment="qemu-block-ssh is &lt;2.9.1-6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197334" version="1" comment="qemu-guest-agent is &lt;2.9.1-6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197335" version="1" comment="qemu-lang is &lt;2.9.1-6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197336" version="1" comment="qemu-ppc is &lt;2.9.1-6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197337" version="1" comment="qemu-s390 is &lt;2.9.1-6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197338" version="1" comment="libvorbis-doc is &lt;1.3.3-10.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197339" version="1" comment="qemu-arm is &lt;2.9.1-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197340" version="1" comment="qemu-block-iscsi is &lt;2.9.1-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197341" version="1" comment="qemu-block-rbd is &lt;2.9.1-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197342" version="1" comment="qemu-block-ssh is &lt;2.9.1-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197343" version="1" comment="qemu-guest-agent is &lt;2.9.1-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197344" version="1" comment="qemu-lang is &lt;2.9.1-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197345" version="1" comment="qemu-ppc is &lt;2.9.1-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197346" version="1" comment="qemu-s390 is &lt;2.9.1-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197347" version="1" comment="kernel-default-base is &lt;4.4.131-94.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197348" version="1" comment="kernel-default-man is &lt;4.4.131-94.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197349" version="1" comment="python-32bit is &lt;2.7.13-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197350" version="1" comment="python-base-32bit is &lt;2.7.13-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197351" version="1" comment="python-demo is &lt;2.7.13-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197352" version="1" comment="python-doc is &lt;2.7.13-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197353" version="1" comment="python-doc-pdf is &lt;2.7.13-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197354" version="1" comment="python-gdbm is &lt;2.7.13-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197355" version="1" comment="python-idle is &lt;2.7.13-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197357" version="1" comment="xen-doc-html is &lt;4.9.2_06-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197358" version="1" comment="xen-tools is &lt;4.9.2_06-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197359" version="1" comment="xen-tools-domU is &lt;4.9.2_06-3.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252421" version="1" comment="libvirt-daemon-hooks is &lt;3.3.0-5.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252422" version="1" comment="libvirt-lock-sanlock is &lt;3.3.0-5.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252423" version="1" comment="libvirt-nss is &lt;3.3.0-5.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252974" version="1" comment="audit-audispd-plugins is &lt;2.8.1-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252975" version="1" comment="freeradius-server-doc is &lt;3.0.15-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252976" version="1" comment="freeradius-server-krb5 is &lt;3.0.15-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252977" version="1" comment="freeradius-server-ldap is &lt;3.0.15-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252978" version="1" comment="freeradius-server-libs is &lt;3.0.15-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252979" version="1" comment="freeradius-server-mysql is &lt;3.0.15-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252980" version="1" comment="freeradius-server-perl is &lt;3.0.15-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252981" version="1" comment="freeradius-server-postgresql is &lt;3.0.15-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252982" version="1" comment="freeradius-server-python is &lt;3.0.15-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252983" version="1" comment="freeradius-server-sqlite is &lt;3.0.15-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252984" version="1" comment="freeradius-server-utils is &lt;3.0.15-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253250" version="1" comment="ovmf is &lt;2017+git1492060560.b6d11d7c46-4.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253251" version="1" comment="ovmf-tools is &lt;2017+git1492060560.b6d11d7c46-4.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253252" version="1" comment="qemu-ovmf-x86_64 is &lt;2017+git1492060560.b6d11d7c46-4.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253253" version="1" comment="qemu-uefi-aarch64 is &lt;2017+git1492060560.b6d11d7c46-4.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253478" version="1" comment="qemu-arm is &lt;2.9.1-6.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253480" version="1" comment="qemu-block-iscsi is &lt;2.9.1-6.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253481" version="1" comment="qemu-block-rbd is &lt;2.9.1-6.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253482" version="1" comment="qemu-block-ssh is &lt;2.9.1-6.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253483" version="1" comment="qemu-guest-agent is &lt;2.9.1-6.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253486" version="1" comment="qemu-lang is &lt;2.9.1-6.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253487" version="1" comment="qemu-ppc is &lt;2.9.1-6.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253488" version="1" comment="qemu-s390 is &lt;2.9.1-6.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253491" version="1" comment="kernel-default-base is &lt;4.4.178-94.91" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253493" version="1" comment="kernel-default-man is &lt;4.4.178-94.91" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253561" version="1" comment="kernel-azure is &lt;4.4.178-4.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253562" version="1" comment="kernel-azure-base is &lt;4.4.178-4.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253563" version="1" comment="kernel-azure-devel is &lt;4.4.178-4.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253564" version="1" comment="kernel-devel-azure is &lt;4.4.178-4.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253565" version="1" comment="kernel-source-azure is &lt;4.4.178-4.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253566" version="1" comment="kernel-syms-azure is &lt;4.4.178-4.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253567" version="1" comment="xen-doc-html is &lt;4.9.4_04-3.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253568" version="1" comment="xen-tools is &lt;4.9.4_04-3.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253569" version="1" comment="xen-tools-domU is &lt;4.9.4_04-3.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253832" version="1" comment="nmap is &lt;6.46-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254107" version="1" comment="sysstat-isag is &lt;12.0.2-10.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254575" version="1" comment="axis is &lt;1.4-290.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240949" version="1" comment="apache2-mod_jk is &lt;1.2.40-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243306" version="1" comment="kernel-azure is &lt;4.4.170-4.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243307" version="1" comment="kernel-azure-base is &lt;4.4.170-4.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243308" version="1" comment="kernel-azure-devel is &lt;4.4.170-4.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243309" version="1" comment="kernel-devel-azure is &lt;4.4.170-4.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243310" version="1" comment="kernel-source-azure is &lt;4.4.170-4.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243311" version="1" comment="kernel-syms-azure is &lt;4.4.170-4.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256830" version="1" comment="postgresql10-contrib is &lt;10.8-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256831" version="1" comment="postgresql10-docs is &lt;10.8-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256832" version="1" comment="postgresql10-plperl is &lt;10.8-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256833" version="1" comment="postgresql10-plpython is &lt;10.8-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256834" version="1" comment="postgresql10-pltcl is &lt;10.8-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256835" version="1" comment="postgresql10-server is &lt;10.8-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257036" version="1" comment="kernel-azure is &lt;4.4.180-4.31" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257037" version="1" comment="kernel-azure-base is &lt;4.4.180-4.31" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257038" version="1" comment="kernel-azure-devel is &lt;4.4.180-4.31" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257039" version="1" comment="kernel-devel-azure is &lt;4.4.180-4.31" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257040" version="1" comment="kernel-source-azure is &lt;4.4.180-4.31" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257041" version="1" comment="kernel-syms-azure is &lt;4.4.180-4.31" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257042" version="1" comment="kernel-default-base is &lt;4.4.180-94.97" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257043" version="1" comment="kernel-default-man is &lt;4.4.180-94.97" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257175" version="1" comment="libvirt-daemon-hooks is &lt;3.3.0-5.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257176" version="1" comment="libvirt-lock-sanlock is &lt;3.3.0-5.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257177" version="1" comment="libvirt-nss is &lt;3.3.0-5.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258108" version="1" comment="postgresql96-contrib is &lt;9.6.13-3.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258109" version="1" comment="postgresql96-docs is &lt;9.6.13-3.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258110" version="1" comment="postgresql96-server is &lt;9.6.13-3.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258681" version="1" comment="libasm1-32bit is &lt;0.158-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243405" version="1" comment="avahi-utils is &lt;0.6.32-32.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259365" version="1" comment="kernel-default-man is &lt;4.4.180-94.100" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243624" version="1" comment="rsyslog-diag-tools is &lt;8.24.0-3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243625" version="1" comment="rsyslog-doc is &lt;8.24.0-3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243626" version="1" comment="rsyslog-module-gssapi is &lt;8.24.0-3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243627" version="1" comment="rsyslog-module-gtls is &lt;8.24.0-3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243628" version="1" comment="rsyslog-module-mysql is &lt;8.24.0-3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243629" version="1" comment="rsyslog-module-pgsql is &lt;8.24.0-3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243630" version="1" comment="rsyslog-module-relp is &lt;8.24.0-3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243631" version="1" comment="rsyslog-module-snmp is &lt;8.24.0-3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243632" version="1" comment="rsyslog-module-udpspoof is &lt;8.24.0-3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263346" version="1" comment="kernel-default-man is &lt;4.4.180-94.103" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245072" version="1" comment="apache2-doc is &lt;2.4.23-29.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245073" version="1" comment="apache2-example-pages is &lt;2.4.23-29.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245074" version="1" comment="apache2-prefork is &lt;2.4.23-29.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245075" version="1" comment="apache2-utils is &lt;2.4.23-29.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245076" version="1" comment="apache2-worker is &lt;2.4.23-29.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245494" version="1" comment="kernel-default-base is &lt;4.4.175-94.79" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245495" version="1" comment="kernel-default-man is &lt;4.4.175-94.79" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245795" version="1" comment="ovmf is &lt;2017+git1492060560.b6d11d7c46-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245796" version="1" comment="ovmf-tools is &lt;2017+git1492060560.b6d11d7c46-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245797" version="1" comment="qemu-ovmf-x86_64 is &lt;2017+git1492060560.b6d11d7c46-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245798" version="1" comment="qemu-uefi-aarch64 is &lt;2017+git1492060560.b6d11d7c46-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245799" version="1" comment="qemu-arm is &lt;2.9.1-6.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245800" version="1" comment="qemu-block-iscsi is &lt;2.9.1-6.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245801" version="1" comment="qemu-block-rbd is &lt;2.9.1-6.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245802" version="1" comment="qemu-block-ssh is &lt;2.9.1-6.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245803" version="1" comment="qemu-guest-agent is &lt;2.9.1-6.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245804" version="1" comment="qemu-lang is &lt;2.9.1-6.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245805" version="1" comment="qemu-ppc is &lt;2.9.1-6.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245806" version="1" comment="qemu-s390 is &lt;2.9.1-6.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246310" version="1" comment="ovmf is &lt;2017+git1492060560.b6d11d7c46-4.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246311" version="1" comment="ovmf-tools is &lt;2017+git1492060560.b6d11d7c46-4.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246312" version="1" comment="qemu-ovmf-x86_64 is &lt;2017+git1492060560.b6d11d7c46-4.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246313" version="1" comment="qemu-uefi-aarch64 is &lt;2017+git1492060560.b6d11d7c46-4.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246566" version="1" comment="kernel-default-base is &lt;4.4.176-94.88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246567" version="1" comment="kernel-default-man is &lt;4.4.176-94.88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247262" version="1" comment="libSDL-1_2-0-32bit is &lt;1.2.15-15.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247263" version="1" comment="kernel-azure is &lt;4.4.176-4.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247264" version="1" comment="kernel-azure-base is &lt;4.4.176-4.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247265" version="1" comment="kernel-azure-devel is &lt;4.4.176-4.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247266" version="1" comment="kernel-devel-azure is &lt;4.4.176-4.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247267" version="1" comment="kernel-source-azure is &lt;4.4.176-4.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247268" version="1" comment="kernel-syms-azure is &lt;4.4.176-4.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247269" version="1" comment="xen-doc-html is &lt;4.9.4_02-3.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247270" version="1" comment="xen-tools is &lt;4.9.4_02-3.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247271" version="1" comment="xen-tools-domU is &lt;4.9.4_02-3.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247272" version="1" comment="libxmltooling6 is &lt;1.5.6-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247273" version="1" comment="xmltooling-schemas is &lt;1.5.6-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243045" version="1" comment="kernel-azure is &lt;4.4.162-4.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243046" version="1" comment="kernel-azure-base is &lt;4.4.162-4.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243047" version="1" comment="kernel-azure-devel is &lt;4.4.162-4.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243048" version="1" comment="kernel-devel-azure is &lt;4.4.162-4.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243049" version="1" comment="kernel-source-azure is &lt;4.4.162-4.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243050" version="1" comment="kernel-syms-azure is &lt;4.4.162-4.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251270" version="1" comment="qemu-arm is &lt;2.9.1-6.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251271" version="1" comment="qemu-block-iscsi is &lt;2.9.1-6.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251272" version="1" comment="qemu-block-rbd is &lt;2.9.1-6.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251273" version="1" comment="qemu-block-ssh is &lt;2.9.1-6.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251274" version="1" comment="qemu-guest-agent is &lt;2.9.1-6.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251275" version="1" comment="qemu-lang is &lt;2.9.1-6.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251276" version="1" comment="qemu-ppc is &lt;2.9.1-6.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251277" version="1" comment="qemu-s390 is &lt;2.9.1-6.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247675" version="1" comment="libqca2 is &lt;2.0.3-17.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247676" version="1" comment="libqca2-32bit is &lt;2.0.3-17.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247677" version="1" comment="libqt4-sql-plugins is &lt;4.8.7-8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247678" version="1" comment="ovmf is &lt;2017+git1492060560.b6d11d7c46-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247679" version="1" comment="ovmf-tools is &lt;2017+git1492060560.b6d11d7c46-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247680" version="1" comment="qemu-ovmf-x86_64 is &lt;2017+git1492060560.b6d11d7c46-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247681" version="1" comment="libgcrypt is &lt;1.6.1-16.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247682" version="1" comment="libgcrypt20 is &lt;1.6.1-16.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247683" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247684" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-16.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247685" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.6.1-16.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247686" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247687" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247688" version="1" comment="python is &lt;2.7.13-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247689" version="1" comment="python-32bit is &lt;2.7.13-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247690" version="1" comment="python-base is &lt;2.7.13-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247691" version="1" comment="python-base-32bit is &lt;2.7.13-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247692" version="1" comment="python-curses is &lt;2.7.13-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247693" version="1" comment="python-demo is &lt;2.7.13-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247694" version="1" comment="python-doc is &lt;2.7.13-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247695" version="1" comment="python-doc-pdf is &lt;2.7.13-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247696" version="1" comment="python-gdbm is &lt;2.7.13-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247697" version="1" comment="python-idle is &lt;2.7.13-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247698" version="1" comment="python-tk is &lt;2.7.13-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247699" version="1" comment="python-xml is &lt;2.7.13-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247700" version="1" comment="libsndfile is &lt;1.0.25-36.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247701" version="1" comment="rsyslog is &lt;8.24.0-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247702" version="1" comment="rsyslog-diag-tools is &lt;8.24.0-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247703" version="1" comment="rsyslog-doc is &lt;8.24.0-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247704" version="1" comment="rsyslog-module-gssapi is &lt;8.24.0-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247705" version="1" comment="rsyslog-module-gtls is &lt;8.24.0-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247706" version="1" comment="rsyslog-module-mysql is &lt;8.24.0-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247707" version="1" comment="rsyslog-module-pgsql is &lt;8.24.0-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247708" version="1" comment="rsyslog-module-relp is &lt;8.24.0-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247709" version="1" comment="rsyslog-module-snmp is &lt;8.24.0-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247710" version="1" comment="rsyslog-module-udpspoof is &lt;8.24.0-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247711" version="1" comment="openssh is &lt;7.2p2-74.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247712" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247713" version="1" comment="openssh-fips is &lt;7.2p2-74.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247714" version="1" comment="openssh-helpers is &lt;7.2p2-74.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247715" version="1" comment="shadow is &lt;4.2.1-27.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247716" version="1" comment="libtirpc is &lt;1.0.1-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247717" version="1" comment="gdk-pixbuf is &lt;2.34.0-19.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260031" version="1" comment="libxml2-doc is &lt;2.9.4-46.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261341" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.231-43.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261342" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.231-43.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262485" version="1" comment="python-urllib3 is &lt;1.22-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263094" version="1" comment="apache-commons-beanutils is &lt;1.9.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263095" version="1" comment="apache-commons-beanutils-javadoc is &lt;1.9.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263347" version="1" comment="postgresql10-contrib is &lt;10.10-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263348" version="1" comment="postgresql10-docs is &lt;10.10-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263349" version="1" comment="postgresql10-server is &lt;10.10-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263690" version="1" comment="qemu is &lt;2.9.1-6.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263691" version="1" comment="qemu-block-curl is &lt;2.9.1-6.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263692" version="1" comment="qemu-block-iscsi is &lt;2.9.1-6.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263693" version="1" comment="qemu-block-rbd is &lt;2.9.1-6.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263694" version="1" comment="qemu-block-ssh is &lt;2.9.1-6.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263695" version="1" comment="qemu-guest-agent is &lt;2.9.1-6.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263696" version="1" comment="qemu-ipxe is &lt;1.0.0+-6.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263697" version="1" comment="qemu-kvm is &lt;2.9.1-6.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263698" version="1" comment="qemu-lang is &lt;2.9.1-6.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263699" version="1" comment="qemu-seabios is &lt;1.10.2-6.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263700" version="1" comment="qemu-sgabios is &lt;8-6.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263701" version="1" comment="qemu-tools is &lt;2.9.1-6.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263702" version="1" comment="qemu-vgabios is &lt;1.10.2-6.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263703" version="1" comment="qemu-x86 is &lt;2.9.1-6.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263875" version="1" comment="apache2-doc is &lt;2.4.23-29.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263876" version="1" comment="apache2-example-pages is &lt;2.4.23-29.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263877" version="1" comment="apache2-prefork is &lt;2.4.23-29.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263878" version="1" comment="apache2-utils is &lt;2.4.23-29.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263879" version="1" comment="apache2-worker is &lt;2.4.23-29.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264642" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264900" version="1" comment="libpython3_6m1_0 is &lt;3.6.8-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264901" version="1" comment="python36 is &lt;3.6.8-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264902" version="1" comment="python36-base is &lt;3.6.8-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264903" version="1" comment="python36-curses is &lt;3.6.8-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264904" version="1" comment="python36-dbm is &lt;3.6.8-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264905" version="1" comment="python36-devel is &lt;3.6.8-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264906" version="1" comment="python36-doc is &lt;3.6.8-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264907" version="1" comment="python36-idle is &lt;3.6.8-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264908" version="1" comment="python36-testsuite is &lt;3.6.8-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264909" version="1" comment="python36-tk is &lt;3.6.8-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264910" version="1" comment="python36-tools is &lt;3.6.8-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265060" version="1" comment="nmap is &lt;6.46-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265184" version="1" comment="libmysqlclient18 is &lt;10.0.40.1-29.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265185" version="1" comment="libmysqlclient18-32bit is &lt;10.0.40.1-29.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265186" version="1" comment="mariadb is &lt;10.0.40.1-29.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265187" version="1" comment="mariadb-client is &lt;10.0.40.1-29.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265188" version="1" comment="mariadb-errormessages is &lt;10.0.40.1-29.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265189" version="1" comment="mariadb-tools is &lt;10.0.40.1-29.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240862" version="1" comment="kernel-azure is &lt;4.12.14-6.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240863" version="1" comment="kernel-azure-base is &lt;4.12.14-6.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240864" version="1" comment="kernel-azure-devel is &lt;4.12.14-6.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240865" version="1" comment="kernel-devel-azure is &lt;4.12.14-6.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240866" version="1" comment="kernel-source-azure is &lt;4.12.14-6.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240867" version="1" comment="kernel-syms-azure is &lt;4.12.14-6.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241061" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2p-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241062" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2p-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241063" version="1" comment="openssl-1_0_0-doc is &lt;1.0.2p-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241627" version="1" comment="kernel-default-base is &lt;4.12.14-95.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241628" version="1" comment="kernel-default-man is &lt;4.12.14-95.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242125" version="1" comment="qemu-arm is &lt;2.11.2-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242126" version="1" comment="qemu-block-iscsi is &lt;2.11.2-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242127" version="1" comment="qemu-block-rbd is &lt;2.11.2-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242128" version="1" comment="qemu-block-ssh is &lt;2.11.2-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242129" version="1" comment="qemu-guest-agent is &lt;2.11.2-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242130" version="1" comment="qemu-lang is &lt;2.11.2-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242131" version="1" comment="qemu-ppc is &lt;2.11.2-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242132" version="1" comment="qemu-s390 is &lt;2.11.2-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242133" version="1" comment="ovmf-tools is &lt;2017+git1510945757.b2662641d5-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242134" version="1" comment="qemu-uefi-aarch64 is &lt;2017+git1510945757.b2662641d5-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252766" version="1" comment="glibc-html is &lt;2.22-100.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252767" version="1" comment="glibc-profile is &lt;2.22-100.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252768" version="1" comment="glibc-profile-32bit is &lt;2.22-100.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252959" version="1" comment="ovmf-tools is &lt;2017+git1510945757.b2662641d5-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252960" version="1" comment="qemu-uefi-aarch64 is &lt;2017+git1510945757.b2662641d5-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243186" version="1" comment="mariadb-tools is &lt;10.2.21-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253499" version="1" comment="qemu-arm is &lt;2.11.2-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253501" version="1" comment="qemu-block-iscsi is &lt;2.11.2-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253502" version="1" comment="qemu-block-rbd is &lt;2.11.2-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253503" version="1" comment="qemu-block-ssh is &lt;2.11.2-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253504" version="1" comment="qemu-guest-agent is &lt;2.11.2-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253507" version="1" comment="qemu-lang is &lt;2.11.2-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253508" version="1" comment="qemu-ppc is &lt;2.11.2-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253509" version="1" comment="qemu-s390 is &lt;2.11.2-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253512" version="1" comment="kernel-default-base is &lt;4.12.14-95.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253514" version="1" comment="kernel-default-man is &lt;4.12.14-95.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253570" version="1" comment="kernel-azure is &lt;4.12.14-6.12" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253571" version="1" comment="kernel-azure-base is &lt;4.12.14-6.12" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253572" version="1" comment="kernel-azure-devel is &lt;4.12.14-6.12" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253573" version="1" comment="kernel-devel-azure is &lt;4.12.14-6.12" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253574" version="1" comment="kernel-source-azure is &lt;4.12.14-6.12" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253575" version="1" comment="kernel-syms-azure is &lt;4.12.14-6.12" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253576" version="1" comment="xen-doc-html is &lt;4.11.1_06-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253577" version="1" comment="xen-tools is &lt;4.11.1_06-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253578" version="1" comment="xen-tools-domU is &lt;4.11.1_06-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254208" version="1" comment="libvirt-daemon-hooks is &lt;4.0.0-8.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254209" version="1" comment="libvirt-lock-sanlock is &lt;4.0.0-8.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254210" version="1" comment="libvirt-nss is &lt;4.0.0-8.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257051" version="1" comment="kernel-default-base is &lt;4.12.14-95.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257052" version="1" comment="kernel-default-man is &lt;4.12.14-95.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257053" version="1" comment="kernel-azure is &lt;4.12.14-6.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257054" version="1" comment="kernel-azure-base is &lt;4.12.14-6.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257055" version="1" comment="kernel-azure-devel is &lt;4.12.14-6.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257056" version="1" comment="kernel-devel-azure is &lt;4.12.14-6.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257057" version="1" comment="kernel-source-azure is &lt;4.12.14-6.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257058" version="1" comment="kernel-syms-azure is &lt;4.12.14-6.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257945" version="1" comment="libvirt-daemon-hooks is &lt;4.0.0-8.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257946" version="1" comment="libvirt-lock-sanlock is &lt;4.0.0-8.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257947" version="1" comment="libvirt-nss is &lt;4.0.0-8.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258279" version="1" comment="glibc-html is &lt;2.22-100.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258280" version="1" comment="glibc-profile is &lt;2.22-100.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258281" version="1" comment="glibc-profile-32bit is &lt;2.22-100.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259366" version="1" comment="kernel-default-base is &lt;4.12.14-95.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259367" version="1" comment="kernel-default-man is &lt;4.12.14-95.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259441" version="1" comment="tomcat is &lt;9.0.21-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259442" version="1" comment="tomcat-admin-webapps is &lt;9.0.21-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259443" version="1" comment="tomcat-docs-webapp is &lt;9.0.21-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259444" version="1" comment="tomcat-el-3_0-api is &lt;9.0.21-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259445" version="1" comment="tomcat-javadoc is &lt;9.0.21-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259446" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.21-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259447" version="1" comment="tomcat-lib is &lt;9.0.21-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259448" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.21-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259449" version="1" comment="tomcat-webapps is &lt;9.0.21-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243406" version="1" comment="kernel-default-base is &lt;4.12.14-95.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243407" version="1" comment="kernel-default-man is &lt;4.12.14-95.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261343" version="1" comment="kernel-azure is &lt;4.12.14-6.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261344" version="1" comment="kernel-azure-base is &lt;4.12.14-6.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261345" version="1" comment="kernel-azure-devel is &lt;4.12.14-6.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261346" version="1" comment="kernel-devel-azure is &lt;4.12.14-6.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261347" version="1" comment="kernel-source-azure is &lt;4.12.14-6.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261348" version="1" comment="kernel-syms-azure is &lt;4.12.14-6.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261349" version="1" comment="kernel-default-base is &lt;4.12.14-95.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261350" version="1" comment="kernel-default-man is &lt;4.12.14-95.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243633" version="1" comment="kernel-azure is &lt;4.12.14-6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243634" version="1" comment="kernel-azure-base is &lt;4.12.14-6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243635" version="1" comment="kernel-azure-devel is &lt;4.12.14-6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243636" version="1" comment="kernel-devel-azure is &lt;4.12.14-6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243637" version="1" comment="kernel-source-azure is &lt;4.12.14-6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243638" version="1" comment="kernel-syms-azure is &lt;4.12.14-6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263350" version="1" comment="postgresql10-plperl is &lt;10.10-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263351" version="1" comment="postgresql10-plpython is &lt;10.10-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263352" version="1" comment="postgresql10-pltcl is &lt;10.10-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263880" version="1" comment="mariadb-tools is &lt;10.2.25-3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264059" version="1" comment="qemu-arm is &lt;2.11.2-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264060" version="1" comment="qemu-block-iscsi is &lt;2.11.2-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264061" version="1" comment="qemu-block-rbd is &lt;2.11.2-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264062" version="1" comment="qemu-block-ssh is &lt;2.11.2-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264063" version="1" comment="qemu-guest-agent is &lt;2.11.2-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264064" version="1" comment="qemu-lang is &lt;2.11.2-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264065" version="1" comment="qemu-ppc is &lt;2.11.2-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264066" version="1" comment="qemu-s390 is &lt;2.11.2-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265061" version="1" comment="kernel-default-base is &lt;4.12.14-95.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265062" version="1" comment="kernel-default-man is &lt;4.12.14-95.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242594" version="1" comment="xen-doc-html is &lt;4.11.1_02-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242595" version="1" comment="xen-tools is &lt;4.11.1_02-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242596" version="1" comment="xen-tools-domU is &lt;4.11.1_02-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244677" version="1" comment="qemu-arm is &lt;2.11.2-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244678" version="1" comment="qemu-block-iscsi is &lt;2.11.2-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244679" version="1" comment="qemu-block-rbd is &lt;2.11.2-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244680" version="1" comment="qemu-block-ssh is &lt;2.11.2-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244681" version="1" comment="qemu-guest-agent is &lt;2.11.2-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244682" version="1" comment="qemu-lang is &lt;2.11.2-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244683" version="1" comment="qemu-ppc is &lt;2.11.2-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244684" version="1" comment="qemu-s390 is &lt;2.11.2-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245594" version="1" comment="audit-audispd-plugins is &lt;2.8.1-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245595" version="1" comment="python2-audit is &lt;2.8.1-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245596" version="1" comment="python3-audit is &lt;2.8.1-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245654" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2p-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245655" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2p-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245656" version="1" comment="openssl-1_0_0-doc is &lt;1.0.2p-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245807" version="1" comment="ovmf-tools is &lt;2017+git1510945757.b2662641d5-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245808" version="1" comment="qemu-uefi-aarch64 is &lt;2017+git1510945757.b2662641d5-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246314" version="1" comment="kernel-default-base is &lt;4.12.14-95.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246315" version="1" comment="kernel-default-man is &lt;4.12.14-95.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246336" version="1" comment="ovmf-tools is &lt;2017+git1510945757.b2662641d5-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246337" version="1" comment="qemu-uefi-aarch64 is &lt;2017+git1510945757.b2662641d5-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246338" version="1" comment="kernel-azure is &lt;4.12.14-6.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246339" version="1" comment="kernel-azure-base is &lt;4.12.14-6.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246340" version="1" comment="kernel-azure-devel is &lt;4.12.14-6.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246341" version="1" comment="kernel-devel-azure is &lt;4.12.14-6.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246342" version="1" comment="kernel-source-azure is &lt;4.12.14-6.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246343" version="1" comment="kernel-syms-azure is &lt;4.12.14-6.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247274" version="1" comment="xen-doc-html is &lt;4.11.1_04-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247275" version="1" comment="xen-tools is &lt;4.11.1_04-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247276" version="1" comment="xen-tools-domU is &lt;4.11.1_04-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251181" version="1" comment="libvirt-daemon-hooks is &lt;4.0.0-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251182" version="1" comment="libvirt-lock-sanlock is &lt;4.0.0-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251183" version="1" comment="libvirt-nss is &lt;4.0.0-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258033" version="1" comment="sles-release is ==12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258806" version="1" comment="SLES_SAP-release is ==12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197360" version="1" comment="libreoffice-l10n-bg is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197361" version="1" comment="libreoffice-l10n-hr is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197362" version="1" comment="libreoffice-l10n-lt is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197363" version="1" comment="libreoffice-l10n-uk is &lt;5.3.3.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197364" version="1" comment="libreoffice-l10n-bg is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197365" version="1" comment="libreoffice-l10n-hr is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197366" version="1" comment="libreoffice-l10n-lt is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197367" version="1" comment="libreoffice-l10n-uk is &lt;5.4.5.1-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197368" version="1" comment="libreoffice-l10n-bg is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197369" version="1" comment="libreoffice-l10n-hr is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197370" version="1" comment="libreoffice-l10n-lt is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197371" version="1" comment="libreoffice-l10n-uk is &lt;5.3.5.2-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197372" version="1" comment="libreoffice-l10n-bg is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197373" version="1" comment="libreoffice-l10n-hr is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197374" version="1" comment="libreoffice-l10n-lt is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197375" version="1" comment="libreoffice-l10n-uk is &lt;5.4.5.1-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197376" version="1" comment="libreoffice-l10n-bg is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197377" version="1" comment="libreoffice-l10n-hr is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197378" version="1" comment="libreoffice-l10n-lt is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197379" version="1" comment="libreoffice-l10n-uk is &lt;6.0.3.2-43.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197380" version="1" comment="libreoffice-l10n-bg is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197381" version="1" comment="libreoffice-l10n-hr is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197382" version="1" comment="libreoffice-l10n-lt is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197383" version="1" comment="libreoffice-l10n-uk is &lt;6.0.4.2-43.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256411" version="1" comment="libreoffice-l10n-bg is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256412" version="1" comment="libreoffice-l10n-hr is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256413" version="1" comment="libreoffice-l10n-lt is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256414" version="1" comment="libreoffice-l10n-uk is &lt;6.2.3.2-43.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264911" version="1" comment="libreoffice-l10n-bg is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264912" version="1" comment="libreoffice-l10n-hr is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264913" version="1" comment="libreoffice-l10n-lt is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264914" version="1" comment="libreoffice-l10n-uk is &lt;6.2.7.1-43.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258650" version="1" comment="sle-we-release is ==12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197384" version="1" comment="dnsmasq-utils is &lt;2.71-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197385" version="1" comment="python-keystoneclient is &lt;1.0.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197386" version="1" comment="python-keystoneclient-doc is &lt;1.0.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197387" version="1" comment="python-glanceclient is &lt;0.15.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197388" version="1" comment="python-keystoneclient is &lt;1.0.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197389" version="1" comment="python-keystoneclient-doc is &lt;1.0.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197390" version="1" comment="python-keystonemiddleware is &lt;1.2.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197391" version="1" comment="python-novaclient is &lt;2.20.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197392" version="1" comment="python-novaclient-doc is &lt;2.20.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197393" version="1" comment="python-swiftclient is &lt;2.3.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197394" version="1" comment="python-swiftclient-doc is &lt;2.3.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197395" version="1" comment="openstack-ceilometer is &lt;2014.2.4.dev18-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197396" version="1" comment="openstack-ceilometer-agent-compute is &lt;2014.2.4.dev18-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197397" version="1" comment="openstack-neutron is &lt;2014.2.4~a0~dev78-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197398" version="1" comment="openstack-neutron-dhcp-agent is &lt;2014.2.4~a0~dev78-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197399" version="1" comment="openstack-neutron-ha-tool is &lt;2014.2.4~a0~dev78-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197400" version="1" comment="openstack-neutron-l3-agent is &lt;2014.2.4~a0~dev78-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197401" version="1" comment="openstack-neutron-lbaas-agent is &lt;2014.2.4~a0~dev78-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197402" version="1" comment="openstack-neutron-linuxbridge-agent is &lt;2014.2.4~a0~dev78-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197403" version="1" comment="openstack-neutron-metadata-agent is &lt;2014.2.4~a0~dev78-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197404" version="1" comment="openstack-neutron-metering-agent is &lt;2014.2.4~a0~dev78-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197405" version="1" comment="openstack-neutron-openvswitch-agent is &lt;2014.2.4~a0~dev78-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197406" version="1" comment="openstack-neutron-vpn-agent is &lt;2014.2.4~a0~dev78-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197407" version="1" comment="openstack-nova is &lt;2014.2.4~a0~dev61-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197408" version="1" comment="openstack-nova-compute is &lt;2014.2.4~a0~dev61-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197409" version="1" comment="openstack-suse is &lt;2014.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197410" version="1" comment="openstack-suse-sudo is &lt;2014.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197411" version="1" comment="python-ceilometer is &lt;2014.2.4.dev18-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197412" version="1" comment="python-neutron is &lt;2014.2.4~a0~dev78-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197413" version="1" comment="python-nova is &lt;2014.2.4~a0~dev61-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197414" version="1" comment="openstack-neutron is &lt;2014.2.4~a0~dev103-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197415" version="1" comment="openstack-neutron-dhcp-agent is &lt;2014.2.4~a0~dev103-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197416" version="1" comment="openstack-neutron-ha-tool is &lt;2014.2.4~a0~dev103-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197417" version="1" comment="openstack-neutron-l3-agent is &lt;2014.2.4~a0~dev103-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197418" version="1" comment="openstack-neutron-lbaas-agent is &lt;2014.2.4~a0~dev103-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197419" version="1" comment="openstack-neutron-linuxbridge-agent is &lt;2014.2.4~a0~dev103-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197420" version="1" comment="openstack-neutron-metadata-agent is &lt;2014.2.4~a0~dev103-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197421" version="1" comment="openstack-neutron-metering-agent is &lt;2014.2.4~a0~dev103-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197422" version="1" comment="openstack-neutron-openvswitch-agent is &lt;2014.2.4~a0~dev103-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197423" version="1" comment="openstack-neutron-vpn-agent is &lt;2014.2.4~a0~dev103-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197424" version="1" comment="openstack-nova is &lt;2014.2.4~a0~dev80-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197425" version="1" comment="openstack-nova-compute is &lt;2014.2.4~a0~dev80-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197426" version="1" comment="python-neutron is &lt;2014.2.4~a0~dev103-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197427" version="1" comment="python-nova is &lt;2014.2.4~a0~dev80-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197428" version="1" comment="python-python-memcached is &lt;1.54-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197429" version="1" comment="dnsmasq is &lt;2.71-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197430" version="1" comment="dnsmasq-utils is &lt;2.71-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197431" version="1" comment="iperf is &lt;3.1.3-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197432" version="1" comment="iperf-devel is &lt;3.1.3-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197433" version="1" comment="libiperf0 is &lt;3.1.3-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197434" version="1" comment="MozillaThunderbird is &lt;45.3.0-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197435" version="1" comment="MozillaThunderbird-buildsymbols is &lt;45.3.0-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197436" version="1" comment="MozillaThunderbird-devel is &lt;45.3.0-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197437" version="1" comment="MozillaThunderbird-translations-common is &lt;45.3.0-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197438" version="1" comment="MozillaThunderbird-translations-other is &lt;45.3.0-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197439" version="1" comment="chromedriver is &lt;53.0.2785.113-100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197440" version="1" comment="chromium is &lt;53.0.2785.113-100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197441" version="1" comment="chromium-desktop-gnome is &lt;53.0.2785.113-100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197442" version="1" comment="chromium-desktop-kde is &lt;53.0.2785.113-100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197443" version="1" comment="chromium-ffmpegsumo is &lt;53.0.2785.113-100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197444" version="1" comment="chromedriver is &lt;53.0.2785.143-106" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197445" version="1" comment="chromium is &lt;53.0.2785.143-106" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197446" version="1" comment="chromium-desktop-gnome is &lt;53.0.2785.143-106" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197447" version="1" comment="chromium-desktop-kde is &lt;53.0.2785.143-106" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197448" version="1" comment="chromium-ffmpegsumo is &lt;53.0.2785.143-106" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197449" version="1" comment="MozillaThunderbird is &lt;45.4.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197450" version="1" comment="MozillaThunderbird-buildsymbols is &lt;45.4.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197451" version="1" comment="MozillaThunderbird-devel is &lt;45.4.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197452" version="1" comment="MozillaThunderbird-translations-common is &lt;45.4.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197453" version="1" comment="MozillaThunderbird-translations-other is &lt;45.4.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197454" version="1" comment="kde-cli-tools5 is &lt;5.5.5-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197455" version="1" comment="kde-cli-tools5-lang is &lt;5.5.5-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197456" version="1" comment="go1.4 is &lt;1.4.3-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197457" version="1" comment="go1.4-doc is &lt;1.4.3-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197458" version="1" comment="kcoreaddons is &lt;5.20.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197459" version="1" comment="kcoreaddons-devel is &lt;5.20.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197460" version="1" comment="kcoreaddons-devel-32bit is &lt;5.21.0-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197461" version="1" comment="kcoreaddons-lang is &lt;5.20.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197462" version="1" comment="libKF5CoreAddons5 is &lt;5.20.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197463" version="1" comment="libKF5CoreAddons5-32bit is &lt;5.21.0-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197464" version="1" comment="ffmpeg is &lt;2.8.8-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197465" version="1" comment="ffmpeg-devel is &lt;2.8.8-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197466" version="1" comment="libavcodec-devel is &lt;2.8.8-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197467" version="1" comment="libavcodec56 is &lt;2.8.8-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197468" version="1" comment="libavcodec56-32bit is &lt;2.8.8-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197469" version="1" comment="libavdevice-devel is &lt;2.8.8-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197470" version="1" comment="libavdevice56 is &lt;2.8.8-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197471" version="1" comment="libavdevice56-32bit is &lt;2.8.8-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197472" version="1" comment="libavfilter-devel is &lt;2.8.8-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197473" version="1" comment="libavfilter5 is &lt;2.8.8-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197474" version="1" comment="libavfilter5-32bit is &lt;2.8.8-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197475" version="1" comment="libavformat-devel is &lt;2.8.8-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197476" version="1" comment="libavformat56 is &lt;2.8.8-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197477" version="1" comment="libavformat56-32bit is &lt;2.8.8-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197478" version="1" comment="libavresample-devel is &lt;2.8.8-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197479" version="1" comment="libavresample2 is &lt;2.8.8-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197480" version="1" comment="libavresample2-32bit is &lt;2.8.8-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197481" version="1" comment="libavutil-devel is &lt;2.8.8-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197482" version="1" comment="libavutil54 is &lt;2.8.8-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197483" version="1" comment="libavutil54-32bit is &lt;2.8.8-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197484" version="1" comment="libpostproc-devel is &lt;2.8.8-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197485" version="1" comment="libpostproc53 is &lt;2.8.8-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197486" version="1" comment="libpostproc53-32bit is &lt;2.8.8-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197487" version="1" comment="libswresample-devel is &lt;2.8.8-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197488" version="1" comment="libswresample1 is &lt;2.8.8-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197489" version="1" comment="libswresample1-32bit is &lt;2.8.8-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197490" version="1" comment="libswscale-devel is &lt;2.8.8-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197491" version="1" comment="libswscale3 is &lt;2.8.8-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197492" version="1" comment="libswscale3-32bit is &lt;2.8.8-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197493" version="1" comment="chromedriver is &lt;54.0.2840.90-112" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197494" version="1" comment="chromium is &lt;54.0.2840.90-112" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197495" version="1" comment="chromium-ffmpegsumo is &lt;54.0.2840.90-112" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197496" version="1" comment="MozillaThunderbird is &lt;45.5.1-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197497" version="1" comment="MozillaThunderbird-buildsymbols is &lt;45.5.1-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197498" version="1" comment="MozillaThunderbird-devel is &lt;45.5.1-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197499" version="1" comment="MozillaThunderbird-translations-common is &lt;45.5.1-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197500" version="1" comment="MozillaThunderbird-translations-other is &lt;45.5.1-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197501" version="1" comment="chromedriver is &lt;55.0.2883.75-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197502" version="1" comment="chromium is &lt;55.0.2883.75-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197503" version="1" comment="MozillaThunderbird is &lt;45.6.0-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197504" version="1" comment="MozillaThunderbird-buildsymbols is &lt;45.6.0-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197505" version="1" comment="MozillaThunderbird-devel is &lt;45.6.0-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197506" version="1" comment="MozillaThunderbird-translations-common is &lt;45.6.0-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197507" version="1" comment="MozillaThunderbird-translations-other is &lt;45.6.0-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197508" version="1" comment="chromedriver is &lt;51.0.2704.103-85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197509" version="1" comment="chromium is &lt;51.0.2704.103-85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197510" version="1" comment="chromium-desktop-gnome is &lt;51.0.2704.103-85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197511" version="1" comment="chromium-desktop-kde is &lt;51.0.2704.103-85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197512" version="1" comment="chromium-ffmpegsumo is &lt;51.0.2704.103-85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197513" version="1" comment="imlib2 is &lt;1.4.5-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197514" version="1" comment="imlib2-devel is &lt;1.4.5-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197515" version="1" comment="imlib2-filters is &lt;1.4.5-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197516" version="1" comment="imlib2-loaders is &lt;1.4.5-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197517" version="1" comment="libImlib2-1 is &lt;1.4.5-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197518" version="1" comment="libprotobuf-lite8 is &lt;2.5.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197519" version="1" comment="libprotobuf8 is &lt;2.5.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197520" version="1" comment="libprotoc8 is &lt;2.5.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197521" version="1" comment="mosh is &lt;1.2.5-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197522" version="1" comment="ninja is &lt;1.5.3-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197523" version="1" comment="perl-Switch is &lt;2.17-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197524" version="1" comment="protobuf is &lt;2.5.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197525" version="1" comment="protobuf-devel is &lt;2.5.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197526" version="1" comment="protobuf-java is &lt;2.5.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197527" version="1" comment="python-protobuf is &lt;2.5.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251843" version="1" comment="znc is &lt;1.6.0-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251844" version="1" comment="znc-devel is &lt;1.6.0-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251845" version="1" comment="znc-perl is &lt;1.6.0-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251846" version="1" comment="znc-python3 is &lt;1.6.0-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251847" version="1" comment="znc-tcl is &lt;1.6.0-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251848" version="1" comment="znc is &lt;1.6.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251849" version="1" comment="znc-devel is &lt;1.6.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251850" version="1" comment="znc-perl is &lt;1.6.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251851" version="1" comment="znc-python3 is &lt;1.6.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251852" version="1" comment="znc-tcl is &lt;1.6.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197538" version="1" comment="MozillaThunderbird is &lt;45.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197539" version="1" comment="MozillaThunderbird-buildsymbols is &lt;45.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197540" version="1" comment="MozillaThunderbird-devel is &lt;45.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197541" version="1" comment="MozillaThunderbird-translations-common is &lt;45.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197542" version="1" comment="MozillaThunderbird-translations-other is &lt;45.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197543" version="1" comment="chromedriver is &lt;52.0.2743.82-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197544" version="1" comment="chromium is &lt;52.0.2743.82-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197545" version="1" comment="chromium-desktop-gnome is &lt;52.0.2743.82-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197546" version="1" comment="chromium-desktop-kde is &lt;52.0.2743.82-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197547" version="1" comment="chromium-ffmpegsumo is &lt;52.0.2743.82-89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197548" version="1" comment="karchive is &lt;5.20.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197549" version="1" comment="karchive-devel is &lt;5.20.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197550" version="1" comment="karchive-devel-32bit is &lt;5.21.0-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197551" version="1" comment="libKF5Archive5 is &lt;5.20.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197552" version="1" comment="libKF5Archive5-32bit is &lt;5.21.0-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197553" version="1" comment="redis is &lt;3.0.7-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197554" version="1" comment="chromedriver is &lt;52.0.2743.116-92" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197555" version="1" comment="chromium is &lt;52.0.2743.116-92" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197556" version="1" comment="chromium-desktop-gnome is &lt;52.0.2743.116-92" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197557" version="1" comment="chromium-desktop-kde is &lt;52.0.2743.116-92" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197558" version="1" comment="chromium-ffmpegsumo is &lt;52.0.2743.116-92" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197559" version="1" comment="go is &lt;1.6.1-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197560" version="1" comment="go-doc is &lt;1.6.1-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197561" version="1" comment="chromedriver is &lt;61.0.3163.79-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197562" version="1" comment="chromium is &lt;61.0.3163.79-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197563" version="1" comment="freexl is &lt;1.0.4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197564" version="1" comment="freexl-devel is &lt;1.0.4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197565" version="1" comment="libfreexl1 is &lt;1.0.4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197566" version="1" comment="chromedriver is &lt;61.0.3163.100-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197567" version="1" comment="chromium is &lt;61.0.3163.100-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197568" version="1" comment="libopenjp2-7 is &lt;2.1.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197569" version="1" comment="openjpeg2 is &lt;2.1.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197570" version="1" comment="openjpeg2-devel is &lt;2.1.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197571" version="1" comment="libopenjpeg1 is &lt;1.5.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197572" version="1" comment="openjpeg is &lt;1.5.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197573" version="1" comment="openjpeg-devel is &lt;1.5.2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197574" version="1" comment="SDL2 is &lt;2.0.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197575" version="1" comment="ffmpeg is &lt;3.3.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197576" version="1" comment="lame is &lt;3.99.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197577" version="1" comment="lame-doc is &lt;3.99.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197578" version="1" comment="lame-mp3rtp is &lt;3.99.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197579" version="1" comment="libSDL2-2_0-0 is &lt;2.0.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197580" version="1" comment="libSDL2-devel is &lt;2.0.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197581" version="1" comment="libavcodec-devel is &lt;3.3.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197582" version="1" comment="libavcodec57 is &lt;3.3.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197583" version="1" comment="libavdevice-devel is &lt;3.3.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197584" version="1" comment="libavdevice57 is &lt;3.3.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197585" version="1" comment="libavfilter-devel is &lt;3.3.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197586" version="1" comment="libavfilter6 is &lt;3.3.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197587" version="1" comment="libavformat-devel is &lt;3.3.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197588" version="1" comment="libavformat57 is &lt;3.3.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197589" version="1" comment="libavresample-devel is &lt;3.3.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197590" version="1" comment="libavresample3 is &lt;3.3.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197591" version="1" comment="libavutil-devel is &lt;3.3.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197592" version="1" comment="libavutil55 is &lt;3.3.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197593" version="1" comment="libmp3lame-devel is &lt;3.99.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197594" version="1" comment="libmp3lame0 is &lt;3.99.5-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197595" version="1" comment="libpostproc-devel is &lt;3.3.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197596" version="1" comment="libpostproc54 is &lt;3.3.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197597" version="1" comment="libswresample-devel is &lt;3.3.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197598" version="1" comment="libswresample2 is &lt;3.3.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197599" version="1" comment="libswscale-devel is &lt;3.3.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197600" version="1" comment="libswscale4 is &lt;3.3.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197601" version="1" comment="libtwolame-devel is &lt;0.3.13-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197602" version="1" comment="libtwolame0 is &lt;0.3.13-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197603" version="1" comment="twolame is &lt;0.3.13-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197604" version="1" comment="libopenjp2-7 is &lt;2.1.0-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197605" version="1" comment="libopenjp2-7-32bit is &lt;2.1.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197606" version="1" comment="openjpeg2 is &lt;2.1.0-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197607" version="1" comment="openjpeg2-devel is &lt;2.1.0-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197608" version="1" comment="MozillaThunderbird is &lt;52.4.0-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197609" version="1" comment="MozillaThunderbird-buildsymbols is &lt;52.4.0-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197610" version="1" comment="MozillaThunderbird-devel is &lt;52.4.0-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197611" version="1" comment="MozillaThunderbird-translations-common is &lt;52.4.0-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197612" version="1" comment="MozillaThunderbird-translations-other is &lt;52.4.0-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197613" version="1" comment="libmbedtls9 is &lt;1.3.19-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197614" version="1" comment="libmbedtls9-32bit is &lt;1.3.19-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197615" version="1" comment="mbedtls is &lt;1.3.19-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197616" version="1" comment="mbedtls-devel is &lt;1.3.19-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197617" version="1" comment="libgit2 is &lt;0.24.3-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197618" version="1" comment="libgit2-24 is &lt;0.24.3-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197619" version="1" comment="libgit2-devel is &lt;0.24.3-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197620" version="1" comment="irssi is &lt;1.0.5-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197621" version="1" comment="irssi-devel is &lt;1.0.5-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197622" version="1" comment="jq is &lt;1.5-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197623" version="1" comment="libjq-devel is &lt;1.5-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197624" version="1" comment="libjq1 is &lt;1.5-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197625" version="1" comment="SDL2 is &lt;2.0.5-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197626" version="1" comment="libSDL2-2_0-0 is &lt;2.0.5-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197627" version="1" comment="libSDL2-2_0-0-32bit is &lt;2.0.3-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197628" version="1" comment="libSDL2-devel is &lt;2.0.5-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197629" version="1" comment="libSDL2-devel-32bit is &lt;2.0.3-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197630" version="1" comment="redis is &lt;4.0.2-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197631" version="1" comment="ansible is &lt;2.4.1.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197632" version="1" comment="mongodb is &lt;3.4.10-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197633" version="1" comment="mongodb-mongoperf is &lt;3.4.10-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197634" version="1" comment="mongodb-mongos is &lt;3.4.10-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197635" version="1" comment="mongodb-server is &lt;3.4.10-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197636" version="1" comment="mongodb-shell is &lt;3.4.10-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197637" version="1" comment="MozillaThunderbird is &lt;52.5.0-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197638" version="1" comment="MozillaThunderbird-buildsymbols is &lt;52.5.0-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197639" version="1" comment="MozillaThunderbird-devel is &lt;52.5.0-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197640" version="1" comment="MozillaThunderbird-translations-common is &lt;52.5.0-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197641" version="1" comment="MozillaThunderbird-translations-other is &lt;52.5.0-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197642" version="1" comment="tor is &lt;0.3.1.9-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197643" version="1" comment="chromedriver is &lt;63.0.3239.84-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197644" version="1" comment="chromium is &lt;63.0.3239.84-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197645" version="1" comment="erlang is &lt;18.3.4.7-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197646" version="1" comment="erlang-debugger is &lt;18.3.4.7-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197647" version="1" comment="erlang-debugger-src is &lt;18.3.4.7-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197648" version="1" comment="erlang-dialyzer is &lt;18.3.4.7-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197649" version="1" comment="erlang-dialyzer-src is &lt;18.3.4.7-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197650" version="1" comment="erlang-diameter is &lt;18.3.4.7-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197651" version="1" comment="erlang-diameter-src is &lt;18.3.4.7-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197652" version="1" comment="erlang-doc is &lt;18.3.4.7-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197653" version="1" comment="erlang-epmd is &lt;18.3.4.7-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197654" version="1" comment="erlang-et is &lt;18.3.4.7-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197655" version="1" comment="erlang-et-src is &lt;18.3.4.7-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197656" version="1" comment="erlang-gs is &lt;18.3.4.7-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197657" version="1" comment="erlang-gs-src is &lt;18.3.4.7-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197658" version="1" comment="erlang-jinterface is &lt;18.3.4.7-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197659" version="1" comment="erlang-jinterface-src is &lt;18.3.4.7-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197660" version="1" comment="erlang-observer is &lt;18.3.4.7-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197661" version="1" comment="erlang-observer-src is &lt;18.3.4.7-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197662" version="1" comment="erlang-reltool is &lt;18.3.4.7-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197663" version="1" comment="erlang-reltool-src is &lt;18.3.4.7-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197664" version="1" comment="erlang-src is &lt;18.3.4.7-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197665" version="1" comment="erlang-wx is &lt;18.3.4.7-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197666" version="1" comment="erlang-wx-src is &lt;18.3.4.7-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197667" version="1" comment="chromedriver is &lt;63.0.3239.108-43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197668" version="1" comment="chromium is &lt;63.0.3239.108-43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197669" version="1" comment="enigmail is &lt;1.9.9-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197670" version="1" comment="MozillaThunderbird is &lt;52.5.2-51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197671" version="1" comment="MozillaThunderbird-buildsymbols is &lt;52.5.2-51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197672" version="1" comment="MozillaThunderbird-devel is &lt;52.5.2-51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197673" version="1" comment="MozillaThunderbird-translations-common is &lt;52.5.2-51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197674" version="1" comment="MozillaThunderbird-translations-other is &lt;52.5.2-51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197675" version="1" comment="phpMyAdmin is &lt;4.7.7-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197676" version="1" comment="MozillaThunderbird is &lt;45.7.0-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197677" version="1" comment="MozillaThunderbird-buildsymbols is &lt;45.7.0-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197678" version="1" comment="MozillaThunderbird-devel is &lt;45.7.0-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197679" version="1" comment="MozillaThunderbird-translations-common is &lt;45.7.0-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197680" version="1" comment="MozillaThunderbird-translations-other is &lt;45.7.0-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197681" version="1" comment="kopete is &lt;15.12.3-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197682" version="1" comment="kopete-devel is &lt;15.12.3-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197683" version="1" comment="nginx is &lt;1.8.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197684" version="1" comment="libgit2 is &lt;0.24.6-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197685" version="1" comment="libgit2-24 is &lt;0.24.6-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197686" version="1" comment="libgit2-devel is &lt;0.24.6-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197687" version="1" comment="irssi is &lt;1.0.1-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197688" version="1" comment="irssi-devel is &lt;1.0.1-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197689" version="1" comment="chromedriver is &lt;56.0.2924.87-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197690" version="1" comment="chromium is &lt;56.0.2924.87-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197691" version="1" comment="kdelibs4 is &lt;4.14.25-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197692" version="1" comment="kdelibs4-apidocs is &lt;4.14.25-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197693" version="1" comment="kdelibs4-branding-upstream is &lt;4.14.25-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197694" version="1" comment="kdelibs4-core is &lt;4.14.25-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197695" version="1" comment="kdelibs4-doc is &lt;4.14.25-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197696" version="1" comment="kio is &lt;5.26.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197697" version="1" comment="kio-32bit is &lt;5.26.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197698" version="1" comment="kio-core is &lt;5.26.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197699" version="1" comment="kio-core-32bit is &lt;5.26.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197700" version="1" comment="kio-devel is &lt;5.26.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197701" version="1" comment="kio-devel-32bit is &lt;5.26.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197702" version="1" comment="kio-lang is &lt;5.26.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197703" version="1" comment="libkde4 is &lt;4.14.25-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197704" version="1" comment="libkde4-32bit is &lt;4.14.25-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197705" version="1" comment="libkde4-devel is &lt;4.14.25-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197706" version="1" comment="libkdecore4 is &lt;4.14.25-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197707" version="1" comment="libkdecore4-32bit is &lt;4.14.25-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197708" version="1" comment="libkdecore4-devel is &lt;4.14.25-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197709" version="1" comment="libksuseinstall-devel is &lt;4.14.25-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197710" version="1" comment="libksuseinstall1 is &lt;4.14.25-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197711" version="1" comment="libksuseinstall1-32bit is &lt;4.14.25-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197712" version="1" comment="MozillaThunderbird is &lt;45.8.0-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197713" version="1" comment="MozillaThunderbird-buildsymbols is &lt;45.8.0-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197714" version="1" comment="MozillaThunderbird-devel is &lt;45.8.0-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197715" version="1" comment="MozillaThunderbird-translations-common is &lt;45.8.0-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197716" version="1" comment="MozillaThunderbird-translations-other is &lt;45.8.0-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197717" version="1" comment="irssi is &lt;1.0.2-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197718" version="1" comment="irssi-devel is &lt;1.0.2-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197719" version="1" comment="chromedriver is &lt;57.0.2987.98-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197720" version="1" comment="chromium is &lt;57.0.2987.98-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197721" version="1" comment="libmbedtls9 is &lt;1.3.19-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197722" version="1" comment="libmbedtls9-32bit is &lt;1.3.19-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197723" version="1" comment="mbedtls is &lt;1.3.19-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197724" version="1" comment="mbedtls-devel is &lt;1.3.19-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197725" version="1" comment="chromedriver is &lt;57.0.2987.133-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197726" version="1" comment="chromium is &lt;57.0.2987.133-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197727" version="1" comment="geotiff is &lt;1.4.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197728" version="1" comment="geotiff-devel is &lt;1.4.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197729" version="1" comment="libgeotiff2 is &lt;1.4.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197730" version="1" comment="ffmpeg is &lt;3.1.6-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197731" version="1" comment="ffmpeg-devel is &lt;2.8.10-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197732" version="1" comment="libavcodec-devel is &lt;3.1.6-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197733" version="1" comment="libavcodec56 is &lt;2.8.10-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197734" version="1" comment="libavcodec57 is &lt;3.1.6-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197735" version="1" comment="libavcodec57-32bit is &lt;3.2.4-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197736" version="1" comment="libavdevice-devel is &lt;3.1.6-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197737" version="1" comment="libavdevice56 is &lt;2.8.10-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197738" version="1" comment="libavdevice57 is &lt;3.1.6-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197739" version="1" comment="libavdevice57-32bit is &lt;3.2.4-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197740" version="1" comment="libavfilter-devel is &lt;3.1.6-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197741" version="1" comment="libavfilter5 is &lt;2.8.10-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197742" version="1" comment="libavfilter6 is &lt;3.1.6-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197743" version="1" comment="libavfilter6-32bit is &lt;3.2.4-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197744" version="1" comment="libavformat-devel is &lt;3.1.6-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197745" version="1" comment="libavformat56 is &lt;2.8.10-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197746" version="1" comment="libavformat57 is &lt;3.1.6-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197747" version="1" comment="libavformat57-32bit is &lt;3.2.4-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197748" version="1" comment="libavresample-devel is &lt;3.1.6-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197749" version="1" comment="libavresample2 is &lt;2.8.10-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197750" version="1" comment="libavresample3 is &lt;3.1.6-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197751" version="1" comment="libavresample3-32bit is &lt;3.2.4-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197752" version="1" comment="libavutil-devel is &lt;3.1.6-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197753" version="1" comment="libavutil54 is &lt;2.8.10-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197754" version="1" comment="libavutil55 is &lt;3.1.6-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197755" version="1" comment="libavutil55-32bit is &lt;3.2.4-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197756" version="1" comment="libpostproc-devel is &lt;3.1.6-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197757" version="1" comment="libpostproc53 is &lt;2.8.10-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197758" version="1" comment="libpostproc54 is &lt;3.1.6-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197759" version="1" comment="libpostproc54-32bit is &lt;3.2.4-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197760" version="1" comment="libswresample-devel is &lt;3.1.6-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197761" version="1" comment="libswresample1 is &lt;2.8.10-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197762" version="1" comment="libswresample2 is &lt;3.1.6-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197763" version="1" comment="libswresample2-32bit is &lt;3.2.4-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197764" version="1" comment="libswscale-devel is &lt;3.1.6-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197765" version="1" comment="libswscale3 is &lt;2.8.10-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197766" version="1" comment="libswscale4 is &lt;3.1.6-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197767" version="1" comment="libswscale4-32bit is &lt;3.2.4-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197768" version="1" comment="chromedriver is &lt;58.0.3029.81-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197769" version="1" comment="chromium is &lt;58.0.3029.81-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197770" version="1" comment="chromedriver is &lt;58.0.3029.96-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197771" version="1" comment="chromium is &lt;58.0.3029.96-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197772" version="1" comment="MozillaThunderbird is &lt;52.1.0-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197773" version="1" comment="MozillaThunderbird-buildsymbols is &lt;52.1.0-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197774" version="1" comment="MozillaThunderbird-devel is &lt;52.1.0-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197775" version="1" comment="MozillaThunderbird-translations-common is &lt;52.1.0-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197776" version="1" comment="MozillaThunderbird-translations-other is &lt;52.1.0-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197777" version="1" comment="kauth is &lt;5.26.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197778" version="1" comment="kauth-devel is &lt;5.26.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197779" version="1" comment="kauth-devel-32bit is &lt;5.26.0-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197780" version="1" comment="kdelibs4 is &lt;4.14.25-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197781" version="1" comment="kdelibs4-apidocs is &lt;4.14.25-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197782" version="1" comment="kdelibs4-branding-upstream is &lt;4.14.25-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197783" version="1" comment="kdelibs4-core is &lt;4.14.25-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197784" version="1" comment="kdelibs4-doc is &lt;4.14.25-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197785" version="1" comment="libKF5Auth5 is &lt;5.26.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197786" version="1" comment="libKF5Auth5-32bit is &lt;5.26.0-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197787" version="1" comment="libKF5Auth5-lang is &lt;5.26.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197788" version="1" comment="libkde4 is &lt;4.14.25-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197789" version="1" comment="libkde4-32bit is &lt;4.14.25-7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197790" version="1" comment="libkde4-devel is &lt;4.14.25-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197791" version="1" comment="libkdecore4 is &lt;4.14.25-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197792" version="1" comment="libkdecore4-32bit is &lt;4.14.25-7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197793" version="1" comment="libkdecore4-devel is &lt;4.14.25-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197794" version="1" comment="libksuseinstall-devel is &lt;4.14.25-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197795" version="1" comment="libksuseinstall1 is &lt;4.14.25-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197796" version="1" comment="libksuseinstall1-32bit is &lt;4.14.25-7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197797" version="1" comment="chromedriver is &lt;59.0.3071.86-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197798" version="1" comment="chromium is &lt;59.0.3071.86-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197799" version="1" comment="irssi is &lt;1.0.3-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197800" version="1" comment="irssi-devel is &lt;1.0.3-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197801" version="1" comment="irssi is &lt;0.8.21-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197802" version="1" comment="irssi-devel is &lt;0.8.21-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197803" version="1" comment="ffmpeg2 is &lt;2.8.11-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197804" version="1" comment="ffmpeg2-devel is &lt;2.8.11-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197805" version="1" comment="libavcodec56 is &lt;2.8.11-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197806" version="1" comment="libavdevice56 is &lt;2.8.11-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197807" version="1" comment="libavfilter5 is &lt;2.8.11-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197808" version="1" comment="libavformat56 is &lt;2.8.11-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197809" version="1" comment="libavresample2 is &lt;2.8.11-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197810" version="1" comment="libavutil54 is &lt;2.8.11-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197811" version="1" comment="libpostproc53 is &lt;2.8.11-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197812" version="1" comment="libswresample1 is &lt;2.8.11-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197813" version="1" comment="libswscale3 is &lt;2.8.11-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197814" version="1" comment="ffmpeg is &lt;3.1.8-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197815" version="1" comment="libavcodec-devel is &lt;3.1.8-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197816" version="1" comment="libavcodec57 is &lt;3.1.8-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197817" version="1" comment="libavdevice-devel is &lt;3.1.8-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197818" version="1" comment="libavdevice57 is &lt;3.1.8-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197819" version="1" comment="libavfilter-devel is &lt;3.1.8-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197820" version="1" comment="libavfilter6 is &lt;3.1.8-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197821" version="1" comment="libavformat-devel is &lt;3.1.8-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197822" version="1" comment="libavformat57 is &lt;3.1.8-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197823" version="1" comment="libavresample-devel is &lt;3.1.8-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197824" version="1" comment="libavresample3 is &lt;3.1.8-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197825" version="1" comment="libavutil-devel is &lt;3.1.8-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197826" version="1" comment="libavutil55 is &lt;3.1.8-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197827" version="1" comment="libpostproc-devel is &lt;3.1.8-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197828" version="1" comment="libpostproc54 is &lt;3.1.8-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197829" version="1" comment="libswresample-devel is &lt;3.1.8-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197830" version="1" comment="libswresample2 is &lt;3.1.8-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197831" version="1" comment="libswscale-devel is &lt;3.1.8-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197832" version="1" comment="libswscale4 is &lt;3.1.8-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197833" version="1" comment="MozillaThunderbird is &lt;52.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197834" version="1" comment="MozillaThunderbird-buildsymbols is &lt;52.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197835" version="1" comment="MozillaThunderbird-devel is &lt;52.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197836" version="1" comment="MozillaThunderbird-translations-common is &lt;52.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197837" version="1" comment="MozillaThunderbird-translations-other is &lt;52.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197838" version="1" comment="chromedriver is &lt;59.0.3071.104-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197839" version="1" comment="chromium is &lt;59.0.3071.104-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197840" version="1" comment="go is &lt;1.7.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197841" version="1" comment="go-doc is &lt;1.7.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197842" version="1" comment="akonadi_resources is &lt;16.08.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197843" version="1" comment="akregator5 is &lt;16.08.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197844" version="1" comment="blogilo5 is &lt;16.08.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197845" version="1" comment="kaddressbook5 is &lt;16.08.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197846" version="1" comment="kalarm5 is &lt;16.08.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197847" version="1" comment="kdepim is &lt;16.08.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197848" version="1" comment="kmail5 is &lt;16.08.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197849" version="1" comment="knotes5 is &lt;16.08.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197850" version="1" comment="kontact5 is &lt;16.08.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197851" version="1" comment="korganizer5 is &lt;16.08.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197852" version="1" comment="ktnef5 is &lt;16.08.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197853" version="1" comment="messagelib is &lt;16.08.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197854" version="1" comment="messagelib-devel is &lt;16.08.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197855" version="1" comment="ffmpeg2 is &lt;2.8.12-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197856" version="1" comment="ffmpeg2-devel is &lt;2.8.12-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197857" version="1" comment="libavcodec56 is &lt;2.8.12-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197858" version="1" comment="libavdevice56 is &lt;2.8.12-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197859" version="1" comment="libavfilter5 is &lt;2.8.12-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197860" version="1" comment="libavformat56 is &lt;2.8.12-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197861" version="1" comment="libavresample2 is &lt;2.8.12-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197862" version="1" comment="libavutil54 is &lt;2.8.12-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197863" version="1" comment="libpostproc53 is &lt;2.8.12-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197864" version="1" comment="libswresample1 is &lt;2.8.12-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197865" version="1" comment="libswscale3 is &lt;2.8.12-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197866" version="1" comment="irssi is &lt;1.0.4-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197867" version="1" comment="irssi-devel is &lt;1.0.4-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197868" version="1" comment="chromedriver is &lt;60.0.3112.78-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197869" version="1" comment="chromium is &lt;60.0.3112.78-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197870" version="1" comment="ark is &lt;15.12.3-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197871" version="1" comment="libkerfuffle15 is &lt;15.12.3-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197872" version="1" comment="libkerfuffle16 is &lt;16.08.2-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197873" version="1" comment="MozillaThunderbird is &lt;52.3.0-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197874" version="1" comment="MozillaThunderbird-buildsymbols is &lt;52.3.0-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197875" version="1" comment="MozillaThunderbird-devel is &lt;52.3.0-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197876" version="1" comment="MozillaThunderbird-translations-common is &lt;52.3.0-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197877" version="1" comment="MozillaThunderbird-translations-other is &lt;52.3.0-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197878" version="1" comment="MozillaThunderbird is &lt;52.6-54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197879" version="1" comment="MozillaThunderbird-buildsymbols is &lt;52.6-54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197880" version="1" comment="MozillaThunderbird-devel is &lt;52.6-54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197881" version="1" comment="MozillaThunderbird-translations-common is &lt;52.6-54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197882" version="1" comment="MozillaThunderbird-translations-other is &lt;52.6-54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197883" version="1" comment="chromedriver is &lt;64.0.3282.119-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197884" version="1" comment="chromium is &lt;64.0.3282.119-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197885" version="1" comment="libre2-0 is &lt;20180101-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197886" version="1" comment="re2 is &lt;20180101-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197887" version="1" comment="re2-devel is &lt;20180101-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197888" version="1" comment="chromedriver is &lt;64.0.3282.140-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197889" version="1" comment="chromium is &lt;64.0.3282.140-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197890" version="1" comment="libre2-0 is &lt;20180201-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197891" version="1" comment="libre2-0-32bit is &lt;20180201-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197892" version="1" comment="re2 is &lt;20180201-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197893" version="1" comment="re2-devel is &lt;20180201-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238993" version="1" comment="MozillaThunderbird is &lt;60.3.0-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238994" version="1" comment="MozillaThunderbird-buildsymbols is &lt;60.3.0-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238995" version="1" comment="MozillaThunderbird-translations-common is &lt;60.3.0-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238996" version="1" comment="MozillaThunderbird-translations-other is &lt;60.3.0-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239819" version="1" comment="chromedriver is &lt;70.0.3538.102-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239820" version="1" comment="chromium is &lt;70.0.3538.102-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197894" version="1" comment="drkonqi5 is &lt;5.8.7-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197895" version="1" comment="plasma5-workspace is &lt;5.8.7-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197896" version="1" comment="plasma5-workspace-devel is &lt;5.8.7-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197897" version="1" comment="plasma5-workspace-lang is &lt;5.8.7-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197898" version="1" comment="plasma5-workspace-libs is &lt;5.8.7-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241584" version="1" comment="pdns-recursor is &lt;4.1.8-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241629" version="1" comment="pdns is &lt;4.1.5-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241630" version="1" comment="pdns-backend-godbc is &lt;4.1.5-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241631" version="1" comment="pdns-backend-ldap is &lt;4.1.5-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241632" version="1" comment="pdns-backend-lua is &lt;4.1.5-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241633" version="1" comment="pdns-backend-mydns is &lt;4.1.5-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241634" version="1" comment="pdns-backend-mysql is &lt;4.1.5-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241635" version="1" comment="pdns-backend-postgresql is &lt;4.1.5-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241636" version="1" comment="pdns-backend-remote is &lt;4.1.5-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241637" version="1" comment="pdns-backend-sqlite3 is &lt;4.1.5-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241786" version="1" comment="chromedriver is &lt;71.0.3578.98-80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241787" version="1" comment="chromium is &lt;71.0.3578.98-80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197899" version="1" comment="chromedriver is &lt;64.0.3282.167-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197900" version="1" comment="chromium is &lt;64.0.3282.167-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197901" version="1" comment="irssi is &lt;1.1.1-43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197902" version="1" comment="irssi-devel is &lt;1.1.1-43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197903" version="1" comment="ffmpeg is &lt;3.4.2-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197904" version="1" comment="libavcodec-devel is &lt;3.4.2-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197905" version="1" comment="libavcodec57 is &lt;3.4.2-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197906" version="1" comment="libavcodec57-32bit is &lt;3.4.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197907" version="1" comment="libavdevice-devel is &lt;3.4.2-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197908" version="1" comment="libavdevice57 is &lt;3.4.2-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197909" version="1" comment="libavdevice57-32bit is &lt;3.4.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197910" version="1" comment="libavfilter-devel is &lt;3.4.2-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197911" version="1" comment="libavfilter6 is &lt;3.4.2-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197912" version="1" comment="libavfilter6-32bit is &lt;3.4.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197913" version="1" comment="libavformat-devel is &lt;3.4.2-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197914" version="1" comment="libavformat57 is &lt;3.4.2-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197915" version="1" comment="libavformat57-32bit is &lt;3.4.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197916" version="1" comment="libavresample-devel is &lt;3.4.2-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197917" version="1" comment="libavresample3 is &lt;3.4.2-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197918" version="1" comment="libavresample3-32bit is &lt;3.4.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197919" version="1" comment="libavutil-devel is &lt;3.4.2-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197920" version="1" comment="libavutil55 is &lt;3.4.2-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197921" version="1" comment="libavutil55-32bit is &lt;3.4.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197922" version="1" comment="libpostproc-devel is &lt;3.4.2-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197923" version="1" comment="libpostproc54 is &lt;3.4.2-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197924" version="1" comment="libpostproc54-32bit is &lt;3.4.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197925" version="1" comment="libswresample-devel is &lt;3.4.2-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197926" version="1" comment="libswresample2 is &lt;3.4.2-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197927" version="1" comment="libswresample2-32bit is &lt;3.4.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197928" version="1" comment="libswscale-devel is &lt;3.4.2-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197929" version="1" comment="libswscale4 is &lt;3.4.2-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197930" version="1" comment="libswscale4-32bit is &lt;3.4.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197931" version="1" comment="irssi is &lt;1.0.6-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197932" version="1" comment="irssi-devel is &lt;1.0.6-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197933" version="1" comment="libsox3 is &lt;14.4.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197934" version="1" comment="sox is &lt;14.4.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197935" version="1" comment="sox-devel is &lt;14.4.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197936" version="1" comment="libmbedtls9 is &lt;1.3.19-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197937" version="1" comment="libmbedtls9-32bit is &lt;1.3.19-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197938" version="1" comment="mbedtls is &lt;1.3.19-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197939" version="1" comment="mbedtls-devel is &lt;1.3.19-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197940" version="1" comment="libmad is &lt;0.15.1b-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197941" version="1" comment="libmad-devel is &lt;0.15.1b-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197942" version="1" comment="libmad0 is &lt;0.15.1b-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197943" version="1" comment="libmad0-32bit is &lt;0.15.1b-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197944" version="1" comment="phpMyAdmin is &lt;4.7.8-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197945" version="1" comment="lame is &lt;3.100-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197946" version="1" comment="lame-doc is &lt;3.100-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197947" version="1" comment="lame-mp3rtp is &lt;3.100-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197948" version="1" comment="libmp3lame-devel is &lt;3.100-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197949" version="1" comment="libmp3lame0 is &lt;3.100-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197950" version="1" comment="libmp3lame0-32bit is &lt;3.100-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197951" version="1" comment="freexl is &lt;1.0.5-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197952" version="1" comment="freexl-devel is &lt;1.0.5-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197953" version="1" comment="libfreexl1 is &lt;1.0.5-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197954" version="1" comment="go is &lt;1.9.4-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197955" version="1" comment="go-doc is &lt;1.9.4-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197956" version="1" comment="go-race is &lt;1.9.4-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197957" version="1" comment="go1.9 is &lt;1.9.4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197958" version="1" comment="go1.9-doc is &lt;1.9.4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197959" version="1" comment="go1.9-race is &lt;1.9.4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197960" version="1" comment="tor is &lt;0.3.2.10-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197961" version="1" comment="go1.8 is &lt;1.8.7-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197962" version="1" comment="go1.8-doc is &lt;1.8.7-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197963" version="1" comment="go1.8-race is &lt;1.8.7-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197964" version="1" comment="python-Django is &lt;1.11.10-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197965" version="1" comment="python-Django is &lt;1.11.11-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197966" version="1" comment="nginx is &lt;1.13.9-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197967" version="1" comment="vim-plugin-nginx is &lt;1.13.9-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197968" version="1" comment="MozillaThunderbird is &lt;52.7-57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197969" version="1" comment="MozillaThunderbird-buildsymbols is &lt;52.7-57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197970" version="1" comment="MozillaThunderbird-devel is &lt;52.7-57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197971" version="1" comment="MozillaThunderbird-translations-common is &lt;52.7-57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197972" version="1" comment="MozillaThunderbird-translations-other is &lt;52.7-57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197973" version="1" comment="pdns-recursor is &lt;4.1.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197974" version="1" comment="libmbedtls9 is &lt;1.3.19-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197975" version="1" comment="libmbedtls9-32bit is &lt;1.3.19-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197976" version="1" comment="mbedtls is &lt;1.3.19-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197977" version="1" comment="mbedtls-devel is &lt;1.3.19-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197978" version="1" comment="phpMyAdmin is &lt;4.8.0.1-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197979" version="1" comment="hdf5 is &lt;1.8.17-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197980" version="1" comment="hdf5-devel is &lt;1.8.17-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197981" version="1" comment="hdf5-devel-data is &lt;1.8.17-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197982" version="1" comment="hdf5-devel-static is &lt;1.8.17-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197983" version="1" comment="hdf5-examples is &lt;1.8.17-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197984" version="1" comment="hdf5-openmpi is &lt;1.8.17-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197985" version="1" comment="hdf5-openmpi-devel is &lt;1.8.17-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197986" version="1" comment="hdf5-openmpi-devel-static is &lt;1.8.17-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197987" version="1" comment="libhdf5-10 is &lt;1.8.17-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197988" version="1" comment="libhdf5-10-openmpi is &lt;1.8.17-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197989" version="1" comment="libhdf5_cpp12 is &lt;1.8.17-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197990" version="1" comment="libhdf5_fortran10 is &lt;1.8.17-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197991" version="1" comment="libhdf5_fortran10-openmpi is &lt;1.8.17-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197992" version="1" comment="libhdf5_hl10 is &lt;1.8.17-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197993" version="1" comment="libhdf5_hl10-openmpi is &lt;1.8.17-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197994" version="1" comment="libhdf5_hl_cpp11 is &lt;1.8.17-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197995" version="1" comment="libhdf5hl_fortran10 is &lt;1.8.17-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197996" version="1" comment="libhdf5hl_fortran10-openmpi is &lt;1.8.17-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197997" version="1" comment="chromedriver is &lt;66.0.3359.181-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197998" version="1" comment="chromium is &lt;66.0.3359.181-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009197999" version="1" comment="libopencv-qt56_3 is &lt;3.1.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198000" version="1" comment="libopencv3_1 is &lt;3.1.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198001" version="1" comment="opencv is &lt;3.1.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198002" version="1" comment="opencv-devel is &lt;3.1.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198003" version="1" comment="opencv-doc is &lt;3.1.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198004" version="1" comment="opencv-qt5 is &lt;3.1.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198005" version="1" comment="opencv-qt5-devel is &lt;3.1.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198006" version="1" comment="opencv-qt5-doc is &lt;3.1.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198007" version="1" comment="python-opencv is &lt;3.1.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198008" version="1" comment="python-opencv-qt5 is &lt;3.1.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198009" version="1" comment="python3-opencv is &lt;3.1.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198010" version="1" comment="python3-opencv-qt5 is &lt;3.1.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198011" version="1" comment="enigmail is &lt;2.0.4-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198019" version="1" comment="pdns is &lt;4.1.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198020" version="1" comment="pdns-backend-godbc is &lt;4.1.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198021" version="1" comment="pdns-backend-ldap is &lt;4.1.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198022" version="1" comment="pdns-backend-lua is &lt;4.1.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198023" version="1" comment="pdns-backend-mydns is &lt;4.1.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198024" version="1" comment="pdns-backend-mysql is &lt;4.1.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198025" version="1" comment="pdns-backend-postgresql is &lt;4.1.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198026" version="1" comment="pdns-backend-remote is &lt;4.1.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198027" version="1" comment="pdns-backend-sqlite3 is &lt;4.1.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230309" version="1" comment="libsingularity1 is &lt;2.3.2-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230310" version="1" comment="singularity is &lt;2.3.2-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230311" version="1" comment="singularity-devel is &lt;2.3.2-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232157" version="1" comment="python-Django is &lt;1.11.15-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198028" version="1" comment="redis is &lt;4.0.6-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242238" version="1" comment="keepalived is &lt;2.0.10-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241785" version="1" comment="phpMyAdmin is &lt;4.8.4-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246793" version="1" comment="tor is &lt;0.3.4.11-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246788" version="1" comment="ansible is &lt;2.7.8-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246789" version="1" comment="MozillaThunderbird is &lt;60.6.1-82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246790" version="1" comment="MozillaThunderbird-buildsymbols is &lt;60.6.1-82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246791" version="1" comment="MozillaThunderbird-translations-common is &lt;60.6.1-82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246792" version="1" comment="MozillaThunderbird-translations-other is &lt;60.6.1-82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246943" version="1" comment="pdns is &lt;4.1.7-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246944" version="1" comment="pdns-backend-geoip is &lt;4.1.2-lp150.3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246945" version="1" comment="pdns-backend-godbc is &lt;4.1.7-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246946" version="1" comment="pdns-backend-ldap is &lt;4.1.7-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246947" version="1" comment="pdns-backend-lua is &lt;4.1.7-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246948" version="1" comment="pdns-backend-mydns is &lt;4.1.7-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246949" version="1" comment="pdns-backend-mysql is &lt;4.1.7-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246950" version="1" comment="pdns-backend-postgresql is &lt;4.1.7-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246951" version="1" comment="pdns-backend-remote is &lt;4.1.7-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246952" version="1" comment="pdns-backend-sqlite3 is &lt;4.1.7-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251865" version="1" comment="znc is &lt;1.7.2-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251866" version="1" comment="znc-devel is &lt;1.7.2-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251867" version="1" comment="znc-lang is &lt;1.7.2-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251868" version="1" comment="znc-perl is &lt;1.7.2-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251869" version="1" comment="znc-python3 is &lt;1.7.2-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251870" version="1" comment="znc-tcl is &lt;1.7.2-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243679" version="1" comment="pdns-recursor is &lt;4.1.10-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258111" version="1" comment="enigmail is &lt;2.0.11-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258282" version="1" comment="ansible is &lt;2.8.1-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258373" version="1" comment="MozillaThunderbird is &lt;60.7.2-85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258374" version="1" comment="MozillaThunderbird-buildsymbols is &lt;60.7.2-85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258375" version="1" comment="MozillaThunderbird-translations-common is &lt;60.7.2-85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258376" version="1" comment="MozillaThunderbird-translations-other is &lt;60.7.2-85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258377" version="1" comment="chromedriver is &lt;75.0.3770.90-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258378" version="1" comment="chromium is &lt;75.0.3770.90-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258651" version="1" comment="phpMyAdmin is &lt;4.9.0.1-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258652" version="1" comment="irssi is &lt;1.1.3-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258653" version="1" comment="irssi-devel is &lt;1.1.3-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259368" version="1" comment="helm is &lt;2.13.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260497" version="1" comment="mumble is &lt;1.2.19-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260498" version="1" comment="mumble-32bit is &lt;1.2.19-lp151.4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260499" version="1" comment="mumble-server is &lt;1.2.19-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260894" version="1" comment="chromedriver is &lt;75.0.3770.142-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260895" version="1" comment="chromium is &lt;75.0.3770.142-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261469" version="1" comment="kconf_update5 is &lt;5.32.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261470" version="1" comment="kconfig is &lt;5.32.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261471" version="1" comment="kconfig-devel is &lt;5.32.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261472" version="1" comment="kconfig-devel-32bit is &lt;5.55.0-lp151.2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261473" version="1" comment="kconfig-devel-64bit is &lt;5.32.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261474" version="1" comment="kdelibs4 is &lt;4.14.33-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261475" version="1" comment="kdelibs4-apidocs is &lt;4.14.33-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261476" version="1" comment="kdelibs4-branding-upstream is &lt;4.14.33-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261477" version="1" comment="kdelibs4-core is &lt;4.14.33-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261478" version="1" comment="kdelibs4-doc is &lt;4.14.33-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261479" version="1" comment="libKF5ConfigCore5 is &lt;5.32.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261480" version="1" comment="libKF5ConfigCore5-32bit is &lt;5.55.0-lp151.2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261481" version="1" comment="libKF5ConfigCore5-64bit is &lt;5.32.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261482" version="1" comment="libKF5ConfigCore5-lang is &lt;5.32.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261483" version="1" comment="libKF5ConfigGui5 is &lt;5.32.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261484" version="1" comment="libKF5ConfigGui5-32bit is &lt;5.55.0-lp151.2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261485" version="1" comment="libKF5ConfigGui5-64bit is &lt;5.32.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261486" version="1" comment="libkde4 is &lt;4.14.33-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261487" version="1" comment="libkde4-32bit is &lt;4.14.38-lp151.9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261488" version="1" comment="libkde4-64bit is &lt;4.14.33-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261489" version="1" comment="libkde4-devel is &lt;4.14.33-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261490" version="1" comment="libkdecore4 is &lt;4.14.33-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261491" version="1" comment="libkdecore4-32bit is &lt;4.14.38-lp151.9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261492" version="1" comment="libkdecore4-64bit is &lt;4.14.33-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261493" version="1" comment="libkdecore4-devel is &lt;4.14.33-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261494" version="1" comment="libksuseinstall-devel is &lt;4.14.33-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261495" version="1" comment="libksuseinstall1 is &lt;4.14.33-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261496" version="1" comment="libksuseinstall1-32bit is &lt;4.14.38-lp151.9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261497" version="1" comment="libksuseinstall1-64bit is &lt;4.14.33-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261574" version="1" comment="pdns is &lt;4.1.11-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261575" version="1" comment="pdns-backend-geoip is &lt;4.1.8-lp151.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261576" version="1" comment="pdns-backend-godbc is &lt;4.1.11-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261577" version="1" comment="pdns-backend-ldap is &lt;4.1.11-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261578" version="1" comment="pdns-backend-lua is &lt;4.1.11-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261579" version="1" comment="pdns-backend-mydns is &lt;4.1.11-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261580" version="1" comment="pdns-backend-mysql is &lt;4.1.11-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261581" version="1" comment="pdns-backend-postgresql is &lt;4.1.11-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261582" version="1" comment="pdns-backend-remote is &lt;4.1.11-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261583" version="1" comment="pdns-backend-sqlite3 is &lt;4.1.11-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244526" version="1" comment="phpMyAdmin is &lt;4.8.5-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244522" version="1" comment="nginx is &lt;1.14.2-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244523" version="1" comment="vim-plugin-nginx is &lt;1.14.2-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262640" version="1" comment="MozillaThunderbird is &lt;60.8.0-88" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262641" version="1" comment="MozillaThunderbird-buildsymbols is &lt;60.8.0-88" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262642" version="1" comment="MozillaThunderbird-translations-common is &lt;60.8.0-88" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262643" version="1" comment="MozillaThunderbird-translations-other is &lt;60.8.0-88" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244524" version="1" comment="chromedriver is &lt;72.0.3626.96-88" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244525" version="1" comment="chromium is &lt;72.0.3626.96-88" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247529" version="1" comment="extra-cmake-modules is &lt;5.32.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247580" version="1" comment="kauth is &lt;5.32.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247581" version="1" comment="kauth-devel is &lt;5.32.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247532" version="1" comment="kauth-devel-32bit is &lt;5.45.0-lp150.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247582" version="1" comment="kauth-devel-64bit is &lt;5.32.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247583" version="1" comment="kcoreaddons is &lt;5.32.0-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247584" version="1" comment="kcoreaddons-devel is &lt;5.32.0-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247585" version="1" comment="kcoreaddons-devel-64bit is &lt;5.32.0-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247586" version="1" comment="kcoreaddons-lang is &lt;5.32.0-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247587" version="1" comment="libKF5Auth5 is &lt;5.32.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247539" version="1" comment="libKF5Auth5-32bit is &lt;5.45.0-lp150.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247588" version="1" comment="libKF5Auth5-64bit is &lt;5.32.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247589" version="1" comment="libKF5Auth5-lang is &lt;5.32.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247590" version="1" comment="libKF5CoreAddons5 is &lt;5.32.0-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247591" version="1" comment="libKF5CoreAddons5-64bit is &lt;5.32.0-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245092" version="1" comment="libpolkit-qt5-1-1 is &lt;0.112.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247544" version="1" comment="libpolkit-qt5-1-1-64bit is &lt;0.112.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245093" version="1" comment="libpolkit-qt5-1-devel is &lt;0.112.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247545" version="1" comment="libpolkit-qt5-1-devel-64bit is &lt;0.112.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245094" version="1" comment="polkit-qt5-1 is &lt;0.112.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245077" version="1" comment="python-Jinja2 is &lt;2.8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245078" version="1" comment="python-Jinja2-emacs is &lt;2.8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245079" version="1" comment="python-Jinja2-vim is &lt;2.8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245080" version="1" comment="MozillaThunderbird is &lt;60.5.1-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245081" version="1" comment="MozillaThunderbird-buildsymbols is &lt;60.5.1-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245082" version="1" comment="MozillaThunderbird-translations-common is &lt;60.5.1-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245083" version="1" comment="MozillaThunderbird-translations-other is &lt;60.5.1-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245632" version="1" comment="chromedriver is &lt;72.0.3626.121-92" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245633" version="1" comment="chromium is &lt;72.0.3626.121-92" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198012" version="1" comment="MozillaThunderbird is &lt;52.8-60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198013" version="1" comment="MozillaThunderbird-buildsymbols is &lt;52.8-60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198014" version="1" comment="MozillaThunderbird-devel is &lt;52.8-60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198015" version="1" comment="MozillaThunderbird-translations-common is &lt;52.8-60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198016" version="1" comment="MozillaThunderbird-translations-other is &lt;52.8-60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198017" version="1" comment="enigmail is &lt;2.0.5-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198018" version="1" comment="enigmail is &lt;2.0.6-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223546" version="1" comment="enigmail is &lt;2.0.7-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242986" version="1" comment="irssi is &lt;1.1.2-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242987" version="1" comment="irssi-devel is &lt;1.1.2-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229344" version="1" comment="redis is &lt;4.0.10-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229473" version="1" comment="go is &lt;1.9.7-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229474" version="1" comment="go-doc is &lt;1.9.7-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229475" version="1" comment="go-race is &lt;1.9.7-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229476" version="1" comment="go1.9 is &lt;1.9.7-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229477" version="1" comment="go1.9-doc is &lt;1.9.7-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229478" version="1" comment="go1.9-race is &lt;1.9.7-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229345" version="1" comment="phpMyAdmin is &lt;4.8.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229808" version="1" comment="git-annex is &lt;6.20180626-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229809" version="1" comment="git-annex-bash-completion is &lt;6.20180626-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229852" version="1" comment="MozillaThunderbird is &lt;52.9.0-65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229853" version="1" comment="MozillaThunderbird-buildsymbols is &lt;52.9.0-65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229854" version="1" comment="MozillaThunderbird-devel is &lt;52.9.0-65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229855" version="1" comment="MozillaThunderbird-translations-common is &lt;52.9.0-65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229856" version="1" comment="MozillaThunderbird-translations-other is &lt;52.9.0-65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230662" version="1" comment="chromedriver is &lt;67.0.3396.99-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230663" version="1" comment="chromium is &lt;67.0.3396.99-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230918" version="1" comment="chromedriver is &lt;68.0.3440.75-61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230919" version="1" comment="chromium is &lt;68.0.3440.75-61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251853" version="1" comment="znc is &lt;1.7.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251854" version="1" comment="znc-devel is &lt;1.7.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251855" version="1" comment="znc-lang is &lt;1.7.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251856" version="1" comment="znc-perl is &lt;1.7.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251857" version="1" comment="znc-python3 is &lt;1.7.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251858" version="1" comment="znc-tcl is &lt;1.7.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231576" version="1" comment="enigmail is &lt;2.0.8-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233703" version="1" comment="nextcloud is &lt;13.0.5-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233704" version="1" comment="phpMyAdmin is &lt;4.8.3-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241196" version="1" comment="nextcloud is &lt;13.0.8-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234172" version="1" comment="chromedriver is &lt;69.0.3497.81-65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234173" version="1" comment="chromium is &lt;69.0.3497.81-65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234174" version="1" comment="libre2-0 is &lt;20180901-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234175" version="1" comment="libre2-0-32bit is &lt;20180901-lp150.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234176" version="1" comment="re2 is &lt;20180901-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234177" version="1" comment="re2-devel is &lt;20180901-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252872" version="1" comment="okular is &lt;17.04.2-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252873" version="1" comment="okular-devel is &lt;17.04.2-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252874" version="1" comment="okular-lang is &lt;17.04.2-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234577" version="1" comment="chromedriver is &lt;69.0.3497.92-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234578" version="1" comment="chromium is &lt;69.0.3497.92-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234548" version="1" comment="ffmpeg-4 is &lt;4.0.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234549" version="1" comment="ffmpeg-4-libavcodec-devel is &lt;4.0.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234550" version="1" comment="ffmpeg-4-libavdevice-devel is &lt;4.0.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234551" version="1" comment="ffmpeg-4-libavfilter-devel is &lt;4.0.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234552" version="1" comment="ffmpeg-4-libavformat-devel is &lt;4.0.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234553" version="1" comment="ffmpeg-4-libavresample-devel is &lt;4.0.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234554" version="1" comment="ffmpeg-4-libavutil-devel is &lt;4.0.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234555" version="1" comment="ffmpeg-4-libpostproc-devel is &lt;4.0.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234556" version="1" comment="ffmpeg-4-libswresample-devel is &lt;4.0.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234557" version="1" comment="ffmpeg-4-libswscale-devel is &lt;4.0.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234558" version="1" comment="ffmpeg-4-private-devel is &lt;4.0.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234559" version="1" comment="libavcodec58 is &lt;4.0.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234560" version="1" comment="libavcodec58-32bit is &lt;4.0.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234561" version="1" comment="libavdevice58 is &lt;4.0.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234562" version="1" comment="libavdevice58-32bit is &lt;4.0.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234563" version="1" comment="libavfilter7 is &lt;4.0.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234564" version="1" comment="libavfilter7-32bit is &lt;4.0.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234565" version="1" comment="libavformat58 is &lt;4.0.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234566" version="1" comment="libavformat58-32bit is &lt;4.0.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234567" version="1" comment="libavresample4 is &lt;4.0.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234568" version="1" comment="libavresample4-32bit is &lt;4.0.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234569" version="1" comment="libavutil56 is &lt;4.0.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234570" version="1" comment="libavutil56-32bit is &lt;4.0.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234571" version="1" comment="libpostproc55 is &lt;4.0.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234572" version="1" comment="libpostproc55-32bit is &lt;4.0.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234573" version="1" comment="libswresample3 is &lt;4.0.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234574" version="1" comment="libswresample3-32bit is &lt;4.0.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234575" version="1" comment="libswscale5 is &lt;4.0.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234576" version="1" comment="libswscale5-32bit is &lt;4.0.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234741" version="1" comment="chromedriver is &lt;69.0.3497.100-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234742" version="1" comment="chromium is &lt;69.0.3497.100-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240655" version="1" comment="chromedriver is &lt;70.0.3538.110-77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240656" version="1" comment="chromium is &lt;70.0.3538.110-77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243408" version="1" comment="libsingularity1 is &lt;2.6.1-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243409" version="1" comment="singularity is &lt;2.6.1-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243410" version="1" comment="singularity-devel is &lt;2.6.1-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198029" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.65-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198030" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.65-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264067" version="1" comment="docker is &lt;1.8.3-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264068" version="1" comment="sles11sp4-docker-image is &lt;1.1.1-20160304104143" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264069" version="1" comment="sles12sp1-docker-image is &lt;1.0.4-20160308171022" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198031" version="1" comment="libopenjp2-7 is &lt;2.1.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198032" version="1" comment="openjpeg2 is &lt;2.1.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198033" version="1" comment="openjpeg2-devel is &lt;2.1.0-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198034" version="1" comment="ffmpeg is &lt;2.8.10-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198035" version="1" comment="libavcodec-devel is &lt;2.8.10-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198036" version="1" comment="libavcodec57 is &lt;3.2.4-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198037" version="1" comment="libavdevice-devel is &lt;2.8.10-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198038" version="1" comment="libavdevice57 is &lt;3.2.4-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198039" version="1" comment="libavfilter-devel is &lt;2.8.10-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198040" version="1" comment="libavfilter6 is &lt;3.2.4-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198041" version="1" comment="libavformat-devel is &lt;2.8.10-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198042" version="1" comment="libavformat57 is &lt;3.2.4-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198043" version="1" comment="libavresample-devel is &lt;2.8.10-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198044" version="1" comment="libavresample3 is &lt;3.2.4-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198045" version="1" comment="libavutil-devel is &lt;2.8.10-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198046" version="1" comment="libavutil55 is &lt;3.2.4-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198047" version="1" comment="libpostproc-devel is &lt;2.8.10-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198048" version="1" comment="libpostproc54 is &lt;3.2.4-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198049" version="1" comment="libswresample-devel is &lt;2.8.10-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198050" version="1" comment="libswresample2 is &lt;3.2.4-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198051" version="1" comment="libswscale-devel is &lt;2.8.10-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198052" version="1" comment="libswscale4 is &lt;3.2.4-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198053" version="1" comment="libopenjp2-7 is &lt;2.1.0-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198054" version="1" comment="openjpeg2 is &lt;2.1.0-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198055" version="1" comment="openjpeg2-devel is &lt;2.1.0-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234178" version="1" comment="chromedriver is &lt;69.0.3497.81-lp150.2.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234179" version="1" comment="chromium is &lt;69.0.3497.81-lp150.2.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198056" version="1" comment="kdelibs4 is &lt;4.14.18-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198057" version="1" comment="kdelibs4-apidocs is &lt;4.14.18-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198058" version="1" comment="kdelibs4-branding-upstream is &lt;4.14.18-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198059" version="1" comment="kdelibs4-core is &lt;4.14.18-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198060" version="1" comment="kdelibs4-doc is &lt;4.14.18-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198061" version="1" comment="kio is &lt;5.20.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198062" version="1" comment="kio-core is &lt;5.20.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198063" version="1" comment="kio-devel is &lt;5.20.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198064" version="1" comment="kio-lang is &lt;5.20.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198065" version="1" comment="libkde4 is &lt;4.14.18-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198066" version="1" comment="libkde4-devel is &lt;4.14.18-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198067" version="1" comment="libkdecore4 is &lt;4.14.18-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198068" version="1" comment="libkdecore4-devel is &lt;4.14.18-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198069" version="1" comment="libksuseinstall-devel is &lt;4.14.18-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198070" version="1" comment="libksuseinstall1 is &lt;4.14.18-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198071" version="1" comment="kauth is &lt;5.20.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198072" version="1" comment="kauth-devel is &lt;5.20.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198073" version="1" comment="kdelibs4 is &lt;4.14.18-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198074" version="1" comment="kdelibs4-apidocs is &lt;4.14.18-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198075" version="1" comment="kdelibs4-branding-upstream is &lt;4.14.18-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198076" version="1" comment="kdelibs4-core is &lt;4.14.18-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198077" version="1" comment="kdelibs4-doc is &lt;4.14.18-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198078" version="1" comment="libKF5Auth5 is &lt;5.20.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198079" version="1" comment="libKF5Auth5-lang is &lt;5.20.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198080" version="1" comment="libkde4 is &lt;4.14.18-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198081" version="1" comment="libkde4-devel is &lt;4.14.18-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198082" version="1" comment="libkdecore4 is &lt;4.14.18-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198083" version="1" comment="libkdecore4-devel is &lt;4.14.18-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198084" version="1" comment="libksuseinstall-devel is &lt;4.14.18-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198085" version="1" comment="libksuseinstall1 is &lt;4.14.18-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198086" version="1" comment="chromedriver is &lt;64.0.3282.140-138" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198087" version="1" comment="chromium is &lt;64.0.3282.140-138" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261498" version="1" comment="kconf_update5 is &lt;5.20.0-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261499" version="1" comment="kconfig is &lt;5.20.0-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261500" version="1" comment="kconfig-devel is &lt;5.20.0-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261501" version="1" comment="kdelibs4 is &lt;4.14.18-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261502" version="1" comment="kdelibs4-apidocs is &lt;4.14.18-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261503" version="1" comment="kdelibs4-branding-upstream is &lt;4.14.18-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261504" version="1" comment="kdelibs4-core is &lt;4.14.18-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261505" version="1" comment="kdelibs4-doc is &lt;4.14.18-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261506" version="1" comment="libKF5ConfigCore5 is &lt;5.20.0-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261507" version="1" comment="libKF5ConfigCore5-lang is &lt;5.20.0-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261508" version="1" comment="libKF5ConfigGui5 is &lt;5.20.0-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261509" version="1" comment="libkde4 is &lt;4.14.18-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261510" version="1" comment="libkde4-devel is &lt;4.14.18-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261511" version="1" comment="libkdecore4 is &lt;4.14.18-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261512" version="1" comment="libkdecore4-devel is &lt;4.14.18-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261513" version="1" comment="libksuseinstall-devel is &lt;4.14.18-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261514" version="1" comment="libksuseinstall1 is &lt;4.14.18-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261515" version="1" comment="kconf_update5 is &lt;5.26.0-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261516" version="1" comment="kconfig is &lt;5.26.0-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261517" version="1" comment="kconfig-devel is &lt;5.26.0-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261518" version="1" comment="kdelibs4 is &lt;4.14.25-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261519" version="1" comment="kdelibs4-apidocs is &lt;4.14.25-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261520" version="1" comment="kdelibs4-branding-upstream is &lt;4.14.25-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261521" version="1" comment="kdelibs4-core is &lt;4.14.25-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261522" version="1" comment="kdelibs4-doc is &lt;4.14.25-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261523" version="1" comment="libKF5ConfigCore5 is &lt;5.26.0-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261524" version="1" comment="libKF5ConfigCore5-lang is &lt;5.26.0-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261525" version="1" comment="libKF5ConfigGui5 is &lt;5.26.0-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261526" version="1" comment="libkde4 is &lt;4.14.25-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261527" version="1" comment="libkde4-devel is &lt;4.14.25-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261528" version="1" comment="libkdecore4 is &lt;4.14.25-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261529" version="1" comment="libkdecore4-devel is &lt;4.14.25-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261530" version="1" comment="libksuseinstall-devel is &lt;4.14.25-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261531" version="1" comment="libksuseinstall1 is &lt;4.14.25-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247552" version="1" comment="kauth is &lt;5.20.0-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247553" version="1" comment="kauth-devel is &lt;5.20.0-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247554" version="1" comment="kcoreaddons is &lt;5.20.0-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247555" version="1" comment="kcoreaddons-devel is &lt;5.20.0-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247556" version="1" comment="kcoreaddons-lang is &lt;5.20.0-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247557" version="1" comment="libKF5Auth5 is &lt;5.20.0-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247558" version="1" comment="libKF5Auth5-lang is &lt;5.20.0-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247559" version="1" comment="libKF5CoreAddons5 is &lt;5.20.0-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247560" version="1" comment="libpolkit-qt5-1-1 is &lt;0.112.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247561" version="1" comment="libpolkit-qt5-1-devel is &lt;0.112.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247562" version="1" comment="polkit-qt5-1 is &lt;0.112.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247563" version="1" comment="kauth is &lt;5.26.0-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247564" version="1" comment="kauth-devel is &lt;5.26.0-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247565" version="1" comment="kauth-devel-64bit is &lt;5.26.0-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247566" version="1" comment="kcoreaddons is &lt;5.26.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247567" version="1" comment="kcoreaddons-devel is &lt;5.26.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247568" version="1" comment="kcoreaddons-devel-64bit is &lt;5.26.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247569" version="1" comment="kcoreaddons-lang is &lt;5.26.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247570" version="1" comment="libKF5Auth5 is &lt;5.26.0-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247571" version="1" comment="libKF5Auth5-64bit is &lt;5.26.0-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247572" version="1" comment="libKF5Auth5-lang is &lt;5.26.0-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247573" version="1" comment="libKF5CoreAddons5 is &lt;5.26.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247574" version="1" comment="libKF5CoreAddons5-64bit is &lt;5.26.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247575" version="1" comment="libpolkit-qt5-1-1 is &lt;0.112.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247576" version="1" comment="libpolkit-qt5-1-1-64bit is &lt;0.112.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247577" version="1" comment="libpolkit-qt5-1-devel is &lt;0.112.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247578" version="1" comment="libpolkit-qt5-1-devel-64bit is &lt;0.112.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247579" version="1" comment="polkit-qt5-1 is &lt;0.112.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251859" version="1" comment="znc is &lt;1.7.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251860" version="1" comment="znc-devel is &lt;1.7.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251861" version="1" comment="znc-lang is &lt;1.7.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251862" version="1" comment="znc-perl is &lt;1.7.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251863" version="1" comment="znc-python3 is &lt;1.7.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251864" version="1" comment="znc-tcl is &lt;1.7.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198088" version="1" comment="LibVNCServer is &lt;0.9.1-154" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060800" version="1" comment="sles-release is ==11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059623" version="1" comment="MozillaFirefox is &lt;3.5.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198089" version="1" comment="MozillaFirefox-translations is &lt;3.5.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198090" version="1" comment="NetworkManager is &lt;0.7.0.r4359-15.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198091" version="1" comment="NetworkManager-glib is &lt;0.7.0.r4359-15.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198092" version="1" comment="NetworkManager-gnome is &lt;0.7.0.r1053-11.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198093" version="1" comment="OpenEXR is &lt;1.6.1-83.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198094" version="1" comment="OpenEXR-32bit is &lt;1.6.1-83.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198095" version="1" comment="OpenEXR-x86 is &lt;1.6.1-83.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198096" version="1" comment="PackageKit is &lt;0.3.14-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198097" version="1" comment="PackageKit-lang is &lt;0.3.14-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198098" version="1" comment="hal is &lt;0.5.12-23.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198099" version="1" comment="hal-32bit is &lt;0.5.12-23.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198100" version="1" comment="hal-doc is &lt;0.5.12-23.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198101" version="1" comment="hal-x86 is &lt;0.5.12-23.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198102" version="1" comment="libpackagekit-glib10 is &lt;0.3.14-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198103" version="1" comment="yast2-core is &lt;2.17.35-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198104" version="1" comment="PolicyKit is &lt;0.9-14.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198105" version="1" comment="PolicyKit-32bit is &lt;0.9-14.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198106" version="1" comment="PolicyKit-doc is &lt;0.9-14.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198107" version="1" comment="PolicyKit-x86 is &lt;0.9-14.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198108" version="1" comment="amavisd-new is &lt;2.6.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198109" version="1" comment="apache2 is &lt;2.2.10-2.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198110" version="1" comment="apache2-doc is &lt;2.2.10-2.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198111" version="1" comment="apache2-example-pages is &lt;2.2.10-2.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198112" version="1" comment="apache2-prefork is &lt;2.2.10-2.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198113" version="1" comment="apache2-utils is &lt;2.2.10-2.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198114" version="1" comment="apache2-worker is &lt;2.2.10-2.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198115" version="1" comment="apache2-mod_perl is &lt;2.0.4-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198116" version="1" comment="apache2-mod_php5 is &lt;5.2.6-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198117" version="1" comment="php5 is &lt;5.2.6-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198118" version="1" comment="php5-bcmath is &lt;5.2.6-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198119" version="1" comment="php5-bz2 is &lt;5.2.6-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198120" version="1" comment="php5-calendar is &lt;5.2.6-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198121" version="1" comment="php5-ctype is &lt;5.2.6-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198122" version="1" comment="php5-curl is &lt;5.2.6-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198123" version="1" comment="php5-dba is &lt;5.2.6-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198124" version="1" comment="php5-dbase is &lt;5.2.6-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198125" version="1" comment="php5-dom is &lt;5.2.6-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198126" version="1" comment="php5-exif is &lt;5.2.6-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198127" version="1" comment="php5-fastcgi is &lt;5.2.6-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198128" version="1" comment="php5-ftp is &lt;5.2.6-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198129" version="1" comment="php5-gd is &lt;5.2.6-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198130" version="1" comment="php5-gettext is &lt;5.2.6-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198131" version="1" comment="php5-gmp is &lt;5.2.6-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198132" version="1" comment="php5-hash is &lt;5.2.6-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198133" version="1" comment="php5-iconv is &lt;5.2.6-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198134" version="1" comment="php5-json is &lt;5.2.6-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198135" version="1" comment="php5-ldap is &lt;5.2.6-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198136" version="1" comment="php5-mbstring is &lt;5.2.6-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198137" version="1" comment="php5-mcrypt is &lt;5.2.6-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198138" version="1" comment="php5-mysql is &lt;5.2.6-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198139" version="1" comment="php5-odbc is &lt;5.2.6-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198140" version="1" comment="php5-openssl is &lt;5.2.6-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198141" version="1" comment="php5-pcntl is &lt;5.2.6-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198142" version="1" comment="php5-pdo is &lt;5.2.6-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198143" version="1" comment="php5-pear is &lt;5.2.6-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198144" version="1" comment="php5-pgsql is &lt;5.2.6-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198145" version="1" comment="php5-pspell is &lt;5.2.6-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198146" version="1" comment="php5-shmop is &lt;5.2.6-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198147" version="1" comment="php5-snmp is &lt;5.2.6-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198148" version="1" comment="php5-soap is &lt;5.2.6-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198149" version="1" comment="php5-suhosin is &lt;5.2.6-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198150" version="1" comment="php5-sysvmsg is &lt;5.2.6-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198151" version="1" comment="php5-sysvsem is &lt;5.2.6-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198152" version="1" comment="php5-sysvshm is &lt;5.2.6-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198153" version="1" comment="php5-tokenizer is &lt;5.2.6-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198154" version="1" comment="php5-wddx is &lt;5.2.6-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198155" version="1" comment="php5-xmlreader is &lt;5.2.6-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198156" version="1" comment="php5-xmlrpc is &lt;5.2.6-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198157" version="1" comment="php5-xmlwriter is &lt;5.2.6-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198158" version="1" comment="php5-xsl is &lt;5.2.6-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198159" version="1" comment="php5-zip is &lt;5.2.6-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198160" version="1" comment="php5-zlib is &lt;5.2.6-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198161" version="1" comment="avahi is &lt;0.6.23-11.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198162" version="1" comment="avahi-lang is &lt;0.6.23-11.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198163" version="1" comment="avahi-utils is &lt;0.6.23-11.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198164" version="1" comment="libavahi-client3 is &lt;0.6.23-11.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198165" version="1" comment="libavahi-client3-32bit is &lt;0.6.23-11.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198166" version="1" comment="libavahi-client3-x86 is &lt;0.6.23-11.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198167" version="1" comment="libavahi-common3 is &lt;0.6.23-11.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198168" version="1" comment="libavahi-common3-32bit is &lt;0.6.23-11.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198169" version="1" comment="libavahi-common3-x86 is &lt;0.6.23-11.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198170" version="1" comment="libavahi-core5 is &lt;0.6.23-11.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198171" version="1" comment="libdns_sd is &lt;0.6.23-11.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198172" version="1" comment="libdns_sd-32bit is &lt;0.6.23-11.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198173" version="1" comment="libdns_sd-x86 is &lt;0.6.23-11.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198174" version="1" comment="bind is &lt;9.5.0P2-20.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198175" version="1" comment="bind-chrootenv is &lt;9.5.0P2-20.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198176" version="1" comment="bind-doc is &lt;9.5.0P2-20.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198177" version="1" comment="bind-libs is &lt;9.5.0P2-20.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198178" version="1" comment="bind-libs-32bit is &lt;9.5.0P2-20.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198179" version="1" comment="bind-libs-x86 is &lt;9.5.0P2-20.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198180" version="1" comment="bind-utils is &lt;9.5.0P2-20.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198181" version="1" comment="boost-license is &lt;1.36.0-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198182" version="1" comment="libboost_program_options1_36_0 is &lt;1.36.0-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198183" version="1" comment="libboost_regex1_36_0 is &lt;1.36.0-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198184" version="1" comment="libboost_signals1_36_0 is &lt;1.36.0-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198185" version="1" comment="bzip2 is &lt;1.0.5-34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198186" version="1" comment="bzip2-doc is &lt;1.0.5-34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198187" version="1" comment="libbz2-1 is &lt;1.0.5-34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198188" version="1" comment="libbz2-1-32bit is &lt;1.0.5-34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198189" version="1" comment="libbz2-1-x86 is &lt;1.0.5-34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198190" version="1" comment="cifs-mount is &lt;3.4.3-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198191" version="1" comment="ldapsmb is &lt;1.34b-11.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198192" version="1" comment="libsmbclient0 is &lt;3.4.3-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198193" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198194" version="1" comment="libsmbclient0-x86 is &lt;3.4.3-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198195" version="1" comment="libtalloc1 is &lt;3.4.3-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198196" version="1" comment="libtalloc1-32bit is &lt;3.4.3-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198197" version="1" comment="libtalloc1-x86 is &lt;3.4.3-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198198" version="1" comment="libtdb1 is &lt;3.4.3-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198199" version="1" comment="libtdb1-32bit is &lt;3.4.3-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198200" version="1" comment="libtdb1-x86 is &lt;3.4.3-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198201" version="1" comment="libwbclient0 is &lt;3.4.3-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198202" version="1" comment="libwbclient0-32bit is &lt;3.4.3-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198203" version="1" comment="libwbclient0-x86 is &lt;3.4.3-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198204" version="1" comment="samba is &lt;3.4.3-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198205" version="1" comment="samba-32bit is &lt;3.4.3-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198206" version="1" comment="samba-client is &lt;3.4.3-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198207" version="1" comment="samba-client-32bit is &lt;3.4.3-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198208" version="1" comment="samba-client-x86 is &lt;3.4.3-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198209" version="1" comment="samba-krb-printing is &lt;3.4.3-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198210" version="1" comment="samba-winbind is &lt;3.4.3-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198211" version="1" comment="samba-winbind-32bit is &lt;3.4.3-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198212" version="1" comment="samba-winbind-x86 is &lt;3.4.3-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198213" version="1" comment="samba-x86 is &lt;3.4.3-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198214" version="1" comment="clamav is &lt;0.96-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198215" version="1" comment="coolkey is &lt;1.1.0-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198216" version="1" comment="cron is &lt;4.1-194.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198217" version="1" comment="cups is &lt;1.3.9-8.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198218" version="1" comment="cups-client is &lt;1.3.9-8.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198219" version="1" comment="cups-libs is &lt;1.3.9-8.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198220" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198221" version="1" comment="cups-libs-x86 is &lt;1.3.9-8.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198222" version="1" comment="curl is &lt;7.19.0-11.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198223" version="1" comment="libcurl4 is &lt;7.19.0-11.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198224" version="1" comment="libcurl4-32bit is &lt;7.19.0-11.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198225" version="1" comment="libcurl4-x86 is &lt;7.19.0-11.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198226" version="1" comment="cyrus-imapd is &lt;2.3.11-60.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198227" version="1" comment="perl-Cyrus-IMAP is &lt;2.3.11-60.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198228" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.3.11-60.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198229" version="1" comment="dbus-1 is &lt;1.2.10-3.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198230" version="1" comment="dbus-1-32bit is &lt;1.2.10-3.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198231" version="1" comment="dbus-1-x11 is &lt;1.2.10-3.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198232" version="1" comment="dbus-1-x86 is &lt;1.2.10-3.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198233" version="1" comment="dhcp is &lt;3.1.3.ESV-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198234" version="1" comment="dhcp-client is &lt;3.1.3.ESV-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198235" version="1" comment="dhcp-relay is &lt;3.1.3.ESV-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198236" version="1" comment="dhcp-server is &lt;3.1.3.ESV-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198237" version="1" comment="e2fsprogs is &lt;1.41.9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198238" version="1" comment="libcom_err2 is &lt;1.41.9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198239" version="1" comment="libcom_err2-32bit is &lt;1.41.9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198240" version="1" comment="libcom_err2-x86 is &lt;1.41.9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198241" version="1" comment="libext2fs2 is &lt;1.41.9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198242" version="1" comment="emacs is &lt;22.3-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198243" version="1" comment="emacs-el is &lt;22.3-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198244" version="1" comment="emacs-info is &lt;22.3-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198245" version="1" comment="emacs-nox is &lt;22.3-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198246" version="1" comment="emacs-x11 is &lt;22.3-4.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198247" version="1" comment="enscript is &lt;1.6.4-152.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198248" version="1" comment="evince is &lt;2.28.2-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198249" version="1" comment="evince-doc is &lt;2.28.2-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198250" version="1" comment="evince-lang is &lt;2.28.2-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198251" version="1" comment="evolution-data-server is &lt;2.28.2-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198252" version="1" comment="evolution-data-server-32bit is &lt;2.28.2-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198253" version="1" comment="evolution-data-server-lang is &lt;2.28.2-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198254" version="1" comment="evolution-data-server-x86 is &lt;2.28.2-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198255" version="1" comment="expat is &lt;2.0.1-88.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198256" version="1" comment="libexpat1 is &lt;2.0.1-88.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198257" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198258" version="1" comment="libexpat1-x86 is &lt;2.0.1-88.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198259" version="1" comment="fetchmail is &lt;6.3.8.90-13.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198260" version="1" comment="fetchmailconf is &lt;6.3.8.90-13.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198261" version="1" comment="file is &lt;4.24-43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198262" version="1" comment="file-32bit is &lt;4.24-43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198263" version="1" comment="file-x86 is &lt;4.24-43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198264" version="1" comment="findutils is &lt;4.4.0-38.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198265" version="1" comment="findutils-locate is &lt;4.4.0-38.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198266" version="1" comment="freeradius-server is &lt;2.1.1-7.7.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198267" version="1" comment="freeradius-server-dialupadmin is &lt;2.1.1-7.7.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198268" version="1" comment="freeradius-server-doc is &lt;2.1.1-7.7.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198269" version="1" comment="freeradius-server-libs is &lt;2.1.1-7.7.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198270" version="1" comment="freeradius-server-utils is &lt;2.1.1-7.7.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198271" version="1" comment="freetype2 is &lt;2.3.7-25.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198272" version="1" comment="freetype2-32bit is &lt;2.3.7-25.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198273" version="1" comment="freetype2-x86 is &lt;2.3.7-25.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198274" version="1" comment="ft2demos is &lt;2.3.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198275" version="1" comment="fuse is &lt;2.7.2-61.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198276" version="1" comment="libfuse2 is &lt;2.7.2-61.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198277" version="1" comment="fvwm2 is &lt;2.5.26-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198278" version="1" comment="g3utils is &lt;1.1.36-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198279" version="1" comment="mgetty is &lt;1.1.36-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198280" version="1" comment="gd is &lt;2.0.36.RC1-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198281" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198282" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198283" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198284" version="1" comment="ghostscript-library is &lt;8.62-32.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198285" version="1" comment="ghostscript-omni is &lt;8.62-32.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198286" version="1" comment="ghostscript-x11 is &lt;8.62-32.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198287" version="1" comment="libgimpprint is &lt;4.2.7-32.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198288" version="1" comment="glib2 is &lt;2.22.5-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198289" version="1" comment="glib2-doc is &lt;2.22.5-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198290" version="1" comment="glib2-lang is &lt;2.22.5-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198291" version="1" comment="libgio-2_0-0 is &lt;2.22.5-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198292" version="1" comment="libgio-2_0-0-32bit is &lt;2.22.5-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198293" version="1" comment="libgio-2_0-0-x86 is &lt;2.22.5-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198294" version="1" comment="libglib-2_0-0 is &lt;2.22.5-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198295" version="1" comment="libglib-2_0-0-32bit is &lt;2.22.5-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198296" version="1" comment="libglib-2_0-0-x86 is &lt;2.22.5-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198297" version="1" comment="libgmodule-2_0-0 is &lt;2.22.5-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198298" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.22.5-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198299" version="1" comment="libgmodule-2_0-0-x86 is &lt;2.22.5-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198300" version="1" comment="libgobject-2_0-0 is &lt;2.22.5-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198301" version="1" comment="libgobject-2_0-0-32bit is &lt;2.22.5-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198302" version="1" comment="libgobject-2_0-0-x86 is &lt;2.22.5-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198303" version="1" comment="libgthread-2_0-0 is &lt;2.22.5-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198304" version="1" comment="libgthread-2_0-0-32bit is &lt;2.22.5-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198305" version="1" comment="libgthread-2_0-0-x86 is &lt;2.22.5-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198306" version="1" comment="gmime is &lt;2.2.23-1.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198307" version="1" comment="gmime-2_4 is &lt;2.4.8-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198308" version="1" comment="gmime-doc is &lt;2.2.23-1.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198309" version="1" comment="libgmime-2_0-3 is &lt;2.2.23-1.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198310" version="1" comment="libgmime-2_4-2 is &lt;2.4.8-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198311" version="1" comment="gnome-screensaver is &lt;2.28.3-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198312" version="1" comment="gnome-screensaver-lang is &lt;2.28.3-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198313" version="1" comment="gnutls is &lt;2.4.1-24.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198314" version="1" comment="libgnutls26 is &lt;2.4.1-24.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198315" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198316" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198317" version="1" comment="gpg2 is &lt;2.0.9-25.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198318" version="1" comment="gpg2-lang is &lt;2.0.9-25.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198319" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.25-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198320" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.25-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198321" version="1" comment="gstreamer-0_10-plugins-base-doc is &lt;0.10.25-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198322" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.25-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198323" version="1" comment="gstreamer-0_10-plugins-base-x86 is &lt;0.10.25-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198324" version="1" comment="libgstapp-0_10-0 is &lt;0.10.25-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198325" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.25-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198326" version="1" comment="libgstapp-0_10-0-x86 is &lt;0.10.25-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198327" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.25-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198328" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.25-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198329" version="1" comment="libgstinterfaces-0_10-0-x86 is &lt;0.10.25-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198330" version="1" comment="gstreamer-0_10-plugins-good is &lt;0.10.17-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198331" version="1" comment="gstreamer-0_10-plugins-good-doc is &lt;0.10.17-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198332" version="1" comment="gstreamer-0_10-plugins-good-lang is &lt;0.10.17-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198333" version="1" comment="gtk2 is &lt;2.18.9-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198334" version="1" comment="gtk2-32bit is &lt;2.18.9-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198335" version="1" comment="gtk2-doc is &lt;2.18.9-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198336" version="1" comment="gtk2-lang is &lt;2.18.9-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198337" version="1" comment="gtk2-x86 is &lt;2.18.9-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198338" version="1" comment="gvim is &lt;7.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198339" version="1" comment="vim is &lt;7.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198340" version="1" comment="vim-base is &lt;7.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198341" version="1" comment="vim-data is &lt;7.2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198342" version="1" comment="gzip is &lt;1.3.12-69.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198343" version="1" comment="hplip is &lt;3.9.8-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198344" version="1" comment="hplip-hpijs is &lt;3.9.8-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198345" version="1" comment="ipsec-tools is &lt;0.7.3-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198346" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.3-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198347" version="1" comment="java-1_4_2-ibm-jdbc is &lt;1.4.2_sr13.3-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198348" version="1" comment="java-1_4_2-ibm-plugin is &lt;1.4.2_sr13.3-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198349" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr7.0-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198350" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr7.0-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198351" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr7.0-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198352" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr7.0-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198353" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr7.0-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198354" version="1" comment="kde4-kgreeter-plugins is &lt;4.3.5-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198355" version="1" comment="kdebase4-wallpapers is &lt;4.3.5-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198356" version="1" comment="kdebase4-workspace is &lt;4.3.5-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198357" version="1" comment="kdebase4-workspace-ksysguardd is &lt;4.3.5-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198358" version="1" comment="kdm is &lt;4.3.5-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198359" version="1" comment="kwin is &lt;4.3.5-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198360" version="1" comment="kdebase3-runtime is &lt;3.5.10-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198361" version="1" comment="kdebase3-runtime-32bit is &lt;3.5.10-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198362" version="1" comment="kdebase3-runtime-x86 is &lt;3.5.10-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198363" version="1" comment="kdelibs3 is &lt;3.5.10-23.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198364" version="1" comment="kdelibs3-32bit is &lt;3.5.10-23.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198365" version="1" comment="kdelibs3-default-style is &lt;3.5.10-23.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198366" version="1" comment="kdelibs3-default-style-32bit is &lt;3.5.10-23.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198367" version="1" comment="kdelibs3-default-style-x86 is &lt;3.5.10-23.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198368" version="1" comment="kdelibs3-x86 is &lt;3.5.10-23.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198369" version="1" comment="kdelibs4 is &lt;4.3.5-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198370" version="1" comment="kdelibs4-core is &lt;4.3.5-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198371" version="1" comment="kdelibs4-doc is &lt;4.3.5-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198372" version="1" comment="libkde4 is &lt;4.3.5-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198373" version="1" comment="libkde4-32bit is &lt;4.3.5-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198374" version="1" comment="libkde4-x86 is &lt;4.3.5-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198375" version="1" comment="libkdecore4 is &lt;4.3.5-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198376" version="1" comment="libkdecore4-32bit is &lt;4.3.5-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198377" version="1" comment="libkdecore4-x86 is &lt;4.3.5-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198378" version="1" comment="kernel-default is &lt;2.6.32.12-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198379" version="1" comment="kernel-default-base is &lt;2.6.32.12-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198380" version="1" comment="kernel-default-devel is &lt;2.6.32.12-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198381" version="1" comment="kernel-default-man is &lt;2.6.32.12-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198382" version="1" comment="kernel-pae is &lt;2.6.32.12-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198383" version="1" comment="kernel-pae-base is &lt;2.6.32.12-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198384" version="1" comment="kernel-pae-devel is &lt;2.6.32.12-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198385" version="1" comment="kernel-ppc64 is &lt;2.6.32.12-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198386" version="1" comment="kernel-ppc64-base is &lt;2.6.32.12-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198387" version="1" comment="kernel-ppc64-devel is &lt;2.6.32.12-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198388" version="1" comment="kernel-source is &lt;2.6.32.12-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198389" version="1" comment="kernel-syms is &lt;2.6.32.12-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198390" version="1" comment="kernel-trace is &lt;2.6.32.12-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198391" version="1" comment="kernel-trace-base is &lt;2.6.32.12-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198392" version="1" comment="kernel-trace-devel is &lt;2.6.32.12-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198393" version="1" comment="kernel-xen is &lt;2.6.32.12-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198394" version="1" comment="kernel-xen-base is &lt;2.6.32.12-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198395" version="1" comment="kernel-xen-devel is &lt;2.6.32.12-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198396" version="1" comment="krb5 is &lt;1.6.3-133.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198397" version="1" comment="krb5-32bit is &lt;1.6.3-133.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198398" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198399" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198400" version="1" comment="krb5-client is &lt;1.6.3-133.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198401" version="1" comment="krb5-server is &lt;1.6.3-133.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198402" version="1" comment="krb5-x86 is &lt;1.6.3-133.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198403" version="1" comment="krb5-doc is &lt;1.6.3-133" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198404" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198405" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198406" version="1" comment="kvm is &lt;0.12.3-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198407" version="1" comment="lcms is &lt;1.17-77.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198408" version="1" comment="liblcms1 is &lt;1.17-77.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198409" version="1" comment="liblcms1-32bit is &lt;1.17-77.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198410" version="1" comment="liblcms1-x86 is &lt;1.17-77.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198411" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198412" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198413" version="1" comment="libQtWebKit4 is &lt;4.6.2-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198414" version="1" comment="libQtWebKit4-32bit is &lt;4.6.2-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198415" version="1" comment="libQtWebKit4-x86 is &lt;4.6.2-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198416" version="1" comment="libqt4 is &lt;4.6.2-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198417" version="1" comment="libqt4-32bit is &lt;4.6.2-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198418" version="1" comment="libqt4-qt3support is &lt;4.6.2-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198419" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.2-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198420" version="1" comment="libqt4-qt3support-x86 is &lt;4.6.2-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198421" version="1" comment="libqt4-sql is &lt;4.6.2-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198422" version="1" comment="libqt4-sql-32bit is &lt;4.6.2-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198423" version="1" comment="libqt4-sql-mysql is &lt;4.6.2-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198424" version="1" comment="libqt4-sql-sqlite is &lt;4.6.2-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198425" version="1" comment="libqt4-sql-x86 is &lt;4.6.2-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198426" version="1" comment="libqt4-x11 is &lt;4.6.2-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198427" version="1" comment="libqt4-x11-32bit is &lt;4.6.2-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198428" version="1" comment="libqt4-x11-x86 is &lt;4.6.2-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198429" version="1" comment="libqt4-x86 is &lt;4.6.2-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198430" version="1" comment="qt4-x11-tools is &lt;4.6.2-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198431" version="1" comment="libadns1 is &lt;1.4-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198432" version="1" comment="libapr-util1 is &lt;1.3.4-12.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198433" version="1" comment="libapr-util1-32bit is &lt;1.3.4-12.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198434" version="1" comment="libapr1 is &lt;1.3.3-11.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198435" version="1" comment="libapr1-32bit is &lt;1.3.3-11.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198436" version="1" comment="libarchive2 is &lt;2.5.5-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198437" version="1" comment="libdrm is &lt;2.4.17-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198438" version="1" comment="libdrm-32bit is &lt;2.4.17-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198439" version="1" comment="libdrm-x86 is &lt;2.4.17-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198440" version="1" comment="libexif is &lt;0.6.17-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198441" version="1" comment="libexif-32bit is &lt;0.6.17-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198442" version="1" comment="libexif-x86 is &lt;0.6.17-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198443" version="1" comment="libexiv2-4 is &lt;0.17.1-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198444" version="1" comment="libgtop is &lt;2.28.0-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198445" version="1" comment="libgtop-2_0-7 is &lt;2.28.0-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198446" version="1" comment="libgtop-doc is &lt;2.28.0-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198447" version="1" comment="libgtop-lang is &lt;2.28.0-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198448" version="1" comment="libicu is &lt;4.0-7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198449" version="1" comment="libicu-32bit is &lt;4.0-7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198450" version="1" comment="libicu-doc is &lt;4.0-7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198451" version="1" comment="libicu-x86 is &lt;4.0-7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198452" version="1" comment="libltdl7 is &lt;2.2.6-2.131" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198453" version="1" comment="libltdl7-32bit is &lt;2.2.6-2.131" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198454" version="1" comment="libltdl7-x86 is &lt;2.2.6-2.131" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198455" version="1" comment="libtool is &lt;2.2.6-2.131" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198456" version="1" comment="libtool-32bit is &lt;2.2.6-2.131" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198457" version="1" comment="libtool-x86 is &lt;2.2.6-2.131" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198458" version="1" comment="libmusicbrainz4 is &lt;2.1.5-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198459" version="1" comment="libmysqlclient15 is &lt;5.0.67-13.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198460" version="1" comment="libmysqlclient15-32bit is &lt;5.0.67-13.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198461" version="1" comment="libmysqlclient15-x86 is &lt;5.0.67-13.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198462" version="1" comment="libmysqlclient_r15 is &lt;5.0.67-13.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198463" version="1" comment="mysql is &lt;5.0.67-13.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198464" version="1" comment="mysql-Max is &lt;5.0.67-13.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198465" version="1" comment="mysql-client is &lt;5.0.67-13.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198466" version="1" comment="libneon27 is &lt;0.28.3-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198467" version="1" comment="libneon27-32bit is &lt;0.28.3-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198468" version="1" comment="libneon27-x86 is &lt;0.28.3-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198469" version="1" comment="neon is &lt;0.28.3-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198470" version="1" comment="libnetpbm10 is &lt;10.26.44-101.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198471" version="1" comment="libnetpbm10-32bit is &lt;10.26.44-101.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198472" version="1" comment="libnetpbm10-x86 is &lt;10.26.44-101.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198473" version="1" comment="netpbm is &lt;10.26.44-101.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198474" version="1" comment="libopensc2 is &lt;0.11.6-5.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198475" version="1" comment="libopensc2-32bit is &lt;0.11.6-5.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198476" version="1" comment="libopensc2-x86 is &lt;0.11.6-5.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198477" version="1" comment="opensc is &lt;0.11.6-5.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198478" version="1" comment="opensc-32bit is &lt;0.11.6-5.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198479" version="1" comment="opensc-x86 is &lt;0.11.6-5.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198480" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-30.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198481" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8h-30.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198482" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8h-30.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198483" version="1" comment="openssl is &lt;0.9.8h-30.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198484" version="1" comment="openssl-doc is &lt;0.9.8h-30.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198485" version="1" comment="libpng12-0 is &lt;1.2.31-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198486" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198487" version="1" comment="libpng12-0-x86 is &lt;1.2.31-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198488" version="1" comment="libpoppler-glib4 is &lt;0.12.3-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198489" version="1" comment="libpoppler-qt4-3 is &lt;0.12.3-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198490" version="1" comment="libpoppler5 is &lt;0.12.3-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198491" version="1" comment="poppler-tools is &lt;0.12.3-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198492" version="1" comment="libpulse-browse0 is &lt;0.9.21-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198493" version="1" comment="libpulse-mainloop-glib0 is &lt;0.9.21-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198494" version="1" comment="libpulse0 is &lt;0.9.21-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198495" version="1" comment="libpulse0-32bit is &lt;0.9.21-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198496" version="1" comment="libpulse0-x86 is &lt;0.9.21-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198497" version="1" comment="pulseaudio is &lt;0.9.21-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198498" version="1" comment="pulseaudio-esound-compat is &lt;0.9.21-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198499" version="1" comment="pulseaudio-gdm-hooks is &lt;0.9.21-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198500" version="1" comment="pulseaudio-lang is &lt;0.9.21-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198501" version="1" comment="pulseaudio-module-x11 is &lt;0.9.21-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198502" version="1" comment="pulseaudio-module-zeroconf is &lt;0.9.21-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198503" version="1" comment="pulseaudio-utils is &lt;0.9.21-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198504" version="1" comment="libpython2_6-1_0 is &lt;2.6.0-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198505" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.0-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198506" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.0-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198507" version="1" comment="python-base is &lt;2.6.0-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198508" version="1" comment="python-base-32bit is &lt;2.6.0-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198509" version="1" comment="python-base-x86 is &lt;2.6.0-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198510" version="1" comment="python-xml is &lt;2.6.0-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198511" version="1" comment="pyxml is &lt;0.8.4-194.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198512" version="1" comment="librpcsecgss is &lt;0.18-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198513" version="1" comment="libtirpc1 is &lt;0.2.1-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198514" version="1" comment="libsamplerate is &lt;0.1.4-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198515" version="1" comment="libsamplerate-32bit is &lt;0.1.4-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198516" version="1" comment="libsamplerate-x86 is &lt;0.1.4-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198517" version="1" comment="libsndfile is &lt;1.0.20-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198518" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198519" version="1" comment="libsndfile-x86 is &lt;1.0.20-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198520" version="1" comment="libsnmp15 is &lt;5.4.2.1-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198521" version="1" comment="libsnmp15-32bit is &lt;5.4.2.1-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198522" version="1" comment="libsnmp15-x86 is &lt;5.4.2.1-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198523" version="1" comment="net-snmp is &lt;5.4.2.1-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198524" version="1" comment="perl-SNMP is &lt;5.4.2.1-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198525" version="1" comment="snmp-mibs is &lt;5.4.2.1-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198526" version="1" comment="libsoup-2_4-1 is &lt;2.28.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198527" version="1" comment="libsoup-2_4-1-32bit is &lt;2.28.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198528" version="1" comment="libsoup-2_4-1-x86 is &lt;2.28.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198529" version="1" comment="libtiff3 is &lt;3.8.2-141.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198530" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198531" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198532" version="1" comment="tiff is &lt;3.8.2-141.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198533" version="1" comment="libvirt is &lt;0.7.6-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198534" version="1" comment="libvirt-doc is &lt;0.7.6-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198535" version="1" comment="libvirt-python is &lt;0.7.6-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198536" version="1" comment="libvorbis is &lt;1.2.0-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198537" version="1" comment="libvorbis-32bit is &lt;1.2.0-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198538" version="1" comment="libvorbis-doc is &lt;1.2.0-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198539" version="1" comment="libvorbis-x86 is &lt;1.2.0-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198540" version="1" comment="libxml2 is &lt;2.7.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198541" version="1" comment="libxml2-32bit is &lt;2.7.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198542" version="1" comment="libxml2-doc is &lt;2.7.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198543" version="1" comment="libxml2-x86 is &lt;2.7.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198544" version="1" comment="libxslt is &lt;1.1.24-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198545" version="1" comment="libxslt-32bit is &lt;1.1.24-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198546" version="1" comment="libxslt-x86 is &lt;1.1.24-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198547" version="1" comment="log4net is &lt;1.2.10-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198548" version="1" comment="mailman is &lt;2.1.12-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198549" version="1" comment="man is &lt;2.5.2-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198550" version="1" comment="mono-core is &lt;2.0.1-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198551" version="1" comment="mono-data is &lt;2.0.1-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198552" version="1" comment="mono-data-postgresql is &lt;2.0.1-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198553" version="1" comment="mono-data-sqlite is &lt;2.0.1-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198554" version="1" comment="mono-locale-extras is &lt;2.0.1-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198555" version="1" comment="mono-nunit is &lt;2.0.1-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198556" version="1" comment="mono-web is &lt;2.0.1-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198557" version="1" comment="mono-winforms is &lt;2.0.1-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059618" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.19-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059609" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.19-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059614" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.19-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059617" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.19-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198558" version="1" comment="mozilla-xulrunner190-x86 is &lt;1.9.0.19-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198559" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.9-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198560" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.9-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198561" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.9-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198562" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.9-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198563" version="1" comment="mozilla-xulrunner191-x86 is &lt;1.9.1.9-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198564" version="1" comment="mutt is &lt;1.5.17-42.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198565" version="1" comment="nagios is &lt;3.0.6-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198566" version="1" comment="nagios-www is &lt;3.0.6-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198567" version="1" comment="nagios-plugins is &lt;1.4.13-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198568" version="1" comment="nagios-plugins-extras is &lt;1.4.13-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198569" version="1" comment="ntp is &lt;4.2.4p8-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198570" version="1" comment="ntp-doc is &lt;4.2.4p8-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198571" version="1" comment="openssh is &lt;5.1p1-41.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198572" version="1" comment="openssh-askpass is &lt;5.1p1-41.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198573" version="1" comment="openswan is &lt;2.6.16-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198574" version="1" comment="openswan-doc is &lt;2.6.16-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198575" version="1" comment="openvpn is &lt;2.0.9-143" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198576" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198577" version="1" comment="pam is &lt;1.0.4-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198578" version="1" comment="pam-32bit is &lt;1.0.4-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198579" version="1" comment="pam-doc is &lt;1.0.4-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198580" version="1" comment="pam-x86 is &lt;1.0.4-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198581" version="1" comment="pam_krb5 is &lt;2.3.1-47.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198582" version="1" comment="pam_krb5-32bit is &lt;2.3.1-47.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198583" version="1" comment="pam_krb5-x86 is &lt;2.3.1-47.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198584" version="1" comment="pam_ldap is &lt;184-147" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198585" version="1" comment="pam_ldap-32bit is &lt;184-147" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198586" version="1" comment="pam_ldap-x86 is &lt;184-147" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198587" version="1" comment="pam_mount is &lt;0.47-13.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198588" version="1" comment="pam_mount-32bit is &lt;0.47-13.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198589" version="1" comment="pam_mount-x86 is &lt;0.47-13.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198590" version="1" comment="perl is &lt;5.10.0-64.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198591" version="1" comment="perl-32bit is &lt;5.10.0-64.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198592" version="1" comment="perl-base is &lt;5.10.0-64.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198593" version="1" comment="perl-doc is &lt;5.10.0-64.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198594" version="1" comment="perl-x86 is &lt;5.10.0-64.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198595" version="1" comment="perl-HTML-Parser is &lt;3.56-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198596" version="1" comment="perl-Tk is &lt;804.028-50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198597" version="1" comment="perl-spamassassin is &lt;3.2.5-26.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198598" version="1" comment="spamassassin is &lt;3.2.5-26.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057332" version="1" comment="postgresql is &lt;8.3.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057322" version="1" comment="postgresql-contrib is &lt;8.3.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057324" version="1" comment="postgresql-docs is &lt;8.3.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057327" version="1" comment="postgresql-libs is &lt;8.3.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057325" version="1" comment="postgresql-libs-32bit is &lt;8.3.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198599" version="1" comment="postgresql-libs-x86 is &lt;8.3.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057331" version="1" comment="postgresql-server is &lt;8.3.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198600" version="1" comment="puppet is &lt;0.24.8-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198601" version="1" comment="puppet-server is &lt;0.24.8-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198602" version="1" comment="python is &lt;2.6.0-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198603" version="1" comment="python-32bit is &lt;2.6.0-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198604" version="1" comment="python-curses is &lt;2.6.0-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198605" version="1" comment="python-demo is &lt;2.6.0-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198606" version="1" comment="python-gdbm is &lt;2.6.0-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198607" version="1" comment="python-idle is &lt;2.6.0-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198608" version="1" comment="python-tk is &lt;2.6.0-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198609" version="1" comment="python-x86 is &lt;2.6.0-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198610" version="1" comment="qt3 is &lt;3.3.8b-88" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198611" version="1" comment="qt3-32bit is &lt;3.3.8b-88" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198612" version="1" comment="qt3-x86 is &lt;3.3.8b-88" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198613" version="1" comment="quagga is &lt;0.99.15-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198614" version="1" comment="rsync is &lt;3.0.4-2.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198615" version="1" comment="ruby is &lt;1.8.7.p72-5.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198616" version="1" comment="ruby-doc-html is &lt;1.8.7.p72-5.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198617" version="1" comment="ruby-tk is &lt;1.8.7.p72-5.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198618" version="1" comment="squid is &lt;2.7.STABLE5-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198619" version="1" comment="star is &lt;1.5final-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198620" version="1" comment="sudo is &lt;1.6.9p17-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198621" version="1" comment="syslog-ng is &lt;2.0.9-27.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198622" version="1" comment="sysstat is &lt;8.1.5-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198623" version="1" comment="sysstat-isag is &lt;8.1.5-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198624" version="1" comment="systemtap is &lt;1.0-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198625" version="1" comment="systemtap-client is &lt;1.0-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198626" version="1" comment="systemtap-server is &lt;1.0-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198627" version="1" comment="tar is &lt;1.20-23.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198628" version="1" comment="unrar is &lt;3.80.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198629" version="1" comment="unzip is &lt;5.52-142.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198630" version="1" comment="w3m is &lt;0.5.2-132.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198631" version="1" comment="wget is &lt;1.11.4-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198632" version="1" comment="wireshark is &lt;1.0.5-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198633" version="1" comment="xdg-utils is &lt;1.0.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198634" version="1" comment="xen is &lt;4.0.0_21091_04-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198635" version="1" comment="xen-doc-html is &lt;4.0.0_21091_04-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198636" version="1" comment="xen-doc-pdf is &lt;4.0.0_21091_04-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198637" version="1" comment="xen-kmp-default is &lt;4.0.0_21091_04_2.6.32.12_0.7-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198638" version="1" comment="xen-kmp-pae is &lt;4.0.0_21091_04_2.6.32.12_0.7-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198639" version="1" comment="xen-libs is &lt;4.0.0_21091_04-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198640" version="1" comment="xen-tools is &lt;4.0.0_21091_04-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198641" version="1" comment="xen-tools-domU is &lt;4.0.0_21091_04-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198642" version="1" comment="xorg-x11 is &lt;7.4-9.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198643" version="1" comment="xorg-x11-xauth is &lt;7.4-9.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198644" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198645" version="1" comment="xorg-x11-server is &lt;7.4-27.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198646" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198647" version="1" comment="xpdf-tools is &lt;3.02-138.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198648" version="1" comment="xterm is &lt;238-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251871" version="1" comment="zoo is &lt;2.10-911" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073673" version="1" comment="sles-release is ==11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198650" version="1" comment="MozillaFirefox is &lt;10.0-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198651" version="1" comment="MozillaFirefox-translations is &lt;10.0-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198652" version="1" comment="NetworkManager is &lt;0.7.1_git20090811-3.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198653" version="1" comment="NetworkManager-glib is &lt;0.7.1_git20090811-3.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198654" version="1" comment="NetworkManager-gnome is &lt;0.7.1-5.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198655" version="1" comment="PackageKit is &lt;0.3.14-2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198656" version="1" comment="PackageKit-lang is &lt;0.3.14-2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198657" version="1" comment="hal is &lt;0.5.12-23.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198658" version="1" comment="hal-32bit is &lt;0.5.12-23.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198659" version="1" comment="hal-doc is &lt;0.5.12-23.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198660" version="1" comment="hal-x86 is &lt;0.5.12-23.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198661" version="1" comment="libpackagekit-glib10 is &lt;0.3.14-2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198662" version="1" comment="PolicyKit is &lt;0.9-14.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198663" version="1" comment="PolicyKit-32bit is &lt;0.9-14.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198664" version="1" comment="PolicyKit-doc is &lt;0.9-14.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198665" version="1" comment="PolicyKit-x86 is &lt;0.9-14.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198666" version="1" comment="aaa_base is &lt;11-6.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198667" version="1" comment="acpid is &lt;1.0.6-91.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198668" version="1" comment="amavisd-new is &lt;2.7.0-18.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198669" version="1" comment="apache2 is &lt;2.2.12-1.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198670" version="1" comment="apache2-doc is &lt;2.2.12-1.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198671" version="1" comment="apache2-example-pages is &lt;2.2.12-1.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198672" version="1" comment="apache2-prefork is &lt;2.2.12-1.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198673" version="1" comment="apache2-utils is &lt;2.2.12-1.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198674" version="1" comment="apache2-worker is &lt;2.2.12-1.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198675" version="1" comment="apache2-mod_jk is &lt;1.2.26-1.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198676" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198677" version="1" comment="php5 is &lt;5.2.14-0.7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198678" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198679" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198680" version="1" comment="php5-calendar is &lt;5.2.14-0.7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198681" version="1" comment="php5-ctype is &lt;5.2.14-0.7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198682" version="1" comment="php5-curl is &lt;5.2.14-0.7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198683" version="1" comment="php5-dba is &lt;5.2.14-0.7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198684" version="1" comment="php5-dbase is &lt;5.2.14-0.7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198685" version="1" comment="php5-dom is &lt;5.2.14-0.7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198686" version="1" comment="php5-exif is &lt;5.2.14-0.7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198687" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198688" version="1" comment="php5-ftp is &lt;5.2.14-0.7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198689" version="1" comment="php5-gd is &lt;5.2.14-0.7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198690" version="1" comment="php5-gettext is &lt;5.2.14-0.7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198691" version="1" comment="php5-gmp is &lt;5.2.14-0.7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198692" version="1" comment="php5-hash is &lt;5.2.14-0.7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198693" version="1" comment="php5-iconv is &lt;5.2.14-0.7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198694" version="1" comment="php5-json is &lt;5.2.14-0.7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198695" version="1" comment="php5-ldap is &lt;5.2.14-0.7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198696" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198697" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198698" version="1" comment="php5-mysql is &lt;5.2.14-0.7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198699" version="1" comment="php5-odbc is &lt;5.2.14-0.7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198700" version="1" comment="php5-openssl is &lt;5.2.14-0.7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198701" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198702" version="1" comment="php5-pdo is &lt;5.2.14-0.7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198703" version="1" comment="php5-pear is &lt;5.2.14-0.7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198704" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198705" version="1" comment="php5-pspell is &lt;5.2.14-0.7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198706" version="1" comment="php5-shmop is &lt;5.2.14-0.7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198707" version="1" comment="php5-snmp is &lt;5.2.14-0.7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198708" version="1" comment="php5-soap is &lt;5.2.14-0.7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198709" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198710" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198711" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198712" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198713" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198714" version="1" comment="php5-wddx is &lt;5.2.14-0.7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198715" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198716" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198717" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198718" version="1" comment="php5-xsl is &lt;5.2.14-0.7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198719" version="1" comment="php5-zip is &lt;5.2.14-0.7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198720" version="1" comment="php5-zlib is &lt;5.2.14-0.7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198721" version="1" comment="apache2-mod_php53 is &lt;5.3.8-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198722" version="1" comment="php53 is &lt;5.3.8-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198723" version="1" comment="php53-bcmath is &lt;5.3.8-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198724" version="1" comment="php53-bz2 is &lt;5.3.8-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198725" version="1" comment="php53-calendar is &lt;5.3.8-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198726" version="1" comment="php53-ctype is &lt;5.3.8-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198727" version="1" comment="php53-curl is &lt;5.3.8-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198728" version="1" comment="php53-dba is &lt;5.3.8-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198729" version="1" comment="php53-dom is &lt;5.3.8-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198730" version="1" comment="php53-exif is &lt;5.3.8-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198731" version="1" comment="php53-fastcgi is &lt;5.3.8-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198732" version="1" comment="php53-fileinfo is &lt;5.3.8-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198733" version="1" comment="php53-ftp is &lt;5.3.8-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198734" version="1" comment="php53-gd is &lt;5.3.8-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198735" version="1" comment="php53-gettext is &lt;5.3.8-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198736" version="1" comment="php53-gmp is &lt;5.3.8-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198737" version="1" comment="php53-iconv is &lt;5.3.8-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198738" version="1" comment="php53-intl is &lt;5.3.8-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198739" version="1" comment="php53-json is &lt;5.3.8-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198740" version="1" comment="php53-ldap is &lt;5.3.8-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198741" version="1" comment="php53-mbstring is &lt;5.3.8-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198742" version="1" comment="php53-mcrypt is &lt;5.3.8-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198743" version="1" comment="php53-mysql is &lt;5.3.8-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198744" version="1" comment="php53-odbc is &lt;5.3.8-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198745" version="1" comment="php53-openssl is &lt;5.3.8-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198746" version="1" comment="php53-pcntl is &lt;5.3.8-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198747" version="1" comment="php53-pdo is &lt;5.3.8-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198748" version="1" comment="php53-pear is &lt;5.3.8-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198749" version="1" comment="php53-pgsql is &lt;5.3.8-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198750" version="1" comment="php53-pspell is &lt;5.3.8-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198751" version="1" comment="php53-shmop is &lt;5.3.8-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198752" version="1" comment="php53-snmp is &lt;5.3.8-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198753" version="1" comment="php53-soap is &lt;5.3.8-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198754" version="1" comment="php53-suhosin is &lt;5.3.8-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198755" version="1" comment="php53-sysvmsg is &lt;5.3.8-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198756" version="1" comment="php53-sysvsem is &lt;5.3.8-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198757" version="1" comment="php53-sysvshm is &lt;5.3.8-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198758" version="1" comment="php53-tokenizer is &lt;5.3.8-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198759" version="1" comment="php53-wddx is &lt;5.3.8-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198760" version="1" comment="php53-xmlreader is &lt;5.3.8-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198761" version="1" comment="php53-xmlrpc is &lt;5.3.8-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198762" version="1" comment="php53-xmlwriter is &lt;5.3.8-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198763" version="1" comment="php53-xsl is &lt;5.3.8-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198764" version="1" comment="php53-zip is &lt;5.3.8-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198765" version="1" comment="php53-zlib is &lt;5.3.8-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198766" version="1" comment="bind is &lt;9.6ESVR5P1-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198767" version="1" comment="bind-chrootenv is &lt;9.6ESVR5P1-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198768" version="1" comment="bind-doc is &lt;9.6ESVR5P1-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198769" version="1" comment="bind-libs is &lt;9.6ESVR5P1-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198770" version="1" comment="bind-libs-32bit is &lt;9.6ESVR5P1-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198771" version="1" comment="bind-libs-x86 is &lt;9.6ESVR5P1-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198772" version="1" comment="bind-utils is &lt;9.6ESVR5P1-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198773" version="1" comment="bzip2 is &lt;1.0.5-34.253" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198774" version="1" comment="bzip2-doc is &lt;1.0.5-34.253" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198775" version="1" comment="libbz2-1 is &lt;1.0.5-34.253" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198776" version="1" comment="libbz2-1-32bit is &lt;1.0.5-34.253" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198777" version="1" comment="libbz2-1-x86 is &lt;1.0.5-34.253" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198778" version="1" comment="cifs-utils is &lt;5.1-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198779" version="1" comment="clamav is &lt;0.97.3-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198780" version="1" comment="cron is &lt;4.1-194.199" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198781" version="1" comment="cups is &lt;1.3.9-8.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198782" version="1" comment="cups-client is &lt;1.3.9-8.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198783" version="1" comment="cups-libs is &lt;1.3.9-8.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198784" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198785" version="1" comment="cups-libs-x86 is &lt;1.3.9-8.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198786" version="1" comment="curl is &lt;7.19.7-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198787" version="1" comment="libcurl4 is &lt;7.19.7-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198788" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198789" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198790" version="1" comment="cyrus-imapd is &lt;2.3.11-60.65.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198791" version="1" comment="perl-Cyrus-IMAP is &lt;2.3.11-60.65.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198792" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.3.11-60.65.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198793" version="1" comment="dbus-1 is &lt;1.2.10-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198794" version="1" comment="dbus-1-32bit is &lt;1.2.10-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198795" version="1" comment="dbus-1-x11 is &lt;1.2.10-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198796" version="1" comment="dbus-1-x86 is &lt;1.2.10-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198797" version="1" comment="dbus-1-glib is &lt;0.76-34.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198798" version="1" comment="dbus-1-glib-32bit is &lt;0.76-34.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198799" version="1" comment="dbus-1-glib-x86 is &lt;0.76-34.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198800" version="1" comment="dhcp is &lt;4.2.3.P2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198801" version="1" comment="dhcp-client is &lt;4.2.3.P2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198802" version="1" comment="dhcp-relay is &lt;4.2.3.P2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198803" version="1" comment="dhcp-server is &lt;4.2.3.P2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198804" version="1" comment="dhcpcd is &lt;3.2.3-44.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198805" version="1" comment="dhcpv6 is &lt;1.0.22-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198806" version="1" comment="e2fsprogs is &lt;1.41.9-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198807" version="1" comment="libcom_err2 is &lt;1.41.9-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198808" version="1" comment="libcom_err2-32bit is &lt;1.41.9-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198809" version="1" comment="libcom_err2-x86 is &lt;1.41.9-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198810" version="1" comment="libext2fs2 is &lt;1.41.9-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198811" version="1" comment="ecryptfs-utils is &lt;61-1.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198812" version="1" comment="ecryptfs-utils-32bit is &lt;61-1.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198813" version="1" comment="ecryptfs-utils-x86 is &lt;61-1.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198814" version="1" comment="ed is &lt;0.2-1001.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198815" version="1" comment="emacs is &lt;22.3-4.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198816" version="1" comment="emacs-el is &lt;22.3-4.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198817" version="1" comment="emacs-info is &lt;22.3-4.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198818" version="1" comment="emacs-nox is &lt;22.3-4.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198819" version="1" comment="emacs-x11 is &lt;22.3-4.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198820" version="1" comment="enscript is &lt;1.6.4-152.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198821" version="1" comment="evince is &lt;2.28.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198822" version="1" comment="evince-doc is &lt;2.28.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198823" version="1" comment="evince-lang is &lt;2.28.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198824" version="1" comment="evolution-data-server is &lt;2.28.2-0.26.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198825" version="1" comment="evolution-data-server-32bit is &lt;2.28.2-0.26.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198826" version="1" comment="evolution-data-server-lang is &lt;2.28.2-0.26.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198827" version="1" comment="evolution-data-server-x86 is &lt;2.28.2-0.26.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198828" version="1" comment="fetchmail is &lt;6.3.8.90-13.20.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198829" version="1" comment="fetchmailconf is &lt;6.3.8.90-13.20.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198830" version="1" comment="file is &lt;4.24-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198831" version="1" comment="file-32bit is &lt;4.24-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198832" version="1" comment="file-x86 is &lt;4.24-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198833" version="1" comment="findutils is &lt;4.4.0-38.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198834" version="1" comment="findutils-locate is &lt;4.4.0-38.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198835" version="1" comment="foomatic-filters is &lt;3.0.2-269.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198836" version="1" comment="freeradius-server is &lt;2.1.1-7.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198837" version="1" comment="freetype2 is &lt;2.3.7-25.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198838" version="1" comment="freetype2-32bit is &lt;2.3.7-25.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198839" version="1" comment="freetype2-x86 is &lt;2.3.7-25.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198840" version="1" comment="fuse is &lt;2.7.2-61.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198841" version="1" comment="libfuse2 is &lt;2.7.2-61.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198842" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198843" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198844" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198845" version="1" comment="ghostscript-library is &lt;8.62-32.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198846" version="1" comment="ghostscript-omni is &lt;8.62-32.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198847" version="1" comment="ghostscript-x11 is &lt;8.62-32.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198848" version="1" comment="libgimpprint is &lt;4.2.7-32.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198849" version="1" comment="glibc is &lt;2.11.3-17.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198850" version="1" comment="glibc-32bit is &lt;2.11.3-17.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198851" version="1" comment="glibc-devel is &lt;2.11.3-17.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198852" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198853" version="1" comment="glibc-html is &lt;2.11.3-17.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198854" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198855" version="1" comment="glibc-info is &lt;2.11.3-17.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198856" version="1" comment="glibc-locale is &lt;2.11.3-17.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198857" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198858" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198859" version="1" comment="glibc-profile is &lt;2.11.3-17.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198860" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198861" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198862" version="1" comment="glibc-x86 is &lt;2.11.3-17.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198863" version="1" comment="nscd is &lt;2.11.3-17.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198864" version="1" comment="gmime is &lt;2.2.23-1.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198865" version="1" comment="gmime-doc is &lt;2.2.23-1.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198866" version="1" comment="libgmime-2_0-3 is &lt;2.2.23-1.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198867" version="1" comment="gnome-screensaver is &lt;2.28.3-0.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198868" version="1" comment="gnome-screensaver-lang is &lt;2.28.3-0.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198869" version="1" comment="gnutls is &lt;2.4.1-24.39.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198870" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198871" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198872" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.39.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198873" version="1" comment="gpg2 is &lt;2.0.9-25.33.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198874" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198875" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.35-5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198876" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.35-5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198877" version="1" comment="gstreamer-0_10-plugins-base-doc is &lt;0.10.35-5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198878" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.35-5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198879" version="1" comment="gstreamer-0_10-plugins-base-x86 is &lt;0.10.35-5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198880" version="1" comment="libgstapp-0_10-0 is &lt;0.10.35-5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198881" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.35-5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198882" version="1" comment="libgstapp-0_10-0-x86 is &lt;0.10.35-5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198883" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.35-5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198884" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.35-5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198885" version="1" comment="libgstinterfaces-0_10-0-x86 is &lt;0.10.35-5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198886" version="1" comment="gstreamer-0_10-plugins-good is &lt;0.10.30-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198887" version="1" comment="gstreamer-0_10-plugins-good-doc is &lt;0.10.30-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198888" version="1" comment="gstreamer-0_10-plugins-good-lang is &lt;0.10.30-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198889" version="1" comment="gtk2 is &lt;2.18.9-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198890" version="1" comment="gtk2-32bit is &lt;2.18.9-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198891" version="1" comment="gtk2-doc is &lt;2.18.9-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198892" version="1" comment="gtk2-lang is &lt;2.18.9-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198893" version="1" comment="gtk2-x86 is &lt;2.18.9-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198894" version="1" comment="gvim is &lt;7.2-8.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198895" version="1" comment="vim is &lt;7.2-8.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198896" version="1" comment="vim-base is &lt;7.2-8.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198897" version="1" comment="vim-data is &lt;7.2-8.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198898" version="1" comment="hplip is &lt;3.11.10-0.6.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198899" version="1" comment="hplip-hpijs is &lt;3.11.10-0.6.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198900" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.10-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198901" version="1" comment="java-1_4_2-ibm-jdbc is &lt;1.4.2_sr13.10-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198902" version="1" comment="java-1_4_2-ibm-plugin is &lt;1.4.2_sr13.10-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198903" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr9.3-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198904" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr9.3-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198905" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr9.3-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198906" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr9.3-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198907" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr9.3-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198908" version="1" comment="kbd is &lt;1.14.1-16.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198909" version="1" comment="kde4-kgreeter-plugins is &lt;4.3.5-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198910" version="1" comment="kdebase4-workspace is &lt;4.3.5-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198911" version="1" comment="kdebase4-workspace-ksysguardd is &lt;4.3.5-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198912" version="1" comment="kdm is &lt;4.3.5-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198913" version="1" comment="kwin is &lt;4.3.5-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198914" version="1" comment="kdelibs4 is &lt;4.3.5-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198915" version="1" comment="kdelibs4-core is &lt;4.3.5-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198916" version="1" comment="kdelibs4-doc is &lt;4.3.5-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198917" version="1" comment="libkde4 is &lt;4.3.5-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198918" version="1" comment="libkde4-32bit is &lt;4.3.5-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198919" version="1" comment="libkde4-x86 is &lt;4.3.5-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198920" version="1" comment="libkdecore4 is &lt;4.3.5-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198921" version="1" comment="libkdecore4-32bit is &lt;4.3.5-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198922" version="1" comment="libkdecore4-x86 is &lt;4.3.5-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198923" version="1" comment="kdenetwork4-filesharing is &lt;4.3.5-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198924" version="1" comment="kget is &lt;4.3.5-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198925" version="1" comment="kopete is &lt;4.3.5-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198926" version="1" comment="krdc is &lt;4.3.5-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198927" version="1" comment="krfb is &lt;4.3.5-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198928" version="1" comment="kernel-default is &lt;3.0.13-0.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198929" version="1" comment="kernel-default-base is &lt;3.0.13-0.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198930" version="1" comment="kernel-default-devel is &lt;3.0.13-0.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198931" version="1" comment="kernel-default-man is &lt;3.0.13-0.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198932" version="1" comment="kernel-pae is &lt;3.0.13-0.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198933" version="1" comment="kernel-pae-base is &lt;3.0.13-0.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198934" version="1" comment="kernel-pae-devel is &lt;3.0.13-0.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198935" version="1" comment="kernel-ppc64 is &lt;3.0.13-0.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198936" version="1" comment="kernel-ppc64-base is &lt;3.0.13-0.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198937" version="1" comment="kernel-ppc64-devel is &lt;3.0.13-0.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198938" version="1" comment="kernel-source is &lt;3.0.13-0.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198939" version="1" comment="kernel-syms is &lt;3.0.13-0.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198940" version="1" comment="kernel-trace is &lt;3.0.13-0.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198941" version="1" comment="kernel-trace-base is &lt;3.0.13-0.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198942" version="1" comment="kernel-trace-devel is &lt;3.0.13-0.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198943" version="1" comment="kernel-xen is &lt;3.0.13-0.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198944" version="1" comment="kernel-xen-base is &lt;3.0.13-0.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198945" version="1" comment="kernel-xen-devel is &lt;3.0.13-0.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198946" version="1" comment="krb5 is &lt;1.6.3-133.48.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198947" version="1" comment="krb5-32bit is &lt;1.6.3-133.48.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198948" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.48.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198949" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.48.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198950" version="1" comment="krb5-client is &lt;1.6.3-133.48.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198951" version="1" comment="krb5-server is &lt;1.6.3-133.48.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198952" version="1" comment="krb5-x86 is &lt;1.6.3-133.48.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198953" version="1" comment="kvm is &lt;0.15.1-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198954" version="1" comment="ldapsmb is &lt;1.34b-12.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198955" version="1" comment="libldb1 is &lt;3.6.3-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198956" version="1" comment="libsmbclient0 is &lt;3.6.3-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198957" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198958" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198959" version="1" comment="libtalloc2 is &lt;3.6.3-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198960" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198961" version="1" comment="libtalloc2-x86 is &lt;3.6.3-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198962" version="1" comment="libtdb1 is &lt;3.6.3-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198963" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198964" version="1" comment="libtdb1-x86 is &lt;3.6.3-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198965" version="1" comment="libtevent0 is &lt;3.6.3-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198966" version="1" comment="libwbclient0 is &lt;3.6.3-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198967" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198968" version="1" comment="libwbclient0-x86 is &lt;3.6.3-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198969" version="1" comment="samba is &lt;3.6.3-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198970" version="1" comment="samba-32bit is &lt;3.6.3-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198971" version="1" comment="samba-client is &lt;3.6.3-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198972" version="1" comment="samba-client-32bit is &lt;3.6.3-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198973" version="1" comment="samba-client-x86 is &lt;3.6.3-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198974" version="1" comment="samba-krb-printing is &lt;3.6.3-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198975" version="1" comment="samba-winbind is &lt;3.6.3-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198976" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198977" version="1" comment="samba-winbind-x86 is &lt;3.6.3-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198978" version="1" comment="samba-x86 is &lt;3.6.3-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198979" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198980" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198981" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198982" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198983" version="1" comment="libQtWebKit4-x86 is &lt;4.6.3-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198984" version="1" comment="libqt4 is &lt;4.6.3-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198985" version="1" comment="libqt4-32bit is &lt;4.6.3-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198986" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198987" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198988" version="1" comment="libqt4-qt3support-x86 is &lt;4.6.3-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198989" version="1" comment="libqt4-sql is &lt;4.6.3-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198990" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198991" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198992" version="1" comment="libqt4-sql-x86 is &lt;4.6.3-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198993" version="1" comment="libqt4-x11 is &lt;4.6.3-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198994" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198995" version="1" comment="libqt4-x11-x86 is &lt;4.6.3-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198996" version="1" comment="libqt4-x86 is &lt;4.6.3-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198997" version="1" comment="libapr-util1 is &lt;1.3.4-12.22.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198998" version="1" comment="libapr-util1-32bit is &lt;1.3.4-12.22.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009198999" version="1" comment="libapr1 is &lt;1.3.3-11.18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199000" version="1" comment="libapr1-32bit is &lt;1.3.3-11.18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199001" version="1" comment="libcap-progs is &lt;2.11-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199002" version="1" comment="libcap2 is &lt;2.11-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199003" version="1" comment="libcap2-32bit is &lt;2.11-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199004" version="1" comment="libcap2-x86 is &lt;2.11-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199005" version="1" comment="libcgroup1 is &lt;0.34-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199006" version="1" comment="libdrm is &lt;2.4.27-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199007" version="1" comment="libdrm-32bit is &lt;2.4.27-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199008" version="1" comment="libdrm-x86 is &lt;2.4.27-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199009" version="1" comment="libfreebl3 is &lt;3.13.1-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199010" version="1" comment="libfreebl3-32bit is &lt;3.13.1-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199011" version="1" comment="libfreebl3-x86 is &lt;3.13.1-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199012" version="1" comment="mozilla-nss is &lt;3.13.1-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199013" version="1" comment="mozilla-nss-32bit is &lt;3.13.1-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199014" version="1" comment="mozilla-nss-tools is &lt;3.13.1-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199015" version="1" comment="mozilla-nss-x86 is &lt;3.13.1-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199016" version="1" comment="libgdiplus0 is &lt;2.6.7-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199017" version="1" comment="libgnomesu is &lt;1.0.0-307.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199018" version="1" comment="libgnomesu-lang is &lt;1.0.0-307.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199019" version="1" comment="libgnomesu0 is &lt;1.0.0-307.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199020" version="1" comment="libicu is &lt;4.0-7.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199021" version="1" comment="libicu-32bit is &lt;4.0-7.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199022" version="1" comment="libicu-doc is &lt;4.0-7.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199023" version="1" comment="libmysqlclient15 is &lt;5.0.94-0.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199024" version="1" comment="libmysqlclient15-32bit is &lt;5.0.94-0.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199025" version="1" comment="libmysqlclient15-x86 is &lt;5.0.94-0.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199026" version="1" comment="libmysqlclient_r15 is &lt;5.0.94-0.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199027" version="1" comment="mysql is &lt;5.0.94-0.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199028" version="1" comment="mysql-Max is &lt;5.0.94-0.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199029" version="1" comment="mysql-client is &lt;5.0.94-0.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199030" version="1" comment="mysql-tools is &lt;5.0.94-0.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199031" version="1" comment="libneon27 is &lt;0.29.6-6.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199032" version="1" comment="libneon27-32bit is &lt;0.29.6-6.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199033" version="1" comment="libneon27-x86 is &lt;0.29.6-6.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199034" version="1" comment="libnewt0_52 is &lt;0.52.10-1.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199035" version="1" comment="newt is &lt;0.52.10-1.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199036" version="1" comment="python-newt is &lt;0.52.10-1.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199037" version="1" comment="libopensc2 is &lt;0.11.6-5.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199038" version="1" comment="libopensc2-32bit is &lt;0.11.6-5.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199039" version="1" comment="libopensc2-x86 is &lt;0.11.6-5.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199040" version="1" comment="opensc is &lt;0.11.6-5.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199041" version="1" comment="opensc-32bit is &lt;0.11.6-5.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199042" version="1" comment="opensc-x86 is &lt;0.11.6-5.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199043" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199044" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199045" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199046" version="1" comment="openssl is &lt;0.9.8j-0.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199047" version="1" comment="openssl-doc is &lt;0.9.8j-0.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199048" version="1" comment="libpng12-0 is &lt;1.2.31-5.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199049" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199050" version="1" comment="libpng12-0-x86 is &lt;1.2.31-5.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199051" version="1" comment="libpoppler-glib4 is &lt;0.12.3-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199052" version="1" comment="libpoppler-qt4-3 is &lt;0.12.3-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199053" version="1" comment="libpoppler5 is &lt;0.12.3-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199054" version="1" comment="poppler-tools is &lt;0.12.3-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199055" version="1" comment="libpulse-browse0 is &lt;0.9.23-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199056" version="1" comment="libpulse-mainloop-glib0 is &lt;0.9.23-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199057" version="1" comment="libpulse0 is &lt;0.9.23-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199058" version="1" comment="libpulse0-32bit is &lt;0.9.23-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199059" version="1" comment="libpulse0-x86 is &lt;0.9.23-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199060" version="1" comment="pulseaudio is &lt;0.9.23-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199061" version="1" comment="pulseaudio-esound-compat is &lt;0.9.23-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199062" version="1" comment="pulseaudio-gdm-hooks is &lt;0.9.23-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199063" version="1" comment="pulseaudio-lang is &lt;0.9.23-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199064" version="1" comment="pulseaudio-module-x11 is &lt;0.9.23-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199065" version="1" comment="pulseaudio-module-zeroconf is &lt;0.9.23-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199066" version="1" comment="pulseaudio-utils is &lt;0.9.23-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199067" version="1" comment="libpython2_6-1_0 is &lt;2.6.0-8.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199068" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.0-8.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199069" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.0-8.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199070" version="1" comment="python-base is &lt;2.6.0-8.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199071" version="1" comment="python-base-32bit is &lt;2.6.0-8.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199072" version="1" comment="python-base-x86 is &lt;2.6.0-8.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199073" version="1" comment="python-xml is &lt;2.6.0-8.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199074" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199075" version="1" comment="qt4-x11-tools is &lt;4.6.3-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199076" version="1" comment="libtirpc1 is &lt;0.2.1-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199077" version="1" comment="librsvg is &lt;2.26.0-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199078" version="1" comment="librsvg-32bit is &lt;2.26.0-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199079" version="1" comment="librsvg-x86 is &lt;2.26.0-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199080" version="1" comment="rsvg-view is &lt;2.26.0-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199081" version="1" comment="libsndfile is &lt;1.0.20-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199082" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199083" version="1" comment="libsndfile-x86 is &lt;1.0.20-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199084" version="1" comment="libsnmp15 is &lt;5.4.2.1-8.12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199085" version="1" comment="libsnmp15-32bit is &lt;5.4.2.1-8.12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199086" version="1" comment="libsnmp15-x86 is &lt;5.4.2.1-8.12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199087" version="1" comment="net-snmp is &lt;5.4.2.1-8.12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199088" version="1" comment="perl-SNMP is &lt;5.4.2.1-8.12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199089" version="1" comment="snmp-mibs is &lt;5.4.2.1-8.12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199090" version="1" comment="libsoup-2_4-1 is &lt;2.32.2-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199091" version="1" comment="libsoup-2_4-1-32bit is &lt;2.32.2-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199092" version="1" comment="libsoup-2_4-1-x86 is &lt;2.32.2-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199093" version="1" comment="libtiff3 is &lt;3.8.2-141.142" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199094" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.142" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199095" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.142" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199096" version="1" comment="tiff is &lt;3.8.2-141.142" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199097" version="1" comment="libvirt is &lt;0.9.6-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199098" version="1" comment="libvirt-client is &lt;0.9.6-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199099" version="1" comment="libvirt-client-32bit is &lt;0.9.6-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199100" version="1" comment="libvirt-doc is &lt;0.9.6-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199101" version="1" comment="libvirt-python is &lt;0.9.6-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199102" version="1" comment="libvorbis is &lt;1.2.0-79.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199103" version="1" comment="libvorbis-32bit is &lt;1.2.0-79.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199104" version="1" comment="libvorbis-doc is &lt;1.2.0-79.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199105" version="1" comment="libvorbis-x86 is &lt;1.2.0-79.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199106" version="1" comment="libxcrypt is &lt;3.0.3-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199107" version="1" comment="libxcrypt-32bit is &lt;3.0.3-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199108" version="1" comment="libxcrypt-x86 is &lt;3.0.3-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199109" version="1" comment="pam-modules is &lt;11-1.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199110" version="1" comment="pam-modules-32bit is &lt;11-1.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199111" version="1" comment="pam-modules-x86 is &lt;11-1.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199112" version="1" comment="pwdutils is &lt;3.2.15-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199113" version="1" comment="pwdutils-plugin-audit is &lt;3.2.15-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199114" version="1" comment="libxml2 is &lt;2.7.6-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199115" version="1" comment="libxml2-32bit is &lt;2.7.6-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199116" version="1" comment="libxml2-doc is &lt;2.7.6-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199117" version="1" comment="libxml2-x86 is &lt;2.7.6-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199118" version="1" comment="libzip1 is &lt;0.9-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199119" version="1" comment="logrotate is &lt;3.7.7-10.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199120" version="1" comment="logwatch is &lt;7.3.6-65.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199121" version="1" comment="lvm2 is &lt;2.02.84-3.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199122" version="1" comment="mailman is &lt;2.1.14-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199123" version="1" comment="mipv6d is &lt;2.0.2.umip.0.4-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199124" version="1" comment="mono-core is &lt;2.6.7-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199125" version="1" comment="mono-data is &lt;2.6.7-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199126" version="1" comment="mono-data-postgresql is &lt;2.6.7-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199127" version="1" comment="mono-data-sqlite is &lt;2.6.7-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199128" version="1" comment="mono-locale-extras is &lt;2.6.7-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199129" version="1" comment="mono-nunit is &lt;2.6.7-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199130" version="1" comment="mono-web is &lt;2.6.7-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199131" version="1" comment="mono-winforms is &lt;2.6.7-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199132" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.24-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199133" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.24-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199134" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.24-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199135" version="1" comment="mozilla-xulrunner192-translations is &lt;1.9.2.24-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199136" version="1" comment="mozilla-xulrunner192-x86 is &lt;1.9.2.24-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199137" version="1" comment="nagios is &lt;3.0.6-1.25.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199138" version="1" comment="nagios-www is &lt;3.0.6-1.25.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199139" version="1" comment="ntp is &lt;4.2.4p8-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199140" version="1" comment="ntp-doc is &lt;4.2.4p8-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199141" version="1" comment="ofed is &lt;1.5.2-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199142" version="1" comment="ofed-doc is &lt;1.5.2-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199143" version="1" comment="ofed-kmp-default is &lt;1.5.2_3.0.13_0.27-0.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199144" version="1" comment="ofed-kmp-pae is &lt;1.5.2_3.0.13_0.27-0.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199145" version="1" comment="ofed-kmp-ppc64 is &lt;1.5.2_3.0.13_0.27-0.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199146" version="1" comment="ofed-kmp-trace is &lt;1.5.2_3.0.13_0.27-0.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199147" version="1" comment="openslp is &lt;1.2.0-172.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199148" version="1" comment="openslp-32bit is &lt;1.2.0-172.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199149" version="1" comment="openslp-server is &lt;1.2.0-172.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199150" version="1" comment="openslp-x86 is &lt;1.2.0-172.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199151" version="1" comment="openssh is &lt;5.1p1-41.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199152" version="1" comment="openssh-askpass is &lt;5.1p1-41.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199153" version="1" comment="openswan is &lt;2.6.16-1.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199154" version="1" comment="openswan-doc is &lt;2.6.16-1.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199155" version="1" comment="opie is &lt;2.4-662.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199156" version="1" comment="opie-32bit is &lt;2.4-662.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199157" version="1" comment="opie-x86 is &lt;2.4-662.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199158" version="1" comment="pam is &lt;1.1.5-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199159" version="1" comment="pam-32bit is &lt;1.1.5-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199160" version="1" comment="pam-doc is &lt;1.1.5-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199161" version="1" comment="pam-x86 is &lt;1.1.5-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199162" version="1" comment="pango is &lt;1.26.2-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199163" version="1" comment="pango-32bit is &lt;1.26.2-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199164" version="1" comment="pango-doc is &lt;1.26.2-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199165" version="1" comment="pango-x86 is &lt;1.26.2-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199166" version="1" comment="pcsc-ccid is &lt;1.3.8-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199167" version="1" comment="pcsc-lite is &lt;1.4.102-1.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199168" version="1" comment="pcsc-lite-32bit is &lt;1.4.102-1.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199169" version="1" comment="pcsc-lite-x86 is &lt;1.4.102-1.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199170" version="1" comment="perl is &lt;5.10.0-64.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199171" version="1" comment="perl-32bit is &lt;5.10.0-64.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199172" version="1" comment="perl-base is &lt;5.10.0-64.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199173" version="1" comment="perl-doc is &lt;5.10.0-64.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199174" version="1" comment="perl-x86 is &lt;5.10.0-64.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199175" version="1" comment="perl-libwww-perl is &lt;5.816-2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199176" version="1" comment="perl-spamassassin is &lt;3.3.1-10.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199177" version="1" comment="spamassassin is &lt;3.3.1-10.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199178" version="1" comment="postgresql is &lt;8.3.14-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199179" version="1" comment="postgresql-contrib is &lt;8.3.14-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199180" version="1" comment="postgresql-docs is &lt;8.3.14-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199181" version="1" comment="postgresql-libs is &lt;8.3.14-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199182" version="1" comment="postgresql-libs-32bit is &lt;8.3.14-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199183" version="1" comment="postgresql-libs-x86 is &lt;8.3.14-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199184" version="1" comment="postgresql-server is &lt;8.3.14-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199185" version="1" comment="puppet is &lt;2.6.12-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199186" version="1" comment="puppet-server is &lt;2.6.12-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199187" version="1" comment="pure-ftpd is &lt;1.0.22-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199188" version="1" comment="python is &lt;2.6.0-8.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199189" version="1" comment="python-32bit is &lt;2.6.0-8.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199190" version="1" comment="python-curses is &lt;2.6.0-8.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199191" version="1" comment="python-demo is &lt;2.6.0-8.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199192" version="1" comment="python-gdbm is &lt;2.6.0-8.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199193" version="1" comment="python-idle is &lt;2.6.0-8.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199194" version="1" comment="python-tk is &lt;2.6.0-8.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199195" version="1" comment="python-x86 is &lt;2.6.0-8.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199196" version="1" comment="python-sssd-config is &lt;1.5.11-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199197" version="1" comment="sssd is &lt;1.5.11-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199198" version="1" comment="sssd-32bit is &lt;1.5.11-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199199" version="1" comment="sssd-tools is &lt;1.5.11-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199200" version="1" comment="quagga is &lt;0.99.15-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199201" version="1" comment="radvd is &lt;1.1-1.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199202" version="1" comment="rsync is &lt;3.0.4-2.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199203" version="1" comment="rsyslog is &lt;5.8.7-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199204" version="1" comment="rsyslog-diag-tools is &lt;5.8.7-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199205" version="1" comment="rsyslog-doc is &lt;5.8.7-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199206" version="1" comment="rsyslog-module-gssapi is &lt;5.8.7-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199207" version="1" comment="rsyslog-module-gtls is &lt;5.8.7-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199208" version="1" comment="rsyslog-module-mysql is &lt;5.8.7-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199209" version="1" comment="rsyslog-module-pgsql is &lt;5.8.7-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199210" version="1" comment="rsyslog-module-relp is &lt;5.8.7-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199211" version="1" comment="rsyslog-module-snmp is &lt;5.8.7-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199212" version="1" comment="rsyslog-module-udpspoof is &lt;5.8.7-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199213" version="1" comment="ruby is &lt;1.8.7.p357-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199214" version="1" comment="ruby-doc-html is &lt;1.8.7.p357-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199215" version="1" comment="ruby-tk is &lt;1.8.7.p357-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199216" version="1" comment="squid is &lt;2.7.STABLE5-2.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199217" version="1" comment="squid3 is &lt;3.1.12-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199218" version="1" comment="squidGuard is &lt;1.4-13.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199219" version="1" comment="squidGuard-doc is &lt;1.4-13.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199220" version="1" comment="star is &lt;1.5final-28.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199221" version="1" comment="sudo is &lt;1.7.6p2-0.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199222" version="1" comment="sysconfig is &lt;0.71.47-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199223" version="1" comment="syslog-ng is &lt;2.0.9-27.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199224" version="1" comment="sysstat is &lt;8.1.5-7.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199225" version="1" comment="sysstat-isag is &lt;8.1.5-7.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199226" version="1" comment="system-config-printer is &lt;1.0.8-9.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199227" version="1" comment="system-config-printer-lang is &lt;1.0.8-9.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199228" version="1" comment="systemtap is &lt;1.5-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199229" version="1" comment="systemtap-server is &lt;1.5-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199230" version="1" comment="t1lib is &lt;5.1.1-100.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199231" version="1" comment="tar is &lt;1.26-1.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199232" version="1" comment="tftp is &lt;0.48-101.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199233" version="1" comment="tgt is &lt;0.9.10-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199234" version="1" comment="tomcat6 is &lt;6.0.18-20.35.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199235" version="1" comment="tomcat6-admin-webapps is &lt;6.0.18-20.35.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199236" version="1" comment="tomcat6-docs-webapp is &lt;6.0.18-20.35.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199237" version="1" comment="tomcat6-javadoc is &lt;6.0.18-20.35.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199238" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.18-20.35.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199239" version="1" comment="tomcat6-lib is &lt;6.0.18-20.35.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199240" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.18-20.35.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199241" version="1" comment="tomcat6-webapps is &lt;6.0.18-20.35.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199242" version="1" comment="unzip is &lt;6.00-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199243" version="1" comment="vte is &lt;0.22.5-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199244" version="1" comment="vte-doc is &lt;0.22.5-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199245" version="1" comment="vte-lang is &lt;0.22.5-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199246" version="1" comment="w3m is &lt;0.5.2-132.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199247" version="1" comment="wireshark is &lt;1.4.10-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199248" version="1" comment="xen is &lt;4.1.2_14-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199249" version="1" comment="xen-doc-html is &lt;4.1.2_14-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199250" version="1" comment="xen-doc-pdf is &lt;4.1.2_14-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199251" version="1" comment="xen-kmp-default is &lt;4.1.2_14_3.0.13_0.27-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199252" version="1" comment="xen-kmp-pae is &lt;4.1.2_14_3.0.13_0.27-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199253" version="1" comment="xen-libs is &lt;4.1.2_14-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199254" version="1" comment="xen-libs-32bit is &lt;4.1.2_14-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199255" version="1" comment="xen-tools is &lt;4.1.2_14-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199256" version="1" comment="xen-tools-domU is &lt;4.1.2_14-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199257" version="1" comment="xorg-x11 is &lt;7.4-9.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199258" version="1" comment="xorg-x11-xauth is &lt;7.4-9.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199259" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199260" version="1" comment="xorg-x11-server is &lt;7.4-27.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199261" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199262" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199263" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199264" version="1" comment="xorg-x11-libs-x86 is &lt;7.4-8.26.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199265" version="1" comment="yast2 is &lt;2.17.119-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199266" version="1" comment="yast2-core is &lt;2.17.44-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077550" version="1" comment="sles-release is ==11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199267" version="1" comment="Mesa is &lt;9.0.3-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199268" version="1" comment="Mesa-32bit is &lt;9.0.3-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199269" version="1" comment="Mesa-x86 is &lt;9.0.3-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199270" version="1" comment="MozillaFirefox is &lt;17.0.4esr-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199271" version="1" comment="MozillaFirefox-translations is &lt;17.0.4esr-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199272" version="1" comment="NetworkManager is &lt;0.7.1_git20090811-3.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199273" version="1" comment="NetworkManager-glib is &lt;0.7.1_git20090811-3.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199274" version="1" comment="PackageKit is &lt;0.3.14-2.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199275" version="1" comment="PackageKit-lang is &lt;0.3.14-2.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199276" version="1" comment="hal is &lt;0.5.12-23.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199277" version="1" comment="hal-32bit is &lt;0.5.12-23.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199278" version="1" comment="hal-doc is &lt;0.5.12-23.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199279" version="1" comment="hal-x86 is &lt;0.5.12-23.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199280" version="1" comment="libpackagekit-glib10 is &lt;0.3.14-2.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199281" version="1" comment="PolicyKit is &lt;0.9-14.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199282" version="1" comment="PolicyKit-32bit is &lt;0.9-14.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199283" version="1" comment="PolicyKit-x86 is &lt;0.9-14.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199284" version="1" comment="aaa_base is &lt;11-6.90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199285" version="1" comment="acpid is &lt;1.0.6-91.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199286" version="1" comment="ant is &lt;1.7.1-20.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199287" version="1" comment="ant-trax is &lt;1.7.1-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199288" version="1" comment="apache2 is &lt;2.2.12-1.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199289" version="1" comment="apache2-doc is &lt;2.2.12-1.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199290" version="1" comment="apache2-example-pages is &lt;2.2.12-1.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199291" version="1" comment="apache2-prefork is &lt;2.2.12-1.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199292" version="1" comment="apache2-utils is &lt;2.2.12-1.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199293" version="1" comment="apache2-worker is &lt;2.2.12-1.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199294" version="1" comment="apache2-mod_php53 is &lt;5.3.17-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199295" version="1" comment="php53 is &lt;5.3.17-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199296" version="1" comment="php53-bcmath is &lt;5.3.17-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199297" version="1" comment="php53-bz2 is &lt;5.3.17-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199298" version="1" comment="php53-calendar is &lt;5.3.17-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199299" version="1" comment="php53-ctype is &lt;5.3.17-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199300" version="1" comment="php53-curl is &lt;5.3.17-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199301" version="1" comment="php53-dba is &lt;5.3.17-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199302" version="1" comment="php53-dom is &lt;5.3.17-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199303" version="1" comment="php53-exif is &lt;5.3.17-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199304" version="1" comment="php53-fastcgi is &lt;5.3.17-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199305" version="1" comment="php53-fileinfo is &lt;5.3.17-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199306" version="1" comment="php53-ftp is &lt;5.3.17-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199307" version="1" comment="php53-gd is &lt;5.3.17-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199308" version="1" comment="php53-gettext is &lt;5.3.17-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199309" version="1" comment="php53-gmp is &lt;5.3.17-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199310" version="1" comment="php53-iconv is &lt;5.3.17-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199311" version="1" comment="php53-intl is &lt;5.3.17-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199312" version="1" comment="php53-json is &lt;5.3.17-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199313" version="1" comment="php53-ldap is &lt;5.3.17-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199314" version="1" comment="php53-mbstring is &lt;5.3.17-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199315" version="1" comment="php53-mcrypt is &lt;5.3.17-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199316" version="1" comment="php53-mysql is &lt;5.3.17-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199317" version="1" comment="php53-odbc is &lt;5.3.17-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199318" version="1" comment="php53-openssl is &lt;5.3.17-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199319" version="1" comment="php53-pcntl is &lt;5.3.17-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199320" version="1" comment="php53-pdo is &lt;5.3.17-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199321" version="1" comment="php53-pear is &lt;5.3.17-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199322" version="1" comment="php53-pgsql is &lt;5.3.17-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199323" version="1" comment="php53-pspell is &lt;5.3.17-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199324" version="1" comment="php53-shmop is &lt;5.3.17-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199325" version="1" comment="php53-snmp is &lt;5.3.17-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199326" version="1" comment="php53-soap is &lt;5.3.17-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199327" version="1" comment="php53-suhosin is &lt;5.3.17-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199328" version="1" comment="php53-sysvmsg is &lt;5.3.17-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199329" version="1" comment="php53-sysvsem is &lt;5.3.17-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199330" version="1" comment="php53-sysvshm is &lt;5.3.17-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199331" version="1" comment="php53-tokenizer is &lt;5.3.17-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199332" version="1" comment="php53-wddx is &lt;5.3.17-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199333" version="1" comment="php53-xmlreader is &lt;5.3.17-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199334" version="1" comment="php53-xmlrpc is &lt;5.3.17-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199335" version="1" comment="php53-xmlwriter is &lt;5.3.17-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199336" version="1" comment="php53-xsl is &lt;5.3.17-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199337" version="1" comment="php53-zip is &lt;5.3.17-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199338" version="1" comment="php53-zlib is &lt;5.3.17-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199339" version="1" comment="apache2-mod_security2 is &lt;2.7.1-0.2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199340" version="1" comment="ark is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199341" version="1" comment="kcalc is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199342" version="1" comment="kcharselect is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199343" version="1" comment="kdessh is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199344" version="1" comment="kdf is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199345" version="1" comment="kfloppy is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199346" version="1" comment="kgpg is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199347" version="1" comment="ktimer is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199348" version="1" comment="kwalletmanager is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199349" version="1" comment="kwikdisk is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199350" version="1" comment="okteta is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199351" version="1" comment="avahi is &lt;0.6.23-11.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199352" version="1" comment="avahi-lang is &lt;0.6.23-11.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199353" version="1" comment="avahi-utils is &lt;0.6.23-11.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199354" version="1" comment="libavahi-client3 is &lt;0.6.23-11.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199355" version="1" comment="libavahi-client3-32bit is &lt;0.6.23-11.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199356" version="1" comment="libavahi-client3-x86 is &lt;0.6.23-11.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199357" version="1" comment="libavahi-common3 is &lt;0.6.23-11.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199358" version="1" comment="libavahi-common3-32bit is &lt;0.6.23-11.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199359" version="1" comment="libavahi-common3-x86 is &lt;0.6.23-11.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199360" version="1" comment="libavahi-core5 is &lt;0.6.23-11.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199361" version="1" comment="libdns_sd is &lt;0.6.23-11.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199362" version="1" comment="libdns_sd-32bit is &lt;0.6.23-11.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199363" version="1" comment="libdns_sd-x86 is &lt;0.6.23-11.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199364" version="1" comment="bind is &lt;9.6ESVR7P4-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199365" version="1" comment="bind-chrootenv is &lt;9.6ESVR7P4-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199366" version="1" comment="bind-doc is &lt;9.6ESVR7P4-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199367" version="1" comment="bind-libs is &lt;9.6ESVR7P4-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199368" version="1" comment="bind-libs-32bit is &lt;9.6ESVR7P4-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199369" version="1" comment="bind-libs-x86 is &lt;9.6ESVR7P4-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199370" version="1" comment="bind-utils is &lt;9.6ESVR7P4-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199371" version="1" comment="boost-license is &lt;1.36.0-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199372" version="1" comment="libboost_program_options1_36_0 is &lt;1.36.0-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199373" version="1" comment="libboost_regex1_36_0 is &lt;1.36.0-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199374" version="1" comment="libboost_signals1_36_0 is &lt;1.36.0-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199375" version="1" comment="libboost_thread1_36_0 is &lt;1.36.0-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199376" version="1" comment="cifs-utils is &lt;5.1-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199377" version="1" comment="clamav is &lt;0.97.7-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199378" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199379" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199380" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199381" version="1" comment="libldap-2_4-2-x86 is &lt;2.4.26-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199382" version="1" comment="openldap2 is &lt;2.4.26-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199383" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199384" version="1" comment="openldap2-client is &lt;2.4.26-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199385" version="1" comment="cron is &lt;4.1-194.207" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199386" version="1" comment="cups is &lt;1.3.9-8.46.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199387" version="1" comment="cups-client is &lt;1.3.9-8.46.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199388" version="1" comment="cups-libs is &lt;1.3.9-8.46.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199389" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.46.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199390" version="1" comment="cups-libs-x86 is &lt;1.3.9-8.46.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199391" version="1" comment="curl is &lt;7.19.7-1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199392" version="1" comment="libcurl4 is &lt;7.19.7-1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199393" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199394" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199395" version="1" comment="cvs is &lt;1.12.12-144.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199396" version="1" comment="cvs-doc is &lt;1.12.12-144.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199397" version="1" comment="dbus-1 is &lt;1.2.10-3.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199398" version="1" comment="dbus-1-32bit is &lt;1.2.10-3.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199399" version="1" comment="dbus-1-x11 is &lt;1.2.10-3.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199400" version="1" comment="dbus-1-x86 is &lt;1.2.10-3.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199401" version="1" comment="dhcp is &lt;4.2.4.P2-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199402" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199403" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199404" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199405" version="1" comment="dhcpcd is &lt;3.2.3-44.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199406" version="1" comment="e2fsprogs is &lt;1.41.9-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199407" version="1" comment="libcom_err2 is &lt;1.41.9-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199408" version="1" comment="libcom_err2-32bit is &lt;1.41.9-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199409" version="1" comment="libcom_err2-x86 is &lt;1.41.9-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199410" version="1" comment="libext2fs2 is &lt;1.41.9-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199411" version="1" comment="ecryptfs-utils is &lt;61-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199412" version="1" comment="ecryptfs-utils-32bit is &lt;61-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199413" version="1" comment="ecryptfs-utils-x86 is &lt;61-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199414" version="1" comment="evolution-data-server is &lt;2.28.2-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199415" version="1" comment="evolution-data-server-32bit is &lt;2.28.2-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199416" version="1" comment="evolution-data-server-lang is &lt;2.28.2-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199417" version="1" comment="evolution-data-server-x86 is &lt;2.28.2-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199418" version="1" comment="expat is &lt;2.0.1-88.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199419" version="1" comment="libexpat1 is &lt;2.0.1-88.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199420" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199421" version="1" comment="libexpat1-x86 is &lt;2.0.1-88.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199422" version="1" comment="file is &lt;4.24-43.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199423" version="1" comment="file-32bit is &lt;4.24-43.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199424" version="1" comment="file-x86 is &lt;4.24-43.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199425" version="1" comment="freeradius-server is &lt;2.1.1-7.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199426" version="1" comment="freeradius-server-dialupadmin is &lt;2.1.1-7.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199427" version="1" comment="freeradius-server-doc is &lt;2.1.1-7.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199428" version="1" comment="freeradius-server-libs is &lt;2.1.1-7.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199429" version="1" comment="freeradius-server-utils is &lt;2.1.1-7.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199430" version="1" comment="freetype2 is &lt;2.3.7-25.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199431" version="1" comment="freetype2-32bit is &lt;2.3.7-25.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199432" version="1" comment="freetype2-x86 is &lt;2.3.7-25.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199433" version="1" comment="ft2demos is &lt;2.3.7-25.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199434" version="1" comment="fuse is &lt;2.8.7-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199435" version="1" comment="libfuse2 is &lt;2.8.7-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199436" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199437" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199438" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199439" version="1" comment="ghostscript-library is &lt;8.62-32.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199440" version="1" comment="ghostscript-omni is &lt;8.62-32.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199441" version="1" comment="ghostscript-x11 is &lt;8.62-32.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199442" version="1" comment="libgimpprint is &lt;4.2.7-32.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199443" version="1" comment="glib2 is &lt;2.22.5-0.8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199444" version="1" comment="glib2-doc is &lt;2.22.5-0.8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199445" version="1" comment="glib2-lang is &lt;2.22.5-0.8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199446" version="1" comment="libgio-2_0-0 is &lt;2.22.5-0.8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199447" version="1" comment="libgio-2_0-0-32bit is &lt;2.22.5-0.8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199448" version="1" comment="libgio-2_0-0-x86 is &lt;2.22.5-0.8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199449" version="1" comment="libglib-2_0-0 is &lt;2.22.5-0.8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199450" version="1" comment="libglib-2_0-0-32bit is &lt;2.22.5-0.8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199451" version="1" comment="libglib-2_0-0-x86 is &lt;2.22.5-0.8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199452" version="1" comment="libgmodule-2_0-0 is &lt;2.22.5-0.8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199453" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.22.5-0.8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199454" version="1" comment="libgmodule-2_0-0-x86 is &lt;2.22.5-0.8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199455" version="1" comment="libgobject-2_0-0 is &lt;2.22.5-0.8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199456" version="1" comment="libgobject-2_0-0-32bit is &lt;2.22.5-0.8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199457" version="1" comment="libgobject-2_0-0-x86 is &lt;2.22.5-0.8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199458" version="1" comment="libgthread-2_0-0 is &lt;2.22.5-0.8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199459" version="1" comment="libgthread-2_0-0-32bit is &lt;2.22.5-0.8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199460" version="1" comment="libgthread-2_0-0-x86 is &lt;2.22.5-0.8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199461" version="1" comment="glibc is &lt;2.11.3-17.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199462" version="1" comment="glibc-32bit is &lt;2.11.3-17.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199463" version="1" comment="glibc-devel is &lt;2.11.3-17.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199464" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199465" version="1" comment="glibc-html is &lt;2.11.3-17.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199466" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199467" version="1" comment="glibc-info is &lt;2.11.3-17.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199468" version="1" comment="glibc-locale is &lt;2.11.3-17.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199469" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199470" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199471" version="1" comment="glibc-profile is &lt;2.11.3-17.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199472" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199473" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199474" version="1" comment="glibc-x86 is &lt;2.11.3-17.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199475" version="1" comment="nscd is &lt;2.11.3-17.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199476" version="1" comment="gnome-screensaver is &lt;2.28.3-0.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199477" version="1" comment="gnome-screensaver-lang is &lt;2.28.3-0.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199478" version="1" comment="gnutls is &lt;2.4.1-24.39.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199479" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199480" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199481" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199482" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.39.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199483" version="1" comment="gpg2 is &lt;2.0.9-25.33.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199484" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199485" version="1" comment="gtk2 is &lt;2.18.9-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199486" version="1" comment="gtk2-32bit is &lt;2.18.9-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199487" version="1" comment="gtk2-doc is &lt;2.18.9-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199488" version="1" comment="gtk2-lang is &lt;2.18.9-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199489" version="1" comment="gtk2-x86 is &lt;2.18.9-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199490" version="1" comment="guestfs-data is &lt;1.20.4-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199491" version="1" comment="guestfs-tools is &lt;1.20.4-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199492" version="1" comment="guestfsd is &lt;1.20.4-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199493" version="1" comment="libguestfs0 is &lt;1.20.4-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199494" version="1" comment="gzip is &lt;1.3.12-69.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199495" version="1" comment="hyper-v is &lt;5-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199496" version="1" comment="ibutils is &lt;1.5.7-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199497" version="1" comment="ibutils-32bit is &lt;1.5.7-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199498" version="1" comment="jakarta-commons-httpclient3 is &lt;3.0.1-253.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199499" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr13.1-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199500" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr13.1-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199501" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr13.1-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199502" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr13.1-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199503" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr13.1-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199504" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr4.1-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199505" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr4.1-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199506" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr4.1-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199507" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr4.1-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199508" version="1" comment="jpeg is &lt;6b-879.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199509" version="1" comment="libjpeg is &lt;6.2.0-879.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199510" version="1" comment="libjpeg-32bit is &lt;6.2.0-879.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199511" version="1" comment="libjpeg-x86 is &lt;6.2.0-879.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199512" version="1" comment="kde4-kgreeter-plugins is &lt;4.3.5-0.12.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199513" version="1" comment="kdebase4-workspace is &lt;4.3.5-0.12.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199514" version="1" comment="kdebase4-workspace-ksysguardd is &lt;4.3.5-0.12.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199515" version="1" comment="kdm is &lt;4.3.5-0.12.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199516" version="1" comment="kwin is &lt;4.3.5-0.12.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199517" version="1" comment="kdelibs4 is &lt;4.3.5-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199518" version="1" comment="kdelibs4-core is &lt;4.3.5-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199519" version="1" comment="kdelibs4-doc is &lt;4.3.5-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199520" version="1" comment="libkde4 is &lt;4.3.5-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199521" version="1" comment="libkde4-32bit is &lt;4.3.5-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199522" version="1" comment="libkde4-x86 is &lt;4.3.5-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199523" version="1" comment="libkdecore4 is &lt;4.3.5-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199524" version="1" comment="libkdecore4-32bit is &lt;4.3.5-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199525" version="1" comment="libkdecore4-x86 is &lt;4.3.5-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199526" version="1" comment="kernel-default is &lt;3.0.76-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199527" version="1" comment="kernel-default-base is &lt;3.0.76-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199528" version="1" comment="kernel-default-devel is &lt;3.0.76-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199529" version="1" comment="kernel-default-man is &lt;3.0.76-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199530" version="1" comment="kernel-pae is &lt;3.0.76-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199531" version="1" comment="kernel-pae-base is &lt;3.0.76-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199532" version="1" comment="kernel-pae-devel is &lt;3.0.76-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199533" version="1" comment="kernel-ppc64 is &lt;3.0.76-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199534" version="1" comment="kernel-ppc64-base is &lt;3.0.76-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199535" version="1" comment="kernel-ppc64-devel is &lt;3.0.76-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199536" version="1" comment="kernel-source is &lt;3.0.76-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199537" version="1" comment="kernel-syms is &lt;3.0.76-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199538" version="1" comment="kernel-trace is &lt;3.0.76-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199539" version="1" comment="kernel-trace-base is &lt;3.0.76-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199540" version="1" comment="kernel-trace-devel is &lt;3.0.76-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199541" version="1" comment="kernel-xen is &lt;3.0.76-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199542" version="1" comment="kernel-xen-base is &lt;3.0.76-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199543" version="1" comment="kernel-xen-devel is &lt;3.0.76-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199544" version="1" comment="krb5 is &lt;1.6.3-133.49.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199545" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199546" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199547" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199548" version="1" comment="krb5-client is &lt;1.6.3-133.49.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199549" version="1" comment="krb5-server is &lt;1.6.3-133.49.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199550" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199551" version="1" comment="krb5-doc is &lt;1.6.3-133.49.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199552" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.49.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199553" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.49.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199554" version="1" comment="kvm is &lt;1.4.1-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199555" version="1" comment="ldapsmb is &lt;1.34b-12.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199556" version="1" comment="libldb1 is &lt;3.6.3-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199557" version="1" comment="libsmbclient0 is &lt;3.6.3-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199558" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199559" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199560" version="1" comment="libtalloc2 is &lt;3.6.3-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199561" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199562" version="1" comment="libtalloc2-x86 is &lt;3.6.3-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199563" version="1" comment="libtdb1 is &lt;3.6.3-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199564" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199565" version="1" comment="libtdb1-x86 is &lt;3.6.3-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199566" version="1" comment="libtevent0 is &lt;3.6.3-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199567" version="1" comment="libwbclient0 is &lt;3.6.3-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199568" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199569" version="1" comment="libwbclient0-x86 is &lt;3.6.3-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199570" version="1" comment="samba is &lt;3.6.3-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199571" version="1" comment="samba-32bit is &lt;3.6.3-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199572" version="1" comment="samba-client is &lt;3.6.3-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199573" version="1" comment="samba-client-32bit is &lt;3.6.3-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199574" version="1" comment="samba-client-x86 is &lt;3.6.3-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199575" version="1" comment="samba-krb-printing is &lt;3.6.3-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199576" version="1" comment="samba-winbind is &lt;3.6.3-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199577" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199578" version="1" comment="samba-winbind-x86 is &lt;3.6.3-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199579" version="1" comment="samba-x86 is &lt;3.6.3-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199580" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199581" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199582" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199583" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199584" version="1" comment="libQtWebKit4-x86 is &lt;4.6.3-5.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199585" version="1" comment="libqt4 is &lt;4.6.3-5.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199586" version="1" comment="libqt4-32bit is &lt;4.6.3-5.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199587" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199588" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199589" version="1" comment="libqt4-qt3support-x86 is &lt;4.6.3-5.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199590" version="1" comment="libqt4-sql is &lt;4.6.3-5.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199591" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199592" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199593" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199594" version="1" comment="libqt4-sql-x86 is &lt;4.6.3-5.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199595" version="1" comment="libqt4-x11 is &lt;4.6.3-5.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199596" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199597" version="1" comment="libqt4-x11-x86 is &lt;4.6.3-5.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199598" version="1" comment="libqt4-x86 is &lt;4.6.3-5.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199599" version="1" comment="qt4-x11-tools is &lt;4.6.3-5.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199600" version="1" comment="libapr1 is &lt;1.3.3-11.18.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199601" version="1" comment="libapr1-32bit is &lt;1.3.3-11.18.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199602" version="1" comment="libcgroup1 is &lt;0.37.1-5.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199603" version="1" comment="libdrm is &lt;2.4.41-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199604" version="1" comment="libdrm-32bit is &lt;2.4.41-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199605" version="1" comment="libdrm-x86 is &lt;2.4.41-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199606" version="1" comment="libecpg6 is &lt;9.1.9-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199607" version="1" comment="libpq5 is &lt;9.1.9-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199608" version="1" comment="libpq5-32bit is &lt;9.1.9-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199609" version="1" comment="postgresql91 is &lt;9.1.9-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199610" version="1" comment="postgresql91-contrib is &lt;9.1.9-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199611" version="1" comment="postgresql91-docs is &lt;9.1.9-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199612" version="1" comment="postgresql91-server is &lt;9.1.9-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199613" version="1" comment="libexif is &lt;0.6.17-2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199614" version="1" comment="libexif-32bit is &lt;0.6.17-2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199615" version="1" comment="libexif-x86 is &lt;0.6.17-2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199616" version="1" comment="libfreebl3 is &lt;3.14.3-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199617" version="1" comment="libfreebl3-32bit is &lt;3.14.3-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199618" version="1" comment="libfreebl3-x86 is &lt;3.14.3-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199619" version="1" comment="libsoftokn3 is &lt;3.14.3-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199620" version="1" comment="libsoftokn3-32bit is &lt;3.14.3-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199621" version="1" comment="libsoftokn3-x86 is &lt;3.14.3-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199622" version="1" comment="mozilla-nss is &lt;3.14.3-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199623" version="1" comment="mozilla-nss-32bit is &lt;3.14.3-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199624" version="1" comment="mozilla-nss-tools is &lt;3.14.3-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199625" version="1" comment="mozilla-nss-x86 is &lt;3.14.3-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199626" version="1" comment="libgtop is &lt;2.28.0-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199627" version="1" comment="libgtop-2_0-7 is &lt;2.28.0-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199628" version="1" comment="libgtop-doc is &lt;2.28.0-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199629" version="1" comment="libgtop-lang is &lt;2.28.0-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199630" version="1" comment="libicu-x86 is &lt;4.0-7.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199631" version="1" comment="libmysqlclient15 is &lt;5.0.96-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199632" version="1" comment="libmysqlclient15-32bit is &lt;5.0.96-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199633" version="1" comment="libmysqlclient15-x86 is &lt;5.0.96-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199634" version="1" comment="libmysqlclient_r15 is &lt;5.0.96-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199635" version="1" comment="mysql is &lt;5.5.31-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199636" version="1" comment="mysql-client is &lt;5.5.31-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199637" version="1" comment="mysql-tools is &lt;5.5.31-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199638" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199639" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199640" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199641" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199642" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199643" version="1" comment="openssl is &lt;0.9.8j-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199644" version="1" comment="openssl-doc is &lt;0.9.8j-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199645" version="1" comment="libotr2 is &lt;3.2.0-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199646" version="1" comment="libpng12-0 is &lt;1.2.31-5.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199647" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199648" version="1" comment="libpng12-0-x86 is &lt;1.2.31-5.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199649" version="1" comment="libpoppler-glib4 is &lt;0.12.3-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199650" version="1" comment="libpoppler-qt4-3 is &lt;0.12.3-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199651" version="1" comment="libpoppler5 is &lt;0.12.3-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199652" version="1" comment="poppler-tools is &lt;0.12.3-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199653" version="1" comment="libproxy0 is &lt;0.3.1-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199654" version="1" comment="libproxy0-32bit is &lt;0.3.1-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199655" version="1" comment="libproxy0-config-gnome is &lt;0.3.1-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199656" version="1" comment="libproxy0-config-kde4 is &lt;0.3.1-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199657" version="1" comment="libproxy0-networkmanager is &lt;0.3.1-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199658" version="1" comment="libproxy0-x86 is &lt;0.3.1-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199659" version="1" comment="libpython2_6-1_0 is &lt;2.6.8-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199660" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.8-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199661" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.8-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199662" version="1" comment="python-base is &lt;2.6.8-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199663" version="1" comment="python-base-32bit is &lt;2.6.8-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199664" version="1" comment="python-base-x86 is &lt;2.6.8-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199665" version="1" comment="python-xml is &lt;2.6.8-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199666" version="1" comment="libsnmp15 is &lt;5.4.2.1-8.12.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199667" version="1" comment="libsnmp15-32bit is &lt;5.4.2.1-8.12.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199668" version="1" comment="libsnmp15-x86 is &lt;5.4.2.1-8.12.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199669" version="1" comment="net-snmp is &lt;5.4.2.1-8.12.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199670" version="1" comment="perl-SNMP is &lt;5.4.2.1-8.12.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199671" version="1" comment="snmp-mibs is &lt;5.4.2.1-8.12.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199672" version="1" comment="libsoup-2_4-1 is &lt;2.32.2-4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199673" version="1" comment="libsoup-2_4-1-32bit is &lt;2.32.2-4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199674" version="1" comment="libsoup-2_4-1-x86 is &lt;2.32.2-4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199675" version="1" comment="libsss_idmap0 is &lt;1.9.4-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199676" version="1" comment="python-sssd-config is &lt;1.9.4-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199677" version="1" comment="sssd is &lt;1.9.4-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199678" version="1" comment="sssd-32bit is &lt;1.9.4-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199679" version="1" comment="sssd-tools is &lt;1.9.4-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199680" version="1" comment="libtiff3 is &lt;3.8.2-141.152" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199681" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.152" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199682" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.152" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199683" version="1" comment="tiff is &lt;3.8.2-141.152" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199684" version="1" comment="libtspi1 is &lt;0.3.10-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199685" version="1" comment="libtspi1-32bit is &lt;0.3.10-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199686" version="1" comment="libtspi1-x86 is &lt;0.3.10-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199687" version="1" comment="trousers is &lt;0.3.10-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199688" version="1" comment="libupsclient1 is &lt;2.6.2-0.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199689" version="1" comment="nut is &lt;2.6.2-0.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199690" version="1" comment="nut-classic is &lt;2.6.2-0.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199691" version="1" comment="nut-drivers-net is &lt;2.6.2-0.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199692" version="1" comment="libvirt is &lt;1.0.5.1-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199693" version="1" comment="libvirt-client is &lt;1.0.5.1-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199694" version="1" comment="libvirt-client-32bit is &lt;1.0.5.1-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199695" version="1" comment="libvirt-doc is &lt;1.0.5.1-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199696" version="1" comment="libvirt-lock-sanlock is &lt;1.0.5.1-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199697" version="1" comment="libvirt-python is &lt;1.0.5.1-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199698" version="1" comment="libvorbis is &lt;1.2.0-79.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199699" version="1" comment="libvorbis-32bit is &lt;1.2.0-79.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199700" version="1" comment="libvorbis-doc is &lt;1.2.0-79.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199701" version="1" comment="libvorbis-x86 is &lt;1.2.0-79.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199702" version="1" comment="libxml2 is &lt;2.7.6-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199703" version="1" comment="libxml2-32bit is &lt;2.7.6-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199704" version="1" comment="libxml2-doc is &lt;2.7.6-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199705" version="1" comment="libxml2-x86 is &lt;2.7.6-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199706" version="1" comment="libxslt is &lt;1.1.24-19.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199707" version="1" comment="libxslt-32bit is &lt;1.1.24-19.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199708" version="1" comment="libxslt-x86 is &lt;1.1.24-19.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199709" version="1" comment="logrotate is &lt;3.7.7-10.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199710" version="1" comment="lvm2 is &lt;2.02.98-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199711" version="1" comment="mailman is &lt;2.1.14-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199712" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.27-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199713" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.27-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199714" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.27-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199715" version="1" comment="mozilla-xulrunner192-translations is &lt;1.9.2.27-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199716" version="1" comment="mozilla-xulrunner192-x86 is &lt;1.9.2.27-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199717" version="1" comment="nagios is &lt;3.0.6-1.25.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199718" version="1" comment="nagios-www is &lt;3.0.6-1.25.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199719" version="1" comment="nagios-plugins is &lt;1.4.16-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199720" version="1" comment="nagios-plugins-extras is &lt;1.4.16-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199721" version="1" comment="nfs-client is &lt;1.2.3-18.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199722" version="1" comment="ntp is &lt;4.2.4p8-1.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199723" version="1" comment="ntp-doc is &lt;4.2.4p8-1.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199724" version="1" comment="ofed is &lt;1.5.4.1-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199725" version="1" comment="ofed-doc is &lt;1.5.4.1-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199726" version="1" comment="ofed-kmp-default is &lt;1.5.4.1_3.0.76_0.11-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199727" version="1" comment="ofed-kmp-pae is &lt;1.5.4.1_3.0.76_0.11-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199728" version="1" comment="ofed-kmp-ppc64 is &lt;1.5.4.1_3.0.76_0.11-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199729" version="1" comment="ofed-kmp-trace is &lt;1.5.4.1_3.0.76_0.11-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199730" version="1" comment="openCryptoki is &lt;2.4.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199731" version="1" comment="openCryptoki-32bit is &lt;2.4.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199732" version="1" comment="openCryptoki-64bit is &lt;2.4.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199733" version="1" comment="openssh is &lt;6.2p2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199734" version="1" comment="openssh-askpass is &lt;6.2p2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199735" version="1" comment="openvpn is &lt;2.0.9-143.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199736" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199737" version="1" comment="pam_krb5 is &lt;2.3.1-47.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199738" version="1" comment="pam_krb5-32bit is &lt;2.3.1-47.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199739" version="1" comment="pam_krb5-x86 is &lt;2.3.1-47.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199740" version="1" comment="pam_mount is &lt;0.47-13.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199741" version="1" comment="pam_mount-32bit is &lt;0.47-13.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199742" version="1" comment="pam_mount-x86 is &lt;0.47-13.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199743" version="1" comment="perl is &lt;5.10.0-64.67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199744" version="1" comment="perl-32bit is &lt;5.10.0-64.67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199745" version="1" comment="perl-Module-Build is &lt;0.2808.01-0.67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199746" version="1" comment="perl-Test-Simple is &lt;0.72-0.67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199747" version="1" comment="perl-base is &lt;5.10.0-64.67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199748" version="1" comment="perl-doc is &lt;5.10.0-64.67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199749" version="1" comment="perl-x86 is &lt;5.10.0-64.67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199750" version="1" comment="postgresql is &lt;8.3.23-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199751" version="1" comment="postgresql-contrib is &lt;8.3.23-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199752" version="1" comment="postgresql-docs is &lt;8.3.23-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199753" version="1" comment="postgresql-server is &lt;8.3.23-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199754" version="1" comment="puppet is &lt;2.6.18-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199755" version="1" comment="puppet-server is &lt;2.6.18-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199756" version="1" comment="pure-ftpd is &lt;1.0.22-3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199757" version="1" comment="python is &lt;2.6.8-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199758" version="1" comment="python-32bit is &lt;2.6.8-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199759" version="1" comment="python-curses is &lt;2.6.8-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199760" version="1" comment="python-demo is &lt;2.6.8-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199761" version="1" comment="python-gdbm is &lt;2.6.8-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199762" version="1" comment="python-idle is &lt;2.6.8-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199763" version="1" comment="python-tk is &lt;2.6.8-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199764" version="1" comment="python-x86 is &lt;2.6.8-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199765" version="1" comment="python-pam is &lt;0.5.0-3.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199766" version="1" comment="quagga is &lt;0.99.15-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199767" version="1" comment="rsync is &lt;3.0.4-2.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199768" version="1" comment="rsyslog is &lt;5.10.1-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199769" version="1" comment="rsyslog-diag-tools is &lt;5.10.1-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199770" version="1" comment="rsyslog-doc is &lt;5.10.1-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199771" version="1" comment="rsyslog-module-gssapi is &lt;5.10.1-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199772" version="1" comment="rsyslog-module-gtls is &lt;5.10.1-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199773" version="1" comment="rsyslog-module-mysql is &lt;5.10.1-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199774" version="1" comment="rsyslog-module-pgsql is &lt;5.10.1-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199775" version="1" comment="rsyslog-module-relp is &lt;5.10.1-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199776" version="1" comment="rsyslog-module-snmp is &lt;5.10.1-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199777" version="1" comment="rsyslog-module-udpspoof is &lt;5.10.1-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199778" version="1" comment="ruby is &lt;1.8.7.p357-0.9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199779" version="1" comment="ruby-doc-html is &lt;1.8.7.p357-0.9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199780" version="1" comment="ruby-tk is &lt;1.8.7.p357-0.9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199781" version="1" comment="sblim-sfcb is &lt;1.3.11-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199782" version="1" comment="socat is &lt;1.7.0.0-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199783" version="1" comment="squid is &lt;2.7.STABLE5-2.12.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199784" version="1" comment="squid3 is &lt;3.1.12-8.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199785" version="1" comment="star is &lt;1.5final-28.23.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199786" version="1" comment="stunnel is &lt;4.54-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199787" version="1" comment="sudo is &lt;1.7.6p2-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199788" version="1" comment="sysconfig is &lt;0.71.61-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199789" version="1" comment="syslog-ng is &lt;2.0.9-27.34.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199790" version="1" comment="sysstat is &lt;8.1.5-7.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199791" version="1" comment="sysstat-isag is &lt;8.1.5-7.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199792" version="1" comment="system-config-printer is &lt;1.0.8-9.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199793" version="1" comment="system-config-printer-lang is &lt;1.0.8-9.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199794" version="1" comment="systemtap is &lt;1.5-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199795" version="1" comment="systemtap-server is &lt;1.5-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199796" version="1" comment="t1lib is &lt;5.1.1-100.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199797" version="1" comment="taglib is &lt;1.5-19.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199798" version="1" comment="taglib-32bit is &lt;1.5-19.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199799" version="1" comment="taglib-x86 is &lt;1.5-19.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199800" version="1" comment="tftp is &lt;0.48-101.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199801" version="1" comment="tgt is &lt;0.9.10-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199802" version="1" comment="tomcat6 is &lt;6.0.18-20.35.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199803" version="1" comment="tomcat6-admin-webapps is &lt;6.0.18-20.35.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199804" version="1" comment="tomcat6-docs-webapp is &lt;6.0.18-20.35.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199805" version="1" comment="tomcat6-javadoc is &lt;6.0.18-20.35.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199806" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.18-20.35.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199807" version="1" comment="tomcat6-lib is &lt;6.0.18-20.35.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199808" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.18-20.35.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199809" version="1" comment="tomcat6-webapps is &lt;6.0.18-20.35.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199810" version="1" comment="unixODBC_23 is &lt;2.3.1-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199811" version="1" comment="virt-utils is &lt;1.2.1-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199812" version="1" comment="wireshark is &lt;1.8.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199813" version="1" comment="x3270 is &lt;3.3.12-517.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199814" version="1" comment="xen is &lt;4.2.2_04-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199815" version="1" comment="xen-doc-html is &lt;4.2.2_04-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199816" version="1" comment="xen-doc-pdf is &lt;4.2.2_04-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199817" version="1" comment="xen-kmp-default is &lt;4.2.2_04_3.0.76_0.11-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199818" version="1" comment="xen-kmp-pae is &lt;4.2.2_04_3.0.76_0.11-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199819" version="1" comment="xen-libs is &lt;4.2.2_04-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199820" version="1" comment="xen-libs-32bit is &lt;4.2.2_04-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199821" version="1" comment="xen-tools is &lt;4.2.2_04-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199822" version="1" comment="xen-tools-domU is &lt;4.2.2_04-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199823" version="1" comment="xorg-x11 is &lt;7.4-9.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199824" version="1" comment="xorg-x11-xauth is &lt;7.4-9.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199825" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199826" version="1" comment="xorg-x11-server is &lt;7.4-27.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199827" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199828" version="1" comment="xorg-x11-libxcb is &lt;7.4-1.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199829" version="1" comment="xorg-x11-libxcb-32bit is &lt;7.4-1.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199830" version="1" comment="xorg-x11-libxcb-x86 is &lt;7.4-1.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199831" version="1" comment="xorg-x11-server-dmx is &lt;7.3.99-17.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199832" version="1" comment="xorg-x11-server-rdp is &lt;7.3.99-3.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199833" version="1" comment="yast2 is &lt;2.17.129-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199834" version="1" comment="yast2-core is &lt;2.17.45-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117413" version="1" comment="sles-release is ==11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199835" version="1" comment="Mesa is &lt;9.0.3-0.28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199836" version="1" comment="Mesa-32bit is &lt;9.0.3-0.28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199837" version="1" comment="Mesa-x86 is &lt;9.0.3-0.28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199838" version="1" comment="MozillaFirefox is &lt;31.7.0esr-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199839" version="1" comment="MozillaFirefox-translations is &lt;31.7.0esr-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199840" version="1" comment="PackageKit is &lt;0.3.14-2.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199841" version="1" comment="PackageKit-lang is &lt;0.3.14-2.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199842" version="1" comment="hal is &lt;0.5.12-23.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199843" version="1" comment="hal-32bit is &lt;0.5.12-23.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199844" version="1" comment="hal-doc is &lt;0.5.12-23.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199845" version="1" comment="hal-x86 is &lt;0.5.12-23.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199846" version="1" comment="libpackagekit-glib10 is &lt;0.3.14-2.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199847" version="1" comment="PolicyKit is &lt;0.9-14.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199848" version="1" comment="PolicyKit-32bit is &lt;0.9-14.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199849" version="1" comment="PolicyKit-doc is &lt;0.9-14.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199850" version="1" comment="PolicyKit-x86 is &lt;0.9-14.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199851" version="1" comment="a2ps is &lt;4.13-1326.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199852" version="1" comment="aaa_base is &lt;11-6.105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199853" version="1" comment="ant is &lt;1.7.1-20.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199854" version="1" comment="ant-trax is &lt;1.7.1-16.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199855" version="1" comment="apache2 is &lt;2.2.12-1.51.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199856" version="1" comment="apache2-doc is &lt;2.2.12-1.51.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199857" version="1" comment="apache2-example-pages is &lt;2.2.12-1.51.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199858" version="1" comment="apache2-prefork is &lt;2.2.12-1.51.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199859" version="1" comment="apache2-utils is &lt;2.2.12-1.51.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199860" version="1" comment="apache2-worker is &lt;2.2.12-1.51.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199861" version="1" comment="apache2-mod_jk is &lt;1.2.40-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199862" version="1" comment="apache2-mod_nss is &lt;1.0.8-0.4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199863" version="1" comment="apache2-mod_perl is &lt;2.0.4-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199864" version="1" comment="apache2-mod_php53 is &lt;5.3.17-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199865" version="1" comment="php53 is &lt;5.3.17-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199866" version="1" comment="php53-bcmath is &lt;5.3.17-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199867" version="1" comment="php53-bz2 is &lt;5.3.17-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199868" version="1" comment="php53-calendar is &lt;5.3.17-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199869" version="1" comment="php53-ctype is &lt;5.3.17-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199870" version="1" comment="php53-curl is &lt;5.3.17-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199871" version="1" comment="php53-dba is &lt;5.3.17-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199872" version="1" comment="php53-dom is &lt;5.3.17-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199873" version="1" comment="php53-exif is &lt;5.3.17-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199874" version="1" comment="php53-fastcgi is &lt;5.3.17-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199875" version="1" comment="php53-fileinfo is &lt;5.3.17-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199876" version="1" comment="php53-ftp is &lt;5.3.17-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199877" version="1" comment="php53-gd is &lt;5.3.17-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199878" version="1" comment="php53-gettext is &lt;5.3.17-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199879" version="1" comment="php53-gmp is &lt;5.3.17-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199880" version="1" comment="php53-iconv is &lt;5.3.17-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199881" version="1" comment="php53-intl is &lt;5.3.17-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199882" version="1" comment="php53-json is &lt;5.3.17-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199883" version="1" comment="php53-ldap is &lt;5.3.17-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199884" version="1" comment="php53-mbstring is &lt;5.3.17-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199885" version="1" comment="php53-mcrypt is &lt;5.3.17-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199886" version="1" comment="php53-mysql is &lt;5.3.17-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199887" version="1" comment="php53-odbc is &lt;5.3.17-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199888" version="1" comment="php53-openssl is &lt;5.3.17-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199889" version="1" comment="php53-pcntl is &lt;5.3.17-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199890" version="1" comment="php53-pdo is &lt;5.3.17-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199891" version="1" comment="php53-pear is &lt;5.3.17-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199892" version="1" comment="php53-pgsql is &lt;5.3.17-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199893" version="1" comment="php53-pspell is &lt;5.3.17-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199894" version="1" comment="php53-shmop is &lt;5.3.17-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199895" version="1" comment="php53-snmp is &lt;5.3.17-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199896" version="1" comment="php53-soap is &lt;5.3.17-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199897" version="1" comment="php53-suhosin is &lt;5.3.17-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199898" version="1" comment="php53-sysvmsg is &lt;5.3.17-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199899" version="1" comment="php53-sysvsem is &lt;5.3.17-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199900" version="1" comment="php53-sysvshm is &lt;5.3.17-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199901" version="1" comment="php53-tokenizer is &lt;5.3.17-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199902" version="1" comment="php53-wddx is &lt;5.3.17-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199903" version="1" comment="php53-xmlreader is &lt;5.3.17-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199904" version="1" comment="php53-xmlrpc is &lt;5.3.17-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199905" version="1" comment="php53-xmlwriter is &lt;5.3.17-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199906" version="1" comment="php53-xsl is &lt;5.3.17-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199907" version="1" comment="php53-zip is &lt;5.3.17-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199908" version="1" comment="php53-zlib is &lt;5.3.17-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199909" version="1" comment="apache2-mod_security2 is &lt;2.7.1-0.2.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199910" version="1" comment="augeas is &lt;0.9.0-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199911" version="1" comment="augeas-lenses is &lt;0.9.0-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199912" version="1" comment="libaugeas0 is &lt;0.9.0-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199913" version="1" comment="automake is &lt;1.10.1-4.131.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199914" version="1" comment="avahi is &lt;0.6.23-11.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199915" version="1" comment="avahi-lang is &lt;0.6.23-11.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199916" version="1" comment="avahi-utils is &lt;0.6.23-11.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199917" version="1" comment="libavahi-client3 is &lt;0.6.23-11.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199918" version="1" comment="libavahi-client3-32bit is &lt;0.6.23-11.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199919" version="1" comment="libavahi-client3-x86 is &lt;0.6.23-11.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199920" version="1" comment="libavahi-common3 is &lt;0.6.23-11.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199921" version="1" comment="libavahi-common3-32bit is &lt;0.6.23-11.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199922" version="1" comment="libavahi-common3-x86 is &lt;0.6.23-11.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199923" version="1" comment="libavahi-core5 is &lt;0.6.23-11.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199924" version="1" comment="libdns_sd is &lt;0.6.23-11.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199925" version="1" comment="libdns_sd-32bit is &lt;0.6.23-11.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199926" version="1" comment="libdns_sd-x86 is &lt;0.6.23-11.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199927" version="1" comment="bash is &lt;3.2-147.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199928" version="1" comment="bash-doc is &lt;3.2-147.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199929" version="1" comment="bash-x86 is &lt;3.2-147.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199930" version="1" comment="libreadline5 is &lt;5.2-147.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199931" version="1" comment="libreadline5-32bit is &lt;5.2-147.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199932" version="1" comment="libreadline5-x86 is &lt;5.2-147.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199933" version="1" comment="readline-doc is &lt;5.2-147.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199934" version="1" comment="bind is &lt;9.9.6P1-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199935" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199936" version="1" comment="bind-doc is &lt;9.9.6P1-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199937" version="1" comment="bind-libs is &lt;9.9.6P1-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199938" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199939" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199940" version="1" comment="bind-utils is &lt;9.9.6P1-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199941" version="1" comment="binutils is &lt;2.24-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199942" version="1" comment="boost-license is &lt;1.36.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199943" version="1" comment="boost-license1_49_0 is &lt;1.49.0-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199944" version="1" comment="libboost_program_options1_36_0 is &lt;1.36.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199945" version="1" comment="libboost_regex1_36_0 is &lt;1.36.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199946" version="1" comment="libboost_signals1_36_0 is &lt;1.36.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199947" version="1" comment="libboost_system1_49_0 is &lt;1.49.0-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199948" version="1" comment="libboost_thread1_36_0 is &lt;1.36.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199949" version="1" comment="libboost_thread1_49_0 is &lt;1.49.0-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199950" version="1" comment="cifs-utils is &lt;5.1-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199951" version="1" comment="clamav is &lt;0.98.7-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199952" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199953" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199954" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199955" version="1" comment="libldap-2_4-2-x86 is &lt;2.4.26-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199956" version="1" comment="openldap2 is &lt;2.4.26-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199957" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199958" version="1" comment="openldap2-client is &lt;2.4.26-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199959" version="1" comment="coreutils is &lt;8.12-6.25.32.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199960" version="1" comment="coreutils-lang is &lt;8.12-6.25.32.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199961" version="1" comment="coreutils-x86 is &lt;8.12-6.25.32.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199962" version="1" comment="cpio is &lt;2.9-75.78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199963" version="1" comment="cpio-lang is &lt;2.9-75.78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199964" version="1" comment="cron is &lt;4.1-194.211.213" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199965" version="1" comment="cups is &lt;1.3.9-8.46.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199966" version="1" comment="cups-client is &lt;1.3.9-8.46.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199967" version="1" comment="cups-libs is &lt;1.3.9-8.46.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199968" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.46.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199969" version="1" comment="cups-libs-x86 is &lt;1.3.9-8.46.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199970" version="1" comment="curl is &lt;7.19.7-1.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199971" version="1" comment="libcurl4 is &lt;7.19.7-1.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199972" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199973" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199974" version="1" comment="davfs2 is &lt;1.5.2-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199975" version="1" comment="dbus-1 is &lt;1.2.10-3.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199976" version="1" comment="dbus-1-32bit is &lt;1.2.10-3.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199977" version="1" comment="dbus-1-x11 is &lt;1.2.10-3.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199978" version="1" comment="dbus-1-x86 is &lt;1.2.10-3.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199979" version="1" comment="dhcp is &lt;4.2.4.P2-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199980" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199981" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199982" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199983" version="1" comment="dnsmasq is &lt;2.71-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199984" version="1" comment="e2fsprogs is &lt;1.41.9-2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199985" version="1" comment="libcom_err2 is &lt;1.41.9-2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199986" version="1" comment="libcom_err2-32bit is &lt;1.41.9-2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199987" version="1" comment="libcom_err2-x86 is &lt;1.41.9-2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199988" version="1" comment="libext2fs2 is &lt;1.41.9-2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199989" version="1" comment="elfutils is &lt;0.152-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199990" version="1" comment="libasm1 is &lt;0.152-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199991" version="1" comment="libasm1-32bit is &lt;0.152-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199992" version="1" comment="libdw1 is &lt;0.152-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199993" version="1" comment="libdw1-32bit is &lt;0.152-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199994" version="1" comment="libdw1-x86 is &lt;0.152-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199995" version="1" comment="libebl1 is &lt;0.152-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199996" version="1" comment="libebl1-32bit is &lt;0.152-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199997" version="1" comment="libebl1-x86 is &lt;0.152-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199998" version="1" comment="libelf1 is &lt;0.152-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009199999" version="1" comment="libelf1-32bit is &lt;0.152-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200000" version="1" comment="libelf1-x86 is &lt;0.152-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200001" version="1" comment="emacs is &lt;22.3-4.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200002" version="1" comment="emacs-el is &lt;22.3-4.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200003" version="1" comment="emacs-info is &lt;22.3-4.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200004" version="1" comment="emacs-nox is &lt;22.3-4.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200005" version="1" comment="emacs-x11 is &lt;22.3-4.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200006" version="1" comment="evolution-data-server is &lt;2.28.2-0.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200007" version="1" comment="evolution-data-server-32bit is &lt;2.28.2-0.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200008" version="1" comment="evolution-data-server-lang is &lt;2.28.2-0.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200009" version="1" comment="evolution-data-server-x86 is &lt;2.28.2-0.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200010" version="1" comment="fastjar is &lt;0.95-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200011" version="1" comment="file is &lt;4.24-43.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200012" version="1" comment="file-32bit is &lt;4.24-43.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200013" version="1" comment="file-x86 is &lt;4.24-43.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200014" version="1" comment="freeradius-server is &lt;2.1.1-7.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200015" version="1" comment="freeradius-server-dialupadmin is &lt;2.1.1-7.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200016" version="1" comment="freeradius-server-doc is &lt;2.1.1-7.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200017" version="1" comment="freeradius-server-libs is &lt;2.1.1-7.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200018" version="1" comment="freeradius-server-utils is &lt;2.1.1-7.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200019" version="1" comment="freetype2 is &lt;2.3.7-25.35.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200020" version="1" comment="freetype2-32bit is &lt;2.3.7-25.35.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200021" version="1" comment="freetype2-x86 is &lt;2.3.7-25.35.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200022" version="1" comment="ft2demos is &lt;2.3.7-25.35.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200023" version="1" comment="fuse is &lt;2.8.7-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200024" version="1" comment="libfuse2 is &lt;2.8.7-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200025" version="1" comment="gd is &lt;2.0.36.RC1-52.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200026" version="1" comment="glib2 is &lt;2.22.5-0.8.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200027" version="1" comment="glib2-doc is &lt;2.22.5-0.8.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200028" version="1" comment="glib2-lang is &lt;2.22.5-0.8.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200029" version="1" comment="libgio-2_0-0 is &lt;2.22.5-0.8.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200030" version="1" comment="libgio-2_0-0-32bit is &lt;2.22.5-0.8.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200031" version="1" comment="libgio-2_0-0-x86 is &lt;2.22.5-0.8.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200032" version="1" comment="libglib-2_0-0 is &lt;2.22.5-0.8.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200033" version="1" comment="libglib-2_0-0-32bit is &lt;2.22.5-0.8.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200034" version="1" comment="libglib-2_0-0-x86 is &lt;2.22.5-0.8.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200035" version="1" comment="libgmodule-2_0-0 is &lt;2.22.5-0.8.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200036" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.22.5-0.8.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200037" version="1" comment="libgmodule-2_0-0-x86 is &lt;2.22.5-0.8.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200038" version="1" comment="libgobject-2_0-0 is &lt;2.22.5-0.8.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200039" version="1" comment="libgobject-2_0-0-32bit is &lt;2.22.5-0.8.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200040" version="1" comment="libgobject-2_0-0-x86 is &lt;2.22.5-0.8.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200041" version="1" comment="libgthread-2_0-0 is &lt;2.22.5-0.8.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200042" version="1" comment="libgthread-2_0-0-32bit is &lt;2.22.5-0.8.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200043" version="1" comment="libgthread-2_0-0-x86 is &lt;2.22.5-0.8.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200044" version="1" comment="glibc is &lt;2.11.3-17.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200045" version="1" comment="glibc-32bit is &lt;2.11.3-17.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200046" version="1" comment="glibc-devel is &lt;2.11.3-17.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200047" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200048" version="1" comment="glibc-html is &lt;2.11.3-17.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200049" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200050" version="1" comment="glibc-info is &lt;2.11.3-17.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200051" version="1" comment="glibc-locale is &lt;2.11.3-17.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200052" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200053" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200054" version="1" comment="glibc-profile is &lt;2.11.3-17.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200055" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200056" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200057" version="1" comment="glibc-x86 is &lt;2.11.3-17.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200058" version="1" comment="nscd is &lt;2.11.3-17.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200059" version="1" comment="gnome-screensaver is &lt;2.28.3-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200060" version="1" comment="gnome-screensaver-lang is &lt;2.28.3-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200061" version="1" comment="gnutls is &lt;2.4.1-24.39.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200062" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200063" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200064" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200065" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.39.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200066" version="1" comment="gpg2 is &lt;2.0.9-25.33.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200067" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200068" version="1" comment="gpgme is &lt;1.1.6-25.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200069" version="1" comment="libgpgme11 is &lt;1.1.6-25.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200070" version="1" comment="gstreamer-0_10-plugins-good is &lt;0.10.30-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200071" version="1" comment="gstreamer-0_10-plugins-good-doc is &lt;0.10.30-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200072" version="1" comment="gstreamer-0_10-plugins-good-lang is &lt;0.10.30-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200073" version="1" comment="guestfs-data is &lt;1.20.12-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200074" version="1" comment="guestfs-tools is &lt;1.20.12-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200075" version="1" comment="guestfsd is &lt;1.20.12-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200076" version="1" comment="libguestfs0 is &lt;1.20.12-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200077" version="1" comment="hplip is &lt;3.11.10-0.6.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200078" version="1" comment="hplip-hpijs is &lt;3.11.10-0.6.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200079" version="1" comment="hyper-v is &lt;6-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200080" version="1" comment="ibutils is &lt;1.5.7-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200081" version="1" comment="ibutils-32bit is &lt;1.5.7-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200082" version="1" comment="ipsec-tools is &lt;0.7.3-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200083" version="1" comment="jakarta-commons-fileupload is &lt;1.1.1-1.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200084" version="1" comment="jakarta-commons-fileupload-javadoc is &lt;1.1.1-1.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200085" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200086" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200087" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200088" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200089" version="1" comment="kbd is &lt;1.14.1-16.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200090" version="1" comment="kde4-kgreeter-plugins is &lt;4.3.5-0.12.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200091" version="1" comment="kdebase4-wallpapers is &lt;4.3.5-0.11.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200092" version="1" comment="kdebase4-workspace is &lt;4.3.5-0.12.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200093" version="1" comment="kdebase4-workspace-ksysguardd is &lt;4.3.5-0.12.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200094" version="1" comment="kdm is &lt;4.3.5-0.12.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200095" version="1" comment="kwin is &lt;4.3.5-0.12.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200096" version="1" comment="kdebase4-runtime is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200097" version="1" comment="kdelibs4 is &lt;4.3.5-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200098" version="1" comment="kdelibs4-core is &lt;4.3.5-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200099" version="1" comment="kdelibs4-doc is &lt;4.3.5-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200100" version="1" comment="libkde4 is &lt;4.3.5-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200101" version="1" comment="libkde4-32bit is &lt;4.3.5-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200102" version="1" comment="libkde4-x86 is &lt;4.3.5-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200103" version="1" comment="libkdecore4 is &lt;4.3.5-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200104" version="1" comment="libkdecore4-32bit is &lt;4.3.5-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200105" version="1" comment="libkdecore4-x86 is &lt;4.3.5-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200106" version="1" comment="kdirstat is &lt;2.4.4-255.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200107" version="1" comment="kernel-default is &lt;3.0.101-63" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200108" version="1" comment="kernel-default-base is &lt;3.0.101-63" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200109" version="1" comment="kernel-default-devel is &lt;3.0.101-63" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200110" version="1" comment="kernel-default-man is &lt;3.0.101-63" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200111" version="1" comment="kernel-pae is &lt;3.0.101-63" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200112" version="1" comment="kernel-pae-base is &lt;3.0.101-63" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200113" version="1" comment="kernel-pae-devel is &lt;3.0.101-63" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200114" version="1" comment="kernel-ppc64 is &lt;3.0.101-63" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200115" version="1" comment="kernel-ppc64-base is &lt;3.0.101-63" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200116" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-63" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200117" version="1" comment="kernel-source is &lt;3.0.101-63" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200118" version="1" comment="kernel-syms is &lt;3.0.101-63" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200119" version="1" comment="kernel-trace is &lt;3.0.101-63" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200120" version="1" comment="kernel-trace-base is &lt;3.0.101-63" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200121" version="1" comment="kernel-trace-devel is &lt;3.0.101-63" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200122" version="1" comment="kernel-xen is &lt;3.0.101-63" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200123" version="1" comment="kernel-xen-base is &lt;3.0.101-63" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200124" version="1" comment="kernel-xen-devel is &lt;3.0.101-63" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200125" version="1" comment="krb5 is &lt;1.6.3-133.49.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200126" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200127" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200128" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200129" version="1" comment="krb5-client is &lt;1.6.3-133.49.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200130" version="1" comment="krb5-server is &lt;1.6.3-133.49.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200131" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200132" version="1" comment="krb5-doc is &lt;1.6.3-133.49.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200133" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.49.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200134" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.49.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200135" version="1" comment="kvm is &lt;1.4.2-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200136" version="1" comment="lcms is &lt;1.17-77.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200137" version="1" comment="liblcms1 is &lt;1.17-77.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200138" version="1" comment="liblcms1-32bit is &lt;1.17-77.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200139" version="1" comment="liblcms1-x86 is &lt;1.17-77.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200140" version="1" comment="ldapsmb is &lt;1.34b-12.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200141" version="1" comment="libldb1 is &lt;3.6.3-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200142" version="1" comment="libsmbclient0 is &lt;3.6.3-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200143" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200144" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200145" version="1" comment="libtalloc2 is &lt;3.6.3-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200146" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200147" version="1" comment="libtalloc2-x86 is &lt;3.6.3-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200148" version="1" comment="libtdb1 is &lt;3.6.3-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200149" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200150" version="1" comment="libtdb1-x86 is &lt;3.6.3-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200151" version="1" comment="libtevent0 is &lt;3.6.3-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200152" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200153" version="1" comment="libwbclient0 is &lt;3.6.3-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200154" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200155" version="1" comment="libwbclient0-x86 is &lt;3.6.3-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200156" version="1" comment="samba is &lt;3.6.3-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200157" version="1" comment="samba-32bit is &lt;3.6.3-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200158" version="1" comment="samba-client is &lt;3.6.3-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200159" version="1" comment="samba-client-32bit is &lt;3.6.3-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200160" version="1" comment="samba-client-x86 is &lt;3.6.3-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200161" version="1" comment="samba-krb-printing is &lt;3.6.3-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200162" version="1" comment="samba-winbind is &lt;3.6.3-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200163" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200164" version="1" comment="samba-winbind-x86 is &lt;3.6.3-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200165" version="1" comment="samba-x86 is &lt;3.6.3-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200166" version="1" comment="libFLAC++6 is &lt;1.2.1-68.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200167" version="1" comment="libFLAC8 is &lt;1.2.1-68.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200168" version="1" comment="libFLAC8-32bit is &lt;1.2.1-68.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200169" version="1" comment="libFLAC8-x86 is &lt;1.2.1-68.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200170" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200171" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200172" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200173" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200174" version="1" comment="libQtWebKit4-x86 is &lt;4.6.3-5.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200175" version="1" comment="libqt4 is &lt;4.6.3-5.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200176" version="1" comment="libqt4-32bit is &lt;4.6.3-5.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200177" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200178" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200179" version="1" comment="libqt4-qt3support-x86 is &lt;4.6.3-5.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200180" version="1" comment="libqt4-sql is &lt;4.6.3-5.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200181" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200182" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200183" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200184" version="1" comment="libqt4-sql-x86 is &lt;4.6.3-5.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200185" version="1" comment="libqt4-x11 is &lt;4.6.3-5.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200186" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200187" version="1" comment="libqt4-x11-x86 is &lt;4.6.3-5.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200188" version="1" comment="libqt4-x86 is &lt;4.6.3-5.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200189" version="1" comment="qt4-x11-tools is &lt;4.6.3-5.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200190" version="1" comment="libapr-util1 is &lt;1.3.4-12.22.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200191" version="1" comment="libapr-util1-32bit is &lt;1.3.4-12.22.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200192" version="1" comment="libapr-util1-dbd-sqlite3 is &lt;1.3.4-12.22.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200193" version="1" comment="libblkid1 is &lt;2.19.1-6.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200194" version="1" comment="libblkid1-32bit is &lt;2.19.1-6.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200195" version="1" comment="libblkid1-x86 is &lt;2.19.1-6.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200196" version="1" comment="libuuid1 is &lt;2.19.1-6.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200197" version="1" comment="libuuid1-32bit is &lt;2.19.1-6.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200198" version="1" comment="libuuid1-x86 is &lt;2.19.1-6.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200199" version="1" comment="util-linux is &lt;2.19.1-6.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200200" version="1" comment="util-linux-lang is &lt;2.19.1-6.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200201" version="1" comment="uuid-runtime is &lt;2.19.1-6.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200202" version="1" comment="libcgroup1 is &lt;0.41.rc1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200203" version="1" comment="libdrm is &lt;2.4.52-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200204" version="1" comment="libdrm-32bit is &lt;2.4.52-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200205" version="1" comment="libdrm-x86 is &lt;2.4.52-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200206" version="1" comment="libecpg6 is &lt;9.4.4-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200207" version="1" comment="libpq5 is &lt;9.4.4-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200208" version="1" comment="libpq5-32bit is &lt;9.4.4-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200209" version="1" comment="postgresql94 is &lt;9.4.4-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200210" version="1" comment="postgresql94-contrib is &lt;9.4.4-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200211" version="1" comment="postgresql94-docs is &lt;9.4.4-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200212" version="1" comment="postgresql94-server is &lt;9.4.4-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200213" version="1" comment="libevent-1_4-2 is &lt;1.4.5-24.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200214" version="1" comment="libfreebl3 is &lt;3.17.3-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200215" version="1" comment="libfreebl3-32bit is &lt;3.17.3-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200216" version="1" comment="libfreebl3-x86 is &lt;3.17.3-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200217" version="1" comment="libsoftokn3 is &lt;3.17.3-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200218" version="1" comment="libsoftokn3-32bit is &lt;3.17.3-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200219" version="1" comment="libsoftokn3-x86 is &lt;3.17.3-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200220" version="1" comment="mozilla-nss is &lt;3.17.3-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200221" version="1" comment="mozilla-nss-32bit is &lt;3.17.3-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200222" version="1" comment="mozilla-nss-tools is &lt;3.17.3-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200223" version="1" comment="mozilla-nss-x86 is &lt;3.17.3-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200224" version="1" comment="libgcc_s1 is &lt;4.8.3+r212056-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200225" version="1" comment="libgcc_s1-32bit is &lt;4.8.3+r212056-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200226" version="1" comment="libgcc_s1-x86 is &lt;4.8.3+r212056-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200227" version="1" comment="libgfortran3 is &lt;4.8.3+r212056-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200228" version="1" comment="libgomp1 is &lt;4.8.3+r212056-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200229" version="1" comment="libgomp1-32bit is &lt;4.8.3+r212056-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200230" version="1" comment="libquadmath0 is &lt;4.8.3+r212056-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200231" version="1" comment="libstdc++6 is &lt;4.8.3+r212056-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200232" version="1" comment="libstdc++6-32bit is &lt;4.8.3+r212056-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200233" version="1" comment="libstdc++6-x86 is &lt;4.8.3+r212056-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200234" version="1" comment="libgcrypt11 is &lt;1.5.0-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200235" version="1" comment="libgcrypt11-32bit is &lt;1.5.0-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200236" version="1" comment="libgcrypt11-x86 is &lt;1.5.0-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200237" version="1" comment="libgtop is &lt;2.28.0-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200238" version="1" comment="libgtop-2_0-7 is &lt;2.28.0-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200239" version="1" comment="libgtop-doc is &lt;2.28.0-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200240" version="1" comment="libgtop-lang is &lt;2.28.0-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200241" version="1" comment="libjasper is &lt;1.900.1-134.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200242" version="1" comment="libjasper-32bit is &lt;1.900.1-134.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200243" version="1" comment="libjasper-x86 is &lt;1.900.1-134.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200244" version="1" comment="libksba is &lt;1.0.4-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200245" version="1" comment="liblzo2-2 is &lt;2.03-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200246" version="1" comment="liblzo2-2-32bit is &lt;2.03-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200247" version="1" comment="liblzo2-2-x86 is &lt;2.03-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200248" version="1" comment="libmpfr1 is &lt;2.3.2-3.118" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200249" version="1" comment="libmpfr1-32bit is &lt;2.3.2-3.118" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200250" version="1" comment="libmpfr1-x86 is &lt;2.3.2-3.118" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200251" version="1" comment="libmspack0 is &lt;0.0.20060920alpha-74.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200252" version="1" comment="libmysql55client18 is &lt;5.5.43-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200253" version="1" comment="libmysql55client18-32bit is &lt;5.5.43-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200254" version="1" comment="libmysql55client18-x86 is &lt;5.5.43-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200255" version="1" comment="libmysql55client_r18 is &lt;5.5.43-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200256" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.43-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200257" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.43-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200258" version="1" comment="mysql is &lt;5.5.43-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200259" version="1" comment="mysql-client is &lt;5.5.43-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200260" version="1" comment="mysql-tools is &lt;5.5.43-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200261" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200262" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200263" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200264" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200265" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200266" version="1" comment="openssl is &lt;0.9.8j-0.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200267" version="1" comment="openssl-doc is &lt;0.9.8j-0.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200268" version="1" comment="libpixman-1-0 is &lt;0.24.4-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200269" version="1" comment="libpixman-1-0-32bit is &lt;0.24.4-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200270" version="1" comment="libpixman-1-0-x86 is &lt;0.24.4-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200271" version="1" comment="libpng12-0 is &lt;1.2.31-5.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200272" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200273" version="1" comment="libpng12-0-x86 is &lt;1.2.31-5.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200274" version="1" comment="libpoppler-glib4 is &lt;0.12.3-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200275" version="1" comment="libpoppler-qt4-3 is &lt;0.12.3-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200276" version="1" comment="libpoppler5 is &lt;0.12.3-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200277" version="1" comment="poppler-tools is &lt;0.12.3-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200278" version="1" comment="libpulse-browse0 is &lt;0.9.23-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200279" version="1" comment="libpulse-mainloop-glib0 is &lt;0.9.23-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200280" version="1" comment="libpulse-mainloop-glib0-32bit is &lt;0.9.23-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200281" version="1" comment="libpulse-mainloop-glib0-x86 is &lt;0.9.23-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200282" version="1" comment="libpulse0 is &lt;0.9.23-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200283" version="1" comment="libpulse0-32bit is &lt;0.9.23-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200284" version="1" comment="libpulse0-x86 is &lt;0.9.23-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200285" version="1" comment="pulseaudio is &lt;0.9.23-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200286" version="1" comment="pulseaudio-esound-compat is &lt;0.9.23-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200287" version="1" comment="pulseaudio-gdm-hooks is &lt;0.9.23-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200288" version="1" comment="pulseaudio-lang is &lt;0.9.23-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200289" version="1" comment="pulseaudio-module-x11 is &lt;0.9.23-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200290" version="1" comment="pulseaudio-module-zeroconf is &lt;0.9.23-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200291" version="1" comment="pulseaudio-utils is &lt;0.9.23-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200292" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200293" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200294" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.9-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200295" version="1" comment="python-base is &lt;2.6.9-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200296" version="1" comment="python-base-32bit is &lt;2.6.9-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200297" version="1" comment="python-base-x86 is &lt;2.6.9-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200298" version="1" comment="python-xml is &lt;2.6.9-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200299" version="1" comment="libtirpc1 is &lt;0.2.1-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200300" version="1" comment="libsndfile is &lt;1.0.20-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200301" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200302" version="1" comment="libsndfile-x86 is &lt;1.0.20-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200303" version="1" comment="libsnmp15 is &lt;5.4.2.1-8.12.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200304" version="1" comment="libsnmp15-32bit is &lt;5.4.2.1-8.12.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200305" version="1" comment="libsnmp15-x86 is &lt;5.4.2.1-8.12.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200306" version="1" comment="net-snmp is &lt;5.4.2.1-8.12.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200307" version="1" comment="perl-SNMP is &lt;5.4.2.1-8.12.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200308" version="1" comment="snmp-mibs is &lt;5.4.2.1-8.12.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200309" version="1" comment="libssh2-1 is &lt;1.2.9-4.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200310" version="1" comment="libsss_idmap0 is &lt;1.9.4-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200311" version="1" comment="python-sssd-config is &lt;1.9.4-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200312" version="1" comment="sssd is &lt;1.9.4-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200313" version="1" comment="sssd-32bit is &lt;1.9.4-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200314" version="1" comment="sssd-tools is &lt;1.9.4-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200315" version="1" comment="libtasn1 is &lt;1.5-1.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200316" version="1" comment="libtasn1-3 is &lt;1.5-1.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200317" version="1" comment="libtasn1-3-32bit is &lt;1.5-1.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200318" version="1" comment="libtasn1-3-x86 is &lt;1.5-1.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200319" version="1" comment="libtevent0-x86 is &lt;3.6.3-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200320" version="1" comment="libtiff3 is &lt;3.8.2-141.154" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200321" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.154" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200322" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.154" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200323" version="1" comment="tiff is &lt;3.8.2-141.154" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200324" version="1" comment="libtspi1 is &lt;0.3.10-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200325" version="1" comment="libtspi1-32bit is &lt;0.3.10-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200326" version="1" comment="libtspi1-x86 is &lt;0.3.10-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200327" version="1" comment="trousers is &lt;0.3.10-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200328" version="1" comment="libvirt is &lt;1.2.5-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200329" version="1" comment="libvirt-client is &lt;1.2.5-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200330" version="1" comment="libvirt-client-32bit is &lt;1.2.5-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200331" version="1" comment="libvirt-doc is &lt;1.2.5-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200332" version="1" comment="libvirt-lock-sanlock is &lt;1.2.5-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200333" version="1" comment="libwsman1 is &lt;2.2.3-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200334" version="1" comment="openwsman-client is &lt;2.2.3-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200335" version="1" comment="openwsman-server is &lt;2.2.3-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200336" version="1" comment="suseRegister is &lt;1.4-1.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200337" version="1" comment="pam-modules is &lt;11-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200338" version="1" comment="pam-modules-32bit is &lt;11-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200339" version="1" comment="pam-modules-x86 is &lt;11-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200340" version="1" comment="pwdutils is &lt;3.2.15-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200341" version="1" comment="pwdutils-plugin-audit is &lt;3.2.15-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200342" version="1" comment="libxml2 is &lt;2.7.6-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200343" version="1" comment="libxml2-32bit is &lt;2.7.6-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200344" version="1" comment="libxml2-doc is &lt;2.7.6-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200345" version="1" comment="libxml2-x86 is &lt;2.7.6-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200346" version="1" comment="libxslt is &lt;1.1.24-19.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200347" version="1" comment="libxslt-32bit is &lt;1.1.24-19.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200348" version="1" comment="libxslt-x86 is &lt;1.1.24-19.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200349" version="1" comment="logrotate is &lt;3.7.7-10.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200350" version="1" comment="logwatch is &lt;7.3.6-65.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200351" version="1" comment="lvm2 is &lt;2.02.98-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200352" version="1" comment="lxc is &lt;0.8.0-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200353" version="1" comment="mailx is &lt;12.5-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200354" version="1" comment="mono-core is &lt;2.6.7-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200355" version="1" comment="mono-data is &lt;2.6.7-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200356" version="1" comment="mono-data-postgresql is &lt;2.6.7-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200357" version="1" comment="mono-data-sqlite is &lt;2.6.7-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200358" version="1" comment="mono-locale-extras is &lt;2.6.7-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200359" version="1" comment="mono-nunit is &lt;2.6.7-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200360" version="1" comment="mono-web is &lt;2.6.7-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200361" version="1" comment="mono-winforms is &lt;2.6.7-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200362" version="1" comment="mozilla-nspr is &lt;4.10.7-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200363" version="1" comment="mozilla-nspr-32bit is &lt;4.10.7-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200364" version="1" comment="mozilla-nspr-x86 is &lt;4.10.7-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200365" version="1" comment="mutt is &lt;1.5.17-42.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200366" version="1" comment="nagios is &lt;3.0.6-1.25.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200367" version="1" comment="nagios-www is &lt;3.0.6-1.25.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200368" version="1" comment="nagios-nrpe is &lt;2.12-24.4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200369" version="1" comment="nagios-nrpe-doc is &lt;2.12-24.4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200370" version="1" comment="nagios-plugins-nrpe is &lt;2.12-24.4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200371" version="1" comment="nagios-plugins is &lt;1.4.16-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200372" version="1" comment="nagios-plugins-extras is &lt;1.4.16-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200373" version="1" comment="nfs-client is &lt;1.2.3-18.38.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200374" version="1" comment="nfs-doc is &lt;1.2.3-18.38.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200375" version="1" comment="nfs-kernel-server is &lt;1.2.3-18.38.43" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200376" version="1" comment="ntp is &lt;4.2.8p2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200377" version="1" comment="ntp-doc is &lt;4.2.8p2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200378" version="1" comment="ofed is &lt;1.5.4.1-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200379" version="1" comment="ofed-doc is &lt;1.5.4.1-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200380" version="1" comment="ofed-kmp-default is &lt;1.5.4.1_3.0.101_63-20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200381" version="1" comment="ofed-kmp-pae is &lt;1.5.4.1_3.0.101_63-20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200382" version="1" comment="ofed-kmp-ppc64 is &lt;1.5.4.1_3.0.101_63-20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200383" version="1" comment="ofed-kmp-trace is &lt;1.5.4.1_3.0.101_63-20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200384" version="1" comment="openCryptoki is &lt;3.2-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200385" version="1" comment="openCryptoki-32bit is &lt;3.2-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200386" version="1" comment="openCryptoki-64bit is &lt;3.2-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200387" version="1" comment="openslp is &lt;1.2.0-172.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200388" version="1" comment="openslp-32bit is &lt;1.2.0-172.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200389" version="1" comment="openslp-server is &lt;1.2.0-172.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200390" version="1" comment="openslp-x86 is &lt;1.2.0-172.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200391" version="1" comment="openvpn is &lt;2.0.9-143.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200392" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200393" version="1" comment="pam is &lt;1.1.5-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200394" version="1" comment="pam-32bit is &lt;1.1.5-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200395" version="1" comment="pam-doc is &lt;1.1.5-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200396" version="1" comment="pam-x86 is &lt;1.1.5-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200397" version="1" comment="perl is &lt;5.10.0-64.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200398" version="1" comment="perl-32bit is &lt;5.10.0-64.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200399" version="1" comment="perl-Module-Build is &lt;0.2808.01-0.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200400" version="1" comment="perl-Test-Simple is &lt;0.72-0.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200401" version="1" comment="perl-base is &lt;5.10.0-64.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200402" version="1" comment="perl-doc is &lt;5.10.0-64.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200403" version="1" comment="perl-x86 is &lt;5.10.0-64.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200404" version="1" comment="popt is &lt;1.7-37.63.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200405" version="1" comment="popt-32bit is &lt;1.7-37.63.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200406" version="1" comment="popt-x86 is &lt;1.7-37.63.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200407" version="1" comment="rpm is &lt;4.4.2.3-37.63.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200408" version="1" comment="rpm-32bit is &lt;4.4.2.3-37.63.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200409" version="1" comment="rpm-x86 is &lt;4.4.2.3-37.63.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200410" version="1" comment="powerpc-utils is &lt;1.2.22-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200411" version="1" comment="ppc64-diag is &lt;2.6.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200412" version="1" comment="ppp is &lt;2.4.5.git-2.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200413" version="1" comment="procmail is &lt;3.22-240.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200414" version="1" comment="puppet is &lt;2.7.26-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200415" version="1" comment="puppet-server is &lt;2.7.26-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200416" version="1" comment="pure-ftpd is &lt;1.0.22-3.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200417" version="1" comment="python is &lt;2.6.9-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200418" version="1" comment="python-32bit is &lt;2.6.9-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200419" version="1" comment="python-curses is &lt;2.6.9-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200420" version="1" comment="python-demo is &lt;2.6.9-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200421" version="1" comment="python-gdbm is &lt;2.6.9-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200422" version="1" comment="python-idle is &lt;2.6.9-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200423" version="1" comment="python-tk is &lt;2.6.9-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200424" version="1" comment="python-x86 is &lt;2.6.9-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200425" version="1" comment="python-imaging is &lt;1.1.6-168.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200426" version="1" comment="python-lxml is &lt;2.3.6-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200427" version="1" comment="python-pywbem is &lt;0.7-6.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200428" version="1" comment="quagga is &lt;0.99.15-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200429" version="1" comment="radvd is &lt;1.1-1.24.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200430" version="1" comment="rsyslog is &lt;5.10.1-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200431" version="1" comment="rsyslog-diag-tools is &lt;5.10.1-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200432" version="1" comment="rsyslog-doc is &lt;5.10.1-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200433" version="1" comment="rsyslog-module-gssapi is &lt;5.10.1-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200434" version="1" comment="rsyslog-module-gtls is &lt;5.10.1-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200435" version="1" comment="rsyslog-module-mysql is &lt;5.10.1-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200436" version="1" comment="rsyslog-module-pgsql is &lt;5.10.1-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200437" version="1" comment="rsyslog-module-relp is &lt;5.10.1-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200438" version="1" comment="rsyslog-module-snmp is &lt;5.10.1-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200439" version="1" comment="rsyslog-module-udpspoof is &lt;5.10.1-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200440" version="1" comment="ruby is &lt;1.8.7.p357-0.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200441" version="1" comment="ruby-doc-html is &lt;1.8.7.p357-0.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200442" version="1" comment="ruby-tk is &lt;1.8.7.p357-0.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200443" version="1" comment="sblim-sfcb is &lt;1.3.11-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200444" version="1" comment="sendmail is &lt;8.14.3-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200445" version="1" comment="shim is &lt;0.7.318.81ee561d-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200446" version="1" comment="squid is &lt;2.7.STABLE5-2.12.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200447" version="1" comment="squid3 is &lt;3.1.12-8.16.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200448" version="1" comment="star is &lt;1.5final-28.23.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200449" version="1" comment="strongswan is &lt;4.4.0-6.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200450" version="1" comment="strongswan-doc is &lt;4.4.0-6.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200451" version="1" comment="sudo is &lt;1.7.6p2-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200452" version="1" comment="sysconfig is &lt;0.71.61-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200453" version="1" comment="sysstat is &lt;8.1.5-7.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200454" version="1" comment="sysstat-isag is &lt;8.1.5-7.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200455" version="1" comment="tar is &lt;1.26-1.2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200456" version="1" comment="tcpdump is &lt;3.9.8-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200457" version="1" comment="tomcat6 is &lt;6.0.41-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200458" version="1" comment="tomcat6-admin-webapps is &lt;6.0.41-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200459" version="1" comment="tomcat6-docs-webapp is &lt;6.0.41-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200460" version="1" comment="tomcat6-javadoc is &lt;6.0.41-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200461" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.41-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200462" version="1" comment="tomcat6-lib is &lt;6.0.41-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200463" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.41-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200464" version="1" comment="tomcat6-webapps is &lt;6.0.41-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200465" version="1" comment="unzip is &lt;6.00-11.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200466" version="1" comment="vino is &lt;2.28.1-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200467" version="1" comment="vino-lang is &lt;2.28.1-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200468" version="1" comment="virt-utils is &lt;1.2.1-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200469" version="1" comment="vsftpd is &lt;2.0.7-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200470" version="1" comment="wget is &lt;1.11.4-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200471" version="1" comment="wireshark is &lt;1.10.13-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200472" version="1" comment="wpa_supplicant is &lt;0.7.1-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200473" version="1" comment="xalan-j2 is &lt;2.7.0-217.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200474" version="1" comment="xen is &lt;4.4.2_08-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200475" version="1" comment="xen-doc-html is &lt;4.4.2_08-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200476" version="1" comment="xen-kmp-default is &lt;4.4.2_08_3.0.101_63-1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200477" version="1" comment="xen-kmp-pae is &lt;4.4.2_08_3.0.101_63-1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200478" version="1" comment="xen-libs is &lt;4.4.2_08-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200479" version="1" comment="xen-libs-32bit is &lt;4.4.2_08-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200480" version="1" comment="xen-tools is &lt;4.4.2_08-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200481" version="1" comment="xen-tools-domU is &lt;4.4.2_08-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200482" version="1" comment="xinetd is &lt;2.3.14-130.133" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200483" version="1" comment="xorg-x11 is &lt;7.4-9.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200484" version="1" comment="xorg-x11-xauth is &lt;7.4-9.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200485" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200486" version="1" comment="xorg-x11-server is &lt;7.4-27.105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200487" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200488" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200489" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200490" version="1" comment="xorg-x11-libX11-x86 is &lt;7.4-5.11.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200491" version="1" comment="xorg-x11-libXext is &lt;7.4-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200492" version="1" comment="xorg-x11-libXext-32bit is &lt;7.4-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200493" version="1" comment="xorg-x11-libXext-x86 is &lt;7.4-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200494" version="1" comment="xorg-x11-libXfixes is &lt;7.4-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200495" version="1" comment="xorg-x11-libXfixes-32bit is &lt;7.4-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200496" version="1" comment="xorg-x11-libXfixes-x86 is &lt;7.4-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200497" version="1" comment="xorg-x11-libXp is &lt;7.4-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200498" version="1" comment="xorg-x11-libXp-32bit is &lt;7.4-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200499" version="1" comment="xorg-x11-libXp-x86 is &lt;7.4-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200500" version="1" comment="xorg-x11-libXrender is &lt;7.4-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200501" version="1" comment="xorg-x11-libXrender-32bit is &lt;7.4-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200502" version="1" comment="xorg-x11-libXrender-x86 is &lt;7.4-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200503" version="1" comment="xorg-x11-libXt is &lt;7.4-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200504" version="1" comment="xorg-x11-libXt-32bit is &lt;7.4-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200505" version="1" comment="xorg-x11-libXt-x86 is &lt;7.4-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200506" version="1" comment="xorg-x11-libXv is &lt;7.4-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200507" version="1" comment="xorg-x11-libXv-32bit is &lt;7.4-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200508" version="1" comment="xorg-x11-libXv-x86 is &lt;7.4-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200509" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200510" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200511" version="1" comment="xorg-x11-libs-x86 is &lt;7.4-8.26.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200512" version="1" comment="xorg-x11-server-rdp is &lt;7.3.99-3.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200513" version="1" comment="yast2 is &lt;2.17.140-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200514" version="1" comment="yast2-core is &lt;2.17.46-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234408" version="1" comment="curl-openssl1 is &lt;7.19.7-1.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234409" version="1" comment="libcurl4-openssl1 is &lt;7.19.7-1.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234410" version="1" comment="libcurl4-openssl1-32bit is &lt;7.19.7-1.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117400" version="1" comment="sles-release is &gt;=11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234411" version="1" comment="libcurl4-openssl1 is &lt;7.19.7-0.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234412" version="1" comment="libcurl4-openssl1-32bit is &lt;7.19.7-0.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234413" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234414" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234415" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234416" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234417" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234418" version="1" comment="openssl1 is &lt;1.0.1g-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234419" version="1" comment="openssl1-doc is &lt;1.0.1g-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234420" version="1" comment="libslp1-openssl1 is &lt;1.2.0-172.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234421" version="1" comment="libsnmp15-openssl1 is &lt;5.4.2.1-8.12.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234422" version="1" comment="libsnmp15-openssl1-32bit is &lt;5.4.2.1-8.12.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234423" version="1" comment="mailx-openssl1 is &lt;12.5-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203760" version="1" comment="openssh-openssl1 is &lt;6.6p1-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203761" version="1" comment="openssh-openssl1-helpers is &lt;6.6p1-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203810" version="1" comment="openvpn-openssl1 is &lt;2.3.2-0.10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203811" version="1" comment="openvpn-openssl1-down-root-plugin is &lt;2.3.2-0.10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203812" version="1" comment="sblim-sfcb-openssl1 is &lt;1.3.11-0.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234424" version="1" comment="stunnel-openssl1 is &lt;4.54-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234425" version="1" comment="vsftpd-openssl1 is &lt;2.0.7-4.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234426" version="1" comment="wget-openssl1 is &lt;1.11.4-1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200515" version="1" comment="GraphicsMagick is &lt;1.2.5-4.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200516" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200517" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117399" version="1" comment="sle-sdk-release is ==11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200518" version="1" comment="ImageMagick is &lt;6.4.3.6-7.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200519" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200520" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200521" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200522" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200523" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200524" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200525" version="1" comment="LibVNCServer-devel is &lt;0.9.1-154" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200526" version="1" comment="Mesa-devel is &lt;9.0.3-0.28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200527" version="1" comment="Mesa-devel-32bit is &lt;9.0.3-0.28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200528" version="1" comment="MozillaFirefox-devel is &lt;31.7.0esr-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200529" version="1" comment="NetworkManager-devel is &lt;0.7.1_git20090811-3.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200530" version="1" comment="OpenEXR-devel is &lt;1.6.1-83.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200531" version="1" comment="PackageKit-devel is &lt;0.3.14-2.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200532" version="1" comment="hal-devel is &lt;0.5.12-23.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200533" version="1" comment="libpackagekit-glib10-devel is &lt;0.3.14-2.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200534" version="1" comment="libpackagekit-qt10 is &lt;0.3.14-2.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200535" version="1" comment="libpackagekit-qt10-devel is &lt;0.3.14-2.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200536" version="1" comment="PolicyKit-devel is &lt;0.9-14.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200537" version="1" comment="Xerces-c is &lt;2.8.0-29.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200538" version="1" comment="libXerces-c-devel is &lt;2.8.0-29.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200539" version="1" comment="libXerces-c28 is &lt;2.8.0-29.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200540" version="1" comment="a2ps-devel is &lt;4.13-1326.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200541" version="1" comment="ant-antlr is &lt;1.7.1-16.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200542" version="1" comment="ant-apache-bcel is &lt;1.7.1-16.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200543" version="1" comment="ant-apache-bsf is &lt;1.7.1-16.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200544" version="1" comment="ant-apache-log4j is &lt;1.7.1-16.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200545" version="1" comment="ant-apache-oro is &lt;1.7.1-16.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200546" version="1" comment="ant-apache-regexp is &lt;1.7.1-16.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200547" version="1" comment="ant-apache-resolver is &lt;1.7.1-16.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200548" version="1" comment="ant-commons-logging is &lt;1.7.1-16.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200549" version="1" comment="ant-javadoc is &lt;1.7.1-20.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200550" version="1" comment="ant-javamail is &lt;1.7.1-16.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200551" version="1" comment="ant-jdepend is &lt;1.7.1-16.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200552" version="1" comment="ant-jmf is &lt;1.7.1-16.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200553" version="1" comment="ant-junit is &lt;1.7.1-16.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200554" version="1" comment="ant-manual is &lt;1.7.1-20.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200555" version="1" comment="ant-nodeps is &lt;1.7.1-16.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200556" version="1" comment="ant-scripts is &lt;1.7.1-20.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200557" version="1" comment="ant-swing is &lt;1.7.1-16.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200558" version="1" comment="apache2-devel is &lt;2.2.12-1.51.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200559" version="1" comment="apache2-mod_fcgid is &lt;2.2-31.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200560" version="1" comment="apache2-mod_perl-devel is &lt;2.0.4-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200561" version="1" comment="augeas-devel is &lt;0.9.0-3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200562" version="1" comment="avahi-compat-howl-devel is &lt;0.6.23-11.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200563" version="1" comment="avahi-compat-mDNSResponder-devel is &lt;0.6.23-11.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200564" version="1" comment="libavahi-devel is &lt;0.6.23-11.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200565" version="1" comment="libhowl0 is &lt;0.6.23-11.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200566" version="1" comment="python-avahi is &lt;0.6.23-11.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200567" version="1" comment="bind-devel is &lt;9.9.6P1-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200568" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200569" version="1" comment="binutils-devel is &lt;2.24-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200570" version="1" comment="binutils-devel-32bit is &lt;2.24-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200571" version="1" comment="binutils-gold is &lt;2.24-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200572" version="1" comment="cross-ppc-binutils is &lt;2.24-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200573" version="1" comment="cross-spu-binutils is &lt;2.24-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200574" version="1" comment="boinc-client is &lt;6.2.18-4.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200575" version="1" comment="boinc-client-devel is &lt;6.2.18-4.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200576" version="1" comment="boost-devel is &lt;1.36.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200577" version="1" comment="boost-devel-32bit is &lt;1.36.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200578" version="1" comment="boost-doc is &lt;1.36.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200579" version="1" comment="libboost_date_time1_36_0 is &lt;1.36.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200580" version="1" comment="libboost_date_time1_36_0-32bit is &lt;1.36.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200581" version="1" comment="libboost_filesystem1_36_0 is &lt;1.36.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200582" version="1" comment="libboost_filesystem1_36_0-32bit is &lt;1.36.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200583" version="1" comment="libboost_graph1_36_0 is &lt;1.36.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200584" version="1" comment="libboost_graph1_36_0-32bit is &lt;1.36.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200585" version="1" comment="libboost_iostreams1_36_0 is &lt;1.36.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200586" version="1" comment="libboost_iostreams1_36_0-32bit is &lt;1.36.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200587" version="1" comment="libboost_math1_36_0 is &lt;1.36.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200588" version="1" comment="libboost_math1_36_0-32bit is &lt;1.36.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200589" version="1" comment="libboost_mpi1_36_0 is &lt;1.36.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200590" version="1" comment="libboost_program_options1_36_0-32bit is &lt;1.36.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200591" version="1" comment="libboost_python1_36_0 is &lt;1.36.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200592" version="1" comment="libboost_python1_36_0-32bit is &lt;1.36.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200593" version="1" comment="libboost_regex1_36_0-32bit is &lt;1.36.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200594" version="1" comment="libboost_serialization1_36_0 is &lt;1.36.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200595" version="1" comment="libboost_serialization1_36_0-32bit is &lt;1.36.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200596" version="1" comment="libboost_signals1_36_0-32bit is &lt;1.36.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200597" version="1" comment="libboost_system1_36_0 is &lt;1.36.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200598" version="1" comment="libboost_system1_36_0-32bit is &lt;1.36.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200599" version="1" comment="libboost_test1_36_0 is &lt;1.36.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200600" version="1" comment="libboost_test1_36_0-32bit is &lt;1.36.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200601" version="1" comment="libboost_thread1_36_0-32bit is &lt;1.36.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200602" version="1" comment="libboost_wave1_36_0 is &lt;1.36.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200603" version="1" comment="libboost_wave1_36_0-32bit is &lt;1.36.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200604" version="1" comment="build is &lt;2011.10.10-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200605" version="1" comment="bytefx-data-mysql is &lt;2.6.7-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200606" version="1" comment="mono-data-firebird is &lt;2.6.7-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200607" version="1" comment="mono-data-oracle is &lt;2.6.7-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200608" version="1" comment="mono-data-sybase is &lt;2.6.7-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200609" version="1" comment="mono-devel is &lt;2.6.7-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200610" version="1" comment="mono-extras is &lt;2.6.7-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200611" version="1" comment="mono-jscript is &lt;2.6.7-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200612" version="1" comment="mono-wcf is &lt;2.6.7-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200613" version="1" comment="mono-winfxcore is &lt;2.6.7-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200614" version="1" comment="monodoc-core is &lt;2.6.7-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200615" version="1" comment="coolkey-devel is &lt;1.1.0-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200616" version="1" comment="cpp48 is &lt;4.8.3+r212056-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200617" version="1" comment="gcc48 is &lt;4.8.3+r212056-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200618" version="1" comment="gcc48-32bit is &lt;4.8.3+r212056-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200619" version="1" comment="gcc48-c++ is &lt;4.8.3+r212056-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200620" version="1" comment="gcc48-fortran is &lt;4.8.3+r212056-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200621" version="1" comment="gcc48-fortran-32bit is &lt;4.8.3+r212056-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200622" version="1" comment="gcc48-info is &lt;4.8.3+r212056-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200623" version="1" comment="gcc48-locale is &lt;4.8.3+r212056-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200624" version="1" comment="libasan0 is &lt;4.8.3+r212056-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200625" version="1" comment="libatomic1 is &lt;4.8.3+r212056-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200626" version="1" comment="libgfortran3-32bit is &lt;4.8.3+r212056-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200627" version="1" comment="libitm1 is &lt;4.8.3+r212056-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200628" version="1" comment="libquadmath0-32bit is &lt;4.8.3+r212056-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200629" version="1" comment="libstdc++48-devel is &lt;4.8.3+r212056-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200630" version="1" comment="libstdc++48-devel-32bit is &lt;4.8.3+r212056-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200631" version="1" comment="libtsan0 is &lt;4.8.3+r212056-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200632" version="1" comment="cscope is &lt;15.6-95" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200633" version="1" comment="ctdb-devel is &lt;1.0.114.6-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200634" version="1" comment="cups-devel is &lt;1.3.9-8.46.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200635" version="1" comment="cyrus-imapd-devel is &lt;2.3.11-60.65.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200636" version="1" comment="dbus-1-devel is &lt;1.2.10-3.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200637" version="1" comment="dbus-1-devel-doc is &lt;1.2.10-3.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200638" version="1" comment="dbus-1-glib-devel is &lt;0.76-34.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200639" version="1" comment="derby is &lt;10.3.1.4-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200640" version="1" comment="dhcp-devel is &lt;4.2.4.P2-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200641" version="1" comment="e2fsprogs-devel is &lt;1.41.9-2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200642" version="1" comment="libcom_err-devel is &lt;1.41.9-2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200643" version="1" comment="libcom_err-devel-32bit is &lt;1.41.9-2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200644" version="1" comment="libext2fs-devel is &lt;1.41.9-2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200645" version="1" comment="libext2fs-devel-32bit is &lt;1.41.9-2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200646" version="1" comment="libext2fs2-32bit is &lt;1.41.9-2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200647" version="1" comment="libext2fs2-x86 is &lt;1.41.9-2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200648" version="1" comment="empathy is &lt;2.28.2-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200649" version="1" comment="empathy-devel is &lt;2.28.2-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200650" version="1" comment="empathy-lang is &lt;2.28.2-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200651" version="1" comment="evince-devel is &lt;2.28.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200652" version="1" comment="evolution is &lt;2.28.2-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200653" version="1" comment="evolution-devel is &lt;2.28.2-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200654" version="1" comment="evolution-lang is &lt;2.28.2-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200655" version="1" comment="evolution-data-server-devel is &lt;2.28.2-0.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200656" version="1" comment="file-devel is &lt;4.24-43.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200657" version="1" comment="fileshareset is &lt;2.0-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200658" version="1" comment="kdebase3 is &lt;3.5.10-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200659" version="1" comment="kdebase3-32bit is &lt;3.5.10-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200660" version="1" comment="kdebase3-devel is &lt;3.5.10-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200661" version="1" comment="misc-console-font is &lt;3.5.10-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200662" version="1" comment="finch is &lt;2.6.6-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200663" version="1" comment="finch-devel is &lt;2.6.6-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200664" version="1" comment="libpurple is &lt;2.6.6-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200665" version="1" comment="libpurple-devel is &lt;2.6.6-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200666" version="1" comment="libpurple-lang is &lt;2.6.6-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200667" version="1" comment="pidgin is &lt;2.6.6-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200668" version="1" comment="pidgin-devel is &lt;2.6.6-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200669" version="1" comment="flac-devel is &lt;1.2.1-68.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200670" version="1" comment="libFLAC++6-32bit is &lt;1.2.1-68.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200671" version="1" comment="libFLAC++6-x86 is &lt;1.2.1-68.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200672" version="1" comment="freeradius-server-devel is &lt;2.1.1-7.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200673" version="1" comment="freetype2-devel is &lt;2.3.7-25.35.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200674" version="1" comment="freetype2-devel-32bit is &lt;2.3.7-25.35.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200675" version="1" comment="fuse-devel is &lt;2.8.7-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200676" version="1" comment="gd-devel is &lt;2.0.36.RC1-52.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200677" version="1" comment="gdk-pixbuf is &lt;0.22.0-294.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200678" version="1" comment="gdk-pixbuf-32bit is &lt;0.22.0-294.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200679" version="1" comment="gdk-pixbuf-devel is &lt;0.22.0-294.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200680" version="1" comment="ghostscript-devel is &lt;8.62-32.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200681" version="1" comment="ghostscript-ijs-devel is &lt;8.62-32.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200682" version="1" comment="libgimpprint-devel is &lt;4.2.7-32.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200683" version="1" comment="gimp is &lt;2.6.2-3.34.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200684" version="1" comment="gimp-devel is &lt;2.6.2-3.34.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200685" version="1" comment="gimp-lang is &lt;2.6.2-3.34.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200686" version="1" comment="gimp-plugins-python is &lt;2.6.2-3.34.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200687" version="1" comment="git is &lt;1.7.12.4-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200688" version="1" comment="git-arch is &lt;1.7.12.4-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200689" version="1" comment="git-core is &lt;1.7.12.4-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200690" version="1" comment="git-cvs is &lt;1.7.12.4-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200691" version="1" comment="git-daemon is &lt;1.7.12.4-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200692" version="1" comment="git-email is &lt;1.7.12.4-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200693" version="1" comment="git-gui is &lt;1.7.12.4-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200694" version="1" comment="git-svn is &lt;1.7.12.4-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200695" version="1" comment="git-web is &lt;1.7.12.4-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200696" version="1" comment="gitk is &lt;1.7.12.4-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200697" version="1" comment="glib2-devel is &lt;2.22.5-0.8.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200698" version="1" comment="glib2-devel-32bit is &lt;2.22.5-0.8.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200699" version="1" comment="libgio-fam is &lt;2.22.5-0.8.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200700" version="1" comment="gmime-2_4-devel is &lt;2.4.8-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200701" version="1" comment="gmime-devel is &lt;2.2.23-1.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200702" version="1" comment="gmime-sharp is &lt;2.2.23-1.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200703" version="1" comment="gnucash is &lt;2.2.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200704" version="1" comment="gnucash-devel is &lt;2.2.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200705" version="1" comment="gnucash-lang is &lt;2.2.7-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200706" version="1" comment="gstreamer-0_10-plugins-base-devel is &lt;0.10.35-5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200707" version="1" comment="gtk2-devel is &lt;2.18.9-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200708" version="1" comment="gtk2-devel-32bit is &lt;2.18.9-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200709" version="1" comment="ibutils-devel is &lt;1.5.7-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200710" version="1" comment="ibutils-devel-32bit is &lt;1.5.7-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200711" version="1" comment="icu is &lt;4.0-7.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200712" version="1" comment="libicu-devel is &lt;4.0-7.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200713" version="1" comment="libicu-devel-32bit is &lt;4.0-7.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200714" version="1" comment="imlib is &lt;1.9.14-401" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200715" version="1" comment="imlib-32bit is &lt;1.9.14-401" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200716" version="1" comment="imlib-config is &lt;1.9.14-401" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200717" version="1" comment="imlib-devel is &lt;1.9.14-401" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200718" version="1" comment="imlib-x86 is &lt;1.9.14-401" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200719" version="1" comment="imlib2 is &lt;1.4.2-2.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200720" version="1" comment="imlib2-devel is &lt;1.4.2-2.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200721" version="1" comment="imlib2-filters is &lt;1.4.2-2.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200722" version="1" comment="imlib2-loaders is &lt;1.4.2-2.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200723" version="1" comment="inkscape is &lt;0.46-62.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200724" version="1" comment="inkscape-extensions-dia is &lt;0.46-62.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200725" version="1" comment="inkscape-extensions-extra is &lt;0.46-62.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200726" version="1" comment="inkscape-extensions-fig is &lt;0.46-62.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200727" version="1" comment="inkscape-extensions-gimp is &lt;0.46-62.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200728" version="1" comment="inkscape-lang is &lt;0.46-62.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200729" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr3.0-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200730" version="1" comment="kdebase4-workspace-devel is &lt;4.3.5-0.12.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200731" version="1" comment="kdelibs3-arts is &lt;3.5.10-23.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200732" version="1" comment="kdelibs3-arts-32bit is &lt;3.5.10-23.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200733" version="1" comment="kdelibs3-arts-x86 is &lt;3.5.10-23.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200734" version="1" comment="kdelibs3-devel is &lt;3.5.10-23.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200735" version="1" comment="kdelibs3-doc is &lt;3.5.10-23.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200736" version="1" comment="libkde4-devel is &lt;4.3.5-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200737" version="1" comment="libkdecore4-devel is &lt;4.3.5-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200738" version="1" comment="kernel-docs is &lt;3.0.101-63" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200739" version="1" comment="kopete-devel is &lt;4.3.5-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200740" version="1" comment="krb5-devel is &lt;1.6.3-133.49.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200741" version="1" comment="krb5-devel-32bit is &lt;1.6.3-133.49.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200742" version="1" comment="libQtWebKit-devel is &lt;4.6.3-5.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200743" version="1" comment="libqt4-devel is &lt;4.6.3-5.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200744" version="1" comment="libqt4-devel-doc is &lt;4.6.3-5.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200745" version="1" comment="libqt4-devel-doc-data is &lt;4.6.3-5.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200746" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.6.3-5.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200747" version="1" comment="libqt4-sql-mysql-x86 is &lt;4.6.3-5.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200748" version="1" comment="libqt4-sql-postgresql is &lt;4.6.3-5.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200749" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.6.3-5.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200750" version="1" comment="libqt4-sql-postgresql-x86 is &lt;4.6.3-5.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200751" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.6.3-5.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200752" version="1" comment="libqt4-sql-sqlite-x86 is &lt;4.6.3-5.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200753" version="1" comment="libqt4-sql-unixODBC is &lt;4.6.3-5.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200754" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.6.3-5.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200755" version="1" comment="libqt4-sql-unixODBC-x86 is &lt;4.6.3-5.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200756" version="1" comment="libadns-devel is &lt;1.4-73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200757" version="1" comment="libapr-util1-devel is &lt;1.3.4-12.22.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200758" version="1" comment="libapr-util1-devel-32bit is &lt;1.3.4-12.22.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200759" version="1" comment="libapr1-devel is &lt;1.3.3-11.18.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200760" version="1" comment="libapr1-devel-32bit is &lt;1.3.3-11.18.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200761" version="1" comment="libarchive-devel is &lt;2.5.5-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200762" version="1" comment="libasm-devel is &lt;0.152-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200763" version="1" comment="libdw-devel is &lt;0.152-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200764" version="1" comment="libebl-devel is &lt;0.152-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200765" version="1" comment="libelf-devel is &lt;0.152-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200766" version="1" comment="libblkid-devel is &lt;2.19.1-6.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200767" version="1" comment="libblkid-devel-32bit is &lt;2.19.1-6.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200768" version="1" comment="libuuid-devel is &lt;2.19.1-6.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200769" version="1" comment="libuuid-devel-32bit is &lt;2.19.1-6.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200770" version="1" comment="libbz2-devel is &lt;1.0.5-34.253" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200771" version="1" comment="libcap-devel is &lt;2.11-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200772" version="1" comment="libcgroup-devel is &lt;0.41.rc1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200773" version="1" comment="libcurl-devel is &lt;7.19.7-1.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200774" version="1" comment="libdhcp6client-1_0-2 is &lt;1.0.22-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200775" version="1" comment="libdhcp6client-devel is &lt;1.0.22-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200776" version="1" comment="libdrm-devel is &lt;2.4.52-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200777" version="1" comment="libdrm-devel-32bit is &lt;2.4.52-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200778" version="1" comment="libevent-devel is &lt;1.4.5-24.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200779" version="1" comment="libexif-devel is &lt;0.6.17-2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200780" version="1" comment="libexiv2-4-32bit is &lt;0.17.1-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200781" version="1" comment="libexiv2-4-x86 is &lt;0.17.1-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200782" version="1" comment="libexiv2-devel is &lt;0.17.1-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200783" version="1" comment="libexpat-devel is &lt;2.0.1-88.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200784" version="1" comment="libgadu is &lt;1.8.2-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200785" version="1" comment="libgadu-devel is &lt;1.8.2-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200786" version="1" comment="libgcrypt-devel is &lt;1.5.0-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200787" version="1" comment="libgcrypt-devel-32bit is &lt;1.5.0-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200788" version="1" comment="libgnomesu-devel is &lt;1.0.0-307.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200789" version="1" comment="libgnutls-devel is &lt;2.4.1-24.39.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200790" version="1" comment="libgnutls-extra-devel is &lt;2.4.1-24.39.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200791" version="1" comment="libgpgme-devel is &lt;1.1.6-25.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200792" version="1" comment="libgpgme11-32bit is &lt;1.1.6-25.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200793" version="1" comment="libgpgme11-x86 is &lt;1.1.6-25.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200794" version="1" comment="libgtop-2_0-7-32bit is &lt;2.28.0-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200795" version="1" comment="libgtop-2_0-7-x86 is &lt;2.28.0-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200796" version="1" comment="libgtop-devel is &lt;2.28.0-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200797" version="1" comment="libguestfs-devel is &lt;1.20.12-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200798" version="1" comment="libid3tag is &lt;0.15.1b-130" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200799" version="1" comment="libid3tag-devel is &lt;0.15.1b-130" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200800" version="1" comment="libjasper-devel is &lt;1.900.1-134.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200801" version="1" comment="libjpeg-devel is &lt;6.2.0-879.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200802" version="1" comment="libjpeg-devel-32bit is &lt;6.2.0-879.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200803" version="1" comment="libksba-devel is &lt;1.0.4-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200804" version="1" comment="liblcms-devel is &lt;1.17-77.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200805" version="1" comment="liblcms-devel-32bit is &lt;1.17-77.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200806" version="1" comment="python-lcms is &lt;1.17-77.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200807" version="1" comment="libldb-devel is &lt;3.6.3-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200808" version="1" comment="libnetapi-devel is &lt;3.6.3-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200809" version="1" comment="libnetapi0 is &lt;3.6.3-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200810" version="1" comment="libsmbclient-devel is &lt;3.6.3-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200811" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200812" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200813" version="1" comment="libtalloc-devel is &lt;3.6.3-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200814" version="1" comment="libtdb-devel is &lt;3.6.3-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200815" version="1" comment="libtevent-devel is &lt;3.6.3-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200816" version="1" comment="libwbclient-devel is &lt;3.6.3-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200817" version="1" comment="samba-devel is &lt;3.6.3-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200818" version="1" comment="samba-test is &lt;3.6.3-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200819" version="1" comment="libmikmod is &lt;3.1.11a-116.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200820" version="1" comment="libmikmod-devel is &lt;3.1.11a-116.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200821" version="1" comment="mpfr-devel is &lt;2.3.2-3.118" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200822" version="1" comment="mpfr-devel-32bit is &lt;2.3.2-3.118" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200823" version="1" comment="libmspack-devel is &lt;0.0.20060920alpha-74.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200824" version="1" comment="libmusicbrainz-devel is &lt;2.1.5-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200825" version="1" comment="libmysqlclient-devel is &lt;5.0.96-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200826" version="1" comment="libmysqlclient_r15-32bit is &lt;5.0.96-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200827" version="1" comment="libmysqlclient_r15-x86 is &lt;5.0.96-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200828" version="1" comment="libneon-devel is &lt;0.29.6-6.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200829" version="1" comment="libnetpbm-devel is &lt;10.26.44-101.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200830" version="1" comment="libnetpbm-devel-32bit is &lt;10.26.44-101.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200831" version="1" comment="newt-devel is &lt;0.52.10-1.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200832" version="1" comment="newt-static is &lt;0.52.10-1.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200833" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200834" version="1" comment="libotr-devel is &lt;3.2.0-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200835" version="1" comment="libpcp3 is &lt;3.6.10-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200836" version="1" comment="pcp is &lt;3.6.10-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200837" version="1" comment="pcp-devel is &lt;3.6.10-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200838" version="1" comment="pcp-import-iostat2pcp is &lt;3.6.10-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200839" version="1" comment="pcp-import-mrtg2pcp is &lt;3.6.10-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200840" version="1" comment="pcp-import-sar2pcp is &lt;3.6.10-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200841" version="1" comment="pcp-import-sheet2pcp is &lt;3.6.10-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200842" version="1" comment="perl-PCP-LogImport is &lt;3.6.10-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200843" version="1" comment="perl-PCP-LogSummary is &lt;3.6.10-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200844" version="1" comment="perl-PCP-MMV is &lt;3.6.10-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200845" version="1" comment="perl-PCP-PMDA is &lt;3.6.10-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200846" version="1" comment="libpixman-1-0-devel is &lt;0.24.4-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200847" version="1" comment="libpng-devel is &lt;1.2.31-5.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200848" version="1" comment="libpng-devel-32bit is &lt;1.2.31-5.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200849" version="1" comment="libpoppler-devel is &lt;0.12.3-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200850" version="1" comment="libpoppler-glib-devel is &lt;0.12.3-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200851" version="1" comment="libpoppler-qt2 is &lt;0.12.3-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200852" version="1" comment="libpoppler-qt3-devel is &lt;0.12.3-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200853" version="1" comment="libpoppler-qt4-devel is &lt;0.12.3-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200854" version="1" comment="libproxy-devel is &lt;0.3.1-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200855" version="1" comment="libpulse-devel is &lt;0.9.23-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200856" version="1" comment="readline-devel is &lt;5.2-147.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200857" version="1" comment="readline-devel-32bit is &lt;5.2-147.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200858" version="1" comment="libreoffice is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200859" version="1" comment="libreoffice-base is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200860" version="1" comment="libreoffice-base-drivers-postgresql is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200861" version="1" comment="libreoffice-base-extensions is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200862" version="1" comment="libreoffice-calc is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200863" version="1" comment="libreoffice-calc-extensions is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200864" version="1" comment="libreoffice-draw is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200865" version="1" comment="libreoffice-draw-extensions is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200866" version="1" comment="libreoffice-filters-optional is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200867" version="1" comment="libreoffice-gnome is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200868" version="1" comment="libreoffice-impress is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200869" version="1" comment="libreoffice-impress-extensions is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200870" version="1" comment="libreoffice-kde is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200871" version="1" comment="libreoffice-kde4 is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200872" version="1" comment="libreoffice-l10n-prebuilt is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200873" version="1" comment="libreoffice-mailmerge is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200874" version="1" comment="libreoffice-math is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200875" version="1" comment="libreoffice-mono is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200876" version="1" comment="libreoffice-officebean is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200877" version="1" comment="libreoffice-pyuno is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200878" version="1" comment="libreoffice-sdk is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200879" version="1" comment="libreoffice-writer is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200880" version="1" comment="libreoffice-writer-extensions is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200881" version="1" comment="libreoffice-branding-upstream is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200882" version="1" comment="libreoffice-icon-themes is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200883" version="1" comment="libreoffice-l10n-af is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200884" version="1" comment="libreoffice-l10n-ar is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200885" version="1" comment="libreoffice-l10n-ca is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200886" version="1" comment="libreoffice-l10n-cs is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200887" version="1" comment="libreoffice-l10n-da is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200888" version="1" comment="libreoffice-l10n-de is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200889" version="1" comment="libreoffice-l10n-el is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200890" version="1" comment="libreoffice-l10n-en-GB is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200891" version="1" comment="libreoffice-l10n-es is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200892" version="1" comment="libreoffice-l10n-fi is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200893" version="1" comment="libreoffice-l10n-fr is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200894" version="1" comment="libreoffice-l10n-gu-IN is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200895" version="1" comment="libreoffice-l10n-hi-IN is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200896" version="1" comment="libreoffice-l10n-hu is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200897" version="1" comment="libreoffice-l10n-it is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200898" version="1" comment="libreoffice-l10n-ja is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200899" version="1" comment="libreoffice-l10n-ko is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200900" version="1" comment="libreoffice-l10n-nb is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200901" version="1" comment="libreoffice-l10n-nl is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200902" version="1" comment="libreoffice-l10n-nn is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200903" version="1" comment="libreoffice-l10n-pl is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200904" version="1" comment="libreoffice-l10n-pt is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200905" version="1" comment="libreoffice-l10n-pt-BR is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200906" version="1" comment="libreoffice-l10n-ru is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200907" version="1" comment="libreoffice-l10n-sk is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200908" version="1" comment="libreoffice-l10n-sv is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200909" version="1" comment="libreoffice-l10n-xh is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200910" version="1" comment="libreoffice-l10n-zh-CN is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200911" version="1" comment="libreoffice-l10n-zh-TW is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200912" version="1" comment="libreoffice-l10n-zu is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200913" version="1" comment="libreoffice-help-cs is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200914" version="1" comment="libreoffice-help-da is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200915" version="1" comment="libreoffice-help-de is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200916" version="1" comment="libreoffice-help-en-GB is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200917" version="1" comment="libreoffice-help-en-US is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200918" version="1" comment="libreoffice-help-es is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200919" version="1" comment="libreoffice-help-fr is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200920" version="1" comment="libreoffice-help-gu-IN is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200921" version="1" comment="libreoffice-help-hi-IN is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200922" version="1" comment="libreoffice-help-hu is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200923" version="1" comment="libreoffice-help-it is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200924" version="1" comment="libreoffice-help-ja is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200925" version="1" comment="libreoffice-help-ko is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200926" version="1" comment="libreoffice-help-nl is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200927" version="1" comment="libreoffice-help-pl is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200928" version="1" comment="libreoffice-help-pt is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200929" version="1" comment="libreoffice-help-pt-BR is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200930" version="1" comment="libreoffice-help-ru is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200931" version="1" comment="libreoffice-help-sv is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200932" version="1" comment="libreoffice-help-zh-CN is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200933" version="1" comment="libreoffice-help-zh-TW is &lt;4.0.3.3.26-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200934" version="1" comment="libreoffice-testtool is &lt;3.4.5.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200935" version="1" comment="librsvg-devel is &lt;2.26.0-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200936" version="1" comment="libsamplerate-devel is &lt;0.1.4-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200937" version="1" comment="libsmi is &lt;0.4.5-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200938" version="1" comment="libsndfile-devel is &lt;1.0.20-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200939" version="1" comment="net-snmp-devel is &lt;5.4.2.1-8.12.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200940" version="1" comment="net-snmp-devel-32bit is &lt;5.4.2.1-8.12.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200941" version="1" comment="libsoup-devel is &lt;2.32.2-4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200942" version="1" comment="libsoup-devel-32bit is &lt;2.32.2-4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200943" version="1" comment="libssh2 is &lt;0.2-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200944" version="1" comment="libssh2-1-32bit is &lt;1.2.9-4.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200945" version="1" comment="libssh2-1-x86 is &lt;1.2.9-4.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200946" version="1" comment="libssh2-devel is &lt;1.2.9-4.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200947" version="1" comment="libsss_idmap-devel is &lt;1.9.4-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200948" version="1" comment="libsss_sudo-devel is &lt;1.9.4-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200949" version="1" comment="libtasn1-devel is &lt;1.5-1.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200950" version="1" comment="libthai is &lt;0.1.9-9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200951" version="1" comment="libthai-devel is &lt;0.1.9-9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200952" version="1" comment="libtiff-devel is &lt;3.8.2-141.154" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200953" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-141.154" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200954" version="1" comment="libtirpc-devel is &lt;0.2.1-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200955" version="1" comment="libtunepimp is &lt;0.5.3-126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200956" version="1" comment="libtunepimp-devel is &lt;0.5.3-126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200957" version="1" comment="libtunepimp5 is &lt;0.5.3-126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200958" version="1" comment="nut-cgi is &lt;2.6.2-0.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200959" version="1" comment="nut-devel is &lt;2.6.2-0.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200960" version="1" comment="libvirt-devel is &lt;1.2.5-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200961" version="1" comment="libvirt-devel-32bit is &lt;1.2.5-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200962" version="1" comment="libvorbis-devel is &lt;1.2.0-79.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200963" version="1" comment="libwebkit-1_0-1 is &lt;1.0.1-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200964" version="1" comment="libwebkit-1_0-2 is &lt;1.2.7-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200965" version="1" comment="libwebkit-devel is &lt;1.2.7-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200966" version="1" comment="libwebkit-lang is &lt;1.2.7-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200967" version="1" comment="libwmf is &lt;0.2.8.4-206.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200968" version="1" comment="libwmf-32bit is &lt;0.2.8.4-206.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200969" version="1" comment="libwmf-devel is &lt;0.2.8.4-206.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200970" version="1" comment="libwmf-gnome is &lt;0.2.8.4-206.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200971" version="1" comment="libwmf-gnome-32bit is &lt;0.2.8.4-206.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200972" version="1" comment="libwmf-gnome-x86 is &lt;0.2.8.4-206.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200973" version="1" comment="libwmf-x86 is &lt;0.2.8.4-206.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200974" version="1" comment="libwpd-0_8-8 is &lt;0.8.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200975" version="1" comment="libwpd-devel is &lt;0.8.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200976" version="1" comment="libwpd-devel-doc is &lt;0.8.14-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200977" version="1" comment="libwsman-devel is &lt;2.2.3-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200978" version="1" comment="openwsman-python is &lt;2.2.3-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200979" version="1" comment="libxcrypt-devel is &lt;3.0.3-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200980" version="1" comment="libxine-devel is &lt;1.1.15-23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200981" version="1" comment="libxine1 is &lt;1.1.15-23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200982" version="1" comment="libxine1-32bit is &lt;1.1.15-23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200983" version="1" comment="libxine1-gnome-vfs is &lt;1.1.15-23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200984" version="1" comment="libxine1-pulse is &lt;1.1.15-23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200985" version="1" comment="libxml is &lt;1.8.17-481.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200986" version="1" comment="libxml-32bit is &lt;1.8.17-481.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200987" version="1" comment="libxml-devel is &lt;1.8.17-481.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200988" version="1" comment="libxml2-devel is &lt;2.7.6-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200989" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200990" version="1" comment="libxslt-devel is &lt;1.1.24-19.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200991" version="1" comment="libxslt-devel-32bit is &lt;1.1.24-19.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200992" version="1" comment="libyaml-devel is &lt;0.1.3-0.10.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200993" version="1" comment="lighttpd is &lt;1.4.20-2.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200994" version="1" comment="lighttpd-mod_cml is &lt;1.4.20-2.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200995" version="1" comment="lighttpd-mod_magnet is &lt;1.4.20-2.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200996" version="1" comment="lighttpd-mod_mysql_vhost is &lt;1.4.20-2.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200997" version="1" comment="lighttpd-mod_rrdtool is &lt;1.4.20-2.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200998" version="1" comment="lighttpd-mod_trigger_b4_dl is &lt;1.4.20-2.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009200999" version="1" comment="lighttpd-mod_webdav is &lt;1.4.20-2.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201000" version="1" comment="lxc-devel is &lt;0.8.0-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201001" version="1" comment="lynx is &lt;2.8.6-143" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201002" version="1" comment="lzo-devel is &lt;2.03-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201003" version="1" comment="lzo-devel-32bit is &lt;2.03-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201004" version="1" comment="memcached is &lt;1.2.6-5.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201005" version="1" comment="mercurial is &lt;2.3.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201006" version="1" comment="mozilla-nspr-devel is &lt;4.10.7-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201007" version="1" comment="mozilla-nss-devel is &lt;3.17.3-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201008" version="1" comment="mozilla-xulrunner192-devel is &lt;1.9.2.27-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201009" version="1" comment="mozilla-xulrunner192-gnome-32bit is &lt;1.9.2.27-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201010" version="1" comment="mozilla-xulrunner192-translations-32bit is &lt;1.9.2.27-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201011" version="1" comment="nagios-devel is &lt;3.0.6-1.25.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201012" version="1" comment="netatalk is &lt;2.0.3-249.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201013" version="1" comment="netatalk-devel is &lt;2.0.3-249.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201014" version="1" comment="novell-ipsec-tools is &lt;0.7.1-2.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201015" version="1" comment="novell-ipsec-tools-devel is &lt;0.7.1-2.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201016" version="1" comment="obex-data-server is &lt;0.4.6-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201017" version="1" comment="ofed-devel is &lt;1.5.4.1-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201018" version="1" comment="openCryptoki-devel is &lt;3.2-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201019" version="1" comment="openldap2-back-perl is &lt;2.4.26-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201020" version="1" comment="openldap2-devel is &lt;2.4.26-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201021" version="1" comment="openldap2-devel-32bit is &lt;2.4.26-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201022" version="1" comment="opensc-devel is &lt;0.11.6-5.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201023" version="1" comment="openslp-devel is &lt;1.2.0-172.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201024" version="1" comment="osc is &lt;0.139.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201025" version="1" comment="pam-devel is &lt;1.1.5-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201026" version="1" comment="pam-devel-32bit is &lt;1.1.5-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201027" version="1" comment="pango-devel is &lt;1.26.2-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201028" version="1" comment="pango-devel-32bit is &lt;1.26.2-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201029" version="1" comment="pcsc-lite-devel is &lt;1.4.102-1.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201030" version="1" comment="perl-DBD-Pg is &lt;2.10.3-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201031" version="1" comment="perl-Tk-devel is &lt;804.028-50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201032" version="1" comment="perl-base-32bit is &lt;5.10.0-64.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201033" version="1" comment="php53-devel is &lt;5.3.17-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201034" version="1" comment="php53-imap is &lt;5.3.17-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201035" version="1" comment="php53-posix is &lt;5.3.17-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201036" version="1" comment="php53-readline is &lt;5.3.17-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201037" version="1" comment="php53-sockets is &lt;5.3.17-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201038" version="1" comment="php53-sqlite is &lt;5.3.17-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201039" version="1" comment="php53-tidy is &lt;5.3.17-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201040" version="1" comment="popt-devel is &lt;1.7-37.63.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201041" version="1" comment="popt-devel-32bit is &lt;1.7-37.63.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201042" version="1" comment="rpm-devel is &lt;4.4.2.3-37.63.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201043" version="1" comment="rpm-devel-32bit is &lt;4.4.2.3-37.63.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201044" version="1" comment="postgresql-devel is &lt;8.3.23-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201045" version="1" comment="postgresql94-devel is &lt;9.4.4-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201046" version="1" comment="ppp-devel is &lt;2.4.5.git-2.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201047" version="1" comment="pwlib is &lt;1.10.10-120.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201048" version="1" comment="pwlib-devel is &lt;1.10.10-120.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201049" version="1" comment="python-crypto is &lt;2.0.1-28.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201050" version="1" comment="python-devel is &lt;2.6.9-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201051" version="1" comment="python-imaging-sane is &lt;1.1.6-168.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201052" version="1" comment="python-logilab-common is &lt;0.56.2-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201053" version="1" comment="python-lxml-doc is &lt;2.3.6-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201054" version="1" comment="python-setuptools is &lt;0.6c11-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201055" version="1" comment="qemu is &lt;0.10.1-0.5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201056" version="1" comment="qt3-devel is &lt;3.3.8b-88" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201057" version="1" comment="qt3-devel-32bit is &lt;3.3.8b-88" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201058" version="1" comment="qt3-devel-doc is &lt;3.3.8b-88" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201059" version="1" comment="qt3-devel-tools is &lt;3.3.8b-88" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201060" version="1" comment="qt3-devel-tools-32bit is &lt;3.3.8b-88" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201061" version="1" comment="quagga-devel is &lt;0.99.15-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201062" version="1" comment="ruby-devel is &lt;1.8.7.p357-0.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201063" version="1" comment="ruby-doc-ri is &lt;1.8.7.p357-0.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201064" version="1" comment="ruby-examples is &lt;1.8.7.p357-0.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201065" version="1" comment="ruby-test-suite is &lt;1.8.7.p357-0.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201066" version="1" comment="rubygem-actionmailer-3_2 is &lt;3.2.12-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201067" version="1" comment="rubygem-actionpack-3_2 is &lt;3.2.12-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201068" version="1" comment="rubygem-activemodel-3_2 is &lt;3.2.12-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201069" version="1" comment="rubygem-activeresource-3_2 is &lt;3.2.12-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201070" version="1" comment="rubygem-rails-3_2 is &lt;3.2.12-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201071" version="1" comment="rubygem-railties-3_2 is &lt;3.2.12-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201072" version="1" comment="rubygem-activerecord-3_2 is &lt;3.2.12-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201073" version="1" comment="rubygem-activesupport-3_2 is &lt;3.2.12-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201074" version="1" comment="rubygem-bundler is &lt;1.7.0-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201075" version="1" comment="rubygem-i18n-0_6 is &lt;0.6.0-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201076" version="1" comment="rubygem-json_pure is &lt;1.2.0-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201077" version="1" comment="rubygem-rack-1_4 is &lt;1.4.5-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201078" version="1" comment="rubygem-rack-ssl is &lt;1.3.2-0.12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201079" version="1" comment="rubygem-rdoc is &lt;3.9.1-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201080" version="1" comment="rubygem-sprockets-2_2 is &lt;2.2.1-0.7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201081" version="1" comment="rxvt-unicode is &lt;9.05-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201082" version="1" comment="sendmail-devel is &lt;8.14.3-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201083" version="1" comment="silc-toolkit is &lt;1.1.7-7.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201084" version="1" comment="silc-toolkit-devel is &lt;1.1.7-7.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201085" version="1" comment="struts is &lt;1.2.9-162.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201086" version="1" comment="struts-javadoc is &lt;1.2.9-162.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201087" version="1" comment="struts-manual is &lt;1.2.9-162.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201088" version="1" comment="subversion is &lt;1.6.17-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201089" version="1" comment="subversion-devel is &lt;1.6.17-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201090" version="1" comment="subversion-perl is &lt;1.6.17-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201091" version="1" comment="subversion-python is &lt;1.6.17-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201092" version="1" comment="subversion-server is &lt;1.6.17-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201093" version="1" comment="subversion-tools is &lt;1.6.17-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201094" version="1" comment="t1lib-devel is &lt;5.1.1-100.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201095" version="1" comment="taglib-devel is &lt;1.5-19.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201096" version="1" comment="telepathy-gabble is &lt;0.7.10-2.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201097" version="1" comment="texlive is &lt;2007-219.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201098" version="1" comment="texlive-arab is &lt;2007-219.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201099" version="1" comment="texlive-bin is &lt;2007-219.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201100" version="1" comment="texlive-bin-cjk is &lt;2007-219.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201101" version="1" comment="texlive-bin-devel is &lt;2007-219.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201102" version="1" comment="texlive-bin-dvilj is &lt;2007-219.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201103" version="1" comment="texlive-bin-jadetex is &lt;2007-219.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201104" version="1" comment="texlive-bin-latex is &lt;2007-219.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201105" version="1" comment="texlive-bin-metapost is &lt;2007-219.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201106" version="1" comment="texlive-bin-musictex is &lt;2007-219.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201107" version="1" comment="texlive-bin-omega is &lt;2007-219.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201108" version="1" comment="texlive-bin-tex4ht is &lt;2007-219.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201109" version="1" comment="texlive-bin-tools is &lt;2007-219.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201110" version="1" comment="texlive-bin-xetex is &lt;2007-219.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201111" version="1" comment="texlive-bin-xmltex is &lt;2007-219.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201112" version="1" comment="texlive-cjk is &lt;2007-219.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201113" version="1" comment="texlive-context is &lt;2007-219.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201114" version="1" comment="texlive-devel is &lt;2007-219.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201115" version="1" comment="texlive-doc is &lt;2007-219.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201116" version="1" comment="texlive-dvilj is &lt;2007-219.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201117" version="1" comment="texlive-jadetex is &lt;2007-219.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201118" version="1" comment="texlive-latex is &lt;2007-219.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201119" version="1" comment="texlive-latex-doc is &lt;2007-219.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201120" version="1" comment="texlive-metapost is &lt;2007-219.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201121" version="1" comment="texlive-musictex is &lt;2007-219.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201122" version="1" comment="texlive-omega is &lt;2007-219.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201123" version="1" comment="texlive-ppower4 is &lt;2007-219.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201124" version="1" comment="texlive-tex4ht is &lt;2007-219.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201125" version="1" comment="texlive-tools is &lt;2007-219.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201126" version="1" comment="texlive-xetex is &lt;2007-219.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201127" version="1" comment="texlive-xmltex is &lt;2007-219.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201128" version="1" comment="trousers-devel is &lt;0.3.10-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201129" version="1" comment="unixODBC_23-devel is &lt;2.3.1-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201130" version="1" comment="valgrind is &lt;3.8.1-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201131" version="1" comment="valgrind-devel is &lt;3.8.1-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201132" version="1" comment="vte-devel is &lt;0.22.5-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201133" version="1" comment="wireshark-devel is &lt;1.10.13-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201134" version="1" comment="xalan-j2-demo is &lt;2.7.0-217.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201135" version="1" comment="xalan-j2-javadoc is &lt;2.7.0-217.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201136" version="1" comment="xalan-j2-manual is &lt;2.7.0-217.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201137" version="1" comment="xen-devel is &lt;4.4.2_08-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201138" version="1" comment="xorg-x11-devel is &lt;7.4-8.26.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201139" version="1" comment="xorg-x11-devel-32bit is &lt;7.4-8.26.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201140" version="1" comment="xorg-x11-libX11-devel is &lt;7.4-5.11.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201141" version="1" comment="xorg-x11-libX11-devel-32bit is &lt;7.4-5.11.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201142" version="1" comment="xorg-x11-libXext-devel is &lt;7.4-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201143" version="1" comment="xorg-x11-libXext-devel-32bit is &lt;7.4-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201144" version="1" comment="xorg-x11-libXfixes-devel is &lt;7.4-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201145" version="1" comment="xorg-x11-libXfixes-devel-32bit is &lt;7.4-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201146" version="1" comment="xorg-x11-libXp-devel is &lt;7.4-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201147" version="1" comment="xorg-x11-libXp-devel-32bit is &lt;7.4-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201148" version="1" comment="xorg-x11-libXrender-devel is &lt;7.4-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201149" version="1" comment="xorg-x11-libXrender-devel-32bit is &lt;7.4-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201150" version="1" comment="xorg-x11-libXt-devel is &lt;7.4-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201151" version="1" comment="xorg-x11-libXt-devel-32bit is &lt;7.4-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201152" version="1" comment="xorg-x11-libXv-devel is &lt;7.4-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201153" version="1" comment="xorg-x11-libXv-devel-32bit is &lt;7.4-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201154" version="1" comment="xorg-x11-libxcb-devel is &lt;7.4-1.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201155" version="1" comment="xorg-x11-libxcb-devel-32bit is &lt;7.4-1.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201156" version="1" comment="xorg-x11-server-sdk is &lt;7.4-27.105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201157" version="1" comment="yast2-core-devel is &lt;2.17.46-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201158" version="1" comment="yast2-devel-doc is &lt;2.17.140-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073773" version="1" comment="sle-sdk-release is ==11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201159" version="1" comment="ImageMagick is &lt;6.4.3.6-7.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201160" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201161" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201162" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201163" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201164" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201165" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201166" version="1" comment="Mesa-devel is &lt;7.11.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201167" version="1" comment="Mesa-devel-32bit is &lt;7.11.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201168" version="1" comment="apache2 is &lt;2.2.12-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201169" version="1" comment="apache2-devel is &lt;2.2.12-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201170" version="1" comment="apache2-doc is &lt;2.2.12-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201171" version="1" comment="apache2-example-pages is &lt;2.2.12-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201172" version="1" comment="apache2-prefork is &lt;2.2.12-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201173" version="1" comment="apache2-utils is &lt;2.2.12-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201174" version="1" comment="apache2-worker is &lt;2.2.12-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201175" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201176" version="1" comment="php5 is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201177" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201178" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201179" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201180" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201181" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201182" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201183" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201184" version="1" comment="php5-devel is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201185" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201186" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201187" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201188" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201189" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201190" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201191" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201192" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201193" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201194" version="1" comment="php5-imap is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201195" version="1" comment="php5-json is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201196" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201197" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201198" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201199" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201200" version="1" comment="php5-ncurses is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201201" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201202" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201203" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201204" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201205" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201206" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201207" version="1" comment="php5-posix is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201208" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201209" version="1" comment="php5-readline is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201210" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201211" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201212" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201213" version="1" comment="php5-sockets is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201214" version="1" comment="php5-sqlite is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201215" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201216" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201217" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201218" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201219" version="1" comment="php5-tidy is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201220" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201221" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201222" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201223" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201224" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201225" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201226" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201227" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201228" version="1" comment="php53-devel is &lt;5.3.8-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201229" version="1" comment="php53-imap is &lt;5.3.8-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201230" version="1" comment="php53-posix is &lt;5.3.8-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201231" version="1" comment="php53-readline is &lt;5.3.8-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201232" version="1" comment="php53-sockets is &lt;5.3.8-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201233" version="1" comment="php53-sqlite is &lt;5.3.8-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201234" version="1" comment="php53-tidy is &lt;5.3.8-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201235" version="1" comment="apache2-mod_security2 is &lt;2.7.1-0.2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201236" version="1" comment="bind-devel is &lt;9.9.4P2-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201237" version="1" comment="bind-devel-32bit is &lt;9.9.4P2-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201238" version="1" comment="bytefx-data-mysql is &lt;2.6.7-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201239" version="1" comment="mono-core is &lt;2.6.7-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201240" version="1" comment="mono-data is &lt;2.6.7-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201241" version="1" comment="mono-data-firebird is &lt;2.6.7-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201242" version="1" comment="mono-data-oracle is &lt;2.6.7-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201243" version="1" comment="mono-data-postgresql is &lt;2.6.7-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201244" version="1" comment="mono-data-sqlite is &lt;2.6.7-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201245" version="1" comment="mono-data-sybase is &lt;2.6.7-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201246" version="1" comment="mono-devel is &lt;2.6.7-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201247" version="1" comment="mono-extras is &lt;2.6.7-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201248" version="1" comment="mono-jscript is &lt;2.6.7-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201249" version="1" comment="mono-locale-extras is &lt;2.6.7-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201250" version="1" comment="mono-nunit is &lt;2.6.7-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201251" version="1" comment="mono-wcf is &lt;2.6.7-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201252" version="1" comment="mono-web is &lt;2.6.7-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201253" version="1" comment="mono-winforms is &lt;2.6.7-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201254" version="1" comment="mono-winfxcore is &lt;2.6.7-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201255" version="1" comment="monodoc-core is &lt;2.6.7-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201256" version="1" comment="libldb-devel is &lt;3.6.3-0.33.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201257" version="1" comment="libnetapi-devel is &lt;3.6.3-0.33.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201258" version="1" comment="libnetapi0 is &lt;3.6.3-0.33.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201259" version="1" comment="libsmbclient-devel is &lt;3.6.3-0.33.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201260" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-0.33.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201261" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-0.33.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201262" version="1" comment="libtalloc-devel is &lt;3.6.3-0.33.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201263" version="1" comment="libtdb-devel is &lt;3.6.3-0.33.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201264" version="1" comment="libtevent-devel is &lt;3.6.3-0.33.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201265" version="1" comment="libwbclient-devel is &lt;3.6.3-0.33.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201266" version="1" comment="samba-devel is &lt;3.6.3-0.33.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201267" version="1" comment="cups-devel is &lt;1.3.9-8.46.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201268" version="1" comment="libcurl-devel is &lt;7.19.7-1.20.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201269" version="1" comment="dbus-1-devel is &lt;1.2.10-3.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201270" version="1" comment="dbus-1-devel-doc is &lt;1.2.10-3.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201271" version="1" comment="dhcp-devel is &lt;4.2.4.P2-0.11.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201272" version="1" comment="finch is &lt;2.6.6-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201273" version="1" comment="finch-devel is &lt;2.6.6-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201274" version="1" comment="libpurple is &lt;2.6.6-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201275" version="1" comment="libpurple-devel is &lt;2.6.6-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201276" version="1" comment="libpurple-lang is &lt;2.6.6-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201277" version="1" comment="pidgin is &lt;2.6.6-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201278" version="1" comment="pidgin-devel is &lt;2.6.6-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201279" version="1" comment="mozilla-nspr-devel is &lt;4.9.2-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201280" version="1" comment="mozilla-nss-devel is &lt;3.13.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201281" version="1" comment="mozilla-nspr-devel is &lt;4.9.3-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201282" version="1" comment="mozilla-nss-devel is &lt;3.14-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201283" version="1" comment="mozilla-nspr-devel is &lt;4.9.4-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201284" version="1" comment="mozilla-nss-devel is &lt;3.14.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201285" version="1" comment="beagle is &lt;0.3.8-56.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201286" version="1" comment="beagle-devel is &lt;0.3.8-56.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201287" version="1" comment="beagle-lang is &lt;0.3.8-56.44.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201288" version="1" comment="mozilla-nspr-devel is &lt;4.9.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201289" version="1" comment="mozilla-nss-devel is &lt;3.14.2-0.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201290" version="1" comment="mozilla-nspr-devel is &lt;4.9.6-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201291" version="1" comment="mozilla-nss-devel is &lt;3.14.3-0.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201292" version="1" comment="freeradius-server-devel is &lt;2.1.1-7.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201293" version="1" comment="freetype2-devel is &lt;2.3.7-25.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201294" version="1" comment="freetype2-devel-32bit is &lt;2.3.7-25.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201295" version="1" comment="git is &lt;1.7.12.4-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201296" version="1" comment="git-arch is &lt;1.7.12.4-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201297" version="1" comment="git-core is &lt;1.7.12.4-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201298" version="1" comment="git-cvs is &lt;1.7.12.4-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201299" version="1" comment="git-daemon is &lt;1.7.12.4-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201300" version="1" comment="git-email is &lt;1.7.12.4-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201301" version="1" comment="git-gui is &lt;1.7.12.4-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201302" version="1" comment="git-svn is &lt;1.7.12.4-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201303" version="1" comment="git-web is &lt;1.7.12.4-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201304" version="1" comment="gitk is &lt;1.7.12.4-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201305" version="1" comment="glibc-html is &lt;2.11.3-17.45.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201306" version="1" comment="glibc-info is &lt;2.11.3-17.45.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201307" version="1" comment="libgnutls-devel is &lt;2.4.1-24.39.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201308" version="1" comment="libgnutls-extra-devel is &lt;2.4.1-24.39.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201309" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201310" version="1" comment="ibutils is &lt;1.5.4-0.7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201311" version="1" comment="ibutils-32bit is &lt;1.5.4-0.7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201312" version="1" comment="ibutils-devel is &lt;1.5.4-0.7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201313" version="1" comment="ibutils-devel-32bit is &lt;1.5.4-0.7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201314" version="1" comment="inkscape is &lt;0.46-62.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201315" version="1" comment="inkscape-extensions-dia is &lt;0.46-62.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201316" version="1" comment="inkscape-extensions-extra is &lt;0.46-62.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201317" version="1" comment="inkscape-extensions-fig is &lt;0.46-62.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201318" version="1" comment="inkscape-extensions-gimp is &lt;0.46-62.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201319" version="1" comment="inkscape-lang is &lt;0.46-62.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201320" version="1" comment="inn is &lt;2.4.2-170.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201321" version="1" comment="inn-devel is &lt;2.4.2-170.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201322" version="1" comment="inst-source-utils is &lt;2012.9.13-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201323" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.18-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201324" version="1" comment="java-1_4_2-ibm-devel is &lt;1.4.2_sr13.18-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201325" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr15.0-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201326" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr15.0-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201327" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr15.0-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201328" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr6.0-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201329" version="1" comment="kdelibs4-doc is &lt;4.3.5-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201330" version="1" comment="libkde4-32bit is &lt;4.3.5-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201331" version="1" comment="libkde4-devel is &lt;4.3.5-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201332" version="1" comment="libkdecore4-32bit is &lt;4.3.5-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201333" version="1" comment="libkdecore4-devel is &lt;4.3.5-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201334" version="1" comment="krb5-devel is &lt;1.6.3-133.49.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201335" version="1" comment="krb5-devel-32bit is &lt;1.6.3-133.49.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201336" version="1" comment="krb5-server is &lt;1.6.3-133.49.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201337" version="1" comment="libldb-devel is &lt;3.6.3-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201338" version="1" comment="libnetapi-devel is &lt;3.6.3-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201339" version="1" comment="libnetapi0 is &lt;3.6.3-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201340" version="1" comment="libsmbclient-devel is &lt;3.6.3-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201341" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201342" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201343" version="1" comment="libtalloc-devel is &lt;3.6.3-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201344" version="1" comment="libtdb-devel is &lt;3.6.3-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201345" version="1" comment="libtevent-devel is &lt;3.6.3-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201346" version="1" comment="libwbclient-devel is &lt;3.6.3-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201347" version="1" comment="samba-devel is &lt;3.6.3-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201348" version="1" comment="libQtWebKit-devel is &lt;4.6.3-5.20.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201349" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.20.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201350" version="1" comment="libQtWebKit4-x86 is &lt;4.6.3-5.20.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201351" version="1" comment="libqt4-devel is &lt;4.6.3-5.20.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201352" version="1" comment="libqt4-devel-doc is &lt;4.6.3-5.20.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201353" version="1" comment="libqt4-devel-doc-data is &lt;4.6.3-5.20.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201354" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.6.3-5.20.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201355" version="1" comment="libqt4-sql-mysql-x86 is &lt;4.6.3-5.20.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201356" version="1" comment="libqt4-sql-postgresql is &lt;4.6.3-5.20.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201357" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.6.3-5.20.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201358" version="1" comment="libqt4-sql-postgresql-x86 is &lt;4.6.3-5.20.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201359" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.6.3-5.20.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201360" version="1" comment="libqt4-sql-sqlite-x86 is &lt;4.6.3-5.20.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201361" version="1" comment="libqt4-sql-unixODBC is &lt;4.6.3-5.20.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201362" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.6.3-5.20.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201363" version="1" comment="libqt4-sql-unixODBC-x86 is &lt;4.6.3-5.20.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201364" version="1" comment="postgresql91-devel is &lt;9.1.9-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201365" version="1" comment="libgcrypt-devel is &lt;1.5.0-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201366" version="1" comment="libgcrypt-devel-32bit is &lt;1.5.0-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201367" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201368" version="1" comment="libpixman-1-0-devel is &lt;0.16.0-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201369" version="1" comment="libpoppler-devel is &lt;0.12.3-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201370" version="1" comment="libpoppler-glib-devel is &lt;0.12.3-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201371" version="1" comment="libpoppler-qt2 is &lt;0.12.3-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201372" version="1" comment="libpoppler-qt3-devel is &lt;0.12.3-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201373" version="1" comment="libpoppler-qt4-devel is &lt;0.12.3-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201374" version="1" comment="libreoffice is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201375" version="1" comment="libreoffice-base is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201376" version="1" comment="libreoffice-base-drivers-postgresql is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201377" version="1" comment="libreoffice-base-extensions is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201378" version="1" comment="libreoffice-branding-upstream is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201379" version="1" comment="libreoffice-calc is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201380" version="1" comment="libreoffice-calc-extensions is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201381" version="1" comment="libreoffice-draw is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201382" version="1" comment="libreoffice-draw-extensions is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201383" version="1" comment="libreoffice-filters-optional is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201384" version="1" comment="libreoffice-gnome is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201385" version="1" comment="libreoffice-help-cs is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201386" version="1" comment="libreoffice-help-da is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201387" version="1" comment="libreoffice-help-de is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201388" version="1" comment="libreoffice-help-en-GB is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201389" version="1" comment="libreoffice-help-en-US is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201390" version="1" comment="libreoffice-help-es is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201391" version="1" comment="libreoffice-help-fr is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201392" version="1" comment="libreoffice-help-gu-IN is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201393" version="1" comment="libreoffice-help-hi-IN is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201394" version="1" comment="libreoffice-help-hu is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201395" version="1" comment="libreoffice-help-it is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201396" version="1" comment="libreoffice-help-ja is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201397" version="1" comment="libreoffice-help-ko is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201398" version="1" comment="libreoffice-help-nl is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201399" version="1" comment="libreoffice-help-pl is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201400" version="1" comment="libreoffice-help-pt is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201401" version="1" comment="libreoffice-help-pt-BR is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201402" version="1" comment="libreoffice-help-ru is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201403" version="1" comment="libreoffice-help-sv is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201404" version="1" comment="libreoffice-help-zh-CN is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201405" version="1" comment="libreoffice-help-zh-TW is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201406" version="1" comment="libreoffice-icon-themes is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201407" version="1" comment="libreoffice-impress is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201408" version="1" comment="libreoffice-impress-extensions is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201409" version="1" comment="libreoffice-kde is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201410" version="1" comment="libreoffice-kde4 is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201411" version="1" comment="libreoffice-l10n-af is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201412" version="1" comment="libreoffice-l10n-ar is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201413" version="1" comment="libreoffice-l10n-ca is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201414" version="1" comment="libreoffice-l10n-cs is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201415" version="1" comment="libreoffice-l10n-da is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201416" version="1" comment="libreoffice-l10n-de is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201417" version="1" comment="libreoffice-l10n-el is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201418" version="1" comment="libreoffice-l10n-en-GB is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201419" version="1" comment="libreoffice-l10n-es is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201420" version="1" comment="libreoffice-l10n-fi is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201421" version="1" comment="libreoffice-l10n-fr is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201422" version="1" comment="libreoffice-l10n-gu-IN is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201423" version="1" comment="libreoffice-l10n-hi-IN is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201424" version="1" comment="libreoffice-l10n-hu is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201425" version="1" comment="libreoffice-l10n-it is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201426" version="1" comment="libreoffice-l10n-ja is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201427" version="1" comment="libreoffice-l10n-ko is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201428" version="1" comment="libreoffice-l10n-nb is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201429" version="1" comment="libreoffice-l10n-nl is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201430" version="1" comment="libreoffice-l10n-nn is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201431" version="1" comment="libreoffice-l10n-pl is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201432" version="1" comment="libreoffice-l10n-prebuilt is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201433" version="1" comment="libreoffice-l10n-pt is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201434" version="1" comment="libreoffice-l10n-pt-BR is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201435" version="1" comment="libreoffice-l10n-ru is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201436" version="1" comment="libreoffice-l10n-sk is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201437" version="1" comment="libreoffice-l10n-sv is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201438" version="1" comment="libreoffice-l10n-xh is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201439" version="1" comment="libreoffice-l10n-zh-CN is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201440" version="1" comment="libreoffice-l10n-zh-TW is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201441" version="1" comment="libreoffice-l10n-zu is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201442" version="1" comment="libreoffice-mailmerge is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201443" version="1" comment="libreoffice-math is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201444" version="1" comment="libreoffice-mono is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201445" version="1" comment="libreoffice-officebean is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201446" version="1" comment="libreoffice-pyuno is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201447" version="1" comment="libreoffice-sdk is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201448" version="1" comment="libreoffice-writer is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201449" version="1" comment="libreoffice-writer-extensions is &lt;3.5.4.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201450" version="1" comment="libsoup-devel is &lt;2.32.2-4.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201451" version="1" comment="libsoup-devel-32bit is &lt;2.32.2-4.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201452" version="1" comment="libssh2 is &lt;0.2-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201453" version="1" comment="libvirt-devel is &lt;0.9.6-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201454" version="1" comment="libvirt-devel-32bit is &lt;0.9.6-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201455" version="1" comment="libvirt-devel is &lt;0.9.6-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201456" version="1" comment="libvirt-devel-32bit is &lt;0.9.6-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201457" version="1" comment="libwebkit-1_0-2 is &lt;1.2.7-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201458" version="1" comment="libwebkit-devel is &lt;1.2.7-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201459" version="1" comment="libwebkit-lang is &lt;1.2.7-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201460" version="1" comment="libxml2-devel is &lt;2.7.6-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201461" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201462" version="1" comment="libxslt-python is &lt;1.1.24-19.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201463" version="1" comment="lighttpd is &lt;1.4.20-2.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201464" version="1" comment="lighttpd-mod_cml is &lt;1.4.20-2.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201465" version="1" comment="lighttpd-mod_magnet is &lt;1.4.20-2.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201466" version="1" comment="lighttpd-mod_mysql_vhost is &lt;1.4.20-2.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201467" version="1" comment="lighttpd-mod_rrdtool is &lt;1.4.20-2.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201468" version="1" comment="lighttpd-mod_trigger_b4_dl is &lt;1.4.20-2.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201469" version="1" comment="lighttpd-mod_webdav is &lt;1.4.20-2.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201470" version="1" comment="mozilla-nspr-devel is &lt;4.10.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201471" version="1" comment="mozilla-nss-devel is &lt;3.15.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201472" version="1" comment="nagios is &lt;3.0.6-1.25.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201473" version="1" comment="nagios-devel is &lt;3.0.6-1.25.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201474" version="1" comment="nagios-www is &lt;3.0.6-1.25.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201475" version="1" comment="mozilla-nspr-devel is &lt;4.10.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201476" version="1" comment="mozilla-nss-devel is &lt;3.15.3-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201477" version="1" comment="mozilla-nss-devel is &lt;3.15.3.1-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201478" version="1" comment="openCryptoki is &lt;2.4-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201479" version="1" comment="openCryptoki-devel is &lt;2.4-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201480" version="1" comment="perl-base-32bit is &lt;5.10.0-64.61.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201481" version="1" comment="perl-base-x86 is &lt;5.10.0-64.61.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201482" version="1" comment="popt-devel is &lt;1.7-37.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201483" version="1" comment="popt-devel-32bit is &lt;1.7-37.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201484" version="1" comment="rpm-32bit is &lt;4.4.2.3-37.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201485" version="1" comment="rpm-devel is &lt;4.4.2.3-37.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201486" version="1" comment="rpm-devel-32bit is &lt;4.4.2.3-37.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201487" version="1" comment="rpm-x86 is &lt;4.4.2.3-37.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201488" version="1" comment="python-32bit is &lt;2.6.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201489" version="1" comment="python-demo is &lt;2.6.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201490" version="1" comment="python-devel is &lt;2.6.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201491" version="1" comment="python-gdbm is &lt;2.6.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201492" version="1" comment="python-idle is &lt;2.6.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201493" version="1" comment="python-tk is &lt;2.6.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201494" version="1" comment="python-httplib2 is &lt;0.7.4-0.7.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201495" version="1" comment="rubygem-rack-1_3 is &lt;1.3.10-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201496" version="1" comment="rubygem-rack is &lt;1.1.6-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201497" version="1" comment="ruby-devel is &lt;1.8.7.p357-0.9.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201498" version="1" comment="ruby-doc-html is &lt;1.8.7.p357-0.9.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201499" version="1" comment="ruby-doc-ri is &lt;1.8.7.p357-0.9.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201500" version="1" comment="ruby-examples is &lt;1.8.7.p357-0.9.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201501" version="1" comment="ruby-test-suite is &lt;1.8.7.p357-0.9.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201502" version="1" comment="ruby-tk is &lt;1.8.7.p357-0.9.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201503" version="1" comment="rubygem-actionmailer-2_3 is &lt;2.3.17-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201504" version="1" comment="rubygem-actionpack-2_3 is &lt;2.3.17-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201505" version="1" comment="rubygem-activerecord-2_3 is &lt;2.3.17-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201506" version="1" comment="rubygem-activeresource-2_3 is &lt;2.3.17-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201507" version="1" comment="rubygem-activesupport-2_3 is &lt;2.3.17-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201508" version="1" comment="rubygem-rails is &lt;2.3.17-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201509" version="1" comment="rubygem-rails-2_3 is &lt;2.3.17-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201510" version="1" comment="rubygem-actionpack-2_1 is &lt;2.1.2-1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201511" version="1" comment="rubygem-actionpack-2_3 is &lt;2.3.17-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201512" version="1" comment="rubygem-activerecord-2_3 is &lt;2.3.14-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201513" version="1" comment="rubygem-activesupport-2_3 is &lt;2.3.14-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201514" version="1" comment="rubygem-activesupport-3_2 is &lt;3.2.12-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201515" version="1" comment="rubygem-mail-2_3 is &lt;2.3.0-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201516" version="1" comment="rubygem-rack-cache-1_1 is &lt;1.1-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201517" version="1" comment="rubygem-actionpack-2_3 is &lt;2.3.17-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201518" version="1" comment="rubygem-activerecord-2_3 is &lt;2.3.17-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201519" version="1" comment="rubygem-activesupport-2_3 is &lt;2.3.17-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201520" version="1" comment="rubygem-activesupport-3_2 is &lt;3.2.12-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201521" version="1" comment="subversion is &lt;1.6.17-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201522" version="1" comment="subversion-devel is &lt;1.6.17-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201523" version="1" comment="subversion-perl is &lt;1.6.17-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201524" version="1" comment="subversion-python is &lt;1.6.17-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201525" version="1" comment="subversion-server is &lt;1.6.17-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201526" version="1" comment="subversion-tools is &lt;1.6.17-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201527" version="1" comment="wireshark is &lt;1.8.12-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201528" version="1" comment="wireshark-devel is &lt;1.8.12-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201529" version="1" comment="xen-devel is &lt;4.1.4_02-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201530" version="1" comment="libvirt-devel is &lt;0.9.6-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201531" version="1" comment="libvirt-devel-32bit is &lt;0.9.6-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201532" version="1" comment="xen-devel is &lt;4.1.2_20-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201533" version="1" comment="xen-devel is &lt;4.1.3_02-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201534" version="1" comment="xen-devel is &lt;4.1.3_04-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201535" version="1" comment="xen-devel is &lt;4.1.5_02-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201536" version="1" comment="xen-devel is &lt;4.1.6_02-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201537" version="1" comment="xen-devel is &lt;4.1.6_04-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201538" version="1" comment="xorg-x11-server-sdk is &lt;7.4-27.70.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201539" version="1" comment="xorg-x11-devel is &lt;7.4-8.26.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201540" version="1" comment="xorg-x11-devel-32bit is &lt;7.4-8.26.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201541" version="1" comment="xorg-x11-libxcb-devel is &lt;7.4-1.22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201542" version="1" comment="xorg-x11-libxcb-devel-32bit is &lt;7.4-1.22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201543" version="1" comment="MozillaFirefox-devel is &lt;24.6.0esr-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201544" version="1" comment="mozilla-nspr-devel is &lt;4.10.6-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201545" version="1" comment="mozilla-nss-devel is &lt;3.16.1-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077554" version="1" comment="sle-sdk-release is ==11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201546" version="1" comment="Mesa-devel is &lt;9.0.3-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201547" version="1" comment="Mesa-devel-32bit is &lt;9.0.3-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201548" version="1" comment="MozillaFirefox-devel is &lt;17.0.9esr-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201549" version="1" comment="MozillaFirefox is &lt;31.8.0esr-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201550" version="1" comment="MozillaFirefox-devel is &lt;31.8.0esr-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201551" version="1" comment="MozillaFirefox is &lt;38.5.0esr-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201552" version="1" comment="MozillaFirefox-devel is &lt;38.5.0esr-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201553" version="1" comment="MozillaFirefox-devel is &lt;24.5.0esr-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201554" version="1" comment="mozilla-nspr-devel is &lt;4.10.4-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201555" version="1" comment="mozilla-nss-devel is &lt;3.16-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201556" version="1" comment="MozillaFirefox-devel is &lt;31.6.0esr-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201557" version="1" comment="MozillaFirefox is &lt;31.8.0esr-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201558" version="1" comment="MozillaFirefox-devel is &lt;31.8.0esr-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201559" version="1" comment="mozilla-nspr is &lt;4.10.8-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201560" version="1" comment="mozilla-nspr-devel is &lt;4.10.8-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201561" version="1" comment="mozilla-nss is &lt;3.19.2_CKBI_1.98-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201562" version="1" comment="mozilla-nss-devel is &lt;3.19.2_CKBI_1.98-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201563" version="1" comment="apache2 is &lt;2.2.12-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201564" version="1" comment="apache2-devel is &lt;2.2.12-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201565" version="1" comment="apache2-doc is &lt;2.2.12-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201566" version="1" comment="apache2-example-pages is &lt;2.2.12-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201567" version="1" comment="apache2-prefork is &lt;2.2.12-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201568" version="1" comment="apache2-utils is &lt;2.2.12-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201569" version="1" comment="apache2-worker is &lt;2.2.12-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201570" version="1" comment="apache2 is &lt;2.2.12-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201571" version="1" comment="apache2-devel is &lt;2.2.12-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201572" version="1" comment="apache2-doc is &lt;2.2.12-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201573" version="1" comment="apache2-example-pages is &lt;2.2.12-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201574" version="1" comment="apache2-prefork is &lt;2.2.12-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201575" version="1" comment="apache2-utils is &lt;2.2.12-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201576" version="1" comment="apache2-worker is &lt;2.2.12-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201577" version="1" comment="php53-devel is &lt;5.3.17-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201578" version="1" comment="php53-imap is &lt;5.3.17-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201579" version="1" comment="php53-posix is &lt;5.3.17-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201580" version="1" comment="php53-readline is &lt;5.3.17-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201581" version="1" comment="php53-sockets is &lt;5.3.17-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201582" version="1" comment="php53-sqlite is &lt;5.3.17-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201583" version="1" comment="php53-tidy is &lt;5.3.17-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201584" version="1" comment="augeas is &lt;0.9.0-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201585" version="1" comment="augeas-devel is &lt;0.9.0-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201586" version="1" comment="libreadline5 is &lt;5.2-147.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201587" version="1" comment="readline-devel is &lt;5.2-147.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201588" version="1" comment="readline-devel-32bit is &lt;5.2-147.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201589" version="1" comment="bind is &lt;9.9.6P1-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201590" version="1" comment="bind-devel is &lt;9.9.6P1-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201591" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201592" version="1" comment="bind is &lt;9.9.6P1-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201593" version="1" comment="bind-devel is &lt;9.9.6P1-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201594" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201595" version="1" comment="bind is &lt;9.9.6P1-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201596" version="1" comment="bind-devel is &lt;9.9.6P1-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201597" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201598" version="1" comment="bind is &lt;9.9.6P1-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201599" version="1" comment="bind-devel is &lt;9.9.6P1-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201600" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201601" version="1" comment="binutils-devel is &lt;2.23.1-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201602" version="1" comment="binutils-devel-32bit is &lt;2.23.1-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201603" version="1" comment="binutils-gold is &lt;2.23.1-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201604" version="1" comment="cross-ppc-binutils is &lt;2.23.1-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201605" version="1" comment="cross-spu-binutils is &lt;2.23.1-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201606" version="1" comment="libldb-devel is &lt;3.6.3-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201607" version="1" comment="libnetapi-devel is &lt;3.6.3-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201608" version="1" comment="libnetapi0 is &lt;3.6.3-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201609" version="1" comment="libsmbclient-devel is &lt;3.6.3-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201610" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201611" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201612" version="1" comment="libtalloc-devel is &lt;3.6.3-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201613" version="1" comment="libtdb-devel is &lt;3.6.3-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201614" version="1" comment="libtevent-devel is &lt;3.6.3-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201615" version="1" comment="libwbclient-devel is &lt;3.6.3-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201616" version="1" comment="samba-devel is &lt;3.6.3-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201617" version="1" comment="cups-devel is &lt;1.3.9-8.46.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201618" version="1" comment="libcurl-devel is &lt;7.19.7-1.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201619" version="1" comment="curl is &lt;7.19.7-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201620" version="1" comment="libcurl-devel is &lt;7.19.7-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201621" version="1" comment="libcurl-devel is &lt;7.19.7-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201622" version="1" comment="dhcp is &lt;4.2.4.P2-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201623" version="1" comment="dhcp-devel is &lt;4.2.4.P2-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201624" version="1" comment="e2fsprogs-devel is &lt;1.41.9-2.10.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201625" version="1" comment="libblkid-devel is &lt;2.19.1-6.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201626" version="1" comment="libblkid-devel-32bit is &lt;2.19.1-6.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201627" version="1" comment="libcom_err-devel is &lt;1.41.9-2.10.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201628" version="1" comment="libcom_err-devel-32bit is &lt;1.41.9-2.10.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201629" version="1" comment="libext2fs-devel is &lt;1.41.9-2.10.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201630" version="1" comment="libext2fs-devel-32bit is &lt;1.41.9-2.10.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201631" version="1" comment="libext2fs2-32bit is &lt;1.41.9-2.10.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201632" version="1" comment="libext2fs2-x86 is &lt;1.41.9-2.10.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201633" version="1" comment="libuuid-devel is &lt;2.19.1-6.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201634" version="1" comment="libuuid-devel-32bit is &lt;2.19.1-6.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201635" version="1" comment="python-magic is &lt;4.24-43.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201636" version="1" comment="finch is &lt;2.6.6-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201637" version="1" comment="finch-devel is &lt;2.6.6-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201638" version="1" comment="libpurple is &lt;2.6.6-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201639" version="1" comment="libpurple-devel is &lt;2.6.6-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201640" version="1" comment="libpurple-lang is &lt;2.6.6-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201641" version="1" comment="pidgin is &lt;2.6.6-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201642" version="1" comment="pidgin-devel is &lt;2.6.6-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201643" version="1" comment="MozillaFirefox-devel is &lt;17.0.7esr-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201644" version="1" comment="MozillaFirefox-devel is &lt;17.0.10esr-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201645" version="1" comment="MozillaFirefox-devel is &lt;24.3.0esr-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201646" version="1" comment="mozilla-nss-devel is &lt;3.15.4-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201647" version="1" comment="MozillaFirefox-devel is &lt;24.4.0esr-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201648" version="1" comment="MozillaFirefox-devel is &lt;24.7.0esr-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201649" version="1" comment="mozilla-nss-devel is &lt;3.16.2-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201650" version="1" comment="MozillaFirefox-devel is &lt;24.8.0esr-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201651" version="1" comment="mozilla-nss-devel is &lt;3.16.4-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201652" version="1" comment="MozillaFirefox-devel is &lt;31.3.0esr-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201653" version="1" comment="MozillaFirefox-devel is &lt;31.4.0esr-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201654" version="1" comment="MozillaFirefox-devel is &lt;31.5.3esr-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201655" version="1" comment="mozilla-nspr is &lt;4.10.9-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201656" version="1" comment="mozilla-nspr-devel is &lt;4.10.9-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201657" version="1" comment="MozillaFirefox is &lt;38.3.0esr-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201658" version="1" comment="MozillaFirefox-devel is &lt;38.3.0esr-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201659" version="1" comment="MozillaFirefox is &lt;38.4.0esr-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201660" version="1" comment="MozillaFirefox-devel is &lt;38.4.0esr-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201661" version="1" comment="mozilla-nspr is &lt;4.10.10-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201662" version="1" comment="mozilla-nspr-devel is &lt;4.10.10-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201663" version="1" comment="mozilla-nss is &lt;3.19.2.1-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201664" version="1" comment="mozilla-nss-devel is &lt;3.19.2.1-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201665" version="1" comment="MozillaFirefox-devel is &lt;24.2.0esr-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201666" version="1" comment="mozilla-nss-devel is &lt;3.15.3.1-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201667" version="1" comment="MozillaFirefox-devel is &lt;31.2.0esr-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201668" version="1" comment="mozilla-nss-devel is &lt;3.17.2-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201669" version="1" comment="MozillaFirefox is &lt;38.2.1esr-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201670" version="1" comment="MozillaFirefox-devel is &lt;38.2.1esr-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201671" version="1" comment="mozilla-nss is &lt;3.19.2.0-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201672" version="1" comment="mozilla-nss-devel is &lt;3.19.2.0-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201673" version="1" comment="freetype2-devel is &lt;2.3.7-25.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201674" version="1" comment="freetype2-devel-32bit is &lt;2.3.7-25.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201675" version="1" comment="giflib is &lt;4.1.6-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201676" version="1" comment="giflib-devel is &lt;4.1.6-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201677" version="1" comment="giflib-devel-32bit is &lt;4.1.6-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201678" version="1" comment="git is &lt;1.7.12.4-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201679" version="1" comment="git-arch is &lt;1.7.12.4-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201680" version="1" comment="git-core is &lt;1.7.12.4-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201681" version="1" comment="git-cvs is &lt;1.7.12.4-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201682" version="1" comment="git-daemon is &lt;1.7.12.4-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201683" version="1" comment="git-email is &lt;1.7.12.4-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201684" version="1" comment="git-gui is &lt;1.7.12.4-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201685" version="1" comment="git-svn is &lt;1.7.12.4-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201686" version="1" comment="git-web is &lt;1.7.12.4-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201687" version="1" comment="gitk is &lt;1.7.12.4-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201688" version="1" comment="glibc-html is &lt;2.11.3-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201689" version="1" comment="glibc-info is &lt;2.11.3-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201690" version="1" comment="glibc is &lt;2.11.3-17.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201691" version="1" comment="glibc-html is &lt;2.11.3-17.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201692" version="1" comment="glibc-info is &lt;2.11.3-17.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201693" version="1" comment="glibc is &lt;2.11.3-17.95" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201694" version="1" comment="glibc-html is &lt;2.11.3-17.95" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201695" version="1" comment="glibc-info is &lt;2.11.3-17.95" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201696" version="1" comment="libgnutls-devel is &lt;2.4.1-24.39.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201697" version="1" comment="libgnutls-extra-devel is &lt;2.4.1-24.39.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201698" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201699" version="1" comment="gnutls is &lt;2.4.1-24.39.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201700" version="1" comment="libgnutls-devel is &lt;2.4.1-24.39.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201701" version="1" comment="libgnutls-extra-devel is &lt;2.4.1-24.39.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201702" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201703" version="1" comment="gnutls is &lt;2.4.1-24.39.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201704" version="1" comment="libgnutls-devel is &lt;2.4.1-24.39.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201705" version="1" comment="libgnutls-extra-devel is &lt;2.4.1-24.39.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201706" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201707" version="1" comment="gtk2 is &lt;2.18.9-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201708" version="1" comment="gtk2-devel is &lt;2.18.9-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201709" version="1" comment="gtk2-devel-32bit is &lt;2.18.9-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201710" version="1" comment="gtk2 is &lt;2.18.9-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201711" version="1" comment="gtk2-devel is &lt;2.18.9-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201712" version="1" comment="gtk2-devel-32bit is &lt;2.18.9-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201713" version="1" comment="libguestfs-devel is &lt;1.20.4-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201714" version="1" comment="ibutils is &lt;1.5.7-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201715" version="1" comment="ibutils-32bit is &lt;1.5.7-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201716" version="1" comment="ibutils-devel is &lt;1.5.7-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201717" version="1" comment="ibutils-devel-32bit is &lt;1.5.7-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201718" version="1" comment="icu is &lt;4.0-7.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201719" version="1" comment="libicu-32bit is &lt;4.0-7.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201720" version="1" comment="libicu-devel is &lt;4.0-7.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201721" version="1" comment="libicu-devel-32bit is &lt;4.0-7.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201722" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201723" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201724" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201725" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.7-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201726" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.7-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201727" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.7-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201728" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.15-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201729" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.15-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201730" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.15-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201731" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr8.0-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201732" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr9.10-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201733" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr9.10-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201734" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr9.20-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201735" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr9.20-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201736" version="1" comment="kde4-l10n-de-data is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201737" version="1" comment="kde4-l10n-de-doc is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201738" version="1" comment="kdebase4-workspace is &lt;4.3.5-0.12.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201739" version="1" comment="kdebase4-workspace-devel is &lt;4.3.5-0.12.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201740" version="1" comment="kernel-docs is &lt;3.0.101-0.47.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201741" version="1" comment="krb5-devel is &lt;1.6.3-133.49.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201742" version="1" comment="krb5-devel-32bit is &lt;1.6.3-133.49.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201743" version="1" comment="krb5-server is &lt;1.6.3-133.49.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201744" version="1" comment="krb5 is &lt;1.6.3-133.49.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201745" version="1" comment="krb5-devel is &lt;1.6.3-133.49.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201746" version="1" comment="krb5-devel-32bit is &lt;1.6.3-133.49.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201747" version="1" comment="krb5-server is &lt;1.6.3-133.49.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201748" version="1" comment="krb5 is &lt;1.6.3-133.49.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201749" version="1" comment="krb5-devel is &lt;1.6.3-133.49.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201750" version="1" comment="krb5-devel-32bit is &lt;1.6.3-133.49.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201751" version="1" comment="krb5-server is &lt;1.6.3-133.49.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201752" version="1" comment="krb5-devel is &lt;1.6.3-133.49.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201753" version="1" comment="krb5-devel-32bit is &lt;1.6.3-133.49.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201754" version="1" comment="krb5-server is &lt;1.6.3-133.49.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201755" version="1" comment="krb5 is &lt;1.6.3-133.49.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201756" version="1" comment="krb5-devel is &lt;1.6.3-133.49.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201757" version="1" comment="krb5-devel-32bit is &lt;1.6.3-133.49.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201758" version="1" comment="krb5-server is &lt;1.6.3-133.49.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201759" version="1" comment="libvirt-devel is &lt;1.0.5.9-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201760" version="1" comment="libvirt-devel-32bit is &lt;1.0.5.9-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201761" version="1" comment="liblcms2-devel is &lt;2.5-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201762" version="1" comment="libQtWebKit-devel is &lt;4.6.3-5.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201763" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201764" version="1" comment="libQtWebKit4-x86 is &lt;4.6.3-5.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201765" version="1" comment="libqt4-devel is &lt;4.6.3-5.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201766" version="1" comment="libqt4-devel-doc is &lt;4.6.3-5.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201767" version="1" comment="libqt4-devel-doc-data is &lt;4.6.3-5.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201768" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.6.3-5.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201769" version="1" comment="libqt4-sql-mysql-x86 is &lt;4.6.3-5.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201770" version="1" comment="libqt4-sql-postgresql is &lt;4.6.3-5.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201771" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.6.3-5.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201772" version="1" comment="libqt4-sql-postgresql-x86 is &lt;4.6.3-5.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201773" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.6.3-5.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201774" version="1" comment="libqt4-sql-sqlite-x86 is &lt;4.6.3-5.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201775" version="1" comment="libqt4-sql-unixODBC is &lt;4.6.3-5.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201776" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.6.3-5.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201777" version="1" comment="libqt4-sql-unixODBC-x86 is &lt;4.6.3-5.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201778" version="1" comment="postgresql91-devel is &lt;9.1.12-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201779" version="1" comment="mozilla-nss-devel is &lt;3.16.5-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201780" version="1" comment="libgcrypt is &lt;1.5.0-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201781" version="1" comment="libgcrypt-devel is &lt;1.5.0-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201782" version="1" comment="libgcrypt-devel-32bit is &lt;1.5.0-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201783" version="1" comment="libksba is &lt;1.0.4-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201784" version="1" comment="libksba-devel is &lt;1.0.4-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201785" version="1" comment="libmspack is &lt;0.0.20060920alpha-74.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201786" version="1" comment="libmspack-devel is &lt;0.0.20060920alpha-74.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201787" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.39-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201788" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.39-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201789" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201790" version="1" comment="libpng-devel is &lt;1.2.31-5.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201791" version="1" comment="libpng-devel-32bit is &lt;1.2.31-5.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201792" version="1" comment="libpng12-0 is &lt;1.2.31-5.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201793" version="1" comment="libpng-devel is &lt;1.2.31-5.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201794" version="1" comment="libpng-devel-32bit is &lt;1.2.31-5.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201795" version="1" comment="libpng12-0 is &lt;1.2.31-5.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201796" version="1" comment="libpulse-devel is &lt;0.9.23-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201797" version="1" comment="libQtWebKit-devel is &lt;4.6.3-5.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201798" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201799" version="1" comment="libQtWebKit4-x86 is &lt;4.6.3-5.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201800" version="1" comment="libqt4-devel is &lt;4.6.3-5.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201801" version="1" comment="libqt4-devel-doc is &lt;4.6.3-5.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201802" version="1" comment="libqt4-devel-doc-data is &lt;4.6.3-5.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201803" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.6.3-5.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201804" version="1" comment="libqt4-sql-mysql-x86 is &lt;4.6.3-5.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201805" version="1" comment="libqt4-sql-postgresql is &lt;4.6.3-5.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201806" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.6.3-5.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201807" version="1" comment="libqt4-sql-postgresql-x86 is &lt;4.6.3-5.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201808" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.6.3-5.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201809" version="1" comment="libqt4-sql-sqlite-x86 is &lt;4.6.3-5.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201810" version="1" comment="libqt4-sql-unixODBC is &lt;4.6.3-5.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201811" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.6.3-5.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201812" version="1" comment="libqt4-sql-unixODBC-x86 is &lt;4.6.3-5.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201813" version="1" comment="libreoffice is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201814" version="1" comment="libreoffice-base is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201815" version="1" comment="libreoffice-base-drivers-postgresql is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201816" version="1" comment="libreoffice-base-extensions is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201817" version="1" comment="libreoffice-branding-upstream is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201818" version="1" comment="libreoffice-calc is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201819" version="1" comment="libreoffice-calc-extensions is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201820" version="1" comment="libreoffice-draw is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201821" version="1" comment="libreoffice-draw-extensions is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201822" version="1" comment="libreoffice-filters-optional is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201823" version="1" comment="libreoffice-gnome is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201824" version="1" comment="libreoffice-help-cs is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201825" version="1" comment="libreoffice-help-da is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201826" version="1" comment="libreoffice-help-de is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201827" version="1" comment="libreoffice-help-en-GB is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201828" version="1" comment="libreoffice-help-en-US is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201829" version="1" comment="libreoffice-help-es is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201830" version="1" comment="libreoffice-help-fr is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201831" version="1" comment="libreoffice-help-gu-IN is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201832" version="1" comment="libreoffice-help-hi-IN is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201833" version="1" comment="libreoffice-help-hu is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201834" version="1" comment="libreoffice-help-it is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201835" version="1" comment="libreoffice-help-ja is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201836" version="1" comment="libreoffice-help-ko is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201837" version="1" comment="libreoffice-help-nl is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201838" version="1" comment="libreoffice-help-pl is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201839" version="1" comment="libreoffice-help-pt is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201840" version="1" comment="libreoffice-help-pt-BR is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201841" version="1" comment="libreoffice-help-ru is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201842" version="1" comment="libreoffice-help-sv is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201843" version="1" comment="libreoffice-help-zh-CN is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201844" version="1" comment="libreoffice-help-zh-TW is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201845" version="1" comment="libreoffice-icon-themes is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201846" version="1" comment="libreoffice-impress is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201847" version="1" comment="libreoffice-impress-extensions is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201848" version="1" comment="libreoffice-kde is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201849" version="1" comment="libreoffice-kde4 is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201850" version="1" comment="libreoffice-l10n-af is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201851" version="1" comment="libreoffice-l10n-ar is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201852" version="1" comment="libreoffice-l10n-ca is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201853" version="1" comment="libreoffice-l10n-cs is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201854" version="1" comment="libreoffice-l10n-da is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201855" version="1" comment="libreoffice-l10n-de is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201856" version="1" comment="libreoffice-l10n-el is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201857" version="1" comment="libreoffice-l10n-en-GB is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201858" version="1" comment="libreoffice-l10n-es is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201859" version="1" comment="libreoffice-l10n-fi is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201860" version="1" comment="libreoffice-l10n-fr is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201861" version="1" comment="libreoffice-l10n-gu-IN is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201862" version="1" comment="libreoffice-l10n-hi-IN is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201863" version="1" comment="libreoffice-l10n-hu is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201864" version="1" comment="libreoffice-l10n-it is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201865" version="1" comment="libreoffice-l10n-ja is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201866" version="1" comment="libreoffice-l10n-ko is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201867" version="1" comment="libreoffice-l10n-nb is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201868" version="1" comment="libreoffice-l10n-nl is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201869" version="1" comment="libreoffice-l10n-nn is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201870" version="1" comment="libreoffice-l10n-pl is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201871" version="1" comment="libreoffice-l10n-prebuilt is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201872" version="1" comment="libreoffice-l10n-pt is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201873" version="1" comment="libreoffice-l10n-pt-BR is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201874" version="1" comment="libreoffice-l10n-ru is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201875" version="1" comment="libreoffice-l10n-sk is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201876" version="1" comment="libreoffice-l10n-sv is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201877" version="1" comment="libreoffice-l10n-xh is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201878" version="1" comment="libreoffice-l10n-zh-CN is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201879" version="1" comment="libreoffice-l10n-zh-TW is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201880" version="1" comment="libreoffice-l10n-zu is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201881" version="1" comment="libreoffice-mailmerge is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201882" version="1" comment="libreoffice-math is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201883" version="1" comment="libreoffice-mono is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201884" version="1" comment="libreoffice-officebean is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201885" version="1" comment="libreoffice-pyuno is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201886" version="1" comment="libreoffice-sdk is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201887" version="1" comment="libreoffice-writer is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201888" version="1" comment="libreoffice-writer-extensions is &lt;4.0.3.3.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201889" version="1" comment="librsvg is &lt;2.26.0-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201890" version="1" comment="librsvg-devel is &lt;2.26.0-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201891" version="1" comment="libsndfile is &lt;1.0.20-2.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201892" version="1" comment="libsndfile-devel is &lt;1.0.20-2.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201893" version="1" comment="libtasn1-devel is &lt;1.5-1.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201894" version="1" comment="libvirt-devel is &lt;1.0.5.9-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201895" version="1" comment="libvirt-devel-32bit is &lt;1.0.5.9-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201896" version="1" comment="LibVNCServer is &lt;0.9.1-156" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201897" version="1" comment="LibVNCServer-devel is &lt;0.9.1-156" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201898" version="1" comment="libwmf is &lt;0.2.8.4-206.29.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201899" version="1" comment="libwmf-32bit is &lt;0.2.8.4-206.29.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201900" version="1" comment="libwmf-devel is &lt;0.2.8.4-206.29.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201901" version="1" comment="libwmf-gnome is &lt;0.2.8.4-206.29.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201902" version="1" comment="libwmf-gnome-32bit is &lt;0.2.8.4-206.29.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201903" version="1" comment="libwmf-gnome-x86 is &lt;0.2.8.4-206.29.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201904" version="1" comment="libwmf-x86 is &lt;0.2.8.4-206.29.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201905" version="1" comment="libxml2 is &lt;2.7.6-0.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201906" version="1" comment="libxml2-devel is &lt;2.7.6-0.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201907" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201908" version="1" comment="libxml2 is &lt;2.7.6-0.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201909" version="1" comment="libxml2-devel is &lt;2.7.6-0.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201910" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201911" version="1" comment="lxc is &lt;0.8.0-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201912" version="1" comment="lxc-devel is &lt;0.8.0-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201913" version="1" comment="lxc is &lt;0.8.0-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201914" version="1" comment="lxc-devel is &lt;0.8.0-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201915" version="1" comment="bytefx-data-mysql is &lt;2.6.7-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201916" version="1" comment="mono-core is &lt;2.6.7-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201917" version="1" comment="mono-data is &lt;2.6.7-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201918" version="1" comment="mono-data-firebird is &lt;2.6.7-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201919" version="1" comment="mono-data-oracle is &lt;2.6.7-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201920" version="1" comment="mono-data-postgresql is &lt;2.6.7-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201921" version="1" comment="mono-data-sqlite is &lt;2.6.7-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201922" version="1" comment="mono-data-sybase is &lt;2.6.7-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201923" version="1" comment="mono-devel is &lt;2.6.7-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201924" version="1" comment="mono-extras is &lt;2.6.7-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201925" version="1" comment="mono-jscript is &lt;2.6.7-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201926" version="1" comment="mono-locale-extras is &lt;2.6.7-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201927" version="1" comment="mono-nunit is &lt;2.6.7-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201928" version="1" comment="mono-wcf is &lt;2.6.7-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201929" version="1" comment="mono-web is &lt;2.6.7-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201930" version="1" comment="mono-winforms is &lt;2.6.7-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201931" version="1" comment="mono-winfxcore is &lt;2.6.7-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201932" version="1" comment="monodoc-core is &lt;2.6.7-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201933" version="1" comment="MozillaFirefox is &lt;38.6.0esr-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201934" version="1" comment="MozillaFirefox-devel is &lt;38.6.0esr-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201935" version="1" comment="mozilla-nss is &lt;3.20.2-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201936" version="1" comment="mozilla-nss-devel is &lt;3.20.2-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201937" version="1" comment="mozilla-nspr is &lt;4.10.8-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201938" version="1" comment="mozilla-nspr-devel is &lt;4.10.8-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201939" version="1" comment="mozilla-nss is &lt;3.19.2.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201940" version="1" comment="mozilla-nss-devel is &lt;3.19.2.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201941" version="1" comment="mozilla-nss-devel is &lt;3.15.2-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201942" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.45-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201943" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.45-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201944" version="1" comment="mysql is &lt;5.5.45-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201945" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.46-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201946" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.46-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201947" version="1" comment="mysql is &lt;5.5.46-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201948" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.47-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201949" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.47-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201950" version="1" comment="mysql is &lt;5.5.47-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201951" version="1" comment="libsnmp15-32bit is &lt;5.4.2.1-8.12.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201952" version="1" comment="net-snmp is &lt;5.4.2.1-8.12.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201953" version="1" comment="net-snmp-devel is &lt;5.4.2.1-8.12.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201954" version="1" comment="net-snmp-devel-32bit is &lt;5.4.2.1-8.12.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201955" version="1" comment="mozilla-nss-devel is &lt;3.15.3-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201956" version="1" comment="openldap2 is &lt;2.4.26-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201957" version="1" comment="openldap2-back-perl is &lt;2.4.26-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201958" version="1" comment="openldap2-client is &lt;2.4.26-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201959" version="1" comment="openldap2-devel is &lt;2.4.26-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201960" version="1" comment="openldap2-devel-32bit is &lt;2.4.26-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201961" version="1" comment="openldap2 is &lt;2.4.26-0.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201962" version="1" comment="openldap2-back-perl is &lt;2.4.26-0.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201963" version="1" comment="openldap2-client is &lt;2.4.26-0.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201964" version="1" comment="openldap2-devel is &lt;2.4.26-0.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201965" version="1" comment="openldap2-devel-32bit is &lt;2.4.26-0.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201966" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201967" version="1" comment="openssl is &lt;0.9.8j-0.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201968" version="1" comment="osc is &lt;0.152.0-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201969" version="1" comment="pam-devel is &lt;1.1.5-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201970" version="1" comment="pam-devel-32bit is &lt;1.1.5-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201971" version="1" comment="perl-base-32bit is &lt;5.10.0-64.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201972" version="1" comment="php53 is &lt;5.3.17-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201973" version="1" comment="php53-devel is &lt;5.3.17-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201974" version="1" comment="php53-imap is &lt;5.3.17-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201975" version="1" comment="php53-posix is &lt;5.3.17-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201976" version="1" comment="php53-readline is &lt;5.3.17-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201977" version="1" comment="php53-sockets is &lt;5.3.17-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201978" version="1" comment="php53-sqlite is &lt;5.3.17-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201979" version="1" comment="php53-tidy is &lt;5.3.17-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201980" version="1" comment="php53 is &lt;5.3.17-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201981" version="1" comment="php53-devel is &lt;5.3.17-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201982" version="1" comment="php53-imap is &lt;5.3.17-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201983" version="1" comment="php53-posix is &lt;5.3.17-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201984" version="1" comment="php53-readline is &lt;5.3.17-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201985" version="1" comment="php53-sockets is &lt;5.3.17-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201986" version="1" comment="php53-sqlite is &lt;5.3.17-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201987" version="1" comment="php53-tidy is &lt;5.3.17-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201988" version="1" comment="popt-devel is &lt;1.7-37.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201989" version="1" comment="popt-devel-32bit is &lt;1.7-37.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201990" version="1" comment="rpm-32bit is &lt;4.4.2.3-37.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201991" version="1" comment="rpm-devel is &lt;4.4.2.3-37.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201992" version="1" comment="rpm-devel-32bit is &lt;4.4.2.3-37.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201993" version="1" comment="rpm-x86 is &lt;4.4.2.3-37.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201994" version="1" comment="postgresql94-devel is &lt;9.4.5-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201995" version="1" comment="postgresql94-libs is &lt;9.4.5-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201996" version="1" comment="postgresql91-devel is &lt;9.1.15-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201997" version="1" comment="postgresql91-devel is &lt;9.1.18-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201998" version="1" comment="postgresql91-devel is &lt;9.1.19-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009201999" version="1" comment="postgresql91-libs is &lt;9.1.19-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202000" version="1" comment="python-32bit is &lt;2.6.9-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202001" version="1" comment="python-demo is &lt;2.6.9-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202002" version="1" comment="python-devel is &lt;2.6.9-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202003" version="1" comment="python-doc is &lt;2.6-8.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202004" version="1" comment="python-doc-pdf is &lt;2.6-8.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202005" version="1" comment="python-gdbm is &lt;2.6.9-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202006" version="1" comment="python-idle is &lt;2.6.9-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202007" version="1" comment="python-tk is &lt;2.6.9-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202008" version="1" comment="python-32bit is &lt;2.6.9-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202009" version="1" comment="python-demo is &lt;2.6.9-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202010" version="1" comment="python-devel is &lt;2.6.9-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202011" version="1" comment="python-doc is &lt;2.6-8.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202012" version="1" comment="python-doc-pdf is &lt;2.6-8.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202013" version="1" comment="python-gdbm is &lt;2.6.9-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202014" version="1" comment="python-idle is &lt;2.6.9-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202015" version="1" comment="python-tk is &lt;2.6.9-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202016" version="1" comment="python-32bit is &lt;2.6.9-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202017" version="1" comment="python-demo is &lt;2.6.9-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202018" version="1" comment="python-devel is &lt;2.6.9-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202019" version="1" comment="python-doc is &lt;2.6-8.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202020" version="1" comment="python-doc-pdf is &lt;2.6-8.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202021" version="1" comment="python-gdbm is &lt;2.6.9-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202022" version="1" comment="python-idle is &lt;2.6.9-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202023" version="1" comment="python-tk is &lt;2.6.9-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202024" version="1" comment="python-32bit is &lt;2.6.9-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202025" version="1" comment="python-demo is &lt;2.6.9-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202026" version="1" comment="python-devel is &lt;2.6.9-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202027" version="1" comment="python-doc is &lt;2.6-8.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202028" version="1" comment="python-doc-pdf is &lt;2.6-8.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202029" version="1" comment="python-gdbm is &lt;2.6.9-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202030" version="1" comment="python-idle is &lt;2.6.9-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202031" version="1" comment="python-tk is &lt;2.6.9-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202032" version="1" comment="python-setuptools is &lt;0.6c8-10.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202033" version="1" comment="python-setuptools is &lt;0.6c11-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202034" version="1" comment="rubygem-activerecord-2_3 is &lt;2.3.17-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202035" version="1" comment="rubygem-activesupport-2_3 is &lt;2.3.17-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202036" version="1" comment="ruby-devel is &lt;1.8.7.p357-0.9.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202037" version="1" comment="ruby-doc-html is &lt;1.8.7.p357-0.9.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202038" version="1" comment="ruby-doc-ri is &lt;1.8.7.p357-0.9.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202039" version="1" comment="ruby-examples is &lt;1.8.7.p357-0.9.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202040" version="1" comment="ruby-test-suite is &lt;1.8.7.p357-0.9.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202041" version="1" comment="ruby-tk is &lt;1.8.7.p357-0.9.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202042" version="1" comment="rubygem-actionpack-2_3 is &lt;2.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202043" version="1" comment="rubygem-activesupport-3_2 is &lt;3.2.12-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202044" version="1" comment="rubygem-activesupport-3_2 is &lt;3.2.12-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202045" version="1" comment="rubygem-mail-2_3 is &lt;2.3.0-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202046" version="1" comment="rubygem-rack is &lt;1.1.6-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202047" version="1" comment="rubygem-rack-1_4 is &lt;1.4.5-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202048" version="1" comment="libldb-devel is &lt;3.6.3-76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202049" version="1" comment="libnetapi-devel is &lt;3.6.3-76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202050" version="1" comment="libnetapi0 is &lt;3.6.3-76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202051" version="1" comment="libsmbclient-devel is &lt;3.6.3-76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202052" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202053" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202054" version="1" comment="libtalloc-devel is &lt;3.6.3-76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202055" version="1" comment="libtdb-devel is &lt;3.6.3-76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202056" version="1" comment="libtevent-devel is &lt;3.6.3-76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202057" version="1" comment="libwbclient-devel is &lt;3.6.3-76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202058" version="1" comment="samba is &lt;3.6.3-76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202059" version="1" comment="samba-devel is &lt;3.6.3-76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202060" version="1" comment="samba-test is &lt;3.6.3-76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202061" version="1" comment="libldb-devel is &lt;3.6.3-0.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202062" version="1" comment="libnetapi-devel is &lt;3.6.3-0.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202063" version="1" comment="libnetapi0 is &lt;3.6.3-0.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202064" version="1" comment="libsmbclient-devel is &lt;3.6.3-0.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202065" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-0.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202066" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-0.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202067" version="1" comment="libtalloc-devel is &lt;3.6.3-0.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202068" version="1" comment="libtdb-devel is &lt;3.6.3-0.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202069" version="1" comment="libtevent-devel is &lt;3.6.3-0.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202070" version="1" comment="libwbclient-devel is &lt;3.6.3-0.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202071" version="1" comment="samba-devel is &lt;3.6.3-0.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202072" version="1" comment="libldb-devel is &lt;3.6.3-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202073" version="1" comment="libnetapi-devel is &lt;3.6.3-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202074" version="1" comment="libnetapi0 is &lt;3.6.3-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202075" version="1" comment="libsmbclient-devel is &lt;3.6.3-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202076" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202077" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202078" version="1" comment="libtalloc-devel is &lt;3.6.3-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202079" version="1" comment="libtdb-devel is &lt;3.6.3-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202080" version="1" comment="libtevent-devel is &lt;3.6.3-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202081" version="1" comment="libwbclient-devel is &lt;3.6.3-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202082" version="1" comment="samba is &lt;3.6.3-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202083" version="1" comment="samba-devel is &lt;3.6.3-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202084" version="1" comment="samba-test is &lt;3.6.3-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202085" version="1" comment="gnu-efi is &lt;3.0u-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202086" version="1" comment="struts is &lt;1.2.9-162.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202087" version="1" comment="struts-javadoc is &lt;1.2.9-162.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202088" version="1" comment="struts-manual is &lt;1.2.9-162.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202089" version="1" comment="subversion is &lt;1.6.17-1.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202090" version="1" comment="subversion-devel is &lt;1.6.17-1.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202091" version="1" comment="subversion-perl is &lt;1.6.17-1.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202092" version="1" comment="subversion-python is &lt;1.6.17-1.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202093" version="1" comment="subversion-server is &lt;1.6.17-1.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202094" version="1" comment="subversion-tools is &lt;1.6.17-1.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202095" version="1" comment="libtidy is &lt;1.0-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202096" version="1" comment="libtidy-devel is &lt;1.0-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202097" version="1" comment="tidy is &lt;1.0-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202098" version="1" comment="libtiff-devel is &lt;3.8.2-141.160" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202099" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-141.160" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202100" version="1" comment="tiff is &lt;3.8.2-141.160" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202101" version="1" comment="wireshark is &lt;1.10.11-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202102" version="1" comment="wireshark-devel is &lt;1.10.11-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202103" version="1" comment="wireshark is &lt;1.12.7-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202104" version="1" comment="wireshark-devel is &lt;1.12.7-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202105" version="1" comment="wireshark is &lt;1.12.9-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202106" version="1" comment="wireshark-devel is &lt;1.12.9-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202107" version="1" comment="xen-devel is &lt;4.2.5_06-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202108" version="1" comment="xen-devel is &lt;4.2.5_02-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202109" version="1" comment="xen is &lt;4.2.5_12-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202110" version="1" comment="xen-devel is &lt;4.2.5_12-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202111" version="1" comment="xen is &lt;4.2.5_14-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202112" version="1" comment="xen-devel is &lt;4.2.5_14-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202113" version="1" comment="xen-devel is &lt;4.2.2_06-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202114" version="1" comment="xen-devel is &lt;4.2.3_02-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202115" version="1" comment="xen-devel is &lt;4.2.3_08-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202116" version="1" comment="xen-devel is &lt;4.2.4_02-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202117" version="1" comment="xen-devel is &lt;4.2.4_04-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202118" version="1" comment="xen-devel is &lt;4.2.5_04-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202119" version="1" comment="xen-devel is &lt;4.2.5_08-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202120" version="1" comment="xen is &lt;4.2.5_18-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202121" version="1" comment="xen-devel is &lt;4.2.5_18-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202122" version="1" comment="xfsprogs is &lt;3.1.8-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202123" version="1" comment="xfsprogs-devel is &lt;3.1.8-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202124" version="1" comment="xorg-x11-server-sdk is &lt;7.4-27.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202125" version="1" comment="xorg-x11-devel is &lt;7.4-8.26.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202126" version="1" comment="xorg-x11-devel-32bit is &lt;7.4-8.26.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202127" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202128" version="1" comment="xorg-x11-libX11-devel is &lt;7.4-5.11.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202129" version="1" comment="xorg-x11-libX11-devel-32bit is &lt;7.4-5.11.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202130" version="1" comment="Botan is &lt;1.6.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202131" version="1" comment="libbotan-devel is &lt;1.6.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202132" version="1" comment="Botan is &lt;1.6.5-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202133" version="1" comment="libbotan-1_6_5 is &lt;1.6.5-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202134" version="1" comment="libbotan-devel is &lt;1.6.5-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202135" version="1" comment="GraphicsMagick is &lt;1.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202136" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202137" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202138" version="1" comment="GraphicsMagick is &lt;1.2.5-4.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202139" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202140" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202141" version="1" comment="GraphicsMagick is &lt;1.2.5-4.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202142" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202143" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202144" version="1" comment="GraphicsMagick is &lt;1.2.5-4.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202145" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202146" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202147" version="1" comment="GraphicsMagick is &lt;1.2.5-4.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202148" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202149" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202150" version="1" comment="GraphicsMagick is &lt;1.2.5-4.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202151" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202152" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202153" version="1" comment="GraphicsMagick is &lt;1.2.5-4.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202154" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202155" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202156" version="1" comment="GraphicsMagick is &lt;1.2.5-4.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202157" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202158" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202159" version="1" comment="GraphicsMagick is &lt;1.2.5-4.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202160" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202161" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202162" version="1" comment="GraphicsMagick is &lt;1.2.5-4.78.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202163" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.78.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202164" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.78.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202165" version="1" comment="GraphicsMagick is &lt;1.2.5-4.78.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202166" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.78.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202167" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.78.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202168" version="1" comment="GraphicsMagick is &lt;1.2.5-4.78.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202169" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.78.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202170" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.78.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202171" version="1" comment="GraphicsMagick is &lt;1.2.5-4.78.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202172" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.78.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202173" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.78.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202174" version="1" comment="GraphicsMagick is &lt;1.2.5-4.78.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202175" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.78.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202176" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.78.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202177" version="1" comment="GraphicsMagick is &lt;1.2.5-4.78.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202178" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.78.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202179" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.78.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202180" version="1" comment="GraphicsMagick is &lt;1.2.5-4.78.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202181" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.78.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202182" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.78.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202183" version="1" comment="GraphicsMagick is &lt;1.2.5-78.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202184" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-78.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202185" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-78.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202186" version="1" comment="GraphicsMagick is &lt;1.2.5-78.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202187" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-78.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202188" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-78.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202189" version="1" comment="GraphicsMagick is &lt;1.2.5-78.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202190" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-78.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202191" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-78.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232591" version="1" comment="GraphicsMagick is &lt;1.2.5-78.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232592" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-78.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232593" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-78.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233800" version="1" comment="GraphicsMagick is &lt;1.2.5-78.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233801" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-78.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233802" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-78.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237889" version="1" comment="GraphicsMagick is &lt;1.2.5-78.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237890" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-78.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237891" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-78.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242808" version="1" comment="GraphicsMagick is &lt;1.2.5-78.78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242809" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-78.78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242810" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-78.78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246568" version="1" comment="GraphicsMagick is &lt;1.2.5-78.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246569" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-78.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246570" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-78.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202192" version="1" comment="ImageMagick is &lt;6.4.3.6-7.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202193" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202194" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202195" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202196" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202197" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202198" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202199" version="1" comment="ImageMagick is &lt;6.4.3.6-7.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202200" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202201" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202202" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202203" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202204" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202205" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202206" version="1" comment="ImageMagick is &lt;6.4.3.6-7.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202207" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202208" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202209" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202210" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202211" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202212" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202213" version="1" comment="ImageMagick is &lt;6.4.3.6-7.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202214" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202215" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202216" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202217" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202218" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202219" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202220" version="1" comment="ImageMagick is &lt;6.4.3.6-7.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202221" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202222" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202223" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202224" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202225" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202226" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202227" version="1" comment="ImageMagick is &lt;6.4.3.6-7.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202228" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202229" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202230" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202231" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202232" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202233" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202234" version="1" comment="ImageMagick is &lt;6.4.3.6-7.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202235" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202236" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202237" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202238" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202239" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202240" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202241" version="1" comment="ImageMagick is &lt;6.4.3.6-7.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202242" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202243" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202244" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202245" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202246" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202247" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202248" version="1" comment="ImageMagick is &lt;6.4.3.6-7.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202249" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202250" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202251" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202252" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202253" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202254" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202255" version="1" comment="ImageMagick is &lt;6.4.3.6-7.78.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202256" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.78.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202257" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.78.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202258" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.78.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202259" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.78.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202260" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.78.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202261" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.78.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202262" version="1" comment="ImageMagick is &lt;6.4.3.6-7.78.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202263" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.78.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202264" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.78.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202265" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.78.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202266" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.78.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202267" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.78.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202268" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.78.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202269" version="1" comment="ImageMagick is &lt;6.4.3.6-7.78.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202270" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.78.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202271" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.78.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202272" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.78.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202273" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.78.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202274" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.78.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202275" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.78.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202276" version="1" comment="ImageMagick is &lt;6.4.3.6-7.78.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202277" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.78.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202278" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.78.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202279" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.78.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202280" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.78.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202281" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.78.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202282" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.78.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202283" version="1" comment="ImageMagick is &lt;6.4.3.6-7.78.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202284" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.78.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202285" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.78.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202286" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.78.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202287" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.78.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202288" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.78.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202289" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.78.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202290" version="1" comment="ImageMagick is &lt;6.4.3.6-7.78.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202291" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.78.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202292" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.78.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202293" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.78.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202294" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.78.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202295" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.78.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202296" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.78.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202297" version="1" comment="ImageMagick is &lt;6.4.3.6-7.78.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202298" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.78.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202299" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.78.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202300" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.78.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202301" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.78.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202302" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.78.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202303" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.78.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202304" version="1" comment="ImageMagick is &lt;6.4.3.6-7.78.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202305" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.78.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202306" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.78.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202307" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.78.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202308" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.78.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202309" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.78.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202310" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.78.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202311" version="1" comment="ImageMagick is &lt;6.4.3.6-78.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202312" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-78.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202313" version="1" comment="libMagick++-devel is &lt;6.4.3.6-78.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202314" version="1" comment="libMagick++1 is &lt;6.4.3.6-78.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202315" version="1" comment="libMagickWand1 is &lt;6.4.3.6-78.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202316" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-78.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202317" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-78.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202318" version="1" comment="ImageMagick is &lt;6.4.3.6-78.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202319" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-78.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202320" version="1" comment="libMagick++-devel is &lt;6.4.3.6-78.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202321" version="1" comment="libMagick++1 is &lt;6.4.3.6-78.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202322" version="1" comment="libMagickWand1 is &lt;6.4.3.6-78.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202323" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-78.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202324" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-78.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233150" version="1" comment="ImageMagick is &lt;6.4.3.6-78.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233151" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-78.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233152" version="1" comment="libMagick++-devel is &lt;6.4.3.6-78.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233153" version="1" comment="libMagick++1 is &lt;6.4.3.6-78.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233154" version="1" comment="libMagickWand1 is &lt;6.4.3.6-78.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233155" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-78.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233156" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-78.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233705" version="1" comment="ImageMagick is &lt;6.4.3.6-78.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233706" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-78.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233707" version="1" comment="libMagick++-devel is &lt;6.4.3.6-78.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233708" version="1" comment="libMagick++1 is &lt;6.4.3.6-78.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233709" version="1" comment="libMagickWand1 is &lt;6.4.3.6-78.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233710" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-78.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233711" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-78.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237944" version="1" comment="ImageMagick is &lt;6.4.3.6-78.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237945" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-78.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237946" version="1" comment="libMagick++-devel is &lt;6.4.3.6-78.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237947" version="1" comment="libMagick++1 is &lt;6.4.3.6-78.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237948" version="1" comment="libMagickWand1 is &lt;6.4.3.6-78.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237949" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-78.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237950" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-78.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239793" version="1" comment="ImageMagick is &lt;6.4.3.6-78.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239794" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-78.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239795" version="1" comment="libMagick++-devel is &lt;6.4.3.6-78.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239796" version="1" comment="libMagick++1 is &lt;6.4.3.6-78.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239797" version="1" comment="libMagickWand1 is &lt;6.4.3.6-78.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239798" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-78.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239799" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-78.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246344" version="1" comment="ImageMagick is &lt;6.4.3.6-78.92" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246345" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-78.92" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246346" version="1" comment="libMagick++-devel is &lt;6.4.3.6-78.92" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246347" version="1" comment="libMagick++1 is &lt;6.4.3.6-78.92" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246348" version="1" comment="libMagickWand1 is &lt;6.4.3.6-78.92" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246349" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-78.92" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246350" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-78.92" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202325" version="1" comment="LibVNCServer is &lt;0.9.1-159" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202326" version="1" comment="LibVNCServer-devel is &lt;0.9.1-159" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202327" version="1" comment="LibVNCServer is &lt;0.9.1-160.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202328" version="1" comment="LibVNCServer-devel is &lt;0.9.1-160.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242916" version="1" comment="LibVNCServer is &lt;0.9.1-160.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242917" version="1" comment="LibVNCServer-devel is &lt;0.9.1-160.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244172" version="1" comment="LibVNCServer is &lt;0.9.1-160.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244173" version="1" comment="LibVNCServer-devel is &lt;0.9.1-160.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202329" version="1" comment="MozillaFirefox is &lt;38.6.1esr-34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202330" version="1" comment="MozillaFirefox-devel is &lt;38.6.1esr-34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202331" version="1" comment="MozillaFirefox is &lt;38.8.0esr-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202332" version="1" comment="MozillaFirefox-devel is &lt;38.8.0esr-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202333" version="1" comment="mozilla-nspr is &lt;4.12-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202334" version="1" comment="mozilla-nspr-devel is &lt;4.12-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202335" version="1" comment="mozilla-nss is &lt;3.20.2-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202336" version="1" comment="mozilla-nss-devel is &lt;3.20.2-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202337" version="1" comment="MozillaFirefox is &lt;45.2.0esr-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202338" version="1" comment="MozillaFirefox-devel is &lt;45.2.0esr-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202339" version="1" comment="firefox-fontconfig is &lt;2.11.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202340" version="1" comment="firefox-fontconfig-devel is &lt;2.11.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202341" version="1" comment="mozilla-nspr is &lt;4.12-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202342" version="1" comment="mozilla-nspr-devel is &lt;4.12-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202343" version="1" comment="mozilla-nss is &lt;3.21.1-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202344" version="1" comment="mozilla-nss-devel is &lt;3.21.1-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202345" version="1" comment="MozillaFirefox is &lt;45.3.0esr-50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202346" version="1" comment="MozillaFirefox-devel is &lt;45.3.0esr-50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202347" version="1" comment="MozillaFirefox is &lt;45.4.0esr-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202348" version="1" comment="MozillaFirefox-devel is &lt;45.4.0esr-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202349" version="1" comment="MozillaFirefox is &lt;45.6.0esr-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202350" version="1" comment="MozillaFirefox-devel is &lt;45.6.0esr-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202351" version="1" comment="MozillaFirefox is &lt;45.7.0esr-65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202352" version="1" comment="MozillaFirefox-devel is &lt;45.7.0esr-65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202353" version="1" comment="MozillaFirefox is &lt;45.8.0esr-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202354" version="1" comment="MozillaFirefox-devel is &lt;45.8.0esr-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202355" version="1" comment="MozillaFirefox is &lt;45.9.0esr-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202356" version="1" comment="MozillaFirefox-devel is &lt;45.9.0esr-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202357" version="1" comment="mozilla-nspr is &lt;4.13.1-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202358" version="1" comment="mozilla-nspr-devel is &lt;4.13.1-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202359" version="1" comment="mozilla-nss is &lt;3.29.5-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202360" version="1" comment="mozilla-nss-devel is &lt;3.29.5-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202361" version="1" comment="MozillaFirefox is &lt;52.2.0esr-72.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202362" version="1" comment="MozillaFirefox-devel is &lt;52.2.0esr-72.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202363" version="1" comment="mozilla-nss is &lt;3.29.5-47.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202364" version="1" comment="mozilla-nss-devel is &lt;3.29.5-47.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202365" version="1" comment="MozillaFirefox is &lt;52.3.0esr-72.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202366" version="1" comment="MozillaFirefox-devel is &lt;52.3.0esr-72.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202367" version="1" comment="MozillaFirefox is &lt;52.5.0esr-72.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202368" version="1" comment="MozillaFirefox-devel is &lt;52.5.0esr-72.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202369" version="1" comment="MozillaFirefox is &lt;52.6.0esr-72.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202370" version="1" comment="MozillaFirefox-devel is &lt;52.6.0esr-72.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202371" version="1" comment="MozillaFirefox is &lt;52.7.3esr-72.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202372" version="1" comment="MozillaFirefox-devel is &lt;52.7.3esr-72.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202373" version="1" comment="MozillaFirefox is &lt;52.8.0esr-72.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202374" version="1" comment="MozillaFirefox-devel is &lt;52.8.0esr-72.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229514" version="1" comment="MozillaFirefox is &lt;52.8.1esr-72.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229515" version="1" comment="MozillaFirefox-devel is &lt;52.8.1esr-72.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232158" version="1" comment="MozillaFirefox is &lt;52.9.0esr-72.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232159" version="1" comment="MozillaFirefox-devel is &lt;52.9.0esr-72.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202375" version="1" comment="MozillaFirefox is &lt;38.7.0esr-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202376" version="1" comment="MozillaFirefox-devel is &lt;38.7.0esr-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202377" version="1" comment="mozilla-nspr is &lt;4.12-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202378" version="1" comment="mozilla-nspr-devel is &lt;4.12-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202379" version="1" comment="mozilla-nss is &lt;3.20.2-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202380" version="1" comment="mozilla-nss-devel is &lt;3.20.2-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202381" version="1" comment="OpenEXR is &lt;1.6.1-83.17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202382" version="1" comment="OpenEXR-32bit is &lt;1.6.1-83.17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202383" version="1" comment="OpenEXR-devel is &lt;1.6.1-83.17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246571" version="1" comment="SDL is &lt;1.2.13-106.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246572" version="1" comment="SDL-32bit is &lt;1.2.13-106.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246573" version="1" comment="SDL-devel is &lt;1.2.13-106.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246574" version="1" comment="SDL-devel-32bit is &lt;1.2.13-106.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238645" version="1" comment="SDL_image is &lt;1.2.6-84.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238646" version="1" comment="SDL_image-devel is &lt;1.2.6-84.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240624" version="1" comment="SDL_image is &lt;1.2.6-84.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240625" version="1" comment="SDL_image-devel is &lt;1.2.6-84.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202384" version="1" comment="xen is &lt;4.4.2_12-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202385" version="1" comment="xen-devel is &lt;4.4.2_12-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237892" version="1" comment="Xerces-c is &lt;2.8.0-29.17.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237893" version="1" comment="libXerces-c-devel is &lt;2.8.0-29.17.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237894" version="1" comment="libXerces-c28 is &lt;2.8.0-29.17.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235010" version="1" comment="ant is &lt;1.7.1-20.11.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235011" version="1" comment="ant-antlr is &lt;1.7.1-16.11.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235012" version="1" comment="ant-apache-bcel is &lt;1.7.1-16.11.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235013" version="1" comment="ant-apache-bsf is &lt;1.7.1-16.11.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235014" version="1" comment="ant-apache-log4j is &lt;1.7.1-16.11.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235015" version="1" comment="ant-apache-oro is &lt;1.7.1-16.11.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235016" version="1" comment="ant-apache-regexp is &lt;1.7.1-16.11.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235017" version="1" comment="ant-apache-resolver is &lt;1.7.1-16.11.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235018" version="1" comment="ant-commons-logging is &lt;1.7.1-16.11.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235019" version="1" comment="ant-javamail is &lt;1.7.1-16.11.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235020" version="1" comment="ant-jdepend is &lt;1.7.1-16.11.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235021" version="1" comment="ant-jmf is &lt;1.7.1-16.11.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235022" version="1" comment="ant-junit is &lt;1.7.1-16.11.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235023" version="1" comment="ant-manual is &lt;1.7.1-20.11.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235024" version="1" comment="ant-nodeps is &lt;1.7.1-16.11.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235025" version="1" comment="ant-scripts is &lt;1.7.1-20.11.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235026" version="1" comment="ant-swing is &lt;1.7.1-16.11.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235027" version="1" comment="ant-trax is &lt;1.7.1-16.11.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202386" version="1" comment="apache2 is &lt;2.2.12-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202387" version="1" comment="apache2-devel is &lt;2.2.12-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202388" version="1" comment="apache2-doc is &lt;2.2.12-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202389" version="1" comment="apache2-example-pages is &lt;2.2.12-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202390" version="1" comment="apache2-prefork is &lt;2.2.12-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202391" version="1" comment="apache2-utils is &lt;2.2.12-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202392" version="1" comment="apache2-worker is &lt;2.2.12-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202393" version="1" comment="apache2 is &lt;2.2.12-69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202394" version="1" comment="apache2-devel is &lt;2.2.12-69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202395" version="1" comment="apache2-doc is &lt;2.2.12-69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202396" version="1" comment="apache2-example-pages is &lt;2.2.12-69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202397" version="1" comment="apache2-prefork is &lt;2.2.12-69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202398" version="1" comment="apache2-utils is &lt;2.2.12-69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202399" version="1" comment="apache2-worker is &lt;2.2.12-69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202400" version="1" comment="apache2 is &lt;2.2.34-70.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202401" version="1" comment="apache2-devel is &lt;2.2.34-70.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202402" version="1" comment="apache2-doc is &lt;2.2.34-70.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202403" version="1" comment="apache2-example-pages is &lt;2.2.34-70.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202404" version="1" comment="apache2-prefork is &lt;2.2.34-70.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202405" version="1" comment="apache2-utils is &lt;2.2.34-70.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202406" version="1" comment="apache2-worker is &lt;2.2.34-70.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202407" version="1" comment="apache2 is &lt;2.2.34-70.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202408" version="1" comment="apache2-devel is &lt;2.2.34-70.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202409" version="1" comment="apache2-doc is &lt;2.2.34-70.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202410" version="1" comment="apache2-example-pages is &lt;2.2.34-70.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202411" version="1" comment="apache2-prefork is &lt;2.2.34-70.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202412" version="1" comment="apache2-utils is &lt;2.2.34-70.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202413" version="1" comment="apache2-worker is &lt;2.2.34-70.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202414" version="1" comment="apache2 is &lt;2.2.34-70.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202415" version="1" comment="apache2-devel is &lt;2.2.34-70.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202416" version="1" comment="apache2-doc is &lt;2.2.34-70.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202417" version="1" comment="apache2-example-pages is &lt;2.2.34-70.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202418" version="1" comment="apache2-prefork is &lt;2.2.34-70.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202419" version="1" comment="apache2-utils is &lt;2.2.34-70.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202420" version="1" comment="apache2-worker is &lt;2.2.34-70.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247012" version="1" comment="apache2 is &lt;2.2.34-70.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247013" version="1" comment="apache2-devel is &lt;2.2.34-70.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247014" version="1" comment="apache2-doc is &lt;2.2.34-70.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247015" version="1" comment="apache2-example-pages is &lt;2.2.34-70.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247016" version="1" comment="apache2-prefork is &lt;2.2.34-70.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247017" version="1" comment="apache2-utils is &lt;2.2.34-70.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247018" version="1" comment="apache2-worker is &lt;2.2.34-70.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202421" version="1" comment="apache2-mod_fcgid is &lt;2.2-31.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202422" version="1" comment="audiofile is &lt;0.2.6-142.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202423" version="1" comment="audiofile-devel is &lt;0.2.6-142.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202424" version="1" comment="augeas is &lt;0.9.0-3.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202425" version="1" comment="augeas-devel is &lt;0.9.0-3.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243970" version="1" comment="avahi is &lt;0.6.23-35.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243971" version="1" comment="avahi-compat-howl-devel is &lt;0.6.23-35.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243972" version="1" comment="avahi-compat-mDNSResponder-devel is &lt;0.6.23-35.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243973" version="1" comment="avahi-glib2 is &lt;0.6.23-35.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243974" version="1" comment="avahi-mono is &lt;0.6.23-35.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243975" version="1" comment="libavahi-devel is &lt;0.6.23-35.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243976" version="1" comment="libavahi-glib-devel is &lt;0.6.23-35.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243977" version="1" comment="libavahi-gobject-devel is &lt;0.6.23-35.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243978" version="1" comment="libavahi-gobject0 is &lt;0.6.23-35.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243979" version="1" comment="libavahi-ui0 is &lt;0.6.23-35.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243980" version="1" comment="libhowl0 is &lt;0.6.23-35.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243981" version="1" comment="python-avahi is &lt;0.6.23-35.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243982" version="1" comment="python-avahi-gtk is &lt;0.6.23-35.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202426" version="1" comment="bash is &lt;3.2-147.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202427" version="1" comment="libreadline5 is &lt;5.2-147.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202428" version="1" comment="readline-devel is &lt;5.2-147.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202429" version="1" comment="readline-devel-32bit is &lt;5.2-147.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202430" version="1" comment="bash is &lt;3.2-147.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202431" version="1" comment="libreadline5 is &lt;5.2-147.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202432" version="1" comment="readline-devel is &lt;5.2-147.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202433" version="1" comment="readline-devel-32bit is &lt;5.2-147.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202434" version="1" comment="bind is &lt;9.9.6P1-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202435" version="1" comment="bind-devel is &lt;9.9.6P1-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202436" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202437" version="1" comment="bind is &lt;9.9.6P1-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202438" version="1" comment="bind-devel is &lt;9.9.6P1-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202439" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202440" version="1" comment="bind is &lt;9.9.6P1-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202441" version="1" comment="bind-devel is &lt;9.9.6P1-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202442" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202443" version="1" comment="bind is &lt;9.9.6P1-0.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202444" version="1" comment="bind-devel is &lt;9.9.6P1-0.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202445" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202446" version="1" comment="bind is &lt;9.9.6P1-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202447" version="1" comment="bind-devel is &lt;9.9.6P1-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202448" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202449" version="1" comment="bind is &lt;9.9.6P1-0.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202450" version="1" comment="bind-devel is &lt;9.9.6P1-0.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202451" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202452" version="1" comment="bind is &lt;9.9.6P1-0.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202453" version="1" comment="bind-devel is &lt;9.9.6P1-0.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202454" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202455" version="1" comment="bind is &lt;9.9.6P1-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202456" version="1" comment="bind-devel is &lt;9.9.6P1-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202457" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202458" version="1" comment="bind is &lt;9.9.6P1-0.51.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202459" version="1" comment="bind-devel is &lt;9.9.6P1-0.51.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202460" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.51.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202461" version="1" comment="bsdtar is &lt;2.5.5-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202462" version="1" comment="libarchive-devel is &lt;2.5.5-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202463" version="1" comment="bsh2 is &lt;2.0-318" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202464" version="1" comment="bsh2-classgen is &lt;2.0-318" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202465" version="1" comment="bsh2-javadoc is &lt;2.0-318" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202466" version="1" comment="build is &lt;20171128-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202467" version="1" comment="osc is &lt;0.162.1-7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202468" version="1" comment="bzr is &lt;1.8-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202469" version="1" comment="cairo is &lt;1.8.8-2.3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202470" version="1" comment="cairo-devel is &lt;1.8.8-2.3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202471" version="1" comment="cairo-devel-32bit is &lt;1.8.8-2.3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202472" version="1" comment="cairo-doc is &lt;1.8.8-2.3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202473" version="1" comment="cracklib is &lt;2.8.12-56.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202474" version="1" comment="cracklib-devel is &lt;2.8.12-56.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242135" version="1" comment="crash is &lt;7.0.9-30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242136" version="1" comment="crash-devel is &lt;7.0.9-30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202475" version="1" comment="ctdb is &lt;1.0.114.6-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202476" version="1" comment="ctdb-devel is &lt;1.0.114.6-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231485" version="1" comment="cups is &lt;1.3.9-8.46.56.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231486" version="1" comment="cups-devel is &lt;1.3.9-8.46.56.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202477" version="1" comment="curl is &lt;7.19.7-1.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202478" version="1" comment="libcurl-devel is &lt;7.19.7-1.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202479" version="1" comment="curl is &lt;7.19.7-1.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202480" version="1" comment="libcurl-devel is &lt;7.19.7-1.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202481" version="1" comment="curl is &lt;7.19.7-1.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202482" version="1" comment="libcurl-devel is &lt;7.19.7-1.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202483" version="1" comment="curl is &lt;7.19.7-1.70.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202484" version="1" comment="libcurl-devel is &lt;7.19.7-1.70.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202485" version="1" comment="curl is &lt;7.19.7-1.70.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202486" version="1" comment="libcurl-devel is &lt;7.19.7-1.70.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202487" version="1" comment="curl is &lt;7.19.7-1.70.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202488" version="1" comment="libcurl-devel is &lt;7.19.7-1.70.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202489" version="1" comment="curl is &lt;7.37.0-70.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202490" version="1" comment="libcurl-devel is &lt;7.37.0-70.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202491" version="1" comment="curl is &lt;7.37.0-70.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202492" version="1" comment="libcurl-devel is &lt;7.37.0-70.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234522" version="1" comment="curl is &lt;7.37.0-70.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234523" version="1" comment="libcurl-devel is &lt;7.37.0-70.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238964" version="1" comment="curl is &lt;7.37.0-70.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238965" version="1" comment="libcurl-devel is &lt;7.37.0-70.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202493" version="1" comment="cvs is &lt;1.12.12-144.23.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202494" version="1" comment="cvs-doc is &lt;1.12.12-144.23.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202495" version="1" comment="cyrus-imapd is &lt;2.3.11-60.65.67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202496" version="1" comment="cyrus-imapd-devel is &lt;2.3.11-60.65.67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202497" version="1" comment="perl-Cyrus-IMAP is &lt;2.3.11-60.65.67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202498" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.3.11-60.65.67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202499" version="1" comment="dhcp is &lt;4.2.4.P2-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202500" version="1" comment="dhcp-devel is &lt;4.2.4.P2-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202501" version="1" comment="dhcp is &lt;4.2.4.P2-0.28.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202502" version="1" comment="dhcp-devel is &lt;4.2.4.P2-0.28.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202503" version="1" comment="dhcp is &lt;4.2.4.P2-0.28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202504" version="1" comment="dhcp-devel is &lt;4.2.4.P2-0.28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238165" version="1" comment="dom4j is &lt;1.6.1-8.3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202505" version="1" comment="emacs is &lt;22.3-42.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202506" version="1" comment="emacs-nox is &lt;22.3-42.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202507" version="1" comment="evince is &lt;2.28.2-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202508" version="1" comment="evince-devel is &lt;2.28.2-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230745" version="1" comment="exempi is &lt;2.0.2-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230746" version="1" comment="libexempi-devel is &lt;2.0.2-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202509" version="1" comment="expat is &lt;2.0.1-88.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202510" version="1" comment="libexpat-devel is &lt;2.0.1-88.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202511" version="1" comment="expat is &lt;2.0.1-88.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202512" version="1" comment="libexpat-devel is &lt;2.0.1-88.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202513" version="1" comment="expat is &lt;2.0.1-88.42.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202514" version="1" comment="libexpat-devel is &lt;2.0.1-88.42.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202515" version="1" comment="MozillaFirefox is &lt;52.4.0esr-72.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202516" version="1" comment="MozillaFirefox-devel is &lt;52.4.0esr-72.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202517" version="1" comment="mozilla-nss is &lt;3.29.5-47.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202518" version="1" comment="mozilla-nss-devel is &lt;3.29.5-47.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202519" version="1" comment="fontconfig is &lt;2.6.0-10.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202520" version="1" comment="fontconfig-devel is &lt;2.6.0-10.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202521" version="1" comment="fontconfig-devel-32bit is &lt;2.6.0-10.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202522" version="1" comment="freeradius-server is &lt;2.1.1-7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202523" version="1" comment="freeradius-server-devel is &lt;2.1.1-7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202524" version="1" comment="freeradius-server-libs is &lt;2.1.1-7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202525" version="1" comment="freeradius-server is &lt;2.1.1-7.25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202526" version="1" comment="freeradius-server-devel is &lt;2.1.1-7.25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202527" version="1" comment="freeradius-server-libs is &lt;2.1.1-7.25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202528" version="1" comment="freetype2 is &lt;2.3.7-25.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202529" version="1" comment="freetype2-devel is &lt;2.3.7-25.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202530" version="1" comment="freetype2-devel-32bit is &lt;2.3.7-25.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202531" version="1" comment="freetype2 is &lt;2.3.7-25.45.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202532" version="1" comment="freetype2-devel is &lt;2.3.7-25.45.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202533" version="1" comment="freetype2-devel-32bit is &lt;2.3.7-25.45.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202534" version="1" comment="freetype2 is &lt;2.3.7-25.45.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202535" version="1" comment="freetype2-devel is &lt;2.3.7-25.45.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202536" version="1" comment="freetype2-devel-32bit is &lt;2.3.7-25.45.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243983" version="1" comment="fuse is &lt;2.8.7-0.11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243984" version="1" comment="fuse-devel is &lt;2.8.7-0.11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202537" version="1" comment="cpp43 is &lt;4.3.4_20091019-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202538" version="1" comment="gcc43 is &lt;4.3.4_20091019-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202539" version="1" comment="gcc43-ada is &lt;4.3.4_20091019-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202540" version="1" comment="gcc43-fortran is &lt;4.3.4_20091019-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202541" version="1" comment="gcc43-fortran-32bit is &lt;4.3.4_20091019-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202542" version="1" comment="gcc43-obj-c++ is &lt;4.3.4_20091019-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202543" version="1" comment="gcc43-objc is &lt;4.3.4_20091019-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202544" version="1" comment="gcc43-objc-32bit is &lt;4.3.4_20091019-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202545" version="1" comment="libada43 is &lt;4.3.4_20091019-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202546" version="1" comment="libobjc43 is &lt;4.3.4_20091019-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202547" version="1" comment="libobjc43-32bit is &lt;4.3.4_20091019-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202548" version="1" comment="cpp43 is &lt;4.3.4_20091019-37.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202549" version="1" comment="gcc43 is &lt;4.3.4_20091019-37.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202550" version="1" comment="gcc43-ada is &lt;4.3.4_20091019-37.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202551" version="1" comment="gcc43-fortran is &lt;4.3.4_20091019-37.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202552" version="1" comment="gcc43-fortran-32bit is &lt;4.3.4_20091019-37.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202553" version="1" comment="gcc43-obj-c++ is &lt;4.3.4_20091019-37.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202554" version="1" comment="gcc43-objc is &lt;4.3.4_20091019-37.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202555" version="1" comment="gcc43-objc-32bit is &lt;4.3.4_20091019-37.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202556" version="1" comment="libada43 is &lt;4.3.4_20091019-37.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202557" version="1" comment="libobjc43 is &lt;4.3.4_20091019-37.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202558" version="1" comment="libobjc43-32bit is &lt;4.3.4_20091019-37.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202559" version="1" comment="cpp48 is &lt;4.8.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202560" version="1" comment="gcc48 is &lt;4.8.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202561" version="1" comment="gcc48-32bit is &lt;4.8.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202562" version="1" comment="gcc48-c++ is &lt;4.8.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202563" version="1" comment="gcc48-fortran is &lt;4.8.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202564" version="1" comment="gcc48-fortran-32bit is &lt;4.8.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202565" version="1" comment="gcc48-info is &lt;4.8.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202566" version="1" comment="gcc48-locale is &lt;4.8.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202567" version="1" comment="libasan0 is &lt;4.8.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202568" version="1" comment="libasan0-32bit is &lt;4.8.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202569" version="1" comment="libstdc++48-devel is &lt;4.8.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202570" version="1" comment="libstdc++48-devel-32bit is &lt;4.8.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202571" version="1" comment="cpp48 is &lt;4.8.5-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202572" version="1" comment="gcc48 is &lt;4.8.5-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202573" version="1" comment="gcc48-32bit is &lt;4.8.5-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202574" version="1" comment="gcc48-c++ is &lt;4.8.5-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202575" version="1" comment="gcc48-fortran is &lt;4.8.5-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202576" version="1" comment="gcc48-fortran-32bit is &lt;4.8.5-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202577" version="1" comment="gcc48-info is &lt;4.8.5-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202578" version="1" comment="gcc48-locale is &lt;4.8.5-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202579" version="1" comment="libasan0 is &lt;4.8.5-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202580" version="1" comment="libasan0-32bit is &lt;4.8.5-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202581" version="1" comment="libstdc++48-devel is &lt;4.8.5-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202582" version="1" comment="libstdc++48-devel-32bit is &lt;4.8.5-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202583" version="1" comment="cpp5 is &lt;5.3.1+r233831-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202584" version="1" comment="gcc5 is &lt;5.3.1+r233831-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202585" version="1" comment="gcc5-32bit is &lt;5.3.1+r233831-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202586" version="1" comment="gcc5-c++ is &lt;5.3.1+r233831-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202587" version="1" comment="gcc5-c++-32bit is &lt;5.3.1+r233831-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202588" version="1" comment="gcc5-fortran is &lt;5.3.1+r233831-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202589" version="1" comment="gcc5-fortran-32bit is &lt;5.3.1+r233831-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202590" version="1" comment="gcc5-info is &lt;5.3.1+r233831-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202591" version="1" comment="gcc5-locale is &lt;5.3.1+r233831-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202592" version="1" comment="libasan2 is &lt;5.3.1+r233831-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202593" version="1" comment="libasan2-32bit is &lt;5.3.1+r233831-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202594" version="1" comment="libatomic1 is &lt;5.3.1+r233831-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202595" version="1" comment="libcilkrts5 is &lt;5.3.1+r233831-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202596" version="1" comment="libcilkrts5-32bit is &lt;5.3.1+r233831-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202597" version="1" comment="libffi-devel-gcc5 is &lt;5.3.1+r233831-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202598" version="1" comment="libffi-devel-gcc5-32bit is &lt;5.3.1+r233831-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202599" version="1" comment="libffi-gcc5 is &lt;5.3.1+r233831-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202600" version="1" comment="libgfortran3 is &lt;5.3.1+r233831-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202601" version="1" comment="libitm1 is &lt;5.3.1+r233831-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202602" version="1" comment="libitm1-32bit is &lt;5.3.1+r233831-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202603" version="1" comment="liblsan0 is &lt;5.3.1+r233831-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202604" version="1" comment="libquadmath0 is &lt;5.3.1+r233831-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202605" version="1" comment="libstdc++6-devel-gcc5 is &lt;5.3.1+r233831-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202606" version="1" comment="libstdc++6-devel-gcc5-32bit is &lt;5.3.1+r233831-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202607" version="1" comment="libtsan0 is &lt;5.3.1+r233831-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202608" version="1" comment="libubsan0 is &lt;5.3.1+r233831-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202609" version="1" comment="libubsan0-32bit is &lt;5.3.1+r233831-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202610" version="1" comment="gd is &lt;2.0.36.RC1-52.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202611" version="1" comment="gd-devel is &lt;2.0.36.RC1-52.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202612" version="1" comment="gd is &lt;2.0.36.RC1-52.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202613" version="1" comment="gd-devel is &lt;2.0.36.RC1-52.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202614" version="1" comment="gd is &lt;2.0.36.RC1-52.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202615" version="1" comment="gd-devel is &lt;2.0.36.RC1-52.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202616" version="1" comment="gd is &lt;2.0.36.RC1-52.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202617" version="1" comment="gd-devel is &lt;2.0.36.RC1-52.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202618" version="1" comment="gd is &lt;2.0.36.RC1-52.33.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202619" version="1" comment="gd-devel is &lt;2.0.36.RC1-52.33.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202620" version="1" comment="ghostscript-devel is &lt;8.62-32.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202621" version="1" comment="ghostscript-ijs-devel is &lt;8.62-32.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202622" version="1" comment="ghostscript-library is &lt;8.62-32.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202623" version="1" comment="libgimpprint-devel is &lt;4.2.7-32.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202624" version="1" comment="ghostscript-devel is &lt;8.62-32.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202625" version="1" comment="ghostscript-ijs-devel is &lt;8.62-32.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202626" version="1" comment="ghostscript-library is &lt;8.62-32.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202627" version="1" comment="libgimpprint-devel is &lt;4.2.7-32.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202628" version="1" comment="ghostscript-devel is &lt;8.62-32.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202629" version="1" comment="ghostscript-ijs-devel is &lt;8.62-32.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202630" version="1" comment="ghostscript-library is &lt;8.62-32.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202631" version="1" comment="libgimpprint-devel is &lt;4.2.7-32.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202632" version="1" comment="ghostscript-devel is &lt;8.62-32.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202633" version="1" comment="ghostscript-ijs-devel is &lt;8.62-32.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202634" version="1" comment="ghostscript-library is &lt;8.62-32.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202635" version="1" comment="libgimpprint-devel is &lt;4.2.7-32.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202636" version="1" comment="ghostscript-devel is &lt;8.62-32.47.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202637" version="1" comment="ghostscript-ijs-devel is &lt;8.62-32.47.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202638" version="1" comment="ghostscript-library is &lt;8.62-32.47.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202639" version="1" comment="libgimpprint-devel is &lt;4.2.7-32.47.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202640" version="1" comment="ghostscript-devel is &lt;8.62-32.47.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202641" version="1" comment="ghostscript-ijs-devel is &lt;8.62-32.47.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202642" version="1" comment="ghostscript-library is &lt;8.62-32.47.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202643" version="1" comment="libgimpprint-devel is &lt;4.2.7-32.47.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237951" version="1" comment="ghostscript-devel is &lt;8.62-32.47.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237952" version="1" comment="ghostscript-ijs-devel is &lt;8.62-32.47.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237953" version="1" comment="ghostscript-library is &lt;8.62-32.47.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237954" version="1" comment="libgimpprint-devel is &lt;4.2.7-32.47.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202644" version="1" comment="giflib is &lt;4.1.6-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202645" version="1" comment="giflib-devel is &lt;4.1.6-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202646" version="1" comment="giflib-devel-32bit is &lt;4.1.6-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202647" version="1" comment="gimp is &lt;2.6.2-3.34.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202648" version="1" comment="gimp-devel is &lt;2.6.2-3.34.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202649" version="1" comment="gimp-lang is &lt;2.6.2-3.34.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202650" version="1" comment="gimp-plugins-python is &lt;2.6.2-3.34.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202651" version="1" comment="git is &lt;1.7.12.4-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202652" version="1" comment="git-arch is &lt;1.7.12.4-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202653" version="1" comment="git-core is &lt;1.7.12.4-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202654" version="1" comment="git-cvs is &lt;1.7.12.4-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202655" version="1" comment="git-daemon is &lt;1.7.12.4-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202656" version="1" comment="git-email is &lt;1.7.12.4-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202657" version="1" comment="git-gui is &lt;1.7.12.4-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202658" version="1" comment="git-svn is &lt;1.7.12.4-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202659" version="1" comment="git-web is &lt;1.7.12.4-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202660" version="1" comment="gitk is &lt;1.7.12.4-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202661" version="1" comment="git is &lt;1.7.12.4-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202662" version="1" comment="git-arch is &lt;1.7.12.4-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202663" version="1" comment="git-core is &lt;1.7.12.4-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202664" version="1" comment="git-cvs is &lt;1.7.12.4-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202665" version="1" comment="git-daemon is &lt;1.7.12.4-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202666" version="1" comment="git-email is &lt;1.7.12.4-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202667" version="1" comment="git-gui is &lt;1.7.12.4-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202668" version="1" comment="git-svn is &lt;1.7.12.4-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202669" version="1" comment="git-web is &lt;1.7.12.4-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202670" version="1" comment="gitk is &lt;1.7.12.4-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202671" version="1" comment="git is &lt;1.7.12.4-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202672" version="1" comment="git-arch is &lt;1.7.12.4-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202673" version="1" comment="git-core is &lt;1.7.12.4-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202674" version="1" comment="git-cvs is &lt;1.7.12.4-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202675" version="1" comment="git-daemon is &lt;1.7.12.4-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202676" version="1" comment="git-email is &lt;1.7.12.4-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202677" version="1" comment="git-gui is &lt;1.7.12.4-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202678" version="1" comment="git-svn is &lt;1.7.12.4-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202679" version="1" comment="git-web is &lt;1.7.12.4-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202680" version="1" comment="gitk is &lt;1.7.12.4-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202681" version="1" comment="git is &lt;1.7.12.4-0.18.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202682" version="1" comment="git-arch is &lt;1.7.12.4-0.18.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202683" version="1" comment="git-core is &lt;1.7.12.4-0.18.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202684" version="1" comment="git-cvs is &lt;1.7.12.4-0.18.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202685" version="1" comment="git-daemon is &lt;1.7.12.4-0.18.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202686" version="1" comment="git-email is &lt;1.7.12.4-0.18.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202687" version="1" comment="git-gui is &lt;1.7.12.4-0.18.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202688" version="1" comment="git-svn is &lt;1.7.12.4-0.18.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202689" version="1" comment="git-web is &lt;1.7.12.4-0.18.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202690" version="1" comment="gitk is &lt;1.7.12.4-0.18.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243639" version="1" comment="git is &lt;1.7.12.4-0.18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243640" version="1" comment="git-arch is &lt;1.7.12.4-0.18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243641" version="1" comment="git-core is &lt;1.7.12.4-0.18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243642" version="1" comment="git-cvs is &lt;1.7.12.4-0.18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243643" version="1" comment="git-daemon is &lt;1.7.12.4-0.18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243644" version="1" comment="git-email is &lt;1.7.12.4-0.18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243645" version="1" comment="git-gui is &lt;1.7.12.4-0.18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243646" version="1" comment="git-svn is &lt;1.7.12.4-0.18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243647" version="1" comment="git-web is &lt;1.7.12.4-0.18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243648" version="1" comment="gitk is &lt;1.7.12.4-0.18.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240950" version="1" comment="glib2 is &lt;2.22.5-0.8.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240951" version="1" comment="glib2-devel is &lt;2.22.5-0.8.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240952" version="1" comment="glib2-devel-32bit is &lt;2.22.5-0.8.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240953" version="1" comment="glib2-doc is &lt;2.22.5-0.8.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240954" version="1" comment="libgio-fam is &lt;2.22.5-0.8.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202691" version="1" comment="glibc is &lt;2.11.3-17.102" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202692" version="1" comment="glibc-html is &lt;2.11.3-17.102" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202693" version="1" comment="glibc-info is &lt;2.11.3-17.102" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202694" version="1" comment="glibc is &lt;2.11.3-17.109" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202695" version="1" comment="glibc-html is &lt;2.11.3-17.109" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202696" version="1" comment="glibc-info is &lt;2.11.3-17.109" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202697" version="1" comment="glibc is &lt;2.11.3-17.110.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202698" version="1" comment="glibc-html is &lt;2.11.3-17.110.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202699" version="1" comment="glibc-info is &lt;2.11.3-17.110.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202700" version="1" comment="glibc is &lt;2.11.3-17.110.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202701" version="1" comment="glibc-html is &lt;2.11.3-17.110.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202702" version="1" comment="glibc-info is &lt;2.11.3-17.110.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202703" version="1" comment="glibc is &lt;2.11.3-17.110.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202704" version="1" comment="glibc-html is &lt;2.11.3-17.110.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202705" version="1" comment="glibc-info is &lt;2.11.3-17.110.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231870" version="1" comment="glibc is &lt;2.11.3-17.110.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231871" version="1" comment="glibc-html is &lt;2.11.3-17.110.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231872" version="1" comment="glibc-info is &lt;2.11.3-17.110.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235436" version="1" comment="glibc is &lt;2.11.3-17.110.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235437" version="1" comment="glibc-html is &lt;2.11.3-17.110.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235438" version="1" comment="glibc-info is &lt;2.11.3-17.110.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241585" version="1" comment="glibc is &lt;2.11.3-17.110.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241586" version="1" comment="glibc-html is &lt;2.11.3-17.110.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241587" version="1" comment="glibc-info is &lt;2.11.3-17.110.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202706" version="1" comment="gnutls is &lt;2.4.1-24.39.67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202707" version="1" comment="libgnutls-devel is &lt;2.4.1-24.39.67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202708" version="1" comment="libgnutls-extra-devel is &lt;2.4.1-24.39.67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202709" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202710" version="1" comment="gnutls is &lt;2.4.1-24.39.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202711" version="1" comment="libgnutls-devel is &lt;2.4.1-24.39.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202712" version="1" comment="libgnutls-extra-devel is &lt;2.4.1-24.39.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202713" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202714" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.35-5.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202715" version="1" comment="gstreamer-0_10-plugins-base-devel is &lt;0.10.35-5.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202716" version="1" comment="gtk2 is &lt;2.18.9-0.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202717" version="1" comment="gtk2-devel is &lt;2.18.9-0.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202718" version="1" comment="gtk2-devel-32bit is &lt;2.18.9-0.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202719" version="1" comment="gtk2 is &lt;2.18.9-0.45.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202720" version="1" comment="gtk2-devel is &lt;2.18.9-0.45.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202721" version="1" comment="gtk2-devel-32bit is &lt;2.18.9-0.45.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233157" version="1" comment="gtk2 is &lt;2.18.9-0.45.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233158" version="1" comment="gtk2-devel is &lt;2.18.9-0.45.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233159" version="1" comment="gtk2-devel-32bit is &lt;2.18.9-0.45.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202722" version="1" comment="guile is &lt;1.8.5-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202723" version="1" comment="guile-devel is &lt;1.8.5-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202724" version="1" comment="icu is &lt;4.0-7.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202725" version="1" comment="libicu-32bit is &lt;4.0-7.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202726" version="1" comment="libicu-devel is &lt;4.0-7.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202727" version="1" comment="libicu-devel-32bit is &lt;4.0-7.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202728" version="1" comment="icu is &lt;4.0-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202729" version="1" comment="libicu-32bit is &lt;4.0-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202730" version="1" comment="libicu-devel is &lt;4.0-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202731" version="1" comment="libicu-devel-32bit is &lt;4.0-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202732" version="1" comment="icu is &lt;4.0-43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202733" version="1" comment="libicu-32bit is &lt;4.0-43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202734" version="1" comment="libicu-devel is &lt;4.0-43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202735" version="1" comment="libicu-devel-32bit is &lt;4.0-43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202736" version="1" comment="icu is &lt;4.0-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202737" version="1" comment="libicu-32bit is &lt;4.0-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202738" version="1" comment="libicu-devel is &lt;4.0-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202739" version="1" comment="libicu-devel-32bit is &lt;4.0-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202740" version="1" comment="icu is &lt;4.0-47.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202741" version="1" comment="libicu-32bit is &lt;4.0-47.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202742" version="1" comment="libicu-devel is &lt;4.0-47.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202743" version="1" comment="libicu-devel-32bit is &lt;4.0-47.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202744" version="1" comment="imlib2 is &lt;1.4.2-2.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202745" version="1" comment="imlib2-devel is &lt;1.4.2-2.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202746" version="1" comment="imlib2-filters is &lt;1.4.2-2.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202747" version="1" comment="imlib2-loaders is &lt;1.4.2-2.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202748" version="1" comment="jasper is &lt;1.900.14-134.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202749" version="1" comment="libjasper-devel is &lt;1.900.14-134.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202750" version="1" comment="jasper is &lt;1.900.14-134.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202751" version="1" comment="libjasper-devel is &lt;1.900.14-134.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202752" version="1" comment="jasper is &lt;1.900.14-134.33.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202753" version="1" comment="libjasper-devel is &lt;1.900.14-134.33.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202754" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202755" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr3.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202756" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.20-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202757" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr3.20-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202758" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.30-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202759" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr3.30-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202760" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.40-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202761" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr3.40-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202762" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.60-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202763" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr3.60-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202764" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.1-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202765" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.1-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202766" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.5-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202767" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.5-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202768" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.10-26.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202769" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.10-26.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202770" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.15-26.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202771" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.15-26.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202772" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.20-26.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202773" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.20-26.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202774" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.25-26.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202775" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.25-26.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233812" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.30-26.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233813" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.30-26.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240824" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.35-26.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240825" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.35-26.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245872" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.40-26.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245873" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.40-26.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202776" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.50-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202777" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr3.50-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229516" version="1" comment="jpeg is &lt;6b-879.12.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229517" version="1" comment="libjpeg-devel is &lt;6.2.0-879.12.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229518" version="1" comment="libjpeg-devel-32bit is &lt;6.2.0-879.12.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238285" version="1" comment="kdelibs3 is &lt;3.5.10-23.30.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238286" version="1" comment="kdelibs3-32bit is &lt;3.5.10-23.30.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238287" version="1" comment="kdelibs3-arts is &lt;3.5.10-23.30.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238288" version="1" comment="kdelibs3-arts-32bit is &lt;3.5.10-23.30.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238289" version="1" comment="kdelibs3-arts-x86 is &lt;3.5.10-23.30.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238290" version="1" comment="kdelibs3-default-style-32bit is &lt;3.5.10-23.30.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238291" version="1" comment="kdelibs3-devel is &lt;3.5.10-23.30.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238292" version="1" comment="kdelibs3-doc is &lt;3.5.10-23.30.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202778" version="1" comment="kernel-docs is &lt;3.0.101-80" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202779" version="1" comment="kernel-docs is &lt;3.0.101-88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202780" version="1" comment="kernel-docs is &lt;3.0.101-94" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202781" version="1" comment="kernel-docs is &lt;3.0.101-97" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202782" version="1" comment="kernel-docs is &lt;3.0.101-104" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202783" version="1" comment="kernel-docs is &lt;3.0.101-108.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202784" version="1" comment="kernel-docs is &lt;3.0.101-108.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235439" version="1" comment="kernel-docs is &lt;3.0.101-108.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202785" version="1" comment="kernel-docs is &lt;3.0.101-65" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202786" version="1" comment="kernel-docs is &lt;3.0.101-71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202787" version="1" comment="kernel-docs is &lt;3.0.101-108.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202788" version="1" comment="kernel-docs is &lt;3.0.101-108.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202789" version="1" comment="kernel-docs is &lt;3.0.101-108.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202790" version="1" comment="kernel-docs is &lt;3.0.101-108.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202791" version="1" comment="kernel-docs is &lt;3.0.101-108.48" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202792" version="1" comment="kernel-docs is &lt;3.0.101-108.52" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232392" version="1" comment="kernel-docs is &lt;3.0.101-108.68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236888" version="1" comment="kernel-docs is &lt;3.0.101-108.77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245901" version="1" comment="kernel-docs is &lt;3.0.101-108.87" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202793" version="1" comment="kernel-docs is &lt;3.0.101-68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202794" version="1" comment="kernel-docs is &lt;3.0.101-77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202795" version="1" comment="kernel-docs is &lt;3.0.101-84" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202796" version="1" comment="kernel-docs is &lt;3.0.101-107" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202797" version="1" comment="kernel-docs is &lt;3.0.101-108.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229519" version="1" comment="kernel-docs is &lt;3.0.101-108.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230747" version="1" comment="kernel-docs is &lt;3.0.101-108.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239148" version="1" comment="kernel-docs is &lt;3.0.101-108.81" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202798" version="1" comment="kernel-docs is &lt;3.0.101-108.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202799" version="1" comment="kernel-docs is &lt;3.0.101-108.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229346" version="1" comment="ofed is &lt;1.5.4.1-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229347" version="1" comment="ofed-devel is &lt;1.5.4.1-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246575" version="1" comment="ofed is &lt;1.5.4.1-22.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246576" version="1" comment="ofed-devel is &lt;1.5.4.1-22.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202800" version="1" comment="krb5 is &lt;1.6.3-133.49.106" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202801" version="1" comment="krb5-devel is &lt;1.6.3-133.49.106" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202802" version="1" comment="krb5-devel-32bit is &lt;1.6.3-133.49.106" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202803" version="1" comment="krb5-server is &lt;1.6.3-133.49.106" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202804" version="1" comment="krb5 is &lt;1.6.3-133.49.109" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202805" version="1" comment="krb5-devel is &lt;1.6.3-133.49.109" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202806" version="1" comment="krb5-devel-32bit is &lt;1.6.3-133.49.109" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202807" version="1" comment="krb5-server is &lt;1.6.3-133.49.109" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202808" version="1" comment="krb5 is &lt;1.6.3-133.49.113.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202809" version="1" comment="krb5-devel is &lt;1.6.3-133.49.113.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202810" version="1" comment="krb5-devel-32bit is &lt;1.6.3-133.49.113.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202811" version="1" comment="krb5-server is &lt;1.6.3-133.49.113.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202812" version="1" comment="libapr-util1 is &lt;1.3.4-12.22.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202813" version="1" comment="libapr-util1-devel is &lt;1.3.4-12.22.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202814" version="1" comment="libapr-util1-devel-32bit is &lt;1.3.4-12.22.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202815" version="1" comment="libapr1 is &lt;1.3.3-11.18.19.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202816" version="1" comment="libapr1-devel is &lt;1.3.3-11.18.19.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202817" version="1" comment="libapr1-devel-32bit is &lt;1.3.3-11.18.19.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202818" version="1" comment="libcap-ng is &lt;0.6.3-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202819" version="1" comment="libcap-ng-devel is &lt;0.6.3-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202820" version="1" comment="python-capng is &lt;0.6.3-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202821" version="1" comment="libcares-devel is &lt;1.7.4-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202822" version="1" comment="libcares2 is &lt;1.7.4-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231140" version="1" comment="libcgroup-devel is &lt;0.41.rc1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231141" version="1" comment="libcgroup1 is &lt;0.41.rc1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202823" version="1" comment="libdb-4_5 is &lt;4.5.20-97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202824" version="1" comment="libdb-4_5-devel is &lt;4.5.20-97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202825" version="1" comment="libdb_java-4_5 is &lt;4.5.20-97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202826" version="1" comment="libevent is &lt;1.4.5-24.24.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202827" version="1" comment="libevent-devel is &lt;1.4.5-24.24.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202828" version="1" comment="libexif is &lt;0.6.17-2.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202829" version="1" comment="libexif-devel is &lt;0.6.17-2.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202830" version="1" comment="libgcrypt is &lt;1.5.0-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202831" version="1" comment="libgcrypt-devel is &lt;1.5.0-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202832" version="1" comment="libgcrypt-devel-32bit is &lt;1.5.0-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202833" version="1" comment="libgcrypt is &lt;1.5.0-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202834" version="1" comment="libgcrypt-devel is &lt;1.5.0-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202835" version="1" comment="libgcrypt-devel-32bit is &lt;1.5.0-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202836" version="1" comment="libical is &lt;0.43-1.10.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202837" version="1" comment="libical-devel is &lt;0.43-1.10.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202838" version="1" comment="libical0-32bit is &lt;0.43-1.10.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202839" version="1" comment="libid3tag is &lt;0.15.1b-132.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202840" version="1" comment="libid3tag-devel is &lt;0.15.1b-132.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202841" version="1" comment="libidn is &lt;1.10-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202842" version="1" comment="libidn-devel is &lt;1.10-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202843" version="1" comment="libidn is &lt;1.10-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202844" version="1" comment="libidn-devel is &lt;1.10-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202845" version="1" comment="libksba is &lt;1.0.4-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202846" version="1" comment="libksba-devel is &lt;1.0.4-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202847" version="1" comment="libmikmod is &lt;3.1.11a-116.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202848" version="1" comment="libmikmod-devel is &lt;3.1.11a-116.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246351" version="1" comment="libmspack is &lt;0.0.20060920alpha-74.11.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246352" version="1" comment="libmspack-devel is &lt;0.0.20060920alpha-74.11.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230638" version="1" comment="libofx is &lt;0.9.0-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230639" version="1" comment="libofx-devel is &lt;0.9.0-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230640" version="1" comment="libofx4 is &lt;0.9.0-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202849" version="1" comment="libosip2 is &lt;3.1.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202850" version="1" comment="libosip2-devel is &lt;3.1.0-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202851" version="1" comment="libotr is &lt;3.2.0-10.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202852" version="1" comment="libotr-devel is &lt;3.2.0-10.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202853" version="1" comment="libpng-devel is &lt;1.2.31-5.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202854" version="1" comment="libpng-devel-32bit is &lt;1.2.31-5.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202855" version="1" comment="libpng12-0 is &lt;1.2.31-5.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202856" version="1" comment="libquicktime is &lt;1.0.3-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202857" version="1" comment="libquicktime-devel is &lt;1.0.3-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202858" version="1" comment="libquicktime is &lt;1.0.3-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202859" version="1" comment="libquicktime-devel is &lt;1.0.3-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202860" version="1" comment="google-carlito-fonts is &lt;1.1.03.beta1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202861" version="1" comment="hyphen is &lt;2.8.8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202862" version="1" comment="hyphen-devel is &lt;2.8.8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202863" version="1" comment="libhyphen0 is &lt;2.8.8-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202864" version="1" comment="libmythes-1_2-0 is &lt;1.2.4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202865" version="1" comment="libreoffice is &lt;5.0.4.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202866" version="1" comment="libreoffice-base is &lt;5.0.4.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202867" version="1" comment="libreoffice-base-drivers-postgresql is &lt;5.0.4.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202868" version="1" comment="libreoffice-branding-upstream is &lt;5.0.4.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202869" version="1" comment="libreoffice-calc is &lt;5.0.4.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202870" version="1" comment="libreoffice-calc-extensions is &lt;5.0.4.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202871" version="1" comment="libreoffice-draw is &lt;5.0.4.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202872" version="1" comment="libreoffice-filters-optional is &lt;5.0.4.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202873" version="1" comment="libreoffice-gnome is &lt;5.0.4.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202874" version="1" comment="libreoffice-icon-theme-galaxy is &lt;5.0.4.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202875" version="1" comment="libreoffice-icon-theme-tango is &lt;5.0.4.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202876" version="1" comment="libreoffice-impress is &lt;5.0.4.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202877" version="1" comment="libreoffice-kde4 is &lt;5.0.4.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202878" version="1" comment="libreoffice-l10n-af is &lt;5.0.4.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202879" version="1" comment="libreoffice-l10n-ar is &lt;5.0.4.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202880" version="1" comment="libreoffice-l10n-ca is &lt;5.0.4.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202881" version="1" comment="libreoffice-l10n-cs is &lt;5.0.4.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202882" version="1" comment="libreoffice-l10n-da is &lt;5.0.4.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202883" version="1" comment="libreoffice-l10n-de is &lt;5.0.4.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202884" version="1" comment="libreoffice-l10n-en is &lt;5.0.4.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202885" version="1" comment="libreoffice-l10n-es is &lt;5.0.4.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202886" version="1" comment="libreoffice-l10n-fi is &lt;5.0.4.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202887" version="1" comment="libreoffice-l10n-fr is &lt;5.0.4.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202888" version="1" comment="libreoffice-l10n-gu is &lt;5.0.4.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202889" version="1" comment="libreoffice-l10n-hi is &lt;5.0.4.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202890" version="1" comment="libreoffice-l10n-hu is &lt;5.0.4.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202891" version="1" comment="libreoffice-l10n-it is &lt;5.0.4.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202892" version="1" comment="libreoffice-l10n-ja is &lt;5.0.4.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202893" version="1" comment="libreoffice-l10n-ko is &lt;5.0.4.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202894" version="1" comment="libreoffice-l10n-nb is &lt;5.0.4.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202895" version="1" comment="libreoffice-l10n-nl is &lt;5.0.4.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202896" version="1" comment="libreoffice-l10n-nn is &lt;5.0.4.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202897" version="1" comment="libreoffice-l10n-pl is &lt;5.0.4.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202898" version="1" comment="libreoffice-l10n-pt-BR is &lt;5.0.4.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202899" version="1" comment="libreoffice-l10n-pt-PT is &lt;5.0.4.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202900" version="1" comment="libreoffice-l10n-ru is &lt;5.0.4.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202901" version="1" comment="libreoffice-l10n-sk is &lt;5.0.4.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202902" version="1" comment="libreoffice-l10n-sv is &lt;5.0.4.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202903" version="1" comment="libreoffice-l10n-xh is &lt;5.0.4.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202904" version="1" comment="libreoffice-l10n-zh-Hans is &lt;5.0.4.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202905" version="1" comment="libreoffice-l10n-zh-Hant is &lt;5.0.4.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202906" version="1" comment="libreoffice-l10n-zu is &lt;5.0.4.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202907" version="1" comment="libreoffice-mailmerge is &lt;5.0.4.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202908" version="1" comment="libreoffice-math is &lt;5.0.4.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202909" version="1" comment="libreoffice-officebean is &lt;5.0.4.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202910" version="1" comment="libreoffice-pyuno is &lt;5.0.4.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202911" version="1" comment="libreoffice-sdk is &lt;5.0.4.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202912" version="1" comment="libreoffice-voikko is &lt;4.1-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202913" version="1" comment="libreoffice-writer is &lt;5.0.4.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202914" version="1" comment="libreoffice-writer-extensions is &lt;5.0.4.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202915" version="1" comment="libvoikko is &lt;3.7.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202916" version="1" comment="libvoikko-devel is &lt;3.7.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202917" version="1" comment="libvoikko1 is &lt;3.7.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202918" version="1" comment="myspell-af_NA is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202919" version="1" comment="myspell-af_ZA is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202920" version="1" comment="myspell-ar is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202921" version="1" comment="myspell-ar_AE is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202922" version="1" comment="myspell-ar_BH is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202923" version="1" comment="myspell-ar_DZ is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202924" version="1" comment="myspell-ar_EG is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202925" version="1" comment="myspell-ar_IQ is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202926" version="1" comment="myspell-ar_JO is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202927" version="1" comment="myspell-ar_KW is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202928" version="1" comment="myspell-ar_LB is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202929" version="1" comment="myspell-ar_LY is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202930" version="1" comment="myspell-ar_MA is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202931" version="1" comment="myspell-ar_OM is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202932" version="1" comment="myspell-ar_QA is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202933" version="1" comment="myspell-ar_SA is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202934" version="1" comment="myspell-ar_SD is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202935" version="1" comment="myspell-ar_SY is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202936" version="1" comment="myspell-ar_TN is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202937" version="1" comment="myspell-ar_YE is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202938" version="1" comment="myspell-be_BY is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202939" version="1" comment="myspell-bg_BG is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202940" version="1" comment="myspell-bn_BD is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202941" version="1" comment="myspell-bn_IN is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202942" version="1" comment="myspell-bs is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202943" version="1" comment="myspell-bs_BA is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202944" version="1" comment="myspell-ca is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202945" version="1" comment="myspell-ca_AD is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202946" version="1" comment="myspell-ca_ES is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202947" version="1" comment="myspell-ca_ES_valencia is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202948" version="1" comment="myspell-ca_FR is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202949" version="1" comment="myspell-ca_IT is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202950" version="1" comment="myspell-cs_CZ is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202951" version="1" comment="myspell-da_DK is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202952" version="1" comment="myspell-de is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202953" version="1" comment="myspell-de_AT is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202954" version="1" comment="myspell-de_CH is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202955" version="1" comment="myspell-de_DE is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202956" version="1" comment="myspell-dictionaries is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202957" version="1" comment="myspell-el_GR is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202958" version="1" comment="myspell-en is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202959" version="1" comment="myspell-en_AU is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202960" version="1" comment="myspell-en_BS is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202961" version="1" comment="myspell-en_BZ is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202962" version="1" comment="myspell-en_CA is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202963" version="1" comment="myspell-en_GB is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202964" version="1" comment="myspell-en_GH is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202965" version="1" comment="myspell-en_IE is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202966" version="1" comment="myspell-en_IN is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202967" version="1" comment="myspell-en_JM is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202968" version="1" comment="myspell-en_MW is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202969" version="1" comment="myspell-en_NA is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202970" version="1" comment="myspell-en_NZ is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202971" version="1" comment="myspell-en_PH is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202972" version="1" comment="myspell-en_TT is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202973" version="1" comment="myspell-en_US is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202974" version="1" comment="myspell-en_ZA is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202975" version="1" comment="myspell-en_ZW is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202976" version="1" comment="myspell-es is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202977" version="1" comment="myspell-es_AR is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202978" version="1" comment="myspell-es_BO is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202979" version="1" comment="myspell-es_CL is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202980" version="1" comment="myspell-es_CO is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202981" version="1" comment="myspell-es_CR is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202982" version="1" comment="myspell-es_CU is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202983" version="1" comment="myspell-es_DO is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202984" version="1" comment="myspell-es_EC is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202985" version="1" comment="myspell-es_ES is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202986" version="1" comment="myspell-es_GT is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202987" version="1" comment="myspell-es_HN is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202988" version="1" comment="myspell-es_MX is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202989" version="1" comment="myspell-es_NI is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202990" version="1" comment="myspell-es_PA is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202991" version="1" comment="myspell-es_PE is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202992" version="1" comment="myspell-es_PR is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202993" version="1" comment="myspell-es_PY is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202994" version="1" comment="myspell-es_SV is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202995" version="1" comment="myspell-es_UY is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202996" version="1" comment="myspell-es_VE is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202997" version="1" comment="myspell-et_EE is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202998" version="1" comment="myspell-fr_BE is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009202999" version="1" comment="myspell-fr_CA is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203000" version="1" comment="myspell-fr_CH is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203001" version="1" comment="myspell-fr_FR is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203002" version="1" comment="myspell-fr_LU is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203003" version="1" comment="myspell-fr_MC is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203004" version="1" comment="myspell-gu_IN is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203005" version="1" comment="myspell-he_IL is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203006" version="1" comment="myspell-hi_IN is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203007" version="1" comment="myspell-hr_HR is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203008" version="1" comment="myspell-hu_HU is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203009" version="1" comment="myspell-it_IT is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203010" version="1" comment="myspell-lightproof-en is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203011" version="1" comment="myspell-lightproof-hu_HU is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203012" version="1" comment="myspell-lightproof-pt_BR is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203013" version="1" comment="myspell-lightproof-ru_RU is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203014" version="1" comment="myspell-lo_LA is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203015" version="1" comment="myspell-lt_LT is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203016" version="1" comment="myspell-lv_LV is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203017" version="1" comment="myspell-nb_NO is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203018" version="1" comment="myspell-nl_BE is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203019" version="1" comment="myspell-nl_NL is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203020" version="1" comment="myspell-nn_NO is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203021" version="1" comment="myspell-no is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203022" version="1" comment="myspell-pl_PL is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203023" version="1" comment="myspell-pt_AO is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203024" version="1" comment="myspell-pt_BR is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203025" version="1" comment="myspell-pt_PT is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203026" version="1" comment="myspell-ro is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203027" version="1" comment="myspell-ro_RO is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203028" version="1" comment="myspell-ru_RU is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203029" version="1" comment="myspell-sk_SK is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203030" version="1" comment="myspell-sl_SI is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203031" version="1" comment="myspell-sr is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203032" version="1" comment="myspell-sr_CS is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203033" version="1" comment="myspell-sr_Latn_CS is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203034" version="1" comment="myspell-sr_Latn_RS is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203035" version="1" comment="myspell-sr_RS is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203036" version="1" comment="myspell-sv_FI is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203037" version="1" comment="myspell-sv_SE is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203038" version="1" comment="myspell-te is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203039" version="1" comment="myspell-te_IN is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203040" version="1" comment="myspell-th_TH is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203041" version="1" comment="myspell-vi is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203042" version="1" comment="myspell-vi_VN is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203043" version="1" comment="myspell-zu_ZA is &lt;20150827-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203044" version="1" comment="mythes is &lt;1.2.4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203045" version="1" comment="mythes-devel is &lt;1.2.4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203046" version="1" comment="python-importlib is &lt;1.0.2-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203047" version="1" comment="libsamplerate is &lt;0.1.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203048" version="1" comment="libsamplerate-devel is &lt;0.1.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203049" version="1" comment="libsndfile is &lt;1.0.20-2.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203050" version="1" comment="libsndfile-devel is &lt;1.0.20-2.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203051" version="1" comment="libsndfile is &lt;1.0.20-2.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203052" version="1" comment="libsndfile-devel is &lt;1.0.20-2.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203053" version="1" comment="libsndfile is &lt;1.0.20-2.19.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203054" version="1" comment="libsndfile-devel is &lt;1.0.20-2.19.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246794" version="1" comment="libsndfile is &lt;1.0.20-2.19.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246795" version="1" comment="libsndfile-devel is &lt;1.0.20-2.19.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203055" version="1" comment="libssh is &lt;0.2-5.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203056" version="1" comment="libssh-devel is &lt;0.2-5.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203057" version="1" comment="libssh-devel-doc is &lt;0.2-5.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203058" version="1" comment="libssh2 is &lt;0.2-5.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203059" version="1" comment="libssh2-1 is &lt;1.2.9-4.2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203060" version="1" comment="libssh2-1-32bit is &lt;1.2.9-4.2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203061" version="1" comment="libssh2-1-x86 is &lt;1.2.9-4.2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203062" version="1" comment="libssh2-devel is &lt;1.2.9-4.2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203063" version="1" comment="libssh2_org is &lt;1.2.9-4.2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246099" version="1" comment="libssh2-1 is &lt;1.4.3-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246100" version="1" comment="libssh2-1-32bit is &lt;1.4.3-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246101" version="1" comment="libssh2-1-x86 is &lt;1.4.3-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246102" version="1" comment="libssh2-devel is &lt;1.4.3-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246103" version="1" comment="libssh2_org is &lt;1.4.3-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203064" version="1" comment="libtirpc is &lt;0.2.1-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203065" version="1" comment="libtirpc-devel is &lt;0.2.1-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233803" version="1" comment="libtirpc is &lt;0.2.1-1.13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233804" version="1" comment="libtirpc-devel is &lt;0.2.1-1.13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237185" version="1" comment="libtirpc is &lt;0.2.1-1.13.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237186" version="1" comment="libtirpc-devel is &lt;0.2.1-1.13.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203066" version="1" comment="libvirt is &lt;1.2.5-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203067" version="1" comment="libvirt-devel is &lt;1.2.5-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203068" version="1" comment="libvirt-devel-32bit is &lt;1.2.5-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203069" version="1" comment="libvirt is &lt;1.2.5-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203070" version="1" comment="libvirt-devel is &lt;1.2.5-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203071" version="1" comment="libvirt-devel-32bit is &lt;1.2.5-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203072" version="1" comment="libvirt is &lt;1.2.5-23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203073" version="1" comment="libvirt-devel is &lt;1.2.5-23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203074" version="1" comment="libvirt-devel-32bit is &lt;1.2.5-23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203075" version="1" comment="libvirt is &lt;1.2.5-23.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203076" version="1" comment="libvirt-devel is &lt;1.2.5-23.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203077" version="1" comment="libvirt-devel-32bit is &lt;1.2.5-23.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203078" version="1" comment="libvirt is &lt;1.2.5-23.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203079" version="1" comment="libvirt-devel is &lt;1.2.5-23.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203080" version="1" comment="libvirt-devel-32bit is &lt;1.2.5-23.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203081" version="1" comment="libvorbis is &lt;1.2.0-79.20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203082" version="1" comment="libvorbis-devel is &lt;1.2.0-79.20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203083" version="1" comment="libvorbis is &lt;1.2.0-79.20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203084" version="1" comment="libvorbis-devel is &lt;1.2.0-79.20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203085" version="1" comment="libvorbis is &lt;1.2.0-79.20.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203086" version="1" comment="libvorbis-devel is &lt;1.2.0-79.20.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203087" version="1" comment="libvorbis is &lt;1.2.0-79.20.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203088" version="1" comment="libvorbis-devel is &lt;1.2.0-79.20.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203089" version="1" comment="libxml2 is &lt;2.7.6-0.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203090" version="1" comment="libxml2-devel is &lt;2.7.6-0.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203091" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203092" version="1" comment="libxml2 is &lt;2.7.6-0.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203093" version="1" comment="libxml2-devel is &lt;2.7.6-0.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203094" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203095" version="1" comment="libxml2 is &lt;2.7.6-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203096" version="1" comment="libxml2-devel is &lt;2.7.6-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203097" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203098" version="1" comment="libxml2 is &lt;2.7.6-0.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203099" version="1" comment="libxml2-devel is &lt;2.7.6-0.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203100" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203101" version="1" comment="libxml2 is &lt;2.7.6-0.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203102" version="1" comment="libxml2-devel is &lt;2.7.6-0.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203103" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203104" version="1" comment="libxml2 is &lt;2.7.6-0.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203105" version="1" comment="libxml2-devel is &lt;2.7.6-0.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203106" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203107" version="1" comment="libxml2 is &lt;2.7.6-0.77.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203108" version="1" comment="libxml2-devel is &lt;2.7.6-0.77.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203109" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.77.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203110" version="1" comment="libxml2 is &lt;2.7.6-0.77.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203111" version="1" comment="libxml2-devel is &lt;2.7.6-0.77.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203112" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.77.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246169" version="1" comment="libxml2 is &lt;2.7.6-0.77.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246170" version="1" comment="libxml2-devel is &lt;2.7.6-0.77.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246171" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.77.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203113" version="1" comment="libxslt is &lt;1.1.24-19.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203114" version="1" comment="libxslt-devel is &lt;1.1.24-19.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203115" version="1" comment="libxslt-devel-32bit is &lt;1.1.24-19.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203116" version="1" comment="libxslt-python is &lt;1.1.24-19.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203117" version="1" comment="lighttpd is &lt;1.4.20-2.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203118" version="1" comment="lighttpd-mod_cml is &lt;1.4.20-2.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203119" version="1" comment="lighttpd-mod_magnet is &lt;1.4.20-2.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203120" version="1" comment="lighttpd-mod_mysql_vhost is &lt;1.4.20-2.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203121" version="1" comment="lighttpd-mod_rrdtool is &lt;1.4.20-2.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203122" version="1" comment="lighttpd-mod_trigger_b4_dl is &lt;1.4.20-2.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203123" version="1" comment="lighttpd-mod_webdav is &lt;1.4.20-2.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203124" version="1" comment="kernel-docs is &lt;3.0.101-91" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203125" version="1" comment="kernel-docs is &lt;3.0.101-100" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203126" version="1" comment="lynx is &lt;2.8.6-145" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203127" version="1" comment="lynx is &lt;2.8.6-146.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203128" version="1" comment="memcached is &lt;1.2.6-5.17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203129" version="1" comment="memcached is &lt;1.2.6-5.17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203130" version="1" comment="mercurial is &lt;2.3.2-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203131" version="1" comment="mercurial is &lt;2.3.2-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203132" version="1" comment="mercurial is &lt;2.3.2-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203133" version="1" comment="mercurial is &lt;2.3.2-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203134" version="1" comment="mercurial is &lt;2.3.2-0.18.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230372" version="1" comment="mercurial is &lt;2.3.2-0.18.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203135" version="1" comment="MozillaFirefox is &lt;45.5.1esr-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203136" version="1" comment="MozillaFirefox-devel is &lt;45.5.1esr-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203137" version="1" comment="mozilla-nss is &lt;3.21.3-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203138" version="1" comment="mozilla-nss-devel is &lt;3.21.3-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203139" version="1" comment="bytefx-data-mysql is &lt;2.6.7-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203140" version="1" comment="mono-core is &lt;2.6.7-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203141" version="1" comment="mono-data is &lt;2.6.7-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203142" version="1" comment="mono-data-firebird is &lt;2.6.7-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203143" version="1" comment="mono-data-oracle is &lt;2.6.7-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203144" version="1" comment="mono-data-postgresql is &lt;2.6.7-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203145" version="1" comment="mono-data-sqlite is &lt;2.6.7-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203146" version="1" comment="mono-data-sybase is &lt;2.6.7-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203147" version="1" comment="mono-devel is &lt;2.6.7-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203148" version="1" comment="mono-extras is &lt;2.6.7-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203149" version="1" comment="mono-jscript is &lt;2.6.7-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203150" version="1" comment="mono-locale-extras is &lt;2.6.7-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203151" version="1" comment="mono-nunit is &lt;2.6.7-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203152" version="1" comment="mono-wcf is &lt;2.6.7-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203153" version="1" comment="mono-web is &lt;2.6.7-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203154" version="1" comment="mono-winforms is &lt;2.6.7-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203155" version="1" comment="mono-winfxcore is &lt;2.6.7-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203156" version="1" comment="monodoc-core is &lt;2.6.7-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203157" version="1" comment="libmxml1 is &lt;2.5-24.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203158" version="1" comment="mxml is &lt;2.5-24.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203159" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.49-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203160" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.49-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203161" version="1" comment="mysql is &lt;5.5.49-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203162" version="1" comment="libmysqlclient-devel is &lt;5.0.96-0.8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203163" version="1" comment="libmysqlclient_r15-32bit is &lt;5.0.96-0.8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203164" version="1" comment="libmysqlclient_r15-x86 is &lt;5.0.96-0.8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203165" version="1" comment="mysql is &lt;5.0.96-0.8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203166" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.52-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203167" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.52-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203168" version="1" comment="mysql is &lt;5.5.52-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203169" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.53-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203170" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.53-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203171" version="1" comment="mysql is &lt;5.5.53-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203172" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.54-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203173" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.54-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203174" version="1" comment="mysql is &lt;5.5.54-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203175" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.55-0.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203176" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.55-0.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203177" version="1" comment="mysql is &lt;5.5.55-0.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203178" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.57-0.39.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203179" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.57-0.39.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203180" version="1" comment="mysql is &lt;5.5.57-0.39.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203181" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.58-0.39.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203182" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.58-0.39.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203183" version="1" comment="mysql is &lt;5.5.58-0.39.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203184" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.59-0.39.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203185" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.59-0.39.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203186" version="1" comment="mysql is &lt;5.5.59-0.39.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203187" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.60-0.39.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203188" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.60-0.39.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203189" version="1" comment="mysql is &lt;5.5.60-0.39.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232714" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.61-0.39.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232715" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.61-0.39.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232716" version="1" comment="mysql is &lt;5.5.61-0.39.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238389" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.62-0.39.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238390" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.62-0.39.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238391" version="1" comment="mysql is &lt;5.5.62-0.39.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237466" version="1" comment="nagios is &lt;3.0.6-1.25.36.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237467" version="1" comment="nagios-devel is &lt;3.0.6-1.25.36.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237468" version="1" comment="nagios-www is &lt;3.0.6-1.25.36.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203190" version="1" comment="nasm is &lt;2.03.90-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223521" version="1" comment="nautilus is &lt;2.28.4-1.16.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223522" version="1" comment="nautilus-devel is &lt;2.28.4-1.16.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203191" version="1" comment="ncurses is &lt;5.6-92" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203192" version="1" comment="ncurses-devel is &lt;5.6-92" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203193" version="1" comment="ncurses-devel-32bit is &lt;5.6-92" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203194" version="1" comment="tack is &lt;5.6-92" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203195" version="1" comment="ncurses is &lt;5.6-93.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203196" version="1" comment="ncurses-devel is &lt;5.6-93.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203197" version="1" comment="ncurses-devel-32bit is &lt;5.6-93.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203198" version="1" comment="tack is &lt;5.6-93.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203199" version="1" comment="ncurses is &lt;5.6-93.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203200" version="1" comment="ncurses-devel is &lt;5.6-93.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203201" version="1" comment="ncurses-devel-32bit is &lt;5.6-93.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203202" version="1" comment="tack is &lt;5.6-93.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203203" version="1" comment="ncurses is &lt;5.6-93.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203204" version="1" comment="ncurses-devel is &lt;5.6-93.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203205" version="1" comment="ncurses-devel-32bit is &lt;5.6-93.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203206" version="1" comment="tack is &lt;5.6-93.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242239" version="1" comment="netatalk is &lt;2.0.3-249.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242240" version="1" comment="netatalk-devel is &lt;2.0.3-249.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203207" version="1" comment="libnetpbm-devel is &lt;10.26.44-101.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203208" version="1" comment="libnetpbm-devel-32bit is &lt;10.26.44-101.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203209" version="1" comment="netpbm is &lt;10.26.44-101.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230748" version="1" comment="ntfs-3g is &lt;2011.4.12-0.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230749" version="1" comment="ntfs-3g-devel is &lt;2011.4.12-0.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230750" version="1" comment="ntfsprogs is &lt;2011.4.12-0.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203210" version="1" comment="libtasn1 is &lt;1.5-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203211" version="1" comment="libtasn1-devel is &lt;1.5-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203212" version="1" comment="ocaml is &lt;4.02.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203213" version="1" comment="ocaml-compiler-libs is &lt;4.02.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203214" version="1" comment="ocaml-runtime is &lt;4.02.1-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203215" version="1" comment="ocaml is &lt;4.02.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203216" version="1" comment="ocaml-compiler-libs is &lt;4.02.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203217" version="1" comment="ocaml-runtime is &lt;4.02.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203218" version="1" comment="ocaml is &lt;4.02.1-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203219" version="1" comment="ocaml-compiler-libs is &lt;4.02.1-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203220" version="1" comment="ocaml-runtime is &lt;4.02.1-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238570" version="1" comment="opensc is &lt;0.11.6-5.27.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238571" version="1" comment="opensc-devel is &lt;0.11.6-5.27.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229997" version="1" comment="openslp is &lt;1.2.0-172.27.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229998" version="1" comment="openslp-devel is &lt;1.2.0-172.27.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229999" version="1" comment="openslp-server is &lt;1.2.0-172.27.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203221" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203222" version="1" comment="openssl is &lt;0.9.8j-0.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203223" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203224" version="1" comment="libopenssl-devel-32bit is &lt;0.9.8j-0.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203225" version="1" comment="openssl is &lt;0.9.8j-0.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203226" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.102" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203227" version="1" comment="libopenssl-devel-32bit is &lt;0.9.8j-0.102" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203228" version="1" comment="openssl is &lt;0.9.8j-0.102" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203229" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203230" version="1" comment="libopenssl-devel-32bit is &lt;0.9.8j-0.105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203231" version="1" comment="openssl is &lt;0.9.8j-0.105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203232" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.106.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203233" version="1" comment="libopenssl-devel-32bit is &lt;0.9.8j-0.106.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203234" version="1" comment="openssl is &lt;0.9.8j-0.106.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231336" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.106.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231337" version="1" comment="libopenssl-devel-32bit is &lt;0.9.8j-0.106.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231338" version="1" comment="openssl is &lt;0.9.8j-0.106.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233295" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.106.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233296" version="1" comment="libopenssl-devel-32bit is &lt;0.9.8j-0.106.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233297" version="1" comment="openssl is &lt;0.9.8j-0.106.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242428" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.106.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242429" version="1" comment="libopenssl-devel-32bit is &lt;0.9.8j-0.106.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242430" version="1" comment="openssl is &lt;0.9.8j-0.106.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245942" version="1" comment="libwsman-devel is &lt;2.2.3-0.16.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245943" version="1" comment="openwsman is &lt;2.2.3-0.16.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245944" version="1" comment="openwsman-python is &lt;2.2.3-0.16.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203235" version="1" comment="pam is &lt;1.1.5-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203236" version="1" comment="pam-devel is &lt;1.1.5-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203237" version="1" comment="pam-devel-32bit is &lt;1.1.5-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203238" version="1" comment="perl is &lt;5.10.0-64.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203239" version="1" comment="perl-base-32bit is &lt;5.10.0-64.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203240" version="1" comment="perl is &lt;5.10.0-64.81.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203241" version="1" comment="perl-base-32bit is &lt;5.10.0-64.81.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203242" version="1" comment="perl is &lt;5.10.0-64.81.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203243" version="1" comment="perl-base-32bit is &lt;5.10.0-64.81.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230373" version="1" comment="perl is &lt;5.10.0-64.81.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230374" version="1" comment="perl-base-32bit is &lt;5.10.0-64.81.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203244" version="1" comment="perl-DBD-mysql is &lt;4.008-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203245" version="1" comment="perl-DBD-mysql is &lt;4.008-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203246" version="1" comment="perl-DBD-mysql is &lt;4.008-10.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203247" version="1" comment="perl-SOAP-Lite is &lt;0.710.08-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203248" version="1" comment="php53 is &lt;5.3.17-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203249" version="1" comment="php53-devel is &lt;5.3.17-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203250" version="1" comment="php53-imap is &lt;5.3.17-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203251" version="1" comment="php53-posix is &lt;5.3.17-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203252" version="1" comment="php53-readline is &lt;5.3.17-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203253" version="1" comment="php53-sockets is &lt;5.3.17-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203254" version="1" comment="php53-sqlite is &lt;5.3.17-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203255" version="1" comment="php53-tidy is &lt;5.3.17-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203256" version="1" comment="php53 is &lt;5.3.17-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203257" version="1" comment="php53-devel is &lt;5.3.17-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203258" version="1" comment="php53-imap is &lt;5.3.17-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203259" version="1" comment="php53-posix is &lt;5.3.17-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203260" version="1" comment="php53-readline is &lt;5.3.17-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203261" version="1" comment="php53-sockets is &lt;5.3.17-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203262" version="1" comment="php53-sqlite is &lt;5.3.17-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203263" version="1" comment="php53-tidy is &lt;5.3.17-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203264" version="1" comment="php53 is &lt;5.3.17-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203265" version="1" comment="php53-devel is &lt;5.3.17-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203266" version="1" comment="php53-imap is &lt;5.3.17-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203267" version="1" comment="php53-posix is &lt;5.3.17-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203268" version="1" comment="php53-readline is &lt;5.3.17-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203269" version="1" comment="php53-sockets is &lt;5.3.17-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203270" version="1" comment="php53-sqlite is &lt;5.3.17-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203271" version="1" comment="php53-tidy is &lt;5.3.17-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203272" version="1" comment="php53 is &lt;5.3.17-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203273" version="1" comment="php53-devel is &lt;5.3.17-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203274" version="1" comment="php53-imap is &lt;5.3.17-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203275" version="1" comment="php53-posix is &lt;5.3.17-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203276" version="1" comment="php53-readline is &lt;5.3.17-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203277" version="1" comment="php53-sockets is &lt;5.3.17-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203278" version="1" comment="php53-sqlite is &lt;5.3.17-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203279" version="1" comment="php53-tidy is &lt;5.3.17-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203280" version="1" comment="php53 is &lt;5.3.17-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203281" version="1" comment="php53-devel is &lt;5.3.17-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203282" version="1" comment="php53-imap is &lt;5.3.17-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203283" version="1" comment="php53-posix is &lt;5.3.17-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203284" version="1" comment="php53-readline is &lt;5.3.17-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203285" version="1" comment="php53-sockets is &lt;5.3.17-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203286" version="1" comment="php53-sqlite is &lt;5.3.17-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203287" version="1" comment="php53-tidy is &lt;5.3.17-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203288" version="1" comment="php53 is &lt;5.3.17-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203289" version="1" comment="php53-devel is &lt;5.3.17-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203290" version="1" comment="php53-imap is &lt;5.3.17-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203291" version="1" comment="php53-posix is &lt;5.3.17-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203292" version="1" comment="php53-readline is &lt;5.3.17-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203293" version="1" comment="php53-sockets is &lt;5.3.17-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203294" version="1" comment="php53-sqlite is &lt;5.3.17-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203295" version="1" comment="php53-tidy is &lt;5.3.17-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203296" version="1" comment="php53 is &lt;5.3.17-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203297" version="1" comment="php53-devel is &lt;5.3.17-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203298" version="1" comment="php53-imap is &lt;5.3.17-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203299" version="1" comment="php53-posix is &lt;5.3.17-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203300" version="1" comment="php53-readline is &lt;5.3.17-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203301" version="1" comment="php53-sockets is &lt;5.3.17-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203302" version="1" comment="php53-sqlite is &lt;5.3.17-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203303" version="1" comment="php53-tidy is &lt;5.3.17-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203304" version="1" comment="php53 is &lt;5.3.17-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203305" version="1" comment="php53-devel is &lt;5.3.17-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203306" version="1" comment="php53-imap is &lt;5.3.17-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203307" version="1" comment="php53-posix is &lt;5.3.17-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203308" version="1" comment="php53-readline is &lt;5.3.17-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203309" version="1" comment="php53-sockets is &lt;5.3.17-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203310" version="1" comment="php53-sqlite is &lt;5.3.17-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203311" version="1" comment="php53-tidy is &lt;5.3.17-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203312" version="1" comment="php53 is &lt;5.3.17-101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203313" version="1" comment="php53-devel is &lt;5.3.17-101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203314" version="1" comment="php53-imap is &lt;5.3.17-101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203315" version="1" comment="php53-posix is &lt;5.3.17-101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203316" version="1" comment="php53-readline is &lt;5.3.17-101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203317" version="1" comment="php53-sockets is &lt;5.3.17-101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203318" version="1" comment="php53-sqlite is &lt;5.3.17-101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203319" version="1" comment="php53-tidy is &lt;5.3.17-101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203320" version="1" comment="php53 is &lt;5.3.17-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203321" version="1" comment="php53-devel is &lt;5.3.17-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203322" version="1" comment="php53-imap is &lt;5.3.17-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203323" version="1" comment="php53-posix is &lt;5.3.17-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203324" version="1" comment="php53-readline is &lt;5.3.17-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203325" version="1" comment="php53-sockets is &lt;5.3.17-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203326" version="1" comment="php53-sqlite is &lt;5.3.17-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203327" version="1" comment="php53-tidy is &lt;5.3.17-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203328" version="1" comment="php53 is &lt;5.3.17-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203329" version="1" comment="php53-devel is &lt;5.3.17-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203330" version="1" comment="php53-imap is &lt;5.3.17-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203331" version="1" comment="php53-posix is &lt;5.3.17-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203332" version="1" comment="php53-readline is &lt;5.3.17-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203333" version="1" comment="php53-sockets is &lt;5.3.17-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203334" version="1" comment="php53-sqlite is &lt;5.3.17-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203335" version="1" comment="php53-tidy is &lt;5.3.17-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203336" version="1" comment="php53 is &lt;5.3.17-112.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203337" version="1" comment="php53-devel is &lt;5.3.17-112.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203338" version="1" comment="php53-imap is &lt;5.3.17-112.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203339" version="1" comment="php53-posix is &lt;5.3.17-112.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203340" version="1" comment="php53-readline is &lt;5.3.17-112.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203341" version="1" comment="php53-sockets is &lt;5.3.17-112.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203342" version="1" comment="php53-sqlite is &lt;5.3.17-112.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203343" version="1" comment="php53-tidy is &lt;5.3.17-112.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203344" version="1" comment="php53 is &lt;5.3.17-112.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203345" version="1" comment="php53-devel is &lt;5.3.17-112.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203346" version="1" comment="php53-imap is &lt;5.3.17-112.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203347" version="1" comment="php53-posix is &lt;5.3.17-112.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203348" version="1" comment="php53-readline is &lt;5.3.17-112.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203349" version="1" comment="php53-sockets is &lt;5.3.17-112.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203350" version="1" comment="php53-sqlite is &lt;5.3.17-112.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203351" version="1" comment="php53-tidy is &lt;5.3.17-112.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203352" version="1" comment="php53 is &lt;5.3.17-112.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203353" version="1" comment="php53-devel is &lt;5.3.17-112.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203354" version="1" comment="php53-imap is &lt;5.3.17-112.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203355" version="1" comment="php53-posix is &lt;5.3.17-112.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203356" version="1" comment="php53-readline is &lt;5.3.17-112.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203357" version="1" comment="php53-sockets is &lt;5.3.17-112.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203358" version="1" comment="php53-sqlite is &lt;5.3.17-112.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203359" version="1" comment="php53-tidy is &lt;5.3.17-112.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203360" version="1" comment="php53 is &lt;5.3.17-112.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203361" version="1" comment="php53-devel is &lt;5.3.17-112.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203362" version="1" comment="php53-imap is &lt;5.3.17-112.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203363" version="1" comment="php53-posix is &lt;5.3.17-112.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203364" version="1" comment="php53-readline is &lt;5.3.17-112.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203365" version="1" comment="php53-sockets is &lt;5.3.17-112.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203366" version="1" comment="php53-sqlite is &lt;5.3.17-112.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203367" version="1" comment="php53-tidy is &lt;5.3.17-112.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230555" version="1" comment="php53 is &lt;5.3.17-112.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230556" version="1" comment="php53-devel is &lt;5.3.17-112.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230557" version="1" comment="php53-imap is &lt;5.3.17-112.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230558" version="1" comment="php53-posix is &lt;5.3.17-112.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230559" version="1" comment="php53-readline is &lt;5.3.17-112.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230560" version="1" comment="php53-sockets is &lt;5.3.17-112.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230561" version="1" comment="php53-sqlite is &lt;5.3.17-112.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230562" version="1" comment="php53-tidy is &lt;5.3.17-112.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234328" version="1" comment="php53 is &lt;5.3.17-112.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234329" version="1" comment="php53-devel is &lt;5.3.17-112.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234330" version="1" comment="php53-imap is &lt;5.3.17-112.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234331" version="1" comment="php53-posix is &lt;5.3.17-112.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234332" version="1" comment="php53-readline is &lt;5.3.17-112.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234333" version="1" comment="php53-sockets is &lt;5.3.17-112.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234334" version="1" comment="php53-sqlite is &lt;5.3.17-112.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234335" version="1" comment="php53-tidy is &lt;5.3.17-112.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236421" version="1" comment="php53 is &lt;5.3.17-112.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236422" version="1" comment="php53-devel is &lt;5.3.17-112.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236423" version="1" comment="php53-imap is &lt;5.3.17-112.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236424" version="1" comment="php53-posix is &lt;5.3.17-112.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236425" version="1" comment="php53-readline is &lt;5.3.17-112.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236426" version="1" comment="php53-sockets is &lt;5.3.17-112.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236427" version="1" comment="php53-sqlite is &lt;5.3.17-112.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236428" version="1" comment="php53-tidy is &lt;5.3.17-112.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241064" version="1" comment="php53 is &lt;5.3.17-112.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241065" version="1" comment="php53-devel is &lt;5.3.17-112.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241066" version="1" comment="php53-imap is &lt;5.3.17-112.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241067" version="1" comment="php53-posix is &lt;5.3.17-112.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241068" version="1" comment="php53-readline is &lt;5.3.17-112.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241069" version="1" comment="php53-sockets is &lt;5.3.17-112.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241070" version="1" comment="php53-sqlite is &lt;5.3.17-112.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241071" version="1" comment="php53-tidy is &lt;5.3.17-112.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244292" version="1" comment="php53 is &lt;5.3.17-112.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244293" version="1" comment="php53-devel is &lt;5.3.17-112.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244294" version="1" comment="php53-imap is &lt;5.3.17-112.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244295" version="1" comment="php53-posix is &lt;5.3.17-112.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244296" version="1" comment="php53-readline is &lt;5.3.17-112.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244297" version="1" comment="php53-sockets is &lt;5.3.17-112.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244298" version="1" comment="php53-sqlite is &lt;5.3.17-112.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244299" version="1" comment="php53-tidy is &lt;5.3.17-112.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247289" version="1" comment="php53 is &lt;5.3.17-112.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247290" version="1" comment="php53-devel is &lt;5.3.17-112.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247291" version="1" comment="php53-imap is &lt;5.3.17-112.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247292" version="1" comment="php53-posix is &lt;5.3.17-112.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247293" version="1" comment="php53-readline is &lt;5.3.17-112.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247294" version="1" comment="php53-sockets is &lt;5.3.17-112.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247295" version="1" comment="php53-sqlite is &lt;5.3.17-112.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247296" version="1" comment="php53-tidy is &lt;5.3.17-112.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203368" version="1" comment="finch is &lt;2.6.6-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203369" version="1" comment="finch-devel is &lt;2.6.6-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203370" version="1" comment="libpurple is &lt;2.6.6-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203371" version="1" comment="libpurple-devel is &lt;2.6.6-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203372" version="1" comment="libpurple-lang is &lt;2.6.6-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203373" version="1" comment="pidgin is &lt;2.6.6-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203374" version="1" comment="pidgin-devel is &lt;2.6.6-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231487" version="1" comment="finch is &lt;2.6.6-0.30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231488" version="1" comment="finch-devel is &lt;2.6.6-0.30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231489" version="1" comment="libpurple is &lt;2.6.6-0.30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231490" version="1" comment="libpurple-devel is &lt;2.6.6-0.30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231491" version="1" comment="libpurple-lang is &lt;2.6.6-0.30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231492" version="1" comment="pidgin is &lt;2.6.6-0.30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231493" version="1" comment="pidgin-devel is &lt;2.6.6-0.30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203375" version="1" comment="libpoppler-devel is &lt;0.12.3-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203376" version="1" comment="libpoppler-glib-devel is &lt;0.12.3-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203377" version="1" comment="libpoppler-qt2 is &lt;0.12.3-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203378" version="1" comment="libpoppler-qt3-devel is &lt;0.12.3-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203379" version="1" comment="libpoppler-qt4-devel is &lt;0.12.3-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203380" version="1" comment="poppler is &lt;0.12.3-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203381" version="1" comment="poppler-tools is &lt;0.12.3-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223523" version="1" comment="libpoppler-devel is &lt;0.12.3-1.13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223524" version="1" comment="libpoppler-glib-devel is &lt;0.12.3-1.13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223525" version="1" comment="libpoppler-qt2 is &lt;0.12.3-1.13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223526" version="1" comment="libpoppler-qt3-devel is &lt;0.12.3-1.13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223527" version="1" comment="libpoppler-qt4-devel is &lt;0.12.3-1.13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223528" version="1" comment="poppler is &lt;0.12.3-1.13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223529" version="1" comment="poppler-tools is &lt;0.12.3-1.13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203382" version="1" comment="postgresql94-devel is &lt;9.4.6-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203383" version="1" comment="postgresql94-libs is &lt;9.4.6-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203384" version="1" comment="postgresql94-devel is &lt;9.4.9-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203385" version="1" comment="postgresql94-libs is &lt;9.4.9-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203386" version="1" comment="postgresql94-devel is &lt;9.4.12-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203387" version="1" comment="postgresql94-libs is &lt;9.4.12-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203388" version="1" comment="postgresql94-devel is &lt;9.4.13-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203389" version="1" comment="postgresql94-libs is &lt;9.4.13-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203390" version="1" comment="postgresql94-devel is &lt;9.4.15-0.23.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203391" version="1" comment="postgresql94-libs is &lt;9.4.15-0.23.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203392" version="1" comment="postgresql94-devel is &lt;9.4.16-0.23.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203393" version="1" comment="postgresql94-libs is &lt;9.4.16-0.23.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203394" version="1" comment="postgresql94-devel is &lt;9.4.17-0.23.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203395" version="1" comment="postgresql94-libs is &lt;9.4.17-0.23.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237895" version="1" comment="postgresql94-devel is &lt;9.4.19-0.23.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237896" version="1" comment="postgresql94-libs is &lt;9.4.19-0.23.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203396" version="1" comment="ppp is &lt;2.4.5.git-2.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203397" version="1" comment="ppp-devel is &lt;2.4.5.git-2.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203398" version="1" comment="python is &lt;2.6.9-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203399" version="1" comment="python-32bit is &lt;2.6.9-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203400" version="1" comment="python-base is &lt;2.6.9-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203401" version="1" comment="python-demo is &lt;2.6.9-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203402" version="1" comment="python-devel is &lt;2.6.9-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203403" version="1" comment="python-doc is &lt;2.6-8.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203404" version="1" comment="python-doc-pdf is &lt;2.6-8.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203405" version="1" comment="python-gdbm is &lt;2.6.9-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203406" version="1" comment="python-idle is &lt;2.6.9-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203407" version="1" comment="python-tk is &lt;2.6.9-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203408" version="1" comment="python is &lt;2.6.9-40.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203409" version="1" comment="python-32bit is &lt;2.6.9-40.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203410" version="1" comment="python-base is &lt;2.6.9-40.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203411" version="1" comment="python-demo is &lt;2.6.9-40.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203412" version="1" comment="python-devel is &lt;2.6.9-40.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203413" version="1" comment="python-doc is &lt;2.6-8.40.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203414" version="1" comment="python-doc-pdf is &lt;2.6-8.40.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203415" version="1" comment="python-gdbm is &lt;2.6.9-40.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203416" version="1" comment="python-idle is &lt;2.6.9-40.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203417" version="1" comment="python-tk is &lt;2.6.9-40.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229348" version="1" comment="python is &lt;2.6.9-40.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229349" version="1" comment="python-32bit is &lt;2.6.9-40.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229350" version="1" comment="python-base is &lt;2.6.9-40.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229351" version="1" comment="python-demo is &lt;2.6.9-40.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229352" version="1" comment="python-devel is &lt;2.6.9-40.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229353" version="1" comment="python-doc is &lt;2.6-8.40.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229354" version="1" comment="python-doc-pdf is &lt;2.6-8.40.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229355" version="1" comment="python-gdbm is &lt;2.6.9-40.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229356" version="1" comment="python-idle is &lt;2.6.9-40.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229357" version="1" comment="python-tk is &lt;2.6.9-40.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232717" version="1" comment="python is &lt;2.6.9-40.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232718" version="1" comment="python-32bit is &lt;2.6.9-40.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232719" version="1" comment="python-base is &lt;2.6.9-40.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232720" version="1" comment="python-demo is &lt;2.6.9-40.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232721" version="1" comment="python-devel is &lt;2.6.9-40.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232722" version="1" comment="python-doc is &lt;2.6-8.40.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232723" version="1" comment="python-doc-pdf is &lt;2.6-8.40.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232724" version="1" comment="python-gdbm is &lt;2.6.9-40.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232725" version="1" comment="python-idle is &lt;2.6.9-40.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232726" version="1" comment="python-tk is &lt;2.6.9-40.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237349" version="1" comment="python is &lt;2.6.9-40.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237350" version="1" comment="python-32bit is &lt;2.6.9-40.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237351" version="1" comment="python-base is &lt;2.6.9-40.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237352" version="1" comment="python-demo is &lt;2.6.9-40.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237353" version="1" comment="python-devel is &lt;2.6.9-40.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237354" version="1" comment="python-doc is &lt;2.6-8.40.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237355" version="1" comment="python-doc-pdf is &lt;2.6-8.40.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237356" version="1" comment="python-gdbm is &lt;2.6.9-40.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237357" version="1" comment="python-idle is &lt;2.6.9-40.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237358" version="1" comment="python-tk is &lt;2.6.9-40.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244174" version="1" comment="python-numpy is &lt;1.8.0-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244175" version="1" comment="python-numpy-devel is &lt;1.8.0-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203418" version="1" comment="quagga is &lt;0.99.15-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203419" version="1" comment="quagga-devel is &lt;0.99.15-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203420" version="1" comment="quagga is &lt;0.99.15-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203421" version="1" comment="quagga-devel is &lt;0.99.15-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203422" version="1" comment="quagga is &lt;0.99.15-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203423" version="1" comment="quagga-devel is &lt;0.99.15-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203424" version="1" comment="quagga is &lt;0.99.15-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203425" version="1" comment="quagga-devel is &lt;0.99.15-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203426" version="1" comment="quagga is &lt;0.99.15-0.30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203427" version="1" comment="quagga-devel is &lt;0.99.15-0.30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203428" version="1" comment="ruby is &lt;1.8.7.p357-0.9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203429" version="1" comment="ruby-devel is &lt;1.8.7.p357-0.9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203430" version="1" comment="ruby-doc-html is &lt;1.8.7.p357-0.9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203431" version="1" comment="ruby-doc-ri is &lt;1.8.7.p357-0.9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203432" version="1" comment="ruby-examples is &lt;1.8.7.p357-0.9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203433" version="1" comment="ruby-test-suite is &lt;1.8.7.p357-0.9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203434" version="1" comment="ruby-tk is &lt;1.8.7.p357-0.9.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203435" version="1" comment="rubygem-actionpack-3_2 is &lt;3.2.12-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203436" version="1" comment="rubygem-actionpack-3_2 is &lt;3.2.12-0.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203437" version="1" comment="rubygem-activerecord-3_2 is &lt;3.2.12-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203438" version="1" comment="rubygem-activesupport-3_2 is &lt;3.2.12-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203439" version="1" comment="rubygem-mail-2_4 is &lt;2.4.4-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203440" version="1" comment="libldb-devel is &lt;3.6.3-67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203441" version="1" comment="libnetapi-devel is &lt;3.6.3-67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203442" version="1" comment="libnetapi0 is &lt;3.6.3-67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203443" version="1" comment="libsmbclient-devel is &lt;3.6.3-67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203444" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203445" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203446" version="1" comment="libtalloc-devel is &lt;3.6.3-67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203447" version="1" comment="libtdb-devel is &lt;3.6.3-67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203448" version="1" comment="libtevent-devel is &lt;3.6.3-67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203449" version="1" comment="libwbclient-devel is &lt;3.6.3-67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203450" version="1" comment="samba is &lt;3.6.3-67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203451" version="1" comment="samba-devel is &lt;3.6.3-67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203452" version="1" comment="samba-test is &lt;3.6.3-67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203453" version="1" comment="libldb-devel is &lt;3.6.3-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203454" version="1" comment="libnetapi-devel is &lt;3.6.3-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203455" version="1" comment="libnetapi0 is &lt;3.6.3-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203456" version="1" comment="libsmbclient-devel is &lt;3.6.3-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203457" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203458" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203459" version="1" comment="libtalloc-devel is &lt;3.6.3-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203460" version="1" comment="libtdb-devel is &lt;3.6.3-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203461" version="1" comment="libtevent-devel is &lt;3.6.3-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203462" version="1" comment="libwbclient-devel is &lt;3.6.3-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203463" version="1" comment="samba is &lt;3.6.3-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203464" version="1" comment="samba-devel is &lt;3.6.3-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203465" version="1" comment="samba-test is &lt;3.6.3-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203466" version="1" comment="libldb-devel is &lt;3.6.3-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203467" version="1" comment="libnetapi-devel is &lt;3.6.3-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203468" version="1" comment="libnetapi0 is &lt;3.6.3-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203469" version="1" comment="libsmbclient-devel is &lt;3.6.3-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203470" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203471" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203472" version="1" comment="libtalloc-devel is &lt;3.6.3-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203473" version="1" comment="libtdb-devel is &lt;3.6.3-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203474" version="1" comment="libtevent-devel is &lt;3.6.3-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203475" version="1" comment="libwbclient-devel is &lt;3.6.3-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203476" version="1" comment="samba is &lt;3.6.3-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203477" version="1" comment="samba-devel is &lt;3.6.3-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203478" version="1" comment="samba-test is &lt;3.6.3-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203479" version="1" comment="libldb-devel is &lt;3.6.3-90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203480" version="1" comment="libnetapi-devel is &lt;3.6.3-90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203481" version="1" comment="libnetapi0 is &lt;3.6.3-90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203482" version="1" comment="libsmbclient-devel is &lt;3.6.3-90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203483" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203484" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203485" version="1" comment="libtalloc-devel is &lt;3.6.3-90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203486" version="1" comment="libtdb-devel is &lt;3.6.3-90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203487" version="1" comment="libtevent-devel is &lt;3.6.3-90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203488" version="1" comment="libwbclient-devel is &lt;3.6.3-90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203489" version="1" comment="samba is &lt;3.6.3-90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203490" version="1" comment="samba-devel is &lt;3.6.3-90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203491" version="1" comment="samba-test is &lt;3.6.3-90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203492" version="1" comment="libldb-devel is &lt;3.6.3-93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203493" version="1" comment="libnetapi-devel is &lt;3.6.3-93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203494" version="1" comment="libnetapi0 is &lt;3.6.3-93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203495" version="1" comment="libsmbclient-devel is &lt;3.6.3-93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203496" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203497" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203498" version="1" comment="libtalloc-devel is &lt;3.6.3-93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203499" version="1" comment="libtdb-devel is &lt;3.6.3-93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203500" version="1" comment="libtevent-devel is &lt;3.6.3-93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203501" version="1" comment="libwbclient-devel is &lt;3.6.3-93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203502" version="1" comment="samba is &lt;3.6.3-93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203503" version="1" comment="samba-devel is &lt;3.6.3-93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203504" version="1" comment="samba-test is &lt;3.6.3-93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203505" version="1" comment="libldb-devel is &lt;3.6.3-94.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203506" version="1" comment="libnetapi-devel is &lt;3.6.3-94.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203507" version="1" comment="libnetapi0 is &lt;3.6.3-94.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203508" version="1" comment="libsmbclient-devel is &lt;3.6.3-94.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203509" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-94.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203510" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-94.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203511" version="1" comment="libtalloc-devel is &lt;3.6.3-94.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203512" version="1" comment="libtdb-devel is &lt;3.6.3-94.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203513" version="1" comment="libtevent-devel is &lt;3.6.3-94.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203514" version="1" comment="libwbclient-devel is &lt;3.6.3-94.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203515" version="1" comment="samba is &lt;3.6.3-94.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203516" version="1" comment="samba-devel is &lt;3.6.3-94.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203517" version="1" comment="samba-test is &lt;3.6.3-94.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203518" version="1" comment="libldb-devel is &lt;3.6.3-94.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203519" version="1" comment="libnetapi-devel is &lt;3.6.3-94.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203520" version="1" comment="libnetapi0 is &lt;3.6.3-94.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203521" version="1" comment="libsmbclient-devel is &lt;3.6.3-94.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203522" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-94.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203523" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-94.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203524" version="1" comment="libtalloc-devel is &lt;3.6.3-94.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203525" version="1" comment="libtdb-devel is &lt;3.6.3-94.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203526" version="1" comment="libtevent-devel is &lt;3.6.3-94.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203527" version="1" comment="libwbclient-devel is &lt;3.6.3-94.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203528" version="1" comment="samba is &lt;3.6.3-94.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203529" version="1" comment="samba-devel is &lt;3.6.3-94.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203530" version="1" comment="samba-test is &lt;3.6.3-94.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203531" version="1" comment="libldb-devel is &lt;3.6.3-94.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203532" version="1" comment="libnetapi-devel is &lt;3.6.3-94.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203533" version="1" comment="libnetapi0 is &lt;3.6.3-94.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203534" version="1" comment="libsmbclient-devel is &lt;3.6.3-94.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203535" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-94.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203536" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-94.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203537" version="1" comment="libtalloc-devel is &lt;3.6.3-94.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203538" version="1" comment="libtdb-devel is &lt;3.6.3-94.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203539" version="1" comment="libtevent-devel is &lt;3.6.3-94.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203540" version="1" comment="libwbclient-devel is &lt;3.6.3-94.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203541" version="1" comment="samba is &lt;3.6.3-94.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203542" version="1" comment="samba-devel is &lt;3.6.3-94.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203543" version="1" comment="samba-test is &lt;3.6.3-94.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232160" version="1" comment="libldb-devel is &lt;3.6.3-94.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232161" version="1" comment="libnetapi-devel is &lt;3.6.3-94.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232162" version="1" comment="libnetapi0 is &lt;3.6.3-94.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232163" version="1" comment="libsmbclient-devel is &lt;3.6.3-94.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232164" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-94.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232165" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-94.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232166" version="1" comment="libtalloc-devel is &lt;3.6.3-94.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232167" version="1" comment="libtdb-devel is &lt;3.6.3-94.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232168" version="1" comment="libtevent-devel is &lt;3.6.3-94.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232169" version="1" comment="libwbclient-devel is &lt;3.6.3-94.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232170" version="1" comment="samba is &lt;3.6.3-94.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232171" version="1" comment="samba-devel is &lt;3.6.3-94.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232172" version="1" comment="samba-test is &lt;3.6.3-94.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203544" version="1" comment="sane-backends is &lt;1.0.20-7.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203545" version="1" comment="sane-backends-32bit is &lt;1.0.20-7.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203546" version="1" comment="sane-backends-autoconfig is &lt;1.0.20-7.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203547" version="1" comment="sane-backends-x86 is &lt;1.0.20-7.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203548" version="1" comment="libspice-server-devel is &lt;0.12.4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203549" version="1" comment="spice is &lt;0.12.4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203550" version="1" comment="libspice-server-devel is &lt;0.12.4-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203551" version="1" comment="spice is &lt;0.12.4-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203552" version="1" comment="libspice-server-devel is &lt;0.12.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203553" version="1" comment="spice is &lt;0.12.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233805" version="1" comment="libspice-server-devel is &lt;0.12.4-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233806" version="1" comment="spice is &lt;0.12.4-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243933" version="1" comment="libspice-server-devel is &lt;0.12.4-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243934" version="1" comment="spice is &lt;0.12.4-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203554" version="1" comment="sqlite3 is &lt;3.7.6.3-1.4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203555" version="1" comment="sqlite3-devel is &lt;3.7.6.3-1.4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246738" version="1" comment="sqlite3 is &lt;3.7.6.3-1.4.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246739" version="1" comment="sqlite3-devel is &lt;3.7.6.3-1.4.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203556" version="1" comment="subversion is &lt;1.6.17-1.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203557" version="1" comment="subversion-devel is &lt;1.6.17-1.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203558" version="1" comment="subversion-perl is &lt;1.6.17-1.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203559" version="1" comment="subversion-python is &lt;1.6.17-1.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203560" version="1" comment="subversion-server is &lt;1.6.17-1.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203561" version="1" comment="subversion-tools is &lt;1.6.17-1.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203562" version="1" comment="subversion is &lt;1.6.17-1.36.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203563" version="1" comment="subversion-devel is &lt;1.6.17-1.36.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203564" version="1" comment="subversion-perl is &lt;1.6.17-1.36.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203565" version="1" comment="subversion-python is &lt;1.6.17-1.36.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203566" version="1" comment="subversion-server is &lt;1.6.17-1.36.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203567" version="1" comment="subversion-tools is &lt;1.6.17-1.36.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203568" version="1" comment="libtiff-devel is &lt;3.8.2-141.163" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203569" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-141.163" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203570" version="1" comment="tiff is &lt;3.8.2-141.163" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203571" version="1" comment="libtiff-devel is &lt;3.8.2-141.168" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203572" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-141.168" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203573" version="1" comment="tiff is &lt;3.8.2-141.168" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203574" version="1" comment="libtiff-devel is &lt;3.8.2-141.169.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203575" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-141.169.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203576" version="1" comment="tiff is &lt;3.8.2-141.169.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203577" version="1" comment="libtiff-devel is &lt;3.8.2-141.169.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203578" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-141.169.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203579" version="1" comment="tiff is &lt;3.8.2-141.169.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229520" version="1" comment="libtiff-devel is &lt;3.8.2-141.169.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229521" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-141.169.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229522" version="1" comment="tiff is &lt;3.8.2-141.169.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234336" version="1" comment="libtiff-devel is &lt;3.8.2-141.169.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234337" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-141.169.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234338" version="1" comment="tiff is &lt;3.8.2-141.169.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238085" version="1" comment="libtiff-devel is &lt;3.8.2-141.169.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238086" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-141.169.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238087" version="1" comment="tiff is &lt;3.8.2-141.169.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240657" version="1" comment="libtiff-devel is &lt;3.8.2-141.169.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240658" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-141.169.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240659" version="1" comment="tiff is &lt;3.8.2-141.169.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241788" version="1" comment="libtiff-devel is &lt;3.8.2-141.169.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241789" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-141.169.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241790" version="1" comment="tiff is &lt;3.8.2-141.169.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246740" version="1" comment="libtiff-devel is &lt;3.8.2-141.169.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246741" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-141.169.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246742" version="1" comment="tiff is &lt;3.8.2-141.169.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203580" version="1" comment="wavpack is &lt;4.50.1-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203581" version="1" comment="wavpack-devel is &lt;4.50.1-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246353" version="1" comment="wavpack is &lt;4.50.1-1.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246354" version="1" comment="wavpack-devel is &lt;4.50.1-1.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203582" version="1" comment="wireshark is &lt;1.12.11-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203583" version="1" comment="wireshark-devel is &lt;1.12.11-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203584" version="1" comment="wireshark is &lt;1.12.13-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203585" version="1" comment="wireshark-devel is &lt;1.12.13-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203586" version="1" comment="wireshark is &lt;2.0.12-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203587" version="1" comment="wireshark-devel is &lt;2.0.12-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203588" version="1" comment="wireshark-gtk is &lt;2.0.12-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203589" version="1" comment="wireshark is &lt;2.0.13-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203590" version="1" comment="wireshark-devel is &lt;2.0.13-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203591" version="1" comment="wireshark-gtk is &lt;2.0.13-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203592" version="1" comment="wireshark is &lt;2.0.14-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203593" version="1" comment="wireshark-devel is &lt;2.0.14-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203594" version="1" comment="wireshark-gtk is &lt;2.0.14-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203595" version="1" comment="libsmi is &lt;0.4.5-2.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203596" version="1" comment="libwireshark8 is &lt;2.2.11-40.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203597" version="1" comment="libwiretap6 is &lt;2.2.11-40.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203598" version="1" comment="libwscodecs1 is &lt;2.2.11-40.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203599" version="1" comment="libwsutil7 is &lt;2.2.11-40.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203600" version="1" comment="portaudio is &lt;19-234.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203601" version="1" comment="portaudio-devel is &lt;19-234.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203602" version="1" comment="wireshark is &lt;2.2.11-40.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203603" version="1" comment="wireshark-devel is &lt;2.2.11-40.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203604" version="1" comment="wireshark-gtk is &lt;2.2.11-40.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203605" version="1" comment="libwireshark8 is &lt;2.2.12-40.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203606" version="1" comment="libwiretap6 is &lt;2.2.12-40.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203607" version="1" comment="libwscodecs1 is &lt;2.2.12-40.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203608" version="1" comment="libwsutil7 is &lt;2.2.12-40.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203609" version="1" comment="wireshark is &lt;2.2.12-40.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203610" version="1" comment="wireshark-devel is &lt;2.2.12-40.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203611" version="1" comment="wireshark-gtk is &lt;2.2.12-40.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203612" version="1" comment="libwireshark8 is &lt;2.2.13-40.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203613" version="1" comment="libwiretap6 is &lt;2.2.13-40.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203614" version="1" comment="libwscodecs1 is &lt;2.2.13-40.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203615" version="1" comment="libwsutil7 is &lt;2.2.13-40.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203616" version="1" comment="wireshark is &lt;2.2.13-40.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203617" version="1" comment="wireshark-devel is &lt;2.2.13-40.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203618" version="1" comment="wireshark-gtk is &lt;2.2.13-40.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203619" version="1" comment="libwireshark8 is &lt;2.2.14-40.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203620" version="1" comment="libwiretap6 is &lt;2.2.14-40.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203621" version="1" comment="libwscodecs1 is &lt;2.2.14-40.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203622" version="1" comment="libwsutil7 is &lt;2.2.14-40.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203623" version="1" comment="wireshark is &lt;2.2.14-40.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203624" version="1" comment="wireshark-devel is &lt;2.2.14-40.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203625" version="1" comment="wireshark-gtk is &lt;2.2.14-40.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232727" version="1" comment="libwireshark8 is &lt;2.2.16-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232728" version="1" comment="libwiretap6 is &lt;2.2.16-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232729" version="1" comment="libwscodecs1 is &lt;2.2.16-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232730" version="1" comment="libwsutil7 is &lt;2.2.16-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232731" version="1" comment="wireshark is &lt;2.2.16-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232732" version="1" comment="wireshark-devel is &lt;2.2.16-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232733" version="1" comment="wireshark-gtk is &lt;2.2.16-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235440" version="1" comment="libwireshark8 is &lt;2.2.17-40.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235441" version="1" comment="libwiretap6 is &lt;2.2.17-40.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235442" version="1" comment="libwscodecs1 is &lt;2.2.17-40.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235443" version="1" comment="libwsutil7 is &lt;2.2.17-40.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235444" version="1" comment="wireshark is &lt;2.2.17-40.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235445" version="1" comment="wireshark-devel is &lt;2.2.17-40.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235446" version="1" comment="wireshark-gtk is &lt;2.2.17-40.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203626" version="1" comment="xen is &lt;4.4.2_10-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203627" version="1" comment="xen-devel is &lt;4.4.2_10-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203628" version="1" comment="xen is &lt;4.4.3_02-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203629" version="1" comment="xen-devel is &lt;4.4.3_02-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203630" version="1" comment="xen is &lt;4.4.4_02-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203631" version="1" comment="xen-devel is &lt;4.4.4_02-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203632" version="1" comment="xen is &lt;4.4.4_07-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203633" version="1" comment="xen-devel is &lt;4.4.4_07-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203634" version="1" comment="xen is &lt;4.4.4_08-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203635" version="1" comment="xen-devel is &lt;4.4.4_08-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203636" version="1" comment="xen is &lt;4.4.4_10-43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203637" version="1" comment="xen-devel is &lt;4.4.4_10-43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203638" version="1" comment="xen is &lt;4.4.4_12-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203639" version="1" comment="xen-devel is &lt;4.4.4_12-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203640" version="1" comment="xen is &lt;4.4.4_14-51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203641" version="1" comment="xen-devel is &lt;4.4.4_14-51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203642" version="1" comment="xen is &lt;4.4.4_16-54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203643" version="1" comment="xen-devel is &lt;4.4.4_16-54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203644" version="1" comment="xen is &lt;4.4.4_18-57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203645" version="1" comment="xen-devel is &lt;4.4.4_18-57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203646" version="1" comment="xen is &lt;4.4.4_20-60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203647" version="1" comment="xen-devel is &lt;4.4.4_20-60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203648" version="1" comment="xen is &lt;4.4.4_22-61.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203649" version="1" comment="xen-devel is &lt;4.4.4_22-61.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203650" version="1" comment="xen is &lt;4.4.4_24-61.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203651" version="1" comment="xen-devel is &lt;4.4.4_24-61.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203652" version="1" comment="xen is &lt;4.4.4_26-61.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203653" version="1" comment="xen-devel is &lt;4.4.4_26-61.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203654" version="1" comment="xen is &lt;4.4.4_28-61.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203655" version="1" comment="xen-devel is &lt;4.4.4_28-61.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203656" version="1" comment="xen is &lt;4.4.4_30-61.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203657" version="1" comment="xen-devel is &lt;4.4.4_30-61.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203658" version="1" comment="xen is &lt;4.4.4_32-61.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203659" version="1" comment="xen-devel is &lt;4.4.4_32-61.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230563" version="1" comment="xen is &lt;4.4.4_34-61.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230564" version="1" comment="xen-devel is &lt;4.4.4_34-61.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233225" version="1" comment="xen is &lt;4.4.4_36-61.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233226" version="1" comment="xen-devel is &lt;4.4.4_36-61.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242597" version="1" comment="xen is &lt;4.4.4_38-61.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242598" version="1" comment="xen-devel is &lt;4.4.4_38-61.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246743" version="1" comment="xen is &lt;4.4.4_40-61.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246744" version="1" comment="xen-devel is &lt;4.4.4_40-61.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203660" version="1" comment="xen is &lt;4.4.3_06-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203661" version="1" comment="xen-devel is &lt;4.4.3_06-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203662" version="1" comment="xerces-j2 is &lt;2.8.1-238.29.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203663" version="1" comment="xerces-j2-demo is &lt;2.8.1-238.29.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203664" version="1" comment="xerces-j2-scripts is &lt;2.8.1-238.29.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203665" version="1" comment="xerces-j2-xml-apis is &lt;2.8.1-238.29.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203666" version="1" comment="xerces-j2-xml-resolver is &lt;2.8.1-238.29.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203667" version="1" comment="xorg-x11-libICE is &lt;7.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203668" version="1" comment="xorg-x11-libICE-devel is &lt;7.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203669" version="1" comment="xorg-x11-libICE-devel-32bit is &lt;7.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203670" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203671" version="1" comment="xorg-x11-libX11-devel is &lt;7.4-5.11.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203672" version="1" comment="xorg-x11-libX11-devel-32bit is &lt;7.4-5.11.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203673" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203674" version="1" comment="xorg-x11-libX11-devel is &lt;7.4-5.11.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203675" version="1" comment="xorg-x11-libX11-devel-32bit is &lt;7.4-5.11.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235620" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.72.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235621" version="1" comment="xorg-x11-libX11-devel is &lt;7.4-5.11.72.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235622" version="1" comment="xorg-x11-libX11-devel-32bit is &lt;7.4-5.11.72.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203676" version="1" comment="xorg-x11-libXdmcp is &lt;7.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203677" version="1" comment="xorg-x11-libXdmcp-32bit is &lt;7.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203678" version="1" comment="xorg-x11-libXdmcp-devel is &lt;7.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203679" version="1" comment="xorg-x11-libXdmcp-devel-32bit is &lt;7.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203680" version="1" comment="xorg-x11-libXfixes is &lt;7.4-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203681" version="1" comment="xorg-x11-libXfixes-devel is &lt;7.4-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203682" version="1" comment="xorg-x11-libXfixes-devel-32bit is &lt;7.4-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203683" version="1" comment="xorg-x11-libXpm is &lt;7.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203684" version="1" comment="xorg-x11-libXpm-devel is &lt;7.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203685" version="1" comment="xorg-x11-libXpm-devel-32bit is &lt;7.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203686" version="1" comment="xorg-x11-libXrender is &lt;7.4-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203687" version="1" comment="xorg-x11-libXrender-devel is &lt;7.4-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203688" version="1" comment="xorg-x11-libXrender-devel-32bit is &lt;7.4-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203689" version="1" comment="xorg-x11-libXv is &lt;7.4-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203690" version="1" comment="xorg-x11-libXv-devel is &lt;7.4-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203691" version="1" comment="xorg-x11-libXv-devel-32bit is &lt;7.4-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203692" version="1" comment="xorg-x11-devel is &lt;7.4-8.26.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203693" version="1" comment="xorg-x11-devel-32bit is &lt;7.4-8.26.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203694" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203695" version="1" comment="xorg-x11-devel is &lt;7.4-8.26.50.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203696" version="1" comment="xorg-x11-devel-32bit is &lt;7.4-8.26.50.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203697" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.50.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235028" version="1" comment="xorg-x11-devel is &lt;7.4-8.26.50.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235029" version="1" comment="xorg-x11-devel-32bit is &lt;7.4-8.26.50.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235030" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.50.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203698" version="1" comment="xorg-x11-server is &lt;7.4-27.118" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203699" version="1" comment="xorg-x11-server-sdk is &lt;7.4-27.118" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203700" version="1" comment="xorg-x11-server is &lt;7.4-27.121" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203701" version="1" comment="xorg-x11-server-sdk is &lt;7.4-27.121" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203702" version="1" comment="xorg-x11-server is &lt;7.4-27.122.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203703" version="1" comment="xorg-x11-server-sdk is &lt;7.4-27.122.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238166" version="1" comment="xorg-x11-server is &lt;7.4-27.122.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238167" version="1" comment="xorg-x11-server-sdk is &lt;7.4-27.122.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203704" version="1" comment="yast2-storage is &lt;2.17.161-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203705" version="1" comment="yast2-storage-devel is &lt;2.17.161-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251872" version="1" comment="zlib is &lt;1.2.7-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203707" version="1" comment="zlib-devel is &lt;1.2.7-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203708" version="1" comment="zlib-devel-32bit is &lt;1.2.7-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203709" version="1" comment="curl-openssl1 is &lt;7.19.7-1.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203710" version="1" comment="libcurl4-openssl1 is &lt;7.19.7-1.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203711" version="1" comment="libcurl4-openssl1-32bit is &lt;7.19.7-1.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203712" version="1" comment="libcurl4-openssl1-x86 is &lt;7.19.7-1.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258807" version="1" comment="SLES_SAP-release is &gt;=11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203713" version="1" comment="curl-openssl1 is &lt;7.19.7-1.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203714" version="1" comment="libcurl4-openssl1 is &lt;7.19.7-1.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203715" version="1" comment="libcurl4-openssl1-32bit is &lt;7.19.7-1.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203716" version="1" comment="libcurl4-openssl1-x86 is &lt;7.19.7-1.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203717" version="1" comment="curl-openssl1 is &lt;7.19.7-1.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203718" version="1" comment="libcurl4-openssl1 is &lt;7.19.7-1.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203719" version="1" comment="libcurl4-openssl1-32bit is &lt;7.19.7-1.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203720" version="1" comment="libcurl4-openssl1-x86 is &lt;7.19.7-1.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203721" version="1" comment="curl-openssl1 is &lt;7.19.7-1.70.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203722" version="1" comment="libcurl4-openssl1 is &lt;7.19.7-1.70.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203723" version="1" comment="libcurl4-openssl1-32bit is &lt;7.19.7-1.70.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203724" version="1" comment="libcurl4-openssl1-x86 is &lt;7.19.7-1.70.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203725" version="1" comment="curl-openssl1 is &lt;7.19.7-1.70.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203726" version="1" comment="libcurl4-openssl1 is &lt;7.19.7-1.70.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203727" version="1" comment="libcurl4-openssl1-32bit is &lt;7.19.7-1.70.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203728" version="1" comment="libcurl4-openssl1-x86 is &lt;7.19.7-1.70.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203729" version="1" comment="curl-openssl1 is &lt;7.19.7-1.70.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203730" version="1" comment="libcurl4-openssl1 is &lt;7.19.7-1.70.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203731" version="1" comment="libcurl4-openssl1-32bit is &lt;7.19.7-1.70.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203732" version="1" comment="curl-openssl1 is &lt;7.37.0-70.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203733" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203734" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203735" version="1" comment="libcurl4-openssl1-x86 is &lt;7.37.0-70.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203736" version="1" comment="curl-openssl1 is &lt;7.37.0-70.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203737" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203738" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203739" version="1" comment="libcurl4-openssl1-x86 is &lt;7.37.0-70.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234524" version="1" comment="curl-openssl1 is &lt;7.37.0-70.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234525" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234526" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234527" version="1" comment="libcurl4-openssl1-x86 is &lt;7.37.0-70.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238966" version="1" comment="curl-openssl1 is &lt;7.37.0-70.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238967" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238968" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238969" version="1" comment="libcurl4-openssl1-x86 is &lt;7.37.0-70.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254211" version="1" comment="curl-openssl1 is &lt;7.37.0-70.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254212" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254213" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254214" version="1" comment="libcurl4-openssl1-x86 is &lt;7.37.0-70.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264643" version="1" comment="curl-openssl1 is &lt;7.37.0-70.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264644" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264645" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264646" version="1" comment="libcurl4-openssl1-x86 is &lt;7.37.0-70.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203740" version="1" comment="libcurl4-openssl1 is &lt;7.19.7-0.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203741" version="1" comment="libcurl4-openssl1-32bit is &lt;7.19.7-0.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203742" version="1" comment="libcurl4-openssl1-x86 is &lt;7.19.7-0.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203743" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203744" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203745" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203746" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203747" version="1" comment="openssl1 is &lt;1.0.1g-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203748" version="1" comment="openssl1-doc is &lt;1.0.1g-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203749" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203750" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203751" version="1" comment="libldap-openssl1-2_4-2-x86 is &lt;2.4.26-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203752" version="1" comment="openldap2-client-openssl1 is &lt;2.4.26-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203753" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203754" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203755" version="1" comment="libldap-openssl1-2_4-2-x86 is &lt;2.4.26-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203756" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203757" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203758" version="1" comment="libldap-openssl1-2_4-2-x86 is &lt;2.4.26-0.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203759" version="1" comment="openldap2-client-openssl1 is &lt;2.4.26-0.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230000" version="1" comment="libslp1-openssl1 is &lt;1.2.0-172.27.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230001" version="1" comment="openslp-openssl1 is &lt;1.2.0-172.27.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203762" version="1" comment="openssh-openssl1 is &lt;6.6p1-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203763" version="1" comment="openssh-openssl1-helpers is &lt;6.6p1-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203764" version="1" comment="openssh-openssl1 is &lt;6.6p1-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203765" version="1" comment="openssh-openssl1-helpers is &lt;6.6p1-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234528" version="1" comment="openssh-openssl1 is &lt;6.6p1-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234529" version="1" comment="openssh-openssl1-helpers is &lt;6.6p1-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239198" version="1" comment="openssh-openssl1 is &lt;6.6p1-19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239199" version="1" comment="openssh-openssl1-helpers is &lt;6.6p1-19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203766" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203767" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203768" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203769" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203770" version="1" comment="openssl1 is &lt;1.0.1g-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203771" version="1" comment="openssl1-doc is &lt;1.0.1g-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203772" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203773" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203774" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203775" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203776" version="1" comment="openssl1 is &lt;1.0.1g-0.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203777" version="1" comment="openssl1-doc is &lt;1.0.1g-0.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203778" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203779" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203780" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203781" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203782" version="1" comment="openssl1 is &lt;1.0.1g-0.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203783" version="1" comment="openssl1-doc is &lt;1.0.1g-0.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203784" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203785" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203786" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203787" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203788" version="1" comment="openssl1 is &lt;1.0.1g-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203789" version="1" comment="openssl1-doc is &lt;1.0.1g-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203790" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203791" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203792" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203793" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203794" version="1" comment="openssl1 is &lt;1.0.1g-0.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203795" version="1" comment="openssl1-doc is &lt;1.0.1g-0.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203796" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203797" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203798" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203799" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.58.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203800" version="1" comment="openssl1 is &lt;1.0.1g-0.58.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203801" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203802" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203803" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203804" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203805" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.58.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203806" version="1" comment="openssl1 is &lt;1.0.1g-0.58.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203807" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233691" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233692" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233693" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233694" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.58.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233695" version="1" comment="openssl1 is &lt;1.0.1g-0.58.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233696" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240955" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240956" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240957" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240958" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.58.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240959" version="1" comment="openssl1 is &lt;1.0.1g-0.58.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240960" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257178" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257179" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257180" version="1" comment="openssl1 is &lt;1.0.1g-0.58.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257181" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264647" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264648" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264649" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264650" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.58.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264651" version="1" comment="openssl1 is &lt;1.0.1g-0.58.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264652" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203808" version="1" comment="openvpn-openssl1 is &lt;2.3.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203809" version="1" comment="openvpn-openssl1-down-root-plugin is &lt;2.3.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203813" version="1" comment="wget-openssl1 is &lt;1.11.4-1.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203814" version="1" comment="wget-openssl1 is &lt;1.11.4-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203815" version="1" comment="wget-openssl1 is &lt;1.11.4-1.41.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073771" version="1" comment="sled-release is ==11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203816" version="1" comment="Mesa is &lt;7.11.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203817" version="1" comment="Mesa-32bit is &lt;7.11.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203818" version="1" comment="MozillaFirefox is &lt;17.0.9esr-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203819" version="1" comment="MozillaFirefox-translations is &lt;17.0.9esr-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203820" version="1" comment="acroread is &lt;9.5.5-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203821" version="1" comment="acroread-cmaps is &lt;9.4.6-0.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203822" version="1" comment="acroread-fonts-ja is &lt;9.4.6-0.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203823" version="1" comment="acroread-fonts-ko is &lt;9.4.6-0.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203824" version="1" comment="acroread-fonts-zh_CN is &lt;9.4.6-0.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203825" version="1" comment="acroread-fonts-zh_TW is &lt;9.4.6-0.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203826" version="1" comment="acroread_ja is &lt;9.4.2-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203827" version="1" comment="bind-libs is &lt;9.9.4P2-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203828" version="1" comment="bind-libs-32bit is &lt;9.9.4P2-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203829" version="1" comment="bind-utils is &lt;9.9.4P2-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203830" version="1" comment="bogofilter is &lt;1.1.1-174.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203831" version="1" comment="ibm-data-db2 is &lt;2.6.7-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203832" version="1" comment="libldb1 is &lt;3.6.3-0.33.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203833" version="1" comment="libldb1-32bit is &lt;3.6.3-0.33.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203834" version="1" comment="libsmbclient0 is &lt;3.6.3-0.33.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203835" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.33.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203836" version="1" comment="libtalloc1 is &lt;3.4.3-1.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203837" version="1" comment="libtalloc1-32bit is &lt;3.4.3-1.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203838" version="1" comment="libtalloc2 is &lt;3.6.3-0.33.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203839" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.33.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203840" version="1" comment="libtdb1 is &lt;3.6.3-0.33.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203841" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.33.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203842" version="1" comment="libtevent0 is &lt;3.6.3-0.33.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203843" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.33.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203844" version="1" comment="libwbclient0 is &lt;3.6.3-0.33.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203845" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.33.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203846" version="1" comment="samba is &lt;3.6.3-0.33.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203847" version="1" comment="samba-32bit is &lt;3.6.3-0.33.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203848" version="1" comment="samba-client is &lt;3.6.3-0.33.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203849" version="1" comment="samba-client-32bit is &lt;3.6.3-0.33.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203850" version="1" comment="samba-doc is &lt;3.6.3-0.33.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203851" version="1" comment="samba-krb-printing is &lt;3.6.3-0.33.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203852" version="1" comment="samba-winbind is &lt;3.6.3-0.33.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203853" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.33.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203854" version="1" comment="cifs-utils is &lt;5.1-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203855" version="1" comment="clamav is &lt;0.97.8-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203856" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203857" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203858" version="1" comment="coreutils is &lt;8.12-6.25.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203859" version="1" comment="coreutils-lang is &lt;8.12-6.25.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203860" version="1" comment="cups is &lt;1.3.9-8.46.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203861" version="1" comment="cups-client is &lt;1.3.9-8.46.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203862" version="1" comment="cups-libs is &lt;1.3.9-8.46.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203863" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.46.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203864" version="1" comment="curl is &lt;7.19.7-1.20.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203865" version="1" comment="libcurl4 is &lt;7.19.7-1.20.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203866" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.20.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203867" version="1" comment="dbus-1 is &lt;1.2.10-3.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203868" version="1" comment="dbus-1-32bit is &lt;1.2.10-3.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203869" version="1" comment="dbus-1-x11 is &lt;1.2.10-3.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203870" version="1" comment="dhcp is &lt;4.2.4.P2-0.11.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203871" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.11.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203872" version="1" comment="libpurple-meanwhile is &lt;2.6.6-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203873" version="1" comment="libpurple-tcl is &lt;2.6.6-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203874" version="1" comment="MozillaFirefox is &lt;10.0.7-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203875" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203876" version="1" comment="MozillaFirefox-translations is &lt;10.0.7-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203877" version="1" comment="libfreebl3 is &lt;3.13.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203878" version="1" comment="libfreebl3-32bit is &lt;3.13.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203879" version="1" comment="mozilla-nspr is &lt;4.9.2-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203880" version="1" comment="mozilla-nspr-32bit is &lt;4.9.2-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203881" version="1" comment="mozilla-nss is &lt;3.13.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203882" version="1" comment="mozilla-nss-32bit is &lt;3.13.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203883" version="1" comment="mozilla-nss-tools is &lt;3.13.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203884" version="1" comment="MozillaFirefox is &lt;10.0.9-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203885" version="1" comment="MozillaFirefox-translations is &lt;10.0.9-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203886" version="1" comment="MozillaFirefox is &lt;10.0.10-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203887" version="1" comment="MozillaFirefox-translations is &lt;10.0.10-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203888" version="1" comment="mozilla-nspr is &lt;4.9.3-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203889" version="1" comment="mozilla-nspr-32bit is &lt;4.9.3-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203890" version="1" comment="MozillaFirefox is &lt;10.0.11-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203891" version="1" comment="MozillaFirefox-translations is &lt;10.0.11-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203892" version="1" comment="libfreebl3 is &lt;3.14-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203893" version="1" comment="libfreebl3-32bit is &lt;3.14-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203894" version="1" comment="mozilla-nss is &lt;3.14-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203895" version="1" comment="mozilla-nss-32bit is &lt;3.14-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203896" version="1" comment="mozilla-nss-tools is &lt;3.14-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203897" version="1" comment="MozillaFirefox is &lt;10.0.12-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203898" version="1" comment="MozillaFirefox-translations is &lt;10.0.12-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203899" version="1" comment="libfreebl3 is &lt;3.14.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203900" version="1" comment="libfreebl3-32bit is &lt;3.14.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203901" version="1" comment="mozilla-nspr is &lt;4.9.4-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203902" version="1" comment="mozilla-nspr-32bit is &lt;4.9.4-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203903" version="1" comment="mozilla-nss is &lt;3.14.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203904" version="1" comment="mozilla-nss-32bit is &lt;3.14.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203905" version="1" comment="mozilla-nss-tools is &lt;3.14.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203906" version="1" comment="MozillaFirefox is &lt;17.0.4esr-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203907" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203908" version="1" comment="MozillaFirefox-translations is &lt;17.0.4esr-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203909" version="1" comment="beagle-evolution is &lt;0.3.8-56.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203910" version="1" comment="beagle-firefox is &lt;0.3.8-56.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203911" version="1" comment="beagle-gui is &lt;0.3.8-56.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203912" version="1" comment="beagle-lang is &lt;0.3.8-56.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203913" version="1" comment="libfreebl3 is &lt;3.14.2-0.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203914" version="1" comment="libfreebl3-32bit is &lt;3.14.2-0.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203915" version="1" comment="mhtml-firefox is &lt;0.5-1.47.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203916" version="1" comment="mozilla-nspr is &lt;4.9.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203917" version="1" comment="mozilla-nspr-32bit is &lt;4.9.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203918" version="1" comment="mozilla-nss is &lt;3.14.2-0.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203919" version="1" comment="mozilla-nss-32bit is &lt;3.14.2-0.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203920" version="1" comment="mozilla-nss-tools is &lt;3.14.2-0.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203921" version="1" comment="MozillaFirefox is &lt;17.0.5esr-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203922" version="1" comment="MozillaFirefox-translations is &lt;17.0.5esr-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203923" version="1" comment="libfreebl3 is &lt;3.14.3-0.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203924" version="1" comment="libfreebl3-32bit is &lt;3.14.3-0.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203925" version="1" comment="mozilla-nspr is &lt;4.9.6-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203926" version="1" comment="mozilla-nspr-32bit is &lt;4.9.6-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203927" version="1" comment="mozilla-nss is &lt;3.14.3-0.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203928" version="1" comment="mozilla-nss-32bit is &lt;3.14.3-0.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203929" version="1" comment="mozilla-nss-tools is &lt;3.14.3-0.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203930" version="1" comment="MozillaFirefox is &lt;17.0.6esr-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203931" version="1" comment="MozillaFirefox-translations is &lt;17.0.6esr-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203932" version="1" comment="MozillaFirefox is &lt;17.0.7esr-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203933" version="1" comment="MozillaFirefox-translations is &lt;17.0.7esr-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203934" version="1" comment="MozillaFirefox is &lt;17.0.10esr-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203935" version="1" comment="MozillaFirefox-translations is &lt;17.0.10esr-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203936" version="1" comment="flash-player is &lt;11.2.202.336-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203937" version="1" comment="flash-player-gnome is &lt;11.2.202.336-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203938" version="1" comment="flash-player-kde4 is &lt;11.2.202.336-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203939" version="1" comment="glibc is &lt;2.11.3-17.45.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203940" version="1" comment="glibc-32bit is &lt;2.11.3-17.45.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203941" version="1" comment="glibc-devel is &lt;2.11.3-17.45.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203942" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.45.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203943" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.45.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203944" version="1" comment="glibc-locale is &lt;2.11.3-17.45.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203945" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.45.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203946" version="1" comment="nscd is &lt;2.11.3-17.45.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203947" version="1" comment="gnutls is &lt;2.4.1-24.39.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203948" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203949" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203950" version="1" comment="gpg2 is &lt;2.0.9-25.33.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203951" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203952" version="1" comment="icedtea-web is &lt;1.4.1-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203953" version="1" comment="java-1_6_0-openjdk is &lt;1.6.0.0_b27.1.12.7-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203954" version="1" comment="java-1_6_0-openjdk-demo is &lt;1.6.0.0_b27.1.12.7-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203955" version="1" comment="java-1_6_0-openjdk-devel is &lt;1.6.0.0_b27.1.12.7-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203956" version="1" comment="kdelibs4 is &lt;4.3.5-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203957" version="1" comment="kdelibs4-core is &lt;4.3.5-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203958" version="1" comment="libkde4 is &lt;4.3.5-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203959" version="1" comment="libkdecore4 is &lt;4.3.5-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203960" version="1" comment="kernel-default is &lt;3.0.101-0.7.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203961" version="1" comment="kernel-default-base is &lt;3.0.101-0.7.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203962" version="1" comment="kernel-default-devel is &lt;3.0.101-0.7.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203963" version="1" comment="kernel-default-extra is &lt;3.0.101-0.7.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203964" version="1" comment="kernel-pae is &lt;3.0.101-0.7.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203965" version="1" comment="kernel-pae-base is &lt;3.0.101-0.7.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203966" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.7.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203967" version="1" comment="kernel-pae-extra is &lt;3.0.101-0.7.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203968" version="1" comment="kernel-source is &lt;3.0.101-0.7.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203969" version="1" comment="kernel-syms is &lt;3.0.101-0.7.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203970" version="1" comment="kernel-trace is &lt;3.0.101-0.7.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203971" version="1" comment="kernel-trace-base is &lt;3.0.101-0.7.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203972" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.7.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203973" version="1" comment="kernel-trace-extra is &lt;3.0.101-0.7.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203974" version="1" comment="kernel-xen is &lt;3.0.101-0.7.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203975" version="1" comment="kernel-xen-base is &lt;3.0.101-0.7.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203976" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.7.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203977" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.7.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203978" version="1" comment="xen-kmp-default is &lt;4.1.6_04_3.0.101_0.7.17-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203979" version="1" comment="xen-kmp-pae is &lt;4.1.6_04_3.0.101_0.7.17-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203980" version="1" comment="xen-kmp-trace is &lt;4.1.6_04_3.0.101_0.7.17-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203981" version="1" comment="krb5 is &lt;1.6.3-133.49.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203982" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203983" version="1" comment="krb5-client is &lt;1.6.3-133.49.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203984" version="1" comment="kvm is &lt;0.15.1-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203985" version="1" comment="libldb1 is &lt;3.6.3-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203986" version="1" comment="libldb1-32bit is &lt;3.6.3-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203987" version="1" comment="libsmbclient0 is &lt;3.6.3-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203988" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203989" version="1" comment="libtalloc2 is &lt;3.6.3-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203990" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203991" version="1" comment="libtdb1 is &lt;3.6.3-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203992" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203993" version="1" comment="libtevent0 is &lt;3.6.3-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203994" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203995" version="1" comment="libwbclient0 is &lt;3.6.3-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203996" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203997" version="1" comment="samba is &lt;3.6.3-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203998" version="1" comment="samba-32bit is &lt;3.6.3-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009203999" version="1" comment="samba-client is &lt;3.6.3-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204000" version="1" comment="samba-client-32bit is &lt;3.6.3-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204001" version="1" comment="samba-doc is &lt;3.6.3-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204002" version="1" comment="samba-krb-printing is &lt;3.6.3-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204003" version="1" comment="samba-winbind is &lt;3.6.3-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204004" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204005" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.20.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204006" version="1" comment="libqt4 is &lt;4.6.3-5.20.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204007" version="1" comment="libqt4-32bit is &lt;4.6.3-5.20.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204008" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.20.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204009" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.20.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204010" version="1" comment="libqt4-sql is &lt;4.6.3-5.20.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204011" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.20.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204012" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.20.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204013" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.20.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204014" version="1" comment="libqt4-x11 is &lt;4.6.3-5.20.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204015" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.20.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204016" version="1" comment="libgcrypt11 is &lt;1.5.0-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204017" version="1" comment="libgcrypt11-32bit is &lt;1.5.0-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204018" version="1" comment="mysql is &lt;5.0.96-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204019" version="1" comment="mysql-client is &lt;5.0.96-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204020" version="1" comment="permissions is &lt;2013.1.7-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204021" version="1" comment="libpixman-1-0 is &lt;0.16.0-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204022" version="1" comment="libpixman-1-0-32bit is &lt;0.16.0-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204023" version="1" comment="libproxy0-config-gnome-32bit is &lt;0.3.1-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204024" version="1" comment="libproxy0-networkmanager-32bit is &lt;0.3.1-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204025" version="1" comment="libsoup-2_4-1 is &lt;2.32.2-4.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204026" version="1" comment="libsoup-2_4-1-32bit is &lt;2.32.2-4.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204027" version="1" comment="libvirt is &lt;0.9.6-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204028" version="1" comment="libvirt-client is &lt;0.9.6-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204029" version="1" comment="libvirt-client-32bit is &lt;0.9.6-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204030" version="1" comment="libvirt-doc is &lt;0.9.6-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204031" version="1" comment="libvirt-python is &lt;0.9.6-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204032" version="1" comment="libvirt is &lt;0.9.6-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204033" version="1" comment="libvirt-client is &lt;0.9.6-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204034" version="1" comment="libvirt-client-32bit is &lt;0.9.6-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204035" version="1" comment="libvirt-doc is &lt;0.9.6-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204036" version="1" comment="libvirt-python is &lt;0.9.6-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204037" version="1" comment="libxml2 is &lt;2.7.6-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204038" version="1" comment="libxml2-32bit is &lt;2.7.6-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204039" version="1" comment="libxml2-python is &lt;2.7.6-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204040" version="1" comment="libfreebl3 is &lt;3.15.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204041" version="1" comment="libfreebl3-32bit is &lt;3.15.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204042" version="1" comment="mozilla-nspr is &lt;4.10.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204043" version="1" comment="mozilla-nspr-32bit is &lt;4.10.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204044" version="1" comment="mozilla-nss is &lt;3.15.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204045" version="1" comment="mozilla-nss-32bit is &lt;3.15.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204046" version="1" comment="mozilla-nss-tools is &lt;3.15.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204047" version="1" comment="libfreebl3 is &lt;3.15.3-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204048" version="1" comment="libfreebl3-32bit is &lt;3.15.3-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204049" version="1" comment="mozilla-nspr is &lt;4.10.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204050" version="1" comment="mozilla-nspr-32bit is &lt;4.10.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204051" version="1" comment="mozilla-nss is &lt;3.15.3-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204052" version="1" comment="mozilla-nss-32bit is &lt;3.15.3-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204053" version="1" comment="mozilla-nss-tools is &lt;3.15.3-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204054" version="1" comment="libfreebl3 is &lt;3.15.3.1-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204055" version="1" comment="libfreebl3-32bit is &lt;3.15.3.1-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204056" version="1" comment="mozilla-nss is &lt;3.15.3.1-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204057" version="1" comment="mozilla-nss-32bit is &lt;3.15.3.1-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204058" version="1" comment="mozilla-nss-tools is &lt;3.15.3.1-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204059" version="1" comment="openssh is &lt;5.1p1-41.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204060" version="1" comment="openssh-askpass is &lt;5.1p1-41.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204061" version="1" comment="openssl-certs is &lt;1.95-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204062" version="1" comment="openvpn is &lt;2.0.9-143.33.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204063" version="1" comment="perl is &lt;5.10.0-64.61.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204064" version="1" comment="perl-32bit is &lt;5.10.0-64.61.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204065" version="1" comment="perl-base is &lt;5.10.0-64.61.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204066" version="1" comment="perl-doc is &lt;5.10.0-64.61.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204067" version="1" comment="popt is &lt;1.7-37.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204068" version="1" comment="popt-32bit is &lt;1.7-37.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204069" version="1" comment="rpm is &lt;4.4.2.3-37.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204070" version="1" comment="puppet is &lt;2.6.18-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204071" version="1" comment="libpython2_6-1_0 is &lt;2.6.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204072" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204073" version="1" comment="python is &lt;2.6.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204074" version="1" comment="python-base is &lt;2.6.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204075" version="1" comment="python-base-32bit is &lt;2.6.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204076" version="1" comment="python-curses is &lt;2.6.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204077" version="1" comment="python-xml is &lt;2.6.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204078" version="1" comment="quota is &lt;3.16-50.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204079" version="1" comment="ruby is &lt;1.8.7.p357-0.9.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204080" version="1" comment="strongswan is &lt;4.4.0-6.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204081" version="1" comment="strongswan-doc is &lt;4.4.0-6.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204082" version="1" comment="sudo is &lt;1.7.6p2-0.2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204083" version="1" comment="telepathy-idle is &lt;0.1.5-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204084" version="1" comment="usbmuxd is &lt;1.0.7-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204085" version="1" comment="xen is &lt;4.1.4_02-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204086" version="1" comment="xen-doc-html is &lt;4.1.4_02-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204087" version="1" comment="xen-doc-pdf is &lt;4.1.4_02-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204088" version="1" comment="xen-kmp-default is &lt;4.1.4_02_3.0.58_0.6.6-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204089" version="1" comment="xen-kmp-pae is &lt;4.1.4_02_3.0.58_0.6.6-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204090" version="1" comment="xen-kmp-trace is &lt;4.1.4_02_3.0.58_0.6.6-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204091" version="1" comment="xen-libs is &lt;4.1.4_02-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204092" version="1" comment="xen-libs-32bit is &lt;4.1.4_02-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204093" version="1" comment="xen-tools is &lt;4.1.4_02-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204094" version="1" comment="xen-tools-domU is &lt;4.1.4_02-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204095" version="1" comment="libvirt is &lt;0.9.6-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204096" version="1" comment="libvirt-client is &lt;0.9.6-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204097" version="1" comment="libvirt-client-32bit is &lt;0.9.6-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204098" version="1" comment="libvirt-doc is &lt;0.9.6-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204099" version="1" comment="libvirt-python is &lt;0.9.6-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204100" version="1" comment="virt-manager is &lt;0.9.0-3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204101" version="1" comment="vm-install is &lt;0.5.10-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204102" version="1" comment="xen is &lt;4.1.2_20-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204103" version="1" comment="xen-doc-html is &lt;4.1.2_20-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204104" version="1" comment="xen-doc-pdf is &lt;4.1.2_20-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204105" version="1" comment="xen-kmp-default is &lt;4.1.2_20_3.0.38_0.5-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204106" version="1" comment="xen-kmp-trace is &lt;4.1.2_20_3.0.38_0.5-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204107" version="1" comment="xen-libs is &lt;4.1.2_20-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204108" version="1" comment="xen-libs-32bit is &lt;4.1.2_20-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204109" version="1" comment="xen-tools is &lt;4.1.2_20-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204110" version="1" comment="xen-tools-domU is &lt;4.1.2_20-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204111" version="1" comment="vm-install is &lt;0.5.12-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204112" version="1" comment="xen is &lt;4.1.3_02-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204113" version="1" comment="xen-doc-html is &lt;4.1.3_02-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204114" version="1" comment="xen-doc-pdf is &lt;4.1.3_02-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204115" version="1" comment="xen-kmp-default is &lt;4.1.3_02_3.0.38_0.5-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204116" version="1" comment="xen-kmp-trace is &lt;4.1.3_02_3.0.38_0.5-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204117" version="1" comment="xen-libs is &lt;4.1.3_02-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204118" version="1" comment="xen-libs-32bit is &lt;4.1.3_02-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204119" version="1" comment="xen-tools is &lt;4.1.3_02-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204120" version="1" comment="xen-tools-domU is &lt;4.1.3_02-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204121" version="1" comment="xen is &lt;4.1.3_04-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204122" version="1" comment="xen-doc-html is &lt;4.1.3_04-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204123" version="1" comment="xen-doc-pdf is &lt;4.1.3_04-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204124" version="1" comment="xen-kmp-default is &lt;4.1.3_04_3.0.42_0.7-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204125" version="1" comment="xen-kmp-pae is &lt;4.1.3_04_3.0.42_0.7-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204126" version="1" comment="xen-kmp-trace is &lt;4.1.3_04_3.0.42_0.7-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204127" version="1" comment="xen-libs is &lt;4.1.3_04-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204128" version="1" comment="xen-libs-32bit is &lt;4.1.3_04-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204129" version="1" comment="xen-tools is &lt;4.1.3_04-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204130" version="1" comment="xen-tools-domU is &lt;4.1.3_04-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204131" version="1" comment="xen is &lt;4.1.5_02-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204132" version="1" comment="xen-doc-html is &lt;4.1.5_02-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204133" version="1" comment="xen-doc-pdf is &lt;4.1.5_02-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204134" version="1" comment="xen-kmp-default is &lt;4.1.5_02_3.0.74_0.6.10-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204135" version="1" comment="xen-kmp-pae is &lt;4.1.5_02_3.0.74_0.6.10-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204136" version="1" comment="xen-kmp-trace is &lt;4.1.5_02_3.0.74_0.6.10-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204137" version="1" comment="xen-libs is &lt;4.1.5_02-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204138" version="1" comment="xen-libs-32bit is &lt;4.1.5_02-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204139" version="1" comment="xen-tools is &lt;4.1.5_02-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204140" version="1" comment="xen-tools-domU is &lt;4.1.5_02-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204141" version="1" comment="xen is &lt;4.1.6_02-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204142" version="1" comment="xen-doc-html is &lt;4.1.6_02-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204143" version="1" comment="xen-doc-pdf is &lt;4.1.6_02-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204144" version="1" comment="xen-kmp-default is &lt;4.1.6_02_3.0.93_0.5-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204145" version="1" comment="xen-kmp-pae is &lt;4.1.6_02_3.0.93_0.5-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204146" version="1" comment="xen-kmp-trace is &lt;4.1.6_02_3.0.93_0.5-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204147" version="1" comment="xen-libs is &lt;4.1.6_02-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204148" version="1" comment="xen-libs-32bit is &lt;4.1.6_02-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204149" version="1" comment="xen-tools is &lt;4.1.6_02-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204150" version="1" comment="xen-tools-domU is &lt;4.1.6_02-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204151" version="1" comment="xen is &lt;4.1.6_04-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204152" version="1" comment="xen-doc-html is &lt;4.1.6_04-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204153" version="1" comment="xen-doc-pdf is &lt;4.1.6_04-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204154" version="1" comment="xen-kmp-default is &lt;4.1.6_04_3.0.101_0.5-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204155" version="1" comment="xen-kmp-pae is &lt;4.1.6_04_3.0.101_0.5-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204156" version="1" comment="xen-kmp-trace is &lt;4.1.6_04_3.0.101_0.5-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204157" version="1" comment="xen-libs is &lt;4.1.6_04-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204158" version="1" comment="xen-libs-32bit is &lt;4.1.6_04-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204159" version="1" comment="xen-tools is &lt;4.1.6_04-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204160" version="1" comment="xen-tools-domU is &lt;4.1.6_04-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204161" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.70.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204162" version="1" comment="xorg-x11-server is &lt;7.4-27.70.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204163" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.70.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204164" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204165" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204166" version="1" comment="xorg-x11-libxcb is &lt;7.4-1.22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204167" version="1" comment="xorg-x11-libxcb-32bit is &lt;7.4-1.22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204168" version="1" comment="xorg-x11-server-rdp is &lt;7.3.99-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204169" version="1" comment="xrdp is &lt;0.4.1-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251873" version="1" comment="zypper is &lt;1.6.166-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251874" version="1" comment="zypper-log is &lt;1.6.166-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204172" version="1" comment="MozillaFirefox is &lt;24.6.0esr-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204173" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204174" version="1" comment="MozillaFirefox-translations is &lt;24.6.0esr-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204175" version="1" comment="libfreebl3 is &lt;3.16.1-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204176" version="1" comment="libfreebl3-32bit is &lt;3.16.1-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204177" version="1" comment="libsoftokn3 is &lt;3.16.1-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204178" version="1" comment="libsoftokn3-32bit is &lt;3.16.1-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204179" version="1" comment="mozilla-nspr is &lt;4.10.6-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204180" version="1" comment="mozilla-nspr-32bit is &lt;4.10.6-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204181" version="1" comment="mozilla-nss is &lt;3.16.1-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204182" version="1" comment="mozilla-nss-32bit is &lt;3.16.1-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204183" version="1" comment="mozilla-nss-tools is &lt;3.16.1-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077540" version="1" comment="sled-release is ==11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204184" version="1" comment="Mesa is &lt;9.0.3-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204185" version="1" comment="Mesa-32bit is &lt;9.0.3-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204186" version="1" comment="MozillaFirefox is &lt;17.0.9esr-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204187" version="1" comment="MozillaFirefox-translations is &lt;17.0.9esr-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204188" version="1" comment="MozillaFirefox-translations is &lt;31.8.0esr-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204189" version="1" comment="MozillaFirefox-translations is &lt;38.5.0esr-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204190" version="1" comment="MozillaFirefox is &lt;24.5.0esr-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204191" version="1" comment="MozillaFirefox-translations is &lt;24.5.0esr-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204192" version="1" comment="libfreebl3 is &lt;3.16-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204193" version="1" comment="libfreebl3-32bit is &lt;3.16-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204194" version="1" comment="libsoftokn3 is &lt;3.16-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204195" version="1" comment="libsoftokn3-32bit is &lt;3.16-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204196" version="1" comment="mozilla-nspr is &lt;4.10.4-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204197" version="1" comment="mozilla-nspr-32bit is &lt;4.10.4-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204198" version="1" comment="mozilla-nss is &lt;3.16-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204199" version="1" comment="mozilla-nss-32bit is &lt;3.16-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204200" version="1" comment="mozilla-nss-tools is &lt;3.16-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204201" version="1" comment="MozillaFirefox is &lt;31.6.0esr-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204202" version="1" comment="MozillaFirefox-translations is &lt;31.6.0esr-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204203" version="1" comment="MozillaFirefox-translations is &lt;31.8.0esr-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204204" version="1" comment="libfreebl3 is &lt;3.19.2_CKBI_1.98-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204205" version="1" comment="libfreebl3-32bit is &lt;3.19.2_CKBI_1.98-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204206" version="1" comment="libsoftokn3 is &lt;3.19.2_CKBI_1.98-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204207" version="1" comment="libsoftokn3-32bit is &lt;3.19.2_CKBI_1.98-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204208" version="1" comment="mozilla-nspr-32bit is &lt;4.10.8-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204209" version="1" comment="mozilla-nss-32bit is &lt;3.19.2_CKBI_1.98-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204210" version="1" comment="mozilla-nss-tools is &lt;3.19.2_CKBI_1.98-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204211" version="1" comment="libaugeas0 is &lt;0.9.0-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204212" version="1" comment="bash is &lt;3.2-147.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204213" version="1" comment="bash-doc is &lt;3.2-147.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204214" version="1" comment="libreadline5-32bit is &lt;5.2-147.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204215" version="1" comment="readline-doc is &lt;5.2-147.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204216" version="1" comment="bind-libs is &lt;9.9.6P1-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204217" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204218" version="1" comment="bind-utils is &lt;9.9.6P1-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204219" version="1" comment="bind-libs is &lt;9.9.6P1-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204220" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204221" version="1" comment="bind-utils is &lt;9.9.6P1-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204222" version="1" comment="bind-libs is &lt;9.9.6P1-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204223" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204224" version="1" comment="bind-utils is &lt;9.9.6P1-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204225" version="1" comment="bind-libs is &lt;9.9.6P1-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204226" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204227" version="1" comment="bind-utils is &lt;9.9.6P1-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204228" version="1" comment="binutils is &lt;2.23.1-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204229" version="1" comment="ibm-data-db2 is &lt;2.6.7-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204230" version="1" comment="cabextract is &lt;1.2-2.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204231" version="1" comment="cabextract is &lt;1.2-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204232" version="1" comment="libldb1 is &lt;3.6.3-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204233" version="1" comment="libldb1-32bit is &lt;3.6.3-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204234" version="1" comment="libsmbclient0 is &lt;3.6.3-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204235" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204236" version="1" comment="libtalloc2 is &lt;3.6.3-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204237" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204238" version="1" comment="libtdb1 is &lt;3.6.3-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204239" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204240" version="1" comment="libtevent0 is &lt;3.6.3-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204241" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204242" version="1" comment="libwbclient0 is &lt;3.6.3-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204243" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204244" version="1" comment="samba is &lt;3.6.3-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204245" version="1" comment="samba-32bit is &lt;3.6.3-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204246" version="1" comment="samba-client is &lt;3.6.3-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204247" version="1" comment="samba-client-32bit is &lt;3.6.3-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204248" version="1" comment="samba-doc is &lt;3.6.3-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204249" version="1" comment="samba-krb-printing is &lt;3.6.3-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204250" version="1" comment="samba-winbind is &lt;3.6.3-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204251" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204252" version="1" comment="clamav is &lt;0.98.1-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204253" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204254" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204255" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204256" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204257" version="1" comment="compat-wireless-kmp-default is &lt;3.13_3.0.101_0.31-0.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204258" version="1" comment="compat-wireless-kmp-pae is &lt;3.13_3.0.101_0.31-0.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204259" version="1" comment="compat-wireless-kmp-xen is &lt;3.13_3.0.101_0.31-0.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204260" version="1" comment="cups is &lt;1.3.9-8.46.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204261" version="1" comment="cups-client is &lt;1.3.9-8.46.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204262" version="1" comment="cups-libs is &lt;1.3.9-8.46.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204263" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.46.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204264" version="1" comment="curl is &lt;7.19.7-1.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204265" version="1" comment="libcurl4 is &lt;7.19.7-1.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204266" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204267" version="1" comment="libcurl4 is &lt;7.19.7-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204268" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204269" version="1" comment="curl is &lt;7.19.7-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204270" version="1" comment="libcurl4 is &lt;7.19.7-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204271" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204272" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204273" version="1" comment="dhcpcd is &lt;3.2.3-45.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204274" version="1" comment="dnsmasq is &lt;2.71-0.12.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204275" version="1" comment="e2fsprogs is &lt;1.41.9-2.10.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204276" version="1" comment="libblkid1 is &lt;2.19.1-6.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204277" version="1" comment="libblkid1-32bit is &lt;2.19.1-6.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204278" version="1" comment="libcom_err2 is &lt;1.41.9-2.10.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204279" version="1" comment="libcom_err2-32bit is &lt;1.41.9-2.10.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204280" version="1" comment="libext2fs2 is &lt;1.41.9-2.10.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204281" version="1" comment="libuuid1 is &lt;2.19.1-6.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204282" version="1" comment="libuuid1-32bit is &lt;2.19.1-6.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204283" version="1" comment="uuid-runtime is &lt;2.19.1-6.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204284" version="1" comment="ecryptfs-utils is &lt;61-1.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204285" version="1" comment="ecryptfs-utils-32bit is &lt;61-1.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204286" version="1" comment="libpurple-meanwhile is &lt;2.6.6-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204287" version="1" comment="libpurple-tcl is &lt;2.6.6-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204288" version="1" comment="MozillaFirefox is &lt;17.0.7esr-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204289" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204290" version="1" comment="MozillaFirefox-translations is &lt;17.0.7esr-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204291" version="1" comment="MozillaFirefox is &lt;17.0.10esr-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204292" version="1" comment="MozillaFirefox-translations is &lt;17.0.10esr-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204293" version="1" comment="MozillaFirefox is &lt;24.3.0esr-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204294" version="1" comment="MozillaFirefox-translations is &lt;24.3.0esr-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204295" version="1" comment="libfreebl3 is &lt;3.15.4-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204296" version="1" comment="libfreebl3-32bit is &lt;3.15.4-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204297" version="1" comment="libsoftokn3 is &lt;3.15.4-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204298" version="1" comment="libsoftokn3-32bit is &lt;3.15.4-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204299" version="1" comment="mozilla-nss is &lt;3.15.4-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204300" version="1" comment="mozilla-nss-32bit is &lt;3.15.4-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204301" version="1" comment="mozilla-nss-tools is &lt;3.15.4-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204302" version="1" comment="MozillaFirefox is &lt;24.4.0esr-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204303" version="1" comment="MozillaFirefox-translations is &lt;24.4.0esr-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204304" version="1" comment="MozillaFirefox is &lt;24.7.0esr-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204305" version="1" comment="MozillaFirefox-translations is &lt;24.7.0esr-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204306" version="1" comment="libfreebl3 is &lt;3.16.2-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204307" version="1" comment="libfreebl3-32bit is &lt;3.16.2-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204308" version="1" comment="libsoftokn3 is &lt;3.16.2-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204309" version="1" comment="libsoftokn3-32bit is &lt;3.16.2-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204310" version="1" comment="mozilla-nss is &lt;3.16.2-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204311" version="1" comment="mozilla-nss-32bit is &lt;3.16.2-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204312" version="1" comment="mozilla-nss-tools is &lt;3.16.2-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204313" version="1" comment="MozillaFirefox is &lt;24.8.0esr-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204314" version="1" comment="MozillaFirefox-translations is &lt;24.8.0esr-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204315" version="1" comment="libfreebl3 is &lt;3.16.4-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204316" version="1" comment="libfreebl3-32bit is &lt;3.16.4-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204317" version="1" comment="libsoftokn3 is &lt;3.16.4-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204318" version="1" comment="libsoftokn3-32bit is &lt;3.16.4-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204319" version="1" comment="mozilla-nss is &lt;3.16.4-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204320" version="1" comment="mozilla-nss-32bit is &lt;3.16.4-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204321" version="1" comment="mozilla-nss-tools is &lt;3.16.4-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204322" version="1" comment="MozillaFirefox is &lt;31.3.0esr-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204323" version="1" comment="MozillaFirefox-translations is &lt;31.3.0esr-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204324" version="1" comment="MozillaFirefox is &lt;31.4.0esr-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204325" version="1" comment="MozillaFirefox-translations is &lt;31.4.0esr-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204326" version="1" comment="MozillaFirefox is &lt;31.5.3esr-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204327" version="1" comment="MozillaFirefox-translations is &lt;31.5.3esr-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204328" version="1" comment="mozilla-nspr-32bit is &lt;4.10.9-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204329" version="1" comment="MozillaFirefox-translations is &lt;38.3.0esr-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204330" version="1" comment="MozillaFirefox-branding-SLED is &lt;38-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204331" version="1" comment="MozillaFirefox-translations is &lt;38.4.0esr-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204332" version="1" comment="libfreebl3 is &lt;3.19.2.1-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204333" version="1" comment="libfreebl3-32bit is &lt;3.19.2.1-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204334" version="1" comment="libsoftokn3 is &lt;3.19.2.1-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204335" version="1" comment="libsoftokn3-32bit is &lt;3.19.2.1-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204336" version="1" comment="mozilla-nspr-32bit is &lt;4.10.10-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204337" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.1-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204338" version="1" comment="mozilla-nss-tools is &lt;3.19.2.1-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204339" version="1" comment="MozillaFirefox is &lt;24.2.0esr-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204340" version="1" comment="MozillaFirefox-translations is &lt;24.2.0esr-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204341" version="1" comment="libfreebl3 is &lt;3.15.3.1-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204342" version="1" comment="libfreebl3-32bit is &lt;3.15.3.1-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204343" version="1" comment="libsoftokn3 is &lt;3.15.3.1-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204344" version="1" comment="libsoftokn3-32bit is &lt;3.15.3.1-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204345" version="1" comment="mozilla-nss is &lt;3.15.3.1-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204346" version="1" comment="mozilla-nss-32bit is &lt;3.15.3.1-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204347" version="1" comment="mozilla-nss-tools is &lt;3.15.3.1-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204348" version="1" comment="MozillaFirefox is &lt;31.2.0esr-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204349" version="1" comment="MozillaFirefox-branding-SLED is &lt;31.0-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204350" version="1" comment="MozillaFirefox-translations is &lt;31.2.0esr-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204351" version="1" comment="libfreebl3 is &lt;3.17.2-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204352" version="1" comment="libfreebl3-32bit is &lt;3.17.2-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204353" version="1" comment="libsoftokn3 is &lt;3.17.2-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204354" version="1" comment="libsoftokn3-32bit is &lt;3.17.2-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204355" version="1" comment="mozilla-nss is &lt;3.17.2-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204356" version="1" comment="mozilla-nss-32bit is &lt;3.17.2-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204357" version="1" comment="mozilla-nss-tools is &lt;3.17.2-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204358" version="1" comment="MozillaFirefox-branding-SLED is &lt;31.0-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204359" version="1" comment="MozillaFirefox-translations is &lt;38.2.1esr-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204360" version="1" comment="libfreebl3 is &lt;3.19.2.0-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204361" version="1" comment="libfreebl3-32bit is &lt;3.19.2.0-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204362" version="1" comment="libsoftokn3 is &lt;3.19.2.0-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204363" version="1" comment="libsoftokn3-32bit is &lt;3.19.2.0-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204364" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.0-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204365" version="1" comment="mozilla-nss-tools is &lt;3.19.2.0-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204366" version="1" comment="flash-player is &lt;11.2.202.418-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204367" version="1" comment="flash-player-gnome is &lt;11.2.202.418-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204368" version="1" comment="flash-player-kde4 is &lt;11.2.202.418-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204369" version="1" comment="flash-player is &lt;11.2.202.481-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204370" version="1" comment="flash-player-gnome is &lt;11.2.202.481-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204371" version="1" comment="flash-player-kde4 is &lt;11.2.202.481-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204372" version="1" comment="flash-player is &lt;11.2.202.491-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204373" version="1" comment="flash-player-gnome is &lt;11.2.202.491-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204374" version="1" comment="flash-player-kde4 is &lt;11.2.202.491-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204375" version="1" comment="flash-player is &lt;11.2.202.508-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204376" version="1" comment="flash-player-gnome is &lt;11.2.202.508-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204377" version="1" comment="flash-player-kde4 is &lt;11.2.202.508-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204378" version="1" comment="flash-player is &lt;11.2.202.521-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204379" version="1" comment="flash-player-gnome is &lt;11.2.202.521-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204380" version="1" comment="flash-player-kde4 is &lt;11.2.202.521-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204381" version="1" comment="flash-player is &lt;11.2.202.535-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204382" version="1" comment="flash-player-gnome is &lt;11.2.202.535-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204383" version="1" comment="flash-player-kde4 is &lt;11.2.202.535-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204384" version="1" comment="flash-player is &lt;11.2.202.540-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204385" version="1" comment="flash-player-gnome is &lt;11.2.202.540-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204386" version="1" comment="flash-player-kde4 is &lt;11.2.202.540-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204387" version="1" comment="flash-player is &lt;11.2.202.548-0.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204388" version="1" comment="flash-player-gnome is &lt;11.2.202.548-0.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204389" version="1" comment="flash-player-kde4 is &lt;11.2.202.548-0.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204390" version="1" comment="flash-player is &lt;11.2.202.554-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204391" version="1" comment="flash-player-gnome is &lt;11.2.202.554-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204392" version="1" comment="flash-player-kde4 is &lt;11.2.202.554-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204393" version="1" comment="flash-player is &lt;11.2.202.559-0.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204394" version="1" comment="flash-player-gnome is &lt;11.2.202.559-0.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204395" version="1" comment="flash-player-kde4 is &lt;11.2.202.559-0.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204396" version="1" comment="foomatic-filters is &lt;3.0.2-269.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204397" version="1" comment="freetype2 is &lt;2.3.7-25.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204398" version="1" comment="freetype2-32bit is &lt;2.3.7-25.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204399" version="1" comment="ft2demos is &lt;2.3.7-25.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204400" version="1" comment="giflib-32bit is &lt;4.1.6-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204401" version="1" comment="glibc is &lt;2.11.3-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204402" version="1" comment="glibc-32bit is &lt;2.11.3-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204403" version="1" comment="glibc-devel is &lt;2.11.3-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204404" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204405" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204406" version="1" comment="glibc-locale is &lt;2.11.3-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204407" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204408" version="1" comment="nscd is &lt;2.11.3-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204409" version="1" comment="glibc-32bit is &lt;2.11.3-17.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204410" version="1" comment="glibc-devel is &lt;2.11.3-17.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204411" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204412" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204413" version="1" comment="glibc-locale is &lt;2.11.3-17.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204414" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204415" version="1" comment="nscd is &lt;2.11.3-17.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204416" version="1" comment="glibc-32bit is &lt;2.11.3-17.95" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204417" version="1" comment="glibc-devel is &lt;2.11.3-17.95" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204418" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.95" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204419" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.95" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204420" version="1" comment="glibc-locale is &lt;2.11.3-17.95" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204421" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.95" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204422" version="1" comment="nscd is &lt;2.11.3-17.95" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204423" version="1" comment="gnutls is &lt;2.4.1-24.39.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204424" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204425" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204426" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204427" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204428" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204429" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204430" version="1" comment="gpg2 is &lt;2.0.9-25.33.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204431" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204432" version="1" comment="grub2 is &lt;2.00-0.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204433" version="1" comment="grub2-x86_64-efi is &lt;2.00-0.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204434" version="1" comment="grub2-x86_64-xen is &lt;2.00-0.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204435" version="1" comment="gstreamer-0_10-plugins-bad is &lt;0.10.22-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204436" version="1" comment="gstreamer-0_10-plugins-bad-lang is &lt;0.10.22-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204437" version="1" comment="libgstbasecamerabinsrc-0_10-0 is &lt;0.10.22-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204438" version="1" comment="libgstbasecamerabinsrc-0_10-0-32bit is &lt;0.10.22-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204439" version="1" comment="libgstbasevideo-0_10-0 is &lt;0.10.22-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204440" version="1" comment="libgstbasevideo-0_10-0-32bit is &lt;0.10.22-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204441" version="1" comment="libgstphotography-0_10-0 is &lt;0.10.22-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204442" version="1" comment="libgstphotography-0_10-0-32bit is &lt;0.10.22-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204443" version="1" comment="libgstsignalprocessor-0_10-0 is &lt;0.10.22-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204444" version="1" comment="libgstsignalprocessor-0_10-0-32bit is &lt;0.10.22-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204445" version="1" comment="libgstvdp-0_10-0 is &lt;0.10.22-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204446" version="1" comment="libgstvdp-0_10-0-32bit is &lt;0.10.22-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204447" version="1" comment="gtk2-32bit is &lt;2.18.9-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204448" version="1" comment="gtk2-lang is &lt;2.18.9-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204449" version="1" comment="gtk2-32bit is &lt;2.18.9-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204450" version="1" comment="gtk2-lang is &lt;2.18.9-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204451" version="1" comment="icedtea-web is &lt;1.4.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204452" version="1" comment="libicu is &lt;4.0-7.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204453" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.71-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204454" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.71-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204455" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.71-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204456" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.85-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204457" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.85-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204458" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.85-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204459" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.91-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204460" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.91-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204461" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.91-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204462" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.95-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204463" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.95-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204464" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.95-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204465" version="1" comment="kde4-l10n-ar is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204466" version="1" comment="kde4-l10n-cs is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204467" version="1" comment="kde4-l10n-da is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204468" version="1" comment="kde4-l10n-da-data is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204469" version="1" comment="kde4-l10n-da-doc is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204470" version="1" comment="kde4-l10n-de is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204471" version="1" comment="kde4-l10n-en_GB is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204472" version="1" comment="kde4-l10n-es is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204473" version="1" comment="kde4-l10n-es-data is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204474" version="1" comment="kde4-l10n-es-doc is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204475" version="1" comment="kde4-l10n-fr is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204476" version="1" comment="kde4-l10n-fr-data is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204477" version="1" comment="kde4-l10n-fr-doc is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204478" version="1" comment="kde4-l10n-hu is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204479" version="1" comment="kde4-l10n-it is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204480" version="1" comment="kde4-l10n-it-data is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204481" version="1" comment="kde4-l10n-it-doc is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204482" version="1" comment="kde4-l10n-ja is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204483" version="1" comment="kde4-l10n-ko is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204484" version="1" comment="kde4-l10n-nb is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204485" version="1" comment="kde4-l10n-nl is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204486" version="1" comment="kde4-l10n-nl-data is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204487" version="1" comment="kde4-l10n-nl-doc is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204488" version="1" comment="kde4-l10n-pl is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204489" version="1" comment="kde4-l10n-pl-data is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204490" version="1" comment="kde4-l10n-pl-doc is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204491" version="1" comment="kde4-l10n-pt is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204492" version="1" comment="kde4-l10n-pt_BR is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204493" version="1" comment="kde4-l10n-pt_BR-data is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204494" version="1" comment="kde4-l10n-pt_BR-doc is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204495" version="1" comment="kde4-l10n-ru is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204496" version="1" comment="kde4-l10n-ru-data is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204497" version="1" comment="kde4-l10n-ru-doc is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204498" version="1" comment="kde4-l10n-sv is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204499" version="1" comment="kde4-l10n-sv-data is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204500" version="1" comment="kde4-l10n-sv-doc is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204501" version="1" comment="kde4-l10n-zh_CN is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204502" version="1" comment="kde4-l10n-zh_TW is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204503" version="1" comment="kdebase4-runtime-xine is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204504" version="1" comment="kde4-kgreeter-plugins is &lt;4.3.5-0.12.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204505" version="1" comment="kdebase4-wallpapers is &lt;4.3.5-0.11.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204506" version="1" comment="kdebase4-workspace-ksysguardd is &lt;4.3.5-0.12.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204507" version="1" comment="kdm is &lt;4.3.5-0.12.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204508" version="1" comment="kwin is &lt;4.3.5-0.12.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204509" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.55" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204510" version="1" comment="kernel-default is &lt;3.0.101-0.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204511" version="1" comment="kernel-default-base is &lt;3.0.101-0.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204512" version="1" comment="kernel-default-devel is &lt;3.0.101-0.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204513" version="1" comment="kernel-default-extra is &lt;3.0.101-0.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204514" version="1" comment="kernel-pae is &lt;3.0.101-0.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204515" version="1" comment="kernel-pae-base is &lt;3.0.101-0.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204516" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204517" version="1" comment="kernel-pae-extra is &lt;3.0.101-0.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204518" version="1" comment="kernel-source is &lt;3.0.101-0.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204519" version="1" comment="kernel-syms is &lt;3.0.101-0.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204520" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204521" version="1" comment="kernel-xen is &lt;3.0.101-0.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204522" version="1" comment="kernel-xen-base is &lt;3.0.101-0.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204523" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204524" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204525" version="1" comment="xen-kmp-default is &lt;4.2.4_04_3.0.101_0.40-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204526" version="1" comment="xen-kmp-pae is &lt;4.2.4_04_3.0.101_0.40-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204527" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.67" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204528" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.67" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204529" version="1" comment="kernel-default is &lt;3.0.101-0.47.67" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204530" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.67" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204531" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.67" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204532" version="1" comment="kernel-default-extra is &lt;3.0.101-0.47.67" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204533" version="1" comment="kernel-pae is &lt;3.0.101-0.47.67" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204534" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.67" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204535" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.67" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204536" version="1" comment="kernel-pae-extra is &lt;3.0.101-0.47.67" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204537" version="1" comment="kernel-source is &lt;3.0.101-0.47.67" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204538" version="1" comment="kernel-syms is &lt;3.0.101-0.47.67" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204539" version="1" comment="kernel-trace is &lt;3.0.101-0.47.67" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204540" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.67" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204541" version="1" comment="kernel-xen is &lt;3.0.101-0.47.67" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204542" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.67" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204543" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.67" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204544" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.47.67" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204545" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204546" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204547" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204548" version="1" comment="kernel-default is &lt;3.0.101-0.47.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204549" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204550" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204551" version="1" comment="kernel-default-extra is &lt;3.0.101-0.47.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204552" version="1" comment="kernel-pae is &lt;3.0.101-0.47.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204553" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204554" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204555" version="1" comment="kernel-pae-extra is &lt;3.0.101-0.47.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204556" version="1" comment="kernel-source is &lt;3.0.101-0.47.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204557" version="1" comment="kernel-syms is &lt;3.0.101-0.47.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204558" version="1" comment="kernel-trace is &lt;3.0.101-0.47.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204559" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204560" version="1" comment="kernel-xen is &lt;3.0.101-0.47.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204561" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204562" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204563" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.47.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204564" version="1" comment="krb5 is &lt;1.6.3-133.49.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204565" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204566" version="1" comment="krb5-client is &lt;1.6.3-133.49.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204567" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204568" version="1" comment="krb5-client is &lt;1.6.3-133.49.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204569" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204570" version="1" comment="krb5-client is &lt;1.6.3-133.49.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204571" version="1" comment="krb5 is &lt;1.6.3-133.49.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204572" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204573" version="1" comment="krb5-client is &lt;1.6.3-133.49.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204574" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204575" version="1" comment="krb5-client is &lt;1.6.3-133.49.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204576" version="1" comment="kvm is &lt;1.4.2-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204577" version="1" comment="kvm is &lt;1.4.2-0.22.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204578" version="1" comment="kvm is &lt;1.4.2-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204579" version="1" comment="kvm is &lt;1.4.2-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204580" version="1" comment="libvirt is &lt;1.0.5.9-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204581" version="1" comment="libvirt-client is &lt;1.0.5.9-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204582" version="1" comment="libvirt-client-32bit is &lt;1.0.5.9-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204583" version="1" comment="libvirt-doc is &lt;1.0.5.9-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204584" version="1" comment="libvirt-python is &lt;1.0.5.9-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204585" version="1" comment="lcms2 is &lt;2.5-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204586" version="1" comment="liblcms2-2 is &lt;2.5-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204587" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204588" version="1" comment="libqt4 is &lt;4.6.3-5.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204589" version="1" comment="libqt4-32bit is &lt;4.6.3-5.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204590" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204591" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204592" version="1" comment="libqt4-sql is &lt;4.6.3-5.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204593" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204594" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204595" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204596" version="1" comment="libqt4-x11 is &lt;4.6.3-5.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204597" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204598" version="1" comment="util-linux is &lt;2.19.1-6.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204599" version="1" comment="util-linux-lang is &lt;2.19.1-6.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204600" version="1" comment="libecpg6 is &lt;9.1.12-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204601" version="1" comment="libpq5 is &lt;9.1.12-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204602" version="1" comment="libpq5-32bit is &lt;9.1.12-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204603" version="1" comment="postgresql91 is &lt;9.1.12-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204604" version="1" comment="postgresql91-docs is &lt;9.1.12-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204605" version="1" comment="libfreebl3 is &lt;3.16.5-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204606" version="1" comment="libfreebl3-32bit is &lt;3.16.5-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204607" version="1" comment="libsoftokn3 is &lt;3.16.5-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204608" version="1" comment="libsoftokn3-32bit is &lt;3.16.5-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204609" version="1" comment="mozilla-nss is &lt;3.16.5-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204610" version="1" comment="mozilla-nss-32bit is &lt;3.16.5-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204611" version="1" comment="mozilla-nss-tools is &lt;3.16.5-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204612" version="1" comment="libgcrypt11 is &lt;1.5.0-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204613" version="1" comment="libgcrypt11-32bit is &lt;1.5.0-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204614" version="1" comment="libjasper is &lt;1.900.1-134.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204615" version="1" comment="libjasper-32bit is &lt;1.900.1-134.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204616" version="1" comment="libmspack0 is &lt;0.0.20060920alpha-74.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204617" version="1" comment="libmysql55client18 is &lt;5.5.39-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204618" version="1" comment="libmysql55client18-32bit is &lt;5.5.39-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204619" version="1" comment="libmysql55client_r18 is &lt;5.5.39-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204620" version="1" comment="mysql is &lt;5.5.39-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204621" version="1" comment="mysql-client is &lt;5.5.39-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204622" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204623" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204624" version="1" comment="openssl is &lt;0.9.8j-0.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204625" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204626" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204627" version="1" comment="libpulse-browse0 is &lt;0.9.23-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204628" version="1" comment="libpulse-mainloop-glib0 is &lt;0.9.23-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204629" version="1" comment="libpulse0 is &lt;0.9.23-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204630" version="1" comment="libpulse0-32bit is &lt;0.9.23-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204631" version="1" comment="pulseaudio is &lt;0.9.23-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204632" version="1" comment="pulseaudio-esound-compat is &lt;0.9.23-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204633" version="1" comment="pulseaudio-gdm-hooks is &lt;0.9.23-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204634" version="1" comment="pulseaudio-lang is &lt;0.9.23-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204635" version="1" comment="pulseaudio-module-bluetooth is &lt;0.9.23-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204636" version="1" comment="pulseaudio-module-gconf is &lt;0.9.23-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204637" version="1" comment="pulseaudio-module-jack is &lt;0.9.23-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204638" version="1" comment="pulseaudio-module-lirc is &lt;0.9.23-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204639" version="1" comment="pulseaudio-module-x11 is &lt;0.9.23-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204640" version="1" comment="pulseaudio-module-zeroconf is &lt;0.9.23-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204641" version="1" comment="pulseaudio-utils is &lt;0.9.23-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204642" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204643" version="1" comment="libqt4 is &lt;4.6.3-5.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204644" version="1" comment="libqt4-32bit is &lt;4.6.3-5.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204645" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204646" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204647" version="1" comment="libqt4-sql is &lt;4.6.3-5.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204648" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204649" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204650" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204651" version="1" comment="libqt4-x11 is &lt;4.6.3-5.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204652" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204653" version="1" comment="librsvg-32bit is &lt;2.26.0-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204654" version="1" comment="rsvg-view is &lt;2.26.0-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204655" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204656" version="1" comment="libtasn1 is &lt;1.5-1.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204657" version="1" comment="libtasn1-3 is &lt;1.5-1.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204658" version="1" comment="libtasn1-3-32bit is &lt;1.5-1.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204659" version="1" comment="libvdpau is &lt;0.4.1-16.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204660" version="1" comment="libvdpau1 is &lt;0.4.1-16.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204661" version="1" comment="libvdpau1-32bit is &lt;0.4.1-16.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204662" version="1" comment="libvirt is &lt;1.0.5.9-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204663" version="1" comment="libvirt-client is &lt;1.0.5.9-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204664" version="1" comment="libvirt-client-32bit is &lt;1.0.5.9-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204665" version="1" comment="libvirt-doc is &lt;1.0.5.9-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204666" version="1" comment="libvirt-python is &lt;1.0.5.9-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204667" version="1" comment="libxml2-python is &lt;2.7.6-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204668" version="1" comment="libxml2-32bit is &lt;2.7.6-0.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204669" version="1" comment="libxml2-python is &lt;2.7.6-0.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204670" version="1" comment="libxml2-32bit is &lt;2.7.6-0.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204671" version="1" comment="libxml2-python is &lt;2.7.6-0.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204672" version="1" comment="mailx is &lt;12.5-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204673" version="1" comment="MozillaFirefox-branding-SLED is &lt;38-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204674" version="1" comment="MozillaFirefox-translations is &lt;38.6.0esr-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204675" version="1" comment="libfreebl3 is &lt;3.20.2-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204676" version="1" comment="libfreebl3-32bit is &lt;3.20.2-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204677" version="1" comment="libsoftokn3 is &lt;3.20.2-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204678" version="1" comment="libsoftokn3-32bit is &lt;3.20.2-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204679" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204680" version="1" comment="mozilla-nss-tools is &lt;3.20.2-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204681" version="1" comment="mozilla-nspr-32bit is &lt;4.10.8-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204682" version="1" comment="libfreebl3 is &lt;3.19.2.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204683" version="1" comment="libfreebl3-32bit is &lt;3.19.2.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204684" version="1" comment="libsoftokn3 is &lt;3.19.2.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204685" version="1" comment="libsoftokn3-32bit is &lt;3.19.2.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204686" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204687" version="1" comment="mozilla-nss-tools is &lt;3.19.2.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204688" version="1" comment="libfreebl3 is &lt;3.15.2-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204689" version="1" comment="libfreebl3-32bit is &lt;3.15.2-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204690" version="1" comment="libsoftokn3 is &lt;3.15.2-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204691" version="1" comment="libsoftokn3-32bit is &lt;3.15.2-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204692" version="1" comment="mozilla-nss is &lt;3.15.2-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204693" version="1" comment="mozilla-nss-32bit is &lt;3.15.2-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204694" version="1" comment="mozilla-nss-tools is &lt;3.15.2-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204695" version="1" comment="mutt is &lt;1.5.17-42.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204696" version="1" comment="libmysql55client18 is &lt;5.5.45-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204697" version="1" comment="libmysql55client18-32bit is &lt;5.5.45-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204698" version="1" comment="libmysql55client_r18 is &lt;5.5.45-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204699" version="1" comment="mysql-client is &lt;5.5.45-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204700" version="1" comment="libmysql55client18 is &lt;5.5.46-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204701" version="1" comment="libmysql55client18-32bit is &lt;5.5.46-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204702" version="1" comment="libmysql55client_r18 is &lt;5.5.46-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204703" version="1" comment="mysql-client is &lt;5.5.46-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204704" version="1" comment="libmysql55client18 is &lt;5.5.47-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204705" version="1" comment="libmysql55client18-32bit is &lt;5.5.47-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204706" version="1" comment="libmysql55client_r18 is &lt;5.5.47-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204707" version="1" comment="mysql-client is &lt;5.5.47-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204708" version="1" comment="libsnmp15 is &lt;5.4.2.1-8.12.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204709" version="1" comment="perl-SNMP is &lt;5.4.2.1-8.12.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204710" version="1" comment="snmp-mibs is &lt;5.4.2.1-8.12.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204711" version="1" comment="novell-qtgui is &lt;3.0.0-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204712" version="1" comment="novell-qtgui-cli is &lt;3.0.0-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204713" version="1" comment="novell-ui-base is &lt;3.0.0-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204714" version="1" comment="libfreebl3 is &lt;3.15.3-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204715" version="1" comment="libfreebl3-32bit is &lt;3.15.3-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204716" version="1" comment="libsoftokn3 is &lt;3.15.3-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204717" version="1" comment="libsoftokn3-32bit is &lt;3.15.3-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204718" version="1" comment="mozilla-nss is &lt;3.15.3-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204719" version="1" comment="mozilla-nss-32bit is &lt;3.15.3-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204720" version="1" comment="mozilla-nss-tools is &lt;3.15.3-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204721" version="1" comment="ntp is &lt;4.2.4p8-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204722" version="1" comment="ntp-doc is &lt;4.2.4p8-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204723" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204724" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204725" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204726" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204727" version="1" comment="openssh is &lt;6.2p2-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204728" version="1" comment="openssh-askpass is &lt;6.2p2-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204729" version="1" comment="openssh-askpass-gnome is &lt;6.2p2-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204730" version="1" comment="openssh is &lt;6.2p2-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204731" version="1" comment="openssh-askpass is &lt;6.2p2-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204732" version="1" comment="openssh-askpass-gnome is &lt;6.2p2-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204733" version="1" comment="openssh is &lt;6.2p2-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204734" version="1" comment="openssh-askpass is &lt;6.2p2-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204735" version="1" comment="openssh-askpass-gnome is &lt;6.2p2-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204736" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204737" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204738" version="1" comment="openssl-certs is &lt;1.97-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204739" version="1" comment="openvpn is &lt;2.0.9-143.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204740" version="1" comment="orca is &lt;2.28.3-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204741" version="1" comment="orca-lang is &lt;2.28.3-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204742" version="1" comment="pam is &lt;1.1.5-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204743" version="1" comment="pam-32bit is &lt;1.1.5-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204744" version="1" comment="pam-doc is &lt;1.1.5-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204745" version="1" comment="perl is &lt;5.10.0-64.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204746" version="1" comment="perl-32bit is &lt;5.10.0-64.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204747" version="1" comment="perl-Module-Build is &lt;0.2808.01-0.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204748" version="1" comment="perl-Test-Simple is &lt;0.72-0.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204749" version="1" comment="perl-base is &lt;5.10.0-64.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204750" version="1" comment="perl-doc is &lt;5.10.0-64.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204751" version="1" comment="popt is &lt;1.7-37.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204752" version="1" comment="popt-32bit is &lt;1.7-37.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204753" version="1" comment="rpm is &lt;4.4.2.3-37.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204754" version="1" comment="libecpg6 is &lt;9.4.5-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204755" version="1" comment="libpq5 is &lt;9.4.5-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204756" version="1" comment="libpq5-32bit is &lt;9.4.5-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204757" version="1" comment="postgresql94 is &lt;9.4.5-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204758" version="1" comment="postgresql94-docs is &lt;9.4.5-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204759" version="1" comment="libecpg6 is &lt;9.1.15-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204760" version="1" comment="libpq5 is &lt;9.1.15-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204761" version="1" comment="libpq5-32bit is &lt;9.1.15-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204762" version="1" comment="postgresql91 is &lt;9.1.15-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204763" version="1" comment="postgresql91-docs is &lt;9.1.15-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204764" version="1" comment="postgresql91 is &lt;9.1.18-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204765" version="1" comment="postgresql91-docs is &lt;9.1.18-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204766" version="1" comment="postgresql91 is &lt;9.1.19-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204767" version="1" comment="postgresql91-docs is &lt;9.1.19-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204768" version="1" comment="puppet is &lt;2.6.18-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204769" version="1" comment="pwlib-plugins-avc is &lt;1.10.10-120.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204770" version="1" comment="pwlib-plugins-dc is &lt;1.10.10-120.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204771" version="1" comment="pwlib-plugins-v4l2 is &lt;1.10.10-120.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204772" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204773" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204774" version="1" comment="python is &lt;2.6.9-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204775" version="1" comment="python-base is &lt;2.6.9-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204776" version="1" comment="python-base-32bit is &lt;2.6.9-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204777" version="1" comment="python-curses is &lt;2.6.9-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204778" version="1" comment="python-xml is &lt;2.6.9-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204779" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204780" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204781" version="1" comment="python is &lt;2.6.9-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204782" version="1" comment="python-base is &lt;2.6.9-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204783" version="1" comment="python-base-32bit is &lt;2.6.9-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204784" version="1" comment="python-curses is &lt;2.6.9-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204785" version="1" comment="python-xml is &lt;2.6.9-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204786" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204787" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204788" version="1" comment="python is &lt;2.6.9-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204789" version="1" comment="python-base is &lt;2.6.9-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204790" version="1" comment="python-base-32bit is &lt;2.6.9-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204791" version="1" comment="python-curses is &lt;2.6.9-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204792" version="1" comment="python-xml is &lt;2.6.9-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204793" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204794" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204795" version="1" comment="python is &lt;2.6.9-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204796" version="1" comment="python-base is &lt;2.6.9-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204797" version="1" comment="python-base-32bit is &lt;2.6.9-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204798" version="1" comment="python-curses is &lt;2.6.9-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204799" version="1" comment="python-xml is &lt;2.6.9-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204800" version="1" comment="python-pywbem is &lt;0.7-6.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204801" version="1" comment="rpcbind is &lt;0.1.6+git20080930-6.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204802" version="1" comment="rsync is &lt;3.0.4-2.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204803" version="1" comment="ruby is &lt;1.8.7.p357-0.9.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204804" version="1" comment="libldb1 is &lt;3.6.3-0.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204805" version="1" comment="libldb1-32bit is &lt;3.6.3-0.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204806" version="1" comment="libsmbclient0 is &lt;3.6.3-0.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204807" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204808" version="1" comment="libtalloc2 is &lt;3.6.3-0.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204809" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204810" version="1" comment="libtdb1 is &lt;3.6.3-0.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204811" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204812" version="1" comment="libtevent0 is &lt;3.6.3-0.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204813" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204814" version="1" comment="libwbclient0 is &lt;3.6.3-0.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204815" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204816" version="1" comment="samba is &lt;3.6.3-0.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204817" version="1" comment="samba-32bit is &lt;3.6.3-0.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204818" version="1" comment="samba-client is &lt;3.6.3-0.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204819" version="1" comment="samba-client-32bit is &lt;3.6.3-0.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204820" version="1" comment="samba-doc is &lt;3.6.3-0.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204821" version="1" comment="samba-krb-printing is &lt;3.6.3-0.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204822" version="1" comment="samba-winbind is &lt;3.6.3-0.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204823" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204824" version="1" comment="libldb1 is &lt;3.6.3-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204825" version="1" comment="libldb1-32bit is &lt;3.6.3-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204826" version="1" comment="libsmbclient0 is &lt;3.6.3-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204827" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204828" version="1" comment="libtalloc2 is &lt;3.6.3-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204829" version="1" comment="libtalloc2-32bit is &lt;3.6.3-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204830" version="1" comment="libtdb1 is &lt;3.6.3-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204831" version="1" comment="libtdb1-32bit is &lt;3.6.3-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204832" version="1" comment="libtevent0 is &lt;3.6.3-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204833" version="1" comment="libtevent0-32bit is &lt;3.6.3-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204834" version="1" comment="libwbclient0 is &lt;3.6.3-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204835" version="1" comment="libwbclient0-32bit is &lt;3.6.3-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204836" version="1" comment="samba-32bit is &lt;3.6.3-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204837" version="1" comment="samba-client is &lt;3.6.3-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204838" version="1" comment="samba-client-32bit is &lt;3.6.3-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204839" version="1" comment="samba-doc is &lt;3.6.3-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204840" version="1" comment="samba-krb-printing is &lt;3.6.3-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204841" version="1" comment="samba-winbind is &lt;3.6.3-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204842" version="1" comment="samba-winbind-32bit is &lt;3.6.3-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204843" version="1" comment="sblim-sfcb is &lt;1.3.11-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204844" version="1" comment="strongswan is &lt;4.4.0-6.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204845" version="1" comment="strongswan-doc is &lt;4.4.0-6.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204846" version="1" comment="sudo is &lt;1.7.6p2-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204847" version="1" comment="suseRegister is &lt;1.4-1.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204848" version="1" comment="libtiff3 is &lt;3.8.2-141.160" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204849" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.160" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204850" version="1" comment="vorbis-tools is &lt;1.1.1-174" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204851" version="1" comment="wpa_supplicant-gui is &lt;0.7.1-6.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204852" version="1" comment="wpa_supplicant is &lt;0.7.1-6.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204853" version="1" comment="wpa_supplicant-gui is &lt;0.7.1-6.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204854" version="1" comment="xen is &lt;4.2.5_06-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204855" version="1" comment="xen-doc-html is &lt;4.2.5_06-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204856" version="1" comment="xen-doc-pdf is &lt;4.2.5_06-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204857" version="1" comment="xen-kmp-default is &lt;4.2.5_06_3.0.101_0.47.52-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204858" version="1" comment="xen-kmp-pae is &lt;4.2.5_06_3.0.101_0.47.52-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204859" version="1" comment="xen-libs is &lt;4.2.5_06-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204860" version="1" comment="xen-libs-32bit is &lt;4.2.5_06-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204861" version="1" comment="xen-tools is &lt;4.2.5_06-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204862" version="1" comment="xen-tools-domU is &lt;4.2.5_06-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204863" version="1" comment="xen is &lt;4.2.5_02-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204864" version="1" comment="xen-doc-html is &lt;4.2.5_02-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204865" version="1" comment="xen-doc-pdf is &lt;4.2.5_02-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204866" version="1" comment="xen-kmp-default is &lt;4.2.5_02_3.0.101_0.40-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204867" version="1" comment="xen-libs is &lt;4.2.5_02-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204868" version="1" comment="xen-libs-32bit is &lt;4.2.5_02-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204869" version="1" comment="xen-tools is &lt;4.2.5_02-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204870" version="1" comment="xen-tools-domU is &lt;4.2.5_02-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204871" version="1" comment="xen-doc-html is &lt;4.2.5_12-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204872" version="1" comment="xen-doc-pdf is &lt;4.2.5_12-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204873" version="1" comment="xen-kmp-default is &lt;4.2.5_12_3.0.101_0.47.55-15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204874" version="1" comment="xen-kmp-pae is &lt;4.2.5_12_3.0.101_0.47.55-15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204875" version="1" comment="xen-libs is &lt;4.2.5_12-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204876" version="1" comment="xen-libs-32bit is &lt;4.2.5_12-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204877" version="1" comment="xen-tools is &lt;4.2.5_12-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204878" version="1" comment="xen-tools-domU is &lt;4.2.5_12-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204879" version="1" comment="xen-doc-html is &lt;4.2.5_14-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204880" version="1" comment="xen-doc-pdf is &lt;4.2.5_14-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204881" version="1" comment="xen-kmp-default is &lt;4.2.5_14_3.0.101_0.47.67-18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204882" version="1" comment="xen-kmp-pae is &lt;4.2.5_14_3.0.101_0.47.67-18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204883" version="1" comment="xen-libs is &lt;4.2.5_14-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204884" version="1" comment="xen-libs-32bit is &lt;4.2.5_14-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204885" version="1" comment="xen-tools is &lt;4.2.5_14-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204886" version="1" comment="xen-tools-domU is &lt;4.2.5_14-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204887" version="1" comment="xen is &lt;4.2.2_06-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204888" version="1" comment="xen-doc-html is &lt;4.2.2_06-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204889" version="1" comment="xen-doc-pdf is &lt;4.2.2_06-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204890" version="1" comment="xen-kmp-default is &lt;4.2.2_06_3.0.82_0.7-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204891" version="1" comment="xen-kmp-pae is &lt;4.2.2_06_3.0.82_0.7-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204892" version="1" comment="xen-libs is &lt;4.2.2_06-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204893" version="1" comment="xen-libs-32bit is &lt;4.2.2_06-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204894" version="1" comment="xen-tools is &lt;4.2.2_06-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204895" version="1" comment="xen-tools-domU is &lt;4.2.2_06-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204896" version="1" comment="xen is &lt;4.2.3_02-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204897" version="1" comment="xen-doc-html is &lt;4.2.3_02-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204898" version="1" comment="xen-doc-pdf is &lt;4.2.3_02-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204899" version="1" comment="xen-kmp-default is &lt;4.2.3_02_3.0.93_0.8-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204900" version="1" comment="xen-kmp-pae is &lt;4.2.3_02_3.0.93_0.8-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204901" version="1" comment="xen-libs is &lt;4.2.3_02-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204902" version="1" comment="xen-libs-32bit is &lt;4.2.3_02-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204903" version="1" comment="xen-tools is &lt;4.2.3_02-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204904" version="1" comment="xen-tools-domU is &lt;4.2.3_02-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204905" version="1" comment="xen is &lt;4.2.3_08-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204906" version="1" comment="xen-doc-html is &lt;4.2.3_08-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204907" version="1" comment="xen-doc-pdf is &lt;4.2.3_08-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204908" version="1" comment="xen-kmp-default is &lt;4.2.3_08_3.0.101_0.8-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204909" version="1" comment="xen-kmp-pae is &lt;4.2.3_08_3.0.101_0.8-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204910" version="1" comment="xen-libs is &lt;4.2.3_08-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204911" version="1" comment="xen-libs-32bit is &lt;4.2.3_08-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204912" version="1" comment="xen-tools is &lt;4.2.3_08-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204913" version="1" comment="xen-tools-domU is &lt;4.2.3_08-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204914" version="1" comment="xen is &lt;4.2.4_02-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204915" version="1" comment="xen-doc-html is &lt;4.2.4_02-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204916" version="1" comment="xen-doc-pdf is &lt;4.2.4_02-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204917" version="1" comment="xen-kmp-default is &lt;4.2.4_02_3.0.101_0.15-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204918" version="1" comment="xen-kmp-pae is &lt;4.2.4_02_3.0.101_0.15-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204919" version="1" comment="xen-libs is &lt;4.2.4_02-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204920" version="1" comment="xen-libs-32bit is &lt;4.2.4_02-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204921" version="1" comment="xen-tools is &lt;4.2.4_02-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204922" version="1" comment="xen-tools-domU is &lt;4.2.4_02-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204923" version="1" comment="xen is &lt;4.2.4_04-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204924" version="1" comment="xen-doc-html is &lt;4.2.4_04-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204925" version="1" comment="xen-doc-pdf is &lt;4.2.4_04-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204926" version="1" comment="xen-kmp-default is &lt;4.2.4_04_3.0.101_0.40-0.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204927" version="1" comment="xen-kmp-pae is &lt;4.2.4_04_3.0.101_0.40-0.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204928" version="1" comment="xen-libs is &lt;4.2.4_04-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204929" version="1" comment="xen-libs-32bit is &lt;4.2.4_04-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204930" version="1" comment="xen-tools is &lt;4.2.4_04-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204931" version="1" comment="xen-tools-domU is &lt;4.2.4_04-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204932" version="1" comment="xen is &lt;4.2.5_04-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204933" version="1" comment="xen-doc-html is &lt;4.2.5_04-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204934" version="1" comment="xen-doc-pdf is &lt;4.2.5_04-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204935" version="1" comment="xen-kmp-default is &lt;4.2.5_04_3.0.101_0.47.52-0.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204936" version="1" comment="xen-kmp-pae is &lt;4.2.5_04_3.0.101_0.47.52-0.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204937" version="1" comment="xen-libs is &lt;4.2.5_04-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204938" version="1" comment="xen-libs-32bit is &lt;4.2.5_04-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204939" version="1" comment="xen-tools is &lt;4.2.5_04-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204940" version="1" comment="xen-tools-domU is &lt;4.2.5_04-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204941" version="1" comment="xen is &lt;4.2.5_08-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204942" version="1" comment="xen-doc-html is &lt;4.2.5_08-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204943" version="1" comment="xen-doc-pdf is &lt;4.2.5_08-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204944" version="1" comment="xen-kmp-default is &lt;4.2.5_08_3.0.101_0.47.55-0.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204945" version="1" comment="xen-kmp-pae is &lt;4.2.5_08_3.0.101_0.47.55-0.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204946" version="1" comment="xen-libs is &lt;4.2.5_08-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204947" version="1" comment="xen-libs-32bit is &lt;4.2.5_08-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204948" version="1" comment="xen-tools is &lt;4.2.5_08-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204949" version="1" comment="xen-tools-domU is &lt;4.2.5_08-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204950" version="1" comment="xen-doc-html is &lt;4.2.5_18-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204951" version="1" comment="xen-doc-pdf is &lt;4.2.5_18-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204952" version="1" comment="xen-kmp-default is &lt;4.2.5_18_3.0.101_0.47.71-21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204953" version="1" comment="xen-kmp-pae is &lt;4.2.5_18_3.0.101_0.47.71-21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204954" version="1" comment="xen-libs is &lt;4.2.5_18-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204955" version="1" comment="xen-libs-32bit is &lt;4.2.5_18-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204956" version="1" comment="xen-tools is &lt;4.2.5_18-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204957" version="1" comment="xen-tools-domU is &lt;4.2.5_18-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204958" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204959" version="1" comment="xorg-x11-server is &lt;7.4-27.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204960" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204961" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204962" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204963" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204964" version="1" comment="xscreensaver is &lt;5.07-6.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117401" version="1" comment="sled-release is ==11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204965" version="1" comment="MozillaFirefox-translations is &lt;38.6.1esr-34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204966" version="1" comment="MozillaFirefox-translations is &lt;38.7.0esr-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204967" version="1" comment="libfreebl3 is &lt;3.20.2-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204968" version="1" comment="libfreebl3-32bit is &lt;3.20.2-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204969" version="1" comment="libsoftokn3 is &lt;3.20.2-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204970" version="1" comment="libsoftokn3-32bit is &lt;3.20.2-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204971" version="1" comment="mozilla-nspr-32bit is &lt;4.12-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204972" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204973" version="1" comment="mozilla-nss-tools is &lt;3.20.2-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204974" version="1" comment="xen-doc-html is &lt;4.4.2_12-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204975" version="1" comment="xen-kmp-default is &lt;4.4.2_12_3.0.101_63-23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204976" version="1" comment="xen-kmp-pae is &lt;4.4.2_12_3.0.101_63-23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204977" version="1" comment="xen-libs is &lt;4.4.2_12-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204978" version="1" comment="xen-libs-32bit is &lt;4.4.2_12-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204979" version="1" comment="xen-tools is &lt;4.4.2_12-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204980" version="1" comment="xen-tools-domU is &lt;4.4.2_12-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204981" version="1" comment="bind-libs is &lt;9.9.6P1-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204982" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204983" version="1" comment="bind-utils is &lt;9.9.6P1-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204984" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204985" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204986" version="1" comment="fetchmail is &lt;6.3.8.90-13.20.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204987" version="1" comment="flash-player is &lt;11.2.202.569-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204988" version="1" comment="flash-player-gnome is &lt;11.2.202.569-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204989" version="1" comment="flash-player-kde4 is &lt;11.2.202.569-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204990" version="1" comment="flash-player is &lt;11.2.202.577-0.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204991" version="1" comment="flash-player-gnome is &lt;11.2.202.577-0.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204992" version="1" comment="flash-player-kde4 is &lt;11.2.202.577-0.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204993" version="1" comment="libgcc_s1 is &lt;5.3.1+r233831-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204994" version="1" comment="libgcc_s1-32bit is &lt;5.3.1+r233831-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204995" version="1" comment="libgfortran3-32bit is &lt;5.3.1+r233831-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204996" version="1" comment="libgomp1 is &lt;5.3.1+r233831-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204997" version="1" comment="libgomp1-32bit is &lt;5.3.1+r233831-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204998" version="1" comment="libquadmath0-32bit is &lt;5.3.1+r233831-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009204999" version="1" comment="libstdc++6 is &lt;5.3.1+r233831-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205000" version="1" comment="libstdc++6-32bit is &lt;5.3.1+r233831-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205001" version="1" comment="libstdc++6-locale is &lt;5.3.1+r233831-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205002" version="1" comment="grub2 is &lt;2.00-0.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205003" version="1" comment="grub2-x86_64-efi is &lt;2.00-0.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205004" version="1" comment="grub2-x86_64-xen is &lt;2.00-0.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205005" version="1" comment="icedtea-web is &lt;1.5.3-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205006" version="1" comment="libicu is &lt;4.0-7.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205007" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.99-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205008" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.99-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205009" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.99-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205010" version="1" comment="kernel-default is &lt;3.0.101-65" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205011" version="1" comment="kernel-default-base is &lt;3.0.101-65" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205012" version="1" comment="kernel-default-devel is &lt;3.0.101-65" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205013" version="1" comment="kernel-default-extra is &lt;3.0.101-65" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205014" version="1" comment="kernel-pae is &lt;3.0.101-65" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205015" version="1" comment="kernel-pae-base is &lt;3.0.101-65" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205016" version="1" comment="kernel-pae-devel is &lt;3.0.101-65" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205017" version="1" comment="kernel-pae-extra is &lt;3.0.101-65" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205018" version="1" comment="kernel-source is &lt;3.0.101-65" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205019" version="1" comment="kernel-syms is &lt;3.0.101-65" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205020" version="1" comment="kernel-trace is &lt;3.0.101-65" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205021" version="1" comment="kernel-trace-devel is &lt;3.0.101-65" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205022" version="1" comment="kernel-xen is &lt;3.0.101-65" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205023" version="1" comment="kernel-xen-base is &lt;3.0.101-65" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205024" version="1" comment="kernel-xen-devel is &lt;3.0.101-65" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205025" version="1" comment="kernel-xen-extra is &lt;3.0.101-65" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205026" version="1" comment="kernel-default is &lt;3.0.101-71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205027" version="1" comment="kernel-default-base is &lt;3.0.101-71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205028" version="1" comment="kernel-default-devel is &lt;3.0.101-71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205029" version="1" comment="kernel-default-extra is &lt;3.0.101-71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205030" version="1" comment="kernel-pae is &lt;3.0.101-71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205031" version="1" comment="kernel-pae-base is &lt;3.0.101-71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205032" version="1" comment="kernel-pae-devel is &lt;3.0.101-71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205033" version="1" comment="kernel-pae-extra is &lt;3.0.101-71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205034" version="1" comment="kernel-source is &lt;3.0.101-71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205035" version="1" comment="kernel-syms is &lt;3.0.101-71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205036" version="1" comment="kernel-trace is &lt;3.0.101-71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205037" version="1" comment="kernel-trace-devel is &lt;3.0.101-71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205038" version="1" comment="kernel-xen is &lt;3.0.101-71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205039" version="1" comment="kernel-xen-base is &lt;3.0.101-71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205040" version="1" comment="kernel-xen-devel is &lt;3.0.101-71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205041" version="1" comment="kernel-xen-extra is &lt;3.0.101-71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205042" version="1" comment="kernel-default is &lt;3.0.101-68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205043" version="1" comment="kernel-default-base is &lt;3.0.101-68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205044" version="1" comment="kernel-default-devel is &lt;3.0.101-68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205045" version="1" comment="kernel-default-extra is &lt;3.0.101-68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205046" version="1" comment="kernel-pae is &lt;3.0.101-68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205047" version="1" comment="kernel-pae-base is &lt;3.0.101-68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205048" version="1" comment="kernel-pae-devel is &lt;3.0.101-68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205049" version="1" comment="kernel-pae-extra is &lt;3.0.101-68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205050" version="1" comment="kernel-source is &lt;3.0.101-68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205051" version="1" comment="kernel-syms is &lt;3.0.101-68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205052" version="1" comment="kernel-trace is &lt;3.0.101-68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205053" version="1" comment="kernel-trace-devel is &lt;3.0.101-68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205054" version="1" comment="kernel-xen is &lt;3.0.101-68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205055" version="1" comment="kernel-xen-base is &lt;3.0.101-68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205056" version="1" comment="kernel-xen-devel is &lt;3.0.101-68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205057" version="1" comment="kernel-xen-extra is &lt;3.0.101-68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205058" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.106" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205059" version="1" comment="krb5-client is &lt;1.6.3-133.49.106" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205060" version="1" comment="kvm is &lt;1.4.2-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205061" version="1" comment="kvm is &lt;1.4.2-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205062" version="1" comment="libotr2 is &lt;3.2.0-10.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205063" version="1" comment="libvirt-client is &lt;1.2.5-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205064" version="1" comment="libvirt-client-32bit is &lt;1.2.5-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205065" version="1" comment="libvirt-doc is &lt;1.2.5-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205066" version="1" comment="ibm-data-db2 is &lt;2.6.7-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205067" version="1" comment="ntp is &lt;4.2.8p4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205068" version="1" comment="ntp-doc is &lt;4.2.8p4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205069" version="1" comment="openssh is &lt;6.6p1-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205070" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205071" version="1" comment="openssh-helpers is &lt;6.6p1-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205072" version="1" comment="openssh is &lt;6.6p1-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205073" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205074" version="1" comment="openssh-helpers is &lt;6.6p1-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205075" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205076" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205077" version="1" comment="libecpg6 is &lt;9.4.6-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205078" version="1" comment="libpq5 is &lt;9.4.6-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205079" version="1" comment="libpq5-32bit is &lt;9.4.6-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205080" version="1" comment="postgresql94 is &lt;9.4.6-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205081" version="1" comment="postgresql94-docs is &lt;9.4.6-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205082" version="1" comment="libldb1 is &lt;3.6.3-67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205083" version="1" comment="libldb1-32bit is &lt;3.6.3-67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205084" version="1" comment="libsmbclient0 is &lt;3.6.3-67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205085" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205086" version="1" comment="libtalloc2 is &lt;3.6.3-67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205087" version="1" comment="libtalloc2-32bit is &lt;3.6.3-67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205088" version="1" comment="libtdb1 is &lt;3.6.3-67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205089" version="1" comment="libtdb1-32bit is &lt;3.6.3-67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205090" version="1" comment="libtevent0 is &lt;3.6.3-67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205091" version="1" comment="libtevent0-32bit is &lt;3.6.3-67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205092" version="1" comment="libwbclient0 is &lt;3.6.3-67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205093" version="1" comment="libwbclient0-32bit is &lt;3.6.3-67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205094" version="1" comment="samba-32bit is &lt;3.6.3-67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205095" version="1" comment="samba-client is &lt;3.6.3-67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205096" version="1" comment="samba-client-32bit is &lt;3.6.3-67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205097" version="1" comment="samba-doc is &lt;3.6.3-67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205098" version="1" comment="samba-krb-printing is &lt;3.6.3-67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205099" version="1" comment="samba-winbind is &lt;3.6.3-67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205100" version="1" comment="samba-winbind-32bit is &lt;3.6.3-67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205101" version="1" comment="socat is &lt;1.7.0.0-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205102" version="1" comment="libtiff3 is &lt;3.8.2-141.163" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205103" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.163" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205104" version="1" comment="xen-doc-html is &lt;4.4.2_10-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205105" version="1" comment="xen-kmp-default is &lt;4.4.2_10_3.0.101_63-5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205106" version="1" comment="xen-kmp-pae is &lt;4.4.2_10_3.0.101_63-5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205107" version="1" comment="xen-libs is &lt;4.4.2_10-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205108" version="1" comment="xen-libs-32bit is &lt;4.4.2_10-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205109" version="1" comment="xen-tools is &lt;4.4.2_10-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205110" version="1" comment="xen-tools-domU is &lt;4.4.2_10-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205111" version="1" comment="xen-doc-html is &lt;4.4.3_02-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205112" version="1" comment="xen-kmp-default is &lt;4.4.3_02_3.0.101_65-26" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205113" version="1" comment="xen-kmp-pae is &lt;4.4.3_02_3.0.101_65-26" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205114" version="1" comment="xen-libs is &lt;4.4.3_02-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205115" version="1" comment="xen-libs-32bit is &lt;4.4.3_02-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205116" version="1" comment="xen-tools is &lt;4.4.3_02-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205117" version="1" comment="xen-tools-domU is &lt;4.4.3_02-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205118" version="1" comment="xen-doc-html is &lt;4.4.4_02-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205119" version="1" comment="xen-kmp-default is &lt;4.4.4_02_3.0.101_68-32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205120" version="1" comment="xen-kmp-pae is &lt;4.4.4_02_3.0.101_68-32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205121" version="1" comment="xen-libs is &lt;4.4.4_02-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205122" version="1" comment="xen-libs-32bit is &lt;4.4.4_02-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205123" version="1" comment="xen-tools is &lt;4.4.4_02-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205124" version="1" comment="xen-tools-domU is &lt;4.4.4_02-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205125" version="1" comment="xen-doc-html is &lt;4.4.3_06-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205126" version="1" comment="xen-kmp-default is &lt;4.4.3_06_3.0.101_65-29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205127" version="1" comment="xen-kmp-pae is &lt;4.4.3_06_3.0.101_65-29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205128" version="1" comment="xen-libs is &lt;4.4.3_06-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205129" version="1" comment="xen-libs-32bit is &lt;4.4.3_06-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205130" version="1" comment="xen-tools is &lt;4.4.3_06-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205131" version="1" comment="xen-tools-domU is &lt;4.4.3_06-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205132" version="1" comment="conntrack-tools is &lt;1.0.0-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117402" version="1" comment="sle-hae-release is ==11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205133" version="1" comment="ctdb is &lt;1.0.114.6-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205134" version="1" comment="hawk is &lt;0.6.1-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205135" version="1" comment="hawk-templates is &lt;0.6.1-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205136" version="1" comment="cluster-network-kmp-bigsmp is &lt;1.4_3.0.101_0.47.55-2.28.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205137" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.101_0.40-2.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205138" version="1" comment="cluster-network-kmp-pae is &lt;1.4_3.0.101_0.40-2.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205139" version="1" comment="cluster-network-kmp-ppc64 is &lt;1.4_3.0.101_0.40-2.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205140" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.101_0.40-2.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205141" version="1" comment="cluster-network-kmp-xen is &lt;1.4_3.0.101_0.40-2.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205142" version="1" comment="gfs2-kmp-bigsmp is &lt;2_3.0.101_0.47.55-0.17.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205143" version="1" comment="gfs2-kmp-default is &lt;2_3.0.101_0.40-0.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205144" version="1" comment="gfs2-kmp-pae is &lt;2_3.0.101_0.40-0.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205145" version="1" comment="gfs2-kmp-ppc64 is &lt;2_3.0.101_0.40-0.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205146" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.101_0.40-0.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205147" version="1" comment="gfs2-kmp-xen is &lt;2_3.0.101_0.40-0.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205148" version="1" comment="ocfs2-kmp-bigsmp is &lt;1.6_3.0.101_0.47.55-0.21.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205149" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.101_0.40-0.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205150" version="1" comment="ocfs2-kmp-pae is &lt;1.6_3.0.101_0.40-0.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205151" version="1" comment="ocfs2-kmp-ppc64 is &lt;1.6_3.0.101_0.40-0.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205152" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.101_0.40-0.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205153" version="1" comment="ocfs2-kmp-xen is &lt;1.6_3.0.101_0.40-0.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205154" version="1" comment="cluster-network-kmp-bigsmp is &lt;1.4_3.0.101_0.40-2.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205155" version="1" comment="drbd-kmp-bigsmp is &lt;8.4.4_3.0.101_0.40-0.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205156" version="1" comment="gfs2-kmp-bigsmp is &lt;2_3.0.101_0.40-0.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205157" version="1" comment="ocfs2-kmp-bigsmp is &lt;1.6_3.0.101_0.40-0.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117403" version="1" comment="sle-hae-release is ==11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253936" version="1" comment="gnutls is &lt;2.4.1-24.39.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253937" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205158" version="1" comment="hawk is &lt;0.7.0+git.1430140184.8e872c5-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205159" version="1" comment="hawk-templates is &lt;0.7.0+git.1430140184.8e872c5-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205160" version="1" comment="cluster-network is &lt;1.4-2.32.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205161" version="1" comment="cluster-network-kmp-bigmem is &lt;1.4_3.0.101_108.7-2.32.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205162" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.101_108.7-2.32.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205163" version="1" comment="cluster-network-kmp-pae is &lt;1.4_3.0.101_108.7-2.32.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205164" version="1" comment="cluster-network-kmp-ppc64 is &lt;1.4_3.0.101_108.7-2.32.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205165" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.101_108.7-2.32.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205166" version="1" comment="cluster-network-kmp-xen is &lt;1.4_3.0.101_108.7-2.32.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205167" version="1" comment="drbd is &lt;8.4.4-0.27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205168" version="1" comment="drbd-bash-completion is &lt;8.4.4-0.27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205169" version="1" comment="drbd-heartbeat is &lt;8.4.4-0.27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205170" version="1" comment="drbd-kmp is &lt;8.4.4-0.27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205171" version="1" comment="drbd-kmp-bigmem is &lt;8.4.4_3.0.101_108.7-0.27.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205172" version="1" comment="drbd-kmp-default is &lt;8.4.4_3.0.101_108.7-0.27.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205173" version="1" comment="drbd-kmp-pae is &lt;8.4.4_3.0.101_108.7-0.27.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205174" version="1" comment="drbd-kmp-ppc64 is &lt;8.4.4_3.0.101_108.7-0.27.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205175" version="1" comment="drbd-kmp-trace is &lt;8.4.4_3.0.101_108.7-0.27.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205176" version="1" comment="drbd-kmp-xen is &lt;8.4.4_3.0.101_108.7-0.27.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205177" version="1" comment="drbd-pacemaker is &lt;8.4.4-0.27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205178" version="1" comment="drbd-udev is &lt;8.4.4-0.27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205179" version="1" comment="drbd-utils is &lt;8.4.4-0.27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205180" version="1" comment="drbd-xen is &lt;8.4.4-0.27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205181" version="1" comment="gfs2 is &lt;2-0.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205182" version="1" comment="gfs2-kmp-bigmem is &lt;2_3.0.101_108.7-0.24.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205183" version="1" comment="gfs2-kmp-default is &lt;2_3.0.101_108.7-0.24.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205184" version="1" comment="gfs2-kmp-pae is &lt;2_3.0.101_108.7-0.24.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205185" version="1" comment="gfs2-kmp-ppc64 is &lt;2_3.0.101_108.7-0.24.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205186" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.101_108.7-0.24.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205187" version="1" comment="gfs2-kmp-xen is &lt;2_3.0.101_108.7-0.24.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205188" version="1" comment="ocfs2 is &lt;1.6-0.28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205189" version="1" comment="ocfs2-kmp-bigmem is &lt;1.6_3.0.101_108.7-0.28.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205190" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.101_108.7-0.28.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205191" version="1" comment="ocfs2-kmp-pae is &lt;1.6_3.0.101_108.7-0.28.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205192" version="1" comment="ocfs2-kmp-ppc64 is &lt;1.6_3.0.101_108.7-0.28.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205193" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.101_108.7-0.28.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205194" version="1" comment="ocfs2-kmp-xen is &lt;1.6_3.0.101_108.7-0.28.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205195" version="1" comment="cluster-network is &lt;1.4-2.32.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205196" version="1" comment="cluster-network-kmp-bigmem is &lt;1.4_3.0.101_108.35-2.32.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205197" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.101_108.35-2.32.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205198" version="1" comment="cluster-network-kmp-pae is &lt;1.4_3.0.101_108.35-2.32.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205199" version="1" comment="cluster-network-kmp-ppc64 is &lt;1.4_3.0.101_108.35-2.32.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205200" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.101_108.35-2.32.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205201" version="1" comment="cluster-network-kmp-xen is &lt;1.4_3.0.101_108.35-2.32.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205202" version="1" comment="drbd is &lt;8.4.4-0.27.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205203" version="1" comment="drbd-bash-completion is &lt;8.4.4-0.27.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205204" version="1" comment="drbd-heartbeat is &lt;8.4.4-0.27.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205205" version="1" comment="drbd-kmp is &lt;8.4.4-0.27.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205206" version="1" comment="drbd-kmp-bigmem is &lt;8.4.4_3.0.101_108.35-0.27.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205207" version="1" comment="drbd-kmp-default is &lt;8.4.4_3.0.101_108.35-0.27.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205208" version="1" comment="drbd-kmp-pae is &lt;8.4.4_3.0.101_108.35-0.27.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205209" version="1" comment="drbd-kmp-ppc64 is &lt;8.4.4_3.0.101_108.35-0.27.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205210" version="1" comment="drbd-kmp-trace is &lt;8.4.4_3.0.101_108.35-0.27.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205211" version="1" comment="drbd-kmp-xen is &lt;8.4.4_3.0.101_108.35-0.27.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205212" version="1" comment="drbd-pacemaker is &lt;8.4.4-0.27.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205213" version="1" comment="drbd-udev is &lt;8.4.4-0.27.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205214" version="1" comment="drbd-utils is &lt;8.4.4-0.27.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205215" version="1" comment="drbd-xen is &lt;8.4.4-0.27.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205216" version="1" comment="gfs2 is &lt;2-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205217" version="1" comment="gfs2-kmp-bigmem is &lt;2_3.0.101_108.35-0.24.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205218" version="1" comment="gfs2-kmp-default is &lt;2_3.0.101_108.35-0.24.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205219" version="1" comment="gfs2-kmp-pae is &lt;2_3.0.101_108.35-0.24.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205220" version="1" comment="gfs2-kmp-ppc64 is &lt;2_3.0.101_108.35-0.24.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205221" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.101_108.35-0.24.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205222" version="1" comment="gfs2-kmp-xen is &lt;2_3.0.101_108.35-0.24.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205223" version="1" comment="ocfs2 is &lt;1.6-0.28.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205224" version="1" comment="ocfs2-kmp-bigmem is &lt;1.6_3.0.101_108.35-0.28.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205225" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.101_108.35-0.28.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205226" version="1" comment="ocfs2-kmp-pae is &lt;1.6_3.0.101_108.35-0.28.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205227" version="1" comment="ocfs2-kmp-ppc64 is &lt;1.6_3.0.101_108.35-0.28.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205228" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.101_108.35-0.28.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205229" version="1" comment="ocfs2-kmp-xen is &lt;1.6_3.0.101_108.35-0.28.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245902" version="1" comment="ocfs2 is &lt;1.6-0.28.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245903" version="1" comment="ocfs2-kmp-bigmem is &lt;1.6_3.0.101_108.87-0.28.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245904" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.101_108.87-0.28.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245905" version="1" comment="ocfs2-kmp-pae is &lt;1.6_3.0.101_108.87-0.28.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245906" version="1" comment="ocfs2-kmp-ppc64 is &lt;1.6_3.0.101_108.87-0.28.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245907" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.101_108.87-0.28.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245908" version="1" comment="ocfs2-kmp-xen is &lt;1.6_3.0.101_108.87-0.28.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246577" version="1" comment="cluster-network is &lt;1.4-2.32.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246578" version="1" comment="cluster-network-kmp-bigmem is &lt;1.4_3.0.101_108.87-2.32.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246579" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.101_108.87-2.32.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246580" version="1" comment="cluster-network-kmp-pae is &lt;1.4_3.0.101_108.87-2.32.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246581" version="1" comment="cluster-network-kmp-ppc64 is &lt;1.4_3.0.101_108.87-2.32.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246582" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.101_108.87-2.32.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246583" version="1" comment="cluster-network-kmp-xen is &lt;1.4_3.0.101_108.87-2.32.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246584" version="1" comment="drbd is &lt;8.4.4-0.27.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246585" version="1" comment="drbd-bash-completion is &lt;8.4.4-0.27.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246586" version="1" comment="drbd-heartbeat is &lt;8.4.4-0.27.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246587" version="1" comment="drbd-kmp is &lt;8.4.4-0.27.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246588" version="1" comment="drbd-kmp-bigmem is &lt;8.4.4_3.0.101_108.87-0.27.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246589" version="1" comment="drbd-kmp-default is &lt;8.4.4_3.0.101_108.87-0.27.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246590" version="1" comment="drbd-kmp-pae is &lt;8.4.4_3.0.101_108.87-0.27.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246591" version="1" comment="drbd-kmp-ppc64 is &lt;8.4.4_3.0.101_108.87-0.27.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246592" version="1" comment="drbd-kmp-trace is &lt;8.4.4_3.0.101_108.87-0.27.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246593" version="1" comment="drbd-kmp-xen is &lt;8.4.4_3.0.101_108.87-0.27.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246594" version="1" comment="drbd-pacemaker is &lt;8.4.4-0.27.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246595" version="1" comment="drbd-udev is &lt;8.4.4-0.27.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246596" version="1" comment="drbd-utils is &lt;8.4.4-0.27.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246597" version="1" comment="drbd-xen is &lt;8.4.4-0.27.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246598" version="1" comment="gfs2 is &lt;2-0.24.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246599" version="1" comment="gfs2-kmp-bigmem is &lt;2_3.0.101_108.87-0.24.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246600" version="1" comment="gfs2-kmp-default is &lt;2_3.0.101_108.87-0.24.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246601" version="1" comment="gfs2-kmp-pae is &lt;2_3.0.101_108.87-0.24.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246602" version="1" comment="gfs2-kmp-ppc64 is &lt;2_3.0.101_108.87-0.24.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246603" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.101_108.87-0.24.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246604" version="1" comment="gfs2-kmp-xen is &lt;2_3.0.101_108.87-0.24.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246605" version="1" comment="ocfs2 is &lt;1.6-0.28.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246606" version="1" comment="ocfs2-kmp-bigmem is &lt;1.6_3.0.101_108.87-0.28.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246607" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.101_108.87-0.28.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246608" version="1" comment="ocfs2-kmp-pae is &lt;1.6_3.0.101_108.87-0.28.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246609" version="1" comment="ocfs2-kmp-ppc64 is &lt;1.6_3.0.101_108.87-0.28.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246610" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.101_108.87-0.28.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246611" version="1" comment="ocfs2-kmp-xen is &lt;1.6_3.0.101_108.87-0.28.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205230" version="1" comment="libpacemaker-devel is &lt;1.1.12-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205231" version="1" comment="libpacemaker3 is &lt;1.1.12-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205232" version="1" comment="pacemaker is &lt;1.1.12-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205233" version="1" comment="pacemaker-cli is &lt;1.1.12-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205234" version="1" comment="pacemaker-remote is &lt;1.1.12-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117404" version="1" comment="sle-pos-release is ==11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246355" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.92" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117405" version="1" comment="sle-pos-release is ==11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205235" version="1" comment="MozillaFirefox-branding-SLED is &lt;45.0-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205236" version="1" comment="MozillaFirefox-translations is &lt;45.2.0esr-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205237" version="1" comment="libfreebl3 is &lt;3.21.1-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205238" version="1" comment="libsoftokn3 is &lt;3.21.1-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205239" version="1" comment="mozilla-nss-tools is &lt;3.21.1-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205240" version="1" comment="MozillaFirefox-translations is &lt;45.3.0esr-50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205241" version="1" comment="MozillaFirefox-translations is &lt;45.4.0esr-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205242" version="1" comment="MozillaFirefox-translations is &lt;45.6.0esr-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205243" version="1" comment="MozillaFirefox-translations is &lt;45.7.0esr-65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205244" version="1" comment="MozillaFirefox-translations is &lt;45.8.0esr-68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205245" version="1" comment="MozillaFirefox-translations is &lt;45.9.0esr-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205246" version="1" comment="libfreebl3 is &lt;3.29.5-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205247" version="1" comment="libsoftokn3 is &lt;3.29.5-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205248" version="1" comment="mozilla-nss-tools is &lt;3.29.5-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205249" version="1" comment="MozillaFirefox-branding-SLED is &lt;52-24.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205250" version="1" comment="MozillaFirefox-translations is &lt;52.2.0esr-72.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205251" version="1" comment="firefox-gcc5 is &lt;5.3.1+r233831-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205252" version="1" comment="firefox-libffi-gcc5 is &lt;5.3.1+r233831-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205253" version="1" comment="firefox-libffi4 is &lt;5.3.1+r233831-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205254" version="1" comment="firefox-libstdc++6 is &lt;5.3.1+r233831-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205255" version="1" comment="libfreebl3 is &lt;3.29.5-47.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205256" version="1" comment="libsoftokn3 is &lt;3.29.5-47.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205257" version="1" comment="mozilla-nss-tools is &lt;3.29.5-47.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205258" version="1" comment="MozillaFirefox-branding-SLED is &lt;52-24.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205259" version="1" comment="MozillaFirefox-translations is &lt;52.3.0esr-72.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205260" version="1" comment="MozillaFirefox-translations is &lt;52.5.0esr-72.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205261" version="1" comment="MozillaFirefox-translations is &lt;52.6.0esr-72.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205262" version="1" comment="MozillaFirefox-translations is &lt;52.7.3esr-72.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205263" version="1" comment="MozillaFirefox-translations is &lt;52.8.0esr-72.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229523" version="1" comment="MozillaFirefox-translations is &lt;52.8.1esr-72.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232173" version="1" comment="MozillaFirefox-translations is &lt;52.9.0esr-72.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205264" version="1" comment="POS_Image-Minimal3 is &lt;3.4.0-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205265" version="1" comment="POS_Image-Netboot-hooks is &lt;3.4.0-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205266" version="1" comment="POS_Image-Tools is &lt;3.4.0-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205267" version="1" comment="POS_Image3 is &lt;3.5.5-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205268" version="1" comment="POS_Migration is &lt;3.5.5-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205269" version="1" comment="POS_Server-Admin3 is &lt;3.5.5-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205270" version="1" comment="POS_Server-AdminGUI is &lt;3.5.5-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205271" version="1" comment="POS_Server-AdminTools3 is &lt;3.5.5-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205272" version="1" comment="POS_Server-BranchTools3 is &lt;3.5.5-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205273" version="1" comment="POS_Server-Modules3 is &lt;3.5.5-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205274" version="1" comment="POS_Server3 is &lt;3.5.5-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205275" version="1" comment="admind is &lt;1.9-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205276" version="1" comment="admind-client is &lt;1.9-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205277" version="1" comment="posbios is &lt;1.0-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205278" version="1" comment="apache2-mod_nss is &lt;1.0.14-0.4.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252541" version="1" comment="atftp is &lt;0.7.0-135.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205279" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205280" version="1" comment="bind-doc is &lt;9.9.6P1-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205281" version="1" comment="bind-libs is &lt;9.9.6P1-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205282" version="1" comment="bind-utils is &lt;9.9.6P1-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205283" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205284" version="1" comment="bind-doc is &lt;9.9.6P1-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205285" version="1" comment="bind-libs is &lt;9.9.6P1-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205286" version="1" comment="bind-utils is &lt;9.9.6P1-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205287" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205288" version="1" comment="bind-doc is &lt;9.9.6P1-0.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205289" version="1" comment="bind-libs is &lt;9.9.6P1-0.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205290" version="1" comment="bind-utils is &lt;9.9.6P1-0.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205291" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205292" version="1" comment="bind-doc is &lt;9.9.6P1-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205293" version="1" comment="bind-libs is &lt;9.9.6P1-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205294" version="1" comment="bind-utils is &lt;9.9.6P1-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205295" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205296" version="1" comment="bind-doc is &lt;9.9.6P1-0.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205297" version="1" comment="bind-libs is &lt;9.9.6P1-0.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205298" version="1" comment="bind-utils is &lt;9.9.6P1-0.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205299" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205300" version="1" comment="bind-doc is &lt;9.9.6P1-0.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205301" version="1" comment="bind-libs is &lt;9.9.6P1-0.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205302" version="1" comment="bind-utils is &lt;9.9.6P1-0.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205303" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205304" version="1" comment="bind-doc is &lt;9.9.6P1-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205305" version="1" comment="bind-libs is &lt;9.9.6P1-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205306" version="1" comment="bind-utils is &lt;9.9.6P1-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205307" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.51.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205308" version="1" comment="bind-doc is &lt;9.9.6P1-0.51.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205309" version="1" comment="bind-libs is &lt;9.9.6P1-0.51.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205310" version="1" comment="bind-utils is &lt;9.9.6P1-0.51.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256176" version="1" comment="bind is &lt;9.9.6P1-0.51.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256177" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.51.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256178" version="1" comment="bind-devel is &lt;9.9.6P1-0.51.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256179" version="1" comment="bind-doc is &lt;9.9.6P1-0.51.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256180" version="1" comment="bind-libs is &lt;9.9.6P1-0.51.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256181" version="1" comment="bind-utils is &lt;9.9.6P1-0.51.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205311" version="1" comment="libarchive2 is &lt;2.5.5-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259369" version="1" comment="bzip2 is &lt;1.0.5-34.256.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259370" version="1" comment="bzip2-doc is &lt;1.0.5-34.256.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259371" version="1" comment="libbz2-1 is &lt;1.0.5-34.256.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261351" version="1" comment="bzip2 is &lt;1.0.5-34.256.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261352" version="1" comment="bzip2-doc is &lt;1.0.5-34.256.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261353" version="1" comment="libbz2-1 is &lt;1.0.5-34.256.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205312" version="1" comment="clamav is &lt;0.99.2-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205313" version="1" comment="clamav is &lt;0.99.3-0.20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205314" version="1" comment="clamav is &lt;0.99.4-0.20.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231494" version="1" comment="clamav is &lt;0.100.1-0.20.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238168" version="1" comment="clamav is &lt;0.100.2-0.20.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247297" version="1" comment="clamav is &lt;0.100.3-0.20.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205315" version="1" comment="libcurl4 is &lt;7.19.7-1.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205316" version="1" comment="libcurl4 is &lt;7.37.0-70.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254215" version="1" comment="curl is &lt;7.37.0-70.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254216" version="1" comment="libcurl-devel is &lt;7.37.0-70.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254217" version="1" comment="libcurl4 is &lt;7.37.0-70.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264653" version="1" comment="curl is &lt;7.37.0-70.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264654" version="1" comment="libcurl-devel is &lt;7.37.0-70.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264655" version="1" comment="libcurl4 is &lt;7.37.0-70.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258654" version="1" comment="dbus-1 is &lt;1.2.10-3.34.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258655" version="1" comment="dbus-1-x11 is &lt;1.2.10-3.34.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205317" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205318" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205319" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209219" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209220" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209221" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205320" version="1" comment="dnsmasq is &lt;2.78-0.16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205321" version="1" comment="emacs-el is &lt;22.3-42.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205322" version="1" comment="emacs-info is &lt;22.3-42.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205323" version="1" comment="emacs-x11 is &lt;22.3-42.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261354" version="1" comment="evince is &lt;2.28.2-0.7.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261355" version="1" comment="evince-doc is &lt;2.28.2-0.7.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261356" version="1" comment="evince-lang is &lt;2.28.2-0.7.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205324" version="1" comment="MozillaFirefox-translations is &lt;52.4.0esr-72.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205325" version="1" comment="libfreebl3 is &lt;3.29.5-47.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205326" version="1" comment="libsoftokn3 is &lt;3.29.5-47.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205327" version="1" comment="mozilla-nss-tools is &lt;3.29.5-47.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205328" version="1" comment="gcc43-c++ is &lt;4.3.4_20091019-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205329" version="1" comment="gcc43-info is &lt;4.3.4_20091019-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205330" version="1" comment="gcc43-locale is &lt;4.3.4_20091019-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205331" version="1" comment="libstdc++43-devel is &lt;4.3.4_20091019-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205332" version="1" comment="gcc43-c++ is &lt;4.3.4_20091019-37.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205333" version="1" comment="gcc43-info is &lt;4.3.4_20091019-37.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205334" version="1" comment="gcc43-locale is &lt;4.3.4_20091019-37.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205335" version="1" comment="libstdc++43-devel is &lt;4.3.4_20091019-37.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205336" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205337" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205338" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205339" version="1" comment="ghostscript-omni is &lt;8.62-32.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205340" version="1" comment="ghostscript-x11 is &lt;8.62-32.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205341" version="1" comment="libgimpprint is &lt;4.2.7-32.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205342" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205343" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205344" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205345" version="1" comment="ghostscript-omni is &lt;8.62-32.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205346" version="1" comment="ghostscript-x11 is &lt;8.62-32.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205347" version="1" comment="libgimpprint is &lt;4.2.7-32.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237955" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.47.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237956" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.47.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237957" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.47.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237958" version="1" comment="ghostscript-omni is &lt;8.62-32.47.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237959" version="1" comment="ghostscript-x11 is &lt;8.62-32.47.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237960" version="1" comment="libgimpprint is &lt;4.2.7-32.47.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263096" version="1" comment="ghostscript-fonts-other is &lt;8.62-47.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263097" version="1" comment="ghostscript-fonts-rus is &lt;8.62-47.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263098" version="1" comment="ghostscript-fonts-std is &lt;8.62-47.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263099" version="1" comment="ghostscript-library is &lt;8.62-47.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263100" version="1" comment="ghostscript-omni is &lt;8.62-47.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263101" version="1" comment="ghostscript-x11 is &lt;8.62-47.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263102" version="1" comment="libgimpprint is &lt;4.2.7-47.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258112" version="1" comment="glib2 is &lt;2.22.5-0.8.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258113" version="1" comment="glib2-doc is &lt;2.22.5-0.8.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258114" version="1" comment="glib2-lang is &lt;2.22.5-0.8.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258115" version="1" comment="libgio-2_0-0 is &lt;2.22.5-0.8.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258116" version="1" comment="libglib-2_0-0 is &lt;2.22.5-0.8.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258117" version="1" comment="libgmodule-2_0-0 is &lt;2.22.5-0.8.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258118" version="1" comment="libgobject-2_0-0 is &lt;2.22.5-0.8.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258119" version="1" comment="libgthread-2_0-0 is &lt;2.22.5-0.8.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205348" version="1" comment="glibc-devel is &lt;2.11.3-17.109" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205349" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.109" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205350" version="1" comment="glibc-locale is &lt;2.11.3-17.109" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205351" version="1" comment="glibc-profile is &lt;2.11.3-17.109" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205352" version="1" comment="nscd is &lt;2.11.3-17.109" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205353" version="1" comment="glibc-devel is &lt;2.11.3-17.110.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205354" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205355" version="1" comment="glibc-locale is &lt;2.11.3-17.110.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205356" version="1" comment="glibc-profile is &lt;2.11.3-17.110.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205357" version="1" comment="nscd is &lt;2.11.3-17.110.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205358" version="1" comment="glibc-devel is &lt;2.11.3-17.110.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205359" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205360" version="1" comment="glibc-locale is &lt;2.11.3-17.110.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205361" version="1" comment="glibc-profile is &lt;2.11.3-17.110.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205362" version="1" comment="nscd is &lt;2.11.3-17.110.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231873" version="1" comment="glibc-devel is &lt;2.11.3-17.110.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231874" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231875" version="1" comment="glibc-locale is &lt;2.11.3-17.110.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231876" version="1" comment="glibc-profile is &lt;2.11.3-17.110.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231877" version="1" comment="nscd is &lt;2.11.3-17.110.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235447" version="1" comment="glibc-devel is &lt;2.11.3-17.110.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235448" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235449" version="1" comment="glibc-locale is &lt;2.11.3-17.110.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235450" version="1" comment="glibc-profile is &lt;2.11.3-17.110.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235451" version="1" comment="nscd is &lt;2.11.3-17.110.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241588" version="1" comment="glibc-devel is &lt;2.11.3-17.110.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241589" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241590" version="1" comment="glibc-locale is &lt;2.11.3-17.110.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241591" version="1" comment="glibc-profile is &lt;2.11.3-17.110.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241592" version="1" comment="nscd is &lt;2.11.3-17.110.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256836" version="1" comment="glibc is &lt;2.11.3-17.110.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256837" version="1" comment="glibc-devel is &lt;2.11.3-17.110.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256838" version="1" comment="glibc-html is &lt;2.11.3-17.110.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256839" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256840" version="1" comment="glibc-info is &lt;2.11.3-17.110.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256841" version="1" comment="glibc-locale is &lt;2.11.3-17.110.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256842" version="1" comment="glibc-profile is &lt;2.11.3-17.110.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256843" version="1" comment="nscd is &lt;2.11.3-17.110.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223547" version="1" comment="gpg2 is &lt;2.0.9-25.33.42.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223548" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.42.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256637" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.35-5.18.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256638" version="1" comment="gstreamer-0_10-plugins-base-doc is &lt;0.10.35-5.18.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256639" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.35-5.18.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256640" version="1" comment="libgstapp-0_10-0 is &lt;0.10.35-5.18.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256641" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.35-5.18.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253254" version="1" comment="jakarta-commons-fileupload is &lt;1.1.1-1.37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253255" version="1" comment="jakarta-commons-fileupload-javadoc is &lt;1.1.1-1.37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205363" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.30-75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205364" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.30-75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205365" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.30-75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205366" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.30-75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205367" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.30-75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205368" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.30-75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205369" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.35-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205370" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.35-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205371" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.35-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205372" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.35-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205373" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.35-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205374" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.35-78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205375" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.45-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205376" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.45-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205377" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.45-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205378" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.45-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205379" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.45-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205380" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.45-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205381" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.50-85.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205382" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.50-85.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205383" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.50-85.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205384" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.50-85.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205385" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.50-85.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205386" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.50-85.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205387" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr9.50-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205388" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr9.50-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205389" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr9.50-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205390" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr9.50-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205391" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr9.50-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205392" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr9.60-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205393" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr9.60-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205394" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr9.60-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205395" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr9.60-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205396" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr9.60-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205397" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.1-61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205398" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.1-61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205399" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr10.1-61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205400" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.1-61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205401" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.1-61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205402" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.5-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205403" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.5-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205404" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr10.5-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205405" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.5-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205406" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.5-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205407" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.15-65.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205408" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.15-65.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205409" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr10.15-65.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205410" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.15-65.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205411" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.15-65.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205412" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.20-65.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205413" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.20-65.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205414" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr10.20-65.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205415" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.20-65.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205416" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.20-65.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205417" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.25-65.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205418" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.25-65.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205419" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr10.25-65.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205420" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.25-65.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205421" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.25-65.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233814" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.30-65.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233815" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.30-65.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233816" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr10.30-65.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233817" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.30-65.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233818" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.30-65.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240826" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.35-65.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240827" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.35-65.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240828" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr10.35-65.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240829" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.35-65.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240830" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.35-65.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245809" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.40-65.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245810" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.40-65.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245811" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr10.40-65.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245812" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.40-65.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245813" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.40-65.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205422" version="1" comment="kernel-default is &lt;3.0.101-0.47.86" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205423" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.86" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205424" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.86" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205425" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.86" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205426" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.86" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205427" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.86" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205428" version="1" comment="kernel-pae is &lt;3.0.101-0.47.86" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205429" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.86" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205430" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.86" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205431" version="1" comment="kernel-source is &lt;3.0.101-0.47.86" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205432" version="1" comment="kernel-syms is &lt;3.0.101-0.47.86" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205433" version="1" comment="kernel-trace is &lt;3.0.101-0.47.86" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205434" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.86" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205435" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.86" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205436" version="1" comment="kernel-xen is &lt;3.0.101-0.47.86" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205437" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.86" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205438" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.86" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205439" version="1" comment="kernel-default is &lt;3.0.101-0.47.93" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205440" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.93" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205441" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.93" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205442" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.93" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205443" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.93" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205444" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.93" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205445" version="1" comment="kernel-pae is &lt;3.0.101-0.47.93" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205446" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.93" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205447" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.93" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205448" version="1" comment="kernel-source is &lt;3.0.101-0.47.93" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205449" version="1" comment="kernel-syms is &lt;3.0.101-0.47.93" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205450" version="1" comment="kernel-trace is &lt;3.0.101-0.47.93" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205451" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.93" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205452" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.93" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205453" version="1" comment="kernel-xen is &lt;3.0.101-0.47.93" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205454" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.93" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205455" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.93" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205456" version="1" comment="kernel-default is &lt;3.0.101-0.47.99" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205457" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.99" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205458" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.99" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205459" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.99" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205460" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.99" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205461" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.99" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205462" version="1" comment="kernel-pae is &lt;3.0.101-0.47.99" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205463" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.99" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205464" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.99" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205465" version="1" comment="kernel-source is &lt;3.0.101-0.47.99" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205466" version="1" comment="kernel-syms is &lt;3.0.101-0.47.99" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205467" version="1" comment="kernel-trace is &lt;3.0.101-0.47.99" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205468" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.99" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205469" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.99" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205470" version="1" comment="kernel-xen is &lt;3.0.101-0.47.99" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205471" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.99" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205472" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.99" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205473" version="1" comment="kernel-default is &lt;3.0.101-0.47.102" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205474" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.102" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205475" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.102" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205476" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.102" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205477" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.102" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205478" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.102" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205479" version="1" comment="kernel-pae is &lt;3.0.101-0.47.102" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205480" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.102" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205481" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.102" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205482" version="1" comment="kernel-source is &lt;3.0.101-0.47.102" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205483" version="1" comment="kernel-syms is &lt;3.0.101-0.47.102" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205484" version="1" comment="kernel-trace is &lt;3.0.101-0.47.102" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205485" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.102" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205486" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.102" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205487" version="1" comment="kernel-xen is &lt;3.0.101-0.47.102" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205488" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.102" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205489" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.102" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205490" version="1" comment="kernel-default is &lt;3.0.101-0.47.105" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205491" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.105" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205492" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.105" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205493" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.105" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205494" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.105" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205495" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.105" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205496" version="1" comment="kernel-pae is &lt;3.0.101-0.47.105" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205497" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.105" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205498" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.105" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205499" version="1" comment="kernel-source is &lt;3.0.101-0.47.105" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205500" version="1" comment="kernel-syms is &lt;3.0.101-0.47.105" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205501" version="1" comment="kernel-trace is &lt;3.0.101-0.47.105" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205502" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.105" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205503" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.105" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205504" version="1" comment="kernel-xen is &lt;3.0.101-0.47.105" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205505" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.105" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205506" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.105" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205507" version="1" comment="kernel-default is &lt;3.0.101-0.47.106.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205508" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.106.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205509" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.106.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205510" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.106.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205511" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.106.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205512" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.106.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205513" version="1" comment="kernel-pae is &lt;3.0.101-0.47.106.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205514" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.106.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205515" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.106.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205516" version="1" comment="kernel-source is &lt;3.0.101-0.47.106.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205517" version="1" comment="kernel-syms is &lt;3.0.101-0.47.106.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205518" version="1" comment="kernel-trace is &lt;3.0.101-0.47.106.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205519" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.106.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205520" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.106.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205521" version="1" comment="kernel-xen is &lt;3.0.101-0.47.106.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205522" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.106.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205523" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.106.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235541" version="1" comment="kernel-default is &lt;3.0.101-0.47.106.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235542" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.106.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235543" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.106.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235544" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.106.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235545" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.106.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235546" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.106.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235547" version="1" comment="kernel-pae is &lt;3.0.101-0.47.106.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235548" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.106.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235549" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.106.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235550" version="1" comment="kernel-source is &lt;3.0.101-0.47.106.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235551" version="1" comment="kernel-syms is &lt;3.0.101-0.47.106.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235552" version="1" comment="kernel-trace is &lt;3.0.101-0.47.106.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235553" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.106.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235554" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.106.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235555" version="1" comment="kernel-xen is &lt;3.0.101-0.47.106.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235556" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.106.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235557" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.106.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205524" version="1" comment="kernel-default is &lt;3.0.101-0.47.106.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205525" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.106.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205526" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.106.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205527" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.106.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205528" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.106.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205529" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.106.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205530" version="1" comment="kernel-pae is &lt;3.0.101-0.47.106.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205531" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.106.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205532" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.106.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205533" version="1" comment="kernel-source is &lt;3.0.101-0.47.106.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205534" version="1" comment="kernel-syms is &lt;3.0.101-0.47.106.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205535" version="1" comment="kernel-trace is &lt;3.0.101-0.47.106.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205536" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.106.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205537" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.106.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205538" version="1" comment="kernel-xen is &lt;3.0.101-0.47.106.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205539" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.106.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205540" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.106.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205541" version="1" comment="kernel-default is &lt;3.0.101-0.47.106.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205542" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.106.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205543" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.106.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205544" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.106.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205545" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.106.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205546" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.106.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205547" version="1" comment="kernel-pae is &lt;3.0.101-0.47.106.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205548" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.106.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205549" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.106.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205550" version="1" comment="kernel-source is &lt;3.0.101-0.47.106.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205551" version="1" comment="kernel-syms is &lt;3.0.101-0.47.106.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205552" version="1" comment="kernel-trace is &lt;3.0.101-0.47.106.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205553" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.106.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205554" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.106.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205555" version="1" comment="kernel-xen is &lt;3.0.101-0.47.106.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205556" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.106.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205557" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.106.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205558" version="1" comment="kernel-default is &lt;3.0.101-0.47.106.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205559" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.106.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205560" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.106.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205561" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.106.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205562" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.106.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205563" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.106.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205564" version="1" comment="kernel-pae is &lt;3.0.101-0.47.106.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205565" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.106.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205566" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.106.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205567" version="1" comment="kernel-source is &lt;3.0.101-0.47.106.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205568" version="1" comment="kernel-syms is &lt;3.0.101-0.47.106.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205569" version="1" comment="kernel-trace is &lt;3.0.101-0.47.106.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205570" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.106.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205571" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.106.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205572" version="1" comment="kernel-xen is &lt;3.0.101-0.47.106.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205573" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.106.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205574" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.106.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232594" version="1" comment="kernel-default is &lt;3.0.101-0.47.106.43" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232595" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.106.43" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232596" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.106.43" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232597" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.106.43" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232598" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.106.43" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232599" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.106.43" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232600" version="1" comment="kernel-pae is &lt;3.0.101-0.47.106.43" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232601" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.106.43" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232602" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.106.43" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232603" version="1" comment="kernel-source is &lt;3.0.101-0.47.106.43" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232604" version="1" comment="kernel-syms is &lt;3.0.101-0.47.106.43" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232605" version="1" comment="kernel-trace is &lt;3.0.101-0.47.106.43" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232606" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.106.43" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232607" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.106.43" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232608" version="1" comment="kernel-xen is &lt;3.0.101-0.47.106.43" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232609" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.106.43" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232610" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.106.43" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243411" version="1" comment="kernel-default is &lt;3.0.101-0.47.106.59" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243412" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.106.59" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243413" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.106.59" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243414" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.106.59" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243415" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.106.59" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243416" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.106.59" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243417" version="1" comment="kernel-pae is &lt;3.0.101-0.47.106.59" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243418" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.106.59" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243419" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.106.59" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243420" version="1" comment="kernel-source is &lt;3.0.101-0.47.106.59" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243421" version="1" comment="kernel-syms is &lt;3.0.101-0.47.106.59" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243422" version="1" comment="kernel-trace is &lt;3.0.101-0.47.106.59" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243423" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.106.59" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243424" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.106.59" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243425" version="1" comment="kernel-xen is &lt;3.0.101-0.47.106.59" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243426" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.106.59" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243427" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.106.59" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229592" version="1" comment="kernel-default is &lt;3.0.101-0.47.106.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229593" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.106.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229594" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.106.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229595" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.106.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229596" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.106.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229597" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.106.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229598" version="1" comment="kernel-pae is &lt;3.0.101-0.47.106.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229599" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.106.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229600" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.106.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229601" version="1" comment="kernel-source is &lt;3.0.101-0.47.106.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229602" version="1" comment="kernel-syms is &lt;3.0.101-0.47.106.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229603" version="1" comment="kernel-trace is &lt;3.0.101-0.47.106.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229604" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.106.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229605" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.106.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229606" version="1" comment="kernel-xen is &lt;3.0.101-0.47.106.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229607" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.106.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229608" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.106.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205575" version="1" comment="kernel-default is &lt;3.0.101-0.47.90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205576" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205577" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205578" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205579" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205580" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205581" version="1" comment="kernel-pae is &lt;3.0.101-0.47.90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205582" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205583" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205584" version="1" comment="kernel-source is &lt;3.0.101-0.47.90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205585" version="1" comment="kernel-syms is &lt;3.0.101-0.47.90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205586" version="1" comment="kernel-trace is &lt;3.0.101-0.47.90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205587" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205588" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205589" version="1" comment="kernel-xen is &lt;3.0.101-0.47.90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205590" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205591" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205592" version="1" comment="kernel-default is &lt;3.0.101-0.47.106.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205593" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.106.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205594" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.106.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205595" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.106.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205596" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.106.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205597" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.106.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205598" version="1" comment="kernel-pae is &lt;3.0.101-0.47.106.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205599" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.106.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205600" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.106.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205601" version="1" comment="kernel-source is &lt;3.0.101-0.47.106.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205602" version="1" comment="kernel-syms is &lt;3.0.101-0.47.106.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205603" version="1" comment="kernel-trace is &lt;3.0.101-0.47.106.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205604" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.106.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205605" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.106.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205606" version="1" comment="kernel-xen is &lt;3.0.101-0.47.106.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205607" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.106.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205608" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.106.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238572" version="1" comment="kernel-default is &lt;3.0.101-0.47.106.56" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238573" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.106.56" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238574" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.106.56" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238575" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.106.56" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238576" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.106.56" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238577" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.106.56" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238578" version="1" comment="kernel-pae is &lt;3.0.101-0.47.106.56" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238579" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.106.56" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238580" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.106.56" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238581" version="1" comment="kernel-source is &lt;3.0.101-0.47.106.56" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238582" version="1" comment="kernel-syms is &lt;3.0.101-0.47.106.56" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238583" version="1" comment="kernel-trace is &lt;3.0.101-0.47.106.56" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238584" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.106.56" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238585" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.106.56" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238586" version="1" comment="kernel-xen is &lt;3.0.101-0.47.106.56" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238587" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.106.56" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238588" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.106.56" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205609" version="1" comment="kernel-default is &lt;3.0.101-0.47.106.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205610" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.106.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205611" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.106.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205612" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.106.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205613" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.106.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205614" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.106.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205615" version="1" comment="kernel-pae is &lt;3.0.101-0.47.106.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205616" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.106.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205617" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.106.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205618" version="1" comment="kernel-source is &lt;3.0.101-0.47.106.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205619" version="1" comment="kernel-syms is &lt;3.0.101-0.47.106.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205620" version="1" comment="kernel-trace is &lt;3.0.101-0.47.106.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205621" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.106.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205622" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.106.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205623" version="1" comment="kernel-xen is &lt;3.0.101-0.47.106.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205624" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.106.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205625" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.106.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205626" version="1" comment="kvm is &lt;1.4.2-53.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205627" version="1" comment="kvm is &lt;1.4.2-53.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205628" version="1" comment="kvm is &lt;1.4.2-53.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205629" version="1" comment="kvm is &lt;1.4.2-53.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233933" version="1" comment="kvm is &lt;1.4.2-53.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241072" version="1" comment="kvm is &lt;1.4.2-53.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253938" version="1" comment="kvm is &lt;1.4.2-53.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246612" version="1" comment="libssh2-1 is &lt;1.2.9-4.2.12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246613" version="1" comment="libssh2_org is &lt;1.2.9-4.2.12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252446" version="1" comment="libssh2-1 is &lt;1.2.9-4.2.12.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252447" version="1" comment="libssh2_org is &lt;1.2.9-4.2.12.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257948" version="1" comment="libssh2-1 is &lt;1.2.9-4.2.12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257949" version="1" comment="libssh2_org is &lt;1.2.9-4.2.12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247298" version="1" comment="libtcnative-1-0 is &lt;1.3.4-12.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205630" version="1" comment="libtirpc1 is &lt;0.2.1-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205631" version="1" comment="rpcbind is &lt;0.1.6+git20080930-6.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205632" version="1" comment="libvirt is &lt;1.0.5.9-21.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205633" version="1" comment="libvirt-client is &lt;1.0.5.9-21.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205634" version="1" comment="libvirt-doc is &lt;1.0.5.9-21.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205635" version="1" comment="libvirt-lock-sanlock is &lt;1.0.5.9-21.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205636" version="1" comment="libvirt-python is &lt;1.0.5.9-21.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205637" version="1" comment="libvirt is &lt;1.0.5.9-21.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205638" version="1" comment="libvirt-client is &lt;1.0.5.9-21.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205639" version="1" comment="libvirt-doc is &lt;1.0.5.9-21.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205640" version="1" comment="libvirt-lock-sanlock is &lt;1.0.5.9-21.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205641" version="1" comment="libvirt-python is &lt;1.0.5.9-21.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257950" version="1" comment="libvirt is &lt;1.0.5.9-21.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257951" version="1" comment="libvirt-client is &lt;1.0.5.9-21.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257952" version="1" comment="libvirt-doc is &lt;1.0.5.9-21.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257953" version="1" comment="libvirt-lock-sanlock is &lt;1.0.5.9-21.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257954" version="1" comment="libvirt-python is &lt;1.0.5.9-21.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205642" version="1" comment="libxml2-doc is &lt;2.7.6-0.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205643" version="1" comment="libxml2-python is &lt;2.7.6-0.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246172" version="1" comment="libxml2-doc is &lt;2.7.6-0.77.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246173" version="1" comment="libxml2-python is &lt;2.7.6-0.77.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265190" version="1" comment="libxml2 is &lt;2.7.6-0.77.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265191" version="1" comment="libxml2-doc is &lt;2.7.6-0.77.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265192" version="1" comment="libxml2-python is &lt;2.7.6-0.77.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205644" version="1" comment="kernel-default is &lt;3.0.101-0.47.96" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205645" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.96" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205646" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.96" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205647" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.96" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205648" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.96" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205649" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.96" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205650" version="1" comment="kernel-pae is &lt;3.0.101-0.47.96" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205651" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.96" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205652" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.96" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205653" version="1" comment="kernel-source is &lt;3.0.101-0.47.96" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205654" version="1" comment="kernel-syms is &lt;3.0.101-0.47.96" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205655" version="1" comment="kernel-trace is &lt;3.0.101-0.47.96" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205656" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.96" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205657" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.96" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205658" version="1" comment="kernel-xen is &lt;3.0.101-0.47.96" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205659" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.96" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205660" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.96" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242811" version="1" comment="mailman is &lt;2.1.15-9.6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255760" version="1" comment="mailman is &lt;2.1.15-9.6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205661" version="1" comment="MozillaFirefox-translations is &lt;45.5.1esr-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205662" version="1" comment="libfreebl3 is &lt;3.21.3-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205663" version="1" comment="libsoftokn3 is &lt;3.21.3-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205664" version="1" comment="mozilla-nss-tools is &lt;3.21.3-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205665" version="1" comment="microcode_ctl is &lt;1.17-102.83.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205666" version="1" comment="microcode_ctl is &lt;1.17-102.83.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230751" version="1" comment="microcode_ctl is &lt;1.17-102.83.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232393" version="1" comment="microcode_ctl is &lt;1.17-102.83.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253519" version="1" comment="microcode_ctl is &lt;1.17-102.83.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260500" version="1" comment="microcode_ctl is &lt;1.17-102.83.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232734" version="1" comment="mutt is &lt;1.5.17-42.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205667" version="1" comment="libmysql55client18 is &lt;5.5.52-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205668" version="1" comment="libmysql55client_r18 is &lt;5.5.52-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205669" version="1" comment="mysql-client is &lt;5.5.52-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205670" version="1" comment="mysql-tools is &lt;5.5.52-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205671" version="1" comment="libmysql55client18 is &lt;5.5.54-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205672" version="1" comment="libmysql55client_r18 is &lt;5.5.54-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205673" version="1" comment="mysql-client is &lt;5.5.54-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205674" version="1" comment="mysql-tools is &lt;5.5.54-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205675" version="1" comment="libmysql55client18 is &lt;5.5.58-0.39.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205676" version="1" comment="libmysql55client_r18 is &lt;5.5.58-0.39.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205677" version="1" comment="mysql-client is &lt;5.5.58-0.39.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205678" version="1" comment="mysql-tools is &lt;5.5.58-0.39.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238392" version="1" comment="libmysql55client18 is &lt;5.5.62-0.39.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238393" version="1" comment="libmysql55client_r18 is &lt;5.5.62-0.39.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238394" version="1" comment="mysql-client is &lt;5.5.62-0.39.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238395" version="1" comment="mysql-tools is &lt;5.5.62-0.39.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257955" version="1" comment="libnetpbm10 is &lt;10.26.44-101.15.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257956" version="1" comment="netpbm is &lt;10.26.44-101.15.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205679" version="1" comment="ntp is &lt;4.2.8p9-48.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205680" version="1" comment="ntp-doc is &lt;4.2.8p9-48.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237961" version="1" comment="ntp is &lt;4.2.8p12-48.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237962" version="1" comment="ntp-doc is &lt;4.2.8p12-48.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246745" version="1" comment="ntp is &lt;4.2.8p13-48.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246746" version="1" comment="ntp-doc is &lt;4.2.8p13-48.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205681" version="1" comment="openssh is &lt;6.2p2-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205682" version="1" comment="openssh-askpass is &lt;6.2p2-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205683" version="1" comment="openssh-askpass-gnome is &lt;6.2p2-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205684" version="1" comment="openssh is &lt;6.2p2-0.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205685" version="1" comment="openssh-askpass is &lt;6.2p2-0.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205686" version="1" comment="openssh-askpass-gnome is &lt;6.2p2-0.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238396" version="1" comment="openssh is &lt;6.2p2-0.41.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238397" version="1" comment="openssh-askpass is &lt;6.2p2-0.41.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238398" version="1" comment="openssh-askpass-gnome is &lt;6.2p2-0.41.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247592" version="1" comment="openssh is &lt;6.6p1-41.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247593" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-41.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205687" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.102" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205688" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.102" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205689" version="1" comment="openssl-doc is &lt;0.9.8j-0.102" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205690" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205691" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205692" version="1" comment="openssl-doc is &lt;0.9.8j-0.105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231339" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231340" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231341" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242431" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242432" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242433" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257182" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.106.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257183" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257184" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257185" version="1" comment="openssl is &lt;0.9.8j-0.106.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257186" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264917" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.106.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264918" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264919" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264920" version="1" comment="openssl is &lt;0.9.8j-0.106.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264921" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205693" version="1" comment="openvpn is &lt;2.0.9-143.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205694" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205695" version="1" comment="openvpn is &lt;2.0.9-143.47.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205696" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.47.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205697" version="1" comment="patch is &lt;2.5.9-252.22.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230375" version="1" comment="perl-Module-Build is &lt;0.2808.01-0.81.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230376" version="1" comment="perl-Test-Simple is &lt;0.72-0.81.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230377" version="1" comment="perl-base is &lt;5.10.0-64.81.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230378" version="1" comment="perl-doc is &lt;5.10.0-64.81.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205698" version="1" comment="perl-XML-LibXML is &lt;1.66-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205699" version="1" comment="apache2-mod_php53 is &lt;5.3.17-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205700" version="1" comment="php53-bcmath is &lt;5.3.17-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205701" version="1" comment="php53-bz2 is &lt;5.3.17-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205702" version="1" comment="php53-calendar is &lt;5.3.17-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205703" version="1" comment="php53-ctype is &lt;5.3.17-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205704" version="1" comment="php53-curl is &lt;5.3.17-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205705" version="1" comment="php53-dba is &lt;5.3.17-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205706" version="1" comment="php53-dom is &lt;5.3.17-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205707" version="1" comment="php53-exif is &lt;5.3.17-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205708" version="1" comment="php53-fastcgi is &lt;5.3.17-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205709" version="1" comment="php53-fileinfo is &lt;5.3.17-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205710" version="1" comment="php53-ftp is &lt;5.3.17-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205711" version="1" comment="php53-gd is &lt;5.3.17-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205712" version="1" comment="php53-gettext is &lt;5.3.17-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205713" version="1" comment="php53-gmp is &lt;5.3.17-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205714" version="1" comment="php53-iconv is &lt;5.3.17-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205715" version="1" comment="php53-intl is &lt;5.3.17-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205716" version="1" comment="php53-json is &lt;5.3.17-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205717" version="1" comment="php53-ldap is &lt;5.3.17-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205718" version="1" comment="php53-mbstring is &lt;5.3.17-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205719" version="1" comment="php53-mcrypt is &lt;5.3.17-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205720" version="1" comment="php53-mysql is &lt;5.3.17-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205721" version="1" comment="php53-odbc is &lt;5.3.17-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205722" version="1" comment="php53-openssl is &lt;5.3.17-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205723" version="1" comment="php53-pcntl is &lt;5.3.17-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205724" version="1" comment="php53-pdo is &lt;5.3.17-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205725" version="1" comment="php53-pear is &lt;5.3.17-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205726" version="1" comment="php53-pgsql is &lt;5.3.17-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205727" version="1" comment="php53-pspell is &lt;5.3.17-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205728" version="1" comment="php53-shmop is &lt;5.3.17-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205729" version="1" comment="php53-snmp is &lt;5.3.17-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205730" version="1" comment="php53-soap is &lt;5.3.17-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205731" version="1" comment="php53-suhosin is &lt;5.3.17-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205732" version="1" comment="php53-sysvmsg is &lt;5.3.17-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205733" version="1" comment="php53-sysvsem is &lt;5.3.17-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205734" version="1" comment="php53-sysvshm is &lt;5.3.17-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205735" version="1" comment="php53-tokenizer is &lt;5.3.17-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205736" version="1" comment="php53-wddx is &lt;5.3.17-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205737" version="1" comment="php53-xmlreader is &lt;5.3.17-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205738" version="1" comment="php53-xmlrpc is &lt;5.3.17-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205739" version="1" comment="php53-xmlwriter is &lt;5.3.17-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205740" version="1" comment="php53-xsl is &lt;5.3.17-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205741" version="1" comment="php53-zip is &lt;5.3.17-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205742" version="1" comment="php53-zlib is &lt;5.3.17-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205743" version="1" comment="apache2-mod_php53 is &lt;5.3.17-101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205744" version="1" comment="php53-bcmath is &lt;5.3.17-101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205745" version="1" comment="php53-bz2 is &lt;5.3.17-101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205746" version="1" comment="php53-calendar is &lt;5.3.17-101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205747" version="1" comment="php53-ctype is &lt;5.3.17-101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205748" version="1" comment="php53-curl is &lt;5.3.17-101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205749" version="1" comment="php53-dba is &lt;5.3.17-101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205750" version="1" comment="php53-dom is &lt;5.3.17-101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205751" version="1" comment="php53-exif is &lt;5.3.17-101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205752" version="1" comment="php53-fastcgi is &lt;5.3.17-101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205753" version="1" comment="php53-fileinfo is &lt;5.3.17-101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205754" version="1" comment="php53-ftp is &lt;5.3.17-101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205755" version="1" comment="php53-gd is &lt;5.3.17-101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205756" version="1" comment="php53-gettext is &lt;5.3.17-101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205757" version="1" comment="php53-gmp is &lt;5.3.17-101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205758" version="1" comment="php53-iconv is &lt;5.3.17-101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205759" version="1" comment="php53-intl is &lt;5.3.17-101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205760" version="1" comment="php53-json is &lt;5.3.17-101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205761" version="1" comment="php53-ldap is &lt;5.3.17-101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205762" version="1" comment="php53-mbstring is &lt;5.3.17-101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205763" version="1" comment="php53-mcrypt is &lt;5.3.17-101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205764" version="1" comment="php53-mysql is &lt;5.3.17-101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205765" version="1" comment="php53-odbc is &lt;5.3.17-101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205766" version="1" comment="php53-openssl is &lt;5.3.17-101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205767" version="1" comment="php53-pcntl is &lt;5.3.17-101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205768" version="1" comment="php53-pdo is &lt;5.3.17-101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205769" version="1" comment="php53-pear is &lt;5.3.17-101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205770" version="1" comment="php53-pgsql is &lt;5.3.17-101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205771" version="1" comment="php53-pspell is &lt;5.3.17-101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205772" version="1" comment="php53-shmop is &lt;5.3.17-101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205773" version="1" comment="php53-snmp is &lt;5.3.17-101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205774" version="1" comment="php53-soap is &lt;5.3.17-101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205775" version="1" comment="php53-suhosin is &lt;5.3.17-101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205776" version="1" comment="php53-sysvmsg is &lt;5.3.17-101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205777" version="1" comment="php53-sysvsem is &lt;5.3.17-101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205778" version="1" comment="php53-sysvshm is &lt;5.3.17-101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205779" version="1" comment="php53-tokenizer is &lt;5.3.17-101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205780" version="1" comment="php53-wddx is &lt;5.3.17-101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205781" version="1" comment="php53-xmlreader is &lt;5.3.17-101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205782" version="1" comment="php53-xmlrpc is &lt;5.3.17-101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205783" version="1" comment="php53-xmlwriter is &lt;5.3.17-101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205784" version="1" comment="php53-xsl is &lt;5.3.17-101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205785" version="1" comment="php53-zip is &lt;5.3.17-101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205786" version="1" comment="php53-zlib is &lt;5.3.17-101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205787" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205788" version="1" comment="php53-bcmath is &lt;5.3.17-112.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205789" version="1" comment="php53-bz2 is &lt;5.3.17-112.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205790" version="1" comment="php53-calendar is &lt;5.3.17-112.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205791" version="1" comment="php53-ctype is &lt;5.3.17-112.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205792" version="1" comment="php53-curl is &lt;5.3.17-112.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205793" version="1" comment="php53-dba is &lt;5.3.17-112.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205794" version="1" comment="php53-dom is &lt;5.3.17-112.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205795" version="1" comment="php53-exif is &lt;5.3.17-112.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205796" version="1" comment="php53-fastcgi is &lt;5.3.17-112.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205797" version="1" comment="php53-fileinfo is &lt;5.3.17-112.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205798" version="1" comment="php53-ftp is &lt;5.3.17-112.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205799" version="1" comment="php53-gd is &lt;5.3.17-112.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205800" version="1" comment="php53-gettext is &lt;5.3.17-112.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205801" version="1" comment="php53-gmp is &lt;5.3.17-112.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205802" version="1" comment="php53-iconv is &lt;5.3.17-112.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205803" version="1" comment="php53-intl is &lt;5.3.17-112.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205804" version="1" comment="php53-json is &lt;5.3.17-112.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205805" version="1" comment="php53-ldap is &lt;5.3.17-112.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205806" version="1" comment="php53-mbstring is &lt;5.3.17-112.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205807" version="1" comment="php53-mcrypt is &lt;5.3.17-112.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205808" version="1" comment="php53-mysql is &lt;5.3.17-112.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205809" version="1" comment="php53-odbc is &lt;5.3.17-112.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205810" version="1" comment="php53-openssl is &lt;5.3.17-112.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205811" version="1" comment="php53-pcntl is &lt;5.3.17-112.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205812" version="1" comment="php53-pdo is &lt;5.3.17-112.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205813" version="1" comment="php53-pear is &lt;5.3.17-112.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205814" version="1" comment="php53-pgsql is &lt;5.3.17-112.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205815" version="1" comment="php53-pspell is &lt;5.3.17-112.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205816" version="1" comment="php53-shmop is &lt;5.3.17-112.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205817" version="1" comment="php53-snmp is &lt;5.3.17-112.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205818" version="1" comment="php53-soap is &lt;5.3.17-112.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205819" version="1" comment="php53-suhosin is &lt;5.3.17-112.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205820" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205821" version="1" comment="php53-sysvsem is &lt;5.3.17-112.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205822" version="1" comment="php53-sysvshm is &lt;5.3.17-112.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205823" version="1" comment="php53-tokenizer is &lt;5.3.17-112.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205824" version="1" comment="php53-wddx is &lt;5.3.17-112.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205825" version="1" comment="php53-xmlreader is &lt;5.3.17-112.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205826" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205827" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205828" version="1" comment="php53-xsl is &lt;5.3.17-112.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205829" version="1" comment="php53-zip is &lt;5.3.17-112.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205830" version="1" comment="php53-zlib is &lt;5.3.17-112.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205831" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205832" version="1" comment="php53-bcmath is &lt;5.3.17-112.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205833" version="1" comment="php53-bz2 is &lt;5.3.17-112.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205834" version="1" comment="php53-calendar is &lt;5.3.17-112.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205835" version="1" comment="php53-ctype is &lt;5.3.17-112.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205836" version="1" comment="php53-curl is &lt;5.3.17-112.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205837" version="1" comment="php53-dba is &lt;5.3.17-112.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205838" version="1" comment="php53-dom is &lt;5.3.17-112.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205839" version="1" comment="php53-exif is &lt;5.3.17-112.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205840" version="1" comment="php53-fastcgi is &lt;5.3.17-112.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205841" version="1" comment="php53-fileinfo is &lt;5.3.17-112.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205842" version="1" comment="php53-ftp is &lt;5.3.17-112.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205843" version="1" comment="php53-gd is &lt;5.3.17-112.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205844" version="1" comment="php53-gettext is &lt;5.3.17-112.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205845" version="1" comment="php53-gmp is &lt;5.3.17-112.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205846" version="1" comment="php53-iconv is &lt;5.3.17-112.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205847" version="1" comment="php53-intl is &lt;5.3.17-112.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205848" version="1" comment="php53-json is &lt;5.3.17-112.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205849" version="1" comment="php53-ldap is &lt;5.3.17-112.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205850" version="1" comment="php53-mbstring is &lt;5.3.17-112.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205851" version="1" comment="php53-mcrypt is &lt;5.3.17-112.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205852" version="1" comment="php53-mysql is &lt;5.3.17-112.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205853" version="1" comment="php53-odbc is &lt;5.3.17-112.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205854" version="1" comment="php53-openssl is &lt;5.3.17-112.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205855" version="1" comment="php53-pcntl is &lt;5.3.17-112.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205856" version="1" comment="php53-pdo is &lt;5.3.17-112.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205857" version="1" comment="php53-pear is &lt;5.3.17-112.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205858" version="1" comment="php53-pgsql is &lt;5.3.17-112.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205859" version="1" comment="php53-pspell is &lt;5.3.17-112.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205860" version="1" comment="php53-shmop is &lt;5.3.17-112.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205861" version="1" comment="php53-snmp is &lt;5.3.17-112.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205862" version="1" comment="php53-soap is &lt;5.3.17-112.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205863" version="1" comment="php53-suhosin is &lt;5.3.17-112.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205864" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205865" version="1" comment="php53-sysvsem is &lt;5.3.17-112.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205866" version="1" comment="php53-sysvshm is &lt;5.3.17-112.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205867" version="1" comment="php53-tokenizer is &lt;5.3.17-112.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205868" version="1" comment="php53-wddx is &lt;5.3.17-112.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205869" version="1" comment="php53-xmlreader is &lt;5.3.17-112.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205870" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205871" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205872" version="1" comment="php53-xsl is &lt;5.3.17-112.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205873" version="1" comment="php53-zip is &lt;5.3.17-112.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205874" version="1" comment="php53-zlib is &lt;5.3.17-112.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247299" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247300" version="1" comment="php53-bcmath is &lt;5.3.17-112.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247301" version="1" comment="php53-bz2 is &lt;5.3.17-112.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247302" version="1" comment="php53-calendar is &lt;5.3.17-112.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247303" version="1" comment="php53-ctype is &lt;5.3.17-112.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247304" version="1" comment="php53-curl is &lt;5.3.17-112.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247305" version="1" comment="php53-dba is &lt;5.3.17-112.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247306" version="1" comment="php53-dom is &lt;5.3.17-112.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247307" version="1" comment="php53-exif is &lt;5.3.17-112.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247308" version="1" comment="php53-fastcgi is &lt;5.3.17-112.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247309" version="1" comment="php53-fileinfo is &lt;5.3.17-112.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247310" version="1" comment="php53-ftp is &lt;5.3.17-112.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247311" version="1" comment="php53-gd is &lt;5.3.17-112.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247312" version="1" comment="php53-gettext is &lt;5.3.17-112.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247313" version="1" comment="php53-gmp is &lt;5.3.17-112.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247314" version="1" comment="php53-iconv is &lt;5.3.17-112.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247315" version="1" comment="php53-intl is &lt;5.3.17-112.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247316" version="1" comment="php53-json is &lt;5.3.17-112.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247317" version="1" comment="php53-ldap is &lt;5.3.17-112.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247318" version="1" comment="php53-mbstring is &lt;5.3.17-112.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247319" version="1" comment="php53-mcrypt is &lt;5.3.17-112.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247320" version="1" comment="php53-mysql is &lt;5.3.17-112.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247321" version="1" comment="php53-odbc is &lt;5.3.17-112.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247322" version="1" comment="php53-openssl is &lt;5.3.17-112.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247323" version="1" comment="php53-pcntl is &lt;5.3.17-112.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247324" version="1" comment="php53-pdo is &lt;5.3.17-112.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247325" version="1" comment="php53-pear is &lt;5.3.17-112.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247326" version="1" comment="php53-pgsql is &lt;5.3.17-112.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247327" version="1" comment="php53-pspell is &lt;5.3.17-112.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247328" version="1" comment="php53-shmop is &lt;5.3.17-112.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247329" version="1" comment="php53-snmp is &lt;5.3.17-112.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247330" version="1" comment="php53-soap is &lt;5.3.17-112.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247331" version="1" comment="php53-suhosin is &lt;5.3.17-112.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247332" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247333" version="1" comment="php53-sysvsem is &lt;5.3.17-112.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247334" version="1" comment="php53-sysvshm is &lt;5.3.17-112.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247335" version="1" comment="php53-tokenizer is &lt;5.3.17-112.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247336" version="1" comment="php53-wddx is &lt;5.3.17-112.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247337" version="1" comment="php53-xmlreader is &lt;5.3.17-112.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247338" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247339" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247340" version="1" comment="php53-xsl is &lt;5.3.17-112.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247341" version="1" comment="php53-zip is &lt;5.3.17-112.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247342" version="1" comment="php53-zlib is &lt;5.3.17-112.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263528" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263529" version="1" comment="php53 is &lt;5.3.17-112.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263530" version="1" comment="php53-bcmath is &lt;5.3.17-112.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263531" version="1" comment="php53-bz2 is &lt;5.3.17-112.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263532" version="1" comment="php53-calendar is &lt;5.3.17-112.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263533" version="1" comment="php53-ctype is &lt;5.3.17-112.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263534" version="1" comment="php53-curl is &lt;5.3.17-112.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263535" version="1" comment="php53-dba is &lt;5.3.17-112.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263536" version="1" comment="php53-dom is &lt;5.3.17-112.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263537" version="1" comment="php53-exif is &lt;5.3.17-112.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263538" version="1" comment="php53-fastcgi is &lt;5.3.17-112.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263539" version="1" comment="php53-fileinfo is &lt;5.3.17-112.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263540" version="1" comment="php53-ftp is &lt;5.3.17-112.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263541" version="1" comment="php53-gd is &lt;5.3.17-112.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263542" version="1" comment="php53-gettext is &lt;5.3.17-112.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263543" version="1" comment="php53-gmp is &lt;5.3.17-112.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263544" version="1" comment="php53-iconv is &lt;5.3.17-112.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263545" version="1" comment="php53-intl is &lt;5.3.17-112.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263546" version="1" comment="php53-json is &lt;5.3.17-112.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263547" version="1" comment="php53-ldap is &lt;5.3.17-112.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263548" version="1" comment="php53-mbstring is &lt;5.3.17-112.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263549" version="1" comment="php53-mcrypt is &lt;5.3.17-112.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263550" version="1" comment="php53-mysql is &lt;5.3.17-112.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263551" version="1" comment="php53-odbc is &lt;5.3.17-112.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263552" version="1" comment="php53-openssl is &lt;5.3.17-112.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263553" version="1" comment="php53-pcntl is &lt;5.3.17-112.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263554" version="1" comment="php53-pdo is &lt;5.3.17-112.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263555" version="1" comment="php53-pear is &lt;5.3.17-112.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263556" version="1" comment="php53-pgsql is &lt;5.3.17-112.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263557" version="1" comment="php53-pspell is &lt;5.3.17-112.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263558" version="1" comment="php53-shmop is &lt;5.3.17-112.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263559" version="1" comment="php53-snmp is &lt;5.3.17-112.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263560" version="1" comment="php53-soap is &lt;5.3.17-112.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263561" version="1" comment="php53-suhosin is &lt;5.3.17-112.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263562" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263563" version="1" comment="php53-sysvsem is &lt;5.3.17-112.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263564" version="1" comment="php53-sysvshm is &lt;5.3.17-112.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263565" version="1" comment="php53-tokenizer is &lt;5.3.17-112.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263566" version="1" comment="php53-wddx is &lt;5.3.17-112.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263567" version="1" comment="php53-xmlreader is &lt;5.3.17-112.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263568" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263569" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263570" version="1" comment="php53-xsl is &lt;5.3.17-112.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263571" version="1" comment="php53-zip is &lt;5.3.17-112.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263572" version="1" comment="php53-zlib is &lt;5.3.17-112.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205875" version="1" comment="libecpg6 is &lt;9.4.13-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205876" version="1" comment="libpq5 is &lt;9.4.13-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205877" version="1" comment="postgresql94 is &lt;9.4.13-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205878" version="1" comment="postgresql94-contrib is &lt;9.4.13-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205879" version="1" comment="postgresql94-docs is &lt;9.4.13-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205880" version="1" comment="postgresql94-server is &lt;9.4.13-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232735" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232736" version="1" comment="python-curses is &lt;2.6.9-40.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232737" version="1" comment="python-xml is &lt;2.6.9-40.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251184" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251185" version="1" comment="python is &lt;2.6.9-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251186" version="1" comment="python-base is &lt;2.6.9-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251187" version="1" comment="python-curses is &lt;2.6.9-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251188" version="1" comment="python-demo is &lt;2.6.9-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251189" version="1" comment="python-doc is &lt;2.6-8.40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251190" version="1" comment="python-doc-pdf is &lt;2.6-8.40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251191" version="1" comment="python-gdbm is &lt;2.6.9-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251192" version="1" comment="python-idle is &lt;2.6.9-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251193" version="1" comment="python-tk is &lt;2.6.9-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251194" version="1" comment="python-xml is &lt;2.6.9-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261357" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261358" version="1" comment="python is &lt;2.6.9-40.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261359" version="1" comment="python-base is &lt;2.6.9-40.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261360" version="1" comment="python-curses is &lt;2.6.9-40.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261361" version="1" comment="python-demo is &lt;2.6.9-40.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261362" version="1" comment="python-doc is &lt;2.6-8.40.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261363" version="1" comment="python-doc-pdf is &lt;2.6-8.40.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261364" version="1" comment="python-gdbm is &lt;2.6.9-40.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261365" version="1" comment="python-idle is &lt;2.6.9-40.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261366" version="1" comment="python-tk is &lt;2.6.9-40.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261367" version="1" comment="python-xml is &lt;2.6.9-40.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245814" version="1" comment="python-numpy is &lt;1.3.0-1.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205881" version="1" comment="ldapsmb is &lt;1.34b-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205882" version="1" comment="libldb1 is &lt;3.6.3-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205883" version="1" comment="libsmbclient0 is &lt;3.6.3-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205884" version="1" comment="libtalloc2 is &lt;3.6.3-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205885" version="1" comment="libtdb1 is &lt;3.6.3-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205886" version="1" comment="libtevent0 is &lt;3.6.3-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205887" version="1" comment="libwbclient0 is &lt;3.6.3-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205888" version="1" comment="samba-client is &lt;3.6.3-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205889" version="1" comment="samba-doc is &lt;3.6.3-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205890" version="1" comment="samba-krb-printing is &lt;3.6.3-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205891" version="1" comment="samba-winbind is &lt;3.6.3-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205892" version="1" comment="ldapsmb is &lt;1.34b-90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205893" version="1" comment="libldb1 is &lt;3.6.3-90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205894" version="1" comment="libsmbclient0 is &lt;3.6.3-90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205895" version="1" comment="libtalloc2 is &lt;3.6.3-90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205896" version="1" comment="libtdb1 is &lt;3.6.3-90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205897" version="1" comment="libtevent0 is &lt;3.6.3-90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205898" version="1" comment="libwbclient0 is &lt;3.6.3-90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205899" version="1" comment="samba-client is &lt;3.6.3-90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205900" version="1" comment="samba-doc is &lt;3.6.3-90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205901" version="1" comment="samba-krb-printing is &lt;3.6.3-90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205902" version="1" comment="samba-winbind is &lt;3.6.3-90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205903" version="1" comment="ldapsmb is &lt;1.34b-93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205904" version="1" comment="libldb1 is &lt;3.6.3-93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205905" version="1" comment="libsmbclient0 is &lt;3.6.3-93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205906" version="1" comment="libtalloc2 is &lt;3.6.3-93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205907" version="1" comment="libtdb1 is &lt;3.6.3-93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205908" version="1" comment="libtevent0 is &lt;3.6.3-93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205909" version="1" comment="libwbclient0 is &lt;3.6.3-93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205910" version="1" comment="samba-client is &lt;3.6.3-93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205911" version="1" comment="samba-doc is &lt;3.6.3-93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205912" version="1" comment="samba-krb-printing is &lt;3.6.3-93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205913" version="1" comment="samba-winbind is &lt;3.6.3-93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205914" version="1" comment="ldapsmb is &lt;1.34b-94.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205915" version="1" comment="libldb1 is &lt;3.6.3-94.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205916" version="1" comment="libsmbclient0 is &lt;3.6.3-94.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205917" version="1" comment="libtalloc2 is &lt;3.6.3-94.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205918" version="1" comment="libtdb1 is &lt;3.6.3-94.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205919" version="1" comment="libtevent0 is &lt;3.6.3-94.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205920" version="1" comment="libwbclient0 is &lt;3.6.3-94.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205921" version="1" comment="samba-client is &lt;3.6.3-94.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205922" version="1" comment="samba-doc is &lt;3.6.3-94.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205923" version="1" comment="samba-krb-printing is &lt;3.6.3-94.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205924" version="1" comment="samba-winbind is &lt;3.6.3-94.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205925" version="1" comment="ldapsmb is &lt;1.34b-94.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205926" version="1" comment="libldb1 is &lt;3.6.3-94.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205927" version="1" comment="libsmbclient0 is &lt;3.6.3-94.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205928" version="1" comment="libtalloc2 is &lt;3.6.3-94.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205929" version="1" comment="libtdb1 is &lt;3.6.3-94.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205930" version="1" comment="libtevent0 is &lt;3.6.3-94.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205931" version="1" comment="libwbclient0 is &lt;3.6.3-94.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205932" version="1" comment="samba-client is &lt;3.6.3-94.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205933" version="1" comment="samba-doc is &lt;3.6.3-94.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205934" version="1" comment="samba-krb-printing is &lt;3.6.3-94.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205935" version="1" comment="samba-winbind is &lt;3.6.3-94.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232174" version="1" comment="ldapsmb is &lt;1.34b-94.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232175" version="1" comment="libldb1 is &lt;3.6.3-94.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232176" version="1" comment="libsmbclient0 is &lt;3.6.3-94.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232177" version="1" comment="libtalloc2 is &lt;3.6.3-94.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232178" version="1" comment="libtdb1 is &lt;3.6.3-94.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232179" version="1" comment="libtevent0 is &lt;3.6.3-94.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232180" version="1" comment="libwbclient0 is &lt;3.6.3-94.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232181" version="1" comment="samba-client is &lt;3.6.3-94.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232182" version="1" comment="samba-doc is &lt;3.6.3-94.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232183" version="1" comment="samba-krb-printing is &lt;3.6.3-94.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232184" version="1" comment="samba-winbind is &lt;3.6.3-94.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253256" version="1" comment="ldapsmb is &lt;1.34b-94.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253257" version="1" comment="libldb1 is &lt;3.6.3-94.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253258" version="1" comment="libsmbclient0 is &lt;3.6.3-94.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253259" version="1" comment="libtalloc2 is &lt;3.6.3-94.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253260" version="1" comment="libtdb1 is &lt;3.6.3-94.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253261" version="1" comment="libtevent0 is &lt;3.6.3-94.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253262" version="1" comment="libwbclient0 is &lt;3.6.3-94.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253263" version="1" comment="samba is &lt;3.6.3-94.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253264" version="1" comment="samba-client is &lt;3.6.3-94.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253265" version="1" comment="samba-doc is &lt;3.6.3-94.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253266" version="1" comment="samba-krb-printing is &lt;3.6.3-94.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253267" version="1" comment="samba-winbind is &lt;3.6.3-94.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246747" version="1" comment="libsqlite3-0 is &lt;3.7.6.3-1.4.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256844" version="1" comment="libsqlite3-0 is &lt;3.7.6.3-1.4.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256845" version="1" comment="sqlite3 is &lt;3.7.6.3-1.4.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245815" version="1" comment="supportutils is &lt;1.20-122.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246748" version="1" comment="libtiff3 is &lt;3.8.2-141.169.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205936" version="1" comment="tomcat6 is &lt;6.0.53-0.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205937" version="1" comment="tomcat6-admin-webapps is &lt;6.0.53-0.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205938" version="1" comment="tomcat6-docs-webapp is &lt;6.0.53-0.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205939" version="1" comment="tomcat6-javadoc is &lt;6.0.53-0.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205940" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.53-0.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205941" version="1" comment="tomcat6-lib is &lt;6.0.53-0.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205942" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.53-0.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205943" version="1" comment="tomcat6-webapps is &lt;6.0.53-0.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205944" version="1" comment="unrar is &lt;3.80.2-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256642" version="1" comment="gvim is &lt;7.2-8.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256643" version="1" comment="vim is &lt;7.2-8.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256644" version="1" comment="vim-base is &lt;7.2-8.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256645" version="1" comment="vim-data is &lt;7.2-8.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205945" version="1" comment="wget is &lt;1.11.4-1.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205946" version="1" comment="wpa_supplicant is &lt;0.7.1-6.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205947" version="1" comment="xen is &lt;4.2.5_21-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205948" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.86-27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205949" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.86-27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205950" version="1" comment="xen-libs is &lt;4.2.5_21-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205951" version="1" comment="xen-tools-domU is &lt;4.2.5_21-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205952" version="1" comment="xen is &lt;4.2.5_21-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205953" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.90-30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205954" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.90-30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205955" version="1" comment="xen-libs is &lt;4.2.5_21-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205956" version="1" comment="xen-tools-domU is &lt;4.2.5_21-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205957" version="1" comment="xen is &lt;4.2.5_21-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205958" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.96-35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205959" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.96-35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205960" version="1" comment="xen-libs is &lt;4.2.5_21-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205961" version="1" comment="xen-tools-domU is &lt;4.2.5_21-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205962" version="1" comment="xen is &lt;4.2.5_21-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205963" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.99-38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205964" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.99-38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205965" version="1" comment="xen-libs is &lt;4.2.5_21-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205966" version="1" comment="xen-tools-domU is &lt;4.2.5_21-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205967" version="1" comment="xen is &lt;4.2.5_21-41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205968" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.99-41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205969" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.99-41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205970" version="1" comment="xen-libs is &lt;4.2.5_21-41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205971" version="1" comment="xen-tools-domU is &lt;4.2.5_21-41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205972" version="1" comment="xen is &lt;4.2.5_21-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205973" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.102-44" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205974" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.102-44" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205975" version="1" comment="xen-libs is &lt;4.2.5_21-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205976" version="1" comment="xen-tools-domU is &lt;4.2.5_21-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205977" version="1" comment="xen is &lt;4.2.5_21-45.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205978" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.105-45.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205979" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.105-45.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205980" version="1" comment="xen-libs is &lt;4.2.5_21-45.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205981" version="1" comment="xen-tools-domU is &lt;4.2.5_21-45.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205982" version="1" comment="xen is &lt;4.2.5_21-45.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205983" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.105-45.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205984" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.105-45.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205985" version="1" comment="xen-libs is &lt;4.2.5_21-45.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205986" version="1" comment="xen-tools-domU is &lt;4.2.5_21-45.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205987" version="1" comment="xen is &lt;4.2.5_21-45.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205988" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.106.5-45.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205989" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.106.5-45.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205990" version="1" comment="xen-libs is &lt;4.2.5_21-45.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205991" version="1" comment="xen-tools-domU is &lt;4.2.5_21-45.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205992" version="1" comment="xen is &lt;4.2.5_21-45.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205993" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.106.8-45.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205994" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.106.8-45.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205995" version="1" comment="xen-libs is &lt;4.2.5_21-45.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205996" version="1" comment="xen-tools-domU is &lt;4.2.5_21-45.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205997" version="1" comment="xen is &lt;4.2.5_21-45.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205998" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.106.14-45.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009205999" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.106.14-45.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206000" version="1" comment="xen-libs is &lt;4.2.5_21-45.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206001" version="1" comment="xen-tools-domU is &lt;4.2.5_21-45.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206002" version="1" comment="xen is &lt;4.2.5_21-45.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206003" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.106.19-45.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206004" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.106.19-45.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206005" version="1" comment="xen-libs is &lt;4.2.5_21-45.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206006" version="1" comment="xen-tools-domU is &lt;4.2.5_21-45.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233376" version="1" comment="xen is &lt;4.2.5_21-45.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233377" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.106.43-45.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233378" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.106.43-45.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233379" version="1" comment="xen-libs is &lt;4.2.5_21-45.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233380" version="1" comment="xen-tools-domU is &lt;4.2.5_21-45.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246953" version="1" comment="xen is &lt;4.2.5_21-45.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246954" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.106.59-45.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246955" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.106.59-45.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246956" version="1" comment="xen-libs is &lt;4.2.5_21-45.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246957" version="1" comment="xen-tools-domU is &lt;4.2.5_21-45.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206007" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.121" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206008" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.121" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238169" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.122.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238170" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.122.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206009" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.19_2.6.33.5_rt23_0.4-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117406" version="1" comment="SUSE-Linux-Enterprise-RT-release is ==11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206010" version="1" comment="brocade-bna-kmp-rt is &lt;2.1.0.0_2.6.33.20_rt31_0.5-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206011" version="1" comment="cluster-network-kmp-rt is &lt;1.4_2.6.33.20_rt31_0.5-2.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206012" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_2.6.33.20_rt31_0.5-2.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206013" version="1" comment="drbd-kmp-rt is &lt;8.3.11_2.6.33.20_rt31_0.5-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206014" version="1" comment="drbd-kmp-rt_trace is &lt;8.3.11_2.6.33.20_rt31_0.5-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206015" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.19_2.6.33.20_rt31_0.5-0.9.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206016" version="1" comment="kernel-rt is &lt;2.6.33.20-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206017" version="1" comment="kernel-rt-base is &lt;2.6.33.20-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206018" version="1" comment="kernel-rt-devel is &lt;2.6.33.20-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206019" version="1" comment="kernel-rt_trace is &lt;2.6.33.20-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206020" version="1" comment="kernel-rt_trace-base is &lt;2.6.33.20-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206021" version="1" comment="kernel-rt_trace-devel is &lt;2.6.33.20-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206022" version="1" comment="kernel-source-rt is &lt;2.6.33.20-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206023" version="1" comment="kernel-syms-rt is &lt;2.6.33.20-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206024" version="1" comment="ocfs2-kmp-rt is &lt;1.6_2.6.33.20_rt31_0.5-0.4.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206025" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_2.6.33.20_rt31_0.5-0.4.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206026" version="1" comment="ofed-kmp-rt is &lt;1.5.2_2.6.33.20_rt31_0.5-0.9.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206027" version="1" comment="ofed-kmp-rt is &lt;1.5.2_2.6.33.18_rt31_0.3-0.9.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206028" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.101_rt130_0.7.9-2.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206029" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.101_rt130_0.7.9-2.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206030" version="1" comment="drbd-kmp-rt is &lt;8.4.2_3.0.101_rt130_0.7.9-0.6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206031" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.2_3.0.101_rt130_0.7.9-0.6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206032" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.101_rt130_0.7.9-0.25.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206033" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.101_rt130_0.7.9-0.25.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206034" version="1" comment="kernel-rt is &lt;3.0.101.rt130-0.7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206035" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-0.7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206036" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-0.7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206037" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-0.7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206038" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-0.7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206039" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-0.7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206040" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-0.7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206041" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-0.7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206042" version="1" comment="lttng-modules-kmp-rt is &lt;2.0.4_3.0.101_rt130_0.7.9-0.9.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206043" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.0.4_3.0.101_rt130_0.7.9-0.9.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206044" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.101_rt130_0.7.9-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206045" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.101_rt130_0.7.9-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206046" version="1" comment="ofed-kmp-rt is &lt;1.5.2_3.0.101_rt130_0.7.9-0.28.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206047" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.2_3.0.101_rt130_0.7.9-0.28.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117407" version="1" comment="SUSE-Linux-Enterprise-RT-release is ==11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206048" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.101_rt130_0.28-2.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206049" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.101_rt130_0.28-2.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206050" version="1" comment="drbd-kmp-rt is &lt;8.4.4_3.0.101_rt130_0.28-0.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206051" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.4_3.0.101_rt130_0.28-0.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206052" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.101_rt130_0.28-0.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206053" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.101_rt130_0.28-0.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206054" version="1" comment="kernel-rt is &lt;3.0.101.rt130-0.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206055" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-0.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206056" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-0.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206057" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-0.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206058" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-0.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206059" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-0.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206060" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-0.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206061" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-0.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206062" version="1" comment="lttng-modules-kmp-rt is &lt;2.1.1_3.0.101_rt130_0.28-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206063" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.1.1_3.0.101_rt130_0.28-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206064" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.101_rt130_0.28-0.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206065" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.101_rt130_0.28-0.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206066" version="1" comment="ofed-kmp-rt is &lt;1.5.4.1_3.0.101_rt130_0.28-0.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206067" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.4.1_3.0.101_rt130_0.28-0.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117408" version="1" comment="SUSE-Linux-Enterprise-RT-release is ==11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206068" version="1" comment="kernel-rt is &lt;3.0.101.rt130-0.33.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206069" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-0.33.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206070" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-0.33.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206071" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-0.33.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206072" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-0.33.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206073" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-0.33.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206074" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-0.33.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206075" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-0.33.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206076" version="1" comment="kernel-rt is &lt;3.0.101.rt130-0.33.44" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206077" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-0.33.44" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206078" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-0.33.44" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206079" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-0.33.44" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206080" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-0.33.44" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206081" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-0.33.44" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206082" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-0.33.44" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206083" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-0.33.44" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206084" version="1" comment="kernel-rt is &lt;3.0.101.rt130-68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206085" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206086" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206087" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206088" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206089" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206090" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206091" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118646" version="1" comment="SUSE-Linux-Enterprise-RT-release is ==11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206092" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.101_rt130_68-2.32.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206093" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.101_rt130_68-2.32.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206094" version="1" comment="drbd-kmp-rt is &lt;8.4.4_3.0.101_rt130_68-0.27.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206095" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.4_3.0.101_rt130_68-0.27.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206096" version="1" comment="gfs2-kmp-rt is &lt;2_3.0.101_rt130_68-0.24.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206097" version="1" comment="gfs2-kmp-rt_trace is &lt;2_3.0.101_rt130_68-0.24.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206098" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.101_rt130_68-0.28.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206099" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.101_rt130_68-0.28.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206100" version="1" comment="kernel-rt is &lt;3.0.101.rt130-69.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206101" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-69.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206102" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-69.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206103" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-69.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206104" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-69.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206105" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-69.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206106" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-69.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206107" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-69.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206108" version="1" comment="kernel-rt is &lt;3.0.101.rt130-51" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206109" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-51" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206110" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-51" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206111" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-51" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206112" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-51" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206113" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-51" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206114" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-51" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206115" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-51" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206116" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.101_rt130_69.14-2.32.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206117" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.101_rt130_69.14-2.32.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206118" version="1" comment="drbd-kmp-rt is &lt;8.4.4_3.0.101_rt130_69.14-0.27.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206119" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.4_3.0.101_rt130_69.14-0.27.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206120" version="1" comment="gfs2-kmp-rt is &lt;2_3.0.101_rt130_69.14-0.24.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206121" version="1" comment="gfs2-kmp-rt_trace is &lt;2_3.0.101_rt130_69.14-0.24.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206122" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.101_rt130_69.14-0.28.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206123" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.101_rt130_69.14-0.28.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245909" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.101_rt130_69.42-0.28.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245910" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.101_rt130_69.42-0.28.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206124" version="1" comment="kernel-rt is &lt;3.0.101.rt130-54" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206125" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-54" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206126" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-54" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206127" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-54" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206128" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-54" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206129" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-54" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206130" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-54" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206131" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-54" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206132" version="1" comment="kernel-rt is &lt;3.0.101.rt130-69.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206133" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-69.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206134" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-69.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206135" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-69.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206136" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-69.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206137" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-69.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206138" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-69.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206139" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-69.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206140" version="1" comment="kernel-rt is &lt;3.0.101.rt130-45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206141" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206142" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206143" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206144" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206145" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206146" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206147" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-45" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206148" version="1" comment="kernel-rt is &lt;3.0.101.rt130-48" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206149" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-48" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206150" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-48" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206151" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-48" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206152" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-48" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206153" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-48" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206154" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-48" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206155" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-48" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206156" version="1" comment="kernel-rt is &lt;3.0.101.rt130-69.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206157" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-69.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206158" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-69.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206159" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-69.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206160" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-69.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206161" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-69.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206162" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-69.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206163" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-69.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206164" version="1" comment="kernel-rt is &lt;3.0.101.rt130-69.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206165" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-69.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206166" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-69.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206167" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-69.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206168" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-69.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206169" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-69.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206170" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-69.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206171" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-69.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206172" version="1" comment="kernel-rt is &lt;3.0.101.rt130-69.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206173" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-69.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206174" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-69.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206175" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-69.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206176" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-69.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206177" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-69.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206178" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-69.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206179" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-69.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234094" version="1" comment="kernel-rt is &lt;3.0.101.rt130-69.33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234095" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-69.33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234096" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-69.33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234097" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-69.33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234098" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-69.33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234099" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-69.33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234100" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-69.33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234101" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-69.33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206180" version="1" comment="kernel-rt is &lt;3.0.101.rt130-65" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206181" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-65" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206182" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-65" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206183" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-65" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206184" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-65" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206185" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-65" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206186" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-65" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206187" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-65" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229609" version="1" comment="kernel-rt is &lt;3.0.101.rt130-69.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229610" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-69.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229611" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-69.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229612" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-69.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229613" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-69.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229614" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-69.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229615" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-69.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229616" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-69.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231231" version="1" comment="kernel-rt is &lt;3.0.101.rt130-69.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231232" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-69.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231233" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-69.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231234" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-69.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231235" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-69.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231236" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-69.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231237" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-69.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231238" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-69.30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240626" version="1" comment="kernel-rt is &lt;3.0.101.rt130-69.39" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240627" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-69.39" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240628" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-69.39" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240629" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-69.39" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240630" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-69.39" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240631" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-69.39" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240632" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-69.39" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240633" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-69.39" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229358" version="1" comment="iscsitarget is &lt;1.4.20-0.43.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229359" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.101_rt130_69.24-0.43.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229360" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.101_rt130_69.24-0.43.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229361" version="1" comment="ofed-kmp-rt is &lt;1.5.4.1_3.0.101_rt130_69.24-22.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229362" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.4.1_3.0.101_rt130_69.24-22.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246614" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.101_rt130_69.42-2.32.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246615" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.101_rt130_69.42-2.32.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246616" version="1" comment="drbd-kmp-rt is &lt;8.4.4_3.0.101_rt130_69.42-0.27.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246617" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.4_3.0.101_rt130_69.42-0.27.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246618" version="1" comment="gfs2-kmp-rt is &lt;2_3.0.101_rt130_69.42-0.24.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246619" version="1" comment="gfs2-kmp-rt_trace is &lt;2_3.0.101_rt130_69.42-0.24.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246620" version="1" comment="iscsitarget is &lt;1.4.20-0.43.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246621" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.101_rt130_69.42-0.43.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246622" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.101_rt130_69.42-0.43.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246623" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.101_rt130_69.42-0.28.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246624" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.101_rt130_69.42-0.28.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246625" version="1" comment="ofed-kmp-rt is &lt;1.5.4.1_3.0.101_rt130_69.42-22.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246626" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.4.1_3.0.101_rt130_69.42-22.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206188" version="1" comment="kernel-rt is &lt;3.0.101.rt130-57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206189" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206190" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206191" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206192" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206193" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206194" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206195" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236807" version="1" comment="kernel-rt is &lt;3.0.101.rt130-69.36" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236808" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-69.36" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236809" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-69.36" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236810" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-69.36" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236811" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-69.36" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236812" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-69.36" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236813" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-69.36" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236814" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-69.36" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206196" version="1" comment="kernel-rt is &lt;3.0.101.rt130-69.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206197" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-69.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206198" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-69.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206199" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-69.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206200" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-69.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206201" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-69.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206202" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-69.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206203" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-69.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258808" version="1" comment="SLES_SAP-release is ==11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206204" version="1" comment="java-1_4_2-ibm-sap is &lt;1.4.2_sr13.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206205" version="1" comment="java-1_4_2-ibm-sap-devel is &lt;1.4.2_sr13.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258809" version="1" comment="SLES_SAP-release is ==11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206206" version="1" comment="sap_suse_cluster_connector is &lt;1.0.0-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258810" version="1" comment="SLES_SAP-release is ==11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206207" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206208" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206209" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206210" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206211" version="1" comment="clamsap is &lt;0.98.9-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258811" version="1" comment="SLES_SAP-release is ==11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206212" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206213" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233697" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.51.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233698" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.51.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241197" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.51.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241198" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.51.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206214" version="1" comment="rhn-virtualization-common is &lt;5.4.15-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206215" version="1" comment="rhn-virtualization-host is &lt;5.4.15-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206216" version="1" comment="rhncfg is &lt;5.9.33-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206217" version="1" comment="rhncfg-actions is &lt;5.9.33-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206218" version="1" comment="rhncfg-client is &lt;5.9.33-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206219" version="1" comment="rhncfg-management is &lt;5.9.33-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206220" version="1" comment="koan is &lt;2.0.10-0.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206221" version="1" comment="rhnmd is &lt;5.3.7-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206222" version="1" comment="spacewalk-backend-libs is &lt;1.2.74-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206223" version="1" comment="spacewalk-certs-tools is &lt;1.2.2-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206224" version="1" comment="spacewalk-backend-libs is &lt;1.2.74-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206225" version="1" comment="rhnlib is &lt;2.5.84.4-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206226" version="1" comment="spacecmd is &lt;2.5.5.5-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206227" version="1" comment="spacewalk-backend is &lt;2.5.24.9-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206228" version="1" comment="spacewalk-backend-libs is &lt;2.5.24.9-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206229" version="1" comment="spacewalk-check is &lt;2.5.13.8-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206230" version="1" comment="spacewalk-client-setup is &lt;2.5.13.8-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206231" version="1" comment="spacewalk-client-tools is &lt;2.5.13.8-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263758" version="1" comment="mgr-cfg is &lt;4.0.9-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263759" version="1" comment="mgr-cfg-actions is &lt;4.0.9-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263760" version="1" comment="mgr-cfg-client is &lt;4.0.9-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263761" version="1" comment="mgr-cfg-management is &lt;4.0.9-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263762" version="1" comment="mgr-daemon is &lt;4.0.7-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263763" version="1" comment="mgr-osad is &lt;4.0.9-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263764" version="1" comment="mgr-virtualization is &lt;4.0.8-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263765" version="1" comment="mgr-virtualization-host is &lt;4.0.8-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263766" version="1" comment="python2-mgr-cfg is &lt;4.0.9-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263767" version="1" comment="python2-mgr-cfg-actions is &lt;4.0.9-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263768" version="1" comment="python2-mgr-cfg-client is &lt;4.0.9-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263769" version="1" comment="python2-mgr-cfg-management is &lt;4.0.9-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263770" version="1" comment="python2-mgr-osa-common is &lt;4.0.9-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263771" version="1" comment="python2-mgr-osad is &lt;4.0.9-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263772" version="1" comment="python2-mgr-virtualization-common is &lt;4.0.8-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263773" version="1" comment="python2-mgr-virtualization-host is &lt;4.0.8-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263774" version="1" comment="python2-rhnlib is &lt;4.0.11-12.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263775" version="1" comment="rhnlib is &lt;4.0.11-12.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263776" version="1" comment="spacecmd is &lt;4.0.14-18.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263777" version="1" comment="spacewalk-backend is &lt;4.0.25-28.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263778" version="1" comment="spacewalk-backend-libs is &lt;4.0.25-28.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263779" version="1" comment="spacewalk-remote-utils is &lt;4.0.5-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229363" version="1" comment="cobbler is &lt;2.2.2-0.68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229364" version="1" comment="koan is &lt;2.2.2-0.68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233712" version="1" comment="cobbler is &lt;2.2.2-0.68.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233713" version="1" comment="koan is &lt;2.2.2-0.68.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206232" version="1" comment="python-pycrypto is &lt;2.6.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206233" version="1" comment="salt is &lt;2016.11.4-43.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206234" version="1" comment="salt-doc is &lt;2016.11.4-43.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206235" version="1" comment="salt-minion is &lt;2016.11.4-43.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206236" version="1" comment="salt is &lt;2016.11.4-43.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206237" version="1" comment="salt-doc is &lt;2016.11.4-43.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206238" version="1" comment="salt-minion is &lt;2016.11.4-43.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239800" version="1" comment="salt is &lt;2016.11.10-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239801" version="1" comment="salt-doc is &lt;2016.11.10-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239802" version="1" comment="salt-minion is &lt;2016.11.10-43.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206239" version="1" comment="salt is &lt;2016.11.4-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206240" version="1" comment="salt-doc is &lt;2016.11.4-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206241" version="1" comment="salt-minion is &lt;2016.11.4-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258986" version="1" comment="libzmq3 is &lt;4.0.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258987" version="1" comment="zeromq is &lt;4.0.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206242" version="1" comment="hawk is &lt;0.5.2-0.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206243" version="1" comment="hawk-templates is &lt;0.5.2-0.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117412" version="1" comment="sle-hae-release is ==11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206244" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.101_0.7.17-2.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206245" version="1" comment="cluster-network-kmp-pae is &lt;1.4_3.0.101_0.7.17-2.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206246" version="1" comment="cluster-network-kmp-ppc64 is &lt;1.4_3.0.101_0.7.17-2.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206247" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.101_0.7.17-2.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206248" version="1" comment="cluster-network-kmp-xen is &lt;1.4_3.0.101_0.7.17-2.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206249" version="1" comment="gfs2-kmp-default is &lt;2_3.0.101_0.7.17-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206250" version="1" comment="gfs2-kmp-pae is &lt;2_3.0.101_0.7.17-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206251" version="1" comment="gfs2-kmp-ppc64 is &lt;2_3.0.101_0.7.17-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206252" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.101_0.7.17-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206253" version="1" comment="gfs2-kmp-xen is &lt;2_3.0.101_0.7.17-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206254" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.101_0.7.17-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206255" version="1" comment="ocfs2-kmp-pae is &lt;1.6_3.0.101_0.7.17-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206256" version="1" comment="ocfs2-kmp-ppc64 is &lt;1.6_3.0.101_0.7.17-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206257" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.101_0.7.17-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206258" version="1" comment="ocfs2-kmp-xen is &lt;1.6_3.0.101_0.7.17-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206259" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206260" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032105" version="1" comment="sles-release is ==11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258684" version="1" comment="SUSE_SLES_SAP-release is ==11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052815" version="1" comment="MozillaFirefox is &lt;3.0.10-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206261" version="1" comment="MozillaFirefox-branding-SLED is &lt;3.5-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052814" version="1" comment="MozillaFirefox-translations is &lt;3.0.10-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206262" version="1" comment="gconf2 is &lt;2.24.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206263" version="1" comment="gconf2-32bit is &lt;2.24.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206264" version="1" comment="gconf2-x86 is &lt;2.24.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206265" version="1" comment="libfreebl3 is &lt;3.12.3.1-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206266" version="1" comment="libfreebl3-32bit is &lt;3.12.3.1-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206267" version="1" comment="libfreebl3-x86 is &lt;3.12.3.1-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206268" version="1" comment="libidl is &lt;0.8.11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206269" version="1" comment="libidl-32bit is &lt;0.8.11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206270" version="1" comment="libidl-x86 is &lt;0.8.11-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206271" version="1" comment="mozilla-nspr is &lt;4.8-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206272" version="1" comment="mozilla-nspr-32bit is &lt;4.8-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206273" version="1" comment="mozilla-nspr-x86 is &lt;4.8-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206274" version="1" comment="mozilla-nss is &lt;3.12.3.1-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206275" version="1" comment="mozilla-nss-32bit is &lt;3.12.3.1-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206276" version="1" comment="mozilla-nss-tools is &lt;3.12.3.1-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206277" version="1" comment="mozilla-nss-x86 is &lt;3.12.3.1-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052825" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.10-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052816" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.10-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052821" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.10-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052824" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.10-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206278" version="1" comment="mozilla-xulrunner190-x86 is &lt;1.9.0.10-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206279" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206280" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206281" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206282" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206283" version="1" comment="mozilla-xulrunner191-x86 is &lt;1.9.1.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206284" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.12-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206285" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.12-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206286" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.12-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206287" version="1" comment="mozilla-xulrunner192-translations is &lt;1.9.2.12-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206288" version="1" comment="mozilla-xulrunner192-x86 is &lt;1.9.2.12-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206289" version="1" comment="orbit2 is &lt;2.14.16-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206290" version="1" comment="orbit2-32bit is &lt;2.14.16-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206291" version="1" comment="orbit2-x86 is &lt;2.14.16-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206292" version="1" comment="NetworkManager is &lt;0.7.0.r4359-15.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206293" version="1" comment="NetworkManager-glib is &lt;0.7.0.r4359-15.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206294" version="1" comment="NetworkManager-gnome is &lt;0.7.0.r1053-11.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206295" version="1" comment="procps is &lt;3.2.7-151" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206296" version="1" comment="acl is &lt;2.2.47-30.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206297" version="1" comment="libacl is &lt;2.2.47-30.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206298" version="1" comment="libacl-32bit is &lt;2.2.47-30.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206299" version="1" comment="libacl-x86 is &lt;2.2.47-30.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206300" version="1" comment="apache2 is &lt;2.2.10-2.23.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206301" version="1" comment="apache2-doc is &lt;2.2.10-2.23.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206302" version="1" comment="apache2-example-pages is &lt;2.2.10-2.23.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206303" version="1" comment="apache2-prefork is &lt;2.2.10-2.23.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206304" version="1" comment="apache2-utils is &lt;2.2.10-2.23.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206305" version="1" comment="apache2-worker is &lt;2.2.10-2.23.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206306" version="1" comment="apache2-mod_php5 is &lt;5.2.6-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206307" version="1" comment="php5 is &lt;5.2.6-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206308" version="1" comment="php5-bcmath is &lt;5.2.6-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206309" version="1" comment="php5-bz2 is &lt;5.2.6-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206310" version="1" comment="php5-calendar is &lt;5.2.6-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206311" version="1" comment="php5-ctype is &lt;5.2.6-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206312" version="1" comment="php5-curl is &lt;5.2.6-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206313" version="1" comment="php5-dba is &lt;5.2.6-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206314" version="1" comment="php5-dbase is &lt;5.2.6-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206315" version="1" comment="php5-dom is &lt;5.2.6-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206316" version="1" comment="php5-exif is &lt;5.2.6-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206317" version="1" comment="php5-fastcgi is &lt;5.2.6-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206318" version="1" comment="php5-ftp is &lt;5.2.6-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206319" version="1" comment="php5-gd is &lt;5.2.6-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206320" version="1" comment="php5-gettext is &lt;5.2.6-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206321" version="1" comment="php5-gmp is &lt;5.2.6-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206322" version="1" comment="php5-hash is &lt;5.2.6-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206323" version="1" comment="php5-iconv is &lt;5.2.6-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206324" version="1" comment="php5-json is &lt;5.2.6-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206325" version="1" comment="php5-ldap is &lt;5.2.6-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206326" version="1" comment="php5-mbstring is &lt;5.2.6-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206327" version="1" comment="php5-mcrypt is &lt;5.2.6-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206328" version="1" comment="php5-mysql is &lt;5.2.6-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206329" version="1" comment="php5-odbc is &lt;5.2.6-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206330" version="1" comment="php5-openssl is &lt;5.2.6-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206331" version="1" comment="php5-pcntl is &lt;5.2.6-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206332" version="1" comment="php5-pdo is &lt;5.2.6-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206333" version="1" comment="php5-pear is &lt;5.2.6-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206334" version="1" comment="php5-pgsql is &lt;5.2.6-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206335" version="1" comment="php5-pspell is &lt;5.2.6-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206336" version="1" comment="php5-shmop is &lt;5.2.6-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206337" version="1" comment="php5-snmp is &lt;5.2.6-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206338" version="1" comment="php5-soap is &lt;5.2.6-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206339" version="1" comment="php5-suhosin is &lt;5.2.6-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206340" version="1" comment="php5-sysvmsg is &lt;5.2.6-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206341" version="1" comment="php5-sysvsem is &lt;5.2.6-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206342" version="1" comment="php5-sysvshm is &lt;5.2.6-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206343" version="1" comment="php5-tokenizer is &lt;5.2.6-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206344" version="1" comment="php5-wddx is &lt;5.2.6-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206345" version="1" comment="php5-xmlreader is &lt;5.2.6-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206346" version="1" comment="php5-xmlrpc is &lt;5.2.6-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206347" version="1" comment="php5-xmlwriter is &lt;5.2.6-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206348" version="1" comment="php5-xsl is &lt;5.2.6-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206349" version="1" comment="php5-zip is &lt;5.2.6-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206350" version="1" comment="php5-zlib is &lt;5.2.6-50.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206351" version="1" comment="avahi is &lt;0.6.23-11.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206352" version="1" comment="avahi-lang is &lt;0.6.23-11.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206353" version="1" comment="libavahi-client3 is &lt;0.6.23-11.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206354" version="1" comment="libavahi-client3-32bit is &lt;0.6.23-11.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206355" version="1" comment="libavahi-client3-x86 is &lt;0.6.23-11.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206356" version="1" comment="libavahi-common3 is &lt;0.6.23-11.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206357" version="1" comment="libavahi-common3-32bit is &lt;0.6.23-11.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206358" version="1" comment="libavahi-common3-x86 is &lt;0.6.23-11.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206359" version="1" comment="libavahi-core5 is &lt;0.6.23-11.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206360" version="1" comment="libdns_sd is &lt;0.6.23-11.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206361" version="1" comment="libdns_sd-32bit is &lt;0.6.23-11.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206362" version="1" comment="libdns_sd-x86 is &lt;0.6.23-11.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206363" version="1" comment="mono-core is &lt;2.0.1-1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206364" version="1" comment="mono-data is &lt;2.0.1-1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206365" version="1" comment="mono-data-postgresql is &lt;2.0.1-1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206366" version="1" comment="mono-data-sqlite is &lt;2.0.1-1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206367" version="1" comment="mono-locale-extras is &lt;2.0.1-1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206368" version="1" comment="mono-nunit is &lt;2.0.1-1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206369" version="1" comment="mono-web is &lt;2.0.1-1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206370" version="1" comment="mono-winforms is &lt;2.0.1-1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206371" version="1" comment="cifs-mount is &lt;3.2.7-11.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206372" version="1" comment="ldapsmb is &lt;1.34b-11.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206373" version="1" comment="libsmbclient0 is &lt;3.2.7-11.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206374" version="1" comment="libsmbclient0-32bit is &lt;3.2.7-11.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206375" version="1" comment="libsmbclient0-x86 is &lt;3.2.7-11.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206376" version="1" comment="libtalloc1 is &lt;3.2.7-11.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206377" version="1" comment="libtalloc1-32bit is &lt;3.2.7-11.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206378" version="1" comment="libtalloc1-x86 is &lt;3.2.7-11.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206379" version="1" comment="libtdb1 is &lt;3.2.7-11.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206380" version="1" comment="libtdb1-32bit is &lt;3.2.7-11.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206381" version="1" comment="libtdb1-x86 is &lt;3.2.7-11.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206382" version="1" comment="libwbclient0 is &lt;3.2.7-11.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206383" version="1" comment="libwbclient0-32bit is &lt;3.2.7-11.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206384" version="1" comment="libwbclient0-x86 is &lt;3.2.7-11.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206385" version="1" comment="samba is &lt;3.2.7-11.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206386" version="1" comment="samba-32bit is &lt;3.2.7-11.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206387" version="1" comment="samba-client is &lt;3.2.7-11.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206388" version="1" comment="samba-client-32bit is &lt;3.2.7-11.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206389" version="1" comment="samba-client-x86 is &lt;3.2.7-11.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206390" version="1" comment="samba-krb-printing is &lt;3.2.7-11.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206391" version="1" comment="samba-winbind is &lt;3.2.7-11.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206392" version="1" comment="samba-winbind-32bit is &lt;3.2.7-11.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206393" version="1" comment="samba-winbind-x86 is &lt;3.2.7-11.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206394" version="1" comment="samba-x86 is &lt;3.2.7-11.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036638" version="1" comment="clamav is &lt;0.95.1-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206395" version="1" comment="libgcc43 is &lt;4.3.3_20081022-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206396" version="1" comment="libgcc43-32bit is &lt;4.3.3_20081022-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206397" version="1" comment="libgcc43-x86 is &lt;4.3.3_20081022-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206398" version="1" comment="libstdc++43 is &lt;4.3.3_20081022-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206399" version="1" comment="libstdc++43-32bit is &lt;4.3.3_20081022-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206400" version="1" comment="libstdc++43-x86 is &lt;4.3.3_20081022-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206401" version="1" comment="cpio is &lt;2.9-75.27.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206402" version="1" comment="cpio-lang is &lt;2.9-75.27.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206403" version="1" comment="cron is &lt;4.1-194.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206404" version="1" comment="cups is &lt;1.3.9-8.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206405" version="1" comment="cups-client is &lt;1.3.9-8.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206406" version="1" comment="cups-libs is &lt;1.3.9-8.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206407" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206408" version="1" comment="cups-libs-x86 is &lt;1.3.9-8.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206409" version="1" comment="curl is &lt;7.19.0-11.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206410" version="1" comment="keyutils-libs is &lt;1.2-107" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206411" version="1" comment="keyutils-libs-32bit is &lt;1.2-107" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206412" version="1" comment="keyutils-libs-x86 is &lt;1.2-107" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206413" version="1" comment="libcurl4 is &lt;7.19.0-11.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206414" version="1" comment="libcurl4-32bit is &lt;7.19.0-11.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206415" version="1" comment="libcurl4-x86 is &lt;7.19.0-11.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206416" version="1" comment="libidn is &lt;1.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206417" version="1" comment="libidn-32bit is &lt;1.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206418" version="1" comment="libidn-x86 is &lt;1.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206419" version="1" comment="cyrus-sasl is &lt;2.1.22-182.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206420" version="1" comment="cyrus-sasl-32bit is &lt;2.1.22-182.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206421" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.22-182.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206422" version="1" comment="cyrus-sasl-crammd5-32bit is &lt;2.1.22-182.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206423" version="1" comment="cyrus-sasl-crammd5-x86 is &lt;2.1.22-182.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206424" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.22-182.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206425" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.22-182.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206426" version="1" comment="cyrus-sasl-gssapi-32bit is &lt;2.1.22-182.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206427" version="1" comment="cyrus-sasl-gssapi-x86 is &lt;2.1.22-182.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206428" version="1" comment="cyrus-sasl-otp is &lt;2.1.22-182.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206429" version="1" comment="cyrus-sasl-otp-32bit is &lt;2.1.22-182.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206430" version="1" comment="cyrus-sasl-otp-x86 is &lt;2.1.22-182.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206431" version="1" comment="cyrus-sasl-plain is &lt;2.1.22-182.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206432" version="1" comment="cyrus-sasl-plain-32bit is &lt;2.1.22-182.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206433" version="1" comment="cyrus-sasl-plain-x86 is &lt;2.1.22-182.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206434" version="1" comment="cyrus-sasl-x86 is &lt;2.1.22-182.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206435" version="1" comment="dbus-1 is &lt;1.2.10-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206436" version="1" comment="dbus-1-32bit is &lt;1.2.10-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206437" version="1" comment="dbus-1-x86 is &lt;1.2.10-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206438" version="1" comment="dbus-1-glib is &lt;0.76-34.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206439" version="1" comment="dbus-1-glib-32bit is &lt;0.76-34.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206440" version="1" comment="dbus-1-glib-x86 is &lt;0.76-34.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206441" version="1" comment="dhcp-client is &lt;3.1.1-7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206442" version="1" comment="dnsmasq is &lt;2.45-12.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206443" version="1" comment="wireshark is &lt;1.0.5-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206444" version="1" comment="evolution-data-server is &lt;2.24.1.1-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206445" version="1" comment="evolution-data-server-32bit is &lt;2.24.1.1-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206446" version="1" comment="evolution-data-server-lang is &lt;2.24.1.1-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206447" version="1" comment="evolution-data-server-x86 is &lt;2.24.1.1-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206448" version="1" comment="gtkhtml2 is &lt;3.24.1.1-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206449" version="1" comment="gtkhtml2-lang is &lt;3.24.1.1-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206450" version="1" comment="evolution-data-server is &lt;2.24.1.1-11.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206451" version="1" comment="evolution-data-server-32bit is &lt;2.24.1.1-11.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206452" version="1" comment="evolution-data-server-lang is &lt;2.24.1.1-11.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206453" version="1" comment="evolution-data-server-x86 is &lt;2.24.1.1-11.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206454" version="1" comment="cdparanoia is &lt;IIIalpha9.8-691" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206455" version="1" comment="cdparanoia-32bit is &lt;IIIalpha9.8-691" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206456" version="1" comment="cdparanoia-x86 is &lt;IIIalpha9.8-691" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206457" version="1" comment="desktop-file-utils is &lt;0.15-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206458" version="1" comment="fam is &lt;2.7.0-130" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206459" version="1" comment="fam-32bit is &lt;2.7.0-130" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206460" version="1" comment="fam-x86 is &lt;2.7.0-130" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206461" version="1" comment="gnome-vfs2 is &lt;2.24.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206462" version="1" comment="gnome-vfs2-32bit is &lt;2.24.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206463" version="1" comment="gnome-vfs2-x86 is &lt;2.24.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206464" version="1" comment="gstreamer-0_10 is &lt;0.10.21-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206465" version="1" comment="libogg0 is &lt;1.1.3-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206466" version="1" comment="libogg0-32bit is &lt;1.1.3-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206467" version="1" comment="libogg0-x86 is &lt;1.1.3-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206468" version="1" comment="liboil is &lt;0.3.15-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206469" version="1" comment="liboil-32bit is &lt;0.3.15-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206470" version="1" comment="liboil-x86 is &lt;0.3.15-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206471" version="1" comment="freetype2 is &lt;2.3.7-25.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206472" version="1" comment="freetype2-32bit is &lt;2.3.7-25.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206473" version="1" comment="freetype2-x86 is &lt;2.3.7-25.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206474" version="1" comment="gdm is &lt;2.24.0-24.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206475" version="1" comment="gdm-branding-upstream is &lt;2.24.0-24.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206476" version="1" comment="gdm-lang is &lt;2.24.0-24.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206477" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206478" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206479" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206480" version="1" comment="ghostscript-library is &lt;8.62-32.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206481" version="1" comment="ghostscript-omni is &lt;8.62-32.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206482" version="1" comment="ghostscript-x11 is &lt;8.62-32.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206483" version="1" comment="libgimpprint is &lt;4.2.7-32.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206484" version="1" comment="glib2 is &lt;2.18.2-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206485" version="1" comment="glib2-doc is &lt;2.18.2-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206486" version="1" comment="glib2-lang is &lt;2.18.2-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206487" version="1" comment="libgio-2_0-0 is &lt;2.18.2-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206488" version="1" comment="libgio-2_0-0-32bit is &lt;2.18.2-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206489" version="1" comment="libgio-2_0-0-x86 is &lt;2.18.2-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206490" version="1" comment="libglib-2_0-0 is &lt;2.18.2-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206491" version="1" comment="libglib-2_0-0-32bit is &lt;2.18.2-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206492" version="1" comment="libglib-2_0-0-x86 is &lt;2.18.2-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206493" version="1" comment="libgmodule-2_0-0 is &lt;2.18.2-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206494" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.18.2-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206495" version="1" comment="libgmodule-2_0-0-x86 is &lt;2.18.2-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206496" version="1" comment="libgobject-2_0-0 is &lt;2.18.2-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206497" version="1" comment="libgobject-2_0-0-32bit is &lt;2.18.2-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206498" version="1" comment="libgobject-2_0-0-x86 is &lt;2.18.2-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206499" version="1" comment="libgthread-2_0-0 is &lt;2.18.2-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206500" version="1" comment="libgthread-2_0-0-32bit is &lt;2.18.2-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206501" version="1" comment="libgthread-2_0-0-x86 is &lt;2.18.2-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206502" version="1" comment="glibc is &lt;2.9-13.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206503" version="1" comment="glibc-32bit is &lt;2.9-13.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206504" version="1" comment="glibc-devel is &lt;2.9-13.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206505" version="1" comment="glibc-devel-32bit is &lt;2.9-13.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206506" version="1" comment="glibc-html is &lt;2.9-13.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206507" version="1" comment="glibc-i18ndata is &lt;2.9-13.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206508" version="1" comment="glibc-info is &lt;2.9-13.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206509" version="1" comment="glibc-locale is &lt;2.9-13.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206510" version="1" comment="glibc-locale-32bit is &lt;2.9-13.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206511" version="1" comment="glibc-locale-x86 is &lt;2.9-13.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206512" version="1" comment="glibc-profile is &lt;2.9-13.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206513" version="1" comment="glibc-profile-32bit is &lt;2.9-13.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206514" version="1" comment="glibc-profile-x86 is &lt;2.9-13.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206515" version="1" comment="glibc-x86 is &lt;2.9-13.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206516" version="1" comment="nscd is &lt;2.9-13.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206517" version="1" comment="gnome-screensaver is &lt;2.24.0-14.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206518" version="1" comment="gnome-screensaver-lang is &lt;2.24.0-14.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206519" version="1" comment="gnutls is &lt;2.4.1-24.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206520" version="1" comment="libgnutls26 is &lt;2.4.1-24.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206521" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206522" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206523" version="1" comment="gpg2 is &lt;2.0.9-25.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206524" version="1" comment="gpg2-lang is &lt;2.0.9-25.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206525" version="1" comment="libgcrypt11 is &lt;1.4.1-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206526" version="1" comment="libgcrypt11-32bit is &lt;1.4.1-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206527" version="1" comment="libgcrypt11-x86 is &lt;1.4.1-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206528" version="1" comment="libgpg-error0 is &lt;1.6-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206529" version="1" comment="libgpg-error0-32bit is &lt;1.6-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206530" version="1" comment="libgpg-error0-x86 is &lt;1.6-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206531" version="1" comment="libksba is &lt;1.0.4-1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206532" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.21-2.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206533" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.21-2.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206534" version="1" comment="gstreamer-0_10-plugins-base-doc is &lt;0.10.21-2.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206535" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.21-2.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206536" version="1" comment="gstreamer-0_10-plugins-base-x86 is &lt;0.10.21-2.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206537" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.21-2.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206538" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.21-2.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206539" version="1" comment="libgstinterfaces-0_10-0-x86 is &lt;0.10.21-2.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206540" version="1" comment="gstreamer-0_10-plugins-good is &lt;0.10.10-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206541" version="1" comment="gstreamer-0_10-plugins-good-doc is &lt;0.10.10-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206542" version="1" comment="gstreamer-0_10-plugins-good-lang is &lt;0.10.10-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206543" version="1" comment="libicu is &lt;4.0-7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206544" version="1" comment="libicu-32bit is &lt;4.0-7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206545" version="1" comment="libicu-doc is &lt;4.0-7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206546" version="1" comment="ipsec-tools is &lt;0.7.1-10.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206547" version="1" comment="iscsitarget is &lt;0.4.15-94.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206548" version="1" comment="iscsitarget-kmp-default is &lt;0.4.15_2.6.27.48_0.6-94.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206549" version="1" comment="iscsitarget-kmp-pae is &lt;0.4.15_2.6.27.48_0.6-94.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206550" version="1" comment="iscsitarget-kmp-ppc64 is &lt;0.4.15_2.6.27.48_0.6-94.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206551" version="1" comment="iscsitarget-kmp-vmi is &lt;0.4.15_2.6.27.48_0.6-94.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206552" version="1" comment="iscsitarget-kmp-xen is &lt;0.4.15_2.6.27.48_0.6-94.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206553" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206554" version="1" comment="java-1_4_2-ibm-jdbc is &lt;1.4.2_sr13-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206555" version="1" comment="java-1_4_2-ibm-plugin is &lt;1.4.2_sr13-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206556" version="1" comment="java-1_5_0-bea is &lt;1.5.0.13.1.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206557" version="1" comment="java-1_5_0-bea-console is &lt;1.5.0.13.1.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206558" version="1" comment="java-1_5_0-bea-fonts is &lt;1.5.0.13.1.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206559" version="1" comment="java-1_5_0-bea-jdbc is &lt;1.5.0.13.1.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206560" version="1" comment="java-1_6_0-ibm is &lt;1.6.0-124.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206561" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0-124.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206562" version="1" comment="java-1_6_0-ibm-alsa-x86 is &lt;1.6.0-124.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206563" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0-124.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206564" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0-124.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206565" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0-124.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206566" version="1" comment="java-1_6_0-ibm-x86 is &lt;1.6.0-124.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206567" version="1" comment="kde4-akonadi is &lt;4.1.3-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206568" version="1" comment="kde4-akregator is &lt;4.1.3-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206569" version="1" comment="kde4-kaddressbook is &lt;4.1.3-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206570" version="1" comment="kde4-kalarm is &lt;4.1.3-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206571" version="1" comment="kde4-kjots is &lt;4.1.3-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206572" version="1" comment="kde4-kmail is &lt;4.1.3-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206573" version="1" comment="kde4-knode is &lt;4.1.3-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206574" version="1" comment="kde4-knotes is &lt;4.1.3-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206575" version="1" comment="kde4-kontact is &lt;4.1.3-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206576" version="1" comment="kde4-korganizer is &lt;4.1.3-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206577" version="1" comment="kde4-ktimetracker is &lt;4.1.3-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206578" version="1" comment="kde4-ktnef is &lt;4.1.3-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206579" version="1" comment="kdepim4 is &lt;4.1.3-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206580" version="1" comment="kdepim4-wizards is &lt;4.1.3-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206581" version="1" comment="kdepimlibs4 is &lt;4.1.3-9.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206582" version="1" comment="libakonadi4 is &lt;4.1.3-9.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206583" version="1" comment="libkdepim4 is &lt;4.1.3-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206584" version="1" comment="libkdepimlibs4 is &lt;4.1.3-9.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206585" version="1" comment="kde4-gwenview is &lt;4.1.3-7.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206586" version="1" comment="kde4-kcolorchooser is &lt;4.1.3-7.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206587" version="1" comment="kde4-kruler is &lt;4.1.3-7.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206588" version="1" comment="kde4-ksnapshot is &lt;4.1.3-7.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206589" version="1" comment="kde4-okular is &lt;4.1.3-7.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206590" version="1" comment="libkipi5 is &lt;4.1.3-7.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206591" version="1" comment="kde4-kdm is &lt;4.1.3-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206592" version="1" comment="kde4-kgreeter-plugins is &lt;4.1.3-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206593" version="1" comment="kde4-kwin is &lt;4.1.3-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206594" version="1" comment="kdebase4-workspace is &lt;4.1.3-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206595" version="1" comment="kdebase4-workspace-ksysguardd is &lt;4.1.3-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206596" version="1" comment="kde4-kget is &lt;4.1.3-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206597" version="1" comment="kde4-knewsticker is &lt;4.1.3-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206598" version="1" comment="kde4-kopete is &lt;4.1.3-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206599" version="1" comment="kde4-krdc is &lt;4.1.3-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206600" version="1" comment="kde4-krfb is &lt;4.1.3-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206601" version="1" comment="kdenetwork4-filesharing is &lt;4.1.3-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206602" version="1" comment="kdelibs3 is &lt;3.5.10-23.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206603" version="1" comment="kdelibs3-32bit is &lt;3.5.10-23.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206604" version="1" comment="kdelibs3-default-style is &lt;3.5.10-23.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206605" version="1" comment="kdelibs3-default-style-32bit is &lt;3.5.10-23.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206606" version="1" comment="kdelibs3-default-style-x86 is &lt;3.5.10-23.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206607" version="1" comment="kdelibs3-x86 is &lt;3.5.10-23.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206608" version="1" comment="kdelibs4 is &lt;4.1.3-8.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206609" version="1" comment="kdelibs4-core is &lt;4.1.3-8.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206610" version="1" comment="libkde4 is &lt;4.1.3-8.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206611" version="1" comment="libkde4-32bit is &lt;4.1.3-8.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206612" version="1" comment="libkde4-x86 is &lt;4.1.3-8.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206613" version="1" comment="libkdecore4 is &lt;4.1.3-8.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206614" version="1" comment="libkdecore4-32bit is &lt;4.1.3-8.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206615" version="1" comment="libkdecore4-x86 is &lt;4.1.3-8.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206616" version="1" comment="kdelibs4 is &lt;4.1.3-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206617" version="1" comment="kdelibs4-core is &lt;4.1.3-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206618" version="1" comment="libkde4 is &lt;4.1.3-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206619" version="1" comment="libkde4-32bit is &lt;4.1.3-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206620" version="1" comment="libkde4-x86 is &lt;4.1.3-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206621" version="1" comment="libkdecore4 is &lt;4.1.3-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206622" version="1" comment="libkdecore4-32bit is &lt;4.1.3-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206623" version="1" comment="libkdecore4-x86 is &lt;4.1.3-8.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206624" version="1" comment="utempter is &lt;0.5.5-106" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206625" version="1" comment="utempter-32bit is &lt;0.5.5-106" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206626" version="1" comment="utempter-x86 is &lt;0.5.5-106" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206627" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.27.23_0.1-7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206628" version="1" comment="ext4dev-kmp-pae is &lt;0_2.6.27.23_0.1-7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206629" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.27.23_0.1-7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206630" version="1" comment="ext4dev-kmp-vmi is &lt;0_2.6.27.23_0.1-7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206631" version="1" comment="ext4dev-kmp-xen is &lt;0_2.6.27.23_0.1-7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206632" version="1" comment="iscsitarget-kmp-default is &lt;0.4.15_2.6.27.54_0.2-94.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206633" version="1" comment="kernel-default is &lt;2.6.27.23-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206634" version="1" comment="kernel-default-base is &lt;2.6.27.23-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206635" version="1" comment="kernel-default-man is &lt;2.6.27.23-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206636" version="1" comment="kernel-kdump is &lt;2.6.27.23-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206637" version="1" comment="kernel-pae is &lt;2.6.27.23-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206638" version="1" comment="kernel-pae-base is &lt;2.6.27.23-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206639" version="1" comment="kernel-ppc64 is &lt;2.6.27.23-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206640" version="1" comment="kernel-ppc64-base is &lt;2.6.27.23-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206641" version="1" comment="kernel-source is &lt;2.6.27.23-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206642" version="1" comment="kernel-syms is &lt;2.6.27.23-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206643" version="1" comment="kernel-vmi is &lt;2.6.27.23-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206644" version="1" comment="kernel-vmi-base is &lt;2.6.27.23-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206645" version="1" comment="kernel-xen is &lt;2.6.27.23-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206646" version="1" comment="kernel-xen-base is &lt;2.6.27.23-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206647" version="1" comment="oracleasm-kmp-default is &lt;2.0.5_2.6.27.54_0.2-7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206648" version="1" comment="krb5 is &lt;1.6.3-133.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206649" version="1" comment="krb5-32bit is &lt;1.6.3-133.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206650" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206651" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206652" version="1" comment="krb5-client is &lt;1.6.3-133.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206653" version="1" comment="krb5-server is &lt;1.6.3-133.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206654" version="1" comment="krb5-x86 is &lt;1.6.3-133.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206655" version="1" comment="kvm is &lt;78.0.10.6-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206656" version="1" comment="kvm-kmp-default is &lt;78.2.6.30.1_2.6.27.37_0.1-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206657" version="1" comment="kvm-kmp-pae is &lt;78.2.6.30.1_2.6.27.37_0.1-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206658" version="1" comment="lcms is &lt;1.17-77.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206659" version="1" comment="liblcms1 is &lt;1.17-77.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206660" version="1" comment="liblcms1-32bit is &lt;1.17-77.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206661" version="1" comment="liblcms1-x86 is &lt;1.17-77.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206662" version="1" comment="libHX13 is &lt;1.23-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206663" version="1" comment="libHX13-32bit is &lt;1.23-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206664" version="1" comment="libHX13-x86 is &lt;1.23-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206665" version="1" comment="libapr-util1 is &lt;1.3.4-12.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206666" version="1" comment="libapr-util1-32bit is &lt;1.3.4-12.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206667" version="1" comment="libesmtp is &lt;1.0.4-157.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206668" version="1" comment="libfreebl3 is &lt;3.12.8-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206669" version="1" comment="libfreebl3-32bit is &lt;3.12.8-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206670" version="1" comment="libfreebl3-x86 is &lt;3.12.8-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206671" version="1" comment="mozilla-nspr is &lt;4.8.6-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206672" version="1" comment="mozilla-nspr-32bit is &lt;4.8.6-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206673" version="1" comment="mozilla-nspr-x86 is &lt;4.8.6-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206674" version="1" comment="mozilla-nss is &lt;3.12.8-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206675" version="1" comment="mozilla-nss-32bit is &lt;3.12.8-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206676" version="1" comment="mozilla-nss-tools is &lt;3.12.8-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206677" version="1" comment="mozilla-nss-x86 is &lt;3.12.8-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251875" version="1" comment="zlib is &lt;1.2.3-106" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206679" version="1" comment="zlib-32bit is &lt;1.2.3-106" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251876" version="1" comment="zlib-x86 is &lt;1.2.3-106" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206681" version="1" comment="libgdiplus0 is &lt;2.0-11.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206682" version="1" comment="libldap-2_4-2 is &lt;2.4.12-7.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206683" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.12-7.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206684" version="1" comment="libldap-2_4-2-x86 is &lt;2.4.12-7.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206685" version="1" comment="openldap2 is &lt;2.4.12-7.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206686" version="1" comment="openldap2-back-meta is &lt;2.4.12-7.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206687" version="1" comment="openldap2-client is &lt;2.4.12-7.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206688" version="1" comment="libmysqlclient15 is &lt;5.0.67-13.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206689" version="1" comment="libmysqlclient15-32bit is &lt;5.0.67-13.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206690" version="1" comment="libmysqlclient15-x86 is &lt;5.0.67-13.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206691" version="1" comment="libmysqlclient_r15 is &lt;5.0.67-13.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206692" version="1" comment="mysql is &lt;5.0.67-13.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206693" version="1" comment="mysql-Max is &lt;5.0.67-13.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206694" version="1" comment="mysql-client is &lt;5.0.67-13.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206695" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-30.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206696" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8h-30.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206697" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8h-30.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206698" version="1" comment="openssl is &lt;0.9.8h-30.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206699" version="1" comment="openssl-doc is &lt;0.9.8h-30.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206700" version="1" comment="libpng12-0 is &lt;1.2.31-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206701" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206702" version="1" comment="libpng12-0-x86 is &lt;1.2.31-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206703" version="1" comment="libpng12-0 is &lt;1.2.31-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206704" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206705" version="1" comment="libpng12-0-x86 is &lt;1.2.31-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206706" version="1" comment="libpoppler-glib4 is &lt;0.10.1-1.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206707" version="1" comment="libpoppler-qt4-3 is &lt;0.10.1-1.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206708" version="1" comment="libpoppler4 is &lt;0.10.1-1.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206709" version="1" comment="poppler-tools is &lt;0.10.1-1.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206710" version="1" comment="libpoppler4 is &lt;0.10.1-1.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206711" version="1" comment="libpython2_6-1_0 is &lt;2.6.0-8.8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206712" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.0-8.8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206713" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.0-8.8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206714" version="1" comment="python is &lt;2.6.0-8.9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206715" version="1" comment="python-32bit is &lt;2.6.0-8.9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206716" version="1" comment="python-base is &lt;2.6.0-8.8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206717" version="1" comment="python-base-32bit is &lt;2.6.0-8.8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206718" version="1" comment="python-base-x86 is &lt;2.6.0-8.8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206719" version="1" comment="python-curses is &lt;2.6.0-8.9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206720" version="1" comment="python-demo is &lt;2.6.0-8.9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206721" version="1" comment="python-gdbm is &lt;2.6.0-8.9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206722" version="1" comment="python-idle is &lt;2.6.0-8.9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206723" version="1" comment="python-tk is &lt;2.6.0-8.9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206724" version="1" comment="python-x86 is &lt;2.6.0-8.9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206725" version="1" comment="python-xml is &lt;2.6.0-8.8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206726" version="1" comment="libqt4 is &lt;4.4.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206727" version="1" comment="libqt4-32bit is &lt;4.4.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206728" version="1" comment="libqt4-qt3support is &lt;4.4.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206729" version="1" comment="libqt4-qt3support-32bit is &lt;4.4.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206730" version="1" comment="libqt4-qt3support-x86 is &lt;4.4.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206731" version="1" comment="libqt4-sql is &lt;4.4.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206732" version="1" comment="libqt4-sql-32bit is &lt;4.4.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206733" version="1" comment="libqt4-sql-sqlite is &lt;4.4.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206734" version="1" comment="libqt4-sql-x86 is &lt;4.4.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206735" version="1" comment="libqt4-x11 is &lt;4.4.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206736" version="1" comment="libqt4-x11-32bit is &lt;4.4.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206737" version="1" comment="libqt4-x11-x86 is &lt;4.4.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206738" version="1" comment="libqt4-x86 is &lt;4.4.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206739" version="1" comment="libsndfile is &lt;1.0.17-172.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206740" version="1" comment="libsndfile-32bit is &lt;1.0.17-172.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206741" version="1" comment="libsndfile-x86 is &lt;1.0.17-172.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206742" version="1" comment="libtheora0 is &lt;1.0.beta2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206743" version="1" comment="libtheora0-32bit is &lt;1.0.beta2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206744" version="1" comment="libtheora0-x86 is &lt;1.0.beta2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206745" version="1" comment="libtiff3 is &lt;3.8.2-141.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206746" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206747" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206748" version="1" comment="libvolume_id1 is &lt;128-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206749" version="1" comment="udev is &lt;128-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206750" version="1" comment="libvirt is &lt;0.4.6-14.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206751" version="1" comment="libvirt-doc is &lt;0.4.6-14.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206752" version="1" comment="libvirt-python is &lt;0.4.6-14.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206753" version="1" comment="libxml2 is &lt;2.7.1-10.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206754" version="1" comment="libxml2-32bit is &lt;2.7.1-10.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206755" version="1" comment="libxml2-doc is &lt;2.7.1-10.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206756" version="1" comment="libxml2-x86 is &lt;2.7.1-10.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206757" version="1" comment="lvm2 is &lt;2.02.39-18.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206758" version="1" comment="mipv6d is &lt;2.0.2-2.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056078" version="1" comment="mozilla-nspr is &lt;4.8.2-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056075" version="1" comment="mozilla-nspr-32bit is &lt;4.8.2-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206759" version="1" comment="mozilla-nspr-x86 is &lt;4.8.2-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052296" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052287" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052292" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052295" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206760" version="1" comment="mozilla-xulrunner190-x86 is &lt;1.9.0.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206761" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.15-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206762" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.15-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206763" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.15-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206764" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.15-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206765" version="1" comment="mozilla-xulrunner191-x86 is &lt;1.9.1.15-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206766" version="1" comment="ntp is &lt;4.2.4p6-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206767" version="1" comment="ntp-doc is &lt;4.2.4p6-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206768" version="1" comment="open-iscsi is &lt;2.0.870-26.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206769" version="1" comment="openslp is &lt;1.2.0-172.10.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206770" version="1" comment="openslp-32bit is &lt;1.2.0-172.10.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206771" version="1" comment="openslp-server is &lt;1.2.0-172.10.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206772" version="1" comment="openslp-x86 is &lt;1.2.0-172.10.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206773" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-30.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206774" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8h-30.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206775" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8h-30.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206776" version="1" comment="openssl is &lt;0.9.8h-30.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206777" version="1" comment="openssl-doc is &lt;0.9.8h-30.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206778" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-30.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206779" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8h-30.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206780" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8h-30.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206781" version="1" comment="openssl is &lt;0.9.8h-30.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206782" version="1" comment="openssl-doc is &lt;0.9.8h-30.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206783" version="1" comment="openswan is &lt;2.6.16-1.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206784" version="1" comment="openswan-doc is &lt;2.6.16-1.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206785" version="1" comment="pango is &lt;1.22.1-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206786" version="1" comment="pango-32bit is &lt;1.22.1-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206787" version="1" comment="pango-doc is &lt;1.22.1-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206788" version="1" comment="pango-x86 is &lt;1.22.1-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206789" version="1" comment="pcsc-lite is &lt;1.4.102-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206790" version="1" comment="pcsc-lite-32bit is &lt;1.4.102-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206791" version="1" comment="pcsc-lite-x86 is &lt;1.4.102-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206792" version="1" comment="perl is &lt;5.10.0-64.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206793" version="1" comment="perl-32bit is &lt;5.10.0-64.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206794" version="1" comment="perl-base is &lt;5.10.0-64.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206795" version="1" comment="perl-doc is &lt;5.10.0-64.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206796" version="1" comment="perl-x86 is &lt;5.10.0-64.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206797" version="1" comment="perl-IO-Socket-SSL is &lt;1.16-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206798" version="1" comment="popt is &lt;1.7-37.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206799" version="1" comment="popt-32bit is &lt;1.7-37.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206800" version="1" comment="popt-x86 is &lt;1.7-37.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206801" version="1" comment="rpm is &lt;4.4.2.3-37.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206802" version="1" comment="rpm-32bit is &lt;4.4.2.3-37.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206803" version="1" comment="rpm-x86 is &lt;4.4.2.3-37.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052516" version="1" comment="postgresql is &lt;8.3.7-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052509" version="1" comment="postgresql-contrib is &lt;8.3.7-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052511" version="1" comment="postgresql-docs is &lt;8.3.7-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052514" version="1" comment="postgresql-libs is &lt;8.3.7-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052512" version="1" comment="postgresql-libs-32bit is &lt;8.3.7-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206804" version="1" comment="postgresql-libs-x86 is &lt;8.3.7-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052515" version="1" comment="postgresql-server is &lt;8.3.7-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206805" version="1" comment="puppet is &lt;0.24.5-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206806" version="1" comment="puppet-server is &lt;0.24.5-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206807" version="1" comment="pyxml is &lt;0.8.4-194.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206808" version="1" comment="quagga is &lt;0.99.10-17.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206809" version="1" comment="sendmail is &lt;8.14.3-50.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206810" version="1" comment="ruby is &lt;1.8.7.p72-5.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206811" version="1" comment="ruby-doc-html is &lt;1.8.7.p72-5.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206812" version="1" comment="ruby-tk is &lt;1.8.7.p72-5.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206813" version="1" comment="strongswan is &lt;4.2.8-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206814" version="1" comment="strongswan-doc is &lt;4.2.8-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206815" version="1" comment="systemtap is &lt;0.7.1-42.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206816" version="1" comment="tgt is &lt;0.9.0-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206817" version="1" comment="w3m is &lt;0.5.2-128.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206818" version="1" comment="websphere-as_ce is &lt;2.1.1.2-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206819" version="1" comment="wireshark is &lt;1.0.5-1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206820" version="1" comment="libcmpiutil is &lt;0.5-15.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206821" version="1" comment="libvirt is &lt;0.4.6-14.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206822" version="1" comment="libvirt-cim is &lt;0.5.2-8.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206823" version="1" comment="libvirt-doc is &lt;0.4.6-14.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206824" version="1" comment="libvirt-python is &lt;0.4.6-14.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206825" version="1" comment="virt-manager is &lt;0.5.3-66.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206826" version="1" comment="virt-viewer is &lt;0.0.3-3.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206827" version="1" comment="vm-install is &lt;0.3.27-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206828" version="1" comment="xen is &lt;3.3.1_18546_24-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206829" version="1" comment="xen-doc-html is &lt;3.3.1_18546_24-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206830" version="1" comment="xen-doc-pdf is &lt;3.3.1_18546_24-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206831" version="1" comment="xen-kmp-default is &lt;3.3.1_18546_24_2.6.27.45_0.3-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206832" version="1" comment="xen-kmp-pae is &lt;3.3.1_18546_24_2.6.27.45_0.3-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206833" version="1" comment="xen-libs is &lt;3.3.1_18546_24-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206834" version="1" comment="xen-tools is &lt;3.3.1_18546_24-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206835" version="1" comment="xen-tools-domU is &lt;3.3.1_18546_24-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206836" version="1" comment="xerces-j2 is &lt;2.8.1-238.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206837" version="1" comment="xerces-j2-xml-apis is &lt;2.8.1-238.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206838" version="1" comment="xerces-j2-xml-resolver is &lt;2.8.1-238.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206839" version="1" comment="yast2-ldap-server is &lt;2.17.21-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206840" version="1" comment="ConsoleKit is &lt;0.2.10-64.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206841" version="1" comment="ConsoleKit-32bit is &lt;0.2.10-64.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206842" version="1" comment="ConsoleKit-x11 is &lt;0.2.10-64.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206843" version="1" comment="ConsoleKit-x86 is &lt;0.2.10-64.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206844" version="1" comment="MozillaFirefox is &lt;24.6.0esr-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206845" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206846" version="1" comment="MozillaFirefox-translations is &lt;24.6.0esr-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206847" version="1" comment="libfreebl3 is &lt;3.16.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206848" version="1" comment="libfreebl3-32bit is &lt;3.16.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206849" version="1" comment="mozilla-nss is &lt;3.16.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206850" version="1" comment="mozilla-nss-32bit is &lt;3.16.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206851" version="1" comment="mozilla-nss-tools is &lt;3.16.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206852" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206853" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207514" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207515" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207516" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207517" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207518" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207519" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209104" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209105" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209106" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209107" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209108" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209109" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209110" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209111" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209112" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209113" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209114" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209115" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209116" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.78.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209117" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.78.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209118" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.78.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209119" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.78.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209120" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.78.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209121" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.78.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209122" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.78.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209123" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.78.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209124" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.78.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209125" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.78.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209126" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.78.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209127" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.78.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209128" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.78.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209129" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.78.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209130" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.78.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209131" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.78.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209132" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209133" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209134" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209135" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233160" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233161" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233714" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233715" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237963" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237964" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239803" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239804" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246356" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.92" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253268" version="1" comment="ImageMagick is &lt;6.4.3.6-78.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253269" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253270" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257059" version="1" comment="ImageMagick is &lt;6.4.3.6-78.106" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257060" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.106" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257061" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.106" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258988" version="1" comment="ImageMagick is &lt;6.4.3.6-78.109" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258989" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.109" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258990" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.109" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260896" version="1" comment="ImageMagick is &lt;6.4.3.6-78.112" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260897" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.112" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260898" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.112" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206854" version="1" comment="Mesa is &lt;7.7-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206855" version="1" comment="Mesa-32bit is &lt;7.7-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206856" version="1" comment="MozillaFirefox is &lt;10.0.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206857" version="1" comment="MozillaFirefox-translations is &lt;10.0.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206858" version="1" comment="libfreebl3 is &lt;3.13.5-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206859" version="1" comment="libfreebl3-32bit is &lt;3.13.5-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206860" version="1" comment="libfreebl3-x86 is &lt;3.13.5-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206861" version="1" comment="mozilla-nspr is &lt;4.9.1-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206862" version="1" comment="mozilla-nspr-32bit is &lt;4.9.1-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206863" version="1" comment="mozilla-nspr-x86 is &lt;4.9.1-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206864" version="1" comment="mozilla-nss is &lt;3.13.5-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206865" version="1" comment="mozilla-nss-32bit is &lt;3.13.5-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206866" version="1" comment="mozilla-nss-tools is &lt;3.13.5-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206867" version="1" comment="mozilla-nss-x86 is &lt;3.13.5-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207521" version="1" comment="MozillaFirefox-translations is &lt;38.8.0esr-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207522" version="1" comment="MozillaFirefox is &lt;45.3.0esr-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207523" version="1" comment="MozillaFirefox-branding-SLED is &lt;45.0-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207524" version="1" comment="MozillaFirefox-translations is &lt;45.3.0esr-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207525" version="1" comment="firefox-fontconfig is &lt;2.11.0-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207526" version="1" comment="libfreebl3 is &lt;3.21.1-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207527" version="1" comment="libfreebl3-32bit is &lt;3.21.1-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207528" version="1" comment="mozilla-nspr is &lt;4.12-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207529" version="1" comment="mozilla-nspr-32bit is &lt;4.12-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207531" version="1" comment="mozilla-nss is &lt;3.21.1-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207532" version="1" comment="mozilla-nss-32bit is &lt;3.21.1-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207534" version="1" comment="mozilla-nss-tools is &lt;3.21.1-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207535" version="1" comment="MozillaFirefox is &lt;45.4.0esr-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207536" version="1" comment="MozillaFirefox-translations is &lt;45.4.0esr-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207537" version="1" comment="MozillaFirefox is &lt;45.6.0esr-66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207538" version="1" comment="MozillaFirefox-translations is &lt;45.6.0esr-66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247748" version="1" comment="MozillaFirefox is &lt;45.7.0esr-69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247749" version="1" comment="MozillaFirefox-translations is &lt;45.7.0esr-69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247750" version="1" comment="MozillaFirefox is &lt;45.8.0esr-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247751" version="1" comment="MozillaFirefox-translations is &lt;45.8.0esr-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247752" version="1" comment="MozillaFirefox is &lt;45.9.0esr-77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247753" version="1" comment="MozillaFirefox-translations is &lt;45.9.0esr-77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247754" version="1" comment="libfreebl3 is &lt;3.29.5-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247755" version="1" comment="libfreebl3-32bit is &lt;3.29.5-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247756" version="1" comment="mozilla-nspr is &lt;4.13.1-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247757" version="1" comment="mozilla-nspr-32bit is &lt;4.13.1-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247758" version="1" comment="mozilla-nss is &lt;3.29.5-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247759" version="1" comment="mozilla-nss-32bit is &lt;3.29.5-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247760" version="1" comment="mozilla-nss-tools is &lt;3.29.5-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247761" version="1" comment="MozillaFirefox is &lt;52.3.0esr-78.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247762" version="1" comment="MozillaFirefox-branding-SLED is &lt;52-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247763" version="1" comment="MozillaFirefox-translations is &lt;52.3.0esr-78.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247764" version="1" comment="firefox-gcc5 is &lt;5.3.1+r233831-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247765" version="1" comment="firefox-libffi-gcc5 is &lt;5.3.1+r233831-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247766" version="1" comment="firefox-libffi4 is &lt;5.3.1+r233831-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247767" version="1" comment="firefox-libgcc_s1 is &lt;5.3.1+r233831-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247768" version="1" comment="firefox-libstdc++6 is &lt;5.3.1+r233831-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247769" version="1" comment="MozillaFirefox is &lt;52.5.0esr-78.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247770" version="1" comment="MozillaFirefox-translations is &lt;52.5.0esr-78.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247771" version="1" comment="MozillaFirefox is &lt;52.6.0esr-78.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247772" version="1" comment="MozillaFirefox-translations is &lt;52.6.0esr-78.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247773" version="1" comment="MozillaFirefox is &lt;52.7.3esr-78.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247774" version="1" comment="MozillaFirefox-translations is &lt;52.7.3esr-78.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247775" version="1" comment="MozillaFirefox is &lt;52.8.0esr-78.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247776" version="1" comment="MozillaFirefox-translations is &lt;52.8.0esr-78.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247777" version="1" comment="MozillaFirefox is &lt;52.8.1esr-78.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247778" version="1" comment="MozillaFirefox-translations is &lt;52.8.1esr-78.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247779" version="1" comment="MozillaFirefox is &lt;52.9.0esr-78.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247780" version="1" comment="MozillaFirefox-translations is &lt;52.9.0esr-78.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259450" version="1" comment="MozillaFirefox is &lt;60.8.0esr-78.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259451" version="1" comment="MozillaFirefox-translations-common is &lt;60.8.0esr-78.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259452" version="1" comment="MozillaFirefox-translations-other is &lt;60.8.0esr-78.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206868" version="1" comment="MozillaFirefox is &lt;24.5.0esr-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206869" version="1" comment="MozillaFirefox-translations is &lt;24.5.0esr-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206870" version="1" comment="libfreebl3 is &lt;3.16-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206871" version="1" comment="libfreebl3-32bit is &lt;3.16-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206872" version="1" comment="mozilla-nss is &lt;3.16-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206873" version="1" comment="mozilla-nss-32bit is &lt;3.16-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206874" version="1" comment="mozilla-nss-tools is &lt;3.16-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247781" version="1" comment="MozillaFirefox is &lt;31.6.0esr-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247782" version="1" comment="MozillaFirefox-translations is &lt;31.6.0esr-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206875" version="1" comment="NetworkManager is &lt;0.7.1_git20090811-3.9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206876" version="1" comment="NetworkManager-glib is &lt;0.7.1_git20090811-3.9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206877" version="1" comment="NetworkManager-gnome is &lt;0.7.1-5.15.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206878" version="1" comment="wpa_supplicant is &lt;0.6.9-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206879" version="1" comment="NetworkManager-gnome is &lt;0.7.1-5.15.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209155" version="1" comment="NetworkManager-kde4 is &lt;0.9.svn1043876-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209156" version="1" comment="NetworkManager-kde4-lang is &lt;0.9.svn1043876-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209157" version="1" comment="NetworkManager-kde4-libs is &lt;0.9.svn1043876-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209158" version="1" comment="NetworkManager-openvpn-kde4 is &lt;0.9.svn1043876-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209159" version="1" comment="NetworkManager-pptp-kde4 is &lt;0.9.svn1043876-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209160" version="1" comment="plasmoid-networkmanagement is &lt;0.9.svn1043876-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260603" version="1" comment="OpenEXR is &lt;1.6.1-83.17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260604" version="1" comment="OpenEXR-32bit is &lt;1.6.1-83.17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261368" version="1" comment="OpenEXR is &lt;1.6.1-83.17.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261369" version="1" comment="OpenEXR-32bit is &lt;1.6.1-83.17.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209162" version="1" comment="SuSEfirewall2 is &lt;3.6_SVNr208-2.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206880" version="1" comment="aaa_base is &lt;11-6.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241791" version="1" comment="amanda is &lt;2.5.2.1-188.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247783" version="1" comment="ant is &lt;1.7.0-200.26.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247784" version="1" comment="ant-antlr is &lt;1.7.0-200.26.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247785" version="1" comment="ant-trax is &lt;1.7.0-200.26.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264578" version="1" comment="apache2 is &lt;2.2.34-70.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264579" version="1" comment="apache2-doc is &lt;2.2.34-70.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264580" version="1" comment="apache2-example-pages is &lt;2.2.34-70.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264581" version="1" comment="apache2-prefork is &lt;2.2.34-70.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264582" version="1" comment="apache2-utils is &lt;2.2.34-70.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264583" version="1" comment="apache2-worker is &lt;2.2.34-70.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206881" version="1" comment="apache2 is &lt;2.2.12-1.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206882" version="1" comment="apache2-doc is &lt;2.2.12-1.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206883" version="1" comment="apache2-example-pages is &lt;2.2.12-1.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206884" version="1" comment="apache2-prefork is &lt;2.2.12-1.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206885" version="1" comment="apache2-utils is &lt;2.2.12-1.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206886" version="1" comment="apache2-worker is &lt;2.2.12-1.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240961" version="1" comment="apache2-mod_jk is &lt;1.2.40-0.2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207551" version="1" comment="apache2-mod_nss is &lt;1.0.8-0.4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206887" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206888" version="1" comment="php5 is &lt;5.2.14-0.7.30.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206889" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206890" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206891" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206892" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206893" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206894" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206895" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206896" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206897" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206898" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206899" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206900" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206901" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206902" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206903" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206904" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206905" version="1" comment="php5-json is &lt;5.2.14-0.7.30.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206906" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206907" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206908" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206909" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206910" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206911" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206912" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206913" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206914" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206915" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206916" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206917" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206918" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206919" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206920" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206921" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206922" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206923" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206924" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206925" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206926" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206927" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206928" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206929" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206930" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206931" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206932" version="1" comment="apache2-mod_python is &lt;3.3.1-147.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209163" version="1" comment="apport is &lt;0.114-12.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209164" version="1" comment="apport-crashdb-sle is &lt;0.114-0.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209165" version="1" comment="apport-gtk is &lt;0.114-12.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206933" version="1" comment="arpwatch is &lt;2.1a15-131.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252769" version="1" comment="atftp is &lt;0.7.0-135.16.16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209166" version="1" comment="audiofile-32bit is &lt;0.2.6-142.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247786" version="1" comment="augeas is &lt;0.8.1-7.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247787" version="1" comment="augeas-lenses is &lt;0.8.1-7.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247788" version="1" comment="libaugeas0 is &lt;0.8.1-7.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247789" version="1" comment="augeas is &lt;0.8.1-7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247790" version="1" comment="augeas-lenses is &lt;0.8.1-7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247791" version="1" comment="libaugeas0 is &lt;0.8.1-7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247792" version="1" comment="augeas is &lt;0.8.1-7.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247793" version="1" comment="augeas-lenses is &lt;0.8.1-7.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247794" version="1" comment="libaugeas0 is &lt;0.8.1-7.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247795" version="1" comment="avahi is &lt;0.6.23-11.25.25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247796" version="1" comment="avahi-lang is &lt;0.6.23-11.25.25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247797" version="1" comment="avahi-utils is &lt;0.6.23-11.25.25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247798" version="1" comment="libavahi-client3 is &lt;0.6.23-11.25.25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247799" version="1" comment="libavahi-client3-32bit is &lt;0.6.23-11.25.25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247800" version="1" comment="libavahi-common3 is &lt;0.6.23-11.25.25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247801" version="1" comment="libavahi-common3-32bit is &lt;0.6.23-11.25.25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247802" version="1" comment="libavahi-core5 is &lt;0.6.23-11.25.25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247803" version="1" comment="libdns_sd is &lt;0.6.23-11.25.25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247804" version="1" comment="libdns_sd-32bit is &lt;0.6.23-11.25.25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247805" version="1" comment="axis is &lt;1.4-236.38.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253331" version="1" comment="axis is &lt;1.4-236.38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206934" version="1" comment="bash is &lt;3.2-147.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206935" version="1" comment="bash-doc is &lt;3.2-147.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206936" version="1" comment="bash-x86 is &lt;3.2-147.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206937" version="1" comment="libreadline5 is &lt;5.2-147.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206938" version="1" comment="libreadline5-32bit is &lt;5.2-147.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206939" version="1" comment="libreadline5-x86 is &lt;5.2-147.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206940" version="1" comment="readline-doc is &lt;5.2-147.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206941" version="1" comment="bind is &lt;9.6ESVR7P2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206942" version="1" comment="bind-chrootenv is &lt;9.6ESVR7P2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206943" version="1" comment="bind-doc is &lt;9.6ESVR7P2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206944" version="1" comment="bind-libs is &lt;9.6ESVR7P2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206945" version="1" comment="bind-libs-32bit is &lt;9.6ESVR7P2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206946" version="1" comment="bind-libs-x86 is &lt;9.6ESVR7P2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206947" version="1" comment="bind-utils is &lt;9.6ESVR7P2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206948" version="1" comment="bind is &lt;9.6ESVR11W1-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206949" version="1" comment="bind-chrootenv is &lt;9.6ESVR11W1-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206950" version="1" comment="bind-devel is &lt;9.6ESVR11W1-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206951" version="1" comment="bind-doc is &lt;9.6ESVR11W1-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206952" version="1" comment="bind-libs is &lt;9.6ESVR11W1-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206953" version="1" comment="bind-libs-32bit is &lt;9.6ESVR11W1-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206954" version="1" comment="bind-utils is &lt;9.6ESVR11W1-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206955" version="1" comment="bind is &lt;9.6ESVR11W1-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206956" version="1" comment="bind-chrootenv is &lt;9.6ESVR11W1-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206957" version="1" comment="bind-devel is &lt;9.6ESVR11W1-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206958" version="1" comment="bind-doc is &lt;9.6ESVR11W1-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206959" version="1" comment="bind-libs is &lt;9.6ESVR11W1-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206960" version="1" comment="bind-libs-32bit is &lt;9.6ESVR11W1-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206961" version="1" comment="bind-utils is &lt;9.6ESVR11W1-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247806" version="1" comment="bind is &lt;9.6ESVR11W1-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247807" version="1" comment="bind-chrootenv is &lt;9.6ESVR11W1-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247808" version="1" comment="bind-doc is &lt;9.6ESVR11W1-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247809" version="1" comment="bind-libs is &lt;9.6ESVR11W1-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247810" version="1" comment="bind-libs-32bit is &lt;9.6ESVR11W1-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247811" version="1" comment="bind-utils is &lt;9.6ESVR11W1-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247812" version="1" comment="bind is &lt;9.6ESVR11W1-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247813" version="1" comment="bind-chrootenv is &lt;9.6ESVR11W1-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247814" version="1" comment="bind-doc is &lt;9.6ESVR11W1-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247815" version="1" comment="bind-libs is &lt;9.6ESVR11W1-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247816" version="1" comment="bind-utils is &lt;9.6ESVR11W1-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247817" version="1" comment="bind is &lt;9.6ESVR11W1-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247818" version="1" comment="bind-chrootenv is &lt;9.6ESVR11W1-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247819" version="1" comment="bind-doc is &lt;9.6ESVR11W1-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247820" version="1" comment="bind-libs is &lt;9.6ESVR11W1-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247821" version="1" comment="bind-libs-32bit is &lt;9.6ESVR11W1-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247822" version="1" comment="bind-utils is &lt;9.6ESVR11W1-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247823" version="1" comment="bind is &lt;9.6ESVR11W1-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247824" version="1" comment="bind-chrootenv is &lt;9.6ESVR11W1-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247825" version="1" comment="bind-doc is &lt;9.6ESVR11W1-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247826" version="1" comment="bind-libs is &lt;9.6ESVR11W1-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247827" version="1" comment="bind-libs-32bit is &lt;9.6ESVR11W1-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247828" version="1" comment="bind-utils is &lt;9.6ESVR11W1-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247829" version="1" comment="bind is &lt;9.6ESVR11W1-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247830" version="1" comment="bind-chrootenv is &lt;9.6ESVR11W1-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247831" version="1" comment="bind-doc is &lt;9.6ESVR11W1-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247832" version="1" comment="bind-libs is &lt;9.6ESVR11W1-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247833" version="1" comment="bind-libs-32bit is &lt;9.6ESVR11W1-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247834" version="1" comment="bind-utils is &lt;9.6ESVR11W1-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247835" version="1" comment="bind is &lt;9.6ESVR11W1-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247836" version="1" comment="bind-chrootenv is &lt;9.6ESVR11W1-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247837" version="1" comment="bind-doc is &lt;9.6ESVR11W1-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247838" version="1" comment="bind-libs is &lt;9.6ESVR11W1-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247839" version="1" comment="bind-libs-32bit is &lt;9.6ESVR11W1-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247840" version="1" comment="bind-utils is &lt;9.6ESVR11W1-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247841" version="1" comment="bind is &lt;9.6ESVR11W1-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247842" version="1" comment="bind-chrootenv is &lt;9.6ESVR11W1-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247843" version="1" comment="bind-doc is &lt;9.6ESVR11W1-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247844" version="1" comment="bind-libs is &lt;9.6ESVR11W1-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247845" version="1" comment="bind-libs-32bit is &lt;9.6ESVR11W1-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247846" version="1" comment="bind-utils is &lt;9.6ESVR11W1-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247847" version="1" comment="bind is &lt;9.6ESVR11W1-0.31.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247848" version="1" comment="bind-chrootenv is &lt;9.6ESVR11W1-0.31.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247849" version="1" comment="bind-doc is &lt;9.6ESVR11W1-0.31.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247850" version="1" comment="bind-libs is &lt;9.6ESVR11W1-0.31.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247851" version="1" comment="bind-libs-32bit is &lt;9.6ESVR11W1-0.31.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247852" version="1" comment="bind-utils is &lt;9.6ESVR11W1-0.31.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256182" version="1" comment="bind is &lt;9.6ESVR11W1-0.31.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256183" version="1" comment="bind-chrootenv is &lt;9.6ESVR11W1-0.31.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256184" version="1" comment="bind-doc is &lt;9.6ESVR11W1-0.31.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256185" version="1" comment="bind-libs is &lt;9.6ESVR11W1-0.31.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256186" version="1" comment="bind-libs-32bit is &lt;9.6ESVR11W1-0.31.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256187" version="1" comment="bind-utils is &lt;9.6ESVR11W1-0.31.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247853" version="1" comment="bluez is &lt;4.51-1.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247854" version="1" comment="libbluetooth3 is &lt;4.51-1.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206962" version="1" comment="mono-core is &lt;2.0.1-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206963" version="1" comment="mono-data is &lt;2.0.1-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206964" version="1" comment="mono-data-postgresql is &lt;2.0.1-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206965" version="1" comment="mono-data-sqlite is &lt;2.0.1-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206966" version="1" comment="mono-locale-extras is &lt;2.0.1-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206967" version="1" comment="mono-nunit is &lt;2.0.1-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206968" version="1" comment="mono-web is &lt;2.0.1-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206969" version="1" comment="mono-winforms is &lt;2.0.1-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259372" version="1" comment="libbz2-1-32bit is &lt;1.0.5-34.256.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261370" version="1" comment="libbz2-1-32bit is &lt;1.0.5-34.256.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209188" version="1" comment="cairo-32bit is &lt;1.8.8-2.3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206970" version="1" comment="cifs-mount is &lt;3.4.3-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206971" version="1" comment="ldapsmb is &lt;1.34b-11.28.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206972" version="1" comment="libsmbclient0 is &lt;3.4.3-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206973" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206974" version="1" comment="libsmbclient0-x86 is &lt;3.4.3-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206975" version="1" comment="libtalloc1 is &lt;3.4.3-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206976" version="1" comment="libtalloc1-32bit is &lt;3.4.3-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206977" version="1" comment="libtalloc1-x86 is &lt;3.4.3-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206978" version="1" comment="libtdb1 is &lt;3.4.3-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206979" version="1" comment="libtdb1-32bit is &lt;3.4.3-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206980" version="1" comment="libtdb1-x86 is &lt;3.4.3-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206981" version="1" comment="libwbclient0 is &lt;3.4.3-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206982" version="1" comment="libwbclient0-32bit is &lt;3.4.3-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206983" version="1" comment="libwbclient0-x86 is &lt;3.4.3-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206984" version="1" comment="samba is &lt;3.4.3-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206985" version="1" comment="samba-32bit is &lt;3.4.3-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206986" version="1" comment="samba-client is &lt;3.4.3-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206987" version="1" comment="samba-client-32bit is &lt;3.4.3-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206988" version="1" comment="samba-client-x86 is &lt;3.4.3-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206989" version="1" comment="samba-doc is &lt;3.4.3-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206990" version="1" comment="samba-krb-printing is &lt;3.4.3-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206991" version="1" comment="samba-winbind is &lt;3.4.3-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206992" version="1" comment="samba-winbind-32bit is &lt;3.4.3-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206993" version="1" comment="samba-winbind-x86 is &lt;3.4.3-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206994" version="1" comment="samba-x86 is &lt;3.4.3-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206995" version="1" comment="clamav is &lt;0.97.5-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206996" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206997" version="1" comment="openldap2 is &lt;2.4.20-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206998" version="1" comment="openldap2-back-meta is &lt;2.4.20-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009206999" version="1" comment="coreutils is &lt;6.12-32.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207000" version="1" comment="coreutils-lang is &lt;6.12-32.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207001" version="1" comment="coreutils-x86 is &lt;6.12-32.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262811" version="1" comment="coreutils is &lt;6.12-32.41.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262812" version="1" comment="coreutils-lang is &lt;6.12-32.41.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209195" version="1" comment="cracklib-32bit is &lt;2.8.12-56.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231495" version="1" comment="cups-client is &lt;1.3.9-8.46.56.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231496" version="1" comment="cups-libs is &lt;1.3.9-8.46.56.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231497" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.46.56.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207002" version="1" comment="curl is &lt;7.19.7-1.20.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207003" version="1" comment="libcurl4 is &lt;7.19.7-1.20.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207004" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.20.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247855" version="1" comment="curl is &lt;7.19.7-1.20.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247856" version="1" comment="libcurl4 is &lt;7.19.7-1.20.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247857" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.20.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247858" version="1" comment="curl is &lt;7.19.7-1.20.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247859" version="1" comment="libcurl4 is &lt;7.19.7-1.20.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247860" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.20.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208454" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209198" version="1" comment="libcurl4 is &lt;7.19.7-1.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209199" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209201" version="1" comment="libcurl4 is &lt;7.19.7-1.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209202" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209204" version="1" comment="libcurl4 is &lt;7.19.7-1.70.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209205" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.70.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209207" version="1" comment="libcurl4 is &lt;7.19.7-1.70.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209208" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.70.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209210" version="1" comment="libcurl4 is &lt;7.19.7-1.70.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209211" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.70.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208455" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209213" version="1" comment="libcurl4 is &lt;7.37.0-70.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209214" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234530" version="1" comment="libcurl4 is &lt;7.37.0-70.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234531" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238970" version="1" comment="libcurl4 is &lt;7.37.0-70.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238971" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254218" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264656" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207005" version="1" comment="dbus-1 is &lt;1.2.10-3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207006" version="1" comment="dbus-1-32bit is &lt;1.2.10-3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207007" version="1" comment="dbus-1-x11 is &lt;1.2.10-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207008" version="1" comment="dbus-1-x86 is &lt;1.2.10-3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258656" version="1" comment="dbus-1-32bit is &lt;1.2.10-3.34.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207009" version="1" comment="dbus-1-glib is &lt;0.76-34.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207010" version="1" comment="dbus-1-glib-32bit is &lt;0.76-34.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207011" version="1" comment="dbus-1-glib-x86 is &lt;0.76-34.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207012" version="1" comment="dhcp is &lt;3.1.3.ESV-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207013" version="1" comment="dhcp-client is &lt;3.1.3.ESV-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207014" version="1" comment="dhcp-relay is &lt;3.1.3.ESV-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207015" version="1" comment="dhcp-server is &lt;3.1.3.ESV-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247861" version="1" comment="dhcp is &lt;3.1.3.ESV-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247862" version="1" comment="dhcp-client is &lt;3.1.3.ESV-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247863" version="1" comment="dhcp-relay is &lt;3.1.3.ESV-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247864" version="1" comment="dhcp-server is &lt;3.1.3.ESV-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247865" version="1" comment="dhcp is &lt;3.1.3.ESV-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247866" version="1" comment="dhcp-client is &lt;3.1.3.ESV-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247867" version="1" comment="dhcp-relay is &lt;3.1.3.ESV-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247868" version="1" comment="dhcp-server is &lt;3.1.3.ESV-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265193" version="1" comment="djvulibre is &lt;3.5.21-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265194" version="1" comment="libdjvulibre21 is &lt;3.5.21-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247869" version="1" comment="dnsmasq is &lt;2.45-12.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247870" version="1" comment="dnsmasq is &lt;2.45-12.27.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247871" version="1" comment="e2fsprogs is &lt;1.41.9-2.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247872" version="1" comment="libblkid1 is &lt;2.16-6.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247873" version="1" comment="libcom_err2 is &lt;1.41.9-2.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247874" version="1" comment="libcom_err2-32bit is &lt;1.41.9-2.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247875" version="1" comment="libext2fs2 is &lt;1.41.9-2.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247876" version="1" comment="libuuid1 is &lt;2.16-6.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247877" version="1" comment="libuuid1-32bit is &lt;2.16-6.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247878" version="1" comment="uuid-runtime is &lt;2.16-6.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246749" version="1" comment="ed is &lt;0.2-1001.30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247879" version="1" comment="elfutils is &lt;0.137-8.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247880" version="1" comment="libasm1 is &lt;0.137-8.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247881" version="1" comment="libasm1-32bit is &lt;0.137-8.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247882" version="1" comment="libdw1 is &lt;0.137-8.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247883" version="1" comment="libdw1-32bit is &lt;0.137-8.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247884" version="1" comment="libebl1 is &lt;0.137-8.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247885" version="1" comment="libebl1-32bit is &lt;0.137-8.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247886" version="1" comment="libelf1 is &lt;0.137-8.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247887" version="1" comment="libelf1-32bit is &lt;0.137-8.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112232" version="1" comment="elfutils is &lt;0.137-8.24.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112233" version="1" comment="libasm1 is &lt;0.137-8.24.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112234" version="1" comment="libasm1-32bit is &lt;0.137-8.24.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112235" version="1" comment="libdw1 is &lt;0.137-8.24.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112236" version="1" comment="libdw1-32bit is &lt;0.137-8.24.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112237" version="1" comment="libebl1 is &lt;0.137-8.24.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112238" version="1" comment="libebl1-32bit is &lt;0.137-8.24.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112239" version="1" comment="libelf1 is &lt;0.137-8.24.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112240" version="1" comment="libelf1-32bit is &lt;0.137-8.24.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209225" version="1" comment="evince-doc is &lt;2.28.2-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209226" version="1" comment="evince-lang is &lt;2.28.2-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230752" version="1" comment="libexempi3 is &lt;2.0.2-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209227" version="1" comment="libexpat1 is &lt;2.0.1-88.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209228" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209230" version="1" comment="libexpat1 is &lt;2.0.1-88.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209231" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209233" version="1" comment="libexpat1 is &lt;2.0.1-88.42.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209234" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.42.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259211" version="1" comment="expat is &lt;2.0.1-88.42.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259212" version="1" comment="libexpat1 is &lt;2.0.1-88.42.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259213" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.42.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265195" version="1" comment="expat is &lt;2.0.1-88.42.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265196" version="1" comment="libexpat1 is &lt;2.0.1-88.42.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265197" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.42.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209236" version="1" comment="fetchmailconf is &lt;6.3.8.90-13.20.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207016" version="1" comment="mozilla-kde4-integration is &lt;0.6.3-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207017" version="1" comment="MozillaFirefox is &lt;10.0.4-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207018" version="1" comment="MozillaFirefox-translations is &lt;10.0.4-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207019" version="1" comment="libfreebl3 is &lt;3.13.4-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207020" version="1" comment="libfreebl3-32bit is &lt;3.13.4-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207021" version="1" comment="libfreebl3-x86 is &lt;3.13.4-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207022" version="1" comment="mozilla-nss is &lt;3.13.4-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207023" version="1" comment="mozilla-nss-32bit is &lt;3.13.4-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207024" version="1" comment="mozilla-nss-tools is &lt;3.13.4-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207025" version="1" comment="mozilla-nss-x86 is &lt;3.13.4-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207026" version="1" comment="MozillaFirefox is &lt;10.0.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207027" version="1" comment="MozillaFirefox-translations is &lt;10.0.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207028" version="1" comment="MozillaFirefox is &lt;24.3.0esr-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207029" version="1" comment="MozillaFirefox-translations is &lt;24.3.0esr-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207030" version="1" comment="firefox-libgcc_s1 is &lt;4.7.2_20130108-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207031" version="1" comment="firefox-libstdc++6 is &lt;4.7.2_20130108-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207032" version="1" comment="libfreebl3 is &lt;3.15.4-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207033" version="1" comment="libfreebl3-32bit is &lt;3.15.4-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207034" version="1" comment="mozilla-nss is &lt;3.15.4-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207035" version="1" comment="mozilla-nss-32bit is &lt;3.15.4-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207036" version="1" comment="mozilla-nss-tools is &lt;3.15.4-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247888" version="1" comment="MozillaFirefox is &lt;24.4.0esr-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247889" version="1" comment="MozillaFirefox-translations is &lt;24.4.0esr-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207037" version="1" comment="MozillaFirefox is &lt;24.7.0esr-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207038" version="1" comment="MozillaFirefox-translations is &lt;24.7.0esr-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207039" version="1" comment="libfreebl3 is &lt;3.16.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207040" version="1" comment="libfreebl3-32bit is &lt;3.16.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207041" version="1" comment="mozilla-nss is &lt;3.16.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207042" version="1" comment="mozilla-nss-32bit is &lt;3.16.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207043" version="1" comment="mozilla-nss-tools is &lt;3.16.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207044" version="1" comment="MozillaFirefox is &lt;24.8.0esr-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207045" version="1" comment="MozillaFirefox-translations is &lt;24.8.0esr-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207046" version="1" comment="libfreebl3 is &lt;3.16.4-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207047" version="1" comment="libfreebl3-32bit is &lt;3.16.4-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207048" version="1" comment="mozilla-nss is &lt;3.16.4-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207049" version="1" comment="mozilla-nss-32bit is &lt;3.16.4-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207050" version="1" comment="mozilla-nss-tools is &lt;3.16.4-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207051" version="1" comment="MozillaFirefox is &lt;31.3.0esr-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207052" version="1" comment="MozillaFirefox-translations is &lt;31.3.0esr-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207053" version="1" comment="MozillaFirefox is &lt;31.4.0esr-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207054" version="1" comment="MozillaFirefox-translations is &lt;31.4.0esr-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207055" version="1" comment="libfreebl3 is &lt;3.17.3-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207056" version="1" comment="libfreebl3-32bit is &lt;3.17.3-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207057" version="1" comment="mozilla-nss is &lt;3.17.3-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207058" version="1" comment="mozilla-nss-32bit is &lt;3.17.3-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207059" version="1" comment="mozilla-nss-tools is &lt;3.17.3-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207060" version="1" comment="MozillaFirefox is &lt;31.5.3esr-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207061" version="1" comment="MozillaFirefox-translations is &lt;31.5.3esr-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247890" version="1" comment="MozillaFirefox is &lt;31.7.0esr-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247891" version="1" comment="MozillaFirefox-translations is &lt;31.7.0esr-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207062" version="1" comment="MozillaFirefox is &lt;38.2.1esr-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207063" version="1" comment="MozillaFirefox-translations is &lt;38.2.1esr-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207656" version="1" comment="MozillaFirefox is &lt;38.3.0esr-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207657" version="1" comment="MozillaFirefox-translations is &lt;38.3.0esr-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207658" version="1" comment="MozillaFirefox-branding-SLED is &lt;38-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207659" version="1" comment="libfreebl3 is &lt;3.19.2.1-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207660" version="1" comment="libfreebl3-32bit is &lt;3.19.2.1-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207661" version="1" comment="mozilla-nss is &lt;3.19.2.1-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207662" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.1-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207664" version="1" comment="mozilla-nss-tools is &lt;3.19.2.1-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207665" version="1" comment="MozillaFirefox is &lt;38.7.0esr-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207666" version="1" comment="MozillaFirefox-translations is &lt;38.7.0esr-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207667" version="1" comment="libfreebl3 is &lt;3.20.2-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207668" version="1" comment="libfreebl3-32bit is &lt;3.20.2-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207669" version="1" comment="mozilla-nspr is &lt;4.12-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207670" version="1" comment="mozilla-nspr-32bit is &lt;4.12-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207672" version="1" comment="mozilla-nss is &lt;3.20.2-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207673" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207675" version="1" comment="mozilla-nss-tools is &lt;3.20.2-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247892" version="1" comment="MozillaFirefox is &lt;52.4.0esr-78.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247893" version="1" comment="MozillaFirefox-translations is &lt;52.4.0esr-78.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247894" version="1" comment="libfreebl3 is &lt;3.29.5-38.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247895" version="1" comment="libfreebl3-32bit is &lt;3.29.5-38.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247896" version="1" comment="mozilla-nss is &lt;3.29.5-38.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247897" version="1" comment="mozilla-nss-32bit is &lt;3.29.5-38.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247898" version="1" comment="mozilla-nss-tools is &lt;3.29.5-38.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264657" version="1" comment="MozillaFirefox is &lt;60.9.0esr-78.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264658" version="1" comment="MozillaFirefox-translations-common is &lt;60.9.0esr-78.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264659" version="1" comment="MozillaFirefox-translations-other is &lt;60.9.0esr-78.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264660" version="1" comment="firefox-gio-branding-upstream is &lt;2.54.3-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264661" version="1" comment="firefox-glib2 is &lt;2.54.3-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264662" version="1" comment="firefox-glib2-lang is &lt;2.54.3-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264663" version="1" comment="firefox-glib2-tools is &lt;2.54.3-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264664" version="1" comment="firefox-gtk3 is &lt;3.10.9-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264665" version="1" comment="firefox-gtk3-branding-upstream is &lt;3.10.9-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264666" version="1" comment="firefox-gtk3-data is &lt;3.10.9-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264667" version="1" comment="firefox-gtk3-immodule-amharic is &lt;3.10.9-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264668" version="1" comment="firefox-gtk3-immodule-inuktitut is &lt;3.10.9-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264669" version="1" comment="firefox-gtk3-immodule-multipress is &lt;3.10.9-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264670" version="1" comment="firefox-gtk3-immodule-thai is &lt;3.10.9-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264671" version="1" comment="firefox-gtk3-immodule-vietnamese is &lt;3.10.9-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264672" version="1" comment="firefox-gtk3-immodule-xim is &lt;3.10.9-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264673" version="1" comment="firefox-gtk3-immodules-tigrigna is &lt;3.10.9-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264674" version="1" comment="firefox-gtk3-lang is &lt;3.10.9-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264675" version="1" comment="firefox-gtk3-tools is &lt;3.10.9-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264676" version="1" comment="firefox-libgtk-3-0 is &lt;3.10.9-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264677" version="1" comment="libfirefox-gio-2_0-0 is &lt;2.54.3-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264678" version="1" comment="libfirefox-glib-2_0-0 is &lt;2.54.3-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264679" version="1" comment="libfirefox-gmodule-2_0-0 is &lt;2.54.3-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264680" version="1" comment="libfirefox-gobject-2_0-0 is &lt;2.54.3-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264681" version="1" comment="libfirefox-gthread-2_0-0 is &lt;2.54.3-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258812" version="1" comment="MozillaFirefox is &lt;60.7.0esr-78.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258813" version="1" comment="MozillaFirefox-branding-SLED is &lt;60-21.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258814" version="1" comment="MozillaFirefox-translations-common is &lt;60.7.0esr-78.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258815" version="1" comment="MozillaFirefox-translations-other is &lt;60.7.0esr-78.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258816" version="1" comment="firefox-at-spi2-atk is &lt;2.10.2-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258817" version="1" comment="firefox-at-spi2-core is &lt;2.10.2-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258818" version="1" comment="firefox-at-spi2-core-lang is &lt;2.10.2-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258819" version="1" comment="firefox-atk is &lt;2.26.1-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258820" version="1" comment="firefox-atk-lang is &lt;2.26.1-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258821" version="1" comment="firefox-cairo is &lt;1.15.10-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258822" version="1" comment="firefox-dbus-1-glib is &lt;0.76-34.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258823" version="1" comment="firefox-freetype2 is &lt;2.9-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258824" version="1" comment="firefox-gcc5 is &lt;5.3.1+r233831-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258825" version="1" comment="firefox-gdk-pixbuf is &lt;2.36.11-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258826" version="1" comment="firefox-gdk-pixbuf-lang is &lt;2.36.11-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258827" version="1" comment="firefox-gdk-pixbuf-query-loaders is &lt;2.36.11-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258828" version="1" comment="firefox-gdk-pixbuf-thumbnailer is &lt;2.36.11-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258829" version="1" comment="firefox-gio-branding-upstream is &lt;2.54.3-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258830" version="1" comment="firefox-glib2 is &lt;2.54.3-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258831" version="1" comment="firefox-glib2-lang is &lt;2.54.3-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258832" version="1" comment="firefox-glib2-tools is &lt;2.54.3-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258833" version="1" comment="firefox-gtk3 is &lt;3.10.9-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258834" version="1" comment="firefox-gtk3-branding-upstream is &lt;3.10.9-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258835" version="1" comment="firefox-gtk3-data is &lt;3.10.9-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258836" version="1" comment="firefox-gtk3-immodule-amharic is &lt;3.10.9-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258837" version="1" comment="firefox-gtk3-immodule-inuktitut is &lt;3.10.9-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258838" version="1" comment="firefox-gtk3-immodule-multipress is &lt;3.10.9-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258839" version="1" comment="firefox-gtk3-immodule-thai is &lt;3.10.9-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258840" version="1" comment="firefox-gtk3-immodule-vietnamese is &lt;3.10.9-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258841" version="1" comment="firefox-gtk3-immodule-xim is &lt;3.10.9-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258842" version="1" comment="firefox-gtk3-immodules-tigrigna is &lt;3.10.9-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258843" version="1" comment="firefox-gtk3-lang is &lt;3.10.9-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258844" version="1" comment="firefox-gtk3-tools is &lt;3.10.9-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258845" version="1" comment="firefox-harfbuzz is &lt;1.7.5-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258846" version="1" comment="firefox-libatk-1_0-0 is &lt;2.26.1-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258847" version="1" comment="firefox-libatk-bridge-2_0-0 is &lt;2.10.2-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258848" version="1" comment="firefox-libatspi0 is &lt;2.10.2-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258849" version="1" comment="firefox-libcairo-gobject2 is &lt;1.15.10-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258850" version="1" comment="firefox-libcairo2 is &lt;1.15.10-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258851" version="1" comment="firefox-libfreetype6 is &lt;2.9-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258852" version="1" comment="firefox-libgcc_s1 is &lt;5.3.1+r233831-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258853" version="1" comment="firefox-libgdk_pixbuf-2_0-0 is &lt;2.36.11-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258854" version="1" comment="firefox-libgtk-3-0 is &lt;3.10.9-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258855" version="1" comment="firefox-libharfbuzz0 is &lt;1.7.5-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258856" version="1" comment="firefox-libpango-1_0-0 is &lt;1.40.14-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258857" version="1" comment="firefox-libpixman-1-0 is &lt;0.34.0-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258858" version="1" comment="firefox-libstdc++6 is &lt;5.3.1+r233831-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258859" version="1" comment="firefox-pango is &lt;1.40.14-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258860" version="1" comment="firefox-pixman is &lt;0.34.0-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258861" version="1" comment="libfirefox-gio-2_0-0 is &lt;2.54.3-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258862" version="1" comment="libfirefox-glib-2_0-0 is &lt;2.54.3-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258863" version="1" comment="libfirefox-gmodule-2_0-0 is &lt;2.54.3-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258864" version="1" comment="libfirefox-gobject-2_0-0 is &lt;2.54.3-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258865" version="1" comment="libfirefox-gthread-2_0-0 is &lt;2.54.3-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258866" version="1" comment="libfreebl3 is &lt;3.41.1-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258867" version="1" comment="libfreebl3-32bit is &lt;3.41.1-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258868" version="1" comment="libsoftokn3 is &lt;3.41.1-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258869" version="1" comment="libsoftokn3-32bit is &lt;3.41.1-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258870" version="1" comment="mozilla-nspr is &lt;4.20-29.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258871" version="1" comment="mozilla-nspr-32bit is &lt;4.20-29.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258872" version="1" comment="mozilla-nss is &lt;3.41.1-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258873" version="1" comment="mozilla-nss-32bit is &lt;3.41.1-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258874" version="1" comment="mozilla-nss-certs is &lt;3.41.1-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258875" version="1" comment="mozilla-nss-certs-32bit is &lt;3.41.1-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258876" version="1" comment="mozilla-nss-tools is &lt;3.41.1-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207064" version="1" comment="MozillaFirefox is &lt;31.2.0esr-0.11.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207065" version="1" comment="MozillaFirefox-branding-SLED is &lt;31.0-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207066" version="1" comment="MozillaFirefox-translations is &lt;31.2.0esr-0.11.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207067" version="1" comment="libfreebl3 is &lt;3.17.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207068" version="1" comment="libfreebl3-32bit is &lt;3.17.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207069" version="1" comment="mozilla-nss is &lt;3.17.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207070" version="1" comment="mozilla-nss-32bit is &lt;3.17.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207071" version="1" comment="mozilla-nss-tools is &lt;3.17.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209242" version="1" comment="freeradius-server-dialupadmin is &lt;2.1.1-7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209243" version="1" comment="freeradius-server-doc is &lt;2.1.1-7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209244" version="1" comment="freeradius-server-utils is &lt;2.1.1-7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209245" version="1" comment="freeradius-server-dialupadmin is &lt;2.1.1-7.25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209246" version="1" comment="freeradius-server-doc is &lt;2.1.1-7.25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209247" version="1" comment="freeradius-server-utils is &lt;2.1.1-7.25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207072" version="1" comment="freetype2 is &lt;2.3.7-25.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207073" version="1" comment="freetype2-32bit is &lt;2.3.7-25.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207074" version="1" comment="freetype2-x86 is &lt;2.3.7-25.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207075" version="1" comment="ft2demos is &lt;2.3.7-25.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209248" version="1" comment="freetype2-32bit is &lt;2.3.7-25.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209250" version="1" comment="ft2demos is &lt;2.3.7-25.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209251" version="1" comment="freetype2-32bit is &lt;2.3.7-25.45.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209253" version="1" comment="ft2demos is &lt;2.3.7-25.45.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209254" version="1" comment="freetype2-32bit is &lt;2.3.7-25.45.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209256" version="1" comment="ft2demos is &lt;2.3.7-25.45.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247899" version="1" comment="fuse is &lt;2.7.2-61.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247900" version="1" comment="libfuse2 is &lt;2.7.2-61.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247901" version="1" comment="fuse is &lt;2.7.2-61.27.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247902" version="1" comment="libfuse2 is &lt;2.7.2-61.27.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247903" version="1" comment="cpp43 is &lt;4.3.4_20091019-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247904" version="1" comment="gcc43 is &lt;4.3.4_20091019-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247905" version="1" comment="gcc43-32bit is &lt;4.3.4_20091019-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247906" version="1" comment="gcc43-c++ is &lt;4.3.4_20091019-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247907" version="1" comment="gcc43-fortran is &lt;4.3.4_20091019-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247908" version="1" comment="gcc43-fortran-32bit is &lt;4.3.4_20091019-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247909" version="1" comment="gcc43-info is &lt;4.3.4_20091019-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247910" version="1" comment="gcc43-locale is &lt;4.3.4_20091019-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247911" version="1" comment="libstdc++43-devel is &lt;4.3.4_20091019-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247912" version="1" comment="libstdc++43-devel-32bit is &lt;4.3.4_20091019-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247913" version="1" comment="libstdc++43-doc is &lt;4.3.4_20091019-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247914" version="1" comment="cpp43 is &lt;4.3.4_20091019-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247915" version="1" comment="gcc43 is &lt;4.3.4_20091019-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247916" version="1" comment="gcc43-32bit is &lt;4.3.4_20091019-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247917" version="1" comment="gcc43-c++ is &lt;4.3.4_20091019-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247918" version="1" comment="gcc43-fortran is &lt;4.3.4_20091019-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247919" version="1" comment="gcc43-fortran-32bit is &lt;4.3.4_20091019-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247920" version="1" comment="gcc43-info is &lt;4.3.4_20091019-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247921" version="1" comment="gcc43-locale is &lt;4.3.4_20091019-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247922" version="1" comment="libstdc++43-devel is &lt;4.3.4_20091019-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247923" version="1" comment="libstdc++43-devel-32bit is &lt;4.3.4_20091019-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247924" version="1" comment="libstdc++43-doc is &lt;4.3.4_20091019-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247925" version="1" comment="libatomic1 is &lt;4.8.5-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247926" version="1" comment="libatomic1-32bit is &lt;4.8.5-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247927" version="1" comment="libgcc_s1 is &lt;4.8.5-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247928" version="1" comment="libgcc_s1-32bit is &lt;4.8.5-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247929" version="1" comment="libgfortran3 is &lt;4.8.5-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247930" version="1" comment="libgfortran3-32bit is &lt;4.8.5-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247931" version="1" comment="libgomp1 is &lt;4.8.5-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247932" version="1" comment="libgomp1-32bit is &lt;4.8.5-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247933" version="1" comment="libitm1 is &lt;4.8.5-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247934" version="1" comment="libitm1-32bit is &lt;4.8.5-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247935" version="1" comment="libmpfr4 is &lt;3.1.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247936" version="1" comment="libquadmath0 is &lt;4.8.5-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247937" version="1" comment="libquadmath0-32bit is &lt;4.8.5-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247938" version="1" comment="libstdc++6 is &lt;4.8.5-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247939" version="1" comment="libstdc++6-32bit is &lt;4.8.5-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247940" version="1" comment="libtsan0 is &lt;4.8.5-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247941" version="1" comment="mpfr is &lt;3.1.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207076" version="1" comment="gdm is &lt;2.24.0-24.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207077" version="1" comment="gdm-branding-upstream is &lt;2.24.0-24.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207078" version="1" comment="gdm-lang is &lt;2.24.0-24.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209260" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209261" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209262" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209263" version="1" comment="ghostscript-omni is &lt;8.62-32.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209264" version="1" comment="ghostscript-x11 is &lt;8.62-32.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209265" version="1" comment="libgimpprint is &lt;4.2.7-32.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209266" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209267" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209268" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209269" version="1" comment="ghostscript-omni is &lt;8.62-32.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209270" version="1" comment="ghostscript-x11 is &lt;8.62-32.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209271" version="1" comment="libgimpprint is &lt;4.2.7-32.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209272" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.47.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209273" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.47.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209274" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.47.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209275" version="1" comment="ghostscript-omni is &lt;8.62-32.47.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209276" version="1" comment="ghostscript-x11 is &lt;8.62-32.47.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209277" version="1" comment="libgimpprint is &lt;4.2.7-32.47.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209278" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.47.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209279" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.47.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209280" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.47.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209281" version="1" comment="ghostscript-omni is &lt;8.62-32.47.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209282" version="1" comment="ghostscript-x11 is &lt;8.62-32.47.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209283" version="1" comment="libgimpprint is &lt;4.2.7-32.47.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208497" version="1" comment="giflib-progs is &lt;4.1.6-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209284" version="1" comment="giflib-32bit is &lt;4.1.6-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209285" version="1" comment="giflib-progs is &lt;4.1.6-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240962" version="1" comment="glib2-lang is &lt;2.22.5-0.8.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240963" version="1" comment="libgio-2_0-0 is &lt;2.22.5-0.8.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240964" version="1" comment="libgio-2_0-0-32bit is &lt;2.22.5-0.8.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240966" version="1" comment="libglib-2_0-0 is &lt;2.22.5-0.8.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240967" version="1" comment="libglib-2_0-0-32bit is &lt;2.22.5-0.8.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240969" version="1" comment="libgmodule-2_0-0 is &lt;2.22.5-0.8.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240970" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.22.5-0.8.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240972" version="1" comment="libgobject-2_0-0 is &lt;2.22.5-0.8.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240973" version="1" comment="libgobject-2_0-0-32bit is &lt;2.22.5-0.8.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240975" version="1" comment="libgthread-2_0-0 is &lt;2.22.5-0.8.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240976" version="1" comment="libgthread-2_0-0-32bit is &lt;2.22.5-0.8.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258120" version="1" comment="libgio-2_0-0-32bit is &lt;2.22.5-0.8.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258121" version="1" comment="libglib-2_0-0-32bit is &lt;2.22.5-0.8.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258122" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.22.5-0.8.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258123" version="1" comment="libgobject-2_0-0-32bit is &lt;2.22.5-0.8.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258124" version="1" comment="libgthread-2_0-0-32bit is &lt;2.22.5-0.8.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207079" version="1" comment="glibc is &lt;2.11.1-0.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207080" version="1" comment="glibc-32bit is &lt;2.11.1-0.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207081" version="1" comment="glibc-devel is &lt;2.11.1-0.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207082" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207083" version="1" comment="glibc-html is &lt;2.11.1-0.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207084" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207085" version="1" comment="glibc-info is &lt;2.11.1-0.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207086" version="1" comment="glibc-locale is &lt;2.11.1-0.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207087" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207088" version="1" comment="glibc-locale-x86 is &lt;2.11.1-0.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207089" version="1" comment="glibc-profile is &lt;2.11.1-0.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207090" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207091" version="1" comment="glibc-profile-x86 is &lt;2.11.1-0.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207092" version="1" comment="glibc-x86 is &lt;2.11.1-0.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207108" version="1" comment="libxcrypt is &lt;3.0.3-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207109" version="1" comment="libxcrypt-32bit is &lt;3.0.3-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207093" version="1" comment="nscd is &lt;2.11.1-0.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207112" version="1" comment="pam-modules is &lt;11-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207113" version="1" comment="pam-modules-32bit is &lt;11-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207115" version="1" comment="pwdutils is &lt;3.2.8-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207116" version="1" comment="pwdutils-plugin-audit is &lt;3.2.8-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247942" version="1" comment="glibc is &lt;2.11.1-0.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247943" version="1" comment="glibc-32bit is &lt;2.11.1-0.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247944" version="1" comment="glibc-devel is &lt;2.11.1-0.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247945" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247946" version="1" comment="glibc-html is &lt;2.11.1-0.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247947" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247948" version="1" comment="glibc-info is &lt;2.11.1-0.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247949" version="1" comment="glibc-locale is &lt;2.11.1-0.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247950" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247951" version="1" comment="glibc-profile is &lt;2.11.1-0.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247952" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247953" version="1" comment="nscd is &lt;2.11.1-0.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247954" version="1" comment="glibc is &lt;2.11.1-0.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247955" version="1" comment="glibc-32bit is &lt;2.11.1-0.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247956" version="1" comment="glibc-devel is &lt;2.11.1-0.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247957" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247958" version="1" comment="glibc-html is &lt;2.11.1-0.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247959" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247960" version="1" comment="glibc-info is &lt;2.11.1-0.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247961" version="1" comment="glibc-locale is &lt;2.11.1-0.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247962" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247963" version="1" comment="glibc-profile is &lt;2.11.1-0.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247964" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247965" version="1" comment="nscd is &lt;2.11.1-0.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247966" version="1" comment="glibc is &lt;2.11.1-0.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247967" version="1" comment="glibc-32bit is &lt;2.11.1-0.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247968" version="1" comment="glibc-devel is &lt;2.11.1-0.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247969" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247970" version="1" comment="glibc-html is &lt;2.11.1-0.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247971" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247972" version="1" comment="glibc-info is &lt;2.11.1-0.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247973" version="1" comment="glibc-locale is &lt;2.11.1-0.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247974" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247975" version="1" comment="glibc-profile is &lt;2.11.1-0.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247976" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247977" version="1" comment="nscd is &lt;2.11.1-0.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247978" version="1" comment="glibc is &lt;2.11.1-0.80.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247979" version="1" comment="glibc-32bit is &lt;2.11.1-0.80.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247980" version="1" comment="glibc-devel is &lt;2.11.1-0.80.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247981" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.80.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247982" version="1" comment="glibc-html is &lt;2.11.1-0.80.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247983" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.80.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247984" version="1" comment="glibc-info is &lt;2.11.1-0.80.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247985" version="1" comment="glibc-locale is &lt;2.11.1-0.80.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247986" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.80.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247987" version="1" comment="glibc-profile is &lt;2.11.1-0.80.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247988" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.80.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247989" version="1" comment="nscd is &lt;2.11.1-0.80.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247990" version="1" comment="glibc is &lt;2.11.1-0.80.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247991" version="1" comment="glibc-32bit is &lt;2.11.1-0.80.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247992" version="1" comment="glibc-devel is &lt;2.11.1-0.80.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247993" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.80.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247994" version="1" comment="glibc-html is &lt;2.11.1-0.80.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247995" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.80.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247996" version="1" comment="glibc-info is &lt;2.11.1-0.80.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247997" version="1" comment="glibc-locale is &lt;2.11.1-0.80.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247998" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.80.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247999" version="1" comment="glibc-profile is &lt;2.11.1-0.80.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248000" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.80.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248001" version="1" comment="nscd is &lt;2.11.1-0.80.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248002" version="1" comment="glibc is &lt;2.11.1-0.80.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248003" version="1" comment="glibc-32bit is &lt;2.11.1-0.80.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248004" version="1" comment="glibc-devel is &lt;2.11.1-0.80.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248005" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.80.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248006" version="1" comment="glibc-html is &lt;2.11.1-0.80.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248007" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.80.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248008" version="1" comment="glibc-info is &lt;2.11.1-0.80.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248009" version="1" comment="glibc-locale is &lt;2.11.1-0.80.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248010" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.80.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248011" version="1" comment="glibc-profile is &lt;2.11.1-0.80.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248012" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.80.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248013" version="1" comment="nscd is &lt;2.11.1-0.80.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248014" version="1" comment="glibc is &lt;2.11.1-0.80.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248015" version="1" comment="glibc-32bit is &lt;2.11.1-0.80.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248016" version="1" comment="glibc-devel is &lt;2.11.1-0.80.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248017" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.80.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248018" version="1" comment="glibc-html is &lt;2.11.1-0.80.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248019" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.80.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248020" version="1" comment="glibc-info is &lt;2.11.1-0.80.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248021" version="1" comment="glibc-locale is &lt;2.11.1-0.80.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248022" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.80.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248023" version="1" comment="glibc-profile is &lt;2.11.1-0.80.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248024" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.80.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248025" version="1" comment="nscd is &lt;2.11.1-0.80.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248026" version="1" comment="glibc is &lt;2.11.1-0.80.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248027" version="1" comment="glibc-32bit is &lt;2.11.1-0.80.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248028" version="1" comment="glibc-devel is &lt;2.11.1-0.80.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248029" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.80.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248030" version="1" comment="glibc-html is &lt;2.11.1-0.80.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248031" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.80.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248032" version="1" comment="glibc-info is &lt;2.11.1-0.80.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248033" version="1" comment="glibc-locale is &lt;2.11.1-0.80.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248034" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.80.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248035" version="1" comment="glibc-profile is &lt;2.11.1-0.80.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248036" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.80.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248037" version="1" comment="nscd is &lt;2.11.1-0.80.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260501" version="1" comment="glibc is &lt;2.11.1-0.80.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260502" version="1" comment="glibc-32bit is &lt;2.11.1-0.80.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260503" version="1" comment="glibc-devel is &lt;2.11.1-0.80.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260504" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.80.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260505" version="1" comment="glibc-html is &lt;2.11.1-0.80.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260506" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.80.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260507" version="1" comment="glibc-info is &lt;2.11.1-0.80.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260508" version="1" comment="glibc-locale is &lt;2.11.1-0.80.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260509" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.80.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260510" version="1" comment="glibc-profile is &lt;2.11.1-0.80.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260511" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.80.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260512" version="1" comment="nscd is &lt;2.11.1-0.80.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207094" version="1" comment="glibc is &lt;2.11.1-0.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207095" version="1" comment="glibc-32bit is &lt;2.11.1-0.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207096" version="1" comment="glibc-devel is &lt;2.11.1-0.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207097" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207098" version="1" comment="glibc-html is &lt;2.11.1-0.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207099" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207100" version="1" comment="glibc-info is &lt;2.11.1-0.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207101" version="1" comment="glibc-locale is &lt;2.11.1-0.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207102" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207103" version="1" comment="glibc-locale-x86 is &lt;2.11.1-0.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207104" version="1" comment="glibc-profile is &lt;2.11.1-0.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207105" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207106" version="1" comment="glibc-profile-x86 is &lt;2.11.1-0.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207107" version="1" comment="glibc-x86 is &lt;2.11.1-0.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207110" version="1" comment="libxcrypt-x86 is &lt;3.0.3-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207111" version="1" comment="nscd is &lt;2.11.1-0.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207114" version="1" comment="pam-modules-x86 is &lt;11-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209320" version="1" comment="gnome-session is &lt;2.28.0-3.11.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209321" version="1" comment="gnome-session-lang is &lt;2.28.0-3.11.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207117" version="1" comment="gnutls is &lt;2.4.1-24.39.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207118" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207119" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207120" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207121" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.39.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209322" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209323" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209325" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209326" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253939" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253940" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265275" version="1" comment="gpg2 is &lt;2.0.9-25.33.42.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265276" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.42.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257502" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.25-1.3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257503" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.25-1.3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257504" version="1" comment="gstreamer-0_10-plugins-base-doc is &lt;0.10.25-1.3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257505" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.25-1.3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257506" version="1" comment="libgstapp-0_10-0 is &lt;0.10.25-1.3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257507" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.25-1.3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257508" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.25-1.3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257509" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.25-1.3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207122" version="1" comment="gtk2 is &lt;2.18.9-0.20.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207123" version="1" comment="gtk2-32bit is &lt;2.18.9-0.20.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207124" version="1" comment="gtk2-doc is &lt;2.18.9-0.20.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207125" version="1" comment="gtk2-lang is &lt;2.18.9-0.20.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207126" version="1" comment="gtk2-x86 is &lt;2.18.9-0.20.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248038" version="1" comment="gtk2 is &lt;2.18.9-0.20.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248039" version="1" comment="gtk2-32bit is &lt;2.18.9-0.20.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248040" version="1" comment="gtk2-doc is &lt;2.18.9-0.20.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248041" version="1" comment="gtk2-lang is &lt;2.18.9-0.20.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248042" version="1" comment="gtk2 is &lt;2.18.9-0.20.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248043" version="1" comment="gtk2-32bit is &lt;2.18.9-0.20.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248044" version="1" comment="gtk2-doc is &lt;2.18.9-0.20.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248045" version="1" comment="gtk2-lang is &lt;2.18.9-0.20.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248046" version="1" comment="gtk2 is &lt;2.18.9-0.20.27.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248047" version="1" comment="gtk2-32bit is &lt;2.18.9-0.20.27.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248048" version="1" comment="gtk2-doc is &lt;2.18.9-0.20.27.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248049" version="1" comment="gtk2-lang is &lt;2.18.9-0.20.27.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248050" version="1" comment="gtk2 is &lt;2.18.9-0.20.27.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248051" version="1" comment="gtk2-32bit is &lt;2.18.9-0.20.27.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248052" version="1" comment="gtk2-doc is &lt;2.18.9-0.20.27.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248053" version="1" comment="gtk2-lang is &lt;2.18.9-0.20.27.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207127" version="1" comment="gwenview is &lt;4.3.5-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207128" version="1" comment="kcolorchooser is &lt;4.3.5-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207129" version="1" comment="kruler is &lt;4.3.5-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207130" version="1" comment="ksnapshot is &lt;4.3.5-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207131" version="1" comment="libkexiv2-7 is &lt;4.3.5-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207132" version="1" comment="libkipi6 is &lt;4.3.5-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207133" version="1" comment="okular is &lt;4.3.5-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209354" version="1" comment="libicu is &lt;4.0-43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209355" version="1" comment="libicu-doc is &lt;4.0-43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209357" version="1" comment="libicu is &lt;4.0-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209358" version="1" comment="libicu-doc is &lt;4.0-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209360" version="1" comment="libicu is &lt;4.0-47.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209361" version="1" comment="libicu-doc is &lt;4.0-47.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248054" version="1" comment="inst-source-utils is &lt;2012.10.4-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208539" version="1" comment="ipsec-tools is &lt;0.7.3-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209364" version="1" comment="ipsec-tools is &lt;0.7.3-1.38.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207134" version="1" comment="iscsitarget is &lt;1.4.19-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207135" version="1" comment="iscsitarget-kmp-default is &lt;1.4.19_2.6.32.19_0.2-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207136" version="1" comment="iscsitarget-kmp-pae is &lt;1.4.19_2.6.32.19_0.2-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207137" version="1" comment="iscsitarget-kmp-ppc64 is &lt;1.4.19_2.6.32.19_0.2-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207138" version="1" comment="iscsitarget-kmp-xen is &lt;1.4.19_2.6.32.19_0.2-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208540" version="1" comment="jakarta-commons-collections is &lt;3.2.2-88.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208541" version="1" comment="jakarta-commons-collections-javadoc is &lt;3.2.2-88.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208542" version="1" comment="jakarta-commons-collections-tomcat5 is &lt;3.2.2-88.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207696" version="1" comment="jakarta-commons-fileupload is &lt;1.1.1-1.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207697" version="1" comment="jakarta-commons-fileupload-javadoc is &lt;1.1.1-1.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209365" version="1" comment="jakarta-taglibs-standard is &lt;1.1.1-234.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209366" version="1" comment="jakarta-taglibs-standard-javadoc is &lt;1.1.1-234.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207139" version="1" comment="libjasper is &lt;1.900.1-134.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207140" version="1" comment="libjasper-32bit is &lt;1.900.1-134.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207141" version="1" comment="libjasper-x86 is &lt;1.900.1-134.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209367" version="1" comment="libjasper is &lt;1.900.14-134.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209368" version="1" comment="libjasper-32bit is &lt;1.900.14-134.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209370" version="1" comment="libjasper is &lt;1.900.14-134.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209371" version="1" comment="libjasper-32bit is &lt;1.900.14-134.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209373" version="1" comment="libjasper is &lt;1.900.14-134.33.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209374" version="1" comment="libjasper-32bit is &lt;1.900.14-134.33.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207142" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.12-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207143" version="1" comment="java-1_4_2-ibm-jdbc is &lt;1.4.2_sr13.12-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207144" version="1" comment="java-1_4_2-ibm-plugin is &lt;1.4.2_sr13.12-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207145" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr10.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207146" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr10.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207147" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr10.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207148" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr10.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207149" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr10.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207150" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.7-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207151" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.7-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207152" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.7-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207704" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.20-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207707" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.20-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207708" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.20-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207709" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.20-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207710" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.25-69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207713" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.25-69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207714" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.25-69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207715" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.25-69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248055" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.41-81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248056" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.41-81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248057" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.41-81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248058" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.41-81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207717" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.15-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207718" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.15-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229524" version="1" comment="libjpeg is &lt;6.2.0-879.12.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229525" version="1" comment="libjpeg-32bit is &lt;6.2.0-879.12.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255761" version="1" comment="jpeg is &lt;6b-879.12.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255762" version="1" comment="libjpeg is &lt;6.2.0-879.12.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255763" version="1" comment="libjpeg-32bit is &lt;6.2.0-879.12.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207153" version="1" comment="kbd is &lt;1.14.1-16.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208560" version="1" comment="kde4-l10n-bg is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208561" version="1" comment="kde4-l10n-ca is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208562" version="1" comment="kde4-l10n-csb is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208563" version="1" comment="kde4-l10n-el is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208564" version="1" comment="kde4-l10n-et is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208565" version="1" comment="kde4-l10n-eu is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208566" version="1" comment="kde4-l10n-fi is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208567" version="1" comment="kde4-l10n-ga is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208568" version="1" comment="kde4-l10n-gl is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208569" version="1" comment="kde4-l10n-hi is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208570" version="1" comment="kde4-l10n-is is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208571" version="1" comment="kde4-l10n-kk is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208572" version="1" comment="kde4-l10n-km is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208573" version="1" comment="kde4-l10n-ku is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208574" version="1" comment="kde4-l10n-lt is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208575" version="1" comment="kde4-l10n-lv is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208576" version="1" comment="kde4-l10n-mk is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208577" version="1" comment="kde4-l10n-ml is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208578" version="1" comment="kde4-l10n-nds is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208579" version="1" comment="kde4-l10n-nn is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208580" version="1" comment="kde4-l10n-pa is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208581" version="1" comment="kde4-l10n-ro is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208582" version="1" comment="kde4-l10n-sl is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208583" version="1" comment="kde4-l10n-th is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208584" version="1" comment="kde4-l10n-tr is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208585" version="1" comment="kde4-l10n-uk is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208586" version="1" comment="kde4-l10n-wa is &lt;4.3.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238293" version="1" comment="kdelibs3-default-style is &lt;3.5.10-23.30.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207154" version="1" comment="btrfs-kmp-default is &lt;0_2.6.32.59_0.3-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207155" version="1" comment="btrfs-kmp-pae is &lt;0_2.6.32.59_0.3-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207156" version="1" comment="btrfs-kmp-xen is &lt;0_2.6.32.59_0.3-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207157" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.32.59_0.3-7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207158" version="1" comment="ext4dev-kmp-pae is &lt;0_2.6.32.59_0.3-7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207159" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.32.59_0.3-7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207160" version="1" comment="ext4dev-kmp-trace is &lt;0_2.6.32.59_0.3-7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207161" version="1" comment="ext4dev-kmp-xen is &lt;0_2.6.32.59_0.3-7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207162" version="1" comment="hyper-v-kmp-default is &lt;0_2.6.32.59_0.3-0.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207163" version="1" comment="hyper-v-kmp-pae is &lt;0_2.6.32.59_0.3-0.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207164" version="1" comment="hyper-v-kmp-trace is &lt;0_2.6.32.59_0.3-0.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207165" version="1" comment="iscsitarget-kmp-default is &lt;1.4.19_2.6.32.19_0.3-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207166" version="1" comment="kernel-default is &lt;2.6.32.59-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207167" version="1" comment="kernel-default-base is &lt;2.6.32.59-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207168" version="1" comment="kernel-default-devel is &lt;2.6.32.59-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207169" version="1" comment="kernel-default-man is &lt;2.6.32.59-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207170" version="1" comment="kernel-ec2 is &lt;2.6.32.59-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207171" version="1" comment="kernel-ec2-base is &lt;2.6.32.59-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207172" version="1" comment="kernel-ec2-devel is &lt;2.6.32.59-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207173" version="1" comment="kernel-pae is &lt;2.6.32.59-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207174" version="1" comment="kernel-pae-base is &lt;2.6.32.59-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207175" version="1" comment="kernel-pae-devel is &lt;2.6.32.59-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207176" version="1" comment="kernel-ppc64 is &lt;2.6.32.59-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207177" version="1" comment="kernel-ppc64-base is &lt;2.6.32.59-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207178" version="1" comment="kernel-ppc64-devel is &lt;2.6.32.59-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207179" version="1" comment="kernel-source is &lt;2.6.32.59-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207180" version="1" comment="kernel-syms is &lt;2.6.32.59-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207181" version="1" comment="kernel-trace is &lt;2.6.32.59-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207182" version="1" comment="kernel-trace-base is &lt;2.6.32.59-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207183" version="1" comment="kernel-trace-devel is &lt;2.6.32.59-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207184" version="1" comment="kernel-xen is &lt;2.6.32.59-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207185" version="1" comment="kernel-xen-base is &lt;2.6.32.59-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207186" version="1" comment="kernel-xen-devel is &lt;2.6.32.59-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207187" version="1" comment="oracleasm-kmp-default is &lt;2.0.5_2.6.32.19_0.3-7.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207188" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_16_2.6.32.59_0.15-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207189" version="1" comment="xen-kmp-pae is &lt;4.0.3_21548_16_2.6.32.59_0.15-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207190" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_16_2.6.32.59_0.15-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207191" version="1" comment="kernel-ec2 is &lt;2.6.32.24-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207192" version="1" comment="kernel-ec2-base is &lt;2.6.32.24-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208701" version="1" comment="krb5-doc is &lt;1.6.3-133.49.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208702" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.49.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208703" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.49.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208705" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208706" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208707" version="1" comment="krb5-doc is &lt;1.6.3-133.49.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208708" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.49.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208709" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.49.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208710" version="1" comment="krb5-plugins is &lt;1.6.3-133.49.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208712" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208713" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209869" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.106" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209870" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.106" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209872" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.109" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209873" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.109" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209874" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.109" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209875" version="1" comment="krb5-client is &lt;1.6.3-133.49.109" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248574" version="1" comment="krb5 is &lt;1.8.6-133.49.121" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248575" version="1" comment="krb5-32bit is &lt;1.8.6-133.49.121" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248576" version="1" comment="krb5-apps-clients is &lt;1.8.6-133.49.121" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248577" version="1" comment="krb5-apps-servers is &lt;1.8.6-133.49.121" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248578" version="1" comment="krb5-client is &lt;1.8.6-133.49.121" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248579" version="1" comment="krb5-devel is &lt;1.8.6-133.49.121" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248580" version="1" comment="krb5-devel-32bit is &lt;1.8.6-133.49.121" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248581" version="1" comment="krb5-doc is &lt;1.8.6-133.49.121" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248582" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.8.6-133.49.121" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248583" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.8.6-133.49.121" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248584" version="1" comment="krb5-server is &lt;1.8.6-133.49.121" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248585" version="1" comment="krb5 is &lt;1.8.6-133.49.125.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248586" version="1" comment="krb5-32bit is &lt;1.8.6-133.49.125.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248587" version="1" comment="krb5-apps-clients is &lt;1.8.6-133.49.125.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248588" version="1" comment="krb5-apps-servers is &lt;1.8.6-133.49.125.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248589" version="1" comment="krb5-client is &lt;1.8.6-133.49.125.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248590" version="1" comment="krb5-devel is &lt;1.8.6-133.49.125.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248591" version="1" comment="krb5-devel-32bit is &lt;1.8.6-133.49.125.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248592" version="1" comment="krb5-doc is &lt;1.8.6-133.49.125.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248593" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.8.6-133.49.125.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248594" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.8.6-133.49.125.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248595" version="1" comment="krb5-server is &lt;1.8.6-133.49.125.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248596" version="1" comment="krb5 is &lt;1.8.6-133.49.125.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248597" version="1" comment="krb5-32bit is &lt;1.8.6-133.49.125.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248598" version="1" comment="krb5-apps-clients is &lt;1.8.6-133.49.125.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248599" version="1" comment="krb5-apps-servers is &lt;1.8.6-133.49.125.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248600" version="1" comment="krb5-client is &lt;1.8.6-133.49.125.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248601" version="1" comment="krb5-devel is &lt;1.8.6-133.49.125.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248602" version="1" comment="krb5-devel-32bit is &lt;1.8.6-133.49.125.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248603" version="1" comment="krb5-doc is &lt;1.8.6-133.49.125.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248604" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.8.6-133.49.125.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248605" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.8.6-133.49.125.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248606" version="1" comment="krb5-server is &lt;1.8.6-133.49.125.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248607" version="1" comment="krb5 is &lt;1.8.6-133.49.125.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248608" version="1" comment="krb5-32bit is &lt;1.8.6-133.49.125.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248609" version="1" comment="krb5-apps-clients is &lt;1.8.6-133.49.125.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248610" version="1" comment="krb5-apps-servers is &lt;1.8.6-133.49.125.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248611" version="1" comment="krb5-client is &lt;1.8.6-133.49.125.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248612" version="1" comment="krb5-devel is &lt;1.8.6-133.49.125.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248613" version="1" comment="krb5-devel-32bit is &lt;1.8.6-133.49.125.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248614" version="1" comment="krb5-doc is &lt;1.8.6-133.49.125.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248615" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.8.6-133.49.125.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248616" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.8.6-133.49.125.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248617" version="1" comment="krb5-server is &lt;1.8.6-133.49.125.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208715" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208716" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208717" version="1" comment="krb5-doc is &lt;1.6.3-133.49.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208718" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.49.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208719" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.49.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208721" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208722" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208723" version="1" comment="krb5-doc is &lt;1.6.3-133.49.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208724" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.49.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208725" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.49.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208726" version="1" comment="krb5-plugins is &lt;1.6.3-133.49.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207193" version="1" comment="kvm is &lt;0.12.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207194" version="1" comment="kvm is &lt;0.12.5-1.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209890" version="1" comment="lha is &lt;1.14.0.894-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248618" version="1" comment="util-linux is &lt;2.16-6.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248619" version="1" comment="util-linux-lang is &lt;2.16-6.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248620" version="1" comment="libcgroup1 is &lt;0.37.1-5.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256846" version="1" comment="libcroco is &lt;0.6.1-122.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256847" version="1" comment="libcroco-0_6-3 is &lt;0.6.1-122.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256848" version="1" comment="libcroco-0_6-3-32bit is &lt;0.6.1-122.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209897" version="1" comment="db-doc is &lt;4.5.20-97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209898" version="1" comment="db-utils is &lt;4.5.20-97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209899" version="1" comment="db-utils-doc is &lt;4.5.20-97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209900" version="1" comment="libdb-4_5-32bit is &lt;4.5.20-97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209902" version="1" comment="libevent-1_4-2 is &lt;1.4.5-24.24.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209903" version="1" comment="libexif-32bit is &lt;0.6.17-2.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207195" version="1" comment="libgcrypt11 is &lt;1.4.1-6.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207196" version="1" comment="libgcrypt11-32bit is &lt;1.4.1-6.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248621" version="1" comment="libgcrypt is &lt;1.4.1-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248622" version="1" comment="libgcrypt11 is &lt;1.4.1-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248623" version="1" comment="libgcrypt11-32bit is &lt;1.4.1-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248624" version="1" comment="libgcrypt is &lt;1.4.1-6.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248625" version="1" comment="libgcrypt11 is &lt;1.4.1-6.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248626" version="1" comment="libgcrypt11-32bit is &lt;1.4.1-6.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248627" version="1" comment="libgcrypt is &lt;1.4.1-6.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248628" version="1" comment="libgcrypt11 is &lt;1.4.1-6.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248629" version="1" comment="libgcrypt11-32bit is &lt;1.4.1-6.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248630" version="1" comment="libgcrypt11 is &lt;1.4.1-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248631" version="1" comment="libgcrypt11-32bit is &lt;1.4.1-6.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207197" version="1" comment="libgssglue1 is &lt;0.1-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248632" version="1" comment="libical is &lt;0.43-1.2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248633" version="1" comment="libical0 is &lt;0.43-1.2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248634" version="1" comment="libical0-32bit is &lt;0.43-1.2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209912" version="1" comment="libidn-32bit is &lt;1.10-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209914" version="1" comment="libidn-32bit is &lt;1.10-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207198" version="1" comment="libldap-2_4-2 is &lt;2.4.20-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207199" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.20-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207200" version="1" comment="libldap-2_4-2-x86 is &lt;2.4.20-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207201" version="1" comment="openldap2 is &lt;2.4.20-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207202" version="1" comment="openldap2-back-meta is &lt;2.4.20-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207203" version="1" comment="openldap2-client is &lt;2.4.20-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209916" version="1" comment="liblouis is &lt;1.7.0-1.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209917" version="1" comment="liblouis0 is &lt;1.7.0-1.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209918" version="1" comment="python-louis is &lt;1.7.0-1.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209919" version="1" comment="liblouis is &lt;1.7.0-1.3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209920" version="1" comment="liblouis0 is &lt;1.7.0-1.3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209921" version="1" comment="python-louis is &lt;1.7.0-1.3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233822" version="1" comment="liblouis is &lt;1.7.0-1.3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233823" version="1" comment="liblouis0 is &lt;1.7.0-1.3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233824" version="1" comment="python-louis is &lt;1.7.0-1.3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246647" version="1" comment="liblouis is &lt;1.7.0-1.3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246648" version="1" comment="liblouis0 is &lt;1.7.0-1.3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246649" version="1" comment="python-louis is &lt;1.7.0-1.3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246360" version="1" comment="libmspack0 is &lt;0.0.20060920alpha-74.11.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207204" version="1" comment="libmysqlclient15 is &lt;5.0.96-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207205" version="1" comment="libmysqlclient15-32bit is &lt;5.0.96-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207206" version="1" comment="libmysqlclient15-x86 is &lt;5.0.96-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207207" version="1" comment="libmysqlclient_r15 is &lt;5.0.96-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207208" version="1" comment="mysql is &lt;5.0.96-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207209" version="1" comment="mysql-Max is &lt;5.0.96-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207210" version="1" comment="mysql-client is &lt;5.0.96-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207211" version="1" comment="mysql-tools is &lt;5.0.96-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207212" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207213" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207214" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207215" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207216" version="1" comment="libopenssl0_9_8-hmac-x86 is &lt;0.9.8j-0.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207217" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207218" version="1" comment="openssl is &lt;0.9.8j-0.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207219" version="1" comment="openssl-doc is &lt;0.9.8j-0.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207220" version="1" comment="libpciaccess0 is &lt;7.4-8.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207221" version="1" comment="libpciaccess0-32bit is &lt;7.4-8.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207222" version="1" comment="libpciaccess0-x86 is &lt;7.4-8.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207223" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207224" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207225" version="1" comment="xorg-x11-libs-x86 is &lt;7.4-8.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207226" version="1" comment="libpng12-0 is &lt;1.2.31-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207227" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207228" version="1" comment="libpng12-0-x86 is &lt;1.2.31-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209922" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248635" version="1" comment="libpulse-browse0 is &lt;0.9.21-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248636" version="1" comment="libpulse-mainloop-glib0 is &lt;0.9.21-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248637" version="1" comment="libpulse0 is &lt;0.9.21-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248638" version="1" comment="libpulse0-32bit is &lt;0.9.21-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248639" version="1" comment="pulseaudio is &lt;0.9.21-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248640" version="1" comment="pulseaudio-esound-compat is &lt;0.9.21-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248641" version="1" comment="pulseaudio-gdm-hooks is &lt;0.9.21-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248642" version="1" comment="pulseaudio-lang is &lt;0.9.21-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248643" version="1" comment="pulseaudio-module-x11 is &lt;0.9.21-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248644" version="1" comment="pulseaudio-module-zeroconf is &lt;0.9.21-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248645" version="1" comment="pulseaudio-utils is &lt;0.9.21-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207229" version="1" comment="libraptor1 is &lt;1.4.18-28.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207230" version="1" comment="libneon27 is &lt;0.29.6-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207231" version="1" comment="libneon27-32bit is &lt;0.29.6-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209924" version="1" comment="libsamplerate-32bit is &lt;0.1.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209926" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209928" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209930" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.19.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246796" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.19.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207232" version="1" comment="libsnmp15 is &lt;5.4.2.1-8.12.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207233" version="1" comment="libsnmp15-32bit is &lt;5.4.2.1-8.12.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207234" version="1" comment="libsnmp15-x86 is &lt;5.4.2.1-8.12.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207235" version="1" comment="net-snmp is &lt;5.4.2.1-8.12.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207236" version="1" comment="perl-SNMP is &lt;5.4.2.1-8.12.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207237" version="1" comment="snmp-mibs is &lt;5.4.2.1-8.12.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207238" version="1" comment="libsoup-2_4-1 is &lt;2.28.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207239" version="1" comment="libsoup-2_4-1-32bit is &lt;2.28.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207240" version="1" comment="libsoup-2_4-1-x86 is &lt;2.28.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254570" version="1" comment="libtasn1 is &lt;1.5-1.35.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254571" version="1" comment="libtasn1-3 is &lt;1.5-1.35.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254572" version="1" comment="libtasn1-3-32bit is &lt;1.5-1.35.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209043" version="1" comment="libtcnative-1-0 is &lt;1.3.3-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209932" version="1" comment="libtcnative-1-0 is &lt;1.3.3-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207241" version="1" comment="libtiff3 is &lt;3.8.2-141.148" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207242" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.148" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207243" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.148" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207244" version="1" comment="tiff is &lt;3.8.2-141.148" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248646" version="1" comment="rpcbind is &lt;0.1.6+git20080930-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233807" version="1" comment="libtirpc1 is &lt;0.2.1-1.13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237187" version="1" comment="libtirpc1 is &lt;0.2.1-1.13.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207245" version="1" comment="libvirt is &lt;0.7.6-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207246" version="1" comment="libvirt-doc is &lt;0.7.6-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207247" version="1" comment="libvirt-python is &lt;0.7.6-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209951" version="1" comment="libvorbis-32bit is &lt;1.2.0-79.20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209952" version="1" comment="libvorbis-doc is &lt;1.2.0-79.20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209954" version="1" comment="libvorbis-32bit is &lt;1.2.0-79.20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209955" version="1" comment="libvorbis-doc is &lt;1.2.0-79.20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209957" version="1" comment="libvorbis-32bit is &lt;1.2.0-79.20.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209958" version="1" comment="libvorbis-doc is &lt;1.2.0-79.20.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209960" version="1" comment="libvorbis-32bit is &lt;1.2.0-79.20.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209961" version="1" comment="libvorbis-doc is &lt;1.2.0-79.20.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207248" version="1" comment="libxml2 is &lt;2.7.6-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207249" version="1" comment="libxml2-32bit is &lt;2.7.6-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207250" version="1" comment="libxml2-doc is &lt;2.7.6-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207251" version="1" comment="libxml2-x86 is &lt;2.7.6-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209963" version="1" comment="libxml2-32bit is &lt;2.7.6-0.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209964" version="1" comment="libxml2-doc is &lt;2.7.6-0.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209965" version="1" comment="libxml2-python is &lt;2.7.6-0.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207874" version="1" comment="libxml2-32bit is &lt;2.7.6-0.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207875" version="1" comment="libxml2-doc is &lt;2.7.6-0.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207876" version="1" comment="libxml2-python is &lt;2.7.6-0.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209968" version="1" comment="libxml2-32bit is &lt;2.7.6-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209969" version="1" comment="libxml2-doc is &lt;2.7.6-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209970" version="1" comment="libxml2-python is &lt;2.7.6-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209972" version="1" comment="libxml2-32bit is &lt;2.7.6-0.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209973" version="1" comment="libxml2-doc is &lt;2.7.6-0.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209974" version="1" comment="libxml2-python is &lt;2.7.6-0.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208762" version="1" comment="libxml2-32bit is &lt;2.7.6-0.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209977" version="1" comment="libxml2-32bit is &lt;2.7.6-0.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209978" version="1" comment="libxml2-doc is &lt;2.7.6-0.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209979" version="1" comment="libxml2-python is &lt;2.7.6-0.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209981" version="1" comment="libxml2-32bit is &lt;2.7.6-0.77.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209982" version="1" comment="libxml2-doc is &lt;2.7.6-0.77.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209983" version="1" comment="libxml2-python is &lt;2.7.6-0.77.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209985" version="1" comment="libxml2-32bit is &lt;2.7.6-0.77.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209986" version="1" comment="libxml2-doc is &lt;2.7.6-0.77.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209987" version="1" comment="libxml2-python is &lt;2.7.6-0.77.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246174" version="1" comment="libxml2-32bit is &lt;2.7.6-0.77.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265198" version="1" comment="libxml2-32bit is &lt;2.7.6-0.77.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208763" version="1" comment="libxml2-doc is &lt;2.7.6-0.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208765" version="1" comment="libxml2-doc is &lt;2.7.6-0.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207252" version="1" comment="libxslt is &lt;1.1.24-19.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207253" version="1" comment="libxslt-32bit is &lt;1.1.24-19.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207254" version="1" comment="libxslt-x86 is &lt;1.1.24-19.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209989" version="1" comment="libxslt-32bit is &lt;1.1.24-19.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253696" version="1" comment="libxslt is &lt;1.1.24-19.34.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253697" version="1" comment="libxslt-32bit is &lt;1.1.24-19.34.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207255" version="1" comment="logwatch is &lt;7.3.6-65.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207256" version="1" comment="lvm2 is &lt;2.02.39-18.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223386" version="1" comment="mailman is &lt;2.1.15-9.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207257" version="1" comment="man-pages is &lt;3.15-2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207877" version="1" comment="MozillaFirefox is &lt;45.5.1esr-63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207878" version="1" comment="MozillaFirefox-translations is &lt;45.5.1esr-63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207879" version="1" comment="libfreebl3 is &lt;3.21.3-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207880" version="1" comment="libfreebl3-32bit is &lt;3.21.3-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207881" version="1" comment="mozilla-nss is &lt;3.21.3-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207882" version="1" comment="mozilla-nss-32bit is &lt;3.21.3-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207884" version="1" comment="mozilla-nss-tools is &lt;3.21.3-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235286" version="1" comment="g3utils is &lt;1.1.36-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235287" version="1" comment="mgetty is &lt;1.1.36-28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248647" version="1" comment="microcode_ctl is &lt;1.17-102.57.64.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248648" version="1" comment="microcode_ctl is &lt;1.17-102.57.64.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248649" version="1" comment="microcode_ctl is &lt;1.17-102.57.64.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248650" version="1" comment="microcode_ctl is &lt;1.17-102.57.64.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248651" version="1" comment="microcode_ctl is &lt;1.17-102.57.64.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248652" version="1" comment="microcode_ctl is &lt;1.17-102.57.64.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210042" version="1" comment="minicom is &lt;2.3-27.24.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248653" version="1" comment="mono-core is &lt;2.0.1-1.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248654" version="1" comment="mono-data is &lt;2.0.1-1.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248655" version="1" comment="mono-data-postgresql is &lt;2.0.1-1.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248656" version="1" comment="mono-data-sqlite is &lt;2.0.1-1.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248657" version="1" comment="mono-locale-extras is &lt;2.0.1-1.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248658" version="1" comment="mono-nunit is &lt;2.0.1-1.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248659" version="1" comment="mono-web is &lt;2.0.1-1.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248660" version="1" comment="mono-winforms is &lt;2.0.1-1.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207885" version="1" comment="MozillaFirefox is &lt;38.6.1esr-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207886" version="1" comment="MozillaFirefox-translations is &lt;38.6.1esr-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207887" version="1" comment="libfreebl3 is &lt;3.20.2-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207888" version="1" comment="libfreebl3-32bit is &lt;3.20.2-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207889" version="1" comment="mozilla-nss is &lt;3.20.2-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207890" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207892" version="1" comment="mozilla-nss-tools is &lt;3.20.2-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207258" version="1" comment="MozillaFirefox is &lt;38.2.0esr-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207259" version="1" comment="MozillaFirefox-branding-SLED is &lt;31.0-0.5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207260" version="1" comment="MozillaFirefox-translations is &lt;38.2.0esr-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207261" version="1" comment="firefox-gcc47 is &lt;4.7.2_20130108-0.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207262" version="1" comment="firefox-libgcc_s1 is &lt;4.7.2_20130108-0.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207263" version="1" comment="firefox-libstdc++6 is &lt;4.7.2_20130108-0.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207264" version="1" comment="libfreebl3 is &lt;3.19.2.0-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207265" version="1" comment="libfreebl3-32bit is &lt;3.19.2.0-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207266" version="1" comment="mozilla-nss is &lt;3.19.2.0-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207267" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.0-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207268" version="1" comment="mozilla-nss-devel is &lt;3.19.2.0-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207269" version="1" comment="mozilla-nss-tools is &lt;3.19.2.0-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207270" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.19-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207271" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.19-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207272" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.19-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207273" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.19-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207274" version="1" comment="mozilla-xulrunner191-x86 is &lt;1.9.1.19-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210049" version="1" comment="libmysqlclient15 is &lt;5.0.96-0.8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210050" version="1" comment="libmysqlclient15-32bit is &lt;5.0.96-0.8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210052" version="1" comment="libmysqlclient_r15 is &lt;5.0.96-0.8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248661" version="1" comment="mysql-Max is &lt;5.0.96-0.8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248662" version="1" comment="mysql-client is &lt;5.0.96-0.8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248663" version="1" comment="mysql-tools is &lt;5.0.96-0.8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207275" version="1" comment="nagios is &lt;3.0.6-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207276" version="1" comment="nagios-www is &lt;3.0.6-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229378" version="1" comment="nagios-nrpe is &lt;2.12-24.4.10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229379" version="1" comment="nagios-nrpe-doc is &lt;2.12-24.4.10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229380" version="1" comment="nagios-plugins-nrpe is &lt;2.12-24.4.10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223530" version="1" comment="nautilus-32bit is &lt;2.28.4-1.16.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223531" version="1" comment="nautilus-lang is &lt;2.28.4-1.16.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210086" version="1" comment="libncurses5 is &lt;5.6-92" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210087" version="1" comment="libncurses5-32bit is &lt;5.6-92" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210089" version="1" comment="libncurses6 is &lt;5.6-92" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210090" version="1" comment="libncurses6-32bit is &lt;5.6-92" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210092" version="1" comment="ncurses-utils is &lt;5.6-92" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210093" version="1" comment="terminfo is &lt;5.6-92" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210094" version="1" comment="terminfo-base is &lt;5.6-92" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210095" version="1" comment="libncurses5 is &lt;5.6-93.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210096" version="1" comment="libncurses5-32bit is &lt;5.6-93.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210098" version="1" comment="libncurses6 is &lt;5.6-93.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210099" version="1" comment="libncurses6-32bit is &lt;5.6-93.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210101" version="1" comment="ncurses-utils is &lt;5.6-93.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210102" version="1" comment="terminfo is &lt;5.6-93.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210103" version="1" comment="terminfo-base is &lt;5.6-93.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210104" version="1" comment="libncurses5 is &lt;5.6-93.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210105" version="1" comment="libncurses5-32bit is &lt;5.6-93.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210107" version="1" comment="libncurses6 is &lt;5.6-93.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210108" version="1" comment="libncurses6-32bit is &lt;5.6-93.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210110" version="1" comment="ncurses-utils is &lt;5.6-93.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210111" version="1" comment="terminfo is &lt;5.6-93.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210112" version="1" comment="terminfo-base is &lt;5.6-93.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210113" version="1" comment="libncurses5 is &lt;5.6-93.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210114" version="1" comment="libncurses5-32bit is &lt;5.6-93.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210116" version="1" comment="libncurses6 is &lt;5.6-93.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210117" version="1" comment="libncurses6-32bit is &lt;5.6-93.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210119" version="1" comment="ncurses-utils is &lt;5.6-93.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210120" version="1" comment="terminfo is &lt;5.6-93.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210121" version="1" comment="terminfo-base is &lt;5.6-93.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210122" version="1" comment="libnetpbm10 is &lt;10.26.44-101.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210123" version="1" comment="libnetpbm10-32bit is &lt;10.26.44-101.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257957" version="1" comment="libnetpbm10-32bit is &lt;10.26.44-101.15.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207277" version="1" comment="nfs-client is &lt;1.2.1-2.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207278" version="1" comment="nfs-doc is &lt;1.2.1-2.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207279" version="1" comment="nfs-kernel-server is &lt;1.2.1-2.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265063" version="1" comment="nmap is &lt;4.75-1.30.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207280" version="1" comment="libfreebl3 is &lt;3.12.11-3.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207281" version="1" comment="libfreebl3-32bit is &lt;3.12.11-3.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207282" version="1" comment="libfreebl3-x86 is &lt;3.12.11-3.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207283" version="1" comment="mozilla-nspr is &lt;4.8.9-1.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207284" version="1" comment="mozilla-nspr-32bit is &lt;4.8.9-1.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207285" version="1" comment="mozilla-nspr-x86 is &lt;4.8.9-1.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207286" version="1" comment="mozilla-nss is &lt;3.12.11-3.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207287" version="1" comment="mozilla-nss-32bit is &lt;3.12.11-3.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207288" version="1" comment="mozilla-nss-tools is &lt;3.12.11-3.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207289" version="1" comment="mozilla-nss-x86 is &lt;3.12.11-3.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207290" version="1" comment="ntp is &lt;4.2.4p8-1.29.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207291" version="1" comment="ntp-doc is &lt;4.2.4p8-1.29.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207904" version="1" comment="ntp is &lt;4.2.8p6-41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207905" version="1" comment="ntp-doc is &lt;4.2.8p6-41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207906" version="1" comment="yast2-ntp-client is &lt;2.17.14.1-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207907" version="1" comment="ntp is &lt;4.2.8p7-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207908" version="1" comment="ntp-doc is &lt;4.2.8p7-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210125" version="1" comment="libtasn1-3 is &lt;1.5-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210126" version="1" comment="libtasn1-3-32bit is &lt;1.5-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207909" version="1" comment="ntp is &lt;4.2.8p8-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207910" version="1" comment="ntp-doc is &lt;4.2.8p8-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248664" version="1" comment="ntp is &lt;4.2.8p10-48.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248665" version="1" comment="ntp-doc is &lt;4.2.8p10-48.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248666" version="1" comment="ntp is &lt;4.2.8p11-48.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248667" version="1" comment="ntp-doc is &lt;4.2.8p11-48.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207292" version="1" comment="cxgb3-firmware is &lt;1.5.2-0.9.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207293" version="1" comment="ofed is &lt;1.5.2-0.9.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207294" version="1" comment="ofed-doc is &lt;1.5.2-0.9.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207295" version="1" comment="ofed-kmp-default is &lt;1.5.2_2.6.32.46_0.3-0.9.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207296" version="1" comment="ofed-kmp-pae is &lt;1.5.2_2.6.32.46_0.3-0.9.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207297" version="1" comment="ofed-kmp-ppc64 is &lt;1.5.2_2.6.32.46_0.3-0.9.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248668" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.17.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248669" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.17.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248670" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.17.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248671" version="1" comment="openldap2 is &lt;2.4.26-0.17.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248672" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.17.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248673" version="1" comment="openldap2-client is &lt;2.4.26-0.17.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248674" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.17.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248675" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.17.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248676" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.17.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248677" version="1" comment="openldap2 is &lt;2.4.26-0.17.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248678" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.17.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248679" version="1" comment="openldap2-client is &lt;2.4.26-0.17.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238593" version="1" comment="libopensc2 is &lt;0.11.6-5.27.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238594" version="1" comment="libopensc2-32bit is &lt;0.11.6-5.27.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238596" version="1" comment="opensc-32bit is &lt;0.11.6-5.27.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207298" version="1" comment="openslp is &lt;1.2.0-172.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207299" version="1" comment="openslp-32bit is &lt;1.2.0-172.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207300" version="1" comment="openslp-server is &lt;1.2.0-172.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207301" version="1" comment="openslp-x86 is &lt;1.2.0-172.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248680" version="1" comment="libslp1-openssl1-32bit is &lt;1.2.0-172.27.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230002" version="1" comment="openslp-32bit is &lt;1.2.0-172.27.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207302" version="1" comment="openssh is &lt;5.1p1-41.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207303" version="1" comment="openssh-askpass is &lt;5.1p1-41.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207913" version="1" comment="openssh is &lt;5.1p1-41.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207914" version="1" comment="openssh-askpass is &lt;5.1p1-41.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207915" version="1" comment="openssh-askpass-gnome is &lt;5.1p1-41.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248681" version="1" comment="openssh is &lt;5.1p1-41.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248682" version="1" comment="openssh-askpass is &lt;5.1p1-41.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248683" version="1" comment="openssh-askpass-gnome is &lt;5.1p1-41.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248684" version="1" comment="openssh is &lt;5.1p1-41.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248685" version="1" comment="openssh-askpass is &lt;5.1p1-41.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248686" version="1" comment="openssh-askpass-gnome is &lt;5.1p1-41.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248687" version="1" comment="openssh is &lt;5.1p1-41.80.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248688" version="1" comment="openssh-askpass is &lt;1.2.4.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248689" version="1" comment="openssh-openssl1 is &lt;6.6p1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248690" version="1" comment="openssh-openssl1-helpers is &lt;6.6p1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248691" version="1" comment="openssh is &lt;6.6p1-80.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248692" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-80.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248693" version="1" comment="openssh-openssl1 is &lt;6.6p1-80.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248694" version="1" comment="openssh-openssl1-helpers is &lt;6.6p1-80.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251285" version="1" comment="openssh is &lt;6.6p1-80.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251286" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-80.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251287" version="1" comment="openssh-openssl1 is &lt;6.6p1-80.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251288" version="1" comment="openssh-openssl1-helpers is &lt;6.6p1-80.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248695" version="1" comment="openssh is &lt;5.1p1-41.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248696" version="1" comment="openssh-askpass is &lt;5.1p1-41.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248697" version="1" comment="openssh-askpass-gnome is &lt;5.1p1-41.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248698" version="1" comment="openssh-openssl1 is &lt;6.6p1-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248699" version="1" comment="openssh-openssl1-helpers is &lt;6.6p1-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207916" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207918" version="1" comment="openssl-doc is &lt;0.9.8j-0.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207919" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207921" version="1" comment="openssl-doc is &lt;0.9.8j-0.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207922" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207923" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207924" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207926" version="1" comment="openssl-doc is &lt;0.9.8j-0.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207927" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.102" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208804" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210153" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210154" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210155" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210158" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231342" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233298" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233299" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233300" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233303" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242434" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257187" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264922" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207304" version="1" comment="openssl-certs is &lt;0.9.8h-27.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248700" version="1" comment="libopenssl1-devel-32bit is &lt;1.0.1g-0.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248701" version="1" comment="libopenssl1-devel-32bit is &lt;1.0.1g-0.58.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248702" version="1" comment="libopenssl1-devel-32bit is &lt;1.0.1g-0.58.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248703" version="1" comment="libopenssl1-devel-32bit is &lt;1.0.1g-0.58.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248704" version="1" comment="libopenssl1-devel-32bit is &lt;1.0.1g-0.58.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257188" version="1" comment="libopenssl1-devel-32bit is &lt;1.0.1g-0.58.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257189" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264682" version="1" comment="libopenssl1-devel-32bit is &lt;1.0.1g-0.58.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207931" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.33.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248705" version="1" comment="openvpn is &lt;2.0.9-143.35.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248706" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.35.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248707" version="1" comment="openvpn is &lt;2.0.9-143.35.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248708" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.35.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248709" version="1" comment="openvpn is &lt;2.0.9-143.35.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248710" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.35.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248711" version="1" comment="openvpn is &lt;2.0.9-143.35.9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248712" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.35.9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245945" version="1" comment="libwsman1 is &lt;2.2.3-0.16.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245946" version="1" comment="openwsman-client is &lt;2.2.3-0.16.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245947" version="1" comment="openwsman-server is &lt;2.2.3-0.16.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207305" version="1" comment="permissions is &lt;2011.6.28-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207306" version="1" comment="pam is &lt;1.0.4-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207307" version="1" comment="pam-32bit is &lt;1.0.4-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207308" version="1" comment="pam-doc is &lt;1.0.4-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207309" version="1" comment="pam-x86 is &lt;1.0.4-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252985" version="1" comment="pam is &lt;1.0.4-0.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252986" version="1" comment="pam-32bit is &lt;1.0.4-0.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252987" version="1" comment="pam-doc is &lt;1.0.4-0.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248713" version="1" comment="pam-modules is &lt;11-1.22.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248714" version="1" comment="pam-modules-32bit is &lt;11-1.22.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235178" version="1" comment="pam_pkcs11 is &lt;0.6.0-141.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235179" version="1" comment="pam_pkcs11-32bit is &lt;0.6.0-141.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207310" version="1" comment="perf is &lt;2.6.32.46-2.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248715" version="1" comment="perl is &lt;5.10.0-64.61.63.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248716" version="1" comment="perl-32bit is &lt;5.10.0-64.61.63.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248717" version="1" comment="perl-base is &lt;5.10.0-64.61.63.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248718" version="1" comment="perl-doc is &lt;5.10.0-64.61.63.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232615" version="1" comment="perl-Archive-Zip is &lt;1.24-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207311" version="1" comment="perl-Config-General is &lt;2.33-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207312" version="1" comment="perl-libwww-perl is &lt;5.816-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207933" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207934" version="1" comment="php5 is &lt;5.2.14-0.7.30.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207935" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207936" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207937" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207938" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207939" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207940" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207941" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207942" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207943" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207944" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207945" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207946" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207947" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207948" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207949" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207950" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207951" version="1" comment="php5-json is &lt;5.2.14-0.7.30.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207952" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207953" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207954" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207955" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207956" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207957" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207958" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207959" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207960" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207961" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207962" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207963" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207964" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207965" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207966" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207967" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207968" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207969" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207970" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207971" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207972" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207973" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207974" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207975" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207976" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207977" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248719" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248720" version="1" comment="php5 is &lt;5.2.14-0.7.30.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248721" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248722" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248723" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248724" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248725" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248726" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248727" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248728" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248729" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248730" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248731" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248732" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248733" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248734" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248735" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248736" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248737" version="1" comment="php5-json is &lt;5.2.14-0.7.30.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248738" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248739" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248740" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248741" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248742" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248743" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248744" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248745" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248746" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248747" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248748" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248749" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248750" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248751" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248752" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248753" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248754" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248755" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248756" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248757" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248758" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248759" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248760" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248761" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248762" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248763" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248764" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248765" version="1" comment="php5 is &lt;5.2.14-0.7.30.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248766" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248767" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248768" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248769" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248770" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248771" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248772" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248773" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248774" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248775" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248776" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248777" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248778" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248779" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248780" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248781" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248782" version="1" comment="php5-json is &lt;5.2.14-0.7.30.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248783" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248784" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248785" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248786" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248787" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248788" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248789" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248790" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248791" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248792" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248793" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248794" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248795" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248796" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248797" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248798" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248799" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248800" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248801" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248802" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248803" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248804" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248805" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248806" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248807" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248808" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207978" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207979" version="1" comment="php5 is &lt;5.2.14-0.7.30.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207980" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207981" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207982" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207983" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207984" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207985" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207986" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207987" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207988" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207989" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207990" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207991" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207992" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207993" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207994" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207995" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207996" version="1" comment="php5-json is &lt;5.2.14-0.7.30.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207997" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207998" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207999" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208000" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208001" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208002" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208003" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208004" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208005" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208006" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208007" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208008" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208009" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208010" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208011" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208012" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208013" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208014" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208015" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208016" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208017" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208018" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208019" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208020" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208021" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208022" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248809" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248810" version="1" comment="php5 is &lt;5.2.14-0.7.30.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248811" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248812" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248813" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248814" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248815" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248816" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248817" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248818" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248819" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248820" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248821" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248822" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248823" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248824" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248825" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248826" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248827" version="1" comment="php5-json is &lt;5.2.14-0.7.30.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248828" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248829" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248830" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248831" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248832" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248833" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248834" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248835" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248836" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248837" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248838" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248839" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248840" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248841" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248842" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248843" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248844" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248845" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248846" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248847" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248848" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248849" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248850" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248851" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248852" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248853" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248854" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248855" version="1" comment="php5 is &lt;5.2.14-0.7.30.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248856" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248857" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248858" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248859" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248860" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248861" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248862" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248863" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248864" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248865" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248866" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248867" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248868" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248869" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248870" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248871" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248872" version="1" comment="php5-json is &lt;5.2.14-0.7.30.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248873" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248874" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248875" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248876" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248877" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248878" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248879" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248880" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248881" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248882" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248883" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248884" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248885" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248886" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248887" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248888" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248889" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248890" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248891" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248892" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248893" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248894" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248895" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248896" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248897" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248898" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248899" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248900" version="1" comment="php5 is &lt;5.2.14-0.7.30.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248901" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248902" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248903" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248904" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248905" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248906" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248907" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248908" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248909" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248910" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248911" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248912" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248913" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248914" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248915" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248916" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248917" version="1" comment="php5-json is &lt;5.2.14-0.7.30.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248918" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248919" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248920" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248921" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248922" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248923" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248924" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248925" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248926" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248927" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248928" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248929" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248930" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248931" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248932" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248933" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248934" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248935" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248936" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248937" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248938" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248939" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248940" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248941" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248942" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248943" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248944" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248945" version="1" comment="php5 is &lt;5.2.14-0.7.30.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248946" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248947" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248948" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248949" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248950" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248951" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248952" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248953" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248954" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248955" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248956" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248957" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248958" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248959" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248960" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248961" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248962" version="1" comment="php5-json is &lt;5.2.14-0.7.30.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248963" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248964" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248965" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248966" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248967" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248968" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248969" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248970" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248971" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248972" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248973" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248974" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248975" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248976" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248977" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248978" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248979" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248980" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248981" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248982" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248983" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248984" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248985" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248986" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248987" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248988" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248989" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248990" version="1" comment="php5 is &lt;5.2.14-0.7.30.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248991" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248992" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248993" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248994" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248995" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248996" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248997" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248998" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009248999" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249000" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249001" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249002" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249003" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249004" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249005" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249006" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249007" version="1" comment="php5-json is &lt;5.2.14-0.7.30.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249008" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249009" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249010" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249011" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249012" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249013" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249014" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249015" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249016" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249017" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249018" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249019" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249020" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249021" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249022" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249023" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249024" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249025" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249026" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249027" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249028" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249029" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249030" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249031" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249032" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249033" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249034" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249035" version="1" comment="php5 is &lt;5.2.14-0.7.30.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249036" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249037" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249038" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249039" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249040" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249041" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249042" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249043" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249044" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249045" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249046" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249047" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249048" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249049" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249050" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249051" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249052" version="1" comment="php5-json is &lt;5.2.14-0.7.30.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249053" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249054" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249055" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249056" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249057" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249058" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249059" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249060" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249061" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249062" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249063" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249064" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249065" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249066" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249067" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249068" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249069" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249070" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249071" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249072" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249073" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249074" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249075" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249076" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249077" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249078" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249079" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.111.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249080" version="1" comment="php5 is &lt;5.2.14-0.7.30.111.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249081" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.111.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249082" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.111.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249083" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.111.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249084" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.111.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249085" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.111.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249086" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.111.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249087" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.111.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249088" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.111.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249089" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.111.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249090" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.111.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249091" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.111.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249092" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.111.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249093" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.111.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249094" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.111.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249095" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.111.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249096" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.111.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249097" version="1" comment="php5-json is &lt;5.2.14-0.7.30.111.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249098" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.111.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249099" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.111.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249100" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.111.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249101" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.111.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249102" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.111.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249103" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.111.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249104" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.111.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249105" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.111.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249106" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.111.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249107" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.111.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249108" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.111.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249109" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.111.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249110" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.111.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249111" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.111.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249112" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.111.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249113" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.111.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249114" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.111.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249115" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.111.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249116" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.111.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249117" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.111.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249118" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.111.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249119" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.111.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249120" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.111.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249121" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.111.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249122" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.111.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249123" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.111.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249124" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.111.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249125" version="1" comment="php5 is &lt;5.2.14-0.7.30.111.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249126" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.111.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249127" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.111.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249128" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.111.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249129" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.111.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249130" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.111.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249131" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.111.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249132" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.111.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249133" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.111.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249134" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.111.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249135" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.111.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249136" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.111.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249137" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.111.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249138" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.111.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249139" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.111.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249140" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.111.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249141" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.111.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249142" version="1" comment="php5-json is &lt;5.2.14-0.7.30.111.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249143" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.111.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249144" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.111.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249145" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.111.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249146" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.111.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249147" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.111.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249148" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.111.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249149" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.111.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249150" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.111.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249151" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.111.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249152" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.111.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249153" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.111.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249154" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.111.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249155" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.111.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249156" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.111.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249157" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.111.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249158" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.111.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249159" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.111.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249160" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.111.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249161" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.111.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249162" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.111.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249163" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.111.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249164" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.111.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249165" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.111.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249166" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.111.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249167" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.111.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249168" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.111.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249169" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.111.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249170" version="1" comment="php5 is &lt;5.2.14-0.7.30.111.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249171" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.111.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249172" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.111.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249173" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.111.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249174" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.111.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249175" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.111.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249176" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.111.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249177" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.111.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249178" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.111.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249179" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.111.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249180" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.111.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249181" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.111.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249182" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.111.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249183" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.111.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249184" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.111.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249185" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.111.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249186" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.111.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249187" version="1" comment="php5-json is &lt;5.2.14-0.7.30.111.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249188" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.111.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249189" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.111.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249190" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.111.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249191" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.111.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249192" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.111.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249193" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.111.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249194" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.111.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249195" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.111.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249196" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.111.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249197" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.111.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249198" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.111.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249199" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.111.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249200" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.111.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249201" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.111.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249202" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.111.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249203" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.111.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249204" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.111.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249205" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.111.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249206" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.111.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249207" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.111.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249208" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.111.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249209" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.111.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249210" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.111.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249211" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.111.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249212" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.111.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249213" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.111.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249214" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.111.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249215" version="1" comment="php5 is &lt;5.2.14-0.7.30.111.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249216" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.111.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249217" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.111.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249218" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.111.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249219" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.111.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249220" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.111.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249221" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.111.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249222" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.111.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249223" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.111.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249224" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.111.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249225" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.111.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249226" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.111.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249227" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.111.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249228" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.111.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249229" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.111.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249230" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.111.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249231" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.111.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249232" version="1" comment="php5-json is &lt;5.2.14-0.7.30.111.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249233" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.111.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249234" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.111.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249235" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.111.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249236" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.111.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249237" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.111.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249238" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.111.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249239" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.111.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249240" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.111.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249241" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.111.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249242" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.111.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249243" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.111.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249244" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.111.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249245" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.111.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249246" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.111.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249247" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.111.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249248" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.111.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249249" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.111.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249250" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.111.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249251" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.111.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249252" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.111.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249253" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.111.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249254" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.111.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249255" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.111.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249256" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.111.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249257" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.111.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249258" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.111.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249259" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.111.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249260" version="1" comment="php5 is &lt;5.2.14-0.7.30.111.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249261" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.111.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249262" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.111.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249263" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.111.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249264" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.111.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249265" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.111.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249266" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.111.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249267" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.111.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249268" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.111.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249269" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.111.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249270" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.111.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249271" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.111.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249272" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.111.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249273" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.111.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249274" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.111.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249275" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.111.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249276" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.111.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249277" version="1" comment="php5-json is &lt;5.2.14-0.7.30.111.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249278" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.111.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249279" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.111.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249280" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.111.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249281" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.111.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249282" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.111.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249283" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.111.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249284" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.111.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249285" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.111.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249286" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.111.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249287" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.111.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249288" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.111.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249289" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.111.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249290" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.111.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249291" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.111.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249292" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.111.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249293" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.111.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249294" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.111.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249295" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.111.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249296" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.111.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249297" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.111.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249298" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.111.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249299" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.111.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249300" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.111.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249301" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.111.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249302" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.111.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249303" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.111.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249304" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.111.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249305" version="1" comment="php5 is &lt;5.2.14-0.7.30.111.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249306" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.111.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249307" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.111.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249308" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.111.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249309" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.111.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249310" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.111.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249311" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.111.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249312" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.111.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249313" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.111.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249314" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.111.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249315" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.111.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249316" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.111.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249317" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.111.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249318" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.111.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249319" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.111.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249320" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.111.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249321" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.111.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249322" version="1" comment="php5-json is &lt;5.2.14-0.7.30.111.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249323" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.111.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249324" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.111.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249325" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.111.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249326" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.111.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249327" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.111.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249328" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.111.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249329" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.111.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249330" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.111.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249331" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.111.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249332" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.111.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249333" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.111.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249334" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.111.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249335" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.111.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249336" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.111.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249337" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.111.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249338" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.111.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249339" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.111.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249340" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.111.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249341" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.111.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249342" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.111.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249343" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.111.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249344" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.111.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249345" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.111.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249346" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.111.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249347" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.111.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249348" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.111.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249349" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.111.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249350" version="1" comment="php5 is &lt;5.2.14-0.7.30.111.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249351" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.111.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249352" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.111.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249353" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.111.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249354" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.111.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249355" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.111.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249356" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.111.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249357" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.111.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249358" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.111.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249359" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.111.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249360" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.111.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249361" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.111.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249362" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.111.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249363" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.111.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249364" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.111.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249365" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.111.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249366" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.111.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249367" version="1" comment="php5-json is &lt;5.2.14-0.7.30.111.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249368" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.111.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249369" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.111.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249370" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.111.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249371" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.111.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249372" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.111.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249373" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.111.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249374" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.111.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249375" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.111.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249376" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.111.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249377" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.111.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249378" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.111.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249379" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.111.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249380" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.111.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249381" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.111.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249382" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.111.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249383" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.111.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249384" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.111.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249385" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.111.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249386" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.111.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249387" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.111.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249388" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.111.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249389" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.111.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249390" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.111.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249391" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.111.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249392" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.111.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249393" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.111.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249394" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.111.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249395" version="1" comment="php5 is &lt;5.2.14-0.7.30.111.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249396" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.111.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249397" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.111.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249398" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.111.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249399" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.111.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249400" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.111.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249401" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.111.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249402" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.111.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249403" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.111.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249404" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.111.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249405" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.111.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249406" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.111.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249407" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.111.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249408" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.111.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249409" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.111.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249410" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.111.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249411" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.111.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249412" version="1" comment="php5-json is &lt;5.2.14-0.7.30.111.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249413" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.111.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249414" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.111.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249415" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.111.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249416" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.111.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249417" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.111.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249418" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.111.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249419" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.111.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249420" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.111.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249421" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.111.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249422" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.111.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249423" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.111.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249424" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.111.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249425" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.111.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249426" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.111.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249427" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.111.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249428" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.111.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249429" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.111.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249430" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.111.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249431" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.111.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249432" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.111.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249433" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.111.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249434" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.111.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249435" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.111.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249436" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.111.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249437" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.111.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249438" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.111.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249439" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.111.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249440" version="1" comment="php5 is &lt;5.2.14-0.7.30.111.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249441" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.111.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249442" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.111.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249443" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.111.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249444" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.111.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249445" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.111.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249446" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.111.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249447" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.111.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249448" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.111.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249449" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.111.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249450" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.111.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249451" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.111.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249452" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.111.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249453" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.111.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249454" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.111.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249455" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.111.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249456" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.111.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249457" version="1" comment="php5-json is &lt;5.2.14-0.7.30.111.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249458" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.111.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249459" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.111.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249460" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.111.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249461" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.111.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249462" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.111.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249463" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.111.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249464" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.111.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249465" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.111.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249466" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.111.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249467" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.111.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249468" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.111.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249469" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.111.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249470" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.111.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249471" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.111.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249472" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.111.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249473" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.111.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249474" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.111.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249475" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.111.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249476" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.111.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249477" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.111.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249478" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.111.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249479" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.111.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249480" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.111.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249481" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.111.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249482" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.111.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249483" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.111.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249484" version="1" comment="apache2-mod_php5 is &lt;5.2.14-111.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249485" version="1" comment="php5 is &lt;5.2.14-111.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249486" version="1" comment="php5-bcmath is &lt;5.2.14-111.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249487" version="1" comment="php5-bz2 is &lt;5.2.14-111.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249488" version="1" comment="php5-calendar is &lt;5.2.14-111.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249489" version="1" comment="php5-ctype is &lt;5.2.14-111.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249490" version="1" comment="php5-curl is &lt;5.2.14-111.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249491" version="1" comment="php5-dba is &lt;5.2.14-111.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249492" version="1" comment="php5-dbase is &lt;5.2.14-111.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249493" version="1" comment="php5-dom is &lt;5.2.14-111.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249494" version="1" comment="php5-exif is &lt;5.2.14-111.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249495" version="1" comment="php5-fastcgi is &lt;5.2.14-111.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249496" version="1" comment="php5-ftp is &lt;5.2.14-111.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249497" version="1" comment="php5-gd is &lt;5.2.14-111.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249498" version="1" comment="php5-gettext is &lt;5.2.14-111.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249499" version="1" comment="php5-gmp is &lt;5.2.14-111.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249500" version="1" comment="php5-hash is &lt;5.2.14-111.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249501" version="1" comment="php5-iconv is &lt;5.2.14-111.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249502" version="1" comment="php5-json is &lt;5.2.14-111.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249503" version="1" comment="php5-ldap is &lt;5.2.14-111.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249504" version="1" comment="php5-mbstring is &lt;5.2.14-111.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249505" version="1" comment="php5-mcrypt is &lt;5.2.14-111.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249506" version="1" comment="php5-mysql is &lt;5.2.14-111.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249507" version="1" comment="php5-odbc is &lt;5.2.14-111.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249508" version="1" comment="php5-openssl is &lt;5.2.14-111.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249509" version="1" comment="php5-pcntl is &lt;5.2.14-111.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249510" version="1" comment="php5-pdo is &lt;5.2.14-111.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249511" version="1" comment="php5-pear is &lt;5.2.14-111.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249512" version="1" comment="php5-pgsql is &lt;5.2.14-111.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249513" version="1" comment="php5-pspell is &lt;5.2.14-111.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249514" version="1" comment="php5-shmop is &lt;5.2.14-111.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249515" version="1" comment="php5-snmp is &lt;5.2.14-111.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249516" version="1" comment="php5-soap is &lt;5.2.14-111.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249517" version="1" comment="php5-suhosin is &lt;5.2.14-111.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249518" version="1" comment="php5-sysvmsg is &lt;5.2.14-111.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249519" version="1" comment="php5-sysvsem is &lt;5.2.14-111.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249520" version="1" comment="php5-sysvshm is &lt;5.2.14-111.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249521" version="1" comment="php5-tokenizer is &lt;5.2.14-111.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249522" version="1" comment="php5-wddx is &lt;5.2.14-111.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249523" version="1" comment="php5-xmlreader is &lt;5.2.14-111.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249524" version="1" comment="php5-xmlrpc is &lt;5.2.14-111.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249525" version="1" comment="php5-xmlwriter is &lt;5.2.14-111.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249526" version="1" comment="php5-xsl is &lt;5.2.14-111.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249527" version="1" comment="php5-zip is &lt;5.2.14-111.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249528" version="1" comment="php5-zlib is &lt;5.2.14-111.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254219" version="1" comment="apache2-mod_php5 is &lt;5.2.14-111.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254220" version="1" comment="php5 is &lt;5.2.14-111.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254221" version="1" comment="php5-bcmath is &lt;5.2.14-111.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254222" version="1" comment="php5-bz2 is &lt;5.2.14-111.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254223" version="1" comment="php5-calendar is &lt;5.2.14-111.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254224" version="1" comment="php5-ctype is &lt;5.2.14-111.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254225" version="1" comment="php5-curl is &lt;5.2.14-111.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254226" version="1" comment="php5-dba is &lt;5.2.14-111.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254227" version="1" comment="php5-dbase is &lt;5.2.14-111.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254228" version="1" comment="php5-dom is &lt;5.2.14-111.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254229" version="1" comment="php5-exif is &lt;5.2.14-111.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254230" version="1" comment="php5-fastcgi is &lt;5.2.14-111.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254231" version="1" comment="php5-ftp is &lt;5.2.14-111.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254232" version="1" comment="php5-gd is &lt;5.2.14-111.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254233" version="1" comment="php5-gettext is &lt;5.2.14-111.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254234" version="1" comment="php5-gmp is &lt;5.2.14-111.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254235" version="1" comment="php5-hash is &lt;5.2.14-111.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254236" version="1" comment="php5-iconv is &lt;5.2.14-111.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254237" version="1" comment="php5-json is &lt;5.2.14-111.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254238" version="1" comment="php5-ldap is &lt;5.2.14-111.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254239" version="1" comment="php5-mbstring is &lt;5.2.14-111.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254240" version="1" comment="php5-mcrypt is &lt;5.2.14-111.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254241" version="1" comment="php5-mysql is &lt;5.2.14-111.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254242" version="1" comment="php5-odbc is &lt;5.2.14-111.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254243" version="1" comment="php5-openssl is &lt;5.2.14-111.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254244" version="1" comment="php5-pcntl is &lt;5.2.14-111.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254245" version="1" comment="php5-pdo is &lt;5.2.14-111.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254246" version="1" comment="php5-pear is &lt;5.2.14-111.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254247" version="1" comment="php5-pgsql is &lt;5.2.14-111.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254248" version="1" comment="php5-pspell is &lt;5.2.14-111.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254249" version="1" comment="php5-shmop is &lt;5.2.14-111.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254250" version="1" comment="php5-snmp is &lt;5.2.14-111.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254251" version="1" comment="php5-soap is &lt;5.2.14-111.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254252" version="1" comment="php5-suhosin is &lt;5.2.14-111.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254253" version="1" comment="php5-sysvmsg is &lt;5.2.14-111.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254254" version="1" comment="php5-sysvsem is &lt;5.2.14-111.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254255" version="1" comment="php5-sysvshm is &lt;5.2.14-111.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254256" version="1" comment="php5-tokenizer is &lt;5.2.14-111.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254257" version="1" comment="php5-wddx is &lt;5.2.14-111.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254258" version="1" comment="php5-xmlreader is &lt;5.2.14-111.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254259" version="1" comment="php5-xmlrpc is &lt;5.2.14-111.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254260" version="1" comment="php5-xmlwriter is &lt;5.2.14-111.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254261" version="1" comment="php5-xsl is &lt;5.2.14-111.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254262" version="1" comment="php5-zip is &lt;5.2.14-111.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254263" version="1" comment="php5-zlib is &lt;5.2.14-111.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257958" version="1" comment="apache2-mod_php5 is &lt;5.2.14-111.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257959" version="1" comment="php5 is &lt;5.2.14-111.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257960" version="1" comment="php5-bcmath is &lt;5.2.14-111.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257961" version="1" comment="php5-bz2 is &lt;5.2.14-111.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257962" version="1" comment="php5-calendar is &lt;5.2.14-111.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257963" version="1" comment="php5-ctype is &lt;5.2.14-111.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257964" version="1" comment="php5-curl is &lt;5.2.14-111.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257965" version="1" comment="php5-dba is &lt;5.2.14-111.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257966" version="1" comment="php5-dbase is &lt;5.2.14-111.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257967" version="1" comment="php5-dom is &lt;5.2.14-111.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257968" version="1" comment="php5-exif is &lt;5.2.14-111.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257969" version="1" comment="php5-fastcgi is &lt;5.2.14-111.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257970" version="1" comment="php5-ftp is &lt;5.2.14-111.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257971" version="1" comment="php5-gd is &lt;5.2.14-111.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257972" version="1" comment="php5-gettext is &lt;5.2.14-111.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257973" version="1" comment="php5-gmp is &lt;5.2.14-111.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257974" version="1" comment="php5-hash is &lt;5.2.14-111.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257975" version="1" comment="php5-iconv is &lt;5.2.14-111.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257976" version="1" comment="php5-json is &lt;5.2.14-111.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257977" version="1" comment="php5-ldap is &lt;5.2.14-111.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257978" version="1" comment="php5-mbstring is &lt;5.2.14-111.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257979" version="1" comment="php5-mcrypt is &lt;5.2.14-111.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257980" version="1" comment="php5-mysql is &lt;5.2.14-111.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257981" version="1" comment="php5-odbc is &lt;5.2.14-111.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257982" version="1" comment="php5-openssl is &lt;5.2.14-111.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257983" version="1" comment="php5-pcntl is &lt;5.2.14-111.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257984" version="1" comment="php5-pdo is &lt;5.2.14-111.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257985" version="1" comment="php5-pear is &lt;5.2.14-111.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257986" version="1" comment="php5-pgsql is &lt;5.2.14-111.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257987" version="1" comment="php5-pspell is &lt;5.2.14-111.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257988" version="1" comment="php5-shmop is &lt;5.2.14-111.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257989" version="1" comment="php5-snmp is &lt;5.2.14-111.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257990" version="1" comment="php5-soap is &lt;5.2.14-111.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257991" version="1" comment="php5-suhosin is &lt;5.2.14-111.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257992" version="1" comment="php5-sysvmsg is &lt;5.2.14-111.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257993" version="1" comment="php5-sysvsem is &lt;5.2.14-111.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257994" version="1" comment="php5-sysvshm is &lt;5.2.14-111.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257995" version="1" comment="php5-tokenizer is &lt;5.2.14-111.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257996" version="1" comment="php5-wddx is &lt;5.2.14-111.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257997" version="1" comment="php5-xmlreader is &lt;5.2.14-111.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257998" version="1" comment="php5-xmlrpc is &lt;5.2.14-111.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257999" version="1" comment="php5-xmlwriter is &lt;5.2.14-111.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258000" version="1" comment="php5-xsl is &lt;5.2.14-111.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258001" version="1" comment="php5-zip is &lt;5.2.14-111.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258002" version="1" comment="php5-zlib is &lt;5.2.14-111.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263103" version="1" comment="apache2-mod_php5 is &lt;5.2.14-111.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263104" version="1" comment="php5 is &lt;5.2.14-111.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263105" version="1" comment="php5-bcmath is &lt;5.2.14-111.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263106" version="1" comment="php5-bz2 is &lt;5.2.14-111.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263107" version="1" comment="php5-calendar is &lt;5.2.14-111.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263108" version="1" comment="php5-ctype is &lt;5.2.14-111.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263109" version="1" comment="php5-curl is &lt;5.2.14-111.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263110" version="1" comment="php5-dba is &lt;5.2.14-111.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263111" version="1" comment="php5-dbase is &lt;5.2.14-111.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263112" version="1" comment="php5-dom is &lt;5.2.14-111.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263113" version="1" comment="php5-exif is &lt;5.2.14-111.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263114" version="1" comment="php5-fastcgi is &lt;5.2.14-111.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263115" version="1" comment="php5-ftp is &lt;5.2.14-111.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263116" version="1" comment="php5-gd is &lt;5.2.14-111.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263117" version="1" comment="php5-gettext is &lt;5.2.14-111.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263118" version="1" comment="php5-gmp is &lt;5.2.14-111.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263119" version="1" comment="php5-hash is &lt;5.2.14-111.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263120" version="1" comment="php5-iconv is &lt;5.2.14-111.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263121" version="1" comment="php5-json is &lt;5.2.14-111.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263122" version="1" comment="php5-ldap is &lt;5.2.14-111.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263123" version="1" comment="php5-mbstring is &lt;5.2.14-111.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263124" version="1" comment="php5-mcrypt is &lt;5.2.14-111.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263125" version="1" comment="php5-mysql is &lt;5.2.14-111.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263126" version="1" comment="php5-odbc is &lt;5.2.14-111.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263127" version="1" comment="php5-openssl is &lt;5.2.14-111.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263128" version="1" comment="php5-pcntl is &lt;5.2.14-111.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263129" version="1" comment="php5-pdo is &lt;5.2.14-111.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263130" version="1" comment="php5-pear is &lt;5.2.14-111.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263131" version="1" comment="php5-pgsql is &lt;5.2.14-111.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263132" version="1" comment="php5-pspell is &lt;5.2.14-111.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263133" version="1" comment="php5-shmop is &lt;5.2.14-111.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263134" version="1" comment="php5-snmp is &lt;5.2.14-111.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263135" version="1" comment="php5-soap is &lt;5.2.14-111.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263136" version="1" comment="php5-suhosin is &lt;5.2.14-111.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263137" version="1" comment="php5-sysvmsg is &lt;5.2.14-111.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263138" version="1" comment="php5-sysvsem is &lt;5.2.14-111.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263139" version="1" comment="php5-sysvshm is &lt;5.2.14-111.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263140" version="1" comment="php5-tokenizer is &lt;5.2.14-111.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263141" version="1" comment="php5-wddx is &lt;5.2.14-111.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263142" version="1" comment="php5-xmlreader is &lt;5.2.14-111.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263143" version="1" comment="php5-xmlrpc is &lt;5.2.14-111.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263144" version="1" comment="php5-xmlwriter is &lt;5.2.14-111.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263145" version="1" comment="php5-xsl is &lt;5.2.14-111.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263146" version="1" comment="php5-zip is &lt;5.2.14-111.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263147" version="1" comment="php5-zlib is &lt;5.2.14-111.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249529" version="1" comment="libpixman-1-0 is &lt;0.16.0-2.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249530" version="1" comment="libpixman-1-0-32bit is &lt;0.16.0-2.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249531" version="1" comment="pixman is &lt;0.16.0-2.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210620" version="1" comment="policycoreutils is &lt;2.0.79-4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210621" version="1" comment="policycoreutils is &lt;2.0.79-4.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210622" version="1" comment="libpoppler-glib4 is &lt;0.12.3-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210623" version="1" comment="libpoppler-qt4-3 is &lt;0.12.3-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210624" version="1" comment="libpoppler5 is &lt;0.12.3-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223533" version="1" comment="libpoppler-glib4 is &lt;0.12.3-1.13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223534" version="1" comment="libpoppler-qt4-3 is &lt;0.12.3-1.13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223535" version="1" comment="libpoppler5 is &lt;0.12.3-1.13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207313" version="1" comment="popt is &lt;1.7-37.29.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207314" version="1" comment="popt-32bit is &lt;1.7-37.29.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207315" version="1" comment="popt-x86 is &lt;1.7-37.29.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207316" version="1" comment="rpm is &lt;4.4.2.3-37.29.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207317" version="1" comment="rpm-32bit is &lt;4.4.2.3-37.29.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249532" version="1" comment="rpm-python is &lt;4.4.2.3-37.29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207318" version="1" comment="rpm-x86 is &lt;4.4.2.3-37.29.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207319" version="1" comment="postfix is &lt;2.5.6-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207320" version="1" comment="postfix-doc is &lt;2.5.6-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207321" version="1" comment="postfix-mysql is &lt;2.5.6-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208942" version="1" comment="postgresql94-contrib is &lt;9.4.5-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208943" version="1" comment="postgresql94-server is &lt;9.4.5-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207322" version="1" comment="postgresql is &lt;8.3.20-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207323" version="1" comment="postgresql-contrib is &lt;8.3.20-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207324" version="1" comment="postgresql-docs is &lt;8.3.20-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207325" version="1" comment="postgresql-init is &lt;9.1-0.6.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207326" version="1" comment="postgresql-libs is &lt;8.3.18-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207327" version="1" comment="postgresql-libs-32bit is &lt;8.3.18-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207328" version="1" comment="postgresql-libs-x86 is &lt;8.3.18-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207329" version="1" comment="postgresql-server is &lt;8.3.20-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210625" version="1" comment="postgresql-init is &lt;9.4-0.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249533" version="1" comment="libecpg6 is &lt;10.6-0.2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249534" version="1" comment="libpq5 is &lt;10.6-0.2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249535" version="1" comment="libpq5-32bit is &lt;10.6-0.2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249536" version="1" comment="postgresql-init is &lt;10-0.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249537" version="1" comment="postgresql10 is &lt;10.6-0.2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249538" version="1" comment="postgresql10-contrib is &lt;10.6-0.2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249539" version="1" comment="postgresql10-docs is &lt;10.6-0.2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249540" version="1" comment="postgresql10-libs is &lt;10.6-0.2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249541" version="1" comment="postgresql10-server is &lt;10.6-0.2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257190" version="1" comment="libecpg6 is &lt;10.8-0.2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257191" version="1" comment="libpq5 is &lt;10.8-0.2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257192" version="1" comment="libpq5-32bit is &lt;10.8-0.2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257193" version="1" comment="postgresql10 is &lt;10.8-0.2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257194" version="1" comment="postgresql10-contrib is &lt;10.8-0.2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257195" version="1" comment="postgresql10-docs is &lt;10.8-0.2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257196" version="1" comment="postgresql10-libs is &lt;10.8-0.2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257197" version="1" comment="postgresql10-server is &lt;10.8-0.2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258003" version="1" comment="libecpg6 is &lt;10.9-0.2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258004" version="1" comment="libpq5 is &lt;10.9-0.2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258005" version="1" comment="libpq5-32bit is &lt;10.9-0.2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258006" version="1" comment="postgresql10 is &lt;10.9-0.2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258007" version="1" comment="postgresql10-contrib is &lt;10.9-0.2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258008" version="1" comment="postgresql10-docs is &lt;10.9-0.2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258009" version="1" comment="postgresql10-libs is &lt;10.9-0.2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258010" version="1" comment="postgresql10-server is &lt;10.9-0.2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262486" version="1" comment="libecpg6 is &lt;10.10-0.2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262487" version="1" comment="libpq5 is &lt;10.10-0.2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262488" version="1" comment="libpq5-32bit is &lt;10.10-0.2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262489" version="1" comment="postgresql10 is &lt;10.10-0.2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262490" version="1" comment="postgresql10-contrib is &lt;10.10-0.2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262491" version="1" comment="postgresql10-docs is &lt;10.10-0.2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262492" version="1" comment="postgresql10-libs is &lt;10.10-0.2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262493" version="1" comment="postgresql10-server is &lt;10.10-0.2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208944" version="1" comment="postgresql91-contrib is &lt;9.1.15-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208945" version="1" comment="postgresql91-server is &lt;9.1.15-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208946" version="1" comment="postgresql91-contrib is &lt;9.1.18-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208947" version="1" comment="postgresql91-server is &lt;9.1.18-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208948" version="1" comment="postgresql91-contrib is &lt;9.1.19-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208949" version="1" comment="postgresql91-server is &lt;9.1.19-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210626" version="1" comment="postgresql94-contrib is &lt;9.4.6-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210627" version="1" comment="postgresql94-server is &lt;9.4.6-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210628" version="1" comment="libecpg6 is &lt;9.4.9-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210629" version="1" comment="libpq5 is &lt;9.4.9-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210630" version="1" comment="libpq5-32bit is &lt;9.4.9-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210631" version="1" comment="postgresql94 is &lt;9.4.9-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210632" version="1" comment="postgresql94-contrib is &lt;9.4.9-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210633" version="1" comment="postgresql94-docs is &lt;9.4.9-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210634" version="1" comment="postgresql94-server is &lt;9.4.9-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210635" version="1" comment="libecpg6 is &lt;9.4.12-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210636" version="1" comment="libpq5 is &lt;9.4.12-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210637" version="1" comment="libpq5-32bit is &lt;9.4.12-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210638" version="1" comment="postgresql94 is &lt;9.4.12-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210639" version="1" comment="postgresql94-contrib is &lt;9.4.12-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210640" version="1" comment="postgresql94-docs is &lt;9.4.12-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210641" version="1" comment="postgresql94-server is &lt;9.4.12-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208950" version="1" comment="libpq5-32bit is &lt;9.4.13-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210642" version="1" comment="libecpg6 is &lt;9.4.15-0.23.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210643" version="1" comment="libpq5 is &lt;9.4.15-0.23.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210644" version="1" comment="libpq5-32bit is &lt;9.4.15-0.23.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210645" version="1" comment="postgresql94 is &lt;9.4.15-0.23.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210646" version="1" comment="postgresql94-contrib is &lt;9.4.15-0.23.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210647" version="1" comment="postgresql94-docs is &lt;9.4.15-0.23.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210648" version="1" comment="postgresql94-server is &lt;9.4.15-0.23.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210649" version="1" comment="libecpg6 is &lt;9.4.16-0.23.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210650" version="1" comment="libpq5 is &lt;9.4.16-0.23.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210651" version="1" comment="libpq5-32bit is &lt;9.4.16-0.23.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210652" version="1" comment="postgresql94 is &lt;9.4.16-0.23.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210653" version="1" comment="postgresql94-contrib is &lt;9.4.16-0.23.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210654" version="1" comment="postgresql94-docs is &lt;9.4.16-0.23.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210655" version="1" comment="postgresql94-server is &lt;9.4.16-0.23.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210656" version="1" comment="libecpg6 is &lt;9.4.17-0.23.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210657" version="1" comment="libpq5 is &lt;9.4.17-0.23.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210658" version="1" comment="libpq5-32bit is &lt;9.4.17-0.23.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210659" version="1" comment="postgresql94 is &lt;9.4.17-0.23.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210660" version="1" comment="postgresql94-contrib is &lt;9.4.17-0.23.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210661" version="1" comment="postgresql94-docs is &lt;9.4.17-0.23.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210662" version="1" comment="postgresql94-server is &lt;9.4.17-0.23.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237897" version="1" comment="libecpg6 is &lt;9.4.19-0.23.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237898" version="1" comment="libpq5 is &lt;9.4.19-0.23.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237899" version="1" comment="libpq5-32bit is &lt;9.4.19-0.23.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237900" version="1" comment="postgresql94 is &lt;9.4.19-0.23.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237901" version="1" comment="postgresql94-contrib is &lt;9.4.19-0.23.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237902" version="1" comment="postgresql94-docs is &lt;9.4.19-0.23.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237903" version="1" comment="postgresql94-server is &lt;9.4.19-0.23.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262494" version="1" comment="postgresql94 is &lt;9.4.24-0.23.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262495" version="1" comment="postgresql94-contrib is &lt;9.4.24-0.23.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262496" version="1" comment="postgresql94-docs is &lt;9.4.24-0.23.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262497" version="1" comment="postgresql94-server is &lt;9.4.24-0.23.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210663" version="1" comment="procmail is &lt;3.22-240.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207330" version="1" comment="puppet is &lt;2.6.17-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207331" version="1" comment="puppet-server is &lt;2.6.17-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210664" version="1" comment="puppet is &lt;2.7.26-0.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210665" version="1" comment="puppet-server is &lt;2.7.26-0.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207332" version="1" comment="pure-ftpd is &lt;1.0.22-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210666" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210667" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210669" version="1" comment="python-base-32bit is &lt;2.6.9-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210671" version="1" comment="python-curses is &lt;2.6.9-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210673" version="1" comment="python-xml is &lt;2.6.9-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210674" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210675" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210677" version="1" comment="python-base-32bit is &lt;2.6.9-40.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210679" version="1" comment="python-curses is &lt;2.6.9-40.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210681" version="1" comment="python-xml is &lt;2.6.9-40.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229384" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229385" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229387" version="1" comment="python-base-32bit is &lt;2.6.9-40.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229389" version="1" comment="python-curses is &lt;2.6.9-40.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229391" version="1" comment="python-xml is &lt;2.6.9-40.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232738" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232739" version="1" comment="python-base-32bit is &lt;2.6.9-40.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237359" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237360" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237362" version="1" comment="python-base-32bit is &lt;2.6.9-40.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237364" version="1" comment="python-curses is &lt;2.6.9-40.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237366" version="1" comment="python-xml is &lt;2.6.9-40.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251195" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251196" version="1" comment="python-32bit is &lt;2.6.9-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251197" version="1" comment="python-base-32bit is &lt;2.6.9-40.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261371" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261372" version="1" comment="python-32bit is &lt;2.6.9-40.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261373" version="1" comment="python-base-32bit is &lt;2.6.9-40.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249542" version="1" comment="python-lxml is &lt;2.1.2-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207333" version="1" comment="libpython2_6-1_0 is &lt;2.6.8-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207334" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.8-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207335" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.8-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207336" version="1" comment="python is &lt;2.6.8-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207337" version="1" comment="python-32bit is &lt;2.6.8-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207338" version="1" comment="python-base is &lt;2.6.8-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207339" version="1" comment="python-base-32bit is &lt;2.6.8-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207340" version="1" comment="python-base-x86 is &lt;2.6.8-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207341" version="1" comment="python-curses is &lt;2.6.8-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207342" version="1" comment="python-demo is &lt;2.6.8-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207343" version="1" comment="python-doc is &lt;2.6-8.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207344" version="1" comment="python-doc-pdf is &lt;2.6-8.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207345" version="1" comment="python-gdbm is &lt;2.6.8-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207346" version="1" comment="python-idle is &lt;2.6.8-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207347" version="1" comment="python-tk is &lt;2.6.8-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207348" version="1" comment="python-x86 is &lt;2.6.8-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207349" version="1" comment="python-xml is &lt;2.6.8-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249543" version="1" comment="libpython2_7-1_0 is &lt;2.7.9-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249544" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.9-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249545" version="1" comment="python27 is &lt;2.7.9-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249546" version="1" comment="python27-32bit is &lt;2.7.9-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249547" version="1" comment="python27-base is &lt;2.7.9-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249548" version="1" comment="python27-base-32bit is &lt;2.7.9-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249549" version="1" comment="python27-curses is &lt;2.7.9-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249550" version="1" comment="python27-demo is &lt;2.7.9-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249551" version="1" comment="python27-devel is &lt;2.7.9-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249552" version="1" comment="python27-doc is &lt;2.7.9-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249553" version="1" comment="python27-doc-pdf is &lt;2.7.9-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249554" version="1" comment="python27-gdbm is &lt;2.7.9-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249555" version="1" comment="python27-idle is &lt;2.7.9-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249556" version="1" comment="python27-tk is &lt;2.7.9-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249557" version="1" comment="python27-xml is &lt;2.7.9-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249558" version="1" comment="libpython2_7-1_0 is &lt;2.7.9-6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249559" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.9-6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249560" version="1" comment="python27 is &lt;2.7.9-6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249561" version="1" comment="python27-32bit is &lt;2.7.9-6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249562" version="1" comment="python27-base is &lt;2.7.9-6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249563" version="1" comment="python27-base-32bit is &lt;2.7.9-6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249564" version="1" comment="python27-curses is &lt;2.7.9-6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249565" version="1" comment="python27-demo is &lt;2.7.9-6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249566" version="1" comment="python27-devel is &lt;2.7.9-6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249567" version="1" comment="python27-doc is &lt;2.7.9-6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249568" version="1" comment="python27-doc-pdf is &lt;2.7.9-6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249569" version="1" comment="python27-gdbm is &lt;2.7.9-6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249570" version="1" comment="python27-idle is &lt;2.7.9-6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249571" version="1" comment="python27-tk is &lt;2.7.9-6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249572" version="1" comment="python27-xml is &lt;2.7.9-6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249573" version="1" comment="libpython2_7-1_0 is &lt;2.7.9-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249574" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.9-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249575" version="1" comment="python27 is &lt;2.7.9-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249576" version="1" comment="python27-32bit is &lt;2.7.9-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249577" version="1" comment="python27-base is &lt;2.7.9-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249578" version="1" comment="python27-base-32bit is &lt;2.7.9-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249579" version="1" comment="python27-curses is &lt;2.7.9-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249580" version="1" comment="python27-demo is &lt;2.7.9-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249581" version="1" comment="python27-devel is &lt;2.7.9-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249582" version="1" comment="python27-doc is &lt;2.7.9-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249583" version="1" comment="python27-doc-pdf is &lt;2.7.9-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249584" version="1" comment="python27-gdbm is &lt;2.7.9-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249585" version="1" comment="python27-idle is &lt;2.7.9-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249586" version="1" comment="python27-tk is &lt;2.7.9-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249587" version="1" comment="python27-xml is &lt;2.7.9-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249588" version="1" comment="libpython2_7-1_0 is &lt;2.7.9-6.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249589" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.9-6.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249590" version="1" comment="python27 is &lt;2.7.9-6.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249591" version="1" comment="python27-32bit is &lt;2.7.9-6.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249592" version="1" comment="python27-base is &lt;2.7.9-6.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249593" version="1" comment="python27-base-32bit is &lt;2.7.9-6.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249594" version="1" comment="python27-curses is &lt;2.7.9-6.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249595" version="1" comment="python27-demo is &lt;2.7.9-6.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249596" version="1" comment="python27-devel is &lt;2.7.9-6.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249597" version="1" comment="python27-doc is &lt;2.7.9-6.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249598" version="1" comment="python27-doc-pdf is &lt;2.7.9-6.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249599" version="1" comment="python27-gdbm is &lt;2.7.9-6.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249600" version="1" comment="python27-idle is &lt;2.7.9-6.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249601" version="1" comment="python27-tk is &lt;2.7.9-6.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249602" version="1" comment="python27-xml is &lt;2.7.9-6.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251198" version="1" comment="libpython2_7-1_0 is &lt;2.7.9-6.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251199" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.9-6.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251200" version="1" comment="python27 is &lt;2.7.9-6.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251201" version="1" comment="python27-32bit is &lt;2.7.9-6.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251202" version="1" comment="python27-base is &lt;2.7.9-6.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251203" version="1" comment="python27-base-32bit is &lt;2.7.9-6.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251204" version="1" comment="python27-curses is &lt;2.7.9-6.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251205" version="1" comment="python27-demo is &lt;2.7.9-6.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251206" version="1" comment="python27-devel is &lt;2.7.9-6.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251207" version="1" comment="python27-doc is &lt;2.7.9-6.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251208" version="1" comment="python27-doc-pdf is &lt;2.7.9-6.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251209" version="1" comment="python27-gdbm is &lt;2.7.9-6.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251210" version="1" comment="python27-idle is &lt;2.7.9-6.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251211" version="1" comment="python27-tk is &lt;2.7.9-6.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251212" version="1" comment="python27-xml is &lt;2.7.9-6.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263573" version="1" comment="libpython2_7-1_0 is &lt;2.7.16-6.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263574" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.16-6.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263575" version="1" comment="python27 is &lt;2.7.16-6.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263576" version="1" comment="python27-32bit is &lt;2.7.16-6.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263577" version="1" comment="python27-base is &lt;2.7.16-6.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263578" version="1" comment="python27-base-32bit is &lt;2.7.16-6.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263579" version="1" comment="python27-curses is &lt;2.7.16-6.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263580" version="1" comment="python27-demo is &lt;2.7.16-6.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263581" version="1" comment="python27-devel is &lt;2.7.16-6.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263582" version="1" comment="python27-doc is &lt;2.7.16-6.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263583" version="1" comment="python27-doc-pdf is &lt;2.7.16-6.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263584" version="1" comment="python27-gdbm is &lt;2.7.16-6.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263585" version="1" comment="python27-idle is &lt;2.7.16-6.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263586" version="1" comment="python27-setuptools is &lt;18.0.1-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263587" version="1" comment="python27-tk is &lt;2.7.16-6.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263588" version="1" comment="python27-xml is &lt;2.7.16-6.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207350" version="1" comment="quagga is &lt;0.99.15-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207351" version="1" comment="quota is &lt;3.16-50.36.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207352" version="1" comment="quota-nfs is &lt;3.16-50.36.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207353" version="1" comment="rsync is &lt;3.0.4-2.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249603" version="1" comment="rsync is &lt;3.0.4-2.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249604" version="1" comment="rsync is &lt;3.0.4-2.48.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249605" version="1" comment="rsync is &lt;3.0.4-2.48.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249606" version="1" comment="rsyslog is &lt;3.18.3-7.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207354" version="1" comment="ruby is &lt;1.8.7.p72-5.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207355" version="1" comment="ruby-doc-html is &lt;1.8.7.p72-5.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207356" version="1" comment="ruby-tk is &lt;1.8.7.p72-5.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210685" version="1" comment="rzsz is &lt;0.12.21~rc-936.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249607" version="1" comment="cifs-mount is &lt;3.4.3-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208224" version="1" comment="ldapsmb is &lt;1.34b-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249608" version="1" comment="libsmbclient0 is &lt;3.4.3-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249609" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249610" version="1" comment="libtalloc1 is &lt;3.4.3-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249611" version="1" comment="libtalloc1-32bit is &lt;3.4.3-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249612" version="1" comment="libtdb1 is &lt;3.4.3-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249613" version="1" comment="libtdb1-32bit is &lt;3.4.3-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249614" version="1" comment="libwbclient0 is &lt;3.4.3-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249615" version="1" comment="libwbclient0-32bit is &lt;3.4.3-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249616" version="1" comment="samba is &lt;3.4.3-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249617" version="1" comment="samba-32bit is &lt;3.4.3-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249618" version="1" comment="samba-client is &lt;3.4.3-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249619" version="1" comment="samba-client-32bit is &lt;3.4.3-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249620" version="1" comment="samba-krb-printing is &lt;3.4.3-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249621" version="1" comment="samba-winbind is &lt;3.4.3-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249622" version="1" comment="samba-winbind-32bit is &lt;3.4.3-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249623" version="1" comment="cifs-mount is &lt;3.4.3-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249624" version="1" comment="ldapsmb is &lt;1.34b-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249625" version="1" comment="libsmbclient0 is &lt;3.4.3-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249626" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249627" version="1" comment="libtalloc1 is &lt;3.4.3-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249628" version="1" comment="libtalloc1-32bit is &lt;3.4.3-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249629" version="1" comment="libtdb1 is &lt;3.4.3-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249630" version="1" comment="libtdb1-32bit is &lt;3.4.3-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249631" version="1" comment="libwbclient0 is &lt;3.4.3-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249632" version="1" comment="libwbclient0-32bit is &lt;3.4.3-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249633" version="1" comment="samba is &lt;3.4.3-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249634" version="1" comment="samba-32bit is &lt;3.4.3-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249635" version="1" comment="samba-client is &lt;3.4.3-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249636" version="1" comment="samba-client-32bit is &lt;3.4.3-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249637" version="1" comment="samba-krb-printing is &lt;3.4.3-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249638" version="1" comment="samba-winbind is &lt;3.4.3-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249639" version="1" comment="samba-winbind-32bit is &lt;3.4.3-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249640" version="1" comment="cifs-mount is &lt;3.4.3-63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249641" version="1" comment="ldapsmb is &lt;1.34b-63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249642" version="1" comment="libsmbclient0 is &lt;3.4.3-63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249643" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249644" version="1" comment="libtalloc1 is &lt;3.4.3-63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249645" version="1" comment="libtalloc1-32bit is &lt;3.4.3-63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249646" version="1" comment="libtdb1 is &lt;3.4.3-63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249647" version="1" comment="libtdb1-32bit is &lt;3.4.3-63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249648" version="1" comment="libwbclient0 is &lt;3.4.3-63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249649" version="1" comment="libwbclient0-32bit is &lt;3.4.3-63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249650" version="1" comment="samba is &lt;3.4.3-63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249651" version="1" comment="samba-32bit is &lt;3.4.3-63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249652" version="1" comment="samba-client is &lt;3.4.3-63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249653" version="1" comment="samba-client-32bit is &lt;3.4.3-63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249654" version="1" comment="samba-krb-printing is &lt;3.4.3-63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249655" version="1" comment="samba-winbind is &lt;3.4.3-63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249656" version="1" comment="samba-winbind-32bit is &lt;3.4.3-63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249657" version="1" comment="cifs-mount is &lt;3.4.3-66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249658" version="1" comment="ldapsmb is &lt;1.34b-66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249659" version="1" comment="libsmbclient0 is &lt;3.4.3-66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249660" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249661" version="1" comment="libtalloc1 is &lt;3.4.3-66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249662" version="1" comment="libtalloc1-32bit is &lt;3.4.3-66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249663" version="1" comment="libtdb1 is &lt;3.4.3-66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249664" version="1" comment="libtdb1-32bit is &lt;3.4.3-66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249665" version="1" comment="libwbclient0 is &lt;3.4.3-66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249666" version="1" comment="libwbclient0-32bit is &lt;3.4.3-66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249667" version="1" comment="samba is &lt;3.4.3-66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249668" version="1" comment="samba-32bit is &lt;3.4.3-66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249669" version="1" comment="samba-client is &lt;3.4.3-66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249670" version="1" comment="samba-client-32bit is &lt;3.4.3-66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249671" version="1" comment="samba-krb-printing is &lt;3.4.3-66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249672" version="1" comment="samba-winbind is &lt;3.4.3-66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249673" version="1" comment="samba-winbind-32bit is &lt;3.4.3-66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249674" version="1" comment="cifs-mount is &lt;3.4.3-69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249675" version="1" comment="ldapsmb is &lt;1.34b-69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249676" version="1" comment="libsmbclient0 is &lt;3.4.3-69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249677" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249678" version="1" comment="libtalloc1 is &lt;3.4.3-69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249679" version="1" comment="libtalloc1-32bit is &lt;3.4.3-69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249680" version="1" comment="libtdb1 is &lt;3.4.3-69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249681" version="1" comment="libtdb1-32bit is &lt;3.4.3-69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249682" version="1" comment="libwbclient0 is &lt;3.4.3-69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249683" version="1" comment="libwbclient0-32bit is &lt;3.4.3-69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249684" version="1" comment="samba is &lt;3.4.3-69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249685" version="1" comment="samba-32bit is &lt;3.4.3-69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249686" version="1" comment="samba-client is &lt;3.4.3-69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249687" version="1" comment="samba-client-32bit is &lt;3.4.3-69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249688" version="1" comment="samba-krb-printing is &lt;3.4.3-69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249689" version="1" comment="samba-winbind is &lt;3.4.3-69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249690" version="1" comment="samba-winbind-32bit is &lt;3.4.3-69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249691" version="1" comment="cifs-mount is &lt;3.4.3-70.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249692" version="1" comment="ldapsmb is &lt;1.34b-70.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249693" version="1" comment="libsmbclient0 is &lt;3.4.3-70.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249694" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-70.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249695" version="1" comment="libtalloc1 is &lt;3.4.3-70.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249696" version="1" comment="libtalloc1-32bit is &lt;3.4.3-70.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249697" version="1" comment="libtdb1 is &lt;3.4.3-70.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249698" version="1" comment="libtdb1-32bit is &lt;3.4.3-70.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249699" version="1" comment="libwbclient0 is &lt;3.4.3-70.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249700" version="1" comment="libwbclient0-32bit is &lt;3.4.3-70.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249701" version="1" comment="samba is &lt;3.4.3-70.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249702" version="1" comment="samba-32bit is &lt;3.4.3-70.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249703" version="1" comment="samba-client is &lt;3.4.3-70.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249704" version="1" comment="samba-client-32bit is &lt;3.4.3-70.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249705" version="1" comment="samba-krb-printing is &lt;3.4.3-70.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249706" version="1" comment="samba-winbind is &lt;3.4.3-70.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249707" version="1" comment="samba-winbind-32bit is &lt;3.4.3-70.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249708" version="1" comment="cifs-mount is &lt;3.4.3-70.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249709" version="1" comment="ldapsmb is &lt;1.34b-70.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249710" version="1" comment="libsmbclient0 is &lt;3.4.3-70.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249711" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-70.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249712" version="1" comment="libtalloc1 is &lt;3.4.3-70.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249713" version="1" comment="libtalloc1-32bit is &lt;3.4.3-70.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249714" version="1" comment="libtdb1 is &lt;3.4.3-70.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249715" version="1" comment="libtdb1-32bit is &lt;3.4.3-70.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249716" version="1" comment="libwbclient0 is &lt;3.4.3-70.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249717" version="1" comment="libwbclient0-32bit is &lt;3.4.3-70.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249718" version="1" comment="samba is &lt;3.4.3-70.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249719" version="1" comment="samba-32bit is &lt;3.4.3-70.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249720" version="1" comment="samba-client is &lt;3.4.3-70.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249721" version="1" comment="samba-client-32bit is &lt;3.4.3-70.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249722" version="1" comment="samba-krb-printing is &lt;3.4.3-70.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249723" version="1" comment="samba-winbind is &lt;3.4.3-70.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249724" version="1" comment="samba-winbind-32bit is &lt;3.4.3-70.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249725" version="1" comment="cifs-mount is &lt;3.4.3-70.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249726" version="1" comment="ldapsmb is &lt;1.34b-70.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249727" version="1" comment="libsmbclient0 is &lt;3.4.3-70.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249728" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-70.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249729" version="1" comment="libtalloc1 is &lt;3.4.3-70.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249730" version="1" comment="libtalloc1-32bit is &lt;3.4.3-70.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249731" version="1" comment="libtdb1 is &lt;3.4.3-70.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249732" version="1" comment="libtdb1-32bit is &lt;3.4.3-70.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249733" version="1" comment="libwbclient0 is &lt;3.4.3-70.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249734" version="1" comment="libwbclient0-32bit is &lt;3.4.3-70.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249735" version="1" comment="samba is &lt;3.4.3-70.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249736" version="1" comment="samba-32bit is &lt;3.4.3-70.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249737" version="1" comment="samba-client is &lt;3.4.3-70.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249738" version="1" comment="samba-client-32bit is &lt;3.4.3-70.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249739" version="1" comment="samba-krb-printing is &lt;3.4.3-70.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249740" version="1" comment="samba-winbind is &lt;3.4.3-70.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249741" version="1" comment="samba-winbind-32bit is &lt;3.4.3-70.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252770" version="1" comment="cifs-mount is &lt;3.4.3-70.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252771" version="1" comment="ldapsmb is &lt;1.34b-70.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252772" version="1" comment="libsmbclient0 is &lt;3.4.3-70.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252773" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-70.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252774" version="1" comment="libtalloc1 is &lt;3.4.3-70.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252775" version="1" comment="libtalloc1-32bit is &lt;3.4.3-70.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252776" version="1" comment="libtdb1 is &lt;3.4.3-70.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252777" version="1" comment="libtdb1-32bit is &lt;3.4.3-70.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252778" version="1" comment="libwbclient0 is &lt;3.4.3-70.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252779" version="1" comment="libwbclient0-32bit is &lt;3.4.3-70.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252780" version="1" comment="samba is &lt;3.4.3-70.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252781" version="1" comment="samba-32bit is &lt;3.4.3-70.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252782" version="1" comment="samba-client is &lt;3.4.3-70.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252783" version="1" comment="samba-client-32bit is &lt;3.4.3-70.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252784" version="1" comment="samba-krb-printing is &lt;3.4.3-70.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252785" version="1" comment="samba-winbind is &lt;3.4.3-70.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252786" version="1" comment="samba-winbind-32bit is &lt;3.4.3-70.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249742" version="1" comment="sblim-sfcb is &lt;1.3.7-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249743" version="1" comment="sblim-sfcb is &lt;1.3.7-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253698" version="1" comment="screen is &lt;4.0.2-162.19.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259052" version="1" comment="libsqlite3-0 is &lt;3.6.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259053" version="1" comment="libsqlite3-0-32bit is &lt;3.6.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259054" version="1" comment="sqlite3 is &lt;3.6.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209041" version="1" comment="squid is &lt;2.7.STABLE5-2.12.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210805" version="1" comment="squid is &lt;2.7.STABLE5-2.12.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261584" version="1" comment="squid is &lt;2.7.STABLE5-2.12.30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210806" version="1" comment="squid3 is &lt;3.1.23-8.16.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210807" version="1" comment="squid3 is &lt;3.1.23-8.16.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210808" version="1" comment="squid3 is &lt;3.1.23-8.16.37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210809" version="1" comment="squid3 is &lt;3.1.23-8.16.37.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239311" version="1" comment="squid3 is &lt;3.1.23-8.16.37.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210810" version="1" comment="squidGuard is &lt;1.4-13.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210811" version="1" comment="squidGuard-doc is &lt;1.4-13.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207357" version="1" comment="strongswan is &lt;4.4.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207358" version="1" comment="strongswan-doc is &lt;4.4.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210814" version="1" comment="strongswan is &lt;4.4.0-6.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210815" version="1" comment="strongswan-doc is &lt;4.4.0-6.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210816" version="1" comment="strongswan is &lt;4.4.0-6.36.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210817" version="1" comment="strongswan-doc is &lt;4.4.0-6.36.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208244" version="1" comment="stunnel is &lt;4.36-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207359" version="1" comment="sudo is &lt;1.7.6p2-0.2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249744" version="1" comment="sudo is &lt;1.7.6p2-0.2.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207360" version="1" comment="supportutils is &lt;1.20-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207361" version="1" comment="sysconfig is &lt;0.71.31-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210820" version="1" comment="tar is &lt;1.26-1.2.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210822" version="1" comment="tcpdump is &lt;3.9.8-1.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210823" version="1" comment="tcpdump is &lt;3.9.8-1.30.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207362" version="1" comment="tgt is &lt;0.9.10-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210825" version="1" comment="libtiff3 is &lt;3.8.2-141.168" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210826" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.168" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210828" version="1" comment="libtiff3 is &lt;3.8.2-141.169.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210829" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.169.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210831" version="1" comment="libtiff3 is &lt;3.8.2-141.169.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210832" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.169.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229551" version="1" comment="libtiff3 is &lt;3.8.2-141.169.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229568" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.169.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234383" version="1" comment="libtiff3 is &lt;3.8.2-141.169.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234384" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.169.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238088" version="1" comment="libtiff3 is &lt;3.8.2-141.169.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238089" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.169.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240660" version="1" comment="libtiff3 is &lt;3.8.2-141.169.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240661" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.169.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241792" version="1" comment="libtiff3 is &lt;3.8.2-141.169.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241793" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.169.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246752" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.169.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210834" version="1" comment="tomcat6 is &lt;6.0.45-0.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210835" version="1" comment="tomcat6-admin-webapps is &lt;6.0.45-0.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210836" version="1" comment="tomcat6-docs-webapp is &lt;6.0.45-0.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210837" version="1" comment="tomcat6-javadoc is &lt;6.0.45-0.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210838" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.45-0.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210839" version="1" comment="tomcat6-lib is &lt;6.0.45-0.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210840" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.45-0.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210841" version="1" comment="tomcat6-webapps is &lt;6.0.45-0.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210850" version="1" comment="tomcat6 is &lt;6.0.45-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210851" version="1" comment="tomcat6-admin-webapps is &lt;6.0.45-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210852" version="1" comment="tomcat6-docs-webapp is &lt;6.0.45-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210853" version="1" comment="tomcat6-javadoc is &lt;6.0.45-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210854" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.45-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210855" version="1" comment="tomcat6-lib is &lt;6.0.45-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210856" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.45-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210857" version="1" comment="tomcat6-webapps is &lt;6.0.45-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229621" version="1" comment="tomcat6 is &lt;6.0.53-0.57.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229622" version="1" comment="tomcat6-admin-webapps is &lt;6.0.53-0.57.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229623" version="1" comment="tomcat6-docs-webapp is &lt;6.0.53-0.57.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229624" version="1" comment="tomcat6-javadoc is &lt;6.0.53-0.57.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229625" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.53-0.57.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229626" version="1" comment="tomcat6-lib is &lt;6.0.53-0.57.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229627" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.53-0.57.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229628" version="1" comment="tomcat6-webapps is &lt;6.0.53-0.57.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240868" version="1" comment="tomcat6 is &lt;6.0.53-0.57.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240869" version="1" comment="tomcat6-admin-webapps is &lt;6.0.53-0.57.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240870" version="1" comment="tomcat6-docs-webapp is &lt;6.0.53-0.57.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240871" version="1" comment="tomcat6-javadoc is &lt;6.0.53-0.57.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240872" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.53-0.57.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240873" version="1" comment="tomcat6-lib is &lt;6.0.53-0.57.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240874" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.53-0.57.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240875" version="1" comment="tomcat6-webapps is &lt;6.0.53-0.57.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210858" version="1" comment="transfig is &lt;3.2.5-160.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210859" version="1" comment="unrar is &lt;5.6.1-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249745" version="1" comment="unzip is &lt;5.52-142.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249746" version="1" comment="unzip is &lt;5.52-142.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249747" version="1" comment="unzip is &lt;5.52-142.34.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207363" version="1" comment="libblkid1 is &lt;2.16-6.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207364" version="1" comment="libuuid1 is &lt;2.16-6.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207365" version="1" comment="libuuid1-32bit is &lt;2.16-6.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207366" version="1" comment="libuuid1-x86 is &lt;2.16-6.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207367" version="1" comment="util-linux is &lt;2.16-6.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207368" version="1" comment="util-linux-lang is &lt;2.16-6.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207369" version="1" comment="uuid-runtime is &lt;2.16-6.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249748" version="1" comment="gvim is &lt;7.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249749" version="1" comment="vim is &lt;7.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249750" version="1" comment="vim-base is &lt;7.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249751" version="1" comment="vim-data is &lt;7.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249752" version="1" comment="gvim is &lt;7.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249753" version="1" comment="vim is &lt;7.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249754" version="1" comment="vim-base is &lt;7.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249755" version="1" comment="vim-data is &lt;7.2-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256646" version="1" comment="gvim is &lt;7.2-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256647" version="1" comment="vim is &lt;7.2-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256648" version="1" comment="vim-base is &lt;7.2-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256649" version="1" comment="vim-data is &lt;7.2-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207370" version="1" comment="vino is &lt;2.28.1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207371" version="1" comment="vino-lang is &lt;2.28.1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207372" version="1" comment="vsftpd is &lt;2.0.7-4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210870" version="1" comment="w3m is &lt;0.5.3.git20161120-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210871" version="1" comment="libwavpack1 is &lt;4.50.1-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246363" version="1" comment="libwavpack1 is &lt;4.50.1-1.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210872" version="1" comment="wget is &lt;1.11.4-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210873" version="1" comment="wget is &lt;1.11.4-1.41.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207373" version="1" comment="wireshark is &lt;1.4.13-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249756" version="1" comment="libcares2 is &lt;1.7.4-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249757" version="1" comment="jack is &lt;0.109.2-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249758" version="1" comment="libjack0 is &lt;0.109.2-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249759" version="1" comment="wpa_supplicant is &lt;0.6.9-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207374" version="1" comment="xen is &lt;4.0.3_21548_18-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207375" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207376" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207377" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.59_0.19-0.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207378" version="1" comment="xen-kmp-pae is &lt;4.0.3_21548_18_2.6.32.59_0.19-0.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207379" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.59_0.19-0.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207380" version="1" comment="xen-libs is &lt;4.0.3_21548_18-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207381" version="1" comment="xen-tools is &lt;4.0.3_21548_18-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207382" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207383" version="1" comment="xen is &lt;4.0.3_21548_18-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207384" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207385" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207386" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.59_0.19-29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207387" version="1" comment="xen-kmp-pae is &lt;4.0.3_21548_18_2.6.32.59_0.19-29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207388" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.59_0.19-29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207389" version="1" comment="xen-libs is &lt;4.0.3_21548_18-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207390" version="1" comment="xen-tools is &lt;4.0.3_21548_18-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207391" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249760" version="1" comment="xen is &lt;4.0.3_21548_18-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249761" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249762" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249763" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.54_0.68.TDC-27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249764" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.54_0.68.TDC-27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249765" version="1" comment="xen-libs is &lt;4.0.3_21548_18-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249766" version="1" comment="xen-tools is &lt;4.0.3_21548_18-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249767" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249768" version="1" comment="xen is &lt;4.0.3_21548_18-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249769" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249770" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249771" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.54_0.68.TDC-30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249772" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.54_0.68.TDC-30" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249773" version="1" comment="xen-libs is &lt;4.0.3_21548_18-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249774" version="1" comment="xen-tools is &lt;4.0.3_21548_18-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249775" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249776" version="1" comment="xen is &lt;4.0.3_21548_18-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249777" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249778" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249779" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.54_0.85.TDC-36" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249780" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.54_0.85.TDC-36" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249781" version="1" comment="xen-libs is &lt;4.0.3_21548_18-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249782" version="1" comment="xen-tools is &lt;4.0.3_21548_18-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249783" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249784" version="1" comment="xen is &lt;4.0.3_21548_18-41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249785" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249786" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249787" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.54_0.94.TDC-41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249788" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.54_0.94.TDC-41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249789" version="1" comment="xen-libs is &lt;4.0.3_21548_18-41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249790" version="1" comment="xen-tools is &lt;4.0.3_21548_18-41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249791" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249792" version="1" comment="xen is &lt;4.0.3_21548_18-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249793" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249794" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249795" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.54_0.97.TDC-44" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249796" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.54_0.97.TDC-44" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249797" version="1" comment="xen-libs is &lt;4.0.3_21548_18-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249798" version="1" comment="xen-tools is &lt;4.0.3_21548_18-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249799" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249800" version="1" comment="xen is &lt;4.0.3_21548_18-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249801" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249802" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249803" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.54_0.103.TDC-49" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249804" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.54_0.103.TDC-49" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249805" version="1" comment="xen-libs is &lt;4.0.3_21548_18-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249806" version="1" comment="xen-tools is &lt;4.0.3_21548_18-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249807" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249808" version="1" comment="xen is &lt;4.0.3_21548_18-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249809" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249810" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249811" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.54_0.103.TDC-52" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249812" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.54_0.103.TDC-52" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249813" version="1" comment="xen-libs is &lt;4.0.3_21548_18-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249814" version="1" comment="xen-tools is &lt;4.0.3_21548_18-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249815" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249816" version="1" comment="xen is &lt;4.0.3_21548_18-53.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249817" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-53.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249818" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-53.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249819" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.54_0.112.TDC-53.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249820" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.54_0.112.TDC-53.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249821" version="1" comment="xen-libs is &lt;4.0.3_21548_18-53.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249822" version="1" comment="xen-tools is &lt;4.0.3_21548_18-53.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249823" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-53.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249824" version="1" comment="xen is &lt;4.0.3_21548_18-53.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249825" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-53.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249826" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-53.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249827" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.54_0.112.TDC-53.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249828" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.54_0.112.TDC-53.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249829" version="1" comment="xen-libs is &lt;4.0.3_21548_18-53.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249830" version="1" comment="xen-tools is &lt;4.0.3_21548_18-53.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249831" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-53.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249832" version="1" comment="xen is &lt;4.0.3_21548_18-53.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249833" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-53.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249834" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-53.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249835" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.54_0.116.TDC-53.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249836" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.54_0.116.TDC-53.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249837" version="1" comment="xen-libs is &lt;4.0.3_21548_18-53.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249838" version="1" comment="xen-tools is &lt;4.0.3_21548_18-53.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249839" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-53.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249840" version="1" comment="xen is &lt;4.0.3_21548_18-53.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249841" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-53.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249842" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-53.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249843" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.54_0.122.TDC-53.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249844" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.54_0.122.TDC-53.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249845" version="1" comment="xen-libs is &lt;4.0.3_21548_18-53.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249846" version="1" comment="xen-tools is &lt;4.0.3_21548_18-53.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249847" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-53.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249848" version="1" comment="xen is &lt;4.0.3_21548_18-53.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249849" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-53.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249850" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-53.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249851" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.54_0.133.TDC-53.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249852" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.54_0.133.TDC-53.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249853" version="1" comment="xen-libs is &lt;4.0.3_21548_18-53.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249854" version="1" comment="xen-tools is &lt;4.0.3_21548_18-53.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249855" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-53.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207392" version="1" comment="libvirt is &lt;0.7.6-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207393" version="1" comment="libvirt-doc is &lt;0.7.6-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207394" version="1" comment="libvirt-python is &lt;0.7.6-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207395" version="1" comment="vm-install is &lt;0.4.30-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207396" version="1" comment="xen is &lt;4.0.1_21326_08-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207397" version="1" comment="xen-doc-html is &lt;4.0.1_21326_08-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207398" version="1" comment="xen-doc-pdf is &lt;4.0.1_21326_08-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207399" version="1" comment="xen-kmp-default is &lt;4.0.1_21326_08_2.6.32.36_0.5-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207400" version="1" comment="xen-kmp-pae is &lt;4.0.1_21326_08_2.6.32.36_0.5-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207401" version="1" comment="xen-libs is &lt;4.0.1_21326_08-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207402" version="1" comment="xen-tools is &lt;4.0.1_21326_08-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207403" version="1" comment="xen-tools-domU is &lt;4.0.1_21326_08-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207404" version="1" comment="vm-install is &lt;0.4.31-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207405" version="1" comment="xen is &lt;4.0.2_21511_02-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207406" version="1" comment="xen-doc-html is &lt;4.0.2_21511_02-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207407" version="1" comment="xen-doc-pdf is &lt;4.0.2_21511_02-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207408" version="1" comment="xen-kmp-default is &lt;4.0.2_21511_02_2.6.32.43_0.4-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207409" version="1" comment="xen-kmp-pae is &lt;4.0.2_21511_02_2.6.32.43_0.4-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207410" version="1" comment="xen-libs is &lt;4.0.2_21511_02-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207411" version="1" comment="xen-tools is &lt;4.0.2_21511_02-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207412" version="1" comment="xen-tools-domU is &lt;4.0.2_21511_02-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207413" version="1" comment="libvirt is &lt;0.7.6-1.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207414" version="1" comment="libvirt-doc is &lt;0.7.6-1.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207415" version="1" comment="libvirt-python is &lt;0.7.6-1.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207416" version="1" comment="virt-utils is &lt;1.1.3-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207417" version="1" comment="xen is &lt;4.0.3_21548_02-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207418" version="1" comment="xen-doc-html is &lt;4.0.3_21548_02-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207419" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_02-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207420" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_02_2.6.32.54_0.3-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207421" version="1" comment="xen-kmp-pae is &lt;4.0.3_21548_02_2.6.32.54_0.3-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207422" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_02_2.6.32.54_0.3-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207423" version="1" comment="xen-libs is &lt;4.0.3_21548_02-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207424" version="1" comment="xen-tools is &lt;4.0.3_21548_02-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207425" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_02-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207426" version="1" comment="xen is &lt;4.0.3_21548_04-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207427" version="1" comment="xen-doc-html is &lt;4.0.3_21548_04-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207428" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_04-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207429" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_04_2.6.32.59_0.5-0.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207430" version="1" comment="xen-kmp-pae is &lt;4.0.3_21548_04_2.6.32.59_0.5-0.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207431" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_04_2.6.32.59_0.5-0.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207432" version="1" comment="xen-libs is &lt;4.0.3_21548_04-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207433" version="1" comment="xen-tools is &lt;4.0.3_21548_04-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207434" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_04-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207435" version="1" comment="vm-install is &lt;0.4.34-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207436" version="1" comment="xen is &lt;4.0.3_21548_08-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207437" version="1" comment="xen-doc-html is &lt;4.0.3_21548_08-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207438" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_08-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207439" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_08_2.6.32.59_0.7-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207440" version="1" comment="xen-kmp-pae is &lt;4.0.3_21548_08_2.6.32.59_0.7-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207441" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_08_2.6.32.59_0.7-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207442" version="1" comment="xen-libs is &lt;4.0.3_21548_08-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207443" version="1" comment="xen-tools is &lt;4.0.3_21548_08-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207444" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_08-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207445" version="1" comment="xen is &lt;4.0.3_21548_10-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207446" version="1" comment="xen-doc-html is &lt;4.0.3_21548_10-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207447" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_10-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207448" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_10_2.6.32.59_0.7-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207449" version="1" comment="xen-kmp-pae is &lt;4.0.3_21548_10_2.6.32.59_0.7-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207450" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_10_2.6.32.59_0.7-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207451" version="1" comment="xen-libs is &lt;4.0.3_21548_10-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207452" version="1" comment="xen-tools is &lt;4.0.3_21548_10-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207453" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_10-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249856" version="1" comment="xen is &lt;4.0.3_21548_11-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249857" version="1" comment="xen-doc-html is &lt;4.0.3_21548_11-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249858" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_11-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249859" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_11_2.6.32.54_0.11.TDC-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249860" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_11_2.6.32.54_0.11.TDC-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249861" version="1" comment="xen-libs is &lt;4.0.3_21548_11-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249862" version="1" comment="xen-tools is &lt;4.0.3_21548_11-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249863" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_11-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249864" version="1" comment="xen is &lt;4.0.3_21548_14-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249865" version="1" comment="xen-doc-html is &lt;4.0.3_21548_14-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249866" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_14-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249867" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_14_2.6.32.54_0.31.TDC-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249868" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_14_2.6.32.54_0.31.TDC-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249869" version="1" comment="xen-libs is &lt;4.0.3_21548_14-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249870" version="1" comment="xen-tools is &lt;4.0.3_21548_14-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249871" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_14-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207454" version="1" comment="xen is &lt;4.0.3_21548_16-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207455" version="1" comment="xen-doc-html is &lt;4.0.3_21548_16-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207456" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_16-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207457" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_16_2.6.32.59_0.9-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207458" version="1" comment="xen-kmp-pae is &lt;4.0.3_21548_16_2.6.32.59_0.9-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207459" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_16_2.6.32.59_0.9-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207460" version="1" comment="xen-libs is &lt;4.0.3_21548_16-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207461" version="1" comment="xen-tools is &lt;4.0.3_21548_16-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207462" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_16-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249872" version="1" comment="xen is &lt;4.0.3_21548_18-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249873" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249874" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249875" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.54_0.45.TDC-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249876" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.54_0.45.TDC-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249877" version="1" comment="xen-libs is &lt;4.0.3_21548_18-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249878" version="1" comment="xen-tools is &lt;4.0.3_21548_18-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249879" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207463" version="1" comment="xen is &lt;4.0.3_21548_18-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207464" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207465" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207466" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.59_0.19-0.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207467" version="1" comment="xen-kmp-pae is &lt;4.0.3_21548_18_2.6.32.59_0.19-0.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207468" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.59_0.19-0.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207469" version="1" comment="xen-libs is &lt;4.0.3_21548_18-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207470" version="1" comment="xen-tools is &lt;4.0.3_21548_18-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207471" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207472" version="1" comment="xen is &lt;4.0.3_21548_18-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207473" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207474" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207475" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.59_0.19-0.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207476" version="1" comment="xen-kmp-pae is &lt;4.0.3_21548_18_2.6.32.59_0.19-0.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207477" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.59_0.19-0.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207478" version="1" comment="xen-libs is &lt;4.0.3_21548_18-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207479" version="1" comment="xen-tools is &lt;4.0.3_21548_18-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207480" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249880" version="1" comment="xen is &lt;4.0.3_21548_18-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249881" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249882" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249883" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.54_0.73.TDC-33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249884" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.54_0.73.TDC-33" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249885" version="1" comment="xen-libs is &lt;4.0.3_21548_18-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249886" version="1" comment="xen-tools is &lt;4.0.3_21548_18-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249887" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207481" version="1" comment="xorg-x11 is &lt;7.4-9.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207482" version="1" comment="xorg-x11-xauth is &lt;7.4-9.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207483" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.40.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207484" version="1" comment="xorg-x11-server is &lt;7.4-27.40.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207485" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.40.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210972" version="1" comment="xorg-x11-libICE-32bit is &lt;7.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210974" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210976" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235623" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.72.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210979" version="1" comment="xorg-x11-libXfixes-32bit is &lt;7.4-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210981" version="1" comment="xorg-x11-libXpm-32bit is &lt;7.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210983" version="1" comment="xorg-x11-libXrender-32bit is &lt;7.4-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210985" version="1" comment="xorg-x11-libXv-32bit is &lt;7.4-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210987" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210989" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.50.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235031" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.50.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249888" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.40.78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249889" version="1" comment="xorg-x11-server is &lt;7.4-27.40.78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249890" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.40.78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249891" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.40.79.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249892" version="1" comment="xorg-x11-server is &lt;7.4-27.40.79.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249893" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.40.79.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249894" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.40.79.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249895" version="1" comment="xorg-x11-server is &lt;7.4-27.40.79.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249896" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.40.79.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207486" version="1" comment="libpciaccess0 is &lt;7.4_0.11.0-0.4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207487" version="1" comment="libpciaccess0-32bit is &lt;7.4_0.11.0-0.4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207488" version="1" comment="libpciaccess0-x86 is &lt;7.4_0.11.0-0.4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207489" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.40.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207490" version="1" comment="xorg-x11-server is &lt;7.4-27.40.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207491" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.40.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207492" version="1" comment="xpdf-tools is &lt;3.02-138.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207493" version="1" comment="xpdf-tools is &lt;3.02-138.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207494" version="1" comment="yast2-core is &lt;2.17.35.3-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249897" version="1" comment="yast2-storage is &lt;2.17.99.5-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249898" version="1" comment="yast2-storage-lib is &lt;2.17.99.5-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251877" version="1" comment="zlib is &lt;1.2.7-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249900" version="1" comment="zlib-32bit is &lt;1.2.7-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249901" version="1" comment="zlib-devel is &lt;1.2.7-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249902" version="1" comment="zlib-devel-32bit is &lt;1.2.7-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251878" version="1" comment="zsh is &lt;4.3.6-67.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251879" version="1" comment="zypper is &lt;1.3.21-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207496" version="1" comment="MozillaFirefox is &lt;10.0.2-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207497" version="1" comment="MozillaFirefox-translations is &lt;10.0.2-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207498" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr10.0-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207499" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr10.0-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207500" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr10.0-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207501" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr10.0-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207502" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr10.0-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207503" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207504" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207505" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207506" version="1" comment="openssl is &lt;0.9.8j-0.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207507" version="1" comment="openssl-doc is &lt;0.9.8j-0.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207508" version="1" comment="libpng12-0 is &lt;1.2.31-5.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207509" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207510" version="1" comment="libpng12-0-x86 is &lt;1.2.31-5.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207511" version="1" comment="puppet is &lt;2.6.12-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207512" version="1" comment="puppet-server is &lt;2.6.12-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207513" version="1" comment="mozilla-nss-devel is &lt;3.16.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207520" version="1" comment="Mesa-x86 is &lt;7.11.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207530" version="1" comment="mozilla-nspr-devel is &lt;4.12-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207533" version="1" comment="mozilla-nss-devel is &lt;3.21.1-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207539" version="1" comment="mozilla-nss-devel is &lt;3.16-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207540" version="1" comment="xen is &lt;4.1.6_08-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207541" version="1" comment="xen-devel is &lt;4.1.6_08-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207542" version="1" comment="xen-doc-html is &lt;4.1.6_08-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207543" version="1" comment="xen-doc-pdf is &lt;4.1.6_08-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207544" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.29-17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207545" version="1" comment="xen-kmp-pae is &lt;4.1.6_08_3.0.101_0.7.29-17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207546" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.29-17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207547" version="1" comment="xen-libs is &lt;4.1.6_08-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207548" version="1" comment="xen-libs-32bit is &lt;4.1.6_08-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207549" version="1" comment="xen-tools is &lt;4.1.6_08-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207550" version="1" comment="xen-tools-domU is &lt;4.1.6_08-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207552" version="1" comment="apache2-mod_php53 is &lt;5.3.8-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207553" version="1" comment="php53 is &lt;5.3.8-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207554" version="1" comment="php53-bcmath is &lt;5.3.8-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207555" version="1" comment="php53-bz2 is &lt;5.3.8-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207556" version="1" comment="php53-calendar is &lt;5.3.8-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207557" version="1" comment="php53-ctype is &lt;5.3.8-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207558" version="1" comment="php53-curl is &lt;5.3.8-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207559" version="1" comment="php53-dba is &lt;5.3.8-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207560" version="1" comment="php53-dom is &lt;5.3.8-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207561" version="1" comment="php53-exif is &lt;5.3.8-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207562" version="1" comment="php53-fastcgi is &lt;5.3.8-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207563" version="1" comment="php53-fileinfo is &lt;5.3.8-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207564" version="1" comment="php53-ftp is &lt;5.3.8-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207565" version="1" comment="php53-gd is &lt;5.3.8-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207566" version="1" comment="php53-gettext is &lt;5.3.8-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207567" version="1" comment="php53-gmp is &lt;5.3.8-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207568" version="1" comment="php53-iconv is &lt;5.3.8-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207569" version="1" comment="php53-intl is &lt;5.3.8-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207570" version="1" comment="php53-json is &lt;5.3.8-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207571" version="1" comment="php53-ldap is &lt;5.3.8-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207572" version="1" comment="php53-mbstring is &lt;5.3.8-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207573" version="1" comment="php53-mcrypt is &lt;5.3.8-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207574" version="1" comment="php53-mysql is &lt;5.3.8-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207575" version="1" comment="php53-odbc is &lt;5.3.8-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207576" version="1" comment="php53-openssl is &lt;5.3.8-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207577" version="1" comment="php53-pcntl is &lt;5.3.8-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207578" version="1" comment="php53-pdo is &lt;5.3.8-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207579" version="1" comment="php53-pear is &lt;5.3.8-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207580" version="1" comment="php53-pgsql is &lt;5.3.8-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207581" version="1" comment="php53-pspell is &lt;5.3.8-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207582" version="1" comment="php53-shmop is &lt;5.3.8-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207583" version="1" comment="php53-snmp is &lt;5.3.8-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207584" version="1" comment="php53-soap is &lt;5.3.8-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207585" version="1" comment="php53-suhosin is &lt;5.3.8-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207586" version="1" comment="php53-sysvmsg is &lt;5.3.8-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207587" version="1" comment="php53-sysvsem is &lt;5.3.8-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207588" version="1" comment="php53-sysvshm is &lt;5.3.8-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207589" version="1" comment="php53-tokenizer is &lt;5.3.8-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207590" version="1" comment="php53-wddx is &lt;5.3.8-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207591" version="1" comment="php53-xmlreader is &lt;5.3.8-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207592" version="1" comment="php53-xmlrpc is &lt;5.3.8-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207593" version="1" comment="php53-xmlwriter is &lt;5.3.8-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207594" version="1" comment="php53-xsl is &lt;5.3.8-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207595" version="1" comment="php53-zip is &lt;5.3.8-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207596" version="1" comment="php53-zlib is &lt;5.3.8-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207597" version="1" comment="bash is &lt;3.2-147.14.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207598" version="1" comment="bash-doc is &lt;3.2-147.14.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207599" version="1" comment="libreadline5 is &lt;5.2-147.14.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207600" version="1" comment="libreadline5-32bit is &lt;5.2-147.14.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207601" version="1" comment="readline-doc is &lt;5.2-147.14.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207602" version="1" comment="bind is &lt;9.9.4P2-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207603" version="1" comment="bind-chrootenv is &lt;9.9.4P2-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207604" version="1" comment="bind-doc is &lt;9.9.4P2-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207605" version="1" comment="bind-libs-x86 is &lt;9.9.4P2-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207606" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207607" version="1" comment="bind-doc is &lt;9.9.6P1-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207608" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207609" version="1" comment="bind-doc is &lt;9.9.6P1-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207610" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207611" version="1" comment="bind-doc is &lt;9.9.6P1-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207612" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207613" version="1" comment="bind-doc is &lt;9.9.6P1-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207614" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207615" version="1" comment="bind-doc is &lt;9.9.6P1-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207616" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207617" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207618" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207619" version="1" comment="ldapsmb is &lt;1.34b-12.33.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207620" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-0.33.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207621" version="1" comment="libtalloc1-x86 is &lt;3.4.3-1.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207622" version="1" comment="libtalloc2-x86 is &lt;3.6.3-0.33.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207623" version="1" comment="libtdb1-x86 is &lt;3.6.3-0.33.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207624" version="1" comment="libwbclient0-x86 is &lt;3.6.3-0.33.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207625" version="1" comment="samba-client-x86 is &lt;3.6.3-0.33.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207626" version="1" comment="samba-winbind-x86 is &lt;3.6.3-0.33.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207627" version="1" comment="samba-x86 is &lt;3.6.3-0.33.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207628" version="1" comment="coreutils-x86 is &lt;8.12-6.25.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207629" version="1" comment="cups-libs-x86 is &lt;1.3.9-8.46.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207630" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.20.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207631" version="1" comment="dbus-1-x86 is &lt;1.2.10-3.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207632" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.11.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207633" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.11.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207634" version="1" comment="dhcp is &lt;4.2.4.P2-0.11.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207635" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.11.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207636" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.11.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207637" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.11.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207638" version="1" comment="libfreebl3-x86 is &lt;3.13.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207639" version="1" comment="mozilla-nspr-x86 is &lt;4.9.2-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207640" version="1" comment="mozilla-nss-x86 is &lt;3.13.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207641" version="1" comment="mozilla-nspr-x86 is &lt;4.9.3-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207642" version="1" comment="libfreebl3-x86 is &lt;3.14-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207643" version="1" comment="mozilla-nss-x86 is &lt;3.14-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207644" version="1" comment="libfreebl3-x86 is &lt;3.14.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207645" version="1" comment="mozilla-nspr-x86 is &lt;4.9.4-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207646" version="1" comment="mozilla-nss-x86 is &lt;3.14.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207647" version="1" comment="libfreebl3-x86 is &lt;3.14.2-0.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207648" version="1" comment="mozilla-nspr-x86 is &lt;4.9.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207649" version="1" comment="mozilla-nss-x86 is &lt;3.14.2-0.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207650" version="1" comment="libfreebl3-x86 is &lt;3.14.3-0.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207651" version="1" comment="mozilla-nspr-x86 is &lt;4.9.6-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207652" version="1" comment="mozilla-nss-x86 is &lt;3.14.3-0.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207653" version="1" comment="mozilla-nss-devel is &lt;3.16.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207654" version="1" comment="mozilla-nss-devel is &lt;3.16.4-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207655" version="1" comment="mozilla-nss-devel is &lt;3.17.3-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207663" version="1" comment="mozilla-nss-devel is &lt;3.19.2.1-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207671" version="1" comment="mozilla-nspr-devel is &lt;4.12-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207674" version="1" comment="mozilla-nss-devel is &lt;3.20.2-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207676" version="1" comment="mozilla-nss-devel is &lt;3.17.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207677" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.45.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207678" version="1" comment="glibc-profile is &lt;2.11.3-17.45.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207679" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.45.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207680" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.45.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207681" version="1" comment="glibc-x86 is &lt;2.11.3-17.45.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207682" version="1" comment="glibc is &lt;2.11.3-17.45.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207683" version="1" comment="glibc-32bit is &lt;2.11.3-17.45.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207684" version="1" comment="glibc-devel is &lt;2.11.3-17.45.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207685" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.45.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207686" version="1" comment="glibc-html is &lt;2.11.3-17.45.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207687" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.45.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207688" version="1" comment="glibc-info is &lt;2.11.3-17.45.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207689" version="1" comment="glibc-locale is &lt;2.11.3-17.45.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207690" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.45.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207691" version="1" comment="glibc-profile is &lt;2.11.3-17.45.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207692" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.45.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207693" version="1" comment="nscd is &lt;2.11.3-17.45.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207694" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.39.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207695" version="1" comment="hyper-v is &lt;3-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207698" version="1" comment="java-1_4_2-ibm-jdbc is &lt;1.4.2_sr13.18-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207699" version="1" comment="java-1_4_2-ibm-plugin is &lt;1.4.2_sr13.18-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207700" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr15.0-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207701" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.0-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207702" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr15.0-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207703" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr15.0-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207705" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.20-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207706" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.20-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207711" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.25-69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207712" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.25-69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207716" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.15-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207719" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr6.0-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207720" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr6.0-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207721" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr7.0-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207722" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr6.0-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207723" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr6.0-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207724" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr9.10-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207725" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr9.10-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207726" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr9.10-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207727" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr9.20-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207728" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr9.20-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207729" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr9.20-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207730" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr9.30-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207731" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr9.30-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207732" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr9.30-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207733" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr9.30-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207734" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr9.30-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207735" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr9.40-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207736" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr9.40-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207737" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr9.40-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207738" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr9.40-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207739" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr9.40-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207740" version="1" comment="libkde4-x86 is &lt;4.3.5-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207741" version="1" comment="libkdecore4-x86 is &lt;4.3.5-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207742" version="1" comment="kernel-default-man is &lt;3.0.101-0.7.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207743" version="1" comment="kernel-ec2 is &lt;3.0.101-0.7.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207744" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.7.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207745" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.7.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207746" version="1" comment="kernel-ppc64 is &lt;3.0.101-0.7.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207747" version="1" comment="kernel-ppc64-base is &lt;3.0.101-0.7.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207748" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-0.7.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207749" version="1" comment="kernel-default is &lt;3.0.101-0.7.47" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207750" version="1" comment="kernel-default-base is &lt;3.0.101-0.7.47" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207751" version="1" comment="kernel-default-devel is &lt;3.0.101-0.7.47" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207752" version="1" comment="kernel-default-man is &lt;3.0.101-0.7.47" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207753" version="1" comment="kernel-ec2 is &lt;3.0.101-0.7.47" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207754" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.7.47" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207755" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.7.47" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207756" version="1" comment="kernel-pae is &lt;3.0.101-0.7.47" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207757" version="1" comment="kernel-pae-base is &lt;3.0.101-0.7.47" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207758" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.7.47" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207759" version="1" comment="kernel-source is &lt;3.0.101-0.7.47" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207760" version="1" comment="kernel-syms is &lt;3.0.101-0.7.47" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207761" version="1" comment="kernel-trace is &lt;3.0.101-0.7.47" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207762" version="1" comment="kernel-trace-base is &lt;3.0.101-0.7.47" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207763" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.7.47" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207764" version="1" comment="kernel-xen is &lt;3.0.101-0.7.47" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207765" version="1" comment="kernel-xen-base is &lt;3.0.101-0.7.47" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207766" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.7.47" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207767" version="1" comment="kernel-default is &lt;3.0.101-0.7.53" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207768" version="1" comment="kernel-default-base is &lt;3.0.101-0.7.53" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207769" version="1" comment="kernel-default-devel is &lt;3.0.101-0.7.53" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207770" version="1" comment="kernel-default-man is &lt;3.0.101-0.7.53" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207771" version="1" comment="kernel-ec2 is &lt;3.0.101-0.7.53" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207772" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.7.53" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207773" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.7.53" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207774" version="1" comment="kernel-pae is &lt;3.0.101-0.7.53" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207775" version="1" comment="kernel-pae-base is &lt;3.0.101-0.7.53" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207776" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.7.53" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207777" version="1" comment="kernel-source is &lt;3.0.101-0.7.53" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207778" version="1" comment="kernel-syms is &lt;3.0.101-0.7.53" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207779" version="1" comment="kernel-trace is &lt;3.0.101-0.7.53" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207780" version="1" comment="kernel-trace-base is &lt;3.0.101-0.7.53" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207781" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.7.53" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207782" version="1" comment="kernel-xen is &lt;3.0.101-0.7.53" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207783" version="1" comment="kernel-xen-base is &lt;3.0.101-0.7.53" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207784" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.7.53" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207785" version="1" comment="kernel-default is &lt;3.0.101-0.7.37" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207786" version="1" comment="kernel-default-base is &lt;3.0.101-0.7.37" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207787" version="1" comment="kernel-default-devel is &lt;3.0.101-0.7.37" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207788" version="1" comment="kernel-default-man is &lt;3.0.101-0.7.37" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207789" version="1" comment="kernel-ec2 is &lt;3.0.101-0.7.37" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207790" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.7.37" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207791" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.7.37" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207792" version="1" comment="kernel-pae is &lt;3.0.101-0.7.37" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207793" version="1" comment="kernel-pae-base is &lt;3.0.101-0.7.37" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207794" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.7.37" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207795" version="1" comment="kernel-source is &lt;3.0.101-0.7.37" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207796" version="1" comment="kernel-syms is &lt;3.0.101-0.7.37" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207797" version="1" comment="kernel-trace is &lt;3.0.101-0.7.37" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207798" version="1" comment="kernel-trace-base is &lt;3.0.101-0.7.37" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207799" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.7.37" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207800" version="1" comment="kernel-xen is &lt;3.0.101-0.7.37" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207801" version="1" comment="kernel-xen-base is &lt;3.0.101-0.7.37" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207802" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.7.37" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207803" version="1" comment="kernel-default is &lt;3.0.101-0.7.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207804" version="1" comment="kernel-default-base is &lt;3.0.101-0.7.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207805" version="1" comment="kernel-default-devel is &lt;3.0.101-0.7.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207806" version="1" comment="kernel-default-man is &lt;3.0.101-0.7.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207807" version="1" comment="kernel-ec2 is &lt;3.0.101-0.7.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207808" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.7.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207809" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.7.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207810" version="1" comment="kernel-pae is &lt;3.0.101-0.7.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207811" version="1" comment="kernel-pae-base is &lt;3.0.101-0.7.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207812" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.7.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207813" version="1" comment="kernel-source is &lt;3.0.101-0.7.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207814" version="1" comment="kernel-syms is &lt;3.0.101-0.7.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207815" version="1" comment="kernel-trace is &lt;3.0.101-0.7.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207816" version="1" comment="kernel-trace-base is &lt;3.0.101-0.7.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207817" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.7.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207818" version="1" comment="kernel-xen is &lt;3.0.101-0.7.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207819" version="1" comment="kernel-xen-base is &lt;3.0.101-0.7.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207820" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.7.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207821" version="1" comment="kernel-default is &lt;3.0.101-0.7.44" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207822" version="1" comment="kernel-default-base is &lt;3.0.101-0.7.44" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207823" version="1" comment="kernel-default-devel is &lt;3.0.101-0.7.44" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207824" version="1" comment="kernel-default-man is &lt;3.0.101-0.7.44" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207825" version="1" comment="kernel-ec2 is &lt;3.0.101-0.7.44" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207826" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.7.44" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207827" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.7.44" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207828" version="1" comment="kernel-pae is &lt;3.0.101-0.7.44" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207829" version="1" comment="kernel-pae-base is &lt;3.0.101-0.7.44" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207830" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.7.44" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207831" version="1" comment="kernel-source is &lt;3.0.101-0.7.44" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207832" version="1" comment="kernel-syms is &lt;3.0.101-0.7.44" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207833" version="1" comment="kernel-trace is &lt;3.0.101-0.7.44" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207834" version="1" comment="kernel-trace-base is &lt;3.0.101-0.7.44" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207835" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.7.44" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207836" version="1" comment="kernel-xen is &lt;3.0.101-0.7.44" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207837" version="1" comment="kernel-xen-base is &lt;3.0.101-0.7.44" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207838" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.7.44" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207839" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207840" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207841" version="1" comment="krb5-doc is &lt;1.6.3-133.49.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207842" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.49.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207843" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.49.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207844" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207845" version="1" comment="kvm is &lt;0.15.1-0.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207846" version="1" comment="ldapsmb is &lt;1.34b-12.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207847" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207848" version="1" comment="libtalloc2-x86 is &lt;3.6.3-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207849" version="1" comment="libtdb1-x86 is &lt;3.6.3-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207850" version="1" comment="libwbclient0-x86 is &lt;3.6.3-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207851" version="1" comment="samba-client-x86 is &lt;3.6.3-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207852" version="1" comment="samba-winbind-x86 is &lt;3.6.3-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207853" version="1" comment="samba-x86 is &lt;3.6.3-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207854" version="1" comment="libqt4-qt3support-x86 is &lt;4.6.3-5.20.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207855" version="1" comment="libqt4-sql-x86 is &lt;4.6.3-5.20.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207856" version="1" comment="libqt4-x11-x86 is &lt;4.6.3-5.20.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207857" version="1" comment="libqt4-x86 is &lt;4.6.3-5.20.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207858" version="1" comment="qt4-x11-tools is &lt;4.6.3-5.20.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207859" version="1" comment="libpq5-x86 is &lt;9.1.9-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207860" version="1" comment="libfreebl3 is &lt;3.16.5-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207861" version="1" comment="libfreebl3-32bit is &lt;3.16.5-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207862" version="1" comment="mozilla-nss is &lt;3.16.5-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207863" version="1" comment="mozilla-nss-32bit is &lt;3.16.5-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207864" version="1" comment="mozilla-nss-devel is &lt;3.16.5-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207865" version="1" comment="mozilla-nss-tools is &lt;3.16.5-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207866" version="1" comment="libgcrypt11-x86 is &lt;1.5.0-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207867" version="1" comment="mysql-Max is &lt;5.0.96-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207868" version="1" comment="mysql-tools is &lt;5.0.96-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207869" version="1" comment="libopenssl0_9_8-hmac-x86 is &lt;0.9.8j-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207870" version="1" comment="libpixman-1-0-x86 is &lt;0.16.0-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207871" version="1" comment="libsoup-2_4-1-x86 is &lt;2.32.2-4.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207872" version="1" comment="libxml2-doc is &lt;2.7.6-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207873" version="1" comment="libxml2-x86 is &lt;2.7.6-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207883" version="1" comment="mozilla-nss-devel is &lt;3.21.3-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207891" version="1" comment="mozilla-nss-devel is &lt;3.20.2-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207893" version="1" comment="libfreebl3-x86 is &lt;3.15.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207894" version="1" comment="mozilla-nspr-x86 is &lt;4.10.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207895" version="1" comment="mozilla-nss-x86 is &lt;3.15.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207896" version="1" comment="nagios-nrpe is &lt;2.12-24.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207897" version="1" comment="nagios-nrpe-doc is &lt;2.12-24.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207898" version="1" comment="nagios-plugins-nrpe is &lt;2.12-24.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207899" version="1" comment="libfreebl3-x86 is &lt;3.15.3-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207900" version="1" comment="mozilla-nspr-x86 is &lt;4.10.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207901" version="1" comment="mozilla-nss-x86 is &lt;3.15.3-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207902" version="1" comment="libfreebl3-x86 is &lt;3.15.3.1-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207903" version="1" comment="mozilla-nss-x86 is &lt;3.15.3.1-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207911" version="1" comment="openCryptoki-32bit is &lt;2.4-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207912" version="1" comment="openCryptoki-64bit is &lt;2.4-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207917" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207920" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207925" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207928" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.102" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207929" version="1" comment="openswan is &lt;2.6.16-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207930" version="1" comment="openswan-doc is &lt;2.6.16-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009207932" version="1" comment="perl-x86 is &lt;5.10.0-64.61.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208023" version="1" comment="apache2-mod_php53 is &lt;5.3.17-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208024" version="1" comment="php53 is &lt;5.3.17-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208025" version="1" comment="php53-bcmath is &lt;5.3.17-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208026" version="1" comment="php53-bz2 is &lt;5.3.17-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208027" version="1" comment="php53-calendar is &lt;5.3.17-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208028" version="1" comment="php53-ctype is &lt;5.3.17-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208029" version="1" comment="php53-curl is &lt;5.3.17-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208030" version="1" comment="php53-dba is &lt;5.3.17-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208031" version="1" comment="php53-dom is &lt;5.3.17-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208032" version="1" comment="php53-exif is &lt;5.3.17-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208033" version="1" comment="php53-fastcgi is &lt;5.3.17-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208034" version="1" comment="php53-fileinfo is &lt;5.3.17-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208035" version="1" comment="php53-ftp is &lt;5.3.17-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208036" version="1" comment="php53-gd is &lt;5.3.17-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208037" version="1" comment="php53-gettext is &lt;5.3.17-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208038" version="1" comment="php53-gmp is &lt;5.3.17-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208039" version="1" comment="php53-iconv is &lt;5.3.17-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208040" version="1" comment="php53-intl is &lt;5.3.17-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208041" version="1" comment="php53-json is &lt;5.3.17-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208042" version="1" comment="php53-ldap is &lt;5.3.17-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208043" version="1" comment="php53-mbstring is &lt;5.3.17-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208044" version="1" comment="php53-mcrypt is &lt;5.3.17-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208045" version="1" comment="php53-mysql is &lt;5.3.17-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208046" version="1" comment="php53-odbc is &lt;5.3.17-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208047" version="1" comment="php53-openssl is &lt;5.3.17-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208048" version="1" comment="php53-pcntl is &lt;5.3.17-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208049" version="1" comment="php53-pdo is &lt;5.3.17-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208050" version="1" comment="php53-pear is &lt;5.3.17-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208051" version="1" comment="php53-pgsql is &lt;5.3.17-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208052" version="1" comment="php53-pspell is &lt;5.3.17-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208053" version="1" comment="php53-shmop is &lt;5.3.17-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208054" version="1" comment="php53-snmp is &lt;5.3.17-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208055" version="1" comment="php53-soap is &lt;5.3.17-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208056" version="1" comment="php53-suhosin is &lt;5.3.17-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208057" version="1" comment="php53-sysvmsg is &lt;5.3.17-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208058" version="1" comment="php53-sysvsem is &lt;5.3.17-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208059" version="1" comment="php53-sysvshm is &lt;5.3.17-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208060" version="1" comment="php53-tokenizer is &lt;5.3.17-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208061" version="1" comment="php53-wddx is &lt;5.3.17-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208062" version="1" comment="php53-xmlreader is &lt;5.3.17-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208063" version="1" comment="php53-xmlrpc is &lt;5.3.17-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208064" version="1" comment="php53-xmlwriter is &lt;5.3.17-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208065" version="1" comment="php53-xsl is &lt;5.3.17-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208066" version="1" comment="php53-zip is &lt;5.3.17-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208067" version="1" comment="php53-zlib is &lt;5.3.17-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208068" version="1" comment="apache2-mod_php53 is &lt;5.3.17-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208069" version="1" comment="php53 is &lt;5.3.17-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208070" version="1" comment="php53-bcmath is &lt;5.3.17-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208071" version="1" comment="php53-bz2 is &lt;5.3.17-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208072" version="1" comment="php53-calendar is &lt;5.3.17-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208073" version="1" comment="php53-ctype is &lt;5.3.17-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208074" version="1" comment="php53-curl is &lt;5.3.17-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208075" version="1" comment="php53-dba is &lt;5.3.17-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208076" version="1" comment="php53-dom is &lt;5.3.17-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208077" version="1" comment="php53-exif is &lt;5.3.17-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208078" version="1" comment="php53-fastcgi is &lt;5.3.17-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208079" version="1" comment="php53-fileinfo is &lt;5.3.17-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208080" version="1" comment="php53-ftp is &lt;5.3.17-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208081" version="1" comment="php53-gd is &lt;5.3.17-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208082" version="1" comment="php53-gettext is &lt;5.3.17-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208083" version="1" comment="php53-gmp is &lt;5.3.17-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208084" version="1" comment="php53-iconv is &lt;5.3.17-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208085" version="1" comment="php53-intl is &lt;5.3.17-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208086" version="1" comment="php53-json is &lt;5.3.17-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208087" version="1" comment="php53-ldap is &lt;5.3.17-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208088" version="1" comment="php53-mbstring is &lt;5.3.17-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208089" version="1" comment="php53-mcrypt is &lt;5.3.17-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208090" version="1" comment="php53-mysql is &lt;5.3.17-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208091" version="1" comment="php53-odbc is &lt;5.3.17-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208092" version="1" comment="php53-openssl is &lt;5.3.17-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208093" version="1" comment="php53-pcntl is &lt;5.3.17-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208094" version="1" comment="php53-pdo is &lt;5.3.17-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208095" version="1" comment="php53-pear is &lt;5.3.17-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208096" version="1" comment="php53-pgsql is &lt;5.3.17-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208097" version="1" comment="php53-pspell is &lt;5.3.17-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208098" version="1" comment="php53-shmop is &lt;5.3.17-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208099" version="1" comment="php53-snmp is &lt;5.3.17-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208100" version="1" comment="php53-soap is &lt;5.3.17-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208101" version="1" comment="php53-suhosin is &lt;5.3.17-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208102" version="1" comment="php53-sysvmsg is &lt;5.3.17-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208103" version="1" comment="php53-sysvsem is &lt;5.3.17-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208104" version="1" comment="php53-sysvshm is &lt;5.3.17-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208105" version="1" comment="php53-tokenizer is &lt;5.3.17-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208106" version="1" comment="php53-wddx is &lt;5.3.17-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208107" version="1" comment="php53-xmlreader is &lt;5.3.17-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208108" version="1" comment="php53-xmlrpc is &lt;5.3.17-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208109" version="1" comment="php53-xmlwriter is &lt;5.3.17-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208110" version="1" comment="php53-xsl is &lt;5.3.17-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208111" version="1" comment="php53-zip is &lt;5.3.17-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208112" version="1" comment="php53-zlib is &lt;5.3.17-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208113" version="1" comment="apache2-mod_php53 is &lt;5.3.17-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208114" version="1" comment="php53 is &lt;5.3.17-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208115" version="1" comment="php53-bcmath is &lt;5.3.17-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208116" version="1" comment="php53-bz2 is &lt;5.3.17-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208117" version="1" comment="php53-calendar is &lt;5.3.17-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208118" version="1" comment="php53-ctype is &lt;5.3.17-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208119" version="1" comment="php53-curl is &lt;5.3.17-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208120" version="1" comment="php53-dba is &lt;5.3.17-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208121" version="1" comment="php53-dom is &lt;5.3.17-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208122" version="1" comment="php53-exif is &lt;5.3.17-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208123" version="1" comment="php53-fastcgi is &lt;5.3.17-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208124" version="1" comment="php53-fileinfo is &lt;5.3.17-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208125" version="1" comment="php53-ftp is &lt;5.3.17-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208126" version="1" comment="php53-gd is &lt;5.3.17-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208127" version="1" comment="php53-gettext is &lt;5.3.17-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208128" version="1" comment="php53-gmp is &lt;5.3.17-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208129" version="1" comment="php53-iconv is &lt;5.3.17-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208130" version="1" comment="php53-intl is &lt;5.3.17-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208131" version="1" comment="php53-json is &lt;5.3.17-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208132" version="1" comment="php53-ldap is &lt;5.3.17-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208133" version="1" comment="php53-mbstring is &lt;5.3.17-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208134" version="1" comment="php53-mcrypt is &lt;5.3.17-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208135" version="1" comment="php53-mysql is &lt;5.3.17-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208136" version="1" comment="php53-odbc is &lt;5.3.17-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208137" version="1" comment="php53-openssl is &lt;5.3.17-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208138" version="1" comment="php53-pcntl is &lt;5.3.17-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208139" version="1" comment="php53-pdo is &lt;5.3.17-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208140" version="1" comment="php53-pear is &lt;5.3.17-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208141" version="1" comment="php53-pgsql is &lt;5.3.17-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208142" version="1" comment="php53-pspell is &lt;5.3.17-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208143" version="1" comment="php53-shmop is &lt;5.3.17-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208144" version="1" comment="php53-snmp is &lt;5.3.17-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208145" version="1" comment="php53-soap is &lt;5.3.17-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208146" version="1" comment="php53-suhosin is &lt;5.3.17-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208147" version="1" comment="php53-sysvmsg is &lt;5.3.17-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208148" version="1" comment="php53-sysvsem is &lt;5.3.17-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208149" version="1" comment="php53-sysvshm is &lt;5.3.17-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208150" version="1" comment="php53-tokenizer is &lt;5.3.17-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208151" version="1" comment="php53-wddx is &lt;5.3.17-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208152" version="1" comment="php53-xmlreader is &lt;5.3.17-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208153" version="1" comment="php53-xmlrpc is &lt;5.3.17-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208154" version="1" comment="php53-xmlwriter is &lt;5.3.17-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208155" version="1" comment="php53-xsl is &lt;5.3.17-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208156" version="1" comment="php53-zip is &lt;5.3.17-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208157" version="1" comment="php53-zlib is &lt;5.3.17-58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208158" version="1" comment="popt-x86 is &lt;1.7-37.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208159" version="1" comment="puppet-server is &lt;2.6.18-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208160" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208161" version="1" comment="python-base-x86 is &lt;2.6.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208162" version="1" comment="python-x86 is &lt;2.6.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208163" version="1" comment="quota-nfs is &lt;3.16-50.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208164" version="1" comment="ldapsmb is &lt;1.34b-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208165" version="1" comment="libldb1 is &lt;3.6.3-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208166" version="1" comment="libsmbclient0 is &lt;3.6.3-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208167" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208168" version="1" comment="libtalloc2 is &lt;3.6.3-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208169" version="1" comment="libtalloc2-32bit is &lt;3.6.3-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208170" version="1" comment="libtdb1 is &lt;3.6.3-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208171" version="1" comment="libtdb1-32bit is &lt;3.6.3-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208172" version="1" comment="libtevent0 is &lt;3.6.3-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208173" version="1" comment="libtevent0-32bit is &lt;3.6.3-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208174" version="1" comment="libwbclient0 is &lt;3.6.3-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208175" version="1" comment="libwbclient0-32bit is &lt;3.6.3-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208176" version="1" comment="samba is &lt;3.6.3-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208177" version="1" comment="samba-32bit is &lt;3.6.3-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208178" version="1" comment="samba-client is &lt;3.6.3-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208179" version="1" comment="samba-client-32bit is &lt;3.6.3-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208180" version="1" comment="samba-doc is &lt;3.6.3-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208181" version="1" comment="samba-krb-printing is &lt;3.6.3-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208182" version="1" comment="samba-winbind is &lt;3.6.3-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208183" version="1" comment="samba-winbind-32bit is &lt;3.6.3-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208184" version="1" comment="ldapsmb is &lt;1.34b-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208185" version="1" comment="libldb1 is &lt;3.6.3-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208186" version="1" comment="libsmbclient0 is &lt;3.6.3-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208187" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208188" version="1" comment="libtalloc2 is &lt;3.6.3-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208189" version="1" comment="libtalloc2-32bit is &lt;3.6.3-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208190" version="1" comment="libtdb1 is &lt;3.6.3-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208191" version="1" comment="libtdb1-32bit is &lt;3.6.3-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208192" version="1" comment="libtevent0 is &lt;3.6.3-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208193" version="1" comment="libtevent0-32bit is &lt;3.6.3-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208194" version="1" comment="libwbclient0 is &lt;3.6.3-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208195" version="1" comment="libwbclient0-32bit is &lt;3.6.3-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208196" version="1" comment="samba is &lt;3.6.3-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208197" version="1" comment="samba-32bit is &lt;3.6.3-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208198" version="1" comment="samba-client is &lt;3.6.3-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208199" version="1" comment="samba-client-32bit is &lt;3.6.3-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208200" version="1" comment="samba-doc is &lt;3.6.3-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208201" version="1" comment="samba-krb-printing is &lt;3.6.3-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208202" version="1" comment="samba-winbind is &lt;3.6.3-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208203" version="1" comment="samba-winbind-32bit is &lt;3.6.3-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208204" version="1" comment="ldapsmb is &lt;1.34b-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208205" version="1" comment="libldb1 is &lt;3.6.3-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208206" version="1" comment="libsmbclient0 is &lt;3.6.3-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208207" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208208" version="1" comment="libtalloc2 is &lt;3.6.3-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208209" version="1" comment="libtalloc2-32bit is &lt;3.6.3-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208210" version="1" comment="libtdb1 is &lt;3.6.3-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208211" version="1" comment="libtdb1-32bit is &lt;3.6.3-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208212" version="1" comment="libtevent0 is &lt;3.6.3-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208213" version="1" comment="libtevent0-32bit is &lt;3.6.3-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208214" version="1" comment="libwbclient0 is &lt;3.6.3-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208215" version="1" comment="libwbclient0-32bit is &lt;3.6.3-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208216" version="1" comment="samba is &lt;3.6.3-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208217" version="1" comment="samba-32bit is &lt;3.6.3-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208218" version="1" comment="samba-client is &lt;3.6.3-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208219" version="1" comment="samba-client-32bit is &lt;3.6.3-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208220" version="1" comment="samba-doc is &lt;3.6.3-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208221" version="1" comment="samba-krb-printing is &lt;3.6.3-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208222" version="1" comment="samba-winbind is &lt;3.6.3-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208223" version="1" comment="samba-winbind-32bit is &lt;3.6.3-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208225" version="1" comment="libldb1 is &lt;3.6.3-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208226" version="1" comment="libsmbclient0 is &lt;3.6.3-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208227" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208228" version="1" comment="libtalloc2 is &lt;3.6.3-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208229" version="1" comment="libtalloc2-32bit is &lt;3.6.3-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208230" version="1" comment="libtdb1 is &lt;3.6.3-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208231" version="1" comment="libtdb1-32bit is &lt;3.6.3-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208232" version="1" comment="libtevent0 is &lt;3.6.3-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208233" version="1" comment="libtevent0-32bit is &lt;3.6.3-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208234" version="1" comment="libwbclient0 is &lt;3.6.3-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208235" version="1" comment="libwbclient0-32bit is &lt;3.6.3-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208236" version="1" comment="samba is &lt;3.6.3-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208237" version="1" comment="samba-32bit is &lt;3.6.3-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208238" version="1" comment="samba-client is &lt;3.6.3-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208239" version="1" comment="samba-client-32bit is &lt;3.6.3-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208240" version="1" comment="samba-doc is &lt;3.6.3-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208241" version="1" comment="samba-krb-printing is &lt;3.6.3-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208242" version="1" comment="samba-winbind is &lt;3.6.3-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208243" version="1" comment="samba-winbind-32bit is &lt;3.6.3-56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208245" version="1" comment="tomcat6 is &lt;6.0.18-20.35.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208246" version="1" comment="tomcat6-admin-webapps is &lt;6.0.18-20.35.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208247" version="1" comment="tomcat6-docs-webapp is &lt;6.0.18-20.35.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208248" version="1" comment="tomcat6-javadoc is &lt;6.0.18-20.35.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208249" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.18-20.35.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208250" version="1" comment="tomcat6-lib is &lt;6.0.18-20.35.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208251" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.18-20.35.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208252" version="1" comment="tomcat6-webapps is &lt;6.0.18-20.35.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208253" version="1" comment="xen-devel is &lt;4.1.6_08-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208254" version="1" comment="xen is &lt;4.1.6_08-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208255" version="1" comment="xen-devel is &lt;4.1.6_08-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208256" version="1" comment="xen-doc-html is &lt;4.1.6_08-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208257" version="1" comment="xen-doc-pdf is &lt;4.1.6_08-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208258" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.23-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208259" version="1" comment="xen-kmp-pae is &lt;4.1.6_08_3.0.101_0.7.23-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208260" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.23-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208261" version="1" comment="xen-libs is &lt;4.1.6_08-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208262" version="1" comment="xen-libs-32bit is &lt;4.1.6_08-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208263" version="1" comment="xen-tools is &lt;4.1.6_08-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208264" version="1" comment="xen-tools-domU is &lt;4.1.6_08-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208265" version="1" comment="xen is &lt;4.1.6_08-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208266" version="1" comment="xen-devel is &lt;4.1.6_08-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208267" version="1" comment="xen-doc-html is &lt;4.1.6_08-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208268" version="1" comment="xen-doc-pdf is &lt;4.1.6_08-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208269" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.37-20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208270" version="1" comment="xen-kmp-pae is &lt;4.1.6_08_3.0.101_0.7.37-20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208271" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.37-20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208272" version="1" comment="xen-libs is &lt;4.1.6_08-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208273" version="1" comment="xen-libs-32bit is &lt;4.1.6_08-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208274" version="1" comment="xen-tools is &lt;4.1.6_08-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208275" version="1" comment="xen-tools-domU is &lt;4.1.6_08-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208276" version="1" comment="xen is &lt;4.1.6_08-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208277" version="1" comment="xen-devel is &lt;4.1.6_08-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208278" version="1" comment="xen-doc-html is &lt;4.1.6_08-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208279" version="1" comment="xen-doc-pdf is &lt;4.1.6_08-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208280" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.37-26" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208281" version="1" comment="xen-kmp-pae is &lt;4.1.6_08_3.0.101_0.7.37-26" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208282" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.37-26" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208283" version="1" comment="xen-libs is &lt;4.1.6_08-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208284" version="1" comment="xen-libs-32bit is &lt;4.1.6_08-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208285" version="1" comment="xen-tools is &lt;4.1.6_08-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208286" version="1" comment="xen-tools-domU is &lt;4.1.6_08-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208287" version="1" comment="xen is &lt;4.1.6_08-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208288" version="1" comment="xen-devel is &lt;4.1.6_08-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208289" version="1" comment="xen-doc-html is &lt;4.1.6_08-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208290" version="1" comment="xen-doc-pdf is &lt;4.1.6_08-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208291" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.40-29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208292" version="1" comment="xen-kmp-pae is &lt;4.1.6_08_3.0.101_0.7.40-29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208293" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.40-29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208294" version="1" comment="xen-libs is &lt;4.1.6_08-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208295" version="1" comment="xen-libs-32bit is &lt;4.1.6_08-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208296" version="1" comment="xen-tools is &lt;4.1.6_08-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208297" version="1" comment="xen-tools-domU is &lt;4.1.6_08-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208298" version="1" comment="xen is &lt;4.1.6_08-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208299" version="1" comment="xen-devel is &lt;4.1.6_08-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208300" version="1" comment="xen-doc-html is &lt;4.1.6_08-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208301" version="1" comment="xen-doc-pdf is &lt;4.1.6_08-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208302" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.44-32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208303" version="1" comment="xen-kmp-pae is &lt;4.1.6_08_3.0.101_0.7.44-32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208304" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.44-32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208305" version="1" comment="xen-libs is &lt;4.1.6_08-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208306" version="1" comment="xen-libs-32bit is &lt;4.1.6_08-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208307" version="1" comment="xen-tools is &lt;4.1.6_08-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208308" version="1" comment="xen-tools-domU is &lt;4.1.6_08-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208309" version="1" comment="xen is &lt;4.1.6_06-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208310" version="1" comment="xen-devel is &lt;4.1.6_06-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208311" version="1" comment="xen-doc-html is &lt;4.1.6_06-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208312" version="1" comment="xen-doc-pdf is &lt;4.1.6_06-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208313" version="1" comment="xen-kmp-default is &lt;4.1.6_06_3.0.101_0.7.17-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208314" version="1" comment="xen-kmp-pae is &lt;4.1.6_06_3.0.101_0.7.17-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208315" version="1" comment="xen-kmp-trace is &lt;4.1.6_06_3.0.101_0.7.17-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208316" version="1" comment="xen-libs is &lt;4.1.6_06-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208317" version="1" comment="xen-libs-32bit is &lt;4.1.6_06-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208318" version="1" comment="xen-tools is &lt;4.1.6_06-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208319" version="1" comment="xen-tools-domU is &lt;4.1.6_06-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208320" version="1" comment="xen is &lt;4.1.6_08-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208321" version="1" comment="xen-devel is &lt;4.1.6_08-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208322" version="1" comment="xen-doc-html is &lt;4.1.6_08-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208323" version="1" comment="xen-doc-pdf is &lt;4.1.6_08-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208324" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.29-0.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208325" version="1" comment="xen-kmp-pae is &lt;4.1.6_08_3.0.101_0.7.29-0.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208326" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.29-0.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208327" version="1" comment="xen-libs is &lt;4.1.6_08-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208328" version="1" comment="xen-libs-32bit is &lt;4.1.6_08-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208329" version="1" comment="xen-tools is &lt;4.1.6_08-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208330" version="1" comment="xen-tools-domU is &lt;4.1.6_08-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208331" version="1" comment="xen is &lt;4.1.6_08-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208332" version="1" comment="xen-devel is &lt;4.1.6_08-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208333" version="1" comment="xen-doc-html is &lt;4.1.6_08-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208334" version="1" comment="xen-doc-pdf is &lt;4.1.6_08-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208335" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.29-0.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208336" version="1" comment="xen-kmp-pae is &lt;4.1.6_08_3.0.101_0.7.29-0.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208337" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.29-0.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208338" version="1" comment="xen-libs is &lt;4.1.6_08-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208339" version="1" comment="xen-libs-32bit is &lt;4.1.6_08-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208340" version="1" comment="xen-tools is &lt;4.1.6_08-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208341" version="1" comment="xen-tools-domU is &lt;4.1.6_08-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208342" version="1" comment="xen is &lt;4.1.6_08-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208343" version="1" comment="xen-devel is &lt;4.1.6_08-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208344" version="1" comment="xen-doc-html is &lt;4.1.6_08-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208345" version="1" comment="xen-doc-pdf is &lt;4.1.6_08-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208346" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.37-23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208347" version="1" comment="xen-kmp-pae is &lt;4.1.6_08_3.0.101_0.7.37-23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208348" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.37-23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208349" version="1" comment="xen-libs is &lt;4.1.6_08-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208350" version="1" comment="xen-libs-32bit is &lt;4.1.6_08-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208351" version="1" comment="xen-tools is &lt;4.1.6_08-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208352" version="1" comment="xen-tools-domU is &lt;4.1.6_08-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208353" version="1" comment="xorg-x11-libs-x86 is &lt;7.4-8.26.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208354" version="1" comment="xorg-x11-libxcb-x86 is &lt;7.4-1.22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208355" version="1" comment="libfreebl3-x86 is &lt;3.16.1-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208356" version="1" comment="libsoftokn3-x86 is &lt;3.16.1-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208357" version="1" comment="mozilla-nspr-x86 is &lt;4.10.6-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208358" version="1" comment="mozilla-nss-x86 is &lt;3.16.1-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208359" version="1" comment="Mesa-x86 is &lt;9.0.3-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208360" version="1" comment="libfreebl3 is &lt;3.20.2-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208361" version="1" comment="libfreebl3-32bit is &lt;3.20.2-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208362" version="1" comment="libsoftokn3 is &lt;3.20.2-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208363" version="1" comment="libsoftokn3-32bit is &lt;3.20.2-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208364" version="1" comment="mozilla-nspr-32bit is &lt;4.12-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208365" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208366" version="1" comment="mozilla-nss-tools is &lt;3.20.2-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208367" version="1" comment="libfreebl3-32bit is &lt;3.21.1-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208368" version="1" comment="libsoftokn3-32bit is &lt;3.21.1-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208369" version="1" comment="mozilla-nspr-32bit is &lt;4.12-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208370" version="1" comment="mozilla-nss-32bit is &lt;3.21.1-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208371" version="1" comment="libfreebl3-32bit is &lt;3.29.5-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208372" version="1" comment="libsoftokn3-32bit is &lt;3.29.5-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208373" version="1" comment="mozilla-nspr-32bit is &lt;4.13.1-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208374" version="1" comment="mozilla-nss-32bit is &lt;3.29.5-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208375" version="1" comment="libfreebl3-32bit is &lt;3.29.5-47.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208376" version="1" comment="libsoftokn3-32bit is &lt;3.29.5-47.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208377" version="1" comment="mozilla-nss-32bit is &lt;3.29.5-47.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208378" version="1" comment="libfreebl3-x86 is &lt;3.16-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208379" version="1" comment="libsoftokn3-x86 is &lt;3.16-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208380" version="1" comment="mozilla-nspr-x86 is &lt;4.10.4-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208381" version="1" comment="mozilla-nss-x86 is &lt;3.16-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208382" version="1" comment="libfreebl3-x86 is &lt;3.19.2_CKBI_1.98-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208383" version="1" comment="libsoftokn3-x86 is &lt;3.19.2_CKBI_1.98-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208384" version="1" comment="mozilla-nspr-x86 is &lt;4.10.8-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208385" version="1" comment="mozilla-nss-x86 is &lt;3.19.2_CKBI_1.98-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249903" version="1" comment="ansible is &lt;2.2.0.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249904" version="1" comment="ansible is &lt;2.2.0.0-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249905" version="1" comment="ansible is &lt;2.3.2.0-11.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249906" version="1" comment="libyaml is &lt;0.1.3-0.10.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249907" version="1" comment="libyaml-0-2 is &lt;0.1.3-0.10.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249908" version="1" comment="python-Jinja2 is &lt;2.6-2.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249909" version="1" comment="python-PyYAML is &lt;3.10-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249910" version="1" comment="python-ecdsa is &lt;0.10-0.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249911" version="1" comment="python-paramiko is &lt;1.13.1-0.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249912" version="1" comment="python-pycrypto is &lt;2.6-0.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208386" version="1" comment="apache2-mod_php53 is &lt;5.3.17-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208387" version="1" comment="php53 is &lt;5.3.17-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208388" version="1" comment="php53-bcmath is &lt;5.3.17-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208389" version="1" comment="php53-bz2 is &lt;5.3.17-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208390" version="1" comment="php53-calendar is &lt;5.3.17-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208391" version="1" comment="php53-ctype is &lt;5.3.17-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208392" version="1" comment="php53-curl is &lt;5.3.17-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208393" version="1" comment="php53-dba is &lt;5.3.17-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208394" version="1" comment="php53-dom is &lt;5.3.17-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208395" version="1" comment="php53-exif is &lt;5.3.17-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208396" version="1" comment="php53-fastcgi is &lt;5.3.17-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208397" version="1" comment="php53-fileinfo is &lt;5.3.17-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208398" version="1" comment="php53-ftp is &lt;5.3.17-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208399" version="1" comment="php53-gd is &lt;5.3.17-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208400" version="1" comment="php53-gettext is &lt;5.3.17-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208401" version="1" comment="php53-gmp is &lt;5.3.17-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208402" version="1" comment="php53-iconv is &lt;5.3.17-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208403" version="1" comment="php53-intl is &lt;5.3.17-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208404" version="1" comment="php53-json is &lt;5.3.17-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208405" version="1" comment="php53-ldap is &lt;5.3.17-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208406" version="1" comment="php53-mbstring is &lt;5.3.17-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208407" version="1" comment="php53-mcrypt is &lt;5.3.17-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208408" version="1" comment="php53-mysql is &lt;5.3.17-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208409" version="1" comment="php53-odbc is &lt;5.3.17-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208410" version="1" comment="php53-openssl is &lt;5.3.17-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208411" version="1" comment="php53-pcntl is &lt;5.3.17-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208412" version="1" comment="php53-pdo is &lt;5.3.17-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208413" version="1" comment="php53-pear is &lt;5.3.17-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208414" version="1" comment="php53-pgsql is &lt;5.3.17-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208415" version="1" comment="php53-pspell is &lt;5.3.17-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208416" version="1" comment="php53-shmop is &lt;5.3.17-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208417" version="1" comment="php53-snmp is &lt;5.3.17-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208418" version="1" comment="php53-soap is &lt;5.3.17-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208419" version="1" comment="php53-suhosin is &lt;5.3.17-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208420" version="1" comment="php53-sysvmsg is &lt;5.3.17-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208421" version="1" comment="php53-sysvsem is &lt;5.3.17-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208422" version="1" comment="php53-sysvshm is &lt;5.3.17-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208423" version="1" comment="php53-tokenizer is &lt;5.3.17-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208424" version="1" comment="php53-wddx is &lt;5.3.17-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208425" version="1" comment="php53-xmlreader is &lt;5.3.17-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208426" version="1" comment="php53-xmlrpc is &lt;5.3.17-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208427" version="1" comment="php53-xmlwriter is &lt;5.3.17-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208428" version="1" comment="php53-xsl is &lt;5.3.17-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208429" version="1" comment="php53-zip is &lt;5.3.17-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208430" version="1" comment="php53-zlib is &lt;5.3.17-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208431" version="1" comment="augeas-lenses is &lt;0.9.0-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209168" version="1" comment="augeas-lenses is &lt;0.9.0-3.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209169" version="1" comment="libaugeas0 is &lt;0.9.0-3.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243985" version="1" comment="avahi-lang is &lt;0.6.23-35.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243986" version="1" comment="avahi-utils is &lt;0.6.23-35.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243987" version="1" comment="libavahi-client3 is &lt;0.6.23-35.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243988" version="1" comment="libavahi-client3-32bit is &lt;0.6.23-35.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243990" version="1" comment="libavahi-common3 is &lt;0.6.23-35.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243991" version="1" comment="libavahi-common3-32bit is &lt;0.6.23-35.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243993" version="1" comment="libavahi-core5 is &lt;0.6.23-35.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243994" version="1" comment="libavahi-glib1 is &lt;0.6.23-35.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243995" version="1" comment="libavahi-glib1-32bit is &lt;0.6.23-35.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243997" version="1" comment="libdns_sd is &lt;0.6.23-35.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243998" version="1" comment="libdns_sd-32bit is &lt;0.6.23-35.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237105" version="1" comment="axis is &lt;1.4-236.236.44.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254573" version="1" comment="axis is &lt;1.4-236.236.44.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208432" version="1" comment="bash-x86 is &lt;3.2-147.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208433" version="1" comment="libreadline5-x86 is &lt;5.2-147.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249913" version="1" comment="bash is &lt;3.2-147.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249914" version="1" comment="bash-doc is &lt;3.2-147.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249915" version="1" comment="libreadline5 is &lt;5.2-147.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249916" version="1" comment="libreadline5-32bit is &lt;5.2-147.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249917" version="1" comment="readline-doc is &lt;5.2-147.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209175" version="1" comment="bash-doc is &lt;3.2-147.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209177" version="1" comment="libreadline5-32bit is &lt;5.2-147.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209179" version="1" comment="readline-doc is &lt;5.2-147.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208434" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208435" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208436" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208437" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208438" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208439" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208440" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208441" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208442" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.51.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256188" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.51.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249918" version="1" comment="bluez is &lt;4.99-0.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249919" version="1" comment="libbluetooth3 is &lt;4.99-0.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259373" version="1" comment="bzip2 is &lt;1.0.6-257.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259374" version="1" comment="bzip2-doc is &lt;1.0.6-257.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259375" version="1" comment="libbz2-1 is &lt;1.0.6-257.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259376" version="1" comment="libbz2-1-32bit is &lt;1.0.6-257.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259377" version="1" comment="libbz2-devel is &lt;1.0.6-257.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261374" version="1" comment="bzip2 is &lt;1.0.6-257.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261375" version="1" comment="bzip2-doc is &lt;1.0.6-257.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261376" version="1" comment="libbz2-1 is &lt;1.0.6-257.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261377" version="1" comment="libbz2-1-32bit is &lt;1.0.6-257.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261378" version="1" comment="libbz2-devel is &lt;1.0.6-257.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208443" version="1" comment="ldapsmb is &lt;1.34b-12.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208444" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208445" version="1" comment="libtalloc2-x86 is &lt;3.6.3-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208446" version="1" comment="libtdb1-x86 is &lt;3.6.3-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208447" version="1" comment="libwbclient0-x86 is &lt;3.6.3-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208448" version="1" comment="samba-client-x86 is &lt;3.6.3-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208449" version="1" comment="samba-winbind-x86 is &lt;3.6.3-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208450" version="1" comment="samba-x86 is &lt;3.6.3-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249920" version="1" comment="cifs-utils is &lt;5.1-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209190" version="1" comment="rhnlib is &lt;2.5.69.8-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209191" version="1" comment="suseRegisterInfo is &lt;2.1.12-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209192" version="1" comment="coreutils is &lt;8.12-6.25.33.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209193" version="1" comment="coreutils-lang is &lt;8.12-6.25.33.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259453" version="1" comment="coreutils is &lt;8.12-6.25.33.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009259454" version="1" comment="coreutils-lang is &lt;8.12-6.25.33.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208451" version="1" comment="cups-libs-x86 is &lt;1.3.9-8.46.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208452" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208453" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208456" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208457" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208458" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209216" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.28.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209217" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.28.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209218" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.28.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249921" version="1" comment="dnsmasq is &lt;2.71-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254108" version="1" comment="dnsmasq is &lt;2.78-0.16.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249922" version="1" comment="dosfstools is &lt;2.11-121.31.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208459" version="1" comment="libblkid1-x86 is &lt;2.19.1-6.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208460" version="1" comment="libcom_err2-x86 is &lt;1.41.9-2.10.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208461" version="1" comment="libuuid1-x86 is &lt;2.19.1-6.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208462" version="1" comment="ecryptfs-utils-x86 is &lt;61-1.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256650" version="1" comment="elfutils is &lt;0.152-4.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256651" version="1" comment="libasm1 is &lt;0.152-4.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256652" version="1" comment="libasm1-32bit is &lt;0.152-4.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256653" version="1" comment="libdw1 is &lt;0.152-4.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256654" version="1" comment="libdw1-32bit is &lt;0.152-4.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256655" version="1" comment="libebl1 is &lt;0.152-4.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256656" version="1" comment="libebl1-32bit is &lt;0.152-4.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256657" version="1" comment="libelf1 is &lt;0.152-4.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256658" version="1" comment="libelf1-32bit is &lt;0.152-4.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208463" version="1" comment="libfreebl3-x86 is &lt;3.15.4-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208464" version="1" comment="libsoftokn3-x86 is &lt;3.15.4-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208465" version="1" comment="mozilla-nss-x86 is &lt;3.15.4-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208466" version="1" comment="libfreebl3-x86 is &lt;3.16.2-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208467" version="1" comment="libsoftokn3-x86 is &lt;3.16.2-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208468" version="1" comment="mozilla-nss-x86 is &lt;3.16.2-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208469" version="1" comment="libfreebl3-x86 is &lt;3.16.4-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208470" version="1" comment="libsoftokn3-x86 is &lt;3.16.4-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208471" version="1" comment="mozilla-nss-x86 is &lt;3.16.4-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208472" version="1" comment="mozilla-nspr-x86 is &lt;4.10.9-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208473" version="1" comment="MozillaFirefox-branding-SLES-for-VMware is &lt;38-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208474" version="1" comment="libfreebl3-x86 is &lt;3.19.2.1-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208475" version="1" comment="libsoftokn3-x86 is &lt;3.19.2.1-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208476" version="1" comment="mozilla-nspr-x86 is &lt;4.10.10-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208477" version="1" comment="mozilla-nss-x86 is &lt;3.19.2.1-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208478" version="1" comment="libfreebl3-32bit is &lt;3.29.5-47.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208479" version="1" comment="libsoftokn3-32bit is &lt;3.29.5-47.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208480" version="1" comment="mozilla-nss-32bit is &lt;3.29.5-47.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208481" version="1" comment="libfreebl3-x86 is &lt;3.15.3.1-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208482" version="1" comment="libsoftokn3-x86 is &lt;3.15.3.1-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208483" version="1" comment="mozilla-nss-x86 is &lt;3.15.3.1-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208484" version="1" comment="MozillaFirefox-branding-SLES-for-VMware is &lt;31.0-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208485" version="1" comment="libfreebl3-x86 is &lt;3.17.2-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208486" version="1" comment="libsoftokn3-x86 is &lt;3.17.2-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208487" version="1" comment="mozilla-nss-x86 is &lt;3.17.2-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208488" version="1" comment="MozillaFirefox-branding-SLES-for-VMware is &lt;31.0-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208489" version="1" comment="libfreebl3-x86 is &lt;3.19.2.0-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208490" version="1" comment="libsoftokn3-x86 is &lt;3.19.2.0-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208491" version="1" comment="mozilla-nss-x86 is &lt;3.19.2.0-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209240" version="1" comment="fontconfig-32bit is &lt;2.6.0-10.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208492" version="1" comment="freetype2-x86 is &lt;2.3.7-25.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244000" version="1" comment="libfuse2 is &lt;2.8.7-0.11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208493" version="1" comment="gcc43-32bit is &lt;4.3.4_20091019-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208494" version="1" comment="libstdc++43-devel-32bit is &lt;4.3.4_20091019-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208495" version="1" comment="gcc43-32bit is &lt;4.3.4_20091019-37.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208496" version="1" comment="libstdc++43-devel-32bit is &lt;4.3.4_20091019-37.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262813" version="1" comment="gdb is &lt;7.5.1-0.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208498" version="1" comment="giflib-x86 is &lt;4.1.6-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208499" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208500" version="1" comment="glibc-profile is &lt;2.11.3-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208501" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208502" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208503" version="1" comment="glibc-x86 is &lt;2.11.3-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208504" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208505" version="1" comment="glibc-profile is &lt;2.11.3-17.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208506" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208507" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208508" version="1" comment="glibc-x86 is &lt;2.11.3-17.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208509" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.95" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208510" version="1" comment="glibc-profile is &lt;2.11.3-17.95" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208511" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.95" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208512" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.95" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208513" version="1" comment="glibc-x86 is &lt;2.11.3-17.95" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209287" version="1" comment="glibc-32bit is &lt;2.11.3-17.102" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209288" version="1" comment="glibc-devel is &lt;2.11.3-17.102" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209289" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.102" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209290" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.102" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209291" version="1" comment="glibc-locale is &lt;2.11.3-17.102" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209292" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.102" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209294" version="1" comment="glibc-profile is &lt;2.11.3-17.102" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209295" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.102" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209298" version="1" comment="nscd is &lt;2.11.3-17.102" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208514" version="1" comment="glibc-32bit is &lt;2.11.3-17.109" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208515" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.109" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208516" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.109" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208517" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.109" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208518" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208519" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208520" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208521" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208522" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208523" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208524" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208525" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209308" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209309" version="1" comment="glibc-devel is &lt;2.11.3-17.110.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209310" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209311" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209312" version="1" comment="glibc-locale is &lt;2.11.3-17.110.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209313" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209315" version="1" comment="glibc-profile is &lt;2.11.3-17.110.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209316" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209319" version="1" comment="nscd is &lt;2.11.3-17.110.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231878" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231879" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231880" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231881" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235452" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235453" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235454" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235455" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241593" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241594" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241595" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241596" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253520" version="1" comment="glibc is &lt;2.11.3-17.110.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253521" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253522" version="1" comment="glibc-devel is &lt;2.11.3-17.110.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253523" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253524" version="1" comment="glibc-html is &lt;2.11.3-17.110.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253525" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253526" version="1" comment="glibc-info is &lt;2.11.3-17.110.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253527" version="1" comment="glibc-locale is &lt;2.11.3-17.110.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253528" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253529" version="1" comment="glibc-profile is &lt;2.11.3-17.110.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253530" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253531" version="1" comment="nscd is &lt;2.11.3-17.110.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256849" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256850" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256851" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256852" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208526" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.39.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208527" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.39.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208528" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.39.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209328" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.35-5.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209329" version="1" comment="gstreamer-0_10-plugins-base-doc is &lt;0.10.35-5.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209330" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.35-5.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209332" version="1" comment="libgstapp-0_10-0 is &lt;0.10.35-5.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209333" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.35-5.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209335" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.35-5.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209336" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.35-5.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256659" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.35-5.18.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256660" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.35-5.18.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256661" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.35-5.18.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209338" version="1" comment="gstreamer-0_10-plugins-good is &lt;0.10.30-5.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209339" version="1" comment="gstreamer-0_10-plugins-good-doc is &lt;0.10.30-5.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209340" version="1" comment="gstreamer-0_10-plugins-good-lang is &lt;0.10.30-5.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208529" version="1" comment="gtk2-doc is &lt;2.18.9-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208530" version="1" comment="gtk2-x86 is &lt;2.18.9-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208531" version="1" comment="gtk2-doc is &lt;2.18.9-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208532" version="1" comment="gtk2-x86 is &lt;2.18.9-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209341" version="1" comment="gtk2-32bit is &lt;2.18.9-0.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209342" version="1" comment="gtk2-doc is &lt;2.18.9-0.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209343" version="1" comment="gtk2-lang is &lt;2.18.9-0.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209345" version="1" comment="gtk2-32bit is &lt;2.18.9-0.45.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209346" version="1" comment="gtk2-doc is &lt;2.18.9-0.45.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209347" version="1" comment="gtk2-lang is &lt;2.18.9-0.45.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233162" version="1" comment="gtk2-32bit is &lt;2.18.9-0.45.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233163" version="1" comment="gtk2-doc is &lt;2.18.9-0.45.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233164" version="1" comment="gtk2-lang is &lt;2.18.9-0.45.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208533" version="1" comment="guestfs-data is &lt;1.20.4-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208534" version="1" comment="guestfs-tools is &lt;1.20.4-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208535" version="1" comment="guestfsd is &lt;1.20.4-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208536" version="1" comment="libguestfs0 is &lt;1.20.4-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208537" version="1" comment="libicu-doc is &lt;4.0-7.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208538" version="1" comment="libicu-x86 is &lt;4.0-7.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209351" version="1" comment="libicu is &lt;4.0-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209352" version="1" comment="libicu-doc is &lt;4.0-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209363" version="1" comment="intel-SINIT is &lt;1-0.81.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208543" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208544" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208545" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208546" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.20-51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208547" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.20-51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208548" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.20-51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208549" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.20-51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208550" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.20-51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208551" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.20-51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208552" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr8.0-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208553" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr8.0-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208554" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr8.0-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208555" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr8.0-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208556" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr9.30-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208557" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr9.30-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208558" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr9.30-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208559" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr9.30-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249923" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.10-65.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249924" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.10-65.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249925" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.10-65.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009249926" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.10-65.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254109" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.45-65.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254110" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.45-65.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254111" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.45-65.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254112" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.45-65.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208587" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.55" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208588" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.55" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208589" version="1" comment="kernel-default-man is &lt;3.0.101-0.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208590" version="1" comment="kernel-ec2 is &lt;3.0.101-0.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208591" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208592" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208593" version="1" comment="kernel-ppc64 is &lt;3.0.101-0.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208594" version="1" comment="kernel-ppc64-base is &lt;3.0.101-0.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208595" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-0.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208596" version="1" comment="kernel-trace is &lt;3.0.101-0.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208597" version="1" comment="kernel-trace-base is &lt;3.0.101-0.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208598" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.86" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208599" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.86" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208600" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.86" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208601" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.86" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208602" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.93" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208603" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.93" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208604" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.93" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208605" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.93" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208606" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.99" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208607" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.99" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208608" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.99" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208609" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.99" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208610" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.102" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208611" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.102" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208612" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.102" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208613" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.102" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208614" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.105" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208615" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.105" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208616" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.105" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208617" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.105" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208618" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.106.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208619" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.106.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208620" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.106.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208621" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.106.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235558" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.106.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235559" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.106.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235560" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.106.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235561" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.106.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208622" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.67" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208623" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.67" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208624" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.67" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208625" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.67" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208626" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.67" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208627" version="1" comment="kernel-ppc64 is &lt;3.0.101-0.47.67" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208628" version="1" comment="kernel-ppc64-base is &lt;3.0.101-0.47.67" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208629" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-0.47.67" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208630" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.67" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208631" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.79" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208632" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.79" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208633" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.79" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208634" version="1" comment="kernel-default is &lt;3.0.101-0.47.79" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208635" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.79" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208636" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.79" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208637" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.79" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208638" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.79" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208639" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.79" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208640" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.79" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208641" version="1" comment="kernel-pae is &lt;3.0.101-0.47.79" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208642" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.79" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208643" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.79" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208644" version="1" comment="kernel-source is &lt;3.0.101-0.47.79" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208645" version="1" comment="kernel-syms is &lt;3.0.101-0.47.79" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208646" version="1" comment="kernel-trace is &lt;3.0.101-0.47.79" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208647" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.79" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208648" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.79" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208649" version="1" comment="kernel-xen is &lt;3.0.101-0.47.79" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208650" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.79" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208651" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.79" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208652" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.106.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208653" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.106.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208654" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.106.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208655" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.106.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208656" version="1" comment="kernel-default is &lt;3.0.101-0.47.106.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208657" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.106.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208658" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.106.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208659" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.106.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208660" version="1" comment="kernel-source is &lt;3.0.101-0.47.106.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208661" version="1" comment="kernel-syms is &lt;3.0.101-0.47.106.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208662" version="1" comment="kernel-trace is &lt;3.0.101-0.47.106.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208663" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.106.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208664" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.106.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208665" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.106.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208666" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.106.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208667" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.106.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208668" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.106.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208669" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.106.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208670" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.106.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208671" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.106.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208672" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.106.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232611" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.106.43" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232612" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.106.43" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232613" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.106.43" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232614" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.106.43" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243428" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.106.59" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243429" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.106.59" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243430" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.106.59" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243431" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.106.59" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208673" version="1" comment="iscsitarget-kmp-bigsmp is &lt;1.4.20_3.0.101_0.40-0.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208674" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208675" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208676" version="1" comment="ofed-kmp-bigsmp is &lt;1.5.4.1_3.0.101_0.40-0.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208677" version="1" comment="oracleasm-kmp-bigsmp is &lt;2.0.5_3.0.101_0.40-7.39" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229617" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.106.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229618" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.106.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229619" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.106.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229620" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.106.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208678" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208679" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208680" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208681" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208682" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208683" version="1" comment="kernel-ppc64 is &lt;3.0.101-0.47.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208684" version="1" comment="kernel-ppc64-base is &lt;3.0.101-0.47.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208685" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-0.47.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208686" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208687" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208688" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208689" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208690" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208691" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.106.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208692" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.106.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208693" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.106.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208694" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.106.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238589" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.106.56" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238590" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.106.56" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238591" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.106.56" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238592" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.106.56" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208695" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.106.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208696" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.106.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208697" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.106.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208698" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.106.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208699" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208700" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208704" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208711" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208714" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208720" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208727" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208728" version="1" comment="kvm is &lt;1.4.2-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250394" version="1" comment="kvm is &lt;1.4.2-49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250395" version="1" comment="kvm is &lt;1.4.2-52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250396" version="1" comment="kvm is &lt;1.4.2-53.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262607" version="1" comment="kvm is &lt;1.4.2-53.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208729" version="1" comment="libvirt-lock-sanlock is &lt;1.0.5.9-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208730" version="1" comment="libqt4-qt3support-x86 is &lt;4.6.3-5.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208731" version="1" comment="libqt4-sql-x86 is &lt;4.6.3-5.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208732" version="1" comment="libqt4-x11-x86 is &lt;4.6.3-5.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208733" version="1" comment="libqt4-x86 is &lt;4.6.3-5.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208734" version="1" comment="qt4-x11-tools is &lt;4.6.3-5.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209892" version="1" comment="libapr-util1-dbd-sqlite3 is &lt;1.3.4-12.22.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209894" version="1" comment="libcap-ng-utils is &lt;0.6.3-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209895" version="1" comment="libcap-ng0 is &lt;0.6.3-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209896" version="1" comment="libcap-ng0-32bit is &lt;0.6.3-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208735" version="1" comment="postgresql91-contrib is &lt;9.1.12-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208736" version="1" comment="postgresql91-server is &lt;9.1.12-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208737" version="1" comment="libfreebl3-x86 is &lt;3.16.5-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208738" version="1" comment="libsoftokn3-x86 is &lt;3.16.5-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208739" version="1" comment="mozilla-nss-x86 is &lt;3.16.5-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208740" version="1" comment="libgcrypt11-x86 is &lt;1.5.0-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209905" version="1" comment="libgcrypt11 is &lt;1.5.0-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209906" version="1" comment="libgcrypt11-32bit is &lt;1.5.0-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209908" version="1" comment="libgcrypt11 is &lt;1.5.0-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209909" version="1" comment="libgcrypt11-32bit is &lt;1.5.0-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265199" version="1" comment="libgcrypt is &lt;1.5.0-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265200" version="1" comment="libgcrypt11 is &lt;1.5.0-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265201" version="1" comment="libgcrypt11-32bit is &lt;1.5.0-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209911" version="1" comment="libical0 is &lt;0.43-1.10.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208741" version="1" comment="libjasper-x86 is &lt;1.900.1-134.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208742" version="1" comment="libmysql55client18-x86 is &lt;5.5.39-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208743" version="1" comment="mysql-tools is &lt;5.5.39-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208744" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208745" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208746" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208747" version="1" comment="openssl-doc is &lt;0.9.8j-0.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208748" version="1" comment="libpng12-0-x86 is &lt;1.2.31-5.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208749" version="1" comment="libpng12-0-x86 is &lt;1.2.31-5.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208750" version="1" comment="libpulse0-x86 is &lt;0.9.23-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208751" version="1" comment="libqt4-qt3support-x86 is &lt;4.6.3-5.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208752" version="1" comment="libqt4-sql-x86 is &lt;4.6.3-5.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208753" version="1" comment="libqt4-x11-x86 is &lt;4.6.3-5.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208754" version="1" comment="libqt4-x86 is &lt;4.6.3-5.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208755" version="1" comment="qt4-x11-tools is &lt;4.6.3-5.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208756" version="1" comment="librsvg-x86 is &lt;2.26.0-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208757" version="1" comment="libsndfile-x86 is &lt;1.0.20-2.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208758" version="1" comment="libtasn1-3-x86 is &lt;1.5-1.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208759" version="1" comment="libvirt-lock-sanlock is &lt;1.0.5.9-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208760" version="1" comment="libvirt-client-32bit is &lt;1.0.5.9-21.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208761" version="1" comment="libvirt-client-32bit is &lt;1.0.5.9-21.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253955" version="1" comment="libvirt is &lt;1.0.5.9-21.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253956" version="1" comment="libvirt-client is &lt;1.0.5.9-21.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253957" version="1" comment="libvirt-client-32bit is &lt;1.0.5.9-21.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253958" version="1" comment="libvirt-doc is &lt;1.0.5.9-21.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253959" version="1" comment="libvirt-lock-sanlock is &lt;1.0.5.9-21.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253960" version="1" comment="libvirt-python is &lt;1.0.5.9-21.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255833" version="1" comment="libvirt is &lt;1.0.5.9-21.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255834" version="1" comment="libvirt-client is &lt;1.0.5.9-21.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255835" version="1" comment="libvirt-client-32bit is &lt;1.0.5.9-21.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255836" version="1" comment="libvirt-doc is &lt;1.0.5.9-21.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255837" version="1" comment="libvirt-lock-sanlock is &lt;1.0.5.9-21.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009255838" version="1" comment="libvirt-python is &lt;1.0.5.9-21.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258011" version="1" comment="libvirt-client-32bit is &lt;1.0.5.9-21.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261379" version="1" comment="libvirt is &lt;1.0.5.9-21.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261380" version="1" comment="libvirt-client is &lt;1.0.5.9-21.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261381" version="1" comment="libvirt-client-32bit is &lt;1.0.5.9-21.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261382" version="1" comment="libvirt-doc is &lt;1.0.5.9-21.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261383" version="1" comment="libvirt-lock-sanlock is &lt;1.0.5.9-21.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261384" version="1" comment="libvirt-python is &lt;1.0.5.9-21.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208764" version="1" comment="libxml2-x86 is &lt;2.7.6-0.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208766" version="1" comment="libxml2-x86 is &lt;2.7.6-0.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208767" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.96" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208768" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.96" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208769" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.96" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208770" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.96" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208771" version="1" comment="libfreebl3-32bit is &lt;3.21.3-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208772" version="1" comment="libsoftokn3-32bit is &lt;3.21.3-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208773" version="1" comment="mozilla-nss-32bit is &lt;3.21.3-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229377" version="1" comment="microcode_ctl is &lt;1.17-102.83.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208774" version="1" comment="libfreebl3-x86 is &lt;3.20.2-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208775" version="1" comment="libsoftokn3-x86 is &lt;3.20.2-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208776" version="1" comment="mozilla-nss-x86 is &lt;3.20.2-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208777" version="1" comment="mozilla-nspr-x86 is &lt;4.10.8-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208778" version="1" comment="libfreebl3-x86 is &lt;3.19.2.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208779" version="1" comment="libsoftokn3-x86 is &lt;3.19.2.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208780" version="1" comment="mozilla-nss-x86 is &lt;3.19.2.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208781" version="1" comment="libfreebl3-x86 is &lt;3.15.2-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208782" version="1" comment="libsoftokn3-x86 is &lt;3.15.2-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208783" version="1" comment="mozilla-nss-x86 is &lt;3.15.2-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208784" version="1" comment="libmysql55client18-x86 is &lt;5.5.45-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208785" version="1" comment="mysql-tools is &lt;5.5.45-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208786" version="1" comment="libmysql55client18-x86 is &lt;5.5.46-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208787" version="1" comment="mysql-tools is &lt;5.5.46-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208788" version="1" comment="libmysql55client18-x86 is &lt;5.5.47-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208789" version="1" comment="mysql-tools is &lt;5.5.47-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210043" version="1" comment="libmysql55client18 is &lt;5.5.49-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210044" version="1" comment="libmysql55client18-32bit is &lt;5.5.49-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210046" version="1" comment="libmysql55client_r18 is &lt;5.5.49-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210047" version="1" comment="mysql-client is &lt;5.5.49-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210048" version="1" comment="mysql-tools is &lt;5.5.49-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208790" version="1" comment="libmysql55client18-32bit is &lt;5.5.52-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210054" version="1" comment="libmysql55client18 is &lt;5.5.53-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210055" version="1" comment="libmysql55client18-32bit is &lt;5.5.53-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210057" version="1" comment="libmysql55client_r18 is &lt;5.5.53-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210058" version="1" comment="mysql-client is &lt;5.5.53-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210059" version="1" comment="mysql-tools is &lt;5.5.53-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208791" version="1" comment="libmysql55client18-32bit is &lt;5.5.54-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210061" version="1" comment="libmysql55client18 is &lt;5.5.55-0.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210062" version="1" comment="libmysql55client18-32bit is &lt;5.5.55-0.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210064" version="1" comment="libmysql55client_r18 is &lt;5.5.55-0.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210065" version="1" comment="mysql-client is &lt;5.5.55-0.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210066" version="1" comment="mysql-tools is &lt;5.5.55-0.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210067" version="1" comment="libmysql55client18 is &lt;5.5.57-0.39.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210068" version="1" comment="libmysql55client18-32bit is &lt;5.5.57-0.39.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210070" version="1" comment="libmysql55client_r18 is &lt;5.5.57-0.39.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210071" version="1" comment="mysql-client is &lt;5.5.57-0.39.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210072" version="1" comment="mysql-tools is &lt;5.5.57-0.39.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208792" version="1" comment="libmysql55client18-32bit is &lt;5.5.58-0.39.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210074" version="1" comment="libmysql55client18 is &lt;5.5.59-0.39.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210075" version="1" comment="libmysql55client18-32bit is &lt;5.5.59-0.39.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210077" version="1" comment="libmysql55client_r18 is &lt;5.5.59-0.39.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210078" version="1" comment="mysql-client is &lt;5.5.59-0.39.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210079" version="1" comment="mysql-tools is &lt;5.5.59-0.39.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210080" version="1" comment="libmysql55client18 is &lt;5.5.60-0.39.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210081" version="1" comment="libmysql55client18-32bit is &lt;5.5.60-0.39.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210083" version="1" comment="libmysql55client_r18 is &lt;5.5.60-0.39.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210084" version="1" comment="mysql-client is &lt;5.5.60-0.39.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210085" version="1" comment="mysql-tools is &lt;5.5.60-0.39.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232740" version="1" comment="libmysql55client18 is &lt;5.5.61-0.39.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232741" version="1" comment="libmysql55client18-32bit is &lt;5.5.61-0.39.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232743" version="1" comment="libmysql55client_r18 is &lt;5.5.61-0.39.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232744" version="1" comment="mysql-client is &lt;5.5.61-0.39.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232745" version="1" comment="mysql-tools is &lt;5.5.61-0.39.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238399" version="1" comment="libmysql55client18-32bit is &lt;5.5.62-0.39.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208793" version="1" comment="libsnmp15-x86 is &lt;5.4.2.1-8.12.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208794" version="1" comment="libfreebl3-x86 is &lt;3.15.3-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208795" version="1" comment="libsoftokn3-x86 is &lt;3.15.3-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208796" version="1" comment="mozilla-nss-x86 is &lt;3.15.3-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208797" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208798" version="1" comment="libldap-2_4-2-x86 is &lt;2.4.26-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208799" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208800" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208801" version="1" comment="libldap-2_4-2-x86 is &lt;2.4.26-0.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208802" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250397" version="1" comment="openssh is &lt;6.6p1-41.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250398" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-41.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250399" version="1" comment="openssh-openssl1 is &lt;6.6p1-41.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250400" version="1" comment="openssh-openssl1-helpers is &lt;6.6p1-41.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250401" version="1" comment="openssh-openssl1 is &lt;6.6p1-41.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250402" version="1" comment="openssh-openssl1-helpers is &lt;6.6p1-41.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208803" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208805" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210156" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231343" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233301" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242435" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257212" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264923" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208806" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208807" version="1" comment="pam-x86 is &lt;1.1.5-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253961" version="1" comment="pam is &lt;1.1.5-0.12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253962" version="1" comment="pam-32bit is &lt;1.1.5-0.12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253963" version="1" comment="pam-doc is &lt;1.1.5-0.12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208808" version="1" comment="perl-x86 is &lt;5.10.0-64.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210162" version="1" comment="perl-32bit is &lt;5.10.0-64.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210163" version="1" comment="perl-Module-Build is &lt;0.2808.01-0.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210164" version="1" comment="perl-Test-Simple is &lt;0.72-0.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210165" version="1" comment="perl-base is &lt;5.10.0-64.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210166" version="1" comment="perl-doc is &lt;5.10.0-64.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210168" version="1" comment="perl-32bit is &lt;5.10.0-64.81.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210169" version="1" comment="perl-Module-Build is &lt;0.2808.01-0.81.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210170" version="1" comment="perl-Test-Simple is &lt;0.72-0.81.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210171" version="1" comment="perl-base is &lt;5.10.0-64.81.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210172" version="1" comment="perl-doc is &lt;5.10.0-64.81.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210174" version="1" comment="perl-32bit is &lt;5.10.0-64.81.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210175" version="1" comment="perl-Module-Build is &lt;0.2808.01-0.81.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210176" version="1" comment="perl-Test-Simple is &lt;0.72-0.81.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210177" version="1" comment="perl-base is &lt;5.10.0-64.81.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210178" version="1" comment="perl-doc is &lt;5.10.0-64.81.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230379" version="1" comment="perl-32bit is &lt;5.10.0-64.81.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208809" version="1" comment="apache2-mod_php53 is &lt;5.3.17-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208810" version="1" comment="php53-bcmath is &lt;5.3.17-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208811" version="1" comment="php53-bz2 is &lt;5.3.17-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208812" version="1" comment="php53-calendar is &lt;5.3.17-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208813" version="1" comment="php53-ctype is &lt;5.3.17-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208814" version="1" comment="php53-curl is &lt;5.3.17-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208815" version="1" comment="php53-dba is &lt;5.3.17-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208816" version="1" comment="php53-dom is &lt;5.3.17-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208817" version="1" comment="php53-exif is &lt;5.3.17-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208818" version="1" comment="php53-fastcgi is &lt;5.3.17-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208819" version="1" comment="php53-fileinfo is &lt;5.3.17-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208820" version="1" comment="php53-ftp is &lt;5.3.17-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208821" version="1" comment="php53-gd is &lt;5.3.17-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208822" version="1" comment="php53-gettext is &lt;5.3.17-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208823" version="1" comment="php53-gmp is &lt;5.3.17-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208824" version="1" comment="php53-iconv is &lt;5.3.17-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208825" version="1" comment="php53-intl is &lt;5.3.17-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208826" version="1" comment="php53-json is &lt;5.3.17-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208827" version="1" comment="php53-ldap is &lt;5.3.17-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208828" version="1" comment="php53-mbstring is &lt;5.3.17-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208829" version="1" comment="php53-mcrypt is &lt;5.3.17-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208830" version="1" comment="php53-mysql is &lt;5.3.17-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208831" version="1" comment="php53-odbc is &lt;5.3.17-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208832" version="1" comment="php53-openssl is &lt;5.3.17-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208833" version="1" comment="php53-pcntl is &lt;5.3.17-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208834" version="1" comment="php53-pdo is &lt;5.3.17-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208835" version="1" comment="php53-pear is &lt;5.3.17-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208836" version="1" comment="php53-pgsql is &lt;5.3.17-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208837" version="1" comment="php53-pspell is &lt;5.3.17-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208838" version="1" comment="php53-shmop is &lt;5.3.17-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208839" version="1" comment="php53-snmp is &lt;5.3.17-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208840" version="1" comment="php53-soap is &lt;5.3.17-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208841" version="1" comment="php53-suhosin is &lt;5.3.17-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208842" version="1" comment="php53-sysvmsg is &lt;5.3.17-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208843" version="1" comment="php53-sysvsem is &lt;5.3.17-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208844" version="1" comment="php53-sysvshm is &lt;5.3.17-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208845" version="1" comment="php53-tokenizer is &lt;5.3.17-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208846" version="1" comment="php53-wddx is &lt;5.3.17-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208847" version="1" comment="php53-xmlreader is &lt;5.3.17-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208848" version="1" comment="php53-xmlrpc is &lt;5.3.17-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208849" version="1" comment="php53-xmlwriter is &lt;5.3.17-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208850" version="1" comment="php53-xsl is &lt;5.3.17-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208851" version="1" comment="php53-zip is &lt;5.3.17-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208852" version="1" comment="php53-zlib is &lt;5.3.17-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208853" version="1" comment="apache2-mod_php53 is &lt;5.3.17-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208854" version="1" comment="php53-bcmath is &lt;5.3.17-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208855" version="1" comment="php53-bz2 is &lt;5.3.17-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208856" version="1" comment="php53-calendar is &lt;5.3.17-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208857" version="1" comment="php53-ctype is &lt;5.3.17-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208858" version="1" comment="php53-curl is &lt;5.3.17-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208859" version="1" comment="php53-dba is &lt;5.3.17-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208860" version="1" comment="php53-dom is &lt;5.3.17-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208861" version="1" comment="php53-exif is &lt;5.3.17-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208862" version="1" comment="php53-fastcgi is &lt;5.3.17-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208863" version="1" comment="php53-fileinfo is &lt;5.3.17-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208864" version="1" comment="php53-ftp is &lt;5.3.17-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208865" version="1" comment="php53-gd is &lt;5.3.17-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208866" version="1" comment="php53-gettext is &lt;5.3.17-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208867" version="1" comment="php53-gmp is &lt;5.3.17-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208868" version="1" comment="php53-iconv is &lt;5.3.17-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208869" version="1" comment="php53-intl is &lt;5.3.17-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208870" version="1" comment="php53-json is &lt;5.3.17-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208871" version="1" comment="php53-ldap is &lt;5.3.17-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208872" version="1" comment="php53-mbstring is &lt;5.3.17-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208873" version="1" comment="php53-mcrypt is &lt;5.3.17-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208874" version="1" comment="php53-mysql is &lt;5.3.17-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208875" version="1" comment="php53-odbc is &lt;5.3.17-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208876" version="1" comment="php53-openssl is &lt;5.3.17-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208877" version="1" comment="php53-pcntl is &lt;5.3.17-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208878" version="1" comment="php53-pdo is &lt;5.3.17-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208879" version="1" comment="php53-pear is &lt;5.3.17-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208880" version="1" comment="php53-pgsql is &lt;5.3.17-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208881" version="1" comment="php53-pspell is &lt;5.3.17-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208882" version="1" comment="php53-shmop is &lt;5.3.17-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208883" version="1" comment="php53-snmp is &lt;5.3.17-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208884" version="1" comment="php53-soap is &lt;5.3.17-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208885" version="1" comment="php53-suhosin is &lt;5.3.17-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208886" version="1" comment="php53-sysvmsg is &lt;5.3.17-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208887" version="1" comment="php53-sysvsem is &lt;5.3.17-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208888" version="1" comment="php53-sysvshm is &lt;5.3.17-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208889" version="1" comment="php53-tokenizer is &lt;5.3.17-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208890" version="1" comment="php53-wddx is &lt;5.3.17-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208891" version="1" comment="php53-xmlreader is &lt;5.3.17-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208892" version="1" comment="php53-xmlrpc is &lt;5.3.17-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208893" version="1" comment="php53-xmlwriter is &lt;5.3.17-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208894" version="1" comment="php53-xsl is &lt;5.3.17-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208895" version="1" comment="php53-zip is &lt;5.3.17-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208896" version="1" comment="php53-zlib is &lt;5.3.17-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210180" version="1" comment="apache2-mod_php53 is &lt;5.3.17-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210181" version="1" comment="php53-bcmath is &lt;5.3.17-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210182" version="1" comment="php53-bz2 is &lt;5.3.17-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210183" version="1" comment="php53-calendar is &lt;5.3.17-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210184" version="1" comment="php53-ctype is &lt;5.3.17-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210185" version="1" comment="php53-curl is &lt;5.3.17-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210186" version="1" comment="php53-dba is &lt;5.3.17-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210187" version="1" comment="php53-dom is &lt;5.3.17-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210188" version="1" comment="php53-exif is &lt;5.3.17-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210189" version="1" comment="php53-fastcgi is &lt;5.3.17-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210190" version="1" comment="php53-fileinfo is &lt;5.3.17-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210191" version="1" comment="php53-ftp is &lt;5.3.17-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210192" version="1" comment="php53-gd is &lt;5.3.17-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210193" version="1" comment="php53-gettext is &lt;5.3.17-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210194" version="1" comment="php53-gmp is &lt;5.3.17-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210195" version="1" comment="php53-iconv is &lt;5.3.17-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210196" version="1" comment="php53-intl is &lt;5.3.17-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210197" version="1" comment="php53-json is &lt;5.3.17-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210198" version="1" comment="php53-ldap is &lt;5.3.17-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210199" version="1" comment="php53-mbstring is &lt;5.3.17-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210200" version="1" comment="php53-mcrypt is &lt;5.3.17-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210201" version="1" comment="php53-mysql is &lt;5.3.17-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210202" version="1" comment="php53-odbc is &lt;5.3.17-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210203" version="1" comment="php53-openssl is &lt;5.3.17-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210204" version="1" comment="php53-pcntl is &lt;5.3.17-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210205" version="1" comment="php53-pdo is &lt;5.3.17-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210206" version="1" comment="php53-pear is &lt;5.3.17-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210207" version="1" comment="php53-pgsql is &lt;5.3.17-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210208" version="1" comment="php53-pspell is &lt;5.3.17-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210209" version="1" comment="php53-shmop is &lt;5.3.17-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210210" version="1" comment="php53-snmp is &lt;5.3.17-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210211" version="1" comment="php53-soap is &lt;5.3.17-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210212" version="1" comment="php53-suhosin is &lt;5.3.17-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210213" version="1" comment="php53-sysvmsg is &lt;5.3.17-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210214" version="1" comment="php53-sysvsem is &lt;5.3.17-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210215" version="1" comment="php53-sysvshm is &lt;5.3.17-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210216" version="1" comment="php53-tokenizer is &lt;5.3.17-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210217" version="1" comment="php53-wddx is &lt;5.3.17-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210218" version="1" comment="php53-xmlreader is &lt;5.3.17-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210219" version="1" comment="php53-xmlrpc is &lt;5.3.17-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210220" version="1" comment="php53-xmlwriter is &lt;5.3.17-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210221" version="1" comment="php53-xsl is &lt;5.3.17-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210222" version="1" comment="php53-zip is &lt;5.3.17-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210223" version="1" comment="php53-zlib is &lt;5.3.17-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210224" version="1" comment="apache2-mod_php53 is &lt;5.3.17-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210225" version="1" comment="php53-bcmath is &lt;5.3.17-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210226" version="1" comment="php53-bz2 is &lt;5.3.17-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210227" version="1" comment="php53-calendar is &lt;5.3.17-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210228" version="1" comment="php53-ctype is &lt;5.3.17-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210229" version="1" comment="php53-curl is &lt;5.3.17-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210230" version="1" comment="php53-dba is &lt;5.3.17-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210231" version="1" comment="php53-dom is &lt;5.3.17-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210232" version="1" comment="php53-exif is &lt;5.3.17-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210233" version="1" comment="php53-fastcgi is &lt;5.3.17-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210234" version="1" comment="php53-fileinfo is &lt;5.3.17-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210235" version="1" comment="php53-ftp is &lt;5.3.17-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210236" version="1" comment="php53-gd is &lt;5.3.17-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210237" version="1" comment="php53-gettext is &lt;5.3.17-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210238" version="1" comment="php53-gmp is &lt;5.3.17-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210239" version="1" comment="php53-iconv is &lt;5.3.17-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210240" version="1" comment="php53-intl is &lt;5.3.17-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210241" version="1" comment="php53-json is &lt;5.3.17-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210242" version="1" comment="php53-ldap is &lt;5.3.17-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210243" version="1" comment="php53-mbstring is &lt;5.3.17-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210244" version="1" comment="php53-mcrypt is &lt;5.3.17-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210245" version="1" comment="php53-mysql is &lt;5.3.17-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210246" version="1" comment="php53-odbc is &lt;5.3.17-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210247" version="1" comment="php53-openssl is &lt;5.3.17-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210248" version="1" comment="php53-pcntl is &lt;5.3.17-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210249" version="1" comment="php53-pdo is &lt;5.3.17-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210250" version="1" comment="php53-pear is &lt;5.3.17-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210251" version="1" comment="php53-pgsql is &lt;5.3.17-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210252" version="1" comment="php53-pspell is &lt;5.3.17-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210253" version="1" comment="php53-shmop is &lt;5.3.17-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210254" version="1" comment="php53-snmp is &lt;5.3.17-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210255" version="1" comment="php53-soap is &lt;5.3.17-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210256" version="1" comment="php53-suhosin is &lt;5.3.17-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210257" version="1" comment="php53-sysvmsg is &lt;5.3.17-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210258" version="1" comment="php53-sysvsem is &lt;5.3.17-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210259" version="1" comment="php53-sysvshm is &lt;5.3.17-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210260" version="1" comment="php53-tokenizer is &lt;5.3.17-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210261" version="1" comment="php53-wddx is &lt;5.3.17-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210262" version="1" comment="php53-xmlreader is &lt;5.3.17-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210263" version="1" comment="php53-xmlrpc is &lt;5.3.17-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210264" version="1" comment="php53-xmlwriter is &lt;5.3.17-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210265" version="1" comment="php53-xsl is &lt;5.3.17-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210266" version="1" comment="php53-zip is &lt;5.3.17-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210267" version="1" comment="php53-zlib is &lt;5.3.17-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208897" version="1" comment="apache2-mod_php53 is &lt;5.3.17-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208898" version="1" comment="php53-bcmath is &lt;5.3.17-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208899" version="1" comment="php53-bz2 is &lt;5.3.17-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208900" version="1" comment="php53-calendar is &lt;5.3.17-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208901" version="1" comment="php53-ctype is &lt;5.3.17-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208902" version="1" comment="php53-curl is &lt;5.3.17-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208903" version="1" comment="php53-dba is &lt;5.3.17-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208904" version="1" comment="php53-dom is &lt;5.3.17-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208905" version="1" comment="php53-exif is &lt;5.3.17-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208906" version="1" comment="php53-fastcgi is &lt;5.3.17-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208907" version="1" comment="php53-fileinfo is &lt;5.3.17-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208908" version="1" comment="php53-ftp is &lt;5.3.17-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208909" version="1" comment="php53-gd is &lt;5.3.17-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208910" version="1" comment="php53-gettext is &lt;5.3.17-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208911" version="1" comment="php53-gmp is &lt;5.3.17-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208912" version="1" comment="php53-iconv is &lt;5.3.17-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208913" version="1" comment="php53-intl is &lt;5.3.17-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208914" version="1" comment="php53-json is &lt;5.3.17-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208915" version="1" comment="php53-ldap is &lt;5.3.17-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208916" version="1" comment="php53-mbstring is &lt;5.3.17-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208917" version="1" comment="php53-mcrypt is &lt;5.3.17-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208918" version="1" comment="php53-mysql is &lt;5.3.17-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208919" version="1" comment="php53-odbc is &lt;5.3.17-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208920" version="1" comment="php53-openssl is &lt;5.3.17-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208921" version="1" comment="php53-pcntl is &lt;5.3.17-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208922" version="1" comment="php53-pdo is &lt;5.3.17-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208923" version="1" comment="php53-pear is &lt;5.3.17-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208924" version="1" comment="php53-pgsql is &lt;5.3.17-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208925" version="1" comment="php53-pspell is &lt;5.3.17-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208926" version="1" comment="php53-shmop is &lt;5.3.17-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208927" version="1" comment="php53-snmp is &lt;5.3.17-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208928" version="1" comment="php53-soap is &lt;5.3.17-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208929" version="1" comment="php53-suhosin is &lt;5.3.17-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208930" version="1" comment="php53-sysvmsg is &lt;5.3.17-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208931" version="1" comment="php53-sysvsem is &lt;5.3.17-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208932" version="1" comment="php53-sysvshm is &lt;5.3.17-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208933" version="1" comment="php53-tokenizer is &lt;5.3.17-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208934" version="1" comment="php53-wddx is &lt;5.3.17-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208935" version="1" comment="php53-xmlreader is &lt;5.3.17-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208936" version="1" comment="php53-xmlrpc is &lt;5.3.17-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208937" version="1" comment="php53-xmlwriter is &lt;5.3.17-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208938" version="1" comment="php53-xsl is &lt;5.3.17-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208939" version="1" comment="php53-zip is &lt;5.3.17-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208940" version="1" comment="php53-zlib is &lt;5.3.17-71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210268" version="1" comment="apache2-mod_php53 is &lt;5.3.17-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210269" version="1" comment="php53-bcmath is &lt;5.3.17-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210270" version="1" comment="php53-bz2 is &lt;5.3.17-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210271" version="1" comment="php53-calendar is &lt;5.3.17-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210272" version="1" comment="php53-ctype is &lt;5.3.17-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210273" version="1" comment="php53-curl is &lt;5.3.17-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210274" version="1" comment="php53-dba is &lt;5.3.17-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210275" version="1" comment="php53-dom is &lt;5.3.17-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210276" version="1" comment="php53-exif is &lt;5.3.17-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210277" version="1" comment="php53-fastcgi is &lt;5.3.17-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210278" version="1" comment="php53-fileinfo is &lt;5.3.17-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210279" version="1" comment="php53-ftp is &lt;5.3.17-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210280" version="1" comment="php53-gd is &lt;5.3.17-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210281" version="1" comment="php53-gettext is &lt;5.3.17-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210282" version="1" comment="php53-gmp is &lt;5.3.17-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210283" version="1" comment="php53-iconv is &lt;5.3.17-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210284" version="1" comment="php53-intl is &lt;5.3.17-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210285" version="1" comment="php53-json is &lt;5.3.17-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210286" version="1" comment="php53-ldap is &lt;5.3.17-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210287" version="1" comment="php53-mbstring is &lt;5.3.17-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210288" version="1" comment="php53-mcrypt is &lt;5.3.17-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210289" version="1" comment="php53-mysql is &lt;5.3.17-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210290" version="1" comment="php53-odbc is &lt;5.3.17-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210291" version="1" comment="php53-openssl is &lt;5.3.17-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210292" version="1" comment="php53-pcntl is &lt;5.3.17-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210293" version="1" comment="php53-pdo is &lt;5.3.17-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210294" version="1" comment="php53-pear is &lt;5.3.17-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210295" version="1" comment="php53-pgsql is &lt;5.3.17-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210296" version="1" comment="php53-pspell is &lt;5.3.17-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210297" version="1" comment="php53-shmop is &lt;5.3.17-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210298" version="1" comment="php53-snmp is &lt;5.3.17-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210299" version="1" comment="php53-soap is &lt;5.3.17-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210300" version="1" comment="php53-suhosin is &lt;5.3.17-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210301" version="1" comment="php53-sysvmsg is &lt;5.3.17-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210302" version="1" comment="php53-sysvsem is &lt;5.3.17-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210303" version="1" comment="php53-sysvshm is &lt;5.3.17-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210304" version="1" comment="php53-tokenizer is &lt;5.3.17-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210305" version="1" comment="php53-wddx is &lt;5.3.17-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210306" version="1" comment="php53-xmlreader is &lt;5.3.17-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210307" version="1" comment="php53-xmlrpc is &lt;5.3.17-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210308" version="1" comment="php53-xmlwriter is &lt;5.3.17-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210309" version="1" comment="php53-xsl is &lt;5.3.17-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210310" version="1" comment="php53-zip is &lt;5.3.17-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210311" version="1" comment="php53-zlib is &lt;5.3.17-74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210312" version="1" comment="apache2-mod_php53 is &lt;5.3.17-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210313" version="1" comment="php53-bcmath is &lt;5.3.17-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210314" version="1" comment="php53-bz2 is &lt;5.3.17-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210315" version="1" comment="php53-calendar is &lt;5.3.17-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210316" version="1" comment="php53-ctype is &lt;5.3.17-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210317" version="1" comment="php53-curl is &lt;5.3.17-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210318" version="1" comment="php53-dba is &lt;5.3.17-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210319" version="1" comment="php53-dom is &lt;5.3.17-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210320" version="1" comment="php53-exif is &lt;5.3.17-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210321" version="1" comment="php53-fastcgi is &lt;5.3.17-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210322" version="1" comment="php53-fileinfo is &lt;5.3.17-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210323" version="1" comment="php53-ftp is &lt;5.3.17-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210324" version="1" comment="php53-gd is &lt;5.3.17-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210325" version="1" comment="php53-gettext is &lt;5.3.17-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210326" version="1" comment="php53-gmp is &lt;5.3.17-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210327" version="1" comment="php53-iconv is &lt;5.3.17-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210328" version="1" comment="php53-intl is &lt;5.3.17-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210329" version="1" comment="php53-json is &lt;5.3.17-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210330" version="1" comment="php53-ldap is &lt;5.3.17-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210331" version="1" comment="php53-mbstring is &lt;5.3.17-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210332" version="1" comment="php53-mcrypt is &lt;5.3.17-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210333" version="1" comment="php53-mysql is &lt;5.3.17-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210334" version="1" comment="php53-odbc is &lt;5.3.17-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210335" version="1" comment="php53-openssl is &lt;5.3.17-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210336" version="1" comment="php53-pcntl is &lt;5.3.17-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210337" version="1" comment="php53-pdo is &lt;5.3.17-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210338" version="1" comment="php53-pear is &lt;5.3.17-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210339" version="1" comment="php53-pgsql is &lt;5.3.17-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210340" version="1" comment="php53-pspell is &lt;5.3.17-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210341" version="1" comment="php53-shmop is &lt;5.3.17-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210342" version="1" comment="php53-snmp is &lt;5.3.17-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210343" version="1" comment="php53-soap is &lt;5.3.17-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210344" version="1" comment="php53-suhosin is &lt;5.3.17-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210345" version="1" comment="php53-sysvmsg is &lt;5.3.17-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210346" version="1" comment="php53-sysvsem is &lt;5.3.17-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210347" version="1" comment="php53-sysvshm is &lt;5.3.17-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210348" version="1" comment="php53-tokenizer is &lt;5.3.17-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210349" version="1" comment="php53-wddx is &lt;5.3.17-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210350" version="1" comment="php53-xmlreader is &lt;5.3.17-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210351" version="1" comment="php53-xmlrpc is &lt;5.3.17-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210352" version="1" comment="php53-xmlwriter is &lt;5.3.17-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210353" version="1" comment="php53-xsl is &lt;5.3.17-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210354" version="1" comment="php53-zip is &lt;5.3.17-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210355" version="1" comment="php53-zlib is &lt;5.3.17-79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210356" version="1" comment="apache2-mod_php53 is &lt;5.3.17-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210357" version="1" comment="php53-bcmath is &lt;5.3.17-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210358" version="1" comment="php53-bz2 is &lt;5.3.17-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210359" version="1" comment="php53-calendar is &lt;5.3.17-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210360" version="1" comment="php53-ctype is &lt;5.3.17-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210361" version="1" comment="php53-curl is &lt;5.3.17-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210362" version="1" comment="php53-dba is &lt;5.3.17-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210363" version="1" comment="php53-dom is &lt;5.3.17-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210364" version="1" comment="php53-exif is &lt;5.3.17-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210365" version="1" comment="php53-fastcgi is &lt;5.3.17-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210366" version="1" comment="php53-fileinfo is &lt;5.3.17-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210367" version="1" comment="php53-ftp is &lt;5.3.17-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210368" version="1" comment="php53-gd is &lt;5.3.17-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210369" version="1" comment="php53-gettext is &lt;5.3.17-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210370" version="1" comment="php53-gmp is &lt;5.3.17-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210371" version="1" comment="php53-iconv is &lt;5.3.17-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210372" version="1" comment="php53-intl is &lt;5.3.17-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210373" version="1" comment="php53-json is &lt;5.3.17-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210374" version="1" comment="php53-ldap is &lt;5.3.17-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210375" version="1" comment="php53-mbstring is &lt;5.3.17-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210376" version="1" comment="php53-mcrypt is &lt;5.3.17-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210377" version="1" comment="php53-mysql is &lt;5.3.17-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210378" version="1" comment="php53-odbc is &lt;5.3.17-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210379" version="1" comment="php53-openssl is &lt;5.3.17-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210380" version="1" comment="php53-pcntl is &lt;5.3.17-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210381" version="1" comment="php53-pdo is &lt;5.3.17-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210382" version="1" comment="php53-pear is &lt;5.3.17-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210383" version="1" comment="php53-pgsql is &lt;5.3.17-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210384" version="1" comment="php53-pspell is &lt;5.3.17-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210385" version="1" comment="php53-shmop is &lt;5.3.17-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210386" version="1" comment="php53-snmp is &lt;5.3.17-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210387" version="1" comment="php53-soap is &lt;5.3.17-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210388" version="1" comment="php53-suhosin is &lt;5.3.17-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210389" version="1" comment="php53-sysvmsg is &lt;5.3.17-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210390" version="1" comment="php53-sysvsem is &lt;5.3.17-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210391" version="1" comment="php53-sysvshm is &lt;5.3.17-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210392" version="1" comment="php53-tokenizer is &lt;5.3.17-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210393" version="1" comment="php53-wddx is &lt;5.3.17-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210394" version="1" comment="php53-xmlreader is &lt;5.3.17-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210395" version="1" comment="php53-xmlrpc is &lt;5.3.17-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210396" version="1" comment="php53-xmlwriter is &lt;5.3.17-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210397" version="1" comment="php53-xsl is &lt;5.3.17-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210398" version="1" comment="php53-zip is &lt;5.3.17-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210399" version="1" comment="php53-zlib is &lt;5.3.17-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210400" version="1" comment="apache2-mod_php53 is &lt;5.3.17-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210401" version="1" comment="php53-bcmath is &lt;5.3.17-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210402" version="1" comment="php53-bz2 is &lt;5.3.17-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210403" version="1" comment="php53-calendar is &lt;5.3.17-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210404" version="1" comment="php53-ctype is &lt;5.3.17-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210405" version="1" comment="php53-curl is &lt;5.3.17-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210406" version="1" comment="php53-dba is &lt;5.3.17-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210407" version="1" comment="php53-dom is &lt;5.3.17-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210408" version="1" comment="php53-exif is &lt;5.3.17-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210409" version="1" comment="php53-fastcgi is &lt;5.3.17-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210410" version="1" comment="php53-fileinfo is &lt;5.3.17-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210411" version="1" comment="php53-ftp is &lt;5.3.17-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210412" version="1" comment="php53-gd is &lt;5.3.17-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210413" version="1" comment="php53-gettext is &lt;5.3.17-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210414" version="1" comment="php53-gmp is &lt;5.3.17-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210415" version="1" comment="php53-iconv is &lt;5.3.17-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210416" version="1" comment="php53-intl is &lt;5.3.17-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210417" version="1" comment="php53-json is &lt;5.3.17-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210418" version="1" comment="php53-ldap is &lt;5.3.17-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210419" version="1" comment="php53-mbstring is &lt;5.3.17-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210420" version="1" comment="php53-mcrypt is &lt;5.3.17-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210421" version="1" comment="php53-mysql is &lt;5.3.17-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210422" version="1" comment="php53-odbc is &lt;5.3.17-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210423" version="1" comment="php53-openssl is &lt;5.3.17-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210424" version="1" comment="php53-pcntl is &lt;5.3.17-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210425" version="1" comment="php53-pdo is &lt;5.3.17-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210426" version="1" comment="php53-pear is &lt;5.3.17-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210427" version="1" comment="php53-pgsql is &lt;5.3.17-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210428" version="1" comment="php53-pspell is &lt;5.3.17-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210429" version="1" comment="php53-shmop is &lt;5.3.17-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210430" version="1" comment="php53-snmp is &lt;5.3.17-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210431" version="1" comment="php53-soap is &lt;5.3.17-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210432" version="1" comment="php53-suhosin is &lt;5.3.17-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210433" version="1" comment="php53-sysvmsg is &lt;5.3.17-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210434" version="1" comment="php53-sysvsem is &lt;5.3.17-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210435" version="1" comment="php53-sysvshm is &lt;5.3.17-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210436" version="1" comment="php53-tokenizer is &lt;5.3.17-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210437" version="1" comment="php53-wddx is &lt;5.3.17-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210438" version="1" comment="php53-xmlreader is &lt;5.3.17-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210439" version="1" comment="php53-xmlrpc is &lt;5.3.17-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210440" version="1" comment="php53-xmlwriter is &lt;5.3.17-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210441" version="1" comment="php53-xsl is &lt;5.3.17-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210442" version="1" comment="php53-zip is &lt;5.3.17-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210443" version="1" comment="php53-zlib is &lt;5.3.17-94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210444" version="1" comment="apache2-mod_php53 is &lt;5.3.17-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210445" version="1" comment="php53-bcmath is &lt;5.3.17-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210446" version="1" comment="php53-bz2 is &lt;5.3.17-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210447" version="1" comment="php53-calendar is &lt;5.3.17-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210448" version="1" comment="php53-ctype is &lt;5.3.17-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210449" version="1" comment="php53-curl is &lt;5.3.17-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210450" version="1" comment="php53-dba is &lt;5.3.17-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210451" version="1" comment="php53-dom is &lt;5.3.17-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210452" version="1" comment="php53-exif is &lt;5.3.17-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210453" version="1" comment="php53-fastcgi is &lt;5.3.17-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210454" version="1" comment="php53-fileinfo is &lt;5.3.17-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210455" version="1" comment="php53-ftp is &lt;5.3.17-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210456" version="1" comment="php53-gd is &lt;5.3.17-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210457" version="1" comment="php53-gettext is &lt;5.3.17-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210458" version="1" comment="php53-gmp is &lt;5.3.17-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210459" version="1" comment="php53-iconv is &lt;5.3.17-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210460" version="1" comment="php53-intl is &lt;5.3.17-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210461" version="1" comment="php53-json is &lt;5.3.17-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210462" version="1" comment="php53-ldap is &lt;5.3.17-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210463" version="1" comment="php53-mbstring is &lt;5.3.17-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210464" version="1" comment="php53-mcrypt is &lt;5.3.17-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210465" version="1" comment="php53-mysql is &lt;5.3.17-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210466" version="1" comment="php53-odbc is &lt;5.3.17-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210467" version="1" comment="php53-openssl is &lt;5.3.17-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210468" version="1" comment="php53-pcntl is &lt;5.3.17-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210469" version="1" comment="php53-pdo is &lt;5.3.17-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210470" version="1" comment="php53-pear is &lt;5.3.17-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210471" version="1" comment="php53-pgsql is &lt;5.3.17-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210472" version="1" comment="php53-pspell is &lt;5.3.17-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210473" version="1" comment="php53-shmop is &lt;5.3.17-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210474" version="1" comment="php53-snmp is &lt;5.3.17-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210475" version="1" comment="php53-soap is &lt;5.3.17-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210476" version="1" comment="php53-suhosin is &lt;5.3.17-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210477" version="1" comment="php53-sysvmsg is &lt;5.3.17-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210478" version="1" comment="php53-sysvsem is &lt;5.3.17-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210479" version="1" comment="php53-sysvshm is &lt;5.3.17-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210480" version="1" comment="php53-tokenizer is &lt;5.3.17-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210481" version="1" comment="php53-wddx is &lt;5.3.17-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210482" version="1" comment="php53-xmlreader is &lt;5.3.17-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210483" version="1" comment="php53-xmlrpc is &lt;5.3.17-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210484" version="1" comment="php53-xmlwriter is &lt;5.3.17-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210485" version="1" comment="php53-xsl is &lt;5.3.17-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210486" version="1" comment="php53-zip is &lt;5.3.17-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210487" version="1" comment="php53-zlib is &lt;5.3.17-108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210488" version="1" comment="apache2-mod_php53 is &lt;5.3.17-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210489" version="1" comment="php53-bcmath is &lt;5.3.17-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210490" version="1" comment="php53-bz2 is &lt;5.3.17-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210491" version="1" comment="php53-calendar is &lt;5.3.17-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210492" version="1" comment="php53-ctype is &lt;5.3.17-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210493" version="1" comment="php53-curl is &lt;5.3.17-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210494" version="1" comment="php53-dba is &lt;5.3.17-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210495" version="1" comment="php53-dom is &lt;5.3.17-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210496" version="1" comment="php53-exif is &lt;5.3.17-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210497" version="1" comment="php53-fastcgi is &lt;5.3.17-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210498" version="1" comment="php53-fileinfo is &lt;5.3.17-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210499" version="1" comment="php53-ftp is &lt;5.3.17-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210500" version="1" comment="php53-gd is &lt;5.3.17-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210501" version="1" comment="php53-gettext is &lt;5.3.17-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210502" version="1" comment="php53-gmp is &lt;5.3.17-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210503" version="1" comment="php53-iconv is &lt;5.3.17-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210504" version="1" comment="php53-intl is &lt;5.3.17-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210505" version="1" comment="php53-json is &lt;5.3.17-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210506" version="1" comment="php53-ldap is &lt;5.3.17-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210507" version="1" comment="php53-mbstring is &lt;5.3.17-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210508" version="1" comment="php53-mcrypt is &lt;5.3.17-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210509" version="1" comment="php53-mysql is &lt;5.3.17-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210510" version="1" comment="php53-odbc is &lt;5.3.17-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210511" version="1" comment="php53-openssl is &lt;5.3.17-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210512" version="1" comment="php53-pcntl is &lt;5.3.17-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210513" version="1" comment="php53-pdo is &lt;5.3.17-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210514" version="1" comment="php53-pear is &lt;5.3.17-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210515" version="1" comment="php53-pgsql is &lt;5.3.17-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210516" version="1" comment="php53-pspell is &lt;5.3.17-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210517" version="1" comment="php53-shmop is &lt;5.3.17-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210518" version="1" comment="php53-snmp is &lt;5.3.17-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210519" version="1" comment="php53-soap is &lt;5.3.17-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210520" version="1" comment="php53-suhosin is &lt;5.3.17-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210521" version="1" comment="php53-sysvmsg is &lt;5.3.17-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210522" version="1" comment="php53-sysvsem is &lt;5.3.17-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210523" version="1" comment="php53-sysvshm is &lt;5.3.17-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210524" version="1" comment="php53-tokenizer is &lt;5.3.17-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210525" version="1" comment="php53-wddx is &lt;5.3.17-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210526" version="1" comment="php53-xmlreader is &lt;5.3.17-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210527" version="1" comment="php53-xmlrpc is &lt;5.3.17-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210528" version="1" comment="php53-xmlwriter is &lt;5.3.17-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210529" version="1" comment="php53-xsl is &lt;5.3.17-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210530" version="1" comment="php53-zip is &lt;5.3.17-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210531" version="1" comment="php53-zlib is &lt;5.3.17-111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210532" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210533" version="1" comment="php53-bcmath is &lt;5.3.17-112.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210534" version="1" comment="php53-bz2 is &lt;5.3.17-112.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210535" version="1" comment="php53-calendar is &lt;5.3.17-112.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210536" version="1" comment="php53-ctype is &lt;5.3.17-112.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210537" version="1" comment="php53-curl is &lt;5.3.17-112.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210538" version="1" comment="php53-dba is &lt;5.3.17-112.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210539" version="1" comment="php53-dom is &lt;5.3.17-112.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210540" version="1" comment="php53-exif is &lt;5.3.17-112.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210541" version="1" comment="php53-fastcgi is &lt;5.3.17-112.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210542" version="1" comment="php53-fileinfo is &lt;5.3.17-112.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210543" version="1" comment="php53-ftp is &lt;5.3.17-112.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210544" version="1" comment="php53-gd is &lt;5.3.17-112.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210545" version="1" comment="php53-gettext is &lt;5.3.17-112.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210546" version="1" comment="php53-gmp is &lt;5.3.17-112.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210547" version="1" comment="php53-iconv is &lt;5.3.17-112.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210548" version="1" comment="php53-intl is &lt;5.3.17-112.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210549" version="1" comment="php53-json is &lt;5.3.17-112.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210550" version="1" comment="php53-ldap is &lt;5.3.17-112.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210551" version="1" comment="php53-mbstring is &lt;5.3.17-112.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210552" version="1" comment="php53-mcrypt is &lt;5.3.17-112.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210553" version="1" comment="php53-mysql is &lt;5.3.17-112.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210554" version="1" comment="php53-odbc is &lt;5.3.17-112.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210555" version="1" comment="php53-openssl is &lt;5.3.17-112.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210556" version="1" comment="php53-pcntl is &lt;5.3.17-112.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210557" version="1" comment="php53-pdo is &lt;5.3.17-112.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210558" version="1" comment="php53-pear is &lt;5.3.17-112.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210559" version="1" comment="php53-pgsql is &lt;5.3.17-112.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210560" version="1" comment="php53-pspell is &lt;5.3.17-112.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210561" version="1" comment="php53-shmop is &lt;5.3.17-112.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210562" version="1" comment="php53-snmp is &lt;5.3.17-112.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210563" version="1" comment="php53-soap is &lt;5.3.17-112.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210564" version="1" comment="php53-suhosin is &lt;5.3.17-112.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210565" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210566" version="1" comment="php53-sysvsem is &lt;5.3.17-112.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210567" version="1" comment="php53-sysvshm is &lt;5.3.17-112.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210568" version="1" comment="php53-tokenizer is &lt;5.3.17-112.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210569" version="1" comment="php53-wddx is &lt;5.3.17-112.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210570" version="1" comment="php53-xmlreader is &lt;5.3.17-112.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210571" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210572" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210573" version="1" comment="php53-xsl is &lt;5.3.17-112.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210574" version="1" comment="php53-zip is &lt;5.3.17-112.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210575" version="1" comment="php53-zlib is &lt;5.3.17-112.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210576" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210577" version="1" comment="php53-bcmath is &lt;5.3.17-112.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210578" version="1" comment="php53-bz2 is &lt;5.3.17-112.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210579" version="1" comment="php53-calendar is &lt;5.3.17-112.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210580" version="1" comment="php53-ctype is &lt;5.3.17-112.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210581" version="1" comment="php53-curl is &lt;5.3.17-112.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210582" version="1" comment="php53-dba is &lt;5.3.17-112.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210583" version="1" comment="php53-dom is &lt;5.3.17-112.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210584" version="1" comment="php53-exif is &lt;5.3.17-112.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210585" version="1" comment="php53-fastcgi is &lt;5.3.17-112.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210586" version="1" comment="php53-fileinfo is &lt;5.3.17-112.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210587" version="1" comment="php53-ftp is &lt;5.3.17-112.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210588" version="1" comment="php53-gd is &lt;5.3.17-112.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210589" version="1" comment="php53-gettext is &lt;5.3.17-112.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210590" version="1" comment="php53-gmp is &lt;5.3.17-112.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210591" version="1" comment="php53-iconv is &lt;5.3.17-112.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210592" version="1" comment="php53-intl is &lt;5.3.17-112.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210593" version="1" comment="php53-json is &lt;5.3.17-112.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210594" version="1" comment="php53-ldap is &lt;5.3.17-112.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210595" version="1" comment="php53-mbstring is &lt;5.3.17-112.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210596" version="1" comment="php53-mcrypt is &lt;5.3.17-112.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210597" version="1" comment="php53-mysql is &lt;5.3.17-112.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210598" version="1" comment="php53-odbc is &lt;5.3.17-112.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210599" version="1" comment="php53-openssl is &lt;5.3.17-112.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210600" version="1" comment="php53-pcntl is &lt;5.3.17-112.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210601" version="1" comment="php53-pdo is &lt;5.3.17-112.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210602" version="1" comment="php53-pear is &lt;5.3.17-112.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210603" version="1" comment="php53-pgsql is &lt;5.3.17-112.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210604" version="1" comment="php53-pspell is &lt;5.3.17-112.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210605" version="1" comment="php53-shmop is &lt;5.3.17-112.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210606" version="1" comment="php53-snmp is &lt;5.3.17-112.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210607" version="1" comment="php53-soap is &lt;5.3.17-112.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210608" version="1" comment="php53-suhosin is &lt;5.3.17-112.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210609" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210610" version="1" comment="php53-sysvsem is &lt;5.3.17-112.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210611" version="1" comment="php53-sysvshm is &lt;5.3.17-112.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210612" version="1" comment="php53-tokenizer is &lt;5.3.17-112.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210613" version="1" comment="php53-wddx is &lt;5.3.17-112.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210614" version="1" comment="php53-xmlreader is &lt;5.3.17-112.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210615" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210616" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210617" version="1" comment="php53-xsl is &lt;5.3.17-112.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210618" version="1" comment="php53-zip is &lt;5.3.17-112.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210619" version="1" comment="php53-zlib is &lt;5.3.17-112.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230565" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230566" version="1" comment="php53-bcmath is &lt;5.3.17-112.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230567" version="1" comment="php53-bz2 is &lt;5.3.17-112.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230568" version="1" comment="php53-calendar is &lt;5.3.17-112.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230569" version="1" comment="php53-ctype is &lt;5.3.17-112.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230570" version="1" comment="php53-curl is &lt;5.3.17-112.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230571" version="1" comment="php53-dba is &lt;5.3.17-112.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230572" version="1" comment="php53-dom is &lt;5.3.17-112.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230573" version="1" comment="php53-exif is &lt;5.3.17-112.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230574" version="1" comment="php53-fastcgi is &lt;5.3.17-112.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230575" version="1" comment="php53-fileinfo is &lt;5.3.17-112.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230576" version="1" comment="php53-ftp is &lt;5.3.17-112.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230577" version="1" comment="php53-gd is &lt;5.3.17-112.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230578" version="1" comment="php53-gettext is &lt;5.3.17-112.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230579" version="1" comment="php53-gmp is &lt;5.3.17-112.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230580" version="1" comment="php53-iconv is &lt;5.3.17-112.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230581" version="1" comment="php53-intl is &lt;5.3.17-112.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230582" version="1" comment="php53-json is &lt;5.3.17-112.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230583" version="1" comment="php53-ldap is &lt;5.3.17-112.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230584" version="1" comment="php53-mbstring is &lt;5.3.17-112.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230585" version="1" comment="php53-mcrypt is &lt;5.3.17-112.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230586" version="1" comment="php53-mysql is &lt;5.3.17-112.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230587" version="1" comment="php53-odbc is &lt;5.3.17-112.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230588" version="1" comment="php53-openssl is &lt;5.3.17-112.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230589" version="1" comment="php53-pcntl is &lt;5.3.17-112.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230590" version="1" comment="php53-pdo is &lt;5.3.17-112.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230591" version="1" comment="php53-pear is &lt;5.3.17-112.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230592" version="1" comment="php53-pgsql is &lt;5.3.17-112.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230593" version="1" comment="php53-pspell is &lt;5.3.17-112.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230594" version="1" comment="php53-shmop is &lt;5.3.17-112.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230595" version="1" comment="php53-snmp is &lt;5.3.17-112.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230596" version="1" comment="php53-soap is &lt;5.3.17-112.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230597" version="1" comment="php53-suhosin is &lt;5.3.17-112.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230598" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230599" version="1" comment="php53-sysvsem is &lt;5.3.17-112.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230600" version="1" comment="php53-sysvshm is &lt;5.3.17-112.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230601" version="1" comment="php53-tokenizer is &lt;5.3.17-112.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230602" version="1" comment="php53-wddx is &lt;5.3.17-112.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230603" version="1" comment="php53-xmlreader is &lt;5.3.17-112.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230604" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230605" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230606" version="1" comment="php53-xsl is &lt;5.3.17-112.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230607" version="1" comment="php53-zip is &lt;5.3.17-112.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230608" version="1" comment="php53-zlib is &lt;5.3.17-112.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234339" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234340" version="1" comment="php53-bcmath is &lt;5.3.17-112.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234341" version="1" comment="php53-bz2 is &lt;5.3.17-112.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234342" version="1" comment="php53-calendar is &lt;5.3.17-112.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234343" version="1" comment="php53-ctype is &lt;5.3.17-112.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234344" version="1" comment="php53-curl is &lt;5.3.17-112.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234345" version="1" comment="php53-dba is &lt;5.3.17-112.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234346" version="1" comment="php53-dom is &lt;5.3.17-112.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234347" version="1" comment="php53-exif is &lt;5.3.17-112.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234348" version="1" comment="php53-fastcgi is &lt;5.3.17-112.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234349" version="1" comment="php53-fileinfo is &lt;5.3.17-112.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234350" version="1" comment="php53-ftp is &lt;5.3.17-112.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234351" version="1" comment="php53-gd is &lt;5.3.17-112.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234352" version="1" comment="php53-gettext is &lt;5.3.17-112.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234353" version="1" comment="php53-gmp is &lt;5.3.17-112.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234354" version="1" comment="php53-iconv is &lt;5.3.17-112.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234355" version="1" comment="php53-intl is &lt;5.3.17-112.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234356" version="1" comment="php53-json is &lt;5.3.17-112.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234357" version="1" comment="php53-ldap is &lt;5.3.17-112.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234358" version="1" comment="php53-mbstring is &lt;5.3.17-112.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234359" version="1" comment="php53-mcrypt is &lt;5.3.17-112.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234360" version="1" comment="php53-mysql is &lt;5.3.17-112.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234361" version="1" comment="php53-odbc is &lt;5.3.17-112.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234362" version="1" comment="php53-openssl is &lt;5.3.17-112.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234363" version="1" comment="php53-pcntl is &lt;5.3.17-112.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234364" version="1" comment="php53-pdo is &lt;5.3.17-112.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234365" version="1" comment="php53-pear is &lt;5.3.17-112.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234366" version="1" comment="php53-pgsql is &lt;5.3.17-112.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234367" version="1" comment="php53-pspell is &lt;5.3.17-112.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234368" version="1" comment="php53-shmop is &lt;5.3.17-112.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234369" version="1" comment="php53-snmp is &lt;5.3.17-112.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234370" version="1" comment="php53-soap is &lt;5.3.17-112.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234371" version="1" comment="php53-suhosin is &lt;5.3.17-112.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234372" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234373" version="1" comment="php53-sysvsem is &lt;5.3.17-112.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234374" version="1" comment="php53-sysvshm is &lt;5.3.17-112.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234375" version="1" comment="php53-tokenizer is &lt;5.3.17-112.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234376" version="1" comment="php53-wddx is &lt;5.3.17-112.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234377" version="1" comment="php53-xmlreader is &lt;5.3.17-112.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234378" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234379" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234380" version="1" comment="php53-xsl is &lt;5.3.17-112.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234381" version="1" comment="php53-zip is &lt;5.3.17-112.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234382" version="1" comment="php53-zlib is &lt;5.3.17-112.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236429" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236430" version="1" comment="php53-bcmath is &lt;5.3.17-112.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236431" version="1" comment="php53-bz2 is &lt;5.3.17-112.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236432" version="1" comment="php53-calendar is &lt;5.3.17-112.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236433" version="1" comment="php53-ctype is &lt;5.3.17-112.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236434" version="1" comment="php53-curl is &lt;5.3.17-112.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236435" version="1" comment="php53-dba is &lt;5.3.17-112.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236436" version="1" comment="php53-dom is &lt;5.3.17-112.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236437" version="1" comment="php53-exif is &lt;5.3.17-112.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236438" version="1" comment="php53-fastcgi is &lt;5.3.17-112.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236439" version="1" comment="php53-fileinfo is &lt;5.3.17-112.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236440" version="1" comment="php53-ftp is &lt;5.3.17-112.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236441" version="1" comment="php53-gd is &lt;5.3.17-112.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236442" version="1" comment="php53-gettext is &lt;5.3.17-112.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236443" version="1" comment="php53-gmp is &lt;5.3.17-112.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236444" version="1" comment="php53-iconv is &lt;5.3.17-112.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236445" version="1" comment="php53-intl is &lt;5.3.17-112.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236446" version="1" comment="php53-json is &lt;5.3.17-112.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236447" version="1" comment="php53-ldap is &lt;5.3.17-112.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236448" version="1" comment="php53-mbstring is &lt;5.3.17-112.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236449" version="1" comment="php53-mcrypt is &lt;5.3.17-112.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236450" version="1" comment="php53-mysql is &lt;5.3.17-112.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236451" version="1" comment="php53-odbc is &lt;5.3.17-112.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236452" version="1" comment="php53-openssl is &lt;5.3.17-112.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236453" version="1" comment="php53-pcntl is &lt;5.3.17-112.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236454" version="1" comment="php53-pdo is &lt;5.3.17-112.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236455" version="1" comment="php53-pear is &lt;5.3.17-112.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236456" version="1" comment="php53-pgsql is &lt;5.3.17-112.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236457" version="1" comment="php53-pspell is &lt;5.3.17-112.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236458" version="1" comment="php53-shmop is &lt;5.3.17-112.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236459" version="1" comment="php53-snmp is &lt;5.3.17-112.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236460" version="1" comment="php53-soap is &lt;5.3.17-112.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236461" version="1" comment="php53-suhosin is &lt;5.3.17-112.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236462" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236463" version="1" comment="php53-sysvsem is &lt;5.3.17-112.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236464" version="1" comment="php53-sysvshm is &lt;5.3.17-112.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236465" version="1" comment="php53-tokenizer is &lt;5.3.17-112.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236466" version="1" comment="php53-wddx is &lt;5.3.17-112.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236467" version="1" comment="php53-xmlreader is &lt;5.3.17-112.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236468" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236469" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236470" version="1" comment="php53-xsl is &lt;5.3.17-112.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236471" version="1" comment="php53-zip is &lt;5.3.17-112.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236472" version="1" comment="php53-zlib is &lt;5.3.17-112.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241073" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241074" version="1" comment="php53-bcmath is &lt;5.3.17-112.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241075" version="1" comment="php53-bz2 is &lt;5.3.17-112.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241076" version="1" comment="php53-calendar is &lt;5.3.17-112.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241077" version="1" comment="php53-ctype is &lt;5.3.17-112.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241078" version="1" comment="php53-curl is &lt;5.3.17-112.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241079" version="1" comment="php53-dba is &lt;5.3.17-112.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241080" version="1" comment="php53-dom is &lt;5.3.17-112.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241081" version="1" comment="php53-exif is &lt;5.3.17-112.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241082" version="1" comment="php53-fastcgi is &lt;5.3.17-112.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241083" version="1" comment="php53-fileinfo is &lt;5.3.17-112.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241084" version="1" comment="php53-ftp is &lt;5.3.17-112.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241085" version="1" comment="php53-gd is &lt;5.3.17-112.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241086" version="1" comment="php53-gettext is &lt;5.3.17-112.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241087" version="1" comment="php53-gmp is &lt;5.3.17-112.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241088" version="1" comment="php53-iconv is &lt;5.3.17-112.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241089" version="1" comment="php53-intl is &lt;5.3.17-112.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241090" version="1" comment="php53-json is &lt;5.3.17-112.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241091" version="1" comment="php53-ldap is &lt;5.3.17-112.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241092" version="1" comment="php53-mbstring is &lt;5.3.17-112.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241093" version="1" comment="php53-mcrypt is &lt;5.3.17-112.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241094" version="1" comment="php53-mysql is &lt;5.3.17-112.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241095" version="1" comment="php53-odbc is &lt;5.3.17-112.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241096" version="1" comment="php53-openssl is &lt;5.3.17-112.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241097" version="1" comment="php53-pcntl is &lt;5.3.17-112.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241098" version="1" comment="php53-pdo is &lt;5.3.17-112.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241099" version="1" comment="php53-pear is &lt;5.3.17-112.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241100" version="1" comment="php53-pgsql is &lt;5.3.17-112.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241101" version="1" comment="php53-pspell is &lt;5.3.17-112.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241102" version="1" comment="php53-shmop is &lt;5.3.17-112.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241103" version="1" comment="php53-snmp is &lt;5.3.17-112.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241104" version="1" comment="php53-soap is &lt;5.3.17-112.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241105" version="1" comment="php53-suhosin is &lt;5.3.17-112.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241106" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241107" version="1" comment="php53-sysvsem is &lt;5.3.17-112.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241108" version="1" comment="php53-sysvshm is &lt;5.3.17-112.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241109" version="1" comment="php53-tokenizer is &lt;5.3.17-112.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241110" version="1" comment="php53-wddx is &lt;5.3.17-112.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241111" version="1" comment="php53-xmlreader is &lt;5.3.17-112.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241112" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241113" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241114" version="1" comment="php53-xsl is &lt;5.3.17-112.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241115" version="1" comment="php53-zip is &lt;5.3.17-112.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241116" version="1" comment="php53-zlib is &lt;5.3.17-112.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244301" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244302" version="1" comment="php53-bcmath is &lt;5.3.17-112.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244303" version="1" comment="php53-bz2 is &lt;5.3.17-112.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244304" version="1" comment="php53-calendar is &lt;5.3.17-112.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244305" version="1" comment="php53-ctype is &lt;5.3.17-112.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244306" version="1" comment="php53-curl is &lt;5.3.17-112.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244307" version="1" comment="php53-dba is &lt;5.3.17-112.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244308" version="1" comment="php53-dom is &lt;5.3.17-112.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244309" version="1" comment="php53-exif is &lt;5.3.17-112.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244310" version="1" comment="php53-fastcgi is &lt;5.3.17-112.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244311" version="1" comment="php53-fileinfo is &lt;5.3.17-112.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244312" version="1" comment="php53-ftp is &lt;5.3.17-112.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244313" version="1" comment="php53-gd is &lt;5.3.17-112.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244314" version="1" comment="php53-gettext is &lt;5.3.17-112.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244315" version="1" comment="php53-gmp is &lt;5.3.17-112.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244316" version="1" comment="php53-iconv is &lt;5.3.17-112.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244317" version="1" comment="php53-intl is &lt;5.3.17-112.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244318" version="1" comment="php53-json is &lt;5.3.17-112.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244319" version="1" comment="php53-ldap is &lt;5.3.17-112.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244320" version="1" comment="php53-mbstring is &lt;5.3.17-112.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244321" version="1" comment="php53-mcrypt is &lt;5.3.17-112.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244322" version="1" comment="php53-mysql is &lt;5.3.17-112.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244323" version="1" comment="php53-odbc is &lt;5.3.17-112.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244324" version="1" comment="php53-openssl is &lt;5.3.17-112.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244325" version="1" comment="php53-pcntl is &lt;5.3.17-112.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244326" version="1" comment="php53-pdo is &lt;5.3.17-112.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244327" version="1" comment="php53-pear is &lt;5.3.17-112.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244328" version="1" comment="php53-pgsql is &lt;5.3.17-112.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244329" version="1" comment="php53-pspell is &lt;5.3.17-112.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244330" version="1" comment="php53-shmop is &lt;5.3.17-112.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244331" version="1" comment="php53-snmp is &lt;5.3.17-112.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244332" version="1" comment="php53-soap is &lt;5.3.17-112.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244333" version="1" comment="php53-suhosin is &lt;5.3.17-112.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244334" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244335" version="1" comment="php53-sysvsem is &lt;5.3.17-112.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244336" version="1" comment="php53-sysvshm is &lt;5.3.17-112.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244337" version="1" comment="php53-tokenizer is &lt;5.3.17-112.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244338" version="1" comment="php53-wddx is &lt;5.3.17-112.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244339" version="1" comment="php53-xmlreader is &lt;5.3.17-112.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244340" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244341" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244342" version="1" comment="php53-xsl is &lt;5.3.17-112.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244343" version="1" comment="php53-zip is &lt;5.3.17-112.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244344" version="1" comment="php53-zlib is &lt;5.3.17-112.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254005" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254006" version="1" comment="php53 is &lt;5.3.17-112.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254007" version="1" comment="php53-bcmath is &lt;5.3.17-112.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254008" version="1" comment="php53-bz2 is &lt;5.3.17-112.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254009" version="1" comment="php53-calendar is &lt;5.3.17-112.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254010" version="1" comment="php53-ctype is &lt;5.3.17-112.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254011" version="1" comment="php53-curl is &lt;5.3.17-112.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254012" version="1" comment="php53-dba is &lt;5.3.17-112.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254013" version="1" comment="php53-dom is &lt;5.3.17-112.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254014" version="1" comment="php53-exif is &lt;5.3.17-112.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254015" version="1" comment="php53-fastcgi is &lt;5.3.17-112.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254016" version="1" comment="php53-fileinfo is &lt;5.3.17-112.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254017" version="1" comment="php53-ftp is &lt;5.3.17-112.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254018" version="1" comment="php53-gd is &lt;5.3.17-112.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254019" version="1" comment="php53-gettext is &lt;5.3.17-112.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254020" version="1" comment="php53-gmp is &lt;5.3.17-112.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254021" version="1" comment="php53-iconv is &lt;5.3.17-112.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254022" version="1" comment="php53-intl is &lt;5.3.17-112.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254023" version="1" comment="php53-json is &lt;5.3.17-112.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254024" version="1" comment="php53-ldap is &lt;5.3.17-112.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254025" version="1" comment="php53-mbstring is &lt;5.3.17-112.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254026" version="1" comment="php53-mcrypt is &lt;5.3.17-112.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254027" version="1" comment="php53-mysql is &lt;5.3.17-112.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254028" version="1" comment="php53-odbc is &lt;5.3.17-112.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254029" version="1" comment="php53-openssl is &lt;5.3.17-112.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254030" version="1" comment="php53-pcntl is &lt;5.3.17-112.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254031" version="1" comment="php53-pdo is &lt;5.3.17-112.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254032" version="1" comment="php53-pear is &lt;5.3.17-112.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254033" version="1" comment="php53-pgsql is &lt;5.3.17-112.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254034" version="1" comment="php53-pspell is &lt;5.3.17-112.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254035" version="1" comment="php53-shmop is &lt;5.3.17-112.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254036" version="1" comment="php53-snmp is &lt;5.3.17-112.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254037" version="1" comment="php53-soap is &lt;5.3.17-112.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254038" version="1" comment="php53-suhosin is &lt;5.3.17-112.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254039" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254040" version="1" comment="php53-sysvsem is &lt;5.3.17-112.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254041" version="1" comment="php53-sysvshm is &lt;5.3.17-112.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254042" version="1" comment="php53-tokenizer is &lt;5.3.17-112.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254043" version="1" comment="php53-wddx is &lt;5.3.17-112.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254044" version="1" comment="php53-xmlreader is &lt;5.3.17-112.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254045" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254046" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254047" version="1" comment="php53-xsl is &lt;5.3.17-112.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254048" version="1" comment="php53-zip is &lt;5.3.17-112.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254049" version="1" comment="php53-zlib is &lt;5.3.17-112.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258877" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258878" version="1" comment="php53 is &lt;5.3.17-112.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258879" version="1" comment="php53-bcmath is &lt;5.3.17-112.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258880" version="1" comment="php53-bz2 is &lt;5.3.17-112.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258881" version="1" comment="php53-calendar is &lt;5.3.17-112.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258882" version="1" comment="php53-ctype is &lt;5.3.17-112.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258883" version="1" comment="php53-curl is &lt;5.3.17-112.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258884" version="1" comment="php53-dba is &lt;5.3.17-112.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258885" version="1" comment="php53-dom is &lt;5.3.17-112.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258886" version="1" comment="php53-exif is &lt;5.3.17-112.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258887" version="1" comment="php53-fastcgi is &lt;5.3.17-112.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258888" version="1" comment="php53-fileinfo is &lt;5.3.17-112.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258889" version="1" comment="php53-ftp is &lt;5.3.17-112.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258890" version="1" comment="php53-gd is &lt;5.3.17-112.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258891" version="1" comment="php53-gettext is &lt;5.3.17-112.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258892" version="1" comment="php53-gmp is &lt;5.3.17-112.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258893" version="1" comment="php53-iconv is &lt;5.3.17-112.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258894" version="1" comment="php53-intl is &lt;5.3.17-112.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258895" version="1" comment="php53-json is &lt;5.3.17-112.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258896" version="1" comment="php53-ldap is &lt;5.3.17-112.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258897" version="1" comment="php53-mbstring is &lt;5.3.17-112.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258898" version="1" comment="php53-mcrypt is &lt;5.3.17-112.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258899" version="1" comment="php53-mysql is &lt;5.3.17-112.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258900" version="1" comment="php53-odbc is &lt;5.3.17-112.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258901" version="1" comment="php53-openssl is &lt;5.3.17-112.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258902" version="1" comment="php53-pcntl is &lt;5.3.17-112.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258903" version="1" comment="php53-pdo is &lt;5.3.17-112.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258904" version="1" comment="php53-pear is &lt;5.3.17-112.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258905" version="1" comment="php53-pgsql is &lt;5.3.17-112.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258906" version="1" comment="php53-pspell is &lt;5.3.17-112.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258907" version="1" comment="php53-shmop is &lt;5.3.17-112.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258908" version="1" comment="php53-snmp is &lt;5.3.17-112.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258909" version="1" comment="php53-soap is &lt;5.3.17-112.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258910" version="1" comment="php53-suhosin is &lt;5.3.17-112.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258911" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258912" version="1" comment="php53-sysvsem is &lt;5.3.17-112.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258913" version="1" comment="php53-sysvshm is &lt;5.3.17-112.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258914" version="1" comment="php53-tokenizer is &lt;5.3.17-112.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258915" version="1" comment="php53-wddx is &lt;5.3.17-112.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258916" version="1" comment="php53-xmlreader is &lt;5.3.17-112.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258917" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258918" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258919" version="1" comment="php53-xsl is &lt;5.3.17-112.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258920" version="1" comment="php53-zip is &lt;5.3.17-112.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258921" version="1" comment="php53-zlib is &lt;5.3.17-112.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208941" version="1" comment="popt-x86 is &lt;1.7-37.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208951" version="1" comment="powerpc-utils is &lt;1.2.16-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208952" version="1" comment="ppc64-diag is &lt;2.6.1-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230609" version="1" comment="procps is &lt;3.2.7-152.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208953" version="1" comment="puppet-server is &lt;2.6.18-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208954" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.9-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208955" version="1" comment="python-base-x86 is &lt;2.6.9-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208956" version="1" comment="python-x86 is &lt;2.6.9-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208957" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.9-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208958" version="1" comment="python-base-x86 is &lt;2.6.9-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208959" version="1" comment="python-x86 is &lt;2.6.9-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208960" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.9-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208961" version="1" comment="python-base-x86 is &lt;2.6.9-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208962" version="1" comment="python-x86 is &lt;2.6.9-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208963" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.9-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208964" version="1" comment="python-base-x86 is &lt;2.6.9-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208965" version="1" comment="python-x86 is &lt;2.6.9-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250403" version="1" comment="python-paramiko is &lt;1.13.1-0.3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250404" version="1" comment="python-pycrypto is &lt;2.6-0.3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263589" version="1" comment="cloud-init is &lt;18.5-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263590" version="1" comment="cloud-init-config-suse is &lt;18.5-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263591" version="1" comment="cloud-init-doc is &lt;18.5-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263592" version="1" comment="growpart is &lt;0.30-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263593" version="1" comment="python27-Cheetah is &lt;2.4.4-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263594" version="1" comment="python27-Jinja2 is &lt;2.7.2-2.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263595" version="1" comment="python27-MarkupSafe is &lt;0.18-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263596" version="1" comment="python27-PrettyTable is &lt;0.7.2-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263597" version="1" comment="python27-PyJWT is &lt;1.4.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263598" version="1" comment="python27-PyYAML is &lt;3.10-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263599" version="1" comment="python27-argparse is &lt;1.2.1-2.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263600" version="1" comment="python27-blinker is &lt;1.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263601" version="1" comment="python27-boto3 is &lt;1.7.42-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263602" version="1" comment="python27-botocore is &lt;1.10.57-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263603" version="1" comment="python27-cffi is &lt;1.5.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263604" version="1" comment="python27-configobj is &lt;5.0.6-1.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263605" version="1" comment="python27-cryptography is &lt;1.3.1-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263606" version="1" comment="python27-dateutil is &lt;2.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263607" version="1" comment="python27-docutils is &lt;0.11-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263608" version="1" comment="python27-ecdsa is &lt;0.10-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263609" version="1" comment="python27-enum34 is &lt;1.1.3-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263610" version="1" comment="python27-futures is &lt;3.0.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263611" version="1" comment="python27-httplib2 is &lt;0.9.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263612" version="1" comment="python27-idna is &lt;2.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263613" version="1" comment="python27-ipaddress is &lt;1.0.18-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263614" version="1" comment="python27-jmespath is &lt;0.9.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263615" version="1" comment="python27-jsonpatch is &lt;1.1-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263616" version="1" comment="python27-jsonpointer is &lt;1.0-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263617" version="1" comment="python27-jsonschema is &lt;2.4.0-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263618" version="1" comment="python27-lockfile is &lt;0.9.1-2.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263619" version="1" comment="python27-oauth is &lt;1.0.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263620" version="1" comment="python27-oauthlib is &lt;0.7.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263621" version="1" comment="python27-paramiko is &lt;1.13.1-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263622" version="1" comment="python27-ply is &lt;3.4-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263623" version="1" comment="python27-pyasn1 is &lt;0.1.9-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263624" version="1" comment="python27-pyasn1-modules is &lt;0.0.5-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263625" version="1" comment="python27-pycparser is &lt;2.10-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263626" version="1" comment="python27-pycrypto is &lt;2.6-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263627" version="1" comment="python27-pyserial is &lt;2.7-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263628" version="1" comment="python27-pytest is &lt;2.5.1-0.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263629" version="1" comment="python27-python-daemon is &lt;1.5.5-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263630" version="1" comment="python27-requests is &lt;2.0.1-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263631" version="1" comment="python27-s3transfer is &lt;0.1.13-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263632" version="1" comment="python27-simplejson is &lt;3.8.2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263633" version="1" comment="python27-six is &lt;1.7.2-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210682" version="1" comment="rsync is &lt;3.0.4-2.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210683" version="1" comment="rsync is &lt;3.0.4-2.53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210684" version="1" comment="rsync is &lt;3.0.4-2.53.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210686" version="1" comment="ldapsmb is &lt;1.34b-67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208966" version="1" comment="ldapsmb is &lt;1.34b-76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208967" version="1" comment="libldb1 is &lt;3.6.3-76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208968" version="1" comment="libsmbclient0 is &lt;3.6.3-76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208969" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208970" version="1" comment="libtalloc2 is &lt;3.6.3-76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208971" version="1" comment="libtalloc2-32bit is &lt;3.6.3-76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208972" version="1" comment="libtdb1 is &lt;3.6.3-76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208973" version="1" comment="libtdb1-32bit is &lt;3.6.3-76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208974" version="1" comment="libtevent0 is &lt;3.6.3-76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208975" version="1" comment="libtevent0-32bit is &lt;3.6.3-76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208976" version="1" comment="libwbclient0 is &lt;3.6.3-76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208977" version="1" comment="libwbclient0-32bit is &lt;3.6.3-76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208978" version="1" comment="samba-32bit is &lt;3.6.3-76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208979" version="1" comment="samba-client is &lt;3.6.3-76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208980" version="1" comment="samba-client-32bit is &lt;3.6.3-76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208981" version="1" comment="samba-doc is &lt;3.6.3-76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208982" version="1" comment="samba-krb-printing is &lt;3.6.3-76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208983" version="1" comment="samba-winbind is &lt;3.6.3-76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208984" version="1" comment="samba-winbind-32bit is &lt;3.6.3-76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208985" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208986" version="1" comment="libtalloc2-32bit is &lt;3.6.3-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208987" version="1" comment="libtdb1-32bit is &lt;3.6.3-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208988" version="1" comment="libtevent0-32bit is &lt;3.6.3-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208989" version="1" comment="libwbclient0-32bit is &lt;3.6.3-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208990" version="1" comment="samba-32bit is &lt;3.6.3-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208991" version="1" comment="samba-client-32bit is &lt;3.6.3-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208992" version="1" comment="samba-winbind-32bit is &lt;3.6.3-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210711" version="1" comment="ldapsmb is &lt;1.34b-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210712" version="1" comment="libldb1 is &lt;3.6.3-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210713" version="1" comment="libsmbclient0 is &lt;3.6.3-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210714" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210716" version="1" comment="libtalloc2 is &lt;3.6.3-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210717" version="1" comment="libtalloc2-32bit is &lt;3.6.3-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210719" version="1" comment="libtdb1 is &lt;3.6.3-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210720" version="1" comment="libtdb1-32bit is &lt;3.6.3-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210722" version="1" comment="libtevent0 is &lt;3.6.3-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210723" version="1" comment="libtevent0-32bit is &lt;3.6.3-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210725" version="1" comment="libwbclient0 is &lt;3.6.3-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210726" version="1" comment="libwbclient0-32bit is &lt;3.6.3-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210728" version="1" comment="samba-32bit is &lt;3.6.3-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210729" version="1" comment="samba-client is &lt;3.6.3-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210730" version="1" comment="samba-client-32bit is &lt;3.6.3-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210732" version="1" comment="samba-doc is &lt;3.6.3-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210733" version="1" comment="samba-krb-printing is &lt;3.6.3-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210734" version="1" comment="samba-winbind is &lt;3.6.3-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210735" version="1" comment="samba-winbind-32bit is &lt;3.6.3-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208993" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208994" version="1" comment="libtalloc2-32bit is &lt;3.6.3-90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208995" version="1" comment="libtdb1-32bit is &lt;3.6.3-90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208996" version="1" comment="libtevent0-32bit is &lt;3.6.3-90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208997" version="1" comment="libwbclient0-32bit is &lt;3.6.3-90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208998" version="1" comment="samba-32bit is &lt;3.6.3-90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009208999" version="1" comment="samba-client-32bit is &lt;3.6.3-90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209000" version="1" comment="samba-winbind-32bit is &lt;3.6.3-90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209001" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209002" version="1" comment="libtalloc2-32bit is &lt;3.6.3-93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209003" version="1" comment="libtdb1-32bit is &lt;3.6.3-93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209004" version="1" comment="libtevent0-32bit is &lt;3.6.3-93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209005" version="1" comment="libwbclient0-32bit is &lt;3.6.3-93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209006" version="1" comment="samba-32bit is &lt;3.6.3-93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209007" version="1" comment="samba-client-32bit is &lt;3.6.3-93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209008" version="1" comment="samba-winbind-32bit is &lt;3.6.3-93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209009" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-94.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209010" version="1" comment="libtalloc2-32bit is &lt;3.6.3-94.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209011" version="1" comment="libtdb1-32bit is &lt;3.6.3-94.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209012" version="1" comment="libtevent0-32bit is &lt;3.6.3-94.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209013" version="1" comment="libwbclient0-32bit is &lt;3.6.3-94.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209014" version="1" comment="samba-32bit is &lt;3.6.3-94.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209015" version="1" comment="samba-client-32bit is &lt;3.6.3-94.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209016" version="1" comment="samba-winbind-32bit is &lt;3.6.3-94.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209017" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-94.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209018" version="1" comment="libtalloc2-32bit is &lt;3.6.3-94.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209019" version="1" comment="libtdb1-32bit is &lt;3.6.3-94.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209020" version="1" comment="libtevent0-32bit is &lt;3.6.3-94.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209021" version="1" comment="libwbclient0-32bit is &lt;3.6.3-94.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209022" version="1" comment="samba-32bit is &lt;3.6.3-94.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209023" version="1" comment="samba-client-32bit is &lt;3.6.3-94.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209024" version="1" comment="samba-winbind-32bit is &lt;3.6.3-94.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210770" version="1" comment="ldapsmb is &lt;1.34b-94.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210771" version="1" comment="libldb1 is &lt;3.6.3-94.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210772" version="1" comment="libsmbclient0 is &lt;3.6.3-94.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210773" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-94.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210775" version="1" comment="libtalloc2 is &lt;3.6.3-94.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210776" version="1" comment="libtalloc2-32bit is &lt;3.6.3-94.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210778" version="1" comment="libtdb1 is &lt;3.6.3-94.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210779" version="1" comment="libtdb1-32bit is &lt;3.6.3-94.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210781" version="1" comment="libtevent0 is &lt;3.6.3-94.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210782" version="1" comment="libtevent0-32bit is &lt;3.6.3-94.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210784" version="1" comment="libwbclient0 is &lt;3.6.3-94.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210785" version="1" comment="libwbclient0-32bit is &lt;3.6.3-94.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210787" version="1" comment="samba-32bit is &lt;3.6.3-94.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210788" version="1" comment="samba-client is &lt;3.6.3-94.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210789" version="1" comment="samba-client-32bit is &lt;3.6.3-94.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210791" version="1" comment="samba-doc is &lt;3.6.3-94.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210792" version="1" comment="samba-krb-printing is &lt;3.6.3-94.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210793" version="1" comment="samba-winbind is &lt;3.6.3-94.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210794" version="1" comment="samba-winbind-32bit is &lt;3.6.3-94.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232185" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-94.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232186" version="1" comment="libtalloc2-32bit is &lt;3.6.3-94.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232187" version="1" comment="libtdb1-32bit is &lt;3.6.3-94.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232188" version="1" comment="libtevent0-32bit is &lt;3.6.3-94.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232189" version="1" comment="libwbclient0-32bit is &lt;3.6.3-94.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232190" version="1" comment="samba-32bit is &lt;3.6.3-94.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232191" version="1" comment="samba-client-32bit is &lt;3.6.3-94.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232192" version="1" comment="samba-winbind-32bit is &lt;3.6.3-94.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253271" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-94.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253272" version="1" comment="libtalloc2-32bit is &lt;3.6.3-94.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253273" version="1" comment="libtdb1-32bit is &lt;3.6.3-94.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253274" version="1" comment="libtevent0-32bit is &lt;3.6.3-94.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253275" version="1" comment="libwbclient0-32bit is &lt;3.6.3-94.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253276" version="1" comment="samba-32bit is &lt;3.6.3-94.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253277" version="1" comment="samba-client-32bit is &lt;3.6.3-94.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253278" version="1" comment="samba-winbind-32bit is &lt;3.6.3-94.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209025" version="1" comment="ldapsmb is &lt;1.34b-12.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209026" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-0.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209027" version="1" comment="libtalloc2-x86 is &lt;3.6.3-0.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209028" version="1" comment="libtdb1-x86 is &lt;3.6.3-0.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209029" version="1" comment="libwbclient0-x86 is &lt;3.6.3-0.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209030" version="1" comment="samba-client-x86 is &lt;3.6.3-0.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209031" version="1" comment="samba-winbind-x86 is &lt;3.6.3-0.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209032" version="1" comment="samba-x86 is &lt;3.6.3-0.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209033" version="1" comment="ldapsmb is &lt;1.34b-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209034" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209035" version="1" comment="libtalloc2-x86 is &lt;3.6.3-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209036" version="1" comment="libtdb1-x86 is &lt;3.6.3-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209037" version="1" comment="libwbclient0-x86 is &lt;3.6.3-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209038" version="1" comment="samba-client-x86 is &lt;3.6.3-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209039" version="1" comment="samba-winbind-x86 is &lt;3.6.3-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209040" version="1" comment="samba-x86 is &lt;3.6.3-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210798" version="1" comment="sblim-sfcb is &lt;1.3.11-0.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210802" version="1" comment="libsqlite3-0 is &lt;3.7.6.3-1.4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210803" version="1" comment="libsqlite3-0-32bit is &lt;3.7.6.3-1.4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246750" version="1" comment="libsqlite3-0-32bit is &lt;3.7.6.3-1.4.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252988" version="1" comment="libsqlite3-0 is &lt;3.7.6.3-1.4.7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252989" version="1" comment="libsqlite3-0-32bit is &lt;3.7.6.3-1.4.7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252990" version="1" comment="sqlite3 is &lt;3.7.6.3-1.4.7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256853" version="1" comment="libsqlite3-0-32bit is &lt;3.7.6.3-1.4.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210818" version="1" comment="sudo is &lt;1.7.6p2-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210819" version="1" comment="supportutils is &lt;1.20-121" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210821" version="1" comment="tboot is &lt;20120115_1.7.0-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209042" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.160" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210860" version="1" comment="unzip is &lt;6.00-11.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210861" version="1" comment="unzip is &lt;6.00-11.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246176" version="1" comment="unzip is &lt;6.00-11.18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210862" version="1" comment="gvim is &lt;7.2-8.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210863" version="1" comment="vim is &lt;7.2-8.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210864" version="1" comment="vim-base is &lt;7.2-8.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210865" version="1" comment="vim-data is &lt;7.2-8.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210866" version="1" comment="gvim is &lt;7.2-8.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210867" version="1" comment="vim is &lt;7.2-8.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210868" version="1" comment="vim-base is &lt;7.2-8.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210869" version="1" comment="vim-data is &lt;7.2-8.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209044" version="1" comment="vsftpd is &lt;2.0.7-4.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223436" version="1" comment="wpa_supplicant is &lt;0.7.1-6.18.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209045" version="1" comment="xen is &lt;4.2.5_20-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209046" version="1" comment="xen-doc-html is &lt;4.2.5_20-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209047" version="1" comment="xen-doc-pdf is &lt;4.2.5_20-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209048" version="1" comment="xen-kmp-default is &lt;4.2.5_20_3.0.101_0.47.79-24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209049" version="1" comment="xen-kmp-pae is &lt;4.2.5_20_3.0.101_0.47.79-24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209050" version="1" comment="xen-libs is &lt;4.2.5_20-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209051" version="1" comment="xen-libs-32bit is &lt;4.2.5_20-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209052" version="1" comment="xen-tools is &lt;4.2.5_20-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209053" version="1" comment="xen-tools-domU is &lt;4.2.5_20-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209054" version="1" comment="xen-doc-html is &lt;4.2.5_21-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209055" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209056" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209057" version="1" comment="xen-tools is &lt;4.2.5_21-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209058" version="1" comment="xen-doc-html is &lt;4.2.5_21-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209059" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209060" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209061" version="1" comment="xen-tools is &lt;4.2.5_21-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250405" version="1" comment="xen is &lt;4.2.5_21-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250406" version="1" comment="xen-doc-html is &lt;4.2.5_21-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250407" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250408" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.113.TDC-31" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250409" version="1" comment="xen-libs is &lt;4.2.5_21-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250410" version="1" comment="xen-tools is &lt;4.2.5_21-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250411" version="1" comment="xen-tools-domU is &lt;4.2.5_21-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209062" version="1" comment="xen-doc-html is &lt;4.2.5_21-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209063" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209064" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209065" version="1" comment="xen-tools is &lt;4.2.5_21-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250412" version="1" comment="xen is &lt;4.2.5_21-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250413" version="1" comment="xen-doc-html is &lt;4.2.5_21-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250414" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250415" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.116.TDC-37" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250416" version="1" comment="xen-libs is &lt;4.2.5_21-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250417" version="1" comment="xen-tools is &lt;4.2.5_21-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250418" version="1" comment="xen-tools-domU is &lt;4.2.5_21-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209066" version="1" comment="xen-doc-html is &lt;4.2.5_21-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209067" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209068" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209069" version="1" comment="xen-tools is &lt;4.2.5_21-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250419" version="1" comment="xen is &lt;4.2.5_21-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250420" version="1" comment="xen-doc-html is &lt;4.2.5_21-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250421" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250422" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.119.TDC-40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250423" version="1" comment="xen-libs is &lt;4.2.5_21-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250424" version="1" comment="xen-tools is &lt;4.2.5_21-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250425" version="1" comment="xen-tools-domU is &lt;4.2.5_21-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250426" version="1" comment="xen is &lt;4.2.5_21-43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250427" version="1" comment="xen-doc-html is &lt;4.2.5_21-43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250428" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250429" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.119.TDC-43" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250430" version="1" comment="xen-libs is &lt;4.2.5_21-43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250431" version="1" comment="xen-tools is &lt;4.2.5_21-43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250432" version="1" comment="xen-tools-domU is &lt;4.2.5_21-43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209070" version="1" comment="xen-doc-html is &lt;4.2.5_21-41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209071" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209072" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209073" version="1" comment="xen-tools is &lt;4.2.5_21-41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209074" version="1" comment="xen-doc-html is &lt;4.2.5_21-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209075" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209076" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209077" version="1" comment="xen-tools is &lt;4.2.5_21-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250433" version="1" comment="xen is &lt;4.2.5_21-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250434" version="1" comment="xen-doc-html is &lt;4.2.5_21-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250435" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250436" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.122.TDC-46" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250437" version="1" comment="xen-libs is &lt;4.2.5_21-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250438" version="1" comment="xen-tools is &lt;4.2.5_21-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250439" version="1" comment="xen-tools-domU is &lt;4.2.5_21-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250440" version="1" comment="xen is &lt;4.2.5_21-47.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250441" version="1" comment="xen-doc-html is &lt;4.2.5_21-47.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250442" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-47.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250443" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.125.TDC-47.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250444" version="1" comment="xen-libs is &lt;4.2.5_21-47.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250445" version="1" comment="xen-tools is &lt;4.2.5_21-47.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250446" version="1" comment="xen-tools-domU is &lt;4.2.5_21-47.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209078" version="1" comment="xen-doc-html is &lt;4.2.5_21-45.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209079" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-45.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209080" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-45.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209081" version="1" comment="xen-tools is &lt;4.2.5_21-45.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250447" version="1" comment="xen is &lt;4.2.5_21-47.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250448" version="1" comment="xen-doc-html is &lt;4.2.5_21-47.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250449" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-47.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250450" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.126.5.TDC-47.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250451" version="1" comment="xen-libs is &lt;4.2.5_21-47.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250452" version="1" comment="xen-tools is &lt;4.2.5_21-47.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250453" version="1" comment="xen-tools-domU is &lt;4.2.5_21-47.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209082" version="1" comment="xen-doc-html is &lt;4.2.5_21-45.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209083" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-45.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209084" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-45.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209085" version="1" comment="xen-tools is &lt;4.2.5_21-45.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209086" version="1" comment="xen-doc-html is &lt;4.2.5_21-45.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209087" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-45.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209088" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-45.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209089" version="1" comment="xen-tools is &lt;4.2.5_21-45.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250454" version="1" comment="xen is &lt;4.2.5_21-47.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250455" version="1" comment="xen-doc-html is &lt;4.2.5_21-47.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250456" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-47.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250457" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.132.TDC-47.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250458" version="1" comment="xen-libs is &lt;4.2.5_21-47.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250459" version="1" comment="xen-tools is &lt;4.2.5_21-47.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250460" version="1" comment="xen-tools-domU is &lt;4.2.5_21-47.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209090" version="1" comment="xen-doc-html is &lt;4.2.5_21-45.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209091" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-45.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209092" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-45.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209093" version="1" comment="xen-tools is &lt;4.2.5_21-45.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250461" version="1" comment="xen is &lt;4.2.5_21-47.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250462" version="1" comment="xen-doc-html is &lt;4.2.5_21-47.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250463" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-47.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250464" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.139.TDC-47.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250465" version="1" comment="xen-libs is &lt;4.2.5_21-47.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250466" version="1" comment="xen-tools is &lt;4.2.5_21-47.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250467" version="1" comment="xen-tools-domU is &lt;4.2.5_21-47.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250468" version="1" comment="xen is &lt;4.2.5_21-47.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250469" version="1" comment="xen-doc-html is &lt;4.2.5_21-47.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250470" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-47.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250471" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.150.TDC-47.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250472" version="1" comment="xen-libs is &lt;4.2.5_21-47.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250473" version="1" comment="xen-tools is &lt;4.2.5_21-47.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250474" version="1" comment="xen-tools-domU is &lt;4.2.5_21-47.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209094" version="1" comment="xen-doc-html is &lt;4.2.5_21-45.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209095" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-45.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209096" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-45.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209097" version="1" comment="xen-tools is &lt;4.2.5_21-45.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209098" version="1" comment="xen-doc-html is &lt;4.2.5_21-45.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209099" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-45.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209100" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-45.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209101" version="1" comment="xen-tools is &lt;4.2.5_21-45.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250475" version="1" comment="xen is &lt;4.2.5_21-47.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250476" version="1" comment="xen-doc-html is &lt;4.2.5_21-47.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250477" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-47.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250478" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.156.TDC-47.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250479" version="1" comment="xen-libs is &lt;4.2.5_21-47.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250480" version="1" comment="xen-tools is &lt;4.2.5_21-47.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250481" version="1" comment="xen-tools-domU is &lt;4.2.5_21-47.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250482" version="1" comment="xen is &lt;4.2.5_21-47.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250483" version="1" comment="xen-doc-html is &lt;4.2.5_21-47.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250484" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-47.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250485" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.181.TDC-47.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250486" version="1" comment="xen-libs is &lt;4.2.5_21-47.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250487" version="1" comment="xen-tools is &lt;4.2.5_21-47.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250488" version="1" comment="xen-tools-domU is &lt;4.2.5_21-47.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233381" version="1" comment="xen-doc-html is &lt;4.2.5_21-45.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233382" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-45.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233383" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-45.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233384" version="1" comment="xen-tools is &lt;4.2.5_21-45.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250489" version="1" comment="xen is &lt;4.2.5_21-47.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250490" version="1" comment="xen-doc-html is &lt;4.2.5_21-47.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250491" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-47.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250492" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.190.TDC-47.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250493" version="1" comment="xen-libs is &lt;4.2.5_21-47.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250494" version="1" comment="xen-tools is &lt;4.2.5_21-47.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250495" version="1" comment="xen-tools-domU is &lt;4.2.5_21-47.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209102" version="1" comment="xorg-x11-libs-x86 is &lt;7.4-8.26.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209103" version="1" comment="xorg-x11-libX11-x86 is &lt;7.4-5.11.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210991" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.118" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210992" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.118" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210993" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.122.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210994" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.122.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250496" version="1" comment="yast2-storage is &lt;2.17.147.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250497" version="1" comment="yast2-storage-lib is &lt;2.17.147.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210996" version="1" comment="zlib-32bit is &lt;1.2.7-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209136" version="1" comment="libfreebl3-x86 is &lt;3.20.2-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209137" version="1" comment="libsoftokn3-x86 is &lt;3.20.2-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209138" version="1" comment="mozilla-nspr-x86 is &lt;4.12-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209139" version="1" comment="mozilla-nss-x86 is &lt;3.20.2-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209140" version="1" comment="libfreebl3-x86 is &lt;3.21.1-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209141" version="1" comment="libsoftokn3-x86 is &lt;3.21.1-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209142" version="1" comment="mozilla-nspr-x86 is &lt;4.12-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209143" version="1" comment="mozilla-nss-x86 is &lt;3.21.1-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209144" version="1" comment="libfreebl3-x86 is &lt;3.29.5-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209145" version="1" comment="libsoftokn3-x86 is &lt;3.29.5-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209146" version="1" comment="mozilla-nspr-x86 is &lt;4.13.1-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209147" version="1" comment="mozilla-nss-x86 is &lt;3.29.5-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209148" version="1" comment="libfreebl3-x86 is &lt;3.29.5-47.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209149" version="1" comment="libsoftokn3-x86 is &lt;3.29.5-47.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209150" version="1" comment="mozilla-nss-x86 is &lt;3.29.5-47.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209151" version="1" comment="libfreebl3-x86 is &lt;3.20.2-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209152" version="1" comment="libsoftokn3-x86 is &lt;3.20.2-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209153" version="1" comment="mozilla-nspr-x86 is &lt;4.12-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209154" version="1" comment="mozilla-nss-x86 is &lt;3.20.2-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209161" version="1" comment="OpenEXR-x86 is &lt;1.6.1-83.17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246627" version="1" comment="SDL-x86 is &lt;1.2.13-106.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209167" version="1" comment="audiofile-x86 is &lt;0.2.6-142.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243989" version="1" comment="libavahi-client3-x86 is &lt;0.6.23-35.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243992" version="1" comment="libavahi-common3-x86 is &lt;0.6.23-35.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243996" version="1" comment="libavahi-glib1-x86 is &lt;0.6.23-35.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243999" version="1" comment="libdns_sd-x86 is &lt;0.6.23-35.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209170" version="1" comment="bash-doc is &lt;3.2-147.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209171" version="1" comment="bash-x86 is &lt;3.2-147.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209172" version="1" comment="libreadline5-32bit is &lt;5.2-147.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209173" version="1" comment="libreadline5-x86 is &lt;5.2-147.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209174" version="1" comment="readline-doc is &lt;5.2-147.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209176" version="1" comment="bash-x86 is &lt;3.2-147.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209178" version="1" comment="libreadline5-x86 is &lt;5.2-147.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209180" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209181" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209182" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209183" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209184" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209185" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209186" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209187" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209189" version="1" comment="cairo-x86 is &lt;1.8.8-2.3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209194" version="1" comment="coreutils-x86 is &lt;8.12-6.25.33.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209196" version="1" comment="cracklib-x86 is &lt;2.8.12-56.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242137" version="1" comment="crash-eppic is &lt;7.0.9-30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231498" version="1" comment="cups-libs-x86 is &lt;1.3.9-8.46.56.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209197" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209200" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209203" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209206" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.70.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209209" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.70.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209212" version="1" comment="libcurl4-x86 is &lt;7.37.0-70.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209215" version="1" comment="libcurl4-x86 is &lt;7.37.0-70.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234532" version="1" comment="libcurl4-x86 is &lt;7.37.0-70.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238972" version="1" comment="libcurl4-x86 is &lt;7.37.0-70.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209222" version="1" comment="dnsmasq is &lt;2.71-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209223" version="1" comment="dnsmasq is &lt;2.78-0.17.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209224" version="1" comment="dosfstools is &lt;3.0.26-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209229" version="1" comment="libexpat1-x86 is &lt;2.0.1-88.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209232" version="1" comment="libexpat1-x86 is &lt;2.0.1-88.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209235" version="1" comment="libexpat1-x86 is &lt;2.0.1-88.42.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209237" version="1" comment="libfreebl3-x86 is &lt;3.29.5-47.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209238" version="1" comment="libsoftokn3-x86 is &lt;3.29.5-47.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209239" version="1" comment="mozilla-nss-x86 is &lt;3.29.5-47.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258922" version="1" comment="mozilla-nspr-devel is &lt;4.20-29.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258923" version="1" comment="mozilla-nss-devel is &lt;3.41.1-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209241" version="1" comment="fontconfig-x86 is &lt;2.6.0-10.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209249" version="1" comment="freetype2-x86 is &lt;2.3.7-25.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209252" version="1" comment="freetype2-x86 is &lt;2.3.7-25.45.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209255" version="1" comment="freetype2-x86 is &lt;2.3.7-25.45.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209257" version="1" comment="libatomic1-32bit is &lt;5.3.1+r233831-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209258" version="1" comment="libffi4 is &lt;5.3.1+r233831-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209259" version="1" comment="libffi4-32bit is &lt;5.3.1+r233831-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209286" version="1" comment="giflib-x86 is &lt;4.1.6-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240965" version="1" comment="libgio-2_0-0-x86 is &lt;2.22.5-0.8.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240968" version="1" comment="libglib-2_0-0-x86 is &lt;2.22.5-0.8.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240971" version="1" comment="libgmodule-2_0-0-x86 is &lt;2.22.5-0.8.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240974" version="1" comment="libgobject-2_0-0-x86 is &lt;2.22.5-0.8.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240977" version="1" comment="libgthread-2_0-0-x86 is &lt;2.22.5-0.8.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209293" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.102" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209296" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.102" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209297" version="1" comment="glibc-x86 is &lt;2.11.3-17.102" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209299" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.109" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209300" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.109" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209301" version="1" comment="glibc-x86 is &lt;2.11.3-17.109" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209302" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.110.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209303" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.110.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209304" version="1" comment="glibc-x86 is &lt;2.11.3-17.110.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209305" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.110.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209306" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.110.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209307" version="1" comment="glibc-x86 is &lt;2.11.3-17.110.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209314" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.110.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209317" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.110.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209318" version="1" comment="glibc-x86 is &lt;2.11.3-17.110.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231882" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.110.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231883" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.110.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231884" version="1" comment="glibc-x86 is &lt;2.11.3-17.110.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235456" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.110.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235457" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.110.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235458" version="1" comment="glibc-x86 is &lt;2.11.3-17.110.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241597" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.110.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241598" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.110.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241599" version="1" comment="glibc-x86 is &lt;2.11.3-17.110.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209324" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.39.67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209327" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.39.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246357" version="1" comment="grub2 is &lt;2.00-0.66.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246358" version="1" comment="grub2-x86_64-efi is &lt;2.00-0.66.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246359" version="1" comment="grub2-x86_64-xen is &lt;2.00-0.66.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209331" version="1" comment="gstreamer-0_10-plugins-base-x86 is &lt;0.10.35-5.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209334" version="1" comment="libgstapp-0_10-0-x86 is &lt;0.10.35-5.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209337" version="1" comment="libgstinterfaces-0_10-0-x86 is &lt;0.10.35-5.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209344" version="1" comment="gtk2-x86 is &lt;2.18.9-0.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209348" version="1" comment="gtk2-x86 is &lt;2.18.9-0.45.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233165" version="1" comment="gtk2-x86 is &lt;2.18.9-0.45.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209349" version="1" comment="libicu-doc is &lt;4.0-7.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209350" version="1" comment="libicu-x86 is &lt;4.0-7.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209353" version="1" comment="libicu-x86 is &lt;4.0-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209356" version="1" comment="libicu-x86 is &lt;4.0-43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209359" version="1" comment="libicu-x86 is &lt;4.0-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209362" version="1" comment="libicu-x86 is &lt;4.0-47.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209369" version="1" comment="libjasper-x86 is &lt;1.900.14-134.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209372" version="1" comment="libjasper-x86 is &lt;1.900.14-134.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209375" version="1" comment="libjasper-x86 is &lt;1.900.14-134.33.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209376" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209377" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209378" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.10-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209379" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.20-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209380" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.20-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209381" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.20-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209382" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.30-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209383" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.30-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209384" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.30-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209385" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.40-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209386" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.40-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209387" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.40-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209388" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.60-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209389" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.60-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209390" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.60-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209391" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.1-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209392" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.1-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209393" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.1-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209394" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.5-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209395" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.5-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209396" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.5-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209397" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.10-26.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209398" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.10-26.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209399" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.10-26.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209400" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.15-26.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209401" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.15-26.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209402" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.15-26.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209403" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.20-26.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209404" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.20-26.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209405" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.20-26.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209406" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.25-26.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209407" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.25-26.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209408" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.25-26.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233819" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.30-26.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233820" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.30-26.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233821" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.30-26.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240831" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.35-26.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240832" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.35-26.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240833" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.35-26.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245874" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.40-26.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245875" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.40-26.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245876" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.40-26.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253964" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.45-26.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253965" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.45-26.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260513" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.45-26.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253966" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.45-26.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253967" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.45-26.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263704" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.50-26.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263705" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.50-26.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263706" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.50-26.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263707" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.50-26.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263708" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.50-26.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209409" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.50-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209410" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.50-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209411" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.50-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229526" version="1" comment="libjpeg-x86 is &lt;6.2.0-879.12.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238294" version="1" comment="kdelibs3-default-style-x86 is &lt;3.5.10-23.30.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238295" version="1" comment="kdelibs3-x86 is &lt;3.5.10-23.30.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209412" version="1" comment="kernel-default is &lt;3.0.101-80" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209413" version="1" comment="kernel-default-base is &lt;3.0.101-80" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209414" version="1" comment="kernel-default-devel is &lt;3.0.101-80" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209415" version="1" comment="kernel-default-man is &lt;3.0.101-80" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209416" version="1" comment="kernel-ec2 is &lt;3.0.101-80" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209417" version="1" comment="kernel-ec2-base is &lt;3.0.101-80" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209418" version="1" comment="kernel-ec2-devel is &lt;3.0.101-80" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209419" version="1" comment="kernel-pae is &lt;3.0.101-80" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209420" version="1" comment="kernel-pae-base is &lt;3.0.101-80" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209421" version="1" comment="kernel-pae-devel is &lt;3.0.101-80" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209422" version="1" comment="kernel-ppc64 is &lt;3.0.101-80" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209423" version="1" comment="kernel-ppc64-base is &lt;3.0.101-80" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209424" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-80" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209425" version="1" comment="kernel-source is &lt;3.0.101-80" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209426" version="1" comment="kernel-syms is &lt;3.0.101-80" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209427" version="1" comment="kernel-trace is &lt;3.0.101-80" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209428" version="1" comment="kernel-trace-base is &lt;3.0.101-80" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209429" version="1" comment="kernel-trace-devel is &lt;3.0.101-80" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209430" version="1" comment="kernel-xen is &lt;3.0.101-80" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209431" version="1" comment="kernel-xen-base is &lt;3.0.101-80" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209432" version="1" comment="kernel-xen-devel is &lt;3.0.101-80" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209433" version="1" comment="kernel-bigmem is &lt;3.0.101-88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209434" version="1" comment="kernel-bigmem-base is &lt;3.0.101-88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209435" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209436" version="1" comment="kernel-default is &lt;3.0.101-88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209437" version="1" comment="kernel-default-base is &lt;3.0.101-88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209438" version="1" comment="kernel-default-devel is &lt;3.0.101-88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209439" version="1" comment="kernel-default-man is &lt;3.0.101-88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209440" version="1" comment="kernel-ec2 is &lt;3.0.101-88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209441" version="1" comment="kernel-ec2-base is &lt;3.0.101-88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209442" version="1" comment="kernel-ec2-devel is &lt;3.0.101-88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209443" version="1" comment="kernel-pae is &lt;3.0.101-88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209444" version="1" comment="kernel-pae-base is &lt;3.0.101-88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209445" version="1" comment="kernel-pae-devel is &lt;3.0.101-88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209446" version="1" comment="kernel-ppc64 is &lt;3.0.101-88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209447" version="1" comment="kernel-ppc64-base is &lt;3.0.101-88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209448" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209449" version="1" comment="kernel-source is &lt;3.0.101-88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209450" version="1" comment="kernel-syms is &lt;3.0.101-88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209451" version="1" comment="kernel-trace is &lt;3.0.101-88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209452" version="1" comment="kernel-trace-base is &lt;3.0.101-88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209453" version="1" comment="kernel-trace-devel is &lt;3.0.101-88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209454" version="1" comment="kernel-xen is &lt;3.0.101-88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209455" version="1" comment="kernel-xen-base is &lt;3.0.101-88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209456" version="1" comment="kernel-xen-devel is &lt;3.0.101-88" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209457" version="1" comment="kernel-bigmem is &lt;3.0.101-94" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209458" version="1" comment="kernel-bigmem-base is &lt;3.0.101-94" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209459" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-94" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209460" version="1" comment="kernel-default is &lt;3.0.101-94" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209461" version="1" comment="kernel-default-base is &lt;3.0.101-94" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209462" version="1" comment="kernel-default-devel is &lt;3.0.101-94" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209463" version="1" comment="kernel-default-man is &lt;3.0.101-94" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209464" version="1" comment="kernel-ec2 is &lt;3.0.101-94" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209465" version="1" comment="kernel-ec2-base is &lt;3.0.101-94" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209466" version="1" comment="kernel-ec2-devel is &lt;3.0.101-94" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209467" version="1" comment="kernel-pae is &lt;3.0.101-94" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209468" version="1" comment="kernel-pae-base is &lt;3.0.101-94" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209469" version="1" comment="kernel-pae-devel is &lt;3.0.101-94" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209470" version="1" comment="kernel-ppc64 is &lt;3.0.101-94" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209471" version="1" comment="kernel-ppc64-base is &lt;3.0.101-94" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209472" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-94" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209473" version="1" comment="kernel-source is &lt;3.0.101-94" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209474" version="1" comment="kernel-syms is &lt;3.0.101-94" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209475" version="1" comment="kernel-trace is &lt;3.0.101-94" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209476" version="1" comment="kernel-trace-base is &lt;3.0.101-94" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209477" version="1" comment="kernel-trace-devel is &lt;3.0.101-94" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209478" version="1" comment="kernel-xen is &lt;3.0.101-94" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209479" version="1" comment="kernel-xen-base is &lt;3.0.101-94" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209480" version="1" comment="kernel-xen-devel is &lt;3.0.101-94" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209481" version="1" comment="kernel-bigmem is &lt;3.0.101-97" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209482" version="1" comment="kernel-bigmem-base is &lt;3.0.101-97" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209483" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-97" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209484" version="1" comment="kernel-default is &lt;3.0.101-97" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209485" version="1" comment="kernel-default-base is &lt;3.0.101-97" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209486" version="1" comment="kernel-default-devel is &lt;3.0.101-97" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209487" version="1" comment="kernel-default-man is &lt;3.0.101-97" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209488" version="1" comment="kernel-ec2 is &lt;3.0.101-97" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209489" version="1" comment="kernel-ec2-base is &lt;3.0.101-97" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209490" version="1" comment="kernel-ec2-devel is &lt;3.0.101-97" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209491" version="1" comment="kernel-pae is &lt;3.0.101-97" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209492" version="1" comment="kernel-pae-base is &lt;3.0.101-97" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209493" version="1" comment="kernel-pae-devel is &lt;3.0.101-97" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209494" version="1" comment="kernel-ppc64 is &lt;3.0.101-97" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209495" version="1" comment="kernel-ppc64-base is &lt;3.0.101-97" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209496" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-97" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209497" version="1" comment="kernel-source is &lt;3.0.101-97" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209498" version="1" comment="kernel-syms is &lt;3.0.101-97" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209499" version="1" comment="kernel-trace is &lt;3.0.101-97" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209500" version="1" comment="kernel-trace-base is &lt;3.0.101-97" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209501" version="1" comment="kernel-trace-devel is &lt;3.0.101-97" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209502" version="1" comment="kernel-xen is &lt;3.0.101-97" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209503" version="1" comment="kernel-xen-base is &lt;3.0.101-97" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209504" version="1" comment="kernel-xen-devel is &lt;3.0.101-97" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209505" version="1" comment="kernel-bigmem is &lt;3.0.101-104" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209506" version="1" comment="kernel-bigmem-base is &lt;3.0.101-104" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209507" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-104" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209508" version="1" comment="kernel-default is &lt;3.0.101-104" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209509" version="1" comment="kernel-default-base is &lt;3.0.101-104" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209510" version="1" comment="kernel-default-devel is &lt;3.0.101-104" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209511" version="1" comment="kernel-default-man is &lt;3.0.101-104" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209512" version="1" comment="kernel-ec2 is &lt;3.0.101-104" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209513" version="1" comment="kernel-ec2-base is &lt;3.0.101-104" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209514" version="1" comment="kernel-ec2-devel is &lt;3.0.101-104" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209515" version="1" comment="kernel-pae is &lt;3.0.101-104" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209516" version="1" comment="kernel-pae-base is &lt;3.0.101-104" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209517" version="1" comment="kernel-pae-devel is &lt;3.0.101-104" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209518" version="1" comment="kernel-ppc64 is &lt;3.0.101-104" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209519" version="1" comment="kernel-ppc64-base is &lt;3.0.101-104" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209520" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-104" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209521" version="1" comment="kernel-source is &lt;3.0.101-104" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209522" version="1" comment="kernel-syms is &lt;3.0.101-104" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209523" version="1" comment="kernel-trace is &lt;3.0.101-104" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209524" version="1" comment="kernel-trace-base is &lt;3.0.101-104" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209525" version="1" comment="kernel-trace-devel is &lt;3.0.101-104" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209526" version="1" comment="kernel-xen is &lt;3.0.101-104" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209527" version="1" comment="kernel-xen-base is &lt;3.0.101-104" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209528" version="1" comment="kernel-xen-devel is &lt;3.0.101-104" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209529" version="1" comment="kernel-bigmem is &lt;3.0.101-108.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209530" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209531" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209532" version="1" comment="kernel-default is &lt;3.0.101-108.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209533" version="1" comment="kernel-default-base is &lt;3.0.101-108.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209534" version="1" comment="kernel-default-devel is &lt;3.0.101-108.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209535" version="1" comment="kernel-default-man is &lt;3.0.101-108.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209536" version="1" comment="kernel-ec2 is &lt;3.0.101-108.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209537" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209538" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209539" version="1" comment="kernel-pae is &lt;3.0.101-108.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209540" version="1" comment="kernel-pae-base is &lt;3.0.101-108.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209541" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209542" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209543" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209544" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209545" version="1" comment="kernel-source is &lt;3.0.101-108.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209546" version="1" comment="kernel-syms is &lt;3.0.101-108.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209547" version="1" comment="kernel-trace is &lt;3.0.101-108.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209548" version="1" comment="kernel-trace-base is &lt;3.0.101-108.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209549" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209550" version="1" comment="kernel-xen is &lt;3.0.101-108.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209551" version="1" comment="kernel-xen-base is &lt;3.0.101-108.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209552" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209553" version="1" comment="kernel-bigmem is &lt;3.0.101-108.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209554" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209555" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209556" version="1" comment="kernel-default is &lt;3.0.101-108.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209557" version="1" comment="kernel-default-base is &lt;3.0.101-108.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209558" version="1" comment="kernel-default-devel is &lt;3.0.101-108.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209559" version="1" comment="kernel-default-man is &lt;3.0.101-108.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209560" version="1" comment="kernel-ec2 is &lt;3.0.101-108.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209561" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209562" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209563" version="1" comment="kernel-pae is &lt;3.0.101-108.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209564" version="1" comment="kernel-pae-base is &lt;3.0.101-108.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209565" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209566" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209567" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209568" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209569" version="1" comment="kernel-source is &lt;3.0.101-108.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209570" version="1" comment="kernel-syms is &lt;3.0.101-108.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209571" version="1" comment="kernel-trace is &lt;3.0.101-108.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209572" version="1" comment="kernel-trace-base is &lt;3.0.101-108.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209573" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209574" version="1" comment="kernel-xen is &lt;3.0.101-108.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209575" version="1" comment="kernel-xen-base is &lt;3.0.101-108.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209576" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235459" version="1" comment="kernel-bigmem is &lt;3.0.101-108.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235460" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235461" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235462" version="1" comment="kernel-default is &lt;3.0.101-108.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235463" version="1" comment="kernel-default-base is &lt;3.0.101-108.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235464" version="1" comment="kernel-default-devel is &lt;3.0.101-108.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235465" version="1" comment="kernel-default-man is &lt;3.0.101-108.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235466" version="1" comment="kernel-ec2 is &lt;3.0.101-108.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235467" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235468" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235469" version="1" comment="kernel-pae is &lt;3.0.101-108.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235470" version="1" comment="kernel-pae-base is &lt;3.0.101-108.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235471" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235472" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235473" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235474" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235475" version="1" comment="kernel-source is &lt;3.0.101-108.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235476" version="1" comment="kernel-syms is &lt;3.0.101-108.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235477" version="1" comment="kernel-trace is &lt;3.0.101-108.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235478" version="1" comment="kernel-trace-base is &lt;3.0.101-108.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235479" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235480" version="1" comment="kernel-xen is &lt;3.0.101-108.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235481" version="1" comment="kernel-xen-base is &lt;3.0.101-108.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235482" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209577" version="1" comment="kernel-default-man is &lt;3.0.101-65" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209578" version="1" comment="kernel-ec2 is &lt;3.0.101-65" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209579" version="1" comment="kernel-ec2-base is &lt;3.0.101-65" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209580" version="1" comment="kernel-ec2-devel is &lt;3.0.101-65" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209581" version="1" comment="kernel-ppc64 is &lt;3.0.101-65" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209582" version="1" comment="kernel-ppc64-base is &lt;3.0.101-65" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209583" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-65" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209584" version="1" comment="kernel-trace-base is &lt;3.0.101-65" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209585" version="1" comment="kernel-default-man is &lt;3.0.101-71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209586" version="1" comment="kernel-ec2 is &lt;3.0.101-71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209587" version="1" comment="kernel-ec2-base is &lt;3.0.101-71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209588" version="1" comment="kernel-ec2-devel is &lt;3.0.101-71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209589" version="1" comment="kernel-ppc64 is &lt;3.0.101-71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209590" version="1" comment="kernel-ppc64-base is &lt;3.0.101-71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209591" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209592" version="1" comment="kernel-trace-base is &lt;3.0.101-71" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209593" version="1" comment="kernel-bigmem is &lt;3.0.101-108.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209594" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209595" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209596" version="1" comment="kernel-default is &lt;3.0.101-108.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209597" version="1" comment="kernel-default-base is &lt;3.0.101-108.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209598" version="1" comment="kernel-default-devel is &lt;3.0.101-108.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209599" version="1" comment="kernel-default-man is &lt;3.0.101-108.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209600" version="1" comment="kernel-ec2 is &lt;3.0.101-108.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209601" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209602" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209603" version="1" comment="kernel-pae is &lt;3.0.101-108.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209604" version="1" comment="kernel-pae-base is &lt;3.0.101-108.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209605" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209606" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209607" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209608" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209609" version="1" comment="kernel-source is &lt;3.0.101-108.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209610" version="1" comment="kernel-syms is &lt;3.0.101-108.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209611" version="1" comment="kernel-trace is &lt;3.0.101-108.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209612" version="1" comment="kernel-trace-base is &lt;3.0.101-108.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209613" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209614" version="1" comment="kernel-xen is &lt;3.0.101-108.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209615" version="1" comment="kernel-xen-base is &lt;3.0.101-108.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209616" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209617" version="1" comment="kernel-bigmem is &lt;3.0.101-108.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209618" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209619" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209620" version="1" comment="kernel-default is &lt;3.0.101-108.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209621" version="1" comment="kernel-default-base is &lt;3.0.101-108.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209622" version="1" comment="kernel-default-devel is &lt;3.0.101-108.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209623" version="1" comment="kernel-default-man is &lt;3.0.101-108.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209624" version="1" comment="kernel-ec2 is &lt;3.0.101-108.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209625" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209626" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209627" version="1" comment="kernel-pae is &lt;3.0.101-108.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209628" version="1" comment="kernel-pae-base is &lt;3.0.101-108.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209629" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209630" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209631" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209632" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209633" version="1" comment="kernel-source is &lt;3.0.101-108.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209634" version="1" comment="kernel-syms is &lt;3.0.101-108.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209635" version="1" comment="kernel-trace is &lt;3.0.101-108.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209636" version="1" comment="kernel-trace-base is &lt;3.0.101-108.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209637" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209638" version="1" comment="kernel-xen is &lt;3.0.101-108.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209639" version="1" comment="kernel-xen-base is &lt;3.0.101-108.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209640" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209641" version="1" comment="kernel-default is &lt;3.0.101-108.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209642" version="1" comment="kernel-default-base is &lt;3.0.101-108.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209643" version="1" comment="kernel-default-devel is &lt;3.0.101-108.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209644" version="1" comment="kernel-default-man is &lt;3.0.101-108.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209645" version="1" comment="kernel-source is &lt;3.0.101-108.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209646" version="1" comment="kernel-syms is &lt;3.0.101-108.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209647" version="1" comment="kernel-trace is &lt;3.0.101-108.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209648" version="1" comment="kernel-trace-base is &lt;3.0.101-108.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209649" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209650" version="1" comment="kernel-bigmem is &lt;3.0.101-108.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209651" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209652" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209653" version="1" comment="kernel-default is &lt;3.0.101-108.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209654" version="1" comment="kernel-default-base is &lt;3.0.101-108.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209655" version="1" comment="kernel-default-devel is &lt;3.0.101-108.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209656" version="1" comment="kernel-default-man is &lt;3.0.101-108.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209657" version="1" comment="kernel-ec2 is &lt;3.0.101-108.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209658" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209659" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209660" version="1" comment="kernel-pae is &lt;3.0.101-108.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209661" version="1" comment="kernel-pae-base is &lt;3.0.101-108.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209662" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209663" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209664" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209665" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209666" version="1" comment="kernel-source is &lt;3.0.101-108.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209667" version="1" comment="kernel-syms is &lt;3.0.101-108.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209668" version="1" comment="kernel-trace is &lt;3.0.101-108.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209669" version="1" comment="kernel-trace-base is &lt;3.0.101-108.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209670" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209671" version="1" comment="kernel-xen is &lt;3.0.101-108.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209672" version="1" comment="kernel-xen-base is &lt;3.0.101-108.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209673" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209674" version="1" comment="kernel-bigmem is &lt;3.0.101-108.48" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209675" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.48" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209676" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.48" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209677" version="1" comment="kernel-default is &lt;3.0.101-108.48" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209678" version="1" comment="kernel-default-base is &lt;3.0.101-108.48" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209679" version="1" comment="kernel-default-devel is &lt;3.0.101-108.48" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209680" version="1" comment="kernel-default-man is &lt;3.0.101-108.48" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209681" version="1" comment="kernel-ec2 is &lt;3.0.101-108.48" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209682" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.48" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209683" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.48" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209684" version="1" comment="kernel-pae is &lt;3.0.101-108.48" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209685" version="1" comment="kernel-pae-base is &lt;3.0.101-108.48" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209686" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.48" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209687" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.48" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209688" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.48" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209689" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.48" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209690" version="1" comment="kernel-source is &lt;3.0.101-108.48" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209691" version="1" comment="kernel-syms is &lt;3.0.101-108.48" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209692" version="1" comment="kernel-trace is &lt;3.0.101-108.48" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209693" version="1" comment="kernel-trace-base is &lt;3.0.101-108.48" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209694" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.48" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209695" version="1" comment="kernel-xen is &lt;3.0.101-108.48" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209696" version="1" comment="kernel-xen-base is &lt;3.0.101-108.48" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209697" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.48" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209698" version="1" comment="kernel-bigmem is &lt;3.0.101-108.52" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209699" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.52" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209700" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.52" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209701" version="1" comment="kernel-default is &lt;3.0.101-108.52" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209702" version="1" comment="kernel-default-base is &lt;3.0.101-108.52" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209703" version="1" comment="kernel-default-devel is &lt;3.0.101-108.52" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209704" version="1" comment="kernel-default-man is &lt;3.0.101-108.52" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209705" version="1" comment="kernel-ec2 is &lt;3.0.101-108.52" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209706" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.52" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209707" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.52" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209708" version="1" comment="kernel-pae is &lt;3.0.101-108.52" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209709" version="1" comment="kernel-pae-base is &lt;3.0.101-108.52" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209710" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.52" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209711" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.52" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209712" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.52" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209713" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.52" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209714" version="1" comment="kernel-source is &lt;3.0.101-108.52" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209715" version="1" comment="kernel-syms is &lt;3.0.101-108.52" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209716" version="1" comment="kernel-trace is &lt;3.0.101-108.52" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209717" version="1" comment="kernel-trace-base is &lt;3.0.101-108.52" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209718" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.52" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209719" version="1" comment="kernel-xen is &lt;3.0.101-108.52" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209720" version="1" comment="kernel-xen-base is &lt;3.0.101-108.52" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209721" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.52" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232394" version="1" comment="kernel-bigmem is &lt;3.0.101-108.68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232395" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232396" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232397" version="1" comment="kernel-default is &lt;3.0.101-108.68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232398" version="1" comment="kernel-default-base is &lt;3.0.101-108.68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232399" version="1" comment="kernel-default-devel is &lt;3.0.101-108.68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232400" version="1" comment="kernel-default-man is &lt;3.0.101-108.68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232401" version="1" comment="kernel-ec2 is &lt;3.0.101-108.68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232402" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232403" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232404" version="1" comment="kernel-pae is &lt;3.0.101-108.68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232405" version="1" comment="kernel-pae-base is &lt;3.0.101-108.68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232406" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232407" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232408" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232409" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232410" version="1" comment="kernel-source is &lt;3.0.101-108.68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232411" version="1" comment="kernel-syms is &lt;3.0.101-108.68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232412" version="1" comment="kernel-trace is &lt;3.0.101-108.68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232413" version="1" comment="kernel-trace-base is &lt;3.0.101-108.68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232414" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232415" version="1" comment="kernel-xen is &lt;3.0.101-108.68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232416" version="1" comment="kernel-xen-base is &lt;3.0.101-108.68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232417" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236889" version="1" comment="kernel-bigmem is &lt;3.0.101-108.77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236890" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236891" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236892" version="1" comment="kernel-default is &lt;3.0.101-108.77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236893" version="1" comment="kernel-default-base is &lt;3.0.101-108.77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236894" version="1" comment="kernel-default-devel is &lt;3.0.101-108.77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236895" version="1" comment="kernel-default-man is &lt;3.0.101-108.77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236896" version="1" comment="kernel-ec2 is &lt;3.0.101-108.77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236897" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236898" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236899" version="1" comment="kernel-pae is &lt;3.0.101-108.77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236900" version="1" comment="kernel-pae-base is &lt;3.0.101-108.77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236901" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236902" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236903" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236904" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236905" version="1" comment="kernel-source is &lt;3.0.101-108.77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236906" version="1" comment="kernel-syms is &lt;3.0.101-108.77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236907" version="1" comment="kernel-trace is &lt;3.0.101-108.77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236908" version="1" comment="kernel-trace-base is &lt;3.0.101-108.77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236909" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236910" version="1" comment="kernel-xen is &lt;3.0.101-108.77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236911" version="1" comment="kernel-xen-base is &lt;3.0.101-108.77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236912" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245911" version="1" comment="kernel-bigmem is &lt;3.0.101-108.87" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245912" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.87" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245913" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.87" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245914" version="1" comment="kernel-default is &lt;3.0.101-108.87" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245915" version="1" comment="kernel-default-base is &lt;3.0.101-108.87" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245916" version="1" comment="kernel-default-devel is &lt;3.0.101-108.87" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245917" version="1" comment="kernel-default-man is &lt;3.0.101-108.87" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245918" version="1" comment="kernel-ec2 is &lt;3.0.101-108.87" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245919" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.87" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245920" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.87" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245921" version="1" comment="kernel-pae is &lt;3.0.101-108.87" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245922" version="1" comment="kernel-pae-base is &lt;3.0.101-108.87" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245923" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.87" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245924" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.87" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245925" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.87" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245926" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.87" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245927" version="1" comment="kernel-source is &lt;3.0.101-108.87" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245928" version="1" comment="kernel-syms is &lt;3.0.101-108.87" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245929" version="1" comment="kernel-trace is &lt;3.0.101-108.87" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245930" version="1" comment="kernel-trace-base is &lt;3.0.101-108.87" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245931" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.87" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245932" version="1" comment="kernel-xen is &lt;3.0.101-108.87" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245933" version="1" comment="kernel-xen-base is &lt;3.0.101-108.87" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245934" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.87" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253699" version="1" comment="kernel-bigmem is &lt;3.0.101-108.90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253700" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253701" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253702" version="1" comment="kernel-default is &lt;3.0.101-108.90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253703" version="1" comment="kernel-default-base is &lt;3.0.101-108.90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253704" version="1" comment="kernel-default-devel is &lt;3.0.101-108.90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253705" version="1" comment="kernel-default-man is &lt;3.0.101-108.90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253706" version="1" comment="kernel-ec2 is &lt;3.0.101-108.90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253707" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253708" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253709" version="1" comment="kernel-pae is &lt;3.0.101-108.90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253710" version="1" comment="kernel-pae-base is &lt;3.0.101-108.90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253711" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253712" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253713" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253714" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253715" version="1" comment="kernel-source is &lt;3.0.101-108.90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253716" version="1" comment="kernel-syms is &lt;3.0.101-108.90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253717" version="1" comment="kernel-trace is &lt;3.0.101-108.90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253718" version="1" comment="kernel-trace-base is &lt;3.0.101-108.90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253719" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253720" version="1" comment="kernel-xen is &lt;3.0.101-108.90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253721" version="1" comment="kernel-xen-base is &lt;3.0.101-108.90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253722" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.90" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209722" version="1" comment="kernel-firmware is &lt;20110923-0.59.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209723" version="1" comment="kernel-default-man is &lt;3.0.101-68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209724" version="1" comment="kernel-ec2 is &lt;3.0.101-68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209725" version="1" comment="kernel-ec2-base is &lt;3.0.101-68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209726" version="1" comment="kernel-ec2-devel is &lt;3.0.101-68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209727" version="1" comment="kernel-ppc64 is &lt;3.0.101-68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209728" version="1" comment="kernel-ppc64-base is &lt;3.0.101-68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209729" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209730" version="1" comment="kernel-trace-base is &lt;3.0.101-68" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209731" version="1" comment="kernel-default is &lt;3.0.101-77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209732" version="1" comment="kernel-default-base is &lt;3.0.101-77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209733" version="1" comment="kernel-default-devel is &lt;3.0.101-77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209734" version="1" comment="kernel-default-man is &lt;3.0.101-77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209735" version="1" comment="kernel-ec2 is &lt;3.0.101-77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209736" version="1" comment="kernel-ec2-base is &lt;3.0.101-77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209737" version="1" comment="kernel-ec2-devel is &lt;3.0.101-77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209738" version="1" comment="kernel-pae is &lt;3.0.101-77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209739" version="1" comment="kernel-pae-base is &lt;3.0.101-77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209740" version="1" comment="kernel-pae-devel is &lt;3.0.101-77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209741" version="1" comment="kernel-ppc64 is &lt;3.0.101-77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209742" version="1" comment="kernel-ppc64-base is &lt;3.0.101-77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209743" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209744" version="1" comment="kernel-source is &lt;3.0.101-77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209745" version="1" comment="kernel-syms is &lt;3.0.101-77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209746" version="1" comment="kernel-trace is &lt;3.0.101-77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209747" version="1" comment="kernel-trace-base is &lt;3.0.101-77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209748" version="1" comment="kernel-trace-devel is &lt;3.0.101-77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209749" version="1" comment="kernel-xen is &lt;3.0.101-77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209750" version="1" comment="kernel-xen-base is &lt;3.0.101-77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209751" version="1" comment="kernel-xen-devel is &lt;3.0.101-77" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209752" version="1" comment="kernel-default is &lt;3.0.101-84" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209753" version="1" comment="kernel-default-base is &lt;3.0.101-84" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209754" version="1" comment="kernel-default-devel is &lt;3.0.101-84" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209755" version="1" comment="kernel-default-man is &lt;3.0.101-84" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209756" version="1" comment="kernel-ec2 is &lt;3.0.101-84" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209757" version="1" comment="kernel-ec2-base is &lt;3.0.101-84" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209758" version="1" comment="kernel-ec2-devel is &lt;3.0.101-84" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209759" version="1" comment="kernel-pae is &lt;3.0.101-84" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209760" version="1" comment="kernel-pae-base is &lt;3.0.101-84" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209761" version="1" comment="kernel-pae-devel is &lt;3.0.101-84" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209762" version="1" comment="kernel-ppc64 is &lt;3.0.101-84" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209763" version="1" comment="kernel-ppc64-base is &lt;3.0.101-84" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209764" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-84" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209765" version="1" comment="kernel-source is &lt;3.0.101-84" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209766" version="1" comment="kernel-syms is &lt;3.0.101-84" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209767" version="1" comment="kernel-trace is &lt;3.0.101-84" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209768" version="1" comment="kernel-trace-base is &lt;3.0.101-84" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209769" version="1" comment="kernel-trace-devel is &lt;3.0.101-84" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209770" version="1" comment="kernel-xen is &lt;3.0.101-84" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209771" version="1" comment="kernel-xen-base is &lt;3.0.101-84" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209772" version="1" comment="kernel-xen-devel is &lt;3.0.101-84" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209773" version="1" comment="kernel-bigmem is &lt;3.0.101-107" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209774" version="1" comment="kernel-bigmem-base is &lt;3.0.101-107" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209775" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-107" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209776" version="1" comment="kernel-default is &lt;3.0.101-107" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209777" version="1" comment="kernel-default-base is &lt;3.0.101-107" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209778" version="1" comment="kernel-default-devel is &lt;3.0.101-107" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209779" version="1" comment="kernel-default-man is &lt;3.0.101-107" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209780" version="1" comment="kernel-ec2 is &lt;3.0.101-107" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209781" version="1" comment="kernel-ec2-base is &lt;3.0.101-107" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209782" version="1" comment="kernel-ec2-devel is &lt;3.0.101-107" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209783" version="1" comment="kernel-pae is &lt;3.0.101-107" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209784" version="1" comment="kernel-pae-base is &lt;3.0.101-107" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209785" version="1" comment="kernel-pae-devel is &lt;3.0.101-107" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209786" version="1" comment="kernel-ppc64 is &lt;3.0.101-107" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209787" version="1" comment="kernel-ppc64-base is &lt;3.0.101-107" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209788" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-107" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209789" version="1" comment="kernel-source is &lt;3.0.101-107" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209790" version="1" comment="kernel-syms is &lt;3.0.101-107" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209791" version="1" comment="kernel-trace is &lt;3.0.101-107" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209792" version="1" comment="kernel-trace-base is &lt;3.0.101-107" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209793" version="1" comment="kernel-trace-devel is &lt;3.0.101-107" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209794" version="1" comment="kernel-xen is &lt;3.0.101-107" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209795" version="1" comment="kernel-xen-base is &lt;3.0.101-107" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209796" version="1" comment="kernel-xen-devel is &lt;3.0.101-107" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209797" version="1" comment="kernel-bigmem is &lt;3.0.101-108.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209798" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209799" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209800" version="1" comment="kernel-default is &lt;3.0.101-108.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209801" version="1" comment="kernel-default-base is &lt;3.0.101-108.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209802" version="1" comment="kernel-default-devel is &lt;3.0.101-108.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209803" version="1" comment="kernel-default-man is &lt;3.0.101-108.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209804" version="1" comment="kernel-ec2 is &lt;3.0.101-108.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209805" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209806" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209807" version="1" comment="kernel-pae is &lt;3.0.101-108.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209808" version="1" comment="kernel-pae-base is &lt;3.0.101-108.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209809" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209810" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209811" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209812" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209813" version="1" comment="kernel-source is &lt;3.0.101-108.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209814" version="1" comment="kernel-syms is &lt;3.0.101-108.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209815" version="1" comment="kernel-trace is &lt;3.0.101-108.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209816" version="1" comment="kernel-trace-base is &lt;3.0.101-108.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209817" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209818" version="1" comment="kernel-xen is &lt;3.0.101-108.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209819" version="1" comment="kernel-xen-base is &lt;3.0.101-108.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209820" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229527" version="1" comment="kernel-bigmem is &lt;3.0.101-108.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229528" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229529" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229530" version="1" comment="kernel-default is &lt;3.0.101-108.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229531" version="1" comment="kernel-default-base is &lt;3.0.101-108.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229532" version="1" comment="kernel-default-devel is &lt;3.0.101-108.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229533" version="1" comment="kernel-default-man is &lt;3.0.101-108.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229534" version="1" comment="kernel-ec2 is &lt;3.0.101-108.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229535" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229536" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229537" version="1" comment="kernel-pae is &lt;3.0.101-108.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229538" version="1" comment="kernel-pae-base is &lt;3.0.101-108.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229539" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229540" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229541" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229542" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229543" version="1" comment="kernel-source is &lt;3.0.101-108.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229544" version="1" comment="kernel-syms is &lt;3.0.101-108.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229545" version="1" comment="kernel-trace is &lt;3.0.101-108.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229546" version="1" comment="kernel-trace-base is &lt;3.0.101-108.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229547" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229548" version="1" comment="kernel-xen is &lt;3.0.101-108.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229549" version="1" comment="kernel-xen-base is &lt;3.0.101-108.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229550" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230753" version="1" comment="kernel-bigmem is &lt;3.0.101-108.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230754" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230755" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230756" version="1" comment="kernel-default is &lt;3.0.101-108.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230757" version="1" comment="kernel-default-base is &lt;3.0.101-108.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230758" version="1" comment="kernel-default-devel is &lt;3.0.101-108.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230759" version="1" comment="kernel-default-man is &lt;3.0.101-108.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230760" version="1" comment="kernel-ec2 is &lt;3.0.101-108.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230761" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230762" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230763" version="1" comment="kernel-pae is &lt;3.0.101-108.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230764" version="1" comment="kernel-pae-base is &lt;3.0.101-108.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230765" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230766" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230767" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230768" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230769" version="1" comment="kernel-source is &lt;3.0.101-108.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230770" version="1" comment="kernel-syms is &lt;3.0.101-108.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230771" version="1" comment="kernel-trace is &lt;3.0.101-108.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230772" version="1" comment="kernel-trace-base is &lt;3.0.101-108.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230773" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230774" version="1" comment="kernel-xen is &lt;3.0.101-108.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230775" version="1" comment="kernel-xen-base is &lt;3.0.101-108.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230776" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239149" version="1" comment="kernel-bigmem is &lt;3.0.101-108.81" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239150" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.81" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239151" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.81" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239152" version="1" comment="kernel-default is &lt;3.0.101-108.81" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239153" version="1" comment="kernel-default-base is &lt;3.0.101-108.81" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239154" version="1" comment="kernel-default-devel is &lt;3.0.101-108.81" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239155" version="1" comment="kernel-default-man is &lt;3.0.101-108.81" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239156" version="1" comment="kernel-ec2 is &lt;3.0.101-108.81" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239157" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.81" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239158" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.81" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239159" version="1" comment="kernel-pae is &lt;3.0.101-108.81" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239160" version="1" comment="kernel-pae-base is &lt;3.0.101-108.81" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239161" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.81" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239162" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.81" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239163" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.81" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239164" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.81" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239165" version="1" comment="kernel-source is &lt;3.0.101-108.81" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239166" version="1" comment="kernel-syms is &lt;3.0.101-108.81" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239167" version="1" comment="kernel-trace is &lt;3.0.101-108.81" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239168" version="1" comment="kernel-trace-base is &lt;3.0.101-108.81" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239169" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.81" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239170" version="1" comment="kernel-xen is &lt;3.0.101-108.81" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239171" version="1" comment="kernel-xen-base is &lt;3.0.101-108.81" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239172" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.81" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257213" version="1" comment="kernel-bigmem is &lt;3.0.101-108.95" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257214" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.95" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257215" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.95" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257216" version="1" comment="kernel-default is &lt;3.0.101-108.95" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257217" version="1" comment="kernel-default-base is &lt;3.0.101-108.95" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257218" version="1" comment="kernel-default-devel is &lt;3.0.101-108.95" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257219" version="1" comment="kernel-default-man is &lt;3.0.101-108.95" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257220" version="1" comment="kernel-ec2 is &lt;3.0.101-108.95" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257221" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.95" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257222" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.95" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257223" version="1" comment="kernel-pae is &lt;3.0.101-108.95" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257224" version="1" comment="kernel-pae-base is &lt;3.0.101-108.95" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257225" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.95" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257226" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.95" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257227" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.95" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257228" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.95" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257229" version="1" comment="kernel-source is &lt;3.0.101-108.95" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257230" version="1" comment="kernel-syms is &lt;3.0.101-108.95" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257231" version="1" comment="kernel-trace is &lt;3.0.101-108.95" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257232" version="1" comment="kernel-trace-base is &lt;3.0.101-108.95" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257233" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.95" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257234" version="1" comment="kernel-xen is &lt;3.0.101-108.95" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257235" version="1" comment="kernel-xen-base is &lt;3.0.101-108.95" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257236" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.95" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260032" version="1" comment="kernel-bigmem is &lt;3.0.101-108.98" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260033" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.98" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260034" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.98" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260035" version="1" comment="kernel-default is &lt;3.0.101-108.98" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260036" version="1" comment="kernel-default-base is &lt;3.0.101-108.98" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260037" version="1" comment="kernel-default-devel is &lt;3.0.101-108.98" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260038" version="1" comment="kernel-default-man is &lt;3.0.101-108.98" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260039" version="1" comment="kernel-ec2 is &lt;3.0.101-108.98" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260040" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.98" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260041" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.98" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260042" version="1" comment="kernel-pae is &lt;3.0.101-108.98" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260043" version="1" comment="kernel-pae-base is &lt;3.0.101-108.98" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260044" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.98" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260045" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.98" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260046" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.98" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260047" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.98" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260048" version="1" comment="kernel-source is &lt;3.0.101-108.98" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260049" version="1" comment="kernel-syms is &lt;3.0.101-108.98" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260050" version="1" comment="kernel-trace is &lt;3.0.101-108.98" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260051" version="1" comment="kernel-trace-base is &lt;3.0.101-108.98" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260052" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.98" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260053" version="1" comment="kernel-xen is &lt;3.0.101-108.98" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260054" version="1" comment="kernel-xen-base is &lt;3.0.101-108.98" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260055" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.98" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263156" version="1" comment="kernel-bigmem is &lt;3.0.101-108.101" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263157" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.101" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263158" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.101" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263159" version="1" comment="kernel-default is &lt;3.0.101-108.101" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263160" version="1" comment="kernel-default-base is &lt;3.0.101-108.101" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263161" version="1" comment="kernel-default-devel is &lt;3.0.101-108.101" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263162" version="1" comment="kernel-default-man is &lt;3.0.101-108.101" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263163" version="1" comment="kernel-ec2 is &lt;3.0.101-108.101" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263164" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.101" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263165" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.101" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263166" version="1" comment="kernel-pae is &lt;3.0.101-108.101" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263167" version="1" comment="kernel-pae-base is &lt;3.0.101-108.101" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263168" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.101" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263169" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.101" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263170" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.101" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263171" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.101" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263172" version="1" comment="kernel-source is &lt;3.0.101-108.101" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263173" version="1" comment="kernel-syms is &lt;3.0.101-108.101" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263174" version="1" comment="kernel-trace is &lt;3.0.101-108.101" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263175" version="1" comment="kernel-trace-base is &lt;3.0.101-108.101" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263176" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.101" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263177" version="1" comment="kernel-xen is &lt;3.0.101-108.101" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263178" version="1" comment="kernel-xen-base is &lt;3.0.101-108.101" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263179" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.101" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209821" version="1" comment="kernel-bigmem is &lt;3.0.101-108.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209822" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209823" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209824" version="1" comment="kernel-default is &lt;3.0.101-108.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209825" version="1" comment="kernel-default-base is &lt;3.0.101-108.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209826" version="1" comment="kernel-default-devel is &lt;3.0.101-108.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209827" version="1" comment="kernel-default-man is &lt;3.0.101-108.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209828" version="1" comment="kernel-ec2 is &lt;3.0.101-108.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209829" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209830" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209831" version="1" comment="kernel-pae is &lt;3.0.101-108.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209832" version="1" comment="kernel-pae-base is &lt;3.0.101-108.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209833" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209834" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209835" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209836" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209837" version="1" comment="kernel-source is &lt;3.0.101-108.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209838" version="1" comment="kernel-syms is &lt;3.0.101-108.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209839" version="1" comment="kernel-trace is &lt;3.0.101-108.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209840" version="1" comment="kernel-trace-base is &lt;3.0.101-108.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209841" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209842" version="1" comment="kernel-xen is &lt;3.0.101-108.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209843" version="1" comment="kernel-xen-base is &lt;3.0.101-108.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209844" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209845" version="1" comment="kernel-bigmem is &lt;3.0.101-108.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209846" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209847" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209848" version="1" comment="kernel-default is &lt;3.0.101-108.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209849" version="1" comment="kernel-default-base is &lt;3.0.101-108.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209850" version="1" comment="kernel-default-devel is &lt;3.0.101-108.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209851" version="1" comment="kernel-default-man is &lt;3.0.101-108.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209852" version="1" comment="kernel-ec2 is &lt;3.0.101-108.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209853" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209854" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209855" version="1" comment="kernel-pae is &lt;3.0.101-108.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209856" version="1" comment="kernel-pae-base is &lt;3.0.101-108.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209857" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209858" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209859" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209860" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209861" version="1" comment="kernel-source is &lt;3.0.101-108.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209862" version="1" comment="kernel-syms is &lt;3.0.101-108.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209863" version="1" comment="kernel-trace is &lt;3.0.101-108.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209864" version="1" comment="kernel-trace-base is &lt;3.0.101-108.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209865" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209866" version="1" comment="kernel-xen is &lt;3.0.101-108.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209867" version="1" comment="kernel-xen-base is &lt;3.0.101-108.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209868" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.41" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229365" version="1" comment="iscsitarget-kmp-bigmem is &lt;1.4.20_3.0.101_108.52-0.43.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229366" version="1" comment="iscsitarget-kmp-default is &lt;1.4.20_3.0.101_108.52-0.43.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229367" version="1" comment="iscsitarget-kmp-pae is &lt;1.4.20_3.0.101_108.52-0.43.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229368" version="1" comment="iscsitarget-kmp-ppc64 is &lt;1.4.20_3.0.101_108.52-0.43.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229369" version="1" comment="iscsitarget-kmp-trace is &lt;1.4.20_3.0.101_108.52-0.43.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229370" version="1" comment="iscsitarget-kmp-xen is &lt;1.4.20_3.0.101_108.52-0.43.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229371" version="1" comment="ofed-doc is &lt;1.5.4.1-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229372" version="1" comment="ofed-kmp-bigmem is &lt;1.5.4.1_3.0.101_108.52-22.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229373" version="1" comment="ofed-kmp-default is &lt;1.5.4.1_3.0.101_108.52-22.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229374" version="1" comment="ofed-kmp-pae is &lt;1.5.4.1_3.0.101_108.52-22.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229375" version="1" comment="ofed-kmp-ppc64 is &lt;1.5.4.1_3.0.101_108.52-22.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229376" version="1" comment="ofed-kmp-trace is &lt;1.5.4.1_3.0.101_108.52-22.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246628" version="1" comment="iscsitarget-kmp-bigmem is &lt;1.4.20_3.0.101_108.87-0.43.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246629" version="1" comment="iscsitarget-kmp-default is &lt;1.4.20_3.0.101_108.87-0.43.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246630" version="1" comment="iscsitarget-kmp-pae is &lt;1.4.20_3.0.101_108.87-0.43.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246631" version="1" comment="iscsitarget-kmp-ppc64 is &lt;1.4.20_3.0.101_108.87-0.43.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246632" version="1" comment="iscsitarget-kmp-trace is &lt;1.4.20_3.0.101_108.87-0.43.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246633" version="1" comment="iscsitarget-kmp-xen is &lt;1.4.20_3.0.101_108.87-0.43.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246634" version="1" comment="ofed-doc is &lt;1.5.4.1-22.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246635" version="1" comment="ofed-kmp-bigmem is &lt;1.5.4.1_3.0.101_108.87-22.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246636" version="1" comment="ofed-kmp-default is &lt;1.5.4.1_3.0.101_108.87-22.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246637" version="1" comment="ofed-kmp-pae is &lt;1.5.4.1_3.0.101_108.87-22.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246638" version="1" comment="ofed-kmp-ppc64 is &lt;1.5.4.1_3.0.101_108.87-22.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246639" version="1" comment="ofed-kmp-trace is &lt;1.5.4.1_3.0.101_108.87-22.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246640" version="1" comment="oracleasm is &lt;2.0.5-7.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246641" version="1" comment="oracleasm-kmp-bigmem is &lt;2.0.5_3.0.101_108.87-7.44.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246642" version="1" comment="oracleasm-kmp-default is &lt;2.0.5_3.0.101_108.87-7.44.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246643" version="1" comment="oracleasm-kmp-pae is &lt;2.0.5_3.0.101_108.87-7.44.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246644" version="1" comment="oracleasm-kmp-ppc64 is &lt;2.0.5_3.0.101_108.87-7.44.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246645" version="1" comment="oracleasm-kmp-trace is &lt;2.0.5_3.0.101_108.87-7.44.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246646" version="1" comment="oracleasm-kmp-xen is &lt;2.0.5_3.0.101_108.87-7.44.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209871" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.106" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209876" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.109" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209877" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.113.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209878" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.113.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209879" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.113.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209880" version="1" comment="krb5-client is &lt;1.6.3-133.49.113.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209881" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.113.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209882" version="1" comment="kvm is &lt;1.4.2-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209883" version="1" comment="kvm is &lt;1.4.2-47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209884" version="1" comment="kvm is &lt;1.4.2-50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209885" version="1" comment="kvm is &lt;1.4.2-59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209886" version="1" comment="kvm is &lt;1.4.2-60.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209887" version="1" comment="kvm is &lt;1.4.2-60.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209888" version="1" comment="kvm is &lt;1.4.2-60.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209889" version="1" comment="kvm is &lt;1.4.2-60.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234102" version="1" comment="kvm is &lt;1.4.2-60.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241002" version="1" comment="kvm is &lt;1.4.2-60.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244300" version="1" comment="kvm is &lt;1.4.2-60.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253833" version="1" comment="kvm is &lt;1.4.2-60.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262608" version="1" comment="kvm is &lt;1.4.2-60.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209891" version="1" comment="libapr-util1-32bit is &lt;1.3.4-12.22.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209893" version="1" comment="libapr1-32bit is &lt;1.3.3-11.18.19.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209901" version="1" comment="libdb-4_5-x86 is &lt;4.5.20-97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209904" version="1" comment="libexif-x86 is &lt;0.6.17-2.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209907" version="1" comment="libgcrypt11-x86 is &lt;1.5.0-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209910" version="1" comment="libgcrypt11-x86 is &lt;1.5.0-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209913" version="1" comment="libidn-x86 is &lt;1.10-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209915" version="1" comment="libidn-x86 is &lt;1.10-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209923" version="1" comment="libpng12-0-x86 is &lt;1.2.31-5.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209925" version="1" comment="libsamplerate-x86 is &lt;0.1.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009056063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209927" version="1" comment="libsndfile-x86 is &lt;1.0.20-2.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209929" version="1" comment="libsndfile-x86 is &lt;1.0.20-2.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209931" version="1" comment="libsndfile-x86 is &lt;1.0.20-2.19.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246797" version="1" comment="libsndfile-x86 is &lt;1.0.20-2.19.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252448" version="1" comment="libssh2-1 is &lt;1.4.3-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252449" version="1" comment="libssh2_org is &lt;1.4.3-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258012" version="1" comment="libssh2-1 is &lt;1.4.3-17.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258013" version="1" comment="libssh2_org is &lt;1.4.3-17.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209933" version="1" comment="libvirt-lock-sanlock is &lt;1.2.5-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209934" version="1" comment="libvirt-client is &lt;1.2.5-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209935" version="1" comment="libvirt-client-32bit is &lt;1.2.5-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209936" version="1" comment="libvirt-doc is &lt;1.2.5-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209937" version="1" comment="libvirt-lock-sanlock is &lt;1.2.5-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209938" version="1" comment="perl-Sys-Virt is &lt;1.2.5-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209939" version="1" comment="libvirt-client is &lt;1.2.5-23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209940" version="1" comment="libvirt-client-32bit is &lt;1.2.5-23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209941" version="1" comment="libvirt-doc is &lt;1.2.5-23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209942" version="1" comment="libvirt-lock-sanlock is &lt;1.2.5-23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209943" version="1" comment="libvirt-client is &lt;1.2.5-23.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209944" version="1" comment="libvirt-client-32bit is &lt;1.2.5-23.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209945" version="1" comment="libvirt-doc is &lt;1.2.5-23.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209946" version="1" comment="libvirt-lock-sanlock is &lt;1.2.5-23.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209947" version="1" comment="libvirt-client is &lt;1.2.5-23.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209948" version="1" comment="libvirt-client-32bit is &lt;1.2.5-23.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209949" version="1" comment="libvirt-doc is &lt;1.2.5-23.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209950" version="1" comment="libvirt-lock-sanlock is &lt;1.2.5-23.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258014" version="1" comment="libvirt is &lt;1.2.5-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258015" version="1" comment="libvirt-client is &lt;1.2.5-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258016" version="1" comment="libvirt-client-32bit is &lt;1.2.5-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258017" version="1" comment="libvirt-doc is &lt;1.2.5-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258018" version="1" comment="libvirt-lock-sanlock is &lt;1.2.5-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261585" version="1" comment="libvirt is &lt;1.2.5-23.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261586" version="1" comment="libvirt-client is &lt;1.2.5-23.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261587" version="1" comment="libvirt-client-32bit is &lt;1.2.5-23.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261588" version="1" comment="libvirt-doc is &lt;1.2.5-23.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261589" version="1" comment="libvirt-lock-sanlock is &lt;1.2.5-23.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261590" version="1" comment="libvirt-python is &lt;1.2.5-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209953" version="1" comment="libvorbis-x86 is &lt;1.2.0-79.20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209956" version="1" comment="libvorbis-x86 is &lt;1.2.0-79.20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209959" version="1" comment="libvorbis-x86 is &lt;1.2.0-79.20.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209962" version="1" comment="libvorbis-x86 is &lt;1.2.0-79.20.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209966" version="1" comment="libxml2-x86 is &lt;2.7.6-0.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209967" version="1" comment="libxml2-x86 is &lt;2.7.6-0.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209971" version="1" comment="libxml2-x86 is &lt;2.7.6-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209975" version="1" comment="libxml2-x86 is &lt;2.7.6-0.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209976" version="1" comment="libxml2-x86 is &lt;2.7.6-0.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209980" version="1" comment="libxml2-x86 is &lt;2.7.6-0.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209984" version="1" comment="libxml2-x86 is &lt;2.7.6-0.77.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209988" version="1" comment="libxml2-x86 is &lt;2.7.6-0.77.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246175" version="1" comment="libxml2-x86 is &lt;2.7.6-0.77.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209990" version="1" comment="libxslt-x86 is &lt;1.1.24-19.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209991" version="1" comment="kernel-bigmem is &lt;3.0.101-91" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209992" version="1" comment="kernel-bigmem-base is &lt;3.0.101-91" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209993" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-91" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209994" version="1" comment="kernel-default is &lt;3.0.101-91" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209995" version="1" comment="kernel-default-base is &lt;3.0.101-91" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209996" version="1" comment="kernel-default-devel is &lt;3.0.101-91" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209997" version="1" comment="kernel-default-man is &lt;3.0.101-91" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209998" version="1" comment="kernel-ec2 is &lt;3.0.101-91" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009209999" version="1" comment="kernel-ec2-base is &lt;3.0.101-91" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210000" version="1" comment="kernel-ec2-devel is &lt;3.0.101-91" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210001" version="1" comment="kernel-pae is &lt;3.0.101-91" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210002" version="1" comment="kernel-pae-base is &lt;3.0.101-91" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210003" version="1" comment="kernel-pae-devel is &lt;3.0.101-91" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210004" version="1" comment="kernel-ppc64 is &lt;3.0.101-91" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210005" version="1" comment="kernel-ppc64-base is &lt;3.0.101-91" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210006" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-91" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210007" version="1" comment="kernel-source is &lt;3.0.101-91" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210008" version="1" comment="kernel-syms is &lt;3.0.101-91" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210009" version="1" comment="kernel-trace is &lt;3.0.101-91" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210010" version="1" comment="kernel-trace-base is &lt;3.0.101-91" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210011" version="1" comment="kernel-trace-devel is &lt;3.0.101-91" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210012" version="1" comment="kernel-xen is &lt;3.0.101-91" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210013" version="1" comment="kernel-xen-base is &lt;3.0.101-91" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210014" version="1" comment="kernel-xen-devel is &lt;3.0.101-91" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210015" version="1" comment="kernel-bigmem is &lt;3.0.101-100" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210016" version="1" comment="kernel-bigmem-base is &lt;3.0.101-100" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210017" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-100" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210018" version="1" comment="kernel-default is &lt;3.0.101-100" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210019" version="1" comment="kernel-default-base is &lt;3.0.101-100" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210020" version="1" comment="kernel-default-devel is &lt;3.0.101-100" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210021" version="1" comment="kernel-default-man is &lt;3.0.101-100" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210022" version="1" comment="kernel-ec2 is &lt;3.0.101-100" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210023" version="1" comment="kernel-ec2-base is &lt;3.0.101-100" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210024" version="1" comment="kernel-ec2-devel is &lt;3.0.101-100" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210025" version="1" comment="kernel-pae is &lt;3.0.101-100" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210026" version="1" comment="kernel-pae-base is &lt;3.0.101-100" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210027" version="1" comment="kernel-pae-devel is &lt;3.0.101-100" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210028" version="1" comment="kernel-ppc64 is &lt;3.0.101-100" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210029" version="1" comment="kernel-ppc64-base is &lt;3.0.101-100" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210030" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-100" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210031" version="1" comment="kernel-source is &lt;3.0.101-100" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210032" version="1" comment="kernel-syms is &lt;3.0.101-100" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210033" version="1" comment="kernel-trace is &lt;3.0.101-100" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210034" version="1" comment="kernel-trace-base is &lt;3.0.101-100" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210035" version="1" comment="kernel-trace-devel is &lt;3.0.101-100" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210036" version="1" comment="kernel-xen is &lt;3.0.101-100" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210037" version="1" comment="kernel-xen-base is &lt;3.0.101-100" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210038" version="1" comment="kernel-xen-devel is &lt;3.0.101-100" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210039" version="1" comment="libfreebl3-x86 is &lt;3.21.3-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210040" version="1" comment="libsoftokn3-x86 is &lt;3.21.3-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210041" version="1" comment="mozilla-nss-x86 is &lt;3.21.3-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210045" version="1" comment="libmysql55client18-x86 is &lt;5.5.49-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210051" version="1" comment="libmysqlclient15-x86 is &lt;5.0.96-0.8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210053" version="1" comment="libmysql55client18-x86 is &lt;5.5.52-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210056" version="1" comment="libmysql55client18-x86 is &lt;5.5.53-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210060" version="1" comment="libmysql55client18-x86 is &lt;5.5.54-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210063" version="1" comment="libmysql55client18-x86 is &lt;5.5.55-0.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210069" version="1" comment="libmysql55client18-x86 is &lt;5.5.57-0.39.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210073" version="1" comment="libmysql55client18-x86 is &lt;5.5.58-0.39.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210076" version="1" comment="libmysql55client18-x86 is &lt;5.5.59-0.39.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210082" version="1" comment="libmysql55client18-x86 is &lt;5.5.60-0.39.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232742" version="1" comment="libmysql55client18-x86 is &lt;5.5.61-0.39.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238400" version="1" comment="libmysql55client18-x86 is &lt;5.5.62-0.39.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223532" version="1" comment="nautilus-x86 is &lt;2.28.4-1.16.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009061790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210088" version="1" comment="libncurses5-x86 is &lt;5.6-92" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210091" version="1" comment="libncurses6-x86 is &lt;5.6-92" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210097" version="1" comment="libncurses5-x86 is &lt;5.6-93.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210100" version="1" comment="libncurses6-x86 is &lt;5.6-93.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210106" version="1" comment="libncurses5-x86 is &lt;5.6-93.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210109" version="1" comment="libncurses6-x86 is &lt;5.6-93.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210115" version="1" comment="libncurses5-x86 is &lt;5.6-93.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210118" version="1" comment="libncurses6-x86 is &lt;5.6-93.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210124" version="1" comment="libnetpbm10-x86 is &lt;10.26.44-101.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210127" version="1" comment="libtasn1-3-x86 is &lt;1.5-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210128" version="1" comment="ntp is &lt;4.2.8p9-57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210129" version="1" comment="ntp-doc is &lt;4.2.8p9-57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210130" version="1" comment="ntp is &lt;4.2.8p11-64.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210131" version="1" comment="ntp-doc is &lt;4.2.8p11-64.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237965" version="1" comment="ntp is &lt;4.2.8p12-64.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237966" version="1" comment="ntp-doc is &lt;4.2.8p12-64.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246361" version="1" comment="ntp is &lt;4.2.8p13-64.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246362" version="1" comment="ntp-doc is &lt;4.2.8p13-64.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210132" version="1" comment="libvmtools0 is &lt;10.1.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210133" version="1" comment="open-vm-tools is &lt;10.1.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210134" version="1" comment="open-vm-tools-desktop is &lt;10.1.0-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238595" version="1" comment="libopensc2-x86 is &lt;0.11.6-5.27.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238597" version="1" comment="opensc-x86 is &lt;0.11.6-5.27.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230003" version="1" comment="openslp-x86 is &lt;1.2.0-172.27.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210135" version="1" comment="openssh-fips is &lt;6.6p1-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210136" version="1" comment="openssh is &lt;6.6p1-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210137" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210138" version="1" comment="openssh-fips is &lt;6.6p1-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210139" version="1" comment="openssh-helpers is &lt;6.6p1-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210140" version="1" comment="openssh is &lt;6.6p1-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210141" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210142" version="1" comment="openssh-fips is &lt;6.6p1-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210143" version="1" comment="openssh-helpers is &lt;6.6p1-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210144" version="1" comment="openssh is &lt;6.6p1-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210145" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210146" version="1" comment="openssh-fips is &lt;6.6p1-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210147" version="1" comment="openssh-helpers is &lt;6.6p1-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231612" version="1" comment="openssh is &lt;6.6p1-36.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231613" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-36.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231614" version="1" comment="openssh-fips is &lt;6.6p1-36.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231615" version="1" comment="openssh-helpers is &lt;6.6p1-36.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239307" version="1" comment="openssh is &lt;6.6p1-36.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239308" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-36.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239309" version="1" comment="openssh-fips is &lt;6.6p1-36.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239310" version="1" comment="openssh-helpers is &lt;6.6p1-36.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243187" version="1" comment="openssh is &lt;6.6p1-36.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243188" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-36.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243189" version="1" comment="openssh-fips is &lt;6.6p1-36.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243190" version="1" comment="openssh-helpers is &lt;6.6p1-36.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251994" version="1" comment="openssh is &lt;6.6p1-36.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251995" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-36.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251996" version="1" comment="openssh-fips is &lt;6.6p1-36.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251997" version="1" comment="openssh-helpers is &lt;6.6p1-36.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210148" version="1" comment="openssh-fips is &lt;6.6p1-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210149" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210150" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210151" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.102" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210152" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210157" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.106.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231344" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.106.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233302" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.106.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242436" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.106.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210159" version="1" comment="pam-32bit is &lt;1.1.5-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210160" version="1" comment="pam-doc is &lt;1.1.5-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210161" version="1" comment="pam-x86 is &lt;1.1.5-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229381" version="1" comment="pam-modules is &lt;11-1.27.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229382" version="1" comment="pam-modules-32bit is &lt;11-1.27.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229383" version="1" comment="pam-modules-x86 is &lt;11-1.27.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235180" version="1" comment="pam_pkcs11-x86 is &lt;0.6.0-141.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210167" version="1" comment="perl-x86 is &lt;5.10.0-64.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210173" version="1" comment="perl-x86 is &lt;5.10.0-64.81.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210179" version="1" comment="perl-x86 is &lt;5.10.0-64.81.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230380" version="1" comment="perl-x86 is &lt;5.10.0-64.81.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210668" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.9-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210670" version="1" comment="python-base-x86 is &lt;2.6.9-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210672" version="1" comment="python-x86 is &lt;2.6.9-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210676" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.9-40.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210678" version="1" comment="python-base-x86 is &lt;2.6.9-40.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210680" version="1" comment="python-x86 is &lt;2.6.9-40.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229386" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.9-40.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229388" version="1" comment="python-base-x86 is &lt;2.6.9-40.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229390" version="1" comment="python-x86 is &lt;2.6.9-40.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009064998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232746" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.9-40.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232747" version="1" comment="python-base-x86 is &lt;2.6.9-40.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232748" version="1" comment="python-x86 is &lt;2.6.9-40.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237361" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.9-40.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237363" version="1" comment="python-base-x86 is &lt;2.6.9-40.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237365" version="1" comment="python-x86 is &lt;2.6.9-40.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210687" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210688" version="1" comment="libtalloc2-x86 is &lt;3.6.3-67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210689" version="1" comment="libtdb1-x86 is &lt;3.6.3-67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210690" version="1" comment="libtevent0-x86 is &lt;3.6.3-67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210691" version="1" comment="libwbclient0-x86 is &lt;3.6.3-67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210692" version="1" comment="samba-client-x86 is &lt;3.6.3-67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210693" version="1" comment="samba-winbind-x86 is &lt;3.6.3-67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210694" version="1" comment="samba-x86 is &lt;3.6.3-67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210695" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210696" version="1" comment="libtalloc2-x86 is &lt;3.6.3-76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210697" version="1" comment="libtdb1-x86 is &lt;3.6.3-76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210698" version="1" comment="libtevent0-x86 is &lt;3.6.3-76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210699" version="1" comment="libwbclient0-x86 is &lt;3.6.3-76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210700" version="1" comment="samba-client-x86 is &lt;3.6.3-76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210701" version="1" comment="samba-winbind-x86 is &lt;3.6.3-76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210702" version="1" comment="samba-x86 is &lt;3.6.3-76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210703" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210704" version="1" comment="libtalloc2-x86 is &lt;3.6.3-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210705" version="1" comment="libtdb1-x86 is &lt;3.6.3-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210706" version="1" comment="libtevent0-x86 is &lt;3.6.3-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210707" version="1" comment="libwbclient0-x86 is &lt;3.6.3-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210708" version="1" comment="samba-client-x86 is &lt;3.6.3-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210709" version="1" comment="samba-winbind-x86 is &lt;3.6.3-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210710" version="1" comment="samba-x86 is &lt;3.6.3-84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210715" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210718" version="1" comment="libtalloc2-x86 is &lt;3.6.3-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210721" version="1" comment="libtdb1-x86 is &lt;3.6.3-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210724" version="1" comment="libtevent0-x86 is &lt;3.6.3-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210727" version="1" comment="libwbclient0-x86 is &lt;3.6.3-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210731" version="1" comment="samba-client-x86 is &lt;3.6.3-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210736" version="1" comment="samba-winbind-x86 is &lt;3.6.3-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210737" version="1" comment="samba-x86 is &lt;3.6.3-87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210738" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210739" version="1" comment="libtalloc2-x86 is &lt;3.6.3-90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210740" version="1" comment="libtdb1-x86 is &lt;3.6.3-90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210741" version="1" comment="libtevent0-x86 is &lt;3.6.3-90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210742" version="1" comment="libwbclient0-x86 is &lt;3.6.3-90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210743" version="1" comment="samba-client-x86 is &lt;3.6.3-90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210744" version="1" comment="samba-winbind-x86 is &lt;3.6.3-90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210745" version="1" comment="samba-x86 is &lt;3.6.3-90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210746" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210747" version="1" comment="libtalloc2-x86 is &lt;3.6.3-93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210748" version="1" comment="libtdb1-x86 is &lt;3.6.3-93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210749" version="1" comment="libtevent0-x86 is &lt;3.6.3-93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210750" version="1" comment="libwbclient0-x86 is &lt;3.6.3-93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210751" version="1" comment="samba-client-x86 is &lt;3.6.3-93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210752" version="1" comment="samba-winbind-x86 is &lt;3.6.3-93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210753" version="1" comment="samba-x86 is &lt;3.6.3-93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210754" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-94.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210755" version="1" comment="libtalloc2-x86 is &lt;3.6.3-94.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210756" version="1" comment="libtdb1-x86 is &lt;3.6.3-94.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210757" version="1" comment="libtevent0-x86 is &lt;3.6.3-94.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210758" version="1" comment="libwbclient0-x86 is &lt;3.6.3-94.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210759" version="1" comment="samba-client-x86 is &lt;3.6.3-94.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210760" version="1" comment="samba-winbind-x86 is &lt;3.6.3-94.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210761" version="1" comment="samba-x86 is &lt;3.6.3-94.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210762" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-94.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210763" version="1" comment="libtalloc2-x86 is &lt;3.6.3-94.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210764" version="1" comment="libtdb1-x86 is &lt;3.6.3-94.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210765" version="1" comment="libtevent0-x86 is &lt;3.6.3-94.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210766" version="1" comment="libwbclient0-x86 is &lt;3.6.3-94.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210767" version="1" comment="samba-client-x86 is &lt;3.6.3-94.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210768" version="1" comment="samba-winbind-x86 is &lt;3.6.3-94.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210769" version="1" comment="samba-x86 is &lt;3.6.3-94.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210774" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-94.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210777" version="1" comment="libtalloc2-x86 is &lt;3.6.3-94.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210780" version="1" comment="libtdb1-x86 is &lt;3.6.3-94.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210783" version="1" comment="libtevent0-x86 is &lt;3.6.3-94.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210786" version="1" comment="libwbclient0-x86 is &lt;3.6.3-94.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210790" version="1" comment="samba-client-x86 is &lt;3.6.3-94.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210795" version="1" comment="samba-winbind-x86 is &lt;3.6.3-94.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210796" version="1" comment="samba-x86 is &lt;3.6.3-94.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232193" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-94.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232194" version="1" comment="libtalloc2-x86 is &lt;3.6.3-94.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232195" version="1" comment="libtdb1-x86 is &lt;3.6.3-94.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232196" version="1" comment="libtevent0-x86 is &lt;3.6.3-94.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232197" version="1" comment="libwbclient0-x86 is &lt;3.6.3-94.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232198" version="1" comment="samba-client-x86 is &lt;3.6.3-94.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232199" version="1" comment="samba-winbind-x86 is &lt;3.6.3-94.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232200" version="1" comment="samba-x86 is &lt;3.6.3-94.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210797" version="1" comment="libtevent0-x86 is &lt;3.6.3-64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210799" version="1" comment="libspice-server1 is &lt;0.12.4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210800" version="1" comment="libspice-server1 is &lt;0.12.4-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210801" version="1" comment="libspice-server1 is &lt;0.12.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233808" version="1" comment="libspice-server1 is &lt;0.12.4-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243935" version="1" comment="libspice-server1 is &lt;0.12.4-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210804" version="1" comment="libsqlite3-0-x86 is &lt;3.7.6.3-1.4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246751" version="1" comment="libsqlite3-0-x86 is &lt;3.7.6.3-1.4.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210812" version="1" comment="strongswan is &lt;4.4.0-6.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210813" version="1" comment="strongswan-doc is &lt;4.4.0-6.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210824" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.163" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210827" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.168" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210830" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.169.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210833" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.169.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229552" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.169.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234385" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.169.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238090" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.169.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009240662" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.169.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241794" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.169.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246753" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.169.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210842" version="1" comment="tomcat6 is &lt;6.0.41-0.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210843" version="1" comment="tomcat6-admin-webapps is &lt;6.0.41-0.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210844" version="1" comment="tomcat6-docs-webapp is &lt;6.0.41-0.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210845" version="1" comment="tomcat6-javadoc is &lt;6.0.41-0.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210846" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.41-0.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210847" version="1" comment="tomcat6-lib is &lt;6.0.41-0.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210848" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.41-0.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210849" version="1" comment="tomcat6-webapps is &lt;6.0.41-0.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210874" version="1" comment="xen-doc-html is &lt;4.4.4_07-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210875" version="1" comment="xen-kmp-default is &lt;4.4.4_07_3.0.101_77-37" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210876" version="1" comment="xen-kmp-pae is &lt;4.4.4_07_3.0.101_77-37" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210877" version="1" comment="xen-libs is &lt;4.4.4_07-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210878" version="1" comment="xen-libs-32bit is &lt;4.4.4_07-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210879" version="1" comment="xen-tools is &lt;4.4.4_07-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210880" version="1" comment="xen-tools-domU is &lt;4.4.4_07-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210881" version="1" comment="xen-doc-html is &lt;4.4.4_08-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210882" version="1" comment="xen-kmp-default is &lt;4.4.4_08_3.0.101_80-40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210883" version="1" comment="xen-kmp-pae is &lt;4.4.4_08_3.0.101_80-40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210884" version="1" comment="xen-libs is &lt;4.4.4_08-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210885" version="1" comment="xen-libs-32bit is &lt;4.4.4_08-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210886" version="1" comment="xen-tools is &lt;4.4.4_08-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210887" version="1" comment="xen-tools-domU is &lt;4.4.4_08-40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210888" version="1" comment="xen-doc-html is &lt;4.4.4_10-43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210889" version="1" comment="xen-kmp-default is &lt;4.4.4_10_3.0.101_88-43" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210890" version="1" comment="xen-kmp-pae is &lt;4.4.4_10_3.0.101_88-43" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210891" version="1" comment="xen-libs is &lt;4.4.4_10-43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210892" version="1" comment="xen-libs-32bit is &lt;4.4.4_10-43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210893" version="1" comment="xen-tools is &lt;4.4.4_10-43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210894" version="1" comment="xen-tools-domU is &lt;4.4.4_10-43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210895" version="1" comment="xen-doc-html is &lt;4.4.4_12-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210896" version="1" comment="xen-kmp-default is &lt;4.4.4_12_3.0.101_91-46" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210897" version="1" comment="xen-kmp-pae is &lt;4.4.4_12_3.0.101_91-46" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210898" version="1" comment="xen-libs is &lt;4.4.4_12-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210899" version="1" comment="xen-libs-32bit is &lt;4.4.4_12-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210900" version="1" comment="xen-tools is &lt;4.4.4_12-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210901" version="1" comment="xen-tools-domU is &lt;4.4.4_12-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210902" version="1" comment="xen-doc-html is &lt;4.4.4_14-51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210903" version="1" comment="xen-kmp-default is &lt;4.4.4_14_3.0.101_94-51" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210904" version="1" comment="xen-kmp-pae is &lt;4.4.4_14_3.0.101_94-51" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210905" version="1" comment="xen-libs is &lt;4.4.4_14-51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210906" version="1" comment="xen-libs-32bit is &lt;4.4.4_14-51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210907" version="1" comment="xen-tools is &lt;4.4.4_14-51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210908" version="1" comment="xen-tools-domU is &lt;4.4.4_14-51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210909" version="1" comment="xen-doc-html is &lt;4.4.4_16-54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210910" version="1" comment="xen-kmp-default is &lt;4.4.4_16_3.0.101_97-54" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210911" version="1" comment="xen-kmp-pae is &lt;4.4.4_16_3.0.101_97-54" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210912" version="1" comment="xen-libs is &lt;4.4.4_16-54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210913" version="1" comment="xen-libs-32bit is &lt;4.4.4_16-54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210914" version="1" comment="xen-tools is &lt;4.4.4_16-54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210915" version="1" comment="xen-tools-domU is &lt;4.4.4_16-54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210916" version="1" comment="xen-doc-html is &lt;4.4.4_18-57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210917" version="1" comment="xen-kmp-default is &lt;4.4.4_18_3.0.101_97-57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210918" version="1" comment="xen-kmp-pae is &lt;4.4.4_18_3.0.101_97-57" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210919" version="1" comment="xen-libs is &lt;4.4.4_18-57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210920" version="1" comment="xen-libs-32bit is &lt;4.4.4_18-57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210921" version="1" comment="xen-tools is &lt;4.4.4_18-57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210922" version="1" comment="xen-tools-domU is &lt;4.4.4_18-57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210923" version="1" comment="xen-doc-html is &lt;4.4.4_20-60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210924" version="1" comment="xen-kmp-default is &lt;4.4.4_20_3.0.101_104-60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210925" version="1" comment="xen-kmp-pae is &lt;4.4.4_20_3.0.101_104-60" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210926" version="1" comment="xen-libs is &lt;4.4.4_20-60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210927" version="1" comment="xen-libs-32bit is &lt;4.4.4_20-60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210928" version="1" comment="xen-tools is &lt;4.4.4_20-60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210929" version="1" comment="xen-tools-domU is &lt;4.4.4_20-60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210930" version="1" comment="xen-doc-html is &lt;4.4.4_22-61.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210931" version="1" comment="xen-kmp-default is &lt;4.4.4_22_3.0.101_108.7-61.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210932" version="1" comment="xen-kmp-pae is &lt;4.4.4_22_3.0.101_108.7-61.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210933" version="1" comment="xen-libs is &lt;4.4.4_22-61.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210934" version="1" comment="xen-libs-32bit is &lt;4.4.4_22-61.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210935" version="1" comment="xen-tools is &lt;4.4.4_22-61.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210936" version="1" comment="xen-tools-domU is &lt;4.4.4_22-61.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210937" version="1" comment="xen-doc-html is &lt;4.4.4_24-61.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210938" version="1" comment="xen-kmp-default is &lt;4.4.4_24_3.0.101_108.10-61.12" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210939" version="1" comment="xen-kmp-pae is &lt;4.4.4_24_3.0.101_108.10-61.12" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210940" version="1" comment="xen-libs is &lt;4.4.4_24-61.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210941" version="1" comment="xen-libs-32bit is &lt;4.4.4_24-61.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210942" version="1" comment="xen-tools is &lt;4.4.4_24-61.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210943" version="1" comment="xen-tools-domU is &lt;4.4.4_24-61.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210944" version="1" comment="xen-doc-html is &lt;4.4.4_26-61.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210945" version="1" comment="xen-kmp-default is &lt;4.4.4_26_3.0.101_108.13-61.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210946" version="1" comment="xen-kmp-pae is &lt;4.4.4_26_3.0.101_108.13-61.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210947" version="1" comment="xen-libs is &lt;4.4.4_26-61.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210948" version="1" comment="xen-libs-32bit is &lt;4.4.4_26-61.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210949" version="1" comment="xen-tools is &lt;4.4.4_26-61.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210950" version="1" comment="xen-tools-domU is &lt;4.4.4_26-61.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210951" version="1" comment="xen-doc-html is &lt;4.4.4_28-61.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210952" version="1" comment="xen-kmp-default is &lt;4.4.4_28_3.0.101_108.35-61.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210953" version="1" comment="xen-kmp-pae is &lt;4.4.4_28_3.0.101_108.35-61.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210954" version="1" comment="xen-libs is &lt;4.4.4_28-61.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210955" version="1" comment="xen-libs-32bit is &lt;4.4.4_28-61.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210956" version="1" comment="xen-tools is &lt;4.4.4_28-61.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210957" version="1" comment="xen-tools-domU is &lt;4.4.4_28-61.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210958" version="1" comment="xen-doc-html is &lt;4.4.4_30-61.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210959" version="1" comment="xen-kmp-default is &lt;4.4.4_30_3.0.101_108.38-61.26" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210960" version="1" comment="xen-kmp-pae is &lt;4.4.4_30_3.0.101_108.38-61.26" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210961" version="1" comment="xen-libs is &lt;4.4.4_30-61.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210962" version="1" comment="xen-libs-32bit is &lt;4.4.4_30-61.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210963" version="1" comment="xen-tools is &lt;4.4.4_30-61.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210964" version="1" comment="xen-tools-domU is &lt;4.4.4_30-61.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210965" version="1" comment="xen-doc-html is &lt;4.4.4_32-61.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210966" version="1" comment="xen-kmp-default is &lt;4.4.4_32_3.0.101_108.52-61.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210967" version="1" comment="xen-kmp-pae is &lt;4.4.4_32_3.0.101_108.52-61.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210968" version="1" comment="xen-libs is &lt;4.4.4_32-61.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210969" version="1" comment="xen-libs-32bit is &lt;4.4.4_32-61.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210970" version="1" comment="xen-tools is &lt;4.4.4_32-61.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210971" version="1" comment="xen-tools-domU is &lt;4.4.4_32-61.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230610" version="1" comment="xen-doc-html is &lt;4.4.4_34-61.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230611" version="1" comment="xen-kmp-default is &lt;4.4.4_34_3.0.101_108.57-61.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230612" version="1" comment="xen-kmp-pae is &lt;4.4.4_34_3.0.101_108.57-61.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230613" version="1" comment="xen-libs is &lt;4.4.4_34-61.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230614" version="1" comment="xen-libs-32bit is &lt;4.4.4_34-61.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230615" version="1" comment="xen-tools is &lt;4.4.4_34-61.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230616" version="1" comment="xen-tools-domU is &lt;4.4.4_34-61.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233227" version="1" comment="xen-doc-html is &lt;4.4.4_36-61.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233228" version="1" comment="xen-kmp-default is &lt;4.4.4_36_3.0.101_108.68-61.37" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233229" version="1" comment="xen-kmp-pae is &lt;4.4.4_36_3.0.101_108.68-61.37" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233230" version="1" comment="xen-libs is &lt;4.4.4_36-61.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233231" version="1" comment="xen-libs-32bit is &lt;4.4.4_36-61.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233232" version="1" comment="xen-tools is &lt;4.4.4_36-61.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233233" version="1" comment="xen-tools-domU is &lt;4.4.4_36-61.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242599" version="1" comment="xen-doc-html is &lt;4.4.4_38-61.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242600" version="1" comment="xen-kmp-default is &lt;4.4.4_38_3.0.101_108.84-61.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242601" version="1" comment="xen-kmp-pae is &lt;4.4.4_38_3.0.101_108.84-61.40" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242602" version="1" comment="xen-libs is &lt;4.4.4_38-61.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242603" version="1" comment="xen-libs-32bit is &lt;4.4.4_38-61.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242604" version="1" comment="xen-tools is &lt;4.4.4_38-61.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242605" version="1" comment="xen-tools-domU is &lt;4.4.4_38-61.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246754" version="1" comment="xen-doc-html is &lt;4.4.4_40-61.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246755" version="1" comment="xen-kmp-default is &lt;4.4.4_40_3.0.101_108.87-61.43" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246756" version="1" comment="xen-kmp-pae is &lt;4.4.4_40_3.0.101_108.87-61.43" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246757" version="1" comment="xen-libs is &lt;4.4.4_40-61.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246758" version="1" comment="xen-libs-32bit is &lt;4.4.4_40-61.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246759" version="1" comment="xen-tools is &lt;4.4.4_40-61.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246760" version="1" comment="xen-tools-domU is &lt;4.4.4_40-61.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254264" version="1" comment="xen is &lt;4.4.4_40-61.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254265" version="1" comment="xen-doc-html is &lt;4.4.4_40-61.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254266" version="1" comment="xen-kmp-default is &lt;4.4.4_40_3.0.101_108.90-61.46" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254267" version="1" comment="xen-kmp-pae is &lt;4.4.4_40_3.0.101_108.90-61.46" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254268" version="1" comment="xen-libs is &lt;4.4.4_40-61.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254269" version="1" comment="xen-libs-32bit is &lt;4.4.4_40-61.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254270" version="1" comment="xen-tools is &lt;4.4.4_40-61.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254271" version="1" comment="xen-tools-domU is &lt;4.4.4_40-61.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210973" version="1" comment="xorg-x11-libICE-x86 is &lt;7.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210975" version="1" comment="xorg-x11-libX11-x86 is &lt;7.4-5.11.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210977" version="1" comment="xorg-x11-libX11-x86 is &lt;7.4-5.11.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235624" version="1" comment="xorg-x11-libX11-x86 is &lt;7.4-5.11.72.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210978" version="1" comment="xorg-x11-libXdmcp-x86 is &lt;7.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210980" version="1" comment="xorg-x11-libXfixes-x86 is &lt;7.4-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210982" version="1" comment="xorg-x11-libXpm-x86 is &lt;7.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210984" version="1" comment="xorg-x11-libXrender-x86 is &lt;7.4-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210986" version="1" comment="xorg-x11-libXv-x86 is &lt;7.4-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210988" version="1" comment="xorg-x11-libs-x86 is &lt;7.4-8.26.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210990" version="1" comment="xorg-x11-libs-x86 is &lt;7.4-8.26.50.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235032" version="1" comment="xorg-x11-libs-x86 is &lt;7.4-8.26.50.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210995" version="1" comment="yast2-storage-lib is &lt;2.17.161-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251880" version="1" comment="zlib-x86 is &lt;1.2.7-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009210999" version="1" comment="krb5 is &lt;1.6.3-133.49.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211000" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211001" version="1" comment="krb5-client is &lt;1.6.3-133.49.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211002" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211003" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211004" version="1" comment="krb5-server is &lt;1.6.3-133.49.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211005" version="1" comment="krb5-devel is &lt;1.6.3-133.49.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211006" version="1" comment="krb5-devel-32bit is &lt;1.6.3-133.49.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211007" version="1" comment="hplip is &lt;3.9.8-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211008" version="1" comment="hplip-hpijs is &lt;3.9.8-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211009" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.27.39_0.3-7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264070" version="1" comment="ext4dev-kmp-pae is &lt;0_2.6.27.39_0.3-7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211010" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.27.39_0.3-7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264071" version="1" comment="ext4dev-kmp-vmi is &lt;0_2.6.27.39_0.3-7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230102" version="1" comment="ext4dev-kmp-xen is &lt;0_2.6.27.39_0.3-7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211011" version="1" comment="kernel-default is &lt;2.6.27.39-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211012" version="1" comment="kernel-default-base is &lt;2.6.27.39-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264072" version="1" comment="kernel-default-man is &lt;2.6.27.39-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211013" version="1" comment="kernel-kdump is &lt;2.6.27.39-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264073" version="1" comment="kernel-pae is &lt;2.6.27.39-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264074" version="1" comment="kernel-pae-base is &lt;2.6.27.39-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211014" version="1" comment="kernel-ppc64 is &lt;2.6.27.39-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211015" version="1" comment="kernel-ppc64-base is &lt;2.6.27.39-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211016" version="1" comment="kernel-source is &lt;2.6.27.39-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211017" version="1" comment="kernel-syms is &lt;2.6.27.39-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264075" version="1" comment="kernel-vmi is &lt;2.6.27.39-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264076" version="1" comment="kernel-vmi-base is &lt;2.6.27.39-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230103" version="1" comment="kernel-xen is &lt;2.6.27.39-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230104" version="1" comment="kernel-xen-base is &lt;2.6.27.39-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211018" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211020" version="1" comment="openssl is &lt;0.9.8j-0.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211021" version="1" comment="openssl-doc is &lt;0.9.8j-0.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211019" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215685" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211022" version="1" comment="libmysqlclient15 is &lt;5.0.67-13.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211024" version="1" comment="libmysqlclient_r15 is &lt;5.0.67-13.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211025" version="1" comment="mysql is &lt;5.0.67-13.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211026" version="1" comment="mysql-Max is &lt;5.0.67-13.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211027" version="1" comment="mysql-client is &lt;5.0.67-13.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211023" version="1" comment="libmysqlclient15-32bit is &lt;5.0.67-13.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211028" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.1-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264077" version="1" comment="java-1_4_2-ibm-jdbc is &lt;1.4.2_sr13.1-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264078" version="1" comment="java-1_4_2-ibm-plugin is &lt;1.4.2_sr13.1-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061210" version="1" comment="MozillaFirefox is &lt;3.5.10-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211029" version="1" comment="MozillaFirefox-translations is &lt;3.5.10-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054025" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.13-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054016" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.13-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054021" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.13-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054024" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.13-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264079" version="1" comment="mozilla-xulrunner190-x86 is &lt;1.9.0.13-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211030" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.10-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211032" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.10-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211033" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.10-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211031" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.10-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051730" version="1" comment="MozillaFirefox is &lt;3.0.7-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051729" version="1" comment="MozillaFirefox-translations is &lt;3.0.7-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051740" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.7-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051736" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.7-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051739" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.7-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051731" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.7-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211034" version="1" comment="libsndfile is &lt;1.0.17-172.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211035" version="1" comment="libsndfile-32bit is &lt;1.0.17-172.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211036" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr7.0-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264081" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr7.0-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211037" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr7.0-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211038" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr7.0-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264082" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr7.0-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211039" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211040" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211041" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211042" version="1" comment="ghostscript-library is &lt;8.62-32.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211043" version="1" comment="ghostscript-omni is &lt;8.62-32.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211044" version="1" comment="ghostscript-x11 is &lt;8.62-32.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211045" version="1" comment="libgimpprint is &lt;4.2.7-32.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211046" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-30.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211048" version="1" comment="openssl is &lt;0.9.8h-30.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211049" version="1" comment="openssl-doc is &lt;0.9.8h-30.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211047" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8h-30.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052302" version="1" comment="MozillaFirefox is &lt;3.0.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052301" version="1" comment="MozillaFirefox-translations is &lt;3.0.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211050" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.27.21_0.1-7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211052" version="1" comment="kernel-default is &lt;2.6.27.21-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211053" version="1" comment="kernel-default-base is &lt;2.6.27.21-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211057" version="1" comment="kernel-source is &lt;2.6.27.21-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211058" version="1" comment="kernel-syms is &lt;2.6.27.21-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211059" version="1" comment="bind is &lt;9.5.0P2-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211060" version="1" comment="bind-chrootenv is &lt;9.5.0P2-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211061" version="1" comment="bind-doc is &lt;9.5.0P2-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211062" version="1" comment="bind-libs is &lt;9.5.0P2-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211064" version="1" comment="bind-utils is &lt;9.5.0P2-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211063" version="1" comment="bind-libs-32bit is &lt;9.5.0P2-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211065" version="1" comment="strongswan is &lt;4.2.8-1.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211066" version="1" comment="strongswan-doc is &lt;4.2.8-1.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211067" version="1" comment="libpoppler-glib4 is &lt;0.10.1-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211068" version="1" comment="libpoppler-qt4-3 is &lt;0.10.1-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211069" version="1" comment="libpoppler4 is &lt;0.10.1-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211070" version="1" comment="poppler-tools is &lt;0.10.1-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052546" version="1" comment="MozillaFirefox is &lt;3.0.8-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052545" version="1" comment="MozillaFirefox-translations is &lt;3.0.8-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052556" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.8-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052552" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.8-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052555" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.8-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052547" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.8-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211071" version="1" comment="java-1_6_0-ibm is &lt;1.6.0-124.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264084" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0-124.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211072" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0-124.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211073" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0-124.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264085" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0-124.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211074" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264086" version="1" comment="java-1_4_2-ibm-jdbc is &lt;1.4.2_sr13.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264087" version="1" comment="java-1_4_2-ibm-plugin is &lt;1.4.2_sr13.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053602" version="1" comment="MozillaFirefox is &lt;3.0.12-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053601" version="1" comment="MozillaFirefox-translations is &lt;3.0.12-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053612" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.12-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053603" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.12-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053608" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.12-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053611" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.12-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264088" version="1" comment="mozilla-xulrunner190-x86 is &lt;1.9.0.12-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264089" version="1" comment="pango is &lt;1.22.1-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264090" version="1" comment="pango-32bit is &lt;1.22.1-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264091" version="1" comment="pango-doc is &lt;1.22.1-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264092" version="1" comment="pango-x86 is &lt;1.22.1-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211075" version="1" comment="apache2 is &lt;2.2.10-2.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211076" version="1" comment="apache2-doc is &lt;2.2.10-2.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211077" version="1" comment="apache2-example-pages is &lt;2.2.10-2.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211078" version="1" comment="apache2-prefork is &lt;2.2.10-2.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211079" version="1" comment="apache2-utils is &lt;2.2.10-2.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211080" version="1" comment="apache2-worker is &lt;2.2.10-2.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036296" version="1" comment="clamav is &lt;0.95-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211081" version="1" comment="apache2-mod_php5 is &lt;5.2.6-50.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211082" version="1" comment="php5 is &lt;5.2.6-50.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211083" version="1" comment="php5-bcmath is &lt;5.2.6-50.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211084" version="1" comment="php5-bz2 is &lt;5.2.6-50.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211085" version="1" comment="php5-calendar is &lt;5.2.6-50.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211086" version="1" comment="php5-ctype is &lt;5.2.6-50.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211087" version="1" comment="php5-curl is &lt;5.2.6-50.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211088" version="1" comment="php5-dba is &lt;5.2.6-50.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211089" version="1" comment="php5-dbase is &lt;5.2.6-50.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211090" version="1" comment="php5-dom is &lt;5.2.6-50.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211091" version="1" comment="php5-exif is &lt;5.2.6-50.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211092" version="1" comment="php5-fastcgi is &lt;5.2.6-50.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211093" version="1" comment="php5-ftp is &lt;5.2.6-50.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211094" version="1" comment="php5-gd is &lt;5.2.6-50.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211095" version="1" comment="php5-gettext is &lt;5.2.6-50.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211096" version="1" comment="php5-gmp is &lt;5.2.6-50.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211097" version="1" comment="php5-hash is &lt;5.2.6-50.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211098" version="1" comment="php5-iconv is &lt;5.2.6-50.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211099" version="1" comment="php5-json is &lt;5.2.6-50.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211100" version="1" comment="php5-ldap is &lt;5.2.6-50.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211101" version="1" comment="php5-mbstring is &lt;5.2.6-50.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211102" version="1" comment="php5-mcrypt is &lt;5.2.6-50.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211103" version="1" comment="php5-mysql is &lt;5.2.6-50.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211104" version="1" comment="php5-odbc is &lt;5.2.6-50.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211105" version="1" comment="php5-openssl is &lt;5.2.6-50.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211106" version="1" comment="php5-pcntl is &lt;5.2.6-50.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211107" version="1" comment="php5-pdo is &lt;5.2.6-50.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211108" version="1" comment="php5-pear is &lt;5.2.6-50.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211109" version="1" comment="php5-pgsql is &lt;5.2.6-50.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211110" version="1" comment="php5-pspell is &lt;5.2.6-50.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211111" version="1" comment="php5-shmop is &lt;5.2.6-50.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211112" version="1" comment="php5-snmp is &lt;5.2.6-50.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211113" version="1" comment="php5-soap is &lt;5.2.6-50.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211114" version="1" comment="php5-suhosin is &lt;5.2.6-50.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211115" version="1" comment="php5-sysvmsg is &lt;5.2.6-50.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211116" version="1" comment="php5-sysvsem is &lt;5.2.6-50.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211117" version="1" comment="php5-sysvshm is &lt;5.2.6-50.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211118" version="1" comment="php5-tokenizer is &lt;5.2.6-50.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211119" version="1" comment="php5-wddx is &lt;5.2.6-50.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211120" version="1" comment="php5-xmlreader is &lt;5.2.6-50.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211121" version="1" comment="php5-xmlrpc is &lt;5.2.6-50.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211122" version="1" comment="php5-xmlwriter is &lt;5.2.6-50.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211123" version="1" comment="php5-xsl is &lt;5.2.6-50.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211124" version="1" comment="php5-zip is &lt;5.2.6-50.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211125" version="1" comment="php5-zlib is &lt;5.2.6-50.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211126" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.27.25_0.1-7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264093" version="1" comment="ext4dev-kmp-pae is &lt;0_2.6.27.25_0.1-7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211127" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.27.25_0.1-7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264094" version="1" comment="ext4dev-kmp-vmi is &lt;0_2.6.27.25_0.1-7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230108" version="1" comment="ext4dev-kmp-xen is &lt;0_2.6.27.25_0.1-7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211128" version="1" comment="kernel-default is &lt;2.6.27.25-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211129" version="1" comment="kernel-default-base is &lt;2.6.27.25-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264095" version="1" comment="kernel-default-man is &lt;2.6.27.25-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211130" version="1" comment="kernel-kdump is &lt;2.6.27.25-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264096" version="1" comment="kernel-pae is &lt;2.6.27.25-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264097" version="1" comment="kernel-pae-base is &lt;2.6.27.25-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211131" version="1" comment="kernel-ppc64 is &lt;2.6.27.25-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211132" version="1" comment="kernel-ppc64-base is &lt;2.6.27.25-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211133" version="1" comment="kernel-source is &lt;2.6.27.25-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211134" version="1" comment="kernel-syms is &lt;2.6.27.25-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264098" version="1" comment="kernel-vmi is &lt;2.6.27.25-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264099" version="1" comment="kernel-vmi-base is &lt;2.6.27.25-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230109" version="1" comment="kernel-xen is &lt;2.6.27.25-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230110" version="1" comment="kernel-xen-base is &lt;2.6.27.25-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211135" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.27.48_0.1-7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264100" version="1" comment="ext4dev-kmp-pae is &lt;0_2.6.27.48_0.1-7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211136" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.27.48_0.1-7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264101" version="1" comment="ext4dev-kmp-vmi is &lt;0_2.6.27.48_0.1-7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230111" version="1" comment="ext4dev-kmp-xen is &lt;0_2.6.27.48_0.1-7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211137" version="1" comment="kernel-default is &lt;2.6.27.48-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211138" version="1" comment="kernel-default-base is &lt;2.6.27.48-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264102" version="1" comment="kernel-default-man is &lt;2.6.27.48-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211139" version="1" comment="kernel-kdump is &lt;2.6.27.48-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264103" version="1" comment="kernel-pae is &lt;2.6.27.48-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264104" version="1" comment="kernel-pae-base is &lt;2.6.27.48-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211140" version="1" comment="kernel-ppc64 is &lt;2.6.27.48-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211141" version="1" comment="kernel-ppc64-base is &lt;2.6.27.48-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211142" version="1" comment="kernel-source is &lt;2.6.27.48-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211143" version="1" comment="kernel-syms is &lt;2.6.27.48-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264105" version="1" comment="kernel-vmi is &lt;2.6.27.48-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264106" version="1" comment="kernel-vmi-base is &lt;2.6.27.48-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230112" version="1" comment="kernel-xen is &lt;2.6.27.48-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230113" version="1" comment="kernel-xen-base is &lt;2.6.27.48-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052919" version="1" comment="MozillaFirefox is &lt;3.0.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052918" version="1" comment="MozillaFirefox-translations is &lt;3.0.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052929" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.11-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052920" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.11-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052925" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.11-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052928" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.11-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264107" version="1" comment="mozilla-xulrunner190-x86 is &lt;1.9.0.11-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211144" version="1" comment="MozillaFirefox is &lt;3.5.4-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211145" version="1" comment="MozillaFirefox-translations is &lt;3.5.4-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056046" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.15-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056037" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.15-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056042" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.15-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056045" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.15-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265434" version="1" comment="mozilla-xulrunner190-x86 is &lt;1.9.0.15-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211146" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211148" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211149" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211147" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211150" version="1" comment="MozillaFirefox is &lt;3.5.8-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211151" version="1" comment="MozillaFirefox-translations is &lt;3.5.8-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058424" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.18-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058415" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.18-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058420" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.18-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058423" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.18-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265435" version="1" comment="mozilla-xulrunner190-x86 is &lt;1.9.0.18-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211152" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.8-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211154" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.8-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211155" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.8-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211153" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.8-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211156" version="1" comment="cifs-mount is &lt;3.2.7-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211157" version="1" comment="ldapsmb is &lt;1.34b-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211158" version="1" comment="libsmbclient0 is &lt;3.2.7-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211160" version="1" comment="libtalloc1 is &lt;3.2.7-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211162" version="1" comment="libtdb1 is &lt;3.2.7-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211164" version="1" comment="libwbclient0 is &lt;3.2.7-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211166" version="1" comment="samba is &lt;3.2.7-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211168" version="1" comment="samba-client is &lt;3.2.7-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211170" version="1" comment="samba-krb-printing is &lt;3.2.7-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211171" version="1" comment="samba-winbind is &lt;3.2.7-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211159" version="1" comment="libsmbclient0-32bit is &lt;3.2.7-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211161" version="1" comment="libtalloc1-32bit is &lt;3.2.7-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211163" version="1" comment="libtdb1-32bit is &lt;3.2.7-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211165" version="1" comment="libwbclient0-32bit is &lt;3.2.7-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211167" version="1" comment="samba-32bit is &lt;3.2.7-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211169" version="1" comment="samba-client-32bit is &lt;3.2.7-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211172" version="1" comment="samba-winbind-32bit is &lt;3.2.7-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211173" version="1" comment="openswan is &lt;2.6.16-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211174" version="1" comment="openswan-doc is &lt;2.6.16-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211175" version="1" comment="strongswan is &lt;4.2.8-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211176" version="1" comment="strongswan-doc is &lt;4.2.8-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211177" version="1" comment="kvm is &lt;78.0.10.5-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211178" version="1" comment="kvm-kmp-default is &lt;78.2.6.30.1_2.6.27.25_0.1-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053963" version="1" comment="libfreebl3 is &lt;3.12.3.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053968" version="1" comment="mozilla-nss is &lt;3.12.3.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053967" version="1" comment="mozilla-nss-tools is &lt;3.12.3.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053961" version="1" comment="libfreebl3-32bit is &lt;3.12.3.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053964" version="1" comment="mozilla-nss-32bit is &lt;3.12.3.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211179" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.27.29_0.1-7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264117" version="1" comment="ext4dev-kmp-pae is &lt;0_2.6.27.29_0.1-7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211180" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.27.29_0.1-7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264118" version="1" comment="ext4dev-kmp-vmi is &lt;0_2.6.27.29_0.1-7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230114" version="1" comment="ext4dev-kmp-xen is &lt;0_2.6.27.29_0.1-7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211181" version="1" comment="kernel-default is &lt;2.6.27.29-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211182" version="1" comment="kernel-default-base is &lt;2.6.27.29-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264119" version="1" comment="kernel-default-man is &lt;2.6.27.29-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211183" version="1" comment="kernel-kdump is &lt;2.6.27.29-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264120" version="1" comment="kernel-pae is &lt;2.6.27.29-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264121" version="1" comment="kernel-pae-base is &lt;2.6.27.29-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211184" version="1" comment="kernel-ppc64 is &lt;2.6.27.29-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211185" version="1" comment="kernel-ppc64-base is &lt;2.6.27.29-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211186" version="1" comment="kernel-source is &lt;2.6.27.29-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211187" version="1" comment="kernel-syms is &lt;2.6.27.29-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264122" version="1" comment="kernel-vmi is &lt;2.6.27.29-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264123" version="1" comment="kernel-vmi-base is &lt;2.6.27.29-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230115" version="1" comment="kernel-xen is &lt;2.6.27.29-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230116" version="1" comment="kernel-xen-base is &lt;2.6.27.29-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211188" version="1" comment="libldap-2_4-2 is &lt;2.4.12-7.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211190" version="1" comment="mutt is &lt;1.5.17-42.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211191" version="1" comment="openldap2 is &lt;2.4.12-7.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211192" version="1" comment="openldap2-back-meta is &lt;2.4.12-7.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211193" version="1" comment="openldap2-client is &lt;2.4.12-7.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211189" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.12-7.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211194" version="1" comment="libxml2 is &lt;2.7.1-10.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211196" version="1" comment="libxml2-doc is &lt;2.7.1-10.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211195" version="1" comment="libxml2-32bit is &lt;2.7.1-10.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211197" version="1" comment="curl is &lt;7.19.0-11.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211198" version="1" comment="libcurl4 is &lt;7.19.0-11.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211199" version="1" comment="libcurl4-32bit is &lt;7.19.0-11.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264125" version="1" comment="libcurl4-x86 is &lt;7.19.0-11.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211200" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr6-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264126" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr6-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211201" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr6-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211202" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr6-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264127" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr6-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211203" version="1" comment="wireshark is &lt;1.0.5-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211204" version="1" comment="libpython2_6-1_0 is &lt;2.6.0-8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211206" version="1" comment="python is &lt;2.6.0-8.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211208" version="1" comment="python-base is &lt;2.6.0-8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211210" version="1" comment="python-curses is &lt;2.6.0-8.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211211" version="1" comment="python-demo is &lt;2.6.0-8.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211212" version="1" comment="python-gdbm is &lt;2.6.0-8.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211213" version="1" comment="python-idle is &lt;2.6.0-8.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211214" version="1" comment="python-tk is &lt;2.6.0-8.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211215" version="1" comment="python-xml is &lt;2.6.0-8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211205" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.0-8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211207" version="1" comment="python-32bit is &lt;2.6.0-8.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211209" version="1" comment="python-base-32bit is &lt;2.6.0-8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054009" version="1" comment="MozillaFirefox is &lt;3.0.13-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054008" version="1" comment="MozillaFirefox-translations is &lt;3.0.13-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211216" version="1" comment="strongswan is &lt;4.2.8-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211217" version="1" comment="strongswan-doc is &lt;4.2.8-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211218" version="1" comment="apache2-mod_php5 is &lt;5.2.6-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211219" version="1" comment="php5 is &lt;5.2.6-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211220" version="1" comment="php5-bcmath is &lt;5.2.6-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211221" version="1" comment="php5-bz2 is &lt;5.2.6-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211222" version="1" comment="php5-calendar is &lt;5.2.6-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211223" version="1" comment="php5-ctype is &lt;5.2.6-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211224" version="1" comment="php5-curl is &lt;5.2.6-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211225" version="1" comment="php5-dba is &lt;5.2.6-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211226" version="1" comment="php5-dbase is &lt;5.2.6-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211227" version="1" comment="php5-dom is &lt;5.2.6-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211228" version="1" comment="php5-exif is &lt;5.2.6-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211229" version="1" comment="php5-fastcgi is &lt;5.2.6-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211230" version="1" comment="php5-ftp is &lt;5.2.6-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211231" version="1" comment="php5-gd is &lt;5.2.6-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211232" version="1" comment="php5-gettext is &lt;5.2.6-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211233" version="1" comment="php5-gmp is &lt;5.2.6-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211234" version="1" comment="php5-hash is &lt;5.2.6-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211235" version="1" comment="php5-iconv is &lt;5.2.6-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211236" version="1" comment="php5-json is &lt;5.2.6-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211237" version="1" comment="php5-ldap is &lt;5.2.6-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211238" version="1" comment="php5-mbstring is &lt;5.2.6-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211239" version="1" comment="php5-mcrypt is &lt;5.2.6-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211240" version="1" comment="php5-mysql is &lt;5.2.6-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211241" version="1" comment="php5-odbc is &lt;5.2.6-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211242" version="1" comment="php5-openssl is &lt;5.2.6-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211243" version="1" comment="php5-pcntl is &lt;5.2.6-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211244" version="1" comment="php5-pdo is &lt;5.2.6-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211245" version="1" comment="php5-pear is &lt;5.2.6-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211246" version="1" comment="php5-pgsql is &lt;5.2.6-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211247" version="1" comment="php5-pspell is &lt;5.2.6-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211248" version="1" comment="php5-shmop is &lt;5.2.6-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211249" version="1" comment="php5-snmp is &lt;5.2.6-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211250" version="1" comment="php5-soap is &lt;5.2.6-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211251" version="1" comment="php5-suhosin is &lt;5.2.6-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211252" version="1" comment="php5-sysvmsg is &lt;5.2.6-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211253" version="1" comment="php5-sysvsem is &lt;5.2.6-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211254" version="1" comment="php5-sysvshm is &lt;5.2.6-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211255" version="1" comment="php5-tokenizer is &lt;5.2.6-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211256" version="1" comment="php5-wddx is &lt;5.2.6-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211257" version="1" comment="php5-xmlreader is &lt;5.2.6-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211258" version="1" comment="php5-xmlrpc is &lt;5.2.6-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211259" version="1" comment="php5-xmlwriter is &lt;5.2.6-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211260" version="1" comment="php5-xsl is &lt;5.2.6-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211261" version="1" comment="php5-zip is &lt;5.2.6-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211262" version="1" comment="php5-zlib is &lt;5.2.6-50.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211263" version="1" comment="cifs-mount is &lt;3.2.7-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211264" version="1" comment="ldapsmb is &lt;1.34b-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211265" version="1" comment="libsmbclient0 is &lt;3.2.7-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211267" version="1" comment="libtalloc1 is &lt;3.2.7-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211269" version="1" comment="libtdb1 is &lt;3.2.7-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211271" version="1" comment="libwbclient0 is &lt;3.2.7-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211273" version="1" comment="samba is &lt;3.2.7-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211275" version="1" comment="samba-client is &lt;3.2.7-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211277" version="1" comment="samba-krb-printing is &lt;3.2.7-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211278" version="1" comment="samba-winbind is &lt;3.2.7-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211266" version="1" comment="libsmbclient0-32bit is &lt;3.2.7-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211268" version="1" comment="libtalloc1-32bit is &lt;3.2.7-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211270" version="1" comment="libtdb1-32bit is &lt;3.2.7-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211272" version="1" comment="libwbclient0-32bit is &lt;3.2.7-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211274" version="1" comment="samba-32bit is &lt;3.2.7-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211276" version="1" comment="samba-client-32bit is &lt;3.2.7-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211279" version="1" comment="samba-winbind-32bit is &lt;3.2.7-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211280" version="1" comment="cups is &lt;1.3.9-8.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211281" version="1" comment="cups-client is &lt;1.3.9-8.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211282" version="1" comment="cups-libs is &lt;1.3.9-8.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211283" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264135" version="1" comment="cups-libs-x86 is &lt;1.3.9-8.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211284" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.27.37_0.1-7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264136" version="1" comment="ext4dev-kmp-pae is &lt;0_2.6.27.37_0.1-7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211285" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.27.37_0.1-7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264137" version="1" comment="ext4dev-kmp-vmi is &lt;0_2.6.27.37_0.1-7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230117" version="1" comment="ext4dev-kmp-xen is &lt;0_2.6.27.37_0.1-7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211286" version="1" comment="kernel-default is &lt;2.6.27.37-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211287" version="1" comment="kernel-default-base is &lt;2.6.27.37-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264138" version="1" comment="kernel-default-man is &lt;2.6.27.37-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211288" version="1" comment="kernel-kdump is &lt;2.6.27.37-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264139" version="1" comment="kernel-pae is &lt;2.6.27.37-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264140" version="1" comment="kernel-pae-base is &lt;2.6.27.37-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211289" version="1" comment="kernel-ppc64 is &lt;2.6.27.37-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211290" version="1" comment="kernel-ppc64-base is &lt;2.6.27.37-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211291" version="1" comment="kernel-source is &lt;2.6.27.37-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211292" version="1" comment="kernel-syms is &lt;2.6.27.37-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264141" version="1" comment="kernel-vmi is &lt;2.6.27.37-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264142" version="1" comment="kernel-vmi-base is &lt;2.6.27.37-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230118" version="1" comment="kernel-xen is &lt;2.6.27.37-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230119" version="1" comment="kernel-xen-base is &lt;2.6.27.37-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211293" version="1" comment="MozillaFirefox is &lt;3.5.3-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211294" version="1" comment="MozillaFirefox-translations is &lt;3.5.3-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211295" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.14-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211296" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.14-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211297" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.14-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211298" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.14-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265436" version="1" comment="mozilla-xulrunner190-x86 is &lt;1.9.0.14-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211299" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.3-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211301" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.3-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211302" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.3-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211300" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.3-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211303" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.27.42_0.1-7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264144" version="1" comment="ext4dev-kmp-pae is &lt;0_2.6.27.42_0.1-7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211304" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.27.42_0.1-7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264145" version="1" comment="ext4dev-kmp-vmi is &lt;0_2.6.27.42_0.1-7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230120" version="1" comment="ext4dev-kmp-xen is &lt;0_2.6.27.42_0.1-7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211305" version="1" comment="kernel-default is &lt;2.6.27.42-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211306" version="1" comment="kernel-default-base is &lt;2.6.27.42-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264146" version="1" comment="kernel-default-man is &lt;2.6.27.42-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211307" version="1" comment="kernel-kdump is &lt;2.6.27.42-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264147" version="1" comment="kernel-pae is &lt;2.6.27.42-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264148" version="1" comment="kernel-pae-base is &lt;2.6.27.42-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211308" version="1" comment="kernel-ppc64 is &lt;2.6.27.42-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211309" version="1" comment="kernel-ppc64-base is &lt;2.6.27.42-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211310" version="1" comment="kernel-source is &lt;2.6.27.42-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211311" version="1" comment="kernel-syms is &lt;2.6.27.42-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264149" version="1" comment="kernel-vmi is &lt;2.6.27.42-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264150" version="1" comment="kernel-vmi-base is &lt;2.6.27.42-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230121" version="1" comment="kernel-xen is &lt;2.6.27.42-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230122" version="1" comment="kernel-xen-base is &lt;2.6.27.42-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055045" version="1" comment="postgresql is &lt;8.3.8-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055038" version="1" comment="postgresql-contrib is &lt;8.3.8-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055040" version="1" comment="postgresql-docs is &lt;8.3.8-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055043" version="1" comment="postgresql-libs is &lt;8.3.8-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055041" version="1" comment="postgresql-libs-32bit is &lt;8.3.8-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264151" version="1" comment="postgresql-libs-x86 is &lt;8.3.8-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055044" version="1" comment="postgresql-server is &lt;8.3.8-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211312" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-30.22.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211313" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8h-30.22.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264152" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8h-30.22.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211314" version="1" comment="openssl is &lt;0.9.8h-30.22.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211315" version="1" comment="openssl-doc is &lt;0.9.8h-30.22.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211316" version="1" comment="glib2 is &lt;2.18.2-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211317" version="1" comment="glib2-doc is &lt;2.18.2-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211318" version="1" comment="glib2-lang is &lt;2.18.2-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211319" version="1" comment="libgio-2_0-0 is &lt;2.18.2-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211320" version="1" comment="libgio-2_0-0-32bit is &lt;2.18.2-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264153" version="1" comment="libgio-2_0-0-x86 is &lt;2.18.2-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211321" version="1" comment="libglib-2_0-0 is &lt;2.18.2-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211322" version="1" comment="libglib-2_0-0-32bit is &lt;2.18.2-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264154" version="1" comment="libglib-2_0-0-x86 is &lt;2.18.2-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211323" version="1" comment="libgmodule-2_0-0 is &lt;2.18.2-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211324" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.18.2-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264155" version="1" comment="libgmodule-2_0-0-x86 is &lt;2.18.2-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211325" version="1" comment="libgobject-2_0-0 is &lt;2.18.2-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211326" version="1" comment="libgobject-2_0-0-32bit is &lt;2.18.2-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264156" version="1" comment="libgobject-2_0-0-x86 is &lt;2.18.2-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211327" version="1" comment="libgthread-2_0-0 is &lt;2.18.2-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211328" version="1" comment="libgthread-2_0-0-32bit is &lt;2.18.2-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264157" version="1" comment="libgthread-2_0-0-x86 is &lt;2.18.2-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211329" version="1" comment="krb5 is &lt;1.6.3-133.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211330" version="1" comment="krb5-32bit is &lt;1.6.3-133.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211331" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211332" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211333" version="1" comment="krb5-client is &lt;1.6.3-133.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211334" version="1" comment="krb5-server is &lt;1.6.3-133.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264158" version="1" comment="krb5-x86 is &lt;1.6.3-133.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211335" version="1" comment="fuse is &lt;2.7.2-61.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211336" version="1" comment="libfuse2 is &lt;2.7.2-61.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211337" version="1" comment="MozillaFirefox is &lt;3.5.6-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211338" version="1" comment="MozillaFirefox-translations is &lt;3.5.6-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211339" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.6-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211341" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.6-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211342" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.6-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211340" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.6-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211343" version="1" comment="gnutls is &lt;2.4.1-24.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211344" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.4-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059541" version="1" comment="libfreebl3 is &lt;3.12.6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211345" version="1" comment="libgnutls26 is &lt;2.4.1-24.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211346" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264160" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059546" version="1" comment="mozilla-nss is &lt;3.12.6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059545" version="1" comment="mozilla-nss-tools is &lt;3.12.6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059643" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.9-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059640" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.9-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211347" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.9-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211348" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.6-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211349" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr9.0-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211350" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr9.0-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211351" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr9.0-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215266" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215268" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250498" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr9.0-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059539" version="1" comment="libfreebl3-32bit is &lt;3.12.6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059542" version="1" comment="mozilla-nss-32bit is &lt;3.12.6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059635" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.9-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211352" version="1" comment="ntp is &lt;4.2.4p6-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211353" version="1" comment="ntp-doc is &lt;4.2.4p6-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211354" version="1" comment="expat is &lt;2.0.1-88.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211355" version="1" comment="libexpat1 is &lt;2.0.1-88.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211356" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211357" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.27.45_0.1-7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264165" version="1" comment="ext4dev-kmp-pae is &lt;0_2.6.27.45_0.1-7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211358" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.27.45_0.1-7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264166" version="1" comment="ext4dev-kmp-vmi is &lt;0_2.6.27.45_0.1-7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230123" version="1" comment="ext4dev-kmp-xen is &lt;0_2.6.27.45_0.1-7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211359" version="1" comment="kernel-default is &lt;2.6.27.45-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211360" version="1" comment="kernel-default-base is &lt;2.6.27.45-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264167" version="1" comment="kernel-default-man is &lt;2.6.27.45-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211361" version="1" comment="kernel-kdump is &lt;2.6.27.45-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264168" version="1" comment="kernel-pae is &lt;2.6.27.45-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264169" version="1" comment="kernel-pae-base is &lt;2.6.27.45-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211362" version="1" comment="kernel-ppc64 is &lt;2.6.27.45-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211363" version="1" comment="kernel-ppc64-base is &lt;2.6.27.45-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211364" version="1" comment="kernel-source is &lt;2.6.27.45-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211365" version="1" comment="kernel-syms is &lt;2.6.27.45-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264170" version="1" comment="kernel-vmi is &lt;2.6.27.45-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264171" version="1" comment="kernel-vmi-base is &lt;2.6.27.45-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230124" version="1" comment="kernel-xen is &lt;2.6.27.45-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230125" version="1" comment="kernel-xen-base is &lt;2.6.27.45-0.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056982" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.16-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056973" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.16-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056978" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.16-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056981" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.16-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265437" version="1" comment="mozilla-xulrunner190-x86 is &lt;1.9.0.16-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211366" version="1" comment="bind is &lt;9.5.0P2-20.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211367" version="1" comment="bind-chrootenv is &lt;9.5.0P2-20.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211368" version="1" comment="bind-doc is &lt;9.5.0P2-20.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211369" version="1" comment="bind-libs is &lt;9.5.0P2-20.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211371" version="1" comment="bind-utils is &lt;9.5.0P2-20.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211370" version="1" comment="bind-libs-32bit is &lt;9.5.0P2-20.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211372" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.27.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211373" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.27.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211374" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.27.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211375" version="1" comment="ghostscript-library is &lt;8.62-32.27.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211376" version="1" comment="ghostscript-omni is &lt;8.62-32.27.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211377" version="1" comment="ghostscript-x11 is &lt;8.62-32.27.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211378" version="1" comment="libgimpprint is &lt;4.2.7-32.27.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213323" version="1" comment="glibc-32bit is &lt;2.11.1-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213325" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213330" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213332" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211379" version="1" comment="gnutls is &lt;2.4.1-24.39.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211380" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211381" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211382" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211383" version="1" comment="libgnutls-devel is &lt;2.4.1-24.39.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211384" version="1" comment="libgnutls-extra-devel is &lt;2.4.1-24.39.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211385" version="1" comment="glibc is &lt;2.11.1-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211387" version="1" comment="glibc-devel is &lt;2.11.1-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211389" version="1" comment="glibc-html is &lt;2.11.1-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211390" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211391" version="1" comment="glibc-info is &lt;2.11.1-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211392" version="1" comment="glibc-locale is &lt;2.11.1-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211394" version="1" comment="glibc-profile is &lt;2.11.1-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211396" version="1" comment="nscd is &lt;2.11.1-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211386" version="1" comment="glibc-32bit is &lt;2.11.1-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211388" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211393" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211395" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211397" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.5-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264172" version="1" comment="java-1_4_2-ibm-jdbc is &lt;1.4.2_sr13.5-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264173" version="1" comment="java-1_4_2-ibm-plugin is &lt;1.4.2_sr13.5-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211398" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr8.0-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264174" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr8.0-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211399" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr8.0-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211400" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr8.0-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264175" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr8.0-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211401" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr8.0-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211402" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr8.0-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211403" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr8.0-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215575" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.4-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211404" version="1" comment="MozillaFirefox is &lt;3.6.13-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211405" version="1" comment="MozillaFirefox-translations is &lt;3.6.13-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211406" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.16-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211408" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.16-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211409" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.16-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211410" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.13-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211412" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.13-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211413" version="1" comment="mozilla-xulrunner192-translations is &lt;1.9.2.13-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211407" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.16-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211411" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.13-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211414" version="1" comment="MozillaFirefox is &lt;3.5.7-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211415" version="1" comment="MozillaFirefox-translations is &lt;3.5.7-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057682" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057673" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057678" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057681" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265438" version="1" comment="mozilla-xulrunner190-x86 is &lt;1.9.0.17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211416" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.7-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211418" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.7-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211419" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.7-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211417" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.7-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211420" version="1" comment="glibc is &lt;2.11.1-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211422" version="1" comment="glibc-devel is &lt;2.11.1-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211424" version="1" comment="glibc-html is &lt;2.11.1-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211425" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211426" version="1" comment="glibc-info is &lt;2.11.1-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211427" version="1" comment="glibc-locale is &lt;2.11.1-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211429" version="1" comment="glibc-profile is &lt;2.11.1-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211431" version="1" comment="nscd is &lt;2.11.1-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211421" version="1" comment="glibc-32bit is &lt;2.11.1-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211423" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211428" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211430" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211432" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211433" version="1" comment="php5 is &lt;5.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211434" version="1" comment="php5-bcmath is &lt;5.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211435" version="1" comment="php5-bz2 is &lt;5.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211436" version="1" comment="php5-calendar is &lt;5.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211437" version="1" comment="php5-ctype is &lt;5.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211438" version="1" comment="php5-curl is &lt;5.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211439" version="1" comment="php5-dba is &lt;5.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211440" version="1" comment="php5-dbase is &lt;5.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211441" version="1" comment="php5-dom is &lt;5.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211442" version="1" comment="php5-exif is &lt;5.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211443" version="1" comment="php5-fastcgi is &lt;5.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211444" version="1" comment="php5-ftp is &lt;5.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211445" version="1" comment="php5-gd is &lt;5.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211446" version="1" comment="php5-gettext is &lt;5.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211447" version="1" comment="php5-gmp is &lt;5.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211448" version="1" comment="php5-hash is &lt;5.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211449" version="1" comment="php5-iconv is &lt;5.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211450" version="1" comment="php5-json is &lt;5.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211451" version="1" comment="php5-ldap is &lt;5.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211452" version="1" comment="php5-mbstring is &lt;5.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211453" version="1" comment="php5-mcrypt is &lt;5.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211454" version="1" comment="php5-mysql is &lt;5.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211455" version="1" comment="php5-odbc is &lt;5.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211456" version="1" comment="php5-openssl is &lt;5.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211457" version="1" comment="php5-pcntl is &lt;5.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211458" version="1" comment="php5-pdo is &lt;5.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211459" version="1" comment="php5-pear is &lt;5.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211460" version="1" comment="php5-pgsql is &lt;5.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211461" version="1" comment="php5-pspell is &lt;5.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211462" version="1" comment="php5-shmop is &lt;5.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211463" version="1" comment="php5-snmp is &lt;5.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211464" version="1" comment="php5-soap is &lt;5.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211465" version="1" comment="php5-suhosin is &lt;5.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211466" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211467" version="1" comment="php5-sysvsem is &lt;5.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211468" version="1" comment="php5-sysvshm is &lt;5.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211469" version="1" comment="php5-tokenizer is &lt;5.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211470" version="1" comment="php5-wddx is &lt;5.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211471" version="1" comment="php5-xmlreader is &lt;5.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211472" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211473" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211474" version="1" comment="php5-xsl is &lt;5.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211475" version="1" comment="php5-zip is &lt;5.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211476" version="1" comment="php5-zlib is &lt;5.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211477" version="1" comment="cups is &lt;1.3.9-8.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211478" version="1" comment="cups-client is &lt;1.3.9-8.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211479" version="1" comment="cups-libs is &lt;1.3.9-8.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211480" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264179" version="1" comment="cups-libs-x86 is &lt;1.3.9-8.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211481" version="1" comment="cifs-mount is &lt;3.2.7-11.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211482" version="1" comment="ldapsmb is &lt;1.34b-11.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211483" version="1" comment="libsmbclient0 is &lt;3.2.7-11.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211485" version="1" comment="libtalloc1 is &lt;3.2.7-11.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211487" version="1" comment="libtdb1 is &lt;3.2.7-11.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211489" version="1" comment="libwbclient0 is &lt;3.2.7-11.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211491" version="1" comment="samba is &lt;3.2.7-11.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211493" version="1" comment="samba-client is &lt;3.2.7-11.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211495" version="1" comment="samba-krb-printing is &lt;3.2.7-11.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211496" version="1" comment="samba-winbind is &lt;3.2.7-11.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211484" version="1" comment="libsmbclient0-32bit is &lt;3.2.7-11.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211486" version="1" comment="libtalloc1-32bit is &lt;3.2.7-11.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211488" version="1" comment="libtdb1-32bit is &lt;3.2.7-11.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211490" version="1" comment="libwbclient0-32bit is &lt;3.2.7-11.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211492" version="1" comment="samba-32bit is &lt;3.2.7-11.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211494" version="1" comment="samba-client-32bit is &lt;3.2.7-11.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211497" version="1" comment="samba-winbind-32bit is &lt;3.2.7-11.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211498" version="1" comment="MozillaFirefox is &lt;3.5.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211499" version="1" comment="MozillaFirefox-translations is &lt;3.5.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061314" version="1" comment="postgresql is &lt;8.3.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061304" version="1" comment="postgresql-contrib is &lt;8.3.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061306" version="1" comment="postgresql-docs is &lt;8.3.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061309" version="1" comment="postgresql-libs is &lt;8.3.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061307" version="1" comment="postgresql-libs-32bit is &lt;8.3.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265439" version="1" comment="postgresql-libs-x86 is &lt;8.3.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061313" version="1" comment="postgresql-server is &lt;8.3.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211500" version="1" comment="tgt is &lt;0.9.10-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211501" version="1" comment="perl is &lt;5.10.0-64.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211502" version="1" comment="perl-32bit is &lt;5.10.0-64.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211503" version="1" comment="perl-base is &lt;5.10.0-64.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211504" version="1" comment="perl-doc is &lt;5.10.0-64.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264187" version="1" comment="perl-x86 is &lt;5.10.0-64.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211505" version="1" comment="perl is &lt;5.10.0-64.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250899" version="1" comment="perl-32bit is &lt;5.10.0-64.61.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211507" version="1" comment="perl-base is &lt;5.10.0-64.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211508" version="1" comment="perl-doc is &lt;5.10.0-64.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211506" version="1" comment="perl-32bit is &lt;5.10.0-64.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211509" version="1" comment="NetworkManager is &lt;0.7.0.r4359-15.20.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211510" version="1" comment="NetworkManager-glib is &lt;0.7.0.r4359-15.20.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211511" version="1" comment="NetworkManager is &lt;0.7.0.r4359-15.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211512" version="1" comment="NetworkManager-glib is &lt;0.7.0.r4359-15.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211513" version="1" comment="btrfs-kmp-default is &lt;0_2.6.32.13_0.4-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211514" version="1" comment="btrfs-kmp-pae is &lt;0_2.6.32.59_0.7-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211515" version="1" comment="btrfs-kmp-xen is &lt;0_2.6.32.59_0.7-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211516" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.32.13_0.4-7.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211517" version="1" comment="ext4dev-kmp-pae is &lt;0_2.6.32.59_0.7-7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211518" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.32.13_0.4-7.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212047" version="1" comment="ext4dev-kmp-trace is &lt;0_2.6.32.59_0.13-7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211520" version="1" comment="ext4dev-kmp-xen is &lt;0_2.6.32.59_0.7-7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211521" version="1" comment="hyper-v-kmp-default is &lt;0_2.6.32.59_0.7-0.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211522" version="1" comment="hyper-v-kmp-pae is &lt;0_2.6.32.59_0.7-0.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212051" version="1" comment="hyper-v-kmp-trace is &lt;0_2.6.32.59_0.13-0.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211524" version="1" comment="kernel-default is &lt;2.6.32.13-0.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211525" version="1" comment="kernel-default-base is &lt;2.6.32.13-0.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211526" version="1" comment="kernel-default-devel is &lt;2.6.32.13-0.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212055" version="1" comment="kernel-default-man is &lt;2.6.32.59-0.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213963" version="1" comment="kernel-ec2 is &lt;2.6.32.59-0.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213964" version="1" comment="kernel-ec2-base is &lt;2.6.32.59-0.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213965" version="1" comment="kernel-ec2-devel is &lt;2.6.32.59-0.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211529" version="1" comment="kernel-ppc64 is &lt;2.6.32.13-0.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211530" version="1" comment="kernel-ppc64-base is &lt;2.6.32.13-0.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211531" version="1" comment="kernel-ppc64-devel is &lt;2.6.32.13-0.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211532" version="1" comment="kernel-source is &lt;2.6.32.13-0.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211533" version="1" comment="kernel-syms is &lt;2.6.32.13-0.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211534" version="1" comment="kernel-trace is &lt;2.6.32.13-0.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211535" version="1" comment="kernel-trace-base is &lt;2.6.32.13-0.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211536" version="1" comment="kernel-trace-devel is &lt;2.6.32.13-0.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211537" version="1" comment="krb5 is &lt;1.6.3-133.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211538" version="1" comment="krb5-32bit is &lt;1.6.3-133.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211539" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211540" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211541" version="1" comment="krb5-client is &lt;1.6.3-133.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211542" version="1" comment="krb5-server is &lt;1.6.3-133.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264188" version="1" comment="krb5-x86 is &lt;1.6.3-133.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211543" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.8-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211544" version="1" comment="java-1_4_2-ibm-sap is &lt;1.4.2_sr13.8-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211545" version="1" comment="java-1_4_2-ibm-sap-devel is &lt;1.4.2_sr13.8-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211546" version="1" comment="krb5 is &lt;1.6.3-133.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211547" version="1" comment="krb5-32bit is &lt;1.6.3-133.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211548" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211549" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211550" version="1" comment="krb5-client is &lt;1.6.3-133.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211551" version="1" comment="krb5-server is &lt;1.6.3-133.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264191" version="1" comment="krb5-x86 is &lt;1.6.3-133.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211552" version="1" comment="apache2 is &lt;2.2.10-2.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211553" version="1" comment="apache2-doc is &lt;2.2.10-2.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211554" version="1" comment="apache2-example-pages is &lt;2.2.10-2.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211555" version="1" comment="apache2-prefork is &lt;2.2.10-2.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211556" version="1" comment="apache2-utils is &lt;2.2.10-2.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211557" version="1" comment="apache2-worker is &lt;2.2.10-2.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211558" version="1" comment="wireshark is &lt;1.4.4-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211559" version="1" comment="MozillaFirefox is &lt;3.6.15-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211560" version="1" comment="MozillaFirefox-translations is &lt;3.6.15-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211561" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.17-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211563" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.17-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211564" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.17-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211565" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.15-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211567" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.15-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211568" version="1" comment="mozilla-xulrunner192-translations is &lt;1.9.2.15-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211562" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.17-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211566" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.15-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215771" version="1" comment="libmysqlclient15-32bit is &lt;5.0.96-0.8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215779" version="1" comment="mysql-tools is &lt;5.0.96-0.8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211569" version="1" comment="libpython2_6-1_0 is &lt;2.6.0-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211571" version="1" comment="python is &lt;2.6.0-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211573" version="1" comment="python-base is &lt;2.6.0-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211575" version="1" comment="python-curses is &lt;2.6.0-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211576" version="1" comment="python-demo is &lt;2.6.0-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211577" version="1" comment="python-gdbm is &lt;2.6.0-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211578" version="1" comment="python-idle is &lt;2.6.0-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211579" version="1" comment="python-tk is &lt;2.6.0-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211580" version="1" comment="python-xml is &lt;2.6.0-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211570" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.0-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211572" version="1" comment="python-32bit is &lt;2.6.0-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211574" version="1" comment="python-base-32bit is &lt;2.6.0-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061755" version="1" comment="clamav is &lt;0.96.1-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211581" version="1" comment="btrfs-kmp-default is &lt;0_2.6.32.13_0.5-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211582" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.32.13_0.5-7.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211583" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.32.13_0.5-7.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211584" version="1" comment="kernel-default is &lt;2.6.32.13-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211585" version="1" comment="kernel-default-base is &lt;2.6.32.13-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211586" version="1" comment="kernel-default-devel is &lt;2.6.32.13-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211587" version="1" comment="kernel-ppc64 is &lt;2.6.32.13-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211588" version="1" comment="kernel-ppc64-base is &lt;2.6.32.13-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211589" version="1" comment="kernel-ppc64-devel is &lt;2.6.32.13-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211590" version="1" comment="kernel-source is &lt;2.6.32.13-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211591" version="1" comment="kernel-syms is &lt;2.6.32.13-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211592" version="1" comment="kernel-trace is &lt;2.6.32.13-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211593" version="1" comment="kernel-trace-base is &lt;2.6.32.13-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211594" version="1" comment="kernel-trace-devel is &lt;2.6.32.13-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211595" version="1" comment="quagga is &lt;0.99.15-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211596" version="1" comment="freetype2 is &lt;2.3.7-25.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211597" version="1" comment="freetype2-32bit is &lt;2.3.7-25.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265440" version="1" comment="freetype2-x86 is &lt;2.3.7-25.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211598" version="1" comment="popt is &lt;1.7-37.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211600" version="1" comment="rpm is &lt;4.4.2.3-37.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211599" version="1" comment="popt-32bit is &lt;1.7-37.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211601" version="1" comment="rpm-32bit is &lt;4.4.2.3-37.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211602" version="1" comment="cifs-mount is &lt;3.2.7-11.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211603" version="1" comment="ldapsmb is &lt;1.34b-11.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211604" version="1" comment="libsmbclient0 is &lt;3.2.7-11.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211606" version="1" comment="libtalloc1 is &lt;3.2.7-11.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211608" version="1" comment="libtdb1 is &lt;3.2.7-11.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211610" version="1" comment="libwbclient0 is &lt;3.2.7-11.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211612" version="1" comment="samba is &lt;3.2.7-11.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211614" version="1" comment="samba-client is &lt;3.2.7-11.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211616" version="1" comment="samba-krb-printing is &lt;3.2.7-11.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211617" version="1" comment="samba-winbind is &lt;3.2.7-11.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211605" version="1" comment="libsmbclient0-32bit is &lt;3.2.7-11.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211607" version="1" comment="libtalloc1-32bit is &lt;3.2.7-11.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211609" version="1" comment="libtdb1-32bit is &lt;3.2.7-11.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211611" version="1" comment="libwbclient0-32bit is &lt;3.2.7-11.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211613" version="1" comment="samba-32bit is &lt;3.2.7-11.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211615" version="1" comment="samba-client-32bit is &lt;3.2.7-11.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211618" version="1" comment="samba-winbind-32bit is &lt;3.2.7-11.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211619" version="1" comment="brocade-bna-kmp-rt is &lt;2.1.0.0_2.6.33.7.2_rt30_0.3-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211620" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.19_2.6.33.7.2_rt30_0.3-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211621" version="1" comment="kernel-rt is &lt;2.6.33.7.2-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211622" version="1" comment="kernel-rt-base is &lt;2.6.33.7.2-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211623" version="1" comment="kernel-rt-devel is &lt;2.6.33.7.2-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211624" version="1" comment="kernel-rt_trace is &lt;2.6.33.7.2-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211625" version="1" comment="kernel-rt_trace-base is &lt;2.6.33.7.2-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211626" version="1" comment="kernel-rt_trace-devel is &lt;2.6.33.7.2-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211627" version="1" comment="kernel-source-rt is &lt;2.6.33.7.2-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211628" version="1" comment="kernel-syms-rt is &lt;2.6.33.7.2-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211629" version="1" comment="ofed-kmp-rt is &lt;1.4.2_2.6.33.7.2_rt30_0.3-0.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211630" version="1" comment="libvirt is &lt;0.7.6-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211631" version="1" comment="libvirt-doc is &lt;0.7.6-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211632" version="1" comment="libvirt-python is &lt;0.7.6-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211633" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211634" version="1" comment="xorg-x11-server is &lt;7.4-27.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211635" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211636" version="1" comment="btrfs-kmp-default is &lt;0_2.6.32.19_0.2-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211637" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.32.19_0.2-7.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211638" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.32.19_0.2-7.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211639" version="1" comment="kernel-default is &lt;2.6.32.19-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211640" version="1" comment="kernel-default-base is &lt;2.6.32.19-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211641" version="1" comment="kernel-default-devel is &lt;2.6.32.19-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211642" version="1" comment="kernel-ppc64 is &lt;2.6.32.19-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211643" version="1" comment="kernel-ppc64-base is &lt;2.6.32.19-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211644" version="1" comment="kernel-ppc64-devel is &lt;2.6.32.19-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211645" version="1" comment="kernel-source is &lt;2.6.32.19-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211646" version="1" comment="kernel-syms is &lt;2.6.32.19-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211647" version="1" comment="kernel-trace is &lt;2.6.32.19-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211648" version="1" comment="kernel-trace-base is &lt;2.6.32.19-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211649" version="1" comment="kernel-trace-devel is &lt;2.6.32.19-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211650" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250715" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.20.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211652" version="1" comment="libqt4 is &lt;4.6.3-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250717" version="1" comment="libqt4-32bit is &lt;4.6.3-5.20.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211654" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250719" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.20.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211656" version="1" comment="libqt4-sql is &lt;4.6.3-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250721" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.20.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211658" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211659" version="1" comment="libqt4-x11 is &lt;4.6.3-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250725" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.20.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211651" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211653" version="1" comment="libqt4-32bit is &lt;4.6.3-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211655" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211657" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211660" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211661" version="1" comment="strongswan is &lt;4.3.4-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211662" version="1" comment="strongswan-doc is &lt;4.3.4-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211663" version="1" comment="evince is &lt;2.28.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211664" version="1" comment="evince-doc is &lt;2.28.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211665" version="1" comment="evince-lang is &lt;2.28.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211666" version="1" comment="MozillaFirefox is &lt;3.6.10-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211667" version="1" comment="MozillaFirefox-translations is &lt;3.6.10-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211668" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.10-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211669" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.10-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211670" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.10-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211671" version="1" comment="mozilla-xulrunner192-translations is &lt;1.9.2.10-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211672" version="1" comment="perl is &lt;5.10.0-64.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211674" version="1" comment="perl-base is &lt;5.10.0-64.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211675" version="1" comment="perl-doc is &lt;5.10.0-64.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211673" version="1" comment="perl-32bit is &lt;5.10.0-64.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211676" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.27.54_0.2-7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264192" version="1" comment="ext4dev-kmp-pae is &lt;0_2.6.27.54_0.2-7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211677" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.27.54_0.2-7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264193" version="1" comment="ext4dev-kmp-vmi is &lt;0_2.6.27.54_0.2-7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230126" version="1" comment="ext4dev-kmp-xen is &lt;0_2.6.27.54_0.2-7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211678" version="1" comment="kernel-default is &lt;2.6.27.54-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211679" version="1" comment="kernel-default-base is &lt;2.6.27.54-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264194" version="1" comment="kernel-default-man is &lt;2.6.27.54-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211680" version="1" comment="kernel-kdump is &lt;2.6.27.54-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264195" version="1" comment="kernel-pae is &lt;2.6.27.54-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264196" version="1" comment="kernel-pae-base is &lt;2.6.27.54-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211681" version="1" comment="kernel-ppc64 is &lt;2.6.27.54-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211682" version="1" comment="kernel-ppc64-base is &lt;2.6.27.54-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211683" version="1" comment="kernel-source is &lt;2.6.27.54-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211684" version="1" comment="kernel-syms is &lt;2.6.27.54-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264197" version="1" comment="kernel-vmi is &lt;2.6.27.54-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264198" version="1" comment="kernel-vmi-base is &lt;2.6.27.54-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230127" version="1" comment="kernel-xen is &lt;2.6.27.54-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230128" version="1" comment="kernel-xen-base is &lt;2.6.27.54-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211685" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-30.22.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211686" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8h-30.22.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264199" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8h-30.22.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211687" version="1" comment="openssl is &lt;0.9.8h-30.22.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211688" version="1" comment="openssl-doc is &lt;0.9.8h-30.22.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211689" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-30.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211691" version="1" comment="openssl is &lt;0.9.8h-30.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211692" version="1" comment="openssl-doc is &lt;0.9.8h-30.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211690" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8h-30.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211693" version="1" comment="btrfs-kmp-default is &lt;0_2.6.32.29_0.3-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211694" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.32.29_0.3-7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211695" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.32.29_0.3-7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211696" version="1" comment="kernel-default is &lt;2.6.32.29-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211697" version="1" comment="kernel-default-base is &lt;2.6.32.29-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211698" version="1" comment="kernel-default-devel is &lt;2.6.32.29-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211527" version="1" comment="kernel-ec2 is &lt;2.6.32.59-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211528" version="1" comment="kernel-ec2-base is &lt;2.6.32.59-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211699" version="1" comment="kernel-ppc64 is &lt;2.6.32.29-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211700" version="1" comment="kernel-ppc64-base is &lt;2.6.32.29-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211701" version="1" comment="kernel-ppc64-devel is &lt;2.6.32.29-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211702" version="1" comment="kernel-source is &lt;2.6.32.29-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211703" version="1" comment="kernel-syms is &lt;2.6.32.29-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211704" version="1" comment="kernel-trace is &lt;2.6.32.29-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211705" version="1" comment="kernel-trace-base is &lt;2.6.32.29-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211706" version="1" comment="kernel-trace-devel is &lt;2.6.32.29-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211707" version="1" comment="quagga is &lt;0.99.10-17.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211708" version="1" comment="quagga is &lt;0.99.15-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211709" version="1" comment="btrfs-kmp-default is &lt;0_2.6.32.23_0.3-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211710" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.32.23_0.3-7.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211711" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.32.23_0.3-7.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211712" version="1" comment="kernel-default is &lt;2.6.32.23-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211713" version="1" comment="kernel-default-base is &lt;2.6.32.23-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211714" version="1" comment="kernel-default-devel is &lt;2.6.32.23-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211715" version="1" comment="kernel-ppc64 is &lt;2.6.32.23-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211716" version="1" comment="kernel-ppc64-base is &lt;2.6.32.23-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211717" version="1" comment="kernel-ppc64-devel is &lt;2.6.32.23-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211718" version="1" comment="kernel-source is &lt;2.6.32.23-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211719" version="1" comment="kernel-syms is &lt;2.6.32.23-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211720" version="1" comment="kernel-trace is &lt;2.6.32.23-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211721" version="1" comment="kernel-trace-base is &lt;2.6.32.23-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211722" version="1" comment="kernel-trace-devel is &lt;2.6.32.23-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211723" version="1" comment="btrfs-kmp-default is &lt;0_2.6.32.19_0.3-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211724" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.32.19_0.3-7.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211725" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.32.19_0.3-7.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211726" version="1" comment="kernel-default is &lt;2.6.32.19-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211727" version="1" comment="kernel-default-base is &lt;2.6.32.19-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211728" version="1" comment="kernel-default-devel is &lt;2.6.32.19-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211729" version="1" comment="kernel-ppc64 is &lt;2.6.32.19-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211730" version="1" comment="kernel-ppc64-base is &lt;2.6.32.19-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211731" version="1" comment="kernel-ppc64-devel is &lt;2.6.32.19-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211732" version="1" comment="kernel-source is &lt;2.6.32.19-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211733" version="1" comment="kernel-syms is &lt;2.6.32.19-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211734" version="1" comment="kernel-trace is &lt;2.6.32.19-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211735" version="1" comment="kernel-trace-base is &lt;2.6.32.19-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211736" version="1" comment="kernel-trace-devel is &lt;2.6.32.19-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211737" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.27.48_0.12-7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264201" version="1" comment="ext4dev-kmp-pae is &lt;0_2.6.27.48_0.12-7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211738" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.27.48_0.12-7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264202" version="1" comment="ext4dev-kmp-vmi is &lt;0_2.6.27.48_0.12-7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230129" version="1" comment="ext4dev-kmp-xen is &lt;0_2.6.27.48_0.12-7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211739" version="1" comment="kernel-default is &lt;2.6.27.48-0.12" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211740" version="1" comment="kernel-default-base is &lt;2.6.27.48-0.12" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264203" version="1" comment="kernel-default-man is &lt;2.6.27.48-0.12" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211741" version="1" comment="kernel-kdump is &lt;2.6.27.48-0.12" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264204" version="1" comment="kernel-pae is &lt;2.6.27.48-0.12" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264205" version="1" comment="kernel-pae-base is &lt;2.6.27.48-0.12" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211742" version="1" comment="kernel-ppc64 is &lt;2.6.27.48-0.12" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211743" version="1" comment="kernel-ppc64-base is &lt;2.6.27.48-0.12" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211744" version="1" comment="kernel-source is &lt;2.6.27.48-0.12" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211745" version="1" comment="kernel-syms is &lt;2.6.27.48-0.12" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264206" version="1" comment="kernel-vmi is &lt;2.6.27.48-0.12" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264207" version="1" comment="kernel-vmi-base is &lt;2.6.27.48-0.12" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230130" version="1" comment="kernel-xen is &lt;2.6.27.48-0.12" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230131" version="1" comment="kernel-xen-base is &lt;2.6.27.48-0.12" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211746" version="1" comment="btrfs-kmp-default is &lt;0_2.6.32.24_0.2-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211747" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.32.24_0.2-7.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211748" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.32.24_0.2-7.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211749" version="1" comment="kernel-default is &lt;2.6.32.24-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211750" version="1" comment="kernel-default-base is &lt;2.6.32.24-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211751" version="1" comment="kernel-default-devel is &lt;2.6.32.24-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211752" version="1" comment="kernel-ppc64 is &lt;2.6.32.24-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211753" version="1" comment="kernel-ppc64-base is &lt;2.6.32.24-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211754" version="1" comment="kernel-ppc64-devel is &lt;2.6.32.24-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211755" version="1" comment="kernel-source is &lt;2.6.32.24-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211756" version="1" comment="kernel-syms is &lt;2.6.32.24-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211757" version="1" comment="kernel-trace is &lt;2.6.32.24-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211758" version="1" comment="kernel-trace-base is &lt;2.6.32.24-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211759" version="1" comment="kernel-trace-devel is &lt;2.6.32.24-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211760" version="1" comment="freetype2 is &lt;2.3.7-25.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211761" version="1" comment="freetype2-32bit is &lt;2.3.7-25.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265441" version="1" comment="freetype2-x86 is &lt;2.3.7-25.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211762" version="1" comment="cifs-mount is &lt;3.4.3-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211763" version="1" comment="ldapsmb is &lt;1.34b-11.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211764" version="1" comment="libsmbclient0 is &lt;3.4.3-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214653" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-1.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211766" version="1" comment="libtalloc1 is &lt;3.4.3-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214655" version="1" comment="libtalloc1-32bit is &lt;3.4.3-1.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211768" version="1" comment="libtdb1 is &lt;3.4.3-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214657" version="1" comment="libtdb1-32bit is &lt;3.4.3-1.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211770" version="1" comment="libwbclient0 is &lt;3.4.3-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214659" version="1" comment="libwbclient0-32bit is &lt;3.4.3-1.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211772" version="1" comment="samba is &lt;3.4.3-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214661" version="1" comment="samba-32bit is &lt;3.4.3-1.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211774" version="1" comment="samba-client is &lt;3.4.3-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214663" version="1" comment="samba-client-32bit is &lt;3.4.3-1.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214664" version="1" comment="samba-doc is &lt;3.4.3-1.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211776" version="1" comment="samba-krb-printing is &lt;3.4.3-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211777" version="1" comment="samba-winbind is &lt;3.4.3-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214667" version="1" comment="samba-winbind-32bit is &lt;3.4.3-1.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211765" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211767" version="1" comment="libtalloc1-32bit is &lt;3.4.3-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211769" version="1" comment="libtdb1-32bit is &lt;3.4.3-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211771" version="1" comment="libwbclient0-32bit is &lt;3.4.3-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211773" version="1" comment="samba-32bit is &lt;3.4.3-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211775" version="1" comment="samba-client-32bit is &lt;3.4.3-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211778" version="1" comment="samba-winbind-32bit is &lt;3.4.3-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211779" version="1" comment="MozillaFirefox is &lt;3.6.12-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211780" version="1" comment="MozillaFirefox-translations is &lt;3.6.12-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211781" version="1" comment="clamav is &lt;0.96.4-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211782" version="1" comment="btrfs-kmp-default is &lt;0_2.6.32.27_0.2-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211783" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.32.27_0.2-7.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211784" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.32.27_0.2-7.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211785" version="1" comment="kernel-default is &lt;2.6.32.27-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211786" version="1" comment="kernel-default-base is &lt;2.6.32.27-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211787" version="1" comment="kernel-default-devel is &lt;2.6.32.27-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211788" version="1" comment="kernel-ppc64 is &lt;2.6.32.27-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211789" version="1" comment="kernel-ppc64-base is &lt;2.6.32.27-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211790" version="1" comment="kernel-ppc64-devel is &lt;2.6.32.27-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211791" version="1" comment="kernel-source is &lt;2.6.32.27-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211792" version="1" comment="kernel-syms is &lt;2.6.32.27-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211793" version="1" comment="kernel-trace is &lt;2.6.32.27-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211794" version="1" comment="kernel-trace-base is &lt;2.6.32.27-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211795" version="1" comment="kernel-trace-devel is &lt;2.6.32.27-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211796" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211797" version="1" comment="php5 is &lt;5.2.14-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211798" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211799" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211800" version="1" comment="php5-calendar is &lt;5.2.14-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211801" version="1" comment="php5-ctype is &lt;5.2.14-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211802" version="1" comment="php5-curl is &lt;5.2.14-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211803" version="1" comment="php5-dba is &lt;5.2.14-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211804" version="1" comment="php5-dbase is &lt;5.2.14-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211805" version="1" comment="php5-dom is &lt;5.2.14-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211806" version="1" comment="php5-exif is &lt;5.2.14-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211807" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211808" version="1" comment="php5-ftp is &lt;5.2.14-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211809" version="1" comment="php5-gd is &lt;5.2.14-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211810" version="1" comment="php5-gettext is &lt;5.2.14-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211811" version="1" comment="php5-gmp is &lt;5.2.14-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211812" version="1" comment="php5-hash is &lt;5.2.14-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211813" version="1" comment="php5-iconv is &lt;5.2.14-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211814" version="1" comment="php5-json is &lt;5.2.14-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211815" version="1" comment="php5-ldap is &lt;5.2.14-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211816" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211817" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211818" version="1" comment="php5-mysql is &lt;5.2.14-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211819" version="1" comment="php5-odbc is &lt;5.2.14-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211820" version="1" comment="php5-openssl is &lt;5.2.14-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211821" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211822" version="1" comment="php5-pdo is &lt;5.2.14-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211823" version="1" comment="php5-pear is &lt;5.2.14-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211824" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211825" version="1" comment="php5-pspell is &lt;5.2.14-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211826" version="1" comment="php5-shmop is &lt;5.2.14-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211827" version="1" comment="php5-snmp is &lt;5.2.14-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211828" version="1" comment="php5-soap is &lt;5.2.14-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211829" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211830" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211831" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211832" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211833" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211834" version="1" comment="php5-wddx is &lt;5.2.14-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211835" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211836" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211837" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211838" version="1" comment="php5-xsl is &lt;5.2.14-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211839" version="1" comment="php5-zip is &lt;5.2.14-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211840" version="1" comment="php5-zlib is &lt;5.2.14-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211841" version="1" comment="freetype2 is &lt;2.3.7-25.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211842" version="1" comment="freetype2-32bit is &lt;2.3.7-25.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211843" version="1" comment="libmysqlclient15 is &lt;5.0.94-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211845" version="1" comment="libmysqlclient_r15 is &lt;5.0.94-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211846" version="1" comment="mysql is &lt;5.0.94-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211847" version="1" comment="mysql-Max is &lt;5.0.94-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211848" version="1" comment="mysql-client is &lt;5.0.94-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211844" version="1" comment="libmysqlclient15-32bit is &lt;5.0.94-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211849" version="1" comment="glibc is &lt;2.11.1-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211851" version="1" comment="glibc-devel is &lt;2.11.1-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211853" version="1" comment="glibc-html is &lt;2.11.1-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211854" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211855" version="1" comment="glibc-info is &lt;2.11.1-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211856" version="1" comment="glibc-locale is &lt;2.11.1-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211858" version="1" comment="glibc-profile is &lt;2.11.1-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211860" version="1" comment="nscd is &lt;2.11.1-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211850" version="1" comment="glibc-32bit is &lt;2.11.1-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211852" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211857" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211859" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211861" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-30.22.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211862" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8h-30.22.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264208" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8h-30.22.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211863" version="1" comment="openssl is &lt;0.9.8h-30.22.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211864" version="1" comment="openssl-doc is &lt;0.9.8h-30.22.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211865" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-30.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211867" version="1" comment="openssl is &lt;0.9.8h-30.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211868" version="1" comment="openssl-doc is &lt;0.9.8h-30.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211866" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8h-30.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211869" version="1" comment="brocade-bna-kmp-rt is &lt;2.1.0.0_2.6.33.20_rt31_0.3-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211870" version="1" comment="cluster-network-kmp-rt is &lt;1.4_2.6.33.20_rt31_0.3-2.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211871" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_2.6.33.20_rt31_0.3-2.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211872" version="1" comment="drbd-kmp-rt is &lt;8.3.11_2.6.33.20_rt31_0.3-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211873" version="1" comment="drbd-kmp-rt_trace is &lt;8.3.11_2.6.33.20_rt31_0.3-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211874" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.19_2.6.33.20_rt31_0.3-0.9.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211875" version="1" comment="kernel-rt is &lt;2.6.33.20-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211876" version="1" comment="kernel-rt-base is &lt;2.6.33.20-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211877" version="1" comment="kernel-rt-devel is &lt;2.6.33.20-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211878" version="1" comment="kernel-rt_trace is &lt;2.6.33.20-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211879" version="1" comment="kernel-rt_trace-base is &lt;2.6.33.20-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211880" version="1" comment="kernel-rt_trace-devel is &lt;2.6.33.20-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211881" version="1" comment="kernel-source-rt is &lt;2.6.33.20-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211882" version="1" comment="kernel-syms-rt is &lt;2.6.33.20-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211883" version="1" comment="ocfs2-kmp-rt is &lt;1.6_2.6.33.20_rt31_0.3-0.4.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211884" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_2.6.33.20_rt31_0.3-0.4.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211885" version="1" comment="ofed-kmp-rt is &lt;1.5.2_2.6.33.20_rt31_0.3-0.9.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211886" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.74_rt98_0.6.2-2.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211887" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.74_rt98_0.6.2-2.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211888" version="1" comment="drbd-kmp-rt is &lt;8.4.2_3.0.74_rt98_0.6.2-0.6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211889" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.2_3.0.74_rt98_0.6.2-0.6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211890" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.74_rt98_0.6.2-0.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211891" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.74_rt98_0.6.2-0.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211892" version="1" comment="kernel-rt is &lt;3.0.74.rt98-0.6.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211893" version="1" comment="kernel-rt-base is &lt;3.0.74.rt98-0.6.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211894" version="1" comment="kernel-rt-devel is &lt;3.0.74.rt98-0.6.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211895" version="1" comment="kernel-rt_trace is &lt;3.0.74.rt98-0.6.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211896" version="1" comment="kernel-rt_trace-base is &lt;3.0.74.rt98-0.6.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211897" version="1" comment="kernel-rt_trace-devel is &lt;3.0.74.rt98-0.6.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211898" version="1" comment="kernel-source-rt is &lt;3.0.74.rt98-0.6.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211899" version="1" comment="kernel-syms-rt is &lt;3.0.74.rt98-0.6.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211900" version="1" comment="lttng-modules-kmp-rt is &lt;2.0.4_3.0.74_rt98_0.6.2-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211901" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.0.4_3.0.74_rt98_0.6.2-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211902" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.74_rt98_0.6.2-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211903" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.74_rt98_0.6.2-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211904" version="1" comment="ofed-kmp-rt is &lt;1.5.2_3.0.74_rt98_0.6.2-0.28.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211905" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.2_3.0.74_rt98_0.6.2-0.28.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211906" version="1" comment="btrfs-kmp-default is &lt;0_2.6.32.54_0.3-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211907" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.32.54_0.3-7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211908" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.32.54_0.3-7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211909" version="1" comment="ext4dev-kmp-trace is &lt;0_2.6.32.54_0.3-7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211523" version="1" comment="hyper-v-kmp-trace is &lt;0_2.6.32.59_0.7-0.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211910" version="1" comment="kernel-default is &lt;2.6.32.54-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211911" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211912" version="1" comment="kernel-default-devel is &lt;2.6.32.54-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211913" version="1" comment="kernel-ppc64 is &lt;2.6.32.54-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211914" version="1" comment="kernel-ppc64-base is &lt;2.6.32.54-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211915" version="1" comment="kernel-ppc64-devel is &lt;2.6.32.54-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211916" version="1" comment="kernel-source is &lt;2.6.32.54-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211917" version="1" comment="kernel-syms is &lt;2.6.32.54-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211918" version="1" comment="kernel-trace is &lt;2.6.32.54-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211919" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211920" version="1" comment="kernel-trace-devel is &lt;2.6.32.54-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211921" version="1" comment="btrfs-kmp-default is &lt;0_2.6.32.36_0.5-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211922" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.32.36_0.5-7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211923" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.32.36_0.5-7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211924" version="1" comment="kernel-default is &lt;2.6.32.36-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211925" version="1" comment="kernel-default-base is &lt;2.6.32.36-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211926" version="1" comment="kernel-default-devel is &lt;2.6.32.36-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211927" version="1" comment="kernel-ppc64 is &lt;2.6.32.36-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211928" version="1" comment="kernel-ppc64-base is &lt;2.6.32.36-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211929" version="1" comment="kernel-ppc64-devel is &lt;2.6.32.36-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211930" version="1" comment="kernel-source is &lt;2.6.32.36-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211931" version="1" comment="kernel-syms is &lt;2.6.32.36-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211932" version="1" comment="kernel-trace is &lt;2.6.32.36-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211933" version="1" comment="kernel-trace-base is &lt;2.6.32.36-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211934" version="1" comment="kernel-trace-devel is &lt;2.6.32.36-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211935" version="1" comment="brocade-bna-kmp-rt is &lt;2.1.0.0_2.6.33.18_rt31_0.3-0.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211936" version="1" comment="cluster-network-kmp-rt is &lt;1.4_2.6.33.18_rt31_0.3-2.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211937" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_2.6.33.18_rt31_0.3-2.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211938" version="1" comment="drbd-kmp-rt is &lt;8.3.11_2.6.33.18_rt31_0.3-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211939" version="1" comment="drbd-kmp-rt_trace is &lt;8.3.11_2.6.33.18_rt31_0.3-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211940" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.19_2.6.33.18_rt31_0.3-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211941" version="1" comment="kernel-rt is &lt;2.6.33.18-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211942" version="1" comment="kernel-rt-base is &lt;2.6.33.18-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211943" version="1" comment="kernel-rt-devel is &lt;2.6.33.18-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211944" version="1" comment="kernel-rt_trace is &lt;2.6.33.18-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211945" version="1" comment="kernel-rt_trace-base is &lt;2.6.33.18-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211946" version="1" comment="kernel-rt_trace-devel is &lt;2.6.33.18-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211947" version="1" comment="kernel-source-rt is &lt;2.6.33.18-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211948" version="1" comment="kernel-syms-rt is &lt;2.6.33.18-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211949" version="1" comment="ocfs2-kmp-rt is &lt;1.6_2.6.33.18_rt31_0.3-0.4.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211950" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_2.6.33.18_rt31_0.3-0.4.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211951" version="1" comment="btrfs-kmp-default is &lt;0_2.6.32.45_0.3-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211952" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.32.45_0.3-7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211953" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.32.45_0.3-7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211954" version="1" comment="kernel-default is &lt;2.6.32.45-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211955" version="1" comment="kernel-default-base is &lt;2.6.32.45-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211956" version="1" comment="kernel-default-devel is &lt;2.6.32.45-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211957" version="1" comment="kernel-ppc64 is &lt;2.6.32.45-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211958" version="1" comment="kernel-ppc64-base is &lt;2.6.32.45-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211959" version="1" comment="kernel-ppc64-devel is &lt;2.6.32.45-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211960" version="1" comment="kernel-source is &lt;2.6.32.45-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211961" version="1" comment="kernel-syms is &lt;2.6.32.45-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211962" version="1" comment="kernel-trace is &lt;2.6.32.45-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211963" version="1" comment="kernel-trace-base is &lt;2.6.32.45-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211964" version="1" comment="kernel-trace-devel is &lt;2.6.32.45-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211965" version="1" comment="libxml2 is &lt;2.7.6-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211967" version="1" comment="libxml2-doc is &lt;2.7.6-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211966" version="1" comment="libxml2-32bit is &lt;2.7.6-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211968" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211969" version="1" comment="php5 is &lt;5.2.14-0.7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211970" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211971" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211972" version="1" comment="php5-calendar is &lt;5.2.14-0.7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211973" version="1" comment="php5-ctype is &lt;5.2.14-0.7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211974" version="1" comment="php5-curl is &lt;5.2.14-0.7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211975" version="1" comment="php5-dba is &lt;5.2.14-0.7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211976" version="1" comment="php5-dbase is &lt;5.2.14-0.7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211977" version="1" comment="php5-dom is &lt;5.2.14-0.7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211978" version="1" comment="php5-exif is &lt;5.2.14-0.7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211979" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211980" version="1" comment="php5-ftp is &lt;5.2.14-0.7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211981" version="1" comment="php5-gd is &lt;5.2.14-0.7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211982" version="1" comment="php5-gettext is &lt;5.2.14-0.7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211983" version="1" comment="php5-gmp is &lt;5.2.14-0.7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211984" version="1" comment="php5-hash is &lt;5.2.14-0.7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211985" version="1" comment="php5-iconv is &lt;5.2.14-0.7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211986" version="1" comment="php5-json is &lt;5.2.14-0.7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211987" version="1" comment="php5-ldap is &lt;5.2.14-0.7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211988" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211989" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211990" version="1" comment="php5-mysql is &lt;5.2.14-0.7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211991" version="1" comment="php5-odbc is &lt;5.2.14-0.7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211992" version="1" comment="php5-openssl is &lt;5.2.14-0.7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211993" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211994" version="1" comment="php5-pdo is &lt;5.2.14-0.7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211995" version="1" comment="php5-pear is &lt;5.2.14-0.7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211996" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211997" version="1" comment="php5-pspell is &lt;5.2.14-0.7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211998" version="1" comment="php5-shmop is &lt;5.2.14-0.7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211999" version="1" comment="php5-snmp is &lt;5.2.14-0.7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212000" version="1" comment="php5-soap is &lt;5.2.14-0.7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212001" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212002" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212003" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212004" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212005" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212006" version="1" comment="php5-wddx is &lt;5.2.14-0.7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212007" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212008" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212009" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212010" version="1" comment="php5-xsl is &lt;5.2.14-0.7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212011" version="1" comment="php5-zip is &lt;5.2.14-0.7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212012" version="1" comment="php5-zlib is &lt;5.2.14-0.7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212013" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-30.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212015" version="1" comment="openssl is &lt;0.9.8h-30.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212016" version="1" comment="openssl-doc is &lt;0.9.8h-30.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212014" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8h-30.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212017" version="1" comment="hplip is &lt;3.9.8-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212018" version="1" comment="hplip-hpijs is &lt;3.9.8-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212019" version="1" comment="dbus-1 is &lt;1.2.10-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212020" version="1" comment="dbus-1-32bit is &lt;1.2.10-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212021" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr9.1-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212022" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr9.1-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212023" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr9.1-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250576" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr9.1-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212024" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.9-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212025" version="1" comment="java-1_4_2-ibm-sap is &lt;1.4.2_sr13.9-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212026" version="1" comment="java-1_4_2-ibm-sap-devel is &lt;1.4.2_sr13.9-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212027" version="1" comment="libxml2 is &lt;2.7.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212029" version="1" comment="libxml2-doc is &lt;2.7.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212028" version="1" comment="libxml2-32bit is &lt;2.7.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212030" version="1" comment="glibc is &lt;2.11.1-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212032" version="1" comment="glibc-devel is &lt;2.11.1-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212034" version="1" comment="glibc-html is &lt;2.11.1-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212035" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212036" version="1" comment="glibc-info is &lt;2.11.1-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212037" version="1" comment="glibc-locale is &lt;2.11.1-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212039" version="1" comment="glibc-profile is &lt;2.11.1-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212041" version="1" comment="nscd is &lt;2.11.1-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212042" version="1" comment="btrfs-kmp-default is &lt;0_2.6.32.59_0.13-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212043" version="1" comment="btrfs-kmp-pae is &lt;0_2.6.32.59_0.13-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212044" version="1" comment="btrfs-kmp-xen is &lt;0_2.6.32.59_0.13-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212045" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.32.59_0.13-7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212046" version="1" comment="ext4dev-kmp-pae is &lt;0_2.6.32.59_0.13-7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212048" version="1" comment="ext4dev-kmp-xen is &lt;0_2.6.32.59_0.13-7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212049" version="1" comment="hyper-v-kmp-default is &lt;0_2.6.32.59_0.13-0.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212050" version="1" comment="hyper-v-kmp-pae is &lt;0_2.6.32.59_0.13-0.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212052" version="1" comment="kernel-default is &lt;2.6.32.59-0.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212053" version="1" comment="kernel-default-base is &lt;2.6.32.59-0.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212054" version="1" comment="kernel-default-devel is &lt;2.6.32.59-0.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264216" version="1" comment="kernel-default-man is &lt;2.6.32.59-0.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212056" version="1" comment="kernel-ec2 is &lt;2.6.32.59-0.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212057" version="1" comment="kernel-ec2-base is &lt;2.6.32.59-0.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212058" version="1" comment="kernel-ec2-devel is &lt;2.6.32.59-0.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264217" version="1" comment="kernel-pae is &lt;2.6.32.59-0.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264218" version="1" comment="kernel-pae-base is &lt;2.6.32.59-0.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264219" version="1" comment="kernel-pae-devel is &lt;2.6.32.59-0.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212062" version="1" comment="kernel-source is &lt;2.6.32.59-0.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212063" version="1" comment="kernel-syms is &lt;2.6.32.59-0.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212064" version="1" comment="kernel-trace is &lt;2.6.32.59-0.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212065" version="1" comment="kernel-trace-base is &lt;2.6.32.59-0.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212066" version="1" comment="kernel-trace-devel is &lt;2.6.32.59-0.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212067" version="1" comment="kernel-xen is &lt;2.6.32.59-0.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212068" version="1" comment="kernel-xen-base is &lt;2.6.32.59-0.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212069" version="1" comment="kernel-xen-devel is &lt;2.6.32.59-0.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212070" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.59_0.19-0.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264220" version="1" comment="xen-kmp-pae is &lt;4.0.3_21548_18_2.6.32.59_0.19-0.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212071" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.59_0.19-0.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212072" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-30.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212074" version="1" comment="openssl is &lt;0.9.8h-30.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212075" version="1" comment="openssl-doc is &lt;0.9.8h-30.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212073" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8h-30.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212076" version="1" comment="MozillaFirefox is &lt;3.6.17-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212077" version="1" comment="MozillaFirefox-translations is &lt;3.6.17-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212078" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.17-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212080" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.17-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212081" version="1" comment="mozilla-xulrunner192-translations is &lt;1.9.2.17-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212079" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.17-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212082" version="1" comment="MozillaFirefox is &lt;3.6.18-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212083" version="1" comment="MozillaFirefox-translations is &lt;3.6.18-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212084" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.18-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212086" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.18-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212087" version="1" comment="mozilla-xulrunner192-translations is &lt;1.9.2.18-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212085" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.18-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212088" version="1" comment="MozillaFirefox is &lt;3.6.20-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212089" version="1" comment="MozillaFirefox-translations is &lt;3.6.20-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212090" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.20-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212092" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.20-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212093" version="1" comment="mozilla-xulrunner192-translations is &lt;1.9.2.20-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212091" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.20-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212094" version="1" comment="libtiff3 is &lt;3.8.2-141.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212096" version="1" comment="tiff is &lt;3.8.2-141.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212095" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212097" version="1" comment="freetype2 is &lt;2.3.7-25.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212098" version="1" comment="freetype2-32bit is &lt;2.3.7-25.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212099" version="1" comment="krb5 is &lt;1.6.3-133.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212101" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212102" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212103" version="1" comment="krb5-client is &lt;1.6.3-133.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212104" version="1" comment="krb5-server is &lt;1.6.3-133.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212100" version="1" comment="krb5-32bit is &lt;1.6.3-133.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212105" version="1" comment="postfix is &lt;2.5.6-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212106" version="1" comment="postfix-doc is &lt;2.5.6-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212107" version="1" comment="postfix-mysql is &lt;2.5.6-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212108" version="1" comment="cifs-mount is &lt;3.4.3-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212109" version="1" comment="libsmbclient0 is &lt;3.4.3-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212111" version="1" comment="libtalloc1 is &lt;3.4.3-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212113" version="1" comment="libtdb1 is &lt;3.4.3-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212115" version="1" comment="libwbclient0 is &lt;3.4.3-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212117" version="1" comment="samba is &lt;3.4.3-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212119" version="1" comment="samba-client is &lt;3.4.3-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212121" version="1" comment="samba-krb-printing is &lt;3.4.3-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212122" version="1" comment="samba-winbind is &lt;3.4.3-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212110" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212112" version="1" comment="libtalloc1-32bit is &lt;3.4.3-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212114" version="1" comment="libtdb1-32bit is &lt;3.4.3-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212116" version="1" comment="libwbclient0-32bit is &lt;3.4.3-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212118" version="1" comment="samba-32bit is &lt;3.4.3-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212120" version="1" comment="samba-client-32bit is &lt;3.4.3-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212123" version="1" comment="samba-winbind-32bit is &lt;3.4.3-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212124" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr9.2-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212125" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr9.2-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212126" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr9.2-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250577" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr9.2-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212127" version="1" comment="java-1_4_2-ibm-sap is &lt;1.4.2_sr13.10-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212128" version="1" comment="java-1_4_2-ibm-sap-devel is &lt;1.4.2_sr13.10-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212129" version="1" comment="dhcpcd is &lt;3.2.3-44.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212130" version="1" comment="dhcp is &lt;3.1.3.ESV-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212131" version="1" comment="dhcp-client is &lt;3.1.3.ESV-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212132" version="1" comment="dhcp-relay is &lt;3.1.3.ESV-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212133" version="1" comment="dhcp-server is &lt;3.1.3.ESV-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212134" version="1" comment="clamav is &lt;0.97-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212135" version="1" comment="btrfs-kmp-default is &lt;0_2.6.32.43_0.4-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212136" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.32.43_0.4-7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212137" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.32.43_0.4-7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212138" version="1" comment="kernel-default is &lt;2.6.32.43-0.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212139" version="1" comment="kernel-default-base is &lt;2.6.32.43-0.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212140" version="1" comment="kernel-default-devel is &lt;2.6.32.43-0.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212141" version="1" comment="kernel-ppc64 is &lt;2.6.32.43-0.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212142" version="1" comment="kernel-ppc64-base is &lt;2.6.32.43-0.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212143" version="1" comment="kernel-ppc64-devel is &lt;2.6.32.43-0.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212144" version="1" comment="kernel-source is &lt;2.6.32.43-0.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212145" version="1" comment="kernel-syms is &lt;2.6.32.43-0.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212146" version="1" comment="kernel-trace is &lt;2.6.32.43-0.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212147" version="1" comment="kernel-trace-base is &lt;2.6.32.43-0.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212148" version="1" comment="kernel-trace-devel is &lt;2.6.32.43-0.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212149" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212150" version="1" comment="php5 is &lt;5.2.14-0.7.30.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212151" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212152" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212153" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212154" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212155" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212156" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212157" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212158" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212159" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212160" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212161" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212162" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212163" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212164" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212165" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212166" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212167" version="1" comment="php5-json is &lt;5.2.14-0.7.30.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212168" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212169" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212170" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212171" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212172" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212173" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212174" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212175" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212176" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212177" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212178" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212179" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212180" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212181" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212182" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212183" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212184" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212185" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212186" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212187" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212188" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212189" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212190" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212191" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212192" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212193" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212194" version="1" comment="kernel-default is &lt;3.0.26-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212195" version="1" comment="kernel-default-base is &lt;3.0.26-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212196" version="1" comment="kernel-default-devel is &lt;3.0.26-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212197" version="1" comment="kernel-default-extra is &lt;3.0.26-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212198" version="1" comment="kernel-source is &lt;3.0.26-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212199" version="1" comment="kernel-syms is &lt;3.0.26-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212200" version="1" comment="kernel-trace is &lt;3.0.26-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212201" version="1" comment="kernel-trace-base is &lt;3.0.26-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212202" version="1" comment="kernel-trace-devel is &lt;3.0.26-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212203" version="1" comment="kernel-trace-extra is &lt;3.0.26-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212204" version="1" comment="kernel-xen is &lt;3.0.26-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212205" version="1" comment="kernel-xen-base is &lt;3.0.26-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212206" version="1" comment="kernel-xen-devel is &lt;3.0.26-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212207" version="1" comment="kernel-xen-extra is &lt;3.0.26-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212208" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.26_0.7-2.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212209" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.26_0.7-2.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212211" version="1" comment="gfs2-kmp-default is &lt;2_3.0.26_0.7-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212212" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.26_0.7-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212214" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.26_0.7-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212215" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.26_0.7-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212217" version="1" comment="kernel-default is &lt;2.6.32.59-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212218" version="1" comment="kernel-default-base is &lt;2.6.32.59-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212219" version="1" comment="kernel-default-devel is &lt;2.6.32.59-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212220" version="1" comment="kernel-ppc64 is &lt;2.6.32.59-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212221" version="1" comment="kernel-ppc64-base is &lt;2.6.32.59-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212222" version="1" comment="kernel-ppc64-devel is &lt;2.6.32.59-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212223" version="1" comment="kernel-source is &lt;2.6.32.59-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212224" version="1" comment="kernel-syms is &lt;2.6.32.59-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212225" version="1" comment="kernel-trace is &lt;2.6.32.59-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212226" version="1" comment="kernel-trace-base is &lt;2.6.32.59-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212227" version="1" comment="kernel-trace-devel is &lt;2.6.32.59-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212228" version="1" comment="btrfs-kmp-default is &lt;0_2.6.32.59_0.9-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212230" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.32.59_0.9-7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212231" version="1" comment="ext4dev-kmp-trace is &lt;0_2.6.32.59_0.9-7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212235" version="1" comment="kernel-default is &lt;2.6.32.59-0.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212236" version="1" comment="kernel-default-base is &lt;2.6.32.59-0.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212237" version="1" comment="kernel-default-devel is &lt;2.6.32.59-0.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212059" version="1" comment="kernel-pae is &lt;2.6.32.59-0.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212060" version="1" comment="kernel-pae-base is &lt;2.6.32.59-0.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212061" version="1" comment="kernel-pae-devel is &lt;2.6.32.59-0.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212241" version="1" comment="kernel-source is &lt;2.6.32.59-0.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212242" version="1" comment="kernel-syms is &lt;2.6.32.59-0.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212243" version="1" comment="kernel-trace is &lt;2.6.32.59-0.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212244" version="1" comment="kernel-trace-base is &lt;2.6.32.59-0.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212245" version="1" comment="kernel-trace-devel is &lt;2.6.32.59-0.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213971" version="1" comment="kernel-xen is &lt;2.6.32.59-0.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213972" version="1" comment="kernel-xen-base is &lt;2.6.32.59-0.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213973" version="1" comment="kernel-xen-devel is &lt;2.6.32.59-0.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212868" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.32.59_0.7-7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213289" version="1" comment="kernel-default-man is &lt;3.0.101-0.7.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214533" version="1" comment="xen-kmp-default is &lt;4.1.6_06_3.0.101_0.7.23-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213305" version="1" comment="xen-kmp-pae is &lt;4.1.6_06_3.0.101_0.7.23-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214534" version="1" comment="xen-kmp-trace is &lt;4.1.6_06_3.0.101_0.7.23-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250597" version="1" comment="glibc is &lt;2.11.1-0.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250598" version="1" comment="glibc-32bit is &lt;2.11.1-0.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250599" version="1" comment="glibc-devel is &lt;2.11.1-0.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250600" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250601" version="1" comment="glibc-html is &lt;2.11.1-0.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250602" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250603" version="1" comment="glibc-info is &lt;2.11.1-0.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250604" version="1" comment="glibc-locale is &lt;2.11.1-0.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250605" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250606" version="1" comment="glibc-profile is &lt;2.11.1-0.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250607" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250608" version="1" comment="nscd is &lt;2.11.1-0.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212249" version="1" comment="kdelibs4 is &lt;4.3.5-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212250" version="1" comment="kdelibs4-core is &lt;4.3.5-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212251" version="1" comment="kdelibs4-doc is &lt;4.3.5-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212252" version="1" comment="libkde4 is &lt;4.3.5-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212254" version="1" comment="libkdecore4 is &lt;4.3.5-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212253" version="1" comment="libkde4-32bit is &lt;4.3.5-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212255" version="1" comment="libkdecore4-32bit is &lt;4.3.5-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212256" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212258" version="1" comment="php5 is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212259" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212260" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212261" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212262" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212263" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212264" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212265" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212266" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212267" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212268" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212269" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212270" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212271" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212272" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212273" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212274" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212275" version="1" comment="php5-json is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212276" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212277" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212278" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212279" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212280" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212281" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212282" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212283" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212284" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212285" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212286" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212287" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212288" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212289" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212290" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212291" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212292" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212293" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212294" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212295" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212296" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212297" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212298" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212299" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212300" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212301" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212257" version="1" comment="apache2-mod_php53 is &lt;5.3.8-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212302" version="1" comment="php53 is &lt;5.3.8-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212303" version="1" comment="php53-bcmath is &lt;5.3.8-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212304" version="1" comment="php53-bz2 is &lt;5.3.8-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212305" version="1" comment="php53-calendar is &lt;5.3.8-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212306" version="1" comment="php53-ctype is &lt;5.3.8-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212307" version="1" comment="php53-curl is &lt;5.3.8-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212308" version="1" comment="php53-dba is &lt;5.3.8-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212309" version="1" comment="php53-dom is &lt;5.3.8-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212310" version="1" comment="php53-exif is &lt;5.3.8-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212311" version="1" comment="php53-fastcgi is &lt;5.3.8-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212312" version="1" comment="php53-fileinfo is &lt;5.3.8-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212313" version="1" comment="php53-ftp is &lt;5.3.8-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212314" version="1" comment="php53-gd is &lt;5.3.8-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212315" version="1" comment="php53-gettext is &lt;5.3.8-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212316" version="1" comment="php53-gmp is &lt;5.3.8-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212317" version="1" comment="php53-iconv is &lt;5.3.8-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212318" version="1" comment="php53-intl is &lt;5.3.8-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212319" version="1" comment="php53-json is &lt;5.3.8-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212320" version="1" comment="php53-ldap is &lt;5.3.8-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212321" version="1" comment="php53-mbstring is &lt;5.3.8-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212322" version="1" comment="php53-mcrypt is &lt;5.3.8-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212323" version="1" comment="php53-mysql is &lt;5.3.8-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212324" version="1" comment="php53-odbc is &lt;5.3.8-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212325" version="1" comment="php53-openssl is &lt;5.3.8-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212326" version="1" comment="php53-pcntl is &lt;5.3.8-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212327" version="1" comment="php53-pdo is &lt;5.3.8-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212328" version="1" comment="php53-pear is &lt;5.3.8-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212329" version="1" comment="php53-pgsql is &lt;5.3.8-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212330" version="1" comment="php53-pspell is &lt;5.3.8-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212331" version="1" comment="php53-shmop is &lt;5.3.8-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212332" version="1" comment="php53-snmp is &lt;5.3.8-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212333" version="1" comment="php53-soap is &lt;5.3.8-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212334" version="1" comment="php53-suhosin is &lt;5.3.8-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212335" version="1" comment="php53-sysvmsg is &lt;5.3.8-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212336" version="1" comment="php53-sysvsem is &lt;5.3.8-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212337" version="1" comment="php53-sysvshm is &lt;5.3.8-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212338" version="1" comment="php53-tokenizer is &lt;5.3.8-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212339" version="1" comment="php53-wddx is &lt;5.3.8-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212340" version="1" comment="php53-xmlreader is &lt;5.3.8-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212341" version="1" comment="php53-xmlrpc is &lt;5.3.8-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212342" version="1" comment="php53-xmlwriter is &lt;5.3.8-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212343" version="1" comment="php53-xsl is &lt;5.3.8-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212344" version="1" comment="php53-zip is &lt;5.3.8-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212345" version="1" comment="php53-zlib is &lt;5.3.8-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212346" version="1" comment="php5-devel is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212347" version="1" comment="php5-imap is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212348" version="1" comment="php5-ncurses is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212349" version="1" comment="php5-posix is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212350" version="1" comment="php5-readline is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212351" version="1" comment="php5-sockets is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212352" version="1" comment="php5-sqlite is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212353" version="1" comment="php5-tidy is &lt;5.2.14-0.7.30.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212354" version="1" comment="php53-devel is &lt;5.3.8-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212355" version="1" comment="php53-imap is &lt;5.3.8-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212356" version="1" comment="php53-posix is &lt;5.3.8-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212357" version="1" comment="php53-readline is &lt;5.3.8-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212358" version="1" comment="php53-sockets is &lt;5.3.8-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212359" version="1" comment="php53-sqlite is &lt;5.3.8-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212360" version="1" comment="php53-tidy is &lt;5.3.8-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212361" version="1" comment="pure-ftpd is &lt;1.0.22-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212362" version="1" comment="btrfs-kmp-default is &lt;0_2.6.32.49_0.3-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212363" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.32.49_0.3-7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212364" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.32.49_0.3-7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212365" version="1" comment="ext4dev-kmp-trace is &lt;0_2.6.32.49_0.3-7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212366" version="1" comment="kernel-default is &lt;2.6.32.49-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212367" version="1" comment="kernel-default-base is &lt;2.6.32.49-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212368" version="1" comment="kernel-default-devel is &lt;2.6.32.49-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212369" version="1" comment="kernel-ppc64 is &lt;2.6.32.49-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212370" version="1" comment="kernel-ppc64-base is &lt;2.6.32.49-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212371" version="1" comment="kernel-ppc64-devel is &lt;2.6.32.49-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212372" version="1" comment="kernel-source is &lt;2.6.32.49-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212373" version="1" comment="kernel-syms is &lt;2.6.32.49-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212374" version="1" comment="kernel-trace is &lt;2.6.32.49-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212375" version="1" comment="kernel-trace-base is &lt;2.6.32.49-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212376" version="1" comment="kernel-trace-devel is &lt;2.6.32.49-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212377" version="1" comment="wireshark is &lt;1.4.4-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212378" version="1" comment="kvm is &lt;0.12.5-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212379" version="1" comment="cyrus-imapd is &lt;2.3.11-60.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212380" version="1" comment="perl-Cyrus-IMAP is &lt;2.3.11-60.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212381" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.3.11-60.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212382" version="1" comment="libxml2 is &lt;2.7.6-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212384" version="1" comment="libxml2-doc is &lt;2.7.6-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212383" version="1" comment="libxml2-32bit is &lt;2.7.6-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212385" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-30.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212387" version="1" comment="openssl is &lt;0.9.8h-30.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212388" version="1" comment="openssl-doc is &lt;0.9.8h-30.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212386" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8h-30.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212389" version="1" comment="wireshark is &lt;1.4.4-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212390" version="1" comment="kvm is &lt;0.12.5-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212391" version="1" comment="MozillaFirefox is &lt;3.6.24-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212392" version="1" comment="MozillaFirefox-translations is &lt;3.6.24-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212393" version="1" comment="bind is &lt;9.6ESVR4P3-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212394" version="1" comment="bind-chrootenv is &lt;9.6ESVR4P3-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212395" version="1" comment="bind-doc is &lt;9.6ESVR4P3-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212396" version="1" comment="bind-libs is &lt;9.6ESVR4P3-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213382" version="1" comment="bind-libs-32bit is &lt;9.6ESVR7P4-0.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212398" version="1" comment="bind-utils is &lt;9.6ESVR4P3-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212397" version="1" comment="bind-libs-32bit is &lt;9.6ESVR4P3-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212402" version="1" comment="cifs-mount is &lt;3.4.3-1.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212403" version="1" comment="ldapsmb is &lt;1.34b-11.27.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212404" version="1" comment="libsmbclient0 is &lt;3.4.3-1.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212406" version="1" comment="libtalloc1 is &lt;3.4.3-1.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212408" version="1" comment="libtdb1 is &lt;3.4.3-1.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212410" version="1" comment="libwbclient0 is &lt;3.4.3-1.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212412" version="1" comment="samba is &lt;3.4.3-1.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212414" version="1" comment="samba-client is &lt;3.4.3-1.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212416" version="1" comment="samba-krb-printing is &lt;3.4.3-1.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212417" version="1" comment="samba-winbind is &lt;3.4.3-1.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212405" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-1.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212407" version="1" comment="libtalloc1-32bit is &lt;3.4.3-1.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212409" version="1" comment="libtdb1-32bit is &lt;3.4.3-1.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212411" version="1" comment="libwbclient0-32bit is &lt;3.4.3-1.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212413" version="1" comment="samba-32bit is &lt;3.4.3-1.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212415" version="1" comment="samba-client-32bit is &lt;3.4.3-1.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212418" version="1" comment="samba-winbind-32bit is &lt;3.4.3-1.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212419" version="1" comment="clamav is &lt;0.97.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212420" version="1" comment="dhcp is &lt;3.1.3.ESV-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212421" version="1" comment="dhcp-client is &lt;3.1.3.ESV-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212422" version="1" comment="dhcp-relay is &lt;3.1.3.ESV-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212423" version="1" comment="dhcp-server is &lt;3.1.3.ESV-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212424" version="1" comment="libxml2 is &lt;2.7.6-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212426" version="1" comment="libxml2-doc is &lt;2.7.6-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212425" version="1" comment="libxml2-32bit is &lt;2.7.6-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212427" version="1" comment="btrfs-kmp-default is &lt;0_2.6.32.46_0.3-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212428" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.32.46_0.3-7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212429" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.32.46_0.3-7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212430" version="1" comment="kernel-default is &lt;2.6.32.46-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212431" version="1" comment="kernel-default-base is &lt;2.6.32.46-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212432" version="1" comment="kernel-default-devel is &lt;2.6.32.46-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212433" version="1" comment="kernel-ppc64 is &lt;2.6.32.46-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212434" version="1" comment="kernel-ppc64-base is &lt;2.6.32.46-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212435" version="1" comment="kernel-ppc64-devel is &lt;2.6.32.46-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212436" version="1" comment="kernel-source is &lt;2.6.32.46-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212437" version="1" comment="kernel-syms is &lt;2.6.32.46-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212438" version="1" comment="kernel-trace is &lt;2.6.32.46-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212439" version="1" comment="kernel-trace-base is &lt;2.6.32.46-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212440" version="1" comment="kernel-trace-devel is &lt;2.6.32.46-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212441" version="1" comment="MozillaFirefox is &lt;3.6.23-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212442" version="1" comment="MozillaFirefox-translations is &lt;3.6.23-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212443" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.23-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212445" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.23-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212446" version="1" comment="mozilla-xulrunner192-translations is &lt;1.9.2.23-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212444" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.23-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212447" version="1" comment="libpng12-0 is &lt;1.2.31-5.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212448" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212449" version="1" comment="libxml2 is &lt;2.7.6-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212451" version="1" comment="libxml2-doc is &lt;2.7.6-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212450" version="1" comment="libxml2-32bit is &lt;2.7.6-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212452" version="1" comment="apache2 is &lt;2.2.12-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212453" version="1" comment="apache2-doc is &lt;2.2.12-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212454" version="1" comment="apache2-example-pages is &lt;2.2.12-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212455" version="1" comment="apache2-prefork is &lt;2.2.12-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212456" version="1" comment="apache2-utils is &lt;2.2.12-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212457" version="1" comment="apache2-worker is &lt;2.2.12-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212458" version="1" comment="squid3 is &lt;3.1.12-8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212459" version="1" comment="cyrus-imapd is &lt;2.3.11-60.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212460" version="1" comment="perl-Cyrus-IMAP is &lt;2.3.11-60.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212461" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.3.11-60.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212462" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-30.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212464" version="1" comment="openssl is &lt;0.9.8h-30.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212465" version="1" comment="openssl-doc is &lt;0.9.8h-30.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212463" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8h-30.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212466" version="1" comment="popt is &lt;1.7-37.29.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212468" version="1" comment="rpm is &lt;4.4.2.3-37.29.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212467" version="1" comment="popt-32bit is &lt;1.7-37.29.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212469" version="1" comment="rpm-32bit is &lt;4.4.2.3-37.29.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212470" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.11-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212471" version="1" comment="java-1_4_2-ibm-sap is &lt;1.4.2_sr13.11-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212472" version="1" comment="java-1_4_2-ibm-sap-devel is &lt;1.4.2_sr13.11-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212473" version="1" comment="java-1_4_2-ibm-sap is &lt;1.4.2_sr13.12-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212474" version="1" comment="java-1_4_2-ibm-sap-devel is &lt;1.4.2_sr13.12-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212475" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.26-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212477" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.26-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212478" version="1" comment="mozilla-xulrunner192-translations is &lt;1.9.2.26-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212476" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.26-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212479" version="1" comment="puppet is &lt;2.6.12-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212480" version="1" comment="puppet-server is &lt;2.6.12-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212481" version="1" comment="libxslt is &lt;1.1.24-19.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212483" version="1" comment="apache2-mod_php53 is &lt;5.3.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212484" version="1" comment="php53 is &lt;5.3.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212485" version="1" comment="php53-bcmath is &lt;5.3.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212486" version="1" comment="php53-bz2 is &lt;5.3.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212487" version="1" comment="php53-calendar is &lt;5.3.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212488" version="1" comment="php53-ctype is &lt;5.3.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212489" version="1" comment="php53-curl is &lt;5.3.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212490" version="1" comment="php53-dba is &lt;5.3.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212491" version="1" comment="php53-dom is &lt;5.3.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212492" version="1" comment="php53-exif is &lt;5.3.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212493" version="1" comment="php53-fastcgi is &lt;5.3.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212494" version="1" comment="php53-fileinfo is &lt;5.3.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212495" version="1" comment="php53-ftp is &lt;5.3.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212496" version="1" comment="php53-gd is &lt;5.3.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212497" version="1" comment="php53-gettext is &lt;5.3.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212498" version="1" comment="php53-gmp is &lt;5.3.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212499" version="1" comment="php53-iconv is &lt;5.3.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212500" version="1" comment="php53-intl is &lt;5.3.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212501" version="1" comment="php53-json is &lt;5.3.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212502" version="1" comment="php53-ldap is &lt;5.3.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212503" version="1" comment="php53-mbstring is &lt;5.3.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212504" version="1" comment="php53-mcrypt is &lt;5.3.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212505" version="1" comment="php53-mysql is &lt;5.3.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212506" version="1" comment="php53-odbc is &lt;5.3.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212507" version="1" comment="php53-openssl is &lt;5.3.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212508" version="1" comment="php53-pcntl is &lt;5.3.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212509" version="1" comment="php53-pdo is &lt;5.3.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212510" version="1" comment="php53-pear is &lt;5.3.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212511" version="1" comment="php53-pgsql is &lt;5.3.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212512" version="1" comment="php53-pspell is &lt;5.3.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212513" version="1" comment="php53-shmop is &lt;5.3.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212514" version="1" comment="php53-snmp is &lt;5.3.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212515" version="1" comment="php53-soap is &lt;5.3.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212516" version="1" comment="php53-suhosin is &lt;5.3.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212517" version="1" comment="php53-sysvmsg is &lt;5.3.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212518" version="1" comment="php53-sysvsem is &lt;5.3.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212519" version="1" comment="php53-sysvshm is &lt;5.3.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212520" version="1" comment="php53-tokenizer is &lt;5.3.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212521" version="1" comment="php53-wddx is &lt;5.3.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212522" version="1" comment="php53-xmlreader is &lt;5.3.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212523" version="1" comment="php53-xmlrpc is &lt;5.3.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212524" version="1" comment="php53-xmlwriter is &lt;5.3.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212525" version="1" comment="php53-xsl is &lt;5.3.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212526" version="1" comment="php53-zip is &lt;5.3.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212527" version="1" comment="php53-zlib is &lt;5.3.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212528" version="1" comment="php53-devel is &lt;5.3.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212529" version="1" comment="php53-imap is &lt;5.3.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212530" version="1" comment="php53-posix is &lt;5.3.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212531" version="1" comment="php53-readline is &lt;5.3.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212532" version="1" comment="php53-sockets is &lt;5.3.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212533" version="1" comment="php53-sqlite is &lt;5.3.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212534" version="1" comment="php53-tidy is &lt;5.3.8-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212535" version="1" comment="bind is &lt;9.6ESVR5P1-0.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212536" version="1" comment="bind-chrootenv is &lt;9.6ESVR5P1-0.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212537" version="1" comment="bind-doc is &lt;9.6ESVR5P1-0.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212538" version="1" comment="bind-libs is &lt;9.6ESVR5P1-0.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212540" version="1" comment="bind-utils is &lt;9.6ESVR5P1-0.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212539" version="1" comment="bind-libs-32bit is &lt;9.6ESVR5P1-0.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212541" version="1" comment="lighttpd is &lt;1.4.20-2.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212542" version="1" comment="koan is &lt;2.0.10-0.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212543" version="1" comment="apache2 is &lt;2.2.12-1.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212544" version="1" comment="apache2-doc is &lt;2.2.12-1.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212545" version="1" comment="apache2-example-pages is &lt;2.2.12-1.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212546" version="1" comment="apache2-prefork is &lt;2.2.12-1.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212547" version="1" comment="apache2-utils is &lt;2.2.12-1.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212548" version="1" comment="apache2-worker is &lt;2.2.12-1.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212549" version="1" comment="apache2-devel is &lt;2.2.12-1.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212550" version="1" comment="wireshark is &lt;1.4.11-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212551" version="1" comment="MozillaFirefox is &lt;10.0.3-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212552" version="1" comment="MozillaFirefox-translations is &lt;10.0.3-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212553" version="1" comment="libfreebl3 is &lt;3.13.3-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212555" version="1" comment="mozilla-nspr is &lt;4.9.0-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212557" version="1" comment="mozilla-nss is &lt;3.13.3-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212559" version="1" comment="mozilla-nss-tools is &lt;3.13.3-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212554" version="1" comment="libfreebl3-32bit is &lt;3.13.3-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212556" version="1" comment="mozilla-nspr-32bit is &lt;4.9.0-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212558" version="1" comment="mozilla-nss-32bit is &lt;3.13.3-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212560" version="1" comment="MozillaFirefox is &lt;10.0.1-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212561" version="1" comment="MozillaFirefox-translations is &lt;10.0.1-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212562" version="1" comment="java-1_6_0-openjdk is &lt;1.6.0.0_b24.1.11.4-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212563" version="1" comment="java-1_6_0-openjdk-demo is &lt;1.6.0.0_b24.1.11.4-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212564" version="1" comment="java-1_6_0-openjdk-devel is &lt;1.6.0.0_b24.1.11.4-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212565" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr2.0-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212566" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr2.0-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212567" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr2.0-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212568" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr2.0-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212569" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr11.0-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212570" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr11.0-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212571" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr11.0-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212572" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr11.0-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212573" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr11.0-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212574" version="1" comment="libldb1 is &lt;3.6.3-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212575" version="1" comment="libldb1-32bit is &lt;3.6.3-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212576" version="1" comment="libsmbclient0 is &lt;3.6.3-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212577" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212578" version="1" comment="libtalloc2 is &lt;3.6.3-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212579" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212580" version="1" comment="libtdb1 is &lt;3.6.3-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212581" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212582" version="1" comment="libtevent0 is &lt;3.6.3-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212583" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212584" version="1" comment="libwbclient0 is &lt;3.6.3-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212585" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212586" version="1" comment="samba is &lt;3.6.3-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212587" version="1" comment="samba-32bit is &lt;3.6.3-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212588" version="1" comment="samba-client is &lt;3.6.3-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212589" version="1" comment="samba-client-32bit is &lt;3.6.3-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212590" version="1" comment="samba-doc is &lt;3.6.3-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212591" version="1" comment="samba-krb-printing is &lt;3.6.3-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212592" version="1" comment="samba-winbind is &lt;3.6.3-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212593" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212594" version="1" comment="ldapsmb is &lt;1.34b-12.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212595" version="1" comment="libldb-devel is &lt;3.6.3-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212596" version="1" comment="libnetapi-devel is &lt;3.6.3-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212597" version="1" comment="libnetapi0 is &lt;3.6.3-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212598" version="1" comment="libsmbclient-devel is &lt;3.6.3-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212599" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212600" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212601" version="1" comment="libtalloc-devel is &lt;3.6.3-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212602" version="1" comment="libtdb-devel is &lt;3.6.3-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212603" version="1" comment="libtevent-devel is &lt;3.6.3-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212604" version="1" comment="libwbclient-devel is &lt;3.6.3-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212605" version="1" comment="samba-devel is &lt;3.6.3-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212606" version="1" comment="libxml2 is &lt;2.7.6-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212608" version="1" comment="libxml2-doc is &lt;2.7.6-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212607" version="1" comment="libxml2-32bit is &lt;2.7.6-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212609" version="1" comment="postgresql is &lt;8.3.18-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212610" version="1" comment="postgresql-contrib is &lt;8.3.18-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212611" version="1" comment="postgresql-docs is &lt;8.3.18-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212612" version="1" comment="postgresql-server is &lt;8.3.18-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212613" version="1" comment="kernel-default is &lt;3.0.58-0.6.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212614" version="1" comment="kernel-default-base is &lt;3.0.58-0.6.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212615" version="1" comment="kernel-default-devel is &lt;3.0.58-0.6.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212616" version="1" comment="kernel-default-extra is &lt;3.0.58-0.6.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212617" version="1" comment="kernel-source is &lt;3.0.58-0.6.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212618" version="1" comment="kernel-syms is &lt;3.0.58-0.6.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212619" version="1" comment="kernel-trace is &lt;3.0.58-0.6.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212620" version="1" comment="kernel-trace-base is &lt;3.0.58-0.6.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212621" version="1" comment="kernel-trace-devel is &lt;3.0.58-0.6.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212622" version="1" comment="kernel-trace-extra is &lt;3.0.58-0.6.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212623" version="1" comment="kernel-xen is &lt;3.0.58-0.6.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212624" version="1" comment="kernel-xen-base is &lt;3.0.58-0.6.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212625" version="1" comment="kernel-xen-devel is &lt;3.0.58-0.6.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212626" version="1" comment="kernel-xen-extra is &lt;3.0.58-0.6.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212627" version="1" comment="xen-kmp-default is &lt;4.1.3_06_3.0.58_0.6.2-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212628" version="1" comment="xen-kmp-trace is &lt;4.1.3_06_3.0.58_0.6.2-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212629" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.58_0.6.2-2.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212630" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.58_0.6.2-2.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212632" version="1" comment="gfs2-kmp-default is &lt;2_3.0.58_0.6.2-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212633" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.58_0.6.2-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212635" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.58_0.6.2-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212636" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.58_0.6.2-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212641" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212642" version="1" comment="php5 is &lt;5.2.14-0.7.30.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212643" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212644" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212645" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212646" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212647" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212648" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212649" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212650" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212651" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212652" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212653" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212654" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212655" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212656" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212657" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212658" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212659" version="1" comment="php5-json is &lt;5.2.14-0.7.30.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212660" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212661" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212662" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212663" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212664" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212665" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212666" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212667" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212668" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212669" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212670" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212671" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212672" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212673" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212674" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212675" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212676" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212677" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212678" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212679" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212680" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212681" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212682" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212683" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212684" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212685" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212686" version="1" comment="apache2-mod_php53 is &lt;5.3.8-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212687" version="1" comment="php53 is &lt;5.3.8-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212688" version="1" comment="php53-bcmath is &lt;5.3.8-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212689" version="1" comment="php53-bz2 is &lt;5.3.8-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212690" version="1" comment="php53-calendar is &lt;5.3.8-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212691" version="1" comment="php53-ctype is &lt;5.3.8-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212692" version="1" comment="php53-curl is &lt;5.3.8-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212693" version="1" comment="php53-dba is &lt;5.3.8-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212694" version="1" comment="php53-dom is &lt;5.3.8-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212695" version="1" comment="php53-exif is &lt;5.3.8-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212696" version="1" comment="php53-fastcgi is &lt;5.3.8-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212697" version="1" comment="php53-fileinfo is &lt;5.3.8-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212698" version="1" comment="php53-ftp is &lt;5.3.8-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212699" version="1" comment="php53-gd is &lt;5.3.8-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212700" version="1" comment="php53-gettext is &lt;5.3.8-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212701" version="1" comment="php53-gmp is &lt;5.3.8-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212702" version="1" comment="php53-iconv is &lt;5.3.8-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212703" version="1" comment="php53-intl is &lt;5.3.8-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212704" version="1" comment="php53-json is &lt;5.3.8-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212705" version="1" comment="php53-ldap is &lt;5.3.8-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212706" version="1" comment="php53-mbstring is &lt;5.3.8-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212707" version="1" comment="php53-mcrypt is &lt;5.3.8-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212708" version="1" comment="php53-mysql is &lt;5.3.8-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212709" version="1" comment="php53-odbc is &lt;5.3.8-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212710" version="1" comment="php53-openssl is &lt;5.3.8-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212711" version="1" comment="php53-pcntl is &lt;5.3.8-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212712" version="1" comment="php53-pdo is &lt;5.3.8-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212713" version="1" comment="php53-pear is &lt;5.3.8-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212714" version="1" comment="php53-pgsql is &lt;5.3.8-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212715" version="1" comment="php53-pspell is &lt;5.3.8-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212716" version="1" comment="php53-shmop is &lt;5.3.8-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212717" version="1" comment="php53-snmp is &lt;5.3.8-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212718" version="1" comment="php53-soap is &lt;5.3.8-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212719" version="1" comment="php53-suhosin is &lt;5.3.8-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212720" version="1" comment="php53-sysvmsg is &lt;5.3.8-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212721" version="1" comment="php53-sysvsem is &lt;5.3.8-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212722" version="1" comment="php53-sysvshm is &lt;5.3.8-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212723" version="1" comment="php53-tokenizer is &lt;5.3.8-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212724" version="1" comment="php53-wddx is &lt;5.3.8-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212725" version="1" comment="php53-xmlreader is &lt;5.3.8-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212726" version="1" comment="php53-xmlrpc is &lt;5.3.8-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212727" version="1" comment="php53-xmlwriter is &lt;5.3.8-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212728" version="1" comment="php53-xsl is &lt;5.3.8-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212729" version="1" comment="php53-zip is &lt;5.3.8-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212730" version="1" comment="php53-zlib is &lt;5.3.8-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212731" version="1" comment="php53-devel is &lt;5.3.8-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212732" version="1" comment="php53-imap is &lt;5.3.8-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212733" version="1" comment="php53-posix is &lt;5.3.8-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212734" version="1" comment="php53-readline is &lt;5.3.8-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212735" version="1" comment="php53-sockets is &lt;5.3.8-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212736" version="1" comment="php53-sqlite is &lt;5.3.8-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212737" version="1" comment="php53-tidy is &lt;5.3.8-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212738" version="1" comment="libtiff3 is &lt;3.8.2-141.144" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212740" version="1" comment="tiff is &lt;3.8.2-141.144" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212739" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.144" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212741" version="1" comment="cifs-mount is &lt;3.4.3-1.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212742" version="1" comment="ldapsmb is &lt;1.34b-11.28.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212743" version="1" comment="libsmbclient0 is &lt;3.4.3-1.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212745" version="1" comment="libtalloc1 is &lt;3.4.3-1.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212747" version="1" comment="libtdb1 is &lt;3.4.3-1.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212749" version="1" comment="libwbclient0 is &lt;3.4.3-1.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212751" version="1" comment="samba is &lt;3.4.3-1.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212753" version="1" comment="samba-client is &lt;3.4.3-1.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212755" version="1" comment="samba-doc is &lt;3.4.3-1.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212756" version="1" comment="samba-krb-printing is &lt;3.4.3-1.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212757" version="1" comment="samba-winbind is &lt;3.4.3-1.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212744" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-1.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212746" version="1" comment="libtalloc1-32bit is &lt;3.4.3-1.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212748" version="1" comment="libtdb1-32bit is &lt;3.4.3-1.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212750" version="1" comment="libwbclient0-32bit is &lt;3.4.3-1.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212752" version="1" comment="samba-32bit is &lt;3.4.3-1.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212754" version="1" comment="samba-client-32bit is &lt;3.4.3-1.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212758" version="1" comment="samba-winbind-32bit is &lt;3.4.3-1.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212759" version="1" comment="acroread is &lt;9.5.3-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212760" version="1" comment="acroread-cmaps is &lt;9.4.6-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212761" version="1" comment="acroread-fonts-ja is &lt;9.4.6-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212762" version="1" comment="acroread-fonts-ko is &lt;9.4.6-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212763" version="1" comment="acroread-fonts-zh_CN is &lt;9.4.6-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212764" version="1" comment="acroread-fonts-zh_TW is &lt;9.4.6-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212765" version="1" comment="java-1_6_0-openjdk is &lt;1.6.0.0_b24.1.11.5-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212766" version="1" comment="java-1_6_0-openjdk-demo is &lt;1.6.0.0_b24.1.11.5-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212767" version="1" comment="java-1_6_0-openjdk-devel is &lt;1.6.0.0_b24.1.11.5-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212768" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.14-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212769" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr12.0-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212770" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr12.0-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212771" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr12.0-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212772" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr12.0-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212773" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr3.0-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212774" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr3.0-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212775" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr3.0-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212776" version="1" comment="java-1_4_2-ibm-devel is &lt;1.4.2_sr13.14-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212777" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr12.0-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212778" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr3.0-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212779" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr13.0-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212780" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.0-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212781" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr13.0-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212782" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr13.0-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214842" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.0-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212783" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr13.0-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212784" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr4.0-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212785" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr4.0-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212786" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr4.0-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212787" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr13.0-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212788" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr4.0-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212789" version="1" comment="wireshark is &lt;1.4.12-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212790" version="1" comment="kernel-default is &lt;3.0.51-0.7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212791" version="1" comment="kernel-default-base is &lt;3.0.51-0.7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212792" version="1" comment="kernel-default-devel is &lt;3.0.51-0.7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212793" version="1" comment="kernel-default-extra is &lt;3.0.51-0.7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212794" version="1" comment="kernel-source is &lt;3.0.51-0.7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212795" version="1" comment="kernel-syms is &lt;3.0.51-0.7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212796" version="1" comment="kernel-trace is &lt;3.0.51-0.7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212797" version="1" comment="kernel-trace-base is &lt;3.0.51-0.7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212798" version="1" comment="kernel-trace-devel is &lt;3.0.51-0.7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212799" version="1" comment="kernel-trace-extra is &lt;3.0.51-0.7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212800" version="1" comment="kernel-xen is &lt;3.0.51-0.7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212801" version="1" comment="kernel-xen-base is &lt;3.0.51-0.7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212802" version="1" comment="kernel-xen-devel is &lt;3.0.51-0.7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212803" version="1" comment="kernel-xen-extra is &lt;3.0.51-0.7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212804" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.51_0.7.9-2.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212805" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.51_0.7.9-2.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212807" version="1" comment="gfs2-kmp-default is &lt;2_3.0.51_0.7.9-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212808" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.51_0.7.9-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212810" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.51_0.7.9-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212811" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.51_0.7.9-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212816" version="1" comment="bind-libs is &lt;9.6ESVR7P1-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212817" version="1" comment="bind-libs-32bit is &lt;9.6ESVR7P1-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212818" version="1" comment="bind-utils is &lt;9.6ESVR7P1-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212819" version="1" comment="bind is &lt;9.6ESVR7P1-0.2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212820" version="1" comment="bind-chrootenv is &lt;9.6ESVR7P1-0.2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212821" version="1" comment="bind-doc is &lt;9.6ESVR7P1-0.2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212822" version="1" comment="bind-libs is &lt;9.6ESVR7P1-0.2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212824" version="1" comment="bind-utils is &lt;9.6ESVR7P1-0.2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212823" version="1" comment="bind-libs-32bit is &lt;9.6ESVR7P1-0.2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212825" version="1" comment="bind is &lt;9.6ESVR7P1-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212826" version="1" comment="bind-chrootenv is &lt;9.6ESVR7P1-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212827" version="1" comment="bind-doc is &lt;9.6ESVR7P1-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212828" version="1" comment="bind-devel is &lt;9.6ESVR7P1-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212829" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.13-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212830" version="1" comment="java-1_4_2-ibm-devel is &lt;1.4.2_sr13.13-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212831" version="1" comment="puppet is &lt;2.6.12-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212832" version="1" comment="puppet-server is &lt;2.6.12-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212833" version="1" comment="libtiff3 is &lt;3.8.2-141.146" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212835" version="1" comment="tiff is &lt;3.8.2-141.146" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212834" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.146" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212836" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212838" version="1" comment="openssl is &lt;0.9.8j-0.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212839" version="1" comment="openssl-doc is &lt;0.9.8j-0.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212837" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212840" version="1" comment="kernel-default is &lt;3.0.34-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212841" version="1" comment="kernel-default-base is &lt;3.0.34-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212842" version="1" comment="kernel-default-devel is &lt;3.0.34-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212843" version="1" comment="kernel-default-extra is &lt;3.0.34-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212844" version="1" comment="kernel-source is &lt;3.0.34-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212845" version="1" comment="kernel-syms is &lt;3.0.34-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212846" version="1" comment="kernel-trace is &lt;3.0.34-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212847" version="1" comment="kernel-trace-base is &lt;3.0.34-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212848" version="1" comment="kernel-trace-devel is &lt;3.0.34-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212849" version="1" comment="kernel-trace-extra is &lt;3.0.34-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212850" version="1" comment="kernel-xen is &lt;3.0.34-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212851" version="1" comment="kernel-xen-base is &lt;3.0.34-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212852" version="1" comment="kernel-xen-devel is &lt;3.0.34-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212853" version="1" comment="kernel-xen-extra is &lt;3.0.34-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212854" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.34_0.7-2.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212855" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.34_0.7-2.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212857" version="1" comment="gfs2-kmp-default is &lt;2_3.0.34_0.7-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212858" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.34_0.7-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212860" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.34_0.7-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212861" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.34_0.7-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212866" version="1" comment="btrfs-kmp-default is &lt;0_2.6.32.59_0.7-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212867" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.32.59_0.7-7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009211519" version="1" comment="ext4dev-kmp-trace is &lt;0_2.6.32.59_0.7-7.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212869" version="1" comment="kernel-default is &lt;3.0.31-0.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212870" version="1" comment="kernel-default-base is &lt;3.0.31-0.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212871" version="1" comment="kernel-default-devel is &lt;3.0.31-0.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212872" version="1" comment="kernel-default-extra is &lt;3.0.31-0.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212873" version="1" comment="kernel-source is &lt;3.0.31-0.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212874" version="1" comment="kernel-syms is &lt;3.0.31-0.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212875" version="1" comment="kernel-trace is &lt;3.0.31-0.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212876" version="1" comment="kernel-trace-base is &lt;3.0.31-0.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212877" version="1" comment="kernel-trace-devel is &lt;3.0.31-0.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212878" version="1" comment="kernel-trace-extra is &lt;3.0.31-0.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212879" version="1" comment="kernel-xen is &lt;3.0.31-0.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212880" version="1" comment="kernel-xen-base is &lt;3.0.31-0.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212881" version="1" comment="kernel-xen-devel is &lt;3.0.31-0.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212882" version="1" comment="kernel-xen-extra is &lt;3.0.31-0.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212883" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.31_0.9-2.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212884" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.31_0.9-2.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212886" version="1" comment="gfs2-kmp-default is &lt;2_3.0.31_0.9-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212887" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.31_0.9-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212889" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.31_0.9-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212890" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.31_0.9-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212895" version="1" comment="kernel-default is &lt;3.0.74-0.6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212896" version="1" comment="kernel-default-base is &lt;3.0.74-0.6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212897" version="1" comment="kernel-default-devel is &lt;3.0.74-0.6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212898" version="1" comment="kernel-default-extra is &lt;3.0.74-0.6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212899" version="1" comment="kernel-source is &lt;3.0.74-0.6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212900" version="1" comment="kernel-syms is &lt;3.0.74-0.6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212901" version="1" comment="kernel-trace is &lt;3.0.74-0.6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212902" version="1" comment="kernel-trace-base is &lt;3.0.74-0.6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212903" version="1" comment="kernel-trace-devel is &lt;3.0.74-0.6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212904" version="1" comment="kernel-trace-extra is &lt;3.0.74-0.6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212905" version="1" comment="kernel-xen is &lt;3.0.74-0.6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212906" version="1" comment="kernel-xen-base is &lt;3.0.74-0.6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212907" version="1" comment="kernel-xen-devel is &lt;3.0.74-0.6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212908" version="1" comment="kernel-xen-extra is &lt;3.0.74-0.6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212909" version="1" comment="xen-kmp-default is &lt;4.1.4_02_3.0.74_0.6.6-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212910" version="1" comment="xen-kmp-trace is &lt;4.1.4_02_3.0.74_0.6.6-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212911" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.74_0.6.6-2.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212912" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.74_0.6.6-2.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212914" version="1" comment="gfs2-kmp-default is &lt;2_3.0.74_0.6.6-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212915" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.74_0.6.6-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212917" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.74_0.6.6-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212918" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.74_0.6.6-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212923" version="1" comment="apache2-mod_php53 is &lt;5.3.8-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212924" version="1" comment="php53 is &lt;5.3.8-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212925" version="1" comment="php53-bcmath is &lt;5.3.8-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212926" version="1" comment="php53-bz2 is &lt;5.3.8-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212927" version="1" comment="php53-calendar is &lt;5.3.8-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212928" version="1" comment="php53-ctype is &lt;5.3.8-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212929" version="1" comment="php53-curl is &lt;5.3.8-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212930" version="1" comment="php53-dba is &lt;5.3.8-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212931" version="1" comment="php53-dom is &lt;5.3.8-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212932" version="1" comment="php53-exif is &lt;5.3.8-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212933" version="1" comment="php53-fastcgi is &lt;5.3.8-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212934" version="1" comment="php53-fileinfo is &lt;5.3.8-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212935" version="1" comment="php53-ftp is &lt;5.3.8-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212936" version="1" comment="php53-gd is &lt;5.3.8-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212937" version="1" comment="php53-gettext is &lt;5.3.8-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212938" version="1" comment="php53-gmp is &lt;5.3.8-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212939" version="1" comment="php53-iconv is &lt;5.3.8-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212940" version="1" comment="php53-intl is &lt;5.3.8-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212941" version="1" comment="php53-json is &lt;5.3.8-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212942" version="1" comment="php53-ldap is &lt;5.3.8-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212943" version="1" comment="php53-mbstring is &lt;5.3.8-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212944" version="1" comment="php53-mcrypt is &lt;5.3.8-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212945" version="1" comment="php53-mysql is &lt;5.3.8-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212946" version="1" comment="php53-odbc is &lt;5.3.8-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212947" version="1" comment="php53-openssl is &lt;5.3.8-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212948" version="1" comment="php53-pcntl is &lt;5.3.8-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212949" version="1" comment="php53-pdo is &lt;5.3.8-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212950" version="1" comment="php53-pear is &lt;5.3.8-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212951" version="1" comment="php53-pgsql is &lt;5.3.8-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212952" version="1" comment="php53-pspell is &lt;5.3.8-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212953" version="1" comment="php53-shmop is &lt;5.3.8-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212954" version="1" comment="php53-snmp is &lt;5.3.8-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212955" version="1" comment="php53-soap is &lt;5.3.8-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212956" version="1" comment="php53-suhosin is &lt;5.3.8-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212957" version="1" comment="php53-sysvmsg is &lt;5.3.8-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212958" version="1" comment="php53-sysvsem is &lt;5.3.8-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212959" version="1" comment="php53-sysvshm is &lt;5.3.8-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212960" version="1" comment="php53-tokenizer is &lt;5.3.8-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212961" version="1" comment="php53-wddx is &lt;5.3.8-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212962" version="1" comment="php53-xmlreader is &lt;5.3.8-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212963" version="1" comment="php53-xmlrpc is &lt;5.3.8-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212964" version="1" comment="php53-xmlwriter is &lt;5.3.8-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212965" version="1" comment="php53-xsl is &lt;5.3.8-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212966" version="1" comment="php53-zip is &lt;5.3.8-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212967" version="1" comment="php53-zlib is &lt;5.3.8-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212968" version="1" comment="php53-devel is &lt;5.3.8-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212969" version="1" comment="php53-imap is &lt;5.3.8-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212970" version="1" comment="php53-posix is &lt;5.3.8-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212971" version="1" comment="php53-readline is &lt;5.3.8-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212972" version="1" comment="php53-sockets is &lt;5.3.8-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212973" version="1" comment="php53-sqlite is &lt;5.3.8-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212974" version="1" comment="php53-tidy is &lt;5.3.8-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212975" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212977" version="1" comment="openssl is &lt;0.9.8j-0.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212978" version="1" comment="openssl-doc is &lt;0.9.8j-0.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212976" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212979" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212980" version="1" comment="php5 is &lt;5.2.14-0.7.30.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212981" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212982" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212983" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212984" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212985" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212986" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212987" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212988" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212989" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212990" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212991" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212992" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212993" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212994" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212995" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212996" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212997" version="1" comment="php5-json is &lt;5.2.14-0.7.30.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212998" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212999" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213000" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213001" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213002" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213003" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213004" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213005" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213006" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213007" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213008" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213009" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213010" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213011" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213012" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213013" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213014" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213015" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213016" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213017" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213018" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213019" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213020" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213021" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213022" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213023" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213024" version="1" comment="kernel-default is &lt;3.0.101-0.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213025" version="1" comment="kernel-default-base is &lt;3.0.101-0.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213026" version="1" comment="kernel-default-devel is &lt;3.0.101-0.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213027" version="1" comment="kernel-default-extra is &lt;3.0.101-0.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213028" version="1" comment="kernel-source is &lt;3.0.101-0.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213029" version="1" comment="kernel-syms is &lt;3.0.101-0.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213030" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213031" version="1" comment="kernel-xen is &lt;3.0.101-0.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213032" version="1" comment="kernel-xen-base is &lt;3.0.101-0.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213033" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213034" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213035" version="1" comment="xen-kmp-default is &lt;4.2.4_02_3.0.101_0.35-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213036" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.101_0.35-2.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213038" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.101_0.35-2.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213039" version="1" comment="gfs2-kmp-default is &lt;2_3.0.101_0.35-0.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213041" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.101_0.35-0.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213042" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.101_0.35-0.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213044" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.101_0.35-0.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213045" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.61_rt85_0.7-2.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213046" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.61_rt85_0.7-2.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213047" version="1" comment="drbd-kmp-rt is &lt;8.4.2_3.0.61_rt85_0.7-0.6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213048" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.2_3.0.61_rt85_0.7-0.6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213049" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.61_rt85_0.7-0.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213050" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.61_rt85_0.7-0.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213051" version="1" comment="kernel-rt is &lt;3.0.61.rt85-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213052" version="1" comment="kernel-rt-base is &lt;3.0.61.rt85-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213053" version="1" comment="kernel-rt-devel is &lt;3.0.61.rt85-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213054" version="1" comment="kernel-rt_trace is &lt;3.0.61.rt85-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213055" version="1" comment="kernel-rt_trace-base is &lt;3.0.61.rt85-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213056" version="1" comment="kernel-rt_trace-devel is &lt;3.0.61.rt85-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213057" version="1" comment="kernel-source-rt is &lt;3.0.61.rt85-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213058" version="1" comment="kernel-syms-rt is &lt;3.0.61.rt85-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213059" version="1" comment="lttng-modules-kmp-rt is &lt;2.0.4_3.0.61_rt85_0.7-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213060" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.0.4_3.0.61_rt85_0.7-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213061" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.61_rt85_0.7-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213062" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.61_rt85_0.7-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213063" version="1" comment="ofed-kmp-rt is &lt;1.5.2_3.0.61_rt85_0.7-0.26" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213064" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.2_3.0.61_rt85_0.7-0.26" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213065" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.101_rt130_0.24-2.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213066" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.101_rt130_0.24-2.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213067" version="1" comment="drbd-kmp-rt is &lt;8.4.4_3.0.101_rt130_0.24-0.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213068" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.4_3.0.101_rt130_0.24-0.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213069" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.101_rt130_0.24-0.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213070" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.101_rt130_0.24-0.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213071" version="1" comment="kernel-rt is &lt;3.0.101.rt130-0.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213072" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-0.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213073" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-0.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213074" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-0.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213075" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-0.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213076" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-0.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213077" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-0.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213078" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-0.24" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213079" version="1" comment="lttng-modules-kmp-rt is &lt;2.1.1_3.0.101_rt130_0.24-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213080" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.1.1_3.0.101_rt130_0.24-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213081" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.101_rt130_0.24-0.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213082" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.101_rt130_0.24-0.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213083" version="1" comment="ofed-kmp-rt is &lt;1.5.4.1_3.0.101_rt130_0.24-0.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213084" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.4.1_3.0.101_rt130_0.24-0.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213088" version="1" comment="kernel-trace is &lt;3.0.101-0.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213089" version="1" comment="kernel-trace-base is &lt;3.0.101-0.35" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250625" version="1" comment="kvm is &lt;0.12.5-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213090" version="1" comment="rubygem-actionpack-2_3 is &lt;2.3.14-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213091" version="1" comment="apache2-mod_php53 is &lt;5.3.8-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213092" version="1" comment="php53 is &lt;5.3.8-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213093" version="1" comment="php53-bcmath is &lt;5.3.8-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213094" version="1" comment="php53-bz2 is &lt;5.3.8-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213095" version="1" comment="php53-calendar is &lt;5.3.8-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213096" version="1" comment="php53-ctype is &lt;5.3.8-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213097" version="1" comment="php53-curl is &lt;5.3.8-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213098" version="1" comment="php53-dba is &lt;5.3.8-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213099" version="1" comment="php53-dom is &lt;5.3.8-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213100" version="1" comment="php53-exif is &lt;5.3.8-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213101" version="1" comment="php53-fastcgi is &lt;5.3.8-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213102" version="1" comment="php53-fileinfo is &lt;5.3.8-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213103" version="1" comment="php53-ftp is &lt;5.3.8-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213104" version="1" comment="php53-gd is &lt;5.3.8-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213105" version="1" comment="php53-gettext is &lt;5.3.8-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213106" version="1" comment="php53-gmp is &lt;5.3.8-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213107" version="1" comment="php53-iconv is &lt;5.3.8-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213108" version="1" comment="php53-intl is &lt;5.3.8-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213109" version="1" comment="php53-json is &lt;5.3.8-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213110" version="1" comment="php53-ldap is &lt;5.3.8-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213111" version="1" comment="php53-mbstring is &lt;5.3.8-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213112" version="1" comment="php53-mcrypt is &lt;5.3.8-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213113" version="1" comment="php53-mysql is &lt;5.3.8-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213114" version="1" comment="php53-odbc is &lt;5.3.8-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213115" version="1" comment="php53-openssl is &lt;5.3.8-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213116" version="1" comment="php53-pcntl is &lt;5.3.8-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213117" version="1" comment="php53-pdo is &lt;5.3.8-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213118" version="1" comment="php53-pear is &lt;5.3.8-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213119" version="1" comment="php53-pgsql is &lt;5.3.8-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213120" version="1" comment="php53-pspell is &lt;5.3.8-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213121" version="1" comment="php53-shmop is &lt;5.3.8-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213122" version="1" comment="php53-snmp is &lt;5.3.8-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213123" version="1" comment="php53-soap is &lt;5.3.8-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213124" version="1" comment="php53-suhosin is &lt;5.3.8-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213125" version="1" comment="php53-sysvmsg is &lt;5.3.8-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213126" version="1" comment="php53-sysvsem is &lt;5.3.8-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213127" version="1" comment="php53-sysvshm is &lt;5.3.8-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213128" version="1" comment="php53-tokenizer is &lt;5.3.8-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213129" version="1" comment="php53-wddx is &lt;5.3.8-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213130" version="1" comment="php53-xmlreader is &lt;5.3.8-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213131" version="1" comment="php53-xmlrpc is &lt;5.3.8-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213132" version="1" comment="php53-xmlwriter is &lt;5.3.8-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213133" version="1" comment="php53-xsl is &lt;5.3.8-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213134" version="1" comment="php53-zip is &lt;5.3.8-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213135" version="1" comment="php53-zlib is &lt;5.3.8-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213136" version="1" comment="php53-devel is &lt;5.3.8-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213137" version="1" comment="php53-imap is &lt;5.3.8-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213138" version="1" comment="php53-posix is &lt;5.3.8-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213139" version="1" comment="php53-readline is &lt;5.3.8-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213140" version="1" comment="php53-sockets is &lt;5.3.8-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213141" version="1" comment="php53-sqlite is &lt;5.3.8-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213142" version="1" comment="php53-tidy is &lt;5.3.8-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213143" version="1" comment="kernel-default is &lt;3.0.42-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213144" version="1" comment="kernel-default-base is &lt;3.0.42-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213145" version="1" comment="kernel-default-devel is &lt;3.0.42-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213146" version="1" comment="kernel-default-extra is &lt;3.0.42-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213147" version="1" comment="kernel-source is &lt;3.0.42-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213148" version="1" comment="kernel-syms is &lt;3.0.42-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213149" version="1" comment="kernel-trace is &lt;3.0.42-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213150" version="1" comment="kernel-trace-base is &lt;3.0.42-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213151" version="1" comment="kernel-trace-devel is &lt;3.0.42-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213152" version="1" comment="kernel-trace-extra is &lt;3.0.42-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213153" version="1" comment="kernel-xen is &lt;3.0.42-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213154" version="1" comment="kernel-xen-base is &lt;3.0.42-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213155" version="1" comment="kernel-xen-devel is &lt;3.0.42-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213156" version="1" comment="kernel-xen-extra is &lt;3.0.42-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213157" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.42_0.7-2.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213158" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.42_0.7-2.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213160" version="1" comment="gfs2-kmp-default is &lt;2_3.0.42_0.7-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213161" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.42_0.7-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213163" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.42_0.7-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213164" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.42_0.7-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213169" version="1" comment="kernel-default is &lt;3.0.38-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213170" version="1" comment="kernel-default-base is &lt;3.0.38-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213171" version="1" comment="kernel-default-devel is &lt;3.0.38-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213172" version="1" comment="kernel-default-extra is &lt;3.0.38-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213173" version="1" comment="kernel-source is &lt;3.0.38-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213174" version="1" comment="kernel-syms is &lt;3.0.38-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213175" version="1" comment="kernel-trace is &lt;3.0.38-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213176" version="1" comment="kernel-trace-base is &lt;3.0.38-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213177" version="1" comment="kernel-trace-devel is &lt;3.0.38-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213178" version="1" comment="kernel-trace-extra is &lt;3.0.38-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213179" version="1" comment="kernel-xen is &lt;3.0.38-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213180" version="1" comment="kernel-xen-base is &lt;3.0.38-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213181" version="1" comment="kernel-xen-devel is &lt;3.0.38-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213182" version="1" comment="kernel-xen-extra is &lt;3.0.38-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213183" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.38_0.5-2.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213184" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.38_0.5-2.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213186" version="1" comment="gfs2-kmp-default is &lt;2_3.0.38_0.5-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213187" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.38_0.5-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213189" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.38_0.5-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213190" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.38_0.5-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213195" version="1" comment="glibc is &lt;2.11.3-17.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213196" version="1" comment="glibc-32bit is &lt;2.11.3-17.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213197" version="1" comment="glibc-devel is &lt;2.11.3-17.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213198" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213199" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213200" version="1" comment="glibc-locale is &lt;2.11.3-17.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213201" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213202" version="1" comment="nscd is &lt;2.11.3-17.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213498" version="1" comment="glibc-32bit is &lt;2.11.3-17.45.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213500" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.45.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213203" version="1" comment="glibc-html is &lt;2.11.3-17.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213204" version="1" comment="glibc-info is &lt;2.11.3-17.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213505" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.45.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213205" version="1" comment="glibc-profile is &lt;2.11.3-17.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213507" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.45.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213207" version="1" comment="icedtea-web is &lt;1.4-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213208" version="1" comment="icedtea-web is &lt;1.4-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213209" version="1" comment="rubygem-actionpack-2_3 is &lt;2.3.14-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213210" version="1" comment="apache2-devel is &lt;2.2.12-1.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213211" version="1" comment="kvm is &lt;0.15.1-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213212" version="1" comment="dhcp is &lt;4.2.4.P1-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213213" version="1" comment="dhcp-client is &lt;4.2.4.P1-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213214" version="1" comment="dhcp-relay is &lt;4.2.4.P1-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213215" version="1" comment="dhcp-server is &lt;4.2.4.P1-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213216" version="1" comment="dhcp-devel is &lt;4.2.4.P1-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213217" version="1" comment="bind-libs is &lt;9.6ESVR7P2-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213218" version="1" comment="bind-libs-32bit is &lt;9.6ESVR7P2-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213219" version="1" comment="bind-utils is &lt;9.6ESVR7P2-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213220" version="1" comment="bind is &lt;9.6ESVR7P2-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213221" version="1" comment="bind-chrootenv is &lt;9.6ESVR7P2-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213222" version="1" comment="bind-doc is &lt;9.6ESVR7P2-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213223" version="1" comment="bind-devel is &lt;9.6ESVR7P2-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213224" version="1" comment="dhcp is &lt;4.2.4.P2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213225" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213226" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213227" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213228" version="1" comment="dhcp-devel is &lt;4.2.4.P2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213229" version="1" comment="wireshark is &lt;1.4.15-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213230" version="1" comment="wireshark-devel is &lt;1.4.15-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213231" version="1" comment="bind-libs is &lt;9.6ESVR7P3-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213232" version="1" comment="bind-libs-32bit is &lt;9.6ESVR7P3-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213233" version="1" comment="bind-utils is &lt;9.6ESVR7P3-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213234" version="1" comment="bind is &lt;9.6ESVR7P3-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213235" version="1" comment="bind-chrootenv is &lt;9.6ESVR7P3-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213236" version="1" comment="bind-doc is &lt;9.6ESVR7P3-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213237" version="1" comment="bind-libs is &lt;9.6ESVR7P3-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250744" version="1" comment="bind-libs-32bit is &lt;9.6ESVR10P2-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213239" version="1" comment="bind-utils is &lt;9.6ESVR7P3-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213238" version="1" comment="bind-libs-32bit is &lt;9.6ESVR7P3-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213240" version="1" comment="bind is &lt;9.6ESVR7P3-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213241" version="1" comment="bind-chrootenv is &lt;9.6ESVR7P3-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213242" version="1" comment="bind-doc is &lt;9.6ESVR7P3-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213243" version="1" comment="bind-devel is &lt;9.6ESVR7P3-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213244" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.46" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213245" version="1" comment="kernel-default is &lt;3.0.101-0.46" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213246" version="1" comment="kernel-default-base is &lt;3.0.101-0.46" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213247" version="1" comment="kernel-default-devel is &lt;3.0.101-0.46" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213248" version="1" comment="kernel-default-extra is &lt;3.0.101-0.46" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264348" version="1" comment="kernel-pae is &lt;3.0.101-0.42" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264349" version="1" comment="kernel-pae-base is &lt;3.0.101-0.42" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264350" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.42" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264351" version="1" comment="kernel-pae-extra is &lt;3.0.101-0.42" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213249" version="1" comment="kernel-source is &lt;3.0.101-0.46" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213250" version="1" comment="kernel-syms is &lt;3.0.101-0.46" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213251" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.46" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213252" version="1" comment="kernel-xen is &lt;3.0.101-0.46" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213253" version="1" comment="kernel-xen-base is &lt;3.0.101-0.46" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213254" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.46" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213255" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.46" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213256" version="1" comment="xen-kmp-default is &lt;4.2.5_02_3.0.101_0.46-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264352" version="1" comment="xen-kmp-pae is &lt;4.2.5_02_3.0.101_0.42-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233169" version="1" comment="cluster-network-kmp-bigsmp is &lt;1.4_3.0.101_0.46-2.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233170" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.101_0.46-2.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264353" version="1" comment="cluster-network-kmp-pae is &lt;1.4_3.0.101_0.42-2.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213258" version="1" comment="cluster-network-kmp-ppc64 is &lt;1.4_3.0.101_0.42-2.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233171" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.101_0.46-2.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233172" version="1" comment="cluster-network-kmp-xen is &lt;1.4_3.0.101_0.46-2.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233173" version="1" comment="gfs2-kmp-bigsmp is &lt;2_3.0.101_0.46-0.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233174" version="1" comment="gfs2-kmp-default is &lt;2_3.0.101_0.46-0.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264354" version="1" comment="gfs2-kmp-pae is &lt;2_3.0.101_0.42-0.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213261" version="1" comment="gfs2-kmp-ppc64 is &lt;2_3.0.101_0.42-0.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233175" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.101_0.46-0.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233176" version="1" comment="gfs2-kmp-xen is &lt;2_3.0.101_0.46-0.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233177" version="1" comment="ocfs2-kmp-bigsmp is &lt;1.6_3.0.101_0.46-0.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233178" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.101_0.46-0.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264355" version="1" comment="ocfs2-kmp-pae is &lt;1.6_3.0.101_0.42-0.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213264" version="1" comment="ocfs2-kmp-ppc64 is &lt;1.6_3.0.101_0.42-0.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233179" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.101_0.46-0.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233180" version="1" comment="ocfs2-kmp-xen is &lt;1.6_3.0.101_0.46-0.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213266" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.101_rt130_0.32-2.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213267" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.101_rt130_0.32-2.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213268" version="1" comment="drbd-kmp-rt is &lt;8.4.4_3.0.101_rt130_0.32-0.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213269" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.4_3.0.101_rt130_0.32-0.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213270" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.101_rt130_0.32-0.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213271" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.101_rt130_0.32-0.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213272" version="1" comment="kernel-rt is &lt;3.0.101.rt130-0.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213273" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-0.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213274" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-0.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213275" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-0.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213276" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-0.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213277" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-0.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213278" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-0.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213279" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-0.32" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213280" version="1" comment="lttng-modules-kmp-rt is &lt;2.1.1_3.0.101_rt130_0.32-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213281" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.1.1_3.0.101_rt130_0.32-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213282" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.101_rt130_0.32-0.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213283" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.101_rt130_0.32-0.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213284" version="1" comment="ofed-kmp-rt is &lt;1.5.4.1_3.0.101_rt130_0.32-0.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213285" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.4.1_3.0.101_rt130_0.32-0.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213286" version="1" comment="kernel-default is &lt;3.0.101-0.7.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213287" version="1" comment="kernel-default-base is &lt;3.0.101-0.7.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213288" version="1" comment="kernel-default-devel is &lt;3.0.101-0.7.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264356" version="1" comment="kernel-default-man is &lt;3.0.101-0.7.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213290" version="1" comment="kernel-ec2 is &lt;3.0.101-0.7.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213291" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.7.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213292" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.7.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264357" version="1" comment="kernel-pae is &lt;3.0.101-0.7.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264358" version="1" comment="kernel-pae-base is &lt;3.0.101-0.7.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264359" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.7.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213296" version="1" comment="kernel-source is &lt;3.0.101-0.7.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213297" version="1" comment="kernel-syms is &lt;3.0.101-0.7.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213298" version="1" comment="kernel-trace is &lt;3.0.101-0.7.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213299" version="1" comment="kernel-trace-base is &lt;3.0.101-0.7.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213300" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.7.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213301" version="1" comment="kernel-xen is &lt;3.0.101-0.7.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213302" version="1" comment="kernel-xen-base is &lt;3.0.101-0.7.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213303" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.7.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213304" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.29-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264360" version="1" comment="xen-kmp-pae is &lt;4.1.6_08_3.0.101_0.7.29-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213306" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.29-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213307" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.46" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213308" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.46" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264361" version="1" comment="kernel-default-man is &lt;3.0.101-0.42" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213309" version="1" comment="kernel-ec2 is &lt;3.0.101-0.46" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213310" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.46" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213311" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.46" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264362" version="1" comment="kernel-ppc64 is &lt;3.0.101-0.42" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264363" version="1" comment="kernel-ppc64-base is &lt;3.0.101-0.42" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264364" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-0.42" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213312" version="1" comment="kernel-trace is &lt;3.0.101-0.46" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213313" version="1" comment="kernel-trace-base is &lt;3.0.101-0.46" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213314" version="1" comment="glibc is &lt;2.11.3-17.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213315" version="1" comment="glibc-32bit is &lt;2.11.3-17.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213316" version="1" comment="glibc-devel is &lt;2.11.3-17.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213317" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213318" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213319" version="1" comment="glibc-locale is &lt;2.11.3-17.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213320" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213321" version="1" comment="nscd is &lt;2.11.3-17.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213322" version="1" comment="glibc is &lt;2.11.1-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213324" version="1" comment="glibc-devel is &lt;2.11.1-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213326" version="1" comment="glibc-html is &lt;2.11.1-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213327" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213328" version="1" comment="glibc-info is &lt;2.11.1-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213329" version="1" comment="glibc-locale is &lt;2.11.1-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213331" version="1" comment="glibc-profile is &lt;2.11.1-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213333" version="1" comment="nscd is &lt;2.11.1-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250626" version="1" comment="glibc is &lt;2.11.1-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250627" version="1" comment="glibc-32bit is &lt;2.11.1-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250628" version="1" comment="glibc-devel is &lt;2.11.1-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250629" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250630" version="1" comment="glibc-html is &lt;2.11.1-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250631" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250632" version="1" comment="glibc-info is &lt;2.11.1-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250633" version="1" comment="glibc-locale is &lt;2.11.1-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250634" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250635" version="1" comment="glibc-profile is &lt;2.11.1-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250636" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250637" version="1" comment="nscd is &lt;2.11.1-0.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213334" version="1" comment="glibc-html is &lt;2.11.3-17.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213335" version="1" comment="glibc-info is &lt;2.11.3-17.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213336" version="1" comment="glibc-profile is &lt;2.11.3-17.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213337" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213338" version="1" comment="libtiff3 is &lt;3.8.2-141.150" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213339" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.150" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213340" version="1" comment="tiff is &lt;3.8.2-141.150" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213341" version="1" comment="libtiff-devel is &lt;3.8.2-141.150" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213342" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-141.150" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213343" version="1" comment="ruby-devel is &lt;1.8.7.p357-0.9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213344" version="1" comment="ruby-doc-ri is &lt;1.8.7.p357-0.9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213345" version="1" comment="ruby-examples is &lt;1.8.7.p357-0.9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213346" version="1" comment="ruby-test-suite is &lt;1.8.7.p357-0.9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213347" version="1" comment="icedtea-web is &lt;1.4.1-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213348" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213349" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213350" version="1" comment="libqt4 is &lt;4.6.3-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213351" version="1" comment="libqt4-32bit is &lt;4.6.3-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213352" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213353" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213354" version="1" comment="libqt4-sql is &lt;4.6.3-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213355" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213356" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213357" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.6.3-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213358" version="1" comment="libqt4-sql-postgresql is &lt;4.6.3-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213359" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.6.3-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213360" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213361" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.6.3-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213362" version="1" comment="libqt4-sql-unixODBC is &lt;4.6.3-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213363" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.6.3-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213364" version="1" comment="libqt4-x11 is &lt;4.6.3-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213365" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213366" version="1" comment="libQtWebKit-devel is &lt;4.6.3-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213367" version="1" comment="libqt4-devel is &lt;4.6.3-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213368" version="1" comment="libqt4-devel-doc-data is &lt;4.6.3-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213369" version="1" comment="libxml2 is &lt;2.7.6-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213370" version="1" comment="libxml2-32bit is &lt;2.7.6-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213371" version="1" comment="libxml2-python is &lt;2.7.6-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213372" version="1" comment="libxml2-doc is &lt;2.7.6-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213373" version="1" comment="libxml2-devel is &lt;2.7.6-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213374" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213375" version="1" comment="bind-libs is &lt;9.6ESVR7P4-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213376" version="1" comment="bind-libs-32bit is &lt;9.6ESVR7P4-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213377" version="1" comment="bind-utils is &lt;9.6ESVR7P4-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213378" version="1" comment="bind is &lt;9.6ESVR7P4-0.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213379" version="1" comment="bind-chrootenv is &lt;9.6ESVR7P4-0.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213380" version="1" comment="bind-doc is &lt;9.6ESVR7P4-0.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213381" version="1" comment="bind-libs is &lt;9.6ESVR7P4-0.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213383" version="1" comment="bind-utils is &lt;9.6ESVR7P4-0.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213384" version="1" comment="bind is &lt;9.6ESVR7P4-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213385" version="1" comment="bind-chrootenv is &lt;9.6ESVR7P4-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213386" version="1" comment="bind-doc is &lt;9.6ESVR7P4-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213387" version="1" comment="bind-devel is &lt;9.6ESVR7P4-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213388" version="1" comment="flash-player is &lt;11.2.202.243-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213389" version="1" comment="flash-player is &lt;11.2.202.251-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213390" version="1" comment="xen is &lt;4.1.3_06-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213391" version="1" comment="xen-doc-html is &lt;4.1.3_06-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213392" version="1" comment="xen-doc-pdf is &lt;4.1.3_06-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213393" version="1" comment="xen-kmp-default is &lt;4.1.3_06_3.0.51_0.7.9-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213394" version="1" comment="xen-kmp-trace is &lt;4.1.3_06_3.0.51_0.7.9-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213395" version="1" comment="xen-libs is &lt;4.1.3_06-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213396" version="1" comment="xen-libs-32bit is &lt;4.1.3_06-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213397" version="1" comment="xen-tools is &lt;4.1.3_06-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213398" version="1" comment="xen-tools-domU is &lt;4.1.3_06-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250638" version="1" comment="xen is &lt;4.0.3_21548_12-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250639" version="1" comment="xen-doc-html is &lt;4.0.3_21548_12-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250640" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_12-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250641" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_12_2.6.32.54_0.11.TDC-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250642" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_12_2.6.32.54_0.11.TDC-0.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250643" version="1" comment="xen-libs is &lt;4.0.3_21548_12-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250644" version="1" comment="xen-tools is &lt;4.0.3_21548_12-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250645" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_12-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213399" version="1" comment="xen-devel is &lt;4.1.3_06-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213400" version="1" comment="wireshark is &lt;1.8.4-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213401" version="1" comment="wireshark-devel is &lt;1.8.4-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213402" version="1" comment="libmysql55client18 is &lt;5.5.42-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213403" version="1" comment="libmysql55client18-32bit is &lt;5.5.42-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213404" version="1" comment="libmysql55client_r18 is &lt;5.5.42-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213405" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.42-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213406" version="1" comment="mysql is &lt;5.5.42-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213407" version="1" comment="mysql-client is &lt;5.5.42-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264365" version="1" comment="libmysql55client18-x86 is &lt;5.5.42-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213408" version="1" comment="mysql-tools is &lt;5.5.42-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264366" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.42-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215700" version="1" comment="xen is &lt;4.1.6_08-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215701" version="1" comment="xen-doc-html is &lt;4.1.6_08-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215702" version="1" comment="xen-doc-pdf is &lt;4.1.6_08-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215707" version="1" comment="xen-libs-32bit is &lt;4.1.6_08-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215708" version="1" comment="xen-tools is &lt;4.1.6_08-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213409" version="1" comment="flash-player is &lt;11.2.202.258-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213410" version="1" comment="gpg2 is &lt;2.0.9-25.33.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213411" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213412" version="1" comment="nagios-devel is &lt;3.0.6-1.25.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213413" version="1" comment="libldb1 is &lt;3.6.3-0.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213414" version="1" comment="libldb1-32bit is &lt;3.6.3-0.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213415" version="1" comment="libsmbclient0 is &lt;3.6.3-0.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213416" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213417" version="1" comment="libtalloc2 is &lt;3.6.3-0.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213418" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213419" version="1" comment="libtdb1 is &lt;3.6.3-0.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213420" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213421" version="1" comment="libtevent0 is &lt;3.6.3-0.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213422" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213423" version="1" comment="libwbclient0 is &lt;3.6.3-0.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213424" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213425" version="1" comment="samba is &lt;3.6.3-0.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213426" version="1" comment="samba-32bit is &lt;3.6.3-0.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213427" version="1" comment="samba-client is &lt;3.6.3-0.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213428" version="1" comment="samba-client-32bit is &lt;3.6.3-0.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213429" version="1" comment="samba-doc is &lt;3.6.3-0.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213430" version="1" comment="samba-krb-printing is &lt;3.6.3-0.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213431" version="1" comment="samba-winbind is &lt;3.6.3-0.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213432" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213433" version="1" comment="cifs-mount is &lt;3.4.3-1.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213434" version="1" comment="ldapsmb is &lt;1.34b-11.28.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213435" version="1" comment="libsmbclient0 is &lt;3.4.3-1.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213437" version="1" comment="libtalloc1 is &lt;3.4.3-1.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213439" version="1" comment="libtdb1 is &lt;3.4.3-1.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213441" version="1" comment="libwbclient0 is &lt;3.4.3-1.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213443" version="1" comment="samba is &lt;3.4.3-1.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213445" version="1" comment="samba-client is &lt;3.4.3-1.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213447" version="1" comment="samba-doc is &lt;3.4.3-1.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213448" version="1" comment="samba-krb-printing is &lt;3.4.3-1.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213449" version="1" comment="samba-winbind is &lt;3.4.3-1.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250646" version="1" comment="cifs-mount is &lt;3.4.3-1.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250647" version="1" comment="ldapsmb is &lt;1.34b-11.28.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250648" version="1" comment="libsmbclient0 is &lt;3.4.3-1.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250649" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-1.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250650" version="1" comment="libtdb1 is &lt;3.4.3-1.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250651" version="1" comment="libtdb1-32bit is &lt;3.4.3-1.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250652" version="1" comment="libwbclient0 is &lt;3.4.3-1.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250653" version="1" comment="libwbclient0-32bit is &lt;3.4.3-1.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250654" version="1" comment="samba is &lt;3.4.3-1.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250655" version="1" comment="samba-32bit is &lt;3.4.3-1.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250656" version="1" comment="samba-client is &lt;3.4.3-1.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250657" version="1" comment="samba-client-32bit is &lt;3.4.3-1.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250658" version="1" comment="samba-doc is &lt;3.4.3-1.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250659" version="1" comment="samba-krb-printing is &lt;3.4.3-1.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250660" version="1" comment="samba-winbind is &lt;3.4.3-1.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250661" version="1" comment="samba-winbind-32bit is &lt;3.4.3-1.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214691" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.33.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214693" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.33.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214695" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.33.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214697" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.33.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214699" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.33.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214701" version="1" comment="samba-32bit is &lt;3.6.3-0.33.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214703" version="1" comment="samba-client-32bit is &lt;3.6.3-0.33.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214707" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.33.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213451" version="1" comment="ldapsmb is &lt;1.34b-12.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213452" version="1" comment="libldb-devel is &lt;3.6.3-0.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213453" version="1" comment="libnetapi-devel is &lt;3.6.3-0.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213454" version="1" comment="libnetapi0 is &lt;3.6.3-0.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213455" version="1" comment="libsmbclient-devel is &lt;3.6.3-0.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213456" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-0.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213457" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-0.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213458" version="1" comment="libtalloc-devel is &lt;3.6.3-0.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213459" version="1" comment="libtdb-devel is &lt;3.6.3-0.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213460" version="1" comment="libtevent-devel is &lt;3.6.3-0.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213461" version="1" comment="libwbclient-devel is &lt;3.6.3-0.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213462" version="1" comment="samba-devel is &lt;3.6.3-0.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213463" version="1" comment="kernel-default is &lt;2.6.32.59-0.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213464" version="1" comment="kernel-default-base is &lt;2.6.32.59-0.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213465" version="1" comment="kernel-default-devel is &lt;2.6.32.59-0.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213469" version="1" comment="kernel-source is &lt;2.6.32.59-0.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213470" version="1" comment="kernel-syms is &lt;2.6.32.59-0.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213471" version="1" comment="kernel-trace is &lt;2.6.32.59-0.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213472" version="1" comment="kernel-trace-base is &lt;2.6.32.59-0.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213473" version="1" comment="kernel-trace-devel is &lt;2.6.32.59-0.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213477" version="1" comment="glibc is &lt;2.11.3-17.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213478" version="1" comment="glibc-32bit is &lt;2.11.3-17.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213479" version="1" comment="glibc-devel is &lt;2.11.3-17.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213480" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213481" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213482" version="1" comment="glibc-locale is &lt;2.11.3-17.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213483" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213484" version="1" comment="nscd is &lt;2.11.3-17.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213485" version="1" comment="glibc is &lt;2.11.1-0.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213486" version="1" comment="glibc-32bit is &lt;2.11.1-0.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213487" version="1" comment="glibc-devel is &lt;2.11.1-0.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213488" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213489" version="1" comment="glibc-html is &lt;2.11.1-0.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213490" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213491" version="1" comment="glibc-info is &lt;2.11.1-0.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213492" version="1" comment="glibc-locale is &lt;2.11.1-0.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213493" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213494" version="1" comment="glibc-profile is &lt;2.11.1-0.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213495" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213496" version="1" comment="nscd is &lt;2.11.1-0.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264367" version="1" comment="glibc is &lt;2.11.3-17.45.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264368" version="1" comment="glibc-32bit is &lt;2.11.3-17.45.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264369" version="1" comment="glibc-devel is &lt;2.11.3-17.45.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264370" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.45.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264371" version="1" comment="glibc-html is &lt;2.11.3-17.45.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264372" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.45.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264373" version="1" comment="glibc-info is &lt;2.11.3-17.45.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264374" version="1" comment="glibc-locale is &lt;2.11.3-17.45.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264375" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.45.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264376" version="1" comment="glibc-profile is &lt;2.11.3-17.45.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264377" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.45.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264378" version="1" comment="nscd is &lt;2.11.3-17.45.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009069666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213509" version="1" comment="glibc-html is &lt;2.11.3-17.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213510" version="1" comment="glibc-info is &lt;2.11.3-17.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264379" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213511" version="1" comment="glibc-profile is &lt;2.11.3-17.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213512" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264380" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264381" version="1" comment="glibc-x86 is &lt;2.11.3-17.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213513" version="1" comment="kernel-default is &lt;3.0.80-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213514" version="1" comment="kernel-default-base is &lt;3.0.80-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213515" version="1" comment="kernel-default-devel is &lt;3.0.80-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213516" version="1" comment="kernel-default-extra is &lt;3.0.80-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213517" version="1" comment="kernel-source is &lt;3.0.80-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213518" version="1" comment="kernel-syms is &lt;3.0.80-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213519" version="1" comment="kernel-trace is &lt;3.0.80-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213520" version="1" comment="kernel-trace-base is &lt;3.0.80-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213521" version="1" comment="kernel-trace-devel is &lt;3.0.80-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213522" version="1" comment="kernel-trace-extra is &lt;3.0.80-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213523" version="1" comment="kernel-xen is &lt;3.0.80-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213524" version="1" comment="kernel-xen-base is &lt;3.0.80-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213525" version="1" comment="kernel-xen-devel is &lt;3.0.80-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213526" version="1" comment="kernel-xen-extra is &lt;3.0.80-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213527" version="1" comment="xen-kmp-default is &lt;4.1.5_02_3.0.80_0.5-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213528" version="1" comment="xen-kmp-trace is &lt;4.1.5_02_3.0.80_0.5-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213529" version="1" comment="kernel-default is &lt;3.0.82-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213530" version="1" comment="kernel-default-base is &lt;3.0.82-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213531" version="1" comment="kernel-default-devel is &lt;3.0.82-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213532" version="1" comment="kernel-default-extra is &lt;3.0.82-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213533" version="1" comment="kernel-source is &lt;3.0.82-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213534" version="1" comment="kernel-syms is &lt;3.0.82-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213535" version="1" comment="kernel-trace-devel is &lt;3.0.82-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213536" version="1" comment="kernel-xen is &lt;3.0.82-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213537" version="1" comment="kernel-xen-base is &lt;3.0.82-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213538" version="1" comment="kernel-xen-devel is &lt;3.0.82-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213539" version="1" comment="kernel-xen-extra is &lt;3.0.82-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215421" version="1" comment="xen-kmp-default is &lt;4.2.5_08_3.0.101_0.47.55-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264390" version="1" comment="xen-kmp-pae is &lt;4.2.5_08_3.0.101_0.47.55-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213541" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.80_0.5-2.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213542" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.80_0.5-2.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213544" version="1" comment="gfs2-kmp-default is &lt;2_3.0.80_0.5-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213545" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.80_0.5-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213547" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.80_0.5-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213548" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.80_0.5-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213550" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.82_0.7-2.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213552" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.82_0.7-2.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213553" version="1" comment="gfs2-kmp-default is &lt;2_3.0.82_0.7-0.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213555" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.82_0.7-0.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213556" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.82_0.7-0.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213558" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.82_0.7-0.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213559" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.80_rt108_0.5-2.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213560" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.80_rt108_0.5-2.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213561" version="1" comment="drbd-kmp-rt is &lt;8.4.2_3.0.80_rt108_0.5-0.6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213562" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.2_3.0.80_rt108_0.5-0.6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213563" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.80_rt108_0.5-0.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213564" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.80_rt108_0.5-0.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213565" version="1" comment="kernel-rt is &lt;3.0.80.rt108-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213566" version="1" comment="kernel-rt-base is &lt;3.0.80.rt108-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213567" version="1" comment="kernel-rt-devel is &lt;3.0.80.rt108-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213568" version="1" comment="kernel-rt_trace is &lt;3.0.80.rt108-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213569" version="1" comment="kernel-rt_trace-base is &lt;3.0.80.rt108-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213570" version="1" comment="kernel-rt_trace-devel is &lt;3.0.80.rt108-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213571" version="1" comment="kernel-source-rt is &lt;3.0.80.rt108-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213572" version="1" comment="kernel-syms-rt is &lt;3.0.80.rt108-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213573" version="1" comment="lttng-modules-kmp-rt is &lt;2.0.4_3.0.80_rt108_0.5-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213574" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.0.4_3.0.80_rt108_0.5-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213575" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.80_rt108_0.5-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213576" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.80_rt108_0.5-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213577" version="1" comment="ofed-kmp-rt is &lt;1.5.2_3.0.80_rt108_0.5-0.28.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213578" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.2_3.0.80_rt108_0.5-0.28.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213585" version="1" comment="kernel-trace is &lt;3.0.82-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213586" version="1" comment="kernel-trace-base is &lt;3.0.82-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213587" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213588" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213589" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213590" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213591" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213592" version="1" comment="java-1_6_0-openjdk is &lt;1.6.0.0_b27.1.12.3-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213593" version="1" comment="java-1_6_0-openjdk-demo is &lt;1.6.0.0_b27.1.12.3-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213594" version="1" comment="java-1_6_0-openjdk-devel is &lt;1.6.0.0_b27.1.12.3-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213595" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr13.1-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213596" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr4.1-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213597" version="1" comment="libvirt is &lt;0.9.6-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213598" version="1" comment="libvirt-client is &lt;0.9.6-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213599" version="1" comment="libvirt-client-32bit is &lt;0.9.6-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213600" version="1" comment="libvirt-doc is &lt;0.9.6-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213601" version="1" comment="libvirt-python is &lt;0.9.6-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213602" version="1" comment="libvirt-devel is &lt;0.9.6-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213603" version="1" comment="libvirt-devel-32bit is &lt;0.9.6-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213604" version="1" comment="libldb1 is &lt;3.6.3-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213605" version="1" comment="libldb1-32bit is &lt;3.6.3-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213606" version="1" comment="libsmbclient0 is &lt;3.6.3-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213607" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213608" version="1" comment="libtalloc1 is &lt;3.4.3-1.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213609" version="1" comment="libtalloc1-32bit is &lt;3.4.3-1.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213610" version="1" comment="libtalloc2 is &lt;3.6.3-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213611" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213612" version="1" comment="libtdb1 is &lt;3.6.3-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213613" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213614" version="1" comment="libtevent0 is &lt;3.6.3-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213615" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213616" version="1" comment="libwbclient0 is &lt;3.6.3-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213617" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213618" version="1" comment="samba is &lt;3.6.3-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213619" version="1" comment="samba-32bit is &lt;3.6.3-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213620" version="1" comment="samba-client is &lt;3.6.3-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213621" version="1" comment="samba-client-32bit is &lt;3.6.3-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213622" version="1" comment="samba-krb-printing is &lt;3.6.3-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213623" version="1" comment="samba-winbind is &lt;3.6.3-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213624" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250662" version="1" comment="cifs-mount is &lt;3.4.3-1.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250663" version="1" comment="ldapsmb is &lt;1.34b-11.28.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250664" version="1" comment="libsmbclient0 is &lt;3.4.3-1.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250665" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-1.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250666" version="1" comment="libtalloc1 is &lt;3.4.3-1.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250667" version="1" comment="libtalloc1-32bit is &lt;3.4.3-1.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250668" version="1" comment="libtdb1 is &lt;3.4.3-1.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250669" version="1" comment="libtdb1-32bit is &lt;3.4.3-1.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250670" version="1" comment="libwbclient0 is &lt;3.4.3-1.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250671" version="1" comment="libwbclient0-32bit is &lt;3.4.3-1.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250672" version="1" comment="samba is &lt;3.4.3-1.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250673" version="1" comment="samba-32bit is &lt;3.4.3-1.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250674" version="1" comment="samba-client is &lt;3.4.3-1.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250675" version="1" comment="samba-client-32bit is &lt;3.4.3-1.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250676" version="1" comment="samba-doc is &lt;3.4.3-1.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250677" version="1" comment="samba-krb-printing is &lt;3.4.3-1.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250678" version="1" comment="samba-winbind is &lt;3.4.3-1.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250679" version="1" comment="samba-winbind-32bit is &lt;3.4.3-1.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213625" version="1" comment="ldapsmb is &lt;1.34b-12.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214704" version="1" comment="samba-doc is &lt;3.6.3-0.33.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213626" version="1" comment="libldb-devel is &lt;3.6.3-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213627" version="1" comment="libnetapi-devel is &lt;3.6.3-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213628" version="1" comment="libnetapi0 is &lt;3.6.3-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213629" version="1" comment="libsmbclient-devel is &lt;3.6.3-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213630" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213631" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213632" version="1" comment="libtalloc-devel is &lt;3.6.3-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213633" version="1" comment="libtdb-devel is &lt;3.6.3-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213634" version="1" comment="libtevent-devel is &lt;3.6.3-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213635" version="1" comment="libwbclient-devel is &lt;3.6.3-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213636" version="1" comment="samba-devel is &lt;3.6.3-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250680" version="1" comment="coreutils is &lt;6.12-32.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250681" version="1" comment="coreutils-lang is &lt;6.12-32.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213637" version="1" comment="libecpg6 is &lt;9.1.8-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213638" version="1" comment="libpq5 is &lt;9.1.8-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213639" version="1" comment="libpq5-32bit is &lt;9.1.8-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213640" version="1" comment="postgresql91 is &lt;9.1.8-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213641" version="1" comment="postgresql91-contrib is &lt;9.1.8-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213642" version="1" comment="postgresql91-docs is &lt;9.1.8-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213643" version="1" comment="postgresql91-server is &lt;9.1.8-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213644" version="1" comment="postgresql91-devel is &lt;9.1.8-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213645" version="1" comment="libxml2-python is &lt;2.7.6-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213646" version="1" comment="libxml2-devel is &lt;2.7.6-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213647" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213648" version="1" comment="java-1_6_0-openjdk is &lt;1.6.0.0_b27.1.12.5-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213649" version="1" comment="java-1_6_0-openjdk-demo is &lt;1.6.0.0_b27.1.12.5-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213650" version="1" comment="java-1_6_0-openjdk-devel is &lt;1.6.0.0_b27.1.12.5-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213651" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr13.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213652" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr13.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213653" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr13.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213654" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr13.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213655" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr4.2-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213657" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr4.2-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213656" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr4.2-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213658" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr4.2-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213659" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr13.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213660" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr4.2-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213661" version="1" comment="java-1_6_0-openjdk is &lt;1.6.0.0_b27.1.12.2-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213662" version="1" comment="java-1_6_0-openjdk-demo is &lt;1.6.0.0_b27.1.12.2-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213663" version="1" comment="java-1_6_0-openjdk-devel is &lt;1.6.0.0_b27.1.12.2-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213664" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.15-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213665" version="1" comment="java-1_4_2-ibm-devel is &lt;1.4.2_sr13.15-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213666" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.16-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213667" version="1" comment="java-1_4_2-ibm-devel is &lt;1.4.2_sr13.16-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213668" version="1" comment="flash-player is &lt;11.2.202.273-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213669" version="1" comment="flash-player-gnome is &lt;11.2.202.273-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213670" version="1" comment="flash-player-kde4 is &lt;11.2.202.273-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213671" version="1" comment="flash-player is &lt;11.2.202.261-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213672" version="1" comment="flash-player is &lt;11.2.202.262-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213673" version="1" comment="flash-player-gnome is &lt;11.2.202.262-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213674" version="1" comment="flash-player-kde4 is &lt;11.2.202.262-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213675" version="1" comment="flash-player is &lt;11.2.202.270-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213676" version="1" comment="flash-player-gnome is &lt;11.2.202.270-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213677" version="1" comment="flash-player-kde4 is &lt;11.2.202.270-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213678" version="1" comment="acroread is &lt;9.5.4-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213679" version="1" comment="acroread-cmaps is &lt;9.4.6-0.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213680" version="1" comment="acroread-fonts-ja is &lt;9.4.6-0.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213681" version="1" comment="acroread-fonts-ko is &lt;9.4.6-0.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213682" version="1" comment="acroread-fonts-zh_CN is &lt;9.4.6-0.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213683" version="1" comment="acroread-fonts-zh_TW is &lt;9.4.6-0.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213684" version="1" comment="flash-player is &lt;11.2.202.275-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213685" version="1" comment="flash-player-gnome is &lt;11.2.202.275-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213686" version="1" comment="flash-player-kde4 is &lt;11.2.202.275-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213687" version="1" comment="MozillaFirefox is &lt;17.0.3esr-0.4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213688" version="1" comment="MozillaFirefox-translations is &lt;17.0.3esr-0.4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250682" version="1" comment="MozillaFirefox is &lt;17.0.3esr-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250683" version="1" comment="MozillaFirefox-translations is &lt;17.0.3esr-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213689" version="1" comment="java-1_6_0-openjdk is &lt;1.6.0.0_b27.1.12.4-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213690" version="1" comment="java-1_6_0-openjdk-demo is &lt;1.6.0.0_b27.1.12.4-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213691" version="1" comment="java-1_6_0-openjdk-devel is &lt;1.6.0.0_b27.1.12.4-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213692" version="1" comment="kernel-default is &lt;3.0.58-0.6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213693" version="1" comment="kernel-default-base is &lt;3.0.58-0.6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213694" version="1" comment="kernel-default-devel is &lt;3.0.58-0.6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213695" version="1" comment="kernel-default-extra is &lt;3.0.58-0.6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213696" version="1" comment="kernel-source is &lt;3.0.58-0.6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213697" version="1" comment="kernel-syms is &lt;3.0.58-0.6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213698" version="1" comment="kernel-trace is &lt;3.0.58-0.6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213699" version="1" comment="kernel-trace-base is &lt;3.0.58-0.6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213700" version="1" comment="kernel-trace-devel is &lt;3.0.58-0.6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213701" version="1" comment="kernel-trace-extra is &lt;3.0.58-0.6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213702" version="1" comment="kernel-xen is &lt;3.0.58-0.6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213703" version="1" comment="kernel-xen-base is &lt;3.0.58-0.6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213704" version="1" comment="kernel-xen-devel is &lt;3.0.58-0.6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213705" version="1" comment="kernel-xen-extra is &lt;3.0.58-0.6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213706" version="1" comment="xen-kmp-default is &lt;4.1.3_06_3.0.58_0.6.6-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213707" version="1" comment="xen-kmp-trace is &lt;4.1.3_06_3.0.58_0.6.6-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213708" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.58_0.6.6-2.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213709" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.58_0.6.6-2.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213711" version="1" comment="gfs2-kmp-default is &lt;2_3.0.58_0.6.6-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213712" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.58_0.6.6-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213714" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.58_0.6.6-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213715" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.58_0.6.6-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213720" version="1" comment="kernel-default is &lt;3.0.93-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213721" version="1" comment="kernel-default-base is &lt;3.0.93-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213722" version="1" comment="kernel-default-devel is &lt;3.0.93-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213723" version="1" comment="kernel-default-extra is &lt;3.0.93-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213724" version="1" comment="kernel-source is &lt;3.0.93-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213725" version="1" comment="kernel-syms is &lt;3.0.93-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213726" version="1" comment="kernel-trace is &lt;3.0.93-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213727" version="1" comment="kernel-trace-base is &lt;3.0.93-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213728" version="1" comment="kernel-trace-devel is &lt;3.0.93-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213729" version="1" comment="kernel-trace-extra is &lt;3.0.93-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213730" version="1" comment="kernel-xen is &lt;3.0.93-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213731" version="1" comment="kernel-xen-base is &lt;3.0.93-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213732" version="1" comment="kernel-xen-devel is &lt;3.0.93-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213733" version="1" comment="kernel-xen-extra is &lt;3.0.93-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213734" version="1" comment="xen-kmp-default is &lt;4.1.5_02_3.0.93_0.5-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213735" version="1" comment="xen-kmp-trace is &lt;4.1.5_02_3.0.93_0.5-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213736" version="1" comment="kernel-default is &lt;3.0.93-0.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213737" version="1" comment="kernel-default-base is &lt;3.0.93-0.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213738" version="1" comment="kernel-default-devel is &lt;3.0.93-0.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213739" version="1" comment="kernel-default-extra is &lt;3.0.93-0.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213740" version="1" comment="kernel-source is &lt;3.0.93-0.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213741" version="1" comment="kernel-syms is &lt;3.0.93-0.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213742" version="1" comment="kernel-trace-devel is &lt;3.0.93-0.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213743" version="1" comment="kernel-xen is &lt;3.0.93-0.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213744" version="1" comment="kernel-xen-base is &lt;3.0.93-0.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213745" version="1" comment="kernel-xen-devel is &lt;3.0.93-0.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213746" version="1" comment="kernel-xen-extra is &lt;3.0.93-0.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213747" version="1" comment="xen-kmp-default is &lt;4.2.2_06_3.0.93_0.8-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213748" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.93_0.5-2.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213749" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.93_0.5-2.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213751" version="1" comment="gfs2-kmp-default is &lt;2_3.0.93_0.5-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213752" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.93_0.5-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213754" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.93_0.5-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213755" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.93_0.5-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213757" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.93_0.8-2.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213759" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.93_0.8-2.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213760" version="1" comment="gfs2-kmp-default is &lt;2_3.0.93_0.8-0.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213762" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.93_0.8-0.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213763" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.93_0.8-0.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213765" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.93_0.8-0.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213766" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.93_rt117_0.5-2.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213767" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.93_rt117_0.5-2.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213768" version="1" comment="drbd-kmp-rt is &lt;8.4.2_3.0.93_rt117_0.5-0.6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213769" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.2_3.0.93_rt117_0.5-0.6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213770" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.93_rt117_0.5-0.25.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213771" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.93_rt117_0.5-0.25.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213772" version="1" comment="kernel-rt is &lt;3.0.93.rt117-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213773" version="1" comment="kernel-rt-base is &lt;3.0.93.rt117-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213774" version="1" comment="kernel-rt-devel is &lt;3.0.93.rt117-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213775" version="1" comment="kernel-rt_trace is &lt;3.0.93.rt117-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213776" version="1" comment="kernel-rt_trace-base is &lt;3.0.93.rt117-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213777" version="1" comment="kernel-rt_trace-devel is &lt;3.0.93.rt117-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213778" version="1" comment="kernel-source-rt is &lt;3.0.93.rt117-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213779" version="1" comment="kernel-syms-rt is &lt;3.0.93.rt117-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213780" version="1" comment="lttng-modules-kmp-rt is &lt;2.0.4_3.0.93_rt117_0.5-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213781" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.0.4_3.0.93_rt117_0.5-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213782" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.93_rt117_0.5-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213783" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.93_rt117_0.5-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213784" version="1" comment="ofed-kmp-rt is &lt;1.5.2_3.0.93_rt117_0.5-0.28.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213785" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.2_3.0.93_rt117_0.5-0.28.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213786" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.93_rt117_0.9-2.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213787" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.93_rt117_0.9-2.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213788" version="1" comment="drbd-kmp-rt is &lt;8.4.3_3.0.93_rt117_0.9-0.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213789" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.3_3.0.93_rt117_0.9-0.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213790" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.93_rt117_0.9-0.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213791" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.93_rt117_0.9-0.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213792" version="1" comment="kernel-rt is &lt;3.0.93.rt117-0.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213793" version="1" comment="kernel-rt-base is &lt;3.0.93.rt117-0.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213794" version="1" comment="kernel-rt-devel is &lt;3.0.93.rt117-0.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213795" version="1" comment="kernel-rt_trace is &lt;3.0.93.rt117-0.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213796" version="1" comment="kernel-rt_trace-base is &lt;3.0.93.rt117-0.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213797" version="1" comment="kernel-rt_trace-devel is &lt;3.0.93.rt117-0.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213798" version="1" comment="kernel-source-rt is &lt;3.0.93.rt117-0.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213799" version="1" comment="kernel-syms-rt is &lt;3.0.93.rt117-0.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213800" version="1" comment="lttng-modules-kmp-rt is &lt;2.1.1_3.0.93_rt117_0.9-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213801" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.1.1_3.0.93_rt117_0.9-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213802" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.93_rt117_0.9-0.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213803" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.93_rt117_0.9-0.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213804" version="1" comment="ofed-kmp-rt is &lt;1.5.4.1_3.0.93_rt117_0.9-0.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213805" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.4.1_3.0.93_rt117_0.9-0.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213812" version="1" comment="kernel-trace is &lt;3.0.93-0.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213813" version="1" comment="kernel-trace-base is &lt;3.0.93-0.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213814" version="1" comment="flash-player is &lt;11.2.202.280-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213815" version="1" comment="flash-player-gnome is &lt;11.2.202.280-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213816" version="1" comment="flash-player-kde4 is &lt;11.2.202.280-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213817" version="1" comment="krb5-devel is &lt;1.6.3-133.49.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213818" version="1" comment="krb5-devel-32bit is &lt;1.6.3-133.49.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213819" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.17-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213820" version="1" comment="java-1_4_2-ibm-devel is &lt;1.4.2_sr13.17-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213821" version="1" comment="java-1_6_0-openjdk is &lt;1.6.0.0_b27.1.12.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213822" version="1" comment="java-1_6_0-openjdk-demo is &lt;1.6.0.0_b27.1.12.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213823" version="1" comment="java-1_6_0-openjdk-devel is &lt;1.6.0.0_b27.1.12.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213824" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.6-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213825" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.6-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213826" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.6-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213827" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr14.0-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213828" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr14.0-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213829" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr14.0-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213830" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr14.0-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213831" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr5.0-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213833" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr5.0-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213832" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr5.0-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213834" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr5.0-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213835" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr14.0-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213836" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr5.0-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213837" version="1" comment="wireshark is &lt;1.8.5-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213838" version="1" comment="wireshark-devel is &lt;1.8.5-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213839" version="1" comment="libpixman-1-0 is &lt;0.24.4-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213840" version="1" comment="libpixman-1-0-32bit is &lt;0.24.4-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213841" version="1" comment="libpixman-1-0-devel is &lt;0.24.4-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213842" version="1" comment="libgnutls-devel is &lt;2.4.1-24.39.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213843" version="1" comment="libgnutls-extra-devel is &lt;2.4.1-24.39.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213844" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213845" version="1" comment="apache2-mod_php53 is &lt;5.3.8-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213846" version="1" comment="php5 is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213847" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213848" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213849" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213850" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213851" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213852" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213853" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213854" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213855" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213856" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213857" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213858" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213859" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213860" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213861" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213862" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213863" version="1" comment="php5-json is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213864" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213865" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213866" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213867" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213868" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213869" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213870" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213871" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213872" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213873" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213874" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213875" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213876" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213877" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213878" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213879" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213880" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213881" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213882" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213883" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213884" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213885" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213886" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213887" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213888" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213889" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213890" version="1" comment="php53 is &lt;5.3.8-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213891" version="1" comment="php53-bcmath is &lt;5.3.8-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213892" version="1" comment="php53-bz2 is &lt;5.3.8-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213893" version="1" comment="php53-calendar is &lt;5.3.8-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213894" version="1" comment="php53-ctype is &lt;5.3.8-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213895" version="1" comment="php53-curl is &lt;5.3.8-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213896" version="1" comment="php53-dba is &lt;5.3.8-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213897" version="1" comment="php53-dom is &lt;5.3.8-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213898" version="1" comment="php53-exif is &lt;5.3.8-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213899" version="1" comment="php53-fastcgi is &lt;5.3.8-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213900" version="1" comment="php53-fileinfo is &lt;5.3.8-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213901" version="1" comment="php53-ftp is &lt;5.3.8-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213902" version="1" comment="php53-gd is &lt;5.3.8-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213903" version="1" comment="php53-gettext is &lt;5.3.8-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213904" version="1" comment="php53-gmp is &lt;5.3.8-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213905" version="1" comment="php53-iconv is &lt;5.3.8-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213906" version="1" comment="php53-intl is &lt;5.3.8-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213907" version="1" comment="php53-json is &lt;5.3.8-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213908" version="1" comment="php53-ldap is &lt;5.3.8-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213909" version="1" comment="php53-mbstring is &lt;5.3.8-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213910" version="1" comment="php53-mcrypt is &lt;5.3.8-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213911" version="1" comment="php53-mysql is &lt;5.3.8-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213912" version="1" comment="php53-odbc is &lt;5.3.8-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213913" version="1" comment="php53-openssl is &lt;5.3.8-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213914" version="1" comment="php53-pcntl is &lt;5.3.8-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213915" version="1" comment="php53-pdo is &lt;5.3.8-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213916" version="1" comment="php53-pear is &lt;5.3.8-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213917" version="1" comment="php53-pgsql is &lt;5.3.8-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213918" version="1" comment="php53-pspell is &lt;5.3.8-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213919" version="1" comment="php53-shmop is &lt;5.3.8-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213920" version="1" comment="php53-snmp is &lt;5.3.8-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213921" version="1" comment="php53-soap is &lt;5.3.8-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213922" version="1" comment="php53-suhosin is &lt;5.3.8-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213923" version="1" comment="php53-sysvmsg is &lt;5.3.8-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213924" version="1" comment="php53-sysvsem is &lt;5.3.8-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213925" version="1" comment="php53-sysvshm is &lt;5.3.8-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213926" version="1" comment="php53-tokenizer is &lt;5.3.8-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213927" version="1" comment="php53-wddx is &lt;5.3.8-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213928" version="1" comment="php53-xmlreader is &lt;5.3.8-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213929" version="1" comment="php53-xmlrpc is &lt;5.3.8-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213930" version="1" comment="php53-xmlwriter is &lt;5.3.8-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213931" version="1" comment="php53-xsl is &lt;5.3.8-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213932" version="1" comment="php53-zip is &lt;5.3.8-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213933" version="1" comment="php53-zlib is &lt;5.3.8-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213934" version="1" comment="php5-devel is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213935" version="1" comment="php5-imap is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213936" version="1" comment="php5-ncurses is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213937" version="1" comment="php5-posix is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213938" version="1" comment="php5-readline is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213939" version="1" comment="php5-sockets is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213940" version="1" comment="php5-sqlite is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213941" version="1" comment="php5-tidy is &lt;5.2.14-0.7.30.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213942" version="1" comment="php53-devel is &lt;5.3.8-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213943" version="1" comment="php53-imap is &lt;5.3.8-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213944" version="1" comment="php53-posix is &lt;5.3.8-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213945" version="1" comment="php53-readline is &lt;5.3.8-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213946" version="1" comment="php53-sockets is &lt;5.3.8-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213947" version="1" comment="php53-sqlite is &lt;5.3.8-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213948" version="1" comment="php53-tidy is &lt;5.3.8-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213949" version="1" comment="MozillaFirefox is &lt;17.0.8esr-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213950" version="1" comment="MozillaFirefox-translations is &lt;17.0.8esr-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213951" version="1" comment="MozillaFirefox is &lt;17.0.8esr-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213952" version="1" comment="MozillaFirefox-translations is &lt;17.0.8esr-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213953" version="1" comment="MozillaFirefox-devel is &lt;17.0.8esr-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213954" version="1" comment="subversion is &lt;1.6.17-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213955" version="1" comment="subversion-devel is &lt;1.6.17-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213956" version="1" comment="subversion-perl is &lt;1.6.17-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213957" version="1" comment="subversion-python is &lt;1.6.17-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213958" version="1" comment="subversion-server is &lt;1.6.17-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213959" version="1" comment="subversion-tools is &lt;1.6.17-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213960" version="1" comment="kernel-default is &lt;2.6.32.59-0.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213961" version="1" comment="kernel-default-base is &lt;2.6.32.59-0.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213962" version="1" comment="kernel-default-devel is &lt;2.6.32.59-0.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213966" version="1" comment="kernel-source is &lt;2.6.32.59-0.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213967" version="1" comment="kernel-syms is &lt;2.6.32.59-0.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213968" version="1" comment="kernel-trace is &lt;2.6.32.59-0.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213969" version="1" comment="kernel-trace-base is &lt;2.6.32.59-0.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213970" version="1" comment="kernel-trace-devel is &lt;2.6.32.59-0.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213974" version="1" comment="libmysql55client18 is &lt;5.5.33-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213975" version="1" comment="libmysql55client18-32bit is &lt;5.5.33-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213976" version="1" comment="libmysql55client_r18 is &lt;5.5.33-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213977" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.33-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213978" version="1" comment="mysql is &lt;5.5.33-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213979" version="1" comment="mysql-client is &lt;5.5.33-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213980" version="1" comment="mysql-tools is &lt;5.5.33-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212031" version="1" comment="glibc-32bit is &lt;2.11.1-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212033" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212038" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009212040" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213981" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.70.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213982" version="1" comment="xorg-x11-server is &lt;7.4-27.70.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213983" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.70.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213984" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.40.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213985" version="1" comment="xorg-x11-server is &lt;7.4-27.40.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213986" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.40.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250685" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.40.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250686" version="1" comment="xorg-x11-server is &lt;7.4-27.40.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250687" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.40.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213987" version="1" comment="xorg-x11-server-sdk is &lt;7.4-27.70.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213988" version="1" comment="curl is &lt;7.19.7-1.20.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213989" version="1" comment="libcurl4 is &lt;7.19.7-1.20.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213990" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.20.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250739" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.20.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213991" version="1" comment="libcurl-devel is &lt;7.19.7-1.20.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213992" version="1" comment="libtiff-devel is &lt;3.8.2-141.152" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213993" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-141.152" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213994" version="1" comment="subversion is &lt;1.6.17-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213995" version="1" comment="subversion-devel is &lt;1.6.17-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213996" version="1" comment="subversion-perl is &lt;1.6.17-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213997" version="1" comment="subversion-python is &lt;1.6.17-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213998" version="1" comment="subversion-server is &lt;1.6.17-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213999" version="1" comment="subversion-tools is &lt;1.6.17-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214000" version="1" comment="xorg-x11-devel is &lt;7.4-8.26.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214001" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214002" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214003" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214004" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214005" version="1" comment="xorg-x11-devel-32bit is &lt;7.4-8.26.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214006" version="1" comment="xorg-x11-devel is &lt;7.4-8.26.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214007" version="1" comment="xorg-x11-devel-32bit is &lt;7.4-8.26.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214008" version="1" comment="kvm is &lt;1.4.2-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214009" version="1" comment="openswan is &lt;2.6.16-1.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214010" version="1" comment="openswan-doc is &lt;2.6.16-1.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214011" version="1" comment="kernel-default is &lt;3.0.74-0.6.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214012" version="1" comment="kernel-default-base is &lt;3.0.74-0.6.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214013" version="1" comment="kernel-default-devel is &lt;3.0.74-0.6.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214014" version="1" comment="kernel-default-extra is &lt;3.0.74-0.6.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214015" version="1" comment="kernel-source is &lt;3.0.74-0.6.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214016" version="1" comment="kernel-syms is &lt;3.0.74-0.6.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214017" version="1" comment="kernel-trace is &lt;3.0.74-0.6.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214018" version="1" comment="kernel-trace-base is &lt;3.0.74-0.6.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214019" version="1" comment="kernel-trace-devel is &lt;3.0.74-0.6.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214020" version="1" comment="kernel-trace-extra is &lt;3.0.74-0.6.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214021" version="1" comment="kernel-xen is &lt;3.0.74-0.6.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214022" version="1" comment="kernel-xen-base is &lt;3.0.74-0.6.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214023" version="1" comment="kernel-xen-devel is &lt;3.0.74-0.6.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214024" version="1" comment="kernel-xen-extra is &lt;3.0.74-0.6.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214025" version="1" comment="xen-kmp-default is &lt;4.1.4_02_3.0.74_0.6.8-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214026" version="1" comment="xen-kmp-trace is &lt;4.1.4_02_3.0.74_0.6.8-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214027" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.74_0.6.8-2.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214028" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.74_0.6.8-2.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214030" version="1" comment="gfs2-kmp-default is &lt;2_3.0.74_0.6.8-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214031" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.74_0.6.8-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214033" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.74_0.6.8-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214034" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.74_0.6.8-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214036" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.74_rt98_0.6.4-2.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214037" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.74_rt98_0.6.4-2.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214038" version="1" comment="drbd-kmp-rt is &lt;8.4.2_3.0.74_rt98_0.6.4-0.6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214039" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.2_3.0.74_rt98_0.6.4-0.6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214040" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.74_rt98_0.6.4-0.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214041" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.74_rt98_0.6.4-0.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214042" version="1" comment="kernel-rt is &lt;3.0.74.rt98-0.6.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214043" version="1" comment="kernel-rt-base is &lt;3.0.74.rt98-0.6.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214044" version="1" comment="kernel-rt-devel is &lt;3.0.74.rt98-0.6.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214045" version="1" comment="kernel-rt_trace is &lt;3.0.74.rt98-0.6.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214046" version="1" comment="kernel-rt_trace-base is &lt;3.0.74.rt98-0.6.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214047" version="1" comment="kernel-rt_trace-devel is &lt;3.0.74.rt98-0.6.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214048" version="1" comment="kernel-source-rt is &lt;3.0.74.rt98-0.6.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214049" version="1" comment="kernel-syms-rt is &lt;3.0.74.rt98-0.6.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214050" version="1" comment="lttng-modules-kmp-rt is &lt;2.0.4_3.0.74_rt98_0.6.4-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214051" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.0.4_3.0.74_rt98_0.6.4-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214052" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.74_rt98_0.6.4-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214053" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.74_rt98_0.6.4-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214054" version="1" comment="ofed-kmp-rt is &lt;1.5.2_3.0.74_rt98_0.6.4-0.28.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214055" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.2_3.0.74_rt98_0.6.4-0.28.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214059" version="1" comment="kernel-default is &lt;3.0.101-0.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214060" version="1" comment="kernel-default-base is &lt;3.0.101-0.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214061" version="1" comment="kernel-default-devel is &lt;3.0.101-0.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214062" version="1" comment="kernel-default-extra is &lt;3.0.101-0.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214063" version="1" comment="kernel-source is &lt;3.0.101-0.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214064" version="1" comment="kernel-syms is &lt;3.0.101-0.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214065" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214066" version="1" comment="kernel-xen is &lt;3.0.101-0.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214067" version="1" comment="kernel-xen-base is &lt;3.0.101-0.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214068" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214069" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214070" version="1" comment="xen-kmp-default is &lt;4.2.3_08_3.0.101_0.15-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214071" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.101_0.15-2.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214073" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.101_0.15-2.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214074" version="1" comment="gfs2-kmp-default is &lt;2_3.0.101_0.15-0.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214076" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.101_0.15-0.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214077" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.101_0.15-0.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214079" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.101_0.15-0.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214080" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.101_rt130_0.10-2.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214081" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.101_rt130_0.10-2.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214082" version="1" comment="drbd-kmp-rt is &lt;8.4.4_3.0.101_rt130_0.10-0.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214083" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.4_3.0.101_rt130_0.10-0.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214084" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.101_rt130_0.10-0.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214085" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.101_rt130_0.10-0.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214086" version="1" comment="kernel-rt is &lt;3.0.101.rt130-0.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214087" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-0.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214088" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-0.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214089" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-0.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214090" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-0.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214091" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-0.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214092" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-0.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214093" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-0.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214094" version="1" comment="lttng-modules-kmp-rt is &lt;2.1.1_3.0.101_rt130_0.10-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214095" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.1.1_3.0.101_rt130_0.10-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214096" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.101_rt130_0.10-0.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214097" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.101_rt130_0.10-0.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214098" version="1" comment="ofed-kmp-rt is &lt;1.5.4.1_3.0.101_rt130_0.10-0.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214099" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.4.1_3.0.101_rt130_0.10-0.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214103" version="1" comment="kernel-trace is &lt;3.0.101-0.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214104" version="1" comment="kernel-trace-base is &lt;3.0.101-0.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214105" version="1" comment="curl is &lt;7.19.7-1.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214106" version="1" comment="libcurl4 is &lt;7.19.7-1.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214107" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214108" version="1" comment="libcurl-devel is &lt;7.19.7-1.20.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214109" version="1" comment="libcurl-devel is &lt;7.19.7-1.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214110" version="1" comment="kernel-default is &lt;3.0.101-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214111" version="1" comment="kernel-default-base is &lt;3.0.101-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214112" version="1" comment="kernel-default-devel is &lt;3.0.101-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214113" version="1" comment="kernel-default-extra is &lt;3.0.101-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214114" version="1" comment="kernel-source is &lt;3.0.101-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214115" version="1" comment="kernel-syms is &lt;3.0.101-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214116" version="1" comment="kernel-trace is &lt;3.0.101-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214117" version="1" comment="kernel-trace-base is &lt;3.0.101-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214118" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214119" version="1" comment="kernel-trace-extra is &lt;3.0.101-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214120" version="1" comment="kernel-xen is &lt;3.0.101-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214121" version="1" comment="kernel-xen-base is &lt;3.0.101-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214122" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214123" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214124" version="1" comment="xen-kmp-default is &lt;4.1.6_02_3.0.101_0.5-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214125" version="1" comment="xen-kmp-trace is &lt;4.1.6_02_3.0.101_0.5-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214126" version="1" comment="kernel-default is &lt;3.0.101-0.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214127" version="1" comment="kernel-default-base is &lt;3.0.101-0.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214128" version="1" comment="kernel-default-devel is &lt;3.0.101-0.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214129" version="1" comment="kernel-default-extra is &lt;3.0.101-0.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214130" version="1" comment="kernel-source is &lt;3.0.101-0.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214131" version="1" comment="kernel-syms is &lt;3.0.101-0.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214132" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214133" version="1" comment="kernel-xen is &lt;3.0.101-0.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214134" version="1" comment="kernel-xen-base is &lt;3.0.101-0.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214135" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214136" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214137" version="1" comment="xen-kmp-default is &lt;4.2.3_02_3.0.101_0.8-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214138" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.101_0.5-2.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214139" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.101_0.5-2.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214141" version="1" comment="gfs2-kmp-default is &lt;2_3.0.101_0.5-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214142" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.101_0.5-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214144" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.101_0.5-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214145" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.101_0.5-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214147" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.101_0.8-2.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214149" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.101_0.8-2.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214150" version="1" comment="gfs2-kmp-default is &lt;2_3.0.101_0.8-0.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214152" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.101_0.8-0.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214153" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.101_0.8-0.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214155" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.101_0.8-0.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214156" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.101_rt130_0.5-2.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214157" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.101_rt130_0.5-2.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214158" version="1" comment="drbd-kmp-rt is &lt;8.4.2_3.0.101_rt130_0.5-0.6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214159" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.2_3.0.101_rt130_0.5-0.6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214160" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.101_rt130_0.5-0.25.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214161" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.101_rt130_0.5-0.25.25" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214162" version="1" comment="kernel-rt is &lt;3.0.101.rt130-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214163" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214164" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214165" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214166" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214167" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214168" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214169" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214170" version="1" comment="lttng-modules-kmp-rt is &lt;2.0.4_3.0.101_rt130_0.5-0.9.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214171" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.0.4_3.0.101_rt130_0.5-0.9.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214172" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.101_rt130_0.5-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214173" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.101_rt130_0.5-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214174" version="1" comment="ofed-kmp-rt is &lt;1.5.2_3.0.101_rt130_0.5-0.28.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214175" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.2_3.0.101_rt130_0.5-0.28.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214176" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.101_rt130_0.8-2.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214177" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.101_rt130_0.8-2.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214178" version="1" comment="drbd-kmp-rt is &lt;8.4.4_3.0.101_rt130_0.8-0.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214179" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.4_3.0.101_rt130_0.8-0.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214180" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.101_rt130_0.8-0.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214181" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.101_rt130_0.8-0.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214182" version="1" comment="kernel-rt is &lt;3.0.101.rt130-0.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214183" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-0.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214184" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-0.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214185" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-0.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214186" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-0.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214187" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-0.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214188" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-0.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214189" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-0.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214190" version="1" comment="lttng-modules-kmp-rt is &lt;2.1.1_3.0.101_rt130_0.8-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214191" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.1.1_3.0.101_rt130_0.8-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214192" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.101_rt130_0.8-0.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214193" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.101_rt130_0.8-0.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214194" version="1" comment="ofed-kmp-rt is &lt;1.5.4.1_3.0.101_rt130_0.8-0.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214195" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.4.1_3.0.101_rt130_0.8-0.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214202" version="1" comment="kernel-trace is &lt;3.0.101-0.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214203" version="1" comment="kernel-trace-base is &lt;3.0.101-0.8" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250688" version="1" comment="xen is &lt;4.0.3_21548_16-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250689" version="1" comment="xen-doc-html is &lt;4.0.3_21548_16-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250690" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_16-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250691" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_16_2.6.32.54_0.33.TDC-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250692" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_16_2.6.32.54_0.33.TDC-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250693" version="1" comment="xen-libs is &lt;4.0.3_21548_16-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250694" version="1" comment="xen-tools is &lt;4.0.3_21548_16-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250695" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_16-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214204" version="1" comment="wireshark-devel is &lt;1.8.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214205" version="1" comment="wireshark is &lt;1.8.8-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214206" version="1" comment="wireshark-devel is &lt;1.8.8-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214207" version="1" comment="acroread is &lt;9.5.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214208" version="1" comment="flash-player is &lt;11.2.202.285-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214209" version="1" comment="flash-player-gnome is &lt;11.2.202.285-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214210" version="1" comment="flash-player-kde4 is &lt;11.2.202.285-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214211" version="1" comment="kernel-default is &lt;3.0.74-0.6.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214212" version="1" comment="kernel-default-base is &lt;3.0.74-0.6.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214213" version="1" comment="kernel-default-devel is &lt;3.0.74-0.6.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214214" version="1" comment="kernel-default-extra is &lt;3.0.74-0.6.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214215" version="1" comment="kernel-source is &lt;3.0.74-0.6.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214216" version="1" comment="kernel-syms is &lt;3.0.74-0.6.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214217" version="1" comment="kernel-trace is &lt;3.0.74-0.6.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214218" version="1" comment="kernel-trace-base is &lt;3.0.74-0.6.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214219" version="1" comment="kernel-trace-devel is &lt;3.0.74-0.6.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214220" version="1" comment="kernel-trace-extra is &lt;3.0.74-0.6.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214221" version="1" comment="kernel-xen is &lt;3.0.74-0.6.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214222" version="1" comment="kernel-xen-base is &lt;3.0.74-0.6.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214223" version="1" comment="kernel-xen-devel is &lt;3.0.74-0.6.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214224" version="1" comment="kernel-xen-extra is &lt;3.0.74-0.6.10" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214225" version="1" comment="xen-kmp-default is &lt;4.1.4_02_3.0.74_0.6.10-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214226" version="1" comment="xen-kmp-trace is &lt;4.1.4_02_3.0.74_0.6.10-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214227" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.74_0.6.10-2.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214228" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.74_0.6.10-2.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214230" version="1" comment="gfs2-kmp-default is &lt;2_3.0.74_0.6.10-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214231" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.74_0.6.10-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214233" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.74_0.6.10-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214234" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.74_0.6.10-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214236" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.74_rt98_0.6.6-2.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214237" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.74_rt98_0.6.6-2.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214238" version="1" comment="drbd-kmp-rt is &lt;8.4.2_3.0.74_rt98_0.6.6-0.6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214239" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.2_3.0.74_rt98_0.6.6-0.6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214240" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.74_rt98_0.6.6-0.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214241" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.74_rt98_0.6.6-0.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214242" version="1" comment="kernel-rt is &lt;3.0.74.rt98-0.6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214243" version="1" comment="kernel-rt-base is &lt;3.0.74.rt98-0.6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214244" version="1" comment="kernel-rt-devel is &lt;3.0.74.rt98-0.6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214245" version="1" comment="kernel-rt_trace is &lt;3.0.74.rt98-0.6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214246" version="1" comment="kernel-rt_trace-base is &lt;3.0.74.rt98-0.6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214247" version="1" comment="kernel-rt_trace-devel is &lt;3.0.74.rt98-0.6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214248" version="1" comment="kernel-source-rt is &lt;3.0.74.rt98-0.6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214249" version="1" comment="kernel-syms-rt is &lt;3.0.74.rt98-0.6.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214250" version="1" comment="lttng-modules-kmp-rt is &lt;2.0.4_3.0.74_rt98_0.6.6-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214251" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.0.4_3.0.74_rt98_0.6.6-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214252" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.74_rt98_0.6.6-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214253" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.74_rt98_0.6.6-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214254" version="1" comment="ofed-kmp-rt is &lt;1.5.2_3.0.74_rt98_0.6.6-0.28.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214255" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.2_3.0.74_rt98_0.6.6-0.28.28" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214259" version="1" comment="strongswan is &lt;4.4.0-6.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214260" version="1" comment="strongswan-doc is &lt;4.4.0-6.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214261" version="1" comment="flash-player is &lt;11.2.202.291-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214262" version="1" comment="flash-player-gnome is &lt;11.2.202.291-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214263" version="1" comment="flash-player-kde4 is &lt;11.2.202.291-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214264" version="1" comment="flash-player is &lt;11.2.202.297-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214265" version="1" comment="flash-player-gnome is &lt;11.2.202.297-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214266" version="1" comment="flash-player-kde4 is &lt;11.2.202.297-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214267" version="1" comment="flash-player is &lt;11.2.202.310-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214268" version="1" comment="flash-player-gnome is &lt;11.2.202.310-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214269" version="1" comment="flash-player-kde4 is &lt;11.2.202.310-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214270" version="1" comment="xen is &lt;4.0.3_21548_18-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214271" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214272" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214273" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.59_0.15-0.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214274" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.59_0.15-0.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214275" version="1" comment="xen-libs is &lt;4.0.3_21548_18-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214276" version="1" comment="xen-tools is &lt;4.0.3_21548_18-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214277" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214278" version="1" comment="puppet is &lt;2.6.18-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214279" version="1" comment="puppet-server is &lt;2.6.18-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214280" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.6-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214281" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.6-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214282" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.6-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214283" version="1" comment="ruby is &lt;1.8.7.p357-0.9.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214284" version="1" comment="ruby-doc-html is &lt;1.8.7.p357-0.9.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214285" version="1" comment="ruby-tk is &lt;1.8.7.p357-0.9.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214286" version="1" comment="ruby-devel is &lt;1.8.7.p357-0.9.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214287" version="1" comment="ruby-doc-ri is &lt;1.8.7.p357-0.9.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214288" version="1" comment="ruby-examples is &lt;1.8.7.p357-0.9.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214289" version="1" comment="ruby-test-suite is &lt;1.8.7.p357-0.9.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214290" version="1" comment="apache2-mod_php53 is &lt;5.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214291" version="1" comment="php53 is &lt;5.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214292" version="1" comment="php53-bcmath is &lt;5.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214293" version="1" comment="php53-bz2 is &lt;5.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214294" version="1" comment="php53-calendar is &lt;5.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214295" version="1" comment="php53-ctype is &lt;5.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214296" version="1" comment="php53-curl is &lt;5.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214297" version="1" comment="php53-dba is &lt;5.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214298" version="1" comment="php53-dom is &lt;5.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214299" version="1" comment="php53-exif is &lt;5.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214300" version="1" comment="php53-fastcgi is &lt;5.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214301" version="1" comment="php53-fileinfo is &lt;5.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214302" version="1" comment="php53-ftp is &lt;5.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214303" version="1" comment="php53-gd is &lt;5.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214304" version="1" comment="php53-gettext is &lt;5.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214305" version="1" comment="php53-gmp is &lt;5.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214306" version="1" comment="php53-iconv is &lt;5.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214307" version="1" comment="php53-intl is &lt;5.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214308" version="1" comment="php53-json is &lt;5.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214309" version="1" comment="php53-ldap is &lt;5.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214310" version="1" comment="php53-mbstring is &lt;5.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214311" version="1" comment="php53-mcrypt is &lt;5.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214312" version="1" comment="php53-mysql is &lt;5.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214313" version="1" comment="php53-odbc is &lt;5.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214314" version="1" comment="php53-openssl is &lt;5.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214315" version="1" comment="php53-pcntl is &lt;5.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214316" version="1" comment="php53-pdo is &lt;5.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214317" version="1" comment="php53-pear is &lt;5.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214318" version="1" comment="php53-pgsql is &lt;5.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214319" version="1" comment="php53-pspell is &lt;5.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214320" version="1" comment="php53-shmop is &lt;5.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214321" version="1" comment="php53-snmp is &lt;5.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214322" version="1" comment="php53-soap is &lt;5.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214323" version="1" comment="php53-suhosin is &lt;5.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214324" version="1" comment="php53-sysvmsg is &lt;5.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214325" version="1" comment="php53-sysvsem is &lt;5.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214326" version="1" comment="php53-sysvshm is &lt;5.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214327" version="1" comment="php53-tokenizer is &lt;5.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214328" version="1" comment="php53-wddx is &lt;5.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214329" version="1" comment="php53-xmlreader is &lt;5.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214330" version="1" comment="php53-xmlrpc is &lt;5.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214331" version="1" comment="php53-xmlwriter is &lt;5.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214332" version="1" comment="php53-xsl is &lt;5.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214333" version="1" comment="php53-zip is &lt;5.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214334" version="1" comment="php53-zlib is &lt;5.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214335" version="1" comment="php53-devel is &lt;5.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214336" version="1" comment="php53-imap is &lt;5.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214337" version="1" comment="php53-posix is &lt;5.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214338" version="1" comment="php53-readline is &lt;5.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214339" version="1" comment="php53-sockets is &lt;5.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214340" version="1" comment="php53-sqlite is &lt;5.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214341" version="1" comment="php53-tidy is &lt;5.3.17-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214342" version="1" comment="libldb1 is &lt;3.6.3-0.33.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214343" version="1" comment="libldb1-32bit is &lt;3.6.3-0.33.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214344" version="1" comment="libsmbclient0 is &lt;3.6.3-0.33.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214345" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.33.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214346" version="1" comment="libtalloc1 is &lt;3.4.3-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214347" version="1" comment="libtalloc1-32bit is &lt;3.4.3-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214348" version="1" comment="libtalloc2 is &lt;3.6.3-0.33.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214349" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.33.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214350" version="1" comment="libtdb1 is &lt;3.6.3-0.33.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214351" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.33.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214352" version="1" comment="libtevent0 is &lt;3.6.3-0.33.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214353" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.33.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214354" version="1" comment="libwbclient0 is &lt;3.6.3-0.33.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214355" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.33.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214356" version="1" comment="samba is &lt;3.6.3-0.33.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214357" version="1" comment="samba-32bit is &lt;3.6.3-0.33.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214358" version="1" comment="samba-client is &lt;3.6.3-0.33.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214359" version="1" comment="samba-client-32bit is &lt;3.6.3-0.33.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214360" version="1" comment="samba-doc is &lt;3.6.3-0.33.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214361" version="1" comment="samba-krb-printing is &lt;3.6.3-0.33.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214362" version="1" comment="samba-winbind is &lt;3.6.3-0.33.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214363" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.33.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214364" version="1" comment="libldb1 is &lt;3.6.3-0.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214365" version="1" comment="libldb1-32bit is &lt;3.6.3-0.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214366" version="1" comment="libsmbclient0 is &lt;3.6.3-0.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214367" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214368" version="1" comment="libtalloc2 is &lt;3.6.3-0.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214369" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214370" version="1" comment="libtdb1 is &lt;3.6.3-0.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214371" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214372" version="1" comment="libtevent0 is &lt;3.6.3-0.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214373" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214374" version="1" comment="libwbclient0 is &lt;3.6.3-0.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214375" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214376" version="1" comment="samba is &lt;3.6.3-0.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214377" version="1" comment="samba-32bit is &lt;3.6.3-0.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214378" version="1" comment="samba-client is &lt;3.6.3-0.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214379" version="1" comment="samba-client-32bit is &lt;3.6.3-0.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214380" version="1" comment="samba-doc is &lt;3.6.3-0.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214381" version="1" comment="samba-krb-printing is &lt;3.6.3-0.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214382" version="1" comment="samba-winbind is &lt;3.6.3-0.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214383" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250696" version="1" comment="cifs-mount is &lt;3.4.3-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250697" version="1" comment="ldapsmb is &lt;1.34b-11.28.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250698" version="1" comment="libsmbclient0 is &lt;3.4.3-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250699" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250700" version="1" comment="libtdb1 is &lt;3.4.3-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250701" version="1" comment="libtdb1-32bit is &lt;3.4.3-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250702" version="1" comment="libwbclient0 is &lt;3.4.3-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250703" version="1" comment="libwbclient0-32bit is &lt;3.4.3-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250704" version="1" comment="samba is &lt;3.4.3-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250705" version="1" comment="samba-32bit is &lt;3.4.3-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250706" version="1" comment="samba-client is &lt;3.4.3-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250707" version="1" comment="samba-client-32bit is &lt;3.4.3-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250708" version="1" comment="samba-krb-printing is &lt;3.4.3-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250709" version="1" comment="samba-winbind is &lt;3.4.3-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250710" version="1" comment="samba-winbind-32bit is &lt;3.4.3-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214384" version="1" comment="ldapsmb is &lt;1.34b-12.33.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214385" version="1" comment="ldapsmb is &lt;1.34b-12.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214386" version="1" comment="libldb-devel is &lt;3.6.3-0.33.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214387" version="1" comment="libnetapi-devel is &lt;3.6.3-0.33.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214388" version="1" comment="libnetapi0 is &lt;3.6.3-0.33.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214389" version="1" comment="libsmbclient-devel is &lt;3.6.3-0.33.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214390" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-0.33.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214391" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-0.33.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214392" version="1" comment="libtalloc-devel is &lt;3.6.3-0.33.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214393" version="1" comment="libtdb-devel is &lt;3.6.3-0.33.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214394" version="1" comment="libtevent-devel is &lt;3.6.3-0.33.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214395" version="1" comment="libwbclient-devel is &lt;3.6.3-0.33.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214396" version="1" comment="samba-devel is &lt;3.6.3-0.33.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214397" version="1" comment="libldb-devel is &lt;3.6.3-0.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214398" version="1" comment="libnetapi-devel is &lt;3.6.3-0.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214399" version="1" comment="libnetapi0 is &lt;3.6.3-0.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214400" version="1" comment="libsmbclient-devel is &lt;3.6.3-0.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214401" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-0.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214402" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-0.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214403" version="1" comment="libtalloc-devel is &lt;3.6.3-0.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214404" version="1" comment="libtdb-devel is &lt;3.6.3-0.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214405" version="1" comment="libtevent-devel is &lt;3.6.3-0.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214406" version="1" comment="libwbclient-devel is &lt;3.6.3-0.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214407" version="1" comment="samba-devel is &lt;3.6.3-0.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214408" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214409" version="1" comment="php5 is &lt;5.2.14-0.7.30.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214410" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214411" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214412" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214413" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214414" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214415" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214416" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214417" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214418" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214419" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214420" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214421" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214422" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214423" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214424" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214425" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214426" version="1" comment="php5-json is &lt;5.2.14-0.7.30.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214427" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214428" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214429" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214430" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214431" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214432" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214433" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214434" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214435" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214436" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214437" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214438" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214439" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214440" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214441" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214442" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214443" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214444" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214445" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214446" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214447" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214448" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214449" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214450" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214451" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214452" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214453" version="1" comment="apache2-mod_php53 is &lt;5.3.17-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214454" version="1" comment="php53 is &lt;5.3.17-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214455" version="1" comment="php53-bcmath is &lt;5.3.17-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214456" version="1" comment="php53-bz2 is &lt;5.3.17-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214457" version="1" comment="php53-calendar is &lt;5.3.17-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214458" version="1" comment="php53-ctype is &lt;5.3.17-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214459" version="1" comment="php53-curl is &lt;5.3.17-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214460" version="1" comment="php53-dba is &lt;5.3.17-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214461" version="1" comment="php53-dom is &lt;5.3.17-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214462" version="1" comment="php53-exif is &lt;5.3.17-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214463" version="1" comment="php53-fastcgi is &lt;5.3.17-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214464" version="1" comment="php53-fileinfo is &lt;5.3.17-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214465" version="1" comment="php53-ftp is &lt;5.3.17-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214466" version="1" comment="php53-gd is &lt;5.3.17-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214467" version="1" comment="php53-gettext is &lt;5.3.17-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214468" version="1" comment="php53-gmp is &lt;5.3.17-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214469" version="1" comment="php53-iconv is &lt;5.3.17-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214470" version="1" comment="php53-intl is &lt;5.3.17-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214471" version="1" comment="php53-json is &lt;5.3.17-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214472" version="1" comment="php53-ldap is &lt;5.3.17-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214473" version="1" comment="php53-mbstring is &lt;5.3.17-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214474" version="1" comment="php53-mcrypt is &lt;5.3.17-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214475" version="1" comment="php53-mysql is &lt;5.3.17-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214476" version="1" comment="php53-odbc is &lt;5.3.17-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214477" version="1" comment="php53-openssl is &lt;5.3.17-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214478" version="1" comment="php53-pcntl is &lt;5.3.17-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214479" version="1" comment="php53-pdo is &lt;5.3.17-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214480" version="1" comment="php53-pear is &lt;5.3.17-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214481" version="1" comment="php53-pgsql is &lt;5.3.17-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214482" version="1" comment="php53-pspell is &lt;5.3.17-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214483" version="1" comment="php53-shmop is &lt;5.3.17-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214484" version="1" comment="php53-snmp is &lt;5.3.17-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214485" version="1" comment="php53-soap is &lt;5.3.17-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214486" version="1" comment="php53-suhosin is &lt;5.3.17-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214487" version="1" comment="php53-sysvmsg is &lt;5.3.17-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214488" version="1" comment="php53-sysvsem is &lt;5.3.17-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214489" version="1" comment="php53-sysvshm is &lt;5.3.17-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214490" version="1" comment="php53-tokenizer is &lt;5.3.17-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214491" version="1" comment="php53-wddx is &lt;5.3.17-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214492" version="1" comment="php53-xmlreader is &lt;5.3.17-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214493" version="1" comment="php53-xmlrpc is &lt;5.3.17-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214494" version="1" comment="php53-xmlwriter is &lt;5.3.17-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214495" version="1" comment="php53-xsl is &lt;5.3.17-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214496" version="1" comment="php53-zip is &lt;5.3.17-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214497" version="1" comment="php53-zlib is &lt;5.3.17-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214498" version="1" comment="php53-devel is &lt;5.3.17-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214499" version="1" comment="php53-imap is &lt;5.3.17-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214500" version="1" comment="php53-posix is &lt;5.3.17-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214501" version="1" comment="php53-readline is &lt;5.3.17-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214502" version="1" comment="php53-sockets is &lt;5.3.17-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214503" version="1" comment="php53-sqlite is &lt;5.3.17-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214504" version="1" comment="php53-tidy is &lt;5.3.17-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214505" version="1" comment="subversion is &lt;1.6.17-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214506" version="1" comment="subversion-devel is &lt;1.6.17-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214507" version="1" comment="subversion-perl is &lt;1.6.17-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214508" version="1" comment="subversion-python is &lt;1.6.17-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214509" version="1" comment="subversion-server is &lt;1.6.17-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214510" version="1" comment="subversion-tools is &lt;1.6.17-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214511" version="1" comment="libvirt is &lt;1.0.5.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214512" version="1" comment="libvirt-client is &lt;1.0.5.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214513" version="1" comment="libvirt-client-32bit is &lt;1.0.5.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214514" version="1" comment="libvirt-doc is &lt;1.0.5.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214515" version="1" comment="libvirt-python is &lt;1.0.5.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214516" version="1" comment="libvirt-lock-sanlock is &lt;1.0.5.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214517" version="1" comment="libvirt-devel is &lt;1.0.5.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214518" version="1" comment="libvirt-devel-32bit is &lt;1.0.5.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214519" version="1" comment="kernel-default is &lt;3.0.101-0.7.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214520" version="1" comment="kernel-default-base is &lt;3.0.101-0.7.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214521" version="1" comment="kernel-default-devel is &lt;3.0.101-0.7.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214522" version="1" comment="kernel-ec2 is &lt;3.0.101-0.7.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214523" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.7.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214524" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.7.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213293" version="1" comment="kernel-pae is &lt;3.0.101-0.7.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213294" version="1" comment="kernel-pae-base is &lt;3.0.101-0.7.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213295" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.7.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214525" version="1" comment="kernel-source is &lt;3.0.101-0.7.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214526" version="1" comment="kernel-syms is &lt;3.0.101-0.7.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214527" version="1" comment="kernel-trace is &lt;3.0.101-0.7.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214528" version="1" comment="kernel-trace-base is &lt;3.0.101-0.7.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214529" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.7.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214530" version="1" comment="kernel-xen is &lt;3.0.101-0.7.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214531" version="1" comment="kernel-xen-base is &lt;3.0.101-0.7.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214532" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.7.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214535" version="1" comment="libmysql55client18 is &lt;5.5.37-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214536" version="1" comment="libmysql55client18-32bit is &lt;5.5.37-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214537" version="1" comment="libmysql55client_r18 is &lt;5.5.37-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214538" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.37-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214539" version="1" comment="mysql is &lt;5.5.37-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214540" version="1" comment="mysql-client is &lt;5.5.37-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214541" version="1" comment="mysql-tools is &lt;5.5.37-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214542" version="1" comment="kernel-default is &lt;3.0.101-0.7.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214543" version="1" comment="kernel-default-base is &lt;3.0.101-0.7.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214544" version="1" comment="kernel-default-devel is &lt;3.0.101-0.7.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214545" version="1" comment="kernel-default-extra is &lt;3.0.101-0.7.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214546" version="1" comment="kernel-source is &lt;3.0.101-0.7.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214547" version="1" comment="kernel-syms is &lt;3.0.101-0.7.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214548" version="1" comment="kernel-trace is &lt;3.0.101-0.7.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214549" version="1" comment="kernel-trace-base is &lt;3.0.101-0.7.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214550" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.7.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214551" version="1" comment="kernel-trace-extra is &lt;3.0.101-0.7.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214552" version="1" comment="kernel-xen is &lt;3.0.101-0.7.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214553" version="1" comment="kernel-xen-base is &lt;3.0.101-0.7.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214554" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.7.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214555" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.7.15" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214556" version="1" comment="xen-kmp-default is &lt;4.1.6_04_3.0.101_0.7.15-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214557" version="1" comment="xen-kmp-trace is &lt;4.1.6_04_3.0.101_0.7.15-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214558" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.101_0.7.15-2.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214559" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.101_0.7.15-2.18" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214561" version="1" comment="gfs2-kmp-default is &lt;2_3.0.101_0.7.15-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214562" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.101_0.7.15-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214564" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.101_0.7.15-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214565" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.101_0.7.15-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214570" version="1" comment="glibc is &lt;2.11.3-17.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214571" version="1" comment="glibc-32bit is &lt;2.11.3-17.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214572" version="1" comment="glibc-devel is &lt;2.11.3-17.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214573" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214574" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214575" version="1" comment="glibc-locale is &lt;2.11.3-17.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214576" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214577" version="1" comment="nscd is &lt;2.11.3-17.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213497" version="1" comment="glibc is &lt;2.11.3-17.45.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213499" version="1" comment="glibc-devel is &lt;2.11.3-17.45.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213501" version="1" comment="glibc-html is &lt;2.11.3-17.45.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213502" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.45.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213503" version="1" comment="glibc-info is &lt;2.11.3-17.45.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213504" version="1" comment="glibc-locale is &lt;2.11.3-17.45.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213506" version="1" comment="glibc-profile is &lt;2.11.3-17.45.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213508" version="1" comment="nscd is &lt;2.11.3-17.45.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214578" version="1" comment="glibc-html is &lt;2.11.3-17.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214579" version="1" comment="glibc-info is &lt;2.11.3-17.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214580" version="1" comment="glibc-profile is &lt;2.11.3-17.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214581" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214582" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.70.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214583" version="1" comment="xorg-x11-server is &lt;7.4-27.70.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214584" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.70.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214585" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214586" version="1" comment="xorg-x11-server is &lt;7.4-27.83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214587" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250711" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.40.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250712" version="1" comment="xorg-x11-server is &lt;7.4-27.40.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250713" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.40.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214588" version="1" comment="xorg-x11-server-sdk is &lt;7.4-27.70.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214589" version="1" comment="xorg-x11-server-sdk is &lt;7.4-27.83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214590" version="1" comment="kernel-default is &lt;3.0.101-0.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214591" version="1" comment="kernel-default-base is &lt;3.0.101-0.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214592" version="1" comment="kernel-default-devel is &lt;3.0.101-0.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214593" version="1" comment="kernel-default-extra is &lt;3.0.101-0.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214594" version="1" comment="kernel-source is &lt;3.0.101-0.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214595" version="1" comment="kernel-syms is &lt;3.0.101-0.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214596" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214597" version="1" comment="kernel-xen is &lt;3.0.101-0.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214598" version="1" comment="kernel-xen-base is &lt;3.0.101-0.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214599" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214600" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214601" version="1" comment="xen-kmp-default is &lt;4.2.4_02_3.0.101_0.21-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214602" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.101_0.21-2.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214604" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.101_0.21-2.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214605" version="1" comment="gfs2-kmp-default is &lt;2_3.0.101_0.21-0.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214607" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.101_0.21-0.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214608" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.101_0.21-0.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214610" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.101_0.21-0.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214611" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.101_rt130_0.14-2.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214612" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.101_rt130_0.14-2.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214613" version="1" comment="drbd-kmp-rt is &lt;8.4.4_3.0.101_rt130_0.14-0.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214614" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.4_3.0.101_rt130_0.14-0.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214615" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.101_rt130_0.14-0.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214616" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.101_rt130_0.14-0.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214617" version="1" comment="kernel-rt is &lt;3.0.101.rt130-0.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214618" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-0.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214619" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-0.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214620" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-0.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214621" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-0.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214622" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-0.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214623" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-0.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214624" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-0.14" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214625" version="1" comment="lttng-modules-kmp-rt is &lt;2.1.1_3.0.101_rt130_0.14-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214626" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.1.1_3.0.101_rt130_0.14-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214627" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.101_rt130_0.14-0.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214628" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.101_rt130_0.14-0.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214629" version="1" comment="ofed-kmp-rt is &lt;1.5.4.1_3.0.101_rt130_0.14-0.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214630" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.4.1_3.0.101_rt130_0.14-0.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214631" version="1" comment="kernel-default is &lt;3.0.101-0.7.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214632" version="1" comment="kernel-default-base is &lt;3.0.101-0.7.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214633" version="1" comment="kernel-default-devel is &lt;3.0.101-0.7.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214637" version="1" comment="kernel-source is &lt;3.0.101-0.7.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214638" version="1" comment="kernel-syms is &lt;3.0.101-0.7.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214639" version="1" comment="kernel-trace is &lt;3.0.101-0.7.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214640" version="1" comment="kernel-trace-base is &lt;3.0.101-0.7.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214641" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.7.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214648" version="1" comment="kernel-trace is &lt;3.0.101-0.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214649" version="1" comment="kernel-trace-base is &lt;3.0.101-0.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214650" version="1" comment="cifs-mount is &lt;3.4.3-1.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214651" version="1" comment="ldapsmb is &lt;1.34b-11.28.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214652" version="1" comment="libsmbclient0 is &lt;3.4.3-1.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214654" version="1" comment="libtalloc1 is &lt;3.4.3-1.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214656" version="1" comment="libtdb1 is &lt;3.4.3-1.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214658" version="1" comment="libwbclient0 is &lt;3.4.3-1.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214660" version="1" comment="samba is &lt;3.4.3-1.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214662" version="1" comment="samba-client is &lt;3.4.3-1.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214665" version="1" comment="samba-krb-printing is &lt;3.4.3-1.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214666" version="1" comment="samba-winbind is &lt;3.4.3-1.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214668" version="1" comment="libldb1 is &lt;3.6.3-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214669" version="1" comment="libldb1-32bit is &lt;3.6.3-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214670" version="1" comment="libsmbclient0 is &lt;3.6.3-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214671" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214672" version="1" comment="libtalloc2 is &lt;3.6.3-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214673" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214674" version="1" comment="libtdb1 is &lt;3.6.3-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214675" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214676" version="1" comment="libtevent0 is &lt;3.6.3-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214677" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214678" version="1" comment="libwbclient0 is &lt;3.6.3-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214679" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214680" version="1" comment="samba is &lt;3.6.3-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214681" version="1" comment="samba-32bit is &lt;3.6.3-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214682" version="1" comment="samba-client is &lt;3.6.3-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214683" version="1" comment="samba-client-32bit is &lt;3.6.3-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214684" version="1" comment="samba-doc is &lt;3.6.3-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214685" version="1" comment="samba-krb-printing is &lt;3.6.3-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214686" version="1" comment="samba-winbind is &lt;3.6.3-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214687" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213436" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-1.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213438" version="1" comment="libtalloc1-32bit is &lt;3.4.3-1.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213440" version="1" comment="libtdb1-32bit is &lt;3.4.3-1.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213442" version="1" comment="libwbclient0-32bit is &lt;3.4.3-1.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213444" version="1" comment="samba-32bit is &lt;3.4.3-1.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213446" version="1" comment="samba-client-32bit is &lt;3.4.3-1.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009213450" version="1" comment="samba-winbind-32bit is &lt;3.4.3-1.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214688" version="1" comment="ldapsmb is &lt;1.34b-12.33.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214689" version="1" comment="libldb1 is &lt;3.6.3-0.33.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214690" version="1" comment="libsmbclient0 is &lt;3.6.3-0.33.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214692" version="1" comment="libtalloc2 is &lt;3.6.3-0.33.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214694" version="1" comment="libtdb1 is &lt;3.6.3-0.33.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214696" version="1" comment="libtevent0 is &lt;3.6.3-0.33.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214698" version="1" comment="libwbclient0 is &lt;3.6.3-0.33.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214700" version="1" comment="samba is &lt;3.6.3-0.33.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214702" version="1" comment="samba-client is &lt;3.6.3-0.33.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214705" version="1" comment="samba-krb-printing is &lt;3.6.3-0.33.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214706" version="1" comment="samba-winbind is &lt;3.6.3-0.33.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214708" version="1" comment="ldapsmb is &lt;1.34b-12.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214709" version="1" comment="libldb-devel is &lt;3.6.3-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214710" version="1" comment="libnetapi-devel is &lt;3.6.3-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214711" version="1" comment="libnetapi0 is &lt;3.6.3-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214712" version="1" comment="libsmbclient-devel is &lt;3.6.3-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214713" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214714" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214715" version="1" comment="libtalloc-devel is &lt;3.6.3-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214716" version="1" comment="libtdb-devel is &lt;3.6.3-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214717" version="1" comment="libtevent-devel is &lt;3.6.3-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214718" version="1" comment="libwbclient-devel is &lt;3.6.3-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214719" version="1" comment="samba-devel is &lt;3.6.3-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214720" version="1" comment="curl is &lt;7.19.7-1.20.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214721" version="1" comment="libcurl4 is &lt;7.19.7-1.20.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214722" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.20.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214723" version="1" comment="curl is &lt;7.19.7-1.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214724" version="1" comment="libcurl4 is &lt;7.19.7-1.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214725" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214726" version="1" comment="libcurl-devel is &lt;7.19.7-1.20.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214727" version="1" comment="libcurl-devel is &lt;7.19.7-1.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250714" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.20.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250716" version="1" comment="libqt4 is &lt;4.6.3-5.20.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250718" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.20.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250720" version="1" comment="libqt4-sql is &lt;4.6.3-5.20.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250722" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.20.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250723" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.20.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250724" version="1" comment="libqt4-x11 is &lt;4.6.3-5.20.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250726" version="1" comment="qt4-x11-tools is &lt;4.6.3-5.20.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214728" version="1" comment="puppet is &lt;2.6.18-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214729" version="1" comment="puppet-server is &lt;2.6.18-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214730" version="1" comment="bind-libs is &lt;9.9.3P2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214731" version="1" comment="bind-libs-32bit is &lt;9.9.3P2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214732" version="1" comment="bind-utils is &lt;9.9.3P2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214733" version="1" comment="bind is &lt;9.9.3P2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214734" version="1" comment="bind-chrootenv is &lt;9.9.3P2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214735" version="1" comment="bind-doc is &lt;9.9.3P2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214736" version="1" comment="bind-devel is &lt;9.9.3P2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214737" version="1" comment="wireshark is &lt;1.8.9-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214738" version="1" comment="wireshark-devel is &lt;1.8.9-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214739" version="1" comment="flash-player is &lt;11.2.202.327-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214740" version="1" comment="flash-player-gnome is &lt;11.2.202.327-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214741" version="1" comment="flash-player-kde4 is &lt;11.2.202.327-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214742" version="1" comment="flash-player is &lt;11.2.202.332-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214743" version="1" comment="flash-player-gnome is &lt;11.2.202.332-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214744" version="1" comment="flash-player-kde4 is &lt;11.2.202.332-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214745" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.6-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214746" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.6-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214747" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.6-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214748" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr15.1-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214749" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr15.1-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214750" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr15.1-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214751" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr15.1-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214752" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr15.1-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214753" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr6.1-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214844" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr7.0-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214755" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr9.0-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214756" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr6.1-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214846" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr7.0-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214754" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr6.1-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214757" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr6.1-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214758" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr6.1-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214759" version="1" comment="wireshark is &lt;1.8.11-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214760" version="1" comment="wireshark-devel is &lt;1.8.11-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250727" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.40.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250728" version="1" comment="xorg-x11-server is &lt;7.4-27.40.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250729" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.40.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250730" version="1" comment="popt is &lt;1.7-37.29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250731" version="1" comment="popt-32bit is &lt;1.7-37.29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250732" version="1" comment="rpm is &lt;4.4.2.3-37.29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250733" version="1" comment="rpm-32bit is &lt;4.4.2.3-37.29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214761" version="1" comment="libvirt is &lt;1.0.5.8-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214762" version="1" comment="libvirt-client is &lt;1.0.5.8-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214763" version="1" comment="libvirt-client-32bit is &lt;1.0.5.8-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214764" version="1" comment="libvirt-doc is &lt;1.0.5.8-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214765" version="1" comment="libvirt-python is &lt;1.0.5.8-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214766" version="1" comment="libvirt-lock-sanlock is &lt;1.0.5.8-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214767" version="1" comment="libvirt-devel is &lt;1.0.5.8-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214768" version="1" comment="libvirt-devel-32bit is &lt;1.0.5.8-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214769" version="1" comment="apache2 is &lt;2.2.12-1.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214770" version="1" comment="apache2-doc is &lt;2.2.12-1.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214771" version="1" comment="apache2-example-pages is &lt;2.2.12-1.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214772" version="1" comment="apache2-prefork is &lt;2.2.12-1.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214773" version="1" comment="apache2-utils is &lt;2.2.12-1.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214774" version="1" comment="apache2-worker is &lt;2.2.12-1.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214775" version="1" comment="libvirt is &lt;1.0.5.9-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214776" version="1" comment="libvirt-client is &lt;1.0.5.9-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214777" version="1" comment="libvirt-client-32bit is &lt;1.0.5.9-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214778" version="1" comment="libvirt-doc is &lt;1.0.5.9-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214779" version="1" comment="libvirt-python is &lt;1.0.5.9-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214780" version="1" comment="libvirt-lock-sanlock is &lt;1.0.5.9-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214781" version="1" comment="libvirt-devel is &lt;1.0.5.9-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214782" version="1" comment="libvirt-devel-32bit is &lt;1.0.5.9-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250734" version="1" comment="openswan is &lt;2.6.16-1.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250735" version="1" comment="openswan-doc is &lt;2.6.16-1.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214783" version="1" comment="clamav is &lt;0.98.5-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214784" version="1" comment="apache2-mod_php53 is &lt;5.3.17-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214785" version="1" comment="php53 is &lt;5.3.17-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214786" version="1" comment="php53-bcmath is &lt;5.3.17-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214787" version="1" comment="php53-bz2 is &lt;5.3.17-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214788" version="1" comment="php53-calendar is &lt;5.3.17-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214789" version="1" comment="php53-ctype is &lt;5.3.17-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214790" version="1" comment="php53-curl is &lt;5.3.17-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214791" version="1" comment="php53-dba is &lt;5.3.17-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214792" version="1" comment="php53-dom is &lt;5.3.17-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214793" version="1" comment="php53-exif is &lt;5.3.17-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214794" version="1" comment="php53-fastcgi is &lt;5.3.17-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214795" version="1" comment="php53-fileinfo is &lt;5.3.17-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214796" version="1" comment="php53-ftp is &lt;5.3.17-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214797" version="1" comment="php53-gd is &lt;5.3.17-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214798" version="1" comment="php53-gettext is &lt;5.3.17-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214799" version="1" comment="php53-gmp is &lt;5.3.17-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214800" version="1" comment="php53-iconv is &lt;5.3.17-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214801" version="1" comment="php53-intl is &lt;5.3.17-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214802" version="1" comment="php53-json is &lt;5.3.17-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214803" version="1" comment="php53-ldap is &lt;5.3.17-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214804" version="1" comment="php53-mbstring is &lt;5.3.17-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214805" version="1" comment="php53-mcrypt is &lt;5.3.17-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214806" version="1" comment="php53-mysql is &lt;5.3.17-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214807" version="1" comment="php53-odbc is &lt;5.3.17-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214808" version="1" comment="php53-openssl is &lt;5.3.17-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214809" version="1" comment="php53-pcntl is &lt;5.3.17-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214810" version="1" comment="php53-pdo is &lt;5.3.17-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214811" version="1" comment="php53-pear is &lt;5.3.17-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214812" version="1" comment="php53-pgsql is &lt;5.3.17-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214813" version="1" comment="php53-pspell is &lt;5.3.17-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214814" version="1" comment="php53-shmop is &lt;5.3.17-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214815" version="1" comment="php53-snmp is &lt;5.3.17-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214816" version="1" comment="php53-soap is &lt;5.3.17-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214817" version="1" comment="php53-suhosin is &lt;5.3.17-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214818" version="1" comment="php53-sysvmsg is &lt;5.3.17-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214819" version="1" comment="php53-sysvsem is &lt;5.3.17-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214820" version="1" comment="php53-sysvshm is &lt;5.3.17-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214821" version="1" comment="php53-tokenizer is &lt;5.3.17-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214822" version="1" comment="php53-wddx is &lt;5.3.17-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214823" version="1" comment="php53-xmlreader is &lt;5.3.17-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214824" version="1" comment="php53-xmlrpc is &lt;5.3.17-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214825" version="1" comment="php53-xmlwriter is &lt;5.3.17-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214826" version="1" comment="php53-xsl is &lt;5.3.17-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214827" version="1" comment="php53-zip is &lt;5.3.17-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214828" version="1" comment="php53-zlib is &lt;5.3.17-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214829" version="1" comment="php53-devel is &lt;5.3.17-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214830" version="1" comment="php53-imap is &lt;5.3.17-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214831" version="1" comment="php53-posix is &lt;5.3.17-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214832" version="1" comment="php53-readline is &lt;5.3.17-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214833" version="1" comment="php53-sockets is &lt;5.3.17-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214834" version="1" comment="php53-sqlite is &lt;5.3.17-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214835" version="1" comment="php53-tidy is &lt;5.3.17-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214836" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.6-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214837" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.6-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214838" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.6-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214839" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.0-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214840" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.0-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214841" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.0-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214843" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr7.0-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214845" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr7.0-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214847" version="1" comment="wireshark is &lt;1.8.12-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214848" version="1" comment="wireshark-devel is &lt;1.8.12-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214911" version="1" comment="kernel-default is &lt;3.0.101-0.47.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214912" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214913" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214914" version="1" comment="kernel-default-extra is &lt;3.0.101-0.47.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264488" version="1" comment="kernel-pae is &lt;3.0.101-0.47.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264489" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264490" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264491" version="1" comment="kernel-pae-extra is &lt;3.0.101-0.47.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214915" version="1" comment="kernel-source is &lt;3.0.101-0.47.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214916" version="1" comment="kernel-syms is &lt;3.0.101-0.47.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214917" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214918" version="1" comment="kernel-xen is &lt;3.0.101-0.47.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214919" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214920" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214921" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.47.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214922" version="1" comment="xen-kmp-default is &lt;4.2.5_04_3.0.101_0.47.50-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264492" version="1" comment="xen-kmp-pae is &lt;4.2.5_04_3.0.101_0.47.50-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214923" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.101_0.47.50-2.28.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264493" version="1" comment="cluster-network-kmp-pae is &lt;1.4_3.0.101_0.47.50-2.28.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214924" version="1" comment="cluster-network-kmp-ppc64 is &lt;1.4_3.0.101_0.47.50-2.28.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214925" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.101_0.47.50-2.28.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233197" version="1" comment="cluster-network-kmp-xen is &lt;1.4_3.0.101_0.47.50-2.28.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214926" version="1" comment="gfs2-kmp-default is &lt;2_3.0.101_0.47.50-0.17.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264494" version="1" comment="gfs2-kmp-pae is &lt;2_3.0.101_0.47.50-0.17.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214927" version="1" comment="gfs2-kmp-ppc64 is &lt;2_3.0.101_0.47.50-0.17.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214928" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.101_0.47.50-0.17.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233199" version="1" comment="gfs2-kmp-xen is &lt;2_3.0.101_0.47.50-0.17.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214929" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.101_0.47.50-0.21.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264495" version="1" comment="ocfs2-kmp-pae is &lt;1.6_3.0.101_0.47.50-0.21.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214930" version="1" comment="ocfs2-kmp-ppc64 is &lt;1.6_3.0.101_0.47.50-0.21.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214931" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.101_0.47.50-0.21.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233201" version="1" comment="ocfs2-kmp-xen is &lt;1.6_3.0.101_0.47.50-0.21.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214932" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.101_rt130_0.33.36-2.28.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214933" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.101_rt130_0.33.36-2.28.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214934" version="1" comment="drbd-kmp-rt is &lt;8.4.4_3.0.101_rt130_0.33.36-0.23.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214935" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.4_3.0.101_rt130_0.33.36-0.23.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214936" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.101_rt130_0.33.36-0.39.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214937" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.101_rt130_0.33.36-0.39.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214938" version="1" comment="kernel-rt is &lt;3.0.101.rt130-0.33.36" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214939" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-0.33.36" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214940" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-0.33.36" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214941" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-0.33.36" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214942" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-0.33.36" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214943" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-0.33.36" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214944" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-0.33.36" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214945" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-0.33.36" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214946" version="1" comment="lttng-modules-kmp-rt is &lt;2.1.1_3.0.101_rt130_0.33.36-0.12.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214947" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.1.1_3.0.101_rt130_0.33.36-0.12.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214948" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.101_rt130_0.33.36-0.21.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214949" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.101_rt130_0.33.36-0.21.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214950" version="1" comment="ofed-kmp-rt is &lt;1.5.4.1_3.0.101_rt130_0.33.36-0.14.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214951" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.4.1_3.0.101_rt130_0.33.36-0.14.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264496" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214954" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214955" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214956" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264497" version="1" comment="kernel-ppc64 is &lt;3.0.101-0.47.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264498" version="1" comment="kernel-ppc64-base is &lt;3.0.101-0.47.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264499" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-0.47.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214957" version="1" comment="kernel-trace is &lt;3.0.101-0.47.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214958" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214849" version="1" comment="glibc is &lt;2.11.3-17.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214850" version="1" comment="glibc-32bit is &lt;2.11.3-17.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214851" version="1" comment="glibc-devel is &lt;2.11.3-17.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214852" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214853" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214854" version="1" comment="glibc-locale is &lt;2.11.3-17.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214855" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214856" version="1" comment="nscd is &lt;2.11.3-17.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214857" version="1" comment="glibc is &lt;2.11.1-0.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214858" version="1" comment="glibc-32bit is &lt;2.11.1-0.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214859" version="1" comment="glibc-devel is &lt;2.11.1-0.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214860" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214861" version="1" comment="glibc-html is &lt;2.11.1-0.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214862" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214863" version="1" comment="glibc-info is &lt;2.11.1-0.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214864" version="1" comment="glibc-locale is &lt;2.11.1-0.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214865" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214866" version="1" comment="glibc-profile is &lt;2.11.1-0.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214867" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214868" version="1" comment="nscd is &lt;2.11.1-0.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214869" version="1" comment="glibc is &lt;2.11.3-17.45.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214870" version="1" comment="glibc-32bit is &lt;2.11.3-17.45.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214871" version="1" comment="glibc-devel is &lt;2.11.3-17.45.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214872" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.45.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214873" version="1" comment="glibc-html is &lt;2.11.3-17.45.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214874" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.45.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214875" version="1" comment="glibc-info is &lt;2.11.3-17.45.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214876" version="1" comment="glibc-locale is &lt;2.11.3-17.45.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214877" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.45.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214878" version="1" comment="glibc-profile is &lt;2.11.3-17.45.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214879" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.45.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214880" version="1" comment="nscd is &lt;2.11.3-17.45.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214881" version="1" comment="glibc-html is &lt;2.11.3-17.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214882" version="1" comment="glibc-info is &lt;2.11.3-17.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264500" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214883" version="1" comment="glibc-profile is &lt;2.11.3-17.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214884" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264501" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264502" version="1" comment="glibc-x86 is &lt;2.11.3-17.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214885" version="1" comment="curl is &lt;7.19.7-1.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214886" version="1" comment="libcurl4 is &lt;7.19.7-1.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214887" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214888" version="1" comment="libcurl-devel is &lt;7.19.7-1.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214889" version="1" comment="subversion is &lt;1.6.17-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214890" version="1" comment="subversion-devel is &lt;1.6.17-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214891" version="1" comment="subversion-perl is &lt;1.6.17-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214892" version="1" comment="subversion-python is &lt;1.6.17-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214893" version="1" comment="subversion-server is &lt;1.6.17-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214894" version="1" comment="subversion-tools is &lt;1.6.17-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214895" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214896" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214897" version="1" comment="openssl is &lt;0.9.8j-0.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214898" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214900" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214901" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214902" version="1" comment="openssl is &lt;0.9.8j-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214903" version="1" comment="openssl-doc is &lt;0.9.8j-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214904" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214906" version="1" comment="openssl-doc is &lt;0.9.8j-0.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214899" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214905" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214907" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250736" version="1" comment="sudo is &lt;1.7.6p2-0.2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214908" version="1" comment="squid3 is &lt;3.1.12-8.16.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250737" version="1" comment="curl is &lt;7.19.7-1.20.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250738" version="1" comment="libcurl4 is &lt;7.19.7-1.20.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214909" version="1" comment="kvm is &lt;1.4.2-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214910" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233196" version="1" comment="cluster-network-kmp-bigsmp is &lt;1.4_3.0.101_0.47.50-2.28.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233198" version="1" comment="gfs2-kmp-bigsmp is &lt;2_3.0.101_0.47.50-0.17.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233200" version="1" comment="ocfs2-kmp-bigsmp is &lt;1.6_3.0.101_0.47.50-0.21.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214952" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214953" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.50" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214959" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214960" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214961" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214962" version="1" comment="openssl1 is &lt;1.0.1g-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214963" version="1" comment="openssl1-doc is &lt;1.0.1g-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214964" version="1" comment="kernel-default is &lt;3.0.101-0.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214965" version="1" comment="kernel-default-base is &lt;3.0.101-0.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214966" version="1" comment="kernel-default-devel is &lt;3.0.101-0.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214967" version="1" comment="kernel-default-extra is &lt;3.0.101-0.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214968" version="1" comment="kernel-source is &lt;3.0.101-0.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214969" version="1" comment="kernel-syms is &lt;3.0.101-0.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214970" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214971" version="1" comment="kernel-xen is &lt;3.0.101-0.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214972" version="1" comment="kernel-xen-base is &lt;3.0.101-0.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214973" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214974" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214975" version="1" comment="xen-kmp-default is &lt;4.2.4_02_3.0.101_0.29-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214976" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.101_0.29-2.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214978" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.101_0.29-2.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214979" version="1" comment="gfs2-kmp-default is &lt;2_3.0.101_0.29-0.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214981" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.101_0.29-0.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214982" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.101_0.29-0.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214984" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.101_0.29-0.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214985" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.101_rt130_0.16-2.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214986" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.101_rt130_0.16-2.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214987" version="1" comment="drbd-kmp-rt is &lt;8.4.4_3.0.101_rt130_0.16-0.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214988" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.4_3.0.101_rt130_0.16-0.22" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214989" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.101_rt130_0.16-0.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214990" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.101_rt130_0.16-0.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214991" version="1" comment="kernel-rt is &lt;3.0.101.rt130-0.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214992" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-0.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214993" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-0.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214994" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-0.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214995" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-0.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214996" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-0.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214997" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-0.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214998" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-0.16" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009214999" version="1" comment="lttng-modules-kmp-rt is &lt;2.1.1_3.0.101_rt130_0.16-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215000" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.1.1_3.0.101_rt130_0.16-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215001" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.101_rt130_0.16-0.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215002" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.101_rt130_0.16-0.20" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215003" version="1" comment="ofed-kmp-rt is &lt;1.5.4.1_3.0.101_rt130_0.16-0.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215004" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.4.1_3.0.101_rt130_0.16-0.13" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215008" version="1" comment="kernel-trace is &lt;3.0.101-0.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215009" version="1" comment="kernel-trace-base is &lt;3.0.101-0.29" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215010" version="1" comment="apache2-mod_php53 is &lt;5.3.17-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215011" version="1" comment="php53 is &lt;5.3.17-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215012" version="1" comment="php53-bcmath is &lt;5.3.17-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215013" version="1" comment="php53-bz2 is &lt;5.3.17-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215014" version="1" comment="php53-calendar is &lt;5.3.17-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215015" version="1" comment="php53-ctype is &lt;5.3.17-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215016" version="1" comment="php53-curl is &lt;5.3.17-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215017" version="1" comment="php53-dba is &lt;5.3.17-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215018" version="1" comment="php53-dom is &lt;5.3.17-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215019" version="1" comment="php53-exif is &lt;5.3.17-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215020" version="1" comment="php53-fastcgi is &lt;5.3.17-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215021" version="1" comment="php53-fileinfo is &lt;5.3.17-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215022" version="1" comment="php53-ftp is &lt;5.3.17-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215023" version="1" comment="php53-gd is &lt;5.3.17-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215024" version="1" comment="php53-gettext is &lt;5.3.17-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215025" version="1" comment="php53-gmp is &lt;5.3.17-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215026" version="1" comment="php53-iconv is &lt;5.3.17-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215027" version="1" comment="php53-intl is &lt;5.3.17-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215028" version="1" comment="php53-json is &lt;5.3.17-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215029" version="1" comment="php53-ldap is &lt;5.3.17-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215030" version="1" comment="php53-mbstring is &lt;5.3.17-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215031" version="1" comment="php53-mcrypt is &lt;5.3.17-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215032" version="1" comment="php53-mysql is &lt;5.3.17-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215033" version="1" comment="php53-odbc is &lt;5.3.17-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215034" version="1" comment="php53-openssl is &lt;5.3.17-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215035" version="1" comment="php53-pcntl is &lt;5.3.17-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215036" version="1" comment="php53-pdo is &lt;5.3.17-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215037" version="1" comment="php53-pear is &lt;5.3.17-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215038" version="1" comment="php53-pgsql is &lt;5.3.17-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215039" version="1" comment="php53-pspell is &lt;5.3.17-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215040" version="1" comment="php53-shmop is &lt;5.3.17-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215041" version="1" comment="php53-snmp is &lt;5.3.17-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215042" version="1" comment="php53-soap is &lt;5.3.17-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215043" version="1" comment="php53-suhosin is &lt;5.3.17-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215044" version="1" comment="php53-sysvmsg is &lt;5.3.17-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215045" version="1" comment="php53-sysvsem is &lt;5.3.17-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215046" version="1" comment="php53-sysvshm is &lt;5.3.17-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215047" version="1" comment="php53-tokenizer is &lt;5.3.17-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215048" version="1" comment="php53-wddx is &lt;5.3.17-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215049" version="1" comment="php53-xmlreader is &lt;5.3.17-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215050" version="1" comment="php53-xmlrpc is &lt;5.3.17-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215051" version="1" comment="php53-xmlwriter is &lt;5.3.17-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215052" version="1" comment="php53-xsl is &lt;5.3.17-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215053" version="1" comment="php53-zip is &lt;5.3.17-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215054" version="1" comment="php53-zlib is &lt;5.3.17-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215055" version="1" comment="php53-devel is &lt;5.3.17-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215056" version="1" comment="php53-imap is &lt;5.3.17-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215057" version="1" comment="php53-posix is &lt;5.3.17-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215058" version="1" comment="php53-readline is &lt;5.3.17-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215059" version="1" comment="php53-sockets is &lt;5.3.17-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215060" version="1" comment="php53-sqlite is &lt;5.3.17-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215061" version="1" comment="php53-tidy is &lt;5.3.17-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215062" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215063" version="1" comment="kvm is &lt;0.12.5-1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215064" version="1" comment="tomcat6 is &lt;6.0.41-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215065" version="1" comment="tomcat6-admin-webapps is &lt;6.0.41-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215066" version="1" comment="tomcat6-docs-webapp is &lt;6.0.41-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215067" version="1" comment="tomcat6-javadoc is &lt;6.0.41-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215068" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.41-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215069" version="1" comment="tomcat6-lib is &lt;6.0.41-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215070" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.41-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215071" version="1" comment="tomcat6-webapps is &lt;6.0.41-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215072" version="1" comment="apache2-mod_php53 is &lt;5.3.8-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215073" version="1" comment="php53 is &lt;5.3.8-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215074" version="1" comment="php53-bcmath is &lt;5.3.8-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215075" version="1" comment="php53-bz2 is &lt;5.3.8-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215076" version="1" comment="php53-calendar is &lt;5.3.8-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215077" version="1" comment="php53-ctype is &lt;5.3.8-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215078" version="1" comment="php53-curl is &lt;5.3.8-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215079" version="1" comment="php53-dba is &lt;5.3.8-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215080" version="1" comment="php53-dom is &lt;5.3.8-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215081" version="1" comment="php53-exif is &lt;5.3.8-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215082" version="1" comment="php53-fastcgi is &lt;5.3.8-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215083" version="1" comment="php53-fileinfo is &lt;5.3.8-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215084" version="1" comment="php53-ftp is &lt;5.3.8-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215085" version="1" comment="php53-gd is &lt;5.3.8-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215086" version="1" comment="php53-gettext is &lt;5.3.8-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215087" version="1" comment="php53-gmp is &lt;5.3.8-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215088" version="1" comment="php53-iconv is &lt;5.3.8-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215089" version="1" comment="php53-intl is &lt;5.3.8-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215090" version="1" comment="php53-json is &lt;5.3.8-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215091" version="1" comment="php53-ldap is &lt;5.3.8-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215092" version="1" comment="php53-mbstring is &lt;5.3.8-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215093" version="1" comment="php53-mcrypt is &lt;5.3.8-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215094" version="1" comment="php53-mysql is &lt;5.3.8-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215095" version="1" comment="php53-odbc is &lt;5.3.8-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215096" version="1" comment="php53-openssl is &lt;5.3.8-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215097" version="1" comment="php53-pcntl is &lt;5.3.8-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215098" version="1" comment="php53-pdo is &lt;5.3.8-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215099" version="1" comment="php53-pear is &lt;5.3.8-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215100" version="1" comment="php53-pgsql is &lt;5.3.8-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215101" version="1" comment="php53-pspell is &lt;5.3.8-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215102" version="1" comment="php53-shmop is &lt;5.3.8-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215103" version="1" comment="php53-snmp is &lt;5.3.8-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215104" version="1" comment="php53-soap is &lt;5.3.8-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215105" version="1" comment="php53-suhosin is &lt;5.3.8-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215106" version="1" comment="php53-sysvmsg is &lt;5.3.8-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215107" version="1" comment="php53-sysvsem is &lt;5.3.8-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215108" version="1" comment="php53-sysvshm is &lt;5.3.8-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215109" version="1" comment="php53-tokenizer is &lt;5.3.8-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215110" version="1" comment="php53-wddx is &lt;5.3.8-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215111" version="1" comment="php53-xmlreader is &lt;5.3.8-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215112" version="1" comment="php53-xmlrpc is &lt;5.3.8-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215113" version="1" comment="php53-xmlwriter is &lt;5.3.8-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215114" version="1" comment="php53-xsl is &lt;5.3.8-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215115" version="1" comment="php53-zip is &lt;5.3.8-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215116" version="1" comment="php53-zlib is &lt;5.3.8-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215117" version="1" comment="apache2-mod_php53 is &lt;5.3.17-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215118" version="1" comment="php53 is &lt;5.3.17-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215119" version="1" comment="php53-bcmath is &lt;5.3.17-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215120" version="1" comment="php53-bz2 is &lt;5.3.17-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215121" version="1" comment="php53-calendar is &lt;5.3.17-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215122" version="1" comment="php53-ctype is &lt;5.3.17-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215123" version="1" comment="php53-curl is &lt;5.3.17-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215124" version="1" comment="php53-dba is &lt;5.3.17-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215125" version="1" comment="php53-dom is &lt;5.3.17-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215126" version="1" comment="php53-exif is &lt;5.3.17-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215127" version="1" comment="php53-fastcgi is &lt;5.3.17-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215128" version="1" comment="php53-fileinfo is &lt;5.3.17-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215129" version="1" comment="php53-ftp is &lt;5.3.17-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215130" version="1" comment="php53-gd is &lt;5.3.17-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215131" version="1" comment="php53-gettext is &lt;5.3.17-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215132" version="1" comment="php53-gmp is &lt;5.3.17-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215133" version="1" comment="php53-iconv is &lt;5.3.17-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215134" version="1" comment="php53-intl is &lt;5.3.17-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215135" version="1" comment="php53-json is &lt;5.3.17-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215136" version="1" comment="php53-ldap is &lt;5.3.17-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215137" version="1" comment="php53-mbstring is &lt;5.3.17-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215138" version="1" comment="php53-mcrypt is &lt;5.3.17-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215139" version="1" comment="php53-mysql is &lt;5.3.17-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215140" version="1" comment="php53-odbc is &lt;5.3.17-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215141" version="1" comment="php53-openssl is &lt;5.3.17-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215142" version="1" comment="php53-pcntl is &lt;5.3.17-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215143" version="1" comment="php53-pdo is &lt;5.3.17-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215144" version="1" comment="php53-pear is &lt;5.3.17-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215145" version="1" comment="php53-pgsql is &lt;5.3.17-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215146" version="1" comment="php53-pspell is &lt;5.3.17-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215147" version="1" comment="php53-shmop is &lt;5.3.17-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215148" version="1" comment="php53-snmp is &lt;5.3.17-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215149" version="1" comment="php53-soap is &lt;5.3.17-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215150" version="1" comment="php53-suhosin is &lt;5.3.17-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215151" version="1" comment="php53-sysvmsg is &lt;5.3.17-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215152" version="1" comment="php53-sysvsem is &lt;5.3.17-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215153" version="1" comment="php53-sysvshm is &lt;5.3.17-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215154" version="1" comment="php53-tokenizer is &lt;5.3.17-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215155" version="1" comment="php53-wddx is &lt;5.3.17-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215156" version="1" comment="php53-xmlreader is &lt;5.3.17-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215157" version="1" comment="php53-xmlrpc is &lt;5.3.17-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215158" version="1" comment="php53-xmlwriter is &lt;5.3.17-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215159" version="1" comment="php53-xsl is &lt;5.3.17-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215160" version="1" comment="php53-zip is &lt;5.3.17-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215161" version="1" comment="php53-zlib is &lt;5.3.17-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215162" version="1" comment="php53-devel is &lt;5.3.17-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215163" version="1" comment="php53-imap is &lt;5.3.17-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215164" version="1" comment="php53-posix is &lt;5.3.17-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215165" version="1" comment="php53-readline is &lt;5.3.17-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215166" version="1" comment="php53-sockets is &lt;5.3.17-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215167" version="1" comment="php53-sqlite is &lt;5.3.17-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215168" version="1" comment="php53-tidy is &lt;5.3.17-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215169" version="1" comment="glibc is &lt;2.11.3-17.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215170" version="1" comment="glibc-32bit is &lt;2.11.3-17.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215171" version="1" comment="glibc-devel is &lt;2.11.3-17.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215172" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215173" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215174" version="1" comment="glibc-locale is &lt;2.11.3-17.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215175" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215176" version="1" comment="nscd is &lt;2.11.3-17.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215401" version="1" comment="bash is &lt;3.2-147.14.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215402" version="1" comment="bash-doc is &lt;3.2-147.14.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215403" version="1" comment="libreadline5 is &lt;5.2-147.14.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215404" version="1" comment="libreadline5-32bit is &lt;5.2-147.14.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215405" version="1" comment="readline-doc is &lt;5.2-147.14.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215177" version="1" comment="glibc-html is &lt;2.11.3-17.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215178" version="1" comment="glibc-info is &lt;2.11.3-17.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215179" version="1" comment="glibc-profile is &lt;2.11.3-17.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215180" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215181" version="1" comment="flash-player is &lt;11.2.202.335-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215182" version="1" comment="flash-player-gnome is &lt;11.2.202.335-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215183" version="1" comment="flash-player-kde4 is &lt;11.2.202.335-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215184" version="1" comment="flash-player is &lt;11.2.202.341-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215185" version="1" comment="flash-player-gnome is &lt;11.2.202.341-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215186" version="1" comment="flash-player-kde4 is &lt;11.2.202.341-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215187" version="1" comment="flash-player is &lt;11.2.202.346-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215188" version="1" comment="flash-player-gnome is &lt;11.2.202.346-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215189" version="1" comment="flash-player-kde4 is &lt;11.2.202.346-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215190" version="1" comment="flash-player is &lt;11.2.202.350-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215191" version="1" comment="flash-player-gnome is &lt;11.2.202.350-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215192" version="1" comment="flash-player-kde4 is &lt;11.2.202.350-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215193" version="1" comment="flash-player is &lt;11.2.202.359-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215194" version="1" comment="flash-player-gnome is &lt;11.2.202.359-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215195" version="1" comment="flash-player-kde4 is &lt;11.2.202.359-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215196" version="1" comment="flash-player is &lt;11.2.202.356-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215197" version="1" comment="flash-player-gnome is &lt;11.2.202.356-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215198" version="1" comment="flash-player-kde4 is &lt;11.2.202.356-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215199" version="1" comment="flash-player is &lt;11.2.202.378-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215200" version="1" comment="flash-player-gnome is &lt;11.2.202.378-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215201" version="1" comment="flash-player-kde4 is &lt;11.2.202.378-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215202" version="1" comment="flash-player is &lt;11.2.202.394-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215203" version="1" comment="flash-player-gnome is &lt;11.2.202.394-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215204" version="1" comment="flash-player-kde4 is &lt;11.2.202.394-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215205" version="1" comment="flash-player is &lt;11.2.202.400-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215206" version="1" comment="flash-player-gnome is &lt;11.2.202.400-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215207" version="1" comment="flash-player-kde4 is &lt;11.2.202.400-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215208" version="1" comment="flash-player is &lt;11.2.202.406-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215209" version="1" comment="flash-player-gnome is &lt;11.2.202.406-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215210" version="1" comment="flash-player-kde4 is &lt;11.2.202.406-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215211" version="1" comment="flash-player is &lt;11.2.202.411-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215212" version="1" comment="flash-player-gnome is &lt;11.2.202.411-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215213" version="1" comment="flash-player-kde4 is &lt;11.2.202.411-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215214" version="1" comment="flash-player is &lt;11.2.202.425-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215215" version="1" comment="flash-player-gnome is &lt;11.2.202.425-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215216" version="1" comment="flash-player-kde4 is &lt;11.2.202.425-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215217" version="1" comment="bind is &lt;9.6ESVR11W1-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215218" version="1" comment="bind-chrootenv is &lt;9.6ESVR11W1-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215219" version="1" comment="bind-doc is &lt;9.6ESVR11W1-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215220" version="1" comment="bind-libs is &lt;9.6ESVR11W1-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215221" version="1" comment="bind-libs-32bit is &lt;9.6ESVR11W1-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215222" version="1" comment="bind-utils is &lt;9.6ESVR11W1-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250740" version="1" comment="bind is &lt;9.6ESVR10P2-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250741" version="1" comment="bind-chrootenv is &lt;9.6ESVR10P2-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250742" version="1" comment="bind-doc is &lt;9.6ESVR10P2-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250743" version="1" comment="bind-libs is &lt;9.6ESVR10P2-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250745" version="1" comment="bind-utils is &lt;9.6ESVR10P2-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215223" version="1" comment="ImageMagick is &lt;6.4.3.6-7.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215224" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215225" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215226" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215227" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215228" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215229" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215230" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215231" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250746" version="1" comment="openswan is &lt;2.6.16-1.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250747" version="1" comment="openswan-doc is &lt;2.6.16-1.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215232" version="1" comment="file is &lt;4.24-43.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215233" version="1" comment="file-32bit is &lt;4.24-43.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215234" version="1" comment="file-devel is &lt;4.24-43.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215235" version="1" comment="python-magic is &lt;4.24-43.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215236" version="1" comment="wireshark is &lt;1.8.13-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215237" version="1" comment="wireshark-devel is &lt;1.8.13-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215238" version="1" comment="libsnmp15 is &lt;5.4.2.1-8.12.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215239" version="1" comment="libsnmp15-32bit is &lt;5.4.2.1-8.12.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215240" version="1" comment="net-snmp is &lt;5.4.2.1-8.12.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215241" version="1" comment="perl-SNMP is &lt;5.4.2.1-8.12.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215242" version="1" comment="snmp-mibs is &lt;5.4.2.1-8.12.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215243" version="1" comment="net-snmp-devel is &lt;5.4.2.1-8.12.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215244" version="1" comment="strongswan is &lt;4.4.0-6.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215245" version="1" comment="strongswan-doc is &lt;4.4.0-6.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215246" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.65-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215247" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.65-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215248" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.65-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215249" version="1" comment="kernel-default is &lt;3.0.101-0.7.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215250" version="1" comment="kernel-default-base is &lt;3.0.101-0.7.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215251" version="1" comment="kernel-default-devel is &lt;3.0.101-0.7.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215255" version="1" comment="kernel-source is &lt;3.0.101-0.7.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215256" version="1" comment="kernel-syms is &lt;3.0.101-0.7.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215257" version="1" comment="kernel-trace is &lt;3.0.101-0.7.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215258" version="1" comment="kernel-trace-base is &lt;3.0.101-0.7.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215259" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.7.21" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215265" version="1" comment="gnutls is &lt;2.4.1-24.39.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215267" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215269" version="1" comment="dbus-1 is &lt;1.2.10-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215270" version="1" comment="dbus-1-32bit is &lt;1.2.10-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215271" version="1" comment="dbus-1-x11 is &lt;1.2.10-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215272" version="1" comment="dbus-1-devel is &lt;1.2.10-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215273" version="1" comment="dbus-1-devel-doc is &lt;1.2.10-3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215274" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215275" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215276" version="1" comment="openssl is &lt;0.9.8j-0.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215277" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215278" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215279" version="1" comment="openssl-doc is &lt;0.9.8j-0.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215280" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215281" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215282" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215283" version="1" comment="openssl1 is &lt;1.0.1g-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215284" version="1" comment="openssl1-doc is &lt;1.0.1g-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215285" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250748" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250749" version="1" comment="php5 is &lt;5.2.14-0.7.30.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250750" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250751" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250752" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250753" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250754" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250755" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250756" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250757" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250758" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250759" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250760" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250761" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250762" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250763" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250764" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250765" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250766" version="1" comment="php5-json is &lt;5.2.14-0.7.30.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250767" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250768" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250769" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250770" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250771" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250772" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250773" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250774" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250775" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250776" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250777" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250778" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250779" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250780" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250781" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250782" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250783" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250784" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250785" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250786" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250787" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250788" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250789" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250790" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250791" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250792" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215286" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.75-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215287" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.75-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215288" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.75-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215289" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215290" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215291" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215292" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215293" version="1" comment="openssl is &lt;0.9.8j-0.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215294" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215295" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215296" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215297" version="1" comment="openssl-doc is &lt;0.9.8j-0.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264506" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215298" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215299" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215300" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264507" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215301" version="1" comment="openssl1 is &lt;1.0.1g-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215302" version="1" comment="openssl1-doc is &lt;1.0.1g-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215303" version="1" comment="subversion is &lt;1.6.17-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215304" version="1" comment="subversion-devel is &lt;1.6.17-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215305" version="1" comment="subversion-perl is &lt;1.6.17-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215306" version="1" comment="subversion-python is &lt;1.6.17-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215307" version="1" comment="subversion-server is &lt;1.6.17-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215308" version="1" comment="subversion-tools is &lt;1.6.17-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250793" version="1" comment="curl is &lt;7.19.7-1.20.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250794" version="1" comment="libcurl4 is &lt;7.19.7-1.20.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250795" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.20.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250796" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250797" version="1" comment="php5 is &lt;5.2.14-0.7.30.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250798" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250799" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250800" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250801" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250802" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250803" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250804" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250805" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250806" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250807" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250808" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250809" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250810" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250811" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250812" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250813" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250814" version="1" comment="php5-json is &lt;5.2.14-0.7.30.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250815" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250816" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250817" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250818" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250819" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250820" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250821" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250822" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250823" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250824" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250825" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250826" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250827" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250828" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250829" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250830" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250831" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250832" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250833" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250834" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250835" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250836" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250837" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250838" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250839" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250840" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215309" version="1" comment="libpurple-meanwhile is &lt;2.6.6-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215310" version="1" comment="libpurple-tcl is &lt;2.6.6-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009057984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215311" version="1" comment="glibc is &lt;2.11.3-17.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215312" version="1" comment="glibc-32bit is &lt;2.11.3-17.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215313" version="1" comment="glibc-devel is &lt;2.11.3-17.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215314" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215315" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215316" version="1" comment="glibc-locale is &lt;2.11.3-17.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215317" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215318" version="1" comment="nscd is &lt;2.11.3-17.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250841" version="1" comment="glibc is &lt;2.11.1-0.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250842" version="1" comment="glibc-32bit is &lt;2.11.1-0.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250843" version="1" comment="glibc-devel is &lt;2.11.1-0.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250844" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250845" version="1" comment="glibc-html is &lt;2.11.1-0.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250846" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250847" version="1" comment="glibc-info is &lt;2.11.1-0.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250848" version="1" comment="glibc-locale is &lt;2.11.1-0.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250849" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250850" version="1" comment="glibc-profile is &lt;2.11.1-0.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250851" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250852" version="1" comment="nscd is &lt;2.11.1-0.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215319" version="1" comment="glibc-html is &lt;2.11.3-17.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215320" version="1" comment="glibc-info is &lt;2.11.3-17.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215321" version="1" comment="glibc-profile is &lt;2.11.3-17.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215322" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250853" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250854" version="1" comment="php5 is &lt;5.2.14-0.7.30.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250855" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250856" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250857" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250858" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250859" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250860" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250861" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250862" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250863" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250864" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250865" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250866" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250867" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250868" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250869" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250870" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250871" version="1" comment="php5-json is &lt;5.2.14-0.7.30.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250872" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250873" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250874" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250875" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250876" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250877" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250878" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250879" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250880" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250881" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250882" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250883" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250884" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250885" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250886" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250887" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250888" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250889" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250890" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250891" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250892" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250893" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250894" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250895" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250896" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250897" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215323" version="1" comment="apache2-mod_php53 is &lt;5.3.17-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215324" version="1" comment="php53 is &lt;5.3.17-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215325" version="1" comment="php53-bcmath is &lt;5.3.17-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215326" version="1" comment="php53-bz2 is &lt;5.3.17-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215327" version="1" comment="php53-calendar is &lt;5.3.17-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215328" version="1" comment="php53-ctype is &lt;5.3.17-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215329" version="1" comment="php53-curl is &lt;5.3.17-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215330" version="1" comment="php53-dba is &lt;5.3.17-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215331" version="1" comment="php53-dom is &lt;5.3.17-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215332" version="1" comment="php53-exif is &lt;5.3.17-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215333" version="1" comment="php53-fastcgi is &lt;5.3.17-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215334" version="1" comment="php53-fileinfo is &lt;5.3.17-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215335" version="1" comment="php53-ftp is &lt;5.3.17-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215336" version="1" comment="php53-gd is &lt;5.3.17-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215337" version="1" comment="php53-gettext is &lt;5.3.17-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215338" version="1" comment="php53-gmp is &lt;5.3.17-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215339" version="1" comment="php53-iconv is &lt;5.3.17-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215340" version="1" comment="php53-intl is &lt;5.3.17-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215341" version="1" comment="php53-json is &lt;5.3.17-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215342" version="1" comment="php53-ldap is &lt;5.3.17-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215343" version="1" comment="php53-mbstring is &lt;5.3.17-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215344" version="1" comment="php53-mcrypt is &lt;5.3.17-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215345" version="1" comment="php53-mysql is &lt;5.3.17-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215346" version="1" comment="php53-odbc is &lt;5.3.17-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215347" version="1" comment="php53-openssl is &lt;5.3.17-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215348" version="1" comment="php53-pcntl is &lt;5.3.17-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215349" version="1" comment="php53-pdo is &lt;5.3.17-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215350" version="1" comment="php53-pear is &lt;5.3.17-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215351" version="1" comment="php53-pgsql is &lt;5.3.17-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215352" version="1" comment="php53-pspell is &lt;5.3.17-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215353" version="1" comment="php53-shmop is &lt;5.3.17-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215354" version="1" comment="php53-snmp is &lt;5.3.17-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215355" version="1" comment="php53-soap is &lt;5.3.17-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215356" version="1" comment="php53-suhosin is &lt;5.3.17-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215357" version="1" comment="php53-sysvmsg is &lt;5.3.17-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215358" version="1" comment="php53-sysvsem is &lt;5.3.17-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215359" version="1" comment="php53-sysvshm is &lt;5.3.17-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215360" version="1" comment="php53-tokenizer is &lt;5.3.17-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215361" version="1" comment="php53-wddx is &lt;5.3.17-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215362" version="1" comment="php53-xmlreader is &lt;5.3.17-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215363" version="1" comment="php53-xmlrpc is &lt;5.3.17-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215364" version="1" comment="php53-xmlwriter is &lt;5.3.17-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215365" version="1" comment="php53-xsl is &lt;5.3.17-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215366" version="1" comment="php53-zip is &lt;5.3.17-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215367" version="1" comment="php53-zlib is &lt;5.3.17-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215368" version="1" comment="php53-devel is &lt;5.3.17-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215369" version="1" comment="php53-imap is &lt;5.3.17-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215370" version="1" comment="php53-posix is &lt;5.3.17-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215371" version="1" comment="php53-readline is &lt;5.3.17-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215372" version="1" comment="php53-sockets is &lt;5.3.17-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215373" version="1" comment="php53-sqlite is &lt;5.3.17-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215374" version="1" comment="php53-tidy is &lt;5.3.17-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215375" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr7.1-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215377" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr7.1-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215376" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr7.1-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215378" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr7.1-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215379" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr7.1-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215380" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215381" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215382" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215383" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215384" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250898" version="1" comment="perl is &lt;5.10.0-64.61.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250900" version="1" comment="perl-base is &lt;5.10.0-64.61.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250901" version="1" comment="perl-doc is &lt;5.10.0-64.61.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215385" version="1" comment="krb5 is &lt;1.6.3-133.49.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215386" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215387" version="1" comment="krb5-client is &lt;1.6.3-133.49.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215388" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215389" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215390" version="1" comment="krb5-doc is &lt;1.6.3-133.49.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215391" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.49.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215392" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.49.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215393" version="1" comment="krb5-server is &lt;1.6.3-133.49.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215394" version="1" comment="krb5-devel is &lt;1.6.3-133.49.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215395" version="1" comment="krb5-devel-32bit is &lt;1.6.3-133.49.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215396" version="1" comment="bash is &lt;3.2-147.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215397" version="1" comment="bash-doc is &lt;3.2-147.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215398" version="1" comment="libreadline5 is &lt;5.2-147.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215399" version="1" comment="libreadline5-32bit is &lt;5.2-147.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215400" version="1" comment="readline-doc is &lt;5.2-147.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215406" version="1" comment="readline-devel is &lt;5.2-147.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215407" version="1" comment="readline-devel-32bit is &lt;5.2-147.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215408" version="1" comment="wireshark is &lt;1.10.10-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215409" version="1" comment="wireshark-devel is &lt;1.10.10-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215410" version="1" comment="kernel-default is &lt;3.0.101-0.47.55" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215411" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.55" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215412" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.55" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215413" version="1" comment="kernel-default-extra is &lt;3.0.101-0.47.55" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264508" version="1" comment="kernel-pae is &lt;3.0.101-0.47.55" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264509" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.55" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264510" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.55" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264511" version="1" comment="kernel-pae-extra is &lt;3.0.101-0.47.55" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215414" version="1" comment="kernel-source is &lt;3.0.101-0.47.55" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215415" version="1" comment="kernel-syms is &lt;3.0.101-0.47.55" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215416" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.55" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215417" version="1" comment="kernel-xen is &lt;3.0.101-0.47.55" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215418" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.55" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215419" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.55" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215420" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.47.55" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215422" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.101_0.47.55-2.28.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264512" version="1" comment="cluster-network-kmp-pae is &lt;1.4_3.0.101_0.47.55-2.28.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215423" version="1" comment="cluster-network-kmp-ppc64 is &lt;1.4_3.0.101_0.47.55-2.28.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215424" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.101_0.47.55-2.28.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233205" version="1" comment="cluster-network-kmp-xen is &lt;1.4_3.0.101_0.47.55-2.28.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215425" version="1" comment="gfs2-kmp-default is &lt;2_3.0.101_0.47.55-0.17.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264513" version="1" comment="gfs2-kmp-pae is &lt;2_3.0.101_0.47.55-0.17.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215426" version="1" comment="gfs2-kmp-ppc64 is &lt;2_3.0.101_0.47.55-0.17.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215427" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.101_0.47.55-0.17.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233206" version="1" comment="gfs2-kmp-xen is &lt;2_3.0.101_0.47.55-0.17.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215428" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.101_0.47.55-0.21.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264514" version="1" comment="ocfs2-kmp-pae is &lt;1.6_3.0.101_0.47.55-0.21.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215429" version="1" comment="ocfs2-kmp-ppc64 is &lt;1.6_3.0.101_0.47.55-0.21.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215430" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.101_0.47.55-0.21.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233207" version="1" comment="ocfs2-kmp-xen is &lt;1.6_3.0.101_0.47.55-0.21.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215431" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.101_rt130_0.33.38-2.28.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215432" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.101_rt130_0.33.38-2.28.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215433" version="1" comment="drbd-kmp-rt is &lt;8.4.4_3.0.101_rt130_0.33.38-0.23.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215434" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.4_3.0.101_rt130_0.33.38-0.23.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215435" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.101_rt130_0.33.38-0.39.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215436" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.101_rt130_0.33.38-0.39.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215437" version="1" comment="kernel-rt is &lt;3.0.101.rt130-0.33.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215438" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-0.33.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215439" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-0.33.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215440" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-0.33.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215441" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-0.33.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215442" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-0.33.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215443" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-0.33.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215444" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-0.33.38" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215445" version="1" comment="lttng-modules-kmp-rt is &lt;2.1.1_3.0.101_rt130_0.33.38-0.12.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215446" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.1.1_3.0.101_rt130_0.33.38-0.12.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215447" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.101_rt130_0.33.38-0.21.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215448" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.101_rt130_0.33.38-0.21.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215449" version="1" comment="ofed-kmp-rt is &lt;1.5.4.1_3.0.101_rt130_0.33.38-0.14.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215450" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.4.1_3.0.101_rt130_0.33.38-0.14.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264515" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.55" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215451" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.55" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215452" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.55" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215453" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.55" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264516" version="1" comment="kernel-ppc64 is &lt;3.0.101-0.47.55" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264517" version="1" comment="kernel-ppc64-base is &lt;3.0.101-0.47.55" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264518" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-0.47.55" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215454" version="1" comment="kernel-trace is &lt;3.0.101-0.47.55" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215455" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.55" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009058820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215456" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215457" version="1" comment="xorg-x11-server is &lt;7.4-27.101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215458" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250902" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.40.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250903" version="1" comment="xorg-x11-server is &lt;7.4-27.40.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250904" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.40.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215459" version="1" comment="xorg-x11-server-sdk is &lt;7.4-27.101" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250905" version="1" comment="openvpn is &lt;2.0.9-143.35.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250906" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.35.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215460" version="1" comment="kernel-default is &lt;2.6.32.59-0.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215461" version="1" comment="kernel-default-base is &lt;2.6.32.59-0.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215462" version="1" comment="kernel-default-devel is &lt;2.6.32.59-0.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215463" version="1" comment="kernel-ec2 is &lt;2.6.32.59-0.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215464" version="1" comment="kernel-ec2-base is &lt;2.6.32.59-0.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215465" version="1" comment="kernel-ec2-devel is &lt;2.6.32.59-0.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215466" version="1" comment="kernel-source is &lt;2.6.32.59-0.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215467" version="1" comment="kernel-syms is &lt;2.6.32.59-0.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215468" version="1" comment="kernel-trace is &lt;2.6.32.59-0.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215469" version="1" comment="kernel-trace-base is &lt;2.6.32.59-0.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215470" version="1" comment="kernel-trace-devel is &lt;2.6.32.59-0.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215471" version="1" comment="kernel-xen is &lt;2.6.32.59-0.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215472" version="1" comment="kernel-xen-base is &lt;2.6.32.59-0.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215473" version="1" comment="kernel-xen-devel is &lt;2.6.32.59-0.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215474" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.59_0.17-0.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215475" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.59_0.17-0.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215476" version="1" comment="kernel-default is &lt;3.0.101-0.7.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215477" version="1" comment="kernel-default-base is &lt;3.0.101-0.7.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215478" version="1" comment="kernel-default-devel is &lt;3.0.101-0.7.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215479" version="1" comment="kernel-ec2 is &lt;3.0.101-0.7.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215480" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.7.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215481" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.7.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215482" version="1" comment="kernel-source is &lt;3.0.101-0.7.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215483" version="1" comment="kernel-syms is &lt;3.0.101-0.7.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215484" version="1" comment="kernel-trace is &lt;3.0.101-0.7.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215485" version="1" comment="kernel-trace-base is &lt;3.0.101-0.7.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215486" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.7.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215487" version="1" comment="kernel-xen is &lt;3.0.101-0.7.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215488" version="1" comment="kernel-xen-base is &lt;3.0.101-0.7.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215489" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.7.27" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215490" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.27-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215491" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.27-0.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215492" version="1" comment="unzip is &lt;6.00-11.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250907" version="1" comment="unzip is &lt;5.52-142.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250908" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250909" version="1" comment="php5 is &lt;5.2.14-0.7.30.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250910" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250911" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250912" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250913" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250914" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250915" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250916" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250917" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250918" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250919" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250920" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250921" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250922" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250923" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250924" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250925" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250926" version="1" comment="php5-json is &lt;5.2.14-0.7.30.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250927" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250928" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250929" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250930" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250931" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250932" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250933" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250934" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250935" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250936" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250937" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250938" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250939" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250940" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250941" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250942" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250943" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250944" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250945" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250946" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250947" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250948" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250949" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250950" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250951" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250952" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215493" version="1" comment="apache2-mod_php53 is &lt;5.3.17-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215494" version="1" comment="php53 is &lt;5.3.17-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215495" version="1" comment="php53-bcmath is &lt;5.3.17-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215496" version="1" comment="php53-bz2 is &lt;5.3.17-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215497" version="1" comment="php53-calendar is &lt;5.3.17-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215498" version="1" comment="php53-ctype is &lt;5.3.17-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215499" version="1" comment="php53-curl is &lt;5.3.17-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215500" version="1" comment="php53-dba is &lt;5.3.17-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215501" version="1" comment="php53-dom is &lt;5.3.17-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215502" version="1" comment="php53-exif is &lt;5.3.17-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215503" version="1" comment="php53-fastcgi is &lt;5.3.17-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215504" version="1" comment="php53-fileinfo is &lt;5.3.17-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215505" version="1" comment="php53-ftp is &lt;5.3.17-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215506" version="1" comment="php53-gd is &lt;5.3.17-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215507" version="1" comment="php53-gettext is &lt;5.3.17-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215508" version="1" comment="php53-gmp is &lt;5.3.17-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215509" version="1" comment="php53-iconv is &lt;5.3.17-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215510" version="1" comment="php53-intl is &lt;5.3.17-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215511" version="1" comment="php53-json is &lt;5.3.17-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215512" version="1" comment="php53-ldap is &lt;5.3.17-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215513" version="1" comment="php53-mbstring is &lt;5.3.17-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215514" version="1" comment="php53-mcrypt is &lt;5.3.17-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215515" version="1" comment="php53-mysql is &lt;5.3.17-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215516" version="1" comment="php53-odbc is &lt;5.3.17-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215517" version="1" comment="php53-openssl is &lt;5.3.17-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215518" version="1" comment="php53-pcntl is &lt;5.3.17-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215519" version="1" comment="php53-pdo is &lt;5.3.17-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215520" version="1" comment="php53-pear is &lt;5.3.17-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215521" version="1" comment="php53-pgsql is &lt;5.3.17-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215522" version="1" comment="php53-pspell is &lt;5.3.17-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215523" version="1" comment="php53-shmop is &lt;5.3.17-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215524" version="1" comment="php53-snmp is &lt;5.3.17-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215525" version="1" comment="php53-soap is &lt;5.3.17-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215526" version="1" comment="php53-suhosin is &lt;5.3.17-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215527" version="1" comment="php53-sysvmsg is &lt;5.3.17-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215528" version="1" comment="php53-sysvsem is &lt;5.3.17-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215529" version="1" comment="php53-sysvshm is &lt;5.3.17-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215530" version="1" comment="php53-tokenizer is &lt;5.3.17-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215531" version="1" comment="php53-wddx is &lt;5.3.17-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215532" version="1" comment="php53-xmlreader is &lt;5.3.17-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215533" version="1" comment="php53-xmlrpc is &lt;5.3.17-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215534" version="1" comment="php53-xmlwriter is &lt;5.3.17-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215535" version="1" comment="php53-xsl is &lt;5.3.17-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215536" version="1" comment="php53-zip is &lt;5.3.17-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215537" version="1" comment="php53-zlib is &lt;5.3.17-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215538" version="1" comment="php53-devel is &lt;5.3.17-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215539" version="1" comment="php53-imap is &lt;5.3.17-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215540" version="1" comment="php53-posix is &lt;5.3.17-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215541" version="1" comment="php53-readline is &lt;5.3.17-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215542" version="1" comment="php53-sockets is &lt;5.3.17-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215543" version="1" comment="php53-sqlite is &lt;5.3.17-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215544" version="1" comment="php53-tidy is &lt;5.3.17-0.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215545" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215546" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215547" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264519" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215548" version="1" comment="openssl1 is &lt;1.0.1g-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215549" version="1" comment="openssl1-doc is &lt;1.0.1g-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215550" version="1" comment="flash-player is &lt;11.2.202.424-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215551" version="1" comment="flash-player-gnome is &lt;11.2.202.424-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215552" version="1" comment="flash-player-kde4 is &lt;11.2.202.424-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250953" version="1" comment="xen is &lt;4.0.3_21548_18-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250954" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250955" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250956" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.54_0.47.TDC-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250957" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.54_0.47.TDC-0.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250958" version="1" comment="xen-libs is &lt;4.0.3_21548_18-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250959" version="1" comment="xen-tools is &lt;4.0.3_21548_18-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250960" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215553" version="1" comment="tcpdump is &lt;3.9.8-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215554" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.3-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264520" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.3-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215555" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.3-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215556" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.3-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215557" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.3-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215558" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.3-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215559" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr8.10-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215560" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr8.10-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215561" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr8.10-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215562" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr8.10-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215563" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr8.10-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215564" version="1" comment="ntp is &lt;4.2.4p8-1.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215565" version="1" comment="ntp-doc is &lt;4.2.4p8-1.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215566" version="1" comment="clamav is &lt;0.98.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215567" version="1" comment="cups is &lt;1.3.9-8.46.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215568" version="1" comment="cups-client is &lt;1.3.9-8.46.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215569" version="1" comment="cups-libs is &lt;1.3.9-8.46.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215570" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.46.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264521" version="1" comment="cups-libs-x86 is &lt;1.3.9-8.46.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215571" version="1" comment="cups-devel is &lt;1.3.9-8.46.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250961" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250962" version="1" comment="php5 is &lt;5.2.14-0.7.30.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250963" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250964" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250965" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250966" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250967" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250968" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250969" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250970" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250971" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250972" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250973" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250974" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250975" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250976" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250977" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250978" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250979" version="1" comment="php5-json is &lt;5.2.14-0.7.30.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250980" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250981" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250982" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250983" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250984" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250985" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250986" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250987" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250988" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250989" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250990" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250991" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250992" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250993" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250994" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250995" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250996" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250997" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250998" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009250999" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251000" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251001" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251002" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251003" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251004" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251005" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215572" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.4-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264522" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.4-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215573" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.4-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215574" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.4-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215576" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.4-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215577" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr9.0-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215578" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr9.0-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215579" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr9.0-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215580" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr9.0-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215581" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215582" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215583" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264523" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215584" version="1" comment="openssl1 is &lt;1.0.1g-0.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215585" version="1" comment="openssl1-doc is &lt;1.0.1g-0.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215586" version="1" comment="glibc is &lt;2.11.3-17.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215587" version="1" comment="glibc-32bit is &lt;2.11.3-17.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215588" version="1" comment="glibc-devel is &lt;2.11.3-17.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215589" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215590" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215591" version="1" comment="glibc-locale is &lt;2.11.3-17.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215592" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215593" version="1" comment="nscd is &lt;2.11.3-17.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215594" version="1" comment="glibc is &lt;2.11.1-0.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215595" version="1" comment="glibc-32bit is &lt;2.11.1-0.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215596" version="1" comment="glibc-devel is &lt;2.11.1-0.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215597" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215598" version="1" comment="glibc-html is &lt;2.11.1-0.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215599" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215600" version="1" comment="glibc-info is &lt;2.11.1-0.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215601" version="1" comment="glibc-locale is &lt;2.11.1-0.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215602" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215603" version="1" comment="glibc-profile is &lt;2.11.1-0.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215604" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215605" version="1" comment="nscd is &lt;2.11.1-0.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215606" version="1" comment="glibc is &lt;2.11.3-17.45.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215607" version="1" comment="glibc-32bit is &lt;2.11.3-17.45.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215608" version="1" comment="glibc-devel is &lt;2.11.3-17.45.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215609" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.45.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215610" version="1" comment="glibc-html is &lt;2.11.3-17.45.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215611" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.45.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215612" version="1" comment="glibc-info is &lt;2.11.3-17.45.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215613" version="1" comment="glibc-locale is &lt;2.11.3-17.45.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215614" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.45.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215615" version="1" comment="glibc-profile is &lt;2.11.3-17.45.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215616" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.45.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215617" version="1" comment="nscd is &lt;2.11.3-17.45.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215618" version="1" comment="glibc-html is &lt;2.11.3-17.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215619" version="1" comment="glibc-info is &lt;2.11.3-17.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264524" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215620" version="1" comment="glibc-profile is &lt;2.11.3-17.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215621" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264525" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264526" version="1" comment="glibc-x86 is &lt;2.11.3-17.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215622" version="1" comment="ldapsmb is &lt;1.34b-12.33.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215623" version="1" comment="libldb1 is &lt;3.6.3-0.33.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215624" version="1" comment="libsmbclient0 is &lt;3.6.3-0.33.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215625" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.33.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215626" version="1" comment="libtalloc2 is &lt;3.6.3-0.33.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215627" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.33.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215628" version="1" comment="libtdb1 is &lt;3.6.3-0.33.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215629" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.33.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215630" version="1" comment="libtevent0 is &lt;3.6.3-0.33.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215631" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.33.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215632" version="1" comment="libwbclient0 is &lt;3.6.3-0.33.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215633" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.33.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215634" version="1" comment="samba is &lt;3.6.3-0.33.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215635" version="1" comment="samba-32bit is &lt;3.6.3-0.33.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215636" version="1" comment="samba-client is &lt;3.6.3-0.33.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215637" version="1" comment="samba-client-32bit is &lt;3.6.3-0.33.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215638" version="1" comment="samba-doc is &lt;3.6.3-0.33.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215639" version="1" comment="samba-krb-printing is &lt;3.6.3-0.33.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215640" version="1" comment="samba-winbind is &lt;3.6.3-0.33.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215641" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.33.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215642" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215643" version="1" comment="xorg-x11-server is &lt;7.4-27.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215644" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251006" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.40.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251007" version="1" comment="xorg-x11-server is &lt;7.4-27.40.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251008" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.40.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215645" version="1" comment="xorg-x11-server-sdk is &lt;7.4-27.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215646" version="1" comment="flash-player is &lt;11.2.202.429-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215647" version="1" comment="flash-player-gnome is &lt;11.2.202.429-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215648" version="1" comment="flash-player-kde4 is &lt;11.2.202.429-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215649" version="1" comment="flash-player is &lt;11.2.202.438-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215650" version="1" comment="flash-player-gnome is &lt;11.2.202.438-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215651" version="1" comment="flash-player-kde4 is &lt;11.2.202.438-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215652" version="1" comment="flash-player is &lt;11.2.202.440-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215653" version="1" comment="flash-player-gnome is &lt;11.2.202.440-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215654" version="1" comment="flash-player-kde4 is &lt;11.2.202.440-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215655" version="1" comment="flash-player is &lt;11.2.202.442-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215656" version="1" comment="flash-player-gnome is &lt;11.2.202.442-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215657" version="1" comment="flash-player-kde4 is &lt;11.2.202.442-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215658" version="1" comment="flash-player is &lt;11.2.202.451-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215659" version="1" comment="flash-player-gnome is &lt;11.2.202.451-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215660" version="1" comment="flash-player-kde4 is &lt;11.2.202.451-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215661" version="1" comment="flash-player is &lt;11.2.202.457-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215662" version="1" comment="flash-player-gnome is &lt;11.2.202.457-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215663" version="1" comment="flash-player-kde4 is &lt;11.2.202.457-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215664" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.75-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215665" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.75-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215666" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.75-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215667" version="1" comment="wireshark is &lt;1.10.12-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215668" version="1" comment="wireshark-devel is &lt;1.10.12-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215669" version="1" comment="MozillaFirefox is &lt;31.5.0esr-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215670" version="1" comment="MozillaFirefox-translations is &lt;31.5.0esr-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215671" version="1" comment="MozillaFirefox is &lt;31.5.0esr-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215672" version="1" comment="MozillaFirefox-translations is &lt;31.5.0esr-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215673" version="1" comment="MozillaFirefox-devel is &lt;31.5.0esr-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215674" version="1" comment="bind-libs is &lt;9.9.6P1-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215675" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215676" version="1" comment="bind-utils is &lt;9.9.6P1-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215677" version="1" comment="bind is &lt;9.9.6P1-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215678" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215679" version="1" comment="bind-doc is &lt;9.9.6P1-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264527" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215680" version="1" comment="bind-devel is &lt;9.9.6P1-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264528" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215681" version="1" comment="kvm is &lt;1.4.2-0.22.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215682" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215683" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215684" version="1" comment="openssl is &lt;0.9.8j-0.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215686" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215687" version="1" comment="openssl-doc is &lt;0.9.8j-0.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264529" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215688" version="1" comment="ntp is &lt;4.2.4p8-1.29.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215689" version="1" comment="ntp-doc is &lt;4.2.4p8-1.29.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251009" version="1" comment="xen is &lt;4.0.3_21548_18-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251010" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251011" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251012" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.54_0.55.TDC-0.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251013" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.54_0.55.TDC-0.17" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251014" version="1" comment="xen-libs is &lt;4.0.3_21548_18-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251015" version="1" comment="xen-tools is &lt;4.0.3_21548_18-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251016" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251017" version="1" comment="mono-core is &lt;2.0.1-1.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251018" version="1" comment="mono-data is &lt;2.0.1-1.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251019" version="1" comment="mono-data-postgresql is &lt;2.0.1-1.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251020" version="1" comment="mono-data-sqlite is &lt;2.0.1-1.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251021" version="1" comment="mono-locale-extras is &lt;2.0.1-1.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251022" version="1" comment="mono-nunit is &lt;2.0.1-1.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251023" version="1" comment="mono-web is &lt;2.0.1-1.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251024" version="1" comment="mono-winforms is &lt;2.0.1-1.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215690" version="1" comment="flash-player is &lt;11.2.202.460-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215691" version="1" comment="flash-player-gnome is &lt;11.2.202.460-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215692" version="1" comment="flash-player-kde4 is &lt;11.2.202.460-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215693" version="1" comment="flash-player is &lt;11.2.202.466-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215694" version="1" comment="flash-player-gnome is &lt;11.2.202.466-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215695" version="1" comment="flash-player-kde4 is &lt;11.2.202.466-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215696" version="1" comment="flash-player is &lt;11.2.202.468-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215697" version="1" comment="flash-player-gnome is &lt;11.2.202.468-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215698" version="1" comment="flash-player-kde4 is &lt;11.2.202.468-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251025" version="1" comment="curl is &lt;7.19.7-1.20.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251026" version="1" comment="libcurl4 is &lt;7.19.7-1.20.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251027" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.20.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215699" version="1" comment="kvm is &lt;1.4.2-0.22.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251028" version="1" comment="kvm is &lt;0.12.5-1.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251029" version="1" comment="xen is &lt;4.0.3_21548_18-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251030" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251031" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251032" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251033" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251034" version="1" comment="xen-libs is &lt;4.0.3_21548_18-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251035" version="1" comment="xen-tools is &lt;4.0.3_21548_18-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251036" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215703" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.29-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215704" version="1" comment="xen-kmp-pae is &lt;4.1.6_08_3.0.101_0.7.29-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215705" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.29-0.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215706" version="1" comment="xen-libs is &lt;4.1.6_08-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215709" version="1" comment="xen-tools-domU is &lt;4.1.6_08-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009059451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251037" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251038" version="1" comment="php5 is &lt;5.2.14-0.7.30.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251039" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251040" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251041" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251042" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251043" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251044" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251045" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251046" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251047" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251048" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251049" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251050" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251051" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251052" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251053" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251054" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251055" version="1" comment="php5-json is &lt;5.2.14-0.7.30.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251056" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251057" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251058" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251059" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251060" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251061" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251062" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251063" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251064" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251065" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251066" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251067" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251068" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251069" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251070" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251071" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251072" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251073" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251074" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251075" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251076" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251077" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251078" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251079" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251080" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251081" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215710" version="1" comment="apache2-mod_php53 is &lt;5.3.17-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215711" version="1" comment="php53 is &lt;5.3.17-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215712" version="1" comment="php53-bcmath is &lt;5.3.17-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215713" version="1" comment="php53-bz2 is &lt;5.3.17-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215714" version="1" comment="php53-calendar is &lt;5.3.17-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215715" version="1" comment="php53-ctype is &lt;5.3.17-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215716" version="1" comment="php53-curl is &lt;5.3.17-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215717" version="1" comment="php53-dba is &lt;5.3.17-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215718" version="1" comment="php53-dom is &lt;5.3.17-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215719" version="1" comment="php53-exif is &lt;5.3.17-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215720" version="1" comment="php53-fastcgi is &lt;5.3.17-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215721" version="1" comment="php53-fileinfo is &lt;5.3.17-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215722" version="1" comment="php53-ftp is &lt;5.3.17-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215723" version="1" comment="php53-gd is &lt;5.3.17-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215724" version="1" comment="php53-gettext is &lt;5.3.17-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215725" version="1" comment="php53-gmp is &lt;5.3.17-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215726" version="1" comment="php53-iconv is &lt;5.3.17-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215727" version="1" comment="php53-intl is &lt;5.3.17-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215728" version="1" comment="php53-json is &lt;5.3.17-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215729" version="1" comment="php53-ldap is &lt;5.3.17-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215730" version="1" comment="php53-mbstring is &lt;5.3.17-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215731" version="1" comment="php53-mcrypt is &lt;5.3.17-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215732" version="1" comment="php53-mysql is &lt;5.3.17-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215733" version="1" comment="php53-odbc is &lt;5.3.17-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215734" version="1" comment="php53-openssl is &lt;5.3.17-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215735" version="1" comment="php53-pcntl is &lt;5.3.17-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215736" version="1" comment="php53-pdo is &lt;5.3.17-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215737" version="1" comment="php53-pear is &lt;5.3.17-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215738" version="1" comment="php53-pgsql is &lt;5.3.17-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215739" version="1" comment="php53-pspell is &lt;5.3.17-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215740" version="1" comment="php53-shmop is &lt;5.3.17-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215741" version="1" comment="php53-snmp is &lt;5.3.17-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215742" version="1" comment="php53-soap is &lt;5.3.17-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215743" version="1" comment="php53-suhosin is &lt;5.3.17-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215744" version="1" comment="php53-sysvmsg is &lt;5.3.17-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215745" version="1" comment="php53-sysvsem is &lt;5.3.17-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215746" version="1" comment="php53-sysvshm is &lt;5.3.17-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215747" version="1" comment="php53-tokenizer is &lt;5.3.17-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215748" version="1" comment="php53-wddx is &lt;5.3.17-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215749" version="1" comment="php53-xmlreader is &lt;5.3.17-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215750" version="1" comment="php53-xmlrpc is &lt;5.3.17-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215751" version="1" comment="php53-xmlwriter is &lt;5.3.17-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215752" version="1" comment="php53-xsl is &lt;5.3.17-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215753" version="1" comment="php53-zip is &lt;5.3.17-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215754" version="1" comment="php53-zlib is &lt;5.3.17-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215755" version="1" comment="php53-devel is &lt;5.3.17-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215756" version="1" comment="php53-imap is &lt;5.3.17-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215757" version="1" comment="php53-posix is &lt;5.3.17-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215758" version="1" comment="php53-readline is &lt;5.3.17-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215759" version="1" comment="php53-sockets is &lt;5.3.17-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215760" version="1" comment="php53-sqlite is &lt;5.3.17-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215761" version="1" comment="php53-tidy is &lt;5.3.17-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251082" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.40.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251083" version="1" comment="xorg-x11-server is &lt;7.4-27.40.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251084" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.40.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215762" version="1" comment="kvm is &lt;1.4.2-0.22.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251085" version="1" comment="xen is &lt;4.0.3_21548_18-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251086" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251087" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251088" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.54_0.59.TDC-0.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251089" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.54_0.59.TDC-0.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251090" version="1" comment="xen-libs is &lt;4.0.3_21548_18-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251091" version="1" comment="xen-tools is &lt;4.0.3_21548_18-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251092" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009067968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215763" version="1" comment="kvm is &lt;0.15.1-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215764" version="1" comment="wireshark is &lt;1.10.14-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215765" version="1" comment="wireshark-devel is &lt;1.10.14-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215766" version="1" comment="libmysql55client18 is &lt;5.5.43-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215767" version="1" comment="libmysql55client18-32bit is &lt;5.5.43-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215768" version="1" comment="libmysql55client_r18 is &lt;5.5.43-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215769" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.43-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215770" version="1" comment="libmysqlclient15 is &lt;5.0.96-0.8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215772" version="1" comment="libmysqlclient_r15 is &lt;5.0.96-0.8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215773" version="1" comment="libmysqlclient_r15-32bit is &lt;5.0.96-0.8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215774" version="1" comment="mysql is &lt;5.5.43-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215775" version="1" comment="mysql-client is &lt;5.5.43-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215776" version="1" comment="mysql is &lt;5.0.96-0.8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215777" version="1" comment="mysql-Max is &lt;5.0.96-0.8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215778" version="1" comment="mysql-client is &lt;5.0.96-0.8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264530" version="1" comment="libmysql55client18-x86 is &lt;5.5.43-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264531" version="1" comment="libmysqlclient15-x86 is &lt;5.0.96-0.8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215780" version="1" comment="mysql-tools is &lt;5.5.43-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264532" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.43-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264533" version="1" comment="libmysqlclient_r15-x86 is &lt;5.0.96-0.8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215781" version="1" comment="strongswan is &lt;4.4.0-6.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215782" version="1" comment="strongswan-doc is &lt;4.4.0-6.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175222" version="1" comment="suse-openstack-cloud-release is ==5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215783" version="1" comment="bind is &lt;9.9.6P1-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215784" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215785" version="1" comment="bind-doc is &lt;9.9.6P1-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215786" version="1" comment="bind-libs is &lt;9.9.6P1-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215787" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215788" version="1" comment="bind-utils is &lt;9.9.6P1-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215789" version="1" comment="crowbar-barclamp-trove is &lt;1.9+git.1473844105.932298f-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215790" version="1" comment="haproxy is &lt;1.5.4-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215791" version="1" comment="haproxy is &lt;1.5.4-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215792" version="1" comment="mongodb is &lt;2.4.3-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215793" version="1" comment="crowbar-barclamp-neutron is &lt;1.9+git.1443859419.95e948a-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215794" version="1" comment="openstack-neutron is &lt;2014.2.4~a0~dev103-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215795" version="1" comment="openstack-neutron-dhcp-agent is &lt;2014.2.4~a0~dev103-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215796" version="1" comment="openstack-neutron-doc is &lt;2014.2.4~a0~dev103-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215797" version="1" comment="openstack-neutron-ha-tool is &lt;2014.2.4~a0~dev103-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215798" version="1" comment="openstack-neutron-ibm-agent is &lt;2014.2.4~a0~dev103-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215799" version="1" comment="openstack-neutron-l3-agent is &lt;2014.2.4~a0~dev103-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215800" version="1" comment="openstack-neutron-lbaas-agent is &lt;2014.2.4~a0~dev103-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215801" version="1" comment="openstack-neutron-linuxbridge-agent is &lt;2014.2.4~a0~dev103-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215802" version="1" comment="openstack-neutron-metadata-agent is &lt;2014.2.4~a0~dev103-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215803" version="1" comment="openstack-neutron-metering-agent is &lt;2014.2.4~a0~dev103-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215804" version="1" comment="openstack-neutron-mlnx-agent is &lt;2014.2.4~a0~dev103-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215805" version="1" comment="openstack-neutron-nec-agent is &lt;2014.2.4~a0~dev103-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215806" version="1" comment="openstack-neutron-nvsd-agent is &lt;2014.2.4~a0~dev103-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215807" version="1" comment="openstack-neutron-openvswitch-agent is &lt;2014.2.4~a0~dev103-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215808" version="1" comment="openstack-neutron-plugin-cisco is &lt;2014.2.4~a0~dev103-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215809" version="1" comment="openstack-neutron-restproxy-agent is &lt;2014.2.4~a0~dev103-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215810" version="1" comment="openstack-neutron-ryu-agent is &lt;2014.2.4~a0~dev103-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215811" version="1" comment="openstack-neutron-server is &lt;2014.2.4~a0~dev103-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215812" version="1" comment="openstack-neutron-vpn-agent is &lt;2014.2.4~a0~dev103-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215813" version="1" comment="python-neutron is &lt;2014.2.4~a0~dev103-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215814" version="1" comment="novnc is &lt;0.4-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215815" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215816" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215817" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215818" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215819" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215820" version="1" comment="openssl is &lt;0.9.8j-0.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215821" version="1" comment="openssl-doc is &lt;0.9.8j-0.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215822" version="1" comment="openstack-ceilometer is &lt;2014.2.4.dev18-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215823" version="1" comment="openstack-ceilometer-agent-central is &lt;2014.2.4.dev18-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215824" version="1" comment="openstack-ceilometer-agent-compute is &lt;2014.2.4.dev18-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215825" version="1" comment="openstack-ceilometer-agent-ipmi is &lt;2014.2.4.dev18-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215826" version="1" comment="openstack-ceilometer-agent-notification is &lt;2014.2.4.dev18-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215827" version="1" comment="openstack-ceilometer-alarm-evaluator is &lt;2014.2.4.dev18-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215828" version="1" comment="openstack-ceilometer-alarm-notifier is &lt;2014.2.4.dev18-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215829" version="1" comment="openstack-ceilometer-api is &lt;2014.2.4.dev18-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215830" version="1" comment="openstack-ceilometer-collector is &lt;2014.2.4.dev18-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215831" version="1" comment="openstack-ceilometer-doc is &lt;2014.2.4.dev18-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215832" version="1" comment="openstack-cinder is &lt;2014.2.4.dev19-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215833" version="1" comment="openstack-cinder-api is &lt;2014.2.4.dev19-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215834" version="1" comment="openstack-cinder-backup is &lt;2014.2.4.dev19-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215835" version="1" comment="openstack-cinder-doc is &lt;2014.2.4.dev19-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215836" version="1" comment="openstack-cinder-scheduler is &lt;2014.2.4.dev19-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215837" version="1" comment="openstack-cinder-volume is &lt;2014.2.4.dev19-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215838" version="1" comment="openstack-glance is &lt;2014.2.4.dev5-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215839" version="1" comment="openstack-glance-doc is &lt;2014.2.4.dev5-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215840" version="1" comment="openstack-heat is &lt;2014.2.4.dev13-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215841" version="1" comment="openstack-heat-api is &lt;2014.2.4.dev13-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215842" version="1" comment="openstack-heat-api-cfn is &lt;2014.2.4.dev13-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215843" version="1" comment="openstack-heat-api-cloudwatch is &lt;2014.2.4.dev13-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215844" version="1" comment="openstack-heat-doc is &lt;2014.2.4.dev13-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215845" version="1" comment="openstack-heat-engine is &lt;2014.2.4.dev13-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215846" version="1" comment="openstack-keystone is &lt;2014.2.4.dev5-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215847" version="1" comment="openstack-keystone-doc is &lt;2014.2.4.dev5-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215848" version="1" comment="openstack-sahara is &lt;2014.2.4.dev3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215849" version="1" comment="openstack-sahara-api is &lt;2014.2.4.dev3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215850" version="1" comment="openstack-sahara-doc is &lt;2014.2.4.dev3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215851" version="1" comment="openstack-sahara-engine is &lt;2014.2.4.dev3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215852" version="1" comment="openstack-suse is &lt;2014.2-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215853" version="1" comment="openstack-suse-sudo is &lt;2014.2-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215854" version="1" comment="python-ceilometer is &lt;2014.2.4.dev18-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215855" version="1" comment="python-cinder is &lt;2014.2.4.dev19-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215856" version="1" comment="python-glance is &lt;2014.2.4.dev5-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215857" version="1" comment="python-heat is &lt;2014.2.4.dev13-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215858" version="1" comment="python-keystone is &lt;2014.2.4.dev5-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215859" version="1" comment="python-oslo.i18n is &lt;1.3.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215860" version="1" comment="python-oslo.utils is &lt;1.4.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215861" version="1" comment="python-oslotest is &lt;1.2.0-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215862" version="1" comment="python-sahara is &lt;2014.2.4.dev3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215863" version="1" comment="python-six is &lt;1.9.0-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215864" version="1" comment="crowbar-barclamp-nova_dashboard is &lt;1.9+git.1443622531.b2b2939-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215865" version="1" comment="openstack-dashboard is &lt;2014.2.4~a0~dev12-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215866" version="1" comment="python-django_openstack_auth is &lt;1.1.7-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215867" version="1" comment="python-horizon is &lt;2014.2.4~a0~dev12-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215868" version="1" comment="openstack-glance is &lt;2014.2.4.juno-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215869" version="1" comment="openstack-glance-doc is &lt;2014.2.4.juno-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215870" version="1" comment="python-glance is &lt;2014.2.4.juno-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215871" version="1" comment="openstack-keystone is &lt;2014.2.4.juno-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215872" version="1" comment="openstack-keystone-doc is &lt;2014.2.4.juno-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215873" version="1" comment="openstack-nova is &lt;2014.2.4.juno-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215874" version="1" comment="openstack-nova-api is &lt;2014.2.4.juno-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215875" version="1" comment="openstack-nova-cells is &lt;2014.2.4.juno-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215876" version="1" comment="openstack-nova-cert is &lt;2014.2.4.juno-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215877" version="1" comment="openstack-nova-compute is &lt;2014.2.4.juno-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215878" version="1" comment="openstack-nova-conductor is &lt;2014.2.4.juno-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215879" version="1" comment="openstack-nova-console is &lt;2014.2.4.juno-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215880" version="1" comment="openstack-nova-consoleauth is &lt;2014.2.4.juno-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215881" version="1" comment="openstack-nova-doc is &lt;2014.2.4.juno-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215882" version="1" comment="openstack-nova-novncproxy is &lt;2014.2.4.juno-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215883" version="1" comment="openstack-nova-objectstore is &lt;2014.2.4.juno-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215884" version="1" comment="openstack-nova-scheduler is &lt;2014.2.4.juno-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215885" version="1" comment="openstack-nova-serialproxy is &lt;2014.2.4.juno-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215886" version="1" comment="openstack-nova-vncproxy is &lt;2014.2.4.juno-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215887" version="1" comment="openstack-swift is &lt;2.1.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215888" version="1" comment="openstack-swift-account is &lt;2.1.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215889" version="1" comment="openstack-swift-container is &lt;2.1.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215890" version="1" comment="openstack-swift-doc is &lt;2.1.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215891" version="1" comment="openstack-swift-object is &lt;2.1.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215892" version="1" comment="openstack-swift-proxy is &lt;2.1.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215893" version="1" comment="python-keystone is &lt;2014.2.4.juno-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215894" version="1" comment="python-nova is &lt;2014.2.4.juno-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215895" version="1" comment="python-swift is &lt;2.1.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215896" version="1" comment="openstack-nova is &lt;2014.2.4~a0~dev80-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215897" version="1" comment="openstack-nova-api is &lt;2014.2.4~a0~dev80-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215898" version="1" comment="openstack-nova-cells is &lt;2014.2.4~a0~dev80-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215899" version="1" comment="openstack-nova-cert is &lt;2014.2.4~a0~dev80-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215900" version="1" comment="openstack-nova-compute is &lt;2014.2.4~a0~dev80-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215901" version="1" comment="openstack-nova-conductor is &lt;2014.2.4~a0~dev80-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215902" version="1" comment="openstack-nova-console is &lt;2014.2.4~a0~dev80-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215903" version="1" comment="openstack-nova-consoleauth is &lt;2014.2.4~a0~dev80-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215904" version="1" comment="openstack-nova-doc is &lt;2014.2.4~a0~dev80-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215905" version="1" comment="openstack-nova-novncproxy is &lt;2014.2.4~a0~dev80-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215906" version="1" comment="openstack-nova-objectstore is &lt;2014.2.4~a0~dev80-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215907" version="1" comment="openstack-nova-scheduler is &lt;2014.2.4~a0~dev80-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215908" version="1" comment="openstack-nova-serialproxy is &lt;2014.2.4~a0~dev80-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215909" version="1" comment="openstack-nova-vncproxy is &lt;2014.2.4~a0~dev80-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215910" version="1" comment="python-nova is &lt;2014.2.4~a0~dev80-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215911" version="1" comment="openstack-swift is &lt;2.1.0-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215912" version="1" comment="openstack-swift-account is &lt;2.1.0-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215913" version="1" comment="openstack-swift-container is &lt;2.1.0-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215914" version="1" comment="openstack-swift-doc is &lt;2.1.0-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215915" version="1" comment="openstack-swift-object is &lt;2.1.0-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215916" version="1" comment="openstack-swift-proxy is &lt;2.1.0-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215917" version="1" comment="python-swift is &lt;2.1.0-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215918" version="1" comment="openstack-trove is &lt;2014.2.4.juno-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215919" version="1" comment="openstack-trove-api is &lt;2014.2.4.juno-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215920" version="1" comment="openstack-trove-conductor is &lt;2014.2.4.juno-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215921" version="1" comment="openstack-trove-doc is &lt;2014.2.4.juno-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215922" version="1" comment="openstack-trove-guestagent is &lt;2014.2.4.juno-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215923" version="1" comment="openstack-trove-taskmanager is &lt;2014.2.4.juno-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215924" version="1" comment="python-trove is &lt;2014.2.4.juno-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215925" version="1" comment="python-Django is &lt;1.6.11-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215926" version="1" comment="python-Django is &lt;1.6.11-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009055628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215927" version="1" comment="python-Django is &lt;1.6.11-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215928" version="1" comment="python-Pillow is &lt;2.7.0-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215929" version="1" comment="python-Pillow is &lt;2.7.0-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215930" version="1" comment="python-PyYAML is &lt;3.10-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215931" version="1" comment="python-glanceclient is &lt;0.15.0-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215932" version="1" comment="python-keystoneclient is &lt;1.0.0-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215933" version="1" comment="python-keystoneclient-doc is &lt;1.0.0-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215934" version="1" comment="python-keystonemiddleware is &lt;1.2.0-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215935" version="1" comment="python-novaclient is &lt;2.20.0-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215936" version="1" comment="python-novaclient-doc is &lt;2.20.0-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215937" version="1" comment="python-openstackclient is &lt;0.4.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215938" version="1" comment="python-requests is &lt;2.3.0-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215939" version="1" comment="ruby2.1-rubygem-sprockets-2_11 is &lt;2.11.0-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215940" version="1" comment="ruby2.1-rubygem-actionpack-4_1 is &lt;4.1.9-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215941" version="1" comment="rubygem-actionpack-4_1 is &lt;4.1.9-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215942" version="1" comment="ruby2.1-rubygem-actionview-4_1 is &lt;4.1.9-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215943" version="1" comment="rubygem-actionview-4_1 is &lt;4.1.9-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215944" version="1" comment="ruby2.1-rubygem-actionview-4_1 is &lt;4.1.9-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215945" version="1" comment="rubygem-actionview-4_1 is &lt;4.1.9-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215946" version="1" comment="ruby2.1-rubygem-activemodel-4_1 is &lt;4.1.9-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215947" version="1" comment="rubygem-activemodel-4_1 is &lt;4.1.9-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215948" version="1" comment="ruby2.1-rubygem-activerecord-4_1 is &lt;4.1.9-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215949" version="1" comment="rubygem-activerecord-4_1 is &lt;4.1.9-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215950" version="1" comment="ruby2.1-rubygem-activesupport-4_1 is &lt;4.1.9-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215951" version="1" comment="rubygem-activesupport-4_1 is &lt;4.1.9-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215952" version="1" comment="ruby2.1-rubygem-activesupport-4_1 is &lt;4.1.9-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215953" version="1" comment="rubygem-activesupport-4_1 is &lt;4.1.9-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215954" version="1" comment="ruby2.1-rubygem-activesupport-4_1 is &lt;4.1.9-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215955" version="1" comment="rubygem-activesupport-4_1 is &lt;4.1.9-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215956" version="1" comment="ruby2.1-rubygem-bson-1_11 is &lt;1.11.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215957" version="1" comment="ruby2.1-rubygem-easy_diff is &lt;0.0.5-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215958" version="1" comment="ruby2.1-rubygem-redcarpet is &lt;3.2.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215959" version="1" comment="ruby2.1-rubygem-sprockets-2_11 is &lt;2.11.3-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215960" version="1" comment="rubygem-bson-1_11 is &lt;1.11.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215961" version="1" comment="rubygem-easy_diff is &lt;0.0.5-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215962" version="1" comment="rubygem-redcarpet is &lt;3.2.3-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215963" version="1" comment="rubygem-sprockets-2_11 is &lt;2.11.3-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215964" version="1" comment="ruby2.1-rubygem-rack is &lt;1.5.2-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009215965" version="1" comment="rubygem-rack is &lt;1.5.2-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009060409"/>
	</rpminfo_test>
</tests>
<objects>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-md-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dlm-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-ha-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>corosync</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>corosync-qdevice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>corosync-qnetd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>corosync-testagents</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcfg6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcmap4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcorosync-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcorosync_common4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcpg4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquorum5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsam4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtotem_pg5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvotequorum8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>haproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpacemaker-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpacemaker3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker-cts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker-remote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-actionpack-5_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-actionview-5_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-loofah</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-nokogiri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-rack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-rails-html-sanitizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-railties-5_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-activejob-5_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-sprockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aaa_base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aaa_base-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-module-basesystem-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>alsa-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasound2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasound2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-httpclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-abstractions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-parser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-parser-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-profiles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-utils-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_apparmor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_apparmor-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-apparmor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-apparmor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-util-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaudit1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaudit1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libauparse0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>augeas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>augeas-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>augeas-lenses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaugeas0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>autofs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>automake</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>m4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-howl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-mDNSResponder-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-client3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-common3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-core7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns_sd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhowl0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreadline7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>readline-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>readline-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbind9-160</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns169</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libirs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libirs160</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libisc166</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libisccc160</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libisccfg160</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblwres160</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-bind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>c-ares-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcares2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo-gobject2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo-script-interpreter2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcephfs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcephfs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librados-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librados2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libradosstriper-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libradosstriper1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librbd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librbd1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librgw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librgw2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-cephfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-rados</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-rbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-rgw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rados-objclass-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chrony</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cifs-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cifs-utils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamav</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamav-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libclamav7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libclammspack0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>conntrack-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreutils-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio-mt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cracklib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cracklib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cracklib-dict-small</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcrack2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcrack2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cronie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcups2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcupscgi1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcupsimage2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcupsmime1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcupsppdc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-crammd5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-crammd5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-digestmd5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-digestmd5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-gssapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-gssapi-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-otp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-plain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-plain-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-saslauthd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsasl2-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsasl2-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdbus-1-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdbus-1-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib-tool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnsmasq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dracut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dracut-fips</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dracut-ima</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dstat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ecryptfs-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ecryptfs-utils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecryptfs1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elfutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elfutils-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl-plugins-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-nox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>etags</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>enscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>expat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fetchmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-magic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmagic1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmagic1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firewall-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firewalld</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firewalld-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-firewall</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC++6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreetype6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreetype6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfuse2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libulockmgr1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-query-loaders</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-thumbnailer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdk_pixbuf-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GdkPixbuf-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-loader-rsvg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>giflib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgif7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglib-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglib-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmodule-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmodule-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgobject-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgobject-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgthread-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-i18ndata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-profile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nscd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls30</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutlsxx-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutlsxx28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpgme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpgme-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpgme11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpgmepp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpgmepp6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqgpgme-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqgpgme7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphite2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgraphite2-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgraphite2-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grep</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grep-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groff-full</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gxditview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-i386-pc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-snapper-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-systemd-sleep-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstreamer-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtk-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gtk-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hardlink</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip-hpijs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip-sane</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hyper-v</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipsec-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iputils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-10-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-10-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-10-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-10-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kbd-legacy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ucode-amd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-preauth-otp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-preauth-pkinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ldns-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldns2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>less</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFS-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFS6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libHX-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libHX28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libHX28-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libICE-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libICE6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Concurrent-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Concurrent5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Core-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Core-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Core5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5DBus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5DBus-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5DBus5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Gui-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Gui-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Gui5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5KmsSupport-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5KmsSupport-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Network-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Network-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Network5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGL-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGL-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGL5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PlatformHeaders-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PlatformSupport-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PlatformSupport-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PrintSupport-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PrintSupport-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PrintSupport5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Test-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Test-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Test5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Widgets-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Widgets-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Widgets5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Xml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Xml5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-common-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-xcb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-xcb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXRes1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXres-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXcursor-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXcursor1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXdmcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXdmcp6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXext-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXext6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXext6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXinerama-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXinerama1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXp6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXt6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvnc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-Xvnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-Xvnc-novnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86dga-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86dga1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86vm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86vm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86vm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfdisk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfdisk1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmartcols-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmartcols1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux-systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbluetooth3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolord2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcroco</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcroco-0_6-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcroco-0_6-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcroco-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-binding0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-samr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-samr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-krb5pac-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-krb5pac0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-nbt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-nbt0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-standard-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-standard0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-credentials-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-credentials0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-errors-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-errors0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-hostconfig-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-hostconfig0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-passdb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-passdb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-policy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-policy0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-util-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-util0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamdb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamdb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbconf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbconf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbldap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbldap2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent-util-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent-util0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-core-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdmx-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdmx1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevent-2_1-8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevent-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-certs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-certs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-sysinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgd3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstgl-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstphotography-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtk-vnc-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgvnc-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhogweed4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn2-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libipa_hbac-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libipa_hbac0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_certmap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_certmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_idmap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_idmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_nss_idmap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_nss_idmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_simpleifp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_simpleifp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-sssd-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ipa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-krb5-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-wbclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-wbclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjansson-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjansson4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-4_0-18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit2gtk-4_0-37</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit2gtk3-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk-4_0-injected-bundles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjbig-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjbig2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libturbojpeg0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjson-c-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjson-c3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjson-c3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksba-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksba8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-2_4-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-2_4-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ldb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ldb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ldb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ldb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libltdl7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzo2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lzo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lzo-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libminizip1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libz1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libz1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>minizip-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpfr6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpfr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspack-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspack0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libneon-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libneon27</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnewt0_52</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>newt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-newt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2-14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2-14-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2_asio-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2_asio1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnm0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-NM-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liboath0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oath-toolkit-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenjp2-7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-1_1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_1-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_1-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-1_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopus0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpainter0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librfxencode0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xrdp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xrdp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpango-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Pango-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre16-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcrecpp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcrecpp0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcreposix0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-16-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-32-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-8-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcsclite1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcscspy0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-lite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-lite-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-16-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-compat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpolkit0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Polkit-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-cpp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-glib8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler73</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Poppler-0_18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-mainloop-glib0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_7-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython3_6m1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqpdf21</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qpdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qpdf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librrd8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rrdtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rrdtool-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsync-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsync2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libserf-1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libserf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsha1detectcoll-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsha1detectcoll1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmi2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp30</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-SNMP</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>snmp-mibs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-2_4-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-glib-2_0-8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-glib-helper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-gtk-3_0-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-controller0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsqlite3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsqlite3-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsystemd0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsystemd0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-container</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-coredump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-sysvinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtag1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthai-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthai0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-UDisks-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunbound2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound-anchor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunwind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunwind-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvmtools-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvmtools0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbisenc2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbisfile3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpx4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwavpack1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwireshark9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwiretap7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwscodecs1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsutil8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-composite0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-damage0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dpms0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri2-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri3-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-glx0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-glx0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-present0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-present0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-randr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-record0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-render0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-res0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-screensaver0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shape0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shm0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-sync1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-sync1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xf86dri0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xfixes0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xfixes0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xinerama0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xinput0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xkb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xtest0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xv0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xvmc0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxerces-c-3_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxerces-c-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyaml-0-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyaml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzip-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzip5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzmq5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zeromq-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzypp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzypp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzzip-0-13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zziplib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>logrotate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>minicom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>minicom-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutt-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-helpers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn-auth-pam-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opie-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p7zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_krb5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_ssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_ssh-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_yubico</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-ccid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-DBD-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-HTML-Parser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-LWP-Protocol-https</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-XML-LibXML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>policycoreutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>policycoreutils-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>policycoreutils-newrole</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-gdbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-Jinja2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-Jinja2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-bottle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-libxml2-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libxml2-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-numpy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-numpy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-numpy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-numpy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-paramiko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-pip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-pyOpenSSL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pyOpenSSL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-pycrypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pycrypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-pywbem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-requests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-requests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-salt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-salt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-minion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-urllib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-urllib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-dbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>radvd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpcbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsync</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rzsz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>screen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shadow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sharutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sharutils-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squashfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-ipsec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-libs0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysconfig-netconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>syslog-service</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysvinit-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>whois</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar-rmt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tboot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcpdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tpm2.0-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ucode-intel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unixODBC-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>update-alternatives</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-data-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>w3m</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wget</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wpa_supplicant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools-domU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xf86-video-intel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-essentials</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xrdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xscreensaver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xscreensaver-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xscreensaver-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-core-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-users</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yubikey-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zoo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper-log</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>amavisd-new</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>amavisd-new-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-client3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-common3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>axis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>btrfsmaintenance</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libradospp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ceph-argparse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcups2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>g3utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mgetty</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls30-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-powerpc-ieee1275</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-s390x-emu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjq-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjq1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-zfcpdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-Xvnc-module</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcaca-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcaca0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcaca0-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-binding0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-krb5pac0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-nbt0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-standard0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-credentials0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-errors0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-hostconfig0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-passdb0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-policy-python3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-policy0-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-util0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamdb0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbconf0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbldap2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent-util0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhogweed4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-dbus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjansson4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblua5_3-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblua5_3-5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua53</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua53-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo-iterm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo-screen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netpbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liboath-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbcommon-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbcommon-x11-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbcommon-x11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbcommon0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libykcs11-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libykcs11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libykpiv-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libykpiv1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yubico-piv-tool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>patch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Archive-Zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Mail-SpamAssassin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spamassassin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-policycoreutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>powerpc-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-paramiko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>socat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>supportutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysstat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-buildtools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-devtools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-multipath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zsh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper-needs-restarting</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-runc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-module-containers-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-libnetwork</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>runc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman-cni-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++-7_Q16HDRI4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore-7_Q16HDRI6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickWand-7_Q16HDRI6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-module-desktop-applications-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnm-glib-vpn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnm-glib4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnm-util2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-NMClient-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-NetworkManager-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-backend-zypp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-glib2-18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-glib2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-PackageKitGlib-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>accountsservice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>accountsservice-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>accountsservice-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaccountsservice0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-AccountsService-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaudiofile1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-autoipd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bubblewrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>colord-color-profiles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolord-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolord-gtk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolord-gtk1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolorhug2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Colord-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-ColordGtk-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Colorhug-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>conky</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>conky-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-plugin-conky</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-pk-helper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-pk-helper-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eog-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eog-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-djvudocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-dvidocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-pdfdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-psdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-tiffdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-xpsdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevdocument3-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevview3-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-evince</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-EvinceDocument-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-EvinceView-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fetchmailconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firewall-applet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firewall-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flatpak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flatpak-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libflatpak0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Flatpak-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcab-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcab-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcab-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GCab-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-query-loaders-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdk_pixbuf-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdmflexiserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gdm-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring-pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring-pam-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgck-modules-gnome-keyring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-online-accounts-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgoa-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgoa-backend-1_0-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Goa-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-settings-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-settings-daemon-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-settings-daemon-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gst-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstadaptivedemux-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbadallocators-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbadaudio-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbadbase-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbadvideo-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasecamerabinsrc-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstcodecparsers-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstinsertbin-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstmpegts-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstplayer-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsturidownloader-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstwayland-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstBadAllocators-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstGL-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstInsertBin-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstMpegts-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstPlayer-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-tools-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtk-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-chewing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-pinyin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libICE6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIlmImf-2_2-23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIlmImfUtil-2_2-23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openexr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGLExtensions-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-platformtheme-gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL2-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXcursor1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXinerama1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXp6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXt6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvnc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libass-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libass9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavcodec57</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavutil-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavutil55</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpostproc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpostproc54</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswresample-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswresample2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswscale-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswscale4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio++0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libiso9660-10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexempi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexempi3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexiv2-26</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexiv2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgme-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgme0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomesu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomesu-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomesu-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomesu0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgypsy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgypsy0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libimobiledevice-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libimobiledevice6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjbig2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkpathsea6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libptexenc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsynctex1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtexlua52-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtexluajit2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-biber</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-12many</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-2up</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-Asana-Math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-Asana-Math-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ESIEEcv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-FAQ-en</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-GS1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-HA-prosper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-IEEEconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-IEEEtran</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-MemoirChapStyles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-SIstyle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-SIunits</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-Tabbing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-Type1fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-a0poster</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-a2ping</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-a2ping-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-a4wide</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-a5comb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aastex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-abbr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-abc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-abntex2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-abraces</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-abstract</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-abstyles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-academicons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-academicons-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-accanthis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-accanthis-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-accfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-accfonts-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-achemso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-acmart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-acmconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-acro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-acronym</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-acroterm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-active-conf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-actuarialangle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-actuarialsymbol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-addfont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-addlines</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adfathesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adforn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adforn-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adfsymbols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adfsymbols-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adhocfilelist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adhocfilelist-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adjmulticol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adjustbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adobemapping</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adrconv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adtrees</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-advdate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aecc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aeguill</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-afm2pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-afm2pl-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-afparticle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-afthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aguplus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aiaa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aichej</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ajl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-akktex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-akletter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-alegreya</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-alegreya-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aleph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aleph-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-alertmessage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-alg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-algorithm2e</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-algorithmicx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-algorithms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-alkalami</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-alkalami-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-allrunes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-allrunes-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-almfixed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-almfixed-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-alnumsec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-alterqcm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-altfont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ametsoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amiri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amiri-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amsaddr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amscls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amsfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amsfonts-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amslatex-primer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amsldoc-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amsldoc-vn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amsmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amsmath-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amsrefs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amstex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amstex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amsthdoc-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-animate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-anonchap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-anonymouspro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-anonymouspro-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-answers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-antiqua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-antiqua-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-antomega</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-antt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-antt-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-anufinalexam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-anyfontsize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-anysize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aobs-tikz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aomart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-apa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-apa6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-apa6e</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-apacite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-apalike-german</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-apalike2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-apnum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-appendix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-appendixnumberbeamer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-apprends-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-apptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-apxproof</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arabi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arabi-add</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arabi-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arabluatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arabtex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arabtex-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arabxetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aramaic-serto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aramaic-serto-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arara</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arara-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-archaeologie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-archaic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-archaic-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arcs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arev-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arimo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arimo-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-armtex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-armtex-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-around-the-bend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arphic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arphic-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arphic-ttf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arphic-ttf-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arrayjobx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arraysort</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arsclassica</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-articleingud</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arydshln</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-asaetr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-asapsym</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-asapsym-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ascelike</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ascii-chart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ascii-font</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ascii-font-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-asciilist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-askmaps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aspectratio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aspectratio-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-assignment</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-assoccnt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-astro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-asyfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-asymptote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-asymptote-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-asymptote-by-example-zh-cn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-asymptote-faq-zh-cn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-asymptote-manual-zh-cn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-asypictureb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-attachfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aucklandthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-augie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-augie-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-auncial-new</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-auncial-new-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aurical</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aurical-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aurl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-authoraftertitle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-authorindex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-authorindex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-auto-pst-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-autoaligne</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-autoarea</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-autobreak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-automata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-autonum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-autopdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-autosp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-autosp-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-avantgar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-avantgar-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-avremu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-awesomebox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-axodraw2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-b1encoding</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-albanian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-azerbaijani</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-basque</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-belarusian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-bosnian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-breton</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-bulgarian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-catalan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-croatian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-czech</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-danish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-dutch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-english</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-esperanto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-estonian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-finnish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-french</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-friulan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-galician</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-georgian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-german</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-greek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-hebrew</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-hungarian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-icelandic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-indonesian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-interlingua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-irish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-italian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-japanese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-kurmanji</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-latin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-latvian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-macedonian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-malay</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-norsk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-occitan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-piedmontese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-polish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-portuges</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-romanian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-romansh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-russian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-samin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-scottish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-serbian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-serbianc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-slovak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-slovenian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-sorbian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-spanglish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-spanish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-swedish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-thai</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-turkish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-ukrainian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-vietnamese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-welsh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babelbib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-background</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-backnaur</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-baekmuk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-baekmuk-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bagpipe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bangorcsthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bangorexam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bangtex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bankstatement</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-barcodes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bardiag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-barr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bartel-chess-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bashful</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-basicarith</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-baskervald</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-baskervald-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-baskervaldx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-baskervaldx-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-baskervillef</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-baskervillef-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-basque-book</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-basque-date</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bbcard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bbding</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bbm-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bbold</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bbold-type1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bbold-type1-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bchart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bclogo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamer-FUBerlin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamer-tut-pt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamer-verona</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamer2thesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beameraudience</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamercolorthemeowl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamerdarkthemes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamerposter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamersubframe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamerswitch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamertheme-cuerna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamertheme-detlevcm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamertheme-epyt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamertheme-metropolis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamertheme-phnompenh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamertheme-upenn-bc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamerthemejltree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamerthemenirma</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beebe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-begingreek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-begriff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-belleek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-belleek-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bengali</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bera-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-berenisadf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-berenisadf-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-besjournals</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bestpapers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-betababel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beton</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beuron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beuron-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bewerbung</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bez123</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bezos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bgreek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bgteubner</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bguq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bguq-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bhcexam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bib-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibarts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biber</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biber-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibexport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibexport-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibhtml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-abnt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-anonymous</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-apa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-archaeology</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-arthistory-bonn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-bookinarticle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-bookinother</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-bwl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-caspervector</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-cheatsheet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-chem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-chicago</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-claves</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-dw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-fiwi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-gb7714-2015</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-gost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-historian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-ieee</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-ijsra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-iso690</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-juradiss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-lni</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-luh-ipw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-manuscripts-philology</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-mla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-morenames</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-multiple-dm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-musuos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-nature</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-nejm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-nottsclassic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-opcit-booktitle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-oxref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-philosophy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-phys</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-publist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-realauthor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-sbl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-science</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-shortfields</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-source-division</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-subseries</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-swiss-legal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-trad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-true-citepages-omit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibleref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibleref-french</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibleref-german</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibleref-lds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibleref-mouth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibleref-parse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibletext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtex8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtex8-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtexperllibs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtexu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtexu-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtopic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtopicprefix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibunits</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bidi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bidi-atbegshi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bidicontour</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bidihl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bidipagegrid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bidipresentation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bidishadowtext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bigfoot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bigints</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-binarytree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-binomexp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biochemistry-colors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biocon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biolett-bst</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bitelist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bitpattern</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bizcard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-blacklettert1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-blindtext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-blkarray</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-blochsphere</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-block</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-blockdraw_mp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bloques</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-blox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bnumexpr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bodegraph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bohr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-boisik</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-boites</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bold-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-boldtensors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bondgraph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bondgraphs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bookcover</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bookdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bookest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bookhands</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bookhands-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-booklet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bookman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bookman-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-booktabs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-booktabs-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-booktabs-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-boolexpr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-boondox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-boondox-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bophook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-borceux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bosisio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-boxedminipage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-boxedminipage2e</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-boxhandler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bpchem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bpolynomial</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-br-lex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bracketkey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-braids</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-braille</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-braket</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-brandeis-dissertation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-breakcites</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-breakurl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bredzenie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-breqn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bropd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-brushscr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-brushscr-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bullcntr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bundledoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bundledoc-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-burmese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-burmese-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bussproofs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxbase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxcalc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxcjkjatype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxdpx-beamer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxdvidriver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxeepic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxenclose</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxjalipsum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxjaprnind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxjscls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxnewfont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxorigcapt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxpapersize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxpdfver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bytefield</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-c-pascal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-c90</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cabin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cabin-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cachepic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cachepic-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-caladea</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-caladea-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-calcage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-calctab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-calculation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-calculator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-calligra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-calligra-type1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-calligra-type1-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-callouts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-calrsfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cals</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-calxxxx-yyyy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cancel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-canoniclayout</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cantarell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cantarell-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-capt-of</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-captcont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-captdef</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-caption</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-carbohydrates</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-carlisle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-carlito</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-carlito-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-carolmin-ps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-carolmin-ps-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cascadilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cases</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-casyl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-catchfilebetweentags</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-catcodes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-catechis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-catoptions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cbcoptic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cbcoptic-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cbfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cbfonts-fd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cbfonts-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cc-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cc-pl-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ccaption</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ccfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ccicons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ccicons-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cclicenses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cd-cover</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cdpbundl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cellspace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-celtic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-censor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cfr-initials</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cfr-lm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-changebar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-changelayout</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-changepage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-changes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chappg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chapterfolder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-charter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-charter-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chbibref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-checkcites</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-checkcites-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-checklistings</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-checklistings-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chem-journal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chemarrow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chemarrow-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chembst</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chemcompounds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chemcono</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chemexec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chemfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chemformula</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chemgreek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chemmacros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chemnum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chemschemex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chemstyle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cherokee</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chess</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chess-problem-diagrams</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chessboard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chessfss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chextras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chicago</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chicago-annote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chickenize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-childdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chivo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chivo-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chkfloat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chktex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chktex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chletter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chngcntr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chronology</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chronosys</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chscite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-churchslavonic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cinzel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cinzel-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-circ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-circuitikz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-citeall</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cje</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cjhebrew</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cjhebrew-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cjk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cjk-gs-integrate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cjk-gs-integrate-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cjk-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cjkpunct</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cjkutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cjkutils-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-classics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-classicthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-classpack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cleanthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-clearsans</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-clearsans-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-clefval</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cleveref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-clipboard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-clock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cloze</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-clrscode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-clrscode3e</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cm-lgc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cm-lgc-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cm-super</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cm-super-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cm-unicode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cm-unicode-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmarrows</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmbright</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmcyr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmcyr-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmdstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmdtrack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmexb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmexb-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmextra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmll</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmll-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmpica</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmpj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmsd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmtiup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cnbwp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cnltx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cntformats</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cntperchap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cochineal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cochineal-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-codedoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-codepage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-codesection</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-codicefiscaleitaliano</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collcell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collectbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-colordoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-colorinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-coloring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-colorsep</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-colorspace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-colortab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-colortbl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-colorwav</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-colorweb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-colourchange</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-combelow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-combine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-combinedgraphics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-combofont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-comfortaa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-comfortaa-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-comicneue</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-comicneue-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-comma</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-commado</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-commath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-comment</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-compactbib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-complexity</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-components-of-TeX</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-comprehensive</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-computational-complexity</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-concepts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-concmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-concmath-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-concprog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-concrete</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-confproc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-constants</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-conteq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-account</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-algorithmic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-animation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-annotation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-bnf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-chromato</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-cmscbf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-cmttbf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-construction-plan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-cyrillicnumbers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-degrade</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-fancybreak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-filter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-french</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-fullpage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-gantt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-gnuplot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-inifile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-layout</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-letter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-lettrine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-mathsets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-notes-zh-cn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-rst</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-simplefonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-simpleslides</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-title</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-transliterator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-typearea</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-typescripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-vim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-visualcounter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-continue</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-contour</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-contracard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-conv-xkv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-convbkmk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-convbkmk-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cooking</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cooking-units</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cookingsymbols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-coollist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-coolstr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-coolthms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cooltooltips</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-coordsys</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-copyedit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-copyrightbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cormorantgaramond</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cormorantgaramond-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-correctmathalign</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-coseoul</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-countriesofeurope</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-countriesofeurope-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-counttexruns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-courier</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-courier-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-courier-scaled</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-courseoutline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-coursepaper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-coverpage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-covington</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cprotect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cquthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-crbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-crimson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-crimson-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-crop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-crossreference</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-crossrefware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-crossrefware-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-crossword</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-crosswrd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cryptocode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cryst</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cryst-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cs-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-csbulletin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cslatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cslatex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-csplain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-csplain-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-csquotes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-csquotes-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-css-colors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cstex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cstypo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-csvsimple</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctablestack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctan_chk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctanify</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctanify-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctanupload</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctanupload-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctex-faq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctie-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cuisine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-currency</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-currfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-currvita</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cursolatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-curve</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-curve2e</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-curves</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-custom-bib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cutwin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cv4tw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cweb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cweb-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cweb-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cyber</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cybercic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cyklop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cyklop-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cyrillic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cyrillic-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cyrillic-bin-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cyrplain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dad-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dancers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dantelogo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dantelogo-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dashbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dashrule</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dashundergaps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dataref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datatool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dateiliste</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datenumber</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-bahasai</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-basque</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-breton</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-bulgarian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-catalan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-croatian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-czech</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-danish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-dutch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-en-fulltext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-english</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-esperanto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-estonian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-finnish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-french</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-galician</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-german</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-greek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-hebrew</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-icelandic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-irish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-it-fulltext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-italian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-latin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-lsorbian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-magyar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-norsk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-polish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-portuges</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-romanian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-russian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-samin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-scottish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-serbian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-slovak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-slovene</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-spanish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-swedish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-turkish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-ukrainian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-usorbian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-welsh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dblfloatfix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dccpaper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dcpic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-de-macro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-de-macro-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-decimal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-decorule</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dehyph-exptl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dejavu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dejavu-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-delim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-delimseasy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-delimset</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-delimtxt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-denisbdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-detex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-detex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dhua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-diadia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-diadia-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-diagbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-diagmac2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-diagnose</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dialogl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dichokey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dickimaw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dictsym</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dictsym-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-diffcoeff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-digiconfigs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-din1505</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dinat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dinbrief</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dingbat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-directory</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dirtree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dirtytalk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-disser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dithesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dk-bib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dlfltxb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dnaseq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dnp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-doc-pictex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-docbytex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-doclicense</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-docmfp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-docmute</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-docsurvey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-doctools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-documentation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-doi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-doipubmed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dosepsbin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dosepsbin-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dot2texi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dotarrow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dotseqn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dottex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-doublestroke</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-doublestroke-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dowith</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-download</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dozenal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dozenal-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dpfloat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dprogress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-drac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-draftcopy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-draftfigure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-draftwatermark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dramatist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dratex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-drawmatrix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-drawstack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-drm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-drm-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-droid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-droid-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-droit-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-drs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-drv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dsptricks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dtl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dtl-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dtxdescribe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dtxgallery</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dtxgen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dtxgen-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dtxtut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-duerer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-duerer-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-duotenzor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dutchcal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dutchcal-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvdcoll</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvgloss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dviasm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dviasm-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvicopy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvicopy-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvidvi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvidvi-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dviincl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dviinfox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dviinfox-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dviljk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dviljk-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipdfmx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipdfmx-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipng-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipos-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvips</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvips-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipsconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvisvgm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvisvgm-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dynamicnumber</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dynblocks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dyntree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-e-french</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ean</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ean13isbn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-easy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-easy-todo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-easyfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-easyformat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-easylist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-easyreview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ebezier</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ebgaramond</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ebgaramond-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ebgaramond-maths</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ebong</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ebong-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ebook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ebproof</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ebsthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ecc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ecclesiastic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ecgdraw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ecltree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eco</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ecobiblatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-econometrics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-economic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ecv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-edfnotes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-edmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-edmargin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ednotes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eemeir</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eepic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-efbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-egameps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-egplot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eiad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eiad-ltx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eijkhout</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-einfuehrung</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-einfuehrung2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ejpecp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ekaia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-elbioimp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-electrum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-electrum-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eledform</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eledmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-elements</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ellipse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ellipsis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-elmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-elocalloc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-elpres</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-elsarticle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-elteikthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eltex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-elvish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-elzcards</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-emarks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-embedall</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-embrac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-emf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-emisa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-emp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-emptypage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-emulateapj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-enctex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-encxvlna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-endfloat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-endheads</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-endiagram</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-endnotes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-engpron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-engrec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-engtlc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-enigma</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-enotez</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-enumitem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-enumitem-zref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-envbig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-environ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-envlab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epigrafica</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epigrafica-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epigram</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epigraph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epiolmec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epiolmec-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eplain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eplain-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epsdice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epsf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epsf-dvipdfmx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epsincl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epslatex-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epspdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epspdf-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epspdfconversion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epstopdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epstopdf-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eqell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eqlist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eqnalign</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eqname</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eqnarray</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eqparbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-erdc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-erewhon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-erewhon-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-errata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-es-tex-faq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-esami</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-esdiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-esint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-esint-type1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-esint-type1-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-esk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eskd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eskdx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eso-pic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-esrelation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-esrelation-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-esstix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-esstix-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-estcpmm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-esvect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-esvect-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etaremune</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etdipa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etex-pkg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etextools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ethiop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ethiop-t1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ethiop-t1-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etoolbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etoolbox-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-euenc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eukdate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-euler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eulerpx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eulervm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-euro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-euro-ce</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-europasscv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-europecv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eurosym</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eurosym-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-euxm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-everyhook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-everypage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-exam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-exam-n</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-examdesign</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-example</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-examplep</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-exceltex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-exceltex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-excludeonly</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-exercise</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-exercises</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-exp-testopt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-expdlist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-expex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-export</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-expressg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-exsheets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-exsol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-extarrows</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-exteps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-extpfeil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-extract</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-extsizes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-facsimile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-factura</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-facture</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-faktor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancybox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancyhdr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancyhdr-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancylabel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancynum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancypar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancyref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancyslides</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancytabs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancytooltips</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancyvrb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fandol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fandol-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fast-diagram</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fbb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fbb-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fbithesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fbs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fcavtex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fcltxdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fcolumn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fdsymbol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fdsymbol-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-featpost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fei</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fenixpar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fetamont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fetamont-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-feupphdteses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-feyn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-feynmf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-feynmp-auto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ffslides</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fge-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fgruler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fibeamer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fifinddo-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fifo-stack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fig4latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fig4latex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-figbas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-figbas-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-figbib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-figflow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-figsize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-filecontents</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-filecontentsdef</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-filedate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-filehook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fileinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-filemod</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-finbib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-findhyph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-findhyph-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fink</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-finstrut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fira</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fira-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-first-latex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fitbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fithesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fix2col</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fixcmex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fixfoot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fixlatvian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fixltxhyph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fixme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fixmetodonotes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fixpdfmag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fjodor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-flabels</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-flacards</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-flagderiv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-flashcards</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-flashmovie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-flipbook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-flippdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-float</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-floatrow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-flowchart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-flowfram</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fltpoint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fmtcount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fn2end</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fnbreak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fncychap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fncylab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fnpara</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fnpct</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fnspe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fntproof</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fnumprint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-foekfont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-foekfont-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-foilhtml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fonetika</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fonetika-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-font-change</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-font-change-xetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontawesome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontawesome-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontaxes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontbook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontinst</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontinst-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontmfizz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontmfizz-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontname</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontools-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fonts-churchslavonic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fonts-churchslavonic-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fonts-tlwg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fonts-tlwg-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontspec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fonttable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontware-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontwrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-footbib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-footmisc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-footmisx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-footnotebackref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-footnotehyper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-footnoterange</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-footnpag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-forarray</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-foreign</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-forest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-forest-quickstart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-forloop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-formation-latex-ul</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-formlett</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-formular</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fouridx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fourier</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fourier-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fouriernc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fpl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fpl-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fragmaster</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fragmaster-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fragments</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-frame</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-framed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-francais-bst</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-frankenstein</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-frcursive</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-frcursive-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-frederika2016</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-frederika2016-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-frege</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-frletter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-frontespizio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ftcap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ftnxtra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fullblck</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fullminipage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fullwidth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-functan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fundus-calligra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fundus-cyr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fundus-sueterlin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fvextra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fwlw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-g-brief</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gaceta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-galois</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gamebook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-garrigues</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-garuda-c90</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gastex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gatech-thesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gates</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gauss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gb4e</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gcard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gchords</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gcite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gender</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gene-logic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-genealogy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-genealogytree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-genmisc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-genmpage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gentium-tug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gentium-tug-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gentle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-geometry</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-geometry-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-german</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-germbib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-germkorr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-geschichtsfrkl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-getfiledate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-getitems</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-getmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-getmap-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-getoptk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfnotation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfsartemisia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfsartemisia-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfsbaskerville</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfsbaskerville-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfsbodoni</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfsbodoni-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfscomplutum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfscomplutum-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfsdidot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfsdidot-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfsneohellenic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfsneohellenic-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfsporson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfsporson-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfssolomos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfssolomos-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ghab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ghsystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gillcm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gillius</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gillius-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gincltex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ginpenc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gitfile-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gitinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gitinfo2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gitlog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gloss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gloss-occitan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-danish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-dutch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-english</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-french</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-german</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-irish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-italian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-magyar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-polish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-portuges</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-serbian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-spanish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glyphlist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gmdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gmdoc-enhance</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gmiflink</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gmutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gmverb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gmverse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gnu-freefont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gnu-freefont-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gnuplottex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-go</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gobble</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gofonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gofonts-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gothic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gotoh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gradientframe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gradstudentresume</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-grafcet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-grant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-graphbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-graphics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-graphics-cfg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-graphics-def</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-graphics-pln</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-graphicx-psmin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-graphicxbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-graphviz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-grayhints</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-greek-fontenc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-greek-inputenc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-greekdates</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-greektex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-greektonoi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-greenpoint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gregoriotex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gregoriotex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gregoriotex-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-grfpaste</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-grid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-grid-system</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gridset</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-grotesq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-grotesq-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-grundgesetze</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gsemthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gsftopk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gsftopk-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gtl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gtrcrd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gtrlib-largetrees</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-guide-to-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-guitar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-guitarchordschemes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-guitlogo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gustlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gustprog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gzt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-h2020proposal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hacm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hacm-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-halloweenmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-handout</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hands</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hanging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hanoi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-happy4th</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-har2nat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hardwrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-harmony</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-harnon-cv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-harpoon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-harvard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-harveyballs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-harvmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hatching</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hausarbeit-jura</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-havannah</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-he-she</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-helvetic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-helvetic-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hep</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hepnames</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hepparticles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hepthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hepunits</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-here</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-heuristica</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-heuristica-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hexgame</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hf-tikz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hfbright</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hfbright-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hfoldsty</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hhtensor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-histogr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-historische-zeitschrift</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hitec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hletter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hlist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hobby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hobete</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hook-pre-commit-pkg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-horoscop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hpsdiss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hrefhide</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hrlatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hustthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hvfloat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hvindex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hypdvips</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hypernat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyperref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyperref-docsrc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyperxmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyph-utf8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-afrikaans</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-ancientgreek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-arabic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-armenian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-basque</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-belarusian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-bulgarian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-catalan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-chinese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-churchslavonic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-coptic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-croatian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-czech</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-danish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-dutch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-english</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-esperanto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-estonian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-ethiopic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-farsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-finnish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-french</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-friulan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-galician</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-georgian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-german</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-greek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-hungarian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-icelandic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-indic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-indonesian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-interlingua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-irish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-italian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-kurmanji</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-latin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-latvian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-lithuanian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-mongolian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-norwegian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-occitan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-piedmontese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-polish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-portuguese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-romanian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-romansh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-russian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-sanskrit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-serbian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-slovak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-slovenian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-spanish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-swedish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-thai</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-turkish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-turkmen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-ukrainian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-uppersorbian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-welsh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphenat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphenex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyplain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ibycus-babel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ibygrk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ibygrk-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-icsv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-idxcmds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-idxlayout</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ieeepes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ietfbibs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-iffont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifluatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifmslide</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifmtarg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifnextok</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifoddpage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifplatform</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifptex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifsym</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-iftex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifthenx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifxetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-iitem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ijmart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ijqc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ijsra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-imac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-image-gallery</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-imakeidx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-imfellenglish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-imfellenglish-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-impatient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-impatient-cn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-impatient-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-impnattypo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-import</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-imsproc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-imtekda</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-incgraph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-inconsolata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-inconsolata-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-index</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-indextools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-initials</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-initials-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-inlinebib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-inlinedef</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-inputtrc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-insbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-interactiveworkbook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-interchar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-interfaces</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-interpreter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-interval</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-intro-scientific</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-inversepath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-invoice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ionumbers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-iopart-num</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ipaex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ipaex-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ipaex-type1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ipaex-type1-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-iscram</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-iso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-iso10303</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-isodate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-isodoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-isomath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-isonums</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-isorot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-isotope</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-issuulinks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-itnumpar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-iwhdp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-iwona</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-iwona-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jablantile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jacow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jadetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jadetex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jamtimes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-japanese-otf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-japanese-otf-uptex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jknapltx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jlabels</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jlreq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jmlr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jmn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jmn-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jneurosci</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jpsj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-js-misc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jsclasses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jslectureplanner</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jumplines</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-junicode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-junicode-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jura</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-juraabbrev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jurabib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-juramisc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jurarsp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jvlisting</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kantlipsum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-karnaugh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-karnaugh-map</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-karnaughmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kastrup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kdgdocs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kerkis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kerkis-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kerntest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-keycommand</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-keyfloat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-keyreader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-keystroke</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-keyval2e</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-keyvaltable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kixfont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kluwer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-knitting</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-knitting-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-knittingpattern</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-knowledge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-knuth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-knuth-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-knuth-local</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-knuthotherfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-koma-moderncvclassic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-koma-script</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-koma-script-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-koma-script-sfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-komacv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kotex-oblivoir</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kotex-plain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kotex-utf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kotex-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kotex-utils-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kpathsea</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kpathsea-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kpathsea-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kpfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kpfonts-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ksfh_nat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ksp-thesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ktv-texdata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kurier</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kurier-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l2picfaq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l2tabu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l2tabu-english</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l2tabu-french</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l2tabu-italian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l2tabu-spanish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l3build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l3experimental</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l3kernel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l3packages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-labbook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-labels</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-labyrinth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lacheck</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lacheck-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ladder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lambda</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lambda-lists</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-langcode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-langsci</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lapdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lastpackage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lastpage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-bib-ex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-bib2-ex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-bin-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-brochure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-course</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-doc-ptr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-git-log</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-git-log-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-graphics-companion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-make</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-notes-zh-cn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-papersize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-papersize-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-referenz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-tabellen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-tds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-veryshortguide</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-web-companion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex2e-help-texinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex2e-help-texinfo-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex2e-help-texinfo-spanish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex2man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex2man-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex2nemeth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex2nemeth-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex4wp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex4wp-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexbangla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexbug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexcheat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexcheat-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexcheat-esmx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexcheat-ptbr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexcourse-rug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexdemo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexdiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexdiff-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexfileinfo-pkgs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexfileversion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexfileversion-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexgit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexindent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexindent-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexmk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexmk-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexpand</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexpand-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lato</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lato-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-layaureo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-layouts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lazylist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lcd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lcdftypetools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lcdftypetools-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lcg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lcyw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-leading</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-leadsheets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-leaflet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lecturer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ledmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-leftidx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-leipzig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lengthconvert</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lettre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lettrine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-levy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lewis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lexikon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lexref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lfb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lgreek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lhcyr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lhelp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-libertine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-libertine-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-libertinegc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-libertinus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-libertinus-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-libertinust1math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-libertinust1math-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-libgreek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-librarian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-librebaskerville</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-librebaskerville-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-librebodoni</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-librebodoni-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-librecaslon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-librecaslon-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-libris</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-libris-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lilyglyphs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lilyglyphs-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lilyglyphs-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-limap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-linearA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-linearA-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-linegoal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lineno</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ling-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-linguex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-linop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lion-msc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lipsum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lisp-on-tex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listbib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listbib-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listings</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listings-ext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listings-ext-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listlbls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listliketab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listofitems</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listofsymbols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lithuanian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-liturg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lkproof</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lm-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lm-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lm-math-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lmake</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lni</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lobster2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lobster2-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-locality</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-localloc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-logbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-logical-markup-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-logicproof</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-logicpuzzle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-logpap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-logreq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lollipop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lollipop-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-longdivision</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-longfbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-longfigure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-longnamefilelist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-loops</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lpform</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lpic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lplfitch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lroundrect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lsc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-bulgarian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-chinese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-czech</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-dutch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-english</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-estonian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-finnish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-french</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-german</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-italian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-japanese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-korean</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-mongol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-persian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-polish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-portuguese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-russian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-slovak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-slovenian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-spanish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-thai</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-turkish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-ukr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-vietnamese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lstaddons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lstbayes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lt3graph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltablex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltabptch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltb2bib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltxdockit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltxfileinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltxfileinfo-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltximg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltximg-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltxindex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltxkeys</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltxmisc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltxnew</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltxtools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lua-alt-getopt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lua-check-hyphen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lua-visual-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lua2dox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lua2dox-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luabibentry</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luabidi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luacode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luahyphenrules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luaindex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luainputenc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luaintro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lualatex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lualatex-doc-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lualatex-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lualibs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luamesh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luamplib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luaotfload</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luaotfload-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luapackageloader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luasseq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luatex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luatex85</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luatexbase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luatexja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luatexko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luatextra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luatodonotes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luaxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lwarp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lwarp-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lxfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lxfonts-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ly1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-m-tx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-m-tx-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-macros2e</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-macroswap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mafr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-magaz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mailing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mailmerge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-make4ht</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-make4ht-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makebarcode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makebase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makebox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makecell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makecirc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makecmds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makedtx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makedtx-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makeglos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makeindex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makeindex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makeplot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makeshape</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mandi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-manfnt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-manfnt-font</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-manfnt-font-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-manuscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-margbib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-marginfix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-marginnote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-markdown</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-marvosym</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-marvosym-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-matc3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-matc3mem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-match_parens</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-match_parens-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-math-e</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-math-into-latex-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathabx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathabx-type1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathabx-type1-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathalfa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathastext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathcomp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathdesign</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathdesign-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathdots</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathexam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathpartir</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathpazo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathpazo-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathpunctspace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-maths-symbols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathspec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathspic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathspic-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathtools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-matlab-prettifier</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mattens</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-maybemath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mbenotes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mcaption</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mceinleger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mcexam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mcf2graph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mcite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mciteplus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mcmthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mdframed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mdputu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mdsymbol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mdsymbol-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mdwtools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-media9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-medstarbeamer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-meetingmins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-memdesign</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-memexsupp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-memoir</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-memory</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mendex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mentis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-menu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-menukeys</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-merriweather</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-merriweather-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metafont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metafont-beginners</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metafont-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metago</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metalogo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metaobj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metaplot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metapost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metapost-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metapost-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metapost-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metatype1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metauml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-method</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metrix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mf2pt1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mf2pt1-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mfirstuc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mflogo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mflogo-font</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mflogo-font-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mflua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mflua-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mfnfss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mfpic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mfpic4ode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mftinc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mfware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mfware-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mgltex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mhchem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mhequ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-miama</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-miama-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-microtype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-microtype-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-midnight</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-midpage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-miller</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-milog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-minibox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-minidocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-minifp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-minipage-marginpar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-miniplot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-minitoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-minorrevision</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-minted</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mintspirit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mintspirit-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-minutes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-missaali</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-missaali-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mkgrkindex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mkgrkindex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mkjobtexmf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mkjobtexmf-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mkpattern</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mkpic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mkpic-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mla-paper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mlist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mltex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mltex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mnotes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mnras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mnsymbol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mnsymbol-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-moderncv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-moderntimeline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-modiagram</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-modref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-modroman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-modular</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mongolian-babel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-monofill</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-montex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-montex-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-montserrat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-montserrat-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-moodle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-moreenum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-morefloats</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-morehype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-moresize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-moreverb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-morewrites</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-movie15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mp3d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mparhack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mparrows</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mpattern</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mpcolornames</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mpgraphics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mpman-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mpostinl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mptopdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mptopdf-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mptrees</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-msc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-msg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mslapa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-msu-thesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mtgreek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mucproc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mugsthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multenum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multiaudience</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multibbl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multibib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multibibliography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multibibliography-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multicap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multidef</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multido</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multienv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multiexpand</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multiobjective</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multirow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-munich</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-musixguit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-musixtex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-musixtex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-musixtex-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-musixtex-fonts-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-musixtnt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-musixtnt-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-musuos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-muthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mversion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mwcls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mwe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mweights</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mxedruli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mxedruli-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mychemistry</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mycv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mylatexformat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mynsfc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nameauth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-namespc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nanumtype1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nanumtype1-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-natbib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-natded</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nature</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-navigator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-navydocs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ncclatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ncctools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ncntrsbk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ncntrsbk-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nddiss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ndsu-thesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-needspace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nestquot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-neuralnetwork</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nevelok</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newcommand</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newenviron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newlfm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newpx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newpx-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newsletr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newspaper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newtx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newtx-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newtxsf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newtxsf-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newtxtt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newtxtt-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newunicodechar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newvbtm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newverbs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nextpage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nfssext-cfr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nicefilelist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-niceframe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nicetext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nih</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nihbiosketch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nimbus15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nimbus15-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nkarta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nlctdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nmbib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-noconflict</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nodetree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-noindentafter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-noitcrul</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nolbreaks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nomencl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nomentbl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nonfloat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nonumonpart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nopageno</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-norasi-c90</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-normalcolor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nostarch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-notes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-notes2bib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-notespages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-notex-bst</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-noto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-noto-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-notoccite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-novel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-novel-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nowidow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nrc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ntgclass</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ntheorem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ntheorem-vn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nuc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nucleardata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-numberedblock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-numericplots</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-numname</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-numprint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-numspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nwejm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-oberdiek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-objectz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-obnov</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ocg-p</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ocgx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ocgx2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ocherokee</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ocherokee-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ocr-b</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ocr-b-outline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ocr-b-outline-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ocr-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-octavo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-odsfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ofs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ogham</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-oinuit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-oinuit-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-old-arrows</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-old-arrows-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-oldlatin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-oldstandard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-oldstandard-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-oldstyle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-olsak-misc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-omega</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-omega-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-omegaware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-omegaware-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-onlyamsmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-onrannual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-opcit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-opensans</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-opensans-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-oplotsymbl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-opteng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-optidef</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-optional</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-options</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ordinalpt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-orkhun</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-oscola</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ot-tableau</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-othello</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-othelloboard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-otibet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-oubraces</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-outline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-outliner</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-outlines</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-overlays</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-overlock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-overlock-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-overpic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pacioli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-padauk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-padauk-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pagecolor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pagecont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pagenote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pagerange</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pageslts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-palatino</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-palatino-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-paper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-papercdcase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-papermas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-papertex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-paracol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-parades</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-paralist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-parallel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-paratype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-paratype-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-paresse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-parnotes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-parrun</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-parselines</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-parskip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pas-cours</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pas-crosswords</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pas-cv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pas-tableur</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-passivetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-patch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-patchcmd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-patgen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-patgen-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-patgen2-tutorial</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-path</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pauldoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pawpict</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pax</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pax-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pb-diagram</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pbibtex-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pbsheet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdf-trans</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdf14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfbook2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfbook2-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfcomment</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfcprot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfcrop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfcrop-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfjam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfjam-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdflatexpicscale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdflatexpicscale-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfmarginpar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfpagediff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfpages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfscreen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfslide</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfsync</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdftex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdftex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdftex-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdftools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdftools-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdftricks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdftricks2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfwin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfxup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfxup-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pecha</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pedigree-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pedigree-perl-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-perception</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-perfectcut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-perltex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-perltex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-permute</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-persian-bib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-petiteannonce</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-petri-nets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-petri-nets-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pfarrei</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pfarrei-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgf-blur</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgf-soroban</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgf-spectra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgf-umlcd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgf-umlsd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgfgantt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgfkeyx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgfmolbio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgfopts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgfornament</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgfplots</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-phaistos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-phaistos-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-phffullpagefigure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-phfnote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-phfparen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-phfqit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-phfquotetext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-phfsvnwatermark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-phfthm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-philex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-philokalia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-philokalia-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-philosophersimprint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-phonenumbers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-phonetic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-phonrule</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-photo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-physics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-piano</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-picinpar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pict2e</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pictex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pictex2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pictexsum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-piechartmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-piff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pigpen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pigpen-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pinlabel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pitex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pittetd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pkfix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pkfix-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pkfix-helper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pkfix-helper-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pkgloader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pkuthss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pl-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-placeat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-placeins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-placeins-plain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plain-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plainpkg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plantslabels</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plari</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plates</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-platex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-platex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-platex-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-platexcheat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-play</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-playfair</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-playfair-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plipsum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plnfss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plstmary</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plweb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pmgraph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pmx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pmx-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pmxchords</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pmxchords-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pnas2009</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-poemscol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-poetrytex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-polski</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-poltawski</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-poltawski-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-polyglossia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-polynom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-polynomial</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-polytable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-postcards</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-poster-mac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-powerdot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-powerdot-FUBerlin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ppr-prv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pracjourn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-preprint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-prerex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-present</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-presentations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-presentations-en</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pressrelease</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-prettyref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-preview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-prftree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-printlen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-proba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-probsoln</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-procIAGssymp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-prodint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-prodint-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-productbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-program</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-progress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-progressbar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-proofread</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-prooftrees</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-properties</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-proposal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-prosper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-protex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-protocol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-przechlewski-book</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ps2pk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ps2pk-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-psbao</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pseudocode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-psfrag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-psfrag-italian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-psfragx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-psgo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-psizzl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pslatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-psnfss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pspicture</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-2dplot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-3d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-3dplot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-abspos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-am</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-arrow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-asr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-bar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-barcode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-bezier</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-blur</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-bspline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-cie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-circ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-coil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-cox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-dbicons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-diffraction</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-electricfield</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-eps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-eucl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-eucl-translation-bg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-exa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-fill</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-fit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-fr3d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-fractal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-fun</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-func</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-gantt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-geo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-ghsb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-gr3d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-grad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-graphicx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-infixplot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-intersect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-jtree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-knot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-labo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-layout</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-lens</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-light3d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-magneticfield</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-mirror</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-node</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-ob3d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-ode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-optexp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-optic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-osci</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-ovl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-pad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-pdf-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-pdgr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-perspective</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-platon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-plot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-poly</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-pulley</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-qtree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-rubans</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-shell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-sigsys</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-slpe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-solarsystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-solides3d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-soroban</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-spectra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-spinner</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-spirograph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-stru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-support</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-text</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-thick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-tree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-tvz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-uml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-vectorian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-vehicle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-vowel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-vue3d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst2pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst2pdf-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pstool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pstools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pstools-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pstricks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pstricks-add</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pstricks_calcnotes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-psu-thesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptex-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptex-fontmaps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptex-fontmaps-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptex-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptex-fonts-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptex2pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptex2pdf-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptexenc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptptex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-punk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-punk-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-punknova</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-punknova-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-purifyeps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-purifyeps-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxbase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxchfon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxcjkcat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxfonts-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxgreeks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxjahyper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxpgfmark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxrubrica</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxtatescale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxtxalfa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pygmentex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pygmentex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pythonhighlight</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pythontex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pythontex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-qcircuit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-qcm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-qobitree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-qpxqtx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-qrcode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-qstest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-qsymbols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-qtree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-quattrocento</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-quattrocento-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-quicktype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-quotchap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-quoting</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-quotmark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-quran</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-r_und_s</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-raleway</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-raleway-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ran_toks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-randbild</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-randomlist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-randomwalk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-randtext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rccol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rcs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rcs-multi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rcsinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-readarray</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-realboxes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-realscripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rec-thy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-recipe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-recipebook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-recipecard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rectopma</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-recycle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-recycle-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-refcheck</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-refenums</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-reflectgraphics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-refman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-refstyle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-regcount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-regexpatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-register</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-regstats</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-reledmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-relenc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-relsize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-reotex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-repeatindex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-repere</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-repltext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-resphilosophica</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-resumecls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-resumemac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-reverxii</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-revquantum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-revtex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-revtex4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ribbonproofs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rjlparshap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rlepsf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rmathbr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rmpage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-roboto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-roboto-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-robustcommand</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-robustindex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-roex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-romanbar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-romanbarpagenumber</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-romande</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-romande-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-romanneg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-romannum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rosario</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rosario-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rotfloat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rotpages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-roundbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-roundrect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rputover</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rrgtrees</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rsc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rsfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rsfs-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rsfso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rterface</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rtkinenc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rtklage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rubik</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rubik-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ruhyphen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rulercompass</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-russ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rutitlepage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rviewport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rvwrite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ryethesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sa-tikz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sageep</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sanitize-umlaut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sanskrit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sanskrit-t1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sanskrit-t1-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sansmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sansmathaccent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sansmathfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sansmathfonts-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sapthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sasnrdisplay</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sauerj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sauter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sauterfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-savefnmark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-savesym</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-savetrees</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scalebar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scalerel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scanpages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scanpages-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-schemabloc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-schemata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-schule</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-schulschriften</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-schwalbe-chess</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sciposter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sclang-prettifier</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scratch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-screenplay</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-screenplay-pkg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scrjrnl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scrlttr2copy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scsnowman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sdrt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sduthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-secdot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-section</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sectionbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sectsty</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-seealso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-seetexk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-seetexk-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-selectp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-selnolig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-semantic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-semantic-markup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-semaphor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-semaphor-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-seminar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-semioneside</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-semproc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sepfootnotes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sepnum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-seqsplit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-serbian-apostrophe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-serbian-date-lat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-serbian-def-cyr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-serbian-lig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sesamanuel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sesstime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-setdeck</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-setspace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-seuthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-seuthesix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sf298</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sffms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sfg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sfmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sgame</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-shade</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-shadethm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-shadow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-shadowtext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-shapepar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-shapes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-shdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-shipunov</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-shorttoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-show2e</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-showcharinbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-showdim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-showexpl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-showhyphens</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-showlabels</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-showtags</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-shuffle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sidecap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sidenotes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sides</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-signchart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-silence</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-simple-resume-cv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-simple-thesis-dissertation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-simplecd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-simplecv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-simpler-wick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-simplewick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-simplified-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-simurgh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sitem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-siunitx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-skak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-skaknew</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-skaknew-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-skb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-skdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-skeycommand</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-skeyval</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-skmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-skrapport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-skull</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-slantsc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-slideshow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-smalltableof</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-smartdiagram</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-smartref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-smartunits</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-snapshot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-snotez</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-songbook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-songs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sort-by-letters</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-soton</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-soul</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-soup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sourcecodepro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sourcecodepro-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sourcesanspro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sourcesanspro-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sourceserifpro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sourceserifpro-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-spalign</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-spanish-mx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sparklines</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-spath3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-spelling</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sphdthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-spie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-splines</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-splitbib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-splitindex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-splitindex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-spot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-spotcolor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-spreadtab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-spverbatim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sr-vorl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-srbook-mem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-srcltx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-srcredact</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-srcredact-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sseq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sslides</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stackengine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-standalone</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stanli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-starfont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-starfont-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-startex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-statex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-statex2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-statistik</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-staves</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-staves-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stdclsdv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stdpage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-steinmetz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stellenbosch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stix-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stmaryrd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stmaryrd-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-storebox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-storecmd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stringstrings</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-struktex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sttools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stubs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-studenthandouts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sty2dtx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sty2dtx-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-suanpan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subdepth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subeqn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subeqnarray</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subfigmat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subfigure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subfiles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subfloat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-substances</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-substitutefont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-substr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subsupscripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sudoku</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sudokubundle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-suftesi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sugconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-superiors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-superiors-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-supertabular</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-susy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-svg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-svg-inkscape</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-svgcolor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-svn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-svn-multi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-svn-multi-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-svn-prov</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-svninfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-svrsymbols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-svrsymbols-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-swebib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-swimgraf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-syllogism</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-symbol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-symbol-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sympytexpackage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-synctex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-synctex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-synctex-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-synproof</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-syntax</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-syntrace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-synttree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-systeme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-t-angles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-t2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabfigures</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-table-fct</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tableaux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tablefootnote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tableof</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tablestyles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tablists</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tablor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabriz-thesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabstackengine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabto-generic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabto-ltx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabularborder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabularcalc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabularew</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabulars-e</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabulary</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabvar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabvar-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tagging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tagpair</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-talk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tamefloats</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tamethebeast</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tapir</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tapir-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tasks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tcldoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tcolorbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tdclock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tdsfrmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-technics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ted</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-templates-fenn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-templates-sommer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-templatetools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tempora</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tempora-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tengwarscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tensor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-termcal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-termlist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-termmenu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-testhyphens</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-testidx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tetex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-teubner</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-ewd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-font-errors-cheatsheet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-gyre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-gyre-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-gyre-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-gyre-math-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-ini-files</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-label</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-overview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-ps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-refs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-virtual-academy-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex4ebook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex4ebook-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex4ht</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex4ht-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texbytopic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texconfig-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texcount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texcount-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texdef</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texdef-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texdiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texdiff-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texdirflatten</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texdirflatten-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texdoc-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texdraw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texfot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texfot-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texilikechaps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texilikecover</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive-cz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive-en</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive-sr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive-zh-cn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive.infra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texliveonfly</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texliveonfly-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texloganalyser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texloganalyser-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlogos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlua-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texluajit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texmate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texments</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texosquery</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texosquery-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texpower</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texproposal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texshade</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texsis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texsis-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-textcase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-textfit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-textglos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-textgreek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-textmerg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-textopo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-textpath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-textpos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texvc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texware-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tfrupee</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tfrupee-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thaienum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thalie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-theoremref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thesis-ekf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thesis-titlepage-fhac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thinsp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thmbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thmtools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-threadcol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-threeddice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-threeparttable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-threeparttablex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thumb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thumbpdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thumbpdf-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thumbs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thumby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thuthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ticket</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ticollege</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tie-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-3dplot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-bayesnet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-cd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-dependency</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-dimline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-feynman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-inet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-kalender</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-opm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-optics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-page</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-palattice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-qtree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-timing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikzinclude</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikzmark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikzorbital</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikzpagenodes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikzpeople</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikzpfeile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikzposter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikzscale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikzsymbols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-times</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-times-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-timetable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-timing-diagrams</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tinos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tinos-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tipa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tipa-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tipa-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tipfr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-titlecaps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-titlefoot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-titlepages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-titlepic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-titleref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-titlesec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-titling</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tkz-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tkz-berge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tkz-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tkz-euclide</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tkz-fct</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tkz-graph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tkz-kiviat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tkz-linknodes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tkz-orm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tkz-tab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tlc2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tocbibind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tocdata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tocloft</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tocvsec2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-todo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-todonotes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tokenizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-toolbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-topfloat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-toptesi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-totcount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-totpages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tpic2pdftex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tpic2pdftex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tpslifonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tqft</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tracklang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-trajan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-trajan-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tram</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-translation-array-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-translation-arsclassica-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-translation-biblatex-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-translation-chemsym-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-translation-dcolumn-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-translation-ecv-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-translation-enumitem-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-translation-europecv-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-translation-filecontents-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-translation-moreverb-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-translation-natbib-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-translation-tabbing-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tree-dvips</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-treetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-trfsigns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-trigonometry</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-trimspaces</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-trivfloat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-trsym</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-truncate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tsemlines</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ttfutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ttfutils-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tucv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tudscr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tufte-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tugboat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tugboat-plain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-turabian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-turabian-formatting</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-turkmen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-turnstile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-turnthepage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-twoinone</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-twoup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-txfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-txfonts-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-txfontsb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-txfontsb-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-txgreeks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-txuprcal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-txuprcal-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-type1cm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-typed-checklist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-typeface</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-typehtml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-typeoutfileinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-typeoutfileinfo-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-typicons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-typicons-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-typoaid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-typogrid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uaclasses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uafthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uantwerpendocs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uassign</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ucbthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ucdavisthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ucharcat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ucharclasses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ucs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ucthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-udesoftec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uebungsblatt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uestcthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uhc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uhc-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uhhassignment</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uhrzeit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uiucredborder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uiucthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ukrhyph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ulem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ulqda</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ulqda-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ulthese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-umbclegislation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-umich-thesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-umlaute</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-umoline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-umthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-umtypewriter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-umtypewriter-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unamth-template</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unamthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-undergradmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-underlin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-underoverlap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-underscore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-undolabl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unfonts-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unfonts-core-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unfonts-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unfonts-extra-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uni-wtal-ger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uni-wtal-lin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unicode-bidi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unicode-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unicode-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unisugar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-units</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unitsdef</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-universa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-universalis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-universalis-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unravel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unswcover</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uothesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uowthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uowthesistitlepage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-upca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-updmap-map</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uplatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uplatex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-upmethodology</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uppunctlm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-upquote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uptex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uptex-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uptex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uptex-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-urcls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-url</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-urlbst</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-urlbst-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-urwchancal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-usebib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ushort</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uspace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uspatent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ut-thesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-utf8mex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-utopia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-utopia-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uwmslide</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uwthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vancouver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-variablelm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-variations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-varindex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-varisize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-varsfromjobname</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-varwidth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vaucanson-g</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vdmlisting</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-velthuis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-velthuis-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-velthuis-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-venn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-venndiagram</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-venturisadf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-venturisadf-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-verbasef</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-verbatimbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-verbatimcopy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-verbdef</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-verbments</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-verse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-version</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-versions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-versonotes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vertbars</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vgrid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vhistory</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-visualfaq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-visualpstricks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-visualtikz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vlna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vlna-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vmargin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vntex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vntex-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vocaltract</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-volumes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-voss-mathcol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vpe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vpe-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vruler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vwcol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wadalab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wadalab-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wallpaper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-warning</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-warpcol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-was</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wasy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wasy2-ps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wasy2-ps-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wasysym</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-web-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-webguide</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-widetable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-williams</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-withargs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wnri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wnri-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wordcount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wordlike</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wrapfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wsemclassic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wsuipa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wtref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xargs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xassoccnt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xcharter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xcharter-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xcite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xcjk2uni</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xcntperchap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xcolor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xcolor-material</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xcolor-solarized</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xcomment</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xcookybooky</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xduthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xdvi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xdvi-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xebaposter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xecjk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xecolor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xecyr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xeindex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xellipsis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xepersian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xesearch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xespotcolor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex-devanagari</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex-itrans</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex-pstricks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex-tibetan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetexconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetexfontinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetexko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetexref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xevlna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xfor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xgreek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xhfill</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xifthen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xii</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xits</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xits-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xkeyval</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xlop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xltxtra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xmltex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xmltex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xmltexconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xmpincl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xnewcommand</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xoptarg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xpatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xpeek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xpiano</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xpicture</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xpinyin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xprintlen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xpunctuate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xsavebox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xsim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xskak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xtab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xunicode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xwatermark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xyling</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xymtex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xypic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xypic-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xypic-tut-pt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xytree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yafoot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yagusylo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yaletter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yannisgr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yathesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yax</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ycbook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ydoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yfonts-t1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yfonts-t1-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yhmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yhmath-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yinit-otf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yinit-otf-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-york-thesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-youngtab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yplan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yplan-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ytableau</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zapfchan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zapfchan-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zapfding</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zapfding-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zed-csp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zhmetrics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zhmetrics-uptex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zhnumber</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zhspacing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ziffer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zlmtt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zwgetfdate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zwpagelayout</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zxjafbfont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zxjafont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zxjatype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-louis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmad-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmad0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmicrohttpd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmicrohttpd12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmms-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmms0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmodplug-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmodplug1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenmpt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenmpt0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenmpt_modplug1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmp3lame-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmp3lame0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpg123-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libout123-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpg123</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpg123-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpg123-pulse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnm-gtk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnm-gtk0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnma-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnma0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nma-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-NMA-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-NMGtk-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenjpeg1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpango-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-posix2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libplist++-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libplist++3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libplist-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libplist3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpotrace0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquicktime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquicktime-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquicktime0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraptor-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraptor2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>raptor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Rsvg-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Soup-2_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsrtp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsrtp1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtag-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtag_c0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthai-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthai0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libusbmuxd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libusbmuxd4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpx-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-render0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shm0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyaml-cpp0_6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yaml-cpp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>newt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-CGI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-File-Path</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-MIME-Charset</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-esound-compat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-gdm-hooks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-gconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-zeroconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-bottle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-cupshelpers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer-common-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer-dbus-service</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udev-configure-printer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rtkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends-autoconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-vdagent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-JavaScriptCore-4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-WebKit2-4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-WebKit2WebExtension-4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vino</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vino-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vorbis-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vorbis-tools-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wavpack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wavpack-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-ui-qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-config-7-SUSE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flatpak-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-backend-afc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-backend-samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-backends</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-fuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL-1_2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSoundTouch0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>soundtouch-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgxps-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgxps2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GXPS-0_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>FastCGI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>FastCGI-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfcgi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-FastCGI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-module-development-tools-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aaa_base-malloccheck</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-antlr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-bcel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-bsf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-log4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-oro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-regexp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-resolver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-commons-logging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-javamail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-jdepend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-jmf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-junit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-scripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-swing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-pdfbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsdtar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsh2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsh2-classgen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsh2-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>build-mkbaselibs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>checkbashisms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctags</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-ddk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cvs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpkg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpkg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-arch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-cvs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-email</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-svn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gitk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guile-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guile-modules-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguile-2_0-22</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguilereadline-v-18-18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-obs-build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-syms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-vanilla-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgit2-26</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgit2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcp3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcp_gui2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcp_import1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcp_mmv1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcp_trace2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcp_web1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-conf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-iostat2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-mrtg2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-sar2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-LogImport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-LogSummary</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-MMV</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-PMDA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtidy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtidy5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tidy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtool-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mercurial</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nasm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-compiler-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-compiler-libs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-rpm-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-libguestfs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Archive-Extract</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-ExtUtils-MakeMaker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Module-Load-Conditional</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Config-IniFiles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-DNS-LDNS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Net-Libproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PerlMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Tk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-YAML-LibYAML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemtap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemtap-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemtap-sdt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemtap-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-sdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>blktrace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cargo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clippy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-analysis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-std-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rustfmt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-ocamldoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>osc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Mail-SpamAssassin-Plugin-iXhash2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpmi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libslurm32</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-slurm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-auth-none</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-munge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-node</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-pam_slurm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-slurmdbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-torque</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-module-hpc-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-numpy-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-numpy-gnu-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-numpy_1_14_0-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-numpy_1_14_0-gnu-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-numpy-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-numpy-gnu-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-numpy_1_14_0-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-numpy_1_14_0-gnu-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libslurm33</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-config-man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-module-legacy-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-ibm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-ibm-alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-ibm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-ibm-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-1_0_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-1_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-meta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-modules-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>reiserfs-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-livepatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-module-live-patching-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_wsgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_wsgi-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-module-public-cloud-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-keystoneclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aws-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rmt-server-pubcloud</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamsap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-module-sap-applications-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>389-ds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>389-ds-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-module-server-applications-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-prefork</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-worker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_apparmor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_jk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_security2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-chrootenv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-sqlauxprop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>davfs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-relay</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-backend-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-backend-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-backend-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-fts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-fts-lucene</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-fts-solr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-fts-squat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdpdk-17_11-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnuplot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnuplot-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk-vnc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgvncpulse-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GVnc-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GVncPulse-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GtkVnc-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GtkVnc-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guestfs-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guestfs-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guestfs-winsupport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guestfsd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Sys-Guestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libguestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-v2v</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-kdb-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-dbd-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-dbd-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-dbd-sqlite3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcacard-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcacard0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecpg6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfpm_pb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libospf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libospfapiclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquagga_pb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzebra1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quagga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quagga-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqld-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqld19</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-errormessages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenvswitch-2_8-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librelp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librelp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsaml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsaml9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensaml-schemas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libshibsp-lite7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libshibsp7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shibboleth-sp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shibboleth-sp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-server1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libupsclient1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nut-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nut-drivers-net</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirglrenderer0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virglrenderer-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-admin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-config-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-config-nwfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-interface</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-libxl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-lxc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-nodedev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-nwfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-secret</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-disk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-logical</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-mpath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-rbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-scsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-hooks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-lxc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-lock-sanlock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsman-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsman3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openwsman-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxmltooling-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxmltooling7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmltooling-schemas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>memcached</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>memcached-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nginx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-fips</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pywbem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-rbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-ssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-guest-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ipxe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-seabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-sgabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-vgabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rarpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-gssapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-relp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-udpspoof</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-cloud</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-master</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-ssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-syndic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sblim-sfcb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>skopeo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-gtk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-SpiceClientGlib-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-SpiceClientGtk-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>stunnel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uuidd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vsftpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdpdk-18_11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nginx-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovmf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovmf-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ovmf-x86_64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-audio-alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-audio-oss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-audio-pa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ppc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-s390</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ui-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ui-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rmt-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-gtls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysstat-isag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-rmt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-beanutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-module-web-scripting-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_php7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-bcmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-bz2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-ctype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-dba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-dom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-enchant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-exif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-fastcgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-fileinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-fpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-ftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-gettext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-gmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-iconv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-intl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-mbstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-odbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-opcache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-pcntl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-pdo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-pear</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-pear-Archive_Tar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-phar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-posix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-shmop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-soap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-sockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-sysvmsg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-sysvsem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-sysvshm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-tokenizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-wddx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-xmlreader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-xmlrpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-xmlwriter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-xsl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-fileupload</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-taglibs-standard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs8-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs8-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>npm8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-admin-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-el-3_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-jsp-2_3-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-servlet-4_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xalan-j2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs10-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs10-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>npm10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-translations-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-translations-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-we-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-applet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-applet-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-connection-editor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-gstreamer-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-gtk3-module</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>argyllcms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bogofilter-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bogofilter-db</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>colord</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>colord-gtk-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>colord-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dia-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>enigmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreerdp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwinpr2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>winpr2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gegl-0_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gegl-0_3-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gegl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgegl-0_3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gegl-0_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-plugins-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimp-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimpui-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-online-accounts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-online-accounts-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-photos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-photos-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-search-provider-gnome-photos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-ugly</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-ugly-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icedtea-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imobiledevice-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavcodec-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavformat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavformat57</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavresample-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavresample3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgadu-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgadu3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmwaw-0_3-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopencv3_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opencv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opencv-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libotr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libotr5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-config-gnome3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-networkmanager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpskc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpskc0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-plugin-sametime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base-drivers-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base-drivers-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-calc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-calc-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-draw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-filters-optional</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-themes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-impress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-af</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-as</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-bg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-bn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-br</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-cy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-da</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-dz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-en</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-eo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-et</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-eu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-gl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-gu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-he</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-kk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-kn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-lt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-lv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-mai</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-mr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-or</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pt_BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pt_PT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-si</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-st</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-te</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-th</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-tn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-tr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-uk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ve</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-xh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh_CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh_TW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-mailmerge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-officebean</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-pyuno</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-writer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-writer-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreofficekit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstaroffice-0_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvncclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-0_2-7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwpd-0_10-10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwpd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openconnect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openconnect-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openconnect-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-plugin-otr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-plugin-otr-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-bluetooth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-lirc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>transfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-wayland</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libntfs-3g87</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntfs-3g</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntfsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsolv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsolv-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyui-ncurses-pkg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyui-ncurses-pkg8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyui-qt-pkg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyui-qt-pkg8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-pkg-bindings</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-ftp-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsolv-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-solv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-libxml2-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zziplib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_pkcs11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_pkcs11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lcms2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-de_DE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-dictionaries</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_US</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_ES</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-hu_HU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lightproof-en</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lightproof-hu_HU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lightproof-pt_BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lightproof-ru_RU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-nb_NO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-no</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-pt_BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ro_RO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ru_RU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbcommon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jasper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-glib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gamin-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ldb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-glib1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-gobject0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-ui-gtk3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-ui0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfam0-gamin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfam0-gamin-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgamin-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libp11-kit0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libp11-kit0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtdb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtdb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtdb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p11-kit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p11-kit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p11-kit-nss-trust</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p11-kit-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-talloc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-talloc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-talloc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-talloc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>talloc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>talloc-man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tdb-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tevent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tevent-man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Avahi-0_6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2_org</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zeromq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Jinja2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-plugins-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgraphviz6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libu2f-host</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libu2f-host-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libu2f-host0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-user-root</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>taglib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-paramiko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_u2f</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libruby2_5-2_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-devel-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-stdlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadb3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadbprivate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-connector-c</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyui-ncurses-pkg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyui-ncurses-pkg-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyui-qt-pkg-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Werkzeug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-Werkzeug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-urllib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-numpy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nghttp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-rpi3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-magic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-magic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Flask</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-Flask</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Svg5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtsvg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtsvg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-turbo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62-turbo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-c</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-requests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcontainers-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-SQLAlchemy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-SQLAlchemy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cf-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-module-cap-tools-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-github-docker-libnetwork</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>helm-mirror</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse-overlayfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfuse3-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slirp4netns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>buildah</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exiv2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenmpt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-branding-SLE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspectre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspectre-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspectre1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>soundtouch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-askpass-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-config-7-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-utils-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-gobject-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exempi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SDL2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openexr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyui-qt-pkg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libibus-1_0-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ibus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-IBus-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>djvulibre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdjvulibre-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdjvulibre21</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtimageformats</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtimageformats-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtsvg-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgxps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SDL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lttng-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lttng-modules-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-utils-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-vanilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgit2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-solv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-solv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-solv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-std</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-addons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Switch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-gdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-magic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-docs-webapp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-embed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-jsvc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-module-development-tools-obs-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils-gold</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-arm-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-avr-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-epiphany-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-hppa-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-hppa64-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-i386-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-ia64-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-m68k-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-mips-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-ppc-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-ppc64-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-riscv64-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-rx-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-s390-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-sparc-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-sparc64-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-spu-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-docs-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-obs-qa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kselftests-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavdevice-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavdevice57</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavfilter-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavfilter6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl-mini-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsystemd0-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev-mini-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev-mini1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-myhostname</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-mymachines</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-logger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-mini-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-mini-container-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-mini-coredump-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-mini-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-mini-sysvinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udev-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libepubgen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libepubgen-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblangtag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblangtag-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmwaw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmwaw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmwaw-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmwaw-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstaroffice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstaroffice-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstaroffice-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstaroffice-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwps-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxmlsec1-gcrypt1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxmlsec1-gnutls1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxmlsec1-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-af_NA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-an</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-an_ES</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_AE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_BH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_DZ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_EG</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_IQ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_JO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_KW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_LB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_LY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_MA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_OM</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_QA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_SA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_SD</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_SY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_TN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_YE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-be_BY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bn_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bo_CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bo_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bs_BA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca_AD</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca_ES</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca_ES_valencia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca_FR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca_IT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-de_AT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-de_CH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_AU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_BS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_BZ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_CA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_GH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_IE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_JM</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_MW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_NA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_NZ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_PH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_TT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_ZA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_ZW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_AR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_BO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_CL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_CO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_CR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_CU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_DO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_EC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_GT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_HN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_MX</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_NI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_PA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_PE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_PR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_PY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_SV</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_UY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_VE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_BE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_CA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_CH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_LU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_MC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-gd_GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-gl_ES</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-gug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-gug_PY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-is</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-is_IS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-kmr_Latn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-kmr_Latn_SY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-kmr_Latn_TR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lo_LA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ne_NP</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-nl_BE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-nn_NO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-oc_FR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-pt_AO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sq_AL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sr_CS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sr_Latn_CS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sr_Latn_RS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sr_RS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sv_FI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sw_TZ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-te</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-vi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-vi_VN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlsec1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlsec1-gcrypt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlsec1-gnutls-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlsec1-openssl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-cavs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-1_1-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwpd-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwpd-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gio-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-fam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-dmg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-linux-user</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-loofah-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-loofah-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-loofah</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-activejob-doc-5_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activejob-5_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-steam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-1_0_0-cavs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-1_0_0-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctdb-pcp-pmda</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctdb-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-mini-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nettle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-auto-enable-devices</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-credential-gnome-keyring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-credential-libsecret</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-p4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerd-ctr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerd-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-runc-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.10-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-packaging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dom4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dom4j-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dom4j-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dom4j-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libntfs-3g-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntfs-3g_ntfsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntfsprogs-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls-guile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ldb-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-avahi-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tevent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-tdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-tevent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-accessibility</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-jmods</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-actionpack-doc-5_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionpack-5_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zeromq-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit-jsc-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Jinja2-emacs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Jinja2-vim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>389-ds-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-accessibility</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-fileupload-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.11-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.12-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glade-catalog-evolution</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-guile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-gvedit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-php</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-smyrna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-plugin-libvirt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ndiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nping</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zenmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libu2f-host-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u2f-host</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>axis-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cronie-anacron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-lwresd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-browser-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-embed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-readline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-sodium</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-tidy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnfsidmap-sss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ipa_hbac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-sss-murmur</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-sss_nss_idmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-winbind-idmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exempi-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-comicsdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Twisted</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Twisted-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-Twisted</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-Twisted</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-paramiko-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-mini-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-doc-ri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt-cavs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libixion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libixion-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libixion-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liborcus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liborcus-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mdds-1_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mdds-1_4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libixion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-liborcus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsvn_auth_gnome_keyring-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-python-ctypes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openexr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-1_1-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-bench</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-galera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsolv-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzypp-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-pkg-bindings-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper-aptitude</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icedtea-web-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-doc-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-SQLAlchemy-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-SQLAlchemy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-event</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-example-pages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-beanutils-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liburiparser1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uriparser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uriparser-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Werkzeug-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-Werkzeug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-github-prometheus-alertmanager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-github-prometheus-prometheus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-rhnlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhnlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacecmd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacewalk-backend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacewalk-backend-app</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacewalk-backend-applet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacewalk-backend-cdn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacewalk-backend-config-files</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacewalk-backend-config-files-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacewalk-backend-config-files-tool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacewalk-backend-iss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacewalk-backend-iss-export</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacewalk-backend-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacewalk-backend-package-push-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacewalk-backend-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacewalk-backend-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacewalk-backend-sql-oracle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacewalk-backend-sql-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacewalk-backend-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacewalk-backend-xml-export-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacewalk-backend-xmlrpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ibus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfdisk-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmartcols-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-libmount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-sock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-ppolicy-check-password</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openmpt123</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-cbindgen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>djvulibre-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua53-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nghttp2-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-nghttp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>LibVNCServer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>LibVNCServer-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvncserver0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-plugin-nginx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>build-mkdrpms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Bootstrap-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp-wayland</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuwac0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uwac0-0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>obs-service-appimage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>obs-service-obs_scm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>obs-service-obs_scm-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>obs-service-snapcraft</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>obs-service-tar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>obs-service-tar_scm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-fuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-mds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-mgr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-mon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-osd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-radosgw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-resource-agents</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rbd-fuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rbd-mirror</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rbd-nbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-azure-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-azure-agent-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsman_clientpp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsman_clientpp1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openwsman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openwsman-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openwsman-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openwsman-ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openwsman-ruby-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openwsman-server-plugin-ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-openwsman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>winrs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-Flask</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-Flask-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-Flask-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtsvg-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unzip-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgxps-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mspack-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>caca-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcaca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcaca-ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-caca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar-backup-scripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-openlava</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-seff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-sjstat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-sview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-c-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.11-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.12-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-ibm-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-ibm-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-ibm-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-ibm-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython3_6m1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-myhostname-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-mymachines-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtag1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtag_c0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-compat-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-buildsymbols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++-7_Q16HDRI4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore-7_Q16HDRI6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickWand-7_Q16HDRI6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-md-kmp-azure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dlm-kmp-azure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-azure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-azure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-azure-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-azure-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-azure-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-azure-livepatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-devel-azure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source-azure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-syms-azure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kselftests-kmp-azure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-azure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>reiserfs-kmp-azure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-aarch64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-al</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-allwinner</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-altera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-amd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-amlogic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-apm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-arm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-broadcom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-cavium</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-exynos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-freescale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-hisilicon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-lg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-marvell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-mediatek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-nvidia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-qcom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-renesas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-rockchip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-socionext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-sprd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-xilinx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-zte</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug-livepatch-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-kvmsmall</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-kvmsmall-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-kvmsmall-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-kvmsmall-livepatch-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source-vanilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-vanilla-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-vanilla-livepatch-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-zfcpdump-man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-samr0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-policy-python-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-policy0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-policy0-python3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-ad-dc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-ceph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs-python-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs-python3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-tools-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-fam-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgthread-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-4_0-18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit2gtk-4_0-37-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk3-minibrowser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqb-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqb20-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqb0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-sysinit-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel-static-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-profile-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-utils-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-af_ZA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bg_BG</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bn_BD</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-br_FR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-cs_CZ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-da_DK</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-el_GR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-et_EE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_FR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-gl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-gu_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-he_IL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-hi_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-hr_HR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-id</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-id_ID</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-it_IT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lt_LT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lv_LV</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-nl_NL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-pl_PL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-pt_PT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-si_LK</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sk_SK</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sl_SI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sv_SE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-te_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-th_TH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-tr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-tr_TR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-uk_UA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-zu_ZA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIlmImf-2_2-23-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIlmImfUtil-2_2-23-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-gdb-pretty-printers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-glade</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-gtk2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-am</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ast</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-be</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-bn_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-bo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-brx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-bs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ca_valencia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-dgo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-en_GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-en_ZA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-gug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hsb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-id</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-is</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ka</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-kab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-km</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-kmr_Latn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-kok</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-lb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-lo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-mk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-mn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-mni</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-my</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ne</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-oc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-om</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-rw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sa_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sw_TZ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-tg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-tt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-uz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-vec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-vi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-sdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-sdk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreofficekit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwps-0_4-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwps-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecpg6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpolkit0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadb3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-grafana-dashboards</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-mgr-dashboard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-mgr-diskprediction-cloud</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-mgr-diskprediction-local</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-mgr-rook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-mgr-ssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cephfs-shell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_7-1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerd-kubic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerd-kubic-ctr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-kubic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-kubic-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-kubic-kubeadm-criconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-kubic-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-kubic-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-libnetwork-kubic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-runc-kubic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-github-docker-libnetwork-kubic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwavpack1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-arm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libmount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-gtk-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-gtk3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libibus-1_0-5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-md-kmp-rt_debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dlm-kmp-rt_debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-rt_debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt-livepatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt-livepatch-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt_debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt_debug-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt_debug-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt_debug-livepatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt_debug-livepatch-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kselftests-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kselftests-kmp-rt_debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-rt_debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>reiserfs-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>reiserfs-kmp-rt_debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmodplug1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenmpt0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenmpt_modplug1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL2-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2_asio1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-bananapim64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-bananapim64-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-dragonboard410c</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-dragonboard410c-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-dragonboard820c</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-dragonboard820c-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-evb-rk3399</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-evb-rk3399-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-firefly-rk3399</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-firefly-rk3399-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-geekbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-geekbox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-hikey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-hikey-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-khadas-vim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-khadas-vim-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-khadas-vim2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-khadas-vim2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-ls1012afrdmqspi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-ls1012afrdmqspi-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-mvebudb-88f3720</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-mvebudb-88f3720-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-mvebudbarmada8k</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-mvebudbarmada8k-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-mvebuespressobin-88f3720</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-mvebuespressobin-88f3720-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-mvebumcbin-88f8040</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-mvebumcbin-88f8040-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-nanopia64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-nanopia64-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-odroid-c2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-odroid-c2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-orangepipc2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-orangepipc2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-p2371-2180</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-p2371-2180-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-p2771-0000-500</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-p2771-0000-500-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-pine64plus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-pine64plus-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-pinebook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-pinebook-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-pineh64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-pineh64-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-poplar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-poplar-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-rock960-rk3399</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-rock960-rk3399-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-rpi3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-xilinxzynqmpgeneric</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-xilinxzynqmpgeneric-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-xilinxzynqmpzcu102rev10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-xilinxzynqmpzcu102rev10-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-numpy_1_16_1-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-numpy_1_14_0-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_3-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-SLE15_Update_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_6-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-SLE15_Update_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-23-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-SLE15_Update_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_16-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-SLE15_Update_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_13-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-SLE15_Update_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_19-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-SLE15_Update_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-SLE15_Update_6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_25-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-SLE15_Update_7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_17-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-SLE15_Update_10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-SLE15_Update_11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_28-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-SLE15_Update_8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_14-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-SLE15_Update_9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_27-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-SLE15_Update_12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_32-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-SLE15_Update_13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_35-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-SLE15_Update_14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-livepatch-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_4-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-SLE15-SP1_Update_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-195-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-SLE15-SP1_Update_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_7-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-SLE15-SP1_Update_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_10-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-SLE15-SP1_Update_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_18-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-SLE15-SP1_Update_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-module-packagehub-subpackages-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-module-python2-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-ad-dc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-dsdb-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-md-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dlm-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-devel-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt_debug-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-syms-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-module-rt-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-thunderx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-thunderx-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-thunderx-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-uefi-aarch64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-tcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadb_plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmltooling</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rmt-server-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-sprockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqb-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqb-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqb20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libepubgen-0_1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libepubgen-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblangtag-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblangtag1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnumbertext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnumbertext-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnumbertext-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxmlsec1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxmlsec1-nss1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlsec1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlsec1-nss-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-plugin-bogofilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-plugin-pst-import</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-plugin-spamassassin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libixion-0_14-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liborcus-0_14-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liborcus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kinit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kinit-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sles-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chromedriver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chromium</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chromium-desktop-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chromium-desktop-kde</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chromium-ffmpegsumo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>irssi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>irssi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>suse-sle12-cloud-compute-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-cinder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-cinder-volume</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-cinder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-dhcp-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-ha-tool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-l3-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-lbaas-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-linuxbridge-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-metadata-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-metering-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-openvswitch-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-vpn-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-neutron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Beaker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-keystoneclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-keystoneclient-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pycrypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pymongo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-chef</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-chef</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++-6_Q16-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore-6_Q16-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore-6_Q16-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickWand-6_Q16-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sled-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns_sd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreadline6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreadline6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bogofilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolord2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coolkey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpp48</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-gij</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-gij-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatomic1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatomic1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libffi4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libffi4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcj48</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcj48-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcj48-jar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcj_bc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++48-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++48-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtsan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters-cups-browsed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters-foomatic-rip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters-ghostscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ecryptfs-utils-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>empathy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>empathy-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telepathy-mission-control-plugin-goa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>facter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>finch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-meanwhile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-tcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flash-player</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flash-player-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreerdp-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreerdp-1_0-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ft2demos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsvg-view</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls28-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xen-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-appl-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lcms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIlmImf-Imf_2_1-21</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIlmImf-Imf_2_1-21-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXRes1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcgroup1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgensec0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgensec0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpdb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpdb0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libregistry0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient-raw0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient-raw0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbldap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbldap0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql93</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevent-2_0-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif12-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfbembed2_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgssglue1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgssglue1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgudev-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgudev-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libid3tag0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-sssd-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-3_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit2gtk-3_0-25</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkitgtk-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkitgtk-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkitgtk-3_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkitgtk2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkitgtk3-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-JavaScriptCore-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-WebKit-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjson-c2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjson-c2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libltdl7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblua5_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzo2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmikmod3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmikmod3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmusicbrainz4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient_r18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient_r18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl0_9_8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl0_9_8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-modules-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcsclite1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt4-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler44</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-config-gnome3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-networkmanager-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-mainloop-glib0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-jack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython3_4m1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-qt3support</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-qt3support-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-mysql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-postgresql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-sqlite-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-unixODBC-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-theme-tango</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pt-BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pt-PT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh-Hans</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh-Hant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librpcsecgss3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsilc-1_1-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsilcclient-1_1-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>silc-toolkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp30-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-2_4-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-gtk-2_0-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-gtk-3_0-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-client-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbisenc2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbisfile3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvte9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xkb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxerces-c-3_1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzip2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzmq3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mipv6d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-otr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>puppet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-cupshelpers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-imaging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-libxml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pyOpenSSL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pywbem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhythmbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhythmbox-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telepathy-gabble</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telepathy-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unixODBC-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wdiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xinetd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xlockmore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>DirectFB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lib++dfb-1_7-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdirectfb-1_7-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdirectfb-1_7-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-bad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-bad-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasecamerabinsrc-0_10-23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasecamerabinsrc-0_10-23-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasevideo-0_10-23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasevideo-0_10-23-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstcodecparsers-0_10-23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstphotography-0_10-23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstphotography-0_10-23-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsignalprocessor-0_10-23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsignalprocessor-0_10-23-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvdp-0_10-23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvdp-0_10-23-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu52_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu52_1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu52_1-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpfr4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng15-15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libruby2_1-2_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-stdlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pigz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>at</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQtWebKit4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQtWebKit4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbonobo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbonobo-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbonobo-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksuseinstall1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksuseinstall1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dosfstools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-browser-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontconfig-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgoa-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lhasa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblhasa0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC++6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5WebKit5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5WebKit5-imports</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5WebKitWidgets5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpx0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpx0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpxwrappers0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpxwrappers0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-atsvc0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgif6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgif6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhogweed2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhogweed2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler60</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-pacrunner-webkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-theme-galaxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xfsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapparmor1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapparmor1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaudiofile1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drm-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gegl-0_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gegl-0_2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgegl-0_2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstreamer-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-base-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-0_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-0_10-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstinterfaces-0_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstinterfaces-0_10-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-good</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-good-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstallocators-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstaudio-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstaudio-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstfft-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstfft-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstpbutils-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstpbutils-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstriff-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstrtp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstrtsp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsdp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsttag-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsttag-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvideo-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvideo-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstAudio-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstPbutils-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstTag-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstVideo-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXpm4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXpm4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libass5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo-gobject2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcares2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libosip2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc-netconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwireshark8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwiretap6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsutil7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rrdtool-cached</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unrar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SuSEfirewall2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libisc166-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-bind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-cephfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-rados</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-rbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-rgw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-search-provider-nautilus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnautilus-extension1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnautilus-extension1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gwenhywfar-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gwenhywfar-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgwengui-gtk2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgwenhywfar60</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgwenhywfar60-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSoundTouch0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXdmcp6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio14-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libiso9660-8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-100-errormessages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libofx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libofx6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpodofo0_9_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprocps3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqpdf18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpx1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpx1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vpx-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyaml-cpp0_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shotwell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shotwell-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-network-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-PyYAML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-bundler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcorosync4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-module-adv-systems-management-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>puppet-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libslurm29</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-sched-wiki</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups154</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups154-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups154-filters</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups154-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-ibm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-ibm-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-ibm-jdbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-ibm-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>syslog-ng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpp5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-fortran</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libffi-devel-gcc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-devel-gcc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-module-toolchain-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_php5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-bcmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-bz2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-ctype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-dba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-dom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-enchant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-exif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-fastcgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-fileinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-fpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-ftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-gettext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-gmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-iconv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-intl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-mbstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-mcrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-odbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pcntl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pdo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pear</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-shmop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-soap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-suhosin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sysvmsg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sysvsem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sysvshm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-tokenizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-wddx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xmlreader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xmlrpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xmlwriter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xsl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-imap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-mcrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-pspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs4-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>npm4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs6-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs6-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>npm6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>alsa-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-daemon-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cvs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-otp-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-sqlauxprop-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot22</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot22-backend-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot22-backend-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot22-backend-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-openssl27</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xen-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-appl-servers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcgroup-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql93-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql93-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql93-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblua5_2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libneon27-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt4-x11-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-vte</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>logwatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-switch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Cyrus-IMAP</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Cyrus-SIEVE-managesieve</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppc64-diag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-diag-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squidGuard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squidGuard-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-el-2_2-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-jsp-2_2-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-servlet-3_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-doc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-libguestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_1-ibm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_1-ibm-alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_1-ibm-jdbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_1-ibm-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhivex0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Win-Hivex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpfr4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>smt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>smt-support</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-servlet-3_1-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flex-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbonobo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>giflib-progs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-arm64-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-p2v</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtcnative-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-dpdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-dpdk-switch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>res-signingkeys</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-taglibs-standard-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmicrohttpd10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>policycoreutils-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdpdk-17_11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-louis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsaml8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensaml-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libshibsp-lite6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libshibsp6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxmltooling6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-sdk-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coolkey-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctdb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot22-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>finch-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firebird-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfbembed-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-ada</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-fortran</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-obj-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-objc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-objc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libada48</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libffi48-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcj48-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libobjc4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libobjc4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icecream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>id3lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lib3ds-1-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcgroup-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-ColorHug-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-atsvc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgensec-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpdb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libregistry-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient-raw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbsharemodes-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbsharemodes0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-test-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-openssl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgssglue-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgudev-1_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GUdev-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libid3tag-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkitgtk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkitgtk3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-JavaScriptCore-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-WebKit-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmikmod-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmusicbrainz-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqld18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-sheet2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-compat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-devel-doc-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-linguist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librpcsecgss-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>silc-toolkit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsvn_auth_kwallet-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xevie0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xprint0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>newt-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nut-cgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql93-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhythmbox-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-SpiceClientGtk-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xalan-j2-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xalan-j2-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>DirectFB-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lib++dfb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-bad-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hivex-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_1-ibm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtidy-0_99-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtidy-0_99-0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQtWebKit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbonobo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mdbtools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sgmltool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontconfig-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lhasa-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5WebKit-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5WebKit5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5WebKitWidgets-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5WebKitWidgets-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pyldb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pyldb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtcnative-1-0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-connector-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xfsprogs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_perl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-base-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstApp-0_10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstInterfaces-0_10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstAllocators-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstApp-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstFft-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstRtp-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstRtsp-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstSdp-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXpm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXpm-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapparmor-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbotan-1_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbotan-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcares-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgit2-24</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopus-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libosip2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunrar-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunrar5_0_14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yodl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>build-initvm-x86_64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gwenhywfar-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgwengui-qt4-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libofx-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpodofo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Nautilus-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>obs-service-source_validator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procps-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-yard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slf4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-bsk-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flute</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libformula</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblayout</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libloader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librepository</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librevenge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librevenge-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librevenge-generators-0_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libserializer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mdds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mdds-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pentaho-libxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pentaho-reporting-flow-engine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Capture-Tiny</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-go</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgo7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmdbodbc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mdbtools-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtuoso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtuoso-drivers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtuoso-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lynx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firebird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfbclient2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfbclient2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podofo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-openssl098</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql93-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkitgtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkitgtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fltk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfltk1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcamel-1_2-45</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcamel-1_2-45-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebackend-1_2-7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebackend-1_2-7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebook-1_2-14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebook-1_2-14-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebook-contacts-1_2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebook-contacts-1_2-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecal-1_2-16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecal-1_2-16-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedata-book-1_2-20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedata-book-1_2-20-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedata-cal-1_2-23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedata-cal-1_2-23-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedataserver-1_2-18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedataserver-1_2-18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyaml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpfr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-logging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cmis-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphite2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hyphen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabw-0_1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdr-0_1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcmis-0_5-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libe-book</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libe-book-0_1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libetonyek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libetonyek-0_1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreehand</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreehand-0_1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgltf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgltf-0_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhyphen0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libixion-0_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspub</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspub-0_1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libodfgen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libodfgen-0_1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liborcus-0_8-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpagemaker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpagemaker-0_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-share-linker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-voikko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librevenge-0_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librevenge-stream-0_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvisio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvisio-0_1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvoikko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvoikko1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>malaga-suomi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pytalloc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pytalloc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-license1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenCOLLADA0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_atomic1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_date_time1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_filesystem1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_iostreams1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_program_options1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_regex1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_signals1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_system1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_thread1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libixion-0_11-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liborcus-0_11-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openCOLLADA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>giflib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libotr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcilkrts5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcilkrts5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libffi-gcc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblsan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libubsan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libubsan0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-backports.ssl_match_hostname</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tornado</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-ntp-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libc-client2007e_suse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libimobiledevice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libimobiledevice-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libimobiledevice4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libusbmuxd2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>usbmuxd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstorage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstorage-ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstorage6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libass</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstegl-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gegl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcap1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcap1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firebird-classic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libplist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libplist++1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libplist1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libixion-0_12-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liborcus-0_12-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzmf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzmf-0_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libICE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXdmcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcephfs1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXcursor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virglrenderer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQtQuick5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtdeclarative</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>db48-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb-4_8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb-4_8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yaml-cpp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libid3tag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gwenhywfar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqca2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqca2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt4-qtscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcgroup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-vpnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-vpnc-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-vpnc-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libntfs-3g84</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexiv2-12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatalk12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netatalk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-talloc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-install</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-manager-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-documents</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-documents-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-documents_books-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-search-provider-documents</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_locale1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_random1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libixion-0_13-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liborcus-0_13-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqxp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqxp-0_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmodplug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-config-6-SUSE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-config-6-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>atftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audit-secondary</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>doxygen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-glib1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsman1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>adcli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-100</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetfilter_cthelper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetfilter_cthelper0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetfilter_cttimeout</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetfilter_cttimeout1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-fs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-network-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dlm-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hawk2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hawk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hawk-templates</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ldirectord</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-metadata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>resource-agents</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdlm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdlm3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_38-44-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_38-44-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-live-patching-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_39-47-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_39-47-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_32-33-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_32-33-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_36-38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_36-38-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_43-52_6-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_43-52_6-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_44-52_10-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_44-52_10-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_44-52_18-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_44-52_18-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_48-52_27-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_48-52_27-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-52_31-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-52_31-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-60_20-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-60_20-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_60-52_49-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_60-52_49-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_59-60_41-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_59-60_41-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_59-60_45-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_59-60_45-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_60-52_54-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_60-52_54-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-52_34-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-52_34-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_49-11-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_49-11-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_57-60_35-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_57-60_35-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_53-60_30-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_53-60_30-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-60_25-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-60_25-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_62-60_62-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_62-60_62-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-52_39-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-52_39-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_62-60_64_8-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_62-60_64_8-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_67-60_64_18-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_67-60_64_18-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_67-60_64_21-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_67-60_64_21-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_21-84-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_21-90-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_21-69-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_67-60_64_24-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_67-60_64_24-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_21-81-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_55-52_42-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_55-52_42-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_55-52_45-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_55-52_45-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_59-92_24-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_74-92_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_59-92_17-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_59-92_20-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_49-92_11-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_49-92_14-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_38-93-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_74-92_32-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_74-92_35-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_74-92_38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_90-92_45-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_90-92_50-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_103-92_53-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_69-60_64_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_69-60_64_29-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_69-60_64_32-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_69-60_64_32-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_69-60_64_35-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_69-60_64_35-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_40-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_40-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_103-92_56-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_17</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_114-92_64-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_120-92_70-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_73-5-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP3_Update_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_82-6_3-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP3_Update_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_82-6_6-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP3_Update_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_92-6_18-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP3_Update_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_82-6_9-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP3_Update_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_92-6_30-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP3_Update_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_103-6_33-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP3_Update_6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_103-6_38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP3_Update_7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_114-94_14-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP3_Update_9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_114-94_11-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP3_Update_8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_120-94_17-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP3_Update_10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_138-94_39-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP3_Update_14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_140-94_42-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP3_Update_15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_132-94_33-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP3_Update_13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_126-94_22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP3_Update_11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_131-94_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP3_Update_12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_143-94_47-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP3_Update_16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_155-94_50-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP3_Update_17</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_156-94_57-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP3_Update_18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_156-94_61-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP3_Update_19</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_162-94_69-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP3_Update_21</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_156-94_64-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP3_Update_20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_178-94_91-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP3_Update_25</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_180-94_97-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP3_Update_26</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_176-94_88-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP3_Update_24</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_162-94_72-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP3_Update_22</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_175-94_79-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP3_Update_23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_3-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP4_Update_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_16-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP4_Update_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_19-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP4_Update_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-94_41-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP4_Update_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_13-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP4_Update_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_6-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP4_Update_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_24-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP4_Update_6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP4_Update_7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_32-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP4_Update_8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-puppet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-puppet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-passenger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-passenger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-passenger-apache2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-rack-1_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rack-1_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sles12-docker-image</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sles12sp1-docker-image</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-docker-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-excon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-docker-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-excon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sles11sp4-docker-image</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>portus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sles12sp2-docker-image</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-distribution</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-distribution-registry</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>suse-sles12sp3-image</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libslurm31</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdsh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-slurmdb-direct</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurmlibs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-numpy_1_13_3-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-numpy_1_13_3-gnu-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-numpy_1_13_3-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-numpy_1_13_3-gnu-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-libldap-2_3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-libgcrypt11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ec2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ec2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ec2-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-rsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tablib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-PyJWT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-dulwich</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-File-Touch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>smt-ha</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-ada</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-ada-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-c++-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-fortran-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libada5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libada5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libffi-devel-gcc5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-devel-gcc5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-opcache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-posix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-imap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-phar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_php72</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-bcmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-bz2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-ctype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-dba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-dom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-enchant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-exif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-fastcgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-fileinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-fpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-ftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-gettext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-gmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-iconv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-imap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-intl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-mbstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-odbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-opcache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-pcntl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-pdo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-pear</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-pear-Archive_Tar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-phar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-posix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-pspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-readline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-shmop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-soap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-sockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-sysvmsg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-sysvsem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-sysvshm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-tidy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-tokenizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-wddx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-xmlreader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-xmlrpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-xmlwriter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-xsl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-pos-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_121-92_85-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_121-92_92-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_24</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-smt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-init</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_121-92_95-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_25</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_121-92_73-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_21</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_121-92_80-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_22</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hostinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_121-92_109-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_29</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_121-92_114-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_30</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_121-92_117-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_31</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_121-92_120-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_32</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_121-92_101-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_27</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_121-92_104-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcmu-runner</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-xml-apis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-xml-resolver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensaml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmicrohttpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librelp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-compute</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-compute-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-compute-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-compute_debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-compute_debug-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SUSE-Linux-Enterprise-RT-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-network-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SLES_SAP-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstorage5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_60-52_57-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_60-52_57-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_60-52_60-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_60-52_60-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_17</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_60-52_63-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_60-52_63-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_80-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_80-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_77-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_77-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_22</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_66-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_66-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_19</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_69-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_69-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_72-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_72-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_21</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_83-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_83-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_24</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_86-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_86-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_25</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_cml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_magnet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_mysql_vhost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_rrdtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_trigger_b4_dl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_webdav</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_48-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_48-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_17</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_45-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_45-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_51-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_51-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_54-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_54-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_19</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_57-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_57-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_60-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_60-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_21</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_63-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_63-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_22</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_66-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_66-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_85-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_85-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_26</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_82-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_82-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_25</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_69-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_69-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_24</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_88-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_88-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_27</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_96-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_96-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_29</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_93-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_93-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_99-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_99-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_30</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_104-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_104-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_31</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_110-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_110-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_33</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_115-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_115-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_34</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_107-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_107-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_32</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_118-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_118-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_35</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_121-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_121-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_36</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libosinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libosinfo-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libosinfo-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Libosinfo-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cryptctl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_114-92_67-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_19</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_121-92_98-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_26</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_180-94_100-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP3_Update_27</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_180-94_103-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP3_Update_28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fltk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fltk-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-EBook-1_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-EBookContacts-1_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-EDataServer-1_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetfilter_cthelper-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetfilter_cttimeout-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libffi48</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hyphen-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabw-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdr-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcmis-c-0_5-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcmis-c-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcmis-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libe-book-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libe-book-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libetonyek-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libetonyek-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreehand-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreehand-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspub-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspub-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libodfgen-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libodfgen-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvisio-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvisio-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvoikko-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hivex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pytalloc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_chrono1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_graph1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_graph_parallel1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_log1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_math1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_mpi1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_python1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_serialization1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_test1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_timer1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_wave1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhyphen0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-ntp-client-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstorage-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-users-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstRiff-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Botan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcmu-runner-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-scripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>build-initvm-s390</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtdeclarative-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtdeclarative-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtdeclarative-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb-4_8-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-yard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqca2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-docs-azure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netatalk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_context1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqxp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqxp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqxp-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php72-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-numpy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openwsman-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdlm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontforge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-sle2docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle2docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_auth_kerb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-collections</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-collections-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-imapd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_89-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_89-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_26</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_92-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_92-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_27</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_101-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_101-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_106-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_106-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_29</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_119-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_119-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_31</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_111-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_111-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_30</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_125-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_125-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_33</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_122-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_122-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_32</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_128-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_128-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_34</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_136-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_136-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_36</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_133-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_133-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_35</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_141-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_141-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_37</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_146-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_146-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_38</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_149-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_149-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_39</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_154-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_154-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_40</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtcmu1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oracleasm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oracleasm-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audit-audispd-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL-1_2-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-dbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-audit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-audit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnsmasq-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-glanceclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-keystonemiddleware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-novaclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-novaclient-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-swiftclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-swiftclient-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-agent-compute</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-compute</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-suse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-suse-sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ceilometer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-nova</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-python-memcached</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iperf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iperf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libiperf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-buildsymbols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde-cli-tools5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde-cli-tools5-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.4-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kcoreaddons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kcoreaddons-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kcoreaddons-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kcoreaddons-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5CoreAddons5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5CoreAddons5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavcodec56</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavcodec56-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavdevice56</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavdevice56-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavfilter5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavfilter5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavformat56</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavformat56-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavresample2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavresample2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavutil54</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavutil54-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpostproc53</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpostproc53-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswresample1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswresample1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswscale3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswscale3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib2-filters</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib2-loaders</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libImlib2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotobuf-lite8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotobuf8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotoc8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mosh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ninja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>protobuf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>protobuf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>protobuf-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-protobuf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>znc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>znc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>znc-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>znc-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>znc-tcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>karchive</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>karchive-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>karchive-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Archive5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Archive5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>redis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freexl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freexl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreexl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lame</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lame-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lame-mp3rtp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtwolame-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtwolame0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>twolame</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenjp2-7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedtls9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedtls9-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mbedtls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mbedtls-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ansible</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mongodb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mongodb-mongoperf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mongodb-mongos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mongodb-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mongodb-shell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-debugger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-debugger-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-dialyzer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-dialyzer-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-diameter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-diameter-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-epmd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-et</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-et-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-gs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-gs-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-jinterface</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-jinterface-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-observer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-observer-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-reltool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-reltool-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-wx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-wx-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>phpMyAdmin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kopete</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kopete-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4-apidocs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kio-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kio-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kio-core-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kio-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kio-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kio-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksuseinstall-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geotiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geotiff-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgeotiff2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavcodec57-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavdevice57-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavfilter6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavformat57-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavresample3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavutil55-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpostproc54-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswresample2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswscale4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kauth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kauth-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kauth-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Auth5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Auth5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Auth5-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>akonadi_resources</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>akregator5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>blogilo5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kaddressbook5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kalarm5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdepim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kmail5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>knotes5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kontact5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>korganizer5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ktnef5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>messagelib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>messagelib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkerfuffle15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkerfuffle16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libre2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>re2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>re2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libre2-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drkonqi5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plasma5-workspace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plasma5-workspace-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plasma5-workspace-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plasma5-workspace-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-recursor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-godbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-mydns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-remote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-sqlite3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsox3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sox-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmad0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmp3lame0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.9-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.9-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.8-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.8-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Django</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5-devel-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5-openmpi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5-openmpi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5-openmpi-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5-10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5-10-openmpi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_cpp12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_fortran10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_fortran10-openmpi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl10-openmpi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl_cpp11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5hl_fortran10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5hl_fortran10-openmpi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopencv-qt56_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopencv3_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opencv-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opencv-qt5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opencv-qt5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opencv-qt5-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-opencv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-opencv-qt5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-opencv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-opencv-qt5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsingularity1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>singularity</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>singularity-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keepalived</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-geoip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>znc-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>helm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mumble</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mumble-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mumble-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kconf_update5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kconfig-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kconfig-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kconfig-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5ConfigCore5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5ConfigCore5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5ConfigCore5-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5ConfigCore5-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5ConfigGui5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5ConfigGui5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5ConfigGui5-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksuseinstall1-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>extra-cmake-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kauth-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kcoreaddons-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Auth5-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5CoreAddons5-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpolkit-qt5-1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpolkit-qt5-1-1-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpolkit-qt5-1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpolkit-qt5-1-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit-qt5-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-annex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-annex-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nextcloud</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>okular</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>okular-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>okular-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4-libavcodec-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4-libavdevice-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4-libavfilter-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4-libavformat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4-libavresample-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4-libavutil-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4-libpostproc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4-libswresample-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4-libswscale-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavcodec58</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavcodec58-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavdevice58</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavdevice58-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavfilter7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavfilter7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavformat58</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavformat58-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavresample4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavresample4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavutil56</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavutil56-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpostproc55</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpostproc55-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswresample3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswresample3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswscale5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswscale5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenEXR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenEXR-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenEXR-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hal-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hal-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hal-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-glib10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PolicyKit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PolicyKit-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PolicyKit-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PolicyKit-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-dbase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-hash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-client3-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-common3-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-core5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns_sd-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-license</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_program_options1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_regex1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_signals1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cifs-mount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ldapsmb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtdb1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-krb-printing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>findutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>findutils-locate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-dialupadmin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fvwm2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-fonts-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-fonts-rus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-fonts-std</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-library</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-omni</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimpprint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-2_0-0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglib-2_0-0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmodule-2_0-0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgobject-2_0-0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgthread-2_0-0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmime-2_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmime-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmime-2_0-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmime-2_4-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-screensaver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-screensaver-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls26</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls26-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls26-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-base-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-base-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-0_10-0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstinterfaces-0_10-0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-good-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_4_2-ibm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_4_2-ibm-jdbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_4_2-ibm-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-ibm-alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kgreeter-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-wallpapers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace-ksysguardd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-runtime-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-runtime-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-default-style</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-default-style-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-default-style-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-pae-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-pae-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ppc64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ppc64-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ppc64-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-trace-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-trace-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-apps-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-apps-servers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQtWebKit4-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-qt3support-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x11-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libadns1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexiv2-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop-2_0-7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libltdl7-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtool-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient15-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient15-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient_r15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-Max</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libneon27-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>neon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm10-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopensc2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopensc2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopensc2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl0_9_8-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-glib4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt4-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-browse0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_6-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_6-1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_6-1_0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-base-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pyxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librpcsecgss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamplerate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamplerate-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamplerate-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp15-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp15-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-2_4-1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff3-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4net</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-locale-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-nunit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-winforms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner190</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner190-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner190-gnomevfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner190-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner190-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner191</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner191-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner191-gnomevfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner191-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner191-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-www</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-plugins-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-askpass</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openswan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openswan-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_krb5-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_ldap-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_ldap-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_mount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_mount-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_mount-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-spamassassin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-libs-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-doc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>star</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemtap-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-doc-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-xauth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xpdf-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xterm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acpid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_php53</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-bcmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-bz2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-ctype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-dba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-dom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-exif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-fastcgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-fileinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-ftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-gettext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-gmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-iconv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-intl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-mbstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-mcrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-odbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-pcntl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-pdo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-pear</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-pspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-shmop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-soap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-suhosin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-sysvmsg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-sysvsem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-sysvshm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-tokenizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-wddx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-xmlreader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-xmlrpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-xmlwriter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-xsl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcpcd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcpv6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ecryptfs-utils-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>foomatic-filters</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-profile-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork4-filesharing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kget</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krdc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krfb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-progs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdiplus0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-newt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcrypt-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcrypt-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-modules-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pwdutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pwdutils-plugin-audit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzip1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lvm2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-kmp-ppc64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opie-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-lite-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-lite-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-libwww-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pure-ftpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squid3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>t1lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tgt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6-admin-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6-docs-webapp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6-jsp-2_1-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6-servlet-2_5-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libs-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-trax</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kcalc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kcharselect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdessh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kfloppy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgpg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ktimer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwalletmanager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwikdisk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>okteta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_thread1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-2_4-2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-extra26</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibutils-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-httpclient3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-ibm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-ibm-alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-ibm-jdbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-ibm-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jpeg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql91</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql91-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql91-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql91-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl0_9_8-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl0_9_8-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libotr2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy0-config-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy0-config-kde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy0-networkmanager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtspi1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtspi1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtspi1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>trousers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nut-classic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openCryptoki</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openCryptoki-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openCryptoki-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Module-Build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Test-Simple</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>taglib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>taglib-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unixODBC_23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>x3270</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libxcb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libxcb-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libxcb-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-dmx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-rdp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>a2ps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreadline5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreadline5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreadline5-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-license1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_system1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_thread1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreutils-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fastjar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdirstat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC8-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uuid-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevent-1_4-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt11-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzo2-2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpfr1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpfr1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpfr1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql55client18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql55client18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql55client18-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql55client_r18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql55client_r18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql55client_r18-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpixman-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpixman-1-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpixman-1-0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-mainloop-glib0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-3-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openwsman-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>suseRegister</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lxc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-nrpe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-nrpe-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-plugins-nrpe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-kernel-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>popt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>popt-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>popt-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-lxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sendmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libX11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libX11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libX11-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXext-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXext-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXfixes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXfixes-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXfixes-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXp-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXp-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXrender</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXrender-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXrender-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXt-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXt-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXv-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXv-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4-openssl1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-openssl1-2_4-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-openssl1-2_4-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl1-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libslp1-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp15-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp15-openssl1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailx-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-openssl1-helpers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn-openssl1-down-root-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sblim-sfcb-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>stunnel-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vsftpd-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wget-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>GraphicsMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagick2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-GraphicsMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickWand1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickWand1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenEXR-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hal-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-glib10-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-qt10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-qt10-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PolicyKit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Xerces-c</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXerces-c-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXerces-c28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>a2ps-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-nodeps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_fcgid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boinc-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boinc-client-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_date_time1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_date_time1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_filesystem1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_filesystem1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_graph1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_graph1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_iostreams1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_iostreams1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_math1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_math1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_mpi1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_program_options1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_python1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_python1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_regex1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_serialization1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_serialization1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_signals1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_system1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_system1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_test1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_test1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_thread1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_wave1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_wave1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bytefx-data-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-firebird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-oracle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-sybase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-jscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-wcf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-winfxcore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monodoc-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-fortran-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cscope</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-imapd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>derby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>empathy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fileshareset</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>misc-console-font</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC++6-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-ijs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimpprint-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmime-2_4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmime-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmime-sharp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnucash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnucash-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnucash-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibutils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibutils-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inkscape</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inkscape-extensions-dia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inkscape-extensions-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inkscape-extensions-fig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inkscape-extensions-gimp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inkscape-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-arts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-arts-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-arts-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-mysql-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-postgresql-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-sqlite-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-unixODBC-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libadns-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr1-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdhcp6client-1_0-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdhcp6client-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexiv2-4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexiv2-4-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgadu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-extra-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpgme11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpgme11-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop-2_0-7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop-2_0-7-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-lcms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmikmod</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpfr-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient_r15-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient_r15-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpixman-1-0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>readline-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-draw-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-impress-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-kde</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-kde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-prebuilt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-mono</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-en-GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-gu-IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hi-IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh-CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh-TW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-da</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-en-GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-en-US</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-gu-IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-hi-IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-hu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-nl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-pt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-pt-BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-sv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-zh-CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-zh-TW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-testtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamplerate-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_sudo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthai</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtunepimp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtunepimp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtunepimp5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit-1_0-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit-1_0-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-gnome-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-gnome-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwpd-0_8-8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcrypt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxine-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxine1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxine1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxine1-gnome-vfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxine1-pulse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lxc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lzo-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-gnome-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-translations-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>novell-ipsec-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>novell-ipsec-tools-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>obex-data-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openCryptoki-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-DBD-Pg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-imap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-posix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-readline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-sockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-tidy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>popt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>popt-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pwlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pwlib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-crypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-imaging-sane</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-logilab-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-lxml-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-devel-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-devel-tools-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-doc-ri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-test-suite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionmailer-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionpack-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activemodel-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activeresource-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rails-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-railties-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activerecord-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activesupport-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-bundler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-i18n-0_6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-json_pure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rack-ssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-sprockets-2_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rxvt-unicode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sendmail-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>struts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>struts-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>struts-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>t1lib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>taglib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-cjk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-dvilj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-jadetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-metapost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-musictex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-omega</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-tex4ht</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-xetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-xmltex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvilj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-musictex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ppower4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>trousers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unixODBC_23-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>valgrind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>valgrind-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xalan-j2-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libX11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libX11-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXext-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXext-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXfixes-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXfixes-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXp-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXrender-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXrender-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXt-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXv-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXv-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libxcb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libxcb-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-ncurses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-readline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-tidy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>beagle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>beagle-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>beagle-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inn-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inst-source-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_4_2-ibm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-ibm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-ibm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql91-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-base-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-httplib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rack-1_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionmailer-2_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionpack-2_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activerecord-2_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activeresource-2_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activesupport-2_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rails</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rails-2_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionpack-2_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-mail-2_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rack-cache-1_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>giflib-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-de-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-de-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql91-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnu-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtidy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbotan-1_6_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-fontconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-fontconfig-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SDL-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SDL-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SDL-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SDL_image</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SDL_image-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-mono</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontconfig-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpp43</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc43</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc43-ada</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc43-fortran</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc43-fortran-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc43-obj-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc43-objc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc43-objc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libada43</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libobjc43</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libobjc43-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-ng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-ng-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-capng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb-4_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb-4_5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb_java-4_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libofx4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>google-carlito-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmythes-1_2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mythes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mythes-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-importlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmxml1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntfs-3g-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-SOAP-Lite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-mail-2_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>portaudio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>portaudio-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libICE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libICE-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libICE-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXdmcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXdmcp-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXdmcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXdmcp-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXpm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXpm-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-storage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-storage-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4-openssl1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-openssl1-2_4-2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-client-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread-cmaps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread-fonts-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread-fonts-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread-fonts-zh_CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread-fonts-zh_TW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread_ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibm-data-db2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-openssl097g</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-openssl097g-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-branding-SLED</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>beagle-evolution</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>beagle-firefox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>beagle-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mhtml-firefox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flash-player-kde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-pae-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-trace-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xen-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>permissions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy0-config-gnome-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy0-networkmanager-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-certs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quota</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vm-install</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cabextract</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-wireless-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-wireless-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-wireless-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>giflib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasecamerabinsrc-0_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasecamerabinsrc-0_10-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasevideo-0_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasevideo-0_10-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstphotography-0_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstphotography-0_10-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsignalprocessor-0_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsignalprocessor-0_10-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvdp-0_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvdp-0_10-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-da</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-da-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-da-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-en_GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-es-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-es-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-fr-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-fr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-hu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-it-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-it-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-nb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-nl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-nl-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-nl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-pl-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-pl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-pt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-pt_BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-pt_BR-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-pt_BR-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ru-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ru-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-sv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-sv-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-sv-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-zh_CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-zh_TW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-runtime-xine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-bigsmp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-bigsmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>novell-qtgui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>novell-qtgui-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>novell-ui-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orca-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pwlib-plugins-avc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pwlib-plugins-dc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pwlib-plugins-v4l2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wpa_supplicant-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-hae-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-network-kmp-bigsmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-network-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-network-kmp-ppc64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-network-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-bigsmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-ppc64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-bigsmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-ppc64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-kmp-bigsmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-network-kmp-bigmem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-heartbeat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-kmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-kmp-bigmem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-kmp-ppc64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-pacemaker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-udev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-bigmem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-bigmem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gcc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libffi-gcc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libffi4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libstdc++6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>POS_Image-Minimal3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>POS_Image-Netboot-hooks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>POS_Image-Tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>POS_Image3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>POS_Migration</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>POS_Server-Admin3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>POS_Server-AdminGUI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>POS_Server-AdminTools3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>POS_Server-BranchTools3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>POS_Server-Modules3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>POS_Server3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>admind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>admind-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>posbios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc43-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc43-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc43-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++43-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ec2-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>microcode_ctl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>brocade-bna-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-network-kmp-rt_trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-kmp-rt_trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt_trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt_trace-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt_trace-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-rt_trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-rt_trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lttng-modules-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lttng-modules-kmp-rt_trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-kmp-rt_trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-rt_trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_4_2-ibm-sap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_4_2-ibm-sap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sap_suse_cluster_connector</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhn-virtualization-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhn-virtualization-host</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhncfg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhncfg-actions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhncfg-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhncfg-management</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>koan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhnmd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacewalk-certs-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacewalk-check</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacewalk-client-setup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacewalk-client-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mgr-cfg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mgr-cfg-actions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mgr-cfg-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mgr-cfg-management</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mgr-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mgr-osad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mgr-virtualization</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mgr-virtualization-host</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-mgr-cfg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-mgr-cfg-actions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-mgr-cfg-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-mgr-cfg-management</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-mgr-osa-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-mgr-osad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-mgr-virtualization-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-mgr-virtualization-host</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacewalk-remote-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cobbler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SUSE_SLES_SAP-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gconf2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gconf2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gconf2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidl-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orbit2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orbit2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orbit2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libacl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libacl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libacl-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc43</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc43-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc43-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++43</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++43-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++43-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keyutils-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keyutils-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keyutils-libs-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-crammd5-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-gssapi-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-otp-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-plain-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtkhtml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtkhtml2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cdparanoia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cdparanoia-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cdparanoia-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>desktop-file-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fam-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fam-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-vfs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-vfs2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-vfs2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libogg0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libogg0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libogg0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liboil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liboil-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liboil-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpg-error0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpg-error0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpg-error0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-ppc64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-vmi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_5_0-bea</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_5_0-bea-console</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_5_0-bea-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_5_0-bea-jdbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-ibm-alsa-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-ibm-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-akonadi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-akregator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kaddressbook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kalarm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kjots</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-knode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-knotes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kontact</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-korganizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-ktimetracker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-ktnef</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdepim4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdepim4-wizards</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdepimlibs4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libakonadi4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdepim4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdepimlibs4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-gwenview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kcolorchooser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kruler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-ksnapshot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-okular</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkipi5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kwin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kget</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-knewsticker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kopete</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-krdc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-krfb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>utempter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>utempter-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>utempter-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ext4dev-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ext4dev-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ext4dev-kmp-ppc64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ext4dev-kmp-vmi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ext4dev-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-kdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-vmi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-vmi-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kvm-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kvm-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libHX13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libHX13-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libHX13-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libesmtp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtheora0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtheora0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtheora0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvolume_id1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-IO-Socket-SSL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>websphere-as_ce</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcmpiutil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-cim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-viewer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-ldap-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ConsoleKit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ConsoleKit-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ConsoleKit-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ConsoleKit-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libgcc_s1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-kde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-kde4-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-kde4-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-openvpn-kde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-pptp-kde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plasmoid-networkmanagement</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>amanda</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apport-crashdb-sle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apport-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>arpwatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cracklib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-kde4-integration</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gio-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-glib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-glib2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-glib2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gtk3-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gtk3-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gtk3-immodule-amharic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gtk3-immodule-inuktitut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gtk3-immodule-multipress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gtk3-immodule-thai</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gtk3-immodule-vietnamese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gtk3-immodule-xim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gtk3-immodules-tigrigna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gtk3-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gtk3-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libgtk-3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfirefox-gio-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfirefox-glib-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfirefox-gmodule-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfirefox-gobject-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfirefox-gthread-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-at-spi2-atk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-at-spi2-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-at-spi2-core-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-atk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-atk-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-cairo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-dbus-1-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-freetype2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gdk-pixbuf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gdk-pixbuf-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gdk-pixbuf-query-loaders</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gdk-pixbuf-thumbnailer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-harfbuzz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libatk-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libatk-bridge-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libatspi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libcairo-gobject2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libcairo2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libfreetype6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libgdk_pixbuf-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libharfbuzz0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libpango-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libpixman-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-pango</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-pixman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc43-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++43-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++43-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-session</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-session-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gwenview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kcolorchooser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kruler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ksnapshot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkexiv2-7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkipi6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-collections</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-collections-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-collections-tomcat5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-bg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-csb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-et</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-eu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-fi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-gl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-hi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-is</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-kk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-km</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ku</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-lt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-lv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-mk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-nds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-nn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-pa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-sl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-th</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-tr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-uk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-wa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>btrfs-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>btrfs-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>btrfs-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ext4dev-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hyper-v-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hyper-v-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hyper-v-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lha</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>db-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>db-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>db-utils-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb-4_5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl0_9_8-hmac-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpciaccess0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpciaccess0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpciaccess0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraptor1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>man-pages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gcc47</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cxgb3-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libslp1-openssl1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Config-General</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pixman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-doc-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-gdbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quota-nfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjack0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libICE-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXpm-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-storage-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq5-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ecdsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>suseRegisterInfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-branding-SLES-for-VMware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>giflib-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>intel-SINIT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-bigsmp-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-bigsmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-kmp-bigsmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oracleasm-kmp-bigsmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-ng-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-ng0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-ng0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cloud-init</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cloud-init-config-suse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cloud-init-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>growpart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-Cheetah</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-Jinja2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-MarkupSafe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-PrettyTable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-PyJWT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-PyYAML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-argparse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-blinker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-boto3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-botocore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-cffi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-configobj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-dateutil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-docutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-ecdsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-enum34</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-futures</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-httplib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-idna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-ipaddress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-jmespath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-jsonpatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-jsonpointer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-jsonschema</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-lockfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-oauth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-oauthlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-paramiko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-ply</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-pyasn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-pyasn1-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-pycparser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-pycrypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-pyserial</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-pytest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-python-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-requests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-s3transfer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-simplejson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-six</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SDL-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-glib1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cracklib-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash-eppic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontconfig-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-bigmem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-bigmem-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-bigmem-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-bigmem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-kmp-bigmem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oracleasm-kmp-bigmem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oracleasm-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oracleasm-kmp-ppc64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oracleasm-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oracleasm-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb-4_5-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Sys-Virt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses5-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses6-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_pkcs11-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsqlite3-0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libICE-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXdmcp-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXpm-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>suse-openstack-cloud-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crowbar-barclamp-trove</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crowbar-barclamp-neutron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-ibm-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-mlnx-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-nec-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-nvsd-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-plugin-cisco</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-restproxy-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-ryu-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>novnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-agent-central</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-agent-ipmi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-agent-notification</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-alarm-evaluator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-alarm-notifier</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-collector</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-cinder-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-cinder-backup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-cinder-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-cinder-scheduler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-glance</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-glance-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat-api-cfn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat-api-cloudwatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat-engine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-keystone</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-keystone-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-sahara</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-sahara-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-sahara-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-sahara-engine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-glance</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-heat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-keystone</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslo.i18n</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslo.utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslotest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-sahara</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-six</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crowbar-barclamp-nova_dashboard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-dashboard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-django_openstack_auth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-horizon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-cells</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-cert</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-conductor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-console</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-consoleauth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-novncproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-objectstore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-scheduler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-serialproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-vncproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-swift</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-swift-account</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-swift-container</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-swift-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-swift-object</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-swift-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-swift</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-trove</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-trove-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-trove-conductor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-trove-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-trove-guestagent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-trove-taskmanager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-trove</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Pillow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-openstackclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-sprockets-2_11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-actionpack-4_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionpack-4_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-actionview-4_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionview-4_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-activemodel-4_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activemodel-4_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-activerecord-4_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activerecord-4_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-activesupport-4_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activesupport-4_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-bson-1_11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-easy_diff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-redcarpet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-bson-1_11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-easy_diff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-redcarpet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-sprockets-2_11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-rack</name>
	</rpminfo_object>
</objects>
<states>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">15</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.4-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.6+git.54.6e3276c9872-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.25+git.1524215631.8f9c770a-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.8-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.18+20180430.b12c320f5-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.4-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.2-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.2-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.3-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-195</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">15.1</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.4-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.5+git.149.9593f64a5c3-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.1+git.1537269352.7b1fd536-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.17~git0.e89d25b2-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.1+20190417.13d370ca9-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.4-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.2-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.2-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:84.87+git20180409.04c9dae-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.5-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.1-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.1-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.3-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15.1-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.18-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.32-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.11.2-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.29.1-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.6-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14.0-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15.10-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:13.0.2.1874+ge31585919b-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.5-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.100.0-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.4-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.29-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.6-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.7-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.20.3-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.60.0-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.26-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.2-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.108-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.78-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:044.1-16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.3-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:111-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.168-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:25.3-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.6-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.5-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3.26-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.32-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.3-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.2-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.7-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6.4-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.36.11-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.42.3-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.23-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.4-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.16.3-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.54.3-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.26-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.2-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.5-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.0-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.11-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.22.3-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.02-17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.5-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.32-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0+git.e66999f-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.17.9-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.2-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:s20161105-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.1.0-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.16-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20180416-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15.2-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:530-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.3-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.7-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.22-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.9-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.9.4-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.5-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.15-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.2-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.3-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.9-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.3-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.10-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.5-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.3-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.11-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.10-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.4-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.2-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.31.1-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.48-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.12-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.8-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.36.1-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.2-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.2-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.16.1-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.14-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.20.2-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:62.2.0-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.2-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.13-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.5-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.46-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.6-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.11-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.1-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.30.2-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.52.20-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.31.1-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.6-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.2-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.0-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0h-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0h-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.1-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.6-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.40.14-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.41-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.31-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.23-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.57-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.34-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.114-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.62.0-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.3-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.15-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.1-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.14-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.5-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.2-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.3-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.8-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.28-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.7.3-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.62.2-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.34-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.23.1-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.5-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:234-22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.1-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.13-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.27-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.9-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.8-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.1-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.0-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.2.5-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.6-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.0-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.4-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.32-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.7-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.3-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.3.1-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.13.69-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.13.0-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.5-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.19-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.17.0-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6p1-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.3-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:16.02-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.13-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.26-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.28-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.26.1-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.046-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.72-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.06-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0132-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.22-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.13-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14.0-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.1-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.5.0-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.1-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.0-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.18.4-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2018.3.0-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.22-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.1-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.3-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.3-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.33.1-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.21~rc-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.2-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.15.2-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:14-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.0-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.0-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.22-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.84.3-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.88+-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.0-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.30-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20170711_1.9.6-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.2-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.4-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20180425-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.6-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.00-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.19.0.4-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.1568-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.3+git20180125-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.19.5-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20170508-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.1_04-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.99.917+git781.c8990575-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6.1-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.19.6-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.37-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.77-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.2-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.5-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.0-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14.5-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:84.87+git20180409.04c9dae-3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.5-6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.1-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12.2-7.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.3-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4-9.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0-9.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.11.2-12.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.31-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.2-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15.10-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:14.2.0.300+gacd2f2b9e1-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2-9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.100.3-3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.7-3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.60.0-3.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.26-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.2-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.78-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:044.2-18.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.43.8-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:25.3-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.32-7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.5-4.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.2-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.7-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.37-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.26a-3.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.16.4-3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.54.3-4.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.26-13.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.26-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.26-13.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.7-6.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.5-4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.0-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.02-24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.18.6-5.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.0.3.0-3.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4-8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.0-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20190118-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.16.3-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.4-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.9.7-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.5-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0-17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.2-3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.33.1-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.48-5.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.beta19.git20171003-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.41.1-3.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.2-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.5-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.1-4.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.16.1-3.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.14-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.1-3.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:62.2.0-5.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.2-5.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.46-9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.6-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.4-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.11-3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.1-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.80.1-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.6-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0i-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0i-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.40.14-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.24-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.114-3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.6-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.14-7.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.5-3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.28-5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.7.3-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.62.2-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.35-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.28.0-3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.4-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0-4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:234-24.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.13-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.9-5.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.8-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.0-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.3.10-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.6-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.0-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.14-3.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.4-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.2-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.7-3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.2-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.3-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.11.4-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.13.69-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.13.0-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.20-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.1-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.19.0-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.9p1-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.3-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.26.1-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.60-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.2-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.6-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.1-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.4-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14.0-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.2-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.5.0-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.20.0-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2019.2.0-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.24-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.0-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.3-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.14.1-10.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.33.1-3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:15+git47-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.3.2-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.0-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.22-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.1-5.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.0.2-3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.30-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20170711_1.9.8-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.2-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.2-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20190507-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.00-4.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.19.5-3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-4.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.0_12-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0-3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.20.3-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.2-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.1-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.12-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14.27-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.9+gitr706_06b9cb351610-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0rc4+gitr3338_3f2f8b84a77f-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.09.1_ce-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.2-5.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:18.09.1_ce-6.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.0.1+gitr2711_2cfbf9b1f981-4.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0rc6+gitr3748_96ec2177ae84-6.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0~rc6-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.7.3-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.10-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.45-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.0-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.26-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.6-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.6-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.26.2-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.26.0+20180128.1bd86963-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.4-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.26.2.1-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.1-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.26.2-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.26.2+20180130.0d9c74212-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.14-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.1-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.8-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.14.0-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.2-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.94-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.5-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.21-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.26-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.2-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0+git20170122.45fda81-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2.3-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.5-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.18-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.4-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0beta2-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn30357-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn15878-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn41578-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.000.955svn37556-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn15878-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.28svn34303-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.15svn27540-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.21svn15878-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4svn15878-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.8bsvn38238-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.7esvn25918-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.3asvn15878-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.36svn15878-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn17022-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.14svn19603-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.22bsvn15878-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn29725-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn27321-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn20943-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4svn17020-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.6.0svn39929-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0bsvn41157-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.9.6svn39913-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1._svn27880-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2asvn15878-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.8.0svn44380-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn32089-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.25svn18835-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn12688-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.10isvn44425-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.39svn44367-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn15878-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.7asvn43186-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.41svn36582-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn20498-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3asvn15878-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn43751-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn43768-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1svn41972-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2asvn37805-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.42svn26048-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.001_b_2svn20019-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.001svn19766-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn29349-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn28038-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn28936-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn26555-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn44085-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn17683-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn39438-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn20538-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn28574-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn44166-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn44143-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn35900-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.7svn15878-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6bsvn17156-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.6svn15878-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn34016-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3.2svn26055-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5isvn15878-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn42077-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn38055-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.5.1svn38805-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn42428-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.000svn44497-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1.1svn42221-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.92svn35065-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.03svn15878-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.7csvn23385-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn15878-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.3.2svn36030-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.109svn44303-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn29630-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn36804-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.04svn29208-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.3svn28980-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn21855-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43813-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn22930-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.14svn30646-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.2svn44166-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn3006-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn44410-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1asvn17049-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1svn33441-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.16svn35032-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.001.003svn24266-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.8svn21933-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.08svn18651-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn26053-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn17050-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn32662-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.20svn44282-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3.4svn42428-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.31svn44477-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn23350-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.6.03svn31264-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn42045-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6svn39710-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2bsvn42428-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn40322-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.02svn19306-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn28400-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0.5svn44478-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn25095-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn37709-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.8.4svn44241-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.17svn25711-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2.1svn38299-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn30042-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.0svn29762-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn29036-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.31svn44484-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn38005-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1svn15878-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn42880-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.0_beta3svn33894-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.svn15878-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.svn42675-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.04svn18125-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.0svn31576-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.march_2017svn43509-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.0.0.3svn38741-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.73svn40847-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.0asvn15878-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.0svn40201-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.2.3svn29129-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.svn20536-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.2.0svn29989-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.2.2svn41158-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.0.0.1svn32320-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.2.0svn25243-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.svn20431-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.0.0.8svn38497-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.2.20svn15878-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.0.0.1csvn17512-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.2.41svn43843-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn43843-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.0.0.3svn33490-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.9svn42099-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.svn41506-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.svn18948-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.2.0svn15878-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.5svn15878-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.svn41853-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.0.0.9svn24863-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.svn26313-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn18790-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.0.0.6svn23723-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.3svn43195-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.0.0.3asvn15878-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.0.0.3svn43337-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.0.0.3svn19717-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.0.0.3.11svn36084-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.1svn32377-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.svn44166-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.svn31835-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.0.0.1svn35373-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.0.0.1svn44131-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.2.1.0bsvn44396-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.0svn21271-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.3.10svn44427-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.0csvn30254-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.0asvn44197-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.0fsvn30256-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.3hsvn40636-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.1svn38174-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.0hsvn30257-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.2gsvn31902-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.2.2psvn30259-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.3lsvn35198-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.3.1asvn30261-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.3rsvn30262-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.3.8isvn30263-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.3.3qsvn44495-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.4tsvn30265-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.1asvn38064-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.3qsvn30267-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.3.3asvn44270-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.3svn39861-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.4.3csvn30270-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.2.1svn33527-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.2.9svn42424-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.9gsvn42010-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.2.3hsvn30273-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.5csvn41435-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.2bsvn39387-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.0msvn43235-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.6svn30276-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.0hsvn30277-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.3nsvn36645-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.2.1svn43145-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.1svn30279-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.3.5svn38173-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.2.0asvn34377-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.svn39587-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.0msvn43234-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.2.0isvn30281-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.0.0.2svn39608-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.0svn30282-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.2lsvn30283-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.2qsvn30284-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.2lsvn30285-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.svn30286-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.3isvn42885-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.0csvn30288-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.0gsvn30289-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.0dsvn30290-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.2.2svn30348-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.3.1asvn30292-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.2isvn30351-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.lower_sorbian_1.0g._upper_1.0ksvn30294-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.0.0.3svn37629-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.5.0psvn39920-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.2.3dsvn30296-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.0.0svn30564-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.3bsvn33284-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.4svn44550-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.4svn39246-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.1asvn38372-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.31svn25245-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.2.1svn42428-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.1svn28513-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.2.2svn42106-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.3.02svn34393-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.5.1svn41919-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.2.0svn43500-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.0.0.9.2svn38857-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.0.0.4asvn22013-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.svn38479-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.svn20619-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.0.0.93svn25597-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.1svn35460-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.016svn19490-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.072svn43461-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.043svn43484-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.20svn32924-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.05svn26477-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn19440-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.01svn17186-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn17224-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.01svn17187-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn33143-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1.3svn43928-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.1svn39364-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.41svn43073-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.02bsvn38159-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn39180-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.2svn27539-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn23427-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1.1svn40105-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4.1svn35101-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.12svn37009-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn23510-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn44568-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn42161-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.02svn39048-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn41404-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn43031-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn39100-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn29937-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn21977-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn20765-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn44569-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5svn36294-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn18651-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn20987-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn20031-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.004svn32215-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn35428-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn38708-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.5svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn42038-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn37880-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1bsvn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn25507-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.11svn44205-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn27401-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn39041-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1svn40096-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.7svn43910-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn42679-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.02svn39928-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn16219-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0.2svn31607-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.7svn42680-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.0.1svn43510-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.6.0svn43043-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.7.4svn42893-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn44522-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn43468-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3.1asvn40323-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.3.0svn43619-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.02svn26556-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2.7svn43371-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43650-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1ssvn43116-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0rc4svn44156-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2.0svn43723-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.7svn42649-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6csvn43082-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0gsvn43555-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.14svn44172-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn19787-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2dsvn43620-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn41634-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3.2svn44066-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1gsvn29252-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn43032-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn32180-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.12.2svn43108-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.9svn42445-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3.1svn43049-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0.1svn37081-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn24097-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3bsvn43382-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn24011-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn41596-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.8.0svn43621-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.10svn44385-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.9.5svn43860-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0bsvn41922-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.7svn43765-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.7.0svn42390-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.8.1svn42972-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1gsvn42147-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0.0svn43738-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.4.1svn41675-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2.0svn43330-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1.2asvn32750-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn41656-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3.0svn42120-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.16svn42162-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.3.1svn35497-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0asvn21923-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn25526-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn25527-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn22054-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn39785-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn17116-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.99dsvn44166-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.71svn29725-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn43549-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn29743-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1asvn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.10svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.2svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.30.7svn44546-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn35154-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn34631-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1csvn37795-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn34632-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn35267-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn34633-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1svn38248-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn29803-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.01svn41777-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.00svn43960-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn42217-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn25779-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn39073-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn25039-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.07svn36406-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn38388-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn17209-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn22490-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.5svn35014-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2asvn38638-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4svn20047-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn37657-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn32235-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn17076-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn21670-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0.1svn36605-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1svn43861-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn37536-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn23609-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.7bsvn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn31835-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.618033svn40846-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.61803svn21907-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.00svn21948-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.14svn17830-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.02dsvn43344-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.02svn17062-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn21047-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn16989-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2svn17087-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn36477-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.30svn28031-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.06svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn39701-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn17129-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn23790-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn20655-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn17127-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn32047-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn21014-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.40svn29901-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn44371-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.98esvn43071-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn35383-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn28363-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.04svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.2svn35041-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn17794-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn25185-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn27488-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn44481-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn44514-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn42292-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn41813-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2asvn43219-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn30559-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn40213-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3asvn43369-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3asvn44554-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5bsvn43741-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2bsvn44173-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2asvn44195-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3asvn44174-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn43201-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.3svn38736-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn18337-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn42428-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43687-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn26313-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn15543-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn34991-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.90svn27725-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.6.1svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn35973-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn33041-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.001.000svn24302-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43515-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn17125-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.4.2svn43003-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.20.17asvn44131-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.2svn32508-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn24523-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.4svn27066-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn17353-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn41409-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn39000-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn18258-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn35002-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.8.2svn25144-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.5svn17123-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn21476-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.r0.2svn38859-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2.7hsvn35069-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn16666-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn31624-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn39936-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.02.2svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.2csvn23443-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn17122-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5svn30020-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4svn34452-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn17121-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.36svn36697-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn39797-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.21svn31332-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.01svn36728-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5svn36195-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.5csvn29349-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn16094-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0csvn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0.4svn41737-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1bsvn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0.1svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn17120-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0isvn28572-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn25623-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn38300-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn38300-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.9svn17146-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2.5svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn17119-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn21632-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2esvn44513-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.15esvn43583-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn42758-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.5.8svn44023-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn40522-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn43747-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0msvn31096-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn21046-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn20582-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.12svn39317-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.7svn33801-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2asvn19440-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1svn38161-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.01svn27118-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2.4svn42341-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5svn44512-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn40931-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn27473-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.7.6svn44166-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn20060-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0asvn17157-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1.1svn37934-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn26700-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.9999svn28552-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2.1svn42751-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn34408-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.8.3svn44488-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.5.5svn36428-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn37103-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.01svn44454-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2asvn43444-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.8.4svn36951-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.20170505.0svn44207-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn37223-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.8svn40373-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.8.4svn41119-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn44166-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn29018-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.2svn38304-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.77svn33101-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3.1svn38221-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn34405-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0svn16549-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.19svn32513-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn28876-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn41531-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.7svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn34887-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.5svn28250-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.7.0svn19445-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0hsvn42428-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.9svn24378-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.8.1svn21107-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn39273-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn28910-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn40785-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn17964-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.01svn44283-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn18787-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1svn39728-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn32550-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.13svn38138-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.7svn34668-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn37572-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.042svn43462-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn17630-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn21126-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn34481-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn29803-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.5svn21539-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4bsvn26557-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0bsvn35084-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn18270-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3csvn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn41042-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn13293-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2.0svn42228-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn22155-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0asvn29803-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn31490-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.22svn21741-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.99fsvn18462-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.7asvn19361-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2.2svn27198-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn44491-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.3svn27536-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn42851-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn18259-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.r0.11asvn38875-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.8svn41927-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.76svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.12.3svn43001-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.25fsvn39903-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.0.5_r1svn29020-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn17219-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn17218-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn18791-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.8svn29349-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1.1svn37868-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn44436-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn23167-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn31026-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn36188-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn34112-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn42327-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn42328-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn29905-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn36948-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn42326-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn24582-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn27472-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn30380-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn42329-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn42330-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn38202-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn23171-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.6csvn33092-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn28434-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn29229-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn34438-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn36189-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn29801-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn25411-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn37413-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn36190-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn39308-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.14svn18950-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0.1svn31745-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43558-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.10asvn35923-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn30408-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.9bsvn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.10svn42507-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn35929-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.35svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn29062-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6svn37928-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn24829-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.00svn41865-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn44131-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn23862-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.21svn26042-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.00asvn27576-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn35058-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn24940-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.01svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4svn44501-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0esvn21209-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.20svn44476-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn29803-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43525-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1asvn43993-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn43866-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.9svn32657-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.0svn16896-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn37019-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn41553-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn43277-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn40855-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn44321-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn33902-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.5.2bsvn43469-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.01svn23371-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.02svn43961-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn41301-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.03svn41986-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.20svn41597-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.31svn38672-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn38514-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn36304-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.9.1svn44129-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn24061-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2csvn26313-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn23866-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.4.9svn43669-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn44166-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.7svn34453-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn44489-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.7csvn40725-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn24139-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.16svn20745-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.60svn37839-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.53svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.33svn24729-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn34577-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.64bsvn44166-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn28878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1svn37658-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1svn37659-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.915svn18651-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn29741-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn29349-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn35362-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.03svn38599-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.14svn23425-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn29579-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn23373-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.6svn42883-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.27svn41772-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.6svn27974-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.02svn18951-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.60svn36650-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5.2svn41686-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn36682-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn38287-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn36705-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.04svn39991-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn40237-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.02svn43742-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn36692-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn43452-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn36635-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6svn38093-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn37146-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn36670-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.01svn43743-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn36625-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn36699-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn36700-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn36661-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn44562-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn36636-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0asvn28983-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5svn41804-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.5.0.0svn30206-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn26355-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn17399-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn23374-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.6svn23487-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.41svn43666-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.34svn31771-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn23974-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn39589-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn42415-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn16549-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.7svn42829-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.11svn24035-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn37656-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn37645-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.2svn42843-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn19387-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn28946-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn28501-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn17192-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn32925-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn41554-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn19441-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.5svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn27918-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.20svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.32svn42428-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn20520-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5.0svn43417-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn34295-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.6svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn17337-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.01svn17194-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn24927-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn34294-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5.0svn40723-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2dsvn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4svn25741-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn44131-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn34474-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn34521-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn29752-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn24759-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.0svn26237-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.01asvn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn17195-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.111svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.r0.32svn38860-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn30695-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.3svn43060-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.7.0svn42608-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn17196-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.16svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn44269-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn37498-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2esvn35866-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5.0svn44471-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn28582-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.4svn38157-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1svn23912-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn39802-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1bsvn19232-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.97svn29349-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn34724-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.07asvn44524-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.6.1svn44166-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.10svn42661-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.07svn38419-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn29031-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1svn38375-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn20741-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.00svn18728-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn23448-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn29103-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn36814-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn8329-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5svn44166-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.00svn29349-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.04svn44515-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn44515-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn44224-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn40273-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.15svn44167-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn44167-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6svn13293-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1.3svn40768-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn40987-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1.3svn38726-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2bsvn35193-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.6.0svn38742-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn20851-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.99svn19440-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn32677-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn26424-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4.0svn44543-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn32661-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn38352-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.16svn35662-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn35701-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn26313-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn21000-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn29466-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn44392-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn25033-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn38172-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn41617-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn29349-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn39233-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn39396-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn32639-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn24928-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.8svn25231-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.6bsvn21540-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.17svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn27599-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3asvn35829-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1esvn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn33236-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.02asvn20617-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn39153-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5svn42003-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.04svn42578-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn21758-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.005_bsvn19705-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1asvn38114-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.24.11svn38639-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn41161-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn39025-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.03svn42712-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn22513-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.20svn37063-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn24504-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn31903-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.6dsvn39334-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1svn42023-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1.1svn41731-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn23483-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn18064-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn28469-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn34957-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn34087-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.5dsvn24962-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6svn43750-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1dsvn34486-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn17197-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2svn16558-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.2svn28571-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn29802-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.9asvn44024-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.5.2svn24146-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.8svn21472-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn33821-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.01svn17210-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn20513-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5csvn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.8svn41154-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.7.4svn21461-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2014svn35575-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn29349-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.6.3svn40917-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn29050-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.61svn18703-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.26svn42905-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn18336-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn22931-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1svn32257-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0asvn43278-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn20678-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn20641-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.0svn29419-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.08svn43506-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn42428-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.97svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1svn41774-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn21385-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn18115-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.98svn29235-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0gsvn37925-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn37236-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn22426-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn17335-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn32098-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.6svn36354-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn37057-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009062999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.7svn41784-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.1415926svn20694-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.7svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.08isvn42182-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.4svn42855-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1svn21906-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1hsvn19795-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.04svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.5svn42428-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2.1svn43735-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.0svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn22191-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.0bsvn25714-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43033-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn34454-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4_subrfixsvn17265-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn20202-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn35675-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.5svn37279-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1.4svn42755-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.101svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn33398-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.04svn16916-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.5.1svn26313-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn25860-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn17262-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6svn35417-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn42428-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.4svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.5.1bsvn44499-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.8svn27206-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5svn29349-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.21isvn43188-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn41377-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0bsvn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.41svn19859-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn16243-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.8svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4asvn17263-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn21328-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.00svn43470-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2.2svn43865-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1bsvn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4svn18304-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.9svn44479-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn21912-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn34684-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.92svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn18018-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.9csvn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn36263-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.9svn41549-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.8svn27129-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.8svn18492-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn37889-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn29264-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.12svn43464-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2msvn21340-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4svn32796-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn38074-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn24500-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1.1svn38489-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.8svn26722-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.8.8svn35346-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.0.6svn43630-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.92svn24730-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43812-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.0svn30962-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3.3svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.08svn17259-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn30223-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn38895-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.25svn37628-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn42966-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1.7svn44239-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1bsvn29349-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn33288-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn26313-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn14752-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0.3svn28943-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn19388-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn21462-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn18784-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn24250-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn42107-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn29529-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.5dsvn24280-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.81asvn28421-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn24042-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.4svn38674-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn14758-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.2.1svn24329-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.5svn21719-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.2svn42501-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.00svn38139-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3.46svn44472-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.04svn38770-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn38816-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3asvn17131-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1asvn21631-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn25832-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.4svn43413-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2.2svn30168-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn20220-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn17272-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1.1bsvn19440-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.10svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0.1svn19667-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn25768-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn25584-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3dsvn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3bsvn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.3svn36572-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.17svn35291-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.01svn37298-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.30svn25003-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.34svn20710-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn17382-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn25607-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4esvn40535-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1bsvn43380-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn20638-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1asvn29173-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn21855-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn21326-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2015.2svn40403-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2016.1svn40404-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.6.3.2svn41412-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0dsvn33276-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn23608-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.2svn17859-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.933svn44166-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43546-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn38345-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43573-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn25997-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn43121-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.6.3svn41366-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.6asvn43661-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6bsvn21399-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0.7svn17115-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.5.5bsvn23330-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.20161201svn42621-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn27034-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn43424-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0asvn25430-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.7svn27819-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1.4svn43129-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn42503-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.0svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2016.11_3svn43005-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.3svn21480-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0asvn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.00svn32214-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn29646-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.002svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6svn26313-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn13663-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn18312-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.96svn26789-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn38922-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn24559-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.000_2016_initial_releasesvn42157-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn27417-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4asvn24054-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4svn17275-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn29652-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.03svn25434-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1.1svn34545-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn24684-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn26018-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn26019-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn26030-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2.1svn41984-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.0.2svn21140-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn24714-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn37677-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.8svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.8svn19886-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn29803-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn32934-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn19216-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.20svn29803-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0.1svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn36464-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn25112-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.10svn43086-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn27208-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3.1svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn37378-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.5.6svn19716-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn21882-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.5esvn42428-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4svn42121-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn16189-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn39365-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.9svn41503-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn34971-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn23567-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.9svn37156-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn19469-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn19440-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.01svn28484-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn31978-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn31979-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.01svn18651-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn18651-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.5svn29803-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.8svn41714-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn19878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn32068-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn23835-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn24980-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn41693-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn34049-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0.7svn38913-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.0.betasvn38932-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5.2svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn39609-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.30svn44564-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn37813-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn35665-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn35685-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.15svn44284-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn42873-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn36064-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn41545-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.993svn21292-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.97svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn21691-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.996svn24287-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.98svn24288-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.73svn29803-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.9.2svn41904-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn28628-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn40936-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43726-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2isvn44131-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn38263-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn44211-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn21387-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn38832-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3.5svn22509-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.0.3svn41905-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn35075-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43813-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn41448-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43025-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn44567-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn32630-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.94svn31517-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43561-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.13.2svn39606-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6svn40613-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn28327-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn39419-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.5.0.2svn44502-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn17354-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3.0svn32981-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn35859-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.02svn34439-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.9.4svn36244-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.19.2svn44166-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn38503-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn32484-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43279-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6svn32258-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.7svn41880-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.9.2svn27458-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.97svn43254-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn38428-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn27671-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.10asvn44043-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6.0svn43962-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1svn43280-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2bsvn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.20120101svn25019-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.20120102svn25020-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn17356-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn21396-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn26543-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn21327-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0.5svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn32003-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.11svn23818-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5svn42054-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn36348-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn41359-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn35722-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn35723-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5.0svn35720-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1.1svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn16135-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.09svn43507-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3asvn34733-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.15svn29349-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.61svn24981-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn42635-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.0betasvn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.2svn30002-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn44158-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.8svn44474-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn27036-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1.2svn41378-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.92svn30530-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0fsvn22255-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.23svn18020-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4svn42547-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn43732-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.02svn16136-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.02svn34364-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.2dsvn17357-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0bsvn17358-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.6.85asvn43547-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.2svn43316-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn44401-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn40340-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn41189-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn44419-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn41113-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.5svn40340-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.8gsvn40340-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.1svn44401-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.0asvn41113-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0asvn40340-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.5svn40340-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.3csvn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn37354-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.5svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2csvn38115-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4dsvn25821-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.0svn17359-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0.0svn41332-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn24853-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0.0svn38823-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4svn43610-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.47svn20727-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2asvn19363-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn23379-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn40726-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn21156-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn44194-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn24868-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn29654-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1asvn25819-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.6svn19685-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn29613-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.7svn30958-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn44551-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn17347-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0jsvn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3esvn42287-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn38547-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn35573-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn35576-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4svn36448-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.5.1svn17361-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.7svn17667-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.12svn36500-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.112svn42871-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.1betasvn24099-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5.1svn38931-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn22018-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn28019-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.2svn34299-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn36312-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.1svn21474-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn27232-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn34840-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.5th_editionsvn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn39397-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3.3svn33457-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4asvn42403-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0.2svn42604-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.28svn16613-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.09svn39520-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.6.1svn27654-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn17362-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn23711-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn25742-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.50svn37552-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.995bsvn19611-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn16364-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.95svn40523-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.13svn41718-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.12svn20408-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.7b6svn42950-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.18svn43395-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn24858-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn44563-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.23svn43458-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn22719-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.00svn17346-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2.2svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn16211-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43403-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5svn43476-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn37553-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.7.7svn28286-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.3svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.91svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.52svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.7svn24638-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.6svn27994-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn21338-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn36989-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn24498-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.32svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.1415svn18042-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.15svn44306-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.5bsvn28195-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6svn17992-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.0.2svn23698-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn41414-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn21606-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn18488-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn19595-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn17205-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.01svn44565-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn32899-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn35820-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn38627-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.5svn25025-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.23svn44226-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn34243-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn26137-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1.1svn43902-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1.8svn43130-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1.1asvn38630-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1.2svn38558-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1.0svn38727-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn32101-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn44223-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.31svn29803-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn24825-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0.2svn39080-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.05.34svn27369-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.995bsvn19612-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.50svn19601-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.4svn39597-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.8.5.7svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.3svn31315-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.3svn25218-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn44483-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.13svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn33454-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn44394-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn28669-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn31402-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn27764-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn44096-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn23806-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2msvn36680-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.20170101_pl1svn43813-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn25831-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn40098-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn14050-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn40612-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2svn25505-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn28888-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.9svn30983-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn30983-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn29235-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.2.3svn42914-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.62svn42296-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn42296-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2svn36671-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn16979-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn40613-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn41844-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn38709-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn42541-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn37356-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.25svn43855-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn42300-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn42300-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0.10svn35999-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0.10svn36000-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn42409-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0asvn44566-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.13svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn35702-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.00svn36866-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn40274-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn39026-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2.0svn41892-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn16420-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.22svn26760-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn29349-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn25012-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn41920-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.1svn44492-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn32150-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.52csvn43099-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn10937-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2.1svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn41873-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn27025-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.2svn24986-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn19087-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.6dsvn42428-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0asvn17691-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn16549-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn31474-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.5asvn43034-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1bsvn43523-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn23916-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.19.4svn41811-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn34902-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0asvn30867-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.353svn35145-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.9svn38268-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn21750-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0csvn17364-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1asvn36026-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn21818-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.5gsvn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn31795-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn23638-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.5.3.0svn43603-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.00svn39746-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.6.4svn44409-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0.4svn44542-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn27789-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn19880-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn31741-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn39375-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn31929-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.007svn19409-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2.3svn33164-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn31696-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1svn41390-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.9svn21523-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.41svn21442-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn42268-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.3svn30815-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn41304-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.27svn44131-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn34800-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn38722-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.2svn29349-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn26126-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn17373-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6svn37534-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.67svn29349-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn15093-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.03svn34893-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn42530-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn16134-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn22722-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.1svn20021-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.004svn28119-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.959svn36915-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn25552-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn44368-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn32617-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn20422-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn21934-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn24499-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn33254-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.5svn34491-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn19640-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.07svn41438-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn41465-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn43159-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn39028-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn34302-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn27889-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn30704-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn36918-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.8svn20843-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.9svn31077-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.7svn21322-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn39804-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.5.10svn43606-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.27svn29803-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.5.0.5svn37892-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.5.05svn39323-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.5.01fr_0svn23332-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.0bsvn42434-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn36207-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.17svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.26svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.5.01svn31296-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.5.01.0svn22569-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn18906-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.20svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.5svn35050-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.00svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn26196-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn41550-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1.8svn42874-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn34923-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.74dsvn17533-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.01svn43746-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2dsvn21869-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.04svn38663-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn29005-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn37006-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn32346-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1csvn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.0.3csvn28332-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn21927-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn21586-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.0.1asvn24897-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.7.0svn29349-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn40229-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.5svn41387-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn29053-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1asvn31783-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn30790-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2asvn25193-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn42670-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1bsvn25882-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.973svn20491-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.03svn35490-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn30473-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn30474-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6svn40621-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.5svn43153-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.51svn43814-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.12.1svn44496-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.8_fix_2svn43194-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn34647-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn44500-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn37877-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn44549-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4svn41456-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn38550-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.20170505.0svn44217-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.17svn44141-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0.1svn20747-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn39019-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.0.2svn32741-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.32svn44552-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn43292-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0bsvn32354-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn21086-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.62asvn44166-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn23236-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn31498-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn24694-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1csvn44079-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn37750-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn41012-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1esvn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.94bsvn38769-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn38769-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0.6svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1svn28973-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.6.1svn41598-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn35799-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.7svn36110-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn31598-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2bsvn43979-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.5.3svn44237-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.2asvn29349-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0.1svn29845-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn35773-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.43svn36270-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn23500-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn20062-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn21129-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.09svn43332-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3rsvn42447-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1fsvn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.31svn31639-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.9svn34301-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.00svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3.2svn39864-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.003svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn44131-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.4svn37763-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2bsvn42773-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.13svn31957-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn23661-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.19svn44504-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn34323-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn17582-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2svn31813-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn44171-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.23svn44468-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6svn18173-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn31648-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.6.2svn39515-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.9bsvn31075-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn20298-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.5svn28399-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.05.4svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.79svn44045-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn38828-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6svn31878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn34157-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.7fsvn41203-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn30452-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn42767-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.994svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5svn41823-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn34315-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.7182818svn44166-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.9svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.12svn18611-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.93svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.56svn37105-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2.5svn19692-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0bsvn17485-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn18489-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn40099-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.05svn40855-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.5asvn33802-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn23406-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.04svn41785-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn42428-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.002svn36898-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43947-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn19410-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.10svn28444-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn17745-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.2svn41676-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn44451-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.7svn38224-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn39837-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.6asvn41127-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.4svn24549-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1asvn17484-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn18789-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn41610-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2asvn30914-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn43752-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.96svn32559-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn17483-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.61svn37852-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn32165-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.4.1svn42418-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn32069-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.8fsvn42186-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.004svn42810-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn26313-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn14428-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.8svn29725-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn8457-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.02svn33700-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn33688-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn20885-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.6asvn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.2svn39057-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.03svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.8svn35521-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.0svn37579-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4svn18651-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0.0svn37992-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.9svn38254-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2gsvn38448-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1svn29803-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn44142-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn28140-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.ivu.04.092svn29349-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.01svn43347-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.5svn39367-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.03svn24479-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0hsvn37927-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.r0.83svn38815-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.9svn17513-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.3asvn22126-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43945-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn26473-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.34svn29349-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn39729-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.20svn23252-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn29776-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.004svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.11svn43670-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn41282-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn18674-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.17.06svn44453-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.16svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.40svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn17514-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.6bsvn41345-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1+svn17967-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.02svn43445-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn34878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn21775-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.03svn38035-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.03svn30939-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn30534-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.10svn40637-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.42svn18302-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn26544-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4svn38416-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.2svn42588-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2.2svn21649-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.24svn43375-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn37026-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn37762-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn40307-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1dsvn24857-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn23861-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0.1svn29370-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.75svn44352-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn26422-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43647-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.3csvn30021-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.99bsvn28611-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5.6svn26807-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.4svn21392-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.01svn41996-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.7svn24741-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.2svn43586-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.0svn29558-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.19svn38100-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.8.31bsvn20668-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn32693-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn21819-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn41413-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn41643-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.5svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.0svn29349-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn40536-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3dsvn29601-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn27323-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn31500-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.03svn39029-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn18704-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn29331-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.9.4svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.32svn44457-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.525svn44520-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.05svn41918-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.055svn44510-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn28253-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn23996-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3asvn26258-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43640-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.7asvn28527-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1csvn36086-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.r0.67svn38914-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn39460-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.00svn39343-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn16437-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.06svn44353-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.04svn37984-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn30140-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn43011-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2.2svn35709-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn26786-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.1asvn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn16549-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn17598-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1svn22114-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn18128-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn37675-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.r11svn40125-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0.1svn42428-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0ksvn31162-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.8.1svn41906-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn42361-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn42881-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn18129-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn44529-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn24066-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn30991-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.01asvn29027-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1asvn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.33svn27609-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.203svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn22256-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.01dsvn42307-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.10svn33109-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0.2svn31729-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn18130-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.39svn27498-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn43189-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.98dsvn44131-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43610-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn19389-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.11svn33355-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn28803-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.5svn28492-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.29svn44528-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn25689-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn20852-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn20969-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.6svn38449-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn16991-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn24876-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn28668-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn42872-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.00svn17932-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.2svn41735-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn41526-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn33046-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.20svn42927-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn17474-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn24706-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn43091-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn27331-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.4svn44505-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.2bsvn18131-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn39030-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5svn43599-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn35095-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn23714-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn21833-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn18360-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.94svn21095-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn25192-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.7svn43431-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn34409-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.53svn19712-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn24947-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.002svn42617-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0isvn44487-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.5svn16915-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2fsvn39164-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0lsvn34521-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0hsvn23667-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2bsvn19230-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.32svn38621-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn40042-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.7svn43021-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn32859-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.1svn29803-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3svn41868-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4svn21475-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn19963-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6svn42036-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.03svn32313-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.01svn32263-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.01svn39542-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.05svn41379-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.3svn44166-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn16490-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.05svn22045-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.5svn16005-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn21629-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1lsvn26112-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn10843-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.5.0svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn40986-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn24807-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn24830-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.4svn32809-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn17583-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn37537-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn37537-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.4svn41484-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.7asvn18735-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.37svn29348-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn14387-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.02svn29752-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn17868-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.31svn43117-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn41779-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.92svn23492-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4svn37946-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.5hsvn42973-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5svn42428-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn20373-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.86svn44166-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.01svn31016-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5.84svn44412-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.30svn40690-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn40690-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn31990-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn25962-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn42683-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.2svn44175-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1svn38719-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn16181-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.9svn37297-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0001svn25915-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn39165-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn39165-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.r36svn31934-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn29348-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.0.1asvn44231-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.01svn31693-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn32269-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn42986-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2.1.1svn33307-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.7svn33045-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.0svn31037-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.0.1svn26093-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.21svn35152-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1asvn34573-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.21svn39988-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.15svn44469-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn41857-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn41858-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn41859-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn41860-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn41869-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn41870-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn41871-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn36396-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn18651-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4svn41788-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009063999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2.1svn43482-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn21871-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3.2svn43963-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn18739-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn28590-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn21574-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2asvn20374-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3bsvn39591-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn21943-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn24965-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3.0svn19440-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn21894-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn24769-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn24731-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.618svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.7svn26032-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn13364-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4svn29725-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.5.0svn35711-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.7.4svn43374-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.09svn36012-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn33526-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.2svn19848-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.141592653svn43076-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn28424-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4asvn27765-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn29803-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn44209-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn22859-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn44208-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn42918-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn34236-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.3svn30353-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.5csvn31088-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.76svn43869-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0.2svn39249-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn32405-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn16287-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.72svn40613-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.0.1svn39921-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3.4svn44213-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.101svn20075-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.42.4svn40138-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.18svn42664-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.8.2svn31235-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn21641-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn18305-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5asvn38984-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.01svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.13csvn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4nsvn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2011svn30447-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.2svn25953-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43949-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn35147-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.11.90svn44227-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5svn41985-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1asvn19847-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.04svn29371-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn21893-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn20886-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.3.14svn44214-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.10svn19519-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0b_4svn33822-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.02svn43370-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.6svn43184-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn40538-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0hsvn33033-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn41633-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.13svn25562-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn23552-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.17svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.04svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn26243-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.35svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn16416-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.9.2asvn33946-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.10svn17257-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.04svn43703-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.02svn19591-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.01svn41980-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn22138-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.92svn18734-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.16asvn43996-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.03svn41981-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.62svn40685-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.47svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.05svn41223-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.14svn41901-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.07svn37377-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.98_betasvn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.16svn17556-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.03svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.14svn29803-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.56svn43911-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3.2svn19296-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.05svn35248-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.01svn28155-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.06svn16958-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.04svn17909-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.85svn43912-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.22asvn35832-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.06svn44131-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.34svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.02svn21717-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.11svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn33210-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.6svn20946-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn16033-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.04svn39077-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.95svn29803-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.02svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.12svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.13svn18922-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.63svn34786-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.01svn32997-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.39svn43015-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.21svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.7svn35418-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.5.2svn35673-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.02svn41999-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.82svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.07svn40873-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2csvn44047-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn7838-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.05svn39585-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.01svn16538-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.79svn44511-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.63svn35062-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.01svn25142-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn23464-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.03svn42840-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4svn21667-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.31svn24391-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.12svn24995-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.32asvn43401-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.02svn44507-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.41svn35026-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.13svn38613-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn16369-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.06svn44320-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.13svn43272-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.01svn23451-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.83svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn28801-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn44466-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn25228-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.24svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.16svn35247-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn29333-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5csvn34015-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.68svn44166-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.73asvn44506-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.83svn44281-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn34363-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn42857-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43899-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.20170114.0svn44206-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn44206-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn42950-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.20170604.0svn44470-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn29335-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn30171-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.91svn19440-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn27388-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn27389-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.003svn24649-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn29725-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn44482-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn44459-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn27780-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn21838-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn40612-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn30212-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3asvn44225-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn43009-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1svn23682-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.8svn34996-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn34996-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.21svn27064-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43191-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.15svn41746-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn31638-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.5.3svn42816-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.51svn36065-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.1bsvn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn31763-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn42183-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn28046-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1csvn32818-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.252svn43360-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3isvn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4svn42629-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn44429-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn41727-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn38418-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2csvn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1asvn21939-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.11svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn42467-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn23581-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3dsvn39706-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn27225-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn37026-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn19980-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.9.1svn29128-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1.2svn44131-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2csvn40612-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0esvn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.5svn20318-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn19979-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2bsvn41204-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6svn21127-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0hsvn25050-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.22.0svn44545-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn22050-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.1svn30707-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn34924-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.01svn24305-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.17.05svn44298-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn33442-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.31svn43631-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3.2svn38427-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn24976-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.11svn43505-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.1rsvn19652-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn16488-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn31137-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn19082-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0.3svn40415-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.92svn20002-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn38386-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0fsvn25005-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn36236-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.008_v7_scsvn19537-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn20087-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn40843-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn18292-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.0svn18740-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn29675-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.2svn39796-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn43624-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn27322-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.1fsvn41923-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.02svn37965-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn30084-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn20003-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.0svn44131-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn32919-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6svn21081-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1svn32392-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn25209-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn44485-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn23739-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn19614-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.36svn33945-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.7asvn32815-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.00svn41365-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.2.1svn42925-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn35737-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn17997-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn30187-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43252-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.8svn39014-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.93svn33120-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.4svn13293-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn31565-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.4svn40525-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1.2svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.8svn42809-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.05asvn42633-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.8svn39510-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.6svn37277-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4svn35730-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1svn39318-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.18svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn35087-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn44490-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6svn27223-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn37893-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn27810-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1dsvn39734-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn43017-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2.1svn41401-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn20208-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn20180-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.01svn37749-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0.2svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn43595-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn20185-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.302svn38721-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn42374-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.62svn34011-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.41svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn37568-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3csvn41732-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn20186-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn23799-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn23446-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn23734-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn39096-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.6svn36613-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn44157-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn40613-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.6.7asvn24881-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1.2svn33042-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0.1svn40088-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn41653-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.91svn20209-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.8svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.15svn30959-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1svn22212-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn20319-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn20312-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn26522-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.2svn30708-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn42428-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1bsvn41991-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn29349-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn28918-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3osvn42677-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.5csvn39787-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.8svn41322-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.05svn20336-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6fsvn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.00svn40658-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.01svn39707-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5bsvn27028-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43057-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43058-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4svn29260-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6asvn35537-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0.0svn39074-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2asvn15878-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn20620-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.01bsvn31719-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn22136-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.7gsvn44428-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5.2svn32758-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn20031-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.52svn22781-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5svn43170-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn24652-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn30560-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4bsvn42902-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.12gsvn42903-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn25608-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.11svn25007-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn15878-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn20333-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3bsvn42781-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.9svn20311-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn39592-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.14svn15878-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn30355-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.5svn18136-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.0svn44553-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn27128-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn16215-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.4svn15878-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn42992-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.6svn40597-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.6svn42852-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn40598-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn42225-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1asvn15878-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.7svn42821-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn39794-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.41svn30715-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn34374-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.25svn15878-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn15878-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.17svn15878-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2csvn39766-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn29688-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn22408-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn15878-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4csvn35531-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn39529-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn23454-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6svn15878-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn38710-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn38710-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.01svn31585-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn32293-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.00svn15878-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.01svn43221-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.00svn44100-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn37875-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.0svn42765-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn19982-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.04svn35718-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6svn20306-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1svn23961-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.03svn20334-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn15878-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.6svn15878-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.11asvn36696-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn40320-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1.2svn36914-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn22027-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3asvn24895-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.0.2svn24431-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.23svn36203-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.141svn25916-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn43684-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1.1svn19440-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn43516-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.3svn29743-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn21215-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn15878-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0bsvn15878-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1csvn15878-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn15878-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn20308-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1.5svn15878-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn26645-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.14svn29349-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2asvn40989-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1.4svn32066-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn16117-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn16080-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0asvn15878-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.9svn40238-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.05svn36422-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.1asvn15878-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn19440-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.00bsvn44503-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn32199-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.43svn15878-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.4dsvn26313-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.1862svn18017-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.7.4svn17554-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0asvn40371-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn25446-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn31835-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn41190-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn44166-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn15878-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4.2svn16252-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn32473-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn39024-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn25202-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn41849-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn42413-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.1csvn32804-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.4asvn36489-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn34495-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.0.0.0esvn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.4.07_gsvn31855-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.3.5svn17255-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.1svn29421-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.2.01svn42610-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.3svn30710-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.2.8svn21534-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.0asvn17885-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.0.0.2svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.0.0.1svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.0svn21191-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.0.0.10svn34368-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.7svn28908-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn23761-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.1svn42138-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.1svn42428-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.0.0.42svn27345-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.4svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.0.0.77svn31731-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.0.0.2svn20484-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.0.0.12svn41851-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.2.40svn22018-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.4.03svn44046-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.2.5svn33043-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.1svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.3svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.0svn29349-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.06svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.05svn39596-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.3.1svn34594-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.2.1svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.8svn22514-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.1svn18923-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn37700-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.0.0.7svn38928-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.0svn42294-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.3.0svn44331-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn43957-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.4.8svn40197-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.3.14159265svn44166-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.0.0.1svn18314-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.2.004svn18651-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn41264-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn40533-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn16372-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.0.0.2svn41403-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.0.0.4.8svn44131-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn34177-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.0.0.1esvn44103-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn37771-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn44379-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.04svn24237-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn44166-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.3.0svn31323-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn13013-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.7bsvn26420-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn21802-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.0.0.4svn29752-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn15506-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.1svn29725-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn12782-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn44432-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn31894-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.32svn39660-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn33155-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.0asvn28553-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.5.1svn43137-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn44191-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn44347-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn44366-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn44424-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn44356-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn44342-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn44357-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn44343-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn44444-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn44341-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn44333-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn44462-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn26313-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn24062-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.0.0.9svn35584-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.3.1svn19083-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.2svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.0.0.2.0svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.5svn44509-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn43596-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.0.0.2svn29349-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.4svn43151-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.24svn24716-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.2.18svn39057-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.5svn20591-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.0svn30788-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.0.0.7svn44192-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.2.01svn20677-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.5svn23796-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.6svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.8svn41331-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.0svn38809-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.02svn20770-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.0.0.2svn44140-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.0.0.9bsvn44048-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn30640-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.2.1svn43745-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.0.0.2svn39669-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.66svn33624-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.0svn28754-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.0svn20675-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn17383-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.0.0.3svn34206-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.0svn16549-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.3.16svn34621-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn6898-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.0qsvn33134-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.0.0.1svn16736-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.5.3.2svn43609-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.0.0.4dsvn42280-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.0svn36306-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.2.4svn44166-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn25087-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn38295-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.9esvn35485-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn42454-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn35805-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1.0svn39582-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4asvn44393-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1.1svn32769-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2.3svn43466-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn42039-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.3svn43442-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn26108-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.7dsvn21013-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn28715-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn44475-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn36439-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn27723-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn43978-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn25777-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn32732-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2.6svn30637-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.02svn44350-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn31491-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn42882-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn22005-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5svn38646-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn36170-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn19457-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn43497-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.1svn18729-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.10.2svn40129-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1dsvn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.16svn22961-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.00csvn22891-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1csvn22959-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.16csvn22830-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.16csvn22831-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.00svn22832-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn22857-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0csvn22833-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1.4svn39408-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3csvn22834-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn26096-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5ksvn20085-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.12svn42623-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.3fsvn30209-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3asvn33146-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.142svn17746-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0.5svn42423-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1.0svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.5.1svn32260-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn19084-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.5.9.06svn42586-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn21178-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.00svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.6svn42428-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1svn44455-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3.4svn43605-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn24344-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn23803-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn42198-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn23804-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn24345-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn24754-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn24196-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn23840-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn24010-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn23957-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn25105-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn24228-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6svn44381-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.91svn21751-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn28176-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43006-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3bsvn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn18732-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.6svn18921-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn23440-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn20680-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.05msvn44480-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.5.2svn37649-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.18svn42465-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.23svn43560-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.9svn27253-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1.0svn36298-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43537-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn17748-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3asvn29803-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn17024-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn21578-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn21839-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.00svn43327-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn21820-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4svn40389-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn27046-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn17134-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.31svn29349-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn25648-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0.7svn37623-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4.7svn44238-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.21svn24994-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.12.12svn29349-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.8svn42912-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.01svn38459-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.5svn37776-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn40772-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.03svn38907-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.2.1svn40854-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.2svn35853-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.2svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6.0svn44308-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5.0svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1.0svn36371-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn16791-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn44026-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2csvn39570-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.00svn29974-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.25svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn21081-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn26785-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn26313-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.4svn44456-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2016_6_8svn41348-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.11svn17476-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn19085-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.001.002svn18651-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn33625-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1svn43639-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn42926-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.0.1_r1svn29019-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn18261-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0lsvn36681-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn44467-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn44465-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn31541-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn31409-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.01svn42482-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5svn41521-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.8dsvn43068-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.92svn22357-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.9bsvn42428-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn33860-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn38506-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn29476-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.5.6svn25355-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0asvn19700-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn32626-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn22511-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43366-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn44210-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn26326-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43453-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn42334-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn26059-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.20svn42950-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43900-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn42853-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn43734-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0asvn21608-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.4svn32528-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.7svn29803-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn23262-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1svn21701-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0asvn25969-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.2svn32261-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.04svn42456-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn27744-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1svn38269-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn27354-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.6.13svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn23431-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn34470-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1.1svn43686-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.3svn32262-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn44154-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.92svn24104-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn29944-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.17svn44166-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn40058-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.005svn19444-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn21922-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.13svn33197-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.06svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn17177-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn23670-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.4bsvn34017-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn21920-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.55svn21921-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn39084-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0bsvn20589-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn32457-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6.1svn30080-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn38647-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.3svn39799-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.64svn43239-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.2svn30579-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1svn25629-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn32954-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn26039-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn6897-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.3svn21598-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn36254-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.01svn22028-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn21439-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn35831-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn35830-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.5svn44166-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn25813-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn16082-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2.0svn42756-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn22459-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0bsvn22338-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.7svn41381-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.6svn22048-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0.1svn31532-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn25469-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3.2svn42981-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4svn44127-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.08svn43465-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn23783-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.6svn41121-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn44128-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.12svn41044-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn42289-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn41809-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn20031-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5svn36435-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.prot2.5svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.00svn39694-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.22.87.03svn44166-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.51svn42046-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.4.8svn44370-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn29660-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn20221-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn35756-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn42764-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.18.7svn44547-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn16041-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0asvn40118-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn41438-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn44361-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.5svn34296-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.2svn35088-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn17055-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn28847-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn41133-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.16svn43173-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn30636-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn43864-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.05svn15878-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.0svn43222-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.01svn22575-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4.0svn38929-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn31683-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2ksvn42892-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.108svn32763-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.7asvn35741-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.26svn42899-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.6svn39453-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.8svn40855-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn35743-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn27897-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn27442-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn37604-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2asvn28770-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.4svn41940-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn35928-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn26641-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn35211-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.6svn43589-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.8asvn44430-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4svn35945-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.7csvn31900-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.3fsvn23347-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.981svn30466-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5.2dsvn28090-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.5.06svn32182-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.8.9svn31859-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn19086-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn42830-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn22613-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.99psvn42671-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.03svn21183-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43171-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.6alphasvn26202-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn36013-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn31155-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn40207-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.6svn23348-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn17635-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn34398-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn34398-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn27430-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn17258-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.r206svn22207-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn40728-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.4svn41123-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn41145-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1svn32279-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.01svn34485-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4dsvn28846-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn28539-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn37281-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.6svn28541-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.0-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.1b-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.57-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.4-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.7-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.100-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.25.10-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4cvs20150223-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.15-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.10-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.1-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.38-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.150000-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.012.2-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:804.034-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.7-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.7-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11+git.20130926-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.27-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.17.0-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.22.0-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.0-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-3.54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:60.6.2-3.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.10-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.45-6.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6-3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.1-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.3-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.26.2.1-13.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.26.2+20180130.0d9c74212-4.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34.2.1-4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.14-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.1-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.15-3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.8-3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0-3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.2-4.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.94-6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.26-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.0-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2.3-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.5-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.18-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.4-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0beta2-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn30357-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn27321-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn12688-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn28038-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn44143-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn3006-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn29036-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn43843-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn18790-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn42679-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn16219-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn17794-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn15543-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn25623-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn38300-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn37223-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn34112-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn30408-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn43866-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn33902-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn24061-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn23866-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn29741-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn17399-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn37645-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn24759-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn29031-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn8329-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn44515-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn40273-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn40987-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn21000-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn29050-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn18336-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn25860-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn14752-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn14758-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn25997-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn13663-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn34971-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn37813-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn32101-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn14050-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn30983-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn42296-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn42300-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn16420-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn25012-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn32150-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn10937-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn27025-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn31696-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn26126-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn15093-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn41465-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn29005-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn32346-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn29053-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn34647-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn44549-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn43292-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn37750-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn38769-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn23500-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn23661-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn23406-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn14428-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn8457-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn33688-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn18674-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn30534-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn37026-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn10843-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn37537-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn14387-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn17868-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn41779-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn40690-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn25962-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn16181-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn39165-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn29348-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn13364-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn22859-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn32405-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn7838-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn29333-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn44206-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn29335-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn34996-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn31638-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn32919-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn29688-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn38710-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn21215-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn43957-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn37771-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn13013-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn21802-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn15506-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn12782-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn33155-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn24062-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn43596-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn6898-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn25648-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn26326-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn23262-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn6897-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn44361-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn34398-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.0-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.9-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.20svn15878-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.62svn42296-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.2svn36671-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.svn16979-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.svn40613-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.svn41844-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.svn29349-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.svn38709-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.svn42541-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.svn37356-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.25svn43855-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.0svn42300-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.0.10svn35999-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.0.10svn36000-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.0.0.2svn42409-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.0asvn44566-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.13svn15878-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.svn35702-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.2.00svn36866-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.svn40274-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.1svn39026-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.0.0.1svn34481-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.2.0svn41892-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.0.0.22svn26760-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.0.0.3svn29349-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.svn41920-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.3.1svn44492-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.4.52csvn43099-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.2.1svn15878-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.3svn41873-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.2.2svn24986-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.0.0.2svn19087-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.2.6dsvn42428-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.0asvn17691-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.0.0.3svn16549-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.svn44166-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.3svn31474-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.1svn15878-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.0.0.3svn15878-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.0.0.5asvn43034-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.1bsvn43523-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.svn23916-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.0.0.19.4svn41811-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.svn15878-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.1svn34902-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.0asvn30867-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.2.353svn35145-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.9svn38268-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.svn21750-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.0.0.1svn15878-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.0csvn17364-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.1asvn36026-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.0svn15878-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.svn21818-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.3.5gsvn15878-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.svn31795-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.2.0svn23638-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.5.3.0svn43603-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.00svn39746-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.6.4svn44409-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.0.4svn44542-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.0svn27789-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.0svn19880-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.svn31741-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.svn39375-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.svn31929-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.007svn19409-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.0.0.2.3svn33164-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.2.1svn41390-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.2.9svn21523-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.4.41svn21442-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.svn42268-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.4.3svn30815-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.0.0.1svn41304-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.0.0.27svn44131-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.3svn34800-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.2.0svn38722-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.2.2svn29349-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.2svn17373-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.6svn37534-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.67svn29349-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.03svn34893-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.3svn42530-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.0.0.2svn16134-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.svn22722-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.3.1svn20021-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.2.004svn28119-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.959svn36915-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.0svn25552-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.3svn44368-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.svn32617-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.0.0.2svn20422-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.svn21934-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.0svn24499-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.svn33254-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.2.5svn34491-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.0.0.6svn15878-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.0svn19640-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.07svn41438-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.0svn43159-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.0svn39028-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.0svn34302-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.0.0.2svn27889-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.3svn30704-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.svn36918-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.0.0.8svn20843-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.0.0.9svn31077-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.0.0.7svn21322-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.0svn39804-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.5.10svn43606-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.4.27svn29803-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.3svn15878-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.5.0.5svn37892-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.5.05svn39323-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.5.01fr_0svn23332-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.3.0bsvn42434-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.3.2svn15878-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.6.0svn44308-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.5.0svn15878-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.1.0svn36371-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn16791-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.0svn44026-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.2csvn39570-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.00svn29974-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.2.25svn15878-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn21081-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn26785-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.1svn26313-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.4.4svn44456-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.2016_6_8svn41348-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.20svn15878-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.11svn17476-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.2.1svn15878-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn19085-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.2svn15878-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.001.002svn18651-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.2.0svn33625-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.2.1svn43639-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn42926-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.01svn15878-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.0.1_r1svn29019-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn18261-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.0lsvn36681-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn44467-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn44465-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.2svn31541-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.2svn31409-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.01svn42482-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.5svn41521-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.8dsvn43068-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.92svn22357-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.9bsvn42428-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.2.0svn15878-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn33860-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.2svn38506-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.0svn29476-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.2.5.6svn25355-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.0asvn19700-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.2.0svn32626-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn22511-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn43366-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn44210-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn43453-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.1svn42334-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.3svn26059-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.20svn42950-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn43900-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn42853-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.2.0svn43734-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.0asvn21608-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.3.4svn32528-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.7svn29803-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1svn21701-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.0asvn25969-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.2.2svn32261-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.04svn42456-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.0svn27744-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.2.1svn38269-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn15878-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn27354-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.6.13svn15878-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn23431-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn34470-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.1.1svn43686-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.3svn15878-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.2.3svn32262-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.0svn44154-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.92svn24104-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.4svn15878-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.0svn29944-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.2.17svn44166-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.1svn40058-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.005svn19444-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.1svn21922-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.3.13svn33197-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.06svn15878-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.2svn17177-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.2svn23670-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.2.4bsvn34017-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.2.0svn21920-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.55svn21921-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.3svn39084-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.0bsvn20589-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.1svn32457-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.6.1svn30080-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn38647-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.2.3svn39799-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.64svn43239-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn44166-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.2.5svn15878-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.3.2svn30579-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1svn25629-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.0svn15878-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.1svn32954-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.2svn26039-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.2.3svn21598-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.2svn36254-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn42428-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.10svn15878-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.01svn22028-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.0csvn15878-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn21439-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn35831-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn35830-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.4.5svn44166-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn25813-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.1svn16082-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.2.0svn42756-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn22459-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.0bsvn22338-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.7svn41381-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.2bsvn15878-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.3.6svn22048-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.0.1svn31532-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.22.0-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.0-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.10-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.12-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0.b6-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20180329-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.15.1-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2.1-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2.1_k4.12.14_23-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.8-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.12-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.14-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.1-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.26.3-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.11.9-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.4.0-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.2-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.02-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.05.0-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.38.0-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.80-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.30-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.68-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.94-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.59-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.10-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.12-5.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0+git.20170126-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20190128-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.33.0-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2.1-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2.1_k4.12.14_195-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.14-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.26.8-3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.165.0-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.05-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.11.5-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:18.08.5-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.11.13-6.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.4-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.11-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.161-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2n-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p11-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.162.1-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.1-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.2.0-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.30-3.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.201-3.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2p-3.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p13-4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.18-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.15.0-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.16.61-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.2-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.25-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.0.3-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.33-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.43-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.17-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.2-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.11.2-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.11.2_k4.12.14_23-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.16-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.2-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.3-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.2.15-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.2-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.15-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.14.0-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.4-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.0-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.7-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.4-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.6-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.0-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.9-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.26-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.23-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.44-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.3-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.33-3.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.43-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.3-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:18.11-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:18.11_k4.12.14_195-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.16-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.2-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.2.22-3.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.14.1-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.7-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.4-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14.0-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017+git1510945757.b2662641d5-5.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0+-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.0-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.32-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.3-7.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.15-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2.5-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.11.1-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.0.5-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.2-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2.5-4.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.15.2-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.15.1-3.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.0.14-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.8-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.97.3-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.5-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0~rc2-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.34-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.22-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.26.3-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.13-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.1-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.1-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.0-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.18.9-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.0.4.2-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.5-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.10-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.8.4-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.2-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.08-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.6a-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:60.6.1-3.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-3.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0~rc4-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.26.3-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.14-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2016.2.22-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.18.9-3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.1.3.2-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.6-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.10-4.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.2-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.5-3.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.48.5.2-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.45.15.2-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.12.0-3.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.13-3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14.28-3.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.5-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.16.4-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.00-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.9-5.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.23-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20180703-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.33.1-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.26.1-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.1_06-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.26-13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.2-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.7-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0h-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.14.1-10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.31.1-9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.20.3-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-25.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.16.1-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.114-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.7-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20180525-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.7-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-25.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.100.1-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.8-3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.8+git.86.94b6d10f7dd-4.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.2-9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20180807-3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-25.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.1_08-3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.60.0-3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-25.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.5-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.2-9.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6-3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.35-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.6.4-3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14.10-3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.34-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.60.0-3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.20.5-3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.9-3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.2-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0i-4.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.25-3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-25.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.14-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.16.4-3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-25.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.5-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.31-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.100.2-3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.10-3.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.9-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.9-5.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.7.3-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.2-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-25.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.60.0-3.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.18.0-3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:234-24.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20181025-3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.19.6-8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6p1-9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2018.3.0-5.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0i-4.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.54.3-4.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.9-5.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.2-9.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.6-4.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.9-5.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.7-3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.11+git.140.6bd0e5b30d8-4.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.2-9.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.26-3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.48-5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.40.1-3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.2_04-3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.11-3.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.32-5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.10-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.2-6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-3.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.11+git.153.b36ceaf2235-4.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.23.2-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.11-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.15-3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.36-4.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.6-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.32-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20190507-3.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.2-9.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.3_04-3.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6p1-9.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.40.1-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.0-9.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.70-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.12-3.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20190514-3.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.6-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.7-6.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.8-3.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.48-5.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.0-9.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.60.0-3.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:234-24.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20190513-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.6-5.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:234-24.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.13-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.1-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2-6.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-6.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.34-3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.11.2-12.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.26a-3.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.1568-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.16.1-3.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.168-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.2-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.80.1-3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.54.3-4.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.2-3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.15-3.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.0-9.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.2-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15.2-6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.6-3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.2-3.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.3-3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20190618-3.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.5-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.9-4.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.54.3-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.5-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.6-5.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.2-6.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.44.1-3.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.26-13.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20190423-3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0i-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.0.4.0-3.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.6-5.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.5-4.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.2-7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.114-3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.2-3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.6-3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.8-3.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.14-7.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.2-3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.16-3.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.14-7.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.5-3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.0-4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.10-4.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-25.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.2-9.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.2-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.22-6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.26a-3.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.2-6.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.60.0-3.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.31.1-9.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.46-9.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0i-4.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.70-3.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.4-3.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.5-3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.27-3.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.16.1-4.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.39.2-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2018.03-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.14-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.32-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.2-9.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.9.4-8.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1-5.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6p1-9.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.22.6-3.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.16.1-3.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:13.2.4.125+gad802694f5-3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.13-3.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.3-3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.3-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.4-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0i-4.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.9.4-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.3-5.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20190312-3.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.27.2-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.3_02-3.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.0-3.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.22.5-3.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.9.4-8.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.19.5-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.0-9.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15.2-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.20.1-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.0-8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.5+git.176.375e1f05788-3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.2-8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.0-8.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20190618-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.2-8.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.9-8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:14.2.1.468+g994fd9e0cc-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.1-9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20190401-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:14.2.2.349+g6716a1e448-3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.14-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.33.1-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.24-9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.5+git.187.71edee57d5a-3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.14.1-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0i-14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2019.01-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.43.0-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.2-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:18.06.1_ce-6.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.0.1+gitr2664_3ac297bc7fd0-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0rc5+gitr3562_69663f0bd4b6-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-5.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:18.09.6_ce-6.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.0.1+gitr2726_872f0a83c98a-4.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0rc6+gitr3804_2b18fe1d885e-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:18.09.6_ce-6.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.6-5.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:19.03.1_ce-6.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.0.1+gitr2800_fc5a7d91d54c-4.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0rc8+gitr3826_425e105d5a03-6.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.2-5.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:18.09.0_ce-6.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.0.1+gitr2704_6da50d197830-4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0rc5+gitr3562_69663f0bd4b6-6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0rc5+gitr3562_69663f0bd4b6-6.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.1-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0rc6+gitr3748_96ec2177ae84-6.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.1-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.1-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.4-4.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.0-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.4-4.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.94-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.9.0esr-3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.2-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-3.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-3.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.26.2.1-13.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:60.2.0-3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:60-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-3.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.8-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-3.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:60.2.2-3.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:60-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0-3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.45-6.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:60.3.0-3.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-3.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.8-3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:60.4.0-3.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.2-4.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:60.7.0-3.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.8-3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.26.2+20180130.0d9c74212-4.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-3.61</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.5-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.8-3.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:60.7.1-3.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.26.0+20180128.1bd86963-4.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:60.7.2-3.48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34.2.1-4.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-3.64</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.0-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:60.8.0-3.51</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.1-3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.10-4.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.1-3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.26.0+20180128.1bd86963-4.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-3.67</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.4-4.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.17-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.17-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.27-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.8-3.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:60.5.0-3.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-3.49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:60.6.1-3.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.19-8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2.1-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2.1_k4.12.14_23-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.0-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.0_k4.12.14_23-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.2-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.0-5.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.0_k4.12.14_25.13-5.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.26.6-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.0-5.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.0_k4.12.14_25.16-5.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.12-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.24.1-3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.2-3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.05-7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.36.0-3.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.165.4-3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.0.10-3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.1-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.2-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.6-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.9-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.26-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.0.12-3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2p-3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.4-3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.7-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:15.0.11-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.0.3.0-3.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.8-1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.0.3-4.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.212-3.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12-3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.9-1.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.4-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.26.6-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2.5-4.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.0.20-3.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.9.0-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.0.21-3.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2.5-4.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.14.1-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.14.1-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.10-3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.3-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.2.25-3.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.222-3.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.2-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.0.26~git0.8a2d3de6f-4.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.0.2.0-3.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.7-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.9.0-3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.13-1.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.9-1.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.33-3.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.5-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.16.2-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.1-3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.11-3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.14-3.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.25-3.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2-9.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.7-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.10-4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14.2-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.18.9-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.33-3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0~rc4-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.5.1551309990.79898c7-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.191-3.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.36-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.5-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.10-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.35-3.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-5.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.3+20190326.a521604-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.3+20171226.6d62b64-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-5.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.0.21-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2.5.2-8.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.10-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-5.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.0-9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:18.08.8-3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.40-3.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14.2-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2.7.1-8.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-14.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.11.7-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.171-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2n-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.15-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2p-3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.181-3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.20-3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p12-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.25-3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5-13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6-16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10-28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-5.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-5.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-5.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-5.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-5.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-8.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.11.2-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.11.2_k4.12.14_23-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017+git1510945757.b2662641d5-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.0-9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.33-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.14.0-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-9.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.0-9.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-9.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.33-3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0+-9.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.0-9.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-9.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0+-9.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.0-9.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-9.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017+git1510945757.b2662641d5-5.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.2-3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0+-9.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.0-9.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-9.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.4-3.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8-5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0+-9.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.0-9.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-9.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.32-4.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.14.0-4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-3.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.3-4.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0+-9.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.0-9.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-9.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017+git1510945757.b2662641d5-5.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.2-3.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017+git1510945757.b2662641d5-5.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.3-4.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.3-4.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0+-9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.11.3-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2.5-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2.5-4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.11.4-3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2.5-4.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.15.0-3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.15.1-3.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.16.0-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.16.3-1.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.16.1-3.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.0.13+git.b83ade31-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.0.13+git.b83ade31_k4.12.14_23-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.14~git0.52e4d43b-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.18+20180430.b12c320f5-3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.0+git.1558595666.5f79f9e9-4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.17~git0.e89d25b2-3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.15~git0.6b6a350a-3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.0+git.1558595666.5f79f9e9-7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.9.1-3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.7-3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.0.5.2-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.8-3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:60.2.1-3.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.1.3.2-3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.6a-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:60.7.0-3.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:60.7.0-3.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.11-3.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:60.7.2-3.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2.5.2-3.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:60.8.0-3.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2.6.2-3.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:60.5.0-3.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:60.5.1-3.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.20.0-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">12.1</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:53.0.2785.89-96</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">12</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.20-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:54.0.2840.59-109</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">5</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.3.dev13-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.2.dev26-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.4-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.3-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.32.2-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.1.0esr-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:13.2+git20140911.61c1681-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.35-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.27.2-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.31-20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2-75</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2-75</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.5P1-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.6-27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.98.4-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.7-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.25-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0-147</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.22-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11-26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.27.1-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.3+r212056-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2-55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.11-55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.5-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.58-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.5-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.12-181</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.26-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.100.2-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.6-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.97.2-13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:037-34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:103-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.158-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.3-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.3-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3.26-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.19-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.9-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.406-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.3-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.3-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.36-54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.30.6-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.40.2-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.0.1-13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.10-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.38.2-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.1-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.5-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.4-22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.15-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.24-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.22.2-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.326-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.14.6-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.10.1-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:s20121221-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.65-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15.5-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.28-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.1-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.19-17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.18-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.7-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.14-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.2-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.1-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.7-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.2-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009033052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.4-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.2-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.41.rc1-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.12-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.5-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.21-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.21-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.2.26539-13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.4-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.4-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2d-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-352</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:210-44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.1b-182</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.5.1-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.7-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.2-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.2-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.08-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.0-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.2-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.8.4-13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.5-27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.11-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.30.0-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-59</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.36.3-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.50-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.8-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.112-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.4-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.11-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.7-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.1-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.10-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.4-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.1.2-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.19-16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.10-24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.8-18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.25-18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.7.2.1-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.44.2-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.25-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.3-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.3-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.28.2-17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.1-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.1-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.6-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.1-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.4-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.7-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.16-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2.umip.0.4-19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.7-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.21-44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.13.0-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.8-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.1-23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.4-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.18.2-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.82-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.71-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.04-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:804.031-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.38-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.0-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.7-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.22-267</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.2-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.5-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.7-21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.14-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.0-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.7-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.2-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.0-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.0-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11_git201205151338-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.2.4-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.3-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.83.7-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-778</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.88+-94</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.1-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.18.1-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.1-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.0-16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.3-153</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.1-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.9-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-264</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.1_06-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.1_06_k3.12.28_4-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.99.914-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.15-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.43-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6-45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.15.2-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.108-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.11-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10-1020</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.4.0esr-51</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:13.2+git20140911.61c1681-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.35-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.9-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25.0-13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.21.1-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.98.7-13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.7-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.22-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11-29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.5-24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2-58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.11-58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.5-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.58-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.16-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.3-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.71-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:037-66</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.42.11-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.158-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.19-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.9-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.548-111</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.5-7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.3-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.0.1-23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.1-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.2-20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.4-40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.15-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.23-17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.1-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.91-21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.65-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15.5-8.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.49-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.1-19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.2-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.7-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.2-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.41.rc1-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.5-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.19.2.1-29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:210-83</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.5.1-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.1-170</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.8-16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:62.1.0-30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.2-30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.2-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.21-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-81</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.22-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.8-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.113-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.9-20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.1-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.2.2-13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.2-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.25-21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.7.3-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.29-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.5-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.3-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.3-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.4-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.18.1-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.8.4-242</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.1-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.1-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.6-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.1-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.4-13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.5-25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.10-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.21-49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p4-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.8-16.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.20.1-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.8-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.5-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0019-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.38-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.0-6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.1_rc4-16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.11.2-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.0-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.8-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.3-18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.83.8-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.27.1-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.1-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.3-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.00-32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.0-26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.7-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20140630-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.1_12-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.1_12_k3.12.49_11-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.99.914-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.15.2-36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.155-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.18-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">12.2</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.4.0esr-81</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.12-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:13.2+git20140911.61c1681-28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.42-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.14-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6+2.3.3-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.32.1-16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.0-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.66.3-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.9-21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.32-30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3-78</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3-78</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.26.1-9.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.6-29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.5-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.2-25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.26-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.25-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.5-30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.0-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.8-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.5-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.58-13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.16-19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.3-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.97.3-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.71-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.26-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:044-87</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:103-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.3-16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.12-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.4-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.1-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3.26-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.0-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0~git.1463131968.4e66df7-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.3-7.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.34.0-16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.40.15-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.0.1-52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.15-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.18-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.48.2-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.22-49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.0-27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.1-40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.4-70</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.24-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.02~beta2-104</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.23-20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.31-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.111-33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.101-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15.5-8.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.15-28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.21-69</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.5-39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.0-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.1-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.1-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.2-22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28-40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2-29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.9-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.21.1-46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.5-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-353.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.28-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.4-18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.11-23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12.5-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.26-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.27-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.52.16-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2j-55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-102</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.0-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.40.1-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.50-13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.22-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.8-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.113-5.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.43.0-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.4-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.13-16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.9-24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.5.2-29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.2-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.25-25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.54.1-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.31-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.7-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.3-19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.3-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:228-117</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.25-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.6-26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.10-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.28.2-19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.1-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.4-27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.1-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.4-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.5-28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0-54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p8-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2p2-55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.8-16.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.20.1-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.18.2-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.0-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.5-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.7-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:16.0.0-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.1-6.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.1-27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.3-21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.11.2-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.0-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.0-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.2.4-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.3-22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0-85</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.84.0-13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.88+-96</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.27.1-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.1-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.18.3-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.4-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.18.4-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.2-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.3-157</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.13-31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.0_12-23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.99.917.641_ge4ef6e9-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.0-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.22-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.206-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.23-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.57-16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">12.3</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-70</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.2.0esr-108</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.12-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:13.2+git20140911.61c1681-36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.27.2-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.2-49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.9-27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3-82</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3-82</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.2-32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11-35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.5-19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.58-17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.5-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.22-28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.76-17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:044-113</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.33_k4.4.73_5-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.42.11-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.3-19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.12-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.6-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12.0-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.3-7.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.34.0-18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.0-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.15-22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.18-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.22-61</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.5-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.1-49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.4-76</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.27-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.24-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.02-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.3-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.23-25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.36-17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.31-16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.3-17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.3-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.3-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.326-16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.11-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.141-42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.2-2.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.2-2.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.131-26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.16-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.73-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.4-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.2-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.2-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.2-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.1-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.11-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.2-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.10-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0-18.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.2-25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.2-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.29.2-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15.2-24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.41.rc1-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.5+git.27.6afd48b1083-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6.3-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.2.26539-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.29.5-57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2d-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.0-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.4-33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.14-194</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.0-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.29-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.2-16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.4-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.30-28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.66.3-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2j-59</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-105</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.0-20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.39-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12-19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.50-19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.22-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.8-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.13-27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.6-24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.5.1-42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.9-18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.25-35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.33-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.8-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:228-142</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.7-43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.0-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.0-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.1.5-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.7-47</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.4-45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.28-16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.8-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.4-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.13.62-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.11.0-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.13.1-18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p10-63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2p2-69</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.8-16.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.8-23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.25-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.5-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.1-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.0-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.3-23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.7-20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.24.0-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.24-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.8-16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.3-25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.20p2-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0-94</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.88+-99</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.27.1-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.0-13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.14-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.3.git20161120-160</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14-20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.0_08-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.99.917.770_gcb6ba2da-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.0-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-71</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.36-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.2-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.11-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">12.4</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.85</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.9.0esr-109.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.12-13.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.312.333-3.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:13.2+git20140911.61c1681-38.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.42-16.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.14-8.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.7+2.3.4-4.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.9-28.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3-83.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3-83.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.11.2-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.31-9.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.13-5.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.2.8+git.1536505967.080f2248ff-2.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.5-9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.100.2-33.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0-148.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.25-13.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11-36.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.5-31.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.58-19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.60.0-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.12-182.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.26-8.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.22-29.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.3-10.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.78-18.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:044.1-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.43.8-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:103-8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.3-25.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.13-8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.2-6.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.6-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.22-10.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12.0-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0~git.1463131968.4e66df7-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.3-7.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.3-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.36-58.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-24.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.34.0-19.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.40.20-5.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.0.1-54.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.25-23.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.18-9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.22-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.0-28.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.1-50.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.4-77.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.3-23.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.27-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.24-9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.02-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.0beta-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6-9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.1-8.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.181-43.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.181-27.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4-8.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.16-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-94.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20180525-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7-9.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.4-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.2-6.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.14-4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.2-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0-18.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.29.2-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15.2-25.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.90-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.124.aee309c5c18-3.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.5-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.21-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.1-5.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.21-8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.29.5-58.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.61</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-16.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.1b-184.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.28-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.16.1-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.4-34.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.14-195.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.20.3-2.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.3-31.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:62.2.0-31.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.2-31.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2.0dev-22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.29-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.4-6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.2-17.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.9.0+git20170610.f6dd59a-15.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.13-7.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.35-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.9-58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.9-3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-4.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2p-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2p-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-106.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.39-8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12-20.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.2-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.113-5.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.43.0-16.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.9-11.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.6-25.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.1.1-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.7-8.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.4-21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.0.5.2-43.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.25-36.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.7.3-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.62.2-5.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.33-3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.8-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.3-12.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.5-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:228-150.49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-17.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.3.0-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.60.99-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.9-48.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.2-2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.3-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.1-13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:16.19.0-2.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.13.67-10.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.11.0-2.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.2.18-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.1-55.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p12-64.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.08-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-18.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.8-16.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.20.1-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.8-24.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.5-8.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0019-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.22-269.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.5-15.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:16.0.0-4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.1-6.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.2-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.0-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017+git1510945757.b2662641d5-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.11.2-16.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.0-13.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.24.0-3.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.21~rc-1001.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.8-17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.1-27.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.22.0+git.20160103-15.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.16.0-8.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.3-26.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.20p2-3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0-95.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.27.1-15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.2-14.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2-11.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.5e-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20180807a-13.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.6-7.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.00-33.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14-21.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2-15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20140630-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.11.0_08-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.15.0-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.15-8.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.19.6-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.48-3.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.1-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.17-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.5-6.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.45-21.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.22+git.1455008135.15c5e92-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.5-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.15-19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.35-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10-17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.3-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.25+git.1485179354.eb43835-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.11-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.16-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.35-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.6-9.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.1+git.1537269352.7b1fd536-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.19+20180928.0d2680780-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.2-31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:16.05.8.1-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.1-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.5-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.13-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.0-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.9.5-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.4-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.15-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.10-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.40-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.8-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.4-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.13-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.3-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.5.2-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.26.9-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-120</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.6-33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.3-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.0-13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.17-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.2-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.2_k3.12.28_4-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4-724</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.18-35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.7-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.22.1-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.13-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.00-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.55-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.16-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.40-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.8-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.3-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.5.6-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.26.10-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.0-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.10-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr1.10-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.10-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.2-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.2_k3.12.49_11-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.26-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.9-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.8-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.13-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.00-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.23-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.2-24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.23-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.14-18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.37-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.4-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.5.6-18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.32.4-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.0-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.50-28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr3.0-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.32-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.9-16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.3-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.1-24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.2-17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.22.1-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.18-26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.21-23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.36-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.2-31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.15-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.23-28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.1.8-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.1.8_k4.4.73_5-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.30.2-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.14-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12.3-26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.32.4-19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.0-18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-255</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.5-37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr4.5-29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.30-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.34-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.33-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.021-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.3-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12-25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.22.1-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.25-48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.21-25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.43-23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.2-39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.4-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.14-19.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-290.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2.1-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2.1_k4.12.14_94.41-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.11.4-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.11.4_k4.12.14_94.41-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.3-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.15-2.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12.3-27.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.32.4-21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.0-19.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.30-38.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.20-30.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.3-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.4-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-17.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.12-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.5-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.5-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.17-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.9-17.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.6-3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.39-4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.021-12.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5-10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.5-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.4-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12-26.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.38-52.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-30.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.00-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20170711_1.9.7-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.0.12-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.2-40.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.206-36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.0-167</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12.6-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.3-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.3-261</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.12-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.10-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.7-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.148.1-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.3-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.5c-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.5-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.13-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.20100204cvs-25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.2-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.152.0-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0.b5-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.9-1075</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10-24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.2-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.35-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.03.0-6.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-73</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.0-168</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.12-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.9-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.1-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.4-14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.2-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.158.0-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-108</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7-49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.03.0-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.12-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20171128-9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.9-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.1-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.11.9-6.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.4-14.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.2dev-22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2013.20130620-22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2013.20130620.svn30088-22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2013.20130620.svn25623-22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2013.20130620.svn29741-22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2013.20130620.svn8329-22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2013.20130620.svn30845-22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2013.20130620.svn30613-22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2013.20130620.svn3006-22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2013.20130620.svn14050-22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2013.20130620.svn29053-22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2013.20130620.svn30313-22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2013.20130620.svn18674-22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2013.20130620.svn29688-22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2013.20130620.svn6898-22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.19-25.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.2-15.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.42-5.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.09-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7-9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.03.0-8.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.162.1-15.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-109.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7-50.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.7.3-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.12-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5.2-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.3.2-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.5-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.38-44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.39-47</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.32-33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.43-52.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.1-16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.44-52.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.3-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.36-38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.44-52.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.48-52.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.1-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.10-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.2-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.2-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.1-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.4-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.23-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.51-52.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.1-22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.8-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.26-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.60-52.49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.60-52.54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.3.2-22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.51-52.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.51-52.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.1-25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.55-52.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.3-17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.1-28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4-20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:210-70.48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.55-52.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.51-60.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.8-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.26-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.59-60.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.59-60.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.51-60.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.62-60.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.1-36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.02.3-6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.1.6-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:210-114</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.15-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.62-60.64.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.15-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.15-17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.67-60.64.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.67-60.64.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.67-60.64.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.53-60.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.57-60.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:210-104</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.69-60.64.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.69-60.64.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.7-27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.69-60.64.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:15.2.1-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.16.10-12.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.15-20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.74-60.64.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.21-84</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.21-90</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:228-149</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.3.2-40.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:228-150.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.43.0-16.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.1-10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:228-132</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.90-92.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.7-28.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.90-92.50</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.103-92.53</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.49-92.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.49-92.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.38-93</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.103-92.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:228-150.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.15-23.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.114-92.64</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.4.5.1-40.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:228-150.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.103-92.59</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.120-92.70</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:228-150.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.82-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.5.2-43.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.82-6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.92-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.92-6.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.103-6.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.138-94.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.103-6.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.140-94.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.143-94.47</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.155-94.50</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.156-94.57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2013.20130620.svn18336-22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.162-94.69</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:228-150.53</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.114-94.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.26-23.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.4.5.1-43.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.34-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.120-94.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.03.0-8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.126-94.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-24.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.0.3.2-43.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.103-94.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.0.4.2-43.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.15-23.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.131-94.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.178-94.91</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:228-150.66</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-24.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:228-150.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.26a-23.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2.3.2-43.49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.97</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8-22.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.32-32.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.100</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.2-3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:228-150.63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.175-94.79</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.26a-23.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.176-94.88</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.2.21-3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.2-3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:15.2.1-9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.2.25-3.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.26a-23.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2.7.1-43.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:15.2.1-9.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.27-23.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.15-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.425-19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.5-22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.2-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.12-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.1-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.3-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.411-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.71-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.0-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.418-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.3.0esr-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.0-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.17.2-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.7-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-66</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.424-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.19-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.3_06-22.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.3_06_k3.12.48_52.27-22.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.5.0esr-54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-28.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-87</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.15.2-21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.1-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.02~beta2-56.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.559-117</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.5.0esr-24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.3-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.6-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.00-28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.451-77</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.75-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-73</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.1_10-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.1_10_k3.12.36_38-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.5.3esr-27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.13-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.1-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_02-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_02_k3.12.38_44-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.6.0esr-30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.457-80</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.15-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.16-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.79-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.58-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.0.1-16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.15.2-17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.429-23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.460-83</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.4-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_04-18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_04_k3.12.39_47-18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.2-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.1-32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.7.0esr-34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.71-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.0-23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.4.0esr-20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.17.3-16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_06-21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_06_k3.12.39_47-21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.466-86</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.14-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.39-16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.15.2-28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.468-89</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-78</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.481-93</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.491-96</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.8-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.8.0esr-37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.19.2_CKBI_1.98-21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.8-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.20-18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009055999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_08-22.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_08_k3.12.43_52.6-22.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.85-18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.5P1-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.9-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.4-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.508-99</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.8.0esr-40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_10-22.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_10_k3.12.44_52.10-22.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.1-4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.6-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-27.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.438-27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.440-31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.2.1esr-45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.0-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.19.2.0-26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.98.5-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.1-166</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-48.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-48.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-48.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-48.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.7.2.1-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.442-67</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.521-102</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.3.0esr-48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.9-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.1_rc4-13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.4-8.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.535-105</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.540-108</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.3-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-48.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-48.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-48.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-48.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.10-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.98.6-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-22.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-70</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.3_02-22.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.3_02_k3.12.48_52.27-22.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.0-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.8-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.1-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.2-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.3-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.1-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.1-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.1-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.7-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.2-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.4-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.1-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.2-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.3-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.1-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.1-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.18-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20150827-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.1_08-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.1_08_k3.12.28_4-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.0-17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.12-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.50-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:037-51.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.8-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.12-16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.30.6-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-27.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.554-114</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.0-19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.24-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.12-18.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.5-3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.6-14.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.2.0esr-75</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.0-28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-22.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.54.0-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.1-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.2-18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.8-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1_3335ac1-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.6-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.0-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.5-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.2-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20160511-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.6-19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-48.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-48.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-48.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-48.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.0-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.1-17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-28.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.5-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.30.6-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.95-24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-27.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.6.0esr-57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.0-20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.2-37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.569-120</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-22.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.11-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.6-14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.6-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.6.1esr-60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-27.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-94</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.1-13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.577-123</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.3-16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.7.0esr-63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.2-40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-28.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.12-18.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.0-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.99-27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.616-126</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.0.2-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.1-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-18.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.1-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.16-13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.1-20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-27.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.101-30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p6-46.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.12.4-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.8.0esr-66</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-97</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.9-22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.621-130</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_02-22.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_02_k3.12.55_52.42-22.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.11-25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.22-20.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0-82</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.1-24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-48.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-48.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-48.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-48.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.4-8.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p8-46.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.2-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.626-133</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.25-20.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2007e_suse-19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.5-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.19.2.2-32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.02~beta2-73</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.24-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.5-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.2_02-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.2_02_k3.12.49_11-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.632-137</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.10-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.18.4-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.3_08-17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.3_08_k3.12.59_60.45-17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.3.0esr-78</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.0-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25.35.1-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.0-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.26-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.635-140</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.3_10-20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.3_10_k3.12.62_60.62-20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.6-31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.2-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.1-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.2-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.10-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.637-143</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.24-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.15-29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.22-22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.5.1-28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.1-26.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.5-17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.643-146</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.72-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.14-181</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.644-149</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.2-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2-82</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2-82</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.111-17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.27.1-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.28-17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.326-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-47</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.121-36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2007e_suse-22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.39-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.5.0esr-88</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.21.3-50</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.5.1esr-93</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_02-22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_02_k3.12.67_60.64.18-22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.0.0.186-152</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.22-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p9-55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_04-22.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_04_k3.12.67_60.64.24-22.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.6.0esr-96</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14-17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.71-13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.7-35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.3-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.2_06-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.2_06_k3.12.53_60.30-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.18.2-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.77-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.41.3-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p6-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.22-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-47</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.91-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p7-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.1-6.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.5-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.25-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.31-13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.36-11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.23-19.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.23-19.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.121-20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.15-16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11-32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.5-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.29-22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.7.0esr-99</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.7-40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-54.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.131-39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.0.0.221-158</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.14-184</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-59</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_06-22.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_06_k3.12.69_60.64.32-22.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.8-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-54.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:037-91</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.22-24.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.0-10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.1.0-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:25.0.0.127-162</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.8.0esr-102</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.0.0.194-155</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-53</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:25.0.0.148-165</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-59</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.36-11.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-2.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.25-28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p10-60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.9-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.3-24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_10-22.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_10_k3.12.69_60.64.35-22.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.2-54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:25.0.0.171-168</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.9.0esr-105</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.121-23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.3-13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.30-25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.1_rc4-17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.1-26.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8-10.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.6-44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-2.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.2-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.5-19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.2-31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28-42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.1_02-25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.1_04-28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2-31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.3-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-10.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52-31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.4-42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.12-20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.2_06-42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-41.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-41.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-10.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.9-44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.1-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.11-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.3-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20170511-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.15-18.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.7-10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-74</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.1-6.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:044.1-109.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.14-195.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.4-14.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.36-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.31-29.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.8-48.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:16.15.2-27.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.30-18.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.9-50</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.23-22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.5-15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.40.18-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.54.1-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.144-27.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.4-77.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2p2-66</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.4-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.1-8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.3_03-43.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.13-21.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6.4-3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.34.0-19.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.1-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.22-24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.3_04-43.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.5-31.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.9-48.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.8-44.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009033513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.4-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.3.0esr-109.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.4.0esr-109.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.29.5-58.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.1-268.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.10-48.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.3_06-43.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14-21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.312-2.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.18.0-2.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-41.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-41.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.1-27.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.151-27.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.2.4+git.1481215985.12b091b-16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.22-10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20170530-21.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.4-33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.29.1-9.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.4_02-43.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.5.0esr-109.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.7-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.14-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.4-16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6.6-3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.2-6.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.11-48.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.34.0-19.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28-44.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.1_06-31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0-16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-41.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-41.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.1.0-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2-36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:044-108</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.2_02-36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.2_04-39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.2-39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-10.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.4-36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.4-39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.1-17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.1-13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.8-16.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-24.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.0-13.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-48.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.18.5-2.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.3-33.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-24.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.25-36.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.6.0esr-109.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-41.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-41.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.33-29.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.22-62.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.4_06-43.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6.7-3.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.30-29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.3-10.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.13.67-10.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.22-62.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.1-27.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.171-43.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.161-27.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.16-21.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20170530-21.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.34-29.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20180312-13.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6.8-3.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.4-33.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.13-48.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.22-62.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-41.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-41.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.7.3esr-109.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.47</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.17-21.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.161-43.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.5_02-43.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.15-21.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.32-29.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20170530-21.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.0-13.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.9-55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.7+git.38.90b2cdb4f22-3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:16.15.3-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.4-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.1-13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.11-7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.1-10.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.3-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.1-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20170511-16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.0_11-3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:16.15.6-2.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.32-21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.0-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.0_12-3.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.8-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.7+git.51.327af8d0a11-3.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.0_14-3.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.312.333-3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.1_02-3.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.9+git.59.c2cff9cea4c-3.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.13.67-10.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.22-62.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20170530-21.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20180425-13.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.14+git.150.1540e575faf-3.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.171-27.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6.9-3.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p11-64.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.35-29.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.8.1esr-109.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.9-11.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.7+2.3.4-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.3-17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.7-8.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.0-11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20180703-13.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.34.0-19.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.1-27.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.24.0-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.3-23.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.2_08-3.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.29.2-3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.25-36.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.1-55.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.34.0-19.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.41.rc1-10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.113-5.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.2.7+git.1531910353.c0ef85b854-2.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-8.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.14+git.157.c2d53c2b191-3.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.100.1-33.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20180807-13.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.29.2-3.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.2_10-3.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.41.rc1-10.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-18.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.74</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:16.17.20-2.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.45-21.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.79</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.82</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.8-7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.14-195.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6.10-3.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.3_03-3.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-6.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-6.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-6.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6-11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2013.1.13-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.10-48.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:60.2.2esr-109.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:60-32.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.36.4-58.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.19-19.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-5.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.13.0-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.2-26.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:60.3.0-109.50</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.6-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.2-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.11.2-16.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.23-12.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.9-61</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.93</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-7.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:16.0.0-4.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:18.0.1-4.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-106.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.3_03-3.47</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.7-12.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0+-6.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-6.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-6.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.2-14.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.2-6.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.13-5.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.1_08-3.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.0-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:60.4.0esr-109.55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.40.1-58.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.20-19.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.11-48.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.33-4.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.33_k4.4.114_94.11-4.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.13+git.72.2a684235f41-3.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.10-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-6.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-6.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-6.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.33-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.1-5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.13.67-10.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.6-25.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p11-64.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.14-48.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.54.0-26.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.1-10.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.0-6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.13.0-13.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.13.4-10.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.1-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.7-10.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20180403-16.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.2_04-3.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-6.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-6.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-6.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.8.0esr-109.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3-83.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3-83.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.2.5+git.1524775272.5e7ea8cf03-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.2_06-3.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2013.1.13-5.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.0-2.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.108</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.154.2998451b912-3.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.14-48.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.3-20.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-15.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.0-160.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.3-31.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:62.2.0-31.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.2-31.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0-95.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.1-2.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.1-8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.212-27.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.28-17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20190507-13.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0+-6.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-6.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-6.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.4_04-3.53</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.4-30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20190514-13.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.0.2-10.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.13-5.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0~git.1463131968.4e66df7-12.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.4-23.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9-3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.12-48.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:60.7.0-109.72</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.4-77.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.22.6-19.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.221-43.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.7-12.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.14.1-13.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.14.1-10.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.10-10.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20190423-16.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.326-17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.22.5-2.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.11-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.4-34.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.8-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.6-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.3-13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-9.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.36-18.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.3-20.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-106.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.15-48.48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.66.3-8.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:60.7.2-109.80</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6.13-3.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.123</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.78-18.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.158-7.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.113-5.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.4-27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.24.0-3.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.8-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.6-25.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1-11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:60.5.0esr-109.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:60-32.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.41.1-58.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0-5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.9-11.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20170530-21.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.201-43.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.2.10+git.1549630712.bb089269ea-2.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.22.6-2.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.191-27.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0+-6.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-6.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-6.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.22.4-2.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.4-3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.3-20.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.11-21.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.13-48.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20190312-13.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-24.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.3.git20161120-161.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p13-85</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.2-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.4-34.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.4-34.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3-83.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3-83.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.22-10.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:60.6.1esr-109.63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.100.3-33.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.15-15.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.4_02-3.50</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14-21.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0+-6.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-6.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-6.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-5.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.6-25.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2p-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.2-5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0+-5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.0-5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017+git1510945757.b2662641d5-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.37-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.22-100.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1b-2.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017+git1510945757.b2662641d5-3.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.2-5.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0+-5.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.0-5.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-5.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.11.1_06-2.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.0-8.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.16.1-4.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.0-8.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.22-100.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.6-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.9-1.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.4-15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20190618-5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-21.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.0~git.1456906198.f422461-21.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.2-2.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:60.8.0-109.83</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.44.1-58.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.28-17.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20190618-13.47</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.6-30.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.2-44.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-6.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.36-2.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:16.20.0-2.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.51-21.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2-59.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.11-59.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.60.0-4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.126</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.6-30.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-6.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.231-43.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.113-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.222-27.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.6-25.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.2-6.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.2-14.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.16-48.51</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.38-2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-4.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.12-13.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.36-2.27.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:16.20.2-27.60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.54-18.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.10-1.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.2-2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.4-2.47</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.2-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0+-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.0-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.2.12+git.1568024032.02236657ca-2.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.60.0-4.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.13-15.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:60.9.0-109.86</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-21.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.25.3-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.11.1_02-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.60.0-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.2-5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0+-5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.0-5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.16.1-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.1-10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2p-3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017+git1510945757.b2662641d5-3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017+git1510945757.b2662641d5-3.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-2.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.11.1_04-2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.0-8.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">12.5</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4-2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-18.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-18.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-18.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-22.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-26.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_k3.12.61_52.133-26.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.2_k3.12.61_52.133-22.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.4.7-9.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.4.7_k3.12.61_52.133-9.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.6_k3.12.61_52.133-22.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.2_k3.12.61_52.133-22.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-18.49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-18.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1+git.1456406635.49e230d-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.13-20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-35.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_k3.12.74_60.64.93-27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.2_k3.12.74_60.64.93-35.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.6-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.6_k3.12.74_60.64.93-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.6_k3.12.74_60.64.93-35.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.2_k3.12.74_60.64.93-35.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.15-21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0+git.1448981395.15fb8b9-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.92</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.95</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.5-6.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.80</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.109</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.114</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.117</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.120</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.101</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.104</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.1+git.1495055229.643177f1-2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.0.8+git.c8bc3670-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.0.8+git.c8bc3670_k4.4.131_94.29-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.16-6.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.3+20171226.6d62b64-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.103</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.19+20181105.ccd6b5b10-3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.0+git.1558595666.5f79f9e9-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.19+20181105.ccd6b5b10-3.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6-17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-18.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-18.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10-18.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-23.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-4.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-4.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5-2.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6-2.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4-2.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-6.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2016.11.4-46.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2016.11.4-46.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2016.11.4-45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2018.3.0-46.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2018.3.0-46.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.1-32.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8-19.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.18-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.7-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.3-49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.5-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.2-20160727</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5-20160727</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.4+gitr565_0366d7e-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.3-81</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.31.0-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.52.0-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.1+gitr2816_02f8fa7-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-20160308170633</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-20160304104123</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-20160307082632</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.3-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.3-66</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.0-20.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.4-20171002</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.7-20171002</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.5+gitr569_2a5e70c-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.6-87</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.1+gitr2819_50a19c6-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.18-12.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-20180821</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.18-12.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.9+gitr706_06b9cb351610-16.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.09.1_ce-98.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.0.1+gitr2066_7b2b1feb1de4-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0rc4+gitr3338_3f2f8b84a77f-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.2-13.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-16.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:18.09.6_ce-98.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.0.1+gitr2726_872f0a83c98a-19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0rc6+gitr3804_2b18fe1d885e-1.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:18.09.6_ce-98.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.6-16.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:19.03.1_ce-98.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.0.1+gitr2800_fc5a7d91d54c-25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0rc8+gitr3826_425e105d5a03-1.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0rc5+gitr3562_69663f0bd4b6-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.2-16.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:18.09.1_ce-98.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.0.1+gitr2711_2cfbf9b1f981-16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0rc6+gitr3748_96ec2177ae84-1.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.02.9-6.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:16.05.8.1-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.33-7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.02.11-6.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.02.10-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.3-4.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.2-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.37-16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.4-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.7-22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.3-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.15-27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.37-18.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.30-40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.35-43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.20-30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.25-34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.26-37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.50-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.41-46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.45-49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.37-18.24.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.24.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.60-52.57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.60-52.60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.60-52.63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.4-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.74-60.64.48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.61-52.80</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.74-60.64.51</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.61-52.83</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.11-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.61-52.86</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.74-60.64.54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15.2-2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.74-60.64.60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.61-52.92</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.74-60.64.63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.61-52.101</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.74-60.64.66</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.61-52.106</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.61-52.66</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.61-52.69</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.61-52.72</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.61-52.77</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.74-60.64.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.74-60.64.96</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.61-52.136</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15.2-2.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.18.5-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.61-52.141</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.74-60.64.99</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.18.5-2.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.37-52.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.74-60.64.104</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.74-60.64.107</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.61-52.146</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.74-60.64.69</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.61-52.119</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.74-60.64.82</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.61-52.125</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.74-60.64.85</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.61-52.111</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.61-52.128</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.74-60.64.88</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.74-60.64.93</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.61-52.133</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.61-52.149</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.74-60.64.110</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.22-3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.74-60.64.115</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.61-52.154</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.74-60.64.118</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.74-60.64.121</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.22-3.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-68</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.0-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-78</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7-20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-83</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.1-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7-25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-86</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-53</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-59</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-64</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.4-15.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.11.1-11.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7-50.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-109.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7-50.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-109.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7-50.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-109.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-89</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7-35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-96</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-99</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.3-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7-38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7-28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7-50.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.14.3-11.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-109.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7-50.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7-50.49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.1-15.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-109.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.14.4-11.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.7-15.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.12.2-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7-50.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7-50.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-109.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-109.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7-50.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-109.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.1-15.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7-50.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.14.1-11.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-109.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7-50.70</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.1-15.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-109.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2.5-1.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7-50.75</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2.5-1.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7-50.80</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-109.63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.1-15.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.17.0-11.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7-50.85</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2.5-1.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7-50.63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.16.0-11.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-109.48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.1-15.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.17.0-11.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-109.51</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2.5-1.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.5_04-43.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.15-30.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.25-38.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.85</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.6_02-43.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1_k4.4.121_92.92-9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.6_04-43.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:16.17.20-27.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.45-18.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.15-18.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.14-17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-41.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-41.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.58-15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10-17.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1_k4.4.121_92.95-9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.6_05-43.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.14-19.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.19-21.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.35-38.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.25-30.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12.3-27.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.1-17.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-41.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-41.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.17-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.73</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.5_02-43.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-41.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-41.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.3-17.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-19.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-122.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-41.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-41.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.45-38.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.6_06-43.51</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.22-24.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.35-30.50</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.22-62.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.6_05-43.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.38-29.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.61</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-41.55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-41.55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.24-21.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6.15-3.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.7-10.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.50-38.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.40-30.54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.9-17.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28-44.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-41.49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-41.49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.9-17.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.40-38.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.30-30.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.6_06-43.48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.13-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.36-17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.3-17.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.3-17.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12.3-27.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12.3-27.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.43-29.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.3-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.23-21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.29.1-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.23-16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.6-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.1-25.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.1.5-15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.1.5_k4.4.114_92.67-15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.50-29.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.39-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.58-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.61-60.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.67-60.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.69-60.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.74-7.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.88-18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.95-21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.104-24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.114-27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.1.5_k4.4.21_6-15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.138-3.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.139-3.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.147-3.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.155-3.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.162-3.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.162-3.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.120-3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.128-3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.170-3.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.172-3.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.26-20.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.10-14.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25.16.1-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-27.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.14-10.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.27-20.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-28.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.14-19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:210-70.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_04-22.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_04_k3.12.60_52.54-22.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-28.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-48.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-48.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-48.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-48.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.28-20.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-48.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-48.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-48.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-48.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.60-31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_05-22.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_05_k3.12.60_52.57-22.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p9-46.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_05-22.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_05_k3.12.60_52.63-22.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.98.9-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-2.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.78-7.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-28.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-2.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_21-22.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_21_k3.12.61_52.77-22.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.4-8.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.15.2-30.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.3-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.31-20.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.44.2-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.18-25.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.10-38.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_22-22.51</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_22_k3.12.61_52.89-22.51</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.32-20.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.4-8.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.29-20.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-24.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_14-22.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_14_k3.12.61_52.66-22.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-28.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-48.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009056999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-48.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-48.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-48.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.1-34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-28.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-28.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p10-46.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_16-22.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_16_k3.12.61_52.69-22.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_18-22.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_18_k3.12.61_52.69-22.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.30-20.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-18.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.17-24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.1-26.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-22.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_12-22.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_12_k3.12.74_60.64.45-22.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.5-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.15.2-53.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr4.10-30.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_14-22.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_14_k3.12.74_60.64.54-22.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.16-20.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_16-22.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_16_k3.12.74_60.64.57-22.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.16-20.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_18-22.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_18_k3.12.74_60.64.60-22.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-33.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-33.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-33.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-33.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-54.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_20-22.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_20_k3.12.74_60.64.63-22.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.43-10.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.5-30.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.15-38.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-40.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20160516git-10.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_24-22.49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_24_k3.12.74_60.64.93-22.49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-54.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.5.1-19.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_24-22.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_24_k3.12.74_60.64.96-22.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.18.4-22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-40.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0_k3.12.74_60.64.99-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_26-22.55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_26_k3.12.74_60.64.99-22.55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-54.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.16-20.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:15.25.17-46.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.59-46.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-33.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-33.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-33.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-33.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-54.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.14-10.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.53-10.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20160516git-10.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.22.1-16.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-2.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-33.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-33.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-33.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-33.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_24-22.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_24_k3.12.74_60.64.82-22.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.10-30.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.20-38.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-40.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.16-20.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-54.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_24-22.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_24_k3.12.74_60.64.85-22.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-33.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-33.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-33.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-33.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.1-38.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.1-8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-54.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-33.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-33.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-33.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-33.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-54.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-54.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.1-38.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-54.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-33.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-33.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-33.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-33.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0_k3.12.74_60.64.110-4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_28-22.61</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_28_k3.12.74_60.64.110-22.61</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-54.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.18.4-22.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.36-11.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.18.4-22.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.38.2-7.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.3-2.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-33.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-33.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-33.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-33.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.12-13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.5-10.2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.8-10.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-54.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:210-116.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20160516git-10.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-33.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-33.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-33.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-33.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.13-3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:210-116.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.18.4-22.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_28-22.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_28_k3.12.74_60.64.107-22.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.16-20.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2-83.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2-83.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-54.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.6-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.0~git.1456906198.f422461-16.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr2.0-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.151.0-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.10-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.0-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.5.6-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.10-14.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr2.10-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.5.6-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.20-18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.30-21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10-18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.22.1-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.22.1-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.2-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10-21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.40-25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr2.0-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.16-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6+git20160531.fbfe336-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr3.10-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr3.21-20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr2.10-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr4.0-23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.16-19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr4.1-26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.1-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.2-15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.162.0-15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.20-38.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.2-15.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.15-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:16.11.6-8.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.1.8-4.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:16.11.6-8.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.143-4.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.155-4.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:16.11.8-8.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.2-15.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.15-2.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.1-7.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.6-3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.19-25.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20170731-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.2-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.3-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.2-18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.1-16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.55-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.22-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.4-2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.40-2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.0-3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.2-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-18.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.68-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.18-37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.78-6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:037-51.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.10-14.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_24-22.54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_24_k3.12.61_52.92-22.54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-48.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-48.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-48.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-48.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.82-7.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_26-22.59</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_26_k3.12.61_52.101-22.59</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p11-46.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20140807git-5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_32-22.68</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_32_k3.12.61_52.133-22.68</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_34-22.71</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_34_k3.12.61_52.136-22.71</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-27.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-22.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-16.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1_k3.12.61_52.141-16.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_36-22.74</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_36_k3.12.61_52.141-22.74</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-48.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-48.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-48.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-48.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.4-8.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.25-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:14.45.17-2.82</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.70-2.69</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-48.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-48.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-48.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-48.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.90-7.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.7.2.1-4.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p12-46.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.14-10.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-48.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-48.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-48.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-48.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.37-20.49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.1-4.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20140807git-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_28-22.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_28_k3.12.61_52.119-22.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.34-20.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-22.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.10-14.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-27.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-27.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_30-22.65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_30_k3.12.61_52.125-22.65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.35-20.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-48.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-48.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-48.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-48.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-48.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-48.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-48.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-48.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_40-22.80</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_40_k3.12.61_52.149-22.80</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-27.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-28.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.3.1-2.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-27.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.38.2-7.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-27.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.9-16.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.4-8.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20140807git-5.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:210-70.77</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-48.49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-48.49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-48.49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-48.49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:210-70.74</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.5.1-10.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p13-46.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_40-22.77</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_40_k3.12.61_52.146-22.77</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.10-14.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.3.1-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.14-20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.32-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.18-40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.32-10.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0_k3.12.53_60.30-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.32-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.14-22.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.43-10.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.74-60.64.72</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20160518_1.9.4-7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:16.11.6_k4.4.126_94.22-8.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.1.8_k4.4.131_94.29-4.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1_k4.4.131_94.29-8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.8-3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.8_k4.4.131_94.29-3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017+git1492060560.b6d11d7c46-4.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:16.11.6_k4.4.143_94.47-8.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-8.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1_k4.4.143_94.47-8.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.53-29.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.14-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.53-29.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-8.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1_k4.4.162_94.69-8.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:16.11.8_k4.4.156_94.64-8.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-3.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017+git1492060560.b6d11d7c46-4.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017+git1492060560.b6d11d7c46-4.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.178-4.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.46-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-290.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.40-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.170-4.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.180-4.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017+git1492060560.b6d11d7c46-4.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017+git1492060560.b6d11d7c46-4.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.176-4.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.162-4.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.3-17.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017+git1492060560.b6d11d7c46-4.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.24.0-3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.1-27.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.22-7.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0+-6.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-6.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-6.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.8-6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.46-3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.40.1-29.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-6.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-6.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.0.21-3.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-6.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-6.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.0-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.20.0-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4.dev18-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4~a0~dev78-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4~a0~dev61-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4~a0~dev103-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4~a0~dev80-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.54-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.71-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.3-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.3.0-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:53.0.2785.113-100</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:53.0.2785.143-106</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.4.0-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.5-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.3-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.21.0-18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.8-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.8-22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:54.0.2840.90-112</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.5.1-17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:55.0.2883.75-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.6.0-20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:51.0.2704.103-85</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.5-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.0-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.3-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0-18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.2-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.0.2743.82-89</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.21.0-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.7-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.0.2743.116-92</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:61.0.3163.79-29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:61.0.3163.100-32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.5-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.4-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.99.5-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.4.0-45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.19-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.19-18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.3-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5-32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.5-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.3-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.2-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1.0-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.10-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.5.0-48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.1.9-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:63.0.3239.84-40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:18.3.4.7-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:63.0.3239.108-43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.9-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.5.2-51</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.7-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.7.0-23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:15.12.3-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.6-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:56.0.2924.87-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.14.25-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.26.0-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.26.0-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.8.0-27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:57.0.2987.98-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.19-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.19-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:57.0.2987.133-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.6-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.10-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.4-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:58.0.3029.81-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:58.0.3029.96-17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.1.0-30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.26.0-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.14.25-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.14.25-7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:59.0.3071.86-20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.3-25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.21-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.11-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.8-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.2-36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:59.0.3071.104-23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:16.08.2-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.12-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:60.0.3112.78-26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:15.12.3-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:16.08.2-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.3.0-42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.6-54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:64.0.3282.119-46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20180101-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:64.0.3282.140-49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20180201-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20180201-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:60.3.0-74</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:70.0.3538.102-74</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.8.7-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.8-13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.5-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:71.0.3578.98-80</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:64.0.3282.167-52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.2-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.6-36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:14.4.2-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.19-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.19-21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.1b-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.8-17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.100-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.100-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.4-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.4-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.2.10-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.7-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.10-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.11-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.9-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.7-57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.19-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.19-24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.0.1-20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.17-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:66.0.3359.181-55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.0-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.2-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.15-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.6-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.10-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.4-32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.4.11-20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.8-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:60.6.1-82</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.7-17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.2-lp150.3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.2-25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.10-16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.11-31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.1-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:60.7.2-85</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:75.0.3770.90-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.0.1-31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.1-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.19-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.19-lp151.4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:75.0.3770.142-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.32.0-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.55.0-lp151.2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.14.33-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.14.38-lp151.9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.11-20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.8-lp151.2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.5-35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14.2-16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:60.8.0-88</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:72.0.3626.96-88</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.32.0-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.45.0-lp150.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.32.0-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.112.0-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:60.5.1-79</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:72.0.3626.121-92</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.8-60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.5-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.6-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.7-18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.2-47</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.10-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.7-19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.7-13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.2-23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.20180626-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.9.0-65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:67.0.3396.99-58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:68.0.3440.75-61</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.8-21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:13.0.5-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.3-29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:13.0.8-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:69.0.3497.81-65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20180901-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20180901-lp150.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.04.2-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:69.0.3497.92-68</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.2-13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:69.0.3497.100-71</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:70.0.3538.110-77</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.1-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.3-52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-20160304104143</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-20160308171022</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:69.0.3497.81-lp150.2.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.14.18-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.20.0-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.14.18-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:64.0.3282.140-138</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.20.0-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.14.18-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.26.0-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.14.25-13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.20.0-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.20.0-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.112.0-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.26.0-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.112.0-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.2-23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.1-154</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">11.1</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.9-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.0.r4359-15.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.0.r1053-11.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-83.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.14-2.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.12-23.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17.35-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-14.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.10-2.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4-40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.6-50.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.23-11.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.5.0P2-20.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.36.0-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5-34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-11.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.96-0.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0-22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1-194.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.0-11.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.11-60.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.3.ESV-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.41.9-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:22.3-4.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.4-152.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3.8.90-13.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.24-43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.0-38.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1-7.7.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.2-61.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.26-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.36-26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.62-32.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.22.5-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.23-1.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.8-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.3-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.25-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.17-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.12-69.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.9.8-3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr7.0-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.10-20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.10-23.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.12-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.3-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.17-77.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.2-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-73</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.4-12.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-11.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.5-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.17-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.17-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.17.1-31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.0-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0-7.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.6-2.131</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.5-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.67-13.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.28.3-2.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.26.44-101.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.6-5.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.3-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.21-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.0-8.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.4-194.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.18-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.1-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.4-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.6-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-79</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.24-19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.12-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.2-17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.1-1.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.19-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.9-1.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.17-42.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.6-1.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.13-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4p8-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16-1.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-143</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-47.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:184-147</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.47-13.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.47</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.56-1.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:804.028-50</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.5-26.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.3.9-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.8-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.8b-88</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.7.p72-5.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.STABLE5-2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5final-28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.9p17-21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-27.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.5-7.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-0.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.20-23.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.80.2-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.52-142.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.2-132.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.4-1.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5-1.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.0_21091_04-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.0_21091_04_2.6.32.12_0.7-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-9.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.02-138.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:238-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10-911</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">11.2</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.1_git20090811-3.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.1-5.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.14-2.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.12-23.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-14.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11-6.65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.6-91.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-18.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-1.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.26-1.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.8-0.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR5P1-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5-34.253</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.97.3-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1-194.199</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.11-60.65.64</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.76-34.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.3.P2-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3-44.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.22-3.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.41.9-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:61-1.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2-1001.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:22.3-4.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.4-152.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.26.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3.8.90-13.20.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.24-43.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.0-38.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.2-269.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1-7.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.2-61.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.62-32.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.23-1.50</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.3-0.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.35-5.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.30-5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2-8.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.11.10-0.6.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.10-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr9.3-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14.1-16.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.13-0.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.48.48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.1-0.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-12.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.4-12.22.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-11.18.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11-2.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.34-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.27-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.13.1-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.7-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-307.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0-7.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.94-0.2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.29.6-6.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.52.10-1.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.6-5.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.3-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.23-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.0-8.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.1-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.26.0-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.32.2-4.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.142</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.6-0.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.3-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11-1.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.15-0.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-1.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.7-10.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.3.6-65.72</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.02.84-3.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.14-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2.umip.0.4-8.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.7-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.24-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.6-1.25.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4p8-1.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2-0.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2_3.0.13_0.27-0.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-172.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.51</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16-1.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4-662.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.5-0.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.26.2-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.8-3.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.102-1.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.816-2.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.1-10.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.3.14-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.12-0.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.22-3.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.11-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1-1.24.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.8.7-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.7.p357-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.STABLE5-2.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.12-8.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-13.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5final-28.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.71.47-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-27.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.5-7.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-9.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.1-100.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.26-1.2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.48-101.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.10-0.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.0.18-20.35.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.00-11.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.22.5-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.2-132.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.10-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.2_14-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.2_14_3.0.13_0.27-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-9.47</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17.119-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17.44-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">11.3</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.0.3-0.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.4esr-0.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.1_git20090811-3.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.14-2.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.12-23.68</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-14.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11-6.90</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.6-91.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-20.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-16.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-1.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-0.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-0.2.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.23-11.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR7P4-0.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.36.0-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.97.7-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1-194.207</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.12-144.23.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3-44.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.41.9-2.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:61-1.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.24-43.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1-7.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.7-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.62-32.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.22.5-0.8.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.3-0.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.20.4-0.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.12-69.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.7-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.1-253.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr13.1-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr4.1-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6b-879.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2.0-879.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.12.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.76-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.1-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-12.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-11.18.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.37.1-5.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.41-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.1.9-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.17-2.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.14.3-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.0-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.31-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.50</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.0-10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.3-1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.1-2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.8-0.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.32.2-4.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.4-0.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.152</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.10-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.2-0.2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5.1-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.24-19.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.7-10.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.02.98-0.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.14-9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.27-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.6-1.25.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.16-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.3-18.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4p8-1.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.76_0.11-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.2-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-47.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.47-13.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.67</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2808.01-0.67</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.72-0.67</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.3.23-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.18-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.22-3.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.0-3.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.47</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10.1-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.7.p357-0.9.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.11-0.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.0-1.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.STABLE5-2.12.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.12-8.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5final-28.23.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.54-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.71.61-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-27.34.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.5-7.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-9.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.1-100.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5-19.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.48-101.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.10-0.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.0.18-20.35.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.1-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.6-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.12-517.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.2_04-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.2_04_3.0.76_0.11-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-9.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.81</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-1.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.3.99-17.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.3.99-3.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17.129-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17.45-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">11.4</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.0.3-0.28.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.7.0esr-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.14-2.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.12-23.76</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-14.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.13-1326.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11-6.105</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-20.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-16.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-1.51.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.40-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-0.4.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4-40.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-0.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-0.2.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.0-3.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.1-4.131.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.23-11.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2-147.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2-147.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.36.0-12.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.49.0-0.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1-0.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.98.7-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.12-6.25.32.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9-75.78</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1-194.211.213</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.71-0.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.41.9-2.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.152-4.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:22.3-4.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.95-1.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.24-43.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1-7.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.35.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.7-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.22.5-0.8.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.84</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.3-0.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.6-25.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.30-5.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.20.12-0.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.11.10-0.6.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.7-0.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.3-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-1.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.0-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14.1-16.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.12.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.11.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.4-255.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.66</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.17-77.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-12.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.1-68.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.4-12.22.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19.1-6.72</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.41.rc1-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.52-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.4-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.5-24.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.17.3-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.3+r212056-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.0-1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.1-134.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-1.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.03-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.2-3.118</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.20060920alpha-74.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.43-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.70</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.4-0.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.3-1.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.23-0.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.9-4.2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.4-0.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5-1.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.154</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.10-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.3-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-1.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11-1.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.15-0.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.24-19.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.7-10.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.3.6-65.74</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.02.98-0.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.0-0.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.5-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.7-0.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.7-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.17-42.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.6-1.25.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12-24.4.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.16-0.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.3-18.38.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p2-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1-20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_63-20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-172.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.5-0.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.72</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2808.01-0.72</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.72-0.72</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7-37.63.64</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2.3-37.63.64</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.22-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.5.git-2.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.22-240.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.26-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.22-3.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.6-168.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.6-0.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7-6.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1-1.24.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10.1-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.7.p357-0.9.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.11-0.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.14.3-50.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.318.81ee561d-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.STABLE5-2.12.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.12-8.16.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5final-28.23.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.71.61-0.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.5-7.50</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.26-1.2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.9.8-1.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.0.41-0.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.00-11.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.1-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.1-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.7-4.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.4-1.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.13-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.1-6.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-217.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_08-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_08_3.0.101_63-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.14-130.133</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-9.65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.105</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-1.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-1.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-1.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.3.99-3.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17.140-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17.46-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-0.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-172.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.5-1.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.11-0.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.54-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.7-4.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.4-1.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.0-29.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2-31.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2.18-4.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2011.10.10-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:15.6-95</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.114.6-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.3.1.4-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.6-0.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.22.0-294.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.2-3.34.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.12.4-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.14-401</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-2.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.46-62.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.2-1.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.1b-130</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.11a-116.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.10-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3.3.26-0.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.5.5-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.5-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009057999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2-5.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.9-9.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.3-126</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.7-0.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.8.4-206.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.14-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.15-23.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.17-481.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.3-0.10.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20-2.54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.6-143</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.6-5.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.3-249.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.1-2.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.6-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.139.2-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.3-1.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.10-120.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.1-28.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.56.2-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6c11-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.1-0.5.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-0.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.0-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.5-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.2-0.12.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.9.1-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.1-0.7.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.05-1.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.7-7.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.9-162.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.17-1.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.10-2.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2007-219.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.1-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.11.2-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-1.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.50</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.8-0.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-0.2.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.4P2-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.7-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.33.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.20.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.11.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.6-0.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.2-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.13.6-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.3-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.14-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.4-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.14.1-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.8-56.51</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.8-56.44.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.5-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.14.2-0.4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.6-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.14.3-0.4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.12.4-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.45.49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.47</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4-0.7.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.46-62.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.2-170.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2012.9.13-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.18-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr15.0-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr6.0-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.20.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.16.0-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.4.13-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.32.2-4.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.6-0.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.6-0.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.7-0.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20-2.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.1-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.15.2-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.6-1.25.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.2-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.15.3-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.15.3.1-0.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.61.61</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7-37.50</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2.3-37.50</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.8-0.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.4-0.7.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.10-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.6-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.7.p357-0.9.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.17-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.17-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.2-1.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.17-0.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.14-0.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.14-0.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.0-0.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.17-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.17-1.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.12-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.4_02-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.6-0.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.2_20-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3_02-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3_04-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.5_02-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_02-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_04-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.70.76</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-1.22.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.6.0esr-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.6-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.1-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.0.3-0.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.9esr-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.8.0esr-0.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.5.0esr-28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.5.0esr-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.4-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.6.0esr-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.8.0esr-0.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.8-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.19.2_CKBI_1.98-0.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-1.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-59</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-0.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.0-3.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2-147.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.23.1-0.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.41.9-2.10.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19.1-6.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.6-0.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.7esr-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.10esr-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.3.0esr-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.15.4-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.4.0esr-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.7.0esr-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.2-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.8.0esr-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.4-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.3.0esr-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.4.0esr-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.5.3esr-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.9-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.3.0esr-22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.4.0esr-25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.10-16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.19.2.1-19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.2.0esr-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.15.3.1-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.2.0esr-0.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.17.2-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.2.1esr-19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.19.2.0-0.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6-13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.12.4-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.72</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.87</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.95</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.51</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.20.4-0.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.7-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0-7.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.2-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.7-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.15-46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr8.0-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.10-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.20-42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.12.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.71</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.97</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.103</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.64</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.68</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-0.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.1.12-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.5-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-1.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.20060920alpha-74.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.39-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.66</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.23-0.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3.3.26-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.26.0-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5-1.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.1-156</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.8.4-206.29.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.0-0.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.0-0.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.7-0.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.6.0esr-31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.2-25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.8-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.19.2.2-22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.15.2-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.45-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.46-0.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.47-0.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.15.3-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.80</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.152.0-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.5-0.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.70</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7-37.60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2.3-37.60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.5-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.1.15-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.1.18-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.1.19-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-8.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-8.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-8.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-8.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6c8-10.19.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6c11-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.7.p357-0.9.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.17-0.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-0.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-0.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.0-0.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.6-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.5-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-76</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-64</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0u-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.9-162.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.17-1.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.160</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.11-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.7-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.9-0.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_06-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_02-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_12-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_14-18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.2_06-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.3_02-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.3_08-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4_02-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4_04-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_04-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_08-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_18-21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.8-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.85</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.5-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.5-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.59</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.77</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.78.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.78.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.78.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.78.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.78.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.78.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.78.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-78.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-78.47</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-78.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-78.61</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-78.66</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-78.72</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-78.78</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-78.85</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.77</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.59</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.74</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.79</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.92</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.1-159</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.1-160.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.1-160.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.1-160.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.6.1esr-34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.8.0esr-40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12-26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.2-30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.2.0esr-45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.0-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12-29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.21.1-35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.3.0esr-50</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.4.0esr-53</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.6.0esr-62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.7.0esr-65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.8.0esr-68</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.9.0esr-71</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.13.1-32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.29.5-46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.2.0esr-72.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.29.5-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.3.0esr-72.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.5.0esr-72.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.6.0esr-72.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.7.3esr-72.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.8.0esr-72.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.8.1esr-72.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.9.0esr-72.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.7.0esr-37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12-24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.2-28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-83.17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.13-106.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.6-84.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.6-84.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_12-23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.0-29.17.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-20.11.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-16.11.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-64</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-69</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2-31.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.6-142.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.0-3.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.23-35.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2-147.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2-147.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2-147.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2-147.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.47</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.50</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.51.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.5-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-318</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20171128-8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.162.1-7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.8-2.3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.12-56.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.9-30.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.114.6-0.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.56.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.61</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.64</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.69</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.70.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.70.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.70.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.12-144.23.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.11-60.65.67</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.28.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.28.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-8.3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:22.3-42.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.42.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.4.0esr-72.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.29.5-47.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.0-10.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1-7.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1-7.25.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.45.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.45.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.7-0.11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.4_20091019-37.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.4_20091019-37.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.5-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.5-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52.33.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.62-32.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.62-32.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.62-32.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.62-32.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.62-32.47.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.47.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.62-32.47.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.47.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.62-32.47.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.47.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6-21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.2-3.34.47</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.12.4-0.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.12.4-0.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.12.4-0.18.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.12.4-0.18.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.12.4-0.18.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.22.5-0.8.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.102</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.109</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.67</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.70</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.35-5.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.45.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.5-24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0-7.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0-38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0-43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0-46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0-47.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-2.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.14-134.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.14-134.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.14-134.33.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.10-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.20-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.30-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.40-13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.60-19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.1-22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.5-25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.10-26.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.15-26.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.20-26.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.25-26.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.30-26.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.35-26.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.40-26.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.50-16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6b-879.12.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2.0-879.12.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.10-23.30.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-80</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-88</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-94</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-97</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-104</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.71</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-71</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.68</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.77</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.87</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-68</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-77</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-84</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-107</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.81</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1-22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1-22.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.106</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.109</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.113.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.4-12.22.23.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-11.18.19.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.3-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-7.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.41.rc1-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.20-97</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.5-24.24.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.17-2.14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.43-1.10.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.1b-132.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-1.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.11a-116.2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.20060920alpha-74.11.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.0-3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.0-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.0-10.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.3-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.3-6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.03.beta1-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.8-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.4.2-23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.1-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20150827-23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.19.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.19.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2-5.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.9-4.2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.3-17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.1-1.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.1-1.13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.1-1.13.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-23.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-23.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-23.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.20.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.20.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.20.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.20.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.50</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.64</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.69</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.76</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.24-19.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20-2.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-91</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-100</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.6-145</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.6-146.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.6-5.17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.6-5.17.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.18.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.18.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.18.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.5.1esr-59</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.21.3-39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.7-0.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5-24.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.49-0.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.8.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.52-0.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.53-0.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.54-0.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.55-0.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.57-0.39.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.58-0.39.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.59-0.39.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.60-0.39.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.61-0.39.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.62-0.39.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.6-1.25.36.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.03.90-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.4-1.16.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6-92</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6-93.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6-93.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6-93.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.3-249.23.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.26.44-101.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2011.4.12-0.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5-1.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.02.1-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.02.1-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.02.1-4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.6-5.27.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-172.27.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.89</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.97</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.102</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.105</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.3-0.16.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.5-0.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.80</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.81.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.81.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.81.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.008-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.008-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.008-10.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.710.08-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-59</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-71</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-74</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-79</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-84</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-87</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-94</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-101</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-108</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-111</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.53</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.6-0.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.6-0.30.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.3-1.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.3-1.13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.6-0.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.9-0.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.12-0.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.13-0.23.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.15-0.23.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.16-0.23.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.17-0.23.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.19-0.23.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.5.git-2.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.9-39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-8.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-8.40.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009064999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-8.40.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-8.40.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-8.40.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0-6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.30.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.7.p357-0.9.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-0.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-0.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-0.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-0.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.4-0.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-67</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-84</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-87</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-90</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-93</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.20-7.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.4-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.4-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.4-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.4-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.4-18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.6.3-1.4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.6.3-1.4.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.17-1.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.17-1.36.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.163</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.168</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.50.1-1.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.50.1-1.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.11-0.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.13-0.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.12-36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.13-39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.14-40.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.5-2.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.11-40.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:19-234.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-40.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.13-40.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.14-40.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.16-40.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.17-40.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_10-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.3_02-26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_02-32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_07-37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_08-40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_10-43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_12-46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_14-51</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_16-54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_18-57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_20-60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_22-61.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_24-61.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_26-61.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_28-61.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_30-61.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_32-61.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_34-61.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_36-61.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_38-61.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_40-61.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.3_06-29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.1-238.29.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.68</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.72.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-1.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.50.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.50.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.118</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.121</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.122.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.122.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17.161-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.7-0.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-0.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-19.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-19.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.47</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.4-1.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.4-1.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.4-1.41.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.9esr-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.5.5-0.5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.6-0.4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.2-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-174.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.50</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.97.8-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.12-6.25.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.7-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-0.6.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.9-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.10-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.11-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.12-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.4esr-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-0.6.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5-1.47.51</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.5esr-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.6esr-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.7esr-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.10esr-0.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.336-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.1-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.0_b27.1.12.7-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_04_3.0.101_0.7.17-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.1-0.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2013.1.7-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.95-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.33.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.18-0.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16-50.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.2.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.5-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.7-5.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.4_02_3.0.58_0.6.6-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.0-3.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.10-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.2_20_3.0.38_0.5-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.12-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3_02_3.0.38_0.5-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3_04_3.0.42_0.7-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.5_02_3.0.74_0.6.10-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_02_3.0.93_0.5-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_04_3.0.101_0.5-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.3.99-3.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.1-28.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.166-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2-147.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2-2.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2-2.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.98.1-0.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.13_3.0.101_0.31-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3-45.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.71-0.12.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:61-1.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-0.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.0-0.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.0-0.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.418-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.481-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.491-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.508-0.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.521-0.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.535-0.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.540-0.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.548-0.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.554-0.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.559-0.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.2-269.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.00-0.49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.22-7.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.71-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.85-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.91-0.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.95-0.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.11.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4_04_3.0.101_0.40-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.67</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.22.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.1-134.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.1-16.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.5-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38-18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.17-42.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.0-0.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.0-0.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4p8-1.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.97-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.3-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2808.01-0.70</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.72-0.70</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.18-0.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7-6.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.6+git20080930-6.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.11-0.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-1.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-174</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.1-6.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_06_3.0.101_0.47.52-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_02_3.0.101_0.40-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_12_3.0.101_0.47.55-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_14_3.0.101_0.47.67-18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.2_06_3.0.82_0.7-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.3_02_3.0.93_0.8-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.3_08_3.0.101_0.8-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4_02_3.0.101_0.15-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4_04_3.0.101_0.40-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_04_3.0.101_0.47.52-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_08_3.0.101_0.47.55-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_18_3.0.101_0.47.71-21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.07-6.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_12_3.0.101_63-23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3.8.90-13.20.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.569-0.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.577-0.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.00-0.54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.3-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.99-0.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p4-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.0-1.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_10_3.0.101_63-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.3_02_3.0.101_65-26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_02_3.0.101_68-32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.3_06_3.0.101_65-29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.1-0.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_0.47.55-2.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_0.40-2.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_0.47.55-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_0.40-0.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_0.47.55-0.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_0.40-0.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_0.40-0.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.76</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.0+git.1430140184.8e872c5-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-2.32.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_108.7-2.32.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.4-0.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_108.7-0.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2-0.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_108.7-0.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6-0.28.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_108.7-0.28.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-2.32.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_108.35-2.32.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.4-0.27.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_108.35-0.27.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2-0.24.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_108.35-0.24.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6-0.28.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_108.35-0.28.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6-0.28.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_108.87-0.28.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-2.32.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_108.87-2.32.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.4-0.27.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_108.87-0.27.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2-0.24.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_108.87-0.24.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6-0.28.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_108.87-0.28.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.12-18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.0-23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52-24.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52-24.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.0-18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.5-18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9-18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.14-0.4.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.0-135.23.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.51.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5-34.256.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5-34.256.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.2-0.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.3-0.20.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.4-0.20.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.100.1-0.20.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.100.2-0.20.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.100.3-0.20.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.34.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.78-0.16.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.7.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.62-47.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.7-47.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.22.5-0.8.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.42.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.35-5.18.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-1.37.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.30-75</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.35-78</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.45-84</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.50-85.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.50-55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.60-58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.1-61</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.5-64</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.15-65.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.20-65.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.25-65.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.30-65.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.35-65.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.40-65.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.86</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.93</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.99</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.102</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.105</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.50</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.59</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.90</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-53.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-53.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-53.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-53.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-53.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-53.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-53.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.9-4.2.12.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.9-4.2.12.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.9-4.2.12.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.4-12.5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.6+git20080930-6.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-21.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-21.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-21.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.96</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.15-9.6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.15-9.6.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.17-42.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.26.44-101.15.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p9-48.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p12-48.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p13-48.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.41.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-41.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.9-252.22.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2808.01-0.81.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.72-0.81.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.66-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.71</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-8.40.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-8.40.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-1.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-84</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-90</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-93</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-94.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-94.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-94.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-94.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.6.3-1.4.7.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.20-122.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.0.53-0.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.80.2-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2-8.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.1-6.18.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.86-27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.90-30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.96-35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.99-38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.99-41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.102-44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-45.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.105-45.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-45.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.105-45.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-45.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.106.5-45.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-45.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.106.8-45.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-45.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.106.14-45.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-45.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.106.19-45.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-45.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.106.43-45.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-45.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.106.59-45.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.19_2.6.33.5_rt23_0.4-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0.0_2.6.33.20_rt31_0.5-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_2.6.33.20_rt31_0.5-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009058999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.3.11_2.6.33.20_rt31_0.5-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.19_2.6.33.20_rt31_0.5-0.9.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.33.20-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_2.6.33.20_rt31_0.5-0.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2_2.6.33.20_rt31_0.5-0.9.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2_2.6.33.18_rt31_0.3-0.9.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_rt130_0.7.9-2.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.2_3.0.101_rt130_0.7.9-0.6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_rt130_0.7.9-0.25.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-0.7.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4_3.0.101_rt130_0.7.9-0.9.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_rt130_0.7.9-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2_3.0.101_rt130_0.7.9-0.28.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_rt130_0.28-2.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_rt130_0.28-0.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_rt130_0.28-0.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-0.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1_3.0.101_rt130_0.28-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_rt130_0.28-0.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_rt130_0.28-0.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-0.33.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-0.33.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-68</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_rt130_68-2.32.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_rt130_68-0.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_rt130_68-0.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_rt130_68-0.28.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-69.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-51</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_rt130_69.14-2.32.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_rt130_69.14-0.27.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_rt130_69.14-0.24.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_rt130_69.14-0.28.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_rt130_69.42-0.28.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-69.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-69.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-69.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-69.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-69.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-69.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-69.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-69.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20-0.43.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_rt130_69.24-0.43.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_rt130_69.24-22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_rt130_69.42-2.32.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_rt130_69.42-0.27.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_rt130_69.42-0.24.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20-0.43.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_rt130_69.42-0.43.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_rt130_69.42-0.28.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_rt130_69.42-22.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-69.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-69.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.13-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.47</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.98.9-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.50</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.51.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.51.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.4.15-0.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.9.33-0.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.10-0.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.7-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.74-0.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.2-0.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.74-0.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.84.4-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.5.5-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.24.9-24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.13.8-23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.9-5.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.7-5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.8-5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.11-12.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.14-18.51</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.25-28.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.5-6.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.2-0.68.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.2-0.68.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.1-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2016.11.4-43.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2016.11.4-43.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2016.11.10-43.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2016.11.4-42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.4-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.2-0.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_0.7.17-2.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_0.7.17-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_0.7.17-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">11</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.0-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.3.1-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.11-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.11-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.12-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.14.16-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.0.r4359-15.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.0.r1053-11.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.7-151</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.47-30.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.10-2.23.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.6-50.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.23-11.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.1-1.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.7-11.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-11.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.95.1-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.3_20081022-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9-75.27.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1-194.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.0-11.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2-107</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.22-182.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.76-34.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.1-7.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.45-12.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5-1.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.1.1-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.24.1.1-3.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.1.1-11.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:IIIalpha9.8-691</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-130</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.21-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-87</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.15-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.0-24.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.62-32.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.18.2-7.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9-13.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.0-14.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.1-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.21-2.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.10-4.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0-7.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.1-10.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.15-94.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.15_2.6.27.48_0.6-94.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0.13.1.2-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0-124.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0-124.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3-9.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3-9.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3-7.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3-18.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3-7.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.10-23.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3-8.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3-8.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.5-106</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.27.23_0.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.15_2.6.27.54_0.2-94.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.27.23-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.5_2.6.27.54_0.2-7.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:78.0.10.6-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:78.2.6.30.1_2.6.27.37_0.1-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.17-77.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.23-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.4-12.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-157.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.8-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.3-106</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-11.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.12-7.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.67-13.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.1-1.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.1-1.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.0-8.8.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.0-8.9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.3-12.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.17-172.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.beta2-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:128-13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.6-14.63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-10.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.02.39-18.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-2.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.9-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.15-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4p6-1.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.870-26.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-172.10.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16-1.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.22.1-3.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.102-1.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.16-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7-37.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2.3-37.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.3.7-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.5-5.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.4-194.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.10-17.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.14.3-50.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.7.p72-5.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8-1.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.1-42.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.0-1.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.2-128.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1.2-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5-1.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5-15.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.6-14.60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.2-8.47</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.3-66.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.3-3.57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.27-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.1_18546_24-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.1_18546_24_2.6.27.45_0.3-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.1-238.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17.21-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.10-64.65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.6.0esr-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24-0.4.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.1-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.97</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.106</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.109</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.112</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.7-5.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.5-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.13.5-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.1-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.3.0esr-48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.0-20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.0-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.21.1-26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12-25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.4.0esr-52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.6.0esr-66</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.7.0esr-69</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.8.0esr-74</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.9.0esr-77</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.29.5-37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.13.1-28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.3.0esr-78.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52-21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.5.0esr-78.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.6.0esr-78.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.7.3esr-78.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.8.0esr-78.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.8.1esr-78.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.9.0esr-78.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:60.8.0esr-78.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.5.0esr-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.6.0esr-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.1_git20090811-3.9.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.1-5.15.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.9-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.1-5.15.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.svn1043876-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-83.17.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-83.17.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6_SVNr208-2.18.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11-6.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.2.1-188.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0-200.26.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-1.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.40-0.2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-0.4.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.1-147.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.114-12.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.114-0.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1a15-131.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.0-135.16.16.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.1-7.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.1-7.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.1-7.23.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.23-11.25.25.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-236.38.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-236.38.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2-147.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2-147.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR7P2-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11W1-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11W1-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11W1-0.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11W1-0.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11W1-0.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11W1-0.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11W1-0.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11W1-0.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11W1-0.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11W1-0.31.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11W1-0.31.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.51-1.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.1-1.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-11.28.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.97.5-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.37-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.20-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.12-32.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.12-32.41.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.20.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.20.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.20.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.76-34.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.3.ESV-0.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.3.ESV-0.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.3.ESV-0.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.21-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.45-12.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.45-12.27.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.41.9-2.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.16-6.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2-1001.30.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.137-8.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.137-8.24.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.42.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.42.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.3-5.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.4-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.13.4-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.6-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.3.0esr-0.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.2_20130108-0.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.15.4-0.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.4.0esr-0.5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.7.0esr-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.2-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.8.0esr-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.4-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.3.0esr-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.4.0esr-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.17.3-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.5.3esr-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.7.0esr-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.2.1esr-17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.3.0esr-20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.19.2.1-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.7.0esr-36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.2-20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12-19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.4.0esr-78.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.29.5-38.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:60.9.0esr-78.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.54.3-2.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.9-2.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:60.7.0esr-78.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:60-21.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.2-2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.26.1-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15.10-2.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.76-34.2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9-2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.36.11-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.54.3-2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.9-2.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.5-2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.40.14-2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.34.0-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.41.1-38.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.20-29.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.2.0esr-0.11.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.0-0.5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.17.2-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.2-61.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.2-61.27.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.4_20091019-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.4_20091019-7.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.2-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.0-24.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.3-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11-1.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.8-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.68</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.72</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.79</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.80.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.80.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.80.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.80.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.80.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.80.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.0-3.11.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.42.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.25-1.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.20.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.20.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.20.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.20.27.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.20.27.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2012.10.4-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.3-1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.3-1.38.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.19-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.19_2.6.32.19_0.2-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.2-88.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-1.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-234.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.1-134.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.12-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr10.1-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.20-49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.25-69</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.41-81</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6b-879.12.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2.0-879.12.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14.1-16.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.59_0.3-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.59_0.3-7.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.59_0.3-0.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.19_2.6.32.19_0.3-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.59-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.59-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.5_2.6.32.19_0.3-7.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_16_2.6.32.59_0.15-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.24-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.6-133.49.121</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.6-133.49.125.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.6-133.49.125.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.6-133.49.125.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.5-1.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.5-1.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14.0.894-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.37.1-5.19.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.1-122.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.1-6.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.1-6.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.1-6.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.1-6.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.1-6.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1-20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.43-1.2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.20-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0-1.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0-1.3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0-1.3.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0-1.3.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.21-1.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.18-28.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.29.6-6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5-1.35.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-12.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.148</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.6+git20080930-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.6-1.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.24-19.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.24-19.34.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.3.6-65.66</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.02.39-18.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.15-9.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.15-2.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.5.1esr-63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.21.3-30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.36-28.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.17-102.57.64.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.17-102.57.64.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.17-102.57.64.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.17-102.57.64.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.17-102.57.64.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.17-102.57.64.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3-27.24.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.1-1.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.6.1esr-33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.2-17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.2.0esr-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.0-0.5.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.2_20130108-0.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.19.2.0-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.19-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.6-1.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12-24.4.10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.1-2.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.75-1.30.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.11-3.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.9-1.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4p8-1.29.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p6-41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17.14.1-1.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p7-44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p8-47</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p10-48.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p11-48.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2-0.9.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2_2.6.32.46_0.3-0.9.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.17.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.17.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.17.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.17.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-172.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.69</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.74</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.79</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.80.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4.1-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-80.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-80.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.61</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-27.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.35.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.35.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.35.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.35.9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2011.6.28-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-0.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11-1.22.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.0-141.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.46-2.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.61.63.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.24-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.33-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.816-2.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.72</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.79</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.84</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.89</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.94</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.97</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.100</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.103</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.110</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.111.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.111.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.111.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.111.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.111.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.111.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.111.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.111.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.111.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.111.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-111.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-111.51</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-111.54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-111.59</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.16.0-2.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.79-4.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.79-4.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7-37.29.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2.3-37.29.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2.3-37.29.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.6-5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.3.20-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.1-0.6.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.3.18-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4-0.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.6-0.2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10-0.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.8-0.2.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.9-0.2.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.10-0.2.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.24-0.23.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.22-240.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.17-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.26-0.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.22-3.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.2-1.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.8-0.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-8.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.9-6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.9-6.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.9-6.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.9-6.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.9-6.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.16-6.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:18.0.1-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16-50.36.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.48.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.48.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.18.3-7.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.7.p72-5.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.21~rc-936.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.3-56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.3-59</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-59</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.3-63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.3-66</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-66</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.3-69</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-69</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.3-70.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-70.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.3-70.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-70.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.3-70.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-70.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.3-70.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-70.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.7-0.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.7-0.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.2-162.19.2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.4-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.STABLE5-2.12.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.STABLE5-2.12.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.STABLE5-2.12.30.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.23-8.16.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.23-8.16.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.23-8.16.37.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.23-8.16.37.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.23-8.16.37.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-13.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.36.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.36-0.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.2.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.2.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.20-0.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.71.31-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.26-1.2.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.9.8-1.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.9.8-1.30.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.10-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.0.45-0.53</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.0.45-0.50</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.0.53-0.57.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.0.53-0.57.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.5-160.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.1-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.52-142.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.52-142.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.52-142.34.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.16-6.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2-13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2-18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.1-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.7-4.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.3.git20161120-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.13-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.109.2-67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.9-4.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-0.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.59_0.19-0.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.59_0.19-29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.54_0.68.TDC-27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.54_0.68.TDC-30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.54_0.85.TDC-36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.54_0.94.TDC-41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.54_0.97.TDC-44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.54_0.103.TDC-49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.54_0.103.TDC-52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-53.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.54_0.112.TDC-53.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-53.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.54_0.112.TDC-53.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-53.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.54_0.116.TDC-53.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-53.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.54_0.122.TDC-53.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-53.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.54_0.133.TDC-53.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.6-1.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.30-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.1_21326_08-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.1_21326_08_2.6.32.36_0.5-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.31-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.2_21511_02-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.2_21511_02_2.6.32.43_0.4-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.6-1.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_02-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_02_2.6.32.54_0.3-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_04-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_04_2.6.32.59_0.5-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.34-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_08-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_08_2.6.32.59_0.7-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_10-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_10_2.6.32.59_0.7-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_11-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_11_2.6.32.54_0.11.TDC-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_14-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_14_2.6.32.54_0.31.TDC-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_16-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_16_2.6.32.59_0.9-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.54_0.45.TDC-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-0.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.59_0.19-0.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-0.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.59_0.19-0.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.54_0.73.TDC-33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-9.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.40.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.40.78</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.40.79.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.40.79.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4_0.11.0-0.4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.40.50</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.02-138.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.02-138.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17.35.3-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17.99.5-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.7-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.6-67.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.21-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.2-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr10.0-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.12-0.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.29-17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2-147.14.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2-147.14.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-12.33.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.11.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.45.66</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.0-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr7.0-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.30-45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.40-52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.47</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.53</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.1-0.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-12.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.5-0.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12-24.4.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16-1.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-47</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.0.18-20.35.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.23-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.37-20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.37-26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.40-29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.44-32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_06-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_06_3.0.101_0.7.17-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.29-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-0.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.29-0.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.37-23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.0.0-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.0.0-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.2.0-11.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.3-0.10.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-2.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10-0.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10-0.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.1-0.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-0.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-236.236.44.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-236.236.44.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2-147.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2-147.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.99-0.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.6-257.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.6-257.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-12.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1-0.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.69.8-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.12-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.12-6.25.33.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.12-6.25.33.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.71-0.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.78-0.16.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11-121.31.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.152-4.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.0-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.0-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.5.1-0.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.30-5.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-0.81.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.20-51</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.30-47</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.10-65.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.45-65.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.79</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_0.40-0.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_0.40-0.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.5_3.0.101_0.40-7.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-53.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-53.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.26.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-21.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-21.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-21.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-41.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.5-0.12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2808.01-0.80</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.72-0.80</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2808.01-0.81.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.72-0.81.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2808.01-0.81.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.72-0.81.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.66</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.16-0.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.1-0.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.7-152.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.1-0.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-0.3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:18.5-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.30-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.4-0.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.2-2.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.18-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.2-0.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10-0.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.1-2.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.42-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.57-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.6-1.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11-0.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10-0.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009033659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.2-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.18-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1-0.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-0.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.0-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.1-2.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.2-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.1-0.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.9-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.5-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-0.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.1-0.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.5-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.1-0.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.13-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.2-0.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.53.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.53.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-67</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-76</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-87</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-94.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-12.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-64</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.6.3-1.4.7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.20-121</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20120115_1.7.0-0.5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.00-11.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.00-11.18.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.00-11.18.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2-8.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2-8.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.7-4.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009061782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.1-6.18.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_20-24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_20_3.0.101_0.47.79-24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.113.TDC-31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.116.TDC-37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.119.TDC-40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.119.TDC-43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.122.TDC-46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-47.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.125.TDC-47.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-47.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.126.5.TDC-47.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-47.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.132.TDC-47.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-47.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.139.TDC-47.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-47.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.150.TDC-47.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-47.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.156.TDC-47.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-47.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.181.TDC-47.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-47.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.190.TDC-47.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17.147.1-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.71-0.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.78-0.17.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.26-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.00-0.66.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.45-26.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.50-26.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.90</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20110923-0.59.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.95</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.98</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.101</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_108.52-0.43.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_108.52-22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_108.87-0.43.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_108.87-22.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.5-7.44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.5_3.0.101_108.87-7.44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-47</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-50</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-59</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-60.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-60.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-60.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-60.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-60.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-60.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-60.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-60.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-60.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.3-17.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.3-17.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-23.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-23.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p9-57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p11-64.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p12-64.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p13-64.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.1.0-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-36.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-36.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-36.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-36.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11-1.27.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.0.41-0.47</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_07_3.0.101_77-37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_08_3.0.101_80-40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_10_3.0.101_88-43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_12_3.0.101_91-46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_14_3.0.101_94-51</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_16_3.0.101_97-54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_18_3.0.101_97-57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_20_3.0.101_104-60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_22_3.0.101_108.7-61.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_24_3.0.101_108.10-61.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_26_3.0.101_108.13-61.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_28_3.0.101_108.35-61.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_30_3.0.101_108.38-61.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_32_3.0.101_108.52-61.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_34_3.0.101_108.57-61.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_36_3.0.101_108.68-61.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_38_3.0.101_108.84-61.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_40_3.0.101_108.87-61.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_40-61.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_40_3.0.101_108.90-61.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.9.8-3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.27.39_0.3-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.27.39-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.72</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.67-13.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.1-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.10-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.13-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.17-172.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr7.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.62-32.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.9-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.27.21_0.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.27.21-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.5.0P2-20.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8-1.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.1-1.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.2-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.12-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.22.1-3.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.10-2.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.95-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.6-50.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.27.25_0.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.27.25-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.27.48_0.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.27.48-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.11-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.11-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.15-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.4-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.8-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.18-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.7-11.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-11.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16-1.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8-1.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:78.0.10.5-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:78.2.6.30.1_2.6.27.25_0.1-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.3.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.27.29_0.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.27.29-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.12-7.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.17-42.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-10.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.0-11.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5-1.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.0-8.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.0-8.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.13-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8-1.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.6-50.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.7-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.27.37_0.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.27.37-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.14-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.27.42_0.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.27.42-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.3.8-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.22.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.18.2-7.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.2-61.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.4-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.6-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.6-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr9.0-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.53</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4p6-1.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.27.45_0.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.27.45-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.16-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.5.0P2-20.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.62-32.27.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.27.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.5-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr8.0-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr8.0-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.4-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.13-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.16-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.13-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.17-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.7-11.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-11.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.11-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.3.11-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.10-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.61.63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.0.r4359-15.20.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.0.r4359-15.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.13_0.4-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.59_0.7-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.13_0.4-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.59_0.7-7.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.59_0.13-7.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.59_0.7-0.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.59_0.13-0.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.13-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.59-0.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.8-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.8-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.10-2.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.4-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.15-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.17-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.15-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.8.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.0-8.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.96.1-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.13_0.5-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.13_0.5-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.13-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7-37.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2.3-37.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.7-11.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-11.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0.0_2.6.33.7.2_rt30_0.3-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.19_2.6.33.7.2_rt30_0.3-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.33.7.2-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_2.6.33.7.2_rt30_0.3-0.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.6-1.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.19_0.2-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.19_0.2-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.19-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.20.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.4-3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.10-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.53</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.27.54_0.2-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.27.54-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.22.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.29_0.3-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.29_0.3-7.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.29-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.10-17.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.23_0.3-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.23_0.3-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.23-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.19_0.3-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.19_0.3-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.19-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.27.48_0.12-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.27.48-0.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.24_0.2-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.24_0.2-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-11.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.12-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.96.4-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.27_0.2-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.27_0.2-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.27-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.94-0.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.22.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0.0_2.6.33.20_rt31_0.3-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_2.6.33.20_rt31_0.3-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.3.11_2.6.33.20_rt31_0.3-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.19_2.6.33.20_rt31_0.3-0.9.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.33.20-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_2.6.33.20_rt31_0.3-0.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2_2.6.33.20_rt31_0.3-0.9.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.74_rt98_0.6.2-2.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.2_3.0.74_rt98_0.6.2-0.6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.74_rt98_0.6.2-0.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.74.rt98-0.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4_3.0.74_rt98_0.6.2-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.74_rt98_0.6.2-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2_3.0.74_rt98_0.6.2-0.28.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.54_0.3-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.54_0.3-7.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.36_0.5-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.36_0.5-7.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.36-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0.0_2.6.33.18_rt31_0.3-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_2.6.33.18_rt31_0.3-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.3.11_2.6.33.18_rt31_0.3-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.19_2.6.33.18_rt31_0.3-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.33.18-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_2.6.33.18_rt31_0.3-0.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.45_0.3-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.45_0.3-7.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.45-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.9.8-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr9.1-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.9-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.9-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.50</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.59_0.13-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.59-0.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.59_0.19-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.17-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.17-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.18-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.18-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.20-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.20-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.6-5.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr9.2-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.10-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3-44.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.3.ESV-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.97-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.43_0.4-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.43_0.4-7.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.43-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.26-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.26_0.7-2.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.26_0.7-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.26_0.7-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.59_0.9-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.59_0.9-7.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.59-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_06_3.0.101_0.7.23-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.8-0.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.22-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.49_0.3-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.49_0.3-7.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.49-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.4-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.5-1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.11-60.61</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.4-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.5-1.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.24-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR4P3-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR7P4-0.2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-11.27.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.97.2-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.3.ESV-0.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.46_0.3-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.46_0.3-7.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.46-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.23-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.23-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-1.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.12-8.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.11-60.63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7-37.29.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2.3-37.29.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.11-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.11-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.12-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.26-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.12-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.24-19.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.8-0.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR5P1-0.2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20-2.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.10-0.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-1.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.11-0.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.3-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.13.3-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.0-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.1-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.0_b24.1.11.4-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr2.0-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr11.0-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-12.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.58-0.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3_06_3.0.58_0.6.2-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.58_0.6.2-2.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.58_0.6.2-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.58_0.6.2-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.8-0.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.144</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-11.28.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.5.3-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.6-0.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.0_b24.1.11.5-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.14-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr12.0-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr3.0-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr13.0-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr4.0-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.12-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.51-0.7.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.51_0.7.9-2.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.51_0.7.9-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.51_0.7.9-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR7P1-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR7P1-0.2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.13-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.12-0.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.146</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.34-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.34_0.7-2.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.34_0.7-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.34_0.7-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.31-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.31_0.9-2.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.31_0.9-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.31_0.9-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.74-0.6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.4_02_3.0.74_0.6.6-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.74_0.6.6-2.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.74_0.6.6-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.74_0.6.6-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.8-0.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4_02_3.0.101_0.35-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_0.35-2.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_0.35-0.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_0.35-0.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.61_rt85_0.7-2.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.2_3.0.61_rt85_0.7-0.6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.61_rt85_0.7-0.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.61.rt85-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4_3.0.61_rt85_0.7-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.61_rt85_0.7-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2_3.0.61_rt85_0.7-0.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_rt130_0.24-2.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_rt130_0.24-0.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_rt130_0.24-0.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-0.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1_3.0.101_rt130_0.24-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_rt130_0.24-0.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_rt130_0.24-0.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.5-1.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.8-0.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.42-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.42_0.7-2.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.42_0.7-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.42_0.7-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.38-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.38_0.5-2.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.38_0.5-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.38_0.5-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.45.53</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-0.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.14-0.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.1-0.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4.P1-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR7P2-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.15-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR7P3-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR7P3-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR10P2-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_02_3.0.101_0.46-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_02_3.0.101_0.42-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_0.46-2.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_0.42-2.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_0.46-0.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_0.42-0.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_0.46-0.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_0.42-0.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_rt130_0.32-2.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_rt130_0.32-0.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_rt130_0.32-0.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-0.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1_3.0.101_rt130_0.32-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_rt130_0.32-0.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_rt130_0.32-0.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.29-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.150</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR7P4-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.243-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.251-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3_06-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3_06_3.0.51_0.7.9-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_12-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_12_2.6.32.54_0.11.TDC-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.4-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.42-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.258-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009059999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-11.28.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-11.28.50</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.33.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-12.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.59-0.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.80</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009069666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.45.57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.80-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.5_02_3.0.80_0.5-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.82-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_08_3.0.101_0.47.55-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.80_0.5-2.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.80_0.5-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.80_0.5-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.82_0.7-2.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.82_0.7-0.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.82_0.7-0.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.80_rt108_0.5-2.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.2_3.0.80_rt108_0.5-0.6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.80_rt108_0.5-0.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.80.rt108-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4_3.0.80_rt108_0.5-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.80_rt108_0.5-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2_3.0.80_rt108_0.5-0.28.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.0_b27.1.12.3-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.6-0.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-11.28.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-12.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.12-32.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.1.8-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.0_b27.1.12.5-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr13.2-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr4.2-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.0_b27.1.12.2-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.15-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.16-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.273-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.261-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.262-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.270-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.5.4-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.6-0.4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.275-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.3esr-0.4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.3esr-0.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.0_b27.1.12.4-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.58-0.6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3_06_3.0.58_0.6.6-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.58_0.6.6-2.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.58_0.6.6-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.58_0.6.6-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.93-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.5_02_3.0.93_0.5-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.93-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.2_06_3.0.93_0.8-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.93_0.5-2.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.93_0.5-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.93_0.5-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.93_0.8-2.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.93_0.8-0.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.93_0.8-0.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.93_rt117_0.5-2.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.2_3.0.93_rt117_0.5-0.6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.93_rt117_0.5-0.25.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.93.rt117-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4_3.0.93_rt117_0.5-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.93_rt117_0.5-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2_3.0.93_rt117_0.5-0.28.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.93_rt117_0.9-2.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.3_3.0.93_rt117_0.9-0.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.93_rt117_0.9-0.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.93.rt117-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1_3.0.93_rt117_0.9-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.93_rt117_0.9-0.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.93_rt117_0.9-0.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.280-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.17-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.0_b27.1.12.6-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.6-0.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr14.0-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr5.0-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.5-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.4-0.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.8-0.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.8esr-0.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.8esr-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.17-1.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.33-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.70.72</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.40.70</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.40.64</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.20.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.20.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.17-1.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16-1.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.74-0.6.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.4_02_3.0.74_0.6.8-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.74_0.6.8-2.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.74_0.6.8-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.74_0.6.8-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.74_rt98_0.6.4-2.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.2_3.0.74_rt98_0.6.4-0.6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.74_rt98_0.6.4-0.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.74.rt98-0.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4_3.0.74_rt98_0.6.4-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.74_rt98_0.6.4-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2_3.0.74_rt98_0.6.4-0.28.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.3_08_3.0.101_0.15-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_0.15-2.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_0.15-0.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_0.15-0.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_rt130_0.10-2.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_rt130_0.10-0.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_rt130_0.10-0.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-0.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1_3.0.101_rt130_0.10-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_rt130_0.10-0.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_rt130_0.10-0.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_02_3.0.101_0.5-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.3_02_3.0.101_0.8-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_0.5-2.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_0.5-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_0.5-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_0.8-2.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_0.8-0.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_0.8-0.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_rt130_0.5-2.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.2_3.0.101_rt130_0.5-0.6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_rt130_0.5-0.25.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4_3.0.101_rt130_0.5-0.9.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_rt130_0.5-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2_3.0.101_rt130_0.5-0.28.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_rt130_0.8-2.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_rt130_0.8-0.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_rt130_0.8-0.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1_3.0.101_rt130_0.8-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_rt130_0.8-0.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_rt130_0.8-0.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_16-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_16_2.6.32.54_0.33.TDC-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.8-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.5.5-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.285-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.74-0.6.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.4_02_3.0.74_0.6.10-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.74_0.6.10-2.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.74_0.6.10-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.74_0.6.10-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.74_rt98_0.6.6-2.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.2_3.0.74_rt98_0.6.6-0.6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.74_rt98_0.6.6-0.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.74.rt98-0.6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4_3.0.74_rt98_0.6.6-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.74_rt98_0.6.6-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2_3.0.74_rt98_0.6.6-0.28.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.291-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.297-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.310-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.59_0.15-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.18-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.6-0.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.7.p357-0.9.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-0.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.33.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-11.28.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-12.33.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-12.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-0.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.17-1.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5.6-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.37-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_04_3.0.101_0.7.15-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_0.7.15-2.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_0.7.15-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_0.7.15-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.70.74</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.83</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.40.66</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4_02_3.0.101_0.21-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_0.21-2.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_0.21-0.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_0.21-0.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_rt130_0.14-2.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_rt130_0.14-0.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_rt130_0.14-0.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-0.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1_3.0.101_rt130_0.14-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_rt130_0.14-0.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_rt130_0.14-0.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-11.28.54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.50</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-12.33.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-12.50</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.20.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.18-0.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.3P2-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.9-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.327-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.332-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.6-0.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr15.1-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr6.1-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.0-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.11-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.40.68</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7-37.29.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5.8-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-1.48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16-1.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.98.5-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-0.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.6-0.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.12-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.50</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_04_3.0.101_0.47.50-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_0.47.50-2.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_0.47.50-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_0.47.50-0.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_rt130_0.33.36-2.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_rt130_0.33.36-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_rt130_0.33.36-0.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-0.33.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1_3.0.101_rt130_0.33.36-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_rt130_0.33.36-0.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_rt130_0.33.36-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.82</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.64</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.45.59</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.17-1.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.2.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.12-8.16.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4_02_3.0.101_0.29-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_0.29-2.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_0.29-0.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_0.29-0.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_rt130_0.16-2.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_rt130_0.16-0.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_rt130_0.16-0.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-0.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1_3.0.101_rt130_0.16-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_rt130_0.16-0.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_rt130_0.16-0.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-0.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.5-1.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.0.41-0.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.8-0.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-0.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.68</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2-147.14.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2-147.14.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.335-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.341-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.346-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.350-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.359-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.356-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.378-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.394-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.400-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.406-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.411-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.425-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11W1-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16-1.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.24-43.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.13-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.65-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.75-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.68</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.17-1.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.20.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.66</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-0.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr7.1-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.1-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2-147.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2-147.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.10-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_rt130_0.33.38-2.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_rt130_0.33.38-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_rt130_0.33.38-0.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-0.33.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1_3.0.101_rt130_0.33.38-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_rt130_0.33.38-0.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_rt130_0.33.38-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.101</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.40.72</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.35.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.59-0.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.59_0.17-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.27-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.00-11.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.52-142.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.64</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-0.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.424-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.54_0.47.TDC-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.9.8-1.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.3-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr8.10-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4p8-1.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.98.6-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.68</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.74</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.45.55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-12.33.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.33.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.103</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.40.74</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.429-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.438-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.440-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.442-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.451-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.457-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.75-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.12-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.5.0esr-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.5.0esr-0.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.22.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4p8-1.29.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-0.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.54_0.55.TDC-0.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.1-1.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.460-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.466-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.468-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.20.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.22.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.5-1.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-0.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.29-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.70</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-0.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.40.76</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.22.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-0.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009067969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.54_0.59.TDC-0.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.1-0.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.14-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.43-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9+git.1473844105.932298f-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.3-0.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9+git.1443859419.95e948a-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4~a0~dev103-16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4-0.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.91</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4.dev18-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4.dev19-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4.dev5-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4.dev13-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4.dev5-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4.dev3-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.0-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9+git.1443622531.b2b2939-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4~a0~dev12-13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.7-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4.juno-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4.juno-17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4.juno-29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4~a0~dev80-20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4.juno-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.11-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.11-13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10-0.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.0-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.20.0-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.1-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.0-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.0-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.9-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.9-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.9-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.1-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.5-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009060409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2-9</evr>
  </rpminfo_state>
</states>
</oval_definitions>
